postgresql/contrib/adminpack/adminpack.c

576 lines
14 KiB
C
Raw Normal View History

2006-05-30 23:34:15 +02:00
/*-------------------------------------------------------------------------
*
2006-10-19 19:48:04 +02:00
* adminpack.c
2006-05-30 23:34:15 +02:00
*
*
* Copyright (c) 2002-2018, PostgreSQL Global Development Group
2006-10-04 02:30:14 +02:00
*
2006-05-30 23:34:15 +02:00
* Author: Andreas Pflug <pgadmin@pse-consulting.de>
*
* IDENTIFICATION
2010-09-20 22:08:53 +02:00
* contrib/adminpack/adminpack.c
2006-05-30 23:34:15 +02:00
*
*-------------------------------------------------------------------------
*/
#include "postgres.h"
#include <sys/file.h>
#include <sys/stat.h>
#include <unistd.h>
#include "catalog/pg_authid.h"
2006-05-30 23:34:15 +02:00
#include "catalog/pg_type.h"
#include "funcapi.h"
#include "miscadmin.h"
#include "postmaster/syslogger.h"
#include "storage/fd.h"
#include "utils/builtins.h"
2006-05-30 23:34:15 +02:00
#include "utils/datetime.h"
#ifdef WIN32
#ifdef rename
#undef rename
#endif
#ifdef unlink
#undef unlink
#endif
#endif
PG_MODULE_MAGIC;
PG_FUNCTION_INFO_V1(pg_file_write);
PG_FUNCTION_INFO_V1(pg_file_write_v1_1);
2006-05-30 23:34:15 +02:00
PG_FUNCTION_INFO_V1(pg_file_rename);
PG_FUNCTION_INFO_V1(pg_file_rename_v1_1);
2006-05-30 23:34:15 +02:00
PG_FUNCTION_INFO_V1(pg_file_unlink);
PG_FUNCTION_INFO_V1(pg_file_unlink_v1_1);
2006-05-30 23:34:15 +02:00
PG_FUNCTION_INFO_V1(pg_logdir_ls);
PG_FUNCTION_INFO_V1(pg_logdir_ls_v1_1);
static int64 pg_file_write_internal(text *file, text *data, bool replace);
static bool pg_file_rename_internal(text *file1, text *file2, text *file3);
static Datum pg_logdir_ls_internal(FunctionCallInfo fcinfo);
2006-05-30 23:34:15 +02:00
2006-10-04 02:30:14 +02:00
typedef struct
2006-05-30 23:34:15 +02:00
{
2006-10-04 02:30:14 +02:00
char *location;
DIR *dirdesc;
2006-05-30 23:34:15 +02:00
} directory_fctx;
/*-----------------------
* some helper functions
*/
/*
* Convert a "text" filename argument to C string, and check it's allowable.
*
* Filename may be absolute or relative to the DataDir, but we only allow
* absolute paths that match DataDir or Log_directory.
2006-05-30 23:34:15 +02:00
*/
2006-10-04 02:30:14 +02:00
static char *
convert_and_check_filename(text *arg, bool logAllowed)
2006-05-30 23:34:15 +02:00
{
char *filename = text_to_cstring(arg);
2006-05-30 23:34:15 +02:00
canonicalize_path(filename); /* filename can change length here */
2006-05-30 23:34:15 +02:00
/*
* Members of the 'pg_write_server_files' role are allowed to access any
* files on the server as the PG user, so no need to do any further checks
* here.
*/
if (is_member_of_role(GetUserId(), DEFAULT_ROLE_WRITE_SERVER_FILES))
return filename;
/* User isn't a member of the default role, so check if it's allowable */
2006-05-30 23:34:15 +02:00
if (is_absolute_path(filename))
{
/* Disallow '/a/b/data/..' */
if (path_contains_parent_reference(filename))
ereport(ERROR,
2011-04-10 17:42:00 +02:00
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("reference to parent directory (\"..\") not allowed"))));
2011-04-10 17:42:00 +02:00
/*
2011-04-10 17:42:00 +02:00
* Allow absolute paths if within DataDir or Log_directory, even
* though Log_directory might be outside DataDir.
*/
if (!path_is_prefix_of_path(DataDir, filename) &&
(!logAllowed || !is_absolute_path(Log_directory) ||
!path_is_prefix_of_path(Log_directory, filename)))
ereport(ERROR,
2011-04-10 17:42:00 +02:00
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("absolute path not allowed"))));
2006-05-30 23:34:15 +02:00
}
else if (!path_is_relative_and_below_cwd(filename))
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("path must be in or below the current directory"))));
return filename;
2006-05-30 23:34:15 +02:00
}
/*
* check for superuser, bark if not.
*/
static void
requireSuperuser(void)
{
if (!superuser())
2006-10-04 02:30:14 +02:00
ereport(ERROR,
2006-05-30 23:34:15 +02:00
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("only superuser may access generic file functions"))));
2006-05-30 23:34:15 +02:00
}
/* ------------------------------------
* pg_file_write - old version
*
* The superuser() check here must be kept as the library might be upgraded
* without the extension being upgraded, meaning that in pre-1.1 installations
* these functions could be called by any user.
2006-05-30 23:34:15 +02:00
*/
2006-10-04 02:30:14 +02:00
Datum
pg_file_write(PG_FUNCTION_ARGS)
2006-05-30 23:34:15 +02:00
{
text *file = PG_GETARG_TEXT_PP(0);
text *data = PG_GETARG_TEXT_PP(1);
bool replace = PG_GETARG_BOOL(2);
2006-10-04 02:30:14 +02:00
int64 count = 0;
2006-05-30 23:34:15 +02:00
requireSuperuser();
count = pg_file_write_internal(file, data, replace);
PG_RETURN_INT64(count);
}
/* ------------------------------------
* pg_file_write_v1_1 - Version 1.1
*
* As of adminpack version 1.1, we no longer need to check if the user
* is a superuser because we REVOKE EXECUTE on the function from PUBLIC.
* Users can then grant access to it based on their policies.
*
* Otherwise identical to pg_file_write (above).
*/
Datum
pg_file_write_v1_1(PG_FUNCTION_ARGS)
{
text *file = PG_GETARG_TEXT_PP(0);
text *data = PG_GETARG_TEXT_PP(1);
bool replace = PG_GETARG_BOOL(2);
int64 count = 0;
count = pg_file_write_internal(file, data, replace);
PG_RETURN_INT64(count);
}
2006-05-30 23:34:15 +02:00
/* ------------------------------------
* pg_file_write_internal - Workhorse for pg_file_write functions.
*
* This handles the actual work for pg_file_write.
*/
int64
pg_file_write_internal(text *file, text *data, bool replace)
{
FILE *f;
char *filename;
int64 count = 0;
filename = convert_and_check_filename(file, false);
if (!replace)
2006-05-30 23:34:15 +02:00
{
2006-10-04 02:30:14 +02:00
struct stat fst;
2006-05-30 23:34:15 +02:00
if (stat(filename, &fst) >= 0)
2006-10-04 02:30:14 +02:00
ereport(ERROR,
2006-05-30 23:34:15 +02:00
(ERRCODE_DUPLICATE_FILE,
errmsg("file \"%s\" exists", filename)));
2006-05-30 23:34:15 +02:00
f = AllocateFile(filename, "wb");
2006-05-30 23:34:15 +02:00
}
else
f = AllocateFile(filename, "ab");
2006-05-30 23:34:15 +02:00
if (!f)
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not open file \"%s\" for writing: %m",
filename)));
2006-05-30 23:34:15 +02:00
count = fwrite(VARDATA_ANY(data), 1, VARSIZE_ANY_EXHDR(data), f);
if (count != VARSIZE_ANY_EXHDR(data) || FreeFile(f))
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not write file \"%s\": %m", filename)));
2006-05-30 23:34:15 +02:00
return (count);
2006-05-30 23:34:15 +02:00
}
/* ------------------------------------
* pg_file_rename - old version
*
* The superuser() check here must be kept as the library might be upgraded
* without the extension being upgraded, meaning that in pre-1.1 installations
* these functions could be called by any user.
*/
2006-10-04 02:30:14 +02:00
Datum
pg_file_rename(PG_FUNCTION_ARGS)
2006-05-30 23:34:15 +02:00
{
text *file1;
text *file2;
text *file3;
bool result;
2006-05-30 23:34:15 +02:00
requireSuperuser();
if (PG_ARGISNULL(0) || PG_ARGISNULL(1))
PG_RETURN_NULL();
file1 = PG_GETARG_TEXT_PP(0);
file2 = PG_GETARG_TEXT_PP(1);
2006-05-30 23:34:15 +02:00
if (PG_ARGISNULL(2))
file3 = NULL;
else
file3 = PG_GETARG_TEXT_PP(2);
result = pg_file_rename_internal(file1, file2, file3);
PG_RETURN_BOOL(result);
}
/* ------------------------------------
* pg_file_rename_v1_1 - Version 1.1
*
* As of adminpack version 1.1, we no longer need to check if the user
* is a superuser because we REVOKE EXECUTE on the function from PUBLIC.
* Users can then grant access to it based on their policies.
*
* Otherwise identical to pg_file_write (above).
*/
Datum
pg_file_rename_v1_1(PG_FUNCTION_ARGS)
{
text *file1;
text *file2;
text *file3;
bool result;
if (PG_ARGISNULL(0) || PG_ARGISNULL(1))
PG_RETURN_NULL();
file1 = PG_GETARG_TEXT_PP(0);
file2 = PG_GETARG_TEXT_PP(1);
if (PG_ARGISNULL(2))
file3 = NULL;
else
file3 = PG_GETARG_TEXT_PP(2);
result = pg_file_rename_internal(file1, file2, file3);
PG_RETURN_BOOL(result);
}
/* ------------------------------------
* pg_file_rename_internal - Workhorse for pg_file_rename functions.
*
* This handles the actual work for pg_file_rename.
*/
bool
pg_file_rename_internal(text *file1, text *file2, text *file3)
{
char *fn1,
*fn2,
*fn3;
int rc;
fn1 = convert_and_check_filename(file1, false);
fn2 = convert_and_check_filename(file2, false);
if (file3 == NULL)
2006-10-04 02:30:14 +02:00
fn3 = 0;
2006-05-30 23:34:15 +02:00
else
fn3 = convert_and_check_filename(file3, false);
2006-05-30 23:34:15 +02:00
if (access(fn1, W_OK) < 0)
{
ereport(WARNING,
(errcode_for_file_access(),
errmsg("file \"%s\" is not accessible: %m", fn1)));
2006-05-30 23:34:15 +02:00
return false;
2006-05-30 23:34:15 +02:00
}
if (fn3 && access(fn2, W_OK) < 0)
{
ereport(WARNING,
(errcode_for_file_access(),
errmsg("file \"%s\" is not accessible: %m", fn2)));
2006-05-30 23:34:15 +02:00
return false;
2006-05-30 23:34:15 +02:00
}
rc = access(fn3 ? fn3 : fn2, 2);
if (rc >= 0 || errno != ENOENT)
{
ereport(ERROR,
(ERRCODE_DUPLICATE_FILE,
errmsg("cannot rename to target file \"%s\"",
fn3 ? fn3 : fn2)));
2006-05-30 23:34:15 +02:00
}
2006-10-04 02:30:14 +02:00
2006-05-30 23:34:15 +02:00
if (fn3)
{
2006-10-04 02:30:14 +02:00
if (rename(fn2, fn3) != 0)
2006-05-30 23:34:15 +02:00
{
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not rename \"%s\" to \"%s\": %m",
fn2, fn3)));
2006-05-30 23:34:15 +02:00
}
if (rename(fn1, fn2) != 0)
{
ereport(WARNING,
(errcode_for_file_access(),
errmsg("could not rename \"%s\" to \"%s\": %m",
fn1, fn2)));
2006-05-30 23:34:15 +02:00
