Line data Source code
1 : /*-------------------------------------------------------------------------
2 : *
3 : * aclchk.c
4 : * Routines to check access control permissions.
5 : *
6 : * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 : * Portions Copyright (c) 1994, Regents of the University of California
8 : *
9 : *
10 : * IDENTIFICATION
11 : * src/backend/catalog/aclchk.c
12 : *
13 : * NOTES
14 : * See acl.h.
15 : *
16 : * The xxx_aclmask() functions in this file are wrappers around
17 : * acl.c's aclmask() function; see that for basic usage information.
18 : * The wrapper functions add object-type-specific lookup capability.
19 : * Generally, they will throw error if the object doesn't exist.
20 : *
21 : * The xxx_aclmask_ext() functions add the ability to not throw
22 : * error if the object doesn't exist. If their "is_missing" argument
23 : * isn't NULL, then when the object isn't found they will set
24 : * *is_missing = true and return zero (no privileges) instead of
25 : * throwing an error. Caller must initialize *is_missing = false.
26 : *
27 : * The xxx_aclcheck() functions are simplified wrappers around the
28 : * corresponding xxx_aclmask() functions, simply returning ACLCHECK_OK
29 : * if any of the privileges specified in "mode" are held, and otherwise
30 : * a suitable error code (in practice, always ACLCHECK_NO_PRIV).
31 : * Again, they will throw error if the object doesn't exist.
32 : *
33 : * The xxx_aclcheck_ext() functions add the ability to not throw
34 : * error if the object doesn't exist. Their "is_missing" argument
35 : * works similarly to the xxx_aclmask_ext() functions.
36 : *
37 : *-------------------------------------------------------------------------
38 : */
39 : #include "postgres.h"
40 :
41 : #include "access/genam.h"
42 : #include "access/heapam.h"
43 : #include "access/htup_details.h"
44 : #include "access/sysattr.h"
45 : #include "access/tableam.h"
46 : #include "access/xact.h"
47 : #include "catalog/binary_upgrade.h"
48 : #include "catalog/catalog.h"
49 : #include "catalog/dependency.h"
50 : #include "catalog/indexing.h"
51 : #include "catalog/objectaccess.h"
52 : #include "catalog/pg_authid.h"
53 : #include "catalog/pg_class.h"
54 : #include "catalog/pg_database.h"
55 : #include "catalog/pg_default_acl.h"
56 : #include "catalog/pg_foreign_data_wrapper.h"
57 : #include "catalog/pg_foreign_server.h"
58 : #include "catalog/pg_init_privs.h"
59 : #include "catalog/pg_language.h"
60 : #include "catalog/pg_largeobject.h"
61 : #include "catalog/pg_largeobject_metadata.h"
62 : #include "catalog/pg_namespace.h"
63 : #include "catalog/pg_parameter_acl.h"
64 : #include "catalog/pg_proc.h"
65 : #include "catalog/pg_tablespace.h"
66 : #include "catalog/pg_type.h"
67 : #include "commands/defrem.h"
68 : #include "commands/event_trigger.h"
69 : #include "commands/extension.h"
70 : #include "commands/proclang.h"
71 : #include "commands/tablespace.h"
72 : #include "foreign/foreign.h"
73 : #include "miscadmin.h"
74 : #include "nodes/makefuncs.h"
75 : #include "parser/parse_func.h"
76 : #include "parser/parse_type.h"
77 : #include "storage/lmgr.h"
78 : #include "utils/acl.h"
79 : #include "utils/aclchk_internal.h"
80 : #include "utils/builtins.h"
81 : #include "utils/fmgroids.h"
82 : #include "utils/guc.h"
83 : #include "utils/lsyscache.h"
84 : #include "utils/rel.h"
85 : #include "utils/syscache.h"
86 :
87 : /*
88 : * Internal format used by ALTER DEFAULT PRIVILEGES.
89 : */
90 : typedef struct
91 : {
92 : Oid roleid; /* owning role */
93 : Oid nspid; /* namespace, or InvalidOid if none */
94 : /* remaining fields are same as in InternalGrant: */
95 : bool is_grant;
96 : ObjectType objtype;
97 : bool all_privs;
98 : AclMode privileges;
99 : List *grantees;
100 : bool grant_option;
101 : RoleSpec *grantor;
102 : DropBehavior behavior;
103 : } InternalDefaultACL;
104 :
105 : /*
106 : * When performing a binary-upgrade, pg_dump will call a function to set
107 : * this variable to let us know that we need to populate the pg_init_privs
108 : * table for the GRANT/REVOKE commands while this variable is set to true.
109 : */
110 : bool binary_upgrade_record_init_privs = false;
111 :
112 : static void ExecGrantStmt_oids(InternalGrant *istmt);
113 : static void ExecGrant_Relation(InternalGrant *istmt);
114 : static void ExecGrant_common(InternalGrant *istmt, Oid classid, AclMode default_privs,
115 : void (*object_check) (InternalGrant *istmt, HeapTuple tuple));
116 : static void ExecGrant_Language_check(InternalGrant *istmt, HeapTuple tuple);
117 : static void ExecGrant_Largeobject(InternalGrant *istmt);
118 : static void ExecGrant_Type_check(InternalGrant *istmt, HeapTuple tuple);
119 : static void ExecGrant_Parameter(InternalGrant *istmt);
120 :
121 : static void SetDefaultACLsInSchemas(InternalDefaultACL *iacls, List *nspnames);
122 : static void SetDefaultACL(InternalDefaultACL *iacls);
123 :
124 : static List *objectNamesToOids(ObjectType objtype, List *objnames,
125 : bool is_grant);
126 : static List *objectsInSchemaToOids(ObjectType objtype, List *nspnames);
127 : static List *getRelationsInNamespace(Oid namespaceId, char relkind);
128 : static void expand_col_privileges(List *colnames, Oid table_oid,
129 : AclMode this_privileges,
130 : AclMode *col_privileges,
131 : int num_col_privileges);
132 : static void expand_all_col_privileges(Oid table_oid, Form_pg_class classForm,
133 : AclMode this_privileges,
134 : AclMode *col_privileges,
135 : int num_col_privileges);
136 : static AclMode string_to_privilege(const char *privname);
137 : static const char *privilege_to_string(AclMode privilege);
138 : static AclMode restrict_and_check_grant(bool is_grant, AclMode avail_goptions,
139 : bool all_privs, AclMode privileges,
140 : Oid objectId, Oid grantorId,
141 : ObjectType objtype, const char *objname,
142 : AttrNumber att_number, const char *colname);
143 : static AclMode pg_aclmask(ObjectType objtype, Oid object_oid, AttrNumber attnum,
144 : Oid roleid, AclMode mask, AclMaskHow how);
145 : static AclMode object_aclmask(Oid classid, Oid objectid, Oid roleid,
146 : AclMode mask, AclMaskHow how);
147 : static AclMode object_aclmask_ext(Oid classid, Oid objectid, Oid roleid,
148 : AclMode mask, AclMaskHow how,
149 : bool *is_missing);
150 : static AclMode pg_attribute_aclmask(Oid table_oid, AttrNumber attnum,
151 : Oid roleid, AclMode mask, AclMaskHow how);
152 : static AclMode pg_attribute_aclmask_ext(Oid table_oid, AttrNumber attnum,
153 : Oid roleid, AclMode mask,
154 : AclMaskHow how, bool *is_missing);
155 : static AclMode pg_class_aclmask_ext(Oid table_oid, Oid roleid,
156 : AclMode mask, AclMaskHow how,
157 : bool *is_missing);
158 : static AclMode pg_parameter_acl_aclmask(Oid acl_oid, Oid roleid,
159 : AclMode mask, AclMaskHow how);
160 : static AclMode pg_largeobject_aclmask_snapshot(Oid lobj_oid, Oid roleid,
161 : AclMode mask, AclMaskHow how, Snapshot snapshot);
162 : static AclMode pg_namespace_aclmask_ext(Oid nsp_oid, Oid roleid,
163 : AclMode mask, AclMaskHow how,
164 : bool *is_missing);
165 : static AclMode pg_type_aclmask_ext(Oid type_oid, Oid roleid,
166 : AclMode mask, AclMaskHow how,
167 : bool *is_missing);
168 : static void recordExtensionInitPriv(Oid objoid, Oid classoid, int objsubid,
169 : Acl *new_acl);
170 : static void recordExtensionInitPrivWorker(Oid objoid, Oid classoid, int objsubid,
171 : Acl *new_acl);
172 :
173 :
174 : /*
175 : * If is_grant is true, adds the given privileges for the list of
176 : * grantees to the existing old_acl. If is_grant is false, the
177 : * privileges for the given grantees are removed from old_acl.
178 : *
179 : * NB: the original old_acl is pfree'd.
180 : */
181 : static Acl *
182 38593 : merge_acl_with_grant(Acl *old_acl, bool is_grant,
183 : bool grant_option, DropBehavior behavior,
184 : List *grantees, AclMode privileges,
185 : Oid grantorId, Oid ownerId)
186 : {
187 : unsigned modechg;
188 : ListCell *j;
189 : Acl *new_acl;
190 :
191 38593 : modechg = is_grant ? ACL_MODECHG_ADD : ACL_MODECHG_DEL;
192 :
193 38593 : new_acl = old_acl;
194 :
195 77264 : foreach(j, grantees)
196 : {
197 : AclItem aclitem;
198 : Acl *newer_acl;
199 :
200 38679 : aclitem.ai_grantee = lfirst_oid(j);
201 :
202 : /*
203 : * Grant options can only be granted to individual roles, not PUBLIC.
204 : * The reason is that if a user would re-grant a privilege that he
205 : * held through PUBLIC, and later the user is removed, the situation
206 : * is impossible to clean up.
207 : */
208 38679 : if (is_grant && grant_option && aclitem.ai_grantee == ACL_ID_PUBLIC)
209 0 : ereport(ERROR,
210 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
211 : errmsg("grant options can only be granted to roles")));
212 :
213 38679 : aclitem.ai_grantor = grantorId;
214 :
215 : /*
216 : * The asymmetry in the conditions here comes from the spec. In
217 : * GRANT, the grant_option flag signals WITH GRANT OPTION, which means
218 : * to grant both the basic privilege and its grant option. But in
219 : * REVOKE, plain revoke revokes both the basic privilege and its grant
220 : * option, while REVOKE GRANT OPTION revokes only the option.
221 : */
222 38679 : ACLITEM_SET_PRIVS_GOPTIONS(aclitem,
223 : (is_grant || !grant_option) ? privileges : ACL_NO_RIGHTS,
224 : (!is_grant || grant_option) ? privileges : ACL_NO_RIGHTS);
225 :
226 38679 : newer_acl = aclupdate(new_acl, &aclitem, modechg, ownerId, behavior);
227 :
228 : /* avoid memory leak when there are many grantees */
229 38671 : pfree(new_acl);
230 38671 : new_acl = newer_acl;
231 : }
232 :
233 38585 : return new_acl;
234 : }
235 :
236 : /*
237 : * Restrict the privileges to what we can actually grant, and emit
238 : * the standards-mandated warning and error messages.
239 : */
240 : static AclMode
241 38448 : restrict_and_check_grant(bool is_grant, AclMode avail_goptions, bool all_privs,
242 : AclMode privileges, Oid objectId, Oid grantorId,
243 : ObjectType objtype, const char *objname,
244 : AttrNumber att_number, const char *colname)
245 : {
246 : AclMode this_privileges;
247 : AclMode whole_mask;
248 :
249 38448 : switch (objtype)
250 : {
251 26578 : case OBJECT_COLUMN:
252 26578 : whole_mask = ACL_ALL_RIGHTS_COLUMN;
253 26578 : break;
254 10249 : case OBJECT_TABLE:
255 10249 : whole_mask = ACL_ALL_RIGHTS_RELATION;
256 10249 : break;
257 110 : case OBJECT_SEQUENCE:
258 110 : whole_mask = ACL_ALL_RIGHTS_SEQUENCE;
259 110 : break;
260 206 : case OBJECT_DATABASE:
261 206 : whole_mask = ACL_ALL_RIGHTS_DATABASE;
262 206 : break;
263 565 : case OBJECT_FUNCTION:
264 565 : whole_mask = ACL_ALL_RIGHTS_FUNCTION;
265 565 : break;
266 23 : case OBJECT_LANGUAGE:
267 23 : whole_mask = ACL_ALL_RIGHTS_LANGUAGE;
268 23 : break;
269 62 : case OBJECT_LARGEOBJECT:
270 62 : whole_mask = ACL_ALL_RIGHTS_LARGEOBJECT;
271 62 : break;
272 370 : case OBJECT_SCHEMA:
273 370 : whole_mask = ACL_ALL_RIGHTS_SCHEMA;
274 370 : break;
275 4 : case OBJECT_TABLESPACE:
276 4 : whole_mask = ACL_ALL_RIGHTS_TABLESPACE;
277 4 : break;
278 61 : case OBJECT_FDW:
279 61 : whole_mask = ACL_ALL_RIGHTS_FDW;
280 61 : break;
281 72 : case OBJECT_FOREIGN_SERVER:
282 72 : whole_mask = ACL_ALL_RIGHTS_FOREIGN_SERVER;
283 72 : break;
284 0 : case OBJECT_EVENT_TRIGGER:
285 0 : elog(ERROR, "grantable rights not supported for event triggers");
286 : /* not reached, but keep compiler quiet */
287 : return ACL_NO_RIGHTS;
288 80 : case OBJECT_TYPE:
289 80 : whole_mask = ACL_ALL_RIGHTS_TYPE;
290 80 : break;
291 68 : case OBJECT_PARAMETER_ACL:
292 68 : whole_mask = ACL_ALL_RIGHTS_PARAMETER_ACL;
293 68 : break;
294 0 : case OBJECT_PROPGRAPH:
295 0 : whole_mask = ACL_ALL_RIGHTS_PROPGRAPH;
296 0 : break;
297 0 : default:
298 0 : elog(ERROR, "unrecognized object type: %d", objtype);
299 : /* not reached, but keep compiler quiet */
300 : return ACL_NO_RIGHTS;
301 : }
302 :
303 : /*
304 : * If we found no grant options, consider whether to issue a hard error.
305 : * Per spec, having any privilege at all on the object will get you by
306 : * here.
307 : */
308 38448 : if (avail_goptions == ACL_NO_RIGHTS)
309 : {
310 48 : if (pg_aclmask(objtype, objectId, att_number, grantorId,
311 48 : whole_mask | ACL_GRANT_OPTION_FOR(whole_mask),
312 : ACLMASK_ANY) == ACL_NO_RIGHTS)
313 : {
314 24 : if (objtype == OBJECT_COLUMN && colname)
315 0 : aclcheck_error_col(ACLCHECK_NO_PRIV, objtype, objname, colname);
316 : else
317 24 : aclcheck_error(ACLCHECK_NO_PRIV, objtype, objname);
318 : }
319 : }
320 :
321 : /*
322 : * Restrict the operation to what we can actually grant or revoke, and
323 : * issue a warning if appropriate. (For REVOKE this isn't quite what the
324 : * spec says to do: the spec seems to want a warning only if no privilege
325 : * bits actually change in the ACL. In practice that behavior seems much
326 : * too noisy, as well as inconsistent with the GRANT case.)
327 : */
328 38424 : this_privileges = privileges & ACL_OPTION_TO_PRIVS(avail_goptions);
329 38424 : if (is_grant)
330 : {
331 9150 : if (this_privileges == 0)
332 : {
333 20 : if (objtype == OBJECT_COLUMN && colname)
334 0 : ereport(WARNING,
335 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_GRANTED),
336 : errmsg("no privileges were granted for column \"%s\" of relation \"%s\"",
337 : colname, objname)));
338 : else
339 20 : ereport(WARNING,
340 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_GRANTED),
341 : errmsg("no privileges were granted for \"%s\"",
342 : objname)));
343 : }
344 9130 : else if (!all_privs && this_privileges != privileges)
345 : {
346 12 : if (objtype == OBJECT_COLUMN && colname)
347 0 : ereport(WARNING,
348 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_GRANTED),
349 : errmsg("not all privileges were granted for column \"%s\" of relation \"%s\"",
350 : colname, objname)));
351 : else
352 12 : ereport(WARNING,
353 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_GRANTED),
354 : errmsg("not all privileges were granted for \"%s\"",
355 : objname)));
356 : }
357 : }
358 : else
359 : {
360 29274 : if (this_privileges == 0)
361 : {
362 4 : if (objtype == OBJECT_COLUMN && colname)
363 0 : ereport(WARNING,
364 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_REVOKED),
365 : errmsg("no privileges could be revoked for column \"%s\" of relation \"%s\"",
366 : colname, objname)));
367 : else
368 4 : ereport(WARNING,
369 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_REVOKED),
370 : errmsg("no privileges could be revoked for \"%s\"",
371 : objname)));
372 : }
373 29270 : else if (!all_privs && this_privileges != privileges)
374 : {
375 56 : if (objtype == OBJECT_COLUMN && colname)
376 48 : ereport(WARNING,
377 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_REVOKED),
378 : errmsg("not all privileges could be revoked for column \"%s\" of relation \"%s\"",
379 : colname, objname)));
380 : else
381 8 : ereport(WARNING,
382 : (errcode(ERRCODE_WARNING_PRIVILEGE_NOT_REVOKED),
383 : errmsg("not all privileges could be revoked for \"%s\"",
384 : objname)));
385 : }
386 : }
387 :
388 38424 : return this_privileges;
389 : }
390 :
391 : /*
392 : * Called to execute the utility commands GRANT and REVOKE
393 : */
394 : void
395 11906 : ExecuteGrantStmt(GrantStmt *stmt)
396 : {
397 : InternalGrant istmt;
398 : ListCell *cell;
399 : const char *errormsg;
400 : AclMode all_privileges;
401 :
402 : /*
403 : * Turn the regular GrantStmt into the InternalGrant form.
404 : */
405 11906 : istmt.is_grant = stmt->is_grant;
406 11906 : istmt.objtype = stmt->objtype;
407 :
408 : /* Collect the OIDs of the target objects */
409 11906 : switch (stmt->targtype)
410 : {
411 11886 : case ACL_TARGET_OBJECT:
412 23751 : istmt.objects = objectNamesToOids(stmt->objtype, stmt->objects,
413 11886 : stmt->is_grant);
414 11865 : break;
415 20 : case ACL_TARGET_ALL_IN_SCHEMA:
416 20 : istmt.objects = objectsInSchemaToOids(stmt->objtype, stmt->objects);
417 20 : break;
418 : /* ACL_TARGET_DEFAULTS should not be seen here */
419 0 : default:
420 0 : elog(ERROR, "unrecognized GrantStmt.targtype: %d",
421 : (int) stmt->targtype);
422 : }
423 :
424 : /* all_privs to be filled below */
425 : /* privileges to be filled below */
426 11885 : istmt.col_privs = NIL; /* may get filled below */
427 11885 : istmt.grantees = NIL; /* filled below */
428 11885 : istmt.grant_option = stmt->grant_option;
429 11885 : istmt.grantor = stmt->grantor;
430 11885 : istmt.behavior = stmt->behavior;
431 :
432 : /*
433 : * Convert the RoleSpec list into an Oid list. Note that at this point we
434 : * insert an ACL_ID_PUBLIC into the list if appropriate, so downstream
435 : * there shouldn't be any additional work needed to support this case.
436 : */
437 23832 : foreach(cell, stmt->grantees)
438 : {
439 11951 : RoleSpec *grantee = (RoleSpec *) lfirst(cell);
440 : Oid grantee_uid;
441 :
442 11951 : switch (grantee->roletype)
443 : {
444 9837 : case ROLESPEC_PUBLIC:
445 9837 : grantee_uid = ACL_ID_PUBLIC;
446 9837 : break;
447 2114 : default:
448 2114 : grantee_uid = get_rolespec_oid(grantee, false);
449 2110 : break;
450 : }
451 11947 : istmt.grantees = lappend_oid(istmt.grantees, grantee_uid);
452 : }
453 :
454 : /*
455 : * Convert stmt->privileges, a list of AccessPriv nodes, into an AclMode
456 : * bitmask. Note: objtype can't be OBJECT_COLUMN.
457 : */
458 11881 : switch (stmt->objtype)
459 : {
460 10508 : case OBJECT_TABLE:
461 :
462 : /*
463 : * Because this might be a sequence, we test both relation and
464 : * sequence bits, and later do a more limited test when we know
465 : * the object type.
466 : */
467 10508 : all_privileges = ACL_ALL_RIGHTS_RELATION | ACL_ALL_RIGHTS_SEQUENCE;
468 10508 : errormsg = gettext_noop("invalid privilege type %s for relation");
469 10508 : break;
470 12 : case OBJECT_SEQUENCE:
471 12 : all_privileges = ACL_ALL_RIGHTS_SEQUENCE;
472 12 : errormsg = gettext_noop("invalid privilege type %s for sequence");
473 12 : break;
474 200 : case OBJECT_DATABASE:
475 200 : all_privileges = ACL_ALL_RIGHTS_DATABASE;
476 200 : errormsg = gettext_noop("invalid privilege type %s for database");
477 200 : break;
478 13 : case OBJECT_DOMAIN:
479 13 : all_privileges = ACL_ALL_RIGHTS_TYPE;
480 13 : errormsg = gettext_noop("invalid privilege type %s for domain");
481 13 : break;
482 491 : case OBJECT_FUNCTION:
483 491 : all_privileges = ACL_ALL_RIGHTS_FUNCTION;
484 491 : errormsg = gettext_noop("invalid privilege type %s for function");
485 491 : break;
486 27 : case OBJECT_LANGUAGE:
487 27 : all_privileges = ACL_ALL_RIGHTS_LANGUAGE;
488 27 : errormsg = gettext_noop("invalid privilege type %s for language");
489 27 : break;
490 50 : case OBJECT_LARGEOBJECT:
491 50 : all_privileges = ACL_ALL_RIGHTS_LARGEOBJECT;
492 50 : errormsg = gettext_noop("invalid privilege type %s for large object");
493 50 : break;
494 296 : case OBJECT_SCHEMA:
495 296 : all_privileges = ACL_ALL_RIGHTS_SCHEMA;
496 296 : errormsg = gettext_noop("invalid privilege type %s for schema");
497 296 : break;
498 32 : case OBJECT_PROCEDURE:
499 32 : all_privileges = ACL_ALL_RIGHTS_FUNCTION;
500 32 : errormsg = gettext_noop("invalid privilege type %s for procedure");
501 32 : break;
502 4 : case OBJECT_ROUTINE:
503 4 : all_privileges = ACL_ALL_RIGHTS_FUNCTION;
504 4 : errormsg = gettext_noop("invalid privilege type %s for routine");
505 4 : break;
506 4 : case OBJECT_TABLESPACE:
507 4 : all_privileges = ACL_ALL_RIGHTS_TABLESPACE;
508 4 : errormsg = gettext_noop("invalid privilege type %s for tablespace");
509 4 : break;
510 72 : case OBJECT_TYPE:
511 72 : all_privileges = ACL_ALL_RIGHTS_TYPE;
512 72 : errormsg = gettext_noop("invalid privilege type %s for type");
513 72 : break;
514 60 : case OBJECT_FDW:
515 60 : all_privileges = ACL_ALL_RIGHTS_FDW;
516 60 : errormsg = gettext_noop("invalid privilege type %s for foreign-data wrapper");
517 60 : break;
518 63 : case OBJECT_FOREIGN_SERVER:
519 63 : all_privileges = ACL_ALL_RIGHTS_FOREIGN_SERVER;
520 63 : errormsg = gettext_noop("invalid privilege type %s for foreign server");
521 63 : break;
522 37 : case OBJECT_PARAMETER_ACL:
523 37 : all_privileges = ACL_ALL_RIGHTS_PARAMETER_ACL;
524 37 : errormsg = gettext_noop("invalid privilege type %s for parameter");
525 37 : break;
526 12 : case OBJECT_PROPGRAPH:
527 12 : all_privileges = ACL_ALL_RIGHTS_PROPGRAPH;
528 12 : errormsg = gettext_noop("invalid privilege type %s for property graph");
529 12 : break;
530 0 : default:
531 0 : elog(ERROR, "unrecognized GrantStmt.objtype: %d",
532 : (int) stmt->objtype);
533 : /* keep compiler quiet */
534 : all_privileges = ACL_NO_RIGHTS;
535 : errormsg = NULL;
536 : }
537 :
538 11881 : if (stmt->privileges == NIL)
539 : {
540 1522 : istmt.all_privs = true;
541 :
542 : /*
543 : * will be turned into ACL_ALL_RIGHTS_* by the internal routines
544 : * depending on the object type
545 : */
546 1522 : istmt.privileges = ACL_NO_RIGHTS;
547 : }
548 : else
549 : {
550 10359 : istmt.all_privs = false;
551 10359 : istmt.privileges = ACL_NO_RIGHTS;
552 :
553 21053 : foreach(cell, stmt->privileges)
554 : {
555 10714 : AccessPriv *privnode = (AccessPriv *) lfirst(cell);
556 : AclMode priv;
557 :
558 : /*
559 : * If it's a column-level specification, we just set it aside in
560 : * col_privs for the moment; but insist it's for a relation.
561 : */
562 10714 : if (privnode->cols)
563 : {
564 281 : if (stmt->objtype != OBJECT_TABLE)
565 0 : ereport(ERROR,
566 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
567 : errmsg("column privileges are only valid for relations")));
568 281 : istmt.col_privs = lappend(istmt.col_privs, privnode);
569 281 : continue;
570 : }
571 :
572 10433 : if (privnode->priv_name == NULL) /* parser mistake? */
573 0 : elog(ERROR, "AccessPriv node must specify privilege or columns");
574 10433 : priv = string_to_privilege(privnode->priv_name);
575 :
576 10433 : if (priv & ~all_privileges)
577 20 : ereport(ERROR,
578 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
579 : errmsg(errormsg, privilege_to_string(priv))));
580 :
581 10413 : istmt.privileges |= priv;
582 : }
583 : }
584 :
585 11861 : ExecGrantStmt_oids(&istmt);
586 11810 : }
587 :
588 : /*
589 : * ExecGrantStmt_oids
590 : *
591 : * Internal entry point for granting and revoking privileges.
592 : */
593 : static void
594 11997 : ExecGrantStmt_oids(InternalGrant *istmt)
595 : {
596 11997 : switch (istmt->objtype)
597 : {
598 10590 : case OBJECT_TABLE:
599 : case OBJECT_SEQUENCE:
600 : case OBJECT_PROPGRAPH:
601 10590 : ExecGrant_Relation(istmt);
602 10575 : break;
603 206 : case OBJECT_DATABASE:
604 206 : ExecGrant_common(istmt, DatabaseRelationId, ACL_ALL_RIGHTS_DATABASE, NULL);
605 206 : break;
606 88 : case OBJECT_DOMAIN:
607 : case OBJECT_TYPE:
608 88 : ExecGrant_common(istmt, TypeRelationId, ACL_ALL_RIGHTS_TYPE, ExecGrant_Type_check);
609 76 : break;
610 61 : case OBJECT_FDW:
611 61 : ExecGrant_common(istmt, ForeignDataWrapperRelationId, ACL_ALL_RIGHTS_FDW, NULL);
612 49 : break;
613 72 : case OBJECT_FOREIGN_SERVER:
614 72 : ExecGrant_common(istmt, ForeignServerRelationId, ACL_ALL_RIGHTS_FOREIGN_SERVER, NULL);
615 64 : break;
616 537 : case OBJECT_FUNCTION:
617 : case OBJECT_PROCEDURE:
618 : case OBJECT_ROUTINE:
619 537 : ExecGrant_common(istmt, ProcedureRelationId, ACL_ALL_RIGHTS_FUNCTION, NULL);
620 537 : break;
621 27 : case OBJECT_LANGUAGE:
622 27 : ExecGrant_common(istmt, LanguageRelationId, ACL_ALL_RIGHTS_LANGUAGE, ExecGrant_Language_check);
623 23 : break;
624 58 : case OBJECT_LARGEOBJECT:
625 58 : ExecGrant_Largeobject(istmt);
626 58 : break;
627 305 : case OBJECT_SCHEMA:
628 305 : ExecGrant_common(istmt, NamespaceRelationId, ACL_ALL_RIGHTS_SCHEMA, NULL);
629 305 : break;
630 4 : case OBJECT_TABLESPACE:
631 4 : ExecGrant_common(istmt, TableSpaceRelationId, ACL_ALL_RIGHTS_TABLESPACE, NULL);
632 4 : break;
633 49 : case OBJECT_PARAMETER_ACL:
634 49 : ExecGrant_Parameter(istmt);
635 49 : break;
636 0 : default:
637 0 : elog(ERROR, "unrecognized GrantStmt.objtype: %d",
638 : (int) istmt->objtype);
639 : }
640 :
641 : /*
642 : * Pass the info to event triggers about the just-executed GRANT. Note
643 : * that we prefer to do it after actually executing it, because that gives
644 : * the functions a chance to adjust the istmt with privileges actually
645 : * granted.
646 : */
647 11946 : if (EventTriggerSupportsObjectType(istmt->objtype))
648 11687 : EventTriggerCollectGrant(istmt);
649 11946 : }
650 :
651 : /*
652 : * objectNamesToOids
653 : *
654 : * Turn a list of object names of a given type into an Oid list.
655 : *
656 : * XXX This function intentionally takes only an AccessShareLock. In the face
657 : * of concurrent DDL, we might easily latch onto an old version of an object,
658 : * causing the GRANT or REVOKE statement to fail. But it does prevent the
659 : * object from disappearing altogether. To do better, we would need to use a
660 : * self-exclusive lock, perhaps ShareUpdateExclusiveLock, here and before
661 : * *every* CatalogTupleUpdate() of a row that GRANT/REVOKE can affect.
662 : * Besides that additional work, this could have operational costs. For
663 : * example, it would make GRANT ALL TABLES IN SCHEMA terminate every
664 : * autovacuum running in the schema and consume a shared lock table entry per
665 : * table in the schema. The user-visible benefit of that additional work is
666 : * just changing "ERROR: tuple concurrently updated" to blocking. That's not
667 : * nothing, but it might not outweigh autovacuum termination and lock table
668 : * consumption spikes.
669 : */
670 : static List *
671 11886 : objectNamesToOids(ObjectType objtype, List *objnames, bool is_grant)
672 : {
673 11886 : List *objects = NIL;
674 : ListCell *cell;
675 11886 : const LOCKMODE lockmode = AccessShareLock;
676 :
677 : Assert(objnames != NIL);
678 :
679 11886 : switch (objtype)
680 : {
681 1235 : default:
682 :
683 : /*
684 : * For most object types, we use get_object_address() directly.
685 : */
686 2539 : foreach(cell, objnames)
687 : {
688 : ObjectAddress address;
689 :
690 1320 : address = get_object_address(objtype, lfirst(cell), NULL, lockmode, false);
691 1304 : objects = lappend_oid(objects, address.objectId);
692 : }
693 1219 : break;
694 :
695 10524 : case OBJECT_TABLE:
696 : case OBJECT_SEQUENCE:
697 : case OBJECT_PROPGRAPH:
698 :
699 : /*
700 : * Here, we don't use get_object_address(). It requires that the
701 : * specified object type match the actual type of the object, but
702 : * in GRANT/REVOKE, all table-like things are addressed as TABLE.
703 : */
704 21083 : foreach(cell, objnames)
705 : {
706 10559 : RangeVar *relvar = (RangeVar *) lfirst(cell);
707 : Oid relOid;
708 :
709 10559 : relOid = RangeVarGetRelid(relvar, lockmode, false);
710 10559 : objects = lappend_oid(objects, relOid);
711 : }
712 10524 : break;
713 :
714 89 : case OBJECT_DOMAIN:
715 : case OBJECT_TYPE:
716 :
717 : /*
718 : * The parse representation of types and domains in privilege
719 : * targets is different from that expected by get_object_address()
720 : * (for parse conflict reasons), so we have to do a bit of
721 : * conversion here.
722 : */
723 174 : foreach(cell, objnames)
724 : {
725 89 : List *typname = (List *) lfirst(cell);
726 89 : TypeName *tn = makeTypeNameFromNameList(typname);
727 : ObjectAddress address;
728 : Relation relation;
729 :
730 89 : address = get_object_address(objtype, (Node *) tn, &relation, lockmode, false);
731 : Assert(relation == NULL);
732 85 : objects = lappend_oid(objects, address.objectId);
733 : }
734 85 : break;
735 :
736 38 : case OBJECT_PARAMETER_ACL:
737 :
738 : /*
739 : * Parameters are handled completely differently.
740 : */
741 100 : foreach(cell, objnames)
742 : {
743 : /*
744 : * In this code we represent a GUC by the OID of its entry in
745 : * pg_parameter_acl, which we have to manufacture here if it
746 : * doesn't exist yet. (That's a hack for sure, but it avoids
747 : * messing with all the GRANT/REVOKE infrastructure that
748 : * expects to use OIDs for object identities.) However, if
749 : * this is a REVOKE, we can instead just ignore any GUCs that
750 : * don't have such an entry, as they must not have any
751 : * privileges needing removal.
752 : */
753 63 : char *parameter = strVal(lfirst(cell));
754 63 : Oid parameterId = ParameterAclLookup(parameter, true);
755 :
756 63 : if (!OidIsValid(parameterId) && is_grant)
757 : {
758 34 : parameterId = ParameterAclCreate(parameter);
759 :
760 : /*
761 : * Prevent error when processing duplicate objects, and
762 : * make this new entry visible so that ExecGrant_Parameter
763 : * can update it.
764 : */
765 33 : CommandCounterIncrement();
766 : }
767 62 : if (OidIsValid(parameterId))
768 56 : objects = lappend_oid(objects, parameterId);
769 : }
770 37 : break;
771 : }
772 :
773 11865 : return objects;
774 : }
775 :
776 : /*
777 : * objectsInSchemaToOids
778 : *
779 : * Find all objects of a given type in specified schemas, and make a list
780 : * of their Oids. We check USAGE privilege on the schemas, but there is
781 : * no privilege checking on the individual objects here.
782 : */
783 : static List *
784 20 : objectsInSchemaToOids(ObjectType objtype, List *nspnames)
785 : {
786 20 : List *objects = NIL;
787 : ListCell *cell;
788 :
789 40 : foreach(cell, nspnames)
790 : {
791 20 : char *nspname = strVal(lfirst(cell));
792 : Oid namespaceId;
793 : List *objs;
794 :
795 20 : namespaceId = LookupExplicitNamespace(nspname, false);
796 :
797 20 : switch (objtype)
798 : {
799 8 : case OBJECT_TABLE:
800 8 : objs = getRelationsInNamespace(namespaceId, RELKIND_RELATION);
801 8 : objects = list_concat(objects, objs);
802 8 : objs = getRelationsInNamespace(namespaceId, RELKIND_VIEW);
803 8 : objects = list_concat(objects, objs);
804 8 : objs = getRelationsInNamespace(namespaceId, RELKIND_MATVIEW);
805 8 : objects = list_concat(objects, objs);
806 8 : objs = getRelationsInNamespace(namespaceId, RELKIND_FOREIGN_TABLE);
807 8 : objects = list_concat(objects, objs);
808 8 : objs = getRelationsInNamespace(namespaceId, RELKIND_PARTITIONED_TABLE);
809 8 : objects = list_concat(objects, objs);
810 8 : break;
811 0 : case OBJECT_SEQUENCE:
812 0 : objs = getRelationsInNamespace(namespaceId, RELKIND_SEQUENCE);
813 0 : objects = list_concat(objects, objs);
814 0 : break;
815 0 : case OBJECT_PROPGRAPH:
816 0 : objs = getRelationsInNamespace(namespaceId, RELKIND_PROPGRAPH);
817 0 : objects = list_concat(objects, objs);
818 0 : break;
819 12 : case OBJECT_FUNCTION:
820 : case OBJECT_PROCEDURE:
821 : case OBJECT_ROUTINE:
822 : {
823 : ScanKeyData key[2];
824 : int keycount;
825 : Relation rel;
826 : TableScanDesc scan;
827 : HeapTuple tuple;
828 :
829 12 : keycount = 0;
830 12 : ScanKeyInit(&key[keycount++],
831 : Anum_pg_proc_pronamespace,
832 : BTEqualStrategyNumber, F_OIDEQ,
833 : ObjectIdGetDatum(namespaceId));
834 :
835 12 : if (objtype == OBJECT_FUNCTION)
836 : /* includes aggregates and window functions */
837 4 : ScanKeyInit(&key[keycount++],
838 : Anum_pg_proc_prokind,
839 : BTEqualStrategyNumber, F_CHARNE,
840 : CharGetDatum(PROKIND_PROCEDURE));
841 8 : else if (objtype == OBJECT_PROCEDURE)
842 4 : ScanKeyInit(&key[keycount++],
843 : Anum_pg_proc_prokind,
844 : BTEqualStrategyNumber, F_CHAREQ,
845 : CharGetDatum(PROKIND_PROCEDURE));
846 :
847 12 : rel = table_open(ProcedureRelationId, AccessShareLock);
848 12 : scan = table_beginscan_catalog(rel, keycount, key);
849 :
850 36 : while ((tuple = heap_getnext(scan, ForwardScanDirection)) != NULL)
851 : {
852 24 : Oid oid = ((Form_pg_proc) GETSTRUCT(tuple))->oid;
853 :
854 24 : objects = lappend_oid(objects, oid);
855 : }
856 :
857 12 : table_endscan(scan);
858 12 : table_close(rel, AccessShareLock);
859 : }
860 12 : break;
861 0 : default:
862 : /* should not happen */
863 0 : elog(ERROR, "unrecognized GrantStmt.objtype: %d",
864 : (int) objtype);
865 : }
866 : }
867 :
868 20 : return objects;
869 : }
870 :
871 : /*
872 : * getRelationsInNamespace
873 : *
874 : * Return Oid list of relations in given namespace filtered by relation kind
875 : */
876 : static List *
877 40 : getRelationsInNamespace(Oid namespaceId, char relkind)
878 : {
879 40 : List *relations = NIL;
880 : ScanKeyData key[2];
881 : Relation rel;
882 : TableScanDesc scan;
883 : HeapTuple tuple;
884 :
885 40 : ScanKeyInit(&key[0],
886 : Anum_pg_class_relnamespace,
887 : BTEqualStrategyNumber, F_OIDEQ,
888 : ObjectIdGetDatum(namespaceId));
889 40 : ScanKeyInit(&key[1],
890 : Anum_pg_class_relkind,
891 : BTEqualStrategyNumber, F_CHAREQ,
892 : CharGetDatum(relkind));
893 :
894 40 : rel = table_open(RelationRelationId, AccessShareLock);
895 40 : scan = table_beginscan_catalog(rel, 2, key);
896 :
897 56 : while ((tuple = heap_getnext(scan, ForwardScanDirection)) != NULL)
898 : {
899 16 : Oid oid = ((Form_pg_class) GETSTRUCT(tuple))->oid;
900 :
901 16 : relations = lappend_oid(relations, oid);
902 : }
903 :
904 40 : table_endscan(scan);
905 40 : table_close(rel, AccessShareLock);
906 :
907 40 : return relations;
908 : }
909 :
910 :
911 : /*
912 : * ALTER DEFAULT PRIVILEGES statement
913 : */
914 : void
915 135 : ExecAlterDefaultPrivilegesStmt(ParseState *pstate, AlterDefaultPrivilegesStmt *stmt)
916 : {
917 135 : GrantStmt *action = stmt->action;
918 : InternalDefaultACL iacls;
919 : ListCell *cell;
920 135 : List *rolespecs = NIL;
921 135 : List *nspnames = NIL;
922 135 : DefElem *drolespecs = NULL;
923 135 : DefElem *dnspnames = NULL;
924 : AclMode all_privileges;
925 : const char *errormsg;
926 :
927 : /* Deconstruct the "options" part of the statement */
928 228 : foreach(cell, stmt->options)
929 : {
930 93 : DefElem *defel = (DefElem *) lfirst(cell);
931 :
932 93 : if (strcmp(defel->defname, "schemas") == 0)
933 : {
934 39 : if (dnspnames)
935 0 : errorConflictingDefElem(defel, pstate);
936 39 : dnspnames = defel;
937 : }
938 54 : else if (strcmp(defel->defname, "roles") == 0)
939 : {
940 54 : if (drolespecs)
941 0 : errorConflictingDefElem(defel, pstate);
942 54 : drolespecs = defel;
943 : }
944 : else
945 0 : elog(ERROR, "option \"%s\" not recognized", defel->defname);
946 : }
947 :
948 135 : if (dnspnames)
949 39 : nspnames = (List *) dnspnames->arg;
950 135 : if (drolespecs)
951 54 : rolespecs = (List *) drolespecs->arg;
952 :
953 : /* Prepare the InternalDefaultACL representation of the statement */
954 : /* roleid to be filled below */
955 : /* nspid to be filled in SetDefaultACLsInSchemas */
956 135 : iacls.is_grant = action->is_grant;
957 135 : iacls.objtype = action->objtype;
958 : /* all_privs to be filled below */
959 : /* privileges to be filled below */
960 135 : iacls.grantees = NIL; /* filled below */
961 135 : iacls.grant_option = action->grant_option;
962 135 : iacls.grantor = action->grantor;
963 135 : iacls.behavior = action->behavior;
964 :
965 : /*
966 : * Convert the RoleSpec list into an Oid list. Note that at this point we
967 : * insert an ACL_ID_PUBLIC into the list if appropriate, so downstream
968 : * there shouldn't be any additional work needed to support this case.
969 : */
970 274 : foreach(cell, action->grantees)
971 : {
972 139 : RoleSpec *grantee = (RoleSpec *) lfirst(cell);
973 : Oid grantee_uid;
974 :
975 139 : switch (grantee->roletype)
976 : {
977 30 : case ROLESPEC_PUBLIC:
978 30 : grantee_uid = ACL_ID_PUBLIC;
979 30 : break;
980 109 : default:
981 109 : grantee_uid = get_rolespec_oid(grantee, false);
982 109 : break;
983 : }
984 139 : iacls.grantees = lappend_oid(iacls.grantees, grantee_uid);
985 : }
986 :
987 : /*
988 : * Convert action->privileges, a list of privilege strings, into an
989 : * AclMode bitmask.
990 : */
991 135 : switch (action->objtype)
992 : {
993 51 : case OBJECT_TABLE:
994 51 : all_privileges = ACL_ALL_RIGHTS_RELATION;
995 51 : errormsg = gettext_noop("invalid privilege type %s for relation");
996 51 : break;
997 4 : case OBJECT_SEQUENCE:
998 4 : all_privileges = ACL_ALL_RIGHTS_SEQUENCE;
999 4 : errormsg = gettext_noop("invalid privilege type %s for sequence");
1000 4 : break;
1001 14 : case OBJECT_FUNCTION:
1002 14 : all_privileges = ACL_ALL_RIGHTS_FUNCTION;
1003 14 : errormsg = gettext_noop("invalid privilege type %s for function");
1004 14 : break;
1005 0 : case OBJECT_PROCEDURE:
1006 0 : all_privileges = ACL_ALL_RIGHTS_FUNCTION;
1007 0 : errormsg = gettext_noop("invalid privilege type %s for procedure");
1008 0 : break;
1009 0 : case OBJECT_ROUTINE:
1010 0 : all_privileges = ACL_ALL_RIGHTS_FUNCTION;
1011 0 : errormsg = gettext_noop("invalid privilege type %s for routine");
1012 0 : break;
1013 22 : case OBJECT_TYPE:
1014 22 : all_privileges = ACL_ALL_RIGHTS_TYPE;
1015 22 : errormsg = gettext_noop("invalid privilege type %s for type");
1016 22 : break;
1017 24 : case OBJECT_SCHEMA:
1018 24 : all_privileges = ACL_ALL_RIGHTS_SCHEMA;
1019 24 : errormsg = gettext_noop("invalid privilege type %s for schema");
1020 24 : break;
1021 20 : case OBJECT_LARGEOBJECT:
1022 20 : all_privileges = ACL_ALL_RIGHTS_LARGEOBJECT;
1023 20 : errormsg = gettext_noop("invalid privilege type %s for large object");
1024 20 : break;
1025 0 : case OBJECT_PROPGRAPH:
1026 0 : all_privileges = ACL_ALL_RIGHTS_PROPGRAPH;
1027 0 : errormsg = gettext_noop("invalid privilege type %s for property graph");
1028 0 : break;
1029 0 : default:
1030 0 : elog(ERROR, "unrecognized GrantStmt.objtype: %d",
1031 : (int) action->objtype);
1032 : /* keep compiler quiet */
1033 : all_privileges = ACL_NO_RIGHTS;
1034 : errormsg = NULL;
1035 : }
1036 :
1037 135 : if (action->privileges == NIL)
1038 : {
1039 51 : iacls.all_privs = true;
1040 :
1041 : /*
1042 : * will be turned into ACL_ALL_RIGHTS_* by the internal routines
1043 : * depending on the object type
1044 : */
1045 51 : iacls.privileges = ACL_NO_RIGHTS;
1046 : }
1047 : else
1048 : {
1049 84 : iacls.all_privs = false;
1050 84 : iacls.privileges = ACL_NO_RIGHTS;
1051 :
1052 168 : foreach(cell, action->privileges)
1053 : {
1054 84 : AccessPriv *privnode = (AccessPriv *) lfirst(cell);
1055 : AclMode priv;
1056 :
1057 84 : if (privnode->cols)
1058 0 : ereport(ERROR,
1059 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
1060 : errmsg("default privileges cannot be set for columns")));
1061 :
1062 84 : if (privnode->priv_name == NULL) /* parser mistake? */
1063 0 : elog(ERROR, "AccessPriv node must specify privilege");
1064 84 : priv = string_to_privilege(privnode->priv_name);
1065 :
1066 84 : if (priv & ~all_privileges)
1067 0 : ereport(ERROR,
1068 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
1069 : errmsg(errormsg, privilege_to_string(priv))));
1070 :
1071 84 : iacls.privileges |= priv;
1072 : }
1073 : }
1074 :
1075 135 : if (rolespecs == NIL)
1076 : {
1077 : /* Set permissions for myself */
1078 81 : iacls.roleid = GetUserId();
1079 :
1080 81 : SetDefaultACLsInSchemas(&iacls, nspnames);
1081 : }
1082 : else
1083 : {
1084 : /* Look up the role OIDs and do permissions checks */
1085 : ListCell *rolecell;
1086 :
1087 108 : foreach(rolecell, rolespecs)
1088 : {
1089 54 : RoleSpec *rolespec = lfirst(rolecell);
1090 :
1091 54 : iacls.roleid = get_rolespec_oid(rolespec, false);
1092 :
1093 54 : if (!has_privs_of_role(GetUserId(), iacls.roleid))
1094 0 : ereport(ERROR,
1095 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
1096 : errmsg("permission denied to change default privileges")));
1097 :
1098 54 : SetDefaultACLsInSchemas(&iacls, nspnames);
1099 : }
1100 : }
1101 127 : }
1102 :
1103 : /*
1104 : * Process ALTER DEFAULT PRIVILEGES for a list of target schemas
1105 : *
1106 : * All fields of *iacls except nspid were filled already
1107 : */
1108 : static void
1109 135 : SetDefaultACLsInSchemas(InternalDefaultACL *iacls, List *nspnames)
1110 : {
1111 135 : if (nspnames == NIL)
1112 : {
1113 : /* Set database-wide permissions if no schema was specified */
1114 96 : iacls->nspid = InvalidOid;
1115 :
1116 96 : SetDefaultACL(iacls);
1117 : }
1118 : else
1119 : {
1120 : /* Look up the schema OIDs and set permissions for each one */
1121 : ListCell *nspcell;
1122 :
1123 74 : foreach(nspcell, nspnames)
1124 : {
1125 43 : char *nspname = strVal(lfirst(nspcell));
1126 :
1127 43 : iacls->nspid = get_namespace_oid(nspname, false);
1128 :
1129 : /*
1130 : * We used to insist that the target role have CREATE privileges
1131 : * on the schema, since without that it wouldn't be able to create
1132 : * an object for which these default privileges would apply.
1133 : * However, this check proved to be more confusing than helpful,
1134 : * and it also caused certain database states to not be
1135 : * dumpable/restorable, since revoking CREATE doesn't cause
1136 : * default privileges for the schema to go away. So now, we just
1137 : * allow the ALTER; if the user lacks CREATE he'll find out when
1138 : * he tries to create an object.
1139 : */
1140 :
1141 43 : SetDefaultACL(iacls);
1142 : }
1143 : }
1144 127 : }
1145 :
1146 :
1147 : /*
1148 : * Create or update a pg_default_acl entry
1149 : */
1150 : static void
1151 163 : SetDefaultACL(InternalDefaultACL *iacls)
1152 : {
1153 163 : AclMode this_privileges = iacls->privileges;
1154 : char objtype;
1155 : Relation rel;
1156 : HeapTuple tuple;
1157 : bool isNew;
1158 : Acl *def_acl;
1159 : Acl *old_acl;
1160 : Acl *new_acl;
1161 : HeapTuple newtuple;
1162 : int noldmembers;
1163 : int nnewmembers;
1164 : Oid *oldmembers;
1165 : Oid *newmembers;
1166 :
1167 163 : rel = table_open(DefaultAclRelationId, RowExclusiveLock);
1168 :
1169 : /*
1170 : * The default for a global entry is the hard-wired default ACL for the
1171 : * particular object type. The default for non-global entries is an empty
1172 : * ACL. This must be so because global entries replace the hard-wired
1173 : * defaults, while others are added on.
1174 : */
1175 163 : if (!OidIsValid(iacls->nspid))
1176 120 : def_acl = acldefault(iacls->objtype, iacls->roleid);
1177 : else
1178 43 : def_acl = make_empty_acl();
1179 :
1180 : /*
1181 : * Convert ACL object type to pg_default_acl object type and handle
1182 : * all_privs option
1183 : */
1184 163 : switch (iacls->objtype)
1185 : {
1186 59 : case OBJECT_TABLE:
1187 59 : objtype = DEFACLOBJ_RELATION;
1188 59 : if (iacls->all_privs && this_privileges == ACL_NO_RIGHTS)
1189 17 : this_privileges = ACL_ALL_RIGHTS_RELATION;
1190 59 : break;
1191 :
1192 8 : case OBJECT_SEQUENCE:
1193 8 : objtype = DEFACLOBJ_SEQUENCE;
1194 8 : if (iacls->all_privs && this_privileges == ACL_NO_RIGHTS)
1195 8 : this_privileges = ACL_ALL_RIGHTS_SEQUENCE;
1196 8 : break;
1197 :
1198 18 : case OBJECT_FUNCTION:
1199 18 : objtype = DEFACLOBJ_FUNCTION;
1200 18 : if (iacls->all_privs && this_privileges == ACL_NO_RIGHTS)
1201 8 : this_privileges = ACL_ALL_RIGHTS_FUNCTION;
1202 18 : break;
1203 :
1204 26 : case OBJECT_TYPE:
1205 26 : objtype = DEFACLOBJ_TYPE;
1206 26 : if (iacls->all_privs && this_privileges == ACL_NO_RIGHTS)
1207 10 : this_privileges = ACL_ALL_RIGHTS_TYPE;
1208 26 : break;
1209 :
1210 28 : case OBJECT_SCHEMA:
1211 28 : if (OidIsValid(iacls->nspid))
1212 4 : ereport(ERROR,
1213 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
1214 : errmsg("cannot use IN SCHEMA clause when using %s",
1215 : "GRANT/REVOKE ON SCHEMAS")));
1216 24 : objtype = DEFACLOBJ_NAMESPACE;
1217 24 : if (iacls->all_privs && this_privileges == ACL_NO_RIGHTS)
1218 16 : this_privileges = ACL_ALL_RIGHTS_SCHEMA;
1219 24 : break;
1220 :
1221 24 : case OBJECT_LARGEOBJECT:
1222 24 : if (OidIsValid(iacls->nspid))
1223 4 : ereport(ERROR,
1224 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
1225 : errmsg("cannot use IN SCHEMA clause when using %s",
1226 : "GRANT/REVOKE ON LARGE OBJECTS")));
1227 20 : objtype = DEFACLOBJ_LARGEOBJECT;
1228 20 : if (iacls->all_privs && this_privileges == ACL_NO_RIGHTS)
1229 12 : this_privileges = ACL_ALL_RIGHTS_LARGEOBJECT;
1230 20 : break;
1231 :
1232 0 : default:
1233 0 : elog(ERROR, "unrecognized object type: %d",
1234 : (int) iacls->objtype);
1235 : objtype = 0; /* keep compiler quiet */
1236 : break;
1237 : }
1238 :
1239 : /* Search for existing row for this object type in catalog */
1240 155 : tuple = SearchSysCache3(DEFACLROLENSPOBJ,
1241 : ObjectIdGetDatum(iacls->roleid),
1242 : ObjectIdGetDatum(iacls->nspid),
1243 : CharGetDatum(objtype));
1244 :
1245 155 : if (HeapTupleIsValid(tuple))
1246 : {
1247 : Datum aclDatum;
1248 : bool isNull;
1249 :
1250 60 : aclDatum = SysCacheGetAttr(DEFACLROLENSPOBJ, tuple,
1251 : Anum_pg_default_acl_defaclacl,
1252 : &isNull);
1253 60 : if (!isNull)
1254 60 : old_acl = DatumGetAclPCopy(aclDatum);
1255 : else
1256 0 : old_acl = NULL; /* this case shouldn't happen, probably */
1257 60 : isNew = false;
1258 : }
1259 : else
1260 : {
1261 95 : old_acl = NULL;
1262 95 : isNew = true;
1263 : }
1264 :
1265 155 : if (old_acl != NULL)
1266 : {
1267 : /*
1268 : * We need the members of both old and new ACLs so we can correct the
1269 : * shared dependency information. Collect data before
1270 : * merge_acl_with_grant throws away old_acl.
1271 : */
1272 60 : noldmembers = aclmembers(old_acl, &oldmembers);
1273 : }
1274 : else
1275 : {
1276 : /* If no or null entry, start with the default ACL value */
1277 95 : old_acl = aclcopy(def_acl);
1278 : /* There are no old member roles according to the catalogs */
1279 95 : noldmembers = 0;
1280 95 : oldmembers = NULL;
1281 : }
1282 :
1283 : /*
1284 : * Generate new ACL. Grantor of rights is always the same as the target
1285 : * role.
1286 : */
1287 155 : new_acl = merge_acl_with_grant(old_acl,
1288 155 : iacls->is_grant,
1289 155 : iacls->grant_option,
1290 : iacls->behavior,
1291 : iacls->grantees,
1292 : this_privileges,
1293 : iacls->roleid,
1294 : iacls->roleid);
1295 :
1296 : /*
1297 : * If the result is the same as the default value, we do not need an
1298 : * explicit pg_default_acl entry, and should in fact remove the entry if
1299 : * it exists. Must sort both arrays to compare properly.
1300 : */
1301 155 : aclitemsort(new_acl);
1302 155 : aclitemsort(def_acl);
1303 155 : if (aclequal(new_acl, def_acl))
1304 : {
1305 : /* delete old entry, if indeed there is one */
1306 41 : if (!isNew)
1307 : {
1308 : ObjectAddress myself;
1309 :
1310 : /*
1311 : * The dependency machinery will take care of removing all
1312 : * associated dependency entries. We use DROP_RESTRICT since
1313 : * there shouldn't be anything depending on this entry.
1314 : */
1315 40 : myself.classId = DefaultAclRelationId;
1316 40 : myself.objectId = ((Form_pg_default_acl) GETSTRUCT(tuple))->oid;
1317 40 : myself.objectSubId = 0;
1318 :
1319 40 : performDeletion(&myself, DROP_RESTRICT, 0);
1320 : }
1321 : }
1322 : else
1323 : {
1324 114 : Datum values[Natts_pg_default_acl] = {0};
1325 114 : bool nulls[Natts_pg_default_acl] = {0};
1326 114 : bool replaces[Natts_pg_default_acl] = {0};
1327 : Oid defAclOid;
1328 :
1329 114 : if (isNew)
1330 : {
1331 : /* insert new entry */
1332 94 : defAclOid = GetNewOidWithIndex(rel, DefaultAclOidIndexId,
1333 : Anum_pg_default_acl_oid);
1334 94 : values[Anum_pg_default_acl_oid - 1] = ObjectIdGetDatum(defAclOid);
1335 94 : values[Anum_pg_default_acl_defaclrole - 1] = ObjectIdGetDatum(iacls->roleid);
1336 94 : values[Anum_pg_default_acl_defaclnamespace - 1] = ObjectIdGetDatum(iacls->nspid);
1337 94 : values[Anum_pg_default_acl_defaclobjtype - 1] = CharGetDatum(objtype);
1338 94 : values[Anum_pg_default_acl_defaclacl - 1] = PointerGetDatum(new_acl);
1339 :
1340 94 : newtuple = heap_form_tuple(RelationGetDescr(rel), values, nulls);
1341 94 : CatalogTupleInsert(rel, newtuple);
1342 : }
1343 : else
1344 : {
1345 20 : defAclOid = ((Form_pg_default_acl) GETSTRUCT(tuple))->oid;
1346 :
1347 : /* update existing entry */
1348 20 : values[Anum_pg_default_acl_defaclacl - 1] = PointerGetDatum(new_acl);
1349 20 : replaces[Anum_pg_default_acl_defaclacl - 1] = true;
1350 :
1351 20 : newtuple = heap_modify_tuple(tuple, RelationGetDescr(rel),
1352 : values, nulls, replaces);
1353 20 : CatalogTupleUpdate(rel, &newtuple->t_self, newtuple);
1354 : }
1355 :
1356 : /* these dependencies don't change in an update */
1357 114 : if (isNew)
1358 : {
1359 : /* dependency on role */
1360 94 : recordDependencyOnOwner(DefaultAclRelationId, defAclOid,
1361 : iacls->roleid);
1362 :
1363 : /* dependency on namespace */
1364 94 : if (OidIsValid(iacls->nspid))
1365 : {
1366 : ObjectAddress myself,
1367 : referenced;
1368 :
1369 22 : myself.classId = DefaultAclRelationId;
1370 22 : myself.objectId = defAclOid;
1371 22 : myself.objectSubId = 0;
1372 :
1373 22 : referenced.classId = NamespaceRelationId;
1374 22 : referenced.objectId = iacls->nspid;
1375 22 : referenced.objectSubId = 0;
1376 :
1377 22 : recordDependencyOn(&myself, &referenced, DEPENDENCY_AUTO);
1378 : }
1379 : }
1380 :
1381 : /*
1382 : * Update the shared dependency ACL info
1383 : */
1384 114 : nnewmembers = aclmembers(new_acl, &newmembers);
1385 :
1386 114 : updateAclDependencies(DefaultAclRelationId,
1387 : defAclOid, 0,
1388 : iacls->roleid,
1389 : noldmembers, oldmembers,
1390 : nnewmembers, newmembers);
1391 :
1392 114 : if (isNew)
1393 94 : InvokeObjectPostCreateHook(DefaultAclRelationId, defAclOid, 0);
1394 : else
1395 20 : InvokeObjectPostAlterHook(DefaultAclRelationId, defAclOid, 0);
1396 : }
1397 :
1398 155 : if (HeapTupleIsValid(tuple))
1399 60 : ReleaseSysCache(tuple);
1400 :
1401 155 : table_close(rel, RowExclusiveLock);
1402 :
1403 : /* prevent error when processing duplicate objects */
1404 155 : CommandCounterIncrement();
1405 155 : }
1406 :
1407 :
1408 : /*
1409 : * RemoveRoleFromObjectACL
1410 : *
1411 : * Used by shdepDropOwned to remove mentions of a role in ACLs.
1412 : *
1413 : * Notice that this doesn't accept an objsubid parameter, which is a bit bogus
1414 : * since the pg_shdepend record that caused us to call it certainly had one.
1415 : * If, for example, pg_shdepend records the existence of a permission on
1416 : * mytable.mycol, this function will effectively issue a REVOKE ALL ON TABLE
1417 : * mytable. That gets the job done because (per SQL spec) such a REVOKE also
1418 : * revokes per-column permissions. We could not recreate a situation where
1419 : * the role has table-level but not column-level permissions; but it's okay
1420 : * (for now anyway) because this is only used when we're dropping the role
1421 : * and so all its permissions everywhere must go away. At worst it's a bit
1422 : * inefficient if the role has column permissions on several columns of the
1423 : * same table.
1424 : */
1425 : void
1426 160 : RemoveRoleFromObjectACL(Oid roleid, Oid classid, Oid objid)
1427 : {
1428 160 : if (classid == DefaultAclRelationId)
1429 : {
1430 : InternalDefaultACL iacls;
1431 : Form_pg_default_acl pg_default_acl_tuple;
1432 : Relation rel;
1433 : ScanKeyData skey[1];
1434 : SysScanDesc scan;
1435 : HeapTuple tuple;
1436 :
1437 : /* first fetch info needed by SetDefaultACL */
1438 24 : rel = table_open(DefaultAclRelationId, AccessShareLock);
1439 :
1440 24 : ScanKeyInit(&skey[0],
1441 : Anum_pg_default_acl_oid,
1442 : BTEqualStrategyNumber, F_OIDEQ,
1443 : ObjectIdGetDatum(objid));
1444 :
1445 24 : scan = systable_beginscan(rel, DefaultAclOidIndexId, true,
1446 : NULL, 1, skey);
1447 :
1448 24 : tuple = systable_getnext(scan);
1449 :
1450 24 : if (!HeapTupleIsValid(tuple))
1451 0 : elog(ERROR, "could not find tuple for default ACL %u", objid);
1452 :
1453 24 : pg_default_acl_tuple = (Form_pg_default_acl) GETSTRUCT(tuple);
1454 :
1455 24 : iacls.roleid = pg_default_acl_tuple->defaclrole;
1456 24 : iacls.nspid = pg_default_acl_tuple->defaclnamespace;
1457 :
1458 24 : switch (pg_default_acl_tuple->defaclobjtype)
1459 : {
1460 4 : case DEFACLOBJ_RELATION:
1461 4 : iacls.objtype = OBJECT_TABLE;
1462 4 : break;
1463 4 : case DEFACLOBJ_SEQUENCE:
1464 4 : iacls.objtype = OBJECT_SEQUENCE;
1465 4 : break;
1466 4 : case DEFACLOBJ_FUNCTION:
1467 4 : iacls.objtype = OBJECT_FUNCTION;
1468 4 : break;
1469 4 : case DEFACLOBJ_TYPE:
1470 4 : iacls.objtype = OBJECT_TYPE;
1471 4 : break;
1472 4 : case DEFACLOBJ_NAMESPACE:
1473 4 : iacls.objtype = OBJECT_SCHEMA;
1474 4 : break;
1475 4 : case DEFACLOBJ_LARGEOBJECT:
1476 4 : iacls.objtype = OBJECT_LARGEOBJECT;
1477 4 : break;
1478 0 : default:
1479 : /* Shouldn't get here */
1480 0 : elog(ERROR, "unexpected default ACL type: %d",
1481 : (int) pg_default_acl_tuple->defaclobjtype);
1482 : break;
1483 : }
1484 :
1485 24 : systable_endscan(scan);
1486 24 : table_close(rel, AccessShareLock);
1487 :
1488 24 : iacls.is_grant = false;
1489 24 : iacls.all_privs = true;
1490 24 : iacls.privileges = ACL_NO_RIGHTS;
1491 24 : iacls.grantees = list_make1_oid(roleid);
1492 24 : iacls.grant_option = false;
1493 24 : iacls.grantor = NULL;
1494 24 : iacls.behavior = DROP_CASCADE;
1495 :
1496 : /* Do it */
1497 24 : SetDefaultACL(&iacls);
1498 : }
1499 : else
1500 : {
1501 : InternalGrant istmt;
1502 :
1503 136 : switch (classid)
1504 : {
1505 62 : case RelationRelationId:
1506 : /* it's OK to use TABLE for a sequence */
1507 62 : istmt.objtype = OBJECT_TABLE;
1508 62 : break;
1509 6 : case DatabaseRelationId:
1510 6 : istmt.objtype = OBJECT_DATABASE;
1511 6 : break;
1512 3 : case TypeRelationId:
1513 3 : istmt.objtype = OBJECT_TYPE;
1514 3 : break;
1515 22 : case ProcedureRelationId:
1516 22 : istmt.objtype = OBJECT_ROUTINE;
1517 22 : break;
1518 0 : case LanguageRelationId:
1519 0 : istmt.objtype = OBJECT_LANGUAGE;
1520 0 : break;
1521 12 : case LargeObjectRelationId:
1522 12 : istmt.objtype = OBJECT_LARGEOBJECT;
1523 12 : break;
1524 9 : case NamespaceRelationId:
1525 9 : istmt.objtype = OBJECT_SCHEMA;
1526 9 : break;
1527 0 : case TableSpaceRelationId:
1528 0 : istmt.objtype = OBJECT_TABLESPACE;
1529 0 : break;
1530 9 : case ForeignServerRelationId:
1531 9 : istmt.objtype = OBJECT_FOREIGN_SERVER;
1532 9 : break;
1533 1 : case ForeignDataWrapperRelationId:
1534 1 : istmt.objtype = OBJECT_FDW;
1535 1 : break;
1536 12 : case ParameterAclRelationId:
1537 12 : istmt.objtype = OBJECT_PARAMETER_ACL;
1538 12 : break;
1539 0 : default:
1540 0 : elog(ERROR, "unexpected object class %u", classid);
1541 : break;
1542 : }
1543 136 : istmt.is_grant = false;
1544 136 : istmt.objects = list_make1_oid(objid);
1545 136 : istmt.all_privs = true;
1546 136 : istmt.privileges = ACL_NO_RIGHTS;
1547 136 : istmt.col_privs = NIL;
1548 136 : istmt.grantees = list_make1_oid(roleid);
1549 136 : istmt.grant_option = false;
1550 136 : istmt.grantor = NULL;
1551 136 : istmt.behavior = DROP_CASCADE;
1552 :
1553 136 : ExecGrantStmt_oids(&istmt);
1554 : }
1555 160 : }
1556 :
1557 :
1558 : /*
1559 : * expand_col_privileges
1560 : *
1561 : * OR the specified privilege(s) into per-column array entries for each
1562 : * specified attribute. The per-column array is indexed starting at
1563 : * FirstLowInvalidHeapAttributeNumber, up to relation's last attribute.
1564 : */
1565 : static void
1566 281 : expand_col_privileges(List *colnames, Oid table_oid,
1567 : AclMode this_privileges,
1568 : AclMode *col_privileges,
1569 : int num_col_privileges)
1570 : {
1571 : ListCell *cell;
1572 :
1573 1719 : foreach(cell, colnames)
1574 : {
1575 1438 : char *colname = strVal(lfirst(cell));
1576 : AttrNumber attnum;
1577 :
1578 1438 : attnum = get_attnum(table_oid, colname);
1579 1438 : if (attnum == InvalidAttrNumber)
1580 0 : ereport(ERROR,
1581 : (errcode(ERRCODE_UNDEFINED_COLUMN),
1582 : errmsg("column \"%s\" of relation \"%s\" does not exist",
1583 : colname, get_rel_name(table_oid))));
1584 1438 : attnum -= FirstLowInvalidHeapAttributeNumber;
1585 1438 : if (attnum <= 0 || attnum >= num_col_privileges)
1586 0 : elog(ERROR, "column number out of range"); /* safety check */
1587 1438 : col_privileges[attnum] |= this_privileges;
1588 : }
1589 281 : }
1590 :
1591 : /*
1592 : * expand_all_col_privileges
1593 : *
1594 : * OR the specified privilege(s) into per-column array entries for each valid
1595 : * attribute of a relation. The per-column array is indexed starting at
1596 : * FirstLowInvalidHeapAttributeNumber, up to relation's last attribute.
1597 : */
1598 : static void
1599 3386 : expand_all_col_privileges(Oid table_oid, Form_pg_class classForm,
1600 : AclMode this_privileges,
1601 : AclMode *col_privileges,
1602 : int num_col_privileges)
1603 : {
1604 : AttrNumber curr_att;
1605 :
1606 : Assert(classForm->relnatts - FirstLowInvalidHeapAttributeNumber < num_col_privileges);
1607 3386 : for (curr_att = FirstLowInvalidHeapAttributeNumber + 1;
1608 35304 : curr_att <= classForm->relnatts;
1609 31918 : curr_att++)
1610 : {
1611 : HeapTuple attTuple;
1612 : bool isdropped;
1613 :
1614 31918 : if (curr_att == InvalidAttrNumber)
1615 3386 : continue;
1616 :
1617 : /* Views don't have any system columns at all */
1618 28532 : if (classForm->relkind == RELKIND_VIEW && curr_att < 0)
1619 3360 : continue;
1620 :
1621 25172 : attTuple = SearchSysCache2(ATTNUM,
1622 : ObjectIdGetDatum(table_oid),
1623 : Int16GetDatum(curr_att));
1624 25172 : if (!HeapTupleIsValid(attTuple))
1625 0 : elog(ERROR, "cache lookup failed for attribute %d of relation %u",
1626 : curr_att, table_oid);
1627 :
1628 25172 : isdropped = ((Form_pg_attribute) GETSTRUCT(attTuple))->attisdropped;
1629 :
1630 25172 : ReleaseSysCache(attTuple);
1631 :
1632 : /* ignore dropped columns */
1633 25172 : if (isdropped)
1634 4 : continue;
1635 :
1636 25168 : col_privileges[curr_att - FirstLowInvalidHeapAttributeNumber] |= this_privileges;
1637 : }
1638 3386 : }
1639 :
1640 : /*
1641 : * This processes attributes, but expects to be called from
1642 : * ExecGrant_Relation, not directly from ExecuteGrantStmt.
1643 : */
1644 : static void
1645 26578 : ExecGrant_Attribute(InternalGrant *istmt, Oid relOid, const char *relname,
1646 : AttrNumber attnum, Oid ownerId, AclMode col_privileges,
1647 : Relation attRelation, const Acl *old_rel_acl)
1648 : {
1649 : HeapTuple attr_tuple;
1650 : Form_pg_attribute pg_attribute_tuple;
1651 : Acl *old_acl;
1652 : Acl *new_acl;
1653 : Acl *merged_acl;
1654 : Datum aclDatum;
1655 : bool isNull;
1656 : Oid grantorId;
1657 : AclMode avail_goptions;
1658 : bool need_update;
1659 : HeapTuple newtuple;
1660 26578 : Datum values[Natts_pg_attribute] = {0};
1661 26578 : bool nulls[Natts_pg_attribute] = {0};
1662 26578 : bool replaces[Natts_pg_attribute] = {0};
1663 : int noldmembers;
1664 : int nnewmembers;
1665 : Oid *oldmembers;
1666 : Oid *newmembers;
1667 :
1668 26578 : attr_tuple = SearchSysCache2(ATTNUM,
1669 : ObjectIdGetDatum(relOid),
1670 : Int16GetDatum(attnum));
1671 26578 : if (!HeapTupleIsValid(attr_tuple))
1672 0 : elog(ERROR, "cache lookup failed for attribute %d of relation %u",
1673 : attnum, relOid);
1674 26578 : pg_attribute_tuple = (Form_pg_attribute) GETSTRUCT(attr_tuple);
1675 :
1676 : /*
1677 : * Get working copy of existing ACL. If there's no ACL, substitute the
1678 : * proper default.
1679 : */
1680 26578 : aclDatum = SysCacheGetAttr(ATTNUM, attr_tuple, Anum_pg_attribute_attacl,
1681 : &isNull);
1682 26578 : if (isNull)
1683 : {
1684 26370 : old_acl = acldefault(OBJECT_COLUMN, ownerId);
1685 : /* There are no old member roles according to the catalogs */
1686 26370 : noldmembers = 0;
1687 26370 : oldmembers = NULL;
1688 : }
1689 : else
1690 : {
1691 208 : old_acl = DatumGetAclPCopy(aclDatum);
1692 : /* Get the roles mentioned in the existing ACL */
1693 208 : noldmembers = aclmembers(old_acl, &oldmembers);
1694 : }
1695 :
1696 : /*
1697 : * In select_best_grantor we should consider existing table-level ACL bits
1698 : * as well as the per-column ACL. Build a new ACL that is their
1699 : * concatenation. (This is a bit cheap and dirty compared to merging them
1700 : * properly with no duplications, but it's all we need here.)
1701 : */
1702 26578 : merged_acl = aclconcat(old_rel_acl, old_acl);
1703 :
1704 : /* Determine ID to do the grant as, and available grant options */
1705 26578 : select_best_grantor(istmt->grantor, col_privileges,
1706 : merged_acl, ownerId,
1707 : &grantorId, &avail_goptions);
1708 :
1709 26578 : pfree(merged_acl);
1710 :
1711 : /*
1712 : * Restrict the privileges to what we can actually grant, and emit the
1713 : * standards-mandated warning and error messages. Note: we don't track
1714 : * whether the user actually used the ALL PRIVILEGES(columns) syntax for
1715 : * each column; we just approximate it by whether all the possible
1716 : * privileges are specified now. Since the all_privs flag only determines
1717 : * whether a warning is issued, this seems close enough.
1718 : */
1719 : col_privileges =
1720 26578 : restrict_and_check_grant(istmt->is_grant, avail_goptions,
1721 : (col_privileges == ACL_ALL_RIGHTS_COLUMN),
1722 : col_privileges,
1723 : relOid, grantorId, OBJECT_COLUMN,
1724 : relname, attnum,
1725 26578 : NameStr(pg_attribute_tuple->attname));
1726 :
1727 : /*
1728 : * Generate new ACL.
1729 : */
1730 26578 : new_acl = merge_acl_with_grant(old_acl, istmt->is_grant,
1731 26578 : istmt->grant_option,
1732 : istmt->behavior, istmt->grantees,
1733 : col_privileges, grantorId,
1734 : ownerId);
1735 :
1736 : /*
1737 : * We need the members of both old and new ACLs so we can correct the
1738 : * shared dependency information.
1739 : */
1740 26578 : nnewmembers = aclmembers(new_acl, &newmembers);
1741 :
1742 : /* finished building new ACL value, now insert it */
1743 :
1744 : /*
1745 : * If the updated ACL is empty, we can set attacl to null, and maybe even
1746 : * avoid an update of the pg_attribute row. This is worth testing because
1747 : * we'll come through here multiple times for any relation-level REVOKE,
1748 : * even if there were never any column GRANTs. Note we are assuming that
1749 : * the "default" ACL state for columns is empty.
1750 : */
1751 26578 : if (ACL_NUM(new_acl) > 0)
1752 : {
1753 1451 : values[Anum_pg_attribute_attacl - 1] = PointerGetDatum(new_acl);
1754 1451 : need_update = true;
1755 : }
1756 : else
1757 : {
1758 25127 : nulls[Anum_pg_attribute_attacl - 1] = true;
1759 25127 : need_update = !isNull;
1760 : }
1761 26578 : replaces[Anum_pg_attribute_attacl - 1] = true;
1762 :
1763 26578 : if (need_update)
1764 : {
1765 1517 : newtuple = heap_modify_tuple(attr_tuple, RelationGetDescr(attRelation),
1766 : values, nulls, replaces);
1767 :
1768 1517 : CatalogTupleUpdate(attRelation, &newtuple->t_self, newtuple);
1769 :
1770 : /* Update initial privileges for extensions */
1771 1517 : recordExtensionInitPriv(relOid, RelationRelationId, attnum,
1772 1517 : ACL_NUM(new_acl) > 0 ? new_acl : NULL);
1773 :
1774 : /* Update the shared dependency ACL info */
1775 1517 : updateAclDependencies(RelationRelationId, relOid, attnum,
1776 : ownerId,
1777 : noldmembers, oldmembers,
1778 : nnewmembers, newmembers);
1779 : }
1780 :
1781 26578 : pfree(new_acl);
1782 :
1783 26578 : ReleaseSysCache(attr_tuple);
1784 26578 : }
1785 :
1786 : /*
1787 : * This processes both sequences and non-sequences.
1788 : */
1789 : static void
1790 10590 : ExecGrant_Relation(InternalGrant *istmt)
1791 : {
1792 : Relation relation;
1793 : Relation attRelation;
1794 : ListCell *cell;
1795 :
1796 10590 : relation = table_open(RelationRelationId, RowExclusiveLock);
1797 10590 : attRelation = table_open(AttributeRelationId, RowExclusiveLock);
1798 :
1799 21208 : foreach(cell, istmt->objects)
1800 : {
1801 10633 : Oid relOid = lfirst_oid(cell);
1802 : Datum aclDatum;
1803 : Form_pg_class pg_class_tuple;
1804 : bool isNull;
1805 : AclMode this_privileges;
1806 : AclMode *col_privileges;
1807 : int num_col_privileges;
1808 : bool have_col_privileges;
1809 : Acl *old_acl;
1810 : Acl *old_rel_acl;
1811 : int noldmembers;
1812 : Oid *oldmembers;
1813 : Oid ownerId;
1814 : HeapTuple tuple;
1815 : ListCell *cell_colprivs;
1816 :
1817 10633 : tuple = SearchSysCacheLocked1(RELOID, ObjectIdGetDatum(relOid));
1818 10633 : if (!HeapTupleIsValid(tuple))
1819 1 : elog(ERROR, "cache lookup failed for relation %u", relOid);
1820 10632 : pg_class_tuple = (Form_pg_class) GETSTRUCT(tuple);
1821 :
1822 : /* Not sensible to grant on an index */
1823 10632 : if (pg_class_tuple->relkind == RELKIND_INDEX ||
1824 10632 : pg_class_tuple->relkind == RELKIND_PARTITIONED_INDEX)
1825 0 : ereport(ERROR,
1826 : (errcode(ERRCODE_WRONG_OBJECT_TYPE),
1827 : errmsg("\"%s\" is an index",
1828 : NameStr(pg_class_tuple->relname))));
1829 :
1830 : /* Composite types aren't tables either */
1831 10632 : if (pg_class_tuple->relkind == RELKIND_COMPOSITE_TYPE)
1832 0 : ereport(ERROR,
1833 : (errcode(ERRCODE_WRONG_OBJECT_TYPE),
1834 : errmsg("\"%s\" is a composite type",
1835 : NameStr(pg_class_tuple->relname))));
1836 :
1837 : /* Used GRANT SEQUENCE on a non-sequence? */
1838 10632 : if (istmt->objtype == OBJECT_SEQUENCE &&
1839 12 : pg_class_tuple->relkind != RELKIND_SEQUENCE)
1840 0 : ereport(ERROR,
1841 : (errcode(ERRCODE_WRONG_OBJECT_TYPE),
1842 : errmsg("\"%s\" is not a sequence",
1843 : NameStr(pg_class_tuple->relname))));
1844 :
1845 10632 : if (istmt->objtype == OBJECT_PROPGRAPH &&
1846 8 : pg_class_tuple->relkind != RELKIND_PROPGRAPH)
1847 0 : ereport(ERROR,
1848 : (errcode(ERRCODE_WRONG_OBJECT_TYPE),
1849 : errmsg("\"%s\" is not a property graph",
1850 : NameStr(pg_class_tuple->relname))));
1851 :
1852 : /* Adjust the default permissions based on object type */
1853 10632 : if (istmt->all_privs && istmt->privileges == ACL_NO_RIGHTS)
1854 : {
1855 1176 : if (pg_class_tuple->relkind == RELKIND_SEQUENCE)
1856 51 : this_privileges = ACL_ALL_RIGHTS_SEQUENCE;
1857 1125 : else if (pg_class_tuple->relkind == RELKIND_PROPGRAPH)
1858 3 : this_privileges = ACL_ALL_RIGHTS_PROPGRAPH;
1859 : else
1860 1122 : this_privileges = ACL_ALL_RIGHTS_RELATION;
1861 : }
1862 : else
1863 9456 : this_privileges = istmt->privileges;
1864 :
1865 : /*
1866 : * The GRANT TABLE syntax can be used for sequences and non-sequences,
1867 : * so we have to look at the relkind to determine the supported
1868 : * permissions. The OR of table and sequence permissions were already
1869 : * checked.
