ClickHouse/dbms/programs/server/MySQLHandler.cpp

303 lines
12 KiB
C++
Raw Normal View History

2019-07-28 00:55:46 +00:00
#include "MySQLHandler.h"
#include <limits>
#include <ext/scope_guard.h>
2019-03-16 02:08:21 +00:00
#include <Columns/ColumnVector.h>
#include <Common/config_version.h>
#include <Common/NetException.h>
2019-05-26 06:52:29 +00:00
#include <Common/OpenSSLHelpers.h>
2019-07-28 00:55:46 +00:00
#include <Core/MySQLProtocol.h>
#include <Core/NamesAndTypes.h>
#include <DataStreams/copyData.h>
#include <Interpreters/executeQuery.h>
#include <IO/ReadBufferFromPocoSocket.h>
#include <IO/ReadBufferFromString.h>
#include <IO/WriteBufferFromPocoSocket.h>
#include <Poco/Crypto/CipherFactory.h>
2019-07-28 00:55:46 +00:00
#include <Poco/Crypto/RSAKey.h>
2019-04-29 06:05:30 +00:00
#include <Poco/Net/SecureStreamSocket.h>
#include <Poco/Net/SSLManager.h>
2019-07-28 00:55:46 +00:00
#include <Storages/IStorage.h>
2019-03-16 02:08:21 +00:00
namespace DB
{
2019-03-16 02:08:21 +00:00
using namespace MySQLProtocol;
2019-04-29 06:05:30 +00:00
using Poco::Net::SecureStreamSocket;
using Poco::Net::SSLManager;
2019-03-16 02:08:21 +00:00
namespace ErrorCodes
2019-03-16 02:08:21 +00:00
{
2019-05-26 06:52:29 +00:00
extern const int MYSQL_CLIENT_INSUFFICIENT_CAPABILITIES;
extern const int OPENSSL_ERROR;
2019-03-16 02:08:21 +00:00
}
2019-08-03 11:02:40 +00:00
MySQLHandler::MySQLHandler(IServer & server_, const Poco::Net::StreamSocket & socket_, RSA & public_key_, RSA & private_key_, bool ssl_enabled, size_t connection_id_)
2019-05-26 06:52:29 +00:00
: Poco::Net::TCPServerConnection(socket_)
, server(server_)
, log(&Poco::Logger::get("MySQLHandler"))
, connection_context(server.context())
2019-08-03 11:02:40 +00:00
, connection_id(connection_id_)
, public_key(public_key_)
, private_key(private_key_)
, auth_plugin(new Authentication::Native41())
2019-05-26 06:52:29 +00:00
{
server_capability_flags = CLIENT_PROTOCOL_41 | CLIENT_SECURE_CONNECTION | CLIENT_PLUGIN_AUTH | CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA | CLIENT_CONNECT_WITH_DB | CLIENT_DEPRECATE_EOF;
if (ssl_enabled)
server_capability_flags |= CLIENT_SSL;
}
2019-03-16 02:08:21 +00:00
void MySQLHandler::run()
{
2019-07-08 00:51:43 +00:00
connection_context.makeSessionContext();
2019-05-26 06:52:29 +00:00
connection_context.setDefaultFormat("MySQLWire");
2019-03-16 02:08:21 +00:00
in = std::make_shared<ReadBufferFromPocoSocket>(socket());
out = std::make_shared<WriteBufferFromPocoSocket>(socket());
2019-07-16 06:39:18 +00:00
packet_sender = std::make_shared<PacketSender>(*in, *out, connection_context.mysql.sequence_id);
2019-03-16 02:08:21 +00:00
try
{
Handshake handshake(server_capability_flags, connection_id, VERSION_STRING + String("-") + VERSION_NAME, auth_plugin->getName(), auth_plugin->getAuthPluginData());
packet_sender->sendPacket<Handshake>(handshake, true);
LOG_TRACE(log, "Sent handshake");
HandshakeResponse handshake_response;
finishHandshake(handshake_response);
2019-07-16 06:39:18 +00:00
connection_context.mysql.client_capabilities = handshake_response.capability_flags;
2019-05-16 17:15:43 +00:00
if (handshake_response.max_packet_size)
2019-07-16 06:39:18 +00:00
connection_context.mysql.max_packet_size = handshake_response.max_packet_size;
if (!connection_context.mysql.max_packet_size)
connection_context.mysql.max_packet_size = MAX_PACKET_LENGTH;
/* LOG_TRACE(log, "Capabilities: " << handshake_response.capability_flags
<< "\nmax_packet_size: "
<< handshake_response.max_packet_size
<< "\ncharacter_set: "
<< handshake_response.character_set
<< "\nuser: "
<< handshake_response.username
<< "\nauth_response length: "
<< handshake_response.auth_response.length()
<< "\nauth_response: "
<< handshake_response.auth_response
<< "\ndatabase: "
<< handshake_response.database
<< "\nauth_plugin_name: "
<< handshake_response.auth_plugin_name);*/
2019-03-16 02:08:21 +00:00
2019-05-26 06:52:29 +00:00
client_capability_flags = handshake_response.capability_flags;
if (!(client_capability_flags & CLIENT_PROTOCOL_41))
throw Exception("Required capability: CLIENT_PROTOCOL_41.", ErrorCodes::MYSQL_CLIENT_INSUFFICIENT_CAPABILITIES);
2019-03-16 02:08:21 +00:00
authenticate(handshake_response.username, handshake_response.auth_plugin_name, handshake_response.auth_response);
try
{
if (!handshake_response.database.empty())
connection_context.setCurrentDatabase(handshake_response.database);
connection_context.setCurrentQueryId("");
}
catch (const Exception & exc)
{
log->log(exc);
packet_sender->sendPacket(ERR_Packet(exc.code(), "00000", exc.message()), true);
}
OK_Packet ok_packet(0, handshake_response.capability_flags, 0, 0, 0);
packet_sender->sendPacket(ok_packet, true);
2019-03-16 02:08:21 +00:00
2019-05-26 19:30:23 +00:00
while (true)
{
packet_sender->resetSequenceId();
2019-07-14 22:13:56 +00:00
PacketPayloadReadBuffer payload = packet_sender->getPayload();
2019-07-19 18:29:39 +00:00
char command = 0;
2019-07-19 18:46:57 +00:00
payload.readStrict(command);
2019-07-14 22:13:56 +00:00
// For commands which are executed without MemoryTracker.
LimitReadBuffer limited_payload(payload, 10000, true, "too long MySQL packet.");
2019-07-19 18:29:39 +00:00
LOG_DEBUG(log, "Received command: " << static_cast<int>(static_cast<unsigned char>(command)) << ". Connection id: " << connection_id << ".");
try
{
switch (command)
{
2019-03-16 02:08:21 +00:00
case COM_QUIT:
return;
case COM_INIT_DB:
comInitDB(limited_payload);
2019-03-16 02:08:21 +00:00
break;
case COM_QUERY:
2019-07-14 22:13:56 +00:00
comQuery(payload);
2019-03-16 02:08:21 +00:00
break;
case COM_FIELD_LIST:
comFieldList(limited_payload);
2019-03-16 02:08:21 +00:00
break;
case COM_PING:
comPing();
break;
default:
throw Exception(Poco::format("Command %d is not implemented.", command), ErrorCodes::NOT_IMPLEMENTED);
}
}
catch (const NetException & exc)
{
2019-03-16 02:08:21 +00:00
log->log(exc);
throw;
}
catch (const Exception & exc)
{
2019-03-16 02:08:21 +00:00
log->log(exc);
packet_sender->sendPacket(ERR_Packet(exc.code(), "00000", exc.message()), true);
2019-03-16 02:08:21 +00:00
}
}
}
catch (const Poco::Exception & exc)
2019-03-16 02:08:21 +00:00
{
log->log(exc);
}
}
/** Reads 3 bytes, finds out whether it is SSLRequest or HandshakeResponse packet, starts secure connection, if it is SSLRequest.
2019-05-16 17:15:43 +00:00
* Reading is performed from socket instead of ReadBuffer to prevent reading part of SSL handshake.
* If we read it from socket, it will be impossible to start SSL connection using Poco. Size of SSLRequest packet payload is 32 bytes, thus we can read at most 36 bytes.
*/
void MySQLHandler::finishHandshake(MySQLProtocol::HandshakeResponse & packet)
2019-04-29 06:05:30 +00:00
{
2019-05-16 17:15:43 +00:00
size_t packet_size = PACKET_HEADER_SIZE + SSL_REQUEST_PAYLOAD_SIZE;
/// Buffer for SSLRequest or part of HandshakeResponse.
char buf[packet_size];
2019-04-29 06:05:30 +00:00
size_t pos = 0;
2019-05-16 17:15:43 +00:00
/// Reads at least count and at most packet_size bytes.
auto read_bytes = [this, &buf, &pos, &packet_size](size_t count) -> void {
while (pos < count)
2019-04-29 06:37:39 +00:00
{
2019-05-16 17:15:43 +00:00
int ret = socket().receiveBytes(buf + pos, packet_size - pos);
if (ret == 0)
{
throw Exception("Cannot read all data. Bytes read: " + std::to_string(pos) + ". Bytes expected: 3.", ErrorCodes::CANNOT_READ_ALL_DATA);
}
pos += ret;
2019-04-29 06:05:30 +00:00
}
2019-05-16 17:15:43 +00:00
};
read_bytes(3); /// We can find out whether it is SSLRequest of HandshakeResponse by first 3 bytes.
2019-04-29 06:05:30 +00:00
2019-05-26 06:52:29 +00:00
size_t payload_size = unalignedLoad<uint32_t>(buf) & 0xFFFFFFu;
2019-05-16 17:15:43 +00:00
LOG_TRACE(log, "payload size: " << payload_size);
2019-05-16 17:15:43 +00:00
if (payload_size == SSL_REQUEST_PAYLOAD_SIZE)
2019-04-29 06:37:39 +00:00
{
2019-05-16 17:15:43 +00:00
read_bytes(packet_size); /// Reading rest SSLRequest.
SSLRequest ssl_request;
2019-07-14 22:13:56 +00:00
ReadBufferFromMemory payload(buf, pos);
payload.ignore(PACKET_HEADER_SIZE);
ssl_request.readPayload(payload);
2019-07-16 06:39:18 +00:00
connection_context.mysql.client_capabilities = ssl_request.capability_flags;
connection_context.mysql.max_packet_size = ssl_request.max_packet_size ? ssl_request.max_packet_size : MAX_PACKET_LENGTH;
2019-04-29 06:05:30 +00:00
secure_connection = true;
ss = std::make_shared<SecureStreamSocket>(SecureStreamSocket::attach(socket(), SSLManager::instance().defaultServerContext()));
in = std::make_shared<ReadBufferFromPocoSocket>(*ss);
out = std::make_shared<WriteBufferFromPocoSocket>(*ss);
2019-07-16 06:39:18 +00:00
connection_context.mysql.sequence_id = 2;
packet_sender = std::make_shared<PacketSender>(*in, *out, connection_context.mysql.sequence_id);
packet_sender->max_packet_size = connection_context.mysql.max_packet_size;
packet_sender->receivePacket(packet); /// Reading HandshakeResponse from secure socket.
2019-04-29 06:37:39 +00:00
}
else
{
/// Reading rest of HandshakeResponse.
2019-05-16 17:15:43 +00:00
packet_size = PACKET_HEADER_SIZE + payload_size;
2019-07-14 22:13:56 +00:00
WriteBufferFromOwnString buf_for_handshake_response;
2019-05-16 17:15:43 +00:00
buf_for_handshake_response.write(buf, pos);
copyData(*packet_sender->in, buf_for_handshake_response, packet_size - pos);
2019-07-14 22:13:56 +00:00
ReadBufferFromString payload(buf_for_handshake_response.str());
payload.ignore(PACKET_HEADER_SIZE);
packet.readPayload(payload);
packet_sender->sequence_id++;
2019-04-29 06:05:30 +00:00
}
}
void MySQLHandler::authenticate(const String & user_name, const String & auth_plugin_name, const String & initial_auth_response)
{
// For compatibility with JavaScript MySQL client, Native41 authentication plugin is used when possible (if password is specified using double SHA1). Otherwise SHA256 plugin is used.
auto user = connection_context.getUser(user_name);
if (user->password_double_sha1_hex.empty())
auth_plugin = std::make_unique<Authentication::Sha256Password>(public_key, private_key, log);
try {
std::optional<String> auth_response = auth_plugin_name == auth_plugin->getName() ? std::make_optional<String>(initial_auth_response) : std::nullopt;
auth_plugin->authenticate(user_name, auth_response, connection_context, packet_sender, secure_connection, socket().address());
}
catch (const Exception & exc)
{
LOG_ERROR(log, "Authentication for user " << user_name << " failed.");
packet_sender->sendPacket(ERR_Packet(exc.code(), "00000", exc.message()), true);
throw;
}
LOG_INFO(log, "Authentication for user " << user_name << " succeeded.");
}
2019-07-14 22:13:56 +00:00
void MySQLHandler::comInitDB(ReadBuffer & payload)
2019-03-16 02:08:21 +00:00
{
2019-07-14 22:13:56 +00:00
String database;
readStringUntilEOF(database, payload);
2019-03-16 02:08:21 +00:00
LOG_DEBUG(log, "Setting current database to " << database);
connection_context.setCurrentDatabase(database);
2019-05-26 06:52:29 +00:00
packet_sender->sendPacket(OK_Packet(0, client_capability_flags, 0, 0, 1), true);
2019-03-16 02:08:21 +00:00
}
2019-07-14 22:13:56 +00:00
void MySQLHandler::comFieldList(ReadBuffer & payload)
{
2019-03-16 02:08:21 +00:00
ComFieldList packet;
2019-07-14 22:13:56 +00:00
packet.readPayload(payload);
String database = connection_context.getCurrentDatabase();
StoragePtr tablePtr = connection_context.getTable(database, packet.table);
2019-03-16 02:08:21 +00:00
for (const NameAndTypePair & column: tablePtr->getColumns().getAll())
{
ColumnDefinition column_definition(
database, packet.table, packet.table, column.name, column.name, CharacterSet::binary, 100, ColumnType::MYSQL_TYPE_STRING, 0, 0
2019-03-16 02:08:21 +00:00
);
packet_sender->sendPacket(column_definition);
2019-03-16 02:08:21 +00:00
}
2019-05-26 06:52:29 +00:00
packet_sender->sendPacket(OK_Packet(0xfe, client_capability_flags, 0, 0, 0), true);
2019-03-16 02:08:21 +00:00
}
void MySQLHandler::comPing()
{
2019-05-26 06:52:29 +00:00
packet_sender->sendPacket(OK_Packet(0x0, client_capability_flags, 0, 0, 0), true);
2019-03-16 02:08:21 +00:00
}
2019-07-14 22:13:56 +00:00
void MySQLHandler::comQuery(ReadBuffer & payload)
{
bool with_output = false;
std::function<void(const String &)> set_content_type = [&with_output](const String &) -> void {
with_output = true;
};
2019-07-18 04:54:26 +00:00
const String query("select ''");
ReadBufferFromString empty_select(query);
2019-07-16 07:11:59 +00:00
bool should_replace = false;
// Translate query from MySQL to ClickHouse.
// This is a temporary workaround until ClickHouse supports the syntax "@@var_name".
if (std::string(payload.position(), payload.buffer().end()) == "select @@version_comment limit 1") // MariaDB client starts session with that query
{
should_replace = true;
}
executeQuery(should_replace ? empty_select : payload, *out, true, connection_context, set_content_type, nullptr);
2019-07-14 08:22:55 +00:00
2019-05-16 03:45:17 +00:00
if (!with_output)
2019-05-26 06:52:29 +00:00
packet_sender->sendPacket(OK_Packet(0x00, client_capability_flags, 0, 0, 0), true);
2019-03-16 02:08:21 +00:00
}
}