2019-07-28 00:55:46 +00:00
|
|
|
#include "MySQLHandler.h"
|
|
|
|
|
|
|
|
#include <limits>
|
|
|
|
#include <ext/scope_guard.h>
|
|
|
|
#include <openssl/rsa.h>
|
2019-03-16 02:08:21 +00:00
|
|
|
#include <Columns/ColumnVector.h>
|
|
|
|
#include <Common/config_version.h>
|
|
|
|
#include <Common/NetException.h>
|
2019-05-26 06:52:29 +00:00
|
|
|
#include <Common/OpenSSLHelpers.h>
|
2019-07-28 00:55:46 +00:00
|
|
|
#include <Core/MySQLProtocol.h>
|
|
|
|
#include <Core/NamesAndTypes.h>
|
|
|
|
#include <DataStreams/copyData.h>
|
|
|
|
#include <Interpreters/executeQuery.h>
|
|
|
|
#include <IO/ReadBufferFromPocoSocket.h>
|
|
|
|
#include <IO/ReadBufferFromString.h>
|
|
|
|
#include <IO/WriteBufferFromPocoSocket.h>
|
2019-04-22 10:57:50 +00:00
|
|
|
#include <Poco/Crypto/CipherFactory.h>
|
2019-07-28 00:55:46 +00:00
|
|
|
#include <Poco/Crypto/RSAKey.h>
|
2019-04-29 06:05:30 +00:00
|
|
|
#include <Poco/Net/SecureStreamSocket.h>
|
|
|
|
#include <Poco/Net/SSLManager.h>
|
2019-07-28 00:55:46 +00:00
|
|
|
#include <Storages/IStorage.h>
|
2019-07-09 14:59:52 +00:00
|
|
|
|
2019-03-16 02:08:21 +00:00
|
|
|
|
|
|
|
namespace DB
|
|
|
|
{
|
2019-07-09 14:59:52 +00:00
|
|
|
|
2019-03-16 02:08:21 +00:00
|
|
|
using namespace MySQLProtocol;
|
2019-07-09 14:59:52 +00:00
|
|
|
|
|
|
|
|
2019-04-29 06:05:30 +00:00
|
|
|
using Poco::Net::SecureStreamSocket;
|
|
|
|
using Poco::Net::SSLManager;
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-09 14:59:52 +00:00
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
namespace ErrorCodes
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
2019-05-26 06:52:29 +00:00
|
|
|
extern const int MYSQL_CLIENT_INSUFFICIENT_CAPABILITIES;
|
|
|
|
extern const int OPENSSL_ERROR;
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-05-26 06:52:29 +00:00
|
|
|
MySQLHandler::MySQLHandler(IServer & server_, const Poco::Net::StreamSocket & socket_, RSA & public_key, RSA & private_key, bool ssl_enabled, size_t connection_id)
|
|
|
|
: Poco::Net::TCPServerConnection(socket_)
|
|
|
|
, server(server_)
|
|
|
|
, log(&Poco::Logger::get("MySQLHandler"))
|
|
|
|
, connection_context(server.context())
|
|
|
|
, connection_id(connection_id)
|
|
|
|
, public_key(public_key)
|
|
|
|
, private_key(private_key)
|
|
|
|
{
|
|
|
|
server_capability_flags = CLIENT_PROTOCOL_41 | CLIENT_SECURE_CONNECTION | CLIENT_PLUGIN_AUTH | CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA | CLIENT_CONNECT_WITH_DB | CLIENT_DEPRECATE_EOF;
|
|
|
|
if (ssl_enabled)
|
|
|
|
server_capability_flags |= CLIENT_SSL;
|
|
|
|
}
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
void MySQLHandler::run()
|
|
|
|
{
|
2019-07-08 00:51:43 +00:00
|
|
|
connection_context.makeSessionContext();
|
2019-05-26 06:52:29 +00:00
|
|
|
connection_context.setDefaultFormat("MySQLWire");
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-05-16 03:34:04 +00:00
|
|
|
in = std::make_shared<ReadBufferFromPocoSocket>(socket());
|
|
|
|
out = std::make_shared<WriteBufferFromPocoSocket>(socket());
|
2019-07-16 06:39:18 +00:00
|
|
|
packet_sender = std::make_shared<PacketSender>(*in, *out, connection_context.mysql.sequence_id);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
