LCOV - code coverage report
Current view: top level - src/backend/utils/adt - genfile.c (source / functions) Hit Total Coverage
Test: PostgreSQL 17devel Lines: 189 245 77.1 %
Date: 2023-12-05 08:11:01 Functions: 23 28 82.1 %
Legend: Lines: hit not hit

          Line data    Source code
       1             : /*-------------------------------------------------------------------------
       2             :  *
       3             :  * genfile.c
       4             :  *      Functions for direct access to files
       5             :  *
       6             :  *
       7             :  * Copyright (c) 2004-2023, PostgreSQL Global Development Group
       8             :  *
       9             :  * Author: Andreas Pflug <pgadmin@pse-consulting.de>
      10             :  *
      11             :  * IDENTIFICATION
      12             :  *    src/backend/utils/adt/genfile.c
      13             :  *
      14             :  *-------------------------------------------------------------------------
      15             :  */
      16             : #include "postgres.h"
      17             : 
      18             : #include <sys/file.h>
      19             : #include <sys/stat.h>
      20             : #include <unistd.h>
      21             : #include <dirent.h>
      22             : 
      23             : #include "access/htup_details.h"
      24             : #include "access/xlog_internal.h"
      25             : #include "catalog/pg_authid.h"
      26             : #include "catalog/pg_tablespace_d.h"
      27             : #include "catalog/pg_type.h"
      28             : #include "funcapi.h"
      29             : #include "mb/pg_wchar.h"
      30             : #include "miscadmin.h"
      31             : #include "postmaster/syslogger.h"
      32             : #include "replication/slot.h"
      33             : #include "storage/fd.h"
      34             : #include "utils/acl.h"
      35             : #include "utils/builtins.h"
      36             : #include "utils/memutils.h"
      37             : #include "utils/syscache.h"
      38             : #include "utils/timestamp.h"
      39             : 
      40             : 
      41             : /*
      42             :  * Convert a "text" filename argument to C string, and check it's allowable.
      43             :  *
      44             :  * Filename may be absolute or relative to the DataDir, but we only allow
      45             :  * absolute paths that match DataDir or Log_directory.
      46             :  *
      47             :  * This does a privilege check against the 'pg_read_server_files' role, so
      48             :  * this function is really only appropriate for callers who are only checking
      49             :  * 'read' access.  Do not use this function if you are looking for a check
      50             :  * for 'write' or 'program' access without updating it to access the type
      51             :  * of check as an argument and checking the appropriate role membership.
      52             :  */
      53             : static char *
      54       19274 : convert_and_check_filename(text *arg)
      55             : {
      56             :     char       *filename;
      57             : 
      58       19274 :     filename = text_to_cstring(arg);
      59       19274 :     canonicalize_path(filename);    /* filename can change length here */
      60             : 
      61             :     /*
      62             :      * Roles with privileges of the 'pg_read_server_files' role are allowed to
      63             :      * access any files on the server as the PG user, so no need to do any
      64             :      * further checks here.
      65             :      */
      66       19274 :     if (has_privs_of_role(GetUserId(), ROLE_PG_READ_SERVER_FILES))
      67        5494 :         return filename;
      68             : 
      69             :     /*
      70             :      * User isn't a member of the pg_read_server_files role, so check if it's
      71             :      * allowable
      72             :      */
      73       13780 :     if (is_absolute_path(filename))
      74             :     {
      75             :         /*
      76             :          * Allow absolute paths if within DataDir or Log_directory, even
      77             :          * though Log_directory might be outside DataDir.
      78             :          */
      79           0 :         if (!path_is_prefix_of_path(DataDir, filename) &&
      80           0 :             (!is_absolute_path(Log_directory) ||
      81           0 :              !path_is_prefix_of_path(Log_directory, filename)))
      82           0 :             ereport(ERROR,
      83             :                     (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
      84             :                      errmsg("absolute path not allowed")));
      85             :     }
      86       13780 :     else if (!path_is_relative_and_below_cwd(filename))
      87           0 :         ereport(ERROR,
      88             :                 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
      89             :                  errmsg("path must be in or below the data directory")));
      90             : 
      91       13780 :     return filename;
      92             : }
      93             : 
      94             : 
      95             : /*
      96             :  * Read a section of a file, returning it as bytea
      97             :  *
      98             :  * Caller is responsible for all permissions checking.
      99             :  *
     100             :  * We read the whole of the file when bytes_to_read is negative.
     101             :  */
     102             : static bytea *
     103        4980 : read_binary_file(const char *filename, int64 seek_offset, int64 bytes_to_read,
     104             :                  bool missing_ok)
     105             : {
     106             :     bytea      *buf;
     107        4980 :     size_t      nbytes = 0;
     108             :     FILE       *file;
     109             : 
     110             :     /* clamp request size to what we can actually deliver */
     111        4980 :     if (bytes_to_read > (int64) (MaxAllocSize - VARHDRSZ))
     112           0 :         ereport(ERROR,
     113             :                 (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
     114             :                  errmsg("requested length too large")));
     115             : 
     116        4980 :     if ((file = AllocateFile(filename, PG_BINARY_R)) == NULL)
     117             :     {
     118          28 :         if (missing_ok && errno == ENOENT)
     119          12 :             return NULL;
     120             :         else
     121          16 :             ereport(ERROR,
     122             :                     (errcode_for_file_access(),
     123             :                      errmsg("could not open file \"%s\" for reading: %m",
     124             :                             filename)));
     125             :     }
     126             : 
     127        4952 :     if (fseeko(file, (off_t) seek_offset,
     128             :                (seek_offset >= 0) ? SEEK_SET : SEEK_END) != 0)
     129           0 :         ereport(ERROR,
     130             :                 (errcode_for_file_access(),
     131             :                  errmsg("could not seek in file \"%s\": %m", filename)));
     132             : 
     133        4952 :     if (bytes_to_read >= 0)
     134             :     {
     135             :         /* If passed explicit read size just do it */
     136        4894 :         buf = (bytea *) palloc((Size) bytes_to_read + VARHDRSZ);
     137             : 
     138        4894 :         nbytes = fread(VARDATA(buf), 1, (size_t) bytes_to_read, file);
     139             :     }
     140             :     else
     141             :     {
     142             :         /* Negative read size, read rest of file */
     143             :         StringInfoData sbuf;
     144             : 
     145          58 :         initStringInfo(&sbuf);
     146             :         /* Leave room in the buffer for the varlena length word */
     147          58 :         sbuf.len += VARHDRSZ;
     148             :         Assert(sbuf.len < sbuf.maxlen);
     149             : 
     150         140 :         while (!(feof(file) || ferror(file)))
     151             :         {
     152             :             size_t      rbytes;
     153             : 
     154             :             /* Minimum amount to read at a time */
     155             : #define MIN_READ_SIZE 4096
     156             : 
     157             :             /*
     158             :              * If not at end of file, and sbuf.len is equal to MaxAllocSize -
     159             :              * 1, then either the file is too large, or there is nothing left
     160             :              * to read. Attempt to read one more byte to see if the end of
     161             :              * file has been reached. If not, the file is too large; we'd
     162             :              * rather give the error message for that ourselves.
     163             :              */
     164          82 :             if (sbuf.len == MaxAllocSize - 1)
     165             :             {
     166             :                 char        rbuf[1];
     167             : 
     168           0 :                 if (fread(rbuf, 1, 1, file) != 0 || !feof(file))
     169           0 :                     ereport(ERROR,
     170             :                             (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
     171             :                              errmsg("file length too large")));
     172             :                 else
     173             :                     break;
     174             :             }
     175             : 
     176             :             /* OK, ensure that we can read at least MIN_READ_SIZE */
     177          82 :             enlargeStringInfo(&sbuf, MIN_READ_SIZE);
     178             : 
     179             :             /*
     180             :              * stringinfo.c likes to allocate in powers of 2, so it's likely
     181             :              * that much more space is available than we asked for.  Use all
     182             :              * of it, rather than making more fread calls than necessary.
     183             :              */
     184          82 :             rbytes = fread(sbuf.data + sbuf.len, 1,
     185          82 :                            (size_t) (sbuf.maxlen - sbuf.len - 1), file);
     186          82 :             sbuf.len += rbytes;
     187          82 :             nbytes += rbytes;
     188             :         }
     189             : 
     190             :         /* Now we can commandeer the stringinfo's buffer as the result */
     191          58 :         buf = (bytea *) sbuf.data;
     192             :     }
     193             : 
     194        4952 :     if (ferror(file))
     195           0 :         ereport(ERROR,
     196             :                 (errcode_for_file_access(),
     197             :                  errmsg("could not read file \"%s\": %m", filename)));
     198             : 
     199        4952 :     SET_VARSIZE(buf, nbytes + VARHDRSZ);
     200             : 
     201        4952 :     FreeFile(file);
     202             : 
     203        4952 :     return buf;
     204             : }
     205             : 
     206             : /*
     207             :  * Similar to read_binary_file, but we verify that the contents are valid
     208             :  * in the database encoding.
     209             :  */
     210             : static text *
     211          40 : read_text_file(const char *filename, int64 seek_offset, int64 bytes_to_read,
     212             :                bool missing_ok)
     213             : {
     214             :     bytea      *buf;
     215             : 
     216          40 :     buf = read_binary_file(filename, seek_offset, bytes_to_read, missing_ok);
     217             : 
     218          30 :     if (buf != NULL)
     219             :     {
     220             :         /* Make sure the input is valid */
     221          24 :         pg_verifymbstr(VARDATA(buf), VARSIZE(buf) - VARHDRSZ, false);
     222             : 
     223             :         /* OK, we can cast it to text safely */
     224          24 :         return (text *) buf;
     225             :     }
     226             :     else
     227           6 :         return NULL;
     228             : }
     229             : 
     230             : /*
     231             :  * Read a section of a file, returning it as text
     232             :  *
     233             :  * This function is kept to support adminpack 1.0.
     234             :  */
     235             : Datum
     236           0 : pg_read_file(PG_FUNCTION_ARGS)
     237             : {
     238           0 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     239           0 :     int64       seek_offset = 0;
     240           0 :     int64       bytes_to_read = -1;
     241           0 :     bool        missing_ok = false;
     242             :     char       *filename;
     243             :     text       *result;
     244             : 
     245           0 :     if (!superuser())
     246           0 :         ereport(ERROR,
     247             :                 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
     248             :                  errmsg("must be superuser to read files with adminpack 1.0"),
     249             :         /* translator: %s is a SQL function name */
     250             :                  errhint("Consider using %s, which is part of core, instead.",
     251             :                          "pg_read_file()")));
     252             : 
     253             :     /* handle optional arguments */
     254           0 :     if (PG_NARGS() >= 3)
     255             :     {
     256           0 :         seek_offset = PG_GETARG_INT64(1);
     257           0 :         bytes_to_read = PG_GETARG_INT64(2);
     258             : 
     259           0 :         if (bytes_to_read < 0)
     260           0 :             ereport(ERROR,
     261             :                     (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
     262             :                      errmsg("requested length cannot be negative")));
     263             :     }
     264           0 :     if (PG_NARGS() >= 4)
     265           0 :         missing_ok = PG_GETARG_BOOL(3);
     266             : 
     267           0 :     filename = convert_and_check_filename(filename_t);
     268             : 
     269           0 :     result = read_text_file(filename, seek_offset, bytes_to_read, missing_ok);
     270           0 :     if (result)
     271           0 :         PG_RETURN_TEXT_P(result);
     272             :     else
     273           0 :         PG_RETURN_NULL();
     274             : }
     275             : 
     276             : /*
     277             :  * Read a section of a file, returning it as text
     278             :  *
     279             :  * No superuser check done here- instead privileges are handled by the
     280             :  * GRANT system.
     281             :  *
     282             :  * If read_to_eof is true, bytes_to_read must be -1, otherwise negative values
     283             :  * are not allowed for bytes_to_read.
     284             :  */
     285             : static text *
     286          52 : pg_read_file_common(text *filename_t, int64 seek_offset, int64 bytes_to_read,
     287             :                     bool read_to_eof, bool missing_ok)
     288             : {
     289          52 :     if (read_to_eof)
     290             :         Assert(bytes_to_read == -1);
     291          18 :     else if (bytes_to_read < 0)
     292          12 :         ereport(ERROR,
     293             :                 (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
     294             :                  errmsg("requested length cannot be negative")));
     295             : 
     296          40 :     return read_text_file(convert_and_check_filename(filename_t),
     297             :                           seek_offset, bytes_to_read, missing_ok);
     298             : }
     299             : 
     300             : /*
     301             :  * Read a section of a file, returning it as bytea
     302             :  *
     303             :  * Parameters are interpreted the same as pg_read_file_common().
     304             :  */
     305             : static bytea *
     306        4952 : pg_read_binary_file_common(text *filename_t,
     307             :                            int64 seek_offset, int64 bytes_to_read,
     308             :                            bool read_to_eof, bool missing_ok)
     309             : {
     310        4952 :     if (read_to_eof)
     311             :         Assert(bytes_to_read == -1);
     312        4900 :     else if (bytes_to_read < 0)
     313          12 :         ereport(ERROR,
     314             :                 (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
     315             :                  errmsg("requested length cannot be negative")));
     316             : 
     317        4940 :     return read_binary_file(convert_and_check_filename(filename_t),
     318             :                             seek_offset, bytes_to_read, missing_ok);
     319             : }
     320             : 
     321             : 
     322             : /*
     323             :  * Wrapper functions for the variants of SQL functions pg_read_file() and
     324             :  * pg_read_binary_file().
     325             :  *
     326             :  * These are necessary to pass the sanity check in opr_sanity, which checks
     327             :  * that all built-in functions that share the implementing C function take
     328             :  * the same number of arguments.
     329             :  */
     330             : Datum
     331          12 : pg_read_file_off_len(PG_FUNCTION_ARGS)
     332             : {
     333          12 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     334          12 :     int64       seek_offset = PG_GETARG_INT64(1);
     335          12 :     int64       bytes_to_read = PG_GETARG_INT64(2);
     336             :     text       *ret;
     337             : 
     338          12 :     ret = pg_read_file_common(filename_t, seek_offset, bytes_to_read,
     339             :                               false, false);
     340           6 :     if (!ret)
     341           0 :         PG_RETURN_NULL();
     342             : 
     343           6 :     PG_RETURN_TEXT_P(ret);
     344             : }
     345             : 
     346             : Datum
     347           6 : pg_read_file_off_len_missing(PG_FUNCTION_ARGS)
     348             : {
     349           6 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     350           6 :     int64       seek_offset = PG_GETARG_INT64(1);
     351           6 :     int64       bytes_to_read = PG_GETARG_INT64(2);
     352           6 :     bool        missing_ok = PG_GETARG_BOOL(3);
     353             :     text       *ret;
     354             : 
     355           6 :     ret = pg_read_file_common(filename_t, seek_offset, bytes_to_read,
     356             :                               false, missing_ok);
     357             : 
     358           0 :     if (!ret)
     359           0 :         PG_RETURN_NULL();
     360             : 
     361           0 :     PG_RETURN_TEXT_P(ret);
     362             : }
     363             : 
     364             : Datum
     365          28 : pg_read_file_all(PG_FUNCTION_ARGS)
     366             : {
     367          28 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     368             :     text       *ret;
     369             : 
     370          28 :     ret = pg_read_file_common(filename_t, 0, -1, true, false);
     371             : 
     372          18 :     if (!ret)
     373           0 :         PG_RETURN_NULL();
     374             : 
     375          18 :     PG_RETURN_TEXT_P(ret);
     376             : }
     377             : 
     378             : Datum
     379           6 : pg_read_file_all_missing(PG_FUNCTION_ARGS)
     380             : {
     381           6 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     382           6 :     bool        missing_ok = PG_GETARG_BOOL(1);
     383             :     text       *ret;
     384             : 
     385           6 :     ret = pg_read_file_common(filename_t, 0, -1, true, missing_ok);
     386             : 
     387           6 :     if (!ret)
     388           6 :         PG_RETURN_NULL();
     389             : 
     390           0 :     PG_RETURN_TEXT_P(ret);
     391             : }
     392             : 
     393             : Datum
     394          12 : pg_read_binary_file_off_len(PG_FUNCTION_ARGS)
     395             : {
     396          12 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     397          12 :     int64       seek_offset = PG_GETARG_INT64(1);
     398          12 :     int64       bytes_to_read = PG_GETARG_INT64(2);
     399             :     text       *ret;
     400             : 
     401          12 :     ret = pg_read_binary_file_common(filename_t, seek_offset, bytes_to_read,
     402             :                                      false, false);
     403           6 :     if (!ret)
     404           0 :         PG_RETURN_NULL();
     405             : 
     406           6 :     PG_RETURN_BYTEA_P(ret);
     407             : }
     408             : 
     409             : Datum
     410        4888 : pg_read_binary_file_off_len_missing(PG_FUNCTION_ARGS)
     411             : {
     412        4888 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     413        4888 :     int64       seek_offset = PG_GETARG_INT64(1);
     414        4888 :     int64       bytes_to_read = PG_GETARG_INT64(2);
     415        4888 :     bool        missing_ok = PG_GETARG_BOOL(3);
     416             :     text       *ret;
     417             : 
     418        4888 :     ret = pg_read_binary_file_common(filename_t, seek_offset, bytes_to_read,
     419             :                                      false, missing_ok);
     420        4882 :     if (!ret)
     421           0 :         PG_RETURN_NULL();
     422             : 
     423        4882 :     PG_RETURN_BYTEA_P(ret);
     424             : }
     425             : 
     426             : Datum
     427          46 : pg_read_binary_file_all(PG_FUNCTION_ARGS)
     428             : {
     429          46 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     430             :     text       *ret;
     431             : 
     432          46 :     ret = pg_read_binary_file_common(filename_t, 0, -1, true, false);
     433             : 
     434          40 :     if (!ret)
     435           0 :         PG_RETURN_NULL();
     436             : 
     437          40 :     PG_RETURN_BYTEA_P(ret);
     438             : }
     439             : 
     440             : Datum
     441           6 : pg_read_binary_file_all_missing(PG_FUNCTION_ARGS)
     442             : {
     443           6 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     444           6 :     bool        missing_ok = PG_GETARG_BOOL(1);
     445             :     text       *ret;
     446             : 
     447           6 :     ret = pg_read_binary_file_common(filename_t, 0, -1, true, missing_ok);
     448             : 
     449           6 :     if (!ret)
     450           6 :         PG_RETURN_NULL();
     451             : 
     452           0 :     PG_RETURN_BYTEA_P(ret);
     453             : }
     454             : 
     455             : /*
     456             :  * stat a file
     457             :  */
     458             : Datum
     459       13914 : pg_stat_file(PG_FUNCTION_ARGS)
     460             : {
     461       13914 :     text       *filename_t = PG_GETARG_TEXT_PP(0);
     462             :     char       *filename;
     463             :     struct stat fst;
     464             :     Datum       values[6];
     465             :     bool        isnull[6];
     466             :     HeapTuple   tuple;
     467             :     TupleDesc   tupdesc;
     468       13914 :     bool        missing_ok = false;
     469             : 
     470             :     /* check the optional argument */
     471       13914 :     if (PG_NARGS() == 2)
     472       13904 :         missing_ok = PG_GETARG_BOOL(1);
     473             : 
     474       13914 :     filename = convert_and_check_filename(filename_t);
     475             : 
     476       13914 :     if (stat(filename, &fst) < 0)
     477             :     {
     478           2 :         if (missing_ok && errno == ENOENT)
     479           0 :             PG_RETURN_NULL();
     480             :         else
     481           2 :             ereport(ERROR,
     482             :                     (errcode_for_file_access(),
     483             :                      errmsg("could not stat file \"%s\": %m", filename)));
     484             :     }
     485             : 
     486             :     /*
     487             :      * This record type had better match the output parameters declared for me
     488             :      * in pg_proc.h.
     489             :      */
     490       13912 :     tupdesc = CreateTemplateTupleDesc(6);
     491       13912 :     TupleDescInitEntry(tupdesc, (AttrNumber) 1,
     492             :                        "size", INT8OID, -1, 0);
     493       13912 :     TupleDescInitEntry(tupdesc, (AttrNumber) 2,
     494             :                        "access", TIMESTAMPTZOID, -1, 0);
     495       13912 :     TupleDescInitEntry(tupdesc, (AttrNumber) 3,
     496             :                        "modification", TIMESTAMPTZOID, -1, 0);
     497       13912 :     TupleDescInitEntry(tupdesc, (AttrNumber) 4,
     498             :                        "change", TIMESTAMPTZOID, -1, 0);
     499       13912 :     TupleDescInitEntry(tupdesc, (AttrNumber) 5,
     500             :                        "creation", TIMESTAMPTZOID, -1, 0);
     501       13912 :     TupleDescInitEntry(tupdesc, (AttrNumber) 6,
     502             :                        "isdir", BOOLOID, -1, 0);
     503       13912 :     BlessTupleDesc(tupdesc);
     504             : 
     505       13912 :     memset(isnull, false, sizeof(isnull));
     506             : 
     507       13912 :     values[0] = Int64GetDatum((int64) fst.st_size);
     508       13912 :     values[1] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_atime));
     509       13912 :     values[2] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_mtime));
     510             :     /* Unix has file status change time, while Win32 has creation time */
     511             : #if !defined(WIN32) && !defined(__CYGWIN__)
     512       13912 :     values[3] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_ctime));
     513       13912 :     isnull[4] = true;
     514             : #else
     515             :     isnull[3] = true;
     516             :     values[4] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_ctime));
     517             : #endif
     518       13912 :     values[5] = BoolGetDatum(S_ISDIR(fst.st_mode));
     519             : 
     520       13912 :     tuple = heap_form_tuple(tupdesc, values, isnull);
     521             : 
     522       13912 :     pfree(filename);
     523             : 
     524       13912 :     PG_RETURN_DATUM(HeapTupleGetDatum(tuple));
     525             : }
     526             : 
     527             : /*
     528             :  * stat a file (1 argument version)
     529             :  *
     530             :  * note: this wrapper is necessary to pass the sanity check in opr_sanity,
     531             :  * which checks that all built-in functions that share the implementing C
     532             :  * function take the same number of arguments
     533             :  */
     534             : Datum
     535          10 : pg_stat_file_1arg(PG_FUNCTION_ARGS)
     536             : {
     537          10 :     return pg_stat_file(fcinfo);
     538             : }
     539             : 
     540             : /*
     541             :  * List a directory (returns the filenames only)
     542             :  */
     543             : Datum
     544         380 : pg_ls_dir(PG_FUNCTION_ARGS)
     545             : {
     546         380 :     ReturnSetInfo *rsinfo = (ReturnSetInfo *) fcinfo->resultinfo;
     547             :     char       *location;
     548         380 :     bool        missing_ok = false;
     549         380 :     bool        include_dot_dirs = false;
     550             :     DIR        *dirdesc;
     551             :     struct dirent *de;
     552             : 
     553         380 :     location = convert_and_check_filename(PG_GETARG_TEXT_PP(0));
     554             : 
     555             :     /* check the optional arguments */
     556         380 :     if (PG_NARGS() == 3)
     557             :     {
     558         366 :         if (!PG_ARGISNULL(1))
     559         366 :             missing_ok = PG_GETARG_BOOL(1);
     560         366 :         if (!PG_ARGISNULL(2))
     561         366 :             include_dot_dirs = PG_GETARG_BOOL(2);
     562             :     }
     563             : 
     564         380 :     InitMaterializedSRF(fcinfo, MAT_SRF_USE_EXPECTED_DESC);
     565             : 
     566         380 :     dirdesc = AllocateDir(location);
     567         380 :     if (!dirdesc)
     568             :     {
     569             :         /* Return empty tuplestore if appropriate */
     570          12 :         if (missing_ok && errno == ENOENT)
     571           6 :             return (Datum) 0;
     572             :         /* Otherwise, we can let ReadDir() throw the error */
     573             :     }
     574             : 
     575       15608 :     while ((de = ReadDir(dirdesc, location)) != NULL)
     576             :     {
     577             :         Datum       values[1];
     578             :         bool        nulls[1];
     579             : 
     580       15234 :         if (!include_dot_dirs &&
     581       15078 :             (strcmp(de->d_name, ".") == 0 ||
     582       14716 :              strcmp(de->d_name, "..") == 0))
     583         724 :             continue;
     584             : 
     585       14510 :         values[0] = CStringGetTextDatum(de->d_name);
     586       14510 :         nulls[0] = false;
     587             : 
     588       14510 :         tuplestore_putvalues(rsinfo->setResult, rsinfo->setDesc,
     589             :                              values, nulls);
     590             :     }
     591             : 
     592         368 :     FreeDir(dirdesc);
     593         368 :     return (Datum) 0;
     594             : }
     595             : 
     596             : /*
     597             :  * List a directory (1 argument version)
     598             :  *
     599             :  * note: this wrapper is necessary to pass the sanity check in opr_sanity,
     600             :  * which checks that all built-in functions that share the implementing C
     601             :  * function take the same number of arguments.
     602             :  */
     603             : Datum
     604          14 : pg_ls_dir_1arg(PG_FUNCTION_ARGS)
     605             : {
     606          14 :     return pg_ls_dir(fcinfo);
     607             : }
     608             : 
     609             : /*
     610             :  * Generic function to return a directory listing of files.
     611             :  *
     612             :  * If the directory isn't there, silently return an empty set if missing_ok.
     613             :  * Other unreadable-directory cases throw an error.
     614             :  */
     615             : static Datum
     616          36 : pg_ls_dir_files(FunctionCallInfo fcinfo, const char *dir, bool missing_ok)
     617             : {
     618          36 :     ReturnSetInfo *rsinfo = (ReturnSetInfo *) fcinfo->resultinfo;
     619             :     DIR        *dirdesc;
     620             :     struct dirent *de;
     621             : 
     622          36 :     InitMaterializedSRF(fcinfo, 0);
     623             : 
     624             :     /*
     625             :      * Now walk the directory.  Note that we must do this within a single SRF
     626             :      * call, not leave the directory open across multiple calls, since we
     627             :      * can't count on the SRF being run to completion.
     628             :      */
     629          36 :     dirdesc = AllocateDir(dir);
     630          36 :     if (!dirdesc)
     631             :     {
     632             :         /* Return empty tuplestore if appropriate */
     633           0 :         if (missing_ok && errno == ENOENT)
     634           0 :             return (Datum) 0;
     635             :         /* Otherwise, we can let ReadDir() throw the error */
     636             :     }
     637             : 
     638         916 :     while ((de = ReadDir(dirdesc, dir)) != NULL)
     639             :     {
     640             :         Datum       values[3];
     641             :         bool        nulls[3];
     642             :         char        path[MAXPGPATH * 2];
     643             :         struct stat attrib;
     644             : 
     645             :         /* Skip hidden files */
     646         880 :         if (de->d_name[0] == '.')
     647          96 :             continue;
     648             : 
     649             :         /* Get the file info */
     650         808 :         snprintf(path, sizeof(path), "%s/%s", dir, de->d_name);
     651         808 :         if (stat(path, &attrib) < 0)
     652             :         {
     653             :             /* Ignore concurrently-deleted files, else complain */
     654           0 :             if (errno == ENOENT)
     655           0 :                 continue;
     656           0 :             ereport(ERROR,
     657             :                     (errcode_for_file_access(),
     658             :                      errmsg("could not stat file \"%s\": %m", path)));
     659             :         }
     660             : 
     661             :         /* Ignore anything but regular files */
     662         808 :         if (!S_ISREG(attrib.st_mode))
     663          24 :             continue;
     664             : 
     665         784 :         values[0] = CStringGetTextDatum(de->d_name);
     666         784 :         values[1] = Int64GetDatum((int64) attrib.st_size);
     667         784 :         values[2] = TimestampTzGetDatum(time_t_to_timestamptz(attrib.st_mtime));
     668         784 :         memset(nulls, 0, sizeof(nulls));
     669             : 
     670         784 :         tuplestore_putvalues(rsinfo->setResult, rsinfo->setDesc, values, nulls);
     671             :     }
     672             : 
     673          36 :     FreeDir(dirdesc);
     674          36 :     return (Datum) 0;
     675             : }
     676             : 
     677             : /* Function to return the list of files in the log directory */
     678             : Datum
     679           0 : pg_ls_logdir(PG_FUNCTION_ARGS)
     680             : {
     681           0 :     return pg_ls_dir_files(fcinfo, Log_directory, false);
     682             : }
     683             : 
     684             : /* Function to return the list of files in the WAL directory */
     685             : Datum
     686          24 : pg_ls_waldir(PG_FUNCTION_ARGS)
     687             : {
     688          24 :     return pg_ls_dir_files(fcinfo, XLOGDIR, false);
     689             : }
     690             : 
     691             : /*
     692             :  * Generic function to return the list of files in pgsql_tmp
     693             :  */
     694             : static Datum
     695           0 : pg_ls_tmpdir(FunctionCallInfo fcinfo, Oid tblspc)
     696             : {
     697             :     char        path[MAXPGPATH];
     698             : 
     699           0 :     if (!SearchSysCacheExists1(TABLESPACEOID, ObjectIdGetDatum(tblspc)))
     700           0 :         ereport(ERROR,
     701             :                 (errcode(ERRCODE_UNDEFINED_OBJECT),
     702             :                  errmsg("tablespace with OID %u does not exist",
     703             :                         tblspc)));
     704             : 
     705           0 :     TempTablespacePath(path, tblspc);
     706           0 :     return pg_ls_dir_files(fcinfo, path, true);
     707             : }
     708             : 
     709             : /*
     710             :  * Function to return the list of temporary files in the pg_default tablespace's
     711             :  * pgsql_tmp directory
     712             :  */
     713             : Datum
     714           0 : pg_ls_tmpdir_noargs(PG_FUNCTION_ARGS)
     715             : {
     716           0 :     return pg_ls_tmpdir(fcinfo, DEFAULTTABLESPACE_OID);
     717             : }
     718             : 
     719             : /*
     720             :  * Function to return the list of temporary files in the specified tablespace's
     721             :  * pgsql_tmp directory
     722             :  */
     723             : Datum
     724           0 : pg_ls_tmpdir_1arg(PG_FUNCTION_ARGS)
     725             : {
     726           0 :     return pg_ls_tmpdir(fcinfo, PG_GETARG_OID(0));
     727             : }
     728             : 
     729             : /*
     730             :  * Function to return the list of files in the WAL archive status directory.
     731             :  */
     732             : Datum
     733           6 : pg_ls_archive_statusdir(PG_FUNCTION_ARGS)
     734             : {
     735           6 :     return pg_ls_dir_files(fcinfo, XLOGDIR "/archive_status", true);
     736             : }
     737             : 
     738             : /*
     739             :  * Function to return the list of files in the pg_logical/snapshots directory.
     740             :  */
     741             : Datum
     742           2 : pg_ls_logicalsnapdir(PG_FUNCTION_ARGS)
     743             : {
     744           2 :     return pg_ls_dir_files(fcinfo, "pg_logical/snapshots", false);
     745             : }
     746             : 
     747             : /*
     748             :  * Function to return the list of files in the pg_logical/mappings directory.
     749             :  */
     750             : Datum
     751           2 : pg_ls_logicalmapdir(PG_FUNCTION_ARGS)
     752             : {
     753           2 :     return pg_ls_dir_files(fcinfo, "pg_logical/mappings", false);
     754             : }
     755             : 
     756             : /*
     757             :  * Function to return the list of files in the pg_replslot/<replication_slot>
     758             :  * directory.
     759             :  */
     760             : Datum
     761           4 : pg_ls_replslotdir(PG_FUNCTION_ARGS)
     762             : {
     763             :     text       *slotname_t;
     764             :     char        path[MAXPGPATH];
     765             :     char       *slotname;
     766             : 
     767           4 :     slotname_t = PG_GETARG_TEXT_PP(0);
     768             : 
     769           4 :     slotname = text_to_cstring(slotname_t);
     770             : 
     771           4 :     if (!SearchNamedReplicationSlot(slotname, true))
     772           2 :         ereport(ERROR,
     773             :                 (errcode(ERRCODE_UNDEFINED_OBJECT),
     774             :                  errmsg("replication slot \"%s\" does not exist",
     775             :                         slotname)));
     776             : 
     777           2 :     snprintf(path, sizeof(path), "pg_replslot/%s", slotname);
     778           2 :     return pg_ls_dir_files(fcinfo, path, false);
     779             : }

Generated by: LCOV version 1.14