Extend pg_get_acl() to handle sub-object IDs
authorMichael Paquier <michael@paquier.xyz>
Wed, 10 Jul 2024 01:14:37 +0000 (10:14 +0900)
committerMichael Paquier <michael@paquier.xyz>
Wed, 10 Jul 2024 01:14:37 +0000 (10:14 +0900)
This patch modifies the pg_get_acl() function to accept a third argument
called "objsubid", bringing it on par with similar functions in this
area like pg_describe_object().  This enables the retrieval of ACLs for
relation attributes when scanning dependencies.

Bump catalog version.

Author: Joel Jacobson
Discussion: https://postgr.es/m/f2539bff-64be-47f0-9f0b-df85d3cc0432@app.fastmail.com

doc/src/sgml/func.sgml
src/backend/catalog/objectaddress.c
src/include/catalog/catversion.h
src/include/catalog/pg_proc.dat
src/test/regress/expected/privileges.out
src/test/regress/sql/privileges.sql

index f1ce1db6bcd95da665304f5a4da884fb626a5007..135590ba57487a47366863a143f33d06865836d0 100644 (file)
@@ -26661,12 +26661,12 @@ SELECT currval(pg_get_serial_sequence('sometable', 'id'));
         <indexterm>
          <primary>pg_get_acl</primary>
         </indexterm>
-        <function>pg_get_acl</function> ( <parameter>classid</parameter> <type>oid</type>, <parameter>objid</parameter> <type>oid</type> )
+        <function>pg_get_acl</function> ( <parameter>classid</parameter> <type>oid</type>, <parameter>objid</parameter> <type>oid</type>, <parameter>objsubid</parameter> <type>integer</type> )
         <returnvalue>aclitem[]</returnvalue>
        </para>
        <para>
         Returns the <acronym>ACL</acronym> for a database object, specified
-        by catalog OID and object OID. This function returns
+        by catalog OID, object OID and sub-object ID. This function returns
         <literal>NULL</literal> values for undefined objects.
        </para></entry>
       </row>
@@ -26792,7 +26792,7 @@ SELECT currval(pg_get_serial_sequence('sometable', 'id'));
 <programlisting>
 postgres=# SELECT
     (pg_identify_object(s.classid,s.objid,s.objsubid)).*,
-    pg_catalog.pg_get_acl(s.classid,s.objid) AS acl
+    pg_catalog.pg_get_acl(s.classid,s.objid,s.objsubid) AS acl
 FROM pg_catalog.pg_shdepend AS s
 JOIN pg_catalog.pg_database AS d
     ON d.datname = current_database() AND
index 2983b9180fcca64593b32051e37564c23e61ee53..85a7b7e641a02d5800463eb61becc186efa7ec15 100644 (file)
@@ -4364,19 +4364,19 @@ pg_identify_object_as_address(PG_FUNCTION_ARGS)
 
 /*
  * SQL-level callable function to obtain the ACL of a specified object, given
- * its catalog OID and object OID.
+ * its catalog OID, object OID and sub-object ID.
  */
 Datum
 pg_get_acl(PG_FUNCTION_ARGS)
 {
        Oid                     classId = PG_GETARG_OID(0);
        Oid                     objectId = PG_GETARG_OID(1);
+       int32           objsubid = PG_GETARG_INT32(2);
        Oid                     catalogId;
        AttrNumber      Anum_acl;
-       Relation        rel;
-       HeapTuple       tup;
        Datum           datum;
        bool            isnull;
+       HeapTuple       tup;
 
        /* for "pinned" items in pg_depend, return null */
        if (!OidIsValid(classId) && !OidIsValid(objectId))
@@ -4391,19 +4391,40 @@ pg_get_acl(PG_FUNCTION_ARGS)
        if (Anum_acl == InvalidAttrNumber)
                PG_RETURN_NULL();
 
-       rel = table_open(catalogId, AccessShareLock);
+       /*
+        * If dealing with a relation's attribute (objsubid is set), the ACL is
+        * retrieved from pg_attribute.
+        */
+       if (classId == RelationRelationId && objsubid != 0)
+       {
+               AttrNumber      attnum = (AttrNumber) objsubid;
 
-       tup = get_catalog_object_by_oid(rel, get_object_attnum_oid(catalogId),
-                                                                       objectId);
-       if (!HeapTupleIsValid(tup))
+               tup = SearchSysCacheCopyAttNum(objectId, attnum);
+
+               if (!HeapTupleIsValid(tup))
+                       PG_RETURN_NULL();
+
+               datum = SysCacheGetAttr(ATTNUM, tup, Anum_pg_attribute_attacl,
+                                                               &isnull);
+       }
+       else
        {
+               Relation        rel;
+
+               rel = table_open(catalogId, AccessShareLock);
+
+               tup = get_catalog_object_by_oid(rel, get_object_attnum_oid(catalogId),
+                                                                               objectId);
+               if (!HeapTupleIsValid(tup))
+               {
+                       table_close(rel, AccessShareLock);
+                       PG_RETURN_NULL();
+               }
+
+               datum = heap_getattr(tup, Anum_acl, RelationGetDescr(rel), &isnull);
                table_close(rel, AccessShareLock);
-               PG_RETURN_NULL();
        }
 
