Refactor privilege handling
Build / check (push) Successful in 2m41s
Build / build (push) Successful in 3m5s
Build / docs (push) Successful in 5m37s

This commit is contained in:
2025-11-14 00:49:29 +09:00
parent 7760b001d8
commit 03a761a0ff
12 changed files with 1567 additions and 886 deletions
+1 -2
View File
@@ -10,6 +10,7 @@ use sqlx::prelude::*;
use crate::{
core::{
common::UnixUser,
database_privileges::DATABASE_PRIVILEGE_FIELDS,
protocol::{
CreateUserError, CreateUsersOutput, DropUserError, DropUsersOutput, ListAllUsersError,
ListAllUsersOutput, ListUsersError, ListUsersOutput, LockUserError, LockUsersOutput,
@@ -22,8 +23,6 @@ use crate::{
},
};
use super::database_privilege_operations::DATABASE_PRIVILEGE_FIELDS;
// NOTE: this function is unsafe because it does no input validation.
async fn unsafe_user_exists(
db_user: &str,