@@ -212,19 +212,19 @@ typedef struct
212
212
int64 statementId ; /* Simple counter */
213
213
int64 substatementId ; /* Simple counter */
214
214
215
- LogStmtLevel logStmtLevel ; /* From GetCommandLogLevel when possible, */
216
- / * generated when not. */
215
+ LogStmtLevel logStmtLevel ; /* From GetCommandLogLevel when possible,
216
+ * generated when not. */
217
217
NodeTag commandTag ; /* same here */
218
218
const char * command ; /* same here */
219
- const char * objectType ; /* From event trigger when possible */
220
- /* generated when not. */
219
+ const char * objectType ; /* From event trigger when possible, generated
220
+ * when not. */
221
221
char * objectName ; /* Fully qualified object identification */
222
222
const char * commandText ; /* sourceText / queryString */
223
223
ParamListInfo paramList ; /* QueryDesc/ProcessUtility parameters */
224
224
225
225
bool granted ; /* Audit role has object permissions? */
226
- bool logged ; /* Track if we have logged this event, used */
227
- / * post-ProcessUtility to make sure we log */
226
+ bool logged ; /* Track if we have logged this event, used
227
+ * post-ProcessUtility to make sure we log */
228
228
bool statementLogged ; /* Track if we have logged the statement */
229
229
} AuditEvent ;
230
230
@@ -467,7 +467,7 @@ log_audit_event(AuditEventStackItem *stackItem)
467
467
/* Classify the statement using log stmt level and the command tag */
468
468
switch (stackItem -> auditEvent .logStmtLevel )
469
469
{
470
- /* All mods go in WRITE class, execpt EXECUTE */
470
+ /* All mods go in WRITE class, except EXECUTE */
471
471
case LOGSTMT_MOD :
472
472
className = CLASS_WRITE ;
473
473
class = LOG_WRITE ;
@@ -553,13 +553,14 @@ log_audit_event(AuditEventStackItem *stackItem)
553
553
break ;
554
554
}
555
555
556
- /*
556
+ /*----------
557
557
* Only log the statement if:
558
558
*
559
- * 1. If object was selected for audit logging (granted) 2. The statement
560
- * belongs to a class that is being logged
559
+ * 1. If object was selected for audit logging (granted), or
560
+ * 2. The statement belongs to a class that is being logged
561
561
*
562
562
* If neither of these is true, return.
563
+ *----------
563
564
*/
564
565
if (!stackItem -> auditEvent .granted && !(auditLogBitmap & class ))
565
566
return ;
@@ -979,57 +980,39 @@ log_select_dml(Oid auditOid, List *rangeTabls)
979
980
switch (rte -> relkind )
980
981
{
981
982
case RELKIND_RELATION :
982
- auditEventStack -> auditEvent .objectType =
983
- OBJECT_TYPE_TABLE ;
984
-
983
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_TABLE ;
985
984
break ;
986
985
987
986
case RELKIND_INDEX :
988
- auditEventStack -> auditEvent .objectType =
989
- OBJECT_TYPE_INDEX ;
990
-
987
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_INDEX ;
991
988
break ;
992
989
993
990
case RELKIND_SEQUENCE :
994
- auditEventStack -> auditEvent .objectType =
995
- OBJECT_TYPE_SEQUENCE ;
996
-
991
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_SEQUENCE ;
997
992
break ;
998
993
999
994
case RELKIND_TOASTVALUE :
1000
- auditEventStack -> auditEvent .objectType =
1001
- OBJECT_TYPE_TOASTVALUE ;
1002
-
995
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_TOASTVALUE ;
1003
996
break ;
1004
997
1005
998
case RELKIND_VIEW :
1006
- auditEventStack -> auditEvent .objectType =
1007
- OBJECT_TYPE_VIEW ;
1008
-
999
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_VIEW ;
1009
1000
break ;
1010
1001
1011
1002
case RELKIND_COMPOSITE_TYPE :
1012
- auditEventStack -> auditEvent .objectType =
1013
- OBJECT_TYPE_COMPOSITE_TYPE ;
1014
-
1003
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_COMPOSITE_TYPE ;
1015
1004
break ;
1016
1005
1017
1006
case RELKIND_FOREIGN_TABLE :
1018
- auditEventStack -> auditEvent .objectType =
1019
- OBJECT_TYPE_FOREIGN_TABLE ;
1020
-
1007
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_FOREIGN_TABLE ;
1021
1008
break ;
1022
1009
1023
1010
case RELKIND_MATVIEW :
1024
- auditEventStack -> auditEvent .objectType =
1025
- OBJECT_TYPE_MATVIEW ;
1026
-
1011
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_MATVIEW ;
1027
1012
break ;
1028
1013
1029
1014
default :
1030
- auditEventStack -> auditEvent .objectType =
1031
- OBJECT_TYPE_UNKNOWN ;
1032
-
1015
+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_UNKNOWN ;
1033
1016
break ;
1034
1017
}
1035
1018
@@ -1043,9 +1026,7 @@ log_select_dml(Oid auditOid, List *rangeTabls)
1043
1026
/* Perform object auditing only if the audit role is valid */
1044
1027
if (auditOid != InvalidOid )
1045
1028
{
1046
- AclMode auditPerms =
1047
- (ACL_SELECT | ACL_UPDATE | ACL_INSERT | ACL_DELETE ) &
1048
- rte -> requiredPerms ;
1029
+ AclMode auditPerms = (ACL_SELECT | ACL_UPDATE | ACL_INSERT | ACL_DELETE ) & rte -> requiredPerms ;
1049
1030
1050
1031
/*
1051
1032
* If any of the required permissions for the relation are granted
@@ -1166,7 +1147,6 @@ log_function_execute(Oid objectId)
1166
1147
stackItem -> auditEvent .commandTag = T_DoStmt ;
1167
1148
stackItem -> auditEvent .command = COMMAND_EXECUTE ;
1168
1149
stackItem -> auditEvent .objectType = OBJECT_TYPE_FUNCTION ;
1169
-
1170
1150
stackItem -> auditEvent .commandText = stackItem -> next -> auditEvent .commandText ;
1171
1151
1172
1152
log_audit_event (stackItem );
@@ -1459,8 +1439,7 @@ pg_audit_ddl_command_end(PG_FUNCTION_ARGS)
1459
1439
1460
1440
/* Supply object name and type for audit event */
1461
1441
auditEventStack -> auditEvent .objectType =
1462
- SPI_getvalue (spiTuple , spiTupDesc , 1 );
1463
-
1442
+ SPI_getvalue (spiTuple , spiTupDesc , 1 );
1464
1443
auditEventStack -> auditEvent .objectName =
1465
1444
SPI_getvalue (spiTuple , spiTupDesc , 2 );
1466
1445
@@ -1545,8 +1524,7 @@ pg_audit_sql_drop(PG_FUNCTION_ARGS)
1545
1524
spiTuple = SPI_tuptable -> vals [row ];
1546
1525
1547
1526
auditEventStack -> auditEvent .objectType =
1548
- SPI_getvalue (spiTuple , spiTupDesc , 1 );
1549
-
1527
+ SPI_getvalue (spiTuple , spiTupDesc , 1 );
1550
1528
auditEventStack -> auditEvent .objectName =
1551
1529
SPI_getvalue (spiTuple , spiTupDesc , 2 );
1552
1530
@@ -1603,16 +1581,14 @@ check_pg_audit_log(char **newVal, void **extra, GucSource source)
1603
1581
1604
1582
foreach (lt , flagRawList )
1605
1583
{
1584
+ char * token = (char * ) lfirst (lt );
1606
1585
bool subtract = false;
1607
1586
int class ;
1608
1587
1609
- /* Retrieve a token */
1610
- char * token = (char * ) lfirst (lt );
1611
-
1612
1588
/* If token is preceded by -, then the token is subtractive */
1613
- if (strstr ( token , "-" ) == token )
1589
+ if (token [ 0 ] == '-' )
1614
1590
{
1615
- token = token + 1 ;
1591
+ token ++ ;
1616
1592
subtract = true;
1617
1593
}
1618
1594
0 commit comments