[
http://issues.apache.org/jira/browse/DERBY-1330?page=comments#action_12418661 ]
Daniel John Debrunner commented on DERBY-1330:
----------------------------------------------
Comment on QueryTreeNode changes and related items:
I think the logic for what you are trying to do is correct, but the terminology
and some of the descriptions in comments could be expanded.
The code equates executing with definer's priviliges to not having to
collect priviliges dependencies. I think the comments on
isExecutingWithInovkerPrivileges() could be expanded to explain why collection
is not needed. I think that maybe it's not generally true for definer mode and
maybe the methods could be better named to relfect the actual situations, which
I think are:
- create view - collect privilege information for select statement
- execute view (as definer) -collect privilege information for select
statement
- execute select (invoker) - do collect privilege information for select
statement
I'm just concerned that in the future when/if Derby supports definer mode for
routines will the naming scheme for your methods continue to make sense, or can
we ensure today that the method names (and comments) accurately reflect their
purpose?
Another aspect of this is the use of "executing" in the current tense for the
QueryNodes (method name isExecutingWithInvokerPrivileges, comment "this node
is executing"). The executing you are talking about relates to the runtime
execution of the generated statement, not the execution of the node itself.
Maybe be picky, but it's easy to get lost in the code because the present
tense leads one to have the mindset the code is referring the current
compilation, not the future execution.
> Provide runtime privilege checking for grant/revoke functionality
> -----------------------------------------------------------------
>
> Key: DERBY-1330
> URL: http://issues.apache.org/jira/browse/DERBY-1330
> Project: Derby
> Type: Sub-task
> Components: SQL
> Versions: 10.2.0.0
> Reporter: Mamta A. Satoor
> Assignee: Mamta A. Satoor
> Attachments: AuthorizationModelForDerbySQLStandardAuthorization.html,
> AuthorizationModelForDerbySQLStandardAuthorizationV2.html,
> Derby1330ViewPrivilegeCollectionV1diff.txt,
> Derby1330ViewPrivilegeCollectionV1stat.txt
>
> Additional work needs to be done for grant/revoke to make sure that only
> users with required privileges can access various database objects. In order
> to do that, first we need to collect the privilege requirements for various
> database objects and store them in SYS.SYSREQUIREDPERM. Once we have this
> information then when a user tries to access an object, the required
> SYS.SYSREQUIREDPERM privileges for the object will be checked against the
> user privileges in SYS.SYSTABLEPERMS, SYS.SYSCOLPERMS and
> SYS.SYSROUTINEPERMS. The database object access will succeed only if the user
> has the necessary privileges.
> SYS.SYSTABLEPERMS, SYS.SYSCOLPERMS and SYS.SYSROUTINEPERMS are already
> populated by Satheesh's work on DERBY-464. But SYS.SYSREQUIREDPERM doesn't
> have any information in it at this point and hence no runtime privilege
> checking is getting done at this point.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
http://www.atlassian.com/software/jira