|
|
|
try
|
|
|
|
{
|
2019-04-22 10:57:50 +00:00
|
|
|
String scramble = generateScramble();
|
|
|
|
|
2019-07-28 00:41:41 +00:00
|
|
|
Handshake handshake(server_capability_flags, connection_id, VERSION_STRING + String("-") + VERSION_NAME, Authentication::Native, scramble + '\0');
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sendPacket<Handshake>(handshake, true);
|
2019-03-26 18:30:41 +00:00
|
|
|
|
|
|
|
LOG_TRACE(log, "Sent handshake");
|
|
|
|
|
2019-07-01 05:58:31 +00:00
|
|
|
HandshakeResponse handshake_response;
|
|
|
|
finishHandshake(handshake_response);
|
2019-07-16 06:39:18 +00:00
|
|
|
connection_context.mysql.client_capabilities = handshake_response.capability_flags;
|
2019-05-16 17:15:43 +00:00
|
|
|
if (handshake_response.max_packet_size)
|
2019-07-16 06:39:18 +00:00
|
|
|
connection_context.mysql.max_packet_size = handshake_response.max_packet_size;
|
|
|
|
if (!connection_context.mysql.max_packet_size)
|
|
|
|
connection_context.mysql.max_packet_size = MAX_PACKET_LENGTH;
|
2019-03-26 18:30:41 +00:00
|
|
|
|
|
|
|
LOG_DEBUG(log, "Capabilities: " << handshake_response.capability_flags
|
|
|
|
<< "\nmax_packet_size: "
|
|
|
|
<< handshake_response.max_packet_size
|
|
|
|
<< "\ncharacter_set: "
|
|
|
|
<< handshake_response.character_set
|
|
|
|
<< "\nuser: "
|
|
|
|
<< handshake_response.username
|
|
|
|
<< "\nauth_response length: "
|
|
|
|
<< handshake_response.auth_response.length()
|
|
|
|
<< "\nauth_response: "
|
|
|
|
<< handshake_response.auth_response
|
|
|
|
<< "\ndatabase: "
|
|
|
|
<< handshake_response.database
|
|
|
|
<< "\nauth_plugin_name: "
|
|
|
|
<< handshake_response.auth_plugin_name);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-05-26 06:52:29 +00:00
|
|
|
client_capability_flags = handshake_response.capability_flags;
|
|
|
|
if (!(client_capability_flags & CLIENT_PROTOCOL_41))
|
2019-03-26 18:30:41 +00:00
|
|
|
throw Exception("Required capability: CLIENT_PROTOCOL_41.", ErrorCodes::MYSQL_CLIENT_INSUFFICIENT_CAPABILITIES);
|
2019-05-26 06:52:29 +00:00
|
|
|
if (!(client_capability_flags & CLIENT_PLUGIN_AUTH))
|
2019-03-26 18:30:41 +00:00
|
|
|
throw Exception("Required capability: CLIENT_PLUGIN_AUTH.", ErrorCodes::MYSQL_CLIENT_INSUFFICIENT_CAPABILITIES);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-04-22 10:57:50 +00:00
|
|
|
authenticate(handshake_response, scramble);
|
2019-05-16 05:36:08 +00:00
|
|
|
OK_Packet ok_packet(0, handshake_response.capability_flags, 0, 0, 0);
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sendPacket(ok_packet, true);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-05-26 19:30:23 +00:00
|
|
|
while (true)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->resetSequenceId();
|
2019-07-14 22:13:56 +00:00
|
|
|
PacketPayloadReadBuffer payload = packet_sender->getPayload();
|
|
|
|
|
2019-07-19 18:29:39 +00:00
|
|
|
char command = 0;
|
2019-07-19 18:46:57 +00:00
|
|
|
payload.readStrict(command);
|
2019-07-14 22:13:56 +00:00
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
// For commands which are executed without MemoryTracker.
|
|
|
|
LimitReadBuffer limited_payload(payload, 10000, true, "too long MySQL packet.");
|
|
|
|
|
2019-07-19 18:29:39 +00:00
|
|
|
LOG_DEBUG(log, "Received command: " << static_cast<int>(static_cast<unsigned char>(command)) << ". Connection id: " << connection_id << ".");
|
2019-03-26 18:30:41 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
switch (command)
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
case COM_QUIT:
|
|
|
|
return;
|
|
|
|
case COM_INIT_DB:
|
2019-07-19 17:50:42 +00:00
|
|
|
comInitDB(limited_payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
break;
|
|
|
|
case COM_QUERY:
|
2019-07-14 22:13:56 +00:00
|
|
|
comQuery(payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
break;
|
|
|
|
case COM_FIELD_LIST:
|
2019-07-19 17:50:42 +00:00
|
|
|
comFieldList(limited_payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
break;
|
|
|
|
case COM_PING:
|
|
|
|
comPing();
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
throw Exception(Poco::format("Command %d is not implemented.", command), ErrorCodes::NOT_IMPLEMENTED);
|
|
|
|
}
|
|
|
|
}
|
2019-03-26 18:30:41 +00:00
|
|
|
catch (const NetException & exc)
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
log->log(exc);
|
|
|
|
throw;
|
|
|
|
}
|
2019-03-26 18:30:41 +00:00
|
|
|
catch (const Exception & exc)
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
log->log(exc);
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sendPacket(ERR_Packet(exc.code(), "00000", exc.message()), true);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-07-19 17:50:42 +00:00
|
|
|
catch (const Poco::Exception & exc)
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
|
|
|
log->log(exc);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-16 03:34:04 +00:00
|
|
|
/** Reads 3 bytes, finds out whether it is SSLRequest or HandshakeResponse packet, starts secure connection, if it is SSLRequest.
|
2019-05-16 17:15:43 +00:00
|
|
|
* Reading is performed from socket instead of ReadBuffer to prevent reading part of SSL handshake.
|
2019-05-16 03:34:04 +00:00
|
|
|
* If we read it from socket, it will be impossible to start SSL connection using Poco. Size of SSLRequest packet payload is 32 bytes, thus we can read at most 36 bytes.
|
|
|
|
*/
|
2019-07-01 05:58:31 +00:00
|
|
|
void MySQLHandler::finishHandshake(MySQLProtocol::HandshakeResponse & packet)
|
2019-04-29 06:05:30 +00:00
|
|
|
{
|
2019-05-16 17:15:43 +00:00
|
|
|
size_t packet_size = PACKET_HEADER_SIZE + SSL_REQUEST_PAYLOAD_SIZE;
|
|
|
|
|
|
|
|
/// Buffer for SSLRequest or part of HandshakeResponse.
|
|
|
|
char buf[packet_size];
|
2019-04-29 06:05:30 +00:00
|
|
|
size_t pos = 0;
|
2019-05-16 17:15:43 +00:00
|
|
|
|
|
|
|
/// Reads at least count and at most packet_size bytes.
|
|
|
|
auto read_bytes = [this, &buf, &pos, &packet_size](size_t count) -> void {
|
|
|
|
while (pos < count)
|
2019-04-29 06:37:39 +00:00
|
|
|
{
|
2019-05-16 17:15:43 +00:00
|
|
|
int ret = socket().receiveBytes(buf + pos, packet_size - pos);
|
|
|
|
if (ret == 0)
|
|
|
|
{
|
|
|
|
throw Exception("Cannot read all data. Bytes read: " + std::to_string(pos) + ". Bytes expected: 3.", ErrorCodes::CANNOT_READ_ALL_DATA);
|
|
|
|
}
|
|
|
|
pos += ret;
|
2019-04-29 06:05:30 +00:00
|
|
|
}
|
2019-05-16 17:15:43 +00:00
|
|
|
};
|
|
|
|
read_bytes(3); /// We can find out whether it is SSLRequest of HandshakeResponse by first 3 bytes.
|
2019-04-29 06:05:30 +00:00
|
|
|
|
2019-05-26 06:52:29 +00:00
|
|
|
size_t payload_size = unalignedLoad<uint32_t>(buf) & 0xFFFFFFu;
|
2019-05-16 17:15:43 +00:00
|
|
|
LOG_TRACE(log, "payload size: " << payload_size);
|
2019-05-16 03:34:04 +00:00
|
|
|
|
2019-05-16 17:15:43 +00:00
|
|
|
if (payload_size == SSL_REQUEST_PAYLOAD_SIZE)
|
2019-04-29 06:37:39 +00:00
|
|
|
{
|
2019-05-16 17:15:43 +00:00
|
|
|
read_bytes(packet_size); /// Reading rest SSLRequest.
|
|
|
|
SSLRequest ssl_request;
|
2019-07-14 22:13:56 +00:00
|
|
|
ReadBufferFromMemory payload(buf, pos);
|
|
|
|
payload.ignore(PACKET_HEADER_SIZE);
|
|
|
|
ssl_request.readPayload(payload);
|
2019-07-16 06:39:18 +00:00
|
|
|
connection_context.mysql.client_capabilities = ssl_request.capability_flags;
|
|
|
|
connection_context.mysql.max_packet_size = ssl_request.max_packet_size ? ssl_request.max_packet_size : MAX_PACKET_LENGTH;
|
2019-04-29 06:05:30 +00:00
|
|
|
secure_connection = true;
|
2019-05-16 03:34:04 +00:00
|
|
|
ss = std::make_shared<SecureStreamSocket>(SecureStreamSocket::attach(socket(), SSLManager::instance().defaultServerContext()));
|
|
|
|
in = std::make_shared<ReadBufferFromPocoSocket>(*ss);
|
|
|
|
out = std::make_shared<WriteBufferFromPocoSocket>(*ss);
|
2019-07-16 06:39:18 +00:00
|
|
|
connection_context.mysql.sequence_id = 2;
|
|
|
|
packet_sender = std::make_shared<PacketSender>(*in, *out, connection_context.mysql.sequence_id);
|
|
|
|
packet_sender->max_packet_size = connection_context.mysql.max_packet_size;
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->receivePacket(packet); /// Reading HandshakeResponse from secure socket.
|
2019-04-29 06:37:39 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2019-05-16 03:34:04 +00:00
|
|
|
/// Reading rest of HandshakeResponse.
|
2019-05-16 17:15:43 +00:00
|
|
|
packet_size = PACKET_HEADER_SIZE + payload_size;
|
2019-07-14 22:13:56 +00:00
|
|
|
WriteBufferFromOwnString buf_for_handshake_response;
|
2019-05-16 17:15:43 +00:00
|
|
|
buf_for_handshake_response.write(buf, pos);
|
|
|
|
copyData(*packet_sender->in, buf_for_handshake_response, packet_size - pos);
|
2019-07-14 22:13:56 +00:00
|
|
|
ReadBufferFromString payload(buf_for_handshake_response.str());
|
|
|
|
payload.ignore(PACKET_HEADER_SIZE);
|
|
|
|
packet.readPayload(payload);
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sequence_id++;
|
2019-04-29 06:05:30 +00:00
|
|
|
}
|
|
|
|
}
|
2019-04-22 10:57:50 +00:00
|
|
|
|
|
|
|
String MySQLHandler::generateScramble()
|
|
|
|
{
|
|
|
|
String scramble(MySQLProtocol::SCRAMBLE_LENGTH, 0);
|
|
|
|
Poco::RandomInputStream generator;
|
2019-04-29 06:37:39 +00:00
|
|
|
for (size_t i = 0; i < scramble.size(); i++)
|
|
|
|
{
|
2019-04-22 10:57:50 +00:00
|
|
|
generator >> scramble[i];
|
|
|
|
}
|
|
|
|
return scramble;
|
|
|
|
}
|
|
|
|
|
2019-04-29 06:37:39 +00:00
|
|
|
void MySQLHandler::authenticate(const HandshakeResponse & handshake_response, const String & scramble)
|
|
|
|
{
|
2019-04-22 10:57:50 +00:00
|
|
|
|
|
|
|
String auth_response;
|
|
|
|
AuthSwitchResponse response;
|
2019-05-16 17:15:43 +00:00
|
|
|
if (handshake_response.auth_plugin_name != Authentication::SHA256)
|
2019-04-29 06:37:39 +00:00
|
|
|
{
|
2019-07-28 00:41:41 +00:00
|
|
|
/** Native authentication sent 20 bytes + '\0' character = 21 bytes.
|
|
|
|
* This plugin must do the same to stay consistent with historical behavior if it is set to operate as a default plugin.
|
|
|
|
* https://github.com/mysql/mysql-server/blob/8.0/sql/auth/sql_authentication.cc#L3994
|
|
|
|
*/
|
2019-05-16 17:15:43 +00:00
|
|
|
packet_sender->sendPacket(AuthSwitchRequest(Authentication::SHA256, scramble + '\0'), true);
|
2019-05-25 16:11:54 +00:00
|
|
|
if (in->eof())
|
|
|
|
throw Exception(
|
|
|
|
"Client doesn't support authentication method " + String(Authentication::SHA256) + " used by ClickHouse",
|
|
|
|
ErrorCodes::MYSQL_CLIENT_INSUFFICIENT_CAPABILITIES);
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->receivePacket(response);
|
2019-04-22 10:57:50 +00:00
|
|
|
auth_response = response.value;
|
|
|
|
LOG_TRACE(log, "Authentication method mismatch.");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
auth_response = handshake_response.auth_response;
|
|
|
|
LOG_TRACE(log, "Authentication method match.");
|
|
|
|
}
|
|
|
|
|
2019-05-16 17:15:43 +00:00
|
|
|
if (auth_response == "\1")
|
2019-04-22 10:57:50 +00:00
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Client requests public key.");
|
2019-05-17 13:00:09 +00:00
|
|
|
|
2019-04-22 10:57:50 +00:00
|
|
|
BIO * mem = BIO_new(BIO_s_mem());
|
2019-05-26 06:52:29 +00:00
|
|
|
SCOPE_EXIT(BIO_free(mem));
|
|
|
|
if (PEM_write_bio_RSA_PUBKEY(mem, &public_key) != 1)
|
2019-04-22 10:57:50 +00:00
|
|
|
{
|
2019-05-26 06:52:29 +00:00
|
|
|
throw Exception("Failed to write public key to memory. Error: " + getOpenSSLErrors(), ErrorCodes::OPENSSL_ERROR);
|
2019-04-22 10:57:50 +00:00
|
|
|
}
|
|
|
|
char * pem_buf = nullptr;
|
|
|
|
long pem_size = BIO_get_mem_data(mem, &pem_buf);
|
|
|
|
String pem(pem_buf, pem_size);
|
|
|
|
|
|
|
|
LOG_TRACE(log, "Key: " << pem);
|
|
|
|
|
|
|
|
AuthMoreData data(pem);
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sendPacket(data, true);
|
|
|
|
packet_sender->receivePacket(response);
|
2019-04-22 10:57:50 +00:00
|
|
|
auth_response = response.value;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Client didn't request public key.");
|
|
|
|
}
|
|
|
|
|
|
|
|
String password;
|
|
|
|
|
|
|
|
/** Decrypt password, if it's not empty.
|
|
|
|
* The original intention was that the password is a string[NUL] but this never got enforced properly so now we have to accept that
|
|
|
|
* an empty packet is a blank password, thus the check for auth_response.empty() has to be made too.
|
|
|
|
* https://github.com/mysql/mysql-server/blob/8.0/sql/auth/sql_authentication.cc#L4017
|
|
|
|
*/
|
2019-05-26 06:52:29 +00:00
|
|
|
if (!secure_connection && !auth_response.empty() && auth_response != String("\0", 1))
|
2019-04-22 10:57:50 +00:00
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Received nonempty password");
|
|
|
|
auto ciphertext = reinterpret_cast<unsigned char *>(auth_response.data());
|
|
|
|
|
2019-05-26 06:52:29 +00:00
|
|
|
unsigned char plaintext[RSA_size(&private_key)];
|
|
|
|
int plaintext_size = RSA_private_decrypt(auth_response.size(), ciphertext, plaintext, &private_key, RSA_PKCS1_OAEP_PADDING);
|
2019-04-22 10:57:50 +00:00
|
|
|
if (plaintext_size == -1)
|
|
|
|
{
|
2019-05-26 06:52:29 +00:00
|
|
|
throw Exception("Failed to decrypt auth data. Error: " + getOpenSSLErrors(), ErrorCodes::OPENSSL_ERROR);
|
2019-04-22 10:57:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
password.resize(plaintext_size);
|
2019-04-29 06:37:39 +00:00
|
|
|
for (int i = 0; i < plaintext_size; i++)
|
|
|
|
{
|
2019-04-22 10:57:50 +00:00
|
|
|
password[i] = plaintext[i] ^ static_cast<unsigned char>(scramble[i % scramble.size()]);
|
|
|
|
}
|
|
|
|
}
|
2019-04-29 06:05:30 +00:00
|
|
|
else if (secure_connection)
|
|
|
|
{
|
|
|
|
password = auth_response;
|
|
|
|
}
|
2019-04-22 10:57:50 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Received empty password");
|
|
|
|
}
|
|
|
|
|
2019-07-21 12:09:41 +00:00
|
|
|
if (!password.empty() && password.back() == 0)
|
2019-04-29 06:37:39 +00:00
|
|
|
{
|
2019-07-21 12:09:41 +00:00
|
|
|
password.pop_back();
|
2019-04-22 10:57:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
connection_context.setUser(handshake_response.username, password, socket().address(), "");
|
2019-06-16 15:12:37 +00:00
|
|
|
if (!handshake_response.database.empty()) connection_context.setCurrentDatabase(handshake_response.database);
|
2019-04-22 10:57:50 +00:00
|
|
|
connection_context.setCurrentQueryId("");
|
2019-07-18 04:54:26 +00:00
|
|
|
LOG_INFO(log, "Authentication for user " << handshake_response.username << " succeeded.");
|
2019-04-22 10:57:50 +00:00
|
|
|
}
|
|
|
|
catch (const Exception & exc)
|
|
|
|
{
|
|
|
|
LOG_ERROR(log, "Authentication for user " << handshake_response.username << " failed.");
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sendPacket(ERR_Packet(exc.code(), "00000", exc.message()), true);
|
2019-04-22 10:57:50 +00:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void MySQLHandler::comInitDB(ReadBuffer & payload)
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
String database;
|
|
|
|
readStringUntilEOF(database, payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
LOG_DEBUG(log, "Setting current database to " << database);
|
|
|
|
connection_context.setCurrentDatabase(database);
|
2019-05-26 06:52:29 +00:00
|
|
|
packet_sender->sendPacket(OK_Packet(0, client_capability_flags, 0, 0, 1), true);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void MySQLHandler::comFieldList(ReadBuffer & payload)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
ComFieldList packet;
|
2019-07-14 22:13:56 +00:00
|
|
|
packet.readPayload(payload);
|
2019-03-26 18:30:41 +00:00
|
|
|
String database = connection_context.getCurrentDatabase();
|
|
|
|
StoragePtr tablePtr = connection_context.getTable(database, packet.table);
|
2019-03-16 02:08:21 +00:00
|
|
|
for (const NameAndTypePair & column: tablePtr->getColumns().getAll())
|
|
|
|
{
|
|
|
|
ColumnDefinition column_definition(
|
2019-03-26 18:30:41 +00:00
|
|
|
database, packet.table, packet.table, column.name, column.name, CharacterSet::binary, 100, ColumnType::MYSQL_TYPE_STRING, 0, 0
|
2019-03-16 02:08:21 +00:00
|
|
|
);
|
2019-05-16 03:34:04 +00:00
|
|
|
packet_sender->sendPacket(column_definition);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
2019-05-26 06:52:29 +00:00
|
|
|
packet_sender->sendPacket(OK_Packet(0xfe, client_capability_flags, 0, 0, 0), true);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
void MySQLHandler::comPing()
|
|
|
|
{
|
2019-05-26 06:52:29 +00:00
|
|
|
packet_sender->sendPacket(OK_Packet(0x0, client_capability_flags, 0, 0, 0), true);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void MySQLHandler::comQuery(ReadBuffer & payload)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-05-16 03:34:04 +00:00
|
|
|
bool with_output = false;
|
|
|
|
std::function<void(const String &)> set_content_type = [&with_output](const String &) -> void {
|
|
|
|
with_output = true;
|
|
|
|
};
|
2019-05-25 16:15:38 +00:00
|
|
|
|
2019-07-18 04:54:26 +00:00
|
|
|
const String query("select ''");
|
|
|
|
ReadBufferFromString empty_select(query);
|
2019-07-16 07:11:59 +00:00
|
|
|
|
|
|
|
bool should_replace = false;
|
|
|
|
// Translate query from MySQL to ClickHouse.
|
|
|
|
// This is a temporary workaround until ClickHouse supports the syntax "@@var_name".
|
|
|
|
if (std::string(payload.position(), payload.buffer().end()) == "select @@version_comment limit 1") // MariaDB client starts session with that query
|
|
|
|
{
|
|
|
|
should_replace = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
executeQuery(should_replace ? empty_select : payload, *out, true, connection_context, set_content_type, nullptr);
|
2019-07-14 08:22:55 +00:00
|
|
|
|
2019-05-16 03:45:17 +00:00
|
|
|
if (!with_output)
|
2019-05-26 06:52:29 +00:00
|
|
|
packet_sender->sendPacket(OK_Packet(0x00, client_capability_flags, 0, 0, 0), true);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|