Re: Support for NSS as a libpq TLS backend
От | Jacob Champion |
---|---|
Тема | Re: Support for NSS as a libpq TLS backend |
Дата | |
Msg-id | 52e7abae603468e7d7b58f9a3802ad0cc98a1a8e.camel@vmware.com обсуждение исходный текст |
Ответ на | Re: Support for NSS as a libpq TLS backend (Daniel Gustafsson <daniel@yesql.se>) |
Ответы |
Re: Support for NSS as a libpq TLS backend
|
Список | pgsql-hackers |
On Wed, 2022-01-19 at 10:01 +0100, Daniel Gustafsson wrote: > > On 18 Jan 2022, at 17:37, Jacob Champion <pchampion@vmware.com> wrote: > > > > On Wed, 2021-12-15 at 23:10 +0100, Daniel Gustafsson wrote: > > > I've attached a v50 which fixes the issues found by Joshua upthread, as well as > > > rebases on top of all the recent SSL and pgcrypto changes. > > > > I'm currently tracking down a slot leak. When opening and closing large > > numbers of NSS databases, at some point we appear to run out of slots > > and then NSS starts misbehaving, even though we've closed all of our > > context handles. > > Interesting, are you able to share a reproducer for this so I can assist in > debugging it? (This was in my spam folder, sorry for the delay...) Let me see if I can minimize my current reproduction case and get it ported out of Python. --Jacob
В списке pgsql-hackers по дате отправления: