@@ -7985,7 +7985,7 @@ GetConfigOption(const char *name, bool missing_ok, bool restrict_privileged)
7985
7985
}
7986
7986
if (restrict_privileged &&
7987
7987
(record -> flags & GUC_SUPERUSER_ONLY ) &&
7988
- !is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS ))
7988
+ !is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS ))
7989
7989
ereport (ERROR ,
7990
7990
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
7991
7991
errmsg ("must be superuser or a member of pg_read_all_settings to examine \"%s\"" ,
@@ -8035,7 +8035,7 @@ GetConfigOptionResetString(const char *name)
8035
8035
(errcode (ERRCODE_UNDEFINED_OBJECT ),
8036
8036
errmsg ("unrecognized configuration parameter \"%s\"" , name )));
8037
8037
if ((record -> flags & GUC_SUPERUSER_ONLY ) &&
8038
- !is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS ))
8038
+ !is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS ))
8039
8039
ereport (ERROR ,
8040
8040
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
8041
8041
errmsg ("must be superuser or a member of pg_read_all_settings to examine \"%s\"" ,
@@ -9294,7 +9294,7 @@ ShowAllGUCConfig(DestReceiver *dest)
9294
9294
9295
9295
if ((conf -> flags & GUC_NO_SHOW_ALL ) ||
9296
9296
((conf -> flags & GUC_SUPERUSER_ONLY ) &&
9297
- !is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS )))
9297
+ !is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS )))
9298
9298
continue ;
9299
9299
9300
9300
/* assign to the values array */
@@ -9361,7 +9361,7 @@ get_explain_guc_options(int *num)
9361
9361
/* return only options visible to the current user */
9362
9362
if ((conf -> flags & GUC_NO_SHOW_ALL ) ||
9363
9363
((conf -> flags & GUC_SUPERUSER_ONLY ) &&
9364
- !is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS )))
9364
+ !is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS )))
9365
9365
continue ;
9366
9366
9367
9367
/* return only options that are different from their boot values */
@@ -9450,7 +9450,7 @@ GetConfigOptionByName(const char *name, const char **varname, bool missing_ok)
9450
9450
}
9451
9451
9452
9452
if ((record -> flags & GUC_SUPERUSER_ONLY ) &&
9453
- !is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS ))
9453
+ !is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS ))
9454
9454
ereport (ERROR ,
9455
9455
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
9456
9456
errmsg ("must be superuser or a member of pg_read_all_settings to examine \"%s\"" ,
@@ -9481,7 +9481,7 @@ GetConfigOptionByNum(int varnum, const char **values, bool *noshow)
9481
9481
{
9482
9482
if ((conf -> flags & GUC_NO_SHOW_ALL ) ||
9483
9483
((conf -> flags & GUC_SUPERUSER_ONLY ) &&
9484
- !is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS )))
9484
+ !is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS )))
9485
9485
* noshow = true;
9486
9486
else
9487
9487
* noshow = false;
@@ -9676,7 +9676,7 @@ GetConfigOptionByNum(int varnum, const char **values, bool *noshow)
9676
9676
* insufficiently-privileged users.
9677
9677
*/
9678
9678
if (conf -> source == PGC_S_FILE &&
9679
- is_member_of_role (GetUserId (), DEFAULT_ROLE_READ_ALL_SETTINGS ))
9679
+ is_member_of_role (GetUserId (), ROLE_PG_READ_ALL_SETTINGS ))
9680
9680
{
9681
9681
values [14 ] = conf -> sourcefile ;
9682
9682
snprintf (buffer , sizeof (buffer ), "%d" , conf -> sourceline );
0 commit comments