mirror of
https://github.com/postgres/postgres.git
synced 2025-09-02 04:21:28 +03:00
Fix permission-checking bug reported by Tim Burgess 10-Feb-03 (this time
for sure...). Rather than relying on the query context of a rangetable entry to identify what permissions it wants checked, store a full AclMode mask in each RTE, and check exactly those bits. This allows an RTE specifying, say, INSERT privilege on a view to be copied into a derived UPDATE query without changing meaning. Per recent discussion thread. initdb forced due to change of stored rule representation.
This commit is contained in:
@@ -8,7 +8,7 @@
|
||||
*
|
||||
*
|
||||
* IDENTIFICATION
|
||||
* $PostgreSQL: pgsql/src/backend/rewrite/rewriteDefine.c,v 1.91 2003/11/29 19:51:55 pgsql Exp $
|
||||
* $PostgreSQL: pgsql/src/backend/rewrite/rewriteDefine.c,v 1.92 2004/01/14 23:01:55 tgl Exp $
|
||||
*
|
||||
*-------------------------------------------------------------------------
|
||||
*/
|
||||
@@ -34,7 +34,7 @@
|
||||
|
||||
|
||||
static void setRuleCheckAsUser(Query *qry, AclId userid);
|
||||
static bool setRuleCheckAsUser_walker(Node *node, Oid *context);
|
||||
static bool setRuleCheckAsUser_walker(Node *node, AclId *context);
|
||||
|
||||
|
||||
/*
|
||||
@@ -494,8 +494,8 @@ DefineQueryRewrite(RuleStmt *stmt)
|
||||
* Note: for a view (ON SELECT rule), the checkAsUser field of the *OLD*
|
||||
* RTE entry will be overridden when the view rule is expanded, and the
|
||||
* checkAsUser field of the *NEW* entry is irrelevant because that entry's
|
||||
* checkFor bits will never be set. However, for other types of rules it's
|
||||
* important to set these fields to match the rule owner. So we just set
|
||||
* requiredPerms bits will always be zero. However, for other types of rules
|
||||
* it's important to set these fields to match the rule owner. So we just set
|
||||
* them always.
|
||||
*/
|
||||
static void
|
||||
@@ -528,7 +528,7 @@ setRuleCheckAsUser(Query *qry, AclId userid)
|
||||
* Expression-tree walker to find sublink queries
|
||||
*/
|
||||
static bool
|
||||
setRuleCheckAsUser_walker(Node *node, Oid *context)
|
||||
setRuleCheckAsUser_walker(Node *node, AclId *context)
|
||||
{
|
||||
if (node == NULL)
|
||||
return false;
|
||||
|
@@ -7,7 +7,7 @@
|
||||
* Portions Copyright (c) 1994, Regents of the University of California
|
||||
*
|
||||
* IDENTIFICATION
|
||||
* $PostgreSQL: pgsql/src/backend/rewrite/rewriteHandler.c,v 1.132 2004/01/14 03:39:22 tgl Exp $
|
||||
* $PostgreSQL: pgsql/src/backend/rewrite/rewriteHandler.c,v 1.133 2004/01/14 23:01:55 tgl Exp $
|
||||
*
|
||||
*-------------------------------------------------------------------------
|
||||
*/
|
||||
@@ -655,13 +655,11 @@ ApplyRetrieveRule(Query *parsetree,
|
||||
*/
|
||||
subrte = rt_fetch(PRS2_OLD_VARNO, rule_action->rtable);
|
||||
Assert(subrte->relid == relation->rd_id);
|
||||
subrte->checkForRead = rte->checkForRead;
|
||||
subrte->checkForWrite = rte->checkForWrite;
|
||||
subrte->requiredPerms = rte->requiredPerms;
|
||||
subrte->checkAsUser = rte->checkAsUser;
|
||||
|
||||
rte->checkForRead = false; /* no permission check on subquery itself */
|
||||
rte->checkForWrite = false;
|
||||
rte->checkAsUser = InvalidOid;
|
||||
rte->requiredPerms = 0; /* no permission check on subquery itself */
|
||||
rte->checkAsUser = 0;
|
||||
|
||||
/*
|
||||
* FOR UPDATE of view?
|
||||
@@ -713,7 +711,7 @@ markQueryForUpdate(Query *qry, bool skipOldNew)
|
||||
{
|
||||
if (!intMember(rti, qry->rowMarks))
|
||||
qry->rowMarks = lappendi(qry->rowMarks, rti);
|
||||
rte->checkForWrite = true;
|
||||
rte->requiredPerms |= ACL_SELECT_FOR_UPDATE;
|
||||
}
|
||||
else if (rte->rtekind == RTE_SUBQUERY)
|
||||
{
|
||||
|
Reference in New Issue
Block a user