first commit for openGauss server
This commit is contained in:
469
src/bin/scripts/createuser.cpp
Normal file
469
src/bin/scripts/createuser.cpp
Normal file
@ -0,0 +1,469 @@
|
||||
/* -------------------------------------------------------------------------
|
||||
*
|
||||
* createuser
|
||||
*
|
||||
* Portions Copyright (c) 1996-2012, PostgreSQL Global Development Group
|
||||
* Portions Copyright (c) 1994, Regents of the University of California
|
||||
*
|
||||
* src/bin/scripts/createuser.c
|
||||
*
|
||||
* -------------------------------------------------------------------------
|
||||
*/
|
||||
#include "postgres_fe.h"
|
||||
#include "common.h"
|
||||
#include "dumputils.h"
|
||||
|
||||
static void help(const char* progname);
|
||||
/* Database Security: Support password complexity */
|
||||
static bool IsSpecialCharacter(char ch);
|
||||
static bool CheckUserPasswd(const char* username, const char* passwd);
|
||||
int main(int argc, char* argv[])
|
||||
{
|
||||
static struct option long_options[] = {{"host", required_argument, NULL, 'h'},
|
||||
{"port", required_argument, NULL, 'p'},
|
||||
{"username", required_argument, NULL, 'U'},
|
||||
{"no-password", no_argument, NULL, 'w'},
|
||||
{"password", no_argument, NULL, 'W'},
|
||||
{"echo", no_argument, NULL, 'e'},
|
||||
{"createdb", no_argument, NULL, 'd'},
|
||||
{"no-createdb", no_argument, NULL, 'D'},
|
||||
{"superuser", no_argument, NULL, 's'},
|
||||
{"no-superuser", no_argument, NULL, 'S'},
|
||||
{"createrole", no_argument, NULL, 'r'},
|
||||
{"no-createrole", no_argument, NULL, 'R'},
|
||||
{"inherit", no_argument, NULL, 'i'},
|
||||
{"no-inherit", no_argument, NULL, 'I'},
|
||||
{"login", no_argument, NULL, 'l'},
|
||||
{"no-login", no_argument, NULL, 'L'},
|
||||
{"replication", no_argument, NULL, 1},
|
||||
{"no-replication", no_argument, NULL, 2},
|
||||
/* add audit admin privilege */
|
||||
{"auditadmin", no_argument, NULL, 3},
|
||||
{"no-auditadmin", no_argument, NULL, 4},
|
||||
{"interactive", no_argument, NULL, 5},
|
||||
/* adduser is obsolete, undocumented spelling of superuser */
|
||||
{"adduser", no_argument, NULL, 'a'},
|
||||
{"no-adduser", no_argument, NULL, 'A'},
|
||||
{"connection-limit", required_argument, NULL, 'c'},
|
||||
{"pwprompt", no_argument, NULL, 'P'},
|
||||
{"encrypted", no_argument, NULL, 'E'},
|
||||
{"unencrypted", no_argument, NULL, 'N'},
|
||||
{NULL, 0, NULL, 0}};
|
||||
|
||||
const char* progname_tem = NULL;
|
||||
int optindex;
|
||||
int c;
|
||||
const char* newuser = NULL;
|
||||
char* host = NULL;
|
||||
char* port = NULL;
|
||||
char* username = NULL;
|
||||
enum trivalue prompt_password = TRI_DEFAULT;
|
||||
bool echo = false;
|
||||
bool interactive = false;
|
||||
char* conn_limit = NULL;
|
||||
bool pwprompt = false;
|
||||
char* newpassword = NULL;
|
||||
|
||||
/* Tri-valued variables. */
|
||||
enum trivalue createdb = TRI_DEFAULT;
|
||||
enum trivalue superuser = TRI_DEFAULT;
|
||||
enum trivalue createrole = TRI_DEFAULT;
|
||||
enum trivalue inherit = TRI_DEFAULT;
|
||||
enum trivalue login = TRI_DEFAULT;
|
||||
enum trivalue replication = TRI_DEFAULT;
|
||||
enum trivalue auditadmin = TRI_DEFAULT; /* add audit admin privilege */
|
||||
enum trivalue encrypted = TRI_DEFAULT;
|
||||
|
||||
PQExpBufferData sql;
|
||||
|
||||
PGconn* conn = NULL;
|
||||
PGresult* result = NULL;
|
||||
|
||||
progname_tem = get_progname(argv[0]);
|
||||
set_pglocale_pgservice(argv[0], PG_TEXTDOMAIN("pgscripts"));
|
||||
|
||||
handle_help_version_opts(argc, argv, "createuser", help);
|
||||
|
||||
while ((c = getopt_long(argc, argv, "h:p:U:wWedDsSaArRiIlLc:PEN", long_options, &optindex)) != -1) {
|
||||
switch (c) {
|
||||
case 'h':
|
||||
host = optarg;
|
||||
break;
|
||||
case 'p':
|
||||
port = optarg;
|
||||
break;
|
||||
case 'U':
|
||||
username = optarg;
|
||||
break;
|
||||
case 'w':
|
||||
prompt_password = TRI_NO;
|
||||
break;
|
||||
case 'W':
|
||||
prompt_password = TRI_YES;
|
||||
break;
|
||||
case 'e':
|
||||
echo = true;
|
||||
break;
|
||||
case 'd':
|
||||
createdb = TRI_YES;
|
||||
break;
|
||||
case 'D':
|
||||
createdb = TRI_NO;
|
||||
break;
|
||||
case 's':
|
||||
case 'a':
|
||||
superuser = TRI_YES;
|
||||
break;
|
||||
case 'S':
|
||||
case 'A':
|
||||
superuser = TRI_NO;
|
||||
break;
|
||||
case 'r':
|
||||
createrole = TRI_YES;
|
||||
break;
|
||||
case 'R':
|
||||
createrole = TRI_NO;
|
||||
break;
|
||||
case 'i':
|
||||
inherit = TRI_YES;
|
||||
break;
|
||||
case 'I':
|
||||
inherit = TRI_NO;
|
||||
break;
|
||||
case 'l':
|
||||
login = TRI_YES;
|
||||
break;
|
||||
case 'L':
|
||||
login = TRI_NO;
|
||||
break;
|
||||
case 'c':
|
||||
conn_limit = optarg;
|
||||
break;
|
||||
case 'P':
|
||||
pwprompt = true;
|
||||
break;
|
||||
case 'E':
|
||||
encrypted = TRI_YES;
|
||||
break;
|
||||
case 'N':
|
||||
encrypted = TRI_NO;
|
||||
break;
|
||||
case 1:
|
||||
replication = TRI_YES;
|
||||
break;
|
||||
case 2:
|
||||
replication = TRI_NO;
|
||||
break;
|
||||
/* add audit admin privilege */
|
||||
case 3:
|
||||
auditadmin = TRI_YES;
|
||||
break;
|
||||
case 4:
|
||||
auditadmin = TRI_NO;
|
||||
break;
|
||||
case 5:
|
||||
interactive = true;
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, _("Try \"%s --help\" for more information.\n"), progname_tem);
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
switch (argc - optind) {
|
||||
case 0:
|
||||
break;
|
||||
case 1:
|
||||
newuser = argv[optind];
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, _("%s: too many command-line arguments (first is \"%s\")\n"), progname_tem, argv[optind + 1]);
|
||||
fprintf(stderr, _("Try \"%s --help\" for more information.\n"), progname_tem);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if (newuser == NULL) {
|
||||
if (interactive) {
|
||||
newuser = simple_prompt("Enter name of role to add: ", 128, true);
|
||||
} else {
|
||||
if (getenv("PGUSER") != NULL) {
|
||||
newuser = getenv("PGUSER");
|
||||
} else {
|
||||
newuser = get_user_name(progname_tem);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (pwprompt) {
|
||||
char *pw1 = NULL;
|
||||
char *pw2 = NULL;
|
||||
int i = 0;
|
||||
for (i = 0; i != 3; ++i) {
|
||||
/* Database Security: Support password complexity */
|
||||
pw1 = simple_prompt("Enter new system admin password: ", 1024, false);
|
||||
pw2 = simple_prompt("Enter it again: ", 1024, false);
|
||||
/* if pwd1 equal to pwd2, try new password again */
|
||||
if (strcmp(pw1, pw2) != 0) {
|
||||
fprintf(stderr, _("Passwords didn't match.\n"));
|
||||
fprintf(stderr, _("Please try new password again.\n"));
|
||||
free(pw1);
|
||||
free(pw2);
|
||||
continue;
|
||||
}
|
||||
free(pw2);
|
||||
pw2 = NULL;
|
||||
/* if the pwd1 does not match, try it again*/
|
||||
if (CheckUserPasswd(newuser, pw1)) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (i == 3) {
|
||||
free(pw1);
|
||||
pw1 = NULL;
|
||||
exit(1);
|
||||
}
|
||||
newpassword = pw1;
|
||||
}
|
||||
|
||||
if (superuser == 0) {
|
||||
if (interactive && yesno_prompt("Shall the new role be a system admin?")) {
|
||||
superuser = TRI_YES;
|
||||
} else {
|
||||
superuser = TRI_NO;
|
||||
}
|
||||
}
|
||||
|
||||
if (superuser == TRI_YES) {
|
||||
/* Not much point in trying to restrict a superuser */
|
||||
createdb = TRI_YES;
|
||||
createrole = TRI_YES;
|
||||
}
|
||||
|
||||
if (createdb == 0) {
|
||||
if (interactive && yesno_prompt("Shall the new role be allowed to create databases?")) {
|
||||
createdb = TRI_YES;
|
||||
} else {
|
||||
createdb = TRI_NO;
|
||||
}
|
||||
}
|
||||
|
||||
if (createrole == 0) {
|
||||
if (interactive && yesno_prompt("Shall the new role be allowed to create more new roles?")) {
