PostgreSQL Source Code git master
Loading...
Searching...
No Matches
dumputils.h File Reference
#include "libpq-fe.h"
#include "pqexpbuffer.h"
Include dependency graph for dumputils.h:
This graph shows which files directly or indirectly include this file:

Go to the source code of this file.

Macros

#define PGDUMP_STRFTIME_FMT   "%Y-%m-%d %H:%M:%S %Z"
 

Functions

charsanitize_line (const char *str, bool want_hyphen)
 
bool buildACLCommands (const char *name, const char *subname, const char *nspname, const char *type, const char *acls, const char *baseacls, const char *owner, const char *prefix, int remoteVersion, PQExpBuffer sql)
 
bool buildDefaultACLCommands (const char *type, const char *nspname, const char *acls, const char *acldefault, const char *owner, int remoteVersion, PQExpBuffer sql)
 
void quoteAclUserName (PQExpBuffer output, const char *input)
 
void buildShSecLabelQuery (const char *catalog_name, Oid objectId, PQExpBuffer sql)
 
void emitShSecLabels (PGconn *conn, PGresult *res, PQExpBuffer buffer, const char *objtype, const char *objname)
 
bool variable_is_guc_list_quote (const char *name)
 
bool SplitGUCList (char *rawstring, char separator, char ***namelist)
 
void makeAlterConfigCommand (PGconn *conn, const char *configitem, const char *type, const char *name, const char *type2, const char *name2, PQExpBuffer buf)
 
void create_or_open_dir (const char *dirname)
 
chargenerate_restrict_key (void)
 
bool valid_restrict_key (const char *restrict_key)
 

Macro Definition Documentation

◆ PGDUMP_STRFTIME_FMT

#define PGDUMP_STRFTIME_FMT   "%Y-%m-%d %H:%M:%S %Z"

Definition at line 34 of file dumputils.h.

Function Documentation

◆ buildACLCommands()

bool buildACLCommands ( const char name,
const char subname,
const char nspname,
const char type,
const char acls,
const char baseacls,
const char owner,
const char prefix,
int  remoteVersion,
PQExpBuffer  sql 
)
extern

Definition at line 104 of file dumputils.c.

108{
109 bool ok = true;
110 char **aclitems = NULL;
111 char **baseitems = NULL;
112 char **grantitems = NULL;
113 char **revokeitems = NULL;
114 int naclitems = 0;
115 int nbaseitems = 0;
116 int ngrantitems = 0;
117 int nrevokeitems = 0;
118 int i;
120 grantor,
121 privs,
122 privswgo;
124 secondsql;
125
126 /*
127 * If the acl was NULL (initial default state), we need do nothing. Note
128 * that this is distinguishable from all-privileges-revoked, which will
129 * look like an empty array ("{}").
130 */
131 if (acls == NULL || *acls == '\0')
132 return true; /* object has default permissions */
133
134 /* treat empty-string owner same as NULL */
135 if (owner && *owner == '\0')
136 owner = NULL;
137
138 /* Parse the acls array */
140 {
141 free(aclitems);
142 return false;
143 }
144
145 /* Parse the baseacls too */
147 {
148 free(aclitems);
150 return false;
151 }
152
153 /*
154 * Compare the actual ACL with the base ACL, extracting the privileges
155 * that need to be granted (i.e., are in the actual ACL but not the base
156 * ACL) and the ones that need to be revoked (the reverse). We use plain
157 * string comparisons to check for matches. In principle that could be
158 * fooled by extraneous issues such as whitespace, but since all these
159 * strings are the work of aclitemout(), it should be OK in practice.
160 * Besides, a false mismatch will just cause the output to be a little
161 * more verbose than it really needed to be.
162 */
164 for (i = 0; i < naclitems; i++)
165 {
166 bool found = false;
167
168 for (int j = 0; j < nbaseitems; j++)
169 {
170 if (strcmp(aclitems[i], baseitems[j]) == 0)
171 {
172 found = true;
173 break;
174 }
175 }
176 if (!found)
178 }
180 for (i = 0; i < nbaseitems; i++)
181 {
182 bool found = false;
183
184 for (int j = 0; j < naclitems; j++)
185 {
186 if (strcmp(baseitems[i], aclitems[j]) == 0)
187 {
188 found = true;
189 break;
190 }
191 }
192 if (!found)
194 }
195
196 /* Prepare working buffers */
198 grantor = createPQExpBuffer();
201
202 /*
203 * At the end, these two will be pasted together to form the result.
204 */
207
208 /*
209 * Build REVOKE statements for ACLs listed in revokeitems[].
210 */
211 for (i = 0; i < nrevokeitems; i++)
212 {
214 type, name, subname, remoteVersion,
215 grantee, grantor, privs, NULL))
216 {
217 ok = false;
218 break;
219 }
220
221 if (privs->len > 0)
222 {
223 appendPQExpBuffer(firstsql, "%sREVOKE %s ON %s ",
224 prefix, privs->data, type);
225 if (nspname && *nspname)
226 appendPQExpBuffer(firstsql, "%s.", fmtId(nspname));
227 if (name && *name)
230 if (grantee->len == 0)
231 appendPQExpBufferStr(firstsql, "PUBLIC;\n");
232 else
234 fmtId(grantee->data));
235 }
236 }
237
238 /*
239 * At this point we have issued REVOKE statements for all initial and
240 * default privileges that are no longer present on the object, so we are
241 * almost ready to GRANT the privileges listed in grantitems[].
242 *
243 * We still need some hacking though to cover the case where new default
244 * public privileges are added in new versions: the REVOKE ALL will revoke
245 * them, leading to behavior different from what the old version had,
246 * which is generally not what's wanted. So add back default privs if the
247 * source database is too old to have had that particular priv. (As of
248 * right now, no such cases exist in supported versions.)
249 */
250
251 /*
252 * Scan individual ACL items to be granted.
253 *
254 * The order in which privileges appear in the ACL string (the order they
255 * have been GRANT'd in, which the backend maintains) must be preserved to
256 * ensure that GRANTs WITH GRANT OPTION and subsequent GRANTs based on
257 * those are dumped in the correct order. However, some old server
258 * versions will show grants to PUBLIC before the owner's own grants; for
259 * consistency's sake, force the owner's grants to be output first.
260 */
261 for (i = 0; i < ngrantitems; i++)
262 {
263 if (parseAclItem(grantitems[i], type, name, subname, remoteVersion,
264 grantee, grantor, privs, privswgo))
265 {
266 /*
267 * If the grantor isn't the owner, we'll need to use SET SESSION
268 * AUTHORIZATION to become the grantor. Issue the SET/RESET only
269 * if there's something useful to do.
270 */
271 if (privs->len > 0 || privswgo->len > 0)
272 {
274
275 /* Set owner as grantor if that's not explicit in the ACL */
276 if (grantor->len == 0 && owner)
277 printfPQExpBuffer(grantor, "%s", owner);
278
279 /* Make sure owner's own grants are output before others */
280 if (owner &&
281 strcmp(grantee->data, owner) == 0 &&
282 strcmp(grantor->data, owner) == 0)
284 else
286
287 if (grantor->len > 0
288 && (!owner || strcmp(owner, grantor->data) != 0))
289 appendPQExpBuffer(thissql, "SET SESSION AUTHORIZATION %s;\n",
290 fmtId(grantor->data));
291
292 if (privs->len > 0)
293 {
294 appendPQExpBuffer(thissql, "%sGRANT %s ON %s ",
295 prefix, privs->data, type);
296 if (nspname && *nspname)
297 appendPQExpBuffer(thissql, "%s.", fmtId(nspname));
298 if (name && *name)
301 if (grantee->len == 0)
302 appendPQExpBufferStr(thissql, "PUBLIC;\n");
303 else
304 appendPQExpBuffer(thissql, "%s;\n", fmtId(grantee->data));
305 }
306 if (privswgo->len > 0)
307 {
308 appendPQExpBuffer(thissql, "%sGRANT %s ON %s ",
309 prefix, privswgo->data, type);
310 if (nspname && *nspname)
311 appendPQExpBuffer(thissql, "%s.", fmtId(nspname));
312 if (name && *name)
315 if (grantee->len == 0)
316 appendPQExpBufferStr(thissql, "PUBLIC");
317 else
319 appendPQExpBufferStr(thissql, " WITH GRANT OPTION;\n");
320 }
321
322 if (grantor->len > 0
323 && (!owner || strcmp(owner, grantor->data) != 0))
324 appendPQExpBufferStr(thissql, "RESET SESSION AUTHORIZATION;\n");
325 }
326 }
327 else
328 {
329 /* parseAclItem failed, give up */
330 ok = false;
331 break;
332 }
333 }
334
336 destroyPQExpBuffer(grantor);
339
340 appendPQExpBuffer(sql, "%s%s", firstsql->data, secondsql->data);
343
344 free(aclitems);
348
349 return ok;
350}
static bool parseAclItem(const char *item, const char *type, const char *name, const char *subname, int remoteVersion, PQExpBuffer grantee, PQExpBuffer grantor, PQExpBuffer privs, PQExpBuffer privswgo)
Definition dumputils.c:423
#define pg_malloc_array(type, count)
Definition fe_memutils.h:56
int j
Definition isn.c:78
int i
Definition isn.c:77
NameData subname
void printfPQExpBuffer(PQExpBuffer str, const char *fmt,...)
PQExpBuffer createPQExpBuffer(void)
Definition pqexpbuffer.c:72
void appendPQExpBuffer(PQExpBuffer str, const char *fmt,...)
void destroyPQExpBuffer(PQExpBuffer str)
void appendPQExpBufferStr(PQExpBuffer str, const char *data)
static int fb(int x)
#define free(a)
const char * fmtId(const char *rawid)
bool parsePGArray(const char *atext, char ***itemarray, int *nitems)
const char * type
const char * name

References appendPQExpBuffer(), appendPQExpBufferStr(), createPQExpBuffer(), PQExpBufferData::data, destroyPQExpBuffer(), fb(), fmtId(), free, i, j, PQExpBufferData::len, name, parseAclItem(), parsePGArray(), pg_malloc_array, printfPQExpBuffer(), subname, and type.

Referenced by buildDefaultACLCommands(), dumpACL(), dumpRoleGUCPrivs(), and dumpTablespaces().

◆ buildDefaultACLCommands()

bool buildDefaultACLCommands ( const char type,
const char nspname,
const char acls,
const char acldefault,
const char owner,
int  remoteVersion,
PQExpBuffer  sql 
)
extern

Definition at line 366 of file dumputils.c.

371{
372 PQExpBuffer prefix;
373
374 prefix = createPQExpBuffer();
375
376 /*
377 * We incorporate the target role directly into the command, rather than
378 * playing around with SET ROLE or anything like that. This is so that a
379 * permissions error leads to nothing happening, rather than changing
380 * default privileges for the wrong user.
381 */
382 appendPQExpBuffer(prefix, "ALTER DEFAULT PRIVILEGES FOR ROLE %s ",
383 fmtId(owner));
384 if (nspname)
385 appendPQExpBuffer(prefix, "IN SCHEMA %s ", fmtId(nspname));
386
387 /*
388 * There's no such thing as initprivs for a default ACL, so the base ACL
389 * is always just the object-type-specific default.
390 */
391 if (!buildACLCommands("", NULL, NULL, type,
392 acls, acldefault, owner,
393 prefix->data, remoteVersion, sql))
394 {
395 destroyPQExpBuffer(prefix);
396 return false;
397 }
398
399 destroyPQExpBuffer(prefix);
400
401 return true;
402}
Acl * acldefault(ObjectType objtype, Oid ownerId)
Definition acl.c:827
bool buildACLCommands(const char *name, const char *subname, const char *nspname, const char *type, const char *acls, const char *baseacls, const char *owner, const char *prefix, int remoteVersion, PQExpBuffer sql)
Definition dumputils.c:104

References acldefault(), appendPQExpBuffer(), buildACLCommands(), createPQExpBuffer(), PQExpBufferData::data, destroyPQExpBuffer(), fb(), fmtId(), and type.

Referenced by dumpDefaultACL().

◆ buildShSecLabelQuery()

void buildShSecLabelQuery ( const char catalog_name,
Oid  objectId,
PQExpBuffer  sql 
)
extern

Definition at line 681 of file dumputils.c.

683{
685 "SELECT provider, label FROM pg_catalog.pg_shseclabel "
686 "WHERE classoid = 'pg_catalog.%s'::pg_catalog.regclass "
687 "AND objoid = '%u'", catalog_name, objectId);
688}

References appendPQExpBuffer(), and fb().

Referenced by buildShSecLabels(), and dumpDatabase().

◆ create_or_open_dir()

void create_or_open_dir ( const char dirname)
extern

Definition at line 943 of file dumputils.c.

944{
945 int ret;
946
947 switch ((ret = pg_check_dir(dirname)))
948 {
949 case -1:
950 /* opendir failed but not with ENOENT */
951 pg_fatal("could not open directory \"%s\": %m", dirname);
952 break;
953 case 0:
954 /* directory does not exist */
955 if (mkdir(dirname, pg_dir_create_mode) < 0)
956 pg_fatal("could not create directory \"%s\": %m", dirname);
957 break;
958 case 1:
959 /* exists and is empty, fix perms */
960 if (chmod(dirname, pg_dir_create_mode) != 0)
961 pg_fatal("could not change permissions of directory \"%s\": %m",
962 dirname);
963 break;
964 default:
965 /* exists and is not empty */
966 pg_fatal("directory \"%s\" is not empty", dirname);
967 }
968}
int pg_dir_create_mode
Definition file_perm.c:18
#define pg_fatal(...)
int pg_check_dir(const char *dir)
Definition pgcheckdir.c:33
#define mkdir(a, b)
Definition win32_port.h:80

References fb(), mkdir, pg_check_dir(), pg_dir_create_mode, and pg_fatal.

Referenced by InitArchiveFmt_Directory(), and main().

◆ emitShSecLabels()

void emitShSecLabels ( PGconn conn,
PGresult res,
PQExpBuffer  buffer,
const char objtype,
const char objname 
)
extern

Definition at line 699 of file dumputils.c.

701{
702 int i;
703
704 for (i = 0; i < PQntuples(res); i++)
705 {
706 char *provider = PQgetvalue(res, i, 0);
707 char *label = PQgetvalue(res, i, 1);
708
709 /* must use fmtId result before calling it again */
710 appendPQExpBuffer(buffer,
711 "SECURITY LABEL FOR %s ON %s",
712 fmtId(provider), objtype);
713 appendPQExpBuffer(buffer,
714 " %s IS ",
715 fmtId(objname));
717 appendPQExpBufferStr(buffer, ";\n");
718 }
719}
#define PQgetvalue
#define PQntuples
static char * label
PGconn * conn
Definition streamutil.c:52
void appendStringLiteralConn(PQExpBuffer buf, const char *str, PGconn *conn)

References appendPQExpBuffer(), appendPQExpBufferStr(), appendStringLiteralConn(), conn, fmtId(), i, label, PQgetvalue, and PQntuples.

Referenced by buildShSecLabels(), and dumpDatabase().

◆ generate_restrict_key()

char * generate_restrict_key ( void  )
extern

Definition at line 976 of file dumputils.c.

977{
978 uint8 buf[64];
979 char *ret = palloc(sizeof(buf));
980
981 if (!pg_strong_random(buf, sizeof(buf)))
982 return NULL;
983
984 for (int i = 0; i < sizeof(buf) - 1; i++)
985 {
987
988 ret[i] = restrict_chars[idx];
989 }
990 ret[sizeof(buf) - 1] = '\0';
991
992 return ret;
993}
Datum idx(PG_FUNCTION_ARGS)
Definition _int_op.c:262
uint8_t uint8
Definition c.h:616
static const char restrict_chars[]
Definition dumputils.c:24
void * palloc(Size size)
Definition mcxt.c:1387
static char buf[DEFAULT_XLOG_SEG_SIZE]
bool pg_strong_random(void *buf, size_t len)

References buf, fb(), i, idx(), palloc(), pg_strong_random(), and restrict_chars.

Referenced by main(), and main().

◆ makeAlterConfigCommand()

void makeAlterConfigCommand ( PGconn conn,
const char configitem,
const char type,
const char name,
const char type2,
const char name2,
PQExpBuffer  buf 
)
extern

Definition at line 868 of file dumputils.c.

872{
873 char *mine;
874 char *pos;
875
876 /* Parse the configitem. If we can't find an "=", silently do nothing. */
878 pos = strchr(mine, '=');
879 if (pos == NULL)
880 {
881 pg_free(mine);
882 return;
883 }
884 *pos++ = '\0';
885
886 /* Build the command, with suitable quoting for everything. */
887 appendPQExpBuffer(buf, "ALTER %s %s ", type, fmtId(name));
888 if (type2 != NULL && name2 != NULL)
889 appendPQExpBuffer(buf, "IN %s %s ", type2, fmtId(name2));
890 appendPQExpBuffer(buf, "SET %s TO ", fmtId(mine));
891
892 /*
893 * Variables that are marked GUC_LIST_QUOTE were already fully quoted by
894 * flatten_set_variable_args() before they were put into the setconfig
895 * array. However, because the quoting rules used there aren't exactly
896 * like SQL's, we have to break the list value apart and then quote the
897 * elements as string literals. (The elements may be double-quoted as-is,
898 * but we can't just feed them to the SQL parser; it would do the wrong
899 * thing with elements that are zero-length or longer than NAMEDATALEN.)
900 * Also, we need a special case for empty lists.
901 *
902 * Variables that are not so marked should just be emitted as simple
903 * string literals. If the variable is not known to
904 * variable_is_guc_list_quote(), we'll do that; this makes it unsafe to
905 * use GUC_LIST_QUOTE for extension variables.
906 */
908 {
909 char **namelist;
910 char **nameptr;
911
912 /* Parse string into list of identifiers */
913 /* this shouldn't fail really */
914 if (SplitGUCList(pos, ',', &namelist))
915 {
916 /* Special case: represent an empty list as NULL */
917 if (*namelist == NULL)
918 appendPQExpBufferStr(buf, "NULL");
919 for (nameptr = namelist; *nameptr; nameptr++)
920 {
921 if (nameptr != namelist)
924 }
925 }
927 }
928 else
930
932
933 pg_free(mine);
934}
bool variable_is_guc_list_quote(const char *name)
Definition dumputils.c:733
bool SplitGUCList(char *rawstring, char separator, char ***namelist)
Definition dumputils.c:768
char * pg_strdup(const char *in)
Definition fe_memutils.c:85
void pg_free(void *ptr)

References appendPQExpBuffer(), appendPQExpBufferStr(), appendStringLiteralConn(), buf, conn, fb(), fmtId(), name, pg_free(), pg_strdup(), SplitGUCList(), type, and variable_is_guc_list_quote().

Referenced by dumpDatabaseConfig(), and dumpUserConfig().

◆ quoteAclUserName()

void quoteAclUserName ( PQExpBuffer  output,
const char input 
)
extern

Definition at line 588 of file dumputils.c.

589{
590 const char *src;
591 bool safe = true;
592
593 for (src = input; *src; src++)
594 {
595 /* This test had better match what putid() does */
596 if (!isalnum((unsigned char) *src) && *src != '_')
597 {
598 safe = false;
599 break;
600 }
601 }
602 if (!safe)
604 for (src = input; *src; src++)
605 {
606 /* A double quote character in a username is encoded as "" */
607 if (*src == '"')
610 }
611 if (!safe)
613}
FILE * input
FILE * output
void appendPQExpBufferChar(PQExpBuffer str, char ch)

References appendPQExpBufferChar(), fb(), input, and output.

Referenced by getNamespaces().

◆ sanitize_line()

char * sanitize_line ( const char str,
bool  want_hyphen 
)
extern

Definition at line 52 of file dumputils.c.

53{
54 char *result;
55 char *s;
56
57 if (!str)
58 return pg_strdup(want_hyphen ? "-" : "");
59
60 result = pg_strdup(str);
61
62 for (s = result; *s != '\0'; s++)
63 {
64 if (*s == '\n' || *s == '\r')
65 *s = ' ';
66 }
67
68 return result;
69}
const char * str

References fb(), pg_strdup(), and str.

Referenced by _printTocEntry(), dumpDatabases(), dumpTableData(), dumpUserConfig(), and PrintTOCSummary().

◆ SplitGUCList()

bool SplitGUCList ( char rawstring,
char  separator,
char ***  namelist 
)
extern

Definition at line 768 of file dumputils.c.

770{
771 char *nextp = rawstring;
772 bool done = false;
773 char **nextptr;
774
775 /*
776 * Since we disallow empty identifiers, this is a conservative
777 * overestimate of the number of pointers we could need. Allow one for
778 * list terminator.
779 */
780 *namelist = nextptr =
781 pg_malloc_array(char *, (strlen(rawstring) / 2 + 2));
782 *nextptr = NULL;
783
784 while (isspace((unsigned char) *nextp))
785 nextp++; /* skip leading whitespace */
786
787 if (*nextp == '\0')
788 return true; /* empty string represents empty list */
789
790 /* At the top of the loop, we are at start of a new identifier. */
791 do
792 {
793 char *curname;
794 char *endp;
795
796 if (*nextp == '"')
797 {
798 /* Quoted name --- collapse quote-quote pairs */
799 curname = nextp + 1;
800 for (;;)
801 {
802 endp = strchr(nextp + 1, '"');
803 if (endp == NULL)
804 return false; /* mismatched quotes */
805 if (endp[1] != '"')
806 break; /* found end of quoted name */
807 /* Collapse adjacent quotes into one quote, and look again */
808 memmove(endp, endp + 1, strlen(endp));
809 nextp = endp;
810 }
811 /* endp now points at the terminating quote */
812 nextp = endp + 1;
813 }
814 else
815 {
816 /* Unquoted name --- extends to separator or whitespace */
817 curname = nextp;
818 while (*nextp && *nextp != separator &&
819 !isspace((unsigned char) *nextp))
820 nextp++;
821 endp = nextp;
822 if (curname == nextp)
823 return false; /* empty unquoted name not allowed */
824 }
825
826 while (isspace((unsigned char) *nextp))
827 nextp++; /* skip trailing whitespace */
828
829 if (*nextp == separator)
830 {
831 nextp++;
832 while (isspace((unsigned char) *nextp))
833 nextp++; /* skip leading whitespace for next */
834 /* we expect another name, so done remains false */
835 }
836 else if (*nextp == '\0')
837 done = true;
838 else
839 return false; /* invalid syntax */
840
841 /* Now safe to overwrite separator with a null */
842 *endp = '\0';
843
844 /*
845 * Finished isolating current name --- add it to output array
846 */
847 *nextptr++ = curname;
848
849 /* Loop back if we didn't reach end of string */
850 } while (!done);
851
852 *nextptr = NULL;
853 return true;
854}

References fb(), and pg_malloc_array.

Referenced by makeAlterConfigCommand().

◆ valid_restrict_key()

bool valid_restrict_key ( const char restrict_key)
extern

Definition at line 1000 of file dumputils.c.

1001{
1002 return restrict_key != NULL &&
1003 restrict_key[0] != '\0' &&
1005}
static char * restrict_key
Definition pg_dumpall.c:138

References fb(), restrict_chars, and restrict_key.

Referenced by main(), and main().

◆ variable_is_guc_list_quote()

bool variable_is_guc_list_quote ( const char name)
extern

Definition at line 733 of file dumputils.c.

734{
735 if (pg_strcasecmp(name, "local_preload_libraries") == 0 ||
736 pg_strcasecmp(name, "oauth_validator_libraries") == 0 ||
737 pg_strcasecmp(name, "search_path") == 0 ||
738 pg_strcasecmp(name, "session_preload_libraries") == 0 ||
739 pg_strcasecmp(name, "shared_preload_libraries") == 0 ||
740 pg_strcasecmp(name, "temp_tablespaces") == 0 ||
741 pg_strcasecmp(name, "unix_socket_directories") == 0)
742 return true;
743 else
744 return false;
745}
int pg_strcasecmp(const char *s1, const char *s2)

References name, and pg_strcasecmp().

Referenced by dumpFunc(), and makeAlterConfigCommand().