From: | Ron <ronljohnsonjr(at)gmail(dot)com> |
---|---|
To: | pgsql-admin(at)lists(dot)postgresql(dot)org |
Subject: | Re: Amazon RDS auth tokens in .pgpass |
Date: | 2020-08-31 18:26:23 |
Message-ID: | 8c791ff3-3f48-99dc-4d33-cab8701d0997@gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-admin |
On 8/31/20 1:21 PM, Tom Lane wrote:
> Stephen Frost <sfrost(at)snowman(dot)net> writes:
>> My memory might be faulty, but I've got some specific recollection of
>> people complaining about this before and the community response being
>> "who would ever need such very long things?!"
> Yeah, so I guessed wrong ;-). Never too late to absorb new facts though.
>
> That thread does point out that passwordFromFile() is far from the
> only place that assumes passwords aren't going to be longer than
> what would be sane to enter manually. I wonder whether we need to
> worry about the other bottlenecks.
Would it be better to add a .pgtoken file which gets examined (and bypasses
those other length restrictions) if the user isn't in .pgpass? Or is that a
feature which would have to wait for v14?
--
Angular momentum makes the world go 'round.
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2020-08-31 18:37:21 | Re: Amazon RDS auth tokens in .pgpass |
Previous Message | Stephen Frost | 2020-08-31 18:25:06 | Re: Amazon RDS auth tokens in .pgpass |