Skip to content

Commit df5efaf

Browse files
committed
Standardize pg_authid oid_symbol values.
Commit c9c41c7 used two different naming patterns. Standardize on the majority pattern, which was the only pattern in the last reviewed version of that commit.
1 parent 496e58b commit df5efaf

File tree

4 files changed

+14
-14
lines changed

4 files changed

+14
-14
lines changed

src/backend/catalog/aclchk.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3931,7 +3931,7 @@ pg_class_aclmask_ext(Oid table_oid, Oid roleid, AclMode mask,
39313931
* pg_read_all_data role, which allows read access to all relations.
39323932
*/
39333933
if (mask & ACL_SELECT && !(result & ACL_SELECT) &&
3934-
has_privs_of_role(roleid, ROLE_READ_ALL_DATA))
3934+
has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA))
39353935
result |= ACL_SELECT;
39363936

39373937
/*
@@ -3943,7 +3943,7 @@ pg_class_aclmask_ext(Oid table_oid, Oid roleid, AclMode mask,
39433943
*/
39443944
if (mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE) &&
39453945
!(result & (ACL_INSERT | ACL_UPDATE | ACL_DELETE)) &&
3946-
has_privs_of_role(roleid, ROLE_WRITE_ALL_DATA))
3946+
has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA))
39473947
result |= (mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE));
39483948

39493949
return result;
@@ -4279,8 +4279,8 @@ pg_namespace_aclmask(Oid nsp_oid, Oid roleid,
42794279
* access to all schemas.
42804280
*/
42814281
if (mask & ACL_USAGE && !(result & ACL_USAGE) &&
4282-
(has_privs_of_role(roleid, ROLE_READ_ALL_DATA) ||
4283-
has_privs_of_role(roleid, ROLE_WRITE_ALL_DATA)))
4282+
(has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA) ||
4283+
has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA)))
42844284
result |= ACL_USAGE;
42854285
return result;
42864286
}

src/backend/commands/user.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1501,10 +1501,10 @@ AddRoleMems(const char *rolename, Oid roleid,
15011501
* situation-dependent member. There's no technical need for this
15021502
* restriction. (One could lift it and take the further step of making
15031503
* pg_database_ownercheck() equivalent to has_privs_of_role(roleid,
1504-
* ROLE_DATABASE_OWNER), in which case explicit,
1505-
* situation-independent members could act as the owner of any database.)
1504+
* ROLE_PG_DATABASE_OWNER), in which case explicit, situation-independent
1505+
* members could act as the owner of any database.)
15061506
*/
1507-
if (roleid == ROLE_DATABASE_OWNER)
1507+
if (roleid == ROLE_PG_DATABASE_OWNER)
15081508
ereport(ERROR,
15091509
errmsg("role \"%s\" cannot have explicit members", rolename));
15101510

@@ -1555,7 +1555,7 @@ AddRoleMems(const char *rolename, Oid roleid,
15551555
* shared object. (The effect of such ownership is that any owner of
15561556
* another database can act as the owner of affected shared objects.)
15571557
*/
1558-
if (memberid == ROLE_DATABASE_OWNER)
1558+
if (memberid == ROLE_PG_DATABASE_OWNER)
15591559
ereport(ERROR,
15601560
errmsg("role \"%s\" cannot be a member of any role",
15611561
get_rolespec_name(memberRole)));

src/backend/utils/adt/acl.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4741,8 +4741,8 @@ roles_is_member_of(Oid roleid, enum RoleRecurseType type,
47414741

47424742
/*
47434743
* Role expansion happens in a non-database backend when guc.c checks
4744-
* ROLE_READ_ALL_SETTINGS for a physical walsender SHOW command.
4745-
* In that case, no role gets pg_database_owner.
4744+
* ROLE_PG_READ_ALL_SETTINGS for a physical walsender SHOW command. In
4745+
* that case, no role gets pg_database_owner.
47464746
*/
47474747
if (!OidIsValid(MyDatabaseId))
47484748
dba = InvalidOid;
@@ -4808,7 +4808,7 @@ roles_is_member_of(Oid roleid, enum RoleRecurseType type,
48084808
/* implement pg_database_owner implicit membership */
48094809
if (memberid == dba && OidIsValid(dba))
48104810
roles_list = list_append_unique_oid(roles_list,
4811-
ROLE_DATABASE_OWNER);
4811+
ROLE_PG_DATABASE_OWNER);
48124812
}
48134813

48144814
/*

src/include/catalog/pg_authid.dat

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,17 @@
2424
rolcreaterole => 't', rolcreatedb => 't', rolcanlogin => 't',
2525
rolreplication => 't', rolbypassrls => 't', rolconnlimit => '-1',
2626
rolpassword => '_null_', rolvaliduntil => '_null_' },
27-
{ oid => '8778', oid_symbol => 'ROLE_DATABASE_OWNER',
27+
{ oid => '8778', oid_symbol => 'ROLE_PG_DATABASE_OWNER',
2828
rolname => 'pg_database_owner', rolsuper => 'f', rolinherit => 't',
2929
rolcreaterole => 'f', rolcreatedb => 'f', rolcanlogin => 'f',
3030
rolreplication => 'f', rolbypassrls => 'f', rolconnlimit => '-1',
3131
rolpassword => '_null_', rolvaliduntil => '_null_' },
32-
{ oid => '9274', oid_symbol => 'ROLE_READ_ALL_DATA',
32+
{ oid => '9274', oid_symbol => 'ROLE_PG_READ_ALL_DATA',
3333
rolname => 'pg_read_all_data', rolsuper => 'f', rolinherit => 't',
3434
rolcreaterole => 'f', rolcreatedb => 'f', rolcanlogin => 'f',
3535
rolreplication => 'f', rolbypassrls => 'f', rolconnlimit => '-1',
3636
rolpassword => '_null_', rolvaliduntil => '_null_' },
37-
{ oid => '9275', oid_symbol => 'ROLE_WRITE_ALL_DATA',
37+
{ oid => '9275', oid_symbol => 'ROLE_PG_WRITE_ALL_DATA',
3838
rolname => 'pg_write_all_data', rolsuper => 'f', rolinherit => 't',
3939
rolcreaterole => 'f', rolcreatedb => 'f', rolcanlogin => 'f',
4040
rolreplication => 'f', rolbypassrls => 'f', rolconnlimit => '-1',

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy