-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support hashed user passwords #103
Conversation
@sworisbreathing you authored the commit 004a620. It seemed to contain multiple changes, so can you review that this PR reverts only the relevant part? @mtesch-um as author of #97, could you also review this? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@sworisbreathing you authored the commit 004a620. It seemed to contain multiple changes, so can you review that this PR reverts only the relevant part?
@hoxu confirmed, this only reverts the md5 hashing of the username
@hoxu thanks for pulling this together! To prevent any regression here, I'd suggest adding tests to |
I still can't run the tests, but commit 3bfdd33 is a blind-coded attempt at adding a test for creation of a user with MD5-hashed password. @mtesch-um can you check how it looks like? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm.
Also suggest the following addition to the documentation (
|
Documentation added in commit 49aad90. Did you check that Can you review this one more time and resolve the conversations if you are satisfied? I'll |
I tested with Redshift and it seems
Creation of SHA256-hashed Redshift passwords is poorly documented in AWS documentation, but this Stack Overflow answer has instructions: https://stackoverflow.com/questions/73489343/creating-a-redshift-user-with-a-sha256-password However, I didn't test logging in with a SHA256-hashed password, because apparently |
One more change, squash baee2bd. I removed mention of MD5 and SHA256 as well as |
baee2bd
to
8e171a4
Compare
I did Could someone with write access, like @robertomczak, @rg00d, @szemek or @winglot review and approve this so that the test workflow can be executed? |
8e171a4
to
f672031
Compare
Commit 004a620 Pass the password as-is to Redshift, and let it figure out whether the password is already hashed or needs to be hashed. Allow providing passwords as hashed instead of only plaintext.
623b8c7
to
fb930ce
Compare
@hoxu thanks [again] for taking the initiative to fix this!!! |
@mtesch-um Thanks to you for helping on every step along the way :) |
This partially reverts commit 004a620, that added MD5 hashing of all passwords on the provider side.
Now the passwords are again passed to Redshift as-is.
This allows Redshift to figure out whether the password is already hashed or needs to be hashed.
As a result, user passwords can be passed as hashed in the Terraform sources.
Unfortunately I could not run the acceptance tests against a Redshift cluster. Could someone help with the testing?
Fixes #97. Closes #90 and #96.