os/persistentdata/persistentstorage/sql/SQLite/auth.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
** 2003 January 11
sl@0
     3
**
sl@0
     4
** The author disclaims copyright to this source code.  In place of
sl@0
     5
** a legal notice, here is a blessing:
sl@0
     6
**
sl@0
     7
**    May you do good and not evil.
sl@0
     8
**    May you find forgiveness for yourself and forgive others.
sl@0
     9
**    May you share freely, never taking more than you give.
sl@0
    10
**
sl@0
    11
*************************************************************************
sl@0
    12
** This file contains code used to implement the sqlite3_set_authorizer()
sl@0
    13
** API.  This facility is an optional feature of the library.  Embedded
sl@0
    14
** systems that do not need this facility may omit it by recompiling
sl@0
    15
** the library with -DSQLITE_OMIT_AUTHORIZATION=1
sl@0
    16
**
sl@0
    17
** $Id: auth.c,v 1.29 2007/09/18 15:55:07 drh Exp $
sl@0
    18
*/
sl@0
    19
#include "sqliteInt.h"
sl@0
    20
sl@0
    21
/*
sl@0
    22
** All of the code in this file may be omitted by defining a single
sl@0
    23
** macro.
sl@0
    24
*/
sl@0
    25
#ifndef SQLITE_OMIT_AUTHORIZATION
sl@0
    26
sl@0
    27
/*
sl@0
    28
** Set or clear the access authorization function.
sl@0
    29
**
sl@0
    30
** The access authorization function is be called during the compilation
sl@0
    31
** phase to verify that the user has read and/or write access permission on
sl@0
    32
** various fields of the database.  The first argument to the auth function
sl@0
    33
** is a copy of the 3rd argument to this routine.  The second argument
sl@0
    34
** to the auth function is one of these constants:
sl@0
    35
**
sl@0
    36
**       SQLITE_CREATE_INDEX
sl@0
    37
**       SQLITE_CREATE_TABLE
sl@0
    38
**       SQLITE_CREATE_TEMP_INDEX
sl@0
    39
**       SQLITE_CREATE_TEMP_TABLE
sl@0
    40
**       SQLITE_CREATE_TEMP_TRIGGER
sl@0
    41
**       SQLITE_CREATE_TEMP_VIEW
sl@0
    42
**       SQLITE_CREATE_TRIGGER
sl@0
    43
**       SQLITE_CREATE_VIEW
sl@0
    44
**       SQLITE_DELETE
sl@0
    45
**       SQLITE_DROP_INDEX
sl@0
    46
**       SQLITE_DROP_TABLE
sl@0
    47
**       SQLITE_DROP_TEMP_INDEX
sl@0
    48
**       SQLITE_DROP_TEMP_TABLE
sl@0
    49
**       SQLITE_DROP_TEMP_TRIGGER
sl@0
    50
**       SQLITE_DROP_TEMP_VIEW
sl@0
    51
**       SQLITE_DROP_TRIGGER
sl@0
    52
**       SQLITE_DROP_VIEW
sl@0
    53
**       SQLITE_INSERT
sl@0
    54
**       SQLITE_PRAGMA
sl@0
    55
**       SQLITE_READ
sl@0
    56
**       SQLITE_SELECT
sl@0
    57
**       SQLITE_TRANSACTION
sl@0
    58
**       SQLITE_UPDATE
sl@0
    59
**
sl@0
    60
** The third and fourth arguments to the auth function are the name of
sl@0
    61
** the table and the column that are being accessed.  The auth function
sl@0
    62
** should return either SQLITE_OK, SQLITE_DENY, or SQLITE_IGNORE.  If
sl@0
    63
** SQLITE_OK is returned, it means that access is allowed.  SQLITE_DENY
sl@0
    64
** means that the SQL statement will never-run - the sqlite3_exec() call
sl@0
    65
** will return with an error.  SQLITE_IGNORE means that the SQL statement
sl@0
    66
