Convert random_string to random_password in RDS module. #90
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
PULL REQUEST
Summary
Previously, the RDS terraform module used
random_string
to generate a password for the database. This is dangerous, asrandom_string
is not marked as sensitive. Values generated using this resource can be viewed in the console, and might be recovered by a malicious actor.This PR replaces
random_string
withrandom_password
, which guarantees handling as a sensitive value.Related Issue
Fixes #89
Additional Information
See below for an example of how
random_string
is currently handled. It appears as though Terraform is automatically converting the object for safety, but this code change should guarantee proper handling.