Re: Amazon RDS auth tokens in .pgpass

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: Amazon RDS auth tokens in .pgpass
Дата
Msg-id 142974.1598984710@sss.pgh.pa.us
обсуждение исходный текст
Ответ на Re: Amazon RDS auth tokens in .pgpass  (Nicholas Chammas <nicholas.chammas@gmail.com>)
Ответы Re: Amazon RDS auth tokens in .pgpass  (Nicholas Chammas <nicholas.chammas@gmail.com>)
Список pgsql-admin
Nicholas Chammas <nicholas.chammas@gmail.com> writes:
> On Mon, Aug 31, 2020 at 2:04 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
>> Looking at the source code, there's a hard-wired restriction that lines of
>> .pgpass can't be more than 320 characters long (well, NAMEDATALEN*5, but
>> very few builds don't have NAMEDATALEN=64).  I see that somebody very
>> recently added code to make libpq print a warning for overlength lines,
>> but I wonder why they didn't just, um, remove the restriction.  We had
>> not previously heard of a use-case for passwords with hundreds of
>> characters in them, but I guess we need to cope.

> Just FYI, the auth tokens generated by Amazon RDS appear to be 796 bytes
> long.

Thanks.  I've pushed a fix to remove libpq's undocumented restriction
on the length of a .pgpass line.  It will be in November's releases.

            regards, tom lane



В списке pgsql-admin по дате отправления:

Предыдущее
От: Achilleas Mantzios
Дата:
Сообщение: Re: Postgres Replication on a different network interface
Следующее
От: Nicholas Chammas
Дата:
Сообщение: Re: Amazon RDS auth tokens in .pgpass