mirror of
https://github.com/postgres/postgres.git
synced 2025-07-27 12:41:57 +03:00
Add context info to OAT_POST_CREATE security hook
... and have sepgsql use it to determine whether to check permissions during certain operations. Indexes that are being created as a result of REINDEX, for instance, do not need to have their permissions checked; they were already checked when the index was created. Author: KaiGai Kohei, slightly revised by me
This commit is contained in:
@ -145,7 +145,6 @@
|
||||
#define SEPG_DB_TABLE__INSERT (1<<8)
|
||||
#define SEPG_DB_TABLE__DELETE (1<<9)
|
||||
#define SEPG_DB_TABLE__LOCK (1<<10)
|
||||
#define SEPG_DB_TABLE__INDEXON (1<<11)
|
||||
|
||||
#define SEPG_DB_SEQUENCE__CREATE (SEPG_DB_DATABASE__CREATE)
|
||||
#define SEPG_DB_SEQUENCE__DROP (SEPG_DB_DATABASE__DROP)
|
||||
@ -312,6 +311,7 @@ extern void sepgsql_attribute_relabel(Oid relOid, AttrNumber attnum,
|
||||
extern void sepgsql_relation_post_create(Oid relOid);
|
||||
extern void sepgsql_relation_drop(Oid relOid);
|
||||
extern void sepgsql_relation_relabel(Oid relOid, const char *seclabel);
|
||||
extern void sepgsql_relation_setattr(Oid relOid);
|
||||
|
||||
/*
|
||||
* proc.c
|
||||
|
Reference in New Issue
Block a user