diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2017-11-09 12:36:58 -0500 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2017-11-09 12:36:58 -0500 |
commit | 5ecc0d738e5864848bbc2d1d97e56d5846624ba2 (patch) | |
tree | 836cf5b1fc7fb0b953133f3c6dccd3be91c9a795 /src/backend/parser/parse_utilcmd.c | |
parent | 6c3a7ba5bb0f960ed412b1c36e815f53347b3d79 (diff) | |
download | postgresql-5ecc0d738e5864848bbc2d1d97e56d5846624ba2.tar.gz postgresql-5ecc0d738e5864848bbc2d1d97e56d5846624ba2.zip |
Restrict lo_import()/lo_export() via SQL permissions not hard-wired checks.
While it's generally unwise to give permissions on these functions to
anyone but a superuser, we've been moving away from hard-wired permission
checks inside functions in favor of using the SQL permission system to
control access. Bring lo_import() and lo_export() into compliance with
that approach.
In particular, this removes the manual configuration option
ALLOW_DANGEROUS_LO_FUNCTIONS. That dates back to 1999 (commit 4cd4a54c8);
it's unlikely anyone has used it in many years. Moreover, if you really
want such behavior, now you can get it with GRANT ... TO PUBLIC instead.
Michael Paquier
Discussion: https://postgr.es/m/CAB7nPqRHmNOYbETnc_2EjsuzSM00Z+BWKv9sy6tnvSd5gWT_JA@mail.gmail.com
Diffstat (limited to 'src/backend/parser/parse_utilcmd.c')
0 files changed, 0 insertions, 0 deletions