MXS-1354: Allow creation of basic users

The type of the user being created is defined at creation time. This
allows the creation of basic users.

Although the users can be created internally, they cannot yet be created
via maxadmin or the REST API.
This commit is contained in:
Markus Mäkelä
2017-08-15 14:15:59 +03:00
parent 829d8a1224
commit 253d6d211f
5 changed files with 37 additions and 28 deletions

View File

@ -25,6 +25,13 @@
MXS_BEGIN_DECLS MXS_BEGIN_DECLS
/** User account types */
enum account_type
{
ACCOUNT_BASIC, /**< Allows read-only access */
ACCOUNT_ADMIN /**< Allows complete access */
};
/** /**
* An opaque users object * An opaque users object
*/ */
@ -52,10 +59,11 @@ void users_free(USERS* users);
* @param users The users table * @param users The users table
* @param user The user name * @param user The user name
* @param password The password for the user * @param password The password for the user
* @param type The type of account to create
* *
* @return True if user was added * @return True if user was added
*/ */
bool users_add(USERS *users, const char *user, const char *password); bool users_add(USERS *users, const char *user, const char *password, enum account_type type);
/** /**
* Delete a user from the user table. * Delete a user from the user table.

View File

@ -62,7 +62,7 @@ static const char *admin_add_user(USERS** pusers, const char* fname,
const char* uname, const char* password) const char* uname, const char* password)
{ {
FILE *fp; FILE *fp;
char path[PATH_MAX], *home; char path[PATH_MAX];
if (access(get_datadir(), F_OK) != 0) if (access(get_datadir(), F_OK) != 0)
{ {
@ -83,20 +83,22 @@ static const char *admin_add_user(USERS** pusers, const char* fname,
} }
if ((fp = fopen(path, "w")) == NULL) if ((fp = fopen(path, "w")) == NULL)
{ {
MXS_ERROR("Unable to create password file %s.", path); MXS_ERROR("Unable to create password file %s: %d, %s", path,
errno, mxs_strerror(errno));
return ADMIN_ERR_PWDFILEOPEN; return ADMIN_ERR_PWDFILEOPEN;
} }
fclose(fp); fclose(fp);
} }
if (!users_add(*pusers, uname, password ? password : "")) if (!users_add(*pusers, uname, password ? password : "", ACCOUNT_ADMIN))
{ {
return ADMIN_ERR_DUPLICATE; return ADMIN_ERR_DUPLICATE;
} }
if ((fp = fopen(path, "a")) == NULL) if ((fp = fopen(path, "a")) == NULL)
{ {
MXS_ERROR("Unable to append to password file %s.", path); MXS_ERROR("Unable to append to password file %s: %d, %s", path,
errno, mxs_strerror(errno));
return ADMIN_ERR_FILEAPPEND; return ADMIN_ERR_FILEAPPEND;
} }
if (password) if (password)
@ -401,7 +403,7 @@ loadUsers(const char *fname)
password = ""; password = "";
} }
if (users_add(rval, uname, password)) if (users_add(rval, uname, password, ACCOUNT_ADMIN))
{ {
added_users++; added_users++;
} }

View File

@ -48,7 +48,7 @@ static int test1()
mxs_log_flush_sync(); mxs_log_flush_sync();
ss_info_dassert(NULL != users, "Allocating user table should not return NULL."); ss_info_dassert(NULL != users, "Allocating user table should not return NULL.");
ss_dfprintf(stderr, "\t..done\nAdd a user"); ss_dfprintf(stderr, "\t..done\nAdd a user");
rv = users_add(users, "username", "authorisation"); rv = users_add(users, "username", "authorisation", ACCOUNT_ADMIN);
mxs_log_flush_sync(); mxs_log_flush_sync();
ss_info_dassert(rv, "Should add one user"); ss_info_dassert(rv, "Should add one user");
rv = users_auth(users, "username", "authorisation"); rv = users_auth(users, "username", "authorisation");
@ -59,7 +59,7 @@ static int test1()
ss_info_dassert(rv, "Fetch valid user must not return NULL"); ss_info_dassert(rv, "Fetch valid user must not return NULL");
ss_dfprintf(stderr, "\t..done\nAdd another user"); ss_dfprintf(stderr, "\t..done\nAdd another user");
rv = users_add(users, "username2", "authorisation2"); rv = users_add(users, "username2", "authorisation2", ACCOUNT_ADMIN);
mxs_log_flush_sync(); mxs_log_flush_sync();
ss_info_dassert(rv, "Should add one user"); ss_info_dassert(rv, "Should add one user");
ss_dfprintf(stderr, "\t..done\nDelete a user."); ss_dfprintf(stderr, "\t..done\nDelete a user.");

View File

@ -24,22 +24,21 @@
namespace namespace
{ {
enum permission_type
{
PERM_BASIC,
PERM_ADMIN
};
struct UserInfo struct UserInfo
{ {
UserInfo(std::string pw = "", permission_type perm = PERM_ADMIN): // TODO: Change default to PERM_BASIC UserInfo():
permissions(ACCOUNT_BASIC)
{
}
UserInfo(std::string pw, account_type perm):
password(pw), password(pw),
permissions(perm) permissions(perm)
{ {
} }
std::string password; std::string password;
permission_type permissions; account_type permissions;
}; };
@ -59,10 +58,10 @@ public:
{ {
} }
bool add(std::string user, std::string password) bool add(std::string user, std::string password, account_type perm)
{ {
mxs::SpinLockGuard guard(m_lock); mxs::SpinLockGuard guard(m_lock);
return m_data.insert(std::make_pair(user, UserInfo(password))).second; return m_data.insert(std::make_pair(user, UserInfo(password, perm))).second;
} }
bool remove(std::string user) bool remove(std::string user)
@ -98,7 +97,7 @@ public:
return rval; return rval;
} }
bool check_permissions(std::string user, permission_type perm) const bool check_permissions(std::string user, account_type perm) const
{ {
mxs::SpinLockGuard guard(m_lock); mxs::SpinLockGuard guard(m_lock);
UserMap::const_iterator it = m_data.find(user); UserMap::const_iterator it = m_data.find(user);
@ -112,7 +111,7 @@ public:
return rval; return rval;
} }
bool set_permissions(std::string user, permission_type perm) bool set_permissions(std::string user, account_type perm)
{ {
mxs::SpinLockGuard guard(m_lock); mxs::SpinLockGuard guard(m_lock);
UserMap::iterator it = m_data.find(user); UserMap::iterator it = m_data.find(user);
@ -182,10 +181,10 @@ void users_free(USERS *users)
delete u; delete u;
} }
bool users_add(USERS *users, const char *user, const char *password) bool users_add(USERS *users, const char *user, const char *password, enum account_type type)
{ {
Users* u = reinterpret_cast<Users*>(users); Users* u = reinterpret_cast<Users*>(users);
return u->add(user, password); return u->add(user, password, type);
} }
bool users_delete(USERS *users, const char *user) bool users_delete(USERS *users, const char *user)
@ -217,19 +216,19 @@ bool users_auth(USERS* users, const char* user, const char* password)
bool users_is_admin(USERS* users, const char* user) bool users_is_admin(USERS* users, const char* user)
{ {
Users* u = reinterpret_cast<Users*>(users); Users* u = reinterpret_cast<Users*>(users);
return u->check_permissions(user, PERM_ADMIN); return u->check_permissions(user, ACCOUNT_ADMIN);
} }
bool users_promote(USERS* users, const char* user) bool users_promote(USERS* users, const char* user)
{ {
Users* u = reinterpret_cast<Users*>(users); Users* u = reinterpret_cast<Users*>(users);
return u->set_permissions(user, PERM_ADMIN); return u->set_permissions(user, ACCOUNT_ADMIN);
} }
bool users_demote(USERS* users, const char* user) bool users_demote(USERS* users, const char* user)
{ {
Users* u = reinterpret_cast<Users*>(users); Users* u = reinterpret_cast<Users*>(users);
return u->set_permissions(user, PERM_BASIC); return u->set_permissions(user, ACCOUNT_BASIC);
} }
void users_diagnostic(DCB* dcb, USERS* users) void users_diagnostic(DCB* dcb, USERS* users)

View File

@ -460,7 +460,7 @@ cdc_set_service_user(SERV_LISTENER *listener)
} }
/* add service user */ /* add service user */
(void)users_add(listener->users, service->credentials.name, newpasswd); (void)users_add(listener->users, service->credentials.name, newpasswd, ACCOUNT_ADMIN);
MXS_FREE(newpasswd); MXS_FREE(newpasswd);
MXS_FREE(dpwd); MXS_FREE(dpwd);
@ -510,7 +510,7 @@ cdc_read_users(USERS *users, char *usersfile)
} }
/* add user */ /* add user */
users_add(users, avro_user, user_passwd); users_add(users, avro_user, user_passwd, ACCOUNT_ADMIN);
loaded++; loaded++;
} }