1678 lines
65 KiB
Ruby
1678 lines
65 KiB
Ruby
require_relative 'db_queries'
|
|
require_dependency 'carto/db/database'
|
|
require_dependency 'carto/db/user_schema_mover'
|
|
require 'cartodb/sequel_connection_helper'
|
|
require 'carto/configuration'
|
|
|
|
# To avoid collisions with User model
|
|
module CartoDB
|
|
# To avoid collisions with User class
|
|
module UserModule
|
|
class DBService
|
|
include CartoDB::MiniSequel
|
|
include Carto::Configuration
|
|
extend CartoDB::SequelConnectionHelper
|
|
|
|
# Also default schema for new users
|
|
SCHEMA_PUBLIC = 'public'.freeze
|
|
SCHEMA_CARTODB = 'cartodb'.freeze
|
|
SCHEMA_IMPORTER = 'cdb_importer'.freeze
|
|
SCHEMA_GEOCODING = 'cdb'.freeze
|
|
SCHEMA_CDB_DATASERVICES_API = 'cdb_dataservices_client'.freeze
|
|
SCHEMA_AGGREGATION_TABLES = 'aggregation'.freeze
|
|
CDB_DATASERVICES_CLIENT_VERSION = '0.27.0'.freeze
|
|
ODBC_FDW_VERSION = '0.4.0'.freeze
|
|
|
|
def initialize(user)
|
|
raise "User nil" unless user
|
|
@user = user
|
|
@queries = CartoDB::UserModule::DBQueries.new(@user)
|
|
end
|
|
|
|
def queries
|
|
@queries
|
|
end
|
|
|
|
# This method is used both upon user creation and by the UserMover
|
|
# All methods called inside should allow to be executed multiple times without errors
|
|
def configure_database
|
|
set_database_search_path
|
|
|
|
grant_user_in_database
|
|
|
|
set_statement_timeouts
|
|
|
|
# INFO: Added to everyone because eases migration of normal users to org owners
|
|
# and non-org users just don't use it
|
|
set_user_as_organization_member
|
|
|
|
if @user.database_schema == SCHEMA_PUBLIC
|
|
setup_single_user_schema
|
|
else
|
|
setup_organization_user_schema
|
|
end
|
|
|
|
create_function_invalidate_varnish
|
|
grant_publicuser_in_database
|
|
end
|
|
|
|
# All methods called inside should allow to be executed multiple times without errors
|
|
def setup_single_user_schema
|
|
set_user_privileges_at_db
|
|
rebuild_quota_trigger
|
|
create_ghost_tables_event_trigger
|
|
end
|
|
|
|
# All methods called inside should allow to be executed multiple times without errors
|
|
def setup_organization_user_schema
|
|
# WIP: CartoDB/cartodb-management#4467
|
|
# Avoid mover reseting permissions. It's been moved to callers. Look for "WIP: CartoDB/cartodb-management#4467"
|
|
# reset_user_schema_permissions
|
|
reset_schema_owner
|
|
set_user_privileges_at_db
|
|
set_user_as_organization_member
|
|
rebuild_quota_trigger
|
|
|
|
# INFO: organization privileges are set for org_member_role, which is assigned to each org user
|
|
if @user.organization_owner?
|
|
setup_organization_owner
|
|
create_ghost_tables_event_trigger
|
|
end
|
|
|
|
if @user.organization_admin?
|
|
grant_admin_permissions
|
|
end
|
|
|
|
# Rebuild the geocoder api user config to reflect that is an organization user
|
|
install_and_configure_geocoder_api_extension
|
|
install_odbc_fdw
|
|
end
|
|
|
|
# INFO: main setup for non-org users
|
|
def new_non_organization_user_main_db_setup
|
|
Thread.new do
|
|
create_db_user
|
|
create_user_db
|
|
grant_owner_in_database
|
|
end.join
|
|
create_importer_schema
|
|
create_geocoding_schema
|
|
load_cartodb_functions
|
|
install_and_configure_geocoder_api_extension
|
|
install_odbc_fdw
|
|
# We reset the connections to this database to be sure the change in default search_path is effective
|
|
reset_pooled_connections
|
|
|
|
reset_database_permissions # Reset privileges
|
|
|
|
# WIP: CartoDB/cartodb-management#4467
|
|
# Added after commenting it in setup_organization_user_schema to avoid configure_database to reset permissions
|
|
reset_user_schema_permissions
|
|
|
|
configure_database
|
|
|
|
revoke_cdb_conf_access
|
|
end
|
|
|
|
# INFO: main setup for org users
|
|
def new_organization_user_main_db_setup
|
|
Thread.new do
|
|
create_db_user
|
|
end.join
|
|
create_own_schema
|
|
|
|
# WIP: CartoDB/cartodb-management#4467
|
|
# Added after commenting it in setup_organization_user_schema to avoid configure_database to reset permissions
|
|
reset_user_schema_permissions
|
|
|
|
setup_organization_user_schema
|
|
install_and_configure_geocoder_api_extension
|
|
# We reset the connections to this database to be sure the change in default search_path is effective
|
|
reset_pooled_connections
|
|
revoke_cdb_conf_access
|
|
end
|
|
|
|
def set_user_privileges_at_db # MU
|
|
# INFO: organization permission on public schema is handled through role assignment
|
|
unless @user.organization_user?
|
|
set_user_privileges_in_cartodb_schema
|
|
set_user_privileges_in_public_schema
|
|
end
|
|
|
|
set_user_privileges_in_own_schema
|
|
set_privileges_to_publicuser_in_own_schema
|
|
|
|
unless @user.organization_user?
|
|
set_user_privileges_in_importer_schema
|
|
set_user_privileges_in_geocoding_schema
|
|
set_geo_columns_privileges
|
|
set_raster_privileges
|
|
end
|
|
end
|
|
|
|
def disable_writes
|
|
# NOTE: This will not affect already opened connections. Run `terminate_database_conections` method after this
|
|
# to ensure no more writes are possible.
|
|
@user.in_database(as: :cluster_admin) do |database|
|
|
database.run(%{
|
|
ALTER DATABASE "#{@user.database_name}"
|
|
SET default_transaction_read_only = 'on'
|
|
})
|
|
end
|
|
end
|
|
|
|
def enable_writes
|
|
# NOTE: This will not affect already opened connections. Run `terminate_database_conections` method after this
|
|
# to ensure no more writes are possible.
|
|
@user.in_database(as: :cluster_admin) do |database|
|
|
database.run(%{
|
|
ALTER DATABASE "#{@user.database_name}"
|
|
SET default_transaction_read_only = default
|
|
})
|
|
end
|
|
end
|
|
|
|
def writes_enabled?
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.fetch(%{SHOW default_transaction_read_only}).first[:default_transaction_read_only] == 'off'
|
|
end
|
|
end
|
|
|
|
# Cartodb functions
|
|
def load_cartodb_functions(statement_timeout = nil, cdb_extension_target_version = nil)
|
|
add_python
|
|
|
|
# Install dependencies of cartodb extension
|
|
@user.in_database(as: :superuser, no_cartodb_in_schema: true) do |db|
|
|
db.transaction do
|
|
unless statement_timeout.nil?
|
|
old_timeout = db.fetch("SHOW statement_timeout;").first[:statement_timeout]
|
|
db.run("SET statement_timeout TO '#{statement_timeout}';")
|
|
end
|
|
|
|
db.run('CREATE EXTENSION plpythonu FROM unpackaged') unless db.fetch(%{
|
|
SELECT count(*) FROM pg_extension WHERE extname='plpythonu'
|
|
}).first[:count] > 0
|
|
db.run('CREATE EXTENSION postgis FROM unpackaged') unless db.fetch(%{
|
|
SELECT count(*) FROM pg_extension WHERE extname='postgis'
|
|
}).first[:count] > 0
|
|
|
|
unless statement_timeout.nil?
|
|
db.run("SET statement_timeout TO '#{old_timeout}';")
|
|
end
|
|
end
|
|
end
|
|
|
|
upgrade_cartodb_postgres_extension(statement_timeout, cdb_extension_target_version)
|
|
|
|
rebuild_quota_trigger
|
|
end
|
|
|
|
def rebuild_quota_trigger
|
|
@user.in_database(as: :superuser) do |db|
|
|
rebuild_quota_trigger_with_database(db)
|
|
end
|
|
end
|
|
|
|
def rebuild_quota_trigger_with_database(db)
|
|
if !cartodb_extension_version_pre_mu? && @user.has_organization?
|
|
db.run("DROP FUNCTION IF EXISTS public._CDB_UserQuotaInBytes();")
|
|
end
|
|
|
|
db.transaction do
|
|
# NOTE: this has been written to work for both databases that switched to "cartodb" extension
|
|
# and those before the switch.
|
|
# In the future we should guarantee that exntension lives in cartodb schema so we don't need to set
|
|
# a search_path before
|
|
search_path = db.fetch("SHOW search_path;").first[:search_path]
|
|
db.run("SET search_path TO #{SCHEMA_CARTODB}, #{SCHEMA_PUBLIC};")
|
|
if cartodb_extension_version_pre_mu?
|
|
db.run("SELECT CDB_SetUserQuotaInBytes(#{@user.quota_in_bytes});")
|
|
else
|
|
db.run("SELECT CDB_SetUserQuotaInBytes('#{@user.database_schema}', #{@user.quota_in_bytes});")
|
|
end
|
|
|
|
# _CDB_UserQuotaInBytes is called by the quota trigger, and need to be open so
|
|
# other users in the organization can run it (when updating shared datasets)
|
|
db_user = @user.organization_user? ? organization_member_group_role_member_name : @user.database_username
|
|
db.run(%{REVOKE ALL ON FUNCTION "#{@user.database_schema}"._CDB_UserQuotaInBytes() FROM PUBLIC;})
|
|
db.run(%{GRANT ALL ON FUNCTION "#{@user.database_schema}"._CDB_UserQuotaInBytes() TO "#{db_user}";})
|
|
|
|
db.run("SET search_path TO #{search_path};")
|
|
end
|
|
end
|
|
|
|
def build_search_path(user_schema = nil, quote_user_schema = true)
|
|
user_schema ||= @user.database_schema
|
|
DBService.build_search_path(user_schema, quote_user_schema)
|
|
end
|
|
|
|
# Centralized method to provide the (ordered) search_path
|
|
def self.build_search_path(user_schema, quote_user_schema = true)
|
|
quote_char = quote_user_schema ? "\"" : ""
|
|
"#{quote_char}#{user_schema}#{quote_char}, #{SCHEMA_CARTODB}, #{SCHEMA_CDB_DATASERVICES_API}, #{SCHEMA_PUBLIC}"
|
|
end
|
|
|
|
def set_database_search_path
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.run(%{
|
|
ALTER USER "#{@user.database_username}"
|
|
SET search_path = #{build_search_path}
|
|
})
|
|
end
|
|
end
|
|
|
|
def create_importer_schema
|
|
create_schema('cdb_importer')
|
|
end
|
|
|
|
def create_geocoding_schema
|
|
create_schema('cdb')
|
|
end
|
|
|
|
def create_user_schema
|
|
create_schema(@user.database_schema, @user.database_username)
|
|
end
|
|
|
|
def create_schema(schema, role = nil)
|
|
@user.in_database(as: :superuser) do |db|
|
|
Carto::Db::Database.new(@user.database_name, db).create_schema(schema, role)
|
|
end
|
|
end
|
|
|
|
def grant_admin_permissions
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.run(%{ SELECT cartodb.CDB_Organization_AddAdmin('#{@user.username}') })
|
|
end
|
|
end
|
|
|
|
def revoke_admin_permissions
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.run(%{ SELECT cartodb.CDB_Organization_RemoveAdmin('#{@user.username}') })
|
|
end
|
|
end
|
|
|
|
def revoke_cdb_conf_access
|
|
errors = []
|
|
|
|
roles = [@user.database_username]
|
|
if @user.organization_owner?
|
|
begin
|
|
roles << organization_member_group_role_member_name
|
|
rescue => e
|
|
errors << "WARN: Error fetching org member role (does #{@user.organization.name} has that role?)"
|
|
end
|
|
end
|
|
roles << CartoDB::PUBLIC_DB_USER
|
|
|
|
queries = []
|
|
roles.map do |db_role|
|
|
queries.concat(@queries.revoke_permissions_on_cartodb_conf_queries(db_role))
|
|
end
|
|
|
|
queries.map do |query|
|
|
@user.in_database(as: :superuser) do |database|
|
|
begin
|
|
database.run(query)
|
|
rescue => e
|
|
# We can find organizations not yet upgraded for any reason or missing roles
|
|
errors << e.message
|
|
end
|
|
end
|
|
end
|
|
|
|
errors
|
|
rescue => e
|
|
# For broken organizations
|
|
["FATAL ERROR for #{name}: #{e.message}"]
|
|
end
|
|
|
|
def create_public_db_user
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.run(%{ CREATE USER "#{@user.database_public_username}" LOGIN INHERIT })
|
|
database.run(%{ GRANT publicuser TO "#{@user.database_public_username}" })
|
|
database.run(%{ ALTER USER "#{@user.database_public_username}" SET search_path = #{build_search_path} })
|
|
end
|
|
end
|
|
|
|
def tables_effective(schema = 'public')
|
|
@user.in_database do |user_database|
|
|
user_database.synchronize do |conn|
|
|
query = "select table_name::text from information_schema.tables where table_schema = '#{schema}'"
|
|
tables = user_database[query].all.map { |i| i[:table_name] }
|
|
return tables
|
|
end
|
|
end
|
|
end
|
|
|
|
def all_user_roles
|
|
roles = [@user.database_username]
|
|
if @user.organization_user?
|
|
roles << organization_member_group_role_member_name
|
|
roles += @user.groups.map(&:database_role)
|
|
end
|
|
|
|
roles
|
|
end
|
|
|
|
def all_tables_granted(role = nil)
|
|
roles_str = role ? "'#{role}'" : all_user_roles.map { |r| "'#{r}'" }.join(',')
|
|
query = %{
|
|
SELECT
|
|
s.nspname as schema,
|
|
c.relname as t,
|
|
string_agg(lower(acl.privilege_type), ',') as permission
|
|
FROM
|
|
pg_class c
|
|
JOIN pg_namespace s ON c.relnamespace = s.oid
|
|
JOIN LATERAL aclexplode(COALESCE(c.relacl, acldefault('r'::"char", c.relowner))) acl ON TRUE
|
|
JOIN pg_roles r ON acl.grantee = r.oid
|
|
WHERE
|
|
r.rolname IN (#{roles_str}) AND
|
|
s.nspname NOT IN ('cartodb', 'cdb', 'cdb_importer')
|
|
GROUP BY schema, t;
|
|
}
|
|
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.fetch(query)
|
|
end
|
|
end
|
|
|
|
def all_tables_granted_hashed(role = nil)
|
|
results = all_tables_granted(role)
|
|
privileges_hashed = {}
|
|
|
|
if !results.nil?
|
|
results.each do |row|
|
|
privileges_hashed[row[:schema]] = {} if privileges_hashed[row[:schema]].nil?
|
|
privileges_hashed[row[:schema]][row[:t]] = row[:permission].split(',')
|
|
end
|
|
end
|
|
|
|
privileges_hashed
|
|
end
|
|
|
|
def all_schemas_granted(role)
|
|
roles_str = role ? role : all_user_roles.join(',')
|
|
permissions = 'create,usage'
|
|
query = %{
|
|
WITH
|
|
roles AS (
|
|
SELECT unnest('{#{roles_str}}'::text[]) AS rname
|
|
),
|
|
permissions AS (
|
|
SELECT 'SCHEMA' AS ptype, unnest('{#{permissions}}'::text[]) AS pname
|
|
),
|
|
schemas AS (
|
|
SELECT schema_name AS sname
|
|
FROM information_schema.schemata
|
|
WHERE schema_name !~ '^pg_'
|
|
AND schema_name NOT IN ('cartodb', 'cdb', 'cdb_importer')
|
|
),
|
|
schemas_roles_permissions AS (
|
|
SELECT
|
|
permissions.ptype,
|
|
schemas.sname AS obj_name,
|
|
roles.rname,
|
|
permissions.pname,
|
|
has_schema_privilege(roles.rname, schemas.sname, permissions.pname) AS has_permission
|
|
FROM
|
|
schemas
|
|
CROSS JOIN roles
|
|
CROSS JOIN permissions
|
|
WHERE
|
|
permissions.ptype = 'SCHEMA'
|
|
),
|
|
schemas_and_grants AS (
|
|
SELECT obj_name AS object_name,
|
|
COALESCE(string_agg(DISTINCT CASE WHEN has_permission THEN pname END, ','), '') AS granted_permissions
|
|
FROM schemas_roles_permissions
|
|
GROUP BY 1
|
|
ORDER BY 1
|
|
)
|
|
SELECT
|
|
object_name, granted_permissions
|
|
FROM
|
|
schemas_and_grants
|
|
WHERE
|
|
granted_permissions is not null and granted_permissions <> '';
|
|
}
|
|
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.fetch(query)
|
|
end
|
|
end
|
|
|
|
def all_schemas_granted_hashed(role = nil)
|
|
results = all_schemas_granted(role)
|
|
return {} if results.nil?
