forked from cockroachdb/cockroach
-
Notifications
You must be signed in to change notification settings - Fork 0
/
privilege.go
251 lines (226 loc) · 7.69 KB
/
privilege.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
// Copyright 2015 The Cockroach Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
// implied. See the License for the specific language governing
// permissions and limitations under the License.
//
// Author: Marc Berhault (marc@cockroachlabs.com)
package sqlbase
import (
"fmt"
"sort"
"strings"
"github.com/cockroachdb/cockroach/pkg/security"
"github.com/cockroachdb/cockroach/pkg/sql/privilege"
)
func isPrivilegeSet(bits uint32, priv privilege.Kind) bool {
return bits&priv.Mask() != 0
}
// findUserIndex looks for a given user and returns its
// index in the User array if found. Returns -1 otherwise.
func (p PrivilegeDescriptor) findUserIndex(user string) int {
idx := sort.Search(len(p.Users), func(i int) bool {
return p.Users[i].User >= user
})
if idx < len(p.Users) && p.Users[idx].User == user {
return idx
}
return -1
}
// findUser looks for a specific user in the list.
// Returns (nil, false) if not found, or (obj, true) if found.
func (p PrivilegeDescriptor) findUser(user string) (*UserPrivileges, bool) {
idx := p.findUserIndex(user)
if idx == -1 {
return nil, false
}
return &p.Users[idx], true
}
// findOrCreateUser looks for a specific user in the list, creating it if needed.
func (p *PrivilegeDescriptor) findOrCreateUser(user string) *UserPrivileges {
idx := sort.Search(len(p.Users), func(i int) bool {
return p.Users[i].User >= user
})
if idx == len(p.Users) {
// Not found but should be inserted at the end.
p.Users = append(p.Users, UserPrivileges{User: user})
} else if p.Users[idx].User == user {
// Found.
} else {
// New element to be inserted at idx.
p.Users = append(p.Users, UserPrivileges{})
copy(p.Users[idx+1:], p.Users[idx:])
p.Users[idx] = UserPrivileges{User: user}
}
return &p.Users[idx]
}
// removeUser looks for a given user in the list and removes it if present.
func (p *PrivilegeDescriptor) removeUser(user string) {
idx := p.findUserIndex(user)
if idx == -1 {
// Not found.
return
}
p.Users = append(p.Users[:idx], p.Users[idx+1:]...)
}
// NewPrivilegeDescriptor returns a privilege descriptor for the given
// user with the specified list of privileges.
func NewPrivilegeDescriptor(user string, priv privilege.List) *PrivilegeDescriptor {
return &PrivilegeDescriptor{
Users: []UserPrivileges{
{
User: user,
Privileges: priv.ToBitField(),
},
},
}
}
// NewDefaultPrivilegeDescriptor returns a privilege descriptor
// with ALL privileges for the root user.
func NewDefaultPrivilegeDescriptor() *PrivilegeDescriptor {
return &PrivilegeDescriptor{
Users: []UserPrivileges{
{
User: security.RootUser,
Privileges: privilege.ALL.Mask(),
},
},
}
}
// Grant adds new privileges to this descriptor for a given list of users.
// TODO(marc): if all privileges other than ALL are set, should we collapse
// them into ALL?
func (p *PrivilegeDescriptor) Grant(user string, privList privilege.List) {
userPriv := p.findOrCreateUser(user)
if isPrivilegeSet(userPriv.Privileges, privilege.ALL) {
// User already has 'ALL' privilege: no-op.
return
}
bits := privList.ToBitField()
if isPrivilegeSet(bits, privilege.ALL) {
// Granting 'ALL' privilege: overwrite.
// TODO(marc): the grammar does not allow it, but we should
// check if other privileges are being specified and error out.
userPriv.Privileges = privilege.ALL.Mask()
return
}
userPriv.Privileges |= bits
}
// Revoke removes privileges from this descriptor for a given list of users.
func (p *PrivilegeDescriptor) Revoke(user string, privList privilege.List) {
userPriv, ok := p.findUser(user)
if !ok || userPriv.Privileges == 0 {
// Removing privileges from a user without privileges is a no-op.
return
}
bits := privList.ToBitField()
if isPrivilegeSet(bits, privilege.ALL) {
// Revoking 'ALL' privilege: remove user.
// TODO(marc): the grammar does not allow it, but we should
// check if other privileges are being specified and error out.
p.removeUser(user)
return
}
if isPrivilegeSet(userPriv.Privileges, privilege.ALL) {
// User has 'ALL' privilege. Remove it and set
// all other privileges one.
userPriv.Privileges = 0
for _, v := range privilege.ByValue {
if v != privilege.ALL {
userPriv.Privileges |= v.Mask()
}
}
}
// One doesn't see "AND NOT" very often.
userPriv.Privileges &^= bits
if userPriv.Privileges == 0 {
p.removeUser(user)
}
}
// Validate is called when writing a database or table descriptor.
// It takes the descriptor ID which is used to determine if
// it belongs to a system descriptor, in which case the maximum
// set of allowed privileges is looked up and applied.
func (p PrivilegeDescriptor) Validate(id ID) error {
rootPriv, ok := p.findUser(security.RootUser)
if !ok {
return fmt.Errorf("user %s does not have privileges", security.RootUser)
}
if IsReservedID(id) {
// System databases and tables have custom maximum allowed privileges.
allowedPrivileges, ok := SystemAllowedPrivileges[id]
if !ok {
return fmt.Errorf("no allowed privileges found for system object with ID=%d", id)
}
// The root user must match one of the allowed privilege sets exactly.
if !allowedPrivileges.Contains(rootPriv.Privileges) {
return fmt.Errorf("user %s must have exactly %s privileges on this system object",
security.RootUser, allowedPrivileges)
}
// For all users, no other privileges must be granted.
if !isPrivilegeSet(rootPriv.Privileges, privilege.ALL) {
for _, u := range p.Users {
if remaining := u.Privileges &^ rootPriv.Privileges; remaining != 0 {
return fmt.Errorf("user %s must not have %s privileges on this system object",
u.User, privilege.ListFromBitField(remaining))
}
}
}
} else if !isPrivilegeSet(rootPriv.Privileges, privilege.ALL) {
// Non-system databases and tables must preserve ALL
// privileges for the root user.
return fmt.Errorf("user %s does not have ALL privileges", security.RootUser)
}
return nil
}
// UserPrivilegeString is a pair of strings describing the
// privileges for a given user.
type UserPrivilegeString struct {
User string
Privileges []string
}
// PrivilegeString returns a string of comma-separted privilege names.
func (u UserPrivilegeString) PrivilegeString() string {
return strings.Join(u.Privileges, ",")
}
// Show returns the list of {username, privileges} sorted by username.
// 'privileges' is a string of comma-separated sorted privilege names.
func (p PrivilegeDescriptor) Show() []UserPrivilegeString {
ret := make([]UserPrivilegeString, 0, len(p.Users))
for _, userPriv := range p.Users {
ret = append(ret, UserPrivilegeString{
User: userPriv.User,
Privileges: privilege.ListFromBitField(userPriv.Privileges).SortedNames(),
})
}
return ret
}
// CheckPrivilege returns true if 'user' has 'privilege' on this descriptor.
func (p PrivilegeDescriptor) CheckPrivilege(user string, priv privilege.Kind) bool {
userPriv, ok := p.findUser(user)
if !ok {
// User "node" has all privileges.
return user == security.NodeUser
}
// ALL is always good.
if isPrivilegeSet(userPriv.Privileges, privilege.ALL) {
return true
}
return isPrivilegeSet(userPriv.Privileges, priv)
}
// AnyPrivilege returns true if 'user' has any privilege on this descriptor.
func (p PrivilegeDescriptor) AnyPrivilege(user string) bool {
userPriv, ok := p.findUser(user)
if !ok {
return false
}
return userPriv.Privileges != 0
}