forked from forgejo/forgejo
Integrate public as bindata optionally (#293)
* Dropped unused codekit config * Integrated dynamic and static bindata for public * Ignore public bindata * Add a general generate make task * Integrated flexible public assets into web command * Updated vendoring, added all missiong govendor deps * Made the linter happy with the bindata and dynamic code * Moved public bindata definition to modules directory * Ignoring the new bindata path now * Updated to the new public modules import path * Updated public bindata command and drop the new prefix
This commit is contained in:
parent
4680c349dd
commit
b6a95a8cb3
691 changed files with 305318 additions and 1272 deletions
381
vendor/github.com/pingcap/tidb/privilege/privileges/privileges.go
generated
vendored
Normal file
381
vendor/github.com/pingcap/tidb/privilege/privileges/privileges.go
generated
vendored
Normal file
|
@ -0,0 +1,381 @@
|
|||
// Copyright 2015 PingCAP, Inc.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package privileges
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"strings"
|
||||
|
||||
"github.com/juju/errors"
|
||||
"github.com/pingcap/tidb/ast"
|
||||
"github.com/pingcap/tidb/context"
|
||||
"github.com/pingcap/tidb/model"
|
||||
"github.com/pingcap/tidb/mysql"
|
||||
"github.com/pingcap/tidb/privilege"
|
||||
"github.com/pingcap/tidb/sessionctx/variable"
|
||||
"github.com/pingcap/tidb/util/sqlexec"
|
||||
"github.com/pingcap/tidb/util/types"
|
||||
)
|
||||
|
||||
var _ privilege.Checker = (*UserPrivileges)(nil)
|
||||
|
||||
type privileges struct {
|
||||
Level ast.GrantLevelType
|
||||
privs map[mysql.PrivilegeType]bool
|
||||
}
|
||||
|
||||
func (ps *privileges) contain(p mysql.PrivilegeType) bool {
|
||||
if ps.privs == nil {
|
||||
return false
|
||||
}
|
||||
_, ok := ps.privs[p]
|
||||
return ok
|
||||
}
|
||||
|
||||
func (ps *privileges) add(p mysql.PrivilegeType) {
|
||||
if ps.privs == nil {
|
||||
ps.privs = make(map[mysql.PrivilegeType]bool)
|
||||
}
|
||||
ps.privs[p] = true
|
||||
}
|
||||
|
||||
func (ps *privileges) String() string {
|
||||
switch ps.Level {
|
||||
case ast.GrantLevelGlobal:
|
||||
return ps.globalPrivToString()
|
||||
case ast.GrantLevelDB:
|
||||
return ps.dbPrivToString()
|
||||
case ast.GrantLevelTable:
|
||||
return ps.tablePrivToString()
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func (ps *privileges) globalPrivToString() string {
|
||||
if len(ps.privs) == len(mysql.AllGlobalPrivs) {
|
||||
return mysql.AllPrivilegeLiteral
|
||||
}
|
||||
pstrs := make([]string, 0, len(ps.privs))
|
||||
// Iterate AllGlobalPrivs to get stable order result.
|
||||
for _, p := range mysql.AllGlobalPrivs {
|
||||
_, ok := ps.privs[p]
|
||||
if !ok {
|
||||
continue
|
||||
}
|
||||
s, _ := mysql.Priv2Str[p]
|
||||
pstrs = append(pstrs, s)
|
||||
}
|
||||
return strings.Join(pstrs, ",")
|
||||
}
|
||||
|
||||
func (ps *privileges) dbPrivToString() string {
|
||||
if len(ps.privs) == len(mysql.AllDBPrivs) {
|
||||
return mysql.AllPrivilegeLiteral
|
||||
}
|
||||
pstrs := make([]string, 0, len(ps.privs))
|
||||
// Iterate AllDBPrivs to get stable order result.
|
||||
for _, p := range mysql.AllDBPrivs {
|
||||
_, ok := ps.privs[p]
|
||||
if !ok {
|
||||
continue
|
||||
}
|
||||
s, _ := mysql.Priv2SetStr[p]
|
||||
pstrs = append(pstrs, s)
|
||||
}
|
||||
return strings.Join(pstrs, ",")
|
||||
}
|
||||
|
||||
func (ps *privileges) tablePrivToString() string {
|
||||
if len(ps.privs) == len(mysql.AllTablePrivs) {
|
||||
return mysql.AllPrivilegeLiteral
|
||||
}
|
||||
pstrs := make([]string, 0, len(ps.privs))
|
||||
// Iterate AllTablePrivs to get stable order result.
