377 lines
9.2 KiB
C
377 lines
9.2 KiB
C
/*-------------------------------------------------------------------------
|
|
*
|
|
* genfile.c
|
|
* Functions for direct access to files
|
|
*
|
|
*
|
|
* Copyright (c) 2004-2015, PostgreSQL Global Development Group
|
|
*
|
|
* Author: Andreas Pflug <pgadmin@pse-consulting.de>
|
|
*
|
|
* IDENTIFICATION
|
|
* src/backend/utils/adt/genfile.c
|
|
*
|
|
*-------------------------------------------------------------------------
|
|
*/
|
|
#include "postgres.h"
|
|
|
|
#include <sys/file.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#include <dirent.h>
|
|
|
|
#include "access/htup_details.h"
|
|
#include "catalog/pg_type.h"
|
|
#include "funcapi.h"
|
|
#include "mb/pg_wchar.h"
|
|
#include "miscadmin.h"
|
|
#include "postmaster/syslogger.h"
|
|
#include "storage/fd.h"
|
|
#include "utils/builtins.h"
|
|
#include "utils/memutils.h"
|
|
#include "utils/timestamp.h"
|
|
|
|
typedef struct
|
|
{
|
|
char *location;
|
|
DIR *dirdesc;
|
|
} directory_fctx;
|
|
|
|
|
|
/*
|
|
* Convert a "text" filename argument to C string, and check it's allowable.
|
|
*
|
|
* Filename may be absolute or relative to the DataDir, but we only allow
|
|
* absolute paths that match DataDir or Log_directory.
|
|
*/
|
|
static char *
|
|
convert_and_check_filename(text *arg)
|
|
{
|
|
char *filename;
|
|
|
|
filename = text_to_cstring(arg);
|
|
canonicalize_path(filename); /* filename can change length here */
|
|
|
|
if (is_absolute_path(filename))
|
|
{
|
|
/* Disallow '/a/b/data/..' */
|
|
if (path_contains_parent_reference(filename))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("reference to parent directory (\"..\") not allowed"))));
|
|
|
|
/*
|
|
* Allow absolute paths if within DataDir or Log_directory, even
|
|
* though Log_directory might be outside DataDir.
|
|
*/
|
|
if (!path_is_prefix_of_path(DataDir, filename) &&
|
|
(!is_absolute_path(Log_directory) ||
|
|
!path_is_prefix_of_path(Log_directory, filename)))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("absolute path not allowed"))));
|
|
}
|
|
else if (!path_is_relative_and_below_cwd(filename))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("path must be in or below the current directory"))));
|
|
|
|
return filename;
|
|
}
|
|
|
|
|
|
/*
|
|
* Read a section of a file, returning it as bytea
|
|
*
|
|
* Caller is responsible for all permissions checking.
|
|
*
|
|
* We read the whole of the file when bytes_to_read is negative.
|
|
*/
|
|
bytea *
|
|
read_binary_file(const char *filename, int64 seek_offset, int64 bytes_to_read)
|
|
{
|
|
bytea *buf;
|
|
size_t nbytes;
|
|
FILE *file;
|
|
|
|
if (bytes_to_read < 0)
|
|
{
|
|
if (seek_offset < 0)
|
|
bytes_to_read = -seek_offset;
|
|
else
|
|
{
|
|
struct stat fst;
|
|
|
|
if (stat(filename, &fst) < 0)
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(),
|
|
errmsg("could not stat file \"%s\": %m", filename)));
|
|
|
|
bytes_to_read = fst.st_size - seek_offset;
|
|
}
|
|
}
|
|
|
|
/* not sure why anyone thought that int64 length was a good idea */
|
|
if (bytes_to_read > (MaxAllocSize - VARHDRSZ))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("requested length too large")));
|
|
|
|
if ((file = AllocateFile(filename, PG_BINARY_R)) == NULL)
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(),
|
|
errmsg("could not open file \"%s\" for reading: %m",
|
|
filename)));
|
|
|
|
if (fseeko(file, (off_t) seek_offset,
|
|
(seek_offset >= 0) ? SEEK_SET : SEEK_END) != 0)
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(),
|
|
errmsg("could not seek in file \"%s\": %m", filename)));
|
|
|
|
buf = (bytea *) palloc((Size) bytes_to_read + VARHDRSZ);
|
|
|
|
nbytes = fread(VARDATA(buf), 1, (size_t) bytes_to_read, file);
|
|
|
|
if (ferror(file))
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(),
|
|
errmsg("could not read file \"%s\": %m", filename)));
|
|
|
|
SET_VARSIZE(buf, nbytes + VARHDRSZ);
|
|
|
|
FreeFile(file);
|
|
|
|
return buf;
|
|
}
|
|
|
|
/*
|
|
* Similar to read_binary_file, but we verify that the contents are valid
|
|
* in the database encoding.
