-
Notifications
You must be signed in to change notification settings - Fork 9
/
logtofile_shmem.c
220 lines (193 loc) · 7.38 KB
/
logtofile_shmem.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
/*-------------------------------------------------------------------------
*
* logtofile_shmem.c
* Functions to manage shared memory
*
* Copyright (c) 2020-2024, Francisco Miguel Biete Banon
*
* This code is released under the PostgreSQL licence, as given at
* http://www.postgresql.org/about/licence/
*-------------------------------------------------------------------------
*/
#include "logtofile_shmem.h"
#include <miscadmin.h>
#include <storage/pg_shmem.h>
#include <storage/shmem.h>
#include <utils/timestamp.h>
#include <time.h>
#include "logtofile_autoclose.h"
#include "logtofile_connect.h"
#include "logtofile_filename.h"
#include "logtofile_guc.h"
#include "logtofile_vars.h"
/* Extracted from src/backend/po */
const char *postgresConnMsg[] = {
"connection received: host=%s port=%s",
"connection received: host=%s",
"connection authorized: user=%s",
"connection authenticated: identity=\"%s\" method=%s (%s:%d)",
"connection authenticated: user=\"%s\" method=%s (%s:%d)",
"replication connection authorized: user=%s",
"replication connection authorized: user=%s SSL enabled (protocol=%s, cipher=%s, bits=%d, compression=%s)",
"replication connection authorized: user=%s application_name=%s",
"replication connection authorized: user=%s application_name=%s SSL enabled (protocol=%s, cipher=%s, bits=%d, compression=%s)",
"password authentication failed for user \"%s\"",
"authentication failed for user \"%s\": host rejected",
"\"trust\" authentication failed for user \"%s\"",
"Ident authentication failed for user \"%s\"",
"Peer authentication failed for user \"%s\"",
"password authentication failed for user \"%s\"",
"SSPI authentication failed for user \"%s\"",
"PAM authentication failed for user \"%s\"",
"BSD authentication failed for user \"%s\"",
"LDAP authentication failed for user \"%s\"",
"certificate authentication failed for user \"%s\"",
"RADIUS authentication failed for user \"%s\"",
"authentication failed for user \"%s\": invalid authentication method",
"connection authorized: user=%s database=%s",
"connection authorized: user=%s database=%s SSL enabled (protocol=%s, cipher=%s, bits=%d, compression=%s)",
"connection authorized: user=%s database=%s application_name=%s",
"connection authorized: user=%s database=%s application_name=%s SSL enabled (protocol=%s, cipher=%s, bits=%d, compression=%s)",
};
/* Extracted from src/backend/po */
const char *postgresDisconnMsg[] = {
"disconnection: session time: %d:%02d:%02d.%03d user=%s database=%s host=%s%s%s"};
// Private functions
Timestamp pgauditlogtofile_truncate_timestamp(Timestamp t);
#if (PG_VERSION_NUM >= 150000)
/**
* @brief Request shared memory space
* @param void
* @return void
*/
void PgAuditLogToFile_shmem_request(void)
{
if (pgaudit_ltf_prev_shmem_request_hook)
pgaudit_ltf_prev_shmem_request_hook();
RequestAddinShmemSpace(MAXALIGN(sizeof(PgAuditLogToFileShm)));
RequestNamedLWLockTranche("pgauditlogtofile", 1);
}
#endif
/**
* @brief SHMEM startup hook - Initialize SHMEM structure
* @param void
* @return void
*/
void PgAuditLogToFile_shmem_startup(void)
{
bool found;
size_t num_messages, i, j;
char **prefixes = NULL;
// Execute other hooks
if (pgaudit_ltf_prev_shmem_startup_hook)
pgaudit_ltf_prev_shmem_startup_hook();
/* reset in case this is a restart within the postmaster */
pgaudit_ltf_shm = NULL;
LWLockAcquire(AddinShmemInitLock, LW_EXCLUSIVE);
pgaudit_ltf_shm = ShmemInitStruct("pgauditlogtofile", sizeof(PgAuditLogToFileShm), &found);
if (!found)
{
pg_atomic_init_flag(&pgaudit_ltf_flag_shutdown);
// Get unique prefixes and copy them to SHMEM
num_messages = sizeof(postgresConnMsg) / sizeof(char *);
prefixes = PgAuditLogToFile_connect_UniquePrefixes(postgresConnMsg, num_messages, &pgaudit_ltf_shm->num_prefixes_connection);
pgaudit_ltf_shm->prefixes_connection = ShmemAlloc(pgaudit_ltf_shm->num_prefixes_connection * sizeof(PgAuditLogToFilePrefix *));
for (i = 0, j = 0; i < num_messages; i++)
{
if (prefixes != NULL && prefixes[i] != NULL)
{
pgaudit_ltf_shm->prefixes_connection[j] = ShmemAlloc(sizeof(PgAuditLogToFilePrefix));
pgaudit_ltf_shm->prefixes_connection[j]->length = strlen(prefixes[i]);
pgaudit_ltf_shm->prefixes_connection[j]->prefix = ShmemAlloc((pgaudit_ltf_shm->prefixes_connection[j]->length + 1) * sizeof(char));
strcpy(pgaudit_ltf_shm->prefixes_connection[j]->prefix, prefixes[i]);
pfree(prefixes[i]);
j++;
}
}
pfree(prefixes);
num_messages = sizeof(postgresDisconnMsg) / sizeof(char *);
prefixes = PgAuditLogToFile_connect_UniquePrefixes(postgresDisconnMsg, num_messages, &pgaudit_ltf_shm->num_prefixes_disconnection);
pgaudit_ltf_shm->prefixes_disconnection = ShmemAlloc(pgaudit_ltf_shm->num_prefixes_disconnection * sizeof(PgAuditLogToFilePrefix *));
for (i = 0, j = 0; i < num_messages; i++)
{
if (prefixes != NULL && prefixes[i] != NULL)
{
pgaudit_ltf_shm->prefixes_disconnection[j] = ShmemAlloc(sizeof(PgAuditLogToFilePrefix));
pgaudit_ltf_shm->prefixes_disconnection[j]->length = strlen(prefixes[i]);
pgaudit_ltf_shm->prefixes_disconnection[j]->prefix = ShmemAlloc((pgaudit_ltf_shm->prefixes_disconnection[j]->length + 1) * sizeof(char));
strcpy(pgaudit_ltf_shm->prefixes_disconnection[j]->prefix, prefixes[i]);
pfree(prefixes[i]);
j++;
}
}
pfree(prefixes);
pgaudit_ltf_shm->lock = &(GetNamedLWLockTranche("pgauditlogtofile"))->lock;
PgAuditLogToFile_calculate_current_filename();
PgAuditLogToFile_set_next_rotation_time();
}
LWLockRelease(AddinShmemInitLock);
if (IsUnderPostmaster)
{
// Backend
pg_atomic_init_flag(&pgaudit_ltf_autoclose_flag_thread);
}
else
{
// Postmaster
on_shmem_exit(PgAuditLogToFile_shmem_shutdown, (Datum)0);
}
if (!found)
ereport(LOG, (errmsg("pgauditlogtofile extension initialized")));
}
/**
* @brief SHMEM shutdown hook
* @param code: code
* @param arg: arg
* @return void
*/
void PgAuditLogToFile_shmem_shutdown(int code, Datum arg)
{
pg_atomic_test_set_flag(&pgaudit_ltf_flag_shutdown);
}
/**
* @brief Generates the name for the audit log file
* @param void
* @return void
*/
void PgAuditLogToFile_calculate_current_filename(void)
{
char *filename = NULL;
if (UsedShmemSegAddr == NULL || pgaudit_ltf_shm == NULL)
return;
filename = PgAuditLogToFile_current_filename();
if (filename == NULL)
{
ereport(WARNING, (errmsg("pgauditlogtofile failed to calculate filename")));
return;
}
LWLockAcquire(pgaudit_ltf_shm->lock, LW_EXCLUSIVE);
memset(pgaudit_ltf_shm->filename, 0, sizeof(pgaudit_ltf_shm->filename));
strcpy(pgaudit_ltf_shm->filename, filename);
LWLockRelease(pgaudit_ltf_shm->lock);
pfree(filename);
}
/*
* @brief Checks if the audit log file needs to be rotated before we use it
* @param void
* @return bool: true if the file needs to be rotated
*/
bool PgAuditLogToFile_needs_rotate_file(void)
{
pg_time_t now;
if (UsedShmemSegAddr == NULL || pgaudit_ltf_shm == NULL)
return false;
if (guc_pgaudit_ltf_log_rotation_age < 1)
return false;
now = (pg_time_t)time(NULL);
if (now >= pgaudit_ltf_shm->next_rotation_time)
{
ereport(DEBUG3, (errmsg("pgauditlogtofile needs to rotate file %s", pgaudit_ltf_shm->filename)));
return true;
}
return false;
}