I have to manage PostgreSQL scripts, that will create objects (tables,
views, functions etc), including foreign data wrapper.
I have a shell script that will start execution of a couple of postgresql-script files creating these objects.
One of the script files includes code like this:
create user mapping for user_in_postgredb server my_remote_ms_server
options (username 'domain\myuser', password 'keepsecret');
I don't like the idea having the password in clear text as part of the
script files stored in GIT repository accessbile by non-db-admins.
How to avoid this?
Only superusers may connect to foreign servers without password authentication, so always specify the password option for user mappings belonging to non-superusers.
I have to manage PostgreSQL scripts, that will create
objects (tables, views, functions etc), including
foreign data wrapper.
I have a shell script that will start execution of a couple
of postgresql-script files creating these objects.
One of the script files includes code like this:
create user mapping for user_in_postgredb server my_remote_ms_server options (username 'domain\myuser', password 'keepsecret');
I don't like the idea having the password in clear text as part of the script files stored in GIT repository accessbile by non-db-admins.
How to avoid this?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 31:26:22 |
Calls: | 10,391 |
Calls today: | 2 |
Files: | 14,064 |
Messages: | 6,417,109 |