mirror of
https://github.com/postgres/postgres.git
synced 2025-07-14 08:21:07 +03:00
Fix MAINTAIN privileges for toast tables and partitions.
Commit 60684dd8
left loose ends when it came to maintaining toast
tables or partitions.
For toast tables, simply skip the privilege check if the toast table
is an indirect target of the maintenance command, because the main
table privileges have already been checked.
For partitions, allow the maintenance command if the user has the
MAINTAIN privilege on the partition or any parent.
Also make CLUSTER emit "skipping" messages when the user doesn't have
privileges, similar to VACUUM.
Author: Nathan Bossart
Reported-by: Pavel Luzanov
Reviewed-by: Pavel Luzanov, Ted Yu
Discussion: https://postgr.es/m/20230113231339.GA2422750@nathanxps13
This commit is contained in:
@ -2796,9 +2796,9 @@ RangeVarCallbackForReindexIndex(const RangeVar *relation,
|
||||
|
||||
/* Check permissions */
|
||||
table_oid = IndexGetRelation(relId, true);
|
||||
if (!object_ownercheck(RelationRelationId, relId, GetUserId()) &&
|
||||
OidIsValid(table_oid) &&
|
||||
pg_class_aclcheck(table_oid, GetUserId(), ACL_MAINTAIN) != ACLCHECK_OK)
|
||||
if (OidIsValid(table_oid) &&
|
||||
pg_class_aclcheck(table_oid, GetUserId(), ACL_MAINTAIN) != ACLCHECK_OK &&
|
||||
!has_partition_ancestor_privs(table_oid, GetUserId(), ACL_MAINTAIN))
|
||||
aclcheck_error(ACLCHECK_NOT_OWNER, OBJECT_INDEX,
|
||||
relation->relname);
|
||||
|
||||
@ -3008,16 +3008,16 @@ ReindexMultipleTables(const char *objectName, ReindexObjectType objectKind,
|
||||
|
||||
/*
|
||||
* The table can be reindexed if the user has been granted MAINTAIN on
|
||||
* the table or the user is a superuser, the table owner, or the
|
||||
* database/schema owner (but in the latter case, only if it's not a
|
||||
* shared relation). object_ownercheck includes the superuser case,
|
||||
* and depending on objectKind we already know that the user has
|
||||
* permission to run REINDEX on this database or schema per the
|
||||
* permission checks at the beginning of this routine.
|
||||
* the table or one of its partition ancestors or the user is a
|
||||
* superuser, the table owner, or the database/schema owner (but in the
|
||||
* latter case, only if it's not a shared relation). pg_class_aclcheck
|
||||
* includes the superuser case, and depending on objectKind we already
|
||||
* know that the user has permission to run REINDEX on this database or
|
||||
* schema per the permission checks at the beginning of this routine.
|
||||
*/
|
||||
if (classtuple->relisshared &&
|
||||
!object_ownercheck(RelationRelationId, relid, GetUserId()) &&
|
||||
pg_class_aclcheck(relid, GetUserId(), ACL_MAINTAIN) != ACLCHECK_OK)
|
||||
pg_class_aclcheck(relid, GetUserId(), ACL_MAINTAIN) != ACLCHECK_OK &&
|
||||
!has_partition_ancestor_privs(relid, GetUserId(), ACL_MAINTAIN))
|
||||
continue;
|
||||
|
||||
/*
|
||||
|
Reference in New Issue
Block a user