PostgreSQL Source Code  git master
test_rls_hooks.c
Go to the documentation of this file.
1 /*--------------------------------------------------------------------------
2  *
3  * test_rls_hooks.c
4  * Code for testing RLS hooks.
5  *
6  * Copyright (c) 2015-2019, PostgreSQL Global Development Group
7  *
8  * IDENTIFICATION
9  * src/test/modules/test_rls_hooks/test_rls_hooks.c
10  *
11  * -------------------------------------------------------------------------
12  */
13 
14 #include "postgres.h"
15 
16 #include "catalog/pg_type.h"
17 #include "fmgr.h"
18 #include "miscadmin.h"
19 #include "nodes/makefuncs.h"
20 #include "parser/parse_clause.h"
21 #include "parser/parse_collate.h"
22 #include "parser/parse_node.h"
23 #include "parser/parse_relation.h"
24 #include "rewrite/rowsecurity.h"
25 #include "test_rls_hooks.h"
26 #include "utils/acl.h"
27 #include "utils/rel.h"
28 #include "utils/relcache.h"
29 
31 
32 /* Saved hook values in case of unload */
35 
36 void _PG_init(void);
37 void _PG_fini(void);
38 
39 /* Install hooks */
40 void
41 _PG_init(void)
42 {
43  /* Save values for unload */
46 
47  /* Set our hooks */
50 }
51 
52 /* Uninstall hooks */
53 void
54 _PG_fini(void)
55 {
58 }
59 
60 /*
61  * Return permissive policies to be added
62  */
63 List *
65 {
66  List *policies = NIL;
67  RowSecurityPolicy *policy = palloc0(sizeof(RowSecurityPolicy));
68  Datum role;
69  FuncCall *n;
70  Node *e;
71  ColumnRef *c;
72  ParseState *qual_pstate;
73  RangeTblEntry *rte;
74 
75  if (strcmp(RelationGetRelationName(relation), "rls_test_permissive") != 0 &&
76  strcmp(RelationGetRelationName(relation), "rls_test_both") != 0)
77  return NIL;
78 
79  qual_pstate = make_parsestate(NULL);
80 
81  rte = addRangeTableEntryForRelation(qual_pstate, relation, AccessShareLock,
82  NULL, false, false);
83  addRTEtoQuery(qual_pstate, rte, false, true, true);
84 
86 
87  policy->policy_name = pstrdup("extension policy");
88  policy->polcmd = '*';
89  policy->roles = construct_array(&role, 1, OIDOID, sizeof(Oid), true, 'i');
90 
91  /*
92  * policy->qual = (Expr *) makeConst(BOOLOID, -1, InvalidOid,
93  * sizeof(bool), BoolGetDatum(true), false, true);
94  */
95 
96  n = makeFuncCall(list_make2(makeString("pg_catalog"),
97  makeString("current_user")), NIL, 0);
98 
99  c = makeNode(ColumnRef);
100  c->fields = list_make1(makeString("username"));
101  c->location = 0;
102 
103  e = (Node *) makeSimpleA_Expr(AEXPR_OP, "=", (Node *) n, (Node *) c, 0);
104 
105  policy->qual = (Expr *) transformWhereClause(qual_pstate, copyObject(e),
107  "POLICY");
108  /* Fix up collation information */
109  assign_expr_collations(qual_pstate, (Node *) policy->qual);
110 
111  policy->with_check_qual = copyObject(policy->qual);
112  policy->hassublinks = false;
113 
114  policies = list_make1(policy);
115 
116  return policies;
117 }
118 
119 /*
120  * Return restrictive policies to be added
121  *
122  * Note that a permissive policy must exist or the default-deny policy
123  * will be included and nothing will be visible. If no filtering should
124  * be done except for the restrictive policy, then a single "USING (true)"
125  * permissive policy can be used; see the regression tests.
126  */
127 List *
129 {
130  List *policies = NIL;
131  RowSecurityPolicy *policy = palloc0(sizeof(RowSecurityPolicy));
132  Datum role;
133  FuncCall *n;
134  Node *e;
135  ColumnRef *c;
136  ParseState *qual_pstate;
137  RangeTblEntry *rte;
138 
139 
140  if (strcmp(RelationGetRelationName(relation), "rls_test_restrictive") != 0 &&
141  strcmp(RelationGetRelationName(relation), "rls_test_both") != 0)
142  return NIL;
143 
144  qual_pstate = make_parsestate(NULL);
145 
146  rte = addRangeTableEntryForRelation(qual_pstate, relation, AccessShareLock,
147  NULL, false, false);
148  addRTEtoQuery(qual_pstate, rte, false, true, true);
149 
151 
152  policy->policy_name = pstrdup("extension policy");
153  policy->polcmd = '*';
154  policy->roles = construct_array(&role, 1, OIDOID, sizeof(Oid), true, 'i');
155 
156  n = makeFuncCall(list_make2(makeString("pg_catalog"),
157  makeString("current_user")), NIL, 0);
158 
159  c = makeNode(ColumnRef);
160  c->fields = list_make1(makeString("supervisor"));
161  c->location = 0;
162 
163  e = (Node *) makeSimpleA_Expr(AEXPR_OP, "=", (Node *) n, (Node *) c, 0);
164 
165  policy->qual = (Expr *) transformWhereClause(qual_pstate, copyObject(e),
167  "POLICY");
168  /* Fix up collation information */
169  assign_expr_collations(qual_pstate, (Node *) policy->qual);
170 
171  policy->with_check_qual = copyObject(policy->qual);
172  policy->hassublinks = false;
173 
174  policies = list_make1(policy);
175 
176  return policies;
177 }
#define list_make2(x1, x2)
Definition: pg_list.h:229
void _PG_fini(void)
Value * makeString(char *str)
Definition: value.c:53
static row_security_policy_hook_type prev_row_security_policy_hook_permissive
#define NIL
Definition: pg_list.h:65
void _PG_init(void)
PG_MODULE_MAGIC
char * pstrdup(const char *in)
Definition: mcxt.c:1186
ArrayType * construct_array(Datum *elems, int nelems, Oid elmtype, int elmlen, bool elmbyval, char elmalign)
Definition: arrayfuncs.c:3291
#define AccessShareLock
Definition: lockdefs.h:36
Definition: nodes.h:525
row_security_policy_hook_type row_security_policy_hook_permissive
Definition: rowsecurity.c:96
List * test_rls_hooks_permissive(CmdType cmdtype, Relation relation)
unsigned int Oid
Definition: postgres_ext.h:31
A_Expr * makeSimpleA_Expr(A_Expr_Kind kind, char *name, Node *lexpr, Node *rexpr, int location)
Definition: makefuncs.c:48
ParseState * make_parsestate(ParseState *parentParseState)
Definition: parse_node.c:43
int location
Definition: parsenodes.h:236
static row_security_policy_hook_type prev_row_security_policy_hook_restrictive
#define list_make1(x1)
Definition: pg_list.h:227
void assign_expr_collations(ParseState *pstate, Node *expr)
#define ObjectIdGetDatum(X)
Definition: postgres.h:507
List *(* row_security_policy_hook_type)(CmdType cmdtype, Relation relation)
Definition: rowsecurity.h:37
char * c
RangeTblEntry * addRangeTableEntryForRelation(ParseState *pstate, Relation rel, int lockmode, Alias *alias, bool inh, bool inFromCl)
Expr * with_check_qual
Definition: rowsecurity.h:27
row_security_policy_hook_type row_security_policy_hook_restrictive
Definition: rowsecurity.c:97
#define RelationGetRelationName(relation)
Definition: rel.h:456
ArrayType * roles
Definition: rowsecurity.h:24
void addRTEtoQuery(ParseState *pstate, RangeTblEntry *rte, bool addToJoinList, bool addToRelNameSpace, bool addToVarNameSpace)
FuncCall * makeFuncCall(List *name, List *args, int location)
Definition: makefuncs.c:583
void * palloc0(Size size)
Definition: mcxt.c:980
uintptr_t Datum
Definition: postgres.h:367
#define makeNode(_type_)
Definition: nodes.h:573
List * test_rls_hooks_restrictive(CmdType cmdtype, Relation relation)
Node * transformWhereClause(ParseState *pstate, Node *clause, ParseExprKind exprKind, const char *constructName)
e
Definition: preproc-init.c:82
#define ACL_ID_PUBLIC
Definition: acl.h:46
#define copyObject(obj)
Definition: nodes.h:641
Definition: pg_list.h:50
CmdType
Definition: nodes.h:668
List * fields
Definition: parsenodes.h:235