Commit 45639a05 authored by Tom Lane's avatar Tom Lane

Avoid invalidating all foreign-join cached plans when user mappings change.

We must not push down a foreign join when the foreign tables involved
should be accessed under different user mappings.  Previously we tried
to enforce that rule literally during planning, but that meant that the
resulting plans were dependent on the current contents of the
pg_user_mapping catalog, and we had to blow away all cached plans
containing any remote join when anything at all changed in pg_user_mapping.
This could have been improved somewhat, but the fact that a syscache inval
callback has very limited info about what changed made it hard to do better
within that design.  Instead, let's change the planner to not consider user
mappings per se, but to allow a foreign join if both RTEs have the same
checkAsUser value.  If they do, then they necessarily will use the same
user mapping at runtime, and we don't need to know specifically which one
that is.  Post-plan-time changes in pg_user_mapping no longer require any
plan invalidation.

This rule does give up some optimization ability, to wit where two foreign
table references come from views with different owners or one's from a view
and one's directly in the query, but nonetheless the same user mapping
would have applied.  We'll sacrifice the first case, but to not regress
more than we have to in the second case, allow a foreign join involving
both zero and nonzero checkAsUser values if the nonzero one is the same as
the prevailing effective userID.  In that case, mark the plan as only
runnable by that userID.

The plancache code already had a notion of plans being userID-specific,
in order to support RLS.  It was a little confused though, in particular
lacking clarity of thought as to whether it was the rewritten query or just
the finished plan that's dependent on the userID.  Rearrange that code so
that it's clearer what depends on which, and so that the same logic applies
to both RLS-injected role dependency and foreign-join-injected role
dependency.

Note that this patch doesn't remove the other issue mentioned in the
original complaint, which is that while we'll reliably stop using a foreign
join if it's disallowed in a new context, we might fail to start using a
foreign join if it's now allowed, but we previously created a generic
cached plan that didn't use one.  It was agreed that the chance of winning
that way was not high enough to justify the much larger number of plan
invalidations that would have to occur if we tried to cause it to happen.

In passing, clean up randomly-varying spelling of EXPLAIN commands in
postgres_fdw.sql, and fix a COSTS ON example that had been allowed to
leak into the committed tests.

This reverts most of commits fbe5a3fb and 5d4171d1, which were the
previous attempt at ensuring we wouldn't push down foreign joins that
span permissions contexts.

Etsuro Fujita and Tom Lane

Discussion: <d49c1e5b-f059-20f4-c132-e9752ee0113e@lab.ntt.co.jp>
parent 533e9c6b
...@@ -67,8 +67,6 @@ enum FdwScanPrivateIndex ...@@ -67,8 +67,6 @@ enum FdwScanPrivateIndex
FdwScanPrivateRetrievedAttrs, FdwScanPrivateRetrievedAttrs,
/* Integer representing the desired fetch_size */ /* Integer representing the desired fetch_size */
FdwScanPrivateFetchSize, FdwScanPrivateFetchSize,
/* Oid of user mapping to be used while connecting to the foreign server */
FdwScanPrivateUserMappingOid,
/* /*
* String describing join i.e. names of relations being joined and types * String describing join i.e. names of relations being joined and types
...@@ -1226,11 +1224,10 @@ postgresGetForeignPlan(PlannerInfo *root, ...@@ -1226,11 +1224,10 @@ postgresGetForeignPlan(PlannerInfo *root,
* Build the fdw_private list that will be available to the executor. * Build the fdw_private list that will be available to the executor.
* Items in the list must match order in enum FdwScanPrivateIndex. * Items in the list must match order in enum FdwScanPrivateIndex.
*/ */
fdw_private = list_make5(makeString(sql.data), fdw_private = list_make4(makeString(sql.data),
remote_conds, remote_conds,
retrieved_attrs, retrieved_attrs,
makeInteger(fpinfo->fetch_size), makeInteger(fpinfo->fetch_size));
makeInteger(foreignrel->umid));
if (foreignrel->reloptkind == RELOPT_JOINREL) if (foreignrel->reloptkind == RELOPT_JOINREL)
fdw_private = lappend(fdw_private, fdw_private = lappend(fdw_private,
makeString(fpinfo->relation_name->data)); makeString(fpinfo->relation_name->data));
...@@ -1262,7 +1259,11 @@ postgresBeginForeignScan(ForeignScanState *node, int eflags) ...@@ -1262,7 +1259,11 @@ postgresBeginForeignScan(ForeignScanState *node, int eflags)
ForeignScan *fsplan = (ForeignScan *) node->ss.ps.plan; ForeignScan *fsplan = (ForeignScan *) node->ss.ps.plan;
EState *estate = node->ss.ps.state; EState *estate = node->ss.ps.state;
PgFdwScanState *fsstate; PgFdwScanState *fsstate;
RangeTblEntry *rte;
Oid userid;
ForeignTable *table;
UserMapping *user; UserMapping *user;
int rtindex;
int numParams; int numParams;
/* /*
...@@ -1278,36 +1279,20 @@ postgresBeginForeignScan(ForeignScanState *node, int eflags) ...@@ -1278,36 +1279,20 @@ postgresBeginForeignScan(ForeignScanState *node, int eflags)
node->fdw_state = (void *) fsstate; node->fdw_state = (void *) fsstate;
/* /*
* Obtain the foreign server where to connect and user mapping to use for * Identify which user to do the remote access as. This should match what
* connection. For base relations we obtain this information from * ExecCheckRTEPerms() does. In case of a join, use the lowest-numbered
* catalogs. For join relations, this information is frozen at the time of * member RTE as a representative; we would get the same result from any.
* planning to ensure that the join is safe to pushdown. In case the
* information goes stale between planning and execution, plan will be
* invalidated and replanned.
*/ */
if (fsplan->scan.scanrelid > 0) if (fsplan->scan.scanrelid > 0)
{ rtindex = fsplan->scan.scanrelid;
ForeignTable *table;
/*
* Identify which user to do the remote access as. This should match
* what ExecCheckRTEPerms() does.
*/
RangeTblEntry *rte = rt_fetch(fsplan->scan.scanrelid, estate->es_range_table);
Oid userid = rte->checkAsUser ? rte->checkAsUser : GetUserId();
fsstate->rel = node->ss.ss_currentRelation;
table = GetForeignTable(RelationGetRelid(fsstate->rel));
user = GetUserMapping(userid, table->serverid);
}
else else
{ rtindex = bms_next_member(fsplan->fs_relids, -1);
Oid umid = intVal(list_nth(fsplan->fdw_private, FdwScanPrivateUserMappingOid)); rte = rt_fetch(rtindex, estate->es_range_table);
userid = rte->checkAsUser ? rte->checkAsUser : GetUserId();
user = GetUserMappingById(umid); /* Get info about foreign table. */
Assert(fsplan->fs_server == user->serverid); table = GetForeignTable(rte->relid);
} user = GetUserMapping(userid, table->serverid);
/* /*
* Get connection to the foreign server. Connection manager will * Get connection to the foreign server. Connection manager will
...@@ -1344,9 +1329,15 @@ postgresBeginForeignScan(ForeignScanState *node, int eflags) ...@@ -1344,9 +1329,15 @@ postgresBeginForeignScan(ForeignScanState *node, int eflags)
* into local representation and error reporting during that process. * into local representation and error reporting during that process.
*/ */
if (fsplan->scan.scanrelid > 0) if (fsplan->scan.scanrelid > 0)
{
fsstate->rel = node->ss.ss_currentRelation;
fsstate->tupdesc = RelationGetDescr(fsstate->rel); fsstate->tupdesc = RelationGetDescr(fsstate->rel);
}
else else
{
fsstate->rel = NULL;
fsstate->tupdesc = node->ss.ss_ScanTupleSlot->tts_tupleDescriptor; fsstate->tupdesc = node->ss.ss_ScanTupleSlot->tts_tupleDescriptor;
}
fsstate->attinmeta = TupleDescGetAttInMetadata(fsstate->tupdesc); fsstate->attinmeta = TupleDescGetAttInMetadata(fsstate->tupdesc);
...@@ -3965,16 +3956,6 @@ foreign_join_ok(PlannerInfo *root, RelOptInfo *joinrel, JoinType jointype, ...@@ -3965,16 +3956,6 @@ foreign_join_ok(PlannerInfo *root, RelOptInfo *joinrel, JoinType jointype,
List *joinclauses; List *joinclauses;
List *otherclauses; List *otherclauses;
/*
* Core code may call GetForeignJoinPaths hook even when the join relation
* doesn't have a valid user mapping associated with it. See
* build_join_rel() for details. We can't push down such join, since there
* doesn't exist a user mapping which can be used to connect to the
* foreign server.
*/
if (!OidIsValid(joinrel->umid))
return false;
/* /*
* We support pushing down INNER, LEFT, RIGHT and FULL OUTER joins. * We support pushing down INNER, LEFT, RIGHT and FULL OUTER joins.
* Constructing queries representing SEMI and ANTI joins is hard, hence * Constructing queries representing SEMI and ANTI joins is hard, hence
...@@ -4151,6 +4132,20 @@ foreign_join_ok(PlannerInfo *root, RelOptInfo *joinrel, JoinType jointype, ...@@ -4151,6 +4132,20 @@ foreign_join_ok(PlannerInfo *root, RelOptInfo *joinrel, JoinType jointype,
fpinfo->use_remote_estimate = fpinfo_o->use_remote_estimate || fpinfo->use_remote_estimate = fpinfo_o->use_remote_estimate ||
fpinfo_i->use_remote_estimate; fpinfo_i->use_remote_estimate;
/* Get user mapping */
if (fpinfo->use_remote_estimate)
{
if (fpinfo_o->use_remote_estimate)
fpinfo->user = fpinfo_o->user;
else
fpinfo->user = fpinfo_i->user;
}
else
fpinfo->user = NULL;
/* Get foreign server */
fpinfo->server = fpinfo_o->server;
/* /*
* Since both the joining relations come from the same server, the server * Since both the joining relations come from the same server, the server
* level options should have same value for both the relations. Pick from * level options should have same value for both the relations. Pick from
...@@ -4312,26 +4307,14 @@ postgresGetForeignJoinPaths(PlannerInfo *root, ...@@ -4312,26 +4307,14 @@ postgresGetForeignJoinPaths(PlannerInfo *root,
cost_qual_eval(&fpinfo->local_conds_cost, fpinfo->local_conds, root); cost_qual_eval(&fpinfo->local_conds_cost, fpinfo->local_conds, root);
/* /*
* If we are going to estimate the costs using EXPLAIN, we will need * If we are going to estimate costs locally, estimate the join clause
* connection information. Fill it here. * selectivity here while we have special join info.
*/ */
if (fpinfo->use_remote_estimate) if (!fpinfo->use_remote_estimate)
fpinfo->user = GetUserMappingById(joinrel->umid);
else
{
fpinfo->user = NULL;
/*
* If we are going to estimate costs locally, estimate the join clause
* selectivity here while we have special join info.
*/
fpinfo->joinclause_sel = clauselist_selectivity(root, fpinfo->joinclauses, fpinfo->joinclause_sel = clauselist_selectivity(root, fpinfo->joinclauses,
0, fpinfo->jointype, 0, fpinfo->jointype,
extra->sjinfo); extra->sjinfo);
}
fpinfo->server = GetForeignServer(joinrel->serverid);
/* Estimate costs for bare join relation */ /* Estimate costs for bare join relation */
estimate_path_cost_size(root, joinrel, NIL, NIL, &rows, estimate_path_cost_size(root, joinrel, NIL, NIL, &rows,
&width, &startup_cost, &total_cost); &width, &startup_cost, &total_cost);
......
This diff is collapsed.
...@@ -145,10 +145,12 @@ ExecSerializePlan(Plan *plan, EState *estate) ...@@ -145,10 +145,12 @@ ExecSerializePlan(Plan *plan, EState *estate)
pstmt = makeNode(PlannedStmt); pstmt = makeNode(PlannedStmt);
pstmt->commandType = CMD_SELECT; pstmt->commandType = CMD_SELECT;
pstmt->queryId = 0; pstmt->queryId = 0;
pstmt->hasReturning = 0; pstmt->hasReturning = false;
pstmt->hasModifyingCTE = 0; pstmt->hasModifyingCTE = false;
pstmt->canSetTag = 1; pstmt->canSetTag = true;
pstmt->transientPlan = 0; pstmt->transientPlan = false;
pstmt->dependsOnRole = false;
pstmt->parallelModeNeeded = false;
pstmt->planTree = plan; pstmt->planTree = plan;
pstmt->rtable = estate->es_range_table; pstmt->rtable = estate->es_range_table;
pstmt->resultRelations = NIL; pstmt->resultRelations = NIL;
...@@ -156,11 +158,9 @@ ExecSerializePlan(Plan *plan, EState *estate) ...@@ -156,11 +158,9 @@ ExecSerializePlan(Plan *plan, EState *estate)
pstmt->subplans = NIL; pstmt->subplans = NIL;
pstmt->rewindPlanIDs = NULL; pstmt->rewindPlanIDs = NULL;
pstmt->rowMarks = NIL; pstmt->rowMarks = NIL;
pstmt->nParamExec = estate->es_plannedstmt->nParamExec;
pstmt->relationOids = NIL; pstmt->relationOids = NIL;
pstmt->invalItems = NIL; /* workers can't replan anyway... */ pstmt->invalItems = NIL; /* workers can't replan anyway... */
pstmt->hasRowSecurity = false; pstmt->nParamExec = estate->es_plannedstmt->nParamExec;
pstmt->hasForeignJoin = false;
/* Return serialized copy of our dummy PlannedStmt. */ /* Return serialized copy of our dummy PlannedStmt. */
return nodeToString(pstmt); return nodeToString(pstmt);
......
