Summary: | dev-db/postgresql-server-9.2.1 broekn permissions on UD-socket | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Sven E. <dark> |
Component: | [OLD] Server | Assignee: | PgSQL Bugs <pgsql-bugs> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | floppym |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Sven E.
2012-12-31 05:44:31 UTC
From pkg_postinst: elog "If you have users and/or services that you would like to utilize the" elog "socket, you must add them to the 'postgres' system group:" elog " usermod -a -G postgres <user>" Is there some reason you cannot do this? Okay, I could add all the daemons to the postgres group, but is that really reasonable? Shouldn't access to the RDBMS only be handled by the RDBMS? Instead of the filesystem? I am just not feeling comfortable with sticking all daemons, having their own group anyway, into the postgres group additionally. And what about i.e. apache+suexec - would we really want dozens of users in the postgres system group and among them some daemons, to always loose track? How about this: Provide the current values (mode+ownership) as presets and make them overrideable via conf.d - This way the admin decides, what he/she thinks is reasonable for the setup facing. Upstream recommends that the permissions on the sockets' directory be what I have default them to and I won't provide the means for a user to shoot themselves in the foot. However, I cannot keep you from editing the initscript. It is as reasonable to expect the administrator to keep track of who has permissions to access the socket as anything else he or she needs to keep track of. *** This bug has been marked as a duplicate of bug 395331 *** (In reply to comment #3) > Upstream recommends that the permissions on the sockets' directory be what I > have default them to and I won't provide the means for a user to shoot > themselves in the foot. However, I cannot keep you from editing the > initscript. > > It is as reasonable to expect the administrator to keep track of who has > permissions to access the socket as anything else he or she needs to keep > track of. > > *** This bug has been marked as a duplicate of bug 395331 *** Okay, but usually you could just change permissions. The problem is having the socket on tmpfs and hardcoding the permisions. And yes, I do know, I can change the script. Maybe I am having a different perspective, as I use ACLs consequently. With ACLs you move away from that last millenium concept of creating a group for every specific access purpose and sticking all users into it, since you have the option to add multiple groups and users to the ACL of an object. |