File: rpl_priv_checks_user_no_dynamic_grants.cnf

package info (click to toggle)
mysql-8.0 8.0.43-3
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,273,924 kB
  • sloc: cpp: 4,684,605; ansic: 412,450; pascal: 108,398; java: 83,641; perl: 30,221; cs: 27,067; sql: 26,594; sh: 24,181; python: 21,816; yacc: 17,169; php: 11,522; xml: 7,388; javascript: 7,076; makefile: 2,194; lex: 1,075; awk: 670; asm: 520; objc: 183; ruby: 97; lisp: 86
file content (51 lines) | stat: -rw-r--r-- 2,810 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# ==== Purpose ====
# Grant all privileges to PRIVILEGE_CHECKS_USER account except the
# dynamic privileges and the GRANT option

[ENV]
# By default, CHANGE REPLICATION SOURCE is executed without specifying the
# `PRIVILEGE_CHECKS_USER` parameter. Instantiating
# $rpl_privilege_checks_user` sets the `PRIVILEGE_CHECKS_USER` option for
# the `CHANGE REPLICATION SOURCE TO...` command, bounding the replication
# applier to execute within the security context of the given user. For
# example, to specify that server_1 should use 'u1'@'localhost' as base
# user for replication applier security context and server_5 shouldn't
# check privileges while applying replicated events, do:
# PRIVILEGE_CHECKS_USER= 1:'u1'@'localhost',5:NULL
PRIVILEGE_CHECKS_USER= *:'rpl_applier_priv_user'@'localhost'

# Force to '1' to not create the user provided in
# $PRIVILEGE_CHECKS_USER. If set to 0, creates it if doesn't
# exists and, if created, assigns the `REPLICATION_APPLIER` privilege.
# Default value is '0'.
PRIVILEGE_CHECKS_USER_DONT_CREATE_USER= 0

# If set to '1' does not modify the privileges of $PRIVILEGE_CHECKS_USER
# account. If set to '0' privileges are modified according to parameters
# $PRIVILEGE_CHECKS_USER_GRANT_ALL, $PRIVILEGE_CHECKS_USER_GRANT_OPTION,
# $PRIVILEGE_CHECKS_USER_ADDITIONAL_GRANTS and $PRIVILEGE_CHECKS_USER_REVOKE_GRANTS
# Default value is '0'.
SKIP_GRANT_PRIVILEGE_CHECKS_USER_ROLES= 0

# If set to '1' create a new role 'sql_applier_thread' and grant this role
# to account $PRIVILEGE_CHECKS_USER. If set to '0' do nothing.
# Default value is '0'.
PRIVILEGE_CHECKS_USE_ROLES= 0

# If set to '1' PRIVILEGE_CHECKS_USER account has all privileges. If set to
# '0' PRIVILEGE_CHECKS_USER account has privileges given by
# $PRIVILEGE_CHECKS_USER_ADDITIONAL_GRANTS. Default value is '1'.
PRIVILEGE_CHECKS_USER_GRANT_ALL= 1

# If set to '1' PRIVILEGE_CHECKS_USER account has the ability to give to
# other users any of its privileges. It set to '0' this account cannot grant
# its privileges. Default value is '0'.
PRIVILEGE_CHECKS_USER_GRANT_OPTION= 0

# If PRIVILEGE_CHECKS_USER_GRANT_ALL is not '1' specifies additional
# privileges to be granted to  $PRIVILEGE_CHECKS_USER.
PRIVILEGE_CHECKS_USER_ADDITIONAL_GRANTS=

# Specifies the set of privileges to be revoked from $PRIVILEGE_CHECKS_USER
# GROUP_REPLICATION_ADMIN,REPLICATION_APPLIER,REPLICATION_SLAVE_ADMIN,SESSION_VARIABLES_ADMIN are kept
PRIVILEGE_CHECKS_USER_REVOKE_GRANTS= SYSTEM_VARIABLES_ADMIN,BINLOG_ADMIN,ENCRYPTION_KEY_ADMIN,CONNECTION_ADMIN,SET_USER_ID,XA_RECOVER_ADMIN,PERSIST_RO_VARIABLES_ADMIN,BACKUP_ADMIN,CLONE_ADMIN,RESOURCE_GROUP_ADMIN,RESOURCE_GROUP_USER,BINLOG_ENCRYPTION_ADMIN,SERVICE_CONNECTION_ADMIN,APPLICATION_PASSWORD_ADMIN,SYSTEM_USER,TABLE_ENCRYPTION_ADMIN,AUDIT_ADMIN,ROLE_ADMIN,INNODB_REDO_LOG_ARCHIVE