aboutsummaryrefslogtreecommitdiff
path: root/contrib/btree_gist/btree_text.c
diff options
context:
space:
mode:
authorJeff Davis <jdavis@postgresql.org>2022-01-07 17:38:20 -0800
committerJeff Davis <jdavis@postgresql.org>2022-01-07 17:40:56 -0800
commita2ab9c06ea15fbcb2bfde570986a06b37f52bcca (patch)
tree8fdee8c9df638b5e0c6850a16ffa2d5677866189 /contrib/btree_gist/btree_text.c
parentd0d62262d34154965511cfda6b98609d27752d5a (diff)
downloadpostgresql-a2ab9c06ea15fbcb2bfde570986a06b37f52bcca.tar.gz
postgresql-a2ab9c06ea15fbcb2bfde570986a06b37f52bcca.zip
Respect permissions within logical replication.
Prevent logical replication workers from performing insert, update, delete, truncate, or copy commands on tables unless the subscription owner has permission to do so. Prevent subscription owners from circumventing row-level security by forbidding replication into tables with row-level security policies which the subscription owner is subject to, without regard to whether the policy would ordinarily allow the INSERT, UPDATE, DELETE or TRUNCATE which is being replicated. This seems sufficient for now, as superusers, roles with bypassrls, and target table owners should still be able to replicate despite RLS policies. We can revisit the question of applying row-level security policies on a per-row basis if this restriction proves too severe in practice. Author: Mark Dilger Reviewed-by: Jeff Davis, Andrew Dunstan, Ronan Dunklau Discussion: https://postgr.es/m/9DFC88D3-1300-4DE8-ACBC-4CEF84399A53%40enterprisedb.com
Diffstat (limited to 'contrib/btree_gist/btree_text.c')
0 files changed, 0 insertions, 0 deletions