summaryrefslogtreecommitdiff
path: root/sql/sql_acl.cc
diff options
context:
space:
mode:
authorunknown <hf@deer.(none)>2003-11-20 12:55:48 +0400
committerunknown <hf@deer.(none)>2003-11-20 12:55:48 +0400
commit0aa62bc375b8e47f6e32bb35abd69e8d8ed5daea (patch)
treebb9ab3cee7a5a47b48a1959d9ae3451562aedf24 /sql/sql_acl.cc
parent1cd722bb8f8c986bb65760259403b077fe795137 (diff)
downloadmariadb-git-0aa62bc375b8e47f6e32bb35abd69e8d8ed5daea.tar.gz
SCRUM
WL#1284 (warnings about --skip-name-resolve) Now MySQL will issue warnings during startup about entries in grant tables with hostnames that require resolve, and after GRANT commands with that kind of hostnames. include/mysqld_error.h: errno added sql/share/czech/errmsg.txt: error message added sql/share/danish/errmsg.txt: error message added sql/share/dutch/errmsg.txt: error message added sql/share/english/errmsg.txt: error message added sql/share/estonian/errmsg.txt: error message added sql/share/french/errmsg.txt: error message added sql/share/german/errmsg.txt: error message added sql/share/greek/errmsg.txt: error message added sql/share/hungarian/errmsg.txt: error message added sql/share/italian/errmsg.txt: error message added sql/share/japanese/errmsg.txt: error message added sql/share/korean/errmsg.txt: error message added sql/share/norwegian-ny/errmsg.txt: error message added sql/share/norwegian/errmsg.txt: error message added sql/share/polish/errmsg.txt: error message added sql/share/portuguese/errmsg.txt: error message added sql/share/romanian/errmsg.txt: error message added sql/share/russian/errmsg.txt: error message added sql/share/serbian/errmsg.txt: error message added sql/share/slovak/errmsg.txt: error message added sql/share/spanish/errmsg.txt: error message added sql/share/swedish/errmsg.txt: error message added sql/share/ukrainian/errmsg.txt: error message added sql/sql_acl.cc: Checks added to detect entries with symbolic hostnames in grant tables sql/sql_acl.h: interface added sql/sql_parse.cc: Check added to the GRANT command to warn about symbolic hostname & --skip-name-resolve
Diffstat (limited to 'sql/sql_acl.cc')
-rw-r--r--sql/sql_acl.cc66
1 files changed, 64 insertions, 2 deletions
diff --git a/sql/sql_acl.cc b/sql/sql_acl.cc
index b54e6a95bc5..0ce544edda5 100644
--- a/sql/sql_acl.cc
+++ b/sql/sql_acl.cc
@@ -139,6 +139,8 @@ my_bool acl_init(THD *org_thd, bool dont_read_acl_tables)
READ_RECORD read_record_info;
MYSQL_LOCK *lock;
my_bool return_val=1;
+ bool check_no_resolve= specialflag & SPECIAL_NO_RESOLVE;
+
DBUG_ENTER("acl_init");
if (!acl_cache)
@@ -198,6 +200,13 @@ my_bool acl_init(THD *org_thd, bool dont_read_acl_tables)
host.access= get_access(table,2);
host.access= fix_rights_for_db(host.access);
host.sort= get_sort(2,host.host.hostname,host.db);
+ if (check_no_resolve && hostname_requires_resolving(host.host.hostname))
+ {
+ sql_print_error("Error in table 'host' entry '%s|%s'. "
+ "Can't resolve '%s' if --skip-name-resolve active. Skipped",
+ host.host.hostname, host.db, host.host.hostname);
+ continue;
+ }
#ifndef TO_BE_REMOVED
if (table->fields == 8)
{ // Without grant
@@ -259,6 +268,14 @@ my_bool acl_init(THD *org_thd, bool dont_read_acl_tables)
ACL_USER user;
update_hostname(&user.host, get_field(&mem, table->field[0]));
user.user= get_field(&mem, table->field[1]);
+ if (check_no_resolve && hostname_requires_resolving(user.host.hostname))
+ {
+ sql_print_error("Error in table 'user' entry '%s@%s'. "
+ "Can't resolve '%s' if --skip-name-resolve active. Skipped",
+ user.user, user.host.hostname, user.host.hostname);
+ continue;
+ }
+
const char *password= get_field(&mem, table->field[2]);
uint password_len= password ? strlen(password) : 0;
set_user_salt(&user, password, password_len);
@@ -353,6 +370,13 @@ my_bool acl_init(THD *org_thd, bool dont_read_acl_tables)
continue;
}
db.user=get_field(&mem, table->field[2]);
+ if (check_no_resolve && hostname_requires_resolving(db.host.hostname))
+ {
+ sql_print_error("Error in table 'db' entry '%s %s@%s'. "
+ "Can't resolve '%s' if --skip-name-resolve active. Skipped",
+ db.db, db.user, db.host.hostname, db.host.hostname);
+ continue;
+ }
db.access=get_access(table,3);
db.access=fix_rights_for_db(db.access);
db.sort=get_sort(3,db.host.hostname,db.db,db.user);
@@ -1257,6 +1281,25 @@ static bool compare_hostname(const acl_host_and_ip *host, const char *hostname,
(ip && !wild_compare(ip,host->hostname,0)));
}
+bool hostname_requires_resolving(const char *hostname)
+{
+ char cur;
+ if (!hostname)
+ return false;
+ int namelen= strlen(hostname);
+ int lhlen= strlen(my_localhost);
+ if ((namelen == lhlen) &&
+ !my_strnncoll(&my_charset_latin1, (const uchar *)hostname, namelen,
+ (const uchar *)my_localhost, strlen(my_localhost)))
+ return false;
+ for (; (cur=*hostname); hostname++)
+ {
+ if ((cur != '%') && (cur != '_') && (cur != '.') &&
+ ((cur < '0') || (cur > '9')))
+ return true;
+ }
+ return false;
+}
/*
Update grants in the user and database privilege tables
@@ -2444,6 +2487,7 @@ my_bool grant_init(THD *org_thd)
MYSQL_LOCK *lock;
my_bool return_val= 1;
TABLE *t_table, *c_table;
+ bool check_no_resolve= specialflag & SPECIAL_NO_RESOLVE;
DBUG_ENTER("grant_init");
grant_option = FALSE;
@@ -2493,13 +2537,31 @@ my_bool grant_init(THD *org_thd)
do
{
GRANT_TABLE *mem_check;
- if (!(mem_check=new GRANT_TABLE(t_table,c_table)) ||
- mem_check->ok() && my_hash_insert(&column_priv_hash,(byte*) mem_check))
+ if (!(mem_check=new GRANT_TABLE(t_table,c_table)) || mem_check->ok())
{
/* This could only happen if we are out memory */
grant_option= FALSE; /* purecov: deadcode */
goto end_unlock;
}
+
+ if (check_no_resolve)
+ {
+ if (hostname_requires_resolving(mem_check->host))
+ {
+ char buff[MAX_FIELD_WIDTH];
+ sql_print_error("Error in table 'tables_priv' entry '%s %s@%s'. "
+ "Can't resolve '%s' if --skip-name-resolve active. Skipped",
+ mem_check->tname, mem_check->user,
+ mem_check->host, mem_check->host);
+ continue;
+ }
+ }
+
+ if (my_hash_insert(&column_priv_hash,(byte*) mem_check))
+ {
+ grant_option= FALSE;
+ goto end_unlock;
+ }
}
while (!t_table->file->index_next(t_table->record[0]));