3064 lines
114 KiB
C++
3064 lines
114 KiB
C++
/* -------------------------------------------------------------------------
|
|
*
|
|
* functioncmds.cpp
|
|
*
|
|
* Routines for CREATE and DROP FUNCTION commands and CREATE and DROP
|
|
* CAST commands.
|
|
*
|
|
* Portions Copyright (c) 2020 Huawei Technologies Co.,Ltd.
|
|
* Portions Copyright (c) 1996-2012, PostgreSQL Global Development Group
|
|
* Portions Copyright (c) 1994, Regents of the University of California
|
|
* Portions Copyright (c) 2021, openGauss Contributors
|
|
*
|
|
*
|
|
* IDENTIFICATION
|
|
* src/gausskernel/optimizer/commands/functioncmds.cpp
|
|
*
|
|
* DESCRIPTION
|
|
* These routines take the parse tree and pick out the
|
|
* appropriate arguments/flags, and pass the results to the
|
|
* corresponding "FooDefine" routines (in src/catalog) that do
|
|
* the actual catalog-munging. These routines also verify permission
|
|
* of the user to execute the command.
|
|
*
|
|
* NOTES
|
|
* These things must be defined and committed in the following order:
|
|
* "create function":
|
|
* input/output, recv/send procedures
|
|
* "create type":
|
|
* type
|
|
* "create operator":
|
|
* operators
|
|
*
|
|
* -------------------------------------------------------------------------
|
|
*/
|
|
#include "postgres.h"
|
|
#include "knl/knl_variable.h"
|
|
|
|
#include "access/genam.h"
|
|
#include "access/heapam.h"
|
|
#include "access/tableam.h"
|
|
#include "access/sysattr.h"
|
|
#include "catalog/dependency.h"
|
|
#include "catalog/gs_encrypted_proc.h"
|
|
#include "catalog/indexing.h"
|
|
#include "catalog/objectaccess.h"
|
|
#include "catalog/pg_aggregate.h"
|
|
#include "catalog/pg_cast.h"
|
|
#include "catalog/pg_language.h"
|
|
#include "catalog/pg_namespace.h"
|
|
#include "catalog/pg_object.h"
|
|
#include "catalog/pg_proc.h"
|
|
#include "catalog/gs_package.h"
|
|
#include "catalog/pg_proc_fn.h"
|
|
#include "catalog/pg_type.h"
|
|
#include "catalog/pg_type_fn.h"
|
|
#include "catalog/gs_db_privilege.h"
|
|
#include "catalog/namespace.h"
|
|
#include "commands/defrem.h"
|
|
#include "commands/proclang.h"
|
|
#include "commands/typecmds.h"
|
|
#include "executor/executor.h"
|
|
#include "gs_policy/gs_policy_masking.h"
|
|
#include "miscadmin.h"
|
|
#include "optimizer/var.h"
|
|
#include "optimizer/nodegroups.h"
|
|
#include "parser/parse_coerce.h"
|
|
#include "parser/parse_collate.h"
|
|
#include "parser/parse_expr.h"
|
|
#include "parser/parse_func.h"
|
|
#include "parser/parse_type.h"
|
|
#include "storage/tcap.h"
|
|
#include "utils/acl.h"
|
|
#include "utils/builtins.h"
|
|
#include "utils/fmgroids.h"
|
|
#include "utils/guc.h"
|
|
#include "utils/inval.h"
|
|
#include "utils/lsyscache.h"
|
|
#include "utils/rel.h"
|
|
#include "utils/rel_gs.h"
|
|
#include "utils/syscache.h"
|
|
#include "utils/snapmgr.h"
|
|
#include "utils/pl_package.h"
|
|
#include "catalog/pg_class.h"
|
|
#include "access/transam.h"
|
|
#include "pgxc/execRemote.h"
|
|
#include "storage/lmgr.h"
|
|
#include "tcop/utility.h"
|
|
#include "tsearch/ts_type.h"
|
|
#include "commands/comment.h"
|
|
|
|
#ifdef ENABLE_MOT
|
|
#include "storage/mot/jit_exec.h"
|
|
#endif
|
|
|
|
typedef struct PendingLibraryDelete {
|
|
char* filename; /* library file name. */
|
|
bool atCommit; /* T=delete at commit; F=delete at abort */
|
|
} PendingLibraryDelete;
|
|
|
|
static void AlterFunctionOwner_internal(Relation rel, HeapTuple tup, Oid newOwnerId);
|
|
static void checkAllowAlter(HeapTuple tup);
|
|
static int2vector* GetDefaultArgPos(List* defargpos);
|
|
|
|
static void CreateFunctionComment(Oid funcOid, List* options, bool lock = false)
|
|
{
|
|
ListCell *cell = NULL;
|
|
foreach (cell, options) {
|
|
DefElem* defElem = (DefElem*)lfirst(cell);
|
|
if (strcmp(defElem->defname, "comment") == 0) {
|
|
/* lock until transaction commit or rollback */
|
|
if (lock) {
|
|
LockDatabaseObject(funcOid, ProcedureRelationId, 0, ShareUpdateExclusiveLock);
|
|
}
|
|
CreateComments(funcOid, ProcedureRelationId, 0, defGetString(defElem));
|
|
break;
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
* Examine the RETURNS clause of the CREATE FUNCTION statement
|
|
* and return information about it as *prorettype_p and *returnsSet.
|
|
*
|
|
* This is more complex than the average typename lookup because we want to
|
|
* allow a shell type to be used, or even created if the specified return type
|
|
* doesn't exist yet. (Without this, there's no way to define the I/O procs
|
|
* for a new type.) But SQL function creation won't cope, so error out if
|
|
* the target language is SQL. (We do this here, not in the SQL-function
|
|
* validator, so as not to produce a NOTICE and then an ERROR for the same
|
|
* condition.)
|
|
*/
|
|
static void compute_return_type(
|
|
TypeName* returnType, Oid languageOid, Oid* prorettype_p, bool* returnsSet_p, bool fenced, int startLineNumber)
|
|
{
|
|
Oid rettype;
|
|
Type typtup;
|
|
AclResult aclresult;
|
|
Oid typowner = InvalidOid;
|
|
/*
|
|
* isalter is true, change the owner of the objects as the owner of the
|
|
* namespace, if the owner of the namespce has the same name as the namescpe
|
|
*/
|
|
bool isalter = false;
|
|
|
|
typtup = LookupTypeName(NULL, returnType, NULL);
|
|
|
|
/*
|
|
* If the type is relation, then we check
|
|
* whether the table is in installation group
|
|
*/
|
|
if (!in_logic_cluster() && !IsTypeTableInInstallationGroup(typtup)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("return type '%s' must be in installation group", TypeNameToString(returnType))));
|
|
}
|
|
|
|
if (typtup) {
|
|
if (!((Form_pg_type)GETSTRUCT(typtup))->typisdefined) {
|
|
if (languageOid == SQLlanguageId)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("SQL function cannot return shell type %s", TypeNameToString(returnType))));
|
|
else if (fenced)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("fencedmode function cannot accept shell type %s", TypeNameToString(returnType))));
|
|
else
|
|
ereport(NOTICE,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("return type %s is only a shell", TypeNameToString(returnType))));
|
|
}
|
|
|
|
/* if table of type, find its array type */
|
|
if (((Form_pg_type)GETSTRUCT(typtup))->typtype == TYPTYPE_TABLEOF) {
|
|
rettype = ((Form_pg_type)GETSTRUCT(typtup))->typelem;
|
|
if (!OidIsValid(rettype)) {
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT),
|
|
errmsg("table of type %s typelem does not exist", TypeNameToString(returnType))));
|
|
}
|
|
|
|
if (((Form_pg_type)GETSTRUCT(typtup))->typcategory == TYPCATEGORY_TABLEOF_VARCHAR ||
|
|
((Form_pg_type)GETSTRUCT(typtup))->typcategory == TYPCATEGORY_TABLEOF_INTEGER) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmodule(MOD_PLSQL),
|
|
errmsg("table of index type is not supported as function return type."),
|
|
errdetail("N/A"),
|
|
errcause("feature not supported"),
|
|
erraction("check define of funtion")));
|
|
}
|
|
} else {
|
|
rettype = typeTypeId(typtup);
|
|
}
|
|
|
|
ReleaseSysCache(typtup);
|
|
} else {
|
|
char* typnam = TypeNameToString(returnType);
|
|
Oid namespaceId;
|
|
char* typname = NULL;
|
|
|
|
/*
|
|
* Only C-coded functions can be I/O functions. We enforce this
|
|
* restriction here mainly to prevent littering the catalogs with
|
|
* shell types due to simple typos in user-defined function
|
|
* definitions.
|
|
* At present, we only allow auto-created shell types during initdb.
|
|
*/
|
|
if ((!IsInitdb && !u_sess->exec_cxt.extension_is_valid) ||
|
|
(languageOid != INTERNALlanguageId && languageOid != ClanguageId)) {
|
|
const char* message = "type does not exist";
|
|
InsertErrorMessage(message, startLineNumber);
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT), errmsg("type \"%s\" does not exist", typnam)));
|
|
}
|
|
|
|
/* Reject if there's typmod decoration, too */
|
|
if (returnType->typmods != NIL)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_SYNTAX_ERROR),
|
|
errmsg("type modifier cannot be specified for shell type \"%s\"", typnam)));
|
|
|
|
/* Otherwise, go ahead and make a shell type */
|
|
ereport(NOTICE,
|
|
(errcode(ERRCODE_UNDEFINED_OBJECT),
|
|
errmsg("type \"%s\" is not yet defined", typnam),
|
|
errdetail("Creating a shell type definition.")));
|
|
namespaceId = QualifiedNameGetCreationNamespace(returnType->names, &typname);
|
|
|
|
if (u_sess->attr.attr_sql.enforce_a_behavior) {
|
|
typowner = GetUserIdFromNspId(namespaceId);
|
|
|
|
if (!OidIsValid(typowner))
|
|
typowner = GetUserId();
|
|
else if (typowner != GetUserId())
|
|
isalter = true;
|
|
} else {
|
|
typowner = GetUserId();
|
|
}
|
|
aclresult = pg_namespace_aclcheck(namespaceId, GetUserId(), ACL_CREATE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_NAMESPACE, get_namespace_name(namespaceId));
|
|
if (isalter) {
|
|
aclresult = pg_namespace_aclcheck(namespaceId, typowner, ACL_CREATE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_NAMESPACE, get_namespace_name(namespaceId));
|
|
}
|
|
rettype = TypeShellMake(typname, namespaceId, typowner);
|
|
Assert(OidIsValid(rettype));
|
|
}
|
|
|
|
aclresult = pg_type_aclcheck(rettype, GetUserId(), ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error_type(aclresult, rettype);
|
|
if (isalter) {
|
|
aclresult = pg_type_aclcheck(rettype, typowner, ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error_type(aclresult, rettype);
|
|
}
|
|
|
|
*prorettype_p = rettype;
|
|
*returnsSet_p = returnType->setof;
|
|
}
|
|
|
|
/*
|
|
* Interpret the parameter list of the CREATE FUNCTION statement.
|
|
*
|
|
* Results are stored into output parameters. parameterTypes must always
|
|
* be created, but the other arrays are set to NULL if not needed.
|
|
* requiredResultType is set to InvalidOid if there are no OUT parameters,
|
|
* else it is set to the OID of the implied result type.
|
|
*/
|
|
static void examine_parameter_list(List* parameters, Oid languageOid, const char* queryString,
|
|
oidvector** parameterTypes, ArrayType** allParameterTypes, ArrayType** parameterModes, ArrayType** parameterNames,
|
|
List** parameterDefaults, Oid* requiredResultType, List** defargpos, bool fenced)
|
|
{
|
|
int parameterCount = list_length(parameters);
|
|
Oid* inTypes = NULL;
|
|
int inCount = 0;
|
|
Datum* allTypes = NULL;
|
|
Datum* paramModes = NULL;
|
|
Datum* paramNames = NULL;
|
|
int outCount = 0;
|
|
int varCount = 0;
|
|
bool have_names = false;
|
|
ListCell* x = NULL;
|
|
int i;
|
|
ParseState* pstate = NULL;
|
|
|
|
*requiredResultType = InvalidOid; /* default result */
|
|
|
|
if ((INT_MAX / sizeof(Oid) < (uint)parameterCount) || (INT_MAX / sizeof(Datum) < (uint)parameterCount)) {
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("parameterCount is invalid %d", parameterCount)));
|
|
}
|
|
|
|
/* parameterCount will be zero when someone create a function without paramters. */
|
|
if (parameterCount != 0) {
|
|
inTypes = (Oid*)palloc(parameterCount * sizeof(Oid));
|
|
allTypes = (Datum*)palloc(parameterCount * sizeof(Datum));
|
|
paramModes = (Datum*)palloc(parameterCount * sizeof(Datum));
|
|
paramNames = (Datum*)palloc0(parameterCount * sizeof(Datum));
|
|
}
|
|
|
|
*parameterDefaults = NIL;
|
|
|
|
/* may need a pstate for parse analysis of default exprs */
|
|
pstate = make_parsestate(NULL);
|
|
pstate->p_sourcetext = queryString;
|
|
|
|
/* Scan the list and extract data into work arrays */
|
|
i = 0;
|
|
foreach (x, parameters) {
|
|
FunctionParameter* fp = (FunctionParameter*)lfirst(x);
|
|
TypeName* t = fp->argType;
|
|
bool isinput = false;
|
|
Oid toid = InvalidOid;
|
|
Type typtup;
|
|
AclResult aclresult;
|
|
char* objname = NULL;
|
|
objname = strVal(linitial(t->names));
|
|
typtup = LookupTypeName(NULL, t, NULL);
|
|
if (!HeapTupleIsValid(typtup)) {
|
|
toid = findPackageParameter(objname);
|
|
}
|
|
/*
|
|
* If the type is relation, then we check
|
|
* whether the table is in installation group
|
|
*/
|
|
if (!in_logic_cluster() && !IsTypeTableInInstallationGroup(typtup)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("argument type '%s' must be in installation group", TypeNameToString(t))));
|
|
}
|
|
|
|
if (typtup) {
|
|
if (!((Form_pg_type)GETSTRUCT(typtup))->typisdefined) {
|
|
/* As above, hard error if language is SQL */
|
|
if (languageOid == SQLlanguageId)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("SQL function cannot accept shell type %s", TypeNameToString(t))));
|
|
else if (fenced)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("fencedmode function cannot accept shell type %s", TypeNameToString(t))));
|
|
else
|
|
ereport(NOTICE,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("argument type %s is only a shell", TypeNameToString(t))));
|
|
}
|
|
|
|
toid = typeTypeId(typtup);
|
|
ReleaseSysCache(typtup);
|
|
} else if (!OidIsValid(toid)) {
|
|
int rc = 0;
|
|
rc = CompileWhich();
|
|
if (rc == PLPGSQL_COMPILE_PACKAGE ||
|
|
rc == PLPGSQL_COMPILE_PACKAGE_PROC) {
|
|
Oid packageOid = u_sess->plsql_cxt.curr_compile_context->plpgsql_curr_compile_package->pkg_oid;
|
|
char message[MAXSTRLEN];
|
|
errno_t rc = 0;
|
|
rc = sprintf_s(message, MAXSTRLEN, "type %s does not exist.", TypeNameToString(t));
|
|
securec_check_ss_c(rc, "", "");
|
|
InsertErrorMessage(message, 0, true);
|
|
InsertError(packageOid);
|
|
}
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT), errmsg("type %s does not exist", TypeNameToString(t))));
|
|
toid = InvalidOid; /* keep compiler quiet */
|
|
}
|
|
|
|
aclresult = pg_type_aclcheck(toid, GetUserId(), ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error_type(aclresult, toid);
|
|
|
|
if (t->setof)
|
|
ereport(
|
|
ERROR, (errcode(ERRCODE_INVALID_FUNCTION_DEFINITION), errmsg("functions cannot accept set arguments")));
|
|
|
|
/* handle input parameters */
|
|
if (fp->mode != FUNC_PARAM_OUT && fp->mode != FUNC_PARAM_TABLE) {
|
|
/* other input parameters can't follow a VARIADIC parameter */
|
|
if (varCount > 0)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("VARIADIC parameter must be the last input parameter")));
|
|
inTypes[inCount++] = toid;
|
|
isinput = true;
|
|
}
|
|
|
|
/* handle output parameters */
|
|
if (fp->mode != FUNC_PARAM_IN && fp->mode != FUNC_PARAM_VARIADIC) {
|
|
if (outCount == 0) /* save first output param's type */
|
|
*requiredResultType = toid;
|
|
outCount++;
|
|
}
|
|
|
|
if (fp->mode == FUNC_PARAM_VARIADIC) {
|
|
varCount++;
|
|
/* validate variadic parameter type */
|
|
switch (toid) {
|
|
case ANYARRAYOID:
|
|
case ANYOID:
|
|
/* okay */
|
|
break;
|
|
default:
|
|
if (!OidIsValid(get_element_type(toid)))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("VARIADIC parameter must be an array")));
|
|
break;
|
|
}
|
|
}
|
|
|
|
allTypes[i] = ObjectIdGetDatum(toid);
|
|
|
|
paramModes[i] = CharGetDatum(fp->mode);
|
|
|
|
if (fp->name && fp->name[0]) {
|
|
ListCell* px = NULL;
|
|
|
|
/*
|
|
* As of Postgres 9.0 we disallow using the same name for two
|
|
* input or two output function parameters. Depending on the
|
|
* function's language, conflicting input and output names might
|
|
* be bad too, but we leave it to the PL to complain if so.
|
|
*/
|
|
foreach (px, parameters) {
|
|
FunctionParameter* prevfp = (FunctionParameter*)lfirst(px);
|
|
|
|
if (prevfp == fp)
|
|
break;
|
|
/* pure in doesn't conflict with pure out */
|
|
if ((fp->mode == FUNC_PARAM_IN || fp->mode == FUNC_PARAM_VARIADIC) &&
|
|
(prevfp->mode == FUNC_PARAM_OUT || prevfp->mode == FUNC_PARAM_TABLE))
|
|
continue;
|
|
if ((prevfp->mode == FUNC_PARAM_IN || prevfp->mode == FUNC_PARAM_VARIADIC) &&
|
|
(fp->mode == FUNC_PARAM_OUT || fp->mode == FUNC_PARAM_TABLE))
|
|
continue;
|
|
if (prevfp->name && prevfp->name[0] && strcmp(prevfp->name, fp->name) == 0)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("parameter name \"%s\" used more than once", fp->name)));
|
|
}
|
|
|
|
paramNames[i] = CStringGetTextDatum(fp->name);
|
|
have_names = true;
|
|
}
|
|
|
|
if (fp->defexpr) {
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
if (u_sess->attr.attr_sql.sql_compatibility == A_FORMAT
|
|
&& fp->mode == FUNC_PARAM_OUT && enable_out_param_override()) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("The out/inout Parameter can't have default value.")));
|
|
}
|
|
#endif
|
|
Node* def = NULL;
|
|
|
|
if (!isinput)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("only input parameters can have default values")));
|
|
|
|
def = transformExpr(pstate, fp->defexpr);
|
|
def = coerce_to_specific_type(pstate, def, toid, "DEFAULT");
|
|
assign_expr_collations(pstate, def);
|
|
|
|
/*
|
|
* Make sure no variables are referred to.
|
|
*/
|
|
if (list_length(pstate->p_rtable) != 0 || contain_var_clause(def))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_COLUMN_REFERENCE),
|
|
errmsg("cannot use table references in parameter default value")));
|
|
|
|
/*
|
|
* It can't return a set either --- but coerce_to_specific_type
|
|
* already checked that for us.
|
|
*
|
|
* No subplans or aggregates, either...
|
|
*
|
|
* Note: the point of these restrictions is to ensure that an
|
|
* expression that, on its face, hasn't got subplans, aggregates,
|
|
* etc cannot suddenly have them after function default arguments
|
|
* are inserted.
|
|
*/
|
|
if (pstate->p_hasSubLinks)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("cannot use subquery in parameter default value")));
|
|
if (pstate->p_hasAggs)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_GROUPING_ERROR),
|
|
errmsg("cannot use aggregate function in parameter default value")));
|
|
if (pstate->p_hasWindowFuncs)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WINDOWING_ERROR),
|
|
errmsg("cannot use window function in parameter default value")));
|
|
|
|
*parameterDefaults = lappend(*parameterDefaults, def);
|
|
|
|
/*
|
|
* record the position of the argument with default value.
|
|
*/
|
|
if (defargpos != NULL)
|
|
*defargpos = lappend_int(*defargpos, i);
|
|
}
|
|
|
|
i++;
|
|
}
|
|
|
|
free_parsestate(pstate);
|
|
|
|
/* Now construct the proper outputs as needed */
|
|
|
|
/* if there are no paramters (parameterCount is 0), we make a InvalidOidVector */
|
|
*parameterTypes = buildoidvector(inTypes, inCount);
|
|
|
|
if (outCount > 0 || varCount > 0) {
|
|
*allParameterTypes = construct_array(allTypes, parameterCount, OIDOID, sizeof(Oid), true, 'i');
|
|
*parameterModes = construct_array(paramModes, parameterCount, CHAROID, 1, true, 'c');
|
|
if (outCount > 1)
|
|
*requiredResultType = RECORDOID;
|
|
/* otherwise we set requiredResultType correctly above */
|
|
} else {
|
|
*allParameterTypes = NULL;
|
|
*parameterModes = NULL;
|
|
}
|
|
|
|
if (have_names) {
|
|
for (i = 0; i < parameterCount; i++) {
|
|
if (paramNames[i] == PointerGetDatum(NULL))
|
|
paramNames[i] = CStringGetTextDatum("");
|
|
}
|
|
*parameterNames = construct_array(paramNames, parameterCount, TEXTOID, -1, false, 'i');
|
|
} else {
|
|
*parameterNames = NULL;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Recognize one of the options that can be passed to both CREATE
|
|
* FUNCTION and ALTER FUNCTION and return it via one of the out
|
|
* parameters. Returns true if the passed option was recognized. If
|
|
* the out parameter we were going to assign to points to non-NULL,
|
|
* raise a duplicate-clause error. (We don't try to detect duplicate
|
|
* SET parameters though --- if you're redundant, the last one wins.)
|
|
*/
|
|
static bool compute_common_attribute(DefElem* defel, DefElem** volatility_item, DefElem** strict_item,
|
|
DefElem** security_item, DefElem** leakproof_item, List** set_items, DefElem** cost_item, DefElem** rows_item,
|
|
DefElem** fencedItem, DefElem** shippable_item, DefElem** package_item)
|
|
{
|
|
if (strcmp(defel->defname, "volatility") == 0) {
|
|
if (*volatility_item)
|
|
goto duplicate_error;
|
|
|
|
*volatility_item = defel;
|
|
} else if (strcmp(defel->defname, "strict") == 0) {
|
|
if (*strict_item)
|
|
goto duplicate_error;
|
|
|
|
*strict_item = defel;
|
|
} else if (strcmp(defel->defname, "security") == 0) {
|
|
if (*security_item)
|
|
goto duplicate_error;
|
|
|
|
*security_item = defel;
|
|
} else if (strcmp(defel->defname, "leakproof") == 0) {
|
|
if (*leakproof_item)
|
|
goto duplicate_error;
|
|
|
|
*leakproof_item = defel;
|
|
} else if (strcmp(defel->defname, "set") == 0) {
|
|
*set_items = lappend(*set_items, defel->arg);
|
|
} else if (strcmp(defel->defname, "cost") == 0) {
|
|
if (*cost_item)
|
|
goto duplicate_error;
|
|
|
|
*cost_item = defel;
|
|
} else if (strcmp(defel->defname, "rows") == 0) {
|
|
if (*rows_item)
|
|
goto duplicate_error;
|
|
|
|
*rows_item = defel;
|
|
} else if (strcmp(defel->defname, "fenced") == 0) {
|
|
if (*fencedItem)
|
|
goto duplicate_error;
|
|
|
|
*fencedItem = defel;
|
|
} else if (strcmp(defel->defname, "shippable") == 0) {
|
|
if (*shippable_item)
|
|
goto duplicate_error;
|
|
|
|
*shippable_item = defel;
|
|
} else if (strcmp(defel->defname, "package") == 0) {
|
|
if (*package_item)
|
|
goto duplicate_error;
|
|
|
|
*package_item = defel;
|
|
} else
|
|
return false;
|
|
|
|
/* Recognized an option */
|
|
return true;
|
|
|
|
duplicate_error:
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("conflicting or redundant options")));
|
|
return false; /* keep compiler quiet */
|
|
}
|
|
|
|
static char interpret_func_volatility(DefElem* defel)
|
|
{
|
|
char* str = strVal(defel->arg);
|
|
|
|
if (strcmp(str, "immutable") == 0)
|
|
return PROVOLATILE_IMMUTABLE;
|
|
else if (strcmp(str, "stable") == 0)
|
|
return PROVOLATILE_STABLE;
|
|
else if (strcmp(str, "volatile") == 0)
|
|
return PROVOLATILE_VOLATILE;
|
|
else {
|
|
ereport(ERROR, (errcode(ERRCODE_WITH_CHECK_OPTION_VIOLATION), errmsg("invalid volatility \"%s\"", str)));
|
|
return 0; /* keep compiler quiet */
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Update a proconfig value according to a list of VariableSetStmt items.
|
|
*
|
|
* The input and result may be NULL to signify a null entry.
|
|
*/
|
|
static ArrayType* update_proconfig_value(ArrayType* a, const List* set_items)
|
|
{
|
|
ListCell* l = NULL;
|
|
|
|
foreach (l, set_items) {
|
|
VariableSetStmt* sstmt = (VariableSetStmt*)lfirst(l);
|
|
|
|
Assert(IsA(sstmt, VariableSetStmt));
|
|
if (sstmt->kind == VAR_RESET_ALL)
|
|
a = NULL;
|
|
else {
|
|
char* valuestr = ExtractSetVariableArgs(sstmt);
|
|
|
|
if (valuestr != NULL)
|
|
a = GUCArrayAdd(a, sstmt->name, valuestr);
|
|
else /* RESET */
|
|
a = GUCArrayDelete(a, sstmt->name);
|
|
}
|
|
}
|
|
|
|
return a;
|
|
}
|
|
|
|
static bool compute_b_attribute(DefElem* defel)
|
|
{
|
|
if (strcmp(defel->defname, "comment") == 0) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* Dissect the list of options assembled in gram.y into function
|
|
* attributes.
|
|
*/
|
|
static List* compute_attributes_sql_style(const List* options, List** as, char** language, bool* windowfunc_p,
|
|
char* volatility_p, bool* strict_p, bool* security_definer, bool* leakproof_p, ArrayType** proconfig,
|
|
float4* procost, float4* prorows, bool* fenced, bool* shippable, bool* package)
|
|
{
|
|
ListCell* option = NULL;
|
|
DefElem* as_item = NULL;
|
|
DefElem* language_item = NULL;
|
|
DefElem* windowfunc_item = NULL;
|
|
DefElem* volatility_item = NULL;
|
|
DefElem* strict_item = NULL;
|
|
DefElem* security_item = NULL;
|
|
DefElem* leakproof_item = NULL;
|
|
List* set_items = NIL;
|
|
DefElem* cost_item = NULL;
|
|
DefElem* rows_item = NULL;
|
|
DefElem* fencedItem = NULL;
|
|
DefElem* shippable_item = NULL;
|
|
DefElem* package_item = NULL;
|
|
List* bCompatibilities = NIL;
|
|
foreach (option, options) {
|
|
DefElem* defel = (DefElem*)lfirst(option);
|
|
|
|
if (strcmp(defel->defname, "as") == 0) {
|
|
if (as_item != NULL)
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("conflicting or redundant options")));
|
|
as_item = defel;
|
|
} else if (strcmp(defel->defname, "language") == 0) {
|
|
if (language_item != NULL)
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("conflicting or redundant options")));
|
|
language_item = defel;
|
|
} else if (strcmp(defel->defname, "window") == 0) {
|
|
if (windowfunc_item != NULL)
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("conflicting or redundant options")));
|
|
windowfunc_item = defel;
|
|
} else if (compute_common_attribute(defel,
|
|
&volatility_item,
|
|
&strict_item,
|
|
&security_item,
|
|
&leakproof_item,
|
|
&set_items,
|
|
&cost_item,
|
|
&rows_item,
|
|
&fencedItem,
|
|
&shippable_item,
|
|
&package_item)) {
|
|
/* recognized common option */
|
|
continue;
|
|
} else if (compute_b_attribute(defel)) {
|
|
/* recognized b compatibility options */
|
|
bCompatibilities = lcons(defel, bCompatibilities);
|
|
} else
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WITH_CHECK_OPTION_VIOLATION), errmsg("option \"%s\" not recognized", defel->defname)));
|
|
}
|
|
|
|
/* process required items */
|
|
if (as_item != NULL)
|
|
*as = (List*)as_item->arg;
|
|
else {
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_FUNCTION_DEFINITION), errmsg("no function body specified")));
|
|
*as = NIL; /* keep compiler quiet */
|
|
}
|
|
|
|
if (language_item != NULL)
|
|
*language = strVal(language_item->arg);
|
|
else {
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_FUNCTION_DEFINITION), errmsg("no language specified")));
|
|
*language = NULL; /* keep compiler quiet */
|
|
}
|
|
|
|
/* process optional items */
|
|
if (windowfunc_item != NULL)
|
|
*windowfunc_p = intVal(windowfunc_item->arg);
|
|
if (volatility_item != NULL)
|
|
*volatility_p = interpret_func_volatility(volatility_item);
|
|
if (strict_item != NULL)
|
|
*strict_p = intVal(strict_item->arg);
|
|
if (security_item != NULL)
|
|
*security_definer = intVal(security_item->arg);
|
|
if (leakproof_item != NULL)
|
|
*leakproof_p = intVal(leakproof_item->arg);
|
|
if (set_items != NULL)
|
|
*proconfig = update_proconfig_value(NULL, (const List*)set_items);
|
|
if (cost_item != NULL) {
|
|
*procost = defGetNumeric(cost_item);
|
|
if (*procost <= 0)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("COST must be positive")));
|
|
}
|
|
if (rows_item != NULL) {
|
|
*prorows = defGetNumeric(rows_item);
|
|
if (*prorows <= 0)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("ROWS must be positive")));
|
|
}
|
|
|
|
if (strcmp(*language, "c") != 0 && strcmp(*language, "java") != 0 &&
|
|
strncmp(*language, "plpython", strlen("plpython")) != 0) {
|
|
if (fencedItem == NULL) {
|
|
*fenced = false;
|
|
} else if (intVal(fencedItem->arg) == 1) {
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("fencedmode could not be fenced")));
|
|
}
|
|
}
|
|
if (fencedItem != NULL) {
|
|
*fenced = intVal(fencedItem->arg);
|
|
}
|
|
if (shippable_item != NULL) {
|
|
*shippable = intVal(shippable_item->arg);
|
|
if (!*shippable && *volatility_p == PROVOLATILE_IMMUTABLE) {
|
|
elog(NOTICE, "Immutable function will be shippable anyway.");
|
|
}
|
|
}
|
|
|
|
if (package_item != NULL) {
|
|
*package = intVal(package_item->arg);
|
|
}
|
|
list_free(set_items);
|
|
return bCompatibilities;
|
|
}
|
|
|
|
/* -------------
|
|
* Interpret the parameters *parameters and return their contents via
|
|
* *isStrict_p and *volatility_p.
|
|
*
|
|
* These parameters supply optional information about a function.
|
|
* All have defaults if not specified. Parameters:
|
|
*
|
|
* * isStrict means the function should not be called when any NULL
|
|
* inputs are present; instead a NULL result value should be assumed.
|
|
*
|
|
* * volatility tells the optimizer whether the function's result can
|
|
* be assumed to be repeatable over multiple evaluations.
|
|
* ------------
|
|
*/
|
|
static void compute_attributes_with_style(const List* parameters, bool* isStrict_p, char* volatility_p)
|
|
{
|
|
ListCell* pl = NULL;
|
|
|
|
foreach (pl, parameters) {
|
|
DefElem* param = (DefElem*)lfirst(pl);
|
|
|
|
if (pg_strcasecmp(param->defname, "isstrict") == 0)
|
|
*isStrict_p = defGetBoolean(param);
|
|
else if (pg_strcasecmp(param->defname, "iscachable") == 0) {
|
|
/* obsolete spelling of isImmutable */
|
|
if (defGetBoolean(param))
|
|
*volatility_p = PROVOLATILE_IMMUTABLE;
|
|
} else
|
|
ereport(WARNING,
|
|
(errcode(ERRCODE_SYNTAX_ERROR),
|
|
errmsg("unrecognized function attribute \"%s\" ignored", param->defname)));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* For a dynamically linked C language object, the form of the clause is
|
|
*
|
|
* AS <object file name> [, <link symbol name> ]
|
|
*
|
|
* In all other cases
|
|
*
|
|
* AS <object reference, or sql code>
|
|
*/
|
|
static void interpret_AS_clause(
|
|
Oid languageOid, const char* languageName, char* funcname, List* as, char** prosrc_str_p, char** probin_str_p)
|
|
{
|
|
Assert(as != NIL);
|
|
|
|
if (languageOid == ClanguageId) {
|
|
/*
|
|
* For "C" language, store the file name in probin and, when given,
|
|
* the link symbol name in prosrc. If link symbol is omitted,
|
|
* substitute procedure name. We also allow link symbol to be
|
|
* specified as "-", since that was the habit in PG versions before
|
|
* 8.4, and there might be dump files out there that don't translate
|
|
* that back to "omitted".
|
|
*/
|
|
*probin_str_p = strVal(linitial(as));
|
|
if (list_length(as) == 1)
|
|
*prosrc_str_p = funcname;
|
|
else {
|
|
*prosrc_str_p = strVal(lsecond(as));
|
|
if (strcmp(*prosrc_str_p, "-") == 0)
|
|
*prosrc_str_p = funcname;
|
|
}
|
|
} else {
|
|
/* Everything else wants the given string in prosrc. */
|
|
*prosrc_str_p = strVal(linitial(as));
|
|
*probin_str_p = NULL;
|
|
|
|
if (list_length(as) != 1)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("only one AS item needed for language \"%s\"", languageName)));
|
|
|
|
if (languageOid == INTERNALlanguageId) {
|
|
/*
|
|
* In PostgreSQL versions before 6.5, the SQL name of the created
|
|
* function could not be different from the internal name, and
|
|
* "prosrc" wasn't used. So there is code out there that does
|
|
* CREATE FUNCTION xyz AS '' LANGUAGE internal. To preserve some
|
|
* modicum of backwards compatibility, accept an empty "prosrc"
|
|
* value as meaning the supplied SQL function name.
|
|
*/
|
|
if (strlen(*prosrc_str_p) == 0)
|
|
*prosrc_str_p = funcname;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* @Description: check user define window function is valid
|
|
* @oid languageOid - language oid
|
|
* @char* prosrc_str - function body with internal language
|
|
* @return -void
|
|
*/
|
|
static void CheckWindowFuncValid(Oid languageOid, const char* prosrc_str)
|
|
{
|
|
if (languageOid != INTERNALlanguageId) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("User defined window function only support INTERNAL language.")));
|
|
} else {
|
|
Oid funcoid = InvalidOid;
|
|
bool is_window = false;
|
|
if (prosrc_str != NULL)
|
|
funcoid = fmgr_internal_function(prosrc_str);
|
|
|
|
if (OidIsValid(funcoid)) {
|
|
is_window = get_func_iswindow(funcoid);
|
|
} else {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_UNDEFINED_FUNCTION),
|
|
errmsg("there is no built-in function named \"%s\"", prosrc_str)));
|
|
}
|
|
|
|
if (is_window == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("User defined window function only support INTERNAL window function")));
|
|
}
|
|
}
|
|
}
|
|
|
|
static bool isForbiddenSchema (Oid namespaceId)
|
|
{
|
|
return IsPackageSchemaOid(namespaceId) || namespaceId == PG_DB4AI_NAMESPACE;
|
|
}
|
|
|
|
void CheckCreateFunctionPrivilege(Oid namespaceId, const char* funcname)
|
|
{
|
|
if (!IsInitdb && !u_sess->attr.attr_common.IsInplaceUpgrade && isForbiddenSchema(namespaceId)) {
|
|
ereport(ERROR,
|
|
(errmodule(MOD_PLSQL), errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("Permission denied to create function \"%s\"", funcname),
|
|
errdetail("Object creation is not supported for %s schema.", get_namespace_name(namespaceId)),
|
|
errcause("The schema in the package does not support object creation.."),
|
|
erraction("Please create an object in another schema.")));
|
|
}
|
|
|
|
if (!isRelSuperuser() &&
|
|
(namespaceId == PG_CATALOG_NAMESPACE ||
|
|
namespaceId == PG_PUBLIC_NAMESPACE ||
|
|
namespaceId == PG_DB4AI_NAMESPACE)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("permission denied to create function \"%s\"", funcname),
|
|
errhint("must be %s to create a function in %s schema.",
|
|
g_instance.attr.attr_security.enablePrivilegesSeparate ? "initial user" : "sysadmin",
|
|
get_namespace_name(namespaceId))));
|
|
}
|
|
|
|
if (!IsInitdb && !u_sess->attr.attr_common.IsInplaceUpgrade &&
|
|
!g_instance.attr.attr_common.allow_create_sysobject &&
|
|
IsSysSchema(namespaceId)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("permission denied to create function \"%s\"", funcname),
|
|
errhint("not allowd to create a function in %s schema when allow_create_sysobject is off.",
|
|
get_namespace_name(namespaceId))));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* CreateFunction
|
|
* Execute a CREATE FUNCTION utility statement.
|
|
*/
|
|
void CreateFunction(CreateFunctionStmt* stmt, const char* queryString, Oid pkg_oid)
|
|
{
|
|
char* probin_str = NULL;
|
|
char* prosrc_str = NULL;
|
|
Oid prorettype;
|
|
bool returnsSet = false;
|
|
char* language = NULL;
|
|
Oid languageOid;
|
|
Oid languageValidator;
|
|
char* funcname = NULL;
|
|
Oid namespaceId = InvalidOid;
|
|
AclResult aclresult;
|
|
oidvector* parameterTypes = NULL;
|
|
ArrayType* allParameterTypes = NULL;
|
|
ArrayType* parameterModes = NULL;
|
|
ArrayType* parameterNames = NULL;
|
|
List* parameterDefaults = NIL;
|
|
Oid requiredResultType;
|
|
bool isWindowFunc = false;
|
|
bool isStrict = false;
|
|
bool security = false;
|
|
bool isLeakProof = false;
|
|
char volatility;
|
|
ArrayType* proconfig = NULL;
|
|
float4 procost;
|
|
float4 prorows;
|
|
HeapTuple languageTuple;
|
|
Form_pg_language languageStruct;
|
|
List* as_clause = NIL;
|
|
List* defargpos = NIL;
|
|
int2vector* prodefaultargpos = NULL;
|
|
Oid proowner = InvalidOid;
|
|
bool fenced = IS_SINGLE_NODE ? false : true;
|
|
bool shippable = false;
|
|
bool package = false;
|
|
bool proIsProcedure = stmt->isProcedure;
|
|
if (!OidIsValid(pkg_oid)) {
|
|
u_sess->plsql_cxt.debug_query_string = pstrdup(queryString);
|
|
}
|
|
if (PLSQL_SECURITY_DEFINER && u_sess->attr.attr_common.upgrade_mode == 0 && OidIsValid(pkg_oid)) {
|
|
bool isnull = false;
|
|
HeapTuple pkgTuple = SearchSysCache1(PACKAGEOID, ObjectIdGetDatum(pkg_oid));
|
|
Datum pkgSecDefDatum = SysCacheGetAttr(PACKAGEOID, pkgTuple, Anum_gs_package_pkgsecdef, &isnull);
|
|
if (isnull) {
|
|
security = false;
|
|
} else {
|
|
bool pkgSecDef = DatumGetBool(pkgSecDefDatum);
|
|
if (!pkgSecDef) {
|
|
security = false;
|
|
} else {
|
|
security = true;
|
|
}
|
|
}
|
|
ReleaseSysCache(pkgTuple);
|
|
} else if (PLSQL_SECURITY_DEFINER && u_sess->attr.attr_common.upgrade_mode == 0) {
|
|
security = true;
|
|
}
|
|
probin_str = NULL;
|
|
prosrc_str = NULL;
|
|
int rc = 0;
|
|
rc = CompileWhich();
|
|
if (rc == PLPGSQL_COMPILE_PACKAGE) {
|
|
u_sess->plsql_cxt.procedure_start_line = stmt->startLineNumber;
|
|
u_sess->plsql_cxt.procedure_first_line = stmt->firstLineNumber;
|
|
}
|
|
u_sess->plsql_cxt.isCreateFunction = true;
|
|
/*
|
|
* isalter is true, change the owner of the objects as the owner of the
|
|
* namespace, if the owner of the namespce has the same name as the namescpe
|
|
*/
|
|
bool isalter = false;
|
|
/* Convert list of names to a name and namespace */
|
|
if (!OidIsValid(pkg_oid)) {
|
|
namespaceId = QualifiedNameGetCreationNamespace(stmt->funcname, &funcname);
|
|
} else {
|
|
char *schemaname = NULL;
|
|
DeconstructQualifiedName(stmt->funcname, &schemaname, &funcname);
|
|
HeapTuple tuple = SearchSysCache1(PACKAGEOID, ObjectIdGetDatum(pkg_oid));
|
|
if (HeapTupleIsValid(tuple)) {
|
|
Form_gs_package pkgform = (Form_gs_package)GETSTRUCT(tuple);
|
|
namespaceId = pkgform->pkgnamespace;
|
|
} else {
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_PACKAGE), errmsg("package not found")));
|
|
}
|
|
ReleaseSysCache(tuple);
|
|
}
|
|
|
|
CheckCreateFunctionPrivilege(namespaceId, funcname);
|
|
bool anyResult = CheckCreatePrivilegeInNamespace(namespaceId, GetUserId(), CREATE_ANY_FUNCTION);
|
|
|
|
//@Temp Table. Lock Cluster after determine whether is a temp object,
|
|
// so we can decide if locking other coordinator
|
|
pgxc_lock_for_utility_stmt((Node*)stmt, namespaceId == u_sess->catalog_cxt.myTempNamespace);
|
|
|
|
if (u_sess->attr.attr_sql.enforce_a_behavior) {
|
|
proowner = GetUserIdFromNspId(namespaceId, false, anyResult);
|
|
|
|
if (!OidIsValid(proowner))
|
|
proowner = GetUserId();
|
|
else if (proowner != GetUserId())
|
|
isalter = true;
|
|
|
|
if (isalter) {
|
|
(void)CheckCreatePrivilegeInNamespace(namespaceId, proowner, CREATE_ANY_FUNCTION);
|
|
}
|
|
} else {
|
|
proowner = GetUserId();
|
|
}
|
|
|
|
if (u_sess->attr.attr_sql.sql_compatibility == B_FORMAT) {
|
|
if (stmt->definer) {
|
|
HeapTuple roletuple = SearchSysCache1(AUTHNAME, PointerGetDatum(stmt->definer));
|
|
|
|
if (!HeapTupleIsValid(roletuple))
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT), errmsg("role \"%s\" does not exist", stmt->definer)));
|
|
|
|
proowner = HeapTupleGetOid(roletuple);
|
|
ReleaseSysCache(roletuple);
|
|
}
|
|
else {
|
|
proowner = GetUserId();
|
|
}
|
|
}
|
|
/* default attributes */
|
|
volatility = PROVOLATILE_VOLATILE;
|
|
procost = -1; /* indicates not set */
|
|
prorows = -1; /* indicates not set */
|
|
shippable = false;
|
|
|
|
/* override attributes from explicit list */
|
|
List *functionOptions = compute_attributes_sql_style((const List *)stmt->options, &as_clause, &language,
|
|
&isWindowFunc, &volatility, &isStrict, &security, &isLeakProof,
|
|
&proconfig, &procost, &prorows, &fenced, &shippable, &package);
|
|
|
|
/* Look up the language and validate permissions */
|
|
languageTuple = SearchSysCache1(LANGNAME, PointerGetDatum(language));
|
|
if (!HeapTupleIsValid(languageTuple))
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT), errmsg("language \"%s\" does not exist", language),
|
|
(PLTemplateExists(language) ? errhint("Use CREATE LANGUAGE to load the language into the database.")
|
|
: 0)));
|
|
|
|
languageOid = HeapTupleGetOid(languageTuple);
|
|
if (strcasecmp(get_language_name(languageOid), "plpgsql") != 0) {
|
|
u_sess->plsql_cxt.isCreateFunction = false;
|
|
}
|
|
|
|
if (languageOid == JavalanguageId) {
|
|
#ifdef ENABLE_MULTIPLE_NODES
|
|
/*
|
|
* single node dose not support Java UDF or other fenced functions.
|
|
* check it here because users may not know the Java UDF is fenced by default,
|
|
* so it's better to report detailed error messages for different senarios.
|
|
*/
|
|
if (IS_SINGLE_NODE) {
|
|
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("JAVA UDF is not yet supported in current version.")));
|
|
}
|
|
|
|
/* only support fenced mode Java UDF */
|
|
if (!fenced) {
|
|
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("Java UDF dose not support NOT FENCED functions.")));
|
|
}
|
|
#else
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("JAVA UDF is not yet supported in current version.")));
|
|
#endif
|
|
}
|
|
|
|
languageStruct = (Form_pg_language)GETSTRUCT(languageTuple);
|
|
|
|
/* Check user's privilege regardless of whether langugae is a trust type */
|
|
aclresult = pg_language_aclcheck(languageOid, GetUserId(), ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_LANGUAGE, NameStr(languageStruct->lanname));
|
|
/*
|
|
* Actually we should do the following owner privilege check to both trust and untrust language,
|
|
* but consider compatibility with older versions, we can't check for untrust language like c
|
|
* and java here, it is ugly but with no solution.
|
|
*/
|
|
if (languageStruct->lanpltrusted && isalter) {
|
|
aclresult = pg_language_aclcheck(languageOid, proowner, ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_LANGUAGE, NameStr(languageStruct->lanname));
|
|
}
|
|
|
|
languageValidator = languageStruct->lanvalidator;
|
|
|
|
ReleaseSysCache(languageTuple);
|
|
|
|
/*
|
|
* Only superuser is allowed to create leakproof functions because it
|
|
* possibly allows unprivileged users to reference invisible tuples to be
|
|
* filtered out using views for row-level security.
|
|
*/
|
|
if (isLeakProof && !superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), errmsg("only system admin can define a leakproof function")));
|
|
|
|
/*
|
|
* Convert remaining parameters of CREATE to form wanted by
|
|
* ProcedureCreate.
|
|
*/
|
|
examine_parameter_list(stmt->parameters, languageOid, queryString, ¶meterTypes, &allParameterTypes,
|
|
¶meterModes, ¶meterNames, ¶meterDefaults, &requiredResultType, &defargpos, fenced);
|
|
|
|
prodefaultargpos = GetDefaultArgPos(defargpos);
|
|
|
|
if (stmt->returnType) {
|
|
/* explicit RETURNS clause */
|
|
compute_return_type(stmt->returnType, languageOid, &prorettype, &returnsSet, fenced, stmt->startLineNumber);
|
|
} else if (OidIsValid(requiredResultType)) {
|
|
/* default RETURNS clause from OUT parameters */
|
|
prorettype = requiredResultType;
|
|
returnsSet = false;
|
|
} else {
|
|
ereport(
|
|
ERROR, (errcode(ERRCODE_INVALID_FUNCTION_DEFINITION), errmsg("function result type must be specified")));
|
|
/* Alternative possibility: default to RETURNS VOID */
|
|
prorettype = VOIDOID;
|
|
returnsSet = false;
|
|
}
|
|
|
|
if (returnsSet) {
|
|
Oid typerelid = typeidTypeRelid(prorettype);
|
|
|
|
if (typerelid > FirstNormalObjectId) {
|
|
HeapTuple tp = SearchSysCache1(RELOID, ObjectIdGetDatum(typerelid));
|
|
|
|
if (HeapTupleIsValid(tp)) {
|
|
Form_pg_class reltup = (Form_pg_class)GETSTRUCT(tp);
|
|
if (reltup->relkind == RELKIND_VIEW || reltup->relkind == RELKIND_CONTQUERY) {
|
|
ReleaseSysCache(tp);
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("function result type cannot be a view.")));
|
|
}
|
|
ReleaseSysCache(tp);
|
|
}
|
|
}
|
|
}
|
|
compute_attributes_with_style((const List*)stmt->withClause, &isStrict, &volatility);
|
|
interpret_AS_clause(languageOid, language, funcname, as_clause, &prosrc_str, &probin_str);
|
|
|
|
/*
|
|
* Set default values for COST and ROWS depending on other parameters;
|
|
* reject ROWS if it's not returnsSet. NB: pg_dump knows these default
|
|
* values, keep it in sync if you change them.
|
|
*/
|
|
if (procost < 0) {
|
|
/* SQL and PL-language functions are assumed more expensive */
|
|
if (languageOid == INTERNALlanguageId || languageOid == ClanguageId)
|
|
procost = 1;
|
|
else
|
|
procost = 100;
|
|
}
|
|
if (prorows < 0) {
|
|
if (returnsSet)
|
|
prorows = 1000;
|
|
else
|
|
prorows = 0; /* dummy value if not returnsSet */
|
|
} else if (!returnsSet)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("ROWS is not applicable when function does not return a set")));
|
|
|
|
if (isWindowFunc) {
|
|
CheckWindowFuncValid(languageOid, prosrc_str);
|
|
}
|
|
|
|
/*
|
|
* And now that we have all the parameters, and know we're permitted to do
|
|
* so, go ahead and create the function.
|
|
*/
|
|
Oid procedureOid = ProcedureCreate(funcname, namespaceId, pkg_oid, stmt->isOraStyle, stmt->replace,
|
|
returnsSet, prorettype, proowner, languageOid, languageValidator,
|
|
prosrc_str, /* converted to text later */
|
|
probin_str, /* converted to text later */
|
|
false, /* not an aggregate */
|
|
isWindowFunc, security, isLeakProof, isStrict, volatility, parameterTypes,
|
|
PointerGetDatum(allParameterTypes), PointerGetDatum(parameterModes),
|
|
PointerGetDatum(parameterNames),
|
|
parameterDefaults,
|
|
PointerGetDatum(proconfig),
|
|
procost,
|
|
prorows,
|
|
prodefaultargpos,
|
|
fenced,
|
|
shippable,
|
|
package,
|
|
proIsProcedure,
|
|
stmt->inputHeaderSrc,
|
|
stmt->isPrivate);
|
|
|
|
CreateFunctionComment(procedureOid, functionOptions);
|
|
|
|
u_sess->plsql_cxt.procedure_start_line = 0;
|
|
u_sess->plsql_cxt.procedure_first_line = 0;
|
|
u_sess->plsql_cxt.isCreateFunction = false;
|
|
if (u_sess->plsql_cxt.debug_query_string != NULL && !OidIsValid(pkg_oid)) {
|
|
pfree_ext(u_sess->plsql_cxt.debug_query_string);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* @Description: Close library handle and delete library file.
|
|
* @in tup: pg_proc tuple.
|
|
* @return: If is user-defined C-function return true else return false.
|
|
*/
|
|
bool PrepareCFunctionLibrary(HeapTuple tup)
|
|
{
|
|
/* To user-defined C function, we need close it's file handle and drop library file.*/
|
|
bool isnull = false;
|
|
Datum probinattr;
|
|
char* probinstring = NULL;
|
|
probinattr = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_probin, &isnull);
|
|
|
|
if (!isnull) {
|
|
probinstring = TextDatumGetCString(probinattr);
|
|
|
|
/* If is user-define function.*/
|
|
if (strncmp(probinstring, "$libdir/pg_plugin/", strlen("$libdir/pg_plugin/")) == 0) {
|
|
InsertIntoPendingLibraryDelete(probinstring, true);
|
|
pfree_ext(probinstring);
|
|
return true;
|
|
}
|
|
pfree_ext(probinstring);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* @desctiption: Remove library file.
|
|
*/
|
|
void removeLibrary(const char* filename)
|
|
{
|
|
char* fullname = expand_dynamic_library_name(filename);
|
|
unlink(fullname);
|
|
}
|
|
|
|
/*
|
|
* @Description: Append library file into pendingLibraryDeletes.
|
|
* @filename: Library file name.
|
|
* @in atCommit: Ture or false.
|
|
*/
|
|
void InsertIntoPendingLibraryDelete(const char* filename, bool atCommit)
|
|
{
|
|
AutoContextSwitch newContext(THREAD_GET_MEM_CXT_GROUP(MEMORY_CONTEXT_OPTIMIZER));
|
|
|
|
PendingLibraryDelete* pending = (PendingLibraryDelete*)palloc(sizeof(PendingLibraryDelete));
|
|
pending->filename = pstrdup(filename);
|
|
|
|
pending->atCommit = atCommit;
|
|
|
|
u_sess->cmd_cxt.PendingLibraryDeletes = lappend(u_sess->cmd_cxt.PendingLibraryDeletes, pending);
|
|
}
|
|
|
|
/*
|
|
* @Description: Delete library file.
|
|
* @in isCommit: True or false.
|
|
*/
|
|
void libraryDoPendingDeletes(bool isCommit)
|
|
{
|
|
if (u_sess->cmd_cxt.PendingLibraryDeletes == NIL) {
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* protect process variable file_list and CFuncHash, avoid they be
|
|
* concurrent changed of different thread.
|
|
*/
|
|
AutoMutexLock libraryLock(&dlerror_lock);
|
|
libraryLock.lock();
|
|
|
|
ListCell* lc = NULL;
|
|
foreach (lc, u_sess->cmd_cxt.PendingLibraryDeletes) {
|
|
PendingLibraryDelete* del_file = (PendingLibraryDelete*)lfirst(lc);
|
|
|
|
/* delete files according to status of transaction */
|
|
if (del_file->atCommit == isCommit) {
|
|
/* Close library handle and delete this file.*/
|
|
delete_file_handle(del_file->filename);
|
|
|
|
removeLibrary(del_file->filename);
|
|
}
|
|
}
|
|
|
|
/* Reset PendingLibraryDeletes.*/
|
|
ResetPendingLibraryDelete();
|
|
libraryLock.unLock();
|
|
}
|
|
|
|
/*
|
|
* @Description: Reset PendingLibraryDeletes
|
|
* @in dele_list: Need delete PendingLibraryDelete list.
|
|
*/
|
|
void ResetPendingLibraryDelete()
|
|
{
|
|
ListCell* lc = NULL;
|
|
foreach (lc, u_sess->cmd_cxt.PendingLibraryDeletes) {
|
|
PendingLibraryDelete* del_library_file = (PendingLibraryDelete*)lfirst(lc);
|
|
|
|
pfree_ext(del_library_file->filename);
|
|
pfree_ext(del_library_file);
|
|
}
|
|
|
|
list_free_ext(u_sess->cmd_cxt.PendingLibraryDeletes);
|
|
u_sess->cmd_cxt.PendingLibraryDeletes = NIL;
|
|
}
|
|
|
|
/*
|
|
* Guts of function deletion.
|
|
*
|
|
* Note: this is also used for aggregate deletion, since the OIDs of
|
|
* both functions and aggregates point to pg_proc.
|
|
*/
|
|
void RemoveFunctionById(Oid funcOid)
|
|
{
|
|
Relation relation;
|
|
HeapTuple tup;
|
|
bool isagg = false;
|
|
|
|
/*
|
|
* Delete the pg_proc tuple.
|
|
*/
|
|
relation = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow removing the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(funcOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("the builtin function can not be removed,its function oid is \"%u\"", funcOid)));
|
|
}
|
|
|
|
tup = SearchSysCache1(PROCOID, ObjectIdGetDatum(funcOid));
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcOid)));
|
|
|
|
Form_pg_proc procedureStruct = (Form_pg_proc)GETSTRUCT(tup);
|
|
isagg = procedureStruct->proisagg;
|
|
|
|
#ifdef ENABLE_MOT
|
|
char* funcName = pstrdup(NameStr(procedureStruct->proname));
|
|
bool isNull = false;
|
|
Datum prokindDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_prokind, &isNull);
|
|
bool proIsProcedure = isNull ? false : PROC_IS_PRO(CharGetDatum(prokindDatum));
|
|
Datum packageDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_package, &isNull);
|
|
bool isPackage = isNull ? false : DatumGetBool(packageDatum);
|
|
#endif
|
|
|
|
if (procedureStruct->prolang == ClanguageId) {
|
|
PrepareCFunctionLibrary(tup);
|
|
}
|
|
|
|
simple_heap_delete(relation, &tup->t_self);
|
|
|
|
ReleaseSysCache(tup);
|
|
|
|
heap_close(relation, RowExclusiveLock);
|
|
|
|
/*
|
|
* If there's a pg_aggregate tuple, delete that too.
|
|
*/
|
|
if (isagg) {
|
|
relation = heap_open(AggregateRelationId, RowExclusiveLock);
|
|
|
|
tup = SearchSysCache1(AGGFNOID, ObjectIdGetDatum(funcOid));
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_CACHE_LOOKUP_FAILED),
|
|
errmsg("cache lookup failed for pg_aggregate tuple for function %u", funcOid)));
|
|
|
|
simple_heap_delete(relation, &tup->t_self);
|
|
|
|
ReleaseSysCache(tup);
|
|
|
|
heap_close(relation, RowExclusiveLock);
|
|
}
|
|
|
|
/* Recode time of delete function. */
|
|
if (funcOid != InvalidOid) {
|
|
DeletePgObject(funcOid, OBJECT_TYPE_PROC);
|
|
}
|
|
DropErrorByOid(PLPGSQL_PROC, funcOid);
|
|
ce_cache_refresh_type |= 0x20; /* refresh proc cache */
|
|
|
|
#ifdef ENABLE_MOT
|
|
if (proIsProcedure && !isPackage && JitExec::IsMotSPCodegenEnabled()) {
|
|
JitExec::PurgeJitSourceCache(funcOid, JitExec::JIT_PURGE_SCOPE_SP, JitExec::JIT_PURGE_EXPIRE, funcName);
|
|
}
|
|
pfree_ext(funcName);
|
|
#endif
|
|
}
|
|
/*
|
|
* Guts of function deletion.
|
|
*
|
|
* Note: this is also used for aggregate deletion, since the OIDs of
|
|
* both functions and aggregates point to pg_proc.
|
|
*/
|
|
void remove_encrypted_proc_by_id(Oid funcOid)
|
|
{
|
|
Relation relation;
|
|
HeapTuple tup;
|
|
|
|
/*
|
|
* Delete the pg_proc tuple.
|
|
*/
|
|
relation = heap_open(ClientLogicProcId, RowExclusiveLock);
|
|
|
|
|
|
tup = SearchSysCache1(GSCLPROCOID, ObjectIdGetDatum(funcOid));
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcOid)));
|
|
|
|
simple_heap_delete(relation, &tup->t_self);
|
|
|
|
ReleaseSysCache(tup);
|
|
|
|
heap_close(relation, RowExclusiveLock);
|
|
}
|
|
|
|
/*
|
|
* delete a package by package oid
|
|
*/
|
|
void RemovePackageById(Oid pkgOid, bool isBody)
|
|
{
|
|
Relation relation;
|
|
/*
|
|
* Delete the pg_proc tuple.
|
|
*/
|
|
relation = heap_open(PackageRelationId, RowExclusiveLock);
|
|
|
|
HeapTuple pkgtup = SearchSysCache1(PACKAGEOID, ObjectIdGetDatum(pkgOid));
|
|
if (!HeapTupleIsValid(pkgtup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for package %u", pkgOid)));
|
|
if (!isBody) {
|
|
/*
|
|
if replace package specification,delete all function in this package first.
|
|
*/
|
|
DropErrorByOid(PLPGSQL_PACKAGE, pkgOid);
|
|
simple_heap_delete(relation, &pkgtup->t_self);
|
|
} else {
|
|
bool nulls[Natts_gs_package];
|
|
Datum values[Natts_gs_package];
|
|
bool replaces[Natts_gs_package];
|
|
for (int i = 0; i < Natts_gs_package; i++) {
|
|
nulls[i] = false;
|
|
values[i] = (Datum)NULL;
|
|
replaces[i] = false;
|
|
}
|
|
replaces[Anum_gs_package_pkgbodyinitsrc - 1] = true;
|
|
nulls[Anum_gs_package_pkgbodyinitsrc - 1] = true;
|
|
replaces[Anum_gs_package_pkgbodydeclsrc - 1] = true;
|
|
nulls[Anum_gs_package_pkgbodydeclsrc - 1] = true;
|
|
HeapTuple newtup = heap_modify_tuple(pkgtup, RelationGetDescr(relation), values, nulls, replaces);
|
|
DropErrorByOid(PLPGSQL_PACKAGE_BODY, pkgOid);
|
|
simple_heap_update(relation, &newtup->t_self, newtup);
|
|
}
|
|
ReleaseSysCache(pkgtup);
|
|
|
|
heap_close(relation, RowExclusiveLock);
|
|
|
|
/*
|
|
* If there's a pg_aggregate tuple, delete that too.
|
|
*/
|
|
|
|
/* Recode time of delete package. */
|
|
if (pkgOid != InvalidOid) {
|
|
DeletePgObject(pkgOid, OBJECT_TYPE_PKGSPEC);
|
|
}
|
|
}
|
|
|
|
void DeleteFunctionByPackageOid(Oid package_oid)
|
|
{
|
|
if (!OidIsValid(package_oid)) {
|
|
return;
|
|
}
|
|
|
|
HeapTuple oldtup;
|
|
ScanKeyData entry;
|
|
ScanKeyInit(&entry, Anum_pg_proc_packageid, BTEqualStrategyNumber, F_OIDEQ, ObjectIdGetDatum(package_oid));
|
|
Relation pg_proc_rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
SysScanDesc scan = systable_beginscan(pg_proc_rel, InvalidOid, false, NULL, 1, &entry);
|
|
while ((oldtup = systable_getnext(scan)) != NULL) {
|
|
HeapTuple proctup = heap_copytuple(oldtup);
|
|
Oid funcOid = InvalidOid;
|
|
if (HeapTupleIsValid(proctup)) {
|
|
funcOid = HeapTupleGetOid(proctup);
|
|
if (!OidIsValid(funcOid)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_CACHE_LOOKUP_FAILED),
|
|
errmodule(MOD_PLSQL),
|
|
errmsg("cache lookup failed for relid %u", funcOid)));
|
|
}
|
|
} else {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_CACHE_LOOKUP_FAILED),
|
|
errmodule(MOD_PLSQL),
|
|
errmsg("cache lookup failed for relid %u", funcOid)));
|
|
}
|
|
(void)deleteDependencyRecordsFor(ProcedureRelationId, funcOid, true);
|
|
DeleteTypesDenpendOnPackage(ProcedureRelationId, funcOid);
|
|
/* the 'shared dependencies' also change when update. */
|
|
deleteSharedDependencyRecordsFor(ProcedureRelationId, funcOid, 0);
|
|
|
|
/* send invalid message for for relation holding replaced function as trigger */
|
|
InvalidRelcacheForTriggerFunction(funcOid, ((Form_pg_proc)GETSTRUCT(proctup))->prorettype);
|
|
RemoveFunctionById(funcOid);
|
|
heap_freetuple(proctup);
|
|
}
|
|
systable_endscan(scan);
|
|
heap_close(pg_proc_rel, RowExclusiveLock);
|
|
}
|
|
/*
|
|
* Rename function
|
|
*/
|
|
void RenameFunction(List* name, List* argtypes, const char* newname)
|
|
{
|
|
Oid procOid;
|
|
Oid namespaceOid;
|
|
HeapTuple tup;
|
|
Form_pg_proc procForm;
|
|
Relation rel;
|
|
AclResult aclresult;
|
|
rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
procOid = LookupFuncNameTypeNames(name, argtypes, false);
|
|
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow renaming the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(procOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("the builtin function can not be renamed,its function oid is \"%u\"", procOid)));
|
|
}
|
|
/* if the function is a masking function, we can't allow to rename it. */
|
|
if (IsMaskingFunctionOid(procOid) && !u_sess->attr.attr_common.IsInplaceUpgrade) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("the masking function \"%s\" can not be renamed", get_func_name(procOid))));
|
|
}
|
|
|
|
tup = SearchSysCacheCopy1(PROCOID, ObjectIdGetDatum(procOid));
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", procOid)));
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
TrForbidAccessRbObject(ProcedureRelationId, procOid, NameStr(procForm->proname));
|
|
if (procForm->proisagg)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("\"%s\" is an aggregate function", NameListToString(name)),
|
|
errhint("Use ALTER AGGREGATE to rename aggregate functions.")));
|
|
namespaceOid = procForm->pronamespace;
|
|
|
|
checkAllowAlter(tup);
|
|
oidvector* proargs = ProcedureGetArgTypes(tup);
|
|
/* make sure the new name doesn't exist */
|
|
#ifdef ENABLE_MULTIPLE_NODES
|
|
if (SearchSysCacheExists3(PROCNAMEARGSNSP,
|
|
CStringGetDatum(newname),
|
|
PointerGetDatum(&procForm->proargtypes),
|
|
ObjectIdGetDatum(namespaceOid))) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_FUNCTION),
|
|
errmsg("function %s already exists in schema \"%s\"",
|
|
funcname_signature_string(newname, procForm->pronargs, NIL, proargs->values),
|
|
get_namespace_name(namespaceOid))));
|
|
}
|
|
#else
|
|
if (t_thrd.proc->workingVersionNum < 92470) {
|
|
if (SearchSysCacheExists3(PROCNAMEARGSNSP,
|
|
CStringGetDatum(newname),
|
|
PointerGetDatum(&procForm->proargtypes),
|
|
ObjectIdGetDatum(namespaceOid))) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_FUNCTION),
|
|
errmsg("function %s already exists in schema \"%s\"",
|
|
funcname_signature_string(newname, procForm->pronargs, NIL, proargs->values),
|
|
get_namespace_name(namespaceOid))));
|
|
}
|
|
} else {
|
|
Datum packageOidDatum;
|
|
bool isNull = false;
|
|
packageOidDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_packageid, &isNull);
|
|
Datum allargtypes = ProcedureGetAllArgTypes(tup, &isNull);
|
|
Datum argmodes = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_proargmodes, &isNull);
|
|
if (SearchSysCacheExistsForProcAllArgs(
|
|
CStringGetDatum(newname),
|
|
allargtypes,
|
|
ObjectIdGetDatum(namespaceOid),
|
|
packageOidDatum,
|
|
argmodes)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_FUNCTION),
|
|
errmsg("function %s already exists in schema \"%s\"",
|
|
funcname_signature_string(newname, procForm->pronargs, NIL, proargs->values),
|
|
get_namespace_name(namespaceOid))));
|
|
}
|
|
|
|
}
|
|
#endif
|
|
/* Must be owner or have alter privilege of the target object. */
|
|
aclresult = pg_proc_aclcheck(procOid, GetUserId(), ACL_ALTER);
|
|
if (aclresult != ACLCHECK_OK && !pg_proc_ownercheck(procOid, GetUserId())) {
|
|
aclcheck_error(ACLCHECK_NO_PRIV, ACL_KIND_PROC, NameListToString(name));
|
|
}
|
|
|
|
/* must have CREATE privilege on namespace */
|
|
aclresult = pg_namespace_aclcheck(namespaceOid, GetUserId(), ACL_CREATE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_NAMESPACE, get_namespace_name(namespaceOid));
|
|
|
|
/* rename */
|
|
(void)namestrcpy(&(procForm->proname), newname);
|
|
simple_heap_update(rel, &tup->t_self, tup);
|
|
CatalogUpdateIndexes(rel, tup);
|
|
|
|
/* Recode time of rename the proc. */
|
|
if (OidIsValid(procOid)) {
|
|
UpdatePgObjectMtime(procOid, OBJECT_TYPE_PROC);
|
|
}
|
|
|
|
heap_close(rel, NoLock);
|
|
tableam_tops_free_tuple(tup);
|
|
}
|
|
|
|
/*
|
|
* Change function owner by name and args
|
|
*/
|
|
void AlterFunctionOwner(List* name, List* argtypes, Oid newOwnerId)
|
|
{
|
|
Relation rel;
|
|
Oid procOid;
|
|
HeapTuple tup;
|
|
rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
|
|
procOid = LookupFuncNameTypeNames(name, argtypes, false);
|
|
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow change the ownerId of the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(procOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("function \"%s\" is a builtin function,its owner can not be changed", NameListToString(name))));
|
|
}
|
|
/* if the function is a masking function, we can't allow to change it's ownerId. */
|
|
if (IsMaskingFunctionOid(procOid) && !u_sess->attr.attr_common.IsInplaceUpgrade) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("function \"%s\" is a masking function,its owner can not be changed", NameListToString(name))));
|
|
}
|
|
|
|
TrForbidAccessRbObject(ProcedureRelationId, procOid);
|
|
|
|
tup = SearchSysCache1(PROCOID, ObjectIdGetDatum(procOid));
|
|
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", procOid)));
|
|
checkAllowAlter(tup);
|
|
|
|
if (((Form_pg_proc)GETSTRUCT(tup))->proisagg)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("\"%s\" is an aggregate function", NameListToString(name)),
|
|
errhint("Use ALTER AGGREGATE to change owner of aggregate functions.")));
|
|
|
|
AlterFunctionOwner_internal(rel, tup, newOwnerId);
|
|
|
|
/* Recode time of change the funciton owner. */
|
|
UpdatePgObjectMtime(procOid, OBJECT_TYPE_PROC);
|
|
|
|
heap_close(rel, NoLock);
|
|
}
|
|
|
|
/*
|
|
* Change function owner by Oid
|
|
* in byPackage: means whether called by Alter Package Owner
|
|
*/
|
|
void AlterFunctionOwner_oid(Oid procOid, Oid newOwnerId, bool byPackage)
|
|
{
|
|
Relation rel;
|
|
HeapTuple tup;
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow change the ownerId of the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(procOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("ownerId change failed for function %u, because it is a builtin function.", procOid)));
|
|
}
|
|
/* if the function is a masking function, we can't allow to change it's ownerId. */
|
|
if (IsMaskingFunctionOid(procOid) && !u_sess->attr.attr_common.IsInplaceUpgrade) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("ownerId change failed for function \"%s\", because it is a masking function.",
|
|
get_func_name(procOid))));
|
|
}
|
|
|
|
rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
|
|
tup = SearchSysCache1(PROCOID, ObjectIdGetDatum(procOid));
|
|
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", procOid)));
|
|
if (!byPackage) {
|
|
checkAllowAlter(tup);
|
|
}
|
|
AlterFunctionOwner_internal(rel, tup, newOwnerId);
|
|
|
|
/* Recode time of change the funciton owner. */
|
|
UpdatePgObjectMtime(procOid, OBJECT_TYPE_PROC);
|
|
|
|
heap_close(rel, NoLock);
|
|
}
|
|
|
|
/*
|
|
* Change function owner by package Oid, called by Alter Package Owner
|
|
*/
|
|
void AlterFunctionOwnerByPkg(Oid packageOid, Oid newOwnerId)
|
|
{
|
|
if (!OidIsValid(packageOid)) {
|
|
return;
|
|
}
|
|
|
|
HeapTuple oldtup;
|
|
ScanKeyData entry;
|
|
ScanKeyInit(&entry, Anum_pg_proc_packageid, BTEqualStrategyNumber, F_OIDEQ, ObjectIdGetDatum(packageOid));
|
|
Relation pg_proc_rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
SysScanDesc scan = systable_beginscan(pg_proc_rel, InvalidOid, false, NULL, 1, &entry);
|
|
while ((oldtup = systable_getnext(scan)) != NULL) {
|
|
HeapTuple proctup = heap_copytuple(oldtup);
|
|
Oid funcOid = InvalidOid;
|
|
if (HeapTupleIsValid(proctup)) {
|
|
funcOid = HeapTupleGetOid(proctup);
|
|
if (!OidIsValid(funcOid)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_CACHE_LOOKUP_FAILED),
|
|
errmodule(MOD_PLSQL),
|
|
errmsg("cache lookup failed for function id %u", funcOid)));
|
|
}
|
|
} else {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_CACHE_LOOKUP_FAILED),
|
|
errmodule(MOD_PLSQL),
|
|
errmsg("cache lookup failed for function %u", funcOid)));
|
|
}
|
|
AlterFunctionOwner_oid(funcOid, newOwnerId, true);
|
|
}
|
|
systable_endscan(scan);
|
|
heap_close(pg_proc_rel, NoLock);
|
|
}
|
|
|
|
/*
|
|
* @Description: Alter function owner.
|
|
* @in rel: pg_proc relation.
|
|
* @in tup: pg_proc Tuple of this funtion.
|
|
* @in newOwnerId: New owner oid.
|
|
*/
|
|
static void AlterFunctionOwner_internal(Relation rel, HeapTuple tup, Oid newOwnerId)
|
|
{
|
|
Form_pg_proc procForm;
|
|
AclResult aclresult;
|
|
Oid procOid;
|
|
|
|
Assert(RelationGetRelid(rel) == ProcedureRelationId);
|
|
Assert(tup->t_tableOid == ProcedureRelationId);
|
|
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
procOid = HeapTupleGetOid(tup);
|
|
|
|
if (IsSystemObjOid(procOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("ownerId change failed for function %u, because it is a builtin function.", procOid)));
|
|
}
|
|
|
|
/*
|
|
* If the new owner is the same as the existing owner, consider the
|
|
* command to have succeeded. This is for dump restoration purposes.
|
|
*/
|
|
if (procForm->proowner != newOwnerId) {
|
|
Datum repl_val[Natts_pg_proc];
|
|
bool repl_null[Natts_pg_proc];
|
|
bool repl_repl[Natts_pg_proc];
|
|
Acl* newAcl = NULL;
|
|
Datum aclDatum;
|
|
bool isNull = false;
|
|
HeapTuple newtuple;
|
|
|
|
/* Superusers can always do it */
|
|
if (!superuser()) {
|
|
/* Otherwise, must be owner of the existing object */
|
|
if (!pg_proc_ownercheck(procOid, GetUserId()))
|
|
aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_PROC, NameStr(procForm->proname));
|
|
|
|
/* Must be able to become new owner */
|
|
check_is_member_of_role(GetUserId(), newOwnerId);
|
|
|
|
/* New owner must have CREATE privilege on namespace */
|
|
aclresult = pg_namespace_aclcheck(procForm->pronamespace, newOwnerId, ACL_CREATE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_NAMESPACE, get_namespace_name(procForm->pronamespace));
|
|
}
|
|
|
|
errno_t errorno = EOK;
|
|
errorno = memset_s(repl_null, sizeof(repl_null), false, sizeof(repl_null));
|
|
securec_check(errorno, "\0", "\0");
|
|
errorno = memset_s(repl_repl, sizeof(repl_repl), false, sizeof(repl_repl));
|
|
securec_check(errorno, "\0", "\0");
|
|
|
|
repl_repl[Anum_pg_proc_proowner - 1] = true;
|
|
repl_val[Anum_pg_proc_proowner - 1] = ObjectIdGetDatum(newOwnerId);
|
|
|
|
/*
|
|
* Determine the modified ACL for the new owner. This is only
|
|
* necessary when the ACL is non-null.
|
|
*/
|
|
aclDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_proacl, &isNull);
|
|
if (!isNull) {
|
|
newAcl = aclnewowner(DatumGetAclP(aclDatum), procForm->proowner, newOwnerId);
|
|
repl_repl[Anum_pg_proc_proacl - 1] = true;
|
|
repl_val[Anum_pg_proc_proacl - 1] = PointerGetDatum(newAcl);
|
|
}
|
|
|
|
newtuple = (HeapTuple) tableam_tops_modify_tuple(tup, RelationGetDescr(rel), repl_val, repl_null, repl_repl);
|
|
|
|
simple_heap_update(rel, &newtuple->t_self, newtuple);
|
|
CatalogUpdateIndexes(rel, newtuple);
|
|
|
|
tableam_tops_free_tuple(newtuple);
|
|
|
|
/* Update owner dependency reference */
|
|
changeDependencyOnOwner(ProcedureRelationId, procOid, newOwnerId);
|
|
/* Update owner of function type build in pg_type */
|
|
AlterTypeOwnerByFunc(procOid, newOwnerId);
|
|
}
|
|
|
|
ReleaseSysCache(tup);
|
|
}
|
|
|
|
bool IsFunctionTemp(AlterFunctionStmt* stmt)
|
|
{
|
|
HeapTuple tup;
|
|
Oid funcOid;
|
|
Form_pg_proc procForm;
|
|
Relation rel;
|
|
|
|
rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
funcOid = LookupFuncNameTypeNames(stmt->func->funcname, stmt->func->funcargs, false);
|
|
tup = SearchSysCacheCopy1(PROCOID, ObjectIdGetDatum(funcOid));
|
|
if (!HeapTupleIsValid(tup)) {
|
|
/* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcOid)));
|
|
}
|
|
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
|
|
if (procForm->pronamespace == u_sess->catalog_cxt.myTempNamespace) {
|
|
heap_close(rel, RowExclusiveLock);
|
|
tableam_tops_free_tuple(tup);
|
|
return true;
|
|
}
|
|
|
|
heap_close(rel, RowExclusiveLock);
|
|
tableam_tops_free_tuple(tup);
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* Implements the ALTER FUNCTION utility command (except for the
|
|
* RENAME and OWNER clauses, which are handled as part of the generic
|
|
* ALTER framework).
|
|
*/
|
|
void AlterFunction(AlterFunctionStmt* stmt)
|
|
{
|
|
HeapTuple tup;
|
|
Oid funcOid;
|
|
Form_pg_proc procForm;
|
|
Relation rel;
|
|
ListCell* l = NULL;
|
|
DefElem* volatility_item = NULL;
|
|
DefElem* strict_item = NULL;
|
|
DefElem* security_def_item = NULL;
|
|
DefElem* leakproof_item = NULL;
|
|
List* set_items = NIL;
|
|
DefElem* cost_item = NULL;
|
|
DefElem* rows_item = NULL;
|
|
DefElem* fencedItem = NULL;
|
|
DefElem* shippable_item = NULL;
|
|
DefElem* package_item = NULL;
|
|
bool isNull = false;
|
|
|
|
funcOid = LookupFuncNameTypeNames(stmt->func->funcname, stmt->func->funcargs, false);
|
|
#ifndef ENABLE_MULTIPLE_NODES
|
|
char* schemaName = NULL;
|
|
char* pkgname = NULL;
|
|
char* procedureName = NULL;
|
|
DeconstructQualifiedName(stmt->func->funcname, &schemaName, &procedureName, &pkgname);
|
|
if (schemaName == NULL) {
|
|
tup = SearchSysCache1(PROCOID, ObjectIdGetDatum(funcOid));
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
schemaName = get_namespace_name(procForm->pronamespace);
|
|
ReleaseSysCache(tup);
|
|
}
|
|
LockProcName(schemaName, pkgname, procedureName);
|
|
#endif
|
|
rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow alter the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(funcOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("function \"%s\" is a builtin function,it can not be altered",
|
|
NameListToString(stmt->func->funcname))));
|
|
}
|
|
/* if the function is a masking function, we can't allow to alter it. */
|
|
if (IsMaskingFunctionOid(funcOid) && !u_sess->attr.attr_common.IsInplaceUpgrade) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("function \"%s\" is a masking function, it can not be altered",
|
|
NameListToString(stmt->func->funcname))));
|
|
}
|
|
|
|
tup = SearchSysCacheCopy1(PROCOID, ObjectIdGetDatum(funcOid));
|
|
Datum packageOidDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_packageid, &isNull);
|
|
Oid packageoid = DatumGetObjectId(packageOidDatum);
|
|
if (OidIsValid(packageoid)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("\"%s\" is a function in package.", NameListToString(stmt->func->funcname)),
|
|
errhint("Use ALTER PACKAGE to alter functions.")));
|
|
}
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcOid)));
|
|
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
|
|
TrForbidAccessRbObject(ProcedureRelationId, funcOid, NameStr(procForm->proname));
|
|
|
|
/* Must be owner or have alter privilege of the target object. */
|
|
AclResult aclresult = pg_proc_aclcheck(funcOid, GetUserId(), ACL_ALTER);
|
|
if (aclresult != ACLCHECK_OK && !pg_proc_ownercheck(funcOid, GetUserId())) {
|
|
aclcheck_error(ACLCHECK_NO_PRIV, ACL_KIND_PROC, NameListToString(stmt->func->funcname));
|
|
}
|
|
|
|
if (procForm->proisagg)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("\"%s\" is an aggregate function", NameListToString(stmt->func->funcname))));
|
|
|
|
if (procForm->pronamespace == u_sess->catalog_cxt.myTempNamespace)
|
|
ExecSetTempObjectIncluded();
|
|
|
|
/* Examine requested actions and add b compatibility options to alterOptions. */
|
|
List* alterOptions = NIL;
|
|
foreach (l, stmt->actions) {
|
|
DefElem* defel = (DefElem*)lfirst(l);
|
|
|
|
if (compute_common_attribute(defel,
|
|
&volatility_item,
|
|
&strict_item,
|
|
&security_def_item,
|
|
&leakproof_item,
|
|
&set_items,
|
|
&cost_item,
|
|
&rows_item,
|
|
&fencedItem,
|
|
&shippable_item,
|
|
&package_item)) {
|
|
continue;
|
|
} else if (compute_b_attribute(defel)) {
|
|
/* recognized b compatibility options */
|
|
alterOptions = lcons(defel, alterOptions);
|
|
} else {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WITH_CHECK_OPTION_VIOLATION), errmsg("option \"%s\" not recognized", defel->defname)));
|
|
}
|
|
}
|
|
|
|
if (volatility_item != NULL)
|
|
procForm->provolatile = interpret_func_volatility(volatility_item);
|
|
if (strict_item != NULL)
|
|
procForm->proisstrict = intVal(strict_item->arg);
|
|
if (security_def_item != NULL)
|
|
procForm->prosecdef = intVal(security_def_item->arg);
|
|
if (leakproof_item != NULL) {
|
|
procForm->proleakproof = intVal(leakproof_item->arg);
|
|
if (procForm->proleakproof && !superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), errmsg("only system admin can define a leakproof function")));
|
|
}
|
|
if (cost_item != NULL) {
|
|
procForm->procost = defGetNumeric(cost_item);
|
|
if (procForm->procost <= 0)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("COST must be positive")));
|
|
}
|
|
if (rows_item != NULL) {
|
|
procForm->prorows = defGetNumeric(rows_item);
|
|
if (procForm->prorows <= 0)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("ROWS must be positive")));
|
|
if (!procForm->proretset)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("ROWS is not applicable when function does not return a set")));
|
|
}
|
|
|
|
if (package_item != NULL) {
|
|
ereport(ERROR, (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), errmsg("Do not support package for ALTER FUNCTION.")));
|
|
}
|
|
|
|
if (set_items != NULL || fencedItem != NULL || shippable_item != NULL) {
|
|
Datum datum;
|
|
bool isnull = false;
|
|
Datum repl_val[Natts_pg_proc];
|
|
bool repl_null[Natts_pg_proc];
|
|
bool repl_repl[Natts_pg_proc];
|
|
errno_t rc = EOK;
|
|
|
|
rc = memset_s(repl_repl, sizeof(repl_repl), false, sizeof(repl_repl));
|
|
securec_check(rc, "\0", "\0");
|
|
|
|
if (set_items != NULL) {
|
|
ArrayType* a = NULL;
|
|
/* extract existing proconfig setting */
|
|
datum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_proconfig, &isnull);
|
|
a = isnull ? NULL : DatumGetArrayTypeP(datum);
|
|
|
|
/* update according to each SET or RESET item, left to right */
|
|
a = update_proconfig_value(a, (const List*)set_items);
|
|
|
|
/* update the tuple */
|
|
repl_repl[Anum_pg_proc_proconfig - 1] = true;
|
|
|
|
if (a == NULL) {
|
|
repl_val[Anum_pg_proc_proconfig - 1] = (Datum)0;
|
|
repl_null[Anum_pg_proc_proconfig - 1] = true;
|
|
} else {
|
|
repl_val[Anum_pg_proc_proconfig - 1] = PointerGetDatum(a);
|
|
repl_null[Anum_pg_proc_proconfig - 1] = false;
|
|
}
|
|
}
|
|
|
|
if (fencedItem != NULL) {
|
|
bool setToFenced = intVal(fencedItem->arg);
|
|
if (!setToFenced && procForm->prolang == JavalanguageId)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("Java UDF dose not support NOT FENCED functions.")));
|
|
|
|
/* update the tuple */
|
|
repl_repl[Anum_pg_proc_fenced - 1] = true;
|
|
repl_val[Anum_pg_proc_fenced - 1] = BoolGetDatum(intVal(fencedItem->arg));
|
|
repl_null[Anum_pg_proc_fenced - 1] = false;
|
|
}
|
|
|
|
if (shippable_item != NULL) {
|
|
repl_repl[Anum_pg_proc_shippable - 1] = true;
|
|
repl_val[Anum_pg_proc_shippable - 1] = BoolGetDatum(intVal(shippable_item->arg));
|
|
repl_null[Anum_pg_proc_shippable - 1] = false;
|
|
if (!intVal(shippable_item->arg) &&
|
|
((volatility_item && interpret_func_volatility(volatility_item) == PROVOLATILE_IMMUTABLE) ||
|
|
(volatility_item == NULL && func_volatile(funcOid) == PROVOLATILE_IMMUTABLE))) {
|
|
elog(NOTICE, "Immutable function will be shippable anyway.");
|
|
}
|
|
}
|
|
tup = (HeapTuple) tableam_tops_modify_tuple(tup, RelationGetDescr(rel), repl_val, repl_null, repl_repl);
|
|
}
|
|
|
|
/* Do the update */
|
|
simple_heap_update(rel, &tup->t_self, tup);
|
|
CatalogUpdateIndexes(rel, tup);
|
|
|
|
CreateFunctionComment(funcOid, alterOptions, true);
|
|
|
|
/* Recode time of alter funciton. */
|
|
if (OidIsValid(funcOid)) {
|
|
UpdatePgObjectMtime(funcOid, OBJECT_TYPE_PROC);
|
|
}
|
|
|
|
/*
|
|
* Send invalid message for for relation holding replaced function as trigger if
|
|
* volatality or shippability changes.
|
|
*/
|
|
if (shippable_item != NULL || volatility_item != NULL) {
|
|
InvalidRelcacheForTriggerFunction(funcOid, procForm->prorettype);
|
|
}
|
|
|
|
heap_close(rel, NoLock);
|
|
tableam_tops_free_tuple(tup);
|
|
}
|
|
|
|
/*
|
|
* SetFunctionReturnType - change declared return type of a function
|
|
*
|
|
* This is presently only used for adjusting legacy functions that return
|
|
* OPAQUE to return whatever we find their correct definition should be.
|
|
* The caller should emit a suitable warning explaining what we did.
|
|
*/
|
|
void SetFunctionReturnType(Oid funcOid, Oid newRetType)
|
|
{
|
|
Relation pg_proc_rel;
|
|
HeapTuple tup;
|
|
Form_pg_proc procForm;
|
|
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow setting return type for the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(funcOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("set return type failed for function %u, because it is a builtin function.", funcOid)));
|
|
}
|
|
|
|
pg_proc_rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
|
|
tup = SearchSysCacheCopy1(PROCOID, ObjectIdGetDatum(funcOid));
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcOid)));
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
|
|
if (procForm->prorettype != OPAQUEOID) /* caller messed up */
|
|
ereport(ERROR, (errcode(ERRCODE_DATATYPE_MISMATCH), errmsg("function %u doesn't return OPAQUE", funcOid)));
|
|
|
|
/* okay to overwrite copied tuple */
|
|
procForm->prorettype = newRetType;
|
|
|
|
/* update the catalog and its indexes */
|
|
simple_heap_update(pg_proc_rel, &tup->t_self, tup);
|
|
|
|
CatalogUpdateIndexes(pg_proc_rel, tup);
|
|
|
|
heap_close(pg_proc_rel, RowExclusiveLock);
|
|
}
|
|
|
|
/*
|
|
* SetFunctionArgType - change declared argument type of a function
|
|
*
|
|
* As above, but change an argument's type.
|
|
*/
|
|
void SetFunctionArgType(Oid funcOid, int argIndex, Oid newArgType)
|
|
{
|
|
Relation pg_proc_rel;
|
|
HeapTuple tup;
|
|
Form_pg_proc procForm;
|
|
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow setting argument type for the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(funcOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("set argument type failed for function %u, because it is a builtin function.", funcOid)));
|
|
}
|
|
pg_proc_rel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
|
|
tup = SearchSysCacheCopy1(PROCOID, ObjectIdGetDatum(funcOid));
|
|
if (!HeapTupleIsValid(tup)) /* should not happen */
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcOid)));
|
|
procForm = (Form_pg_proc)GETSTRUCT(tup);
|
|
|
|
// No need to check Anum_pg_proc_proargtypesext attribute, because this function is called for
|
|
// procedures/functions that have less than or equal to FUNC_MAX_ARGS_INROW parameters
|
|
Assert(procForm->pronargs <= FUNC_MAX_ARGS_INROW);
|
|
|
|
if (argIndex < 0 || argIndex >= procForm->pronargs || procForm->proargtypes.values[argIndex] != OPAQUEOID)
|
|
ereport(ERROR, (errcode(ERRCODE_DATATYPE_MISMATCH), errmsg("function %u doesn't return OPAQUE", funcOid)));
|
|
|
|
/* okay to overwrite copied tuple */
|
|
procForm->proargtypes.values[argIndex] = newArgType;
|
|
|
|
/* update the catalog and its indexes */
|
|
simple_heap_update(pg_proc_rel, &tup->t_self, tup);
|
|
|
|
CatalogUpdateIndexes(pg_proc_rel, tup);
|
|
|
|
heap_close(pg_proc_rel, RowExclusiveLock);
|
|
}
|
|
|
|
/*
|
|
* CREATE CAST
|
|
*/
|
|
void CreateCast(CreateCastStmt* stmt)
|
|
{
|
|
Oid sourcetypeid;
|
|
Oid targettypeid;
|
|
char sourcetyptype;
|
|
char targettyptype;
|
|
Oid funcid;
|
|
Oid castid;
|
|
Oid ownerid;
|
|
int nargs;
|
|
char castcontext;
|
|
char castmethod;
|
|
Relation relation;
|
|
HeapTuple tuple;
|
|
Datum values[Natts_pg_cast];
|
|
bool nulls[Natts_pg_cast];
|
|
ObjectAddress myself, referenced;
|
|
AclResult aclresult;
|
|
|
|
sourcetypeid = typenameTypeId(NULL, stmt->sourcetype);
|
|
targettypeid = typenameTypeId(NULL, stmt->targettype);
|
|
sourcetyptype = get_typtype(sourcetypeid);
|
|
targettyptype = get_typtype(targettypeid);
|
|
|
|
/* No pseudo-types allowed */
|
|
if (sourcetyptype == TYPTYPE_PSEUDO)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("source data type %s is a pseudo-type", TypeNameToString(stmt->sourcetype))));
|
|
|
|
if (targettyptype == TYPTYPE_PSEUDO)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("target data type %s is a pseudo-type", TypeNameToString(stmt->targettype))));
|
|
|
|
/* Permission check */
|
|
if (!pg_type_ownercheck(sourcetypeid, GetUserId()) && !pg_type_ownercheck(targettypeid, GetUserId()))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("must be owner of type %s or type %s",
|
|
format_type_be(sourcetypeid),
|
|
format_type_be(targettypeid))));
|
|
|
|
aclresult = pg_type_aclcheck(sourcetypeid, GetUserId(), ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error_type(aclresult, sourcetypeid);
|
|
|
|
aclresult = pg_type_aclcheck(targettypeid, GetUserId(), ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error_type(aclresult, targettypeid);
|
|
|
|
/* Domains are allowed for historical reasons, but we warn */
|
|
if (sourcetyptype == TYPTYPE_DOMAIN)
|
|
ereport(WARNING,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("cast will be ignored because the source data type is a domain")));
|
|
|
|
else if (targettyptype == TYPTYPE_DOMAIN)
|
|
ereport(WARNING,
|
|
(errcode(ERRCODE_WRONG_OBJECT_TYPE),
|
|
errmsg("cast will be ignored because the target data type is a domain")));
|
|
|
|
/* Detemine the cast method */
|
|
if (stmt->func != NULL)
|
|
castmethod = COERCION_METHOD_FUNCTION;
|
|
else if (stmt->inout)
|
|
castmethod = COERCION_METHOD_INOUT;
|
|
else
|
|
castmethod = COERCION_METHOD_BINARY;
|
|
|
|
if (castmethod == COERCION_METHOD_FUNCTION) {
|
|
Form_pg_proc procstruct;
|
|
|
|
funcid = LookupFuncNameTypeNames(stmt->func->funcname, stmt->func->funcargs, false);
|
|
|
|
tuple = SearchSysCache1(PROCOID, ObjectIdGetDatum(funcid));
|
|
if (!HeapTupleIsValid(tuple))
|
|
ereport(
|
|
ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", funcid)));
|
|
|
|
procstruct = (Form_pg_proc)GETSTRUCT(tuple);
|
|
nargs = procstruct->pronargs;
|
|
|
|
// No need to check Anum_pg_proc_proargtypesext attribute, because cast function
|
|
// will not have more than FUNC_MAX_ARGS_INROW parameters
|
|
Assert(nargs <= FUNC_MAX_ARGS_INROW);
|
|
|
|
if (nargs < 1 || nargs > 3)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("cast function must take one to three arguments")));
|
|
if (!IsBinaryCoercible(sourcetypeid, procstruct->proargtypes.values[0]))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("argument of cast function must match or be binary-coercible from source data type")));
|
|
if (nargs > 1 && procstruct->proargtypes.values[1] != INT4OID)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("second argument of cast function must be type integer")));
|
|
if (nargs > 2 && procstruct->proargtypes.values[2] != BOOLOID)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("third argument of cast function must be type boolean")));
|
|
if (!IsBinaryCoercible(procstruct->prorettype, targettypeid))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("return data type of cast function must match or be binary-coercible to target data type")));
|
|
|
|
/*
|
|
* Restricting the volatility of a cast function may or may not be a
|
|
* good idea in the abstract, but it definitely breaks many old
|
|
* user-defined types. Disable this check --- tgl 2/1/03
|
|
*/
|
|
#ifdef NOT_USED
|
|
if (procstruct->provolatile == PROVOLATILE_VOLATILE)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("cast function must not be volatile")));
|
|
#endif
|
|
if (procstruct->proisagg)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("cast function must not be an aggregate function")));
|
|
if (procstruct->proiswindow)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("cast function must not be a window function")));
|
|
if (procstruct->proretset)
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("cast function must not return a set")));
|
|
|
|
ReleaseSysCache(tuple);
|
|
} else {
|
|
funcid = InvalidOid;
|
|
nargs = 0;
|
|
}
|
|
|
|
if (castmethod == COERCION_METHOD_BINARY) {
|
|
int16 typ1len;
|
|
int16 typ2len;
|
|
bool typ1byval = false;
|
|
bool typ2byval = false;
|
|
char typ1align;
|
|
char typ2align;
|
|
|
|
/*
|
|
* Must be superuser to create binary-compatible casts, since
|
|
* erroneous casts can easily crash the backend.
|
|
*/
|
|
if (!superuser())
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("must be system admin to create a cast WITHOUT FUNCTION")));
|
|
|
|
/*
|
|
* Also, insist that the types match as to size, alignment, and
|
|
* pass-by-value attributes; this provides at least a crude check that
|
|
* they have similar representations. A pair of types that fail this
|
|
* test should certainly not be equated.
|
|
*/
|
|
get_typlenbyvalalign(sourcetypeid, &typ1len, &typ1byval, &typ1align);
|
|
get_typlenbyvalalign(targettypeid, &typ2len, &typ2byval, &typ2align);
|
|
if (typ1len != typ2len || typ1byval != typ2byval || typ1align != typ2align)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("source and target data types are not physically compatible")));
|
|
|
|
/*
|
|
* We know that composite, enum and array types are never binary-
|
|
* compatible with each other. They all have OIDs embedded in them.
|
|
*
|
|
* Theoretically you could build a user-defined base type that is
|
|
* binary-compatible with a composite, enum, or array type. But we
|
|
* disallow that too, as in practice such a cast is surely a mistake.
|
|
* You can always work around that by writing a cast function.
|
|
*/
|
|
if (sourcetyptype == TYPTYPE_COMPOSITE || targettyptype == TYPTYPE_COMPOSITE)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("composite data types are not binary-compatible")));
|
|
|
|
if (sourcetyptype == TYPTYPE_ENUM || targettyptype == TYPTYPE_ENUM)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("enum data types are not binary-compatible")));
|
|
|
|
if (OidIsValid(get_element_type(sourcetypeid)) || OidIsValid(get_element_type(targettypeid)))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("array data types are not binary-compatible")));
|
|
|
|
/*
|
|
* We also disallow creating binary-compatibility casts involving
|
|
* domains. Casting from a domain to its base type is already
|
|
* allowed, and casting the other way ought to go through domain
|
|
* coercion to permit constraint checking. Again, if you're intent on
|
|
* having your own semantics for that, create a no-op cast function.
|
|
*
|
|
* NOTE: if we were to relax this, the above checks for composites
|
|
* etc. would have to be modified to look through domains to their
|
|
* base types.
|
|
*/
|
|
if (sourcetyptype == TYPTYPE_DOMAIN || targettyptype == TYPTYPE_DOMAIN)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION),
|
|
errmsg("domain data types must not be marked binary-compatible")));
|
|
}
|
|
|
|
/*
|
|
* Allow source and target types to be same only for length coercion
|
|
* functions. We assume a multi-arg function does length coercion.
|
|
*/
|
|
if (sourcetypeid == targettypeid && nargs < 2)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_OBJECT_DEFINITION), errmsg("source data type and target data type are the same")));
|
|
|
|
/* convert CoercionContext enum to char value for castcontext */
|
|
switch (stmt->context) {
|
|
case COERCION_IMPLICIT:
|
|
castcontext = COERCION_CODE_IMPLICIT;
|
|
break;
|
|
case COERCION_ASSIGNMENT:
|
|
castcontext = COERCION_CODE_ASSIGNMENT;
|
|
break;
|
|
case COERCION_EXPLICIT:
|
|
castcontext = COERCION_CODE_EXPLICIT;
|
|
break;
|
|
default:
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_UNRECOGNIZED_NODE_TYPE), errmsg("unrecognized CoercionContext: %d", stmt->context)));
|
|
castcontext = 0; /* keep compiler quiet */
|
|
break;
|
|
}
|
|
|
|
relation = heap_open(CastRelationId, RowExclusiveLock);
|
|
|
|
/*
|
|
* Check for duplicate. This is just to give a friendly error message,
|
|
* the unique index would catch it anyway (so no need to sweat about race
|
|
* conditions).
|
|
*/
|
|
tuple = SearchSysCache2(CASTSOURCETARGET, ObjectIdGetDatum(sourcetypeid), ObjectIdGetDatum(targettypeid));
|
|
if (HeapTupleIsValid(tuple))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_OBJECT),
|
|
errmsg("cast from type %s to type %s already exists",
|
|
format_type_be(sourcetypeid),
|
|
format_type_be(targettypeid))));
|
|
|
|
errno_t ss_rc = memset_s(values, sizeof(values), 0, sizeof(values));
|
|
securec_check(ss_rc, "", "");
|
|
|
|
/* ready to go */
|
|
values[Anum_pg_cast_castsource - 1] = ObjectIdGetDatum(sourcetypeid);
|
|
values[Anum_pg_cast_casttarget - 1] = ObjectIdGetDatum(targettypeid);
|
|
values[Anum_pg_cast_castfunc - 1] = ObjectIdGetDatum(funcid);
|
|
values[Anum_pg_cast_castcontext - 1] = CharGetDatum(castcontext);
|
|
values[Anum_pg_cast_castmethod - 1] = CharGetDatum(castmethod);
|
|
ownerid = GetUserId();
|
|
if (OidIsValid(ownerid)) {
|
|
values[Anum_pg_cast_castowner - 1] = ObjectIdGetDatum(ownerid);
|
|
} else {
|
|
ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
|
|
errmsg("invalid current user oid for cast")));
|
|
}
|
|
|
|
ss_rc = memset_s(nulls, sizeof(nulls), false, sizeof(nulls));
|
|
securec_check(ss_rc, "", "");
|
|
|
|
tuple = heap_form_tuple(RelationGetDescr(relation), values, nulls);
|
|
|
|
castid = simple_heap_insert(relation, tuple);
|
|
|
|
CatalogUpdateIndexes(relation, tuple);
|
|
|
|
/* make dependency entries */
|
|
myself.classId = CastRelationId;
|
|
myself.objectId = castid;
|
|
myself.objectSubId = 0;
|
|
|
|
/* dependency on source type */
|
|
referenced.classId = TypeRelationId;
|
|
referenced.objectId = sourcetypeid;
|
|
referenced.objectSubId = 0;
|
|
recordDependencyOn(&myself, &referenced, DEPENDENCY_NORMAL);
|
|
|
|
/* dependency on target type */
|
|
referenced.classId = TypeRelationId;
|
|
referenced.objectId = targettypeid;
|
|
referenced.objectSubId = 0;
|
|
recordDependencyOn(&myself, &referenced, DEPENDENCY_NORMAL);
|
|
|
|
/* dependency on function */
|
|
if (OidIsValid(funcid)) {
|
|
referenced.classId = ProcedureRelationId;
|
|
referenced.objectId = funcid;
|
|
referenced.objectSubId = 0;
|
|
recordDependencyOn(&myself, &referenced, DEPENDENCY_NORMAL);
|
|
}
|
|
|
|
/* dependency on extension */
|
|
recordDependencyOnCurrentExtension(&myself, false);
|
|
|
|
/* Post creation hook for new cast */
|
|
InvokeObjectAccessHook(OAT_POST_CREATE, CastRelationId, castid, 0, NULL);
|
|
|
|
tableam_tops_free_tuple(tuple);
|
|
|
|
heap_close(relation, RowExclusiveLock);
|
|
}
|
|
|
|
/*
|
|
* get_cast_oid - given two type OIDs, look up a cast OID
|
|
*
|
|
* If missing_ok is false, throw an error if the cast is not found. If
|
|
* true, just return InvalidOid.
|
|
*/
|
|
Oid get_cast_oid(Oid sourcetypeid, Oid targettypeid, bool missing_ok)
|
|
{
|
|
Oid oid;
|
|
|
|
oid = GetSysCacheOid2(CASTSOURCETARGET, ObjectIdGetDatum(sourcetypeid), ObjectIdGetDatum(targettypeid));
|
|
if (!OidIsValid(oid) && !missing_ok)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_UNDEFINED_OBJECT),
|
|
errmsg("cast from type %s to type %s does not exist",
|
|
format_type_be(sourcetypeid),
|
|
format_type_be(targettypeid))));
|
|
return oid;
|
|
}
|
|
|
|
void DropCastById(Oid castOid)
|
|
{
|
|
Relation relation;
|
|
ScanKeyData scankey;
|
|
SysScanDesc scan;
|
|
HeapTuple tuple;
|
|
|
|
relation = heap_open(CastRelationId, RowExclusiveLock);
|
|
|
|
ScanKeyInit(&scankey, ObjectIdAttributeNumber, BTEqualStrategyNumber, F_OIDEQ, ObjectIdGetDatum(castOid));
|
|
scan = systable_beginscan(relation, CastOidIndexId, true, NULL, 1, &scankey);
|
|
|
|
tuple = systable_getnext(scan);
|
|
if (!HeapTupleIsValid(tuple))
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT), errmsg("could not find tuple for cast %u", castOid)));
|
|
simple_heap_delete(relation, &tuple->t_self);
|
|
|
|
systable_endscan(scan);
|
|
heap_close(relation, RowExclusiveLock);
|
|
}
|
|
|
|
/*
|
|
* Execute ALTER FUNCTION/AGGREGATE SET SCHEMA
|
|
*
|
|
* These commands are identical except for the lookup procedure, so share code.
|
|
*/
|
|
void AlterFunctionNamespace(List* name, List* argtypes, bool isagg, const char* newschema)
|
|
{
|
|
Oid procOid;
|
|
Oid nspOid;
|
|
|
|
/* get function OID */
|
|
if (isagg)
|
|
procOid = LookupAggNameTypeNames(name, argtypes, false);
|
|
else
|
|
procOid = LookupFuncNameTypeNames(name, argtypes, false);
|
|
|
|
/* get schema OID and check its permissions */
|
|
nspOid = LookupCreationNamespace(newschema);
|
|
|
|
TrForbidAccessRbObject(ProcedureRelationId, nspOid);
|
|
|
|
(void)AlterFunctionNamespace_oid(procOid, nspOid);
|
|
}
|
|
|
|
Oid AlterFunctionNamespace_oid(Oid procOid, Oid nspOid)
|
|
{
|
|
Oid oldNspOid;
|
|
HeapTuple tup;
|
|
Relation procRel;
|
|
Form_pg_proc proc;
|
|
|
|
/* if the function is a builtin function, its Oid is less than 10000.
|
|
* we can't allow change the namespace of the builtin functions
|
|
*/
|
|
if (IsSystemObjOid(procOid) && u_sess->attr.attr_common.IsInplaceUpgrade == false) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("namespace change failed for function %u, because it is a builtin function.", procOid)));
|
|
}
|
|
/* if the function is a masking function, we can't allow to alter it's namespace oid. */
|
|
if (IsMaskingFunctionOid(procOid) && !u_sess->attr.attr_common.IsInplaceUpgrade) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INVALID_FUNCTION_DEFINITION),
|
|
errmsg("namespace change failed for function \"%s\", because it is a masking function.",
|
|
get_func_name(procOid))));
|
|
}
|
|
|
|
procRel = heap_open(ProcedureRelationId, RowExclusiveLock);
|
|
|
|
tup = SearchSysCacheCopy1(PROCOID, ObjectIdGetDatum(procOid));
|
|
if (!HeapTupleIsValid(tup))
|
|
ereport(ERROR, (errcode(ERRCODE_CACHE_LOOKUP_FAILED), errmsg("cache lookup failed for function %u", procOid)));
|
|
checkAllowAlter(tup);
|
|
proc = (Form_pg_proc)GETSTRUCT(tup);
|
|
|
|
/* check permissions on function */
|
|
if (!pg_proc_ownercheck(procOid, GetUserId()))
|
|
aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_PROC, NameStr(proc->proname));
|
|
|
|
oldNspOid = proc->pronamespace;
|
|
|
|
/* common checks on switching namespaces */
|
|
CheckSetNamespace(oldNspOid, nspOid, ProcedureRelationId, procOid);
|
|
|
|
/* disallow move objects into public schemas for non-admin user */
|
|
if ((nspOid == PG_PUBLIC_NAMESPACE || nspOid == PG_DB4AI_NAMESPACE) && !isRelSuperuser()) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
|
|
errmsg("permission denied to move objects into public schema"),
|
|
errhint("must be %s to move objects into %s schema.",
|
|
g_instance.attr.attr_security.enablePrivilegesSeparate ? "initial user" : "sysadmin",
|
|
get_namespace_name(nspOid))));
|
|
}
|
|
|
|
/* check for duplicate name (more friendly than unique-index failure) */
|
|
#ifdef ENABLE_MULTIPLE_NODES
|
|
if (SearchSysCacheExists3(PROCNAMEARGSNSP,
|
|
CStringGetDatum(NameStr(proc->proname)),
|
|
PointerGetDatum(&proc->proargtypes),
|
|
ObjectIdGetDatum((nspOid)))) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_FUNCTION),
|
|
errmsg("function \"%s\" already exists in schema \"%s\"",
|
|
NameStr(proc->proname),
|
|
get_namespace_name(nspOid))));
|
|
}
|
|
#else
|
|
if (t_thrd.proc->workingVersionNum < 92470) {
|
|
if (SearchSysCacheExists3(PROCNAMEARGSNSP,
|
|
CStringGetDatum(NameStr(proc->proname)),
|
|
PointerGetDatum(&proc->proargtypes),
|
|
ObjectIdGetDatum((nspOid)))) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_FUNCTION),
|
|
errmsg("function \"%s\" already exists in schema \"%s\"",
|
|
NameStr(proc->proname),
|
|
get_namespace_name(nspOid))));
|
|
}
|
|
} else {
|
|
Datum packageOidDatum;
|
|
Oid packageOid = InvalidOid;
|
|
bool isNull = false;
|
|
packageOidDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_packageid, &isNull);
|
|
packageOid = ObjectIdGetDatum(packageOidDatum);
|
|
if (!OidIsValid(packageOid)) {
|
|
packageOidDatum = ObjectIdGetDatum(InvalidOid);
|
|
}
|
|
|
|
Datum allargtypes = ProcedureGetAllArgTypes(tup, &isNull);
|
|
Datum argmodes = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_proargmodes, &isNull);
|
|
if (SearchSysCacheExistsForProcAllArgs(
|
|
CStringGetDatum(NameStr(proc->proname)),
|
|
allargtypes,
|
|
ObjectIdGetDatum(nspOid),
|
|
packageOidDatum,
|
|
argmodes)) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_DUPLICATE_FUNCTION),
|
|
errmsg("function \"%s\" already exists in schema \"%s\"",
|
|
NameStr(proc->proname),
|
|
get_namespace_name(nspOid))));
|
|
}
|
|
}
|
|
#endif
|
|
/* OK, modify the pg_proc row */
|
|
/* tup is a copy, so we can scribble directly on it */
|
|
proc->pronamespace = nspOid;
|
|
|
|
simple_heap_update(procRel, &tup->t_self, tup);
|
|
CatalogUpdateIndexes(procRel, tup);
|
|
|
|
/* Recode time of alter function namespace. */
|
|
UpdatePgObjectMtime(procOid, OBJECT_TYPE_PROC);
|
|
|
|
/* Update dependency on schema */
|
|
if (changeDependencyFor(ProcedureRelationId, procOid, NamespaceRelationId, oldNspOid, nspOid) != 1)
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_CHECK_VIOLATION),
|
|
errmsg("failed to change schema dependency for function \"%s\"", NameStr(proc->proname))));
|
|
|
|
tableam_tops_free_tuple(tup);
|
|
|
|
heap_close(procRel, RowExclusiveLock);
|
|
|
|
return oldNspOid;
|
|
}
|
|
|
|
/*
|
|
* ExecuteDoStmt
|
|
* Execute inline procedural-language code
|
|
*/
|
|
void ExecuteDoStmt(DoStmt* stmt, bool atomic)
|
|
{
|
|
InlineCodeBlock* codeblock = makeNode(InlineCodeBlock);
|
|
ListCell* arg = NULL;
|
|
DefElem* as_item = NULL;
|
|
DefElem* language_item = NULL;
|
|
char* language = NULL;
|
|
Oid laninline;
|
|
HeapTuple languageTuple;
|
|
Form_pg_language languageStruct;
|
|
|
|
/* Process options we got from gram.y */
|
|
foreach (arg, stmt->args) {
|
|
DefElem* defel = (DefElem*)lfirst(arg);
|
|
|
|
if (strcmp(defel->defname, "as") == 0) {
|
|
if (as_item != NULL)
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("conflicting or redundant options")));
|
|
as_item = defel;
|
|
} else if (strcmp(defel->defname, "language") == 0) {
|
|
if (language_item != NULL)
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("conflicting or redundant options")));
|
|
language_item = defel;
|
|
} else
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_WITH_CHECK_OPTION_VIOLATION), errmsg("option \"%s\" not recognized", defel->defname)));
|
|
}
|
|
|
|
if (as_item != NULL)
|
|
codeblock->source_text = strVal(as_item->arg);
|
|
else
|
|
ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), errmsg("no inline code specified")));
|
|
|
|
/* if LANGUAGE option wasn't specified, use the default */
|
|
if (language_item != NULL)
|
|
language = strVal(language_item->arg);
|
|
else
|
|
language = "plpgsql";
|
|
|
|
/* Look up the language and validate permissions */
|
|
languageTuple = SearchSysCache1(LANGNAME, PointerGetDatum(language));
|
|
if (!HeapTupleIsValid(languageTuple))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_UNDEFINED_OBJECT),
|
|
errmsg("language \"%s\" does not exist", language),
|
|
(PLTemplateExists(language) ? errhint("Use CREATE LANGUAGE to load the language into the database.")
|
|
: 0)));
|
|
|
|
codeblock->langOid = HeapTupleGetOid(languageTuple);
|
|
languageStruct = (Form_pg_language)GETSTRUCT(languageTuple);
|
|
codeblock->langIsTrusted = languageStruct->lanpltrusted;
|
|
|
|
if (languageStruct->lanpltrusted) {
|
|
/* if trusted language, need USAGE privilege */
|
|
AclResult aclresult;
|
|
|
|
aclresult = pg_language_aclcheck(codeblock->langOid, GetUserId(), ACL_USAGE);
|
|
if (aclresult != ACLCHECK_OK)
|
|
aclcheck_error(aclresult, ACL_KIND_LANGUAGE, NameStr(languageStruct->lanname));
|
|
} else {
|
|
/* if untrusted language, must be superuser */
|
|
if (!superuser())
|
|
aclcheck_error(ACLCHECK_NO_PRIV, ACL_KIND_LANGUAGE, NameStr(languageStruct->lanname));
|
|
}
|
|
|
|
/* get the handler function's OID */
|
|
laninline = languageStruct->laninline;
|
|
codeblock->atomic = atomic;
|
|
if (!OidIsValid(laninline))
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
|
|
errmsg("language \"%s\" does not support inline code execution", NameStr(languageStruct->lanname))));
|
|
|
|
ReleaseSysCache(languageTuple);
|
|
|
|
/* execute the inline handler */
|
|
OidFunctionCall1(laninline, PointerGetDatum(codeblock));
|
|
}
|
|
|
|
// get a int2vector from a list for argument with default value
|
|
static int2vector* GetDefaultArgPos(List* defargpos)
|
|
{
|
|
int2vector* argpos = NULL;
|
|
int2* poslist = NULL;
|
|
int length = 0;
|
|
ListCell* cell = NULL;
|
|
int count = 0;
|
|
|
|
if (defargpos == NIL)
|
|
return NULL;
|
|
|
|
length = defargpos->length;
|
|
|
|
poslist = (int2*)palloc(length * sizeof(int2));
|
|
|
|
foreach (cell, defargpos) {
|
|
poslist[count++] = lfirst_int(cell);
|
|
}
|
|
|
|
argpos = buildint2vector(poslist, length);
|
|
|
|
list_free_ext(defargpos);
|
|
pfree_ext(poslist);
|
|
|
|
return argpos;
|
|
}
|
|
|
|
/*
|
|
* @Description: Get pending library filename to string.
|
|
* @in forCommit: True or false, mean commit or rollback.
|
|
* @out str_ptr: Filename string.
|
|
* @return: File number.
|
|
*/
|
|
int libraryGetPendingDeletes(bool forCommit, char** str_ptr, int* libraryLen)
|
|
{
|
|
int nlibrary = 0;
|
|
int over_length = 0;
|
|
int int_size = sizeof(int);
|
|
char* library_path = NULL;
|
|
int offset = 0;
|
|
|
|
ListCell* lc = NULL;
|
|
foreach (lc, u_sess->cmd_cxt.PendingLibraryDeletes) {
|
|
PendingLibraryDelete* del_file = (PendingLibraryDelete*)lfirst(lc);
|
|
|
|
/* delete files according to status of transaction */
|
|
if (del_file->atCommit == forCommit) {
|
|
over_length += int_size + strlen(del_file->filename);
|
|
nlibrary++;
|
|
}
|
|
}
|
|
|
|
if (nlibrary == 0) {
|
|
*str_ptr = NULL;
|
|
return 0;
|
|
}
|
|
|
|
errno_t rc = 0;
|
|
char* str = (char*)palloc(over_length);
|
|
|
|
foreach (lc, u_sess->cmd_cxt.PendingLibraryDeletes) {
|
|
PendingLibraryDelete* del_file = (PendingLibraryDelete*)lfirst(lc);
|
|
|
|
if (del_file->atCommit == forCommit) {
|
|
library_path = del_file->filename;
|
|
|
|
int string_len = strlen(library_path);
|
|
|
|
/* write filename length. */
|
|
rc = memcpy_s(str + offset, int_size, (char*)(&string_len), int_size);
|
|
securec_check_c(rc, "\0", "\0");
|
|
offset += int_size;
|
|
|
|
/* write file path. */
|
|
rc = memcpy_s(str + offset, string_len, library_path, string_len);
|
|
securec_check_c(rc, "\0", "\0");
|
|
offset += string_len;
|
|
}
|
|
}
|
|
|
|
Assert(over_length == offset);
|
|
|
|
*libraryLen = over_length;
|
|
*str_ptr = str;
|
|
return nlibrary;
|
|
}
|
|
|
|
/*
|
|
* GetFunctionNodeGroup
|
|
* Get dependent NodeGroup oid of the function if arguments or return value including table type.
|
|
* If neither arguments nor return value include table type, return InvalidOid;
|
|
* If arguments and return value include different NodeGroup oid, return InvalidOid also;
|
|
* If arguments and return value include same NodeGroup oid,return the oid.
|
|
*/
|
|
Oid GetFunctionNodeGroup(CreateFunctionStmt* stmt, bool* multi_group)
|
|
{
|
|
ListCell* param = NULL;
|
|
Oid goid;
|
|
Type typtup;
|
|
Form_pg_type typeForm;
|
|
FunctionParameter* fp = NULL;
|
|
int param_count;
|
|
int count;
|
|
int i;
|
|
|
|
Oid groupoid = InvalidOid;
|
|
if (IS_PGXC_DATANODE) {
|
|
return InvalidOid;
|
|
}
|
|
|
|
param_count = (stmt->parameters == NULL) ? 0 : list_length(stmt->parameters);
|
|
count = (stmt->returnType == NULL) ? param_count : (param_count + 1);
|
|
|
|
if (count == 0)
|
|
return InvalidOid;
|
|
|
|
if (param_count > 0)
|
|
param = list_head(stmt->parameters);
|
|
|
|
for (i = 0; i < count; i++) {
|
|
if (i == 0 && stmt->returnType != NULL) {
|
|
typtup = LookupTypeName(NULL, stmt->returnType, NULL, false);
|
|
} else if (param != NULL) {
|
|
fp = (FunctionParameter*)lfirst(param);
|
|
typtup = LookupTypeName(NULL, fp->argType, NULL, false);
|
|
param = lnext(param);
|
|
} else
|
|
break;
|
|
|
|
if (typtup == NULL) {
|
|
ereport(ERROR,
|
|
(errcode(ERRCODE_UNDEFINED_OBJECT),
|
|
errmsg("type \"%s\" does not exist",
|
|
(stmt->returnType == NULL) ? TypeNameToString(fp->argType)
|
|
: TypeNameToString(stmt->returnType))));
|
|
}
|
|
|
|
typeForm = (Form_pg_type)GETSTRUCT(typtup);
|
|
|
|
if (OidIsValid(typeForm->typrelid)) {
|
|
char relkind = get_rel_relkind(typeForm->typrelid);
|
|
bool flag = RELKIND_VIEW != relkind && RELKIND_CONTQUERY != relkind;
|
|
if (flag) {
|
|
goid = ng_get_baserel_groupoid(typeForm->typrelid, relkind);
|
|
if (OidIsValid(goid)) {
|
|
if (groupoid == InvalidOid)
|
|
groupoid = goid;
|
|
else if (groupoid != InvalidOid && groupoid != goid) {
|
|
if (multi_group != NULL)
|
|
*multi_group = true;
|
|
|
|
ReleaseSysCache(typtup);
|
|
return InvalidOid;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
ReleaseSysCache(typtup);
|
|
}
|
|
return groupoid;
|
|
}
|
|
|
|
/*
|
|
* GetFunctionNodeGroupByFuncid
|
|
* Get dependent NodeGroup oid of the function if arguments or return value including table type.
|
|
* If neither arguments nor return value include table type, return InvalidOid;
|
|
* If arguments and return value include different NodeGroup oid, return InvalidOid also;
|
|
* If arguments and return value include same NodeGroup oid,return the oid.
|
|
* The function is used for those functions already created in database, but GetFunctionNodeGroup
|
|
* is used for new function not created in database.
|
|
*/
|
|
Oid GetFunctionNodeGroupByFuncid(Oid funcid)
|
|
{
|
|
Oid* argstype = NULL;
|
|
int nargs;
|
|
Oid rettype = InvalidOid;
|
|
Oid typOid;
|
|
Oid goid;
|
|
Oid groupoid = InvalidOid;
|
|
Relation rel;
|
|
Type typtup;
|
|
Form_pg_type typeForm;
|
|
int i;
|
|
|
|
rel = heap_open(ProcedureRelationId, AccessShareLock);
|
|
|
|
/* Fetch function signatures */
|
|
rettype = get_func_signature(funcid, &argstype, &nargs);
|
|
|
|
for (i = 0; i < nargs + 1; i++) {
|
|
typOid = (i == 0) ? rettype : argstype[i - 1];
|
|
|
|
typtup = SearchSysCache1(TYPEOID, ObjectIdGetDatum(typOid));
|
|
if (!HeapTupleIsValid(typtup))
|
|
ereport(ERROR, (errcode(ERRCODE_UNDEFINED_OBJECT), errmsg("type with OID %u does not exist", typOid)));
|
|
|
|
typeForm = (Form_pg_type)GETSTRUCT(typtup);
|
|
|
|
if (OidIsValid(typeForm->typrelid)) {
|
|
char relkind = get_rel_relkind(typeForm->typrelid);
|
|
|
|
if (RELKIND_VIEW != relkind && RELKIND_CONTQUERY != relkind) {
|
|
goid = ng_get_baserel_groupoid(typeForm->typrelid, relkind);
|
|
if (OidIsValid(goid)) {
|
|
/* Only need to find the first relation type. */
|
|
groupoid = goid;
|
|
ReleaseSysCache(typtup);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
ReleaseSysCache(typtup);
|
|
}
|
|
|
|
pfree_ext(argstype);
|
|
heap_close(rel, AccessShareLock);
|
|
|
|
return groupoid;
|
|
}
|
|
|
|
/*
|
|
* GetFunctionNodeGroup
|
|
* Get dependent NodeGroup oid of the function if arguments or return value including table type.
|
|
* See GetFunctionNodeGroupByFuncid for details.
|
|
*/
|
|
Oid GetFunctionNodeGroup(AlterFunctionStmt* stmt)
|
|
{
|
|
Oid funcid;
|
|
|
|
funcid = LookupFuncNameTypeNames(stmt->func->funcname, stmt->func->funcargs, false);
|
|
|
|
return GetFunctionNodeGroupByFuncid(funcid);
|
|
}
|
|
|
|
|
|
static void checkAllowAlter(HeapTuple tup) {
|
|
Datum packageOidDatum;
|
|
Oid packageOid = InvalidOid;
|
|
bool isnull = false;
|
|
packageOidDatum = SysCacheGetAttr(PROCOID, tup, Anum_pg_proc_packageid, &isnull);
|
|
if (!isnull) {
|
|
packageOid = DatumGetObjectId(packageOidDatum);
|
|
}
|
|
if (OidIsValid(packageOid)) {
|
|
ereport(ERROR,
|
|
(errmodule(MOD_PLSQL), errcode(ERRCODE_SYNTAX_ERROR),
|
|
errmsg("alter function in package is not allowed"),
|
|
errdetail("please rebuild package"),
|
|
errcause("package is one object,not allow alter function in package"),
|
|
erraction("rebuild package")));
|
|
}
|
|
}
|