mirror of
https://github.com/postgres/postgres.git
synced 2025-07-23 03:21:12 +03:00
.github
config
contrib
amcheck
auth_delay
auto_explain
basebackup_to_shell
basic_archive
bloom
bool_plperl
btree_gin
btree_gist
citext
cube
dblink
dict_int
dict_xsyn
earthdistance
file_fdw
fuzzystrmatch
hstore
hstore_plperl
hstore_plpython
intagg
intarray
isn
jsonb_plperl
jsonb_plpython
lo
ltree
ltree_plpython
oid2name
pageinspect
passwordcheck
pg_buffercache
pg_freespacemap
pg_logicalinspect
pg_prewarm
pg_stat_statements
expected
sql
cleanup.sql
cursors.sql
dml.sql
entry_timestamp.sql
extended.sql
level_tracking.sql
oldextversions.sql
parallel.sql
planning.sql
privileges.sql
select.sql
user_activity.sql
utility.sql
wal.sql
t
.gitignore
Makefile
meson.build
pg_stat_statements--1.0--1.1.sql
pg_stat_statements--1.1--1.2.sql
pg_stat_statements--1.10--1.11.sql
pg_stat_statements--1.11--1.12.sql
pg_stat_statements--1.2--1.3.sql
pg_stat_statements--1.3--1.4.sql
pg_stat_statements--1.4--1.5.sql
pg_stat_statements--1.4.sql
pg_stat_statements--1.5--1.6.sql
pg_stat_statements--1.6--1.7.sql
pg_stat_statements--1.7--1.8.sql
pg_stat_statements--1.8--1.9.sql
pg_stat_statements--1.9--1.10.sql
pg_stat_statements.c
pg_stat_statements.conf
pg_stat_statements.control
pg_surgery
pg_trgm
pg_visibility
pg_walinspect
pgcrypto
pgrowlocks
pgstattuple
postgres_fdw
seg
sepgsql
spi
sslinfo
start-scripts
tablefunc
tcn
test_decoding
tsm_system_rows
tsm_system_time
unaccent
uuid-ossp
vacuumlo
xml2
Makefile
README
contrib-global.mk
meson.build
doc
src
.cirrus.star
.cirrus.tasks.yml
.cirrus.yml
.dir-locals.el
.editorconfig
.git-blame-ignore-revs
.gitattributes
.gitignore
COPYRIGHT
GNUmakefile.in
HISTORY
Makefile
README.md
aclocal.m4
configure
configure.ac
meson.build
meson_options.txt
This commit adds a regression test to verify that pg_stat_statements correctly handles privileges, improving its test coverage. Author: Keisuke Kuroda Reviewed-by: Michael Paquier, Fujii Masao Discussion: https://postgr.es/m/2224ccf2e12c41ccb81702ef3303d5ac@nttcom.co.jp
61 lines
1.9 KiB
SQL
61 lines
1.9 KiB
SQL
--
|
|
-- Only superusers and roles with privileges of the pg_read_all_stats role
|
|
-- are allowed to see the SQL text and queryid of queries executed by
|
|
-- other users. Other users can see the statistics.
|
|
--
|
|
|
|
SET pg_stat_statements.track_utility = FALSE;
|
|
CREATE ROLE regress_stats_superuser SUPERUSER;
|
|
CREATE ROLE regress_stats_user1;
|
|
CREATE ROLE regress_stats_user2;
|
|
GRANT pg_read_all_stats TO regress_stats_user2;
|
|
|
|
SET ROLE regress_stats_superuser;
|
|
SELECT pg_stat_statements_reset() IS NOT NULL AS t;
|
|
SELECT 1 AS "ONE";
|
|
|
|
SET ROLE regress_stats_user1;
|
|
SELECT 1+1 AS "TWO";
|
|
|
|
--
|
|
-- A superuser can read all columns of queries executed by others,
|
|
-- including query text and queryid.
|
|
--
|
|
|
|
SET ROLE regress_stats_superuser;
|
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows
|
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid
|
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows;
|
|
|
|
--
|
|
-- regress_stats_user1 has no privileges to read the query text or
|
|
-- queryid of queries executed by others but can see statistics
|
|
-- like calls and rows.
|
|
--
|
|
|
|
SET ROLE regress_stats_user1;
|
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows
|
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid
|
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows;
|
|
|
|
--
|
|
-- regress_stats_user2, with pg_read_all_stats role privileges, can
|
|
-- read all columns, including query text and queryid, of queries
|
|
-- executed by others.
|
|
--
|
|
|
|
SET ROLE regress_stats_user2;
|
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows
|
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid
|
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows;
|
|
|
|
--
|
|
-- cleanup
|
|
--
|
|
|
|
RESET ROLE;
|
|
DROP ROLE regress_stats_superuser;
|
|
DROP ROLE regress_stats_user1;
|
|
DROP ROLE regress_stats_user2;
|
|
SELECT pg_stat_statements_reset() IS NOT NULL AS t;
|