From c1932ec9e864d475b1debbcf26ba77c88dc163d0 Mon Sep 17 00:00:00 2001 From: Noah Misch <noah@leadboat.com> Date: Sat, 29 Mar 2014 00:52:31 -0400 Subject: [PATCH] Document platform-specificity of unix_socket_permissions. Back-patch to 8.4 (all supported versions). --- doc/src/sgml/config.sgml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/doc/src/sgml/config.sgml b/doc/src/sgml/config.sgml index d11fa29cef9..b45a4d8f308 100644 --- a/doc/src/sgml/config.sgml +++ b/doc/src/sgml/config.sgml @@ -543,7 +543,11 @@ SET ENABLE_SEQSCAN TO OFF; </para> <para> - This parameter is irrelevant on Windows, which does not have + This parameter is irrelevant on systems, notably Solaris as of Solaris + 10, that ignore socket permissions entirely. There, one can achieve a + similar effect by pointing <varname>unix_socket_directories</> to a + directory having search permission limited to the desired audience. + This parameter is also irrelevant on Windows, which does not have Unix-domain sockets. </para> </listitem> -- GitLab