diff options
author | Noah Misch | 2014-03-29 04:52:31 +0000 |
---|---|---|
committer | Noah Misch | 2014-03-29 05:19:48 +0000 |
commit | 790709890854ca66083c06aaf1b362615b0a674a (patch) | |
tree | ea8b729b7d87ff8d3877b825da427edf0146100d | |
parent | 8f9f73d1e3b2aa9043c977f21c1f1f6081375083 (diff) |
Document platform-specificity of unix_socket_permissions.
Back-patch to 8.4 (all supported versions).
-rw-r--r-- | doc/src/sgml/config.sgml | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/doc/src/sgml/config.sgml b/doc/src/sgml/config.sgml index 566d872b30d..1f82f3543d0 100644 --- a/doc/src/sgml/config.sgml +++ b/doc/src/sgml/config.sgml @@ -469,6 +469,15 @@ SET ENABLE_SEQSCAN TO OFF; <para> This parameter can only be set at server start. </para> + + <para> + This parameter is irrelevant on systems, notably Solaris as of Solaris + 10, that ignore socket permissions entirely. There, one can achieve a + similar effect by pointing <varname>unix_socket_directories</> to a + directory having search permission limited to the desired audience. + This parameter is also irrelevant on Windows, which does not have + Unix-domain sockets. + </para> </listitem> </varlistentry> |