Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

azurernm_postgresql_aad_administrator - prevent invalid usernames for the login property #10757

Merged
merged 14 commits into from
Mar 10, 2021

Conversation

HarleyB123
Copy link
Contributor

Fixes issue #10726

Comment on lines 77 to 85
disallowedLogins := [7]string{"azure_superuser", "azure_pg_admin", "admin", "administrator", "root", "guest", "public"}
for _, v := range disallowedLogins {
if v == login {
return fmt.Errorf("Error - PostgreSQL AD Administrator login can not be %q. (Resource Group %q, Server %q)", login, resGroup, serverName)
}
}
if strings.HasPrefix(login, "pg_") {
return fmt.Errorf("Error - PostgreSQL AD Administrator login can not start with 'pg_'. (Resource Group %q, Server %q)", resGroup, serverName)
}
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

instead of doing this in the create/update function could we add a validation function in the schema?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey - have tried adding a validation function, though could have got it completely wrong so feel free to correct me 😄

Copy link
Collaborator

@katbyte katbyte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

.

@ghost ghost added size/M and removed size/XS labels Mar 9, 2021
Copy link
Collaborator

@katbyte katbyte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @HarleyB123 - this LGTM now 👍

@katbyte katbyte added this to the v2.51.0 milestone Mar 9, 2021
@HarleyB123 HarleyB123 closed this Mar 9, 2021
@HarleyB123 HarleyB123 reopened this Mar 9, 2021
Copy link
Collaborator

@katbyte katbyte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like there is a failing test to fix before merge

@HarleyB123
Copy link
Contributor Author

Looks like there is a failing test to fix before merge

Have fixed @katbyte

@ghost ghost removed the waiting-response label Mar 10, 2021
Copy link
Collaborator

@katbyte katbyte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @HarleyB123 - LGTM 👍

@katbyte katbyte changed the title Reject unsupported admin usernames for Postgres servers azurernm_postgresql_aad_administrator - prevent invalid usernames for the login property Mar 10, 2021
@katbyte katbyte merged commit fd1e43b into hashicorp:master Mar 10, 2021
katbyte added a commit that referenced this pull request Mar 10, 2021
@ghost
Copy link

ghost commented Mar 12, 2021

This has been released in version 2.51.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example:

provider "azurerm" {
    version = "~> 2.51.0"
}
# ... other configuration ...

@ghost
Copy link

ghost commented Apr 10, 2021

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!

@ghost ghost locked as resolved and limited conversation to collaborators Apr 10, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants