ALTER TABLE .. FORCE ROW LEVEL SECURITY
authorStephen Frost <sfrost@snowman.net>
Mon, 5 Oct 2015 01:05:08 +0000 (21:05 -0400)
committerStephen Frost <sfrost@snowman.net>
Mon, 5 Oct 2015 01:05:08 +0000 (21:05 -0400)
commit088c83363a11200f2225f279d4a5c6cc6f9db3d2
treef5568ba1294ab5695d5f67b9f79f96130e60c44a
parent16a70e3059885739f59ccdaa20f2e4a3b2a0a700
ALTER TABLE .. FORCE ROW LEVEL SECURITY

To allow users to force RLS to always be applied, even for table owners,
add ALTER TABLE .. FORCE ROW LEVEL SECURITY.

row_security=off overrides FORCE ROW LEVEL SECURITY, to ensure pg_dump
output is complete (by default).

Also add SECURITY_NOFORCE_RLS context to avoid data corruption when
ALTER TABLE .. FORCE ROW SECURITY is being used. The
SECURITY_NOFORCE_RLS security context is used only during referential
integrity checks and is only considered in check_enable_rls() after we
have already checked that the current user is the owner of the relation
(which should always be the case during referential integrity checks).

Back-patch to 9.5 where RLS was added.
19 files changed:
doc/src/sgml/catalogs.sgml
doc/src/sgml/ref/alter_table.sgml
src/backend/catalog/heap.c
src/backend/commands/tablecmds.c
src/backend/parser/gram.y
src/backend/utils/adt/ri_triggers.c
src/backend/utils/init/miscinit.c
src/backend/utils/misc/rls.c
src/bin/pg_dump/pg_dump.c
src/bin/pg_dump/pg_dump.h
src/bin/psql/describe.c
src/include/catalog/catversion.h
src/include/catalog/pg_class.h
src/include/miscadmin.h
src/include/nodes/parsenodes.h
src/test/modules/test_ddl_deparse/test_ddl_deparse.c
src/test/regress/expected/rowsecurity.out
src/test/regress/output/misc.source
src/test/regress/sql/rowsecurity.sql