|
|
|
|
results.map { |row| [row[:object_name], row[:granted_permissions].split(',')] }.to_h
|
|
end
|
|
|
|
def exists_role?(rolname)
|
|
query = %{
|
|
SELECT 1
|
|
FROM pg_catalog.pg_roles
|
|
WHERE rolname = '#{rolname}'
|
|
}
|
|
|
|
result = @user.in_database(as: :superuser).fetch(query)
|
|
result.count > 0
|
|
end
|
|
|
|
def drop_owned_by_user(conn, role)
|
|
conn.run("DROP OWNED BY \"#{role}\"")
|
|
end
|
|
|
|
def drop_user(conn = nil, username = nil)
|
|
conn ||= @user.in_database(as: :cluster_admin)
|
|
username ||= @user.database_username
|
|
database_with_conflicts = nil
|
|
retried = false
|
|
|
|
begin
|
|
conn.run("DROP USER IF EXISTS \"#{username}\"")
|
|
rescue => e
|
|
if !retried && e.message =~ /cannot be dropped because some objects depend on it/
|
|
retried = true
|
|
e.message =~ /object[s]? in database (.*)$/
|
|
e.message =~ /privileges for database (.*)$/ unless $1
|
|
if database_with_conflicts == $1
|
|
raise e
|
|
else
|
|
database_with_conflicts = $1
|
|
revoke_all_on_database_from(conn, database_with_conflicts, username)
|
|
revoke_all_memberships_on_database_to_role(conn, username)
|
|
drop_owned_by_user(conn, username)
|
|
|
|
conflict_database_conn = @user.in_database(
|
|
as: :cluster_admin,
|
|
'database' => database_with_conflicts
|
|
)
|
|
drop_owned_by_user(conflict_database_conn, username)
|
|
['cdb', 'cdb_importer', 'cartodb', 'public', @user.database_schema].each do |s|
|
|
drop_users_privileges_in_schema(s, [username], conn: conflict_database_conn)
|
|
end
|
|
DBService.close_sequel_connection(conflict_database_conn)
|
|
retry
|
|
end
|
|
else
|
|
raise e
|
|
end
|
|
end
|
|
end
|
|
|
|
# Org users share the same db, so must only delete the schema unless he's the owner
|
|
def drop_organization_user(org_id, is_owner: false, force_destroy: false)
|
|
raise CartoDB::BaseCartoDBError.new('Tried to delete an organization user without org id') if org_id.nil?
|
|
Thread.new do
|
|
@user.in_database(as: :superuser) do |database|
|
|
if is_owner
|
|
schemas = ['cdb', 'cdb_importer', 'cartodb', 'public', @user.database_schema] +
|
|
::User.select(:database_schema).where(organization_id: org_id).all.collect(&:database_schema)
|
|
schemas.uniq.each do |s|
|
|
drop_users_privileges_in_schema(
|
|
s,
|
|
[@user.database_username, @user.database_public_username, CartoDB::PUBLIC_DB_USER])
|
|
end
|
|
|
|
# To avoid "cannot drop function" errors
|
|
database.run("drop extension if exists plproxy cascade")
|
|
end
|
|
|
|
# If user is in an organization should never have public schema, but to be safe (& tests which stub stuff)
|
|
unless @user.database_schema == SCHEMA_PUBLIC
|
|
database.run(%{ DROP FUNCTION IF EXISTS "#{@user.database_schema}"._CDB_UserQuotaInBytes()})
|
|
drop_analysis_cache(@user)
|
|
drop_all_functions_from_schema(@user.database_schema)
|
|
|
|
cascade_drop = force_destroy ? 'CASCADE' : ''
|
|
database.run(%{ DROP SCHEMA IF EXISTS "#{@user.database_schema}" #{cascade_drop}})
|
|
end
|
|
end
|
|
|
|
conn = @user.in_database(as: :cluster_admin)
|
|
CartoDB::UserModule::DBService.terminate_database_connections(@user.database_name, @user.database_host)
|
|
|
|
# If user is in an organization should never have public schema, but to be safe (& tests which stub stuff)
|
|
unless @user.database_schema == SCHEMA_PUBLIC
|
|
drop_user(conn, @user.database_public_username)
|
|
end
|
|
|
|
if is_owner
|
|
conn.run("DROP DATABASE \"#{@user.database_name}\"")
|
|
end
|
|
drop_user(conn)
|
|
end.join
|
|
|
|
monitor_user_notification
|
|
end
|
|
|
|
def configure_extension_org_metadata_api_endpoint
|
|
config = Cartodb.config[:org_metadata_api]
|
|
host = config['host']
|
|
port = config['port']
|
|
username = config['username']
|
|
password = config['password']
|
|
timeout = config.fetch('timeout', 10)
|
|
|
|
if host.present? && port.present? && username.present? && password.present?
|
|
conf_sql = %{
|
|
SELECT cartodb.CDB_Conf_SetConf('groups_api',
|
|
'{ \"host\": \"#{host}\", \"port\": #{port}, \"timeout\": #{timeout}, \"username\": \"#{username}\",
|
|
\"password\": \"#{password}\"}'::json
|
|
)
|
|
}
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.fetch(conf_sql).first
|
|
end
|
|
else
|
|
CartoDB.notify_debug("org_metadata_api configuration missing", user_id: @user.id, config: config)
|
|
end
|
|
end
|
|
|
|
def install_and_configure_geocoder_api_extension
|
|
geocoder_api_config = Cartodb.get_config(:geocoder, 'api')
|
|
# If there's no config we assume there's no need to install the
|
|
# geocoder client as it is an independent API
|
|
return if geocoder_api_config.blank?
|
|
install_geocoder_api_extension
|
|
@user.in_database(as: :superuser) do |db|
|
|
db.transaction do
|
|
db.run(build_geocoder_server_config_sql(geocoder_api_config))
|
|
db.run(build_entity_config_sql)
|
|
db.run("ALTER USER \"#{@user.database_username}\" SET search_path TO #{build_search_path}")
|
|
db.run("ALTER USER \"#{@user.database_public_username}\" SET search_path TO #{build_search_path}")
|
|
end
|
|
end
|
|
return true
|
|
rescue => e
|
|
CartoDB.notify_error(
|
|
'Error installing and configuring geocoder api extension',
|
|
error: e.inspect, user: @user
|
|
)
|
|
return false
|
|
end
|
|
|
|
def install_geocoder_api_extension
|
|
@user.in_database(as: :superuser) do |db|
|
|
db.transaction do
|
|
db.run('CREATE EXTENSION IF NOT EXISTS plproxy SCHEMA public')
|
|
db.run("CREATE EXTENSION IF NOT EXISTS cdb_dataservices_client VERSION '#{CDB_DATASERVICES_CLIENT_VERSION}'")
|
|
db.run("ALTER EXTENSION cdb_dataservices_client UPDATE TO '#{CDB_DATASERVICES_CLIENT_VERSION}'")
|
|
end
|
|
end
|
|
end
|
|
|
|
def install_odbc_fdw
|
|
@user.in_database(as: :superuser) do |db|
|
|
db.transaction do
|
|
db.run('CREATE EXTENSION IF NOT EXISTS odbc_fdw SCHEMA public')
|
|
db.run("ALTER EXTENSION odbc_fdw UPDATE TO '#{ODBC_FDW_VERSION}'")
|
|
end
|
|
end
|
|
rescue Sequel::DatabaseError
|
|
# For the time being we'll be resilient to the odbc_fdw not being available
|
|
# and just proceed without installing it.
|
|
end
|
|
|
|
def setup_organization_owner
|
|
setup_organization_role_permissions
|
|
configure_extension_org_metadata_api_endpoint
|
|
end
|
|
|
|
# Use a direct connection to the db through the direct port specified
|
|
# in the database configuration and set up its statement timeout value. This
|
|
# allows to overpass the statement_timeout limit if a connection pooler is used.
|
|
# This method is supposed to receive a block that will be run with the created
|
|
# connection.
|
|
def in_database_direct_connection(statement_timeout:)
|
|
raise 'need block' unless block_given?
|
|
|
|
configuration = db_configuration_for
|
|
configuration[:port] = configuration.fetch(:direct_port, configuration["direct_port"]) || configuration[:port] || configuration["port"]
|
|
|
|
# Temporary trace to be removed once https://github.com/CartoDB/cartodb/issues/7047 is solved
|
|
CartoDB::Logger.warning(message: 'Direct connection not used from queue') unless Socket.gethostname =~ /^que/
|
|
|
|
connection = @user.get_connection(_opts = {}, configuration)
|
|
|
|
begin
|
|
connection.run("SET statement_timeout TO #{statement_timeout}")
|
|
yield(connection)
|
|
ensure
|
|
connection.run("SET statement_timeout TO DEFAULT")
|
|
end
|
|
end
|
|
|
|
def reset_pooled_connections
|
|
# Only close connections to this users' database
|
|
$pool.close_connections!(@user.database_name)
|
|
end
|
|
|
|
# Upgrade the cartodb postgresql extension
|
|
def upgrade_cartodb_postgres_extension(statement_timeout = nil, cdb_extension_target_version = nil)
|
|
if cdb_extension_target_version.nil?
|
|
cdb_extension_target_version = '0.31.0'
|
|
end
|
|
|
|
@user.in_database(as: :superuser, no_cartodb_in_schema: true) do |db|
|
|
db.transaction do
|
|
unless statement_timeout.nil?
|
|
old_timeout = db.fetch("SHOW statement_timeout;").first[:statement_timeout]
|
|
db.run("SET statement_timeout TO '#{statement_timeout}';")
|
|
end
|
|
|
|
db.run(%{
|
|
DO LANGUAGE 'plpgsql' $$
|
|
DECLARE
|
|
ver TEXT;
|
|
BEGIN
|
|
BEGIN
|
|
SELECT cartodb.cdb_version() INTO ver;
|
|
EXCEPTION WHEN undefined_function OR invalid_schema_name THEN
|
|
RAISE NOTICE 'Got % (%)', SQLERRM, SQLSTATE;
|
|
BEGIN
|
|
CREATE EXTENSION cartodb VERSION '#{cdb_extension_target_version}' FROM unpackaged;
|
|
EXCEPTION WHEN undefined_table THEN
|
|
RAISE NOTICE 'Got % (%)', SQLERRM, SQLSTATE;
|
|
CREATE EXTENSION cartodb VERSION '#{cdb_extension_target_version}';
|
|
RETURN;
|
|
END;
|
|
RETURN;
|
|
END;
|
|
ver := '#{cdb_extension_target_version}';
|
|
IF position('dev' in ver) > 0 THEN
|
|
EXECUTE 'ALTER EXTENSION cartodb UPDATE TO ''' || ver || 'next''';
|
|
EXECUTE 'ALTER EXTENSION cartodb UPDATE TO ''' || ver || '''';
|
|
ELSE
|
|
EXECUTE 'ALTER EXTENSION cartodb UPDATE TO ''' || ver || '''';
|
|
END IF;
|
|
END;
|
|
$$;
|
|
})
|
|
|
|
unless statement_timeout.nil?
|
|
db.run("SET statement_timeout TO '#{old_timeout}';")
|
|
end
|
|
|
|
obtained = db.fetch('SELECT cartodb.cdb_version() as v').first[:v]
|
|
|
|
unless cartodb_extension_semver(cdb_extension_target_version) == cartodb_extension_semver(obtained)
|
|
raise("Expected cartodb extension '#{cdb_extension_target_version}' obtained '#{obtained}'")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
def cartodb_extension_version_pre_mu?
|
|
current_version = cartodb_extension_semver(cartodb_extension_version)
|
|
if current_version.size == 3
|
|
major, minor, = current_version
|
|
major == 0 && minor < 3
|
|
else
|
|
raise 'Current cartodb extension version does not match standard x.y.z format'
|
|
end
|
|
end
|
|
|
|
# Returns a tree elements array with [major, minor, patch] as in http://semver.org/
|
|
def cartodb_extension_semver(extension_version)
|
|
extension_version.split('.').take(3).map(&:to_i)
|
|
end
|
|
|
|
def cartodb_extension_version
|
|
@cartodb_extension_version ||= @user.in_database(as: :superuser)
|
|
.fetch('SELECT cartodb.cdb_version() AS v').first[:v]
|
|
end
|
|
|
|
def reset_user_schema_permissions
|
|
@user.in_database(as: :superuser) do |user_database|
|
|
user_database.transaction do
|
|
schemas = [@user.database_schema].uniq
|
|
schemas.each do |schema|
|
|
revoke_privileges(user_database, schema, 'PUBLIC')
|
|
end
|
|
yield(user_database) if block_given?
|
|
end
|
|
end
|
|
end
|
|
|
|
def reset_database_permissions
|
|
@user.in_database(as: :superuser) do |user_database|
|
|
user_database.transaction do
|
|
schemas = %w(public cdb_importer cdb cartodb)
|
|
['PUBLIC', CartoDB::PUBLIC_DB_USER].each do |user|
|
|
revoke_all_on_database_from(user_database, @user.database_name, user)
|
|
schemas.each do |schema|
|
|
revoke_privileges(user_database, schema, user)
|
|
end
|
|
end
|
|
yield(user_database) if block_given?
|
|
end
|
|
end
|
|
end
|
|
|
|
def set_statement_timeouts
|
|
@user.in_database(as: :superuser) do |user_database|
|
|
user_database["ALTER ROLE \"?\" SET statement_timeout to ?", Sequel.lit(@user.database_username),
|
|
@user.user_timeout].all
|
|
user_database["ALTER DATABASE \"?\" SET statement_timeout to ?", Sequel.lit(@user.database_name),
|
|
@user.database_timeout].all
|
|
end
|
|
@user.in_database.disconnect
|
|
@user.in_database.connect(db_configuration_for)
|
|
@user.in_database(as: :public_user).disconnect
|
|
@user.in_database(as: :public_user).connect(db_configuration_for(:public_user))
|
|
rescue Sequel::DatabaseConnectionError
|
|
end
|
|
|
|
def set_user_as_organization_member
|
|
@user.in_database(as: :superuser) do |user_database|
|
|
user_database.transaction do
|
|
user_database.run("SELECT cartodb.CDB_Organization_Create_Member('#{@user.database_username}');")
|
|
end
|
|
end
|
|
end
|
|
|
|
def reset_schema_owner
|
|
@user.in_database(as: :superuser) do |database|
|
|
database.run(%{ ALTER SCHEMA "#{@user.database_schema}" OWNER TO "#{@user.database_username}" })
|
|
end
|
|
end
|
|
|
|
def grant_user_in_database
|
|
@queries.run_in_transaction(
|
|
@queries.grant_connect_on_database_queries,
|
|
true
|
|
)
|
|
end
|
|
|
|
def grant_publicuser_in_database
|
|
@queries.run_in_transaction(
|
|
@queries.grant_connect_on_database_queries(CartoDB::PUBLIC_DB_USER),
|
|
true
|
|
)
|
|
@queries.run_in_transaction(
|
|
@queries.grant_read_on_schema_queries(SCHEMA_CARTODB, CartoDB::PUBLIC_DB_USER),
|
|
true
|
|
)
|
|
@queries.run_in_transaction(
|
|
[
|
|
"REVOKE SELECT ON cartodb.cdb_tablemetadata FROM #{CartoDB::PUBLIC_DB_USER} CASCADE",
|
|
"REVOKE SELECT ON cartodb.cdb_analysis_catalog FROM #{CartoDB::PUBLIC_DB_USER} CASCADE"
|
|
],
|
|
true
|
|
)
|
|
@queries.run_in_transaction(
|
|
[
|
|
"GRANT USAGE ON SCHEMA #{SCHEMA_PUBLIC} TO #{CartoDB::PUBLIC_DB_USER}",
|
|
"GRANT EXECUTE ON ALL FUNCTIONS IN SCHEMA #{SCHEMA_PUBLIC} TO #{CartoDB::PUBLIC_DB_USER}",
|
|
"GRANT SELECT ON spatial_ref_sys TO #{CartoDB::PUBLIC_DB_USER}"
|
|
],
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_user_privileges_in_own_schema # MU
|
|
@queries.run_in_transaction(
|
|
@queries.grant_all_on_user_schema_queries,
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_user_privileges_in_cartodb_schema(db_user = nil)
|
|
@queries.run_in_transaction(
|
|
(
|
|
@queries.grant_read_on_schema_queries(SCHEMA_CARTODB, db_user) +
|
|
@queries.grant_write_on_cdb_tablemetadata_queries(db_user) +
|
|
@queries.grant_write_on_cdb_analysis_catalog_queries(db_user)
|
|
),
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_privileges_to_publicuser_in_own_schema # MU
|
|
# Privileges in user schema for publicuser
|
|
@queries.run_in_transaction(
|
|
@queries.grant_usage_on_user_schema_to_other(CartoDB::PUBLIC_DB_USER),
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_user_privileges_in_public_schema(db_user = nil)
|
|
@queries.run_in_transaction(
|
|
@queries.grant_read_on_schema_queries(SCHEMA_PUBLIC, db_user),
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_user_privileges_in_importer_schema(db_user = nil) # MU
|
|
@queries.run_in_transaction(
|
|
@queries.grant_all_on_schema_queries(SCHEMA_IMPORTER, db_user),
|
|
true
|
|
)
|
|
end
|
|
|
|
def revoke_all_on_database_from(conn, database, role)
|
|
conn.run("REVOKE ALL ON DATABASE \"#{database}\" FROM \"#{role}\" CASCADE") if role_exists?(conn, role)
|
|
end
|
|
|
|
def grant_owner_in_database
|
|
@queries.run_in_transaction(
|
|
@queries.grant_all_on_database_queries,
|
|
true
|
|
)
|
|
end
|
|
|
|
def fix_table_permissions
|
|
tables_queries = []
|
|
@user.tables.each do |table|
|
|
Carto::TableAndFriends.apply(@user.in_database, @user.database_schema, table.name) do |schema, table_name|
|
|
if table.public? || table.public_with_link_only?
|
|
tables_queries << %{
|
|
GRANT SELECT ON \"#{schema}\".\"#{table_name}\" TO #{CartoDB::PUBLIC_DB_USER} }
|
|
end
|
|
tables_queries << %{
|
|
ALTER TABLE \"#{schema}\".\"#{table_name}\" OWNER TO \"#{@user.database_username}\" }
|
|
end
|
|
end
|
|
@queries.run_in_transaction(
|
|
tables_queries,
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_user_privileges_in_geocoding_schema(db_user = nil)
|
|
@queries.run_in_transaction(
|
|
@queries.grant_all_on_schema_queries(SCHEMA_GEOCODING, db_user),
|
|
true
|
|
)
|
|
end
|
|
|
|
def set_geo_columns_privileges(role_name = nil)
|
|
# Postgis lives at public schema, as do geometry_columns and geography_columns
|
|
catalogs_schema = SCHEMA_PUBLIC
|
|
target_user = role_name.nil? ? @user.database_public_username : role_name
|
|
queries = [
|
|
%{ GRANT SELECT ON "#{catalogs_schema}"."geometry_columns" TO "#{target_user}" },
|
|
%{ GRANT SELECT ON "#{catalogs_schema}"."geography_columns" TO "#{target_user}" }
|
|
]
|
|
@queries.run_in_transaction(queries, true)
|
|
end
|
|
|
|
def set_raster_privileges(role_name = nil)
|
|
# Postgis lives at public schema, so raster catalogs too
|
|
catalogs_schema = SCHEMA_PUBLIC
|
|
queries = [
|
|
"GRANT SELECT ON TABLE \"#{catalogs_schema}\".\"raster_overviews\" TO \"#{CartoDB::PUBLIC_DB_USER}\"",
|
|
"GRANT SELECT ON TABLE \"#{catalogs_schema}\".\"raster_columns\" TO \"#{CartoDB::PUBLIC_DB_USER}\""
|
|
]
|
|
target_user = role_name.nil? ? @user.database_public_username : role_name
|
|
unless @user.organization.nil?
|
|
queries << "GRANT SELECT ON TABLE \"#{catalogs_schema}\".\"raster_overviews\" TO \"#{target_user}\""
|
|
queries << "GRANT SELECT ON TABLE \"#{catalogs_schema}\".\"raster_columns\" TO \"#{target_user}\""
|
|
end
|
|
@queries.run_in_transaction(queries, true)
|
|
end
|
|
|
|
def setup_organization_role_permissions
|
|
org_member_role = organization_member_group_role_member_name
|
|
set_user_privileges_in_public_schema(org_member_role)
|
|
@queries.run_in_transaction(
|
|
@queries.grant_connect_on_database_queries(org_member_role), true
|
|
)
|
|
set_geo_columns_privileges(org_member_role)
|
|
set_raster_privileges(org_member_role)
|
|
set_user_privileges_in_cartodb_schema(org_member_role)
|
|
set_user_privileges_in_importer_schema(org_member_role)
|
|
set_user_privileges_in_geocoding_schema(org_member_role)
|
|
end
|
|
|
|
def schema_exists?(schema, database = @user.in_database)
|
|
query = "SELECT 1 as schema_exist FROM information_schema.schemata WHERE schema_name = '#{schema}'"
|
|
!database.fetch(query).first.nil?
|
|
end
|
|
|
|
def drop_users_privileges_in_schema(schema, accounts, conn: nil)
|
|
user_database = conn || @user.in_database(as: :superuser, statement_timeout: 600000)
|
|
return unless schema_exists?(schema, user_database)
|
|
|
|
user_database.transaction do
|
|
accounts
|
|
.select { |role| role_exists?(user_database, role) }
|
|
.each { |role| revoke_privileges(user_database, schema, "\"#{role}\"") }
|
|
end
|
|
end
|
|
|
|
def revoke_all_memberships_on_database_to_role(conn, role)
|
|
conn.fetch(%{
|
|
select rolname from pg_user join pg_auth_members on (pg_user.usesysid=pg_auth_members.member)
|
|
join pg_roles on (pg_roles.oid=pg_auth_members.roleid) where pg_user.usename='#{role}'
|
|
}).each do |rolname|
|
|
conn.run("REVOKE \"#{rolname[:rolname]}\" FROM \"#{role}\" CASCADE")
|
|
end
|
|
end
|
|
|
|
def drop_analysis_cache(user)
|
|
# Filtering this query by tableowner should be enough but for security reasons I've added an additional
|
|
# filter by schema. Also we have add a regexp to matches the current analysis tables name format to avoid
|
|
# deleting user tables in the process (https://github.com/CartoDB/camshaft/blob/0.59.4/lib/node/node.js#L344-L348)
|
|
cache_tables_sql = "SELECT tablename FROM pg_tables WHERE schemaname = '#{user.database_schema}' and tableowner = '#{user.database_username}' and tablename ~* '^analysis_[0-9a-z]{10}_[0-9a-z]{40}$';"
|
|
delete_analysis_metadata_sql = "DELETE FROM cdb_analysis_catalog WHERE username = '#{user.username}'"
|
|
user.in_database(as: :superuser) do |database|
|
|
database.transaction do
|
|
database.fetch(cache_tables_sql).map(:tablename).each do |cache_table_name|
|
|
database.run(%{DROP TABLE "#{user.database_schema}"."#{cache_table_name}"})
|
|
end
|
|
database.run(delete_analysis_metadata_sql)
|
|
end
|
|
end
|
|
end
|
|
|
|
# Drops grants and functions in a given schema, avoiding by all means a CASCADE
|
|
# to not affect extensions or other users
|
|
def drop_all_functions_from_schema(schema_name)
|
|
recursivity_max_depth = 3
|
|
|
|
return if schema_name == SCHEMA_PUBLIC
|
|
|
|
@user.in_database(as: :superuser) do |database|
|
|
# Non-aggregate functions
|
|
drop_function_sqls = database.fetch(get_drop_functions_sql(database, schema_name))
|
|
# Simulate a controlled environment drop cascade contained to only functions
|
|
failed_sqls = []
|
|
recursivity_level = 0
|
|
begin
|
|
failed_sqls = []
|
|
drop_function_sqls.each do |sql_sentence|
|
|
begin
|
|
database.run(sql_sentence[:sql])
|
|
rescue Sequel::DatabaseError => e
|
|
if e.message =~ /depends on function /i
|
|
failed_sqls.push(sql_sentence)
|
|
else
|
|
raise
|
|
end
|
|
end
|
|
end
|
|
drop_function_sqls = failed_sqls
|
|
recursivity_level += 1
|
|
end while failed_sqls.count > 0 && recursivity_level < recursivity_max_depth
|
|
|
|
# If something remains, reattempt later after dropping aggregates
|
|
if drop_function_sqls.count > 0
|
|
aggregate_dependant_function_sqls = drop_function_sqls
|
|
else
|
|
aggregate_dependant_function_sqls = []
|
|
end
|
|
|
|
# And now aggregate functions
|
|
failed_sqls = []
|
|
drop_function_sqls = database.fetch(get_drop_functions_sql(database, schema_name, aggregated: true))
|
|
drop_function_sqls.each do |sql_sentence|
|
|
begin
|
|
database.run(sql_sentence[:sql])
|
|
rescue Sequel::DatabaseError
|
|
failed_sqls.push(sql_sentence)
|
|
end
|
|
end
|
|
|
|
if failed_sqls.count > 0
|
|
raise CartoDB::BaseCartoDBError.new('Cannot drop schema aggregate functions, dependencies remain')
|
|
end
|
|
|
|
# One final pass of normal functions, if left
|
|
if aggregate_dependant_function_sqls.count > 0
|
|
aggregate_dependant_function_sqls.each do |sql_sentence|
|
|
begin
|
|
database.run(sql_sentence[:sql])
|
|
rescue Sequel::DatabaseError
|
|
failed_sqls.push(sql_sentence)
|
|
end
|
|
end
|
|
end
|
|
|
|
if failed_sqls.count > 0
|
|
raise CartoDB::BaseCartoDBError.new('Cannot drop schema functions, dependencies remain')
|
|
end
|
|
end
|
|
end
|
|
|
|
def get_drop_functions_sql(database, schema_name, aggregated: false)
|
|
pg_version = database.fetch("select current_setting('server_version_num') as version").first[:version].to_i
|
|
|
|
if pg_version >= 110000
|
|
agg_join_clause = "pg_proc.prokind #{aggregated ? ' = ' : ' <> '} 'a'"
|
|
else
|
|
agg_join_clause = "pg_proc.proisagg = #{aggregated ? 'TRUE' : 'FALSE'}"
|
|
end
|
|
|
|
drop_type = aggregated ? 'AGGREGATE' : 'FUNCTION'
|
|
|
|
%{SELECT 'DROP #{drop_type} "' || ns.nspname || '".' || proname || '(' || oidvectortypes(proargtypes) || ');'
|
|
AS sql
|
|
FROM pg_proc INNER JOIN pg_namespace ns ON (pg_proc.pronamespace = ns.oid AND #{agg_join_clause} )
|
|
WHERE ns.nspname = '#{schema_name}'}
|
|
end
|
|
|
|
# Create a "public.cdb_invalidate_varnish()" function to invalidate Varnish
|
|
#
|
|
# The function can only be used by the superuser, we expect
|
|
# security-definer triggers OR triggers on superuser-owned tables
|
|
# to call it with controlled set of parameters.
|
|
#
|
|
# The function is written in python because it needs to reach out
|
|
# to a Varnish server.
|
|
#
|
|
# Being unable to communicate with Varnish may or may not be critical
|
|
# depending on CartoDB configuration at time of function definition.
|
|
#
|
|
def create_function_invalidate_varnish
|
|
if Cartodb.config[:invalidation_service] && Cartodb.config[:invalidation_service].fetch('enabled', false)
|
|
create_function_invalidate_varnish_invalidation_service
|
|
elsif Cartodb.config[:varnish_management].fetch('http_port', false)
|
|
create_function_invalidate_varnish_http
|
|
else
|
|
create_function_invalidate_varnish_telnet
|
|
end
|
|
end
|
|
|
|
# Add plpythonu pl handler
|
|
def add_python
|
|
@user.in_database(
|
|
as: :superuser,
|
|
no_cartodb_in_schema: true
|
|
).run("CREATE OR REPLACE PROCEDURAL LANGUAGE 'plpythonu' HANDLER plpython_call_handler;")
|
|
end
|
|
|
|
# Needed because in some cases it might not exist and failure ends transaction
|
|
def role_exists?(db, role)
|
|
!db.fetch("SELECT 1 FROM pg_roles WHERE rolname='#{role}'").first.nil?
|
|
end
|
|
|
|
def revoke_privileges(db, schema, user)
|
|
db.run("REVOKE ALL ON SCHEMA \"#{schema}\" FROM #{user} CASCADE")
|
|
db.run("REVOKE ALL ON ALL SEQUENCES IN SCHEMA \"#{schema}\" FROM #{user} CASCADE")
|
|
db.run("REVOKE ALL ON ALL FUNCTIONS IN SCHEMA \"#{schema}\" FROM #{user} CASCADE")
|
|
db.run("REVOKE ALL ON ALL TABLES IN SCHEMA \"#{schema}\" FROM #{user} CASCADE")
|
|
end
|
|
|
|
def organization_member_group_role_member_name
|
|
@user.in_database.fetch(
|
|
"SELECT cartodb.CDB_Organization_Member_Group_Role_Member_Name() as org_member_role;"
|
|
)[:org_member_role][:org_member_role]
|
|
end
|
|
|
|
def db_configuration_for(user_role = nil)
|
|
logger = (Rails.env.development? || Rails.env.test? ? ::Rails.logger : nil)
|
|
if user_role == :superuser
|
|
::SequelRails.configuration.environment_for(Rails.env).merge(
|
|
'database' => @user.database_name,
|
|
:logger => logger,
|
|
'host' => @user.database_host
|
|
) { |_, o, n| n.nil? ? o : n }
|
|
elsif user_role == :cluster_admin
|
|
::SequelRails.configuration.environment_for(Rails.env).merge(
|
|
'database' => 'postgres',
|
|
:logger => logger,
|
|
'host' => @user.database_host
|
|
) { |_, o, n| n.nil? ? o : n }
|
|
elsif user_role == :public_user
|
|
::SequelRails.configuration.environment_for(Rails.env).merge(
|
|
'database' => @user.database_name,
|
|
:logger => logger,
|
|
'username' => CartoDB::PUBLIC_DB_USER, 'password' => CartoDB::PUBLIC_DB_USER_PASSWORD,
|
|
'host' => @user.database_host
|
|
) { |_, o, n| n.nil? ? o : n }
|
|
elsif user_role == :public_db_user
|
|
::SequelRails.configuration.environment_for(Rails.env).merge(
|
|
'database' => @user.database_name,
|
|
:logger => logger,
|
|
'username' => @user.database_public_username, 'password' => CartoDB::PUBLIC_DB_USER_PASSWORD,
|
|
'host' => @user.database_host
|
|
) { |_, o, n| n.nil? ? o : n }
|
|
else
|
|
::SequelRails.configuration.environment_for(Rails.env).merge(
|
|
'database' => @user.database_name,
|
|
:logger => logger,
|
|
'username' => @user.database_username,
|
|
'password' => @user.database_password,
|
|
'host' => @user.database_host
|
|
) { |_, o, n| n.nil? ? o : n }
|
|
end
|
|
end
|
|
|
|
def monitor_user_notification
|
|
FileUtils.touch(log_file_path('users_modifications'))
|
|
if !Cartodb.config[:signups].nil? && !Cartodb.config[:signups]["service"].nil? &&
|
|
!Cartodb.config[:signups]["service"]["port"].nil?
|
|
enable_remote_db_user
|
|
end
|
|
end
|
|
|
|
def enable_remote_db_user
|
|
request = http_client.request(
|
|
"#{@user.database_host}:#{Cartodb.config[:signups]['service']['port']}/scripts/activate_db_user",
|
|
method: :post,
|
|
headers: { "Content-Type" => "application/json" }
|
|
)
|
|
response = request.run
|
|
if response.code != 200
|
|
raise(response.body)
|
|
else
|
|
comm_response = JSON.parse(response.body)
|
|
if comm_response['retcode'].to_i != 0
|
|
raise(response['stderr'])
|
|
end
|
|
end
|
|
end
|
|
|
|
def create_own_schema
|
|
load_cartodb_functions
|
|
@user.database_schema = @user.username
|
|
@user.this.update(database_schema: @user.database_schema)
|
|
create_user_schema
|
|
set_database_search_path
|
|
create_public_db_user
|
|
end
|
|
|
|
def move_to_own_schema
|
|
new_schema_name = @user.username
|
|
old_database_schema_name = @user.database_schema
|
|
if @user.database_schema != new_schema_name
|
|
Carto::Db::UserSchemaMover.new(@user).move_objects(new_schema_name)
|
|
|
|
create_public_db_user
|
|
set_database_search_path
|
|
end
|
|
rescue => e
|
|
# Undo metadata changes if process fails
|
|
begin
|
|
@user.this.update database_schema: old_database_schema_name
|
|
|
|
# Defensive measure to avoid undesired table dropping
|
|
if schema_exists?(new_schema_name) && tables_effective(new_schema_name).count == 0
|
|
drop_all_functions_from_schema(new_schema_name)
|
|
@user.in_database.run(%{ DROP SCHEMA "#{new_schema_name}" })
|
|
end
|
|
rescue => ee
|
|
# Avoid shadowing the actual error
|
|
CartoDB.notify_exception(ee, user: @user)
|
|
end
|
|
raise e
|
|
end
|
|
|
|
def drop_database_and_user(conn = nil)
|
|
conn ||= @user.in_database(as: :cluster_admin)
|
|
|
|
if !@user.database_name.nil? && !@user.database_name.empty?
|
|
@user.in_database(as: :superuser).run("DROP SCHEMA \"#{@user.database_schema}\" CASCADE")
|
|
conn.run("UPDATE pg_database SET datallowconn = 'false' WHERE datname = '#{@user.database_name}'")
|
|
CartoDB::UserModule::DBService.terminate_database_connections(@user.database_name, @user.database_host)
|
|
conn.run("DROP DATABASE \"#{@user.database_name}\"")
|
|
end
|
|
|
|
if !@user.database_username.nil? && !@user.database_username.empty?
|
|
conn.run("DROP USER \"#{@user.database_username}\"")
|
|
end
|
|
end
|
|
|
|
def run_pg_query(query)
|
|
time = nil
|
|
res = nil
|
|
translation_proc = nil
|
|
@user.in_database do |user_database|
|
|
time = Benchmark.measure do
|
|
user_database.synchronize do |conn|
|
|
res = conn.exec query
|
|
end
|
|
translation_proc = user_database.conversion_procs
|
|
end
|
|
end
|
|
{
|
|
time: time.real,
|
|
total_rows: res.ntuples,
|
|
rows: pg_to_hash(res, translation_proc),
|
|
results: pg_results?(res),
|
|
modified: pg_modified?(res),
|
|
affected_rows: pg_size(res)
|
|
}
|
|
rescue => e
|
|
if e.is_a? PGError
|
|
if e.message.include?("does not exist")
|
|
if e.message.include?("column")
|
|
raise CartoDB::ColumnNotExists, e.message
|
|
else
|
|
raise CartoDB::TableNotExists, e.message
|
|
end
|
|
else
|
|
raise CartoDB::ErrorRunningQuery, e.message
|
|
end
|
|
else
|
|
raise e
|
|
end
|
|
end
|
|
|
|
def create_db_user
|
|
conn = @user.in_database(as: :cluster_admin)
|
|
begin
|
|
conn.transaction do
|
|
begin
|
|
conn.run("CREATE USER \"#{@user.database_username}\" PASSWORD '#{@user.database_password}'")
|
|
conn.run("GRANT publicuser to \"#{@user.database_username}\"")
|
|
rescue => e
|
|
puts "#{Time.now} USER SETUP ERROR (#{@user.database_username}): #{$!}"
|
|
raise e
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
def create_user_db
|
|
conn = @user.in_database(as: :cluster_admin)
|
|
begin
|
|
conn.run("CREATE DATABASE \"#{@user.database_name}\"
|
|
WITH TEMPLATE = template_postgis
|
|
OWNER = #{::SequelRails.configuration.environment_for(Rails.env)['username']}
|
|
ENCODING = 'UTF8'
|
|
CONNECTION LIMIT=-1")
|
|
rescue => e
|
|
puts "#{Time.now} USER SETUP ERROR WHEN CREATING DATABASE #{@user.database_name}: #{$!}"
|
|
raise e
|
|
end
|
|
end
|
|
|
|
def set_database_name
|
|
@user.database_name = case Rails.env
|
|
when 'development'
|
|
"cartodb_dev_user_#{@user.partial_db_name}_db"
|
|
when 'staging'
|
|
"cartodb_staging_user_#{@user.partial_db_name}_db"
|
|
when 'test'
|
|
"cartodb_test_user_#{@user.partial_db_name}_db"
|
|
else
|
|
"cartodb_user_#{@user.partial_db_name}_db"
|
|
end
|
|
if @user.has_organization_enabled?
