Skip to content

Conversation

@mmeent-databricks
Copy link

This functionality can allow users to get temporary SU permisions, within a certain scope.

This functionality can allow users to get temporary SU permisions, within
a certain scope.  See $hadron$/pgxn/neon/su_statements.c for details.
result = ((Form_pg_authid) GETSTRUCT(rtup))->rolsuper;
ReleaseSysCache(rtup);

if (!result && SUForUser_hook != NULL)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we do this before the cache hit in line 63?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, our handling of this is cache-aware: Every time we add/drop a level of the stack we reset the cache.

tristan957 and others added 5 commits December 29, 2025 19:24
This is exactly what we do for privileged_role_name. It reduces the
amount of changes in the fork.

Signed-off-by: Tristan Partin <tristan.partin@databricks.com>
This functionality can allow users to get temporary SU permisions, within
a certain scope.  See $hadron$/pgxn/neon/su_statements.c for details.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants