grants files - Search results in mailing lists

2025-03-06 14:48:36 | Re: Review my steps for rollback to restore point (chandan Kumar)

granted to user postgres to data directory 10. Create the recovery.signal File *touch /var/lib/postgresql/14/main/recovery.signal

2025-02-27 19:46:04 | How to debug: password authentication failed for user (Alexander Farber)

files inbetween COPY ./04-alter-owner.sh . RUN chmod +x ./01-create-database.sh ./04-alter-owner.sh # Drop root privileges USER postgres The 01-create-database.sh script sets the passwords for the users "postgres" and "timeshift_user": #!/bin/sh -eux echo "Creating user

2025-02-13 19:40:48 | Re: libc to libicu via pg_dump/pg_restore? (Adrian Klaver)

GRANTs on the database object? Do: pg_restore -s -f db_name.sql ${PGDATABASE}.out This will create a text version restore of the schema objects in the dump file

2024-12-01 22:34:48 | Connection to 127.0.0.1 refused in a Dockerfile based on postgres:17-alpine3.20 (Alexander Farber)

GRANT USAGE ON SCHEMA public TO words;" psql --username=postgres -c "ALTER USER words PASSWORD 'mypassword';" for L in de en ru fr nl pl; do createdb --username=postgres --owner=words words_$L cd /dict

2024-11-01 09:07:20 | Re: What to do with a PAAS-pg server (Ian Lawrence Barwick)

read_file(), or for non-superusers be granted EXECUTE permission on it. Regards Ian Barwick

2024-10-18 13:11:04 | Permissions for Newly Created User (sreekanta reddy)

granted on those tables. Ideally, the system should provide a hint like "user has insufficient privilege to view schema or table details" when access is restricted. Restricted Visibility: The user should not have access

2024-10-14 14:00:37 | how to use trace_lock_oidmin config correctly (Vijaykumar Jain)

PROFILE -ggdb -Og -g3 -fno-omit-frame-pointer -DLOCK_DEBUG -DBTREE_BUILD_STATS -DWAL_DEBUG CFLAGS_SL = -fPIC LDFLAGS = -Wl,--as-needed -Wl,-rpath,'/opt/postgresql/lib',--enable-new-dtags LDFLAGS_EX = LDFLAGS_SL = LIBS = -lpgcommon -lpgport

2024-09-13 00:11:26 | Re: Backward compat issue with v16 around ROLEs (Robert Haas)

grant pg_write_server_files to dd_user; At this point, dd_user should easily

2024-08-30 07:28:38 | PgBackRest full backup first time : Verification (KK CHN)

files PgBackRest will backup to RepoServer when performing backup using PgBackRest. ( Because of a limited infr ( N/W bandwidth 8Mbps between DB Server and RepoServer) . 1. I am not sure the pgbackrest command finished output message

2024-07-09 03:35:33 | RE: [EXTERNAL] Re: SSPI Feature Request (Buoro, John)

file attached which is located under \src\backend\libpq\ from source version 16.3.2 I've checked 17 beta 2 and it would easily be able to be inserted in there too. The changes

2024-07-08 21:23:18 | Re: v16 roles, SET FALSE, INHERIT FALSE, ADMIN FALSE (Pavel Luzanov)

file_name | line_number | type | database | user_name | address | netmask | auth_method | options | error -------------+-------------------------------------+-------------+-------+----------+------------+---------+---------+-------------+---------+------- 1 | /etc/postgresql/16/main/pg_hba.conf | 118 | local | {all} | {postgres} | | | trust | | 2 | /etc/postgresql/16/main/pg_hba.conf | 121 | local | {all} | {+bob} | | | trust | | 3 | /etc/postgresql/16/main/pg_hba.conf | 122 | local | {all} | {alice} | | | reject

2024-03-21 07:10:06 | Slow GRANT ROLE on PostgreSQL 16 with thousands of ROLEs (alex work)

GRANT ROLE` we start a VM running Debian 11, and create a lot of roles. create special `acc` role and write to some file

2024-02-28 04:22:53 | Re: Aligning grants and privileges (veem v)

On Wed, 28 Feb, 2024, 2:14 am Adrian Klaver, wrote: Thank you so

2024-01-29 23:15:06 | Re: Monitoring logical replication (Klaus Darilion)

FILE__); require_once('logging.php'); $dbuser="replication_lag_user"; $dbpass="XXXXXXXXXXXXXXXXXXXX"; if (!$dbconn = pg_pconnect('host='.$config_int['dbhost'].' dbname='.$config_int['dbname'].' user='.$dbuser.' password='.$dbpass)) { print "Sorry, database connection failed"; exit; } $accuracy

2023-05-30 17:04:20 | File-Access functions by default not executable by predefined role "pg_read_server_files" (Carsten Klein)

files *outside* the cluster directory and the "log_directory", a user must be a superuser OR must be granted