[ldap2pg.config INFO] Starting ldap2pg 5.8. [ldap2pg.config DEBUG] Trying ./ldap2pg.yml. [ldap2pg.config INFO] Using /database/pgsql/ldap2pg.yml. [ldap2pg.config DEBUG] Read check from argv. [ldap2pg.config DEBUG] Read verbosity from argv. [ldap2pg.config DEBUG] Read version from YAML. [ldap2pg.config DEBUG] Read ldap:uri from YAML. [ldap2pg.config DEBUG] Read ldap:binddn from YAML. [ldap2pg.config DEBUG] Read ldap:password from YAML. [ldap2pg.config DEBUG] Read postgres:dsn from YAML. [ldap2pg.config DEBUG] Read postgres:databases_query from YAML. [ldap2pg.config DEBUG] Read postgres:managed_roles_query from YAML. [ldap2pg.config DEBUG] Read postgres:owners_query from YAML. [ldap2pg.config DEBUG] Read postgres:schemas_query from YAML. [ldap2pg.config DEBUG] Read privileges from YAML. [ldap2pg.config DEBUG] Read sync_map from YAML. [ldap2pg.config DEBUG] Drop unused inactive privilege __default_execute_on_functions__ [ldap2pg.config DEBUG] Drop unused inactive privilege __execute_on_all_functions__ [ldap2pg.config DEBUG] Drop unused inactive privilege __global_default_execute_on_functions__ [ldap2pg.config DEBUG] Configuration loaded. [ldap2pg.script DEBUG] Setting up LDAP client. [ldap2pg.ldap DEBUG] Found rcfile /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read SASL_NOCANON from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read HOST from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read URI from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read BASE from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read TLS_REQCERT from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read TLS_CACERTDIR from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Read SUDOERS_BASE from /etc/openldap/ldap.conf. [ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/etc/ldap/ldap.conf' [ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/database/pgsql/ldaprc' [ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/database/pgsql/.ldaprc' [ldap2pg.ldap DEBUG] Read URI from YAML. [ldap2pg.ldap DEBUG] Read BINDDN from YAML. [ldap2pg.ldap DEBUG] Read PASSWORD from YAML. [ldap2pg.ldap INFO] Connecting to LDAP server ldaps://jcolebrand.info. [ldap2pg.ldap INFO] Trying simple bind. [ldap2pg.ldap DEBUG] Authenticating: ldapwhoami -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W [ldap2pg.script WARNI] Running in dry mode. Postgres will be untouched. [ldap2pg.psql DEBUG] Opening connection to libpq default. [ldap2pg.script DEBUG] Inspecting role attributes. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT array_agg(attrs.attname) [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace AS nsp [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_class AS tables [ldap2pg.psql DEBUG] ON tables.relnamespace = nsp.oid AND tables.relname = 'pg_authid' [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_attribute AS attrs [ldap2pg.psql DEBUG] ON attrs.attrelid = tables.oid AND attrs.attname LIKE 'rol%' [ldap2pg.psql DEBUG] WHERE nsp.nspname = 'pg_catalog' [ldap2pg.psql DEBUG] ORDER BY 1 [ldap2pg.role DEBUG] Postgres server supports role options BYPASSRLS, LOGIN, CREATEDB, CREATEROLE, INHERIT, REPLICATION, SUPERUSER. [ldap2pg.manager INFO] Inspecting roles in Postgres cluster... [ldap2pg.inspector DEBUG] Introspecting session Postgres role. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT current_user, rolsuper [ldap2pg.psql DEBUG] FROM pg_catalog.pg_roles [ldap2pg.psql DEBUG] WHERE rolname = current_user; [ldap2pg.inspector DEBUG] Inspecting databases. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT datname, rolname [ldap2pg.psql DEBUG] FROM pg_catalog.pg_database [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_roles [ldap2pg.psql DEBUG] ON pg_catalog.pg_roles.oid = datdba [ldap2pg.psql DEBUG] WHERE datallowconn; [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT datname FROM pg_catalog.pg_database; [ldap2pg.inspector DEBUG] Inspecting all defined roles in cluster. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] role.rolname, array_agg(members.rolname) AS members, [ldap2pg.psql DEBUG] role.rolbypassrls, role.rolcanlogin, role.rolcreatedb, role.rolcreaterole, role.rolinherit, role.rolreplication, role.rolsuper, [ldap2pg.psql DEBUG] pg_catalog.shobj_description(role.oid, 'pg_authid') as comment [ldap2pg.psql DEBUG] FROM [ldap2pg.psql DEBUG] pg_catalog.pg_roles AS role [ldap2pg.psql DEBUG] LEFT JOIN pg_catalog.pg_auth_members ON roleid = role.oid [ldap2pg.psql DEBUG] LEFT JOIN pg_catalog.pg_roles AS members ON members.oid = member [ldap2pg.psql DEBUG] GROUP BY role.rolname, role.rolbypassrls, role.rolcanlogin, role.rolcreatedb, role.rolcreaterole, role.rolinherit, role.rolreplication, role.rolsuper, comment [ldap2pg.psql DEBUG] ORDER BY 1; [ldap2pg.inspector DEBUG] Listing managed roles. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT ('public') [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT ('ldap_roles') [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT DISTINCT role.rolname [ldap2pg.psql DEBUG] FROM pg_roles AS role [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_auth_members AS ms ON ms.member = role.oid [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_roles AS ldap_roles [ldap2pg.psql DEBUG] ON ldap_roles.rolname = 'ldap_roles' AND ldap_roles.oid = ms.roleid [ldap2pg.psql DEBUG] WHERE role.rolname IN ('ldap_roles', 'readers', 'writers', 'owners') [ldap2pg.psql DEBUG] OR ldap_roles.oid IS NOT NULL [ldap2pg.psql DEBUG] ORDER BY 1; [ldap2pg.inspector DEBUG] Ignoring role 'pg_read_server_files'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_data'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_stat_scan_tables'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_stats'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_write_server_files'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_write_all_data'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_database_owner'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_execute_server_program'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_settings'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] May reuse role 'ldap2pg'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_signal_backend'. Matches 'pg_*'. [ldap2pg.inspector DEBUG] Ignoring role 'postgres'. Matches 'postgres'. [ldap2pg.inspector DEBUG] Ignoring role 'pg_monitor'. Matches 'pg_*'. [ldap2pg.manager DEBUG] Postgres roles inspection done. [ldap2pg.manager INFO] Setup static roles and grants. [ldap2pg.manager DEBUG] Want role ldap_roles from YAML. [ldap2pg.manager DEBUG] Want role readers from YAML. [ldap2pg.manager DEBUG] Want role writers from YAML. [ldap2pg.manager DEBUG] Want role owners from YAML. [ldap2pg.manager DEBUG] Want GRANT ro on __ALL_DATABASES__.* for * to readers (full) from YAML. [ldap2pg.manager DEBUG] Want GRANT rw on __ALL_DATABASES__.* for * to writers (full) from YAML. [ldap2pg.manager DEBUG] Want GRANT ddl on __ALL_DATABASES__.* for * to owners (full) from YAML. [ldap2pg.manager INFO] Query LDAP to create superusers. [ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=superuse... [ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=superuser)' member [ldap2pg.manager DEBUG] Got 1 entries from LDAP. [ldap2pg.manager DEBUG] Want role cbrand in LDAP. [ldap2pg.manager INFO] Query LDAP to create writers. [ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=writers)... [ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=writers)' member [ldap2pg.manager DEBUG] Got 1 entries from LDAP. [ldap2pg.manager INFO] Query LDAP to create readers. [ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=readers)... [ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=readers)' member [ldap2pg.manager DEBUG] Got 1 entries from LDAP. [ldap2pg.manager WARNI] Missing 'member' from cn=readers,ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info. Considering it as an empty list. [ldap2pg.manager DEBUG] LDAP inspection completed. Post processing. [ldap2pg.psql CHANG] Would create cbrand. [ldap2pg.psql DEBUG] Would execute: CREATE ROLE "cbrand" WITH NOBYPASSRLS LOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION SUPERUSER; [ldap2pg.psql DEBUG] COMMENT ON ROLE "cbrand" IS 'From LDAP groupe cn=writers,ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info'; [ldap2pg.psql CHANG] Would create ldap_roles. [ldap2pg.psql DEBUG] Would execute: CREATE ROLE "ldap_roles" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER; [ldap2pg.psql DEBUG] COMMENT ON ROLE "ldap_roles" IS 'Managed by ldap2pg'; [ldap2pg.psql CHANG] Would add ldap_roles members. [ldap2pg.psql DEBUG] Would execute: GRANT "ldap_roles" TO "cbrand"; [ldap2pg.psql CHANG] Would create owners. [ldap2pg.psql DEBUG] Would execute: CREATE ROLE "owners" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER; [ldap2pg.psql DEBUG] COMMENT ON ROLE "owners" IS 'Managed by ldap2pg'; [ldap2pg.psql CHANG] Would add owners members. [ldap2pg.psql DEBUG] Would execute: GRANT "owners" TO "cbrand"; [ldap2pg.psql CHANG] Would create writers. [ldap2pg.psql DEBUG] Would execute: CREATE ROLE "writers" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER; [ldap2pg.psql DEBUG] COMMENT ON ROLE "writers" IS 'Managed by ldap2pg'; [ldap2pg.psql CHANG] Would add writers members. [ldap2pg.psql DEBUG] Would execute: GRANT "writers" TO "owners", "cbrand"; [ldap2pg.psql CHANG] Would create readers. [ldap2pg.psql DEBUG] Would execute: CREATE ROLE "readers" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER; [ldap2pg.psql DEBUG] COMMENT ON ROLE "readers" IS 'Managed by ldap2pg'; [ldap2pg.psql CHANG] Would add readers members. [ldap2pg.psql DEBUG] Would execute: GRANT "readers" TO "writers"; [ldap2pg.manager INFO] Inspecting GRANTs in Postgres cluster... [ldap2pg.manager WARNI] In dry mode, some owners aren't created, their default privileges can't be determined. [ldap2pg.inspector DEBUG] Inspecting schemas in template1 [ldap2pg.psql DEBUG] Opening connection to template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT nspname FROM pg_catalog.pg_namespace [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg_%' AND nspname <> 'information_schema' [ldap2pg.psql DEBUG] ORDER BY 1; [ldap2pg.inspector DEBUG] Found schemas public in template1. [ldap2pg.inspector DEBUG] Globally inspecting owners... [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT DISTINCT role.rolname [ldap2pg.psql DEBUG] FROM pg_catalog.pg_roles AS role [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_auth_members AS ms ON ms.member = role.oid [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_roles AS owners [ldap2pg.psql DEBUG] ON owners.rolname = 'owners' AND owners.oid = ms.roleid [ldap2pg.psql DEBUG] ORDER BY 1; [ldap2pg.inspector DEBUG] Inspecting schemas in postgres [ldap2pg.psql DEBUG] Opening connection to postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] SELECT nspname FROM pg_catalog.pg_namespace [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg_%' AND nspname <> 'information_schema' [ldap2pg.psql DEBUG] ORDER BY 1; [ldap2pg.inspector DEBUG] Found schemas public in postgres. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __connect__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] (aclexplode(datacl)).grantee AS grantee, [ldap2pg.psql DEBUG] (aclexplode(datacl)).privilege_type AS priv [ldap2pg.psql DEBUG] FROM pg_catalog.pg_database [ldap2pg.psql DEBUG] WHERE datname = current_database() [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT q.* [ldap2pg.psql DEBUG] FROM (VALUES (0, 'CONNECT'), (0, 'TEMPORARY')) AS q [ldap2pg.psql DEBUG] CROSS JOIN pg_catalog.pg_database [ldap2pg.psql DEBUG] WHERE datacl IS NULL AND datname = current_database() [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] grants.priv AS key, [ldap2pg.psql DEBUG] NULL as namespace, [ldap2pg.psql DEBUG] COALESCE(rolname, 'public') [ldap2pg.psql DEBUG] FROM grants [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid [ldap2pg.psql DEBUG] WHERE grantee = 0 OR rolname IS NOT NULL [ldap2pg.inspector DEBUG] Took 0:00:00.000925. [ldap2pg.inspector DEBUG] Found GRANT __connect__ on template1.* for * to public (full). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __connect__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] (aclexplode(datacl)).grantee AS grantee, [ldap2pg.psql DEBUG] (aclexplode(datacl)).privilege_type AS priv [ldap2pg.psql DEBUG] FROM pg_catalog.pg_database [ldap2pg.psql DEBUG] WHERE datname = current_database() [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT q.* [ldap2pg.psql DEBUG] FROM (VALUES (0, 'CONNECT'), (0, 'TEMPORARY')) AS q [ldap2pg.psql DEBUG] CROSS JOIN pg_catalog.pg_database [ldap2pg.psql DEBUG] WHERE datacl IS NULL AND datname = current_database() [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] grants.priv AS key, [ldap2pg.psql DEBUG] NULL as namespace, [ldap2pg.psql DEBUG] COALESCE(rolname, 'public') [ldap2pg.psql DEBUG] FROM grants [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid [ldap2pg.psql DEBUG] WHERE grantee = 0 OR rolname IS NOT NULL [ldap2pg.inspector DEBUG] Took 0:00:00.000725. [ldap2pg.inspector DEBUG] Found GRANT __connect__ on postgres.* for * to public (full). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __create_on_schemas__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] (aclexplode(nspacl)).grantee AS grantee, [ldap2pg.psql DEBUG] (aclexplode(nspacl)).privilege_type AS priv [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] grants.priv AS key, [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname [ldap2pg.psql DEBUG] FROM grants [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid [ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL) [ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000250. [ldap2pg.inspector DEBUG] Found GRANT __create_on_schemas__ on template1.public for * to public (full). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __create_on_schemas__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] (aclexplode(nspacl)).grantee AS grantee, [ldap2pg.psql DEBUG] (aclexplode(nspacl)).privilege_type AS priv [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] grants.priv AS key, [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname [ldap2pg.psql DEBUG] FROM grants [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid [ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL) [ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000221. [ldap2pg.inspector DEBUG] Found GRANT __create_on_schemas__ on postgres.public for * to public (full). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_delete_on_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] defaclnamespace, [ldap2pg.psql DEBUG] defaclrole, [ldap2pg.psql DEBUG] (aclexplode(defaclacl)).grantee AS grantee, [ldap2pg.psql DEBUG] (aclexplode(defaclacl)).privilege_type AS priv, [ldap2pg.psql DEBUG] defaclobjtype AS objtype [ldap2pg.psql DEBUG] FROM pg_catalog.pg_default_acl [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] priv || '_on_' || objtype AS key, [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname, [ldap2pg.psql DEBUG] TRUE AS full, [ldap2pg.psql DEBUG] pg_catalog.pg_get_userbyid(defaclrole) AS owner [ldap2pg.psql DEBUG] FROM grants [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_namespace nsp ON nsp.oid = defaclnamespace [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid [ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL) [ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] -- ORDER BY 1, 2, 3, 5 [ldap2pg.inspector DEBUG] Took 0:00:00.000327. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_delete_on_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] defaclnamespace, [ldap2pg.psql DEBUG] defaclrole, [ldap2pg.psql DEBUG] (aclexplode(defaclacl)).grantee AS grantee, [ldap2pg.psql DEBUG] (aclexplode(defaclacl)).privilege_type AS priv, [ldap2pg.psql DEBUG] defaclobjtype AS objtype [ldap2pg.psql DEBUG] FROM pg_catalog.pg_default_acl [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] priv || '_on_' || objtype AS key, [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname, [ldap2pg.psql DEBUG] TRUE AS full, [ldap2pg.psql DEBUG] pg_catalog.pg_get_userbyid(defaclrole) AS owner [ldap2pg.psql DEBUG] FROM grants [ldap2pg.psql DEBUG] JOIN pg_catalog.pg_namespace nsp ON nsp.oid = defaclnamespace [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid [ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL) [ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] -- ORDER BY 1, 2, 3, 5 [ldap2pg.inspector DEBUG] Took 0:00:00.000292. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_insert_on_tables__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_insert_on_tables__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_references_on_tables__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_references_on_tables__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_sequences__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_sequences__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_tables__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_tables__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_trigger_on_tables__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_trigger_on_tables__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_truncate_on_tables__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_truncate_on_tables__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_sequences__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_sequences__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_tables__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_tables__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_sequences__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_sequences__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_types__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_types__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache defacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __delete_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'DELETE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001743. [ldap2pg.inspector DEBUG] Found GRANT __delete_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __delete_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'DELETE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001833. [ldap2pg.inspector DEBUG] Found GRANT __delete_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __insert_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'INSERT' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001530. [ldap2pg.inspector DEBUG] Found GRANT __insert_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __insert_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'INSERT' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001625. [ldap2pg.inspector DEBUG] Found GRANT __insert_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __references_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'REFERENCES' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001615. [ldap2pg.inspector DEBUG] Found GRANT __references_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __references_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'REFERENCES' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001499. [ldap2pg.inspector DEBUG] Found GRANT __references_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_sequences__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('S') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'SELECT' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000529. [ldap2pg.inspector DEBUG] Found GRANT __select_on_all_sequences__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_sequences__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('S') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'SELECT' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000445. [ldap2pg.inspector DEBUG] Found GRANT __select_on_all_sequences__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'SELECT' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001378. [ldap2pg.inspector DEBUG] Found GRANT __select_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'SELECT' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001594. [ldap2pg.inspector DEBUG] Found GRANT __select_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __temporary__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache datacl. [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __temporary__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache datacl. [ldap2pg.inspector DEBUG] Found GRANT __temporary__ on postgres.* for * to public (full). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __trigger_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'TRIGGER' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001487. [ldap2pg.inspector DEBUG] Found GRANT __trigger_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __trigger_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'TRIGGER' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001569. [ldap2pg.inspector DEBUG] Found GRANT __trigger_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __truncate_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'TRUNCATE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001781. [ldap2pg.inspector DEBUG] Found GRANT __truncate_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __truncate_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'TRUNCATE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001517. [ldap2pg.inspector DEBUG] Found GRANT __truncate_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_sequences__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('S') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000529. [ldap2pg.inspector DEBUG] Found GRANT __update_on_all_sequences__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_sequences__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('S') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000463. [ldap2pg.inspector DEBUG] Found GRANT __update_on_all_sequences__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_tables__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001683. [ldap2pg.inspector DEBUG] Found GRANT __update_on_all_tables__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_tables__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.001919. [ldap2pg.inspector DEBUG] Found GRANT __update_on_all_tables__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_all_sequences__ in template1. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('S') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'USAGE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000657. [ldap2pg.inspector DEBUG] Found GRANT __usage_on_all_sequences__ on template1.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_all_sequences__ in postgres. [ldap2pg.psql DEBUG] Doing: [ldap2pg.psql DEBUG] WITH [ldap2pg.psql DEBUG] namespace_rels AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nsp.oid, [ldap2pg.psql DEBUG] nsp.nspname, [ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp [ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel [ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S') [ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%' [ldap2pg.psql DEBUG] AND nspname <> 'pg_toast' [ldap2pg.psql DEBUG] GROUP BY 1, 2 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_grants AS ( [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] relnamespace, [ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type, [ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee, [ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels [ldap2pg.psql DEBUG] FROM pg_catalog.pg_class [ldap2pg.psql DEBUG] WHERE relkind IN ('S') [ldap2pg.psql DEBUG] GROUP BY 1, 2, 3 [ldap2pg.psql DEBUG] ), [ldap2pg.psql DEBUG] all_roles AS ( [ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname [ldap2pg.psql DEBUG] UNION [ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles [ldap2pg.psql DEBUG] ) [ldap2pg.psql DEBUG] SELECT [ldap2pg.psql DEBUG] nspname, [ldap2pg.psql DEBUG] rolname, [ldap2pg.psql DEBUG] CASE [ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL [ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[]) [ldap2pg.psql DEBUG] END AS "full" [ldap2pg.psql DEBUG] FROM namespace_rels AS nsp [ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol [ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants [ldap2pg.psql DEBUG] ON relnamespace = nsp.oid [ldap2pg.psql DEBUG] AND grantee = rol.oid [ldap2pg.psql DEBUG] AND privilege_type = 'USAGE' [ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL) [ldap2pg.psql DEBUG] -- ORDER BY 1, 2 [ldap2pg.inspector DEBUG] Took 0:00:00.000571. [ldap2pg.inspector DEBUG] Found GRANT __usage_on_all_sequences__ on postgres.public for * to public (n/a). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_schemas__ in template1. [ldap2pg.inspector DEBUG] Reusing shared query cache nspacl. [ldap2pg.inspector DEBUG] Found GRANT __usage_on_schemas__ on template1.public for * to public (full). [ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_schemas__ in postgres. [ldap2pg.inspector DEBUG] Reusing shared query cache nspacl. [ldap2pg.inspector DEBUG] Found GRANT __usage_on_schemas__ on postgres.public for * to public (full). [ldap2pg.manager DEBUG] Want GRANT __create_on_schemas__ on template1.public for * to owners (full). [ldap2pg.manager DEBUG] Want GRANT __create_on_schemas__ on postgres.public for * to owners (full). [ldap2pg.manager DEBUG] Want GRANT __delete_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __delete_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __insert_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __insert_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __references_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __references_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __temporary__ on template1.* for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __temporary__ on postgres.* for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __trigger_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __trigger_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __truncate_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __truncate_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __update_on_all_sequences__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __update_on_all_sequences__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __update_on_all_tables__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __update_on_all_tables__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __usage_on_all_sequences__ on template1.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __usage_on_all_sequences__ on postgres.public for * to writers (full). [ldap2pg.manager DEBUG] Want GRANT __connect__ on template1.* for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __connect__ on postgres.* for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on template1.public for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on postgres.public for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on template1.public for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on postgres.public for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __usage_on_schemas__ on template1.public for * to readers (full). [ldap2pg.manager DEBUG] Want GRANT __usage_on_schemas__ on postgres.public for * to readers (full). [ldap2pg.psql CHANG] Would revoke __connect__ on postgres from public. [ldap2pg.psql DEBUG] Would execute: REVOKE CONNECT ON DATABASE "postgres" FROM "public"; [ldap2pg.psql CHANG] Would revoke __create_on_schemas__ on postgres.public from public. [ldap2pg.psql DEBUG] Would execute: REVOKE CREATE ON SCHEMA "public" FROM "public"; [ldap2pg.psql CHANG] Would revoke __temporary__ on postgres from public. [ldap2pg.psql DEBUG] Would execute: REVOKE TEMPORARY ON DATABASE "postgres" FROM "public"; [ldap2pg.psql CHANG] Would revoke __usage_on_schemas__ on postgres.public from public. [ldap2pg.psql DEBUG] Would execute: REVOKE USAGE ON SCHEMA "public" FROM "public"; [ldap2pg.psql CHANG] Would revoke __connect__ on template1 from public. [ldap2pg.psql DEBUG] Would execute: REVOKE CONNECT ON DATABASE "template1" FROM "public"; [ldap2pg.psql CHANG] Would revoke __create_on_schemas__ on template1.public from public. [ldap2pg.psql DEBUG] Would execute: REVOKE CREATE ON SCHEMA "public" FROM "public"; [ldap2pg.psql CHANG] Would revoke __usage_on_schemas__ on template1.public from public. [ldap2pg.psql DEBUG] Would execute: REVOKE USAGE ON SCHEMA "public" FROM "public"; [ldap2pg.psql CHANG] Would grant __create_on_schemas__ on postgres.public to owners. [ldap2pg.psql DEBUG] Would execute: GRANT CREATE ON SCHEMA "public" TO "owners"; [ldap2pg.psql CHANG] Would grant __connect__ on postgres to readers. [ldap2pg.psql DEBUG] Would execute: GRANT CONNECT ON DATABASE "postgres" TO "readers"; [ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on postgres.public to readers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "readers" [ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on postgres.public to readers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "readers" [ldap2pg.psql CHANG] Would grant __usage_on_schemas__ on postgres.public to readers. [ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON SCHEMA "public" TO "readers"; [ldap2pg.psql CHANG] Would grant __delete_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT DELETE ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __insert_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT INSERT ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __references_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT REFERENCES ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __temporary__ on postgres to writers. [ldap2pg.psql DEBUG] Would execute: GRANT TEMPORARY ON DATABASE "postgres" TO "writers"; [ldap2pg.psql CHANG] Would grant __trigger_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT TRIGGER ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __truncate_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT TRUNCATE ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __update_on_all_sequences__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL SEQUENCES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __update_on_all_tables__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __usage_on_all_sequences__ on postgres.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON ALL SEQUENCES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __create_on_schemas__ on template1.public to owners. [ldap2pg.psql DEBUG] Would execute: GRANT CREATE ON SCHEMA "public" TO "owners"; [ldap2pg.psql CHANG] Would grant __connect__ on template1 to readers. [ldap2pg.psql DEBUG] Would execute: GRANT CONNECT ON DATABASE "template1" TO "readers"; [ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on template1.public to readers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "readers" [ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on template1.public to readers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "readers" [ldap2pg.psql CHANG] Would grant __usage_on_schemas__ on template1.public to readers. [ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON SCHEMA "public" TO "readers"; [ldap2pg.psql CHANG] Would grant __delete_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT DELETE ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __insert_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT INSERT ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __references_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT REFERENCES ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __temporary__ on template1 to writers. [ldap2pg.psql DEBUG] Would execute: GRANT TEMPORARY ON DATABASE "template1" TO "writers"; [ldap2pg.psql CHANG] Would grant __trigger_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT TRIGGER ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __truncate_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT TRUNCATE ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __update_on_all_sequences__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL SEQUENCES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __update_on_all_tables__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL TABLES IN SCHEMA "public" TO "writers" [ldap2pg.psql CHANG] Would grant __usage_on_all_sequences__ on template1.public to writers. [ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON ALL SEQUENCES IN SCHEMA "public" TO "writers" [ldap2pg.manager INFO] Generated 48 querie(s). [ldap2pg.psql DEBUG] Closing connection to libpq default. [ldap2pg.psql DEBUG] Closing connection to template1. [ldap2pg.psql DEBUG] Closing connection to postgres. [ldap2pg.script INFO] Comparison complete. [ldap2pg.script DEBUG] Inspecting Postgres took 0:00:00.031821. [ldap2pg.script DEBUG] Searching directory took 0:00:00.000634. [ldap2pg.script DEBUG] Synchronizing Postgres took 0:00:00. [ldap2pg.script DEBUG] Used up to 41.0MiB of memory.