Re: Psql meta-command conninfo+ - Mailing list pgsql-hackers

From Nathan Bossart
Subject Re: Psql meta-command conninfo+
Date
Msg-id 20240206210605.GA3903769@nathanxps13
Whole thread Raw
In response to RE: Psql meta-command conninfo+  (Maiquel Grassi <grassi@hotmail.com.br>)
Responses Re: Psql meta-command conninfo+
RE: Psql meta-command conninfo+
List pgsql-hackers
On Tue, Feb 06, 2024 at 08:52:09PM +0000, Maiquel Grassi wrote:
> I made the adjustment in the code and updated the patch. I believe this
> is the format suggested by you all. Would this be it?

I was thinking something more like

  SELECT pg_catalog.current_database() AS "Database",
         current_user AS "User",
         pg_catalog.current_setting('server_version') AS "Server Version",
         pg_catalog.inet_server_addr() AS "Server Address",
         pg_catalog.current_setting('port') AS "Port",
         pg_catalog.inet_client_addr() AS "Client Address",
         pg_catalog.inet_client_port() AS "Client Port",
         pg_catalog.pg_backend_pid() AS "Session PID";

-- 
Nathan Bossart
Amazon Web Services: https://aws.amazon.com



pgsql-hackers by date:

Previous
From: Nathan Bossart
Date:
Subject: Re: glibc qsort() vulnerability
Next
From: Nathan Bossart
Date:
Subject: Re: Psql meta-command conninfo+