Commits on Aug 16, 2018
  1. Stamp 1.3beta1.

    dwsteele committed Aug 16, 2018
Commits on Jun 6, 2018
Commits on Oct 3, 2017
Commits on Jun 26, 2017
  1. Bump 9.6 extension version to 1.1.1.

    dwsteele committed Jun 26, 2017
    The 9.6 version of the extension was accidentally left at 1.0 which is used for the 9.5 version. The default is now set to 1.1.1 and an empty update script is included. Run:
    alter extension pgaudit update to ‘1.1.1’
    to update the extension version to 1.1.1, though there are no apparent problems with leaving it at 1.0.
Commits on Jun 20, 2017
Commits on Nov 16, 2016
  1. Update master to PostgreSQL 9.6.

    dwsteele committed Nov 16, 2016
    * Updated URLs and branch names in the documentation.
    * Changed COMMERR log level to LOG_SERVER_ONLY.
    * Updated regression tests.
Commits on Nov 15, 2016
  1. Added `log-client` option to suppress output to client regardless of …

    dwsteele committed Nov 15, 2016
    …`client-min-messages` setting.
Commits on Nov 14, 2016
Commits on Nov 11, 2016
Commits on Jun 4, 2016
  1. Update authors section.

    dwsteele committed Jun 4, 2016
Commits on May 5, 2016
  1. Passwords are now redacted in CREATE/ALTER ROLE statements.

    dwsteele committed May 5, 2016
    Note that all text in the statement after the "password" token is redacted so non-password related clauses will also be redacted when they follow the "password" token.
Commits on Mar 30, 2016
  1. Closed #9: CREATE EXTENSION problem.

    dwsteele committed Mar 30, 2016
    This was happening because pgaudit.log was set before CREATE EXTENSION was called.  This caused an issue where pgaudit was trying to log itself being created which won't work properly with event triggers.  Documented that pgaudit.log must not be set when the pgaudit extension is created.
  2. Fixed #7: Audit log problem with CREATE TABLE AS.

    dwsteele committed Mar 30, 2016
    This issue was caused by an event that had already been logged being logged again by another call to ExecutorCheckPerms().  Fixed by altering the audit log code so events won't be logged again unless there is new information.
Commits on Mar 29, 2016
  1. Fixed #6: Audit log is not output after the SET ROLE.

    dwsteele committed Mar 29, 2016
    This issue had to do with trying to suppress audit logs for statements that are not run as the current role, which includes security definer functions and foreign key lookups.  If the initial logon was a superuser then no audit logs would be created at all after a set role and while this is not very realistic it still needs to be taken in account.  The downside of this change is that FK lookups and statements in security definer functions will be logged when the user initially logs on a superuser making the audit log much noisier in this case.
Commits on Dec 11, 2015
  1. Type and foreign key fixes in audit.sql.

    dwsteele committed Dec 11, 2015
    Minor doc fix.
Commits on Nov 12, 2015
  1. Merge pull request #5 from Dwaligon/master

    dwsteele committed Nov 12, 2015
    Fixed syntax typo in analyze doc.
Commits on Oct 29, 2015
  1. Merge pull request #4 from ooyamams/master

    dwsteele committed Oct 29, 2015
    Fix pgaudit.log_level example.
Commits on Oct 19, 2015
  1. Added The PostgreSQL Audit Log Analyzer.

    dwsteele committed Oct 19, 2015
    The PostgreSQL Audit Log Analyzer will monitor the PostgreSQL logs and write log and audit entries into the pgaudit schema in the database where activity occurred.
Commits on Aug 12, 2015
  1. Restored requirement to load pgaudit in shared_preload_libraries.

    dwsteele committed Aug 12, 2015
    Updated make file and regression tests to reflect this change.
Commits on Aug 11, 2015
  1. Merge pull request #1 from xxorde/patch-1

    dwsteele committed Aug 11, 2015
    Fix typo: paudit => pgaudit
Commits on Jul 21, 2015
  1. Initial commit of the PostgreSQL Audit Extension.

    dwsteele committed Jul 21, 2015
    This is essentially the code that was submitted to core with formatting changes and the documentation converted to markdown.