...@@ -31,7 +31,8 @@ ...@@ -31,7 +31,8 @@
extern Datum pg_options_to_table(PG_FUNCTION_ARGS); extern Datum pg_options_to_table(PG_FUNCTION_ARGS);
extern Datum postgresql_fdw_validator(PG_FUNCTION_ARGS); extern Datum postgresql_fdw_validator(PG_FUNCTION_ARGS);
static HeapTuple find_user_mapping(Oid userid, Oid serverid, bool missing_ok); static HeapTuple find_user_mapping(Oid userid, Oid serverid);
/* /*
* GetForeignDataWrapper - look up the foreign-data wrapper by OID. * GetForeignDataWrapper - look up the foreign-data wrapper by OID.
...@@ -223,7 +224,7 @@ GetUserMapping(Oid userid, Oid serverid) ...@@ -223,7 +224,7 @@ GetUserMapping(Oid userid, Oid serverid)
bool isnull; bool isnull;
UserMapping *um; UserMapping *um;
tp = find_user_mapping(userid, serverid, false); tp = find_user_mapping(userid, serverid);
um = (UserMapping *) palloc(sizeof(UserMapping)); um = (UserMapping *) palloc(sizeof(UserMapping));
um->umid = HeapTupleGetOid(tp); um->umid = HeapTupleGetOid(tp);
...@@ -250,23 +251,14 @@ GetUserMapping(Oid userid, Oid serverid) ...@@ -250,23 +251,14 @@ GetUserMapping(Oid userid, Oid serverid)
* *
* If no mapping is found for the supplied user, we also look for * If no mapping is found for the supplied user, we also look for
* PUBLIC mappings (userid == InvalidOid). * PUBLIC mappings (userid == InvalidOid).
*
* If missing_ok is true, the function returns InvalidOid when it does not find
* required user mapping. Otherwise, find_user_mapping() throws error if it
* does not find required user mapping.
*/ */
Oid Oid
GetUserMappingId(Oid userid, Oid serverid, bool missing_ok) GetUserMappingId(Oid userid, Oid serverid)
{ {
HeapTuple tp; HeapTuple tp;
Oid umid; Oid umid;
tp = find_user_mapping(userid, serverid, missing_ok); tp = find_user_mapping(userid, serverid);
Assert(missing_ok || tp);
if (!tp && missing_ok)
return InvalidOid;
/* Extract the Oid */ /* Extract the Oid */
umid = HeapTupleGetOid(tp); umid = HeapTupleGetOid(tp);
...@@ -276,19 +268,14 @@ GetUserMappingId(Oid userid, Oid serverid, bool missing_ok) ...@@ -276,19 +268,14 @@ GetUserMappingId(Oid userid, Oid serverid, bool missing_ok)
return umid; return umid;
} }
/* /*
* find_user_mapping - Guts of GetUserMapping family. * find_user_mapping - Guts of GetUserMapping family.
* *
* If no mapping is found for the supplied user, we also look for * If no mapping is found for the supplied user, we also look for
* PUBLIC mappings (userid == InvalidOid). * PUBLIC mappings (userid == InvalidOid).
*
* If missing_ok is true, the function returns NULL, if it does not find
* the required user mapping. Otherwise, it throws error if it does not
* find the required user mapping.
*/ */
static HeapTuple static HeapTuple
find_user_mapping(Oid userid, Oid serverid, bool missing_ok) find_user_mapping(Oid userid, Oid serverid)
{ {
HeapTuple tp; HeapTuple tp;
...@@ -305,15 +292,10 @@ find_user_mapping(Oid userid, Oid serverid, bool missing_ok) ...@@ -305,15 +292,10 @@ find_user_mapping(Oid userid, Oid serverid, bool missing_ok)
ObjectIdGetDatum(serverid)); ObjectIdGetDatum(serverid));
if (!HeapTupleIsValid(tp)) if (!HeapTupleIsValid(tp))
{ ereport(ERROR,
if (missing_ok) (errcode(ERRCODE_UNDEFINED_OBJECT),
return NULL; errmsg("user mapping not found for \"%s\"",
else MappingUserName(userid))));
ereport(ERROR,
(errcode(ERRCODE_UNDEFINED_OBJECT),
errmsg("user mapping not found for \"%s\"",
MappingUserName(userid))));
}
return tp; return tp;
} }
......
...@@ -85,6 +85,8 @@ _copyPlannedStmt(const PlannedStmt *from) ...@@ -85,6 +85,8 @@ _copyPlannedStmt(const PlannedStmt *from)
COPY_SCALAR_FIELD(hasModifyingCTE); COPY_SCALAR_FIELD(hasModifyingCTE);
COPY_SCALAR_FIELD(canSetTag); COPY_SCALAR_FIELD(canSetTag);
COPY_SCALAR_FIELD(transientPlan); COPY_SCALAR_FIELD(transientPlan);
COPY_SCALAR_FIELD(dependsOnRole);
COPY_SCALAR_FIELD(parallelModeNeeded);
COPY_NODE_FIELD(planTree); COPY_NODE_FIELD(planTree);
COPY_NODE_FIELD(rtable); COPY_NODE_FIELD(rtable);
COPY_NODE_FIELD(resultRelations); COPY_NODE_FIELD(resultRelations);
...@@ -95,9 +97,6 @@ _copyPlannedStmt(const PlannedStmt *from) ...@@ -95,9 +97,6 @@ _copyPlannedStmt(const PlannedStmt *from)
COPY_NODE_FIELD(relationOids); COPY_NODE_FIELD(relationOids);
COPY_NODE_FIELD(invalItems); COPY_NODE_FIELD(invalItems);
COPY_SCALAR_FIELD(nParamExec); COPY_SCALAR_FIELD(nParamExec);
COPY_SCALAR_FIELD(hasRowSecurity);
COPY_SCALAR_FIELD(parallelModeNeeded);
COPY_SCALAR_FIELD(hasForeignJoin);
return newnode; return newnode;
} }
......
...@@ -261,6 +261,8 @@ _outPlannedStmt(StringInfo str, const PlannedStmt *node) ...@@ -261,6 +261,8 @@ _outPlannedStmt(StringInfo str, const PlannedStmt *node)
WRITE_BOOL_FIELD(hasModifyingCTE); WRITE_BOOL_FIELD(hasModifyingCTE);
WRITE_BOOL_FIELD(canSetTag); WRITE_BOOL_FIELD(canSetTag);
WRITE_BOOL_FIELD(transientPlan); WRITE_BOOL_FIELD(transientPlan);
WRITE_BOOL_FIELD(dependsOnRole);
WRITE_BOOL_FIELD(parallelModeNeeded);
WRITE_NODE_FIELD(planTree); WRITE_NODE_FIELD(planTree);
WRITE_NODE_FIELD(rtable); WRITE_NODE_FIELD(rtable);
WRITE_NODE_FIELD(resultRelations); WRITE_NODE_FIELD(resultRelations);
...@@ -271,9 +273,6 @@ _outPlannedStmt(StringInfo str, const PlannedStmt *node) ...@@ -271,9 +273,6 @@ _outPlannedStmt(StringInfo str, const PlannedStmt *node)
WRITE_NODE_FIELD(relationOids); WRITE_NODE_FIELD(relationOids);
WRITE_NODE_FIELD(invalItems); WRITE_NODE_FIELD(invalItems);
WRITE_INT_FIELD(nParamExec); WRITE_INT_FIELD(nParamExec);
WRITE_BOOL_FIELD(hasRowSecurity);
WRITE_BOOL_FIELD(parallelModeNeeded);
WRITE_BOOL_FIELD(hasForeignJoin);
} }
/* /*
...@@ -2014,11 +2013,11 @@ _outPlannerGlobal(StringInfo str, const PlannerGlobal *node) ...@@ -2014,11 +2013,11 @@ _outPlannerGlobal(StringInfo str, const PlannerGlobal *node)
WRITE_INT_FIELD(nParamExec); WRITE_INT_FIELD(nParamExec);
WRITE_UINT_FIELD(lastPHId); WRITE_UINT_FIELD(lastPHId);
WRITE_UINT_FIELD(lastRowMarkId); WRITE_UINT_FIELD(lastRowMarkId);
WRITE_INT_FIELD(lastPlanNodeId);
WRITE_BOOL_FIELD(transientPlan); WRITE_BOOL_FIELD(transientPlan);
WRITE_BOOL_FIELD(hasRowSecurity); WRITE_BOOL_FIELD(dependsOnRole);
WRITE_BOOL_FIELD(parallelModeOK); WRITE_BOOL_FIELD(parallelModeOK);
WRITE_BOOL_FIELD(parallelModeNeeded); WRITE_BOOL_FIELD(parallelModeNeeded);
WRITE_BOOL_FIELD(hasForeignJoin);
} }
static void static void
...@@ -2106,7 +2105,10 @@ _outRelOptInfo(StringInfo str, const RelOptInfo *node) ...@@ -2106,7 +2105,10 @@ _outRelOptInfo(StringInfo str, const RelOptInfo *node)
WRITE_FLOAT_FIELD(allvisfrac, "%.6f"); WRITE_FLOAT_FIELD(allvisfrac, "%.6f");
WRITE_NODE_FIELD(subroot); WRITE_NODE_FIELD(subroot);
WRITE_NODE_FIELD(subplan_params); WRITE_NODE_FIELD(subplan_params);
WRITE_INT_FIELD(rel_parallel_workers);
WRITE_OID_FIELD(serverid); WRITE_OID_FIELD(serverid);
WRITE_OID_FIELD(userid);
WRITE_BOOL_FIELD(useridiscurrent);
/* we don't try to print fdwroutine or fdw_private */ /* we don't try to print fdwroutine or fdw_private */
WRITE_NODE_FIELD(baserestrictinfo); WRITE_NODE_FIELD(baserestrictinfo);
WRITE_NODE_FIELD(joininfo); WRITE_NODE_FIELD(joininfo);
......
...@@ -1390,6 +1390,8 @@ _readPlannedStmt(void) ...@@ -1390,6 +1390,8 @@ _readPlannedStmt(void)
READ_BOOL_FIELD(hasModifyingCTE); READ_BOOL_FIELD(hasModifyingCTE);
READ_BOOL_FIELD(canSetTag); READ_BOOL_FIELD(canSetTag);
READ_BOOL_FIELD(transientPlan); READ_BOOL_FIELD(transientPlan);
READ_BOOL_FIELD(dependsOnRole);
READ_BOOL_FIELD(parallelModeNeeded);
READ_NODE_FIELD(planTree); READ_NODE_FIELD(planTree);
READ_NODE_FIELD(rtable); READ_NODE_FIELD(rtable);
READ_NODE_FIELD(resultRelations); READ_NODE_FIELD(resultRelations);
...@@ -1400,9 +1402,6 @@ _readPlannedStmt(void) ...@@ -1400,9 +1402,6 @@ _readPlannedStmt(void)
READ_NODE_FIELD(relationOids); READ_NODE_FIELD(relationOids);
READ_NODE_FIELD(invalItems); READ_NODE_FIELD(invalItems);
READ_INT_FIELD(nParamExec); READ_INT_FIELD(nParamExec);
READ_BOOL_FIELD(hasRowSecurity);
READ_BOOL_FIELD(parallelModeNeeded);
READ_BOOL_FIELD(hasForeignJoin);
READ_DONE(); READ_DONE();
} }
......
...@@ -213,8 +213,8 @@ add_paths_to_joinrel(PlannerInfo *root, ...@@ -213,8 +213,8 @@ add_paths_to_joinrel(PlannerInfo *root,
/* /*
* 5. If inner and outer relations are foreign tables (or joins) belonging * 5. If inner and outer relations are foreign tables (or joins) belonging
* to the same server and using the same user mapping, give the FDW a * to the same server and assigned to the same user to check access
* chance to push down joins. * permissions as, give the FDW a chance to push down joins.
*/ */
if (joinrel->fdwroutine && if (joinrel->fdwroutine &&
joinrel->fdwroutine->GetForeignJoinPaths) joinrel->fdwroutine->GetForeignJoinPaths)
......
...@@ -3247,13 +3247,12 @@ create_foreignscan_plan(PlannerInfo *root, ForeignPath *best_path, ...@@ -3247,13 +3247,12 @@ create_foreignscan_plan(PlannerInfo *root, ForeignPath *best_path,
scan_plan->fs_relids = best_path->path.parent->relids; scan_plan->fs_relids = best_path->path.parent->relids;
/* /*
* If a join between foreign relations was pushed down, remember it. The * If this is a foreign join, and to make it valid to push down we had to
* push-down safety of the join depends upon the server and user mapping * assume that the current user is the same as some user explicitly named
* being same. That can change between planning and execution time, in * in the query, mark the finished plan as depending on the current user.
* which case the plan should be invalidated.
*/ */
if (scan_relid == 0) if (rel->useridiscurrent)
root->glob->hasForeignJoin = true; root->glob->dependsOnRole = true;
/* /*
* Replace any outer-relation variables with nestloop params in the qual, * Replace any outer-relation variables with nestloop params in the qual,
......
...@@ -219,8 +219,7 @@ standard_planner(Query *parse, int cursorOptions, ParamListInfo boundParams) ...@@ -219,8 +219,7 @@ standard_planner(Query *parse, int cursorOptions, ParamListInfo boundParams)
glob->lastRowMarkId = 0; glob->lastRowMarkId = 0;
glob->lastPlanNodeId = 0; glob->lastPlanNodeId = 0;
glob->transientPlan = false; glob->transientPlan = false;
glob->hasRowSecurity = false; glob->dependsOnRole = false;
glob->hasForeignJoin = false;
/* /*
* Assess whether it's feasible to use parallel mode for this query. We * Assess whether it's feasible to use parallel mode for this query. We
...@@ -405,6 +404,8 @@ standard_planner(Query *parse, int cursorOptions, ParamListInfo boundParams) ...@@ -405,6 +404,8 @@ standard_planner(Query *parse, int cursorOptions, ParamListInfo boundParams)
result->hasModifyingCTE = parse->hasModifyingCTE; result->hasModifyingCTE = parse->hasModifyingCTE;
result->canSetTag = parse->canSetTag; result->canSetTag = parse->canSetTag;
result->transientPlan = glob->transientPlan; result->transientPlan = glob->transientPlan;
result->dependsOnRole = glob->dependsOnRole;
result->parallelModeNeeded = glob->parallelModeNeeded;
result->planTree = top_plan; result->planTree = top_plan;
result->rtable = glob->finalrtable; result->rtable = glob->finalrtable;
result->resultRelations = glob->resultRelations; result->resultRelations = glob->resultRelations;
...@@ -415,9 +416,6 @@ standard_planner(Query *parse, int cursorOptions, ParamListInfo boundParams) ...@@ -415,9 +416,6 @@ standard_planner(Query *parse, int cursorOptions, ParamListInfo boundParams)
result->relationOids = glob->relationOids; result->relationOids = glob->relationOids;
result->invalItems = glob->invalItems; result->invalItems = glob->invalItems;
result->nParamExec = glob->nParamExec; result->nParamExec = glob->nParamExec;
result->hasRowSecurity = glob->hasRowSecurity;
result->parallelModeNeeded = glob->parallelModeNeeded;
result->hasForeignJoin = glob->hasForeignJoin;
return result; return result;
} }
...@@ -1628,8 +1626,6 @@ grouping_planner(PlannerInfo *root, bool inheritance_update, ...@@ -1628,8 +1626,6 @@ grouping_planner(PlannerInfo *root, bool inheritance_update,
* This may add new security barrier subquery RTEs to the rangetable. * This may add new security barrier subquery RTEs to the rangetable.
*/ */
expand_security_quals(root, tlist); expand_security_quals(root, tlist);
if (parse->hasRowSecurity)
root->glob->hasRowSecurity = true;
/* /*
* We are now done hacking up the query's targetlist. Most of the * We are now done hacking up the query's targetlist. Most of the
...@@ -1960,7 +1956,8 @@ grouping_planner(PlannerInfo *root, bool inheritance_update, ...@@ -1960,7 +1956,8 @@ grouping_planner(PlannerInfo *root, bool inheritance_update,
* If the current_rel belongs to a single FDW, so does the final_rel. * If the current_rel belongs to a single FDW, so does the final_rel.
*/ */
final_rel->serverid = current_rel->serverid; final_rel->serverid = current_rel->serverid;
final_rel->umid = current_rel->umid; final_rel->userid = current_rel->userid;
final_rel->useridiscurrent = current_rel->useridiscurrent;
final_rel->fdwroutine = current_rel->fdwroutine; final_rel->fdwroutine = current_rel->fdwroutine;
/* /*
...@@ -3337,7 +3334,8 @@ create_grouping_paths(PlannerInfo *root, ...@@ -3337,7 +3334,8 @@ create_grouping_paths(PlannerInfo *root,
* If the input rel belongs to a single FDW, so does the grouped rel. * If the input rel belongs to a single FDW, so does the grouped rel.
*/ */
grouped_rel->serverid = input_rel->serverid; grouped_rel->serverid = input_rel->serverid;
grouped_rel->umid = input_rel->umid; grouped_rel->userid = input_rel->userid;
grouped_rel->useridiscurrent = input_rel->useridiscurrent;
grouped_rel->fdwroutine = input_rel->fdwroutine; grouped_rel->fdwroutine = input_rel->fdwroutine;
/* /*
...@@ -3891,7 +3889,8 @@ create_window_paths(PlannerInfo *root, ...@@ -3891,7 +3889,8 @@ create_window_paths(PlannerInfo *root,
* If the input rel belongs to a single FDW, so does the window rel. * If the input rel belongs to a single FDW, so does the window rel.
*/ */
window_rel->serverid = input_rel->serverid; window_rel->serverid = input_rel->serverid;
window_rel->umid = input_rel->umid; window_rel->userid = input_rel->userid;
window_rel->useridiscurrent = input_rel->useridiscurrent;
window_rel->fdwroutine = input_rel->fdwroutine; window_rel->fdwroutine = input_rel->fdwroutine;
/* /*
...@@ -4071,7 +4070,8 @@ create_distinct_paths(PlannerInfo *root, ...@@ -4071,7 +4070,8 @@ create_distinct_paths(PlannerInfo *root,
* If the input rel belongs to a single FDW, so does the distinct_rel. * If the input rel belongs to a single FDW, so does the distinct_rel.
*/ */
distinct_rel->serverid = input_rel->serverid; distinct_rel->serverid = input_rel->serverid;
distinct_rel->umid = input_rel->umid; distinct_rel->userid = input_rel->userid;
distinct_rel->useridiscurrent = input_rel->useridiscurrent;
distinct_rel->fdwroutine = input_rel->fdwroutine; distinct_rel->fdwroutine = input_rel->fdwroutine;
/* Estimate number of distinct rows there will be */ /* Estimate number of distinct rows there will be */
...@@ -4279,7 +4279,8 @@ create_ordered_paths(PlannerInfo *root, ...@@ -4279,7 +4279,8 @@ create_ordered_paths(PlannerInfo *root,
* If the input rel belongs to a single FDW, so does the ordered_rel. * If the input rel belongs to a single FDW, so does the ordered_rel.
*/ */
ordered_rel->serverid = input_rel->serverid; ordered_rel->serverid = input_rel->serverid;
ordered_rel->umid = input_rel->umid; ordered_rel->userid = input_rel->userid;
ordered_rel->useridiscurrent = input_rel->useridiscurrent;
ordered_rel->fdwroutine = input_rel->fdwroutine; ordered_rel->fdwroutine = input_rel->fdwroutine;
foreach(lc, input_rel->pathlist) foreach(lc, input_rel->pathlist)
......
...@@ -2432,9 +2432,10 @@ record_plan_function_dependency(PlannerInfo *root, Oid funcid) ...@@ -2432,9 +2432,10 @@ record_plan_function_dependency(PlannerInfo *root, Oid funcid)
/* /*
* extract_query_dependencies * extract_query_dependencies
* Given a not-yet-planned query or queries (i.e. a Query node or list * Given a rewritten, but not yet planned, query or queries
* of Query nodes), extract dependencies just as set_plan_references * (i.e. a Query node or list of Query nodes), extract dependencies
* would do. * just as set_plan_references would do. Also detect whether any
* rewrite steps were affected by RLS.
* *
* This is needed by plancache.c to handle invalidation of cached unplanned * This is needed by plancache.c to handle invalidation of cached unplanned
* queries. * queries.
...@@ -2453,7 +2454,8 @@ extract_query_dependencies(Node *query, ...@@ -2453,7 +2454,8 @@ extract_query_dependencies(Node *query,
glob.type = T_PlannerGlobal; glob.type = T_PlannerGlobal;
glob.relationOids = NIL; glob.relationOids = NIL;
glob.invalItems = NIL; glob.invalItems = NIL;
glob.hasRowSecurity = false; /* Hack: we use glob.dependsOnRole to collect hasRowSecurity flags */
glob.dependsOnRole = false;
MemSet(&root, 0, sizeof(root)); MemSet(&root, 0, sizeof(root));
root.type = T_PlannerInfo; root.type = T_PlannerInfo;
...@@ -2463,7 +2465,7 @@ extract_query_dependencies(Node *query, ...@@ -2463,7 +2465,7 @@ extract_query_dependencies(Node *query,
*relationOids = glob.relationOids; *relationOids = glob.relationOids;
*invalItems = glob.invalItems; *invalItems = glob.invalItems;
*hasRowSecurity = glob.hasRowSecurity; *hasRowSecurity = glob.dependsOnRole;
} }
static bool static bool
...@@ -2479,10 +2481,6 @@ extract_query_dependencies_walker(Node *node, PlannerInfo *context) ...@@ -2479,10 +2481,6 @@ extract_query_dependencies_walker(Node *node, PlannerInfo *context)
Query *query = (Query *) node; Query *query = (Query *) node;
ListCell *lc; ListCell *lc;
/* Collect row security information */
if (query->hasRowSecurity)
context->glob->hasRowSecurity = true;
if (query->commandType == CMD_UTILITY) if (query->commandType == CMD_UTILITY)
{ {
/* /*
...@@ -2494,6 +2492,10 @@ extract_query_dependencies_walker(Node *node, PlannerInfo *context) ...@@ -2494,6 +2492,10 @@ extract_query_dependencies_walker(Node *node, PlannerInfo *context)
return false; return false;
} }
/* Remember if any Query has RLS quals applied by rewriter */
if (query->hasRowSecurity)
context->glob->dependsOnRole = true;
/* Collect relation OIDs in this Query's rtable */ /* Collect relation OIDs in this Query's rtable */
foreach(lc, query->rtable) foreach(lc, query->rtable)
{ {
......
...@@ -15,8 +15,6 @@ ...@@ -15,8 +15,6 @@
#include "postgres.h" #include "postgres.h"
#include "miscadmin.h" #include "miscadmin.h"
#include "catalog/pg_class.h"
#include "foreign/foreign.h"
#include "optimizer/clauses.h" #include "optimizer/clauses.h"
#include "optimizer/cost.h" #include "optimizer/cost.h"
#include "optimizer/pathnode.h" #include "optimizer/pathnode.h"
...@@ -107,7 +105,6 @@ build_simple_rel(PlannerInfo *root, int relid, RelOptKind reloptkind) ...@@ -107,7 +105,6 @@ build_simple_rel(PlannerInfo *root, int relid, RelOptKind reloptkind)
rel->consider_startup = (root->tuple_fraction > 0); rel->consider_startup = (root->tuple_fraction > 0);
rel->consider_param_startup = false; /* might get changed later */ rel->consider_param_startup = false; /* might get changed later */
rel->consider_parallel = false; /* might get changed later */ rel->consider_parallel = false; /* might get changed later */
rel->rel_parallel_workers = -1; /* set up in GetRelationInfo */
rel->reltarget = create_empty_pathtarget(); rel->reltarget = create_empty_pathtarget();
rel->pathlist = NIL; rel->pathlist = NIL;
rel->ppilist = NIL; rel->ppilist = NIL;
...@@ -129,8 +126,10 @@ build_simple_rel(PlannerInfo *root, int relid, RelOptKind reloptkind) ...@@ -129,8 +126,10 @@ build_simple_rel(PlannerInfo *root, int relid, RelOptKind reloptkind)
rel->allvisfrac = 0; rel->allvisfrac = 0;
rel->subroot = NULL; rel->subroot = NULL;
rel->subplan_params = NIL; rel->subplan_params = NIL;
rel->rel_parallel_workers = -1; /* set up in GetRelationInfo */
rel->serverid = InvalidOid; rel->serverid = InvalidOid;
rel->umid = InvalidOid; rel->userid = rte->checkAsUser;
rel->useridiscurrent = false;
rel->fdwroutine = NULL; rel->fdwroutine = NULL;
rel->fdw_private = NULL; rel->fdw_private = NULL;
rel->baserestrictinfo = NIL; rel->baserestrictinfo = NIL;
...@@ -170,30 +169,6 @@ build_simple_rel(PlannerInfo *root, int relid, RelOptKind reloptkind) ...@@ -170,30 +169,6 @@ build_simple_rel(PlannerInfo *root, int relid, RelOptKind reloptkind)
break; break;
} }
/* For foreign tables get the user mapping */
if (rte->relkind == RELKIND_FOREIGN_TABLE)
{
/*
* This should match what ExecCheckRTEPerms() does.
*
* Note that if the plan ends up depending on the user OID in any way
* - e.g. if it depends on the computed user mapping OID - we must
* ensure that it gets invalidated in the case of a user OID change.
* See RevalidateCachedQuery and more generally the hasForeignJoin
* flags in PlannerGlobal and PlannedStmt.
*
* It's possible, and not necessarily an error, for rel->umid to be
* InvalidOid even though rel->serverid is set. That just means there
* is a server with no user mapping.
*/
Oid userid;
userid = OidIsValid(rte->checkAsUser) ? rte->checkAsUser : GetUserId();
rel->umid = GetUserMappingId(userid, rel->serverid, true);
}
else
rel->umid = InvalidOid;
/* Save the finished struct in the query's simple_rel_array */ /* Save the finished struct in the query's simple_rel_array */
root->simple_rel_array[relid] = rel; root->simple_rel_array[relid] = rel;
...@@ -423,8 +398,10 @@ build_join_rel(PlannerInfo *root, ...@@ -423,8 +398,10 @@ build_join_rel(PlannerInfo *root,
joinrel->allvisfrac = 0; joinrel->allvisfrac = 0;
joinrel->subroot = NULL; joinrel->subroot = NULL;
joinrel->subplan_params = NIL; joinrel->subplan_params = NIL;
joinrel->rel_parallel_workers = -1;
joinrel->serverid = InvalidOid; joinrel->serverid = InvalidOid;
joinrel->umid = InvalidOid; joinrel->userid = InvalidOid;
joinrel->useridiscurrent = false;
joinrel->fdwroutine = NULL; joinrel->fdwroutine = NULL;
joinrel->fdw_private = NULL; joinrel->fdw_private = NULL;
joinrel->baserestrictinfo = NIL; joinrel->baserestrictinfo = NIL;
...@@ -435,24 +412,43 @@ build_join_rel(PlannerInfo *root, ...@@ -435,24 +412,43 @@ build_join_rel(PlannerInfo *root,
/* /*
* Set up foreign-join fields if outer and inner relation are foreign * Set up foreign-join fields if outer and inner relation are foreign
* tables (or joins) belonging to the same server and using the same user * tables (or joins) belonging to the same server and assigned to the same
* mapping. * user to check access permissions as. In addition to an exact match of
* * userid, we allow the case where one side has zero userid (implying
* Otherwise those fields are left invalid, so FDW API will not be called * current user) and the other side has explicit userid that happens to
* for the join relation. * equal the current user; but in that case, pushdown of the join is only
* valid for the current user. The useridiscurrent field records whether
* we had to make such an assumption for this join or any sub-join.
* *
* For FDWs like file_fdw, which ignore user mapping, the user mapping id * Otherwise these fields are left invalid, so GetForeignJoinPaths will
* associated with the joining relation may be invalid. A valid serverid * not be called for the join relation.
* distinguishes between a pushed down join with no user mapping and a
* join which can not be pushed down because of user mapping mismatch.
*/ */
if (OidIsValid(outer_rel->serverid) && if (OidIsValid(outer_rel->serverid) &&
inner_rel->serverid == outer_rel->serverid && inner_rel->serverid == outer_rel->serverid)
inner_rel->umid == outer_rel->umid)
{ {
joinrel->serverid = outer_rel->serverid; if (inner_rel->userid == outer_rel->userid)
joinrel->umid = outer_rel->umid; {
joinrel->fdwroutine = outer_rel->fdwroutine; joinrel->serverid = outer_rel->serverid;
joinrel->userid = outer_rel->userid;
joinrel->useridiscurrent = outer_rel->useridiscurrent || inner_rel->useridiscurrent;
joinrel->fdwroutine = outer_rel->fdwroutine;
}
else if (!OidIsValid(inner_rel->userid) &&
outer_rel->userid == GetUserId())
{
joinrel->serverid = outer_rel->serverid;
joinrel->userid = outer_rel->userid;
joinrel->useridiscurrent = true;
joinrel->fdwroutine = outer_rel->fdwroutine;
}
else if (!OidIsValid(outer_rel->userid) &&
inner_rel->userid == GetUserId())
{
joinrel->serverid = outer_rel->serverid;
joinrel->userid = inner_rel->userid;
joinrel->useridiscurrent = true;
joinrel->fdwroutine = outer_rel->fdwroutine;
}
} }
/* /*
......
This diff is collapsed.
...@@ -72,7 +72,7 @@ typedef struct ForeignTable ...@@ -72,7 +72,7 @@ typedef struct ForeignTable
extern ForeignServer *GetForeignServer(Oid serverid); extern ForeignServer *GetForeignServer(Oid serverid);
extern ForeignServer *GetForeignServerByName(const char *name, bool missing_ok); extern ForeignServer *GetForeignServerByName(const char *name, bool missing_ok);
extern UserMapping *GetUserMapping(Oid userid, Oid serverid); extern UserMapping *GetUserMapping(Oid userid, Oid serverid);
extern Oid GetUserMappingId(Oid userid, Oid serverid, bool missing_ok); extern Oid GetUserMappingId(Oid userid, Oid serverid);
extern UserMapping *GetUserMappingById(Oid umid); extern UserMapping *GetUserMappingById(Oid umid);
extern ForeignDataWrapper *GetForeignDataWrapper(Oid fdwid); extern ForeignDataWrapper *GetForeignDataWrapper(Oid fdwid);
extern ForeignDataWrapper *GetForeignDataWrapperByName(const char *name, extern ForeignDataWrapper *GetForeignDataWrapperByName(const char *name,
......
...@@ -121,7 +121,7 @@ typedef struct Query ...@@ -121,7 +121,7 @@ typedef struct Query
bool hasRecursive; /* WITH RECURSIVE was specified */ bool hasRecursive; /* WITH RECURSIVE was specified */
bool hasModifyingCTE; /* has INSERT/UPDATE/DELETE in WITH */ bool hasModifyingCTE; /* has INSERT/UPDATE/DELETE in WITH */
bool hasForUpdate; /* FOR [KEY] UPDATE/SHARE was specified */ bool hasForUpdate; /* FOR [KEY] UPDATE/SHARE was specified */
bool hasRowSecurity; /* row security applied? */ bool hasRowSecurity; /* rewriter has applied some RLS policy */
List *cteList; /* WITH list (of CommonTableExpr's) */ List *cteList; /* WITH list (of CommonTableExpr's) */
...@@ -2823,7 +2823,7 @@ typedef enum VacuumOption ...@@ -2823,7 +2823,7 @@ typedef enum VacuumOption
VACOPT_FULL = 1 << 4, /* FULL (non-concurrent) vacuum */ VACOPT_FULL = 1 << 4, /* FULL (non-concurrent) vacuum */
VACOPT_NOWAIT = 1 << 5, /* don't wait to get lock (autovacuum only) */ VACOPT_NOWAIT = 1 << 5, /* don't wait to get lock (autovacuum only) */
VACOPT_SKIPTOAST = 1 << 6, /* don't process the TOAST table, if any */ VACOPT_SKIPTOAST = 1 << 6, /* don't process the TOAST table, if any */
VACOPT_DISABLE_PAGE_SKIPPING = 1 << 7 /* don't skip any pages */ VACOPT_DISABLE_PAGE_SKIPPING = 1 << 7 /* don't skip any pages */
} VacuumOption; } VacuumOption;
typedef struct VacuumStmt typedef struct VacuumStmt
......
...@@ -49,6 +49,10 @@ typedef struct PlannedStmt ...@@ -49,6 +49,10 @@ typedef struct PlannedStmt
bool transientPlan; /* redo plan when TransactionXmin changes? */ bool transientPlan; /* redo plan when TransactionXmin changes? */
bool dependsOnRole; /* is plan specific to current role? */
bool parallelModeNeeded; /* parallel mode required to execute? */
struct Plan *planTree; /* tree of Plan nodes */ struct Plan *planTree; /* tree of Plan nodes */
List *rtable; /* list of RangeTblEntry nodes */ List *rtable; /* list of RangeTblEntry nodes */
...@@ -69,11 +73,6 @@ typedef struct PlannedStmt ...@@ -69,11 +73,6 @@ typedef struct PlannedStmt
List *invalItems; /* other dependencies, as PlanInvalItems */ List *invalItems; /* other dependencies, as PlanInvalItems */
int nParamExec; /* number of PARAM_EXEC Params used */ int nParamExec; /* number of PARAM_EXEC Params used */
bool hasRowSecurity; /* row security applied? */
bool parallelModeNeeded; /* parallel mode required to execute? */
bool hasForeignJoin; /* Plan has a pushed down foreign join */
} PlannedStmt; } PlannedStmt;
/* macro for fetching the Plan associated with a SubPlan node */ /* macro for fetching the Plan associated with a SubPlan node */
......
...@@ -121,13 +121,11 @@ typedef struct PlannerGlobal ...@@ -121,13 +121,11 @@ typedef struct PlannerGlobal
bool transientPlan; /* redo plan when TransactionXmin changes? */ bool transientPlan; /* redo plan when TransactionXmin changes? */
bool hasRowSecurity; /* row security applied? */ bool dependsOnRole; /* is plan specific to current role? */
bool parallelModeOK; /* parallel mode potentially OK? */ bool parallelModeOK; /* parallel mode potentially OK? */
bool parallelModeNeeded; /* parallel mode actually required? */ bool parallelModeNeeded; /* parallel mode actually required? */
bool hasForeignJoin; /* does have a pushed down foreign join */
} PlannerGlobal; } PlannerGlobal;
/* macro for fetching the Plan associated with a SubPlan node */ /* macro for fetching the Plan associated with a SubPlan node */
...@@ -426,11 +424,12 @@ typedef struct PlannerInfo ...@@ -426,11 +424,12 @@ typedef struct PlannerInfo
* in just as for a baserel, except we don't bother with lateral_vars. * in just as for a baserel, except we don't bother with lateral_vars.
* *
* If the relation is either a foreign table or a join of foreign tables that * If the relation is either a foreign table or a join of foreign tables that
* all belong to the same foreign server and use the same user mapping, these * all belong to the same foreign server and are assigned to the same user to
* fields will be set: * check access permissions as (cf checkAsUser), these fields will be set:
* *
* serverid - OID of foreign server, if foreign table (else InvalidOid) * serverid - OID of foreign server, if foreign table (else InvalidOid)
* umid - OID of user mapping, if foreign table (else InvalidOid) * userid - OID of user to check access as (InvalidOid means current user)
* useridiscurrent - we've assumed that userid equals current user
* fdwroutine - function hooks for FDW, if foreign table (else NULL) * fdwroutine - function hooks for FDW, if foreign table (else NULL)
* fdw_private - private state for FDW, if foreign table (else NULL) * fdw_private - private state for FDW, if foreign table (else NULL)
* *
...@@ -528,8 +527,8 @@ typedef struct RelOptInfo ...@@ -528,8 +527,8 @@ typedef struct RelOptInfo
/* Information about foreign tables and foreign joins */ /* Information about foreign tables and foreign joins */
Oid serverid; /* identifies server for the table or join */ Oid serverid; /* identifies server for the table or join */
Oid umid; /* identifies user mapping for the table or Oid userid; /* identifies user to check access as */
* join */ bool useridiscurrent; /* join is only valid for current user */
/* use "struct FdwRoutine" to avoid including fdwapi.h here */ /* use "struct FdwRoutine" to avoid including fdwapi.h here */
struct FdwRoutine *fdwroutine; struct FdwRoutine *fdwroutine;
void *fdw_private; void *fdw_private;
...@@ -653,7 +652,7 @@ typedef struct ForeignKeyOptInfo ...@@ -653,7 +652,7 @@ typedef struct ForeignKeyOptInfo
struct EquivalenceClass *eclass[INDEX_MAX_KEYS]; struct EquivalenceClass *eclass[INDEX_MAX_KEYS];
/* List of non-EC RestrictInfos matching each column's condition */ /* List of non-EC RestrictInfos matching each column's condition */
List *rinfos[INDEX_MAX_KEYS]; List *rinfos[INDEX_MAX_KEYS];
} ForeignKeyOptInfo; } ForeignKeyOptInfo;
/* /*
......
...@@ -93,8 +93,10 @@ typedef struct CachedPlanSource ...@@ -93,8 +93,10 @@ typedef struct CachedPlanSource
List *invalItems; /* other dependencies, as PlanInvalItems */ List *invalItems; /* other dependencies, as PlanInvalItems */
struct OverrideSearchPath *search_path; /* search_path used for struct OverrideSearchPath *search_path; /* search_path used for
* parsing and planning */ * parsing and planning */
Oid planUserId; /* User-id that the plan depends on */
MemoryContext query_context; /* context holding the above, or NULL */ MemoryContext query_context; /* context holding the above, or NULL */
Oid rewriteRoleId; /* Role ID we did rewriting for */
bool rewriteRowSecurity; /* row_security used during rewrite */
bool dependsOnRLS; /* is rewritten query specific to the above? */
/* If we have a generic plan, this is a reference-counted link to it: */ /* If we have a generic plan, this is a reference-counted link to it: */
struct CachedPlan *gplan; /* generic plan, or NULL if not valid */ struct CachedPlan *gplan; /* generic plan, or NULL if not valid */
/* Some state flags: */ /* Some state flags: */
...@@ -109,8 +111,6 @@ typedef struct CachedPlanSource ...@@ -109,8 +111,6 @@ typedef struct CachedPlanSource
double generic_cost; /* cost of generic plan, or -1 if not known */ double generic_cost; /* cost of generic plan, or -1 if not known */
double total_custom_cost; /* total cost of custom plans so far */ double total_custom_cost; /* total cost of custom plans so far */
int num_custom_plans; /* number of plans included in total */ int num_custom_plans; /* number of plans included in total */
bool hasRowSecurity; /* planned with row security? */
bool row_security_env; /* row security setting when planned */
} CachedPlanSource; } CachedPlanSource;
/* /*
...@@ -131,11 +131,12 @@ typedef struct CachedPlan ...@@ -131,11 +131,12 @@ typedef struct CachedPlan
bool is_oneshot; /* is it a "oneshot" plan? */ bool is_oneshot; /* is it a "oneshot" plan? */
bool is_saved; /* is CachedPlan in a long-lived context? */ bool is_saved; /* is CachedPlan in a long-lived context? */
bool is_valid; /* is the stmt_list currently valid? */ bool is_valid; /* is the stmt_list currently valid? */
Oid planRoleId; /* Role ID the plan was created for */
bool dependsOnRole; /* is plan specific to that role? */
TransactionId saved_xmin; /* if valid, replan when TransactionXmin TransactionId saved_xmin; /* if valid, replan when TransactionXmin
* changes from this value */ * changes from this value */
int generation; /* parent's generation number for this plan */ int generation; /* parent's generation number for this plan */
int refcount; /* count of live references to this struct */ int refcount; /* count of live references to this struct */
bool has_foreign_join; /* plan has pushed down a foreign join */
MemoryContext context; /* context containing this CachedPlan */ MemoryContext context; /* context containing this CachedPlan */
} CachedPlan; } CachedPlan;
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment