* Robert Haas (robertmh...@gmail.com) wrote:
> On Fri, Dec 11, 2009 at 2:11 PM, Stephen Frost <sfr...@snowman.net> wrote:
> > Second, the information we *don't* have from above is generally
> > information about what the requesting action is.  For example, when
> > changing ownership of an object, we can't possibly use introspection to
> > find out the role which is on the receiving end, since at that time
> > we've just learned it from the parser.
> 
> I'm not sure that I follow what you're saying here.  I think maybe it
> would help to discuss a concrete example, which is why I proposed a
> concept patch.  Or perhaps you'd like just to pick out a specific case
> to discuss.

Hrm, I thought I had given a specific example.  Didn't do a good job of
it, apparently.  Let me try to be a bit more clear:

ALTER TABLE x OWNER TO y;

If given the table OID, there's a ton of information we can then pull
about the table- the tablespace, the owner, the schema, the columns, the
privileges, etc, etc.

What we can't possibly figure out from the OID is the value of y.  Yet,
in the PG security model, the value of y matters!  You have to know what
y is to check if y has 'create' rights on the schema.  If it doesn't
(and the user executing the command isn't the superuser) then the
request (under the PG model) is denied.

Does that help clarify my example case?

> Object creation seems to be one of the tougher cases here.  When
> you're altering or dropping an existing object, the decision is likely
> to be based (in any system) on the properties of that object.  When
> you're creating an object, the decision will of course have to be
> based on the properties of something else, but different access
> control models might not agree on the value of "something else".  It's
> not immediately clear to me how to deal with that, but again it's hard
> for me to discuss it in the abstract.

That sounds like a pretty good example to me too, to be honest.  It goes
back to the same issue though- that's information you get from the
command that's trying to be run and isn't available from existing
objects.  Using structures to track this information, allowing the
function arguments to remain identical, is certainly something which can
be done, and probably done with a minimal amount of fuss.

        Thanks,

                Stephen

Attachment: signature.asc
Description: Digital signature

Reply via email to