Replies: 2 comments 3 replies
-
INVOKER security doesn't make sense for materialized views, as there is no "invoker" for the materialized view other than whoever creates it in the first place. For all intents and purposes, the materialized view is computed when it's created (and then maintained by the system in the background). |
Beta Was this translation helpful? Give feedback.
-
Hi @okayhooni, this seems like interesting stuff! I was wondering what you did for your encryption/decryption functions, would you be willing to share? Also, did you implement a custom function for integrity or is that handled by --SECURITY INVOKER? |
Beta Was this translation helpful? Give feedback.
-
I tested MATERIALIZED VIEW recently and found that reading MATERIALIZED VIEW is performed with permission of VIEW DEFINER (as like DEFAULT behavior of normal Trino view)
I want to define and use MATERIALIZED VIEW with permission of VIEW INVOKER (query-submitting user), but there is no
SECURITY INVOKER
option, unlike normal VIEW..Is there any technical(or other special) reason not to implement
SECURITY
option on the MATERIALIZED VIEW?Related PR) #19160
Related comment) https://github.com/trinodb/trino/pull/19160/files#r1756250563
cc/ @dain @raunaqmorarka
Beta Was this translation helpful? Give feedback.
All reactions