Re: Exposure related to GUC value of ssl_passphrase_command

From: Fujii Masao <masao(dot)fujii(at)oss(dot)nttdata(dot)com>
To: keisuke kuroda <keisuke(dot)kuroda(dot)3862(at)gmail(dot)com>, pgsql-hackers(at)lists(dot)postgresql(dot)org
Cc: Insung Moon <tsukiwamoon(dot)pgsql(at)gmail(dot)com>
Subject: Re: Exposure related to GUC value of ssl_passphrase_command
Date: 2020-03-09 02:43:52
Message-ID: c890bc87-f6ef-5f85-7a77-9e69bb85e622@oss.nttdata.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 2020/03/06 16:20, keisuke kuroda wrote:
> The following review has been posted through the commitfest application:
> make installcheck-world: tested, passed
> Implements feature: tested, passed
> Spec compliant: tested, passed
> Documentation: not tested
>
> I tested the patch on the master branch (addd034) and it works fine.
>
> I think that test case which non-superuser can't see this parameter is unnecessary.
> There is a similar test for pg_read_all_settings role.
>
> The new status of this patch is: Ready for Committer

Pushed! Thanks!

Regards,

--
Fujii Masao
NTT DATA CORPORATION
Advanced Platform Technology Group
Research and Development Headquarters

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message movead li 2020-03-09 03:03:14 Re: Asynchronous Append on postgres_fdw nodes.
Previous Message Fujii Masao 2020-03-09 02:43:20 Re: Exposure related to GUC value of ssl_passphrase_command