|
||||
createrole = TRI_YES;
|
||||
} else {
|
||||
createrole = TRI_NO;
|
||||
}
|
||||
}
|
||||
|
||||
if (inherit == 0) {
|
||||
inherit = TRI_YES;
|
||||
}
|
||||
if (login == 0) {
|
||||
login = TRI_YES;
|
||||
}
|
||||
conn = connectDatabase("postgres", host, port, username, prompt_password, progname_tem, false);
|
||||
|
||||
initPQExpBuffer(&sql);
|
||||
|
||||
printfPQExpBuffer(&sql, "CREATE ROLE %s", fmtId(newuser));
|
||||
if (newpassword != NULL) {
|
||||
if (encrypted == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " ENCRYPTED");
|
||||
}
|
||||
if (encrypted == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " UNENCRYPTED");
|
||||
}
|
||||
appendPQExpBuffer(&sql, " PASSWORD ");
|
||||
appendPQExpBuffer(&sql, "'%s'", newpassword);
|
||||
|
||||
}
|
||||
if (superuser == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " SUPERUSER");
|
||||
}
|
||||
if (superuser == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOSUPERUSER");
|
||||
}
|
||||
if (createdb == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " CREATEDB");
|
||||
}
|
||||
if (createdb == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOCREATEDB");
|
||||
}
|
||||
if (createrole == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " CREATEROLE");
|
||||
}
|
||||
if (createrole == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOCREATEROLE");
|
||||
}
|
||||
if (inherit == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " INHERIT");
|
||||
}
|
||||
if (inherit == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOINHERIT");
|
||||
}
|
||||
if (login == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " LOGIN");
|
||||
}
|
||||
if (login == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOLOGIN");
|
||||
}
|
||||
if (replication == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " REPLICATION");
|
||||
}
|
||||
if (replication == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOREPLICATION");
|
||||
}
|
||||
/* add audit admin privilege */
|
||||
if (auditadmin == TRI_YES) {
|
||||
appendPQExpBuffer(&sql, " AUDITADMIN");
|
||||
}
|
||||
if (auditadmin == TRI_NO) {
|
||||
appendPQExpBuffer(&sql, " NOAUDITADMIN");
|
||||
}
|
||||
if (conn_limit != NULL) {
|
||||
appendPQExpBuffer(&sql, " CONNECTION LIMIT %s", conn_limit);
|
||||
}
|
||||
appendPQExpBuffer(&sql, ";\n");
|
||||
|
||||
if (echo)
|
||||
printf("%s", sql.data);
|
||||
result = PQexec(conn, sql.data);
|
||||
if (PQresultStatus(result) != PGRES_COMMAND_OK) {
|
||||
fprintf(stderr, _("%s: creation of new role failed: %s"), progname_tem, PQerrorMessage(conn));
|
||||
PQfinish(conn);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
PQclear(result);
|
||||
PQfinish(conn);
|
||||
exit(0);
|
||||
}
|
||||
|
||||
static void help(const char* progname_tem)
|
||||
{
|
||||
printf(_("%s creates a new PostgreSQL role.\n\n"), progname_tem);
|
||||
printf(_("Usage:\n"));
|
||||
printf(_(" %s [OPTION]... [ROLENAME]\n"), progname_tem);
|
||||
printf(_("\nOptions:\n"));
|
||||
printf(_(" -c, --connection-limit=N connection limit for role (default: no limit)\n"));
|
||||
printf(_(" -d, --createdb role can create new databases\n"));
|
||||
printf(_(" -D, --no-createdb role cannot create databases (default)\n"));
|
||||
printf(_(" -e, --echo show the commands being sent to the server\n"));
|
||||
printf(_(" -E, --encrypted encrypt stored password\n"));
|
||||
printf(_(" -i, --inherit role inherits privileges of roles it is a\n"
|
||||
" member of (default)\n"));
|
||||
printf(_(" -I, --no-inherit role does not inherit privileges\n"));
|
||||
printf(_(" -l, --login role can login (default)\n"));
|
||||
printf(_(" -L, --no-login role cannot login\n"));
|
||||
printf(_(" -N, --unencrypted do not encrypt stored password\n"));
|
||||
printf(_(" -P, --pwprompt assign a password to new role\n"));
|
||||
printf(_(" -r, --createrole role can create new roles\n"));
|
||||
printf(_(" -R, --no-createrole role cannot create roles (default)\n"));
|
||||
printf(_(" -s, --superuser role will be system admin\n"));
|
||||
printf(_(" -S, --no-superuser role will not be system admin (default)\n"));
|
||||
printf(_(" -V, --version output version information, then exit\n"));
|
||||
printf(_(" --interactive prompt for missing role name and attributes rather\n"
|
||||
" than using defaults\n"));
|
||||
printf(_(" --replication role can initiate replication\n"));
|
||||
printf(_(" --no-replication role cannot initiate replication\n"));
|
||||
/* add audit admin privilege */
|
||||
printf(_(" --auditadmin role can administer audit data\n"));
|
||||
printf(_(" --no-auditadmin role cannot administer audit data\n"));
|
||||
printf(_(" -?, --help show this help, then exit\n"));
|
||||
printf(_("\nConnection options:\n"));
|
||||
printf(_(" -h, --host=HOSTNAME database server host or socket directory\n"));
|
||||
printf(_(" -p, --port=PORT database server port\n"));
|
||||
printf(_(" -U, --username=USERNAME user name to connect as (not the one to create)\n"));
|
||||
printf(_(" -w, --no-password never prompt for password\n"));
|
||||
printf(_(" -W, --password force password prompt\n"));
|
||||
printf(_("\nReport bugs to <pgsql-bugs@postgresql.org>.\n"));
|
||||
}
|
||||
|
||||
/*
|
||||
* Brief : whether the ch is one of the specifically letters
|
||||
* Description :
|
||||
* Notes :
|
||||
*/
|
||||
static bool IsSpecialCharacter(char ch)
|
||||
{
|
||||
char* ptr = "~!@#$%^&*()-_=+\\|[{}];:,<.>/?";
|
||||
while (*ptr != '\0') {
|
||||
if (*ptr == ch) {
|
||||
return true;
|
||||
}
|
||||
ptr++;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
/*
|
||||
* Brief : Whether the initial password satisfy the complexity requirement.
|
||||
* Description :
|
||||
* Notes :
|
||||
*/
|
||||
static bool CheckUserPasswd(const char* username, const char* passwd)
|
||||
{
|
||||
unsigned int slen = 0;
|
||||
int kinds[4] = {0};
|
||||
int kinds_num = 0;
|
||||
const char* ptr = NULL;
|
||||
int i = 0;
|
||||
if (username == NULL) {
|
||||
fprintf(stderr, _("The parameter username of CheckUserPasswd is NULL\n"));
|
||||
return false;
|
||||
}
|
||||
|
||||
if (passwd == NULL) {
|
||||
fprintf(stderr, _("The parameter passwd of CheckUserPasswd is NULL\n"));
|
||||
return false;
|
||||
}
|
||||
|
||||
/* passwd must be ascii code*/
|
||||
ptr = passwd;
|
||||
while (*ptr != '\0') {
|
||||
if (*ptr < 0 || *ptr > 127) {
|
||||
fprintf(stderr, _("The passwd must be ascii code."));
|
||||
return false;
|
||||
}
|
||||
ptr++;
|
||||
}
|
||||
|
||||
/* passwd must contain at least eight characters*/
|
||||
slen = (unsigned int)strlen(passwd);
|
||||
if (slen < 8) {
|
||||
fprintf(stderr, _("Passwd must contain at least eight characters.\n"));
|
||||
return false;
|
||||
}
|
||||
|
||||
/* passwd should not equal to the rolname*/
|
||||
if (0 == pg_strcasecmp(passwd, username)) {
|
||||
fprintf(stderr, _("Password should not equal to the rolname.\n"));
|
||||
return false;
|
||||
}
|
||||
|
||||
/* passwd must contain at least three kinds of characters*/
|
||||
ptr = passwd;
|
||||
while (*ptr != '\0') {
|
||||
if (*ptr >= 'A' && *ptr <= 'Z') {
|
||||
kinds[0]++;
|
||||
} else if (*ptr >= 'a' && *ptr <= 'z') {
|
||||
kinds[1]++;
|
||||
} else if (*ptr >= '0' && *ptr <= '9') {
|
||||
kinds[2]++;
|
||||
} else if (IsSpecialCharacter(*ptr)) {
|
||||
kinds[3]++;
|
||||
}
|
||||
ptr++;
|
||||
}
|
||||
for (i = 0; i != 4; ++i) {
|
||||
if (kinds[i] > 0) {
|
||||
kinds_num++;
|
||||
}
|
||||
}
|
||||
if (kinds_num < 3) {
|
||||
fprintf(stderr, _("Password must contain at least three kinds of characters.\n"));
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user