PostgreSQL Source Code git master
Loading...
Searching...
No Matches
seclabel.c
Go to the documentation of this file.
1/* -------------------------------------------------------------------------
2 *
3 * seclabel.c
4 * routines to support security label feature.
5 *
6 * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 * Portions Copyright (c) 1994, Regents of the University of California
8 *
9 * -------------------------------------------------------------------------
10 */
11#include "postgres.h"
12
13#include "access/genam.h"
14#include "access/htup_details.h"
15#include "access/relation.h"
16#include "access/table.h"
17#include "catalog/catalog.h"
18#include "catalog/indexing.h"
19#include "catalog/pg_seclabel.h"
21#include "commands/seclabel.h"
22#include "miscadmin.h"
23#include "utils/builtins.h"
24#include "utils/fmgroids.h"
25#include "utils/memutils.h"
26#include "utils/rel.h"
27
33
35
36static bool
38{
39 switch (objtype)
40 {
42 case OBJECT_COLUMN:
43 case OBJECT_DATABASE:
44 case OBJECT_DOMAIN:
47 case OBJECT_FUNCTION:
48 case OBJECT_LANGUAGE:
50 case OBJECT_MATVIEW:
53 case OBJECT_ROLE:
54 case OBJECT_ROUTINE:
55 case OBJECT_SCHEMA:
56 case OBJECT_SEQUENCE:
58 case OBJECT_TABLE:
60 case OBJECT_TYPE:
61 case OBJECT_VIEW:
62 return true;
63
65 case OBJECT_AMOP:
66 case OBJECT_AMPROC:
68 case OBJECT_CAST:
71 case OBJECT_DEFAULT:
72 case OBJECT_DEFACL:
75 case OBJECT_FDW:
77 case OBJECT_INDEX:
78 case OBJECT_OPCLASS:
79 case OBJECT_OPERATOR:
80 case OBJECT_OPFAMILY:
82 case OBJECT_POLICY:
85 case OBJECT_RULE:
89 case OBJECT_TRIGGER:
92 case OBJECT_TSPARSER:
95 return false;
96
97 /*
98 * There's intentionally no default: case here; we want the
99 * compiler to warn if a new ObjectType hasn't been handled above.
100 */
101 }
102
103 /* Shouldn't get here, but if we do, say "no support" */
104 return false;
105}
106
107/*
108 * ExecSecLabelStmt --
109 *
110 * Apply a security label to a database object.
111 *
112 * Returns the ObjectAddress of the object to which the policy was applied.
113 */
116{
118 ObjectAddress address;
119 Relation relation;
120 ListCell *lc;
121
122 /*
123 * Find the named label provider, or if none specified, check whether
124 * there's exactly one, and if so use it.
125 */
126 if (stmt->provider == NULL)
127 {
131 errmsg("no security label providers have been loaded")));
135 errmsg("must specify provider when multiple security label providers have been loaded")));
137 }
138 else
139 {
140 foreach(lc, label_provider_list)
141 {
143
144 if (strcmp(stmt->provider, lp->provider_name) == 0)
145 {
146 provider = lp;
147 break;
148 }
149 }
150 if (provider == NULL)
153 errmsg("security label provider \"%s\" is not loaded",
154 stmt->provider)));
155 }
156
157 if (!SecLabelSupportsObjectType(stmt->objtype))
160 errmsg("security labels are not supported for this type of object")));
161
162 /*
163 * Translate the parser representation which identifies this object into
164 * an ObjectAddress. get_object_address() will throw an error if the
165 * object does not exist, and will also acquire a lock on the target to
166 * guard against concurrent modifications.
167 */
168 address = get_object_address(stmt->objtype, stmt->object,
169 &relation, ShareUpdateExclusiveLock, false);
170
171 /* Require ownership of the target object. */
172 check_object_ownership(GetUserId(), stmt->objtype, address,
173 stmt->object, relation);
174
175 /* Perform other integrity checks as needed. */
176 switch (stmt->objtype)
177 {
178 case OBJECT_COLUMN:
179
180 /*
181 * Allow security labels only on columns of tables, views,
182 * materialized views, composite types, and foreign tables (which
183 * are the only relkinds for which pg_dump will dump labels).
184 */
185 if (relation->rd_rel->relkind != RELKIND_RELATION &&
186 relation->rd_rel->relkind != RELKIND_VIEW &&
187 relation->rd_rel->relkind != RELKIND_MATVIEW &&
188 relation->rd_rel->relkind != RELKIND_COMPOSITE_TYPE &&
189 relation->rd_rel->relkind != RELKIND_FOREIGN_TABLE &&
190 relation->rd_rel->relkind != RELKIND_PARTITIONED_TABLE)
193 errmsg("cannot set security label on relation \"%s\"",
194 RelationGetRelationName(relation)),
195 errdetail_relkind_not_supported(relation->rd_rel->relkind)));
196 break;
197 default:
198 break;
199 }
200
201 /* Provider gets control here, may throw ERROR to veto new label. */
202 provider->hook(&address, stmt->label);
203
204 /* Apply new label. */
205 SetSecurityLabel(&address, provider->provider_name, stmt->label);
206
207 /*
208 * If get_object_address() opened the relation for us, we close it to keep
209 * the reference count correct - but we retain any locks acquired by
210 * get_object_address() until commit time, to guard against concurrent
211 * activity.
212 */
213 if (relation != NULL)
214 relation_close(relation, NoLock);
215
216 return address;
217}
218
219/*
220 * GetSharedSecurityLabel returns the security label for a shared object for
221 * a given provider, or NULL if there is no such label.
222 */
223static char *
225{
227 ScanKeyData keys[3];
228 SysScanDesc scan;
229 HeapTuple tuple;
230 Datum datum;
231 bool isnull;
232 char *seclabel = NULL;
233
234 ScanKeyInit(&keys[0],
237 ObjectIdGetDatum(object->objectId));
238 ScanKeyInit(&keys[1],
241 ObjectIdGetDatum(object->classId));
242 ScanKeyInit(&keys[2],
246
248
251
252 tuple = systable_getnext(scan);
253 if (HeapTupleIsValid(tuple))
254 {
257 if (!isnull)
259 }
260 systable_endscan(scan);
261
263
264 return seclabel;
265}
266
267/*
268 * GetSecurityLabel returns the security label for a shared or database object
269 * for a given provider, or NULL if there is no such label.
270 */
271char *
272GetSecurityLabel(const ObjectAddress *object, const char *provider)
273{
275 ScanKeyData keys[4];
276 SysScanDesc scan;
277 HeapTuple tuple;
278 Datum datum;
279 bool isnull;
280 char *seclabel = NULL;
281
282 /* Shared objects have their own security label catalog. */
283 if (IsSharedRelation(object->classId))
284 return GetSharedSecurityLabel(object, provider);
285
286 /* Must be an unshared object, so examine pg_seclabel. */
287 ScanKeyInit(&keys[0],
290 ObjectIdGetDatum(object->objectId));
291 ScanKeyInit(&keys[1],
294 ObjectIdGetDatum(object->classId));
295 ScanKeyInit(&keys[2],
298 Int32GetDatum(object->objectSubId));
299 ScanKeyInit(&keys[3],
303
305
307 NULL, 4, keys);
308
309 tuple = systable_getnext(scan);
310 if (HeapTupleIsValid(tuple))
311 {
313 RelationGetDescr(pg_seclabel), &isnull);
314 if (!isnull)
316 }
317 systable_endscan(scan);
318
320
321 return seclabel;
322}
323
324/*
325 * SetSharedSecurityLabel is a helper function of SetSecurityLabel to
326 * handle shared database objects.
327 */
328static void
330 const char *provider, const char *label)
331{
333 ScanKeyData keys[4];
334 SysScanDesc scan;
338 bool nulls[Natts_pg_shseclabel];
340
341 /* Prepare to form or update a tuple, if necessary. */
342 memset(nulls, false, sizeof(nulls));
343 memset(replaces, false, sizeof(replaces));
347 if (label != NULL)
349
350 /* Use the index to search for a matching old tuple */
351 ScanKeyInit(&keys[0],
354 ObjectIdGetDatum(object->objectId));
355 ScanKeyInit(&keys[1],
358 ObjectIdGetDatum(object->classId));
359 ScanKeyInit(&keys[2],
363
365
367 NULL, 3, keys);
368
369 oldtup = systable_getnext(scan);
371 {
372 if (label == NULL)
374 else
375 {
378 values, nulls, replaces);
380 }
381 }
382 systable_endscan(scan);
383
384 /* If we didn't find an old tuple, insert a new one */
385 if (newtup == NULL && label != NULL)
386 {
388 values, nulls);
390 }
391
392 if (newtup != NULL)
394
396}
397
398/*
399 * SetSecurityLabel attempts to set the security label for the specified
400 * provider on the specified object to the given value. NULL means that any
401 * existing label should be deleted.
402 */
403void
405 const char *provider, const char *label)
406{
408 ScanKeyData keys[4];
409 SysScanDesc scan;
413 bool nulls[Natts_pg_seclabel];
415
416 /* Shared objects have their own security label catalog. */
417 if (IsSharedRelation(object->classId))
418 {
420 return;
421 }
422
423 /* Prepare to form or update a tuple, if necessary. */
424 memset(nulls, false, sizeof(nulls));
425 memset(replaces, false, sizeof(replaces));
430 if (label != NULL)
432
433 /* Use the index to search for a matching old tuple */
434 ScanKeyInit(&keys[0],
437 ObjectIdGetDatum(object->objectId));
438 ScanKeyInit(&keys[1],
441 ObjectIdGetDatum(object->classId));
442 ScanKeyInit(&keys[2],
445 Int32GetDatum(object->objectSubId));
446 ScanKeyInit(&keys[3],
450
452
454 NULL, 4, keys);
455
456 oldtup = systable_getnext(scan);
458 {
459 if (label == NULL)
461 else
462 {
465 values, nulls, replaces);
467 }
468 }
469 systable_endscan(scan);
470
471 /* If we didn't find an old tuple, insert a new one */
472 if (newtup == NULL && label != NULL)
473 {
475 values, nulls);
477 }
478
479 /* Update indexes, if necessary */
480 if (newtup != NULL)
482
484}
485
486/*
487 * DeleteSharedSecurityLabel is a helper function of DeleteSecurityLabel
488 * to handle shared database objects.
489 */
490void
517
518/*
519 * DeleteSecurityLabel removes all security labels for an object (and any
520 * sub-objects, if applicable).
521 */
522void
524{
526 ScanKeyData skey[3];
527 SysScanDesc scan;
529 int nkeys;
530
531 /* Shared objects have their own security label catalog. */
532 if (IsSharedRelation(object->classId))
533 {
534 Assert(object->objectSubId == 0);
536 return;
537 }
538
539 ScanKeyInit(&skey[0],
542 ObjectIdGetDatum(object->objectId));
543 ScanKeyInit(&skey[1],
546 ObjectIdGetDatum(object->classId));
547 if (object->objectSubId != 0)
548 {
549 ScanKeyInit(&skey[2],
552 Int32GetDatum(object->objectSubId));
553 nkeys = 3;
554 }
555 else
556 nkeys = 2;
557
559
561 NULL, nkeys, skey);
564 systable_endscan(scan);
565
567}
568
569void
static Datum values[MAXATTR]
Definition bootstrap.c:155
#define CStringGetTextDatum(s)
Definition builtins.h:97
#define TextDatumGetCString(d)
Definition builtins.h:98
#define Assert(condition)
Definition c.h:873
bool IsSharedRelation(Oid relationId)
Definition catalog.c:304
int errcode(int sqlerrcode)
Definition elog.c:863
int errmsg(const char *fmt,...)
Definition elog.c:1080
#define ERROR
Definition elog.h:39
#define ereport(elevel,...)
Definition elog.h:150
#define palloc_object(type)
Definition fe_memutils.h:74
void systable_endscan(SysScanDesc sysscan)
Definition genam.c:603
HeapTuple systable_getnext(SysScanDesc sysscan)
Definition genam.c:514
SysScanDesc systable_beginscan(Relation heapRelation, Oid indexId, bool indexOK, Snapshot snapshot, int nkeys, ScanKey key)
Definition genam.c:388
HeapTuple heap_modify_tuple(HeapTuple tuple, TupleDesc tupleDesc, const Datum *replValues, const bool *replIsnull, const bool *doReplace)
Definition heaptuple.c:1210
HeapTuple heap_form_tuple(TupleDesc tupleDescriptor, const Datum *values, const bool *isnull)
Definition heaptuple.c:1117
void heap_freetuple(HeapTuple htup)
Definition heaptuple.c:1435
#define HeapTupleIsValid(tuple)
Definition htup.h:78
static Datum heap_getattr(HeapTuple tup, int attnum, TupleDesc tupleDesc, bool *isnull)
#define stmt
void CatalogTupleUpdate(Relation heapRel, const ItemPointerData *otid, HeapTuple tup)
Definition indexing.c:313
void CatalogTupleInsert(Relation heapRel, HeapTuple tup)
Definition indexing.c:233
void CatalogTupleDelete(Relation heapRel, const ItemPointerData *tid)
Definition indexing.c:365
List * lappend(List *list, void *datum)
Definition list.c:339
#define NoLock
Definition lockdefs.h:34
#define AccessShareLock
Definition lockdefs.h:36
#define ShareUpdateExclusiveLock
Definition lockdefs.h:39
#define RowExclusiveLock