** should run but attempts to read the specified column will return NULL
sl@0
    67
** and attempts to write the column will be ignored.
sl@0
    68
**
sl@0
    69
** Setting the auth function to NULL disables this hook.  The default
sl@0
    70
** setting of the auth function is NULL.
sl@0
    71
*/
sl@0
    72
int sqlite3_set_authorizer(
sl@0
    73
  sqlite3 *db,
sl@0
    74
  int (*xAuth)(void*,int,const char*,const char*,const char*,const char*),
sl@0
    75
  void *pArg
sl@0
    76
){
sl@0
    77
  sqlite3_mutex_enter(db->mutex);
sl@0
    78
  db->xAuth = xAuth;
sl@0
    79
  db->pAuthArg = pArg;
sl@0
    80
  sqlite3ExpirePreparedStatements(db);
sl@0
    81
  sqlite3_mutex_leave(db->mutex);
sl@0
    82
  return SQLITE_OK;
sl@0
    83
}
sl@0
    84
sl@0
    85
/*
sl@0
    86
** Write an error message into pParse->zErrMsg that explains that the
sl@0
    87
** user-supplied authorization function returned an illegal value.
sl@0
    88
*/
sl@0
    89
static void sqliteAuthBadReturnCode(Parse *pParse, int rc){
sl@0
    90
  sqlite3ErrorMsg(pParse, "illegal return value (%d) from the "
sl@0
    91
    "authorization function - should be SQLITE_OK, SQLITE_IGNORE, "
sl@0
    92
    "or SQLITE_DENY", rc);
sl@0
    93
  pParse->rc = SQLITE_ERROR;
sl@0
    94
}
sl@0
    95
sl@0
    96
/*
sl@0
    97
** The pExpr should be a TK_COLUMN expression.  The table referred to
sl@0
    98
** is in pTabList or else it is the NEW or OLD table of a trigger.  
sl@0
    99
** Check to see if it is OK to read this particular column.
sl@0
   100
**
sl@0
   101
** If the auth function returns SQLITE_IGNORE, change the TK_COLUMN 
sl@0
   102
** instruction into a TK_NULL.  If the auth function returns SQLITE_DENY,
sl@0
   103
** then generate an error.
sl@0
   104
*/
sl@0
   105
void sqlite3AuthRead(
sl@0
   106
  Parse *pParse,        /* The parser context */
sl@0
   107
  Expr *pExpr,          /* The expression to check authorization on */
sl@0
   108
  Schema *pSchema,      /* The schema of the expression */
sl@0
   109
  SrcList *pTabList     /* All table that pExpr might refer to */
sl@0
   110
){
sl@0
   111
  sqlite3 *db = pParse->db;
sl@0
   112
  int rc;
sl@0
   113
  Table *pTab = 0;      /* The table being read */
sl@0
   114
  const char *zCol;     /* Name of the column of the table */
sl@0
   115
  int iSrc;             /* Index in pTabList->a[] of table being read */
sl@0
   116
  const char *zDBase;   /* Name of database being accessed */
sl@0
   117
  TriggerStack *pStack; /* The stack of current triggers */
sl@0
   118
  int iDb;              /* The index of the database the expression refers to */
sl@0
   119
sl@0
   120
  if( db->xAuth==0 ) return;
sl@0
   121
  if( pExpr->op!=TK_COLUMN ) return;
sl@0
   122
  iDb = sqlite3SchemaToIndex(pParse->db, pSchema);
sl@0
   123
  if( iDb<0 ){
sl@0
   124
    /* An attempt to read a column out of a subquery or other
sl@0
   125
    ** temporary table. */
sl@0
   126
    return;
sl@0
   127
  }
sl@0
   128
  for(iSrc=0; pTabList && iSrc<pTabList->nSrc; iSrc++){
sl@0
   129
    if( pExpr->iTable==pTabList->a[iSrc].iCursor ) break;
sl@0
   130
  }
sl@0
   131
  if( iSrc>=0 && pTabList && iSrc<pTabList->nSrc ){
sl@0
   132
    pTab = pTabList->a[iSrc].pTab;
