grants gives - Search results in mailing lists

2025-06-02 22:06:07 | ABI Compliance Checker GSoC Project (David E. Wheeler)

give him a warm welcome! Best, David PS: If one of you fine people can grant

2025-04-01 02:29:05 | Re: SQLFunctionCache and generic plans (Tom Lane)

grant select on test_t to regress_rls_alice; +create policy p1 on rls_t for select to regress_rls_alice + using (c = current_setting('rls_test.blah')); + +-- Function changes row_security setting

2025-03-26 02:45:16 | Re: Adding skip scan (including MDAM style range skip scan) to nbtree (Peter Geoghegan)

giving up on that advantage. It's very difficult to actually see any benefit that can be tied to that theoretical advantage for pstate.firstmatch, though. What I actually see when I run my range

2025-03-14 20:39:30 | More Perl cleanups (Dagfinn Ilmari Mannsåker)

Give coverage for manually compressed blobs.toc files during # restore. compress_cmd => { - program => $ENV{'ZSTD'}, + program => $ENV{ZSTD}, args => [ '-z', '-f', '--rm', "$tempdir/compression_zstd_dir/blobs_*.toc", @@ -295,7 +295,7 @@ my %pgdump_runs = ( ], # Decompress the generated file

2025-03-07 23:19:29 | Re: Allow database owners to CREATE EVENT TRIGGER (Tom Lane)

gives DB owners such privileges is going to fail. I realize that some other DBMSes assign more privileges to schema or DB owners, but we don't and I don't think we're open

2025-03-07 17:54:28 | Re: [PATCH] New predefined role pg_manage_extensions (Jelte Fennema-Nio)

gives any database owner the ability to install these more dangerous extensions. While by using pg_manage_extensions you can limit this ability to the cluster administrator. I think that would be hard because there

2024-12-31 04:17:58 | Re: Add the ability to limit the amount of memory that can be allocated to (James Hunter)

grants, if you give each backend a minimal amount of reserved working-memory, you can avoid

2024-12-05 11:47:16 | Re: Proposal: Role Sandboxing for Secure Impersonation (Wolfgang Walther)

give any privileges to the connection pooler / application and I don't want to outsource authentication. Once the role to connect with is unprivileged, all the other problems become obsolete. RESET ROLE is just fine

2024-12-01 19:57:23 | Re: CREATE SCHEMA ... CREATE DOMAIN support (Tom Lane)

give an example showing that you can create two tables with mutually referencing foreign keys, which means they postpone FK constraint creation till the end. There's also this interesting tidbit: "Unqualified object names

2024-11-12 17:59:44 | Re: [PoC] XMLCast (SQL/XML X025) (Robert Haas)

giving you here are strictly hypothetical -- they're just the kind of thing that needs to be sorted out before we can think about committing anything. There's still also the question of desirability

2024-10-01 03:05:06 | Re: [PoC] Federated Authn/z with OAUTHBEARER (Jacob Champion)

granted them the associated scopes, identifying you is all they can do. We agree that /userinfo gives

2024-07-31 13:14:37 | Re: can we mark upper/lower/textlike functions leakproof? (Joe Conway)

grant that it is hand-wavy, but I will give it another try. In my opinion

2024-07-17 21:09:09 | Re: Things I don't like about \du's "Attributes" column (Pavel Luzanov)

give the role additional capabilities, while rolconnlimit and rolvaliduntil rather limit the use of the role. 3. After switching to a role with the SET ROLE command, you can use the capabilities of logical attributes

2024-07-10 05:14:55 | Re: Allow non-superuser to cancel superuser tasks. (Michael Paquier)

granted We check for the contents of the logs 1ms before they are generated, hence failing the lookup check because the test is faster than the backend. Like what we are doing

2024-06-21 02:57:16 | Re: improve predefined roles documentation (David G. Johnston)

granted this role cannot however send signals to a backend owned by a superuser. Remove "however", or put commas around it. I prefer the first option. Do we really need to repeat "even without having