Re: [GSOC] - I ntegrity check algorithm for data files

From: Zdenek Kotala <Zdenek(dot)Kotala(at)Sun(dot)COM>
To: Richard Huxton <dev(at)archonet(dot)com>
Cc: Robert Mach <mach(dot)robert(at)gmail(dot)com>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org>, Neil Conway <neilc(at)samurai(dot)com>, Simon Riggs <simon(at)2ndquadrant(dot)com>, Heikki Linnakangas <heikki(at)enterprisedb(dot)com>
Subject: Re: [GSOC] - I ntegrity check algorithm for data files
Date: 2007-05-23 18:51:53
Message-ID: 46548D49.6000707@sun.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Richard Huxton wrote:
> Zdenek Kotala wrote:
>> Richard Huxton wrote:
>>
>>> For the rest, that's what ssh is for imho.
>>
>> And what you will do when you don't have ssh access on this machine
>> and 5432 is only one way how to administrate a server? (Windows is
>> another story.)
>
> If I've not got ssh access to the machine, then I'm not the one
> responsible for editing configuration files.

I'm not sure if ssh access is in correlation with db administration.
However in some Unix system you can get right to user start stop
postgres (RBAC, sudo ...), but there is not easy way how to allow him to
access configuration file only in way to share postgres user password.

Zdenek

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message George Pavlov 2007-05-23 19:04:45 Re: query log corrupted-looking entries
Previous Message Richard Huxton 2007-05-23 18:16:04 Re: [GSOC] - I ntegrity check algorithm for data files