1
/* -*- mode: c++; c-basic-offset: 2; indent-tabs-mode: nil; -*-
2
* vim:expandtab:shiftwidth=2:tabstop=2:smarttab:
4
* Copyright (C) 2010 Monty Taylor
6
* This program is free software; you can redistribute it and/or modify
7
* it under the terms of the GNU General Public License as published by
8
* the Free Software Foundation; either version 2 of the License, or
9
* (at your option) any later version.
11
* This program is distributed in the hope that it will be useful,
12
* but WITHOUT ANY WARRANTY; without even the implied warranty of
13
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14
* GNU General Public License for more details.
16
* You should have received a copy of the GNU General Public License
17
* along with this program; if not, write to the Free Software
18
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
25
#include "drizzled/plugin/authorization.h"
26
#include "drizzled/security_context.h"
27
#include "drizzled/identifier.h"
28
#include "drizzled/error.h"
29
#include "drizzled/session.h"
30
#include "drizzled/gettext.h"
35
std::vector<plugin::Authorization *> authorization_plugins;
38
bool plugin::Authorization::addPlugin(plugin::Authorization *auth)
41
authorization_plugins.push_back(auth);
46
void plugin::Authorization::removePlugin(plugin::Authorization *auth)
50
authorization_plugins.erase(std::find(authorization_plugins.begin(),
51
authorization_plugins.end(),
59
class RestrictDbFunctor :
60
public std::unary_function<plugin::Authorization *, bool>
62
const SecurityContext &user_ctx;
63
SchemaIdentifier &schema;
65
RestrictDbFunctor(const SecurityContext &user_ctx_arg,
66
SchemaIdentifier &schema_arg) :
67
std::unary_function<plugin::Authorization *, bool>(),
68
user_ctx(user_ctx_arg),
72
inline result_type operator()(argument_type auth)
74
return auth->restrictSchema(user_ctx, schema);
78
class RestrictTableFunctor :
79
public std::unary_function<plugin::Authorization *, bool>
81
const SecurityContext &user_ctx;
82
TableIdentifier &table;
84
RestrictTableFunctor(const SecurityContext &user_ctx_arg,
85
TableIdentifier &table_arg) :
86
std::unary_function<plugin::Authorization *, bool>(),
87
user_ctx(user_ctx_arg),
91
inline result_type operator()(argument_type auth)
93
return auth->restrictTable(user_ctx, table);
97
class RestrictProcessFunctor :
98
public std::unary_function<plugin::Authorization *, bool>
100
const SecurityContext &user_ctx;
101
const SecurityContext &session_ctx;
103
RestrictProcessFunctor(const SecurityContext &user_ctx_arg,
104
const SecurityContext &session_ctx_arg) :
105
std::unary_function<plugin::Authorization *, bool>(),
106
user_ctx(user_ctx_arg),
107
session_ctx(session_ctx_arg)
110
inline result_type operator()(argument_type auth)
112
return auth->restrictProcess(user_ctx, session_ctx);
116
class PruneSchemaFunctor :
117
public std::unary_function<SchemaIdentifier&, bool>
119
const SecurityContext &user_ctx;
121
PruneSchemaFunctor(const SecurityContext &user_ctx_arg) :
122
std::unary_function<SchemaIdentifier&, bool>(),
123
user_ctx(user_ctx_arg)
126
inline result_type operator()(argument_type auth)
128
return not plugin::Authorization::isAuthorized(user_ctx, auth, false);
134
bool plugin::Authorization::isAuthorized(const SecurityContext &user_ctx,
135
SchemaIdentifier &schema_identifier,
138
/* If we never loaded any authorization plugins, just return true */
139
if (authorization_plugins.empty())
142
/* Use find_if instead of foreach so that we can collect return codes */
143
std::vector<plugin::Authorization *>::const_iterator iter=
144
std::find_if(authorization_plugins.begin(),
145
authorization_plugins.end(),
146
RestrictDbFunctor(user_ctx, schema_identifier));
150
* If iter is == end() here, that means that all of the plugins returned
151
* false, which means that that each of them believe the user is authorized
152
* to view the resource in question.
154
if (iter != authorization_plugins.end())
159
schema_identifier.getSQLPath(path);
161
my_error(ER_DBACCESS_DENIED_ERROR, MYF(0),
162
user_ctx.getUser().c_str(),
163
user_ctx.getIp().c_str(),
171
bool plugin::Authorization::isAuthorized(const SecurityContext &user_ctx,
172
TableIdentifier &table,
175
/* If we never loaded any authorization plugins, just return true */
176
if (authorization_plugins.empty())
179
/* Use find_if instead of foreach so that we can collect return codes */
180
std::vector<plugin::Authorization *>::const_iterator iter=
181
std::find_if(authorization_plugins.begin(),
182
authorization_plugins.end(),
183
RestrictTableFunctor(user_ctx, table));
186
* If iter is == end() here, that means that all of the plugins returned
187
* false, which means that that each of them believe the user is authorized
188
* to view the resource in question.
190
if (iter != authorization_plugins.end())
195
table.getSQLPath(path);
197
my_error(ER_DBACCESS_DENIED_ERROR, MYF(0),
198
user_ctx.getUser().c_str(),
199
user_ctx.getIp().c_str(),
207
bool plugin::Authorization::isAuthorized(const SecurityContext &user_ctx,
208
const Session *session,
211
const SecurityContext &session_ctx= session->getSecurityContext();
213
/* If we never loaded any authorization plugins, just return true */
214
if (authorization_plugins.empty())
217
/* Use find_if instead of foreach so that we can collect return codes */
218
std::vector<plugin::Authorization *>::const_iterator iter=
219
std::find_if(authorization_plugins.begin(),
220
authorization_plugins.end(),
221
RestrictProcessFunctor(user_ctx, session_ctx));
224
* If iter is == end() here, that means that all of the plugins returned
225
* false, which means that that each of them believe the user is authorized
226
* to view the resource in question.
229
if (iter != authorization_plugins.end())
233
my_error(ER_KILL_DENIED_ERROR, MYF(0), session->thread_id);
240
void plugin::Authorization::pruneSchemaNames(const SecurityContext &user_ctx,
241
SchemaIdentifier::vector &set_of_schemas)
243
/* If we never loaded any authorization plugins, just return true */
244
if (authorization_plugins.empty())
247
set_of_schemas.erase(std::remove_if(set_of_schemas.begin(),
248
set_of_schemas.end(),
249
PruneSchemaFunctor(user_ctx)),
250
set_of_schemas.end());
253
} /* namespace drizzled */