Re: Row security violation error is misleading

From: Craig Ringer <craig(at)2ndquadrant(dot)com>
To: Dean Rasheed <dean(dot)a(dot)rasheed(at)gmail(dot)com>
Cc: Stephen Frost <sfrost(at)snowman(dot)net>, PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: Row security violation error is misleading
Date: 2015-04-09 06:52:40
Message-ID: CAMsr+YH3otxKiT8_2+Ywz6QW=kbS3cz2MSaod1zKRwnoXqxNMQ@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 9 April 2015 at 01:30, Dean Rasheed <dean(dot)a(dot)rasheed(at)gmail(dot)com> wrote:

>
> That doesn't match what the code currently does:
>
> * Also, allow extensions to add their own policies.
> *
> * Note that, as with the internal policies, if multiple policies are
> * returned then they will be combined into a single expression with
> * all of them OR'd together. However, to avoid the situation of an
> * extension granting more access to a table than the internal policies
> * would allow, the extension's policies are AND'd with the internal
> * policies. In other words - extensions can only provide further
> * filtering of the result set (or further reduce the set of records
> * allowed to be added).
>
> which seems reasonable, and means that if there are both internal and
> external policies, an "allow all" external policy would be a no-op.
>

Great, I'm glad to see that they're ANDed now.

I wasn't caught up with the current state of this. At some earlier point
policies from hooks were being ORed, which made mandatory access control
extensions impossible.

(I need to finish reading threads before replying).

--
Craig Ringer http://www.2ndQuadrant.com/
PostgreSQL Development, 24x7 Support, Training & Services

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Dean Rasheed 2015-04-09 06:56:44 Re: Row security violation error is misleading
Previous Message Craig Ringer 2015-04-09 06:47:02 Re: Row security violation error is misleading