Skip to content

Commit d5d4b44

Browse files
craig[bot]spilchen
craig[bot]
andcommitted
Merge #142270
142270: sql/opt: add policy information to EXPLAIN for writes r=spilchen a=spilchen This builds on the previous change that annotated verbose EXPLAIN output with policy information, which applied only to read operations. This update extends that functionality to INSERT, UPDATE, DELETE, and UPSERT operations. Epic: CRDB-45203 Release note: none Informs #136704 Co-authored-by: Matt Spilchen <[email protected]>
2 parents 96b568d + 1f4edc0 commit d5d4b44

File tree

7 files changed

+303
-38
lines changed

7 files changed

+303
-38
lines changed

pkg/sql/opt/exec/execbuilder/mutation.go

+17-7
Original file line numberDiff line numberDiff line change
@@ -648,32 +648,42 @@ func (b *Builder) buildDelete(del *memo.DeleteExpr) (_ execPlan, outputCols colO
648648
return ep, outputCols, nil
649649
}
650650

651-
// tryBuildDeleteRange attempts to construct a fast DeleteRange execution for a
652-
// logical Delete operator, checking all required conditions. See
653-
// exec.Factory.ConstructDeleteRange.
654-
func (b *Builder) tryBuildDeleteRange(del *memo.DeleteExpr) (_ execPlan, ok bool, _ error) {
651+
// canUseDeleteRange checks whether the memo.DeleteExpr can be built into
652+
// a delete range plan.
653+
func (b *Builder) canUseDeleteRange(del *memo.DeleteExpr) bool {
655654
// If rows need to be returned from the Delete operator (i.e. RETURNING
656655
// clause), no fast path is possible, because row values must be fetched.
657656
if del.NeedResults() {
658-
return execPlan{}, false, nil
657+
return false
659658
}
660659

661660
// Check for simple Scan input operator without a limit; anything else is not
662661
// supported by a range delete.
663662
if scan, ok := del.Input.(*memo.ScanExpr); !ok || scan.HardLimit != 0 {
664-
return execPlan{}, false, nil
663+
return false
665664
}
666665

667666
tab := b.mem.Metadata().Table(del.Table)
668667
if tab.DeletableIndexCount() > 1 {
669668
// Any secondary index prevents fast path, because separate delete batches
670669
// must be formulated to delete rows from them.
671-
return execPlan{}, false, nil
670+
return false
672671
}
673672

674673
// We can use the fast path if we don't need to buffer the input to the
675674
// delete operator (for foreign key checks/cascades).
676675
if del.WithID != 0 {
676+
return false
677+
}
678+
679+
return true
680+
}
681+
682+
// tryBuildDeleteRange attempts to construct a fast DeleteRange execution for a
683+
// logical Delete operator, checking all required conditions. See
684+
// exec.Factory.ConstructDeleteRange.
685+
func (b *Builder) tryBuildDeleteRange(del *memo.DeleteExpr) (_ execPlan, ok bool, _ error) {
686+
if !b.canUseDeleteRange(del) {
677687
return execPlan{}, false, nil
678688
}
679689

pkg/sql/opt/exec/execbuilder/relational.go

+30-10
Original file line numberDiff line numberDiff line change
@@ -458,13 +458,17 @@ func (b *Builder) maybeAnnotatePolicyInfo(node exec.Node, e memo.RelExpr) {
458458
return
459459
}
460460
// Helper to annotate a node for the given table ID.
461-
annotateNodeForTable := func(tabID opt.TableID) {
461+
annotateNodeForTable := func(tabID opt.TableID, applyFilterExpr bool) {
462462
// Pull out the policy information for the table the node was built for.
463463
policies, found := rlsMeta.PoliciesApplied[tabID]
464464
if found {
465465
val := exec.RLSPoliciesApplied{
466466
PoliciesSkippedForRole: rlsMeta.HasAdminRole,
467-
Policies: policies,
467+
}
468+
if applyFilterExpr {
469+
val.Policies = policies.Filter
470+
} else {
471+
val.Policies = policies.Check
468472
}
469473
ef.AnnotateNode(node, exec.PolicyInfoID, &val)
470474
}
@@ -479,20 +483,36 @@ func (b *Builder) maybeAnnotatePolicyInfo(node exec.Node, e memo.RelExpr) {
479483
ef.AnnotateNode(node, exec.PolicyInfoID, &exec.RLSPoliciesApplied{})
480484
}
481485
case *memo.ScanExpr:
482-
annotateNodeForTable(e.Table)
486+
annotateNodeForTable(e.Table, true /* applyFilterExpr */)
483487
case *memo.LookupJoinExpr:
484-
annotateNodeForTable(e.Table)
488+
annotateNodeForTable(e.Table, true /* applyFilterExpr */)
485489
case *memo.ZigzagJoinExpr:
486-
annotateNodeForTable(e.LeftTable)
487-
annotateNodeForTable(e.RightTable)
490+
annotateNodeForTable(e.LeftTable, true /* applyFilterExpr */)
491+
annotateNodeForTable(e.RightTable, true /* applyFilterExpr */)
488492
case *memo.InvertedJoinExpr:
489-
annotateNodeForTable(e.Table)
493+
annotateNodeForTable(e.Table, true /* applyFilterExpr */)
490494
case *memo.PlaceholderScanExpr:
491-
annotateNodeForTable(e.Table)
495+
annotateNodeForTable(e.Table, true /* applyFilterExpr */)
492496
case *memo.IndexJoinExpr:
493-
annotateNodeForTable(e.Table)
497+
annotateNodeForTable(e.Table, true /* applyFilterExpr */)
494498
case *memo.VectorSearchExpr:
495-
annotateNodeForTable(e.Table)
499+
annotateNodeForTable(e.Table, true /* applyFilterExpr */)
500+
case *memo.DeleteExpr:
501+
// Typically, policy information is displayed in the scan node. However,
502+
// a `DeleteExpr` built for a delete range operation does not emit a scan node,
503+
// as everything is included within the `deleteRangeOp` node.
504+
// To ensure policy information is included, we handle that case here.
505+
if b.canUseDeleteRange(e) {
506+
if scan, ok := e.Input.(*memo.ScanExpr); ok {
507+
annotateNodeForTable(scan.Table, true /* applyFilterExpr */)
508+
}
509+
}
510+
case *memo.InsertExpr:
511+
annotateNodeForTable(e.Table, false /* applyFilterExpr */)
512+
case *memo.UpdateExpr:
513+
annotateNodeForTable(e.Table, false /* applyFilterExpr */)
514+
case *memo.UpsertExpr:
515+
annotateNodeForTable(e.Table, false /* applyFilterExpr */)
496516
}
497517
}
498518
}

