Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
bin /
Delete
Unzip
Name
Size
Permission
Date
Action
GET
15.82
KB
-rwxr-xr-x
2022-03-25 08:00
[
51.8
KB
-rwxr-xr-x
2025-03-12 12:52
aclocal
35.52
KB
-rwxr-xr-x
2023-09-27 12:16
aclocal-1.16
35.52
KB
-rwxr-xr-x
2023-09-27 12:16
addr2line
27.74
KB
-rwxr-xr-x
2025-03-31 10:32
animate
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
ar
55.98
KB
-rwxr-xr-x
2025-03-31 10:32
arch
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
arpaname
15.11
KB
-rwxr-xr-x
2025-07-29 21:44
as
710.31
KB
-rwxr-xr-x
2025-03-31 10:32
aspell
151.12
KB
-rwxr-xr-x
2022-01-26 21:47
at
1.02
KB
-rwxr-xr-x
2025-08-05 06:15
atq
1.02
KB
-rwxr-xr-x
2025-08-05 06:15
atrm
1.02
KB
-rwxr-xr-x
2025-08-05 06:15
autoconf
14.42
KB
-rwxr-xr-x
2024-10-02 20:06
autoheader
8.33
KB
-rwxr-xr-x
2024-10-02 20:06
autom4te
31.43
KB
-rwxr-xr-x
2024-10-02 20:06
automake
251.93
KB
-rwxr-xr-x
2023-09-27 12:16
automake-1.16
251.93
KB
-rwxr-xr-x
2023-09-27 12:16
autoreconf
20.57
KB
-rwxr-xr-x
2024-10-02 20:06
autoscan
16.72
KB
-rwxr-xr-x
2024-10-02 20:06
autoupdate
33.08
KB
-rwxr-xr-x
2024-10-02 20:06
awk
698.17
KB
-rwxr-xr-x
2022-03-30 22:25
b2sum
51.79
KB
-rwxr-xr-x
2025-03-12 12:52
base32
35.69
KB
-rwxr-xr-x
2025-03-12 12:52
base64
35.7
KB
-rwxr-xr-x
2025-03-12 12:52
basename
35.67
KB
-rwxr-xr-x
2025-03-12 12:52
basenc
48.02
KB
-rwxr-xr-x
2025-03-12 12:52
bash
1.32
MB
-rwxr-xr-x
2024-04-30 14:33
bashbug-64
6.91
KB
-rwxr-xr-x
2024-04-30 14:33
batch
140
B
-rwxr-xr-x
2025-08-05 06:15
bison
494.76
KB
-rwxr-xr-x
2022-01-27 00:15
bunzip2
39.62
KB
-rwxr-xr-x
2025-02-04 03:42
bzcat
39.62
KB
-rwxr-xr-x
2025-02-04 03:42
bzcmp
2.09
KB
-rwxr-xr-x
2025-02-04 03:42
bzdiff
2.09
KB
-rwxr-xr-x
2025-02-04 03:42
bzgrep
2.01
KB
-rwxr-xr-x
2025-02-04 03:42
bzip2
39.62
KB
-rwxr-xr-x
2025-02-04 03:42
bzip2recover
15.4
KB
-rwxr-xr-x
2025-02-04 03:42
bzless
1.23
KB
-rwxr-xr-x
2025-02-04 03:42
bzmore
1.23
KB
-rwxr-xr-x
2025-02-04 03:42
c++
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
c++filt
27.18
KB
-rwxr-xr-x
2025-03-31 10:32
c89
228
B
-rwxr-xr-x
2025-02-12 13:07
c99
219
B
-rwxr-xr-x
2025-02-12 13:07
cagefs_enter.proxied
1.04
KB
-rwxr-xr-x
2025-05-26 11:09
cal
52.01
KB
-rwxr-xr-x
2025-03-13 06:30
captoinfo
87.8
KB
-rwxr-xr-x
2025-08-05 09:46
cat
35.66
KB
-rwxr-xr-x
2025-03-12 12:52
catchsegv
3.21
KB
-rwxr-xr-x
2025-08-04 21:43
cc
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
chcon
60.24
KB
-rwxr-xr-x
2025-03-12 12:52
chgrp
56.19
KB
-rwxr-xr-x
2025-03-12 12:52
chmod
56.16
KB
-rwxr-xr-x
2025-03-12 12:52
chown
60.19
KB
-rwxr-xr-x
2025-03-12 12:52
chrt
27.48
KB
-rwxr-xr-x
2025-03-13 06:30
cksum
35.57
KB
-rwxr-xr-x
2025-03-12 12:52
cldetect
10.35
KB
-rwxr-xr-x
2025-08-28 09:14
clear
15.16
KB
-rwxr-xr-x
2025-08-05 09:46
cloudlinux-awp-user
1.78
KB
-rwxr-xr-x
2025-08-21 15:01
clwpos-user
1.78
KB
-rwxr-xr-x
2025-08-21 15:01
cmp
40.13
KB
-rwxr-xr-x
2022-01-29 18:15
col
23.41
KB
-rwxr-xr-x
2025-03-13 06:30
colcrt
15.38
KB
-rwxr-xr-x
2025-03-13 06:30
colrm
15.36
KB
-rwxr-xr-x
2025-03-13 06:30
column
35.52
KB
-rwxr-xr-x
2025-03-13 06:30
comm
35.75
KB
-rwxr-xr-x
2025-03-12 12:52
compare
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
composite
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
conjure
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
convert
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
cp
149.24
KB
-rwxr-xr-x
2025-03-12 12:52
cpan
8.37
KB
-rwxr-xr-x
2025-05-13 21:00
cpp
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
crontab
1.49
KB
-rwxr-xr-x
2025-08-05 06:13
crontab.cagefs
40.47
KB
-rwxr-xr-x
2025-06-23 12:21
csplit
108.88
KB
-rwxr-xr-x
2025-03-12 12:52
curl
248.49
KB
-rwxr-xr-x
2025-08-05 06:19
cut
47.8
KB
-rwxr-xr-x
2025-03-12 12:52
cyrusbdb2current
1.58
MB
-rwxr-xr-x
2023-04-10 14:10
date
104.05
KB
-rwxr-xr-x
2025-03-12 12:52
dbiprof
6.06
KB
-rwxr-xr-x
2022-02-16 08:03
dd
68.14
KB
-rwxr-xr-x
2025-03-12 12:52
delv
45.38
KB
-rwxr-xr-x
2025-07-29 21:44
df
84.73
KB
-rwxr-xr-x
2025-03-12 12:52
diff
194.7
KB
-rwxr-xr-x
2022-01-29 18:15
diff3
52.3
KB
-rwxr-xr-x
2022-01-29 18:15
dig
136.59
KB
-rwxr-xr-x
2025-07-29 21:44
dir
137.65
KB
-rwxr-xr-x
2025-03-12 12:52
dircolors
39.8
KB
-rwxr-xr-x
2025-03-12 12:52
dirname
31.48
KB
-rwxr-xr-x
2025-03-12 12:52
display
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
dnstap-read
23.19
KB
-rwxr-xr-x
2025-07-29 21:44
du
149.44
KB
-rwxr-xr-x
2025-03-12 12:52
echo
35.48
KB
-rwxr-xr-x
2025-03-12 12:52
ed
52.51
KB
-rwxr-xr-x
2022-01-30 05:02
egrep
32
B
-rwxr-xr-x
2022-01-31 20:22
enc2xs
40.69
KB
-rwxr-xr-x
2022-02-11 16:42
enchant
23.73
KB
-rwxr-xr-x
2022-01-30 11:02
enchant-lsmod
15.8
KB
-rwxr-xr-x
2022-01-30 11:02
env
44.23
KB
-rwxr-xr-x
2025-03-12 12:52
eps2eps
643
B
-rwxr-xr-x
2025-05-14 16:03
eqn
189.52
KB
-rwxr-xr-x
2022-02-01 10:44
ex
1.38
MB
-rwxr-xr-x
2025-05-13 20:05
expand
39.73
KB
-rwxr-xr-x
2025-03-12 12:52
expr
108.6
KB
-rwxr-xr-x
2025-03-12 12:52
factor
72.05
KB
-rwxr-xr-x
2025-03-12 12:52
false
27.47
KB
-rwxr-xr-x
2025-03-12 12:52
fc-cache
139
B
-rwxr-xr-x
2023-01-23 15:48
fc-cache-64
23.17
KB
-rwxr-xr-x
2023-01-23 19:48
fc-cat
19.16
KB
-rwxr-xr-x
2023-01-23 19:48
fc-conflist
15.13
KB
-rwxr-xr-x
2023-01-23 19:48
fc-list
15.13
KB
-rwxr-xr-x
2023-01-23 19:48
fc-match
15.13
KB
-rwxr-xr-x
2023-01-23 19:48
fc-pattern
15.14
KB
-rwxr-xr-x
2023-01-23 19:48
fc-query
15.13
KB
-rwxr-xr-x
2023-01-23 19:48
fc-scan
15.14
KB
-rwxr-xr-x
2023-01-23 19:48
fc-validate
15.14
KB
-rwxr-xr-x
2023-01-23 19:48
fgrep
32
B
-rwxr-xr-x
2022-01-31 20:22
file
27.74
KB
-rwxr-xr-x
2024-04-03 12:38
find
284.95
KB
-rwxr-xr-x
2024-10-02 21:04
flex
412.64
KB
-rwxr-xr-x
2022-01-30 08:23
flex++
412.64
KB
-rwxr-xr-x
2022-01-30 08:23
flock
23.56
KB
-rwxr-xr-x
2025-03-13 06:30
fmt
39.77
KB
-rwxr-xr-x
2025-03-12 12:52
fold
39.71
KB
-rwxr-xr-x
2025-03-12 12:52
free
23.36
KB
-rwxr-xr-x
2024-04-30 16:43
freetype-config
4.32
KB
-rwxr-xr-x
2025-03-31 15:40
funzip
31.42
KB
-rwxr-xr-x
2025-03-18 03:53
g++
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
gawk
698.17
KB
-rwxr-xr-x
2022-03-30 22:25
gcc
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
gcc-ar
27.81
KB
-rwxr-xr-x
2025-02-12 13:11
gcc-nm
27.8
KB
-rwxr-xr-x
2025-02-12 13:11
gcc-ranlib
27.82
KB
-rwxr-xr-x
2025-02-12 13:11
gcov
468.98
KB
-rwxr-xr-x
2025-02-12 13:11
gcov-dump
283.74
KB
-rwxr-xr-x
2025-02-12 13:11
gcov-tool
312.46
KB
-rwxr-xr-x
2025-02-12 13:11
gem
542
B
-rwxr-xr-x
2025-05-06 04:04
gencat
27.45
KB
-rwxr-xr-x
2025-08-04 21:46
geoiplookup
15.87
KB
-rwxr-xr-x
2022-11-23 16:40
geoiplookup6
15.82
KB
-rwxr-xr-x
2022-11-23 16:40
geqn
189.52
KB
-rwxr-xr-x
2022-02-01 10:44
getconf
35.23
KB
-rwxr-xr-x
2025-08-04 21:46
getent
35.86
KB
-rwxr-xr-x
2025-08-04 21:46
getopt
23.45
KB
-rwxr-xr-x
2025-03-13 06:30
ghostscript
15.13
KB
-rwxr-xr-x
2025-05-14 16:03
git
4.06
MB
-rwxr-xr-x
2025-07-21 16:25
git-receive-pack
4.06
MB
-rwxr-xr-x
2025-07-21 16:25
git-shell
770.68
KB
-rwxr-xr-x
2025-07-21 16:25
git-upload-archive
4.06
MB
-rwxr-xr-x
2025-07-21 16:25
git-upload-pack
4.06
MB
-rwxr-xr-x
2025-07-21 16:25
gm
15.67
KB
-rwxr-xr-x
2022-11-23 17:49
gmake
249.8
KB
-rwxr-xr-x
2024-04-02 12:55
gneqn
916
B
-rwxr-xr-x
2022-02-01 10:44
gnroff
3.21
KB
-rwxr-xr-x
2022-02-01 10:44
gpg
1.07
MB
-rwxr-xr-x
2023-09-26 19:39
gpg-agent
342.25
KB
-rwxr-xr-x
2023-09-26 19:39
gpg-error
36.1
KB
-rwxr-xr-x
2022-02-09 23:24
gpgsplit
27.49
KB
-rwxr-xr-x
2023-09-26 19:39
gpgv
295.42
KB
-rwxr-xr-x
2023-09-26 19:39
gpic
201.72
KB
-rwxr-xr-x
2022-02-01 10:44
gprof
101.48
KB
-rwxr-xr-x
2025-03-31 10:32
grep
154.49
KB
-rwxr-xr-x
2022-01-31 20:22
groff
96.77
KB
-rwxr-xr-x
2022-02-01 10:44
grops
167.26
KB
-rwxr-xr-x
2022-02-01 10:44
grotty
122.2
KB
-rwxr-xr-x
2022-02-01 10:44
groups
35.66
KB
-rwxr-xr-x
2025-03-12 12:52
gs
15.13
KB
-rwxr-xr-x
2025-05-14 16:03
gsnd
281
B
-rwxr-xr-x
2025-05-14 16:03
gtar
514.27
KB
-rwxr-xr-x
2024-10-02 21:24
gtbl
130.86
KB
-rwxr-xr-x
2022-02-01 10:44
gtroff
732.07
KB
-rwxr-xr-x
2022-02-01 10:44
gunzip
2.29
KB
-rwxr-xr-x
2022-10-15 17:26
gzexe
6.3
KB
-rwxr-xr-x
2022-10-15 17:26
gzip
89.63
KB
-rwxr-xr-x
2022-10-15 17:26
h2ph
28.69
KB
-rwxr-xr-x
2025-07-28 03:54
h2xs
59.5
KB
-rwxr-xr-x
2025-07-28 03:53
head
43.8
KB
-rwxr-xr-x
2025-03-12 12:52
hexdump
51.59
KB
-rwxr-xr-x
2025-03-13 06:30
host
108.57
KB
-rwxr-xr-x
2025-07-29 21:44
hostid
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
hostname
23.84
KB
-rwxr-xr-x
2022-02-14 11:22
hunspell
102.67
KB
-rwxr-xr-x
2022-01-31 20:22
iconv
64.09
KB
-rwxr-xr-x
2025-08-04 21:46
icu-config
205
B
-rwxr-xr-x
2025-07-29 16:13
icu-config-64
21.67
KB
-rwxr-xr-x
2025-07-29 16:16
icuinfo
15.49
KB
-rwxr-xr-x
2025-07-29 16:17
id
39.71
KB
-rwxr-xr-x
2025-03-12 12:52
identify
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
idn
36.46
KB
-rwxr-xr-x
2022-02-14 15:33
ifnames
4.03
KB
-rwxr-xr-x
2024-10-02 20:06
import
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
infocmp
63.69
KB
-rwxr-xr-x
2025-08-05 09:46
infotocap
87.8
KB
-rwxr-xr-x
2025-08-05 09:46
install
149.29
KB
-rwxr-xr-x
2025-03-12 12:52
instmodsh
4.1
KB
-rwxr-xr-x
2022-02-24 09:56
ionice
15.4
KB
-rwxr-xr-x
2025-03-13 06:30
ipcrm
19.41
KB
-rwxr-xr-x
2025-03-13 06:30
ipcs
39.52
KB
-rwxr-xr-x
2025-03-13 06:30
isosize
15.34
KB
-rwxr-xr-x
2025-03-13 06:30
ispell
992
B
-rwxr-xr-x
2019-10-08 00:15
join
51.9
KB
-rwxr-xr-x
2025-03-12 12:52
kill
31.47
KB
-rwxr-xr-x
2025-03-13 06:30
ld
1.71
MB
-rwxr-xr-x
2025-03-31 10:32
ld.bfd
1.71
MB
-rwxr-xr-x
2025-03-31 10:32
ldd
5.32
KB
-rwxr-xr-x
2025-08-04 21:44
less
197.9
KB
-rwxr-xr-x
2024-10-02 20:38
lessecho
15.37
KB
-rwxr-xr-x
2024-10-02 20:38
lesskey
24.8
KB
-rwxr-xr-x
2024-10-02 20:38
lesspipe.sh
3.5
KB
-rwxr-xr-x
2024-10-02 19:31
lex
412.64
KB
-rwxr-xr-x
2022-01-30 08:23
libnetcfg
15.41
KB
-rwxr-xr-x
2025-07-28 03:54
libtool
359.18
KB
-rwxr-xr-x
2024-10-01 17:49
libtoolize
126.17
KB
-rwxr-xr-x
2024-10-01 17:49
link
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
ln
60.16
KB
-rwxr-xr-x
2025-03-12 12:52
locale
59.08
KB
-rwxr-xr-x
2025-08-04 21:46
localedef
314.05
KB
-rwxr-xr-x
2025-08-04 21:46
logger
36.16
KB
-rwxr-xr-x
2025-03-13 06:30
login
43.62
KB
-rwxr-xr-x
2025-03-13 06:30
logname
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
look
19.36
KB
-rwxr-xr-x
2025-03-13 06:30
ls
137.64
KB
-rwxr-xr-x
2025-03-12 12:52
lto-dump
26.58
MB
-rwxr-xr-x
2025-02-12 13:11
m4
240.4
KB
-rwxr-xr-x
2022-03-31 07:28
make
249.8
KB
-rwxr-xr-x
2024-04-02 12:55
make-dummy-cert
614
B
-rwxr-xr-x
2025-02-11 21:56
mariadb
5.08
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-access
109.34
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-admin
4.85
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-binlog
5.13
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-check
4.84
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-conv
4.56
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-convert-table-format
4.12
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-dump
4.94
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-dumpslow
8.05
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-embedded
24.07
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-find-rows
3.21
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-hotcopy
34.53
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-import
4.84
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-plugin
4.53
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-secure-installation
13.49
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-setpermission
17.56
KB
-rwxr-xr-x
2025-07-28 16:17
mariadb-show
4.83
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-slap
4.86
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-tzinfo-to-sql
4.53
MB
-rwxr-xr-x
2025-07-28 17:11
mariadb-waitpid
4.52
MB
-rwxr-xr-x
2025-07-28 17:11
mcookie
27.5
KB
-rwxr-xr-x
2025-03-13 06:30
md5sum
39.64
KB
-rwxr-xr-x
2025-03-12 12:52
mesg
15.33
KB
-rwxr-xr-x
2025-03-13 06:30
mkdir
68.31
KB
-rwxr-xr-x
2025-03-12 12:52
mkfifo
39.83
KB
-rwxr-xr-x
2025-03-12 12:52
mknod
43.88
KB
-rwxr-xr-x
2025-03-12 12:52
mktemp
39.8
KB
-rwxr-xr-x
2025-03-12 12:52
mogrify
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
montage
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
more
43.63
KB
-rwxr-xr-x
2025-03-13 06:30
msql2mysql
1.42
KB
-rwxr-xr-x
2025-07-28 16:17
mv
141.17
KB
-rwxr-xr-x
2025-03-12 12:52
my_print_defaults
4.53
MB
-rwxr-xr-x
2025-07-28 17:11
mysql
5.08
MB
-rwxr-xr-x
2025-07-28 17:11
mysql_config
4.5
KB
-rwxr-xr-x
2025-07-28 16:17
mysql_find_rows
3.21
KB
-rwxr-xr-x
2025-07-28 16:17
mysql_waitpid
4.52
MB
-rwxr-xr-x
2025-07-28 17:11
mysqlaccess
109.34
KB
-rwxr-xr-x
2025-07-28 16:17
mysqladmin
4.85
MB
-rwxr-xr-x
2025-07-28 17:11
mysqlbinlog
5.13
MB
-rwxr-xr-x
2025-07-28 17:11
mysqlcheck
4.84
MB
-rwxr-xr-x
2025-07-28 17:11
mysqldump
4.94
MB
-rwxr-xr-x
2025-07-28 17:11
mysqlimport
4.84
MB
-rwxr-xr-x
2025-07-28 17:11
mysqlshow
4.83
MB
-rwxr-xr-x
2025-07-28 17:11
mytop
71.95
KB
-rwxr-xr-x
2025-07-28 16:17
namei
23.41
KB
-rwxr-xr-x
2025-03-13 06:30
nano
346.2
KB
-rwxr-xr-x
2025-03-13 03:12
neqn
916
B
-rwxr-xr-x
2022-02-01 10:44
nice
35.67
KB
-rwxr-xr-x
2025-03-12 12:52
nl
100.71
KB
-rwxr-xr-x
2025-03-12 12:52
nm
44.71
KB
-rwxr-xr-x
2025-03-31 10:32
nohup
35.58
KB
-rwxr-xr-x
2025-03-12 12:52
nproc
35.69
KB
-rwxr-xr-x
2025-03-12 12:52
nroff
3.21
KB
-rwxr-xr-x
2022-02-01 10:44
nslookup
112.52
KB
-rwxr-xr-x
2025-07-29 21:44
nsupdate
71.8
KB
-rwxr-xr-x
2025-07-29 21:44
numfmt
55.83
KB
-rwxr-xr-x
2025-03-12 12:52
objcopy
185.37
KB
-rwxr-xr-x
2025-03-31 10:32
objdump
413.09
KB
-rwxr-xr-x
2025-03-31 10:32
od
64.06
KB
-rwxr-xr-x
2025-03-12 12:52
openssl
1.01
MB
-rwxr-xr-x
2025-02-11 21:56
pango-list
19.11
KB
-rwxr-xr-x
2023-04-07 10:19
pango-segmentation
19.13
KB
-rwxr-xr-x
2023-04-07 10:19
pango-view
60.17
KB
-rwxr-xr-x
2023-04-07 10:19
passenger
1.73
KB
-rwxr-xr-x
2025-04-17 08:59
passwd
1.02
KB
-rwxr-xr-x
2022-04-14 14:45
paste
35.58
KB
-rwxr-xr-x
2025-03-12 12:52
patch
195.02
KB
-rwxr-xr-x
2022-03-25 15:42
pathchk
35.66
KB
-rwxr-xr-x
2025-03-12 12:52
pdf2dsc
701
B
-rwxr-xr-x
2025-05-14 16:03
pdf2ps
913
B
-rwxr-xr-x
2025-05-14 16:03
perl
15.13
KB
-rwxr-xr-x
2025-07-28 03:54
perl5.32.1
15.13
KB
-rwxr-xr-x
2025-07-28 03:54
perlbug
43.81
KB
-rwxr-xr-x
2025-07-28 03:54
perldoc
118
B
-rwxr-xr-x
2022-02-14 23:51
perlivp
10.56
KB
-rwxr-xr-x
2025-07-28 03:53
perlml
14.18
KB
-rwxr-xr-x
2022-08-10 20:54
perlthanks
43.81
KB
-rwxr-xr-x
2025-07-28 03:54
pgrep
31.42
KB
-rwxr-xr-x
2024-04-30 16:43
php
937
B
-rwxr-xr-x
2025-07-01 16:06
pic
201.72
KB
-rwxr-xr-x
2022-02-01 10:44
piconv
8.08
KB
-rwxr-xr-x
2022-02-11 16:42
ping
76.51
KB
-rwxr-xr-x
2025-06-24 14:19
pinky
35.61
KB
-rwxr-xr-x
2025-03-12 12:52
pkg-config
335
B
-rwxr-xr-x
2023-04-06 20:27
pkill
31.42
KB
-rwxr-xr-x
2024-04-30 16:43
pl2pm
4.43
KB
-rwxr-xr-x
2025-07-28 03:54
pmap
35.39
KB
-rwxr-xr-x
2024-04-30 16:43
pod2html
4.04
KB
-rwxr-xr-x
2025-07-28 03:54
pod2man
14.68
KB
-rwxr-xr-x
2022-03-25 12:10
pod2text
10.55
KB
-rwxr-xr-x
2022-03-25 12:10
pod2usage
4.01
KB
-rwxr-xr-x
2022-02-11 16:01
podchecker
3.57
KB
-rwxr-xr-x
