* Dropped unused codekit config * Integrated dynamic and static bindata for public * Ignore public bindata * Add a general generate make task * Integrated flexible public assets into web command * Updated vendoring, added all missiong govendor deps * Made the linter happy with the bindata and dynamic code * Moved public bindata definition to modules directory * Ignoring the new bindata path now * Updated to the new public modules import path * Updated public bindata command and drop the new prefix
		
			
				
	
	
		
			382 lines
		
	
	
		
			9.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			382 lines
		
	
	
		
			9.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2015 PingCAP, Inc.
 | |
| //
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| //     http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| package privileges
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/juju/errors"
 | |
| 	"github.com/pingcap/tidb/ast"
 | |
| 	"github.com/pingcap/tidb/context"
 | |
| 	"github.com/pingcap/tidb/model"
 | |
| 	"github.com/pingcap/tidb/mysql"
 | |
| 	"github.com/pingcap/tidb/privilege"
 | |
| 	"github.com/pingcap/tidb/sessionctx/variable"
 | |
| 	"github.com/pingcap/tidb/util/sqlexec"
 | |
| 	"github.com/pingcap/tidb/util/types"
 | |
| )
 | |
| 
 | |
| var _ privilege.Checker = (*UserPrivileges)(nil)
 | |
| 
 | |
| type privileges struct {
 | |
| 	Level ast.GrantLevelType
 | |
| 	privs map[mysql.PrivilegeType]bool
 | |
| }
 | |
| 
 | |
| func (ps *privileges) contain(p mysql.PrivilegeType) bool {
 | |
| 	if ps.privs == nil {
 | |
| 		return false
 | |
| 	}
 | |
| 	_, ok := ps.privs[p]
 | |
| 	return ok
 | |
| }
 | |
| 
 | |
| func (ps *privileges) add(p mysql.PrivilegeType) {
 | |
| 	if ps.privs == nil {
 | |
| 		ps.privs = make(map[mysql.PrivilegeType]bool)
 | |
| 	}
 | |
| 	ps.privs[p] = true
 | |
| }
 | |
| 
 | |
| func (ps *privileges) String() string {
 | |
| 	switch ps.Level {
 | |
| 	case ast.GrantLevelGlobal:
 | |
| 		return ps.globalPrivToString()
 | |
| 	case ast.GrantLevelDB:
 | |
| 		return ps.dbPrivToString()
 | |
| 	case ast.GrantLevelTable:
 | |
| 		return ps.tablePrivToString()
 | |
| 	}
 | |
| 	return ""
 | |
| }
 | |
| 
 | |
| func (ps *privileges) globalPrivToString() string {
 | |
| 	if len(ps.privs) == len(mysql.AllGlobalPrivs) {
 | |
| 		return mysql.AllPrivilegeLiteral
 | |
| 	}
 | |
| 	pstrs := make([]string, 0, len(ps.privs))
 | |
| 	// Iterate AllGlobalPrivs to get stable order result.
 | |
| 	for _, p := range mysql.AllGlobalPrivs {
 | |
| 		_, ok := ps.privs[p]
 | |
| 		if !ok {
 | |
| 			continue
 | |
| 		}
 | |
| 		s, _ := mysql.Priv2Str[p]
 | |
| 		pstrs = append(pstrs, s)
 | |
| 	}
 | |
| 	return strings.Join(pstrs, ",")
 | |
| }
 | |
| 
 | |
| func (ps *privileges) dbPrivToString() string {
 | |
| 	if len(ps.privs) == len(mysql.AllDBPrivs) {
 | |
| 		return mysql.AllPrivilegeLiteral
 | |
| 	}
 | |
| 	pstrs := make([]string, 0, len(ps.privs))
 | |
| 	// Iterate AllDBPrivs to get stable order result.
 | |
| 	for _, p := range mysql.AllDBPrivs {
 | |
| 		_, ok := ps.privs[p]
 | |
| 		if !ok {
 | |
| 			continue
 | |
| 		}
 | |
| 		s, _ := mysql.Priv2SetStr[p]
 | |
| 		pstrs = append(pstrs, s)
 | |
| 	}
 | |
| 	return strings.Join(pstrs, ",")
 | |
| }
 | |
| 
 | |
| func (ps *privileges) tablePrivToString() string {
 | |
| 	if len(ps.privs) == len(mysql.AllTablePrivs) {
 | |
| 		return mysql.AllPrivilegeLiteral
 | |
| 	}
 | |
| 	pstrs := make([]string, 0, len(ps.privs))
 | |
| 	// Iterate AllTablePrivs to get stable order result.
 | |
| 	for _, p := range mysql.AllTablePrivs {
 | |
| 		_, ok := ps.privs[p]
 | |
| 		if !ok {
 | |
| 			continue
 | |
| 		}
 | |
| 		s, _ := mysql.Priv2Str[p]
 | |
| 		pstrs = append(pstrs, s)
 | |
| 	}
 | |
| 	return strings.Join(pstrs, ",")
 | |
| }
 | |
| 
 | |
| type userPrivileges struct {
 | |
| 	User string
 | |
| 	Host string
 | |
| 	// Global privileges
 | |
| 	GlobalPrivs *privileges
 | |
| 	// DBName-privileges
 | |
| 	DBPrivs map[string]*privileges
 | |
| 	// DBName-TableName-privileges
 | |
| 	TablePrivs map[string]map[string]*privileges
 | |
| }
 | |
| 
 | |
| func (ps *userPrivileges) ShowGrants() []string {
 | |
| 	gs := []string{}
 | |
| 	// Show global grants
 | |
| 	g := ps.GlobalPrivs.String()
 | |
| 	if len(g) > 0 {
 | |
| 		s := fmt.Sprintf(`GRANT %s ON *.* TO '%s'@'%s'`, g, ps.User, ps.Host)
 | |
| 		gs = append(gs, s)
 | |
| 	}
 | |
| 	// Show db scope grants
 | |
| 	for d, p := range ps.DBPrivs {
 | |
| 		g := p.String()
 | |
| 		if len(g) > 0 {
 | |
| 			s := fmt.Sprintf(`GRANT %s ON %s.* TO '%s'@'%s'`, g, d, ps.User, ps.Host)
 | |
| 			gs = append(gs, s)
 | |
| 		}
 | |
| 	}
 | |
| 	// Show table scope grants
 | |
| 	for d, dps := range ps.TablePrivs {
 | |
| 		for t, p := range dps {
 | |
| 			g := p.String()
 | |
| 			if len(g) > 0 {
 | |
| 				s := fmt.Sprintf(`GRANT %s ON %s.%s TO '%s'@'%s'`, g, d, t, ps.User, ps.Host)
 | |
| 				gs = append(gs, s)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return gs
 | |
| }
 | |
| 
 | |
| // UserPrivileges implements privilege.Checker interface.
 | |
| // This is used to check privilege for the current user.
 | |
| type UserPrivileges struct {
 | |
| 	User  string
 | |
| 	privs *userPrivileges
 | |
| }
 | |
| 
 | |
| // Check implements Checker.Check interface.
 | |
| func (p *UserPrivileges) Check(ctx context.Context, db *model.DBInfo, tbl *model.TableInfo, privilege mysql.PrivilegeType) (bool, error) {
 | |
| 	if p.privs == nil {
 | |
| 		// Lazy load
 | |
| 		if len(p.User) == 0 {
 | |
| 			// User current user
 | |
| 			p.User = variable.GetSessionVars(ctx).User
 | |
| 			if len(p.User) == 0 {
 | |
| 				// In embedded db mode, user does not need to login. So we do not have username.
 | |
| 				// TODO: remove this check latter.
 | |
| 				return true, nil
 | |
| 			}
 | |
| 		}
 | |
| 		err := p.loadPrivileges(ctx)
 | |
| 		if err != nil {
 | |
| 			return false, errors.Trace(err)
 | |
| 		}
 | |
| 	}
 | |
| 	// Check global scope privileges.
 | |
| 	ok := p.privs.GlobalPrivs.contain(privilege)
 | |
| 	if ok {
 | |
| 		return true, nil
 | |
| 	}
 | |
| 	// Check db scope privileges.
 | |
| 	dbp, ok := p.privs.DBPrivs[db.Name.O]
 | |
| 	if ok {
 | |
| 		ok = dbp.contain(privilege)
 | |
| 		if ok {
 | |
| 			return true, nil
 | |
| 		}
 | |
| 	}
 | |
| 	if tbl == nil {
 | |
| 		return false, nil
 | |
| 	}
 | |
| 	// Check table scope privileges.
 | |
| 	dbTbl, ok := p.privs.TablePrivs[db.Name.O]
 | |
| 	if !ok {
 | |
| 		return false, nil
 | |
| 	}
 | |
| 	tblp, ok := dbTbl[tbl.Name.O]
 | |
| 	if !ok {
 | |
| 		return false, nil
 | |
| 	}
 | |
| 	return tblp.contain(privilege), nil
 | |
| }
 | |
| 
 | |
| func (p *UserPrivileges) loadPrivileges(ctx context.Context) error {
 | |
| 	strs := strings.Split(p.User, "@")
 | |
| 	if len(strs) != 2 {
 | |
| 		return errors.Errorf("Wrong username format: %s", p.User)
 | |
| 	}
 | |
| 	username, host := strs[0], strs[1]
 | |
| 	p.privs = &userPrivileges{
 | |
| 		User: username,
 | |
| 		Host: host,
 | |
| 	}
 | |
| 	// Load privileges from mysql.User/DB/Table_privs/Column_privs table
 | |
| 	err := p.loadGlobalPrivileges(ctx)
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	err = p.loadDBScopePrivileges(ctx)
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	err = p.loadTableScopePrivileges(ctx)
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	// TODO: consider column scope privilege latter.
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // mysql.User/mysql.DB table privilege columns start from index 3.
 | |
| // See: booststrap.go CreateUserTable/CreateDBPrivTable
 | |
| const userTablePrivColumnStartIndex = 3
 | |
| const dbTablePrivColumnStartIndex = 3
 | |
| 
 | |
| func (p *UserPrivileges) loadGlobalPrivileges(ctx context.Context) error {
 | |
| 	sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`,
 | |
| 		mysql.SystemDB, mysql.UserTable, p.privs.User, p.privs.Host)
 | |
| 	rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql)
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	defer rs.Close()
 | |
| 	ps := &privileges{Level: ast.GrantLevelGlobal}
 | |
| 	fs, err := rs.Fields()
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	for {
 | |
| 		row, err := rs.Next()
 | |
| 		if err != nil {
 | |
| 			return errors.Trace(err)
 | |
| 		}
 | |
| 		if row == nil {
 | |
| 			break
 | |
| 		}
 | |
| 		for i := userTablePrivColumnStartIndex; i < len(fs); i++ {
 | |
| 			d := row.Data[i]
 | |
| 			if d.Kind() != types.KindMysqlEnum {
 | |
| 				return errors.Errorf("Privilege should be mysql.Enum: %v(%T)", d, d)
 | |
| 			}
 | |
| 			ed := d.GetMysqlEnum()
 | |
| 			if ed.String() != "Y" {
 | |
| 				continue
 | |
| 			}
 | |
| 			f := fs[i]
 | |
| 			p, ok := mysql.Col2PrivType[f.ColumnAsName.O]
 | |
| 			if !ok {
 | |
| 				return errors.New("Unknown Privilege Type!")
 | |
| 			}
 | |
| 			ps.add(p)
 | |
| 		}
 | |
| 	}
 | |
| 	p.privs.GlobalPrivs = ps
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (p *UserPrivileges) loadDBScopePrivileges(ctx context.Context) error {
 | |
| 	sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`,
