994 lines
29 KiB
C++
Executable File
994 lines
29 KiB
C++
Executable File
/* -------------------------------------------------------------------------
|
|
*
|
|
* misc.c
|
|
*
|
|
*
|
|
* Portions Copyright (c) 1996-2012, PostgreSQL Global Development Group
|
|
* Portions Copyright (c) 1994, Regents of the University of California
|
|
*
|
|
*
|
|
* IDENTIFICATION
|
|
* src/backend/utils/adt/misc.c
|
|
*
|
|
* -------------------------------------------------------------------------
|
|
*/
|
|
#include "postgres.h"
|
|
#include "knl/knl_variable.h"
|
|
|
|
#include <sys/file.h>
|
|
#include <signal.h>
|
|
#include <dirent.h>
|
|
#include <math.h>
|
|
#include <unistd.h>
|
|
|
|
#include "catalog/catalog.h"
|
|
#include "catalog/pg_tablespace.h"
|
|
#include "catalog/pg_type.h"
|
|
#include "commands/dbcommands.h"
|
|
#include "commands/tablespace.h"
|
|
#include "commands/user.h"
|
|
#include "funcapi.h"
|
|
#include "miscadmin.h"
|
|
#include "parser/keywords.h"
|
|
#include "pgstat.h"
|
|
#include "postmaster/syslogger.h"
|
|
#include "replication/replicainternal.h"
|
|
#include "storage/fd.h"
|
|
#include "storage/pmsignal.h"
|
|
#include "storage/proc.h"
|
|
#include "storage/procarray.h"
|
|
#include "utils/lsyscache.h"
|
|
#include "tcop/tcopprot.h"
|
|
#include "utils/builtins.h"
|
|
#include "utils/timestamp.h"
|
|
#include "gssignal/gs_signal.h"
|
|
#include "workload/workload.h"
|
|
#ifdef PGXC
|
|
#include "pgxc/pgxc.h"
|
|
#endif
|
|
|
|
extern void cancel_backend(Oid pid);
|
|
#define atooid(x) ((Oid)strtoul((x), NULL, 10))
|
|
|
|
/*
|
|
* Expose the current database to the user
|
|
*/
|
|
Datum current_database(PG_FUNCTION_ARGS)
|
|
{
|
|
Name db;
|
|
|
|
db = (Name)palloc(NAMEDATALEN);
|
|
char* dbname = get_database_name(u_sess->proc_cxt.MyDatabaseId);
|
|
|
|
(void)namestrcpy(db, dbname ? dbname : "null");
|
|
PG_RETURN_NAME(db);
|
|
}
|
|
|
|
/*
|
|
* Expose the current query to the user (useful in stored procedures)
|
|
* We might want to use ActivePortal->sourceText someday.
|
|
*/
|
|
Datum current_query(PG_FUNCTION_ARGS)
|
|
{
|
|
/* there is no easy way to access the more concise 'query_string' */
|
|
if (t_thrd.postgres_cxt.debug_query_string) {
|
|
PG_RETURN_TEXT_P(cstring_to_text(t_thrd.postgres_cxt.debug_query_string));
|
|
} else {
|
|
PG_RETURN_NULL();
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Send a signal to another backend.
|
|
*
|
|
* The signal is delivered if the user is either a superuser or the same
|
|
* role as the backend being signaled. For "dangerous" signals, an explicit
|
|
* check for superuser needs to be done prior to calling this function.
|
|
*
|
|
* Returns 0 on success, 1 on general failure, and 2 on permission error.
|
|
* In the event of a general failure (return code 1), a warning message will
|
|
* be emitted. For permission errors, doing that is the responsibility of
|
|
* the caller.
|
|
*/
|
|
#define SIGNAL_BACKEND_SUCCESS 0
|
|
#define SIGNAL_BACKEND_ERROR 1
|
|
#define SIGNAL_BACKEND_NOPERMISSION 2
|
|
static int pg_signal_backend(ThreadId pid, int sig)
|
|
{
|
|
PGPROC* proc = NULL;
|
|
|
|
if (!superuser()) {
|
|
/*
|
|
* Since the user is not superuser, check for matching roles. Trust
|
|
* that BackendPidGetProc will return NULL if the pid isn't valid,
|
|
* even though the check for whether it's a backend process is below.
|
|
* The IsBackendPid check can't be relied on as definitive even if it
|
|
* was first. The process might end between successive checks
|
|
* regardless of their order. There's no way to acquire a lock on an
|
|
* arbitrary process to prevent that. But since so far all the callers
|
|
* of this mechanism involve some request for ending the process
|
|
* anyway, that it might end on its own first is not a problem.
|
|
*/
|
|
proc = BackendPidGetProc(pid);
|
|
if (proc == NULL || proc->roleId != GetUserId()) {
|
|
return SIGNAL_BACKEND_NOPERMISSION;
|
|
}
|
|
}
|
|
|
|
if (!IsBackendPid(pid)) {
|
|
/*
|
|
* This is just a warning so a loop-through-resultset will not abort
|
|
* if one backend terminated on its own during the run.
|
|
*/
|
|
ereport(WARNING, (errmsg("PID %lu is not a gaussdb server thread", pid)));
|
|
return SIGNAL_BACKEND_ERROR;
|
|
}
|
|
|
|
/*
|
|
* Can the process we just validated above end, followed by the pid being
|
|
* recycled for a new process, before reaching here? Then we'd be trying
|
|
* to kill the wrong thing. Seems near impossible when sequential pid
|
|
* assignment and wraparound is used. Perhaps it could happen on a system
|
|
* where pid re-use is randomized. That race condition possibility seems
|
|
* too unlikely to worry about.
|
|
*/
|
|
|
|
if (gs_signal_send(pid, sig)) {
|
|
/* Again, just a warning to allow loops */
|
|
ereport(WARNING, (errmsg("could not send signal to process %lu: %m", pid)));
|
|
return SIGNAL_BACKEND_ERROR;
|
|
}
|
|
return SIGNAL_BACKEND_SUCCESS;
|
|
}
|
|
|
|
uint64 get_query_id_beentry(ThreadId tid)
|
|
{
|
|
int i;
|
|
int n = pgstat_fetch_stat_numbackends();
|
|
|
|
for (i = 1; i <= n; i++) {
|
|
PgBackendStatus *beentry = pgstat_fetch_stat_beentry(i);
|
|
|
|
if (beentry != NULL) {
|
|
if (beentry->st_procpid == tid) {
|
|
return beentry->st_queryid;
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Signal to cancel a backend process. This is allowed if you are superuser or
|
|
* have the same role as the process being canceled.
|
|
*/
|
|
Datum pg_cancel_backend(PG_FUNCTION_ARGS)
|
|
{
|
|
int r = 0;
|
|
ThreadId tid = PG_GETARG_INT64(0);
|
|
|
|
/*
|
|
* It is forbidden to kill backend in the online expansion to protect
|
|
* the lock session from being interrupted by external applications.
|
|
*/
|
|
if (u_sess->attr.attr_sql.enable_online_ddl_waitlock && !u_sess->attr.attr_common.xc_maintenance_mode) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("kill backend is prohibited during online expansion."))));
|
|
}
|
|
|
|
r = pg_signal_backend(tid, SIGINT);
|
|
if (r == SIGNAL_BACKEND_NOPERMISSION) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be system admin or have the same role to cancel queries running in other server "
|
|
"processes"))));
|
|
}
|
|
|
|
if (t_thrd.proc && t_thrd.proc->workingVersionNum >= 92060) {
|
|
uint64 query_id = get_query_id_beentry(tid);
|
|
(void)gs_close_all_stream_by_debug_id(query_id);
|
|
}
|
|
PG_RETURN_BOOL(r == SIGNAL_BACKEND_SUCCESS);
|
|
}
|
|
|
|
/*
|
|
* Signal to cancel queries running in backends connected to demoted GTM.
|
|
* This is allowed if you are a superuser.
|
|
*/
|
|
Datum pg_cancel_invalid_query(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("unsupported proc in single node mode.")));
|
|
PG_RETURN_NULL();
|
|
#else
|
|
if (!superuser()) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be system admin to cancel invalid queries running in all server processes"))));
|
|
PG_RETURN_BOOL(false);
|
|
} else {
|
|
pgstat_cancel_invalid_gtm_conn();
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
// Report a fatal error. This is called just for test after threading.
|
|
//
|
|
Datum report_fatal(PG_FUNCTION_ARGS)
|
|
{
|
|
ereport(FATAL, (errmsg("this is a test.")));
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
// Signal a server thread. This is called just for test after threading.
|
|
//
|
|
Datum signal_backend(PG_FUNCTION_ARGS)
|
|
{
|
|
|
|
if (!superuser()) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be system admin to send signal to thread"))));
|
|
PG_RETURN_BOOL(false);
|
|
} else if (gs_signal_send(PG_GETARG_INT64(0), PG_GETARG_INT32(1))) {
|
|
ereport(WARNING, (errmsg("failed to send signal to thread.")));
|
|
PG_RETURN_BOOL(false);
|
|
}
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
|
|
static int kill_backend(ThreadId tid)
|
|
{
|
|
/*
|
|
* It is forbidden to kill backend in the online expansion to protect
|
|
* the lock session from being interrupted by external applications.
