Re: Bug in handling default privileges inside extension update scripts

Поиск
Список
Период
Сортировка
От Stephen Frost
Тема Re: Bug in handling default privileges inside extension update scripts
Дата
Msg-id 20210422151509.GU20766@tamriel.snowman.net
обсуждение исходный текст
Ответ на Bug in handling default privileges inside extension update scripts  (Mats Kindahl <mats@timescale.com>)
Ответы Re: Bug in handling default privileges inside extension update scripts  (Mats Kindahl <mats@timescale.com>)
Список pgsql-bugs
Greetings,

* Mats Kindahl (mats@timescale.com) wrote:
> * To be able to read the configuration tables, "reader" need to have
>   SELECT privileges.
>
> * Since the new role is added by the user and not by the extension,
>   the grants have to be dumped as well. Otherwise, a restore of the
>   data will have wrong privileges.
>
> * Since new configuration tables could be added by an update of the
>   extension, it is necessary to make sure that these privileges are
>   added to new tables when updating. Typically, this means changing
>   the default privileges on the schema for the configuration files.

If the extension is updated, I think it's entirely reasonable to expect
an admin to have to go in and update the relevant permissions on any new
tables that have come into existance and, as I've said elsewhere, I
don't think that schema-level default privs should be applied to tables
created by extensions.  Sadly, no one else seems to have an opinion
regarding that and so there hasn't been a change in that, yet, but
that's the source of the issue imv.

If you want to comment on that, I'd suggest doing so on that thread:

https://www.postgresql.org/message-id/20200205034454.GU3195@tamriel.snowman.net

Thanks,

Stephen

Вложения

В списке pgsql-bugs по дате отправления:

Предыдущее
От: Devrim Gündüz
Дата:
Сообщение: Re: pg_cron leak memory bug, please help, thanks
Следующее
От: Clinton Adams
Дата:
Сообщение: Re: BUG #16976: server crash when deleting via a trigger on a foreign table