Re: Amazon RDS auth tokens in .pgpass

From: Ron <ronljohnsonjr(at)gmail(dot)com>
To: pgsql-admin(at)lists(dot)postgresql(dot)org
Subject: Re: Amazon RDS auth tokens in .pgpass
Date: 2020-08-31 18:26:23
Message-ID: 8c791ff3-3f48-99dc-4d33-cab8701d0997@gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-admin

On 8/31/20 1:21 PM, Tom Lane wrote:
> Stephen Frost <sfrost(at)snowman(dot)net> writes:
>> My memory might be faulty, but I've got some specific recollection of
>> people complaining about this before and the community response being
>> "who would ever need such very long things?!"
> Yeah, so I guessed wrong ;-). Never too late to absorb new facts though.
>
> That thread does point out that passwordFromFile() is far from the
> only place that assumes passwords aren't going to be longer than
> what would be sane to enter manually. I wonder whether we need to
> worry about the other bottlenecks.

Would it be better to add a .pgtoken file which gets examined (and bypasses
those other length restrictions) if the user isn't in .pgpass?  Or is that a
feature which would have to wait for v14?

--
Angular momentum makes the world go 'round.

In response to

Browse pgsql-admin by date

  From Date Subject
Next Message Tom Lane 2020-08-31 18:37:21 Re: Amazon RDS auth tokens in .pgpass
Previous Message Stephen Frost 2020-08-31 18:25:06 Re: Amazon RDS auth tokens in .pgpass