Re: [HACKERS] Priviliges on tables and views

From: darcy(at)druid(dot)net (D'Arcy J(dot)M(dot) Cain)
To: vadim(at)sable(dot)krasnoyarsk(dot)su (Vadim B(dot) Mikheev)
Cc: pgsql-hackers(at)postgreSQL(dot)org
Subject: Re: [HACKERS] Priviliges on tables and views
Date: 1998-01-14 03:49:13
Message-ID: m0xsJpJ-00000XC@druid.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Thus spake Vadim B. Mikheev
> > CREATE VIEW passwd AS SELECT uid, login, bid, gcos, home, shell
> > FROM account WHERE a_active = 't';
> >
> > REVOKE ALL ON passwd FROM PUBLIC;
> > GRANT SELECT ON passwd TO PUBLIC;
> >
> > Unfortunately this doesn't work. The VIEW inherits the permissions
> > from the table it is a view of. It seems to me that allowing a view
> > to define permissions separately from its parent would be a useful
> > thing. So, does anyone know if this behaviour is allowed by the
> > SQL spec and if it is allowed, would this be difficult to do?
>
> This is allowed by SQL and this is very useful thing. Not easy to implement:
> views are handled by RULES - after parsing and before planning, - but
> permissions are checked by executor (execMain.c:InitPlan()->ExecCheckPerms()).

Oh well. Is it worth putting on the TODO list at least? Maybe someone
will get to it eventually.

In the meantime, how close are we to being able to update views? I can
do what I want that way - just make two tables with public perms on
one but not the other and make a view for the combined table instead
of for a subset of a table.

--
D'Arcy J.M. Cain <darcy(at){druid|vex}.net> | Democracy is three wolves
http://www.druid.net/darcy/ | and a sheep voting on
+1 416 424 2871 (DoD#0082) (eNTP) | what's for dinner.

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message The Hermit Hacker 1998-01-14 03:54:26 Re: [HACKERS] grant still broken
Previous Message Vadim B. Mikheev 1998-01-14 03:19:50 Re: [HACKERS] Priviliges on tables and views