Skip to content
Snippets Groups Projects
Select Git revision
  • benchmark-tools
  • postgres-lambda
  • master default
  • REL9_4_25
  • REL9_5_20
  • REL9_6_16
  • REL_10_11
  • REL_11_6
  • REL_12_1
  • REL_12_0
  • REL_12_RC1
  • REL_12_BETA4
  • REL9_4_24
  • REL9_5_19
  • REL9_6_15
  • REL_10_10
  • REL_11_5
  • REL_12_BETA3
  • REL9_4_23
  • REL9_5_18
  • REL9_6_14
  • REL_10_9
  • REL_11_4
23 results

alter_user_mapping.sgml

Blame
    • Peter Eisentraut's avatar
      93a6be63
      Revise the permission checking on user mapping DDL commands. · 93a6be63
      Peter Eisentraut authored
      CREATE/ALTER/DROP USER MAPPING are now allowed either by the server owner or
      by a user with USAGE privileges for his own user name.  This is more or less
      what the SQL standard wants anyway (plus "implementation-defined")
      
      Hide information_schema.user_mapping_options.option_value, unless the current
      user is the one associated with the user mapping, or is the server owner and
      the mapping is for PUBLIC, or is a superuser.  This is to protect passwords.
      
      Also, fix a bug in information_schema._pg_foreign_servers, which hid servers
      using wrappers where the current user did not have privileges on the wrapper.
      The correct behavior is to hide servers where the current user has no
      privileges on the server.
      93a6be63
      History
      Revise the permission checking on user mapping DDL commands.
      Peter Eisentraut authored
      CREATE/ALTER/DROP USER MAPPING are now allowed either by the server owner or
      by a user with USAGE privileges for his own user name.  This is more or less
      what the SQL standard wants anyway (plus "implementation-defined")
      
      Hide information_schema.user_mapping_options.option_value, unless the current
      user is the one associated with the user mapping, or is the server owner and
      the mapping is for PUBLIC, or is a superuser.  This is to protect passwords.
      
      Also, fix a bug in information_schema._pg_foreign_servers, which hid servers
      using wrappers where the current user did not have privileges on the wrapper.
      The correct behavior is to hide servers where the current user has no
      privileges on the server.