 | |
| 		mysql.SystemDB, mysql.DBTable, p.privs.User, p.privs.Host)
 | |
| 	rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql)
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	defer rs.Close()
 | |
| 	ps := make(map[string]*privileges)
 | |
| 	fs, err := rs.Fields()
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	for {
 | |
| 		row, err := rs.Next()
 | |
| 		if err != nil {
 | |
| 			return errors.Trace(err)
 | |
| 		}
 | |
| 		if row == nil {
 | |
| 			break
 | |
| 		}
 | |
| 		// DB
 | |
| 		dbStr := row.Data[1].GetString()
 | |
| 		ps[dbStr] = &privileges{Level: ast.GrantLevelDB}
 | |
| 		for i := dbTablePrivColumnStartIndex; i < len(fs); i++ {
 | |
| 			d := row.Data[i]
 | |
| 			if d.Kind() != types.KindMysqlEnum {
 | |
| 				return errors.Errorf("Privilege should be mysql.Enum: %v(%T)", d, d)
 | |
| 			}
 | |
| 			ed := d.GetMysqlEnum()
 | |
| 			if ed.String() != "Y" {
 | |
| 				continue
 | |
| 			}
 | |
| 			f := fs[i]
 | |
| 			p, ok := mysql.Col2PrivType[f.ColumnAsName.O]
 | |
| 			if !ok {
 | |
| 				return errors.New("Unknown Privilege Type!")
 | |
| 			}
 | |
| 			ps[dbStr].add(p)
 | |
| 		}
 | |
| 	}
 | |
| 	p.privs.DBPrivs = ps
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (p *UserPrivileges) loadTableScopePrivileges(ctx context.Context) error {
 | |
| 	sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`,
 | |
| 		mysql.SystemDB, mysql.TablePrivTable, p.privs.User, p.privs.Host)
 | |
| 	rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql)
 | |
| 	if err != nil {
 | |
| 		return errors.Trace(err)
 | |
| 	}
 | |
| 	defer rs.Close()
 | |
| 	ps := make(map[string]map[string]*privileges)
 | |
| 	for {
 | |
| 		row, err := rs.Next()
 | |
| 		if err != nil {
 | |
| 			return errors.Trace(err)
 | |
| 		}
 | |
| 		if row == nil {
 | |
| 			break
 | |
| 		}
 | |
| 		// DB
 | |
| 		dbStr := row.Data[1].GetString()
 | |
| 		// Table_name
 | |
| 		tblStr := row.Data[3].GetString()
 | |
| 		_, ok := ps[dbStr]
 | |
| 		if !ok {
 | |
| 			ps[dbStr] = make(map[string]*privileges)
 | |
| 		}
 | |
| 		ps[dbStr][tblStr] = &privileges{Level: ast.GrantLevelTable}
 | |
| 		// Table_priv
 | |
| 		tblPrivs := row.Data[6].GetMysqlSet()
 | |
| 		pvs := strings.Split(tblPrivs.Name, ",")
 | |
| 		for _, d := range pvs {
 | |
| 			p, ok := mysql.SetStr2Priv[d]
 | |
| 			if !ok {
 | |
| 				return errors.New("Unknown Privilege Type!")
 | |
| 			}
 | |
| 			ps[dbStr][tblStr].add(p)
 | |
| 		}
 | |
| 	}
 | |
| 	p.privs.TablePrivs = ps
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // ShowGrants implements privilege.Checker ShowGrants interface.
 | |
| func (p *UserPrivileges) ShowGrants(ctx context.Context, user string) ([]string, error) {
 | |
| 	// If user is current user
 | |
| 	if user == p.User {
 | |
| 		return p.privs.ShowGrants(), nil
 | |
| 	}
 | |
| 	userp := &UserPrivileges{User: user}
 | |
| 	err := userp.loadPrivileges(ctx)
 | |
| 	if err != nil {
 | |
| 		return nil, errors.Trace(err)
 | |
| 	}
 | |
| 	return userp.privs.ShowGrants(), nil
 | |
| }
 |