Hi Matt,

Can you share the script to simulate the issue? We may also need to improve
password exec command logging.

On Sun, Oct 12, 2025 at 2:35 AM Matt Warren <[email protected]> wrote:

> Hello pgadmin-support
> Long-time user, first time emailing.
>
> I’m trying to use the Password exec feature to fetch a secret from AWS
> Secrets Manager. I’ve created both a python script and then a sh script and
> neither work. Oddly *nothing* about password exec is reported in logs. I
> just get the error below.
>
> pgAdmin 4 v 9.7 as desktop app
> python 3.13.7
> macOS 15.7.1
>
> Things I’ve tried:
>
>
>    - Executing either script from the command line works as expected and
>    returns just the password string.
>    - scripts have chmod +x for all users.
>    - I’ve provided the full path to script in the Password exec entry
>    - Tried quoting and escaping command line.
>    - The shell script uses aws cli and full path is provided in script.
>    - Moved the script to the ~/Library/Application Support/pgAdmin 4 in
>    case macOS disk access issues were in play.
>
>
> Error:
>
> connection failed: connection to server at “10.x.x.x", port 5432 failed:
> could not initiate GSSAPI security context: Unspecified GSS failure. Minor
> code may provide more information: Cannot find KDC for realm "
> KERBEROS.MICROSOFTONLINE.COM"
> connection to server at “10.x.x.x", port 5432 failed: fe_sendauth: no
> password supplied
>
> From what I can parse of source code, I don’t think the
> ENABLE_SERVER_PASS_EXEC_CMD comes into play as I’m not operating in server
> mode.
>
> Does anyone have examples of a config that works?
> Any advice on how I can debug further?
>
> Thanks for any pointers!
>


-- 
Thanks,
Aditya Toshniwal
pgAdmin Hacker | Sr. Staff SDE II | *enterprisedb.com*
<https://www.enterprisedb.com/>
"Don't Complain about Heat, Plant a TREE"

Reply via email to