Skip to content

Commit 7ce1053

Browse files
authored
Merge branch 'develop' into dd/bump-admin-mgr-v0.25.1
2 parents 7daaec9 + 736232e commit 7ce1053

File tree

6 files changed

+30
-10
lines changed

6 files changed

+30
-10
lines changed

ansible/files/admin_api_scripts/pg_upgrade_scripts/complete.sh

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -226,9 +226,14 @@ EOF
226226
AND EXISTS (SELECT FROM pg_extension WHERE extname = 'supabase_vault')
227227
THEN
228228
IF (SELECT extversion FROM pg_extension WHERE extname = 'supabase_vault') != '0.2.8' THEN
229-
GRANT USAGE ON SCHEMA vault TO postgres WITH GRANT OPTION;
230-
GRANT SELECT, DELETE ON vault.secrets, vault.decrypted_secrets TO postgres WITH GRANT OPTION;
231-
GRANT EXECUTE ON FUNCTION vault.create_secret, vault.update_secret, vault._crypto_aead_det_decrypt TO postgres WITH GRANT OPTION;
229+
grant usage on schema vault to postgres with grant option;
230+
grant select, delete, truncate, references on vault.secrets, vault.decrypted_secrets to postgres with grant option;
231+
grant execute on function vault.create_secret, vault.update_secret, vault._crypto_aead_det_decrypt to postgres with grant option;
232+
233+
-- service_role used to be able to manage secrets in Vault <=0.2.8 because it had privileges to pgsodium functions
234+
grant usage on schema vault to service_role;
235+
grant select, delete on vault.secrets, vault.decrypted_secrets to service_role;
236+
grant execute on function vault.create_secret, vault.update_secret, vault._crypto_aead_det_decrypt to service_role;
232237
END IF;
233238
-- Do an explicit IF EXISTS check to avoid referencing pgsodium objects if the project already migrated away from using pgsodium.
234239
IF EXISTS (SELECT FROM vault.secrets WHERE key_id IS NOT NULL) THEN

ansible/files/postgresql_config/supautils.conf.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ supautils.drop_trigger_grants = '{"postgres":["auth.audit_log_entries","auth.ide
77
# omitted because doesn't require superuser: pgmq
88
# omitted because protected: plpgsql
99
supautils.privileged_extensions = 'address_standardizer, address_standardizer_data_us, autoinc, bloom, btree_gin, btree_gist, citext, cube, dblink, dict_int, dict_xsyn, earthdistance, fuzzystrmatch, hstore, http, hypopg, index_advisor, insert_username, intarray, isn, ltree, moddatetime, orioledb, pg_buffercache, pg_cron, pg_graphql, pg_hashids, pg_jsonschema, pg_net, pg_prewarm, pg_repack, pg_stat_monitor, pg_stat_statements, pg_tle, pg_trgm, pg_walinspect, pgaudit, pgcrypto, pgjwt, pgroonga, pgroonga_database, pgrouting, pgrowlocks, pgsodium, pgstattuple, pgtap, plcoffee, pljava, plls, plpgsql_check, plv8, postgis, postgis_raster, postgis_sfcgal, postgis_tiger_geocoder, postgis_topology, postgres_fdw, refint, rum, seg, sslinfo, supabase_vault, supautils, tablefunc, tcn, timescaledb, tsm_system_rows, tsm_system_time, unaccent, uuid-ossp, vector, wrappers'
10-
supautils.privileged_extensions_custom_scripts_path = '/etc/postgresql-custom/extension-custom-scripts'
10+
supautils.extension_custom_scripts_path = '/etc/postgresql-custom/extension-custom-scripts'
1111
supautils.privileged_extensions_superuser = 'supabase_admin'
1212
supautils.privileged_role = 'postgres'
1313
supautils.privileged_role_allowed_configs = 'auto_explain.*, log_lock_waits, log_min_duration_statement, log_min_messages, log_replication_commands, log_statement, log_temp_files, pg_net.batch_size, pg_net.ttl, pg_stat_statements.*, pgaudit.log, pgaudit.log_catalog, pgaudit.log_client, pgaudit.log_level, pgaudit.log_relation, pgaudit.log_rows, pgaudit.log_statement, pgaudit.log_statement_once, pgaudit.role, pgrst.*, plan_filter.*, safeupdate.enabled, session_replication_role, track_io_timing, wal_compression'

flake.nix

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,10 @@
7575
cargo-pgrx = final.cargo-pgrx.cargo-pgrx_0_12_9;
7676
};
7777

