Return-Path: Delivered-To: apmail-db-derby-dev-archive@www.apache.org Received: (qmail 33487 invoked from network); 20 Jul 2007 21:54:28 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 20 Jul 2007 21:54:28 -0000 Received: (qmail 32205 invoked by uid 500); 20 Jul 2007 21:54:30 -0000 Delivered-To: apmail-db-derby-dev-archive@db.apache.org Received: (qmail 31995 invoked by uid 500); 20 Jul 2007 21:54:29 -0000 Mailing-List: contact derby-dev-help@db.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list derby-dev@db.apache.org Delivered-To: moderator for derby-dev@db.apache.org Received: (qmail 49385 invoked by uid 99); 20 Jul 2007 15:29:05 -0000 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests=UNPARSEABLE_RELAY X-Spam-Check-By: apache.org Received-SPF: pass (herse.apache.org: local policy) Date: Fri, 20 Jul 2007 17:28:39 +0200 From: Dag.Wanvik@Sun.COM (Dag H. Wanvik) Subject: Re: [jira] Assigned: (DERBY-2925) Prevent export from overwriting existing files In-reply-to: <469BEE25.6040906@sbcglobal.net> Sender: Dag.Wanvik@Sun.COM To: derby-dev@db.apache.org Message-id: MIME-version: 1.0 Content-type: text/plain; charset=us-ascii Content-transfer-encoding: 7BIT References: <15385046.1184285525014.JavaMail.jira@brutus> <469BEE25.6040906@sbcglobal.net> User-Agent: Gnus/5.1008 (Gnus v5.10.8) Emacs/22.0.50 (usg-unix-v) X-Virus-Checked: Checked by ClamAV on apache.org Kathey Marsden writes: > I don't think adding another jar will improve usability. I think the > restriction of a dedicated export directory or restrictions on > directory names for export will also not improve usability. I think > it is reasonable to expect the user to delete pre-existing files > before exporting over them. But this is all just a straight > difference of opinion. Just want to state that my comment to this issue would not cause me to vote -1 for the issue or the release :) But looking at how DERBY-2436 is also open (misuse of IMPORT to read aunauthorized data); I guess i feel that some more general way of limiting *which* files are read/written by export/import is the way to go, even if it risks causing some incompatibility. Thanks, Dag