mirror of
https://github.com/postgres/postgres.git
synced 2025-05-29 16:21:20 +03:00
RLS comment fixes.
The comments in get_policies_for_relation() say that CREATE POLICY does not support defining restrictive policies. This is no longer true, starting from PG10.
This commit is contained in:
parent
a5339ac095
commit
a1187c4efe
@ -408,11 +408,7 @@ get_policies_for_relation(Relation relation, CmdType cmd, Oid user_id,
|
|||||||
*permissive_policies = NIL;
|
*permissive_policies = NIL;
|
||||||
*restrictive_policies = NIL;
|
*restrictive_policies = NIL;
|
||||||
|
|
||||||
/*
|
/* First find all internal policies for the relation. */
|
||||||
* First find all internal policies for the relation. CREATE POLICY does
|
|
||||||
* not currently support defining restrictive policies, so for now all
|
|
||||||
* internal policies are permissive.
|
|
||||||
*/
|
|
||||||
foreach(item, relation->rd_rsdesc->policies)
|
foreach(item, relation->rd_rsdesc->policies)
|
||||||
{
|
{
|
||||||
bool cmd_matches = false;
|
bool cmd_matches = false;
|
||||||
@ -450,7 +446,7 @@ get_policies_for_relation(Relation relation, CmdType cmd, Oid user_id,
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Add this policy to the list of permissive policies if it applies to
|
* Add this policy to the relevant list of policies if it applies to
|
||||||
* the specified role.
|
* the specified role.
|
||||||
*/
|
*/
|
||||||
if (cmd_matches && check_role_for_policy(policy->roles, user_id))
|
if (cmd_matches && check_role_for_policy(policy->roles, user_id))
|
||||||
|
Loading…
x
Reference in New Issue
Block a user