|
|
*/
|
|
static text *
|
|
read_text_file(const char *filename, int64 seek_offset, int64 bytes_to_read)
|
|
{
|
|
bytea *buf;
|
|
|
|
buf = read_binary_file(filename, seek_offset, bytes_to_read);
|
|
|
|
/* Make sure the input is valid */
|
|
pg_verifymbstr(VARDATA(buf), VARSIZE(buf) - VARHDRSZ, false);
|
|
|
|
/* OK, we can cast it to text safely */
|
|
return (text *) buf;
|
|
}
|
|
|
|
/*
|
|
* Read a section of a file, returning it as text
|
|
*/
|
|
Datum
|
|
pg_read_file(PG_FUNCTION_ARGS)
|
|
{
|
|
text *filename_t = PG_GETARG_TEXT_P(0);
|
|
int64 seek_offset = PG_GETARG_INT64(1);
|
|
int64 bytes_to_read = PG_GETARG_INT64(2);
|
|
char *filename;
|
|
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be superuser to read files"))));
|
|
|
|
filename = convert_and_check_filename(filename_t);
|
|
|
|
if (bytes_to_read < 0)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("requested length cannot be negative")));
|
|
|
|
PG_RETURN_TEXT_P(read_text_file(filename, seek_offset, bytes_to_read));
|
|
}
|
|
|
|
/*
|
|
* Read the whole of a file, returning it as text
|
|
*/
|
|
Datum
|
|
pg_read_file_all(PG_FUNCTION_ARGS)
|
|
{
|
|
text *filename_t = PG_GETARG_TEXT_P(0);
|
|
char *filename;
|
|
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be superuser to read files"))));
|
|
|
|
filename = convert_and_check_filename(filename_t);
|
|
|
|
PG_RETURN_TEXT_P(read_text_file(filename, 0, -1));
|
|
}
|
|
|
|
/*
|
|
* Read a section of a file, returning it as bytea
|
|
*/
|
|
Datum
|
|
pg_read_binary_file(PG_FUNCTION_ARGS)
|
|
{
|
|
text *filename_t = PG_GETARG_TEXT_P(0);
|
|
int64 seek_offset = PG_GETARG_INT64(1);
|
|
int64 bytes_to_read = PG_GETARG_INT64(2);
|
|
char *filename;
|
|
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be superuser to read files"))));
|
|
|
|
filename = convert_and_check_filename(filename_t);
|
|
|
|
if (bytes_to_read < 0)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("requested length cannot be negative")));
|
|
|
|
PG_RETURN_BYTEA_P(read_binary_file(filename, seek_offset, bytes_to_read));
|
|
}
|
|
|
|
/*
|
|
* Read the whole of a file, returning it as bytea
|
|
*/
|
|
Datum
|
|
pg_read_binary_file_all(PG_FUNCTION_ARGS)
|
|
{
|
|
text *filename_t = PG_GETARG_TEXT_P(0);
|
|
char *filename;
|
|
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be superuser to read files"))));
|
|
|
|
filename = convert_and_check_filename(filename_t);
|
|
|
|
PG_RETURN_BYTEA_P(read_binary_file(filename, 0, -1));
|
|
}
|
|
|
|
/*
|
|
* stat a file
|
|
*/
|
|
Datum
|
|
pg_stat_file(PG_FUNCTION_ARGS)
|
|
{
|
|
text *filename_t = PG_GETARG_TEXT_P(0);
|
|
char *filename;
|
|
struct stat fst;
|
|
Datum values[6];
|
|
bool isnull[6];
|
|
HeapTuple tuple;
|
|
TupleDesc tupdesc;
|
|
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be superuser to get file information"))));
|
|
|
|
filename = convert_and_check_filename(filename_t);
|
|
|
|
if (stat(filename, &fst) < 0)
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(),
|
|
errmsg("could not stat file \"%s\": %m", filename)));
|
|
|
|
/*
|
|
* This record type had better match the output parameters declared for me
|
|
* in pg_proc.h.
|
|
*/
|
|
tupdesc = CreateTemplateTupleDesc(6, false);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber) 1,
|
|
"size", INT8OID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber) 2,
|
|
"access", TIMESTAMPTZOID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber) 3,
|
|
"modification", TIMESTAMPTZOID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber) 4,
|
|
"change", TIMESTAMPTZOID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber) 5,
|
|
"creation", TIMESTAMPTZOID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber) 6,
|
|
"isdir", BOOLOID, -1, 0);
|
|
BlessTupleDesc(tupdesc);
|
|
|
|
memset(isnull, false, sizeof(isnull));
|
|
|
|
values[0] = Int64GetDatum((int64) fst.st_size);
|
|
values[1] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_atime));
|
|
values[2] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_mtime));
|
|
/* Unix has file status change time, while Win32 has creation time */
|
|
#if !defined(WIN32) && !defined(__CYGWIN__)
|
|
values[3] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_ctime));
|
|
isnull[4] = true;
|
|
#else
|
|
isnull[3] = true;
|
|
values[4] = TimestampTzGetDatum(time_t_to_timestamptz(fst.st_ctime));
|
|
#endif
|
|
values[5] = BoolGetDatum(S_ISDIR(fst.st_mode));
|
|
|
|
tuple = heap_form_tuple(tupdesc, values, isnull);
|
|
|
|
pfree(filename);
|
|
|
|
PG_RETURN_DATUM(HeapTupleGetDatum(tuple));
|
|
}
|
|
|
|
|
|
/*
|
|
* List a directory (returns the filenames only)
|
|
*/
|
|
Datum
|
|
pg_ls_dir(PG_FUNCTION_ARGS)
|
|
{
|
|
FuncCallContext *funcctx;
|
|
struct dirent *de;
|
|
directory_fctx *fctx;
|
|
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be superuser to get directory listings"))));
|
|
|
|
if (SRF_IS_FIRSTCALL())
|
|
{
|
|
MemoryContext oldcontext;
|
|
|
|
funcctx = SRF_FIRSTCALL_INIT();
|
|
oldcontext = MemoryContextSwitchTo(funcctx->multi_call_memory_ctx);
|
|
|
|
fctx = palloc(sizeof(directory_fctx));
|
|
fctx->location = convert_and_check_filename(PG_GETARG_TEXT_P(0));
|
|
|
|
fctx->dirdesc = AllocateDir(fctx->location);
|
|
|
|
if (!fctx->dirdesc)
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(),
|
|
errmsg("could not open directory \"%s\": %m",
|
|
fctx->location)));
|
|
|
|
funcctx->user_fctx = fctx;
|
|
MemoryContextSwitchTo(oldcontext);
|
|
}
|
|
|
|
funcctx = SRF_PERCALL_SETUP();
|
|
fctx = (directory_fctx *) funcctx->user_fctx;
|
|
|
|
while ((de = ReadDir(fctx->dirdesc, fctx->location)) != NULL)
|
|
{
|
|
if (strcmp(de->d_name, ".") == 0 ||
|
|
strcmp(de->d_name, "..") == 0)
|
|
continue;
|
|
|
|
SRF_RETURN_NEXT(funcctx, CStringGetTextDatum(de->d_name));
|
|
}
|
|
|
|
FreeDir(fctx->dirdesc);
|
|
|
|
SRF_RETURN_DONE(funcctx);
|
|
}
|