mirror of
https://github.com/postgres/postgres.git
synced 2025-05-05 09:19:17 +03:00
Fix intermittent self-test failures caused by the stats_ext test.
Commit d7f8d26d9 added new tests to the stats_ext regression test that included creating a view in the public schema, without realising that the stats_ext test runs in the same parallel group as the rules test, which makes doing that unsafe. This led to intermittent failures of the rules test on the buildfarm, although I wasn't able to reproduce that locally. Fix by creating the view in a different schema. Tomas Vondra and Dean Rasheed, report and diagnosis by Thomas Munro. Discussion: https://postgr.es/m/CA+hUKGKX9hFZrYA7rQzAMRE07L4hziCc-nO_b3taJpiuKyLLxg@mail.gmail.com
This commit is contained in:
parent
87e9fae069
commit
3d9a3ef5cb
@ -752,19 +752,21 @@ SELECT * FROM check_estimated_rows('SELECT * FROM mcv_lists_bool WHERE NOT a AND
|
|||||||
-- the underlying table.
|
-- the underlying table.
|
||||||
--
|
--
|
||||||
-- Currently this is only relevant for MCV stats.
|
-- Currently this is only relevant for MCV stats.
|
||||||
CREATE TABLE priv_test_tbl (
|
CREATE SCHEMA tststats;
|
||||||
|
CREATE TABLE tststats.priv_test_tbl (
|
||||||
a int,
|
a int,
|
||||||
b int
|
b int
|
||||||
);
|
);
|
||||||
INSERT INTO priv_test_tbl
|
INSERT INTO tststats.priv_test_tbl
|
||||||
SELECT mod(i,5), mod(i,10) FROM generate_series(1,100) s(i);
|
SELECT mod(i,5), mod(i,10) FROM generate_series(1,100) s(i);
|
||||||
CREATE STATISTICS priv_test_stats (mcv) ON a, b
|
CREATE STATISTICS tststats.priv_test_stats (mcv) ON a, b
|
||||||
FROM priv_test_tbl;
|
FROM tststats.priv_test_tbl;
|
||||||
ANALYZE priv_test_tbl;
|
ANALYZE tststats.priv_test_tbl;
|
||||||
-- User with no access
|
-- User with no access
|
||||||
CREATE USER regress_stats_user1;
|
CREATE USER regress_stats_user1;
|
||||||
|
GRANT USAGE ON SCHEMA tststats TO regress_stats_user1;
|
||||||
SET SESSION AUTHORIZATION regress_stats_user1;
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
||||||
SELECT * FROM priv_test_tbl; -- Permission denied
|
SELECT * FROM tststats.priv_test_tbl; -- Permission denied
|
||||||
ERROR: permission denied for table priv_test_tbl
|
ERROR: permission denied for table priv_test_tbl
|
||||||
-- Attempt to gain access using a leaky operator
|
-- Attempt to gain access using a leaky operator
|
||||||
CREATE FUNCTION op_leak(int, int) RETURNS bool
|
CREATE FUNCTION op_leak(int, int) RETURNS bool
|
||||||
@ -772,39 +774,41 @@ CREATE FUNCTION op_leak(int, int) RETURNS bool
|
|||||||
LANGUAGE plpgsql;
|
LANGUAGE plpgsql;
|
||||||
CREATE OPERATOR <<< (procedure = op_leak, leftarg = int, rightarg = int,
|
CREATE OPERATOR <<< (procedure = op_leak, leftarg = int, rightarg = int,
|
||||||
restrict = scalarltsel);
|
restrict = scalarltsel);
|
||||||
SELECT * FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
SELECT * FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
||||||
ERROR: permission denied for table priv_test_tbl
|
ERROR: permission denied for table priv_test_tbl
|
||||||
DELETE FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
DELETE FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
||||||
ERROR: permission denied for table priv_test_tbl
|
ERROR: permission denied for table priv_test_tbl
|
||||||
-- Grant access via a security barrier view, but hide all data
|
-- Grant access via a security barrier view, but hide all data
|
||||||
RESET SESSION AUTHORIZATION;
|
RESET SESSION AUTHORIZATION;
|
||||||
CREATE VIEW priv_test_view WITH (security_barrier=true)
|
CREATE VIEW tststats.priv_test_view WITH (security_barrier=true)
|
||||||
AS SELECT * FROM priv_test_tbl WHERE false;
|
AS SELECT * FROM tststats.priv_test_tbl WHERE false;
|
||||||
GRANT SELECT, DELETE ON priv_test_view TO regress_stats_user1;
|
GRANT SELECT, DELETE ON tststats.priv_test_view TO regress_stats_user1;
|
||||||
-- Should now have access via the view, but see nothing and leak nothing
|
-- Should now have access via the view, but see nothing and leak nothing
|
||||||
SET SESSION AUTHORIZATION regress_stats_user1;
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
||||||
SELECT * FROM priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
SELECT * FROM tststats.priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
a | b
|
a | b
|
||||||
---+---
|
---+---
|
||||||
(0 rows)
|
(0 rows)
|
||||||
|
|
||||||
DELETE FROM priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
DELETE FROM tststats.priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
-- Grant table access, but hide all data with RLS
|
-- Grant table access, but hide all data with RLS
|
||||||
RESET SESSION AUTHORIZATION;
|
RESET SESSION AUTHORIZATION;
|
||||||
ALTER TABLE priv_test_tbl ENABLE ROW LEVEL SECURITY;
|
ALTER TABLE tststats.priv_test_tbl ENABLE ROW LEVEL SECURITY;
|
||||||
GRANT SELECT, DELETE ON priv_test_tbl TO regress_stats_user1;
|
GRANT SELECT, DELETE ON tststats.priv_test_tbl TO regress_stats_user1;
|
||||||
-- Should now have direct table access, but see nothing and leak nothing
|
-- Should now have direct table access, but see nothing and leak nothing
|
||||||
SET SESSION AUTHORIZATION regress_stats_user1;
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
||||||
SELECT * FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
SELECT * FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
a | b
|
a | b
|
||||||
---+---
|
---+---
|
||||||
(0 rows)
|
(0 rows)
|
||||||
|
|
||||||
DELETE FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
DELETE FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
-- Tidy up
|
-- Tidy up
|
||||||
DROP OPERATOR <<< (int, int);
|
DROP OPERATOR <<< (int, int);
|
||||||
DROP FUNCTION op_leak(int, int);
|
DROP FUNCTION op_leak(int, int);
|
||||||
RESET SESSION AUTHORIZATION;
|
RESET SESSION AUTHORIZATION;
|
||||||
DROP VIEW priv_test_view;
|
DROP SCHEMA tststats CASCADE;
|
||||||
DROP TABLE priv_test_tbl;
|
NOTICE: drop cascades to 2 other objects
|
||||||
|
DETAIL: drop cascades to table tststats.priv_test_tbl
|
||||||
|
drop cascades to view tststats.priv_test_view
|
||||||
DROP USER regress_stats_user1;
|
DROP USER regress_stats_user1;
|
||||||
|
@ -493,23 +493,26 @@ SELECT * FROM check_estimated_rows('SELECT * FROM mcv_lists_bool WHERE NOT a AND
|
|||||||
-- the underlying table.
|
-- the underlying table.
|
||||||
--
|
--
|
||||||
-- Currently this is only relevant for MCV stats.
|
-- Currently this is only relevant for MCV stats.
|
||||||
CREATE TABLE priv_test_tbl (
|
CREATE SCHEMA tststats;
|
||||||
|
|
||||||
|
CREATE TABLE tststats.priv_test_tbl (
|
||||||
a int,
|
a int,
|
||||||
b int
|
b int
|
||||||
);
|
);
|
||||||
|
|
||||||
INSERT INTO priv_test_tbl
|
INSERT INTO tststats.priv_test_tbl
|
||||||
SELECT mod(i,5), mod(i,10) FROM generate_series(1,100) s(i);
|
SELECT mod(i,5), mod(i,10) FROM generate_series(1,100) s(i);
|
||||||
|
|
||||||
CREATE STATISTICS priv_test_stats (mcv) ON a, b
|
CREATE STATISTICS tststats.priv_test_stats (mcv) ON a, b
|
||||||
FROM priv_test_tbl;
|
FROM tststats.priv_test_tbl;
|
||||||
|
|
||||||
ANALYZE priv_test_tbl;
|
ANALYZE tststats.priv_test_tbl;
|
||||||
|
|
||||||
-- User with no access
|
-- User with no access
|
||||||
CREATE USER regress_stats_user1;
|
CREATE USER regress_stats_user1;
|
||||||
|
GRANT USAGE ON SCHEMA tststats TO regress_stats_user1;
|
||||||
SET SESSION AUTHORIZATION regress_stats_user1;
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
||||||
SELECT * FROM priv_test_tbl; -- Permission denied
|
SELECT * FROM tststats.priv_test_tbl; -- Permission denied
|
||||||
|
|
||||||
-- Attempt to gain access using a leaky operator
|
-- Attempt to gain access using a leaky operator
|
||||||
CREATE FUNCTION op_leak(int, int) RETURNS bool
|
CREATE FUNCTION op_leak(int, int) RETURNS bool
|
||||||
@ -517,34 +520,33 @@ CREATE FUNCTION op_leak(int, int) RETURNS bool
|
|||||||
LANGUAGE plpgsql;
|
LANGUAGE plpgsql;
|
||||||
CREATE OPERATOR <<< (procedure = op_leak, leftarg = int, rightarg = int,
|
CREATE OPERATOR <<< (procedure = op_leak, leftarg = int, rightarg = int,
|
||||||
restrict = scalarltsel);
|
restrict = scalarltsel);
|
||||||
SELECT * FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
SELECT * FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
||||||
DELETE FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
DELETE FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Permission denied
|
||||||
|
|
||||||
-- Grant access via a security barrier view, but hide all data
|
-- Grant access via a security barrier view, but hide all data
|
||||||
RESET SESSION AUTHORIZATION;
|
RESET SESSION AUTHORIZATION;
|
||||||
CREATE VIEW priv_test_view WITH (security_barrier=true)
|
CREATE VIEW tststats.priv_test_view WITH (security_barrier=true)
|
||||||
AS SELECT * FROM priv_test_tbl WHERE false;
|
AS SELECT * FROM tststats.priv_test_tbl WHERE false;
|
||||||
GRANT SELECT, DELETE ON priv_test_view TO regress_stats_user1;
|
GRANT SELECT, DELETE ON tststats.priv_test_view TO regress_stats_user1;
|
||||||
|
|
||||||
-- Should now have access via the view, but see nothing and leak nothing
|
-- Should now have access via the view, but see nothing and leak nothing
|
||||||
SET SESSION AUTHORIZATION regress_stats_user1;
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
||||||
SELECT * FROM priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
SELECT * FROM tststats.priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
DELETE FROM priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
DELETE FROM tststats.priv_test_view WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
|
|
||||||
-- Grant table access, but hide all data with RLS
|
-- Grant table access, but hide all data with RLS
|
||||||
RESET SESSION AUTHORIZATION;
|
RESET SESSION AUTHORIZATION;
|
||||||
ALTER TABLE priv_test_tbl ENABLE ROW LEVEL SECURITY;
|
ALTER TABLE tststats.priv_test_tbl ENABLE ROW LEVEL SECURITY;
|
||||||
GRANT SELECT, DELETE ON priv_test_tbl TO regress_stats_user1;
|
GRANT SELECT, DELETE ON tststats.priv_test_tbl TO regress_stats_user1;
|
||||||
|
|
||||||
-- Should now have direct table access, but see nothing and leak nothing
|
-- Should now have direct table access, but see nothing and leak nothing
|
||||||
SET SESSION AUTHORIZATION regress_stats_user1;
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
||||||
SELECT * FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
SELECT * FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
DELETE FROM priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
DELETE FROM tststats.priv_test_tbl WHERE a <<< 0 AND b <<< 0; -- Should not leak
|
||||||
|
|
||||||
-- Tidy up
|
-- Tidy up
|
||||||
DROP OPERATOR <<< (int, int);
|
DROP OPERATOR <<< (int, int);
|
||||||
DROP FUNCTION op_leak(int, int);
|
DROP FUNCTION op_leak(int, int);
|
||||||
RESET SESSION AUTHORIZATION;
|
RESET SESSION AUTHORIZATION;
|
||||||
DROP VIEW priv_test_view;
|
DROP SCHEMA tststats CASCADE;
|
||||||
DROP TABLE priv_test_tbl;
|
|
||||||
DROP USER regress_stats_user1;
|
DROP USER regress_stats_user1;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user