[ 
https://issues.apache.org/jira/browse/CALCITE-5292?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17607453#comment-17607453
 ] 

Jiajun Xie commented on CALCITE-5292:
-------------------------------------

+1,  I already have  a policy that can prevent SQL statements from running if 
they contain certain functions.

But for my employer,  disable functions because of security issues. For 
example, reflect UDF.

> Add a policy that can prevent SQL statements from running if they contain 
> certain functions / operators 
> --------------------------------------------------------------------------------------------------------
>
>                 Key: CALCITE-5292
>                 URL: https://issues.apache.org/jira/browse/CALCITE-5292
>             Project: Calcite
>          Issue Type: Bug
>            Reporter: Julian Hyde
>            Priority: Major
>
> Add a policy that can prevent SQL statements from running if they contain 
> certain operators, including built-in functions and operators.
> One use of this policy would be to disable functions that contain serious 
> bugs. For example, we could have prevented use of {{EXTRACTVALUE}} as a 
> workaround to CALCITE-5263.
> Calcite's predecessor [LucidDB|https://github.com/LucidDB/luciddb] had 
> policy-driven access to tables, but this code was never fully enabled in 
> Calcite. Ironically, the last remaining code was deprecated in CALCITE-4953. 
> We should consider reviving the policy and making it handle tables and 
> functions/operators.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to