aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorNoah Misch <noah@leadboat.com>2021-04-10 12:01:41 -0700
committerNoah Misch <noah@leadboat.com>2021-04-10 12:01:41 -0700
commitdf5efaf4410f94cc1b69e8ade1d64dc92232ec1d (patch)
treeb1654a2b73d16c1101ce7411c5176dadd2a2797e /src
parent496e58bb0e5e939e6ed5839c92b05e3ab11b54bb (diff)
downloadpostgresql-df5efaf4410f94cc1b69e8ade1d64dc92232ec1d.tar.gz
postgresql-df5efaf4410f94cc1b69e8ade1d64dc92232ec1d.zip
Standardize pg_authid oid_symbol values.
Commit c9c41c7a337d3e2deb0b2a193e9ecfb865d8f52b used two different naming patterns. Standardize on the majority pattern, which was the only pattern in the last reviewed version of that commit.
Diffstat (limited to 'src')
-rw-r--r--src/backend/catalog/aclchk.c8
-rw-r--r--src/backend/commands/user.c8
-rw-r--r--src/backend/utils/adt/acl.c6
-rw-r--r--src/include/catalog/pg_authid.dat6
4 files changed, 14 insertions, 14 deletions
diff --git a/src/backend/catalog/aclchk.c b/src/backend/catalog/aclchk.c
index 1d8930a1e0e..e1573eb3984 100644
--- a/src/backend/catalog/aclchk.c
+++ b/src/backend/catalog/aclchk.c
@@ -3931,7 +3931,7 @@ pg_class_aclmask_ext(Oid table_oid, Oid roleid, AclMode mask,
* pg_read_all_data role, which allows read access to all relations.
*/
if (mask & ACL_SELECT && !(result & ACL_SELECT) &&
- has_privs_of_role(roleid, ROLE_READ_ALL_DATA))
+ has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA))
result |= ACL_SELECT;
/*
@@ -3943,7 +3943,7 @@ pg_class_aclmask_ext(Oid table_oid, Oid roleid, AclMode mask,
*/
if (mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE) &&
!(result & (ACL_INSERT | ACL_UPDATE | ACL_DELETE)) &&
- has_privs_of_role(roleid, ROLE_WRITE_ALL_DATA))
+ has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA))
result |= (mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE));
return result;
@@ -4279,8 +4279,8 @@ pg_namespace_aclmask(Oid nsp_oid, Oid roleid,
* access to all schemas.
*/
if (mask & ACL_USAGE && !(result & ACL_USAGE) &&
- (has_privs_of_role(roleid, ROLE_READ_ALL_DATA) ||
- has_privs_of_role(roleid, ROLE_WRITE_ALL_DATA)))
+ (has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA) ||
+ has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA)))
result |= ACL_USAGE;
return result;
}
diff --git a/src/backend/commands/user.c b/src/backend/commands/user.c
index a8c5188ebcd..65bb7339589 100644
--- a/src/backend/commands/user.c
+++ b/src/backend/commands/user.c
@@ -1501,10 +1501,10 @@ AddRoleMems(const char *rolename, Oid roleid,
* situation-dependent member. There's no technical need for this
* restriction. (One could lift it and take the further step of making
* pg_database_ownercheck() equivalent to has_privs_of_role(roleid,
- * ROLE_DATABASE_OWNER), in which case explicit,
- * situation-independent members could act as the owner of any database.)
+ * ROLE_PG_DATABASE_OWNER), in which case explicit, situation-independent
+ * members could act as the owner of any database.)
*/
- if (roleid == ROLE_DATABASE_OWNER)
+ if (roleid == ROLE_PG_DATABASE_OWNER)
ereport(ERROR,
errmsg("role \"%s\" cannot have explicit members", rolename));
@@ -1555,7 +1555,7 @@ AddRoleMems(const char *rolename, Oid roleid,
* shared object. (The effect of such ownership is that any owner of
* another database can act as the owner of affected shared objects.)
*/
- if (memberid == ROLE_DATABASE_OWNER)
+ if (memberid == ROLE_PG_DATABASE_OWNER)
ereport(ERROR,
errmsg("role \"%s\" cannot be a member of any role",
get_rolespec_name(memberRole)));
diff --git a/src/backend/utils/adt/acl.c b/src/backend/utils/adt/acl.c
index ebf113074a9..7861a0a613a 100644
--- a/src/backend/utils/adt/acl.c
+++ b/src/backend/utils/adt/acl.c
@@ -4741,8 +4741,8 @@ roles_is_member_of(Oid roleid, enum RoleRecurseType type,
/*
* Role expansion happens in a non-database backend when guc.c checks
- * ROLE_READ_ALL_SETTINGS for a physical walsender SHOW command.
- * In that case, no role gets pg_database_owner.
+ * ROLE_PG_READ_ALL_SETTINGS for a physical walsender SHOW command. In
+ * that case, no role gets pg_database_owner.
*/
if (!OidIsValid(MyDatabaseId))
dba = InvalidOid;
@@ -4808,7 +4808,7 @@ roles_is_member_of(Oid roleid, enum RoleRecurseType type,
/* implement pg_database_owner implicit membership */
if (memberid == dba && OidIsValid(dba))
roles_list = list_append_unique_oid(roles_list,
- ROLE_DATABASE_OWNER);
+ ROLE_PG_DATABASE_OWNER);
}
/*
diff --git a/src/include/catalog/pg_authid.dat b/src/include/catalog/pg_authid.dat
index f78802e41fa..ed5916330c9 100644
--- a/src/include/catalog/pg_authid.dat
+++ b/src/include/catalog/pg_authid.dat
@@ -24,17 +24,17 @@
rolcreaterole => 't', rolcreatedb => 't', rolcanlogin => 't',
rolreplication => 't', rolbypassrls => 't', rolconnlimit => '-1',
rolpassword => '_null_', rolvaliduntil => '_null_' },
-{ oid => '8778', oid_symbol => 'ROLE_DATABASE_OWNER',
+{ oid => '8778', oid_symbol => 'ROLE_PG_DATABASE_OWNER',
rolname => 'pg_database_owner', rolsuper => 'f', rolinherit => 't',
rolcreaterole => 'f', rolcreatedb => 'f', rolcanlogin => 'f',
rolreplication => 'f', rolbypassrls => 'f', rolconnlimit => '-1',
rolpassword => '_null_', rolvaliduntil => '_null_' },
-{ oid => '9274', oid_symbol => 'ROLE_READ_ALL_DATA',
+{ oid => '9274', oid_symbol => 'ROLE_PG_READ_ALL_DATA',
rolname => 'pg_read_all_data', rolsuper => 'f', rolinherit => 't',
rolcreaterole => 'f', rolcreatedb => 'f', rolcanlogin => 'f',
rolreplication => 'f', rolbypassrls => 'f', rolconnlimit => '-1',
rolpassword => '_null_', rolvaliduntil => '_null_' },
-{ oid => '9275', oid_symbol => 'ROLE_WRITE_ALL_DATA',
+{ oid => '9275', oid_symbol => 'ROLE_PG_WRITE_ALL_DATA',
rolname => 'pg_write_all_data', rolsuper => 'f', rolinherit => 't',
rolcreaterole => 'f', rolcreatedb => 'f', rolcanlogin => 'f',
rolreplication => 'f', rolbypassrls => 'f', rolconnlimit => '-1',