|
|
if !@user.database_exists?
|
|
raise "Organization database #{@user.database_name} doesn't exist"
|
|
end
|
|
else
|
|
if @user.database_exists?
|
|
raise "Database #{@user.database_name} already exists"
|
|
end
|
|
end
|
|
@user.this.update database_name: @user.database_name
|
|
end
|
|
|
|
def public_user_roles
|
|
@user.organization_user? ? [CartoDB::PUBLIC_DB_USER, @user.database_public_username] : [CartoDB::PUBLIC_DB_USER]
|
|
end
|
|
|
|
def terminate_database_connections
|
|
CartoDB::UserModule::DBService.terminate_database_connections(@user.database_name, @user.database_host)
|
|
end
|
|
|
|
def self.terminate_database_connections(database_name, database_host)
|
|
connection_params = ::SequelRails.configuration.environment_for(Rails.env).merge(
|
|
'host' => database_host,
|
|
'database' => 'postgres'
|
|
) { |_, o, n| n.nil? ? o : n }
|
|
conn = ::Sequel.connect(connection_params)
|
|
conn.run("
|
|
DO language plpgsql $$
|
|
DECLARE
|
|
ver INT;
|
|
sql TEXT;
|
|
BEGIN
|
|
SELECT INTO ver setting from pg_settings where name='server_version_num';
|
|
sql := 'SELECT pg_terminate_backend(';
|
|
IF ver > 90199 THEN
|
|
sql := sql || 'pid';
|
|
ELSE
|
|
sql := sql || 'procpid';
|
|
END IF;
|
|
|
|
sql := sql || ') FROM pg_stat_activity WHERE datname = '
|
|
|| quote_literal('#{database_name}');
|
|
|
|
RAISE NOTICE '%', sql;
|
|
|
|
EXECUTE sql;
|
|
END
|
|
$$
|
|
")
|
|
close_sequel_connection(conn)
|
|
end
|
|
|
|
def triggers(schema = @user.database_schema)
|
|
Carto::Db::Database.build_with_user(@user).triggers(schema)
|
|
end
|
|
|
|
def functions(schema = @user.database_schema)
|
|
Carto::Db::Database.build_with_user(@user).functions(schema, @user.database_username)
|
|
end
|
|
|
|
def views(schema = @user.database_schema)
|
|
Carto::Db::Database.build_with_user(@user).views(schema, @user.database_username)
|
|
end
|
|
|
|
def materialized_views(schema = @user.database_schema)
|
|
Carto::Db::Database.build_with_user(@user).materialized_views(schema, @user.database_username)
|
|
end
|
|
|
|
def get_database_version
|
|
version_match = @user.in_database.fetch("SELECT version()").first[:version].match(/(PostgreSQL (([0-9]+\.?){2,3})).*/)
|
|
if version_match.nil?
|
|
return nil
|
|
else
|
|
return version_match[2]
|
|
end
|
|
end
|
|
|
|
def connect_to_aggregation_tables
|
|
config = Cartodb.get_config(:aggregation_tables)
|
|
@user.in_database(as: :superuser) do |db|
|
|
db.transaction do
|
|
db.run(build_aggregation_fdw_config_sql(config))
|
|
db.run("SELECT cartodb._CDB_Setup_FDW('aggregation');")
|
|
db.run("CREATE FOREIGN TABLE IF NOT EXISTS #{SCHEMA_AGGREGATION_TABLES}.agg_admin0 " \
|
|
"(cartodb_id integer, the_geom geometry(Geometry,4326), " \
|
|
"the_geom_webmercator geometry(Geometry,3857), " \
|
|
"population double precision OPTIONS (column_name 'pop_est')) SERVER aggregation OPTIONS " \
|
|
"(schema_name 'public', table_name '#{config['tables']['admin0']}', updatable 'false');")
|
|
db.run("CREATE FOREIGN TABLE IF NOT EXISTS #{SCHEMA_AGGREGATION_TABLES}.agg_admin1 " \
|
|
"(cartodb_id integer,the_geom geometry(Geometry,4326), " \
|
|
"the_geom_webmercator geometry(Geometry,3857)) " \
|
|
"SERVER aggregation OPTIONS (schema_name 'public', table_name '#{config['tables']['admin1']}', updatable 'false');")
|
|
db.run("GRANT SELECT ON TABLE #{SCHEMA_AGGREGATION_TABLES}.agg_admin0 TO \"#{@user.database_username}\";")
|
|
db.run("GRANT SELECT ON TABLE #{SCHEMA_AGGREGATION_TABLES}.agg_admin1 TO \"#{@user.database_username}\";")
|
|
end
|
|
end
|
|
end
|
|
|
|
# Execute a query in the user database
|
|
# @param [String] query, using $1, $2 ... for placeholders
|
|
# @param ... values for the placeholders
|
|
# @return [Array<Hash<String, Value>>] Something (an actual Array in this case) that behaves like an Array
|
|
# of Hashes that map column name (as string) to value
|
|
# @raise [PG::Error] if the query fails
|
|
def execute_in_user_database(query, *binds)
|
|
placeholder_query = query.gsub(/\$\d+/, '?')
|
|
@user.in_database.fetch(placeholder_query, *binds).all.map(&:stringify_keys)
|
|
rescue Sequel::DatabaseError => exception
|
|
raise exception.cause
|
|
end
|
|
|
|
def create_ghost_tables_event_trigger
|
|
return if @user.has_feature_flag?('ghost_tables_trigger_disabled')
|
|
configure_ghost_table_event_trigger
|
|
@user.in_database(as: :superuser).run('SELECT CDB_EnableGhostTablesTrigger()')
|
|
end
|
|
|
|
def configure_ghost_table_event_trigger
|
|
tis_config = Cartodb.config[:invalidation_service]
|
|
return unless tis_config
|
|
@user.in_database(as: :superuser)
|
|
.run("SELECT cartodb.CDB_Conf_SetConf('invalidation_service', '#{tis_config.to_json}')")
|
|
end
|
|
|
|
def drop_ghost_tables_event_trigger
|
|
@user.in_database(as: :superuser).run('SELECT CDB_DisableGhostTablesTrigger()')
|
|
end
|
|
|
|
def create_oauth_reassign_ownership_event_trigger
|
|
@user.in_database(as: :superuser).run('SELECT CDB_EnableOAuthReassignTablesTrigger()')
|
|
end
|
|
|
|
def drop_oauth_reassign_ownership_event_trigger
|
|
@user.in_database(as: :superuser).run('SELECT CDB_DisableOAuthReassignTablesTrigger()')
|
|
end
|
|
|
|
private
|
|
|
|
def http_client
|
|
@http_client ||= Carto::Http::Client.get('old_user', log_requests: true)
|
|
end
|
|
|
|
# Telnet invalidation works only for Varnish 2.x.
|
|
def create_function_invalidate_varnish_telnet
|
|
add_python
|
|
|
|
varnish_host = Cartodb.config[:varnish_management].try(:[], 'host') || '127.0.0.1'
|
|
varnish_port = Cartodb.config[:varnish_management].try(:[], 'port') || 6082
|
|
varnish_timeout = Cartodb.config[:varnish_management].try(:[], 'timeout') || 5
|
|
varnish_critical = Cartodb.config[:varnish_management].try(:[], 'critical') == true ? 1 : 0
|
|
varnish_retry = Cartodb.config[:varnish_management].try(:[], 'retry') || 5
|
|
purge_command = Cartodb::config[:varnish_management]["purge_command"]
|
|
varnish_trigger_verbose = Cartodb.config[:varnish_management].fetch('trigger_verbose', true) == true ? 1 : 0
|
|
|
|
@user.in_database(as: :superuser).run(
|
|
<<-TRIGGER
|
|
BEGIN;
|
|
CREATE OR REPLACE FUNCTION public.cdb_invalidate_varnish(table_name text) RETURNS void AS
|
|
$$
|
|
critical = #{varnish_critical}
|
|
timeout = #{varnish_timeout}
|
|
retry = #{varnish_retry}
|
|
trigger_verbose = #{varnish_trigger_verbose}
|
|
|
|
client = GD.get('varnish', None)
|
|
for i in ('base64', 'hashlib'):
|
|
if not i in GD:
|
|
GD[i] = __import__(i)
|
|
|
|
while True:
|
|
|
|
if not client:
|
|
try:
|
|
import varnish
|
|
client = GD['varnish'] = varnish.VarnishHandler(('#{varnish_host}', #{varnish_port}, timeout))
|
|
except Exception as err:
|
|
# NOTE: we won't retry on connection error
|
|
if critical:
|
|
plpy.error('Varnish connection error: ' + str(err))
|
|
break
|
|
|
|
try:
|
|
cache_key = "t:" + GD['base64'].b64encode(GD['hashlib'].sha256('#{@user.database_name}:%s' % table_name).digest())[0:6]
|
|
# We want to say \b here, but the Varnish telnet interface expects \\b, we have to escape that on Python to \\\\b and double that for SQL
|
|
client.fetch('#{purge_command} obj.http.Surrogate-Key ~ "\\\\\\\\b%s\\\\\\\\b"' % cache_key)
|
|
break
|
|
except Exception as err:
|
|
if trigger_verbose:
|
|
plpy.warning('Varnish fetch error: ' + str(err))
|
|
client = GD['varnish'] = None # force reconnect
|
|
if not retry:
|
|
if critical:
|
|
plpy.error('Varnish fetch error: ' + str(err))
|
|
break
|
|
retry -= 1 # try reconnecting
|
|
$$
|
|
LANGUAGE 'plpythonu' VOLATILE;
|
|
REVOKE ALL ON FUNCTION public.cdb_invalidate_varnish(TEXT) FROM PUBLIC;
|
|
COMMIT;
|
|
TRIGGER
|
|
)
|
|
end
|
|
|
|
def create_function_invalidate_varnish_http
|
|
add_python
|
|
|
|
varnish_host = Cartodb.config[:varnish_management].try(:[], 'host') || '127.0.0.1'
|
|
varnish_port = Cartodb.config[:varnish_management].try(:[], 'http_port') || 6081
|
|
varnish_timeout = Cartodb.config[:varnish_management].try(:[], 'timeout') || 5
|
|
varnish_critical = Cartodb.config[:varnish_management].try(:[], 'critical') == true ? 1 : 0
|
|
varnish_retry = Cartodb.config[:varnish_management].try(:[], 'retry') || 5
|
|
varnish_trigger_verbose = Cartodb.config[:varnish_management].fetch('trigger_verbose', true) == true ? 1 : 0
|
|
|
|
@user.in_database(as: :superuser).run(
|
|
<<-TRIGGER
|
|
BEGIN;
|
|
CREATE OR REPLACE FUNCTION public.cdb_invalidate_varnish(table_name text) RETURNS void AS
|
|
$$
|
|
critical = #{varnish_critical}
|
|
timeout = #{varnish_timeout}
|
|
retry = #{varnish_retry}
|
|
trigger_verbose = #{varnish_trigger_verbose}
|
|
for i in ('httplib', 'base64', 'hashlib'):
|
|
if not i in GD:
|
|
GD[i] = __import__(i)
|
|
|
|
while True:
|
|
|
|
try:
|
|
client = GD['httplib'].HTTPConnection('#{varnish_host}', #{varnish_port}, False, timeout)
|
|
raw_cache_key = "t:" + GD['base64'].b64encode(GD['hashlib'].sha256('#{@user.database_name}:%s' % table_name).digest())[0:6]
|
|
cache_key = raw_cache_key.replace('+', r'\+')
|
|
client.request('PURGE', '/key', '', {"Invalidation-Match": ('\\\\b%s\\\\b' % cache_key) })
|
|
response = client.getresponse()
|
|
assert response.status == 204
|
|
break
|
|
except Exception as err:
|
|
if trigger_verbose:
|
|
plpy.warning('Varnish purge error: ' + str(err))
|
|
if not retry:
|
|
if critical:
|
|
plpy.error('Varnish purge error: ' + str(err))
|
|
break
|
|
retry -= 1 # try reconnecting
|
|
$$
|
|
LANGUAGE 'plpythonu' VOLATILE;
|
|
REVOKE ALL ON FUNCTION public.cdb_invalidate_varnish(TEXT) FROM PUBLIC;
|
|
COMMIT;
|
|
TRIGGER
|
|
)
|
|
end
|
|
|
|
# Invalidate through external service
|
|
def create_function_invalidate_varnish_invalidation_service
|
|
add_python
|
|
|
|
invalidation_host = Cartodb.config[:invalidation_service].try(:[], 'host') || '127.0.0.1'
|
|
invalidation_port = Cartodb.config[:invalidation_service].try(:[], 'port') || 3142
|
|
invalidation_timeout = Cartodb.config[:invalidation_service].try(:[], 'timeout') || 5
|
|
invalidation_critical = Cartodb.config[:invalidation_service].try(:[], 'critical') ? 1 : 0
|
|
invalidation_retry = Cartodb.config[:invalidation_service].try(:[], 'retry') || 5
|
|
invalidation_trigger_verbose =
|
|
Cartodb.config[:invalidation_service].fetch('trigger_verbose', true) == true ? 1 : 0
|
|
|
|
@user.in_database(as: :superuser).run(
|
|
<<-TRIGGER
|
|
BEGIN;
|
|
CREATE OR REPLACE FUNCTION public.cdb_invalidate_varnish(table_name text) RETURNS void AS
|
|
$$
|
|
critical = #{invalidation_critical}
|
|
timeout = #{invalidation_timeout}
|
|
retry = #{invalidation_retry}
|
|
trigger_verbose = #{invalidation_trigger_verbose}
|
|
|
|
client = GD.get('invalidation', None)
|
|
|
|
if 'syslog' not in GD:
|
|
import syslog
|
|
GD['syslog'] = syslog
|
|
else:
|
|
syslog = GD['syslog']
|
|
|
|
if 'time' not in GD:
|
|
import time
|
|
GD['time'] = time
|
|
else:
|
|
time = GD['time']
|
|
|
|
if 'json' not in GD:
|
|
import json
|
|
GD['json'] = json
|
|
else:
|
|
json = GD['json']
|
|
|
|
start = time.time()
|
|
retries = 0
|
|
termination_state = 1
|
|
error = ''
|
|
|
|
while True:
|
|
|
|
if not client:
|
|
try:
|
|
import redis
|
|
client = GD['invalidation'] = redis.Redis(host='#{invalidation_host}', port=#{invalidation_port}, socket_timeout=timeout)
|
|
except Exception as err:
|
|
error = "client_error - %s" % str(err)
|
|
# NOTE: we won't retry on connection error
|
|
if critical:
|
|
plpy.error('Invalidation Service connection error: ' + str(err))
|
|
break
|
|
|
|
try:
|
|
client.execute_command('TCH', '#{@user.database_name}', table_name)
|
|
termination_state = 0
|
|
error = ''
|
|
break
|
|
except Exception as err:
|
|
error = "request_error - %s" % str(err)
|
|
if trigger_verbose:
|
|
plpy.warning('Invalidation Service warning: ' + str(err))
|
|
client = GD['invalidation'] = None # force reconnect
|
|
if not retry:
|
|
if critical:
|
|
plpy.error('Invalidation Service error: ' + str(err))
|
|
break
|
|
retries = retries + 1
|
|
retry -= 1 # try reconnecting
|
|
|
|
end = time.time()
|
|
invalidation_duration = (end - start)
|
|
current_time = time.strftime("%Y-%m-%d %H:%M:%S %Z", time.localtime())
|
|
session_user = plpy.execute("SELECT session_user", 1)[0]["session_user"]
|
|
invalidation_result = {"timestamp": current_time, "duration": round(invalidation_duration, 8), "termination_state": termination_state, "retries": retries, "error": error, "database": "#{@user.database_name}", "table_name": table_name, "dbuser": session_user}
|
|
|
|
if trigger_verbose:
|
|
syslog.syslog(syslog.LOG_INFO, "invalidation: %s" % json.dumps(invalidation_result))
|
|
|
|
$$
|
|
LANGUAGE 'plpythonu' VOLATILE;
|
|
REVOKE ALL ON FUNCTION public.cdb_invalidate_varnish(TEXT) FROM PUBLIC;
|
|
COMMIT;
|
|
TRIGGER
|
|
)
|
|
end
|
|
|
|
# Geocoder api extension related
|
|
def build_geocoder_server_config_sql(config)
|
|
host = config['host']
|
|
port = config['port']
|
|
user = config['user']
|
|
dbname = config['dbname']
|
|
%{
|
|
SELECT cartodb.CDB_Conf_SetConf('geocoder_server_config',
|
|
'{ \"connection_str\": \"host=#{host} port=#{port} dbname=#{dbname} user=#{user}\"}'::json
|
|
);
|
|
}
|
|
end
|
|
|
|
def build_entity_config_sql
|
|
# User configuration
|
|
entity_name = @user.organization_user? ? @user.organization.name : @user.username
|
|
%{
|
|
SELECT cartodb.CDB_Conf_SetConf('user_config',
|
|
'{"is_organization": #{@user.organization_user?}, "entity_name": "#{entity_name}"}'::json
|
|
);
|
|
}
|
|
end
|
|
|
|
def build_aggregation_fdw_config_sql(config)
|
|
%{
|
|
SELECT cartodb.CDB_Conf_SetConf('fdws',
|
|
'{"aggregation":{"server":{"extensions":"postgis", "dbname":"#{config['dbname']}",
|
|
"host":"#{config['host']}", "port":"#{config['port']}"}, "users":{"public":{"user":"#{config['username']}",
|
|
"password":"#{config['password']}"} } } }'::json
|
|
);
|
|
}
|
|
end
|
|
end
|
|
end
|
|
end
|