/** * sets privilege information extracted from SHOW GRANTS result * * Detection for some CREATE privilege. * * Since MySQL 4.1.2, we can easily detect current user's grants using $userlink * (no control user needed) and we don't have to try any other method for * detection * * @todo fix to get really all privileges, not only explicitly defined for this user * from MySQL manual: (http://dev.mysql.com/doc/refman/5.0/en/show-grants.html) * SHOW GRANTS displays only the privileges granted explicitly to the named * account. Other privileges might be available to the account, but they are not * displayed. For example, if an anonymous account exists, the named account * might be able to use its privileges, but SHOW GRANTS will not display them. * * @return void */ function PMA_analyseShowGrant() { if (PMA\libraries\Util::cacheExists('is_create_db_priv')) { $GLOBALS['is_create_db_priv'] = PMA\libraries\Util::cacheGet('is_create_db_priv'); $GLOBALS['is_reload_priv'] = PMA\libraries\Util::cacheGet('is_reload_priv'); $GLOBALS['db_to_create'] = PMA\libraries\Util::cacheGet('db_to_create'); $GLOBALS['dbs_where_create_table_allowed'] = PMA\libraries\Util::cacheGet('dbs_where_create_table_allowed'); $GLOBALS['dbs_to_test'] = PMA\libraries\Util::cacheGet('dbs_to_test'); $GLOBALS['db_priv'] = PMA\libraries\Util::cacheGet('db_priv'); $GLOBALS['col_priv'] = PMA\libraries\Util::cacheGet('col_priv'); $GLOBALS['table_priv'] = PMA\libraries\Util::cacheGet('table_priv'); $GLOBALS['proc_priv'] = PMA\libraries\Util::cacheGet('proc_priv'); return; } // defaults $GLOBALS['is_create_db_priv'] = false; $GLOBALS['is_reload_priv'] = false; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'] = array(); $GLOBALS['dbs_to_test'] = $GLOBALS['dbi']->getSystemSchemas(); $GLOBALS['proc_priv'] = false; $GLOBALS['db_priv'] = false; $GLOBALS['col_priv'] = false; $GLOBALS['table_priv'] = false; $rs_usr = $GLOBALS['dbi']->tryQuery('SHOW GRANTS'); if (!$rs_usr) { return; } $re0 = '(^|(\\\\\\\\)+|[^\\\\])'; // non-escaped wildcards $re1 = '(^|[^\\\\])(\\\\)+'; // escaped wildcards while ($row = $GLOBALS['dbi']->fetchRow($rs_usr)) { list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($row[0]); if ($show_grants_dbname == '*') { if ($show_grants_str != 'USAGE') { $GLOBALS['dbs_to_test'] = false; } } elseif ($GLOBALS['dbs_to_test'] !== false) { $GLOBALS['dbs_to_test'][] = $show_grants_dbname; } if (mb_strpos($show_grants_str, 'RELOAD') !== false) { $GLOBALS['is_reload_priv'] = true; } // check for the required privileges for adjust PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname); /** * @todo if we find CREATE VIEW but not CREATE, do not offer * the create database dialog box */ if ($show_grants_str == 'ALL' || $show_grants_str == 'ALL PRIVILEGES' || $show_grants_str == 'CREATE' || strpos($show_grants_str, 'CREATE,') !== false) { if ($show_grants_dbname == '*') { // a global CREATE privilege $GLOBALS['is_create_db_priv'] = true; $GLOBALS['is_reload_priv'] = true; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'][] = '*'; // @todo we should not break here, cause GRANT ALL *.* // could be revoked by a later rule like GRANT SELECT ON db.* break; } else { // this array may contain wildcards $GLOBALS['dbs_where_create_table_allowed'][] = $show_grants_dbname; $dbname_to_test = PMA\libraries\Util::backquote($show_grants_dbname); if ($GLOBALS['is_create_db_priv']) { // no need for any more tests if we already know this continue; } // does this db exist? if (preg_match('/' . $re0 . '%|_/', $show_grants_dbname) && !preg_match('/\\\\%|\\\\_/', $show_grants_dbname) || !$GLOBALS['dbi']->tryQuery('USE ' . preg_replace('/' . $re1 . '(%|_)/', '\\1\\3', $dbname_to_test)) && mb_substr($GLOBALS['dbi']->getError(), 1, 4) != 1044) { /** * Do not handle the underscore wildcard * (this case must be rare anyway) */ $GLOBALS['db_to_create'] = preg_replace('/' . $re0 . '%/', '\\1', $show_grants_dbname); $GLOBALS['db_to_create'] = preg_replace('/' . $re1 . '(%|_)/', '\\1\\3', $GLOBALS['db_to_create']); $GLOBALS['is_create_db_priv'] = true; /** * @todo collect $GLOBALS['db_to_create'] into an array, * to display a drop-down in the "Create database" dialog */ // we don't break, we want all possible databases //break; } // end if } // end elseif } // end if } // end while $GLOBALS['dbi']->freeResult($rs_usr); // must also cacheUnset() them in // libraries/plugins/auth/AuthenticationCookie.php PMA\libraries\Util::cacheSet('is_create_db_priv', $GLOBALS['is_create_db_priv']); PMA\libraries\Util::cacheSet('is_reload_priv', $GLOBALS['is_reload_priv']); PMA\libraries\Util::cacheSet('db_to_create', $GLOBALS['db_to_create']); PMA\libraries\Util::cacheSet('dbs_where_create_table_allowed', $GLOBALS['dbs_where_create_table_allowed']); PMA\libraries\Util::cacheSet('dbs_to_test', $GLOBALS['dbs_to_test']); PMA\libraries\Util::cacheSet('proc_priv', $GLOBALS['proc_priv']); PMA\libraries\Util::cacheSet('table_priv', $GLOBALS['table_priv']); PMA\libraries\Util::cacheSet('col_priv', $GLOBALS['col_priv']); PMA\libraries\Util::cacheSet('db_priv', $GLOBALS['db_priv']); }
/** * Test for PMA_checkRequiredPrivilegesForAdjust * * @return void */ public function testCheckRequiredPrivilegesForAdjust() { // TEST CASE 1 $show_grants_full_row = "GRANT ALL PRIVILEGES ON *.* " . "TO 'root'@'localhost' WITH GRANT OPTION"; list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row); // call the to-be-tested function PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname); $this->assertEquals(true, $GLOBALS['col_priv']); $this->assertEquals(true, $GLOBALS['db_priv']); $this->assertEquals(true, $GLOBALS['proc_priv']); $this->assertEquals(true, $GLOBALS['table_priv']); // re-initialise the privileges $this->setUp(); // TEST CASE 2 $show_grants_full_row = "GRANT ALL PRIVILEGES ON `mysql`.* TO " . "'root'@'localhost' WITH GRANT OPTION"; list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row); // call the to-be-tested function PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname); $this->assertEquals(true, $GLOBALS['col_priv']); $this->assertEquals(true, $GLOBALS['db_priv']); $this->assertEquals(true, $GLOBALS['proc_priv']); $this->assertEquals(true, $GLOBALS['table_priv']); // re-initialise the privileges $this->setUp(); // TEST CASE 3 $show_grants_full_row = "GRANT SELECT, INSERT, UPDATE, DELETE ON " . "`mysql`.* TO 'root'@'localhost'"; list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row); // call the to-be-tested function PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname); $this->assertEquals(true, $GLOBALS['col_priv']); $this->assertEquals(true, $GLOBALS['db_priv']); $this->assertEquals(true, $GLOBALS['proc_priv']); $this->assertEquals(true, $GLOBALS['table_priv']); // re-initialise the privileges $this->setUp(); // TEST CASE 4 $show_grants_full_row = "GRANT SELECT, INSERT, UPDATE, DELETE ON " . "`mysql`.`db` TO 'root'@'localhost'"; list($show_grants_str, $show_grants_dbname, $show_grants_tblname) = PMA_getItemsFromShowGrantsRow($show_grants_full_row); // call the to-be-tested function PMA_checkRequiredPrivilegesForAdjust($show_grants_str, $show_grants_dbname, $show_grants_tblname); $this->assertEquals(false, $GLOBALS['col_priv']); $this->assertEquals(true, $GLOBALS['db_priv']); $this->assertEquals(false, $GLOBALS['proc_priv']); $this->assertEquals(false, $GLOBALS['table_priv']); }