Skip to content

Commit af325c0

Browse files
committed
fix: vault grants post-upgrade
1 parent 7dc3610 commit af325c0

File tree

1 file changed

+8
-3
lines changed
  • ansible/files/admin_api_scripts/pg_upgrade_scripts

1 file changed

+8
-3
lines changed

ansible/files/admin_api_scripts/pg_upgrade_scripts/complete.sh

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -226,9 +226,14 @@ EOF
226226
AND EXISTS (SELECT FROM pg_extension WHERE extname = 'supabase_vault')
227227
THEN
228228
IF (SELECT extversion FROM pg_extension WHERE extname = 'supabase_vault') != '0.2.8' THEN
229-
GRANT USAGE ON SCHEMA vault TO postgres WITH GRANT OPTION;
230-
GRANT SELECT, DELETE ON vault.secrets, vault.decrypted_secrets TO postgres WITH GRANT OPTION;
231-
GRANT EXECUTE ON FUNCTION vault.create_secret, vault.update_secret, vault._crypto_aead_det_decrypt TO postgres WITH GRANT OPTION;
229+
grant usage on schema vault to postgres with grant option;
230+
grant select, delete, truncate, references on vault.secrets, vault.decrypted_secrets to postgres with grant option;
231+
grant execute on function vault.create_secret, vault.update_secret, vault._crypto_aead_det_decrypt to postgres with grant option;
232+
233+
-- service_role used to be able to manage secrets in Vault <=0.2.8 because it had privileges to pgsodium functions
234+
grant usage on schema vault to service_role;
235+
grant select, delete on vault.secrets, vault.decrypted_secrets to service_role;
236+
grant execute on function vault.create_secret, vault.update_secret, vault._crypto_aead_det_decrypt to service_role;
232237
END IF;
233238
-- Do an explicit IF EXISTS check to avoid referencing pgsodium objects if the project already migrated away from using pgsodium.
234239
IF EXISTS (SELECT FROM vault.secrets WHERE key_id IS NOT NULL) THEN

0 commit comments

Comments
 (0)