On Mon, Mar 2, 2015 at 1:42 PM, Greg Stark <st...@mit.edu> wrote: > So earlier someone commented that using lists list_nth() seemed odd and a > tuplestore might be better. In fact using lists this way is O(n^2). I've > done some quick tests and it doesn't start being a problem until about > 10,000 lines which obviously isn't a terribly common way to use > pg_hba_settings. However we have in the past had people doing multi-tenant > clusters with hundreds or thousands of databases in a cluster complaining > about scalability of certain operations. It would be a shame to introduce a > new one. > > It does seem annoying to use a tuplestore as IIRC the function scan node > also materializes the results in recent years. But at least it would scale > linearly. >
So I didn't get the memo about SFRM_Materialize. Here's a rewrite of this using that interface which seems to test ok up to 100k. At that point I start running into memory errors on reading the HBA file so I guess that's an indication that's large enough to stop worrying about it. -- greg
*** a/doc/src/sgml/catalogs.sgml --- b/doc/src/sgml/catalogs.sgml *************** *** 7393,7398 **** --- 7393,7403 ---- <entry>views</entry> </row> + <row> + <entry><link linkend="view-pg-hba-settings"><structname>pg_hba_settings</structname></link></entry> + <entry>client authentication settings</entry> + </row> + </tbody> </tgroup> </table> *************** *** 9696,9699 **** SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx --- 9701,9786 ---- </sect1> + <sect1 id="view-pg-hba-settings"> + <title><structname>pg_hba_settings</structname></title> + + <indexterm zone="view-pg-hba-settings"> + <primary>pg_hba_settings</primary> + </indexterm> + + <para> + The read-only <structname>pg_hba_settings</structname> view provides + access to the client authentication configuration from pg_hba.conf. + Access to this view is limited to superusers. + </para> + + <table> + <title><structname>pg_hba_settings</> Columns</title> + + <tgroup cols="3"> + <thead> + <row> + <entry>Name</entry> + <entry>Type</entry> + <entry>Description</entry> + </row> + </thead> + <tbody> + <row> + <entry><structfield>type</structfield></entry> + <entry><type>text</type></entry> + <entry>Type of connection</entry> + </row> + <row> + <entry><structfield>database</structfield></entry> + <entry><type>text[]</type></entry> + <entry>List of database names</entry> + </row> + <row> + <entry><structfield>user</structfield></entry> + <entry><type>text[]</type></entry> + <entry>List of user names</entry> + </row> + <row> + <entry><structfield>address</structfield></entry> + <entry><type>inet</type></entry> + <entry>Client machine address</entry> + </row> + <row> + <entry><structfield>mask</structfield></entry> + <entry><type>inet</type></entry> + <entry>IP Mask</entry> + </row> + <row> + <entry><structfield>compare_method</structfield></entry> + <entry><type>text</type></entry> + <entry>IP address comparison method</entry> + </row> + <row> + <entry><structfield>hostname</structfield></entry> + <entry><type>text</type></entry> + <entry>Client host name</entry> + </row> + <row> + <entry><structfield>method</structfield></entry> + <entry><type>text</type></entry> + <entry>Authentication method</entry> + </row> + <row> + <entry><structfield>options</structfield></entry> + <entry><type>text[]</type></entry> + <entry>Configuration options set for authentication method</entry> + </row> + <row> + <entry><structfield>line_number</structfield></entry> + <entry><type>integer</type></entry> + <entry> + Line number within client authentication configuration file + the current value was set at + </entry> + </row> + </tbody> + </tgroup> + </table> + </sect1> </chapter> *** a/doc/src/sgml/client-auth.sgml --- b/doc/src/sgml/client-auth.sgml *************** *** 680,685 **** local all @admins,+support md5 --- 680,690 ---- local db1,db2,@demodbs all md5 </programlisting> </example> + + <para> + The contents of this file are reflected in the pg_hba_settings view. + See <xref linkend="view-pg-hba-settings"> for details. + </para> </sect1> <sect1 id="auth-username-maps"> *** a/src/backend/catalog/system_views.sql --- b/src/backend/catalog/system_views.sql *************** *** 414,419 **** CREATE RULE pg_settings_n AS --- 414,424 ---- GRANT SELECT, UPDATE ON pg_settings TO PUBLIC; + CREATE VIEW pg_hba_settings AS + SELECT * FROM pg_hba_settings() AS A; + + REVOKE ALL on pg_hba_settings FROM public; + CREATE VIEW pg_timezone_abbrevs AS SELECT * FROM pg_timezone_abbrevs(); *** a/src/backend/libpq/hba.c --- b/src/backend/libpq/hba.c *************** *** 25,38 **** --- 25,44 ---- #include <arpa/inet.h> #include <unistd.h> + #include "access/htup_details.h" #include "catalog/pg_collation.h" + #include "catalog/pg_type.h" + #include "catalog/objectaddress.h" + #include "funcapi.h" #include "libpq/ip.h" #include "libpq/libpq.h" + #include "miscadmin.h" #include "postmaster/postmaster.h" #include "regex/regex.h" #include "replication/walsender.h" #include "storage/fd.h" #include "utils/acl.h" + #include "utils/builtins.h" #include "utils/guc.h" #include "utils/lsyscache.h" #include "utils/memutils.h" *************** *** 2220,2222 **** hba_getauthmethod(hbaPort *port) --- 2226,2632 ---- { check_hba(port); } + + /* + * Fill in suitable values to build a tuple representing the + * HbaLine provided + */ + static void + hba_getvalues_for_line(HbaLine *hba, Datum *values, bool *nulls) + { + ListCell *dbcell; + char buffer[NI_MAXHOST]; + StringInfoData str; + HbaToken *tok; + int index = 0; + List *options = NULL; + + /* connection type */ + switch (hba->conntype) + { + case ctLocal: + values[index] = CStringGetTextDatum("local"); + break; + case ctHost: + values[index] = CStringGetTextDatum("host"); + break; + case ctHostSSL: + values[index] = CStringGetTextDatum("hostssl"); + break; + case ctHostNoSSL: + values[index] = CStringGetTextDatum("hostnossl"); + break; + default: + nulls[index] = true; + break; + } + + /* database */ + index++; + if (list_length(hba->databases) != 0) + { + List *names = NULL; + + foreach(dbcell, hba->databases) + { + tok = lfirst(dbcell); + names = lappend(names, tok->string); + } + + values[index] = PointerGetDatum(strlist_to_textarray(names)); + } + else + nulls[index] = true; + + /* user */ + index++; + if (list_length(hba->roles) != 0) + { + List *roles = NULL; + + foreach(dbcell, hba->roles) + { + tok = lfirst(dbcell); + roles = lappend(roles, tok->string); + } + + values[index] = PointerGetDatum(strlist_to_textarray(roles)); + } + else + nulls[index] = true; + + /* address */ + index++; + if (pg_getnameinfo_all(&hba->addr, sizeof(struct sockaddr_storage), buffer, sizeof(buffer), NULL, 0, NI_NUMERICHOST) == 0) + { + clean_ipv6_addr(hba->addr.ss_family, buffer); + values[index] = DirectFunctionCall1(inet_in, CStringGetDatum(buffer)); + } + else + nulls[index] = true; + + /* mask */ + index++; + if (pg_getnameinfo_all(&hba->mask, sizeof(struct sockaddr_storage), buffer, sizeof(buffer), NULL, 0, NI_NUMERICHOST) == 0) + { + clean_ipv6_addr(hba->addr.ss_family, buffer); + values[index] = DirectFunctionCall1(inet_in, CStringGetDatum(buffer)); + } + else + nulls[index] = true; + + /* compare method */ + index++; + switch (hba->ip_cmp_method) + { + case ipCmpMask: + values[index] = CStringGetTextDatum("mask"); + break; + case ipCmpSameHost: + values[index] = CStringGetTextDatum("samehost"); + break; + case ipCmpSameNet: + values[index] = CStringGetTextDatum("samenet"); + break; + case ipCmpAll: + values[index] = CStringGetTextDatum("all"); + break; + default: + nulls[index] = true; + break; + } + + /* hostname */ + index++; + if (hba->hostname) + values[index] = CStringGetTextDatum(hba->hostname); + else + nulls[index] = true; + + /* method */ + index++; + switch (hba->auth_method) + { + case uaReject: + values[index] = CStringGetTextDatum("reject"); + break; + case uaImplicitReject: + values[index] = CStringGetTextDatum("implicitreject"); + break; + case uaTrust: + values[index] = CStringGetTextDatum("trust"); + break; + case uaIdent: + values[index] = CStringGetTextDatum("ident"); + break; + case uaPassword: + values[index] = CStringGetTextDatum("password"); + break; + case uaMD5: + values[index] = CStringGetTextDatum("md5"); + break; + case uaGSS: + values[index] = CStringGetTextDatum("gss"); + break; + case uaSSPI: + values[index] = CStringGetTextDatum("sspi"); + break; + case uaPAM: + values[index] = CStringGetTextDatum("pam"); + break; + case uaLDAP: + values[index] = CStringGetTextDatum("ldap"); + break; + case uaCert: + values[index] = CStringGetTextDatum("cert"); + break; + case uaRADIUS: + values[index] = CStringGetTextDatum("radius"); + break; + case uaPeer: + values[index] = CStringGetTextDatum("peer"); + break; + default: + nulls[index] = true; + break; + } + + /* options */ + index++; + + if (hba->auth_method == uaGSS || hba->auth_method == uaSSPI) + { + initStringInfo(&str); + + if (hba->include_realm) + appendStringInfoString(&str, "include_realm=true,"); + + if (hba->krb_realm) + { + appendStringInfoString(&str, "krb_realm="); + appendStringInfoString(&str, hba->krb_realm); + appendStringInfoString(&str, ","); + } + + if (str.len > 1) + str.data[str.len - 1] = '\0'; + + options = lappend(options, str.data); + } + + if ((hba->usermap) + && (hba->auth_method == uaIdent || hba->auth_method == uaPeer + || hba->auth_method == uaCert || hba->auth_method == uaGSS + || hba->auth_method == uaSSPI)) + { + initStringInfo(&str); + appendStringInfoString(&str, "map="); + appendStringInfoString(&str, hba->usermap); + options = lappend(options, str.data); + } + + if (hba->auth_method == uaLDAP) + { + initStringInfo(&str); + if (hba->ldapserver) + { + appendStringInfoString(&str, "ldapserver="); + appendStringInfoString(&str, hba->ldapserver); + appendStringInfoString(&str, ","); + } + + if (hba->ldapport) + { + snprintf(buffer, sizeof(buffer), "%d", hba->ldapport); + appendStringInfoString(&str, "ldapport="); + appendStringInfoString(&str, buffer); + appendStringInfoString(&str, ","); + } + + if (hba->ldaptls) + appendStringInfoString(&str, "ldaptls=true,"); + + if (hba->ldapprefix) + { + appendStringInfoString(&str, "ldapprefix="); + appendStringInfoString(&str, hba->ldapprefix); + appendStringInfoString(&str, ","); + } + + if (hba->ldapsuffix) + { + appendStringInfoString(&str, "ldapsuffix="); + appendStringInfoString(&str, hba->ldapsuffix); + appendStringInfoString(&str, ","); + } + + if (hba->ldapbasedn) + { + appendStringInfoString(&str, "ldapbasedn="); + appendStringInfoString(&str, hba->ldapbasedn); + appendStringInfoString(&str, ","); + } + + if (hba->ldapbinddn) + { + appendStringInfoString(&str, "ldapbinddn="); + appendStringInfoString(&str, hba->ldapbinddn); + appendStringInfoString(&str, ","); + } + + if (hba->ldapbindpasswd) + { + appendStringInfoString(&str, "ldapbindpasswd="); + appendStringInfoString(&str, hba->ldapbindpasswd); + appendStringInfoString(&str, ","); + } + + if (hba->ldapsearchattribute) + { + appendStringInfoString(&str, "ldapsearchattribute="); + appendStringInfoString(&str, hba->ldapsearchattribute); + appendStringInfoString(&str, ","); + } + + if (hba->ldapscope) + { + snprintf(buffer, sizeof(buffer), "%d", hba->ldapscope); + appendStringInfoString(&str, "ldapscope="); + appendStringInfoString(&str, buffer); + appendStringInfoString(&str, ","); + } + + if (str.len > 1) + str.data[str.len - 1] = '\0'; + + options = lappend(options, str.data); + } + + if (hba->auth_method == uaRADIUS) + { + initStringInfo(&str); + if (hba->radiusserver) + { + appendStringInfoString(&str, "radiusserver="); + appendStringInfoString(&str, hba->radiusserver); + appendStringInfoString(&str, ","); + } + + if (hba->radiussecret) + { + appendStringInfoString(&str, "radiussecret="); + appendStringInfoString(&str, hba->radiussecret); + appendStringInfoString(&str, ","); + } + + if (hba->radiusidentifier) + { + appendStringInfoString(&str, "radiusidentifier="); + appendStringInfoString(&str, hba->radiusidentifier); + appendStringInfoString(&str, ","); + } + + if (hba->radiusport) + { + snprintf(buffer, sizeof(buffer), "%d", hba->radiusport); + appendStringInfoString(&str, "radiusport="); + appendStringInfoString(&str, buffer); + appendStringInfoString(&str, ","); + } + + if (str.len > 1) + str.data[str.len - 1] = '\0'; + + options = lappend(options, str.data); + } + + if (options) + values[index] = PointerGetDatum(strlist_to_textarray(options)); + else + nulls[index] = true; + + /* line_number */ + index++; + values[index] = Int32GetDatum(hba->linenumber); + } + + #define NUM_PG_HBA_SETTINGS_ATTS 10 + + Datum + hba_settings(PG_FUNCTION_ARGS) + { + Tuplestorestate *tuple_store; + TupleDesc tupdesc; + ListCell *line; + MemoryContext old_cxt; + + ReturnSetInfo *rsi = (ReturnSetInfo *) fcinfo->resultinfo; + + if (!rsi || !IsA(rsi, ReturnSetInfo) || + (rsi->allowedModes & SFRM_Materialize) == 0) + ereport(ERROR, + (errcode(ERRCODE_FEATURE_NOT_SUPPORTED), + errmsg("set-valued function called in context that " + "cannot accept a set"))); + + rsi->returnMode = SFRM_Materialize; + + old_cxt = MemoryContextSwitchTo(rsi->econtext->ecxt_per_query_memory); + + /* + * need a tuple descriptor representing NUM_PG_HBA_SETTINGS_ATTS + * columns of the appropriate types + */ + tupdesc = CreateTemplateTupleDesc(NUM_PG_HBA_SETTINGS_ATTS, false); + TupleDescInitEntry(tupdesc, (AttrNumber) 1, "type", + TEXTOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 2, "database", + TEXTARRAYOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 3, "user", + TEXTARRAYOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 4, "address", + INETOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 5, "mask", + INETOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 6, "compare_method", + TEXTOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 7, "hostname", + TEXTOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 8, "method", + TEXTOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 9, "options", + TEXTARRAYOID, -1, 0); + TupleDescInitEntry(tupdesc, (AttrNumber) 10, "line_number", + INT4OID, -1, 0); + + BlessTupleDesc(tupdesc); + + tuple_store = + tuplestore_begin_heap(rsi->allowedModes & SFRM_Materialize_Random, + false, work_mem); + + MemoryContextSwitchTo(old_cxt); + + foreach(line, parsed_hba_lines) + { + HbaLine *hba = (HbaLine *) lfirst(line); + Datum values[NUM_PG_HBA_SETTINGS_ATTS]; + bool nulls[NUM_PG_HBA_SETTINGS_ATTS]; + HeapTuple tuple; + + MemSet(values, 0, sizeof(values)); + MemSet(nulls, 0, sizeof(nulls)); + + /* Get the next parsed hba line values */ + hba_getvalues_for_line(hba, values, nulls); + + /* build a tuple */ + tuple = heap_form_tuple(tupdesc, values, nulls); + tuplestore_puttuple(tuple_store, tuple); + } + + rsi->setDesc = tupdesc; + rsi->setResult = tuple_store; + + PG_RETURN_NULL(); + } *** a/src/backend/tcop/postgres.c --- b/src/backend/tcop/postgres.c *************** *** 3996,4001 **** PostgresMain(int argc, char *argv[], --- 3996,4009 ---- { got_SIGHUP = false; ProcessConfigFile(PGC_SIGHUP); + + /* + * Reload authentication config files too to refresh + * pg_hba_settings view data. + */ + if (!load_hba()) + ereport(WARNING, + (errmsg("pg_hba.conf not reloaded"))); } /* *** a/src/include/catalog/pg_proc.h --- b/src/include/catalog/pg_proc.h *************** *** 3023,3028 **** DATA(insert OID = 2078 ( set_config PGNSP PGUID 12 1 0 0 0 f f f f f f v 3 0 2 --- 3023,3030 ---- DESCR("SET X as a function"); DATA(insert OID = 2084 ( pg_show_all_settings PGNSP PGUID 12 1 1000 0 0 f f f f t t s 0 0 2249 "" "{25,25,25,25,25,25,25,25,25,25,25,1009,25,25,25,23}" "{o,o,o,o,o,o,o,o,o,o,o,o,o,o,o,o}" "{name,setting,unit,category,short_desc,extra_desc,context,vartype,source,min_val,max_val,enumvals,boot_val,reset_val,sourcefile,sourceline}" _null_ show_all_settings _null_ _null_ _null_ )); DESCR("SHOW ALL as a function"); + DATA(insert OID = 3582 ( pg_hba_settings PGNSP PGUID 12 1 1000 0 0 f f f f t t s 0 0 2249 "" "{25,1009,1009,869,869,25,25,25,1009,23}" "{o,o,o,o,o,o,o,o,o,o}" "{type,database,user,address,mask,compare_method,hostname,method,options,line_number}" _null_ hba_settings _null_ _null_ _null_ )); + DESCR("view client authentication settings"); DATA(insert OID = 1371 ( pg_lock_status PGNSP PGUID 12 1 1000 0 0 f f f f t t v 0 0 2249 "" "{25,26,26,23,21,25,28,26,26,21,25,23,25,16,16}" "{o,o,o,o,o,o,o,o,o,o,o,o,o,o,o}" "{locktype,database,relation,page,tuple,virtualxid,transactionid,classid,objid,objsubid,virtualtransaction,pid,mode,granted,fastpath}" _null_ pg_lock_status _null_ _null_ _null_ )); DESCR("view system lock information"); DATA(insert OID = 1065 ( pg_prepared_xact PGNSP PGUID 12 1 1000 0 0 f f f f t t v 0 0 2249 "" "{28,25,1184,26,26}" "{o,o,o,o,o}" "{transaction,gid,prepared,ownerid,dbid}" _null_ pg_prepared_xact _null_ _null_ _null_ )); *** a/src/include/libpq/hba.h --- b/src/include/libpq/hba.h *************** *** 103,107 **** extern int check_usermap(const char *usermap_name, const char *pg_role, const char *auth_user, bool case_sensitive); extern bool pg_isblank(const char c); - #endif /* HBA_H */ --- 103,106 ---- *** a/src/include/utils/builtins.h --- b/src/include/utils/builtins.h *************** *** 1090,1095 **** extern Datum quote_nullable(PG_FUNCTION_ARGS); --- 1090,1096 ---- extern Datum show_config_by_name(PG_FUNCTION_ARGS); extern Datum set_config_by_name(PG_FUNCTION_ARGS); extern Datum show_all_settings(PG_FUNCTION_ARGS); + extern Datum hba_settings(PG_FUNCTION_ARGS); /* lockfuncs.c */ extern Datum pg_lock_status(PG_FUNCTION_ARGS); *** a/src/test/regress/expected/rules.out --- b/src/test/regress/expected/rules.out *************** *** 1315,1320 **** pg_group| SELECT pg_authid.rolname AS groname, --- 1315,1331 ---- WHERE (pg_auth_members.roleid = pg_authid.oid)) AS grolist FROM pg_authid WHERE (NOT pg_authid.rolcanlogin); + pg_hba_settings| SELECT a.type, + a.database, + a."user", + a.address, + a.mask, + a.compare_method, + a.hostname, + a.method, + a.options, + a.line_number + FROM pg_hba_settings() a(type, database, "user", address, mask, compare_method, hostname, method, options, line_number); pg_indexes| SELECT n.nspname AS schemaname, c.relname AS tablename, i.relname AS indexname,
-- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers