Name: | usage_privileges |
Owner: | postgres |
Has rules: | |
Has Triggers: | |
Comment: |
Name | Type | Length | |
|
grantor | sql_identifier | -1 |
|
grantee | sql_identifier | -1 |
|
object_catalog | sql_identifier | -1 |
|
object_schema | sql_identifier | -1 |
|
object_name | sql_identifier | -1 |
|
object_type | character_data | -1 |
|
privilege_type | character_data | -1 |
|
is_grantable | character_data | -1 |
CREATE VIEW usage_privileges AS
SELECT (u.rolname)::sql_identifier AS grantor, ('PUBLIC'::character varying)::sql_identifier AS grantee, (current_database())::sql_identifier AS object_catalog, (n.nspname)::sql_identifier AS object_schema, (t.typname)::sql_identifier AS object_name, ('DOMAIN'::character varying)::character_data AS object_type, ('USAGE'::character varying)::character_data AS privilege_type, ('NO'::character varying)::character_data AS is_grantable FROM pg_authid u, pg_namespace n, pg_type t WHERE (((u.oid = t.typowner) AND (t.typnamespace = n.oid)) AND (t.typtype = 'd'::"char"));
ALTER TABLE information_schema.usage_privileges OWNER TO postgres;
See Also
List of views