2022-02-11 19:01
post-grohtml
199.76
KB
-rwxr-xr-x
2022-02-01 10:44
pr
72.28
KB
-rwxr-xr-x
2025-03-12 12:52
pre-grohtml
92.92
KB
-rwxr-xr-x
2022-02-01 10:44
precat
5.53
KB
-rwxr-xr-x
2019-10-08 00:15
preunzip
5.53
KB
-rwxr-xr-x
2019-10-08 00:15
prezip
5.53
KB
-rwxr-xr-x
2019-10-08 00:15
prezip-bin
15.69
KB
-rwxr-xr-x
2022-01-26 21:47
printenv
31.47
KB
-rwxr-xr-x
2025-03-12 12:52
printf
51.77
KB
-rwxr-xr-x
2025-03-12 12:52
prove
13.24
KB
-rwxr-xr-x
2022-02-16 11:58
ps
141.15
KB
-rwxr-xr-x
2024-04-30 16:43
ps2ascii
635
B
-rwxr-xr-x
2025-05-14 16:03
ps2epsi
1.24
KB
-rwxr-xr-x
2025-05-14 16:03
ps2pdf
276
B
-rwxr-xr-x
2025-05-14 16:03
ps2pdf12
219
B
-rwxr-xr-x
2025-05-14 16:03
ps2pdf13
219
B
-rwxr-xr-x
2025-05-14 16:03
ps2pdf14
219
B
-rwxr-xr-x
2025-05-14 16:03
ps2pdfwr
1.06
KB
-rwxr-xr-x
2025-05-14 16:03
ps2ps
651
B
-rwxr-xr-x
2025-05-14 16:03
ps2ps2
673
B
-rwxr-xr-x
2025-05-14 16:03
ptx
129.03
KB
-rwxr-xr-x
2025-03-12 12:52
pwd
35.7
KB
-rwxr-xr-x
2025-03-12 12:52
pwdx
15.28
KB
-rwxr-xr-x
2024-04-30 16:43
pydoc
78
B
-rwxr-xr-x
2025-09-02 07:04
pydoc3
78
B
-rwxr-xr-x
2025-09-02 07:04
pydoc3.9
78
B
-rwxr-xr-x
2025-09-02 07:04
ranlib
56
KB
-rwxr-xr-x
2025-03-31 10:32
readelf
667.28
KB
-rwxr-xr-x
2025-03-31 10:32
readlink
39.69
KB
-rwxr-xr-x
2025-03-12 12:52
realpath
39.77
KB
-rwxr-xr-x
2025-03-12 12:52
recode
31.93
KB
-rwxr-xr-x
2022-11-02 11:35
red
92
B
-rwxr-xr-x
2022-01-30 05:02
rename
23.41
KB
-rwxr-xr-x
2025-03-13 06:30
renew-dummy-cert
729
B
-rwxr-xr-x
2025-02-11 21:56
renice
15.36
KB
-rwxr-xr-x
2025-03-13 06:30
replace
4.5
MB
-rwxr-xr-x
2025-07-28 17:11
reset
27.34
KB
-rwxr-xr-x
2025-08-05 09:46
rev
15.35
KB
-rwxr-xr-x
2025-03-13 06:30
rm
60.21
KB
-rwxr-xr-x
2025-03-12 12:52
rmdir
43.61
KB
-rwxr-xr-x
2025-03-12 12:52
rnano
346.2
KB
-rwxr-xr-x
2025-03-13 03:12
ruby
15.27
KB
-rwxr-xr-x
2025-05-06 03:53
run-with-aspell
89
B
-rwxr-xr-x
2022-01-26 21:47
runcon
35.65
KB
-rwxr-xr-x
2025-03-12 12:52
rvi
1.38
MB
-rwxr-xr-x
2025-05-13 20:05
rview
1.38
MB
-rwxr-xr-x
2025-05-13 20:05
scalar
819.34
KB
-rwxr-xr-x
2025-07-21 16:25
scl
39.55
KB
-rwxr-xr-x
2023-04-07 01:57
scl_enabled
262
B
-rwxr-xr-x
2021-07-27 15:14
scl_source
1.88
KB
-rwxr-xr-x
2021-07-27 15:14
scp
133.06
KB
-rwxr-xr-x
2025-03-13 13:04
script
51.75
KB
-rwxr-xr-x
2025-03-13 06:30
sdiff
44.2
KB
-rwxr-xr-x
2022-01-29 18:15
sed
114.01
KB
-rwxr-xr-x
2022-02-15 10:36
selectorctl
7.63
KB
-rwxr-xr-x
2025-07-11 15:01
seq
47.79
KB
-rwxr-xr-x
2025-03-12 12:52
setsid
15.34
KB
-rwxr-xr-x
2025-03-13 06:30
setterm
35.52
KB
-rwxr-xr-x
2025-03-13 06:30
sftp
141.05
KB
-rwxr-xr-x
2025-03-13 13:04
sh
1.32
MB
-rwxr-xr-x
2024-04-30 14:33
sha1sum
39.64
KB
-rwxr-xr-x
2025-03-12 12:52
sha224sum
39.64
KB
-rwxr-xr-x
2025-03-12 12:52
sha256sum
39.64
KB
-rwxr-xr-x
2025-03-12 12:52
sha384sum
39.64
KB
-rwxr-xr-x
2025-03-12 12:52
sha512sum
39.64
KB
-rwxr-xr-x
2025-03-12 12:52
shred
51.88
KB
-rwxr-xr-x
2025-03-12 12:52
shuf
48.01
KB
-rwxr-xr-x
2025-03-12 12:52
size
31.61
KB
-rwxr-xr-x
2025-03-31 10:32
skill
31.4
KB
-rwxr-xr-x
2024-04-30 16:43
slabtop
23.42
KB
-rwxr-xr-x
2024-04-30 16:43
sleep
35.65
KB
-rwxr-xr-x
2025-03-12 12:52
snice
31.4
KB
-rwxr-xr-x
2024-04-30 16:43
sort
113.09
KB
-rwxr-xr-x
2025-03-12 12:52
spell
125
B
-rwxr-xr-x
2019-10-08 00:15
splain
18.96
KB
-rwxr-xr-x
2025-07-28 03:54
split
52.31
KB
-rwxr-xr-x
2025-03-12 12:52
sprof
35.45
KB
-rwxr-xr-x
2025-08-04 21:46
sqlite3
1.52
MB
-rwxr-xr-x
2025-07-28 21:55
ssh
843.53
KB
-rwxr-xr-x
2025-03-13 13:04
ssh-add
164.86
KB
-rwxr-xr-x
2025-03-13 13:04
ssh-agent
281.02
KB
-rwxr-xr-x
2025-03-13 13:04
ssh-copy-id
12.38
KB
-rwxr-xr-x
2025-03-13 13:04
ssh-keygen
455.04
KB
-rwxr-xr-x
2025-03-13 13:04
ssh-keyscan
197.43
KB
-rwxr-xr-x
2025-03-13 13:04
stat
80.06
KB
-rwxr-xr-x
2025-03-12 12:52
stdbuf
43.74
KB
-rwxr-xr-x
2025-03-12 12:52
strace
2.08
MB
-rwxr-xr-x
2025-03-12 19:11
stream
15.27
KB
-rwxr-xr-x
2025-04-01 12:55
strings
31.74
KB
-rwxr-xr-x
2025-03-31 10:32
strip
185.36
KB
-rwxr-xr-x
2025-03-31 10:32
stty
75.83
KB
-rwxr-xr-x
2025-03-12 12:52
sum
35.59
KB
-rwxr-xr-x
2025-03-12 12:52
sync
35.54
KB
-rwxr-xr-x
2025-03-12 12:52
tabs
19.16
KB
-rwxr-xr-x
2025-08-05 09:46
tac
104.6
KB
-rwxr-xr-x
2025-03-12 12:52
tail
68.09
KB
-rwxr-xr-x
2025-03-12 12:52
tar
514.27
KB
-rwxr-xr-x
2024-10-02 21:24
taskset
23.41
KB
-rwxr-xr-x
2025-03-13 06:30
tbl
130.86
KB
-rwxr-xr-x
2022-02-01 10:44
tclsh
15.69
KB
-rwxr-xr-x
2022-10-15 21:29
tclsh8.6
15.69
KB
-rwxr-xr-x
2022-10-15 21:29
tee
35.69
KB
-rwxr-xr-x
2025-03-12 12:52
test
43.79
KB
-rwxr-xr-x
2025-03-12 12:52
tic
87.8
KB
-rwxr-xr-x
2025-08-05 09:46
timeout
40.17
KB
-rwxr-xr-x
2025-03-12 12:52
tload
19.34
KB
-rwxr-xr-x
2024-04-30 16:43
tmpwatch
36.03
KB
-rwxr-xr-x
2022-02-11 11:52
toe
23.23
KB
-rwxr-xr-x
2025-08-05 09:46
top
132.27
KB
-rwxr-xr-x
2024-04-30 16:43
touch
92.03
KB
-rwxr-xr-x
2025-03-12 12:52
tput
27.25
KB
-rwxr-xr-x
2025-08-05 09:46
tr
47.87
KB
-rwxr-xr-x
2025-03-12 12:52
troff
732.07
KB
-rwxr-xr-x
2022-02-01 10:44
true
27.47
KB
-rwxr-xr-x
2025-03-12 12:52
truncate
35.66
KB
-rwxr-xr-x
2025-03-12 12:52
tset
27.34
KB
-rwxr-xr-x
2025-08-05 09:46
tsort
47.79
KB
-rwxr-xr-x
2025-03-12 12:52
tty
31.65
KB
-rwxr-xr-x
2025-03-12 12:52
tzselect
14.99
KB
-rwxr-xr-x
2025-08-04 21:43
uapi
1.02
KB
-rwxr-xr-x
2025-08-25 08:36
ul
23.45
KB
-rwxr-xr-x
2025-03-13 06:30
uname
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
unexpand
39.73
KB
-rwxr-xr-x
2025-03-12 12:52
uniq
43.83
KB
-rwxr-xr-x
2025-03-12 12:52
unlink
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
unzip
196.14
KB
-rwxr-xr-x
2025-03-18 03:53
unzipsfx
87.89
KB
-rwxr-xr-x
2025-03-18 03:53
uptime
15.29
KB
-rwxr-xr-x
2024-04-30 16:43
users
35.68
KB
-rwxr-xr-x
2025-03-12 12:52
utmpdump
23.4
KB
-rwxr-xr-x
2025-03-13 06:30
vdir
137.65
KB
-rwxr-xr-x
2025-03-12 12:52
vi
691
B
-rwxr-xr-x
2025-05-13 20:05
view
150
B
-rwxr-xr-x
2025-05-13 20:05
vmstat
39.41
KB
-rwxr-xr-x
2024-04-30 16:43
watch
27.87
KB
-rwxr-xr-x
2024-04-30 16:43
wc
43.73
KB
-rwxr-xr-x
2025-03-12 12:52
wget
521.41
KB
-rwxr-xr-x
2024-09-03 11:58
whereis
32.03
KB
-rwxr-xr-x
2025-03-13 06:30
which
27.89
KB
-rwxr-xr-x
2025-08-05 06:19
who
51.77
KB
-rwxr-xr-x
2025-03-12 12:52
whoami
31.66
KB
-rwxr-xr-x
2025-03-12 12:52
word-list-compress
15.7
KB
-rwxr-xr-x
2022-01-26 21:47
x86_64-redhat-linux-c++
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
x86_64-redhat-linux-g++
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
x86_64-redhat-linux-gcc
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
x86_64-redhat-linux-gcc-11
1.04
MB
-rwxr-xr-x
2025-02-12 13:11
xargs
64.09
KB
-rwxr-xr-x
2024-10-02 21:04
xmlcatalog
23.15
KB
-rwxr-xr-x
2025-08-07 15:49
xmllint
80.55
KB
-rwxr-xr-x
2025-08-07 15:49
xmlwf
39.63
KB
-rwxr-xr-x
2025-05-13 17:53
xsltproc
31.23
KB
-rwxr-xr-x
2025-05-13 19:06
xsubpp
4.96
KB
-rwxr-xr-x
2022-02-16 08:56
yes
31.51
KB
-rwxr-xr-x
2025-03-12 12:52
zcat
1.94
KB
-rwxr-xr-x
2022-10-15 17:26
zcmp
1.64
KB
-rwxr-xr-x
2022-10-15 17:26
zdiff
6.31
KB
-rwxr-xr-x
2022-10-15 17:26
zegrep
33
B
-rwxr-xr-x
2022-10-15 17:26
zfgrep
33
B
-rwxr-xr-x
2022-10-15 17:26
zforce
2.04
KB
-rwxr-xr-x
2022-10-15 17:26
zgrep
7.93
KB
-rwxr-xr-x
2022-10-15 17:26
zip
221.09
KB
-rwxr-xr-x
2023-04-07 14:02
zipcloak
75.7
KB
-rwxr-xr-x
2023-04-07 14:02
zipgrep
2.89
KB
-rwxr-xr-x
2008-10-10 17:40
zipinfo
196.14
KB
-rwxr-xr-x
2025-03-18 03:53
zipnote
67.61
KB
-rwxr-xr-x
2023-04-07 14:02
zipsplit
63.58
KB
-rwxr-xr-x
2023-04-07 14:02
zless
2.16
KB
-rwxr-xr-x
2022-10-15 17:26
zmore
1.8
KB
-rwxr-xr-x
2022-10-15 17:26
znew
4.47
KB
-rwxr-xr-x
2022-10-15 17:26
Save
Rename
#!/usr/bin/perl # Copyright (c) 2000, 2017, Oracle and/or its affiliates. All rights reserved. # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU Library General Public # License as published by the Free Software Foundation; version 2 # of the License. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Library General Public License for more details. # # You should have received a copy of the GNU Library General Public # License along with this library; if not, write to the Free # Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, # MA 02110-1335 USA # **************************** package MySQLaccess; #use strict; use File::Temp qw(tempfile tmpnam); use Fcntl; BEGIN { # **************************** # static information... $VERSION = "2.10, 13 Sep 2019"; $0 =~ m%/([^/]+)$%o; $script = $1; $script = 'MySQLAccess' unless $script; $script_conf = "$script.conf"; $script_log = $ENV{'HOME'}."/$script.log"; # **************************** # information on MariaDB $MYSQL = '/usr/bin/mariadb'; # path to mariadb executable $SERVER = '3.21'; $MYSQL_OPT = ' --batch --unbuffered'; $ACCESS_DB = 'mysql'; # name of DB with grant-tables $ACCESS_H = 'host'; # $ACCESS_U = 'user'; # $ACCESS_D = 'db'; # # Add/Edit privileges $ACCESS_H_TMP = 'host_tmp'; $ACCESS_U_TMP = 'user_tmp'; $ACCESS_D_TMP = 'db_tmp'; $ACCESS_H_BCK = 'host_backup'; $ACCESS_U_BCK = 'user_backup'; $ACCESS_D_BCK = 'db_backup'; $DIFF = '/usr/bin/diff'; $MYSQLDUMP = '/usr/bin/mariadb-dump'; #path to mariadb-dump executable $MYSQLADMIN= 'http://foobar.com/MySQLadmin'; #URL of CGI for manipulating #the temporary grant-tables } END { unlink $MYSQL_CNF if defined $MYSQL_CNF and not $DEBUG; } $INFO = <<"_INFO"; -------------------------------------------------------------------------- mysqlaccess (Version $VERSION) ~~~~~~~~~~~ Copyright (C) 1997,1998 Yves.Carlier\@rug.ac.be University of Ghent (RUG), Belgium Administratieve Informatieverwerking (AIV) report the access-privileges for a USER from a HOST to a DB Many thanks go to <monty\@mysql.com> and <psmith\@BayNetworks.COM> for their suggestions, debugging and patches. use `$script -?' to get more information on available options. From version 2.0x, $script can also be used through a WEB-browser if it is ran as a CGI-script. (See the release-notes) -------------------------------------------------------------------------- _INFO $OPTIONS = <<_OPTIONS; Usage: $script [host [user [db]]] OPTIONS -?, --help display this helpscreen and exit -v, --version print information on the program `$script' -u, --user=# username for logging in to the db -p, --password=# validate password for user -h, --host=# name or IP-number of the host -d, --db=# name of the database -U, --superuser=# connect as superuser -P, --spassword=# password for superuser -H, --rhost=# remote MariaDB-server to connect to --old_server connect to old MariaDB-server (before v3.21) which does not yet know how to handle full where clauses. -b, --brief single-line tabular report -t, --table report in table-format --relnotes print release-notes --plan print suggestions/ideas for future releases --howto some examples of how to run `$script' --debug=N enter debuglevel N (0..3) --copy reload temporary grant-tables from original ones --preview show differences in privileges after making changes in (temporary) grant-tables --commit copy grant-rules from temporary tables to grant-tables (!don't forget to do an mysqladmin reload) --rollback undo the last changes to the grant-tables. Note: At least the user and the db must be given (even with wildcards) If no host is given, `localhost' is assumed Wilcards (*,?,%,_) are allowed for host, user and db, but be sure to escape them from your shell!! (ie type \\* or '*') _OPTIONS $RELEASE = <<'_RELEASE'; Release Notes: ------------- 0.1-beta1: internal - first trial. 0.1-beta2: (1997-02-27) - complete rewrite of the granting-rules, based on the documentation found in de FAQ. - IP-number and name for a host are equiv. 0.1-beta3: (1997-03-10) - more information - 'localhost' and the name/ip of the local machine are now equiv. 0.1-beta4: (1997-03-11) - inform the user if he has not enough priv. to read the mysql db 1.0-beta1: (1997-03-12) suggestions by Monty: - connect as superuser with superpassword. - mysqlaccess could also notice if all tables are empty. This means that all user have full access! - It would be nice if one could optionally start mysqlaccess without any options just the arguments 'user db' or 'host user db', where host is 'localhost' if one uses only two arguments. 1.0-beta2: (1997-03-14) - bugfix: translation to reg.expr of \_ and \%. - bugfix: error in matching regular expression and string given by user which resulted in 'test_123' being matched with 'test' 1.0-beta3: (1997-03-14) - bugfix: the user-field should not be treated as a sql-regexpr, but as a plain string. - bugfix: the host-table should not be used if the host isn't empty in db or if the host isn't emty in user (Monty) 1.0-beta4: (1997-03-14) - bugfix: in an expression "$i = $j or $k", the '=' binds tighter than the or which results in problems... (by Monty) - running mysqlaccess with "perl -w" gives less warnings... ;-) 1.0-beta5: (1997-04-04) - bugfix: The table sorting was only being applied to the "user" table; all the tables need to be sorted. Rewrote the sort algorithm, and the table walk algorithm (no temp file anymore), and various other cleanups. I believe the access calculation is 100% correct. (by Paul D. Smith <psmith\@baynetworks.com>) - Allow the debug level to be set on the cmd line with --debug=N. (by Paul D. Smith <psmith\@baynetworks.com>) - More -w cleanups; should be totally -w-clean. (by Paul D. Smith <psmith\@baynetworks.com>) 1.1-beta1: (1997-04-xx) 1.1-beta2: (1997-04-11) - new options: --all_users : report access-rights for all possible users --all_dbs : report access-rights for all possible dbs --all_hosts : report access-rights for all possible hosts --brief : as brief as possible, don't mention notes,warnings and rules --password : validate password for user - layout: long messages are wrapped on the report. - functionality: more descriptive notes and warnings wildcards (*,?) are allowed in the user,host and db options setting xxxx=* is equiv to using option --all_xxxx note: make sure you escape your wildcards, so they don't get interpreted by the shell. use \* or '*' - bugfix: Fieldnames which should be skipped on the output can now have a first capital letter. - bugfix: any option with a '.' (eg ip-number) was interpreted as a wildcard-expression. - bugfix: When no entry was found in the db-table, the default accessrights are N, instead of the faulty Y in a previous version. 1.1-beta-3 : (1997-04-xx) 1.1-beta-4 : (1997-04-xx) 1.1-beta-5 : (1997-04-xx) 1.1 : (1997-04-28) - new options: --rhost : name of mysql-server to connect to --plan : print suggestions/ideas for future releases --relnotes : display release-notes --howto : display examples on how to use mysqlaccess --brief : single-line tabular output - functionality/bugfix: * removed options --all_users,--all_dbs,--all_hosts, which were redundant with the wildcard-expressions for the corresponding options. They made the processing of the commandline too painful and confusing ;-) (suggested by psmith) * redefined the option --brief, which now gives a single-line tabular output * Now we check if the right version of the mysql-client is used, since we might use an option not yet implemented in an older version (--unbuffered, since 3.0.18) Also the error-messages the mysql-client reports are better interpreted ;-) * Wildcards can now be given following the SQL-expression (%,_) and the Regular-expression (*,?) syntax. - speed: we now open a bidirectional pipe to the mysql-client, and keep it open throughout the whole run. Queries are written to, and the answers read from the pipe. (suggested by monty) - bugfixes: * the Rules were not properly reset over iterations * when in different tables the field-names were not identical, eg. Select_priv and select_priv, they were considered as definitions of 2 different access-rights. * the IP-number of a host with a name containing wildcards should not be searched for in Name2IP and IP2Name. * various other small things, pointed out by <monty> and <psmith> 1.2 : (1997-05-13) - bugfix: * Fixed bug in acl with anonymous user: Now if one gets accepted by the user table as a empty user name, the user name is set to '' when checking against the 'db' and 'host' tables. (Bug fixed in MySQL3.20.19) 1.2-1 : (1997-xx-xx) - bugfix: * hashes should be initialized with () instead of {} <psmith> * "my" variable $name masks earlier declaration in same scope, using perl 5.004 <????> 1.2-2 : (1997-06-10) 2.0p1-3 : (1997-10-xx) - new * packages * log-file for debug-output : /tmp/mysqlaccess.log * default values are read from a configuration file $script.conf first this file is looked for in the current directory; if not found it is looked for in /etc Note that when default-values are given, these can't get overridden by empty (blanc) values! * CGI-BIN version with HTML and forms interface. Simply place the script in an ScriptAliased directory, make the configuration file available in the that directory or in /etc, and point your browser to the right URL. * copy the grant-rules to temporary tables, where you are safe to play with them. * preview changes in privileges after changing grant-rules, before taking them into production * copy the new grant-rules from the temporary tables back to the grant-tables. * Undo all changes made in the grant-tables (1-level undo). -new options: * --table : as opposite of the --brief option. * --copy : (re)load temporary grant-tables from original ones. * --preview : preview changes in privileges after changing some or more entries in the grant-tables. * --commit : copy grant-rules from temporary tables to grant-tables (!don't forget to do an mysqladmin reload) * --rollback: undo the last changes to the grant-tables. - bugfix: * if the table db is empty, mysqlaccess freezed (by X Zhu <X.Zhu@Bradford.ac.uk>) 2.0 : (1997-10-09) - fixed some "-w" warnings. - complain when certain programs and paths can't be found. 2.01 : (1997-12-12) - bugfix: * rules for db-table where not calculated and reported correctly. 2.02 : (1998-01-xx) - bugfix: * Privileges of the user-table were not AND-ed properly with the other privileges. (reported by monty) - new option: * --old_server: mysqlaccess will now use a full where clause when retrieving information from the MySQL-server. If you are connecting to an old server (before v3.21) then use the option --old_server. 2.03 : (1998-02-27) - bugfix: * in Host::MatchTemplate: incorrect match if host-field was left empty. 2.04-alpha1 : (2000-02-11) Closes vulnerability due to former implementation requiring passwords to be passed on the command line. - functionality Option values for --password -p -spassword -P may now be omitted from command line, in which case the values will be prompted for. (fix supplied by Steve Harvey <sgh@vex.net>) 2.05: (2000-02-17) Monty Moved the log file from /tmp to ~ 2.06: Don't print '+++USING FULL WHERE CLAUSE+++' _RELEASE $TODO = <<_TODO; Plans: ----- -a full where clause is use now. How can we handle older servers? -add some more functionality for DNS. -select the warnings more carefuly. >> I think that the warnings should either be enhanced to _really_ >> understand and report real problems accurately, or restricted to >> only printing things that it knows with 100% certainty. <psmith) >> Why do I have both '%' and 'any_other_host' in there? Isn't that >> the same thing? I think it's because I have an actual host '%' in >> one of my tables. Probably the script should catch that and not >> duplicate output. <psmith> _TODO # From the FAQ: the Grant-algorithm # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # The host table is mainly to maintain a list of "secure" servers. # At TCX hosts contain a list of all machines on local network. These are granted # all privileges. # Technically the user grant is calculated by: # # 1.First sort all entries by host by putting host without wildcards first, # after this host with wildcards and entries with host = ". # Under each host sort user by the same criterias. # 2.Get grant for user from the "db" table. # 3.If hostname is "empty" for the found entry, AND the privileges with # the privileges for the host in "host" table. # (Remove all which is not "Y" in both) # 4.OR (add) the privileges for the user from the "user" table. # (add all privileges which is "Y" in "user") # # When matching, use the first found match. # # ----------------------------------------------------------------------------------- $HOWTO = <<_HOWTO; Examples of how to call $script: ~~~~~~~~ 1)Calling $script with 2 arguments: \$ $script root mysql ->report rights of user root logged on at the local host in db mysql Access-rights for USER 'root', from HOST 'localhost', to DB 'mysql' +-----------------+---+ +-----------------+---+ | select_priv | Y | | drop_priv | Y | | insert_priv | Y | | reload_priv | Y | | update_priv | Y | | shutdown_priv | Y | | delete_priv | Y | | process_priv | Y | | create_priv | Y | | file_priv | Y | +-----------------+---+ +-----------------+---+ BEWARE: Everybody can access your DB as user 'root' : WITHOUT supplying a password. Be very careful about it!! The following rules are used: db : 'No matching rule' host : 'Not processed: host-field is not empty in db-table.' user : 'localhost','root','','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y' 2)Calling $script with 3 arguments: \$ $script foo.bar nobody Foo ->report rights of user root logged in at machine foobar to db Foo Access-rights for USER 'nobody', from HOST 'foo.bar', to DB 'Foo' +-----------------+---+ +-----------------+---+ | select_priv | Y | | drop_priv | N | | insert_priv | Y | | reload_priv | N | | update_priv | Y | | shutdown_priv | N | | delete_priv | Y | | process_priv | N | | create_priv | N | | file_priv | N | +-----------------+---+ +-----------------+---+ BEWARE: Everybody can access your DB as user 'nobody' : WITHOUT supplying a password. Be very careful about it!! The following rules are used: db : 'foo.bar','Foo','nobody','Y','Y','Y','N','N','N' host : 'Not processed: host-field is not empty in db-table.' user : 'foo.bar','nobody','','N','N','N','Y','N','N','N','N','N','N' 3)Using wildcards: \$ $script \\* nobody Foo --brief ->report access-rights of user nobody from all machines to db Foo, and use a matrix-report. Sel Ins Upd Del Crea Drop Reld Shut Proc File Host,User,DB ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- -------------------- Y Y Y Y N N N N N N localhost,nobody,Foo N N N N N N N N N N %,nobody,Foo N N N N N N N N N N any_other_host,nobody,Foo _HOWTO # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # START OF THE PROGRAM # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # use Getopt::Long; use Sys::Hostname; use IPC::Open3; # **************************** # debugging flag # can be set to 0,1,2,3 # a higher value gives more info # ! this can also be set on the command-line $DEBUG = 0; # ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++>8 # Normally nothing should be changed beneeth this line # **************************** # no caching on STDOUT $|=1; $MYSQL_CNF = tmpnam(); %MYSQL_CNF = (client => { }, mysql => { }, mysqldump => { }, ); $NEW_USER = 'ANY_NEW_USER'; $NEW_DB = 'ANY_NEW_DB' ; # %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% # # mysqlaccess: # # ~~~~~~~~~~~ # # Lets get to it, # # and start the program by processing the parameters # # %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% # ($CMD,$CGI) = GetMode(); # **************************** # the copyright message should # always be printed (once) MySQLaccess::Report::Print_Header(); # ***************************** # Read configuration-file MySQLaccess::Debug::Print(1, "Reading configuration file..."); if (-f "/etc/$script_conf") { print "Configuration file '$script_conf' is found in '/etc/'\n"; require "/etc/$script_conf"; } elsif (-f "/usr/$script_conf") { print "Configuration file '$script_conf' is found in '/usr/'\n"; require "/usr/$script_conf"; } elsif (-f "./$script_conf") { print "\nERROR! Configuration file '$script_conf' is found in the current "; print "directory.\nThe permissible locations for this file are either "; print "/etc/ or /usr/\n"; print "Please move it to one of these locations and retry.\n\n"; exit 0; } # **************************** # Read in all parameters if ($MySQLaccess::CMD) { #command-line version # ---------------------------- # Get options from commandline $Getopt::Long::ignorecase=0; #case sensitive options if ( grep(/\-\?/,@ARGV) ) { MySQLaccess::Report::Print_Usage(); exit 0; } GetOptions("help" => \$Param{'help'} ,"host|h=s" => \$Param{'host'} ,"user|u=s" => \$Param{'user'} ,"password|p:s" => \$Param{'password'} ,"db|d=s" => \$Param{'db'} ,"superuser|U=s" => \$Param{'superuser'} ,"spassword|P:s" => \$Param{'spassword'} ,"rhost|H=s" => \$Param{'rhost'} ,"old_server" => \$Param{'old_server'} ,"debug=i" => \$Param{'DEBUG'} ,"brief|b" => \$Param{'brief'} ,"table|t" => \$Param{'table'} ,"relnotes" => \$Param{'relnotes'} ,"plan" => \$Param{'plan'} ,"howto" => \$Param{'howto'} ,"version|v" => \$Param{'version'} ,"preview" => \$Param{'preview'} ,"copy" => \$Param{'copy'} ,"commit" => \$Param{'commit'} ,'rollback' => \$Param{'rollback'} ); # ----------------------------- # set DEBUG $DEBUG = $Param{'DEBUG'} if ($Param{'DEBUG'}>=$DEBUG); # ----------------------------- # check for things which aren't # declared as options: # 2 arguments: (user,db) -> ('localhost','user','db') if ($#ARGV == 1) { MySQLaccess::Debug::Print(2,"$script called with 2 arguments:"); $Param{'host'} = $Param{'host'} || 'localhost'; $Param{'user'} = $ARGV[0] || $Param{'user'}; $Param{'db'} = $ARGV[1] || $Param{'db'}; } # 3 arguments: (host,user,db) if ($#ARGV == 2) { MySQLaccess::Debug::Print(2,"$script called with 3 arguments:"); $Param{'host'} = $ARGV[0] || $Param{'host'}; $Param{'user'} = $ARGV[1] || $Param{'user'}; $Param{'db'} = $ARGV[2] || $Param{'db'}; } # ------------------------------------- # prompt for user password if requested if ( defined($Param{'password'}) && length($Param{'password'}) == 0 ) { $Param{'password'} = PromptPass( "Password for MySQL user $Param{'user'}: "); } } if ($MySQLaccess::CGI) { #CGI-version require CGI; $Q = new CGI; $Param{'help'} = $Q->param('help') ; $Param{'host'} = $Q->param('host') || $Q->param('h') || $Param{'host'}; $Param{'user'} = $Q->param('user') || $Q->param('u') || $Param{'user'}; $Param{'db'} = $Q->param('db') || $Q->param('d') || $Param{'db'}; $Param{'password'} = $Q->param('password') || $Q->param('p') || $Param{'password'}; $Param{'superuser'} = $Q->param('superuser') || $Q->param('U') || $Param{'superuser'}; $Param{'spassword'} = $Q->param('spassword') || $Q->param('P') || $Param{'spassword'}; $Param{'rhost'} = $Q->param('rhost') || $Q->param('H') || $Param{'rhost'}; $Param{'old_server'}= $Q->param('old_server')|| $Param{'old_server'}; $Param{'debug'} = $Q->param('debug') || $Param{'debug'}; $Param{'brief'} = $Q->param('brief') || $Param{'brief'}; $Param{'table'} = $Q->param('table') || $Param{'table'}; $Param{'relnotes'} = $Q->param('relnotes'); $Param{'plan'} = $Q->param('plan'); $Param{'howto'} = $Q->param('howto'); $Param{'version'} = $Q->param('version') ? $Q->param('version') : $Q->param('v'); $Param{'edit'} = $Q->param('edit'); $Param{'preview'} = $Q->param('preview'); $Param{'copy'} = $Q->param('copy'); $Param{'commit'} = $Q->param('commit'); $Param{'rollback'} = $Q->param('rollback'); # ----------------------------- # set DEBUG $DEBUG = $Q->param('debug') if ($Q->param('debug')>=$DEBUG); } # ---------------------- # brief and table-format # exclude each-other # table-format is preferred if (defined($Param{'table'})) { undef($Param{'brief'}); } if (defined($Param{'preview'}) or defined($Param{'copy'}) or defined($Param{'commit'}) or defined($Param{'rollback'}) ) { $Param{'edit'}='on'; } # ---------------------- # if no host is given # assume we mean 'localhost' if (!defined($Param{'host'})) { $Param{'host'}='localhost'; } # ---------------------- # perform some checks # -> eliminate 'broken pipe' error push(@MySQLaccess::Grant::Error,'not_found_mysql') if !(-x $MYSQL); push(@MySQLaccess::Grant::Error,'not_found_diff') if !(-x $DIFF); push(@MySQLaccess::Grant::Error,'not_found_mysqldump') if !(-x $MYSQLDUMP); if (@MySQLaccess::Grant::Error) { MySQLaccess::Report::Print_Error_Messages() ; exit 0; } #----------------------- # get info/help if necc. $print_usage=1; if ( defined($Param{'version'}) ) { MySQLaccess::Report::Print_Version(); $print_usage=0; MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; # exit 0; } if ( defined($Param{'relnotes'}) ) { MySQLaccess::Report::Print_Relnotes(); $print_usage=0; MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; # exit 0; } if ( defined($Param{'plan'}) ) { MySQLaccess::Report::Print_Plans(); $print_usage=0; MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; # exit 0; } if ( defined($Param{'howto'}) ) { MySQLaccess::Report::Print_HowTo(); $print_usage=0; MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; # exit 0; } # ----------------------------- # generate a help-screen in CMD-mode # or a blanc form in CGI-mode if ( defined($Param{'help'}) or !defined($Param{'user'}) or !defined($Param{'host'}) or !defined($Param{'db'}) ) { push(@MySQLaccess::Grant::Error,'user_required') unless defined($Param{'user'}); push(@MySQLaccess::Grant::Error,'db_required') unless defined($Param{'db'}); push(@MySQLaccess::Grant::Error,'host_required') unless defined($Param{'host'}); MySQLaccess::Report::Print_Usage() if $print_usage; exit 0; } # ---------------------------- # get hostname and local-ip # for localhost $localhost = MySQLaccess::Host::LocalHost(); $local_ip = MySQLaccess::Host::Name2IP($localhost); $MySQLaccess::Host::localhost = MySQLaccess::Host::LocalHost(); $MySQLaccess::Host::local_ip = MySQLaccess::Host::Name2IP($localhost); MySQLaccess::Debug::Print(3, "localhost name=$localhost, ip=$local_ip"); #----------------------------------- # version of MySQL-server to connect # to determine use of full where clause $MySQLaccess::Host::SERVER = $Param{'old_server'} ? '3.20' : $SERVER; #--------------------------------- # create the config file for mysql and mysqldump # to avoid passing authentication info on the command line # MergeConfigFiles(); die "Unsafe config file found: $unsafeConfig\n" if $unsafeConfig; if (defined($Param{'superuser'})) { $MYSQL_CNF{'mysql'}{'user'} = $Param{'superuser'}; $MYSQL_CNF{'mysqldump'}{'user'} = $Param{'superuser'}; } if (defined($Param{'spassword'})) { if ( $CMD && length($Param{'spassword'}) == 0 ) { $Param{'spassword'} = PromptPass("Password for MySQL superuser $Param{'superuser'}: "); } if ( length($Param{'spassword'}) > 0 ) { $MYSQL_CNF{'mysql'}{'password'} = $Param{'spassword'}; $MYSQL_CNF{'mysqldump'}{'password'} = $Param{'spassword'}; } } WriteTempConfigFile(); #--------------------------------- # Inform user if he has not enough # privileges to read the access-db if ( $nerror=MySQLaccess::DB::OpenConnection() ) { MySQLaccess::Report::Print_Error_Access($nerror); exit 0; } # ----------------------- # Read MySQL ACL-files if ($nerror=MySQLaccess::Grant::ReadTables()) { MySQLaccess::Report::Print_Error_Access($nerror); exit 0; }; if ($Param{'edit'} and $nerror=MySQLaccess::Grant::ReadTables('tmp')) { MySQLaccess::Report::Print_Error_Access($nerror); exit 0; } #--------------------------------- # reload temporay grant-tables # with data from original ones if ( defined($Param{'copy'}) ) { $nerror=MySQLaccess::DB::LoadTmpTables(); if ($nerror) { MySQLaccess::Report::Print_Error_Access($nerror); exit 0; } my $msg = "The grant-rules are copied from the grant-tables to\n" . "the temporary tables."; MySQLaccess::Report::Print_Message([$msg]); # MySQLaccess::Report::Print_Footer(); # MySQLaccess::DB::CloseConnection(); # exit 0; } #--------------------------------- # preview result of changes in the # grant-tables if ( defined($Param{'preview'}) ) { $aref=MySQLaccess::Grant::Diff_Privileges(); MySQLaccess::Report::Print_Diff_ACL($aref); # MySQLaccess::Report::Print_Footer(); # MySQLaccess::DB::CloseConnection(); # exit 0; } #--------------------------------- # reload grant-tables # with data from temporary tables if ( defined($Param{'commit'}) ) { if ($nerror = MySQLaccess::DB::CommitGrantTables()) { MySQLaccess::Report::Print_Error_Access($nerror); exit 0; } my $msg = "The grant-rules have been copied from the temporary tables\n" . "to the grant-tables."; my $msg1= "Don't forget to do an 'mysqladmin reload' before these\n" . "changes take effect."; my $msg2= "A backup-version of your original grant-rules are saved in the\n" . "backup-tables, so you can always perform a 1-level rollback."; MySQLaccess::Report::Print_Message([$msg,$msg1,$msg2]); # MySQLaccess::Report::Print_Footer(); # MySQLaccess::DB::CloseConnection(); # exit 0; } #--------------------------------- # restore previous grant-rules # with data from backup tables if ( defined($Param{'rollback'}) ) { if ($nerror = MySQLaccess::DB::RollbackGrantTables()) { MySQLaccess::Report::Print_Error_Access($nerror); exit 0; } my $msg = "The old grant-rules have been copied back from the backup tables\n" . "to the grant-tables."; my $msg1= "Don't forget to do an 'mysqladmin reload' before these\n" . "changes take effect."; MySQLaccess::Report::Print_Message([$msg,$msg1]); # MySQLaccess::Report::Print_Footer(); # MySQLaccess::DB::CloseConnection(); # exit 0; } #---------------------------------- # show edit-taskbar if ( defined($Param{'edit'})) { if ($MySQLaccess::CGI ) { MySQLaccess::Report::Print_Edit(); $print_usage=0; MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; } else { MySQLaccess::Report::Print_Edit(); $print_usage=0; MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; } } # ----------------------------- # Build list of users,dbs,hosts # to process... @all_dbs = @{MySQLaccess::DB::Get_All_dbs($Param{'db'})}; @all_users = @{MySQLaccess::DB::Get_All_users($Param{'user'})}; @all_hosts = @{MySQLaccess::DB::Get_All_hosts($Param{'host'})}; #if EDIT-mode #@all_dbs_tmp = @{MySQLaccess::DB::Get_All_dbs($Param{'db'},'tmp')}; #@all_users_tmp = @{MySQLaccess::DB::Get_All_users($Param{'user'},'tmp')}; #@all_hosts_tmp = @{MySQLaccess::DB::Get_All_hosts($Param{'host'},'tmp')}; # ----------------------------- # Report access-rights for each # tuple (host,user,db) #$headers=0; my %Access = (); foreach $host (@all_hosts) { foreach $user (@all_users) { foreach $db (@all_dbs) { MySQLaccess::Grant::Initialize(); %Access = MySQLaccess::Grant::Get_Access_Rights($host,$user,$db); MySQLaccess::Report::Print_Access_rights($host,$user,$db,\%Access); } } } # ----------------------------- # End script MySQLaccess::Report::Print_Footer(); MySQLaccess::DB::CloseConnection(); exit 0; ############################################################# # FUNCTIONS # ############### sub GetMode { my $cmd=0; my $cgi=0; if (defined($ENV{'HTTP_HOST'})) { $cmd=0; $cgi=1; } else { $cmd=1; $cgi=0; } return ($cmd,$cgi); } # ================================ # sub PromptPass # prompt tty for a password # ================================ sub PromptPass { my ($prompt) = @_; my $password; $ENV{PATH} = "/bin:/usr/bin"; $ENV{IFS} = " \t\n"; $ENV{SHELL} = "/bin/sh"; system "stty -echo"; print $prompt; chomp($password = <STDIN>); print "\n"; system "stty echo"; $password; } # ================================= # sub CheckUnsafeFile # tell if a config file containing a password is unsafe # ================================= sub CheckUnsafeFile { my ($fname) = @_; my ($dev, $ino, $mode, $nlink, $uid, $gid, $rdev, $size, $atime, $mtime, $ctime, $blksize, $blocks) = stat($fname); if ( $uid != $< ) { # unsafe if owned by other than current user return 1; } if ( $mode & 066 ) { # unsafe if accessible by other return 1; } $fname =~ s#/[^/]+$##; if ( (length $fname) > 0 ) { return CheckUnsafeDir($fname); } return 0; } # ================================= # sub CheckUnsafeDir # tell if a directory is unsafe # ================================= sub CheckUnsafeDir { my ($fname) = @_; my ($dev, $ino, $mode, $nlink, $uid, $gid, $rdev, $size, $atime, $mtime, $ctime, $blksize, $blocks) = stat($fname); # not owned by me or root if ( ($uid != $<) && ($uid != 0) ) { return 1; } if ( $mode & 022 ) { # unsafe if writable by other return 1 unless $mode & 01000; # but sticky bit ok } $fname =~ s#/[^/]+$##; if ( (length $fname) > 0 ) { return CheckUnsafeDir($fname); } return 0; } # ================================= # sub MergeConfigFile # merge data from .cnf file # ================================= sub MergeConfigFile { my ($fname) = @_; my ($group, $item, $value); if ( open CNF, $fname ) { while (<CNF>) { s/^\s+//; next if /^[#;]/; if ( /\[\s*(\w+)\s*]/ ) { $group = $1; $group =~ tr/A-Z/a-z/; if ( !exists $MYSQL_CNF{$group} ) { undef $group; } } elsif ( defined $group ) { ($item, $value) = /((?:\w|-)+)\s*=\s*(\S+)/; # don't unquote backslashes as we just write it back out if ( defined $item ) { if ( $item =~ /^password$/ ) { if ( CheckUnsafeFile($fname) ) { $unsafeConfig = $fname; } } if ( $group eq 'client' || $group eq "client-server") { $MYSQL_CNF{'mysql'}{$item} = $value; $MYSQL_CNF{'mysqldump'}{$item} = $value; } else { $MYSQL_CNF{$group}{$item} = $value; } } } } close(CNF); } } # ================================= # sub MergeConfigFiles # merge options from config files # NOTE: really should do two separate merges for each # client to exactly duplicate order of resulting argument lists # ================================= sub MergeConfigFiles { my ($name,$pass,$uid,$gid,$quota,$comment,$gcos,$dir,$shell) = getpwuid $<; MergeConfigFile("/usr/my.cnf"); MergeConfigFile("/etc/my.cnf"); MergeConfigFile("$dir/.my.cnf"); } # ================================= # sub WriteTempConfigFile # write # ================================= sub WriteTempConfigFile { sysopen CNFFILE, $MYSQL_CNF, O_RDWR|O_CREAT|O_EXCL, 0700 or die "sysopen $MYSQL_CNF: $!"; # groups may be in any order, generic groups such as [client] assumed # here to be empty foreach $group (keys %MYSQL_CNF) { print CNFFILE "[$group]\n"; foreach $item (keys %{$MYSQL_CNF{$group}}) { if ( defined $MYSQL_CNF{$group}{$item} ) { print CNFFILE "$item=$MYSQL_CNF{$group}{$item}\n"; } else { print CNFFILE "$item\n"; } } print CNFFILE "\n"; } close(CNFFILE); } ###################################################################### package MySQLaccess::DB; ########### BEGIN { $DEBUG = 2; $DEBUG = $MySQLaccess::DEBUG unless ($DEBUG); # Error-messages from the MySQL client %ACCESS_ERR= ('Access_denied' => 'Access denied' ,'Dbaccess_denied' => 'Access to database denied' ,'Unrecognized_option' => 'unrecognized option' ,'Unknown_table' => "Can't find file:" ,'unknown_error' => '^ERROR:' ); } # ###################################### # Connecting to the MYSQL DB # ====================================== # sub OpenConnection # Open an connection to the mysql-db # questions to MYSQL_Q # answers from MYSQL_A # ====================================== sub OpenConnection { my $pid; MySQLaccess::Debug::Print(2,"OpenConnection:"); # check path to mysql-client executable if (! -f $MySQLaccess::MYSQL) { if ($MySQLaccess::CMD) { die "Could not find MySQL-client '$MySQLaccess::MYSQL'"; } if ($MySQLaccess::CGI) { print "<center>\n<font color=Red>\n"; print "ERROR: Could not find MySQL-client '$MySQLaccess::MYSQL'"; print "</center>\n</font>\n"; exit 0; } } # path to mysql executable my $connect = "$MySQLaccess::MYSQL --defaults-file=$MySQLaccess::MYSQL_CNF"; $connect .= " $MySQLaccess::MYSQL_OPT"; # superuser, spassword transmitted via defaults-file if (defined($MySQLaccess::Param{'rhost'})) { $connect .= " --host=$MySQLaccess::Param{'rhost'}"; } # other options?? # grant-database $connect .= " $MySQLaccess::ACCESS_DB"; # open connection (not using /bin/sh -c) MySQLaccess::Debug::Print(2,"Connecting to: $connect"); $pid=IPC::Open3::open3(\*MYSQL_Q,\*MYSQL_A,"",split /\s+/,$connect); MySQLaccess::Debug::Print(2,"PID of open pipe: $pid"); # check connection print MYSQL_Q "select 'ok';\n"; $answer = <MYSQL_A>; #answer from mysql MySQLaccess::Debug::Print(2,"Answer: $answer\n"); foreach $nerror (sort(keys(%ACCESS_ERR))) { MySQLaccess::Debug::Print(3,"check answer for error $ACCESS_ERR{$nerror}"); if (grep(/$ACCESS_ERR{$nerror}/i,$answer)) { MySQLaccess::Debug::Print(2,"Answer contain error [$nerror]"); return $nerror; } } if (0) { # check server-version print MYSQL_Q "select 'ok';\n"; $answer = <MYSQL_A>; #answer from mysql MySQLaccess::Debug::Print(2,"Answer: $answer\n"); foreach $nerror (sort(keys(%ACCESS_ERR))) { MySQLaccess::Debug::Print(3,"check answer for error $ACCESS_ERR{$nerror}"); if (grep(/$ACCESS_ERR{$nerror}/i,$answer)) { MySQLaccess::Debug::Print(2,"Answer contain error [$nerror]"); return $nerror; } } } my $skip=<MYSQL_A>; return 0; } # ====================================== # sub CloseConnection # Close the connection to the mysql-db # ====================================== sub CloseConnection { close MYSQL_Q; close MYSQL_A; } # =========================================================== # sub CreateTable($table) # Create temporary/backup table # =========================================================== sub CreateTable { my $pid; my ($table,$force) = @_; my %tables = ( $MySQLaccess::ACCESS_U_TMP => $MySQLaccess::ACCESS_U, $MySQLaccess::ACCESS_H_TMP => $MySQLaccess::ACCESS_H, $MySQLaccess::ACCESS_D_TMP => $MySQLaccess::ACCESS_D, $MySQLaccess::ACCESS_U_BCK => $MySQLaccess::ACCESS_U, $MySQLaccess::ACCESS_H_BCK => $MySQLaccess::ACCESS_H, $MySQLaccess::ACCESS_D_BCK => $MySQLaccess::ACCESS_D, $MySQLaccess::ACCESS_U => $MySQLaccess::ACCESS_U_BCK, $MySQLaccess::ACCESS_H => $MySQLaccess::ACCESS_H_BCK, $MySQLaccess::ACCESS_D => $MySQLaccess::ACCESS_D_BCK, ); my $tbl; my $query=""; my $delim; my $skip; my $create; my @known_tables=(); # print STDERR "CreateTable($table)\n"; MySQLaccess::Debug::Print(1,"CreateTable($table):"); ## error-handling return 'Unknown_table' unless defined($tables{$table}); ## build list of known/existing tables; ## if 'force' existing table is dropped first if (defined($force) and $force) { @known_tables = Show_Tables(); if (grep(/^$table$/,@known_tables)) { $query = "DROP TABLE $table;"; } } ## path to mysqldump executable my $connect = $MySQLaccess::MYSQLDUMP; $connect .= " --defaults-file=$MySQLaccess::MYSQL_CNF --no-data"; # superuser, spassword transmitted via defaults-file if (defined($MySQLaccess::Param{'rhost'})) { $connect .= " --host=$MySQLaccess::Param{'rhost'}"; } $connect .= " $MySQLaccess::ACCESS_DB"; $connect .= " $tables{$table}"; ## get creation-data for original table $create = ''; my $mysqldump = $connect; $mysqldump =~ s/ \$TABLE / $tbl /; # open connection (not using /bin/sh -c) MySQLaccess::Debug::Print(2,"Connecting to: $connect"); $pid=IPC::Open3::open3(\*DONTCARE,\*CREATE,"",split /\s+/,$mysqldump); MySQLaccess::Debug::Print(2,"PID of open pipe: $pid"); #open(CREATE,"$mysqldump"); @create = <CREATE>; $create = "@create"; foreach $nerror (sort(keys(%ACCESS_ERR))) { MySQLaccess::Debug::Print(3,"check answer for error $ACCESS_ERR{$nerror}"); if (grep(/$ACCESS_ERR{$nerror}/i,$create)) { MySQLaccess::Debug::Print(2,"Answer contain error [$nerror]"); return $nerror; } } close(CREATE); close(DONTCARE); ## manipulate result for creation-data for temporary table $create =~ s/CREATE TABLE $tables{$table} \(/CREATE TABLE $table \(/; ## recreate temporary table $query .= "$create\n"; $query .= "select 'ok';"; ## execute query print MYSQL_Q "$query\n"; # print STDERR $query; $answer = <MYSQL_A>; #answer from mysql # print STDERR "A>",$answer; MySQLaccess::Debug::Print(2,"Answer: $answer\n"); foreach $nerror (sort(keys(%ACCESS_ERR))) { # print STDERR "->$nerror?"; MySQLaccess::Debug::Print(3,"check answer for error $ACCESS_ERR{$nerror}"); if (grep(/$ACCESS_ERR{$nerror}/i,$answer)) { # print STDERR "Yes!"; MySQLaccess::Debug::Print(2,"Answer contain error [$nerror]"); return $nerror; } } $delim = <MYSQL_A>; # read header if ($delim ne "ok\n") { while (($line=<MYSQL_A>) ne "ok\n") { MySQLaccess::Debug::Print(3," A> $line"); } $skip = <MYSQL_A>; # skip result 'ok' } # print STDERR "CreateTable done\n"; return 0; } # =========================================================== # sub CopyTable() # Copy the structure and the data of a table to another table # =========================================================== sub CopyTable { my ($from,$to,$force) = @_; my @known_tables = Show_Tables(); my $query = ""; my $nerror= 0; my $skip; # print STDERR "CopyTable($from,$to)\n"; MySQLaccess::Debug::Print(1,"MySQLaccess::DB::CopyTable($from,$to)"); ## error-handling if (!grep(/^$from$/,@known_tables)) { return 'Unknown_table'; } ## copy structure ## if forced if (defined($force) and $force) { return $nerror if ($nerror=CreateTable($to,$force)); # print STDERR "Structure copied\n"; } ## copy data $query .= "DELETE FROM $to;"; $query .= "INSERT INTO $to SELECT * FROM $from;"; $query .= "SELECT 'ok';\n"; MySQLaccess::Debug::Print(2,"Query: $query"); ## execute query print MYSQL_Q "$query\n"; # print STDERR $query; ## check for errors... my $answer = <MYSQL_A>; #answer from mysql # print STDERR $answer; MySQLaccess::Debug::Print(2,"Answer: $answer\n"); foreach $nerror (sort(keys(%ACCESS_ERR))) { MySQLaccess::Debug::Print(3,"check answer for error $ACCESS_ERR{$nerror}"); if (grep(/$ACCESS_ERR{$nerror}/i,$answer)) { MySQLaccess::Debug::Print(2,"Answer contain error [$nerror]"); return $nerror; } } my $delim = <MYSQL_A>; # read header # print STDERR $delim; if ($delim ne "ok\n") { while (($line=<MYSQL_A>) ne "ok\n") { MySQLaccess::Debug::Print(3," A> $line"); } $skip = <MYSQL_A>; # skip result 'ok' } return 0; } # =========================================================== # sub LoadTmpTables() # (Re)load temporary tables with entries of ACL-tables # =========================================================== sub LoadTmpTables { my %tables = ( $MySQLaccess::ACCESS_U => $MySQLaccess::ACCESS_U_TMP, $MySQLaccess::ACCESS_H => $MySQLaccess::ACCESS_H_TMP, $MySQLaccess::ACCESS_D => $MySQLaccess::ACCESS_D_TMP, ); my $tbl; my $nerror; # print STDERR "LoadTmpTables:\n"; MySQLaccess::Debug::Print(1,"LoadTmpTables():"); foreach $tbl (keys(%tables)) { # print STDERR "$tbl -> $tables{$tbl}\n"; MySQLaccess::Debug::Print(2,"Loading table $tbl -> $tables{$tbl}."); return $nerror if ($nerror=CopyTable($tbl,$tables{$tbl},'force')); } return 0; } # =========================================================== # sub BackupGrantTables() # Make a backup of the original grant-tables # =========================================================== sub BackupGrantTables { my %tables = ( $MySQLaccess::ACCESS_U => $MySQLaccess::ACCESS_U_BCK, $MySQLaccess::ACCESS_H => $MySQLaccess::ACCESS_H_BCK, $MySQLaccess::ACCESS_D => $MySQLaccess::ACCESS_D_BCK, ); my $tbl; my $nerror; # print STDERR "BackupGrantTables:\n"; MySQLaccess::Debug::Print(1,"BackupGrantTables():"); foreach $tbl (keys(%tables)) { # print STDERR "$tbl -> $tables{$tbl}\n"; MySQLaccess::Debug::Print(2,"Backup table $tbl -> $tables{$tbl}."); return $nerror if ($nerror=CopyTable($tbl,$tables{$tbl},'force')); } return 0; } # =========================================================== # sub RollbackGrantTables() # Rollback the backup of the grant-tables # =========================================================== sub RollbackGrantTables { my %tables = ( $MySQLaccess::ACCESS_U_BCK => $MySQLaccess::ACCESS_U, $MySQLaccess::ACCESS_H_BCK => $MySQLaccess::ACCESS_H, $MySQLaccess::ACCESS_D_BCK => $MySQLaccess::ACCESS_D, ); my $tbl; my $nerror; # print STDERR "RollbackGrantTables:\n"; MySQLaccess::Debug::Print(1,"RollbackGrantTables():"); foreach $tbl (keys(%tables)) { # print STDERR "$tbl -> $tables{$tbl}\n"; MySQLaccess::Debug::Print(2,"Rollback table $tbl -> $tables{$tbl}."); return $nerror if ($nerror=CopyTable($tbl,$tables{$tbl},'force')); } return 0; } # =========================================================== # sub CommitGrantTables() # Copy grant-rules from temporary tables to the ACL-tables # =========================================================== sub CommitGrantTables { my %tables = ( $MySQLaccess::ACCESS_U => $MySQLaccess::ACCESS_U_TMP, $MySQLaccess::ACCESS_H => $MySQLaccess::ACCESS_H_TMP, $MySQLaccess::ACCESS_D => $MySQLaccess::ACCESS_D_TMP, ); my $tbl; my $query; my $delim; my $skip; my $create; print STDERR "CommitGrantTables()\n"; MySQLaccess::Debug::Print(1,"CommitGrantTables():"); ## Make backup of original grant-tables MySQLaccess::Debug::Print(2,"Making backup of original grant-tables..."); BackupGrantTables(); ## Copy data from temporay tables to grant-tables foreach $tbl (keys(%tables)) { print STDERR "$tbl -> $tables{$tbl}\n"; MySQLaccess::Debug::Print(2,"Loading data $tables{$tbl} -> $tbl."); return $nerror if ($nerror=CopyTable($tables{$tbl},$tbl)); } return 0; } # =========================================================== # sub Show_Fields($table): # return (a reference to) a hash which holds the names # of all relevant grant-fields, with their index in the record, # and (a reference to) an array which holds the fieldnames. # =========================================================== sub Show_Fields { my ($table) = @_; my %skip = ('host' => [0,1] ,'user' => [0,1,2] ,'db' => [0,1,2] ); my %Struct = (); my @Struct = (); my $query = "show fields from $table;select 'ok';\n"; my $i=0; my $line; #print STDERR $query; MySQLaccess::Debug::Print(1,"Show_Fields($table):"); MySQLaccess::Debug::Print(2,"SQL: $query"); print MYSQL_Q "$query"; my $skip = <MYSQL_A>; #skip header while (($line=<MYSQL_A>) ne "ok\n") { #print STDERR ">",$line; chop($line); MySQLaccess::Debug::Print(2," $table>: $line"); my ($field,$type,$null,$key,$default,$extra) = split(' ',$line); $field = ucfirst($field); MySQLaccess::Debug::Print(3, " <split: $field - $type - $null - $key - $default - $extra"); if (! grep(/$i/,@{$skip{$table}}) ){ $Struct{$field} = $i; #hash push(@Struct,$field); #array MySQLaccess::Debug::Print(3," ==> added column[$i]: $field ($Struct{$field})"); } else { MySQLaccess::Debug::Print(3," ==> skipped column[$i], value=[$field]"); } $i++; } $skip=<MYSQL_A>; # Get ok row (found already ok header) MySQLaccess::Debug::Print(2, "Array:"); foreach $field (@Struct) { MySQLaccess::Debug::Print(2,"+ $field"); } MySQLaccess::Debug::Print(2,"Hash:"); foreach $field (keys(%Struct)) { MySQLaccess::Debug::Print(2,"+ $field -> $Struct{$field}"); } return (\%Struct,\@Struct); } # =========================================================== # sub Show_Tables(): # return (a reference to) an array which holds all # known tables. # =========================================================== sub Show_Tables { my @Tables = (); my $query = "show tables;select 'ok';\n"; my $i=0; my $line; MySQLaccess::Debug::Print(1,"Show_Tables():"); MySQLaccess::Debug::Print(2,"SQL: $query"); print MYSQL_Q "$query"; my $skip = <MYSQL_A>; #skip header while (($line=<MYSQL_A>) ne "ok\n") { chop($line); push(@Tables,$line); #array MySQLaccess::Debug::Print(3," ==> added table: $line"); } $skip=<MYSQL_A>; # Get ok row (found already ok header) MySQLaccess::Debug::Print(2, "Array:"); foreach $tbl (@Tables) { MySQLaccess::Debug::Print(2,"+ $tbl"); } return @Tables; } # ====================================== # sub Validate_Password($passwd,$host,$user,$encpw) # Validate the given password # for user '$user' # connecting from host '$host' # ====================================== sub Validate_Password { my ($password,$host,$user,$encpw) = @_; my $valid=0; MySQLaccess::Debug::Print(1,"Validate_Password($password,$host,$user,$encpw)"); my $sql = "select host,user,password from user having " ."host='$host' and user='$user' and password='$encpw' " ."and password=PASSWORD('$password');\n"; $sql .= "select 'ok';\n"; MySQLaccess::Debug::Print(2,"SQL = $sql"); print MYSQL_Q "$sql"; # if password is valid, at least 1 row returns before we read 'ok' while ( ($line=<MYSQL_A>) ne "ok\n") { MySQLaccess::Debug::Print(2," A> $line"); $valid = defined($line); } my $skip = <MYSQL_A>; # read 'ok' return $valid; } # ========================================================== # sub Sort_fields: (rewritten by psmith) # Build the query for an ordered list of entries # ========================================================== sub Sort_fields { my ($start, $end, $sofar, $this, @rest) = (@_); my @where = ("((FIELD not like '\\%') AND (FIELD <> ''))", "((FIELD like '%\\%%') OR (FIELD like '%\\_%'))", "(FIELD = '')"); my $res = ''; $this or return ("$start $sofar $end"); $sofar .= ' AND ' if $sofar; foreach $w (@where) { my $f = $w; $f =~ s/FIELD/$this/g; $res .= Sort_fields($start, $end, "$sofar$f", @rest); } return ($res); } # =========================================================== # sub Sort_table: (rewritten by psmith) # return all entries in the given table, # in an ordered fashion # =========================================================== sub Sort_table { my ($tbl, @order) = @_; my @res=(); # as long as there's no full where clause (Distrib 3.20)... # use having :-( # NOTE: this clause WILL NOT work on 3.21, because of the # order of 'ORDER BY' and 'HAVING' my $start = "SELECT *,UCASE(host) as ucase_host FROM $tbl "; $start .= 'ORDER BY ' . join(',', @order) ." HAVING "; my $end = ";\n"; # server version 3.21 has a full where clause :-) if ($MySQLaccess::Host::SERVER >= '3.21') { # print "+++USING FULL WHERE CLAUSE+++\n"; $start = "SELECT *,UCASE(host) as ucase_host FROM $tbl WHERE "; $end = ' ORDER BY ' . join(',', @order) . ";\n"; } MySQLaccess::Debug::Print(1,"Sort_table():"); MySQLaccess::Debug::Print(2,"Sorting table $tbl by `@order'"); my $tmp; foreach $tmp (@order) { $tmp="UCASE(host)" if ($tmp eq "ucase_host"); } my $query = Sort_fields($start, $end, '', @order); $query .= "select 'ok';\n"; MySQLaccess::Debug::Print(2,"Query: $query"); print MYSQL_Q "$query\n"; my $delim = <MYSQL_A>; # read header MySQLaccess::Debug::Print(3," A> $delim"); if ($delim ne "ok\n") { if ($delim =~ /^ERROR/) { push(@MySQLaccess::Grant::Error,'use_old_server'); MySQLaccess::Report::Print_Error_Messages() ; exit 1; } while (($line=<MYSQL_A>) ne "ok\n") { MySQLaccess::Debug::Print(3," A> $line"); push(@res,$line); } } my $skip = <MYSQL_A>; # skip result 'ok' # remove columnheaders from output @res = grep(!/^\Q$delim\E$/, @res); # remove trailing \n from each returned record chomp(@res); # each record has 1 field to much : ucase_host @res = grep { /(.*)\t.*$/; $_ = $1; } @res; MySQLaccess::Debug::Print(2,"Result of sorted table $tbl:"); foreach $line (@res) { MySQLaccess::Debug::Print(2," >>$line"); } return @res; } # =========================================================== # sub Get_All_db(template): # return all db the grant-tables are working on, # which conform to the template # =========================================================== sub Get_All_dbs { my ($template,$tmp) = @_; my @db=(); my $aref; # working with temporary tables or production tables if (defined($tmp) and $tmp) { $aref = \@MySQLaccess::Grant::sorted_db_tmp_table ; } else { $aref = \@MySQLaccess::Grant::sorted_db_table; } MySQLaccess::Debug::Print(1," template=[$template]"); # get all db for which access-rights can be calculated, # which conform to the template. # !! these db's don't have to exist yet, so it's not # enough to look which db already exist on the system $reg_expr = $template; if ($template =~ /[\*\?]/) { $reg_expr =~ tr/*?/%_/; #$reg_expr = MySQLaccess::Wildcards::Wild2Reg($template); } $reg_expr = MySQLaccess::Wildcards::SQL2Reg("$reg_expr"); if ( ! ($template =~ /[\*\?%_]/) ) { push(@db,$template); return \@db; } MySQLaccess::Debug::Print(2,"#Reading db-table..."); foreach $record (@{$aref}) { #MySQLaccess::Grant::sorted_db_table) { my @record=split(/\t/,$record); my $db = $record[1]; MySQLaccess::Debug::Print(2,"> $db "); if ( (!grep(/$db/i,@db)) and ($db =~/$reg_expr/i) ) { push(@db,$db); MySQLaccess::Debug::Print(2,"added"); } else { MySQLaccess::Debug::Print(2,"skipped"); } } # if no rule is found for a certain db in the db-table, # the rights of the user are used, so we should inform # the user for if (!grep(/^%$/,@db)) { push(@db,"$MySQLaccess::NEW_DB"); } return \@db; } # =========================================================== # sub Get_All_users(template): # return all users the grant-tables are working on, # which conform to the template # =========================================================== sub Get_All_users { ($template,$tmp) = @_; # nog verder uitwerken!!! my @user=(); my $aref; # working with temporary tables or production tables if (defined($tmp) and $tmp) { $aref = \@MySQLaccess::Grant::sorted_user_tmp_table ; } else { $aref = \@MySQLaccess::Grant::sorted_user_table; } MySQLaccess::Debug::Print(1,"Debug Get_All_users:"); # get all db for which access-rights can be calculated. # !! these db's don't have to exist yet, so it's not # enough to look which db already exist on the system $reg_expr = $template; if ($template =~ /[\*\?]/) { $reg_expr =~ tr/*?/%_/; #$reg_expr = MySQLaccess::Wildcards::Wild2Reg($template); } $reg_expr = MySQLaccess::Wildcards::SQL2Reg("$reg_expr"); if ( ! ($template =~ /[\*\?%_]/) ) { push(@user,$template); return \@user; } MySQLaccess::Debug::Print(2,"#Reading user-table..."); foreach $record (@{$aref}) { #MySQLaccess::Grant::sorted_user_table) { my @record=split(/\t/,$record); my $user = $record[1]; MySQLaccess::Debug::Print(2,"> $user "); if ( (!grep(/$user/,@user)) and ($user=~/$reg_expr/)) { push(@user,$user); MySQLaccess::Debug::Print(2, "added"); } else { MySQLaccess::Debug::Print(2, "skipped"); } } # Any user means also: # - the 'empty' user, ie without supplying a username # - any user still to be defined/created #push(@user,''); #without_suplying_a_username push(@user,"$MySQLaccess::NEW_USER"); #push(@Warnings,'minimum_priv'); return \@user; } # =========================================================== # sub Get_All_hosts(template): # return all hosts the grant-tables are working on, # which conform to the template # =========================================================== sub Get_All_hosts { my ($template,$tmp) = @_; my @host=(); my $aref; my $aref1; # working with temporary tables or production tables if (defined($tmp) and $tmp) { $aref = \@MySQLaccess::Grant::sorted_host_tmp_table ; $aref1= \@MySQLaccess::Grant::sorted_db_tmp_table ; } else { $aref = \@MySQLaccess::Grant::sorted_host_table; $aref1= \@MySQLaccess::Grant::sorted_db_table ; } MySQLaccess::Debug::Print(1, "Debug Get_All_hosts:"); # get all db for which access-rights can be calculated. # !! these db's don't have to exist yet, so it's not # enough to look which db already exist on the system $reg_expr = $template; if ($template =~ /[\*\?]/) { $reg_expr =~ tr/*?/%_/; #$reg_expr = MySQLaccess::Wildcards::Wild2Reg($template); } $reg_expr = MySQLaccess::Wildcards::SQL2Reg("$reg_expr"); if ( ! ($template =~ /[\*\?%_]/) ) { push(@host,$template); return \@host; } MySQLaccess::Debug::Print(1, "#Reading db-table..."); foreach $record (@{$aref1}) { #MySQLaccess::Grant::sorted_db_table) { my @record=split(/\t/,$record); my $host = $record[0]; MySQLaccess::Debug::Print(2, "> $host "); if (! grep(/$host/i,@host)) { push(@host,$host); MySQLaccess::Debug::Print(2, "added"); } else { MySQLaccess::Debug::Print(2, "skipped"); } } MySQLaccess::Debug::Print(1, "#Reading host-table..."); foreach $record (@{$aref}) { my @record=split(/\t/,$record); my $host = $record[0]; MySQLaccess::Debug::Print(2, "> $host "); if ( (!grep(/$host/,@host)) and ($host=~/$reg_expr/)) { push(@host,$host); MySQLaccess::Debug::Print(2, "added"); } else { MySQLaccess::Debug::Print(2, "skipped"); } } # DOUBT: #print "#Reading user-table...