- May 16, 2015
-
-
Tom Lane authored
I don't think "respectfully" is what was meant here ...
-
- May 09, 2015
-
-
Stephen Frost authored
As discussed, the default setting of include_realm=0 can be dangerous in multi-realm environments because it is then impossible to differentiate users with the same username but who are from two different realms. Recommend include_realm=1 and note that the default setting may change in a future version of PostgreSQL and therefore users may wish to explicitly set include_realm to avoid issues while upgrading.
-
- Feb 17, 2015
-
-
Tom Lane authored
In investigating yesterday's crash report from Hugo Osvaldo Barrera, I only looked back as far as commit f3aec2c7 where the breakage occurred (which is why I thought the IPv4-in-IPv6 business was undocumented). But actually the logic dates back to commit 3c9bb888 and was simply broken by erroneous refactoring in the later commit. A bit of archives excavation shows that we added the whole business in response to a report that some 2003-era Linux kernels would report IPv4 connections as having IPv4-in-IPv6 addresses. The fact that we've had no complaints since 9.0 seems to be sufficient confirmation that no modern kernels do that, so let's just rip it all out rather than trying to fix it. Do this in the back branches too, thus essentially deciding that our effective behavior since 9.0 is correct. If there are any platforms on which the kernel reports IPv4-in-IPv6 addresses as such, yesterday's fix would have made for a subtle and potentially security-sensitive change in the effective meaning of IPv4 pg_hba.conf entries, which does not seem like a good thing to do in minor releases. So let's let the post-9.0 behavior stand, and change the documentation to match it. In passing, I failed to resist the temptation to wordsmith the description of pg_hba.conf IPv4 and IPv6 address entries a bit. A lot of this text hasn't been touched since we were IPv4-only.
-
- Dec 30, 2012
-
-
Peter Eisentraut authored
Parts of the description had claimed incorrect pg_hba.conf option names for LDAP authentication. Albe Laurenz
-
- May 15, 2012
-
-
Peter Eisentraut authored
pgindent and perltidy should clean up the rest.
-
- Nov 03, 2011
-
-
Andrew Dunstan authored
Document that this rule applies to 'samerole' as well as to named roles. Per gripe from Tom Lane.
-
Andrew Dunstan authored
This makes it possible to use reject lines with group roles. Andrew Dunstan, reviewd by Robert Haas.
-
- Nov 01, 2011
-
-
Magnus Hagander authored
-
- Jun 27, 2011
-
-
Robert Haas authored
As noted by Christian Ullrich.
-
- Jun 14, 2011
-
-
Bruce Momjian authored
"must".
-
- May 31, 2011
-
-
Tom Lane authored
It turns out the reason we hadn't found out about the portability issues with our credential-control-message code is that almost no modern platforms use that code at all; the ones that used to need it now offer getpeereid(), which we choose first. The last holdout was NetBSD, and they added getpeereid() as of 5.0. So far as I can tell, the only live platform on which that code was being exercised was Debian/kFreeBSD, ie, FreeBSD kernel with Linux userland --- since glibc doesn't provide getpeereid(), we fell back to the control message code. However, the FreeBSD kernel provides a LOCAL_PEERCRED socket parameter that's functionally equivalent to Linux's SO_PEERCRED. That is both much simpler to use than control messages, and superior because it doesn't require receiving a message from the other end at just the right time. Therefore, add code to use LOCAL_PEERCRED when necessary, and rip out all the credential-control-message code in the backend. (libpq still has such code so that it can still talk to pre-9.1 servers ... but eventually we can get rid of it there too.) Clean up related autoconf probes, too. This means that libpq's requirepeer parameter now works on exactly the same platforms where the backend supports peer authentication, so adjust the documentation accordingly.
-
- May 02, 2011
-
-
Alvaro Herrera authored
Greg Smith
-
- Mar 19, 2011
-
-
Magnus Hagander authored
This removes an overloading of two authentication options where one is very secure (peer) and one is often insecure (ident). Peer is also the name used in libpq from 9.1 to specify the same type of authentication. Also make initdb select peer for local connections when ident is chosen, and ident for TCP connections when peer is chosen. ident keyword in pg_hba.conf is still accepted and maps to peer authentication.
