Re: ssl tests fail due to TCP port conflict
| От | Tom Lane |
|---|---|
| Тема | Re: ssl tests fail due to TCP port conflict |
| Дата | |
| Msg-id | 914151.1717623435@sss.pgh.pa.us обсуждение исходный текст |
| Ответ на | Re: ssl tests fail due to TCP port conflict (Andrew Dunstan <andrew@dunslane.net>) |
| Ответы |
Re: ssl tests fail due to TCP port conflict
Re: ssl tests fail due to TCP port conflict |
| Список | pgsql-hackers |
Andrew Dunstan <andrew@dunslane.net> writes:
> On 2024-06-05 We 16:00, Alexander Lakhin wrote:
>> That is, psql from the test instance 001_ssltests_34 opened a
>> connection to
>> the test server with the client port 50072 and it made using the port by
>> the server from the test instance 001_ssltests_30 impossible.
> Oh. (kicks self)
D'oh.
> Should we really be allocating ephemeral server ports in the range
> 41952..65535? Maybe we should be looking for an unallocated port
> somewhere below 41952, and above, say, 32767, so we couldn't have a
> client socket collision.
Hmm, are there really any standards about how these port numbers
are used?
I wonder if we don't need to just be prepared to retry the whole
thing a few times. Even if it's true that "clients" shouldn't
choose ports below 41952, we still have a small chance of failure
against a non-Postgres server starting up at the wrong time.
regards, tom lane
В списке pgsql-hackers по дате отправления: