aboutsummaryrefslogtreecommitdiff
path: root/src/backend/parser/parse_utilcmd.c
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2017-11-09 12:36:58 -0500
committerTom Lane <tgl@sss.pgh.pa.us>2017-11-09 12:36:58 -0500
commit5ecc0d738e5864848bbc2d1d97e56d5846624ba2 (patch)
tree836cf5b1fc7fb0b953133f3c6dccd3be91c9a795 /src/backend/parser/parse_utilcmd.c
parent6c3a7ba5bb0f960ed412b1c36e815f53347b3d79 (diff)
downloadpostgresql-5ecc0d738e5864848bbc2d1d97e56d5846624ba2.tar.gz
postgresql-5ecc0d738e5864848bbc2d1d97e56d5846624ba2.zip
Restrict lo_import()/lo_export() via SQL permissions not hard-wired checks.
While it's generally unwise to give permissions on these functions to anyone but a superuser, we've been moving away from hard-wired permission checks inside functions in favor of using the SQL permission system to control access. Bring lo_import() and lo_export() into compliance with that approach. In particular, this removes the manual configuration option ALLOW_DANGEROUS_LO_FUNCTIONS. That dates back to 1999 (commit 4cd4a54c8); it's unlikely anyone has used it in many years. Moreover, if you really want such behavior, now you can get it with GRANT ... TO PUBLIC instead. Michael Paquier Discussion: https://postgr.es/m/CAB7nPqRHmNOYbETnc_2EjsuzSM00Z+BWKv9sy6tnvSd5gWT_JA@mail.gmail.com
Diffstat (limited to 'src/backend/parser/parse_utilcmd.c')
0 files changed, 0 insertions, 0 deletions