summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--mysql-test/r/acl_roles_create_and_drop_role.result21
-rw-r--r--mysql-test/t/acl_roles_create_and_drop_role.test20
-rw-r--r--sql/share/errmsg-utf8.txt2
-rw-r--r--sql/sql_acl.cc232
-rw-r--r--sql/sql_acl.h6
-rw-r--r--sql/sql_parse.cc28
6 files changed, 116 insertions, 193 deletions
diff --git a/mysql-test/r/acl_roles_create_and_drop_role.result b/mysql-test/r/acl_roles_create_and_drop_role.result
index 9449d020718..d4eac2756ec 100644
--- a/mysql-test/r/acl_roles_create_and_drop_role.result
+++ b/mysql-test/r/acl_roles_create_and_drop_role.result
@@ -1,8 +1,15 @@
use mysql;
+create role test_role1@host1;
+ERROR 42000: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '@host1' at line 1
+create role test_role2@host2, test_role1@host1;
+ERROR 42000: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '@host2, test_role1@host1' at line 1
create role test_role1;
create role test_role2, test_role3;
-select user, host, is_role from user where user like 'test';
+select user, host, is_role from user where user like 'test%';
user host is_role
+test_role1 Y
+test_role2 Y
+test_role3 Y
drop role test_role1;
drop role test_role2, test_role3;
create role test_role1;
@@ -10,12 +17,20 @@ create role test_role1;
ERROR HY000: Operation CREATE ROLE failed for 'test_role1'
create role test_role1, test_role2;
ERROR HY000: Operation CREATE ROLE failed for 'test_role1'
-select user, host, is_role from user where user like 'test';
+select user, host, is_role from user where user like 'test%';
user host is_role
+test_role1 Y
+test_role2 Y
drop role test_role1;
drop role test_role1;
ERROR HY000: Operation DROP ROLE failed for 'test_role1'
drop role test_role1, test_role2;
ERROR HY000: Operation DROP ROLE failed for 'test_role1'
-select user, host, is_role from user where user like 'test';
+drop role root;
+ERROR HY000: Operation DROP ROLE failed for 'root'
+create user dummy@'';
+drop role dummy;
+ERROR HY000: Operation DROP ROLE failed for 'dummy'
+drop user dummy@'';
+select user, host, is_role from user where user like 'test%';
user host is_role
diff --git a/mysql-test/t/acl_roles_create_and_drop_role.test b/mysql-test/t/acl_roles_create_and_drop_role.test
index 45b10bb9c4b..3bdb1a40041 100644
--- a/mysql-test/t/acl_roles_create_and_drop_role.test
+++ b/mysql-test/t/acl_roles_create_and_drop_role.test
@@ -1,11 +1,17 @@
connect (mysql, localhost, root,,);
use mysql;
+#test valid syntax
+--error ER_PARSE_ERROR
+create role test_role1@host1;
+--error ER_PARSE_ERROR
+create role test_role2@host2, test_role1@host1;
+
create role test_role1;
create role test_role2, test_role3;
--sorted_result
-select user, host, is_role from user where user like 'test';
+select user, host, is_role from user where user like 'test%';
drop role test_role1;
drop role test_role2, test_role3;
@@ -18,7 +24,7 @@ create role test_role1;
create role test_role1, test_role2;
--sorted_result
-select user, host, is_role from user where user like 'test';
+select user, host, is_role from user where user like 'test%';
drop role test_role1;
--error ER_CANNOT_USER
@@ -26,6 +32,14 @@ drop role test_role1;
--error ER_CANNOT_USER
drop role test_role1, test_role2;
+#test that we can not drop users when calling drop role
+--error ER_CANNOT_USER
+drop role root;
+create user dummy@'';
+--error ER_CANNOT_USER
+drop role dummy;
+drop user dummy@'';
+
--sorted_result
-select user, host, is_role from user where user like 'test';
+select user, host, is_role from user where user like 'test%';
disconnect mysql;
diff --git a/sql/share/errmsg-utf8.txt b/sql/share/errmsg-utf8.txt
index 2d4499943ba..3445af7e78f 100644
--- a/sql/share/errmsg-utf8.txt
+++ b/sql/share/errmsg-utf8.txt
@@ -6572,5 +6572,3 @@ ER_INVALID_CURRENT_USER
ER_INVALID_ROLE_COMMAND
eng "Unable to execute role related command. The user table is in invalid format."
rum "Comanda asupra rolurilor nu poate fi executate. Tabelul "user" este in format invalid."
-ER_ROLE_AS_USER
- eng "The role '%s' is marked as a user '%s'@''
diff --git a/sql/sql_acl.cc b/sql/sql_acl.cc
index 1b6653e7b81..75693d02ea3 100644
--- a/sql/sql_acl.cc
+++ b/sql/sql_acl.cc
@@ -3128,7 +3128,7 @@ static int replace_user_table(THD *thd, TABLE *table, LEX_USER &combo,
/* if the user table is not up to date, we can't handle role updates */
if (table->s->fields <= 42 && handle_as_role)
{
- my_error(ER_INVALID_ROLE_COMMAND, MYF(0));
+ my_error(ER_COL_COUNT_DOESNT_MATCH_PLEASE_UPDATE, MYF(0));
DBUG_RETURN(-1);
}
@@ -3296,7 +3296,6 @@ static int replace_user_table(THD *thd, TABLE *table, LEX_USER &combo,
{
if (old_row_exists && !check_is_role(table))
{
- my_error(ER_ROLE_AS_USER, MYF(0), combo.user.str, combo.user.str);
goto end;
}
table->field[ROLE_ASSIGN_COLUMN_IDX]->store("Y", 1, system_charset_info);
@@ -7151,7 +7150,7 @@ static int handle_grant_struct(enum enum_acl_lists struct_no, bool drop,
/* test if the current query targets a role */
is_role= (!user_from->host.length &&
(acl_role= find_acl_role(user_from->user.str))) ? TRUE : FALSE;
- if (is_role && (struct_no != ROLE_ACL || struct_no != ROLES_MAPPINGS_HASH))
+ if (is_role && struct_no != ROLE_ACL && struct_no != ROLES_MAPPINGS_HASH)
{
DBUG_RETURN(0);
}
@@ -7590,27 +7589,21 @@ static int handle_grant_data(TABLE_LIST *tables, bool drop,
}
-static void append_user(String *str, LEX_USER *user)
-{
- if (str->length())
- str->append(',');
- str->append('\'');
- str->append(user->user.str);
- str->append(STRING_WITH_LEN("'@'"));
- str->append(user->host.str);
- str->append('\'');
-}
-
-static void append_role(String *str, LEX_USER *user)
+static void append_user(String *str, LEX_USER *user, bool handle_as_role)
{
if (str->length())
str->append(',');
str->append('\'');
str->append(user->user.str);
+ /* hostname part is not relevant for roles, it is always empty */
+ if (!handle_as_role)
+ {
+ str->append(STRING_WITH_LEN("'@'"));
+ str->append(user->host.str);
+ }
str->append('\'');
}
-
/*
Create a list of users.
@@ -7618,13 +7611,14 @@ static void append_role(String *str, LEX_USER *user)
mysql_create_user()
thd The current thread.
list The users to create.
+ handle_as_role Handle the user list as roles if true
RETURN
FALSE OK.
TRUE Error.
*/
-bool mysql_create_user(THD *thd, List <LEX_USER> &list)
+bool mysql_create_user(THD *thd, List <LEX_USER> &list, bool handle_as_role)
{
int result;
String wrong_users;
@@ -7633,6 +7627,7 @@ bool mysql_create_user(THD *thd, List <LEX_USER> &list)
TABLE_LIST tables[GRANT_TABLES];
bool some_users_created= FALSE;
DBUG_ENTER("mysql_create_user");
+ DBUG_PRINT("entry", ("Handle as %s", handle_as_role ? "role" : "user"));
/* CREATE USER may be skipped on replication client. */
if ((result= open_grant_tables(thd, tables)))
@@ -7643,27 +7638,45 @@ bool mysql_create_user(THD *thd, List <LEX_USER> &list)
while ((tmp_user_name= user_list++))
{
- if (!(user_name= get_current_user(thd, tmp_user_name)))
+ if (handle_as_role)
{
- result= TRUE;
- continue;
+ user_name= tmp_user_name;
+ user_name->host.str= (char *)"";
+ user_name->host.length= 0;
+ /* role already exists */
+ if (find_acl_role(user_name->user.str))
+ {
+ append_user(&wrong_users, user_name, TRUE);
+ result = TRUE;
+ continue;
+ }
+ }
+ else
+ {
+ if (!(user_name= get_current_user(thd, tmp_user_name)))
+ {
+ result= TRUE;
+ continue;
+ }
}
/*
Search all in-memory structures and grant tables
- for a mention of the new user name.
+ for a mention of the new user/role name.
*/
if (handle_grant_data(tables, 0, user_name, NULL))
{
- append_user(&wrong_users, user_name);
+ append_user(&wrong_users, user_name, handle_as_role);
+
result= TRUE;
continue;
}
some_users_created= TRUE;
- if (replace_user_table(thd, tables[0].table, *user_name, 0, 0, 1, 0, 0))
+ if (replace_user_table(thd, tables[0].table, *user_name, 0, 0, 1, 0,
+ handle_as_role))
{
- append_user(&wrong_users, user_name);
+ append_user(&wrong_users, user_name, handle_as_role);
result= TRUE;
}
}
@@ -7671,7 +7684,9 @@ bool mysql_create_user(THD *thd, List <LEX_USER> &list)
mysql_mutex_unlock(&acl_cache->lock);
if (result)
- my_error(ER_CANNOT_USER, MYF(0), "CREATE USER", wrong_users.c_ptr_safe());
+ my_error(ER_CANNOT_USER, MYF(0),
+ (handle_as_role) ? "CREATE ROLE" : "CREATE USER",
+ wrong_users.c_ptr_safe());
if (some_users_created)
result |= write_bin_log(thd, FALSE, thd->query(), thd->query_length());
@@ -7681,70 +7696,6 @@ bool mysql_create_user(THD *thd, List <LEX_USER> &list)
}
/*
- Create a list of roles.
-
- SYNOPSIS
- mysql_create_role()
- thd The current thread.
- list The users to create.
-
- RETURN
- FALSE OK.
- TRUE Error.
-*/
-
-bool mysql_create_role(THD *thd, List <LEX_USER> &list)
-{
- int result;
- String wrong_users;
- LEX_USER *role_name;
- List_iterator <LEX_USER> role_list(list);
- TABLE_LIST tables[GRANT_TABLES];
- bool some_users_created= FALSE;
- DBUG_ENTER("mysql_create_role");
-
- if ((result= open_grant_tables(thd, tables)))
- DBUG_RETURN(result != 1);
-
- mysql_rwlock_wrlock(&LOCK_grant);
- mysql_mutex_lock(&acl_cache->lock);
-
- while ((role_name= role_list++))
- {
- role_name->host.str= (char *)"";
- role_name->host.length= 0;
- /*
- Search all in-memory structures and grant tables
- for a mention of the new user name.
- */
- if (handle_grant_data(tables, 0, role_name, NULL))
- {
- append_role(&wrong_users, role_name);
- result= TRUE;
- continue;
- }
- some_users_created= TRUE;
- if (replace_user_table(thd, tables[0].table, *role_name, 0, 0, 1, 0, 1))
- {
- append_role(&wrong_users, role_name);
- result= TRUE;
- }
- }
-
- mysql_mutex_unlock(&acl_cache->lock);
-
- if (result)
- my_error(ER_CANNOT_USER, MYF(0), "CREATE ROLE", wrong_users.c_ptr_safe());
-
- if (some_users_created)
- result |= write_bin_log(thd, FALSE, thd->query(), thd->query_length());
-
- mysql_rwlock_unlock(&LOCK_grant);
-DBUG_RETURN(result);
-}
-
-
-/*
Drop a list of users and all their privileges.
SYNOPSIS
@@ -7757,7 +7708,7 @@ DBUG_RETURN(result);
TRUE Error.
*/
-bool mysql_drop_user(THD *thd, List <LEX_USER> &list)
+bool mysql_drop_user(THD *thd, List <LEX_USER> &list, bool handle_as_role)
{
int result;
String wrong_users;
@@ -7767,6 +7718,7 @@ bool mysql_drop_user(THD *thd, List <LEX_USER> &list)
bool some_users_deleted= FALSE;
ulonglong old_sql_mode= thd->variables.sql_mode;
DBUG_ENTER("mysql_drop_user");
+ DBUG_PRINT("entry", ("Handle as %s", handle_as_role ? "role" : "user"));
/* DROP USER may be skipped on replication client. */
if ((result= open_grant_tables(thd, tables)))
@@ -7779,93 +7731,54 @@ bool mysql_drop_user(THD *thd, List <LEX_USER> &list)
while ((tmp_user_name= user_list++))
{
- if (!(user_name= get_current_user(thd, tmp_user_name)))
+ if (handle_as_role)
{
- result= TRUE;
- continue;
+
+ user_name= tmp_user_name;
+ user_name->host.str= (char *)"";
+ user_name->host.length= 0;
+ if (!find_acl_role(user_name->user.str))
+ {
+ append_user(&wrong_users, user_name, TRUE);
+ result= TRUE;
+ continue;
+ }
+ }
+ else
+ {
+ if (!(user_name= get_current_user(thd, tmp_user_name)))
+ {
+ result= TRUE;
+ continue;
+ }
}
+
if (handle_grant_data(tables, 1, user_name, NULL) <= 0)
{
- append_user(&wrong_users, user_name);
+ append_user(&wrong_users, user_name, handle_as_role);
result= TRUE;
continue;
}
+
some_users_deleted= TRUE;
}
- /* Rebuild 'acl_check_hosts' since 'acl_users' has been modified */
- rebuild_check_host();
- /* Rebuild every user's role_grants because the acl_user has been modified
- and some grants might now be invalid */
- rebuild_role_grants();
-
- mysql_mutex_unlock(&acl_cache->lock);
-
- if (result)
- my_error(ER_CANNOT_USER, MYF(0), "DROP USER", wrong_users.c_ptr_safe());
-
- if (some_users_deleted)
- result |= write_bin_log(thd, FALSE, thd->query(), thd->query_length());
-
- mysql_rwlock_unlock(&LOCK_grant);
- thd->variables.sql_mode= old_sql_mode;
- DBUG_RETURN(result);
-}
-
-/*
- Drop a list of roles and all their privileges.
-
- SYNOPSIS
- mysql_drop_role()
- thd The current thread.
- list The roles to drop.
-
- RETURN
- FALSE OK.
- TRUE Error.
-*/
-bool mysql_drop_role(THD *thd, List <LEX_USER> &list)
-{
- int result;
- String wrong_users;
- LEX_USER *role_name;
- List_iterator <LEX_USER> user_list(list);
- TABLE_LIST tables[GRANT_TABLES];
- bool some_users_deleted= FALSE;
- ulonglong old_sql_mode= thd->variables.sql_mode;
- DBUG_ENTER("mysql_drop_role");
-
- /* DROP USER may be skipped on replication client. */
- if ((result= open_grant_tables(thd, tables)))
- DBUG_RETURN(result != 1);
-
- thd->variables.sql_mode&= ~MODE_PAD_CHAR_TO_FULL_LENGTH;
-
- mysql_rwlock_wrlock(&LOCK_grant);
- mysql_mutex_lock(&acl_cache->lock);
-
- while ((role_name= user_list++))
+ if (!handle_as_role)
{
- role_name->host.str= (char *)"";
- role_name->host.length= 0;
-
- if (handle_grant_data(tables, 1, role_name, NULL) <= 0)
- {
- append_role(&wrong_users, role_name);
- result= TRUE;
- continue;
- }
- some_users_deleted= TRUE;
+ /* Rebuild 'acl_check_hosts' since 'acl_users' has been modified */
+ rebuild_check_host();
}
- /* Rebuild every user's role_grants because the acl_role has been modified
+ /* Rebuild every user's role_grants because the acl_user has been modified
and some grants might now be invalid */
rebuild_role_grants();
mysql_mutex_unlock(&acl_cache->lock);
if (result)
- my_error(ER_CANNOT_USER, MYF(0), "DROP ROLE", wrong_users.c_ptr_safe());
+ my_error(ER_CANNOT_USER, MYF(0),
+ (handle_as_role) ? "DROP ROLE" : "DROP USER",
+ wrong_users.c_ptr_safe());
if (some_users_deleted)
result |= write_bin_log(thd, FALSE, thd->query(), thd->query_length());
@@ -7930,7 +7843,8 @@ bool mysql_rename_user(THD *thd, List <LEX_USER> &list)
if (handle_grant_data(tables, 0, user_to, NULL) ||
handle_grant_data(tables, 0, user_from, user_to) <= 0)
{
- append_user(&wrong_users, user_from);
+ /* NOTE TODO renaming roles is not yet implemented */
+ append_user(&wrong_users, user_from, FALSE);
result= TRUE;
continue;
}
diff --git a/sql/sql_acl.h b/sql/sql_acl.h
index 20d03211fa1..cace79cb441 100644
--- a/sql/sql_acl.h
+++ b/sql/sql_acl.h
@@ -230,12 +230,10 @@ ulong get_column_grant(THD *thd, GRANT_INFO *grant,
bool mysql_show_grants(THD *thd, LEX_USER *user);
void get_privilege_desc(char *to, uint max_length, ulong access);
void get_mqh(const char *user, const char *host, USER_CONN *uc);
-bool mysql_create_user(THD *thd, List <LEX_USER> &list);
-bool mysql_drop_user(THD *thd, List <LEX_USER> &list);
+bool mysql_create_user(THD *thd, List <LEX_USER> &list, bool handle_as_role);
+bool mysql_drop_user(THD *thd, List <LEX_USER> &list, bool handle_as_role);
bool mysql_rename_user(THD *thd, List <LEX_USER> &list);
bool mysql_revoke_all(THD *thd, List <LEX_USER> &list);
-bool mysql_create_role(THD *thd, List <LEX_USER> &list);
-bool mysql_drop_role(THD *thd, List <LEX_USER> &list);
void fill_effective_table_privileges(THD *thd, GRANT_INFO *grant,
const char *db, const char *table);
bool sp_revoke_privileges(THD *thd, const char *sp_db, const char *sp_name,
diff --git a/sql/sql_parse.cc b/sql/sql_parse.cc
index 266e86e405c..7b24973a6e5 100644
--- a/sql/sql_parse.cc
+++ b/sql/sql_parse.cc
@@ -3728,22 +3728,26 @@ end_with_restore_list:
}
#ifndef NO_EMBEDDED_ACCESS_CHECKS
case SQLCOM_CREATE_USER:
+ case SQLCOM_CREATE_ROLE:
{
if (check_access(thd, INSERT_ACL, "mysql", NULL, NULL, 1, 1) &&
check_global_access(thd,CREATE_USER_ACL))
break;
/* Conditionally writes to binlog */
- if (!(res= mysql_create_user(thd, lex->users_list)))
+ if (!(res= mysql_create_user(thd, lex->users_list,
+ lex->sql_command == SQLCOM_CREATE_ROLE)))
my_ok(thd);
break;
}
case SQLCOM_DROP_USER:
+ case SQLCOM_DROP_ROLE:
{
if (check_access(thd, DELETE_ACL, "mysql", NULL, NULL, 1, 1) &&
check_global_access(thd,CREATE_USER_ACL))
break;
/* Conditionally writes to binlog */
- if (!(res= mysql_drop_user(thd, lex->users_list)))
+ if (!(res= mysql_drop_user(thd, lex->users_list,
+ lex->sql_command == SQLCOM_DROP_ROLE)))
my_ok(thd);
break;
}
@@ -3757,26 +3761,6 @@ end_with_restore_list:
my_ok(thd);
break;
}
- case SQLCOM_CREATE_ROLE:
- {
- if (check_access(thd, INSERT_ACL, "mysql", NULL, NULL, 1, 1) &&
- check_global_access(thd,CREATE_USER_ACL))
- break;
- /* Conditionally writes to binlog */
- if (!(res= mysql_create_role(thd, lex->users_list)))
- my_ok(thd);
- break;
- }
- case SQLCOM_DROP_ROLE:
- {
- if (check_access(thd, DELETE_ACL, "mysql", NULL, NULL, 1, 1) &&
- check_global_access(thd,CREATE_USER_ACL))
- break;
- /* Conditionally writes to binlog */
- if (!(res= mysql_drop_role(thd, lex->users_list)))
- my_ok(thd);
- break;
- }
case SQLCOM_REVOKE_ALL:
{
if (check_access(thd, UPDATE_ACL, "mysql", NULL, NULL, 1, 1) &&