Re: Amazon RDS auth tokens in .pgpass - Mailing list pgsql-admin

From Ron
Subject Re: Amazon RDS auth tokens in .pgpass
Date
Msg-id 8c791ff3-3f48-99dc-4d33-cab8701d0997@gmail.com
Whole thread Raw
In response to Re: Amazon RDS auth tokens in .pgpass  (Tom Lane <tgl@sss.pgh.pa.us>)
List pgsql-admin
On 8/31/20 1:21 PM, Tom Lane wrote:
> Stephen Frost <sfrost@snowman.net> writes:
>> My memory might be faulty, but I've got some specific recollection of
>> people complaining about this before and the community response being
>> "who would ever need such very long things?!"
> Yeah, so I guessed wrong ;-).  Never too late to absorb new facts though.
>
> That thread does point out that passwordFromFile() is far from the
> only place that assumes passwords aren't going to be longer than
> what would be sane to enter manually.  I wonder whether we need to
> worry about the other bottlenecks.

Would it be better to add a .pgtoken file which gets examined (and bypasses 
those other length restrictions) if the user isn't in .pgpass?  Or is that a 
feature which would have to wait for v14?

-- 
Angular momentum makes the world go 'round.



pgsql-admin by date:

Previous
From: Tom Lane
Date:
Subject: Re: Amazon RDS auth tokens in .pgpass
Next
From: Tom Lane
Date:
Subject: Re: Amazon RDS auth tokens in .pgpass