@@ -212,19 +212,19 @@ typedef struct
212212int64 statementId ;/* Simple counter */
213213int64 substatementId ;/* Simple counter */
214214
215- LogStmtLevel logStmtLevel ;/* From GetCommandLogLevel when possible, */
216- / * generated when not. */
215+ LogStmtLevel logStmtLevel ;/* From GetCommandLogLevel when possible,
216+ * generated when not. */
217217NodeTag commandTag ;/* same here */
218218const char * command ;/* same here */
219- const char * objectType ;/* From event trigger when possible */
220- /* generated when not. */
219+ const char * objectType ;/* From event trigger when possible, generated
220+ * when not. */
221221char * objectName ;/* Fully qualified object identification */
222222const char * commandText ;/* sourceText / queryString */
223223ParamListInfo paramList ;/* QueryDesc/ProcessUtility parameters */
224224
225225bool granted ;/* Audit role has object permissions? */
226- bool logged ;/* Track if we have logged this event, used */
227- / * post-ProcessUtility to make sure we log */
226+ bool logged ;/* Track if we have logged this event, used
227+ * post-ProcessUtility to make sure we log */
228228bool statementLogged ;/* Track if we have logged the statement */
229229}AuditEvent ;
230230
@@ -467,7 +467,7 @@ log_audit_event(AuditEventStackItem *stackItem)
467467/* Classify the statement using log stmt level and the command tag */
468468switch (stackItem -> auditEvent .logStmtLevel )
469469{
470- /* All mods go in WRITE class,execpt EXECUTE */
470+ /* All mods go in WRITE class,except EXECUTE */
471471case LOGSTMT_MOD :
472472className = CLASS_WRITE ;
473473class = LOG_WRITE ;
@@ -553,13 +553,14 @@ log_audit_event(AuditEventStackItem *stackItem)
553553break ;
554554}
555555
556- /*
556+ /*----------
557557 * Only log the statement if:
558558 *
559- * 1. If object was selected for audit logging (granted) 2. The statement
560- * belongs to a class that is being logged
559+ * 1. If object was selected for audit logging (granted), or
560+ *2. The statement belongs to a class that is being logged
561561 *
562562 * If neither of these is true, return.
563+ *----------
563564 */
564565if (!stackItem -> auditEvent .granted && !(auditLogBitmap & class ))
565566return ;
@@ -979,57 +980,39 @@ log_select_dml(Oid auditOid, List *rangeTabls)
979980switch (rte -> relkind )
980981{
981982case RELKIND_RELATION :
982- auditEventStack -> auditEvent .objectType =
983- OBJECT_TYPE_TABLE ;
984-
983+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_TABLE ;
985984break ;
986985
987986case RELKIND_INDEX :
988- auditEventStack -> auditEvent .objectType =
989- OBJECT_TYPE_INDEX ;
990-
987+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_INDEX ;
991988break ;
992989
993990case RELKIND_SEQUENCE :
994- auditEventStack -> auditEvent .objectType =
995- OBJECT_TYPE_SEQUENCE ;
996-
991+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_SEQUENCE ;
997992break ;
998993
999994case RELKIND_TOASTVALUE :
1000- auditEventStack -> auditEvent .objectType =
1001- OBJECT_TYPE_TOASTVALUE ;
1002-
995+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_TOASTVALUE ;
1003996break ;
1004997
1005998case RELKIND_VIEW :
1006- auditEventStack -> auditEvent .objectType =
1007- OBJECT_TYPE_VIEW ;
1008-
999+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_VIEW ;
10091000break ;
10101001
10111002case RELKIND_COMPOSITE_TYPE :
1012- auditEventStack -> auditEvent .objectType =
1013- OBJECT_TYPE_COMPOSITE_TYPE ;
1014-
1003+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_COMPOSITE_TYPE ;
10151004break ;
10161005
10171006case RELKIND_FOREIGN_TABLE :
1018- auditEventStack -> auditEvent .objectType =
1019- OBJECT_TYPE_FOREIGN_TABLE ;
1020-
1007+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_FOREIGN_TABLE ;
10211008break ;
10221009
10231010case RELKIND_MATVIEW :
1024- auditEventStack -> auditEvent .objectType =
1025- OBJECT_TYPE_MATVIEW ;
1026-
1011+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_MATVIEW ;
10271012break ;
10281013
10291014default :
1030- auditEventStack -> auditEvent .objectType =
1031- OBJECT_TYPE_UNKNOWN ;
1032-
1015+ auditEventStack -> auditEvent .objectType = OBJECT_TYPE_UNKNOWN ;
10331016break ;
10341017}
10351018
@@ -1043,9 +1026,7 @@ log_select_dml(Oid auditOid, List *rangeTabls)
10431026/* Perform object auditing only if the audit role is valid */
10441027if (auditOid != InvalidOid )
10451028{
1046- AclMode auditPerms =
1047- (ACL_SELECT |ACL_UPDATE |ACL_INSERT |ACL_DELETE )&
1048- rte -> requiredPerms ;
1029+ AclMode auditPerms = (ACL_SELECT |ACL_UPDATE |ACL_INSERT |ACL_DELETE )& rte -> requiredPerms ;
10491030
10501031/*
10511032 * If any of the required permissions for the relation are granted
@@ -1166,7 +1147,6 @@ log_function_execute(Oid objectId)
11661147stackItem -> auditEvent .commandTag = T_DoStmt ;
11671148stackItem -> auditEvent .command = COMMAND_EXECUTE ;
11681149stackItem -> auditEvent .objectType = OBJECT_TYPE_FUNCTION ;
1169-
11701150stackItem -> auditEvent .commandText = stackItem -> next -> auditEvent .commandText ;
11711151
11721152log_audit_event (stackItem );
@@ -1459,8 +1439,7 @@ pg_audit_ddl_command_end(PG_FUNCTION_ARGS)
14591439
14601440/* Supply object name and type for audit event */
14611441auditEventStack -> auditEvent .objectType =
1462- SPI_getvalue (spiTuple ,spiTupDesc ,1 );
1463-
1442+ SPI_getvalue (spiTuple ,spiTupDesc ,1 );
14641443auditEventStack -> auditEvent .objectName =
14651444SPI_getvalue (spiTuple ,spiTupDesc ,2 );
14661445
@@ -1545,8 +1524,7 @@ pg_audit_sql_drop(PG_FUNCTION_ARGS)
15451524spiTuple = SPI_tuptable -> vals [row ];
15461525
15471526auditEventStack -> auditEvent .objectType =
1548- SPI_getvalue (spiTuple ,spiTupDesc ,1 );
1549-
1527+ SPI_getvalue (spiTuple ,spiTupDesc ,1 );
15501528auditEventStack -> auditEvent .objectName =
15511529SPI_getvalue (spiTuple ,spiTupDesc ,2 );
15521530
@@ -1603,16 +1581,14 @@ check_pg_audit_log(char **newVal, void **extra, GucSource source)
16031581
16041582foreach (lt ,flagRawList )
16051583{
1584+ char * token = (char * )lfirst (lt );
16061585bool subtract = false;
16071586int class ;
16081587
1609- /* Retrieve a token */
1610- char * token = (char * )lfirst (lt );
1611-
16121588/* If token is preceded by -, then the token is subtractive */
1613- if (strstr ( token , "-" ) == token )
1589+ if (token [ 0 ] == '-' )
16141590{
1615- token = token + 1 ;
1591+ token ++ ;
16161592subtract = true;
16171593}
16181594