mirror of
https://github.com/postgres/postgres.git
synced 2025-05-09 18:21:05 +03:00
The following renaming is done so as source files related to index access methods are more consistent with table access methods (the original names used for index AMs ware too generic, and could be confused as including features related to table AMs): - amapi.h -> indexam.h. - amapi.c -> indexamapi.c. Here we have an equivalent with backend/access/table/tableamapi.c. - amvalidate.c -> indexamvalidate.c. - amvalidate.h -> indexamvalidate.h. - genam.c -> indexgenam.c. - genam.h -> indexgenam.h. This has been discussed during the development of v12 when table AM was worked on, but the renaming never happened. Author: Michael Paquier Reviewed-by: Fabien Coelho, Julien Rouhaud Discussion: https://postgr.es/m/20191223053434.GF34339@paquier.xyz
218 lines
5.2 KiB
C
218 lines
5.2 KiB
C
/* -------------------------------------------------------------------------
|
|
*
|
|
* contrib/sepgsql/database.c
|
|
*
|
|
* Routines corresponding to database objects
|
|
*
|
|
* Copyright (c) 2010-2019, PostgreSQL Global Development Group
|
|
*
|
|
* -------------------------------------------------------------------------
|
|
*/
|
|
#include "postgres.h"
|
|
|
|
#include "access/htup_details.h"
|
|
#include "access/indexgenam.h"
|
|
#include "access/sysattr.h"
|
|
#include "access/table.h"
|
|
#include "catalog/dependency.h"
|
|
#include "catalog/indexing.h"
|
|
#include "catalog/pg_database.h"
|
|
#include "commands/dbcommands.h"
|
|
#include "commands/seclabel.h"
|
|
#include "sepgsql.h"
|
|
#include "utils/builtins.h"
|
|
#include "utils/fmgroids.h"
|
|
#include "utils/snapmgr.h"
|
|
|
|
/*
|
|
* sepgsql_database_post_create
|
|
*
|
|
* This routine assigns a default security label on a newly defined
|
|
* database, and check permission needed for its creation.
|
|
*/
|
|
void
|
|
sepgsql_database_post_create(Oid databaseId, const char *dtemplate)
|
|
{
|
|
Relation rel;
|
|
ScanKeyData skey;
|
|
SysScanDesc sscan;
|
|
HeapTuple tuple;
|
|
char *tcontext;
|
|
char *ncontext;
|
|
ObjectAddress object;
|
|
Form_pg_database datForm;
|
|
StringInfoData audit_name;
|
|
|
|
/*
|
|
* Oid of the source database is not saved in pg_database catalog, so we
|
|
* collect its identifier using contextual information. If NULL, its
|
|
* default is "template1" according to createdb().
|
|
*/
|
|
if (!dtemplate)
|
|
dtemplate = "template1";
|
|
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = get_database_oid(dtemplate, false);
|
|
object.objectSubId = 0;
|
|
|
|
tcontext = sepgsql_get_label(object.classId,
|
|
object.objectId,
|
|
object.objectSubId);
|
|
|
|
/*
|
|
* check db_database:{getattr} permission
|
|
*/
|
|
initStringInfo(&audit_name);
|
|
appendStringInfoString(&audit_name, quote_identifier(dtemplate));
|
|
sepgsql_avc_check_perms_label(tcontext,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__GETATTR,
|
|
audit_name.data,
|
|
true);
|
|
|
|
/*
|
|
* Compute a default security label of the newly created database based on
|
|
* a pair of security label of client and source database.
|
|
*
|
|
* XXX - upcoming version of libselinux supports to take object name to
|
|
* handle special treatment on default security label.
|
|
*/
|
|
rel = table_open(DatabaseRelationId, AccessShareLock);
|
|
|
|
ScanKeyInit(&skey,
|
|
Anum_pg_database_oid,
|
|
BTEqualStrategyNumber, F_OIDEQ,
|
|
ObjectIdGetDatum(databaseId));
|
|
|
|
sscan = systable_beginscan(rel, DatabaseOidIndexId, true,
|
|
SnapshotSelf, 1, &skey);
|
|
tuple = systable_getnext(sscan);
|
|
if (!HeapTupleIsValid(tuple))
|
|
elog(ERROR, "could not find tuple for database %u", databaseId);
|
|
|
|
datForm = (Form_pg_database) GETSTRUCT(tuple);
|
|
|
|
ncontext = sepgsql_compute_create(sepgsql_get_client_label(),
|
|
tcontext,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
NameStr(datForm->datname));
|
|
|
|
/*
|
|
* check db_database:{create} permission
|
|
*/
|
|
resetStringInfo(&audit_name);
|
|
appendStringInfoString(&audit_name,
|
|
quote_identifier(NameStr(datForm->datname)));
|
|
sepgsql_avc_check_perms_label(ncontext,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__CREATE,
|
|
audit_name.data,
|
|
true);
|
|
|
|
systable_endscan(sscan);
|
|
table_close(rel, AccessShareLock);
|
|
|
|
/*
|
|
* Assign the default security label on the new database
|
|
*/
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
|
|
SetSecurityLabel(&object, SEPGSQL_LABEL_TAG, ncontext);
|
|
|
|
pfree(ncontext);
|
|
pfree(tcontext);
|
|
}
|
|
|
|
/*
|
|
* sepgsql_database_drop
|
|
*
|
|
* It checks privileges to drop the supplied database
|
|
*/
|
|
void
|
|
sepgsql_database_drop(Oid databaseId)
|
|
{
|
|
ObjectAddress object;
|
|
char *audit_name;
|
|
|
|
/*
|
|
* check db_database:{drop} permission
|
|
*/
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
audit_name = getObjectIdentity(&object);
|
|
|
|
sepgsql_avc_check_perms(&object,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__DROP,
|
|
audit_name,
|
|
true);
|
|
pfree(audit_name);
|
|
}
|
|
|
|
/*
|
|
* sepgsql_database_post_alter
|
|
*
|
|
* It checks privileges to alter the supplied database
|
|
*/
|
|
void
|
|
sepgsql_database_setattr(Oid databaseId)
|
|
{
|
|
ObjectAddress object;
|
|
char *audit_name;
|
|
|
|
/*
|
|
* check db_database:{setattr} permission
|
|
*/
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
audit_name = getObjectIdentity(&object);
|
|
|
|
sepgsql_avc_check_perms(&object,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__SETATTR,
|
|
audit_name,
|
|
true);
|
|
pfree(audit_name);
|
|
}
|
|
|
|
/*
|
|
* sepgsql_database_relabel
|
|
*
|
|
* It checks privileges to relabel the supplied database with the `seclabel'
|
|
*/
|
|
void
|
|
sepgsql_database_relabel(Oid databaseId, const char *seclabel)
|
|
{
|
|
ObjectAddress object;
|
|
char *audit_name;
|
|
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
audit_name = getObjectIdentity(&object);
|
|
|
|
/*
|
|
* check db_database:{setattr relabelfrom} permission
|
|
*/
|
|
sepgsql_avc_check_perms(&object,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__SETATTR |
|
|
SEPG_DB_DATABASE__RELABELFROM,
|
|
audit_name,
|
|
true);
|
|
|
|
/*
|
|
* check db_database:{relabelto} permission
|
|
*/
|
|
sepgsql_avc_check_perms_label(seclabel,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__RELABELTO,
|
|
audit_name,
|
|
true);
|
|
pfree(audit_name);
|
|
}
|