]> granicus.if.org Git - postgresql/commitdiff
Fix ordering in pg_dump of GRANTs
authorStephen Frost <sfrost@snowman.net>
Thu, 14 Sep 2017 00:02:27 +0000 (20:02 -0400)
committerStephen Frost <sfrost@snowman.net>
Thu, 14 Sep 2017 00:02:27 +0000 (20:02 -0400)
The order in which GRANTs are output is important as GRANTs which have
been GRANT'd by individuals via WITH GRANT OPTION GRANTs have to come
after the GRANT which included the WITH GRANT OPTION.  This happens
naturally in the backend during normal operation as we only change
existing ACLs in-place, only add new ACLs to the end, and when removing
an ACL we remove any which depend on it also.

Also, adjust the comments in acl.h to make this clear.

Unfortunately, the updates to pg_dump to handle initial privileges
involved pulling apart ACLs and then combining them back together and
could end up putting them back together in an invalid order, leading to
dumps which wouldn't restore.

Fix this by adjusting the queries used by pg_dump to ensure that the
ACLs are rebuilt in the same order in which they were originally.

Back-patch to 9.6 where the changes for initial privileges were done.

src/bin/pg_dump/dumputils.c
src/include/utils/acl.h

index 11870a33fa5347310bd82ba8bfd97fef394a4b9d..c171978060485cdacd917daba1bbbf4950bf081b 100644 (file)
@@ -729,21 +729,36 @@ buildACLQueries(PQExpBuffer acl_subquery, PQExpBuffer racl_subquery,
         * We always perform this delta on all ACLs and expect that by the time
         * these are run the initial privileges will be in place, even in a binary
         * upgrade situation (see below).
+        *
+        * Finally, the order in which privileges are in the ACL string (the order
+        * they been GRANT'd in, which the backend maintains) must be preserved to
+        * ensure that GRANTs WITH GRANT OPTION and subsequent GRANTs based on
+        * those are dumped in the correct order.
         */
-       printfPQExpBuffer(acl_subquery, "(SELECT pg_catalog.array_agg(acl) FROM "
-                                         "(SELECT pg_catalog.unnest(coalesce(%s,pg_catalog.acldefault(%s,%s))) AS acl "
-                                         "EXCEPT "
-                                         "SELECT pg_catalog.unnest(coalesce(pip.initprivs,pg_catalog.acldefault(%s,%s)))) as foo)",
+       printfPQExpBuffer(acl_subquery,
+                                         "(SELECT pg_catalog.array_agg(acl ORDER BY row_n) FROM "
+                                         "(SELECT acl, row_n FROM "
+                                         "pg_catalog.unnest(coalesce(%s,pg_catalog.acldefault(%s,%s))) "
+                                         "WITH ORDINALITY AS perm(acl,row_n) "
+                                         "WHERE NOT EXISTS ( "
+                                         "SELECT 1 FROM "
+                                         "pg_catalog.unnest(coalesce(pip.initprivs,pg_catalog.acldefault(%s,%s))) "
+                                         "AS init(init_acl) WHERE acl = init_acl)) as foo)",
                                          acl_column,
                                          obj_kind,
                                          acl_owner,
                                          obj_kind,
                                          acl_owner);
 
-       printfPQExpBuffer(racl_subquery, "(SELECT pg_catalog.array_agg(acl) FROM "
-                                         "(SELECT pg_catalog.unnest(coalesce(pip.initprivs,pg_catalog.acldefault(%s,%s))) AS acl "
-                                         "EXCEPT "
-                                         "SELECT pg_catalog.unnest(coalesce(%s,pg_catalog.acldefault(%s,%s)))) as foo)",
+       printfPQExpBuffer(racl_subquery,
+                                         "(SELECT pg_catalog.array_agg(acl ORDER BY row_n) FROM "
+                                         "(SELECT acl, row_n FROM "
+                                         "pg_catalog.unnest(coalesce(pip.initprivs,pg_catalog.acldefault(%s,%s))) "
+                                         "WITH ORDINALITY AS initp(acl,row_n) "
+                                         "WHERE NOT EXISTS ( "
+                                         "SELECT 1 FROM "
+                                         "pg_catalog.unnest(coalesce(%s,pg_catalog.acldefault(%s,%s))) "
+                                         "AS permp(orig_acl) WHERE acl = orig_acl)) as foo)",
                                          obj_kind,
                                          acl_owner,
                                          acl_column,
@@ -768,19 +783,25 @@ buildACLQueries(PQExpBuffer acl_subquery, PQExpBuffer racl_subquery,
        {
                printfPQExpBuffer(init_acl_subquery,
                                                  "CASE WHEN privtype = 'e' THEN "
-                                                 "(SELECT pg_catalog.array_agg(acl) FROM "
-                                                 "(SELECT pg_catalog.unnest(pip.initprivs) AS acl "
-                                                 "EXCEPT "
-               "SELECT pg_catalog.unnest(pg_catalog.acldefault(%s,%s))) as foo) END",
+                                                 "(SELECT pg_catalog.array_agg(acl ORDER BY row_n) FROM "
+                                                 "(SELECT acl, row_n FROM pg_catalog.unnest(pip.initprivs) "
+                                                 "WITH ORDINALITY AS initp(acl,row_n) "
+                                                 "WHERE NOT EXISTS ( "
+                                                 "SELECT 1 FROM "
+                                                 "pg_catalog.unnest(pg_catalog.acldefault(%s,%s)) "
+                                                 "AS privm(orig_acl) WHERE acl = orig_acl)) as foo) END",
                                                  obj_kind,
                                                  acl_owner);
 
                printfPQExpBuffer(init_racl_subquery,
                                                  "CASE WHEN privtype = 'e' THEN "
                                                  "(SELECT pg_catalog.array_agg(acl) FROM "
-                       "(SELECT pg_catalog.unnest(pg_catalog.acldefault(%s,%s)) AS acl "
-                                                 "EXCEPT "
-                                         "SELECT pg_catalog.unnest(pip.initprivs)) as foo) END",
+                                                 "(SELECT acl, row_n FROM "
+                                                 "pg_catalog.unnest(pg_catalog.acldefault(%s,%s)) "
+                                                 "WITH ORDINALITY AS privp(acl,row_n) "
+                                                 "WHERE NOT EXISTS ( "
+                                                 "SELECT 1 FROM pg_catalog.unnest(pip.initprivs) "
+                                                 "AS initp(init_acl) WHERE acl = init_acl)) as foo) END",
                                                  obj_kind,
                                                  acl_owner);
        }
index 5a4f1714f31c42ab7eda0b2286845283906df1dc..14279f79da048cf91e8d758a6dfa5b15218e7bf1 100644 (file)
  * NOTES
  *       An ACL array is simply an array of AclItems, representing the union
  *       of the privileges represented by the individual items.  A zero-length
- *       array represents "no privileges".  There are no assumptions about the
- *       ordering of the items, but we do expect that there are no two entries
- *       in the array with the same grantor and grantee.
+ *       array represents "no privileges".
+ *
+ *       The order of items in the array is important as client utilities (in
+ *       particular, pg_dump, though possibly other clients) expect to be able
+ *       to issue GRANTs in the ordering of the items in the array.  The reason
+ *       this matters is that GRANTs WITH GRANT OPTION must be before any GRANTs
+ *       which depend on it.  This happens naturally in the backend during
+ *       operations as we update ACLs in-place, new items are appended, and
+ *       existing entries are only removed if there's no dependency on them (no
+ *       GRANT can been based on it, or, if there was, those GRANTs are also
+ *       removed).
  *
  *       For backward-compatibility purposes we have to allow null ACL entries
  *       in system catalogs.  A null ACL will be treated as meaning "default