Re: ssl passphrase callback - Mailing list pgsql-hackers

From Andrew Dunstan
Subject Re: ssl passphrase callback
Date
Msg-id CAA8=A79a9D885mAFqU7G8OOc+BsrKEy7bFbRXYmVT150YbXSkg@mail.gmail.com
Whole thread Raw
In response to Re: ssl passphrase callback  (Thomas Munro <thomas.munro@gmail.com>)
Responses Re: ssl passphrase callback  (Andrew Dunstan <andrew.dunstan@2ndquadrant.com>)
List pgsql-hackers
On Tue, Feb 18, 2020 at 2:01 PM Thomas Munro <thomas.munro@gmail.com> wrote:
>
> On Wed, Jan 22, 2020 at 8:02 PM Andrew Dunstan
> <andrew.dunstan@2ndquadrant.com> wrote:
> > Not sure if the placement is what you want, but maybe something like this?
>
> Hi Andrew, FYI this failed here:
>
> t/001_testfunc.pl .. Bailout called. Further testing stopped: pg_ctl
> start failed
> FAILED--Further testing stopped: pg_ctl start failed
> Makefile:23: recipe for target 'prove-check' failed
>
> Unfortunately my robot is poorly trained and does not dump any of the
> interesting logs for this case, but it looks like it's failing that
> way every time.
>
> https://travis-ci.org/postgresql-cfbot/postgresql/builds/651756191


Thanks for letting me know, I will investigate.

cheers

andrew


-- 
Andrew Dunstan                https://www.2ndQuadrant.com
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services



pgsql-hackers by date:

Previous
From: David Zhang
Date:
Subject: Re: First WAL segment file that initdb creates
Next
From: Thomas Munro
Date:
Subject: Re: Delaying/avoiding BTreeTupleGetNAtts() call within _bt_compare()