@@ -212,19 +212,19 @@ typedef struct
212212 int64 statementId ; /* Simple counter */
213213 int64 substatementId ; /* Simple counter */
214214
215- LogStmtLevel logStmtLevel ; /* From GetCommandLogLevel when possible, */
216- / * generated when not. */
215+ LogStmtLevel logStmtLevel ; /* From GetCommandLogLevel when possible,
216+ * generated when not. */
217217 NodeTag commandTag ; /* same here */
218218 const char * command ; /* same here */
219- const char * objectType ; /* From event trigger when possible */
220- /* generated when not. */
219+ const char * objectType ; /* From event trigger when possible, generated
220+ * when not. */
221221 char * objectName ; /* Fully qualified object identification */
222222 const char * commandText ; /* sourceText / queryString */
223223 ParamListInfo paramList ; /* QueryDesc/ProcessUtility parameters */
224224
225225 bool granted ; /* Audit role has object permissions? */
226- bool logged ; /* Track if we have logged this event, used */
227- / * post-ProcessUtility to make sure we log */
226+ bool logged ; /* Track if we have logged this event, used
227+ * post-ProcessUtility to make sure we log */
228228 bool statementLogged ; /* Track if we have logged the statement */
229229} AuditEvent ;
230230
@@ -467,7 +467,7 @@ log_audit_event(AuditEventStackItem *stackItem)
467467 /* Classify the statement using log stmt level and the command tag */
468468 switch (stackItem -> auditEvent .logStmtLevel )
469469 {
470- /* All mods go in WRITE class, execpt EXECUTE */
470+ /* All mods go in WRITE class, except EXECUTE */
471471 case LOGSTMT_MOD :
472472 className = CLASS_WRITE ;
473473 class = LOG_WRITE ;
@@ -553,13 +553,14 @@ log_audit_event(AuditEventStackItem *stackItem)
553553 break ;
554554 }
555555
556- /*
556+ /*----------
557557 * Only log the statement if:
558558 *
559- * 1. If object was selected for audit logging (granted) 2. The statement
560- * belongs to a class that is being logged
559+ * 1. If object was selected for audit logging (granted), or
560+ * 2. The statement belongs to a class that is being logged
561561 *
562562 * If neither of these is true, return.
563+ *----------
563564 */
564565 if (!stackItem -> auditEvent .granted && !(auditLogBitmap & class ))
565566 return ;
@@ -979,57 +980,39 @@ log_select_dml(Oid auditOid, List *rangeTabls)
979980 switch (rte -> relkind )
980981 {
981982 case RELKIND_RELATION :
982- auditEventStack -> auditEvent .objectType =
983- OBJECT_TYPE_TABLE ;
984-
983+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_TABLE ;
985984 break ;
986985
987986 case RELKIND_INDEX :
988- auditEventStack -> auditEvent .objectType =
989- OBJECT_TYPE_INDEX ;
990-
987+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_INDEX ;
991988 break ;
992989
993990 case RELKIND_SEQUENCE :
994- auditEventStack -> auditEvent .objectType =
995- OBJECT_TYPE_SEQUENCE ;
996-
991+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_SEQUENCE ;
997992 break ;
998993
999994 case RELKIND_TOASTVALUE :
1000- auditEventStack -> auditEvent .objectType =
1001- OBJECT_TYPE_TOASTVALUE ;
1002-
995+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_TOASTVALUE ;
1003996 break ;
1004997
1005998 case RELKIND_VIEW :
1006- auditEventStack -> auditEvent .objectType =
1007- OBJECT_TYPE_VIEW ;
1008-
999+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_VIEW ;
10091000 break ;
10101001
10111002 case RELKIND_COMPOSITE_TYPE :
1012- auditEventStack -> auditEvent .objectType =
1013- OBJECT_TYPE_COMPOSITE_TYPE ;
1014-
1003+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_COMPOSITE_TYPE ;
10151004 break ;
10161005
10171006 case RELKIND_FOREIGN_TABLE :
1018- auditEventStack -> auditEvent .objectType =
1019- OBJECT_TYPE_FOREIGN_TABLE ;
1020-
1007+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_FOREIGN_TABLE ;
10211008 break ;
10221009
10231010 case RELKIND_MATVIEW :
1024- auditEventStack -> auditEvent .objectType =
1025- OBJECT_TYPE_MATVIEW ;
1026-
1011+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_MATVIEW ;
10271012 break ;
10281013
10291014 default :
1030- auditEventStack -> auditEvent .objectType =
1031- OBJECT_TYPE_UNKNOWN ;
1032-
1015+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_UNKNOWN ;
10331016 break ;
10341017 }
10351018
@@ -1043,9 +1026,7 @@ log_select_dml(Oid auditOid, List *rangeTabls)
10431026 /* Perform object auditing only if the audit role is valid */
10441027 if (auditOid != InvalidOid )
10451028 {
1046- AclMode auditPerms =
1047- (ACL_SELECT | ACL_UPDATE | ACL_INSERT | ACL_DELETE ) &
1048- rte -> requiredPerms ;
1029+ AclMode auditPerms = (ACL_SELECT | ACL_UPDATE | ACL_INSERT | ACL_DELETE ) & rte -> requiredPerms ;
10491030
10501031 /*
10511032 * If any of the required permissions for the relation are granted
@@ -1166,7 +1147,6 @@ log_function_execute(Oid objectId)
11661147 stackItem -> auditEvent .commandTag = T_DoStmt ;
11671148 stackItem -> auditEvent .command = COMMAND_EXECUTE ;
11681149 stackItem -> auditEvent .objectType = OBJECT_TYPE_FUNCTION ;
1169-
11701150 stackItem -> auditEvent .commandText = stackItem -> next -> auditEvent .commandText ;
11711151
11721152 log_audit_event (stackItem );
@@ -1459,8 +1439,7 @@ pg_audit_ddl_command_end(PG_FUNCTION_ARGS)
14591439
14601440 /* Supply object name and type for audit event */
14611441 auditEventStack -> auditEvent .objectType =
1462- SPI_getvalue (spiTuple , spiTupDesc , 1 );
1463-
1442+ SPI_getvalue (spiTuple , spiTupDesc , 1 );
14641443 auditEventStack -> auditEvent .objectName =
14651444 SPI_getvalue (spiTuple , spiTupDesc , 2 );
14661445
@@ -1545,8 +1524,7 @@ pg_audit_sql_drop(PG_FUNCTION_ARGS)
15451524 spiTuple = SPI_tuptable -> vals [row ];
15461525
15471526 auditEventStack -> auditEvent .objectType =
1548- SPI_getvalue (spiTuple , spiTupDesc , 1 );
1549-
1527+ SPI_getvalue (spiTuple , spiTupDesc , 1 );
15501528 auditEventStack -> auditEvent .objectName =
15511529 SPI_getvalue (spiTuple , spiTupDesc , 2 );
15521530
@@ -1603,16 +1581,14 @@ check_pg_audit_log(char **newVal, void **extra, GucSource source)
16031581
16041582 foreach (lt , flagRawList )
16051583 {
1584+ char * token = (char * ) lfirst (lt );
16061585 bool subtract = false;
16071586 int class ;
16081587
1609- /* Retrieve a token */
1610- char * token = (char * ) lfirst (lt );
1611-
16121588 /* If token is preceded by -, then the token is subtractive */
1613- if (strstr ( token , "-" ) == token )
1589+ if (token [ 0 ] == '-' )
16141590 {
1615- token = token + 1 ;
1591+ token ++ ;
16161592 subtract = true;
16171593 }
16181594
0 commit comments