Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
M
mariadb
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
mariadb
Commits
f22a50b2
Commit
f22a50b2
authored
Oct 17, 2013
by
Vicențiu Ciorbaru
Committed by
Sergei Golubchik
Oct 17, 2013
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Added rights propagation for granting a role to a role
parent
82a5464a
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
72 additions
and
0 deletions
+72
-0
sql/sql_acl.cc
sql/sql_acl.cc
+72
-0
No files found.
sql/sql_acl.cc
View file @
f22a50b2
...
@@ -658,7 +658,10 @@ static my_bool acl_user_reset_grant(ACL_USER *user,
...
@@ -658,7 +658,10 @@ static my_bool acl_user_reset_grant(ACL_USER *user,
void
*
not_used
__attribute__
((
unused
)));
void
*
not_used
__attribute__
((
unused
)));
static
my_bool
acl_role_reset_grant
(
ACL_USER
*
role
,
static
my_bool
acl_role_reset_grant
(
ACL_USER
*
role
,
void
*
not_used
__attribute__
((
unused
)));
void
*
not_used
__attribute__
((
unused
)));
static
my_bool
acl_role_propagate_grants
(
ACL_USER
*
role
,
void
*
not_used
__attribute__
((
unused
)));
static
int
add_role_user_mapping
(
ROLE_GRANT_PAIR
*
mapping
);
static
int
add_role_user_mapping
(
ROLE_GRANT_PAIR
*
mapping
);
static
my_bool
get_role_access
(
ACL_USER
*
role
,
ulong
*
access
,
my_bool
use_initial
);
/*
/*
Enumeration of various ACL's and Hashes used in handle_grant_struct()
Enumeration of various ACL's and Hashes used in handle_grant_struct()
...
@@ -1299,6 +1302,9 @@ static my_bool acl_load(THD *thd, TABLE_LIST *tables)
...
@@ -1299,6 +1302,9 @@ static my_bool acl_load(THD *thd, TABLE_LIST *tables)
free_root
(
&
temp_root
,
MYF
(
0
));
free_root
(
&
temp_root
,
MYF
(
0
));
end_read_record
(
&
read_record_info
);
end_read_record
(
&
read_record_info
);
my_hash_iterate
(
&
acl_roles
,
(
my_hash_walk_action
)
acl_role_propagate_grants
,
NULL
);
if
(
!
initialized
)
if
(
!
initialized
)
mysql_mutex_unlock
(
&
acl_cache
->
lock
);
mysql_mutex_unlock
(
&
acl_cache
->
lock
);
...
@@ -2119,6 +2125,15 @@ void rebuild_check_host(void)
...
@@ -2119,6 +2125,15 @@ void rebuild_check_host(void)
init_check_host
();
init_check_host
();
}
}
static
my_bool
acl_role_propagate_grants
(
ACL_USER
*
role
,
void
*
not_used
__attribute__
((
unused
)))
{
ulong
access
;
get_role_access
(
role
,
&
access
,
TRUE
);
role
->
access
=
access
;
return
0
;
}
/*
/*
Reset a role role_grants dynamic array.
Reset a role role_grants dynamic array.
Also, the role's access bits are reset to the ones present in the table.
Also, the role's access bits are reset to the ones present in the table.
...
@@ -2146,6 +2161,60 @@ my_bool acl_user_reset_grant(ACL_USER *user,
...
@@ -2146,6 +2161,60 @@ my_bool acl_user_reset_grant(ACL_USER *user,
return
0
;
return
0
;
}
}
/*
The function scans through all roles granted to the role passed as argument
and places the permissions in the access variable.
Return values:
TRUE: Error or invalid parameteres
FALSE: All ok;
*/
my_bool
get_role_access
(
ACL_USER
*
role
,
ulong
*
access
,
my_bool
use_initial
)
{
DBUG_ENTER
(
"get_role_access"
);
if
(
!
role
||
!
access
)
DBUG_RETURN
(
1
);
ulong
result
=
0
;
HASH
explored
;
/* temporary hash table to hold all explored roles */
List
<
ACL_USER
*>
queue
;
(
void
)
my_hash_init2
(
&
explored
,
50
,
system_charset_info
,
0
,
0
,
0
,
(
my_hash_get_key
)
acl_role_get_key
,
NULL
,
0
);
my_hash_insert
(
&
explored
,
(
uchar
*
)
role
);
queue
.
push_back
(
&
role
);
while
(
!
queue
.
is_empty
())
{
ACL_USER
*
current
=
*
queue
.
pop
();
result
|=
(
use_initial
)
?
current
->
initial_role_access
:
current
->
access
;
for
(
uint
i
=
0
;
i
<
current
->
role_grants
.
elements
;
i
++
)
{
ACL_USER
*
neighbour
=
*
(
dynamic_element
(
&
current
->
role_grants
,
i
,
ACL_USER
**
));
/* check if the neighbour is a role; pass if not*/
if
(
neighbour
->
host
.
hostname
||
!
find_acl_role
(
neighbour
->
user
.
str
?
current
->
user
.
str
:
""
))
continue
;
/* check if it was already explored */
HASH_SEARCH_STATE
t
;
if
(
my_hash_first
(
&
explored
,
(
uchar
*
)
neighbour
->
user
.
str
,
neighbour
->
user
.
length
,
&
t
))
continue
;
/* add it to the TO-DO exploration queue */
queue
.
push_back
(
&
neighbour
);
my_hash_insert
(
&
explored
,
(
uchar
*
)
neighbour
);
}
}
my_hash_free
(
&
explored
);
*
access
=
result
;
DBUG_RETURN
(
0
);
}
/*
/*
Add a the coresponding pointers present in the mapping to the entries in
Add a the coresponding pointers present in the mapping to the entries in
acl_users and acl_roles
acl_users and acl_roles
...
@@ -2230,6 +2299,9 @@ void rebuild_role_grants(void)
...
@@ -2230,6 +2299,9 @@ void rebuild_role_grants(void)
DBUG_ASSERT
(
status
>=
0
);
DBUG_ASSERT
(
status
>=
0
);
}
}
my_hash_iterate
(
&
acl_roles
,
(
my_hash_walk_action
)
acl_role_propagate_grants
,
NULL
);
DBUG_VOID_RETURN
;
DBUG_VOID_RETURN
;
}
}
/* Return true if there is no users that can match the given host */
/* Return true if there is no users that can match the given host */
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment