|
1 |
| -select |
2 |
| - 1 |
3 |
| -from |
4 |
| - vault.create_secret('my_s3kre3t'); |
5 |
| - ?column? |
6 |
| ----------- |
7 |
| - 1 |
8 |
| -(1 row) |
| 1 | +-- Tests role privileges on the vault objects |
| 2 | +-- INSERT and UPDATE privileges should not be present on the vault tables for postgres and service_role, only SELECT and DELETE |
| 3 | +WITH schema_obj AS ( |
| 4 | + SELECT oid, nspname |
| 5 | + FROM pg_namespace |
| 6 | + WHERE nspname = 'vault' |
| 7 | +) |
| 8 | +SELECT |
| 9 | + s.nspname AS schema, |
| 10 | + c.relname AS object_name, |
| 11 | + acl.grantee::regrole::text AS grantee, |
| 12 | + acl.privilege_type |
| 13 | +FROM pg_class c |
| 14 | +JOIN schema_obj s ON s.oid = c.relnamespace |
| 15 | +CROSS JOIN LATERAL aclexplode(c.relacl) AS acl |
| 16 | +WHERE c.relkind IN ('r', 'v', 'm', 'f', 'p') |
| 17 | + AND acl.privilege_type <> 'MAINTAIN' |
| 18 | +UNION ALL |
| 19 | +SELECT |
| 20 | + s.nspname AS schema, |
| 21 | + p.proname AS object_name, |
| 22 | + acl.grantee::regrole::text AS grantee, |
| 23 | + acl.privilege_type |
| 24 | +FROM pg_proc p |
| 25 | +JOIN schema_obj s ON s.oid = p.pronamespace |
| 26 | +CROSS JOIN LATERAL aclexplode(p.proacl) AS acl |
| 27 | +ORDER BY object_name, grantee, privilege_type; |
| 28 | + schema | object_name | grantee | privilege_type |
| 29 | +--------+---------------------------+----------------+---------------- |
| 30 | + vault | _crypto_aead_det_decrypt | postgres | EXECUTE |
| 31 | + vault | _crypto_aead_det_decrypt | supabase_admin | EXECUTE |
| 32 | + vault | _crypto_aead_det_encrypt | supabase_admin | EXECUTE |
| 33 | + vault | _crypto_aead_det_noncegen | supabase_admin | EXECUTE |
| 34 | + vault | create_secret | postgres | EXECUTE |
| 35 | + vault | create_secret | supabase_admin | EXECUTE |
| 36 | + vault | decrypted_secrets | postgres | DELETE |
| 37 | + vault | decrypted_secrets | postgres | SELECT |
| 38 | + vault | decrypted_secrets | supabase_admin | DELETE |
| 39 | + vault | decrypted_secrets | supabase_admin | INSERT |
| 40 | + vault | decrypted_secrets | supabase_admin | REFERENCES |
| 41 | + vault | decrypted_secrets | supabase_admin | SELECT |
| 42 | + vault | decrypted_secrets | supabase_admin | TRIGGER |
| 43 | + vault | decrypted_secrets | supabase_admin | TRUNCATE |
| 44 | + vault | decrypted_secrets | supabase_admin | UPDATE |
| 45 | + vault | secrets | postgres | DELETE |
| 46 | + vault | secrets | postgres | SELECT |
| 47 | + vault | secrets | supabase_admin | DELETE |
| 48 | + vault | secrets | supabase_admin | INSERT |
| 49 | + vault | secrets | supabase_admin | REFERENCES |
| 50 | + vault | secrets | supabase_admin | SELECT |
| 51 | + vault | secrets | supabase_admin | TRIGGER |
| 52 | + vault | secrets | supabase_admin | TRUNCATE |
| 53 | + vault | secrets | supabase_admin | UPDATE |
| 54 | + vault | update_secret | postgres | EXECUTE |
| 55 | + vault | update_secret | supabase_admin | EXECUTE |
| 56 | +(26 rows) |
9 | 57 |
|
10 |
| -select |
11 |
| - 1 |
12 |
| -from |
13 |
| - vault.create_secret( |
14 |
| - 'another_s3kre3t', |
15 |
| - 'unique_name', |
16 |
| - 'This is the description' |
17 |
| - ); |
18 |
| - ?column? |
19 |
| ----------- |
20 |
| - 1 |
21 |
| -(1 row) |
| 58 | +-- vault indexes with owners |
| 59 | +SELECT |
| 60 | + ns.nspname AS schema, |
| 61 | + t.relname AS table, |
| 62 | + i.relname AS index_name, |
| 63 | + r.rolname AS index_owner, |
| 64 | + CASE |
| 65 | + WHEN idx.indisunique THEN 'Unique' |
| 66 | + ELSE 'Non Unique' |
| 67 | + END AS index_type |
| 68 | +FROM |
| 69 | + pg_class t |
| 70 | +JOIN |
| 71 | + pg_namespace ns ON t.relnamespace = ns.oid |
| 72 | +JOIN |
| 73 | + pg_index idx ON t.oid = idx.indrelid |
| 74 | +JOIN |
| 75 | + pg_class i ON idx.indexrelid = i.oid |
| 76 | +JOIN |
| 77 | + pg_roles r ON i.relowner = r.oid |
| 78 | +WHERE |
| 79 | + ns.nspname = 'vault' |
| 80 | +ORDER BY |
| 81 | + t.relname, |
| 82 | + i.relname; |
| 83 | + schema | table | index_name | index_owner | index_type |
| 84 | +--------+---------+------------------+----------------+------------ |
| 85 | + vault | secrets | secrets_name_idx | supabase_admin | Unique |
| 86 | + vault | secrets | secrets_pkey | supabase_admin | Unique |
| 87 | +(2 rows) |
22 | 88 |
|
23 |
| -insert into vault.secrets (secret) |
24 |
| -values |
25 |
| - ('s3kre3t_k3y'); |
26 |
| -select |
27 |
| - name, |
28 |
| - description |
29 |
| -from |
30 |
| - vault.decrypted_secrets |
31 |
| -order by |
32 |
| - created_at desc |
33 |
| -limit |
34 |
| - 3; |
35 |
| - name | description |
36 |
| --------------+------------------------- |
37 |
| - | |
38 |
| - unique_name | This is the description |
39 |
| - | |
40 |
| -(3 rows) |
41 |
| - |
42 |
| - |
|
0 commit comments