Skip to content

Support rotating passwords #445

Open
@Cocalus

Description

@Cocalus

I suspect this is not a common use case. But I was looking at using
https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/UsingWithRDS.IAMDBAuth.html

To authentic to an AWS Aurora Postgres server, instead of playing hide the keys in the cloud. But the generated tokens are only valid for 15min, which I'm pretty sure can't work with a static connection string. The best I can think of is to extend the Pool API to have a closure that generates the connection string, maybe for every connection or just if the connection attempt fails with a bad password.

Some code for generating such a token can be found in the comments for
rusoto/rusoto#1733

But there's some async calls in there (wrapped in block_on), so maybe a connection string generating closure should return a future instead of the string.

Metadata

Metadata

Assignees

No one assigned

    Labels

    E-easylow priorityThis issue exists to acknowledge a proposal but isn't being worked onproposal

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions