On Thu, Aug 29, 2024 at 7:29 AM Peter Eisentraut wrote:
>
> On 27.08.24 22:02, Masahiko Sawada wrote:
> > On Tue, Aug 27, 2024 at 6:29 AM Tom Lane wrote:
> >>
> >> Peter Eisentraut writes:
> >>> Maybe in the documentation it would also be appropriate to mention that
> >>> this is meant to be use
On 27.08.24 22:02, Masahiko Sawada wrote:
On Tue, Aug 27, 2024 at 6:29 AM Tom Lane wrote:
Peter Eisentraut writes:
Maybe in the documentation it would also be appropriate to mention that
this is meant to be used by pg_dump, not for general use -- unless it is?
I'd vote against that. I thi
On Tue, Aug 27, 2024 at 6:29 AM Tom Lane wrote:
>
> Peter Eisentraut writes:
> > Maybe in the documentation it would also be appropriate to mention that
> > this is meant to be used by pg_dump, not for general use -- unless it is?
>
> I'd vote against that. I think other catalog-scanning tools m
Peter Eisentraut writes:
> Maybe in the documentation it would also be appropriate to mention that
> this is meant to be used by pg_dump, not for general use -- unless it is?
I'd vote against that. I think other catalog-scanning tools might
like to use this too.
regards
On 26.08.24 21:05, Masahiko Sawada wrote:
Maybe using the word "prohibit" makes it a bit clear? For example,
I think that would be much clearer, yes.
In guc_tables.c:
Prohibits access to non-system relations of specified kinds
End with period.
In doc:
Set relation kinds of non-system rela
On Mon, Aug 26, 2024 at 7:14 AM Peter Eisentraut wrote:
>
> On 05.08.24 15:07, Masahiko Sawada wrote:
> > To address this, pg_dump now utilizes the newly introduced
> > restrict_nonsystem_relation_kind GUC parameter to restrict the
> > accesses to non-system views and foreign tables during the dum
On 05.08.24 15:07, Masahiko Sawada wrote:
To address this, pg_dump now utilizes the newly introduced
restrict_nonsystem_relation_kind GUC parameter to restrict the
accesses to non-system views and foreign tables during the dump
process. This new GUC parameter is added to back branches too, but
th
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
Restrict accesses to non-system views and foreign tables during pg_dump.
When pg_dump retrieves the list of database objects and performs the
data dump, there was possibility that objects are replaced with others
of the same name, such as views, and access them. This vulnerability
could result in
14 matches
Mail list logo