diff options
author | Tom Lane | 2022-04-06 17:24:33 +0000 |
---|---|---|
committer | Tom Lane | 2022-04-06 17:24:33 +0000 |
commit | a0ffa885e478f5eeacc4e250e35ce25a4740c487 (patch) | |
tree | 7ce236305d5eb50f34bfccaf9a662cf3f0b77adf /src/backend/commands/seclabel.c | |
parent | 2ef6f11b0c77ec323c688ddfd98ffabddb72c11d (diff) |
Allow granting SET and ALTER SYSTEM privileges on GUC parameters.
This patch allows "PGC_SUSET" parameters to be set by non-superusers
if they have been explicitly granted the privilege to do so.
The privilege to perform ALTER SYSTEM SET/RESET on a specific parameter
can also be granted.
Such privileges are cluster-wide, not per database. They are tracked
in a new shared catalog, pg_parameter_acl.
Granting and revoking these new privileges works as one would expect.
One caveat is that PGC_USERSET GUCs are unaffected by the SET privilege
--- one could wish that those were handled by a revocable grant to
PUBLIC, but they are not, because we couldn't make it robust enough
for GUCs defined by extensions.
Mark Dilger, reviewed at various times by Andrew Dunstan, Robert Haas,
Joshua Brindle, and myself
Discussion: https://postgr.es/m/[email protected]
Diffstat (limited to 'src/backend/commands/seclabel.c')
-rw-r--r-- | src/backend/commands/seclabel.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/backend/commands/seclabel.c b/src/backend/commands/seclabel.c index 7a62d547e2f..7ae19b98bb9 100644 --- a/src/backend/commands/seclabel.c +++ b/src/backend/commands/seclabel.c @@ -78,6 +78,7 @@ SecLabelSupportsObjectType(ObjectType objtype) case OBJECT_OPCLASS: case OBJECT_OPERATOR: case OBJECT_OPFAMILY: + case OBJECT_PARAMETER_ACL: case OBJECT_POLICY: case OBJECT_PUBLICATION_NAMESPACE: case OBJECT_PUBLICATION_REL: |