I think Sam Mason's proposal of hacking pg-pool sounds feasible. Is
there any way to create a formal RFE for this? Is anybody interested
in implementing this?
On 27 Apr 2009, at 13:55, Sam Mason wrote:
> One possible arrangement would be if each user/encryption key had its
> own database cluster. If that's OK, then maybe you could hack pg-pool
> around so that once it received the secret it would be able to run
> off,
> mount the appropriate partitions, and start the database engine before
> connecting to it. I've not used pg-pool before, but have a feeling
> that it can re-write queries on the fly so must have some non-trivial
> protocol knowledge--I may be wrong about that though.