1996-07-09 08:22:35 +02:00
|
|
|
/*-------------------------------------------------------------------------
|
|
|
|
*
|
1999-02-14 00:22:53 +01:00
|
|
|
* rewriteHandler.c
|
2001-06-13 20:56:30 +02:00
|
|
|
* Primary module of query rewriter.
|
1996-07-09 08:22:35 +02:00
|
|
|
*
|
2002-06-20 22:29:54 +02:00
|
|
|
* Portions Copyright (c) 1996-2002, PostgreSQL Global Development Group
|
2000-01-26 06:58:53 +01:00
|
|
|
* Portions Copyright (c) 1994, Regents of the University of California
|
1996-07-09 08:22:35 +02:00
|
|
|
*
|
|
|
|
* IDENTIFICATION
|
2003-04-30 00:13:11 +02:00
|
|
|
* $Header: /cvsroot/pgsql/src/backend/rewrite/rewriteHandler.c,v 1.119 2003/04/29 22:13:10 tgl Exp $
|
1996-07-09 08:22:35 +02:00
|
|
|
*
|
|
|
|
*-------------------------------------------------------------------------
|
|
|
|
*/
|
|
|
|
#include "postgres.h"
|
|
|
|
|
1999-07-16 07:00:38 +02:00
|
|
|
#include "access/heapam.h"
|
1999-08-26 01:21:43 +02:00
|
|
|
#include "catalog/pg_operator.h"
|
1998-10-02 18:28:04 +02:00
|
|
|
#include "catalog/pg_type.h"
|
1999-07-16 07:00:38 +02:00
|
|
|
#include "miscadmin.h"
|
1999-08-26 01:21:43 +02:00
|
|
|
#include "nodes/makefuncs.h"
|
1999-07-16 07:00:38 +02:00
|
|
|
#include "optimizer/clauses.h"
|
|
|
|
#include "optimizer/prep.h"
|
2000-04-04 04:30:52 +02:00
|
|
|
#include "optimizer/var.h"
|
1999-07-16 07:00:38 +02:00
|
|
|
#include "parser/analyze.h"
|
2002-04-05 07:47:05 +02:00
|
|
|
#include "parser/parse_coerce.h"
|
1999-08-26 01:21:43 +02:00
|
|
|
#include "parser/parse_expr.h"
|
|
|
|
#include "parser/parse_oper.h"
|
2000-06-15 05:33:12 +02:00
|
|
|
#include "parser/parse_type.h"
|
2002-04-05 07:47:05 +02:00
|
|
|
#include "parser/parsetree.h"
|
2001-06-13 20:56:30 +02:00
|
|
|
#include "rewrite/rewriteHandler.h"
|
1999-07-16 07:00:38 +02:00
|
|
|
#include "rewrite/rewriteManip.h"
|
2002-04-05 07:47:05 +02:00
|
|
|
#include "utils/builtins.h"
|
1999-07-16 07:00:38 +02:00
|
|
|
#include "utils/lsyscache.h"
|
1998-10-02 18:28:04 +02:00
|
|
|
|
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
/* We use a list of these to detect recursion in RewriteQuery */
|
|
|
|
typedef struct rewrite_event {
|
|
|
|
Oid relation; /* OID of relation having rules */
|
|
|
|
CmdType event; /* type of rule being fired */
|
|
|
|
} rewrite_event;
|
|
|
|
|
2001-06-13 20:56:30 +02:00
|
|
|
static Query *rewriteRuleAction(Query *parsetree,
|
2001-10-25 07:50:21 +02:00
|
|
|
Query *rule_action,
|
|
|
|
Node *rule_qual,
|
|
|
|
int rt_index,
|
|
|
|
CmdType event);
|
2001-01-27 05:40:59 +01:00
|
|
|
static List *adjustJoinTreeList(Query *parsetree, bool removert, int rt_index);
|
2002-04-05 07:47:05 +02:00
|
|
|
static void rewriteTargetList(Query *parsetree, Relation target_relation);
|
|
|
|
static TargetEntry *process_matched_tle(TargetEntry *src_tle,
|
2002-09-04 22:31:48 +02:00
|
|
|
TargetEntry *prior_tle);
|
2000-12-07 02:22:25 +01:00
|
|
|
static void markQueryForUpdate(Query *qry, bool skipOldNew);
|
2000-09-29 20:21:41 +02:00
|
|
|
static List *matchLocks(CmdType event, RuleLock *rulelocks,
|
2001-03-22 05:01:46 +01:00
|
|
|
int varno, Query *parsetree);
|
2003-02-26 00:47:43 +01:00
|
|
|
static Query *fireRIRrules(Query *parsetree, List *activeRIRs);
|
2000-10-05 21:11:39 +02:00
|
|
|
|
1996-07-09 08:22:35 +02:00
|
|
|
|
|
|
|
/*
|
2001-06-13 20:56:30 +02:00
|
|
|
* rewriteRuleAction -
|
|
|
|
* Rewrite the rule action with appropriate qualifiers (taken from
|
|
|
|
* the triggering query).
|
1996-07-09 08:22:35 +02:00
|
|
|
*/
|
2001-06-13 20:56:30 +02:00
|
|
|
static Query *
|
|
|
|
rewriteRuleAction(Query *parsetree,
|
1997-09-08 23:56:23 +02:00
|
|
|
Query *rule_action,
|
|
|
|
Node *rule_qual,
|
1997-09-07 07:04:48 +02:00
|
|
|
int rt_index,
|
2001-06-13 20:56:30 +02:00
|
|
|
CmdType event)
|
1996-07-09 08:22:35 +02:00
|
|
|
{
|
2001-06-13 20:56:30 +02:00
|
|
|
int current_varno,
|
|
|
|
new_varno;
|
2003-02-13 22:39:50 +01:00
|
|
|
List *main_rtable;
|
2001-06-13 20:56:30 +02:00
|
|
|
int rt_length;
|
2000-12-05 20:15:10 +01:00
|
|
|
Query *sub_action;
|
|
|
|
Query **sub_action_ptr;
|
2003-02-13 22:39:50 +01:00
|
|
|
List *rt;
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2001-06-13 20:56:30 +02:00
|
|
|
/*
|
|
|
|
* Make modifiable copies of rule action and qual (what we're passed
|
|
|
|
* are the stored versions in the relcache; don't touch 'em!).
|
|
|
|
*/
|
|
|
|
rule_action = (Query *) copyObject(rule_action);
|
|
|
|
rule_qual = (Node *) copyObject(rule_qual);
|
|
|
|
|
|
|
|
current_varno = rt_index;
|
2000-12-05 20:15:10 +01:00
|
|
|
rt_length = length(parsetree->rtable);
|
2001-06-13 20:56:30 +02:00
|
|
|
new_varno = PRS2_NEW_VARNO + rt_length;
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2000-12-05 20:15:10 +01:00
|
|
|
/*
|
|
|
|
* Adjust rule action and qual to offset its varnos, so that we can
|
2001-06-12 20:54:22 +02:00
|
|
|
* merge its rtable with the main parsetree's rtable.
|
2000-12-05 20:15:10 +01:00
|
|
|
*
|
2001-03-22 05:01:46 +01:00
|
|
|
* If the rule action is an INSERT...SELECT, the OLD/NEW rtable entries
|
|
|
|
* will be in the SELECT part, and we have to modify that rather than
|
|
|
|
* the top-level INSERT (kluge!).
|
2000-12-05 20:15:10 +01:00
|
|
|
*/
|
2001-06-13 20:56:30 +02:00
|
|
|
sub_action = getInsertSelectQuery(rule_action, &sub_action_ptr);
|
2000-09-12 23:07:18 +02:00
|
|
|
|
2000-12-05 20:15:10 +01:00
|
|
|
OffsetVarNodes((Node *) sub_action, rt_length, 0);
|
2001-06-13 20:56:30 +02:00
|
|
|
OffsetVarNodes(rule_qual, rt_length, 0);
|
2000-12-05 20:15:10 +01:00
|
|
|
/* but references to *OLD* should point at original rt_index */
|
|
|
|
ChangeVarNodes((Node *) sub_action,
|
|
|
|
PRS2_OLD_VARNO + rt_length, rt_index, 0);
|
2001-06-13 20:56:30 +02:00
|
|
|
ChangeVarNodes(rule_qual,
|
2000-12-05 20:15:10 +01:00
|
|
|
PRS2_OLD_VARNO + rt_length, rt_index, 0);
|
|
|
|
|
|
|
|
/*
|
2001-10-25 07:50:21 +02:00
|
|
|
* Generate expanded rtable consisting of main parsetree's rtable plus
|
|
|
|
* rule action's rtable; this becomes the complete rtable for the rule
|
|
|
|
* action. Some of the entries may be unused after we finish
|
2003-02-13 22:39:50 +01:00
|
|
|
* rewriting, but if we tried to remove them we'd have a much
|
2001-10-25 07:50:21 +02:00
|
|
|
* harder job to adjust RT indexes in the query's Vars. It's OK to
|
|
|
|
* have unused RT entries, since planner will ignore them.
|
2000-12-05 20:15:10 +01:00
|
|
|
*
|
2001-06-12 20:54:22 +02:00
|
|
|
* NOTE: because planner will destructively alter rtable, we must ensure
|
2001-10-25 07:50:21 +02:00
|
|
|
* that rule action's rtable is separate and shares no substructure
|
|
|
|
* with the main rtable. Hence do a deep copy here.
|
2003-02-13 22:39:50 +01:00
|
|
|
*
|
|
|
|
* Also, we must disable write-access checking in all the RT entries
|
|
|
|
* copied from the main query. This is safe since in fact the rule action
|
|
|
|
* won't write on them, and it's necessary because the rule action may
|
|
|
|
* have a different commandType than the main query, causing
|
|
|
|
* ExecCheckRTEPerms() to make an inappropriate check. The read-access
|
|
|
|
* checks can be left enabled, although they're probably redundant.
|
2000-12-05 20:15:10 +01:00
|
|
|
*/
|
2003-02-13 22:39:50 +01:00
|
|
|
main_rtable = (List *) copyObject(parsetree->rtable);
|
|
|
|
|
|
|
|
foreach(rt, main_rtable)
|
|
|
|
{
|
|
|
|
RangeTblEntry *rte = (RangeTblEntry *) lfirst(rt);
|
|
|
|
|
|
|
|
rte->checkForWrite = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub_action->rtable = nconc(main_rtable, sub_action->rtable);
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2000-12-05 20:15:10 +01:00
|
|
|
/*
|
|
|
|
* Each rule action's jointree should be the main parsetree's jointree
|
2001-03-22 05:01:46 +01:00
|
|
|
* plus that rule's jointree, but usually *without* the original
|
|
|
|
* rtindex that we're replacing (if present, which it won't be for
|
|
|
|
* INSERT). Note that if the rule action refers to OLD, its jointree
|
|
|
|
* will add a reference to rt_index. If the rule action doesn't refer
|
|
|
|
* to OLD, but either the rule_qual or the user query quals do, then
|
|
|
|
* we need to keep the original rtindex in the jointree to provide
|
|
|
|
* data for the quals. We don't want the original rtindex to be
|
|
|
|
* joined twice, however, so avoid keeping it if the rule action
|
|
|
|
* mentions it.
|
2001-06-12 20:54:22 +02:00
|
|
|
*
|
2001-10-25 07:50:21 +02:00
|
|
|
* As above, the action's jointree must not share substructure with the
|
|
|
|
* main parsetree's.
|
2000-12-05 20:15:10 +01:00
|
|
|
*/
|
2001-01-03 23:01:05 +01:00
|
|
|
if (sub_action->jointree != NULL)
|
2000-12-05 20:15:10 +01:00
|
|
|
{
|
2001-03-22 05:01:46 +01:00
|
|
|
bool keeporig;
|
|
|
|
List *newjointree;
|
2001-01-27 05:40:59 +01:00
|
|
|
|
2001-03-22 05:01:46 +01:00
|
|
|
keeporig = (!rangeTableEntry_used((Node *) sub_action->jointree,
|
|
|
|
rt_index, 0)) &&
|
2001-06-13 20:56:30 +02:00
|
|
|
(rangeTableEntry_used(rule_qual, rt_index, 0) ||
|
2001-10-25 07:50:21 +02:00
|
|
|
rangeTableEntry_used(parsetree->jointree->quals, rt_index, 0));
|
2001-01-27 05:40:59 +01:00
|
|
|
newjointree = adjustJoinTreeList(parsetree, !keeporig, rt_index);
|
2000-12-05 20:15:10 +01:00
|
|
|
sub_action->jointree->fromlist =
|
|
|
|
nconc(newjointree, sub_action->jointree->fromlist);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We copy the qualifications of the parsetree to the action and vice
|
|
|
|
* versa. So force hasSubLinks if one of them has it. If this is not
|
|
|
|
* right, the flag will get cleared later, but we mustn't risk having
|
2001-10-25 07:50:21 +02:00
|
|
|
* it not set when it needs to be. (XXX this should probably be
|
|
|
|
* handled by AddQual and friends, not here...)
|
2000-12-05 20:15:10 +01:00
|
|
|
*/
|
|
|
|
if (parsetree->hasSubLinks)
|
|
|
|
sub_action->hasSubLinks = TRUE;
|
|
|
|
else if (sub_action->hasSubLinks)
|
|
|
|
parsetree->hasSubLinks = TRUE;
|
|
|
|
|
|
|
|
/*
|
2001-03-22 05:01:46 +01:00
|
|
|
* Event Qualification forces copying of parsetree and splitting into
|
|
|
|
* two queries one w/rule_qual, one w/NOT rule_qual. Also add user
|
|
|
|
* query qual onto rule action
|
2000-12-05 20:15:10 +01:00
|
|
|
*/
|
2001-06-13 20:56:30 +02:00
|
|
|
AddQual(sub_action, rule_qual);
|
2000-12-05 20:15:10 +01:00
|
|
|
|
|
|
|
AddQual(sub_action, parsetree->jointree->quals);
|
|
|
|
|
|
|
|
/*
|
2001-03-22 05:01:46 +01:00
|
|
|
* Rewrite new.attribute w/ right hand side of target-list entry for
|
|
|
|
* appropriate field name in insert/update.
|
2000-12-05 20:15:10 +01:00
|
|
|
*
|
|
|
|
* KLUGE ALERT: since ResolveNew returns a mutated copy, we can't just
|
|
|
|
* apply it to sub_action; we have to remember to update the sublink
|
2001-06-13 20:56:30 +02:00
|
|
|
* inside rule_action, too.
|
2000-12-05 20:15:10 +01:00
|
|
|
*/
|
2001-06-13 20:56:30 +02:00
|
|
|
if (event == CMD_INSERT || event == CMD_UPDATE)
|
2000-12-05 20:15:10 +01:00
|
|
|
{
|
|
|
|
sub_action = (Query *) ResolveNew((Node *) sub_action,
|
2001-06-13 20:56:30 +02:00
|
|
|
new_varno,
|
2000-12-05 20:15:10 +01:00
|
|
|
0,
|
|
|
|
parsetree->targetList,
|
2001-06-13 20:56:30 +02:00
|
|
|
event,
|
|
|
|
current_varno);
|
2000-12-05 20:15:10 +01:00
|
|
|
if (sub_action_ptr)
|
|
|
|
*sub_action_ptr = sub_action;
|
|
|
|
else
|
2001-06-13 20:56:30 +02:00
|
|
|
rule_action = sub_action;
|
1997-09-07 07:04:48 +02:00
|
|
|
}
|
2000-12-05 20:15:10 +01:00
|
|
|
|
2001-06-13 20:56:30 +02:00
|
|
|
return rule_action;
|
1996-07-09 08:22:35 +02:00
|
|
|
}
|
|
|
|
|
1998-10-02 18:28:04 +02:00
|
|
|
/*
|
2001-01-27 05:40:59 +01:00
|
|
|
* Copy the query's jointree list, and optionally attempt to remove any
|
|
|
|
* occurrence of the given rt_index as a top-level join item (we do not look
|
|
|
|
* for it within join items; this is OK because we are only expecting to find
|
|
|
|
* it as an UPDATE or DELETE target relation, which will be at the top level
|
2001-06-12 20:54:22 +02:00
|
|
|
* of the join). Returns modified jointree list --- this is a separate copy
|
|
|
|
* sharing no nodes with the original.
|
1996-07-09 08:22:35 +02:00
|
|
|
*/
|
2000-09-12 23:07:18 +02:00
|
|
|
static List *
|
2001-01-27 05:40:59 +01:00
|
|
|
adjustJoinTreeList(Query *parsetree, bool removert, int rt_index)
|
2000-04-12 19:17:23 +02:00
|
|
|
{
|
2001-06-12 20:54:22 +02:00
|
|
|
List *newjointree = copyObject(parsetree->jointree->fromlist);
|
2000-09-12 23:07:18 +02:00
|
|
|
List *jjt;
|
1999-10-01 06:08:24 +02:00
|
|
|
|
2001-01-27 05:40:59 +01:00
|
|
|
if (removert)
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
2001-01-27 05:40:59 +01:00
|
|
|
foreach(jjt, newjointree)
|
2000-09-12 23:07:18 +02:00
|
|
|
{
|
2001-01-27 05:40:59 +01:00
|
|
|
RangeTblRef *rtr = lfirst(jjt);
|
|
|
|
|
2002-12-17 02:18:35 +01:00
|
|
|
if (IsA(rtr, RangeTblRef) &&
|
|
|
|
rtr->rtindex == rt_index)
|
2001-01-27 05:40:59 +01:00
|
|
|
{
|
|
|
|
newjointree = lremove(rtr, newjointree);
|
2002-12-17 02:18:35 +01:00
|
|
|
/* foreach is safe because we exit loop after lremove... */
|
2001-01-27 05:40:59 +01:00
|
|
|
break;
|
|
|
|
}
|
2000-09-12 23:07:18 +02:00
|
|
|
}
|
1996-07-09 08:22:35 +02:00
|
|
|
}
|
2000-09-12 23:07:18 +02:00
|
|
|
return newjointree;
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
1998-08-24 03:38:11 +02:00
|
|
|
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2002-04-05 07:47:05 +02:00
|
|
|
/*
|
|
|
|
* rewriteTargetList - rewrite INSERT/UPDATE targetlist into standard form
|
|
|
|
*
|
|
|
|
* This has the following responsibilities:
|
|
|
|
*
|
|
|
|
* 1. For an INSERT, add tlist entries to compute default values for any
|
|
|
|
* attributes that have defaults and are not assigned to in the given tlist.
|
|
|
|
* (We do not insert anything for default-less attributes, however. The
|
|
|
|
* planner will later insert NULLs for them, but there's no reason to slow
|
|
|
|
* down rewriter processing with extra tlist nodes.)
|
|
|
|
*
|
|
|
|
* 2. Merge multiple entries for the same target attribute, or declare error
|
|
|
|
* if we can't. Presently, multiple entries are only allowed for UPDATE of
|
|
|
|
* an array field, for example "UPDATE table SET foo[2] = 42, foo[4] = 43".
|
|
|
|
* We can merge such operations into a single assignment op. Essentially,
|
|
|
|
* the expression we want to produce in this case is like
|
|
|
|
* foo = array_set(array_set(foo, 2, 42), 4, 43)
|
|
|
|
*
|
|
|
|
* 3. Sort the tlist into standard order: non-junk fields in order by resno,
|
|
|
|
* then junk fields (these in no particular order).
|
|
|
|
*
|
|
|
|
* We must do items 1 and 2 before firing rewrite rules, else rewritten
|
2002-09-04 22:31:48 +02:00
|
|
|
* references to NEW.foo will produce wrong or incomplete results. Item 3
|
2002-04-05 07:47:05 +02:00
|
|
|
* is not needed for rewriting, but will be needed by the planner, and we
|
|
|
|
* can do it essentially for free while handling items 1 and 2.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
rewriteTargetList(Query *parsetree, Relation target_relation)
|
|
|
|
{
|
|
|
|
CmdType commandType = parsetree->commandType;
|
|
|
|
List *tlist = parsetree->targetList;
|
|
|
|
List *new_tlist = NIL;
|
|
|
|
int attrno,
|
|
|
|
numattrs;
|
|
|
|
List *temp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Scan the tuple description in the relation's relcache entry to make
|
|
|
|
* sure we have all the user attributes in the right order.
|
|
|
|
*/
|
|
|
|
numattrs = RelationGetNumberOfAttributes(target_relation);
|
|
|
|
|
|
|
|
for (attrno = 1; attrno <= numattrs; attrno++)
|
|
|
|
{
|
2002-09-04 22:31:48 +02:00
|
|
|
Form_pg_attribute att_tup = target_relation->rd_att->attrs[attrno - 1];
|
2002-04-05 07:47:05 +02:00
|
|
|
TargetEntry *new_tle = NULL;
|
|
|
|
|
2002-08-02 20:15:10 +02:00
|
|
|
/* We can ignore deleted attributes */
|
|
|
|
if (att_tup->attisdropped)
|
|
|
|
continue;
|
|
|
|
|
2002-04-05 07:47:05 +02:00
|
|
|
/*
|
2002-09-04 22:31:48 +02:00
|
|
|
* Look for targetlist entries matching this attr. We match by
|
2002-04-05 07:47:05 +02:00
|
|
|
* resno, but the resname should match too.
|
|
|
|
*
|
|
|
|
* Junk attributes are not candidates to be matched.
|
|
|
|
*/
|
|
|
|
foreach(temp, tlist)
|
|
|
|
{
|
|
|
|
TargetEntry *old_tle = (TargetEntry *) lfirst(temp);
|
|
|
|
Resdom *resdom = old_tle->resdom;
|
|
|
|
|
|
|
|
if (!resdom->resjunk && resdom->resno == attrno)
|
|
|
|
{
|
|
|
|
Assert(strcmp(resdom->resname,
|
|
|
|
NameStr(att_tup->attname)) == 0);
|
|
|
|
new_tle = process_matched_tle(old_tle, new_tle);
|
|
|
|
/* keep scanning to detect multiple assignments to attr */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (new_tle == NULL && commandType == CMD_INSERT)
|
|
|
|
{
|
|
|
|
/*
|
2002-09-04 22:31:48 +02:00
|
|
|
* Didn't find a matching tlist entry; if it's an INSERT, look
|
|
|
|
* for a default value, and add a tlist entry computing the
|
|
|
|
* default if we find one.
|
2002-04-05 07:47:05 +02:00
|
|
|
*/
|
|
|
|
Node *new_expr;
|
|
|
|
|
|
|
|
new_expr = build_column_default(target_relation, attrno);
|
|
|
|
|
|
|
|
if (new_expr)
|
|
|
|
new_tle = makeTargetEntry(makeResdom(attrno,
|
|
|
|
att_tup->atttypid,
|
|
|
|
att_tup->atttypmod,
|
2002-09-04 22:31:48 +02:00
|
|
|
pstrdup(NameStr(att_tup->attname)),
|
2002-04-05 07:47:05 +02:00
|
|
|
false),
|
2002-12-12 16:49:42 +01:00
|
|
|
(Expr *) new_expr);
|
2002-04-05 07:47:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (new_tle)
|
|
|
|
new_tlist = lappend(new_tlist, new_tle);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy all resjunk tlist entries to the end of the new tlist, and
|
|
|
|
* assign them resnos above the last real resno.
|
|
|
|
*
|
|
|
|
* Typical junk entries include ORDER BY or GROUP BY expressions (are
|
|
|
|
* these actually possible in an INSERT or UPDATE?), system attribute
|
|
|
|
* references, etc.
|
|
|
|
*/
|
|
|
|
foreach(temp, tlist)
|
|
|
|
{
|
|
|
|
TargetEntry *old_tle = (TargetEntry *) lfirst(temp);
|
|
|
|
Resdom *resdom = old_tle->resdom;
|
|
|
|
|
|
|
|
if (resdom->resjunk)
|
|
|
|
{
|
|
|
|
/* Get the resno right, but don't copy unnecessarily */
|
|
|
|
if (resdom->resno != attrno)
|
|
|
|
{
|
|
|
|
resdom = (Resdom *) copyObject((Node *) resdom);
|
|
|
|
resdom->resno = attrno;
|
|
|
|
old_tle = makeTargetEntry(resdom, old_tle->expr);
|
|
|
|
}
|
|
|
|
new_tlist = lappend(new_tlist, old_tle);
|
|
|
|
attrno++;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Let's just make sure we processed all the non-junk items */
|
|
|
|
if (resdom->resno < 1 || resdom->resno > numattrs)
|
|
|
|
elog(ERROR, "rewriteTargetList: bogus resno %d in targetlist",
|
|
|
|
resdom->resno);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
parsetree->targetList = new_tlist;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Convert a matched TLE from the original tlist into a correct new TLE.
|
|
|
|
*
|
|
|
|
* This routine detects and handles multiple assignments to the same target
|
|
|
|
* attribute.
|
|
|
|
*/
|
|
|
|
static TargetEntry *
|
|
|
|
process_matched_tle(TargetEntry *src_tle,
|
|
|
|
TargetEntry *prior_tle)
|
|
|
|
{
|
|
|
|
Resdom *resdom = src_tle->resdom;
|
|
|
|
Node *priorbottom;
|
|
|
|
ArrayRef *newexpr;
|
|
|
|
|
|
|
|
if (prior_tle == NULL)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Normal case where this is the first assignment to the
|
|
|
|
* attribute.
|
|
|
|
*/
|
|
|
|
return src_tle;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Multiple assignments to same attribute. Allow only if all are
|
|
|
|
* array-assign operators with same bottom array object.
|
|
|
|
*/
|
|
|
|
if (src_tle->expr == NULL || !IsA(src_tle->expr, ArrayRef) ||
|
|
|
|
((ArrayRef *) src_tle->expr)->refassgnexpr == NULL ||
|
|
|
|
prior_tle->expr == NULL || !IsA(prior_tle->expr, ArrayRef) ||
|
|
|
|
((ArrayRef *) prior_tle->expr)->refassgnexpr == NULL ||
|
2002-08-26 19:54:02 +02:00
|
|
|
((ArrayRef *) src_tle->expr)->refrestype !=
|
|
|
|
((ArrayRef *) prior_tle->expr)->refrestype)
|
2002-04-05 07:47:05 +02:00
|
|
|
elog(ERROR, "Multiple assignments to same attribute \"%s\"",
|
|
|
|
resdom->resname);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Prior TLE could be a nest of ArrayRefs if we do this more than
|
|
|
|
* once.
|
|
|
|
*/
|
2002-12-12 16:49:42 +01:00
|
|
|
priorbottom = (Node *) ((ArrayRef *) prior_tle->expr)->refexpr;
|
2002-04-05 07:47:05 +02:00
|
|
|
while (priorbottom != NULL && IsA(priorbottom, ArrayRef) &&
|
|
|
|
((ArrayRef *) priorbottom)->refassgnexpr != NULL)
|
2002-12-12 16:49:42 +01:00
|
|
|
priorbottom = (Node *) ((ArrayRef *) priorbottom)->refexpr;
|
2002-04-05 07:47:05 +02:00
|
|
|
if (!equal(priorbottom, ((ArrayRef *) src_tle->expr)->refexpr))
|
|
|
|
elog(ERROR, "Multiple assignments to same attribute \"%s\"",
|
|
|
|
resdom->resname);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Looks OK to nest 'em.
|
|
|
|
*/
|
|
|
|
newexpr = makeNode(ArrayRef);
|
|
|
|
memcpy(newexpr, src_tle->expr, sizeof(ArrayRef));
|
|
|
|
newexpr->refexpr = prior_tle->expr;
|
|
|
|
|
2002-12-12 16:49:42 +01:00
|
|
|
return makeTargetEntry(resdom, (Expr *) newexpr);
|
2002-04-05 07:47:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Make an expression tree for the default value for a column.
|
|
|
|
*
|
|
|
|
* If there is no default, return a NULL instead.
|
|
|
|
*/
|
2002-07-18 06:43:51 +02:00
|
|
|
Node *
|
2002-04-05 07:47:05 +02:00
|
|
|
build_column_default(Relation rel, int attrno)
|
|
|
|
{
|
|
|
|
TupleDesc rd_att = rel->rd_att;
|
|
|
|
Form_pg_attribute att_tup = rd_att->attrs[attrno - 1];
|
|
|
|
Oid atttype = att_tup->atttypid;
|
|
|
|
int32 atttypmod = att_tup->atttypmod;
|
|
|
|
Node *expr = NULL;
|
|
|
|
Oid exprtype;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Scan to see if relation has a default for this column.
|
|
|
|
*/
|
|
|
|
if (rd_att->constr && rd_att->constr->num_defval > 0)
|
|
|
|
{
|
|
|
|
AttrDefault *defval = rd_att->constr->defval;
|
|
|
|
int ndef = rd_att->constr->num_defval;
|
|
|
|
|
|
|
|
while (--ndef >= 0)
|
|
|
|
{
|
|
|
|
if (attrno == defval[ndef].adnum)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Found it, convert string representation to node tree.
|
|
|
|
*/
|
|
|
|
expr = stringToNode(defval[ndef].adbin);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (expr == NULL)
|
|
|
|
{
|
|
|
|
/*
|
2002-09-04 22:31:48 +02:00
|
|
|
* No per-column default, so look for a default for the type
|
|
|
|
* itself.
|
2002-04-05 07:47:05 +02:00
|
|
|
*/
|
|
|
|
if (att_tup->attisset)
|
|
|
|
{
|
|
|
|
/*
|
2002-09-04 22:31:48 +02:00
|
|
|
* Set attributes are represented as OIDs no matter what the
|
|
|
|
* set element type is, and the element type's default is
|
|
|
|
* irrelevant too.
|
2002-04-05 07:47:05 +02:00
|
|
|
*/
|
|
|
|
}
|
|
|
|
else
|
|
|
|
expr = get_typdefault(atttype);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (expr == NULL)
|
|
|
|
return NULL; /* No default anywhere */
|
|
|
|
|
|
|
|
/*
|
2002-09-04 22:31:48 +02:00
|
|
|
* Make sure the value is coerced to the target column type (might not
|
|
|
|
* be right type yet if it's not a constant!) This should match the
|
|
|
|
* parser's processing of non-defaulted expressions --- see
|
2002-04-05 07:47:05 +02:00
|
|
|
* updateTargetListEntry().
|
|
|
|
*/
|
|
|
|
exprtype = exprType(expr);
|
|
|
|
|
2003-04-30 00:13:11 +02:00
|
|
|
expr = coerce_to_target_type(NULL, /* no UNKNOWN params here */
|
|
|
|
expr, exprtype,
|
Extend pg_cast castimplicit column to a three-way value; this allows us
to be flexible about assignment casts without introducing ambiguity in
operator/function resolution. Introduce a well-defined promotion hierarchy
for numeric datatypes (int2->int4->int8->numeric->float4->float8).
