summaryrefslogtreecommitdiffstats
path: root/src/test/modules/dummy_seclabel/README
blob: a3fcbd7599402c7f0b645590555c26857af1a1c2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
The dummy_seclabel module exists only to support regression testing of
the SECURITY LABEL statement.  It is not intended to be used in production.

Rationale
=========

The SECURITY LABEL statement allows the user to assign security labels to
database objects; however, security labels can only be assigned when
specifically allowed by a loadable module, so this module is provided to
allow proper regression testing.

Security label providers intended to be used in production will typically be
dependent on a platform-specific feature such as SELinux.  This module is
platform-independent, and therefore better-suited to regression testing.

Usage
=====

Here's a simple example of usage:

# postgresql.conf
shared_preload_libraries = 'dummy_seclabel'

postgres=# CREATE TABLE t (a int, b text);
CREATE TABLE
postgres=# SECURITY LABEL ON TABLE t IS 'classified';
SECURITY LABEL

The dummy_seclabel module provides only four hardcoded
labels: unclassified, classified,
secret, and top secret.
It does not allow any other strings as security labels.

These labels are not used to enforce access controls.  They are only used
to check whether the SECURITY LABEL statement works as expected,
or not.

Author
======

KaiGai Kohei <kaigai@ak.jp.nec.com>