Line data Source code
1 : /*-------------------------------------------------------------------------
2 : *
3 : * fe-connect.c
4 : * functions related to setting up a connection to the backend
5 : *
6 : * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 : * Portions Copyright (c) 1994, Regents of the University of California
8 : *
9 : *
10 : * IDENTIFICATION
11 : * src/interfaces/libpq/fe-connect.c
12 : *
13 : *-------------------------------------------------------------------------
14 : */
15 :
16 : #include "postgres_fe.h"
17 :
18 : #include <sys/stat.h>
19 : #include <fcntl.h>
20 : #include <ctype.h>
21 : #include <limits.h>
22 : #include <netdb.h>
23 : #include <time.h>
24 : #include <unistd.h>
25 :
26 : #include "common/base64.h"
27 : #include "common/ip.h"
28 : #include "common/link-canary.h"
29 : #include "common/scram-common.h"
30 : #include "common/string.h"
31 : #include "fe-auth.h"
32 : #include "fe-auth-oauth.h"
33 : #include "libpq-fe.h"
34 : #include "libpq-int.h"
35 : #include "mb/pg_wchar.h"
36 : #include "pg_config_paths.h"
37 : #include "port/pg_bswap.h"
38 :
39 : #ifdef WIN32
40 : #include "win32.h"
41 : #ifdef _WIN32_IE
42 : #undef _WIN32_IE
43 : #endif
44 : #define _WIN32_IE 0x0500
45 : #ifdef near
46 : #undef near
47 : #endif
48 : #define near
49 : #include <shlobj.h>
50 : #include <mstcpip.h>
51 : #else
52 : #include <sys/socket.h>
53 : #include <netdb.h>
54 : #include <netinet/in.h>
55 : #include <netinet/tcp.h>
56 : #include <pwd.h>
57 : #endif
58 :
59 : #ifdef WIN32
60 : #include "pthread-win32.h"
61 : #else
62 : #include <pthread.h>
63 : #endif
64 :
65 : #ifdef USE_LDAP
66 : #ifdef WIN32
67 : #include <winldap.h>
68 : #else
69 : /* OpenLDAP deprecates RFC 1823, but we want standard conformance */
70 : #define LDAP_DEPRECATED 1
71 : #include <ldap.h>
72 : typedef struct timeval LDAP_TIMEVAL;
73 : #endif
74 : static int ldapServiceLookup(const char *purl, PQconninfoOption *options,
75 : PQExpBuffer errorMessage);
76 : #endif
77 :
78 : #ifndef WIN32
79 : #define PGPASSFILE ".pgpass"
80 : #else
81 : #define PGPASSFILE "pgpass.conf"
82 : #endif
83 :
84 : /*
85 : * Pre-9.0 servers will return this SQLSTATE if asked to set
86 : * application_name in a startup packet. We hard-wire the value rather
87 : * than looking into errcodes.h since it reflects historical behavior
88 : * rather than that of the current code.
89 : */
90 : #define ERRCODE_APPNAME_UNKNOWN "42704"
91 :
92 : /* This is part of the protocol so just define it */
93 : #define ERRCODE_INVALID_PASSWORD "28P01"
94 : /* These too */
95 : #define ERRCODE_CANNOT_CONNECT_NOW "57P03"
96 : #define ERRCODE_PROTOCOL_VIOLATION "08P01"
97 :
98 : /*
99 : * Cope with the various platform-specific ways to spell TCP keepalive socket
100 : * options. This doesn't cover Windows, which as usual does its own thing.
101 : */
102 : #if defined(TCP_KEEPIDLE)
103 : /* TCP_KEEPIDLE is the name of this option on Linux and *BSD */
104 : #define PG_TCP_KEEPALIVE_IDLE TCP_KEEPIDLE
105 : #define PG_TCP_KEEPALIVE_IDLE_STR "TCP_KEEPIDLE"
106 : #elif defined(TCP_KEEPALIVE_THRESHOLD)
107 : /* TCP_KEEPALIVE_THRESHOLD is the name of this option on Solaris >= 11 */
108 : #define PG_TCP_KEEPALIVE_IDLE TCP_KEEPALIVE_THRESHOLD
109 : #define PG_TCP_KEEPALIVE_IDLE_STR "TCP_KEEPALIVE_THRESHOLD"
110 : #elif defined(TCP_KEEPALIVE) && defined(__darwin__)
111 : /* TCP_KEEPALIVE is the name of this option on macOS */
112 : /* Caution: Solaris has this symbol but it means something different */
113 : #define PG_TCP_KEEPALIVE_IDLE TCP_KEEPALIVE
114 : #define PG_TCP_KEEPALIVE_IDLE_STR "TCP_KEEPALIVE"
115 : #endif
116 :
117 : /*
118 : * fall back options if they are not specified by arguments or defined
119 : * by environment variables
120 : */
121 : #define DefaultHost "localhost"
122 : #define DefaultOption ""
123 : #ifdef USE_SSL
124 : #define DefaultChannelBinding "prefer"
125 : #else
126 : #define DefaultChannelBinding "disable"
127 : #endif
128 : #define DefaultTargetSessionAttrs "any"
129 : #define DefaultLoadBalanceHosts "disable"
130 : #ifdef USE_SSL
131 : #define DefaultSSLMode "prefer"
132 : #define DefaultSSLCertMode "allow"
133 : #else
134 : #define DefaultSSLMode "disable"
135 : #define DefaultSSLCertMode "disable"
136 : #endif
137 : #define DefaultSSLNegotiation "postgres"
138 : #ifdef ENABLE_GSS
139 : #include "fe-gssapi-common.h"
140 : #define DefaultGSSMode "prefer"
141 : #else
142 : #define DefaultGSSMode "disable"
143 : #endif
144 :
145 : /* ----------
146 : * Definition of the conninfo parameters and their fallback resources.
147 : *
148 : * If Environment-Var and Compiled-in are specified as NULL, no
149 : * fallback is available. If after all no value can be determined
150 : * for an option, an error is returned.
151 : *
152 : * The value for the username is treated specially in conninfo_add_defaults.
153 : * If the value is not obtained any other way, the username is determined
154 : * by pg_fe_getauthname().
155 : *
156 : * The Label and Disp-Char entries are provided for applications that
157 : * want to use PQconndefaults() to create a generic database connection
158 : * dialog. Disp-Char is defined as follows:
159 : * "" Normal input field
160 : * "*" Password field - hide value
161 : * "D" Debug option - don't show by default
162 : *
163 : * NB: Server-side clients -- dblink, postgres_fdw, libpqrcv -- use dispchar to
164 : * determine which options to expose to end users, and how. Changing dispchar
165 : * has compatibility and security implications for those clients. For example,
166 : * postgres_fdw will attach a "*" option to USER MAPPING instead of the default
167 : * SERVER, and it disallows setting "D" options entirely.
168 : *
169 : * PQconninfoOptions[] is a constant static array that we use to initialize
170 : * a dynamically allocated working copy. All the "val" fields in
171 : * PQconninfoOptions[] *must* be NULL. In a working copy, non-null "val"
172 : * fields point to malloc'd strings that should be freed when the working
173 : * array is freed (see PQconninfoFree).
174 : *
175 : * The first part of each struct is identical to the one in libpq-fe.h,
176 : * which is required since we memcpy() data between the two!
177 : * ----------
178 : */
179 : typedef struct _internalPQconninfoOption
180 : {
181 : char *keyword; /* The keyword of the option */
182 : char *envvar; /* Fallback environment variable name */
183 : char *compiled; /* Fallback compiled in default value */
184 : char *val; /* Option's current value, or NULL */
185 : char *label; /* Label for field in connect dialog */
186 : char *dispchar; /* Indicates how to display this field in a
187 : * connect dialog. Values are: "" Display
188 : * entered value as is "*" Password field -
189 : * hide value "D" Debug option - don't show
190 : * by default */
191 : int dispsize; /* Field size in characters for dialog */
192 : /* ---
193 : * Anything above this comment must be synchronized with
194 : * PQconninfoOption in libpq-fe.h, since we memcpy() data
195 : * between them!
196 : * ---
197 : */
198 : off_t connofs; /* Offset into PGconn struct, -1 if not there */
199 : } internalPQconninfoOption;
200 :
201 : static const internalPQconninfoOption PQconninfoOptions[] = {
202 : {"service", "PGSERVICE", NULL, NULL,
203 : "Database-Service", "", 20,
204 : offsetof(struct pg_conn, pgservice)},
205 :
206 : {"servicefile", "PGSERVICEFILE", NULL, NULL,
207 : "Database-Service-File", "", 64,
208 : offsetof(struct pg_conn, pgservicefile)},
209 :
210 : {"user", "PGUSER", NULL, NULL,
211 : "Database-User", "", 20,
212 : offsetof(struct pg_conn, pguser)},
213 :
214 : {"password", "PGPASSWORD", NULL, NULL,
215 : "Database-Password", "*", 20,
216 : offsetof(struct pg_conn, pgpass)},
217 :
218 : {"passfile", "PGPASSFILE", NULL, NULL,
219 : "Database-Password-File", "", 64,
220 : offsetof(struct pg_conn, pgpassfile)},
221 :
222 : {"channel_binding", "PGCHANNELBINDING", DefaultChannelBinding, NULL,
223 : "Channel-Binding", "", 8, /* sizeof("require") == 8 */
224 : offsetof(struct pg_conn, channel_binding)},
225 :
226 : {"connect_timeout", "PGCONNECT_TIMEOUT", NULL, NULL,
227 : "Connect-timeout", "", 10, /* strlen(INT32_MAX) == 10 */
228 : offsetof(struct pg_conn, connect_timeout)},
229 :
230 : {"dbname", "PGDATABASE", NULL, NULL,
231 : "Database-Name", "", 20,
232 : offsetof(struct pg_conn, dbName)},
233 :
234 : {"host", "PGHOST", NULL, NULL,
235 : "Database-Host", "", 40,
236 : offsetof(struct pg_conn, pghost)},
237 :
238 : {"hostaddr", "PGHOSTADDR", NULL, NULL,
239 : "Database-Host-IP-Address", "", 45,
240 : offsetof(struct pg_conn, pghostaddr)},
241 :
242 : {"port", "PGPORT", DEF_PGPORT_STR, NULL,
243 : "Database-Port", "", 6,
244 : offsetof(struct pg_conn, pgport)},
245 :
246 : {"client_encoding", "PGCLIENTENCODING", NULL, NULL,
247 : "Client-Encoding", "", 10,
248 : offsetof(struct pg_conn, client_encoding_initial)},
249 :
250 : {"options", "PGOPTIONS", DefaultOption, NULL,
251 : "Backend-Options", "", 40,
252 : offsetof(struct pg_conn, pgoptions)},
253 :
254 : {"application_name", "PGAPPNAME", NULL, NULL,
255 : "Application-Name", "", 64,
256 : offsetof(struct pg_conn, appname)},
257 :
258 : {"fallback_application_name", NULL, NULL, NULL,
259 : "Fallback-Application-Name", "", 64,
260 : offsetof(struct pg_conn, fbappname)},
261 :
262 : {"keepalives", NULL, NULL, NULL,
263 : "TCP-Keepalives", "", 1, /* should be just '0' or '1' */
264 : offsetof(struct pg_conn, keepalives)},
265 :
266 : {"keepalives_idle", NULL, NULL, NULL,
267 : "TCP-Keepalives-Idle", "", 10, /* strlen(INT32_MAX) == 10 */
268 : offsetof(struct pg_conn, keepalives_idle)},
269 :
270 : {"keepalives_interval", NULL, NULL, NULL,
271 : "TCP-Keepalives-Interval", "", 10, /* strlen(INT32_MAX) == 10 */
272 : offsetof(struct pg_conn, keepalives_interval)},
273 :
274 : {"keepalives_count", NULL, NULL, NULL,
275 : "TCP-Keepalives-Count", "", 10, /* strlen(INT32_MAX) == 10 */
276 : offsetof(struct pg_conn, keepalives_count)},
277 :
278 : {"tcp_user_timeout", NULL, NULL, NULL,
279 : "TCP-User-Timeout", "", 10, /* strlen(INT32_MAX) == 10 */
280 : offsetof(struct pg_conn, pgtcp_user_timeout)},
281 :
282 : /*
283 : * ssl options are allowed even without client SSL support because the
284 : * client can still handle SSL modes "disable" and "allow". Other
285 : * parameters have no effect on non-SSL connections, so there is no reason
286 : * to exclude them since none of them are mandatory.
287 : */
288 : {"sslmode", "PGSSLMODE", DefaultSSLMode, NULL,
289 : "SSL-Mode", "", 12, /* sizeof("verify-full") == 12 */
290 : offsetof(struct pg_conn, sslmode)},
291 :
292 : {"sslnegotiation", "PGSSLNEGOTIATION", DefaultSSLNegotiation, NULL,
293 : "SSL-Negotiation", "", 9, /* sizeof("postgres") == 9 */
294 : offsetof(struct pg_conn, sslnegotiation)},
295 :
296 : {"sslcompression", "PGSSLCOMPRESSION", "0", NULL,
297 : "SSL-Compression", "", 1,
298 : offsetof(struct pg_conn, sslcompression)},
299 :
300 : {"sslcert", "PGSSLCERT", NULL, NULL,
301 : "SSL-Client-Cert", "", 64,
302 : offsetof(struct pg_conn, sslcert)},
303 :
304 : {"sslkey", "PGSSLKEY", NULL, NULL,
305 : "SSL-Client-Key", "", 64,
306 : offsetof(struct pg_conn, sslkey)},
307 :
308 : {"sslcertmode", "PGSSLCERTMODE", NULL, NULL,
309 : "SSL-Client-Cert-Mode", "", 8, /* sizeof("disable") == 8 */
310 : offsetof(struct pg_conn, sslcertmode)},
311 :
312 : {"sslpassword", NULL, NULL, NULL,
313 : "SSL-Client-Key-Password", "*", 20,
314 : offsetof(struct pg_conn, sslpassword)},
315 :
316 : {"sslrootcert", "PGSSLROOTCERT", NULL, NULL,
317 : "SSL-Root-Certificate", "", 64,
318 : offsetof(struct pg_conn, sslrootcert)},
319 :
320 : {"sslcrl", "PGSSLCRL", NULL, NULL,
321 : "SSL-Revocation-List", "", 64,
322 : offsetof(struct pg_conn, sslcrl)},
323 :
324 : {"sslcrldir", "PGSSLCRLDIR", NULL, NULL,
325 : "SSL-Revocation-List-Dir", "", 64,
326 : offsetof(struct pg_conn, sslcrldir)},
327 :
328 : {"sslsni", "PGSSLSNI", "1", NULL,
329 : "SSL-SNI", "", 1,
330 : offsetof(struct pg_conn, sslsni)},
331 :
332 : {"requirepeer", "PGREQUIREPEER", NULL, NULL,
333 : "Require-Peer", "", 10,
334 : offsetof(struct pg_conn, requirepeer)},
335 :
336 : {"require_auth", "PGREQUIREAUTH", NULL, NULL,
337 : "Require-Auth", "", 14, /* sizeof("scram-sha-256") == 14 */
338 : offsetof(struct pg_conn, require_auth)},
339 :
340 : {"min_protocol_version", "PGMINPROTOCOLVERSION",
341 : NULL, NULL,
342 : "Min-Protocol-Version", "", 6, /* sizeof("latest") = 6 */
343 : offsetof(struct pg_conn, min_protocol_version)},
344 :
345 : {"max_protocol_version", "PGMAXPROTOCOLVERSION",
346 : NULL, NULL,
347 : "Max-Protocol-Version", "", 6, /* sizeof("latest") = 6 */
348 : offsetof(struct pg_conn, max_protocol_version)},
349 :
350 : {"ssl_min_protocol_version", "PGSSLMINPROTOCOLVERSION", "TLSv1.2", NULL,
351 : "SSL-Minimum-Protocol-Version", "", 8, /* sizeof("TLSv1.x") == 8 */
352 : offsetof(struct pg_conn, ssl_min_protocol_version)},
353 :
354 : {"ssl_max_protocol_version", "PGSSLMAXPROTOCOLVERSION", NULL, NULL,
355 : "SSL-Maximum-Protocol-Version", "", 8, /* sizeof("TLSv1.x") == 8 */
356 : offsetof(struct pg_conn, ssl_max_protocol_version)},
357 :
358 : /*
359 : * As with SSL, all GSS options are exposed even in builds that don't have
360 : * support.
361 : */
362 : {"gssencmode", "PGGSSENCMODE", DefaultGSSMode, NULL,
363 : "GSSENC-Mode", "", 8, /* sizeof("disable") == 8 */
364 : offsetof(struct pg_conn, gssencmode)},
365 :
366 : /* Kerberos and GSSAPI authentication support specifying the service name */
367 : {"krbsrvname", "PGKRBSRVNAME", PG_KRB_SRVNAM, NULL,
368 : "Kerberos-service-name", "", 20,
369 : offsetof(struct pg_conn, krbsrvname)},
370 :
371 : {"gsslib", "PGGSSLIB", NULL, NULL,
372 : "GSS-library", "", 7, /* sizeof("gssapi") == 7 */
373 : offsetof(struct pg_conn, gsslib)},
374 :
375 : {"gssdelegation", "PGGSSDELEGATION", "0", NULL,
376 : "GSS-delegation", "", 1,
377 : offsetof(struct pg_conn, gssdelegation)},
378 :
379 : {"replication", NULL, NULL, NULL,
380 : "Replication", "D", 5,
381 : offsetof(struct pg_conn, replication)},
382 :
383 : {"target_session_attrs", "PGTARGETSESSIONATTRS",
384 : DefaultTargetSessionAttrs, NULL,
385 : "Target-Session-Attrs", "", 15, /* sizeof("prefer-standby") = 15 */
386 : offsetof(struct pg_conn, target_session_attrs)},
387 :
388 : {"load_balance_hosts", "PGLOADBALANCEHOSTS",
389 : DefaultLoadBalanceHosts, NULL,
390 : "Load-Balance-Hosts", "", 8, /* sizeof("disable") = 8 */
391 : offsetof(struct pg_conn, load_balance_hosts)},
392 :
393 : {"scram_client_key", NULL, NULL, NULL, "SCRAM-Client-Key", "D", SCRAM_MAX_KEY_LEN * 2,
394 : offsetof(struct pg_conn, scram_client_key)},
395 :
396 : {"scram_server_key", NULL, NULL, NULL, "SCRAM-Server-Key", "D", SCRAM_MAX_KEY_LEN * 2,
397 : offsetof(struct pg_conn, scram_server_key)},
398 :
399 : /* OAuth v2 */
400 : {"oauth_issuer", NULL, NULL, NULL,
401 : "OAuth-Issuer", "", 40,
402 : offsetof(struct pg_conn, oauth_issuer)},
403 :
404 : {"oauth_client_id", NULL, NULL, NULL,
405 : "OAuth-Client-ID", "", 40,
406 : offsetof(struct pg_conn, oauth_client_id)},
407 :
408 : {"oauth_client_secret", NULL, NULL, NULL,
409 : "OAuth-Client-Secret", "*", 40,
410 : offsetof(struct pg_conn, oauth_client_secret)},
411 :
412 : {"oauth_scope", NULL, NULL, NULL,
413 : "OAuth-Scope", "", 15,
414 : offsetof(struct pg_conn, oauth_scope)},
415 :
416 : {"oauth_ca_file", "PGOAUTHCAFILE", NULL, NULL,
417 : "OAuth-CA-File", "", 64,
418 : offsetof(struct pg_conn, oauth_ca_file)},
419 :
420 : {"sslkeylogfile", NULL, NULL, NULL,
421 : "SSL-Key-Log-File", "D", 64,
422 : offsetof(struct pg_conn, sslkeylogfile)},
423 :
424 : /* Terminating entry --- MUST BE LAST */
425 : {NULL, NULL, NULL, NULL,
426 : NULL, NULL, 0}
427 : };
428 :
429 : static const PQEnvironmentOption EnvironmentOptions[] =
430 : {
431 : /* common user-interface settings */
432 : {
433 : "PGDATESTYLE", "datestyle"
434 : },
435 : {
436 : "PGTZ", "timezone"
437 : },
438 : /* internal performance-related settings */
439 : {
440 : "PGGEQO", "geqo"
441 : },
442 : {
443 : NULL, NULL
444 : }
445 : };
446 :
447 : static const pg_fe_sasl_mech *supported_sasl_mechs[] =
448 : {
449 : &pg_scram_mech,
450 : &pg_oauth_mech,
451 : };
452 : #define SASL_MECHANISM_COUNT lengthof(supported_sasl_mechs)
453 :
454 : /* The connection URI must start with either of the following designators: */
455 : static const char uri_designator[] = "postgresql://";
456 : static const char short_uri_designator[] = "postgres://";
457 :
458 : static bool connectOptions1(PGconn *conn, const char *conninfo);
459 : static bool init_allowed_encryption_methods(PGconn *conn);
460 : #if defined(USE_SSL) || defined(ENABLE_GSS)
461 : static int encryption_negotiation_failed(PGconn *conn);
462 : #endif
463 : static bool connection_failed(PGconn *conn);
464 : static bool select_next_encryption_method(PGconn *conn, bool have_valid_connection);
465 : static PGPing internal_ping(PGconn *conn);
466 : static void pqFreeCommandQueue(PGcmdQueueEntry *queue);
467 : static bool fillPGconn(PGconn *conn, PQconninfoOption *connOptions);
468 : static void freePGconn(PGconn *conn);
469 : static void release_conn_addrinfo(PGconn *conn);
470 : static int store_conn_addrinfo(PGconn *conn, struct addrinfo *addrlist);
471 : static void sendTerminateConn(PGconn *conn);
472 : static PQconninfoOption *conninfo_init(PQExpBuffer errorMessage);
473 : static PQconninfoOption *parse_connection_string(const char *connstr,
474 : PQExpBuffer errorMessage, bool use_defaults);
475 : static int uri_prefix_length(const char *connstr);
476 : static bool recognized_connection_string(const char *connstr);
477 : static PQconninfoOption *conninfo_parse(const char *conninfo,
478 : PQExpBuffer errorMessage, bool use_defaults);
479 : static PQconninfoOption *conninfo_array_parse(const char *const *keywords,
480 : const char *const *values, PQExpBuffer errorMessage,
481 : bool use_defaults, int expand_dbname);
482 : static bool conninfo_add_defaults(PQconninfoOption *options,
483 : PQExpBuffer errorMessage);
484 : static PQconninfoOption *conninfo_uri_parse(const char *uri,
485 : PQExpBuffer errorMessage, bool use_defaults);
486 : static bool conninfo_uri_parse_options(PQconninfoOption *options,
487 : const char *uri, PQExpBuffer errorMessage);
488 : static bool conninfo_uri_parse_params(char *params,
489 : PQconninfoOption *connOptions,
490 : PQExpBuffer errorMessage);
491 : static char *conninfo_uri_decode(const char *str, PQExpBuffer errorMessage);
492 : static bool get_hexdigit(char digit, int *value);
493 : static const char *conninfo_getval(PQconninfoOption *connOptions,
494 : const char *keyword);
495 : static PQconninfoOption *conninfo_storeval(PQconninfoOption *connOptions,
496 : const char *keyword, const char *value,
497 : PQExpBuffer errorMessage, bool ignoreMissing, bool uri_decode);
498 : static PQconninfoOption *conninfo_find(PQconninfoOption *connOptions,
499 : const char *keyword);
500 : static void defaultNoticeReceiver(void *arg, const PGresult *res);
501 : static void defaultNoticeProcessor(void *arg, const char *message);
502 : static int parseServiceInfo(PQconninfoOption *options,
503 : PQExpBuffer errorMessage);
504 : static int parseServiceFile(const char *serviceFile,
505 : const char *service,
506 : PQconninfoOption *options,
507 : PQExpBuffer errorMessage,
508 : bool *group_found);
509 : static char *pwdfMatchesString(char *buf, const char *token);
510 : static char *passwordFromFile(const char *hostname, const char *port,
511 : const char *dbname, const char *username,
512 : const char *pgpassfile, const char **errmsg);
513 : static void pgpassfileWarning(PGconn *conn);
514 : static void default_threadlock(int acquire);
515 : static bool sslVerifyProtocolVersion(const char *version);
516 : static bool sslVerifyProtocolRange(const char *min, const char *max);
517 : static bool pqParseProtocolVersion(const char *value, ProtocolVersion *result, PGconn *conn, const char *context);
518 :
519 :
520 : /* global variable because fe-auth.c needs to access it */
521 : pgthreadlock_t pg_g_threadlock = default_threadlock;
522 :
523 :
524 : /*
525 : * pqDropConnection
526 : *
527 : * Close any physical connection to the server, and reset associated
528 : * state inside the connection object. We don't release state that
529 : * would be needed to reconnect, though, nor local state that might still
530 : * be useful later.
531 : *
532 : * We can always flush the output buffer, since there's no longer any hope
533 : * of sending that data. However, unprocessed input data might still be
534 : * valuable, so the caller must tell us whether to flush that or not.
535 : */
536 : void
537 31664 : pqDropConnection(PGconn *conn, bool flushInput)
538 : {
539 : /* Drop any SSL state */
540 31664 : pqsecure_close(conn);
541 :
542 : /* Close the socket itself */
543 31664 : if (conn->sock != PGINVALID_SOCKET)
544 15302 : closesocket(conn->sock);
545 31664 : conn->sock = PGINVALID_SOCKET;
546 :
547 : /* Optionally discard any unread data */
548 31664 : if (flushInput)
549 31535 : conn->inStart = conn->inCursor = conn->inEnd = 0;
550 :
551 : /* Always discard any unsent data */
552 31664 : conn->outCount = 0;
553 :
554 : /* Likewise, discard any pending pipelined commands */
555 31664 : pqFreeCommandQueue(conn->cmd_queue_head);
556 31664 : conn->cmd_queue_head = conn->cmd_queue_tail = NULL;
557 31664 : pqFreeCommandQueue(conn->cmd_queue_recycle);
558 31664 : conn->cmd_queue_recycle = NULL;
559 :
560 : /* Free authentication/encryption state */
561 31664 : if (conn->cleanup_async_auth)
562 : {
563 : /*
564 : * Any in-progress async authentication should be torn down first so
565 : * that cleanup_async_auth() can depend on the other authentication
566 : * state if necessary.
567 : */
568 0 : conn->cleanup_async_auth(conn);
569 0 : conn->cleanup_async_auth = NULL;
570 : }
571 31664 : conn->async_auth = NULL;
572 : /* cleanup_async_auth() should have done this, but make sure */
573 31664 : conn->altsock = PGINVALID_SOCKET;
574 : #ifdef ENABLE_GSS
575 : {
576 : OM_uint32 min_s;
577 :
578 : if (conn->gcred != GSS_C_NO_CREDENTIAL)
579 : {
580 : gss_release_cred(&min_s, &conn->gcred);
581 : conn->gcred = GSS_C_NO_CREDENTIAL;
582 : }
583 : if (conn->gctx)
584 : gss_delete_sec_context(&min_s, &conn->gctx, GSS_C_NO_BUFFER);
585 : if (conn->gtarg_nam)
586 : gss_release_name(&min_s, &conn->gtarg_nam);
587 : if (conn->gss_SendBuffer)
588 : {
589 : free(conn->gss_SendBuffer);
590 : conn->gss_SendBuffer = NULL;
591 : }
592 : if (conn->gss_RecvBuffer)
593 : {
594 : free(conn->gss_RecvBuffer);
595 : conn->gss_RecvBuffer = NULL;
596 : }
597 : if (conn->gss_ResultBuffer)
598 : {
599 : free(conn->gss_ResultBuffer);
600 : conn->gss_ResultBuffer = NULL;
601 : }
602 : conn->gssenc = false;
603 : }
604 : #endif
605 : #ifdef ENABLE_SSPI
606 : if (conn->sspitarget)
607 : {
608 : free(conn->sspitarget);
609 : conn->sspitarget = NULL;
610 : }
611 : if (conn->sspicred)
612 : {
613 : FreeCredentialsHandle(conn->sspicred);
614 : free(conn->sspicred);
615 : conn->sspicred = NULL;
616 : }
617 : if (conn->sspictx)
618 : {
619 : DeleteSecurityContext(conn->sspictx);
620 : free(conn->sspictx);
621 : conn->sspictx = NULL;
622 : }
623 : conn->usesspi = 0;
624 : #endif
625 31664 : if (conn->sasl_state)
626 : {
627 60 : conn->sasl->free(conn->sasl_state);
628 60 : conn->sasl_state = NULL;
629 : }
630 31664 : }
631 :
632 : /*
633 : * pqFreeCommandQueue
634 : * Free all the entries of PGcmdQueueEntry queue passed.
635 : */
636 : static void
637 63328 : pqFreeCommandQueue(PGcmdQueueEntry *queue)
638 : {
639 78515 : while (queue != NULL)
640 : {
641 15187 : PGcmdQueueEntry *cur = queue;
642 :
643 15187 : queue = cur->next;
644 15187 : free(cur->query);
645 15187 : free(cur);
646 : }
647 63328 : }
648 :
649 : /*
650 : * pqDropServerData
651 : *
652 : * Clear all connection state data that was received from (or deduced about)
653 : * the server. This is essential to do between connection attempts to
654 : * different servers, else we may incorrectly hold over some data from the
655 : * old server.
656 : *
657 : * It would be better to merge this into pqDropConnection, perhaps, but
658 : * right now we cannot because that function is called immediately on
659 : * detection of connection loss (cf. pqReadData, for instance). This data
660 : * should be kept until we are actually starting a new connection.
661 : */
662 : static void
663 31184 : pqDropServerData(PGconn *conn)
664 : {
665 : PGnotify *notify;
666 : pgParameterStatus *pstatus;
667 :
668 : /* Forget pending notifies */
669 31184 : notify = conn->notifyHead;
670 31184 : while (notify != NULL)
671 : {
672 0 : PGnotify *prev = notify;
673 :
674 0 : notify = notify->next;
675 0 : free(prev);
676 : }
677 31184 : conn->notifyHead = conn->notifyTail = NULL;
678 :
679 : /* Reset ParameterStatus data, as well as variables deduced from it */
680 31184 : pstatus = conn->pstatus;
681 249449 : while (pstatus != NULL)
682 : {
683 218265 : pgParameterStatus *prev = pstatus;
684 :
685 218265 : pstatus = pstatus->next;
686 218265 : free(prev);
687 : }
688 31184 : conn->pstatus = NULL;
689 31184 : conn->client_encoding = PG_SQL_ASCII;
690 31184 : conn->std_strings = false;
691 31184 : conn->default_transaction_read_only = PG_BOOL_UNKNOWN;
692 31184 : conn->in_hot_standby = PG_BOOL_UNKNOWN;
693 31184 : conn->scram_sha_256_iterations = SCRAM_SHA_256_DEFAULT_ITERATIONS;
694 31184 : conn->sversion = 0;
695 :
696 : /* Drop large-object lookup data */
697 31184 : free(conn->lobjfuncs);
698 31184 : conn->lobjfuncs = NULL;
699 :
700 : /* Reset assorted other per-connection state */
701 31184 : conn->last_sqlstate[0] = '\0';
702 31184 : conn->pversion_negotiated = false;
703 31184 : conn->auth_req_received = false;
704 31184 : conn->client_finished_auth = false;
705 31184 : conn->password_needed = false;
706 31184 : conn->gssapi_used = false;
707 31184 : conn->write_failed = false;
708 31184 : free(conn->write_err_msg);
709 31184 : conn->write_err_msg = NULL;
710 31184 : conn->oauth_want_retry = false;
711 :
712 : /*
713 : * Cancel connections need to retain their be_pid and be_cancel_key across
714 : * PQcancelReset invocations, otherwise they would not have access to the
715 : * secret token of the connection they are supposed to cancel.
716 : */
717 31184 : if (!conn->cancelRequest)
718 : {
719 31175 : conn->be_pid = 0;
720 31175 : if (conn->be_cancel_key != NULL)
721 : {
722 14551 : free(conn->be_cancel_key);
723 14551 : conn->be_cancel_key = NULL;
724 : }
725 31175 : conn->be_cancel_key_len = 0;
726 : }
727 31184 : }
728 :
729 :
730 : /*
731 : * Connecting to a Database
732 : *
733 : * There are now six different ways a user of this API can connect to the
734 : * database. Two are not recommended for use in new code, because of their
735 : * lack of extensibility with respect to the passing of options to the
736 : * backend. These are PQsetdb and PQsetdbLogin (the former now being a macro
737 : * to the latter).
738 : *
739 : * If it is desired to connect in a synchronous (blocking) manner, use the
740 : * function PQconnectdb or PQconnectdbParams. The former accepts a string of
741 : * option = value pairs (or a URI) which must be parsed; the latter takes two
742 : * NULL terminated arrays instead.
743 : *
744 : * To connect in an asynchronous (non-blocking) manner, use the functions
745 : * PQconnectStart or PQconnectStartParams (which differ in the same way as
746 : * PQconnectdb and PQconnectdbParams) and PQconnectPoll.
747 : *
748 : * The non-exported functions pqConnectDBStart, pqConnectDBComplete are
749 : * part of the connection procedure implementation.
750 : */
751 :
752 : /*
753 : * PQconnectdbParams
754 : *
755 : * establishes a connection to a postgres backend through the postmaster
756 : * using connection information in two arrays.
757 : *
758 : * The keywords array is defined as
759 : *
760 : * const char *params[] = {"option1", "option2", NULL}
761 : *
762 : * The values array is defined as
763 : *
764 : * const char *values[] = {"value1", "value2", NULL}
765 : *
766 : * Returns a PGconn* which is needed for all subsequent libpq calls, or NULL
767 : * if a memory allocation failed.
768 : * If the status field of the connection returned is CONNECTION_BAD,
769 : * then some fields may be null'ed out instead of having valid values.
770 : *
771 : * You should call PQfinish (if conn is not NULL) regardless of whether this
772 : * call succeeded.
773 : */
774 : PGconn *
775 12371 : PQconnectdbParams(const char *const *keywords,
776 : const char *const *values,
777 : int expand_dbname)
778 : {
779 12371 : PGconn *conn = PQconnectStartParams(keywords, values, expand_dbname);
780 :
781 12371 : if (conn && conn->status != CONNECTION_BAD)
782 12318 : (void) pqConnectDBComplete(conn);
783 :
784 12371 : return conn;
785 : }
786 :
787 : /*
788 : * PQpingParams
789 : *
790 : * check server status, accepting parameters identical to PQconnectdbParams
791 : */
792 : PGPing
793 537 : PQpingParams(const char *const *keywords,
794 : const char *const *values,
795 : int expand_dbname)
796 : {
797 537 : PGconn *conn = PQconnectStartParams(keywords, values, expand_dbname);
798 : PGPing ret;
799 :
800 537 : ret = internal_ping(conn);
801 537 : PQfinish(conn);
802 :
803 537 : return ret;
804 : }
805 :
806 : /*
807 : * PQconnectdb
808 : *
809 : * establishes a connection to a postgres backend through the postmaster
810 : * using connection information in a string.
811 : *
812 : * The conninfo string is either a whitespace-separated list of
813 : *
814 : * option = value
815 : *
816 : * definitions or a URI (refer to the documentation for details.) Value
817 : * might be a single value containing no whitespaces or a single quoted
818 : * string. If a single quote should appear anywhere in the value, it must be
819 : * escaped with a backslash like \'
820 : *
821 : * Returns a PGconn* which is needed for all subsequent libpq calls, or NULL
822 : * if a memory allocation failed.
823 : * If the status field of the connection returned is CONNECTION_BAD,
824 : * then some fields may be null'ed out instead of having valid values.
825 : *
826 : * You should call PQfinish (if conn is not NULL) regardless of whether this
827 : * call succeeded.
828 : */
829 : PGconn *
830 975 : PQconnectdb(const char *conninfo)
831 : {
832 975 : PGconn *conn = PQconnectStart(conninfo);
833 :
834 975 : if (conn && conn->status != CONNECTION_BAD)
835 975 : (void) pqConnectDBComplete(conn);
836 :
837 975 : return conn;
838 : }
839 :
840 : /*
841 : * PQping
842 : *
843 : * check server status, accepting parameters identical to PQconnectdb
844 : */
845 : PGPing
846 0 : PQping(const char *conninfo)
847 : {
848 0 : PGconn *conn = PQconnectStart(conninfo);
849 : PGPing ret;
850 :
851 0 : ret = internal_ping(conn);
852 0 : PQfinish(conn);
853 :
854 0 : return ret;
855 : }
856 :
857 : /*
858 : * PQconnectStartParams
859 : *
860 : * Begins the establishment of a connection to a postgres backend through the
861 : * postmaster using connection information in a struct.
862 : *
863 : * See comment for PQconnectdbParams for the definition of the string format.
864 : *
865 : * Returns a PGconn*. If NULL is returned, a malloc error has occurred, and
866 : * you should not attempt to proceed with this connection. If the status
867 : * field of the connection returned is CONNECTION_BAD, an error has
868 : * occurred. In this case you should call PQfinish on the result, (perhaps
869 : * inspecting the error message first). Other fields of the structure may not
870 : * be valid if that occurs. If the status field is not CONNECTION_BAD, then
871 : * this stage has succeeded - call PQconnectPoll, using select(2) to see when
872 : * this is necessary.
873 : *
874 : * See PQconnectPoll for more info.
875 : */
876 : PGconn *
877 14243 : PQconnectStartParams(const char *const *keywords,
878 : const char *const *values,
879 : int expand_dbname)
880 : {
881 : PGconn *conn;
882 : PQconninfoOption *connOptions;
883 :
884 : /*
885 : * Allocate memory for the conn structure. Note that we also expect this
886 : * to initialize conn->errorMessage to empty. All subsequent steps during
887 : * connection initialization will only append to that buffer.
888 : */
889 14243 : conn = pqMakeEmptyPGconn();
890 14243 : if (conn == NULL)
891 0 : return NULL;
892 :
893 : /*
894 : * Parse the conninfo arrays
895 : */
896 14243 : connOptions = conninfo_array_parse(keywords, values,
897 : &conn->errorMessage,
898 : true, expand_dbname);
899 14243 : if (connOptions == NULL)
900 : {
901 13 : conn->status = CONNECTION_BAD;
902 : /* errorMessage is already set */
903 13 : return conn;
904 : }
905 :
906 : /*
907 : * Move option values into conn structure
908 : */
909 14230 : if (!fillPGconn(conn, connOptions))
910 : {
911 0 : PQconninfoFree(connOptions);
912 0 : return conn;
913 : }
914 :
915 : /*
916 : * Free the option info - all is in conn now
917 : */
918 14230 : PQconninfoFree(connOptions);
919 :
920 : /*
921 : * Compute derived options
922 : */
923 14230 : if (!pqConnectOptions2(conn))
924 40 : return conn;
925 :
926 : /*
927 : * Connect to the database
928 : */
929 14190 : if (!pqConnectDBStart(conn))
930 : {
931 : /* Just in case we failed to set it in pqConnectDBStart */
932 351 : conn->status = CONNECTION_BAD;
933 : }
934 :
935 14190 : return conn;
936 : }
937 :
938 : /*
939 : * PQconnectStart
940 : *
941 : * Begins the establishment of a connection to a postgres backend through the
942 : * postmaster using connection information in a string.
943 : *
944 : * See comment for PQconnectdb for the definition of the string format.
945 : *
946 : * Returns a PGconn*. If NULL is returned, a malloc error has occurred, and
947 : * you should not attempt to proceed with this connection. If the status
948 : * field of the connection returned is CONNECTION_BAD, an error has
949 : * occurred. In this case you should call PQfinish on the result, (perhaps
950 : * inspecting the error message first). Other fields of the structure may not
951 : * be valid if that occurs. If the status field is not CONNECTION_BAD, then
952 : * this stage has succeeded - call PQconnectPoll, using select(2) to see when
953 : * this is necessary.
954 : *
955 : * See PQconnectPoll for more info.
956 : */
957 : PGconn *
958 1295 : PQconnectStart(const char *conninfo)
959 : {
960 : PGconn *conn;
961 :
962 : /*
963 : * Allocate memory for the conn structure. Note that we also expect this
964 : * to initialize conn->errorMessage to empty. All subsequent steps during
965 : * connection initialization will only append to that buffer.
966 : */
967 1295 : conn = pqMakeEmptyPGconn();
968 1295 : if (conn == NULL)
969 0 : return NULL;
970 :
971 : /*
972 : * Parse the conninfo string
973 : */
974 1295 : if (!connectOptions1(conn, conninfo))
975 2 : return conn;
976 :
977 : /*
978 : * Compute derived options
979 : */
980 1293 : if (!pqConnectOptions2(conn))
981 0 : return conn;
982 :
983 : /*
984 : * Connect to the database
985 : */
986 1293 : if (!pqConnectDBStart(conn))
987 : {
988 : /* Just in case we failed to set it in pqConnectDBStart */
989 0 : conn->status = CONNECTION_BAD;
990 : }
991 :
992 1293 : return conn;
993 : }
994 :
995 : /*
996 : * Move option values into conn structure
997 : *
998 : * Don't put anything cute here --- intelligence should be in
999 : * pqConnectOptions2 ...
1000 : *
1001 : * Returns true on success. On failure, returns false and sets error message.
1002 : */
1003 : static bool
1004 15523 : fillPGconn(PGconn *conn, PQconninfoOption *connOptions)
1005 : {
1006 : const internalPQconninfoOption *option;
1007 :
1008 822719 : for (option = PQconninfoOptions; option->keyword; option++)
1009 : {
1010 807196 : if (option->connofs >= 0)
1011 : {
1012 807196 : const char *tmp = conninfo_getval(connOptions, option->keyword);
1013 :
1014 807196 : if (tmp)
1015 : {
1016 280969 : char **connmember = (char **) ((char *) conn + option->connofs);
1017 :
1018 280969 : free(*connmember);
1019 280969 : *connmember = strdup(tmp);
1020 280969 : if (*connmember == NULL)
1021 : {
1022 0 : libpq_append_conn_error(conn, "out of memory");
1023 0 : return false;
1024 : }
1025 : }
1026 : }
1027 : }
1028 :
1029 15523 : return true;
1030 : }
1031 :
1032 : /*
1033 : * Copy over option values from srcConn to dstConn
1034 : *
1035 : * Don't put anything cute here --- intelligence should be in
1036 : * pqConnectOptions2 ...
1037 : *
1038 : * Returns true on success. On failure, returns false and sets error message of
1039 : * dstConn.
1040 : */
1041 : bool
1042 7 : pqCopyPGconn(PGconn *srcConn, PGconn *dstConn)
1043 : {
1044 : const internalPQconninfoOption *option;
1045 :
1046 : /* copy over connection options */
1047 371 : for (option = PQconninfoOptions; option->keyword; option++)
1048 : {
1049 364 : if (option->connofs >= 0)
1050 : {
1051 364 : const char **tmp = (const char **) ((char *) srcConn + option->connofs);
1052 :
1053 364 : if (*tmp)
1054 : {
1055 141 : char **dstConnmember = (char **) ((char *) dstConn + option->connofs);
1056 :
1057 141 : if (*dstConnmember)
1058 0 : free(*dstConnmember);
1059 141 : *dstConnmember = strdup(*tmp);
1060 141 : if (*dstConnmember == NULL)
1061 : {
1062 0 : libpq_append_conn_error(dstConn, "out of memory");
1063 0 : return false;
1064 : }
1065 : }
1066 : }
1067 : }
1068 7 : return true;
1069 : }
1070 :
1071 : /*
1072 : * connectOptions1
1073 : *
1074 : * Internal subroutine to set up connection parameters given an already-
1075 : * created PGconn and a conninfo string. Derived settings should be
1076 : * processed by calling pqConnectOptions2 next. (We split them because
1077 : * PQsetdbLogin overrides defaults in between.)
1078 : *
1079 : * Returns true if OK, false if trouble (in which case errorMessage is set
1080 : * and so is conn->status).
1081 : */
1082 : static bool
1083 1295 : connectOptions1(PGconn *conn, const char *conninfo)
1084 : {
1085 : PQconninfoOption *connOptions;
1086 :
1087 : /*
1088 : * Parse the conninfo string
1089 : */
1090 1295 : connOptions = parse_connection_string(conninfo, &conn->errorMessage, true);
1091 1295 : if (connOptions == NULL)
1092 : {
1093 2 : conn->status = CONNECTION_BAD;
1094 : /* errorMessage is already set */
1095 2 : return false;
1096 : }
1097 :
1098 : /*
1099 : * Move option values into conn structure
1100 : */
1101 1293 : if (!fillPGconn(conn, connOptions))
1102 : {
1103 0 : conn->status = CONNECTION_BAD;
1104 0 : PQconninfoFree(connOptions);
1105 0 : return false;
1106 : }
1107 :
1108 : /*
1109 : * Free the option info - all is in conn now
1110 : */
1111 1293 : PQconninfoFree(connOptions);
1112 :
1113 1293 : return true;
1114 : }
1115 :
1116 : /*
1117 : * Count the number of elements in a simple comma-separated list.
1118 : */
1119 : static int
1120 15530 : count_comma_separated_elems(const char *input)
1121 : {
1122 : int n;
1123 :
1124 15530 : n = 1;
1125 263429 : for (; *input != '\0'; input++)
1126 : {
1127 247899 : if (*input == ',')
1128 133 : n++;
1129 : }
1130 :
1131 15530 : return n;
1132 : }
1133 :
1134 : /*
1135 : * Parse a simple comma-separated list.
1136 : *
1137 : * On each call, returns a malloc'd copy of the next element, and sets *more
1138 : * to indicate whether there are any more elements in the list after this,
1139 : * and updates *startptr to point to the next element, if any.
1140 : *
1141 : * On out of memory, returns NULL.
1142 : */
1143 : static char *
1144 31633 : parse_comma_separated_list(char **startptr, bool *more)
1145 : {
1146 : char *p;
1147 31633 : char *s = *startptr;
1148 : char *e;
1149 : size_t len;
1150 :
1151 : /*
1152 : * Search for the end of the current element; a comma or end-of-string
1153 : * acts as a terminator.
1154 : */
1155 31633 : e = s;
1156 363231 : while (*e != '\0' && *e != ',')
1157 331598 : ++e;
1158 31633 : *more = (*e == ',');
1159 :
1160 31633 : len = e - s;
1161 31633 : p = (char *) malloc(sizeof(char) * (len + 1));
1162 31633 : if (p)
1163 : {
1164 31633 : memcpy(p, s, len);
1165 31633 : p[len] = '\0';
1166 : }
1167 31633 : *startptr = e + 1;
1168 :
1169 31633 : return p;
1170 : }
1171 :
1172 : /*
1173 : * Initializes the prng_state field of the connection. We want something
1174 : * unpredictable, so if possible, use high-quality random bits for the
1175 : * seed. Otherwise, fall back to a seed based on the connection address,
1176 : * timestamp and PID.
1177 : */
1178 : static void
1179 55 : libpq_prng_init(PGconn *conn)
1180 : {
1181 : uint64 rseed;
1182 55 : struct timeval tval = {0};
1183 :
1184 55 : if (pg_prng_strong_seed(&conn->prng_state))
1185 55 : return;
1186 :
1187 0 : gettimeofday(&tval, NULL);
1188 :
1189 0 : rseed = ((uintptr_t) conn) ^
1190 0 : ((uint64) getpid()) ^
1191 0 : ((uint64) tval.tv_usec) ^
1192 0 : ((uint64) tval.tv_sec);
1193 :
1194 0 : pg_prng_seed(&conn->prng_state, rseed);
1195 : }
1196 :
1197 : /*
1198 : * Fills the connection's allowed_sasl_mechs list with all supported SASL
1199 : * mechanisms.
1200 : */
1201 : static inline void
1202 20 : fill_allowed_sasl_mechs(PGconn *conn)
1203 : {
1204 : /*---
1205 : * We only support two mechanisms at the moment, so rather than deal with a
1206 : * linked list, conn->allowed_sasl_mechs is an array of static length. We
1207 : * rely on the compile-time assertion here to keep us honest.
1208 : *
1209 : * To add a new mechanism to require_auth,
1210 : * - add it to supported_sasl_mechs,
1211 : * - update the length of conn->allowed_sasl_mechs,
1212 : * - handle the new mechanism name in the require_auth portion of
1213 : * pqConnectOptions2(), below.
1214 : */
1215 : StaticAssertDecl(lengthof(conn->allowed_sasl_mechs) == SASL_MECHANISM_COUNT,
1216 : "conn->allowed_sasl_mechs[] is not sufficiently large for holding all supported SASL mechanisms");
1217 :
1218 60 : for (int i = 0; i < SASL_MECHANISM_COUNT; i++)
1219 40 : conn->allowed_sasl_mechs[i] = supported_sasl_mechs[i];
1220 20 : }
1221 :
1222 : /*
1223 : * Clears the connection's allowed_sasl_mechs list.
1224 : */
1225 : static inline void
1226 61 : clear_allowed_sasl_mechs(PGconn *conn)
1227 : {
1228 183 : for (int i = 0; i < lengthof(conn->allowed_sasl_mechs); i++)
1229 122 : conn->allowed_sasl_mechs[i] = NULL;
1230 61 : }
1231 :
1232 : /*
1233 : * Helper routine that searches the static allowed_sasl_mechs list for a
1234 : * specific mechanism.
1235 : */
1236 : static inline int
1237 54 : index_of_allowed_sasl_mech(PGconn *conn, const pg_fe_sasl_mech *mech)
1238 : {
1239 100 : for (int i = 0; i < lengthof(conn->allowed_sasl_mechs); i++)
1240 : {
1241 77 : if (conn->allowed_sasl_mechs[i] == mech)
1242 31 : return i;
1243 : }
1244 :
1245 23 : return -1;
1246 : }
1247 :
1248 : /*
1249 : * pqConnectOptions2
1250 : *
1251 : * Compute derived connection options after absorbing all user-supplied info.
1252 : *
1253 : * Returns true if OK, false if trouble (in which case errorMessage is set
1254 : * and so is conn->status).
1255 : */
1256 : bool
1257 15530 : pqConnectOptions2(PGconn *conn)
1258 : {
1259 : int i;
1260 :
1261 : /*
1262 : * Allocate memory for details about each host to which we might possibly
1263 : * try to connect. For that, count the number of elements in the hostaddr
1264 : * or host options. If neither is given, assume one host.
1265 : */
1266 15530 : conn->whichhost = 0;
1267 15530 : if (conn->pghostaddr && conn->pghostaddr[0] != '\0')
1268 218 : conn->nconnhost = count_comma_separated_elems(conn->pghostaddr);
1269 15312 : else if (conn->pghost && conn->pghost[0] != '\0')
1270 15312 : conn->nconnhost = count_comma_separated_elems(conn->pghost);
1271 : else
1272 0 : conn->nconnhost = 1;
1273 15530 : conn->connhost = (pg_conn_host *)
1274 15530 : calloc(conn->nconnhost, sizeof(pg_conn_host));
1275 15530 : if (conn->connhost == NULL)
1276 0 : goto oom_error;
1277 :
1278 : /*
1279 : * We now have one pg_conn_host structure per possible host. Fill in the
1280 : * host and hostaddr fields for each, by splitting the parameter strings.
1281 : */
1282 15530 : if (conn->pghostaddr != NULL && conn->pghostaddr[0] != '\0')
1283 : {
1284 218 : char *s = conn->pghostaddr;
1285 218 : bool more = true;
1286 :
1287 436 : for (i = 0; i < conn->nconnhost && more; i++)
1288 : {
1289 218 : conn->connhost[i].hostaddr = parse_comma_separated_list(&s, &more);
1290 218 : if (conn->connhost[i].hostaddr == NULL)
1291 0 : goto oom_error;
1292 : }
1293 :
1294 : /*
1295 : * If hostaddr was given, the array was allocated according to the
1296 : * number of elements in the hostaddr list, so it really should be the
1297 : * right size.
1298 : */
1299 : Assert(!more);
1300 : Assert(i == conn->nconnhost);
1301 : }
1302 :
1303 15530 : if (conn->pghost != NULL && conn->pghost[0] != '\0')
1304 : {
1305 15530 : char *s = conn->pghost;
1306 15530 : bool more = true;
1307 :
1308 31193 : for (i = 0; i < conn->nconnhost && more; i++)
1309 : {
1310 15663 : conn->connhost[i].host = parse_comma_separated_list(&s, &more);
1311 15663 : if (conn->connhost[i].host == NULL)
1312 0 : goto oom_error;
1313 : }
1314 :
1315 : /* Check for wrong number of host items. */
1316 15530 : if (more || i != conn->nconnhost)
1317 : {
1318 0 : conn->status = CONNECTION_BAD;
1319 0 : libpq_append_conn_error(conn, "could not match %d host names to %d hostaddr values",
1320 0 : count_comma_separated_elems(conn->pghost), conn->nconnhost);
1321 0 : return false;
1322 : }
1323 : }
1324 :
1325 : /*
1326 : * Now, for each host slot, identify the type of address spec, and fill in
1327 : * the default address if nothing was given.
1328 : */
1329 31193 : for (i = 0; i < conn->nconnhost; i++)
1330 : {
1331 15663 : pg_conn_host *ch = &conn->connhost[i];
1332 :
1333 15663 : if (ch->hostaddr != NULL && ch->hostaddr[0] != '\0')
1334 218 : ch->type = CHT_HOST_ADDRESS;
1335 15445 : else if (ch->host != NULL && ch->host[0] != '\0')
1336 : {
1337 15445 : ch->type = CHT_HOST_NAME;
1338 30743 : if (is_unixsock_path(ch->host))
1339 15298 : ch->type = CHT_UNIX_SOCKET;
1340 : }
1341 : else
1342 : {
1343 0 : free(ch->host);
1344 :
1345 : /*
1346 : * This bit selects the default host location. If you change
1347 : * this, see also pg_regress.
1348 : */
1349 0 : if (DEFAULT_PGSOCKET_DIR[0])
1350 : {
1351 0 : ch->host = strdup(DEFAULT_PGSOCKET_DIR);
1352 0 : ch->type = CHT_UNIX_SOCKET;
1353 : }
1354 : else
1355 : {
1356 0 : ch->host = strdup(DefaultHost);
1357 0 : ch->type = CHT_HOST_NAME;
1358 : }
1359 0 : if (ch->host == NULL)
1360 0 : goto oom_error;
1361 : }
1362 : }
1363 :
1364 : /*
1365 : * Next, work out the port number corresponding to each host name.
1366 : *
1367 : * Note: unlike the above for host names, this could leave the port fields
1368 : * as null or empty strings. We will substitute DEF_PGPORT whenever we
1369 : * read such a port field.
1370 : */
1371 15530 : if (conn->pgport != NULL && conn->pgport[0] != '\0')
1372 : {
1373 15530 : char *s = conn->pgport;
1374 15530 : bool more = true;
1375 :
1376 31193 : for (i = 0; i < conn->nconnhost && more; i++)
1377 : {
1378 15663 : conn->connhost[i].port = parse_comma_separated_list(&s, &more);
1379 15663 : if (conn->connhost[i].port == NULL)
1380 0 : goto oom_error;
1381 : }
1382 :
1383 : /*
1384 : * If exactly one port was given, use it for every host. Otherwise,
1385 : * there must be exactly as many ports as there were hosts.
1386 : */
1387 15530 : if (i == 1 && !more)
1388 : {
1389 15455 : for (i = 1; i < conn->nconnhost; i++)
1390 : {
1391 0 : conn->connhost[i].port = strdup(conn->connhost[0].port);
1392 0 : if (conn->connhost[i].port == NULL)
1393 0 : goto oom_error;
1394 : }
1395 : }
1396 75 : else if (more || i != conn->nconnhost)
1397 : {
1398 0 : conn->status = CONNECTION_BAD;
1399 0 : libpq_append_conn_error(conn, "could not match %d port numbers to %d hosts",
1400 0 : count_comma_separated_elems(conn->pgport), conn->nconnhost);
1401 0 : return false;
1402 : }
1403 : }
1404 :
1405 : /*
1406 : * If user name was not given, fetch it. (Most likely, the fetch will
1407 : * fail, since the only way we get here is if pg_fe_getauthname() failed
1408 : * during conninfo_add_defaults(). But now we want an error message.)
1409 : */
1410 15530 : if (conn->pguser == NULL || conn->pguser[0] == '\0')
1411 : {
1412 0 : free(conn->pguser);
1413 0 : conn->pguser = pg_fe_getauthname(&conn->errorMessage);
1414 0 : if (!conn->pguser)
1415 : {
1416 0 : conn->status = CONNECTION_BAD;
1417 0 : return false;
1418 : }
1419 : }
1420 :
1421 : /*
1422 : * If database name was not given, default it to equal user name
1423 : */
1424 15530 : if (conn->dbName == NULL || conn->dbName[0] == '\0')
1425 : {
1426 6 : free(conn->dbName);
1427 6 : conn->dbName = strdup(conn->pguser);
1428 6 : if (!conn->dbName)
1429 0 : goto oom_error;
1430 : }
1431 :
1432 : /*
1433 : * If password was not given, try to look it up in password file. Note
1434 : * that the result might be different for each host/port pair.
1435 : */
1436 15530 : if (conn->pgpass == NULL || conn->pgpass[0] == '\0')
1437 : {
1438 : /* If password file wasn't specified, use ~/PGPASSFILE */
1439 15294 : if (conn->pgpassfile == NULL || conn->pgpassfile[0] == '\0')
1440 : {
1441 : char homedir[MAXPGPATH];
1442 :
1443 15046 : if (pqGetHomeDirectory(homedir, sizeof(homedir)))
1444 : {
1445 15046 : free(conn->pgpassfile);
1446 15046 : conn->pgpassfile = malloc(MAXPGPATH);
1447 15046 : if (!conn->pgpassfile)
1448 0 : goto oom_error;
1449 15046 : snprintf(conn->pgpassfile, MAXPGPATH, "%s/%s",
1450 : homedir, PGPASSFILE);
1451 : }
1452 : }
1453 :
1454 15294 : if (conn->pgpassfile != NULL && conn->pgpassfile[0] != '\0')
1455 : {
1456 30721 : for (i = 0; i < conn->nconnhost; i++)
1457 : {
1458 : /*
1459 : * Try to get a password for this host from file. We use host
1460 : * for the hostname search key if given, else hostaddr (at
1461 : * least one of them is guaranteed nonempty by now).
1462 : */
1463 15427 : const char *pwhost = conn->connhost[i].host;
1464 15427 : const char *password_errmsg = NULL;
1465 :
1466 15427 : if (pwhost == NULL || pwhost[0] == '\0')
1467 0 : pwhost = conn->connhost[i].hostaddr;
1468 :
1469 30854 : conn->connhost[i].password =
1470 15427 : passwordFromFile(pwhost,
1471 15427 : conn->connhost[i].port,
1472 15427 : conn->dbName,
1473 15427 : conn->pguser,
1474 15427 : conn->pgpassfile,
1475 : &password_errmsg);
1476 :
1477 15427 : if (password_errmsg != NULL)
1478 : {
1479 0 : conn->status = CONNECTION_BAD;
1480 0 : libpq_append_conn_error(conn, "%s", password_errmsg);
1481 0 : return false;
1482 : }
1483 : }
1484 : }
1485 : }
1486 :
1487 : /*
1488 : * parse and validate require_auth option
1489 : */
1490 15530 : if (conn->require_auth && conn->require_auth[0])
1491 : {
1492 61 : char *s = conn->require_auth;
1493 : bool first,
1494 : more;
1495 61 : bool negated = false;
1496 :
1497 : /*
1498 : * By default, start from an empty set of allowed methods and
1499 : * mechanisms, and add to it.
1500 : */
1501 61 : conn->auth_required = true;
1502 61 : conn->allowed_auth_methods = 0;
1503 61 : clear_allowed_sasl_mechs(conn);
1504 :
1505 141 : for (first = true, more = true; more; first = false)
1506 68 : {
1507 : char *method,
1508 : *part;
1509 89 : uint32 bits = 0;
1510 89 : const pg_fe_sasl_mech *mech = NULL;
1511 :
1512 89 : part = parse_comma_separated_list(&s, &more);
1513 89 : if (part == NULL)
1514 0 : goto oom_error;
1515 :
1516 : /*
1517 : * Check for negation, e.g. '!password'. If one element is
1518 : * negated, they all have to be.
1519 : */
1520 89 : method = part;
1521 89 : if (*method == '!')
1522 : {
1523 34 : if (first)
1524 : {
1525 : /*
1526 : * Switch to a permissive set of allowed methods and
1527 : * mechanisms, and subtract from it.
1528 : */
1529 20 : conn->auth_required = false;
1530 20 : conn->allowed_auth_methods = -1;
1531 20 : fill_allowed_sasl_mechs(conn);
1532 : }
1533 14 : else if (!negated)
1534 : {
1535 1 : conn->status = CONNECTION_BAD;
1536 1 : libpq_append_conn_error(conn, "negative require_auth method \"%s\" cannot be mixed with non-negative methods",
1537 : method);
1538 :
1539 1 : free(part);
1540 9 : return false;
1541 : }
1542 :
1543 33 : negated = true;
1544 33 : method++;
1545 : }
1546 55 : else if (negated)
1547 : {
1548 1 : conn->status = CONNECTION_BAD;
1549 1 : libpq_append_conn_error(conn, "require_auth method \"%s\" cannot be mixed with negative methods",
1550 : method);
1551 :
1552 1 : free(part);
1553 1 : return false;
1554 : }
1555 :
1556 : /*
1557 : * First group: methods that can be handled solely with the
1558 : * authentication request codes.
1559 : */
1560 87 : if (strcmp(method, "password") == 0)
1561 : {
1562 20 : bits = (1 << AUTH_REQ_PASSWORD);
1563 : }
1564 67 : else if (strcmp(method, "md5") == 0)
1565 : {
1566 16 : bits = (1 << AUTH_REQ_MD5);
1567 : }
1568 51 : else if (strcmp(method, "gss") == 0)
1569 : {
1570 2 : bits = (1 << AUTH_REQ_GSS);
1571 2 : bits |= (1 << AUTH_REQ_GSS_CONT);
1572 : }
1573 49 : else if (strcmp(method, "sspi") == 0)
1574 : {
1575 2 : bits = (1 << AUTH_REQ_SSPI);
1576 2 : bits |= (1 << AUTH_REQ_GSS_CONT);
1577 : }
1578 :
1579 : /*
1580 : * Next group: SASL mechanisms. All of these use the same request
1581 : * codes, so the list of allowed mechanisms is tracked separately.
1582 : *
1583 : * supported_sasl_mechs must contain all mechanisms handled here.
1584 : */
1585 47 : else if (strcmp(method, "scram-sha-256") == 0)
1586 : {
1587 32 : mech = &pg_scram_mech;
1588 : }
1589 15 : else if (strcmp(method, "oauth") == 0)
1590 : {
1591 0 : mech = &pg_oauth_mech;
1592 : }
1593 :
1594 : /*
1595 : * Final group: meta-options.
1596 : */
1597 15 : else if (strcmp(method, "none") == 0)
1598 : {
1599 : /*
1600 : * Special case: let the user explicitly allow (or disallow)
1601 : * connections where the server does not send an explicit
1602 : * authentication challenge, such as "trust" and "cert" auth.
1603 : */
1604 14 : if (negated) /* "!none" */
1605 : {
1606 7 : if (conn->auth_required)
1607 1 : goto duplicate;
1608 :
1609 6 : conn->auth_required = true;
1610 : }
1611 : else /* "none" */
1612 : {
1613 7 : if (!conn->auth_required)
1614 1 : goto duplicate;
1615 :
1616 6 : conn->auth_required = false;
1617 : }
1618 :
1619 12 : free(part);
1620 12 : continue; /* avoid the bitmask manipulation below */
1621 : }
1622 : else
1623 : {
1624 1 : conn->status = CONNECTION_BAD;
1625 1 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
1626 : "require_auth", method);
1627 :
1628 1 : free(part);
1629 1 : return false;
1630 : }
1631 :
1632 72 : if (mech)
1633 : {
1634 : /*
1635 : * Update the mechanism set only. The method bitmask will be
1636 : * updated for SASL further down.
1637 : */
1638 : Assert(!bits);
1639 :
1640 32 : if (negated)
1641 : {
1642 : /* Remove the existing mechanism from the list. */
1643 9 : i = index_of_allowed_sasl_mech(conn, mech);
1644 9 : if (i < 0)
1645 1 : goto duplicate;
1646 :
1647 8 : conn->allowed_sasl_mechs[i] = NULL;
1648 : }
1649 : else
1650 : {
1651 : /*
1652 : * Find a space to put the new mechanism (after making
1653 : * sure it's not already there).
1654 : */
1655 23 : i = index_of_allowed_sasl_mech(conn, mech);
1656 23 : if (i >= 0)
1657 1 : goto duplicate;
1658 :
1659 22 : i = index_of_allowed_sasl_mech(conn, NULL);
1660 22 : if (i < 0)
1661 : {
1662 : /* Should not happen; the pointer list is corrupted. */
1663 : Assert(false);
1664 :
1665 0 : conn->status = CONNECTION_BAD;
1666 0 : libpq_append_conn_error(conn,
1667 : "internal error: no space in allowed_sasl_mechs");
1668 0 : free(part);
1669 0 : return false;
1670 : }
1671 :
1672 22 : conn->allowed_sasl_mechs[i] = mech;
1673 : }
1674 : }
1675 : else
1676 : {
1677 : /* Update the method bitmask. */
1678 : Assert(bits);
1679 :
1680 40 : if (negated)
1681 : {
1682 17 : if ((conn->allowed_auth_methods & bits) == 0)
1683 1 : goto duplicate;
1684 :
1685 16 : conn->allowed_auth_methods &= ~bits;
1686 : }
1687 : else
1688 : {
1689 23 : if ((conn->allowed_auth_methods & bits) == bits)
1690 1 : goto duplicate;
1691 :
1692 22 : conn->allowed_auth_methods |= bits;
1693 : }
1694 : }
1695 :
1696 68 : free(part);
1697 68 : continue;
1698 :
1699 6 : duplicate:
1700 :
1701 : /*
1702 : * A duplicated method probably indicates a typo in a setting
1703 : * where typos are extremely risky.
1704 : */
1705 6 : conn->status = CONNECTION_BAD;
1706 6 : libpq_append_conn_error(conn, "require_auth method \"%s\" is specified more than once",
1707 : part);
1708 :
1709 6 : free(part);
1710 6 : return false;
1711 : }
1712 :
1713 : /*
1714 : * Finally, allow SASL authentication requests if (and only if) we've
1715 : * allowed any mechanisms.
1716 : */
1717 : {
1718 52 : bool allowed = false;
1719 52 : const uint32 sasl_bits =
1720 : (1 << AUTH_REQ_SASL)
1721 : | (1 << AUTH_REQ_SASL_CONT)
1722 : | (1 << AUTH_REQ_SASL_FIN);
1723 :
1724 91 : for (i = 0; i < lengthof(conn->allowed_sasl_mechs); i++)
1725 : {
1726 75 : if (conn->allowed_sasl_mechs[i])
1727 : {
1728 36 : allowed = true;
1729 36 : break;
1730 : }
1731 : }
1732 :
1733 : /*
1734 : * For the standard case, add the SASL bits to the (default-empty)
1735 : * set if needed. For the negated case, remove them.
1736 : */
1737 52 : if (!negated && allowed)
1738 20 : conn->allowed_auth_methods |= sasl_bits;
1739 32 : else if (negated && !allowed)
1740 0 : conn->allowed_auth_methods &= ~sasl_bits;
1741 : }
1742 : }
1743 :
1744 : /*
1745 : * validate channel_binding option
1746 : */
1747 15521 : if (conn->channel_binding)
1748 : {
1749 15521 : if (strcmp(conn->channel_binding, "disable") != 0
1750 15519 : && strcmp(conn->channel_binding, "prefer") != 0
1751 9 : && strcmp(conn->channel_binding, "require") != 0)
1752 : {
1753 1 : conn->status = CONNECTION_BAD;
1754 1 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
1755 : "channel_binding", conn->channel_binding);
1756 1 : return false;
1757 : }
1758 : }
1759 : else
1760 : {
1761 0 : conn->channel_binding = strdup(DefaultChannelBinding);
1762 0 : if (!conn->channel_binding)
1763 0 : goto oom_error;
1764 : }
1765 :
1766 : #ifndef USE_SSL
1767 :
1768 : /*
1769 : * sslrootcert=system is not supported. Since setting this changes the
1770 : * default sslmode, check this _before_ we validate sslmode, to avoid
1771 : * confusing the user with errors for an option they may not have set.
1772 : */
1773 : if (conn->sslrootcert
1774 : && strcmp(conn->sslrootcert, "system") == 0)
1775 : {
1776 : conn->status = CONNECTION_BAD;
1777 : libpq_append_conn_error(conn, "%s value \"%s\" invalid when SSL support is not compiled in",
1778 : "sslrootcert", conn->sslrootcert);
1779 : return false;
1780 : }
1781 : #endif
1782 :
1783 : /*
1784 : * validate sslmode option
1785 : */
1786 15520 : if (conn->sslmode)
1787 : {
1788 15520 : if (strcmp(conn->sslmode, "disable") != 0
1789 15507 : && strcmp(conn->sslmode, "allow") != 0
1790 15495 : && strcmp(conn->sslmode, "prefer") != 0
1791 172 : && strcmp(conn->sslmode, "require") != 0
1792 68 : && strcmp(conn->sslmode, "verify-ca") != 0
1793 39 : && strcmp(conn->sslmode, "verify-full") != 0)
1794 : {
1795 0 : conn->status = CONNECTION_BAD;
1796 0 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
1797 : "sslmode", conn->sslmode);
1798 0 : return false;
1799 : }
1800 :
1801 : #ifndef USE_SSL
1802 : switch (conn->sslmode[0])
1803 : {
1804 : case 'a': /* "allow" */
1805 : case 'p': /* "prefer" */
1806 :
1807 : /*
1808 : * warn user that an SSL connection will never be negotiated
1809 : * since SSL was not compiled in?
1810 : */
1811 : break;
1812 :
1813 : case 'r': /* "require" */
1814 : case 'v': /* "verify-ca" or "verify-full" */
1815 : conn->status = CONNECTION_BAD;
1816 : libpq_append_conn_error(conn, "%s value \"%s\" invalid when SSL support is not compiled in",
1817 : "sslmode", conn->sslmode);
1818 : return false;
1819 : }
1820 : #endif
1821 : }
1822 : else
1823 : {
1824 0 : conn->sslmode = strdup(DefaultSSLMode);
1825 0 : if (!conn->sslmode)
1826 0 : goto oom_error;
1827 : }
1828 :
1829 : /*
1830 : * validate sslnegotiation option, default is "postgres" for the postgres
1831 : * style negotiated connection with an extra round trip but more options.
1832 : */
1833 15520 : if (conn->sslnegotiation)
1834 : {
1835 15520 : if (strcmp(conn->sslnegotiation, "postgres") != 0
1836 24 : && strcmp(conn->sslnegotiation, "direct") != 0)
1837 : {
1838 0 : conn->status = CONNECTION_BAD;
1839 0 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
1840 : "sslnegotiation", conn->sslnegotiation);
1841 0 : return false;
1842 : }
1843 :
1844 : #ifndef USE_SSL
1845 : if (conn->sslnegotiation[0] != 'p')
1846 : {
1847 : conn->status = CONNECTION_BAD;
1848 : libpq_append_conn_error(conn, "%s value \"%s\" invalid when SSL support is not compiled in",
1849 : "sslnegotiation", conn->sslnegotiation);
1850 : return false;
1851 : }
1852 : #endif
1853 :
1854 : /*
1855 : * Don't allow direct SSL negotiation with sslmode='prefer', because
1856 : * that poses a risk of unintentional fallback to plaintext connection
1857 : * when connecting to a pre-v17 server that does not support direct
1858 : * SSL connections. To keep things simple, don't allow it with
1859 : * sslmode='allow' or sslmode='disable' either. If a user goes through
1860 : * the trouble of setting sslnegotiation='direct', they probably
1861 : * intend to use SSL, and sslmode=disable or allow is probably a user
1862 : * mistake anyway.
1863 : */
1864 15520 : if (conn->sslnegotiation[0] == 'd' &&
1865 24 : conn->sslmode[0] != 'r' && conn->sslmode[0] != 'v')
1866 : {
1867 18 : conn->status = CONNECTION_BAD;
1868 18 : libpq_append_conn_error(conn, "weak sslmode \"%s\" may not be used with sslnegotiation=direct (use \"require\", \"verify-ca\", or \"verify-full\")",
1869 : conn->sslmode);
1870 18 : return false;
1871 : }
1872 : }
1873 : else
1874 : {
1875 0 : conn->sslnegotiation = strdup(DefaultSSLNegotiation);
1876 0 : if (!conn->sslnegotiation)
1877 0 : goto oom_error;
1878 : }
1879 :
1880 : #ifdef USE_SSL
1881 :
1882 : /*
1883 : * If sslrootcert=system, make sure our chosen sslmode is compatible.
1884 : */
1885 15502 : if (conn->sslrootcert
1886 155 : && strcmp(conn->sslrootcert, "system") == 0
1887 4 : && strcmp(conn->sslmode, "verify-full") != 0)
1888 : {
1889 1 : conn->status = CONNECTION_BAD;
1890 1 : libpq_append_conn_error(conn, "weak sslmode \"%s\" may not be used with sslrootcert=system (use \"verify-full\")",
1891 : conn->sslmode);
1892 1 : return false;
1893 : }
1894 : #endif
1895 :
1896 : /*
1897 : * Validate TLS protocol versions for ssl_min_protocol_version and
1898 : * ssl_max_protocol_version.
1899 : */
1900 15501 : if (!sslVerifyProtocolVersion(conn->ssl_min_protocol_version))
1901 : {
1902 1 : conn->status = CONNECTION_BAD;
1903 1 : libpq_append_conn_error(conn, "invalid \"%s\" value: \"%s\"",
1904 : "ssl_min_protocol_version",
1905 : conn->ssl_min_protocol_version);
1906 1 : return false;
1907 : }
1908 15500 : if (!sslVerifyProtocolVersion(conn->ssl_max_protocol_version))
1909 : {
1910 1 : conn->status = CONNECTION_BAD;
1911 1 : libpq_append_conn_error(conn, "invalid \"%s\" value: \"%s\"",
1912 : "ssl_max_protocol_version",
1913 : conn->ssl_max_protocol_version);
1914 1 : return false;
1915 : }
1916 :
1917 : /*
1918 : * Check if the range of SSL protocols defined is correct. This is done
1919 : * at this early step because this is independent of the SSL
1920 : * implementation used, and this avoids unnecessary cycles with an
1921 : * already-built SSL context when the connection is being established, as
1922 : * it would be doomed anyway.
1923 : */
1924 15499 : if (!sslVerifyProtocolRange(conn->ssl_min_protocol_version,
1925 15499 : conn->ssl_max_protocol_version))
1926 : {
1927 1 : conn->status = CONNECTION_BAD;
1928 1 : libpq_append_conn_error(conn, "invalid SSL protocol version range");
1929 1 : return false;
1930 : }
1931 :
1932 : /*
1933 : * validate sslcertmode option
1934 : */
1935 15498 : if (conn->sslcertmode)
1936 : {
1937 261 : if (strcmp(conn->sslcertmode, "disable") != 0 &&
1938 254 : strcmp(conn->sslcertmode, "allow") != 0 &&
1939 10 : strcmp(conn->sslcertmode, "require") != 0)
1940 : {
1941 0 : conn->status = CONNECTION_BAD;
1942 0 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
1943 : "sslcertmode", conn->sslcertmode);
1944 0 : return false;
1945 : }
1946 : #ifndef USE_SSL
1947 : if (strcmp(conn->sslcertmode, "require") == 0)
1948 : {
1949 : conn->status = CONNECTION_BAD;
1950 : libpq_append_conn_error(conn, "%s value \"%s\" invalid when SSL support is not compiled in",
1951 : "sslcertmode", conn->sslcertmode);
1952 : return false;
1953 : }
1954 : #endif
1955 : #ifndef HAVE_SSL_CTX_SET_CERT_CB
1956 :
1957 : /*
1958 : * Without a certificate callback, the current implementation can't
1959 : * figure out if a certificate was actually requested, so "require" is
1960 : * useless.
1961 : */
1962 : if (strcmp(conn->sslcertmode, "require") == 0)
1963 : {
1964 : conn->status = CONNECTION_BAD;
1965 : libpq_append_conn_error(conn, "%s value \"%s\" is not supported (check OpenSSL version)",
1966 : "sslcertmode", conn->sslcertmode);
1967 : return false;
1968 : }
1969 : #endif
1970 : }
1971 : else
1972 : {
1973 15237 : conn->sslcertmode = strdup(DefaultSSLCertMode);
1974 15237 : if (!conn->sslcertmode)
1975 0 : goto oom_error;
1976 : }
1977 :
1978 : /*
1979 : * validate gssencmode option
1980 : */
1981 15498 : if (conn->gssencmode)
1982 : {
1983 15498 : if (strcmp(conn->gssencmode, "disable") != 0 &&
1984 12 : strcmp(conn->gssencmode, "prefer") != 0 &&
1985 6 : strcmp(conn->gssencmode, "require") != 0)
1986 : {
1987 0 : conn->status = CONNECTION_BAD;
1988 0 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"", "gssencmode", conn->gssencmode);
1989 0 : return false;
1990 : }
1991 : #ifndef ENABLE_GSS
1992 15498 : if (strcmp(conn->gssencmode, "require") == 0)
1993 : {
1994 6 : conn->status = CONNECTION_BAD;
1995 6 : libpq_append_conn_error(conn, "gssencmode value \"%s\" invalid when GSSAPI support is not compiled in",
1996 : conn->gssencmode);
1997 6 : return false;
1998 : }
1999 : #endif
2000 : }
2001 : else
2002 : {
2003 0 : conn->gssencmode = strdup(DefaultGSSMode);
2004 0 : if (!conn->gssencmode)
2005 0 : goto oom_error;
2006 : }
2007 :
2008 : /*
2009 : * validate target_session_attrs option, and set target_server_type
2010 : */
2011 15492 : if (conn->target_session_attrs)
2012 : {
2013 15492 : if (strcmp(conn->target_session_attrs, "any") == 0)
2014 15477 : conn->target_server_type = SERVER_TYPE_ANY;
2015 15 : else if (strcmp(conn->target_session_attrs, "read-write") == 0)
2016 3 : conn->target_server_type = SERVER_TYPE_READ_WRITE;
2017 12 : else if (strcmp(conn->target_session_attrs, "read-only") == 0)
2018 3 : conn->target_server_type = SERVER_TYPE_READ_ONLY;
2019 9 : else if (strcmp(conn->target_session_attrs, "primary") == 0)
2020 3 : conn->target_server_type = SERVER_TYPE_PRIMARY;
2021 6 : else if (strcmp(conn->target_session_attrs, "standby") == 0)
2022 3 : conn->target_server_type = SERVER_TYPE_STANDBY;
2023 3 : else if (strcmp(conn->target_session_attrs, "prefer-standby") == 0)
2024 3 : conn->target_server_type = SERVER_TYPE_PREFER_STANDBY;
2025 : else
2026 : {
2027 0 : conn->status = CONNECTION_BAD;
2028 0 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
2029 : "target_session_attrs",
2030 : conn->target_session_attrs);
2031 0 : return false;
2032 : }
2033 : }
2034 : else
2035 0 : conn->target_server_type = SERVER_TYPE_ANY;
2036 :
2037 15492 : if (conn->scram_client_key)
2038 : {
2039 : int len;
2040 :
2041 9 : len = pg_b64_dec_len(strlen(conn->scram_client_key));
2042 9 : conn->scram_client_key_binary = malloc(len);
2043 9 : if (!conn->scram_client_key_binary)
2044 0 : goto oom_error;
2045 9 : len = pg_b64_decode(conn->scram_client_key, strlen(conn->scram_client_key),
2046 : conn->scram_client_key_binary, len);
2047 9 : if (len < 0)
2048 : {
2049 0 : libpq_append_conn_error(conn, "invalid SCRAM client key");
2050 0 : return false;
2051 : }
2052 9 : if (len != SCRAM_MAX_KEY_LEN)
2053 : {
2054 0 : libpq_append_conn_error(conn, "invalid SCRAM client key length: %d", len);
2055 0 : return false;
2056 : }
2057 9 : conn->scram_client_key_len = len;
2058 : }
2059 :
2060 15492 : if (conn->scram_server_key)
2061 : {
2062 : int len;
2063 :
2064 9 : len = pg_b64_dec_len(strlen(conn->scram_server_key));
2065 9 : conn->scram_server_key_binary = malloc(len);
2066 9 : if (!conn->scram_server_key_binary)
2067 0 : goto oom_error;
2068 9 : len = pg_b64_decode(conn->scram_server_key, strlen(conn->scram_server_key),
2069 : conn->scram_server_key_binary, len);
2070 9 : if (len < 0)
2071 : {
2072 0 : libpq_append_conn_error(conn, "invalid SCRAM server key");
2073 0 : return false;
2074 : }
2075 9 : if (len != SCRAM_MAX_KEY_LEN)
2076 : {
2077 0 : libpq_append_conn_error(conn, "invalid SCRAM server key length: %d", len);
2078 0 : return false;
2079 : }
2080 9 : conn->scram_server_key_len = len;
2081 : }
2082 :
2083 : /*
2084 : * validate load_balance_hosts option, and set load_balance_type
2085 : */
2086 15492 : if (conn->load_balance_hosts)
2087 : {
2088 15492 : if (strcmp(conn->load_balance_hosts, "disable") == 0)
2089 15436 : conn->load_balance_type = LOAD_BALANCE_DISABLE;
2090 56 : else if (strcmp(conn->load_balance_hosts, "random") == 0)
2091 55 : conn->load_balance_type = LOAD_BALANCE_RANDOM;
2092 : else
2093 : {
2094 1 : conn->status = CONNECTION_BAD;
2095 1 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
2096 : "load_balance_hosts",
2097 : conn->load_balance_hosts);
2098 1 : return false;
2099 : }
2100 : }
2101 : else
2102 0 : conn->load_balance_type = LOAD_BALANCE_DISABLE;
2103 :
2104 15491 : if (conn->load_balance_type == LOAD_BALANCE_RANDOM)
2105 : {
2106 55 : libpq_prng_init(conn);
2107 :
2108 : /*
2109 : * This is the "inside-out" variant of the Fisher-Yates shuffle
2110 : * algorithm. Notionally, we append each new value to the array and
2111 : * then swap it with a randomly-chosen array element (possibly
2112 : * including itself, else we fail to generate permutations with the
2113 : * last integer last). The swap step can be optimized by combining it
2114 : * with the insertion.
2115 : */
2116 165 : for (i = 1; i < conn->nconnhost; i++)
2117 : {
2118 110 : int j = pg_prng_uint64_range(&conn->prng_state, 0, i);
2119 110 : pg_conn_host temp = conn->connhost[j];
2120 :
2121 110 : conn->connhost[j] = conn->connhost[i];
2122 110 : conn->connhost[i] = temp;
2123 : }
2124 : }
2125 :
2126 15491 : if (conn->min_protocol_version)
2127 : {
2128 0 : if (!pqParseProtocolVersion(conn->min_protocol_version, &conn->min_pversion, conn, "min_protocol_version"))
2129 : {
2130 0 : conn->status = CONNECTION_BAD;
2131 0 : return false;
2132 : }
2133 : }
2134 : else
2135 : {
2136 15491 : conn->min_pversion = PG_PROTOCOL_EARLIEST;
2137 : }
2138 :
2139 15491 : if (conn->max_protocol_version)
2140 : {
2141 24 : if (!pqParseProtocolVersion(conn->max_protocol_version, &conn->max_pversion, conn, "max_protocol_version"))
2142 : {
2143 1 : conn->status = CONNECTION_BAD;
2144 1 : return false;
2145 : }
2146 : }
2147 : else
2148 : {
2149 : /*
2150 : * Default to PG_PROTOCOL_GREASE, which is larger than all real
2151 : * versions, to test negotiation. The server should automatically
2152 : * downgrade to a supported version.
2153 : *
2154 : * This behavior is for 19beta only. It will be reverted before RC1.
2155 : */
2156 15467 : conn->max_pversion = PG_PROTOCOL_GREASE;
2157 : }
2158 :
2159 15490 : if (conn->min_pversion > conn->max_pversion)
2160 : {
2161 0 : conn->status = CONNECTION_BAD;
2162 0 : libpq_append_conn_error(conn, "\"%s\" is greater than \"%s\"", "min_protocol_version", "max_protocol_version");
2163 0 : return false;
2164 : }
2165 :
2166 : /*
2167 : * Resolve special "auto" client_encoding from the locale
2168 : */
2169 15490 : if (conn->client_encoding_initial &&
2170 961 : strcmp(conn->client_encoding_initial, "auto") == 0)
2171 : {
2172 3 : free(conn->client_encoding_initial);
2173 3 : conn->client_encoding_initial = strdup(pg_encoding_to_char(pg_get_encoding_from_locale(NULL, true)));
2174 3 : if (!conn->client_encoding_initial)
2175 0 : goto oom_error;
2176 : }
2177 :
2178 : /*
2179 : * Only if we get this far is it appropriate to try to connect. (We need a
2180 : * state flag, rather than just the boolean result of this function, in
2181 : * case someone tries to PQreset() the PGconn.)
2182 : */
2183 15490 : conn->options_valid = true;
2184 :
2185 15490 : return true;
2186 :
2187 0 : oom_error:
2188 0 : conn->status = CONNECTION_BAD;
2189 0 : libpq_append_conn_error(conn, "out of memory");
2190 0 : return false;
2191 : }
2192 :
2193 : /*
2194 : * PQconndefaults
2195 : *
2196 : * Construct a default connection options array, which identifies all the
2197 : * available options and shows any default values that are available from the
2198 : * environment etc. On error (eg out of memory), NULL is returned.
2199 : *
2200 : * Using this function, an application may determine all possible options
2201 : * and their current default values.
2202 : *
2203 : * NOTE: as of PostgreSQL 7.0, the returned array is dynamically allocated
2204 : * and should be freed when no longer needed via PQconninfoFree(). (In prior
2205 : * versions, the returned array was static, but that's not thread-safe.)
2206 : * Pre-7.0 applications that use this function will see a small memory leak
2207 : * until they are updated to call PQconninfoFree.
2208 : */
2209 : PQconninfoOption *
2210 124 : PQconndefaults(void)
2211 : {
2212 : PQExpBufferData errorBuf;
2213 : PQconninfoOption *connOptions;
2214 :
2215 : /* We don't actually report any errors here, but callees want a buffer */
2216 124 : initPQExpBuffer(&errorBuf);
2217 124 : if (PQExpBufferDataBroken(errorBuf))
2218 0 : return NULL; /* out of memory already :-( */
2219 :
2220 124 : connOptions = conninfo_init(&errorBuf);
2221 124 : if (connOptions != NULL)
2222 : {
2223 : /* pass NULL errorBuf to ignore errors */
2224 124 : if (!conninfo_add_defaults(connOptions, NULL))
2225 : {
2226 0 : PQconninfoFree(connOptions);
2227 0 : connOptions = NULL;
2228 : }
2229 : }
2230 :
2231 124 : termPQExpBuffer(&errorBuf);
2232 124 : return connOptions;
2233 : }
2234 :
2235 : /* ----------------
2236 : * PQsetdbLogin
2237 : *
2238 : * establishes a connection to a postgres backend through the postmaster
2239 : * at the specified host and port.
2240 : *
2241 : * returns a PGconn* which is needed for all subsequent libpq calls
2242 : *
2243 : * if the status field of the connection returned is CONNECTION_BAD,
2244 : * then only the errorMessage is likely to be useful.
2245 : * ----------------
2246 : */
2247 : PGconn *
2248 0 : PQsetdbLogin(const char *pghost, const char *pgport, const char *pgoptions,
2249 : const char *pgtty, const char *dbName, const char *login,
2250 : const char *pwd)
2251 : {
2252 : PGconn *conn;
2253 :
2254 : /*
2255 : * Allocate memory for the conn structure. Note that we also expect this
2256 : * to initialize conn->errorMessage to empty. All subsequent steps during
2257 : * connection initialization will only append to that buffer.
2258 : */
2259 0 : conn = pqMakeEmptyPGconn();
2260 0 : if (conn == NULL)
2261 0 : return NULL;
2262 :
2263 : /*
2264 : * If the dbName parameter contains what looks like a connection string,
2265 : * parse it into conn struct using connectOptions1.
2266 : */
2267 0 : if (dbName && recognized_connection_string(dbName))
2268 : {
2269 0 : if (!connectOptions1(conn, dbName))
2270 0 : return conn;
2271 : }
2272 : else
2273 : {
2274 : /*
2275 : * Old-style path: first, parse an empty conninfo string in order to
2276 : * set up the same defaults that PQconnectdb() would use.
2277 : */
2278 0 : if (!connectOptions1(conn, ""))
2279 0 : return conn;
2280 :
2281 : /* Insert dbName parameter value into struct */
2282 0 : if (dbName && dbName[0] != '\0')
2283 : {
2284 0 : free(conn->dbName);
2285 0 : conn->dbName = strdup(dbName);
2286 0 : if (!conn->dbName)
2287 0 : goto oom_error;
2288 : }
2289 : }
2290 :
2291 : /*
2292 : * Insert remaining parameters into struct, overriding defaults (as well
2293 : * as any conflicting data from dbName taken as a conninfo).
2294 : */
2295 0 : if (pghost && pghost[0] != '\0')
2296 : {
2297 0 : free(conn->pghost);
2298 0 : conn->pghost = strdup(pghost);
2299 0 : if (!conn->pghost)
2300 0 : goto oom_error;
2301 : }
2302 :
2303 0 : if (pgport && pgport[0] != '\0')
2304 : {
2305 0 : free(conn->pgport);
2306 0 : conn->pgport = strdup(pgport);
2307 0 : if (!conn->pgport)
2308 0 : goto oom_error;
2309 : }
2310 :
2311 0 : if (pgoptions && pgoptions[0] != '\0')
2312 : {
2313 0 : free(conn->pgoptions);
2314 0 : conn->pgoptions = strdup(pgoptions);
2315 0 : if (!conn->pgoptions)
2316 0 : goto oom_error;
2317 : }
2318 :
2319 0 : if (login && login[0] != '\0')
2320 : {
2321 0 : free(conn->pguser);
2322 0 : conn->pguser = strdup(login);
2323 0 : if (!conn->pguser)
2324 0 : goto oom_error;
2325 : }
2326 :
2327 0 : if (pwd && pwd[0] != '\0')
2328 : {
2329 0 : free(conn->pgpass);
2330 0 : conn->pgpass = strdup(pwd);
2331 0 : if (!conn->pgpass)
2332 0 : goto oom_error;
2333 : }
2334 :
2335 : /*
2336 : * Compute derived options
2337 : */
2338 0 : if (!pqConnectOptions2(conn))
2339 0 : return conn;
2340 :
2341 : /*
2342 : * Connect to the database
2343 : */
2344 0 : if (pqConnectDBStart(conn))
2345 0 : (void) pqConnectDBComplete(conn);
2346 :
2347 0 : return conn;
2348 :
2349 0 : oom_error:
2350 0 : conn->status = CONNECTION_BAD;
2351 0 : libpq_append_conn_error(conn, "out of memory");
2352 0 : return conn;
2353 : }
2354 :
2355 :
2356 : /* ----------
2357 : * connectNoDelay -
2358 : * Sets the TCP_NODELAY socket option.
2359 : * Returns 1 if successful, 0 if not.
2360 : * ----------
2361 : */
2362 : static int
2363 341 : connectNoDelay(PGconn *conn)
2364 : {
2365 : #ifdef TCP_NODELAY
2366 341 : int on = 1;
2367 :
2368 341 : if (setsockopt(conn->sock, IPPROTO_TCP, TCP_NODELAY,
2369 : (char *) &on,
2370 : sizeof(on)) < 0)
2371 : {
2372 : char sebuf[PG_STRERROR_R_BUFLEN];
2373 :
2374 0 : libpq_append_conn_error(conn, "could not set socket to TCP no delay mode: %s",
2375 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
2376 0 : return 0;
2377 : }
2378 : #endif
2379 :
2380 341 : return 1;
2381 : }
2382 :
2383 : /* ----------
2384 : * Write currently connected IP address into host_addr (of len host_addr_len).
2385 : * If unable to, set it to the empty string.
2386 : * ----------
2387 : */
2388 : static void
2389 15510 : getHostaddr(PGconn *conn, char *host_addr, int host_addr_len)
2390 : {
2391 15510 : struct sockaddr_storage *addr = &conn->raddr.addr;
2392 :
2393 15510 : if (addr->ss_family == AF_INET)
2394 : {
2395 195 : if (pg_inet_net_ntop(AF_INET,
2396 195 : &((struct sockaddr_in *) addr)->sin_addr.s_addr,
2397 : 32,
2398 : host_addr, host_addr_len) == NULL)
2399 0 : host_addr[0] = '\0';
2400 : }
2401 15315 : else if (addr->ss_family == AF_INET6)
2402 : {
2403 146 : if (pg_inet_net_ntop(AF_INET6,
2404 146 : &((struct sockaddr_in6 *) addr)->sin6_addr.s6_addr,
2405 : 128,
2406 : host_addr, host_addr_len) == NULL)
2407 0 : host_addr[0] = '\0';
2408 : }
2409 : else
2410 15169 : host_addr[0] = '\0';
2411 15510 : }
2412 :
2413 : /*
2414 : * emitHostIdentityInfo -
2415 : * Speculatively append "connection to server so-and-so failed: " to
2416 : * conn->errorMessage once we've identified the current connection target
2417 : * address. This ensures that any subsequent error message will be properly
2418 : * attributed to the server we couldn't connect to. conn->raddr must be
2419 : * valid, and the result of getHostaddr() must be supplied.
2420 : */
2421 : static void
2422 15510 : emitHostIdentityInfo(PGconn *conn, const char *host_addr)
2423 : {
2424 15510 : if (conn->raddr.addr.ss_family == AF_UNIX)
2425 : {
2426 : char service[NI_MAXHOST];
2427 :
2428 15169 : pg_getnameinfo_all(&conn->raddr.addr, conn->raddr.salen,
2429 : NULL, 0,
2430 : service, sizeof(service),
2431 : NI_NUMERICSERV);
2432 15169 : appendPQExpBuffer(&conn->errorMessage,
2433 15169 : libpq_gettext("connection to server on socket \"%s\" failed: "),
2434 : service);
2435 : }
2436 : else
2437 : {
2438 : const char *displayed_host;
2439 : const char *displayed_port;
2440 :
2441 : /* To which host and port were we actually connecting? */
2442 341 : if (conn->connhost[conn->whichhost].type == CHT_HOST_ADDRESS)
2443 193 : displayed_host = conn->connhost[conn->whichhost].hostaddr;
2444 : else
2445 148 : displayed_host = conn->connhost[conn->whichhost].host;
2446 341 : displayed_port = conn->connhost[conn->whichhost].port;
2447 341 : if (displayed_port == NULL || displayed_port[0] == '\0')
2448 0 : displayed_port = DEF_PGPORT_STR;
2449 :
2450 : /*
2451 : * If the user did not supply an IP address using 'hostaddr', and
2452 : * 'host' was missing or does not match our lookup, display the
2453 : * looked-up IP address.
2454 : */
2455 341 : if (conn->connhost[conn->whichhost].type != CHT_HOST_ADDRESS &&
2456 148 : host_addr[0] &&
2457 148 : strcmp(displayed_host, host_addr) != 0)
2458 147 : appendPQExpBuffer(&conn->errorMessage,
2459 147 : libpq_gettext("connection to server at \"%s\" (%s), port %s failed: "),
2460 : displayed_host, host_addr,
2461 : displayed_port);
2462 : else
2463 194 : appendPQExpBuffer(&conn->errorMessage,
2464 194 : libpq_gettext("connection to server at \"%s\", port %s failed: "),
2465 : displayed_host,
2466 : displayed_port);
2467 : }
2468 15510 : }
2469 :
2470 : /* ----------
2471 : * connectFailureMessage -
2472 : * create a friendly error message on connection failure,
2473 : * using the given errno value. Use this for error cases that
2474 : * imply that there's no server there.
2475 : * ----------
2476 : */
2477 : static void
2478 357 : connectFailureMessage(PGconn *conn, int errorno)
2479 : {
2480 : char sebuf[PG_STRERROR_R_BUFLEN];
2481 :
2482 357 : appendPQExpBuffer(&conn->errorMessage,
2483 : "%s\n",
2484 : SOCK_STRERROR(errorno, sebuf, sizeof(sebuf)));
2485 :
2486 357 : if (conn->raddr.addr.ss_family == AF_UNIX)
2487 354 : libpq_append_conn_error(conn, "\tIs the server running locally and accepting connections on that socket?");
2488 : else
2489 3 : libpq_append_conn_error(conn, "\tIs the server running on that host and accepting TCP/IP connections?");
2490 357 : }
2491 :
2492 : /*
2493 : * Should we use keepalives? Returns 1 if yes, 0 if no, and -1 if
2494 : * conn->keepalives is set to a value which is not parseable as an
2495 : * integer.
2496 : */
2497 : static int
2498 341 : useKeepalives(PGconn *conn)
2499 : {
2500 : int val;
2501 :
2502 341 : if (conn->keepalives == NULL)
2503 341 : return 1;
2504 :
2505 0 : if (!pqParseIntParam(conn->keepalives, &val, conn, "keepalives"))
2506 0 : return -1;
2507 :
2508 0 : return val != 0 ? 1 : 0;
2509 : }
2510 :
2511 : #ifndef WIN32
2512 : /*
2513 : * Set the keepalive idle timer.
2514 : */
2515 : static int
2516 341 : setKeepalivesIdle(PGconn *conn)
2517 : {
2518 : int idle;
2519 :
2520 341 : if (conn->keepalives_idle == NULL)
2521 341 : return 1;
2522 :
2523 0 : if (!pqParseIntParam(conn->keepalives_idle, &idle, conn,
2524 : "keepalives_idle"))
2525 0 : return 0;
2526 0 : if (idle < 0)
2527 0 : idle = 0;
2528 :
2529 : #ifdef PG_TCP_KEEPALIVE_IDLE
2530 0 : if (setsockopt(conn->sock, IPPROTO_TCP, PG_TCP_KEEPALIVE_IDLE,
2531 : (char *) &idle, sizeof(idle)) < 0)
2532 : {
2533 : char sebuf[PG_STRERROR_R_BUFLEN];
2534 :
2535 0 : libpq_append_conn_error(conn, "%s(%s) failed: %s",
2536 : "setsockopt",
2537 : PG_TCP_KEEPALIVE_IDLE_STR,
2538 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
2539 0 : return 0;
2540 : }
2541 : #endif
2542 :
2543 0 : return 1;
2544 : }
2545 :
2546 : /*
2547 : * Set the keepalive interval.
2548 : */
2549 : static int
2550 341 : setKeepalivesInterval(PGconn *conn)
2551 : {
2552 : int interval;
2553 :
2554 341 : if (conn->keepalives_interval == NULL)
2555 341 : return 1;
2556 :
2557 0 : if (!pqParseIntParam(conn->keepalives_interval, &interval, conn,
2558 : "keepalives_interval"))
2559 0 : return 0;
2560 0 : if (interval < 0)
2561 0 : interval = 0;
2562 :
2563 : #ifdef TCP_KEEPINTVL
2564 0 : if (setsockopt(conn->sock, IPPROTO_TCP, TCP_KEEPINTVL,
2565 : (char *) &interval, sizeof(interval)) < 0)
2566 : {
2567 : char sebuf[PG_STRERROR_R_BUFLEN];
2568 :
2569 0 : libpq_append_conn_error(conn, "%s(%s) failed: %s",
2570 : "setsockopt",
2571 : "TCP_KEEPINTVL",
2572 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
2573 0 : return 0;
2574 : }
2575 : #endif
2576 :
2577 0 : return 1;
2578 : }
2579 :
2580 : /*
2581 : * Set the count of lost keepalive packets that will trigger a connection
2582 : * break.
2583 : */
2584 : static int
2585 341 : setKeepalivesCount(PGconn *conn)
2586 : {
2587 : int count;
2588 :
2589 341 : if (conn->keepalives_count == NULL)
2590 341 : return 1;
2591 :
2592 0 : if (!pqParseIntParam(conn->keepalives_count, &count, conn,
2593 : "keepalives_count"))
2594 0 : return 0;
2595 0 : if (count < 0)
2596 0 : count = 0;
2597 :
2598 : #ifdef TCP_KEEPCNT
2599 0 : if (setsockopt(conn->sock, IPPROTO_TCP, TCP_KEEPCNT,
2600 : (char *) &count, sizeof(count)) < 0)
2601 : {
2602 : char sebuf[PG_STRERROR_R_BUFLEN];
2603 :
2604 0 : libpq_append_conn_error(conn, "%s(%s) failed: %s",
2605 : "setsockopt",
2606 : "TCP_KEEPCNT",
2607 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
2608 0 : return 0;
2609 : }
2610 : #endif
2611 :
2612 0 : return 1;
2613 : }
2614 : #else /* WIN32 */
2615 : #ifdef SIO_KEEPALIVE_VALS
2616 : /*
2617 : * Enable keepalives and set the keepalive values on Win32,
2618 : * where they are always set in one batch.
2619 : *
2620 : * CAUTION: This needs to be signal safe, since it's used by PQcancel.
2621 : */
2622 : int
2623 : pqSetKeepalivesWin32(pgsocket sock, int idle, int interval)
2624 : {
2625 : struct tcp_keepalive ka;
2626 : DWORD retsize;
2627 :
2628 : if (idle <= 0)
2629 : idle = 2 * 60 * 60; /* 2 hours = default */
2630 : if (interval <= 0)
2631 : interval = 1; /* 1 second = default */
2632 :
2633 : ka.onoff = 1;
2634 : ka.keepalivetime = idle * 1000;
2635 : ka.keepaliveinterval = interval * 1000;
2636 :
2637 : if (WSAIoctl(sock,
2638 : SIO_KEEPALIVE_VALS,
2639 : (LPVOID) &ka,
2640 : sizeof(ka),
2641 : NULL,
2642 : 0,
2643 : &retsize,
2644 : NULL,
2645 : NULL)
2646 : != 0)
2647 : return 0;
2648 : return 1;
2649 : }
2650 :
2651 : static int
2652 : prepKeepalivesWin32(PGconn *conn)
2653 : {
2654 : int idle = -1;
2655 : int interval = -1;
2656 :
2657 : if (conn->keepalives_idle &&
2658 : !pqParseIntParam(conn->keepalives_idle, &idle, conn,
2659 : "keepalives_idle"))
2660 : return 0;
2661 : if (conn->keepalives_interval &&
2662 : !pqParseIntParam(conn->keepalives_interval, &interval, conn,
2663 : "keepalives_interval"))
2664 : return 0;
2665 :
2666 : if (!pqSetKeepalivesWin32(conn->sock, idle, interval))
2667 : {
2668 : libpq_append_conn_error(conn, "%s(%s) failed: error code %d",
2669 : "WSAIoctl", "SIO_KEEPALIVE_VALS",
2670 : WSAGetLastError());
2671 : return 0;
2672 : }
2673 : return 1;
2674 : }
2675 : #endif /* SIO_KEEPALIVE_VALS */
2676 : #endif /* WIN32 */
2677 :
2678 : /*
2679 : * Set the TCP user timeout.
2680 : */
2681 : static int
2682 341 : setTCPUserTimeout(PGconn *conn)
2683 : {
2684 : int timeout;
2685 :
2686 341 : if (conn->pgtcp_user_timeout == NULL)
2687 341 : return 1;
2688 :
2689 0 : if (!pqParseIntParam(conn->pgtcp_user_timeout, &timeout, conn,
2690 : "tcp_user_timeout"))
2691 0 : return 0;
2692 :
2693 0 : if (timeout < 0)
2694 0 : timeout = 0;
2695 :
2696 : #ifdef TCP_USER_TIMEOUT
2697 0 : if (setsockopt(conn->sock, IPPROTO_TCP, TCP_USER_TIMEOUT,
2698 : (char *) &timeout, sizeof(timeout)) < 0)
2699 : {
2700 : char sebuf[256];
2701 :
2702 0 : libpq_append_conn_error(conn, "%s(%s) failed: %s",
2703 : "setsockopt",
2704 : "TCP_USER_TIMEOUT",
2705 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
2706 0 : return 0;
2707 : }
2708 : #endif
2709 :
2710 0 : return 1;
2711 : }
2712 :
2713 : /* ----------
2714 : * pqConnectDBStart -
2715 : * Begin the process of making a connection to the backend.
2716 : *
2717 : * Returns 1 if successful, 0 if not.
2718 : * ----------
2719 : */
2720 : int
2721 15492 : pqConnectDBStart(PGconn *conn)
2722 : {
2723 15492 : if (!conn)
2724 0 : return 0;
2725 :
2726 15492 : if (!conn->options_valid)
2727 0 : goto connect_errReturn;
2728 :
2729 : /*
2730 : * Check for bad linking to backend-internal versions of src/common
2731 : * functions (see comments in link-canary.c for the reason we need this).
2732 : * Nobody but developers should see this message, so we don't bother
2733 : * translating it.
2734 : */
2735 15492 : if (!pg_link_canary_is_frontend())
2736 : {
2737 0 : appendPQExpBufferStr(&conn->errorMessage,
2738 : "libpq is incorrectly linked to backend functions\n");
2739 0 : goto connect_errReturn;
2740 : }
2741 :
2742 : /* Ensure our buffers are empty */
2743 15492 : conn->inStart = conn->inCursor = conn->inEnd = 0;
2744 15492 : conn->outCount = 0;
2745 :
2746 : /*
2747 : * Set up to try to connect to the first host. (Setting whichhost = -1 is
2748 : * a bit of a cheat, but PQconnectPoll will advance it to 0 before
2749 : * anything else looks at it.)
2750 : *
2751 : * Cancel requests are special though, they should only try one host and
2752 : * address, and these fields have already been set up in PQcancelCreate,
2753 : * so leave these fields alone for cancel requests.
2754 : */
2755 15492 : if (!conn->cancelRequest)
2756 : {
2757 15483 : conn->whichhost = -1;
2758 15483 : conn->try_next_host = true;
2759 15483 : conn->try_next_addr = false;
2760 : }
2761 :
2762 15492 : conn->status = CONNECTION_NEEDED;
2763 :
2764 : /* Also reset the target_server_type state if needed */
2765 15492 : if (conn->target_server_type == SERVER_TYPE_PREFER_STANDBY_PASS2)
2766 0 : conn->target_server_type = SERVER_TYPE_PREFER_STANDBY;
2767 :
2768 : /*
2769 : * The code for processing CONNECTION_NEEDED state is in PQconnectPoll(),
2770 : * so that it can easily be re-executed if needed again during the
2771 : * asynchronous startup process. However, we must run it once here,
2772 : * because callers expect a success return from this routine to mean that
2773 : * we are in PGRES_POLLING_WRITING connection state.
2774 : */
2775 15492 : if (PQconnectPoll(conn) == PGRES_POLLING_WRITING)
2776 15141 : return 1;
2777 :
2778 351 : connect_errReturn:
2779 :
2780 : /*
2781 : * If we managed to open a socket, close it immediately rather than
2782 : * waiting till PQfinish. (The application cannot have gotten the socket
2783 : * from PQsocket yet, so this doesn't risk breaking anything.)
2784 : */
2785 351 : pqDropConnection(conn, true);
2786 351 : conn->status = CONNECTION_BAD;
2787 351 : return 0;
2788 : }
2789 :
2790 :
2791 : /*
2792 : * pqConnectDBComplete
2793 : *
2794 : * Block and complete a connection.
2795 : *
2796 : * Returns 1 on success, 0 on failure.
2797 : */
2798 : int
2799 13563 : pqConnectDBComplete(PGconn *conn)
2800 : {
2801 13563 : PostgresPollingStatusType flag = PGRES_POLLING_WRITING;
2802 13563 : pg_usec_time_t end_time = -1;
2803 13563 : int timeout = 0;
2804 13563 : int last_whichhost = -2; /* certainly different from whichhost */
2805 13563 : int last_whichaddr = -2; /* certainly different from whichaddr */
2806 :
2807 13563 : if (conn == NULL || conn->status == CONNECTION_BAD)
2808 0 : return 0;
2809 :
2810 : /*
2811 : * Set up a time limit, if connect_timeout is greater than zero.
2812 : */
2813 13563 : if (conn->connect_timeout != NULL)
2814 : {
2815 6 : if (!pqParseIntParam(conn->connect_timeout, &timeout, conn,
2816 : "connect_timeout"))
2817 : {
2818 : /* mark the connection as bad to report the parsing failure */
2819 0 : conn->status = CONNECTION_BAD;
2820 0 : return 0;
2821 : }
2822 : }
2823 :
2824 : for (;;)
2825 28346 : {
2826 41909 : int ret = 0;
2827 :
2828 : /*
2829 : * (Re)start the connect_timeout timer if it's active and we are
2830 : * considering a different host than we were last time through. If
2831 : * we've already succeeded, though, needn't recalculate.
2832 : */
2833 41909 : if (flag != PGRES_POLLING_OK &&
2834 28674 : timeout > 0 &&
2835 18 : (conn->whichhost != last_whichhost ||
2836 12 : conn->whichaddr != last_whichaddr))
2837 : {
2838 6 : end_time = PQgetCurrentTimeUSec() + (pg_usec_time_t) timeout * 1000000;
2839 6 : last_whichhost = conn->whichhost;
2840 6 : last_whichaddr = conn->whichaddr;
2841 : }
2842 :
2843 : /*
2844 : * Wait, if necessary. Note that the initial state (just after
2845 : * PQconnectStart) is to wait for the socket to select for writing.
2846 : */
2847 41909 : switch (flag)
2848 : {
2849 13235 : case PGRES_POLLING_OK:
2850 13235 : return 1; /* success! */
2851 :
2852 14143 : case PGRES_POLLING_READING:
2853 14143 : ret = pqWaitTimed(1, 0, conn, end_time);
2854 14143 : if (ret == -1)
2855 : {
2856 : /* hard failure, eg select() problem, aborts everything */
2857 0 : conn->status = CONNECTION_BAD;
2858 0 : return 0;
2859 : }
2860 14143 : break;
2861 :
2862 14203 : case PGRES_POLLING_WRITING:
2863 14203 : ret = pqWaitTimed(0, 1, conn, end_time);
2864 14203 : if (ret == -1)
2865 : {
2866 : /* hard failure, eg select() problem, aborts everything */
2867 0 : conn->status = CONNECTION_BAD;
2868 0 : return 0;
2869 : }
2870 14203 : break;
2871 :
2872 328 : default:
2873 : /* Just in case we failed to set it in PQconnectPoll */
2874 328 : conn->status = CONNECTION_BAD;
2875 328 : return 0;
2876 : }
2877 :
2878 28346 : if (ret == 1) /* connect_timeout elapsed */
2879 : {
2880 : /*
2881 : * Give up on current server/address, try the next one.
2882 : */
2883 0 : conn->try_next_addr = true;
2884 0 : conn->status = CONNECTION_NEEDED;
2885 : }
2886 :
2887 : /*
2888 : * Now try to advance the state machine.
2889 : */
2890 28346 : if (conn->cancelRequest)
2891 4 : flag = PQcancelPoll((PGcancelConn *) conn);
2892 : else
2893 28342 : flag = PQconnectPoll(conn);
2894 : }
2895 : }
2896 :
2897 : /* ----------------
2898 : * PQconnectPoll
2899 : *
2900 : * Poll an asynchronous connection.
2901 : *
2902 : * Returns a PostgresPollingStatusType.
2903 : * Before calling this function, use select(2) to determine when data
2904 : * has arrived..
2905 : *
2906 : * You must call PQfinish whether or not this fails.
2907 : *
2908 : * This function and PQconnectStart are intended to allow connections to be
2909 : * made without blocking the execution of your program on remote I/O. However,
2910 : * there are a number of caveats:
2911 : *
2912 : * o If you call PQtrace, ensure that the stream object into which you trace
2913 : * will not block.
2914 : * o If you do not supply an IP address for the remote host (i.e. you
2915 : * supply a host name instead) then PQconnectStart will block on
2916 : * getaddrinfo. You will be fine if using Unix sockets (i.e. by
2917 : * supplying neither a host name nor a host address).
2918 : * o If your backend wants to use Kerberos authentication then you must
2919 : * supply both a host name and a host address, otherwise this function
2920 : * may block on gethostname.
2921 : *
2922 : * ----------------
2923 : */
2924 : PostgresPollingStatusType
2925 47004 : PQconnectPoll(PGconn *conn)
2926 : {
2927 47004 : bool reset_connection_state_machine = false;
2928 47004 : bool need_new_connection = false;
2929 : PGresult *res;
2930 : char sebuf[PG_STRERROR_R_BUFLEN];
2931 : int optval;
2932 :
2933 47004 : if (conn == NULL)
2934 0 : return PGRES_POLLING_FAILED;
2935 :
2936 : /* Get the new data */
2937 47004 : switch (conn->status)
2938 : {
2939 : /*
2940 : * We really shouldn't have been polled in these two cases, but we
2941 : * can handle it.
2942 : */
2943 0 : case CONNECTION_BAD:
2944 0 : return PGRES_POLLING_FAILED;
2945 0 : case CONNECTION_OK:
2946 0 : return PGRES_POLLING_OK;
2947 :
2948 : /* These are reading states */
2949 15279 : case CONNECTION_AWAITING_RESPONSE:
2950 : case CONNECTION_AUTH_OK:
2951 : case CONNECTION_CHECK_WRITABLE:
2952 : case CONNECTION_CONSUME:
2953 : case CONNECTION_CHECK_STANDBY:
2954 : {
2955 : /* Load waiting data */
2956 15279 : int n = pqReadData(conn);
2957 :
2958 15279 : if (n < 0)
2959 11 : goto error_return;
2960 15268 : if (n == 0)
2961 0 : return PGRES_POLLING_READING;
2962 :
2963 15268 : break;
2964 : }
2965 :
2966 : /* These are writing states, so we just proceed. */
2967 15776 : case CONNECTION_STARTED:
2968 : case CONNECTION_MADE:
2969 15776 : break;
2970 :
2971 : /* Special cases: proceed without waiting. */
2972 15949 : case CONNECTION_SSL_STARTUP:
2973 : case CONNECTION_NEEDED:
2974 : case CONNECTION_GSS_STARTUP:
2975 : case CONNECTION_CHECK_TARGET:
2976 : case CONNECTION_AUTHENTICATING:
2977 15949 : break;
2978 :
2979 0 : default:
2980 0 : libpq_append_conn_error(conn, "invalid connection state, probably indicative of memory corruption");
2981 0 : goto error_return;
2982 : }
2983 :
2984 :
2985 60608 : keep_going: /* We will come back to here until there is
2986 : * nothing left to do. */
2987 :
2988 : /* Time to advance to next address, or next host if no more addresses? */
2989 107601 : if (conn->try_next_addr)
2990 : {
2991 357 : if (conn->whichaddr < conn->naddr)
2992 : {
2993 357 : conn->whichaddr++;
2994 357 : reset_connection_state_machine = true;
2995 : }
2996 : else
2997 0 : conn->try_next_host = true;
2998 357 : conn->try_next_addr = false;
2999 : }
3000 :
3001 : /* Time to advance to next connhost[] entry? */
3002 107601 : if (conn->try_next_host)
3003 : {
3004 : pg_conn_host *ch;
3005 : struct addrinfo hint;
3006 : struct addrinfo *addrlist;
3007 : int thisport;
3008 : int ret;
3009 : char portstr[MAXPGPATH];
3010 :
3011 16075 : if (conn->whichhost + 1 < conn->nconnhost)
3012 15500 : conn->whichhost++;
3013 : else
3014 : {
3015 : /*
3016 : * Oops, no more hosts.
3017 : *
3018 : * If we are trying to connect in "prefer-standby" mode, then drop
3019 : * the standby requirement and start over. Don't do this for
3020 : * cancel requests though, since we are certain the list of
3021 : * servers won't change as the target_server_type option is not
3022 : * applicable to those connections.
3023 : *
3024 : * Otherwise, an appropriate error message is already set up, so
3025 : * we just need to set the right status.
3026 : */
3027 575 : if (conn->target_server_type == SERVER_TYPE_PREFER_STANDBY &&
3028 1 : conn->nconnhost > 0 &&
3029 1 : !conn->cancelRequest)
3030 : {
3031 1 : conn->target_server_type = SERVER_TYPE_PREFER_STANDBY_PASS2;
3032 1 : conn->whichhost = 0;
3033 : }
3034 : else
3035 574 : goto error_return;
3036 : }
3037 :
3038 : /* Drop any address info for previous host */
3039 15501 : release_conn_addrinfo(conn);
3040 :
3041 : /*
3042 : * Look up info for the new host. On failure, log the problem in
3043 : * conn->errorMessage, then loop around to try the next host. (Note
3044 : * we don't clear try_next_host until we've succeeded.)
3045 : */
3046 15501 : ch = &conn->connhost[conn->whichhost];
3047 :
3048 : /* Initialize hint structure */
3049 108507 : MemSet(&hint, 0, sizeof(hint));
3050 15501 : hint.ai_socktype = SOCK_STREAM;
3051 15501 : hint.ai_family = AF_UNSPEC;
3052 :
3053 : /* Figure out the port number we're going to use. */
3054 15501 : if (ch->port == NULL || ch->port[0] == '\0')
3055 0 : thisport = DEF_PGPORT;
3056 : else
3057 : {
3058 15501 : if (!pqParseIntParam(ch->port, &thisport, conn, "port"))
3059 0 : goto error_return;
3060 :
3061 15501 : if (thisport < 1 || thisport > 65535)
3062 : {
3063 4 : libpq_append_conn_error(conn, "invalid port number: \"%s\"", ch->port);
3064 4 : goto keep_going;
3065 : }
3066 : }
3067 15497 : snprintf(portstr, sizeof(portstr), "%d", thisport);
3068 :
3069 : /* Use pg_getaddrinfo_all() to resolve the address */
3070 15497 : switch (ch->type)
3071 : {
3072 147 : case CHT_HOST_NAME:
3073 147 : ret = pg_getaddrinfo_all(ch->host, portstr, &hint,
3074 : &addrlist);
3075 147 : if (ret || !addrlist)
3076 : {
3077 0 : libpq_append_conn_error(conn, "could not translate host name \"%s\" to address: %s",
3078 : ch->host, gai_strerror(ret));
3079 0 : goto keep_going;
3080 : }
3081 147 : break;
3082 :
3083 190 : case CHT_HOST_ADDRESS:
3084 190 : hint.ai_flags = AI_NUMERICHOST;
3085 190 : ret = pg_getaddrinfo_all(ch->hostaddr, portstr, &hint,
3086 : &addrlist);
3087 190 : if (ret || !addrlist)
3088 : {
3089 0 : libpq_append_conn_error(conn, "could not parse network address \"%s\": %s",
3090 : ch->hostaddr, gai_strerror(ret));
3091 0 : goto keep_going;
3092 : }
3093 190 : break;
3094 :
3095 15160 : case CHT_UNIX_SOCKET:
3096 15160 : hint.ai_family = AF_UNIX;
3097 15160 : UNIXSOCK_PATH(portstr, thisport, ch->host);
3098 15160 : if (strlen(portstr) >= UNIXSOCK_PATH_BUFLEN)
3099 : {
3100 0 : libpq_append_conn_error(conn, "Unix-domain socket path \"%s\" is too long (maximum %zu bytes)",
3101 : portstr,
3102 : (UNIXSOCK_PATH_BUFLEN - 1));
3103 0 : goto keep_going;
3104 : }
3105 :
3106 : /*
3107 : * NULL hostname tells pg_getaddrinfo_all to parse the service
3108 : * name as a Unix-domain socket path.
3109 : */
3110 15160 : ret = pg_getaddrinfo_all(NULL, portstr, &hint,
3111 : &addrlist);
3112 15160 : if (ret || !addrlist)
3113 : {
3114 0 : libpq_append_conn_error(conn, "could not translate Unix-domain socket path \"%s\" to address: %s",
3115 : portstr, gai_strerror(ret));
3116 0 : goto keep_going;
3117 : }
3118 15160 : break;
3119 : }
3120 :
3121 : /*
3122 : * Store a copy of the addrlist in private memory so we can perform
3123 : * randomization for load balancing.
3124 : */
3125 15497 : ret = store_conn_addrinfo(conn, addrlist);
3126 15497 : pg_freeaddrinfo_all(hint.ai_family, addrlist);
3127 15497 : if (ret)
3128 0 : goto error_return; /* message already logged */
3129 :
3130 : /*
3131 : * If random load balancing is enabled we shuffle the addresses.
3132 : */
3133 15497 : if (conn->load_balance_type == LOAD_BALANCE_RANDOM)
3134 : {
3135 : /*
3136 : * This is the "inside-out" variant of the Fisher-Yates shuffle
3137 : * algorithm. Notionally, we append each new value to the array
3138 : * and then swap it with a randomly-chosen array element (possibly
3139 : * including itself, else we fail to generate permutations with
3140 : * the last integer last). The swap step can be optimized by
3141 : * combining it with the insertion.
3142 : *
3143 : * We don't need to initialize conn->prng_state here, because that
3144 : * already happened in pqConnectOptions2.
3145 : */
3146 60 : for (int i = 1; i < conn->naddr; i++)
3147 : {
3148 0 : int j = pg_prng_uint64_range(&conn->prng_state, 0, i);
3149 0 : AddrInfo temp = conn->addr[j];
3150 :
3151 0 : conn->addr[j] = conn->addr[i];
3152 0 : conn->addr[i] = temp;
3153 : }
3154 : }
3155 :
3156 15497 : reset_connection_state_machine = true;
3157 15497 : conn->try_next_host = false;
3158 : }
3159 :
3160 : /* Reset connection state machine? */
3161 107023 : if (reset_connection_state_machine)
3162 : {
3163 : /*
3164 : * (Re) initialize our connection control variables for a set of
3165 : * connection attempts to a single server address. These variables
3166 : * must persist across individual connection attempts, but we must
3167 : * reset them when we start to consider a new server.
3168 : */
3169 15854 : conn->pversion = conn->max_pversion;
3170 15854 : conn->send_appname = true;
3171 15854 : conn->failed_enc_methods = 0;
3172 15854 : conn->current_enc_method = 0;
3173 15854 : conn->allowed_enc_methods = 0;
3174 15854 : reset_connection_state_machine = false;
3175 15854 : need_new_connection = true;
3176 : }
3177 :
3178 : /* Force a new connection (perhaps to the same server as before)? */
3179 107023 : if (need_new_connection)
3180 : {
3181 : /* Drop any existing connection */
3182 15857 : pqDropConnection(conn, true);
3183 :
3184 : /* Reset all state obtained from old server */
3185 15857 : pqDropServerData(conn);
3186 :
3187 : /* Drop any PGresult we might have, too */
3188 15857 : conn->asyncStatus = PGASYNC_IDLE;
3189 15857 : conn->xactStatus = PQTRANS_IDLE;
3190 15857 : conn->pipelineStatus = PQ_PIPELINE_OFF;
3191 15857 : pqClearAsyncResult(conn);
3192 :
3193 : /* Reset conn->status to put the state machine in the right state */
3194 15857 : conn->status = CONNECTION_NEEDED;
3195 :
3196 15857 : need_new_connection = false;
3197 : }
3198 :
3199 : /*
3200 : * Decide what to do next, if server rejects SSL or GSS negotiation, but
3201 : * the connection is still valid. If there are no options left, error out
3202 : * with 'msg'.
3203 : */
3204 : #define ENCRYPTION_NEGOTIATION_FAILED(msg) \
3205 : do { \
3206 : switch (encryption_negotiation_failed(conn)) \
3207 : { \
3208 : case 0: \
3209 : libpq_append_conn_error(conn, (msg)); \
3210 : goto error_return; \
3211 : case 1: \
3212 : conn->status = CONNECTION_MADE; \
3213 : return PGRES_POLLING_WRITING; \
3214 : case 2: \
3215 : need_new_connection = true; \
3216 : goto keep_going; \
3217 : } \
3218 : } while(0);
3219 :
3220 : /*
3221 : * Decide what to do next, if connection fails. If there are no options
3222 : * left, return with an error. The error message has already been written
3223 : * to the connection's error buffer.
3224 : */
3225 : #define CONNECTION_FAILED() \
3226 : do { \
3227 : if (connection_failed(conn)) \
3228 : { \
3229 : need_new_connection = true; \
3230 : goto keep_going; \
3231 : } \
3232 : else \
3233 : goto error_return; \
3234 : } while(0);
3235 :
3236 : /* Now try to advance the state machine for this connection */
3237 107023 : switch (conn->status)
3238 : {
3239 15866 : case CONNECTION_NEEDED:
3240 : {
3241 : /*
3242 : * Try to initiate a connection to one of the addresses
3243 : * returned by pg_getaddrinfo_all(). conn->whichaddr is the
3244 : * next one to try.
3245 : *
3246 : * The extra level of braces here is historical. It's not
3247 : * worth reindenting this whole switch case to remove 'em.
3248 : */
3249 : {
3250 : char host_addr[NI_MAXHOST];
3251 : int sock_type;
3252 : AddrInfo *addr_cur;
3253 :
3254 : /*
3255 : * Advance to next possible host, if we've tried all of
3256 : * the addresses for the current host.
3257 : */
3258 15866 : if (conn->whichaddr == conn->naddr)
3259 : {
3260 356 : conn->try_next_host = true;
3261 15525 : goto keep_going;
3262 : }
3263 15510 : addr_cur = &conn->addr[conn->whichaddr];
3264 :
3265 : /* Remember current address for possible use later */
3266 15510 : memcpy(&conn->raddr, &addr_cur->addr, sizeof(SockAddr));
3267 :
3268 : #ifdef ENABLE_GSS
3269 :
3270 : /*
3271 : * Before establishing the connection, check if it's
3272 : * doomed to fail because gssencmode='require' but GSSAPI
3273 : * is not available.
3274 : */
3275 : if (conn->gssencmode[0] == 'r')
3276 : {
3277 : if (conn->raddr.addr.ss_family == AF_UNIX)
3278 : {
3279 : libpq_append_conn_error(conn,
3280 : "GSSAPI encryption required but it is not supported over a local socket");
3281 : goto error_return;
3282 : }
3283 : if (conn->gcred == GSS_C_NO_CREDENTIAL)
3284 : {
3285 : if (!pg_GSS_have_cred_cache(&conn->gcred))
3286 : {
3287 : libpq_append_conn_error(conn,
3288 : "GSSAPI encryption required but no credential cache");
3289 : goto error_return;
3290 : }
3291 : }
3292 : }
3293 : #endif
3294 :
3295 : /*
3296 : * Choose the encryption method to try first. Do this
3297 : * before establishing the connection, so that if none of
3298 : * the modes allowed by the connections options are
3299 : * available, we can error out before establishing the
3300 : * connection.
3301 : */
3302 15510 : if (!init_allowed_encryption_methods(conn))
3303 0 : goto error_return;
3304 :
3305 : /*
3306 : * Set connip, too. Note we purposely ignore strdup
3307 : * failure; not a big problem if it fails.
3308 : */
3309 15510 : if (conn->connip != NULL)
3310 : {
3311 4 : free(conn->connip);
3312 4 : conn->connip = NULL;
3313 : }
3314 15510 : getHostaddr(conn, host_addr, NI_MAXHOST);
3315 15510 : if (host_addr[0])
3316 341 : conn->connip = strdup(host_addr);
3317 :
3318 : /* Try to create the socket */
3319 15510 : sock_type = SOCK_STREAM;
3320 : #ifdef SOCK_CLOEXEC
3321 :
3322 : /*
3323 : * Atomically mark close-on-exec, if possible on this
3324 : * platform, so that there isn't a window where a
3325 : * subprogram executed by another thread inherits the
3326 : * socket. See fallback code below.
3327 : */
3328 15510 : sock_type |= SOCK_CLOEXEC;
3329 : #endif
3330 : #ifdef SOCK_NONBLOCK
3331 :
3332 : /*
3333 : * We might as well skip a system call for nonblocking
3334 : * mode too, if we can.
3335 : */
3336 15510 : sock_type |= SOCK_NONBLOCK;
3337 : #endif
3338 15510 : conn->sock = socket(addr_cur->family, sock_type, 0);
3339 15510 : if (conn->sock == PGINVALID_SOCKET)
3340 : {
3341 0 : int errorno = SOCK_ERRNO;
3342 :
3343 : /*
3344 : * Silently ignore socket() failure if we have more
3345 : * addresses to try; this reduces useless chatter in
3346 : * cases where the address list includes both IPv4 and
3347 : * IPv6 but kernel only accepts one family.
3348 : */
3349 0 : if (conn->whichaddr < conn->naddr ||
3350 0 : conn->whichhost + 1 < conn->nconnhost)
3351 : {
3352 0 : conn->try_next_addr = true;
3353 0 : goto keep_going;
3354 : }
3355 0 : emitHostIdentityInfo(conn, host_addr);
3356 0 : libpq_append_conn_error(conn, "could not create socket: %s",
3357 : SOCK_STRERROR(errorno, sebuf, sizeof(sebuf)));
3358 0 : goto error_return;
3359 : }
3360 :
3361 : /*
3362 : * Once we've identified a target address, all errors
3363 : * except the preceding socket()-failure case should be
3364 : * prefixed with host-identity information. (If the
3365 : * connection succeeds, the contents of conn->errorMessage
3366 : * won't matter, so this is harmless.)
3367 : */
3368 15510 : emitHostIdentityInfo(conn, host_addr);
3369 :
3370 : /*
3371 : * Select socket options: no delay of outgoing data for
3372 : * TCP sockets, nonblock mode, close-on-exec. Try the
3373 : * next address if any of this fails.
3374 : */
3375 15510 : if (addr_cur->family != AF_UNIX)
3376 : {
3377 341 : if (!connectNoDelay(conn))
3378 : {
3379 : /* error message already created */
3380 0 : conn->try_next_addr = true;
3381 0 : goto keep_going;
3382 : }
3383 : }
3384 : #ifndef SOCK_NONBLOCK
3385 : if (!pg_set_noblock(conn->sock))
3386 : {
3387 : libpq_append_conn_error(conn, "could not set socket to nonblocking mode: %s",
3388 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3389 : conn->try_next_addr = true;
3390 : goto keep_going;
3391 : }
3392 : #endif
3393 :
3394 : #ifndef SOCK_CLOEXEC
3395 : #ifdef F_SETFD
3396 : if (fcntl(conn->sock, F_SETFD, FD_CLOEXEC) == -1)
3397 : {
3398 : libpq_append_conn_error(conn, "could not set socket to close-on-exec mode: %s",
3399 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3400 : conn->try_next_addr = true;
3401 : goto keep_going;
3402 : }
3403 : #endif /* F_SETFD */
3404 : #endif
3405 :
3406 15510 : if (addr_cur->family != AF_UNIX)
3407 : {
3408 : #ifndef WIN32
3409 341 : int on = 1;
3410 : #endif
3411 341 : int usekeepalives = useKeepalives(conn);
3412 341 : int err = 0;
3413 :
3414 341 : if (usekeepalives < 0)
3415 : {
3416 : /* error is already reported */
3417 0 : err = 1;
3418 : }
3419 341 : else if (usekeepalives == 0)
3420 : {
3421 : /* Do nothing */
3422 : }
3423 : #ifndef WIN32
3424 341 : else if (setsockopt(conn->sock,
3425 : SOL_SOCKET, SO_KEEPALIVE,
3426 : (char *) &on, sizeof(on)) < 0)
3427 : {
3428 0 : libpq_append_conn_error(conn, "%s(%s) failed: %s",
3429 : "setsockopt",
3430 : "SO_KEEPALIVE",
3431 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3432 0 : err = 1;
3433 : }
3434 341 : else if (!setKeepalivesIdle(conn)
3435 341 : || !setKeepalivesInterval(conn)
3436 341 : || !setKeepalivesCount(conn))
3437 0 : err = 1;
3438 : #else /* WIN32 */
3439 : #ifdef SIO_KEEPALIVE_VALS
3440 : else if (!prepKeepalivesWin32(conn))
3441 : err = 1;
3442 : #endif /* SIO_KEEPALIVE_VALS */
3443 : #endif /* WIN32 */
3444 341 : else if (!setTCPUserTimeout(conn))
3445 0 : err = 1;
3446 :
3447 341 : if (err)
3448 : {
3449 0 : conn->try_next_addr = true;
3450 0 : goto keep_going;
3451 : }
3452 : }
3453 :
3454 : /*----------
3455 : * We have three methods of blocking SIGPIPE during
3456 : * send() calls to this socket:
3457 : *
3458 : * - setsockopt(sock, SO_NOSIGPIPE)
3459 : * - send(sock, ..., MSG_NOSIGNAL)
3460 : * - setting the signal mask to SIG_IGN during send()
3461 : *
3462 : * The third method requires three syscalls per send,
3463 : * so we prefer either of the first two, but they are
3464 : * less portable. The state is tracked in the following
3465 : * members of PGconn:
3466 : *
3467 : * conn->sigpipe_so - we have set up SO_NOSIGPIPE
3468 : * conn->sigpipe_flag - we're specifying MSG_NOSIGNAL
3469 : *
3470 : * If we can use SO_NOSIGPIPE, then set sigpipe_so here
3471 : * and we're done. Otherwise, set sigpipe_flag so that
3472 : * we will try MSG_NOSIGNAL on sends. If we get an error
3473 : * with MSG_NOSIGNAL, we'll clear that flag and revert to
3474 : * signal masking.
3475 : *----------
3476 : */
3477 15510 : conn->sigpipe_so = false;
3478 : #ifdef MSG_NOSIGNAL
3479 15510 : conn->sigpipe_flag = true;
3480 : #else
3481 : conn->sigpipe_flag = false;
3482 : #endif /* MSG_NOSIGNAL */
3483 :
3484 : #ifdef SO_NOSIGPIPE
3485 : optval = 1;
3486 : if (setsockopt(conn->sock, SOL_SOCKET, SO_NOSIGPIPE,
3487 : (char *) &optval, sizeof(optval)) == 0)
3488 : {
3489 : conn->sigpipe_so = true;
3490 : conn->sigpipe_flag = false;
3491 : }
3492 : #endif /* SO_NOSIGPIPE */
3493 :
3494 : /*
3495 : * Start/make connection. This should not block, since we
3496 : * are in nonblock mode. If it does, well, too bad.
3497 : */
3498 15510 : if (connect(conn->sock, (struct sockaddr *) &addr_cur->addr.addr,
3499 : addr_cur->addr.salen) < 0)
3500 : {
3501 695 : if (SOCK_ERRNO == EINPROGRESS ||
3502 : #ifdef WIN32
3503 : SOCK_ERRNO == EWOULDBLOCK ||
3504 : #endif
3505 354 : SOCK_ERRNO == EINTR)
3506 : {
3507 : /*
3508 : * This is fine - we're in non-blocking mode, and
3509 : * the connection is in progress. Tell caller to
3510 : * wait for write-ready on socket.
3511 : */
3512 341 : conn->status = CONNECTION_STARTED;
3513 341 : return PGRES_POLLING_WRITING;
3514 : }
3515 : /* otherwise, trouble */
3516 : }
3517 : else
3518 : {
3519 : /*
3520 : * Hm, we're connected already --- seems the "nonblock
3521 : * connection" wasn't. Advance the state machine and
3522 : * go do the next stuff.
3523 : */
3524 14815 : conn->status = CONNECTION_STARTED;
3525 14815 : goto keep_going;
3526 : }
3527 :
3528 : /*
3529 : * This connection failed. Add the error report to
3530 : * conn->errorMessage, then try the next address if any.
3531 : */
3532 354 : connectFailureMessage(conn, SOCK_ERRNO);
3533 354 : conn->try_next_addr = true;
3534 354 : goto keep_going;
3535 : }
3536 : }
3537 :
3538 15156 : case CONNECTION_STARTED:
3539 : {
3540 15156 : socklen_t optlen = sizeof(optval);
3541 :
3542 : /*
3543 : * Write ready, since we've made it here, so the connection
3544 : * has been made ... or has failed.
3545 : */
3546 :
3547 : /*
3548 : * Now check (using getsockopt) that there is not an error
3549 : * state waiting for us on the socket.
3550 : */
3551 :
3552 15156 : if (getsockopt(conn->sock, SOL_SOCKET, SO_ERROR,
3553 : (char *) &optval, &optlen) == -1)
3554 : {
3555 0 : libpq_append_conn_error(conn, "could not get socket error status: %s",
3556 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3557 0 : goto error_return;
3558 : }
3559 15156 : else if (optval != 0)
3560 : {
3561 : /*
3562 : * When using a nonblocking connect, we will typically see
3563 : * connect failures at this point, so provide a friendly
3564 : * error message.
3565 : */
3566 3 : connectFailureMessage(conn, optval);
3567 :
3568 : /*
3569 : * Try the next address if any, just as in the case where
3570 : * connect() returned failure immediately.
3571 : */
3572 3 : conn->try_next_addr = true;
3573 3 : goto keep_going;
3574 : }
3575 :
3576 : /* Fill in the client address */
3577 15153 : conn->laddr.salen = sizeof(conn->laddr.addr);
3578 15153 : if (getsockname(conn->sock,
3579 15153 : (struct sockaddr *) &conn->laddr.addr,
3580 : &conn->laddr.salen) < 0)
3581 : {
3582 0 : libpq_append_conn_error(conn, "could not get client address from socket: %s",
3583 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3584 0 : goto error_return;
3585 : }
3586 :
3587 : /*
3588 : * Implement requirepeer check, if requested and it's a
3589 : * Unix-domain socket.
3590 : */
3591 15153 : if (conn->requirepeer && conn->requirepeer[0] &&
3592 0 : conn->raddr.addr.ss_family == AF_UNIX)
3593 : {
3594 : #ifndef WIN32
3595 : char *remote_username;
3596 : #endif
3597 : uid_t uid;
3598 : gid_t gid;
3599 :
3600 0 : errno = 0;
3601 0 : if (getpeereid(conn->sock, &uid, &gid) != 0)
3602 : {
3603 : /*
3604 : * Provide special error message if getpeereid is a
3605 : * stub
3606 : */
3607 0 : if (errno == ENOSYS)
3608 0 : libpq_append_conn_error(conn, "requirepeer parameter is not supported on this platform");
3609 : else
3610 0 : libpq_append_conn_error(conn, "could not get peer credentials: %s",
3611 0 : strerror_r(errno, sebuf, sizeof(sebuf)));
3612 0 : goto error_return;
3613 : }
3614 :
3615 : #ifndef WIN32
3616 0 : remote_username = pg_fe_getusername(uid,
3617 : &conn->errorMessage);
3618 0 : if (remote_username == NULL)
3619 0 : goto error_return; /* message already logged */
3620 :
3621 0 : if (strcmp(remote_username, conn->requirepeer) != 0)
3622 : {
3623 0 : libpq_append_conn_error(conn, "requirepeer specifies \"%s\", but actual peer user name is \"%s\"",
3624 : conn->requirepeer, remote_username);
3625 0 : free(remote_username);
3626 0 : goto error_return;
3627 : }
3628 0 : free(remote_username);
3629 : #else /* WIN32 */
3630 : /* should have failed with ENOSYS above */
3631 : Assert(false);
3632 : #endif /* WIN32 */
3633 : }
3634 :
3635 : /*
3636 : * Make sure we can write before advancing to next step.
3637 : */
3638 15153 : conn->status = CONNECTION_MADE;
3639 15153 : return PGRES_POLLING_WRITING;
3640 : }
3641 :
3642 15435 : case CONNECTION_MADE:
3643 : {
3644 : char *startpacket;
3645 : int packetlen;
3646 :
3647 : #ifdef ENABLE_GSS
3648 :
3649 : /*
3650 : * If GSSAPI encryption is enabled, send a packet to the
3651 : * server asking for GSSAPI Encryption and proceed with GSSAPI
3652 : * handshake. We will come back here after GSSAPI encryption
3653 : * has been established, with conn->gctx set.
3654 : */
3655 : if (conn->current_enc_method == ENC_GSSAPI && !conn->gctx)
3656 : {
3657 : ProtocolVersion pv = pg_hton32(NEGOTIATE_GSS_CODE);
3658 :
3659 : if (pqPacketSend(conn, 0, &pv, sizeof(pv)) != STATUS_OK)
3660 : {
3661 : libpq_append_conn_error(conn, "could not send GSSAPI negotiation packet: %s",
3662 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3663 : goto error_return;
3664 : }
3665 :
3666 : /* Ok, wait for response */
3667 : conn->status = CONNECTION_GSS_STARTUP;
3668 : return PGRES_POLLING_READING;
3669 : }
3670 : #endif
3671 :
3672 : #ifdef USE_SSL
3673 :
3674 : /*
3675 : * If SSL is enabled, start the SSL negotiation. We will come
3676 : * back here after SSL encryption has been established, with
3677 : * ssl_in_use set.
3678 : */
3679 15435 : if (conn->current_enc_method == ENC_SSL && !conn->ssl_in_use)
3680 : {
3681 : /*
3682 : * If traditional postgres SSL negotiation is used, send
3683 : * the SSL request. In direct negotiation, jump straight
3684 : * into the SSL handshake.
3685 : */
3686 325 : if (conn->sslnegotiation[0] == 'p')
3687 : {
3688 : ProtocolVersion pv;
3689 :
3690 : /*
3691 : * Send the SSL request packet.
3692 : *
3693 : * Theoretically, this could block, but it really
3694 : * shouldn't since we only got here if the socket is
3695 : * write-ready.
3696 : */
3697 320 : pv = pg_hton32(NEGOTIATE_SSL_CODE);
3698 320 : if (pqPacketSend(conn, 0, &pv, sizeof(pv)) != STATUS_OK)
3699 : {
3700 0 : libpq_append_conn_error(conn, "could not send SSL negotiation packet: %s",
3701 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3702 0 : goto error_return;
3703 : }
3704 : /* Ok, wait for response */
3705 320 : conn->status = CONNECTION_SSL_STARTUP;
3706 320 : return PGRES_POLLING_READING;
3707 : }
3708 : else
3709 : {
3710 : Assert(conn->sslnegotiation[0] == 'd');
3711 5 : conn->status = CONNECTION_SSL_STARTUP;
3712 5 : return PGRES_POLLING_WRITING;
3713 : }
3714 : }
3715 : #endif /* USE_SSL */
3716 :
3717 : /*
3718 : * For cancel requests this is as far as we need to go in the
3719 : * connection establishment. Now we can actually send our
3720 : * cancellation request.
3721 : */
3722 15110 : if (conn->cancelRequest)
3723 : {
3724 9 : if (PQsendCancelRequest(conn) != STATUS_OK)
3725 : {
3726 0 : libpq_append_conn_error(conn, "could not send cancel packet: %s",
3727 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3728 0 : goto error_return;
3729 : }
3730 9 : conn->status = CONNECTION_AWAITING_RESPONSE;
3731 9 : return PGRES_POLLING_READING;
3732 : }
3733 :
3734 : /*
3735 : * We have now established encryption, or we are happy to
3736 : * proceed without.
3737 : */
3738 :
3739 : /* Build the startup packet. */
3740 15101 : startpacket = pqBuildStartupPacket3(conn, &packetlen,
3741 : EnvironmentOptions);
3742 15101 : if (!startpacket)
3743 : {
3744 0 : libpq_append_conn_error(conn, "out of memory");
3745 0 : goto error_return;
3746 : }
3747 :
3748 : /*
3749 : * Send the startup packet.
3750 : *
3751 : * Theoretically, this could block, but it really shouldn't
3752 : * since we only got here if the socket is write-ready.
3753 : */
3754 15101 : if (pqPacketSend(conn, 0, startpacket, packetlen) != STATUS_OK)
3755 : {
3756 0 : libpq_append_conn_error(conn, "could not send startup packet: %s",
3757 0 : SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
3758 0 : free(startpacket);
3759 0 : goto error_return;
3760 : }
3761 :
3762 15101 : free(startpacket);
3763 :
3764 15101 : conn->status = CONNECTION_AWAITING_RESPONSE;
3765 15101 : return PGRES_POLLING_READING;
3766 : }
3767 :
3768 : /*
3769 : * Handle SSL negotiation: wait for postmaster messages and
3770 : * respond as necessary.
3771 : */
3772 457 : case CONNECTION_SSL_STARTUP:
3773 : {
3774 : #ifdef USE_SSL
3775 : PostgresPollingStatusType pollres;
3776 :
3777 : /*
3778 : * On first time through with traditional SSL negotiation, get
3779 : * the postmaster's response to our SSLRequest packet. With
3780 : * sslnegotiation='direct', go straight to initiating SSL.
3781 : */
3782 457 : if (!conn->ssl_in_use && conn->sslnegotiation[0] == 'p')
3783 : {
3784 : /*
3785 : * We use pqReadData here since it has the logic to
3786 : * distinguish no-data-yet from connection closure. Since
3787 : * conn->ssl isn't set, a plain recv() will occur.
3788 : */
3789 : char SSLok;
3790 : int rdresult;
3791 :
3792 320 : rdresult = pqReadData(conn);
3793 320 : if (rdresult < 0)
3794 : {
3795 : /* errorMessage is already filled in */
3796 4 : goto error_return;
3797 : }
3798 320 : if (rdresult == 0)
3799 : {
3800 : /* caller failed to wait for data */
3801 147 : return PGRES_POLLING_READING;
3802 : }
3803 320 : if (pqGetc(&SSLok, conn) < 0)
3804 : {
3805 : /* should not happen really */
3806 0 : return PGRES_POLLING_READING;
3807 : }
3808 320 : if (SSLok == 'S')
3809 : {
3810 169 : if (conn->Pfdebug)
3811 0 : pqTraceOutputCharResponse(conn, "SSLResponse",
3812 : SSLok);
3813 : /* mark byte consumed */
3814 169 : conn->inStart = conn->inCursor;
3815 : }
3816 151 : else if (SSLok == 'N')
3817 : {
3818 149 : if (conn->Pfdebug)
3819 0 : pqTraceOutputCharResponse(conn, "SSLResponse",
3820 : SSLok);
3821 : /* mark byte consumed */
3822 149 : conn->inStart = conn->inCursor;
3823 :
3824 : /*
3825 : * The connection is still valid, so if it's OK to
3826 : * continue without SSL, we can proceed using this
3827 : * connection. Otherwise return with an error.
3828 : */
3829 149 : ENCRYPTION_NEGOTIATION_FAILED(libpq_gettext("server does not support SSL, but SSL was required"));
3830 : }
3831 2 : else if (SSLok == 'E')
3832 : {
3833 : /*
3834 : * Server failure of some sort, such as failure to
3835 : * fork a backend process. Don't bother retrieving
3836 : * the error message; we should not trust it as the
3837 : * server has not been authenticated yet.
3838 : */
3839 2 : libpq_append_conn_error(conn, "server sent an error response during SSL exchange");
3840 2 : goto error_return;
3841 : }
3842 : else
3843 : {
3844 0 : libpq_append_conn_error(conn, "received invalid response to SSL negotiation: %c",
3845 : SSLok);
3846 0 : goto error_return;
3847 : }
3848 : }
3849 :
3850 : /*
3851 : * Begin or continue the SSL negotiation process.
3852 : */
3853 306 : pollres = pqsecure_open_client(conn);
3854 306 : if (pollres == PGRES_POLLING_OK)
3855 : {
3856 : /*
3857 : * At this point we should have no data already buffered.
3858 : * If we do, it was received before we performed the SSL
3859 : * handshake, so it wasn't encrypted and indeed may have
3860 : * been injected by a man-in-the-middle.
3861 : */
3862 135 : if (conn->inCursor != conn->inEnd)
3863 : {
3864 0 : libpq_append_conn_error(conn, "received unencrypted data after SSL response");
3865 0 : goto error_return;
3866 : }
3867 :
3868 : /* SSL handshake done, ready to send startup packet */
3869 135 : conn->status = CONNECTION_MADE;
3870 135 : return PGRES_POLLING_WRITING;
3871 : }
3872 171 : if (pollres == PGRES_POLLING_FAILED)
3873 : {
3874 : /*
3875 : * SSL handshake failed. We will retry with a plaintext
3876 : * connection, if permitted by sslmode.
3877 : */
3878 39 : CONNECTION_FAILED();
3879 : }
3880 : /* Else, return POLLING_READING or POLLING_WRITING status */
3881 132 : return pollres;
3882 : #else /* !USE_SSL */
3883 : /* can't get here */
3884 : goto error_return;
3885 : #endif /* USE_SSL */
3886 : }
3887 :
3888 0 : case CONNECTION_GSS_STARTUP:
3889 : {
3890 : #ifdef ENABLE_GSS
3891 : PostgresPollingStatusType pollres;
3892 :
3893 : /*
3894 : * If we haven't yet, get the postmaster's response to our
3895 : * negotiation packet
3896 : */
3897 : if (!conn->gctx)
3898 : {
3899 : char gss_ok;
3900 : int rdresult = pqReadData(conn);
3901 :
3902 : if (rdresult < 0)
3903 : /* pqReadData fills in error message */
3904 : goto error_return;
3905 : else if (rdresult == 0)
3906 : /* caller failed to wait for data */
3907 : return PGRES_POLLING_READING;
3908 : if (pqGetc(&gss_ok, conn) < 0)
3909 : /* shouldn't happen... */
3910 : return PGRES_POLLING_READING;
3911 :
3912 : if (gss_ok == 'E')
3913 : {
3914 : /*
3915 : * Server failure of some sort, possibly protocol
3916 : * version support failure. Don't bother retrieving
3917 : * the error message; we should not trust it anyway as
3918 : * the server has not authenticated yet.
3919 : *
3920 : * Note that unlike on an error response to
3921 : * SSLRequest, we allow falling back to SSL or
3922 : * plaintext connection here. GSS support was
3923 : * introduced in PostgreSQL version 12, so an error
3924 : * response might mean that we are connecting to a
3925 : * pre-v12 server.
3926 : */
3927 : libpq_append_conn_error(conn, "server sent an error response during GSS encryption exchange");
3928 : CONNECTION_FAILED();
3929 : }
3930 :
3931 : /* mark byte consumed */
3932 : conn->inStart = conn->inCursor;
3933 :
3934 : if (gss_ok == 'N')
3935 : {
3936 : if (conn->Pfdebug)
3937 : pqTraceOutputCharResponse(conn, "GSSENCResponse",
3938 : gss_ok);
3939 :
3940 : /*
3941 : * The connection is still valid, so if it's OK to
3942 : * continue without GSS, we can proceed using this
3943 : * connection. Otherwise return with an error.
3944 : */
3945 : ENCRYPTION_NEGOTIATION_FAILED(libpq_gettext("server doesn't support GSSAPI encryption, but it was required"));
3946 : }
3947 : else if (gss_ok != 'G')
3948 : {
3949 : libpq_append_conn_error(conn, "received invalid response to GSSAPI negotiation: %c",
3950 : gss_ok);
3951 : goto error_return;
3952 : }
3953 :
3954 : if (conn->Pfdebug)
3955 : pqTraceOutputCharResponse(conn, "GSSENCResponse",
3956 : gss_ok);
3957 : }
3958 :
3959 : /* Begin or continue GSSAPI negotiation */
3960 : pollres = pqsecure_open_gss(conn);
3961 : if (pollres == PGRES_POLLING_OK)
3962 : {
3963 : /*
3964 : * At this point we should have no data already buffered.
3965 : * If we do, it was received before we performed the GSS
3966 : * handshake, so it wasn't encrypted and indeed may have
3967 : * been injected by a man-in-the-middle.
3968 : */
3969 : if (conn->inCursor != conn->inEnd)
3970 : {
3971 : libpq_append_conn_error(conn, "received unencrypted data after GSSAPI encryption response");
3972 : goto error_return;
3973 : }
3974 :
3975 : /* All set for startup packet */
3976 : conn->status = CONNECTION_MADE;
3977 : return PGRES_POLLING_WRITING;
3978 : }
3979 : else if (pollres == PGRES_POLLING_FAILED)
3980 : {
3981 : /*
3982 : * GSS handshake failed. We will retry with an SSL or
3983 : * plaintext connection, if permitted by the options.
3984 : */
3985 : CONNECTION_FAILED();
3986 : }
3987 : /* Else, return POLLING_READING or POLLING_WRITING status */
3988 : return pollres;
3989 : #else /* !ENABLE_GSS */
3990 : /* unreachable */
3991 0 : goto error_return;
3992 : #endif /* ENABLE_GSS */
3993 : }
3994 :
3995 : /*
3996 : * Handle authentication exchange: wait for postmaster messages
3997 : * and respond as necessary.
3998 : */
3999 30554 : case CONNECTION_AWAITING_RESPONSE:
4000 : {
4001 : char beresp;
4002 : int msgLength;
4003 : int avail;
4004 : AuthRequest areq;
4005 : int res;
4006 : bool async;
4007 :
4008 : /*
4009 : * Scan the message from current point (note that if we find
4010 : * the message is incomplete, we will return without advancing
4011 : * inStart, and resume here next time).
4012 : */
4013 30554 : conn->inCursor = conn->inStart;
4014 :
4015 : /* Read type byte */
4016 30554 : if (pqGetc(&beresp, conn))
4017 : {
4018 : /* We'll come back when there is more data */
4019 170 : return PGRES_POLLING_READING;
4020 : }
4021 :
4022 : /*
4023 : * Validate message type: we expect only an authentication
4024 : * request, NegotiateProtocolVersion, or an error here.
4025 : * Anything else probably means it's not Postgres on the other
4026 : * end at all.
4027 : */
4028 30384 : if (beresp != PqMsg_AuthenticationRequest &&
4029 15340 : beresp != PqMsg_ErrorResponse &&
4030 15068 : beresp != PqMsg_NegotiateProtocolVersion)
4031 : {
4032 0 : libpq_append_conn_error(conn, "expected authentication request from server, but received %c",
4033 : beresp);
4034 86 : goto error_return;
4035 : }
4036 :
4037 : /* Read message length word */
4038 30384 : if (pqGetInt(&msgLength, 4, conn))
4039 : {
4040 : /* We'll come back when there is more data */
4041 0 : return PGRES_POLLING_READING;
4042 : }
4043 :
4044 : /*
4045 : * Try to validate message length before using it.
4046 : *
4047 : * Authentication requests can't be very large, although GSS
4048 : * auth requests may not be that small. Same for
4049 : * NegotiateProtocolVersion.
4050 : *
4051 : * Errors can be a little larger, but not huge. If we see a
4052 : * large apparent length in an error, it means we're really
4053 : * talking to a pre-3.0-protocol server; cope. (Before
4054 : * version 14, the server also used the old protocol for
4055 : * errors that happened before processing the startup packet.)
4056 : */
4057 30384 : if (beresp == PqMsg_AuthenticationRequest &&
4058 15044 : (msgLength < 8 || msgLength > 2000))
4059 : {
4060 0 : libpq_append_conn_error(conn, "received invalid authentication request");
4061 0 : goto error_return;
4062 : }
4063 30384 : if (beresp == PqMsg_NegotiateProtocolVersion &&
4064 15068 : (msgLength < 8 || msgLength > 2000))
4065 : {
4066 0 : libpq_append_conn_error(conn, "received invalid protocol negotiation message");
4067 0 : goto error_return;
4068 : }
4069 :
4070 : #define MAX_ERRLEN 30000
4071 30384 : if (beresp == PqMsg_ErrorResponse &&
4072 272 : (msgLength < 8 || msgLength > MAX_ERRLEN))
4073 : {
4074 : /* Handle error from a pre-3.0 server */
4075 0 : conn->inCursor = conn->inStart + 1; /* reread data */
4076 0 : if (pqGets_append(&conn->errorMessage, conn))
4077 : {
4078 : /*
4079 : * We may not have authenticated the server yet, so
4080 : * don't let the buffer grow forever.
4081 : */
4082 0 : avail = conn->inEnd - conn->inCursor;
4083 0 : if (avail > MAX_ERRLEN)
4084 : {
4085 0 : libpq_append_conn_error(conn, "received invalid error message");
4086 0 : goto error_return;
4087 : }
4088 :
4089 : /* We'll come back when there is more data */
4090 0 : return PGRES_POLLING_READING;
4091 : }
4092 : /* OK, we read the message; mark data consumed */
4093 0 : pqParseDone(conn, conn->inCursor);
4094 :
4095 : /*
4096 : * Before 7.2, the postmaster didn't always end its
4097 : * messages with a newline, so add one if needed to
4098 : * conform to libpq conventions.
4099 : */
4100 0 : if (conn->errorMessage.len == 0 ||
4101 0 : conn->errorMessage.data[conn->errorMessage.len - 1] != '\n')
4102 : {
4103 0 : appendPQExpBufferChar(&conn->errorMessage, '\n');
4104 : }
4105 :
4106 0 : goto error_return;
4107 : }
4108 : #undef MAX_ERRLEN
4109 :
4110 : /*
4111 : * Can't process if message body isn't all here yet.
4112 : *
4113 : * After this check passes, any further EOF during parsing
4114 : * implies that the server sent a bad/truncated message.
4115 : * Reading more bytes won't help in that case, so don't return
4116 : * PGRES_POLLING_READING after this point.
4117 : */
4118 30384 : msgLength -= 4;
4119 30384 : avail = conn->inEnd - conn->inCursor;
4120 30384 : if (avail < msgLength)
4121 : {
4122 : /*
4123 : * Before returning, try to enlarge the input buffer if
4124 : * needed to hold the whole message; see notes in
4125 : * pqParseInput3.
4126 : */
4127 0 : if (pqCheckInBufferSpace(conn->inCursor + (size_t) msgLength,
4128 : conn))
4129 0 : goto error_return;
4130 : /* We'll come back when there is more data */
4131 0 : return PGRES_POLLING_READING;
4132 : }
4133 :
4134 : /* Handle errors. */
4135 30384 : if (beresp == PqMsg_ErrorResponse)
4136 : {
4137 272 : if (pqGetErrorNotice3(conn, true))
4138 : {
4139 0 : libpq_append_conn_error(conn, "received invalid error message");
4140 0 : goto error_return;
4141 : }
4142 : /* OK, we read the message; mark data consumed */
4143 272 : pqParseDone(conn, conn->inCursor);
4144 :
4145 : /*
4146 : * If error is "cannot connect now", try the next host if
4147 : * any (but we don't want to consider additional addresses
4148 : * for this host, nor is there much point in changing SSL
4149 : * or GSS mode). This is helpful when dealing with
4150 : * standby servers that might not be in hot-standby state.
4151 : */
4152 272 : if (strcmp(conn->last_sqlstate,
4153 : ERRCODE_CANNOT_CONNECT_NOW) == 0)
4154 : {
4155 217 : conn->try_next_host = true;
4156 30298 : goto keep_going;
4157 : }
4158 :
4159 : /* Check to see if we should mention pgpassfile */
4160 55 : pgpassfileWarning(conn);
4161 :
4162 : /*
4163 : * ...and whether we should mention grease. If the error
4164 : * message contains the PG_PROTOCOL_GREASE number (in
4165 : * major.minor, decimal, or hex format) or a complaint
4166 : * about a protocol violation before we've even started an
4167 : * authentication exchange, it's probably caused by a
4168 : * grease interaction.
4169 : */
4170 55 : if (conn->max_pversion == PG_PROTOCOL_GREASE &&
4171 55 : !conn->auth_req_received)
4172 : {
4173 33 : const char *sqlstate = PQresultErrorField(conn->result,
4174 : PG_DIAG_SQLSTATE);
4175 :
4176 33 : if ((sqlstate &&
4177 33 : strcmp(sqlstate, ERRCODE_PROTOCOL_VIOLATION) == 0) ||
4178 33 : (conn->errorMessage.len > 0 &&
4179 33 : (strstr(conn->errorMessage.data, "3.9999") ||
4180 33 : strstr(conn->errorMessage.data, "206607") ||
4181 33 : strstr(conn->errorMessage.data, "3270F") ||
4182 33 : strstr(conn->errorMessage.data, "3270f"))))
4183 : {
4184 0 : libpq_append_grease_info(conn);
4185 : }
4186 : }
4187 :
4188 55 : CONNECTION_FAILED();
4189 : }
4190 : /* Handle NegotiateProtocolVersion */
4191 30112 : else if (beresp == PqMsg_NegotiateProtocolVersion)
4192 : {
4193 15068 : if (conn->pversion_negotiated)
4194 : {
4195 0 : libpq_append_conn_error(conn, "received duplicate protocol negotiation message");
4196 0 : goto error_return;
4197 : }
4198 15068 : if (pqGetNegotiateProtocolVersion3(conn))
4199 : {
4200 : /* pqGetNegotiateProtocolVersion3 set error already */
4201 0 : goto error_return;
4202 : }
4203 15068 : conn->pversion_negotiated = true;
4204 :
4205 : /* OK, we read the message; mark data consumed */
4206 15068 : pqParseDone(conn, conn->inCursor);
4207 :
4208 15068 : goto keep_going;
4209 : }
4210 :
4211 : /* It is an authentication request. */
4212 15044 : conn->auth_req_received = true;
4213 :
4214 : /* Get the type of request. */
4215 15044 : if (pqGetInt((int *) &areq, 4, conn))
4216 : {
4217 : /* can't happen because we checked the length already */
4218 0 : libpq_append_conn_error(conn, "received invalid authentication request");
4219 0 : goto error_return;
4220 : }
4221 15044 : msgLength -= 4;
4222 :
4223 : /*
4224 : * Process the rest of the authentication request message, and
4225 : * respond to it if necessary.
4226 : *
4227 : * Note that conn->pghost must be non-NULL if we are going to
4228 : * avoid the Kerberos code doing a hostname look-up.
4229 : */
4230 15044 : res = pg_fe_sendauth(areq, msgLength, conn, &async);
4231 :
4232 15044 : if (async && (res == STATUS_OK))
4233 : {
4234 : /*
4235 : * We'll come back later once we're ready to respond.
4236 : * Don't consume the request yet.
4237 : */
4238 0 : conn->status = CONNECTION_AUTHENTICATING;
4239 0 : goto keep_going;
4240 : }
4241 :
4242 : /*
4243 : * OK, we have processed the message; mark data consumed. We
4244 : * don't call pqParseDone here because we already traced this
4245 : * message inside pg_fe_sendauth.
4246 : */
4247 15044 : conn->inStart = conn->inCursor;
4248 :
4249 15044 : if (res != STATUS_OK)
4250 : {
4251 : /*
4252 : * OAuth connections may perform two-step discovery, where
4253 : * the first connection is a dummy.
4254 : */
4255 33 : if (conn->sasl == &pg_oauth_mech && conn->oauth_want_retry)
4256 : {
4257 0 : need_new_connection = true;
4258 0 : goto keep_going;
4259 : }
4260 :
4261 33 : goto error_return;
4262 : }
4263 :
4264 : /*
4265 : * Just make sure that any data sent by pg_fe_sendauth is
4266 : * flushed out. Although this theoretically could block, it
4267 : * really shouldn't since we don't send large auth responses.
4268 : */
4269 15011 : if (pqFlush(conn))
4270 0 : goto error_return;
4271 :
4272 15011 : if (areq == AUTH_REQ_OK)
4273 : {
4274 : /* We are done with authentication exchange */
4275 14784 : conn->status = CONNECTION_AUTH_OK;
4276 :
4277 : /*
4278 : * Set asyncStatus so that PQgetResult will think that
4279 : * what comes back next is the result of a query. See
4280 : * below.
4281 : */
4282 14784 : conn->asyncStatus = PGASYNC_BUSY;
4283 : }
4284 :
4285 : /* Look to see if we have more data yet. */
4286 15011 : goto keep_going;
4287 : }
4288 :
4289 0 : case CONNECTION_AUTHENTICATING:
4290 : {
4291 : PostgresPollingStatusType status;
4292 :
4293 0 : if (!conn->async_auth || !conn->cleanup_async_auth)
4294 : {
4295 : /* programmer error; should not happen */
4296 0 : libpq_append_conn_error(conn,
4297 : "internal error: async authentication has no handler");
4298 0 : goto error_return;
4299 : }
4300 :
4301 : /* Drive some external authentication work. */
4302 0 : status = conn->async_auth(conn);
4303 :
4304 0 : if (status == PGRES_POLLING_FAILED)
4305 0 : goto error_return;
4306 :
4307 0 : if (status == PGRES_POLLING_OK)
4308 : {
4309 : /* Done. Tear down the async implementation. */
4310 0 : conn->cleanup_async_auth(conn);
4311 0 : conn->cleanup_async_auth = NULL;
4312 :
4313 : /*
4314 : * Cleanup must unset altsock, both as an indication that
4315 : * it's been released, and to stop pqSocketCheck from
4316 : * looking at the wrong socket after async auth is done.
4317 : */
4318 0 : if (conn->altsock != PGINVALID_SOCKET)
4319 : {
4320 : Assert(false);
4321 0 : libpq_append_conn_error(conn,
4322 : "internal error: async cleanup did not release polling socket");
4323 0 : goto error_return;
4324 : }
4325 :
4326 : /*
4327 : * Reenter the authentication exchange with the server. We
4328 : * didn't consume the message that started external
4329 : * authentication, so it'll be reprocessed as if we just
4330 : * received it.
4331 : */
4332 0 : conn->status = CONNECTION_AWAITING_RESPONSE;
4333 :
4334 0 : goto keep_going;
4335 : }
4336 :
4337 : /*
4338 : * Caller needs to poll some more. conn->async_auth() should
4339 : * have assigned an altsock to poll on.
4340 : */
4341 0 : if (conn->altsock == PGINVALID_SOCKET)
4342 : {
4343 : Assert(false);
4344 0 : libpq_append_conn_error(conn,
4345 : "internal error: async authentication did not set a socket for polling");
4346 0 : goto error_return;
4347 : }
4348 :
4349 0 : return status;
4350 : }
4351 :
4352 14793 : case CONNECTION_AUTH_OK:
4353 : {
4354 : /*
4355 : * Now we expect to hear from the backend. A ReadyForQuery
4356 : * message indicates that startup is successful, but we might
4357 : * also get an Error message indicating failure. (Notice
4358 : * messages indicating nonfatal warnings are also allowed by
4359 : * the protocol, as are ParameterStatus and BackendKeyData
4360 : * messages.) Easiest way to handle this is to let
4361 : * PQgetResult() read the messages. We just have to fake it
4362 : * out about the state of the connection, by setting
4363 : * asyncStatus = PGASYNC_BUSY (done above).
4364 : */
4365 :
4366 14793 : if (PQisBusy(conn))
4367 9 : return PGRES_POLLING_READING;
4368 :
4369 14784 : res = PQgetResult(conn);
4370 :
4371 : /*
4372 : * NULL return indicating we have gone to IDLE state is
4373 : * expected
4374 : */
4375 14784 : if (res)
4376 : {
4377 22 : if (res->resultStatus != PGRES_FATAL_ERROR)
4378 0 : libpq_append_conn_error(conn, "unexpected message from server during startup");
4379 22 : else if (conn->send_appname &&
4380 22 : (conn->appname || conn->fbappname))
4381 : {
4382 : /*
4383 : * If we tried to send application_name, check to see
4384 : * if the error is about that --- pre-9.0 servers will
4385 : * reject it at this stage of the process. If so,
4386 : * close the connection and retry without sending
4387 : * application_name. We could possibly get a false
4388 : * SQLSTATE match here and retry uselessly, but there
4389 : * seems no great harm in that; we'll just get the
4390 : * same error again if it's unrelated.
4391 : */
4392 : const char *sqlstate;
4393 :
4394 22 : sqlstate = PQresultErrorField(res, PG_DIAG_SQLSTATE);
4395 22 : if (sqlstate &&
4396 22 : strcmp(sqlstate, ERRCODE_APPNAME_UNKNOWN) == 0)
4397 : {
4398 0 : PQclear(res);
4399 0 : conn->send_appname = false;
4400 0 : need_new_connection = true;
4401 0 : goto keep_going;
4402 : }
4403 : }
4404 :
4405 : /*
4406 : * if the resultStatus is FATAL, then conn->errorMessage
4407 : * already has a copy of the error; needn't copy it back.
4408 : * But add a newline if it's not there already, since
4409 : * postmaster error messages may not have one.
4410 : */
4411 22 : if (conn->errorMessage.len <= 0 ||
4412 22 : conn->errorMessage.data[conn->errorMessage.len - 1] != '\n')
4413 0 : appendPQExpBufferChar(&conn->errorMessage, '\n');
4414 22 : PQclear(res);
4415 22 : goto error_return;
4416 : }
4417 :
4418 14762 : if (conn->max_pversion == PG_PROTOCOL_GREASE &&
4419 14743 : conn->pversion == PG_PROTOCOL_GREASE)
4420 : {
4421 0 : libpq_append_conn_error(conn, "server incorrectly accepted \"grease\" protocol version 3.9999 without negotiation");
4422 0 : libpq_append_grease_info(conn);
4423 0 : goto error_return;
4424 : }
4425 :
4426 : /* Almost there now ... */
4427 14762 : conn->status = CONNECTION_CHECK_TARGET;
4428 14762 : goto keep_going;
4429 : }
4430 :
4431 14762 : case CONNECTION_CHECK_TARGET:
4432 : {
4433 : /*
4434 : * If a read-write, read-only, primary, or standby connection
4435 : * is required, see if we have one.
4436 : */
4437 14762 : if (conn->target_server_type == SERVER_TYPE_READ_WRITE ||
4438 14757 : conn->target_server_type == SERVER_TYPE_READ_ONLY)
4439 4 : {
4440 : bool read_only_server;
4441 :
4442 : /*
4443 : * If the server didn't report
4444 : * "default_transaction_read_only" or "in_hot_standby" at
4445 : * startup, we must determine its state by sending the
4446 : * query "SHOW transaction_read_only". This GUC exists in
4447 : * all server versions that support 3.0 protocol.
4448 : */
4449 10 : if (conn->default_transaction_read_only == PG_BOOL_UNKNOWN ||
4450 10 : conn->in_hot_standby == PG_BOOL_UNKNOWN)
4451 : {
4452 : /*
4453 : * We use PQsendQueryContinue so that
4454 : * conn->errorMessage does not get cleared. We need
4455 : * to preserve any error messages related to previous
4456 : * hosts we have tried and failed to connect to.
4457 : */
4458 0 : conn->status = CONNECTION_OK;
4459 0 : if (!PQsendQueryContinue(conn,
4460 : "SHOW transaction_read_only"))
4461 0 : goto error_return;
4462 : /* We'll return to this state when we have the answer */
4463 0 : conn->status = CONNECTION_CHECK_WRITABLE;
4464 0 : return PGRES_POLLING_READING;
4465 : }
4466 :
4467 : /* OK, we can make the test */
4468 10 : read_only_server =
4469 20 : (conn->default_transaction_read_only == PG_BOOL_YES ||
4470 10 : conn->in_hot_standby == PG_BOOL_YES);
4471 :
4472 10 : if ((conn->target_server_type == SERVER_TYPE_READ_WRITE) ?
4473 : read_only_server : !read_only_server)
4474 : {
4475 : /* Wrong server state, reject and try the next host */
4476 6 : if (conn->target_server_type == SERVER_TYPE_READ_WRITE)
4477 3 : libpq_append_conn_error(conn, "session is read-only");
4478 : else
4479 3 : libpq_append_conn_error(conn, "session is not read-only");
4480 :
4481 : /* Close connection politely. */
4482 6 : conn->status = CONNECTION_OK;
4483 6 : sendTerminateConn(conn);
4484 :
4485 : /*
4486 : * Try next host if any, but we don't want to consider
4487 : * additional addresses for this host.
4488 : */
4489 6 : conn->try_next_host = true;
4490 6 : goto keep_going;
4491 : }
4492 : }
4493 14752 : else if (conn->target_server_type == SERVER_TYPE_PRIMARY ||
4494 14747 : conn->target_server_type == SERVER_TYPE_STANDBY ||
4495 14742 : conn->target_server_type == SERVER_TYPE_PREFER_STANDBY)
4496 : {
4497 : /*
4498 : * If the server didn't report "in_hot_standby" at
4499 : * startup, we must determine its state by sending the
4500 : * query "SELECT pg_catalog.pg_is_in_recovery()". Servers
4501 : * before 9.0 don't have that function, but by the same
4502 : * token they don't have any standby mode, so we may just
4503 : * assume the result.
4504 : */
4505 15 : if (conn->sversion < 90000)
4506 0 : conn->in_hot_standby = PG_BOOL_NO;
4507 :
4508 15 : if (conn->in_hot_standby == PG_BOOL_UNKNOWN)
4509 : {
4510 : /*
4511 : * We use PQsendQueryContinue so that
4512 : * conn->errorMessage does not get cleared. We need
4513 : * to preserve any error messages related to previous
4514 : * hosts we have tried and failed to connect to.
4515 : */
4516 0 : conn->status = CONNECTION_OK;
4517 0 : if (!PQsendQueryContinue(conn,
4518 : "SELECT pg_catalog.pg_is_in_recovery()"))
4519 0 : goto error_return;
4520 : /* We'll return to this state when we have the answer */
4521 0 : conn->status = CONNECTION_CHECK_STANDBY;
4522 0 : return PGRES_POLLING_READING;
4523 : }
4524 :
4525 : /* OK, we can make the test */
4526 30 : if ((conn->target_server_type == SERVER_TYPE_PRIMARY) ?
4527 5 : (conn->in_hot_standby == PG_BOOL_YES) :
4528 10 : (conn->in_hot_standby == PG_BOOL_NO))
4529 : {
4530 : /* Wrong server state, reject and try the next host */
4531 9 : if (conn->target_server_type == SERVER_TYPE_PRIMARY)
4532 3 : libpq_append_conn_error(conn, "server is in hot standby mode");
4533 : else
4534 6 : libpq_append_conn_error(conn, "server is not in hot standby mode");
4535 :
4536 : /* Close connection politely. */
4537 9 : conn->status = CONNECTION_OK;
4538 9 : sendTerminateConn(conn);
4539 :
4540 : /*
4541 : * Try next host if any, but we don't want to consider
4542 : * additional addresses for this host.
4543 : */
4544 9 : conn->try_next_host = true;
4545 9 : goto keep_going;
4546 : }
4547 : }
4548 :
4549 : /* Don't hold onto any OAuth tokens longer than necessary. */
4550 14747 : pqClearOAuthToken(conn);
4551 :
4552 : /*
4553 : * For non cancel requests we can release the address list
4554 : * now. For cancel requests we never actually resolve
4555 : * addresses and instead the addrinfo exists for the lifetime
4556 : * of the connection.
4557 : */
4558 14747 : if (!conn->cancelRequest)
4559 14747 : release_conn_addrinfo(conn);
4560 :
4561 : /*
4562 : * Contents of conn->errorMessage are no longer interesting
4563 : * (and it seems some clients expect it to be empty after a
4564 : * successful connection).
4565 : */
4566 14747 : pqClearConnErrorState(conn);
4567 :
4568 : /* We are open for business! */
4569 14747 : conn->status = CONNECTION_OK;
4570 14747 : return PGRES_POLLING_OK;
4571 : }
4572 :
4573 0 : case CONNECTION_CONSUME:
4574 : {
4575 : /*
4576 : * This state just makes sure the connection is idle after
4577 : * we've obtained the result of a SHOW or SELECT query. Once
4578 : * we're clear, return to CONNECTION_CHECK_TARGET state to
4579 : * decide what to do next. We must transiently set status =
4580 : * CONNECTION_OK in order to use the result-consuming
4581 : * subroutines.
4582 : */
4583 0 : conn->status = CONNECTION_OK;
4584 0 : if (!PQconsumeInput(conn))
4585 0 : goto error_return;
4586 :
4587 0 : if (PQisBusy(conn))
4588 : {
4589 0 : conn->status = CONNECTION_CONSUME;
4590 0 : return PGRES_POLLING_READING;
4591 : }
4592 :
4593 : /* Call PQgetResult() again until we get a NULL result */
4594 0 : res = PQgetResult(conn);
4595 0 : if (res != NULL)
4596 : {
4597 0 : PQclear(res);
4598 0 : conn->status = CONNECTION_CONSUME;
4599 0 : return PGRES_POLLING_READING;
4600 : }
4601 :
4602 0 : conn->status = CONNECTION_CHECK_TARGET;
4603 0 : goto keep_going;
4604 : }
4605 :
4606 0 : case CONNECTION_CHECK_WRITABLE:
4607 : {
4608 : /*
4609 : * Waiting for result of "SHOW transaction_read_only". We
4610 : * must transiently set status = CONNECTION_OK in order to use
4611 : * the result-consuming subroutines.
4612 : */
4613 0 : conn->status = CONNECTION_OK;
4614 0 : if (!PQconsumeInput(conn))
4615 0 : goto error_return;
4616 :
4617 0 : if (PQisBusy(conn))
4618 : {
4619 0 : conn->status = CONNECTION_CHECK_WRITABLE;
4620 0 : return PGRES_POLLING_READING;
4621 : }
4622 :
4623 0 : res = PQgetResult(conn);
4624 0 : if (res && PQresultStatus(res) == PGRES_TUPLES_OK &&
4625 0 : PQntuples(res) == 1)
4626 : {
4627 0 : char *val = PQgetvalue(res, 0, 0);
4628 :
4629 : /*
4630 : * "transaction_read_only = on" proves that at least one
4631 : * of default_transaction_read_only and in_hot_standby is
4632 : * on, but we don't actually know which. We don't care
4633 : * though for the purpose of identifying a read-only
4634 : * session, so satisfy the CONNECTION_CHECK_TARGET code by
4635 : * claiming they are both on. On the other hand, if it's
4636 : * a read-write session, they are certainly both off.
4637 : */
4638 0 : if (strncmp(val, "on", 2) == 0)
4639 : {
4640 0 : conn->default_transaction_read_only = PG_BOOL_YES;
4641 0 : conn->in_hot_standby = PG_BOOL_YES;
4642 : }
4643 : else
4644 : {
4645 0 : conn->default_transaction_read_only = PG_BOOL_NO;
4646 0 : conn->in_hot_standby = PG_BOOL_NO;
4647 : }
4648 0 : PQclear(res);
4649 :
4650 : /* Finish reading messages before continuing */
4651 0 : conn->status = CONNECTION_CONSUME;
4652 0 : goto keep_going;
4653 : }
4654 :
4655 : /* Something went wrong with "SHOW transaction_read_only". */
4656 0 : PQclear(res);
4657 :
4658 : /* Append error report to conn->errorMessage. */
4659 0 : libpq_append_conn_error(conn, "\"%s\" failed",
4660 : "SHOW transaction_read_only");
4661 :
4662 : /* Close connection politely. */
4663 0 : conn->status = CONNECTION_OK;
4664 0 : sendTerminateConn(conn);
4665 :
4666 : /* Try next host. */
4667 0 : conn->try_next_host = true;
4668 0 : goto keep_going;
4669 : }
4670 :
4671 0 : case CONNECTION_CHECK_STANDBY:
4672 : {
4673 : /*
4674 : * Waiting for result of "SELECT pg_is_in_recovery()". We
4675 : * must transiently set status = CONNECTION_OK in order to use
4676 : * the result-consuming subroutines.
4677 : */
4678 0 : conn->status = CONNECTION_OK;
4679 0 : if (!PQconsumeInput(conn))
4680 0 : goto error_return;
4681 :
4682 0 : if (PQisBusy(conn))
4683 : {
4684 0 : conn->status = CONNECTION_CHECK_STANDBY;
4685 0 : return PGRES_POLLING_READING;
4686 : }
4687 :
4688 0 : res = PQgetResult(conn);
4689 0 : if (res && PQresultStatus(res) == PGRES_TUPLES_OK &&
4690 0 : PQntuples(res) == 1)
4691 : {
4692 0 : char *val = PQgetvalue(res, 0, 0);
4693 :
4694 0 : if (strncmp(val, "t", 1) == 0)
4695 0 : conn->in_hot_standby = PG_BOOL_YES;
4696 : else
4697 0 : conn->in_hot_standby = PG_BOOL_NO;
4698 0 : PQclear(res);
4699 :
4700 : /* Finish reading messages before continuing */
4701 0 : conn->status = CONNECTION_CONSUME;
4702 0 : goto keep_going;
4703 : }
4704 :
4705 : /* Something went wrong with "SELECT pg_is_in_recovery()". */
4706 0 : PQclear(res);
4707 :
4708 : /* Append error report to conn->errorMessage. */
4709 0 : libpq_append_conn_error(conn, "\"%s\" failed",
4710 : "SELECT pg_is_in_recovery()");
4711 :
4712 : /* Close connection politely. */
4713 0 : conn->status = CONNECTION_OK;
4714 0 : sendTerminateConn(conn);
4715 :
4716 : /* Try next host. */
4717 0 : conn->try_next_host = true;
4718 0 : goto keep_going;
4719 : }
4720 :
4721 0 : default:
4722 0 : libpq_append_conn_error(conn,
4723 : "invalid connection state %d, probably indicative of memory corruption",
4724 0 : conn->status);
4725 0 : goto error_return;
4726 : }
4727 :
4728 : /* Unreachable */
4729 :
4730 735 : error_return:
4731 :
4732 : /*
4733 : * We used to close the socket at this point, but that makes it awkward
4734 : * for those above us if they wish to remove this socket from their own
4735 : * records (an fd_set for example). We'll just have this socket closed
4736 : * when PQfinish is called (which is compulsory even after an error, since
4737 : * the connection structure must be freed).
4738 : */
4739 735 : conn->status = CONNECTION_BAD;
4740 735 : return PGRES_POLLING_FAILED;
4741 : }
4742 :
4743 : /*
4744 : * Initialize the state machine for negotiating encryption
4745 : */
4746 : static bool
4747 15510 : init_allowed_encryption_methods(PGconn *conn)
4748 : {
4749 15510 : if (conn->raddr.addr.ss_family == AF_UNIX)
4750 : {
4751 : /* Don't request SSL or GSSAPI over Unix sockets */
4752 15169 : conn->allowed_enc_methods &= ~(ENC_SSL | ENC_GSSAPI);
4753 :
4754 : /*
4755 : * XXX: we probably should not do this. sslmode=require works
4756 : * differently
4757 : */
4758 15169 : if (conn->gssencmode[0] == 'r')
4759 : {
4760 0 : libpq_append_conn_error(conn,
4761 : "GSSAPI encryption required but it is not supported over a local socket");
4762 0 : conn->allowed_enc_methods = 0;
4763 0 : conn->current_enc_method = ENC_ERROR;
4764 0 : return false;
4765 : }
4766 :
4767 15169 : conn->allowed_enc_methods = ENC_PLAINTEXT;
4768 15169 : conn->current_enc_method = ENC_PLAINTEXT;
4769 15169 : return true;
4770 : }
4771 :
4772 : /* initialize based on sslmode and gssencmode */
4773 341 : conn->allowed_enc_methods = 0;
4774 :
4775 : #ifdef USE_SSL
4776 : /* sslmode anything but 'disable', and GSSAPI not required */
4777 341 : if (conn->sslmode[0] != 'd' && conn->gssencmode[0] != 'r')
4778 : {
4779 335 : conn->allowed_enc_methods |= ENC_SSL;
4780 : }
4781 : #endif
4782 :
4783 : #ifdef ENABLE_GSS
4784 : if (conn->gssencmode[0] != 'd')
4785 : conn->allowed_enc_methods |= ENC_GSSAPI;
4786 : #endif
4787 :
4788 341 : if ((conn->sslmode[0] == 'd' || conn->sslmode[0] == 'p' || conn->sslmode[0] == 'a') &&
4789 175 : (conn->gssencmode[0] == 'd' || conn->gssencmode[0] == 'p'))
4790 : {
4791 175 : conn->allowed_enc_methods |= ENC_PLAINTEXT;
4792 : }
4793 :
4794 341 : return select_next_encryption_method(conn, false);
4795 : }
4796 :
4797 : /*
4798 : * Out-of-line portion of the ENCRYPTION_NEGOTIATION_FAILED() macro in the
4799 : * PQconnectPoll state machine.
4800 : *
4801 : * Return value:
4802 : * 0: connection failed and we are out of encryption methods to try. return an error
4803 : * 1: Retry with next connection method. The TCP connection is still valid and in
4804 : * known state, so we can proceed with the negotiating next method without
4805 : * reconnecting.
4806 : * 2: Disconnect, and retry with next connection method.
4807 : *
4808 : * conn->current_enc_method is updated to the next method to try.
4809 : */
4810 : #if defined(USE_SSL) || defined(ENABLE_GSS)
4811 : static int
4812 149 : encryption_negotiation_failed(PGconn *conn)
4813 : {
4814 : Assert((conn->failed_enc_methods & conn->current_enc_method) == 0);
4815 149 : conn->failed_enc_methods |= conn->current_enc_method;
4816 :
4817 149 : if (select_next_encryption_method(conn, true))
4818 : {
4819 : /* An existing connection cannot be reused for direct SSL */
4820 147 : if (conn->current_enc_method == ENC_SSL && conn->sslnegotiation[0] == 'd')
4821 0 : return 2;
4822 : else
4823 147 : return 1;
4824 : }
4825 : else
4826 2 : return 0;
4827 : }
4828 : #endif
4829 :
4830 : /*
4831 : * Out-of-line portion of the CONNECTION_FAILED() macro
4832 : *
4833 : * Returns true, if we should reconnect and retry with a different encryption
4834 : * method. conn->current_enc_method is updated to the next method to try.
4835 : */
4836 : static bool
4837 94 : connection_failed(PGconn *conn)
4838 : {
4839 : Assert((conn->failed_enc_methods & conn->current_enc_method) == 0);
4840 94 : conn->failed_enc_methods |= conn->current_enc_method;
4841 :
4842 94 : return select_next_encryption_method(conn, false);
4843 : }
4844 :
4845 : /*
4846 : * Choose the next encryption method to try. If this is a retry,
4847 : * conn->failed_enc_methods has already been updated. The function sets
4848 : * conn->current_enc_method to the next method to try. Returns false if no
4849 : * encryption methods remain.
4850 : */
4851 : static bool
4852 584 : select_next_encryption_method(PGconn *conn, bool have_valid_connection)
4853 : {
4854 : int remaining_methods;
4855 :
4856 : #define SELECT_NEXT_METHOD(method) \
4857 : do { \
4858 : if ((remaining_methods & method) != 0) \
4859 : { \
4860 : conn->current_enc_method = method; \
4861 : return true; \
4862 : } \
4863 : } while (false)
4864 :
4865 584 : remaining_methods = conn->allowed_enc_methods & ~conn->failed_enc_methods;
4866 :
4867 : /*
4868 : * Try GSSAPI before SSL
4869 : */
4870 : #ifdef ENABLE_GSS
4871 : if ((remaining_methods & ENC_GSSAPI) != 0)
4872 : {
4873 : /*
4874 : * If GSSAPI encryption is enabled, then call pg_GSS_have_cred_cache()
4875 : * which will return true if we can acquire credentials (and give us a
4876 : * handle to use in conn->gcred), and then send a packet to the server
4877 : * asking for GSSAPI Encryption (and skip past SSL negotiation and
4878 : * regular startup below).
4879 : */
4880 : if (!conn->gctx)
4881 : {
4882 : if (!pg_GSS_have_cred_cache(&conn->gcred))
4883 : {
4884 : conn->allowed_enc_methods &= ~ENC_GSSAPI;
4885 : remaining_methods &= ~ENC_GSSAPI;
4886 :
4887 : if (conn->gssencmode[0] == 'r')
4888 : {
4889 : libpq_append_conn_error(conn,
4890 : "GSSAPI encryption required but no credential cache");
4891 : }
4892 : }
4893 : }
4894 : }
4895 :
4896 : SELECT_NEXT_METHOD(ENC_GSSAPI);
4897 : #endif
4898 :
4899 : /*
4900 : * The order between SSL encryption and plaintext depends on sslmode. With
4901 : * sslmode=allow, try plaintext connection before SSL. With
4902 : * sslmode=prefer, it's the other way round. With other modes, we only try
4903 : * plaintext or SSL connections so the order they're listed here doesn't
4904 : * matter.
4905 : */
4906 584 : if (conn->sslmode[0] == 'a')
4907 7 : SELECT_NEXT_METHOD(ENC_PLAINTEXT);
4908 :
4909 579 : SELECT_NEXT_METHOD(ENC_SSL);
4910 :
4911 250 : if (conn->sslmode[0] != 'a')
4912 250 : SELECT_NEXT_METHOD(ENC_PLAINTEXT);
4913 :
4914 : /* No more options */
4915 93 : conn->current_enc_method = ENC_ERROR;
4916 93 : return false;
4917 : #undef SELECT_NEXT_METHOD
4918 : }
4919 :
4920 : /*
4921 : * internal_ping
4922 : * Determine if a server is running and if we can connect to it.
4923 : *
4924 : * The argument is a connection that's been started, but not completed.
4925 : */
4926 : static PGPing
4927 537 : internal_ping(PGconn *conn)
4928 : {
4929 : /* Say "no attempt" if we never got to PQconnectPoll */
4930 537 : if (!conn || !conn->options_valid)
4931 0 : return PQPING_NO_ATTEMPT;
4932 :
4933 : /* Attempt to complete the connection */
4934 537 : if (conn->status != CONNECTION_BAD)
4935 268 : (void) pqConnectDBComplete(conn);
4936 :
4937 : /* Definitely OK if we succeeded */
4938 537 : if (conn->status != CONNECTION_BAD)
4939 105 : return PQPING_OK;
4940 :
4941 : /*
4942 : * Here begins the interesting part of "ping": determine the cause of the
4943 : * failure in sufficient detail to decide what to return. We do not want
4944 : * to report that the server is not up just because we didn't have a valid
4945 : * password, for example. In fact, any sort of authentication request
4946 : * implies the server is up. (We need this check since the libpq side of
4947 : * things might have pulled the plug on the connection before getting an
4948 : * error as such from the postmaster.)
4949 : */
4950 432 : if (conn->auth_req_received)
4951 0 : return PQPING_OK;
4952 :
4953 : /*
4954 : * If we failed to get any ERROR response from the postmaster, report
4955 : * PQPING_NO_RESPONSE. This result could be somewhat misleading for a
4956 : * pre-7.4 server, since it won't send back a SQLSTATE, but those are long
4957 : * out of support. Another corner case where the server could return a
4958 : * failure without a SQLSTATE is fork failure, but PQPING_NO_RESPONSE
4959 : * isn't totally unreasonable for that anyway. We expect that every other
4960 : * failure case in a modern server will produce a report with a SQLSTATE.
4961 : *
4962 : * NOTE: whenever we get around to making libpq generate SQLSTATEs for
4963 : * client-side errors, we should either not store those into
4964 : * last_sqlstate, or add an extra flag so we can tell client-side errors
4965 : * apart from server-side ones.
4966 : */
4967 432 : if (strlen(conn->last_sqlstate) != 5)
4968 270 : return PQPING_NO_RESPONSE;
4969 :
4970 : /*
4971 : * Report PQPING_REJECT if server says it's not accepting connections.
4972 : */
4973 162 : if (strcmp(conn->last_sqlstate, ERRCODE_CANNOT_CONNECT_NOW) == 0)
4974 162 : return PQPING_REJECT;
4975 :
4976 : /*
4977 : * Any other SQLSTATE can be taken to indicate that the server is up.
4978 : * Presumably it didn't like our username, password, or database name; or
4979 : * perhaps it had some transient failure, but that should not be taken as
4980 : * meaning "it's down".
4981 : */
4982 0 : return PQPING_OK;
4983 : }
4984 :
4985 :
4986 : /*
4987 : * pqMakeEmptyPGconn
4988 : * - create a PGconn data structure with (as yet) no interesting data
4989 : */
4990 : PGconn *
4991 15545 : pqMakeEmptyPGconn(void)
4992 : {
4993 : PGconn *conn;
4994 :
4995 : #ifdef WIN32
4996 :
4997 : /*
4998 : * Make sure socket support is up and running in this process.
4999 : *
5000 : * Note: the Windows documentation says that we should eventually do a
5001 : * matching WSACleanup() call, but experience suggests that that is at
5002 : * least as likely to cause problems as fix them. So we don't.
5003 : */
5004 : static bool wsastartup_done = false;
5005 :
5006 : if (!wsastartup_done)
5007 : {
5008 : WSADATA wsaData;
5009 :
5010 : if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
5011 : return NULL;
5012 : wsastartup_done = true;
5013 : }
5014 :
5015 : /* Forget any earlier error */
5016 : WSASetLastError(0);
5017 : #endif /* WIN32 */
5018 :
5019 15545 : conn = (PGconn *) malloc(sizeof(PGconn));
5020 15545 : if (conn == NULL)
5021 0 : return conn;
5022 :
5023 : /* Zero all pointers and booleans */
5024 15545 : MemSet(conn, 0, sizeof(PGconn));
5025 :
5026 : /* install default notice hooks */
5027 15545 : conn->noticeHooks.noticeRec = defaultNoticeReceiver;
5028 15545 : conn->noticeHooks.noticeProc = defaultNoticeProcessor;
5029 :
5030 15545 : conn->status = CONNECTION_BAD;
5031 15545 : conn->asyncStatus = PGASYNC_IDLE;
5032 15545 : conn->pipelineStatus = PQ_PIPELINE_OFF;
5033 15545 : conn->xactStatus = PQTRANS_IDLE;
5034 15545 : conn->options_valid = false;
5035 15545 : conn->nonblocking = false;
5036 15545 : conn->client_encoding = PG_SQL_ASCII;
5037 15545 : conn->std_strings = false; /* unless server says differently */
5038 15545 : conn->default_transaction_read_only = PG_BOOL_UNKNOWN;
5039 15545 : conn->in_hot_standby = PG_BOOL_UNKNOWN;
5040 15545 : conn->scram_sha_256_iterations = SCRAM_SHA_256_DEFAULT_ITERATIONS;
5041 15545 : conn->verbosity = PQERRORS_DEFAULT;
5042 15545 : conn->show_context = PQSHOW_CONTEXT_ERRORS;
5043 15545 : conn->sock = PGINVALID_SOCKET;
5044 15545 : conn->altsock = PGINVALID_SOCKET;
5045 15545 : conn->Pfdebug = NULL;
5046 :
5047 : /*
5048 : * We try to send at least 8K at a time, which is the usual size of pipe
5049 : * buffers on Unix systems. That way, when we are sending a large amount
5050 : * of data, we avoid incurring extra kernel context swaps for partial
5051 : * bufferloads. The output buffer is initially made 16K in size, and we
5052 : * try to dump it after accumulating 8K.
5053 : *
5054 : * With the same goal of minimizing context swaps, the input buffer will
5055 : * be enlarged anytime it has less than 8K free, so we initially allocate
5056 : * twice that.
5057 : */
5058 15545 : conn->inBufSize = 16 * 1024;
5059 15545 : conn->inBuffer = (char *) malloc(conn->inBufSize);
5060 15545 : conn->outBufSize = 16 * 1024;
5061 15545 : conn->outBuffer = (char *) malloc(conn->outBufSize);
5062 15545 : conn->rowBufLen = 32;
5063 15545 : conn->rowBuf = (PGdataValue *) malloc(conn->rowBufLen * sizeof(PGdataValue));
5064 15545 : initPQExpBuffer(&conn->errorMessage);
5065 15545 : initPQExpBuffer(&conn->workBuffer);
5066 :
5067 15545 : if (conn->inBuffer == NULL ||
5068 15545 : conn->outBuffer == NULL ||
5069 15545 : conn->rowBuf == NULL ||
5070 15545 : PQExpBufferBroken(&conn->errorMessage) ||
5071 15545 : PQExpBufferBroken(&conn->workBuffer))
5072 : {
5073 : /* out of memory already :-( */
5074 0 : freePGconn(conn);
5075 0 : conn = NULL;
5076 : }
5077 :
5078 15545 : return conn;
5079 : }
5080 :
5081 : /*
5082 : * freePGconn
5083 : * - free an idle (closed) PGconn data structure
5084 : *
5085 : * NOTE: this should not overlap any functionality with pqClosePGconn().
5086 : * Clearing/resetting of transient state belongs there; what we do here is
5087 : * release data that is to be held for the life of the PGconn structure.
5088 : * If a value ought to be cleared/freed during PQreset(), do it there not here.
5089 : */
5090 : static void
5091 15325 : freePGconn(PGconn *conn)
5092 : {
5093 : /* let any event procs clean up their state data */
5094 15325 : for (int i = 0; i < conn->nEvents; i++)
5095 : {
5096 : PGEventConnDestroy evt;
5097 :
5098 0 : evt.conn = conn;
5099 0 : (void) conn->events[i].proc(PGEVT_CONNDESTROY, &evt,
5100 0 : conn->events[i].passThrough);
5101 0 : free(conn->events[i].name);
5102 : }
5103 :
5104 : /* free everything not freed in pqClosePGconn */
5105 15325 : free(conn->pghost);
5106 15325 : free(conn->pghostaddr);
5107 15325 : free(conn->pgport);
5108 15325 : free(conn->connect_timeout);
5109 15325 : free(conn->pgtcp_user_timeout);
5110 15325 : free(conn->client_encoding_initial);
5111 15325 : free(conn->pgoptions);
5112 15325 : free(conn->appname);
5113 15325 : free(conn->fbappname);
5114 15325 : free(conn->dbName);
5115 15325 : free(conn->replication);
5116 15325 : free(conn->pgservice);
5117 15325 : free(conn->pgservicefile);
5118 15325 : free(conn->pguser);
5119 15325 : if (conn->pgpass)
5120 : {
5121 232 : explicit_bzero(conn->pgpass, strlen(conn->pgpass));
5122 232 : free(conn->pgpass);
5123 : }
5124 15325 : free(conn->pgpassfile);
5125 15325 : free(conn->channel_binding);
5126 15325 : free(conn->keepalives);
5127 15325 : free(conn->keepalives_idle);
5128 15325 : free(conn->keepalives_interval);
5129 15325 : free(conn->keepalives_count);
5130 15325 : free(conn->sslmode);
5131 15325 : free(conn->sslnegotiation);
5132 15325 : free(conn->sslcompression);
5133 15325 : free(conn->sslkey);
5134 15325 : free(conn->sslcert);
5135 15325 : if (conn->sslpassword)
5136 : {
5137 3 : explicit_bzero(conn->sslpassword, strlen(conn->sslpassword));
5138 3 : free(conn->sslpassword);
5139 : }
5140 15325 : free(conn->sslcertmode);
5141 15325 : free(conn->sslrootcert);
5142 15325 : free(conn->sslcrl);
5143 15325 : free(conn->sslcrldir);
5144 15325 : free(conn->sslsni);
5145 15325 : free(conn->requirepeer);
5146 15325 : free(conn->gssencmode);
5147 15325 : free(conn->krbsrvname);
5148 15325 : free(conn->gsslib);
5149 15325 : free(conn->gssdelegation);
5150 15325 : free(conn->min_protocol_version);
5151 15325 : free(conn->max_protocol_version);
5152 15325 : free(conn->ssl_min_protocol_version);
5153 15325 : free(conn->ssl_max_protocol_version);
5154 15325 : free(conn->target_session_attrs);
5155 15325 : free(conn->require_auth);
5156 15325 : free(conn->load_balance_hosts);
5157 15325 : free(conn->scram_client_key);
5158 15325 : free(conn->scram_server_key);
5159 15325 : free(conn->sslkeylogfile);
5160 15325 : free(conn->oauth_issuer);
5161 15325 : free(conn->oauth_issuer_id);
5162 15325 : free(conn->oauth_discovery_uri);
5163 15325 : free(conn->oauth_client_id);
5164 15325 : free(conn->oauth_client_secret);
5165 15325 : free(conn->oauth_ca_file);
5166 15325 : free(conn->oauth_scope);
5167 : /* Note that conn->Pfdebug is not ours to close or free */
5168 15325 : free(conn->events);
5169 15325 : pqReleaseConnHosts(conn);
5170 15325 : free(conn->connip);
5171 15325 : release_conn_addrinfo(conn);
5172 15325 : free(conn->scram_client_key_binary);
5173 15325 : free(conn->scram_server_key_binary);
5174 : /* if this is a cancel connection, be_cancel_key may still be allocated */
5175 15325 : free(conn->be_cancel_key);
5176 15325 : free(conn->inBuffer);
5177 15325 : free(conn->outBuffer);
5178 15325 : free(conn->rowBuf);
5179 15325 : termPQExpBuffer(&conn->errorMessage);
5180 15325 : termPQExpBuffer(&conn->workBuffer);
5181 :
5182 15325 : free(conn);
5183 15325 : }
5184 :
5185 : /*
5186 : * pqReleaseConnHosts
5187 : * - Free the host list in the PGconn.
5188 : */
5189 : void
5190 15332 : pqReleaseConnHosts(PGconn *conn)
5191 : {
5192 15332 : if (conn->connhost)
5193 : {
5194 30767 : for (int i = 0; i < conn->nconnhost; ++i)
5195 : {
5196 15450 : free(conn->connhost[i].host);
5197 15450 : free(conn->connhost[i].hostaddr);
5198 15450 : free(conn->connhost[i].port);
5199 15450 : if (conn->connhost[i].password != NULL)
5200 : {
5201 7 : explicit_bzero(conn->connhost[i].password,
5202 7 : strlen(conn->connhost[i].password));
5203 7 : free(conn->connhost[i].password);
5204 : }
5205 : }
5206 15317 : free(conn->connhost);
5207 15317 : conn->connhost = NULL;
5208 : }
5209 15332 : }
5210 :
5211 : /*
5212 : * store_conn_addrinfo
5213 : * - copy addrinfo to PGconn object
5214 : *
5215 : * Copies the addrinfos from addrlist to the PGconn object such that the
5216 : * addrinfos can be manipulated by libpq. Returns a positive integer on
5217 : * failure, otherwise zero.
5218 : */
5219 : static int
5220 15497 : store_conn_addrinfo(PGconn *conn, struct addrinfo *addrlist)
5221 : {
5222 15497 : struct addrinfo *ai = addrlist;
5223 :
5224 15497 : conn->whichaddr = 0;
5225 :
5226 15497 : conn->naddr = 0;
5227 31140 : while (ai)
5228 : {
5229 15643 : ai = ai->ai_next;
5230 15643 : conn->naddr++;
5231 : }
5232 :
5233 15497 : conn->addr = calloc(conn->naddr, sizeof(AddrInfo));
5234 15497 : if (conn->addr == NULL)
5235 : {
5236 0 : libpq_append_conn_error(conn, "out of memory");
5237 0 : return 1;
5238 : }
5239 :
5240 15497 : ai = addrlist;
5241 31140 : for (int i = 0; i < conn->naddr; i++)
5242 : {
5243 15643 : conn->addr[i].family = ai->ai_family;
5244 :
5245 15643 : memcpy(&conn->addr[i].addr.addr, ai->ai_addr,
5246 15643 : ai->ai_addrlen);
5247 15643 : conn->addr[i].addr.salen = ai->ai_addrlen;
5248 15643 : ai = ai->ai_next;
5249 : }
5250 :
5251 15497 : return 0;
5252 : }
5253 :
5254 : /*
5255 : * release_conn_addrinfo
5256 : * - Free any addrinfo list in the PGconn.
5257 : */
5258 : static void
5259 60891 : release_conn_addrinfo(PGconn *conn)
5260 : {
5261 60891 : if (conn->addr)
5262 : {
5263 15495 : free(conn->addr);
5264 15495 : conn->addr = NULL;
5265 : }
5266 60891 : }
5267 :
5268 : /*
5269 : * sendTerminateConn
5270 : * - Send a terminate message to backend.
5271 : */
5272 : static void
5273 15342 : sendTerminateConn(PGconn *conn)
5274 : {
5275 : /*
5276 : * The Postgres cancellation protocol does not have a notion of a
5277 : * Terminate message, so don't send one.
5278 : */
5279 15342 : if (conn->cancelRequest)
5280 9 : return;
5281 :
5282 : /*
5283 : * Note that the protocol doesn't allow us to send Terminate messages
5284 : * during the startup phase.
5285 : */
5286 15333 : if (conn->sock != PGINVALID_SOCKET && conn->status == CONNECTION_OK)
5287 : {
5288 : /*
5289 : * Try to send "close connection" message to backend. Ignore any
5290 : * error.
5291 : */
5292 14455 : pqPutMsgStart(PqMsg_Terminate, conn);
5293 14455 : pqPutMsgEnd(conn);
5294 14455 : (void) pqFlush(conn);
5295 : }
5296 : }
5297 :
5298 : /*
5299 : * pqClosePGconn
5300 : * - properly close a connection to the backend
5301 : *
5302 : * This should reset or release all transient state, but NOT the connection
5303 : * parameters. On exit, the PGconn should be in condition to start a fresh
5304 : * connection with the same parameters (see PQreset()).
5305 : */
5306 : void
5307 15327 : pqClosePGconn(PGconn *conn)
5308 : {
5309 : /*
5310 : * If possible, send Terminate message to close the connection politely.
5311 : */
5312 15327 : sendTerminateConn(conn);
5313 :
5314 : /*
5315 : * Must reset the blocking status so a possible reconnect will work.
5316 : *
5317 : * Don't call PQsetnonblocking() because it will fail if it's unable to
5318 : * flush the connection.
5319 : */
5320 15327 : conn->nonblocking = false;
5321 :
5322 : /*
5323 : * Close the connection, reset all transient state, flush I/O buffers.
5324 : * Note that this includes clearing conn's error state; we're no longer
5325 : * interested in any failures associated with the old connection, and we
5326 : * want a clean slate for any new connection attempt.
5327 : */
5328 15327 : pqDropConnection(conn, true);
5329 15327 : conn->status = CONNECTION_BAD; /* Well, not really _bad_ - just absent */
5330 15327 : conn->asyncStatus = PGASYNC_IDLE;
5331 15327 : conn->xactStatus = PQTRANS_IDLE;
5332 15327 : conn->pipelineStatus = PQ_PIPELINE_OFF;
5333 15327 : pqClearOAuthToken(conn);
5334 15327 : pqClearAsyncResult(conn); /* deallocate result */
5335 15327 : pqClearConnErrorState(conn);
5336 :
5337 : /*
5338 : * Release addrinfo, but since cancel requests never change their addrinfo
5339 : * we don't do that. Otherwise we would have to rebuild it during a
5340 : * PQcancelReset.
5341 : */
5342 15327 : if (!conn->cancelRequest)
5343 15318 : release_conn_addrinfo(conn);
5344 :
5345 : /* Reset all state obtained from server, too */
5346 15327 : pqDropServerData(conn);
5347 15327 : }
5348 :
5349 : /*
5350 : * PQfinish: properly close a connection to the backend. Also frees
5351 : * the PGconn data structure so it shouldn't be re-used after this.
5352 : */
5353 : void
5354 15325 : PQfinish(PGconn *conn)
5355 : {
5356 15325 : if (conn)
5357 : {
5358 15325 : pqClosePGconn(conn);
5359 15325 : freePGconn(conn);
5360 : }
5361 15325 : }
5362 :
5363 : /*
5364 : * PQreset: resets the connection to the backend by closing the
5365 : * existing connection and creating a new one.
5366 : */
5367 : void
5368 0 : PQreset(PGconn *conn)
5369 : {
5370 0 : if (conn)
5371 : {
5372 0 : pqClosePGconn(conn);
5373 :
5374 0 : if (pqConnectDBStart(conn) && pqConnectDBComplete(conn))
5375 : {
5376 : /*
5377 : * Notify event procs of successful reset.
5378 : */
5379 : int i;
5380 :
5381 0 : for (i = 0; i < conn->nEvents; i++)
5382 : {
5383 : PGEventConnReset evt;
5384 :
5385 0 : evt.conn = conn;
5386 0 : (void) conn->events[i].proc(PGEVT_CONNRESET, &evt,
5387 0 : conn->events[i].passThrough);
5388 : }
5389 : }
5390 : }
5391 0 : }
5392 :
5393 :
5394 : /*
5395 : * PQresetStart:
5396 : * resets the connection to the backend
5397 : * closes the existing connection and makes a new one
5398 : * Returns 1 on success, 0 on failure.
5399 : */
5400 : int
5401 0 : PQresetStart(PGconn *conn)
5402 : {
5403 0 : if (conn)
5404 : {
5405 0 : pqClosePGconn(conn);
5406 :
5407 0 : return pqConnectDBStart(conn);
5408 : }
5409 :
5410 0 : return 0;
5411 : }
5412 :
5413 :
5414 : /*
5415 : * PQresetPoll:
5416 : * resets the connection to the backend
5417 : * closes the existing connection and makes a new one
5418 : */
5419 : PostgresPollingStatusType
5420 0 : PQresetPoll(PGconn *conn)
5421 : {
5422 0 : if (conn)
5423 : {
5424 0 : PostgresPollingStatusType status = PQconnectPoll(conn);
5425 :
5426 0 : if (status == PGRES_POLLING_OK)
5427 : {
5428 : /*
5429 : * Notify event procs of successful reset.
5430 : */
5431 : int i;
5432 :
5433 0 : for (i = 0; i < conn->nEvents; i++)
5434 : {
5435 : PGEventConnReset evt;
5436 :
5437 0 : evt.conn = conn;
5438 0 : (void) conn->events[i].proc(PGEVT_CONNRESET, &evt,
5439 0 : conn->events[i].passThrough);
5440 : }
5441 : }
5442 :
5443 0 : return status;
5444 : }
5445 :
5446 0 : return PGRES_POLLING_FAILED;
5447 : }
5448 :
5449 : /*
5450 : * pqPacketSend() -- convenience routine to send a message to server.
5451 : *
5452 : * pack_type: the single-byte message type code. (Pass zero for startup
5453 : * packets, which have no message type code.)
5454 : *
5455 : * buf, buf_len: contents of message. The given length includes only what
5456 : * is in buf; the message type and message length fields are added here.
5457 : *
5458 : * RETURNS: STATUS_ERROR if the write fails, STATUS_OK otherwise.
5459 : * SIDE_EFFECTS: may block.
5460 : */
5461 : int
5462 15527 : pqPacketSend(PGconn *conn, char pack_type,
5463 : const void *buf, size_t buf_len)
5464 : {
5465 : /* Start the message. */
5466 15527 : if (pqPutMsgStart(pack_type, conn))
5467 0 : return STATUS_ERROR;
5468 :
5469 : /* Send the message body. */
5470 15527 : if (pqPutnchar(buf, buf_len, conn))
5471 0 : return STATUS_ERROR;
5472 :
5473 : /* Finish the message. */
5474 15527 : if (pqPutMsgEnd(conn))
5475 0 : return STATUS_ERROR;
5476 :
5477 : /* Flush to ensure backend gets it. */
5478 15527 : if (pqFlush(conn))
5479 0 : return STATUS_ERROR;
5480 :
5481 15527 : return STATUS_OK;
5482 : }
5483 :
5484 : #ifdef USE_LDAP
5485 :
5486 : #define LDAP_URL "ldap://"
5487 : #define LDAP_DEF_PORT 389
5488 : #define PGLDAP_TIMEOUT 2
5489 :
5490 : #define ld_is_sp_tab(x) ((x) == ' ' || (x) == '\t')
5491 : #define ld_is_nl_cr(x) ((x) == '\r' || (x) == '\n')
5492 :
5493 :
5494 : /*
5495 : * ldapServiceLookup
5496 : *
5497 : * Search the LDAP URL passed as first argument, treat the result as a
5498 : * string of connection options that are parsed and added to the array of
5499 : * options passed as second argument.
5500 : *
5501 : * LDAP URLs must conform to RFC 1959 without escape sequences.
5502 : * ldap://host:port/dn?attributes?scope?filter?extensions
5503 : *
5504 : * Returns
5505 : * 0 if the lookup was successful,
5506 : * 1 if the connection to the LDAP server could be established but
5507 : * the search was unsuccessful,
5508 : * 2 if a connection could not be established, and
5509 : * 3 if a fatal error occurred.
5510 : *
5511 : * An error message is appended to *errorMessage for return codes 1 and 3.
5512 : */
5513 : static int
5514 7 : ldapServiceLookup(const char *purl, PQconninfoOption *options,
5515 : PQExpBuffer errorMessage)
5516 : {
5517 7 : int port = LDAP_DEF_PORT,
5518 : scope,
5519 : rc,
5520 : size,
5521 : state,
5522 : oldstate,
5523 : i;
5524 : #ifndef WIN32
5525 : int msgid;
5526 : #endif
5527 : bool found_keyword;
5528 : char *url,
5529 : *hostname,
5530 : *portstr,
5531 : *endptr,
5532 : *dn,
5533 : *scopestr,
5534 : *filter,
5535 : *result,
5536 : *p,
5537 7 : *p1 = NULL,
5538 7 : *optname = NULL,
5539 7 : *optval = NULL;
5540 7 : char *attrs[2] = {NULL, NULL};
5541 7 : LDAP *ld = NULL;
5542 : LDAPMessage *res,
5543 : *entry;
5544 : struct berval **values;
5545 7 : LDAP_TIMEVAL time = {PGLDAP_TIMEOUT, 0};
5546 7 : int ldapversion = LDAP_VERSION3;
5547 :
5548 7 : if ((url = strdup(purl)) == NULL)
5549 : {
5550 0 : libpq_append_error(errorMessage, "out of memory");
5551 0 : return 3;
5552 : }
5553 :
5554 : /*
5555 : * Parse URL components, check for correctness. Basically, url has '\0'
5556 : * placed at component boundaries and variables are pointed at each
5557 : * component.
5558 : */
5559 :
5560 7 : if (pg_strncasecmp(url, LDAP_URL, strlen(LDAP_URL)) != 0)
5561 : {
5562 0 : libpq_append_error(errorMessage,
5563 : "invalid LDAP URL \"%s\": scheme must be ldap://", purl);
5564 0 : free(url);
5565 0 : return 3;
5566 : }
5567 :
5568 : /* hostname */
5569 7 : hostname = url + strlen(LDAP_URL);
5570 7 : if (*hostname == '/') /* no hostname? */
5571 0 : hostname = DefaultHost; /* the default */
5572 :
5573 : /* dn, "distinguished name" */
5574 7 : p = strchr(url + strlen(LDAP_URL), '/');
5575 7 : if (p == NULL || *(p + 1) == '\0' || *(p + 1) == '?')
5576 : {
5577 0 : libpq_append_error(errorMessage,
5578 : "invalid LDAP URL \"%s\": missing distinguished name",
5579 : purl);
5580 0 : free(url);
5581 0 : return 3;
5582 : }
5583 7 : *p = '\0'; /* terminate hostname */
5584 7 : dn = p + 1;
5585 :
5586 : /* attribute */
5587 7 : if ((p = strchr(dn, '?')) == NULL || *(p + 1) == '\0' || *(p + 1) == '?')
5588 : {
5589 0 : libpq_append_error(errorMessage,
5590 : "invalid LDAP URL \"%s\": must have exactly one attribute",
5591 : purl);
5592 0 : free(url);
5593 0 : return 3;
5594 : }
5595 7 : *p = '\0';
5596 7 : attrs[0] = p + 1;
5597 :
5598 : /* scope */
5599 7 : if ((p = strchr(attrs[0], '?')) == NULL || *(p + 1) == '\0' || *(p + 1) == '?')
5600 : {
5601 0 : libpq_append_error(errorMessage,
5602 : "invalid LDAP URL \"%s\": must have search scope (base/one/sub)",
5603 : purl);
5604 0 : free(url);
5605 0 : return 3;
5606 : }
5607 7 : *p = '\0';
5608 7 : scopestr = p + 1;
5609 :
5610 : /* filter */
5611 7 : if ((p = strchr(scopestr, '?')) == NULL || *(p + 1) == '\0' || *(p + 1) == '?')
5612 : {
5613 0 : libpq_append_error(errorMessage,
5614 : "invalid LDAP URL \"%s\": no filter",
5615 : purl);
5616 0 : free(url);
5617 0 : return 3;
5618 : }
5619 7 : *p = '\0';
5620 7 : filter = p + 1;
5621 7 : if ((p = strchr(filter, '?')) != NULL)
5622 0 : *p = '\0';
5623 :
5624 : /* port number? */
5625 7 : if ((p1 = strchr(hostname, ':')) != NULL)
5626 : {
5627 : long lport;
5628 :
5629 7 : *p1 = '\0';
5630 7 : portstr = p1 + 1;
5631 7 : errno = 0;
5632 7 : lport = strtol(portstr, &endptr, 10);
5633 7 : if (*portstr == '\0' || *endptr != '\0' || errno || lport < 0 || lport > 65535)
5634 : {
5635 0 : libpq_append_error(errorMessage,
5636 : "invalid LDAP URL \"%s\": invalid port number",
5637 : purl);
5638 0 : free(url);
5639 0 : return 3;
5640 : }
5641 7 : port = (int) lport;
5642 : }
5643 :
5644 : /* Allow only one attribute */
5645 7 : if (strchr(attrs[0], ',') != NULL)
5646 : {
5647 0 : libpq_append_error(errorMessage,
5648 : "invalid LDAP URL \"%s\": must have exactly one attribute",
5649 : purl);
5650 0 : free(url);
5651 0 : return 3;
5652 : }
5653 :
5654 : /* set scope */
5655 7 : if (pg_strcasecmp(scopestr, "base") == 0)
5656 0 : scope = LDAP_SCOPE_BASE;
5657 7 : else if (pg_strcasecmp(scopestr, "one") == 0)
5658 7 : scope = LDAP_SCOPE_ONELEVEL;
5659 0 : else if (pg_strcasecmp(scopestr, "sub") == 0)
5660 0 : scope = LDAP_SCOPE_SUBTREE;
5661 : else
5662 : {
5663 0 : libpq_append_error(errorMessage,
5664 : "invalid LDAP URL \"%s\": must have search scope (base/one/sub)",
5665 : purl);
5666 0 : free(url);
5667 0 : return 3;
5668 : }
5669 :
5670 : /* initialize LDAP structure */
5671 7 : if ((ld = ldap_init(hostname, port)) == NULL)
5672 : {
5673 0 : libpq_append_error(errorMessage, "could not create LDAP structure");
5674 0 : free(url);
5675 0 : return 3;
5676 : }
5677 :
5678 7 : if ((rc = ldap_set_option(ld, LDAP_OPT_PROTOCOL_VERSION, &ldapversion)) != LDAP_SUCCESS)
5679 : {
5680 0 : libpq_append_error(errorMessage, "could not set LDAP protocol version: %s",
5681 : ldap_err2string(rc));
5682 0 : free(url);
5683 0 : ldap_unbind(ld);
5684 0 : return 3;
5685 : }
5686 :
5687 : /*
5688 : * Perform an explicit anonymous bind.
5689 : *
5690 : * LDAP does not require that an anonymous bind is performed explicitly,
5691 : * but we want to distinguish between the case where LDAP bind does not
5692 : * succeed within PGLDAP_TIMEOUT seconds (return 2 to continue parsing the
5693 : * service control file) and the case where querying the LDAP server fails
5694 : * (return 1 to end parsing).
5695 : *
5696 : * Unfortunately there is no way of setting a timeout that works for both
5697 : * Windows and OpenLDAP.
5698 : */
5699 : #ifdef WIN32
5700 : /* the nonstandard ldap_connect function performs an anonymous bind */
5701 : if (ldap_connect(ld, &time) != LDAP_SUCCESS)
5702 : {
5703 : /* error or timeout in ldap_connect */
5704 : free(url);
5705 : ldap_unbind(ld);
5706 : return 2;
5707 : }
5708 : #else /* !WIN32 */
5709 : /* in OpenLDAP, use the LDAP_OPT_NETWORK_TIMEOUT option */
5710 7 : if (ldap_set_option(ld, LDAP_OPT_NETWORK_TIMEOUT, &time) != LDAP_SUCCESS)
5711 : {
5712 0 : free(url);
5713 0 : ldap_unbind(ld);
5714 0 : return 3;
5715 : }
5716 :
5717 : /* anonymous bind */
5718 7 : if ((msgid = ldap_simple_bind(ld, NULL, NULL)) == -1)
5719 : {
5720 : /* error or network timeout */
5721 1 : free(url);
5722 1 : ldap_unbind(ld);
5723 1 : return 2;
5724 : }
5725 :
5726 : /* wait some time for the connection to succeed */
5727 6 : res = NULL;
5728 6 : if ((rc = ldap_result(ld, msgid, LDAP_MSG_ALL, &time, &res)) == -1 ||
5729 6 : res == NULL)
5730 : {
5731 : /* error or timeout */
5732 0 : if (res != NULL)
5733 0 : ldap_msgfree(res);
5734 0 : free(url);
5735 0 : ldap_unbind(ld);
5736 0 : return 2;
5737 : }
5738 6 : ldap_msgfree(res);
5739 :
5740 : /* reset timeout */
5741 6 : time.tv_sec = -1;
5742 6 : if (ldap_set_option(ld, LDAP_OPT_NETWORK_TIMEOUT, &time) != LDAP_SUCCESS)
5743 : {
5744 0 : free(url);
5745 0 : ldap_unbind(ld);
5746 0 : return 3;
5747 : }
5748 : #endif /* WIN32 */
5749 :
5750 : /* search */
5751 6 : res = NULL;
5752 6 : if ((rc = ldap_search_st(ld, dn, scope, filter, attrs, 0, &time, &res))
5753 : != LDAP_SUCCESS)
5754 : {
5755 0 : if (res != NULL)
5756 0 : ldap_msgfree(res);
5757 0 : libpq_append_error(errorMessage, "lookup on LDAP server failed: %s", ldap_err2string(rc));
5758 0 : ldap_unbind(ld);
5759 0 : free(url);
5760 0 : return 1;
5761 : }
5762 :
5763 : /* complain if there was not exactly one result */
5764 6 : if ((rc = ldap_count_entries(ld, res)) != 1)
5765 : {
5766 0 : if (rc > 1)
5767 0 : libpq_append_error(errorMessage, "more than one entry found on LDAP lookup");
5768 : else
5769 0 : libpq_append_error(errorMessage, "no entry found on LDAP lookup");
5770 0 : ldap_msgfree(res);
5771 0 : ldap_unbind(ld);
5772 0 : free(url);
5773 0 : return 1;
5774 : }
5775 :
5776 : /* get entry */
5777 6 : if ((entry = ldap_first_entry(ld, res)) == NULL)
5778 : {
5779 : /* should never happen */
5780 0 : libpq_append_error(errorMessage, "no entry found on LDAP lookup");
5781 0 : ldap_msgfree(res);
5782 0 : ldap_unbind(ld);
5783 0 : free(url);
5784 0 : return 1;
5785 : }
5786 :
5787 : /* get values */
5788 6 : if ((values = ldap_get_values_len(ld, entry, attrs[0])) == NULL)
5789 : {
5790 0 : libpq_append_error(errorMessage, "attribute has no values on LDAP lookup");
5791 0 : ldap_msgfree(res);
5792 0 : ldap_unbind(ld);
5793 0 : free(url);
5794 0 : return 1;
5795 : }
5796 :
5797 6 : ldap_msgfree(res);
5798 6 : free(url);
5799 :
5800 6 : if (values[0] == NULL)
5801 : {
5802 0 : libpq_append_error(errorMessage, "attribute has no values on LDAP lookup");
5803 0 : ldap_value_free_len(values);
5804 0 : ldap_unbind(ld);
5805 0 : return 1;
5806 : }
5807 :
5808 : /* concatenate values into a single string with newline terminators */
5809 6 : size = 1; /* for the trailing null */
5810 18 : for (i = 0; values[i] != NULL; i++)
5811 : {
5812 12 : if (values[i]->bv_len >= INT_MAX ||
5813 12 : size > (INT_MAX - (values[i]->bv_len + 1)))
5814 : {
5815 0 : libpq_append_error(errorMessage,
5816 : "connection info string size exceeds the maximum allowed (%d)",
5817 : INT_MAX);
5818 0 : ldap_value_free_len(values);
5819 0 : ldap_unbind(ld);
5820 0 : return 3;
5821 : }
5822 :
5823 12 : size += values[i]->bv_len + 1;
5824 : }
5825 :
5826 6 : if ((result = malloc(size)) == NULL)
5827 : {
5828 0 : libpq_append_error(errorMessage, "out of memory");
5829 0 : ldap_value_free_len(values);
5830 0 : ldap_unbind(ld);
5831 0 : return 3;
5832 : }
5833 6 : p = result;
5834 18 : for (i = 0; values[i] != NULL; i++)
5835 : {
5836 12 : memcpy(p, values[i]->bv_val, values[i]->bv_len);
5837 12 : p += values[i]->bv_len;
5838 12 : *(p++) = '\n';
5839 : }
5840 6 : *p = '\0';
5841 :
5842 6 : ldap_value_free_len(values);
5843 6 : ldap_unbind(ld);
5844 :
5845 : /* parse result string */
5846 6 : oldstate = state = 0;
5847 198 : for (p = result; *p != '\0'; ++p)
5848 : {
5849 192 : switch (state)
5850 : {
5851 12 : case 0: /* between entries */
5852 12 : if (!ld_is_sp_tab(*p) && !ld_is_nl_cr(*p))
5853 : {
5854 12 : optname = p;
5855 12 : state = 1;
5856 : }
5857 12 : break;
5858 48 : case 1: /* in option name */
5859 48 : if (ld_is_sp_tab(*p))
5860 : {
5861 0 : *p = '\0';
5862 0 : state = 2;
5863 : }
5864 48 : else if (ld_is_nl_cr(*p))
5865 : {
5866 0 : libpq_append_error(errorMessage,
5867 : "missing \"=\" after \"%s\" in connection info string",
5868 : optname);
5869 0 : free(result);
5870 0 : return 3;
5871 : }
5872 48 : else if (*p == '=')
5873 : {
5874 12 : *p = '\0';
5875 12 : state = 3;
5876 : }
5877 48 : break;
5878 0 : case 2: /* after option name */
5879 0 : if (*p == '=')
5880 : {
5881 0 : state = 3;
5882 : }
5883 0 : else if (!ld_is_sp_tab(*p))
5884 : {
5885 0 : libpq_append_error(errorMessage,
5886 : "missing \"=\" after \"%s\" in connection info string",
5887 : optname);
5888 0 : free(result);
5889 0 : return 3;
5890 : }
5891 0 : break;
5892 12 : case 3: /* before option value */
5893 12 : if (*p == '\'')
5894 : {
5895 0 : optval = p + 1;
5896 0 : p1 = p + 1;
5897 0 : state = 5;
5898 : }
5899 12 : else if (ld_is_nl_cr(*p))
5900 : {
5901 0 : optval = optname + strlen(optname); /* empty */
5902 0 : state = 0;
5903 : }
5904 12 : else if (!ld_is_sp_tab(*p))
5905 : {
5906 12 : optval = p;
5907 12 : state = 4;
5908 : }
5909 12 : break;
5910 120 : case 4: /* in unquoted option value */
5911 120 : if (ld_is_sp_tab(*p) || ld_is_nl_cr(*p))
5912 : {
5913 12 : *p = '\0';
5914 12 : state = 0;
5915 : }
5916 120 : break;
5917 0 : case 5: /* in quoted option value */
5918 0 : if (*p == '\'')
5919 : {
5920 0 : *p1 = '\0';
5921 0 : state = 0;
5922 : }
5923 0 : else if (*p == '\\')
5924 0 : state = 6;
5925 : else
5926 0 : *(p1++) = *p;
5927 0 : break;
5928 0 : case 6: /* in quoted option value after escape */
5929 0 : *(p1++) = *p;
5930 0 : state = 5;
5931 0 : break;
5932 : }
5933 :
5934 192 : if (state == 0 && oldstate != 0)
5935 : {
5936 12 : found_keyword = false;
5937 120 : for (i = 0; options[i].keyword; i++)
5938 : {
5939 120 : if (strcmp(options[i].keyword, optname) == 0)
5940 : {
5941 12 : if (options[i].val == NULL)
5942 : {
5943 12 : options[i].val = strdup(optval);
5944 12 : if (!options[i].val)
5945 : {
5946 0 : libpq_append_error(errorMessage, "out of memory");
5947 0 : free(result);
5948 0 : return 3;
5949 : }
5950 : }
5951 12 : found_keyword = true;
5952 12 : break;
5953 : }
5954 : }
5955 12 : if (!found_keyword)
5956 : {
5957 0 : libpq_append_error(errorMessage, "invalid connection option \"%s\"", optname);
5958 0 : free(result);
5959 0 : return 1;
5960 : }
5961 12 : optname = NULL;
5962 12 : optval = NULL;
5963 : }
5964 192 : oldstate = state;
5965 : }
5966 :
5967 6 : free(result);
5968 :
5969 6 : if (state == 5 || state == 6)
5970 : {
5971 0 : libpq_append_error(errorMessage,
5972 : "unterminated quoted string in connection info string");
5973 0 : return 3;
5974 : }
5975 :
5976 6 : return 0;
5977 : }
5978 :
5979 : #endif /* USE_LDAP */
5980 :
5981 : /*
5982 : * parseServiceInfo: if a service name has been given, look it up and absorb
5983 : * connection options from it into *options.
5984 : *
5985 : * Returns 0 on success, nonzero on failure. On failure, if errorMessage
5986 : * isn't null, also store an error message there. (Note: the only reason
5987 : * this function and related ones don't dump core on errorMessage == NULL
5988 : * is the undocumented fact that appendPQExpBuffer does nothing when passed
5989 : * a null PQExpBuffer pointer.)
5990 : */
5991 : static int
5992 15660 : parseServiceInfo(PQconninfoOption *options, PQExpBuffer errorMessage)
5993 : {
5994 15660 : const char *service = conninfo_getval(options, "service");
5995 15660 : const char *service_fname = conninfo_getval(options, "servicefile");
5996 : char serviceFile[MAXPGPATH];
5997 : char *env;
5998 15660 : bool group_found = false;
5999 : int status;
6000 : struct stat stat_buf;
6001 :
6002 : /*
6003 : * We have to special-case the environment variable PGSERVICE here, since
6004 : * this is and should be called before inserting environment defaults for
6005 : * other connection options.
6006 : */
6007 15660 : if (service == NULL)
6008 15639 : service = getenv("PGSERVICE");
6009 :
6010 : /* If no service name given, nothing to do */
6011 15660 : if (service == NULL)
6012 15629 : return 0;
6013 :
6014 : /*
6015 : * First, try the "servicefile" option in connection string. Then, try
6016 : * the PGSERVICEFILE environment variable. Finally, check
6017 : * ~/.pg_service.conf (if that exists).
6018 : */
6019 31 : if (service_fname != NULL)
6020 5 : strlcpy(serviceFile, service_fname, sizeof(serviceFile));
6021 26 : else if ((env = getenv("PGSERVICEFILE")) != NULL)
6022 26 : strlcpy(serviceFile, env, sizeof(serviceFile));
6023 : else
6024 : {
6025 : char homedir[MAXPGPATH];
6026 :
6027 0 : if (!pqGetHomeDirectory(homedir, sizeof(homedir)))
6028 0 : goto next_file;
6029 0 : snprintf(serviceFile, MAXPGPATH, "%s/%s", homedir, ".pg_service.conf");
6030 0 : if (stat(serviceFile, &stat_buf) != 0)
6031 0 : goto next_file;
6032 : }
6033 :
6034 31 : status = parseServiceFile(serviceFile, service, options, errorMessage, &group_found);
6035 31 : if (group_found || status != 0)
6036 17 : return status;
6037 :
6038 14 : next_file:
6039 :
6040 : /*
6041 : * This could be used by any application so we can't use the binary
6042 : * location to find our config files.
6043 : */
6044 28 : snprintf(serviceFile, MAXPGPATH, "%s/pg_service.conf",
6045 28 : getenv("PGSYSCONFDIR") ? getenv("PGSYSCONFDIR") : SYSCONFDIR);
6046 14 : if (stat(serviceFile, &stat_buf) != 0)
6047 4 : goto last_file;
6048 :
6049 10 : status = parseServiceFile(serviceFile, service, options, errorMessage, &group_found);
6050 10 : if (status != 0)
6051 0 : return status;
6052 :
6053 10 : last_file:
6054 14 : if (!group_found)
6055 : {
6056 8 : libpq_append_error(errorMessage, "definition of service \"%s\" not found", service);
6057 8 : return 3;
6058 : }
6059 :
6060 6 : return 0;
6061 : }
6062 :
6063 : static int
6064 41 : parseServiceFile(const char *serviceFile,
6065 : const char *service,
6066 : PQconninfoOption *options,
6067 : PQExpBuffer errorMessage,
6068 : bool *group_found)
6069 : {
6070 41 : int result = 0,
6071 41 : linenr = 0,
6072 : i;
6073 : FILE *f;
6074 : char *line;
6075 : char buf[1024];
6076 :
6077 41 : *group_found = false;
6078 :
6079 41 : f = fopen(serviceFile, "r");
6080 41 : if (f == NULL)
6081 : {
6082 3 : libpq_append_error(errorMessage, "service file \"%s\" not found", serviceFile);
6083 3 : return 1;
6084 : }
6085 :
6086 120 : while ((line = fgets(buf, sizeof(buf), f)) != NULL)
6087 : {
6088 : int len;
6089 :
6090 90 : linenr++;
6091 :
6092 90 : if (strlen(line) >= sizeof(buf) - 1)
6093 : {
6094 0 : libpq_append_error(errorMessage,
6095 : "line %d too long in service file \"%s\"",
6096 : linenr,
6097 : serviceFile);
6098 0 : result = 2;
6099 0 : goto exit;
6100 : }
6101 :
6102 : /* ignore whitespace at end of line, especially the newline */
6103 90 : len = strlen(line);
6104 180 : while (len > 0 && isspace((unsigned char) line[len - 1]))
6105 90 : line[--len] = '\0';
6106 :
6107 : /* ignore leading whitespace too */
6108 90 : while (*line && isspace((unsigned char) line[0]))
6109 0 : line++;
6110 :
6111 : /* ignore comments and empty lines */
6112 90 : if (line[0] == '\0' || line[0] == '#')
6113 15 : continue;
6114 :
6115 : /* Check for right groupname */
6116 75 : if (line[0] == '[')
6117 : {
6118 28 : if (*group_found)
6119 : {
6120 : /* end of desired group reached; return success */
6121 0 : goto exit;
6122 : }
6123 :
6124 28 : if (strncmp(line + 1, service, strlen(service)) == 0 &&
6125 20 : line[strlen(service) + 1] == ']')
6126 20 : *group_found = true;
6127 : else
6128 8 : *group_found = false;
6129 : }
6130 : else
6131 : {
6132 47 : if (*group_found)
6133 : {
6134 : /*
6135 : * Finally, we are in the right group and can parse the line
6136 : */
6137 : char *key,
6138 : *val;
6139 : bool found_keyword;
6140 :
6141 : #ifdef USE_LDAP
6142 35 : if (strncmp(line, "ldap", 4) == 0)
6143 : {
6144 7 : int rc = ldapServiceLookup(line, options, errorMessage);
6145 :
6146 : /* if rc = 2, go on reading for fallback */
6147 7 : switch (rc)
6148 : {
6149 6 : case 0:
6150 6 : goto exit;
6151 0 : case 1:
6152 : case 3:
6153 0 : result = 3;
6154 0 : goto exit;
6155 1 : case 2:
6156 1 : continue;
6157 : }
6158 : }
6159 : #endif
6160 :
6161 28 : key = line;
6162 28 : val = strchr(line, '=');
6163 28 : if (val == NULL)
6164 : {
6165 0 : libpq_append_error(errorMessage,
6166 : "syntax error in service file \"%s\", line %d",
6167 : serviceFile,
6168 : linenr);
6169 0 : result = 3;
6170 0 : goto exit;
6171 : }
6172 28 : *val++ = '\0';
6173 :
6174 28 : if (strcmp(key, "service") == 0)
6175 : {
6176 1 : libpq_append_error(errorMessage,
6177 : "nested \"service\" specifications not supported in service file \"%s\", line %d",
6178 : serviceFile,
6179 : linenr);
6180 1 : result = 3;
6181 1 : goto exit;
6182 : }
6183 :
6184 27 : if (strcmp(key, "servicefile") == 0)
6185 : {
6186 1 : libpq_append_error(errorMessage,
6187 : "nested \"servicefile\" specifications not supported in service file \"%s\", line %d",
6188 : serviceFile,
6189 : linenr);
6190 1 : result = 3;
6191 1 : goto exit;
6192 : }
6193 :
6194 : /*
6195 : * Set the parameter --- but don't override any previous
6196 : * explicit setting.
6197 : */
6198 26 : found_keyword = false;
6199 260 : for (i = 0; options[i].keyword; i++)
6200 : {
6201 260 : if (strcmp(options[i].keyword, key) == 0)
6202 : {
6203 26 : if (options[i].val == NULL)
6204 26 : options[i].val = strdup(val);
6205 26 : if (!options[i].val)
6206 : {
6207 0 : libpq_append_error(errorMessage, "out of memory");
6208 0 : result = 3;
6209 0 : goto exit;
6210 : }
6211 26 : found_keyword = true;
6212 26 : break;
6213 : }
6214 : }
6215 :
6216 26 : if (!found_keyword)
6217 : {
6218 0 : libpq_append_error(errorMessage,
6219 : "syntax error in service file \"%s\", line %d",
6220 : serviceFile,
6221 : linenr);
6222 0 : result = 3;
6223 0 : goto exit;
6224 : }
6225 : }
6226 : }
6227 : }
6228 :
6229 30 : exit:
6230 :
6231 : /*
6232 : * If a service has been successfully found, set the "servicefile" option
6233 : * if not already set. This matters when we use a default service file or
6234 : * PGSERVICEFILE, where we want to be able track the value.
6235 : */
6236 38 : if (*group_found && result == 0)
6237 : {
6238 36 : for (i = 0; options[i].keyword; i++)
6239 : {
6240 36 : if (strcmp(options[i].keyword, "servicefile") != 0)
6241 18 : continue;
6242 :
6243 : /* If value is already set, nothing to do */
6244 18 : if (options[i].val != NULL)
6245 5 : break;
6246 :
6247 13 : options[i].val = strdup(serviceFile);
6248 13 : if (options[i].val == NULL)
6249 : {
6250 0 : libpq_append_error(errorMessage, "out of memory");
6251 0 : result = 3;
6252 : }
6253 13 : break;
6254 : }
6255 : }
6256 :
6257 38 : fclose(f);
6258 :
6259 38 : return result;
6260 : }
6261 :
6262 :
6263 : /*
6264 : * PQconninfoParse
6265 : *
6266 : * Parse a string like PQconnectdb() would do and return the
6267 : * resulting connection options array. NULL is returned on failure.
6268 : * The result contains only options specified directly in the string,
6269 : * not any possible default values.
6270 : *
6271 : * If errmsg isn't NULL, *errmsg is set to NULL on success, or a malloc'd
6272 : * string on failure (use PQfreemem to free it). In out-of-memory conditions
6273 : * both *errmsg and the result could be NULL.
6274 : *
6275 : * NOTE: the returned array is dynamically allocated and should
6276 : * be freed when no longer needed via PQconninfoFree().
6277 : */
6278 : PQconninfoOption *
6279 2216 : PQconninfoParse(const char *conninfo, char **errmsg)
6280 : {
6281 : PQExpBufferData errorBuf;
6282 : PQconninfoOption *connOptions;
6283 :
6284 2216 : if (errmsg)
6285 2201 : *errmsg = NULL; /* default */
6286 2216 : initPQExpBuffer(&errorBuf);
6287 2216 : if (PQExpBufferDataBroken(errorBuf))
6288 0 : return NULL; /* out of memory already :-( */
6289 2216 : connOptions = parse_connection_string(conninfo, &errorBuf, false);
6290 2216 : if (connOptions == NULL && errmsg)
6291 28 : *errmsg = errorBuf.data;
6292 : else
6293 2188 : termPQExpBuffer(&errorBuf);
6294 2216 : return connOptions;
6295 : }
6296 :
6297 : /*
6298 : * Build a working copy of the constant PQconninfoOptions array.
6299 : */
6300 : static PQconninfoOption *
6301 48712 : conninfo_init(PQExpBuffer errorMessage)
6302 : {
6303 : PQconninfoOption *options;
6304 : PQconninfoOption *opt_dest;
6305 : const internalPQconninfoOption *cur_opt;
6306 :
6307 : /*
6308 : * Get enough memory for all options in PQconninfoOptions, even if some
6309 : * end up being filtered out.
6310 : */
6311 48712 : options = (PQconninfoOption *) malloc(sizeof(PQconninfoOption) * sizeof(PQconninfoOptions) / sizeof(PQconninfoOptions[0]));
6312 48712 : if (options == NULL)
6313 : {
6314 0 : libpq_append_error(errorMessage, "out of memory");
6315 0 : return NULL;
6316 : }
6317 48712 : opt_dest = options;
6318 :
6319 2581736 : for (cur_opt = PQconninfoOptions; cur_opt->keyword; cur_opt++)
6320 : {
6321 : /* Only copy the public part of the struct, not the full internal */
6322 2533024 : memcpy(opt_dest, cur_opt, sizeof(PQconninfoOption));
6323 2533024 : opt_dest++;
6324 : }
6325 389696 : MemSet(opt_dest, 0, sizeof(PQconninfoOption));
6326 :
6327 48712 : return options;
6328 : }
6329 :
6330 : /*
6331 : * Connection string parser
6332 : *
6333 : * Returns a malloc'd PQconninfoOption array, if parsing is successful.
6334 : * Otherwise, NULL is returned and an error message is added to errorMessage.
6335 : *
6336 : * If use_defaults is true, default values are filled in (from a service file,
6337 : * environment variables, etc).
6338 : */
6339 : static PQconninfoOption *
6340 13519 : parse_connection_string(const char *connstr, PQExpBuffer errorMessage,
6341 : bool use_defaults)
6342 : {
6343 : /* Parse as URI if connection string matches URI prefix */
6344 13519 : if (uri_prefix_length(connstr) != 0)
6345 68 : return conninfo_uri_parse(connstr, errorMessage, use_defaults);
6346 :
6347 : /* Parse as default otherwise */
6348 13451 : return conninfo_parse(connstr, errorMessage, use_defaults);
6349 : }
6350 :
6351 : /*
6352 : * Checks if connection string starts with either of the valid URI prefix
6353 : * designators.
6354 : *
6355 : * Returns the URI prefix length, 0 if the string doesn't contain a URI prefix.
6356 : *
6357 : * XXX this is duplicated in psql/common.c.
6358 : */
6359 : static int
6360 27213 : uri_prefix_length(const char *connstr)
6361 : {
6362 27213 : if (strncmp(connstr, uri_designator,
6363 : sizeof(uri_designator) - 1) == 0)
6364 92 : return sizeof(uri_designator) - 1;
6365 :
6366 27121 : if (strncmp(connstr, short_uri_designator,
6367 : sizeof(short_uri_designator) - 1) == 0)
6368 50 : return sizeof(short_uri_designator) - 1;
6369 :
6370 27071 : return 0;
6371 : }
6372 :
6373 : /*
6374 : * Recognized connection string either starts with a valid URI prefix or
6375 : * contains a "=" in it.
6376 : *
6377 : * Must be consistent with parse_connection_string: anything for which this
6378 : * returns true should at least look like it's parseable by that routine.
6379 : *
6380 : * XXX this is duplicated in psql/common.c
6381 : */
6382 : static bool
6383 13626 : recognized_connection_string(const char *connstr)
6384 : {
6385 13626 : return uri_prefix_length(connstr) != 0 || strchr(connstr, '=') != NULL;
6386 : }
6387 :
6388 : /*
6389 : * Subroutine for parse_connection_string
6390 : *
6391 : * Deal with a string containing key=value pairs.
6392 : */
6393 : static PQconninfoOption *
6394 13451 : conninfo_parse(const char *conninfo, PQExpBuffer errorMessage,
6395 : bool use_defaults)
6396 : {
6397 : char *pname;
6398 : char *pval;
6399 : char *buf;
6400 : char *cp;
6401 : char *cp2;
6402 : PQconninfoOption *options;
6403 :
6404 : /* Make a working copy of PQconninfoOptions */
6405 13451 : options = conninfo_init(errorMessage);
6406 13451 : if (options == NULL)
6407 0 : return NULL;
6408 :
6409 : /* Need a modifiable copy of the input string */
6410 13451 : if ((buf = strdup(conninfo)) == NULL)
6411 : {
6412 0 : libpq_append_error(errorMessage, "out of memory");
6413 0 : PQconninfoFree(options);
6414 0 : return NULL;
6415 : }
6416 13451 : cp = buf;
6417 :
6418 55060 : while (*cp)
6419 : {
6420 : /* Skip blanks before the parameter name */
6421 41624 : if (isspace((unsigned char) *cp))
6422 : {
6423 557 : cp++;
6424 557 : continue;
6425 : }
6426 :
6427 : /* Get the parameter name */
6428 41067 : pname = cp;
6429 249634 : while (*cp)
6430 : {
6431 249623 : if (*cp == '=')
6432 40946 : break;
6433 208677 : if (isspace((unsigned char) *cp))
6434 : {
6435 110 : *cp++ = '\0';
6436 110 : while (*cp)
6437 : {
6438 110 : if (!isspace((unsigned char) *cp))
6439 110 : break;
6440 0 : cp++;
6441 : }
6442 110 : break;
6443 : }
6444 208567 : cp++;
6445 : }
6446 :
6447 : /* Check that there is a following '=' */
6448 41067 : if (*cp != '=')
6449 : {
6450 11 : libpq_append_error(errorMessage,
6451 : "missing \"=\" after \"%s\" in connection info string",
6452 : pname);
6453 11 : PQconninfoFree(options);
6454 11 : free(buf);
6455 11 : return NULL;
6456 : }
6457 41056 : *cp++ = '\0';
6458 :
6459 : /* Skip blanks after the '=' */
6460 41166 : while (*cp)
6461 : {
6462 41151 : if (!isspace((unsigned char) *cp))
6463 41041 : break;
6464 110 : cp++;
6465 : }
6466 :
6467 : /* Get the parameter value */
6468 41056 : pval = cp;
6469 :
6470 41056 : if (*cp != '\'')
6471 : {
6472 31514 : cp2 = pval;
6473 347382 : while (*cp)
6474 : {
6475 343113 : if (isspace((unsigned char) *cp))
6476 : {
6477 27245 : *cp++ = '\0';
6478 27245 : break;
6479 : }
6480 315868 : if (*cp == '\\')
6481 : {
6482 1 : cp++;
6483 1 : if (*cp != '\0')
6484 1 : *cp2++ = *cp++;
6485 : }
6486 : else
6487 315867 : *cp2++ = *cp++;
6488 : }
6489 31514 : *cp2 = '\0';
6490 : }
6491 : else
6492 : {
6493 9542 : cp2 = pval;
6494 9542 : cp++;
6495 : for (;;)
6496 : {
6497 100540 : if (*cp == '\0')
6498 : {
6499 0 : libpq_append_error(errorMessage, "unterminated quoted string in connection info string");
6500 0 : PQconninfoFree(options);
6501 0 : free(buf);
6502 0 : return NULL;
6503 : }
6504 100540 : if (*cp == '\\')
6505 : {
6506 689 : cp++;
6507 689 : if (*cp != '\0')
6508 689 : *cp2++ = *cp++;
6509 689 : continue;
6510 : }
6511 99851 : if (*cp == '\'')
6512 : {
6513 9542 : *cp2 = '\0';
6514 9542 : cp++;
6515 9542 : break;
6516 : }
6517 90309 : *cp2++ = *cp++;
6518 : }
6519 : }
6520 :
6521 : /*
6522 : * Now that we have the name and the value, store the record.
6523 : */
6524 41056 : if (!conninfo_storeval(options, pname, pval, errorMessage, false, false))
6525 : {
6526 4 : PQconninfoFree(options);
6527 4 : free(buf);
6528 4 : return NULL;
6529 : }
6530 : }
6531 :
6532 : /* Done with the modifiable input string */
6533 13436 : free(buf);
6534 :
6535 : /*
6536 : * Add in defaults if the caller wants that.
6537 : */
6538 13436 : if (use_defaults)
6539 : {
6540 1293 : if (!conninfo_add_defaults(options, errorMessage))
6541 : {
6542 0 : PQconninfoFree(options);
6543 0 : return NULL;
6544 : }
6545 : }
6546 :
6547 13436 : return options;
6548 : }
6549 :
6550 : /*
6551 : * Conninfo array parser routine
6552 : *
6553 : * If successful, a malloc'd PQconninfoOption array is returned.
6554 : * If not successful, NULL is returned and an error message is
6555 : * appended to errorMessage.
6556 : * Defaults are supplied (from a service file, environment variables, etc)
6557 : * for unspecified options, but only if use_defaults is true.
6558 : *
6559 : * If expand_dbname is non-zero, and the value passed for the first occurrence
6560 : * of "dbname" keyword is a connection string (as indicated by
6561 : * recognized_connection_string) then parse and process it, overriding any
6562 : * previously processed conflicting keywords. Subsequent keywords will take
6563 : * precedence, however. In-tree programs generally specify expand_dbname=true,
6564 : * so command-line arguments naming a database can use a connection string.
6565 : * Some code acquires arbitrary database names from known-literal sources like
6566 : * PQdb(), PQconninfoParse() and pg_database.datname. When connecting to such
6567 : * a database, in-tree code first wraps the name in a connection string.
6568 : */
6569 : static PQconninfoOption *
6570 14243 : conninfo_array_parse(const char *const *keywords, const char *const *values,
6571 : PQExpBuffer errorMessage, bool use_defaults,
6572 : int expand_dbname)
6573 : {
6574 : PQconninfoOption *options;
6575 14243 : PQconninfoOption *dbname_options = NULL;
6576 : PQconninfoOption *option;
6577 14243 : int i = 0;
6578 :
6579 : /*
6580 : * If expand_dbname is non-zero, check keyword "dbname" to see if val is
6581 : * actually a recognized connection string.
6582 : */
6583 58508 : while (expand_dbname && keywords[i])
6584 : {
6585 57891 : const char *pname = keywords[i];
6586 57891 : const char *pvalue = values[i];
6587 :
6588 : /* first find "dbname" if any */
6589 57891 : if (strcmp(pname, "dbname") == 0 && pvalue)
6590 : {
6591 : /*
6592 : * If value is a connection string, parse it, but do not use
6593 : * defaults here -- those get picked up later. We only want to
6594 : * override for those parameters actually passed.
6595 : */
6596 13626 : if (recognized_connection_string(pvalue))
6597 : {
6598 10008 : dbname_options = parse_connection_string(pvalue, errorMessage, false);
6599 10008 : if (dbname_options == NULL)
6600 0 : return NULL;
6601 : }
6602 13626 : break;
6603 : }
6604 44265 : ++i;
6605 : }
6606 :
6607 : /* Make a working copy of PQconninfoOptions */
6608 14243 : options = conninfo_init(errorMessage);
6609 14243 : if (options == NULL)
6610 : {
6611 0 : PQconninfoFree(dbname_options);
6612 0 : return NULL;
6613 : }
6614 :
6615 : /* Parse the keywords/values arrays */
6616 14243 : i = 0;
6617 106172 : while (keywords[i])
6618 : {
6619 91929 : const char *pname = keywords[i];
6620 91929 : const char *pvalue = values[i];
6621 :
6622 91929 : if (pvalue != NULL && pvalue[0] != '\0')
6623 : {
6624 : /* Search for the param record */
6625 534734 : for (option = options; option->keyword != NULL; option++)
6626 : {
6627 534734 : if (strcmp(option->keyword, pname) == 0)
6628 38290 : break;
6629 : }
6630 :
6631 : /* Check for invalid connection option */
6632 38290 : if (option->keyword == NULL)
6633 : {
6634 0 : libpq_append_error(errorMessage, "invalid connection option \"%s\"", pname);
6635 0 : PQconninfoFree(options);
6636 0 : PQconninfoFree(dbname_options);
6637 0 : return NULL;
6638 : }
6639 :
6640 : /*
6641 : * If we are on the first dbname parameter, and we have a parsed
6642 : * connection string, copy those parameters across, overriding any
6643 : * existing previous settings.
6644 : */
6645 38290 : if (strcmp(pname, "dbname") == 0 && dbname_options)
6646 10008 : {
6647 : PQconninfoOption *str_option;
6648 :
6649 530424 : for (str_option = dbname_options; str_option->keyword != NULL; str_option++)
6650 : {
6651 520416 : if (str_option->val != NULL)
6652 : {
6653 : int k;
6654 :
6655 308778 : for (k = 0; options[k].keyword; k++)
6656 : {
6657 308778 : if (strcmp(options[k].keyword, str_option->keyword) == 0)
6658 : {
6659 30802 : free(options[k].val);
6660 30802 : options[k].val = strdup(str_option->val);
6661 30802 : if (!options[k].val)
6662 : {
6663 0 : libpq_append_error(errorMessage, "out of memory");
6664 0 : PQconninfoFree(options);
6665 0 : PQconninfoFree(dbname_options);
6666 0 : return NULL;
6667 : }
6668 30802 : break;
6669 : }
6670 : }
6671 : }
6672 : }
6673 :
6674 : /*
6675 : * Forget the parsed connection string, so that any subsequent
6676 : * dbname parameters will not be expanded.
6677 : */
6678 10008 : PQconninfoFree(dbname_options);
6679 10008 : dbname_options = NULL;
6680 : }
6681 : else
6682 : {
6683 : /*
6684 : * Store the value, overriding previous settings
6685 : */
6686 28282 : free(option->val);
6687 28282 : option->val = strdup(pvalue);
6688 28282 : if (!option->val)
6689 : {
6690 0 : libpq_append_error(errorMessage, "out of memory");
6691 0 : PQconninfoFree(options);
6692 0 : PQconninfoFree(dbname_options);
6693 0 : return NULL;
6694 : }
6695 : }
6696 : }
6697 91929 : ++i;
6698 : }
6699 14243 : PQconninfoFree(dbname_options);
6700 :
6701 : /*
6702 : * Add in defaults if the caller wants that.
6703 : */
6704 14243 : if (use_defaults)
6705 : {
6706 14243 : if (!conninfo_add_defaults(options, errorMessage))
6707 : {
6708 13 : PQconninfoFree(options);
6709 13 : return NULL;
6710 : }
6711 : }
6712 :
6713 14230 : return options;
6714 : }
6715 :
6716 : /*
6717 : * Add the default values for any unspecified options to the connection
6718 : * options array.
6719 : *
6720 : * Defaults are obtained from a service file, environment variables, etc.
6721 : *
6722 : * Returns true if successful, otherwise false; errorMessage, if supplied,
6723 : * is filled in upon failure. Note that failure to locate a default value
6724 : * is not an error condition here --- we just leave the option's value as
6725 : * NULL.
6726 : */
6727 : static bool
6728 15660 : conninfo_add_defaults(PQconninfoOption *options, PQExpBuffer errorMessage)
6729 : {
6730 : PQconninfoOption *option;
6731 15660 : PQconninfoOption *sslmode_default = NULL,
6732 15660 : *sslrootcert = NULL;
6733 : char *tmp;
6734 :
6735 : /*
6736 : * If there's a service spec, use it to obtain any not-explicitly-given
6737 : * parameters. Ignore error if no error message buffer is passed because
6738 : * there is no way to pass back the failure message.
6739 : */
6740 15660 : if (parseServiceInfo(options, errorMessage) != 0 && errorMessage)
6741 13 : return false;
6742 :
6743 : /*
6744 : * Get the fallback resources for parameters not specified in the conninfo
6745 : * string nor the service.
6746 : */
6747 829291 : for (option = options; option->keyword != NULL; option++)
6748 : {
6749 813644 : if (strcmp(option->keyword, "sslrootcert") == 0)
6750 15647 : sslrootcert = option; /* save for later */
6751 :
6752 813644 : if (option->val != NULL)
6753 62354 : continue; /* Value was in conninfo or service */
6754 :
6755 : /*
6756 : * Try to get the environment variable fallback
6757 : */
6758 751290 : if (option->envvar != NULL)
6759 : {
6760 531797 : if ((tmp = getenv(option->envvar)) != NULL)
6761 : {
6762 26597 : option->val = strdup(tmp);
6763 26597 : if (!option->val)
6764 : {
6765 0 : if (errorMessage)
6766 0 : libpq_append_error(errorMessage, "out of memory");
6767 0 : return false;
6768 : }
6769 26597 : continue;
6770 : }
6771 : }
6772 :
6773 : /*
6774 : * Interpret the deprecated PGREQUIRESSL environment variable. Per
6775 : * tradition, translate values starting with "1" to sslmode=require,
6776 : * and ignore other values. Given both PGREQUIRESSL=1 and PGSSLMODE,
6777 : * PGSSLMODE takes precedence; the opposite was true before v9.3.
6778 : */
6779 724693 : if (strcmp(option->keyword, "sslmode") == 0)
6780 : {
6781 15200 : const char *requiresslenv = getenv("PGREQUIRESSL");
6782 :
6783 15200 : if (requiresslenv != NULL && requiresslenv[0] == '1')
6784 : {
6785 0 : option->val = strdup("require");
6786 0 : if (!option->val)
6787 : {
6788 0 : if (errorMessage)
6789 0 : libpq_append_error(errorMessage, "out of memory");
6790 0 : return false;
6791 : }
6792 0 : continue;
6793 : }
6794 :
6795 : /*
6796 : * sslmode is not specified. Let it be filled in with the compiled
6797 : * default for now, but if sslrootcert=system, we'll override the
6798 : * default later before returning.
