Re: For review: Server instrumentation patch

From: Andrew Dunstan <andrew(at)dunslane(dot)net>
To: Magnus Hagander <mha(at)sollentuna(dot)net>
Cc: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Andreas Pflug <pgadmin(at)pse-consulting(dot)de>, Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, Dave Page <dpage(at)vale-housing(dot)co(dot)uk>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: For review: Server instrumentation patch
Date: 2005-07-25 11:44:52
Message-ID: 42E4D0B4.7020603@dunslane.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Magnus Hagander wrote:

>
>Instead of trying to pick on one feature, how about trying something
>constructive instead? Let's say we add a GUC like "restrict_superuser",
>that disables COPY to local files, untrusted procedural languages (both
>creation and using the ones that already exist), the new access
>functions, the LOAD command etc. Then the admin can chose what to do
>about superuser access levels - the requirement may dependon SELinux for
>example.
>
>

I could go for this.

Creating a setting that disallowed creation/calling of plperlu
functions would be fairly trivial.

I still think, security considerations aside, that an API for config
settings would be a much better piece of design than providing file
system access functions.

cheers

andrew

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message ohp 2005-07-25 12:27:19 Re: regression failure on latest CVS
Previous Message Magnus Hagander 2005-07-25 07:43:07 Re: For review: Server instrumentation patch