diff --git a/ansible/files/postgresql_config/supautils.conf.j2 b/ansible/files/postgresql_config/supautils.conf.j2 index 299283a8c..c503b01a5 100644 --- a/ansible/files/postgresql_config/supautils.conf.j2 +++ b/ansible/files/postgresql_config/supautils.conf.j2 @@ -13,4 +13,3 @@ supautils.privileged_role = 'postgres' supautils.privileged_role_allowed_configs = 'auto_explain.*, log_lock_waits, log_min_duration_statement, log_min_messages, log_parameter_max_length, log_replication_commands, log_statement, log_temp_files, pg_net.batch_size, pg_net.ttl, pg_stat_statements.*, pgaudit.log, pgaudit.log_catalog, pgaudit.log_client, pgaudit.log_level, pgaudit.log_relation, pgaudit.log_rows, pgaudit.log_statement, pgaudit.log_statement_once, pgaudit.role, pgrst.*, plan_filter.*, safeupdate.enabled, session_replication_role, track_io_timing, wal_compression' supautils.reserved_memberships = 'pg_read_server_files, pg_write_server_files, pg_execute_server_program, supabase_admin, supabase_auth_admin, supabase_storage_admin, supabase_read_only_user, supabase_realtime_admin, supabase_replication_admin, supabase_etl_admin, dashboard_user, pgbouncer, authenticator' supautils.reserved_roles = 'supabase_admin, supabase_auth_admin, supabase_storage_admin, supabase_read_only_user, supabase_realtime_admin, supabase_replication_admin, supabase_etl_admin, dashboard_user, pgbouncer, service_role*, authenticator*, authenticated*, anon*' -supautils.disable_program = 'true' diff --git a/ansible/vars.yml b/ansible/vars.yml index 5d0def191..fd40cbdd2 100644 --- a/ansible/vars.yml +++ b/ansible/vars.yml @@ -10,9 +10,9 @@ postgres_major: # Full version strings for each major version postgres_release: - postgresorioledb-17: "17.5.1.068-orioledb" - postgres17: "17.6.1.047" - postgres15: "15.14.1.047" + postgresorioledb-17: "17.5.1.069-orioledb" + postgres17: "17.6.1.048" + postgres15: "15.14.1.048" # Non Postgres Extensions pgbouncer_release: 1.19.0 diff --git a/nix/ext/supautils.nix b/nix/ext/supautils.nix index a10d49c4a..e849c20dd 100644 --- a/nix/ext/supautils.nix +++ b/nix/ext/supautils.nix @@ -7,7 +7,7 @@ stdenv.mkDerivation rec { pname = "supautils"; - version = "3.0.2"; + version = "3.0.1"; buildInputs = [ postgresql ]; @@ -15,7 +15,7 @@ stdenv.mkDerivation rec { owner = "supabase"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-WTLZShBFVgb18vVi15TSZvtJrNUFgQa6mBkavvRSoUE="; + hash = "sha256-j0iASDzmcZRLbHaS9ZNRWwzii7mcC+8wYHM0/mOLkbs="; }; installPhase = '' diff --git a/nix/tests/expected/security.out b/nix/tests/expected/security.out index a57a0b64c..81b6b8705 100644 --- a/nix/tests/expected/security.out +++ b/nix/tests/expected/security.out @@ -31,7 +31,3 @@ order by 1,2; vault | update_secret (20 rows) --- supautils disables copy ... program -copy (select '') to program 'id'; -ERROR: COPY TO/FROM PROGRAM not allowed -DETAIL: The copy to/from program utility statement is disabled diff --git a/nix/tests/sql/security.sql b/nix/tests/sql/security.sql index 5822283c0..fb72f0e69 100644 --- a/nix/tests/sql/security.sql +++ b/nix/tests/sql/security.sql @@ -7,6 +7,3 @@ from pg_catalog.pg_proc p where p.proowner = (select oid from pg_catalog.pg_roles where rolname = 'supabase_admin') and p.prosecdef = true order by 1,2; - --- supautils disables copy ... program -copy (select '') to program 'id';