Re: Exposure related to GUC value of ssl_passphrase_command - Mailing list pgsql-hackers

From Fujii Masao
Subject Re: Exposure related to GUC value of ssl_passphrase_command
Date
Msg-id c890bc87-f6ef-5f85-7a77-9e69bb85e622@oss.nttdata.com
Whole thread Raw
In response to Re: Exposure related to GUC value of ssl_passphrase_command  (keisuke kuroda <keisuke.kuroda.3862@gmail.com>)
List pgsql-hackers

On 2020/03/06 16:20, keisuke kuroda wrote:
> The following review has been posted through the commitfest application:
> make installcheck-world:  tested, passed
> Implements feature:       tested, passed
> Spec compliant:           tested, passed
> Documentation:            not tested
> 
> I tested the patch on the master branch (addd034) and it works fine.
> 
> I think that test case which non-superuser can't see this parameter is unnecessary.
> There is a similar test for pg_read_all_settings role.
> 
> The new status of this patch is: Ready for Committer

Pushed! Thanks!

Regards,


-- 
Fujii Masao
NTT DATA CORPORATION
Advanced Platform Technology Group
Research and Development Headquarters



pgsql-hackers by date:

Previous
From: Fujii Masao
Date:
Subject: Re: Exposure related to GUC value of ssl_passphrase_command
Next
From: movead li
Date:
Subject: Re: Asynchronous Append on postgres_fdw nodes.