On Sun, Jan 27, 2013 at 11:15 PM, Craig Ringer <craig(at)2ndquadrant(dot)com> wrote:
> On 01/28/2013 02:15 AM, Robert Haas wrote:
> I am not sure whether it's really true that a capability mechanism
> could "never really satisfy" anyone. It worked for Linux.
> I have no concern about using a capabilities approach for this, but I don't
> think Linux is a great example here. Linux's capabilities have been defined
> in a somewhat ad-hoc fashion and a huge amount of stuff is bundled into
> CAP_SYS_ADMIN. Several capabilities provide escalation routes to root /
> CAP_SYS_ADMIN. See:
> There's nothing wrong with capability systems, it's just clear that they
> need to be designed, documented and maintained carefully. Adding ad-hoc
> capbilities is exactly the wrong route to take, and will lead us into the
> same mess Linux is in now.
> But, I think event triggers are a credible answer, too, and they
> certainly are more flexible.
> Yes, but with the caveat that leaving security design to user triggers will
> provide users with more opportunities for error - failure to think about
> schemas and search_path, testing role membership via some hacked-together
> queries instead of the built-in system information functions, failure to
> consider SECURITY DEFINER and the effect of session_user vs current_user,
> etc. Some docs on writing security triggers and some standard triggers in an
> extension module would go a long way to mitigating that, though. The appeal
> of the trigger based approach is that it means core doesn't land up needing
+1 to the entire email, and well said.
The Enterprise PostgreSQL Company
In response to
pgsql-hackers by date
|Next:||From: Robert Haas||Date: 2013-01-29 02:39:27|
|Subject: Re: unlogged tables vs. GIST|
|Previous:||From: Robert Haas||Date: 2013-01-29 02:34:41|
|Subject: Re: Enabling Checksums|