Re: [HACKERS] Priviliges on tables and views

Поиск
Список
Период
Сортировка
От Vadim B. Mikheev
Тема Re: [HACKERS] Priviliges on tables and views
Дата
Msg-id 34BC2ED6.CCD4604E@sable.krasnoyarsk.su
обсуждение исходный текст
Ответ на Priviliges on tables and views  (darcy@druid.net (D'Arcy J.M. Cain))
Ответы Re: [HACKERS] Priviliges on tables and views  (darcy@druid.net (D'Arcy J.M. Cain))
Список pgsql-hackers
D'Arcy J.M. Cain wrote:
>
> REVOKE ALL ON account FROM PUBLIC;
>
> CREATE VIEW passwd AS SELECT uid, login, bid, gcos, home, shell
>     FROM account WHERE a_active = 't';
>
> REVOKE ALL ON passwd FROM PUBLIC;
> GRANT SELECT ON passwd TO PUBLIC;
>
> Unfortunately this doesn't work.  The VIEW inherits the permissions
> from the table it is a view of.  It seems to me that allowing a view
> to define permissions separately from its parent would be a useful
> thing.  So, does anyone know if this behaviour is allowed by the
> SQL spec and if it is allowed, would this be difficult to do?

This is allowed by SQL and this is very useful thing. Not easy to implement:
views are handled by RULES - after parsing and before planning, - but
permissions are checked by executor (execMain.c:InitPlan()->ExecCheckPerms()).

Vadim

В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Vadim B. Mikheev"
Дата:
Сообщение: Re: [HACKERS] Re: subselects
Следующее
От: Bruce Momjian
Дата:
Сообщение: Re: [HACKERS] grant still broken