Re: Serverside SNI support in libpq
От | Daniel Gustafsson |
---|---|
Тема | Re: Serverside SNI support in libpq |
Дата | |
Msg-id | F585452A-1F69-4658-A7E8-D1273AC663ED@yesql.se обсуждение исходный текст |
Ответ на | Re: Serverside SNI support in libpq (Andres Freund <andres@anarazel.de>) |
Ответы |
Re: Serverside SNI support in libpq
|
Список | pgsql-hackers |
> On 13 May 2025, at 15:46, Andres Freund <andres@anarazel.de> wrote: > This is not passing CI on windows... > https://cirrus-ci.com/build/4765059278176256 When looking into why the SNI tests failed on Windows I think I found a pre-existing issue that we didn't have tests for, which my patch added tests for and thus broke. The test I added was to check restarting and reloading with ssl passphrase commands (which we do have testcoverage for) with a subsequent connection test to ensure it didn't just work to start the cluster. When ssl_passphrase_command_supports_reload is set to 'off', the cluster should allow connections until a reload has been issued. That works fine except on Windows where our process-model is such that a new connection will re-run the passphrase command, which inevitably fails as it's not configured for reload. The test in my patch exposed this out of (happy) accident, but it can be reproduced in HEAD as well. The attached version modifies the ssl tests to cover this with a connection attempt. If I'm not mistaken though, there should probably be a docs patch to make it clear how this works on Windows. No codechanges on top of the test fix. -- Daniel Gustafsson
Вложения
В списке pgsql-hackers по дате отправления: