mirror of
https://github.com/postgres/postgres.git
synced 2025-09-03 15:22:11 +03:00
Add a security_barrier option for views.
When a view is marked as a security barrier, it will not be pulled up into the containing query, and no quals will be pushed down into it, so that no function or operator chosen by the user can be applied to rows not exposed by the view. Views not configured with this option cannot provide robust row-level security, but will perform far better. Patch by KaiGai Kohei; original problem report by Heikki Linnakangas (in October 2009!). Review (in earlier versions) by Noah Misch and others. Design advice by Tom Lane and myself. Further review and cleanup by me.
This commit is contained in:
@@ -4372,6 +4372,19 @@ examine_simple_variable(PlannerInfo *root, Var *var,
|
||||
subquery->distinctClause)
|
||||
return;
|
||||
|
||||
/*
|
||||
* If the sub-query originated from a view with the security_barrier
|
||||
* attribute, we treat it as a black-box from outside of the view.
|
||||
* This is probably a harsher restriction than necessary; it's
|
||||
* certainly OK for the selectivity estimator (which is a C function,
|
||||
* and therefore omnipotent anyway) to look at the statistics. But
|
||||
* many selectivity estimators will happily *invoke the operator
|
||||
* function* to try to work out a good estimate - and that's not OK.
|
||||
* So for now, we do this.
|
||||
*/
|
||||
if (rte->security_barrier)
|
||||
return;
|
||||
|
||||
/*
|
||||
* OK, fetch RelOptInfo for subquery. Note that we don't change the
|
||||
* rel returned in vardata, since caller expects it to be a rel of the
|
||||
|
1
src/backend/utils/cache/relcache.c
vendored
1
src/backend/utils/cache/relcache.c
vendored
@@ -374,6 +374,7 @@ RelationParseRelOptions(Relation relation, HeapTuple tuple)
|
||||
case RELKIND_RELATION:
|
||||
case RELKIND_TOASTVALUE:
|
||||
case RELKIND_INDEX:
|
||||
case RELKIND_VIEW:
|
||||
break;
|
||||
default:
|
||||
return;
|
||||
|
Reference in New Issue
Block a user