Commit c7cf9a24 authored by Stephen Frost's avatar Stephen Frost

Add usebypassrls to pg_user and pg_shadow

The row level security patches didn't add the 'usebypassrls' columns to
the pg_user and pg_shadow views on the belief that they were deprecated,
but we havn't actually said they are and therefore we should include it.

This patch corrects that, adds missing documentation for rolbypassrls
into the system catalog page for pg_authid, along with the entries for
pg_user and pg_shadow, and cleans up a few other uses of 'row-level'
cases to be 'row level' in the docs.

Pointed out by Amit Kapila.

Catalog version bump due to system view changes.
parent f8519a6a
...@@ -1444,6 +1444,15 @@ ...@@ -1444,6 +1444,15 @@
</entry> </entry>
</row> </row>
<row>
<entry><structfield>rolbypassrls</structfield></entry>
<entry><type>bool</type></entry>
<entry>
Role can bypass row level security policies, see
<xref linkend="ddl-rowsecurity"> for more information.
</entry>
</row>
<row> <row>
<entry><structfield>rolconnlimit</structfield></entry> <entry><structfield>rolconnlimit</structfield></entry>
<entry><type>int4</type></entry> <entry><type>int4</type></entry>
...@@ -1951,7 +1960,7 @@ ...@@ -1951,7 +1960,7 @@
<entry><type>bool</type></entry> <entry><type>bool</type></entry>
<entry></entry> <entry></entry>
<entry> <entry>
True if table has row-level security enabled; see True if table has row level security enabled; see
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog <link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
</entry> </entry>
</row> </row>
...@@ -4719,7 +4728,7 @@ ...@@ -4719,7 +4728,7 @@
</indexterm> </indexterm>
<para> <para>
The catalog <structname>pg_policy</structname> stores row-level The catalog <structname>pg_policy</structname> stores row level
security policies for tables. A policy includes the kind of security policies for tables. A policy includes the kind of
command that it applies to (possibly all commands), the roles that it command that it applies to (possibly all commands), the roles that it
applies to, the expression to be added as a security-barrier applies to, the expression to be added as a security-barrier
...@@ -9030,6 +9039,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx ...@@ -9030,6 +9039,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
</entry> </entry>
</row> </row>
<row>
<entry><structfield>usebypassrls</structfield></entry>
<entry><type>bool</type></entry>
<entry></entry>
<entry>
User can bypass row level security policies, see
<xref linkend="ddl-rowsecurity"> for more information.
</entry>
</row>
<row> <row>
<entry><structfield>passwd</structfield></entry> <entry><structfield>passwd</structfield></entry>
<entry><type>text</type></entry> <entry><type>text</type></entry>
...@@ -9505,6 +9524,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx ...@@ -9505,6 +9524,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
</entry> </entry>
</row> </row>
<row>
<entry><structfield>usebypassrls</structfield></entry>
<entry><type>bool</type></entry>
<entry></entry>
<entry>
User can bypass row level security policies, see
<xref linkend="ddl-rowsecurity"> for more information.
</entry>
</row>
<row> <row>
<entry><structfield>passwd</structfield></entry> <entry><structfield>passwd</structfield></entry>
<entry><type>text</type></entry> <entry><type>text</type></entry>
......
...@@ -33,6 +33,7 @@ CREATE VIEW pg_shadow AS ...@@ -33,6 +33,7 @@ CREATE VIEW pg_shadow AS
rolsuper AS usesuper, rolsuper AS usesuper,
rolcatupdate AS usecatupd, rolcatupdate AS usecatupd,
rolreplication AS userepl, rolreplication AS userepl,
rolbypassrls AS usebypassrls,
rolpassword AS passwd, rolpassword AS passwd,
rolvaliduntil::abstime AS valuntil, rolvaliduntil::abstime AS valuntil,
setconfig AS useconfig setconfig AS useconfig
...@@ -58,6 +59,7 @@ CREATE VIEW pg_user AS ...@@ -58,6 +59,7 @@ CREATE VIEW pg_user AS
usesuper, usesuper,
usecatupd, usecatupd,
userepl, userepl,
usebypassrls,
'********'::text as passwd, '********'::text as passwd,
valuntil, valuntil,
useconfig useconfig
......
...@@ -53,6 +53,6 @@ ...@@ -53,6 +53,6 @@
*/ */
/* yyyymmddN */ /* yyyymmddN */
#define CATALOG_VERSION_NO 201501241 #define CATALOG_VERSION_NO 201501281
#endif #endif
...@@ -1609,6 +1609,7 @@ pg_shadow| SELECT pg_authid.rolname AS usename, ...@@ -1609,6 +1609,7 @@ pg_shadow| SELECT pg_authid.rolname AS usename,
pg_authid.rolsuper AS usesuper, pg_authid.rolsuper AS usesuper,
pg_authid.rolcatupdate AS usecatupd, pg_authid.rolcatupdate AS usecatupd,
pg_authid.rolreplication AS userepl, pg_authid.rolreplication AS userepl,
pg_authid.rolbypassrls AS usebypassrls,
pg_authid.rolpassword AS passwd, pg_authid.rolpassword AS passwd,
(pg_authid.rolvaliduntil)::abstime AS valuntil, (pg_authid.rolvaliduntil)::abstime AS valuntil,
s.setconfig AS useconfig s.setconfig AS useconfig
...@@ -2063,6 +2064,7 @@ pg_user| SELECT pg_shadow.usename, ...@@ -2063,6 +2064,7 @@ pg_user| SELECT pg_shadow.usename,
pg_shadow.usesuper, pg_shadow.usesuper,
pg_shadow.usecatupd, pg_shadow.usecatupd,
pg_shadow.userepl, pg_shadow.userepl,
pg_shadow.usebypassrls,
'********'::text AS passwd, '********'::text AS passwd,
pg_shadow.valuntil, pg_shadow.valuntil,
pg_shadow.useconfig pg_shadow.useconfig
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment