Hacker News new | past | comments | ask | show | jobs | submit login

That’s great to hear. Option 3 is the best choice too as it allows for the FTS results to also be constrained by the object level security access logic. Thanks for the great work and replies!



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: