/**
 * sets privilege information extracted from SHOW GRANTS result
 *
 * Detection for some CREATE privilege.
 *
 * Since MySQL 4.1.2, we can easily detect current user's grants using $userlink
 * (no control user needed) and we don't have to try any other method for
 * detection
 *
 * @todo fix to get really all privileges, not only explicitly defined for this user
 * from MySQL manual: (http://dev.mysql.com/doc/refman/5.0/en/show-grants.html)
 * SHOW GRANTS displays only the privileges granted explicitly to the named
 * account. Other privileges might be available to the account, but they are not
 * displayed. For example, if an anonymous account exists, the named account
 * might be able to use its privileges, but SHOW GRANTS will not display them.
 *
 * @return void
 */
function PMA_analyseShowGrant()
{
    if (PMA\libraries\Util::cacheExists('is_create_db_priv')) {
        $GLOBALS['is_create_db_priv'] = PMA\libraries\Util::cacheGet('is_create_db_priv');
        $GLOBALS['is_reload_priv'] = PMA\libraries\Util::cacheGet('is_reload_priv');
        $GLOBALS['db_to_create'] = PMA\libraries\Util::cacheGet('db_to_create');
        $GLOBALS['dbs_where_create_table_allowed'] = PMA\libraries\Util::cacheGet('dbs_where_create_table_allowed');
        $GLOBALS['dbs_to_test'] = PMA\libraries\Util::cacheGet('dbs_to_test');
        $GLOBALS['db_priv'] = PMA\libraries\Util::cacheGet('db_priv');
        $GLOBALS['col_priv'] = PMA\libraries\Util::cacheGet('col_priv');
        $GLOBALS['table_priv'] = PMA\libraries\Util::cacheGet('table_priv');
        $GLOBALS['proc_priv'] = PMA\libraries\Util::cacheGet('proc_priv');
        return;
    }
    // defaults
    $GLOBALS['is_create_db_priv'] = false;
    $GLOBALS['is_reload_priv'] = false;
    $GLOBALS['db_to_create'] = '';
    $GLOBALS['dbs_where_create_table_allowed'] = array();
    $GLOBALS['dbs_to_test'] = $GLOBALS['dbi']->getSystemSchemas();
    $GLOBALS['proc_priv'] = false;
    $GLOBALS['db_priv'] = false;
    $GLOBALS['col_priv'] = false;
    $GLOBALS['table_priv'] = false;
    $rs_usr = $GLOBALS['dbi']->tryQuery('SHOW GRANTS');
    if (!$rs_usr) {
        return;
    }
    $re0 = '(^|(\\\\\\\\)+|[^\\\\])';
    // non-escaped wildcards
    $re1 = '(^|[^\\\\])(\\\\)+';
    // escaped wildcards
    while ($row = $GLOBALS['dbi']->fetchRow($rs_usr)) {
        list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($row[0]);
        if ($show_grants_dbname == '*') {
            if ($show_grants_str != 'USAGE') {
                $GLOBALS['dbs_to_test'] = false;
            }
        } elseif ($GLOBALS['dbs_to_test'] !== false) {
            $GLOBALS['dbs_to_test'][] = $show_grants_dbname;
        }
        if (mb_strpos($show_grants_str, 'RELOAD') !== false) {
            $GLOBALS['is_reload_priv'] = true;
        }
        // check for the required privileges for adjust
        PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname);
        /**
         * @todo if we find CREATE VIEW but not CREATE, do not offer
         * the create database dialog box
         */
        if ($show_grants_str == 'ALL' || $show_grants_str == 'ALL PRIVILEGES' || $show_grants_str == 'CREATE' || strpos($show_grants_str, 'CREATE,') !== false) {
            if ($show_grants_dbname == '*') {
                // a global CREATE privilege
                $GLOBALS['is_create_db_priv'] = true;
                $GLOBALS['is_reload_priv'] = true;
                $GLOBALS['db_to_create'] = '';
                $GLOBALS['dbs_where_create_table_allowed'][] = '*';
                // @todo we should not break here, cause GRANT ALL *.*
                // could be revoked by a later rule like GRANT SELECT ON db.*
                break;
            } else {
                // this array may contain wildcards
                $GLOBALS['dbs_where_create_table_allowed'][] = $show_grants_dbname;
                $dbname_to_test = PMA\libraries\Util::backquote($show_grants_dbname);
                if ($GLOBALS['is_create_db_priv']) {
                    // no need for any more tests if we already know this
                    continue;
                }
                // does this db exist?
                if (preg_match('/' . $re0 . '%|_/', $show_grants_dbname) && !preg_match('/\\\\%|\\\\_/', $show_grants_dbname) || !$GLOBALS['dbi']->tryQuery('USE ' . preg_replace('/' . $re1 . '(%|_)/', '\\1\\3', $dbname_to_test)) && mb_substr($GLOBALS['dbi']->getError(), 1, 4) != 1044) {
                    /**
                     * Do not handle the underscore wildcard
                     * (this case must be rare anyway)
                     */
                    $GLOBALS['db_to_create'] = preg_replace('/' . $re0 . '%/', '\\1', $show_grants_dbname);
                    $GLOBALS['db_to_create'] = preg_replace('/' . $re1 . '(%|_)/', '\\1\\3', $GLOBALS['db_to_create']);
                    $GLOBALS['is_create_db_priv'] = true;
                    /**
                     * @todo collect $GLOBALS['db_to_create'] into an array,
                     * to display a drop-down in the "Create database" dialog
                     */
                    // we don't break, we want all possible databases
                    //break;
                }
                // end if
            }
            // end elseif
        }
        // end if
    }
    // end while
    $GLOBALS['dbi']->freeResult($rs_usr);
    // must also cacheUnset() them in
    // libraries/plugins/auth/AuthenticationCookie.php
    PMA\libraries\Util::cacheSet('is_create_db_priv', $GLOBALS['is_create_db_priv']);
    PMA\libraries\Util::cacheSet('is_reload_priv', $GLOBALS['is_reload_priv']);
    PMA\libraries\Util::cacheSet('db_to_create', $GLOBALS['db_to_create']);
    PMA\libraries\Util::cacheSet('dbs_where_create_table_allowed', $GLOBALS['dbs_where_create_table_allowed']);
    PMA\libraries\Util::cacheSet('dbs_to_test', $GLOBALS['dbs_to_test']);
    PMA\libraries\Util::cacheSet('proc_priv', $GLOBALS['proc_priv']);
    PMA\libraries\Util::cacheSet('table_priv', $GLOBALS['table_priv']);
    PMA\libraries\Util::cacheSet('col_priv', $GLOBALS['col_priv']);
    PMA\libraries\Util::cacheSet('db_priv', $GLOBALS['db_priv']);
}
 /**
  * Test for PMA_checkRequiredPrivilegesForAdjust
  *
  * @return void
  */
 public function testCheckRequiredPrivilegesForAdjust()
 {
     // TEST CASE 1
     $show_grants_full_row = "GRANT ALL PRIVILEGES ON *.* " . "TO 'root'@'localhost' WITH GRANT OPTION";
     list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row);
     // call the to-be-tested function
     PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname);
     $this->assertEquals(true, $GLOBALS['col_priv']);
     $this->assertEquals(true, $GLOBALS['db_priv']);
     $this->assertEquals(true, $GLOBALS['proc_priv']);
     $this->assertEquals(true, $GLOBALS['table_priv']);
     // re-initialise the privileges
     $this->setUp();
     // TEST CASE 2
     $show_grants_full_row = "GRANT ALL PRIVILEGES ON `mysql`.* TO " . "'root'@'localhost' WITH GRANT OPTION";
     list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row);
     // call the to-be-tested function
     PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname);
     $this->assertEquals(true, $GLOBALS['col_priv']);
     $this->assertEquals(true, $GLOBALS['db_priv']);
     $this->assertEquals(true, $GLOBALS['proc_priv']);
     $this->assertEquals(true, $GLOBALS['table_priv']);
     // re-initialise the privileges
     $this->setUp();
     // TEST CASE 3
     $show_grants_full_row = "GRANT SELECT, INSERT, UPDATE, DELETE ON " . "`mysql`.* TO 'root'@'localhost'";
     list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row);
     // call the to-be-tested function
     PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname);
     $this->assertEquals(true, $GLOBALS['col_priv']);
     $this->assertEquals(true, $GLOBALS['db_priv']);
     $this->assertEquals(true, $GLOBALS['proc_priv']);
     $this->assertEquals(true, $GLOBALS['table_priv']);
     // re-initialise the privileges
     $this->setUp();
     // TEST CASE 4
     $show_grants_full_row = "GRANT SELECT, INSERT, UPDATE, DELETE ON " . "`mysql`.`db` TO 'root'@'localhost'";
     list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row);
     // call the to-be-tested function
     PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname);
     $this->assertEquals(false, $GLOBALS['col_priv']);
     $this->assertEquals(true, $GLOBALS['db_priv']);
     $this->assertEquals(false, $GLOBALS['proc_priv']);
     $this->assertEquals(false, $GLOBALS['table_priv']);
 }