• Peter Eisentraut's avatar
    Revise the permission checking on user mapping DDL commands. · 93a6be63
    Peter Eisentraut authored
    CREATE/ALTER/DROP USER MAPPING are now allowed either by the server owner or
    by a user with USAGE privileges for his own user name.  This is more or less
    what the SQL standard wants anyway (plus "implementation-defined")
    
    Hide information_schema.user_mapping_options.option_value, unless the current
    user is the one associated with the user mapping, or is the server owner and
    the mapping is for PUBLIC, or is a superuser.  This is to protect passwords.
    
    Also, fix a bug in information_schema._pg_foreign_servers, which hid servers
    using wrappers where the current user did not have privileges on the wrapper.
    The correct behavior is to hide servers where the current user has no
    privileges on the server.
    93a6be63
foreign_data.sql 16.9 KB