| 1 | /* |
| 2 | * This Source Code Form is subject to the terms of the Mozilla Public |
| 3 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 4 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. |
| 5 | * |
| 6 | * Copyright 1997 - July 2008 CWI, August 2008 - 2019 MonetDB B.V. |
| 7 | */ |
| 8 | |
| 9 | #ifndef _MAL_AUTHORIZE_H |
| 10 | #define _MAL_AUTHORIZE_H |
| 11 | |
| 12 | /* #define _DEBUG_AUTH_*/ |
| 13 | #include "mal.h" |
| 14 | #include "mal_instruction.h" |
| 15 | #include "mal_client.h" |
| 16 | |
| 17 | #define MAL_ADMIN 0 |
| 18 | |
| 19 | mal_export str AUTHcheckCredentials(oid *ret, Client c, const char *user, const char *passwd, const char *challenge, const char *algo); |
| 20 | mal_export str AUTHaddUser(oid *ret, Client c, const char *user, const char *pass); |
| 21 | mal_export str AUTHremoveUser(Client c, const char *username); |
| 22 | mal_export str AUTHchangeUsername(Client c, const char *olduser, const char *newuser); |
| 23 | mal_export str AUTHchangePassword(Client c, const char *oldpass, const char *passwd); |
| 24 | mal_export str AUTHsetPassword(Client c, const char *username, const char *passwd); |
| 25 | mal_export str AUTHresolveUser(str *ret, oid uid); |
| 26 | mal_export str AUTHgetUsername(str *ret, Client c); |
| 27 | mal_export str AUTHgetUsers(BAT **ret1, BAT **ret2, Client c); |
| 28 | mal_export str AUTHgetPasswordHash(str *ret, Client c, const char *username); |
| 29 | |
| 30 | mal_export str AUTHinitTables(const char *passwd); |
| 31 | |
| 32 | mal_export str AUTHaddRemoteTableCredentials(const char *local_table, const char *localuser, const char *uri, const char *remoteuser, const char *pass, bool pw_encrypted); |
| 33 | mal_export str AUTHgetRemoteTableCredentials(const char *local_table, str *uri, str *username, str *password); |
| 34 | mal_export str AUTHdeleteRemoteTableCredentials(const char *local_table); |
| 35 | |
| 36 | /* |
| 37 | * Authorisation is based on a password. The passwords are stored hashed |
| 38 | * in a BAT. Access to this BAT is ok from the MAL level, and in |
| 39 | * particular SQL needs it to dump (and later restore) users. |
| 40 | * The database administrator can unlock the BAT that stores the password |
| 41 | * (the vault) by supplying the master password which is the key for the |
| 42 | * cypher algorithm used to store the data. The BAT will never |
| 43 | * contain the plain hashes, as they will be decyphered on the fly when |
| 44 | * needed. A locked vault means noone can log into the system, hence, the |
| 45 | * vault needs to be unlocked as part of the server startup ritual. |
| 46 | */ |
| 47 | mal_export str AUTHunlockVault(const char *password); |
| 48 | |
| 49 | #endif /* _MAL_AUTHORIZE_H */ |
| 50 | |