ALTER LARGE OBJECT — change the definition of a large object ALTER MATERIALIZED VIEW — change the definition of a materialized view ALTER OPERATOR — change the definition of an operator ALTER OPERATOR ...
This section describes the detailed format of each message. Each is marked to indicate that it can be sent by a frontend (F), a backend (B), or both (F & B). Notice that although each message includes ...
CREATE TABLE will create a new, initially empty table in the current database. The table will be owned by the user issuing the command. If a schema name is given (for example, CREATE TABLE ...
Object identifiers (OIDs) are used internally by PostgreSQL as primary keys for various system tables. Type oid represents an object identifier. There are also several alias types for oid: regproc, ...
33.9.2. Functions for Receiving COPY Data A PGresult object bearing one of these status values carries some additional data about the COPY operation that is starting. This additional data is available ...
Aggregate functions in PostgreSQL are defined in terms of state values and state transition functions. That is, an aggregate operates using a state value that is updated as each successive input row ...
Query performance can be affected by many things. Some of these can be controlled by the user, while others are fundamental to the underlying design of the system. This chapter provides some hints ...
The view pg_roles provides access to information about database roles. This is simply a publicly readable view of pg_authid that blanks out the password field.
This function opens a new database connection using the parameters taken from two NULL-terminated arrays. The first, keywords, is defined as an array of strings, each one being a key word. The second, ...
Consider using nondeterministic collations (see Section 23.2.2.4) instead of this module. They can be used for case-insensitive comparisons, accent-insensitive comparisons, and other combinations, and ...
There are several password-based authentication methods. These methods operate similarly but differ in how the users' passwords are stored on the server and how the password provided by a client is ...
We have implemented this Trademark Policy because it is important to the Community that our trademarks are not used in ways that confuse people. For example, we do not want people to use our ...