mirror of https://github.com/postgres/postgres
Invalidate acl.c caches when pg_authid changes.
This makes existing sessions reflect "ALTER ROLE ... [NO]INHERIT" as quickly as they have been reflecting "GRANT role_name". Back-patch to 9.5 (all supported versions). Reviewed by Nathan Bossart. Discussion: https://postgr.es/m/20201221095028.GB3777719@rfd.leadboat.com
This commit is contained in:
parent
0b54a80a38
commit
b81d3791ed
|
@ -49,7 +49,6 @@ typedef struct
|
|||
* role. In most of these tests the "given role" is the same, namely the
|
||||
* active current user. So we can optimize it by keeping a cached list of
|
||||
* all the roles the "given role" is a member of, directly or indirectly.
|
||||
* The cache is flushed whenever we detect a change in pg_auth_members.
|
||||
*
|
||||
* There are actually two caches, one computed under "has_privs" rules
|
||||
* (do not recurse where rolinherit isn't true) and one computed under
|
||||
|
@ -4693,12 +4692,16 @@ initialize_acl(void)
|
|||
if (!IsBootstrapProcessingMode())
|
||||
{
|
||||
/*
|
||||
* In normal mode, set a callback on any syscache invalidation of
|
||||
* pg_auth_members rows
|
||||
* In normal mode, set a callback on any syscache invalidation of rows
|
||||
* of pg_auth_members (for each AUTHMEM search in this file) or
|
||||
* pg_authid (for has_rolinherit())
|
||||
*/
|
||||
CacheRegisterSyscacheCallback(AUTHMEMROLEMEM,
|
||||
RoleMembershipCacheCallback,
|
||||
(Datum) 0);
|
||||
CacheRegisterSyscacheCallback(AUTHOID,
|
||||
RoleMembershipCacheCallback,
|
||||
(Datum) 0);
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -346,6 +346,13 @@ SET SESSION AUTHORIZATION regress_user1;
|
|||
SELECT * FROM atest3; -- fail
|
||||
ERROR: permission denied for relation atest3
|
||||
DELETE FROM atest3; -- ok
|
||||
BEGIN;
|
||||
RESET SESSION AUTHORIZATION;
|
||||
ALTER ROLE regress_priv_user1 NOINHERIT;
|
||||
SET SESSION AUTHORIZATION regress_priv_user1;
|
||||
DELETE FROM atest3;
|
||||
ERROR: permission denied for table atest3
|
||||
ROLLBACK;
|
||||
-- views
|
||||
SET SESSION AUTHORIZATION regress_user3;
|
||||
CREATE VIEW atestv1 AS SELECT * FROM atest1; -- ok
|
||||
|
|
|
@ -216,6 +216,12 @@ SET SESSION AUTHORIZATION regress_user1;
|
|||
SELECT * FROM atest3; -- fail
|
||||
DELETE FROM atest3; -- ok
|
||||
|
||||
BEGIN;
|
||||
RESET SESSION AUTHORIZATION;
|
||||
ALTER ROLE regress_priv_user1 NOINHERIT;
|
||||
SET SESSION AUTHORIZATION regress_priv_user1;
|
||||
DELETE FROM atest3;
|
||||
ROLLBACK;
|
||||
|
||||
-- views
|
||||
|
||||
|
|
Loading…
Reference in New Issue