acl.c

来自「PostgreSQL7.4.6 for Linux」· C语言 代码 · 共 1,969 行 · 第 1/4 页

C
1,969
字号
	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_function_privilege_id_id *		Check user privileges on a function given *		usesysid, function oid, and text priv name. */Datumhas_function_privilege_id_id(PG_FUNCTION_ARGS){	int32		usesysid = PG_GETARG_INT32(0);	Oid			functionoid = PG_GETARG_OID(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	AclMode		mode;	AclResult	aclresult;	mode = convert_function_priv_string(priv_type_text);	aclresult = pg_proc_aclcheck(functionoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* *		Support routines for has_function_privilege family. *//* * Given a function name expressed as a string, look it up and return Oid */static Oidconvert_function_name(text *functionname){	char	   *funcname;	Oid			oid;	funcname = DatumGetCString(DirectFunctionCall1(textout,										 PointerGetDatum(functionname)));	oid = DatumGetObjectId(DirectFunctionCall1(regprocedurein,											 CStringGetDatum(funcname)));	if (!OidIsValid(oid))		ereport(ERROR,				(errcode(ERRCODE_UNDEFINED_FUNCTION),				 errmsg("function \"%s\" does not exist", funcname)));	return oid;}/* * convert_function_priv_string *		Convert text string to AclMode value. */static AclModeconvert_function_priv_string(text *priv_type_text){	char	   *priv_type;	priv_type = DatumGetCString(DirectFunctionCall1(textout,									   PointerGetDatum(priv_type_text)));	/*	 * Return mode from priv_type string	 */	if (strcasecmp(priv_type, "EXECUTE") == 0)		return ACL_EXECUTE;	if (strcasecmp(priv_type, "EXECUTE WITH GRANT OPTION") == 0)		return ACL_GRANT_OPTION_FOR(ACL_EXECUTE);	ereport(ERROR,			(errcode(ERRCODE_INVALID_PARAMETER_VALUE),			 errmsg("unrecognized privilege type: \"%s\"", priv_type)));	return ACL_NO_RIGHTS;		/* keep compiler quiet */}/* * has_language_privilege variants *		These are all named "has_language_privilege" at the SQL level. *		They take various combinations of language name, language OID, *		user name, user sysid, or implicit user = current_user. * *		The result is a boolean value: true if user has the indicated *		privilege, false if not. *//* * has_language_privilege_name_name *		Check user privileges on a language given *		name username, text languagename, and text priv name. */Datumhas_language_privilege_name_name(PG_FUNCTION_ARGS){	Name		username = PG_GETARG_NAME(0);	text	   *languagename = PG_GETARG_TEXT_P(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	int32		usesysid;	Oid			languageoid;	AclMode		mode;	AclResult	aclresult;	usesysid = get_usesysid(NameStr(*username));	languageoid = convert_language_name(languagename);	mode = convert_language_priv_string(priv_type_text);	aclresult = pg_language_aclcheck(languageoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_language_privilege_name *		Check user privileges on a language given *		text languagename and text priv name. *		current_user is assumed */Datumhas_language_privilege_name(PG_FUNCTION_ARGS){	text	   *languagename = PG_GETARG_TEXT_P(0);	text	   *priv_type_text = PG_GETARG_TEXT_P(1);	AclId		usesysid;	Oid			languageoid;	AclMode		mode;	AclResult	aclresult;	usesysid = GetUserId();	languageoid = convert_language_name(languagename);	mode = convert_language_priv_string(priv_type_text);	aclresult = pg_language_aclcheck(languageoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_language_privilege_name_id *		Check user privileges on a language given *		name usename, language oid, and text priv name. */Datumhas_language_privilege_name_id(PG_FUNCTION_ARGS){	Name		username = PG_GETARG_NAME(0);	Oid			languageoid = PG_GETARG_OID(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	int32		usesysid;	AclMode		mode;	AclResult	aclresult;	usesysid = get_usesysid(NameStr(*username));	mode = convert_language_priv_string(priv_type_text);	aclresult = pg_language_aclcheck(languageoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_language_privilege_id *		Check user privileges on a language given *		language oid, and text priv name. *		current_user is assumed */Datumhas_language_privilege_id(PG_FUNCTION_ARGS){	Oid			languageoid = PG_GETARG_OID(0);	text	   *priv_type_text = PG_GETARG_TEXT_P(1);	AclId		usesysid;	AclMode		mode;	AclResult	aclresult;	usesysid = GetUserId();	mode = convert_language_priv_string(priv_type_text);	aclresult = pg_language_aclcheck(languageoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_language_privilege_id_name *		Check user privileges on a language given *		usesysid, text languagename, and text priv name. */Datumhas_language_privilege_id_name(PG_FUNCTION_ARGS){	int32		usesysid = PG_GETARG_INT32(0);	text	   *languagename = PG_GETARG_TEXT_P(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	Oid			languageoid;	AclMode		mode;	AclResult	aclresult;	languageoid = convert_language_name(languagename);	mode = convert_language_priv_string(priv_type_text);	aclresult = pg_language_aclcheck(languageoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_language_privilege_id_id *		Check user privileges on a language given *		usesysid, language oid, and text priv name. */Datumhas_language_privilege_id_id(PG_FUNCTION_ARGS){	int32		usesysid = PG_GETARG_INT32(0);	Oid			languageoid = PG_GETARG_OID(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	AclMode		mode;	AclResult	aclresult;	mode = convert_language_priv_string(priv_type_text);	aclresult = pg_language_aclcheck(languageoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* *		Support routines for has_language_privilege family. *//* * Given a language name expressed as a string, look it up and return Oid */static Oidconvert_language_name(text *languagename){	char	   *langname;	Oid			oid;	langname = DatumGetCString(DirectFunctionCall1(textout,										 PointerGetDatum(languagename)));	oid = GetSysCacheOid(LANGNAME,						 CStringGetDatum(langname),						 0, 0, 0);	if (!OidIsValid(oid))		ereport(ERROR,				(errcode(ERRCODE_UNDEFINED_OBJECT),				 errmsg("language \"%s\" does not exist", langname)));	return oid;}/* * convert_language_priv_string *		Convert text string to AclMode value. */static AclModeconvert_language_priv_string(text *priv_type_text){	char	   *priv_type;	priv_type = DatumGetCString(DirectFunctionCall1(textout,									   PointerGetDatum(priv_type_text)));	/*	 * Return mode from priv_type string	 */	if (strcasecmp(priv_type, "USAGE") == 0)		return ACL_USAGE;	if (strcasecmp(priv_type, "USAGE WITH GRANT OPTION") == 0)		return ACL_GRANT_OPTION_FOR(ACL_USAGE);	ereport(ERROR,			(errcode(ERRCODE_INVALID_PARAMETER_VALUE),			 errmsg("unrecognized privilege type: \"%s\"", priv_type)));	return ACL_NO_RIGHTS;		/* keep compiler quiet */}/* * has_schema_privilege variants *		These are all named "has_schema_privilege" at the SQL level. *		They take various combinations of schema name, schema OID, *		user name, user sysid, or implicit user = current_user. * *		The result is a boolean value: true if user has the indicated *		privilege, false if not. *//* * has_schema_privilege_name_name *		Check user privileges on a schema given *		name username, text schemaname, and text priv name. */Datumhas_schema_privilege_name_name(PG_FUNCTION_ARGS){	Name		username = PG_GETARG_NAME(0);	text	   *schemaname = PG_GETARG_TEXT_P(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	int32		usesysid;	Oid			schemaoid;	AclMode		mode;	AclResult	aclresult;	usesysid = get_usesysid(NameStr(*username));	schemaoid = convert_schema_name(schemaname);	mode = convert_schema_priv_string(priv_type_text);	aclresult = pg_namespace_aclcheck(schemaoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_schema_privilege_name *		Check user privileges on a schema given *		text schemaname and text priv name. *		current_user is assumed */Datumhas_schema_privilege_name(PG_FUNCTION_ARGS){	text	   *schemaname = PG_GETARG_TEXT_P(0);	text	   *priv_type_text = PG_GETARG_TEXT_P(1);	AclId		usesysid;	Oid			schemaoid;	AclMode		mode;	AclResult	aclresult;	usesysid = GetUserId();	schemaoid = convert_schema_name(schemaname);	mode = convert_schema_priv_string(priv_type_text);	aclresult = pg_namespace_aclcheck(schemaoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_schema_privilege_name_id *		Check user privileges on a schema given *		name usename, schema oid, and text priv name. */Datumhas_schema_privilege_name_id(PG_FUNCTION_ARGS){	Name		username = PG_GETARG_NAME(0);	Oid			schemaoid = PG_GETARG_OID(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	int32		usesysid;	AclMode		mode;	AclResult	aclresult;	usesysid = get_usesysid(NameStr(*username));	mode = convert_schema_priv_string(priv_type_text);	aclresult = pg_namespace_aclcheck(schemaoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_schema_privilege_id *		Check user privileges on a schema given *		schema oid, and text priv name. *		current_user is assumed */Datumhas_schema_privilege_id(PG_FUNCTION_ARGS){	Oid			schemaoid = PG_GETARG_OID(0);	text	   *priv_type_text = PG_GETARG_TEXT_P(1);	AclId		usesysid;	AclMode		mode;	AclResult	aclresult;	usesysid = GetUserId();	mode = convert_schema_priv_string(priv_type_text);	aclresult = pg_namespace_aclcheck(schemaoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_schema_privilege_id_name *		Check user privileges on a schema given *		usesysid, text schemaname, and text priv name. */Datumhas_schema_privilege_id_name(PG_FUNCTION_ARGS){	int32		usesysid = PG_GETARG_INT32(0);	text	   *schemaname = PG_GETARG_TEXT_P(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	Oid			schemaoid;	AclMode		mode;	AclResult	aclresult;	schemaoid = convert_schema_name(schemaname);	mode = convert_schema_priv_string(priv_type_text);	aclresult = pg_namespace_aclcheck(schemaoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* * has_schema_privilege_id_id *		Check user privileges on a schema given *		usesysid, schema oid, and text priv name. */Datumhas_schema_privilege_id_id(PG_FUNCTION_ARGS){	int32		usesysid = PG_GETARG_INT32(0);	Oid			schemaoid = PG_GETARG_OID(1);	text	   *priv_type_text = PG_GETARG_TEXT_P(2);	AclMode		mode;	AclResult	aclresult;	mode = convert_schema_priv_string(priv_type_text);	aclresult = pg_namespace_aclcheck(schemaoid, usesysid, mode);	PG_RETURN_BOOL(aclresult == ACLCHECK_OK);}/* *		Support routines for has_schema_privilege family. *//* * Given a schema name expressed as a string, look it up and return Oid */static Oidconvert_schema_name(text *schemaname){	char	   *nspname;	Oid			oid;	nspname = DatumGetCString(DirectFunctionCall1(textout,										   PointerGetDatum(schemaname)));	oid = GetSysCacheOid(NAMESPACENAME,						 CStringGetDatum(nspname),						 0, 0, 0);	if (!OidIsValid(oid))		ereport(ERROR,				(errcode(ERRCODE_UNDEFINED_SCHEMA),				 errmsg("schema \"%s\" does not exist", nspname)));	return oid;}/* * convert_schema_priv_string *		Convert text string to AclMode value. */static AclModeconvert_schema_priv_string(text *priv_type_text){	char	   *priv_type;	priv_type = DatumGetCString(DirectFunctionCall1(textout,									   PointerGetDatum(priv_type_text)));	/*	 * Return mode from priv_type string	 */	if (strcasecmp(priv_type, "CREATE") == 0)		return ACL_CREATE;	if (strcasecmp(priv_type, "CREATE WITH GRANT OPTION") == 0)		return ACL_GRANT_OPTION_FOR(ACL_CREATE);	if (strcasecmp(priv_type, "USAGE") == 0)		return ACL_USAGE;	if (strcasecmp(priv_type, "USAGE WITH GRANT OPTION") == 0)		return ACL_GRANT_OPTION_FOR(ACL_USAGE);	ereport(ERROR,			(errcode(ERRCODE_INVALID_PARAMETER_VALUE),			 errmsg("unrecognized privilege type: \"%s\"", priv_type)));	return ACL_NO_RIGHTS;		/* keep compiler quiet */}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?