Fix missing dependency for pg_dump's ENABLE ROW LEVEL SECURITY items.
authorTom Lane
Mon, 27 Aug 2018 19:11:12 +0000 (15:11 -0400)
committerTom Lane
Mon, 27 Aug 2018 19:11:12 +0000 (15:11 -0400)
The archive should show a dependency on the item's table, but it failed
to include one.  This could cause failures in parallel restore due to
emitting ALTER TABLE ... ENABLE ROW LEVEL SECURITY before restoring
the table's data.  In practice the odds of a problem seem low, since
you would typically need to have set FORCE ROW LEVEL SECURITY as well,
and you'd also need a very high --jobs count to have any chance of this
happening.  That probably explains the lack of field reports.

Still, it's a bug, so back-patch to 9.5 where RLS was introduced.

Discussion: https://postgr.es/m/19784.1535390902@sss.pgh.pa.us

src/bin/pg_dump/pg_dump.c

index c3d68810ca07a27be025ce5d1984d3a4812785eb..db19f924d807f910f525235a7f729ee56f1fc918 100644 (file)
@@ -3207,8 +3207,8 @@ getPolicies(Archive *fout, TableInfo tblinfo[], int numTables)
 
        /*
         * Get row security enabled information for the table. We represent
-        * RLS enabled on a table by creating PolicyInfo object with an empty
-        * policy.
+        * RLS being enabled on a table by creating a PolicyInfo object with
+        * null polname.
         */
        if (tbinfo->rowsec)
        {
@@ -3349,8 +3349,13 @@ dumpPolicy(Archive *fout, PolicyInfo *polinfo)
        query = createPQExpBuffer();
 
        appendPQExpBuffer(query, "ALTER TABLE %s ENABLE ROW LEVEL SECURITY;",
-                         fmtQualifiedDumpable(polinfo));
+                         fmtQualifiedDumpable(tbinfo));
 
+       /*
+        * We must emit the ROW SECURITY object's dependency on its table
+        * explicitly, because it will not match anything in pg_depend (unlike
+        * the case for other PolicyInfo objects).
+        */
        if (polinfo->dobj.dump & DUMP_COMPONENT_POLICY)
            ArchiveEntry(fout, polinfo->dobj.catId, polinfo->dobj.dumpId,
                         polinfo->dobj.name,
@@ -3359,7 +3364,7 @@ dumpPolicy(Archive *fout, PolicyInfo *polinfo)
                         tbinfo->rolname, false,
                         "ROW SECURITY", SECTION_POST_DATA,
                         query->data, "", NULL,
-                        NULL, 0,
+                        &(tbinfo->dobj.dumpId), 1,
                         NULL, NULL);
 
        destroyPQExpBuffer(query);