Change make_const to initially label numeric literals as int4, int8, or
numeric (never float8 anymore).
Explicitly mark Func and RelabelType nodes to indicate whether they came
from a function call, explicit cast, or implicit cast; use this to do
reverse-listing more accurately and without so many heuristics.
Explicit casts to char, varchar, bit, varbit will truncate or pad without
raising an error (the pre-7.2 behavior), while assigning to a column without
any explicit cast will still raise an error for wrong-length data like 7.3.
This more nearly follows the SQL spec than 7.2 behavior (we should be
reporting a 'completion condition' in the explicit-cast cases, but we have
no mechanism for that, so just do silent truncation).
Fix some problems with enforcement of typmod for array elements;
it didn't work at all in 'UPDATE ... SET array[n] = foo', for example.
Provide a generalized array_length_coerce() function to replace the
specialized per-array-type functions that used to be needed (and were
missing for NUMERIC as well as all the datetime types).
Add missing conversions int8<->float4, text<->numeric, oid<->int8.
initdb forced.
2002-09-18 23:35:25 +02:00
|
|
|
atttype, atttypmod,
|
|
|
|
COERCION_ASSIGNMENT,
|
|
|
|
COERCE_IMPLICIT_CAST);
|
2002-04-05 07:47:05 +02:00
|
|
|
/*
|
Extend pg_cast castimplicit column to a three-way value; this allows us
to be flexible about assignment casts without introducing ambiguity in
operator/function resolution. Introduce a well-defined promotion hierarchy
for numeric datatypes (int2->int4->int8->numeric->float4->float8).
Change make_const to initially label numeric literals as int4, int8, or
numeric (never float8 anymore).
Explicitly mark Func and RelabelType nodes to indicate whether they came
from a function call, explicit cast, or implicit cast; use this to do
reverse-listing more accurately and without so many heuristics.
Explicit casts to char, varchar, bit, varbit will truncate or pad without
raising an error (the pre-7.2 behavior), while assigning to a column without
any explicit cast will still raise an error for wrong-length data like 7.3.
This more nearly follows the SQL spec than 7.2 behavior (we should be
reporting a 'completion condition' in the explicit-cast cases, but we have
no mechanism for that, so just do silent truncation).
Fix some problems with enforcement of typmod for array elements;
it didn't work at all in 'UPDATE ... SET array[n] = foo', for example.
Provide a generalized array_length_coerce() function to replace the
specialized per-array-type functions that used to be needed (and were
missing for NUMERIC as well as all the datetime types).
Add missing conversions int8<->float4, text<->numeric, oid<->int8.
initdb forced.
2002-09-18 23:35:25 +02:00
|
|
|
* This really shouldn't fail; should have checked the default's
|
|
|
|
* type when it was created ...
|
2002-04-05 07:47:05 +02:00
|
|
|
*/
|
Extend pg_cast castimplicit column to a three-way value; this allows us
to be flexible about assignment casts without introducing ambiguity in
operator/function resolution. Introduce a well-defined promotion hierarchy
for numeric datatypes (int2->int4->int8->numeric->float4->float8).
Change make_const to initially label numeric literals as int4, int8, or
numeric (never float8 anymore).
Explicitly mark Func and RelabelType nodes to indicate whether they came
from a function call, explicit cast, or implicit cast; use this to do
reverse-listing more accurately and without so many heuristics.
Explicit casts to char, varchar, bit, varbit will truncate or pad without
raising an error (the pre-7.2 behavior), while assigning to a column without
any explicit cast will still raise an error for wrong-length data like 7.3.
This more nearly follows the SQL spec than 7.2 behavior (we should be
reporting a 'completion condition' in the explicit-cast cases, but we have
no mechanism for that, so just do silent truncation).
Fix some problems with enforcement of typmod for array elements;
it didn't work at all in 'UPDATE ... SET array[n] = foo', for example.
Provide a generalized array_length_coerce() function to replace the
specialized per-array-type functions that used to be needed (and were
missing for NUMERIC as well as all the datetime types).
Add missing conversions int8<->float4, text<->numeric, oid<->int8.
initdb forced.
2002-09-18 23:35:25 +02:00
|
|
|
if (expr == NULL)
|
|
|
|
elog(ERROR, "Column \"%s\" is of type %s"
|
|
|
|
" but default expression is of type %s"
|
|
|
|
"\n\tYou will need to rewrite or cast the expression",
|
|
|
|
NameStr(att_tup->attname),
|
|
|
|
format_type_be(atttype),
|
|
|
|
format_type_be(exprtype));
|
2002-04-05 07:47:05 +02:00
|
|
|
|
|
|
|
return expr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-10-02 18:28:04 +02:00
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* matchLocks -
|
|
|
|
* match the list of locks and returns the matching rules
|
1998-10-02 18:28:04 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
static List *
|
|
|
|
matchLocks(CmdType event,
|
|
|
|
RuleLock *rulelocks,
|
|
|
|
int varno,
|
|
|
|
Query *parsetree)
|
2000-04-12 19:17:23 +02:00
|
|
|
{
|
2002-10-19 21:00:47 +02:00
|
|
|
List *matching_locks = NIL;
|
2000-09-29 20:21:41 +02:00
|
|
|
int nlocks;
|
|
|
|
int i;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
if (rulelocks == NULL)
|
|
|
|
return NIL;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
if (parsetree->commandType != CMD_SELECT)
|
1999-10-01 06:08:24 +02:00
|
|
|
{
|
2000-09-29 20:21:41 +02:00
|
|
|
if (parsetree->resultRelation != varno)
|
|
|
|
return NIL;
|
1999-10-01 06:08:24 +02:00
|
|
|
}
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
nlocks = rulelocks->numLocks;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
for (i = 0; i < nlocks; i++)
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
2000-09-29 20:21:41 +02:00
|
|
|
RewriteRule *oneLock = rulelocks->rules[i];
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
if (oneLock->event == event)
|
1999-11-15 03:00:15 +01:00
|
|
|
{
|
2000-09-29 20:21:41 +02:00
|
|
|
if (parsetree->commandType != CMD_SELECT ||
|
|
|
|
(oneLock->attrno == -1 ?
|
|
|
|
rangeTableEntry_used((Node *) parsetree, varno, 0) :
|
|
|
|
attribute_used((Node *) parsetree,
|
|
|
|
varno, oneLock->attrno, 0)))
|
2002-10-19 21:00:47 +02:00
|
|
|
matching_locks = lappend(matching_locks, oneLock);
|
1999-11-15 03:00:15 +01:00
|
|
|
}
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
2000-09-29 20:21:41 +02:00
|
|
|
|
2002-10-19 21:00:47 +02:00
|
|
|
return matching_locks;
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
|
|
|
|
2000-04-12 19:17:23 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
static Query *
|
|
|
|
ApplyRetrieveRule(Query *parsetree,
|
|
|
|
RewriteRule *rule,
|
|
|
|
int rt_index,
|
|
|
|
bool relation_level,
|
|
|
|
Relation relation,
|
2003-02-26 00:47:43 +01:00
|
|
|
bool relIsUsed,
|
|
|
|
List *activeRIRs)
|
2000-09-29 20:21:41 +02:00
|
|
|
{
|
|
|
|
Query *rule_action;
|
|
|
|
RangeTblEntry *rte,
|
|
|
|
*subrte;
|
2000-04-12 19:17:23 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
if (length(rule->actions) != 1)
|
|
|
|
elog(ERROR, "ApplyRetrieveRule: expected just one rule action");
|
|
|
|
if (rule->qual != NULL)
|
|
|
|
elog(ERROR, "ApplyRetrieveRule: can't handle qualified ON SELECT rule");
|
2001-03-22 05:01:46 +01:00
|
|
|
if (!relation_level)
|
2000-09-29 20:21:41 +02:00
|
|
|
elog(ERROR, "ApplyRetrieveRule: can't handle per-attribute ON SELECT rule");
|
2000-04-12 19:17:23 +02:00
|
|
|
|
1999-10-02 06:42:04 +02:00
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* Make a modifiable copy of the view query, and recursively expand
|
|
|
|
* any view references inside it.
|
1999-10-02 06:42:04 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
rule_action = copyObject(lfirst(rule->actions));
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
rule_action = fireRIRrules(rule_action, activeRIRs);
|
1999-11-15 03:00:15 +01:00
|
|
|
|
2000-04-12 19:17:23 +02:00
|
|
|
/*
|
2001-03-22 05:01:46 +01:00
|
|
|
* VIEWs are really easy --- just plug the view query in as a
|
|
|
|
* subselect, replacing the relation's original RTE.
|
1999-10-01 06:08:24 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
rte = rt_fetch(rt_index, parsetree->rtable);
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2002-03-12 01:52:10 +01:00
|
|
|
rte->rtekind = RTE_SUBQUERY;
|
2000-09-29 20:21:41 +02:00
|
|
|
rte->relid = InvalidOid;
|
|
|
|
rte->subquery = rule_action;
|
|
|
|
rte->inh = false; /* must not be set for a subquery */
|
2000-04-12 19:17:23 +02:00
|
|
|
|
1999-11-15 03:00:15 +01:00
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* We move the view's permission check data down to its rangetable.
|
|
|
|
* The checks will actually be done against the *OLD* entry therein.
|
1999-10-01 06:08:24 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
subrte = rt_fetch(PRS2_OLD_VARNO, rule_action->rtable);
|
|
|
|
Assert(subrte->relid == relation->rd_id);
|
|
|
|
subrte->checkForRead = rte->checkForRead;
|
|
|
|
subrte->checkForWrite = rte->checkForWrite;
|
2001-05-03 19:47:49 +02:00
|
|
|
subrte->checkAsUser = rte->checkAsUser;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
rte->checkForRead = false; /* no permission check on subquery itself */
|
|
|
|
rte->checkForWrite = false;
|
2001-05-03 19:47:49 +02:00
|
|
|
rte->checkAsUser = InvalidOid;
|
2000-04-12 19:17:23 +02:00
|
|
|
|
1999-10-01 06:08:24 +02:00
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* FOR UPDATE of view?
|
1999-10-01 06:08:24 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
if (intMember(rt_index, parsetree->rowMarks))
|
1999-10-01 06:08:24 +02:00
|
|
|
{
|
2000-09-12 23:07:18 +02:00
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* Remove the view from the list of rels that will actually be
|
|
|
|
* marked FOR UPDATE by the executor. It will still be access-
|
|
|
|
* checked for write access, though.
|
2000-09-12 23:07:18 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
parsetree->rowMarks = lremovei(rt_index, parsetree->rowMarks);
|
1999-05-25 18:15:34 +02:00
|
|
|
|
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* Set up the view's referenced tables as if FOR UPDATE.
|
1999-01-21 17:08:55 +01:00
|
|
|
*/
|
2000-12-07 02:22:25 +01:00
|
|
|
markQueryForUpdate(rule_action, true);
|
1999-01-21 17:08:55 +01:00
|
|
|
}
|
|
|
|
|
1999-10-01 06:08:24 +02:00
|
|
|
return parsetree;
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
|
|
|
|
2000-12-07 02:22:25 +01:00
|
|
|
/*
|
|
|
|
* Recursively mark all relations used by a view as FOR UPDATE.
|
|
|
|
*
|
|
|
|
* This may generate an invalid query, eg if some sub-query uses an
|
|
|
|
* aggregate. We leave it to the planner to detect that.
|
|
|
|
*
|
|
|
|
* NB: this must agree with the parser's transformForUpdate() routine.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
markQueryForUpdate(Query *qry, bool skipOldNew)
|
|
|
|
{
|
|
|
|
Index rti = 0;
|
|
|
|
List *l;
|
|
|
|
|
|
|
|
foreach(l, qry->rtable)
|
|
|
|
{
|
|
|
|
RangeTblEntry *rte = (RangeTblEntry *) lfirst(l);
|
|
|
|
|
|
|
|
rti++;
|
|
|
|
|
|
|
|
/* Ignore OLD and NEW entries if we are at top level of view */
|
|
|
|
if (skipOldNew &&
|
|
|
|
(rti == PRS2_OLD_VARNO || rti == PRS2_NEW_VARNO))
|
|
|
|
continue;
|
|
|
|
|
2002-03-12 01:52:10 +01:00
|
|
|
if (rte->rtekind == RTE_RELATION)
|
2000-12-07 02:22:25 +01:00
|
|
|
{
|
|
|
|
if (!intMember(rti, qry->rowMarks))
|
|
|
|
qry->rowMarks = lappendi(qry->rowMarks, rti);
|
|
|
|
rte->checkForWrite = true;
|
|
|
|
}
|
2002-03-12 01:52:10 +01:00
|
|
|
else if (rte->rtekind == RTE_SUBQUERY)
|
|
|
|
{
|
|
|
|
/* FOR UPDATE of subquery is propagated to subquery's rels */
|
|
|
|
markQueryForUpdate(rte->subquery, false);
|
|
|
|
}
|
2000-12-07 02:22:25 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1998-10-02 18:28:04 +02:00
|
|
|
|
1999-10-01 06:08:24 +02:00
|
|
|
/*
|
2000-09-29 20:21:41 +02:00
|
|
|
* fireRIRonSubLink -
|
|
|
|
* Apply fireRIRrules() to each SubLink (subselect in expression) found
|
|
|
|
* in the given tree.
|
1999-10-01 06:08:24 +02:00
|
|
|
*
|
|
|
|
* NOTE: although this has the form of a walker, we cheat and modify the
|
2000-04-12 19:17:23 +02:00
|
|
|
* SubLink nodes in-place. It is caller's responsibility to ensure that
|
1999-10-01 06:08:24 +02:00
|
|
|
* no unwanted side-effects occur!
|
2000-09-12 23:07:18 +02:00
|
|
|
*
|
|
|
|
* This is unlike most of the other routines that recurse into subselects,
|
|
|
|
* because we must take control at the SubLink node in order to replace
|
|
|
|
* the SubLink's subselect link with the possibly-rewritten subquery.
|
1999-10-01 06:08:24 +02:00
|
|
|
*/
|
|
|
|
static bool
|
2003-02-26 00:47:43 +01:00
|
|
|
fireRIRonSubLink(Node *node, List *activeRIRs)
|
1998-10-02 18:28:04 +02:00
|
|
|
{
|
|
|
|
if (node == NULL)
|
1999-10-01 06:08:24 +02:00
|
|
|
return false;
|
|
|
|
if (IsA(node, SubLink))
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
1999-10-01 06:08:24 +02:00
|
|
|
SubLink *sub = (SubLink *) node;
|
|
|
|
|
|
|
|
/* Do what we came for */
|
2003-02-26 00:47:43 +01:00
|
|
|
sub->subselect = (Node *) fireRIRrules((Query *) sub->subselect,
|
|
|
|
activeRIRs);
|
2000-09-12 23:07:18 +02:00
|
|
|
/* Fall through to process lefthand args of SubLink */
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
2001-03-22 05:01:46 +01:00
|
|
|
|
2000-09-12 23:07:18 +02:00
|
|
|
/*
|
|
|
|
* Do NOT recurse into Query nodes, because fireRIRrules already
|
2000-09-29 20:21:41 +02:00
|
|
|
* processed subselects of subselects for us.
|
2000-09-12 23:07:18 +02:00
|
|
|
*/
|
2000-09-29 20:21:41 +02:00
|
|
|
return expression_tree_walker(node, fireRIRonSubLink,
|
2003-02-26 00:47:43 +01:00
|
|
|
(void *) activeRIRs);
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* fireRIRrules -
|
|
|
|
* Apply all RIR rules on each rangetable entry in a query
|
|
|
|
*/
|
|
|
|
static Query *
|
2003-02-26 00:47:43 +01:00
|
|
|
fireRIRrules(Query *parsetree, List *activeRIRs)
|
1998-10-02 18:28:04 +02:00
|
|
|
{
|
1999-05-25 18:15:34 +02:00
|
|
|
int rt_index;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-04-12 19:17:23 +02:00
|
|
|
/*
|
|
|
|
* don't try to convert this into a foreach loop, because rtable list
|
|
|
|
* can get changed each time through...
|
1999-10-07 06:23:24 +02:00
|
|
|
*/
|
1998-10-02 18:28:04 +02:00
|
|
|
rt_index = 0;
|
1999-05-25 18:15:34 +02:00
|
|
|
while (rt_index < length(parsetree->rtable))
|
|
|
|
{
|
2000-11-08 23:10:03 +01:00
|
|
|
RangeTblEntry *rte;
|
|
|
|
Relation rel;
|
|
|
|
List *locks;
|
|
|
|
RuleLock *rules;
|
|
|
|
RewriteRule *rule;
|
|
|
|
LOCKMODE lockmode;
|
|
|
|
bool relIsUsed;
|
|
|
|
int i;
|
|
|
|
|
1998-10-02 18:28:04 +02:00
|
|
|
++rt_index;
|
|
|
|
|
1999-11-01 06:18:31 +01:00
|
|
|
rte = rt_fetch(rt_index, parsetree->rtable);
|
1999-05-25 15:16:10 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
/*
|
|
|
|
* A subquery RTE can't have associated rules, so there's nothing
|
|
|
|
* to do to this level of the query, but we must recurse into the
|
|
|
|
* subquery to expand any rule references in it.
|
|
|
|
*/
|
2002-03-12 01:52:10 +01:00
|
|
|
if (rte->rtekind == RTE_SUBQUERY)
|
2000-09-29 20:21:41 +02:00
|
|
|
{
|
2003-02-26 00:47:43 +01:00
|
|
|
rte->subquery = fireRIRrules(rte->subquery, activeRIRs);
|
2000-09-29 20:21:41 +02:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2002-03-12 01:52:10 +01:00
|
|
|
/*
|
|
|
|
* Joins and other non-relation RTEs can be ignored completely.
|
|
|
|
*/
|
|
|
|
if (rte->rtekind != RTE_RELATION)
|
|
|
|
continue;
|
|
|
|
|
1999-10-07 06:23:24 +02:00
|
|
|
/*
|
2000-04-20 02:31:49 +02:00
|
|
|
* If the table is not referenced in the query, then we ignore it.
|
|
|
|
* This prevents infinite expansion loop due to new rtable entries
|
|
|
|
* inserted by expansion of a rule. A table is referenced if it is
|
2000-09-12 23:07:18 +02:00
|
|
|
* part of the join set (a source table), or is referenced by any
|
|
|
|
* Var nodes, or is the result table.
|
1999-10-07 06:23:24 +02:00
|
|
|
*/
|
2000-09-12 23:07:18 +02:00
|
|
|
relIsUsed = rangeTableEntry_used((Node *) parsetree, rt_index, 0);
|
|
|
|
|
|
|
|
if (!relIsUsed && rt_index != parsetree->resultRelation)
|
1998-10-02 18:28:04 +02:00
|
|
|
continue;
|
1999-05-25 18:15:34 +02:00
|
|
|
|
2000-11-08 23:10:03 +01:00
|
|
|
/*
|
2001-03-22 05:01:46 +01:00
|
|
|
* This may well be the first access to the relation during the
|
|
|
|
* current statement (it will be, if this Query was extracted from
|
|
|
|
* a rule or somehow got here other than via the parser).
|
|
|
|
* Therefore, grab the appropriate lock type for the relation, and
|
|
|
|
* do not release it until end of transaction. This protects the
|
|
|
|
* rewriter and planner against schema changes mid-query.
|
2000-11-08 23:10:03 +01:00
|
|
|
*
|
2001-03-22 05:01:46 +01:00
|
|
|
* If the relation is the query's result relation, then
|
|
|
|
* RewriteQuery() already got the right lock on it, so we need no
|
|
|
|
* additional lock. Otherwise, check to see if the relation is
|
|
|
|
* accessed FOR UPDATE or not.
|
2000-11-08 23:10:03 +01:00
|
|
|
*/
|
|
|
|
if (rt_index == parsetree->resultRelation)
|
|
|
|
lockmode = NoLock;
|
|
|
|
else if (intMember(rt_index, parsetree->rowMarks))
|
|
|
|
lockmode = RowShareLock;
|
|
|
|
else
|
|
|
|
lockmode = AccessShareLock;
|
|
|
|
|
2002-03-22 03:56:37 +01:00
|
|
|
rel = heap_open(rte->relid, lockmode);
|
2001-04-17 02:32:58 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Collect the RIR rules that we must apply
|
|
|
|
*/
|
1999-10-07 06:23:24 +02:00
|
|
|
rules = rel->rd_rules;
|
|
|
|
if (rules == NULL)
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
2000-11-08 23:10:03 +01:00
|
|
|
heap_close(rel, NoLock);
|
1998-10-02 18:28:04 +02:00
|
|
|
continue;
|
|
|
|
}
|
1999-10-07 06:23:24 +02:00
|
|
|
locks = NIL;
|
1999-05-25 18:15:34 +02:00
|
|
|
for (i = 0; i < rules->numLocks; i++)
|
|
|
|
{
|
1998-10-02 18:28:04 +02:00
|
|
|
rule = rules->rules[i];
|
|
|
|
if (rule->event != CMD_SELECT)
|
|
|
|
continue;
|
1999-05-25 18:15:34 +02:00
|
|
|
|
1999-10-07 06:23:24 +02:00
|
|
|
if (rule->attrno > 0)
|
|
|
|
{
|
|
|
|
/* per-attr rule; do we need it? */
|
2000-09-12 23:07:18 +02:00
|
|
|
if (!attribute_used((Node *) parsetree, rt_index,
|
2000-04-12 19:17:23 +02:00
|
|
|
rule->attrno, 0))
|
1999-10-07 06:23:24 +02:00
|
|
|
continue;
|
|
|
|
}
|
1998-10-02 18:28:04 +02:00
|
|
|
|
|
|
|
locks = lappend(locks, rule);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2003-02-26 00:47:43 +01:00
|
|
|
* If we found any, apply them --- but first check for recursion!
|
1998-10-02 18:28:04 +02:00
|
|
|
*/
|
2003-02-26 00:47:43 +01:00
|
|
|
if (locks != NIL)
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
2003-02-26 00:47:43 +01:00
|
|
|
List *newActiveRIRs;
|
|
|
|
List *l;
|
|
|
|
|
|
|
|
if (oidMember(RelationGetRelid(rel), activeRIRs))
|
|
|
|
elog(ERROR, "Infinite recursion detected in rules for relation %s",
|
|
|
|
RelationGetRelationName(rel));
|
|
|
|
newActiveRIRs = lconso(RelationGetRelid(rel), activeRIRs);
|
|
|
|
|
|
|
|
foreach(l, locks)
|
|
|
|
{
|
|
|
|
rule = lfirst(l);
|
|
|
|
|
|
|
|
parsetree = ApplyRetrieveRule(parsetree,
|
|
|
|
rule,
|
|
|
|
rt_index,
|
|
|
|
rule->attrno == -1,
|
|
|
|
rel,
|
|
|
|
relIsUsed,
|
|
|
|
newActiveRIRs);
|
|
|
|
}
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
|
|
|
|
2000-11-08 23:10:03 +01:00
|
|
|
heap_close(rel, NoLock);
|
1998-10-02 18:28:04 +02:00
|
|
|
}
|
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
/*
|
2002-09-11 16:48:55 +02:00
|
|
|
* Recurse into sublink subqueries, too. But we already did the ones
|
|
|
|
* in the rtable.
|
2000-09-29 20:21:41 +02:00
|
|
|
*/
|
|
|
|
if (parsetree->hasSubLinks)
|
2003-02-26 00:47:43 +01:00
|
|
|
query_tree_walker(parsetree, fireRIRonSubLink, (void *) activeRIRs,
|
2003-01-17 03:01:21 +01:00
|
|
|
QTW_IGNORE_RT_SUBQUERIES);
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2000-09-29 20:21:41 +02:00
|
|
|
/*
|
2001-03-22 05:01:46 +01:00
|
|
|
* If the query was marked having aggregates, check if this is still
|
|
|
|
* true after rewriting. Ditto for sublinks. Note there should be no
|
|
|
|
* aggs in the qual at this point. (Does this code still do anything
|
|
|
|
* useful? The view-becomes-subselect-in-FROM approach doesn't look
|
|
|
|
* like it could remove aggs or sublinks...)
|
2000-09-29 20:21:41 +02:00
|
|
|
*/
|
|
|
|
if (parsetree->hasAggs)
|
|
|
|
{
|
|
|
|
parsetree->hasAggs = checkExprHasAggs((Node *) parsetree);
|
|
|
|
if (parsetree->hasAggs)
|
|
|
|
if (checkExprHasAggs((Node *) parsetree->jointree))
|
|
|
|
elog(ERROR, "fireRIRrules: failed to remove aggs from qual");
|
|
|
|
}
|
2000-03-12 19:57:05 +01:00
|
|
|
if (parsetree->hasSubLinks)
|
2000-09-29 20:21:41 +02:00
|
|
|
parsetree->hasSubLinks = checkExprHasSubLink((Node *) parsetree);
|
2000-03-12 19:57:05 +01:00
|
|
|
|
1998-10-02 18:28:04 +02:00
|
|
|
return parsetree;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-12-05 20:15:10 +01:00
|
|
|
/*
|
2002-10-20 02:58:55 +02:00
|
|
|
* Modify the given query by adding 'AND rule_qual IS NOT TRUE' to its
|
|
|
|
* qualification. This is used to generate suitable "else clauses" for
|
|
|
|
* conditional INSTEAD rules. (Unfortunately we must use "x IS NOT TRUE",
|
|
|
|
* not just "NOT x" which the planner is much smarter about, else we will
|
|
|
|
* do the wrong thing when the qual evaluates to NULL.)
|
2000-12-05 20:15:10 +01:00
|
|
|
*
|
2001-03-22 05:01:46 +01:00
|
|
|
* The rule_qual may contain references to OLD or NEW. OLD references are
|
2000-12-05 20:15:10 +01:00
|
|
|
* replaced by references to the specified rt_index (the relation that the
|
|
|
|
* rule applies to). NEW references are only possible for INSERT and UPDATE
|
|
|
|
* queries on the relation itself, and so they should be replaced by copies
|
|
|
|
* of the related entries in the query's own targetlist.
|
|
|
|
*/
|
1997-09-08 04:41:22 +02:00
|
|
|
static Query *
|
2002-10-20 02:58:55 +02:00
|
|
|
CopyAndAddInvertedQual(Query *parsetree,
|
|
|
|
Node *rule_qual,
|
|
|
|
int rt_index,
|
|
|
|
CmdType event)
|
1996-07-09 08:22:35 +02:00
|
|
|
{
|
1997-09-08 04:41:22 +02:00
|
|
|
Query *new_tree = (Query *) copyObject(parsetree);
|
2000-12-05 20:15:10 +01:00
|
|
|
Node *new_qual = (Node *) copyObject(rule_qual);
|
|
|
|
|
|
|
|
/* Fix references to OLD */
|
|
|
|
ChangeVarNodes(new_qual, PRS2_OLD_VARNO, rt_index, 0);
|
|
|
|
/* Fix references to NEW */
|
|
|
|
if (event == CMD_INSERT || event == CMD_UPDATE)
|
|
|
|
new_qual = ResolveNew(new_qual,
|
|
|
|
PRS2_NEW_VARNO,
|
|
|
|
0,
|
|
|
|
parsetree->targetList,
|
|
|
|
event,
|
|
|
|
rt_index);
|
|
|
|
/* And attach the fixed qual */
|
2002-10-20 02:58:55 +02:00
|
|
|
AddInvertedQual(new_tree, new_qual);
|
1997-09-07 07:04:48 +02:00
|
|
|
|
|
|
|
return new_tree;
|
1996-07-09 08:22:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
1997-09-07 07:04:48 +02:00
|
|
|
* fireRules -
|
1998-08-18 02:49:04 +02:00
|
|
|
* Iterate through rule locks applying rules.
|
1998-09-01 06:40:42 +02:00
|
|
|
*
|
2002-10-19 21:00:47 +02:00
|
|
|
* Input arguments:
|
|
|
|
* parsetree - original query
|
|
|
|
* rt_index - RT index of result relation in original query
|
|
|
|
* event - type of rule event
|
|
|
|
* locks - list of rules to fire
|
|
|
|
* Output arguments:
|
|
|
|
* *instead_flag - set TRUE if any unqualified INSTEAD rule is found
|
|
|
|
* (must be initialized to FALSE)
|
|
|
|
* *qual_product - filled with modified original query if any qualified
|
|
|
|
* INSTEAD rule is found (must be initialized to NULL)
|
|
|
|
* Return value:
|
|
|
|
* list of rule actions adjusted for use with this query
|
1996-07-09 08:22:35 +02:00
|
|
|
*
|
2002-10-19 21:00:47 +02:00
|
|
|
* Qualified INSTEAD rules generate their action with the qualification
|
|
|
|
* condition added. They also generate a modified version of the original
|
|
|
|
* query with the negated qualification added, so that it will run only for
|
|
|
|
* rows that the qualified action doesn't act on. (If there are multiple
|
|
|
|
* qualified INSTEAD rules, we AND all the negated quals onto a single
|
|
|
|
* modified original query.) We won't execute the original, unmodified
|
|
|
|
* query if we find either qualified or unqualified INSTEAD rules. If
|
|
|
|
* we find both, the modified original query is discarded too.
|
1996-07-09 08:22:35 +02:00
|
|
|
*/
|
1997-09-08 04:41:22 +02:00
|
|
|
static List *
|
1997-09-08 23:56:23 +02:00
|
|
|
fireRules(Query *parsetree,
|
1997-09-07 07:04:48 +02:00
|
|
|
int rt_index,
|
|
|
|
CmdType event,
|
1997-09-08 23:56:23 +02:00
|
|
|
List *locks,
|
2002-10-19 21:00:47 +02:00
|
|
|
bool *instead_flag,
|
|
|
|
Query **qual_product)
|
1996-07-09 08:22:35 +02:00
|
|
|
{
|
1997-09-08 04:41:22 +02:00
|
|
|
List *results = NIL;
|
|
|
|
List *i;
|
1997-09-07 07:04:48 +02:00
|
|
|
|
|
|
|
foreach(i, locks)
|
|
|
|
{
|
1997-09-08 04:41:22 +02:00
|
|
|
RewriteRule *rule_lock = (RewriteRule *) lfirst(i);
|
2002-10-19 21:00:47 +02:00
|
|
|
Node *event_qual = rule_lock->qual;
|
|
|
|
List *actions = rule_lock->actions;
|
2002-10-15 00:14:35 +02:00
|
|
|
QuerySource qsrc;
|
1997-09-08 04:41:22 +02:00
|
|
|
List *r;
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2002-10-15 00:14:35 +02:00
|
|
|
/* Determine correct QuerySource value for actions */
|
|
|
|
if (rule_lock->isInstead)
|
|
|
|
{
|
|
|
|
if (event_qual != NULL)
|
|
|
|
qsrc = QSRC_QUAL_INSTEAD_RULE;
|
|
|
|
else
|
2002-10-19 21:00:47 +02:00
|
|
|
{
|
2002-10-15 00:14:35 +02:00
|
|
|
qsrc = QSRC_INSTEAD_RULE;
|
2002-10-19 21:00:47 +02:00
|
|
|
*instead_flag = true; /* report unqualified INSTEAD */
|
|
|
|
}
|
2002-10-15 00:14:35 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
qsrc = QSRC_NON_INSTEAD_RULE;
|
|
|
|
|
|
|
|
if (qsrc == QSRC_QUAL_INSTEAD_RULE)
|
1998-09-01 06:40:42 +02:00
|
|
|
{
|
2001-03-22 07:16:21 +01:00
|
|
|
/*
|
2002-10-19 21:00:47 +02:00
|
|
|
* If there are INSTEAD rules with qualifications, the
|
2001-03-22 07:16:21 +01:00
|
|
|
* original query is still performed. But all the negated rule
|
2002-10-19 21:00:47 +02:00
|
|
|
* qualifications of the INSTEAD rules are added so it does
|
2001-03-22 07:16:21 +01:00
|
|
|
* its actions only in cases where the rule quals of all
|
2002-10-19 21:00:47 +02:00
|
|
|
* INSTEAD rules are false. Think of it as the default action
|
|
|
|
* in a case. We save this in *qual_product so
|
2003-02-26 00:47:43 +01:00
|
|
|
* RewriteQuery() can add it to the query list after we
|
2001-03-22 07:16:21 +01:00
|
|
|
* mangled it up enough.
|
2002-10-19 21:00:47 +02:00
|
|
|
*
|
|
|
|
* If we have already found an unqualified INSTEAD rule,
|
|
|
|
* then *qual_product won't be used, so don't bother building it.
|
1998-08-18 02:49:04 +02:00
|
|
|
*/
|
2002-10-19 21:00:47 +02:00
|
|
|
if (! *instead_flag)
|
|
|
|
{
|
|
|
|
if (*qual_product == NULL)
|
|
|
|
*qual_product = parsetree;
|
2002-10-20 02:58:55 +02:00
|
|
|
*qual_product = CopyAndAddInvertedQual(*qual_product,
|
|
|
|
event_qual,
|
|
|
|
rt_index,
|
|
|
|
event);
|
2002-10-19 21:00:47 +02:00
|
|
|
}
|
1998-08-18 02:49:04 +02:00
|
|
|
}
|
|
|
|
|
2002-10-15 00:14:35 +02:00
|
|
|
/* Now process the rule's actions and add them to the result list */
|
1997-09-07 07:04:48 +02:00
|
|
|
foreach(r, actions)
|
|
|
|
{
|
1997-09-08 04:41:22 +02:00
|
|
|
Query *rule_action = lfirst(r);
|
1997-09-07 07:04:48 +02:00
|
|
|
|
1998-08-18 02:49:04 +02:00
|
|
|
if (rule_action->commandType == CMD_NOTHING)
|
|
|
|
continue;
|
|
|
|
|
2001-06-13 20:56:30 +02:00
|
|
|
rule_action = rewriteRuleAction(parsetree, rule_action,
|
|
|
|
event_qual, rt_index, event);
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2002-10-15 00:14:35 +02:00
|
|
|
rule_action->querySource = qsrc;
|
|
|
|
|
2001-06-13 20:56:30 +02:00
|
|
|
results = lappend(results, rule_action);
|
1997-09-07 07:04:48 +02:00
|
|
|
}
|
|
|
|
}
|
2002-10-15 00:14:35 +02:00
|
|
|
|
1997-09-07 07:04:48 +02:00
|
|
|
return results;
|
1996-07-09 08:22:35 +02:00
|
|
|
}
|
|
|
|
|
1998-08-18 02:49:04 +02:00
|
|
|
|
2002-10-19 21:00:47 +02:00
|
|
|
/*
|
2003-02-26 00:47:43 +01:00
|
|
|
* RewriteQuery -
|
|
|
|
* rewrites the query and apply the rules again on the queries rewritten
|
2002-10-19 21:00:47 +02:00
|
|
|
*
|
2003-02-26 00:47:43 +01:00
|
|
|
* rewrite_events is a list of open query-rewrite actions, so we can detect
|
|
|
|
* infinite recursion.
|
2002-10-19 21:00:47 +02:00
|
|
|
*/
|
1997-09-08 04:41:22 +02:00
|
|
|
static List *
|
2003-02-26 00:47:43 +01:00
|
|
|
RewriteQuery(Query *parsetree, List *rewrite_events)
|
1996-07-09 08:22:35 +02:00
|
|
|
{
|
2003-02-26 00:47:43 +01:00
|
|
|
CmdType event = parsetree->commandType;
|
|
|
|
bool instead = false;
|
|
|
|
Query *qual_product = NULL;
|
|
|
|
List *rewritten = NIL;
|
1997-09-07 07:04:48 +02:00
|
|
|
|
1998-10-02 18:28:04 +02:00
|
|
|
/*
|
2003-02-26 00:47:43 +01:00
|
|
|
* If the statement is an update, insert or delete - fire rules on it.
|
|
|
|
*
|
1999-05-25 18:15:34 +02:00
|
|
|
* SELECT rules are handled later when we have all the queries that
|
2003-02-26 00:47:43 +01:00
|
|
|
* should get executed. Also, utilities aren't rewritten at all
|
|
|
|
* (do we still need that check?)
|
2002-04-05 07:47:05 +02:00
|
|
|
*/
|
2003-02-26 00:47:43 +01:00
|
|
|
if (event != CMD_SELECT && event != CMD_UTILITY)
|
|
|
|
{
|
|
|
|
int result_relation;
|
|
|
|
RangeTblEntry *rt_entry;
|
|
|
|
Relation rt_entry_relation;
|
|
|
|
List *locks;
|
2002-04-05 07:47:05 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
result_relation = parsetree->resultRelation;
|
|
|
|
Assert(result_relation != 0);
|
|
|
|
rt_entry = rt_fetch(result_relation, parsetree->rtable);
|
|
|
|
Assert(rt_entry->rtekind == RTE_RELATION);
|
1998-08-18 02:49:04 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
/*
|
|
|
|
* This may well be the first access to the result relation during the
|
|
|
|
* current statement (it will be, if this Query was extracted from a
|
|
|
|
* rule or somehow got here other than via the parser). Therefore,
|
|
|
|
* grab the appropriate lock type for a result relation, and do not
|
|
|
|
* release it until end of transaction. This protects the rewriter
|
|
|
|
* and planner against schema changes mid-query.
|
|
|
|
*/
|
|
|
|
rt_entry_relation = heap_open(rt_entry->relid, RowExclusiveLock);
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
/*
|
|
|
|
* If it's an INSERT or UPDATE, rewrite the targetlist into standard
|
|
|
|
* form. This will be needed by the planner anyway, and doing it now
|
|
|
|
* ensures that any references to NEW.field will behave sanely.
|
|
|
|
*/
|
|
|
|
if (event == CMD_INSERT || event == CMD_UPDATE)
|
|
|
|
rewriteTargetList(parsetree, rt_entry_relation);
|
2000-06-30 09:04:23 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
/*
|
|
|
|
* Collect and apply the appropriate rules.
|
|
|
|
*/
|
|
|
|
locks = matchLocks(event, rt_entry_relation->rd_rules,
|
|
|
|
result_relation, parsetree);
|
1996-07-09 08:22:35 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
if (locks != NIL)
|
|
|
|
{
|
|
|
|
List *product_queries;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
product_queries = fireRules(parsetree,
|
|
|
|
result_relation,
|
|
|
|
event,
|
|
|
|
locks,
|
|
|
|
&instead,
|
|
|
|
&qual_product);
|
1996-07-09 08:22:35 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
/*
|
|
|
|
* If we got any product queries, recursively rewrite them
|
|
|
|
* --- but first check for recursion!
|
|
|
|
*/
|
|
|
|
if (product_queries != NIL)
|
|
|
|
{
|
|
|
|
List *n;
|
|
|
|
rewrite_event *rev;
|
1996-07-09 08:22:35 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
foreach(n, rewrite_events)
|
|
|
|
{
|
|
|
|
rev = (rewrite_event *) lfirst(n);
|
|
|
|
if (rev->relation == RelationGetRelid(rt_entry_relation) &&
|
|
|
|
rev->event == event)
|
|
|
|
elog(ERROR, "Infinite recursion detected in rules for relation %s",
|
|
|
|
RelationGetRelationName(rt_entry_relation));
|
|
|
|
}
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
rev = (rewrite_event *) palloc(sizeof(rewrite_event));
|
|
|
|
rev->relation = RelationGetRelid(rt_entry_relation);
|
|
|
|
rev->event = event;
|
|
|
|
rewrite_events = lcons(rev, rewrite_events);
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
foreach(n, product_queries)
|
|
|
|
{
|
|
|
|
Query *pt = (Query *) lfirst(n);
|
|
|
|
List *newstuff;
|
1996-07-09 08:22:35 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
newstuff = RewriteQuery(pt, rewrite_events);
|
|
|
|
rewritten = nconc(rewritten, newstuff);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1997-09-07 07:04:48 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
heap_close(rt_entry_relation, NoLock); /* keep lock! */
|
1997-09-07 07:04:48 +02:00
|
|
|
}
|
1998-08-18 02:49:04 +02:00
|
|
|
|
2001-03-22 07:16:21 +01:00
|
|
|
/*
|
2001-10-25 07:50:21 +02:00
|
|
|
* For INSERTs, the original query is done first; for UPDATE/DELETE,
|
|
|
|
* it is done last. This is needed because update and delete rule
|
|
|
|
* actions might not do anything if they are invoked after the update
|
|
|
|
* or delete is performed. The command counter increment between the
|
2002-10-19 21:00:47 +02:00
|
|
|
* query executions makes the deleted (and maybe the updated) tuples
|
2001-10-25 07:50:21 +02:00
|
|
|
* disappear so the scans for them in the rule actions cannot find
|
|
|
|
* them.
|
2002-10-19 21:00:47 +02:00
|
|
|
*
|
|
|
|
* If we found any unqualified INSTEAD, the original query is not
|
|
|
|
* done at all, in any form. Otherwise, we add the modified form
|
|
|
|
* if qualified INSTEADs were found, else the unmodified form.
|
1998-08-18 02:49:04 +02:00
|
|
|
*/
|
2002-10-19 21:00:47 +02:00
|
|
|
if (!instead)
|
2001-07-10 01:50:32 +02:00
|
|
|
{
|
2002-10-19 21:00:47 +02:00
|
|
|
if (parsetree->commandType == CMD_INSERT)
|
|
|
|
{
|
|
|
|
if (qual_product != NULL)
|
|
|
|
rewritten = lcons(qual_product, rewritten);
|
|
|
|
else
|
|
|
|
rewritten = lcons(parsetree, rewritten);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (qual_product != NULL)
|
|
|
|
rewritten = lappend(rewritten, qual_product);
|
|
|
|
else
|
|
|
|
rewritten = lappend(rewritten, parsetree);
|
|
|
|
}
|
2001-07-10 01:50:32 +02:00
|
|
|
}
|
1998-08-18 02:49:04 +02:00
|
|
|
|
1997-09-07 07:04:48 +02:00
|
|
|
return rewritten;
|
|
|
|
}
|
1998-10-02 18:28:04 +02:00
|
|
|
|
|
|
|
|
|
|
|
/*
|
2000-10-05 21:11:39 +02:00
|
|
|
* QueryRewrite -
|
|
|
|
* Primary entry point to the query rewriter.
|
|
|
|
* Rewrite one query via query rewrite system, possibly returning 0
|
|
|
|
* or many queries.
|
|
|
|
*
|
|
|
|
* NOTE: The code in QueryRewrite was formerly in pg_parse_and_plan(), and was
|
|
|
|
* moved here so that it would be invoked during EXPLAIN.
|
1998-10-02 18:28:04 +02:00
|
|
|
*/
|
2000-10-05 21:11:39 +02:00
|
|
|
List *
|
|
|
|
QueryRewrite(Query *parsetree)
|
1998-10-02 18:28:04 +02:00
|
|
|
{
|
1999-05-25 18:15:34 +02:00
|
|
|
List *querylist;
|
|
|
|
List *results = NIL;
|
|
|
|
List *l;
|
1998-10-02 18:28:04 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Step 1
|
|
|
|
*
|
|
|
|
* Apply all non-SELECT rules possibly getting 0 or many queries
|
|
|
|
*/
|
2003-02-26 00:47:43 +01:00
|
|
|
querylist = RewriteQuery(parsetree, NIL);
|
1998-10-02 18:28:04 +02:00
|
|
|
|
|
|
|
/*
|
1999-11-01 06:18:31 +01:00
|
|
|
* Step 2
|
1998-10-02 18:28:04 +02:00
|
|
|
*
|
|
|
|
* Apply all the RIR rules on each query
|
|
|
|
*/
|
1999-05-25 18:15:34 +02:00
|
|
|
foreach(l, querylist)
|
|
|
|
{
|
2001-03-22 05:01:46 +01:00
|
|
|
Query *query = (Query *) lfirst(l);
|
1999-05-25 18:15:34 +02:00
|
|
|
|
2003-02-26 00:47:43 +01:00
|
|
|
query = fireRIRrules(query, NIL);
|
2000-04-12 19:17:23 +02:00
|
|
|
|
1999-05-25 18:15:34 +02:00
|
|
|
/*
|
2000-10-05 21:11:39 +02:00
|
|
|
* If the query target was rewritten as a view, complain.
|
1999-05-25 18:15:34 +02:00
|
|
|
*/
|
2000-10-05 21:11:39 +02:00
|
|
|
if (query->resultRelation)
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
2000-10-05 21:11:39 +02:00
|
|
|
RangeTblEntry *rte = rt_fetch(query->resultRelation,
|
|
|
|
query->rtable);
|
1999-05-25 18:15:34 +02:00
|
|
|
|
2002-03-12 01:52:10 +01:00
|
|
|
if (rte->rtekind == RTE_SUBQUERY)
|
1999-05-25 18:15:34 +02:00
|
|
|
{
|
2000-10-05 21:11:39 +02:00
|
|
|
switch (query->commandType)
|
|
|
|
{
|
|
|
|
case CMD_INSERT:
|
2002-08-29 08:05:27 +02:00
|
|
|
elog(ERROR, "Cannot insert into a view"
|
|
|
|
"\n\tYou need an unconditional ON INSERT DO INSTEAD rule");
|
2000-10-05 21:11:39 +02:00
|
|
|
break;
|
|
|
|
case CMD_UPDATE:
|
2002-08-29 08:05:27 +02:00
|
|
|
elog(ERROR, "Cannot update a view"
|
|
|
|
"\n\tYou need an unconditional ON UPDATE DO INSTEAD rule");
|
2000-10-05 21:11:39 +02:00
|
|
|
break;
|
|
|
|
case CMD_DELETE:
|
2002-08-29 08:05:27 +02:00
|
|
|
elog(ERROR, "Cannot delete from a view"
|
|
|
|
"\n\tYou need an unconditional ON DELETE DO INSTEAD rule");
|
2000-10-05 21:11:39 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
elog(ERROR, "QueryRewrite: unexpected commandType %d",
|
|
|
|
(int) query->commandType);
|
|
|
|
break;
|
|
|
|
}
|
1999-05-25 18:15:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-10-05 21:11:39 +02:00
|
|
|
results = lappend(results, query);
|
1999-05-25 18:15:34 +02:00
|
|
|
}
|
1999-05-13 09:29:22 +02:00
|
|
|
|
2000-10-05 21:11:39 +02:00
|
|
|
return results;
|
Hi!
INTERSECT and EXCEPT is available for postgresql-v6.4!
The patch against v6.4 is included at the end of the current text
(in uuencoded form!)
I also included the text of my Master's Thesis. (a postscript
version). I hope that you find something of it useful and would be
happy if parts of it find their way into the PostgreSQL documentation
project (If so, tell me, then I send the sources of the document!)
The contents of the document are:
-) The first chapter might be of less interest as it gives only an
overview on SQL.
-) The second chapter gives a description on much of PostgreSQL's
features (like user defined types etc. and how to use these features)
-) The third chapter starts with an overview of PostgreSQL's internal
structure with focus on the stages a query has to pass (i.e. parser,
planner/optimizer, executor). Then a detailed description of the
implementation of the Having clause and the Intersect/Except logic is
given.
Originally I worked on v6.3.2 but never found time enough to prepare
and post a patch. Now I applied the changes to v6.4 to get Intersect
and Except working with the new version. Chapter 3 of my documentation
deals with the changes against v6.3.2, so keep that in mind when
comparing the parts of the code printed there with the patched sources
of v6.4.
Here are some remarks on the patch. There are some things that have
still to be done but at the moment I don't have time to do them
myself. (I'm doing my military service at the moment) Sorry for that
:-(
-) I used a rewrite technique for the implementation of the Except/Intersect
logic which rewrites the query to a semantically equivalent query before
it is handed to the rewrite system (for views, rules etc.), planner,
executor etc.
-) In v6.3.2 the types of the attributes of two select statements
connected by the UNION keyword had to match 100%. In v6.4 the types
only need to be familiar (i.e. int and float can be mixed). Since this
feature did not exist when I worked on Intersect/Except it
does not work correctly for Except/Intersect queries WHEN USED IN
COMBINATION WITH UNIONS! (i.e. sometimes the wrong type is used for the
resulting table. This is because until now the types of the attributes of
the first select statement have been used for the resulting table.
When Intersects and/or Excepts are used in combination with Unions it
might happen, that the first select statement of the original query
appears at another position in the query which will be executed. The reason
for this is the technique used for the implementation of
Except/Intersect which does a query rewrite!)
NOTE: It is NOT broken for pure UNION queries and pure INTERSECT/EXCEPT
queries!!!
-) I had to add the field intersect_clause to some data structures
but did not find time to implement printfuncs for the new field.
This does NOT break the debug modes but when an Except/Intersect
is used the query debug output will be the already rewritten query.
-) Massive changes to the grammar rules for SELECT and INSERT statements
have been necessary (see comments in gram.y and documentation for
deatails) in order to be able to use mixed queries like
(SELECT ... UNION (SELECT ... EXCEPT SELECT)) INTERSECT SELECT...;
-) When using UNION/EXCEPT/INTERSECT you will get:
NOTICE: equal: "Don't know if nodes of type xxx are equal".
I did not have time to add comparsion support for all the needed nodes,
but the default behaviour of the function equal met my requirements.
I did not dare to supress this message!
That's the reason why the regression test for union will fail: These
messages are also included in the union.out file!
-) Somebody of you changed the union_planner() function for v6.4
(I copied the targetlist to new_tlist and that was removed and
replaced by a cleanup of the original targetlist). These chnages
violated some having queries executed against views so I changed
it back again. I did not have time to examine the differences between the
two versions but now it works :-)
If you want to find out, try the file queries/view_having.sql on
both versions and compare the results . Two queries won't produce a
correct result with your version.
regards
Stefan
1999-01-18 01:10:17 +01:00
|
|
|
}
|