On 9/6/16 3:16 PM, Greg Fodor wrote:
It seems that functionality that lets a superuser quickly audit the
privileges for a user (including those granted via PUBLIC) would be
really helpful for diagnosing cases where that user can do something
they shouldn't be allowed to.
That's actually relativ
Stephen Frost writes:
> \dn+ in psql will give you the access privileges for all schemas.
> I'd have to look at the "other solutions" you're referring to, but, in
> general, we do not exclude the public role in any way from the access
> privilege system.
Possibly Greg was thinking of the informa
Gregm
* Greg Fodor (gfo...@gmail.com) wrote:
> A, I wasn't aware of the PUBLIC meta-role. Not sure if it's useful
> feedback, I spent a lot of time digging around the web for solutions
> that would basically let me query the database to see all of the
> effective privileges for a user, and non
A, I wasn't aware of the PUBLIC meta-role. Not sure if it's useful
feedback, I spent a lot of time digging around the web for solutions
that would basically let me query the database to see all of the
effective privileges for a user, and none of the solutions I found
were able to get me to a po
Greg Fodor writes:
> Apologies in advance about this since it is likely something obvious,
> but I am seeing some very basic behavior that does not make sense.
> I've tested this on a fresh build of 9.6rc1 and also 9.1.24 (just to
> see if it was a regression.) After creating a test database, and
Greg,
* Greg Fodor (gfo...@gmail.com) wrote:
> Apologies in advance about this since it is likely something obvious,
> but I am seeing some very basic behavior that does not make sense.
> I've tested this on a fresh build of 9.6rc1 and also 9.1.24 (just to
> see if it was a regression.) After crea
Apologies in advance about this since it is likely something obvious,
but I am seeing some very basic behavior that does not make sense.
I've tested this on a fresh build of 9.6rc1 and also 9.1.24 (just to
see if it was a regression.) After creating a test database, and a
test user that I revoke al
Bryan Ellerbrock writes:
> Huh. Thanks for the quick reply Joe. I'm still not sure I fully understand
> the behavior here, but it's nice to at least be able to discuss it.
>
> The documentation you shared makes it clear that, unless extra steps
> are taken, changes to an extension's object defin
On 02/26/2016 07:12 AM, David G. Johnston wrote:
> pg_dump emits a "CREATE EXTENSION" statement to the dump file and then
> pg_restore executes the "CREATE EXTENSION". None of the actual schema
> objects are dumped and thus any changes to those objects in the current
> database, including their pe
On Fri, Feb 26, 2016 at 8:00 AM, Bryan Ellerbrock wrote:
> Huh. Thanks for the quick reply Joe. I'm still not sure I fully understand
> the behavior here, but it's nice to at least be able to discuss it.
>
> The documentation you shared makes it clear that, unless extra steps are
> taken, changes
Huh. Thanks for the quick reply Joe. I'm still not sure I fully understand
the behavior here, but it's nice to at least be able to discuss it.
The documentation you shared makes it clear that, unless extra steps are
taken, changes to an extension's object definitions won't be preserved in a
dump.
On 02/25/2016 03:42 PM, Bryan Ellerbrock wrote:
> Hi, I'm first time mailing-list user with a problem. I'm working on a
> UTF8 encoded database using psql (9.5.1, server 9.4.6)
>
> I've implemented a very large materialized view to speed up certain
> search queries. I need to give users the abilit
Hi, I'm first time mailing-list user with a problem. I'm working on a UTF8
encoded database using psql (9.5.1, server 9.4.6)
I've implemented a very large materialized view to speed up certain search
queries. I need to give users the ability to start a concurrent refresh on
demand, without waiting
To allow read-only access, ie. SELECT, to a user on a table which has a SERIAL
column as well as foreign key references do I need to GRANT the user anything
other than SELECT on the table and its corresponding sequence? As I understand,
USAGE is only required to modify the table or use the curr
On 2011-01-21 16.16, Andy Colson wrote:
On 1/20/2011 11:56 PM, Adarsh Sharma wrote:
Dear all,
I want to know ACl of different users on different tables and databases
in Postgresql.
Is there any command as we do in mysql as :
select * from mysql.user\G;
I am researching but cannot able to fi
On 1/20/2011 11:56 PM, Adarsh Sharma wrote:
Dear all,
I want to know ACl of different users on different tables and databases
in Postgresql.
Is there any command as we do in mysql as :
select * from mysql.user\G;
I am researching but cannot able to find.
Thanks & Regards
Adarsh Sharma
u
Dear all,
I want to know ACl of different users on different tables and databases
in Postgresql.
Is there any command as we do in mysql as :
select * from mysql.user\G;
I am researching but cannot able to find.
Thanks & Regards
Adarsh Sharma
--
Sent via pgsql-general mailing list (pgsql-
"Christian Rengstl" <[EMAIL PROTECTED]> writes:
> whenever I execute the following query as admin I get all results, but
> as soon as I execute it as a less-privileged user the result is empty.
> SELECT * FROM information_schema.schemata
The SQL standard specifies that information_schema.schemata
Hi list,
whenever I execute the following query as admin I get all results, but
as soon as I execute it as a less-privileged user the result is empty.
SELECT * FROM information_schema.schemata
Strange enough, when I query information_schema.tables I can see
everything both as a normal user and ad
Hi, how is it with privileges for views and sequences? User other from
owner is set to have full access to DB, this is applied to tables and
functions, but not to views and sequences. I have to specifically give
permission to each view and sequence.
---(end of broadcast)--
On Sat, Jul 23, 2005 at 06:43:20PM -0500, Peter Fein wrote:
> I suppose this issue will go away when autovacuum is integrated into the
> server itself in 8.1?
Yes, it already did.
--
Alvaro Herrera ()
"Hoy es el primer día del resto de mi vida"
---(end of broadcast)
Peter Fein wrote:
> I've password protected the 'postgres' account (to enable secure remote
> access) and I don't want to store the password on the local file system.
> I therefore want to create a separate account for use by pg_autovacuum
> (locked down in pg_hba.conf and perhaps with a password).
I've password protected the 'postgres' account (to enable secure remote
access) and I don't want to store the password on the local file system.
I therefore want to create a separate account for use by pg_autovacuum
(locked down in pg_hba.conf and perhaps with a password). What are the
minimum set
:59 AM
To: pgsql-general@postgresql.org
Cc:
Subject:[GENERAL] Privileges question
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
~ I created a schema, database, tables, users and a user group.
create user sma_user password 'x';
create group sma_user_group;
al
On Mon, Feb 14, 2005 at 11:59:33AM -0700, James Moe wrote:
>
> When logged in as sma_user, it is denied access to the schema:
> ERROR: permission denied for schema sma_apps
See "Schemas and Privileges" in the documentation, as well as the
documentation for GRANT:
http://www.postgresql.org/docs/8
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
~ I created a schema, database, tables, users and a user group.
create user sma_user password 'x';
create group sma_user_group;
alter group sma_user_group add user sma_user;
create table sma_apps.ordr_dat ( ... );
grant select,delete,insert
On Sun, 24 May 1998, The Hermit Hacker wrote:
> That command did not return an error, rather it said CHANGE (without
> the exclamation marks, of course). However, afterward, I was still able
> to insert into the table. What gives?
It works for me, I have v6.3
>
> Also, another question:
>
Besides \z ?
The Hermit Hacker wrote:
> Hello all,
>
> I have a couple of questions for you:
>
> We are trying to setup a "group" in our database... groupx.
> I found the syntax in the FAQ, from the PostgreSQL homepage.
> So, we followed the syntax and created the group:
>
> insert into pg_group
28 matches
Mail list logo