*
*
* IDENTIFICATION
- * $Header: /cvsroot/pgsql/src/backend/libpq/be-fsstubs.c,v 1.34 1999/05/31 22:53:57 tgl Exp $
+ * $Header: /cvsroot/pgsql/src/backend/libpq/be-fsstubs.c,v 1.35 1999/06/04 21:13:38 tgl Exp $
*
* NOTES
* This should be moved to a more appropriate place. It is here
LargeObjectDesc *lobj;
Oid lobjOid;
+#ifndef ALLOW_DANGEROUS_LO_FUNCTIONS
if (!superuser())
elog(ERROR, "You must have Postgres superuser privilege to use "
"server-side lo_import().\n\tAnyone can use the "
"client-side lo_import() provided by libpq.");
+#endif
/*
* open the file to be read in
LargeObjectDesc *lobj;
mode_t oumask;
+#ifndef ALLOW_DANGEROUS_LO_FUNCTIONS
if (!superuser())
elog(ERROR, "You must have Postgres superuser privilege to use "
"server-side lo_export().\n\tAnyone can use the "
"client-side lo_export() provided by libpq.");
+#endif
/*
* open the inversion "object"
#undef USE_POSIX_SIGNALS
/*
- * Code below this point should not require changes
+ * Pull in OS-specific declarations (using link created by configure)
*/
#include "os.h"
*/
/* #define PSQL_ALWAYS_GET_PASSWORDS */
+/*
+ * Define this if you want to allow the lo_import and lo_export SQL functions
+ * to be executed by ordinary users. By default these functions are only
+ * available to the Postgres superuser. CAUTION: these functions are
+ * SECURITY HOLES since they can read and write any file that the Postgres
+ * backend has permission to access. If you turn this on, don't say we
+ * didn't warn you.
+ */
+/* #define ALLOW_DANGEROUS_LO_FUNCTIONS */
+
/*
* Use btree bulkload code:
* this code is moderately slow (~10% slower) compared to the regular