Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
M
mariadb
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
mariadb
Commits
d6ec3a43
Commit
d6ec3a43
authored
Jun 24, 2005
by
unknown
Browse files
Options
Browse Files
Download
Plain Diff
Merge sanja.is.com.ua:/home/bell/mysql/bk/mysql-5.0
into sanja.is.com.ua:/home/bell/mysql/bk/work-bug3-5.0
parents
9a03ad15
3d1172a1
Changes
8
Show whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
96 additions
and
18 deletions
+96
-18
mysql-test/r/sp-security.result
mysql-test/r/sp-security.result
+17
-0
mysql-test/r/view.result
mysql-test/r/view.result
+8
-0
mysql-test/t/sp-security.test
mysql-test/t/sp-security.test
+36
-0
mysql-test/t/view.test
mysql-test/t/view.test
+12
-0
sql/item_func.cc
sql/item_func.cc
+14
-14
sql/item_strfunc.h
sql/item_strfunc.h
+1
-1
sql/protocol.cc
sql/protocol.cc
+5
-0
sql/sql_class.h
sql/sql_class.h
+3
-3
No files found.
mysql-test/r/sp-security.result
View file @
d6ec3a43
...
...
@@ -194,3 +194,20 @@ use test;
drop database sptest;
delete from mysql.user where user='usera' or user='userb' or user='userc';
delete from mysql.procs_priv where user='usera' or user='userb' or user='userc';
drop function if exists bug_9503;
create database mysqltest//
use mysqltest//
create table t1 (s1 int)//
grant select on t1 to user1@localhost//
create function bug_9503 () returns int sql security invoker begin declare v int;
select min(s1) into v from t1; return v; end//
use mysqltest;
select bug_9503();
ERROR 42000: execute command denied to user 'user1'@'localhost' for routine 'mysqltest.bug_9503'
grant execute on function bug_9503 to user1@localhost;
do 1;
use test;
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1@localhost;
drop function bug_9503;
use test;
drop database mysqltest;
mysql-test/r/view.result
View file @
d6ec3a43
...
...
@@ -1831,3 +1831,11 @@ select * from v1;
t
01:00
drop view v1;
CREATE VIEW v1 AS SELECT ENCRYPT("dhgdhgd");
SELECT * FROM v1;
drop view v1;
CREATE VIEW v1 AS SELECT SUBSTRING_INDEX("dkjhgd:kjhdjh", ":", 1);
SELECT * FROM v1;
SUBSTRING_INDEX("dkjhgd:kjhdjh", ":", 1)
dkjhgd
drop view v1;
mysql-test/t/sp-security.test
View file @
d6ec3a43
...
...
@@ -304,3 +304,39 @@ drop database sptest;
delete
from
mysql
.
user
where
user
=
'usera'
or
user
=
'userb'
or
user
=
'userc'
;
delete
from
mysql
.
procs_priv
where
user
=
'usera'
or
user
=
'userb'
or
user
=
'userc'
;
#
# BUG#9503: reseting correct parameters of thread after error in SP function
#
connect
(
root
,
localhost
,
root
,,
test
);
connection
root
;
--
disable_warnings
drop
function
if
exists
bug_9503
;
--
enable_warnings
delimiter
//;
create
database
mysqltest
//
use
mysqltest
//
create table t1 (s1 int)//
grant select on t1 to user1@localhost//
create function bug_9503 () returns int sql security invoker begin declare v int
;
select
min
(
s1
)
into
v
from
t1
;
return
v
;
end
//
delimiter
;
//
connect
(
user1
,
localhost
,
user1
,,
test
);
connection
user1
;
use
mysqltest
;
--
error
1370
select
bug_9503
();
connection
root
;
grant
execute
on
function
bug_9503
to
user1
@
localhost
;
connection
user1
;
do
1
;
use
test
;
connection
root
;
REVOKE
ALL
PRIVILEGES
,
GRANT
OPTION
FROM
user1
@
localhost
;
drop
function
bug_9503
;
use
test
;
drop
database
mysqltest
;
mysql-test/t/view.test
View file @
d6ec3a43
...
...
@@ -1673,3 +1673,15 @@ create view v1(k, K) as select 1,2;
create
view
v1
as
SELECT
TIME_FORMAT
(
SEC_TO_TIME
(
3600
),
'%H:%i'
)
as
t
;
select
*
from
v1
;
drop
view
v1
;
#
# using encrypt & substring_index in view (BUG#7024)
#
CREATE
VIEW
v1
AS
SELECT
ENCRYPT
(
"dhgdhgd"
);
disable_result_log
;
SELECT
*
FROM
v1
;
enable_result_log
;
drop
view
v1
;
CREATE
VIEW
v1
AS
SELECT
SUBSTRING_INDEX
(
"dkjhgd:kjhdjh"
,
":"
,
1
);
SELECT
*
FROM
v1
;
drop
view
v1
;
sql/item_func.cc
View file @
d6ec3a43
...
...
@@ -4807,42 +4807,36 @@ Item_func_sp::execute(Item **itp)
DBUG_ENTER
(
"Item_func_sp::execute"
);
THD
*
thd
=
current_thd
;
ulong
old_client_capabilites
;
int
res
;
int
res
=
-
1
;
bool
save_in_sub_stmt
=
thd
->
transaction
.
in_sub_stmt
;
my_bool
nsok
;
#ifndef NO_EMBEDDED_ACCESS_CHECKS
st_sp_security_context
save_ctx
;
#endif
if
(
!
m_sp
)
{
if
(
!
