-
Notifications
You must be signed in to change notification settings - Fork 605
Support RLS statements #1404
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@wyozi It would be nice if you can provide the documentation link to which dialect supports this syntax. |
Ah of course, this is Postgres dialect. I'm so used to working in the Postgres world that I sometimes forget how different the dialects are 😅 Here's the documentation: https://www.postgresql.org/docs/current/ddl-rowsecurity.html |
@wyozi Thank you! I will support this when I get time. |
git-hulk
added a commit
to git-hulk/sqlparser-rs
that referenced
this issue
Sep 24, 2024
This PR implements part of feature mentioned in apache#1404. The following the syntax: ```SQL CREATE POLICY name ON table_name [ AS { PERMISSIVE | RESTRICTIVE } ] [ FOR { ALL | SELECT | INSERT | UPDATE | DELETE } ] [ TO { role_name | PUBLIC | CURRENT_ROLE | CURRENT_USER | SESSION_USER } [, ...] ] [ USING ( using_expression ) ] [ WITH CHECK ( check_expression ) ] ``` For the documentation, please refer: https://www.postgresql.org/docs/current/sql-createpolicy.html
git-hulk
added a commit
to git-hulk/sqlparser-rs
that referenced
this issue
Sep 26, 2024
```SQL DROP POLICY [ IF EXISTS ] name ON table_name [ CASCADE | RESTRICT ] ``` For the documentation, please refer: https://www.postgresql.org/docs/current/sql-createpolicy.html This closes apache#1404.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hey, I'm working on a project where I would like to parse and transform (among others) RLS policy migrations.
Namely, stuff like
and
Would it be possible to add support for these?
The text was updated successfully, but these errors were encountered: