On 08.06.21 21:29, David Christensen wrote:
     > So basically where we are dispatching to the CASCADE guts, first
    check session user’s DELETE permission and throw the normal
    permissions error if they can’t delete?

    Actually, you also need appropriate SELECT permissions that correspond
    to the WHERE clause of the DELETE statement.


So this would be both a table-level and column level check?  (It seems odd that we could configure a policy whereby we could DELETE an arbitrary row in the table, but not SELECT which one, but I can see that there could be information leakage implications here.)

Other permissions-level things to consider, like RLS, or is this part automatic?  Do you happen to know offhand another instance in the code which takes these granular permissions into consideration?  Might help bootstrap both the understanding and the implementation of this.

All of this permissions checking code already exists in the executor, so the question perhaps isn't so much which details to consider but how to make use of that code. If you convince the trigger actions to run as the invoker of the original DELETE rather than whatever they are doing now, that should all work correctly. How to do that, I don't know right now.


Reply via email to