Skip to content

MDB-32132: fix grantor selection for mdb_superuser#6

Merged
reshke merged 1 commit intoMDB_17_2_no_aqofrom
hudwej
Jan 17, 2025
Merged

MDB-32132: fix grantor selection for mdb_superuser#6
reshke merged 1 commit intoMDB_17_2_no_aqofrom
hudwej

Conversation

@reshke
Copy link
Copy Markdown
Contributor

@reshke reshke commented Jan 16, 2025

No description provided.

@reshke reshke merged commit 83e6a65 into MDB_17_2_no_aqo Jan 17, 2025
@reshke reshke deleted the hudwej branch January 30, 2025 15:59
reshke added a commit that referenced this pull request Feb 25, 2026
This commit introduces new mdb internal role mdb_superuser.

Role is capaple of:

GRANT/REVOKE any set of priviledges to/from any object in database.
Has power of pg_database_owner in any database, including:
DROP any object in database (except system catalog and stuff)

Role is NOT capaple of:

Create database, role, extension or alter other roles with such
priviledges.

Transfer ownership to /pass has_priv of roles:

PG_READ_ALL_DATA
PG_WRITE_ALL_DATA
PG_EXECUTE_SERVER_PROGRAM
PG_READ_SERVER_FILES
PG_WRITE_SERVER_FILES

Fix configure.ac USE_MDBLOCALES option handling

Apply autoreconf stuff

Set missing ok parameter ito true while acquiring mdb_superuser oid

In regress tests, nobody creates mdb_superuser role, so missing ok is
fine

Fix spelling

Applied suggestion

Allow mdb_superuser to have power of pg_database_owner

Allow mdb_superuser to alter objects and grant ACl to
objects, owned by pg_database_owner. Also, when acl check,
allow mdb_superuser use pg_database_owner role power to pass check

regression test fixes

MDB-32132: fix grantor selection for mdb_superuser (#6)
reshke added a commit that referenced this pull request Apr 2, 2026
This commit introduces new mdb internal role mdb_superuser.

Role is capaple of:

GRANT/REVOKE any set of priviledges to/from any object in database.
Has power of pg_database_owner in any database, including:
DROP any object in database (except system catalog and stuff)

Role is NOT capaple of:

Create database, role, extension or alter other roles with such
priviledges.

Transfer ownership to /pass has_priv of roles:

PG_READ_ALL_DATA
PG_WRITE_ALL_DATA
PG_EXECUTE_SERVER_PROGRAM
PG_READ_SERVER_FILES
PG_WRITE_SERVER_FILES

Fix configure.ac USE_MDBLOCALES option handling

Apply autoreconf stuff

Set missing ok parameter ito true while acquiring mdb_superuser oid

In regress tests, nobody creates mdb_superuser role, so missing ok is
fine

Fix spelling

Applied suggestion

Allow mdb_superuser to have power of pg_database_owner

Allow mdb_superuser to alter objects and grant ACl to
objects, owned by pg_database_owner. Also, when acl check,
allow mdb_superuser use pg_database_owner role power to pass check

regression test fixes

MDB-32132: fix grantor selection for mdb_superuser (#6)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants