mirror of
https://github.com/postgres/postgres.git
synced 2025-11-09 06:21:09 +03:00
Use has_privs_for_roles for predefined role checks
Generally if a role is granted membership to another role with NOINHERIT they must use SET ROLE to access the privileges of that role, however with predefined roles the membership and privilege is conflated. Fix that by replacing is_member_of_role with has_privs_for_role for predefined roles. Patch does not remove is_member_of_role from acl.h, but it does add a warning not to use that function for privilege checking. Not backpatched based on hackers list discussion. Author: Joshua Brindle Reviewed-by: Stephen Frost, Nathan Bossart, Joe Conway Discussion: https://postgr.es/m/flat/CAGB+Vh4Zv_TvKt2tv3QNS6tUM_F_9icmuj0zjywwcgVi4PAhFA@mail.gmail.com
This commit is contained in:
@@ -3473,12 +3473,12 @@ pg_stat_get_wal_senders(PG_FUNCTION_ARGS)
|
||||
memset(nulls, 0, sizeof(nulls));
|
||||
values[0] = Int32GetDatum(pid);
|
||||
|
||||
if (!is_member_of_role(GetUserId(), ROLE_PG_READ_ALL_STATS))
|
||||
if (!has_privs_of_role(GetUserId(), ROLE_PG_READ_ALL_STATS))
|
||||
{
|
||||
/*
|
||||
* Only superusers and members of pg_read_all_stats can see
|
||||
* details. Other users only get the pid value to know it's a
|
||||
* walsender, but no details.
|
||||
* Only superusers and roles with privileges of pg_read_all_stats
|
||||
* can see details. Other users only get the pid value to know
|
||||
* it's a walsender, but no details.
|
||||
*/
|
||||
MemSet(&nulls[1], true, PG_STAT_GET_WAL_SENDERS_COLS - 1);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user