-
Bruce Momjian authored
-
- Mar 18, 2011
-
-
Bruce Momjian authored
-
- Feb 07, 2011
-
-
Bruce Momjian authored
-
- Feb 01, 2011
-
-
Bruce Momjian authored
-
- Jan 29, 2011
-
-
Bruce Momjian authored
capitalization.
-
- Oct 24, 2010
-
-
Peter Eisentraut authored
A name starting with a dot can be used to match a suffix of the actual host name (e.g., .example.com matches foo.example.com).
-
- Oct 18, 2010
-
-
Peter Eisentraut authored
-
- Oct 15, 2010
-
-
Peter Eisentraut authored
Peter Eisentraut, reviewed by KaiGai Kohei and Tom Lane
-
- Sep 20, 2010
-
-
Magnus Hagander authored
-
- Aug 17, 2010
-
-
Peter Eisentraut authored
-
- Jul 29, 2010
-
-
Peter Eisentraut authored
Block elements with verbatim formatting (literallayout, programlisting, screen, synopsis) should be aligned at column 0 independent of the surrounding SGML, because whitespace is significant, and indenting them creates erratic whitespace in the output. The CSS stylesheets already take care of indenting the output. Assorted markup improvements to go along with it.
-
- Jun 30, 2010
-
-
Bruce Momjian authored
between words).
-
- May 27, 2010
-
-
Tom Lane authored
chains, do assorted wordsmithing.
-
- Apr 21, 2010
-
-
Tom Lane authored
with database = replication. The previous coding would allow them to match ordinary records too, but that seems like a recipe for security breaches. Improve the messages associated with no-such-pg_hba.conf entry to report replication connections as such, since that's now a critical aspect of whether the connection matches. Make some cursory improvements in the related documentation, too.
-
- Apr 03, 2010
-
-
Peter Eisentraut authored
The endterm attribute is mainly useful when the toolchain does not support automatic link target text generation for a particular situation. In the past, this was required by the man page tools for all reference page links, but that is no longer the case, and it now actually gets in the way of proper automatic link text generation. The only remaining use cases are currently xrefs to refsects.
-
- Mar 31, 2010
-
-
Heikki Linnakangas authored
"replication" are quoted in pg_hba.conf, they lose their special meaning.
-
- Mar 17, 2010
-
-
Peter Eisentraut authored
-
- Feb 20, 2010
-
-
Bruce Momjian authored
doc change.
-
Bruce Momjian authored
GSSAPI or Kerberos. Ian Turner
-
- Feb 03, 2010
-
-
Bruce Momjian authored
-
- Feb 02, 2010
-
-
Magnus Hagander authored
the server. Gets rid of a fairly ugly hack for Solaris, and also provides hostname and IPV6 support.
-
- Jan 27, 2010
-
-
Magnus Hagander authored
Noted by Thom Brown.
-
Magnus Hagander authored
-
- Jan 26, 2010
-
-
Peter Eisentraut authored
to make it easier to use with tabs.
-
- Jan 15, 2010
-
-
Heikki Linnakangas authored
This includes two new kinds of postmaster processes, walsenders and walreceiver. Walreceiver is responsible for connecting to the primary server and streaming WAL to disk, while walsender runs in the primary server and streams WAL from disk to the client. Documentation still needs work, but the basics are there. We will probably pull the replication section to a new chapter later on, as well as the sections describing file-based replication. But let's do that as a separate patch, so that it's easier to see what has been added/changed. This patch also adds a new section to the chapter about FE/BE protocol, documenting the protocol used by walsender/walreceivxer. Bump catalog version because of two new functions, pg_last_xlog_receive_location() and pg_last_xlog_replay_location(), for monitoring the progress of replication. Fujii Masao, with additional hacking by me
-
- Dec 12, 2009
-
-
Magnus Hagander authored
does a search for the user in the directory first, and then binds with the DN found for this user. This allows for LDAP logins in scenarios where the DN of the user cannot be determined simply by prefix and suffix, such as the case where different users are located in different containers. The old way of authentication can be significantly faster, so it's kept as an option. Robert Fleming and Magnus Hagander
-
- Oct 01, 2009
-
-
Tom Lane authored
by enumerating the machine's IP interfaces to look for a match. Stef Walter
-