You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Terraform provides a random_password resource for generating random passwords and storing them in the state file. It also provides a bcrypt() function for generating salted hashes of passwords. The salt is not stored in the state file. bcrypt() generates a different hash on every refresh. This means that Terraform updates all resources that use the salted hash. This causes unnecessary server restarts.
We need Terraform to run quickly and perturb our production system as little as possible. A random_password.bcrypt attribute will help with that. How about adding one?
The text was updated successfully, but these errors were encountered:
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Apr 16, 2020
This issue was closed.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Terraform provides a
random_password
resource for generating random passwords and storing them in the state file. It also provides abcrypt()
function for generating salted hashes of passwords. The salt is not stored in the state file.bcrypt()
generates a different hash on every refresh. This means that Terraform updates all resources that use the salted hash. This causes unnecessary server restarts.We need Terraform to run quickly and perturb our production system as little as possible. A
random_password.bcrypt
attribute will help with that. How about adding one?The text was updated successfully, but these errors were encountered: