Bruce Momjian wrote: > KaiGai Kohei wrote: > > >> CREATE TABLE t ( > > >> a int, > > >> b text > > >> ) WITH (ROW_LEVEL_ACL=ON);
Let me outline the simplest API, assuming we are using table-level granularity for the security columns. CREATE TABLE would support WITH (ROWACL = TRUE/FALSE); for row-level acl and: WITH (SECEXT = TRUE/FALSE); for SE-Linux, with 'SECEXTL' standing for SECurity EXTernal or SECurity_contEXT. And then in postgresql.conf we would have: default_with_rowacl and default_with_secext which would control the default value of ROWACL and SECEXT when CREATE TABLE does not specify these values. This is how OIDs works now. When SE-Linux is enabled, CREATE TABLE would issue an error if SECEXT was false. I can't think of a clean way to guarantee that existing tables have SECEXT though, which means we might need to have a missing 'security_context' column mean default SE-Linux permissions. -- Bruce Momjian <[EMAIL PROTECTED]> http://momjian.us EnterpriseDB http://enterprisedb.com + If your life is a hard drive, Christ can be your backup. + -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers