Skip to content
Written with Claude
IMPORTANT

As you may notice, this page and pretty much the entire website were obviously created with the help of AI. I wonder how you could tell? Was it a big "Written With Claude" badge on every page? I moved it to the top now (with the help of AI of course) to make it even more obvious. There are a few blogposts that were written by me manually, the old-fashioned way, I hope there will be more in the future, and those have a similar "Human Written" badge. This project (not the website), on the other hand, is a very, very different story. It took me more than two years of painstaking and unpaid work in my own free time. A story that, hopefully, I will tell someday. But meanwhile, what would you like me to do? To create a complex documentation website with a bunch of highly technical articles with the help of AI and fake it, to give you an illusion that I also did that manually? Like the half of itnernet is doing at this point? How does that makes any sense? Is that even fair to you? Or maybe to create this website manually, the old-fashioned way, just for you? While working a paid job for a salary, most of you wouldn't even get up in the morning. Would you like me to sing you a song while we're at it? For your personal entertainment? Seriously, get a grip. Do you find this information less valuable because of the way this website was created? I give my best to fix it to keep the information as accurate as possible, and I think it is very accurate at this point. If you find some mistakes, inaccurancies or problems, there is a comment section at the bottom of every page, which I also made with the help of the AI. And I woould very much appreciate if you leave your feedback there. Look, I'm just a guy who likes SQL, that's all. If you don't approve of how this website was constructed and the use of AI tools, I suggest closing this page and never wever coming back. And good riddance. And I would ban your access if I could know how. Thank you for your attention to this matter.

SSE_EVENTS_SCOPE

Also known as

sse_scope (with or without @ prefix)

Control who receives Server-Sent Events from this endpoint.

Syntax

@sse_scope <scope>
@sse_scope authorize <value1>, <value2>, ...

Space-separated lists are also valid: @sse_scope authorize admin manager supervisor

Or using custom parameter syntax:

@sse_scope = <scope>
@sse_events_scope = <scope>

Values

ValueDescription
matchingClients with matching security context receive events
authorizeOnly authorized clients receive events. Optionally filter by role names, user names, or user IDs
allAll connected clients receive events

Request Correlation

Events are filtered by execution ID when both conditions are met:

  • The request includes an execution ID header (configured via ExecutionIdHeaderName)
  • The SSE event source includes the same execution ID as a query parameter

When execution IDs are provided but don't match, the event is skipped regardless of scope.

Examples

Matching Scope

sql
comment on function team_task() is
'HTTP POST
@sse /team-events
@sse_scope matching';

Events are sent to clients with matching security context:

  • If the endpoint requires authorization, all authorized sessions receive events
  • If the endpoint requires specific roles, only sessions with those roles receive events

Authorize Scope with Roles

sql
comment on function admin_broadcast() is
'HTTP POST
@sse /admin-events
@sse_scope authorize admin';

Only clients with admin role receive events.

Authorize with User Names or IDs

sql
comment on function specific_users_notification() is
'HTTP POST
@sse /user-events
@sse_scope authorize john.doe, jane.smith, user123';

Events are sent to clients matching any of the specified role names, user names, or user IDs.

Multiple Values

sql
comment on function staff_notification() is
'HTTP POST
@sse /staff-events
@sse_scope authorize admin, manager, supervisor';

Clients matching any of the specified values receive events.

Broadcast to All

sql
comment on function system_announcement() is
'HTTP POST
@sse /announcements
@sse_scope all';

All connected SSE clients receive events regardless of security context.

Dynamic Scope via RAISE HINT

The scope can also be set dynamically at runtime using the HINT parameter of PostgreSQL RAISE statements. This allows different events within the same function to have different scopes:

sql
create function process_with_notifications()
returns void
language plpgsql
as $$
begin
  -- This event goes to all clients
  raise notice 'System maintenance starting...' using hint = 'all';

  -- This event only goes to admins
  raise notice 'Admin: detailed system stats...' using hint = 'authorize admin';

  -- This event goes to specific users
  raise notice 'Your task is complete' using hint = 'authorize john.doe, jane.smith';

  -- This event uses the default scope from annotation
  raise notice 'General progress update...';
end;
$$;

comment on function process_with_notifications() is
'HTTP POST
@sse /process-events
@sse_scope matching';

The HINT value is parsed as: <scope> [value1] [value2] ...

When a hint is provided, it overrides the annotation scope for that specific event. When no hint is provided, the annotation scope is used.

Comments

Released under the MIT License.