mirror of
https://github.com/postgres/postgres.git
synced 2025-06-14 18:42:34 +03:00
Prohibit transaction commands in security definer procedures
Starting and aborting transactions in security definer procedures doesn't work. StartTransaction() insists that the security context stack is empty, so this would currently cause a crash, and AbortTransaction() resets it. This could be made to work by reorganizing the code, but right now we just prohibit it. Reported-by: amul sul <sulamul@gmail.com> Discussion: https://www.postgresql.org/message-id/flat/CAAJ_b96Gupt_LFL7uNyy3c50-wbhA68NUjiK5%3DrF6_w%3Dpq_T%3DQ%40mail.gmail.com
This commit is contained in:
@ -2245,6 +2245,15 @@ ExecuteCallStmt(CallStmt *stmt, ParamListInfo params, bool atomic, DestReceiver
|
||||
if (!heap_attisnull(tp, Anum_pg_proc_proconfig, NULL))
|
||||
callcontext->atomic = true;
|
||||
|
||||
/*
|
||||
* In security definer procedures, we can't allow transaction commands.
|
||||
* StartTransaction() insists that the security context stack is empty,
|
||||
* and AbortTransaction() resets the security context. This could be
|
||||
* reorganized, but right now it doesn't work.
|
||||
*/
|
||||
if (((Form_pg_proc )GETSTRUCT(tp))->prosecdef)
|
||||
callcontext->atomic = true;
|
||||
|
||||
/*
|
||||
* Expand named arguments, defaults, etc.
|
||||
*/
|
||||
|
Reference in New Issue
Block a user