pkg/sql/opt/exec/explain/emit.go

+13-10
Original file line numberDiff line numberDiff line change
@@ -705,20 +705,15 @@ func (e *emitter) emitNodeAttributes(ctx context.Context, evalCtx *eval.Context,
705705
ob.VAttr("parallel", "")
706706
}
707707
e.emitLockingPolicy(a.Params.Locking)
708-
709-
if val, ok := n.annotations[exec.PolicyInfoID]; ok {
710-
e.emitPolicies(ob, a.Table, val.(*exec.RLSPoliciesApplied))
711-
}
708+
e.emitPolicies(ob, a.Table, n)
712709

713710
case valuesOp:
714711
a := n.args.(*valuesArgs)
715712
// Don't emit anything, except policy info, for the "norows" and "emptyrow" cases.
716713
if len(a.Rows) > 0 && (len(a.Rows) > 1 || len(a.Columns) > 0) {
717714
e.emitTuples(tree.RawRows(a.Rows), len(a.Columns))
718715
} else if len(a.Rows) == 0 {
719-
if val, ok := n.annotations[exec.PolicyInfoID]; ok {
720-
e.emitPolicies(ob, nil, val.(*exec.RLSPoliciesApplied))
721-
}
716+
e.emitPolicies(ob, nil, n)
722717
}
723718

724719
case filterOp:
@@ -1003,6 +998,7 @@ func (e *emitter) emitNodeAttributes(ctx context.Context, evalCtx *eval.Context,
1003998
}
1004999
ob.LeaveNode()
10051000
}
1001+
e.emitPolicies(ob, a.Table, n)
10061002

10071003
case insertFastPathOp:
10081004
a := n.args.(*insertFastPathArgs)
@@ -1037,6 +1033,7 @@ func (e *emitter) emitNodeAttributes(ctx context.Context, evalCtx *eval.Context,
10371033
// triggers.
10381034
return errors.AssertionFailedf("insert fast path with before-triggers")
10391035
}
1036+
e.emitPolicies(ob, a.Table, n)
10401037

10411038
case upsertOp:
10421039
a := n.args.(*upsertArgs)
@@ -1076,6 +1073,7 @@ func (e *emitter) emitNodeAttributes(ctx context.Context, evalCtx *eval.Context,
10761073
}
10771074
ob.LeaveNode()
10781075
}
1076+
e.emitPolicies(ob, a.Table, n)
10791077

10801078
case updateOp:
10811079
a := n.args.(*updateArgs)
@@ -1097,6 +1095,7 @@ func (e *emitter) emitNodeAttributes(ctx context.Context, evalCtx *eval.Context,
10971095
}
10981096
ob.LeaveNode()
10991097
}
1098+
e.emitPolicies(ob, a.Table, n)
11001099

11011100
case deleteOp:
11021101
a := n.args.(*deleteArgs)
@@ -1131,6 +1130,7 @@ func (e *emitter) emitNodeAttributes(ctx context.Context, evalCtx *eval.Context,
11311130
// DeleteRange should not be planned if there are applicable triggers.
11321131
return errors.AssertionFailedf("delete range with before-triggers")
11331132
}
1133+
e.emitPolicies(ob, a.Table, n)
11341134

11351135
case showCompletionsOp:
11361136
a := n.args.(*showCompletionsArgs)
@@ -1387,12 +1387,15 @@ func (e *emitter) emitJoinAttributes(
13871387
e.ob.Expr("pred", extraOnCond, appendColumns(leftCols, rightCols...))
13881388
}
13891389

1390-
func (e *emitter) emitPolicies(
1391-
ob *OutputBuilder, table cat.Table, applied *exec.RLSPoliciesApplied,
1392-
) {
1390+
func (e *emitter) emitPolicies(ob *OutputBuilder, table cat.Table, n *Node) {
13931391
if !ob.flags.ShowPolicyInfo {
13941392
return
13951393
}
1394+
val, ok := n.annotations[exec.PolicyInfoID]
1395+
if !ok {
1396+
return
1397+
}
1398+
applied := val.(*exec.RLSPoliciesApplied)
13961399

13971400
if applied.PoliciesSkippedForRole {
13981401
ob.AddField("policies", "exempt for role")

0 commit comments

Comments
 (0)