mirror of
https://github.com/postgres/postgres.git
synced 2025-06-11 20:28:21 +03:00
pg_stat_statements: Add regression test for privilege handling.
This commit adds a regression test to verify that pg_stat_statements correctly handles privileges, improving its test coverage. Author: Keisuke Kuroda Reviewed-by: Michael Paquier, Fujii Masao Discussion: https://postgr.es/m/2224ccf2e12c41ccb81702ef3303d5ac@nttcom.co.jp
This commit is contained in:
60
contrib/pg_stat_statements/sql/privileges.sql
Normal file
60
contrib/pg_stat_statements/sql/privileges.sql
Normal file
@ -0,0 +1,60 @@
|
||||
--
|
||||
-- Only superusers and roles with privileges of the pg_read_all_stats role
|
||||
-- are allowed to see the SQL text and queryid of queries executed by
|
||||
-- other users. Other users can see the statistics.
|
||||
--
|
||||
|
||||
SET pg_stat_statements.track_utility = FALSE;
|
||||
CREATE ROLE regress_stats_superuser SUPERUSER;
|
||||
CREATE ROLE regress_stats_user1;
|
||||
CREATE ROLE regress_stats_user2;
|
||||
GRANT pg_read_all_stats TO regress_stats_user2;
|
||||
|
||||
SET ROLE regress_stats_superuser;
|
||||
SELECT pg_stat_statements_reset() IS NOT NULL AS t;
|
||||
SELECT 1 AS "ONE";
|
||||
|
||||
SET ROLE regress_stats_user1;
|
||||
SELECT 1+1 AS "TWO";
|
||||
|
||||
--
|
||||
-- A superuser can read all columns of queries executed by others,
|
||||
-- including query text and queryid.
|
||||
--
|
||||
|
||||
SET ROLE regress_stats_superuser;
|
||||
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows
|
||||
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid
|
||||
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows;
|
||||
|
||||
--
|
||||
-- regress_stats_user1 has no privileges to read the query text or
|
||||
-- queryid of queries executed by others but can see statistics
|
||||
-- like calls and rows.
|
||||
--
|
||||
|
||||
SET ROLE regress_stats_user1;
|
||||
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows
|
||||
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid
|
||||
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows;
|
||||
|
||||
--
|
||||
-- regress_stats_user2, with pg_read_all_stats role privileges, can
|
||||
-- read all columns, including query text and queryid, of queries
|
||||
-- executed by others.
|
||||
--
|
||||
|
||||
SET ROLE regress_stats_user2;
|
||||
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows
|
||||
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid
|
||||
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows;
|
||||
|
||||
--
|
||||
-- cleanup
|
||||
--
|
||||
|
||||
RESET ROLE;
|
||||
DROP ROLE regress_stats_superuser;
|
||||
DROP ROLE regress_stats_user1;
|
||||
DROP ROLE regress_stats_user2;
|
||||
SELECT pg_stat_statements_reset() IS NOT NULL AS t;
|
Reference in New Issue
Block a user