| 1 | /*------------------------------------------------------------------------- |
| 2 | * |
| 3 | * schemacmds.c |
| 4 | * schema creation/manipulation commands |
| 5 | * |
| 6 | * Portions Copyright (c) 1996-2019, PostgreSQL Global Development Group |
| 7 | * Portions Copyright (c) 1994, Regents of the University of California |
| 8 | * |
| 9 | * |
| 10 | * IDENTIFICATION |
| 11 | * src/backend/commands/schemacmds.c |
| 12 | * |
| 13 | *------------------------------------------------------------------------- |
| 14 | */ |
| 15 | #include "postgres.h" |
| 16 | |
| 17 | #include "access/htup_details.h" |
| 18 | #include "access/table.h" |
| 19 | #include "access/xact.h" |
| 20 | #include "catalog/catalog.h" |
| 21 | #include "catalog/dependency.h" |
| 22 | #include "catalog/indexing.h" |
| 23 | #include "catalog/namespace.h" |
| 24 | #include "catalog/pg_authid.h" |
| 25 | #include "catalog/objectaccess.h" |
| 26 | #include "catalog/pg_namespace.h" |
| 27 | #include "commands/dbcommands.h" |
| 28 | #include "commands/event_trigger.h" |
| 29 | #include "commands/schemacmds.h" |
| 30 | #include "miscadmin.h" |
| 31 | #include "parser/parse_utilcmd.h" |
| 32 | #include "tcop/utility.h" |
| 33 | #include "utils/acl.h" |
| 34 | #include "utils/builtins.h" |
| 35 | #include "utils/rel.h" |
| 36 | #include "utils/syscache.h" |
| 37 | |
| 38 | |
| 39 | static void AlterSchemaOwner_internal(HeapTuple tup, Relation rel, Oid newOwnerId); |
| 40 | |
| 41 | /* |
| 42 | * CREATE SCHEMA |
| 43 | * |
| 44 | * Note: caller should pass in location information for the whole |
| 45 | * CREATE SCHEMA statement, which in turn we pass down as the location |
| 46 | * of the component commands. This comports with our general plan of |
| 47 | * reporting location/len for the whole command even when executing |
| 48 | * a subquery. |
| 49 | */ |
| 50 | Oid |
| 51 | CreateSchemaCommand(CreateSchemaStmt *stmt, const char *queryString, |
| 52 | int stmt_location, int stmt_len) |
| 53 | { |
| 54 | const char *schemaName = stmt->schemaname; |
| 55 | Oid namespaceId; |
| 56 | OverrideSearchPath *overridePath; |
| 57 | List *parsetree_list; |
| 58 | ListCell *parsetree_item; |
| 59 | Oid owner_uid; |
| 60 | Oid saved_uid; |
| 61 | int save_sec_context; |
| 62 | AclResult aclresult; |
| 63 | ObjectAddress address; |
| 64 | |
| 65 | GetUserIdAndSecContext(&saved_uid, &save_sec_context); |
| 66 | |
| 67 | /* |
| 68 | * Who is supposed to own the new schema? |
| 69 | */ |
| 70 | if (stmt->authrole) |
| 71 | owner_uid = get_rolespec_oid(stmt->authrole, false); |
| 72 | else |
| 73 | owner_uid = saved_uid; |
| 74 | |
| 75 | /* fill schema name with the user name if not specified */ |
| 76 | if (!schemaName) |
| 77 | { |
| 78 | HeapTuple tuple; |
| 79 | |
| 80 | tuple = SearchSysCache1(AUTHOID, ObjectIdGetDatum(owner_uid)); |
| 81 | if (!HeapTupleIsValid(tuple)) |
| 82 | elog(ERROR, "cache lookup failed for role %u" , owner_uid); |
| 83 | schemaName = |
| 84 | pstrdup(NameStr(((Form_pg_authid) GETSTRUCT(tuple))->rolname)); |
| 85 | ReleaseSysCache(tuple); |
| 86 | } |
| 87 | |
| 88 | /* |
| 89 | * To create a schema, must have schema-create privilege on the current |
| 90 | * database and must be able to become the target role (this does not |
| 91 | * imply that the target role itself must have create-schema privilege). |
| 92 | * The latter provision guards against "giveaway" attacks. Note that a |
| 93 | * superuser will always have both of these privileges a fortiori. |
| 94 | */ |
| 95 | aclresult = pg_database_aclcheck(MyDatabaseId, saved_uid, ACL_CREATE); |
| 96 | if (aclresult != ACLCHECK_OK) |
| 97 | aclcheck_error(aclresult, OBJECT_DATABASE, |
| 98 | get_database_name(MyDatabaseId)); |
| 99 | |
| 100 | check_is_member_of_role(saved_uid, owner_uid); |
| 101 | |
| 102 | /* Additional check to protect reserved schema names */ |
| 103 | if (!allowSystemTableMods && IsReservedName(schemaName)) |
| 104 | ereport(ERROR, |
| 105 | (errcode(ERRCODE_RESERVED_NAME), |
| 106 | errmsg("unacceptable schema name \"%s\"" , schemaName), |
| 107 | errdetail("The prefix \"pg_\" is reserved for system schemas." ))); |
| 108 | |
| 109 | /* |
| 110 | * If if_not_exists was given and the schema already exists, bail out. |
| 111 | * (Note: we needn't check this when not if_not_exists, because |
| 112 | * NamespaceCreate will complain anyway.) We could do this before making |
| 113 | * the permissions checks, but since CREATE TABLE IF NOT EXISTS makes its |
| 114 | * creation-permission check first, we do likewise. |
| 115 | */ |
| 116 | if (stmt->if_not_exists && |
| 117 | SearchSysCacheExists1(NAMESPACENAME, PointerGetDatum(schemaName))) |
| 118 | { |
| 119 | ereport(NOTICE, |
| 120 | (errcode(ERRCODE_DUPLICATE_SCHEMA), |
| 121 | errmsg("schema \"%s\" already exists, skipping" , |
| 122 | schemaName))); |
| 123 | return InvalidOid; |
| 124 | } |
| 125 | |
| 126 | /* |
| 127 | * If the requested authorization is different from the current user, |
| 128 | * temporarily set the current user so that the object(s) will be created |
| 129 | * with the correct ownership. |
| 130 | * |
| 131 | * (The setting will be restored at the end of this routine, or in case of |
| 132 | * error, transaction abort will clean things up.) |
| 133 | */ |
| 134 | if (saved_uid != owner_uid) |
| 135 | SetUserIdAndSecContext(owner_uid, |
| 136 | save_sec_context | SECURITY_LOCAL_USERID_CHANGE); |
| 137 | |
| 138 | /* Create the schema's namespace */ |
| 139 | namespaceId = NamespaceCreate(schemaName, owner_uid, false); |
| 140 | |
| 141 | /* Advance cmd counter to make the namespace visible */ |
| 142 | CommandCounterIncrement(); |
| 143 | |
| 144 | /* |
| 145 | * Temporarily make the new namespace be the front of the search path, as |
| 146 | * well as the default creation target namespace. This will be undone at |
| 147 | * the end of this routine, or upon error. |
| 148 | */ |
| 149 | overridePath = GetOverrideSearchPath(CurrentMemoryContext); |
| 150 | overridePath->schemas = lcons_oid(namespaceId, overridePath->schemas); |
| 151 | /* XXX should we clear overridePath->useTemp? */ |
| 152 | PushOverrideSearchPath(overridePath); |
| 153 | |
| 154 | /* |
| 155 | * Report the new schema to possibly interested event triggers. Note we |
| 156 | * must do this here and not in ProcessUtilitySlow because otherwise the |
| 157 | * objects created below are reported before the schema, which would be |
| 158 | * wrong. |
| 159 | */ |
| 160 | ObjectAddressSet(address, NamespaceRelationId, namespaceId); |
| 161 | EventTriggerCollectSimpleCommand(address, InvalidObjectAddress, |
| 162 | (Node *) stmt); |
| 163 | |
| 164 | /* |
| 165 | * Examine the list of commands embedded in the CREATE SCHEMA command, and |
| 166 | * reorganize them into a sequentially executable order with no forward |
| 167 | * references. Note that the result is still a list of raw parsetrees --- |
| 168 | * we cannot, in general, run parse analysis on one statement until we |
| 169 | * have actually executed the prior ones. |
| 170 | */ |
| 171 | parsetree_list = transformCreateSchemaStmt(stmt); |
| 172 | |
| 173 | /* |
| 174 | * Execute each command contained in the CREATE SCHEMA. Since the grammar |
| 175 | * allows only utility commands in CREATE SCHEMA, there is no need to pass |
| 176 | * them through parse_analyze() or the rewriter; we can just hand them |
| 177 | * straight to ProcessUtility. |
| 178 | */ |
| 179 | foreach(parsetree_item, parsetree_list) |
| 180 | { |
| 181 | Node *stmt = (Node *) lfirst(parsetree_item); |
| 182 | PlannedStmt *wrapper; |
| 183 | |
| 184 | /* need to make a wrapper PlannedStmt */ |
| 185 | wrapper = makeNode(PlannedStmt); |
| 186 | wrapper->commandType = CMD_UTILITY; |
| 187 | wrapper->canSetTag = false; |
| 188 | wrapper->utilityStmt = stmt; |
| 189 | wrapper->stmt_location = stmt_location; |
| 190 | wrapper->stmt_len = stmt_len; |
| 191 | |
| 192 | /* do this step */ |
| 193 | ProcessUtility(wrapper, |
| 194 | queryString, |
| 195 | PROCESS_UTILITY_SUBCOMMAND, |
| 196 | NULL, |
| 197 | NULL, |
| 198 | None_Receiver, |
| 199 | NULL); |
| 200 | |
| 201 | /* make sure later steps can see the object created here */ |
| 202 | CommandCounterIncrement(); |
| 203 | } |
| 204 | |
| 205 | /* Reset search path to normal state */ |
| 206 | PopOverrideSearchPath(); |
| 207 | |
| 208 | /* Reset current user and security context */ |
| 209 | SetUserIdAndSecContext(saved_uid, save_sec_context); |
| 210 | |
| 211 | return namespaceId; |
| 212 | } |
| 213 | |
| 214 | /* |
| 215 | * Guts of schema deletion. |
| 216 | */ |
| 217 | void |
| 218 | RemoveSchemaById(Oid schemaOid) |
| 219 | { |
| 220 | Relation relation; |
| 221 | HeapTuple tup; |
| 222 | |
| 223 | relation = table_open(NamespaceRelationId, RowExclusiveLock); |
| 224 | |
| 225 | tup = SearchSysCache1(NAMESPACEOID, |
| 226 | ObjectIdGetDatum(schemaOid)); |
| 227 | if (!HeapTupleIsValid(tup)) /* should not happen */ |
| 228 | elog(ERROR, "cache lookup failed for namespace %u" , schemaOid); |
| 229 | |
| 230 | CatalogTupleDelete(relation, &tup->t_self); |
| 231 | |
| 232 | ReleaseSysCache(tup); |
| 233 | |
| 234 | table_close(relation, RowExclusiveLock); |
| 235 | } |
| 236 | |
| 237 | |
| 238 | /* |
| 239 | * Rename schema |
| 240 | */ |
| 241 | ObjectAddress |
| 242 | RenameSchema(const char *oldname, const char *newname) |
| 243 | { |
| 244 | Oid nspOid; |
| 245 | HeapTuple tup; |
| 246 | Relation rel; |
| 247 | AclResult aclresult; |
| 248 | ObjectAddress address; |
| 249 | Form_pg_namespace nspform; |
| 250 | |
| 251 | rel = table_open(NamespaceRelationId, RowExclusiveLock); |
| 252 | |
| 253 | tup = SearchSysCacheCopy1(NAMESPACENAME, CStringGetDatum(oldname)); |
| 254 | if (!HeapTupleIsValid(tup)) |
| 255 | ereport(ERROR, |
| 256 | (errcode(ERRCODE_UNDEFINED_SCHEMA), |
| 257 | errmsg("schema \"%s\" does not exist" , oldname))); |
| 258 | |
| 259 | nspform = (Form_pg_namespace) GETSTRUCT(tup); |
| 260 | nspOid = nspform->oid; |
| 261 | |
| 262 | /* make sure the new name doesn't exist */ |
| 263 | if (OidIsValid(get_namespace_oid(newname, true))) |
| 264 | ereport(ERROR, |
| 265 | (errcode(ERRCODE_DUPLICATE_SCHEMA), |
| 266 | errmsg("schema \"%s\" already exists" , newname))); |
| 267 | |
| 268 | /* must be owner */ |
| 269 | if (!pg_namespace_ownercheck(nspOid, GetUserId())) |
| 270 | aclcheck_error(ACLCHECK_NOT_OWNER, OBJECT_SCHEMA, |
| 271 | oldname); |
| 272 | |
| 273 | /* must have CREATE privilege on database */ |
| 274 | aclresult = pg_database_aclcheck(MyDatabaseId, GetUserId(), ACL_CREATE); |
| 275 | if (aclresult != ACLCHECK_OK) |
| 276 | aclcheck_error(aclresult, OBJECT_DATABASE, |
| 277 | get_database_name(MyDatabaseId)); |
| 278 | |
| 279 | if (!allowSystemTableMods && IsReservedName(newname)) |
| 280 | ereport(ERROR, |
| 281 | (errcode(ERRCODE_RESERVED_NAME), |
| 282 | errmsg("unacceptable schema name \"%s\"" , newname), |
| 283 | errdetail("The prefix \"pg_\" is reserved for system schemas." ))); |
| 284 | |
| 285 | /* rename */ |
| 286 | namestrcpy(&nspform->nspname, newname); |
| 287 | CatalogTupleUpdate(rel, &tup->t_self, tup); |
| 288 | |
| 289 | InvokeObjectPostAlterHook(NamespaceRelationId, nspOid, 0); |
| 290 | |
| 291 | ObjectAddressSet(address, NamespaceRelationId, nspOid); |
| 292 | |
| 293 | table_close(rel, NoLock); |
| 294 | heap_freetuple(tup); |
| 295 | |
| 296 | return address; |
| 297 | } |
| 298 | |
| 299 | void |
| 300 | AlterSchemaOwner_oid(Oid oid, Oid newOwnerId) |
| 301 | { |
| 302 | HeapTuple tup; |
| 303 | Relation rel; |
| 304 | |
| 305 | rel = table_open(NamespaceRelationId, RowExclusiveLock); |
| 306 | |
| 307 | tup = SearchSysCache1(NAMESPACEOID, ObjectIdGetDatum(oid)); |
| 308 | if (!HeapTupleIsValid(tup)) |
| 309 | elog(ERROR, "cache lookup failed for schema %u" , oid); |
| 310 | |
| 311 | AlterSchemaOwner_internal(tup, rel, newOwnerId); |
| 312 | |
| 313 | ReleaseSysCache(tup); |
| 314 | |
| 315 | table_close(rel, RowExclusiveLock); |
| 316 | } |
| 317 | |
| 318 | |
| 319 | /* |
| 320 | * Change schema owner |
| 321 | */ |
| 322 | ObjectAddress |
| 323 | AlterSchemaOwner(const char *name, Oid newOwnerId) |
| 324 | { |
| 325 | Oid nspOid; |
| 326 | HeapTuple tup; |
| 327 | Relation rel; |
| 328 | ObjectAddress address; |
| 329 | Form_pg_namespace nspform; |
| 330 | |
| 331 | rel = table_open(NamespaceRelationId, RowExclusiveLock); |
| 332 | |
| 333 | tup = SearchSysCache1(NAMESPACENAME, CStringGetDatum(name)); |
| 334 | if (!HeapTupleIsValid(tup)) |
| 335 | ereport(ERROR, |
| 336 | (errcode(ERRCODE_UNDEFINED_SCHEMA), |
| 337 | errmsg("schema \"%s\" does not exist" , name))); |
| 338 | |
| 339 | nspform = (Form_pg_namespace) GETSTRUCT(tup); |
| 340 | nspOid = nspform->oid; |
| 341 | |
| 342 | AlterSchemaOwner_internal(tup, rel, newOwnerId); |
| 343 | |
| 344 | ObjectAddressSet(address, NamespaceRelationId, nspOid); |
| 345 | |
| 346 | ReleaseSysCache(tup); |
| 347 | |
| 348 | table_close(rel, RowExclusiveLock); |
| 349 | |
| 350 | return address; |
| 351 | } |
| 352 | |
| 353 | static void |
| 354 | AlterSchemaOwner_internal(HeapTuple tup, Relation rel, Oid newOwnerId) |
| 355 | { |
| 356 | Form_pg_namespace nspForm; |
| 357 | |
| 358 | Assert(tup->t_tableOid == NamespaceRelationId); |
| 359 | Assert(RelationGetRelid(rel) == NamespaceRelationId); |
| 360 | |
| 361 | nspForm = (Form_pg_namespace) GETSTRUCT(tup); |
| 362 | |
| 363 | /* |
| 364 | * If the new owner is the same as the existing owner, consider the |
| 365 | * command to have succeeded. This is for dump restoration purposes. |
| 366 | */ |
| 367 | if (nspForm->nspowner != newOwnerId) |
| 368 | { |
| 369 | Datum repl_val[Natts_pg_namespace]; |
| 370 | bool repl_null[Natts_pg_namespace]; |
| 371 | bool repl_repl[Natts_pg_namespace]; |
| 372 | Acl *newAcl; |
| 373 | Datum aclDatum; |
| 374 | bool isNull; |
| 375 | HeapTuple newtuple; |
| 376 | AclResult aclresult; |
| 377 | |
| 378 | /* Otherwise, must be owner of the existing object */ |
| 379 | if (!pg_namespace_ownercheck(nspForm->oid, GetUserId())) |
| 380 | aclcheck_error(ACLCHECK_NOT_OWNER, OBJECT_SCHEMA, |
| 381 | NameStr(nspForm->nspname)); |
| 382 | |
| 383 | /* Must be able to become new owner */ |
| 384 | check_is_member_of_role(GetUserId(), newOwnerId); |
| 385 | |
| 386 | /* |
| 387 | * must have create-schema rights |
| 388 | * |
| 389 | * NOTE: This is different from other alter-owner checks in that the |
| 390 | * current user is checked for create privileges instead of the |
| 391 | * destination owner. This is consistent with the CREATE case for |
| 392 | * schemas. Because superusers will always have this right, we need |
| 393 | * no special case for them. |
| 394 | */ |
| 395 | aclresult = pg_database_aclcheck(MyDatabaseId, GetUserId(), |
| 396 | ACL_CREATE); |
| 397 | if (aclresult != ACLCHECK_OK) |
| 398 | aclcheck_error(aclresult, OBJECT_DATABASE, |
| 399 | get_database_name(MyDatabaseId)); |
| 400 | |
| 401 | memset(repl_null, false, sizeof(repl_null)); |
| 402 | memset(repl_repl, false, sizeof(repl_repl)); |
| 403 | |
| 404 | repl_repl[Anum_pg_namespace_nspowner - 1] = true; |
| 405 | repl_val[Anum_pg_namespace_nspowner - 1] = ObjectIdGetDatum(newOwnerId); |
| 406 | |
| 407 | /* |
| 408 | * Determine the modified ACL for the new owner. This is only |
| 409 | * necessary when the ACL is non-null. |
| 410 | */ |
| 411 | aclDatum = SysCacheGetAttr(NAMESPACENAME, tup, |
| 412 | Anum_pg_namespace_nspacl, |
| 413 | &isNull); |
| 414 | if (!isNull) |
| 415 | { |
| 416 | newAcl = aclnewowner(DatumGetAclP(aclDatum), |
| 417 | nspForm->nspowner, newOwnerId); |
| 418 | repl_repl[Anum_pg_namespace_nspacl - 1] = true; |
| 419 | repl_val[Anum_pg_namespace_nspacl - 1] = PointerGetDatum(newAcl); |
| 420 | } |
| 421 | |
| 422 | newtuple = heap_modify_tuple(tup, RelationGetDescr(rel), repl_val, repl_null, repl_repl); |
| 423 | |
| 424 | CatalogTupleUpdate(rel, &newtuple->t_self, newtuple); |
| 425 | |
| 426 | heap_freetuple(newtuple); |
| 427 | |
| 428 | /* Update owner dependency reference */ |
| 429 | changeDependencyOnOwner(NamespaceRelationId, nspForm->oid, |
| 430 | newOwnerId); |
| 431 | } |
| 432 | |
| 433 | InvokeObjectPostAlterHook(NamespaceRelationId, |
| 434 | nspForm->oid, 0); |
| 435 | } |
| 436 | |