🎯

postgresql

🎯Skill

from itechmeat/llm-code

VibeIndex|
What it does

Enables robust PostgreSQL multi-tenancy by implementing Row-Level Security (RLS), managing tenant isolation, and configuring database migrations with best practices.

πŸ“¦

Part of

itechmeat/llm-code(31 items)

postgresql

Installation

Quick InstallInstall with npx
npx add-skill itechmeat/llm-code
Quick InstallInstall with npx
npx add-skill itechmeat/llm-code --list
Quick InstallInstall with npx
npx add-skill itechmeat/llm-code --skill vite --skill fastapi
Quick InstallInstall with npx
npx add-skill itechmeat/llm-code -a claude-code -a github-copilot
Quick InstallInstall with npx
npx add-skill itechmeat/llm-code -y
πŸ“– Extracted from docs: itechmeat/llm-code
15Installs
-
AddedFeb 4, 2026

Skill Details

SKILL.md

"PostgreSQL best practices: multi-tenancy with RLS, schema design, Alembic migrations, async SQLAlchemy, and query optimization."

Overview

# PostgreSQL

When to use

  • Designing or changing multi-tenant tables with Row-Level Security (RLS)
  • Debugging tenant isolation issues
  • Adding/changing Alembic migrations for schema, RLS policies, or indexes
  • Writing tests that validate RLS isolation
  • Configuring PostgreSQL authentication, replication, or tuning

RLS Multi-tenancy Pattern

Non-negotiables

  • RLS context is mandatory for any tenant-scoped query
  • Context must be set inside the same transaction as the queries
  • No fallbacks for tenant ID (fail fast if missing)
  • Async-only DB access when using async frameworks

Setting RLS Context

RLS works only if the current transaction has the context set:

```sql

SET LOCAL app.current_tenant_id = '';

```

Must run before the first tenant-scoped query in that transaction.

Common Failure Modes

  • Setting SET LOCAL ... after the first select()
  • Setting the context in one session, then querying in another
  • Running queries outside the expected transaction scope

Typical RLS Policy

```sql

ALTER TABLE some_table ENABLE ROW LEVEL SECURITY;

CREATE POLICY some_table_tenant_isolation

ON some_table

USING (tenant_id = current_setting('app.current_tenant_id', true)::uuid);

```

Multi-tenant Table Checklist

  • Tenant ID column is UUID
  • FK to tenants table with ON DELETE CASCADE
  • Indexes aligned with access patterns (usually tenant_id first)

- PostgreSQL does not auto-index FK columns β€” add explicit indexes

- UNIQUE allows multiple NULLs unless using NULLS NOT DISTINCT (PG15+)

  • RLS is enabled and policies exist
  • Application code sets RLS context at transaction start

Alembic Migrations Checklist

  1. Add/modify schema (columns, constraints, FKs)
  2. Create/update indexes
  3. Enable RLS and create/adjust policies
  4. Add verification (tests) for isolation
  5. Provide a real downgrade (no stubs)

RLS Isolation Testing Recipe

Goal:

  • Data for tenant A is visible to tenant A
  • Data for tenant A is NOT visible to tenant B

Canonical flow:

  1. Setup data through an admin session (RLS bypass) for tenant A and B
  2. Assert via an RLS session:

- set context to tenant A β†’ sees only tenant A data

- set context to tenant B β†’ does not see tenant A data

Destructive Operations Safety

Hard rules:

  • Never run DELETE without a narrow WHERE targeting specific data
  • Never run TRUNCATE/DROP without explicit confirmation

Pre-flight before destructive actions:

  1. Confirm exact target (tables / IDs / date range)
  2. Run a SELECT/row count first and show results
  3. Ask for final confirmation, then execute

References

Schema & Design

  • [table-design.md](references/table-design.md) β€” Data types, constraints, indexing, partitioning, JSONB, safe schema evolution
  • [charset-encoding.md](references/charset-encoding.md) β€” Character sets, encoding, collation, ICU, locale settings

Authentication

  • [authentication.md](references/authentication.md) β€” pg_hba.conf, SCRAM-SHA-256, md5, peer, cert, LDAP, GSSAPI
  • [authentication-oauth.md](references/authentication-oauth.md) β€” OAuth 2.0 (PostgreSQL 18+), SASL OAUTHBEARER, validators
  • [user-management.md](references/user-management.md) β€” CREATE/ALTER/DROP ROLE, membership, GRANT/REVOKE, predefined roles

Runtime Configuration

  • [connection-settings.md](references/connection-settings.md) β€” listen_addresses, max_connections, SSL, TCP keepalives
  • [query-tuning.md](references/query-tuning.md) β€” Planner settings, work_mem, parallel query, cost constants
  • [replication.md](references/replication.md) β€” Streaming replication, WAL, synchronous commit, logical replication
  • [vacuum.md](references/vacuum.md) β€” Autovacuum, vacuum cost model, freeze ages, per-table tuning
  • [error-handling.md](references/error-handling.md) β€” exit_on_error, restart_after_crash, data_sync_retry

Internals

  • [internals.md](references/internals.md) β€” Query processing pipeline, parser/rewriter/planner/executor, system catalogs, wire protocol, access methods
  • [protocol.md](references/protocol.md) β€” Wire protocol v3.2: message format, startup, auth, query, COPY, replication

See also

  • [sql-expert](../sql-expert/SKILL.md) β€” Query patterns, EXPLAIN workflow, optimization