I'm working with these guys to resolve the immediate issue, but I
suspect there's a race condition somewhere in the code.
What's happened is that OIDs have been changed in the system. There's
not a lot of table DDL that happens, but there is a substantial
amount of view DDL that can take pl
Marko Kreen wrote:
On 6/5/07, Brian Mathis <[EMAIL PROTECTED]> wrote:
pgcrypto also supports md5, so I'm not sure what you're referring to
here.
digest(psw, 'md5') vs. crypt(psw, gen_salt('md5'))
As I already mentioned, *salting* before you hash is a very
important step. I'm not sure if you
I grabbed the May 10th dev snapshot of pgAdmin3, first a little bit of praise
to the pgAdmin3 team for allowing me to run both pgAdmin3 1.7 and 1.6.2 side by
side.
However what is the debug plugin API? I looked around in postgresql/contrib,
and PostgreSQL.org. I'm assuming this plugin is someth
On Monday 04 June 2007 04:53, Richard Huxton wrote:
> John Gardner wrote:
> > I've been testing one of our apps on PostgreSQL for the last few months
> > and I'm about ready to put it on the production server, but I need
> > advice on where to locate the tablespace. I've been so concerned
> > gett
On Tue, 2007-06-05 at 23:40 +0200, Vincenzo Romano wrote:
> Hi all.
> I need to run both 8.1 and 8.2 at the same time in order to check
> everything in 8.2 *before* shutting 8.1 down.
> I need to run both as I only have one machine available.
> I'm using a debian derivateive (Kubuntu) that provides
Vincenzo Romano wrote:
Hi all.
I need to run both 8.1 and 8.2 at the same time in order to check
everything in 8.2 *before* shutting 8.1 down.
I need to run both as I only have one machine available.
I'm using a debian derivateive (Kubuntu) that provides a nice pg_wrapper
mechanism to direct conn
Hi all.
I need to run both 8.1 and 8.2 at the same time in order to check
everything in 8.2 *before* shutting 8.1 down.
I need to run both as I only have one machine available.
I'm using a debian derivateive (Kubuntu) that provides a nice pg_wrapper
mechanism to direct connections for tools to eith
On Tue, Jun 05, 2007 at 07:29:02PM +0100, Peter Childs wrote:
> Unfortunately you still need to store them somewhere, and all systems can
> be hacked.
Yes. I agree, in principle, that "don't store them" is the best
advice -- this is standard _Translucent Databases_ advice, too. For
the least-
> --- Original Message ---
> From: "Pavel Stehule" <[EMAIL PROTECTED]>
> To: "David Gardner" <[EMAIL PROTECTED]>
> Sent: 05/06/07, 21:01:49
> Subject: Re: pl/pgsql debuging, was Re: [GENERAL] debugging C functions
>
> 2007/6/5, David Gardner <[EMAIL PROTECTED]>:
> > This post got me thin
>-Original Message-
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED] On Behalf Of Marko Kreen
>Sent: dinsdag 5 juni 2007 21:38
>To: Peter Childs
>Cc: pgsql-general@postgresql.org
>Subject: Re: Creditcard Number Security was Re: [GENERAL]
>Encrypted column
>
>On 6/5/07, Peter Childs <[E
On Jun 5, 7:39 pm, [EMAIL PROTECTED] (Ragnar) wrote:
>
> create an aggregate function and use that in your
> select.http://www.postgresql.org/docs/8.2/static/sql-createaggregate.html
Of course you could do that. And it would look like that:
CREATE OR REPLACE FUNCTION f_concat_comma(text, text)
Oh my, it took me a ton of text to finally come up with a better idea.
5.) The Sun King solution
"L'etat c'est moi!". The model is as simple as can be:
CREATE TABLE nation
(
nation_id SERIAL PRIMARY KEY
);
CREATE TABLE man
(
man_id SERIAL PRIMARY KEY,
nation_id INTEGER NOT NULL REFERENCE
2007/6/5, David Gardner <[EMAIL PROTECTED]>:
This post got me thinking, is there a similar procedure for PL/pgSQL functions?
No. You can debug PL/pgSQL function via debug plugin API. Currently
exists only one debugger, which can do it - Enterprisedb debugger.
Regards
Pavel Stehule
--
On 6/5/07, Peter Childs <[EMAIL PROTECTED]> wrote:
On 05/06/07, Andrew Sullivan <[EMAIL PROTECTED]> wrote:
> On Tue, Jun 05, 2007 at 09:28:00AM -0500, Ron Johnson wrote:
> >
> > If he is a CC customer, the system (which I am DBA of) bills his
> > card directly, saving the customer much time and e
This post got me thinking, is there a similar procedure for PL/pgSQL functions?
---
David Gardner, IT
The Yucaipa Companies
(310) 228-2855
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joe Conway
Sent: Friday, June 01, 2007 9:00 PM
To: Islam Hegazy
Cc:
On 05/06/07, Andrew Sullivan <[EMAIL PROTECTED]> wrote:
On Tue, Jun 05, 2007 at 09:28:00AM -0500, Ron Johnson wrote:
>
> If he is a CC customer, the system (which I am DBA of) bills his
> card directly, saving the customer much time and effort.
So surely what you have is a completely separate s
On þri, 2007-06-05 at 19:33 +0300, veejar wrote:
> Hello!
>
> I have such field in my table:
>
> field1
> ---
> 1
> 2
> 3
> 4
> 5
>
>
> I want to get such result from select:
> '1,2,3,4,5' - join all values in field1 with ','
> // result must be varchar.
>
> Help to write SELECT-query f
bytea streaming engine is easy?? kindlt explain how?? how
http://localhost:8080/database/table/bytea_column/id_column=value get
data without select??
sincerely
siva
Original Message
Subject: Re: [GENERAL] lo or bytea streaming engine??
From: Martijn van Oosterhout <[EMAIL PROTEC
On Tue, 2007-06-05 at 19:33 +0300, veejar wrote:
> Hello!
>
> I have such field in my table:
>
> field1
> ---
> 1
> 2
> 3
> 4
> 5
>
>
> I want to get such result from select:
> '1,2,3,4,5' - join all values in field1 with ','
> // result must be varchar.
>
Look into writing a simple fu
"Ian Harding" <[EMAIL PROTECTED]> writes:
> I saw that discrepancy, but assumed there was a prepending of "lib"
> somewhere in the search. Turns out that is exactly the problem, and
> changing the tsearch2.sql file to reflect
> $libdir/libtsearch2
> works. I will try to figure out how this happen
On Tue, 5 Jun 2007, Marco Colombo wrote:
AFAIK, files in pg_xlog are first renamed (and only if and after the
archive_command returned true) and later overwritten to. Never deleted.
No, they get deleted sometimes, too. Not often, but it can happen under
heavy load if more segments get tempor
Greg Smith wrote:
On Tue, 5 Jun 2007, Paolo Bizzarri wrote:
On 6/4/07, Scott Marlowe <[EMAIL PROTECTED]> wrote:
http://lwn.net/Articles/215868/
documents a bug in the 2.6 linux kernel that can result in corrupted
files if there are a lot of processes accessing it at once.
in fact, we were us
On Tue, 2007-06-05 at 18:39 +0200, Marco Colombo wrote:
> I'm asking: what _exactly_ can go wrong?
If a checkpoint occurs while taking the backup then the contents of the
files will be overwritten and you will be unable to rollforward from
before the backup until after the backup. This will give y
Simon Riggs wrote:
> Marco Colombo wrote:
my method
...is dangerous
Ok, but why? Once again, I'm asking: what _exactly_ can go wrong?
> so we don't get loads of new DBAs picking up this idea
but missing the exact point of danger.
I'm one of them. I'm _am_ missing the exact point of danger.
On 6/5/07, Brian Mathis <[EMAIL PROTECTED]> wrote:
pgcrypto also supports md5, so I'm not sure what you're referring to
here.
digest(psw, 'md5') vs. crypt(psw, gen_salt('md5'))
As I already mentioned, *salting* before you hash is a very
important step. I'm not sure if you saw that in my post
Hello!
I have such field in my table:
field1
---
1
2
3
4
5
I want to get such result from select:
'1,2,3,4,5' - join all values in field1 with ','
// result must be varchar.
Help to write SELECT-query for this task.
I originally sent this message from my gmail account yesterday as we
were having issues with our work mail servers yesterday, but seeing
that it hasn't made it to the lists yet, I'm resending from my
registered address. You have my apologies if you receive this twice.
"Thomas F. O'Connell"
Marko Kreen schrieb:
On 6/5/07, Tino Wildenhain <[EMAIL PROTECTED]> wrote:
Ranieri Mazili schrieb:
> Hello,
>
> I need to store users and passwords on a table and I want to store it
> encrypted, but I don't found documentation about it, how can I create a
> table with columns "user" and "passwor
On 6/5/07, Martijn van Oosterhout <[EMAIL PROTECTED]> wrote:
On Mon, Jun 04, 2007 at 08:25:22PM -0700, Ian Harding wrote:
> I know this is a question that gets asked a zillion times and is
> almost always pilot error.
I don't know much about this but the complaint is this:
> The usual error abo
On Jun 5, 2007, at 7:28 AM, Ron Johnson wrote:
On 06/05/07 08:59, Alvaro Herrera wrote:
Ron Johnson wrote:
On 06/04/07 17:54, Guy Rouillier wrote:
Many people consider two-way encryption to be insecure; two-way
encryption means you can decrypt a value if you know the key,
and it is insecu
On Tue, Jun 05, 2007 at 08:12:26AM -0700, [EMAIL PROTECTED] wrote:
>
>hello
>any future for lo or bytea streaming engine with security
>like [1]http://pbxt.blogspot.com/2007/06/geting-blob-out-of-database-w
>ith-blob.html
If that page is all there is on it it seems to me to be (a)
On Tue, Jun 05, 2007 at 09:28:00AM -0500, Ron Johnson wrote:
>
> If he is a CC customer, the system (which I am DBA of) bills his
> card directly, saving the customer much time and effort.
So surely what you have is a completely separate system that has
exactly one interface to it, that is signa
On 6/5/07, Marko Kreen <[EMAIL PROTECTED]> wrote:
On 6/5/07, Marko Kreen <[EMAIL PROTECTED]> wrote:
> both md5 and sha1 are actually easier to bruteforce than
> the old DES-based crypt.
If this statement seems weird - the problem is the speed.
MD5 and SHA1 are just faster algorithms than des-cry
helloany future for lo or bytea streaming engine with security like http://pbxt.blogspot.com/2007/06/geting-blob-out-of-database-with-blob.html
many thank youssincerelysiva
On Tue, 2007-06-05 at 17:07 +0200, Marc Compte wrote:
>
> For instance, in the implementation of a N:M relationship, declaring
> the
> primary as (foreign1, foreign2) will create two indexes? or just one?
Just one
--
Oliver Elphick [EMAIL PROTECTED]
Isl
Marc Compte wrote:
Thanks to everyone for the prompt reply :)
Good thing about answers is when they raise up new questiosn, so you
can keep on learning all the time.
This one answer, for instance, brings me another question. Does having
a composite primary mean the system will create an indi
On 6/5/07, Marko Kreen <[EMAIL PROTECTED]> wrote:
both md5 and sha1 are actually easier to bruteforce than
the old DES-based crypt.
If this statement seems weird - the problem is the speed.
MD5 and SHA1 are just faster algorithms than des-crypt.
And there's nothing wrong with fast general-purp
On Thu, 2007-05-31 at 20:27, Teodor Sigaev wrote:
> > I found out that using 'simple' instead of 'default' when using
> > to_tsvector() does excactly that, but I don't know how to change my
> > triggers and indexes to keep doing the same (using 'simple').
>
> Suppose, your database is initializ
Thanks to everyone for the prompt reply :)
Good thing about answers is when they raise up new questiosn, so you can
keep on learning all the time.
This one answer, for instance, brings me another question. Does having a
composite primary mean the system will create an individual index on
eac
On Tue, 5 Jun 2007, Paolo Bizzarri wrote:
On 6/4/07, Scott Marlowe <[EMAIL PROTECTED]> wrote:
http://lwn.net/Articles/215868/
documents a bug in the 2.6 linux kernel that can result in corrupted
files if there are a lot of processes accessing it at once.
in fact, we were using a 2.6.12 kernel
On Jun 5, 2007, at 8:11 , Ranieri Mazili wrote:
CREATE RULE rule_role_sul AS
ON SELECT TO t1 WHERE roles = 'role_sul'
DO INSTEADSELECT field1, field2 FROM t2;
CREATE RULE rule_role_sul AS
ON SELECT TO t1 WHERE roles = 'role_norte'
DO INSTEADSELECT field3, field4 FRO
On 6/5/07, Brian Mathis <[EMAIL PROTECTED]> wrote:
On 6/5/07, Marko Kreen <[EMAIL PROTECTED]> wrote:
> Both md5 and sha1 are bad for passwords, no salt and easy to
> bruteforce - due to the tiny amount of data in passwords.
>
> Proper ways is to use crypt() function from pgcrypto module.
> Due to
On Mon, 2007-06-04 at 17:05 +0200, Steven De Vriendt wrote:
> Hi,
>
> I'm trying to reach my postgres database via a remote connection. Yet
> my connection is refused when I try to do that.
> I'm using Ubuntu Feisty
> Following lines are now in my pg_hba.conf-file:
...
> # Connections for all PCs
On 06/05/07 08:59, Alvaro Herrera wrote:
Ron Johnson wrote:
On 06/04/07 17:54, Guy Rouillier wrote:
Many people consider two-way encryption to be insecure; two-way
encryption means you can decrypt a value if you know the key, and it is
insecure because you usually have to put the key into th
On 6/5/07, Marko Kreen <[EMAIL PROTECTED]> wrote:
On 6/5/07, Tino Wildenhain <[EMAIL PROTECTED]> wrote:
> Ranieri Mazili schrieb:
> > Hello,
> >
> > I need to store users and passwords on a table and I want to store it
> > encrypted, but I don't found documentation about it, how can I create a
>
On 6/5/07, Tino Wildenhain <[EMAIL PROTECTED]> wrote:
Ranieri Mazili schrieb:
> Hello,
>
> I need to store users and passwords on a table and I want to store it
> encrypted, but I don't found documentation about it, how can I create a
> table with columns "user" and "password" with column "passwo
> CREATE RULE rule_role_sul AS
> ON SELECT TO t1 WHERE roles = 'role_sul'
> DO INSTEAD
> SELECT field1, field2 FROM t2;
>
> CREATE RULE rule_role_sul AS
> ON SELECT TO t1 WHERE roles = 'role_norte'
> DO INSTEAD
> SELECT field3, field4 FROM t2;
From: http://www.po
Ron Johnson wrote:
> On 06/04/07 17:54, Guy Rouillier wrote:
> >Many people consider two-way encryption to be insecure; two-way
> >encryption means you can decrypt a value if you know the key, and it is
> >insecure because you usually have to put the key into the source code.
> >That means at l
On Tue, Jun 05, 2007 at 01:46:42PM +0800, Erick Papadakis wrote:
>
>GAME_COUNTS Table (also ~5 million rows of course)
>---
>GAME_ID
>VIEWS_COUNT
>PLAYED_COUNT
>PLAYED_COUNT_UNIQUE
This is a poor normalisation. While views_c
On Jun 5, 8:35 am, [EMAIL PROTECTED] (Gregory Stark) wrote:
> "Erwin Brandstetter" <[EMAIL PROTECTED]> writes:
> > I postulate further that a king only be king of his own people (rules out
> > multiple kingships, too).
>
> That's not how it's worked in the past :)
Yeah i know. :) That's why I had
"Marc Compte" <[EMAIL PROTECTED]> writes:
> Does PostgreSQL create an implicit index also for foreign keys? or must I
> create it explicitly?
It won't allow you to create a foreign key that points to a column without a
unique index on it.
postgres=# create table b (i integer references a(i));
E
On Jun 5, 5:10 am, Lew <[EMAIL PROTECTED]> wrote:
> Erwin Brandstetter wrote:
> > CREATE TABLE king
> > (
> >king_id INTEGER PRIMARY KEY REFERENCES man (man_id) ON UPDATE
> > CASCADE ON DELETE CASCADE,
> >nation_id INTEGER UNIQUE,
> >FOREIGN KEY (man_id, nation_id) REFERENCES man (man_i
am Tue, dem 05.06.2007, um 11:49:20 +0200 mailte Marc Compte folgendes:
> Dear list,
>
> This might be too basic for a question but I just couldn't find the
> answer so far.
>
> Does PostgreSQL create an implicit index also for foreign keys?
No, only for primary keys to enforce the uniqueness.
On 06/04/07 17:54, Guy Rouillier wrote:
Ranieri Mazili wrote:
Hello,
I need to store users and passwords on a table and I want to store it
encrypted, but I don't found documentation about it, how can I create
a table with columns "user" and "password" with column "password"
encrypted and how
Starting the postmaster with a "-i" option did the trick.
/ -i Allows clients to connect via TCP/IP (Internet domain)
connections. Without this
option, only local Unix domain socket connections are
accepted. This option corre-
sponds to setting tcpip_socke
On 06/05/07 00:46, Erick Papadakis wrote:
Hi
Sorry for this somewhat long email but I think it is relevant to most
people who run online databases. I am having trouble optimizing UPDATE
queries on a certain semi-large table that is only growing larger.
I've come across some very interesting thou
> Does PostgreSQL create an implicit index also for foreign keys? or must
> I create it explicitly?