78+
buildPgrxExtension_0_14_3 = prev.buildPgrxExtension.override {
79+
cargo-pgrx = final.cargo-pgrx.cargo-pgrx_0_14_3;
80+
};
81+
7882
})
7983
(final: prev: {
8084
postgresql = final.callPackage ./nix/postgresql/default.nix {
@@ -417,6 +421,7 @@
417421
cargo-pgrx_0_11_3 = pkgs.cargo-pgrx.cargo-pgrx_0_11_3;
418422
cargo-pgrx_0_12_6 = pkgs.cargo-pgrx.cargo-pgrx_0_12_6;
419423
cargo-pgrx_0_12_9 = pkgs.cargo-pgrx.cargo-pgrx_0_12_9;
424+
cargo-pgrx_0_14_3 = pkgs.cargo-pgrx.cargo-pgrx_0_14_3;
420425
# PostgreSQL versions.
421426
psql_15 = postgresVersions.psql_15;
422427
psql_17 = postgresVersions.psql_17;

nix/cargo-pgrx/default.nix

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
, rust-bin
99
}:
1010
let
11-
rustVersion = "1.76.0";
11+
rustVersion = "1.85.1";
1212
rustPlatform = makeRustPlatform {
1313
cargo = rust-bin.stable.${rustVersion}.default;
1414
rustc = rust-bin.stable.${rustVersion}.default;
@@ -19,6 +19,11 @@ let
1919
, cargoHash
2020
}:
2121
rustPlatform.buildRustPackage rec {
22+
# rust-overlay uses 'cargo-auditable' wrapper for 'cargo' command, but it
23+
# is using older version 0.18.1 of 'cargo_metadata' which doesn't support
24+
# rust edition 2024, so we disable the 'cargo-auditable' just for now.
25+
# ref: https://github.com/oxalica/rust-overlay/issues/153
26+
auditable = false;
2227
pname = "cargo-pgrx";
2328
inherit version;
2429
src = fetchCrate {
@@ -69,7 +74,12 @@ in
6974
cargo-pgrx_0_12_9 = generic {
7075
version = "0.12.9";
7176
hash = "sha256-aR3DZAjeEEAjLQfZ0ZxkjLqTVMIEbU0UiZ62T4BkQq8=";
72-
cargoHash = "sha256-53HKhvsKLTa2JCByLEcK3UzWXoM+LTatd98zvS1C9no=";
77+
cargoHash = "sha256-KTKcol9qSNLQZGW32e6fBb6cPkUGItknyVpLdBYqrBY=";
78+
};
79+
cargo-pgrx_0_14_3 = generic {
80+
version = "0.14.3";
81+
hash = "sha256-3TsNpEqNm3Uol5XPW1i0XEbP2fF2+RKB2d7lO6BDnvQ=";
82+
cargoHash = "sha256-Ny7j56pwB+2eEK62X0nWfFKQy5fBz+Q1oyvecivxLkk=";
7383
};
7484
inherit rustPlatform;
7585
}

nix/ext/supautils.nix

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,21 +2,21 @@
22

33
stdenv.mkDerivation rec {
44
pname = "supautils";
5-
version = "2.9.1";
5+
version = "2.9.4";
66

77
buildInputs = [ postgresql ];
88

99
src = fetchFromGitHub {
1010
owner = "supabase";
1111
repo = pname;
1212
rev = "refs/tags/v${version}";
13-
hash = "sha256-Rw7dmIUg9bJ7SuiHxCsZtnVhdG9hg4WlptiB/MxVmPc=";
13+
hash = "sha256-qP9fOEWXw+wY49GopTizwxSBEGS0UoseJHVBtKS/BdI=";
1414
};
1515

1616
installPhase = ''
1717
mkdir -p $out/lib
1818
19-
install -D build/*${postgresql.dlSuffix} -t $out/lib
19+
install -D *${postgresql.dlSuffix} -t $out/lib
2020
'';
2121

2222
meta = with lib; {

nix/tools/run-server.sh.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@ mkdir -p "$DATDIR/extension-custom-scripts"
220220
cp -r "$EXTENSION_CUSTOM_SCRIPTS"/* "$DATDIR/extension-custom-scripts"
221221

222222
# Configure supautils
223-
sed "s|supautils.privileged_extensions_custom_scripts_path = '/etc/postgresql-custom/extension-custom-scripts'|supautils.privileged_extensions_custom_scripts_path = '$DATDIR/extension-custom-scripts'|" "$SUPAUTILS_CONFIG_FILE" > "$DATDIR/supautils.conf"
223+
sed "s|supautils.extension_custom_scripts_path = '/etc/postgresql-custom/extension-custom-scripts'|supautils.extension_custom_scripts_path = '$DATDIR/extension-custom-scripts'|" "$SUPAUTILS_CONFIG_FILE" > "$DATDIR/supautils.conf"
224224

225225
# Configure PostgreSQL
226226
sed -e "1i\\

0 commit comments

Comments
 (0)