Contrary to what the submitted documentation claims, there is no
permission checking done on the CHECKPOINT command. Should there be?
Btw., is there any normal usage application of this command? This relates
to the previous paragraph somewhat.
--
Peter Eisentraut peter_e@gmx.net http://yi.org/peter-e/