[PATCH] SE-PostgreSQL for v8.5 development (r1769) - Mailing list pgsql-hackers

From KaiGai Kohei
Subject [PATCH] SE-PostgreSQL for v8.5 development (r1769)
Date
Msg-id 49C74FE8.6030601@ak.jp.nec.com
Whole thread Raw
Responses [PATCH] SE-PostgreSQL for v8.5 development (r1819)  (KaiGai Kohei <kaigai@ak.jp.nec.com>)
List pgsql-hackers
The following list of patches are the initial revision of SE-PostgreSQL
on the v8.5 development cycle.
These are separated into several functional components to help review
and commit in earlier phase. Every patches (except for the core) have
abour 1KL scales. It is far smaller than them in a year ago. :-)
 http://sepgsql.googlecode.com/files/sepgsql-01-sysatt-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-02-core-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-03-writable-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-04-rowlevel-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-05-perms-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-06-utils-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-07-tests-8.4devel-r1769.patch
http://sepgsql.googlecode.com/files/sepgsql-08-docs-8.4devel-r1769.patch

Needless to say, it is now designed on 8.4devel tree, so anyone who want
to build/install SE-PostgreSQL can apply these patches by hand.
I'll also update and fix them with the progress of v8.4 development.
Before you apply them, please confirm whether they are the latest, or not.

Bruice,
| KaiGai-san, the only option I can offer is perhaps to list a URL for
| your SE-PostgreSQL patch to be applied by people who want to use SE-PG.

Does it mean I need to submit a patch to add an introduction under doc/ ?
If so, I'll submit it as soon as possible.

Thanks,


01) Security system attribute support   scale: 38 files changed, 853 insertions(+), 1 deletion(-), 113 modifications(!)
Thispatch adds a new system catalog "pg_security" and enables to store security identifier associated to a text
representationwithin padding area of HeapTupleHeader, as object identifier doing. It is a foundation of any other
facilities.

02) Core facilities of SE-PostgreSQL   scale: 55 files changed, 3588 insertions(+), 10 deletions(-), 736
modifications(!)This patch adds a mandatory access control feature collaborating with SELinux in table, column,
procedurelevel granurality. Most of this patch is same as I proposed in the v8.4 development cycle, except for it is
designedon the basis of security system attribute support.
 

03) Writable system column support   scale: 7 files changed, 298 insertions(+), 199 modifications(!) This patch enables
usersto update/insert on system columns ("security_label" and "security_acl") with explicit values. This feature is
necessaryto provide a user interface for row-level access controls.
 

04) Row-level access controls support   scale: 31 files changed, 1101 insertions(+), 231 modifications(!) This patch
enablesto apply mandatory/discretionary access control in row-level granularity also.
 

05) Advanced permission checks support   scale: 18 files changed, 858 insertions(+), 3 deletions(-), 43
modifications(!)This patch add some of advanced permission checks:  - file:{read write} on server side filesystem
accesses - db_procedure:{install} on user defined functions as system internal ones  - db_database:{load_module
install_module}on binary shared library files In the v8.4 development, these are suggested to separate from the core.
 

06) Security options in utilities   scale: 4 files changed, 95 insertions(+), 116 modifications(!) This patch adds
optionson utilities  - "--enable-selinux" option for initdb  - "--security-label" option for pg_dump and pg_dumpall
 

07) Testcases of SE-PostgreSQL   scale: 18 files changed, 1819 insertions(+), 2 modifications(!) This patch adds
testcasesfor SE-PostgreSQL.
 

08) Documentation of SE-PostgreSQL   scale: 16 files changed, 1595 insertions(+), 42 modifications(!) This patch adds
documentationsfor SE-PostgreSQL
 

0X) Upcoming patches The following patches are upcoming now. * Reclaim of unused entries in pg_security   I have a plan
toimplement it based on the idea from Robert Haas in:
http://archives.postgresql.org/message-id/603c8f070901281818u3e1fa70brd28e1bfac7adfea9@mail.gmail.com
 * System audit integration with SE-PostgreSQL   Linux has system audit stuff which is used by in-kernel SELinux and
itsuserspace facilities can output audit messages here.   Now SE-PostgreSQL writes out audit messages into PostgreSQL
logs,  but it is more desirable to write it on system audit.
 

-- 
OSS Platform Development Division, NEC
KaiGai Kohei <kaigai@ak.jp.nec.com>


pgsql-hackers by date:

Previous
From: Dimitri Fontaine
Date:
Subject: Re: contrib function naming, and upgrade issues
Next
From: Kedar Potdar
Date:
Subject: Partitioning feature ...