Re: Permission select pg_stat_replication

From: Stephen Frost <sfrost(at)snowman(dot)net>
To: Denish Patel <denish(at)omniti(dot)com>
Cc: jesse(dot)waters(at)gmail(dot)com, "pgsql-admin(at)postgresql(dot)org" <pgsql-admin(at)postgresql(dot)org>
Subject: Re: Permission select pg_stat_replication
Date: 2015-04-01 15:53:02
Message-ID: 20150401155302.GP3663@tamriel.snowman.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-admin pgsql-hackers

* Denish Patel (denish(at)omniti(dot)com) wrote:
> you should be able to use secure_check_postgres method to avoid granting
> SUPER permission on monitoring user.
[...]

Denish,

Please see my reply to Payal. This doesn't work. At the very least,
the permissions on the pg_stat_repl() function need to be adjusted to be
only GRANT'd to the monitoring user, otherwise the information is
available to everyone. If that's the intent, then the view might as
well be granted to PUBLIC.

Recall that, by defualt, EXECUTE on a function is granted to PUBLIC.

Thanks,

Stephen

In response to

Responses

Browse pgsql-admin by date

  From Date Subject
Next Message Denish Patel 2015-04-01 16:53:39 Re: Permission select pg_stat_replication
Previous Message Denish Patel 2015-04-01 15:46:46 Re: Permission select pg_stat_replication

Browse pgsql-hackers by date

  From Date Subject
Next Message Andres Freund 2015-04-01 16:04:40 Re: Tables cannot have INSTEAD OF triggers
Previous Message Robert Haas 2015-04-01 15:52:07 Re: TABLESAMPLE patch