if (rename(fn3, fn2) != 0)
{
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not rename \"%s\" back to \"%s\": %m",
fn3, fn2)));
2006-05-30 23:34:15 +02:00
}
else
{
ereport(ERROR,
(ERRCODE_UNDEFINED_FILE,
errmsg("renaming \"%s\" to \"%s\" was reverted",
fn2, fn3)));
2006-05-30 23:34:15 +02:00
}
}
}
else if (rename(fn1, fn2) != 0)
{
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not rename \"%s\" to \"%s\": %m", fn1, fn2)));
2006-05-30 23:34:15 +02:00
}
return true;
2006-05-30 23:34:15 +02:00
}
/* ------------------------------------
* pg_file_unlink - old version
*
* The superuser() check here must be kept as the library might be upgraded
* without the extension being upgraded, meaning that in pre-1.1 installations
* these functions could be called by any user.
*/
2006-10-04 02:30:14 +02:00
Datum
pg_file_unlink(PG_FUNCTION_ARGS)
2006-05-30 23:34:15 +02:00
{
2006-10-04 02:30:14 +02:00
char *filename;
2006-05-30 23:34:15 +02:00
requireSuperuser();
filename = convert_and_check_filename(PG_GETARG_TEXT_PP(0), false);
2006-05-30 23:34:15 +02:00
if (access(filename, W_OK) < 0)
{
2006-10-04 02:30:14 +02:00
if (errno == ENOENT)
PG_RETURN_BOOL(false);
2006-05-30 23:34:15 +02:00
else
2006-10-04 02:30:14 +02:00
ereport(ERROR,
2006-05-30 23:34:15 +02:00
(errcode_for_file_access(),
errmsg("file \"%s\" is not accessible: %m", filename)));
2006-05-30 23:34:15 +02:00
}
if (unlink(filename) < 0)
{
ereport(WARNING,
(errcode_for_file_access(),
errmsg("could not unlink file \"%s\": %m", filename)));
2006-05-30 23:34:15 +02:00
PG_RETURN_BOOL(false);
}
PG_RETURN_BOOL(true);
}
/* ------------------------------------
* pg_file_unlink_v1_1 - Version 1.1
*
* As of adminpack version 1.1, we no longer need to check if the user
* is a superuser because we REVOKE EXECUTE on the function from PUBLIC.
* Users can then grant access to it based on their policies.
*
* Otherwise identical to pg_file_unlink (above).
*/
2006-10-04 02:30:14 +02:00
Datum
pg_file_unlink_v1_1(PG_FUNCTION_ARGS)
2006-05-30 23:34:15 +02:00
{
char *filename;
filename = convert_and_check_filename(PG_GETARG_TEXT_PP(0), false);
if (access(filename, W_OK) < 0)
{
if (errno == ENOENT)
PG_RETURN_BOOL(false);
else
ereport(ERROR,
(errcode_for_file_access(),
errmsg("file \"%s\" is not accessible: %m", filename)));
}
2006-05-30 23:34:15 +02:00
if (unlink(filename) < 0)
{
ereport(WARNING,
(errcode_for_file_access(),
errmsg("could not unlink file \"%s\": %m", filename)));
PG_RETURN_BOOL(false);
}
PG_RETURN_BOOL(true);
}
/* ------------------------------------
* pg_logdir_ls - Old version
*
* The superuser() check here must be kept as the library might be upgraded
* without the extension being upgraded, meaning that in pre-1.1 installations
* these functions could be called by any user.