sl@0
   133
  }else if( (pStack = pParse->trigStack)!=0 ){
sl@0
   134
    /* This must be an attempt to read the NEW or OLD pseudo-tables
sl@0
   135
    ** of a trigger.
sl@0
   136
    */
sl@0
   137
    assert( pExpr->iTable==pStack->newIdx || pExpr->iTable==pStack->oldIdx );
sl@0
   138
    pTab = pStack->pTab;
sl@0
   139
  }
sl@0
   140
  if( pTab==0 ) return;
sl@0
   141
  if( pExpr->iColumn>=0 ){
sl@0
   142
    assert( pExpr->iColumn<pTab->nCol );
sl@0
   143
    zCol = pTab->aCol[pExpr->iColumn].zName;
sl@0
   144
  }else if( pTab->iPKey>=0 ){
sl@0
   145
    assert( pTab->iPKey<pTab->nCol );
sl@0
   146
    zCol = pTab->aCol[pTab->iPKey].zName;
sl@0
   147
  }else{
sl@0
   148
    zCol = "ROWID";
sl@0
   149
  }
sl@0
   150
  assert( iDb>=0 && iDb<db->nDb );
sl@0
   151
  zDBase = db->aDb[iDb].zName;
sl@0
   152
  rc = db->xAuth(db->pAuthArg, SQLITE_READ, pTab->zName, zCol, zDBase, 
sl@0
   153
                 pParse->zAuthContext);
sl@0
   154
  if( rc==SQLITE_IGNORE ){
sl@0
   155
    pExpr->op = TK_NULL;
sl@0
   156
  }else if( rc==SQLITE_DENY ){
sl@0
   157
    if( db->nDb>2 || iDb!=0 ){
sl@0
   158
      sqlite3ErrorMsg(pParse, "access to %s.%s.%s is prohibited", 
sl@0
   159
         zDBase, pTab->zName, zCol);
sl@0
   160
    }else{
sl@0
   161
      sqlite3ErrorMsg(pParse, "access to %s.%s is prohibited",pTab->zName,zCol);
sl@0
   162
    }
sl@0
   163
    pParse->rc = SQLITE_AUTH;
sl@0
   164
  }else if( rc!=SQLITE_OK ){
sl@0
   165
    sqliteAuthBadReturnCode(pParse, rc);
sl@0
   166
  }
sl@0
   167
}
sl@0
   168
sl@0
   169
/*
sl@0
   170
** Do an authorization check using the code and arguments given.  Return
sl@0
   171
** either SQLITE_OK (zero) or SQLITE_IGNORE or SQLITE_DENY.  If SQLITE_DENY
sl@0
   172
** is returned, then the error count and error message in pParse are
sl@0
   173
** modified appropriately.
sl@0
   174
*/
sl@0
   175
int sqlite3AuthCheck(
sl@0
   176
  Parse *pParse,
sl@0
   177
  int code,
sl@0
   178
  const char *zArg1,
sl@0
   179
  const char *zArg2,
sl@0
   180
  const char *zArg3
sl@0
   181
){
sl@0
   182
  sqlite3 *db = pParse->db;
sl@0
   183
  int rc;
sl@0
   184
sl@0
   185
  /* Don't do any authorization checks if the database is initialising
sl@0
   186
  ** or if the parser is being invoked from within sqlite3_declare_vtab.
sl@0
   187
  */
sl@0
   188
  if( db->init.busy || IN_DECLARE_VTAB ){
sl@0
   189
    return SQLITE_OK;
sl@0
   190
  }
sl@0
   191
sl@0
   192
  if( db->xAuth==0 ){
sl@0
   193
    return SQLITE_OK;
sl@0
   194
  }
sl@0
   195
  rc = db->xAuth(db->pAuthArg, code, zArg1, zArg2, zArg3, pParse->zAuthContext);
sl@0
   196
  if( rc==SQLITE_DENY ){
sl@0
   197
    sqlite3ErrorMsg(pParse, "not authorized");
sl@0
   198
    pParse->rc = SQLITE_AUTH;
sl@0
   199
  }else if( rc!=SQLITE_OK && rc!=SQLITE_IGNORE ){
sl@0
   200
    rc = SQLITE_DENY;
sl@0
   201
    sqliteAuthBadReturnCode(pParse, rc);
sl@0
   202
  }
sl@0
   203
  return rc;
sl@0
   204
}
sl@0
   205
sl@0
   206
/*
sl@0
   207
** Push an authorization context.  After this routine is called, the
sl@0
   208
** zArg3 argument to authorization callbacks will be zContext until
sl@0
   209
** popped.  Or if pParse==0, this routine is a no-op.
sl@0
   210
*/
sl@0
   211
void sqlite3AuthContextPush(
sl@0
   212
  Parse *pParse,
sl@0
   213
  AuthContext *pContext, 
sl@0
   214
  const char *zContext
sl@0
   215
){
sl@0
   216
  pContext->pParse = pParse;
sl@0
   217
  if( pParse ){
sl@0
   218
    pContext->zAuthContext = pParse->zAuthContext;
sl@0
   219
    pParse->zAuthContext = zContext;
sl@0
   220
  }
sl@0
   221
}
sl@0
   222
sl@0
   223
/*
sl@0
   224
** Pop an authorization context that was previously pushed
sl@0
   225
** by sqlite3AuthContextPush
sl@0
   226
*/
sl@0
   227
void sqlite3AuthContextPop(AuthContext *pContext){
sl@0
   228
  if( pContext->pParse ){
sl@0
   229
    pContext->pParse->zAuthContext = pContext->zAuthContext;
sl@0
   230
    pContext->pParse = 0;
sl@0
   231
  }
sl@0
   232
}
sl@0
   233
sl@0
   234
#endif /* SQLITE_OMIT_AUTHORIZATION */