1427 lines
89 KiB
Plaintext
1427 lines
89 KiB
Plaintext
|
[ldap2pg.config INFO] Starting ldap2pg 5.8.
|
||
|
[ldap2pg.config DEBUG] Trying ./ldap2pg.yml.
|
||
|
[ldap2pg.config INFO] Using /database/pgsql/ldap2pg.yml.
|
||
|
[ldap2pg.config DEBUG] Read check from argv.
|
||
|
[ldap2pg.config DEBUG] Read verbosity from argv.
|
||
|
[ldap2pg.config DEBUG] Read version from YAML.
|
||
|
[ldap2pg.config DEBUG] Read ldap:uri from YAML.
|
||
|
[ldap2pg.config DEBUG] Read ldap:binddn from YAML.
|
||
|
[ldap2pg.config DEBUG] Read ldap:password from YAML.
|
||
|
[ldap2pg.config DEBUG] Read postgres:dsn from YAML.
|
||
|
[ldap2pg.config DEBUG] Read postgres:databases_query from YAML.
|
||
|
[ldap2pg.config DEBUG] Read postgres:managed_roles_query from YAML.
|
||
|
[ldap2pg.config DEBUG] Read postgres:owners_query from YAML.
|
||
|
[ldap2pg.config DEBUG] Read postgres:schemas_query from YAML.
|
||
|
[ldap2pg.config DEBUG] Read privileges from YAML.
|
||
|
[ldap2pg.config DEBUG] Read sync_map from YAML.
|
||
|
[ldap2pg.config DEBUG] Drop unused inactive privilege __default_execute_on_functions__
|
||
|
[ldap2pg.config DEBUG] Drop unused inactive privilege __execute_on_all_functions__
|
||
|
[ldap2pg.config DEBUG] Drop unused inactive privilege __global_default_execute_on_functions__
|
||
|
[ldap2pg.config DEBUG] Configuration loaded.
|
||
|
[ldap2pg.script DEBUG] Setting up LDAP client.
|
||
|
[ldap2pg.ldap DEBUG] Found rcfile /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read SASL_NOCANON from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read HOST from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read URI from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read BASE from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read TLS_REQCERT from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read TLS_CACERTDIR from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Read SUDOERS_BASE from /etc/openldap/ldap.conf.
|
||
|
[ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/etc/ldap/ldap.conf'
|
||
|
[ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/database/pgsql/ldaprc'
|
||
|
[ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/database/pgsql/.ldaprc'
|
||
|
[ldap2pg.ldap DEBUG] Read URI from YAML.
|
||
|
[ldap2pg.ldap DEBUG] Read BINDDN from YAML.
|
||
|
[ldap2pg.ldap DEBUG] Read PASSWORD from YAML.
|
||
|
[ldap2pg.ldap INFO] Connecting to LDAP server ldaps://jcolebrand.info.
|
||
|
[ldap2pg.ldap INFO] Trying simple bind.
|
||
|
[ldap2pg.ldap DEBUG] Authenticating: ldapwhoami -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W
|
||
|
[ldap2pg.script WARNI] Running in dry mode. Postgres will be untouched.
|
||
|
[ldap2pg.psql DEBUG] Opening connection to libpq default.
|
||
|
[ldap2pg.script DEBUG] Inspecting role attributes.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT array_agg(attrs.attname)
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace AS nsp
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_class AS tables
|
||
|
[ldap2pg.psql DEBUG] ON tables.relnamespace = nsp.oid AND tables.relname = 'pg_authid'
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_attribute AS attrs
|
||
|
[ldap2pg.psql DEBUG] ON attrs.attrelid = tables.oid AND attrs.attname LIKE 'rol%'
|
||
|
[ldap2pg.psql DEBUG] WHERE nsp.nspname = 'pg_catalog'
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1
|
||
|
[ldap2pg.role DEBUG] Postgres server supports role options BYPASSRLS, LOGIN, CREATEDB, CREATEROLE, INHERIT, REPLICATION, SUPERUSER.
|
||
|
[ldap2pg.manager INFO] Inspecting roles in Postgres cluster...
|
||
|
[ldap2pg.inspector DEBUG] Introspecting session Postgres role.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT current_user, rolsuper
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_roles
|
||
|
[ldap2pg.psql DEBUG] WHERE rolname = current_user;
|
||
|
[ldap2pg.inspector DEBUG] Inspecting databases.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT datname, rolname
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_database
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_roles
|
||
|
[ldap2pg.psql DEBUG] ON pg_catalog.pg_roles.oid = datdba
|
||
|
[ldap2pg.psql DEBUG] WHERE datallowconn;
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT datname FROM pg_catalog.pg_database;
|
||
|
[ldap2pg.inspector DEBUG] Inspecting all defined roles in cluster.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] role.rolname, array_agg(members.rolname) AS members,
|
||
|
[ldap2pg.psql DEBUG] role.rolbypassrls, role.rolcanlogin, role.rolcreatedb, role.rolcreaterole, role.rolinherit, role.rolreplication, role.rolsuper,
|
||
|
[ldap2pg.psql DEBUG] pg_catalog.shobj_description(role.oid, 'pg_authid') as comment
|
||
|
[ldap2pg.psql DEBUG] FROM
|
||
|
[ldap2pg.psql DEBUG] pg_catalog.pg_roles AS role
|
||
|
[ldap2pg.psql DEBUG] LEFT JOIN pg_catalog.pg_auth_members ON roleid = role.oid
|
||
|
[ldap2pg.psql DEBUG] LEFT JOIN pg_catalog.pg_roles AS members ON members.oid = member
|
||
|
[ldap2pg.psql DEBUG] GROUP BY role.rolname, role.rolbypassrls, role.rolcanlogin, role.rolcreatedb, role.rolcreaterole, role.rolinherit, role.rolreplication, role.rolsuper, comment
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1;
|
||
|
[ldap2pg.inspector DEBUG] Listing managed roles.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT ('public')
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT ('ldap_roles')
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT DISTINCT role.rolname
|
||
|
[ldap2pg.psql DEBUG] FROM pg_roles AS role
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_auth_members AS ms ON ms.member = role.oid
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_roles AS ldap_roles
|
||
|
[ldap2pg.psql DEBUG] ON ldap_roles.rolname = 'ldap_roles' AND ldap_roles.oid = ms.roleid
|
||
|
[ldap2pg.psql DEBUG] WHERE role.rolname IN ('ldap_roles', 'readers', 'writers', 'owners')
|
||
|
[ldap2pg.psql DEBUG] OR ldap_roles.oid IS NOT NULL
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1;
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_server_files'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_data'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_stat_scan_tables'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_stats'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_write_server_files'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_write_all_data'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_database_owner'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_execute_server_program'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_settings'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] May reuse role 'ldap2pg'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_signal_backend'. Matches 'pg_*'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'postgres'. Matches 'postgres'.
|
||
|
[ldap2pg.inspector DEBUG] Ignoring role 'pg_monitor'. Matches 'pg_*'.
|
||
|
[ldap2pg.manager DEBUG] Postgres roles inspection done.
|
||
|
[ldap2pg.manager INFO] Setup static roles and grants.
|
||
|
[ldap2pg.manager DEBUG] Want role ldap_roles from YAML.
|
||
|
[ldap2pg.manager DEBUG] Want role readers from YAML.
|
||
|
[ldap2pg.manager DEBUG] Want role writers from YAML.
|
||
|
[ldap2pg.manager DEBUG] Want role owners from YAML.
|
||
|
[ldap2pg.manager DEBUG] Want GRANT ro on __ALL_DATABASES__.* for * to readers (full) from YAML.
|
||
|
[ldap2pg.manager DEBUG] Want GRANT rw on __ALL_DATABASES__.* for * to writers (full) from YAML.
|
||
|
[ldap2pg.manager DEBUG] Want GRANT ddl on __ALL_DATABASES__.* for * to owners (full) from YAML.
|
||
|
[ldap2pg.manager INFO] Query LDAP to create superusers.
|
||
|
[ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=superuse...
|
||
|
[ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=superuser)' member
|
||
|
[ldap2pg.manager DEBUG] Got 1 entries from LDAP.
|
||
|
[ldap2pg.manager DEBUG] Want role cbrand in LDAP.
|
||
|
[ldap2pg.manager INFO] Query LDAP to create writers.
|
||
|
[ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=writers)...
|
||
|
[ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=writers)' member
|
||
|
[ldap2pg.manager DEBUG] Got 1 entries from LDAP.
|
||
|
[ldap2pg.manager INFO] Query LDAP to create readers.
|
||
|
[ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=readers)...
|
||
|
[ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=readers)' member
|
||
|
[ldap2pg.manager DEBUG] Got 1 entries from LDAP.
|
||
|
[ldap2pg.manager WARNI] Missing 'member' from cn=readers,ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info. Considering it as an empty list.
|
||
|
[ldap2pg.manager DEBUG] LDAP inspection completed. Post processing.
|
||
|
[ldap2pg.psql CHANG] Would create cbrand.
|
||
|
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "cbrand" WITH NOBYPASSRLS LOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION SUPERUSER;
|
||
|
[ldap2pg.psql DEBUG] COMMENT ON ROLE "cbrand" IS 'From LDAP groupe cn=writers,ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info';
|
||
|
[ldap2pg.psql CHANG] Would create ldap_roles.
|
||
|
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "ldap_roles" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
|
||
|
[ldap2pg.psql DEBUG] COMMENT ON ROLE "ldap_roles" IS 'Managed by ldap2pg';
|
||
|
[ldap2pg.psql CHANG] Would add ldap_roles members.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT "ldap_roles" TO "cbrand";
|
||
|
[ldap2pg.psql CHANG] Would create owners.
|
||
|
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "owners" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
|
||
|
[ldap2pg.psql DEBUG] COMMENT ON ROLE "owners" IS 'Managed by ldap2pg';
|
||
|
[ldap2pg.psql CHANG] Would add owners members.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT "owners" TO "cbrand";
|
||
|
[ldap2pg.psql CHANG] Would create writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "writers" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
|
||
|
[ldap2pg.psql DEBUG] COMMENT ON ROLE "writers" IS 'Managed by ldap2pg';
|
||
|
[ldap2pg.psql CHANG] Would add writers members.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT "writers" TO "owners", "cbrand";
|
||
|
[ldap2pg.psql CHANG] Would create readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "readers" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
|
||
|
[ldap2pg.psql DEBUG] COMMENT ON ROLE "readers" IS 'Managed by ldap2pg';
|
||
|
[ldap2pg.psql CHANG] Would add readers members.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT "readers" TO "writers";
|
||
|
[ldap2pg.manager INFO] Inspecting GRANTs in Postgres cluster...
|
||
|
[ldap2pg.manager WARNI] In dry mode, some owners aren't created, their default privileges can't be determined.
|
||
|
[ldap2pg.inspector DEBUG] Inspecting schemas in template1
|
||
|
[ldap2pg.psql DEBUG] Opening connection to template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT nspname FROM pg_catalog.pg_namespace
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg_%' AND nspname <> 'information_schema'
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1;
|
||
|
[ldap2pg.inspector DEBUG] Found schemas public in template1.
|
||
|
[ldap2pg.inspector DEBUG] Globally inspecting owners...
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT DISTINCT role.rolname
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_roles AS role
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_auth_members AS ms ON ms.member = role.oid
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_roles AS owners
|
||
|
[ldap2pg.psql DEBUG] ON owners.rolname = 'owners' AND owners.oid = ms.roleid
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1;
|
||
|
[ldap2pg.inspector DEBUG] Inspecting schemas in postgres
|
||
|
[ldap2pg.psql DEBUG] Opening connection to postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] SELECT nspname FROM pg_catalog.pg_namespace
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg_%' AND nspname <> 'information_schema'
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1;
|
||
|
[ldap2pg.inspector DEBUG] Found schemas public in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __connect__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(datacl)).grantee AS grantee,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(datacl)).privilege_type AS priv
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_database
|
||
|
[ldap2pg.psql DEBUG] WHERE datname = current_database()
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT q.*
|
||
|
[ldap2pg.psql DEBUG] FROM (VALUES (0, 'CONNECT'), (0, 'TEMPORARY')) AS q
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN pg_catalog.pg_database
|
||
|
[ldap2pg.psql DEBUG] WHERE datacl IS NULL AND datname = current_database()
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] grants.priv AS key,
|
||
|
[ldap2pg.psql DEBUG] NULL as namespace,
|
||
|
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public')
|
||
|
[ldap2pg.psql DEBUG] FROM grants
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] WHERE grantee = 0 OR rolname IS NOT NULL
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000925.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __connect__ on template1.* for * to public (full).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __connect__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(datacl)).grantee AS grantee,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(datacl)).privilege_type AS priv
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_database
|
||
|
[ldap2pg.psql DEBUG] WHERE datname = current_database()
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT q.*
|
||
|
[ldap2pg.psql DEBUG] FROM (VALUES (0, 'CONNECT'), (0, 'TEMPORARY')) AS q
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN pg_catalog.pg_database
|
||
|
[ldap2pg.psql DEBUG] WHERE datacl IS NULL AND datname = current_database()
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] grants.priv AS key,
|
||
|
[ldap2pg.psql DEBUG] NULL as namespace,
|
||
|
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public')
|
||
|
[ldap2pg.psql DEBUG] FROM grants
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] WHERE grantee = 0 OR rolname IS NOT NULL
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000725.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __connect__ on postgres.* for * to public (full).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __create_on_schemas__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).grantee AS grantee,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).privilege_type AS priv
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] grants.priv AS key,
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname
|
||
|
[ldap2pg.psql DEBUG] FROM grants
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
|
||
|
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000250.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __create_on_schemas__ on template1.public for * to public (full).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __create_on_schemas__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).grantee AS grantee,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).privilege_type AS priv
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] grants.priv AS key,
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname
|
||
|
[ldap2pg.psql DEBUG] FROM grants
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
|
||
|
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000221.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __create_on_schemas__ on postgres.public for * to public (full).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_delete_on_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] defaclnamespace,
|
||
|
[ldap2pg.psql DEBUG] defaclrole,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).grantee AS grantee,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).privilege_type AS priv,
|
||
|
[ldap2pg.psql DEBUG] defaclobjtype AS objtype
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_default_acl
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] priv || '_on_' || objtype AS key,
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname,
|
||
|
[ldap2pg.psql DEBUG] TRUE AS full,
|
||
|
[ldap2pg.psql DEBUG] pg_catalog.pg_get_userbyid(defaclrole) AS owner
|
||
|
[ldap2pg.psql DEBUG] FROM grants
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_namespace nsp ON nsp.oid = defaclnamespace
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
|
||
|
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2, 3, 5
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000327.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_delete_on_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] defaclnamespace,
|
||
|
[ldap2pg.psql DEBUG] defaclrole,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).grantee AS grantee,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).privilege_type AS priv,
|
||
|
[ldap2pg.psql DEBUG] defaclobjtype AS objtype
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_default_acl
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] priv || '_on_' || objtype AS key,
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname,
|
||
|
[ldap2pg.psql DEBUG] TRUE AS full,
|
||
|
[ldap2pg.psql DEBUG] pg_catalog.pg_get_userbyid(defaclrole) AS owner
|
||
|
[ldap2pg.psql DEBUG] FROM grants
|
||
|
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_namespace nsp ON nsp.oid = defaclnamespace
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
|
||
|
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2, 3, 5
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000292.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_insert_on_tables__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_insert_on_tables__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_references_on_tables__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_references_on_tables__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_sequences__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_sequences__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_tables__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_tables__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_trigger_on_tables__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_trigger_on_tables__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_truncate_on_tables__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_truncate_on_tables__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_sequences__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_sequences__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_tables__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_tables__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_sequences__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_sequences__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_types__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_types__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __delete_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'DELETE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001743.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __delete_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __delete_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'DELETE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001833.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __delete_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __insert_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'INSERT'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001530.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __insert_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __insert_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'INSERT'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001625.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __insert_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __references_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'REFERENCES'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001615.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __references_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __references_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'REFERENCES'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001499.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __references_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_sequences__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000529.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_sequences__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_sequences__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000445.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_sequences__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001378.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001594.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __temporary__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache datacl.
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __temporary__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache datacl.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __temporary__ on postgres.* for * to public (full).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __trigger_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'TRIGGER'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001487.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __trigger_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __trigger_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'TRIGGER'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001569.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __trigger_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __truncate_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'TRUNCATE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001781.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __truncate_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __truncate_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'TRUNCATE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001517.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __truncate_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_sequences__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000529.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_sequences__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_sequences__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000463.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_sequences__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_tables__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001683.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_tables__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_tables__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.001919.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_tables__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_all_sequences__ in template1.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'USAGE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000657.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_all_sequences__ on template1.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_all_sequences__ in postgres.
|
||
|
[ldap2pg.psql DEBUG] Doing:
|
||
|
[ldap2pg.psql DEBUG] WITH
|
||
|
[ldap2pg.psql DEBUG] namespace_rels AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nsp.oid,
|
||
|
[ldap2pg.psql DEBUG] nsp.nspname,
|
||
|
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
|
||
|
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
|
||
|
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_grants AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] relnamespace,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
|
||
|
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
|
||
|
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
|
||
|
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
|
||
|
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
|
||
|
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
|
||
|
[ldap2pg.psql DEBUG] ),
|
||
|
[ldap2pg.psql DEBUG] all_roles AS (
|
||
|
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
|
||
|
[ldap2pg.psql DEBUG] UNION
|
||
|
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
|
||
|
[ldap2pg.psql DEBUG] )
|
||
|
[ldap2pg.psql DEBUG] SELECT
|
||
|
[ldap2pg.psql DEBUG] nspname,
|
||
|
[ldap2pg.psql DEBUG] rolname,
|
||
|
[ldap2pg.psql DEBUG] CASE
|
||
|
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
|
||
|
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
|
||
|
[ldap2pg.psql DEBUG] END AS "full"
|
||
|
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
|
||
|
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
|
||
|
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
|
||
|
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
|
||
|
[ldap2pg.psql DEBUG] AND grantee = rol.oid
|
||
|
[ldap2pg.psql DEBUG] AND privilege_type = 'USAGE'
|
||
|
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
|
||
|
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
|
||
|
[ldap2pg.inspector DEBUG] Took 0:00:00.000571.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_all_sequences__ on postgres.public for * to public (n/a).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_schemas__ in template1.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache nspacl.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_schemas__ on template1.public for * to public (full).
|
||
|
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_schemas__ in postgres.
|
||
|
[ldap2pg.inspector DEBUG] Reusing shared query cache nspacl.
|
||
|
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_schemas__ on postgres.public for * to public (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __create_on_schemas__ on template1.public for * to owners (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __create_on_schemas__ on postgres.public for * to owners (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __delete_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __delete_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __insert_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __insert_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __references_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __references_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __temporary__ on template1.* for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __temporary__ on postgres.* for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __trigger_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __trigger_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __truncate_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __truncate_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_sequences__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_sequences__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_tables__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_tables__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __usage_on_all_sequences__ on template1.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __usage_on_all_sequences__ on postgres.public for * to writers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __connect__ on template1.* for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __connect__ on postgres.* for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on template1.public for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on postgres.public for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on template1.public for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on postgres.public for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __usage_on_schemas__ on template1.public for * to readers (full).
|
||
|
[ldap2pg.manager DEBUG] Want GRANT __usage_on_schemas__ on postgres.public for * to readers (full).
|
||
|
[ldap2pg.psql CHANG] Would revoke __connect__ on postgres from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE CONNECT ON DATABASE "postgres" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would revoke __create_on_schemas__ on postgres.public from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE CREATE ON SCHEMA "public" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would revoke __temporary__ on postgres from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE TEMPORARY ON DATABASE "postgres" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would revoke __usage_on_schemas__ on postgres.public from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE USAGE ON SCHEMA "public" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would revoke __connect__ on template1 from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE CONNECT ON DATABASE "template1" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would revoke __create_on_schemas__ on template1.public from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE CREATE ON SCHEMA "public" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would revoke __usage_on_schemas__ on template1.public from public.
|
||
|
[ldap2pg.psql DEBUG] Would execute: REVOKE USAGE ON SCHEMA "public" FROM "public";
|
||
|
[ldap2pg.psql CHANG] Would grant __create_on_schemas__ on postgres.public to owners.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT CREATE ON SCHEMA "public" TO "owners";
|
||
|
[ldap2pg.psql CHANG] Would grant __connect__ on postgres to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT CONNECT ON DATABASE "postgres" TO "readers";
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on postgres.public to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "readers"
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on postgres.public to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "readers"
|
||
|
[ldap2pg.psql CHANG] Would grant __usage_on_schemas__ on postgres.public to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON SCHEMA "public" TO "readers";
|
||
|
[ldap2pg.psql CHANG] Would grant __delete_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT DELETE ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __insert_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT INSERT ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __references_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT REFERENCES ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __temporary__ on postgres to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT TEMPORARY ON DATABASE "postgres" TO "writers";
|
||
|
[ldap2pg.psql CHANG] Would grant __trigger_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT TRIGGER ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __truncate_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT TRUNCATE ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __update_on_all_sequences__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __update_on_all_tables__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __usage_on_all_sequences__ on postgres.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __create_on_schemas__ on template1.public to owners.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT CREATE ON SCHEMA "public" TO "owners";
|
||
|
[ldap2pg.psql CHANG] Would grant __connect__ on template1 to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT CONNECT ON DATABASE "template1" TO "readers";
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on template1.public to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "readers"
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on template1.public to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "readers"
|
||
|
[ldap2pg.psql CHANG] Would grant __usage_on_schemas__ on template1.public to readers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON SCHEMA "public" TO "readers";
|
||
|
[ldap2pg.psql CHANG] Would grant __delete_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT DELETE ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __insert_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT INSERT ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __references_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT REFERENCES ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __temporary__ on template1 to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT TEMPORARY ON DATABASE "template1" TO "writers";
|
||
|
[ldap2pg.psql CHANG] Would grant __trigger_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT TRIGGER ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __truncate_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT TRUNCATE ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __update_on_all_sequences__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __update_on_all_tables__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL TABLES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.psql CHANG] Would grant __usage_on_all_sequences__ on template1.public to writers.
|
||
|
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
|
||
|
[ldap2pg.manager INFO] Generated 48 querie(s).
|
||
|
[ldap2pg.psql DEBUG] Closing connection to libpq default.
|
||
|
[ldap2pg.psql DEBUG] Closing connection to template1.
|
||
|
[ldap2pg.psql DEBUG] Closing connection to postgres.
|
||
|
[ldap2pg.script INFO] Comparison complete.
|
||
|
[ldap2pg.script DEBUG] Inspecting Postgres took 0:00:00.031821.
|
||
|
[ldap2pg.script DEBUG] Searching directory took 0:00:00.000634.
|
||
|
[ldap2pg.script DEBUG] Synchronizing Postgres took 0:00:00.
|
||
|
[ldap2pg.script DEBUG] Used up to 41.0MiB of memory.
|