-       datum = heap_getattr(tup, Anum_acl, RelationGetDescr(rel), &isnull);
-       table_close(rel, AccessShareLock);
-
        if (isnull)
                PG_RETURN_NULL();
 
index 06f43c496f39107cc9128d51a01b7b72c0f8bbf2..87b52fffdde0b12c9269b1438d8cc19501dd34e0 100644 (file)
@@ -57,6 +57,6 @@
  */
 
 /*                                                     yyyymmddN */
-#define CATALOG_VERSION_NO     202407091
+#define CATALOG_VERSION_NO     202407101
 
 #endif
index e899ed5e77eb4526bd69f928f442e051bf3df3d4..0d140003e744255058f9eced695f449c80c0f09d 100644 (file)
 
 { oid => '8730', descr => 'get ACL for SQL object',
   proname => 'pg_get_acl', provolatile => 's', prorettype => '_aclitem',
-  proargtypes => 'oid oid', proargnames => '{classid,objid}',
+  proargtypes => 'oid oid int4', proargnames => '{classid,objid,objsubid}',
   prosrc => 'pg_get_acl' },
 
 { oid => '3839',
index 332bc584eb22a641907bbd9b270b6a8dbb3d6501..fab0cc800fcdd87c27dcddc934525bfe4b02d672 100644 (file)
@@ -213,7 +213,7 @@ SELECT * FROM atest1;
 (0 rows)
 
 CREATE TABLE atest2 (col1 varchar(10), col2 boolean);
-SELECT pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid);
+SELECT pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid, 0);
  pg_get_acl 
 ------------
  
@@ -223,7 +223,7 @@ GRANT SELECT ON atest2 TO regress_priv_user2;
 GRANT UPDATE ON atest2 TO regress_priv_user3;
 GRANT INSERT ON atest2 TO regress_priv_user4 GRANTED BY CURRENT_USER;
 GRANT TRUNCATE ON atest2 TO regress_priv_user5 GRANTED BY CURRENT_ROLE;
-SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid));
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid, 0));
                      unnest                     
 ------------------------------------------------
  regress_priv_user1=arwdDxtm/regress_priv_user1
@@ -234,13 +234,13 @@ SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid));
 (5 rows)
 
 -- Invalid inputs
-SELECT pg_get_acl('pg_class'::regclass, 0); -- null
+SELECT pg_get_acl('pg_class'::regclass, 0, 0); -- null
  pg_get_acl 
 ------------
  
 (1 row)
 
-SELECT pg_get_acl(0, 0); -- null
+SELECT pg_get_acl(0, 0, 0); -- null
  pg_get_acl 
 ------------
  
@@ -653,6 +653,30 @@ CREATE TABLE atest5 (one int, two int unique, three int, four int unique);
 CREATE TABLE atest6 (one int, two int, blue int);
 GRANT SELECT (one), INSERT (two), UPDATE (three) ON atest5 TO regress_priv_user4;
 GRANT ALL (one) ON atest5 TO regress_priv_user3;
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 1));
+                   unnest                   
+--------------------------------------------
+ regress_priv_user4=r/regress_priv_user1
+ regress_priv_user3=arwx/regress_priv_user1
+(2 rows)
+
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 2));
+                 unnest                  
+-----------------------------------------
+ regress_priv_user4=a/regress_priv_user1
+(1 row)
+
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 3));
+                 unnest                  
+-----------------------------------------
+ regress_priv_user4=w/regress_priv_user1
+(1 row)
+
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 4));
+ unnest 
+--------
+(0 rows)
+
 INSERT INTO atest5 VALUES (1,2,3);
 SET SESSION AUTHORIZATION regress_priv_user4;
 SELECT * FROM atest5; -- fail
index 980d19bde5670284288d925a4b14abf790f53054..ae338e8cc8ea6e15209a50af908e28be98e5bd83 100644 (file)
@@ -183,16 +183,16 @@ GRANT SELECT ON atest1 TO regress_priv_user3, regress_priv_user4;
 SELECT * FROM atest1;
 
 CREATE TABLE atest2 (col1 varchar(10), col2 boolean);
-SELECT pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid);
+SELECT pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid, 0);
 GRANT SELECT ON atest2 TO regress_priv_user2;
 GRANT UPDATE ON atest2 TO regress_priv_user3;
 GRANT INSERT ON atest2 TO regress_priv_user4 GRANTED BY CURRENT_USER;
 GRANT TRUNCATE ON atest2 TO regress_priv_user5 GRANTED BY CURRENT_ROLE;
-SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid));
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest2'::regclass::oid, 0));
 
 -- Invalid inputs
-SELECT pg_get_acl('pg_class'::regclass, 0); -- null
-SELECT pg_get_acl(0, 0); -- null
+SELECT pg_get_acl('pg_class'::regclass, 0, 0); -- null
+SELECT pg_get_acl(0, 0, 0); -- null
 
 GRANT TRUNCATE ON atest2 TO regress_priv_user4 GRANTED BY regress_priv_user5;  -- error
 
@@ -439,6 +439,10 @@ CREATE TABLE atest5 (one int, two int unique, three int, four int unique);
 CREATE TABLE atest6 (one int, two int, blue int);
 GRANT SELECT (one), INSERT (two), UPDATE (three) ON atest5 TO regress_priv_user4;
 GRANT ALL (one) ON atest5 TO regress_priv_user3;
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 1));
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 2));
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 3));
+SELECT unnest(pg_get_acl('pg_class'::regclass, 'atest5'::regclass::oid, 4));
 
 INSERT INTO atest5 VALUES (1,2,3);