On 1/11/13 10:25 AM, Tom Lane wrote:
Peter Eisentraut pete...@gmx.net writes:
It turned out that actually getting rid of lanpltrusted would be too
invasive, especially because some language handlers use it to determine
their own behavior.
So instead the lanpltrusted attribute now just
On 1/19/13 8:45 AM, Kohei KaiGai wrote:
I think, it is a time to investigate separation of database superuser
privileges
into several fine-grained capabilities, like as operating system doing.
https://github.com/torvalds/linux/blob/master/include/uapi/linux/capability.h
The Linux
On Sun, Jan 27, 2013 at 11:15 PM, Craig Ringer cr...@2ndquadrant.com wrote:
On 01/28/2013 02:15 AM, Robert Haas wrote:
I am not sure whether it's really true that a capability mechanism
could never really satisfy anyone. It worked for Linux.
I have no concern about using a capabilities
Robert Haas robertmh...@gmail.com writes:
On Fri, Jan 25, 2013 at 2:59 PM, Kohei KaiGai kai...@kaigai.gr.jp wrote:
2013/1/20 Tom Lane t...@sss.pgh.pa.us:
The traditional answer to that, which not only can be done already in
all existing releases but is infinitely more flexible than any
On Sun, Jan 27, 2013 at 1:09 PM, Tom Lane t...@sss.pgh.pa.us wrote:
Robert Haas robertmh...@gmail.com writes:
On Fri, Jan 25, 2013 at 2:59 PM, Kohei KaiGai kai...@kaigai.gr.jp wrote:
2013/1/20 Tom Lane t...@sss.pgh.pa.us:
The traditional answer to that, which not only can be done already in
On 01/28/2013 02:15 AM, Robert Haas wrote:
I am not sure whether it's really true that a capability mechanism
could never really satisfy anyone. It worked for Linux.
I have no concern about using a capabilities approach for this, but I
don't think Linux is a great example here. Linux's
On Fri, Jan 25, 2013 at 2:59 PM, Kohei KaiGai kai...@kaigai.gr.jp wrote:
2013/1/20 Tom Lane t...@sss.pgh.pa.us:
Robert Haas robertmh...@gmail.com writes:
Yeah. We'd need to think a little bit about how to make this work,
since I think that adding a gajillion booleans to pg_authid will not
2013/1/20 Tom Lane t...@sss.pgh.pa.us:
Robert Haas robertmh...@gmail.com writes:
Yeah. We'd need to think a little bit about how to make this work,
since I think that adding a gajillion booleans to pg_authid will not
make anyone very happy. But I like the idea. GRANT
Tom Lane t...@sss.pgh.pa.us writes:
The traditional answer to that, which not only can be done already in
all existing releases but is infinitely more flexible than any
hard-wired scheme we could implement, is that you create superuser-owned
security-definer functions that can execute any
On Sat, Jan 19, 2013 at 8:54 AM, Simon Riggs si...@2ndquadrant.com wrote:
On 19 January 2013 13:45, Kohei KaiGai kai...@kaigai.gr.jp wrote:
I think, it is a time to investigate separation of database superuser
privileges
into several fine-grained capabilities, like as operating system doing.
Robert Haas robertmh...@gmail.com writes:
Yeah. We'd need to think a little bit about how to make this work,
since I think that adding a gajillion booleans to pg_authid will not
make anyone very happy. But I like the idea. GRANT
kill_sessions_of_other_users TO bob? GRANT
On Sun, Jan 20, 2013 at 10:53 AM, Tom Lane t...@sss.pgh.pa.us wrote:
Robert Haas robertmh...@gmail.com writes:
Yeah. We'd need to think a little bit about how to make this work,
since I think that adding a gajillion booleans to pg_authid will not
make anyone very happy. But I like the idea.
On 19 January 2013 13:45, Kohei KaiGai kai...@kaigai.gr.jp wrote:
I think, it is a time to investigate separation of database superuser
privileges
into several fine-grained capabilities, like as operating system doing.
Peter Eisentraut pete...@gmx.net writes:
It turned out that actually getting rid of lanpltrusted would be too
invasive, especially because some language handlers use it to determine
their own behavior.
So instead the lanpltrusted attribute now just determined what the
default privileges of
14 matches
Mail list logo