[HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread Golden Liu
Hi all, I'm one of the Google SoC's students for PostgreSQL. My project is to implement column-level privilege in PG. Here is a description of my project. Any and all help and/or comment is appreciated. Table-level privilege subsystem in PG is now used like this: GRANT { { SELECT | INSERT |

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread August Zajonc
Golden Liu wrote: 3. Before evaluating a SQL command, check column-level privilege. This is done AFTER checking table-level privilege. As I mentioned before, if table-level privilege is granted, it's not necessary to check column-level privilege. Golden, this sounds good. I'm just a user. It

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread Peter Eisentraut
Am Dienstag, 24. April 2007 14:54 schrieb Golden Liu: Here is a plan of my project: All of that should be pretty straightforward. But have you given any thoughts to how you want to represent the column privileges in the parse tree and how you want to process them in the rewriter? That will

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread Joris Dobbelsteen
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of August Zajonc Sent: dinsdag 24 april 2007 18:34 To: Golden Liu Cc: pgsql-hackers@postgresql.org Subject: Re: [HACKERS] Google SoC: column-level privilege subsystem Golden Liu wrote: 3. Before evaluating

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread Robert Haas
It sounds like table || column is the check, so table implies all of columns. ie, revoking a column permission does nothing unless TABLE permission is also revoked. IF this will be implemented as suggested here, it will become extremely counter-intuitive. Its just like you have access to

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread Golden Liu
Dear August Thank you for your reply. On 4/25/07, August Zajonc [EMAIL PROTECTED] wrote: Golden Liu wrote: 3. Before evaluating a SQL command, check column-level privilege. This is done AFTER checking table-level privilege. As I mentioned before, if table-level privilege is granted, it's

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread August Zajonc
Robert Haas wrote: My strongly opinion is that, REVOKE column-level priviledge should revoke access to that column, in effect it should reduce the table-level grant to column-level grants. I think this causes problems when columns are added to the table. If table X has columns A, B, C,

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread Tom Lane
Robert Haas [EMAIL PROTECTED] writes: ... IF this will be implemented as suggested here, it will become extremely counter-intuitive. ... You could solve this by having explicit positive and negative ACLs, i.e. your permissions for a particular column are: Uh, wait a moment, people. The

Re: [HACKERS] Google SoC: column-level privilege subsystem

2007-04-24 Thread August Zajonc
Tom Lane wrote: Robert Haas [EMAIL PROTECTED] writes: ... IF this will be implemented as suggested here, it will become extremely counter-intuitive. ... You could solve this by having explicit positive and negative ACLs, i.e. your permissions for a particular column are: