Re: pg_upgrade fails with non-standard ACL - Mailing list pgsql-hackers

From Artur Zakirov
Subject Re: pg_upgrade fails with non-standard ACL
Date
Msg-id 992c610a-ea24-0096-4b9d-0e09c0642773@gmail.com
Whole thread Raw
In response to Re: pg_upgrade fails with non-standard ACL  (Artur Zakirov <zaartur@gmail.com>)
Responses Re: pg_upgrade fails with non-standard ACL
List pgsql-hackers
If Anastasia doesn't mind I'd like to send new version of the patch.

On 2019/11/28 12:29, Artur Zakirov wrote:
> On 2019/11/27 13:22, Michael Paquier wrote:
>> Yeah, the actual take is if we want to make the frontend code more
>> complicated with a large set of SQL queries to check that each object
>> ACL is modified, which adds an additional maintenance cost in
>> pg_upgrade.  Or if we want to keep the frontend simple and have more
>> backend facility to ease cross-catalog lookups for ACLs.  Perhaps we
>> could also live with just checking after the ACLs of functions in the
>> short term and perhaps it covers most of the cases users would care
>> about..  That's tricky to conclude about and I am not sure which path
>> is better in the long-term, but at least it's worth discussing all
>> possible candidates IMO so as we make sure to not miss anything.
> 
> I checked what objects changed their signatures between master and 9.6. 
> I just ran pg_describe_object() for grantable object types, saved the 
> output into a file and diffed the outputs. It seems that only functions 
> and table columns changed their signatures. A list of functions is big 
> and here the list of columns:
> 
> table pg_attrdef column adsrc
> table pg_class column relhasoids
> table pg_class column relhaspkey
> table pg_constraint column consrc
> table pg_proc column proisagg
> table pg_proc column proiswindow
> table pg_proc column protransform
> 
> As a result I think in pg_upgrade we could just check functions and 
> columns signatures. It might simplify the patch. And if something 
> changes in a future we could fix pg_upgrade too.
New version of the patch differs from the previous:
- it doesn't generate script to revoke conflicting permissions (but the 
patch can be fixed easily)
- generates file incompatible_objects_for_acl.txt to report which 
objects changed their signatures
- uses pg_shdepend and pg_depend catalogs to get objects with custom 
privileges
- uses pg_describe_object() to find objects with different signatures

Currently relations, attributes, languages, functions and procedures are 
scanned. According to the documentation foreign databases, foreign-data 
wrappers, foreign servers, schemas and tablespaces also support ACLs. 
But some of them doesn't have entries initialized during initdb, others 
like schemas and tablespaces didn't change their names. So the patch 
doesn't scan such objects.

Grigory it would be great if you'll try the patch. I tested it but I 
could miss something.

-- 
Artur

Attachment

pgsql-hackers by date:

Previous
From: Juan José Santamaría Flecha
Date:
Subject: Re: dropdb --force
Next
From: Kyotaro Horiguchi
Date:
Subject: Re: Remove page-read callback from XLogReaderState.