Definition lockdefs.h:38
char * pstrdup(const char *in)
Definition mcxt.c:1781
MemoryContext TopMemoryContext
Definition mcxt.c:166
Oid GetUserId(void)
Definition miscinit.c:469
void check_object_ownership(Oid roleid, ObjectType objtype, ObjectAddress address, Node *object, Relation relation)
ObjectAddress get_object_address(ObjectType objtype, Node *object, Relation *relp, LOCKMODE lockmode, bool missing_ok)
static MemoryContext MemoryContextSwitchTo(MemoryContext context)
Definition palloc.h:124
ObjectType
@ OBJECT_EVENT_TRIGGER
@ OBJECT_FDW
@ OBJECT_TSPARSER
@ OBJECT_COLLATION
@ OBJECT_USER_MAPPING
@ OBJECT_ACCESS_METHOD
@ OBJECT_OPCLASS
@ OBJECT_DEFACL
@ OBJECT_AGGREGATE
@ OBJECT_MATVIEW
@ OBJECT_SCHEMA
@ OBJECT_POLICY
@ OBJECT_OPERATOR
@ OBJECT_FOREIGN_TABLE
@ OBJECT_TSCONFIGURATION
@ OBJECT_OPFAMILY
@ OBJECT_DOMAIN
@ OBJECT_COLUMN
@ OBJECT_TABLESPACE
@ OBJECT_ROLE
@ OBJECT_ROUTINE
@ OBJECT_LARGEOBJECT
@ OBJECT_PUBLICATION_NAMESPACE
@ OBJECT_PROCEDURE
@ OBJECT_EXTENSION
@ OBJECT_INDEX
@ OBJECT_DEFAULT
@ OBJECT_DATABASE
@ OBJECT_SEQUENCE
@ OBJECT_TSTEMPLATE
@ OBJECT_LANGUAGE
@ OBJECT_AMOP
@ OBJECT_PUBLICATION_REL
@ OBJECT_FOREIGN_SERVER
@ OBJECT_TSDICTIONARY
@ OBJECT_ATTRIBUTE
@ OBJECT_PUBLICATION
@ OBJECT_RULE
@ OBJECT_CONVERSION
@ OBJECT_AMPROC
@ OBJECT_TABLE
@ OBJECT_VIEW
@ OBJECT_PARAMETER_ACL
@ OBJECT_TYPE
@ OBJECT_FUNCTION
@ OBJECT_TABCONSTRAINT
@ OBJECT_DOMCONSTRAINT
@ OBJECT_SUBSCRIPTION
@ OBJECT_STATISTIC_EXT
@ OBJECT_CAST
@ OBJECT_TRIGGER
@ OBJECT_TRANSFORM
static char * label
int errdetail_relkind_not_supported(char relkind)
Definition pg_class.c:24
#define lfirst(lc)
Definition pg_list.h:172
static int list_length(const List *l)
Definition pg_list.h:152
#define NIL
Definition pg_list.h:68
#define linitial(l)
Definition pg_list.h:178
static Datum ObjectIdGetDatum(Oid X)
Definition postgres.h:262
uint64_t Datum
Definition postgres.h:70
static Datum Int32GetDatum(int32 X)
Definition postgres.h:222
unsigned int Oid
static int fb(int x)
#define RelationGetDescr(relation)
Definition rel.h:540
#define RelationGetRelationName(relation)
Definition rel.h:548
bool criticalSharedRelcachesBuilt
Definition relcache.c:146
void ScanKeyInit(ScanKey entry, AttrNumber attributeNumber, StrategyNumber strategy, RegProcedure procedure, Datum argument)
Definition scankey.c:76
static char * GetSharedSecurityLabel(const ObjectAddress *object, const char *provider)
Definition seclabel.c:224
void SetSecurityLabel(const ObjectAddress *object, const char *provider, const char *label)
Definition seclabel.c:404
ObjectAddress ExecSecLabelStmt(SecLabelStmt *stmt)
Definition seclabel.c:115
void register_label_provider(const char *provider_name, check_object_relabel_type hook)
Definition seclabel.c:570
static List * label_provider_list
Definition seclabel.c:34
static bool SecLabelSupportsObjectType(ObjectType objtype)
Definition seclabel.c:37
char * GetSecurityLabel(const ObjectAddress *object, const char *provider)
Definition seclabel.c:272
static void SetSharedSecurityLabel(const ObjectAddress *object, const char *provider, const char *label)
Definition seclabel.c:329
void DeleteSecurityLabel(const ObjectAddress *object)
Definition seclabel.c:523
void DeleteSharedSecurityLabel(Oid objectId, Oid classId)
Definition seclabel.c:491
void(* check_object_relabel_type)(const ObjectAddress *object, const char *seclabel)
Definition seclabel.h:29
void relation_close(Relation relation, LOCKMODE lockmode)
Definition relation.c:205
#define BTEqualStrategyNumber
Definition stratnum.h:31
const char * provider_name
Definition seclabel.c:30
check_object_relabel_type hook
Definition seclabel.c:31
Definition pg_list.h:54
Form_pg_class rd_rel
Definition rel.h:111
void table_close(Relation relation, LOCKMODE lockmode)
Definition table.c:126
Relation table_open(Oid relationId, LOCKMODE lockmode)
Definition table.c:40