[v9.2] sepgsql's DROP Permission checks

Поиск
Список
Период
Сортировка
От Kohei KaiGai
Тема [v9.2] sepgsql's DROP Permission checks
Дата
Msg-id CADyhKSVF-8y_tEZnG3naJ09ajiT+69p9EvmpANTNc1fQRdzGvw@mail.gmail.com
обсуждение исходный текст
Ответы Re: [v9.2] sepgsql's DROP Permission checks  (Robert Haas <robertmhaas@gmail.com>)
Список pgsql-hackers
The attached patch adds OAT_DROP object-access-hook around permission
checks of object deletion.
Due to the previous drop statement reworks, the number of places to
put this hook is limited to these six points: RemoveObjects,
RemoveRelations, ATExecDropColumn, dropdb, DropTableSpace and
shdepDropOwned().

In sepgsql side, it checks {drop} permission for each object types,
and {remove_name} permission to the schema that owning the object
being removed. I'm still considering whether the drop permission
should be applied on objects being removed in cascade mode.
It is not difficult to implement. We can determine the bahavior on
object deletion with same manner of creation; that saves contextual
information using ProcessUtility hook.

At this moment, the current proposed patch does not apply checks on
cascaded deletion, according to SQL behavior. However, my concern is
that user can automatically have right to remove all the objects
underlying a partidular schema being removable, even if individual
tables or functions are not able to be removed.

So, my preference is sepgsql references dependency tables to check
{drop} permissions of involved objects, not only the target object.

Thanks,
--
KaiGai Kohei <kaigai@kaigai.gr.jp>

Вложения

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Kohei KaiGai
Дата:
Сообщение: [v9.2] Add GUC sepgsql.client_label
Следующее
От: Joachim Wieland
Дата:
Сообщение: Re: Sending notifications from the master to the standby