*/
Datum
pg_logdir_ls(PG_FUNCTION_ARGS)
{
2006-10-04 02:30:14 +02:00
if (!superuser())
2006-05-30 23:34:15 +02:00
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("only superuser can list the log directory"))));
2006-10-04 02:30:14 +02:00
return (pg_logdir_ls_internal(fcinfo));
}
/* ------------------------------------
* pg_logdir_ls_v1_1 - Version 1.1
*
* As of adminpack version 1.1, we no longer need to check if the user
* is a superuser because we REVOKE EXECUTE on the function from PUBLIC.
* Users can then grant access to it based on their policies.
*
* Otherwise identical to pg_logdir_ls (above).
*/
Datum
pg_logdir_ls_v1_1(PG_FUNCTION_ARGS)
{
return (pg_logdir_ls_internal(fcinfo));
}
Datum
pg_logdir_ls_internal(FunctionCallInfo fcinfo)
{
FuncCallContext *funcctx;
struct dirent *de;
directory_fctx *fctx;
if (strcmp(Log_filename, "postgresql-%Y-%m-%d_%H%M%S.log") != 0)
2006-05-30 23:34:15 +02:00
ereport(ERROR,
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
(errmsg("the log_filename parameter must equal 'postgresql-%%Y-%%m-%%d_%%H%%M%%S.log'"))));
if (SRF_IS_FIRSTCALL())
{
MemoryContext oldcontext;
2006-10-04 02:30:14 +02:00
TupleDesc tupdesc;
2006-05-30 23:34:15 +02:00
2006-10-04 02:30:14 +02:00
funcctx = SRF_FIRSTCALL_INIT();
2006-05-30 23:34:15 +02:00
oldcontext = MemoryContextSwitchTo(funcctx->multi_call_memory_ctx);
fctx = palloc(sizeof(directory_fctx));
2006-05-30 23:34:15 +02:00
tupdesc = CreateTemplateTupleDesc(2, false);
TupleDescInitEntry(tupdesc, (AttrNumber) 1, "starttime",
TIMESTAMPOID, -1, 0);
TupleDescInitEntry(tupdesc, (AttrNumber) 2, "filename",
TEXTOID, -1, 0);
funcctx->attinmeta = TupleDescGetAttInMetadata(tupdesc);
2006-10-04 02:30:14 +02:00
fctx->location = pstrdup(Log_directory);
2006-05-30 23:34:15 +02:00
fctx->dirdesc = AllocateDir(fctx->location);
if (!fctx->dirdesc)
2006-10-04 02:30:14 +02:00
ereport(ERROR,
2006-05-30 23:34:15 +02:00
(errcode_for_file_access(),
Clean up assorted messiness around AllocateDir() usage. This patch fixes a couple of low-probability bugs that could lead to reporting an irrelevant errno value (and hence possibly a wrong SQLSTATE) concerning directory-open or file-open failures. It also fixes places where we took shortcuts in reporting such errors, either by using elog instead of ereport or by using ereport but forgetting to specify an errcode. And it eliminates a lot of just plain redundant error-handling code. In service of all this, export fd.c's formerly-static function ReadDirExtended, so that external callers can make use of the coding pattern dir = AllocateDir(path); while ((de = ReadDirExtended(dir, path, LOG)) != NULL) if they'd like to treat directory-open failures as mere LOG conditions rather than errors. Also fix FreeDir to be a no-op if we reach it with dir == NULL, as such a coding pattern would cause. Then, remove code at many call sites that was throwing an error or log message for AllocateDir failure, as ReadDir or ReadDirExtended can handle that job just fine. Aside from being a net code savings, this gets rid of a lot of not-quite-up-to-snuff reports, as mentioned above. (In some places these changes result in replacing a custom error message such as "could not open tablespace directory" with more generic wording "could not open directory", but it was agreed that the custom wording buys little as long as we report the