No, you foreign keys are not automatically indexed. They only way they would
be is if the FK is
part of a composite unique or primary key. So you will probably have to create
your one indexes
o
On 6/5/07, Tino Wildenhain <[EMAIL PROTECTED]> wrote:
Ranieri Mazili schrieb:
> Hello,
>
> I need to store users and passwords on a table and I want to store it
> encrypted, but I don't found documentation about it, how can I create a
> table with columns "user" and "password" with column "passwo
On Mon, Jun 04, 2007 at 02:12:00PM -0400, ABHANG RANE wrote:
> Im trying to load data from a file using copy command. At the end of
> the data, I have appended copy statement as
>
> copy tablename(col1, col2) from stdin with delimiter as '\t';
> .\
COPY should go before the data and end-of-data
On Tue, Jun 05, 2007 at 11:49:20AM +0200, Marc Compte wrote:
> Does PostgreSQL create an implicit index also for foreign keys? or must
> I create it explicitly?
PostgreSQL doesn't create an index on the referencing column(s) of
a foreign key constraint; if you want an index then you'll need to
cr
On þri, 2007-06-05 at 11:49 +0200, Marc Compte wrote:
> Does PostgreSQL create an implicit index also for foreign keys?
no
> or must I create it explicitly?
if you want one, yes.
not everyone wants an index on all their foreign keys,
but they can be useful in some circumstances.
gnari
--
Hello,
I need to create a rule, but I need that it have a WHERE clause, how bellow:
CREATE RULE rule_role_sul AS
ON SELECT TO t1 WHERE roles = 'role_sul'
DO INSTEAD
SELECT field1, field2 FROM t2;
CREATE RULE rule_role_sul AS
ON SELECT TO t1 WHERE roles = 'role_norte'
DO IN
On Mon, Jun 04, 2007 at 08:25:22PM -0700, Ian Harding wrote:
> I know this is a question that gets asked a zillion times and is
> almost always pilot error.
I don't know much about this but the complaint is this:
> The usual error about "file does not exist" relative to
> $libdir/tsearch2 gets ge
2007/6/5, Marc Compte <[EMAIL PROTECTED]>:
Dear list,
This might be too basic for a question but I just couldn't find the
answer so far.
Does PostgreSQL create an implicit index also for foreign keys? or must
I create it explicitly?
FK is just a constraint, you wil have to create indexes manu
Simon Riggs wrote:
On Mon, 2007-06-04 at 10:21 -0400, Chander Ganesan wrote:
It's not too hard to put together a "warm standby" synchronous
replication mechanism with overhead that isn't too much more than what
you incur by enabling PITR... Such systems can also have very fast
failover on f
"Erwin Brandstetter" <[EMAIL PROTECTED]> writes:
> I postulate further that a king only be king of his own people (rules out
> multiple kingships, too).
That's not how it's worked in the past :)
If you have a nation table wouldn't you just have a king_id column in that
table which is a foreign
Hi
Sorry for this somewhat long email but I think it is relevant to most
people who run online databases. I am having trouble optimizing UPDATE
queries on a certain semi-large table that is only growing larger.
I've come across some very interesting thoughts from this list, so I
thought I'll post
On Mon, 2007-06-04 at 10:21 -0400, Chander Ganesan wrote:
> It's not too hard to put together a "warm standby" synchronous
> replication mechanism with overhead that isn't too much more than what
> you incur by enabling PITR... Such systems can also have very fast
> failover on failure detection
Ranieri Mazili schrieb:
Hello,
I need to store users and passwords on a table and I want to store it
encrypted, but I don't found documentation about it, how can I create a
table with columns "user" and "password" with column "password"
encrypted and how can I check if "user" and "password" a
Dear list,
This might be too basic for a question but I just couldn't find the
answer so far.
Does PostgreSQL create an implicit index also for foreign keys? or must
I create it explicitly?
Thank you,
Marc Compte
---(end of broadcast)---
TIP
Hello,
http://developer.postgresql.org/~devrim/rpms/v8.3devel/
is the SRPM that I built using yesterday's CVS snaphot (the tarball in
FTP site).
This is for the people who want to test 8.3+RPM in their distros.
Please let me know if you find packaging errors.
Regards,
--
Devrim GÜNDÜZ
Postg
Hi Scott,
in fact, we were using a 2.6.12 kernel. Can this be a problem?
Best regards.
Paolo Bizzarri
On 6/4/07, Scott Marlowe <[EMAIL PROTECTED]> wrote:
Paolo Bizzarri wrote:
> On 6/2/07, Tom Lane <[EMAIL PROTECTED]> wrote:
>> "Paolo Bizzarri" <[EMAIL PROTECTED]> writes:
>> > On 6/2/07, Tom
On Sun, Jun 03, 2007 at 07:47:04PM +0200, Alexander Staubo wrote:
> For example, part of the point of having validations declared on the
> model is so that you can raise user-friendly errors (and pipe them
> through gettext for localization) such as "Your password must be at
> least 4 characters l
73 matches
Mail list logo