mirror of
https://github.com/postgres/postgres.git
synced 2025-09-02 04:21:28 +03:00
Add support for restrictive RLS policies
We have had support for restrictive RLS policies since 9.5, but they were only available through extensions which use the appropriate hooks. This adds support into the grammer, catalog, psql and pg_dump for restrictive RLS policies, thus reducing the cases where an extension is necessary. In passing, also move away from using "AND"d and "OR"d in comments. As pointed out by Alvaro, it's not really appropriate to attempt to make verbs out of "AND" and "OR", so reword those comments which attempted to. Reviewed By: Jeevan Chalke, Dean Rasheed Discussion: https://postgr.es/m/20160901063404.GY4028@tamriel.snowman.net
This commit is contained in:
@@ -2162,9 +2162,15 @@ psql_completion(const char *text, int start, int end)
|
||||
/* Complete "CREATE POLICY <name> ON <table>" */
|
||||
else if (Matches4("CREATE", "POLICY", MatchAny, "ON"))
|
||||
COMPLETE_WITH_SCHEMA_QUERY(Query_for_list_of_tables, NULL);
|
||||
/* Complete "CREATE POLICY <name> ON <table> FOR|TO|USING|WITH CHECK" */
|
||||
/* Complete "CREATE POLICY <name> ON <table> AS|FOR|TO|USING|WITH CHECK" */
|
||||
else if (Matches5("CREATE", "POLICY", MatchAny, "ON", MatchAny))
|
||||
COMPLETE_WITH_LIST4("FOR", "TO", "USING (", "WITH CHECK (");
|
||||
COMPLETE_WITH_LIST5("AS", "FOR", "TO", "USING (", "WITH CHECK (");
|
||||
/* CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE */
|
||||
else if (Matches6("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS"))
|
||||
COMPLETE_WITH_LIST2("PERMISSIVE", "RESTRICTIVE");
|
||||
/* CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE FOR|TO|USING|WITH CHECK */
|
||||
else if (Matches7("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny))
|
||||
COMPLETE_WITH_LIST4("FOR", "TO", "USING", "WITH CHECK");
|
||||
/* CREATE POLICY <name> ON <table> FOR ALL|SELECT|INSERT|UPDATE|DELETE */
|
||||
else if (Matches6("CREATE", "POLICY", MatchAny, "ON", MatchAny, "FOR"))
|
||||
COMPLETE_WITH_LIST5("ALL", "SELECT", "INSERT", "UPDATE", "DELETE");
|
||||
@@ -2183,6 +2189,25 @@ psql_completion(const char *text, int start, int end)
|
||||
/* Complete "CREATE POLICY <name> ON <table> USING (" */
|
||||
else if (Matches6("CREATE", "POLICY", MatchAny, "ON", MatchAny, "USING"))
|
||||
COMPLETE_WITH_CONST("(");
|
||||
/* CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE FOR ALL|SELECT|INSERT|UPDATE|DELETE */
|
||||
else if (Matches8("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny, "FOR"))
|
||||
COMPLETE_WITH_LIST5("ALL", "SELECT", "INSERT", "UPDATE", "DELETE");
|
||||
/* Complete "CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE FOR INSERT TO|WITH CHECK" */
|
||||
else if (Matches9("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny, "FOR", "INSERT"))
|
||||
COMPLETE_WITH_LIST2("TO", "WITH CHECK (");
|
||||
/* Complete "CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE FOR SELECT|DELETE TO|USING" */
|
||||
else if (Matches9("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny, "FOR", "SELECT|DELETE"))
|
||||
COMPLETE_WITH_LIST2("TO", "USING (");
|
||||
/* CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE FOR ALL|UPDATE TO|USING|WITH CHECK */
|
||||
else if (Matches9("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny, "FOR", "ALL|UPDATE"))
|
||||
COMPLETE_WITH_LIST3("TO", "USING (", "WITH CHECK (");
|
||||
/* Complete "CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE TO <role>" */
|
||||
else if (Matches8("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny, "TO"))
|
||||
COMPLETE_WITH_QUERY(Query_for_list_of_grant_roles);
|
||||
/* Complete "CREATE POLICY <name> ON <table> AS PERMISSIVE|RESTRICTIVE USING (" */
|
||||
else if (Matches8("CREATE", "POLICY", MatchAny, "ON", MatchAny, "AS", MatchAny, "USING"))
|
||||
COMPLETE_WITH_CONST("(");
|
||||
|
||||
|
||||
/* CREATE RULE */
|
||||
/* Complete "CREATE RULE <sth>" with "AS ON" */
|
||||
|
Reference in New Issue
Block a user