Re: PCI:SSF - Safe SQL Query & operators filter
От | David G. Johnston |
---|---|
Тема | Re: PCI:SSF - Safe SQL Query & operators filter |
Дата | |
Msg-id | CAKFQuwYvkohCz2o=r7tEzpif0_DfaNzup5H-wJaR-1BJGOJz=g@mail.gmail.com обсуждение исходный текст |
Ответ на | PCI:SSF - Safe SQL Query & operators filter (Jan Bilek <jan.bilek@eftlab.com.au>) |
Список | pgsql-general |
The main problem comes from obvious - our application's PostgreSQL user needs to have an Superuser role as it manages most of its (dedicated) database (creates tables, drops those, manages views, triggers ... ).
So these - pg_read_server_files, pg_write_server_files and pg_execute_server_program roles are inherited from the Superuser
and are also super sensitive for us, but our application user apparently still needs to be superuser for multiple reasons.
1/ What we need is to create a postgresql user who would be pg_database_owner but not superuser
... but apparently we still need our user to be superuser to be able to carry on with some operations (picking one of more then few) ....
CREATE OR REPLACE LANGUAGE plpython3u;
HINT: Must be superuser to create this extension.
2/ Second option is to introduce some sort of limitation of allowed SQL queries
В списке pgsql-general по дате отправления: