Files
oceanbase/src/sql/resolver/dcl/ob_create_user_resolver.cpp

291 lines
14 KiB
C++

/**
* Copyright (c) 2021 OceanBase
* OceanBase CE is licensed under Mulan PubL v2.
* You can use this software according to the terms and conditions of the Mulan PubL v2.
* You may obtain a copy of Mulan PubL v2 at:
* http://license.coscl.org.cn/MulanPubL-2.0
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PubL v2 for more details.
*/
#define USING_LOG_PREFIX SQL_RESV
#include "sql/resolver/dcl/ob_create_user_resolver.h"
#include "sql/resolver/ddl/ob_database_resolver.h"
#include "sql/resolver/dcl/ob_set_password_resolver.h"
#include "sql/session/ob_sql_session_info.h"
#include "sql/parser/ob_item_type.h"
using namespace oceanbase::sql;
using namespace oceanbase::common;
using namespace oceanbase::share;
using namespace oceanbase::share::schema;
ObCreateUserResolver::ObCreateUserResolver(ObResolverParams& params) : ObDCLResolver(params)
{}
ObCreateUserResolver::~ObCreateUserResolver()
{}
int ObCreateUserResolver::resolve(const ParseNode& parse_tree)
{
int ret = OB_SUCCESS;
ObCreateUserStmt* create_user_stmt = NULL;
if (OB_UNLIKELY(share::is_oracle_mode() && 5 != parse_tree.num_child_) ||
OB_UNLIKELY(share::is_mysql_mode() && 4 != parse_tree.num_child_) ||
OB_UNLIKELY(T_CREATE_USER != parse_tree.type_)) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN("expect 4 child in mysql mode and 5 child in oracle mode, create user type",
"actual_num",
parse_tree.num_child_,
"type",
parse_tree.type_,
K(ret));
} else if (OB_ISNULL(params_.session_info_) || OB_ISNULL(schema_checker_)) {
ret = OB_NOT_INIT;
LOG_WARN("Session info or schema checker should not be NULL", K(ret));
} else if (OB_ISNULL(create_user_stmt = create_stmt<ObCreateUserStmt>())) {
ret = OB_ALLOCATE_MEMORY_FAILED;
LOG_ERROR("Failed to create ObCreateUserStmt", K(ret));
} else {
stmt_ = create_user_stmt;
ParseNode* if_not_exist = const_cast<ParseNode*>(parse_tree.children_[0]);
ParseNode* users = const_cast<ParseNode*>(parse_tree.children_[1]);
ParseNode* require_info = const_cast<ParseNode*>(parse_tree.children_[2]);
ParseNode* resource_options = !share::is_oracle_mode() ? const_cast<ParseNode*>(parse_tree.children_[3]) : NULL;
ParseNode* profile = share::is_oracle_mode() ? const_cast<ParseNode*>(parse_tree.children_[3]) : NULL;
ParseNode* primary_zone = share::is_oracle_mode() ? const_cast<ParseNode*>(parse_tree.children_[4]) : NULL;
ParseNode* ssl_infos = NULL;
create_user_stmt->set_tenant_id(params_.session_info_->get_effective_tenant_id());
// resolve if_not_exists
if (OB_SUCC(ret)) {
if (NULL != if_not_exist) {
if (T_IF_NOT_EXISTS != if_not_exist->type_) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN("invalid argument", K(if_not_exist->type_), K(ret));
} else {
create_user_stmt->set_if_not_exists(true);
}
}
}
// resolve users' specs
if (OB_FAIL(ret)) {
// bypass
} else if (OB_ISNULL(users) || OB_UNLIKELY(T_USERS != users->type_) || OB_UNLIKELY(users->num_child_ <= 0)) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN("Create user ParseNode error", K(ret));
} else {
for (int i = 0; i < users->num_child_ && OB_SUCCESS == ret; ++i) {
ParseNode* user_pass = users->children_[i];
if (OB_ISNULL(user_pass)) {
ret = OB_ERR_PARSE_SQL;
LOG_WARN("The child of parseNode should not be NULL", K(ret), K(i));
} else if (4 != user_pass->num_child_) {
ret = OB_ERR_PARSE_SQL;
LOG_WARN("sql_parser parse user_identification error", K(ret));
} else if (OB_ISNULL(user_pass->children_[0])) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN("Child 0 of user_pass should not be NULL", K(ret));
} else {
ObString user_name(user_pass->children_[0]->str_len_, user_pass->children_[0]->str_value_);
ObString host_name;
ObCollationType client_cs_type = session_info_->get_local_collation_connection();
if (user_pass->children_[0]->type_ != T_IDENT &&
OB_FAIL(ObSQLUtils::copy_and_convert_string_charset(
*allocator_, user_name, user_name, client_cs_type, CS_TYPE_UTF8MB4_BIN))) {
LOG_WARN(
"fail to convert user name to utf8", K(ret), K(user_name), KPHEX(user_name.ptr(), user_name.length()));
} else if (!session_info_->is_inner() && (0 == user_name.case_compare(OB_RESTORE_USER_NAME))) {
ret = OB_ERR_NO_PRIVILEGE;
LOG_WARN("__oceanbase_inner_restore_user is reserved", K(ret));
} else if (NULL == user_pass->children_[3]) {
host_name.assign_ptr(OB_DEFAULT_HOST_NAME, static_cast<int32_t>(STRLEN(OB_DEFAULT_HOST_NAME)));
} else {
host_name.assign_ptr(
user_pass->children_[3]->str_value_, static_cast<int32_t>(user_pass->children_[3]->str_len_));
}
ObString password;
ObString need_enc_str = ObString::make_string("NO");
if (user_name.empty()) {
ret = OB_CANNOT_USER;
LOG_WARN("user name is empty", K(ret));
ObString create_user = ObString::make_string("CREATE USER");
LOG_USER_ERROR(
OB_CANNOT_USER, create_user.length(), create_user.ptr(), host_name.length(), host_name.ptr());
} else if (OB_ISNULL(user_pass->children_[1])) {
password = ObString::make_string("");
// no enc
} else if (OB_ISNULL(user_pass->children_[2])) {
ret = OB_ERR_PARSE_SQL;
LOG_WARN("Child 2 of user_pass should not be NULL here", K(ret));
} else {
password.assign_ptr(
user_pass->children_[1]->str_value_, static_cast<int32_t>(user_pass->children_[1]->str_len_));
bool need_enc = (1 == user_pass->children_[2]->value_);
if (need_enc) {
need_enc_str = ObString::make_string("YES");
} else {
// no enc
if (!ObSetPasswordResolver::is_valid_mysql41_passwd(password)) {
ret = OB_ERR_PASSWORD_FORMAT;
LOG_WARN("Wrong password format", K(user_name), K(password), K(ret));
}
}
}
uint64_t profile_id = OB_INVALID_ID;
if (OB_SUCC(ret) && NULL != profile) {
ParseNode* profile_name = nullptr;
if (OB_UNLIKELY(profile->type_ != T_USER_PROFILE) || OB_UNLIKELY(profile->num_child_ != 1)) {
ret = OB_ERR_UNEXPECTED;
LOG_WARN("invalid type", K(ret), K(profile->type_), K(profile->num_child_));
} else if (OB_ISNULL(profile_name = profile->children_[0])) {
ret = OB_ERR_UNEXPECTED;
LOG_WARN("invalid profile name", K(ret));
} else if (profile_name->type_ == T_DEFAULT) {
profile_id = OB_INVALID_ID;
} else if (OB_FAIL(schema_checker_->get_profile_id(params_.session_info_->get_effective_tenant_id(),
ObString(profile_name->str_len_, profile_name->str_value_),
profile_id))) {
LOG_WARN("fail to get profile id", K(ret));
}
}
create_user_stmt->set_profile_id(profile_id); // profile id is valid only in oracle mode
if (OB_SUCC(ret)) {
if (!share::is_oracle_mode() && OB_FAIL(check_password_strength(password, user_name))) {
LOG_WARN("password don't satisfied current policy", K(ret));
} else if (share::is_oracle_mode() &&
OB_FAIL(check_oracle_password_strength(
params_.session_info_->get_effective_tenant_id(), profile_id, password, user_name))) {
LOG_WARN("fail to check password strength", K(ret));
}
}
if (OB_SUCC(ret)) {
if (user_name.length() > OB_MAX_USER_NAME_LENGTH) {
ret = OB_WRONG_USER_NAME_LENGTH;
LOG_USER_ERROR(OB_WRONG_USER_NAME_LENGTH, user_name.length(), user_name.ptr());
} else if (OB_FAIL(create_user_stmt->add_user(user_name, host_name, password, need_enc_str))) {
LOG_WARN("Failed to add user to ObCreateUserStmt", K(user_name), K(host_name), K(password), K(ret));
} else {
// do nothing
}
}
}
} // end of for
}
ObSSLType ssl_type = ObSSLType::SSL_TYPE_NOT_SPECIFIED;
ObString infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_MAX)] = {};
// resolve users' specs
if (OB_FAIL(ret)) {
// bypass
} else if (NULL == require_info) {
// bypass
} else if (OB_UNLIKELY(T_TLS_OPTIONS != require_info->type_) || OB_UNLIKELY(require_info->num_child_ != 1) ||
OB_ISNULL(ssl_infos = require_info->children_[0])) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN(
"Create user ParseNode error", K(ret), K(require_info->type_), K(require_info->num_child_), KP(ssl_infos));
} else if (OB_UNLIKELY(ssl_infos->type_ < T_TLS_NONE && ssl_infos->type_ > T_TLS_SPECIFIED)) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN("Create user ParseNode error", K(ret), K(ssl_infos->type_));
} else {
ssl_type =
static_cast<ObSSLType>(static_cast<int32_t>(ObSSLType::SSL_TYPE_NONE) + (ssl_infos->type_ - T_TLS_NONE));
if (ObSSLType::SSL_TYPE_SPECIFIED == ssl_type) {
ParseNode* specified_ssl_infos = NULL;
if (OB_UNLIKELY(ssl_infos->num_child_ != 1) || OB_ISNULL(specified_ssl_infos = ssl_infos->children_[0])) {
ret = OB_INVALID_ARGUMENT;
LOG_WARN("Create user ParseNode error", K(ret), K(ssl_infos->num_child_), KP(specified_ssl_infos));
} else {
bool check_repeat[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_MAX)] = {};
for (int i = 0; i < specified_ssl_infos->num_child_ && OB_SUCC(ret); ++i) {
ParseNode* ssl_info = specified_ssl_infos->children_[i];
if (OB_ISNULL(ssl_info)) {
ret = OB_ERR_PARSE_SQL;
LOG_WARN("The child of parseNode should not be NULL", K(ret), K(i));
} else if (OB_UNLIKELY(ssl_info->num_child_ != 1)) {
ret = OB_ERR_PARSE_SQL;
LOG_WARN("The num_child_is error", K(ret), K(i), K(ssl_info->num_child_));
} else if (OB_UNLIKELY(check_repeat[ssl_info->type_ - T_TLS_CIPHER])) {
ret = OB_ERR_DUP_ARGUMENT;
LOG_WARN("Option used twice in statement", K(ret), K(ssl_info->type_));
LOG_USER_ERROR(OB_ERR_DUP_ARGUMENT,
get_ssl_spec_type_str(static_cast<ObSSLSpecifiedType>(ssl_info->type_ - T_TLS_CIPHER)));
} else {
check_repeat[ssl_info->type_ - T_TLS_CIPHER] = true;
infos[ssl_info->type_ - T_TLS_CIPHER].assign_ptr(
ssl_info->children_[0]->str_value_, ssl_info->children_[0]->str_len_);
}
}
}
}
}
if (OB_SUCC(ret) && OB_NOT_NULL(primary_zone)) {
if (T_PRIMARY_ZONE != primary_zone->type_ || NULL == primary_zone->children_ || primary_zone->num_child_ != 1) {
ret = common::OB_INVALID_ARGUMENT;
LOG_WARN("invalid primary_zone argument", K(ret), "num_child", primary_zone->num_child_);
} else if (OB_FAIL(ObDatabaseResolver<ObCreateUserStmt>::resolve_primary_zone(
create_user_stmt, primary_zone->children_[0]))) {
LOG_WARN("fail to resolve primary zone", K(ret));
}
}
if (OB_SUCC(ret)) {
if (OB_FAIL(create_user_stmt->add_ssl_info(get_ssl_type_string(ssl_type),
infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_CIPHER)],
infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_ISSUER)],
infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_SUBJECT)]))) {
LOG_WARN("Failed to add_ssl_info",
K(ssl_type),
"CIPHER",
infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_CIPHER)],
"ISSUER",
infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_ISSUER)],
"SUBJECT",
infos[static_cast<int32_t>(ObSSLSpecifiedType::SSL_SPEC_TYPE_SUBJECT)],
K(ret));
}
}
if (OB_SUCC(ret) && NULL != resource_options) {
if (T_USER_RESOURCE_OPTIONS != resource_options->type_
|| OB_ISNULL(resource_options->children_)) {
ret = common::OB_INVALID_ARGUMENT;
LOG_WARN(
"invalid resource options argument", K(ret), K(resource_options->type_), K(resource_options->children_));
} else {
for (int64_t i = 0; i < resource_options->num_child_; i++) {
ParseNode* res_option = resource_options->children_[i];
if (OB_ISNULL(res_option)) {
ret = common::OB_INVALID_ARGUMENT;
LOG_WARN("null res option", K(ret), K(i));
} else if (T_MAX_CONNECTIONS_PER_HOUR == res_option->type_) {
uint64_t max_connections_per_hour = static_cast<uint64_t>(res_option->value_);
max_connections_per_hour = max_connections_per_hour > MAX_CONNECTIONS ? MAX_CONNECTIONS
: max_connections_per_hour;
create_user_stmt->set_max_connections_per_hour(max_connections_per_hour);
} else if (T_MAX_USER_CONNECTIONS == res_option->type_) {
uint64_t max_user_connections = static_cast<uint64_t>(res_option->value_);
max_user_connections = max_user_connections > MAX_CONNECTIONS ? MAX_CONNECTIONS
: max_user_connections;
create_user_stmt->set_max_user_connections(max_user_connections);
}
}
}
}
if (OB_SUCC(ret) && ObSchemaChecker::is_ora_priv_check()) {
OZ(schema_checker_->check_ora_ddl_priv(session_info_->get_effective_tenant_id(),
session_info_->get_priv_user_id(),
ObString(""),
stmt::T_CREATE_USER,
session_info_->get_enable_role_array()),
session_info_->get_effective_tenant_id(),
session_info_->get_user_id());
}
}
return ret;
}