Re: 8.4 release planning

From: Joshua Brindle <method(at)manicmethod(dot)com>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Simon Riggs <simon(at)2ndQuadrant(dot)com>, Josh Berkus <josh(at)agliodbs(dot)com>, Stephen Frost <sfrost(at)snowman(dot)net>, Gregory Stark <stark(at)enterprisedb(dot)com>, Robert Haas <robertmhaas(at)gmail(dot)com>, Ron Mayer <rm_pg(at)cheapcomplexdevices(dot)com>, "Joshua D(dot) Drake" <jd(at)commandprompt(dot)com>, Merlin Moncure <mmoncure(at)gmail(dot)com>, "Jonah H(dot) Harris" <jonah(dot)harris(at)gmail(dot)com>, Bruce Momjian <bruce(at)momjian(dot)us>, Bernd Helmle <mailings(at)oopsware(dot)de>, Peter Eisentraut <peter_e(at)gmx(dot)net>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: 8.4 release planning
Date: 2009-01-27 20:16:28
Message-ID: 497F6B9C.3030307@manicmethod.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Tom Lane wrote:
> Simon Riggs <simon(at)2ndQuadrant(dot)com> writes:
>> On Tue, 2009-01-27 at 13:57 -0500, Joshua Brindle wrote:
>>> Josh Berkus wrote:
>>>> Hmmm. Why try to hide individual rows in tables then? That would seem
>>>> not in keeping with the filesystem policies.
>>> Because rows have data in them. It is analogous to not allowing the contents of
>>> the file to be visible. However, the primary key is still known to exist through
>>> various means, which is more analogous to the filename.
>
>> Since most keys are likely to be non-meaningful IDs, its not going to
>> help you much.
>
> Even more to the point: if the expectation is that you can hide a row's
> data payload but not its primary key, you can accomplish that with
> column-level permissions, without having to get into any non-standard
> or even faintly surprising SQL behavior,
>

We aren't saying we want to hide the payload of the data in an entire column,
just the data in some of the rows. For example, if you have top secret and
secret data in the same table a secret user would be able to see the entire row
for secret rows but maybe only some of the data on the top secret rows (or maybe
not see the rows at all).

Further, the top secret rows may have some fields that are inaccessible but are
accessible through a trusted stored procedure that does fuzzing on the data
(back to the coordinates example I used earlier)

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Joshua D. Drake 2009-01-27 20:20:33 Re: pg_upgrade project status
Previous Message Heikki Linnakangas 2009-01-27 20:12:44 Re: pg_upgrade project status