diff options
author | Robert Haas | 2011-12-21 14:12:43 +0000 |
---|---|---|
committer | Robert Haas | 2011-12-21 14:14:02 +0000 |
commit | e1042a348421bc16f4d4307228a9951e38a984f1 (patch) | |
tree | 4eacfff9c369f9c60d642c99fe9381785f10930f /contrib/sepgsql/database.c | |
parent | 7f0e4bb82e408090c0366c63a9ff4c0f7c4b0a8e (diff) |
sepgsql: Check CREATE permissions for some object types.
KaiGai Kohei, reviewed by Dimitri Fontaine and me.
Diffstat (limited to 'contrib/sepgsql/database.c')
-rw-r--r-- | contrib/sepgsql/database.c | 91 |
1 files changed, 79 insertions, 12 deletions
diff --git a/contrib/sepgsql/database.c b/contrib/sepgsql/database.c index 7f15d9ce715..3faef63a16c 100644 --- a/contrib/sepgsql/database.c +++ b/contrib/sepgsql/database.c @@ -10,33 +10,100 @@ */ #include "postgres.h" +#include "access/genam.h" +#include "access/heapam.h" +#include "access/sysattr.h" #include "catalog/dependency.h" #include "catalog/pg_database.h" +#include "catalog/indexing.h" +#include "commands/dbcommands.h" #include "commands/seclabel.h" +#include "utils/fmgroids.h" +#include "utils/tqual.h" #include "sepgsql.h" +/* + * sepgsql_database_post_create + * + * This routine assigns a default security label on a newly defined + * database, and check permission needed for its creation. + */ void -sepgsql_database_post_create(Oid databaseId) +sepgsql_database_post_create(Oid databaseId, const char *dtemplate) { - char *scontext = sepgsql_get_client_label(); - char *tcontext; - char *ncontext; - ObjectAddress object; + Relation rel; + ScanKeyData skey; + SysScanDesc sscan; + HeapTuple tuple; + char *tcontext; + char *ncontext; + char audit_name[NAMEDATALEN + 20]; + ObjectAddress object; + Form_pg_database datForm; + + /* + * Oid of the source database is not saved in pg_database catalog, + * so we collect its identifier using contextual information. + * If NULL, its default is "template1" according to createdb(). + */ + if (!dtemplate) + dtemplate = "template1"; + + object.classId = DatabaseRelationId; + object.objectId = get_database_oid(dtemplate, false); + object.objectSubId = 0; + + tcontext = sepgsql_get_label(object.classId, + object.objectId, + object.objectSubId); + /* + * check db_database:{getattr} permission + */ + snprintf(audit_name, sizeof(audit_name), "database %s", dtemplate); + sepgsql_avc_check_perms_label(tcontext, + SEPG_CLASS_DB_DATABASE, + SEPG_DB_DATABASE__GETATTR, + audit_name, + true); /* * Compute a default security label of the newly created database * based on a pair of security label of client and source database. * - * XXX - Right now, this logic uses "template1" as its source, because - * here is no way to know the Oid of source database. + * XXX - uncoming version of libselinux supports to take object + * name to handle special treatment on default security label. */ - object.classId = DatabaseRelationId; - object.objectId = TemplateDbOid; - object.objectSubId = 0; - tcontext = GetSecurityLabel(&object, SEPGSQL_LABEL_TAG); + rel = heap_open(DatabaseRelationId, AccessShareLock); + + ScanKeyInit(&skey, + ObjectIdAttributeNumber, + BTEqualStrategyNumber, F_OIDEQ, + ObjectIdGetDatum(databaseId)); + + sscan = systable_beginscan(rel, DatabaseOidIndexId, true, + SnapshotSelf, 1, &skey); + tuple = systable_getnext(sscan); + if (!HeapTupleIsValid(tuple)) + elog(ERROR, "catalog lookup failed for database %u", databaseId); + + datForm = (Form_pg_database) GETSTRUCT(tuple); - ncontext = sepgsql_compute_create(scontext, tcontext, + ncontext = sepgsql_compute_create(sepgsql_get_client_label(), + tcontext, SEPG_CLASS_DB_DATABASE); + /* + * check db_database:{create} permission + */ + snprintf(audit_name, sizeof(audit_name), + "database %s", NameStr(datForm->datname)); + sepgsql_avc_check_perms_label(ncontext, + SEPG_CLASS_DB_DATABASE, + SEPG_DB_DATABASE__CREATE, + audit_name, + true); + + systable_endscan(sscan); + heap_close(rel, AccessShareLock); /* * Assign the default security label on the new database |