(
m_sp
=
sp_find_function
(
thd
,
m_name
,
TRUE
)))
if
(
!
m_sp
&&
!
(
m_sp
=
sp_find_function
(
thd
,
m_name
,
TRUE
)))
{
my_error
(
ER_SP_DOES_NOT_EXIST
,
MYF
(
0
),
"FUNCTION"
,
m_name
->
m_qname
.
str
);
DBUG_RETURN
(
-
1
);
}
goto
error
;
}
old_client_capabilites
=
thd
->
client_capabilities
;
thd
->
client_capabilities
&=
~
CLIENT_MULTI_RESULTS
;
#ifndef EMBEDDED_LIBRARY
my_bool
nsok
=
thd
->
net
.
no_send_ok
;
nsok
=
thd
->
net
.
no_send_ok
;
thd
->
net
.
no_send_ok
=
TRUE
;
#endif
#ifndef NO_EMBEDDED_ACCESS_CHECKS
if
(
check_routine_access
(
thd
,
EXECUTE_ACL
,
m_sp
->
m_db
.
str
,
m_sp
->
m_name
.
str
,
0
,
0
))
DBUG_RETURN
(
-
1
)
;
goto
error_check
;
sp_change_security_context
(
thd
,
m_sp
,
&
save_ctx
);
if
(
save_ctx
.
changed
&&
check_routine_access
(
thd
,
EXECUTE_ACL
,
m_sp
->
m_db
.
str
,
m_sp
->
m_name
.
str
,
0
,
0
))
{
sp_restore_security_context
(
thd
,
m_sp
,
&
save_ctx
);
thd
->
client_capabilities
|=
old_client_capabilites
&
CLIENT_MULTI_RESULTS
;
DBUG_RETURN
(
-
1
);
}
goto
error_check
;
#endif
/*
Like for SPs, we don't binlog the substatements. If the statement which
...
...
@@ -4850,6 +4844,7 @@ Item_func_sp::execute(Item **itp)
it's not (e.g. SELECT myfunc()) it won't be binlogged (documented known
problem).
*/
tmp_disable_binlog
(
thd
);
/* don't binlog the substatements */
thd
->
transaction
.
in_sub_stmt
=
TRUE
;
...
...
@@ -4864,16 +4859,21 @@ Item_func_sp::execute(Item **itp)
ER_FAILED_ROUTINE_BREAK_BINLOG
,
ER
(
ER_FAILED_ROUTINE_BREAK_BINLOG
));
error_check_ctx:
#ifndef NO_EMBEDDED_ACCESS_CHECKS
sp_restore_security_context
(
thd
,
m_sp
,
&
save_ctx
);
#endif
thd
->
client_capabilities
|=
old_client_capabilites
&
CLIENT_MULTI_RESULTS
;
error_check:
#ifndef EMBEDDED_LIBRARY
thd
->
net
.
no_send_ok
=
nsok
;
#endif
thd
->
client_capabilities
|=
old_client_capabilites
&
CLIENT_MULTI_RESULTS
;
error:
DBUG_RETURN
(
res
);
}
...
...
sql/item_strfunc.h
View file @
d6ec3a43
...
...
@@ -322,7 +322,7 @@ public:
Item_func_encrypt
(
Item
*
a
,
Item
*
b
)
:
Item_str_func
(
a
,
b
)
{}
String
*
val_str
(
String
*
);
void
fix_length_and_dec
()
{
maybe_null
=
1
;
max_length
=
13
;
}
const
char
*
func_name
()
const
{
return
"ecrypt"
;
}
const
char
*
func_name
()
const
{
return
"e
n
crypt"
;
}
};
#include "sql_crypt.h"
...
...
sql/protocol.cc
View file @
d6ec3a43
...
...
@@ -294,7 +294,12 @@ send_ok(THD *thd, ha_rows affected_rows, ulonglong id, const char *message)
DBUG_ENTER
(
"send_ok"
);
if
(
net
->
no_send_ok
||
!
net
->
vio
)
// hack for re-parsing queries
{
DBUG_PRINT
(
"info"
,
(
"no send ok: %s, vio present: %s"
,
(
net
->
no_send_ok
?
"YES"
:
"NO"
),
(
net
->
vio
?
"YES"
:
"NO"
)));
DBUG_VOID_RETURN
;
}
buff
[
0
]
=
0
;
// No fields
pos
=
net_store_length
(
buff
+
1
,(
ulonglong
)
affected_rows
);
...
...
sql/sql_class.h
View file @
d6ec3a43
...
...
@@ -1427,10 +1427,10 @@ public:
};
#define tmp_disable_binlog(A) \
ulong
save_options= (A)->options; \
(A)->options&= ~OPTION_BIN_LOG
;
{ulong tmp_disable_binlog__
save_options= (A)->options; \
(A)->options&= ~OPTION_BIN_LOG
#define reenable_binlog(A)
(A)->options= save_options;
#define reenable_binlog(A)
(A)->options= tmp_disable_binlog__save_options;}
/* Flags for the THD::system_thread (bitmap) variable */
#define SYSTEM_THREAD_DELAYED_INSERT 1
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment