I was just wondering if pg_parquet could be combined with pg_azure_storage to write Parquet files to Azure Storage.
I had problems with pg_azure_storage in the past, because the roles pg_read_server_files and pg_write_server_files are unassignable on Azure PostgreSQL databases which makes the use of `COPY {FROM,TO}` impossible.
It would not be safe to let any user access object storage. Therefore, pg_parquet has two roles called parquet_object_store_read and parquet_object_store_write that give permission to COPY FROM/TO object storage (but not local file system).
In pg_azure_storage there is a comparable azure_storage_admin role that needs to be granted to users that need Azure Blob Storage permission.
> Do you also audit / control web browsers the clients are using?
Certain places do, actually. That's why lots of enterprise software was stuck having to support IE just a few years back (and probably still in some places that haven't caught up).
I've seen demands towards certain features working on Edge/Chrome in particular even if it would break something in Firefox, which might be preference of the end users but also corporate policy towards using known software in certain places.
I'm sure that you're still likely to run into plenty of environments where something like Edge might be the only allowed browser.
>lots of enterprise software was stuck having to support IE just a few years back
Yep, and talking about Jira, they only ended that support in March 2020.
And wow, according to Wikipedia, Microsoft still supports Internet Explorer on some non-consumer Windows flavors. Today. I find that actually pretty stunning, must be a huge liability to be running web-apps that breaks on non-IE, because that can't then be the only aspect at which it's still stuck in the stone ages.
They will have a leg up there because the on machines this LTSC version of Windows is made for, you shouldn’t be browsing the web much in the first place - intended applications are ‘ medical systems (such as those used for MRI and CAT scans), industrial process controllers, and air traffic control devices’
Let's say there's a higher chance that you'll be able to sign a contract with Google or Microsoft that allows you to sue the $$$ out of them if something happens, than hoping to get anything from ankitpokhrel on GitHub whose bio says "I have no idea what I do".
(Nothing against ankitpokhrel and this great tool, just making a point in a slightly sarcastic way)
It's open source. If you want to use the functionality but don't trust a random internet user named ankitpokhrel, you can literally gut the project, copy-paste the code you understand, get basic functionality to work, and you can be pretty much certain that there is nothing nefarious going on.
I have done that multiple times. It's not very time demanding, because the working code is there, and all you're doing is essentially deleting code you either don't understand, or don't need. At the same time, you're reading the code you do use.
And imagine yourself in the IT guys shoes. Some rando expects you to audit something that at most one or two people use and probably contains a hundred vulns which would very likely never be fixed anyways. Why would you bother with such a request
I would bet it's easier to do it with a 1 man company, the megacorps are famous for firewalling themselves from liability with very good contract lawyers.
You may also be able to get 3rd party insurance for this.
It helps a lot that you gave me the name for the method. In the future, I can use that as a reference to explain what I'm doing or teach others, perhaps without needing to go into the details as I did here.
If your Bitwarden vault is compromised however, you only have a single factor, because both the password and the TOTP secret are stored in the same place.
It would be really nice to always spell out the abbreviation once, put in in brackets and then use it afterwards. That would save so many people precious time.
I had problems with pg_azure_storage in the past, because the roles pg_read_server_files and pg_write_server_files are unassignable on Azure PostgreSQL databases which makes the use of `COPY {FROM,TO}` impossible.