=== Applying patches on top of PostgreSQL commit ID 53a49365052026907afff7613929710d1e7f0da0 === /etc/rc.d/jail: WARNING: Per-jail configuration via jail_* variables is obsolete. Please consider migrating to /etc/jail.conf. Fri Jan 31 20:39:25 UTC 2025 On branch cf/5088 nothing to commit, working tree clean === applying patch ./v1-0001-docs-improve-hostssl-related-descriptions-and-option.patch Applied patch to 'doc/src/sgml/client-auth.sgml' with conflicts. Applied patch to 'doc/src/sgml/runtime.sgml' cleanly. U doc/src/sgml/client-auth.sgml diff --cc doc/src/sgml/client-auth.sgml index 782b49c85a,638c8e7057..0000000000 --- a/doc/src/sgml/client-auth.sgml +++ b/doc/src/sgml/client-auth.sgml @@@ -673,41 -666,10 +675,48 @@@ include_dir direct ++<<<<<<< ours + In addition to the method-specific options listed below, there is a + method-independent authentication option clientcert, which + can be specified in any hostssl record. + This option can be set to verify-ca or + verify-full. Both options require the client + to present a valid (trusted) SSL certificate, while + verify-full additionally enforces that the + cn (Common Name) in the certificate matches + the username or an applicable mapping. + This behavior is similar to the cert authentication + method (see ) but enables pairing + the verification of client certificates with any authentication + method that supports hostssl entries. + + + On any record using client certificate authentication (i.e. one + using the cert authentication method or one + using the clientcert option), you can specify + which part of the client certificate credentials to match using + the clientname option. This option can have one + of two values. If you specify clientname=CN, which + is the default, the username is matched against the certificate's + Common Name (CN). If instead you specify + clientname=DN the username is matched against the + entire Distinguished Name (DN) of the certificate. + This option is probably best used in conjunction with a username map. + The comparison is done with the DN in + RFC 2253 + format. To see the DN of a client certificate + in this format, do + +openssl x509 -in myclient.crt -noout -subject -nameopt RFC2253 | sed "s/^subject=//" + + Care needs to be taken when using this option, especially when using + regular expression matching against the DN. ++======= + The hostssl connection type, in addition to allowing any + authentication-method-specific options, allows the + auth-options detailed in for + the cert authentication method. ++>>>>>>> theirs