|
|
*/
|
|
if (u_sess->attr.attr_sql.enable_online_ddl_waitlock && !u_sess->attr.attr_common.xc_maintenance_mode) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("kill backend is prohibited during online expansion."))));
|
|
}
|
|
|
|
int r = pg_signal_backend(tid, SIGTERM);
|
|
if (r == SIGNAL_BACKEND_NOPERMISSION) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
(errmsg("must be system admin or have the same role to terminate other backend"))));
|
|
}
|
|
|
|
if (t_thrd.proc != NULL) {
|
|
uint64 query_id = get_query_id_beentry(tid);
|
|
(void)gs_close_all_stream_by_debug_id(query_id);
|
|
}
|
|
|
|
return r;
|
|
}
|
|
|
|
/*
|
|
* Signal to terminate a backend process. This is allowed if you are superuser
|
|
* or have the same role as the process being terminated.
|
|
*/
|
|
Datum pg_terminate_backend(PG_FUNCTION_ARGS)
|
|
{
|
|
ThreadId tid = PG_GETARG_INT64(0);
|
|
int r = kill_backend(tid);
|
|
PG_RETURN_BOOL(r == SIGNAL_BACKEND_SUCCESS);
|
|
}
|
|
|
|
Datum pg_terminate_session(PG_FUNCTION_ARGS)
|
|
{
|
|
ThreadId tid = PG_GETARG_INT64(0);
|
|
uint64 sid = PG_GETARG_INT64(1);
|
|
int r = 0;
|
|
|
|
if (tid == sid) {
|
|
r = kill_backend(tid);
|
|
} else {
|
|
ThreadPoolSessControl *sess_ctrl = g_threadPoolControler->GetSessionCtrl();
|
|
int ctrl_idx = sess_ctrl->FindCtrlIdxBySessId(sid);
|
|
r = sess_ctrl->SendSignal((int)ctrl_idx, SIGTERM);
|
|
}
|
|
|
|
PG_RETURN_BOOL(r == 0);
|
|
}
|
|
|
|
/*
|
|
* function name: pg_wlm_jump_queue
|
|
* description : wlm jump the queue with thread id.
|
|
*/
|
|
Datum pg_wlm_jump_queue(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
ThreadId tid = PG_GETARG_INT64(0);
|
|
|
|
if (g_instance.wlm_cxt->dynamic_workload_inited) {
|
|
dywlm_client_jump_queue(&g_instance.wlm_cxt->MyDefaultNodeGroup.climgr, tid);
|
|
} else {
|
|
WLMJumpQueue(&g_instance.wlm_cxt->MyDefaultNodeGroup.parctl, tid);
|
|
}
|
|
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
/*
|
|
* function name: gs_wlm_switch_cgroup
|
|
* description : wlm switch cgroup to new cgroup with session id.
|
|
*/
|
|
Datum gs_wlm_switch_cgroup(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
uint64 sess_id = PG_GETARG_INT64(0);
|
|
char* cgroup = PG_GETARG_CSTRING(1);
|
|
|
|
bool ret = false;
|
|
|
|
if (g_instance.attr.attr_common.enable_thread_pool) {
|
|
ereport(WARNING, (errmsg("Cannot switch control group in thread pool mode.")));
|
|
} else if (g_instance.wlm_cxt->gscgroup_init_done > 0) {
|
|
/* Only superuser or the owner of the query can change the control group. */
|
|
if (IS_PGXC_COORDINATOR && !superuser()) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("the user have no right to "
|
|
"change cgroup for session [%lu]!",
|
|
sess_id)));
|
|
}
|
|
|
|
/* If the connection is not from coordinator, data node cannot changed cgroup itself. */
|
|
if (IS_PGXC_COORDINATOR || IsConnFromCoord()) {
|
|
ret = WLMAjustCGroupByCNSessid(&g_instance.wlm_cxt->MyDefaultNodeGroup, sess_id, cgroup);
|
|
}
|
|
} else {
|
|
ereport(WARNING, (errmsg("Switch failed because of cgroup without initialization.")));
|
|
}
|
|
|
|
PG_RETURN_BOOL(ret);
|
|
}
|
|
|
|
/*
|
|
* function name: gs_wlm_node_recover
|
|
* description : recover node for dynamic workload.
|
|
*/
|
|
Datum gs_wlm_node_recover(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
bool is_force = PG_GETARG_BOOL(0);
|
|
int count = 0;
|
|
|
|
while (!WLMIsInfoInit()) {
|
|
CHECK_FOR_INTERRUPTS();
|
|
++count;
|
|
sleep(1);
|
|
if (count >= 3) {
|
|
ereport(WARNING, (errmsg("node recovering for dynamic workload failed.")));
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
}
|
|
|
|
if (!g_instance.wlm_cxt->dynamic_workload_inited) {
|
|
ereport(NOTICE, (errmsg("dynamic workload disable, need not recover.")));
|
|
} else {
|
|
dywlm_node_recover(is_force);
|
|
}
|
|
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
/*
|
|
* function name: gs_wlm_node_recover
|
|
* description : recover node for dynamic workload.
|
|
*/
|
|
Datum gs_wlm_node_clean(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
char* nodename = PG_GETARG_CSTRING(0);
|
|
bool ret = false;
|
|
|
|
if (!g_instance.wlm_cxt->dynamic_workload_inited) {
|
|
ereport(NOTICE, (errmsg("dynamic workload disable, need not clean.")));
|
|
} else {
|
|
dywlm_server_clean(nodename);
|
|
ret = true;
|
|
}
|
|
|
|
PG_RETURN_BOOL(ret);
|
|
}
|
|
|
|
/*
|
|
* function name: gs_wlm_rebuild_user_resource_pool
|
|
* description : rebuild user and resource pool htab.
|
|
*/
|
|
Datum gs_wlm_rebuild_user_resource_pool(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
/* rebuild user resource pool hash table */
|
|
if (!BuildUserRPHash())
|
|
ereport(LOG, (errmsg("call 'gs_wlm_rebuild_user_resource_pool' to build user hash failed")));
|
|
else {
|
|
ereport(LOG, (errmsg("call 'gs_wlm_rebuild_user_resource_pool' to build user hash finished")));
|
|
}
|
|
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
/*
|
|
* @Description: readjust user total space
|
|
* @IN roleid: user oid
|
|
* @Return: success or not
|
|
* @See also:
|
|
*/
|
|
Datum gs_wlm_readjust_user_space(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
Oid roleid = PG_GETARG_OID(0);
|
|
|
|
int count = 0;
|
|
|
|
while (!WLMIsInfoInit()) {
|
|
CHECK_FOR_INTERRUPTS();
|
|
++count;
|
|
sleep(5);
|
|
|
|
if (count >= 3)
|
|
PG_RETURN_TEXT_P(cstring_to_text("Exec Failed"));
|
|
}
|
|
|
|
/* verify all user space */
|
|
WLMReadjustAllUserSpace(roleid);
|
|
|
|
PG_RETURN_TEXT_P(cstring_to_text("Exec Success"));
|
|
}
|
|
|
|
/*
|
|
* @Description: readjust user total space through username
|
|
* @IN username: user name
|
|
* @Return: success or not
|
|
* @See also:
|
|
*/
|
|
Datum gs_wlm_readjust_user_space_through_username(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
char* username = PG_GETARG_CSTRING(0);
|
|
int count = 0;
|
|
|
|
while (!WLMIsInfoInit()) {
|
|
CHECK_FOR_INTERRUPTS();
|
|
++count;
|
|
sleep(5);
|
|
|
|
if (count >= 3)
|
|
PG_RETURN_TEXT_P(cstring_to_text("Exec Failed"));
|
|
}
|
|
|
|
/* verify user space in all databases */
|
|
WLMReadjustUserSpaceThroughAllDbs(username);
|
|
|
|
PG_RETURN_TEXT_P(cstring_to_text("Exec Success"));
|
|
}
|
|
|
|
/*
|
|
* @Description: readjust user total space with reset flag,
|
|
* if flag is true, means calculate used space from zero,
|
|
* if flag is false, means calculate used space one by one.
|
|
* @IN username: user name
|
|
* @Return: success or not
|
|
* @See also:
|
|
*/
|
|
Datum gs_wlm_readjust_user_space_with_reset_flag(PG_FUNCTION_ARGS)
|
|
{
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
|
|
#endif
|
|
|
|
char* username = PG_GETARG_CSTRING(0);
|
|
bool is_reset = PG_GETARG_BOOL(1);
|
|
|
|
int count = 0;
|
|
|
|
while (!WLMIsInfoInit()) {
|
|
CHECK_FOR_INTERRUPTS();
|
|
++count;
|
|
sleep(5);
|
|
|
|
if (count >= 3)
|
|
PG_RETURN_TEXT_P(cstring_to_text("Exec Failed"));
|
|
}
|
|
|
|
/* verify all user space */
|
|
WLMReadjustUserSpaceByNameWithResetFlag(username, is_reset);
|
|
|
|
PG_RETURN_TEXT_P(cstring_to_text("Exec Success"));
|
|
}
|
|
|
|
/*
|
|
* function name: gs_get_role_name
|
|
* description :get role name with user oid.
|
|
*/
|
|
Datum gs_get_role_name(PG_FUNCTION_ARGS)
|
|
{
|
|
Oid roleid = PG_GETARG_OID(0);
|
|
|
|
char rolname[NAMEDATALEN] = {0};
|
|
|
|
if (OidIsValid(roleid)) {
|
|
(void)GetRoleName(roleid, rolname, sizeof(rolname));
|
|
}
|
|
|
|
PG_RETURN_TEXT_P(cstring_to_text(rolname));
|
|
}
|
|
|
|
/*
|
|
* Signal to reload the database configuration
|
|
*/
|
|
Datum pg_reload_conf(PG_FUNCTION_ARGS)
|
|
{
|
|
if (!superuser()) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("must be system admin to signal the postmaster"))));
|
|
}
|
|
|
|
if (gs_signal_send(PostmasterPid, SIGHUP)) {
|
|
ereport(WARNING, (errmsg("failed to send signal to postmaster: %m")));
|
|
PG_RETURN_BOOL(false);
|
|
}
|
|
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
/*
|
|
* Rotate log file
|
|
*/
|
|
Datum pg_rotate_logfile(PG_FUNCTION_ARGS)
|
|
{
|
|
if (!superuser()) {
|
|
ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("must be system admin to rotate log files"))));
|
|
}
|
|
|
|
if (!g_instance.attr.attr_common.Logging_collector) {
|
|
ereport(WARNING, (errmsg("rotation not possible because log collection not active")));
|
|
PG_RETURN_BOOL(false);
|
|
}
|
|
|
|
SendPostmasterSignal(PMSIGNAL_ROTATE_LOGFILE);
|
|
PG_RETURN_BOOL(true);
|
|
}
|
|
|
|
/*
|
|
* Function to find out which databases make use of a tablespace
|
|
*/
|
|
typedef struct {
|
|
char* location;
|
|
DIR* dirdesc;
|
|
} ts_db_fctx;
|
|
|
|
Datum pg_tablespace_databases(PG_FUNCTION_ARGS)
|
|
{
|
|
FuncCallContext* funcctx = NULL;
|
|
struct dirent* de = NULL;
|
|
ts_db_fctx* fctx = NULL;
|
|
int location_len, ss_rc;
|
|
|
|
if (SRF_IS_FIRSTCALL()) {
|
|
MemoryContext oldcontext;
|
|
Oid table_space_oid = PG_GETARG_OID(0);
|
|
|
|
funcctx = SRF_FIRSTCALL_INIT();
|
|
oldcontext = MemoryContextSwitchTo(funcctx->multi_call_memory_ctx);
|
|
|
|
fctx = (ts_db_fctx*)palloc(sizeof(ts_db_fctx));
|
|
|
|
/*
|
|
* size = tablespace dirname length + dir sep char + oid + terminator
|
|
*/
|
|
#ifdef PGXC
|
|
/* Postgres-XC tablespaces also include node name in path */
|
|
location_len = 9 + 1 + OIDCHARS + 1 + strlen(g_instance.attr.attr_common.PGXCNodeName) + 1 +
|
|
strlen(TABLESPACE_VERSION_DIRECTORY) + 1;
|
|
fctx->location = (char*)palloc(location_len);
|
|
#else
|
|
location_len = 9 + 1 + OIDCHARS + 1 + strlen(TABLESPACE_VERSION_DIRECTORY) + 1 fctx->location =
|
|
(char*)palloc(location_len);
|
|
#endif
|
|
if (table_space_oid == GLOBALTABLESPACE_OID) {
|
|
fctx->dirdesc = NULL;
|
|
ereport(WARNING, (errmsg("global tablespace never has databases")));
|
|
} else {
|
|
if (table_space_oid == DEFAULTTABLESPACE_OID) {
|
|
ss_rc = sprintf_s(fctx->location, location_len, "base");
|
|
} else {
|
|
#ifdef PGXC
|
|
/* Postgres-XC tablespaces also include node name in path */
|
|
ss_rc = sprintf_s(fctx->location,
|
|
location_len,
|
|
"pg_tblspc/%u/%s_%s",
|
|
table_space_oid,
|
|
TABLESPACE_VERSION_DIRECTORY,
|
|
g_instance.attr.attr_common.PGXCNodeName);
|
|
#else
|
|
ss_rc = sprintf_s(
|
|
fctx->location, location_len, "pg_tblspc/%u/%s", table_space_oid, TABLESPACE_VERSION_DIRECTORY);
|
|
#endif
|
|
}
|
|
securec_check_ss(ss_rc, "\0", "\0");
|
|
fctx->dirdesc = AllocateDir(fctx->location);
|
|
|
|
if (fctx->dirdesc == NULL) {
|
|
/* the only expected error is ENOENT */
|
|
if (errno != ENOENT) {
|
|
ereport(ERROR,
|
|
(errcode_for_file_access(), errmsg("could not open directory \"%s\": %m", fctx->location)));
|
|
}
|
|
ereport(WARNING, (errmsg("%u is not a tablespace OID", table_space_oid)));
|
|
}
|
|
}
|
|
funcctx->user_fctx = fctx;
|
|
MemoryContextSwitchTo(oldcontext);
|
|
}
|
|
|
|
funcctx = SRF_PERCALL_SETUP();
|
|
fctx = (ts_db_fctx*)funcctx->user_fctx;
|
|
|
|
if (fctx->dirdesc == NULL) { /* not a tablespace */
|
|
SRF_RETURN_DONE(funcctx);
|
|
}
|
|
|
|
while ((de = ReadDir(fctx->dirdesc, fctx->location)) != NULL) {
|
|
char* subdir = NULL;
|
|
DIR* dirdesc = NULL;
|
|
Oid datOid = atooid(de->d_name);
|
|
|
|
/* this test skips . and .., but is awfully weak */
|
|
if (!datOid) {
|
|
continue;
|
|
}
|
|
|
|
/* if database subdir is empty, don't report tablespace as used */
|
|
/* size = path length + dir sep char + file name + terminator */
|
|
int sub_len = strlen(fctx->location) + 1 + strlen(de->d_name) + 1;
|
|
subdir = (char*)palloc(sub_len);
|
|
ss_rc = sprintf_s(subdir, sub_len, "%s/%s", fctx->location, de->d_name);
|
|
securec_check_ss(ss_rc, "\0", "\0");
|
|
dirdesc = AllocateDir(subdir);
|
|
while ((de = ReadDir(dirdesc, subdir)) != NULL) {
|
|
if (strcmp(de->d_name, ".") != 0 && strcmp(de->d_name, "..") != 0) {
|
|
break;
|
|
}
|
|
}
|
|
FreeDir(dirdesc);
|
|
pfree_ext(subdir);
|
|
|
|
if (de == NULL) {
|
|
continue; /* indeed, nothing in it */
|
|
}
|
|
|
|
SRF_RETURN_NEXT(funcctx, ObjectIdGetDatum(datOid));
|
|
}
|
|
|
|
FreeDir(fctx->dirdesc);
|
|
SRF_RETURN_DONE(funcctx);
|
|
}
|
|
|
|
/*
|
|
* pg_tablespace_location - get location for a tablespace
|
|
*/
|
|
Datum pg_tablespace_location(PG_FUNCTION_ARGS)
|
|
{
|
|
Oid table_space_oid = PG_GETARG_OID(0);
|
|
char source_path[MAXPGPATH];
|
|
char target_path[MAXPGPATH];
|
|
int rllen;
|
|
|
|
if (!superuser()) {
|
|
ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("permission denied."))));
|
|
}
|
|
|
|
/*
|
|
* It's useful to apply this function to pg_class.reltablespace, wherein
|
|
* zero means "the database's default tablespace". So, rather than
|
|
* throwing an error for zero, we choose to assume that's what is meant.
|
|
*/
|
|
table_space_oid = ConvertToRelfilenodeTblspcOid(table_space_oid);
|
|
/*
|
|
* Return empty string for the cluster's default tablespaces. If the
|
|
* currrent user is not superuser, we should not expose the absolute
|
|
* path to the client.
|
|
*/
|
|
if (table_space_oid == DEFAULTTABLESPACE_OID || table_space_oid == GLOBALTABLESPACE_OID || !superuser()) {
|
|
PG_RETURN_TEXT_P(cstring_to_text(""));
|
|
}
|
|
|
|
#if defined(HAVE_READLINK) || defined(WIN32)
|
|
/*
|
|
* Find the location of the tablespace by reading the symbolic link that
|
|
* is in pg_tblspc/<oid>.
|
|
*/
|
|
errno_t ss_rc = snprintf_s(source_path, sizeof(source_path), sizeof(source_path) - 1, "pg_tblspc/%u", table_space_oid);
|
|
securec_check_ss(ss_rc, "\0", "\0");
|
|
|
|
rllen = readlink(source_path, target_path, sizeof(target_path));
|
|
if (rllen < 0) {
|
|
ereport(
|
|
ERROR, (errcode(ERRCODE_FILE_READ_FAILED), errmsg("could not read symbolic link \"%s\": %m", source_path)));
|
|
} else if ((unsigned int)(rllen) >= sizeof(target_path)) {
|
|
ereport(ERROR, (errcode(ERRCODE_NAME_TOO_LONG), errmsg("symbolic link \"%s\" target is too long", source_path)));
|
|
}
|
|
target_path[rllen] = '\0';
|
|
|
|
/* relative location will contain t_thrd.proc_cxt.DataDir */
|
|
size_t dataDirLength = strlen(t_thrd.proc_cxt.DataDir);
|
|
if (0 == strncmp(target_path, t_thrd.proc_cxt.DataDir, dataDirLength) && rllen > dataDirLength &&
|
|
target_path[dataDirLength] == '/') {
|
|
/*
|
|
* The position is not '/' when skip t_thrd.proc_cxt.DataDir. the relative location can't start from '/'
|
|
* We only need get the relative location, so remove the common prefix
|
|
*/
|
|
int pos = (t_thrd.proc_cxt.DataDir[strlen(t_thrd.proc_cxt.DataDir)] == '/')
|
|
? strlen(t_thrd.proc_cxt.DataDir)
|
|
: strlen(t_thrd.proc_cxt.DataDir) + 1;
|
|
pos += strlen(PG_LOCATION_DIR) + 1;
|
|
errno_t rc = memmove_s(target_path, MAXPGPATH, target_path + pos, strlen(target_path) - pos);
|
|
securec_check(rc, "\0", "\0");
|
|
target_path[strlen(target_path) - pos] = '\0';
|
|
}
|
|
PG_RETURN_TEXT_P(cstring_to_text(target_path));
|
|
#else
|
|
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("tablespaces are not supported on this platform")));
|
|
PG_RETURN_NULL();
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* pg_sleep - delay for N seconds
|
|
*/
|
|
Datum pg_sleep(PG_FUNCTION_ARGS)
|
|
{
|
|
float8 secs = PG_GETARG_FLOAT8(0);
|
|
float8 endtime;
|
|
|
|
/*
|
|
* We break the requested sleep into segments of no more than 1 second, to
|
|
* put an upper bound on how long it will take us to respond to a cancel
|
|
* or die interrupt. (Note that pg_usleep is interruptible by signals on
|
|
* some platforms but not others.) Also, this method avoids exposing
|
|
* pg_usleep's upper bound on allowed delays.
|
|
*
|
|
* By computing the intended stop time initially, we avoid accumulation of
|
|
* extra delay across multiple sleeps. This also ensures we won't delay
|
|
* less than the specified time if pg_usleep is interrupted by other
|
|
* signals such as SIGHUP.
|
|
*/
|
|
|
|
#ifdef HAVE_INT64_TIMESTAMP
|
|
#define GetNowFloat() ((float8)GetCurrentTimestamp() / 1000000.0)
|
|
#else
|
|
#define GetNowFloat() GetCurrentTimestamp()
|
|
#endif
|
|
|
|
endtime = GetNowFloat() + secs;
|
|
|
|
for (;;) {
|
|
float8 delay;
|
|
|
|
CHECK_FOR_INTERRUPTS();
|
|
delay = endtime - GetNowFloat();
|
|
if (delay >= 1.0) {
|
|
pg_usleep(1000000L);
|
|
} else if (delay > 0.0) {
|
|
pg_usleep((long)ceil(delay * 1000000.0));
|
|
} else {
|
|
break;
|
|
}
|
|
}
|
|
|
|
PG_RETURN_VOID();
|
|
}
|
|
|
|
Datum pg_get_nodename(PG_FUNCTION_ARGS)
|
|
{
|
|
if (g_instance.attr.attr_common.PGXCNodeName == NULL) {
|
|
g_instance.attr.attr_common.PGXCNodeName = "Error Node";
|
|
}
|
|
|
|
PG_RETURN_TEXT_P(cstring_to_text(g_instance.attr.attr_common.PGXCNodeName));
|
|
}
|
|
|
|
/* Function to return the list of grammar keywords */
|
|
Datum pg_get_keywords(PG_FUNCTION_ARGS)
|
|
{
|
|
FuncCallContext* funcctx = NULL;
|
|
|
|
if (SRF_IS_FIRSTCALL()) {
|
|
MemoryContext oldcontext;
|
|
TupleDesc tupdesc;
|
|
|
|
funcctx = SRF_FIRSTCALL_INIT();
|
|
oldcontext = MemoryContextSwitchTo(funcctx->multi_call_memory_ctx);
|
|
|
|
tupdesc = CreateTemplateTupleDesc(3, false);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber)1, "word", TEXTOID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber)2, "catcode", CHAROID, -1, 0);
|
|
TupleDescInitEntry(tupdesc, (AttrNumber)3, "catdesc", TEXTOID, -1, 0);
|
|
|
|
funcctx->attinmeta = TupleDescGetAttInMetadata(tupdesc);
|
|
|
|
MemoryContextSwitchTo(oldcontext);
|
|
}
|
|
|
|
funcctx = SRF_PERCALL_SETUP();
|
|
if (funcctx->call_cntr < (unsigned int)(NumScanKeywords)) {
|
|
char* values[3];
|
|
HeapTuple tuple;
|
|
|
|
/* cast-away-const is ugly but alternatives aren't much better */
|
|
values[0] = (char*)ScanKeywords[funcctx->call_cntr].name;
|
|
|
|
switch (ScanKeywords[funcctx->call_cntr].category) {
|
|
case UNRESERVED_KEYWORD:
|
|
values[1] = "U";
|
|
values[2] = _("unreserved");
|
|
break;
|
|
case COL_NAME_KEYWORD:
|
|
values[1] = "C";
|
|
values[2] = _("unreserved (cannot be function or type name)");
|
|
break;
|
|
case TYPE_FUNC_NAME_KEYWORD:
|
|
values[1] = "T";
|
|
values[2] = _("reserved (can be function or type name)");
|
|
break;
|
|
case RESERVED_KEYWORD:
|
|
values[1] = "R";
|
|
values[2] = _("reserved");
|
|
break;
|
|
default: /* shouldn't be possible */
|
|
values[1] = NULL;
|
|
values[2] = NULL;
|
|
break;
|
|
}
|
|
|
|
tuple = BuildTupleFromCStrings(funcctx->attinmeta, values);
|
|
|
|
SRF_RETURN_NEXT(funcctx, HeapTupleGetDatum(tuple));
|
|
}
|
|
|
|
SRF_RETURN_DONE(funcctx);
|
|
}
|
|
|
|
/*
|
|
* Return the type of the argument.
|
|
*/
|
|
Datum pg_typeof(PG_FUNCTION_ARGS)
|
|
{
|
|
PG_RETURN_OID(get_fn_expr_argtype(fcinfo->flinfo, 0));
|
|
}
|
|
|
|
/*
|
|
* Implementation of the COLLATE FOR expression; returns the collation
|
|
* of the argument.
|
|
*/
|
|
Datum pg_collation_for(PG_FUNCTION_ARGS)
|
|
{
|
|
Oid typeId;
|
|
Oid collid;
|
|
|
|
typeId = get_fn_expr_argtype(fcinfo->flinfo, 0);
|
|
if (!typeId) {
|
|
PG_RETURN_NULL();
|
|
}
|
|
if (!type_is_collatable(typeId) && typeId != UNKNOWNOID) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DATATYPE_MISMATCH),
|
|
errmsg("collations are not supported by type %s", format_type_be(typeId))));
|
|
}
|
|
|
|
collid = PG_GET_COLLATION();
|
|
if (!collid) {
|
|
PG_RETURN_NULL();
|
|
}
|
|
PG_RETURN_TEXT_P(cstring_to_text(generate_collation_name(collid)));
|
|
}
|
|
|
|
Datum pg_test_err_contain_err(PG_FUNCTION_ARGS)
|
|
{
|
|
u_sess->utils_cxt.test_err_type = PG_GETARG_INT32(0);
|
|
|
|
switch (u_sess->utils_cxt.test_err_type) {
|
|
case 1: {
|
|
PG_TRY();
|
|
{
|
|
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERROR RETHROW")));
|
|
}
|
|
PG_CATCH();
|
|
{
|
|
PG_RE_THROW();
|
|
}
|
|
PG_END_TRY();
|
|
|
|
break;
|
|
}
|
|
|
|
case 2: {
|
|
PG_TRY();
|
|
{
|
|
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERROR")));
|
|
}
|
|
PG_CATCH();
|
|
{
|
|
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERROR CATCH")));
|
|
}
|
|
PG_END_TRY();
|
|
|
|
break;
|
|
}
|
|
|
|
case 3: {
|
|
PG_TRY();
|
|
{
|
|
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERR ERR RETHOW")));
|
|
}
|
|
PG_CATCH();
|
|
{
|
|
PG_RE_THROW();
|
|
}
|
|
PG_END_TRY();
|
|
|
|
break;
|
|
}
|
|
|
|
case 4: {
|
|
PG_TRY();
|
|
{
|
|
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERR ERR RETHOW")));
|
|
}
|
|
PG_CATCH();
|
|
{
|
|
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERR ERR CATCH")));
|
|
}
|
|
PG_END_TRY();
|
|
|
|
break;
|
|
}
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
PG_RETURN_VOID();
|
|
}
|
|
|
|
// Signal to cancel a backend process. This is allowed if you are superuser
|
|
// or have the same role as the process being canceled.
|
|
void cancel_backend(Oid pid)
|
|
{
|
|
int sig_return = 0;
|
|
|
|
sig_return = pg_signal_backend(pid, SIGINT);
|
|
if (sig_return == SIGNAL_BACKEND_NOPERMISSION) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("fail to drop the user"),
|
|
errhint("fail to cancel backend process for privilege")));
|
|
}
|
|
}
|