1870 : */
1871 10632 : if (istmt->objtype == OBJECT_TABLE)
1872 : {
1873 10612 : if (pg_class_tuple->relkind == RELKIND_SEQUENCE)
1874 : {
1875 : /*
1876 : * For backward compatibility, just throw a warning for
1877 : * invalid sequence permissions when using the non-sequence
1878 : * GRANT syntax.
1879 : */
1880 98 : if (this_privileges & ~((AclMode) ACL_ALL_RIGHTS_SEQUENCE))
1881 : {
1882 : /*
1883 : * Mention the object name because the user needs to know
1884 : * which operations succeeded. This is required because
1885 : * WARNING allows the command to continue.
1886 : */
1887 0 : ereport(WARNING,
1888 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
1889 : errmsg("sequence \"%s\" only supports USAGE, SELECT, and UPDATE privileges",
1890 : NameStr(pg_class_tuple->relname))));
1891 0 : this_privileges &= (AclMode) ACL_ALL_RIGHTS_SEQUENCE;
1892 : }
1893 : }
1894 : else
1895 : {
1896 10514 : if (this_privileges & ~((AclMode) ACL_ALL_RIGHTS_RELATION))
1897 : {
1898 : /*
1899 : * USAGE is the only permission supported by sequences but
1900 : * not by non-sequences. Don't mention the object name
1901 : * because we didn't in the combined TABLE | SEQUENCE
1902 : * check.
1903 : */
1904 0 : ereport(ERROR,
1905 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
1906 : errmsg("invalid privilege type %s for table",
1907 : "USAGE")));
1908 : }
1909 : }
1910 : }
1911 :
1912 : /*
1913 : * Set up array in which we'll accumulate any column privilege bits
1914 : * that need modification. The array is indexed such that entry [0]
1915 : * corresponds to FirstLowInvalidHeapAttributeNumber.
1916 : */
1917 10632 : num_col_privileges = pg_class_tuple->relnatts - FirstLowInvalidHeapAttributeNumber + 1;
1918 10632 : col_privileges = (AclMode *) palloc0(num_col_privileges * sizeof(AclMode));
1919 10632 : have_col_privileges = false;
1920 :
1921 : /*
1922 : * If we are revoking relation privileges that are also column
1923 : * privileges, we must implicitly revoke them from each column too,
1924 : * per SQL spec. (We don't need to implicitly add column privileges
1925 : * during GRANT because the permissions-checking code always checks
1926 : * both relation and per-column privileges.)
1927 : */
1928 10632 : if (!istmt->is_grant &&
1929 3435 : (this_privileges & ACL_ALL_RIGHTS_COLUMN) != 0)
1930 : {
1931 3386 : expand_all_col_privileges(relOid, pg_class_tuple,
1932 : this_privileges & ACL_ALL_RIGHTS_COLUMN,
1933 : col_privileges,
1934 : num_col_privileges);
1935 3386 : have_col_privileges = true;
1936 : }
1937 :
1938 : /*
1939 : * Get owner ID and working copy of existing ACL. If there's no ACL,
1940 : * substitute the proper default.
1941 : */
1942 10632 : ownerId = pg_class_tuple->relowner;
1943 10632 : aclDatum = SysCacheGetAttr(RELOID, tuple, Anum_pg_class_relacl,
1944 : &isNull);
1945 10632 : if (isNull)
1946 : {
1947 5242 : switch (pg_class_tuple->relkind)
1948 : {
1949 58 : case RELKIND_SEQUENCE:
1950 58 : old_acl = acldefault(OBJECT_SEQUENCE, ownerId);
1951 58 : break;
1952 22 : case RELKIND_PROPGRAPH:
1953 22 : old_acl = acldefault(OBJECT_PROPGRAPH, ownerId);
1954 22 : break;
1955 5162 : default:
1956 5162 : old_acl = acldefault(OBJECT_TABLE, ownerId);
1957 5162 : break;
1958 : }
1959 : /* There are no old member roles according to the catalogs */
1960 5242 : noldmembers = 0;
1961 5242 : oldmembers = NULL;
1962 : }
1963 : else
1964 : {
1965 5390 : old_acl = DatumGetAclPCopy(aclDatum);
1966 : /* Get the roles mentioned in the existing ACL */
1967 5390 : noldmembers = aclmembers(old_acl, &oldmembers);
1968 : }
1969 :
1970 : /* Need an extra copy of original rel ACL for column handling */
1971 10632 : old_rel_acl = aclcopy(old_acl);
1972 :
1973 : /*
1974 : * Handle relation-level privileges, if any were specified
1975 : */
1976 10632 : if (this_privileges != ACL_NO_RIGHTS)
1977 : {
1978 : AclMode avail_goptions;
1979 : Acl *new_acl;
1980 : Oid grantorId;
1981 : HeapTuple newtuple;
1982 10363 : Datum values[Natts_pg_class] = {0};
1983 10363 : bool nulls[Natts_pg_class] = {0};
1984 10363 : bool replaces[Natts_pg_class] = {0};
1985 : int nnewmembers;
1986 : Oid *newmembers;
1987 : ObjectType objtype;
1988 :
1989 : /* Determine ID to do the grant as, and available grant options */
1990 10363 : select_best_grantor(istmt->grantor, this_privileges,
1991 : old_acl, ownerId,
1992 : &grantorId, &avail_goptions);
1993 :
1994 10359 : switch (pg_class_tuple->relkind)
1995 : {
1996 110 : case RELKIND_SEQUENCE:
1997 110 : objtype = OBJECT_SEQUENCE;
1998 110 : break;
1999 10249 : default:
2000 10249 : objtype = OBJECT_TABLE;
2001 10249 : break;
2002 : }
2003 :
2004 : /*
2005 : * Restrict the privileges to what we can actually grant, and emit
2006 : * the standards-mandated warning and error messages.
2007 : */
2008 : this_privileges =
2009 10359 : restrict_and_check_grant(istmt->is_grant, avail_goptions,
2010 10359 : istmt->all_privs, this_privileges,
2011 : relOid, grantorId, objtype,
2012 10359 : NameStr(pg_class_tuple->relname),
2013 : 0, NULL);
2014 :
2015 : /*
2016 : * Generate new ACL.
2017 : */
2018 10355 : new_acl = merge_acl_with_grant(old_acl,
2019 10355 : istmt->is_grant,
2020 10355 : istmt->grant_option,
2021 : istmt->behavior,
2022 : istmt->grantees,
2023 : this_privileges,
2024 : grantorId,
2025 : ownerId);
2026 :
2027 : /*
2028 : * We need the members of both old and new ACLs so we can correct
2029 : * the shared dependency information.
2030 : */
2031 10351 : nnewmembers = aclmembers(new_acl, &newmembers);
2032 :
2033 : /* finished building new ACL value, now insert it */
2034 10351 : replaces[Anum_pg_class_relacl - 1] = true;
2035 10351 : values[Anum_pg_class_relacl - 1] = PointerGetDatum(new_acl);
2036 :
2037 10351 : newtuple = heap_modify_tuple(tuple, RelationGetDescr(relation),
2038 : values, nulls, replaces);
2039 :
2040 10351 : CatalogTupleUpdate(relation, &newtuple->t_self, newtuple);
2041 10349 : UnlockTuple(relation, &tuple->t_self, InplaceUpdateTupleLock);
2042 :
2043 : /* Update initial privileges for extensions */
2044 10349 : recordExtensionInitPriv(relOid, RelationRelationId, 0, new_acl);
2045 :
2046 : /* Update the shared dependency ACL info */
2047 10349 : updateAclDependencies(RelationRelationId, relOid, 0,
2048 : ownerId,
2049 : noldmembers, oldmembers,
2050 : nnewmembers, newmembers);
2051 :
2052 10349 : pfree(new_acl);
2053 : }
2054 : else
2055 269 : UnlockTuple(relation, &tuple->t_self, InplaceUpdateTupleLock);
2056 :
2057 : /*
2058 : * Handle column-level privileges, if any were specified or implied.
2059 : * We first expand the user-specified column privileges into the
2060 : * array, and then iterate over all nonempty array entries.
2061 : */
2062 10899 : foreach(cell_colprivs, istmt->col_privs)
2063 : {
2064 281 : AccessPriv *col_privs = (AccessPriv *) lfirst(cell_colprivs);
2065 :
2066 281 : if (col_privs->priv_name == NULL)
2067 12 : this_privileges = ACL_ALL_RIGHTS_COLUMN;
2068 : else
2069 269 : this_privileges = string_to_privilege(col_privs->priv_name);
2070 :
2071 281 : if (this_privileges & ~((AclMode) ACL_ALL_RIGHTS_COLUMN))
2072 0 : ereport(ERROR,
2073 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
2074 : errmsg("invalid privilege type %s for column",
2075 : privilege_to_string(this_privileges))));
2076 :
2077 281 : if (pg_class_tuple->relkind == RELKIND_SEQUENCE &&
2078 0 : this_privileges & ~((AclMode) ACL_SELECT))
2079 : {
2080 : /*
2081 : * The only column privilege allowed on sequences is SELECT.
2082 : * This is a warning not error because we do it that way for
2083 : * relation-level privileges.
2084 : */
2085 0 : ereport(WARNING,
2086 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
2087 : errmsg("sequence \"%s\" only supports SELECT column privileges",
2088 : NameStr(pg_class_tuple->relname))));
2089 :
2090 0 : this_privileges &= (AclMode) ACL_SELECT;
2091 : }
2092 :
2093 281 : expand_col_privileges(col_privs->cols, relOid,
2094 : this_privileges,
2095 : col_privileges,
2096 : num_col_privileges);
2097 281 : have_col_privileges = true;
2098 : }
2099 :
2100 10618 : if (have_col_privileges)
2101 : {
2102 : AttrNumber i;
2103 :
2104 43161 : for (i = 0; i < num_col_privileges; i++)
2105 : {
2106 39506 : if (col_privileges[i] == ACL_NO_RIGHTS)
2107 12928 : continue;
2108 26578 : ExecGrant_Attribute(istmt,
2109 : relOid,
2110 26578 : NameStr(pg_class_tuple->relname),
2111 26578 : i + FirstLowInvalidHeapAttributeNumber,
2112 : ownerId,
2113 26578 : col_privileges[i],
2114 : attRelation,
2115 : old_rel_acl);
2116 : }
2117 : }
2118 :
2119 10618 : pfree(old_rel_acl);
2120 10618 : pfree(col_privileges);
2121 :
2122 10618 : ReleaseSysCache(tuple);
2123 :
2124 : /* prevent error when processing duplicate objects */
2125 10618 : CommandCounterIncrement();
2126 : }
2127 :
2128 10575 : table_close(attRelation, RowExclusiveLock);
2129 10575 : table_close(relation, RowExclusiveLock);
2130 10575 : }
2131 :
2132 : static void
2133 1300 : ExecGrant_common(InternalGrant *istmt, Oid classid, AclMode default_privs,
2134 : void (*object_check) (InternalGrant *istmt, HeapTuple tuple))
2135 : {
2136 : SysCacheIdentifier cacheid;
2137 : Relation relation;
2138 : ListCell *cell;
2139 :
2140 1300 : if (istmt->all_privs && istmt->privileges == ACL_NO_RIGHTS)
2141 460 : istmt->privileges = default_privs;
2142 :
2143 1300 : cacheid = get_object_catcache_oid(classid);
2144 :
2145 1300 : relation = table_open(classid, RowExclusiveLock);
2146 :
2147 2657 : foreach(cell, istmt->objects)
2148 : {
2149 1393 : Oid objectid = lfirst_oid(cell);
2150 : Datum aclDatum;
2151 : Datum nameDatum;
2152 : bool isNull;
2153 : AclMode avail_goptions;
2154 : AclMode this_privileges;
2155 : Acl *old_acl;
2156 : Acl *new_acl;
2157 : Oid grantorId;
2158 : Oid ownerId;
2159 : HeapTuple tuple;
2160 : HeapTuple newtuple;
2161 1393 : Datum *values = palloc0_array(Datum, RelationGetDescr(relation)->natts);
2162 1393 : bool *nulls = palloc0_array(bool, RelationGetDescr(relation)->natts);
2163 1393 : bool *replaces = palloc0_array(bool, RelationGetDescr(relation)->natts);
2164 : int noldmembers;
2165 : int nnewmembers;
2166 : Oid *oldmembers;
2167 : Oid *newmembers;
2168 :
2169 1393 : tuple = SearchSysCacheLocked1(cacheid, ObjectIdGetDatum(objectid));
2170 1393 : if (!HeapTupleIsValid(tuple))
2171 0 : elog(ERROR, "cache lookup failed for %s %u", get_object_class_descr(classid), objectid);
2172 :
2173 : /*
2174 : * Additional object-type-specific checks
2175 : */
2176 1393 : if (object_check)
2177 115 : object_check(istmt, tuple);
2178 :
2179 : /*
2180 : * Get owner ID and working copy of existing ACL. If there's no ACL,
2181 : * substitute the proper default.
2182 : */
2183 1381 : ownerId = DatumGetObjectId(SysCacheGetAttrNotNull(cacheid,
2184 : tuple,
2185 1381 : get_object_attnum_owner(classid)));
2186 1381 : aclDatum = SysCacheGetAttr(cacheid,
2187 : tuple,
2188 1381 : get_object_attnum_acl(classid),
2189 : &isNull);
2190 1381 : if (isNull)
2191 : {
2192 802 : old_acl = acldefault(get_object_type(classid, objectid), ownerId);
2193 : /* There are no old member roles according to the catalogs */
2194 802 : noldmembers = 0;
2195 802 : oldmembers = NULL;
2196 : }
2197 : else
2198 : {
2199 579 : old_acl = DatumGetAclPCopy(aclDatum);
2200 : /* Get the roles mentioned in the existing ACL */
2201 579 : noldmembers = aclmembers(old_acl, &oldmembers);
2202 : }
2203 :
2204 : /* Determine ID to do the grant as, and available grant options */
2205 1381 : select_best_grantor(istmt->grantor, istmt->privileges,
2206 : old_acl, ownerId,
2207 : &grantorId, &avail_goptions);
2208 :
2209 1381 : nameDatum = SysCacheGetAttrNotNull(cacheid, tuple,
2210 1381 : get_object_attnum_name(classid));
2211 :
2212 : /*
2213 : * Restrict the privileges to what we can actually grant, and emit the
2214 : * standards-mandated warning and error messages.
2215 : */
2216 : this_privileges =
2217 2762 : restrict_and_check_grant(istmt->is_grant, avail_goptions,
2218 1381 : istmt->all_privs, istmt->privileges,
2219 : objectid, grantorId, get_object_type(classid, objectid),
2220 1381 : NameStr(*DatumGetName(nameDatum)),
2221 : 0, NULL);
2222 :
2223 : /*
2224 : * Generate new ACL.
2225 : */
2226 1361 : new_acl = merge_acl_with_grant(old_acl, istmt->is_grant,
2227 1361 : istmt->grant_option, istmt->behavior,
2228 : istmt->grantees, this_privileges,
2229 : grantorId, ownerId);
2230 :
2231 : /*
2232 : * We need the members of both old and new ACLs so we can correct the
2233 : * shared dependency information.
2234 : */
2235 1357 : nnewmembers = aclmembers(new_acl, &newmembers);
2236 :
2237 : /* finished building new ACL value, now insert it */
2238 1357 : replaces[get_object_attnum_acl(classid) - 1] = true;
2239 1357 : values[get_object_attnum_acl(classid) - 1] = PointerGetDatum(new_acl);
2240 :
2241 1357 : newtuple = heap_modify_tuple(tuple, RelationGetDescr(relation), values,
2242 : nulls, replaces);
2243 :
2244 1357 : CatalogTupleUpdate(relation, &newtuple->t_self, newtuple);
2245 1357 : UnlockTuple(relation, &tuple->t_self, InplaceUpdateTupleLock);
2246 :
2247 : /* Update initial privileges for extensions */
2248 1357 : recordExtensionInitPriv(objectid, classid, 0, new_acl);
2249 :
2250 : /* Update the shared dependency ACL info */
2251 1357 : updateAclDependencies(classid,
2252 : objectid, 0,
2253 : ownerId,
2254 : noldmembers, oldmembers,
2255 : nnewmembers, newmembers);
2256 :
2257 1357 : ReleaseSysCache(tuple);
2258 :
2259 1357 : pfree(new_acl);
2260 :
2261 : /* prevent error when processing duplicate objects */
2262 1357 : CommandCounterIncrement();
2263 : }
2264 :
2265 1264 : table_close(relation, RowExclusiveLock);
2266 1264 : }
2267 :
2268 : static void
2269 27 : ExecGrant_Language_check(InternalGrant *istmt, HeapTuple tuple)
2270 : {
2271 : Form_pg_language pg_language_tuple;
2272 :
2273 27 : pg_language_tuple = (Form_pg_language) GETSTRUCT(tuple);
2274 :
2275 27 : if (!pg_language_tuple->lanpltrusted)
2276 4 : ereport(ERROR,
2277 : (errcode(ERRCODE_WRONG_OBJECT_TYPE),
2278 : errmsg("language \"%s\" is not trusted",
2279 : NameStr(pg_language_tuple->lanname)),
2280 : errdetail("GRANT and REVOKE are not allowed on untrusted languages, "
2281 : "because only superusers can use untrusted languages.")));
2282 23 : }
2283 :
2284 : static void
2285 58 : ExecGrant_Largeobject(InternalGrant *istmt)
2286 : {
2287 : Relation relation;
2288 : ListCell *cell;
2289 :
2290 58 : if (istmt->all_privs && istmt->privileges == ACL_NO_RIGHTS)
2291 29 : istmt->privileges = ACL_ALL_RIGHTS_LARGEOBJECT;
2292 :
2293 58 : relation = table_open(LargeObjectMetadataRelationId,
2294 : RowExclusiveLock);
2295 :
2296 120 : foreach(cell, istmt->objects)
2297 : {
2298 62 : Oid loid = lfirst_oid(cell);
2299 : Form_pg_largeobject_metadata form_lo_meta;
2300 : char loname[NAMEDATALEN];
2301 : Datum aclDatum;
2302 : bool isNull;
2303 : AclMode avail_goptions;
2304 : AclMode this_privileges;
2305 : Acl *old_acl;
2306 : Acl *new_acl;
2307 : Oid grantorId;
2308 : Oid ownerId;
2309 : HeapTuple newtuple;
2310 62 : Datum values[Natts_pg_largeobject_metadata] = {0};
2311 62 : bool nulls[Natts_pg_largeobject_metadata] = {0};
2312 62 : bool replaces[Natts_pg_largeobject_metadata] = {0};
2313 : int noldmembers;
2314 : int nnewmembers;
2315 : Oid *oldmembers;
2316 : Oid *newmembers;
2317 : ScanKeyData entry[1];
2318 : SysScanDesc scan;
2319 : HeapTuple tuple;
2320 :
2321 : /* There's no syscache for pg_largeobject_metadata */
2322 62 : ScanKeyInit(&entry[0],
2323 : Anum_pg_largeobject_metadata_oid,
2324 : BTEqualStrategyNumber, F_OIDEQ,
2325 : ObjectIdGetDatum(loid));
2326 :
2327 62 : scan = systable_beginscan(relation,
2328 : LargeObjectMetadataOidIndexId, true,
2329 : NULL, 1, entry);
2330 :
2331 62 : tuple = systable_getnext(scan);
2332 62 : if (!HeapTupleIsValid(tuple))
2333 0 : elog(ERROR, "could not find tuple for large object %u", loid);
2334 :
2335 62 : form_lo_meta = (Form_pg_largeobject_metadata) GETSTRUCT(tuple);
2336 :
2337 : /*
2338 : * Get owner ID and working copy of existing ACL. If there's no ACL,
2339 : * substitute the proper default.
2340 : */
2341 62 : ownerId = form_lo_meta->lomowner;
2342 62 : aclDatum = heap_getattr(tuple,
2343 : Anum_pg_largeobject_metadata_lomacl,
2344 : RelationGetDescr(relation), &isNull);
2345 62 : if (isNull)
2346 : {
2347 38 : old_acl = acldefault(OBJECT_LARGEOBJECT, ownerId);
2348 : /* There are no old member roles according to the catalogs */
2349 38 : noldmembers = 0;
2350 38 : oldmembers = NULL;
2351 : }
2352 : else
2353 : {
2354 24 : old_acl = DatumGetAclPCopy(aclDatum);
2355 : /* Get the roles mentioned in the existing ACL */
2356 24 : noldmembers = aclmembers(old_acl, &oldmembers);
2357 : }
2358 :
2359 : /* Determine ID to do the grant as, and available grant options */
2360 62 : select_best_grantor(istmt->grantor, istmt->privileges,
2361 : old_acl, ownerId,
2362 : &grantorId, &avail_goptions);
2363 :
2364 : /*
2365 : * Restrict the privileges to what we can actually grant, and emit the
2366 : * standards-mandated warning and error messages.
2367 : */
2368 62 : snprintf(loname, sizeof(loname), "large object %u", loid);
2369 : this_privileges =
2370 62 : restrict_and_check_grant(istmt->is_grant, avail_goptions,
2371 62 : istmt->all_privs, istmt->privileges,
2372 : loid, grantorId, OBJECT_LARGEOBJECT,
2373 : loname, 0, NULL);
2374 :
2375 : /*
2376 : * Generate new ACL.
2377 : */
2378 62 : new_acl = merge_acl_with_grant(old_acl, istmt->is_grant,
2379 62 : istmt->grant_option, istmt->behavior,
2380 : istmt->grantees, this_privileges,
2381 : grantorId, ownerId);
2382 :
2383 : /*
2384 : * We need the members of both old and new ACLs so we can correct the
2385 : * shared dependency information.
2386 : */
2387 62 : nnewmembers = aclmembers(new_acl, &newmembers);
2388 :
2389 : /* finished building new ACL value, now insert it */
2390 62 : replaces[Anum_pg_largeobject_metadata_lomacl - 1] = true;
2391 : values[Anum_pg_largeobject_metadata_lomacl - 1]
2392 62 : = PointerGetDatum(new_acl);
2393 :
2394 62 : newtuple = heap_modify_tuple(tuple, RelationGetDescr(relation),
2395 : values, nulls, replaces);
2396 :
2397 62 : CatalogTupleUpdate(relation, &newtuple->t_self, newtuple);
2398 :
2399 : /* Update initial privileges for extensions */
2400 62 : recordExtensionInitPriv(loid, LargeObjectRelationId, 0, new_acl);
2401 :
2402 : /* Update the shared dependency ACL info */
2403 62 : updateAclDependencies(LargeObjectRelationId,
2404 : form_lo_meta->oid, 0,
2405 : ownerId,
2406 : noldmembers, oldmembers,
2407 : nnewmembers, newmembers);
2408 :
2409 62 : systable_endscan(scan);
2410 :
2411 62 : pfree(new_acl);
2412 :
2413 : /* prevent error when processing duplicate objects */
2414 62 : CommandCounterIncrement();
2415 : }
2416 :
2417 58 : table_close(relation, RowExclusiveLock);
2418 58 : }
2419 :
2420 : static void
2421 88 : ExecGrant_Type_check(InternalGrant *istmt, HeapTuple tuple)
2422 : {
2423 : Form_pg_type pg_type_tuple;
2424 :
2425 88 : pg_type_tuple = (Form_pg_type) GETSTRUCT(tuple);
2426 :
2427 : /* Disallow GRANT on dependent types */
2428 88 : if (IsTrueArrayType(pg_type_tuple))
2429 4 : ereport(ERROR,
2430 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
2431 : errmsg("cannot set privileges of array types"),
2432 : errhint("Set the privileges of the element type instead.")));
2433 84 : if (pg_type_tuple->typtype == TYPTYPE_MULTIRANGE)
2434 4 : ereport(ERROR,
2435 : (errcode(ERRCODE_INVALID_GRANT_OPERATION),
2436 : errmsg("cannot set privileges of multirange types"),
2437 : errhint("Set the privileges of the range type instead.")));
2438 80 : }
2439 :
2440 : static void
2441 49 : ExecGrant_Parameter(InternalGrant *istmt)
2442 : {
2443 : Relation relation;
2444 : ListCell *cell;
2445 :
2446 49 : if (istmt->all_privs && istmt->privileges == ACL_NO_RIGHTS)
2447 21 : istmt->privileges = ACL_ALL_RIGHTS_PARAMETER_ACL;
2448 :
2449 49 : relation = table_open(ParameterAclRelationId, RowExclusiveLock);
2450 :
2451 117 : foreach(cell, istmt->objects)
2452 : {
2453 68 : Oid parameterId = lfirst_oid(cell);
2454 : Datum nameDatum;
2455 : const char *parname;
2456 : Datum aclDatum;
2457 : bool isNull;
2458 : AclMode avail_goptions;
2459 : AclMode this_privileges;
2460 : Acl *old_acl;
2461 : Acl *new_acl;
2462 : Oid grantorId;
2463 : Oid ownerId;
2464 : HeapTuple tuple;
2465 : int noldmembers;
2466 : int nnewmembers;
2467 : Oid *oldmembers;
2468 : Oid *newmembers;
2469 :
2470 68 : tuple = SearchSysCache1(PARAMETERACLOID, ObjectIdGetDatum(parameterId));
2471 68 : if (!HeapTupleIsValid(tuple))
2472 0 : elog(ERROR, "cache lookup failed for parameter ACL %u",
2473 : parameterId);
2474 :
2475 : /* We'll need the GUC's name */
2476 68 : nameDatum = SysCacheGetAttrNotNull(PARAMETERACLOID, tuple,
2477 : Anum_pg_parameter_acl_parname);
2478 68 : parname = TextDatumGetCString(nameDatum);
2479 :
2480 : /* Treat all parameters as belonging to the bootstrap superuser. */
2481 68 : ownerId = BOOTSTRAP_SUPERUSERID;
2482 :
2483 : /*
2484 : * Get working copy of existing ACL. If there's no ACL, substitute the
2485 : * proper default.
2486 : */
2487 68 : aclDatum = SysCacheGetAttr(PARAMETERACLOID, tuple,
2488 : Anum_pg_parameter_acl_paracl,
2489 : &isNull);
2490 :
2491 68 : if (isNull)
2492 : {
2493 33 : old_acl = acldefault(istmt->objtype, ownerId);
2494 : /* There are no old member roles according to the catalogs */
2495 33 : noldmembers = 0;
2496 33 : oldmembers = NULL;
2497 : }
2498 : else
2499 : {
2500 35 : old_acl = DatumGetAclPCopy(aclDatum);
2501 : /* Get the roles mentioned in the existing ACL */
2502 35 : noldmembers = aclmembers(old_acl, &oldmembers);
2503 : }
2504 :
2505 : /* Determine ID to do the grant as, and available grant options */
2506 68 : select_best_grantor(istmt->grantor, istmt->privileges,
2507 : old_acl, ownerId,
2508 : &grantorId, &avail_goptions);
2509 :
2510 : /*
2511 : * Restrict the privileges to what we can actually grant, and emit the
2512 : * standards-mandated warning and error messages.
2513 : */
2514 : this_privileges =
2515 68 : restrict_and_check_grant(istmt->is_grant, avail_goptions,
2516 68 : istmt->all_privs, istmt->privileges,
2517 : parameterId, grantorId,
2518 : OBJECT_PARAMETER_ACL,
2519 : parname,
2520 : 0, NULL);
2521 :
2522 : /*
2523 : * Generate new ACL.
2524 : */
2525 68 : new_acl = merge_acl_with_grant(old_acl, istmt->is_grant,
2526 68 : istmt->grant_option, istmt->behavior,
2527 : istmt->grantees, this_privileges,
2528 : grantorId, ownerId);
2529 :
2530 : /*
2531 : * We need the members of both old and new ACLs so we can correct the
2532 : * shared dependency information.
2533 : */
2534 68 : nnewmembers = aclmembers(new_acl, &newmembers);
2535 :
2536 : /*
2537 : * If the new ACL is equal to the default, we don't need the catalog
2538 : * entry any longer. Delete it rather than updating it, to avoid
2539 : * leaving a degenerate entry.
2540 : */
2541 68 : if (aclequal(new_acl, acldefault(istmt->objtype, ownerId)))
2542 : {
2543 30 : CatalogTupleDelete(relation, &tuple->t_self);
2544 : }
2545 : else
2546 : {
2547 : /* finished building new ACL value, now insert it */
2548 : HeapTuple newtuple;
2549 38 : Datum values[Natts_pg_parameter_acl] = {0};
2550 38 : bool nulls[Natts_pg_parameter_acl] = {0};
2551 38 : bool replaces[Natts_pg_parameter_acl] = {0};
2552 :
2553 38 : replaces[Anum_pg_parameter_acl_paracl - 1] = true;
2554 38 : values[Anum_pg_parameter_acl_paracl - 1] = PointerGetDatum(new_acl);
2555 :
2556 38 : newtuple = heap_modify_tuple(tuple, RelationGetDescr(relation),
2557 : values, nulls, replaces);
2558 :
2559 38 : CatalogTupleUpdate(relation, &newtuple->t_self, newtuple);
2560 : }
2561 :
2562 : /* Update initial privileges for extensions */
2563 68 : recordExtensionInitPriv(parameterId, ParameterAclRelationId, 0,
2564 : new_acl);
2565 :
2566 : /* Update the shared dependency ACL info */
2567 68 : updateAclDependencies(ParameterAclRelationId, parameterId, 0,
2568 : ownerId,
2569 : noldmembers, oldmembers,
2570 : nnewmembers, newmembers);
2571 :
2572 68 : ReleaseSysCache(tuple);
2573 68 : pfree(new_acl);
2574 :
2575 : /* prevent error when processing duplicate objects */
2576 68 : CommandCounterIncrement();
2577 : }
2578 :
2579 49 : table_close(relation, RowExclusiveLock);
2580 49 : }
2581 :
2582 :
2583 : static AclMode
2584 10786 : string_to_privilege(const char *privname)
2585 : {
2586 10786 : if (strcmp(privname, "insert") == 0)
2587 157 : return ACL_INSERT;
2588 10629 : if (strcmp(privname, "select") == 0)
2589 9117 : return ACL_SELECT;
2590 1512 : if (strcmp(privname, "update") == 0)
2591 284 : return ACL_UPDATE;
2592 1228 : if (strcmp(privname, "delete") == 0)
2593 83 : return ACL_DELETE;
2594 1145 : if (strcmp(privname, "truncate") == 0)
2595 29 : return ACL_TRUNCATE;
2596 1116 : if (strcmp(privname, "references") == 0)
2597 9 : return ACL_REFERENCES;
2598 1107 : if (strcmp(privname, "trigger") == 0)
2599 5 : return ACL_TRIGGER;
2600 1102 : if (strcmp(privname, "execute") == 0)
2601 264 : return ACL_EXECUTE;
2602 838 : if (strcmp(privname, "usage") == 0)
2603 443 : return ACL_USAGE;
2604 395 : if (strcmp(privname, "create") == 0)
2605 190 : return ACL_CREATE;
2606 205 : if (strcmp(privname, "temporary") == 0)
2607 108 : return ACL_CREATE_TEMP;
2608 97 : if (strcmp(privname, "temp") == 0)
2609 1 : return ACL_CREATE_TEMP;
2610 96 : if (strcmp(privname, "connect") == 0)
2611 22 : return ACL_CONNECT;
2612 74 : if (strcmp(privname, "set") == 0)
2613 25 : return ACL_SET;
2614 49 : if (strcmp(privname, "alter system") == 0)
2615 12 : return ACL_ALTER_SYSTEM;
2616 37 : if (strcmp(privname, "maintain") == 0)
2617 37 : return ACL_MAINTAIN;
2618 0 : ereport(ERROR,
2619 : (errcode(ERRCODE_SYNTAX_ERROR),
2620 : errmsg("unrecognized privilege type \"%s\"", privname)));
2621 : return 0; /* appease compiler */
2622 : }
2623 :
2624 : static const char *
2625 20 : privilege_to_string(AclMode privilege)
2626 : {
2627 20 : switch (privilege)
2628 : {
2629 4 : case ACL_INSERT:
2630 4 : return "INSERT";
2631 0 : case ACL_SELECT:
2632 0 : return "SELECT";
2633 4 : case ACL_UPDATE:
2634 4 : return "UPDATE";
2635 0 : case ACL_DELETE:
2636 0 : return "DELETE";
2637 0 : case ACL_TRUNCATE:
2638 0 : return "TRUNCATE";
2639 0 : case ACL_REFERENCES:
2640 0 : return "REFERENCES";
2641 0 : case ACL_TRIGGER:
2642 0 : return "TRIGGER";
2643 0 : case ACL_EXECUTE:
2644 0 : return "EXECUTE";
2645 12 : case ACL_USAGE:
2646 12 : return "USAGE";
2647 0 : case ACL_CREATE:
2648 0 : return "CREATE";
2649 0 : case ACL_CREATE_TEMP:
2650 0 : return "TEMP";
2651 0 : case ACL_CONNECT:
2652 0 : return "CONNECT";
2653 0 : case ACL_SET:
2654 0 : return "SET";
2655 0 : case ACL_ALTER_SYSTEM:
2656 0 : return "ALTER SYSTEM";
2657 0 : case ACL_MAINTAIN:
2658 0 : return "MAINTAIN";
2659 0 : default:
2660 0 : elog(ERROR, "unrecognized privilege: %d", (int) privilege);
2661 : }
2662 : return NULL; /* appease compiler */
2663 : }
2664 :
2665 : /*
2666 : * Standardized reporting of aclcheck permissions failures.
2667 : *
2668 : * Note: we do not double-quote the %s's below, because many callers
2669 : * supply strings that might be already quoted.
2670 : */
2671 : void
2672 1904 : aclcheck_error(AclResult aclerr, ObjectType objtype,
2673 : const char *objectname)
2674 : {
2675 1904 : switch (aclerr)
2676 : {
2677 0 : case ACLCHECK_OK:
2678 : /* no error, so return to caller */
2679 0 : break;
2680 1530 : case ACLCHECK_NO_PRIV:
2681 : {
2682 1530 : const char *msg = "???";
2683 :
2684 1530 : switch (objtype)
2685 : {
2686 4 : case OBJECT_AGGREGATE:
2687 4 : msg = gettext_noop("permission denied for aggregate %s");
2688 4 : break;
2689 0 : case OBJECT_COLLATION:
2690 0 : msg = gettext_noop("permission denied for collation %s");
2691 0 : break;
2692 0 : case OBJECT_COLUMN:
2693 0 : msg = gettext_noop("permission denied for column %s");
2694 0 : break;
2695 0 : case OBJECT_CONVERSION:
2696 0 : msg = gettext_noop("permission denied for conversion %s");
2697 0 : break;
2698 12 : case OBJECT_DATABASE:
2699 12 : msg = gettext_noop("permission denied for database %s");
2700 12 : break;
2701 0 : case OBJECT_DOMAIN:
2702 0 : msg = gettext_noop("permission denied for domain %s");
2703 0 : break;
2704 0 : case OBJECT_EVENT_TRIGGER:
2705 0 : msg = gettext_noop("permission denied for event trigger %s");
2706 0 : break;
2707 0 : case OBJECT_EXTENSION:
2708 0 : msg = gettext_noop("permission denied for extension %s");
2709 0 : break;
2710 29 : case OBJECT_FDW:
2711 29 : msg = gettext_noop("permission denied for foreign-data wrapper %s");
2712 29 : break;
2713 17 : case OBJECT_FOREIGN_SERVER:
2714 17 : msg = gettext_noop("permission denied for foreign server %s");
2715 17 : break;
2716 1 : case OBJECT_FOREIGN_TABLE:
2717 1 : msg = gettext_noop("permission denied for foreign table %s");
2718 1 : break;
2719 61 : case OBJECT_FUNCTION:
2720 61 : msg = gettext_noop("permission denied for function %s");
2721 61 : break;
2722 9 : case OBJECT_INDEX:
2723 9 : msg = gettext_noop("permission denied for index %s");
2724 9 : break;
2725 5 : case OBJECT_LANGUAGE:
2726 5 : msg = gettext_noop("permission denied for language %s");
2727 5 : break;
2728 0 : case OBJECT_LARGEOBJECT:
2729 0 : msg = gettext_noop("permission denied for large object %s");
2730 0 : break;
2731 4 : case OBJECT_MATVIEW:
2732 4 : msg = gettext_noop("permission denied for materialized view %s");
2733 4 : break;
2734 0 : case OBJECT_OPCLASS:
2735 0 : msg = gettext_noop("permission denied for operator class %s");
2736 0 : break;
2737 0 : case OBJECT_OPERATOR:
2738 0 : msg = gettext_noop("permission denied for operator %s");
2739 0 : break;
2740 0 : case OBJECT_OPFAMILY:
2741 0 : msg = gettext_noop("permission denied for operator family %s");
2742 0 : break;
2743 0 : case OBJECT_PARAMETER_ACL:
2744 0 : msg = gettext_noop("permission denied for parameter %s");
2745 0 : break;
2746 0 : case OBJECT_POLICY:
2747 0 : msg = gettext_noop("permission denied for policy %s");
2748 0 : break;
2749 8 : case OBJECT_PROCEDURE:
2750 8 : msg = gettext_noop("permission denied for procedure %s");
2751 8 : break;
2752 8 : case OBJECT_PROPGRAPH:
2753 8 : msg = gettext_noop("permission denied for property graph %s");
2754 8 : break;
2755 0 : case OBJECT_PUBLICATION:
2756 0 : msg = gettext_noop("permission denied for publication %s");
2757 0 : break;
2758 0 : case OBJECT_ROUTINE:
2759 0 : msg = gettext_noop("permission denied for routine %s");
2760 0 : break;
2761 25 : case OBJECT_SCHEMA:
2762 25 : msg = gettext_noop("permission denied for schema %s");
2763 25 : break;
2764 0 : case OBJECT_SEQUENCE:
2765 0 : msg = gettext_noop("permission denied for sequence %s");
2766 0 : break;
2767 0 : case OBJECT_STATISTIC_EXT:
2768 0 : msg = gettext_noop("permission denied for statistics object %s");
2769 0 : break;
2770 0 : case OBJECT_SUBSCRIPTION:
2771 0 : msg = gettext_noop("permission denied for subscription %s");
2772 0 : break;
2773 977 : case OBJECT_TABLE:
2774 977 : msg = gettext_noop("permission denied for table %s");
2775 977 : break;
2776 12 : case OBJECT_TABLESPACE:
2777 12 : msg = gettext_noop("permission denied for tablespace %s");
2778 12 : break;
2779 0 : case OBJECT_TSCONFIGURATION:
2780 0 : msg = gettext_noop("permission denied for text search configuration %s");
2781 0 : break;
2782 0 : case OBJECT_TSDICTIONARY:
2783 0 : msg = gettext_noop("permission denied for text search dictionary %s");
2784 0 : break;
2785 80 : case OBJECT_TYPE:
2786 80 : msg = gettext_noop("permission denied for type %s");
2787 80 : break;
2788 278 : case OBJECT_VIEW:
2789 278 : msg = gettext_noop("permission denied for view %s");
2790 278 : break;
2791 : /* these currently aren't used */
2792 0 : case OBJECT_ACCESS_METHOD:
2793 : case OBJECT_AMOP:
2794 : case OBJECT_AMPROC:
2795 : case OBJECT_ATTRIBUTE:
2796 : case OBJECT_CAST:
2797 : case OBJECT_DEFAULT:
2798 : case OBJECT_DEFACL:
2799 : case OBJECT_DOMCONSTRAINT:
2800 : case OBJECT_PUBLICATION_NAMESPACE:
2801 : case OBJECT_PUBLICATION_REL:
2802 : case OBJECT_ROLE:
2803 : case OBJECT_RULE:
2804 : case OBJECT_TABCONSTRAINT:
2805 : case OBJECT_TRANSFORM:
2806 : case OBJECT_TRIGGER:
2807 : case OBJECT_TSPARSER:
2808 : case OBJECT_TSTEMPLATE:
2809 : case OBJECT_USER_MAPPING:
2810 0 : elog(ERROR, "unsupported object type: %d", objtype);
2811 : }
2812 :
2813 1530 : ereport(ERROR,
2814 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
2815 : errmsg(msg, objectname)));
2816 : break;
2817 : }
2818 374 : case ACLCHECK_NOT_OWNER:
2819 : {
2820 374 : const char *msg = "???";
2821 :
2822 374 : switch (objtype)
2823 : {
2824 4 : case OBJECT_AGGREGATE:
2825 4 : msg = gettext_noop("must be owner of aggregate %s");
2826 4 : break;
2827 0 : case OBJECT_COLLATION:
2828 0 : msg = gettext_noop("must be owner of collation %s");
2829 0 : break;
2830 12 : case OBJECT_CONVERSION:
2831 12 : msg = gettext_noop("must be owner of conversion %s");
2832 12 : break;
2833 0 : case OBJECT_DATABASE:
2834 0 : msg = gettext_noop("must be owner of database %s");
2835 0 : break;
2836 0 : case OBJECT_DOMAIN:
2837 0 : msg = gettext_noop("must be owner of domain %s");
2838 0 : break;
2839 0 : case OBJECT_EVENT_TRIGGER:
2840 0 : msg = gettext_noop("must be owner of event trigger %s");
2841 0 : break;
2842 0 : case OBJECT_EXTENSION:
2843 0 : msg = gettext_noop("must be owner of extension %s");
2844 0 : break;
2845 12 : case OBJECT_FDW:
2846 12 : msg = gettext_noop("must be owner of foreign-data wrapper %s");
2847 12 : break;
2848 76 : case OBJECT_FOREIGN_SERVER:
2849 76 : msg = gettext_noop("must be owner of foreign server %s");
2850 76 : break;
2851 0 : case OBJECT_FOREIGN_TABLE:
2852 0 : msg = gettext_noop("must be owner of foreign table %s");
2853 0 : break;
2854 28 : case OBJECT_FUNCTION:
2855 28 : msg = gettext_noop("must be owner of function %s");
2856 28 : break;
2857 16 : case OBJECT_INDEX:
2858 16 : msg = gettext_noop("must be owner of index %s");
2859 16 : break;
2860 8 : case OBJECT_LANGUAGE:
2861 8 : msg = gettext_noop("must be owner of language %s");
2862 8 : break;
2863 0 : case OBJECT_LARGEOBJECT:
2864 0 : msg = gettext_noop("must be owner of large object %s");
2865 0 : break;
2866 0 : case OBJECT_MATVIEW:
2867 0 : msg = gettext_noop("must be owner of materialized view %s");
2868 0 : break;
2869 12 : case OBJECT_OPCLASS:
2870 12 : msg = gettext_noop("must be owner of operator class %s");
2871 12 : break;
2872 12 : case OBJECT_OPERATOR:
2873 12 : msg = gettext_noop("must be owner of operator %s");
2874 12 : break;
2875 12 : case OBJECT_OPFAMILY:
2876 12 : msg = gettext_noop("must be owner of operator family %s");
2877 12 : break;
2878 4 : case OBJECT_PROCEDURE:
2879 4 : msg = gettext_noop("must be owner of procedure %s");
2880 4 : break;
2881 12 : case OBJECT_PROPGRAPH:
2882 12 : msg = gettext_noop("must be owner of property graph %s");
2883 12 : break;
2884 4 : case OBJECT_PUBLICATION:
2885 4 : msg = gettext_noop("must be owner of publication %s");
2886 4 : break;
2887 0 : case OBJECT_ROUTINE:
2888 0 : msg = gettext_noop("must be owner of routine %s");
2889 0 : break;
2890 4 : case OBJECT_SEQUENCE:
2891 4 : msg = gettext_noop("must be owner of sequence %s");
2892 4 : break;
2893 4 : case OBJECT_SUBSCRIPTION:
2894 4 : msg = gettext_noop("must be owner of subscription %s");
2895 4 : break;
2896 66 : case OBJECT_TABLE:
2897 66 : msg = gettext_noop("must be owner of table %s");
2898 66 : break;
2899 4 : case OBJECT_TYPE:
2900 4 : msg = gettext_noop("must be owner of type %s");
2901 4 : break;
2902 12 : case OBJECT_VIEW:
2903 12 : msg = gettext_noop("must be owner of view %s");
2904 12 : break;
2905 12 : case OBJECT_SCHEMA:
2906 12 : msg = gettext_noop("must be owner of schema %s");
2907 12 : break;
2908 24 : case OBJECT_STATISTIC_EXT:
2909 24 : msg = gettext_noop("must be owner of statistics object %s");
2910 24 : break;
2911 0 : case OBJECT_TABLESPACE:
2912 0 : msg = gettext_noop("must be owner of tablespace %s");
2913 0 : break;
2914 12 : case OBJECT_TSCONFIGURATION:
2915 12 : msg = gettext_noop("must be owner of text search configuration %s");
2916 12 : break;
2917 12 : case OBJECT_TSDICTIONARY:
2918 12 : msg = gettext_noop("must be owner of text search dictionary %s");
2919 12 : break;
2920 :
2921 : /*
2922 : * Special cases: For these, the error message talks
2923 : * about "relation", because that's where the
2924 : * ownership is attached. See also
2925 : * check_object_ownership().
2926 : */
2927 12 : case OBJECT_COLUMN:
2928 : case OBJECT_POLICY:
2929 : case OBJECT_RULE:
2930 : case OBJECT_TABCONSTRAINT:
2931 : case OBJECT_TRIGGER:
2932 12 : msg = gettext_noop("must be owner of relation %s");
2933 12 : break;
2934 : /* these currently aren't used */
2935 0 : case OBJECT_ACCESS_METHOD:
2936 : case OBJECT_AMOP:
2937 : case OBJECT_AMPROC:
2938 : case OBJECT_ATTRIBUTE:
2939 : case OBJECT_CAST:
2940 : case OBJECT_DEFAULT:
2941 : case OBJECT_DEFACL:
2942 : case OBJECT_DOMCONSTRAINT:
2943 : case OBJECT_PARAMETER_ACL:
2944 : case OBJECT_PUBLICATION_NAMESPACE:
2945 : case OBJECT_PUBLICATION_REL:
2946 : case OBJECT_ROLE:
2947 : case OBJECT_TRANSFORM:
2948 : case OBJECT_TSPARSER:
2949 : case OBJECT_TSTEMPLATE:
2950 : case OBJECT_USER_MAPPING:
2951 0 : elog(ERROR, "unsupported object type: %d", objtype);
2952 : }
2953 :
2954 374 : ereport(ERROR,
2955 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
2956 : errmsg(msg, objectname)));
2957 : break;
2958 : }
2959 0 : default:
2960 0 : elog(ERROR, "unrecognized AclResult: %d", (int) aclerr);
2961 : break;
2962 : }
2963 0 : }
2964 :
2965 :
2966 : void
2967 0 : aclcheck_error_col(AclResult aclerr, ObjectType objtype,
2968 : const char *objectname, const char *colname)
2969 : {
2970 0 : switch (aclerr)
2971 : {
2972 0 : case ACLCHECK_OK:
2973 : /* no error, so return to caller */
2974 0 : break;
2975 0 : case ACLCHECK_NO_PRIV:
2976 0 : ereport(ERROR,
2977 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
2978 : errmsg("permission denied for column \"%s\" of relation \"%s\"",
2979 : colname, objectname)));
2980 : break;
2981 0 : case ACLCHECK_NOT_OWNER:
2982 : /* relation msg is OK since columns don't have separate owners */
2983 0 : aclcheck_error(aclerr, objtype, objectname);
2984 0 : break;
2985 0 : default:
2986 0 : elog(ERROR, "unrecognized AclResult: %d", (int) aclerr);
2987 : break;
2988 : }
2989 0 : }
2990 :
2991 :
2992 : /*
2993 : * Special common handling for types: use element type instead of array type,
2994 : * and format nicely
2995 : */
2996 : void
2997 80 : aclcheck_error_type(AclResult aclerr, Oid typeOid)
2998 : {
2999 80 : Oid element_type = get_element_type(typeOid);
3000 :
3001 80 : aclcheck_error(aclerr, OBJECT_TYPE, format_type_be(element_type ? element_type : typeOid));
3002 0 : }
3003 :
3004 :
3005 : /*
3006 : * Relay for the various pg_*_mask routines depending on object kind
3007 : */
3008 : static AclMode
3009 48 : pg_aclmask(ObjectType objtype, Oid object_oid, AttrNumber attnum, Oid roleid,
3010 : AclMode mask, AclMaskHow how)
3011 : {
3012 48 : switch (objtype)
3013 : {
3014 0 : case OBJECT_COLUMN:
3015 : return
3016 0 : pg_class_aclmask(object_oid, roleid, mask, how) |
3017 0 : pg_attribute_aclmask(object_oid, attnum, roleid, mask, how);
3018 12 : case OBJECT_TABLE:
3019 : case OBJECT_SEQUENCE:
3020 : case OBJECT_PROPGRAPH:
3021 12 : return pg_class_aclmask(object_oid, roleid, mask, how);
3022 0 : case OBJECT_DATABASE:
3023 0 : return object_aclmask(DatabaseRelationId, object_oid, roleid, mask, how);
3024 0 : case OBJECT_FUNCTION:
3025 0 : return object_aclmask(ProcedureRelationId, object_oid, roleid, mask, how);
3026 4 : case OBJECT_LANGUAGE:
3027 4 : return object_aclmask(LanguageRelationId, object_oid, roleid, mask, how);
3028 0 : case OBJECT_LARGEOBJECT:
3029 0 : return pg_largeobject_aclmask_snapshot(object_oid, roleid,
3030 : mask, how, NULL);
3031 0 : case OBJECT_PARAMETER_ACL:
3032 0 : return pg_parameter_acl_aclmask(object_oid, roleid, mask, how);
3033 0 : case OBJECT_SCHEMA:
3034 0 : return object_aclmask(NamespaceRelationId, object_oid, roleid, mask, how);
3035 0 : case OBJECT_STATISTIC_EXT:
3036 0 : elog(ERROR, "grantable rights not supported for statistics objects");
3037 : /* not reached, but keep compiler quiet */
3038 : return ACL_NO_RIGHTS;
3039 0 : case OBJECT_TABLESPACE:
3040 0 : return object_aclmask(TableSpaceRelationId, object_oid, roleid, mask, how);
3041 12 : case OBJECT_FDW:
3042 12 : return object_aclmask(ForeignDataWrapperRelationId, object_oid, roleid, mask, how);
3043 12 : case OBJECT_FOREIGN_SERVER:
3044 12 : return object_aclmask(ForeignServerRelationId, object_oid, roleid, mask, how);
3045 0 : case OBJECT_EVENT_TRIGGER:
3046 0 : elog(ERROR, "grantable rights not supported for event triggers");
3047 : /* not reached, but keep compiler quiet */
3048 : return ACL_NO_RIGHTS;
3049 8 : case OBJECT_TYPE:
3050 8 : return object_aclmask(TypeRelationId, object_oid, roleid, mask, how);
3051 0 : default:
3052 0 : elog(ERROR, "unrecognized object type: %d",
3053 : (int) objtype);
3054 : /* not reached, but keep compiler quiet */
3055 : return ACL_NO_RIGHTS;
3056 : }
3057 : }
3058 :
3059 :
3060 : /* ****************************************************************
3061 : * Exported routines for examining a user's privileges for various objects
3062 : *
3063 : * See aclmask() for a description of the common API for these functions.
3064 : * ****************************************************************
3065 : */
3066 :
3067 : /*
3068 : * Generic routine for examining a user's privileges for an object
3069 : */
3070 : static AclMode
3071 36 : object_aclmask(Oid classid, Oid objectid, Oid roleid,
3072 : AclMode mask, AclMaskHow how)
3073 : {
3074 36 : return object_aclmask_ext(classid, objectid, roleid, mask, how, NULL);
3075 : }
3076 :
3077 : /*
3078 : * Generic routine for examining a user's privileges for an object,
3079 : * with is_missing
3080 : */
3081 : static AclMode
3082 2448752 : object_aclmask_ext(Oid classid, Oid objectid, Oid roleid,
3083 : AclMode mask, AclMaskHow how,
3084 : bool *is_missing)
3085 : {
3086 : SysCacheIdentifier cacheid;
3087 : AclMode result;
3088 : HeapTuple tuple;
3089 : Datum aclDatum;
3090 : bool isNull;
3091 : Acl *acl;
3092 : Oid ownerId;
3093 :
3094 : /* Special cases */
3095 2448752 : switch (classid)
3096 : {
3097 615792 : case NamespaceRelationId:
3098 615792 : return pg_namespace_aclmask_ext(objectid, roleid, mask, how,
3099 : is_missing);
3100 197420 : case TypeRelationId:
3101 197420 : return pg_type_aclmask_ext(objectid, roleid, mask, how,
3102 : is_missing);
3103 : }
3104 :
3105 : /* Even more special cases */
3106 : Assert(classid != RelationRelationId); /* should use pg_class_acl* */
3107 : Assert(classid != LargeObjectMetadataRelationId); /* should use
3108 : * pg_largeobject_acl* */
3109 :
3110 : /* Superusers bypass all permission checking. */
3111 1635540 : if (superuser_arg(roleid))
3112 1604495 : return mask;
3113 :
3114 : /*
3115 : * Get the object's ACL from its catalog
3116 : */
3117 :
3118 31045 : cacheid = get_object_catcache_oid(classid);
3119 :
3120 31045 : tuple = SearchSysCache1(cacheid, ObjectIdGetDatum(objectid));
3121 31045 : if (!HeapTupleIsValid(tuple))
3122 : {
3123 0 : if (is_missing != NULL)
3124 : {
3125 : /* return "no privileges" instead of throwing an error */
3126 0 : *is_missing = true;
3127 0 : return 0;
3128 : }
3129 : else
3130 0 : elog(ERROR, "cache lookup failed for %s %u",
3131 : get_object_class_descr(classid), objectid);
3132 : }
3133 :
3134 31045 : ownerId = DatumGetObjectId(SysCacheGetAttrNotNull(cacheid,
3135 : tuple,
3136 31045 : get_object_attnum_owner(classid)));
3137 :
3138 31045 : aclDatum = SysCacheGetAttr(cacheid, tuple, get_object_attnum_acl(classid),
3139 : &isNull);
3140 31045 : if (isNull)
3141 : {
3142 : /* No ACL, so build default ACL */
3143 29297 : acl = acldefault(get_object_type(classid, objectid), ownerId);
3144 29297 : aclDatum = (Datum) 0;
3145 : }
3146 : else
3147 : {
3148 : /* detoast ACL if necessary */
3149 1748 : acl = DatumGetAclP(aclDatum);
3150 : }
3151 :
3152 31045 : result = aclmask(acl, roleid, ownerId, mask, how);
3153 :
3154 : /* if we have a detoasted copy, free it */
3155 31045 : if (acl && acl != DatumGetPointer(aclDatum))
3156 31045 : pfree(acl);
3157 :
3158 31045 : ReleaseSysCache(tuple);
3159 :
3160 31045 : return result;
3161 : }
3162 :
3163 : /*
3164 : * Routine for examining a user's privileges for a column
3165 : *
3166 : * Note: this considers only privileges granted specifically on the column.
3167 : * It is caller's responsibility to take relation-level privileges into account
3168 : * as appropriate. (For the same reason, we have no special case for
3169 : * superuser-ness here.)
3170 : */
3171 : static AclMode
3172 0 : pg_attribute_aclmask(Oid table_oid, AttrNumber attnum, Oid roleid,
3173 : AclMode mask, AclMaskHow how)
3174 : {
3175 0 : return pg_attribute_aclmask_ext(table_oid, attnum, roleid,
3176 : mask, how, NULL);
3177 : }
3178 :
3179 : /*
3180 : * Routine for examining a user's privileges for a column, with is_missing
3181 : */
3182 : static AclMode
3183 367782 : pg_attribute_aclmask_ext(Oid table_oid, AttrNumber attnum, Oid roleid,
3184 : AclMode mask, AclMaskHow how, bool *is_missing)
3185 : {
3186 : AclMode result;
3187 : HeapTuple classTuple;
3188 : HeapTuple attTuple;
3189 : Form_pg_class classForm;
3190 : Form_pg_attribute attributeForm;
3191 : Datum aclDatum;
3192 : bool isNull;
3193 : Acl *acl;
3194 : Oid ownerId;
3195 :
3196 : /*
3197 : * First, get the column's ACL from its pg_attribute entry
3198 : */
3199 367782 : attTuple = SearchSysCache2(ATTNUM,
3200 : ObjectIdGetDatum(table_oid),
3201 : Int16GetDatum(attnum));
3202 367782 : if (!HeapTupleIsValid(attTuple))
3203 : {
3204 20 : if (is_missing != NULL)
3205 : {
3206 : /* return "no privileges" instead of throwing an error */
3207 20 : *is_missing = true;
3208 20 : return 0;
3209 : }
3210 : else
3211 0 : ereport(ERROR,
3212 : (errcode(ERRCODE_UNDEFINED_COLUMN),
3213 : errmsg("attribute %d of relation with OID %u does not exist",
3214 : attnum, table_oid)));
3215 : }
3216 :
3217 367762 : attributeForm = (Form_pg_attribute) GETSTRUCT(attTuple);
3218 :
3219 : /* Check dropped columns, too */
3220 367762 : if (attributeForm->attisdropped)
3221 : {
3222 8 : if (is_missing != NULL)
3223 : {
3224 : /* return "no privileges" instead of throwing an error */
3225 8 : *is_missing = true;
3226 8 : ReleaseSysCache(attTuple);
3227 8 : return 0;
3228 : }
3229 : else
3230 0 : ereport(ERROR,
3231 : (errcode(ERRCODE_UNDEFINED_COLUMN),
3232 : errmsg("attribute %d of relation with OID %u does not exist",
3233 : attnum, table_oid)));
3234 : }
3235 :
3236 367754 : aclDatum = SysCacheGetAttr(ATTNUM, attTuple, Anum_pg_attribute_attacl,
3237 : &isNull);
3238 :
3239 : /*
3240 : * Here we hard-wire knowledge that the default ACL for a column grants no
3241 : * privileges, so that we can fall out quickly in the very common case
3242 : * where attacl is null.
3243 : */
3244 367754 : if (isNull)
3245 : {
3246 361767 : ReleaseSysCache(attTuple);
3247 361767 : return 0;
3248 : }
3249 :
3250 : /*
3251 : * Must get the relation's ownerId from pg_class. Since we already found
3252 : * a pg_attribute entry, the only likely reason for this to fail is that a
3253 : * concurrent DROP of the relation committed since then (which could only
3254 : * happen if we don't have lock on the relation). Treat that similarly to
3255 : * not finding the attribute entry.
3256 : */
3257 5987 : classTuple = SearchSysCache1(RELOID, ObjectIdGetDatum(table_oid));
3258 5987 : if (!HeapTupleIsValid(classTuple))
3259 : {
3260 0 : ReleaseSysCache(attTuple);
3261 0 : if (is_missing != NULL)
3262 : {
3263 : /* return "no privileges" instead of throwing an error */
3264 0 : *is_missing = true;
3265 0 : return 0;
3266 : }
3267 : else
3268 0 : ereport(ERROR,
3269 : (errcode(ERRCODE_UNDEFINED_TABLE),
3270 : errmsg("relation with OID %u does not exist",
3271 : table_oid)));
3272 : }
3273 5987 : classForm = (Form_pg_class) GETSTRUCT(classTuple);
3274 :
3275 5987 : ownerId = classForm->relowner;
3276 :
3277 5987 : ReleaseSysCache(classTuple);
3278 :
3279 : /* detoast column's ACL if necessary */
3280 5987 : acl = DatumGetAclP(aclDatum);
3281 :
3282 5987 : result = aclmask(acl, roleid, ownerId, mask, how);
3283 :
3284 : /* if we have a detoasted copy, free it */
3285 5987 : if (acl && acl != DatumGetPointer(aclDatum))
3286 5987 : pfree(acl);
3287 :
3288 5987 : ReleaseSysCache(attTuple);
3289 :
3290 5987 : return result;
3291 : }
3292 :
3293 : /*
3294 : * Exported routine for examining a user's privileges for a table
3295 : */
3296 : AclMode
3297 797519 : pg_class_aclmask(Oid table_oid, Oid roleid,
3298 : AclMode mask, AclMaskHow how)
3299 : {
3300 797519 : return pg_class_aclmask_ext(table_oid, roleid, mask, how, NULL);
3301 : }
3302 :
3303 : /*
3304 : * Routine for examining a user's privileges for a table, with is_missing
3305 : */
3306 : static AclMode
3307 2807315 : pg_class_aclmask_ext(Oid table_oid, Oid roleid, AclMode mask,
3308 : AclMaskHow how, bool *is_missing)
3309 : {
3310 : AclMode result;
3311 : HeapTuple tuple;
3312 : Form_pg_class classForm;
3313 : Datum aclDatum;
3314 : bool isNull;
3315 : Acl *acl;
3316 : Oid ownerId;
3317 :
3318 : /*
3319 : * Must get the relation's tuple from pg_class
3320 : */
3321 2807315 : tuple = SearchSysCache1(RELOID, ObjectIdGetDatum(table_oid));
3322 2807315 : if (!HeapTupleIsValid(tuple))
3323 : {
3324 5 : if (is_missing != NULL)
3325 : {
3326 : /* return "no privileges" instead of throwing an error */
3327 5 : *is_missing = true;
3328 5 : return 0;
3329 : }
3330 : else
3331 0 : ereport(ERROR,
3332 : (errcode(ERRCODE_UNDEFINED_TABLE),
3333 : errmsg("relation with OID %u does not exist",
3334 : table_oid)));
3335 : }
3336 :
3337 2807310 : classForm = (Form_pg_class) GETSTRUCT(tuple);
3338 :
3339 : /*
3340 : * Deny anyone permission to update a system catalog unless
3341 : * pg_authid.rolsuper is set.
3342 : *
3343 : * As of 7.4 we have some updatable system views; those shouldn't be
3344 : * protected in this way. Assume the view rules can take care of
3345 : * themselves. ACL_USAGE is if we ever have system sequences.
3346 : */
3347 3673134 : if ((mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE | ACL_TRUNCATE | ACL_USAGE)) &&
3348 865824 : IsSystemClass(table_oid, classForm) &&
3349 2814 : classForm->relkind != RELKIND_VIEW &&
3350 2814 : !superuser_arg(roleid))
3351 46 : mask &= ~(ACL_INSERT | ACL_UPDATE | ACL_DELETE | ACL_TRUNCATE | ACL_USAGE);
3352 :
3353 : /*
3354 : * Otherwise, superusers bypass all permission-checking.
3355 : */
3356 2807310 : if (superuser_arg(roleid))
3357 : {
3358 2768819 : ReleaseSysCache(tuple);
3359 2768819 : return mask;
3360 : }
3361 :
3362 : /*
3363 : * Normal case: get the relation's ACL from pg_class
3364 : */
3365 38491 : ownerId = classForm->relowner;
3366 :
3367 38491 : aclDatum = SysCacheGetAttr(RELOID, tuple, Anum_pg_class_relacl,
3368 : &isNull);
3369 38491 : if (isNull)
3370 : {
3371 : /* No ACL, so build default ACL */
3372 10611 : switch (classForm->relkind)
3373 : {
3374 84 : case RELKIND_SEQUENCE:
3375 84 : acl = acldefault(OBJECT_SEQUENCE, ownerId);
3376 84 : break;
3377 10527 : default:
3378 10527 : acl = acldefault(OBJECT_TABLE, ownerId);
3379 10527 : break;
3380 : }
3381 10611 : aclDatum = (Datum) 0;
3382 : }
3383 : else
3384 : {
3385 : /* detoast rel's ACL if necessary */
3386 27880 : acl = DatumGetAclP(aclDatum);
3387 : }
3388 :
3389 38491 : result = aclmask(acl, roleid, ownerId, mask, how);
3390 :
3391 : /* if we have a detoasted copy, free it */
3392 38491 : if (acl && acl != DatumGetPointer(aclDatum))
3393 38491 : pfree(acl);
3394 :
3395 38491 : ReleaseSysCache(tuple);
3396 :
3397 : /*
3398 : * Check if ACL_SELECT is being checked and, if so, and not set already as
3399 : * part of the result, then check if the user is a member of the
3400 : * pg_read_all_data role, which allows read access to all relations.
3401 : */
3402 42909 : if (mask & ACL_SELECT && !(result & ACL_SELECT) &&
3403 4418 : has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA))
3404 8 : result |= ACL_SELECT;
3405 :
3406 : /*
3407 : * Check if ACL_INSERT, ACL_UPDATE, or ACL_DELETE is being checked and, if
3408 : * so, and not set already as part of the result, then check if the user
3409 : * is a member of the pg_write_all_data role, which allows
3410 : * INSERT/UPDATE/DELETE access to all relations (except system catalogs,
3411 : * which requires superuser, see above).
3412 : */
3413 38491 : if (mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE) &&
3414 6124 : !(result & (ACL_INSERT | ACL_UPDATE | ACL_DELETE)) &&
3415 1348 : has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA))
3416 12 : result |= (mask & (ACL_INSERT | ACL_UPDATE | ACL_DELETE));
3417 :
3418 : /*
3419 : * Check if ACL_MAINTAIN is being checked and, if so, and not already set
3420 : * as part of the result, then check if the user is a member of the
3421 : * pg_maintain role, which allows VACUUM, ANALYZE, CLUSTER, REFRESH
3422 : * MATERIALIZED VIEW, REINDEX, and LOCK TABLE on all relations.
3423 : */
3424 38491 : if (mask & ACL_MAINTAIN &&
3425 9296 : !(result & ACL_MAINTAIN) &&
3426 4445 : has_privs_of_role(roleid, ROLE_PG_MAINTAIN))
3427 44 : result |= ACL_MAINTAIN;
3428 :
3429 38491 : return result;
3430 : }
3431 :
3432 : /*
3433 : * Routine for examining a user's privileges for a configuration
3434 : * parameter (GUC), identified by GUC name.
3435 : */
3436 : static AclMode
3437 80 : pg_parameter_aclmask(const char *name, Oid roleid, AclMode mask, AclMaskHow how)
3438 : {
3439 : AclMode result;
3440 : char *parname;
3441 : text *partext;
3442 : HeapTuple tuple;
3443 :
3444 : /* Superusers bypass all permission checking. */
3445 80 : if (superuser_arg(roleid))
3446 1 : return mask;
3447 :
3448 : /* Convert name to the form it should have in pg_parameter_acl... */
3449 79 : parname = convert_GUC_name_for_parameter_acl(name);
3450 79 : partext = cstring_to_text(parname);
3451 :
3452 : /* ... and look it up */
3453 79 : tuple = SearchSysCache1(PARAMETERACLNAME, PointerGetDatum(partext));
3454 :
3455 79 : if (!HeapTupleIsValid(tuple))
3456 : {
3457 : /* If no entry, GUC has no permissions for non-superusers */
3458 35 : result = ACL_NO_RIGHTS;
3459 : }
3460 : else
3461 : {
3462 : Datum aclDatum;
3463 : bool isNull;
3464 : Acl *acl;
3465 :
3466 44 : aclDatum = SysCacheGetAttr(PARAMETERACLNAME, tuple,
3467 : Anum_pg_parameter_acl_paracl,
3468 : &isNull);
3469 44 : if (isNull)
3470 : {
3471 : /* No ACL, so build default ACL */
3472 0 : acl = acldefault(OBJECT_PARAMETER_ACL, BOOTSTRAP_SUPERUSERID);
3473 0 : aclDatum = (Datum) 0;
3474 : }
3475 : else
3476 : {
3477 : /* detoast ACL if necessary */
3478 44 : acl = DatumGetAclP(aclDatum);
3479 : }
3480 :
3481 44 : result = aclmask(acl, roleid, BOOTSTRAP_SUPERUSERID, mask, how);
3482 :
3483 : /* if we have a detoasted copy, free it */
3484 44 : if (acl && acl != DatumGetPointer(aclDatum))
3485 44 : pfree(acl);
3486 :
3487 44 : ReleaseSysCache(tuple);
3488 : }
3489 :
3490 79 : pfree(parname);
3491 79 : pfree(partext);
3492 :
3493 79 : return result;
3494 : }
3495 :
3496 : /*
3497 : * Routine for examining a user's privileges for a configuration
3498 : * parameter (GUC), identified by the OID of its pg_parameter_acl entry.
3499 : */
3500 : static AclMode
3501 0 : pg_parameter_acl_aclmask(Oid acl_oid, Oid roleid, AclMode mask, AclMaskHow how)
3502 : {
3503 : AclMode result;
3504 : HeapTuple tuple;
3505 : Datum aclDatum;
3506 : bool isNull;
3507 : Acl *acl;
3508 :
3509 : /* Superusers bypass all permission checking. */
3510 0 : if (superuser_arg(roleid))
3511 0 : return mask;
3512 :
3513 : /* Get the ACL from pg_parameter_acl */
3514 0 : tuple = SearchSysCache1(PARAMETERACLOID, ObjectIdGetDatum(acl_oid));
3515 0 : if (!HeapTupleIsValid(tuple))
3516 0 : ereport(ERROR,
3517 : (errcode(ERRCODE_UNDEFINED_OBJECT),
3518 : errmsg("parameter ACL with OID %u does not exist",
3519 : acl_oid)));
3520 :
3521 0 : aclDatum = SysCacheGetAttr(PARAMETERACLOID, tuple,
3522 : Anum_pg_parameter_acl_paracl,
3523 : &isNull);
3524 0 : if (isNull)
3525 : {
3526 : /* No ACL, so build default ACL */
3527 0 : acl = acldefault(OBJECT_PARAMETER_ACL, BOOTSTRAP_SUPERUSERID);
3528 0 : aclDatum = (Datum) 0;
3529 : }
3530 : else
3531 : {
3532 : /* detoast ACL if necessary */
3533 0 : acl = DatumGetAclP(aclDatum);
3534 : }
3535 :
3536 0 : result = aclmask(acl, roleid, BOOTSTRAP_SUPERUSERID, mask, how);
3537 :
3538 : /* if we have a detoasted copy, free it */
3539 0 : if (acl && acl != DatumGetPointer(aclDatum))
3540 0 : pfree(acl);
3541 :
3542 0 : ReleaseSysCache(tuple);
3543 :
3544 0 : return result;
3545 : }
3546 :
3547 : /*
3548 : * Routine for examining a user's privileges for a largeobject
3549 : *
3550 : * When a large object is opened for reading, it is opened relative to the
3551 : * caller's snapshot, but when it is opened for writing, a current
3552 : * MVCC snapshot will be used. See doc/src/sgml/lobj.sgml. This function
3553 : * takes a snapshot argument so that the permissions check can be made
3554 : * relative to the same snapshot that will be used to read the underlying
3555 : * data. The caller will actually pass NULL for an instantaneous MVCC
3556 : * snapshot, since all we do with the snapshot argument is pass it through
3557 : * to systable_beginscan().
3558 : */
3559 : static AclMode
3560 586 : pg_largeobject_aclmask_snapshot(Oid lobj_oid, Oid roleid,
3561 : AclMode mask, AclMaskHow how,
3562 : Snapshot snapshot)
3563 : {
3564 : AclMode result;
3565 : Relation pg_lo_meta;
3566 : ScanKeyData entry[1];
3567 : SysScanDesc scan;
3568 : HeapTuple tuple;
3569 : Datum aclDatum;
3570 : bool isNull;
3571 : Acl *acl;
3572 : Oid ownerId;
3573 :
3574 : /* Superusers bypass all permission checking. */
3575 586 : if (superuser_arg(roleid))
3576 334 : return mask;
3577 :
3578 : /*
3579 : * Get the largeobject's ACL from pg_largeobject_metadata
3580 : */
3581 252 : pg_lo_meta = table_open(LargeObjectMetadataRelationId,
3582 : AccessShareLock);
3583 :
3584 252 : ScanKeyInit(&entry[0],
3585 : Anum_pg_largeobject_metadata_oid,
3586 : BTEqualStrategyNumber, F_OIDEQ,
3587 : ObjectIdGetDatum(lobj_oid));
3588 :
3589 252 : scan = systable_beginscan(pg_lo_meta,
3590 : LargeObjectMetadataOidIndexId, true,
3591 : snapshot, 1, entry);
3592 :
3593 252 : tuple = systable_getnext(scan);
3594 252 : if (!HeapTupleIsValid(tuple))
3595 0 : ereport(ERROR,
3596 : (errcode(ERRCODE_UNDEFINED_OBJECT),
3597 : errmsg("large object %u does not exist", lobj_oid)));
3598 :
3599 252 : ownerId = ((Form_pg_largeobject_metadata) GETSTRUCT(tuple))->lomowner;
3600 :
3601 252 : aclDatum = heap_getattr(tuple, Anum_pg_largeobject_metadata_lomacl,
3602 : RelationGetDescr(pg_lo_meta), &isNull);
3603 :
3604 252 : if (isNull)
3605 : {
3606 : /* No ACL, so build default ACL */
3607 48 : acl = acldefault(OBJECT_LARGEOBJECT, ownerId);
3608 48 : aclDatum = (Datum) 0;
3609 : }
3610 : else
3611 : {
3612 : /* detoast ACL if necessary */
3613 204 : acl = DatumGetAclP(aclDatum);
3614 : }
3615 :
3616 252 : result = aclmask(acl, roleid, ownerId, mask, how);
3617 :
3618 : /* if we have a detoasted copy, free it */
3619 252 : if (acl && acl != DatumGetPointer(aclDatum))
3620 252 : pfree(acl);
3621 :
3622 252 : systable_endscan(scan);
3623 :
3624 252 : table_close(pg_lo_meta, AccessShareLock);
3625 :
3626 : /*
3627 : * Check if ACL_SELECT is being checked and, if so, and not set already as
3628 : * part of the result, then check if the user has privileges of the
3629 : * pg_read_all_data role, which allows read access to all large objects.
3630 : */
3631 320 : if (mask & ACL_SELECT && !(result & ACL_SELECT) &&
3632 68 : has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA))
3633 20 : result |= ACL_SELECT;
3634 :
3635 : /*
3636 : * Check if ACL_UPDATE is being checked and, if so, and not set already as
3637 : * part of the result, then check if the user has privileges of the
3638 : * pg_write_all_data role, which allows write access to all large objects.
3639 : */
3640 312 : if (mask & ACL_UPDATE && !(result & ACL_UPDATE) &&
3641 60 : has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA))
3642 12 : result |= ACL_UPDATE;
3643 :
3644 252 : return result;
3645 : }
3646 :
3647 : /*
3648 : * Routine for examining a user's privileges for a namespace, with is_missing
3649 : */
3650 : static AclMode
3651 615792 : pg_namespace_aclmask_ext(Oid nsp_oid, Oid roleid,
3652 : AclMode mask, AclMaskHow how,
3653 : bool *is_missing)
3654 : {
3655 : AclMode result;
3656 : HeapTuple tuple;
3657 : Datum aclDatum;
3658 : bool isNull;
3659 : Acl *acl;
3660 : Oid ownerId;
3661 :
3662 : /* Superusers bypass all permission checking. */
3663 615792 : if (superuser_arg(roleid))
3664 603457 : return mask;
3665 :
3666 : /*
3667 : * If we have been assigned this namespace as a temp namespace, check to
3668 : * make sure we have CREATE TEMP permission on the database, and if so act
3669 : * as though we have all standard (but not GRANT OPTION) permissions on
3670 : * the namespace. If we don't have CREATE TEMP, act as though we have
3671 : * only USAGE (and not CREATE) rights.
3672 : *
3673 : * This may seem redundant given the check in InitTempTableNamespace, but
3674 : * it really isn't since current user ID may have changed since then. The
3675 : * upshot of this behavior is that a SECURITY DEFINER function can create
3676 : * temp tables that can then be accessed (if permission is granted) by
3677 : * code in the same session that doesn't have permissions to create temp
3678 : * tables.
3679 : *
3680 : * XXX Would it be safe to ereport a special error message as
3681 : * InitTempTableNamespace does? Returning zero here means we'll get a
3682 : * generic "permission denied for schema pg_temp_N" message, which is not
3683 : * remarkably user-friendly.
3684 : */
3685 12335 : if (isTempNamespace(nsp_oid))
3686 : {
3687 211 : if (object_aclcheck_ext(DatabaseRelationId, MyDatabaseId, roleid,
3688 : ACL_CREATE_TEMP, is_missing) == ACLCHECK_OK)
3689 211 : return mask & ACL_ALL_RIGHTS_SCHEMA;
3690 : else
3691 0 : return mask & ACL_USAGE;
3692 : }
3693 :
3694 : /*
3695 : * Get the schema's ACL from pg_namespace
3696 : */
3697 12124 : tuple = SearchSysCache1(NAMESPACEOID, ObjectIdGetDatum(nsp_oid));
3698 12124 : if (!HeapTupleIsValid(tuple))
3699 : {
3700 0 : if (is_missing != NULL)
3701 : {
3702 : /* return "no privileges" instead of throwing an error */
3703 0 : *is_missing = true;
3704 0 : return 0;
3705 : }
3706 : else
3707 0 : ereport(ERROR,
3708 : (errcode(ERRCODE_UNDEFINED_SCHEMA),
3709 : errmsg("schema with OID %u does not exist", nsp_oid)));
3710 : }
3711 :
3712 12124 : ownerId = ((Form_pg_namespace) GETSTRUCT(tuple))->nspowner;
3713 :
3714 12124 : aclDatum = SysCacheGetAttr(NAMESPACEOID, tuple, Anum_pg_namespace_nspacl,
3715 : &isNull);
3716 12124 : if (isNull)
3717 : {
3718 : /* No ACL, so build default ACL */
3719 200 : acl = acldefault(OBJECT_SCHEMA, ownerId);
3720 200 : aclDatum = (Datum) 0;
3721 : }
3722 : else
3723 : {
3724 : /* detoast ACL if necessary */
3725 11924 : acl = DatumGetAclP(aclDatum);
3726 : }
3727 :
3728 12124 : result = aclmask(acl, roleid, ownerId, mask, how);
3729 :
3730 : /* if we have a detoasted copy, free it */
3731 12124 : if (acl && acl != DatumGetPointer(aclDatum))
3732 12124 : pfree(acl);
3733 :
3734 12124 : ReleaseSysCache(tuple);
3735 :
3736 : /*
3737 : * Check if ACL_USAGE is being checked and, if so, and not set already as
3738 : * part of the result, then check if the user is a member of the
3739 : * pg_read_all_data or pg_write_all_data roles, which allow usage access
3740 : * to all schemas.
3741 : */
3742 12161 : if (mask & ACL_USAGE && !(result & ACL_USAGE) &&
3743 70 : (has_privs_of_role(roleid, ROLE_PG_READ_ALL_DATA) ||
3744 33 : has_privs_of_role(roleid, ROLE_PG_WRITE_ALL_DATA)))
3745 8 : result |= ACL_USAGE;
3746 12124 : return result;
3747 : }
3748 :
3749 : /*
3750 : * Routine for examining a user's privileges for a type, with is_missing
3751 : */
3752 : static AclMode
3753 197420 : pg_type_aclmask_ext(Oid type_oid, Oid roleid, AclMode mask, AclMaskHow how,
3754 : bool *is_missing)
3755 : {
3756 : AclMode result;
3757 : HeapTuple tuple;
3758 : Form_pg_type typeForm;
3759 : Datum aclDatum;
3760 : bool isNull;
3761 : Acl *acl;
3762 : Oid ownerId;
3763 :
3764 : /* Bypass permission checks for superusers */
3765 197420 : if (superuser_arg(roleid))
3766 194318 : return mask;
3767 :
3768 : /*
3769 : * Must get the type's tuple from pg_type
3770 : */
3771 3102 : tuple = SearchSysCache1(TYPEOID, ObjectIdGetDatum(type_oid));
3772 3102 : if (!HeapTupleIsValid(tuple))
3773 : {
3774 0 : if (is_missing != NULL)
3775 : {
3776 : /* return "no privileges" instead of throwing an error */
3777 0 : *is_missing = true;
3778 0 : return 0;
3779 : }
3780 : else
3781 0 : ereport(ERROR,
3782 : (errcode(ERRCODE_UNDEFINED_OBJECT),
3783 : errmsg("type with OID %u does not exist",
3784 : type_oid)));
3785 : }
3786 3102 : typeForm = (Form_pg_type) GETSTRUCT(tuple);
3787 :
3788 : /*
3789 : * "True" array types don't manage permissions of their own; consult the
3790 : * element type instead.
3791 : */
3792 3102 : if (IsTrueArrayType(typeForm))
3793 : {
3794 32 : Oid elttype_oid = typeForm->typelem;
3795 :
3796 32 : ReleaseSysCache(tuple);
3797 :
3798 32 : tuple = SearchSysCache1(TYPEOID, ObjectIdGetDatum(elttype_oid));
3799 32 : if (!HeapTupleIsValid(tuple))
3800 : {
3801 0 : if (is_missing != NULL)
3802 : {
3803 : /* return "no privileges" instead of throwing an error */
3804 0 : *is_missing = true;
3805 0 : return 0;
3806 : }
3807 : else
3808 0 : ereport(ERROR,
3809 : (errcode(ERRCODE_UNDEFINED_OBJECT),
3810 : errmsg("type with OID %u does not exist",
3811 : elttype_oid)));
3812 : }
3813 32 : typeForm = (Form_pg_type) GETSTRUCT(tuple);
3814 : }
3815 :
3816 : /*
3817 : * Likewise, multirange types don't manage their own permissions; consult
3818 : * the associated range type. (Note we must do this after the array step
3819 : * to get the right answer for arrays of multiranges.)
3820 : */
3821 3102 : if (typeForm->typtype == TYPTYPE_MULTIRANGE)
3822 : {
3823 8 : Oid rangetype = get_multirange_range(typeForm->oid);
3824 :
3825 8 : ReleaseSysCache(tuple);
3826 :
3827 8 : tuple = SearchSysCache1(TYPEOID, ObjectIdGetDatum(rangetype));
3828 8 : if (!HeapTupleIsValid(tuple))
3829 : {
3830 0 : if (is_missing != NULL)
3831 : {
3832 : /* return "no privileges" instead of throwing an error */
3833 0 : *is_missing = true;
3834 0 : return 0;
3835 : }
3836 : else
3837 0 : ereport(ERROR,
3838 : (errcode(ERRCODE_UNDEFINED_OBJECT),
3839 : errmsg("type with OID %u does not exist",
3840 : rangetype)));
3841 : }
3842 8 : typeForm = (Form_pg_type) GETSTRUCT(tuple);
3843 : }
3844 :
3845 : /*
3846 : * Now get the type's owner and ACL from the tuple
3847 : */
3848 3102 : ownerId = typeForm->typowner;
3849 :
3850 3102 : aclDatum = SysCacheGetAttr(TYPEOID, tuple,
3851 : Anum_pg_type_typacl, &isNull);
3852 3102 : if (isNull)
3853 : {
3854 : /* No ACL, so build default ACL */
3855 2946 : acl = acldefault(OBJECT_TYPE, ownerId);
3856 2946 : aclDatum = (Datum) 0;
3857 : }
3858 : else
3859 : {
3860 : /* detoast rel's ACL if necessary */
3861 156 : acl = DatumGetAclP(aclDatum);
3862 : }
3863 :
3864 3102 : result = aclmask(acl, roleid, ownerId, mask, how);
3865 :
3866 : /* if we have a detoasted copy, free it */
3867 3102 : if (acl && acl != DatumGetPointer(aclDatum))
3868 3102 : pfree(acl);
3869 :
3870 3102 : ReleaseSysCache(tuple);
3871 :
3872 3102 : return result;
3873 : }
3874 :
3875 : /*
3876 : * Exported generic routine for checking a user's access privileges to an object
3877 : */
3878 : AclResult
3879 2448433 : object_aclcheck(Oid classid, Oid objectid, Oid roleid, AclMode mode)
3880 : {
3881 2448433 : return object_aclcheck_ext(classid, objectid, roleid, mode, NULL);
3882 : }
3883 :
3884 : /*
3885 : * Exported generic routine for checking a user's access privileges to an
3886 : * object, with is_missing
3887 : */
3888 : AclResult
3889 2448716 : object_aclcheck_ext(Oid classid, Oid objectid,
3890 : Oid roleid, AclMode mode,
3891 : bool *is_missing)
3892 : {
3893 2448716 : if (object_aclmask_ext(classid, objectid, roleid, mode, ACLMASK_ANY,
3894 : is_missing) != 0)
3895 2448309 : return ACLCHECK_OK;
3896 : else
3897 407 : return ACLCHECK_NO_PRIV;
3898 : }
3899 :
3900 : /*
3901 : * Exported routine for checking a user's access privileges to a column
3902 : *
3903 : * Returns ACLCHECK_OK if the user has any of the privileges identified by
3904 : * 'mode'; otherwise returns a suitable error code (in practice, always
3905 : * ACLCHECK_NO_PRIV).
3906 : *
3907 : * As with pg_attribute_aclmask, only privileges granted directly on the
3908 : * column are considered here.
3909 : */
3910 : AclResult
3911 2909 : pg_attribute_aclcheck(Oid table_oid, AttrNumber attnum,
3912 : Oid roleid, AclMode mode)
3913 : {
3914 2909 : return pg_attribute_aclcheck_ext(table_oid, attnum, roleid, mode, NULL);
3915 : }
3916 :
3917 :
3918 : /*
3919 : * Exported routine for checking a user's access privileges to a column,
3920 : * with is_missing
3921 : */
3922 : AclResult
3923 367782 : pg_attribute_aclcheck_ext(Oid table_oid, AttrNumber attnum,
3924 : Oid roleid, AclMode mode, bool *is_missing)
3925 : {
3926 367782 : if (pg_attribute_aclmask_ext(table_oid, attnum, roleid, mode,
3927 : ACLMASK_ANY, is_missing) != 0)
3928 5557 : return ACLCHECK_OK;
3929 : else
3930 362225 : return ACLCHECK_NO_PRIV;
3931 : }
3932 :
3933 : /*
3934 : * Exported routine for checking a user's access privileges to any/all columns
3935 : *
3936 : * If 'how' is ACLMASK_ANY, then returns ACLCHECK_OK if user has any of the
3937 : * privileges identified by 'mode' on any non-dropped column in the relation;
3938 : * otherwise returns a suitable error code (in practice, always
3939 : * ACLCHECK_NO_PRIV).
3940 : *
3941 : * If 'how' is ACLMASK_ALL, then returns ACLCHECK_OK if user has any of the
3942 : * privileges identified by 'mode' on each non-dropped column in the relation
3943 : * (and there must be at least one such column); otherwise returns a suitable
3944 : * error code (in practice, always ACLCHECK_NO_PRIV).
3945 : *
3946 : * As with pg_attribute_aclmask, only privileges granted directly on the
3947 : * column(s) are considered here.
3948 : *
3949 : * Note: system columns are not considered here; there are cases where that
3950 : * might be appropriate but there are also cases where it wouldn't.
3951 : */
3952 : AclResult
3953 162 : pg_attribute_aclcheck_all(Oid table_oid, Oid roleid, AclMode mode,
3954 : AclMaskHow how)
3955 : {
3956 162 : return pg_attribute_aclcheck_all_ext(table_oid, roleid, mode, how, NULL);
3957 : }
3958 :
3959 : /*
3960 : * Exported routine for checking a user's access privileges to any/all columns,
3961 : * with is_missing
3962 : */
3963 : AclResult
3964 162 : pg_attribute_aclcheck_all_ext(Oid table_oid, Oid roleid,
3965 : AclMode mode, AclMaskHow how,
3966 : bool *is_missing)
3967 : {
3968 : AclResult result;
3969 : HeapTuple classTuple;
3970 : Form_pg_class classForm;
3971 : Oid ownerId;
3972 : AttrNumber nattrs;
3973 : AttrNumber curr_att;
3974 :
3975 : /*
3976 : * Must fetch pg_class row to get owner ID and number of attributes.
3977 : */
3978 162 : classTuple = SearchSysCache1(RELOID, ObjectIdGetDatum(table_oid));
3979 162 : if (!HeapTupleIsValid(classTuple))
3980 : {
3981 0 : if (is_missing != NULL)
3982 : {
3983 : /* return "no privileges" instead of throwing an error */
3984 0 : *is_missing = true;
3985 0 : return ACLCHECK_NO_PRIV;
3986 : }
3987 : else
3988 0 : ereport(ERROR,
3989 : (errcode(ERRCODE_UNDEFINED_TABLE),
3990 : errmsg("relation with OID %u does not exist",
3991 : table_oid)));
3992 : }
3993 162 : classForm = (Form_pg_class) GETSTRUCT(classTuple);
3994 :
3995 162 : ownerId = classForm->relowner;
3996 162 : nattrs = classForm->relnatts;
3997 :
3998 162 : ReleaseSysCache(classTuple);
3999 :
4000 : /*
4001 : * Initialize result in case there are no non-dropped columns. We want to
4002 : * report failure in such cases for either value of 'how'.
4003 : */
4004 162 : result = ACLCHECK_NO_PRIV;
4005 :
4006 386 : for (curr_att = 1; curr_att <= nattrs; curr_att++)
4007 : {
4008 : HeapTuple attTuple;
4009 : Datum aclDatum;
4010 : bool isNull;
4011 : Acl *acl;
4012 : AclMode attmask;
4013 :
4014 310 : attTuple = SearchSysCache2(ATTNUM,
4015 : ObjectIdGetDatum(table_oid),
4016 : Int16GetDatum(curr_att));
4017 :
4018 : /*
4019 : * Lookup failure probably indicates that the table was just dropped,
4020 : * but we'll treat it the same as a dropped column rather than
4021 : * throwing error.
4022 : */
4023 310 : if (!HeapTupleIsValid(attTuple))
4024 12 : continue;
4025 :
4026 : /* ignore dropped columns */
4027 310 : if (((Form_pg_attribute) GETSTRUCT(attTuple))->attisdropped)
4028 : {
4029 12 : ReleaseSysCache(attTuple);
4030 12 : continue;
4031 : }
4032 :
4033 298 : aclDatum = SysCacheGetAttr(ATTNUM, attTuple, Anum_pg_attribute_attacl,
4034 : &isNull);
4035 :
4036 : /*
4037 : * Here we hard-wire knowledge that the default ACL for a column
4038 : * grants no privileges, so that we can fall out quickly in the very
4039 : * common case where attacl is null.
4040 : */
4041 298 : if (isNull)
4042 121 : attmask = 0;
4043 : else
4044 : {
4045 : /* detoast column's ACL if necessary */
4046 177 : acl = DatumGetAclP(aclDatum);
4047 :
4048 177 : attmask = aclmask(acl, roleid, ownerId, mode, ACLMASK_ANY);
4049 :
4050 : /* if we have a detoasted copy, free it */
4051 177 : if (acl != DatumGetPointer(aclDatum))
4052 177 : pfree(acl);
4053 : }
4054 :
4055 298 : ReleaseSysCache(attTuple);
4056 :
4057 298 : if (attmask != 0)
4058 : {
4059 117 : result = ACLCHECK_OK;
4060 117 : if (how == ACLMASK_ANY)
4061 86 : break; /* succeed on any success */
4062 : }
4063 : else
4064 : {
4065 181 : result = ACLCHECK_NO_PRIV;
4066 181 : if (how == ACLMASK_ALL)
4067 33 : break; /* fail on any failure */
4068 : }
4069 : }
4070 :
4071 162 : return result;
4072 : }
4073 :
4074 : /*
4075 : * Exported routine for checking a user's access privileges to a table
4076 : *
4077 : * Returns ACLCHECK_OK if the user has any of the privileges identified by
4078 : * 'mode'; otherwise returns a suitable error code (in practice, always
4079 : * ACLCHECK_NO_PRIV).
4080 : */
4081 : AclResult
4082 1648751 : pg_class_aclcheck(Oid table_oid, Oid roleid, AclMode mode)
4083 : {
4084 1648751 : return pg_class_aclcheck_ext(table_oid, roleid, mode, NULL);
4085 : }
4086 :
4087 : /*
4088 : * Exported routine for checking a user's access privileges to a table,
4089 : * with is_missing
4090 : */
4091 : AclResult
4092 2009796 : pg_class_aclcheck_ext(Oid table_oid, Oid roleid,
4093 : AclMode mode, bool *is_missing)
4094 : {
4095 2009796 : if (pg_class_aclmask_ext(table_oid, roleid, mode,
4096 : ACLMASK_ANY, is_missing) != 0)
4097 2002081 : return ACLCHECK_OK;
4098 : else
4099 7715 : return ACLCHECK_NO_PRIV;
4100 : }
4101 :
4102 : /*
4103 : * Exported routine for checking a user's access privileges to a configuration
4104 : * parameter (GUC), identified by GUC name.
4105 : */
4106 : AclResult
4107 80 : pg_parameter_aclcheck(const char *name, Oid roleid, AclMode mode)
4108 : {
4109 80 : if (pg_parameter_aclmask(name, roleid, mode, ACLMASK_ANY) != 0)
4110 34 : return ACLCHECK_OK;
4111 : else
4112 46 : return ACLCHECK_NO_PRIV;
4113 : }
4114 :
4115 : /*
4116 : * Exported routine for checking a user's access privileges to a largeobject
4117 : */
4118 : AclResult
4119 586 : pg_largeobject_aclcheck_snapshot(Oid lobj_oid, Oid roleid, AclMode mode,
4120 : Snapshot snapshot)
4121 : {
4122 586 : if (pg_largeobject_aclmask_snapshot(lobj_oid, roleid, mode,
4123 : ACLMASK_ANY, snapshot) != 0)
4124 490 : return ACLCHECK_OK;
4125 : else
4126 96 : return ACLCHECK_NO_PRIV;
4127 : }
4128 :
4129 : /*
4130 : * Generic ownership check for an object
4131 : */
4132 : bool
4133 264652 : object_ownercheck(Oid classid, Oid objectid, Oid roleid)
4134 : {
4135 : SysCacheIdentifier cacheid;
4136 : Oid ownerId;
4137 :
4138 : /* Superusers bypass all permission checking. */
4139 264652 : if (superuser_arg(roleid))
4140 256308 : return true;
4141 :
4142 : /* For large objects, the catalog to consult is pg_largeobject_metadata */
4143 8344 : if (classid == LargeObjectRelationId)
4144 24 : classid = LargeObjectMetadataRelationId;
4145 :
4146 8344 : cacheid = get_object_catcache_oid(classid);
4147 8344 : if (cacheid != SYSCACHEID_INVALID)
4148 : {
4149 : /* we can get the object's tuple from the syscache */
4150 : HeapTuple tuple;
4151 :
4152 8318 : tuple = SearchSysCache1(cacheid, ObjectIdGetDatum(objectid));
4153 8318 : if (!HeapTupleIsValid(tuple))
4154 0 : elog(ERROR, "cache lookup failed for %s %u",
4155 : get_object_class_descr(classid), objectid);
4156 :
4157 8318 : ownerId = DatumGetObjectId(SysCacheGetAttrNotNull(cacheid,
4158 : tuple,
4159 8318 : get_object_attnum_owner(classid)));
4160 8318 : ReleaseSysCache(tuple);
4161 : }
4162 : else
4163 : {
4164 : /* for catalogs without an appropriate syscache */
4165 : Relation rel;
4166 : ScanKeyData entry[1];
4167 : SysScanDesc scan;
4168 : HeapTuple tuple;
4169 : bool isnull;
4170 :
4171 26 : rel = table_open(classid, AccessShareLock);
4172 :
4173 52 : ScanKeyInit(&entry[0],
4174 26 : get_object_attnum_oid(classid),
4175 : BTEqualStrategyNumber, F_OIDEQ,
4176 : ObjectIdGetDatum(objectid));
4177 :
4178 26 : scan = systable_beginscan(rel,
4179 : get_object_oid_index(classid), true,
4180 : NULL, 1, entry);
4181 :
4182 26 : tuple = systable_getnext(scan);
4183 26 : if (!HeapTupleIsValid(tuple))
4184 0 : elog(ERROR, "could not find tuple for %s %u",
4185 : get_object_class_descr(classid), objectid);
4186 :
4187 26 : ownerId = DatumGetObjectId(heap_getattr(tuple,
4188 26 : get_object_attnum_owner(classid),
4189 : RelationGetDescr(rel),
4190 : &isnull));
4191 : Assert(!isnull);
4192 :
4193 26 : systable_endscan(scan);
4194 26 : table_close(rel, AccessShareLock);
4195 : }
4196 :
4197 8344 : return has_privs_of_role(roleid, ownerId);
4198 : }
4199 :
4200 : /*
4201 : * Check whether specified role has CREATEROLE privilege (or is a superuser)
4202 : *
4203 : * Note: roles do not have owners per se; instead we use this test in
4204 : * places where an ownership-like permissions test is needed for a role.
4205 : * Be sure to apply it to the role trying to do the operation, not the
4206 : * role being operated on! Also note that this generally should not be
4207 : * considered enough privilege if the target role is a superuser.
4208 : * (We don't handle that consideration here because we want to give a
4209 : * separate error message for such cases, so the caller has to deal with it.)
4210 : */
4211 : bool
4212 1694 : has_createrole_privilege(Oid roleid)
4213 : {
4214 1694 : bool result = false;
4215 : HeapTuple utup;
4216 :
4217 : /* Superusers bypass all permission checking. */
4218 1694 : if (superuser_arg(roleid))
4219 1332 : return true;
4220 :
4221 362 : utup = SearchSysCache1(AUTHOID, ObjectIdGetDatum(roleid));
4222 362 : if (HeapTupleIsValid(utup))
4223 : {
4224 362 : result = ((Form_pg_authid) GETSTRUCT(utup))->rolcreaterole;
4225 362 : ReleaseSysCache(utup);
4226 : }
4227 362 : return result;
4228 : }
4229 :
4230 : bool
4231 3709 : has_bypassrls_privilege(Oid roleid)
4232 : {
4233 3709 : bool result = false;
4234 : HeapTuple utup;
4235 :
4236 : /* Superusers bypass all permission checking. */
4237 3709 : if (superuser_arg(roleid))
4238 1064 : return true;
4239 :
4240 2645 : utup = SearchSysCache1(AUTHOID, ObjectIdGetDatum(roleid));
4241 2645 : if (HeapTupleIsValid(utup))
4242 : {
4243 2645 : result = ((Form_pg_authid) GETSTRUCT(utup))->rolbypassrls;
4244 2645 : ReleaseSysCache(utup);
4245 : }
4246 2645 : return result;
4247 : }
4248 :
4249 : /*
4250 : * Fetch pg_default_acl entry for given role, namespace and object type
4251 : * (object type must be given in pg_default_acl's encoding).
4252 : * Returns NULL if no such entry.
4253 : */
4254 : static Acl *
4255 103298 : get_default_acl_internal(Oid roleId, Oid nsp_oid, char objtype)
4256 : {
4257 103298 : Acl *result = NULL;
4258 : HeapTuple tuple;
4259 :
4260 103298 : tuple = SearchSysCache3(DEFACLROLENSPOBJ,
4261 : ObjectIdGetDatum(roleId),
4262 : ObjectIdGetDatum(nsp_oid),
4263 : CharGetDatum(objtype));
4264 :
4265 103298 : if (HeapTupleIsValid(tuple))
4266 : {
4267 : Datum aclDatum;
4268 : bool isNull;
4269 :
4270 176 : aclDatum = SysCacheGetAttr(DEFACLROLENSPOBJ, tuple,
4271 : Anum_pg_default_acl_defaclacl,
4272 : &isNull);
4273 176 : if (!isNull)
4274 176 : result = DatumGetAclPCopy(aclDatum);
4275 176 : ReleaseSysCache(tuple);
4276 : }
4277 :
4278 103298 : return result;
4279 : }
4280 :
4281 : /*
4282 : * Get default permissions for newly created object within given schema
4283 : *
4284 : * Returns NULL if built-in system defaults should be used.
4285 : *
4286 : * If the result is not NULL, caller must call recordDependencyOnNewAcl
4287 : * once the OID of the new object is known.
4288 : */
4289 : Acl *
4290 51649 : get_user_default_acl(ObjectType objtype, Oid ownerId, Oid nsp_oid)
4291 : {
4292 : Acl *result;
4293 : Acl *glob_acl;
4294 : Acl *schema_acl;
4295 : Acl *def_acl;
4296 : char defaclobjtype;
4297 :
4298 : /*
4299 : * Use NULL during bootstrap, since pg_default_acl probably isn't there
4300 : * yet.
4301 : */
4302 51649 : if (IsBootstrapProcessingMode())
4303 0 : return NULL;
4304 :
4305 : /* Check if object type is supported in pg_default_acl */
4306 51649 : switch (objtype)
4307 : {
4308 35785 : case OBJECT_TABLE:
4309 35785 : defaclobjtype = DEFACLOBJ_RELATION;
4310 35785 : break;
4311 :
4312 1202 : case OBJECT_SEQUENCE:
4313 1202 : defaclobjtype = DEFACLOBJ_SEQUENCE;
4314 1202 : break;
4315 :
4316 10172 : case OBJECT_FUNCTION:
4317 10172 : defaclobjtype = DEFACLOBJ_FUNCTION;
4318 10172 : break;
4319 :
4320 3702 : case OBJECT_TYPE:
4321 3702 : defaclobjtype = DEFACLOBJ_TYPE;
4322 3702 : break;
4323 :
4324 684 : case OBJECT_SCHEMA:
4325 684 : defaclobjtype = DEFACLOBJ_NAMESPACE;
4326 684 : break;
4327 :
4328 104 : case OBJECT_LARGEOBJECT:
4329 104 : defaclobjtype = DEFACLOBJ_LARGEOBJECT;
4330 104 : break;
4331 :
4332 0 : default:
4333 0 : return NULL;
4334 : }
4335 :
4336 : /* Look up the relevant pg_default_acl entries */
4337 51649 : glob_acl = get_default_acl_internal(ownerId, InvalidOid, defaclobjtype);
4338 51649 : schema_acl = get_default_acl_internal(ownerId, nsp_oid, defaclobjtype);
4339 :
4340 : /* Quick out if neither entry exists */
4341 51649 : if (glob_acl == NULL && schema_acl == NULL)
4342 51509 : return NULL;
4343 :
4344 : /* We need to know the hard-wired default value, too */
4345 140 : def_acl = acldefault(objtype, ownerId);
4346 :
4347 : /* If there's no global entry, substitute the hard-wired default */
4348 140 : if (glob_acl == NULL)
4349 12 : glob_acl = def_acl;
4350 :
4351 : /* Merge in any per-schema privileges */
4352 140 : result = aclmerge(glob_acl, schema_acl, ownerId);
4353 :
4354 : /*
4355 : * For efficiency, we want to return NULL if the result equals default.
4356 : * This requires sorting both arrays to get an accurate comparison.
4357 : */
4358 140 : aclitemsort(result);
4359 140 : aclitemsort(def_acl);
4360 140 : if (aclequal(result, def_acl))
4361 16 : result = NULL;
4362 :
4363 140 : return result;
4364 : }
4365 :
4366 : /*
4367 : * Record dependencies on roles mentioned in a new object's ACL.
4368 : */
4369 : void
4370 54130 : recordDependencyOnNewAcl(Oid classId, Oid objectId, int32 objsubId,
4371 : Oid ownerId, Acl *acl)
4372 : {
4373 : int nmembers;
4374 : Oid *members;
4375 :
4376 : /* Nothing to do if ACL is defaulted */
4377 54130 : if (acl == NULL)
4378 54006 : return;
4379 :
4380 : /* Extract roles mentioned in ACL */
4381 124 : nmembers = aclmembers(acl, &members);
4382 :
4383 : /* Update the shared dependency ACL info */
4384 124 : updateAclDependencies(classId, objectId, objsubId,
4385 : ownerId,
4386 : 0, NULL,
4387 : nmembers, members);
4388 : }
4389 :
4390 : /*
4391 : * Record initial privileges for the top-level object passed in.
4392 : *
4393 : * For the object passed in, this will record its ACL (if any) and the ACLs of
4394 : * any sub-objects (eg: columns) into pg_init_privs.
4395 : */
4396 : void
4397 53 : recordExtObjInitPriv(Oid objoid, Oid classoid)
4398 : {
4399 : /*
4400 : * pg_class / pg_attribute
4401 : *
4402 : * If this is a relation then we need to see if there are any sub-objects
4403 : * (eg: columns) for it and, if so, be sure to call
4404 : * recordExtensionInitPrivWorker() for each one.
4405 : */
4406 53 : if (classoid == RelationRelationId)
4407 : {
4408 : Form_pg_class pg_class_tuple;
4409 : Datum aclDatum;
4410 : bool isNull;
4411 : HeapTuple tuple;
4412 :
4413 8 : tuple = SearchSysCache1(RELOID, ObjectIdGetDatum(objoid));
4414 8 : if (!HeapTupleIsValid(tuple))
4415 0 : elog(ERROR, "cache lookup failed for relation %u", objoid);
4416 8 : pg_class_tuple = (Form_pg_class) GETSTRUCT(tuple);
4417 :
4418 : /*
4419 : * Indexes don't have permissions, neither do the pg_class rows for
4420 : * composite types. (These cases are unreachable given the
4421 : * restrictions in ALTER EXTENSION ADD, but let's check anyway.)
4422 : */
4423 8 : if (pg_class_tuple->relkind == RELKIND_INDEX ||
4424 8 : pg_class_tuple->relkind == RELKIND_PARTITIONED_INDEX ||
4425 8 : pg_class_tuple->relkind == RELKIND_COMPOSITE_TYPE)
4426 : {
4427 0 : ReleaseSysCache(tuple);
4428 0 : return;
4429 : }
4430 :
4431 : /*
4432 : * If this isn't a sequence then it's possibly going to have
4433 : * column-level ACLs associated with it.
4434 : */
4435 8 : if (pg_class_tuple->relkind != RELKIND_SEQUENCE)
4436 : {
4437 : AttrNumber curr_att;
4438 7 : AttrNumber nattrs = pg_class_tuple->relnatts;
4439 :
4440 19 : for (curr_att = 1; curr_att <= nattrs; curr_att++)
4441 : {
4442 : HeapTuple attTuple;
4443 : Datum attaclDatum;
4444 :
4445 12 : attTuple = SearchSysCache2(ATTNUM,
4446 : ObjectIdGetDatum(objoid),
4447 : Int16GetDatum(curr_att));
4448 :
4449 12 : if (!HeapTupleIsValid(attTuple))
4450 0 : continue;
4451 :
4452 : /* ignore dropped columns */
4453 12 : if (((Form_pg_attribute) GETSTRUCT(attTuple))->attisdropped)
4454 : {
4455 1 : ReleaseSysCache(attTuple);
4456 1 : continue;
4457 : }
4458 :
4459 11 : attaclDatum = SysCacheGetAttr(ATTNUM, attTuple,
4460 : Anum_pg_attribute_attacl,
4461 : &isNull);
4462 :
4463 : /* no need to do anything for a NULL ACL */
4464 11 : if (isNull)
4465 : {
4466 9 : ReleaseSysCache(attTuple);
4467 9 : continue;
4468 : }
4469 :
4470 2 : recordExtensionInitPrivWorker(objoid, classoid, curr_att,
4471 2 : DatumGetAclP(attaclDatum));
4472 :
4473 2 : ReleaseSysCache(attTuple);
4474 : }
4475 : }
4476 :
4477 8 : aclDatum = SysCacheGetAttr(RELOID, tuple, Anum_pg_class_relacl,
4478 : &isNull);
4479 :
4480 : /* Add the record, if any, for the top-level object */
4481 8 : if (!isNull)
4482 4 : recordExtensionInitPrivWorker(objoid, classoid, 0,
4483 4 : DatumGetAclP(aclDatum));
4484 :
4485 8 : ReleaseSysCache(tuple);
4486 : }
4487 45 : else if (classoid == LargeObjectRelationId)
4488 : {
4489 : /* For large objects, we must consult pg_largeobject_metadata */
4490 : Datum aclDatum;
4491 : bool isNull;
4492 : HeapTuple tuple;
4493 : ScanKeyData entry[1];
4494 : SysScanDesc scan;
4495 : Relation relation;
4496 :
4497 : /*
4498 : * Note: this is dead code, given that we don't allow large objects to
4499 : * be made extension members. But it seems worth carrying in case
4500 : * some future caller of this function has need for it.
4501 : */
4502 0 : relation = table_open(LargeObjectMetadataRelationId, RowExclusiveLock);
4503 :
4504 : /* There's no syscache for pg_largeobject_metadata */
4505 0 : ScanKeyInit(&entry[0],
4506 : Anum_pg_largeobject_metadata_oid,
4507 : BTEqualStrategyNumber, F_OIDEQ,
4508 : ObjectIdGetDatum(objoid));
4509 :
4510 0 : scan = systable_beginscan(relation,
4511 : LargeObjectMetadataOidIndexId, true,
4512 : NULL, 1, entry);
4513 :
4514 0 : tuple = systable_getnext(scan);
4515 0 : if (!HeapTupleIsValid(tuple))
4516 0 : elog(ERROR, "could not find tuple for large object %u", objoid);
4517 :
4518 0 : aclDatum = heap_getattr(tuple,
4519 : Anum_pg_largeobject_metadata_lomacl,
4520 : RelationGetDescr(relation), &isNull);
4521 :
4522 : /* Add the record, if any, for the top-level object */
4523 0 : if (!isNull)
4524 0 : recordExtensionInitPrivWorker(objoid, classoid, 0,
4525 0 : DatumGetAclP(aclDatum));
4526 :
4527 0 : systable_endscan(scan);
4528 : }
4529 : /* This will error on unsupported classoid. */
4530 45 : else if (get_object_attnum_acl(classoid) != InvalidAttrNumber)
4531 : {
4532 : SysCacheIdentifier cacheid;
4533 : Datum aclDatum;
4534 : bool isNull;
4535 : HeapTuple tuple;
4536 :
4537 34 : cacheid = get_object_catcache_oid(classoid);
4538 34 : tuple = SearchSysCache1(cacheid, ObjectIdGetDatum(objoid));
4539 34 : if (!HeapTupleIsValid(tuple))
4540 0 : elog(ERROR, "cache lookup failed for %s %u",
4541 : get_object_class_descr(classoid), objoid);
4542 :
4543 34 : aclDatum = SysCacheGetAttr(cacheid, tuple,
4544 34 : get_object_attnum_acl(classoid),
4545 : &isNull);
4546 :
4547 : /* Add the record, if any, for the top-level object */
4548 34 : if (!isNull)
4549 5 : recordExtensionInitPrivWorker(objoid, classoid, 0,
4550 5 : DatumGetAclP(aclDatum));
4551 :
4552 34 : ReleaseSysCache(tuple);
4553 : }
4554 : }
4555 :
4556 : /*
4557 : * For the object passed in, remove its ACL and the ACLs of any object subIds
4558 : * from pg_init_privs (via recordExtensionInitPrivWorker()).
4559 : */
4560 : void
4561 157 : removeExtObjInitPriv(Oid objoid, Oid classoid)
4562 : {
4563 : /*
4564 : * If this is a relation then we need to see if there are any sub-objects
4565 : * (eg: columns) for it and, if so, be sure to call
4566 : * recordExtensionInitPrivWorker() for each one.
4567 : */
4568 157 : if (classoid == RelationRelationId)
4569 : {
4570 : Form_pg_class pg_class_tuple;
4571 : HeapTuple tuple;
4572 :
4573 30 : tuple = SearchSysCache1(RELOID, ObjectIdGetDatum(objoid));
4574 30 : if (!HeapTupleIsValid(tuple))
4575 0 : elog(ERROR, "cache lookup failed for relation %u", objoid);
4576 30 : pg_class_tuple = (Form_pg_class) GETSTRUCT(tuple);
4577 :
4578 : /*
4579 : * Indexes don't have permissions, neither do the pg_class rows for
4580 : * composite types. (These cases are unreachable given the
4581 : * restrictions in ALTER EXTENSION DROP, but let's check anyway.)
4582 : */
4583 30 : if (pg_class_tuple->relkind == RELKIND_INDEX ||
4584 30 : pg_class_tuple->relkind == RELKIND_PARTITIONED_INDEX ||
4585 30 : pg_class_tuple->relkind == RELKIND_COMPOSITE_TYPE)
4586 : {
4587 0 : ReleaseSysCache(tuple);
4588 0 : return;
4589 : }
4590 :
4591 : /*
4592 : * If this isn't a sequence then it's possibly going to have
4593 : * column-level ACLs associated with it.
4594 : */
4595 30 : if (pg_class_tuple->relkind != RELKIND_SEQUENCE)
4596 : {
4597 : AttrNumber curr_att;
4598 30 : AttrNumber nattrs = pg_class_tuple->relnatts;
4599 :
4600 984 : for (curr_att = 1; curr_att <= nattrs; curr_att++)
4601 : {
4602 : HeapTuple attTuple;
4603 :
4604 954 : attTuple = SearchSysCache2(ATTNUM,
4605 : ObjectIdGetDatum(objoid),
4606 : Int16GetDatum(curr_att));
4607 :
4608 954 : if (!HeapTupleIsValid(attTuple))
4609 0 : continue;
4610 :
4611 : /* when removing, remove all entries, even dropped columns */
4612 :
4613 954 : recordExtensionInitPrivWorker(objoid, classoid, curr_att, NULL);
4614 :
4615 954 : ReleaseSysCache(attTuple);
4616 : }
4617 : }
4618 :
4619 30 : ReleaseSysCache(tuple);
4620 : }
4621 :
4622 : /* Remove the record, if any, for the top-level object */
4623 157 : recordExtensionInitPrivWorker(objoid, classoid, 0, NULL);
4624 : }
4625 :
4626 : /*
4627 : * Record initial ACL for an extension object
4628 : *
4629 : * Can be called at any time, we check if 'creating_extension' is set and, if
4630 : * not, exit immediately.
4631 : *
4632 : * Pass in the object OID, the OID of the class (the OID of the table which
4633 : * the object is defined in) and the 'sub' id of the object (objsubid), if
4634 : * any. If there is no 'sub' id (they are currently only used for columns of
4635 : * tables) then pass in '0'. Finally, pass in the complete ACL to store.
4636 : *
4637 : * If an ACL already exists for this object/sub-object then we will replace
4638 : * it with what is passed in.
4639 : *
4640 : * Passing in NULL for 'new_acl' will result in the entry for the object being
4641 : * removed, if one is found.
4642 : */
4643 : static void
4644 13353 : recordExtensionInitPriv(Oid objoid, Oid classoid, int objsubid, Acl *new_acl)
4645 : {
4646 : /*
4647 : * Generally, we only record the initial privileges when an extension is
4648 : * being created, but because we don't actually use CREATE EXTENSION
4649 : * during binary upgrades with pg_upgrade, there is a variable to let us
4650 : * know that the GRANT and REVOKE statements being issued, while this
4651 : * variable is true, are for the initial privileges of the extension
4652 : * object and therefore we need to record them.
4653 : */
4654 13353 : if (!creating_extension && !binary_upgrade_record_init_privs)
4655 12959 : return;
4656 :
4657 394 : recordExtensionInitPrivWorker(objoid, classoid, objsubid, new_acl);
4658 : }
4659 :
4660 : /*
4661 : * Record initial ACL for an extension object, worker.
4662 : *
4663 : * This will perform a wholesale replacement of the entire ACL for the object
4664 : * passed in, therefore be sure to pass in the complete new ACL to use.
4665 : *
4666 : * Generally speaking, do *not* use this function directly but instead use
4667 : * recordExtensionInitPriv(), which checks if 'creating_extension' is set.
4668 : * This function does *not* check if 'creating_extension' is set as it is also
4669 : * used when an object is added to or removed from an extension via ALTER
4670 : * EXTENSION ... ADD/DROP.
4671 : */
4672 : static void
4673 1516 : recordExtensionInitPrivWorker(Oid objoid, Oid classoid, int objsubid,
4674 : Acl *new_acl)
4675 : {
4676 : Relation relation;
4677 : ScanKeyData key[3];
4678 : SysScanDesc scan;
4679 : HeapTuple tuple;
4680 : HeapTuple oldtuple;
4681 : int noldmembers;
4682 : int nnewmembers;
4683 : Oid *oldmembers;
4684 : Oid *newmembers;
4685 :
4686 : /* We'll need the role membership of the new ACL. */
4687 1516 : nnewmembers = aclmembers(new_acl, &newmembers);
4688 :
4689 : /* Search pg_init_privs for an existing entry. */
4690 1516 : relation = table_open(InitPrivsRelationId, RowExclusiveLock);
4691 :
4692 1516 : ScanKeyInit(&key[0],
4693 : Anum_pg_init_privs_objoid,
4694 : BTEqualStrategyNumber, F_OIDEQ,
4695 : ObjectIdGetDatum(objoid));
4696 1516 : ScanKeyInit(&key[1],
4697 : Anum_pg_init_privs_classoid,
4698 : BTEqualStrategyNumber, F_OIDEQ,
4699 : ObjectIdGetDatum(classoid));
4700 1516 : ScanKeyInit(&key[2],
4701 : Anum_pg_init_privs_objsubid,
4702 : BTEqualStrategyNumber, F_INT4EQ,
4703 : Int32GetDatum(objsubid));
4704 :
4705 1516 : scan = systable_beginscan(relation, InitPrivsObjIndexId, true,
4706 : NULL, 3, key);
4707 :
4708 : /* There should exist only one entry or none. */
4709 1516 : oldtuple = systable_getnext(scan);
4710 :
4711 : /* If we find an entry, update it with the latest ACL. */
4712 1516 : if (HeapTupleIsValid(oldtuple))
4713 : {
4714 132 : Datum values[Natts_pg_init_privs] = {0};
4715 132 : bool nulls[Natts_pg_init_privs] = {0};
4716 132 : bool replace[Natts_pg_init_privs] = {0};
4717 : Datum oldAclDatum;
4718 : bool isNull;
4719 : Acl *old_acl;
4720 :
4721 : /* Update pg_shdepend for roles mentioned in the old/new ACLs. */
4722 132 : oldAclDatum = heap_getattr(oldtuple, Anum_pg_init_privs_initprivs,
4723 : RelationGetDescr(relation), &isNull);
4724 : Assert(!isNull);
4725 132 : old_acl = DatumGetAclP(oldAclDatum);
4726 132 : noldmembers = aclmembers(old_acl, &oldmembers);
4727 :
4728 132 : updateInitAclDependencies(classoid, objoid, objsubid,
4729 : noldmembers, oldmembers,
4730 : nnewmembers, newmembers);
4731 :
4732 : /* If we have a new ACL to set, then update the row with it. */
4733 132 : if (new_acl && ACL_NUM(new_acl) != 0)
4734 : {
4735 89 : values[Anum_pg_init_privs_initprivs - 1] = PointerGetDatum(new_acl);
4736 89 : replace[Anum_pg_init_privs_initprivs - 1] = true;
4737 :
4738 89 : oldtuple = heap_modify_tuple(oldtuple, RelationGetDescr(relation),
4739 : values, nulls, replace);
4740 :
4741 89 : CatalogTupleUpdate(relation, &oldtuple->t_self, oldtuple);
4742 : }
4743 : else
4744 : {
4745 : /* new_acl is NULL/empty, so delete the entry we found. */
4746 43 : CatalogTupleDelete(relation, &oldtuple->t_self);
4747 : }
4748 : }
4749 : else
4750 : {
4751 1384 : Datum values[Natts_pg_init_privs] = {0};
4752 1384 : bool nulls[Natts_pg_init_privs] = {0};
4753 :
4754 : /*
4755 : * Only add a new entry if the new ACL is non-NULL.
4756 : *
4757 : * If we are passed in a NULL ACL and no entry exists, we can just
4758 : * fall through and do nothing.
4759 : */
4760 1384 : if (new_acl && ACL_NUM(new_acl) != 0)
4761 : {
4762 : /* No entry found, so add it. */
4763 313 : values[Anum_pg_init_privs_objoid - 1] = ObjectIdGetDatum(objoid);
4764 313 : values[Anum_pg_init_privs_classoid - 1] = ObjectIdGetDatum(classoid);
4765 313 : values[Anum_pg_init_privs_objsubid - 1] = Int32GetDatum(objsubid);
4766 :
4767 : /* This function only handles initial privileges of extensions */
4768 313 : values[Anum_pg_init_privs_privtype - 1] =
4769 313 : CharGetDatum(INITPRIVS_EXTENSION);
4770 :
4771 313 : values[Anum_pg_init_privs_initprivs - 1] = PointerGetDatum(new_acl);
4772 :
4773 313 : tuple = heap_form_tuple(RelationGetDescr(relation), values, nulls);
4774 :
4775 313 : CatalogTupleInsert(relation, tuple);
4776 :
4777 : /* Update pg_shdepend, too. */
4778 313 : noldmembers = 0;
4779 313 : oldmembers = NULL;
4780 :
4781 313 : updateInitAclDependencies(classoid, objoid, objsubid,
4782 : noldmembers, oldmembers,
4783 : nnewmembers, newmembers);
4784 : }
4785 : }
4786 :
4787 1516 : systable_endscan(scan);
4788 :
4789 : /* prevent error when processing objects multiple times */
4790 1516 : CommandCounterIncrement();
4791 :
4792 1516 : table_close(relation, RowExclusiveLock);
4793 1516 : }
4794 :
4795 : /*
4796 : * ReplaceRoleInInitPriv
4797 : *
4798 : * Used by shdepReassignOwned to replace mentions of a role in pg_init_privs.
4799 : */
4800 : void
4801 12 : ReplaceRoleInInitPriv(Oid oldroleid, Oid newroleid,
4802 : Oid classid, Oid objid, int32 objsubid)
4803 : {
4804 : Relation rel;
4805 : ScanKeyData key[3];
4806 : SysScanDesc scan;
4807 : HeapTuple oldtuple;
4808 : Datum oldAclDatum;
4809 : bool isNull;
4810 : Acl *old_acl;
4811 : Acl *new_acl;
4812 : HeapTuple newtuple;
4813 : int noldmembers;
4814 : int nnewmembers;
4815 : Oid *oldmembers;
4816 : Oid *newmembers;
4817 :
4818 : /* Search for existing pg_init_privs entry for the target object. */
4819 12 : rel = table_open(InitPrivsRelationId, RowExclusiveLock);
4820 :
4821 12 : ScanKeyInit(&key[0],
4822 : Anum_pg_init_privs_objoid,
4823 : BTEqualStrategyNumber, F_OIDEQ,
4824 : ObjectIdGetDatum(objid));
4825 12 : ScanKeyInit(&key[1],
4826 : Anum_pg_init_privs_classoid,
4827 : BTEqualStrategyNumber, F_OIDEQ,
4828 : ObjectIdGetDatum(classid));
4829 12 : ScanKeyInit(&key[2],
4830 : Anum_pg_init_privs_objsubid,
4831 : BTEqualStrategyNumber, F_INT4EQ,
4832 : Int32GetDatum(objsubid));
4833 :
4834 12 : scan = systable_beginscan(rel, InitPrivsObjIndexId, true,
4835 : NULL, 3, key);
4836 :
4837 : /* There should exist only one entry or none. */
4838 12 : oldtuple = systable_getnext(scan);
4839 :
4840 12 : if (!HeapTupleIsValid(oldtuple))
4841 : {
4842 : /*
4843 : * Hmm, why are we here if there's no entry? But pack up and go away
4844 : * quietly.
4845 : */
4846 0 : systable_endscan(scan);
4847 0 : table_close(rel, RowExclusiveLock);
4848 0 : return;
4849 : }
4850 :
4851 : /* Get a writable copy of the existing ACL. */
4852 12 : oldAclDatum = heap_getattr(oldtuple, Anum_pg_init_privs_initprivs,
4853 : RelationGetDescr(rel), &isNull);
4854 : Assert(!isNull);
4855 12 : old_acl = DatumGetAclPCopy(oldAclDatum);
4856 :
4857 : /*
4858 : * Generate new ACL. This usage of aclnewowner is a bit off-label when
4859 : * oldroleid isn't the owner; but it does the job fine.
4860 : */
4861 12 : new_acl = aclnewowner(old_acl, oldroleid, newroleid);
4862 :
4863 : /*
4864 : * If we end with an empty ACL, delete the pg_init_privs entry. (That
4865 : * probably can't happen here, but we may as well cover the case.)
4866 : */
4867 12 : if (new_acl == NULL || ACL_NUM(new_acl) == 0)
4868 : {
4869 0 : CatalogTupleDelete(rel, &oldtuple->t_self);
4870 : }
4871 : else
4872 : {
4873 12 : Datum values[Natts_pg_init_privs] = {0};
4874 12 : bool nulls[Natts_pg_init_privs] = {0};
4875 12 : bool replaces[Natts_pg_init_privs] = {0};
4876 :
4877 : /* Update existing entry. */
4878 12 : values[Anum_pg_init_privs_initprivs - 1] = PointerGetDatum(new_acl);
4879 12 : replaces[Anum_pg_init_privs_initprivs - 1] = true;
4880 :
4881 12 : newtuple = heap_modify_tuple(oldtuple, RelationGetDescr(rel),
4882 : values, nulls, replaces);
4883 12 : CatalogTupleUpdate(rel, &newtuple->t_self, newtuple);
4884 : }
4885 :
4886 : /*
4887 : * Update the shared dependency ACL info.
4888 : */
4889 12 : noldmembers = aclmembers(old_acl, &oldmembers);
4890 12 : nnewmembers = aclmembers(new_acl, &newmembers);
4891 :
4892 12 : updateInitAclDependencies(classid, objid, objsubid,
4893 : noldmembers, oldmembers,
4894 : nnewmembers, newmembers);
4895 :
4896 12 : systable_endscan(scan);
4897 :
4898 : /* prevent error when processing objects multiple times */
4899 12 : CommandCounterIncrement();
4900 :
4901 12 : table_close(rel, RowExclusiveLock);
4902 : }
4903 :
4904 : /*
4905 : * RemoveRoleFromInitPriv
4906 : *
4907 : * Used by shdepDropOwned to remove mentions of a role in pg_init_privs.
4908 : */
4909 : void
4910 14 : RemoveRoleFromInitPriv(Oid roleid, Oid classid, Oid objid, int32 objsubid)
4911 : {
4912 : Relation rel;
4913 : ScanKeyData key[3];
4914 : SysScanDesc scan;
4915 : HeapTuple oldtuple;
4916 : SysCacheIdentifier cacheid;
4917 : HeapTuple objtuple;
4918 : Oid ownerId;
4919 : Datum oldAclDatum;
4920 : bool isNull;
4921 : Acl *old_acl;
4922 : Acl *new_acl;
4923 : HeapTuple newtuple;
4924 : int noldmembers;
4925 : int nnewmembers;
4926 : Oid *oldmembers;
4927 : Oid *newmembers;
4928 :
4929 : /* Search for existing pg_init_privs entry for the target object. */
4930 14 : rel = table_open(InitPrivsRelationId, RowExclusiveLock);
4931 :
4932 14 : ScanKeyInit(&key[0],
4933 : Anum_pg_init_privs_objoid,
4934 : BTEqualStrategyNumber, F_OIDEQ,
4935 : ObjectIdGetDatum(objid));
4936 14 : ScanKeyInit(&key[1],
4937 : Anum_pg_init_privs_classoid,
4938 : BTEqualStrategyNumber, F_OIDEQ,
4939 : ObjectIdGetDatum(classid));
4940 14 : ScanKeyInit(&key[2],
4941 : Anum_pg_init_privs_objsubid,
4942 : BTEqualStrategyNumber, F_INT4EQ,
4943 : Int32GetDatum(objsubid));
4944 :
4945 14 : scan = systable_beginscan(rel, InitPrivsObjIndexId, true,
4946 : NULL, 3, key);
4947 :
4948 : /* There should exist only one entry or none. */
4949 14 : oldtuple = systable_getnext(scan);
4950 :
4951 14 : if (!HeapTupleIsValid(oldtuple))
4952 : {
4953 : /*
4954 : * Hmm, why are we here if there's no entry? But pack up and go away
4955 : * quietly.
4956 : */
4957 0 : systable_endscan(scan);
4958 0 : table_close(rel, RowExclusiveLock);
4959 0 : return;
4960 : }
4961 :
4962 : /* Get a writable copy of the existing ACL. */
4963 14 : oldAclDatum = heap_getattr(oldtuple, Anum_pg_init_privs_initprivs,
4964 : RelationGetDescr(rel), &isNull);
4965 : Assert(!isNull);
4966 14 : old_acl = DatumGetAclPCopy(oldAclDatum);
4967 :
4968 : /*
4969 : * We need the members of both old and new ACLs so we can correct the
4970 : * shared dependency information. Collect data before
4971 : * merge_acl_with_grant throws away old_acl.
4972 : */
4973 14 : noldmembers = aclmembers(old_acl, &oldmembers);
4974 :
4975 : /* Must find out the owner's OID the hard way. */
4976 14 : cacheid = get_object_catcache_oid(classid);
4977 14 : objtuple = SearchSysCache1(cacheid, ObjectIdGetDatum(objid));
4978 14 : if (!HeapTupleIsValid(objtuple))
4979 0 : elog(ERROR, "cache lookup failed for %s %u",
4980 : get_object_class_descr(classid), objid);
4981 :
4982 14 : ownerId = DatumGetObjectId(SysCacheGetAttrNotNull(cacheid,
4983 : objtuple,
4984 14 : get_object_attnum_owner(classid)));
4985 14 : ReleaseSysCache(objtuple);
4986 :
4987 : /*
4988 : * Generate new ACL. Grantor of rights is always the same as the owner.
4989 : */
4990 14 : if (old_acl != NULL)
4991 14 : new_acl = merge_acl_with_grant(old_acl,
4992 : false, /* is_grant */
4993 : false, /* grant_option */
4994 : DROP_RESTRICT,
4995 14 : list_make1_oid(roleid),
4996 : ACLITEM_ALL_PRIV_BITS,
4997 : ownerId,
4998 : ownerId);
4999 : else
5000 0 : new_acl = NULL; /* this case shouldn't happen, probably */
5001 :
5002 : /* If we end with an empty ACL, delete the pg_init_privs entry. */
5003 14 : if (new_acl == NULL || ACL_NUM(new_acl) == 0)
5004 : {
5005 0 : CatalogTupleDelete(rel, &oldtuple->t_self);
5006 : }
5007 : else
5008 : {
5009 14 : Datum values[Natts_pg_init_privs] = {0};
5010 14 : bool nulls[Natts_pg_init_privs] = {0};
5011 14 : bool replaces[Natts_pg_init_privs] = {0};
5012 :
5013 : /* Update existing entry. */
5014 14 : values[Anum_pg_init_privs_initprivs - 1] = PointerGetDatum(new_acl);
5015 14 : replaces[Anum_pg_init_privs_initprivs - 1] = true;
5016 :
5017 14 : newtuple = heap_modify_tuple(oldtuple, RelationGetDescr(rel),
5018 : values, nulls, replaces);
5019 14 : CatalogTupleUpdate(rel, &newtuple->t_self, newtuple);
5020 : }
5021 :
5022 : /*
5023 : * Update the shared dependency ACL info.
5024 : */
5025 14 : nnewmembers = aclmembers(new_acl, &newmembers);
5026 :
5027 14 : updateInitAclDependencies(classid, objid, objsubid,
5028 : noldmembers, oldmembers,
5029 : nnewmembers, newmembers);
5030 :
5031 14 : systable_endscan(scan);
5032 :
5033 : /* prevent error when processing objects multiple times */
5034 14 : CommandCounterIncrement();
5035 :
5036 14 : table_close(rel, RowExclusiveLock);
5037 : }
|