diff options
-rw-r--r-- | doc/src/sgml/catalogs.sgml | 33 | ||||
-rw-r--r-- | src/backend/catalog/system_views.sql | 2 | ||||
-rw-r--r-- | src/include/catalog/catversion.h | 2 | ||||
-rw-r--r-- | src/test/regress/expected/rules.out | 2 |
4 files changed, 36 insertions, 3 deletions
diff --git a/doc/src/sgml/catalogs.sgml b/doc/src/sgml/catalogs.sgml index 62305d2bb3e..49891a4a7bf 100644 --- a/doc/src/sgml/catalogs.sgml +++ b/doc/src/sgml/catalogs.sgml @@ -1445,6 +1445,15 @@ </row> <row> + <entry><structfield>rolbypassrls</structfield></entry> + <entry><type>bool</type></entry> + <entry> + Role can bypass row level security policies, see + <xref linkend="ddl-rowsecurity"> for more information. + </entry> + </row> + + <row> <entry><structfield>rolconnlimit</structfield></entry> <entry><type>int4</type></entry> <entry> @@ -1951,7 +1960,7 @@ <entry><type>bool</type></entry> <entry></entry> <entry> - True if table has row-level security enabled; see + True if table has row level security enabled; see <link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog </entry> </row> @@ -4719,7 +4728,7 @@ </indexterm> <para> - The catalog <structname>pg_policy</structname> stores row-level + The catalog <structname>pg_policy</structname> stores row level security policies for tables. A policy includes the kind of command that it applies to (possibly all commands), the roles that it applies to, the expression to be added as a security-barrier @@ -9031,6 +9040,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx </row> <row> + <entry><structfield>usebypassrls</structfield></entry> + <entry><type>bool</type></entry> + <entry></entry> + <entry> + User can bypass row level security policies, see + <xref linkend="ddl-rowsecurity"> for more information. + </entry> + </row> + + <row> <entry><structfield>passwd</structfield></entry> <entry><type>text</type></entry> <entry></entry> @@ -9506,6 +9525,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx </row> <row> + <entry><structfield>usebypassrls</structfield></entry> + <entry><type>bool</type></entry> + <entry></entry> + <entry> + User can bypass row level security policies, see + <xref linkend="ddl-rowsecurity"> for more information. + </entry> + </row> + + <row> <entry><structfield>passwd</structfield></entry> <entry><type>text</type></entry> <entry>Not the password (always reads as <literal>********</>)</entry> diff --git a/src/backend/catalog/system_views.sql b/src/backend/catalog/system_views.sql index 6df6bf27d19..5e69e2b2add 100644 --- a/src/backend/catalog/system_views.sql +++ b/src/backend/catalog/system_views.sql @@ -33,6 +33,7 @@ CREATE VIEW pg_shadow AS rolsuper AS usesuper, rolcatupdate AS usecatupd, rolreplication AS userepl, + rolbypassrls AS usebypassrls, rolpassword AS passwd, rolvaliduntil::abstime AS valuntil, setconfig AS useconfig @@ -58,6 +59,7 @@ CREATE VIEW pg_user AS usesuper, usecatupd, userepl, + usebypassrls, '********'::text as passwd, valuntil, useconfig diff --git a/src/include/catalog/catversion.h b/src/include/catalog/catversion.h index 13c4376b8cc..2b7a0bb93bc 100644 --- a/src/include/catalog/catversion.h +++ b/src/include/catalog/catversion.h @@ -53,6 +53,6 @@ */ /* yyyymmddN */ -#define CATALOG_VERSION_NO 201501241 +#define CATALOG_VERSION_NO 201501281 #endif diff --git a/src/test/regress/expected/rules.out b/src/test/regress/expected/rules.out index 7df5d2dce9a..d50b103f159 100644 --- a/src/test/regress/expected/rules.out +++ b/src/test/regress/expected/rules.out @@ -1609,6 +1609,7 @@ pg_shadow| SELECT pg_authid.rolname AS usename, pg_authid.rolsuper AS usesuper, pg_authid.rolcatupdate AS usecatupd, pg_authid.rolreplication AS userepl, + pg_authid.rolbypassrls AS usebypassrls, pg_authid.rolpassword AS passwd, (pg_authid.rolvaliduntil)::abstime AS valuntil, s.setconfig AS useconfig @@ -2063,6 +2064,7 @@ pg_user| SELECT pg_shadow.usename, pg_shadow.usesuper, pg_shadow.usecatupd, pg_shadow.userepl, + pg_shadow.usebypassrls, '********'::text AS passwd, pg_shadow.valuntil, pg_shadow.useconfig |