(because our legacy application, which won't change, is using the
underlying tables. We can't do step #5). Bryce Nesbitt wrote: Yes, the view approach has some advantages. But it still leaves the underlying tables naked to modification. And since the most likely error is... well... me (or another admin) at the SQL prompt, we want underlying tables protected also.chester c young wrote:instead of triggers I use update-able views and permissions. 1. all dml goes through the view 2. use rules on the view to do dml to the table 3. in rules prevent updating all/any columns when whatever 4. grant dml to view to your pgconnect user 5. revoke dml from table to your pgconnect user imho another instance where rules rule. for example, you can easily fit logging into the same view. -- ---- Visit http://www.obviously.com/ |
- [SQL] Proposed archival read only trigger on rows - preven... Bryce Nesbitt
- Re: [SQL] Proposed archival read only trigger on rows... chester c young
- Re: [SQL] Proposed archival read only trigger on ... Bryce Nesbitt
- Re: [SQL] Proposed archival read only trigger... Bryce Nesbitt
- Re: [SQL] Proposed archival read only trigger... Robert Treat
- Re: [SQL] Proposed archival read only tri... Phillip Smith