Prefacing this with:
I'm new to terraform/grunt and have no clue if there is a better way to do this or if a custom id is something that can even be exposed for a module like this
expected per table granularity with grants but the id's that get generated are cut off at the object_type so a subsequent run generates something like:
i.e.
# postgresql_grant.table_permissions["user.name-database-schema-select"] will be updated in-place
~ resource "postgresql_grant" "table_permissions" {
id = "user.name_database_schema_table"
~ privileges = [
- "INSERT",
+ "SELECT",
]
# (5 unchanged attributes hidden)
}
if the id matched the terragrunt iterable user.name-database-schema-select or was generated as user.name_database_schema_table_select this would generate a unique id with update permissions with a list of tables for which the user has that permission
ideally letting us set our own resource id would allow for transposition of this i.e.
user.name_database_schema_table_tablename
Prefacing this with: I'm new to terraform/grunt and have no clue if there is a better way to do this or if a custom id is something that can even be exposed for a module like this
Terraform Version
Affected Resource(s)
Please list the resources as a list, for example:
Terraform Configuration Files
Actual/Expected Behavior
expected per table granularity with grants but the id's that get generated are cut off at the object_type so a subsequent run generates something like: i.e.
if the id matched the terragrunt iterable
user.name-database-schema-select
or was generated asuser.name_database_schema_table_select
this would generate a unique id with update permissions with a list of tables for which the user has that permissionideally letting us set our own resource id would allow for transposition of this i.e.
user.name_database_schema_table_tablename
Steps to Reproduce
a secrets.tfvars with something like:
Important Factoids
this is interfacing with auroradb rds cluster in aws