system_configuration/root/database/pgsql/ldap2pg.verbose
2023-03-30 00:12:54 -07:00

1427 lines
89 KiB
Plaintext

[ldap2pg.config INFO] Starting ldap2pg 5.8.
[ldap2pg.config DEBUG] Trying ./ldap2pg.yml.
[ldap2pg.config INFO] Using /database/pgsql/ldap2pg.yml.
[ldap2pg.config DEBUG] Read check from argv.
[ldap2pg.config DEBUG] Read verbosity from argv.
[ldap2pg.config DEBUG] Read version from YAML.
[ldap2pg.config DEBUG] Read ldap:uri from YAML.
[ldap2pg.config DEBUG] Read ldap:binddn from YAML.
[ldap2pg.config DEBUG] Read ldap:password from YAML.
[ldap2pg.config DEBUG] Read postgres:dsn from YAML.
[ldap2pg.config DEBUG] Read postgres:databases_query from YAML.
[ldap2pg.config DEBUG] Read postgres:managed_roles_query from YAML.
[ldap2pg.config DEBUG] Read postgres:owners_query from YAML.
[ldap2pg.config DEBUG] Read postgres:schemas_query from YAML.
[ldap2pg.config DEBUG] Read privileges from YAML.
[ldap2pg.config DEBUG] Read sync_map from YAML.
[ldap2pg.config DEBUG] Drop unused inactive privilege __default_execute_on_functions__
[ldap2pg.config DEBUG] Drop unused inactive privilege __execute_on_all_functions__
[ldap2pg.config DEBUG] Drop unused inactive privilege __global_default_execute_on_functions__
[ldap2pg.config DEBUG] Configuration loaded.
[ldap2pg.script DEBUG] Setting up LDAP client.
[ldap2pg.ldap DEBUG] Found rcfile /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read SASL_NOCANON from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read HOST from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read URI from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read BASE from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read TLS_REQCERT from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read TLS_CACERTDIR from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Read SUDOERS_BASE from /etc/openldap/ldap.conf.
[ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/etc/ldap/ldap.conf'
[ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/database/pgsql/ldaprc'
[ldap2pg.ldap DEBUG] Ignoring: [Errno 2] No such file or directory: '/database/pgsql/.ldaprc'
[ldap2pg.ldap DEBUG] Read URI from YAML.
[ldap2pg.ldap DEBUG] Read BINDDN from YAML.
[ldap2pg.ldap DEBUG] Read PASSWORD from YAML.
[ldap2pg.ldap INFO] Connecting to LDAP server ldaps://jcolebrand.info.
[ldap2pg.ldap INFO] Trying simple bind.
[ldap2pg.ldap DEBUG] Authenticating: ldapwhoami -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W
[ldap2pg.script WARNI] Running in dry mode. Postgres will be untouched.
[ldap2pg.psql DEBUG] Opening connection to libpq default.
[ldap2pg.script DEBUG] Inspecting role attributes.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT array_agg(attrs.attname)
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace AS nsp
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_class AS tables
[ldap2pg.psql DEBUG] ON tables.relnamespace = nsp.oid AND tables.relname = 'pg_authid'
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_attribute AS attrs
[ldap2pg.psql DEBUG] ON attrs.attrelid = tables.oid AND attrs.attname LIKE 'rol%'
[ldap2pg.psql DEBUG] WHERE nsp.nspname = 'pg_catalog'
[ldap2pg.psql DEBUG] ORDER BY 1
[ldap2pg.role DEBUG] Postgres server supports role options BYPASSRLS, LOGIN, CREATEDB, CREATEROLE, INHERIT, REPLICATION, SUPERUSER.
[ldap2pg.manager INFO] Inspecting roles in Postgres cluster...
[ldap2pg.inspector DEBUG] Introspecting session Postgres role.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT current_user, rolsuper
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_roles
[ldap2pg.psql DEBUG] WHERE rolname = current_user;
[ldap2pg.inspector DEBUG] Inspecting databases.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT datname, rolname
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_database
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_roles
[ldap2pg.psql DEBUG] ON pg_catalog.pg_roles.oid = datdba
[ldap2pg.psql DEBUG] WHERE datallowconn;
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT datname FROM pg_catalog.pg_database;
[ldap2pg.inspector DEBUG] Inspecting all defined roles in cluster.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] role.rolname, array_agg(members.rolname) AS members,
[ldap2pg.psql DEBUG] role.rolbypassrls, role.rolcanlogin, role.rolcreatedb, role.rolcreaterole, role.rolinherit, role.rolreplication, role.rolsuper,
[ldap2pg.psql DEBUG] pg_catalog.shobj_description(role.oid, 'pg_authid') as comment
[ldap2pg.psql DEBUG] FROM
[ldap2pg.psql DEBUG] pg_catalog.pg_roles AS role
[ldap2pg.psql DEBUG] LEFT JOIN pg_catalog.pg_auth_members ON roleid = role.oid
[ldap2pg.psql DEBUG] LEFT JOIN pg_catalog.pg_roles AS members ON members.oid = member
[ldap2pg.psql DEBUG] GROUP BY role.rolname, role.rolbypassrls, role.rolcanlogin, role.rolcreatedb, role.rolcreaterole, role.rolinherit, role.rolreplication, role.rolsuper, comment
[ldap2pg.psql DEBUG] ORDER BY 1;
[ldap2pg.inspector DEBUG] Listing managed roles.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT ('public')
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT ('ldap_roles')
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT DISTINCT role.rolname
[ldap2pg.psql DEBUG] FROM pg_roles AS role
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_auth_members AS ms ON ms.member = role.oid
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_roles AS ldap_roles
[ldap2pg.psql DEBUG] ON ldap_roles.rolname = 'ldap_roles' AND ldap_roles.oid = ms.roleid
[ldap2pg.psql DEBUG] WHERE role.rolname IN ('ldap_roles', 'readers', 'writers', 'owners')
[ldap2pg.psql DEBUG] OR ldap_roles.oid IS NOT NULL
[ldap2pg.psql DEBUG] ORDER BY 1;
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_server_files'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_data'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_stat_scan_tables'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_stats'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_write_server_files'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_write_all_data'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_database_owner'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_execute_server_program'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_read_all_settings'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] May reuse role 'ldap2pg'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_signal_backend'. Matches 'pg_*'.
[ldap2pg.inspector DEBUG] Ignoring role 'postgres'. Matches 'postgres'.
[ldap2pg.inspector DEBUG] Ignoring role 'pg_monitor'. Matches 'pg_*'.
[ldap2pg.manager DEBUG] Postgres roles inspection done.
[ldap2pg.manager INFO] Setup static roles and grants.
[ldap2pg.manager DEBUG] Want role ldap_roles from YAML.
[ldap2pg.manager DEBUG] Want role readers from YAML.
[ldap2pg.manager DEBUG] Want role writers from YAML.
[ldap2pg.manager DEBUG] Want role owners from YAML.
[ldap2pg.manager DEBUG] Want GRANT ro on __ALL_DATABASES__.* for * to readers (full) from YAML.
[ldap2pg.manager DEBUG] Want GRANT rw on __ALL_DATABASES__.* for * to writers (full) from YAML.
[ldap2pg.manager DEBUG] Want GRANT ddl on __ALL_DATABASES__.* for * to owners (full) from YAML.
[ldap2pg.manager INFO] Query LDAP to create superusers.
[ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=superuse...
[ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=superuser)' member
[ldap2pg.manager DEBUG] Got 1 entries from LDAP.
[ldap2pg.manager DEBUG] Want role cbrand in LDAP.
[ldap2pg.manager INFO] Query LDAP to create writers.
[ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=writers)...
[ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=writers)' member
[ldap2pg.manager DEBUG] Got 1 entries from LDAP.
[ldap2pg.manager INFO] Query LDAP to create readers.
[ldap2pg.manager INFO] Querying LDAP ou=ldap2pg,ou=groups,dc=... (cn=readers)...
[ldap2pg.ldap DEBUG] Doing: ldapsearch -x -D cn=postgres,ou=services,dc=jcolebrand,dc=info -W -b ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info -s sub '(cn=readers)' member
[ldap2pg.manager DEBUG] Got 1 entries from LDAP.
[ldap2pg.manager WARNI] Missing 'member' from cn=readers,ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info. Considering it as an empty list.
[ldap2pg.manager DEBUG] LDAP inspection completed. Post processing.
[ldap2pg.psql CHANG] Would create cbrand.
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "cbrand" WITH NOBYPASSRLS LOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION SUPERUSER;
[ldap2pg.psql DEBUG] COMMENT ON ROLE "cbrand" IS 'From LDAP groupe cn=writers,ou=ldap2pg,ou=groups,dc=jcolebrand,dc=info';
[ldap2pg.psql CHANG] Would create ldap_roles.
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "ldap_roles" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
[ldap2pg.psql DEBUG] COMMENT ON ROLE "ldap_roles" IS 'Managed by ldap2pg';
[ldap2pg.psql CHANG] Would add ldap_roles members.
[ldap2pg.psql DEBUG] Would execute: GRANT "ldap_roles" TO "cbrand";
[ldap2pg.psql CHANG] Would create owners.
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "owners" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
[ldap2pg.psql DEBUG] COMMENT ON ROLE "owners" IS 'Managed by ldap2pg';
[ldap2pg.psql CHANG] Would add owners members.
[ldap2pg.psql DEBUG] Would execute: GRANT "owners" TO "cbrand";
[ldap2pg.psql CHANG] Would create writers.
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "writers" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
[ldap2pg.psql DEBUG] COMMENT ON ROLE "writers" IS 'Managed by ldap2pg';
[ldap2pg.psql CHANG] Would add writers members.
[ldap2pg.psql DEBUG] Would execute: GRANT "writers" TO "owners", "cbrand";
[ldap2pg.psql CHANG] Would create readers.
[ldap2pg.psql DEBUG] Would execute: CREATE ROLE "readers" WITH NOBYPASSRLS NOLOGIN NOCREATEDB NOCREATEROLE INHERIT NOREPLICATION NOSUPERUSER;
[ldap2pg.psql DEBUG] COMMENT ON ROLE "readers" IS 'Managed by ldap2pg';
[ldap2pg.psql CHANG] Would add readers members.
[ldap2pg.psql DEBUG] Would execute: GRANT "readers" TO "writers";
[ldap2pg.manager INFO] Inspecting GRANTs in Postgres cluster...
[ldap2pg.manager WARNI] In dry mode, some owners aren't created, their default privileges can't be determined.
[ldap2pg.inspector DEBUG] Inspecting schemas in template1
[ldap2pg.psql DEBUG] Opening connection to template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT nspname FROM pg_catalog.pg_namespace
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg_%' AND nspname <> 'information_schema'
[ldap2pg.psql DEBUG] ORDER BY 1;
[ldap2pg.inspector DEBUG] Found schemas public in template1.
[ldap2pg.inspector DEBUG] Globally inspecting owners...
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT DISTINCT role.rolname
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_roles AS role
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_auth_members AS ms ON ms.member = role.oid
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_roles AS owners
[ldap2pg.psql DEBUG] ON owners.rolname = 'owners' AND owners.oid = ms.roleid
[ldap2pg.psql DEBUG] ORDER BY 1;
[ldap2pg.inspector DEBUG] Inspecting schemas in postgres
[ldap2pg.psql DEBUG] Opening connection to postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] SELECT nspname FROM pg_catalog.pg_namespace
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg_%' AND nspname <> 'information_schema'
[ldap2pg.psql DEBUG] ORDER BY 1;
[ldap2pg.inspector DEBUG] Found schemas public in postgres.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __connect__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] (aclexplode(datacl)).grantee AS grantee,
[ldap2pg.psql DEBUG] (aclexplode(datacl)).privilege_type AS priv
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_database
[ldap2pg.psql DEBUG] WHERE datname = current_database()
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT q.*
[ldap2pg.psql DEBUG] FROM (VALUES (0, 'CONNECT'), (0, 'TEMPORARY')) AS q
[ldap2pg.psql DEBUG] CROSS JOIN pg_catalog.pg_database
[ldap2pg.psql DEBUG] WHERE datacl IS NULL AND datname = current_database()
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] grants.priv AS key,
[ldap2pg.psql DEBUG] NULL as namespace,
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public')
[ldap2pg.psql DEBUG] FROM grants
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
[ldap2pg.psql DEBUG] WHERE grantee = 0 OR rolname IS NOT NULL
[ldap2pg.inspector DEBUG] Took 0:00:00.000925.
[ldap2pg.inspector DEBUG] Found GRANT __connect__ on template1.* for * to public (full).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __connect__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] (aclexplode(datacl)).grantee AS grantee,
[ldap2pg.psql DEBUG] (aclexplode(datacl)).privilege_type AS priv
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_database
[ldap2pg.psql DEBUG] WHERE datname = current_database()
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT q.*
[ldap2pg.psql DEBUG] FROM (VALUES (0, 'CONNECT'), (0, 'TEMPORARY')) AS q
[ldap2pg.psql DEBUG] CROSS JOIN pg_catalog.pg_database
[ldap2pg.psql DEBUG] WHERE datacl IS NULL AND datname = current_database()
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] grants.priv AS key,
[ldap2pg.psql DEBUG] NULL as namespace,
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public')
[ldap2pg.psql DEBUG] FROM grants
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
[ldap2pg.psql DEBUG] WHERE grantee = 0 OR rolname IS NOT NULL
[ldap2pg.inspector DEBUG] Took 0:00:00.000725.
[ldap2pg.inspector DEBUG] Found GRANT __connect__ on postgres.* for * to public (full).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __create_on_schemas__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).grantee AS grantee,
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).privilege_type AS priv
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] grants.priv AS key,
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname
[ldap2pg.psql DEBUG] FROM grants
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000250.
[ldap2pg.inspector DEBUG] Found GRANT __create_on_schemas__ on template1.public for * to public (full).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __create_on_schemas__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).grantee AS grantee,
[ldap2pg.psql DEBUG] (aclexplode(nspacl)).privilege_type AS priv
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] grants.priv AS key,
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname
[ldap2pg.psql DEBUG] FROM grants
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000221.
[ldap2pg.inspector DEBUG] Found GRANT __create_on_schemas__ on postgres.public for * to public (full).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_delete_on_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] defaclnamespace,
[ldap2pg.psql DEBUG] defaclrole,
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).grantee AS grantee,
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).privilege_type AS priv,
[ldap2pg.psql DEBUG] defaclobjtype AS objtype
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_default_acl
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] priv || '_on_' || objtype AS key,
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname,
[ldap2pg.psql DEBUG] TRUE AS full,
[ldap2pg.psql DEBUG] pg_catalog.pg_get_userbyid(defaclrole) AS owner
[ldap2pg.psql DEBUG] FROM grants
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_namespace nsp ON nsp.oid = defaclnamespace
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2, 3, 5
[ldap2pg.inspector DEBUG] Took 0:00:00.000327.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_delete_on_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] defaclnamespace,
[ldap2pg.psql DEBUG] defaclrole,
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).grantee AS grantee,
[ldap2pg.psql DEBUG] (aclexplode(defaclacl)).privilege_type AS priv,
[ldap2pg.psql DEBUG] defaclobjtype AS objtype
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_default_acl
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] priv || '_on_' || objtype AS key,
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] COALESCE(rolname, 'public') AS rolname,
[ldap2pg.psql DEBUG] TRUE AS full,
[ldap2pg.psql DEBUG] pg_catalog.pg_get_userbyid(defaclrole) AS owner
[ldap2pg.psql DEBUG] FROM grants
[ldap2pg.psql DEBUG] JOIN pg_catalog.pg_namespace nsp ON nsp.oid = defaclnamespace
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_roles AS rol ON grants.grantee = rol.oid
[ldap2pg.psql DEBUG] WHERE (grantee = 0 OR rolname IS NOT NULL)
[ldap2pg.psql DEBUG] AND nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2, 3, 5
[ldap2pg.inspector DEBUG] Took 0:00:00.000292.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_insert_on_tables__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_insert_on_tables__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_references_on_tables__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_references_on_tables__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_sequences__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_sequences__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_tables__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_select_on_tables__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_trigger_on_tables__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_trigger_on_tables__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_truncate_on_tables__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_truncate_on_tables__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_sequences__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_sequences__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_tables__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_update_on_tables__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_sequences__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_sequences__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_types__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __default_usage_on_types__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache defacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __delete_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'DELETE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001743.
[ldap2pg.inspector DEBUG] Found GRANT __delete_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __delete_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'DELETE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001833.
[ldap2pg.inspector DEBUG] Found GRANT __delete_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __insert_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'INSERT'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001530.
[ldap2pg.inspector DEBUG] Found GRANT __insert_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __insert_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'INSERT'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001625.
[ldap2pg.inspector DEBUG] Found GRANT __insert_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __references_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'REFERENCES'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001615.
[ldap2pg.inspector DEBUG] Found GRANT __references_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __references_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'REFERENCES'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001499.
[ldap2pg.inspector DEBUG] Found GRANT __references_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_sequences__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000529.
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_sequences__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_sequences__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000445.
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_sequences__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001378.
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __select_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'SELECT'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001594.
[ldap2pg.inspector DEBUG] Found GRANT __select_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __temporary__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache datacl.
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __temporary__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache datacl.
[ldap2pg.inspector DEBUG] Found GRANT __temporary__ on postgres.* for * to public (full).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __trigger_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'TRIGGER'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001487.
[ldap2pg.inspector DEBUG] Found GRANT __trigger_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __trigger_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'TRIGGER'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001569.
[ldap2pg.inspector DEBUG] Found GRANT __trigger_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __truncate_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'TRUNCATE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001781.
[ldap2pg.inspector DEBUG] Found GRANT __truncate_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __truncate_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'TRUNCATE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001517.
[ldap2pg.inspector DEBUG] Found GRANT __truncate_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_sequences__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000529.
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_sequences__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_sequences__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000463.
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_sequences__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_tables__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001683.
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_tables__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __update_on_all_tables__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('r', 'v', 'f')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'UPDATE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.001919.
[ldap2pg.inspector DEBUG] Found GRANT __update_on_all_tables__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_all_sequences__ in template1.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'USAGE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000657.
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_all_sequences__ on template1.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_all_sequences__ in postgres.
[ldap2pg.psql DEBUG] Doing:
[ldap2pg.psql DEBUG] WITH
[ldap2pg.psql DEBUG] namespace_rels AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nsp.oid,
[ldap2pg.psql DEBUG] nsp.nspname,
[ldap2pg.psql DEBUG] array_remove(array_agg(rel.relname ORDER BY rel.relname), NULL) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_namespace nsp
[ldap2pg.psql DEBUG] LEFT OUTER JOIN pg_catalog.pg_class AS rel
[ldap2pg.psql DEBUG] ON rel.relnamespace = nsp.oid AND relkind IN ('S')
[ldap2pg.psql DEBUG] WHERE nspname NOT LIKE 'pg\_%temp\_%'
[ldap2pg.psql DEBUG] AND nspname <> 'pg_toast'
[ldap2pg.psql DEBUG] GROUP BY 1, 2
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_grants AS (
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] relnamespace,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).privilege_type,
[ldap2pg.psql DEBUG] (aclexplode(relacl)).grantee,
[ldap2pg.psql DEBUG] array_agg(relname ORDER BY relname) AS rels
[ldap2pg.psql DEBUG] FROM pg_catalog.pg_class
[ldap2pg.psql DEBUG] WHERE relkind IN ('S')
[ldap2pg.psql DEBUG] GROUP BY 1, 2, 3
[ldap2pg.psql DEBUG] ),
[ldap2pg.psql DEBUG] all_roles AS (
[ldap2pg.psql DEBUG] SELECT 0 AS oid, 'public' AS rolname
[ldap2pg.psql DEBUG] UNION
[ldap2pg.psql DEBUG] SELECT oid, rolname from pg_roles
[ldap2pg.psql DEBUG] )
[ldap2pg.psql DEBUG] SELECT
[ldap2pg.psql DEBUG] nspname,
[ldap2pg.psql DEBUG] rolname,
[ldap2pg.psql DEBUG] CASE
[ldap2pg.psql DEBUG] WHEN nsp.rels = ARRAY[]::name[] THEN NULL
[ldap2pg.psql DEBUG] ELSE nsp.rels = COALESCE(grants.rels, ARRAY[]::name[])
[ldap2pg.psql DEBUG] END AS "full"
[ldap2pg.psql DEBUG] FROM namespace_rels AS nsp
[ldap2pg.psql DEBUG] CROSS JOIN all_roles AS rol
[ldap2pg.psql DEBUG] LEFT OUTER JOIN all_grants AS grants
[ldap2pg.psql DEBUG] ON relnamespace = nsp.oid
[ldap2pg.psql DEBUG] AND grantee = rol.oid
[ldap2pg.psql DEBUG] AND privilege_type = 'USAGE'
[ldap2pg.psql DEBUG] WHERE NOT (array_length(nsp.rels, 1) IS NOT NULL AND grants.rels IS NULL)
[ldap2pg.psql DEBUG] -- ORDER BY 1, 2
[ldap2pg.inspector DEBUG] Took 0:00:00.000571.
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_all_sequences__ on postgres.public for * to public (n/a).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_schemas__ in template1.
[ldap2pg.inspector DEBUG] Reusing shared query cache nspacl.
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_schemas__ on template1.public for * to public (full).
[ldap2pg.inspector DEBUG] Searching GRANTs of privilege __usage_on_schemas__ in postgres.
[ldap2pg.inspector DEBUG] Reusing shared query cache nspacl.
[ldap2pg.inspector DEBUG] Found GRANT __usage_on_schemas__ on postgres.public for * to public (full).
[ldap2pg.manager DEBUG] Want GRANT __create_on_schemas__ on template1.public for * to owners (full).
[ldap2pg.manager DEBUG] Want GRANT __create_on_schemas__ on postgres.public for * to owners (full).
[ldap2pg.manager DEBUG] Want GRANT __delete_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __delete_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __insert_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __insert_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __references_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __references_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __temporary__ on template1.* for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __temporary__ on postgres.* for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __trigger_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __trigger_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __truncate_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __truncate_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_sequences__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_sequences__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_tables__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __update_on_all_tables__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __usage_on_all_sequences__ on template1.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __usage_on_all_sequences__ on postgres.public for * to writers (full).
[ldap2pg.manager DEBUG] Want GRANT __connect__ on template1.* for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __connect__ on postgres.* for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on template1.public for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_sequences__ on postgres.public for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on template1.public for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __select_on_all_tables__ on postgres.public for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __usage_on_schemas__ on template1.public for * to readers (full).
[ldap2pg.manager DEBUG] Want GRANT __usage_on_schemas__ on postgres.public for * to readers (full).
[ldap2pg.psql CHANG] Would revoke __connect__ on postgres from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE CONNECT ON DATABASE "postgres" FROM "public";
[ldap2pg.psql CHANG] Would revoke __create_on_schemas__ on postgres.public from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE CREATE ON SCHEMA "public" FROM "public";
[ldap2pg.psql CHANG] Would revoke __temporary__ on postgres from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE TEMPORARY ON DATABASE "postgres" FROM "public";
[ldap2pg.psql CHANG] Would revoke __usage_on_schemas__ on postgres.public from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE USAGE ON SCHEMA "public" FROM "public";
[ldap2pg.psql CHANG] Would revoke __connect__ on template1 from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE CONNECT ON DATABASE "template1" FROM "public";
[ldap2pg.psql CHANG] Would revoke __create_on_schemas__ on template1.public from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE CREATE ON SCHEMA "public" FROM "public";
[ldap2pg.psql CHANG] Would revoke __usage_on_schemas__ on template1.public from public.
[ldap2pg.psql DEBUG] Would execute: REVOKE USAGE ON SCHEMA "public" FROM "public";
[ldap2pg.psql CHANG] Would grant __create_on_schemas__ on postgres.public to owners.
[ldap2pg.psql DEBUG] Would execute: GRANT CREATE ON SCHEMA "public" TO "owners";
[ldap2pg.psql CHANG] Would grant __connect__ on postgres to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT CONNECT ON DATABASE "postgres" TO "readers";
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on postgres.public to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "readers"
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on postgres.public to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "readers"
[ldap2pg.psql CHANG] Would grant __usage_on_schemas__ on postgres.public to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON SCHEMA "public" TO "readers";
[ldap2pg.psql CHANG] Would grant __delete_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT DELETE ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __insert_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT INSERT ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __references_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT REFERENCES ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __temporary__ on postgres to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT TEMPORARY ON DATABASE "postgres" TO "writers";
[ldap2pg.psql CHANG] Would grant __trigger_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT TRIGGER ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __truncate_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT TRUNCATE ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __update_on_all_sequences__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __update_on_all_tables__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __usage_on_all_sequences__ on postgres.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __create_on_schemas__ on template1.public to owners.
[ldap2pg.psql DEBUG] Would execute: GRANT CREATE ON SCHEMA "public" TO "owners";
[ldap2pg.psql CHANG] Would grant __connect__ on template1 to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT CONNECT ON DATABASE "template1" TO "readers";
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on template1.public to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "readers"
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on template1.public to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "readers"
[ldap2pg.psql CHANG] Would grant __usage_on_schemas__ on template1.public to readers.
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON SCHEMA "public" TO "readers";
[ldap2pg.psql CHANG] Would grant __delete_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT DELETE ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __insert_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT INSERT ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __references_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT REFERENCES ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __select_on_all_sequences__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __select_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT SELECT ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __temporary__ on template1 to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT TEMPORARY ON DATABASE "template1" TO "writers";
[ldap2pg.psql CHANG] Would grant __trigger_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT TRIGGER ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __truncate_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT TRUNCATE ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __update_on_all_sequences__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __update_on_all_tables__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT UPDATE ON ALL TABLES IN SCHEMA "public" TO "writers"
[ldap2pg.psql CHANG] Would grant __usage_on_all_sequences__ on template1.public to writers.
[ldap2pg.psql DEBUG] Would execute: GRANT USAGE ON ALL SEQUENCES IN SCHEMA "public" TO "writers"
[ldap2pg.manager INFO] Generated 48 querie(s).
[ldap2pg.psql DEBUG] Closing connection to libpq default.
[ldap2pg.psql DEBUG] Closing connection to template1.
[ldap2pg.psql DEBUG] Closing connection to postgres.
[ldap2pg.script INFO] Comparison complete.
[ldap2pg.script DEBUG] Inspecting Postgres took 0:00:00.031821.
[ldap2pg.script DEBUG] Searching directory took 0:00:00.000634.
[ldap2pg.script DEBUG] Synchronizing Postgres took 0:00:00.
[ldap2pg.script DEBUG] Used up to 41.0MiB of memory.