// Copyright 2015 PingCAP, Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // See the License for the specific language governing permissions and // limitations under the License. package privileges import ( "fmt" "strings" "github.com/juju/errors" "github.com/pingcap/tidb/ast" "github.com/pingcap/tidb/context" "github.com/pingcap/tidb/model" "github.com/pingcap/tidb/mysql" "github.com/pingcap/tidb/privilege" "github.com/pingcap/tidb/sessionctx/variable" "github.com/pingcap/tidb/util/sqlexec" "github.com/pingcap/tidb/util/types" ) var _ privilege.Checker = (*UserPrivileges)(nil) type privileges struct { Level ast.GrantLevelType privs map[mysql.PrivilegeType]bool } func (ps *privileges) contain(p mysql.PrivilegeType) bool { if ps.privs == nil { return false } _, ok := ps.privs[p] return ok } func (ps *privileges) add(p mysql.PrivilegeType) { if ps.privs == nil { ps.privs = make(map[mysql.PrivilegeType]bool) } ps.privs[p] = true } func (ps *privileges) String() string { switch ps.Level { case ast.GrantLevelGlobal: return ps.globalPrivToString() case ast.GrantLevelDB: return ps.dbPrivToString() case ast.GrantLevelTable: return ps.tablePrivToString() } return "" } func (ps *privileges) globalPrivToString() string { if len(ps.privs) == len(mysql.AllGlobalPrivs) { return mysql.AllPrivilegeLiteral } pstrs := make([]string, 0, len(ps.privs)) // Iterate AllGlobalPrivs to get stable order result. for _, p := range mysql.AllGlobalPrivs { _, ok := ps.privs[p] if !ok { continue } s, _ := mysql.Priv2Str[p] pstrs = append(pstrs, s) } return strings.Join(pstrs, ",") } func (ps *privileges) dbPrivToString() string { if len(ps.privs) == len(mysql.AllDBPrivs) { return mysql.AllPrivilegeLiteral } pstrs := make([]string, 0, len(ps.privs)) // Iterate AllDBPrivs to get stable order result. for _, p := range mysql.AllDBPrivs { _, ok := ps.privs[p] if !ok { continue } s, _ := mysql.Priv2SetStr[p] pstrs = append(pstrs, s) } return strings.Join(pstrs, ",") } func (ps *privileges) tablePrivToString() string { if len(ps.privs) == len(mysql.AllTablePrivs) { return mysql.AllPrivilegeLiteral } pstrs := make([]string, 0, len(ps.privs)) // Iterate AllTablePrivs to get stable order result. for _, p := range mysql.AllTablePrivs { _, ok := ps.privs[p] if !ok { continue } s, _ := mysql.Priv2Str[p] pstrs = append(pstrs, s) } return strings.Join(pstrs, ",") } type userPrivileges struct { User string Host string // Global privileges GlobalPrivs *privileges // DBName-privileges DBPrivs map[string]*privileges // DBName-TableName-privileges TablePrivs map[string]map[string]*privileges } func (ps *userPrivileges) ShowGrants() []string { gs := []string{} // Show global grants g := ps.GlobalPrivs.String() if len(g) > 0 { s := fmt.Sprintf(`GRANT %s ON *.* TO '%s'@'%s'`, g, ps.User, ps.Host) gs = append(gs, s) } // Show db scope grants for d, p := range ps.DBPrivs { g := p.String() if len(g) > 0 { s := fmt.Sprintf(`GRANT %s ON %s.* TO '%s'@'%s'`, g, d, ps.User, ps.Host) gs = append(gs, s) } } // Show table scope grants for d, dps := range ps.TablePrivs { for t, p := range dps { g := p.String() if len(g) > 0 { s := fmt.Sprintf(`GRANT %s ON %s.%s TO '%s'@'%s'`, g, d, t, ps.User, ps.Host) gs = append(gs, s) } } } return gs } // UserPrivileges implements privilege.Checker interface. // This is used to check privilege for the current user. type UserPrivileges struct { User string privs *userPrivileges } // Check implements Checker.Check interface. func (p *UserPrivileges) Check(ctx context.Context, db *model.DBInfo, tbl *model.TableInfo, privilege mysql.PrivilegeType) (bool, error) { if p.privs == nil { // Lazy load if len(p.User) == 0 { // User current user p.User = variable.GetSessionVars(ctx).User if len(p.User) == 0 { // In embedded db mode, user does not need to login. So we do not have username. // TODO: remove this check latter. return true, nil } } err := p.loadPrivileges(ctx) if err != nil { return false, errors.Trace(err) } } // Check global scope privileges. ok := p.privs.GlobalPrivs.contain(privilege) if ok { return true, nil } // Check db scope privileges. dbp, ok := p.privs.DBPrivs[db.Name.O] if ok { ok = dbp.contain(privilege) if ok { return true, nil } } if tbl == nil { return false, nil } // Check table scope privileges. dbTbl, ok := p.privs.TablePrivs[db.Name.O] if !ok { return false, nil } tblp, ok := dbTbl[tbl.Name.O] if !ok { return false, nil } return tblp.contain(privilege), nil } func (p *UserPrivileges) loadPrivileges(ctx context.Context) error { strs := strings.Split(p.User, "@") if len(strs) != 2 { return errors.Errorf("Wrong username format: %s", p.User) } username, host := strs[0], strs[1] p.privs = &userPrivileges{ User: username, Host: host, } // Load privileges from mysql.User/DB/Table_privs/Column_privs table err := p.loadGlobalPrivileges(ctx) if err != nil { return errors.Trace(err) } err = p.loadDBScopePrivileges(ctx) if err != nil { return errors.Trace(err) } err = p.loadTableScopePrivileges(ctx) if err != nil { return errors.Trace(err) } // TODO: consider column scope privilege latter. return nil } // mysql.User/mysql.DB table privilege columns start from index 3. // See: booststrap.go CreateUserTable/CreateDBPrivTable const userTablePrivColumnStartIndex = 3 const dbTablePrivColumnStartIndex = 3 func (p *UserPrivileges) loadGlobalPrivileges(ctx context.Context) error { sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`, mysql.SystemDB, mysql.UserTable, p.privs.User, p.privs.Host) rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql) if err != nil { return errors.Trace(err) } defer rs.Close() ps := &privileges{Level: ast.GrantLevelGlobal} fs, err := rs.Fields() if err != nil { return errors.Trace(err) } for { row, err := rs.Next() if err != nil { return errors.Trace(err) } if row == nil { break } for i := userTablePrivColumnStartIndex; i < len(fs); i++ { d := row.Data[i] if d.Kind() != types.KindMysqlEnum { return errors.Errorf("Privilege should be mysql.Enum: %v(%T)", d, d) } ed := d.GetMysqlEnum() if ed.String() != "Y" { continue } f := fs[i] p, ok := mysql.Col2PrivType[f.ColumnAsName.O] if !ok { return errors.New("Unknown Privilege Type!") } ps.add(p) } } p.privs.GlobalPrivs = ps return nil } func (p *UserPrivileges) loadDBScopePrivileges(ctx context.Context) error { sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`, mysql.SystemDB, mysql.DBTable, p.privs.User, p.privs.Host) rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql) if err != nil { return errors.Trace(err) } defer rs.Close() ps := make(map[string]*privileges) fs, err := rs.Fields() if err != nil { return errors.Trace(err) } for { row, err := rs.Next() if err != nil { return errors.Trace(err) } if row == nil { break } // DB dbStr := row.Data[1].GetString() ps[dbStr] = &privileges{Level: ast.GrantLevelDB} for i := dbTablePrivColumnStartIndex; i < len(fs); i++ { d := row.Data[i] if d.Kind() != types.KindMysqlEnum { return errors.Errorf("Privilege should be mysql.Enum: %v(%T)", d, d) } ed := d.GetMysqlEnum() if ed.String() != "Y" { continue } f := fs[i] p, ok := mysql.Col2PrivType[f.ColumnAsName.O] if !ok { return errors.New("Unknown Privilege Type!") } ps[dbStr].add(p) } } p.privs.DBPrivs = ps return nil } func (p *UserPrivileges) loadTableScopePrivileges(ctx context.Context) error { sql := fmt.Sprintf(`SELECT * FROM %s.%s WHERE User="%s" AND (Host="%s" OR Host="%%");`, mysql.SystemDB, mysql.TablePrivTable, p.privs.User, p.privs.Host) rs, err := ctx.(sqlexec.RestrictedSQLExecutor).ExecRestrictedSQL(ctx, sql) if err != nil { return errors.Trace(err) } defer rs.Close() ps := make(map[string]map[string]*privileges) for { row, err := rs.Next() if err != nil { return errors.Trace(err) } if row == nil { break } // DB dbStr := row.Data[1].GetString() // Table_name tblStr := row.Data[3].GetString() _, ok := ps[dbStr] if !ok { ps[dbStr] = make(map[string]*privileges) } ps[dbStr][tblStr] = &privileges{Level: ast.GrantLevelTable} // Table_priv tblPrivs := row.Data[6].GetMysqlSet() pvs := strings.Split(tblPrivs.Name, ",") for _, d := range pvs { p, ok := mysql.SetStr2Priv[d] if !ok { return errors.New("Unknown Privilege Type!") } ps[dbStr][tblStr].add(p) } } p.privs.TablePrivs = ps return nil } // ShowGrants implements privilege.Checker ShowGrants interface. func (p *UserPrivileges) ShowGrants(ctx context.Context, user string) ([]string, error) { // If user is current user if user == p.User { return p.privs.ShowGrants(), nil } userp := &UserPrivileges{User: user} err := userp.loadPrivileges(ctx) if err != nil { return nil, errors.Trace(err) } return userp.privs.ShowGrants(), nil }