mirror of
https://github.com/postgres/postgres.git
synced 2025-06-23 14:01:44 +03:00
Perform RLS WITH CHECK before constraints, etc
The RLS capability is built on top of the WITH CHECK OPTION system which was added for auto-updatable views, however, unlike WCOs on views (which are mandated by the SQL spec to not fire until after all other constraints and checks are done), it makes much more sense for RLS checks to happen earlier than constraint and uniqueness checks. This patch reworks the structure which holds the WCOs a bit to be explicitly either VIEW or RLS checks and the RLS-related checks are done prior to the constraint and uniqueness checks. This also allows better error reporting as we are now reporting when a violation is due to a WITH CHECK OPTION and when it's due to an RLS policy violation, which was independently noted by Craig Ringer as being confusing. The documentation is also updated to include a paragraph about when RLS WITH CHECK handling is performed, as there have been a number of questions regarding that and the documentation was previously silent on the matter. Author: Dean Rasheed, with some kabitzing and comment changes by me.
This commit is contained in:
@ -60,6 +60,14 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
|
||||
expressions, as they are assumed to be trustworthy.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
For INSERT and UPDATE queries, WITH CHECK expressions are enforced after
|
||||
BEFORE triggers are fired, and before any data modifications are made.
|
||||
Thus a BEFORE ROW trigger may modify the data to be inserted, affecting
|
||||
the result of the security policy check. WITH CHECK expressions are
|
||||
enforced before any other constraints.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
Policy names are per-table, therefore one policy name can be used for many
|
||||
different tables and have a definition for each table which is appropriate to
|
||||
|
Reference in New Issue
Block a user