mirror of https://github.com/postgres/postgres
This commit adds a regression test to verify that pg_stat_statements correctly handles privileges, improving its test coverage. Author: Keisuke Kuroda Reviewed-by: Michael Paquier, Fujii Masao Discussion: https://postgr.es/m/2224ccf2e12c41ccb81702ef3303d5ac@nttcom.co.jppull/167/head
parent
3dd637f3d5
commit
97f2bc5aa5
@ -0,0 +1,97 @@ |
|||||||
|
-- |
||||||
|
-- Only superusers and roles with privileges of the pg_read_all_stats role |
||||||
|
-- are allowed to see the SQL text and queryid of queries executed by |
||||||
|
-- other users. Other users can see the statistics. |
||||||
|
-- |
||||||
|
SET pg_stat_statements.track_utility = FALSE; |
||||||
|
CREATE ROLE regress_stats_superuser SUPERUSER; |
||||||
|
CREATE ROLE regress_stats_user1; |
||||||
|
CREATE ROLE regress_stats_user2; |
||||||
|
GRANT pg_read_all_stats TO regress_stats_user2; |
||||||
|
SET ROLE regress_stats_superuser; |
||||||
|
SELECT pg_stat_statements_reset() IS NOT NULL AS t; |
||||||
|
t |
||||||
|
--- |
||||||
|
t |
||||||
|
(1 row) |
||||||
|
|
||||||
|
SELECT 1 AS "ONE"; |
||||||
|
ONE |
||||||
|
----- |
||||||
|
1 |
||||||
|
(1 row) |
||||||
|
|
||||||
|
SET ROLE regress_stats_user1; |
||||||
|
SELECT 1+1 AS "TWO"; |
||||||
|
TWO |
||||||
|
----- |
||||||
|
2 |
||||||
|
(1 row) |
||||||
|
|
||||||
|
-- |
||||||
|
-- A superuser can read all columns of queries executed by others, |
||||||
|
-- including query text and queryid. |
||||||
|
-- |
||||||
|
SET ROLE regress_stats_superuser; |
||||||
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows |
||||||
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid |
||||||
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows; |
||||||
|
rolname | queryid_bool | query | calls | rows |
||||||
|
-------------------------+--------------+----------------------------------------------------+-------+------ |
||||||
|
regress_stats_superuser | t | SELECT $1 AS "ONE" | 1 | 1 |
||||||
|
regress_stats_superuser | t | SELECT pg_stat_statements_reset() IS NOT NULL AS t | 1 | 1 |
||||||
|
regress_stats_user1 | t | SELECT $1+$2 AS "TWO" | 1 | 1 |
||||||
|
(3 rows) |
||||||
|
|
||||||
|
-- |
||||||
|
-- regress_stats_user1 has no privileges to read the query text or |
||||||
|
-- queryid of queries executed by others but can see statistics |
||||||
|
-- like calls and rows. |
||||||
|
-- |
||||||
|
SET ROLE regress_stats_user1; |
||||||
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows |
||||||
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid |
||||||
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows; |
||||||
|
rolname | queryid_bool | query | calls | rows |
||||||
|
-------------------------+--------------+--------------------------+-------+------ |
||||||
|
regress_stats_superuser | | <insufficient privilege> | 1 | 1 |
||||||
|
regress_stats_superuser | | <insufficient privilege> | 1 | 1 |
||||||
|
regress_stats_superuser | | <insufficient privilege> | 1 | 3 |
||||||
|
regress_stats_user1 | t | SELECT $1+$2 AS "TWO" | 1 | 1 |
||||||
|
(4 rows) |
||||||
|
|
||||||
|
-- |
||||||
|
-- regress_stats_user2, with pg_read_all_stats role privileges, can |
||||||
|
-- read all columns, including query text and queryid, of queries |
||||||
|
-- executed by others. |
||||||
|
-- |
||||||
|
SET ROLE regress_stats_user2; |
||||||
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows |
||||||
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid |
||||||
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows; |
||||||
|
rolname | queryid_bool | query | calls | rows |
||||||
|
-------------------------+--------------+---------------------------------------------------------------------------------+-------+------ |
||||||
|
regress_stats_superuser | t | SELECT $1 AS "ONE" | 1 | 1 |
||||||
|
regress_stats_superuser | t | SELECT pg_stat_statements_reset() IS NOT NULL AS t | 1 | 1 |
||||||
|
regress_stats_superuser | t | SELECT r.rolname, ss.queryid <> $1 AS queryid_bool, ss.query, ss.calls, ss.rows+| 1 | 3 |
||||||
|
| | FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid +| | |
||||||
|
| | ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows | | |
||||||
|
regress_stats_user1 | t | SELECT $1+$2 AS "TWO" | 1 | 1 |
||||||
|
regress_stats_user1 | t | SELECT r.rolname, ss.queryid <> $1 AS queryid_bool, ss.query, ss.calls, ss.rows+| 1 | 4 |
||||||
|
| | FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid +| | |
||||||
|
| | ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows | | |
||||||
|
(5 rows) |
||||||
|
|
||||||
|
-- |
||||||
|
-- cleanup |
||||||
|
-- |
||||||
|
RESET ROLE; |
||||||
|
DROP ROLE regress_stats_superuser; |
||||||
|
DROP ROLE regress_stats_user1; |
||||||
|
DROP ROLE regress_stats_user2; |
||||||
|
SELECT pg_stat_statements_reset() IS NOT NULL AS t; |
||||||
|
t |
||||||
|
--- |
||||||
|
t |
||||||
|
(1 row) |
||||||
|
|
@ -0,0 +1,60 @@ |
|||||||
|
-- |
||||||
|
-- Only superusers and roles with privileges of the pg_read_all_stats role |
||||||
|
-- are allowed to see the SQL text and queryid of queries executed by |
||||||
|
-- other users. Other users can see the statistics. |
||||||
|
-- |
||||||
|
|
||||||
|
SET pg_stat_statements.track_utility = FALSE; |
||||||
|
CREATE ROLE regress_stats_superuser SUPERUSER; |
||||||
|
CREATE ROLE regress_stats_user1; |
||||||
|
CREATE ROLE regress_stats_user2; |
||||||
|
GRANT pg_read_all_stats TO regress_stats_user2; |
||||||
|
|
||||||
|
SET ROLE regress_stats_superuser; |
||||||
|
SELECT pg_stat_statements_reset() IS NOT NULL AS t; |
||||||
|
SELECT 1 AS "ONE"; |
||||||
|
|
||||||
|
SET ROLE regress_stats_user1; |
||||||
|
SELECT 1+1 AS "TWO"; |
||||||
|
|
||||||
|
-- |
||||||
|
-- A superuser can read all columns of queries executed by others, |
||||||
|
-- including query text and queryid. |
||||||
|
-- |
||||||
|
|
||||||
|
SET ROLE regress_stats_superuser; |
||||||
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows |
||||||
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid |
||||||
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows; |
||||||
|
|
||||||
|
-- |
||||||
|
-- regress_stats_user1 has no privileges to read the query text or |
||||||
|
-- queryid of queries executed by others but can see statistics |
||||||
|
-- like calls and rows. |
||||||
|
-- |
||||||
|
|
||||||
|
SET ROLE regress_stats_user1; |
||||||
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows |
||||||
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid |
||||||
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows; |
||||||
|
|
||||||
|
-- |
||||||
|
-- regress_stats_user2, with pg_read_all_stats role privileges, can |
||||||
|
-- read all columns, including query text and queryid, of queries |
||||||
|
-- executed by others. |
||||||
|
-- |
||||||
|
|
||||||
|
SET ROLE regress_stats_user2; |
||||||
|
SELECT r.rolname, ss.queryid <> 0 AS queryid_bool, ss.query, ss.calls, ss.rows |
||||||
|
FROM pg_stat_statements ss JOIN pg_roles r ON ss.userid = r.oid |
||||||
|
ORDER BY r.rolname, ss.query COLLATE "C", ss.calls, ss.rows; |
||||||
|
|
||||||
|
-- |
||||||
|
-- cleanup |
||||||
|
-- |
||||||
|
|
||||||
|
RESET ROLE; |
||||||
|
DROP ROLE regress_stats_superuser; |
||||||
|
DROP ROLE regress_stats_user1; |
||||||
|
DROP ROLE regress_stats_user2; |
||||||
|
SELECT pg_stat_statements_reset() IS NOT NULL AS t; |
Loading…
Reference in new issue