Re: pgsql: Add new GUC createrole_self_grant.

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: pgsql: Add new GUC createrole_self_grant.
Дата
Msg-id 668179.1673470826@sss.pgh.pa.us
обсуждение исходный текст
Ответ на Re: pgsql: Add new GUC createrole_self_grant.  (Robert Haas <robertmhaas@gmail.com>)
Ответы Re: pgsql: Add new GUC createrole_self_grant.
Список pgsql-hackers
Robert Haas <robertmhaas@gmail.com> writes:
> If you want to make safe a SECURITY DEFINER function written using sql
> or plpgsql, you either have to schema-qualify every single reference
> or, more realistically, attach a SET clause to the function to set the
> search_path to a sane value during the time that the function is
> executing. The problem here can be handled the same way, except that
> it's needed in a vastly more limited set of circumstances: you have to
> be calling a SECURITY DEFINER function that will execute CREATE ROLE
> as a non-superuser (and that user then needs to be sensitive to the
> value of this GUC in some security-relevant way). It might be good to
> document this -- I just noticed that the CREATE FUNCTION page has a
> section on "Writing SECURITY DEFINER Functions Safely" which talks
> about dealing with the search_path issues, and it seems like it would
> be worth adding a sentence or two there to talk about this.

OK, I'd be satisfied with that.

            regards, tom lane



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: ATTACH PARTITION seems to ignore column generation status
Следующее
От: Tom Lane
Дата:
Сообщение: Re: Can we let extensions change their dumped catalog schemas?