From: | Craig Ringer <craig(at)2ndquadrant(dot)com> |
---|---|
To: | Dean Rasheed <dean(dot)a(dot)rasheed(at)gmail(dot)com> |
Cc: | Stephen Frost <sfrost(at)snowman(dot)net>, PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Row security violation error is misleading |
Date: | 2015-04-09 06:52:40 |
Message-ID: | CAMsr+YH3otxKiT8_2+Ywz6QW=kbS3cz2MSaod1zKRwnoXqxNMQ@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On 9 April 2015 at 01:30, Dean Rasheed <dean(dot)a(dot)rasheed(at)gmail(dot)com> wrote:
>
> That doesn't match what the code currently does:
>
> * Also, allow extensions to add their own policies.
> *
> * Note that, as with the internal policies, if multiple policies are
> * returned then they will be combined into a single expression with
> * all of them OR'd together. However, to avoid the situation of an
> * extension granting more access to a table than the internal policies
> * would allow, the extension's policies are AND'd with the internal
> * policies. In other words - extensions can only provide further
> * filtering of the result set (or further reduce the set of records
> * allowed to be added).
>
> which seems reasonable, and means that if there are both internal and
> external policies, an "allow all" external policy would be a no-op.
>
Great, I'm glad to see that they're ANDed now.
I wasn't caught up with the current state of this. At some earlier point
policies from hooks were being ORed, which made mandatory access control
extensions impossible.
(I need to finish reading threads before replying).
--
Craig Ringer http://www.2ndQuadrant.com/
PostgreSQL Development, 24x7 Support, Training & Services
From | Date | Subject | |
---|---|---|---|
Next Message | Dean Rasheed | 2015-04-09 06:56:44 | Re: Row security violation error is misleading |
Previous Message | Craig Ringer | 2015-04-09 06:47:02 | Re: Row security violation error is misleading |