\n" if ($DEBUG>1); #foreach $record (@MySQLaccess::Grant::sorted_user_table) { # my @record=split(/\t/,$record); # my $host = $record[0]; # print "> $host " if ($DEBUG>2); # if ( (!grep(/$host/,@host)) and ($host=~/$reg_expr/)) { # push(@host,$host); # print "added\n" if ($DEBUG>2); # } # else { # print "skipped\n" if ($DEBUG>2); # } #} # Any host also means: # - any host still to be defined/created #push(@host,"any_other_host"); @host = sort(@host); return \@host; } ########################################################################## package MySQLaccess::Grant; ############## BEGIN { $DEBUG = 0; $DEBUG = $MySQLaccess::DEBUG unless ($DEBUG); } # =========================================================== # sub Diff_Privileges() # Calculate diff between temporary and original grant-tables # =========================================================== sub Diff_Privileges { my @before=(); my @after =(); my @diffs =(); # ----------------------------- # Build list of users,dbs,hosts # to process... my @all_dbs = @{MySQLaccess::DB::Get_All_dbs('*')}; my @all_users = @{MySQLaccess::DB::Get_All_users('*')}; my @all_hosts = @{MySQLaccess::DB::Get_All_hosts('*')}; #if EDIT-mode my @all_dbs_tmp = @{MySQLaccess::DB::Get_All_dbs('*','tmp')}; my @all_users_tmp = @{MySQLaccess::DB::Get_All_users('*','tmp')}; my @all_hosts_tmp = @{MySQLaccess::DB::Get_All_hosts('*','tmp')}; my %Access; # ------------------------------------ # Build list of priv. for grant-tables foreach $host (@all_hosts) { foreach $user (@all_users) { foreach $db (@all_dbs) { MySQLaccess::Grant::Initialize(); %Access = MySQLaccess::Grant::Get_Access_Rights($host,$user,$db); push(@before,MySQLaccess::Report::Raw_Report($host,$user,$db,\%Access)); } } } # ---------------------------------- # Build list of priv. for tmp-tables foreach $host (@all_hosts_tmp) { foreach $user (@all_users_tmp) { foreach $db (@all_dbs_tmp) { MySQLaccess::Grant::Initialize('tmp'); %Access = MySQLaccess::Grant::Get_Access_Rights($host,$user,$db,'tmp'); push(@after,MySQLaccess::Report::Raw_Report($host,$user,$db,\%Access)); } } } # ---------------------------------- # Write results to temp-file to make # DIFF @before = sort(@before); @after = sort(@after); ($hb, $before) = tempfile("$MySQLaccess::script.XXXXXX") or push(@MySQLaccess::Report::Errors,"Can't create temporary file: $!"); ($ha, $after) = tempfile("$MySQLaccess::script.XXXXXX") or push(@MySQLaccess::Report::Errors,"Can't create temporary file: $!"); print $hb join("\n",@before); print $ha join("\n",@after); close $hb; close $ha; # ---------------------------------- # compute difference my $cmd="$MySQLaccess::DIFF $before $after |"; open(DIFF,"$cmd"); @diffs = <DIFF>; @diffs = grep(/[<>]/,@diffs); chomp(@diffs); close(DIFF); # ---------------------------------- # cleanup temp. files unlink($before); unlink($after); return \@diffs; } # =========================================================== # sub Initialize() # # =========================================================== sub Initialize { %MySQLaccess::Grant::Access = %{Default_Access_Rights()}; @MySQLaccess::Grant::Errors = (); @MySQLaccess::Grant::Warnings = (); @MySQLaccess::Grant::Notes = (); # ----- # rules $MySQLaccess::Grant::Rules{'user'} = 'no_rule_found'; $MySQLaccess::Grant::Rules{'db'} = 'no_rule_found'; $MySQLaccess::Grant::Rules{'host'} = 'no_equiv_host'; $MySQLaccess::Grant::full_access = 1; $MySQLaccess::Grant::process_host_table = 0; return 1; } # =========================================================== # sub ReadTables() # # =========================================================== sub ReadTables { my ($tmp) = @_; my ($HOST,$DB,$USER); my @tables; # build list of available tables @tables = MySQLaccess::DB::Show_Tables(); # reading production grant-tables or temporary tables? $tmp = (defined($tmp) and $tmp) ? 1 : 0; if ($tmp) { #reading temporary tables $HOST=$MySQLaccess::ACCESS_H_TMP; $DB =$MySQLaccess::ACCESS_D_TMP; $USER=$MySQLaccess::ACCESS_U_TMP; # ---------------------------- # do tables exist? if (!grep(/$HOST/,@tables)) { MySQLaccess::DB::CreateTable($HOST); } if (!grep(/$USER/,@tables)) { MySQLaccess::DB::CreateTable($USER); } if (!grep(/$DB/,@tables)) { MySQLaccess::DB::CreateTable($DB); } MySQLaccess::Debug::Print(1,"Finding fields in tmp-ACL files:"); # ----------------------------- # Get record-layout my ($h1,$h2) = MySQLaccess::DB::Show_Fields($HOST); my ($d1,$d2) = MySQLaccess::DB::Show_Fields($DB); my ($u1,$u2) = MySQLaccess::DB::Show_Fields($USER); %MySQLaccess::Grant::H_tmp = %{$h1}; @MySQLaccess::Grant::H_tmp = @{$h2}; %MySQLaccess::Grant::D_tmp = %{$d1}; @MySQLaccess::Grant::D_tmp = @{$d2}; %MySQLaccess::Grant::U_tmp = %{$u1}; @MySQLaccess::Grant::U_tmp = @{$u2}; # @MySQLaccess::Grant::Privileges_tmp=@{Make_Privlist()}; # MySQLaccess::Debug::Print(1, "Reading sorted temp-tables:"); @MySQLaccess::Grant::sorted_db_tmp_table = MySQLaccess::DB::Sort_table($DB, 'ucase_host', 'user', 'db'); @MySQLaccess::Grant::sorted_host_tmp_table= MySQLaccess::DB::Sort_table($HOST, 'ucase_host', 'db'); @MySQLaccess::Grant::sorted_user_tmp_table= defined($MySQLaccess::Param{'password'}) ? MySQLaccess::DB::Sort_table($USER, 'ucase_host', 'user', 'password'): MySQLaccess::DB::Sort_table($USER, 'ucase_host', 'user'); } else { #reading production grant-tables $HOST=$MySQLaccess::ACCESS_H; $DB =$MySQLaccess::ACCESS_D; $USER=$MySQLaccess::ACCESS_U; MySQLaccess::Debug::Print(1,"Finding fields in ACL files:"); # ----------------------------- # Get record-layout my ($h1,$h2) = MySQLaccess::DB::Show_Fields($HOST); my ($d1,$d2) = MySQLaccess::DB::Show_Fields($DB); my ($u1,$u2) = MySQLaccess::DB::Show_Fields($USER); %MySQLaccess::Grant::H = %{$h1}; @MySQLaccess::Grant::H = @{$h2}; %MySQLaccess::Grant::D = %{$d1}; @MySQLaccess::Grant::D = @{$d2}; %MySQLaccess::Grant::U = %{$u1}; @MySQLaccess::Grant::U = @{$u2}; @MySQLaccess::Grant::Privileges=@{Make_Privlist()}; MySQLaccess::Debug::Print(1, "Reading sorted tables:"); @MySQLaccess::Grant::sorted_db_table = MySQLaccess::DB::Sort_table($DB, 'ucase_host', 'user', 'db'); @MySQLaccess::Grant::sorted_host_table= MySQLaccess::DB::Sort_table($HOST, 'ucase_host', 'db'); @MySQLaccess::Grant::sorted_user_table= defined($MySQLaccess::Param{'password'}) ? MySQLaccess::DB::Sort_table($USER, 'ucase_host', 'user', 'password'): MySQLaccess::DB::Sort_table($USER, 'ucase_host', 'user'); } return 0; } # =========================================================== # sub Get_Access_Rights(host,user,db) # report the access_rights for the tuple ($host,$user,$db). # =========================================================== sub Get_Access_Rights { local ($host,$user,$db,$tmp) = @_; my $aref_user; my $aref_host; my $aref_db; # working with temporary tables or production tables if (defined($tmp) and $tmp) { $aref_user = \@MySQLaccess::Grant::sorted_user_tmp_table; $aref_host = \@MySQLaccess::Grant::sorted_host_tmp_table; $aref_db = \@MySQLaccess::Grant::sorted_db_tmp_table; } else { $aref_user = \@MySQLaccess::Grant::sorted_user_table; $aref_host = \@MySQLaccess::Grant::sorted_host_table; $aref_db = \@MySQLaccess::Grant::sorted_db_table; } my ($refrecord,$refgrant); my ($_host_,$_user_,$encpw_); my %_Access_; MySQLaccess::Debug::Print(1, "for ($host,$user,$db):"); # ****************************************************************************** # Create default access-rights # default access-rights are no access at all!! # ****************************************************************************** # get hostname for IP-address # get IP-address for hostname local $host_name = MySQLaccess::Host::IP2Name($host); local $host_ip = MySQLaccess::Host::Name2IP($host); MySQLaccess::Debug::Print(3,"host=$host, hostname=$host_name, host-ip =$host_ip"); MySQLaccess::Debug::Print(3,"user=$user"); MySQLaccess::Debug::Print(3,"db =$db"); # *********************************************************************** # retrieve information on USER # check all records in mysql::user for matches with the tuple (host,user) # *********************************************************************** # 4.OR (add) the privileges for the user from the "user" table. # (add all privileges which is "Y" in "user") ($refrecord,$refgrant) = Get_grant_from_user($host,$user,$aref_user); ($_host_,$_user_,$encpw_) = @{$refrecord}; %_access_ = %{$refgrant}; foreach $field (keys(%U)) { ##only priv. set in user-table $MySQLaccess::Grant::Access{$field} = ($MySQLaccess::Grant::Access{$field} or $_access_{$field}); } if ($_user_ eq $MySQLaccess::NEW_USER) { push(@Warnings,'minimum_priv'); } if ($_user_ ne $user) { $user=$_user_; push(@Warnings,'anonymous_access'); } # ******************************************************* # Validate password if this has been asked to do # ******************************************************* if (defined($password)) { $valid = Validate_Password($password,$_host_,$_user_,$_encpw_,$aref_user); if (!$valid) { push(@Errors,'invalid_password'); } else { push(@Notes,'valid_password'); } } # ****************************************************************************** # retrieve information on DB # check all records in mysql::db for matches with the triple (host,db,user) # first match is used. # ****************************************************************************** # 2.Get grant for user from the "db" table. ($refrecord,$refgrant)=Get_grant_from_db($host,$db,$user,$aref_db); #set process_host_table ($_host_,$_user_,$encpw_) = @{$refrecord}; %_access_ = %{$refgrant}; foreach $field (keys(%D)) { ##only priv. set in db-table $MySQLaccess::Grant::Access{$field} = ($MySQLaccess::Grant::Access{$field} or $_access_{$field}); } # *********************************************************************** # retrieve information on HOST # check all records in mysql::host for matches with the tuple (host,db) # # ' The host table is mainly to maintain a list of "secure" servers. ' # *********************************************************************** # 3.If hostname is "empty" for the found entry, AND the privileges with # the privileges for the host in "host" table. # (Remove all which is not "Y" in both) if ($MySQLaccess::Grant::process_host_table) { ($refrecord,$refgrant)=Get_grant_from_host($host,$db,$aref_host); ($_host_,$_user_,$encpw_) = @{$refrecord}; %_access_ = %{$refgrant}; foreach $field (keys(%H)) { ##only priv. set in host-table $MySQLaccess::Grant::Access{$field} = ($MySQLaccess::Grant::Access{$field} and $_access_{$field}); } } MySQLaccess::Debug::Print(1,"done for ($host,$user,$db)"); return %MySQLaccess::Grant::Access; } # #################################### # FINDING THE RIGHT GRANT-RULE # ========================================================== # sub Get_grant_from_user: # ========================================================== sub Get_grant_from_user { my ($host,$user,$aref) = @_; MySQLaccess::Debug::Print(1, ""); MySQLaccess::Debug::Print(1, "(host=$host,user=$user)"); my %Access_user = %{Default_Access_Rights()}; my $rule_found=0; my @record = (); my $record; foreach $record (@{$aref}) { $MySQLaccess::Grant::full_access=0; MySQLaccess::Debug::Print(3, "Record= $record"); @record=split(/\t/,$record); # check host and db # with possible wildcards in field # replace mysql-wildcards by reg-wildcards my $host_tpl = MySQLaccess::Wildcards::SQL2Reg($record[0]); my $user_tpl = $record[1]; #user field isn't pattern-matched!! my $passwd = $record[2]; MySQLaccess::Debug::Print(3, "=>host_tpl : read=$record[0] -> converted=$host_tpl"); MySQLaccess::Debug::Print(3, "=>user_tpl : read=$record[1] -> $user_tpl"); MySQLaccess::Debug::Print(3, "=>password : read=$record[2] -> $passwd"); if ( MySQLaccess::Host::MatchTemplate($host,$host_tpl) and MySQLaccess::Wildcards::MatchTemplate($user_tpl,$user) ) { MySQLaccess::Debug::Print(2, "FOUND!!"); if ($passwd eq '') { push(@Warnings,'insecure_user'); } else { push(@Notes,'password_required'); } foreach $field (keys(%U)) { $Access_user{$field} = $MySQLaccess::Report::Answer{$record[$U{$field}]}; } #print "\n" if $DEBUG; $MySQLaccess::Grant::Rules{'user'} = $record; $rule_found=1; last; } } # ------------------------------- # setting privileges to user-priv MySQLaccess::Debug::Print(2, "Rights after parsing user-table..:"); if (! $rule_found ) { @record=(); MySQLaccess::Debug::Print(2, "NO record found in the user-table!!"); } else { MySQLaccess::Debug::Print(2, "Selected record=@record"); MySQLaccess::Debug::Print(2, "<=?=> $record"); } MySQLaccess::Debug::Print(1, "returning @record"); return (\@record,\%Access_user); #matching record in user-table } # ========================================================== # sub Get_grant_from_db: # ========================================================== sub Get_grant_from_db { my ($host,$db,$user,$aref) = @_; MySQLaccess::Debug::Print(1, "(host=$host,user=$user,db=$db)"); my %Access_db = %{Default_Access_Rights()}; my $rule_found=0; foreach $record (@{$aref}) { $full_access=0; MySQLaccess::Debug::Print(2, "Read db: $record"); @record=split(/\t/,$record); # check host and db # with possible wildcards in field # replace mysql-wildcards by reg-wildcards my $host_tpl = MySQLaccess::Wildcards::SQL2Reg($record[0]); my $db_tpl = MySQLaccess::Wildcards::SQL2Reg($record[1]); my $user_tpl = $record[2]; #user field isn't pattern matched!! MySQLaccess::Debug::Print(3, "=>host_tpl : read=$record[0] -> converted=$host_tpl"); MySQLaccess::Debug::Print(3, "=>db_tpl : read=$record[1] -> $db_tpl"); MySQLaccess::Debug::Print(3, "=>user_tpl : read=$record[2] -> $user_tpl"); if ( ( MySQLaccess::Host::Is_localhost($host_tpl) or MySQLaccess::Wildcards::MatchTemplate($host_tpl,$host_name) or MySQLaccess::Wildcards::MatchTemplate($host_tpl,$host_ip) ) and ( MySQLaccess::Wildcards::MatchTemplate($db_tpl,$db) ) and ( MySQLaccess::Wildcards::MatchTemplate($user_tpl,$user) ) ) { $MySQLaccess::Grant::process_host_table = ($record[0] eq ''); if ($user_tpl eq '') { push(@Warnings,'public_database'); } foreach $field (keys(%D)) { $Access_db{$field} = $MySQLaccess::Report::Answer{$record[$D{$field}]}; } $rule_found=1; $MySQLaccess::Grant::Rules{'db'} = $record; last; } } # ------------------------------- # setting privileges to db-priv MySQLaccess::Debug::Print(2, "Rights after parsing db-table..:"); if (! $rule_found ) { MySQLaccess::Debug::Print(2, "NO rule found in db-table => no access granted!!"); } return (\@record,\%Access_db); } # ========================================================== # sub Get_grant_from_host: # ========================================================== sub Get_grant_from_host { my ($host,$db,$aref) = @_; MySQLaccess::Debug::Print(1, "Get_grant_from_host()"); my %Access_host = %{Default_Access_Rights()}; # the host-table doesn't have to be processed if the host-field # in the db-table isn't empty if (!$MySQLaccess::Grant::process_host_table) { MySQLaccess::Debug::Print(2, ">> Host-table doesn't have to be processed!!"); $MySQLaccess::Grant::Rules{'host'} = 'no_equiv_host'; return ([],\%Access_host); } my $rule_found=0; my @record = (); foreach $record (@{$aref}) { $full_access=0; MySQLaccess::Debug::Print(2, "host: $record"); @record=split(/\t/,$record); # check host and db # with possible wildcards in field # replace mysql-wildcards by reg-wildcards my $host_tpl = MySQLaccess::Wildcards::SQL2Reg($record[0]); my $db_tpl = MySQLaccess::Wildcards::SQL2Reg($record[1]); MySQLaccess::Debug::Print(3, "=>host_tpl : $record[0] -> $host_tpl"); MySQLaccess::Debug::Print(3, "=>db_tpl : $record[1] -> $db_tpl"); if ( ( MySQLaccess::Host::Is_localhost($host_tpl) or MySQLaccess::Wildcards::MatchTemplate($host_tpl,$host_name) or MySQLaccess::Wildcards::MatchTemplate($host_tpl,$host_ip) ) and ( MySQLaccess::Wildcards::MatchTemplate($db_tpl,$db) ) ) { $MySQLaccess::Grant::Rules{'host'} = $record; $rule_found=1; foreach $field (keys(%H)) { $Access_host{$field} = $MySQLaccess::Report::Answer{$record[$H{$field}]}; } last; } } # ------------------------------- # setting privileges to host-priv MySQLaccess::Debug::Print(2, "Rights after parsing host-table..:"); if (! $rule_found ) { @record=(); MySQLaccess::Debug::Print(2, "NO restrictions found in the host-table!!"); } # -------------------------------- # debugging access-rights in db return (\@record,\%Access_host); #matching record in host-table } # =========================================================== # sub Default_Access_Rights(): # return (a reference to) a hash which holds all default # priviliges currently defined in the grant-tables. # =========================================================== sub Default_Access_Rights { my %right = (); MySQLaccess::Debug::Print(2, "Debug Default_Access_Rights():"); # add entry for all fields in the HOST-table foreach $field (keys(%MySQLaccess::Grant::H)) { $right{$field}='0' unless (defined($right{$field})); } # add entry for all fields in the DB-table foreach $field (keys(%MySQLaccess::Grant::D)) { $right{$field}='0' unless (defined($right{$field})); } # add entry for all fields in the USER-table foreach $field (keys(%MySQLaccess::Grant::U)) { $right{$field}='0' unless (defined($right{$field})); } # -------------- # debugging info foreach $field (keys(%right)) { MySQLaccess::Debug::Print(3, sprintf("> %15s : %1s",$field,$right{$field})); } return \%right; } # ====================================== # sub Make_Privlist # Make an ordered list of the privileges # that should be reported # ====================================== sub Make_Privlist { # layout: #'select_priv', 'create_priv', #'insert_priv', 'drop_priv', #'update_priv', 'reload_priv', #'delete_priv', 'process_priv', #'file_priv', 'shutdown_priv'); my $right; my @privlist=(); foreach $right (@U) { if (! grep(/$right/,@privlist)) { push(@privlist,$right); } }; foreach $right (@D) { if (! grep(/$right/,@privlist)) { push(@privlist,$right); } }; foreach $right (@H) { if (! grep(/$right/,@privlist)) { push(@privlist,$right); } }; # print "Privileges:\n"; # foreach $field (@privlist) { print " > $field\n"; } return \@privlist; } ######################################################################## package MySQLaccess::Report; use Exporter (); @EXPORT = qw(&Print_Header()); BEGIN { $FORM = $ENV{'SCRIPT_NAME'}; $DEBUG = 0; $DEBUG = $MySQLaccess::DEBUG unless ($DEBUG); # translation-table for poss. answers %Answer = ('Y' => 1 , 'N' => 0 , 1 => 'Y', 0 => 'N' ,'?' => '?', '' => '?' ); $headers = 0; $separator = 0; # **************************** # Notes and warnings %MESSAGES = ( 'insecure_user' => "Everybody can access your DB as user `\$user' from host `\$host'\n" ."WITHOUT supplying a password.\n" ."Be very careful about it!!" ,'password_required' => "A password is required for user `\$user' :-(" ,'invalid_password' => "The password '\$password' for user `\$user' is invalid :-P" , 'valid_password' => "You supplied the right password for user `\$user' :-)" ,'public_database' => "Any user with the appropriate permissions has access to your DB!\n" ."Check your users!" ,'full_access' => "All grant-tables are empty, which gives full access to ALL users !!" ,'no_rule_found' => "No matching rule" ,'no_equiv_host' => "Not processed: host-field is not empty in db-table." ,'least_priv' => "If the final priveliges of the user are more then you gave the user,\n" ."check the priveliges in the db-table `\$db'." ,'minimum_priv' => "The privileges for any new user are AT LEAST\n" ."the ones shown in the table above,\n" ."since these are the privileges of the db `\$db'.\n" ,'not_found_mysql' => "The MySQL client program <$MySQLaccess::MYSQL> could not be found.\n" ."+ Check your path, or\n" ."+ edit the source of this script to point \$MYSQL to the mysql client.\n" ,'not_found_mysqldump' => "The MySQL dump program <$MySQLaccess::MYSQLDUMP> could not be found.\n" ."+ Check your path, or\n" ."+ edit the source of this script to point \$MYSQLDUMP to the mysqldump program.\n" ,'not_found_diff' => "The diff program <$MySQLaccess::DIFF> could not be found.\n" ."+ Check your path, or\n" ."+ edit the source of this script to point \$DIFF to the diff program.\n" ,'Unrecognized_option' => "Sorry,\n" ."You are using an old version of the mysql-program,\n" ."which does not yet implement a neccessary option.\n" ."\n" ."You need at least Version 6.2 of the mysql-client,\n" ."which was build in MySQL v3.0.18, to use this version\n" ."of `$MySQLaccess::script'." ,'Access_denied' => "Sorry,\n" ."An error occurred when trying to connect to the database\n" ."with the grant-tables:\n" ."* Maybe YOU do not have READ-access to this database?\n" ."* If you used the -U option, you may have supplied an invalid username?\n" ." for the superuser?\n" ."* If you used the -U option, it may be possible you have to supply\n" ." a superuser-password to, with the -P option?\n" ."* If you used the -P option, you may have supplied an invalid password?\n" ,'Dbaccess_denied' => "Sorry,\n" ."An error occurred when trying to connect to the database\n" ."with the grant-tables. (dbaccess denied)\n" ,'Unknown_tmp_table' => "Sorry,\n" ."An error occurred when trying to work with the temporary tables in the database\n" ."with the grant-tables. (One of the temporary tables does not exist)\n" ,'Unknown_table' => "Sorry,\n" ."An error occurred when trying to work with some tables in the database\n" ."with the grant-tables. (table does not exist)\n" ,'use_old_server' => "Sorry,\n" ."An error occurred when executing an SQL statement.\n" ."You might consider altering the use of the parameter `--old_server' when \n" ."calling `$MySQLaccess::script'." ,'unknown_error' => "Sorry,\n" ."An error occurred when trying to connect to the database\n" ."with the grant-tables. (unknown error)\n" ,'anonymous_access' => "Accessing the db as an anonymous user.\n" ."Your username has no relevance\n" ,'user_required' => "You have to supply a userid." ,'db_required' => "You have to supply the name of a database." ,'host_required' => "You have to supply the name of a host." ); } # ===================================== # sub Print_Header: # print header info # ===================================== sub Print_Header { if ($MySQLaccess::CMD) { #command-line mode print "$MySQLaccess::script Version $MySQLaccess::VERSION\n" ."By RUG-AIV, by Yves Carlier (Yves.Carlier\@rug.ac.be)\n" ."Changes by Steve Harvey (sgh\@vex.net)\n" ."This software comes with ABSOLUTELY NO WARRANTY.\n"; } if ($MySQLaccess::CGI) { #CGI-BIN mode print "content-type: text/html\n\n" . "<HTML>\n" ."<HEAD>\n" ."<TITLE>MySQLaccess</TITLE>\n" ."</HEAD>\n" ."<BODY>\n" ."<H1>$MySQLaccess::script Version $MySQLaccess::VERSION</H1>\n" ."<CENTER>\n<ADDRESS>\n" ."By RUG-AIV, by Yves Carlier (<a href=mailto:Yves.Carlier\@rug.ac.be>Yves.Carlier\@rug.ac.be</a>)<BR>\n" ."Changes by Steve Harvey (<a href=mailto:sgh\@vex.net>sgh\@vex.net</a>)<BR>\n" ."This software comes with ABSOLUTELY NO WARRANTY.<BR>\n" ."</ADDRESS>\n</CENTER>\n" ."<HR>\n"; Print_Taskbar(); print "<HR>\n"; } return 1; } # ===================================== # sub Print_Footer: # print footer info # ===================================== sub Print_Footer { if ($MySQLaccess::CMD) { #command-line mode print "\n" ."BUGs can be reported at https://jira.mariadb.org\n"; } if ($MySQLaccess::CGI) { #CGI-BIN mode if ($MySQLaccess::Param{'brief'}) { print "</table>\n"; #close table in brief-output } print "<HR>\n" ."<ADDRESS>\n" ."BUGs can be reported at <a href=\"https://jira.mariadb.org\">MariaDB JIRA</a><BR>\n" # ."Don't forget to mention the version $VERSION!<BR>\n" ."</ADDRESS>\n" ."</BODY>\n" ."</HTML>\n"; } return 1; } # ===================================== # sub Print_Taskbar: # print taskbar on STDOUT # ===================================== sub Print_Taskbar { print "<CENTER>\n" ."[<a href=$FORM?relnotes=on>Release Notes</a>] \n" ."[<a href=$FORM?version=on>Version</a>] \n" ."[<a href=$FORM?plan=on>Future Plans</a>] \n" ."[<a href=$FORM?howto=on>Examples</a>] \n" ."[<a href=$FORM?help=on>New check</a>] \n" ."[<a href=$FORM?edit=on>Change/edit ACL</a>] \n" ."</CENTER>\n"; return 1; } # ===================================== # sub Print_Form: # print CGI-form # ===================================== sub Print_Form { print <<EOForm; <center> <!-- Quering --> <FORM method=POST action=$FORM> <table border width="100%" > <tr> <th>MySQL server</th> <th>User information</th> <th>Reports</th> </tr> <tr> <td valign=top> <table> <tr> <td halign=right><b>Host</b><br><font size=-2>(Host on which MySQL-server resides.)</font></td> <td valign=top><INPUT name=rhost type=text size=15 maxlength=15 value="$MySQLaccess::Param{'rhost'}"></td> </tr> <tr> <td halign=right><b>Superuser</b><br><font size=-2>(User which has <font color="Red">read-access</font> to grant-tables.)</font></td> <td valign=top><INPUT name=superuser type=text size=15 maxlength=15 value="$MySQLaccess::Param{'superuser'}"></td> </tr> <tr> <td halign=right><b>Password</b><br><font size=-2>(of Superuser.)</font></td> <td valign=top><INPUT name=spassword type=password size=15 maxlength=15 value="$MySQLaccess::Param{'spassword'}"></td> </tr> </table> </td> <td valign=top> <table> <tr> <td halign=right><b><font color=Red>User</font></b><br><font size=-2>(Userid used to connect to MySQL-database.)</font></td> <td halign=top><INPUT name=user type=text size=15 maxlength=15 value="$MySQLaccess::Param{'user'}"></td> </tr> <tr> <td halign=right><b>Password</b><br><font size=-2>(Password user has to give to get access to MySQL-database.)</font></td> <td valign=top><INPUT name=password type=password size=15 maxlength=15 value="$MySQLaccess::Param{'password'}"></td> </tr> <tr> <td halign=right><b><font color=Red>Database</font></b><br><font size=-2>(Name of MySQL-database user tries to connect to.</font><br><font size=-2>Wildcards <font color="Green">(*,?,%,_)</font> are allowed.)</font></td> <td valign=top><INPUT name=db type=text size=15 maxlength=15 value="$MySQLaccess::Param{'db'}"></td> </tr> <tr> <td halign=right><b>Host</b><br><font size=-2>(Host from where the user is trying to connect to MySQL-database.</font><br><font size=-2>Wildcards <font color="Green">(*,?,%,_)</font> are allowed.)</font></td> <td valign=top><INPUT name=host type=text size=15 maxlength=15 value="$MySQLaccess::Param{'host'}"></td> </tr> </table> </td> <td valign=center> <table cellspacing=5 cellpadding=2 cols=1 height="100%"> <tr align=center> <td halign=right><INPUT type=submit name=brief value="Brief"><br> <INPUT type=submit name=table value="Tabular"></td> </tr> <tr align=center> <td></td> </tr> <tr align=center> <td halign=right><INPUT type=reset value="Clear"></td> </tr> </table> </td> </tr> </table> </form> </BODY> </HTML> EOForm return 1; } # ===================================== # sub Print_Usage: # print some information on STDOUT # ===================================== sub Print_Usage { Print_Error_Messages(); if ($MySQLaccess::CMD) { #command-line mode Print_Options(); } if ($MySQLaccess::CGI) { #CGI-BIN mode Print_Form(); } return 1; } # ====================================== # sub Print_Version: # ====================================== sub Print_Version { if ($MySQLaccess::CMD) { print $MySQLaccess::INFO; } if ($MySQLaccess::CGI) { print "<PRE>\n"; print $MySQLaccess::INFO; print "</PRE>\n"; } return 1; } # ====================================== # sub Print_Relnotes: # ====================================== sub Print_Relnotes { if ($MySQLaccess::CMD) { print $MySQLaccess::RELEASE; } if ($MySQLaccess::CGI) { print "<PRE>\n"; print $MySQLaccess::RELEASE; print "</PRE>\n"; } return 1; } # ====================================== # sub Print_Plans: # ====================================== sub Print_Plans { if ($MySQLaccess::CMD) { print $MySQLaccess::TODO; } if ($MySQLaccess::CGI) { print "<PRE>\n"; print $MySQLaccess::TODO; print "</PRE>\n"; } return 1; } # ====================================== # sub Print_HowTo: # ====================================== sub Print_HowTo { if ($MySQLaccess::CMD) { print $MySQLaccess::HOWTO; } if ($MySQLaccess::CGI) { print "<PRE>\n"; print $MySQLaccess::HOWTO; print "</PRE>\n"; } return 1; } # ====================================== # sub Print_Options: # ====================================== sub Print_Options { if ($MySQLaccess::CGI) { print "<PRE>\n"; } print $MySQLaccess::OPTIONS; if ($MySQLaccess::CGI) { print "</PRE>\n"; } return 1; } # ====================================== # sub Print_Error_Access: # ====================================== sub Print_Error_Access { my ($error) = @_; print "\n"; if ($MySQLaccess::CGI) { print "<font color=Red>\n<PRE>\n"; } print $MESSAGES{$error}; if ($MySQLaccess::CGI) { print "</PRE>\n</font>\n"; } print "\n"; return 1; } # ====================================== # sub Print_Error_Messages: # ====================================== sub Print_Error_Messages { # my ($error) = @_; print "\n"; if ($MySQLaccess::CGI) { print "<font color=Red>\n<center>\n"; } foreach $error (@MySQLaccess::Grant::Error) { print $MESSAGES{$error}; print $MySQLaccess::CGI ? "<br>\n" : "\n"; } if ($MySQLaccess::CGI) { print "</center>\n</font>\n"; } print "\n"; return 1; } # ====================================== # sub Print_Message: # ====================================== sub Print_Message { my ($aref) = @_; my @messages = @{$aref}; print "\n"; if ($MySQLaccess::CGI) { print "<font color=DarkGreen>\n<center>\n"; } foreach $msg (@messages) { print $msg; print $MySQLaccess::CGI ? "<br>\n" : "\n"; } if ($MySQLaccess::CGI) { print "</center>\n</font>\n"; } print "\n"; return 1; } # ====================================== # sub Print_Edit: # ====================================== sub Print_Edit { print "\n"; if (!$MySQLaccess::CGI) { print "Note: Editing the temporary tables is NOT supported in CMD-line mode!\n"; return 0; } print "<CENTER>\n" ."<form action=$FORM method=GET>\n" ."<table width=90% border>\n" ."<tr>\n" ." <td><input type=checkbox name=copy value=on> Copy grant-rules to temporary tables<br></td>\n" ." <td rowspan=5 align=center valign=center><input type=submit value=Go></td>\n" ."</tr>\n" ."<tr>\n" ." <td> Edit temporary tables with external application:<br>" ." <a href=\"$MySQLaccess::MYSQLADMIN\">$MySQLaccess::MYSQLADMIN</a></td>\n" ."</tr>\n" ."<tr>\n" ." <td><input type=checkbox name=preview value=on> Preview changes made in temporary tables</td>\n" ."</tr>\n" ."<tr>\n" ." <td><input type=checkbox name=commit value=on> Make changes permanent</td>\n" ."</tr>\n" ."<tr>\n" ." <td><input type=checkbox name=rollback value=on> Restore previous grand-rules</td>\n" ."</tr>\n" ."<tr>\n" ." <td colspan=2 align=center><font size=-2 color=Red>You need write,delete and drop-privileges to perform the above actions</font></td>\n" ."</tr>\n" ."</table>\n" ."</form>\n" ."</CENTER>\n"; return 1; } # ====================================== # sub Print_Access_rights: # print the access-rights on STDOUT # ====================================== sub Print_Access_rights { my ($host,$user,$db,$refhash) = @_; if (defined($MySQLaccess::Param{'brief'})) { # if ($MySQLaccess::CGI) { print "<PRE>\n"; } Matrix_Report($host,$user,$db,$refhash); # if ($MySQLaccess::CGI) { print "</PRE>\n"; } } else { Tabular_Report($host,$user,$db,$refhash); $MySQLaccess::Report::separator = $MySQLaccess::CGI ? "<hr>" : "-"x80; } return 1; } # ====================================== # sub Print_Diff_ACL: # print the diff. in the grants before and after # ====================================== sub Print_Diff_ACL { my ($aref) = @_; my @diffs = @{$aref}; my %block = ( '<' => 'Before', '>' => 'After', ); my %color = ( '<' => 'Green', '>' => 'Red', ); my $curblock = ''; # ----------------------------- # create column-headers foreach $field (@MySQLaccess::Grant::Privileges) { push(@headers,substr($field,0,4)); } if ($MySQLaccess::CMD) { print "\n"; print "Differences in access-rights BEFORE and AFTER changes in grant-tables\n"; # print "---------------------------------------------------------------------\n"; my $line1=""; my $line2=""; $line1 .= sprintf("| %-30s|",'Host,User,DB'); $line2 .= sprintf("+-%-30s+",'-' x 30); foreach $header (@headers) { $line1 .= sprintf("%-4s|",$header); $line2 .= sprintf("%s+",'----'); } print "$line2\n"; print "$line1\n"; print "$line2\n"; $format = "format STDOUT = \n" . "^<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< " . " @|||" x 10 ."\n" . '$host_user_db,@priv' . "\n" . ".\n"; #print $format; eval $format; } if ($MySQLaccess::CGI) { print "<table border width=100%>\n"; print "<tr>\n"; print "<th colspan=11>"; print "Differences in access-rights <font color=$color{'<'}>BEFORE</font> " ."and <font color=$color{'>'}>AFTER</font> changes to grant-tables</font>\n"; print "</th>"; print "</tr>\n"; print "<tr>\n"; $line1 .= sprintf("<th>%-20s</th>",'Host, User, DB'); foreach $header (@headers) { $line1 .= sprintf("<th>%-4s</th>",$header); } print "$line1</tr>\n"; } foreach $line (@diffs) { $type = substr($line,0,1); $line = substr($line,1); ($host,$user,$db,@priv) = split(/,/,$line); if ($MySQLaccess::CMD) { if ($type ne $curblock) { $curblock = $type; print $block{$curblock},":\n"; } #print "$line\n"; write; } if ($MySQLaccess::CGI) { if ($type ne $curblock) { $curblock = $type; print "<tr><td><b>$block{$curblock}<b></td></tr>\n"; } $line1="<td><font color=$color{$type}>$host, $user, $db</font></td>"; foreach $field (@priv) { $line1 .= sprintf("<td align=center><font color=$color{$type}>%-4s</font></td>",$field); } print "<tr>$line1</tr>\n"; } } print "\n"; if ($MySQLaccess::CMD) { print "---------------------------------------------------------------------\n"; } if ($MySQLaccess::CGI) { print "</table><br>"; } return 1; } # ====================================== # sub Tabular_Report # Tabular report, # suitable for 1 triple (host,db,user) # ====================================== sub Tabular_Report { my ($host,$user,$db,$a) = @_; my $column=2; # ----------------------------- # separator if ($MySQLaccess::Report::separator) { print "$MySQLaccess::Report::separator\n"; } # ----------------------------- # print table of access-rights my $rows = int(@MySQLaccess::Grant::Privileges/2); #round up my @table=(); $j=0; for $i (0 .. $rows-1) { $table[$j]=$MySQLaccess::Grant::Privileges[$i]; $j = $j+2; } $j=1; for $i ($rows .. $#MySQLaccess::Grant::Privileges) { $table[$j]=$MySQLaccess::Grant::Privileges[$i]; $j = $j+2; } if ($MySQLaccess::CMD) { print "\n"; print "Access-rights\n"; print "for USER '$user', from HOST '$host', to DB '$db'\n"; } if ($MySQLaccess::CGI) { print "<table border width=100%>\n"; print "<tr>\n"; } if ($MySQLaccess::CGI) { print "<th colspan=5>"; print "<font color=Red>Access-rights</font>\n"; print "for USER '<font color=Green>$user</font>', from HOST '<font color=Green>$host</font>', to DB '<font color=Green>$db</font>'\n"; print "</th>"; print "</tr>\n"; print "<tr>\n"; } if ($MySQLaccess::CMD) { print "\t+-----------------+---+\t+-----------------+---+"; } foreach $field (@table) { if ($MySQLaccess::CMD) { if ($column==2) { print "\n\t"; $column=1;} else { print "\t"; $column=2;} printf "| %-15s | %s |",$field,$Answer{$a->{$field}}; } if ($MySQLaccess::CGI) { if ($column==2) { print "</tr>\n<tr>\n"; $column=1;} else { print "<td width=10%></td>"; $column=2;} printf " <td width=35%><b>%-15s</b></td><td width=10%>%s</td>\n",$field,$Answer{$a->{$field}}; } } print "\n"; if ($MySQLaccess::CMD) { print "\t+-----------------+---+\t+-----------------+---+\n"; } if ($MySQLaccess::CGI) { print "</tr>\n</table><br>"; } # --------------- # print notes: foreach $note (@MySQLaccess::Grant::Notes) { my $message = $MESSAGES{$note}; $message =~ s/\$user/$user/g; $message =~ s/\$db/$db/g; $message =~ s/\$host/$host/g; $message =~ s/\$password/$password/g; $PREFIX='NOTE'; if ($MySQLaccess::CMD) { my @lines = split(/\n/,$message); foreach $line (@lines) { print "$PREFIX:\t $line\n"; $PREFIX=' '; } } if ($MySQLaccess::CGI) { print "<b>$PREFIX:</b> $message<br>\n"; } } # --------------- # print warnings: foreach $warning (@MySQLaccess::Grant::Warnings) { my $message = $MESSAGES{$warning}; $message =~ s/\$user/$user/g; $message =~ s/\$db/$db/g; $message =~ s/\$host/$host/g; $message =~ s/\$password/$password/g; $PREFIX='BEWARE'; if ($MySQLaccess::CMD) { my @lines = split(/\n/,$message); foreach $line (@lines) { print "$PREFIX:\t $line\n"; $PREFIX=' '; } } if ($MySQLaccess::CGI) { print "<b>$PREFIX:</b> $message<br>\n"; } } # --------------- # print errors: foreach $error (@MySQLaccess::Grant::Errors) { my $message = $MESSAGES{$error}; $message =~ s/\$user/$user/g; $message =~ s/\$db/$db/g; $message =~ s/\$host/$host/g; $message =~ s/\$password/$password/g; $PREFIX='ERROR'; if ($MySQLaccess::CMD) { my @lines = split(/\n/,$message); foreach $line (@lines) { print "$PREFIX:\t $line\n"; $PREFIX=' '; } } if ($MySQLaccess::CGI) { print "<b>$PREFIX:</b> $message<br>\n"; } } # --------------- # inform if there are no rules ==> full access for everyone. if ($MySQLaccess::Grant::full_access) { print "$MESSAGES{'full_access'}\n"; } # --------------- # print the rules used print "\n"; if ($MySQLaccess::CMD) { print "The following rules are used:\n"; foreach $field (sort(keys(%MySQLaccess::Grant::Rules))) { my $rule = (defined($MESSAGES{$MySQLaccess::Grant::Rules{$field}}) ? $MESSAGES{$MySQLaccess::Grant::Rules{$field}} : $MySQLaccess::Grant::Rules{$field}); $rule =~ s/\t/','/g; printf " %-5s : '%s'\n",$field,$rule; } } if ($MySQLaccess::CGI) { print "<br>\n"; print "<table border width=100%>\n"; print "<tr><th colspan=2>The following rules are used:</th></tr>\n"; foreach $field (sort(keys(%MySQLaccess::Grant::Rules))) { my $rule = (defined($MESSAGES{$MySQLaccess::Grant::Rules{$field}}) ? $MESSAGES{$MySQLaccess::Grant::Rules{$field}} : $MySQLaccess::Grant::Rules{$field}); $rule =~ s/\t/','/g; printf "<tr><th>%-5s</th><td>'%s'</td></tr>\n",$field,$rule; } print "</table>\n"; } return 1; } # ====================================== # sub Matrix_Report: # single-line output foreach triple, # no notes,warnings,... # ====================================== sub Matrix_Report { my ($host,$user,$db,$a) = @_; my @headers = (); if (! $headers) { # ----------------------------- # create column-headers foreach $field (@MySQLaccess::Grant::Privileges) { push(@headers,substr($field,0,4)); } # ----------------------------- # print column-headers print "\n"; if ($MySQLaccess::CMD) { my $line1=""; my $line2=""; foreach $header (@headers) { $line1 .= sprintf("%-4s ",$header); $line2 .= sprintf("%s ",'----'); } $line1 .= sprintf("| %-20s",'Host,User,DB'); $line2 .= sprintf("+ %-20s",'-' x 20); print "$line1\n"; print "$line2\n"; } if ($MySQLaccess::CGI) { print "<table width=100% border>\n"; my $line1="<tr>"; foreach $header (@headers) { $line1 .= sprintf("<th>%-4s</th>",$header); } $line1 .= sprintf("<th>%-20s</th>",'Host, User, DB'); print "$line1</tr>\n"; } # ---------------------------- # column-headers should only be # printed once. $MySQLaccess::Report::headers=1; } # ------------------------ # print access-information if ($MySQLaccess::CMD) { foreach $field (@MySQLaccess::Grant::Privileges) { printf " %-2s ",$Answer{$a->{$field}}; } printf "| %-20s",join(',',$host,$user,$db); print "\n"; } if ($MySQLaccess::CGI) { print "<tr>"; foreach $field (@MySQLaccess::Grant::Privileges) { printf "<td align=center>%-2s</td>",$Answer{$a->{$field}}; } printf "<td><b>%-20s</b></td>",join(', ',$host,$user,$db); print "</tr>\n"; } return 1; } # ====================================== # sub Raw_Report: # single-line output foreach triple, # no notes,warnings,... # ====================================== sub Raw_Report { my ($host,$user,$db,$a) = @_; my @headers = (); my $string = ""; # ------------------------ # print access-information $string = "$host,$user,$db,"; foreach $field (@MySQLaccess::Grant::Privileges) { $string .= $Answer{$a->{$field}} . ","; } return $string; } ####################################################################### package MySQLaccess::Wildcards; BEGIN { $DEBUG = 0; $DEBUG = $MySQLaccess::DEBUG unless ($DEBUG); } # ############################################ # SQL, WILDCARDS and REGULAR EXPRESSIONS # ============================================ # translage SQL-expressions to Reg-expressions # ============================================ sub SQL2Reg { my ($expr) = @_; my $expr_o = $expr; $expr =~ s/\./\\./g; $expr =~ s/\\%/\002/g; $expr =~ s/%/.*/g; $expr =~ s/\002/%/g; $expr =~ s/\\_/\002/g; $expr =~ s/_/.+/g; $expr =~ s/\002/_/g; MySQLaccess::Debug::Print(2,"$expr_o --> $expr"); return $expr; } # translage WILDcards to Reg-expressions # ============================================ sub Wild2Reg { my ($expr) = @_; my $expr_o = $expr; $expr =~ s/\./\\./g; $expr =~ s/\\\*/\002/g; $expr =~ s/\*/.*/g; $expr =~ s/\002/*/g; $expr =~ s/\\\?/\002/g; $expr =~ s/\?/.+/g; $expr =~ s/\002/?/g; MySQLaccess::Debug::Print(2,"$expr_o --> $expr"); return $expr; } # ============================================= # match a given string with a template # ============================================= sub MatchTemplate { my ($tpl,$string) = @_; my $match=0; if ($string=~ /^$tpl$/ or $tpl eq '') { $match=1; } else { $match=0;} MySQLaccess::Debug::Print(2,"($tpl,$string) --> $match"); return $match; } ####################################################################### package MySQLaccess::Host; BEGIN { $localhost = undef; $DEBUG = 2; $DEBUG = $MySQLaccess::DEBUG unless ($DEBUG); } # ====================================== # sub IP2Name # return the Name with the corr. IP-nmbr # (no aliases yet!!) # ====================================== sub IP2Name { my ($ip) = @_; my $ip_o = $ip; if ($ip !~ /([0-9]+)\.([0-9]+)\.([0-9]+)\.([0-9]+)/o) { MySQLaccess::Debug::Print(3,"'$ip' is not an ip-number, returning IP=$ip"); return $ip; } MySQLaccess::Debug::Print(4,"IP=$ip split up => $1.$2.$3.$4"); $ip = pack "C4",$1,$2,$3,$4; MySQLaccess::Debug::Print(4,"IP packed -> >>$ip<<\n"); my ($name,$aliases,$addrtype,$length,@addrs) = gethostbyaddr($ip, AF_INET); MySQLaccess::Debug::Print(3,"IP=$ip_o => hostname=$name"); MySQLaccess::Debug::Print(4,"aliases=$aliases"); MySQLaccess::Debug::Print(4,"addrtype=$addrtype - length=$length"); return ($name || $ip); #return ($name || undef); } # ====================================== # sub Name2IP # return the IP-number of the host # ====================================== sub Name2IP { my ($name) = @_; if ($name =~ /[%_]/) { MySQLaccess::Debug::Print(3,"'$name' contains SQL-wildcards, returning name=$name"); return $name; } my ($_name,$aliases,$addrtype,$length,@addrs) = gethostbyname($name); my ($a,$b,$c,$d) = unpack('C4',$addrs[0]); my $ip = "$a.$b.$c.$d"; MySQLaccess::Debug::Print(3,"hostname=$name => IP=$ip"); MySQLaccess::Debug::Print(4,"aliases=$aliases"); MySQLaccess::Debug::Print(4,"addrtype=$addrtype - length=$length"); #if ($ip ne "") { return "$ip"; } #else { return undef; } return ($ip || $name); } # ======================================== # sub LocalHost # some special action has to be taken for # the localhost # ======================================== sub LocalHost { if (!defined($MySQLaccess::Host::localhost)) { $MySQLaccess::Host::localhost = Sys::Hostname::hostname(); MySQLaccess::Debug::Print(3,"Setting package variable \$localhost=$MySQLaccess::Host::localhost"); } my $host = $localhost; MySQLaccess::Debug::Print(3,"localhost = $host"); return $host; } # ======================================== # check if the given hostname (or ip) # corresponds with the localhost # ======================================== sub Is_localhost { my ($host_tpl) = @_; my $isit = 0; if (($MySQLaccess::host_name eq $localhost) or ($MySQLaccess::host_ip eq $local_ip)) { MySQLaccess::Debug::Print(2,"Checking for localhost"); MySQLaccess::Debug::Print(3,"because ($MySQLaccess::host_name EQ $localhost) AND ($MySQLaccess::host_ip EQ $local_ip)"); $isit = ( 'localhost' =~ /$host_tpl/ ) ? 1 : 0; MySQLaccess::Debug::Print(3," 'localhost' =?= $host_tpl -> $isit"); return $isit; } else { MySQLaccess::Debug::Print(4,"Not checking for localhost"); MySQLaccess::Debug::Print(4,"because ($MySQLaccess::host_name != $localhost) AND ($MySQLaccess::host_ip != $local_ip)"); return 0; } } # ========================================= # check if host (IP or name) can be matched # on the template. # ========================================= sub MatchTemplate { my ($host,$tpl) = @_; my $match = 0; MySQLaccess::Debug::Print(1, "($host) =?= ($tpl)"); my $host_name = IP2Name($host); my $host_ip = Name2IP($host); MySQLaccess::Debug::Print(2, "name=$host_name ; ip=$host_ip"); $match = (MySQLaccess::Wildcards::MatchTemplate($tpl,$host_name) or MySQLaccess::Wildcards::MatchTemplate($tpl,$host_ip)); MySQLaccess::Debug::Print(2, "($host_name,$host_ip) =?= ($tpl): $ncount"); return $match; } ######################################################################## package MySQLaccess::Debug; BEGIN { my $dbg_file = "$MySQLaccess::script_log"; open(DEBUG,"> $dbg_file") or warn "Could not open outputfile $dbg_file for debugging-info\n"; select DEBUG; $| = 1; select STDOUT; } # ========================================= # Print debugging information on STDERR # ========================================= sub Print { my ($level,$mesg) = @_; my ($pack,$file,$line,$subname,$hasargs,$wantarray) = caller(1); my ($PACK) = split('::',$subname); my $DEBUG = ${$PACK."::DEBUG"} ? ${$PACK."::DEBUG"} : $MySQLaccess::DEBUG ; my ($sec,$min,$hour) = localtime(); print DEBUG "[$hour:$min:$sec $subname] $mesg\n" if ($DEBUG>=$level); }