Skip to content

fix: remove backtick from valid password characters #15756

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Dec 6, 2024

Conversation

angrycub
Copy link
Contributor

@angrycub angrycub commented Dec 4, 2024

Since backticks are the PowerShell escape character, they are silently consumed. To actually use backticks, they would need to be doubled when used.

This change increases the safety of generated passwords for other terraform modules that might use this value unawares.

Since backticks are the PowerShell escape character, they are silently consumed. To actually use backticks, they would need to be doubled when used.
@angrycub angrycub added s3 Bugs that confuse, annoy, or are purely cosmetic bug risk Prone to bugs customer-reported Bugs reported by enterprise customers. Only humans may set this. labels Dec 4, 2024
@angrycub angrycub self-assigned this Dec 4, 2024
@angrycub angrycub changed the title bug: remove backtick from valid password characters fix: remove backtick from valid password characters Dec 5, 2024
@angrycub angrycub requested review from matifali and bpmct December 5, 2024 19:13
@angrycub angrycub marked this pull request as ready for review December 5, 2024 19:13
Copy link
Member

@matifali matifali left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks for catching and fixing it.

@angrycub angrycub merged commit bae12e1 into main Dec 6, 2024
40 checks passed
@angrycub angrycub deleted the cv-fix-azure-windows-2 branch December 6, 2024 13:16
aslilac pushed a commit that referenced this pull request Dec 11, 2024
Since backticks are the PowerShell escape character, they are silently
consumed. To actually use backticks, they would need to be doubled when
used.

This change increases the safety of generated passwords for other
terraform modules that might use this value unawares.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug risk Prone to bugs customer-reported Bugs reported by enterprise customers. Only humans may set this. s3 Bugs that confuse, annoy, or are purely cosmetic
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants