| From: | Stephen Frost <sfrost(at)snowman(dot)net> |
|---|---|
| To: | digoal(at)126(dot)com |
| Cc: | pgsql-bugs(at)postgresql(dot)org |
| Subject: | Re: BUG #13004: PostgreSQL 9.5 policy for table bug? |
| Date: | 2015-04-09 22:16:38 |
| Message-ID: | 20150409221638.GE3663@tamriel.snowman.net |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-bugs |
* digoal(at)126(dot)com (digoal(at)126(dot)com) wrote:
> There is no policy for r3's select command , why cann't see rows?
As documented, if row-level security is enabled on the table and there
is no policy which applies, then a default-deny policy will be used.
If you want there to be no filtering on SELECTs for this user, simply
create a policy with 'true' as the USING clause.
> There is no policy for r3's delete command , why cann't delete?
Same here.
> another nonsuper role , and not owner:
>
> postgres=> \c postgres r1
> You are now connected to database "postgres" as user "r1".
> postgres=# select * from test;
> id | r
> ----+----
> 1 | r1
> 2 | r2
> 4 | r1
> 4 | r2
> 4 | r1
> 4 | r2
> 4 | r1
> 4 | r3
> (8 rows)
Are you sure that r1 isn't a superuser? Certainly, the prompt displayed
above (postgres=#) implies that it is. Further, I'm unable to reproduce
this issue with current master, based on what I understand of the setup.
A self-contained test case, including the exact commands used from the
start, would help immensely.
Thanks!
Stephen
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Michael Paquier | 2015-04-10 05:16:35 | Re: BUG #13010: After promote postgres try to send old timeline WALs to archive |
| Previous Message | lpoyner | 2015-04-09 19:00:29 | BUG #13013: Cannot install PostgreSQL |