Document platform-specificity of unix_socket_permissions.
authorNoah Misch <noah@leadboat.com>
Sat, 29 Mar 2014 04:52:31 +0000 (00:52 -0400)
committerNoah Misch <noah@leadboat.com>
Sat, 29 Mar 2014 05:19:48 +0000 (01:19 -0400)
Back-patch to 8.4 (all supported versions).

doc/src/sgml/config.sgml

index 566d872b30d05afc2799ef803b7aefa01a7d27b6..1f82f3543d0792c82fcc83303c53094d1a8e0703 100644 (file)
@@ -469,6 +469,15 @@ SET ENABLE_SEQSCAN TO OFF;
        <para>
         This parameter can only be set at server start.
        </para>
+
+       <para>
+        This parameter is irrelevant on systems, notably Solaris as of Solaris
+        10, that ignore socket permissions entirely.  There, one can achieve a
+        similar effect by pointing <varname>unix_socket_directories</> to a
+        directory having search permission limited to the desired audience.
+        This parameter is also irrelevant on Windows, which does not have
+        Unix-domain sockets.
+       </para>
       </listitem>
      </varlistentry>