|
||||
for _, p := range mysql.AllTablePrivs {
|
||||
_, ok := ps.privs[p]
|
||||
if !ok {
|
||||
continue
|
||||
}
|
||||
s, _ := mysql.Priv2Str[p]
|
||||
pstrs = append(pstrs, s)
|
||||
}
|
||||
return strings.Join(pstrs, ",")
|
||||
}
|
||||
|
||||
type userPrivileges struct {
|
||||
User string
|
||||
Host string
|
||||
// Global privileges
|
||||
GlobalPrivs *privileges
|
||||
// DBName-privileges
|
||||
DBPrivs map[string]*privileges
|
||||
// DBName-TableName-privileges
|
||||
TablePrivs map[string]map[string]*privileges
|
||||
}
|
||||
|
||||
func (ps *userPrivileges) ShowGrants() []string {
|
||||
gs := []string{}
|
||||
// Show global grants
|
||||
g := ps.GlobalPrivs.String()
|
||||
if len(g) > 0 {
|
||||
s := fmt.Sprintf(`GRANT %s ON *.* TO '%s'@'%s'`, g, ps.User, ps.Host)
|
||||
gs = append(gs, s)
|
||||
}
|
||||
// Show db scope grants
|
||||
for d, p := range ps.DBPrivs {
|
||||
g := p.String()
|
||||
if len(g) > 0 {
|
||||
s := fmt.Sprintf(`GRANT %s ON %s.* TO '%s'@'%s'`, g, d, ps.User, ps.Host)
|
||||
gs = append(gs, s)
|
||||
}
|
||||
}
|
||||
// Show table scope grants
|
||||
for d, dps := range ps.TablePrivs {
|
||||
for t, p := range dps {
|
||||
g := p.String()
|
||||
if len(g) > 0 {
|
||||
s := fmt.Sprintf(`GRANT %s ON %s.%s TO '%s'@'%s'`, g, d, t, ps.User, ps.Host)
|
||||
gs = append(gs, s)
|
||||
}
|
||||
}
|
||||
}
|
||||
return gs
|
||||
}
|
||||
|
||||
// UserPrivileges implements privilege.Checker interface.
|
||||
// This is used to check privilege for the current user.
|
||||
type UserPrivileges struct {
|
||||
User string
|
||||
privs *userPrivileges
|
||||
}
|
||||
|
||||
// Check implements Checker.Check interface.
|
||||
func (p *UserPrivileges) Check(ctx context.Context, db *model.DBInfo, tbl *model.TableInfo, privilege mysql.PrivilegeType) (bool, error) {
|
||||
if p.privs == nil {
|
||||
// Lazy load
|
||||
if len(p.User) == 0 {
|
||||
// User current user
|
||||
p.User = variable.GetSessionVars(ctx).User
|
||||
if len(p.User) == 0 {
|
||||
// In embedded db mode, user does not need to login. So we do not have username.
|
||||
// TODO: remove this check latter.
|
||||
return true, nil
|
||||
}
|
||||
}
|
||||
err := p.loadPrivileges(ctx)
|
||||
if err != nil {
|
||||
return false, errors.Trace(err)
|
||||
}
|
||||
}
|
||||
// Check global scope privileges.
|
||||
ok := p.privs.GlobalPrivs.contain(privilege)
|
||||
if ok {
|
||||
return true, nil
|
||||
}
|
||||
// Check db scope privileges.
|
||||
dbp, ok := p.privs.DBPrivs[db.Name.O]
|
||||
if ok {
|
||||
ok = dbp.contain(privilege)
|
||||
if ok {
|
||||
return true, nil
|
||||
}
|
||||
}
|
||||
if tbl == nil {
|
||||
return false, nil
|
||||
}
|
||||
// Check table scope privileges.
|
||||
dbTbl, ok := p.privs.TablePrivs[db.Name.O]
|
||||
if !ok {
|
||||
return false, nil
|
||||
}
|
||||
tblp, ok := dbTbl[tbl.Name.O]
|
||||
if !ok {
|
||||
return false, nil
|
||||
}
|
||||
return tblp.contain(privilege), nil
|
||||
}
|
||||
|
||||
func (p *UserPrivileges) loadPrivileges(ctx context.Context) error {
|
||||
strs := strings.Split(p.User, "@")
|
||||
if len(strs) != 2 {
|
||||
return errors.Errorf("Wrong username format: %s", p.User)
|
||||
}
|
||||
username, host := strs[0], strs[1]
|
||||
p.privs = &userPrivileges{
|
||||
User: username,
|
||||
Host: host,
|
||||
}
|
||||
// Load privileges from mysql.User/DB/Table_privs/Column_privs table
|
||||
err := p.loadGlobalPrivileges(ctx)
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
err = p.loadDBScopePrivileges(ctx)
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
err = p.loadTableScopePrivileges(ctx)
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
// TODO: consider column scope privilege latter.
|
||||
return nil
|
||||
}
|
||||
|
||||
// mysql.User/mysql.DB table privilege columns start from index 3.
|
||||
// See: booststrap.go CreateUserTable/CreateDBPrivTable
|
||||
const userTablePrivColumnStartIndex = 3
|
||||
const dbTablePrivColumnStartIndex = 3
|
||||
|
||||
func (p *UserPrivileges) loadGlobalPrivileges(ctx context.Context) error {
|
||||
sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`,
|
||||
mysql.SystemDB, mysql.UserTable, p.privs.User, p.privs.Host)
|
||||
rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql)
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
defer rs.Close()
|
||||
ps := &privileges{Level: ast.GrantLevelGlobal}
|
||||
fs, err := rs.Fields()
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
for {
|
||||
row, err := rs.Next()
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
if row == nil {
|
||||
break
|
||||
}
|
||||
for i := userTablePrivColumnStartIndex; i < len(fs); i++ {
|
||||
d := row.Data[i]
|
||||
if d.Kind() != types.KindMysqlEnum {
|
||||
return errors.Errorf("Privilege should be mysql.Enum: %v(%T)", d, d)
|
||||
}
|
||||
ed := d.GetMysqlEnum()
|
||||
if ed.String() != "Y" {
|
||||
continue
|
||||
}
|
||||
f := fs[i]
|
||||
p, ok := mysql.Col2PrivType[f.ColumnAsName.O]
|
||||
if !ok {
|
||||
return errors.New("Unknown Privilege Type!")
|
||||
}
|
||||
ps.add(p)
|
||||
}
|
||||
}
|
||||
p.privs.GlobalPrivs = ps
|
||||
return nil
|
||||
}
|
||||
|
||||
func (p *UserPrivileges) loadDBScopePrivileges(ctx context.Context) error {
|
||||
sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`,
|
||||
mysql.SystemDB, mysql.DBTable, p.privs.User, p.privs.Host)
|
||||
rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql)
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
defer rs.Close()
|
||||
ps := make(map[string]*privileges)
|
||||
fs, err := rs.Fields()
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
for {
|
||||
row, err := rs.Next()
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
if row == nil {
|
||||
break
|
||||
}
|
||||
// DB
|
||||
dbStr := row.Data[1].GetString()
|
||||
ps[dbStr] = &privileges{Level: ast.GrantLevelDB}
|
||||
for i := dbTablePrivColumnStartIndex; i < len(fs); i++ {
|
||||
d := row.Data[i]
|
||||
if d.Kind() != types.KindMysqlEnum {
|
||||
return errors.Errorf("Privilege should be mysql.Enum: %v(%T)", d, d)
|
||||
}
|
||||
ed := d.GetMysqlEnum()
|
||||
if ed.String() != "Y" {
|
||||
continue
|
||||
}
|
||||
f := fs[i]
|
||||
p, ok := mysql.Col2PrivType[f.ColumnAsName.O]
|
||||
if !ok {
|
||||
return errors.New("Unknown Privilege Type!")
|
||||
}
|
||||
ps[dbStr].add(p)
|
||||
}
|
||||
}
|
||||
p.privs.DBPrivs = ps
|
||||
return nil
|
||||
}
|
||||
|
||||
func (p *UserPrivileges) loadTableScopePrivileges(ctx context.Context) error {
|
||||
sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`,
|
||||
mysql.SystemDB, mysql.TablePrivTable, p.privs.User, p.privs.Host)
|
||||
rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql)
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
defer rs.Close()
|
||||
ps := make(map[string]map[string]*privileges)
|
||||
for {
|
||||
row, err := rs.Next()
|
||||
if err != nil {
|
||||
return errors.Trace(err)
|
||||
}
|
||||
if row == nil {
|
||||
break
|
||||
}
|
||||
// DB
|
||||
dbStr := row.Data[1].GetString()
|
||||
// Table_name
|
||||
tblStr := row.Data[3].GetString()
|
||||
_, ok := ps[dbStr]
|
||||
if !ok {
|
||||
ps[dbStr] = make(map[string]*privileges)
|
||||
}
|
||||
ps[dbStr][tblStr] = &privileges{Level: ast.GrantLevelTable}
|
||||
// Table_priv
|
||||
tblPrivs := row.Data[6].GetMysqlSet()
|
||||
pvs := strings.Split(tblPrivs.Name, ",")
|
||||
for _, d := range pvs {
|
||||
p, ok := mysql.SetStr2Priv[d]
|
||||
if !ok {
|
||||
return errors.New("Unknown Privilege Type!")
|
||||
}
|
||||
ps[dbStr][tblStr].add(p)
|
||||
}
|
||||
}
|
||||
p.privs.TablePrivs = ps
|
||||
return nil
|
||||
}
|
||||
|
||||
// ShowGrants implements privilege.Checker ShowGrants interface.
|
||||
func (p *UserPrivileges) ShowGrants(ctx context.Context, user string) ([]string, error) {
|
||||
// If user is current user
|
||||
if user == p.User {
|
||||
return p.privs.ShowGrants(), nil
|
||||
}
|
||||
userp := &UserPrivileges{User: user}
|
||||
err := userp.loadPrivileges(ctx)
|
||||
if err != nil {
|
||||
return nil, errors.Trace(err)
|
||||
}
|
||||
return userp.privs.ShowGrants(), nil
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue