Closed HotThoughts closed 3 months ago
No connection details are exposed to secret.
❯ kubectl get secrets NAME TYPE DATA AGE user-1 connection.crossplane.io/v1alpha1 0 3h58m user-2 connection.crossplane.io/v1alpha1 0 3h58m
Create a USER resource and use the auto-generated password.
provider-sql version: v0.9.0 and v0.7.0 Crossplane version: 1.14.1-up.1 Kubernetes version: v1.30.0-eks-036c24b
Found the problem. We use a non-admin user to auth provider-sql, which is missing the RELOAD privilege.
RELOAD
What happened?
No connection details are exposed to secret.
How can we reproduce it?
Create a USER resource and use the auto-generated password.
What environment did it happen in?
provider-sql version: v0.9.0 and v0.7.0 Crossplane version: 1.14.1-up.1 Kubernetes version: v1.30.0-eks-036c24b