Re: Exposure related to GUC value of ssl_passphrase_command - Mailing list pgsql-hackers

From keisuke kuroda
Subject Re: Exposure related to GUC value of ssl_passphrase_command
Date
Msg-id 158347922142.14910.17065549911913777013.pgcf@coridan.postgresql.org
Whole thread Raw
In response to Re: Exposure related to GUC value of ssl_passphrase_command  ("Moon, Insung" <tsukiwamoon.pgsql@gmail.com>)
Responses Re: Exposure related to GUC value of ssl_passphrase_command  (Fujii Masao <masao.fujii@oss.nttdata.com>)
List pgsql-hackers
The following review has been posted through the commitfest application:
make installcheck-world:  tested, passed
Implements feature:       tested, passed
Spec compliant:           tested, passed
Documentation:            not tested

I tested the patch on the master branch (addd034) and it works fine.

I think that test case which non-superuser can't see this parameter is unnecessary. 
There is a similar test for pg_read_all_settings role.

The new status of this patch is: Ready for Committer

pgsql-hackers by date:

Previous
From: "曾文旌(义从)"
Date:
Subject: Re: [Proposal] Global temporary tables
Next
From: Michael Paquier
Date:
Subject: More tests to stress directly checksum_impl.h