@postgres-language-server/cli-aarch64-apple-darwin 0.21.0 → 0.22.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@postgres-language-server/cli-aarch64-apple-darwin",
3
- "version": "0.21.0",
3
+ "version": "0.22.0",
4
4
  "license": "MIT or Apache-2.0",
5
5
  "repository": {
6
6
  "type": "git",
Binary file
package/schema.json CHANGED
@@ -534,6 +534,13 @@
534
534
  "format": "uint16",
535
535
  "minimum": 0.0
536
536
  },
537
+ "skipFnBodies": {
538
+ "description": "If `true`, skip formatting of SQL function bodies (keep them verbatim). Default: `false`.",
539
+ "type": [
540
+ "boolean",
541
+ "null"
542
+ ]
543
+ },
537
544
  "typeCase": {
538
545
  "description": "Data type casing (text, varchar, int): \"upper\" or \"lower\". Default: \"lower\".",
539
546
  "anyOf": [
@@ -1532,6 +1539,17 @@
1532
1539
  }
1533
1540
  ]
1534
1541
  },
1542
+ "rlsPolicyAlwaysTrue": {
1543
+ "description": "RLS Policy Always True: Detects RLS policies that use overly permissive expressions like USING (true) or WITH CHECK (true) for UPDATE, DELETE, or INSERT operations. SELECT policies with USING (true) are intentionally excluded as this pattern is often used deliberately for public read access.",
1544
+ "anyOf": [
1545
+ {
1546
+ "$ref": "#/definitions/SplinterRuleConfiguration"
1547
+ },
1548
+ {
1549
+ "type": "null"
1550
+ }
1551
+ ]
1552
+ },
1535
1553
  "rlsReferencesUserMetadata": {
1536
1554
  "description": "RLS references user metadata: Detects when Supabase Auth user_metadata is referenced insecurely in a row level security (RLS) policy.",
1537
1555
  "anyOf": [
@@ -1554,6 +1572,17 @@
1554
1572
  }
1555
1573
  ]
1556
1574
  },
1575
+ "sensitiveColumnsExposed": {
1576
+ "description": "Sensitive Columns Exposed: Detects tables exposed via API that contain columns with potentially sensitive data (PII, credentials, financial info) without RLS protection.",
1577
+ "anyOf": [
1578
+ {
1579
+ "$ref": "#/definitions/SplinterRuleConfiguration"
1580
+ },
1581
+ {
1582
+ "type": "null"
1583
+ }
1584
+ ]
1585
+ },
1557
1586
  "unsupportedRegTypes": {
1558
1587
  "description": "Unsupported reg types: Identifies columns using unsupported reg* types outside pg_catalog schema, which prevents database upgrades using pg_upgrade.",
1559
1588
  "anyOf": [