diff -cNr -x CVS cvs-pgsql/doc/src/sgml/catalogs.sgml pgsql/doc/src/sgml/catalogs.sgml *** cvs-pgsql/doc/src/sgml/catalogs.sgml Mon Nov 24 09:49:51 2008 --- pgsql/doc/src/sgml/catalogs.sgml Fri Dec 12 10:44:15 2008 *************** *** 134,139 **** --- 134,149 ---- + pg_foreign_data_wrapper + foreign-data wrapper definitions + + + + pg_foreign_server + foreign server definitions + + + pg_index additional index information *************** *** 247,252 **** --- 257,267 ---- pg_type data types + + + pg_user_mapping + mappings of users to foreign servers + *************** *** 2552,2557 **** --- 2567,2795 ---- + + <structname>pg_foreign_data_wrapper</structname> + + + pg_foreign_data_wrapper + + + + The catalog pg_foreign_data_wrapper stores + foreign-data wrapper definitions. A foreign-data wrapper is the + mechanism by which external data, residing on foreign servers, is + accessed. + + + + <structname>pg_foreign_data_wrapper</> Columns + + + + + Name + Type + References + Description + + + + + + fdwname + name + + Name of the foreign-data wrapper + + + + fdwowner + oid + pg_authid.oid + Owner of the foreign-data wrapper + + + + fdwlibrary + text + + The library implementing this foreign-data wrapper + + + + fdwacl + aclitem[] + + + Access privileges; see + and + + for details + + + + + fdwoptions + text[] + + + Foreign-data wrapper specific options, as keyword=value strings + + + + +
+
+ + + + <structname>pg_foreign_server</structname> + + + pg_foreign_server + + + + The catalog pg_foreign_server stores + foreign server definitions. A foreign server describes the + connection to a remote server, managing external data. Foreign + servers are accessed via foreign-data wrappers. + + + + <structname>pg_foreign_server</> Columns + + + + + Name + Type + References + Description + + + + + + srvname + name + + Name of the foreign server + + + + srvowner + oid + pg_authid.oid + Owner of the foreign server + + + + srvfdw + oid + pg_foreign_data_wrapper.oid + The OID of the foreign-data wrapper of this foreign server + + + + srvtype + text + + Type of the server (optional) + + + + srvversion + text + + Version of the server (optional) + + + + srvacl + aclitem[] + + + Access privileges; see + and + + for details + + + + + srvoptions + text[] + + + Foreign server specific options, as keyword=value strings. + + + + +
+
+ + + + <structname>pg_user_mapping</structname> + + + pg_user_mapping + + + + The catalog pg_user_mapping stores + the mappings from local user to remote. Access to this catalog is + restricted from normal users, use the view + pg_user_mappings + instead. + + + + <structname>pg_user_mapping</> Columns + + + + + Name + Type + References + Description + + + + + + umuser + oid + pg_authid.oid + OID of the local role to be mapped, 0 if the user mapping is public + + + + umserver + oid + pg_foreign_server.oid + + The OID of the foreign server that contains this mapping + + + + + umoptions + text[] + + + User mapping specific options, as keyword=value strings. + + + + +
+
+ + <structname>pg_index</structname> *************** *** 6998,7003 **** --- 7236,7314 ---- + + <structname>pg_user_mappings</structname> + + + pg_user_mappings + + + + The view pg_user_mappings provides access + to information about user mappings. This is essentially a publicly + readable view of + pg_user_mapping + that leaves out the options field. + + + + <structname>pg_user_mappings</> Columns + + + + + Name + Type + References + Description + + + + + + umid + oid + pg_user_mapping.oid + OID of the user mapping + + + + srvid + oid + pg_foreign_server.oid + + The OID of the foreign server that contains this mapping + + + + + srvname + text + + + Name of the foreign server + + + + + umuser + oid + pg_authid.oid + OID of the local role to be mapped, 0 if the user mapping is public + + + + usename + name + + Name of the local user to be mapped + + + +
+
+ + <structname>pg_views</structname> diff -cNr -x CVS cvs-pgsql/doc/src/sgml/features.sgml pgsql/doc/src/sgml/features.sgml *** cvs-pgsql/doc/src/sgml/features.sgml Mon Dec 1 10:24:54 2008 --- pgsql/doc/src/sgml/features.sgml Fri Dec 12 10:44:15 2008 *************** *** 71,81 **** ! The PostgreSQL core covers parts 1, 2, 11, and 14. Part 3 is covered by the ODBC driver, and part 13 is covered by the PL/Java plug-in, but exact conformance is currently not being verified for these components. There are currently no ! implementations of parts 4, 9, and 10 for PostgreSQL. --- 71,81 ---- ! The PostgreSQL core covers parts 1, 2, 9, 11, and 14. Part 3 is covered by the ODBC driver, and part 13 is covered by the PL/Java plug-in, but exact conformance is currently not being verified for these components. There are currently no ! implementations of parts 4 and 10 for PostgreSQL. diff -cNr -x CVS cvs-pgsql/doc/src/sgml/func.sgml pgsql/doc/src/sgml/func.sgml *** cvs-pgsql/doc/src/sgml/func.sgml Fri Dec 5 15:06:21 2008 --- pgsql/doc/src/sgml/func.sgml Fri Dec 12 13:41:36 2008 *************** *** 11336,11341 **** --- 11336,11356 ---- does current user have privilege for database + has_foreign_data_wrapper_privilege(user, + fdw, + privilege) + + boolean + does user have privilege for foreign-data wrapper + + + has_foreign_data_wrapper_privilege(fdw, + privilege) + + boolean + does current user have privilege for foreign-data wrapper + + has_function_privilege(user, function, privilege) *************** *** 11381,11386 **** --- 11396,11416 ---- does current user have privilege for schema + has_server_privilege(user, + server, + privilege) + + boolean + does user have privilege for foreign server + + + has_server_privilege(server, + privilege) + + boolean + does current user have privilege for foreign server + + has_table_privilege(user, table, privilege) *************** *** 11436,11447 **** --- 11466,11483 ---- has_function_privilege + has_foreign_data_wrapper_privilege + + has_language_privilege has_schema_privilege + has_server_privilege + + has_table_privilege *************** *** 11479,11484 **** --- 11515,11528 ---- + has_foreign_data_wrapper_privilege checks whether a user + can access a foreign-data wrapper in a particular way. The possibilities for its + arguments are analogous to has_table_privilege. + The desired access privilege type must evaluate to + USAGE. + + + has_language_privilege checks whether a user can access a procedural language in a particular way. The possibilities for its arguments are analogous to has_table_privilege. *************** *** 11496,11501 **** --- 11540,11553 ---- + has_server_privilege checks whether a user + can access a foreign server in a particular way. The possibilities for its + arguments are analogous to has_table_privilege. + The desired access privilege type must evaluate to + USAGE. + + + has_table_privilege checks whether a user can access a table in a particular way. The user can be specified by name or by OID *************** *** 12974,12979 **** --- 13026,13125 ---- at session end, even if the client disconnects ungracefully.) + + The functions shown + in provide + information about connections to foreign databases. + + + + Remote Connection Information Functions + + + + Name + Return Type + Description + + + + + + + pg_get_remote_connection_info(server_name text) + + setof record + Fetch information about connection to remote database + + + + + pg_get_remote_connection_info(server_name text, username text) + + setof record + Fetch information about connection to remote database, use the mapping for specified username + + + + + pg_get_foreign_data_wrapper_options(fdwid oid) + + setof record + Fetch options for foreign-data wrapper + + + + + pg_get_foreign_server_options(srvid oid) + + setof record + Fetch options for foreign server + + + + + pg_get_user_mapping_options(umid oid) + + setof record + Fetch options for user mapping + + + +
+ + + pg_get_remote_connection_infopg_get_remote_connection_info + fetches the connection information for the specified foreign + server. The options are processed through server's foreign-data + wrapper to form a valid connection string. User mapping + information is used to complement the server connection options. + In the two-parameter version, the mapping of the specified user + name is used, otherwise the mapping for current user is used. As + the output may contain information about remote user names and + passwords, users must explicitly be granted access to this + function. + + + + pg_get_foreign_data_wrapper_optionspg_get_foreign_data_wrapper_options + fetches the generic options associated with the foreign-data + wrapper. + + + + pg_get_foreign_server_optionspg_get_foreign_server_options + fetches the generic options associated with the foreign server. + Typically this includes the connection information to the remote + host and database. + + + + pg_get_user_mapping_optionspg_get_user_mapping_options + fetches the generic options associated with the user mapping. + Typically this includes the user name and password of the remote + user. The calling user must be the owner of the server of the + mapping, otherwise an empty set is returned. +
diff -cNr -x CVS cvs-pgsql/doc/src/sgml/keywords.sgml pgsql/doc/src/sgml/keywords.sgml *** cvs-pgsql/doc/src/sgml/keywords.sgml Fri Dec 5 15:06:21 2008 --- pgsql/doc/src/sgml/keywords.sgml Fri Dec 12 10:44:15 2008 *************** *** 2688,2693 **** --- 2688,2701 ---- reserved + LIBRARY + non-reserved + non-reserved + non-reserved + + + + LIKE reserved (can be function or type) reserved *************** *** 2818,2825 **** MAPPING non-reserved ! ! --- 2826,2833 ---- MAPPING non-reserved ! non-reserved ! non-reserved *************** *** 3441,3447 **** OPTIONS ! non-reserved non-reserved non-reserved --- 3449,3455 ---- OPTIONS ! non-reserved non-reserved non-reserved non-reserved *************** *** 4456,4461 **** --- 4464,4477 ---- non-reserved + SERVER + non-reserved + non-reserved + non-reserved + + + + SERVER_NAME non-reserved *************** *** 5584,5589 **** --- 5600,5613 ---- reserved + WRAPPER + non-reserved + non-reserved + non-reserved + + + + WRITE non-reserved non-reserved diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/allfiles.sgml pgsql/doc/src/sgml/ref/allfiles.sgml *** cvs-pgsql/doc/src/sgml/ref/allfiles.sgml Thu Mar 27 19:24:16 2008 --- pgsql/doc/src/sgml/ref/allfiles.sgml Fri Dec 12 10:44:15 2008 *************** *** 10,15 **** --- 10,16 ---- + *************** *** 19,24 **** --- 20,26 ---- + *************** *** 29,34 **** --- 31,37 ---- + *************** *** 45,50 **** --- 48,54 ---- + *************** *** 56,61 **** --- 60,66 ---- + *************** *** 66,71 **** --- 71,77 ---- + *************** *** 76,81 **** --- 82,88 ---- + *************** *** 88,93 **** --- 95,101 ---- + *************** *** 97,102 **** --- 105,111 ---- + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/alter_foreign_data_wrapper.sgml pgsql/doc/src/sgml/ref/alter_foreign_data_wrapper.sgml *** cvs-pgsql/doc/src/sgml/ref/alter_foreign_data_wrapper.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/alter_foreign_data_wrapper.sgml Mon Dec 15 14:16:03 2008 *************** *** 0 **** --- 1,132 ---- + + + + + ALTER FOREIGN DATA WRAPPER + SQL - Language Statements + + + + ALTER FOREIGN DATA WRAPPER + change the definition of a foreign-data wrapper + + + + ALTER FOREIGN DATA WRAPPER + + + + + ALTER FOREIGN DATA WRAPPER name + LIBRARY 'libraryname' + [ OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ]) ] + ALTER FOREIGN DATA WRAPPER name OWNER TO new_owner + + + + + Description + + + ALTER FOREIGN DATA WRAPPER changes the + definition of a foreign-data wrapper. The first form of the + command changes the library or the generic options of the + foreign-data wrapper. The second form changes the owner of the + foreign-data wrapper. + + + + Only superusers can alter foreign-data wrappers. Additionally, + only superusers can own foreign-data wrappers. + + + + + Parameters + + + + name + + + The name of an existing foreign-data wrapper. + + + + + + libraryname + + + New name of the foreign-data wrapper library. + + + + Note that it is possible that after changing the library, the + options to the foreign-data wrapper, servers, and user mappings + have become invalid. It is up to the user to make sure that + these options are correct before using the foreign-data + wrapper. + + + + + + OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ] ) + + + Change options for the foreign-data + wrapper. ADD, SET, and DROP + specify the action to be performed. ADD is assumed + if no operation is explicitly specified. Option names must be + unique; names and values are also validated using the foreign + data wrapper library. + + + + + + + + Examples + + + Change a foreign-data wrapper dbi, add + option foo, drop bar: + + ALTER FOREIGN DATA WRAPPER dbi OPTIONS (ADD foo '1', DROP 'bar'); + + + + + Change the foreign-data wrapper dbi library + to /home/bob/mylibrary.so: + + ALTER FOREIGN DATA WRAPPER dbi LIBRARY '/home/bob/mylibrary.so'; + + + + + + Compatibility + + + ALTER FOREIGN DATA WRAPPER conforms to ISO/IEC + 9075-9 (SQL/MED). The standard does not specify the OWNER + TO variant of the command. + + + + + See Also + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/alter_server.sgml pgsql/doc/src/sgml/ref/alter_server.sgml *** cvs-pgsql/doc/src/sgml/ref/alter_server.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/alter_server.sgml Fri Dec 12 10:44:15 2008 *************** *** 0 **** --- 1,123 ---- + + + + + ALTER SERVER + SQL - Language Statements + + + + ALTER SERVER + change the definition of a foreign server + + + + ALTER SERVER + + + + + ALTER SERVER servername [ VERSION 'newversion' ] + [ OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ] ) ] + ALTER SERVER servername OWNER TO new_owner + + + + + Description + + + ALTER SERVER changes the definition of a foreign + server. The first form changes the server version string or the + generic options of the server. The second form changes the owner + of the server. + + + + To alter the server you must be the owner of the server. + Additionally to alter the owner, you must own the server and also + be a direct or indirect member of the new owning role, and you must + have USAGE privilege on the server's foreign-data + wrapper. (Note that superusers satisfy all these criteria + automatically.) + + + + + Parameters + + + + servername + + + The name of an existing server. + + + + + + serverversion + + + New server version. + + + + + + OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ] ) + + + Change options for the + server. ADD, SET, and DROP + specify the action to be performed. ADD is assumed + if no operation is explicitly specified. Option names must be + unique; names and values are also validated using the server's + foreign-data wrapper library. + + + + + + + + Examples + + + Alter server foo, add connection options: + + ALTER SERVER foo OPTIONS (host 'foo', dbname 'foodb'); + + + + + Alter server foo, change version, + change host option: + + ALTER SERVER foo VERSION '8.4' OPTIONS (SET host 'baz'); + + + + + + Compatibility + + + ALTER SERVER conforms to ISO/IEC 9075-9 (SQL/MED). + + + + + See Also + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/alter_user_mapping.sgml pgsql/doc/src/sgml/ref/alter_user_mapping.sgml *** cvs-pgsql/doc/src/sgml/ref/alter_user_mapping.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/alter_user_mapping.sgml Fri Dec 12 11:53:02 2008 *************** *** 0 **** --- 1,119 ---- + + + + + ALTER USER MAPPING + SQL - Language Statements + + + + ALTER USER MAPPING + change the definition of a user mapping + + + + ALTER USER MAPPING + + + + + ALTER USER MAPPING FOR { username | USER | CURRENT_USER | PUBLIC } + SERVER servername + OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ] ) + + + + + Description + + + ALTER USER MAPPING changes the definition of a + user mapping. Only the owner of the server can change the user + mappings of that server. + + + + + + Parameters + + + + username + + + User name of the mapping. CURRENT_USER + and USER match the name of the current + user. PUBLIC is used to match all present and future + user names in the system. + + + + + + servername + + + Server name of the user mapping. + + + + + + OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ] ) + + + Change options for the user mapping. The new options override + any previously specified + options. ADD, SET, and DROP + specify the action to be performed. ADD is assumed + if no operation is explicitly specified. Option names must be + unique; options are also validated by the server's foreign-data + wrapper. + + + + + + + + Examples + + + Change the password for user mapping bob, server foo: + + ALTER USER MAPPING FOR bob SERVER foo OPTIONS (user 'bob', password 'public'); + + + + + + + Compatibility + + + ALTER USER MAPPING conforms to ISO/IEC 9075-9 + (SQL/MED). There is a subtle syntax issue: The standard omits + the FOR key word. Since both CREATE + USER MAPPING and DROP USER MAPPING use + FOR in analogous positions, and IBM DB2 (being + the other major SQL/MED implementation) also requires it + for ALTER USER MAPPING, PostgreSQL diverges from + the standard here in the interest of consistency and + interoperability. + + + + + See Also + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/create_foreign_data_wrapper.sgml pgsql/doc/src/sgml/ref/create_foreign_data_wrapper.sgml *** cvs-pgsql/doc/src/sgml/ref/create_foreign_data_wrapper.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/create_foreign_data_wrapper.sgml Mon Dec 15 14:16:02 2008 *************** *** 0 **** --- 1,155 ---- + + + + + CREATE FOREIGN DATA WRAPPER + SQL - Language Statements + + + + CREATE FOREIGN DATA WRAPPER + define a new foreign-data wrapper + + + + CREATE FOREIGN DATA WRAPPER + + + + + CREATE FOREIGN DATA WRAPPER name + LIBRARY 'libraryname' + LANGUAGE C + [ OPTIONS ( option 'value' [, ... ] ) ] + + + + + Description + + + CREATE FOREIGN DATA WRAPPER creates a new + foreign-data wrapper. The user who defines a foreign-data wrapper + becomes its owner. + + + + The foreign-data wrapper name must be unique within the database. + + + + Only superusers can create foreign-data wrappers. + + + + + Parameters + + + + name + + + The name of the foreign-data wrapper to be created. + + + + + + libraryname + + + The name of the shared library implementing the foreign-data wrapper. + + + + + + LANGUAGE C + + + Currently, only the C programming language is supported for + implementing foreign-data wrappers. + + + + + + OPTIONS ( option ['value'] [, ... ] ) + + + This clause specifies options for the new foreign-data wrapper. + The allowed option names and values are specific to each foreign + data wrapper and are validated using the foreign-data wrapper + library. Option names must be unique. + + + + + + + + Notes + + + The C language API for foreign-data wrappers is currently not + documented, stable, or complete. Would-be authors of functionality + interfacing with the SQL/MED functionality are advised to contact + the PostgreSQL developers. + + + + + Examples + + + Create a foreign-data wrapper dbi with + library dummy_fdw: + + CREATE FOREIGN DATA WRAPPER dbi LIBRARY 'dummy_fdw' LANGUAGE C; + + + + + Create a foreign-data wrapper mywrapper with library + /home/bob/mywrapper.so and some options: + + CREATE FOREIGN DATA WRAPPER mywrapper + LIBRARY '/home/bob/mywrapper.so' + LANGUAGE C + OPTIONS (debug 'true'); + + + + + + Compatibility + + + CREATE FOREIGN DATA WRAPPER conforms to ISO/IEC + 9075-9 (SQL/MED), with the exception that + the LIBRARY clause is not optional in + PostgreSQL. + + + + Note, however, that the SQL/MED functionality as a whole is not yet + conforming. + + + + + See Also + + + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/create_server.sgml pgsql/doc/src/sgml/ref/create_server.sgml *** cvs-pgsql/doc/src/sgml/ref/create_server.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/create_server.sgml Fri Dec 12 10:44:15 2008 *************** *** 0 **** --- 1,140 ---- + + + + + CREATE SERVER + SQL - Language Statements + + + + CREATE SERVER + define a new foreign server + + + + CREATE SERVER + + + + + CREATE SERVER servername [ TYPE 'servertype' ] [ VERSION 'serverversion' ] + FOREIGN DATA WRAPPER fdwname + [ OPTIONS ( option 'value' [, ... ] ) ] + + + + + Description + + + CREATE SERVER defines a new foreign server. The + user who defines the server becomes its owner. + + + + The server name must be unique within database. + + + + Creating a server requires USAGE privilege on the + foreign-data wrapper being used. + + + + + Parameters + + + + servername + + + The name of the foreign server to be created. + + + + + + servertype + + + Optional server type. + + + + + + serverversion + + + Optional server version. + + + + + + fdwname + + + The name of the foreign-data wrapper that manages the server. + + + + + + OPTIONS ( option ['value'] [, ... ] ) + + + This clause specifies the options for the server. The options + typically define the connection details of the server, but the + actual names and values are dependent on the server's + foreign-data wrapper. + + + + + + + + Examples + + + Create a server foo that uses the built-in foreign-data + wrapper default: + + CREATE SERVER foo FOREIGN DATA WRAPPER "default"; + + + + + Create a server myserver that uses the + foreign-data wrapper pgsql: + + CREATE SERVER myserver FOREIGN DATA WRAPPER pgsql OPTIONS (host 'foo', dbname 'foodb', port '5432'); + + + + + + Compatibility + + + CREATE SERVER conforms to ISO/IEC 9075-9 (SQL/MED). + + + + + See Also + + + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/create_user_mapping.sgml pgsql/doc/src/sgml/ref/create_user_mapping.sgml *** cvs-pgsql/doc/src/sgml/ref/create_user_mapping.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/create_user_mapping.sgml Mon Dec 15 14:16:02 2008 *************** *** 0 **** --- 1,111 ---- + + + + + CREATE USER MAPPING + SQL - Language Statements + + + + CREATE USER MAPPING + define a new mapping of a user to a foreign server + + + + CREATE USER MAPPING + + + + + CREATE USER MAPPING FOR { username | USER | CURRENT_USER | PUBLIC } + SERVER servername + [ OPTIONS ( option 'value' [ , ... ] ) ] + + + + + Description + + + CREATE USER MAPPING defines a mapping of a user + to a foreign server. You must be the owner of the server to define + user mappings for it. + + + + + + Parameters + + + + username + + + The name of an existing user that is mapped to foreign server. + CURRENT_USER and USER match the name of + the current user. PUBLIC is used to match all + present and future user names in the system. + + + + + + servername + + + The name of an existing server for which the user mapping is + to be created. + + + + + + OPTIONS ( option ['value'] [, ... ] ) + + + This clause specifies the options of the user mapping. The + options typically define the actual user name and password of + the mapping. Option names must be unque. The allowed option + names and values are specific to the server's foreign-data wrapper. + + + + + + + + Examples + + + Create a user mapping for user bob, server foo: + + CREATE USER MAPPING FOR bob SERVER foo OPTIONS (user 'bob', password 'secret'); + + + + + + + Compatibility + + + CREATE USER MAPPING conforms to ISO/IEC 9075-9 (SQL/MED). + + + + + See Also + + + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/drop_foreign_data_wrapper.sgml pgsql/doc/src/sgml/ref/drop_foreign_data_wrapper.sgml *** cvs-pgsql/doc/src/sgml/ref/drop_foreign_data_wrapper.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/drop_foreign_data_wrapper.sgml Mon Dec 15 14:16:01 2008 *************** *** 0 **** --- 1,112 ---- + + + + + DROP FOREIGN DATA WRAPPER + SQL - Language Statements + + + + DROP FOREIGN DATA WRAPPER + remove a foreign-data wrapper + + + + DROP FOREIGN DATA WRAPPER + + + + + DROP FOREIGN DATA WRAPPER [ IF EXISTS ] name [ CASCADE | RESTRICT ] + + + + + Description + + + DROP FOREIGN DATA WRAPPER removes an existing + foreign-data wrapper. To execute this command, the current user + must be the owner of the foreign-data wrapper. + + + + + Parameters + + + + IF EXISTS + + + Do not throw an error if the foreign-data wrapper does not + exist. A notice is issued in this case. + + + + + + name + + + The name of an existing foreign-data wrapper. + + + + + + CASCADE + + + Automatically drop objects that depend on the foreign-data + wrapper (such as servers). + + + + + + RESTRICT + + + Refuse to drop the foreign-data wrappers if any objects depend + on it. This is the default. + + + + + + + + Examples + + + Drop the foreign-data wrapper dbi: + + DROP FOREIGN DATA WRAPPER dbi; + + + + + + Compatibility + + + DROP FOREIGN DATA WRAPPER conforms to ISO/IEC + 9075-9 (SQL/MED). The IF EXISTS clause is + a PostgreSQL extension. + + + + + See Also + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/drop_server.sgml pgsql/doc/src/sgml/ref/drop_server.sgml *** cvs-pgsql/doc/src/sgml/ref/drop_server.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/drop_server.sgml Mon Dec 15 14:16:01 2008 *************** *** 0 **** --- 1,112 ---- + + + + + DROP SERVER + SQL - Language Statements + + + + DROP SERVER + remove a foreign server descriptor + + + + DROP SERVER + + + + + DROP SERVER [ IF EXISTS ] servername [ CASCADE | RESTRICT ] + + + + + Description + + + DROP SERVER removes an existing foreign server + descriptor. To execute this command, the current user must be the + owner of the server. + + + + + Parameters + + + + IF EXISTS + + + Do not throw an error if the server does not exist. A notice is + issued in this case. + + + + + + servername + + + The name of an existing server. + + + + + + CASCADE + + + Automatically drop objects that depend on the server (such as + user mappings). + + + + + + RESTRICT + + + Refuse to drop the server if any objects depend on it. This is + the default. + + + + + + + + Examples + + + Drop a server foo if it exists: + + DROP SERVER IF EXISTS foo; + + + + + + Compatibility + + + DROP SERVER conforms to ISO/IEC 9075-9 + (SQL/MED). The IF EXISTS clause is + a PostgreSQL extension. + + + + + See Also + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/drop_user_mapping.sgml pgsql/doc/src/sgml/ref/drop_user_mapping.sgml *** cvs-pgsql/doc/src/sgml/ref/drop_user_mapping.sgml Thu Jan 1 02:00:00 1970 --- pgsql/doc/src/sgml/ref/drop_user_mapping.sgml Fri Dec 12 10:44:15 2008 *************** *** 0 **** --- 1,104 ---- + + + + + DROP USER MAPPING + SQL - Language Statements + + + + DROP USER MAPPING + remove a user mapping for a foreign server + + + + DROP USER MAPPING + + + + + DROP USER MAPPING [ IF EXISTS ] FOR { username | USER | CURRENT_USER | PUBLIC } SERVER servername + + + + + Description + + + DROP USER MAPPING removes an existing user + mapping from foreign server. To execute this command, the current + user must be the owner of the server containing the mapping. + + + + + Parameters + + + + IF EXISTS + + + Do not throw an error if the user mapping does not exist. A + notice is issued in this case. + + + + + + username + + + User name of the mapping. CURRENT_USER + and USER match the name of the current + user. PUBLIC is used to match all present and + future user names in the system. + + + + + + servername + + + Server name of the user mapping. + + + + + + + + Examples + + + Drop a user mapping bob, server foo if it exists: + + DROP USER MAPPING IF EXISTS FOR bob SERVER foo; + + + + + + Compatibility + + + DROP USER MAPPING conforms to ISO/IEC 9075-9 + (SQL/MED). The IF EXISTS clause is + a PostgreSQL extension. + + + + + See Also + + + + + + + + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/grant.sgml pgsql/doc/src/sgml/ref/grant.sgml *** cvs-pgsql/doc/src/sgml/ref/grant.sgml Mon Nov 17 16:34:26 2008 --- pgsql/doc/src/sgml/ref/grant.sgml Fri Dec 12 10:44:15 2008 *************** *** 35,40 **** --- 35,48 ---- ON DATABASE dbname [, ...] TO { [ GROUP ] rolename | PUBLIC } [, ...] [ WITH GRANT OPTION ] + GRANT { USAGE | ALL [ PRIVILEGES ] } + ON FOREIGN DATA WRAPPER fdwname [, ...] + TO { [ GROUP ] rolename | PUBLIC } [, ...] [ WITH GRANT OPTION ] + + GRANT { USAGE | ALL [ PRIVILEGES ] } + ON FOREIGN SERVER servername [, ...] + TO { [ GROUP ] rolename | PUBLIC } [, ...] [ WITH GRANT OPTION ] + GRANT { EXECUTE | ALL [ PRIVILEGES ] } ON FUNCTION funcname ( [ [ argmode ] [ argname ] argtype [, ...] ] ) [, ...] TO { [ GROUP ] rolename | PUBLIC } [, ...] [ WITH GRANT OPTION ] *************** *** 61,70 **** The GRANT command has two basic variants: one that grants privileges on a database object (table, view, sequence, ! database, function, procedural language, schema, or tablespace), ! and one that grants membership in a role. These variants are ! similar in many ways, but they are different enough to be described ! separately. --- 69,78 ---- The GRANT command has two basic variants: one that grants privileges on a database object (table, view, sequence, ! database, foreign-data wrapper, foreign server, function, ! procedural language, schema, or tablespace), and one that grants ! membership in a role. These variants are similar in many ways, but ! they are different enough to be described separately. *************** *** 299,304 **** --- 307,320 ---- For sequences, this privilege allows the use of the currval and nextval functions. + + For foreign-data wrappers, this privilege enables the grantee + to create new servers using that foreign-data wrapper. + + + For servers, this privilege enables the grantee look up + connection information for the server. + diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/psql-ref.sgml pgsql/doc/src/sgml/ref/psql-ref.sgml *** cvs-pgsql/doc/src/sgml/ref/psql-ref.sgml Fri Dec 5 15:06:21 2008 --- pgsql/doc/src/sgml/ref/psql-ref.sgml Mon Dec 15 11:00:54 2008 *************** *** 947,952 **** --- 947,1010 ---- + \des [ pattern ] + \des+ [ pattern ] + + + Lists all foreign servers (mnemonic: external + servers). + If pattern is + specified, only those servers whose name matches the pattern + are listed. If the form \des+ is used, a + full desription of each server is shown, including the + server's ACL, type, version, and connection options. + + + + + + + \deu [ pattern ] + \deu+ [ pattern ] + + + Lists all user mappings (mnemonic: external + users). + If pattern is + specified, only those mappings whose user names match the + pattern are listed. If the form \deu+ is + used, additional information about each mapping is shown. + + + + + \deu+ might also display the user name and + password of the remote user, so care should be taken not to + disclose them. + + + + + + + + \dew [ pattern ] + \dew+ [ pattern ] + + + Lists all foreign-data wrappers (mnemonic: external + wrappers). + If pattern is + specified, only those foreign-data wrappers whose name matches + the pattern are listed. If the form \dew+ + is used, also the ACL and options to the foreign-data wrapper + are shown. + + + + + + \df [ pattern ] \df+ [ pattern ] diff -cNr -x CVS cvs-pgsql/doc/src/sgml/ref/revoke.sgml pgsql/doc/src/sgml/ref/revoke.sgml *** cvs-pgsql/doc/src/sgml/ref/revoke.sgml Mon Nov 17 16:34:26 2008 --- pgsql/doc/src/sgml/ref/revoke.sgml Fri Dec 12 10:44:15 2008 *************** *** 42,47 **** --- 42,59 ---- [ CASCADE | RESTRICT ] REVOKE [ GRANT OPTION FOR ] + { USAGE | ALL [ PRIVILEGES ] } + ON FOREIGN DATA WRAPPER fdwname [, ...] + FROM { [ GROUP ] rolename | PUBLIC } [, ...] + [ CASCADE | RESTRICT ] + + REVOKE [ GRANT OPTION FOR ] + { USAGE | ALL [ PRIVILEGES ] } + ON FOREIGN SERVER servername [, ...] + FROM { [ GROUP ] rolename | PUBLIC } [, ...] + [ CASCADE | RESTRICT ] + + REVOKE [ GRANT OPTION FOR ] { EXECUTE | ALL [ PRIVILEGES ] } ON FUNCTION funcname ( [ [ argmode ] [ argname ] argtype [, ...] ] ) [, ...] FROM { [ GROUP ] rolename | PUBLIC } [, ...] diff -cNr -x CVS cvs-pgsql/doc/src/sgml/reference.sgml pgsql/doc/src/sgml/reference.sgml *** cvs-pgsql/doc/src/sgml/reference.sgml Thu Mar 27 19:24:16 2008 --- pgsql/doc/src/sgml/reference.sgml Fri Dec 12 10:44:15 2008 *************** *** 38,43 **** --- 38,44 ---- &alterConversion; &alterDatabase; &alterDomain; + &alterForeignDataWrapper; &alterFunction; &alterGroup; &alterIndex; *************** *** 48,53 **** --- 49,55 ---- &alterRole; &alterSchema; &alterSequence; + &alterServer; &alterTable; &alterTableSpace; &alterTSConfig; *************** *** 57,62 **** --- 59,65 ---- &alterTrigger; &alterType; &alterUser; + &alterUserMapping; &alterView; &analyze; &begin; *************** *** 73,78 **** --- 76,82 ---- &createConversion; &createDatabase; &createDomain; + &createForeignDataWrapper; &createFunction; &createGroup; &createIndex; *************** *** 84,89 **** --- 88,94 ---- &createRule; &createSchema; &createSequence; + &createServer; &createTable; &createTableAs; &createTableSpace; *************** *** 94,99 **** --- 99,105 ---- &createTrigger; &createType; &createUser; + &createUserMapping; &createView; &deallocate; &declare; *************** *** 104,109 **** --- 110,116 ---- &dropConversion; &dropDatabase; &dropDomain; + &dropForeignDataWrapper; &dropFunction; &dropGroup; &dropIndex; *************** *** 116,121 **** --- 123,129 ---- &dropRule; &dropSchema; &dropSequence; + &dropServer; &dropTable; &dropTableSpace; &dropTSConfig; *************** *** 125,130 **** --- 133,139 ---- &dropTrigger; &dropType; &dropUser; + &dropUserMapping; &dropView; &end; &execute; diff -cNr -x CVS cvs-pgsql/src/Makefile pgsql/src/Makefile *** cvs-pgsql/src/Makefile Tue Mar 18 18:24:50 2008 --- pgsql/src/Makefile Mon Dec 15 12:39:14 2008 *************** *** 19,24 **** --- 19,25 ---- $(MAKE) -C backend $@ $(MAKE) -C backend/utils/mb/conversion_procs $@ $(MAKE) -C backend/snowball $@ + $(MAKE) -C backend/foreign $@-fdw $(MAKE) -C include $@ $(MAKE) -C interfaces $@ $(MAKE) -C bin $@ diff -cNr -x CVS cvs-pgsql/src/backend/Makefile pgsql/src/backend/Makefile *** cvs-pgsql/src/backend/Makefile Fri Aug 29 20:35:25 2008 --- pgsql/src/backend/Makefile Fri Dec 12 10:44:15 2008 *************** *** 14,20 **** top_builddir = ../.. include $(top_builddir)/src/Makefile.global ! SUBDIRS = access bootstrap catalog parser commands executor lib libpq \ main nodes optimizer port postmaster regex rewrite \ storage tcop tsearch utils $(top_builddir)/src/timezone --- 14,20 ---- top_builddir = ../.. include $(top_builddir)/src/Makefile.global ! SUBDIRS = access bootstrap catalog parser commands executor foreign lib libpq \ main nodes optimizer port postmaster regex rewrite \ storage tcop tsearch utils $(top_builddir)/src/timezone diff -cNr -x CVS cvs-pgsql/src/backend/catalog/Makefile pgsql/src/backend/catalog/Makefile *** cvs-pgsql/src/backend/catalog/Makefile Thu Nov 20 10:21:55 2008 --- pgsql/src/backend/catalog/Makefile Fri Dec 12 10:44:15 2008 *************** *** 36,41 **** --- 36,42 ---- pg_authid.h pg_auth_members.h pg_shdepend.h pg_shdescription.h \ pg_ts_config.h pg_ts_config_map.h pg_ts_dict.h \ pg_ts_parser.h pg_ts_template.h \ + pg_foreign_data_wrapper.h pg_foreign_server.h pg_user_mapping.h \ toasting.h indexing.h \ ) diff -cNr -x CVS cvs-pgsql/src/backend/catalog/aclchk.c pgsql/src/backend/catalog/aclchk.c *** cvs-pgsql/src/backend/catalog/aclchk.c Mon Nov 3 16:31:20 2008 --- pgsql/src/backend/catalog/aclchk.c Mon Dec 15 14:16:01 2008 *************** *** 27,32 **** --- 27,34 ---- #include "catalog/pg_authid.h" #include "catalog/pg_conversion.h" #include "catalog/pg_database.h" + #include "catalog/pg_foreign_data_wrapper.h" + #include "catalog/pg_foreign_server.h" #include "catalog/pg_language.h" #include "catalog/pg_namespace.h" #include "catalog/pg_opclass.h" *************** *** 38,43 **** --- 40,46 ---- #include "catalog/pg_ts_config.h" #include "catalog/pg_ts_dict.h" #include "commands/dbcommands.h" + #include "foreign/foreign.h" #include "miscadmin.h" #include "parser/parse_func.h" #include "utils/acl.h" *************** *** 50,55 **** --- 53,60 ---- static void ExecGrant_Relation(InternalGrant *grantStmt); static void ExecGrant_Database(InternalGrant *grantStmt); + static void ExecGrant_Fdw(InternalGrant *grantStmt); + static void ExecGrant_ForeignServer(InternalGrant *grantStmt); static void ExecGrant_Function(InternalGrant *grantStmt); static void ExecGrant_Language(InternalGrant *grantStmt); static void ExecGrant_Namespace(InternalGrant *grantStmt); *************** *** 188,193 **** --- 193,204 ---- case ACL_KIND_TABLESPACE: whole_mask = ACL_ALL_RIGHTS_TABLESPACE; break; + case ACL_KIND_FDW: + whole_mask = ACL_ALL_RIGHTS_FDW; + break; + case ACL_KIND_FOREIGN_SERVER: + whole_mask = ACL_ALL_RIGHTS_FOREIGN_SERVER; + break; default: elog(ERROR, "unrecognized object kind: %d", objkind); /* not reached, but keep compiler quiet */ *************** *** 323,328 **** --- 334,347 ---- all_privileges = ACL_ALL_RIGHTS_TABLESPACE; errormsg = gettext_noop("invalid privilege type %s for tablespace"); break; + case ACL_OBJECT_FDW: + all_privileges = ACL_ALL_RIGHTS_FDW; + errormsg = gettext_noop("invalid privilege type %s for foreign-data wrapper"); + break; + case ACL_OBJECT_FOREIGN_SERVER: + all_privileges = ACL_ALL_RIGHTS_FOREIGN_SERVER; + errormsg = gettext_noop("invalid privilege type %s for foreign server"); + break; default: /* keep compiler quiet */ all_privileges = ACL_NO_RIGHTS; *************** *** 380,385 **** --- 399,410 ---- case ACL_OBJECT_DATABASE: ExecGrant_Database(istmt); break; + case ACL_OBJECT_FDW: + ExecGrant_Fdw(istmt); + break; + case ACL_OBJECT_FOREIGN_SERVER: + ExecGrant_ForeignServer(istmt); + break; case ACL_OBJECT_FUNCTION: ExecGrant_Function(istmt); break; *************** *** 520,525 **** --- 545,568 ---- heap_close(relation, AccessShareLock); } break; + case ACL_OBJECT_FDW: + foreach(cell, objnames) + { + char *fdwname = strVal(lfirst(cell)); + Oid fdwid = GetForeignDataWrapperOidByName(fdwname, false); + + objects = lappend_oid(objects, fdwid); + } + break; + case ACL_OBJECT_FOREIGN_SERVER: + foreach(cell, objnames) + { + char *srvname = strVal(lfirst(cell)); + Oid srvid = GetForeignServerOidByName(srvname, false); + + objects = lappend_oid(objects, srvid); + } + break; default: elog(ERROR, "unrecognized GrantStmt.objtype: %d", (int) objtype); *************** *** 841,846 **** --- 884,1122 ---- } static void + ExecGrant_Fdw(InternalGrant *istmt) + { + Relation relation; + ListCell *cell; + + if (istmt->all_privs && istmt->privileges == ACL_NO_RIGHTS) + istmt->privileges = ACL_ALL_RIGHTS_FDW; + + relation = heap_open(ForeignDataWrapperRelationId, RowExclusiveLock); + + foreach(cell, istmt->objects) + { + Oid fdwid = lfirst_oid(cell); + Form_pg_foreign_data_wrapper pg_fdw_tuple; + Datum aclDatum; + bool isNull; + AclMode avail_goptions; + AclMode this_privileges; + Acl *old_acl; + Acl *new_acl; + Oid grantorId; + Oid ownerId; + HeapTuple tuple; + HeapTuple newtuple; + Datum values[Natts_pg_foreign_data_wrapper]; + bool nulls[Natts_pg_foreign_data_wrapper]; + bool replaces[Natts_pg_foreign_data_wrapper]; + int noldmembers; + int nnewmembers; + Oid *oldmembers; + Oid *newmembers; + + tuple = SearchSysCache(FOREIGNDATAWRAPPEROID, + ObjectIdGetDatum(fdwid), + 0, 0, 0); + if (!HeapTupleIsValid(tuple)) + elog(ERROR, "cache lookup failed for foreign-data wrapper %u", fdwid); + + pg_fdw_tuple = (Form_pg_foreign_data_wrapper) GETSTRUCT(tuple); + + /* + * Get owner ID and working copy of existing ACL. If there's no ACL, + * substitute the proper default. + */ + ownerId = pg_fdw_tuple->fdwowner; + aclDatum = SysCacheGetAttr(FOREIGNDATAWRAPPEROID, tuple, + Anum_pg_foreign_data_wrapper_fdwacl, + &isNull); + if (isNull) + old_acl = acldefault(ACL_OBJECT_FDW, ownerId); + else + old_acl = DatumGetAclPCopy(aclDatum); + + /* Determine ID to do the grant as, and available grant options */ + select_best_grantor(GetUserId(), istmt->privileges, + old_acl, ownerId, + &grantorId, &avail_goptions); + + /* + * Restrict the privileges to what we can actually grant, and emit the + * standards-mandated warning and error messages. + */ + this_privileges = + restrict_and_check_grant(istmt->is_grant, avail_goptions, + istmt->all_privs, istmt->privileges, + fdwid, grantorId, ACL_KIND_FDW, + NameStr(pg_fdw_tuple->fdwname)); + + /* + * Generate new ACL. + * + * We need the members of both old and new ACLs so we can correct the + * shared dependency information. + */ + noldmembers = aclmembers(old_acl, &oldmembers); + + new_acl = merge_acl_with_grant(old_acl, istmt->is_grant, + istmt->grant_option, istmt->behavior, + istmt->grantees, this_privileges, + grantorId, ownerId); + + nnewmembers = aclmembers(new_acl, &newmembers); + + /* finished building new ACL value, now insert it */ + MemSet(values, 0, sizeof(values)); + MemSet(nulls, false, sizeof(nulls)); + MemSet(replaces, false, sizeof(replaces)); + + replaces[Anum_pg_foreign_data_wrapper_fdwacl - 1] = true; + values[Anum_pg_foreign_data_wrapper_fdwacl - 1] = PointerGetDatum(new_acl); + + newtuple = heap_modify_tuple(tuple, RelationGetDescr(relation), values, + nulls, replaces); + + simple_heap_update(relation, &newtuple->t_self, newtuple); + + /* keep the catalog indexes up to date */ + CatalogUpdateIndexes(relation, newtuple); + + /* Update the shared dependency ACL info */ + updateAclDependencies(ForeignDataWrapperRelationId, HeapTupleGetOid(tuple), + ownerId, istmt->is_grant, + noldmembers, oldmembers, + nnewmembers, newmembers); + + ReleaseSysCache(tuple); + + pfree(new_acl); + + /* prevent error when processing duplicate objects */ + CommandCounterIncrement(); + } + + heap_close(relation, RowExclusiveLock); + } + + static void ExecGrant_ForeignServer(InternalGrant *istmt) + { + Relation relation; + ListCell *cell; + + if (istmt->all_privs && istmt->privileges == ACL_NO_RIGHTS) + istmt->privileges = ACL_ALL_RIGHTS_FOREIGN_SERVER; + + relation = heap_open(ForeignServerRelationId, RowExclusiveLock); + + foreach(cell, istmt->objects) + { + Oid srvid = lfirst_oid(cell); + Form_pg_foreign_server pg_server_tuple; + Datum aclDatum; + bool isNull; + AclMode avail_goptions; + AclMode this_privileges; + Acl *old_acl; + Acl *new_acl; + Oid grantorId; + Oid ownerId; + HeapTuple tuple; + HeapTuple newtuple; + Datum values[Natts_pg_foreign_server]; + bool nulls[Natts_pg_foreign_server]; + bool replaces[Natts_pg_foreign_server]; + int noldmembers; + int nnewmembers; + Oid *oldmembers; + Oid *newmembers; + + tuple = SearchSysCache(FOREIGNSERVEROID, + ObjectIdGetDatum(srvid), + 0, 0, 0); + if (!HeapTupleIsValid(tuple)) + elog(ERROR, "cache lookup failed for foreign server %u", srvid); + + pg_server_tuple = (Form_pg_foreign_server) GETSTRUCT(tuple); + + /* + * Get owner ID and working copy of existing ACL. If there's no ACL, + * substitute the proper default. + */ + ownerId = pg_server_tuple->srvowner; + aclDatum = SysCacheGetAttr(FOREIGNSERVEROID, tuple, + Anum_pg_foreign_server_srvacl, + &isNull); + if (isNull) + old_acl = acldefault(ACL_OBJECT_FOREIGN_SERVER, ownerId); + else + old_acl = DatumGetAclPCopy(aclDatum); + + /* Determine ID to do the grant as, and available grant options */ + select_best_grantor(GetUserId(), istmt->privileges, + old_acl, ownerId, + &grantorId, &avail_goptions); + + /* + * Restrict the privileges to what we can actually grant, and emit the + * standards-mandated warning and error messages. + */ + this_privileges = + restrict_and_check_grant(istmt->is_grant, avail_goptions, + istmt->all_privs, istmt->privileges, + srvid, grantorId, ACL_KIND_FOREIGN_SERVER, + NameStr(pg_server_tuple->srvname)); + + /* + * Generate new ACL. + * + * We need the members of both old and new ACLs so we can correct the + * shared dependency information. + */ + noldmembers = aclmembers(old_acl, &oldmembers); + + new_acl = merge_acl_with_grant(old_acl, istmt->is_grant, + istmt->grant_option, istmt->behavior, + istmt->grantees, this_privileges, + grantorId, ownerId); + + nnewmembers = aclmembers(new_acl, &newmembers); + + /* finished building new ACL value, now insert it */ + MemSet(values, 0, sizeof(values)); + MemSet(nulls, false, sizeof(nulls)); + MemSet(replaces, false, sizeof(replaces)); + + replaces[Anum_pg_foreign_server_srvacl - 1] = true; + values[Anum_pg_foreign_server_srvacl - 1] = PointerGetDatum(new_acl); + + newtuple = heap_modify_tuple(tuple, RelationGetDescr(relation), values, + nulls, replaces); + + simple_heap_update(relation, &newtuple->t_self, newtuple); + + /* keep the catalog indexes up to date */ + CatalogUpdateIndexes(relation, newtuple); + + /* Update the shared dependency ACL info */ + updateAclDependencies(ForeignServerRelationId, HeapTupleGetOid(tuple), + ownerId, istmt->is_grant, + noldmembers, oldmembers, + nnewmembers, newmembers); + + ReleaseSysCache(tuple); + + pfree(new_acl); + + /* prevent error when processing duplicate objects */ + CommandCounterIncrement(); + } + + heap_close(relation, RowExclusiveLock); + } + + static void ExecGrant_Function(InternalGrant *istmt) { Relation relation; *************** *** 1428,1434 **** /* ACL_KIND_TSDICTIONARY */ gettext_noop("permission denied for text search dictionary %s"), /* ACL_KIND_TSCONFIGURATION */ ! gettext_noop("permission denied for text search configuration %s") }; static const char *const not_owner_msg[MAX_ACL_KIND] = --- 1704,1714 ---- /* ACL_KIND_TSDICTIONARY */ gettext_noop("permission denied for text search dictionary %s"), /* ACL_KIND_TSCONFIGURATION */ ! gettext_noop("permission denied for text search configuration %s"), ! /* ACL_KIND_FDW */ ! gettext_noop("permission denied for foreign-data wrapper %s"), ! /* ACL_KIND_FOREIGN_SERVER */ ! gettext_noop("permission denied for foreign server %s") }; static const char *const not_owner_msg[MAX_ACL_KIND] = *************** *** 1460,1466 **** /* ACL_KIND_TSDICTIONARY */ gettext_noop("must be owner of text search dictionary %s"), /* ACL_KIND_TSCONFIGURATION */ ! gettext_noop("must be owner of text search configuration %s") }; --- 1740,1750 ---- /* ACL_KIND_TSDICTIONARY */ gettext_noop("must be owner of text search dictionary %s"), /* ACL_KIND_TSCONFIGURATION */ ! gettext_noop("must be owner of text search configuration %s"), ! /* ACL_KIND_FDW */ ! gettext_noop("must be owner of foreign-data wrapper %s"), ! /* ACL_KIND_FOREIGN_SERVER */ ! gettext_noop("must be owner of foreign server %s") }; *************** *** 1534,1539 **** --- 1818,1827 ---- return pg_namespace_aclmask(table_oid, roleid, mask, how); case ACL_KIND_TABLESPACE: return pg_tablespace_aclmask(table_oid, roleid, mask, how); + case ACL_KIND_FDW: + return pg_foreign_data_wrapper_aclmask(table_oid, roleid, mask, how); + case ACL_KIND_FOREIGN_SERVER: + return pg_foreign_server_aclmask(table_oid, roleid, mask, how); default: elog(ERROR, "unrecognized objkind: %d", (int) objkind); *************** *** 1962,1967 **** --- 2250,2380 ---- return result; } + /* + * Exported routine for examining a user's privileges for a foreign + * data wrapper + */ + AclMode + pg_foreign_data_wrapper_aclmask(Oid fdw_oid, Oid roleid, + AclMode mask, AclMaskHow how) + { + AclMode result; + HeapTuple tuple; + Datum aclDatum; + bool isNull; + Acl *acl; + Oid ownerId; + + Form_pg_foreign_data_wrapper fdwForm; + + /* Bypass permission checks for superusers */ + if (superuser_arg(roleid)) + return mask; + + /* + * Must get the FDW's tuple from pg_foreign_data_wrapper + */ + tuple = SearchSysCache(FOREIGNDATAWRAPPEROID, + ObjectIdGetDatum(fdw_oid), + 0, 0, 0); + if (!HeapTupleIsValid(tuple)) + ereport(ERROR, + (errmsg("foreign-data wrapper with OID %u does not exist", + fdw_oid))); + fdwForm = (Form_pg_foreign_data_wrapper) GETSTRUCT(tuple); + + /* + * Normal case: get the FDW's ACL from pg_foreign_data_wrapper + */ + ownerId = fdwForm->fdwowner; + + aclDatum = SysCacheGetAttr(FOREIGNDATAWRAPPEROID, tuple, + Anum_pg_foreign_data_wrapper_fdwacl, &isNull); + if (isNull) + { + /* No ACL, so build default ACL */ + acl = acldefault(ACL_OBJECT_FDW, ownerId); + aclDatum = (Datum) 0; + } + else + { + /* detoast rel's ACL if necessary */ + acl = DatumGetAclP(aclDatum); + } + + result = aclmask(acl, roleid, ownerId, mask, how); + + /* if we have a detoasted copy, free it */ + if (acl && (Pointer) acl != DatumGetPointer(aclDatum)) + pfree(acl); + + ReleaseSysCache(tuple); + + return result; + } + + /* + * Exported routine for examining a user's privileges for a foreign + * server. + */ + AclMode + pg_foreign_server_aclmask(Oid srv_oid, Oid roleid, + AclMode mask, AclMaskHow how) + { + AclMode result; + HeapTuple tuple; + Datum aclDatum; + bool isNull; + Acl *acl; + Oid ownerId; + + Form_pg_foreign_server srvForm; + + /* Bypass permission checks for superusers */ + if (superuser_arg(roleid)) + return mask; + + /* + * Must get the FDW's tuple from pg_foreign_data_wrapper + */ + tuple = SearchSysCache(FOREIGNSERVEROID, + ObjectIdGetDatum(srv_oid), + 0, 0, 0); + if (!HeapTupleIsValid(tuple)) + ereport(ERROR, + (errmsg("foreign server with OID %u does not exist", + srv_oid))); + srvForm = (Form_pg_foreign_server) GETSTRUCT(tuple); + + /* + * Normal case: get the foreign server's ACL from pg_foreign_server + */ + ownerId = srvForm->srvowner; + + aclDatum = SysCacheGetAttr(FOREIGNSERVEROID, tuple, + Anum_pg_foreign_server_srvacl, &isNull); + if (isNull) + { + /* No ACL, so build default ACL */ + acl = acldefault(ACL_OBJECT_FOREIGN_SERVER, ownerId); + aclDatum = (Datum) 0; + } + else + { + /* detoast rel's ACL if necessary */ + acl = DatumGetAclP(aclDatum); + } + + result = aclmask(acl, roleid, ownerId, mask, how); + + /* if we have a detoasted copy, free it */ + if (acl && (Pointer) acl != DatumGetPointer(aclDatum)) + pfree(acl); + + ReleaseSysCache(tuple); + + return result; + } /* * Exported routine for checking a user's access privileges to a table *************** *** 2039,2044 **** --- 2452,2482 ---- return ACLCHECK_NO_PRIV; } + /* + * Exported routine for checking a user's access privileges to a foreign + * data wrapper + */ + AclResult + pg_foreign_data_wrapper_aclcheck(Oid fdw_oid, Oid roleid, AclMode mode) + { + if (pg_foreign_data_wrapper_aclmask(fdw_oid, roleid, mode, ACLMASK_ANY) != 0) + return ACLCHECK_OK; + else + return ACLCHECK_NO_PRIV; + } + + /* + * Exported routine for checking a user's access privileges to a foreign + * server + */ + AclResult + pg_foreign_server_aclcheck(Oid srv_oid, Oid roleid, AclMode mode) + { + if (pg_foreign_server_aclmask(srv_oid, roleid, mode, ACLMASK_ANY) != 0) + return ACLCHECK_OK; + else + return ACLCHECK_NO_PRIV; + } /* * Ownership check for a relation (specified by OID). *************** *** 2364,2369 **** --- 2802,2835 ---- return has_privs_of_role(roleid, ownerId); } + /* + * Ownership check for a foreign server (specified by OID). + */ + bool + pg_foreign_server_ownercheck(Oid srv_oid, Oid roleid) + { + HeapTuple tuple; + Oid ownerId; + + /* Superusers bypass all permission checking. */ + if (superuser_arg(roleid)) + return true; + + tuple = SearchSysCache(FOREIGNSERVEROID, + ObjectIdGetDatum(srv_oid), + 0, 0, 0); + if (!HeapTupleIsValid(tuple)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("foreign server with OID %u does not exist", + srv_oid))); + + ownerId = ((Form_pg_foreign_server) GETSTRUCT(tuple))->srvowner; + + ReleaseSysCache(tuple); + + return has_privs_of_role(roleid, ownerId); + } /* * Ownership check for a database (specified by OID). diff -cNr -x CVS cvs-pgsql/src/backend/catalog/dependency.c pgsql/src/backend/catalog/dependency.c *** cvs-pgsql/src/backend/catalog/dependency.c Thu Nov 13 10:44:31 2008 --- pgsql/src/backend/catalog/dependency.c Fri Dec 12 10:44:15 2008 *************** *** 33,38 **** --- 33,40 ---- #include "catalog/pg_conversion_fn.h" #include "catalog/pg_database.h" #include "catalog/pg_depend.h" + #include "catalog/pg_foreign_data_wrapper.h" + #include "catalog/pg_foreign_server.h" #include "catalog/pg_language.h" #include "catalog/pg_namespace.h" #include "catalog/pg_opclass.h" *************** *** 47,52 **** --- 49,55 ---- #include "catalog/pg_ts_parser.h" #include "catalog/pg_ts_template.h" #include "catalog/pg_type.h" + #include "catalog/pg_user_mapping.h" #include "commands/comment.h" #include "commands/dbcommands.h" #include "commands/defrem.h" *************** *** 55,60 **** --- 58,64 ---- #include "commands/tablespace.h" #include "commands/trigger.h" #include "commands/typecmds.h" + #include "foreign/foreign.h" #include "miscadmin.h" #include "nodes/nodeFuncs.h" #include "parser/parsetree.h" *************** *** 1105,1110 **** --- 1109,1126 ---- RemoveTSConfigurationById(object->objectId); break; + case OCLASS_USER_MAPPING: + RemoveUserMappingById(object->objectId); + break; + + case OCLASS_FOREIGN_SERVER: + RemoveForeignServerById(object->objectId); + break; + + case OCLASS_FDW: + RemoveForeignDataWrapperById(object->objectId); + break; + /* OCLASS_ROLE, OCLASS_DATABASE, OCLASS_TBLSPACE not handled */ default: *************** *** 2005,2010 **** --- 2021,2038 ---- case TableSpaceRelationId: Assert(object->objectSubId == 0); return OCLASS_TBLSPACE; + + case ForeignDataWrapperRelationId: + Assert(object->objectSubId == 0); + return OCLASS_FDW; + + case ForeignServerRelationId: + Assert(object->objectSubId == 0); + return OCLASS_FOREIGN_SERVER; + + case UserMappingRelationId: + Assert(object->objectSubId == 0); + return OCLASS_USER_MAPPING; } /* shouldn't get here */ *************** *** 2501,2506 **** --- 2529,2578 ---- break; } + case OCLASS_FDW: + { + ForeignDataWrapper *fdw; + + fdw = GetForeignDataWrapper(object->objectId); + appendStringInfo(&buffer, _("foreign-data wrapper %s"), fdw->fdwname); + break; + } + + case OCLASS_FOREIGN_SERVER: + { + ForeignServer *srv; + + srv = GetForeignServer(object->objectId); + appendStringInfo(&buffer, _("server %s"), srv->servername); + break; + } + + case OCLASS_USER_MAPPING: + { + HeapTuple tup; + Oid useid; + char *usename; + + tup = SearchSysCache(USERMAPPINGOID, + ObjectIdGetDatum(object->objectId), + 0, 0, 0); + if (!HeapTupleIsValid(tup)) + elog(ERROR, "cache lookup failed for user mapping %u", + object->objectId); + + useid = ((Form_pg_user_mapping) GETSTRUCT(tup))->umuser; + + ReleaseSysCache(tup); + + if (OidIsValid(useid)) + usename = GetUserNameFromId(useid); + else + usename = "public"; + + appendStringInfo(&buffer, _("user mapping for %s"), usename); + break; + } + default: appendStringInfo(&buffer, "unrecognized object %u %u %d", object->classId, diff -cNr -x CVS cvs-pgsql/src/backend/catalog/information_schema.sql pgsql/src/backend/catalog/information_schema.sql *** cvs-pgsql/src/backend/catalog/information_schema.sql Thu Sep 11 15:29:57 2008 --- pgsql/src/backend/catalog/information_schema.sql Fri Dec 12 13:36:03 2008 *************** *** 2313,2315 **** --- 2313,2450 ---- FROM data_type_privileges ); GRANT SELECT ON element_types TO PUBLIC; + + + -- SQL/MED views; these use section numbers from part 9 of the standard. + + /* Base view for foreign-data wrappers */ + CREATE VIEW _pg_foreign_data_wrappers AS + SELECT w.oid, + w.fdwowner, + CAST(current_database() AS sql_identifier) AS foreign_data_wrapper_catalog, + CAST(fdwname AS sql_identifier) AS foreign_data_wrapper_name, + CAST(u.rolname AS sql_identifier) AS authorization_identifier, + CAST(fdwlibrary AS character_data) AS library_name, + CAST('c' AS character_data) AS foreign_data_wrapper_language + FROM pg_foreign_data_wrapper w, pg_authid u + WHERE u.oid = w.fdwowner; + + + /* + * 24.4 + * FOREIGN_DATA_WRAPPER_OPTIONS view + */ + CREATE VIEW foreign_data_wrapper_options AS + SELECT foreign_data_wrapper_catalog, + foreign_data_wrapper_name, + CAST((pg_get_foreign_data_wrapper_options(w.oid)).option_name AS sql_identifier) AS option_name, + CAST((pg_get_foreign_data_wrapper_options(w.oid)).option_value AS sql_identifier) AS option_value + FROM _pg_foreign_data_wrappers w + WHERE (pg_has_role(fdwowner, 'USAGE') + OR has_foreign_data_wrapper_privilege(w.oid, 'USAGE')); + + GRANT SELECT ON foreign_data_wrapper_options TO PUBLIC; + + + /* + * 24.5 + * FOREIGN_DATA_WRAPPERS + */ + CREATE VIEW foreign_data_wrappers AS + SELECT foreign_data_wrapper_catalog, + foreign_data_wrapper_name, + authorization_identifier, + library_name, + foreign_data_wrapper_language + FROM _pg_foreign_data_wrappers w + WHERE (pg_has_role(fdwowner, 'USAGE') + OR has_foreign_data_wrapper_privilege(w.oid, 'USAGE')); + + GRANT SELECT ON foreign_data_wrappers TO PUBLIC; + + + /* Base view for foreign servers */ + CREATE VIEW _pg_foreign_servers AS + SELECT s.oid, + CAST(current_database() AS sql_identifier) AS foreign_server_catalog, + CAST(srvname AS sql_identifier) AS foreign_server_name, + w.foreign_data_wrapper_catalog, + w.foreign_data_wrapper_name, + CAST(srvtype AS character_data) AS foreign_server_type, + CAST(srvversion AS character_data) AS foreign_server_version, + CAST(u.rolname AS sql_identifier) AS authorization_identifier + FROM pg_foreign_server s, _pg_foreign_data_wrappers w, pg_authid u + WHERE w.oid = s.srvfdw + AND u.oid = s.srvowner + AND (pg_has_role(s.srvowner, 'USAGE') + OR has_server_privilege(s.oid, 'USAGE')); + + + /* + * 24.6 + * FOREIGN_SERVER_OPTIONS view + */ + CREATE VIEW foreign_server_options AS + SELECT foreign_server_catalog, + foreign_server_name, + CAST((pg_get_foreign_server_options(s.oid)).option_name AS character_data) AS option_name, + CAST((pg_get_foreign_server_options(s.oid)).option_value AS character_data) AS option_value + FROM _pg_foreign_servers s; + + GRANT SELECT ON TABLE foreign_server_options TO PUBLIC; + + + /* + * 24.7 + * FOREIGN_SERVERS view + */ + CREATE VIEW foreign_servers AS + SELECT foreign_server_catalog, + foreign_server_name, + foreign_data_wrapper_catalog, + foreign_data_wrapper_name, + foreign_server_type, + foreign_server_version, + authorization_identifier + FROM _pg_foreign_servers; + + GRANT SELECT ON foreign_servers TO PUBLIC; + + + /* Base view for user mappings */ + CREATE VIEW _pg_user_mappings AS + SELECT um.oid, + CAST(COALESCE(u.rolname,'public') AS sql_identifier ) AS authorization_identifier, + s.foreign_server_catalog, + s.foreign_server_name + FROM pg_user_mapping um LEFT JOIN pg_authid u ON (u.oid = um.umuser), + _pg_foreign_servers s + WHERE s.oid = um.umserver; + + + /* + * 24.12 + * USER_MAPPING_OPTIONS view + */ + CREATE VIEW user_mapping_options AS + SELECT authorization_identifier, + foreign_server_catalog, + foreign_server_name, + CAST((pg_get_user_mapping_options(um.oid)).option_name AS character_data) AS option_name, + CAST((pg_get_user_mapping_options(um.oid)).option_value AS character_data) AS option_value + FROM _pg_user_mappings um; + + GRANT SELECT ON user_mapping_options TO PUBLIC; + + + /* + * 24.13 + * USER_MAPPINGS view + */ + CREATE VIEW user_mappings AS + SELECT authorization_identifier, + foreign_server_catalog, + foreign_server_name + FROM _pg_user_mappings; + + GRANT SELECT ON user_mappings TO PUBLIC; diff -cNr -x CVS cvs-pgsql/src/backend/catalog/sql_features.txt pgsql/src/backend/catalog/sql_features.txt *** cvs-pgsql/src/backend/catalog/sql_features.txt Mon Dec 1 10:24:54 2008 --- pgsql/src/backend/catalog/sql_features.txt Fri Dec 12 10:44:15 2008 *************** *** 487,492 **** --- 487,517 ---- T653 SQL-schema statements in external routines NO T654 SQL-dynamic statements in external routines NO T655 Cyclically dependent routines NO + M001 Datalinks NO + M002 Datalinks via SQL/CLI NO + M003 Datalinks via Embedded SQL NO + M004 Foreign data support NO + M005 Foreign schema support NO + M006 GetSQLString routine NO + M007 TransmitRequest NO + M009 GetOpts and GetStatistics routines NO + M010 Foreign data wrapper support NO + M011 Datalinks via Ada NO + M012 Datalinks via C NO + M013 Datalinks via COBOL NO + M014 Datalinks via Fortran NO + M015 Datalinks via M NO + M016 Datalinks via Pascal NO + M017 Datalinks via PL/I NO + M018 Foreign data wrapper interface routines in Ada NO + M019 Foreign data wrapper interface routines in C NO + M020 Foreign data wrapper interface routines in COBOL NO + M021 Foreign data wrapper interface routines in Fortran NO + M022 Foreign data wrapper interface routines in MUMPS NO + M023 Foreign data wrapper interface routines in Pascal NO + M024 Foreign data wrapper interface routines in PL/I NO + M030 SQL-server foreign data support NO + M031 Foreign data wrapper general routines NO X010 XML type YES X011 Arrays of XML type YES X012 Multisets of XML type NO diff -cNr -x CVS cvs-pgsql/src/backend/catalog/system_views.sql pgsql/src/backend/catalog/system_views.sql *** cvs-pgsql/src/backend/catalog/system_views.sql Thu Nov 13 10:44:31 2008 --- pgsql/src/backend/catalog/system_views.sql Mon Dec 15 14:16:00 2008 *************** *** 381,386 **** --- 381,405 ---- pg_stat_get_buf_written_backend() AS buffers_backend, pg_stat_get_buf_alloc() AS buffers_alloc; + CREATE VIEW pg_user_mappings AS + SELECT + U.oid AS umid, + S.oid AS srvid, + S.srvname AS srvname, + U.umuser AS umuser, + CASE WHEN U.umuser = 0 THEN + 'public' + ELSE + A.rolname + END AS usename + FROM pg_user_mapping U + LEFT JOIN pg_authid A ON (A.oid = U.umuser) JOIN + pg_foreign_server S ON (U.umserver = S.oid); + + REVOKE ALL on pg_user_mapping FROM public; + REVOKE ALL on FUNCTION pg_get_remote_connection_info(name) FROM public; + REVOKE ALL on FUNCTION pg_get_remote_connection_info(name, name) FROM public; + -- Tsearch debug function. Defined here because it'd be pretty unwieldy -- to put it into pg_proc.h diff -cNr -x CVS cvs-pgsql/src/backend/commands/Makefile pgsql/src/backend/commands/Makefile *** cvs-pgsql/src/backend/commands/Makefile Tue Feb 19 12:30:07 2008 --- pgsql/src/backend/commands/Makefile Fri Dec 12 10:44:15 2008 *************** *** 14,20 **** OBJS = aggregatecmds.o alter.o analyze.o async.o cluster.o comment.o \ conversioncmds.o copy.o \ ! dbcommands.o define.o discard.o explain.o functioncmds.o \ indexcmds.o lockcmds.o operatorcmds.o opclasscmds.o \ portalcmds.o prepare.o proclang.o \ schemacmds.o sequence.o tablecmds.o tablespace.o trigger.o \ --- 14,20 ---- OBJS = aggregatecmds.o alter.o analyze.o async.o cluster.o comment.o \ conversioncmds.o copy.o \ ! dbcommands.o define.o discard.o explain.o foreigncmds.o functioncmds.o \ indexcmds.o lockcmds.o operatorcmds.o opclasscmds.o \ portalcmds.o prepare.o proclang.o \ schemacmds.o sequence.o tablecmds.o tablespace.o trigger.o \ diff -cNr -x CVS cvs-pgsql/src/backend/commands/alter.c pgsql/src/backend/commands/alter.c *** cvs-pgsql/src/backend/commands/alter.c Sun Jun 15 04:25:53 2008 --- pgsql/src/backend/commands/alter.c Fri Dec 12 10:44:15 2008 *************** *** 270,275 **** --- 270,284 ---- AlterTSConfigurationOwner(stmt->object, newowner); break; + case OBJECT_FDW: + AlterForeignDataWrapperOwner(strVal(linitial(stmt->object)), + newowner); + break; + + case OBJECT_FOREIGN_SERVER: + AlterForeignServerOwner(strVal(linitial(stmt->object)), newowner); + break; + default: elog(ERROR, "unrecognized AlterOwnerStmt type: %d", (int) stmt->objectType); diff -cNr -x CVS cvs-pgsql/src/backend/commands/foreigncmds.c pgsql/src/backend/commands/foreigncmds.c *** cvs-pgsql/src/backend/commands/foreigncmds.c Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/commands/foreigncmds.c Fri Dec 12 11:06:24 2008 *************** *** 0 **** --- 1,1103 ---- + /*------------------------------------------------------------------------- + * + * foreigncmds.c + * foreign-data wrapper/server creation/manipulation commands + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * + * + * IDENTIFICATION + * $PostgreSQL$ + * + *------------------------------------------------------------------------- + */ + #include "postgres.h" + + #include "access/heapam.h" + #include "access/reloptions.h" + #include "catalog/catalog.h" + #include "catalog/dependency.h" + #include "catalog/indexing.h" + #include "catalog/pg_foreign_data_wrapper.h" + #include "catalog/pg_foreign_server.h" + #include "catalog/pg_type.h" + #include "catalog/pg_user_mapping.h" + #include "commands/defrem.h" + #include "foreign/foreign.h" + #include "miscadmin.h" + #include "utils/acl.h" + #include "utils/builtins.h" + #include "utils/lsyscache.h" + #include "utils/rel.h" + #include "utils/syscache.h" + + + /* + * Convert a DefElem list to the text array format that is used in + * pg_foreign_data_wrapper, pg_foreign_server, and pg_user_mapping. + * + * Note: The array is usually stored to database without further + * processing, hence any validation should be done before this + * conversion. + */ + static Datum + optionListToArray(List *options) + { + ArrayBuildState *astate = NULL; + ListCell *cell; + text *t; + + foreach (cell, options) + { + DefElem *def = lfirst(cell); + const char *value = ""; + Size len; + + value = defGetString(def); + len = VARHDRSZ + strlen(def->defname) + 1 + strlen(value); + t = palloc(len + 1); + SET_VARSIZE(t, len); + sprintf(VARDATA(t), "%s=%s", def->defname, value); + + astate = accumArrayResult(astate, PointerGetDatum(t), + false, TEXTOID, + CurrentMemoryContext); + } + + if (astate) + return makeArrayResult(astate, CurrentMemoryContext); + + return PointerGetDatum(NULL); + } + + + /* + * Transform the list of OptionDefElem into list of generic options. + * The result is converted to array of text suitable for storing in + * options. + * + * This is used by CREATE/ALTER of FOREIGN DATA WRAPPER/SERVER/USER + * MAPPING. In the ALTER cases, oldOptions is the current text array + * of options. + */ + static Datum + transformGenericOptions(Datum oldOptions, + List *optionDefList, + GenericOptionFlags flags, + ForeignDataWrapper *fdw, + OptionListValidatorFunc validateOptionList) + { + List *resultOptions = untransformRelOptions(oldOptions); + ListCell *optcell; + + foreach (optcell, optionDefList) + { + ListCell *cell; + ListCell *prev = NULL; + OptionDefElem *od = lfirst(optcell); + + /* + * Find the element in resultOptions. We need this for + * validation in all cases. + */ + foreach (cell, resultOptions) + { + DefElem *def = lfirst(cell); + + if (strcmp(def->defname, od->def->defname) == 0) + break; + else + prev = cell; + } + + /* + * At the moment it possible to perform multiple SET/DROP + * actions on the same option -- The standard permits this, as + * long as the options to be added are unique. + */ + + switch (od->alter_op) + { + case ALTER_OPT_DROP: + if (!cell) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("option \"%s\" not found", + od->def->defname))); + resultOptions = list_delete_cell(resultOptions, cell, prev); + break; + + case ALTER_OPT_SET: + if (!cell) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("option \"%s\" not found", + od->def->defname))); + lfirst(cell) = od->def; + break; + + case ALTER_OPT_ADD: + if (cell) + ereport(ERROR, + (errcode(ERRCODE_DUPLICATE_OBJECT), + errmsg("option \"%s\" provided more than once", + od->def->defname))); + resultOptions = lappend(resultOptions, od->def); + break; + + default: + elog(ERROR, "unrecognized action %d on option \"%s\"", + od->alter_op, od->def->defname); + break; + } + } + + if (validateOptionList) + validateOptionList(fdw, flags, resultOptions); + + return optionListToArray(resultOptions); + } + + + /* + * Convert the user mapping user name to Oid + */ + static Oid + GetUserOidFromMapping(const char *username, bool missing_ok) + { + if (!username) + /* PUBLIC user mapping */ + return InvalidOid; + + if (strcmp(username, "current_user") == 0) + /* map to the owner */ + return GetUserId(); + + /* map to provided user */ + return missing_ok ? get_roleid(username) : get_roleid_checked(username); + } + + + /* + * Change foreign-data wrapper owner. + * + * Allow this only for superusers; also the new owner must be a + * superuser. + */ + void + AlterForeignDataWrapperOwner(const char *name, Oid newOwnerId) + { + HeapTuple tup; + Relation rel; + Oid fdwId; + + Form_pg_foreign_data_wrapper form; + + /* Must be a superuser to change a FDW owner */ + if (!superuser()) + ereport(ERROR, + (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), + errmsg("permission denied to change owner of foreign-data wrapper \"%s\"", + name), + errhint("Must be superuser to change owner of a foreign-data wrapper."))); + + /* New owner must also be a superuser */ + if (!superuser_arg(newOwnerId)) + ereport(ERROR, + (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), + errmsg("permission denied to change owner of foreign-data wrapper \"%s\"", + name), + errhint("The owner of a foreign-data wrapper must be a superuser."))); + + rel = heap_open(ForeignDataWrapperRelationId, RowExclusiveLock); + + tup = SearchSysCacheCopy(FOREIGNDATAWRAPPERNAME, + CStringGetDatum(name), + 0, 0, 0); + + if (!HeapTupleIsValid(tup)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("foreign-data wrapper \"%s\" does not exist", name))); + + fdwId = HeapTupleGetOid(tup); + form = (Form_pg_foreign_data_wrapper) GETSTRUCT(tup); + + if (form->fdwowner != newOwnerId) + { + form->fdwowner = newOwnerId; + + simple_heap_update(rel, &tup->t_self, tup); + CatalogUpdateIndexes(rel, tup); + + /* Update owner dependency reference */ + changeDependencyOnOwner(ForeignDataWrapperRelationId, + fdwId, + newOwnerId); + } + + heap_close(rel, NoLock); + heap_freetuple(tup); + } + + + /* + * Change foreign server owner + */ + void + AlterForeignServerOwner(const char *name, Oid newOwnerId) + { + HeapTuple tup; + Relation rel; + Oid srvId; + AclResult aclresult; + Form_pg_foreign_server form; + + rel = heap_open(ForeignServerRelationId, RowExclusiveLock); + + tup = SearchSysCacheCopy(FOREIGNSERVERNAME, + CStringGetDatum(name), + 0, 0, 0); + + if (!HeapTupleIsValid(tup)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("server \"%s\" does not exist", name))); + + srvId = HeapTupleGetOid(tup); + form = (Form_pg_foreign_server) GETSTRUCT(tup); + + if (form->srvowner != newOwnerId) + { + /* Superusers can always do it */ + if (!superuser()) + { + /* Must be owner */ + if (!pg_foreign_server_ownercheck(srvId, GetUserId())) + aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_FOREIGN_SERVER, + name); + + /* Must be able to become new owner */ + check_is_member_of_role(GetUserId(), newOwnerId); + + /* New owner must have USAGE privilege on foreign-data wrapper */ + aclresult = pg_foreign_data_wrapper_aclcheck(form->srvfdw, newOwnerId, ACL_USAGE); + if (aclresult != ACLCHECK_OK) + { + ForeignDataWrapper *fdw = GetForeignDataWrapper(form->srvfdw); + + aclcheck_error(aclresult, ACL_KIND_FDW, fdw->fdwname); + } + } + + form->srvowner = newOwnerId; + + simple_heap_update(rel, &tup->t_self, tup); + CatalogUpdateIndexes(rel, tup); + + /* Update owner dependency reference */ + changeDependencyOnOwner(ForeignServerRelationId, HeapTupleGetOid(tup), + newOwnerId); + } + + heap_close(rel, NoLock); + heap_freetuple(tup); + } + + + /* + * Create a foreign-data wrapper + */ + void + CreateForeignDataWrapper(CreateFdwStmt *stmt) + { + Relation rel; + Datum values[Natts_pg_foreign_data_wrapper]; + bool nulls[Natts_pg_foreign_data_wrapper]; + HeapTuple tuple; + Oid fdwId; + Datum fdwoptions = InvalidOid; + Oid ownerId; + ForeignDataWrapperLibrary *fdwlib; + + /* Must be super user */ + if (!superuser()) + ereport(ERROR, + (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), + errmsg("permission denied to create foreign-data wrapper \"%s\"", + stmt->fdwname), + errhint("Must be superuser to create a foreign-data wrapper."))); + + /* For now the owner cannot be specified on create. Use effective user id */ + ownerId = GetUserId(); + + /* + * Check that there is no other foreign-data wrapper by this name. + */ + if (GetForeignDataWrapperByName(stmt->fdwname, true) != NULL) + ereport(ERROR, + (errcode(ERRCODE_DUPLICATE_OBJECT), + errmsg("foreign-data wrapper \"%s\" already exists", + stmt->fdwname))); + + /* + * Insert tuple into pg_foreign_data_wrapper. + */ + rel = heap_open(ForeignDataWrapperRelationId, RowExclusiveLock); + + MemSet(nulls, false, Natts_pg_foreign_data_wrapper); + + values[Anum_pg_foreign_data_wrapper_fdwname - 1] = + DirectFunctionCall1(namein, CStringGetDatum(stmt->fdwname)); + values[Anum_pg_foreign_data_wrapper_fdwowner - 1] = ObjectIdGetDatum(ownerId); + values[Anum_pg_foreign_data_wrapper_fdwlibrary - 1] = CStringGetTextDatum(stmt->library); + nulls[Anum_pg_foreign_data_wrapper_fdwacl - 1] = true; + + /* + * See if the FDW library loads at all. We also might want to use it + * later for validating the options. + */ + fdwlib = GetForeignDataWrapperLibrary(stmt->library); + + fdwoptions = transformGenericOptions(0, stmt->options, FdwOpt, NULL, + fdwlib->validateOptionList); + + if (OidIsValid(fdwoptions)) + values[Anum_pg_foreign_data_wrapper_fdwoptions - 1] = fdwoptions; + else + nulls[Anum_pg_foreign_data_wrapper_fdwoptions - 1] = true; + + tuple = heap_form_tuple(rel->rd_att, values, nulls); + + fdwId = simple_heap_insert(rel, tuple); + CatalogUpdateIndexes(rel, tuple); + + heap_freetuple(tuple); + + recordDependencyOnOwner(ForeignDataWrapperRelationId, fdwId, ownerId); + + heap_close(rel, NoLock); + } + + + /* + * Alter foreign-data wrapper + */ + void + AlterForeignDataWrapper(AlterFdwStmt *stmt) + { + Relation rel; + HeapTuple tp; + Datum repl_val[Natts_pg_foreign_data_wrapper]; + bool repl_null[Natts_pg_foreign_data_wrapper]; + bool repl_repl[Natts_pg_foreign_data_wrapper]; + Oid fdwId; + bool isnull; + Datum datum; + ForeignDataWrapperLibrary *fdwlib; + + /* Must be super user */ + if (!superuser()) + ereport(ERROR, + (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), + errmsg("permission denied to alter foreign-data wrapper \"%s\"", + stmt->fdwname), + errhint("Must be superuser to alter a foreign-data wrapper."))); + + tp = SearchSysCacheCopy(FOREIGNDATAWRAPPERNAME, + CStringGetDatum(stmt->fdwname), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("foreign-data wrapper \"%s\" does not exist", stmt->fdwname))); + + fdwId = HeapTupleGetOid(tp); + + memset(repl_val, 0, sizeof(repl_val)); + memset(repl_null, false, sizeof(repl_null)); + memset(repl_repl, false, sizeof(repl_repl)); + + if (stmt->library) + { + /* + * New library specified -- load to see if valid. + */ + fdwlib = GetForeignDataWrapperLibrary(stmt->library); + + repl_val[Anum_pg_foreign_data_wrapper_fdwlibrary - 1] = CStringGetTextDatum(stmt->library); + repl_repl[Anum_pg_foreign_data_wrapper_fdwlibrary - 1] = true; + + /* + * It could be that the options for the FDW, SERVER and USER MAPPING + * are no longer valid with the new library. Warn about this. + */ + ereport(WARNING, + (errmsg("changing the foreign-data wrapper library can cause " + "the options for dependent objects to become invalid"))); + } + else + { + /* + * No LIBRARY clause specified, but we need to load it for validating + * options. + */ + datum = SysCacheGetAttr(FOREIGNDATAWRAPPEROID, + tp, + Anum_pg_foreign_data_wrapper_fdwlibrary, + &isnull); + fdwlib = GetForeignDataWrapperLibrary(TextDatumGetCString(datum)); + } + + /* + * Options specified, validate and update. + */ + if (stmt->options) + { + /* Extract the current options */ + datum = SysCacheGetAttr(FOREIGNDATAWRAPPEROID, + tp, + Anum_pg_foreign_data_wrapper_fdwoptions, + &isnull); + + /* Transform the options */ + datum = transformGenericOptions(datum, stmt->options, FdwOpt, + NULL, fdwlib->validateOptionList); + + if (OidIsValid(datum)) + repl_val[Anum_pg_foreign_data_wrapper_fdwoptions - 1] = ObjectIdGetDatum(datum); + else + repl_null[Anum_pg_foreign_data_wrapper_fdwoptions - 1] = true; + + repl_repl[Anum_pg_foreign_data_wrapper_fdwoptions - 1] = true; + } + + /* Everything looks good - update the tuple */ + + rel = heap_open(ForeignDataWrapperRelationId, RowExclusiveLock); + + tp = heap_modify_tuple(tp, RelationGetDescr(rel), + repl_val, repl_null, repl_repl); + + simple_heap_update(rel, &tp->t_self, tp); + CatalogUpdateIndexes(rel, tp); + + heap_close(rel, RowExclusiveLock); + heap_freetuple(tp); + } + + + /* + * Drop foreign-data wrapper + */ + void + RemoveForeignDataWrapper(DropFdwStmt *stmt) + { + Oid fdwId; + ObjectAddress object; + + fdwId = GetForeignDataWrapperOidByName(stmt->fdwname, true); + + if (!superuser()) + ereport(ERROR, + (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), + errmsg("permission denied to drop foreign-data wrapper \"%s\"", + stmt->fdwname), + errhint("Must be superuser to drop a foreign-data wrapper."))); + + if (!OidIsValid(fdwId)) + { + if (!stmt->missing_ok) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("foreign-data wrapper \"%s\" does not exist", + stmt->fdwname))); + + /* IF EXISTS specified, just note it */ + ereport(NOTICE, + (errmsg("foreign-data wrapper \"%s\" does not exist, skipping", + stmt->fdwname))); + return; + } + + /* + * Do the deletion + */ + object.classId = ForeignDataWrapperRelationId; + object.objectId = fdwId; + object.objectSubId = 0; + + performDeletion(&object, stmt->behavior); + } + + + /* + * Drop foreign-data wrapper by Oid. + */ + void + RemoveForeignDataWrapperById(Oid fdwId) + { + HeapTuple tp; + Relation rel; + + rel = heap_open(ForeignDataWrapperRelationId, RowExclusiveLock); + + tp = SearchSysCache(FOREIGNDATAWRAPPEROID, + ObjectIdGetDatum(fdwId), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + elog(ERROR, "cache lookup failed for foreign-data wrapper %u", fdwId); + + simple_heap_delete(rel, &tp->t_self); + + ReleaseSysCache(tp); + + heap_close(rel, RowExclusiveLock); + } + + + /* + * Create a foreign server + */ + void + CreateForeignServer(CreateForeignServerStmt *stmt) + { + Relation rel; + Datum srvoptions = InvalidOid; + Datum values[Natts_pg_foreign_server]; + bool nulls[Natts_pg_foreign_server]; + HeapTuple tuple; + Oid srvId; + Oid ownerId; + AclResult aclresult; + ObjectAddress myself; + ObjectAddress referenced; + ForeignDataWrapper *fdw; + + /* For now the owner cannot be specified on create. Use effective user id */ + ownerId = GetUserId(); + + /* + * Check that there is no other foreign server by this name. + */ + if (GetForeignServerByName(stmt->servername, true) != NULL) + ereport(ERROR, + (errcode(ERRCODE_DUPLICATE_OBJECT), + errmsg("server \"%s\" already exists", + stmt->servername))); + + /* + * Check that the FDW exists and that we have USAGE on it. + * Also get the actual FDW for option validation etc. + */ + fdw = GetForeignDataWrapperByName(stmt->fdwname, false); + + aclresult = pg_foreign_data_wrapper_aclcheck(fdw->fdwid, ownerId, ACL_USAGE); + if (aclresult != ACLCHECK_OK) + aclcheck_error(aclresult, ACL_KIND_FDW, fdw->fdwname); + + /* + * Insert tuple into pg_foreign_server. + */ + rel = heap_open(ForeignServerRelationId, RowExclusiveLock); + + MemSet(nulls, false, Natts_pg_foreign_server); + + values[Anum_pg_foreign_server_srvname - 1] = + DirectFunctionCall1(namein, CStringGetDatum(stmt->servername)); + values[Anum_pg_foreign_server_srvowner - 1] = ObjectIdGetDatum(ownerId); + values[Anum_pg_foreign_server_srvfdw - 1] = ObjectIdGetDatum(fdw->fdwid); + + /* Add server type if supplied */ + if (stmt->servertype) + values[Anum_pg_foreign_server_srvtype - 1] = + CStringGetTextDatum(stmt->servertype); + else + nulls[Anum_pg_foreign_server_srvtype - 1] = true; + + /* Add server version if supplied */ + if (stmt->version) + values[Anum_pg_foreign_server_srvversion - 1] = + CStringGetTextDatum(stmt->version); + else + nulls[Anum_pg_foreign_server_srvversion - 1] = true; + + /* Start with a blank acl */ + nulls[Anum_pg_foreign_server_srvacl - 1] = true; + + /* Add server options */ + srvoptions = transformGenericOptions(0, stmt->options, ServerOpt, fdw, + fdw->lib->validateOptionList); + + if (OidIsValid(srvoptions)) + values[Anum_pg_foreign_server_srvoptions - 1] = srvoptions; + else + nulls[Anum_pg_foreign_server_srvoptions - 1] = true; + + tuple = heap_form_tuple(rel->rd_att, values, nulls); + + srvId = simple_heap_insert(rel, tuple); + + CatalogUpdateIndexes(rel, tuple); + + heap_freetuple(tuple); + + /* Add dependency on FDW and owner */ + myself.classId = ForeignServerRelationId; + myself.objectId = srvId; + myself.objectSubId = 0; + + referenced.classId = ForeignDataWrapperRelationId; + referenced.objectId = fdw->fdwid; + referenced.objectSubId = 0; + recordDependencyOn(&myself, &referenced, DEPENDENCY_NORMAL); + + recordDependencyOnOwner(ForeignServerRelationId, srvId, ownerId); + + heap_close(rel, NoLock); + } + + + /* + * Alter foreign server + */ + void + AlterForeignServer(AlterForeignServerStmt *stmt) + { + Relation rel; + HeapTuple tp; + Datum repl_val[Natts_pg_foreign_server]; + bool repl_null[Natts_pg_foreign_server]; + bool repl_repl[Natts_pg_foreign_server]; + Oid srvId; + Form_pg_foreign_server srvForm; + + tp = SearchSysCacheCopy(FOREIGNSERVERNAME, + CStringGetDatum(stmt->servername), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("server \"%s\" does not exist", stmt->servername))); + + srvId = HeapTupleGetOid(tp); + srvForm = (Form_pg_foreign_server) GETSTRUCT(tp); + + /* + * Only owner or a superuser can ALTER a SERVER. + */ + if (!pg_foreign_server_ownercheck(srvId, GetUserId())) + aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_FOREIGN_SERVER, + stmt->servername); + + memset(repl_val, 0, sizeof(repl_val)); + memset(repl_null, false, sizeof(repl_null)); + memset(repl_repl, false, sizeof(repl_repl)); + + if (stmt->has_version) + { + /* + * Change the server VERSION string. + */ + if (stmt->version) + repl_val[Anum_pg_foreign_server_srvversion - 1] = + CStringGetTextDatum(stmt->version); + else + repl_null[Anum_pg_foreign_server_srvversion - 1] = true; + + repl_repl[Anum_pg_foreign_server_srvversion - 1] = true; + } + + if (stmt->options) + { + ForeignDataWrapper *fdw = GetForeignDataWrapper(srvForm->srvfdw); + Datum datum; + bool isnull; + + /* Extract the current srvoptions */ + datum = SysCacheGetAttr(FOREIGNSERVEROID, + tp, + Anum_pg_foreign_server_srvoptions, + &isnull); + + /* Prepare the options array */ + datum = transformGenericOptions(datum, stmt->options, ServerOpt, + fdw, fdw->lib->validateOptionList); + + if (OidIsValid(datum)) + repl_val[Anum_pg_foreign_server_srvoptions - 1] = datum; + else + repl_null[Anum_pg_foreign_server_srvoptions - 1] = true; + + repl_repl[Anum_pg_foreign_server_srvoptions - 1] = true; + } + + /* Everything looks good - update the tuple */ + + rel = heap_open(ForeignServerRelationId, RowExclusiveLock); + + tp = heap_modify_tuple(tp, RelationGetDescr(rel), + repl_val, repl_null, repl_repl); + + simple_heap_update(rel, &tp->t_self, tp); + CatalogUpdateIndexes(rel, tp); + + heap_close(rel, RowExclusiveLock); + heap_freetuple(tp); + } + + + /* + * Drop foreign server + */ + void + RemoveForeignServer(DropForeignServerStmt *stmt) + { + Oid srvId; + ObjectAddress object; + + srvId = GetForeignServerOidByName(stmt->servername, true); + + if (!OidIsValid(srvId)) + { + /* Server not found, complain or notice */ + if (!stmt->missing_ok) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("server \"%s\" does not exist", stmt->servername))); + + /* IF EXISTS specified, just note it */ + ereport(NOTICE, + (errmsg("server \"%s\" does not exist, skipping", + stmt->servername))); + return; + } + + /* Only allow DROP if the server is owned by the user. */ + if (!pg_foreign_server_ownercheck(srvId, GetUserId())) + aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_FOREIGN_SERVER, + stmt->servername); + + object.classId = ForeignServerRelationId; + object.objectId = srvId; + object.objectSubId = 0; + + performDeletion(&object, stmt->behavior); + } + + + /* + * Drop foreign server by Oid + */ + void + RemoveForeignServerById(Oid srvId) + { + HeapTuple tp; + Relation rel; + + rel = heap_open(ForeignServerRelationId, RowExclusiveLock); + + tp = SearchSysCache(FOREIGNSERVEROID, + ObjectIdGetDatum(srvId), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + elog(ERROR, "cache lookup failed for foreign server %u", srvId); + + simple_heap_delete(rel, &tp->t_self); + + ReleaseSysCache(tp); + + heap_close(rel, RowExclusiveLock); + } + + + /* + * Create user mapping + */ + void + CreateUserMapping(CreateUserMappingStmt *stmt) + { + Relation rel; + Datum useoptions = InvalidOid; + Datum values[Natts_pg_user_mapping]; + bool nulls[Natts_pg_user_mapping]; + HeapTuple tuple; + Oid useId; + Oid umId; + Oid ownerId; + ObjectAddress myself; + ObjectAddress referenced; + ForeignServer *srv; + ForeignDataWrapper *fdw; + + ownerId = GetUserId(); + + useId = GetUserOidFromMapping(stmt->username, false); + + /* + * Check that the server exists and that the we own it. + */ + srv = GetForeignServerByName(stmt->servername, false); + + if (!pg_foreign_server_ownercheck(srv->serverid, ownerId)) + aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_FOREIGN_SERVER, + stmt->servername); + + /* + * Check that the user mapping is unique within server. + */ + umId = GetSysCacheOid(USERMAPPINGUSERSERVER, + ObjectIdGetDatum(useId), + ObjectIdGetDatum(srv->serverid), + 0, 0); + if (OidIsValid(umId)) + ereport(ERROR, + (errcode(ERRCODE_DUPLICATE_OBJECT), + errmsg("user mapping \"%s\" already exists for server %s", + MappingUserName(useId), + stmt->servername))); + + fdw = GetForeignDataWrapper(srv->fdwid); + + /* + * Insert tuple into pg_user_mapping. + */ + rel = heap_open(UserMappingRelationId, RowExclusiveLock); + + MemSet(nulls, false, Natts_pg_user_mapping); + + values[Anum_pg_user_mapping_umuser - 1] = ObjectIdGetDatum(useId); + values[Anum_pg_user_mapping_umserver - 1] = ObjectIdGetDatum(srv->serverid); + + /* Add user options */ + useoptions = transformGenericOptions(0, stmt->options, UserMappingOpt, + fdw, fdw->lib->validateOptionList); + + if (OidIsValid(useoptions)) + values[Anum_pg_user_mapping_umoptions - 1] = useoptions; + else + nulls[Anum_pg_user_mapping_umoptions - 1] = true; + + tuple = heap_form_tuple(rel->rd_att, values, nulls); + + umId = simple_heap_insert(rel, tuple); + + CatalogUpdateIndexes(rel, tuple); + + heap_freetuple(tuple); + + /* Add dependency on the server */ + myself.classId = UserMappingRelationId; + myself.objectId = umId; + myself.objectSubId = 0; + + referenced.classId = ForeignServerRelationId; + referenced.objectId = srv->serverid; + referenced.objectSubId = 0; + recordDependencyOn(&myself, &referenced, DEPENDENCY_NORMAL); + + if (OidIsValid(useId)) + /* Record the mapped user dependency */ + recordDependencyOnOwner(UserMappingRelationId, umId, useId); + + heap_close(rel, NoLock); + } + + + /* + * Alter user mapping + */ + void + AlterUserMapping(AlterUserMappingStmt *stmt) + { + Relation rel; + HeapTuple tp; + Datum repl_val[Natts_pg_user_mapping]; + bool repl_null[Natts_pg_user_mapping]; + bool repl_repl[Natts_pg_user_mapping]; + Oid useId; + Oid umId; + ForeignServer *srv; + + useId = GetUserOidFromMapping(stmt->username, false); + srv = GetForeignServerByName(stmt->servername, false); + + umId = GetSysCacheOid(USERMAPPINGUSERSERVER, + ObjectIdGetDatum(useId), + ObjectIdGetDatum(srv->serverid), + 0, 0); + if (!OidIsValid(umId)) + { + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("user mapping \"%s\" does not exist for the server", + MappingUserName(useId)))); + } + + /* + * Must be owner of the server to alter user mapping. + */ + if (!pg_foreign_server_ownercheck(srv->serverid, GetUserId())) + aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_FOREIGN_SERVER, + stmt->servername); + + tp = SearchSysCacheCopy(USERMAPPINGOID, + ObjectIdGetDatum(umId), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + elog(ERROR, "cache lookup failed for user mapping %u", umId); + + memset(repl_val, 0, sizeof(repl_val)); + memset(repl_null, false, sizeof(repl_null)); + memset(repl_repl, false, sizeof(repl_repl)); + + if (stmt->options) + { + ForeignDataWrapper *fdw; + Datum datum; + bool isnull; + + /* + * Process the options. + */ + + fdw = GetForeignDataWrapper(srv->fdwid); + + datum = SysCacheGetAttr(USERMAPPINGUSERSERVER, + tp, + Anum_pg_user_mapping_umoptions, + &isnull); + + /* Prepare the options array */ + datum = transformGenericOptions(datum, stmt->options, UserMappingOpt, + fdw, fdw->lib->validateOptionList); + + if (OidIsValid(datum)) + repl_val[Anum_pg_user_mapping_umoptions - 1] = datum; + else + repl_null[Anum_pg_user_mapping_umoptions - 1] = true; + + repl_repl[Anum_pg_user_mapping_umoptions - 1] = true; + } + + /* Everything looks good - update the tuple */ + + rel = heap_open(UserMappingRelationId, RowExclusiveLock); + + tp = heap_modify_tuple(tp, RelationGetDescr(rel), + repl_val, repl_null, repl_repl); + + simple_heap_update(rel, &tp->t_self, tp); + CatalogUpdateIndexes(rel, tp); + + heap_close(rel, RowExclusiveLock); + heap_freetuple(tp); + } + + + /* + * Drop user mapping + */ + void + RemoveUserMapping(DropUserMappingStmt *stmt) + { + ObjectAddress object; + Oid useId; + Oid umId; + ForeignServer *srv; + + useId = GetUserOidFromMapping(stmt->username, stmt->missing_ok); + srv = GetForeignServerByName(stmt->servername, true); + + if (stmt->username && !OidIsValid(useId)) + { + /* + * IF EXISTS specified, role not found and not public. + * Notice this and leave. + */ + elog(NOTICE, "role \"%s\" does not exist, skipping", stmt->username); + return; + } + + if (!srv) + { + if (!stmt->missing_ok) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("server \"%s\" does not exist", + stmt->servername))); + /* IF EXISTS, just note it */ + ereport(NOTICE, (errmsg("server does not exist, skipping"))); + return; + } + + umId = GetSysCacheOid(USERMAPPINGUSERSERVER, + ObjectIdGetDatum(useId), + ObjectIdGetDatum(srv->serverid), + 0, 0); + + if (!OidIsValid(umId)) + { + if (!stmt->missing_ok) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("user mapping \"%s\" does not exist for the server", + MappingUserName(useId)))); + + /* IF EXISTS specified, just note it */ + ereport(NOTICE, + (errmsg("user mapping \"%s\" does not exist for the server, skipping", + MappingUserName(useId)))); + return; + } + + /* + * Only allow DROP if we own the server. + */ + if (!pg_foreign_server_ownercheck(srv->serverid, GetUserId())) + { + aclcheck_error(ACLCHECK_NOT_OWNER, ACL_KIND_FOREIGN_SERVER, + srv->servername); + } + + /* + * Do the deletion + */ + object.classId = UserMappingRelationId; + object.objectId = umId; + object.objectSubId = 0; + + performDeletion(&object, DROP_CASCADE); + } + + + /* + * Drop user mapping by oid - this is called to clean up + * dependencies. + */ + void + RemoveUserMappingById(Oid umId) + { + HeapTuple tp; + Relation rel; + + rel = heap_open(UserMappingRelationId, RowExclusiveLock); + + tp = SearchSysCache(USERMAPPINGOID, + ObjectIdGetDatum(umId), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + elog(ERROR, "cache lookup failed for user mapping %u", umId); + + simple_heap_delete(rel, &tp->t_self); + + ReleaseSysCache(tp); + + heap_close(rel, RowExclusiveLock); + } diff -cNr -x CVS cvs-pgsql/src/backend/foreign/Makefile pgsql/src/backend/foreign/Makefile *** cvs-pgsql/src/backend/foreign/Makefile Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/foreign/Makefile Mon Dec 15 13:23:47 2008 *************** *** 0 **** --- 1,25 ---- + #------------------------------------------------------------------------- + # + # Makefile-- + # Makefile for foreign + # + # IDENTIFICATION + # $PostgreSQL$ + # + #------------------------------------------------------------------------- + + subdir = src/backend/foreign + top_builddir = ../../.. + include $(top_builddir)/src/Makefile.global + + OBJS= foreign.o + + include $(top_srcdir)/src/backend/common.mk + + FDW = dummy postgresql + + $(addsuffix -fdw,all install installdirs uninstall distprep): + for dir in $(FDW); do $(MAKE) -C $$dir `echo $@ | sed 's/-fdw$$//'` || exit; done + + clean distclean maintainer-clean: + for dir in $(FDW); do $(MAKE) -C $$dir $@ || exit; done diff -cNr -x CVS cvs-pgsql/src/backend/foreign/dummy/Makefile pgsql/src/backend/foreign/dummy/Makefile *** cvs-pgsql/src/backend/foreign/dummy/Makefile Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/foreign/dummy/Makefile Mon Dec 15 13:23:21 2008 *************** *** 0 **** --- 1,27 ---- + #------------------------------------------------------------------------- + # + # Makefile-- + # Makefile for dummy foreign-data wrapper + # + # IDENTIFICATION + # $PostgreSQL$ + # + #------------------------------------------------------------------------- + + subdir = src/backend/foreign/dummy + top_builddir = ../../../.. + include $(top_builddir)/src/Makefile.global + + NAME = dummy_fdw + OBJS = dummy_fdw.o + + include $(top_srcdir)/src/Makefile.shlib + + all: all-shared-lib + + install: all install-lib + + installdirs: installdirs-lib + + clean distclean maintainer-clean: clean-lib + rm -f $(OBJS) diff -cNr -x CVS cvs-pgsql/src/backend/foreign/dummy/dummy_fdw.c pgsql/src/backend/foreign/dummy/dummy_fdw.c *** cvs-pgsql/src/backend/foreign/dummy/dummy_fdw.c Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/foreign/dummy/dummy_fdw.c Tue Dec 16 16:16:53 2008 *************** *** 0 **** --- 1,57 ---- + /*------------------------------------------------------------------------- + * + * dummy_fdw.c + * "dummy" foreign-data wrapper + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * + * IDENTIFICATION + * $PostgreSQL$ + * + *------------------------------------------------------------------------- + */ + #include "postgres.h" + + #include "fmgr.h" + #include "foreign/foreign.h" + + PG_MODULE_MAGIC; + + + /* + * Validate the DefElem list given as FDW, SERVER or USER MAPPING generic + * options. "flag" indicates which kind of options are we interested in. + * Raise an ERROR if the option or its value is considered. + * + * Note: When validating new FDW the fdw parameter is NULL. + * + * No validation in the dummy wrapper. + */ + void + _pg_validateOptionList(ForeignDataWrapper *fdw, GenericOptionFlags flags, + List *options) + { + } + + /* + * Provide the connection details as DefElem list. Here, in the dummy + * FDW we just merge all of the server and user mapping options and + * hope that the client can cope with that. + */ + List * + _pg_GetConnectionInfo(ForeignDataWrapper *fdw, ForeignServer *server, + UserMapping *um) + { + List *result = NIL; + ListCell *cell; + + /* Add server options */ + foreach (cell, server->options) + result = lappend(result, lfirst(cell)); + /* Add user mapping options */ + foreach (cell, um->options) + result = lappend(result, lfirst(cell)); + + /* And we're done */ + return result; + } diff -cNr -x CVS cvs-pgsql/src/backend/foreign/foreign.c pgsql/src/backend/foreign/foreign.c *** cvs-pgsql/src/backend/foreign/foreign.c Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/foreign/foreign.c Tue Dec 16 16:45:07 2008 *************** *** 0 **** --- 1,536 ---- + /*------------------------------------------------------------------------- + * + * foreign.c + * support for foreign-data wrappers, servers and user mappings. + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * + * IDENTIFICATION + * $PostgreSQL$ + * + *------------------------------------------------------------------------- + */ + #include "postgres.h" + + #include "access/reloptions.h" + #include "catalog/namespace.h" + #include "catalog/pg_foreign_data_wrapper.h" + #include "catalog/pg_foreign_server.h" + #include "catalog/pg_type.h" + #include "catalog/pg_user_mapping.h" + #include "foreign/foreign.h" + #include "funcapi.h" + #include "miscadmin.h" + #include "nodes/parsenodes.h" + #include "utils/acl.h" + #include "utils/array.h" + #include "utils/builtins.h" + #include "utils/lsyscache.h" + #include "utils/memutils.h" + #include "utils/syscache.h" + + + extern Datum pg_get_remote_connection_info(PG_FUNCTION_ARGS); + extern Datum pg_get_user_mapping_options(PG_FUNCTION_ARGS); + extern Datum pg_get_foreign_data_wrapper_options(PG_FUNCTION_ARGS); + extern Datum pg_get_foreign_server_options(PG_FUNCTION_ARGS); + + + /* list of currently loaded foreign-data wrapper interfaces */ + static List *loaded_fdw_interfaces = NIL; + + + /* + * GetForeignDataWrapperLibrary - return the named FDW library. If it + * is already loaded, use that. Otherwise allocate, initialize, and + * store in cache. + */ + ForeignDataWrapperLibrary * + GetForeignDataWrapperLibrary(const char *libname) + { + MemoryContext oldcontext; + void *libhandle = NULL; + ForeignDataWrapperLibrary *fdwl = NULL; + ListCell *cell; + + /* See if we have the FDW library is already loaded */ + foreach (cell, loaded_fdw_interfaces) + { + fdwl = lfirst(cell); + if (strcmp(fdwl->libname, libname) == 0) + return fdwl; + } + + /* + * We don't have it yet, so load and add. Attempt a load_file() + * first to filter out any missing or unloadable libraries. + */ + load_file(libname, false); + + oldcontext = MemoryContextSwitchTo(TopMemoryContext); + + fdwl = palloc(sizeof(*fdwl)); + fdwl->libname = pstrdup(libname); + loaded_fdw_interfaces = lappend(loaded_fdw_interfaces, fdwl); + + MemoryContextSwitchTo(oldcontext); + + /* + * Now look up the foreign data wrapper functions. + */ + #define LOOKUP_FUNCTION(name) \ + (void *)(libhandle ? \ + lookup_external_function(libhandle, name) \ + : load_external_function(fdwl->libname, name, false, &libhandle)) + + fdwl->GetConnectionInfo = LOOKUP_FUNCTION("_pg_GetConnectionInfo"); + fdwl->validateOptionList = LOOKUP_FUNCTION("_pg_validateOptionList"); + + return fdwl; + } + + + /* + * GetForeignDataWrapper - look up the foreign-data wrapper by OID. + * + * Here we also deal with loading the FDW library and looking up the + * actual functions. + */ + ForeignDataWrapper * + GetForeignDataWrapper(Oid fdwid) + { + Form_pg_foreign_data_wrapper fdwform; + ForeignDataWrapper *fdw; + Datum datum; + HeapTuple tp; + bool isnull; + + tp = SearchSysCache(FOREIGNDATAWRAPPEROID, + ObjectIdGetDatum(fdwid), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + elog(ERROR, "cache lookup failed for foreign-data wrapper %u", fdwid); + + fdwform = (Form_pg_foreign_data_wrapper) GETSTRUCT(tp); + + fdw = palloc(sizeof(ForeignDataWrapper)); + fdw->fdwid = fdwid; + fdw->owner = fdwform->fdwowner; + fdw->fdwname = pstrdup(NameStr(fdwform->fdwname)); + + /* Extract library name */ + datum = SysCacheGetAttr(FOREIGNDATAWRAPPEROID, + tp, + Anum_pg_foreign_data_wrapper_fdwlibrary, + &isnull); + fdw->fdwlibrary = pstrdup(TextDatumGetCString(datum)); + + fdw->lib = GetForeignDataWrapperLibrary(fdw->fdwlibrary); + + /* Extract the useoptions */ + datum = SysCacheGetAttr(FOREIGNDATAWRAPPEROID, + tp, + Anum_pg_foreign_data_wrapper_fdwoptions, + &isnull); + fdw->options = untransformRelOptions(datum); + + ReleaseSysCache(tp); + + return fdw; + } + + + /* + * GetForeignDataWrapperOidByName - look up the foreign-data wrapper + * OID by name. + */ + Oid + GetForeignDataWrapperOidByName(const char *fdwname, bool missing_ok) + { + Oid fdwId; + + fdwId = GetSysCacheOid(FOREIGNDATAWRAPPERNAME, + CStringGetDatum(fdwname), + 0, 0, 0); + + if (!OidIsValid(fdwId) && !missing_ok) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("foreign-data wrapper \"%s\" does not exist", fdwname))); + + return fdwId; + } + + + /* + * GetForeignDataWrapperByName - look up the foreign-data wrapper + * definition by name. + */ + ForeignDataWrapper * + GetForeignDataWrapperByName(const char *fdwname, bool missing_ok) + { + Oid fdwId = GetForeignDataWrapperOidByName(fdwname, missing_ok); + + if (!OidIsValid(fdwId) && missing_ok) + return NULL; + + return GetForeignDataWrapper(fdwId); + } + + + /* + * GetForeignServer - look up the foreign server definition. + */ + ForeignServer * + GetForeignServer(Oid serverid) + { + Form_pg_foreign_server serverform; + ForeignServer *server; + HeapTuple tp; + Datum datum; + bool isnull; + + tp = SearchSysCache(FOREIGNSERVEROID, + ObjectIdGetDatum(serverid), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + elog(ERROR, "cache lookup failed for foreign server %u", serverid); + + serverform = (Form_pg_foreign_server) GETSTRUCT(tp); + + server = palloc(sizeof(ForeignServer)); + server->serverid = serverid; + server->servername = pstrdup(NameStr(serverform->srvname)); + server->owner = serverform->srvowner; + server->fdwid = serverform->srvfdw; + + /* Extract server type */ + datum = SysCacheGetAttr(FOREIGNSERVEROID, + tp, + Anum_pg_foreign_server_srvtype, + &isnull); + server->servertype = isnull ? NULL : pstrdup(TextDatumGetCString(datum)); + + /* Extract server version */ + datum = SysCacheGetAttr(FOREIGNSERVEROID, + tp, + Anum_pg_foreign_server_srvversion, + &isnull); + server->serverversion = isnull ? NULL : pstrdup(TextDatumGetCString(datum)); + + /* Extract the srvoptions */ + datum = SysCacheGetAttr(FOREIGNSERVEROID, + tp, + Anum_pg_foreign_server_srvoptions, + &isnull); + + /* untransformRelOptions does exactly what we want - avoid duplication */ + server->options = untransformRelOptions(datum); + + ReleaseSysCache(tp); + + return server; + } + + + /* + * GetForeignServerByName - look up the foreign server oid by name. + */ + Oid + GetForeignServerOidByName(const char *srvname, bool missing_ok) + { + Oid serverid; + + serverid = GetSysCacheOid(FOREIGNSERVERNAME, + CStringGetDatum(srvname), + 0, 0, 0); + + if (!OidIsValid(serverid) && !missing_ok) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("server \"%s\" does not exist", srvname))); + + return serverid; + } + + + /* + * GetForeignServerByName - look up the foreign server definition by name. + */ + ForeignServer * + GetForeignServerByName(const char *srvname, bool missing_ok) + { + Oid serverid = GetForeignServerOidByName(srvname, missing_ok); + + if (!OidIsValid(serverid) && missing_ok) + return NULL; + + return GetForeignServer(serverid); + } + + + /* + * GetUserMapping - look up the user mapping. + * + * If no mapping is found for the supplied user, we also look for + * PUBLIC mappings (userid == InvalidOid). + */ + UserMapping * + GetUserMapping(Oid userid, Oid serverid) + { + Form_pg_user_mapping umform; + Datum datum; + HeapTuple tp; + bool isnull; + UserMapping *um; + + tp = SearchSysCache(USERMAPPINGUSERSERVER, + ObjectIdGetDatum(userid), + ObjectIdGetDatum(serverid), + 0, 0); + + if (!HeapTupleIsValid(tp)) + { + /* Not found for the specific user -- try PUBLIC */ + tp = SearchSysCache(USERMAPPINGUSERSERVER, + ObjectIdGetDatum(InvalidOid), + ObjectIdGetDatum(serverid), + 0, 0); + } + + if (!HeapTupleIsValid(tp)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("user mapping not found for \"%s\"", + MappingUserName(userid)))); + + umform = (Form_pg_user_mapping) GETSTRUCT(tp); + + /* Extract the umoptions */ + datum = SysCacheGetAttr(USERMAPPINGUSERSERVER, + tp, + Anum_pg_user_mapping_umoptions, + &isnull); + + um = palloc(sizeof(UserMapping)); + um->userid = userid; + um->serverid = serverid; + um->options = untransformRelOptions(datum); + + ReleaseSysCache(tp); + + return um; + } + + + /* + * GetRemoteConnectionInfo + * + * Look up the server, FDW, and user mapping. For non-public mappings + * (userid != InvalidOid), first validate that the supplied user has + * USAGE on the server. Then call FDW to provide the connection + * details. + */ + List * + GetRemoteConnectionInfo(Oid serverid, Oid userid) + { + ForeignServer *server; + UserMapping *um; + ForeignDataWrapper *fdw; + AclResult aclresult; + + server = GetForeignServer(serverid); + + /* check permissions */ + if (OidIsValid(userid)) + { + aclresult = pg_foreign_server_aclcheck(serverid, userid, ACL_USAGE); + if (aclresult != ACLCHECK_OK) + aclcheck_error(aclresult, ACL_KIND_FOREIGN_SERVER, + server->servername); + } + + um = GetUserMapping(userid, serverid); + fdw = GetForeignDataWrapper(server->fdwid); + + if (fdw->lib->GetConnectionInfo == NULL) + ereport(ERROR, + (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), + errmsg("foreign-data wrapper does not provide connection lookup"))); + + return fdw->lib->GetConnectionInfo(fdw, server, um); + } + + + /* + * deflist_to_tuplestore - Helper function to convert DefElem list to + * tuplestore usable in SRF. + */ + static void + deflist_to_tuplestore(ReturnSetInfo *rsinfo, List *options) + { + ListCell *cell; + TupleDesc tupdesc; + Tuplestorestate *tupstore; + Datum values[2]; + bool nulls[2] = { 0 }; + MemoryContext per_query_ctx; + MemoryContext oldcontext; + + /* check to see if caller supports us returning a tuplestore */ + if (rsinfo == NULL || !IsA(rsinfo, ReturnSetInfo)) + ereport(ERROR, + (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), + errmsg("set-valued function called in context that cannot accept a set"))); + if (!(rsinfo->allowedModes & SFRM_Materialize)) + ereport(ERROR, + (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), + errmsg("materialize mode required, but it is not " \ + "allowed in this context"))); + + per_query_ctx = rsinfo->econtext->ecxt_per_query_memory; + oldcontext = MemoryContextSwitchTo(per_query_ctx); + + /* + * Now prepare the result set. + */ + tupdesc = CreateTupleDescCopy(rsinfo->expectedDesc); + tupstore = tuplestore_begin_heap(true, false, work_mem); + rsinfo->returnMode = SFRM_Materialize; + rsinfo->setResult = tupstore; + rsinfo->setDesc = tupdesc; + + foreach (cell, options) + { + DefElem *def = lfirst(cell); + + values[0] = CStringGetTextDatum(def->defname); + values[1] = CStringGetTextDatum(((Value *)def->arg)->val.str); + tuplestore_putvalues(tupstore, tupdesc, values, nulls); + } + + /* clean up and return the tuplestore */ + tuplestore_donestoring(tupstore); + + MemoryContextSwitchTo(oldcontext); + } + + + /* + * pg_get_remote_connection_info - provide connection details for the + * server/user pair. + * + * By default we use current effective user id for privilege check and + * user mapping lookup. Alternatively another username (or public) can + * be specified by second parameter. + * + */ + Datum + pg_get_remote_connection_info(PG_FUNCTION_ARGS) + { + Name servername = PG_GETARG_NAME(0); + Oid userid; + ForeignServer *srv; + + if (PG_NARGS() == 2) + { + /* Use the provided username for mapping and privilege check */ + Name username = PG_GETARG_NAME(1); + + if (pg_strcasecmp(NameStr(*username), "public") == 0) + userid = InvalidOid; + else + userid = get_roleid_checked(NameStr(*username)); + } + else + { + /* Otherwise use the effective user id */ + userid = GetUserId(); + } + + srv = GetForeignServerByName(NameStr(*servername), false); + + deflist_to_tuplestore((ReturnSetInfo *) fcinfo->resultinfo, + GetRemoteConnectionInfo(srv->serverid, userid)); + + return (Datum) 0; + } + + + /* + * pg_get_foreign_data_wrapper_options - Return the options for a + * foreign data wrapper. + * + * pg_get_foreign_data_wrapper_options(srvId IN text, option OUT text, value OUT text) + */ + Datum + pg_get_foreign_data_wrapper_options(PG_FUNCTION_ARGS) + { + Oid fdwId = PG_GETARG_OID(0); + ForeignDataWrapper *fdw = GetForeignDataWrapper(fdwId); + + deflist_to_tuplestore((ReturnSetInfo *) fcinfo->resultinfo, fdw->options); + + return (Datum) 0; + } + + + /* + * pg_get_foreign_server_options - Return the options for a foreign + * server. + * + * pg_get_foreign_server_options(srvId IN text, option OUT text, value OUT text) + */ + Datum + pg_get_foreign_server_options(PG_FUNCTION_ARGS) + { + Oid srvId = PG_GETARG_OID(0); + ForeignServer *srv = GetForeignServer(srvId); + + deflist_to_tuplestore((ReturnSetInfo *) fcinfo->resultinfo, srv->options); + + return (Datum) 0; + } + + + /* + * pg_get_user_mapping_options - Return the user mapping options for + * the specified mapping. The options are only visible to server + * owner or superuser -- return empty result set for others. + */ + Datum + pg_get_user_mapping_options(PG_FUNCTION_ARGS) + { + Oid umId = PG_GETARG_OID(0); + Oid srvId; + Oid useId; + HeapTuple tp; + UserMapping *um; + List *umoptions = NIL; + + tp = SearchSysCache(USERMAPPINGOID, + ObjectIdGetDatum(umId), + 0, 0, 0); + + if (!HeapTupleIsValid(tp)) + ereport(ERROR, + (errcode(ERRCODE_UNDEFINED_OBJECT), + errmsg("user mapping %u not found", umId))); + + srvId = ((Form_pg_user_mapping) GETSTRUCT(tp))->umserver; + useId = ((Form_pg_user_mapping) GETSTRUCT(tp))->umuser; + + ReleaseSysCache(tp); + + um = GetUserMapping(useId, srvId); + + /* Server owner -- OK to show user mapping options */ + if (pg_foreign_server_ownercheck(srvId, GetUserId())) + umoptions = um->options; + + deflist_to_tuplestore((ReturnSetInfo *) fcinfo->resultinfo, umoptions); + + return (Datum) 0; + } diff -cNr -x CVS cvs-pgsql/src/backend/foreign/postgresql/Makefile pgsql/src/backend/foreign/postgresql/Makefile *** cvs-pgsql/src/backend/foreign/postgresql/Makefile Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/foreign/postgresql/Makefile Mon Dec 15 13:24:14 2008 *************** *** 0 **** --- 1,27 ---- + #------------------------------------------------------------------------- + # + # Makefile-- + # Makefile for postgresql foreign-data wrapper + # + # IDENTIFICATION + # $PostgreSQL$ + # + #------------------------------------------------------------------------- + + subdir = src/backend/foreign/postgresql + top_builddir = ../../../.. + include $(top_builddir)/src/Makefile.global + + NAME = postgresql_fdw + OBJS = postgresql_fdw.o + + include $(top_srcdir)/src/Makefile.shlib + + all: all-shared-lib + + install: all install-lib + + installdirs: installdirs-lib + + clean distclean maintainer-clean: clean-lib + rm -f $(OBJS) diff -cNr -x CVS cvs-pgsql/src/backend/foreign/postgresql/postgresql_fdw.c pgsql/src/backend/foreign/postgresql/postgresql_fdw.c *** cvs-pgsql/src/backend/foreign/postgresql/postgresql_fdw.c Thu Jan 1 02:00:00 1970 --- pgsql/src/backend/foreign/postgresql/postgresql_fdw.c Tue Dec 16 16:16:53 2008 *************** *** 0 **** --- 1,172 ---- + /*------------------------------------------------------------------------- + * + * postgresql_fdw.c + * foreign-data wrapper for postgresql (libpq) connections. + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * + * IDENTIFICATION + * $PostgreSQL$ + * + *------------------------------------------------------------------------- + */ + #include "postgres.h" + + #include "fmgr.h" + #include "lib/stringinfo.h" + #include "nodes/value.h" + #include "nodes/parsenodes.h" + #include "nodes/makefuncs.h" + #include "foreign/foreign.h" + + PG_MODULE_MAGIC; + + + /* + * Describes the valid options for postgresql FDW, server and user mapping. + */ + typedef struct ConnectionOptions { + const char *optname; /* Option name */ + GenericOptionFlags optflags; /* Option usage bitmap */ + } ConnectionOptions; + + /* + * Copied from fe-connect.c PQconninfoOptions. + * + * The list is small - don't bother with bsearch if it stays so. + */ + static ConnectionOptions libpq_conninfo_options[] = { + { "authtype", ServerOpt }, + { "service", ServerOpt }, + { "user", UserMappingOpt }, + { "password", UserMappingOpt }, + { "connect_timeout", ServerOpt }, + { "dbname", ServerOpt }, + { "host", ServerOpt }, + { "hostaddr", ServerOpt }, + { "port", ServerOpt }, + { "tty", ServerOpt }, + { "options", ServerOpt }, + { "requiressl", ServerOpt }, + { "sslmode", ServerOpt }, + { "gsslib", ServerOpt }, + { NULL, InvalidOpt } + }; + + void _PG_fini(void); + + + /* + * Check if the provided option is one of libpq conninfo options. + * We look at only options with matching flags. + */ + static bool + is_conninfo_option(const char *option, GenericOptionFlags flags) + { + ConnectionOptions *opt; + + for (opt = libpq_conninfo_options; opt->optname != NULL; opt++) + if (flags & opt->optflags && strcmp(opt->optname, option) == 0) + return true; + return false; + } + + /* + * Validate the generic option given to SERVER or USER MAPPING. + * Raise an ERROR if the option or its value is considered + * invalid. + * + * Valid server options are all libpq conninfo options except + * user and password -- these may only appear in USER MAPPING options. + */ + void + _pg_validateOptionList(ForeignDataWrapper *fdw, GenericOptionFlags flags, + List *options) + { + ListCell *cell; + + foreach (cell, options) + { + DefElem *def = lfirst(cell); + + if (!is_conninfo_option(def->defname, flags)) + { + ConnectionOptions *opt; + StringInfoData buf; + const char *objtype; + + /* + * Unknown option specified, complain about it. Provide a hint + * with list of valid options for the object. + */ + initStringInfo(&buf); + for (opt = libpq_conninfo_options; opt->optname != NULL; opt++) + if (flags & opt->optflags) + appendStringInfo(&buf, "%s%s", (buf.len > 0) ? ", " : "", + opt->optname); + + if (flags & ServerOpt) + objtype = "server"; + else if (flags & UserMappingOpt) + objtype = "user mapping"; + else if (flags & FdwOpt) + objtype = "foreign-data wrapper"; + else + objtype = "???"; + + ereport(ERROR, + (errcode(ERRCODE_SYNTAX_ERROR), + errmsg("invalid option \"%s\" to %s", def->defname, objtype), + errhint("valid %s options are: %s", objtype, buf.data))); + } + } + } + + /* + * Provide the connection details as DefElem list. + * + * The known libpq conninfo parameters are merged into a single connect + * string and returned under the option name of "datasource". Unrecognized + * options are returned unmodified. + */ + List * + _pg_GetConnectionInfo(ForeignDataWrapper *fdw, ForeignServer *server, + UserMapping *um) + { + List *result = NIL; + ListCell *cell; + StringInfo stringptr; + DefElem *datasource; + + stringptr = makeStringInfo(); + + /* Add server options */ + foreach (cell, server->options) + { + DefElem *def = lfirst(cell); + + if (is_conninfo_option(def->defname, ServerOpt)) + appendStringInfo(stringptr, "%s%s=%s", + (stringptr->len > 0) ? " " : "", def->defname, strVal(def->arg)); + else + result = lappend(result, lfirst(cell)); + } + + /* And the user mapping options */ + foreach (cell, um->options) + { + DefElem *def = lfirst(cell); + + if (is_conninfo_option(def->defname, UserMappingOpt)) + appendStringInfo(stringptr, "%s%s=%s", + (stringptr->len > 0) ? " " : "", def->defname, strVal(def->arg)); + else + result = lappend(result, lfirst(cell)); + } + + /* Finally the compiled conninfo string */ + datasource = makeDefElem("datasource", (Node *)makeString(stringptr->data)); + result = lappend(result, datasource); + + return result; + } diff -cNr -x CVS cvs-pgsql/src/backend/nodes/copyfuncs.c pgsql/src/backend/nodes/copyfuncs.c *** cvs-pgsql/src/backend/nodes/copyfuncs.c Fri Dec 5 15:06:23 2008 --- pgsql/src/backend/nodes/copyfuncs.c Fri Dec 12 10:44:15 2008 *************** *** 2033,2038 **** --- 2033,2049 ---- return newnode; } + static OptionDefElem * + _copyOptionDefElem(OptionDefElem *from) + { + OptionDefElem *newnode = makeNode(OptionDefElem); + + COPY_SCALAR_FIELD(alter_op); + COPY_NODE_FIELD(def); + + return newnode; + } + static LockingClause * _copyLockingClause(LockingClause *from) { *************** *** 2869,2874 **** --- 2880,2996 ---- return newnode; } + static CreateFdwStmt * + _copyCreateFdwStmt(CreateFdwStmt *from) + { + CreateFdwStmt *newnode = makeNode(CreateFdwStmt); + + COPY_STRING_FIELD(fdwname); + COPY_STRING_FIELD(library); + COPY_NODE_FIELD(options); + + return newnode; + } + + static AlterFdwStmt * + _copyAlterFdwStmt(AlterFdwStmt *from) + { + AlterFdwStmt *newnode = makeNode(AlterFdwStmt); + + COPY_STRING_FIELD(fdwname); + COPY_STRING_FIELD(library); + COPY_NODE_FIELD(options); + + return newnode; + } + + static DropFdwStmt * + _copyDropFdwStmt(DropFdwStmt *from) + { + DropFdwStmt *newnode = makeNode(DropFdwStmt); + + COPY_STRING_FIELD(fdwname); + COPY_SCALAR_FIELD(missing_ok); + COPY_SCALAR_FIELD(behavior); + + return newnode; + } + + static CreateForeignServerStmt * + _copyCreateForeignServerStmt(CreateForeignServerStmt *from) + { + CreateForeignServerStmt *newnode = makeNode(CreateForeignServerStmt); + + COPY_STRING_FIELD(servername); + COPY_STRING_FIELD(servertype); + COPY_STRING_FIELD(version); + COPY_STRING_FIELD(fdwname); + COPY_NODE_FIELD(options); + + return newnode; + } + + static AlterForeignServerStmt * + _copyAlterForeignServerStmt(AlterForeignServerStmt *from) + { + AlterForeignServerStmt *newnode = makeNode(AlterForeignServerStmt); + + COPY_STRING_FIELD(servername); + COPY_STRING_FIELD(version); + COPY_NODE_FIELD(options); + COPY_SCALAR_FIELD(has_version); + + return newnode; + } + + static DropForeignServerStmt * + _copyDropForeignServerStmt(DropForeignServerStmt *from) + { + DropForeignServerStmt *newnode = makeNode(DropForeignServerStmt); + + COPY_STRING_FIELD(servername); + COPY_SCALAR_FIELD(missing_ok); + COPY_SCALAR_FIELD(behavior); + + return newnode; + } + + static CreateUserMappingStmt * + _copyCreateUserMappingStmt(CreateUserMappingStmt *from) + { + CreateUserMappingStmt *newnode = makeNode(CreateUserMappingStmt); + + COPY_STRING_FIELD(username); + COPY_STRING_FIELD(servername); + COPY_NODE_FIELD(options); + + return newnode; + } + + static AlterUserMappingStmt * + _copyAlterUserMappingStmt(AlterUserMappingStmt *from) + { + AlterUserMappingStmt *newnode = makeNode(AlterUserMappingStmt); + + COPY_STRING_FIELD(username); + COPY_STRING_FIELD(servername); + COPY_NODE_FIELD(options); + + return newnode; + } + + static DropUserMappingStmt * + _copyDropUserMappingStmt(DropUserMappingStmt *from) + { + DropUserMappingStmt *newnode = makeNode(DropUserMappingStmt); + + COPY_STRING_FIELD(username); + COPY_STRING_FIELD(servername); + COPY_SCALAR_FIELD(missing_ok); + + return newnode; + } + static CreateTrigStmt * _copyCreateTrigStmt(CreateTrigStmt *from) { *************** *** 3696,3701 **** --- 3818,3850 ---- case T_DropTableSpaceStmt: retval = _copyDropTableSpaceStmt(from); break; + case T_CreateFdwStmt: + retval = _copyCreateFdwStmt(from); + break; + case T_AlterFdwStmt: + retval = _copyAlterFdwStmt(from); + break; + case T_DropFdwStmt: + retval = _copyDropFdwStmt(from); + break; + case T_CreateForeignServerStmt: + retval = _copyCreateForeignServerStmt(from); + break; + case T_AlterForeignServerStmt: + retval = _copyAlterForeignServerStmt(from); + break; + case T_DropForeignServerStmt: + retval = _copyDropForeignServerStmt(from); + break; + case T_CreateUserMappingStmt: + retval = _copyCreateUserMappingStmt(from); + break; + case T_AlterUserMappingStmt: + retval = _copyAlterUserMappingStmt(from); + break; + case T_DropUserMappingStmt: + retval = _copyDropUserMappingStmt(from); + break; case T_CreateTrigStmt: retval = _copyCreateTrigStmt(from); break; *************** *** 3823,3828 **** --- 3972,3980 ---- case T_DefElem: retval = _copyDefElem(from); break; + case T_OptionDefElem: + retval = _copyOptionDefElem(from); + break; case T_LockingClause: retval = _copyLockingClause(from); break; diff -cNr -x CVS cvs-pgsql/src/backend/nodes/equalfuncs.c pgsql/src/backend/nodes/equalfuncs.c *** cvs-pgsql/src/backend/nodes/equalfuncs.c Fri Dec 5 15:06:23 2008 --- pgsql/src/backend/nodes/equalfuncs.c Fri Dec 12 10:44:15 2008 *************** *** 1519,1524 **** --- 1519,1617 ---- } static bool + _equalCreateFdwStmt(CreateFdwStmt *a, CreateFdwStmt *b) + { + COMPARE_STRING_FIELD(fdwname); + COMPARE_STRING_FIELD(library); + COMPARE_NODE_FIELD(options); + + return true; + } + + static bool + _equalAlterFdwStmt(AlterFdwStmt *a, AlterFdwStmt *b) + { + COMPARE_STRING_FIELD(fdwname); + COMPARE_STRING_FIELD(library); + COMPARE_NODE_FIELD(options); + + return true; + } + + static bool + _equalDropFdwStmt(DropFdwStmt *a, DropFdwStmt *b) + { + COMPARE_STRING_FIELD(fdwname); + COMPARE_SCALAR_FIELD(missing_ok); + COMPARE_SCALAR_FIELD(behavior); + + return true; + } + + static bool + _equalCreateForeignServerStmt(CreateForeignServerStmt *a, CreateForeignServerStmt *b) + { + COMPARE_STRING_FIELD(servername); + COMPARE_STRING_FIELD(servertype); + COMPARE_STRING_FIELD(version); + COMPARE_STRING_FIELD(fdwname); + COMPARE_NODE_FIELD(options); + + return true; + } + + static bool + _equalAlterForeignServerStmt(AlterForeignServerStmt *a, AlterForeignServerStmt *b) + { + COMPARE_STRING_FIELD(servername); + COMPARE_STRING_FIELD(version); + COMPARE_NODE_FIELD(options); + COMPARE_SCALAR_FIELD(has_version); + + return true; + } + + static bool + _equalDropForeignServerStmt(DropForeignServerStmt *a, DropForeignServerStmt *b) + { + COMPARE_STRING_FIELD(servername); + COMPARE_SCALAR_FIELD(missing_ok); + COMPARE_SCALAR_FIELD(behavior); + + return true; + } + + static bool + _equalCreateUserMappingStmt(CreateUserMappingStmt *a, CreateUserMappingStmt *b) + { + COMPARE_STRING_FIELD(username); + COMPARE_STRING_FIELD(servername); + COMPARE_NODE_FIELD(options); + + return true; + } + + static bool + _equalAlterUserMappingStmt(AlterUserMappingStmt *a, AlterUserMappingStmt *b) + { + COMPARE_STRING_FIELD(username); + COMPARE_STRING_FIELD(servername); + COMPARE_NODE_FIELD(options); + + return true; + } + + static bool + _equalDropUserMappingStmt(DropUserMappingStmt *a, DropUserMappingStmt *b) + { + COMPARE_STRING_FIELD(username); + COMPARE_STRING_FIELD(servername); + COMPARE_SCALAR_FIELD(missing_ok); + + return true; + } + + static bool _equalCreateTrigStmt(CreateTrigStmt *a, CreateTrigStmt *b) { COMPARE_STRING_FIELD(trigname); *************** *** 1957,1962 **** --- 2050,2064 ---- } static bool + _equalOptionDefElem(OptionDefElem *a, OptionDefElem *b) + { + COMPARE_SCALAR_FIELD(alter_op); + COMPARE_NODE_FIELD(def); + + return true; + } + + static bool _equalLockingClause(LockingClause *a, LockingClause *b) { COMPARE_NODE_FIELD(lockedRels); *************** *** 2534,2539 **** --- 2636,2668 ---- case T_DropTableSpaceStmt: retval = _equalDropTableSpaceStmt(a, b); break; + case T_CreateFdwStmt: + retval = _equalCreateFdwStmt(a, b); + break; + case T_AlterFdwStmt: + retval = _equalAlterFdwStmt(a, b); + break; + case T_DropFdwStmt: + retval = _equalDropFdwStmt(a, b); + break; + case T_CreateForeignServerStmt: + retval = _equalCreateForeignServerStmt(a, b); + break; + case T_AlterForeignServerStmt: + retval = _equalAlterForeignServerStmt(a, b); + break; + case T_DropForeignServerStmt: + retval = _equalDropForeignServerStmt(a, b); + break; + case T_CreateUserMappingStmt: + retval = _equalCreateUserMappingStmt(a, b); + break; + case T_AlterUserMappingStmt: + retval = _equalAlterUserMappingStmt(a, b); + break; + case T_DropUserMappingStmt: + retval = _equalDropUserMappingStmt(a, b); + break; case T_CreateTrigStmt: retval = _equalCreateTrigStmt(a, b); break; *************** *** 2661,2666 **** --- 2790,2798 ---- case T_DefElem: retval = _equalDefElem(a, b); break; + case T_OptionDefElem: + retval = _equalOptionDefElem(a, b); + break; case T_LockingClause: retval = _equalLockingClause(a, b); break; diff -cNr -x CVS cvs-pgsql/src/backend/nodes/makefuncs.c pgsql/src/backend/nodes/makefuncs.c *** cvs-pgsql/src/backend/nodes/makefuncs.c Tue Sep 2 15:10:44 2008 --- pgsql/src/backend/nodes/makefuncs.c Fri Dec 12 10:44:15 2008 *************** *** 361,363 **** --- 361,376 ---- res->arg = arg; return res; } + + /* + * makeOptionDefElem - + * build an OptionDefElem node + */ + OptionDefElem * + makeOptionDefElem(int op, DefElem *def) + { + OptionDefElem *res = makeNode(OptionDefElem); + res->alter_op = op; + res->def = def; + return res; + } diff -cNr -x CVS cvs-pgsql/src/backend/parser/gram.y pgsql/src/backend/parser/gram.y *** cvs-pgsql/src/backend/parser/gram.y Fri Dec 5 15:06:24 2008 --- pgsql/src/backend/parser/gram.y Mon Dec 15 14:11:30 2008 *************** *** 156,161 **** --- 156,162 ---- FunctionParameterMode fun_param_mode; FuncWithArgs *funwithargs; DefElem *defelt; + OptionDefElem *optdef; SortBy *sortby; JoinExpr *jexpr; IndexElem *ielem; *************** *** 172,190 **** } %type stmt schema_stmt ! AlterDatabaseStmt AlterDatabaseSetStmt AlterDomainStmt AlterGroupStmt AlterObjectSchemaStmt AlterOwnerStmt AlterSeqStmt AlterTableStmt ! AlterUserStmt AlterUserSetStmt AlterRoleStmt AlterRoleSetStmt AnalyzeStmt ClosePortalStmt ClusterStmt CommentStmt ConstraintsSetStmt CopyStmt CreateAsStmt CreateCastStmt CreateDomainStmt CreateGroupStmt CreateOpClassStmt CreateOpFamilyStmt AlterOpFamilyStmt CreatePLangStmt CreateSchemaStmt CreateSeqStmt CreateStmt CreateTableSpaceStmt ! CreateAssertStmt CreateTrigStmt CreateUserStmt CreateRoleStmt CreatedbStmt DeclareCursorStmt DefineStmt DeleteStmt DiscardStmt DropGroupStmt DropOpClassStmt DropOpFamilyStmt DropPLangStmt DropStmt DropAssertStmt DropTrigStmt DropRuleStmt DropCastStmt DropRoleStmt ! DropUserStmt DropdbStmt DropTableSpaceStmt ExplainStmt FetchStmt GrantStmt GrantRoleStmt IndexStmt InsertStmt ListenStmt LoadStmt LockStmt NotifyStmt ExplainableStmt PreparableStmt CreateFunctionStmt AlterFunctionStmt ReindexStmt RemoveAggrStmt --- 173,194 ---- } %type stmt schema_stmt ! AlterDatabaseStmt AlterDatabaseSetStmt AlterDomainStmt AlterFdwStmt ! AlterForeignServerStmt AlterGroupStmt AlterObjectSchemaStmt AlterOwnerStmt AlterSeqStmt AlterTableStmt ! AlterUserStmt AlterUserMappingStmt AlterUserSetStmt AlterRoleStmt AlterRoleSetStmt AnalyzeStmt ClosePortalStmt ClusterStmt CommentStmt ConstraintsSetStmt CopyStmt CreateAsStmt CreateCastStmt CreateDomainStmt CreateGroupStmt CreateOpClassStmt CreateOpFamilyStmt AlterOpFamilyStmt CreatePLangStmt CreateSchemaStmt CreateSeqStmt CreateStmt CreateTableSpaceStmt ! CreateFdwStmt CreateForeignServerStmt CreateAssertStmt CreateTrigStmt ! CreateUserStmt CreateUserMappingStmt CreateRoleStmt CreatedbStmt DeclareCursorStmt DefineStmt DeleteStmt DiscardStmt DropGroupStmt DropOpClassStmt DropOpFamilyStmt DropPLangStmt DropStmt DropAssertStmt DropTrigStmt DropRuleStmt DropCastStmt DropRoleStmt ! DropUserStmt DropdbStmt DropTableSpaceStmt DropFdwStmt ! DropForeignServerStmt DropUserMappingStmt ExplainStmt FetchStmt GrantStmt GrantRoleStmt IndexStmt InsertStmt ListenStmt LoadStmt LockStmt NotifyStmt ExplainableStmt PreparableStmt CreateFunctionStmt AlterFunctionStmt ReindexStmt RemoveAggrStmt *************** *** 222,227 **** --- 226,235 ---- %type OptRoleList %type OptRoleElem + %type opt_type + %type foreign_server_version opt_foreign_server_version + %type auth_ident + %type OptSchemaName %type OptSchemaEltList *************** *** 274,279 **** --- 282,288 ---- prep_type_clause execute_param_clause using_clause returning_clause enum_val_list table_func_column_list + create_generic_options alter_generic_options %type OptTempTableName %type into_clause create_as_target *************** *** 342,347 **** --- 351,362 ---- %type relation_expr_opt_alias %type target_el single_set_clause set_target insert_column_item + %type gopt_name + %type gopt_arg + %type gopt_elem + %type alter_gopt_elem + %type gopt_list alter_gopt_list + %type Typename SimpleTypename ConstTypename GenericType Numeric opt_float Character ConstCharacter *************** *** 436,442 **** KEY LANCOMPILER LANGUAGE LARGE_P LAST_P LEADING LEAST LEFT LEVEL ! LIKE LIMIT LISTEN LOAD LOCAL LOCALTIME LOCALTIMESTAMP LOCATION LOCK_P LOGIN_P MAPPING MATCH MAXVALUE MINUTE_P MINVALUE MODE MONTH_P MOVE --- 451,457 ---- KEY LANCOMPILER LANGUAGE LARGE_P LAST_P LEADING LEAST LEFT LEVEL ! LIBRARY LIKE LIMIT LISTEN LOAD LOCAL LOCALTIME LOCALTIMESTAMP LOCATION LOCK_P LOGIN_P MAPPING MATCH MAXVALUE MINUTE_P MINVALUE MODE MONTH_P MOVE *************** *** 445,451 **** NOCREATEROLE NOCREATEUSER NOINHERIT NOLOGIN_P NONE NOSUPERUSER NOT NOTHING NOTIFY NOTNULL NOWAIT NULL_P NULLIF NULLS_P NUMERIC ! OBJECT_P OF OFF OFFSET OIDS OLD ON ONLY OPERATOR OPTION OR ORDER OUT_P OUTER_P OVERLAPS OVERLAY OWNED OWNER PARSER PARTIAL PASSWORD PLACING PLANS POSITION --- 460,466 ---- NOCREATEROLE NOCREATEUSER NOINHERIT NOLOGIN_P NONE NOSUPERUSER NOT NOTHING NOTIFY NOTNULL NOWAIT NULL_P NULLIF NULLS_P NUMERIC ! OBJECT_P OF OFF OFFSET OIDS OLD ON ONLY OPERATOR OPTION OPTIONS OR ORDER OUT_P OUTER_P OVERLAPS OVERLAY OWNED OWNER PARSER PARTIAL PASSWORD PLACING PLANS POSITION *************** *** 459,465 **** REVOKE RIGHT ROLE ROLLBACK ROW ROWS RULE SAVEPOINT SCHEMA SCROLL SEARCH SECOND_P SECURITY SELECT SEQUENCE ! SERIALIZABLE SESSION SESSION_USER SET SETOF SHARE SHOW SIMILAR SIMPLE SMALLINT SOME STABLE STANDALONE_P START STATEMENT STATISTICS STDIN STDOUT STORAGE STRICT_P STRIP_P SUBSTRING SUPERUSER_P SYMMETRIC SYSID SYSTEM_P --- 474,480 ---- REVOKE RIGHT ROLE ROLLBACK ROW ROWS RULE SAVEPOINT SCHEMA SCROLL SEARCH SECOND_P SECURITY SELECT SEQUENCE ! SERIALIZABLE SERVER SESSION SESSION_USER SET SETOF SHARE SHOW SIMILAR SIMPLE SMALLINT SOME STABLE STANDALONE_P START STATEMENT STATISTICS STDIN STDOUT STORAGE STRICT_P STRIP_P SUBSTRING SUPERUSER_P SYMMETRIC SYSID SYSTEM_P *************** *** 474,480 **** VACUUM VALID VALIDATOR VALUE_P VALUES VARCHAR VARIADIC VARYING VERBOSE VERSION_P VIEW VOLATILE ! WHEN WHERE WHITESPACE_P WITH WITHOUT WORK WRITE XML_P XMLATTRIBUTES XMLCONCAT XMLELEMENT XMLFOREST XMLPARSE XMLPI XMLROOT XMLSERIALIZE --- 489,495 ---- VACUUM VALID VALIDATOR VALUE_P VALUES VARCHAR VARIADIC VARYING VERBOSE VERSION_P VIEW VOLATILE ! WHEN WHERE WHITESPACE_P WITH WITHOUT WORK WRAPPER WRITE XML_P XMLATTRIBUTES XMLCONCAT XMLELEMENT XMLFOREST XMLPARSE XMLPI XMLROOT XMLSERIALIZE *************** *** 562,567 **** --- 577,584 ---- AlterDatabaseStmt | AlterDatabaseSetStmt | AlterDomainStmt + | AlterFdwStmt + | AlterForeignServerStmt | AlterFunctionStmt | AlterGroupStmt | AlterObjectSchemaStmt *************** *** 572,577 **** --- 589,595 ---- | AlterRoleStmt | AlterTSConfigurationStmt | AlterTSDictionaryStmt + | AlterUserMappingStmt | AlterUserSetStmt | AlterUserStmt | AnalyzeStmt *************** *** 586,591 **** --- 604,611 ---- | CreateCastStmt | CreateConversionStmt | CreateDomainStmt + | CreateFdwStmt + | CreateForeignServerStmt | CreateFunctionStmt | CreateGroupStmt | CreateOpClassStmt *************** *** 599,604 **** --- 619,625 ---- | CreateTrigStmt | CreateRoleStmt | CreateUserStmt + | CreateUserMappingStmt | CreatedbStmt | DeallocateStmt | DeclareCursorStmt *************** *** 607,612 **** --- 628,635 ---- | DiscardStmt | DropAssertStmt | DropCastStmt + | DropFdwStmt + | DropForeignServerStmt | DropGroupStmt | DropOpClassStmt | DropOpFamilyStmt *************** *** 618,623 **** --- 641,647 ---- | DropTrigStmt | DropRoleStmt | DropUserStmt + | DropUserMappingStmt | DropdbStmt | ExecuteStmt | ExplainStmt *************** *** 2717,2722 **** --- 2741,3050 ---- /***************************************************************************** * + * QUERY: + * CREATE FOREIGN DATA WRAPPER name LIBRARY 'library_name' LANGUAGE C + * + *****************************************************************************/ + + CreateFdwStmt: CREATE FOREIGN DATA_P WRAPPER name LIBRARY Sconst LANGUAGE ColId create_generic_options + { + CreateFdwStmt *n = makeNode(CreateFdwStmt); + n->fdwname = $5; + n->library = $7; + n->options = $10; + $$ = (Node *) n; + + if (pg_strcasecmp($9, "C") != 0) + ereport(ERROR, + (errcode(ERRCODE_SYNTAX_ERROR), + errmsg("language for foreign-data wrapper must be C"), + scanner_errposition(@9))); + } + ; + + /***************************************************************************** + * + * QUERY : + * DROP FOREIGN DATA WRAPPER name + * + ****************************************************************************/ + + DropFdwStmt: DROP FOREIGN DATA_P WRAPPER name opt_drop_behavior + { + DropFdwStmt *n = makeNode(DropFdwStmt); + n->fdwname = $5; + n->missing_ok = false; + n->behavior = $6; + $$ = (Node *) n; + } + | DROP FOREIGN DATA_P WRAPPER IF_P EXISTS name opt_drop_behavior + { + DropFdwStmt *n = makeNode(DropFdwStmt); + n->fdwname = $7; + n->missing_ok = true; + n->behavior = $8; + $$ = (Node *) n; + } + ; + + /***************************************************************************** + * + * QUERY : + * ALTER FOREIGN DATA WRAPPER name + * + ****************************************************************************/ + + AlterFdwStmt: ALTER FOREIGN DATA_P WRAPPER name LIBRARY Sconst alter_generic_options + { + AlterFdwStmt *n = makeNode(AlterFdwStmt); + n->fdwname = $5; + n->library = $7; + n->options = $8; + $$ = (Node *) n; + } + | ALTER FOREIGN DATA_P WRAPPER name LIBRARY Sconst + { + AlterFdwStmt *n = makeNode(AlterFdwStmt); + n->fdwname = $5; + n->library = $7; + $$ = (Node *) n; + } + | ALTER FOREIGN DATA_P WRAPPER name alter_generic_options + { + AlterFdwStmt *n = makeNode(AlterFdwStmt); + n->fdwname = $5; + n->options = $6; + $$ = (Node *) n; + } + ; + + /* Options definition for CREATE FDW, SERVER and USER MAPPING */ + create_generic_options: + OPTIONS '(' gopt_list ')' { $$ = $3; } + | /*EMPTY*/ { $$ = NIL; } + ; + + gopt_list: gopt_elem + { + $$ = list_make1(makeOptionDefElem(ALTER_OPT_ADD, $1)); + } + | gopt_list ',' gopt_elem + { + $$ = lappend($1, makeOptionDefElem(ALTER_OPT_ADD, $3)); + } + ; + + /* Options definition for ALTER FDW, SERVER and USER MAPPING */ + alter_generic_options: + OPTIONS '(' alter_gopt_list ')' { $$ = $3; } + ; + + alter_gopt_list: + alter_gopt_elem + { + $$ = list_make1($1); + } + | gopt_elem + { + $$ = list_make1(makeOptionDefElem(ALTER_OPT_ADD, $1)); + } + | alter_gopt_list ',' alter_gopt_elem + { + $$ = lappend($1, $3); + } + | alter_gopt_list ',' gopt_elem + { + $$ = lappend($1, makeOptionDefElem(ALTER_OPT_ADD, $3)); + } + ; + + alter_gopt_elem: + ADD_P gopt_elem + { + $$ = makeOptionDefElem(ALTER_OPT_ADD, $2); + } + | SET gopt_elem + { + $$ = makeOptionDefElem(ALTER_OPT_SET, $2); + } + | DROP gopt_name + { + $$ = makeOptionDefElem(ALTER_OPT_DROP, + makeDefElem($2, NULL)); + } + ; + + gopt_elem: gopt_name gopt_arg { $$ = makeDefElem($1, $2); } + ; + + gopt_name: attr_name { $$ = $1; } + ; + + gopt_arg: Sconst { $$ = (Node *)makeString($1); } + ; + + /***************************************************************************** + * + * QUERY: + * CREATE SERVER name [TYPE] [VERSION] [OPTIONS] + * + *****************************************************************************/ + + CreateForeignServerStmt: CREATE SERVER name opt_type opt_foreign_server_version + FOREIGN DATA_P WRAPPER name create_generic_options + { + CreateForeignServerStmt *n = makeNode(CreateForeignServerStmt); + n->servername = $3; + n->servertype = $4; + n->version = $5; + n->fdwname = $9; + n->options = $10; + $$ = (Node *) n; + } + ; + + opt_type: + TYPE_P Sconst { $$ = $2; } + | /*EMPTY*/ { $$ = NULL; } + ; + + + foreign_server_version: + VERSION_P Sconst { $$ = $2; } + | VERSION_P NULL_P { $$ = NULL; } + ; + + opt_foreign_server_version: + foreign_server_version { $$ = $1; } + | /*EMPTY*/ { $$ = NULL; } + ; + + /***************************************************************************** + * + * QUERY : + * DROP SERVER name + * + ****************************************************************************/ + + DropForeignServerStmt: DROP SERVER name opt_drop_behavior + { + DropForeignServerStmt *n = makeNode(DropForeignServerStmt); + n->servername = $3; + n->missing_ok = false; + n->behavior = $4; + $$ = (Node *) n; + } + | DROP SERVER IF_P EXISTS name opt_drop_behavior + { + DropForeignServerStmt *n = makeNode(DropForeignServerStmt); + n->servername = $5; + n->missing_ok = true; + n->behavior = $6; + $$ = (Node *) n; + } + ; + + /***************************************************************************** + * + * QUERY : + * ALTER SERVER name [VERSION] [OPTIONS] + * + ****************************************************************************/ + + AlterForeignServerStmt: ALTER SERVER name foreign_server_version alter_generic_options + { + AlterForeignServerStmt *n = makeNode(AlterForeignServerStmt); + n->servername = $3; + n->version = $4; + n->options = $5; + n->has_version = true; + $$ = (Node *) n; + } + | ALTER SERVER name foreign_server_version + { + AlterForeignServerStmt *n = makeNode(AlterForeignServerStmt); + n->servername = $3; + n->version = $4; + n->has_version = true; + $$ = (Node *) n; + } + | ALTER SERVER name alter_generic_options + { + AlterForeignServerStmt *n = makeNode(AlterForeignServerStmt); + n->servername = $3; + n->options = $4; + $$ = (Node *) n; + } + ; + + /***************************************************************************** + * + * QUERY: + * CREATE USER MAPPING FOR auth_ident SERVER name [OPTIONS] + * + *****************************************************************************/ + + CreateUserMappingStmt: CREATE USER MAPPING FOR auth_ident SERVER name create_generic_options + { + CreateUserMappingStmt *n = makeNode(CreateUserMappingStmt); + n->username = $5; + n->servername = $7; + n->options = $8; + $$ = (Node *) n; + } + ; + + /* User mapping authorization identifier */ + auth_ident: + CURRENT_USER { $$ = "current_user"; } + | USER { $$ = "current_user"; } + | RoleId { $$ = (strcmp($1, "public") == 0) ? NULL : $1 } + ; + + /***************************************************************************** + * + * QUERY : + * DROP USER MAPPING FOR auth_ident SERVER name + * + ****************************************************************************/ + + DropUserMappingStmt: DROP USER MAPPING FOR auth_ident SERVER name + { + DropUserMappingStmt *n = makeNode(DropUserMappingStmt); + n->username = $5; + n->servername = $7; + n->missing_ok = false; + $$ = (Node *) n; + } + | DROP USER MAPPING IF_P EXISTS FOR auth_ident SERVER name + { + DropUserMappingStmt *n = makeNode(DropUserMappingStmt); + n->username = $7; + n->servername = $9; + n->missing_ok = true; + $$ = (Node *) n; + } + ; + + /***************************************************************************** + * + * QUERY : + * ALTER USER MAPPING FOR auth_ident SERVER name OPTIONS + * + ****************************************************************************/ + + AlterUserMappingStmt: ALTER USER MAPPING FOR auth_ident SERVER name alter_generic_options + { + AlterUserMappingStmt *n = makeNode(AlterUserMappingStmt); + n->username = $5; + n->servername = $7; + n->options = $8; + $$ = (Node *) n; + } + ; + + /***************************************************************************** + * * QUERIES : * CREATE TRIGGER ... * DROP TRIGGER ... *************** *** 3912,3917 **** --- 4240,4259 ---- n->objs = $2; $$ = n; } + | FOREIGN DATA_P WRAPPER name_list + { + PrivTarget *n = makeNode(PrivTarget); + n->objtype = ACL_OBJECT_FDW; + n->objs = $4; + $$ = n; + } + | FOREIGN SERVER name_list + { + PrivTarget *n = makeNode(PrivTarget); + n->objtype = ACL_OBJECT_FOREIGN_SERVER; + n->objs = $3; + $$ = n; + } | FUNCTION function_with_argtypes_list { PrivTarget *n = makeNode(PrivTarget); *************** *** 5122,5127 **** --- 5464,5485 ---- n->newowner = $8; $$ = (Node *)n; } + | ALTER FOREIGN DATA_P WRAPPER name OWNER TO RoleId + { + AlterOwnerStmt *n = makeNode(AlterOwnerStmt); + n->objectType = OBJECT_FDW; + n->object = list_make1(makeString($5)); + n->newowner = $8; + $$ = (Node *)n; + } + | ALTER SERVER name OWNER TO RoleId + { + AlterOwnerStmt *n = makeNode(AlterOwnerStmt); + n->objectType = OBJECT_FOREIGN_SERVER; + n->object = list_make1(makeString($3)); + n->newowner = $6; + $$ = (Node *)n; + } ; *************** *** 9555,9560 **** --- 9913,9919 ---- | INVOKER | ISOLATION | KEY + | LIBRARY | LANCOMPILER | LANGUAGE | LARGE_P *************** *** 9593,9598 **** --- 9952,9958 ---- | OIDS | OPERATOR | OPTION + | OPTIONS | OWNED | OWNER | PARSER *************** *** 9628,9633 **** --- 9988,9994 ---- | ROWS | RULE | SAVEPOINT + | SERVER | SCHEMA | SCROLL | SEARCH *************** *** 9680,9685 **** --- 10041,10047 ---- | WHITESPACE_P | WITHOUT | WORK + | WRAPPER | WRITE | XML_P | YEAR_P diff -cNr -x CVS cvs-pgsql/src/backend/parser/keywords.c pgsql/src/backend/parser/keywords.c *** cvs-pgsql/src/backend/parser/keywords.c Tue Oct 28 14:31:25 2008 --- pgsql/src/backend/parser/keywords.c Fri Dec 12 10:44:15 2008 *************** *** 229,234 **** --- 229,235 ---- {"least", LEAST, COL_NAME_KEYWORD}, {"left", LEFT, TYPE_FUNC_NAME_KEYWORD}, {"level", LEVEL, UNRESERVED_KEYWORD}, + {"library", LIBRARY, UNRESERVED_KEYWORD}, {"like", LIKE, TYPE_FUNC_NAME_KEYWORD}, {"limit", LIMIT, RESERVED_KEYWORD}, {"listen", LISTEN, UNRESERVED_KEYWORD}, *************** *** 281,286 **** --- 282,288 ---- {"only", ONLY, RESERVED_KEYWORD}, {"operator", OPERATOR, UNRESERVED_KEYWORD}, {"option", OPTION, UNRESERVED_KEYWORD}, + {"options", OPTIONS, UNRESERVED_KEYWORD}, {"or", OR, RESERVED_KEYWORD}, {"order", ORDER, RESERVED_KEYWORD}, {"out", OUT_P, COL_NAME_KEYWORD}, *************** *** 339,344 **** --- 341,347 ---- {"select", SELECT, RESERVED_KEYWORD}, {"sequence", SEQUENCE, UNRESERVED_KEYWORD}, {"serializable", SERIALIZABLE, UNRESERVED_KEYWORD}, + {"server", SERVER, UNRESERVED_KEYWORD}, {"session", SESSION, UNRESERVED_KEYWORD}, {"session_user", SESSION_USER, RESERVED_KEYWORD}, {"set", SET, UNRESERVED_KEYWORD}, *************** *** 411,416 **** --- 414,420 ---- {"with", WITH, RESERVED_KEYWORD}, {"without", WITHOUT, UNRESERVED_KEYWORD}, {"work", WORK, UNRESERVED_KEYWORD}, + {"wrapper", WRAPPER, UNRESERVED_KEYWORD}, {"write", WRITE, UNRESERVED_KEYWORD}, {"xml", XML_P, UNRESERVED_KEYWORD}, {"xmlattributes", XMLATTRIBUTES, COL_NAME_KEYWORD}, diff -cNr -x CVS cvs-pgsql/src/backend/tcop/utility.c pgsql/src/backend/tcop/utility.c *** cvs-pgsql/src/backend/tcop/utility.c Fri Dec 5 15:06:25 2008 --- pgsql/src/backend/tcop/utility.c Fri Dec 12 10:44:15 2008 *************** *** 203,208 **** --- 203,217 ---- case T_ReassignOwnedStmt: case T_AlterTSDictionaryStmt: case T_AlterTSConfigurationStmt: + case T_CreateFdwStmt: + case T_AlterFdwStmt: + case T_DropFdwStmt: + case T_CreateForeignServerStmt: + case T_AlterForeignServerStmt: + case T_DropForeignServerStmt: + case T_CreateUserMappingStmt: + case T_AlterUserMappingStmt: + case T_DropUserMappingStmt: ereport(ERROR, (errcode(ERRCODE_READ_ONLY_SQL_TRANSACTION), errmsg("transaction is read-only"))); *************** *** 452,457 **** --- 461,502 ---- DropTableSpace((DropTableSpaceStmt *) parsetree); break; + case T_CreateFdwStmt: + CreateForeignDataWrapper((CreateFdwStmt *) parsetree); + break; + + case T_AlterFdwStmt: + AlterForeignDataWrapper((AlterFdwStmt *) parsetree); + break; + + case T_DropFdwStmt: + RemoveForeignDataWrapper((DropFdwStmt *) parsetree); + break; + + case T_CreateForeignServerStmt: + CreateForeignServer((CreateForeignServerStmt *) parsetree); + break; + + case T_AlterForeignServerStmt: + AlterForeignServer((AlterForeignServerStmt *) parsetree); + break; + + case T_DropForeignServerStmt: + RemoveForeignServer((DropForeignServerStmt *) parsetree); + break; + + case T_CreateUserMappingStmt: + CreateUserMapping((CreateUserMappingStmt *) parsetree); + break; + + case T_AlterUserMappingStmt: + AlterUserMapping((AlterUserMappingStmt *) parsetree); + break; + + case T_DropUserMappingStmt: + RemoveUserMapping((DropUserMappingStmt *) parsetree); + break; + case T_DropStmt: { DropStmt *stmt = (DropStmt *) parsetree; *************** *** 1310,1315 **** --- 1355,1396 ---- tag = "DROP TABLESPACE"; break; + case T_CreateFdwStmt: + tag = "CREATE FOREIGN DATA WRAPPER"; + break; + + case T_AlterFdwStmt: + tag = "ALTER FOREIGN DATA WRAPPER"; + break; + + case T_DropFdwStmt: + tag = "DROP FOREIGN DATA WRAPPER"; + break; + + case T_CreateForeignServerStmt: + tag = "CREATE SERVER"; + break; + + case T_AlterForeignServerStmt: + tag = "ALTER SERVER"; + break; + + case T_DropForeignServerStmt: + tag = "DROP SERVER"; + break; + + case T_CreateUserMappingStmt: + tag = "CREATE USER MAPPING"; + break; + + case T_AlterUserMappingStmt: + tag = "ALTER USER MAPPING"; + break; + + case T_DropUserMappingStmt: + tag = "DROP USER MAPPING"; + break; + case T_DropStmt: switch (((DropStmt *) parsetree)->removeType) { *************** *** 1523,1528 **** --- 1604,1615 ---- case OBJECT_TSDICTIONARY: tag = "ALTER TEXT SEARCH DICTIONARY"; break; + case OBJECT_FDW: + tag = "ALTER FOREIGN DATA WRAPPER"; + break; + case OBJECT_FOREIGN_SERVER: + tag = "ALTER SERVER"; + break; default: tag = "???"; break; *************** *** 2037,2042 **** --- 2124,2141 ---- lev = LOGSTMT_DDL; break; + case T_CreateFdwStmt: + case T_AlterFdwStmt: + case T_DropFdwStmt: + case T_CreateForeignServerStmt: + case T_AlterForeignServerStmt: + case T_DropForeignServerStmt: + case T_CreateUserMappingStmt: + case T_AlterUserMappingStmt: + case T_DropUserMappingStmt: + lev = LOGSTMT_DDL; + break; + case T_DropStmt: lev = LOGSTMT_DDL; break; diff -cNr -x CVS cvs-pgsql/src/backend/utils/adt/acl.c pgsql/src/backend/utils/adt/acl.c *** cvs-pgsql/src/backend/utils/adt/acl.c Tue Dec 16 15:58:26 2008 --- pgsql/src/backend/utils/adt/acl.c Tue Dec 16 15:59:14 2008 *************** *** 22,27 **** --- 22,28 ---- #include "catalog/pg_type.h" #include "commands/dbcommands.h" #include "commands/tablespace.h" + #include "foreign/foreign.h" #include "miscadmin.h" #include "utils/acl.h" #include "utils/builtins.h" *************** *** 577,582 **** --- 578,591 ---- world_default = ACL_NO_RIGHTS; owner_default = ACL_ALL_RIGHTS_TABLESPACE; break; + case ACL_OBJECT_FDW: + world_default = ACL_NO_RIGHTS; + owner_default = ACL_ALL_RIGHTS_FDW; + break; + case ACL_OBJECT_FOREIGN_SERVER: + world_default = ACL_NO_RIGHTS; + owner_default = ACL_ALL_RIGHTS_FOREIGN_SERVER; + break; default: elog(ERROR, "unrecognized objtype: %d", (int) objtype); world_default = ACL_NO_RIGHTS; /* keep compiler quiet */ *************** *** 1824,1829 **** --- 1833,1972 ---- /* + * has_foreign_data_wrapper_privilege variants + * These are all named "has_foreign_data_wrapper_privilege" at the SQL level. + * They take various combinations of foreign-data wrapper name, + * fdw OID, user name, user OID, or implicit user = current_user. + * + * The result is a boolean value: true if user has the indicated + * privilege, false if not. + */ + + /* + * has_foreign_data_wrapper_privilege + * Check user privileges on a foreign-data wrapper. + */ + static Datum + has_foreign_data_wrapper_privilege(Oid roleid, Oid fdwid, text *priv_type_text) + { + AclResult aclresult; + AclMode mode = ACL_NO_RIGHTS; + char *priv_type = text_to_cstring(priv_type_text); + + if (pg_strcasecmp(priv_type, "USAGE") == 0) + mode = ACL_USAGE; + else if (pg_strcasecmp(priv_type, "USAGE WITH GRANT OPTION") == 0) + mode = ACL_GRANT_OPTION_FOR(ACL_USAGE); + else + ereport(ERROR, + (errcode(ERRCODE_INVALID_PARAMETER_VALUE), + errmsg("unrecognized privilege type: \"%s\"", priv_type))); + + aclresult = pg_foreign_data_wrapper_aclcheck(fdwid, roleid, mode); + + PG_RETURN_BOOL(aclresult == ACLCHECK_OK); + } + + /* + * has_foreign_data_wrapper_privilege_name_name + * Check user privileges on a foreign-data wrapper given + * name username, text fdwname, and text priv name. + */ + Datum + has_foreign_data_wrapper_privilege_name_name(PG_FUNCTION_ARGS) + { + Name username = PG_GETARG_NAME(0); + char *fdwname = text_to_cstring(PG_GETARG_TEXT_P(1)); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_foreign_data_wrapper_privilege(get_roleid_checked(NameStr(*username)), + GetForeignDataWrapperOidByName(fdwname, false), + priv_type_text); + } + + /* + * has_foreign_data_wrapper_privilege_name + * Check user privileges on a foreign-data wrapper given + * text fdwname and text priv name. + * current_user is assumed + */ + Datum + has_foreign_data_wrapper_privilege_name(PG_FUNCTION_ARGS) + { + char *fdwname = text_to_cstring(PG_GETARG_TEXT_P(0)); + text *priv_type_text = PG_GETARG_TEXT_P(1); + + return has_foreign_data_wrapper_privilege(GetUserId(), + GetForeignDataWrapperOidByName(fdwname, false), + priv_type_text); + } + + /* + * has_foreign_data_wrapper_privilege_name_id + * Check user privileges on a foreign-data wrapper given + * name usename, foreign-data wrapper oid, and text priv name. + */ + Datum + has_foreign_data_wrapper_privilege_name_id(PG_FUNCTION_ARGS) + { + Name username = PG_GETARG_NAME(0); + Oid fdwid = PG_GETARG_OID(1); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_foreign_data_wrapper_privilege(get_roleid_checked(NameStr(*username)), + fdwid, priv_type_text); + } + + /* + * has_foreign_data_wrapper_privilege_id + * Check user privileges on a foreign-data wrapper given + * foreign-data wrapper oid, and text priv name. + * current_user is assumed + */ + Datum + has_foreign_data_wrapper_privilege_id(PG_FUNCTION_ARGS) + { + Oid fdwid = PG_GETARG_OID(0); + text *priv_type_text = PG_GETARG_TEXT_P(1); + + return has_foreign_data_wrapper_privilege(GetUserId(), fdwid, + priv_type_text); + } + + /* + * has_foreign_data_wrapper_privilege_id_name + * Check user privileges on a foreign-data wrapper given + * roleid, text fdwname, and text priv name. + */ + Datum + has_foreign_data_wrapper_privilege_id_name(PG_FUNCTION_ARGS) + { + Oid roleid = PG_GETARG_OID(0); + char *fdwname = text_to_cstring(PG_GETARG_TEXT_P(1)); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_foreign_data_wrapper_privilege(roleid, + GetForeignDataWrapperOidByName(fdwname, false), + priv_type_text); + } + + /* + * has_foreign_data_wrapper_privilege_id_id + * Check user privileges on a foreign-data wrapper given + * roleid, fdw oid, and text priv name. + */ + Datum + has_foreign_data_wrapper_privilege_id_id(PG_FUNCTION_ARGS) + { + Oid roleid = PG_GETARG_OID(0); + Oid fdwid = PG_GETARG_OID(1); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_foreign_data_wrapper_privilege(roleid, fdwid, priv_type_text); + } + + + /* * has_function_privilege variants * These are all named "has_function_privilege" at the SQL level. * They take various combinations of function name, function OID, *************** *** 2467,2472 **** --- 2610,2748 ---- } /* + * has_server_privilege variants + * These are all named "has_server_privilege" at the SQL level. + * They take various combinations of foreign server name, + * server OID, user name, user OID, or implicit user = current_user. + * + * The result is a boolean value: true if user has the indicated + * privilege, false if not. + */ + + /* + * has_server_privilege + * Check user privileges on a foreign server. + */ + static Datum + has_server_privilege(Oid roleid, Oid serverid, text *priv_type_text) + { + AclResult aclresult; + AclMode mode = ACL_NO_RIGHTS; + char *priv_type = text_to_cstring(priv_type_text); + + if (pg_strcasecmp(priv_type, "USAGE") == 0) + mode = ACL_USAGE; + else if (pg_strcasecmp(priv_type, "USAGE WITH GRANT OPTION") == 0) + mode = ACL_GRANT_OPTION_FOR(ACL_USAGE); + else + ereport(ERROR, + (errcode(ERRCODE_INVALID_PARAMETER_VALUE), + errmsg("unrecognized privilege type: \"%s\"", priv_type))); + + aclresult = pg_foreign_server_aclcheck(serverid, roleid, mode); + + PG_RETURN_BOOL(aclresult == ACLCHECK_OK); + } + + /* + * has_server_privilege_name_name + * Check user privileges on a foreign server given + * name username, text servername, and text priv name. + */ + Datum + has_server_privilege_name_name(PG_FUNCTION_ARGS) + { + Name username = PG_GETARG_NAME(0); + char *servername = text_to_cstring(PG_GETARG_TEXT_P(1)); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_server_privilege(get_roleid_checked(NameStr(*username)), + GetForeignServerOidByName(servername, false), + priv_type_text); + } + + /* + * has_server_privilege_name + * Check user privileges on a foreign server given + * text servername and text priv name. + * current_user is assumed + */ + Datum + has_server_privilege_name(PG_FUNCTION_ARGS) + { + char *servername = text_to_cstring(PG_GETARG_TEXT_P(0)); + text *priv_type_text = PG_GETARG_TEXT_P(1); + + return has_server_privilege(GetUserId(), + GetForeignServerOidByName(servername, false), + priv_type_text); + } + + /* + * has_server_privilege_name_id + * Check user privileges on a foreign server given + * name usename, foreign server oid, and text priv name. + */ + Datum + has_server_privilege_name_id(PG_FUNCTION_ARGS) + { + Name username = PG_GETARG_NAME(0); + Oid serverid = PG_GETARG_OID(1); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_server_privilege(get_roleid_checked(NameStr(*username)), serverid, + priv_type_text); + } + + /* + * has_server_privilege_id + * Check user privileges on a foreign server given + * server oid, and text priv name. + * current_user is assumed + */ + Datum + has_server_privilege_id(PG_FUNCTION_ARGS) + { + Oid serverid = PG_GETARG_OID(0); + text *priv_type_text = PG_GETARG_TEXT_P(1); + + return has_server_privilege(GetUserId(), serverid, priv_type_text); + } + + /* + * has_server_privilege_id_name + * Check user privileges on a foreign server given + * roleid, text servername, and text priv name. + */ + Datum + has_server_privilege_id_name(PG_FUNCTION_ARGS) + { + Oid roleid = PG_GETARG_OID(0); + char *servername = text_to_cstring(PG_GETARG_TEXT_P(1)); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_server_privilege(roleid, + GetForeignServerOidByName(servername, false), + priv_type_text); + } + + /* + * has_server_privilege_id_id + * Check user privileges on a foreign server given + * roleid, server oid, and text priv name. + */ + Datum + has_server_privilege_id_id(PG_FUNCTION_ARGS) + { + Oid roleid = PG_GETARG_OID(0); + Oid serverid = PG_GETARG_OID(1); + text *priv_type_text = PG_GETARG_TEXT_P(2); + + return has_server_privilege(roleid, serverid, priv_type_text); + } + + + /* * has_tablespace_privilege variants * These are all named "has_tablespace_privilege" at the SQL level. * They take various combinations of tablespace name, tablespace OID, diff -cNr -x CVS cvs-pgsql/src/backend/utils/cache/syscache.c pgsql/src/backend/utils/cache/syscache.c *** cvs-pgsql/src/backend/utils/cache/syscache.c Thu Jun 19 03:46:05 2008 --- pgsql/src/backend/utils/cache/syscache.c Fri Dec 12 10:44:15 2008 *************** *** 32,37 **** --- 32,39 ---- #include "catalog/pg_conversion.h" #include "catalog/pg_database.h" #include "catalog/pg_enum.h" + #include "catalog/pg_foreign_data_wrapper.h" + #include "catalog/pg_foreign_server.h" #include "catalog/pg_language.h" #include "catalog/pg_namespace.h" #include "catalog/pg_opclass.h" *************** *** 46,51 **** --- 48,54 ---- #include "catalog/pg_ts_parser.h" #include "catalog/pg_ts_template.h" #include "catalog/pg_type.h" + #include "catalog/pg_user_mapping.h" #include "utils/rel.h" #include "utils/syscache.h" *************** *** 365,370 **** --- 368,421 ---- }, 256 }, + {ForeignDataWrapperRelationId, /* FOREIGNDATAWRAPPERNAME */ + ForeignDataWrapperNameIndexId, + 0, + 1, + { + Anum_pg_foreign_data_wrapper_fdwname, + 0, + 0, + 0 + }, + 8 + }, + {ForeignDataWrapperRelationId, /* FOREIGNDATAWRAPPEROID */ + ForeignDataWrapperOidIndexId, + 0, + 1, + { + ObjectIdAttributeNumber, + 0, + 0, + 0 + }, + 8 + }, + {ForeignServerRelationId, /* FOREIGNSERVERNAME */ + ForeignServerNameIndexId, + 0, + 1, + { + Anum_pg_foreign_server_srvname, + 0, + 0, + 0 + }, + 32 + }, + {ForeignServerRelationId, /* FOREIGNSERVEROID */ + ForeignServerOidIndexId, + 0, + 1, + { + ObjectIdAttributeNumber, + 0, + 0, + 0 + }, + 32 + }, {IndexRelationId, /* INDEXRELID */ IndexRelidIndexId, Anum_pg_index_indrelid, *************** *** 676,681 **** --- 727,756 ---- 0 }, 1024 + }, + {UserMappingRelationId, /* USERMAPPINGOID */ + UserMappingOidIndexId, + 0, + 1, + { + ObjectIdAttributeNumber, + 0, + 0, + 0 + }, + 128 + }, + {UserMappingRelationId, /* USERMAPPINGUSERSERVER */ + UserMappingUserServerIndexId, + 0, + 2, + { + Anum_pg_user_mapping_umuser, + Anum_pg_user_mapping_umserver, + 0, + 0 + }, + 128 } }; diff -cNr -x CVS cvs-pgsql/src/bin/pg_dump/common.c pgsql/src/bin/pg_dump/common.c *** cvs-pgsql/src/bin/pg_dump/common.c Sat May 10 02:32:04 2008 --- pgsql/src/bin/pg_dump/common.c Fri Dec 12 10:44:15 2008 *************** *** 91,96 **** --- 91,98 ---- TSTemplateInfo *tmplinfo; TSDictInfo *dictinfo; TSConfigInfo *cfginfo; + FdwInfo *fdwinfo; + ForeignServerInfo *srvinfo; int numNamespaces; int numAggregates; int numInherits; *************** *** 104,109 **** --- 106,113 ---- int numTSTemplates; int numTSDicts; int numTSConfigs; + int numForeignDataWrappers; + int numForeignServers; if (g_verbose) write_msg(NULL, "reading schemas\n"); *************** *** 155,160 **** --- 159,172 ---- cfginfo = getTSConfigurations(&numTSConfigs); if (g_verbose) + write_msg(NULL, "reading user-defined foreign-data wrappers\n"); + fdwinfo = getForeignDataWrappers(&numForeignDataWrappers); + + if (g_verbose) + write_msg(NULL, "reading user-defined foreign servers\n"); + srvinfo = getForeignServers(&numForeignServers); + + if (g_verbose) write_msg(NULL, "reading user-defined operator families\n"); opfinfo = getOpfamilies(&numOpfamilies); diff -cNr -x CVS cvs-pgsql/src/bin/pg_dump/dumputils.c pgsql/src/bin/pg_dump/dumputils.c *** cvs-pgsql/src/bin/pg_dump/dumputils.c Thu Sep 11 15:30:02 2008 --- pgsql/src/bin/pg_dump/dumputils.c Fri Dec 12 10:44:15 2008 *************** *** 687,692 **** --- 687,696 ---- } else if (strcmp(type, "TABLESPACE") == 0) CONVERT_PRIV('C', "CREATE"); + else if (strcmp(type, "FOREIGN DATA WRAPPER") == 0) + CONVERT_PRIV('U', "USAGE"); + else if (strcmp(type, "SERVER") == 0) + CONVERT_PRIV('U', "USAGE"); else abort(); diff -cNr -x CVS cvs-pgsql/src/bin/pg_dump/pg_backup_archiver.c pgsql/src/bin/pg_dump/pg_backup_archiver.c *** cvs-pgsql/src/bin/pg_dump/pg_backup_archiver.c Thu Sep 11 15:30:02 2008 --- pgsql/src/bin/pg_dump/pg_backup_archiver.c Fri Dec 12 10:44:15 2008 *************** *** 2479,2485 **** /* objects named by just a name */ if (strcmp(type, "DATABASE") == 0 || strcmp(type, "PROCEDURAL LANGUAGE") == 0 || ! strcmp(type, "SCHEMA") == 0) { appendPQExpBuffer(buf, "%s %s", type, fmtId(te->tag)); return; --- 2479,2488 ---- /* objects named by just a name */ if (strcmp(type, "DATABASE") == 0 || strcmp(type, "PROCEDURAL LANGUAGE") == 0 || ! strcmp(type, "SCHEMA") == 0 || ! strcmp(type, "FOREIGN DATA WRAPPER") == 0 || ! strcmp(type, "SERVER") == 0 || ! strcmp(type, "USER MAPPING") == 0) { appendPQExpBuffer(buf, "%s %s", type, fmtId(te->tag)); return; *************** *** 2636,2642 **** strcmp(te->desc, "VIEW") == 0 || strcmp(te->desc, "SEQUENCE") == 0 || strcmp(te->desc, "TEXT SEARCH DICTIONARY") == 0 || ! strcmp(te->desc, "TEXT SEARCH CONFIGURATION") == 0) { PQExpBuffer temp = createPQExpBuffer(); --- 2639,2647 ---- strcmp(te->desc, "VIEW") == 0 || strcmp(te->desc, "SEQUENCE") == 0 || strcmp(te->desc, "TEXT SEARCH DICTIONARY") == 0 || ! strcmp(te->desc, "TEXT SEARCH CONFIGURATION") == 0 || ! strcmp(te->desc, "FOREIGN DATA WRAPPER") == 0 || ! strcmp(te->desc, "SERVER") == 0) { PQExpBuffer temp = createPQExpBuffer(); *************** *** 2653,2659 **** strcmp(te->desc, "FK CONSTRAINT") == 0 || strcmp(te->desc, "INDEX") == 0 || strcmp(te->desc, "RULE") == 0 || ! strcmp(te->desc, "TRIGGER") == 0) { /* these object types don't have separate owners */ } --- 2658,2665 ---- strcmp(te->desc, "FK CONSTRAINT") == 0 || strcmp(te->desc, "INDEX") == 0 || strcmp(te->desc, "RULE") == 0 || ! strcmp(te->desc, "TRIGGER") == 0 || ! strcmp(te->desc, "USER MAPPING") == 0) { /* these object types don't have separate owners */ } diff -cNr -x CVS cvs-pgsql/src/bin/pg_dump/pg_dump.c pgsql/src/bin/pg_dump/pg_dump.c *** cvs-pgsql/src/bin/pg_dump/pg_dump.c Fri Dec 12 10:41:32 2008 --- pgsql/src/bin/pg_dump/pg_dump.c Mon Dec 15 14:15:59 2008 *************** *** 158,163 **** --- 158,168 ---- static void dumpTSDictionary(Archive *fout, TSDictInfo *dictinfo); static void dumpTSTemplate(Archive *fout, TSTemplateInfo *tmplinfo); static void dumpTSConfig(Archive *fout, TSConfigInfo *cfginfo); + static void dumpForeignDataWrapper(Archive *fout, FdwInfo *fdwinfo); + static void dumpForeignServer(Archive *fout, ForeignServerInfo *srvinfo); + static void dumpUserMappings(Archive *fout, const char *target, + const char *servername, const char *namespace, + const char *owner, CatalogId catalogId, DumpId dumpId); static void dumpACL(Archive *fout, CatalogId objCatId, DumpId objDumpId, const char *type, const char *name, *************** *** 5269,5274 **** --- 5274,5442 ---- return cfginfo; } + /* + * getForeignDataWrappers: + * read all foreign-data wrappers in the system catalogs and return + * them in the FdwInfo* structure + * + * numForeignDataWrappers is set to the number of fdws read in + */ + FdwInfo * + getForeignDataWrappers(int *numForeignDataWrappers) + { + PGresult *res; + int ntups; + int i; + PQExpBuffer query = createPQExpBuffer(); + FdwInfo *fdwinfo; + int i_oid; + int i_fdwname; + int i_rolname; + int i_fdwlibrary; + int i_fdwacl; + int i_fdwoptions; + + /* Before 8.4, there are no foreign-data wrappers */ + if (g_fout->remoteVersion < 80400) + { + *numForeignDataWrappers = 0; + return NULL; + } + + /* Make sure we are in proper schema */ + selectSourceSchema("pg_catalog"); + + appendPQExpBuffer(query, "SELECT oid, fdwname, " + "(%s fdwowner) as rolname, fdwlibrary, fdwacl," + "array_to_string(ARRAY(" + " select option_name || ' ' || quote_literal(option_value)" + " from pg_get_foreign_data_wrapper_options(oid)), ', ') as fdwoptions " + "FROM pg_foreign_data_wrapper", + username_subquery); + + res = PQexec(g_conn, query->data); + check_sql_result(res, g_conn, query->data, PGRES_TUPLES_OK); + + ntups = PQntuples(res); + *numForeignDataWrappers = ntups; + + fdwinfo = (FdwInfo *) malloc(ntups * sizeof(FdwInfo)); + + i_oid = PQfnumber(res, "oid"); + i_fdwname = PQfnumber(res, "fdwname"); + i_rolname = PQfnumber(res, "rolname"); + i_fdwlibrary = PQfnumber(res, "fdwlibrary"); + i_fdwacl = PQfnumber(res, "fdwacl"); + i_fdwoptions = PQfnumber(res, "fdwoptions"); + + for (i = 0; i < ntups; i++) + { + fdwinfo[i].dobj.objType = DO_FDW; + fdwinfo[i].dobj.catId.oid = atooid(PQgetvalue(res, i, i_oid)); + AssignDumpId(&fdwinfo[i].dobj); + fdwinfo[i].dobj.name = strdup(PQgetvalue(res, i, i_fdwname)); + fdwinfo[i].dobj.namespace = NULL; + fdwinfo[i].rolname = strdup(PQgetvalue(res, i, i_rolname)); + fdwinfo[i].fdwlibrary = strdup(PQgetvalue(res, i, i_fdwlibrary)); + fdwinfo[i].fdwoptions = strdup(PQgetvalue(res, i, i_fdwoptions)); + fdwinfo[i].fdwacl = strdup(PQgetvalue(res, i, i_fdwacl)); + + + /* Decide whether we want to dump it */ + selectDumpableObject(&(fdwinfo[i].dobj)); + } + + PQclear(res); + + destroyPQExpBuffer(query); + + return fdwinfo; + } + + /* + * getForeignServers: + * read all foreign servers in the system catalogs and return + * them in the ForeignServerInfo * structure + * + * numForeignServers is set to the number of servers read in + */ + ForeignServerInfo * + getForeignServers(int *numForeignServers) + { + PGresult *res; + int ntups; + int i; + PQExpBuffer query = createPQExpBuffer(); + ForeignServerInfo *srvinfo; + int i_oid; + int i_srvname; + int i_rolname; + int i_srvfdw; + int i_srvtype; + int i_srvversion; + int i_srvacl; + int i_srvoptions; + + /* Before 8.4, there are no foreign servers */ + if (g_fout->remoteVersion < 80400) + { + *numForeignServers = 0; + return NULL; + } + + /* Make sure we are in proper schema */ + selectSourceSchema("pg_catalog"); + + appendPQExpBuffer(query, "SELECT oid, srvname, " + "(%s srvowner) as rolname, " + "srvfdw, srvtype, srvversion, srvacl," + "array_to_string(ARRAY(" + " select option_name || ' ' || quote_literal(option_value)" + " from pg_get_foreign_server_options(oid)), ', ') as srvoptions " + "FROM pg_foreign_server", + username_subquery); + + res = PQexec(g_conn, query->data); + check_sql_result(res, g_conn, query->data, PGRES_TUPLES_OK); + + ntups = PQntuples(res); + *numForeignServers = ntups; + + srvinfo = (ForeignServerInfo *) malloc(ntups * sizeof(ForeignServerInfo)); + + i_oid = PQfnumber(res, "oid"); + i_srvname = PQfnumber(res, "srvname"); + i_rolname = PQfnumber(res, "rolname"); + i_srvfdw = PQfnumber(res, "srvfdw"); + i_srvtype = PQfnumber(res, "srvtype"); + i_srvversion = PQfnumber(res, "srvversion"); + i_srvacl = PQfnumber(res, "srvacl"); + i_srvoptions = PQfnumber(res, "srvoptions"); + + for (i = 0; i < ntups; i++) + { + srvinfo[i].dobj.objType = DO_FOREIGN_SERVER; + srvinfo[i].dobj.catId.oid = atooid(PQgetvalue(res, i, i_oid)); + AssignDumpId(&srvinfo[i].dobj); + srvinfo[i].dobj.name = strdup(PQgetvalue(res, i, i_srvname)); + srvinfo[i].dobj.namespace = NULL; + srvinfo[i].rolname = strdup(PQgetvalue(res, i, i_rolname)); + srvinfo[i].srvfdw = atooid(PQgetvalue(res, i, i_srvfdw)); + srvinfo[i].srvtype = strdup(PQgetvalue(res, i, i_srvtype)); + srvinfo[i].srvversion = strdup(PQgetvalue(res, i, i_srvversion)); + srvinfo[i].srvoptions = strdup(PQgetvalue(res, i, i_srvoptions)); + srvinfo[i].srvacl = strdup(PQgetvalue(res, i, i_srvacl)); + + /* Decide whether we want to dump it */ + selectDumpableObject(&(srvinfo[i].dobj)); + } + + PQclear(res); + + destroyPQExpBuffer(query); + + return srvinfo; + } /* * dumpComment -- *************** *** 5671,5676 **** --- 5839,5850 ---- case DO_TSCONFIG: dumpTSConfig(fout, (TSConfigInfo *) dobj); break; + case DO_FDW: + dumpForeignDataWrapper(fout, (FdwInfo *) dobj); + break; + case DO_FOREIGN_SERVER: + dumpForeignServer(fout, (ForeignServerInfo *) dobj); + break; case DO_BLOBS: ArchiveEntry(fout, dobj->catId, dobj->dumpId, dobj->name, NULL, NULL, "", *************** *** 8976,8981 **** --- 9150,9376 ---- destroyPQExpBuffer(query); } + /* + * dumpForeignDataWrapper + * write out a single foreign-data wrapper definition + */ + static void + dumpForeignDataWrapper(Archive *fout, FdwInfo *fdwinfo) + { + PQExpBuffer q; + PQExpBuffer delq; + char *namecopy; + + /* Skip if not to be dumped */ + if (!fdwinfo->dobj.dump || dataOnly) + return; + + q = createPQExpBuffer(); + delq = createPQExpBuffer(); + + appendPQExpBuffer(q, "CREATE FOREIGN DATA WRAPPER %s LIBRARY '%s' LANGUAGE C", + fmtId(fdwinfo->dobj.name), fdwinfo->fdwlibrary); + if (fdwinfo->fdwoptions && strlen(fdwinfo->fdwoptions) > 0) + appendPQExpBuffer(q, " OPTIONS (%s)", fdwinfo->fdwoptions); + + appendPQExpBuffer(q, ";\n"); + + appendPQExpBuffer(delq, "DROP FOREIGN DATA WRAPPER %s;\n", + fmtId(fdwinfo->dobj.name)); + + ArchiveEntry(fout, fdwinfo->dobj.catId, fdwinfo->dobj.dumpId, + fdwinfo->dobj.name, + NULL, + NULL, + fdwinfo->rolname, + false, "FOREIGN DATA WRAPPER", q->data, delq->data, NULL, + fdwinfo->dobj.dependencies, fdwinfo->dobj.nDeps, + NULL, NULL); + + /* Handle the ACL */ + namecopy = strdup(fmtId(fdwinfo->dobj.name)); + dumpACL(fout, fdwinfo->dobj.catId, fdwinfo->dobj.dumpId, + "FOREIGN DATA WRAPPER", + namecopy, fdwinfo->dobj.name, + NULL, fdwinfo->rolname, + fdwinfo->fdwacl); + free(namecopy); + + destroyPQExpBuffer(q); + destroyPQExpBuffer(delq); + } + + /* + * dumpForeignServer + * write out a foreign server definition + */ + static void + dumpForeignServer(Archive *fout, ForeignServerInfo *srvinfo) + { + PQExpBuffer q; + PQExpBuffer delq; + PQExpBuffer query; + PGresult *res; + int ntups; + char *namecopy; + char *fdwname; + + /* Skip if not to be dumped */ + if (!srvinfo->dobj.dump || dataOnly) + return; + + q = createPQExpBuffer(); + delq = createPQExpBuffer(); + query = createPQExpBuffer(); + + /* look up the foreign-data wrapper */ + appendPQExpBuffer(query, "SELECT fdwname " + "FROM pg_foreign_data_wrapper w " + "WHERE w.oid = '%u'", + srvinfo->srvfdw); + res = PQexec(g_conn, query->data); + check_sql_result(res, g_conn, query->data, PGRES_TUPLES_OK); + ntups = PQntuples(res); + if (ntups != 1) + { + write_msg(NULL, "query returned %d rows instead of one: %s\n", + ntups, query->data); + exit_nicely(); + } + fdwname = PQgetvalue(res, 0, 0); + + appendPQExpBuffer(q, "CREATE SERVER %s", fmtId(srvinfo->dobj.name)); + if (srvinfo->srvtype && strlen(srvinfo->srvtype) > 0) + appendPQExpBuffer(q, " TYPE '%s'", srvinfo->srvtype); + if (srvinfo->srvversion && strlen(srvinfo->srvversion) > 0) + appendPQExpBuffer(q, " VERSION '%s'", srvinfo->srvversion); + + appendPQExpBuffer(q, " FOREIGN DATA WRAPPER "); + appendPQExpBuffer(q, "%s", fmtId(fdwname)); + + if (srvinfo->srvoptions && strlen(srvinfo->srvoptions) > 0) + appendPQExpBuffer(q, " OPTIONS (%s)", srvinfo->srvoptions); + + appendPQExpBuffer(q, ";\n"); + + appendPQExpBuffer(delq, "DROP SERVER %s;\n", + fmtId(srvinfo->dobj.name)); + + ArchiveEntry(fout, srvinfo->dobj.catId, srvinfo->dobj.dumpId, + srvinfo->dobj.name, + NULL, + NULL, + srvinfo->rolname, + false, "SERVER", q->data, delq->data, NULL, + srvinfo->dobj.dependencies, srvinfo->dobj.nDeps, + NULL, NULL); + + /* Handle the ACL */ + namecopy = strdup(fmtId(srvinfo->dobj.name)); + dumpACL(fout, srvinfo->dobj.catId, srvinfo->dobj.dumpId, + "SERVER", + namecopy, srvinfo->dobj.name, + NULL, srvinfo->rolname, + srvinfo->srvacl); + free(namecopy); + + /* Dump user mappings */ + resetPQExpBuffer(q); + appendPQExpBuffer(q, "SERVER %s", fmtId(srvinfo->dobj.name)); + dumpUserMappings(fout, q->data, + srvinfo->dobj.name, NULL, + srvinfo->rolname, + srvinfo->dobj.catId, srvinfo->dobj.dumpId); + + destroyPQExpBuffer(q); + destroyPQExpBuffer(delq); + } + + /* + * dumpUserMappings + * + * This routine is used to dump any user mappings associated with the + * server handed to this routine. Should be called after ArchiveEntry() + * for the server. + */ + static void + dumpUserMappings(Archive *fout, const char *target, + const char *servername, const char *namespace, + const char *owner, + CatalogId catalogId, DumpId dumpId) + { + PQExpBuffer q; + PQExpBuffer delq; + PQExpBuffer query; + PQExpBuffer tag; + PGresult *res; + int ntups; + int i_usename; + int i_umoptions; + int i; + + q = createPQExpBuffer(); + tag = createPQExpBuffer(); + delq = createPQExpBuffer(); + query = createPQExpBuffer(); + + appendPQExpBuffer(query, "SELECT usename, " + "array_to_string(ARRAY(\n" + " SELECT\n" + " option_name || ' ' || quote_literal(option_value)\n" + " FROM\n" + " pg_get_user_mapping_options(umid)\n" + "), ', ') as umoptions\n" + "FROM pg_user_mappings WHERE srvid=%u", + catalogId.oid); + + res = PQexec(g_conn, query->data); + check_sql_result(res, g_conn, query->data, PGRES_TUPLES_OK); + + ntups = PQntuples(res); + i_usename = PQfnumber(res, "usename"); + i_umoptions = PQfnumber(res, "umoptions"); + + for (i = 0; i < ntups; i++) + { + char *usename; + char *umoptions; + + usename = PQgetvalue(res, i, i_usename); + umoptions = PQgetvalue(res, i, i_umoptions); + + resetPQExpBuffer(q); + appendPQExpBuffer(q, "CREATE USER MAPPING FOR %s", fmtId(usename)); + appendPQExpBuffer(q, " SERVER %s", fmtId(servername)); + + if (umoptions && strlen(umoptions) > 0) + appendPQExpBuffer(q, " OPTIONS (%s)", umoptions); + + appendPQExpBuffer(q, ";\n"); + + resetPQExpBuffer(delq); + appendPQExpBuffer(delq, "DROP USER MAPPING FOR %s SERVER %s;\n", fmtId(usename), fmtId(servername)); + + resetPQExpBuffer(tag); + appendPQExpBuffer(tag, "USER MAPPING %s %s", fmtId(usename), target); + + ArchiveEntry(fout, nilCatalogId, createDumpId(), + tag->data, + namespace, + NULL, + owner, false, + "USER MAPPING", q->data, + delq->data, NULL, + &dumpId, 1, + NULL, NULL); + } + + PQclear(res); + + destroyPQExpBuffer(query); + destroyPQExpBuffer(delq); + destroyPQExpBuffer(q); + } /*---------- * Write out grant/revoke information diff -cNr -x CVS cvs-pgsql/src/bin/pg_dump/pg_dump.h pgsql/src/bin/pg_dump/pg_dump.h *** cvs-pgsql/src/bin/pg_dump/pg_dump.h Thu Nov 13 10:44:41 2008 --- pgsql/src/bin/pg_dump/pg_dump.h Fri Dec 12 10:44:15 2008 *************** *** 131,136 **** --- 131,138 ---- DO_TSDICT, DO_TSTEMPLATE, DO_TSCONFIG, + DO_FDW, + DO_FOREIGN_SERVER, DO_BLOBS, DO_BLOB_COMMENTS } DumpableObjectType; *************** *** 418,423 **** --- 420,445 ---- Oid cfgparser; } TSConfigInfo; + typedef struct _fdwInfo + { + DumpableObject dobj; + char *rolname; + char *fdwlibrary; + char *fdwoptions; + char *fdwacl; + } FdwInfo; + + typedef struct _foreignServerInfo + { + DumpableObject dobj; + char *rolname; + Oid srvfdw; + char *srvtype; + char *srvversion; + char *srvacl; + char *srvoptions; + } ForeignServerInfo; + /* global decls */ extern bool force_quotes; /* double-quotes for identifiers flag */ extern bool g_verbose; /* verbose flag */ *************** *** 500,504 **** --- 522,528 ---- extern TSDictInfo *getTSDictionaries(int *numTSDicts); extern TSTemplateInfo *getTSTemplates(int *numTSTemplates); extern TSConfigInfo *getTSConfigurations(int *numTSConfigs); + extern FdwInfo *getForeignDataWrappers(int *numForeignDataWrappers); + extern ForeignServerInfo *getForeignServers(int *numForeignServers); #endif /* PG_DUMP_H */ diff -cNr -x CVS cvs-pgsql/src/bin/pg_dump/pg_dump_sort.c pgsql/src/bin/pg_dump/pg_dump_sort.c *** cvs-pgsql/src/bin/pg_dump/pg_dump_sort.c Thu Sep 11 15:30:02 2008 --- pgsql/src/bin/pg_dump/pg_dump_sort.c Fri Dec 12 10:44:15 2008 *************** *** 50,55 **** --- 50,57 ---- 4, /* DO_TSDICT */ 3, /* DO_TSTEMPLATE */ 5, /* DO_TSCONFIG */ + 3, /* DO_FDW */ + 4, /* DO_FOREIGN_SERVER */ 10, /* DO_BLOBS */ 11 /* DO_BLOB_COMMENTS */ }; *************** *** 84,89 **** --- 86,93 ---- 6, /* DO_TSDICT */ 5, /* DO_TSTEMPLATE */ 7, /* DO_TSCONFIG */ + 3, /* DO_FDW */ + 4, /* DO_FOREIGN_SERVER */ 14, /* DO_BLOBS */ 15 /* DO_BLOB_COMMENTS */ }; *************** *** 1123,1128 **** --- 1127,1142 ---- "TEXT SEARCH CONFIGURATION %s (ID %d OID %u)", obj->name, obj->dumpId, obj->catId.oid); return; + case DO_FDW: + snprintf(buf, bufsize, + "FOREIGN DATA WRAPPER %s (ID %d OID %u)", + obj->name, obj->dumpId, obj->catId.oid); + return; + case DO_FOREIGN_SERVER: + snprintf(buf, bufsize, + "FOREIGN SERVER %s (ID %d OID %u)", + obj->name, obj->dumpId, obj->catId.oid); + return; case DO_BLOBS: snprintf(buf, bufsize, "BLOBS (ID %d)", diff -cNr -x CVS cvs-pgsql/src/bin/psql/command.c pgsql/src/bin/psql/command.c *** cvs-pgsql/src/bin/psql/command.c Mon Nov 24 09:49:53 2008 --- pgsql/src/bin/psql/command.c Mon Dec 15 11:05:44 2008 *************** *** 416,422 **** break; } break; ! default: status = PSQL_CMD_UNKNOWN; } --- 416,438 ---- break; } break; ! case 'e': /* SQL/MED subsystem */ ! switch(cmd[2]) ! { ! case 's': ! success = listForeignServers(pattern, show_verbose); ! break; ! case 'u': ! success = listUserMappings(pattern, show_verbose); ! break; ! case 'w': ! success = listForeignDataWrappers(pattern, show_verbose); ! break; ! default: ! status = PSQL_CMD_UNKNOWN; ! break; ! } ! break; default: status = PSQL_CMD_UNKNOWN; } diff -cNr -x CVS cvs-pgsql/src/bin/psql/describe.c pgsql/src/bin/psql/describe.c *** cvs-pgsql/src/bin/psql/describe.c Thu Nov 13 10:44:41 2008 --- pgsql/src/bin/psql/describe.c Mon Dec 15 11:00:27 2008 *************** *** 2766,2768 **** --- 2766,2922 ---- PQclear(res); return true; } + + + /* + * \dew + * + * Describes foreign-data wrappers + */ + bool + listForeignDataWrappers(const char *pattern, bool verbose) + { + PQExpBufferData buf; + PGresult *res; + printQueryOpt myopt = pset.popt; + + initPQExpBuffer(&buf); + printfPQExpBuffer(&buf, + "SELECT fdwname AS \"%s\",\n" + " pg_catalog.pg_get_userbyid(fdwowner) AS \"%s\",\n" + " fdwlibrary AS \"%s\"\n", + gettext_noop("Name"), + gettext_noop("Owner"), + gettext_noop("Library")); + + if (verbose) + appendPQExpBuffer(&buf, + ",\n fdwacl as \"%s\"," + " fdwoptions as \"%s\"", + gettext_noop("Access privileges"), + gettext_noop("Options")); + + appendPQExpBuffer(&buf, "\nFROM pg_catalog.pg_foreign_data_wrapper WHERE 1=1\n"); + + processSQLNamePattern(pset.db, &buf, pattern, true, false, + NULL, "fdwname", NULL, NULL); + + appendPQExpBuffer(&buf, "ORDER BY 1;"); + + res = PSQLexec(buf.data, false); + termPQExpBuffer(&buf); + if (!res) + return false; + + myopt.nullPrint = NULL; + myopt.title = _("List of foreign-data wrappers"); + myopt.translate_header = true; + + printQuery(res, &myopt, pset.queryFout, pset.logfile); + + PQclear(res); + return true; + } + + /* + * \des + * + * Describes servers. + */ + bool + listForeignServers(const char *pattern, bool verbose) + { + PQExpBufferData buf; + PGresult *res; + printQueryOpt myopt = pset.popt; + + initPQExpBuffer(&buf); + printfPQExpBuffer(&buf, + "SELECT s.srvname AS \"%s\",\n" + " pg_catalog.pg_get_userbyid(s.srvowner) AS \"%s\",\n" + " f.fdwname AS \"%s\"\n", + gettext_noop("Name"), + gettext_noop("Owner"), + gettext_noop("Foreign-data wrapper")); + + if (verbose) + appendPQExpBuffer(&buf, + ",\n s.srvacl as \"%s\"," + " s.srvtype as \"%s\"," + " s.srvversion as \"%s\"," + " s.srvoptions as \"%s\"", + gettext_noop("Access privileges"), + gettext_noop("Type"), + gettext_noop("Version"), + gettext_noop("Options")); + + appendPQExpBuffer(&buf, + "\nFROM pg_foreign_server s\n" + "JOIN pg_catalog.pg_foreign_data_wrapper f ON f.oid=s.srvfdw\n"); + + processSQLNamePattern(pset.db, &buf, pattern, true, false, + NULL, "s.srvname", NULL, NULL); + + appendPQExpBuffer(&buf, "ORDER BY 1;"); + + res = PSQLexec(buf.data, false); + termPQExpBuffer(&buf); + if (!res) + return false; + + myopt.nullPrint = NULL; + myopt.title = _("List of foreign servers"); + myopt.translate_header = true; + + printQuery(res, &myopt, pset.queryFout, pset.logfile); + + PQclear(res); + return true; + } + + /* + * \deu + * + * Describes user mappings. + */ + bool + listUserMappings(const char *pattern, bool verbose) + { + PQExpBufferData buf; + PGresult *res; + printQueryOpt myopt = pset.popt; + + initPQExpBuffer(&buf); + printfPQExpBuffer(&buf, + "SELECT um.srvname AS \"%s\",\n" + " um.usename AS \"%s\"", + gettext_noop("Server"), + gettext_noop("Username")); + + if (verbose) + appendPQExpBuffer(&buf, + ",\n nullif(array(select option_name||'='||option_value" + " from pg_get_user_mapping_options(um.umid)), '{}') \"%s\"", + gettext_noop("Options")); + + appendPQExpBuffer(&buf, "\nFROM pg_catalog.pg_user_mappings um WHERE 1=1\n"); + + processSQLNamePattern(pset.db, &buf, pattern, true, false, + NULL, "um.srvname", "um.usename", NULL); + + appendPQExpBuffer(&buf, "ORDER BY 1, 2;"); + + res = PSQLexec(buf.data, false); + termPQExpBuffer(&buf); + if (!res) + return false; + + myopt.nullPrint = NULL; + myopt.title = _("List of user mappings"); + myopt.translate_header = true; + + printQuery(res, &myopt, pset.queryFout, pset.logfile); + + PQclear(res); + return true; + } diff -cNr -x CVS cvs-pgsql/src/bin/psql/describe.h pgsql/src/bin/psql/describe.h *** cvs-pgsql/src/bin/psql/describe.h Tue Jan 1 21:45:56 2008 --- pgsql/src/bin/psql/describe.h Mon Dec 15 11:00:25 2008 *************** *** 66,70 **** --- 66,79 ---- /* \dn */ extern bool listSchemas(const char *pattern, bool verbose); + /* \dew */ + extern bool listForeignDataWrappers(const char *pattern, bool verbose); + + /* \des */ + extern bool listForeignServers(const char *pattern, bool verbose); + + /* \deu */ + extern bool listUserMappings(const char *pattern, bool verbose); + #endif /* DESCRIBE_H */ diff -cNr -x CVS cvs-pgsql/src/bin/psql/help.c pgsql/src/bin/psql/help.c *** cvs-pgsql/src/bin/psql/help.c Thu Nov 13 10:44:41 2008 --- pgsql/src/bin/psql/help.c Mon Dec 15 11:00:26 2008 *************** *** 203,208 **** --- 203,211 ---- fprintf(output, _(" \\dC [PATTERN] list casts\n")); fprintf(output, _(" \\dd [PATTERN] show comment for object\n")); fprintf(output, _(" \\dD [PATTERN] list domains\n")); + fprintf(output, _(" \\des [PATTERN] list foreign servers (add \"+\" for more detail)\n")); + fprintf(output, _(" \\deu [PATTERN] list user mappings (add \"+\" for more detail)\n")); + fprintf(output, _(" \\dew [PATTERN] list foreign-data wrappers (add \"+\" for more detail)\n")); fprintf(output, _(" \\df [PATTERN] list functions (add \"+\" for more detail)\n")); fprintf(output, _(" \\dF [PATTERN] list text search configurations (add \"+\" for more detail)\n")); fprintf(output, _(" \\dFd [PATTERN] list text search dictionaries (add \"+\" for more detail)\n")); diff -cNr -x CVS cvs-pgsql/src/bin/psql/tab-complete.c pgsql/src/bin/psql/tab-complete.c *** cvs-pgsql/src/bin/psql/tab-complete.c Fri Nov 21 11:46:51 2008 --- pgsql/src/bin/psql/tab-complete.c Mon Dec 15 11:00:23 2008 *************** *** 497,502 **** --- 497,517 ---- "SELECT pg_catalog.quote_ident(tmplname) FROM pg_catalog.pg_ts_template "\ " WHERE substring(pg_catalog.quote_ident(tmplname),1,%d)='%s'" + #define Query_for_list_of_fdws \ + " SELECT pg_catalog.quote_ident(fdwname) "\ + " FROM pg_catalog.pg_foreign_data_wrapper "\ + " WHERE substring(pg_catalog.quote_ident(fdwname),1,%d)='%s'" + + #define Query_for_list_of_servers \ + " SELECT pg_catalog.quote_ident(srvname) "\ + " FROM pg_catalog.pg_foreign_server "\ + " WHERE substring(pg_catalog.quote_ident(srvname),1,%d)='%s'" + + #define Query_for_list_of_user_mappings \ + " SELECT pg_catalog.quote_ident(usename) "\ + " FROM pg_catalog.pg_user_mappings "\ + " WHERE substring(pg_catalog.quote_ident(usename),1,%d)='%s'" + /* * This is a list of all "things" in Pgsql, which can show up after CREATE or * DROP; and there is also a query to get a list of them. *************** *** 525,530 **** --- 540,546 ---- {"DATABASE", Query_for_list_of_databases}, {"DICTIONARY", Query_for_list_of_ts_dictionaries, NULL, true}, {"DOMAIN", NULL, &Query_for_list_of_domains}, + {"FOREIGN DATA WRAPPER", Query_for_list_of_fdws}, {"FUNCTION", NULL, &Query_for_list_of_functions}, {"GROUP", Query_for_list_of_roles}, {"LANGUAGE", Query_for_list_of_languages}, *************** *** 536,541 **** --- 552,558 ---- {"RULE", "SELECT pg_catalog.quote_ident(rulename) FROM pg_catalog.pg_rules WHERE substring(pg_catalog.quote_ident(rulename),1,%d)='%s'"}, {"SCHEMA", Query_for_list_of_schemas}, {"SEQUENCE", NULL, &Query_for_list_of_sequences}, + {"SERVER", Query_for_list_of_servers}, {"TABLE", NULL, &Query_for_list_of_tables}, {"TABLESPACE", Query_for_list_of_tablespaces}, {"TEMP", NULL, NULL}, /* for CREATE TEMP TABLE ... */ *************** *** 545,550 **** --- 562,568 ---- {"TYPE", NULL, &Query_for_list_of_datatypes}, {"UNIQUE", NULL, NULL}, /* for CREATE UNIQUE INDEX ... */ {"USER", Query_for_list_of_roles}, + {"USER MAPPING", Query_for_list_of_user_mappings}, {"VIEW", NULL, &Query_for_list_of_views}, {NULL, NULL, NULL, false} /* end of list */ }; *************** *** 624,629 **** --- 642,648 ---- "\\d", "\\da", "\\db", "\\dc", "\\dC", "\\dd", "\\dD", "\\df", "\\dF", "\\dFd", "\\dFp", "\\dFt", "\\dg", "\\di", "\\dl", "\\dn", "\\do", "\\dp", "\\ds", "\\dS", "\\dt", "\\dT", "\\dv", "\\du", + "\\des", "\\deu", "\\dew", "\\e", "\\echo", "\\encoding", "\\f", "\\g", "\\h", "\\help", "\\H", "\\i", "\\l", "\\lo_import", "\\lo_export", "\\lo_list", "\\lo_unlink", *************** *** 686,694 **** pg_strcasecmp(prev3_wd, "TABLE") != 0) { static const char *const list_ALTER[] = ! {"AGGREGATE", "CONVERSION", "DATABASE", "DOMAIN", "FUNCTION", ! "GROUP", "INDEX", "LANGUAGE", "OPERATOR", "ROLE", "SCHEMA", "SEQUENCE", "TABLE", ! "TABLESPACE", "TEXT SEARCH", "TRIGGER", "TYPE", "USER", "VIEW", NULL}; COMPLETE_WITH_LIST(list_ALTER); } --- 705,713 ---- pg_strcasecmp(prev3_wd, "TABLE") != 0) { static const char *const list_ALTER[] = ! {"AGGREGATE", "CONVERSION", "DATABASE", "DOMAIN", "FOREIGN DATA WRAPPER", "FUNCTION", ! "GROUP", "INDEX", "LANGUAGE", "OPERATOR", "ROLE", "SCHEMA", "SERVER", "SEQUENCE", "TABLE", ! "TABLESPACE", "TEXT SEARCH", "TRIGGER", "TYPE", "USER", "USER MAPPING", "VIEW", NULL}; COMPLETE_WITH_LIST(list_ALTER); } *************** *** 746,751 **** --- 765,771 ---- /* ALTER USER,ROLE */ else if (pg_strcasecmp(prev3_wd, "ALTER") == 0 && + !(pg_strcasecmp(prev2_wd, "USER") == 0 && pg_strcasecmp(prev_wd, "MAPPING") == 0) && (pg_strcasecmp(prev2_wd, "USER") == 0 || pg_strcasecmp(prev2_wd, "ROLE") == 0)) { *************** *** 1357,1362 **** --- 1377,1383 ---- /* CREATE ROLE,USER,GROUP */ else if (pg_strcasecmp(prev3_wd, "CREATE") == 0 && + !(pg_strcasecmp(prev2_wd, "USER") == 0 && pg_strcasecmp(prev_wd, "MAPPING") == 0) && (pg_strcasecmp(prev2_wd, "ROLE") == 0 || pg_strcasecmp(prev2_wd, "GROUP") == 0 || pg_strcasecmp(prev2_wd, "USER") == 0)) { *************** *** 1640,1645 **** --- 1661,1668 ---- pg_strcasecmp(prev_wd, "ON") == 0) COMPLETE_WITH_SCHEMA_QUERY(Query_for_list_of_tsv, " UNION SELECT 'DATABASE'" + " UNION SELECT 'FOREIGN DATA WRAPPER'" + " UNION SELECT 'FOREIGN SERVER'" " UNION SELECT 'FUNCTION'" " UNION SELECT 'LANGUAGE'" " UNION SELECT 'SCHEMA'" *************** *** 2075,2080 **** --- 2098,2168 ---- pg_strcasecmp(prev3_wd, "\\copy") != 0) COMPLETE_WITH_SCHEMA_QUERY(Query_for_list_of_tsv, NULL); + /* FOREIGN DATA WRAPPER */ + else if (pg_strcasecmp(prev5_wd, "ALTER") == 0 && + pg_strcasecmp(prev4_wd, "FOREIGN") == 0 && + pg_strcasecmp(prev3_wd, "DATA") == 0 && + pg_strcasecmp(prev2_wd, "WRAPPER") == 0) + { + static const char *const list_ALTER_FDW[] = + {"LIBRARY", "OWNER TO", NULL}; + + COMPLETE_WITH_LIST(list_ALTER_FDW); + } + else if (pg_strcasecmp(prev5_wd, "CREATE") == 0 && + pg_strcasecmp(prev4_wd, "FOREIGN") == 0 && + pg_strcasecmp(prev3_wd, "DATA") == 0 && + pg_strcasecmp(prev2_wd, "WRAPPER") == 0) + COMPLETE_WITH_CONST("LIBRARY"); + else if (pg_strcasecmp(prev5_wd, "DROP") == 0 && + pg_strcasecmp(prev4_wd, "FOREIGN") == 0 && + pg_strcasecmp(prev3_wd, "DATA") == 0 && + pg_strcasecmp(prev2_wd, "WRAPPER") == 0) + COMPLETE_WITH_QUERY(Query_for_list_of_fdws); + + /* SERVER */ + else if (pg_strcasecmp(prev3_wd, "CREATE") == 0 && + pg_strcasecmp(prev2_wd, "SERVER") == 0) + { + static const char *const list_CREATE_SERVER[] = + {"TYPE", "VERSION", "FOREIGN DATA WRAPPER", NULL}; + + COMPLETE_WITH_LIST(list_CREATE_SERVER); + } + else if (pg_strcasecmp(prev3_wd, "ALTER") == 0 && + pg_strcasecmp(prev2_wd, "SERVER") == 0) + { + static const char *const list_ALTER_SERVER[] = + {"VERSION", "OPTIONS", NULL}; + + COMPLETE_WITH_LIST(list_ALTER_SERVER); + } + + /* USER MAPPING */ + else if ((pg_strcasecmp(prev3_wd, "ALTER") == 0 || + pg_strcasecmp(prev3_wd, "CREATE") == 0 || + pg_strcasecmp(prev3_wd, "DROP") == 0) && + pg_strcasecmp(prev2_wd, "USER") == 0 && + pg_strcasecmp(prev_wd, "MAPPING") == 0) + COMPLETE_WITH_CONST("FOR"); + else if (pg_strcasecmp(prev4_wd, "CREATE") == 0 && + pg_strcasecmp(prev3_wd, "USER") == 0 && + pg_strcasecmp(prev2_wd, "MAPPING") == 0 && + pg_strcasecmp(prev_wd, "FOR") == 0) + COMPLETE_WITH_QUERY(Query_for_list_of_roles); + else if ((pg_strcasecmp(prev4_wd, "ALTER") == 0 || + pg_strcasecmp(prev4_wd, "DROP") == 0) && + pg_strcasecmp(prev3_wd, "USER") == 0 && + pg_strcasecmp(prev2_wd, "MAPPING") == 0 && + pg_strcasecmp(prev_wd, "FOR") == 0) + COMPLETE_WITH_QUERY(Query_for_list_of_user_mappings); + else if ((pg_strcasecmp(prev5_wd, "CREATE") == 0 || + pg_strcasecmp(prev5_wd, "ALTER") == 0 || + pg_strcasecmp(prev5_wd, "DROP") == 0) && + pg_strcasecmp(prev4_wd, "USER") == 0 && + pg_strcasecmp(prev3_wd, "MAPPING") == 0 && + pg_strcasecmp(prev2_wd, "FOR") == 0) + COMPLETE_WITH_CONST("SERVER"); /* Backslash commands */ /* TODO: \dc \dd \dl */ *************** *** 2088,2093 **** --- 2176,2187 ---- COMPLETE_WITH_QUERY(Query_for_list_of_tablespaces); else if (strcmp(prev_wd, "\\dD") == 0) COMPLETE_WITH_SCHEMA_QUERY(Query_for_list_of_domains, NULL); + else if (strcmp(prev_wd, "\\des") == 0 || strcmp(prev_wd, "\\des+") == 0) + COMPLETE_WITH_QUERY(Query_for_list_of_servers); + else if (strcmp(prev_wd, "\\deu") == 0 || strcmp(prev_wd, "\\deu+") == 0) + COMPLETE_WITH_QUERY(Query_for_list_of_user_mappings); + else if (strcmp(prev_wd, "\\dew") == 0 || strcmp(prev_wd, "\\dew+") == 0) + COMPLETE_WITH_QUERY(Query_for_list_of_fdws); else if (strcmp(prev_wd, "\\df") == 0 || strcmp(prev_wd, "\\df+") == 0) COMPLETE_WITH_SCHEMA_QUERY(Query_for_list_of_functions, NULL); else if (strcmp(prev_wd, "\\dF") == 0 || strcmp(prev_wd, "\\dF+") == 0) diff -cNr -x CVS cvs-pgsql/src/include/catalog/catversion.h pgsql/src/include/catalog/catversion.h *** cvs-pgsql/src/include/catalog/catversion.h Fri Dec 5 15:06:29 2008 --- pgsql/src/include/catalog/catversion.h Mon Dec 15 11:09:21 2008 *************** *** 4,10 **** * "Catalog version number" for PostgreSQL. * * The catalog version number is used to flag incompatible changes in ! * the PostgreSQL system catalogs. Whenever anyone changes the format of * a system catalog relation, or adds, deletes, or modifies standard * catalog entries in such a way that an updated backend wouldn't work * with an old database (or vice versa), the catalog version number --- 4,10 ---- * "Catalog version number" for PostgreSQL. * * The catalog version number is used to flag incompatible changes in ! * the PostgreSQL system catalogs. Whenever anyone changes the format of * a system catalog relation, or adds, deletes, or modifies standard * catalog entries in such a way that an updated backend wouldn't work * with an old database (or vice versa), the catalog version number *************** *** 53,58 **** */ /* yyyymmddN */ ! #define CATALOG_VERSION_NO 200812041 #endif --- 53,58 ---- */ /* yyyymmddN */ ! #define CATALOG_VERSION_NO 200812151 #endif diff -cNr -x CVS cvs-pgsql/src/include/catalog/dependency.h pgsql/src/include/catalog/dependency.h *** cvs-pgsql/src/include/catalog/dependency.h Mon Jun 9 01:41:04 2008 --- pgsql/src/include/catalog/dependency.h Fri Dec 12 10:44:16 2008 *************** *** 143,148 **** --- 143,151 ---- OCLASS_ROLE, /* pg_authid */ OCLASS_DATABASE, /* pg_database */ OCLASS_TBLSPACE, /* pg_tablespace */ + OCLASS_FDW, /* pg_foreign_data_wrapper */ + OCLASS_FOREIGN_SERVER, /* pg_foreign_server */ + OCLASS_USER_MAPPING, /* pg_user_mapping */ MAX_OCLASS /* MUST BE LAST */ } ObjectClass; diff -cNr -x CVS cvs-pgsql/src/include/catalog/indexing.h pgsql/src/include/catalog/indexing.h *** cvs-pgsql/src/include/catalog/indexing.h Thu Jun 19 03:46:06 2008 --- pgsql/src/include/catalog/indexing.h Fri Dec 12 10:44:16 2008 *************** *** 252,257 **** --- 252,275 ---- DECLARE_UNIQUE_INDEX(pg_type_typname_nsp_index, 2704, on pg_type using btree(typname name_ops, typnamespace oid_ops)); #define TypeNameNspIndexId 2704 + DECLARE_UNIQUE_INDEX(pg_foreign_data_wrapper_oid_index, 112, on pg_foreign_data_wrapper using btree(oid oid_ops)); + #define ForeignDataWrapperOidIndexId 112 + + DECLARE_UNIQUE_INDEX(pg_foreign_data_wrapper_name_index, 548, on pg_foreign_data_wrapper using btree(fdwname name_ops)); + #define ForeignDataWrapperNameIndexId 548 + + DECLARE_UNIQUE_INDEX(pg_foreign_server_oid_index, 113, on pg_foreign_server using btree(oid oid_ops)); + #define ForeignServerOidIndexId 113 + + DECLARE_UNIQUE_INDEX(pg_foreign_server_name_index, 549, on pg_foreign_server using btree(srvname name_ops)); + #define ForeignServerNameIndexId 549 + + DECLARE_UNIQUE_INDEX(pg_user_mapping_oid_index, 174, on pg_user_mapping using btree(oid oid_ops)); + #define UserMappingOidIndexId 174 + + DECLARE_UNIQUE_INDEX(pg_user_mapping_user_server_index, 175, on pg_user_mapping using btree(umuser oid_ops, umserver oid_ops)); + #define UserMappingUserServerIndexId 175 + /* last step of initialization script: build the indexes declared above */ BUILD_INDICES diff -cNr -x CVS cvs-pgsql/src/include/catalog/pg_foreign_data_wrapper.h pgsql/src/include/catalog/pg_foreign_data_wrapper.h *** cvs-pgsql/src/include/catalog/pg_foreign_data_wrapper.h Thu Jan 1 02:00:00 1970 --- pgsql/src/include/catalog/pg_foreign_data_wrapper.h Mon Dec 15 13:36:49 2008 *************** *** 0 **** --- 1,72 ---- + /*------------------------------------------------------------------------- + * + * pg_foreign_data_wrapper.h + * definition of the system "foreign-data wrapper" relation (pg_foreign_data_wrapper) + * along with the relation's initial contents. + * + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * Portions Copyright (c) 1994, Regents of the University of California + * + * $PostgreSQL$ + * + * NOTES + * the genbki.sh script reads this file and generates .bki + * information from the DATA() statements. + * + *------------------------------------------------------------------------- + */ + #ifndef PG_FOREIGN_DATA_WRAPPER_H + #define PG_FOREIGN_DATA_WRAPPER_H + + #include "catalog/genbki.h" + + /* ---------------- + * pg_foreign_data_wrapper definition. cpp turns this into + * typedef struct FormData_pg_foreign_data_wrapper + * ---------------- + */ + #define ForeignDataWrapperRelationId 2328 + + CATALOG(pg_foreign_data_wrapper,2328) + { + NameData fdwname; /* foreign-data wrapper name */ + Oid fdwowner; /* FDW owner */ + + /* VARIABLE LENGTH FIELDS start here. */ + + text fdwlibrary; /* FDW shared library location */ + aclitem fdwacl[1]; /* access permissions */ + text fdwoptions[1]; /* FDW options */ + } FormData_pg_foreign_data_wrapper; + + /* ---------------- + * Form_pg_fdw corresponds to a pointer to a tuple with + * the format of pg_fdw relation. + * ---------------- + */ + typedef FormData_pg_foreign_data_wrapper *Form_pg_foreign_data_wrapper; + + /* ---------------- + * compiler constants for pg_fdw + * ---------------- + */ + + #define Natts_pg_foreign_data_wrapper 5 + #define Anum_pg_foreign_data_wrapper_fdwname 1 + #define Anum_pg_foreign_data_wrapper_fdwowner 2 + #define Anum_pg_foreign_data_wrapper_fdwlibrary 3 + #define Anum_pg_foreign_data_wrapper_fdwacl 4 + #define Anum_pg_foreign_data_wrapper_fdwoptions 5 + + /* ---------------- + * initial contents of pg_fdw + * ---------------- + */ + + DATA(insert OID = 626 ( dummy PGUID dummy_fdw _null_ _null_ )); + DESCR("dummy pass-through foreign-data wrapper"); + DATA(insert OID = 627 ( postgresql PGUID postgresql_fdw _null_ _null_ )); + DESCR("PostgreSQL foreign-data wrapper"); + + #endif /* PG_FOREIGN_DATA_WRAPPER_H */ diff -cNr -x CVS cvs-pgsql/src/include/catalog/pg_foreign_server.h pgsql/src/include/catalog/pg_foreign_server.h *** cvs-pgsql/src/include/catalog/pg_foreign_server.h Thu Jan 1 02:00:00 1970 --- pgsql/src/include/catalog/pg_foreign_server.h Fri Dec 12 10:44:16 2008 *************** *** 0 **** --- 1,65 ---- + /*------------------------------------------------------------------------- + * + * pg_foreign_server.h + * definition of the system "foreign server" relation (pg_foreign_server) + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * Portions Copyright (c) 1994, Regents of the University of California + * + * $PostgreSQL$ + * + * NOTES + * the genbki.sh script reads this file and generates .bki + * information from the DATA() statements. + * + *------------------------------------------------------------------------- + */ + #ifndef PG_FOREIGN_SERVER_H + #define PG_FOREIGN_SERVER_H + + #include "catalog/genbki.h" + + /* ---------------- + * pg_foreign_server definition. cpp turns this into + * typedef struct FormData_pg_foreign_server + * ---------------- + */ + #define ForeignServerRelationId 1417 + + CATALOG(pg_foreign_server,1417) + { + NameData srvname; /* foreign server name */ + Oid srvowner; /* server owner */ + Oid srvfdw; /* server FDW */ + + /* + * VARIABLE LENGTH FIELDS start here. These fields may be NULL, too. + */ + text srvtype; + text srvversion; + aclitem srvacl[1]; /* access permissions */ + text srvoptions[1]; /* FDW-specific options */ + } FormData_pg_foreign_server; + + /* ---------------- + * Form_pg_foreign_server corresponds to a pointer to a tuple with + * the format of pg_foreign_server relation. + * ---------------- + */ + typedef FormData_pg_foreign_server *Form_pg_foreign_server; + + /* ---------------- + * compiler constants for pg_foreign_server + * ---------------- + */ + + #define Natts_pg_foreign_server 7 + #define Anum_pg_foreign_server_srvname 1 + #define Anum_pg_foreign_server_srvowner 2 + #define Anum_pg_foreign_server_srvfdw 3 + #define Anum_pg_foreign_server_srvtype 4 + #define Anum_pg_foreign_server_srvversion 5 + #define Anum_pg_foreign_server_srvacl 6 + #define Anum_pg_foreign_server_srvoptions 7 + + #endif /* PG_FOREIGN_SERVER_H */ diff -cNr -x CVS cvs-pgsql/src/include/catalog/pg_proc.h pgsql/src/include/catalog/pg_proc.h *** cvs-pgsql/src/include/catalog/pg_proc.h Fri Dec 5 15:06:30 2008 --- pgsql/src/include/catalog/pg_proc.h Fri Dec 12 10:44:16 2008 *************** *** 3580,3585 **** --- 3580,3611 ---- DATA(insert OID = 2395 ( has_tablespace_privilege PGNSP PGUID 12 1 0 0 f f t f s 2 0 16 "26 25" _null_ _null_ _null_ _null_ has_tablespace_privilege_id _null_ _null_ _null_ )); DESCR("current user privilege on tablespace by tablespace oid"); + DATA(insert OID = 3000 ( has_foreign_data_wrapper_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "19 25 25" _null_ _null_ _null_ _null_ has_foreign_data_wrapper_privilege_name_name _null_ _null_ _null_ )); + DESCR("user privilege on foreign data wrapper by username, foreign data wrapper name"); + DATA(insert OID = 3001 ( has_foreign_data_wrapper_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "19 26 25" _null_ _null_ _null_ _null_ has_foreign_data_wrapper_privilege_name_id _null_ _null_ _null_ )); + DESCR("user privilege on foreign data wrapper by username, foreign data wrapper oid"); + DATA(insert OID = 3002 ( has_foreign_data_wrapper_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "26 25 25" _null_ _null_ _null_ _null_ has_foreign_data_wrapper_privilege_id_name _null_ _null_ _null_ )); + DESCR("user privilege on foreign data wrapper by user oid, foreign data wrapper name"); + DATA(insert OID = 3003 ( has_foreign_data_wrapper_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "26 26 25" _null_ _null_ _null_ _null_ has_foreign_data_wrapper_privilege_id_id _null_ _null_ _null_ )); + DESCR("user privilege on foreign data wrapper by user oid, foreign data wrapper oid"); + DATA(insert OID = 3004 ( has_foreign_data_wrapper_privilege PGNSP PGUID 12 1 0 0 f f t f s 2 0 16 "25 25" _null_ _null_ _null_ _null_ has_foreign_data_wrapper_privilege_name _null_ _null_ _null_ )); + DESCR("current user privilege on foreign data wrapper by foreign data wrapper name"); + DATA(insert OID = 3005 ( has_foreign_data_wrapper_privilege PGNSP PGUID 12 1 0 0 f f t f s 2 0 16 "26 25" _null_ _null_ _null_ _null_ has_foreign_data_wrapper_privilege_id _null_ _null_ _null_ )); + DESCR("current user privilege on foreign data wrapper by foreign data wrapper oid"); + + DATA(insert OID = 3006 ( has_server_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "19 25 25" _null_ _null_ _null_ _null_ has_server_privilege_name_name _null_ _null_ _null_ )); + DESCR("user privilege on server by username, server name"); + DATA(insert OID = 3007 ( has_server_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "19 26 25" _null_ _null_ _null_ _null_ has_server_privilege_name_id _null_ _null_ _null_ )); + DESCR("user privilege on server by username, server oid"); + DATA(insert OID = 3008 ( has_server_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "26 25 25" _null_ _null_ _null_ _null_ has_server_privilege_id_name _null_ _null_ _null_ )); + DESCR("user privilege on server by user oid, server name"); + DATA(insert OID = 3009 ( has_server_privilege PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "26 26 25" _null_ _null_ _null_ _null_ has_server_privilege_id_id _null_ _null_ _null_ )); + DESCR("user privilege on server by user oid, server oid"); + DATA(insert OID = 3010 ( has_server_privilege PGNSP PGUID 12 1 0 0 f f t f s 2 0 16 "25 25" _null_ _null_ _null_ _null_ has_server_privilege_name _null_ _null_ _null_ )); + DESCR("current user privilege on server by server name"); + DATA(insert OID = 3011 ( has_server_privilege PGNSP PGUID 12 1 0 0 f f t f s 2 0 16 "26 25" _null_ _null_ _null_ _null_ has_server_privilege_id _null_ _null_ _null_ )); + DESCR("current user privilege on server by server oid"); + DATA(insert OID = 2705 ( pg_has_role PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "19 19 25" _null_ _null_ _null_ _null_ pg_has_role_name_name _null_ _null_ _null_ )); DESCR("user privilege on role by username, role name"); DATA(insert OID = 2706 ( pg_has_role PGNSP PGUID 12 1 0 0 f f t f s 3 0 16 "19 26 25" _null_ _null_ _null_ _null_ pg_has_role_name_id _null_ _null_ _null_ )); *************** *** 4602,4607 **** --- 4628,4644 ---- DATA(insert OID = 2987 ( btrecordcmp PGNSP PGUID 12 1 0 0 f f t f i 2 0 23 "2249 2249" _null_ _null_ _null_ _null_ btrecordcmp _null_ _null_ _null_ )); DESCR("btree less-equal-greater"); + /* foreign connections */ + DATA(insert OID = 2995 ( pg_get_remote_connection_info PGNSP PGUID 12 1 3 0 f f t t s 2 0 2249 "19 19" "{19,19,25,25}" "{i,i,o,o}" "{server,username,option,value}" _null_ pg_get_remote_connection_info _null_ _null_ _null_ )); + DESCR("remote connection info"); + DATA(insert OID = 2996 ( pg_get_remote_connection_info PGNSP PGUID 12 1 3 0 f f t t s 1 0 2249 "19" "{19,25,25}" "{i,o,o}" "{server,option_name,option_value}" _null_ pg_get_remote_connection_info _null_ _null_ _null_ )); + DESCR("remote connection info"); + DATA(insert OID = 2997 ( pg_get_foreign_data_wrapper_options PGNSP PGUID 12 1 3 0 f f t t s 1 0 2249 "26" "{26,25,25}" "{i,o,o}" "{fdwid,option_name,option_value}" _null_ pg_get_foreign_data_wrapper_options _null_ _null_ _null_ )); + DESCR("user mapping options"); + DATA(insert OID = 2998 ( pg_get_foreign_server_options PGNSP PGUID 12 1 3 0 f f t t s 1 0 2249 "26" "{26,25,25}" "{i,o,o}" "{srvid,option_name,option_value}" _null_ pg_get_foreign_server_options _null_ _null_ _null_ )); + DESCR("user mapping options"); + DATA(insert OID = 2999 ( pg_get_user_mapping_options PGNSP PGUID 12 1 3 0 f f t t s 1 0 2249 "26" "{26,25,25}" "{i,o,o}" "{umid,option_name,option_value}" _null_ pg_get_user_mapping_options _null_ _null_ _null_ )); + DESCR("user mapping options"); /* * Symbolic values for provolatile column: these indicate whether the result diff -cNr -x CVS cvs-pgsql/src/include/catalog/pg_user_mapping.h pgsql/src/include/catalog/pg_user_mapping.h *** cvs-pgsql/src/include/catalog/pg_user_mapping.h Thu Jan 1 02:00:00 1970 --- pgsql/src/include/catalog/pg_user_mapping.h Fri Dec 12 10:44:16 2008 *************** *** 0 **** --- 1,58 ---- + /*------------------------------------------------------------------------- + * + * pg_user_mapping.h + * definition of the system "user mapping" relation (pg_user_mapping) + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * Portions Copyright (c) 1994, Regents of the University of California + * + * $PostgreSQL$ + * + * NOTES + * the genbki.sh script reads this file and generates .bki + * information from the DATA() statements. + * + *------------------------------------------------------------------------- + */ + #ifndef PG_USER_MAPPING_H + #define PG_USER_MAPPING_H + + #include "catalog/genbki.h" + + /* ---------------- + * pg_user_mapping definition. cpp turns this into + * typedef struct FormData_pg_user_mapping + * ---------------- + */ + #define UserMappingRelationId 1418 + + CATALOG(pg_user_mapping,1418) + { + Oid umuser; /* Id of the user, InvalidOid if PUBLIC is wanted */ + Oid umserver; /* server of this mapping */ + + /* + * VARIABLE LENGTH FIELDS start here. These fields may be NULL, too. + */ + + text umoptions[1]; /* user mapping options */ + } FormData_pg_user_mapping; + + /* ---------------- + * Form_pg_user_mapping corresponds to a pointer to a tuple with + * the format of pg_user_mapping relation. + * ---------------- + */ + typedef FormData_pg_user_mapping *Form_pg_user_mapping; + + /* ---------------- + * compiler constants for pg_user_mapping + * ---------------- + */ + + #define Natts_pg_user_mapping 3 + #define Anum_pg_user_mapping_umuser 1 + #define Anum_pg_user_mapping_umserver 2 + #define Anum_pg_user_mapping_umoptions 3 + + #endif /* PG_USER_MAPPING_H */ diff -cNr -x CVS cvs-pgsql/src/include/commands/defrem.h pgsql/src/include/commands/defrem.h *** cvs-pgsql/src/include/commands/defrem.h Fri Dec 5 15:06:30 2008 --- pgsql/src/include/commands/defrem.h Fri Dec 12 10:44:16 2008 *************** *** 118,123 **** --- 118,139 ---- extern text *serialize_deflist(List *deflist); extern List *deserialize_deflist(Datum txt); + /* commands/foreigncmds.c */ + extern void AlterForeignServerOwner(const char *name, Oid newOwnerId); + extern void AlterForeignDataWrapperOwner(const char *name, Oid newOwnerId); + extern void CreateForeignDataWrapper(CreateFdwStmt *stmt); + extern void AlterForeignDataWrapper(AlterFdwStmt *stmt); + extern void RemoveForeignDataWrapper(DropFdwStmt *stmt); + extern void RemoveForeignDataWrapperById(Oid fdwId); + extern void CreateForeignServer(CreateForeignServerStmt *stmt); + extern void AlterForeignServer(AlterForeignServerStmt *stmt); + extern void RemoveForeignServer(DropForeignServerStmt *stmt); + extern void RemoveForeignServerById(Oid srvId); + extern void CreateUserMapping(CreateUserMappingStmt *stmt); + extern void AlterUserMapping(AlterUserMappingStmt *stmt); + extern void RemoveUserMapping(DropUserMappingStmt *stmt); + extern void RemoveUserMappingById(Oid umId); + /* support routines in commands/define.c */ extern char *case_translate_language_name(const char *input); diff -cNr -x CVS cvs-pgsql/src/include/foreign/foreign.h pgsql/src/include/foreign/foreign.h *** cvs-pgsql/src/include/foreign/foreign.h Thu Jan 1 02:00:00 1970 --- pgsql/src/include/foreign/foreign.h Tue Dec 16 16:46:31 2008 *************** *** 0 **** --- 1,108 ---- + /*------------------------------------------------------------------------- + * + * foreign.h + * support for foreign-data wrappers, servers and user mappings. + * + * + * Portions Copyright (c) 1996-2008, PostgreSQL Global Development Group + * + * $PostgreSQL$ + * + *------------------------------------------------------------------------- + */ + #ifndef FOREIGN_H + #define FOREIGN_H + + #include "nodes/parsenodes.h" + #include "nodes/pg_list.h" + + + /* Helper for obtaining username for user mapping */ + #define MappingUserName(userid) \ + (OidIsValid(userid) ? GetUserNameFromId(userid) : "public") + + + /* + * Generic option types for validation. + * NB! Thes are treated as flags, so use only powers of two here. + */ + typedef enum { + InvalidOpt = 0, + ServerOpt = 1, /* options applicable to SERVER */ + UserMappingOpt = 2, /* options for USER MAPPING */ + FdwOpt = 4, /* options for FOREIGN DATA WRAPPER */ + } GenericOptionFlags; + + typedef struct ForeignDataWrapperLibrary ForeignDataWrapperLibrary; + + typedef struct ForeignDataWrapper + { + Oid fdwid; /* FDW Oid */ + Oid owner; /* FDW owner user Oid */ + char *fdwname; /* Name of the FDW */ + char *fdwlibrary; /* Library name */ + List *options; /* fdwoptions as DefElem list */ + + ForeignDataWrapperLibrary *lib; /* interface to the FDW functions */ + } ForeignDataWrapper; + + typedef struct ForeignServer + { + Oid serverid; /* server Oid */ + Oid fdwid; /* foreign-data wrapper */ + Oid owner; /* server owner user Oid */ + char *servername; /* name of the server */ + char *servertype; /* server type, optional */ + char *serverversion; /* server version, optional */ + List *options; /* srvoptions as DefElem list */ + } ForeignServer; + + typedef struct UserMapping + { + Oid userid; /* local user Oid */ + Oid serverid; /* server Oid */ + List *options; /* useoptions as DefElem list */ + } UserMapping; + + + /* + * Foreign-data wrapper library function types. + */ + typedef void (*OptionListValidatorFunc)(ForeignDataWrapper *, + GenericOptionFlags, + List *); + typedef List * (*GetConnectionInfoFunc)(ForeignDataWrapper *, + ForeignServer *, + UserMapping *); + + /* + * Interface functions to the foreign-data wrapper. This is decoupled + * from the FDW as there maybe several FDW-s accessing the same library. + */ + struct ForeignDataWrapperLibrary + { + char *libname; /* name of the library file */ + + GetConnectionInfoFunc GetConnectionInfo; + OptionListValidatorFunc validateOptionList; + }; + + + extern ForeignServer *GetForeignServer(Oid serverid); + extern ForeignServer *GetForeignServerByName(const char *name, bool missing_ok); + extern Oid GetForeignServerOidByName(const char *name, bool missing_ok); + extern UserMapping *GetUserMapping(Oid userid, Oid serverid); + extern ForeignDataWrapper *GetForeignDataWrapper(Oid fdwid); + extern ForeignDataWrapper *GetForeignDataWrapperByName(const char *name, + bool missing_ok); + extern Oid GetForeignDataWrapperOidByName(const char *name, bool missing_ok); + extern ForeignDataWrapperLibrary *GetForeignDataWrapperLibrary(const char *libname); + extern List *GetRemoteConnectionInfo(Oid serverid, Oid userid); + + /* Foreign data wrapper interface functions */ + extern void validateOptionList(ForeignDataWrapper *fdw, + GenericOptionFlags flags, List *options); + extern List *GetConnectionInfo(ForeignDataWrapper *fdw, ForeignServer *server, + UserMapping *um); + + #endif /* FOREIGN_H */ diff -cNr -x CVS cvs-pgsql/src/include/nodes/makefuncs.h pgsql/src/include/nodes/makefuncs.h *** cvs-pgsql/src/include/nodes/makefuncs.h Tue Sep 2 15:10:59 2008 --- pgsql/src/include/nodes/makefuncs.h Fri Dec 12 10:44:16 2008 *************** *** 67,70 **** --- 67,72 ---- extern DefElem *makeDefElem(char *name, Node *arg); + extern OptionDefElem *makeOptionDefElem(int op, DefElem *def); + #endif /* MAKEFUNC_H */ diff -cNr -x CVS cvs-pgsql/src/include/nodes/nodes.h pgsql/src/include/nodes/nodes.h *** cvs-pgsql/src/include/nodes/nodes.h Mon Nov 24 09:49:54 2008 --- pgsql/src/include/nodes/nodes.h Fri Dec 12 10:44:16 2008 *************** *** 325,330 **** --- 325,339 ---- T_CreateEnumStmt, T_AlterTSDictionaryStmt, T_AlterTSConfigurationStmt, + T_CreateFdwStmt, + T_AlterFdwStmt, + T_DropFdwStmt, + T_CreateForeignServerStmt, + T_AlterForeignServerStmt, + T_DropForeignServerStmt, + T_CreateUserMappingStmt, + T_AlterUserMappingStmt, + T_DropUserMappingStmt, /* * TAGS FOR PARSE TREE NODES (parsenodes.h) *************** *** 348,353 **** --- 357,363 ---- T_IndexElem, T_Constraint, T_DefElem, + T_OptionDefElem, T_RangeTblEntry, T_SortGroupClause, T_FkConstraint, diff -cNr -x CVS cvs-pgsql/src/include/nodes/parsenodes.h pgsql/src/include/nodes/parsenodes.h *** cvs-pgsql/src/include/nodes/parsenodes.h Mon Dec 8 09:11:13 2008 --- pgsql/src/include/nodes/parsenodes.h Fri Dec 12 10:44:16 2008 *************** *** 49,54 **** --- 49,61 ---- SORTBY_NULLS_LAST } SortByNulls; + /* Alter operations for generic options */ + typedef enum AlterOptionOp + { + ALTER_OPT_DROP = -1, + ALTER_OPT_SET, + ALTER_OPT_ADD + } AlterOptionOp; /* * Grantable rights are encoded so that we can OR them together in a bitmask. *************** *** 67,73 **** #define ACL_REFERENCES (1<<5) #define ACL_TRIGGER (1<<6) #define ACL_EXECUTE (1<<7) /* for functions */ ! #define ACL_USAGE (1<<8) /* for languages and namespaces */ #define ACL_CREATE (1<<9) /* for namespaces and databases */ #define ACL_CREATE_TEMP (1<<10) /* for databases */ #define ACL_CONNECT (1<<11) /* for databases */ --- 74,80 ---- #define ACL_REFERENCES (1<<5) #define ACL_TRIGGER (1<<6) #define ACL_EXECUTE (1<<7) /* for functions */ ! #define ACL_USAGE (1<<8) /* for languages, namespaces, FDWs, and servers */ #define ACL_CREATE (1<<9) /* for namespaces and databases */ #define ACL_CREATE_TEMP (1<<10) /* for databases */ #define ACL_CONNECT (1<<11) /* for databases */ *************** *** 467,472 **** --- 474,490 ---- } DefElem; /* + * Option definition. Used in options definition lists, with optional alter + * operation. + */ + typedef struct OptionDefElem + { + NodeTag type; + AlterOptionOp alter_op; /* Alter operation: ADD/SET/DROP */ + DefElem *def; /* The actual definition */ + } OptionDefElem; + + /* * LockingClause - raw representation of FOR UPDATE/SHARE options * * Note: lockedRels == NIL means "all relations in query". Otherwise it *************** *** 930,935 **** --- 948,955 ---- OBJECT_CONVERSION, OBJECT_DATABASE, OBJECT_DOMAIN, + OBJECT_FDW, + OBJECT_FOREIGN_SERVER, OBJECT_FUNCTION, OBJECT_INDEX, OBJECT_LANGUAGE, *************** *** 1076,1081 **** --- 1096,1103 ---- ACL_OBJECT_RELATION, /* table, view */ ACL_OBJECT_SEQUENCE, /* sequence */ ACL_OBJECT_DATABASE, /* database */ + ACL_OBJECT_FDW, /* foreign-data wrapper */ + ACL_OBJECT_FOREIGN_SERVER, /* foreign server */ ACL_OBJECT_FUNCTION, /* function */ ACL_OBJECT_LANGUAGE, /* procedural language */ ACL_OBJECT_NAMESPACE, /* namespace */ *************** *** 1329,1334 **** --- 1351,1446 ---- } DropTableSpaceStmt; /* ---------------------- + * Create/Drop FOREIGN DATA WRAPPER Statements + * ---------------------- + */ + + typedef struct CreateFdwStmt + { + NodeTag type; + char *fdwname; /* foreign-data wrapper name */ + char *library; /* libray name */ + List *options; /* generic options to FDW */ + } CreateFdwStmt; + + typedef struct AlterFdwStmt + { + NodeTag type; + char *fdwname; /* foreign-data wrapper name */ + char *library; /* libray name */ + List *options; /* generic options to FDW */ + } AlterFdwStmt; + + typedef struct DropFdwStmt + { + NodeTag type; + char *fdwname; /* foreign-data wrapper name */ + bool missing_ok; /* don't complain if missing */ + DropBehavior behavior; /* drop behavior - cascade/restrict */ + } DropFdwStmt; + + /* ---------------------- + * Create/Drop FOREIGN SERVER Statements + * ---------------------- + */ + + typedef struct CreateForeignServerStmt + { + NodeTag type; + char *servername; /* server name */ + char *servertype; /* optional server type */ + char *version; /* optional server version */ + char *fdwname; /* FDW name */ + List *options; /* generic options to server */ + } CreateForeignServerStmt; + + typedef struct AlterForeignServerStmt + { + NodeTag type; + char *servername; /* server name */ + char *version; /* optional server version */ + List *options; /* generic options to server */ + bool has_version; /* version specified */ + } AlterForeignServerStmt; + + typedef struct DropForeignServerStmt + { + NodeTag type; + char *servername; /* server name */ + bool missing_ok; /* ignore missing servers */ + DropBehavior behavior; /* drop behavior - cascade/restrict */ + } DropForeignServerStmt; + + /* ---------------------- + * Create/Drop USER MAPPING Statements + * ---------------------- + */ + + typedef struct CreateUserMappingStmt + { + NodeTag type; + char *username; /* username or PUBLIC/CURRENT_USER */ + char *servername; /* server name */ + List *options; /* generic options to server */ + } CreateUserMappingStmt; + + typedef struct AlterUserMappingStmt + { + NodeTag type; + char *username; /* username or PUBLIC/CURRENT_USER */ + char *servername; /* server name */ + List *options; /* generic options to server */ + } AlterUserMappingStmt; + + typedef struct DropUserMappingStmt + { + NodeTag type; + char *username; /* username or PUBLIC/CURRENT_USER */ + char *servername; /* server name */ + bool missing_ok; /* ignore missing mappings */ + } DropUserMappingStmt; + + /* ---------------------- * Create/Drop TRIGGER Statements * ---------------------- */ diff -cNr -x CVS cvs-pgsql/src/include/utils/acl.h pgsql/src/include/utils/acl.h *** cvs-pgsql/src/include/utils/acl.h Thu Sep 11 15:30:05 2008 --- pgsql/src/include/utils/acl.h Fri Dec 12 10:44:16 2008 *************** *** 146,151 **** --- 146,153 ---- #define ACL_ALL_RIGHTS_RELATION (ACL_INSERT|ACL_SELECT|ACL_UPDATE|ACL_DELETE|ACL_TRUNCATE|ACL_REFERENCES|ACL_TRIGGER) #define ACL_ALL_RIGHTS_SEQUENCE (ACL_USAGE|ACL_SELECT|ACL_UPDATE) #define ACL_ALL_RIGHTS_DATABASE (ACL_CREATE|ACL_CREATE_TEMP|ACL_CONNECT) + #define ACL_ALL_RIGHTS_FDW (ACL_USAGE) + #define ACL_ALL_RIGHTS_FOREIGN_SERVER (ACL_USAGE) #define ACL_ALL_RIGHTS_FUNCTION (ACL_EXECUTE) #define ACL_ALL_RIGHTS_LANGUAGE (ACL_USAGE) #define ACL_ALL_RIGHTS_NAMESPACE (ACL_USAGE|ACL_CREATE) *************** *** 184,189 **** --- 186,193 ---- ACL_KIND_TABLESPACE, /* pg_tablespace */ ACL_KIND_TSDICTIONARY, /* pg_ts_dict */ ACL_KIND_TSCONFIGURATION, /* pg_ts_config */ + ACL_KIND_FDW, /* pg_foreign_data_wrapper */ + ACL_KIND_FOREIGN_SERVER, /* pg_foreign_server */ MAX_ACL_KIND /* MUST BE LAST */ } AclObjectKind; *************** *** 261,266 **** --- 265,274 ---- AclMode mask, AclMaskHow how); extern AclMode pg_tablespace_aclmask(Oid spc_oid, Oid roleid, AclMode mask, AclMaskHow how); + extern AclMode pg_foreign_data_wrapper_aclmask(Oid fdw_oid, Oid roleid, + AclMode mask, AclMaskHow how); + extern AclMode pg_foreign_server_aclmask(Oid srv_oid, Oid roleid, + AclMode mask, AclMaskHow how); extern AclResult pg_class_aclcheck(Oid table_oid, Oid roleid, AclMode mode); extern AclResult pg_database_aclcheck(Oid db_oid, Oid roleid, AclMode mode); *************** *** 268,273 **** --- 276,283 ---- extern AclResult pg_language_aclcheck(Oid lang_oid, Oid roleid, AclMode mode); extern AclResult pg_namespace_aclcheck(Oid nsp_oid, Oid roleid, AclMode mode); extern AclResult pg_tablespace_aclcheck(Oid spc_oid, Oid roleid, AclMode mode); + extern AclResult pg_foreign_data_wrapper_aclcheck(Oid fdw_oid, Oid roleid, AclMode mode); + extern AclResult pg_foreign_server_aclcheck(Oid srv_oid, Oid roleid, AclMode mode); extern void aclcheck_error(AclResult aclerr, AclObjectKind objectkind, const char *objectname); *************** *** 286,290 **** --- 296,301 ---- extern bool pg_conversion_ownercheck(Oid conv_oid, Oid roleid); extern bool pg_ts_dict_ownercheck(Oid dict_oid, Oid roleid); extern bool pg_ts_config_ownercheck(Oid cfg_oid, Oid roleid); + extern bool pg_foreign_server_ownercheck(Oid srv_oid, Oid roleid); #endif /* ACL_H */ diff -cNr -x CVS cvs-pgsql/src/include/utils/builtins.h pgsql/src/include/utils/builtins.h *** cvs-pgsql/src/include/utils/builtins.h Fri Dec 5 15:06:31 2008 --- pgsql/src/include/utils/builtins.h Fri Dec 12 11:22:54 2008 *************** *** 34,39 **** --- 34,45 ---- extern Datum has_database_privilege_id_id(PG_FUNCTION_ARGS); extern Datum has_database_privilege_name(PG_FUNCTION_ARGS); extern Datum has_database_privilege_id(PG_FUNCTION_ARGS); + extern Datum has_foreign_data_wrapper_privilege_name_name(PG_FUNCTION_ARGS); + extern Datum has_foreign_data_wrapper_privilege_name_id(PG_FUNCTION_ARGS); + extern Datum has_foreign_data_wrapper_privilege_id_name(PG_FUNCTION_ARGS); + extern Datum has_foreign_data_wrapper_privilege_id_id(PG_FUNCTION_ARGS); + extern Datum has_foreign_data_wrapper_privilege_name(PG_FUNCTION_ARGS); + extern Datum has_foreign_data_wrapper_privilege_id(PG_FUNCTION_ARGS); extern Datum has_function_privilege_name_name(PG_FUNCTION_ARGS); extern Datum has_function_privilege_name_id(PG_FUNCTION_ARGS); extern Datum has_function_privilege_id_name(PG_FUNCTION_ARGS); *************** *** 52,57 **** --- 58,69 ---- extern Datum has_schema_privilege_id_id(PG_FUNCTION_ARGS); extern Datum has_schema_privilege_name(PG_FUNCTION_ARGS); extern Datum has_schema_privilege_id(PG_FUNCTION_ARGS); + extern Datum has_server_privilege_name_name(PG_FUNCTION_ARGS); + extern Datum has_server_privilege_name_id(PG_FUNCTION_ARGS); + extern Datum has_server_privilege_id_name(PG_FUNCTION_ARGS); + extern Datum has_server_privilege_id_id(PG_FUNCTION_ARGS); + extern Datum has_server_privilege_name(PG_FUNCTION_ARGS); + extern Datum has_server_privilege_id(PG_FUNCTION_ARGS); extern Datum has_tablespace_privilege_name_name(PG_FUNCTION_ARGS); extern Datum has_tablespace_privilege_name_id(PG_FUNCTION_ARGS); extern Datum has_tablespace_privilege_id_name(PG_FUNCTION_ARGS); diff -cNr -x CVS cvs-pgsql/src/include/utils/syscache.h pgsql/src/include/utils/syscache.h *** cvs-pgsql/src/include/utils/syscache.h Wed May 7 04:04:49 2008 --- pgsql/src/include/utils/syscache.h Fri Dec 12 10:44:16 2008 *************** *** 51,56 **** --- 51,60 ---- DATABASEOID, ENUMOID, ENUMTYPOIDNAME, + FOREIGNDATAWRAPPERNAME, + FOREIGNDATAWRAPPEROID, + FOREIGNSERVERNAME, + FOREIGNSERVEROID, INDEXRELID, LANGNAME, LANGOID, *************** *** 76,82 **** TSTEMPLATENAMENSP, TSTEMPLATEOID, TYPENAMENSP, ! TYPEOID }; extern void InitCatalogCache(void); --- 80,88 ---- TSTEMPLATENAMENSP, TSTEMPLATEOID, TYPENAMENSP, ! TYPEOID, ! USERMAPPINGOID, ! USERMAPPINGUSERSERVER }; extern void InitCatalogCache(void); diff -cNr -x CVS cvs-pgsql/src/test/regress/expected/foreign_data.out pgsql/src/test/regress/expected/foreign_data.out *** cvs-pgsql/src/test/regress/expected/foreign_data.out Thu Jan 1 02:00:00 1970 --- pgsql/src/test/regress/expected/foreign_data.out Tue Dec 16 16:32:49 2008 *************** *** 0 **** --- 1,1063 ---- + -- + -- Test foreign-data wrapper and server management. + -- + CREATE USER foreign_data_user SUPERUSER; + \c - foreign_data_user + -- At this point we should have 2 built-in wrappers and no servers. + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + postgresql | postgresql_fdw | + (2 rows) + + SELECT srvname, srvoptions FROM pg_foreign_server; + srvname | srvoptions + ---------+------------ + (0 rows) + + SELECT * FROM pg_user_mapping; + umuser | umserver | umoptions + --------+----------+----------- + (0 rows) + + -- CREATE FOREIGN DATA WRAPPER + CREATE FOREIGN DATA WRAPPER foo LIBRARY '' LANGUAGE C; -- ERROR + ERROR: could not access file "": No such file or directory + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'plpgsql' LANGUAGE C; + DROP FOREIGN DATA WRAPPER foo; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + foo | dummy_fdw | + postgresql | postgresql_fdw | + (3 rows) + + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; -- duplicate + ERROR: foreign-data wrapper "foo" already exists + CREATE FOREIGN DATA WRAPPER "Foo" LIBRARY 'dummy_fdw' LANGUAGE C; + DROP FOREIGN DATA WRAPPER "Foo"; + DROP FOREIGN DATA WRAPPER foo; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (testing '1'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------- + dummy | dummy_fdw | + foo | dummy_fdw | {testing=1} + postgresql | postgresql_fdw | + (3 rows) + + DROP FOREIGN DATA WRAPPER foo; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (testing '1', testing '2'); -- ERROR + ERROR: option "testing" provided more than once + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (testing '1', another '2'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+----------------------- + dummy | dummy_fdw | + foo | dummy_fdw | {testing=1,another=2} + postgresql | postgresql_fdw | + (3 rows) + + CREATE ROLE fdw_test_role; + CREATE ROLE fdw_test_role_super SUPERUSER; + DROP FOREIGN DATA WRAPPER foo; + SET ROLE fdw_test_role; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; -- ERROR + ERROR: permission denied to create foreign-data wrapper "foo" + HINT: Must be superuser to create a foreign-data wrapper. + RESET ROLE; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'postgresql_fdw' LANGUAGE C; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + foo | postgresql_fdw | + postgresql | postgresql_fdw | + (3 rows) + + -- ALTER FOREIGN DATA WRAPPER + ALTER FOREIGN DATA WRAPPER foo LIBRARY ''; -- ERROR + ERROR: could not access file "": No such file or directory + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'plpgsql'; + WARNING: changing the foreign-data wrapper library can cause the options for dependent objects to become invalid + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw'; + WARNING: changing the foreign-data wrapper library can cause the options for dependent objects to become invalid + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + foo | dummy_fdw | + postgresql | postgresql_fdw | + (3 rows) + + ALTER FOREIGN DATA WRAPPER foo OPTIONS (a '1', b '2'); + ALTER FOREIGN DATA WRAPPER foo OPTIONS (SET c '4'); -- ERROR + ERROR: option "c" not found + ALTER FOREIGN DATA WRAPPER foo OPTIONS (DROP c); -- ERROR + ERROR: option "c" not found + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD x '1', DROP x); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + foo | dummy_fdw | {a=1,b=2} + postgresql | postgresql_fdw | + (3 rows) + + ALTER FOREIGN DATA WRAPPER foo OPTIONS (DROP a, SET b '3', ADD c '4'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + foo | dummy_fdw | {b=3,c=4} + postgresql | postgresql_fdw | + (3 rows) + + ALTER FOREIGN DATA WRAPPER foo OPTIONS (a '2'); + ALTER FOREIGN DATA WRAPPER foo OPTIONS (b '4'); -- ERROR + ERROR: option "b" provided more than once + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+--------------- + dummy | dummy_fdw | + foo | dummy_fdw | {b=3,c=4,a=2} + postgresql | postgresql_fdw | + (3 rows) + + SET ROLE fdw_test_role; + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD d '5'); -- ERROR + ERROR: permission denied to alter foreign-data wrapper "foo" + HINT: Must be superuser to alter a foreign-data wrapper. + SET ROLE fdw_test_role_super; + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD d '5'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------------- + dummy | dummy_fdw | + foo | dummy_fdw | {b=3,c=4,a=2,d=5} + postgresql | postgresql_fdw | + (3 rows) + + ALTER FOREIGN DATA WRAPPER foo OWNER to fdw_test_role; -- ERROR + ERROR: permission denied to change owner of foreign-data wrapper "foo" + HINT: The owner of a foreign-data wrapper must be a superuser. + ALTER FOREIGN DATA WRAPPER foo OWNER to fdw_test_role_super; + ALTER ROLE fdw_test_role_super NOSUPERUSER; + SET ROLE fdw_test_role_super; + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD e '6'); -- ERROR + ERROR: permission denied to alter foreign-data wrapper "foo" + HINT: Must be superuser to alter a foreign-data wrapper. + RESET ROLE; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------------- + dummy | dummy_fdw | + foo | dummy_fdw | {b=3,c=4,a=2,d=5} + postgresql | postgresql_fdw | + (3 rows) + + -- DROP FOREIGN DATA WRAPPER + DROP FOREIGN DATA WRAPPER nonexistent; -- ERROR + ERROR: foreign-data wrapper "nonexistent" does not exist + DROP FOREIGN DATA WRAPPER IF EXISTS nonexistent; + NOTICE: foreign-data wrapper "nonexistent" does not exist, skipping + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------------- + dummy | dummy_fdw | + foo | dummy_fdw | {b=3,c=4,a=2,d=5} + postgresql | postgresql_fdw | + (3 rows) + + DROP ROLE fdw_test_role_super; -- ERROR + ERROR: role "fdw_test_role_super" cannot be dropped because some objects depend on it + DETAIL: owner of foreign-data wrapper foo + SET ROLE fdw_test_role_super; + DROP FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: permission denied to drop foreign-data wrapper "foo" + HINT: Must be superuser to drop a foreign-data wrapper. + RESET ROLE; + DROP FOREIGN DATA WRAPPER foo; + DROP ROLE fdw_test_role_super; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + postgresql | postgresql_fdw | + (2 rows) + + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; + CREATE USER MAPPING FOR current_user SERVER s1; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + foo | dummy_fdw | + postgresql | postgresql_fdw | + (3 rows) + + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+-------------------+----------------------+-------------------+------+---------+--------- + s1 | foreign_data_user | foo | | | | + (1 row) + + \deu+ + List of user mappings + Server | Username | Options + --------+-------------------+--------- + s1 | foreign_data_user | + (1 row) + + DROP FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: cannot drop foreign-data wrapper foo because other objects depend on it + DETAIL: server s1 depends on foreign-data wrapper foo + user mapping for foreign_data_user depends on server s1 + HINT: Use DROP ... CASCADE to drop the dependent objects too. + SET ROLE fdw_test_role; + DROP FOREIGN DATA WRAPPER foo CASCADE; -- ERROR + ERROR: permission denied to drop foreign-data wrapper "foo" + HINT: Must be superuser to drop a foreign-data wrapper. + RESET ROLE; + DROP FOREIGN DATA WRAPPER foo CASCADE; + NOTICE: drop cascades to 2 other objects + DETAIL: drop cascades to server s1 + drop cascades to user mapping for foreign_data_user + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + postgresql | postgresql_fdw | + (2 rows) + + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+-------+----------------------+-------------------+------+---------+--------- + (0 rows) + + \deu+ + List of user mappings + Server | Username | Options + --------+----------+--------- + (0 rows) + + -- exercise CREATE SERVER + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: foreign-data wrapper "foo" does not exist + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (test_wrapper 'true'); + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: server "s1" already exists + CREATE SERVER s2 FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER s3 TYPE 'oracle' FOREIGN DATA WRAPPER foo; + CREATE SERVER s4 TYPE 'oracle' FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER s5 VERSION '15.0' FOREIGN DATA WRAPPER foo; + CREATE SERVER s6 VERSION '16.0' FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER "S6" FOREIGN DATA WRAPPER foo OPTIONS (mixed_case_names 'true'); + CREATE SERVER s7 TYPE 'oracle' VERSION '17.0' FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER s8 FOREIGN DATA WRAPPER postgresql OPTIONS (foo '1'); -- ERROR + ERROR: invalid option "foo" to server + HINT: valid server options are: authtype, service, connect_timeout, dbname, host, hostaddr, port, tty, options, requiressl, sslmode, gsslib + CREATE SERVER s8 FOREIGN DATA WRAPPER postgresql OPTIONS (host 'localhost', dbname 's8db'); + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+-------------------+----------------------+-------------------+--------+---------+------------------------------ + S6 | foreign_data_user | foo | | | | {mixed_case_names=true} + s1 | foreign_data_user | foo | | | | + s2 | foreign_data_user | foo | | | | {host=a,dbname=b} + s3 | foreign_data_user | foo | | oracle | | + s4 | foreign_data_user | foo | | oracle | | {host=a,dbname=b} + s5 | foreign_data_user | foo | | | 15.0 | + s6 | foreign_data_user | foo | | | 16.0 | {host=a,dbname=b} + s7 | foreign_data_user | foo | | oracle | 17.0 | {host=a,dbname=b} + s8 | foreign_data_user | postgresql | | | | {host=localhost,dbname=s8db} + (9 rows) + + CREATE ROLE server_test_role; + CREATE ROLE server_test_role2; + SET ROLE server_test_role; + CREATE SERVER st1 FOREIGN DATA WRAPPER foo; -- ERROR: no usage on FDW + ERROR: permission denied for foreign-data wrapper foo + RESET ROLE; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; + SET ROLE server_test_role; + CREATE SERVER st1 FOREIGN DATA WRAPPER foo; + RESET ROLE; + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+-------------------+----------------------+-------------------+--------+---------+------------------------------ + S6 | foreign_data_user | foo | | | | {mixed_case_names=true} + s1 | foreign_data_user | foo | | | | + s2 | foreign_data_user | foo | | | | {host=a,dbname=b} + s3 | foreign_data_user | foo | | oracle | | + s4 | foreign_data_user | foo | | oracle | | {host=a,dbname=b} + s5 | foreign_data_user | foo | | | 15.0 | + s6 | foreign_data_user | foo | | | 16.0 | {host=a,dbname=b} + s7 | foreign_data_user | foo | | oracle | 17.0 | {host=a,dbname=b} + s8 | foreign_data_user | postgresql | | | | {host=localhost,dbname=s8db} + st1 | server_test_role | foo | | | | + (10 rows) + + CREATE ROLE server_test_indirect; + REVOKE USAGE ON FOREIGN DATA WRAPPER foo FROM server_test_role; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_indirect; + SET ROLE server_test_role; + CREATE SERVER st2 FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: permission denied for foreign-data wrapper foo + RESET ROLE; + GRANT server_test_indirect TO server_test_role; + SET ROLE server_test_role; + CREATE SERVER st2 FOREIGN DATA WRAPPER foo; + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+-------------------+----------------------+-------------------+--------+---------+------------------------------ + S6 | foreign_data_user | foo | | | | {mixed_case_names=true} + s1 | foreign_data_user | foo | | | | + s2 | foreign_data_user | foo | | | | {host=a,dbname=b} + s3 | foreign_data_user | foo | | oracle | | + s4 | foreign_data_user | foo | | oracle | | {host=a,dbname=b} + s5 | foreign_data_user | foo | | | 15.0 | + s6 | foreign_data_user | foo | | | 16.0 | {host=a,dbname=b} + s7 | foreign_data_user | foo | | oracle | 17.0 | {host=a,dbname=b} + s8 | foreign_data_user | postgresql | | | | {host=localhost,dbname=s8db} + st1 | server_test_role | foo | | | | + st2 | server_test_role | foo | | | | + (11 rows) + + RESET ROLE; + REVOKE server_test_indirect FROM server_test_role; + -- ALTER SERVER + ALTER SERVER s0; -- ERROR + ERROR: syntax error at or near ";" + LINE 1: ALTER SERVER s0; + ^ + ALTER SERVER s0 OPTIONS (a '1'); -- ERROR + ERROR: server "s0" does not exist + ALTER SERVER s1 VERSION '1.0' OPTIONS (servername 's1'); + ALTER SERVER s2 VERSION '1.1'; + ALTER SERVER s3 OPTIONS (tnsname 'orcl', port '1521'); + GRANT USAGE ON FOREIGN SERVER s1 TO server_test_role; + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+-------------------+----------------------+------------------------------------------------------------------------------+--------+---------+------------------------------ + S6 | foreign_data_user | foo | | | | {mixed_case_names=true} + s1 | foreign_data_user | foo | {foreign_data_user=U/foreign_data_user,server_test_role=U/foreign_data_user} | | 1.0 | {servername=s1} + s2 | foreign_data_user | foo | | | 1.1 | {host=a,dbname=b} + s3 | foreign_data_user | foo | | oracle | | {tnsname=orcl,port=1521} + s4 | foreign_data_user | foo | | oracle | | {host=a,dbname=b} + s5 | foreign_data_user | foo | | | 15.0 | + s6 | foreign_data_user | foo | | | 16.0 | {host=a,dbname=b} + s7 | foreign_data_user | foo | | oracle | 17.0 | {host=a,dbname=b} + s8 | foreign_data_user | postgresql | | | | {host=localhost,dbname=s8db} + st1 | server_test_role | foo | | | | + st2 | server_test_role | foo | | | | + (11 rows) + + SET ROLE server_test_role; + ALTER SERVER s1 VERSION '1.1'; -- ERROR + ERROR: must be owner of foreign server s1 + ALTER SERVER s1 OWNER TO server_test_role; -- ERROR + ERROR: must be owner of foreign server s1 + RESET ROLE; + ALTER SERVER s1 OWNER TO server_test_role; + GRANT server_test_role2 TO server_test_role; + SET ROLE server_test_role; + ALTER SERVER s1 VERSION '1.1'; + ALTER SERVER s1 OWNER TO server_test_role2; -- ERROR + ERROR: permission denied for foreign-data wrapper foo + RESET ROLE; + ALTER SERVER s8 OPTIONS (foo '1'); -- ERROR option validation + ERROR: invalid option "foo" to server + HINT: valid server options are: authtype, service, connect_timeout, dbname, host, hostaddr, port, tty, options, requiressl, sslmode, gsslib + ALTER SERVER s8 OPTIONS (connect_timeout '30', set dbname 'db1', drop host); + SET ROLE server_test_role; + ALTER SERVER s1 OWNER TO server_test_indirect; -- ERROR + ERROR: must be member of role "server_test_indirect" + RESET ROLE; + GRANT server_test_indirect TO server_test_role; + SET ROLE server_test_role; + ALTER SERVER s1 OWNER TO server_test_indirect; + RESET ROLE; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_indirect; + SET ROLE server_test_role; + ALTER SERVER s1 OWNER TO server_test_indirect; + RESET ROLE; + DROP ROLE server_test_indirect; -- ERROR + ERROR: role "server_test_indirect" cannot be dropped because some objects depend on it + DETAIL: owner of server s1 + access to foreign-data wrapper foo + \des+ + List of foreign servers + Name | Owner | Foreign-data wrapper | Access privileges | Type | Version | Options + ------+----------------------+----------------------+------------------------------------------------------------------------------+--------+---------+--------------------------------- + S6 | foreign_data_user | foo | | | | {mixed_case_names=true} + s1 | server_test_indirect | foo | {foreign_data_user=U/foreign_data_user,server_test_role=U/foreign_data_user} | | 1.1 | {servername=s1} + s2 | foreign_data_user | foo | | | 1.1 | {host=a,dbname=b} + s3 | foreign_data_user | foo | | oracle | | {tnsname=orcl,port=1521} + s4 | foreign_data_user | foo | | oracle | | {host=a,dbname=b} + s5 | foreign_data_user | foo | | | 15.0 | + s6 | foreign_data_user | foo | | | 16.0 | {host=a,dbname=b} + s7 | foreign_data_user | foo | | oracle | 17.0 | {host=a,dbname=b} + s8 | foreign_data_user | postgresql | | | | {dbname=db1,connect_timeout=30} + st1 | server_test_role | foo | | | | + st2 | server_test_role | foo | | | | + (11 rows) + + -- DROP SERVER + DROP SERVER nonexistent; -- ERROR + ERROR: server "nonexistent" does not exist + DROP SERVER IF EXISTS nonexistent; + NOTICE: server "nonexistent" does not exist, skipping + \des + List of foreign servers + Name | Owner | Foreign-data wrapper + ------+----------------------+---------------------- + S6 | foreign_data_user | foo + s1 | server_test_indirect | foo + s2 | foreign_data_user | foo + s3 | foreign_data_user | foo + s4 | foreign_data_user | foo + s5 | foreign_data_user | foo + s6 | foreign_data_user | foo + s7 | foreign_data_user | foo + s8 | foreign_data_user | postgresql + st1 | server_test_role | foo + st2 | server_test_role | foo + (11 rows) + + SET ROLE server_test_role; + DROP SERVER s2; -- ERROR + ERROR: must be owner of foreign server s2 + DROP SERVER s1; + RESET ROLE; + \des + List of foreign servers + Name | Owner | Foreign-data wrapper + ------+-------------------+---------------------- + S6 | foreign_data_user | foo + s2 | foreign_data_user | foo + s3 | foreign_data_user | foo + s4 | foreign_data_user | foo + s5 | foreign_data_user | foo + s6 | foreign_data_user | foo + s7 | foreign_data_user | foo + s8 | foreign_data_user | postgresql + st1 | server_test_role | foo + st2 | server_test_role | foo + (10 rows) + + ALTER SERVER s2 OWNER TO server_test_role; + SET ROLE server_test_role; + DROP SERVER s2; + RESET ROLE; + \des + List of foreign servers + Name | Owner | Foreign-data wrapper + ------+-------------------+---------------------- + S6 | foreign_data_user | foo + s3 | foreign_data_user | foo + s4 | foreign_data_user | foo + s5 | foreign_data_user | foo + s6 | foreign_data_user | foo + s7 | foreign_data_user | foo + s8 | foreign_data_user | postgresql + st1 | server_test_role | foo + st2 | server_test_role | foo + (9 rows) + + CREATE USER MAPPING FOR current_user SERVER s3; + \deu + List of user mappings + Server | Username + --------+------------------- + s3 | foreign_data_user + (1 row) + + DROP SERVER s3; -- ERROR + ERROR: cannot drop server s3 because other objects depend on it + DETAIL: user mapping for foreign_data_user depends on server s3 + HINT: Use DROP ... CASCADE to drop the dependent objects too. + DROP SERVER s3 CASCADE; + NOTICE: drop cascades to user mapping for foreign_data_user + \des + List of foreign servers + Name | Owner | Foreign-data wrapper + ------+-------------------+---------------------- + S6 | foreign_data_user | foo + s4 | foreign_data_user | foo + s5 | foreign_data_user | foo + s6 | foreign_data_user | foo + s7 | foreign_data_user | foo + s8 | foreign_data_user | postgresql + st1 | server_test_role | foo + st2 | server_test_role | foo + (8 rows) + + \deu + List of user mappings + Server | Username + --------+---------- + (0 rows) + + -- CREATE USER MAPPING + CREATE USER MAPPING FOR baz SERVER s1; -- ERROR + ERROR: role "baz" does not exist + CREATE USER MAPPING FOR current_user SERVER s1; -- ERROR + ERROR: server "s1" does not exist + CREATE USER MAPPING FOR current_user SERVER s4; + CREATE USER MAPPING FOR user SERVER s4; -- ERROR duplicate + ERROR: user mapping "foreign_data_user" already exists for server s4 + CREATE USER MAPPING FOR public SERVER s4 OPTIONS (mapping 'is public'); + CREATE USER MAPPING FOR user SERVER s8 OPTIONS (username 'test', password 'secret'); -- ERROR + ERROR: invalid option "username" to user mapping + HINT: valid user mapping options are: user, password + CREATE USER MAPPING FOR user SERVER s8 OPTIONS (user 'test', password 'secret'); + ALTER SERVER s5 OWNER TO server_test_role; + ALTER SERVER s6 OWNER TO server_test_indirect; + SET ROLE server_test_role; + CREATE USER MAPPING FOR current_user SERVER s5; + CREATE USER MAPPING FOR current_user SERVER s6 OPTIONS (username 'test'); + CREATE USER MAPPING FOR current_user SERVER s7; -- ERROR + ERROR: must be owner of foreign server s7 + CREATE USER MAPPING FOR public SERVER s8; -- ERROR + ERROR: must be owner of foreign server s8 + RESET ROLE; + CREATE USER MAPPING FOR current_user SERVER "S6" OPTIONS (username 'test_mixed_case'); + ALTER SERVER st1 OWNER TO server_test_indirect; + SET ROLE server_test_role; + CREATE USER MAPPING FOR current_user SERVER st1 OPTIONS (username 'bob', password 'boo'); + CREATE USER MAPPING FOR public SERVER st1; + RESET ROLE; + \deu + List of user mappings + Server | Username + --------+------------------- + S6 | foreign_data_user + s4 | foreign_data_user + s4 | public + s5 | server_test_role + s6 | server_test_role + s8 | foreign_data_user + st1 | public + st1 | server_test_role + (8 rows) + + -- ALTER USER MAPPING + ALTER USER MAPPING FOR bob SERVER s4 OPTIONS (gotcha 'true'); -- ERROR + ERROR: role "bob" does not exist + ALTER USER MAPPING FOR user SERVER ss4 OPTIONS (gotcha 'true'); -- ERROR + ERROR: server "ss4" does not exist + ALTER USER MAPPING FOR public SERVER s5 OPTIONS (gotcha 'true'); -- ERROR + ERROR: user mapping "public" does not exist for the server + ALTER USER MAPPING FOR current_user SERVER s8 OPTIONS (username 'test'); -- ERROR + ERROR: invalid option "username" to user mapping + HINT: valid user mapping options are: user, password + ALTER USER MAPPING FOR current_user SERVER s8 OPTIONS (DROP user, SET password 'public'); + SET ROLE server_test_role; + ALTER USER MAPPING FOR current_user SERVER s5 OPTIONS (ADD modified '1'); + ALTER USER MAPPING FOR public SERVER s4 OPTIONS (ADD modified '1'); -- ERROR + ERROR: must be owner of foreign server s4 + ALTER USER MAPPING FOR public SERVER st1 OPTIONS (ADD modified '1'); + RESET ROLE; + \deu+ + List of user mappings + Server | Username | Options + --------+-------------------+----------------------------- + S6 | foreign_data_user | {username=test_mixed_case} + s4 | foreign_data_user | + s4 | public | {"mapping=is public"} + s5 | server_test_role | {modified=1} + s6 | server_test_role | {username=test} + s8 | foreign_data_user | {password=public} + st1 | public | {modified=1} + st1 | server_test_role | {username=bob,password=boo} + (8 rows) + + -- DROP USER MAPPING + DROP USER MAPPING FOR bob SERVER s4; -- ERROR + ERROR: role "bob" does not exist + DROP USER MAPPING FOR user SERVER ss4; + ERROR: server "ss4" does not exist + DROP USER MAPPING FOR public SERVER s7; -- ERROR + ERROR: user mapping "public" does not exist for the server + DROP USER MAPPING IF EXISTS FOR bob SERVER s4; + NOTICE: role "bob" does not exist, skipping + DROP USER MAPPING IF EXISTS FOR user SERVER ss4; + NOTICE: server does not exist, skipping + DROP USER MAPPING IF EXISTS FOR public SERVER s7; + NOTICE: user mapping "public" does not exist for the server, skipping + CREATE USER MAPPING FOR public SERVER s8; + SET ROLE server_test_role; + DROP USER MAPPING FOR public SERVER s8; -- ERROR + ERROR: must be owner of foreign server s8 + RESET ROLE; + DROP SERVER s7; + \deu + List of user mappings + Server | Username + --------+------------------- + S6 | foreign_data_user + s4 | foreign_data_user + s4 | public + s5 | server_test_role + s6 | server_test_role + s8 | foreign_data_user + s8 | public + st1 | public + st1 | server_test_role + (9 rows) + + -- Information schema + -- Avoid including the superuser name in the output, as it will vary across installations. + SELECT * FROM information_schema.foreign_data_wrappers WHERE authorization_identifier <> (SELECT rolname FROM pg_authid WHERE oid = 10) ORDER BY 1, 2; + foreign_data_wrapper_catalog | foreign_data_wrapper_name | authorization_identifier | library_name | foreign_data_wrapper_language + ------------------------------+---------------------------+--------------------------+--------------+------------------------------- + regression | foo | foreign_data_user | dummy_fdw | c + (1 row) + + SELECT * FROM information_schema.foreign_data_wrapper_options ORDER BY 1, 2, 3; + foreign_data_wrapper_catalog | foreign_data_wrapper_name | option_name | option_value + ------------------------------+---------------------------+--------------+-------------- + regression | foo | test_wrapper | true + (1 row) + + SELECT * FROM information_schema.foreign_servers ORDER BY 1, 2; + foreign_server_catalog | foreign_server_name | foreign_data_wrapper_catalog | foreign_data_wrapper_name | foreign_server_type | foreign_server_version | authorization_identifier + ------------------------+---------------------+------------------------------+---------------------------+---------------------+------------------------+-------------------------- + regression | S6 | regression | foo | | | foreign_data_user + regression | s4 | regression | foo | oracle | | foreign_data_user + regression | s5 | regression | foo | | 15.0 | server_test_role + regression | s6 | regression | foo | | 16.0 | server_test_indirect + regression | s8 | regression | postgresql | | | foreign_data_user + regression | st1 | regression | foo | | | server_test_indirect + regression | st2 | regression | foo | | | server_test_role + (7 rows) + + SELECT * FROM information_schema.foreign_server_options ORDER BY 1, 2, 3; + foreign_server_catalog | foreign_server_name | option_name | option_value + ------------------------+---------------------+------------------+-------------- + regression | S6 | mixed_case_names | true + regression | s4 | dbname | b + regression | s4 | host | a + regression | s6 | dbname | b + regression | s6 | host | a + regression | s8 | connect_timeout | 30 + regression | s8 | dbname | db1 + (7 rows) + + SELECT * FROM information_schema.user_mappings ORDER BY 1, 2, 3; + authorization_identifier | foreign_server_catalog | foreign_server_name + --------------------------+------------------------+--------------------- + foreign_data_user | regression | S6 + foreign_data_user | regression | s4 + foreign_data_user | regression | s8 + public | regression | s4 + public | regression | s8 + public | regression | st1 + server_test_role | regression | s5 + server_test_role | regression | s6 + server_test_role | regression | st1 + (9 rows) + + SELECT * FROM information_schema.user_mapping_options ORDER BY 1, 2, 3, 4; + authorization_identifier | foreign_server_catalog | foreign_server_name | option_name | option_value + --------------------------+------------------------+---------------------+-------------+----------------- + foreign_data_user | regression | S6 | username | test_mixed_case + foreign_data_user | regression | s8 | password | public + public | regression | s4 | mapping | is public + public | regression | st1 | modified | 1 + server_test_role | regression | s5 | modified | 1 + server_test_role | regression | s6 | username | test + server_test_role | regression | st1 | password | boo + server_test_role | regression | st1 | username | bob + (8 rows) + + SET ROLE server_test_role; + SELECT * FROM information_schema.user_mapping_options ORDER BY 1, 2, 3, 4; + authorization_identifier | foreign_server_catalog | foreign_server_name | option_name | option_value + --------------------------+------------------------+---------------------+-------------+-------------- + public | regression | st1 | modified | 1 + server_test_role | regression | s5 | modified | 1 + server_test_role | regression | s6 | username | test + server_test_role | regression | st1 | password | boo + server_test_role | regression | st1 | username | bob + (5 rows) + + DROP USER MAPPING FOR current_user SERVER st1; + RESET ROLE; + -- has_foreign_data_wrapper_privilege + SELECT has_foreign_data_wrapper_privilege('fdw_test_role', + (SELECT oid FROM pg_foreign_data_wrapper WHERE fdwname='foo'), 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + f + (1 row) + + SELECT has_foreign_data_wrapper_privilege('fdw_test_role', 'foo', 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + f + (1 row) + + SELECT has_foreign_data_wrapper_privilege( + (SELECT oid FROM pg_roles WHERE rolname='fdw_test_role'), + (SELECT oid FROM pg_foreign_data_wrapper WHERE fdwname='foo'), 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + f + (1 row) + + SELECT has_foreign_data_wrapper_privilege( + (SELECT oid FROM pg_foreign_data_wrapper WHERE fdwname='foo'), 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + t + (1 row) + + SELECT has_foreign_data_wrapper_privilege( + (SELECT oid FROM pg_roles WHERE rolname='fdw_test_role'), 'foo', 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + f + (1 row) + + SELECT has_foreign_data_wrapper_privilege('foo', 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + t + (1 row) + + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO fdw_test_role; + SELECT has_foreign_data_wrapper_privilege('fdw_test_role', 'foo', 'USAGE'); + has_foreign_data_wrapper_privilege + ------------------------------------ + t + (1 row) + + -- has_server_privilege + SELECT has_server_privilege('server_test_role', + (SELECT oid FROM pg_foreign_server WHERE srvname='s8'), 'USAGE'); + has_server_privilege + ---------------------- + f + (1 row) + + SELECT has_server_privilege('server_test_role', 's8', 'USAGE'); + has_server_privilege + ---------------------- + f + (1 row) + + SELECT has_server_privilege( + (SELECT oid FROM pg_roles WHERE rolname='server_test_role'), + (SELECT oid FROM pg_foreign_server WHERE srvname='s8'), 'USAGE'); + has_server_privilege + ---------------------- + f + (1 row) + + SELECT has_server_privilege( + (SELECT oid FROM pg_foreign_server WHERE srvname='s8'), 'USAGE'); + has_server_privilege + ---------------------- + t + (1 row) + + SELECT has_server_privilege( + (SELECT oid FROM pg_roles WHERE rolname='server_test_role'), 's8', 'USAGE'); + has_server_privilege + ---------------------- + f + (1 row) + + SELECT has_server_privilege('s8', 'USAGE'); + has_server_privilege + ---------------------- + t + (1 row) + + GRANT USAGE ON FOREIGN SERVER s8 TO server_test_role; + SELECT has_server_privilege('server_test_role', 's8', 'USAGE'); + has_server_privilege + ---------------------- + t + (1 row) + + REVOKE USAGE ON FOREIGN SERVER s8 FROM server_test_role; + -- pg_get_remote_connection_info + SELECT * FROM pg_get_remote_connection_info(NULL); + option_name | option_value + -------------+-------------- + (0 rows) + + SELECT * FROM pg_get_remote_connection_info(''); -- ERROR + ERROR: server "" does not exist + SELECT * FROM pg_get_remote_connection_info('foo'); -- ERROR + ERROR: server "foo" does not exist + SELECT * FROM pg_get_remote_connection_info('foo', 'bob'); -- ERROR + ERROR: role "bob" does not exist + SELECT * FROM pg_get_remote_connection_info('foo', 'server_test_role'); -- ERROR + ERROR: server "foo" does not exist + SELECT * FROM pg_get_remote_connection_info('foo.bar'); -- ERROR + ERROR: server "foo.bar" does not exist + SELECT * FROM pg_get_remote_connection_info('foo', current_user); -- ERROR + ERROR: server "foo" does not exist + SELECT * FROM pg_get_remote_connection_info('s4'); + option_name | option_value + -------------+-------------- + host | a + dbname | b + (2 rows) + + SELECT * FROM pg_get_remote_connection_info('s4', current_user); + option | value + --------+------- + host | a + dbname | b + (2 rows) + + SELECT * FROM pg_get_remote_connection_info('s4', 'public'); + option | value + ---------+----------- + host | a + dbname | b + mapping | is public + (3 rows) + + GRANT USAGE ON FOREIGN SERVER s4 TO server_test_role; + SELECT * FROM pg_get_remote_connection_info('s4', 'server_test_role'); + option | value + ---------+----------- + host | a + dbname | b + mapping | is public + (3 rows) + + DROP USER MAPPING FOR public SERVER s4; + SELECT * FROM pg_get_remote_connection_info('s4', 'server_test_role'); -- ERROR + ERROR: user mapping not found for "server_test_role" + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + option | value + ----------+------- + host | a + dbname | b + username | test + (3 rows) + + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + option | value + ----------+------- + host | a + dbname | b + username | test + (3 rows) + + ALTER SERVER s6 OPTIONS (DROP host, DROP dbname); + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + option | value + ----------+------- + username | test + (1 row) + + ALTER USER MAPPING FOR server_test_role SERVER s6 OPTIONS (DROP username); + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + option | value + --------+------- + (0 rows) + + SELECT * FROM pg_get_remote_connection_info('S6'); + option_name | option_value + ------------------+----------------- + mixed_case_names | true + username | test_mixed_case + (2 rows) + + SELECT * FROM pg_get_remote_connection_info('s8'); + option_name | option_value + -------------+----------------------------------------------- + datasource | dbname=db1 connect_timeout=30 password=public + (1 row) + + SELECT * FROM pg_get_remote_connection_info('s8', 'public'); + option | value + ------------+------------------------------- + datasource | dbname=db1 connect_timeout=30 + (1 row) + + SET ROLE server_test_role; + SELECT * FROM pg_get_remote_connection_info('s6'); -- ERROR + ERROR: permission denied for function pg_get_remote_connection_info + RESET ROLE; + GRANT EXECUTE ON FUNCTION pg_get_remote_connection_info(name) TO server_test_role2; + SET ROLE server_test_role2; + SELECT * FROM pg_get_remote_connection_info('s6'); -- ERROR + ERROR: permission denied for foreign server s6 + RESET ROLE; + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'plpgsql'; + WARNING: changing the foreign-data wrapper library can cause the options for dependent objects to become invalid + SELECT * FROM pg_get_remote_connection_info('s4'); -- ERROR + ERROR: foreign-data wrapper does not provide connection lookup + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'default_fdw'; + ERROR: could not access file "default_fdw": No such file or directory + -- Privileges + CREATE ROLE unprivileged_role; + SET ROLE unprivileged_role; + CREATE FOREIGN DATA WRAPPER foobar LIBRARY 'dummy_fdw' LANGUAGE C; -- ERROR + ERROR: permission denied to create foreign-data wrapper "foobar" + HINT: Must be superuser to create a foreign-data wrapper. + ALTER FOREIGN DATA WRAPPER foo OPTIONS (gotcha 'true'); -- ERROR + ERROR: permission denied to alter foreign-data wrapper "foo" + HINT: Must be superuser to alter a foreign-data wrapper. + ALTER FOREIGN DATA WRAPPER foo OWNER TO unprivileged_role; -- ERROR + ERROR: permission denied to change owner of foreign-data wrapper "foo" + HINT: Must be superuser to change owner of a foreign-data wrapper. + DROP FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: permission denied to drop foreign-data wrapper "foo" + HINT: Must be superuser to drop a foreign-data wrapper. + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; -- ERROR + ERROR: permission denied for foreign-data wrapper foo + CREATE SERVER s9 FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: permission denied for foreign-data wrapper foo + ALTER SERVER s4 VERSION '0.5'; -- ERROR + ERROR: must be owner of foreign server s4 + ALTER SERVER s4 OWNER TO unprivileged_role; -- ERROR + ERROR: must be owner of foreign server s4 + DROP SERVER s4; -- ERROR + ERROR: must be owner of foreign server s4 + GRANT USAGE ON FOREIGN SERVER s4 TO server_test_role; -- ERROR + ERROR: permission denied for foreign server s4 + CREATE USER MAPPING FOR public SERVER s4; -- ERROR + ERROR: must be owner of foreign server s4 + ALTER USER MAPPING FOR server_test_role SERVER s6 OPTIONS (gotcha 'true'); -- ERROR + ERROR: must be owner of foreign server s6 + DROP USER MAPPING FOR server_test_role SERVER s6; -- ERROR + ERROR: must be owner of foreign server s6 + RESET ROLE; + GRANT USAGE ON FOREIGN DATA WRAPPER postgresql TO unprivileged_role; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO unprivileged_role WITH GRANT OPTION; + SET ROLE unprivileged_role; + CREATE FOREIGN DATA WRAPPER foobar LIBRARY 'dummy_fdw' LANGUAGE C; -- ERROR + ERROR: permission denied to create foreign-data wrapper "foobar" + HINT: Must be superuser to create a foreign-data wrapper. + ALTER FOREIGN DATA WRAPPER foo OPTIONS (gotcha 'true'); -- ERROR + ERROR: permission denied to alter foreign-data wrapper "foo" + HINT: Must be superuser to alter a foreign-data wrapper. + DROP FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: permission denied to drop foreign-data wrapper "foo" + HINT: Must be superuser to drop a foreign-data wrapper. + GRANT USAGE ON FOREIGN DATA WRAPPER postgresql TO server_test_role; -- WARNING + WARNING: no privileges were granted for "postgresql" + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; + CREATE SERVER s9 FOREIGN DATA WRAPPER postgresql; + ALTER SERVER s6 VERSION '0.5'; -- ERROR + ERROR: must be owner of foreign server s6 + DROP SERVER s6; -- ERROR + ERROR: must be owner of foreign server s6 + GRANT USAGE ON FOREIGN SERVER s6 TO server_test_role; -- ERROR + ERROR: permission denied for foreign server s6 + GRANT USAGE ON FOREIGN SERVER s9 TO server_test_role; + CREATE USER MAPPING FOR public SERVER s6; -- ERROR + ERROR: must be owner of foreign server s6 + CREATE USER MAPPING FOR public SERVER s9; + ALTER USER MAPPING FOR server_test_role SERVER s6 OPTIONS (gotcha 'true'); -- ERROR + ERROR: must be owner of foreign server s6 + DROP USER MAPPING FOR server_test_role SERVER s6; -- ERROR + ERROR: must be owner of foreign server s6 + RESET ROLE; + REVOKE USAGE ON FOREIGN DATA WRAPPER foo FROM unprivileged_role; -- ERROR + ERROR: dependent privileges exist + HINT: Use CASCADE to revoke them too. + REVOKE USAGE ON FOREIGN DATA WRAPPER foo FROM unprivileged_role CASCADE; + SET ROLE unprivileged_role; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; -- ERROR + ERROR: permission denied for foreign-data wrapper foo + CREATE SERVER s10 FOREIGN DATA WRAPPER foo; -- ERROR + ERROR: permission denied for foreign-data wrapper foo + ALTER SERVER s9 VERSION '1.1'; + GRANT USAGE ON FOREIGN SERVER s9 TO server_test_role; + CREATE USER MAPPING FOR current_user SERVER s9; + DROP SERVER s9 CASCADE; + NOTICE: drop cascades to 2 other objects + DETAIL: drop cascades to user mapping for public + drop cascades to user mapping for unprivileged_role + RESET ROLE; + CREATE SERVER s9 FOREIGN DATA WRAPPER foo; + GRANT USAGE ON FOREIGN SERVER s9 TO unprivileged_role; + SET ROLE unprivileged_role; + ALTER SERVER s9 VERSION '1.2'; -- ERROR + ERROR: must be owner of foreign server s9 + GRANT USAGE ON FOREIGN SERVER s9 TO server_test_role; -- WARNING + WARNING: no privileges were granted for "s9" + CREATE USER MAPPING FOR current_user SERVER s9; -- ERROR + ERROR: must be owner of foreign server s9 + DROP SERVER s9 CASCADE; -- ERROR + ERROR: must be owner of foreign server s9 + RESET ROLE; + -- Cleanup + DROP ROLE server_test_role; -- ERROR + ERROR: role "server_test_role" cannot be dropped because some objects depend on it + DETAIL: access to server s4 + owner of user mapping for server_test_role + owner of user mapping for server_test_role + owner of server s5 + owner of server st2 + DROP SERVER s5 CASCADE; + NOTICE: drop cascades to user mapping for server_test_role + DROP SERVER st1 CASCADE; + NOTICE: drop cascades to user mapping for public + DROP SERVER st2; + DROP ROLE server_test_role; -- ERROR + ERROR: role "server_test_role" cannot be dropped because some objects depend on it + DETAIL: access to server s4 + owner of user mapping for server_test_role + DROP USER MAPPING FOR server_test_role SERVER s6; + DROP ROLE server_test_role; + ERROR: role "server_test_role" cannot be dropped because some objects depend on it + DETAIL: access to server s4 + DROP FOREIGN DATA WRAPPER foo CASCADE; + NOTICE: drop cascades to 6 other objects + DETAIL: drop cascades to server s4 + drop cascades to user mapping for foreign_data_user + drop cascades to server s6 + drop cascades to server S6 + drop cascades to user mapping for foreign_data_user + drop cascades to server s9 + DROP SERVER s8 CASCADE; + NOTICE: drop cascades to 2 other objects + DETAIL: drop cascades to user mapping for foreign_data_user + drop cascades to user mapping for public + DROP ROLE server_test_indirect; + DROP ROLE fdw_test_role; + DROP ROLE unprivileged_role; -- ERROR + ERROR: role "unprivileged_role" cannot be dropped because some objects depend on it + DETAIL: access to foreign-data wrapper postgresql + REVOKE ALL ON FOREIGN DATA WRAPPER postgresql FROM unprivileged_role; + DROP ROLE unprivileged_role; + -- At this point we should have 2 built-in wrappers and no servers or mappings. + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + fdwname | fdwlibrary | fdwoptions + ------------+----------------+------------ + dummy | dummy_fdw | + postgresql | postgresql_fdw | + (2 rows) + + SELECT srvname, srvoptions FROM pg_foreign_server; + srvname | srvoptions + ---------+------------ + (0 rows) + + SELECT * FROM pg_user_mapping; + umuser | umserver | umoptions + --------+----------+----------- + (0 rows) + diff -cNr -x CVS cvs-pgsql/src/test/regress/expected/opr_sanity.out pgsql/src/test/regress/expected/opr_sanity.out *** cvs-pgsql/src/test/regress/expected/opr_sanity.out Fri Dec 5 15:06:35 2008 --- pgsql/src/test/regress/expected/opr_sanity.out Fri Dec 12 10:44:16 2008 *************** *** 117,125 **** p1.proretset != p2.proretset OR p1.provolatile != p2.provolatile OR p1.pronargs != p2.pronargs); ! oid | proname | oid | proname ! -----+---------+-----+--------- ! (0 rows) -- Look for uses of different type OIDs in the argument/result type fields -- for different aliases of the same built-in function. --- 117,126 ---- p1.proretset != p2.proretset OR p1.provolatile != p2.provolatile OR p1.pronargs != p2.pronargs); ! oid | proname | oid | proname ! ------+-------------------------------+------+------------------------------- ! 2995 | pg_get_remote_connection_info | 2996 | pg_get_remote_connection_info ! (1 row) -- Look for uses of different type OIDs in the argument/result type fields -- for different aliases of the same built-in function. diff -cNr -x CVS cvs-pgsql/src/test/regress/expected/rules.out pgsql/src/test/regress/expected/rules.out *** cvs-pgsql/src/test/regress/expected/rules.out Thu Nov 13 10:44:53 2008 --- pgsql/src/test/regress/expected/rules.out Fri Dec 12 10:44:16 2008 *************** *** 1313,1318 **** --- 1313,1319 ---- pg_timezone_abbrevs | SELECT pg_timezone_abbrevs.abbrev, pg_timezone_abbrevs.utc_offset, pg_timezone_abbrevs.is_dst FROM pg_timezone_abbrevs() pg_timezone_abbrevs(abbrev, utc_offset, is_dst); pg_timezone_names | SELECT pg_timezone_names.name, pg_timezone_names.abbrev, pg_timezone_names.utc_offset, pg_timezone_names.is_dst FROM pg_timezone_names() pg_timezone_names(name, abbrev, utc_offset, is_dst); pg_user | SELECT pg_shadow.usename, pg_shadow.usesysid, pg_shadow.usecreatedb, pg_shadow.usesuper, pg_shadow.usecatupd, '********'::text AS passwd, pg_shadow.valuntil, pg_shadow.useconfig FROM pg_shadow; + pg_user_mappings | SELECT u.oid AS umid, s.oid AS srvid, s.srvname, u.umuser, CASE WHEN (u.umuser = (0)::oid) THEN 'public'::name ELSE a.rolname END AS usename FROM ((pg_user_mapping u LEFT JOIN pg_authid a ON ((a.oid = u.umuser))) JOIN pg_foreign_server s ON ((u.umserver = s.oid))); pg_views | SELECT n.nspname AS schemaname, c.relname AS viewname, pg_get_userbyid(c.relowner) AS viewowner, pg_get_viewdef(c.oid) AS definition FROM (pg_class c LEFT JOIN pg_namespace n ON ((n.oid = c.relnamespace))) WHERE (c.relkind = 'v'::"char"); rtest_v1 | SELECT rtest_t1.a, rtest_t1.b FROM rtest_t1; rtest_vcomp | SELECT x.part, (x.size * y.factor) AS size_in_cm FROM rtest_comp x, rtest_unitfact y WHERE (x.unit = y.unit); *************** *** 1328,1334 **** shoelace_obsolete | SELECT shoelace.sl_name, shoelace.sl_avail, shoelace.sl_color, shoelace.sl_len, shoelace.sl_unit, shoelace.sl_len_cm FROM shoelace WHERE (NOT (EXISTS (SELECT shoe.shoename FROM shoe WHERE (shoe.slcolor = shoelace.sl_color)))); street | SELECT r.name, r.thepath, c.cname FROM ONLY road r, real_city c WHERE (c.outline ## r.thepath); toyemp | SELECT emp.name, emp.age, emp.location, (12 * emp.salary) AS annualsal FROM emp; ! (50 rows) SELECT tablename, rulename, definition FROM pg_rules ORDER BY tablename, rulename; --- 1329,1335 ---- shoelace_obsolete | SELECT shoelace.sl_name, shoelace.sl_avail, shoelace.sl_color, shoelace.sl_len, shoelace.sl_unit, shoelace.sl_len_cm FROM shoelace WHERE (NOT (EXISTS (SELECT shoe.shoename FROM shoe WHERE (shoe.slcolor = shoelace.sl_color)))); street | SELECT r.name, r.thepath, c.cname FROM ONLY road r, real_city c WHERE (c.outline ## r.thepath); toyemp | SELECT emp.name, emp.age, emp.location, (12 * emp.salary) AS annualsal FROM emp; ! (51 rows) SELECT tablename, rulename, definition FROM pg_rules ORDER BY tablename, rulename; diff -cNr -x CVS cvs-pgsql/src/test/regress/expected/sanity_check.out pgsql/src/test/regress/expected/sanity_check.out *** cvs-pgsql/src/test/regress/expected/sanity_check.out Sat Nov 24 21:49:23 2007 --- pgsql/src/test/regress/expected/sanity_check.out Fri Dec 12 10:44:16 2008 *************** *** 99,104 **** --- 99,106 ---- pg_depend | t pg_description | t pg_enum | t + pg_foreign_data_wrapper | t + pg_foreign_server | t pg_index | t pg_inherits | t pg_language | t *************** *** 122,127 **** --- 124,130 ---- pg_ts_parser | t pg_ts_template | t pg_type | t + pg_user_mapping | t point_tbl | f polygon_tbl | t ramp | f *************** *** 149,155 **** timetz_tbl | f tinterval_tbl | f varchar_tbl | f ! (138 rows) -- -- another sanity check: every system catalog that has OIDs should have --- 152,158 ---- timetz_tbl | f tinterval_tbl | f varchar_tbl | f ! (141 rows) -- -- another sanity check: every system catalog that has OIDs should have diff -cNr -x CVS cvs-pgsql/src/test/regress/parallel_schedule pgsql/src/test/regress/parallel_schedule *** cvs-pgsql/src/test/regress/parallel_schedule Mon Nov 3 16:31:26 2008 --- pgsql/src/test/regress/parallel_schedule Fri Dec 12 10:44:16 2008 *************** *** 77,83 **** # ---------- # Another group of parallel tests # ---------- ! test: select_views portals_p2 rules foreign_key cluster dependency guc bitmapops combocid tsearch tsdicts # ---------- # Another group of parallel tests --- 77,83 ---- # ---------- # Another group of parallel tests # ---------- ! test: select_views portals_p2 rules foreign_key cluster dependency guc bitmapops combocid tsearch tsdicts foreign_data # ---------- # Another group of parallel tests diff -cNr -x CVS cvs-pgsql/src/test/regress/serial_schedule pgsql/src/test/regress/serial_schedule *** cvs-pgsql/src/test/regress/serial_schedule Mon Nov 3 16:31:26 2008 --- pgsql/src/test/regress/serial_schedule Fri Dec 12 10:44:16 2008 *************** *** 108,113 **** --- 108,114 ---- test: without_oid test: conversion test: tsdicts + test: foreign_data test: truncate test: alter_table test: sequence diff -cNr -x CVS cvs-pgsql/src/test/regress/sql/foreign_data.sql pgsql/src/test/regress/sql/foreign_data.sql *** cvs-pgsql/src/test/regress/sql/foreign_data.sql Thu Jan 1 02:00:00 1970 --- pgsql/src/test/regress/sql/foreign_data.sql Tue Dec 16 16:26:54 2008 *************** *** 0 **** --- 1,405 ---- + -- + -- Test foreign-data wrapper and server management. + -- + + CREATE USER foreign_data_user SUPERUSER; + \c - foreign_data_user + + -- At this point we should have 2 built-in wrappers and no servers. + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + SELECT srvname, srvoptions FROM pg_foreign_server; + SELECT * FROM pg_user_mapping; + + -- CREATE FOREIGN DATA WRAPPER + CREATE FOREIGN DATA WRAPPER foo LIBRARY '' LANGUAGE C; -- ERROR + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'plpgsql' LANGUAGE C; + DROP FOREIGN DATA WRAPPER foo; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; -- duplicate + CREATE FOREIGN DATA WRAPPER "Foo" LIBRARY 'dummy_fdw' LANGUAGE C; + DROP FOREIGN DATA WRAPPER "Foo"; + DROP FOREIGN DATA WRAPPER foo; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (testing '1'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + DROP FOREIGN DATA WRAPPER foo; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (testing '1', testing '2'); -- ERROR + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (testing '1', another '2'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + CREATE ROLE fdw_test_role; + CREATE ROLE fdw_test_role_super SUPERUSER; + + DROP FOREIGN DATA WRAPPER foo; + SET ROLE fdw_test_role; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; -- ERROR + RESET ROLE; + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'postgresql_fdw' LANGUAGE C; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + -- ALTER FOREIGN DATA WRAPPER + ALTER FOREIGN DATA WRAPPER foo LIBRARY ''; -- ERROR + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'plpgsql'; + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw'; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + ALTER FOREIGN DATA WRAPPER foo OPTIONS (a '1', b '2'); + ALTER FOREIGN DATA WRAPPER foo OPTIONS (SET c '4'); -- ERROR + ALTER FOREIGN DATA WRAPPER foo OPTIONS (DROP c); -- ERROR + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD x '1', DROP x); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + ALTER FOREIGN DATA WRAPPER foo OPTIONS (DROP a, SET b '3', ADD c '4'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + ALTER FOREIGN DATA WRAPPER foo OPTIONS (a '2'); + ALTER FOREIGN DATA WRAPPER foo OPTIONS (b '4'); -- ERROR + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + SET ROLE fdw_test_role; + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD d '5'); -- ERROR + SET ROLE fdw_test_role_super; + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD d '5'); + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + ALTER FOREIGN DATA WRAPPER foo OWNER to fdw_test_role; -- ERROR + ALTER FOREIGN DATA WRAPPER foo OWNER to fdw_test_role_super; + ALTER ROLE fdw_test_role_super NOSUPERUSER; + SET ROLE fdw_test_role_super; + ALTER FOREIGN DATA WRAPPER foo OPTIONS (ADD e '6'); -- ERROR + RESET ROLE; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + -- DROP FOREIGN DATA WRAPPER + DROP FOREIGN DATA WRAPPER nonexistent; -- ERROR + DROP FOREIGN DATA WRAPPER IF EXISTS nonexistent; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + DROP ROLE fdw_test_role_super; -- ERROR + SET ROLE fdw_test_role_super; + DROP FOREIGN DATA WRAPPER foo; -- ERROR + RESET ROLE; + DROP FOREIGN DATA WRAPPER foo; + DROP ROLE fdw_test_role_super; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C; + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; + CREATE USER MAPPING FOR current_user SERVER s1; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + \des+ + \deu+ + DROP FOREIGN DATA WRAPPER foo; -- ERROR + SET ROLE fdw_test_role; + DROP FOREIGN DATA WRAPPER foo CASCADE; -- ERROR + RESET ROLE; + DROP FOREIGN DATA WRAPPER foo CASCADE; + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + \des+ + \deu+ + + -- exercise CREATE SERVER + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; -- ERROR + CREATE FOREIGN DATA WRAPPER foo LIBRARY 'dummy_fdw' LANGUAGE C OPTIONS (test_wrapper 'true'); + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; + CREATE SERVER s1 FOREIGN DATA WRAPPER foo; -- ERROR + CREATE SERVER s2 FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER s3 TYPE 'oracle' FOREIGN DATA WRAPPER foo; + CREATE SERVER s4 TYPE 'oracle' FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER s5 VERSION '15.0' FOREIGN DATA WRAPPER foo; + CREATE SERVER s6 VERSION '16.0' FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER "S6" FOREIGN DATA WRAPPER foo OPTIONS (mixed_case_names 'true'); + CREATE SERVER s7 TYPE 'oracle' VERSION '17.0' FOREIGN DATA WRAPPER foo OPTIONS (host 'a', dbname 'b'); + CREATE SERVER s8 FOREIGN DATA WRAPPER postgresql OPTIONS (foo '1'); -- ERROR + CREATE SERVER s8 FOREIGN DATA WRAPPER postgresql OPTIONS (host 'localhost', dbname 's8db'); + \des+ + CREATE ROLE server_test_role; + CREATE ROLE server_test_role2; + SET ROLE server_test_role; + CREATE SERVER st1 FOREIGN DATA WRAPPER foo; -- ERROR: no usage on FDW + RESET ROLE; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; + SET ROLE server_test_role; + CREATE SERVER st1 FOREIGN DATA WRAPPER foo; + RESET ROLE; + \des+ + + CREATE ROLE server_test_indirect; + REVOKE USAGE ON FOREIGN DATA WRAPPER foo FROM server_test_role; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_indirect; + SET ROLE server_test_role; + CREATE SERVER st2 FOREIGN DATA WRAPPER foo; -- ERROR + RESET ROLE; + GRANT server_test_indirect TO server_test_role; + SET ROLE server_test_role; + CREATE SERVER st2 FOREIGN DATA WRAPPER foo; + \des+ + RESET ROLE; + REVOKE server_test_indirect FROM server_test_role; + + -- ALTER SERVER + ALTER SERVER s0; -- ERROR + ALTER SERVER s0 OPTIONS (a '1'); -- ERROR + ALTER SERVER s1 VERSION '1.0' OPTIONS (servername 's1'); + ALTER SERVER s2 VERSION '1.1'; + ALTER SERVER s3 OPTIONS (tnsname 'orcl', port '1521'); + GRANT USAGE ON FOREIGN SERVER s1 TO server_test_role; + \des+ + SET ROLE server_test_role; + ALTER SERVER s1 VERSION '1.1'; -- ERROR + ALTER SERVER s1 OWNER TO server_test_role; -- ERROR + RESET ROLE; + ALTER SERVER s1 OWNER TO server_test_role; + GRANT server_test_role2 TO server_test_role; + SET ROLE server_test_role; + ALTER SERVER s1 VERSION '1.1'; + ALTER SERVER s1 OWNER TO server_test_role2; -- ERROR + RESET ROLE; + ALTER SERVER s8 OPTIONS (foo '1'); -- ERROR option validation + ALTER SERVER s8 OPTIONS (connect_timeout '30', set dbname 'db1', drop host); + SET ROLE server_test_role; + ALTER SERVER s1 OWNER TO server_test_indirect; -- ERROR + RESET ROLE; + GRANT server_test_indirect TO server_test_role; + SET ROLE server_test_role; + ALTER SERVER s1 OWNER TO server_test_indirect; + RESET ROLE; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_indirect; + SET ROLE server_test_role; + ALTER SERVER s1 OWNER TO server_test_indirect; + RESET ROLE; + DROP ROLE server_test_indirect; -- ERROR + \des+ + + -- DROP SERVER + DROP SERVER nonexistent; -- ERROR + DROP SERVER IF EXISTS nonexistent; + \des + SET ROLE server_test_role; + DROP SERVER s2; -- ERROR + DROP SERVER s1; + RESET ROLE; + \des + ALTER SERVER s2 OWNER TO server_test_role; + SET ROLE server_test_role; + DROP SERVER s2; + RESET ROLE; + \des + CREATE USER MAPPING FOR current_user SERVER s3; + \deu + DROP SERVER s3; -- ERROR + DROP SERVER s3 CASCADE; + \des + \deu + + -- CREATE USER MAPPING + CREATE USER MAPPING FOR baz SERVER s1; -- ERROR + CREATE USER MAPPING FOR current_user SERVER s1; -- ERROR + CREATE USER MAPPING FOR current_user SERVER s4; + CREATE USER MAPPING FOR user SERVER s4; -- ERROR duplicate + CREATE USER MAPPING FOR public SERVER s4 OPTIONS (mapping 'is public'); + CREATE USER MAPPING FOR user SERVER s8 OPTIONS (username 'test', password 'secret'); -- ERROR + CREATE USER MAPPING FOR user SERVER s8 OPTIONS (user 'test', password 'secret'); + ALTER SERVER s5 OWNER TO server_test_role; + ALTER SERVER s6 OWNER TO server_test_indirect; + SET ROLE server_test_role; + CREATE USER MAPPING FOR current_user SERVER s5; + CREATE USER MAPPING FOR current_user SERVER s6 OPTIONS (username 'test'); + CREATE USER MAPPING FOR current_user SERVER s7; -- ERROR + CREATE USER MAPPING FOR public SERVER s8; -- ERROR + RESET ROLE; + CREATE USER MAPPING FOR current_user SERVER "S6" OPTIONS (username 'test_mixed_case'); + + ALTER SERVER st1 OWNER TO server_test_indirect; + SET ROLE server_test_role; + CREATE USER MAPPING FOR current_user SERVER st1 OPTIONS (username 'bob', password 'boo'); + CREATE USER MAPPING FOR public SERVER st1; + RESET ROLE; + \deu + + -- ALTER USER MAPPING + ALTER USER MAPPING FOR bob SERVER s4 OPTIONS (gotcha 'true'); -- ERROR + ALTER USER MAPPING FOR user SERVER ss4 OPTIONS (gotcha 'true'); -- ERROR + ALTER USER MAPPING FOR public SERVER s5 OPTIONS (gotcha 'true'); -- ERROR + ALTER USER MAPPING FOR current_user SERVER s8 OPTIONS (username 'test'); -- ERROR + ALTER USER MAPPING FOR current_user SERVER s8 OPTIONS (DROP user, SET password 'public'); + SET ROLE server_test_role; + ALTER USER MAPPING FOR current_user SERVER s5 OPTIONS (ADD modified '1'); + ALTER USER MAPPING FOR public SERVER s4 OPTIONS (ADD modified '1'); -- ERROR + ALTER USER MAPPING FOR public SERVER st1 OPTIONS (ADD modified '1'); + RESET ROLE; + \deu+ + + -- DROP USER MAPPING + DROP USER MAPPING FOR bob SERVER s4; -- ERROR + DROP USER MAPPING FOR user SERVER ss4; + DROP USER MAPPING FOR public SERVER s7; -- ERROR + DROP USER MAPPING IF EXISTS FOR bob SERVER s4; + DROP USER MAPPING IF EXISTS FOR user SERVER ss4; + DROP USER MAPPING IF EXISTS FOR public SERVER s7; + CREATE USER MAPPING FOR public SERVER s8; + SET ROLE server_test_role; + DROP USER MAPPING FOR public SERVER s8; -- ERROR + RESET ROLE; + DROP SERVER s7; + \deu + + -- Information schema + + -- Avoid including the superuser name in the output, as it will vary across installations. + SELECT * FROM information_schema.foreign_data_wrappers WHERE authorization_identifier <> (SELECT rolname FROM pg_authid WHERE oid = 10) ORDER BY 1, 2; + SELECT * FROM information_schema.foreign_data_wrapper_options ORDER BY 1, 2, 3; + SELECT * FROM information_schema.foreign_servers ORDER BY 1, 2; + SELECT * FROM information_schema.foreign_server_options ORDER BY 1, 2, 3; + SELECT * FROM information_schema.user_mappings ORDER BY 1, 2, 3; + SELECT * FROM information_schema.user_mapping_options ORDER BY 1, 2, 3, 4; + SET ROLE server_test_role; + SELECT * FROM information_schema.user_mapping_options ORDER BY 1, 2, 3, 4; + DROP USER MAPPING FOR current_user SERVER st1; + RESET ROLE; + + + -- has_foreign_data_wrapper_privilege + SELECT has_foreign_data_wrapper_privilege('fdw_test_role', + (SELECT oid FROM pg_foreign_data_wrapper WHERE fdwname='foo'), 'USAGE'); + SELECT has_foreign_data_wrapper_privilege('fdw_test_role', 'foo', 'USAGE'); + SELECT has_foreign_data_wrapper_privilege( + (SELECT oid FROM pg_roles WHERE rolname='fdw_test_role'), + (SELECT oid FROM pg_foreign_data_wrapper WHERE fdwname='foo'), 'USAGE'); + SELECT has_foreign_data_wrapper_privilege( + (SELECT oid FROM pg_foreign_data_wrapper WHERE fdwname='foo'), 'USAGE'); + SELECT has_foreign_data_wrapper_privilege( + (SELECT oid FROM pg_roles WHERE rolname='fdw_test_role'), 'foo', 'USAGE'); + SELECT has_foreign_data_wrapper_privilege('foo', 'USAGE'); + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO fdw_test_role; + SELECT has_foreign_data_wrapper_privilege('fdw_test_role', 'foo', 'USAGE'); + + -- has_server_privilege + SELECT has_server_privilege('server_test_role', + (SELECT oid FROM pg_foreign_server WHERE srvname='s8'), 'USAGE'); + SELECT has_server_privilege('server_test_role', 's8', 'USAGE'); + SELECT has_server_privilege( + (SELECT oid FROM pg_roles WHERE rolname='server_test_role'), + (SELECT oid FROM pg_foreign_server WHERE srvname='s8'), 'USAGE'); + SELECT has_server_privilege( + (SELECT oid FROM pg_foreign_server WHERE srvname='s8'), 'USAGE'); + SELECT has_server_privilege( + (SELECT oid FROM pg_roles WHERE rolname='server_test_role'), 's8', 'USAGE'); + SELECT has_server_privilege('s8', 'USAGE'); + GRANT USAGE ON FOREIGN SERVER s8 TO server_test_role; + SELECT has_server_privilege('server_test_role', 's8', 'USAGE'); + REVOKE USAGE ON FOREIGN SERVER s8 FROM server_test_role; + + -- pg_get_remote_connection_info + SELECT * FROM pg_get_remote_connection_info(NULL); + SELECT * FROM pg_get_remote_connection_info(''); -- ERROR + SELECT * FROM pg_get_remote_connection_info('foo'); -- ERROR + SELECT * FROM pg_get_remote_connection_info('foo', 'bob'); -- ERROR + SELECT * FROM pg_get_remote_connection_info('foo', 'server_test_role'); -- ERROR + SELECT * FROM pg_get_remote_connection_info('foo.bar'); -- ERROR + SELECT * FROM pg_get_remote_connection_info('foo', current_user); -- ERROR + SELECT * FROM pg_get_remote_connection_info('s4'); + SELECT * FROM pg_get_remote_connection_info('s4', current_user); + SELECT * FROM pg_get_remote_connection_info('s4', 'public'); + GRANT USAGE ON FOREIGN SERVER s4 TO server_test_role; + SELECT * FROM pg_get_remote_connection_info('s4', 'server_test_role'); + DROP USER MAPPING FOR public SERVER s4; + SELECT * FROM pg_get_remote_connection_info('s4', 'server_test_role'); -- ERROR + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + ALTER SERVER s6 OPTIONS (DROP host, DROP dbname); + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + ALTER USER MAPPING FOR server_test_role SERVER s6 OPTIONS (DROP username); + SELECT * FROM pg_get_remote_connection_info('s6', 'server_test_role'); + SELECT * FROM pg_get_remote_connection_info('S6'); + SELECT * FROM pg_get_remote_connection_info('s8'); + SELECT * FROM pg_get_remote_connection_info('s8', 'public'); + SET ROLE server_test_role; + SELECT * FROM pg_get_remote_connection_info('s6'); -- ERROR + RESET ROLE; + GRANT EXECUTE ON FUNCTION pg_get_remote_connection_info(name) TO server_test_role2; + SET ROLE server_test_role2; + SELECT * FROM pg_get_remote_connection_info('s6'); -- ERROR + RESET ROLE; + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'plpgsql'; + SELECT * FROM pg_get_remote_connection_info('s4'); -- ERROR + ALTER FOREIGN DATA WRAPPER foo LIBRARY 'default_fdw'; + + -- Privileges + CREATE ROLE unprivileged_role; + SET ROLE unprivileged_role; + CREATE FOREIGN DATA WRAPPER foobar LIBRARY 'dummy_fdw' LANGUAGE C; -- ERROR + ALTER FOREIGN DATA WRAPPER foo OPTIONS (gotcha 'true'); -- ERROR + ALTER FOREIGN DATA WRAPPER foo OWNER TO unprivileged_role; -- ERROR + DROP FOREIGN DATA WRAPPER foo; -- ERROR + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; -- ERROR + CREATE SERVER s9 FOREIGN DATA WRAPPER foo; -- ERROR + ALTER SERVER s4 VERSION '0.5'; -- ERROR + ALTER SERVER s4 OWNER TO unprivileged_role; -- ERROR + DROP SERVER s4; -- ERROR + GRANT USAGE ON FOREIGN SERVER s4 TO server_test_role; -- ERROR + CREATE USER MAPPING FOR public SERVER s4; -- ERROR + ALTER USER MAPPING FOR server_test_role SERVER s6 OPTIONS (gotcha 'true'); -- ERROR + DROP USER MAPPING FOR server_test_role SERVER s6; -- ERROR + RESET ROLE; + + GRANT USAGE ON FOREIGN DATA WRAPPER postgresql TO unprivileged_role; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO unprivileged_role WITH GRANT OPTION; + SET ROLE unprivileged_role; + CREATE FOREIGN DATA WRAPPER foobar LIBRARY 'dummy_fdw' LANGUAGE C; -- ERROR + ALTER FOREIGN DATA WRAPPER foo OPTIONS (gotcha 'true'); -- ERROR + DROP FOREIGN DATA WRAPPER foo; -- ERROR + GRANT USAGE ON FOREIGN DATA WRAPPER postgresql TO server_test_role; -- WARNING + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; + CREATE SERVER s9 FOREIGN DATA WRAPPER postgresql; + ALTER SERVER s6 VERSION '0.5'; -- ERROR + DROP SERVER s6; -- ERROR + GRANT USAGE ON FOREIGN SERVER s6 TO server_test_role; -- ERROR + GRANT USAGE ON FOREIGN SERVER s9 TO server_test_role; + CREATE USER MAPPING FOR public SERVER s6; -- ERROR + CREATE USER MAPPING FOR public SERVER s9; + ALTER USER MAPPING FOR server_test_role SERVER s6 OPTIONS (gotcha 'true'); -- ERROR + DROP USER MAPPING FOR server_test_role SERVER s6; -- ERROR + RESET ROLE; + + REVOKE USAGE ON FOREIGN DATA WRAPPER foo FROM unprivileged_role; -- ERROR + REVOKE USAGE ON FOREIGN DATA WRAPPER foo FROM unprivileged_role CASCADE; + SET ROLE unprivileged_role; + GRANT USAGE ON FOREIGN DATA WRAPPER foo TO server_test_role; -- ERROR + CREATE SERVER s10 FOREIGN DATA WRAPPER foo; -- ERROR + ALTER SERVER s9 VERSION '1.1'; + GRANT USAGE ON FOREIGN SERVER s9 TO server_test_role; + CREATE USER MAPPING FOR current_user SERVER s9; + DROP SERVER s9 CASCADE; + RESET ROLE; + CREATE SERVER s9 FOREIGN DATA WRAPPER foo; + GRANT USAGE ON FOREIGN SERVER s9 TO unprivileged_role; + SET ROLE unprivileged_role; + ALTER SERVER s9 VERSION '1.2'; -- ERROR + GRANT USAGE ON FOREIGN SERVER s9 TO server_test_role; -- WARNING + CREATE USER MAPPING FOR current_user SERVER s9; -- ERROR + DROP SERVER s9 CASCADE; -- ERROR + RESET ROLE; + + -- Cleanup + DROP ROLE server_test_role; -- ERROR + DROP SERVER s5 CASCADE; + DROP SERVER st1 CASCADE; + DROP SERVER st2; + DROP ROLE server_test_role; -- ERROR + DROP USER MAPPING FOR server_test_role SERVER s6; + DROP ROLE server_test_role; + DROP FOREIGN DATA WRAPPER foo CASCADE; + DROP SERVER s8 CASCADE; + DROP ROLE server_test_indirect; + DROP ROLE fdw_test_role; + DROP ROLE unprivileged_role; -- ERROR + REVOKE ALL ON FOREIGN DATA WRAPPER postgresql FROM unprivileged_role; + DROP ROLE unprivileged_role; + + -- At this point we should have 2 built-in wrappers and no servers or mappings. + SELECT fdwname, fdwlibrary, fdwoptions FROM pg_foreign_data_wrapper ORDER BY 1, 2, 3; + SELECT srvname, srvoptions FROM pg_foreign_server; + SELECT * FROM pg_user_mapping;