Re: lowering pg_regress privileges on Windows

From: Andrew Dunstan <andrew(dot)dunstan(at)2ndquadrant(dot)com>
To: Thomas Munro <thomas(dot)munro(at)enterprisedb(dot)com>, Michael Paquier <michael(at)paquier(dot)xyz>
Cc: Pg Hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: lowering pg_regress privileges on Windows
Date: 2018-10-19 14:00:43
Message-ID: e5639e76-b7a2-44d9-c694-451c4010b18a@2ndQuadrant.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 10/18/2018 08:25 PM, Thomas Munro wrote:
> On Fri, Oct 19, 2018 at 1:13 PM Michael Paquier <michael(at)paquier(dot)xyz> wrote:
>> On Thu, Oct 18, 2018 at 08:31:11AM -0400, Andrew Dunstan wrote:
>>> The attached ridiculously tiny patch solves the problem whereby while we can
>>> run Postgres on Windows safely from an Administrator account, we can't run
>>> run the regression tests from the same account, since it fails on the
>>> tablespace test, the tablespace directory having been set up without first
>>> having lowered privileges. The solution is to lower pg_regress' privileges
>>> in the same way that we do with other binaries. This is useful in setups
>>> like Appveyor where running under any other account is ... difficult. For
>>> the cfbot Thomas has had to make the script hack the schedule file to omit
>>> the tablespace test. This would make that redundant.
>>>
>>> I propose to backpatch this. It's close enough to a bug and the risk is
>>> almost infinitely small.
>> +1. get_restricted_token() refactoring has been done down to
>> REL9_5_STABLE. With 9.4 and older you would need to copy again this
>> full routine into pg_regress.c, which is in my opinion not worth
>> worrying about.
> FWIW here is a successful Appveyor build including the full test
> schedule (CI patch attached in case anyone is interested). Woohoo!
> Thanks for figuring that out Andrew. I will be very happy to remove
> that wart from my workflows.
>
> https://ci.appveyor.com/project/macdice/postgres/builds/19626669
>

Excellent. I'll apply back to 9.5 as Michael suggests.

Having got past that hurdle I encountered another one in the same area.
pg_upgrade gives up its privileges and is then unable to write things
like log files and analyze scripts.

The attached patch cures the problem, but it doesn't seem like the best
cure. Maybe there is a more secure way to do it. Essentially it saves
out the ACLS for the current directory and its subdirectories and then
allows everyone to write to them, right before running pg_upgrade. When
pg_upgrade is done it restores the saved ACLs.

Maybe someone who understands more about how this all works can suggest
a less blunt force approach.

cheers

andrew

--
Andrew Dunstan https://www.2ndQuadrant.com
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services

Attachment Content-Type Size
upgrade-check-permissions.patch text/x-patch 745 bytes

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Michael Paquier 2018-10-19 14:00:47 Re: removing unnecessary get_att*() lsyscache functions
Previous Message Adelino Silva 2018-10-19 14:00:15 WAL archive (archive_mode = always) ?