directory name.) In some other call sites where we can't just remove code, change the error reports to be fully project-style-compliant. Also reorder code in restoreTwoPhaseData that was acquiring a lock between AllocateDir and ReadDir; in the unlikely but surely not impossible case that LWLockAcquire changes errno, AllocateDir failures would be misreported. There is no great value in opening the directory before acquiring TwoPhaseStateLock, so just do it in the other order. Also fix CheckXLogRemoved to guarantee that it preserves errno, as quite a number of call sites are implicitly assuming. (Again, it's unlikely but I think not impossible that errno could change during a SpinLockAcquire. If so, this function was broken for its own purposes as well as breaking callers.) And change a few places that were using not-per-project-style messages, such as "could not read directory" when "could not open directory" is more correct. Back-patch the exporting of ReadDirExtended, in case we have occasion to back-patch some fix that makes use of it; it's not needed right now but surely making it global is pretty harmless. Also back-patch the restoreTwoPhaseData and CheckXLogRemoved fixes. The rest of this is essentially cosmetic and need not get back-patched. Michael Paquier, with a bit of additional work by me Discussion: https://postgr.es/m/CAB7nPqRpOCxjiirHmebEFhXVTK7V5Jvw4bz82p7Oimtsm3TyZA@mail.gmail.com
2017-12-04 23:02:52 +01:00
errmsg("could not open directory \"%s\": %m",
fctx->location)));
2006-05-30 23:34:15 +02:00
funcctx->user_fctx = fctx;
MemoryContextSwitchTo(oldcontext);
}
2006-10-04 02:30:14 +02:00
funcctx = SRF_PERCALL_SETUP();
fctx = (directory_fctx *) funcctx->user_fctx;
2006-05-30 23:34:15 +02:00
while ((de = ReadDir(fctx->dirdesc, fctx->location)) != NULL)
2006-05-30 23:34:15 +02:00
{
2006-10-04 02:30:14 +02:00
char *values[2];
HeapTuple tuple;
char timestampbuf[32];
2006-10-04 02:30:14 +02:00
char *field[MAXDATEFIELDS];
2006-05-30 23:34:15 +02:00
char lowstr[MAXDATELEN + 1];
2006-10-04 02:30:14 +02:00
int dtype;
int nf,
ftype[MAXDATEFIELDS];
2006-05-30 23:34:15 +02:00
fsec_t fsec;
2006-10-04 02:30:14 +02:00
int tz = 0;
struct pg_tm date;
2006-05-30 23:34:15 +02:00
/*
2006-10-04 02:30:14 +02:00
* Default format: postgresql-YYYY-MM-DD_HHMMSS.log
2006-05-30 23:34:15 +02:00
*/
if (strlen(de->d_name) != 32
|| strncmp(de->d_name, "postgresql-", 11) != 0
2006-05-30 23:34:15 +02:00
|| de->d_name[21] != '_'
|| strcmp(de->d_name + 28, ".log") != 0)
2006-10-04 02:30:14 +02:00
continue;
2006-05-30 23:34:15 +02:00
/* extract timestamp portion of filename */
strcpy(timestampbuf, de->d_name + 11);
timestampbuf[17] = '\0';
2006-05-30 23:34:15 +02:00
/* parse and decode expected timestamp to verify it's OK format */
if (ParseDateTime(timestampbuf, lowstr, MAXDATELEN, field, ftype, MAXDATEFIELDS, &nf))
2006-10-04 02:30:14 +02:00
continue;
2006-05-30 23:34:15 +02:00
if (DecodeDateTime(field, ftype, nf, &dtype, &date, &fsec, &tz))
2006-10-04 02:30:14 +02:00
continue;
2006-05-30 23:34:15 +02:00
/* Seems the timestamp is OK; prepare and return tuple */
values[0] = timestampbuf;
values[1] = psprintf("%s/%s", fctx->location, de->d_name);
2006-05-30 23:34:15 +02:00
tuple = BuildTupleFromCStrings(funcctx->attinmeta, values);
SRF_RETURN_NEXT(funcctx, HeapTupleGetDatum(tuple));
}
FreeDir(fctx->dirdesc);
SRF_RETURN_DONE(funcctx);
}