Andrew Dunstan <and...@dunslane.net> wrote:
 
> I'm wondering if we can reasonably continue to support plperl as
> a trusted language
 
> would still be plperlu, with the downside that the functions have
> to be installed by a superuser. One of my PGExperts colleagues
> told me his reaction was "Well, I might just as well use plperlu",
> and that pretty well sums up my reaction.
 
Well, I can see where running plperl with this module would be no
more safe than running plperlu, so I don't really understand the
purpose of the module; however, to install this module you need to:
 
| Set the PERL5OPT before starting postgres, to something like this:
|     PERL5OPT='-e "require q{plperlinit.pl}"'
| and create a plperlinit.pl file in the same directory as your
| postgres.conf file.
| In the plperlinit.pl file write the code to load this module, plus
| any others you want to load and share subroutines from. 
 
I don't see where plperl is unsafe unless you do those things.  A
user who can do those things can likely subvert your database in
other ways, no?
 
-Kevin

-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to