Files
openGauss-server/src/common/backend/utils/adt/misc.cpp

994 lines
29 KiB
C++
Executable File

/* -------------------------------------------------------------------------
*
* misc.c
*
*
* Portions Copyright (c) 1996-2012, PostgreSQL Global Development Group
* Portions Copyright (c) 1994, Regents of the University of California
*
*
* IDENTIFICATION
* src/backend/utils/adt/misc.c
*
* -------------------------------------------------------------------------
*/
#include "postgres.h"
#include "knl/knl_variable.h"
#include <sys/file.h>
#include <signal.h>
#include <dirent.h>
#include <math.h>
#include <unistd.h>
#include "catalog/catalog.h"
#include "catalog/pg_tablespace.h"
#include "catalog/pg_type.h"
#include "commands/dbcommands.h"
#include "commands/tablespace.h"
#include "commands/user.h"
#include "funcapi.h"
#include "miscadmin.h"
#include "parser/keywords.h"
#include "pgstat.h"
#include "postmaster/syslogger.h"
#include "replication/replicainternal.h"
#include "storage/fd.h"
#include "storage/pmsignal.h"
#include "storage/proc.h"
#include "storage/procarray.h"
#include "utils/lsyscache.h"
#include "tcop/tcopprot.h"
#include "utils/builtins.h"
#include "utils/timestamp.h"
#include "gssignal/gs_signal.h"
#include "workload/workload.h"
#ifdef PGXC
#include "pgxc/pgxc.h"
#endif
extern void cancel_backend(Oid pid);
#define atooid(x) ((Oid)strtoul((x), NULL, 10))
/*
* Expose the current database to the user
*/
Datum current_database(PG_FUNCTION_ARGS)
{
Name db;
db = (Name)palloc(NAMEDATALEN);
char* dbname = get_database_name(u_sess->proc_cxt.MyDatabaseId);
(void)namestrcpy(db, dbname ? dbname : "null");
PG_RETURN_NAME(db);
}
/*
* Expose the current query to the user (useful in stored procedures)
* We might want to use ActivePortal->sourceText someday.
*/
Datum current_query(PG_FUNCTION_ARGS)
{
/* there is no easy way to access the more concise 'query_string' */
if (t_thrd.postgres_cxt.debug_query_string) {
PG_RETURN_TEXT_P(cstring_to_text(t_thrd.postgres_cxt.debug_query_string));
} else {
PG_RETURN_NULL();
}
}
/*
* Send a signal to another backend.
*
* The signal is delivered if the user is either a superuser or the same
* role as the backend being signaled. For "dangerous" signals, an explicit
* check for superuser needs to be done prior to calling this function.
*
* Returns 0 on success, 1 on general failure, and 2 on permission error.
* In the event of a general failure (return code 1), a warning message will
* be emitted. For permission errors, doing that is the responsibility of
* the caller.
*/
#define SIGNAL_BACKEND_SUCCESS 0
#define SIGNAL_BACKEND_ERROR 1
#define SIGNAL_BACKEND_NOPERMISSION 2
static int pg_signal_backend(ThreadId pid, int sig)
{
PGPROC* proc = NULL;
if (!superuser()) {
/*
* Since the user is not superuser, check for matching roles. Trust
* that BackendPidGetProc will return NULL if the pid isn't valid,
* even though the check for whether it's a backend process is below.
* The IsBackendPid check can't be relied on as definitive even if it
* was first. The process might end between successive checks
* regardless of their order. There's no way to acquire a lock on an
* arbitrary process to prevent that. But since so far all the callers
* of this mechanism involve some request for ending the process
* anyway, that it might end on its own first is not a problem.
*/
proc = BackendPidGetProc(pid);
if (proc == NULL || proc->roleId != GetUserId()) {
return SIGNAL_BACKEND_NOPERMISSION;
}
}
if (!IsBackendPid(pid)) {
/*
* This is just a warning so a loop-through-resultset will not abort
* if one backend terminated on its own during the run.
*/
ereport(WARNING, (errmsg("PID %lu is not a gaussdb server thread", pid)));
return SIGNAL_BACKEND_ERROR;
}
/*
* Can the process we just validated above end, followed by the pid being
* recycled for a new process, before reaching here? Then we'd be trying
* to kill the wrong thing. Seems near impossible when sequential pid
* assignment and wraparound is used. Perhaps it could happen on a system
* where pid re-use is randomized. That race condition possibility seems
* too unlikely to worry about.
*/
if (gs_signal_send(pid, sig)) {
/* Again, just a warning to allow loops */
ereport(WARNING, (errmsg("could not send signal to process %lu: %m", pid)));
return SIGNAL_BACKEND_ERROR;
}
return SIGNAL_BACKEND_SUCCESS;
}
uint64 get_query_id_beentry(ThreadId tid)
{
int i;
int n = pgstat_fetch_stat_numbackends();
for (i = 1; i <= n; i++) {
PgBackendStatus *beentry = pgstat_fetch_stat_beentry(i);
if (beentry != NULL) {
if (beentry->st_procpid == tid) {
return beentry->st_queryid;
}
}
}
return 0;
}
/*
* Signal to cancel a backend process. This is allowed if you are superuser or
* have the same role as the process being canceled.
*/
Datum pg_cancel_backend(PG_FUNCTION_ARGS)
{
int r = 0;
ThreadId tid = PG_GETARG_INT64(0);
/*
* It is forbidden to kill backend in the online expansion to protect
* the lock session from being interrupted by external applications.
*/
if (u_sess->attr.attr_sql.enable_online_ddl_waitlock && !u_sess->attr.attr_common.xc_maintenance_mode) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("kill backend is prohibited during online expansion."))));
}
r = pg_signal_backend(tid, SIGINT);
if (r == SIGNAL_BACKEND_NOPERMISSION) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("must be system admin or have the same role to cancel queries running in other server "
"processes"))));
}
if (t_thrd.proc && t_thrd.proc->workingVersionNum >= 92060) {
uint64 query_id = get_query_id_beentry(tid);
(void)gs_close_all_stream_by_debug_id(query_id);
}
PG_RETURN_BOOL(r == SIGNAL_BACKEND_SUCCESS);
}
/*
* Signal to cancel queries running in backends connected to demoted GTM.
* This is allowed if you are a superuser.
*/
Datum pg_cancel_invalid_query(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("unsupported proc in single node mode.")));
PG_RETURN_NULL();
#else
if (!superuser()) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("must be system admin to cancel invalid queries running in all server processes"))));
PG_RETURN_BOOL(false);
} else {
pgstat_cancel_invalid_gtm_conn();
PG_RETURN_BOOL(true);
}
#endif
}
// Report a fatal error. This is called just for test after threading.
//
Datum report_fatal(PG_FUNCTION_ARGS)
{
ereport(FATAL, (errmsg("this is a test.")));
PG_RETURN_BOOL(true);
}
// Signal a server thread. This is called just for test after threading.
//
Datum signal_backend(PG_FUNCTION_ARGS)
{
if (!superuser()) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("must be system admin to send signal to thread"))));
PG_RETURN_BOOL(false);
} else if (gs_signal_send(PG_GETARG_INT64(0), PG_GETARG_INT32(1))) {
ereport(WARNING, (errmsg("failed to send signal to thread.")));
PG_RETURN_BOOL(false);
}
PG_RETURN_BOOL(true);
}
static int kill_backend(ThreadId tid)
{
/*
* It is forbidden to kill backend in the online expansion to protect
* the lock session from being interrupted by external applications.
*/
if (u_sess->attr.attr_sql.enable_online_ddl_waitlock && !u_sess->attr.attr_common.xc_maintenance_mode) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("kill backend is prohibited during online expansion."))));
}
int r = pg_signal_backend(tid, SIGTERM);
if (r == SIGNAL_BACKEND_NOPERMISSION) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
(errmsg("must be system admin or have the same role to terminate other backend"))));
}
if (t_thrd.proc != NULL) {
uint64 query_id = get_query_id_beentry(tid);
(void)gs_close_all_stream_by_debug_id(query_id);
}
return r;
}
/*
* Signal to terminate a backend process. This is allowed if you are superuser
* or have the same role as the process being terminated.
*/
Datum pg_terminate_backend(PG_FUNCTION_ARGS)
{
ThreadId tid = PG_GETARG_INT64(0);
int r = kill_backend(tid);
PG_RETURN_BOOL(r == SIGNAL_BACKEND_SUCCESS);
}
Datum pg_terminate_session(PG_FUNCTION_ARGS)
{
ThreadId tid = PG_GETARG_INT64(0);
uint64 sid = PG_GETARG_INT64(1);
int r = 0;
if (tid == sid) {
r = kill_backend(tid);
} else {
ThreadPoolSessControl *sess_ctrl = g_threadPoolControler->GetSessionCtrl();
int ctrl_idx = sess_ctrl->FindCtrlIdxBySessId(sid);
r = sess_ctrl->SendSignal((int)ctrl_idx, SIGTERM);
}
PG_RETURN_BOOL(r == 0);
}
/*
* function name: pg_wlm_jump_queue
* description : wlm jump the queue with thread id.
*/
Datum pg_wlm_jump_queue(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
ThreadId tid = PG_GETARG_INT64(0);
if (g_instance.wlm_cxt->dynamic_workload_inited) {
dywlm_client_jump_queue(&g_instance.wlm_cxt->MyDefaultNodeGroup.climgr, tid);
} else {
WLMJumpQueue(&g_instance.wlm_cxt->MyDefaultNodeGroup.parctl, tid);
}
PG_RETURN_BOOL(true);
}
/*
* function name: gs_wlm_switch_cgroup
* description : wlm switch cgroup to new cgroup with session id.
*/
Datum gs_wlm_switch_cgroup(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
uint64 sess_id = PG_GETARG_INT64(0);
char* cgroup = PG_GETARG_CSTRING(1);
bool ret = false;
if (g_instance.attr.attr_common.enable_thread_pool) {
ereport(WARNING, (errmsg("Cannot switch control group in thread pool mode.")));
} else if (g_instance.wlm_cxt->gscgroup_init_done > 0) {
/* Only superuser or the owner of the query can change the control group. */
if (IS_PGXC_COORDINATOR && !superuser()) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
errmsg("the user have no right to "
"change cgroup for session [%lu]!",
sess_id)));
}
/* If the connection is not from coordinator, data node cannot changed cgroup itself. */
if (IS_PGXC_COORDINATOR || IsConnFromCoord()) {
ret = WLMAjustCGroupByCNSessid(&g_instance.wlm_cxt->MyDefaultNodeGroup, sess_id, cgroup);
}
} else {
ereport(WARNING, (errmsg("Switch failed because of cgroup without initialization.")));
}
PG_RETURN_BOOL(ret);
}
/*
* function name: gs_wlm_node_recover
* description : recover node for dynamic workload.
*/
Datum gs_wlm_node_recover(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
bool is_force = PG_GETARG_BOOL(0);
int count = 0;
while (!WLMIsInfoInit()) {
CHECK_FOR_INTERRUPTS();
++count;
sleep(1);
if (count >= 3) {
ereport(WARNING, (errmsg("node recovering for dynamic workload failed.")));
PG_RETURN_BOOL(true);
}
}
if (!g_instance.wlm_cxt->dynamic_workload_inited) {
ereport(NOTICE, (errmsg("dynamic workload disable, need not recover.")));
} else {
dywlm_node_recover(is_force);
}
PG_RETURN_BOOL(true);
}
/*
* function name: gs_wlm_node_recover
* description : recover node for dynamic workload.
*/
Datum gs_wlm_node_clean(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
char* nodename = PG_GETARG_CSTRING(0);
bool ret = false;
if (!g_instance.wlm_cxt->dynamic_workload_inited) {
ereport(NOTICE, (errmsg("dynamic workload disable, need not clean.")));
} else {
dywlm_server_clean(nodename);
ret = true;
}
PG_RETURN_BOOL(ret);
}
/*
* function name: gs_wlm_rebuild_user_resource_pool
* description : rebuild user and resource pool htab.
*/
Datum gs_wlm_rebuild_user_resource_pool(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
/* rebuild user resource pool hash table */
if (!BuildUserRPHash())
ereport(LOG, (errmsg("call 'gs_wlm_rebuild_user_resource_pool' to build user hash failed")));
else {
ereport(LOG, (errmsg("call 'gs_wlm_rebuild_user_resource_pool' to build user hash finished")));
}
PG_RETURN_BOOL(true);
}
/*
* @Description: readjust user total space
* @IN roleid: user oid
* @Return: success or not
* @See also:
*/
Datum gs_wlm_readjust_user_space(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
Oid roleid = PG_GETARG_OID(0);
int count = 0;
while (!WLMIsInfoInit()) {
CHECK_FOR_INTERRUPTS();
++count;
sleep(5);
if (count >= 3)
PG_RETURN_TEXT_P(cstring_to_text("Exec Failed"));
}
/* verify all user space */
WLMReadjustAllUserSpace(roleid);
PG_RETURN_TEXT_P(cstring_to_text("Exec Success"));
}
/*
* @Description: readjust user total space through username
* @IN username: user name
* @Return: success or not
* @See also:
*/
Datum gs_wlm_readjust_user_space_through_username(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
char* username = PG_GETARG_CSTRING(0);
int count = 0;
while (!WLMIsInfoInit()) {
CHECK_FOR_INTERRUPTS();
++count;
sleep(5);
if (count >= 3)
PG_RETURN_TEXT_P(cstring_to_text("Exec Failed"));
}
/* verify user space in all databases */
WLMReadjustUserSpaceThroughAllDbs(username);
PG_RETURN_TEXT_P(cstring_to_text("Exec Success"));
}
/*
* @Description: readjust user total space with reset flag,
* if flag is true, means calculate used space from zero,
* if flag is false, means calculate used space one by one.
* @IN username: user name
* @Return: success or not
* @See also:
*/
Datum gs_wlm_readjust_user_space_with_reset_flag(PG_FUNCTION_ARGS)
{
#ifndef ENABLE_MULTIPLE_NODES
DISTRIBUTED_FEATURE_NOT_SUPPORTED();
#endif
char* username = PG_GETARG_CSTRING(0);
bool is_reset = PG_GETARG_BOOL(1);
int count = 0;
while (!WLMIsInfoInit()) {
CHECK_FOR_INTERRUPTS();
++count;
sleep(5);
if (count >= 3)
PG_RETURN_TEXT_P(cstring_to_text("Exec Failed"));
}
/* verify all user space */
WLMReadjustUserSpaceByNameWithResetFlag(username, is_reset);
PG_RETURN_TEXT_P(cstring_to_text("Exec Success"));
}
/*
* function name: gs_get_role_name
* description :get role name with user oid.
*/
Datum gs_get_role_name(PG_FUNCTION_ARGS)
{
Oid roleid = PG_GETARG_OID(0);
char rolname[NAMEDATALEN] = {0};
if (OidIsValid(roleid)) {
(void)GetRoleName(roleid, rolname, sizeof(rolname));
}
PG_RETURN_TEXT_P(cstring_to_text(rolname));
}
/*
* Signal to reload the database configuration
*/
Datum pg_reload_conf(PG_FUNCTION_ARGS)
{
if (!superuser()) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("must be system admin to signal the postmaster"))));
}
if (gs_signal_send(PostmasterPid, SIGHUP)) {
ereport(WARNING, (errmsg("failed to send signal to postmaster: %m")));
PG_RETURN_BOOL(false);
}
PG_RETURN_BOOL(true);
}
/*
* Rotate log file
*/
Datum pg_rotate_logfile(PG_FUNCTION_ARGS)
{
if (!superuser()) {
ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("must be system admin to rotate log files"))));
}
if (!g_instance.attr.attr_common.Logging_collector) {
ereport(WARNING, (errmsg("rotation not possible because log collection not active")));
PG_RETURN_BOOL(false);
}
SendPostmasterSignal(PMSIGNAL_ROTATE_LOGFILE);
PG_RETURN_BOOL(true);
}
/*
* Function to find out which databases make use of a tablespace
*/
typedef struct {
char* location;
DIR* dirdesc;
} ts_db_fctx;
Datum pg_tablespace_databases(PG_FUNCTION_ARGS)
{
FuncCallContext* funcctx = NULL;
struct dirent* de = NULL;
ts_db_fctx* fctx = NULL;
int location_len, ss_rc;
if (SRF_IS_FIRSTCALL()) {
MemoryContext oldcontext;
Oid table_space_oid = PG_GETARG_OID(0);
funcctx = SRF_FIRSTCALL_INIT();
oldcontext = MemoryContextSwitchTo(funcctx->multi_call_memory_ctx);
fctx = (ts_db_fctx*)palloc(sizeof(ts_db_fctx));
/*
* size = tablespace dirname length + dir sep char + oid + terminator
*/
#ifdef PGXC
/* Postgres-XC tablespaces also include node name in path */
location_len = 9 + 1 + OIDCHARS + 1 + strlen(g_instance.attr.attr_common.PGXCNodeName) + 1 +
strlen(TABLESPACE_VERSION_DIRECTORY) + 1;
fctx->location = (char*)palloc(location_len);
#else
location_len = 9 + 1 + OIDCHARS + 1 + strlen(TABLESPACE_VERSION_DIRECTORY) + 1 fctx->location =
(char*)palloc(location_len);
#endif
if (table_space_oid == GLOBALTABLESPACE_OID) {
fctx->dirdesc = NULL;
ereport(WARNING, (errmsg("global tablespace never has databases")));
} else {
if (table_space_oid == DEFAULTTABLESPACE_OID) {
ss_rc = sprintf_s(fctx->location, location_len, "base");
} else {
#ifdef PGXC
/* Postgres-XC tablespaces also include node name in path */
ss_rc = sprintf_s(fctx->location,
location_len,
"pg_tblspc/%u/%s_%s",
table_space_oid,
TABLESPACE_VERSION_DIRECTORY,
g_instance.attr.attr_common.PGXCNodeName);
#else
ss_rc = sprintf_s(
fctx->location, location_len, "pg_tblspc/%u/%s", table_space_oid, TABLESPACE_VERSION_DIRECTORY);
#endif
}
securec_check_ss(ss_rc, "\0", "\0");
fctx->dirdesc = AllocateDir(fctx->location);
if (fctx->dirdesc == NULL) {
/* the only expected error is ENOENT */
if (errno != ENOENT) {
ereport(ERROR,
(errcode_for_file_access(), errmsg("could not open directory \"%s\": %m", fctx->location)));
}
ereport(WARNING, (errmsg("%u is not a tablespace OID", table_space_oid)));
}
}
funcctx->user_fctx = fctx;
MemoryContextSwitchTo(oldcontext);
}
funcctx = SRF_PERCALL_SETUP();
fctx = (ts_db_fctx*)funcctx->user_fctx;
if (fctx->dirdesc == NULL) { /* not a tablespace */
SRF_RETURN_DONE(funcctx);
}
while ((de = ReadDir(fctx->dirdesc, fctx->location)) != NULL) {
char* subdir = NULL;
DIR* dirdesc = NULL;
Oid datOid = atooid(de->d_name);
/* this test skips . and .., but is awfully weak */
if (!datOid) {
continue;
}
/* if database subdir is empty, don't report tablespace as used */
/* size = path length + dir sep char + file name + terminator */
int sub_len = strlen(fctx->location) + 1 + strlen(de->d_name) + 1;
subdir = (char*)palloc(sub_len);
ss_rc = sprintf_s(subdir, sub_len, "%s/%s", fctx->location, de->d_name);
securec_check_ss(ss_rc, "\0", "\0");
dirdesc = AllocateDir(subdir);
while ((de = ReadDir(dirdesc, subdir)) != NULL) {
if (strcmp(de->d_name, ".") != 0 && strcmp(de->d_name, "..") != 0) {
break;
}
}
FreeDir(dirdesc);
pfree_ext(subdir);
if (de == NULL) {
continue; /* indeed, nothing in it */
}
SRF_RETURN_NEXT(funcctx, ObjectIdGetDatum(datOid));
}
FreeDir(fctx->dirdesc);
SRF_RETURN_DONE(funcctx);
}
/*
* pg_tablespace_location - get location for a tablespace
*/
Datum pg_tablespace_location(PG_FUNCTION_ARGS)
{
Oid table_space_oid = PG_GETARG_OID(0);
char source_path[MAXPGPATH];
char target_path[MAXPGPATH];
int rllen;
if (!superuser()) {
ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), (errmsg("permission denied."))));
}
/*
* It's useful to apply this function to pg_class.reltablespace, wherein
* zero means "the database's default tablespace". So, rather than
* throwing an error for zero, we choose to assume that's what is meant.
*/
table_space_oid = ConvertToRelfilenodeTblspcOid(table_space_oid);
/*
* Return empty string for the cluster's default tablespaces. If the
* currrent user is not superuser, we should not expose the absolute
* path to the client.
*/
if (table_space_oid == DEFAULTTABLESPACE_OID || table_space_oid == GLOBALTABLESPACE_OID || !superuser()) {
PG_RETURN_TEXT_P(cstring_to_text(""));
}
#if defined(HAVE_READLINK) || defined(WIN32)
/*
* Find the location of the tablespace by reading the symbolic link that
* is in pg_tblspc/<oid>.
*/
errno_t ss_rc = snprintf_s(source_path, sizeof(source_path), sizeof(source_path) - 1, "pg_tblspc/%u", table_space_oid);
securec_check_ss(ss_rc, "\0", "\0");
rllen = readlink(source_path, target_path, sizeof(target_path));
if (rllen < 0) {
ereport(
ERROR, (errcode(ERRCODE_FILE_READ_FAILED), errmsg("could not read symbolic link \"%s\": %m", source_path)));
} else if ((unsigned int)(rllen) >= sizeof(target_path)) {
ereport(ERROR, (errcode(ERRCODE_NAME_TOO_LONG), errmsg("symbolic link \"%s\" target is too long", source_path)));
}
target_path[rllen] = '\0';
/* relative location will contain t_thrd.proc_cxt.DataDir */
size_t dataDirLength = strlen(t_thrd.proc_cxt.DataDir);
if (0 == strncmp(target_path, t_thrd.proc_cxt.DataDir, dataDirLength) && rllen > dataDirLength &&
target_path[dataDirLength] == '/') {
/*
* The position is not '/' when skip t_thrd.proc_cxt.DataDir. the relative location can't start from '/'
* We only need get the relative location, so remove the common prefix
*/
int pos = (t_thrd.proc_cxt.DataDir[strlen(t_thrd.proc_cxt.DataDir)] == '/')
? strlen(t_thrd.proc_cxt.DataDir)
: strlen(t_thrd.proc_cxt.DataDir) + 1;
pos += strlen(PG_LOCATION_DIR) + 1;
errno_t rc = memmove_s(target_path, MAXPGPATH, target_path + pos, strlen(target_path) - pos);
securec_check(rc, "\0", "\0");
target_path[strlen(target_path) - pos] = '\0';
}
PG_RETURN_TEXT_P(cstring_to_text(target_path));
#else
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("tablespaces are not supported on this platform")));
PG_RETURN_NULL();
#endif
}
/*
* pg_sleep - delay for N seconds
*/
Datum pg_sleep(PG_FUNCTION_ARGS)
{
float8 secs = PG_GETARG_FLOAT8(0);
float8 endtime;
/*
* We break the requested sleep into segments of no more than 1 second, to
* put an upper bound on how long it will take us to respond to a cancel
* or die interrupt. (Note that pg_usleep is interruptible by signals on
* some platforms but not others.) Also, this method avoids exposing
* pg_usleep's upper bound on allowed delays.
*
* By computing the intended stop time initially, we avoid accumulation of
* extra delay across multiple sleeps. This also ensures we won't delay
* less than the specified time if pg_usleep is interrupted by other
* signals such as SIGHUP.
*/
#ifdef HAVE_INT64_TIMESTAMP
#define GetNowFloat() ((float8)GetCurrentTimestamp() / 1000000.0)
#else
#define GetNowFloat() GetCurrentTimestamp()
#endif
endtime = GetNowFloat() + secs;
for (;;) {
float8 delay;
CHECK_FOR_INTERRUPTS();
delay = endtime - GetNowFloat();
if (delay >= 1.0) {
pg_usleep(1000000L);
} else if (delay > 0.0) {
pg_usleep((long)ceil(delay * 1000000.0));
} else {
break;
}
}
PG_RETURN_VOID();
}
Datum pg_get_nodename(PG_FUNCTION_ARGS)
{
if (g_instance.attr.attr_common.PGXCNodeName == NULL) {
g_instance.attr.attr_common.PGXCNodeName = "Error Node";
}
PG_RETURN_TEXT_P(cstring_to_text(g_instance.attr.attr_common.PGXCNodeName));
}
/* Function to return the list of grammar keywords */
Datum pg_get_keywords(PG_FUNCTION_ARGS)
{
FuncCallContext* funcctx = NULL;
if (SRF_IS_FIRSTCALL()) {
MemoryContext oldcontext;
TupleDesc tupdesc;
funcctx = SRF_FIRSTCALL_INIT();
oldcontext = MemoryContextSwitchTo(funcctx->multi_call_memory_ctx);
tupdesc = CreateTemplateTupleDesc(3, false);
TupleDescInitEntry(tupdesc, (AttrNumber)1, "word", TEXTOID, -1, 0);
TupleDescInitEntry(tupdesc, (AttrNumber)2, "catcode", CHAROID, -1, 0);
TupleDescInitEntry(tupdesc, (AttrNumber)3, "catdesc", TEXTOID, -1, 0);
funcctx->attinmeta = TupleDescGetAttInMetadata(tupdesc);
MemoryContextSwitchTo(oldcontext);
}
funcctx = SRF_PERCALL_SETUP();
if (funcctx->call_cntr < (unsigned int)(NumScanKeywords)) {
char* values[3];
HeapTuple tuple;
/* cast-away-const is ugly but alternatives aren't much better */
values[0] = (char*)ScanKeywords[funcctx->call_cntr].name;
switch (ScanKeywords[funcctx->call_cntr].category) {
case UNRESERVED_KEYWORD:
values[1] = "U";
values[2] = _("unreserved");
break;
case COL_NAME_KEYWORD:
values[1] = "C";
values[2] = _("unreserved (cannot be function or type name)");
break;
case TYPE_FUNC_NAME_KEYWORD:
values[1] = "T";
values[2] = _("reserved (can be function or type name)");
break;
case RESERVED_KEYWORD:
values[1] = "R";
values[2] = _("reserved");
break;
default: /* shouldn't be possible */
values[1] = NULL;
values[2] = NULL;
break;
}
tuple = BuildTupleFromCStrings(funcctx->attinmeta, values);
SRF_RETURN_NEXT(funcctx, HeapTupleGetDatum(tuple));
}
SRF_RETURN_DONE(funcctx);
}
/*
* Return the type of the argument.
*/
Datum pg_typeof(PG_FUNCTION_ARGS)
{
PG_RETURN_OID(get_fn_expr_argtype(fcinfo->flinfo, 0));
}
/*
* Implementation of the COLLATE FOR expression; returns the collation
* of the argument.
*/
Datum pg_collation_for(PG_FUNCTION_ARGS)
{
Oid typeId;
Oid collid;
typeId = get_fn_expr_argtype(fcinfo->flinfo, 0);
if (!typeId) {
PG_RETURN_NULL();
}
if (!type_is_collatable(typeId) && typeId != UNKNOWNOID) {
ereport(ERROR,
(errcode(ERRCODE_DATATYPE_MISMATCH),
errmsg("collations are not supported by type %s", format_type_be(typeId))));
}
collid = PG_GET_COLLATION();
if (!collid) {
PG_RETURN_NULL();
}
PG_RETURN_TEXT_P(cstring_to_text(generate_collation_name(collid)));
}
Datum pg_test_err_contain_err(PG_FUNCTION_ARGS)
{
u_sess->utils_cxt.test_err_type = PG_GETARG_INT32(0);
switch (u_sess->utils_cxt.test_err_type) {
case 1: {
PG_TRY();
{
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERROR RETHROW")));
}
PG_CATCH();
{
PG_RE_THROW();
}
PG_END_TRY();
break;
}
case 2: {
PG_TRY();
{
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERROR")));
}
PG_CATCH();
{
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERROR CATCH")));
}
PG_END_TRY();
break;
}
case 3: {
PG_TRY();
{
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERR ERR RETHOW")));
}
PG_CATCH();
{
PG_RE_THROW();
}
PG_END_TRY();
break;
}
case 4: {
PG_TRY();
{
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERR ERR RETHOW")));
}
PG_CATCH();
{
ereport(ERROR, (errcode(ERRCODE_DIAGNOSTICS_EXCEPTION), errmsg_internal("ERR ERR CATCH")));
}
PG_END_TRY();
break;
}
default:
break;
}
PG_RETURN_VOID();
}
// Signal to cancel a backend process. This is allowed if you are superuser
// or have the same role as the process being canceled.
void cancel_backend(Oid pid)
{
int sig_return = 0;
sig_return = pg_signal_backend(pid, SIGINT);
if (sig_return == SIGNAL_BACKEND_NOPERMISSION) {
ereport(ERROR,
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
errmsg("fail to drop the user"),
errhint("fail to cancel backend process for privilege")));
}
}