grants gives - Search results in mailing lists
Mailing lists >> pgsql-hackers >> Thread
2025-06-02 22:06:07 | ABI Compliance Checker GSoC Project (David E. Wheeler)
give him a warm welcome! Best, David PS: If one of you fine people can grant
Mailing lists >> pgsql-hackers >> Thread
2025-04-01 02:29:05 | Re: SQLFunctionCache and generic plans (Tom Lane)
grant select on test_t to regress_rls_alice; +create policy p1 on rls_t for select to regress_rls_alice + using (c = current_setting('rls_test.blah')); + +-- Function changes row_security setting
Mailing lists >> pgsql-hackers >> Thread
2025-03-26 02:45:16 | Re: Adding skip scan (including MDAM style range skip scan) to nbtree (Peter Geoghegan)
giving up on that advantage. It's very difficult to actually see any benefit that can be tied to that theoretical advantage for pstate.firstmatch, though. What I actually see when I run my range
Mailing lists >> pgsql-hackers >> Thread
2025-03-14 20:39:30 | More Perl cleanups (Dagfinn Ilmari Mannsåker)
Give coverage for manually compressed blobs.toc files during # restore. compress_cmd => { - program => $ENV{'ZSTD'}, + program => $ENV{ZSTD}, args => [ '-z', '-f', '--rm', "$tempdir/compression_zstd_dir/blobs_*.toc", @@ -295,7 +295,7 @@ my %pgdump_runs = ( ], # Decompress the generated file
Mailing lists >> pgsql-hackers >> Thread
2025-03-07 23:19:29 | Re: Allow database owners to CREATE EVENT TRIGGER (Tom Lane)
gives DB owners such privileges is going to fail. I realize that some other DBMSes assign more privileges to schema or DB owners, but we don't and I don't think we're open
Mailing lists >> pgsql-hackers >> Thread >> Search in thread (2)
2025-03-07 17:54:28 | Re: [PATCH] New predefined role pg_manage_extensions (Jelte Fennema-Nio)
gives any database owner the ability to install these more dangerous extensions. While by using pg_manage_extensions you can limit this ability to the cluster administrator. I think that would be hard because there
Mailing lists >> pgsql-hackers >> Thread
2024-12-31 04:17:58 | Re: Add the ability to limit the amount of memory that can be allocated to (James Hunter)
grants, if you give each backend a minimal amount of reserved working-memory, you can avoid
Mailing lists >> pgsql-hackers >> Thread
2024-12-05 11:47:16 | Re: Proposal: Role Sandboxing for Secure Impersonation (Wolfgang Walther)
give any privileges to the connection pooler / application and I don't want to outsource authentication. Once the role to connect with is unprivileged, all the other problems become obsolete. RESET ROLE is just fine
Mailing lists >> pgsql-hackers >> Thread
2024-12-01 19:57:23 | Re: CREATE SCHEMA ... CREATE DOMAIN support (Tom Lane)
give an example showing that you can create two tables with mutually referencing foreign keys, which means they postpone FK constraint creation till the end. There's also this interesting tidbit: "Unqualified object names
Mailing lists >> pgsql-hackers >> Thread
2024-11-12 17:59:44 | Re: [PoC] XMLCast (SQL/XML X025) (Robert Haas)
giving you here are strictly hypothetical -- they're just the kind of thing that needs to be sorted out before we can think about committing anything. There's still also the question of desirability
Mailing lists >> pgsql-hackers >> Thread >> Search in thread (4)
2024-10-01 03:05:06 | Re: [PoC] Federated Authn/z with OAUTHBEARER (Jacob Champion)
granted them the associated scopes, identifying you is all they can do. We agree that /userinfo gives
Mailing lists >> pgsql-hackers >> Thread
2024-07-31 13:14:37 | Re: can we mark upper/lower/textlike functions leakproof? (Joe Conway)
grant that it is hand-wavy, but I will give it another try. In my opinion
Mailing lists >> pgsql-hackers >> Thread
2024-07-17 21:09:09 | Re: Things I don't like about \du's "Attributes" column (Pavel Luzanov)
give the role additional capabilities, while rolconnlimit and rolvaliduntil rather limit the use of the role. 3. After switching to a role with the SET ROLE command, you can use the capabilities of logical attributes
Mailing lists >> pgsql-hackers >> Thread
2024-07-10 05:14:55 | Re: Allow non-superuser to cancel superuser tasks. (Michael Paquier)
granted We check for the contents of the logs 1ms before they are generated, hence failing the lookup check because the test is faster than the backend. Like what we are doing
Mailing lists >> pgsql-hackers >> Thread
2024-06-21 02:57:16 | Re: improve predefined roles documentation (David G. Johnston)
granted this role cannot however send signals to a backend owned by a superuser. Remove "however", or put commas around it. I prefer the first option. Do we really need to repeat "even without having