Re: Re-enabling SET ROLE in security definer functions
От | Tom Lane |
---|---|
Тема | Re: Re-enabling SET ROLE in security definer functions |
Дата | |
Msg-id | 26166.1262289213@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Re: Re-enabling SET ROLE in security definer functions (Heikki Linnakangas <heikki.linnakangas@enterprisedb.com>) |
Ответы |
Re: Re-enabling SET ROLE in security definer functions
|
Список | pgsql-hackers |
Heikki Linnakangas <heikki.linnakangas@enterprisedb.com> writes: > Turner, Ian wrote: > From: Tom Lane [mailto:tgl@sss.pgh.pa.us] >>> Actually, I don't find that to be a given. Exactly what use-cases have >>> you got that aren't solved as well or better by calling a SECURITY DEFINER >>> function owned by the target role? >> >> Oh, that's easy: If you want to do the equivalent of setreuid(geteuid(), getuid()); that is, if you want to drop privilegesfor a particular operation. Our particular use case is that we want to evaluate an expression provided by the callerbut with the caller's privileges. > Now *that's* what we should focus on. That's a reasonable use case, but > it doesn't seem like SET ROLE quite cuts it. Exactly. If that's what you want, we can talk about it, but *SET ROLE doesn't solve that problem*. In fact, a security definer function is a lot closer to solving that problem than SET ROLE is. The premise of SET ROLE is that you can always get to any role that the session user could get to, so it doesn't "give up permissions" in any non-subvertible fashion. regards, tom lane
В списке pgsql-hackers по дате отправления: