mirror of
https://github.com/neondatabase/neon.git
synced 2026-01-08 14:02:55 +00:00
Previously, we were granting create only to db owner, but now we have a dedicated 'web_access' role to connect via web UI and proxy link auth. We anyway grant read / write all data to all roles, so let's grant create to everyone too. This creates some provelege objects in each db, which we need to drop before deleting the role. So now we reassign all owned objects to each db owner before deletion. This also fixes deletion of roles that created some data in any db previously. Will be tested by https://github.com/neondatabase/cloud/pull/1673 Later we should stop messing with Postgres ACL that much.
23 lines
760 B
TOML
23 lines
760 B
TOML
[package]
|
|
name = "compute_tools"
|
|
version = "0.1.0"
|
|
edition = "2021"
|
|
|
|
[dependencies]
|
|
libc = "0.2"
|
|
anyhow = "1.0"
|
|
chrono = "0.4"
|
|
clap = "3.0"
|
|
env_logger = "0.9"
|
|
hyper = { version = "0.14", features = ["full"] }
|
|
log = { version = "0.4", features = ["std", "serde"] }
|
|
postgres = { git = "https://github.com/zenithdb/rust-postgres.git", rev="d052ee8b86fff9897c77b0fe89ea9daba0e1fa38" }
|
|
regex = "1"
|
|
serde = { version = "1.0", features = ["derive"] }
|
|
serde_json = "1"
|
|
tar = "0.4"
|
|
tokio = { version = "1.17", features = ["macros", "rt", "rt-multi-thread"] }
|
|
tokio-postgres = { git = "https://github.com/zenithdb/rust-postgres.git", rev="d052ee8b86fff9897c77b0fe89ea9daba0e1fa38" }
|
|
urlencoding = "2.1.0"
|
|
workspace_hack = { version = "0.1", path = "../workspace_hack" }
|