
The basic rule we follow here is to always first include 'postgres.h' or 'postgres_fe.h' whichever is applicable, then system header includes and then Postgres header includes. In this, we also follow that all the Postgres header includes are in order based on their ASCII value. We generally follow these rules, but the code has deviated in many places. This commit makes it consistent just for contrib modules. The later commits will enforce similar rules in other parts of code. Author: Vignesh C Reviewed-by: Amit Kapila Discussion: https://postgr.es/m/CALDaNm2Sznv8RR6Ex-iJO6xAdsxgWhCoETkaYX=+9DW3q0QCfA@mail.gmail.com
218 lines
5.2 KiB
C
218 lines
5.2 KiB
C
/* -------------------------------------------------------------------------
|
|
*
|
|
* contrib/sepgsql/database.c
|
|
*
|
|
* Routines corresponding to database objects
|
|
*
|
|
* Copyright (c) 2010-2019, PostgreSQL Global Development Group
|
|
*
|
|
* -------------------------------------------------------------------------
|
|
*/
|
|
#include "postgres.h"
|
|
|
|
#include "access/genam.h"
|
|
#include "access/htup_details.h"
|
|
#include "access/sysattr.h"
|
|
#include "access/table.h"
|
|
#include "catalog/dependency.h"
|
|
#include "catalog/indexing.h"
|
|
#include "catalog/pg_database.h"
|
|
#include "commands/dbcommands.h"
|
|
#include "commands/seclabel.h"
|
|
#include "sepgsql.h"
|
|
#include "utils/builtins.h"
|
|
#include "utils/fmgroids.h"
|
|
#include "utils/snapmgr.h"
|
|
|
|
/*
|
|
* sepgsql_database_post_create
|
|
*
|
|
* This routine assigns a default security label on a newly defined
|
|
* database, and check permission needed for its creation.
|
|
*/
|
|
void
|
|
sepgsql_database_post_create(Oid databaseId, const char *dtemplate)
|
|
{
|
|
Relation rel;
|
|
ScanKeyData skey;
|
|
SysScanDesc sscan;
|
|
HeapTuple tuple;
|
|
char *tcontext;
|
|
char *ncontext;
|
|
ObjectAddress object;
|
|
Form_pg_database datForm;
|
|
StringInfoData audit_name;
|
|
|
|
/*
|
|
* Oid of the source database is not saved in pg_database catalog, so we
|
|
* collect its identifier using contextual information. If NULL, its
|
|
* default is "template1" according to createdb().
|
|
*/
|
|
if (!dtemplate)
|
|
dtemplate = "template1";
|
|
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = get_database_oid(dtemplate, false);
|
|
object.objectSubId = 0;
|
|
|
|
tcontext = sepgsql_get_label(object.classId,
|
|
object.objectId,
|
|
object.objectSubId);
|
|
|
|
/*
|
|
* check db_database:{getattr} permission
|
|
*/
|
|
initStringInfo(&audit_name);
|
|
appendStringInfoString(&audit_name, quote_identifier(dtemplate));
|
|
sepgsql_avc_check_perms_label(tcontext,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__GETATTR,
|
|
audit_name.data,
|
|
true);
|
|
|
|
/*
|
|
* Compute a default security label of the newly created database based on
|
|
* a pair of security label of client and source database.
|
|
*
|
|
* XXX - uncoming version of libselinux supports to take object name to
|
|
* handle special treatment on default security label.
|
|
*/
|
|
rel = table_open(DatabaseRelationId, AccessShareLock);
|
|
|
|
ScanKeyInit(&skey,
|
|
Anum_pg_database_oid,
|
|
BTEqualStrategyNumber, F_OIDEQ,
|
|
ObjectIdGetDatum(databaseId));
|
|
|
|
sscan = systable_beginscan(rel, DatabaseOidIndexId, true,
|
|
SnapshotSelf, 1, &skey);
|
|
tuple = systable_getnext(sscan);
|
|
if (!HeapTupleIsValid(tuple))
|
|
elog(ERROR, "could not find tuple for database %u", databaseId);
|
|
|
|
datForm = (Form_pg_database) GETSTRUCT(tuple);
|
|
|
|
ncontext = sepgsql_compute_create(sepgsql_get_client_label(),
|
|
tcontext,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
NameStr(datForm->datname));
|
|
|
|
/*
|
|
* check db_database:{create} permission
|
|
*/
|
|
resetStringInfo(&audit_name);
|
|
appendStringInfoString(&audit_name,
|
|
quote_identifier(NameStr(datForm->datname)));
|
|
sepgsql_avc_check_perms_label(ncontext,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__CREATE,
|
|
audit_name.data,
|
|
true);
|
|
|
|
systable_endscan(sscan);
|
|
table_close(rel, AccessShareLock);
|
|
|
|
/*
|
|
* Assign the default security label on the new database
|
|
*/
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
|
|
SetSecurityLabel(&object, SEPGSQL_LABEL_TAG, ncontext);
|
|
|
|
pfree(ncontext);
|
|
pfree(tcontext);
|
|
}
|
|
|
|
/*
|
|
* sepgsql_database_drop
|
|
*
|
|
* It checks privileges to drop the supplied database
|
|
*/
|
|
void
|
|
sepgsql_database_drop(Oid databaseId)
|
|
{
|
|
ObjectAddress object;
|
|
char *audit_name;
|
|
|
|
/*
|
|
* check db_database:{drop} permission
|
|
*/
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
audit_name = getObjectIdentity(&object);
|
|
|
|
sepgsql_avc_check_perms(&object,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__DROP,
|
|
audit_name,
|
|
true);
|
|
pfree(audit_name);
|
|
}
|
|
|
|
/*
|
|
* sepgsql_database_post_alter
|
|
*
|
|
* It checks privileges to alter the supplied database
|
|
*/
|
|
void
|
|
sepgsql_database_setattr(Oid databaseId)
|
|
{
|
|
ObjectAddress object;
|
|
char *audit_name;
|
|
|
|
/*
|
|
* check db_database:{setattr} permission
|
|
*/
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
audit_name = getObjectIdentity(&object);
|
|
|
|
sepgsql_avc_check_perms(&object,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__SETATTR,
|
|
audit_name,
|
|
true);
|
|
pfree(audit_name);
|
|
}
|
|
|
|
/*
|
|
* sepgsql_database_relabel
|
|
*
|
|
* It checks privileges to relabel the supplied database with the `seclabel'
|
|
*/
|
|
void
|
|
sepgsql_database_relabel(Oid databaseId, const char *seclabel)
|
|
{
|
|
ObjectAddress object;
|
|
char *audit_name;
|
|
|
|
object.classId = DatabaseRelationId;
|
|
object.objectId = databaseId;
|
|
object.objectSubId = 0;
|
|
audit_name = getObjectIdentity(&object);
|
|
|
|
/*
|
|
* check db_database:{setattr relabelfrom} permission
|
|
*/
|
|
sepgsql_avc_check_perms(&object,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__SETATTR |
|
|
SEPG_DB_DATABASE__RELABELFROM,
|
|
audit_name,
|
|
true);
|
|
|
|
/*
|
|
* check db_database:{relabelto} permission
|
|
*/
|
|
sepgsql_avc_check_perms_label(seclabel,
|
|
SEPG_CLASS_DB_DATABASE,
|
|
SEPG_DB_DATABASE__RELABELTO,
|
|
audit_name,
|
|
true);
|
|
pfree(audit_name);
|
|
}
|