Server IP : 104.21.38.3 / Your IP : 162.158.170.146 Web Server : Apache System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /www/server/mysql/src/rapid/plugin/x/ngs/src/ |
Upload File : |
/* * Copyright (c) 2015, 2023, Oracle and/or its affiliates. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License, version 2.0, * as published by the Free Software Foundation. * * This program is also distributed with certain software (including * but not limited to OpenSSL) that is licensed under separate terms, * as designated in a particular file or component or in included license * documentation. The authors of MySQL hereby grant you an additional * permission to link the program and your derivative works with the * separately licensed software that they have included with MySQL. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License, version 2.0, for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA */ #include "ngs/client_session.h" #include "ngs/interface/client_interface.h" #include "ngs/interface/server_interface.h" #include "ngs/protocol_authentication.h" #include "ngs/log.h" #include "ngs/ngs_error.h" #undef ERROR // Needed to avoid conflict with ERROR in mysqlx.pb.h #include "ngs_common/protocol_protobuf.h" using namespace ngs; // Code below this line is executed from the network thread // ------------------------------------------------------------------------------------------------ Session::Session(Client_interface& client, Protocol_encoder *proto, const Session_id session_id) : m_client(client), // don't hold a real reference to the parent to avoid circular reference m_encoder(proto), m_auth_handler(), m_state(Authenticating), m_state_before_close(Authenticating), m_id(session_id), m_thread_pending(0), m_thread_active(0) { log_debug("%s.%i: New session allocated by client", client.client_id(), session_id); #ifndef WIN32 mdbg_my_thread = pthread_self(); #endif } Session::~Session() { log_debug("%s: Delete session", m_client.client_id()); check_thread(); } bool Session::is_ready() const { return m_state == Ready; } void Session::on_close(const bool update_old_state) { if (m_state != Closing) { if (update_old_state) m_state_before_close = m_state; m_state = Closing; m_client.on_session_close(*this); } } void Session::on_kill() { // this is usually called from a foreign thread, so we need to trigger // the session close indirectly // we do so by shutting down the connection for the client m_client.disconnect_and_trigger_close(); // on_close(); } // Code below this line is executed from the worker thread // ------------------------------------------------------------------------------------------------ // Return value means true if message was handled, false if not. // If message is handled, ownership of the object is passed on (and should be deleted by the callee) bool Session::handle_message(ngs::Request &command) { log_message_recv(command); if (m_state == Authenticating) { return handle_auth_message(command); } else if (m_state == Ready) { // handle session commands return handle_ready_message(command); } // msg not handled return false; } bool Session::handle_ready_message(ngs::Request &command) { switch (command.get_type()) { case Mysqlx::ClientMessages::SESS_CLOSE: m_encoder->send_ok("bye!"); on_close(true); return true; case Mysqlx::ClientMessages::CON_CLOSE: m_encoder->send_ok("bye!"); on_close(true); return true; case Mysqlx::ClientMessages::SESS_RESET: // session reset m_state = Closing; m_client.on_session_reset(*this); return true; } return false; } void Session::stop_auth() { m_auth_handler.reset(); // request termination m_client.on_session_close(*this); } bool Session::handle_auth_message(ngs::Request &command) { Authentication_handler::Response r; int8_t type = command.get_type(); if (type == Mysqlx::ClientMessages::SESS_AUTHENTICATE_START && m_auth_handler.get() == NULL) { const Mysqlx::Session::AuthenticateStart &authm = static_cast<const Mysqlx::Session::AuthenticateStart&>(*command.message()); log_debug("%s.%u: Login attempt: mechanism=%s auth_data=%s", m_client.client_id(), m_id, authm.mech_name().c_str(), authm.auth_data().c_str()); m_auth_handler = m_client.server().get_auth_handler(authm.mech_name(), this); if (!m_auth_handler.get()) { log_info("%s.%u: Invalid authentication method %s", m_client.client_id(), m_id, authm.mech_name().c_str()); m_encoder->send_init_error(ngs::Fatal(ER_NOT_SUPPORTED_AUTH_MODE, "Invalid authentication method %s", authm.mech_name().c_str())); stop_auth(); return true; } else { r = m_auth_handler->handle_start(authm.mech_name(), authm.auth_data(), authm.initial_response()); } } else if (type == Mysqlx::ClientMessages::SESS_AUTHENTICATE_CONTINUE && m_auth_handler.get()) { const Mysqlx::Session::AuthenticateContinue &authm = static_cast<const Mysqlx::Session::AuthenticateContinue&>(*command.message()); r = m_auth_handler->handle_continue(authm.auth_data()); } else { m_encoder->get_protocol_monitor().on_error_unknown_msg_type(); log_info("%s: Unexpected message of type %i received during authentication", m_client.client_id(), type); m_encoder->send_init_error(ngs::Fatal(ER_X_BAD_MESSAGE, "Invalid message")); stop_auth(); return false; } switch (r.status) { case Authentication_handler::Succeeded: on_auth_success(r); break; case Authentication_handler::Failed: on_auth_failure(r); break; default: m_encoder->send_auth_continue(r.data); } return true; } void Session::on_auth_success(const Authentication_handler::Response &response) { log_debug("%s.%u: Login succeeded", m_client.client_id(), m_id); m_auth_handler.reset(); m_state = Ready; m_client.on_session_auth_success(*this); m_encoder->send_auth_ok(response.data); // send it last, so that on_auth_success() can send session specific notices } void Session::on_auth_failure(const Authentication_handler::Response &response) { int error_code = ER_ACCESS_DENIED_ERROR; log_error("%s.%u: Unsuccessful login attempt: %s", m_client.client_id(), m_id, response.data.c_str()); if (can_forward_error_code_to_client(response.error_code)) { error_code = response.error_code; } m_encoder->send_init_error(ngs::Fatal(error_code, "%s", response.data.c_str())); stop_auth(); } bool Session::can_forward_error_code_to_client(const int error_code) { return ER_DBACCESS_DENIED_ERROR == error_code; }