Re: ssl passphrase callback
От | Andrew Dunstan |
---|---|
Тема | Re: ssl passphrase callback |
Дата | |
Msg-id | CAA8=A7-MrFYoSZSZHUQO_6Tj8cj80z_DwcyCraD1VEKkTPUCTw@mail.gmail.com обсуждение исходный текст |
Ответ на | Re: ssl passphrase callback (Andrew Dunstan <andrew.dunstan@2ndquadrant.com>) |
Ответы |
Re: ssl passphrase callback
|
Список | pgsql-hackers |
On Wed, Feb 19, 2020 at 7:10 AM Andrew Dunstan <andrew.dunstan@2ndquadrant.com> wrote: > > On Tue, Feb 18, 2020 at 2:01 PM Thomas Munro <thomas.munro@gmail.com> wrote: > > > > On Wed, Jan 22, 2020 at 8:02 PM Andrew Dunstan > > <andrew.dunstan@2ndquadrant.com> wrote: > > > Not sure if the placement is what you want, but maybe something like this? > > > > Hi Andrew, FYI this failed here: > > > > t/001_testfunc.pl .. Bailout called. Further testing stopped: pg_ctl > > start failed > > FAILED--Further testing stopped: pg_ctl start failed > > Makefile:23: recipe for target 'prove-check' failed > > > > Unfortunately my robot is poorly trained and does not dump any of the > > interesting logs for this case, but it looks like it's failing that > > way every time. > > > > https://travis-ci.org/postgresql-cfbot/postgresql/builds/651756191 > > > Thanks for letting me know, I will investigate. > This should fix the issue, it happened when I switched to using a pre-generated cert/key. cheers andrew -- Andrew Dunstan https://www.2ndQuadrant.com PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services
Вложения
В списке pgsql-hackers по дате отправления: