summaryrefslogtreecommitdiff
path: root/database/postgresql/postgresql_user.py
Commit message (Collapse)AuthorAgeFilesLines
* Refreshed metadata for core modulesToshio Kuratomi2016-12-061-0/+4
|
* Call main in conditional way - databasesFabio Alessandro Locati2016-12-051-1/+3
|
* double quotes for consistencyJohn R Barker2016-11-141-1/+1
|
* Need to quote if there is a `:`John R Barker2016-11-141-1/+1
|
* Change examples syntax on postgresql_user moduleSam Doran2016-11-141-5/+24
|
* Do not leak various passwords in log (#5202)Michael Scherer2016-10-131-2/+2
|
* Port postgresql module to python3 (#4579)Michael Scherer2016-08-311-3/+4
| | | | Iteritems is no longer a dict method in Python3, replace it with the six wrapper.
* Removing double definition in postgresql_user module (#3714)Jiri Tyr2016-05-241-3/+0
| | | | This commit is removing double definition of variables in the grant_privileges function of the postgresql_user module.
* Convert all databases modules to python3 and 2.4 syntax (#3688)Michael Scherer2016-05-181-8/+15
|
* @lorin stepping down as maintainerGreg DeKoenigsberg2015-10-281-1/+1
|
* Ensure TEMP privilege gets removed when expanding ALL.Will Thames2015-07-221-2/+2
| | | | | | | ALL gets expanded to the list of VALID_PRIVS which includes TEMPORARY and TEMP The code that replaced TEMP with TEMPORARY didn't work with the expansion
* Correct handling of empty role_attr_flagsWill Thames2015-07-221-2/+2
| | | | role_attr_flags is the empty string by default, not None.
* Proper author info for all remaining modulesGreg DeKoenigsberg2015-06-151-1/+1
|
* Fix a problem introduced with #1101 and optimize privilege handlingToshio Kuratomi2015-06-011-4/+3
| | | | | | | | | | * If a db user belonged to a role which had a privilege, the user would not have the privilege added as the role gave the appearance that the user already had it. Fixed to always check the privileges specific to the user. * Make fewer db queries to determine if privileges need to be changed and change them (was four for each privilege. Now two for each object that has a set of privileges changed).
* Perform privilege grants/revokes only when requiredWill Thames2015-06-011-0/+4
| | | | | | | Use `has_table_privileges` and `has_database_privileges` to test whether a user already has a privilege before granting it, or whether a user doesn't have a privilege before revoking it.
* Fix a problem introduced with #1101 and optimize privilege handlingToshio Kuratomi2015-05-191-55/+81
| | | | | | | | | | * If a db user belonged to a role which had a privilege, the user would not have the privilege added as the role gave the appearance that the user already had it. Fixed to always check the privileges specific to the user. * Make fewer db queries to determine if privileges need to be changed and change them (was four for each privilege. Now two for each object that has a set of privileges changed).
* Fix splitting of role_attrsToshio Kuratomi2015-05-181-1/+1
|
* Usage is not a valid database or table privilegeWill Thames2015-04-081-4/+4
| | | | | | | | | Remove `USAGE` from the `VALID_PRIVS` dict for both database and table because it is not a valid privilege for either (and breaks the implementation of `has_table_privilege` and `has_database_privilege` See http://www.postgresql.org/docs/9.0/static/sql-grant.html
* Perform privilege grants/revokes only when requiredWill Thames2015-04-081-10/+12
| | | | | | | Use `has_table_privileges` and `has_database_privileges` to test whether a user already has a privilege before granting it, or whether a user doesn't have a privilege before revoking it.
* Update postgresql users only when necessaryWill Thames2015-04-081-4/+52
| | | | | | | | | | | | For read-only databases, users should not change when no changes are required. Don't issue ALTER ROLE when role attribute flags, users password or expiry time is not changing. In certain cases (hashed passwords in the DB, but the password argument is not hashed) passlib.hash is required to avoid running ALTER ROLE.
* code review fixes per #957tedder2015-03-301-2/+3
|
* skip password changes so pg_authid isn't neededtedder2015-03-301-3/+11
| | | | | | Some places ([AWS RDS](https://forums.aws.amazon.com/thread.jspa?threadID=151248)) don't have, or don't allow, access to the `pg_authid` table. The only reason that is necessary is to check for a password change. This flag is a workaround so passwords can only be set at creation time. It isn't as elegant as changing the password down the line, but it fixes the longstanding issue #297 that prevented this from being useful on AWS RDS.
* Add USAGE as a valid privilegeToshio Kuratomi2014-12-031-2/+2
|
* Gixes to doc formattingToshio Kuratomi2014-12-031-1/+1
|
* Adds a unix_socket/login_unix_socket option to the postgresql_user module.Dan2014-12-011-0/+12
|
* Fix for single role_attrToshio Kuratomi2014-11-261-3/+5
|
* Fix user_alter in postgresql_userDevin Christensen2014-11-251-2/+2
|
* Fix user_add in postgresql_userDevin Christensen2014-11-251-1/+1
|
* Fix syntax errorDevin Christensen2014-11-251-1/+1
|
* Normalize privs and flags to uppercase so comparisons against allowed names ↵Toshio Kuratomi2014-11-251-5/+5
| | | | will work
* Audit escaping of identifiers in the postgresql_user moduleToshio Kuratomi2014-11-241-53/+86
|
* Some more module categorization.Michael DeHaan2014-11-041-0/+526