6799 : */
6800 15200 : sslmode_default = option;
6801 : }
6802 :
6803 : /*
6804 : * No environment variable specified or the variable isn't set - try
6805 : * compiled-in default
6806 : */
6807 724693 : if (option->compiled != NULL)
6808 : {
6809 179979 : option->val = strdup(option->compiled);
6810 179979 : if (!option->val)
6811 : {
6812 0 : if (errorMessage)
6813 0 : libpq_append_error(errorMessage, "out of memory");
6814 0 : return false;
6815 : }
6816 179979 : continue;
6817 : }
6818 :
6819 : /*
6820 : * Special handling for "user" option. Note that if pg_fe_getauthname
6821 : * fails, we just leave the value as NULL; there's no need for this to
6822 : * be an error condition if the caller provides a user name. The only
6823 : * reason we do this now at all is so that callers of PQconndefaults
6824 : * will see a correct default (barring error, of course).
6825 : */
6826 544714 : if (strcmp(option->keyword, "user") == 0)
6827 : {
6828 14020 : option->val = pg_fe_getauthname(NULL);
6829 14020 : continue;
6830 : }
6831 : }
6832 :
6833 : /*
6834 : * Special handling for sslrootcert=system with no sslmode explicitly
6835 : * defined. In this case we want to strengthen the default sslmode to
6836 : * verify-full.
6837 : */
6838 15647 : if (sslmode_default && sslrootcert)
6839 : {
6840 15200 : if (sslrootcert->val && strcmp(sslrootcert->val, "system") == 0)
6841 : {
6842 4 : free(sslmode_default->val);
6843 :
6844 4 : sslmode_default->val = strdup("verify-full");
6845 4 : if (!sslmode_default->val)
6846 : {
6847 0 : if (errorMessage)
6848 0 : libpq_append_error(errorMessage, "out of memory");
6849 0 : return false;
6850 : }
6851 : }
6852 : }
6853 :
6854 15647 : return true;
6855 : }
6856 :
6857 : /*
6858 : * Subroutine for parse_connection_string
6859 : *
6860 : * Deal with a URI connection string.
6861 : */
6862 : static PQconninfoOption *
6863 68 : conninfo_uri_parse(const char *uri, PQExpBuffer errorMessage,
6864 : bool use_defaults)
6865 : {
6866 : PQconninfoOption *options;
6867 :
6868 : /* Make a working copy of PQconninfoOptions */
6869 68 : options = conninfo_init(errorMessage);
6870 68 : if (options == NULL)
6871 0 : return NULL;
6872 :
6873 68 : if (!conninfo_uri_parse_options(options, uri, errorMessage))
6874 : {
6875 15 : PQconninfoFree(options);
6876 15 : return NULL;
6877 : }
6878 :
6879 : /*
6880 : * Add in defaults if the caller wants that.
6881 : */
6882 53 : if (use_defaults)
6883 : {
6884 0 : if (!conninfo_add_defaults(options, errorMessage))
6885 : {
6886 0 : PQconninfoFree(options);
6887 0 : return NULL;
6888 : }
6889 : }
6890 :
6891 53 : return options;
6892 : }
6893 :
6894 : /*
6895 : * conninfo_uri_parse_options
6896 : * Actual URI parser.
6897 : *
6898 : * If successful, returns true while the options array is filled with parsed
6899 : * options from the URI.
6900 : * If not successful, returns false and fills errorMessage accordingly.
6901 : *
6902 : * Parses the connection URI string in 'uri' according to the URI syntax (RFC
6903 : * 3986):
6904 : *
6905 : * postgresql://[user[:password]@][netloc][:port][/dbname][?param1=value1&...]
6906 : *
6907 : * where "netloc" is a hostname, an IPv4 address, or an IPv6 address surrounded
6908 : * by literal square brackets. As an extension, we also allow multiple
6909 : * netloc[:port] specifications, separated by commas:
6910 : *
6911 : * postgresql://[user[:password]@][netloc][:port][,...][/dbname][?param1=value1&...]
6912 : *
6913 : * Any of the URI parts might use percent-encoding (%xy).
6914 : */
6915 : static bool
6916 68 : conninfo_uri_parse_options(PQconninfoOption *options, const char *uri,
6917 : PQExpBuffer errorMessage)
6918 : {
6919 : int prefix_len;
6920 : char *p;
6921 68 : char *buf = NULL;
6922 : char *start;
6923 68 : char prevchar = '\0';
6924 68 : char *user = NULL;
6925 68 : char *host = NULL;
6926 68 : bool retval = false;
6927 : PQExpBufferData hostbuf;
6928 : PQExpBufferData portbuf;
6929 :
6930 68 : initPQExpBuffer(&hostbuf);
6931 68 : initPQExpBuffer(&portbuf);
6932 68 : if (PQExpBufferDataBroken(hostbuf) || PQExpBufferDataBroken(portbuf))
6933 : {
6934 0 : libpq_append_error(errorMessage, "out of memory");
6935 0 : goto cleanup;
6936 : }
6937 :
6938 : /* need a modifiable copy of the input URI */
6939 68 : buf = strdup(uri);
6940 68 : if (buf == NULL)
6941 : {
6942 0 : libpq_append_error(errorMessage, "out of memory");
6943 0 : goto cleanup;
6944 : }
6945 68 : start = buf;
6946 :
6947 : /* Skip the URI prefix */
6948 68 : prefix_len = uri_prefix_length(uri);
6949 68 : if (prefix_len == 0)
6950 : {
6951 : /* Should never happen */
6952 0 : libpq_append_error(errorMessage,
6953 : "invalid URI propagated to internal parser routine: \"%s\"",
6954 : uri);
6955 0 : goto cleanup;
6956 : }
6957 68 : start += prefix_len;
6958 68 : p = start;
6959 :
6960 : /* Look ahead for possible user credentials designator */
6961 914 : while (*p && *p != '@' && *p != '/')
6962 846 : ++p;
6963 68 : if (*p == '@')
6964 : {
6965 : /*
6966 : * Found username/password designator, so URI should be of the form
6967 : * "scheme://user[:password]@[netloc]".
6968 : */
6969 12 : user = start;
6970 :
6971 12 : p = user;
6972 104 : while (*p != ':' && *p != '@')
6973 92 : ++p;
6974 :
6975 : /* Save last char and cut off at end of user name */
6976 12 : prevchar = *p;
6977 12 : *p = '\0';
6978 :
6979 23 : if (*user &&
6980 11 : !conninfo_storeval(options, "user", user,
6981 : errorMessage, false, true))
6982 0 : goto cleanup;
6983 :
6984 12 : if (prevchar == ':')
6985 : {
6986 1 : const char *password = p + 1;
6987 :
6988 8 : while (*p != '@')
6989 7 : ++p;
6990 1 : *p = '\0';
6991 :
6992 2 : if (*password &&
6993 1 : !conninfo_storeval(options, "password", password,
6994 : errorMessage, false, true))
6995 0 : goto cleanup;
6996 : }
6997 :
6998 : /* Advance past end of parsed user name or password token */
6999 12 : ++p;
7000 : }
7001 : else
7002 : {
7003 : /*
7004 : * No username/password designator found. Reset to start of URI.
7005 : */
7006 56 : p = start;
7007 : }
7008 :
7009 : /*
7010 : * There may be multiple netloc[:port] pairs, each separated from the next
7011 : * by a comma. When we initially enter this loop, "p" has been
7012 : * incremented past optional URI credential information at this point and
7013 : * now points at the "netloc" part of the URI. On subsequent loop
7014 : * iterations, "p" has been incremented past the comma separator and now
7015 : * points at the start of the next "netloc".
7016 : */
7017 : for (;;)
7018 : {
7019 : /*
7020 : * Look for IPv6 address.
7021 : */
7022 68 : if (*p == '[')
7023 : {
7024 8 : host = ++p;
7025 51 : while (*p && *p != ']')
7026 43 : ++p;
7027 8 : if (!*p)
7028 : {
7029 1 : libpq_append_error(errorMessage,
7030 : "end of string reached when looking for matching \"]\" in IPv6 host address in URI: \"%s\"",
7031 : uri);
7032 1 : goto cleanup;
7033 : }
7034 7 : if (p == host)
7035 : {
7036 1 : libpq_append_error(errorMessage,
7037 : "IPv6 host address may not be empty in URI: \"%s\"",
7038 : uri);
7039 1 : goto cleanup;
7040 : }
7041 :
7042 : /* Cut off the bracket and advance */
7043 6 : *(p++) = '\0';
7044 :
7045 : /*
7046 : * The address may be followed by a port specifier or a slash or a
7047 : * query or a separator comma.
7048 : */
7049 6 : if (*p && *p != ':' && *p != '/' && *p != '?' && *p != ',')
7050 : {
7051 1 : libpq_append_error(errorMessage,
7052 : "unexpected character \"%c\" at position %d in URI (expected \":\" or \"/\"): \"%s\"",
7053 1 : *p, (int) (p - buf + 1), uri);
7054 1 : goto cleanup;
7055 : }
7056 : }
7057 : else
7058 : {
7059 : /* not an IPv6 address: DNS-named or IPv4 netloc */
7060 60 : host = p;
7061 :
7062 : /*
7063 : * Look for port specifier (colon) or end of host specifier
7064 : * (slash) or query (question mark) or host separator (comma).
7065 : */
7066 241 : while (*p && *p != ':' && *p != '/' && *p != '?' && *p != ',')
7067 181 : ++p;
7068 : }
7069 :
7070 : /* Save the hostname terminator before we null it */
7071 65 : prevchar = *p;
7072 65 : *p = '\0';
7073 :
7074 65 : appendPQExpBufferStr(&hostbuf, host);
7075 :
7076 65 : if (prevchar == ':')
7077 : {
7078 14 : const char *port = ++p; /* advance past host terminator */
7079 :
7080 79 : while (*p && *p != '/' && *p != '?' && *p != ',')
7081 65 : ++p;
7082 :
7083 14 : prevchar = *p;
7084 14 : *p = '\0';
7085 :
7086 14 : appendPQExpBufferStr(&portbuf, port);
7087 : }
7088 :
7089 65 : if (prevchar != ',')
7090 65 : break;
7091 0 : ++p; /* advance past comma separator */
7092 0 : appendPQExpBufferChar(&hostbuf, ',');
7093 0 : appendPQExpBufferChar(&portbuf, ',');
7094 : }
7095 :
7096 : /* Save final values for host and port. */
7097 65 : if (PQExpBufferDataBroken(hostbuf) || PQExpBufferDataBroken(portbuf))
7098 0 : goto cleanup;
7099 109 : if (hostbuf.data[0] &&
7100 44 : !conninfo_storeval(options, "host", hostbuf.data,
7101 : errorMessage, false, true))
7102 4 : goto cleanup;
7103 74 : if (portbuf.data[0] &&
7104 13 : !conninfo_storeval(options, "port", portbuf.data,
7105 : errorMessage, false, true))
7106 0 : goto cleanup;
7107 :
7108 61 : if (prevchar && prevchar != '?')
7109 : {
7110 29 : const char *dbname = ++p; /* advance past host terminator */
7111 :
7112 : /* Look for query parameters */
7113 67 : while (*p && *p != '?')
7114 38 : ++p;
7115 :
7116 29 : prevchar = *p;
7117 29 : *p = '\0';
7118 :
7119 : /*
7120 : * Avoid setting dbname to an empty string, as it forces the default
7121 : * value (username) and ignores $PGDATABASE, as opposed to not setting
7122 : * it at all.
7123 : */
7124 46 : if (*dbname &&
7125 17 : !conninfo_storeval(options, "dbname", dbname,
7126 : errorMessage, false, true))
7127 0 : goto cleanup;
7128 : }
7129 :
7130 61 : if (prevchar)
7131 : {
7132 33 : ++p; /* advance past terminator */
7133 :
7134 33 : if (!conninfo_uri_parse_params(p, options, errorMessage))
7135 8 : goto cleanup;
7136 : }
7137 :
7138 : /* everything parsed okay */
7139 53 : retval = true;
7140 :
7141 68 : cleanup:
7142 68 : termPQExpBuffer(&hostbuf);
7143 68 : termPQExpBuffer(&portbuf);
7144 68 : free(buf);
7145 68 : return retval;
7146 : }
7147 :
7148 : /*
7149 : * Connection URI parameters parser routine
7150 : *
7151 : * If successful, returns true while connOptions is filled with parsed
7152 : * parameters. Otherwise, returns false and fills errorMessage appropriately.
7153 : *
7154 : * Destructively modifies 'params' buffer.
7155 : */
7156 : static bool
7157 33 : conninfo_uri_parse_params(char *params,
7158 : PQconninfoOption *connOptions,
7159 : PQExpBuffer errorMessage)
7160 : {
7161 62 : while (*params)
7162 : {
7163 37 : char *keyword = params;
7164 37 : char *value = NULL;
7165 37 : char *p = params;
7166 37 : bool malloced = false;
7167 : int oldmsglen;
7168 :
7169 : /*
7170 : * Scan the params string for '=' and '&', marking the end of keyword
7171 : * and value respectively.
7172 : */
7173 : for (;;)
7174 : {
7175 833 : if (*p == '=')
7176 : {
7177 : /* Was there '=' already? */
7178 36 : if (value != NULL)
7179 : {
7180 1 : libpq_append_error(errorMessage,
7181 : "extra key/value separator \"=\" in URI query parameter: \"%s\"",
7182 : keyword);
7183 1 : return false;
7184 : }
7185 : /* Cut off keyword, advance to value */
7186 35 : *p++ = '\0';
7187 35 : value = p;
7188 : }
7189 797 : else if (*p == '&' || *p == '\0')
7190 : {
7191 : /*
7192 : * If not at the end, cut off value and advance; leave p
7193 : * pointing to start of the next parameter, if any.
7194 : */
7195 36 : if (*p != '\0')
7196 8 : *p++ = '\0';
7197 : /* Was there '=' at all? */
7198 36 : if (value == NULL)
7199 : {
7200 2 : libpq_append_error(errorMessage,
7201 : "missing key/value separator \"=\" in URI query parameter: \"%s\"",
7202 : keyword);
7203 2 : return false;
7204 : }
7205 : /* Got keyword and value, go process them. */
7206 34 : break;
7207 : }
7208 : else
7209 761 : ++p; /* Advance over all other bytes. */
7210 : }
7211 :
7212 34 : keyword = conninfo_uri_decode(keyword, errorMessage);
7213 34 : if (keyword == NULL)
7214 : {
7215 : /* conninfo_uri_decode already set an error message */
7216 1 : return false;
7217 : }
7218 33 : value = conninfo_uri_decode(value, errorMessage);
7219 33 : if (value == NULL)
7220 : {
7221 : /* conninfo_uri_decode already set an error message */
7222 2 : free(keyword);
7223 2 : return false;
7224 : }
7225 31 : malloced = true;
7226 :
7227 : /*
7228 : * Special keyword handling for improved JDBC compatibility.
7229 : */
7230 31 : if (strcmp(keyword, "ssl") == 0 &&
7231 0 : strcmp(value, "true") == 0)
7232 : {
7233 0 : free(keyword);
7234 0 : free(value);
7235 0 : malloced = false;
7236 :
7237 0 : keyword = "sslmode";
7238 0 : value = "require";
7239 : }
7240 :
7241 : /*
7242 : * Store the value if the corresponding option exists; ignore
7243 : * otherwise. At this point both keyword and value are not
7244 : * URI-encoded.
7245 : */
7246 31 : oldmsglen = errorMessage->len;
7247 31 : if (!conninfo_storeval(connOptions, keyword, value,
7248 : errorMessage, true, false))
7249 : {
7250 : /* Insert generic message if conninfo_storeval didn't give one. */
7251 2 : if (errorMessage->len == oldmsglen)
7252 2 : libpq_append_error(errorMessage,
7253 : "invalid URI query parameter: \"%s\"",
7254 : keyword);
7255 : /* And fail. */
7256 2 : if (malloced)
7257 : {
7258 2 : free(keyword);
7259 2 : free(value);
7260 : }
7261 2 : return false;
7262 : }
7263 :
7264 29 : if (malloced)
7265 : {
7266 29 : free(keyword);
7267 29 : free(value);
7268 : }
7269 :
7270 : /* Proceed to next key=value pair, if any */
7271 29 : params = p;
7272 : }
7273 :
7274 25 : return true;
7275 : }
7276 :
7277 : /*
7278 : * Connection URI decoder routine
7279 : *
7280 : * If successful, returns the malloc'd decoded string.
7281 : * If not successful, returns NULL and fills errorMessage accordingly.
7282 : *
7283 : * The string is decoded by replacing any percent-encoded tokens with
7284 : * corresponding characters, while preserving any non-encoded characters. A
7285 : * percent-encoded token is a character triplet: a percent sign, followed by a
7286 : * pair of hexadecimal digits (0-9A-F), where lower- and upper-case letters are
7287 : * treated identically.
7288 : */
7289 : static char *
7290 153 : conninfo_uri_decode(const char *str, PQExpBuffer errorMessage)
7291 : {
7292 : char *buf; /* result */
7293 : char *p; /* output location */
7294 153 : const char *q = str; /* input location */
7295 :
7296 153 : buf = malloc(strlen(str) + 1);
7297 153 : if (buf == NULL)
7298 : {
7299 0 : libpq_append_error(errorMessage, "out of memory");
7300 0 : return NULL;
7301 : }
7302 153 : p = buf;
7303 :
7304 : /* skip leading whitespaces */
7305 166 : for (const char *s = q; *s == ' '; s++)
7306 : {
7307 13 : q++;
7308 13 : continue;
7309 : }
7310 :
7311 : for (;;)
7312 : {
7313 1209 : if (*q != '%')
7314 : {
7315 : /* if found a whitespace or NUL, the string ends */
7316 1178 : if (*q == ' ' || *q == '\0')
7317 148 : goto end;
7318 :
7319 : /* copy character */
7320 1030 : *(p++) = *(q++);
7321 : }
7322 : else
7323 : {
7324 : int hi;
7325 : int lo;
7326 : int c;
7327 :
7328 31 : ++q; /* skip the percent sign itself */
7329 :
7330 : /*
7331 : * Possible EOL will be caught by the first call to
7332 : * get_hexdigit(), so we never dereference an invalid q pointer.
7333 : */
7334 31 : if (!(get_hexdigit(*q++, &hi) && get_hexdigit(*q++, &lo)))
7335 : {
7336 4 : libpq_append_error(errorMessage,
7337 : "invalid percent-encoded token: \"%s\"",
7338 : str);
7339 4 : free(buf);
7340 5 : return NULL;
7341 : }
7342 :
7343 27 : c = (hi << 4) | lo;
7344 27 : if (c == 0)
7345 : {
7346 1 : libpq_append_error(errorMessage,
7347 : "forbidden value %%00 in percent-encoded value: \"%s\"",
7348 : str);
7349 1 : free(buf);
7350 1 : return NULL;
7351 : }
7352 26 : *(p++) = c;
7353 : }
7354 : }
7355 :
7356 148 : end:
7357 :
7358 : /* skip trailing whitespaces */
7359 160 : for (const char *s = q; *s == ' '; s++)
7360 : {
7361 12 : q++;
7362 12 : continue;
7363 : }
7364 :
7365 : /* Not at the end of the string yet? Fail. */
7366 148 : if (*q != '\0')
7367 : {
7368 2 : libpq_append_error(errorMessage,
7369 : "unexpected spaces found in \"%s\", use percent-encoded spaces (%%20) instead",
7370 : str);
7371 2 : free(buf);
7372 2 : return NULL;
7373 : }
7374 :
7375 : /* Copy NUL terminator */
7376 146 : *p = '\0';
7377 :
7378 146 : return buf;
7379 : }
7380 :
7381 : /*
7382 : * Convert hexadecimal digit character to its integer value.
7383 : *
7384 : * If successful, returns true and value is filled with digit's base 16 value.
7385 : * If not successful, returns false.
7386 : *
7387 : * Lower- and upper-case letters in the range A-F are treated identically.
7388 : */
7389 : static bool
7390 59 : get_hexdigit(char digit, int *value)
7391 : {
7392 59 : if ('0' <= digit && digit <= '9')
7393 31 : *value = digit - '0';
7394 28 : else if ('A' <= digit && digit <= 'F')
7395 23 : *value = digit - 'A' + 10;
7396 5 : else if ('a' <= digit && digit <= 'f')
7397 1 : *value = digit - 'a' + 10;
7398 : else
7399 4 : return false;
7400 :
7401 55 : return true;
7402 : }
7403 :
7404 : /*
7405 : * Find an option value corresponding to the keyword in the connOptions array.
7406 : *
7407 : * If successful, returns a pointer to the corresponding option's value.
7408 : * If not successful, returns NULL.
7409 : */
7410 : static const char *
7411 838516 : conninfo_getval(PQconninfoOption *connOptions,
7412 : const char *keyword)
7413 : {
7414 : PQconninfoOption *option;
7415 :
7416 838516 : option = conninfo_find(connOptions, keyword);
7417 :
7418 838516 : return option ? option->val : NULL;
7419 : }
7420 :
7421 : /*
7422 : * Store a (new) value for an option corresponding to the keyword in
7423 : * connOptions array.
7424 : *
7425 : * If uri_decode is true, the value is URI-decoded. The keyword is always
7426 : * assumed to be non URI-encoded.
7427 : *
7428 : * If successful, returns a pointer to the corresponding PQconninfoOption,
7429 : * which value is replaced with a strdup'd copy of the passed value string.
7430 : * The existing value for the option is free'd before replacing, if any.
7431 : *
7432 : * If not successful, returns NULL and fills errorMessage accordingly.
7433 : * However, if the reason of failure is an invalid keyword being passed and
7434 : * ignoreMissing is true, errorMessage will be left untouched.
7435 : */
7436 : static PQconninfoOption *
7437 459003 : conninfo_storeval(PQconninfoOption *connOptions,
7438 : const char *keyword, const char *value,
7439 : PQExpBuffer errorMessage, bool ignoreMissing,
7440 : bool uri_decode)
7441 : {
7442 : PQconninfoOption *option;
7443 : char *value_copy;
7444 :
7445 : /*
7446 : * For backwards compatibility, requiressl=1 gets translated to
7447 : * sslmode=require, and requiressl=0 gets translated to sslmode=prefer
7448 : * (which is the default for sslmode).
7449 : */
7450 459003 : if (strcmp(keyword, "requiressl") == 0)
7451 : {
7452 0 : keyword = "sslmode";
7453 0 : if (value[0] == '1')
7454 0 : value = "require";
7455 : else
7456 0 : value = "prefer";
7457 : }
7458 :
7459 459003 : option = conninfo_find(connOptions, keyword);
7460 459003 : if (option == NULL)
7461 : {
7462 6 : if (!ignoreMissing)
7463 4 : libpq_append_error(errorMessage,
7464 : "invalid connection option \"%s\"",
7465 : keyword);
7466 6 : return NULL;
7467 : }
7468 :
7469 458997 : if (uri_decode)
7470 : {
7471 86 : value_copy = conninfo_uri_decode(value, errorMessage);
7472 86 : if (value_copy == NULL)
7473 : /* conninfo_uri_decode already set an error message */
7474 4 : return NULL;
7475 : }
7476 : else
7477 : {
7478 458911 : value_copy = strdup(value);
7479 458911 : if (value_copy == NULL)
7480 : {
7481 0 : libpq_append_error(errorMessage, "out of memory");
7482 0 : return NULL;
7483 : }
7484 : }
7485 :
7486 458993 : free(option->val);
7487 458993 : option->val = value_copy;
7488 :
7489 458993 : return option;
7490 : }
7491 :
7492 : /*
7493 : * Find a PQconninfoOption option corresponding to the keyword in the
7494 : * connOptions array.
7495 : *
7496 : * If successful, returns a pointer to the corresponding PQconninfoOption
7497 : * structure.
7498 : * If not successful, returns NULL.
7499 : */
7500 : static PQconninfoOption *
7501 1297519 : conninfo_find(PQconninfoOption *connOptions, const char *keyword)
7502 : {
7503 : PQconninfoOption *option;
7504 :
7505 31211380 : for (option = connOptions; option->keyword != NULL; option++)
7506 : {
7507 31211374 : if (strcmp(option->keyword, keyword) == 0)
7508 1297513 : return option;
7509 : }
7510 :
7511 6 : return NULL;
7512 : }
7513 :
7514 :
7515 : /*
7516 : * Return the connection options used for the connection
7517 : */
7518 : PQconninfoOption *
7519 20826 : PQconninfo(PGconn *conn)
7520 : {
7521 : PQExpBufferData errorBuf;
7522 : PQconninfoOption *connOptions;
7523 :
7524 20826 : if (conn == NULL)
7525 0 : return NULL;
7526 :
7527 : /*
7528 : * We don't actually report any errors here, but callees want a buffer,
7529 : * and we prefer not to trash the conn's errorMessage.
7530 : */
7531 20826 : initPQExpBuffer(&errorBuf);
7532 20826 : if (PQExpBufferDataBroken(errorBuf))
7533 0 : return NULL; /* out of memory already :-( */
7534 :
7535 20826 : connOptions = conninfo_init(&errorBuf);
7536 :
7537 20826 : if (connOptions != NULL)
7538 : {
7539 : const internalPQconninfoOption *option;
7540 :
7541 1103778 : for (option = PQconninfoOptions; option->keyword; option++)
7542 : {
7543 : char **connmember;
7544 :
7545 1082952 : if (option->connofs < 0)
7546 0 : continue;
7547 :
7548 1082952 : connmember = (char **) ((char *) conn + option->connofs);
7549 :
7550 1082952 : if (*connmember)
7551 417830 : conninfo_storeval(connOptions, option->keyword, *connmember,
7552 : &errorBuf, true, false);
7553 : }
7554 : }
7555 :
7556 20826 : termPQExpBuffer(&errorBuf);
7557 :
7558 20826 : return connOptions;
7559 : }
7560 :
7561 :
7562 : void
7563 64441 : PQconninfoFree(PQconninfoOption *connOptions)
7564 : {
7565 64441 : if (connOptions == NULL)
7566 15847 : return;
7567 :
7568 2575482 : for (PQconninfoOption *option = connOptions; option->keyword != NULL; option++)
7569 2526888 : free(option->val);
7570 48594 : free(connOptions);
7571 : }
7572 :
7573 :
7574 : /* =========== accessor functions for PGconn ========= */
7575 : char *
7576 19734 : PQdb(const PGconn *conn)
7577 : {
7578 19734 : if (!conn)
7579 1 : return NULL;
7580 19733 : return conn->dbName;
7581 : }
7582 :
7583 : char *
7584 10231 : PQuser(const PGconn *conn)
7585 : {
7586 10231 : if (!conn)
7587 0 : return NULL;
7588 10231 : return conn->pguser;
7589 : }
7590 :
7591 : char *
7592 211 : PQpass(const PGconn *conn)
7593 : {
7594 211 : char *password = NULL;
7595 :
7596 211 : if (!conn)
7597 0 : return NULL;
7598 211 : if (conn->connhost != NULL)
7599 198 : password = conn->connhost[conn->whichhost].password;
7600 211 : if (password == NULL)
7601 209 : password = conn->pgpass;
7602 : /* Historically we've returned "" not NULL for no password specified */
7603 211 : if (password == NULL)
7604 144 : password = "";
7605 211 : return password;
7606 : }
7607 :
7608 : char *
7609 10391 : PQhost(const PGconn *conn)
7610 : {
7611 10391 : if (!conn)
7612 0 : return NULL;
7613 :
7614 10391 : if (conn->connhost != NULL)
7615 : {
7616 : /*
7617 : * Return the verbatim host value provided by user, or hostaddr in its
7618 : * lack.
7619 : */
7620 10391 : if (conn->connhost[conn->whichhost].host != NULL &&
7621 10391 : conn->connhost[conn->whichhost].host[0] != '\0')
7622 10391 : return conn->connhost[conn->whichhost].host;
7623 0 : else if (conn->connhost[conn->whichhost].hostaddr != NULL &&
7624 0 : conn->connhost[conn->whichhost].hostaddr[0] != '\0')
7625 0 : return conn->connhost[conn->whichhost].hostaddr;
7626 : }
7627 :
7628 0 : return "";
7629 : }
7630 :
7631 : char *
7632 0 : PQhostaddr(const PGconn *conn)
7633 : {
7634 0 : if (!conn)
7635 0 : return NULL;
7636 :
7637 : /* Return the parsed IP address */
7638 0 : if (conn->connhost != NULL && conn->connip != NULL)
7639 0 : return conn->connip;
7640 :
7641 0 : return "";
7642 : }
7643 :
7644 : char *
7645 10391 : PQport(const PGconn *conn)
7646 : {
7647 10391 : if (!conn)
7648 0 : return NULL;
7649 :
7650 10391 : if (conn->connhost != NULL &&
7651 10391 : conn->connhost[conn->whichhost].port != NULL &&
7652 10391 : conn->connhost[conn->whichhost].port[0] != '\0')
7653 10391 : return conn->connhost[conn->whichhost].port;
7654 :
7655 0 : return DEF_PGPORT_STR;
7656 : }
7657 :
7658 : /*
7659 : * No longer does anything, but the function remains for API backwards
7660 : * compatibility.
7661 : */
7662 : char *
7663 0 : PQtty(const PGconn *conn)
7664 : {
7665 0 : if (!conn)
7666 0 : return NULL;
7667 0 : return "";
7668 : }
7669 :
7670 : char *
7671 0 : PQoptions(const PGconn *conn)
7672 : {
7673 0 : if (!conn)
7674 0 : return NULL;
7675 0 : return conn->pgoptions;
7676 : }
7677 :
7678 : ConnStatusType
7679 321038 : PQstatus(const PGconn *conn)
7680 : {
7681 321038 : if (!conn)
7682 0 : return CONNECTION_BAD;
7683 321038 : return conn->status;
7684 : }
7685 :
7686 : PGTransactionStatusType
7687 265500 : PQtransactionStatus(const PGconn *conn)
7688 : {
7689 265500 : if (!conn || conn->status != CONNECTION_OK)
7690 0 : return PQTRANS_UNKNOWN;
7691 265500 : if (conn->asyncStatus != PGASYNC_IDLE)
7692 666 : return PQTRANS_ACTIVE;
7693 264834 : return conn->xactStatus;
7694 : }
7695 :
7696 : const char *
7697 530935 : PQparameterStatus(const PGconn *conn, const char *paramName)
7698 : {
7699 : const pgParameterStatus *pstatus;
7700 :
7701 530935 : if (!conn || !paramName)
7702 0 : return NULL;
7703 6486122 : for (pstatus = conn->pstatus; pstatus != NULL; pstatus = pstatus->next)
7704 : {
7705 6486122 : if (strcmp(pstatus->name, paramName) == 0)
7706 530935 : return pstatus->value;
7707 : }
7708 0 : return NULL;
7709 : }
7710 :
7711 : int
7712 0 : PQprotocolVersion(const PGconn *conn)
7713 : {
7714 0 : if (!conn)
7715 0 : return 0;
7716 0 : if (conn->status == CONNECTION_BAD)
7717 0 : return 0;
7718 0 : return PG_PROTOCOL_MAJOR(conn->pversion);
7719 : }
7720 :
7721 : int
7722 4 : PQfullProtocolVersion(const PGconn *conn)
7723 : {
7724 4 : if (!conn)
7725 0 : return 0;
7726 4 : if (conn->status == CONNECTION_BAD)
7727 0 : return 0;
7728 4 : return PG_PROTOCOL_FULL(conn->pversion);
7729 : }
7730 :
7731 : int
7732 29856 : PQserverVersion(const PGconn *conn)
7733 : {
7734 29856 : if (!conn)
7735 0 : return 0;
7736 29856 : if (conn->status == CONNECTION_BAD)
7737 0 : return 0;
7738 29856 : return conn->sversion;
7739 : }
7740 :
7741 : char *
7742 905 : PQerrorMessage(const PGconn *conn)
7743 : {
7744 905 : if (!conn)
7745 0 : return libpq_gettext("connection pointer is NULL\n");
7746 :
7747 : /*
7748 : * The errorMessage buffer might be marked "broken" due to having
7749 : * previously failed to allocate enough memory for the message. In that
7750 : * case, tell the application we ran out of memory.
7751 : */
7752 905 : if (PQExpBufferBroken(&conn->errorMessage))
7753 0 : return libpq_gettext("out of memory\n");
7754 :
7755 905 : return conn->errorMessage.data;
7756 : }
7757 :
7758 : /*
7759 : * In Windows, socket values are unsigned, and an invalid socket value
7760 : * (INVALID_SOCKET) is ~0, which equals -1 in comparisons (with no compiler
7761 : * warning). Ideally we would return an unsigned value for PQsocket() on
7762 : * Windows, but that would cause the function's return value to differ from
7763 : * Unix, so we just return -1 for invalid sockets.
7764 : * http://msdn.microsoft.com/en-us/library/windows/desktop/cc507522%28v=vs.85%29.aspx
7765 : * http://stackoverflow.com/questions/10817252/why-is-invalid-socket-defined-as-0-in-winsock2-h-c
7766 : */
7767 : int
7768 203695 : PQsocket(const PGconn *conn)
7769 : {
7770 203695 : if (!conn)
7771 0 : return -1;
7772 203695 : if (conn->altsock != PGINVALID_SOCKET)
7773 0 : return conn->altsock;
7774 203695 : return (conn->sock != PGINVALID_SOCKET) ? conn->sock : -1;
7775 : }
7776 :
7777 : int
7778 848 : PQbackendPID(const PGconn *conn)
7779 : {
7780 848 : if (!conn || conn->status != CONNECTION_OK)
7781 0 : return 0;
7782 848 : return conn->be_pid;
7783 : }
7784 :
7785 : PGpipelineStatus
7786 982352 : PQpipelineStatus(const PGconn *conn)
7787 : {
7788 982352 : if (!conn)
7789 0 : return PQ_PIPELINE_OFF;
7790 :
7791 982352 : return conn->pipelineStatus;
7792 : }
7793 :
7794 : int
7795 211 : PQconnectionNeedsPassword(const PGconn *conn)
7796 : {
7797 : char *password;
7798 :
7799 211 : if (!conn)
7800 0 : return false;
7801 211 : password = PQpass(conn);
7802 211 : if (conn->password_needed &&
7803 27 : (password == NULL || password[0] == '\0'))
7804 1 : return true;
7805 : else
7806 210 : return false;
7807 : }
7808 :
7809 : int
7810 445 : PQconnectionUsedPassword(const PGconn *conn)
7811 : {
7812 445 : if (!conn)
7813 0 : return false;
7814 445 : if (conn->password_needed)
7815 8 : return true;
7816 : else
7817 437 : return false;
7818 : }
7819 :
7820 : int
7821 0 : PQconnectionUsedGSSAPI(const PGconn *conn)
7822 : {
7823 0 : if (!conn)
7824 0 : return false;
7825 0 : if (conn->gssapi_used)
7826 0 : return true;
7827 : else
7828 0 : return false;
7829 : }
7830 :
7831 : int
7832 273085 : PQclientEncoding(const PGconn *conn)
7833 : {
7834 273085 : if (!conn || conn->status != CONNECTION_OK)
7835 0 : return -1;
7836 273085 : return conn->client_encoding;
7837 : }
7838 :
7839 : int
7840 92 : PQsetClientEncoding(PGconn *conn, const char *encoding)
7841 : {
7842 : char qbuf[128];
7843 : static const char query[] = "set client_encoding to '%s'";
7844 : PGresult *res;
7845 : int status;
7846 :
7847 92 : if (!conn || conn->status != CONNECTION_OK)
7848 0 : return -1;
7849 :
7850 92 : if (!encoding)
7851 0 : return -1;
7852 :
7853 : /* Resolve special "auto" value from the locale */
7854 92 : if (strcmp(encoding, "auto") == 0)
7855 0 : encoding = pg_encoding_to_char(pg_get_encoding_from_locale(NULL, true));
7856 :
7857 : /* check query buffer overflow */
7858 92 : if (sizeof(qbuf) < (sizeof(query) + strlen(encoding)))
7859 0 : return -1;
7860 :
7861 : /* ok, now send a query */
7862 92 : sprintf(qbuf, query, encoding);
7863 92 : res = PQexec(conn, qbuf);
7864 :
7865 92 : if (res == NULL)
7866 0 : return -1;
7867 92 : if (res->resultStatus != PGRES_COMMAND_OK)
7868 0 : status = -1;
7869 : else
7870 : {
7871 : /*
7872 : * We rely on the backend to report the parameter value, and we'll
7873 : * change state at that time.
7874 : */
7875 92 : status = 0; /* everything is ok */
7876 : }
7877 92 : PQclear(res);
7878 92 : return status;
7879 : }
7880 :
7881 : PGVerbosity
7882 10330 : PQsetErrorVerbosity(PGconn *conn, PGVerbosity verbosity)
7883 : {
7884 : PGVerbosity old;
7885 :
7886 10330 : if (!conn)
7887 0 : return PQERRORS_DEFAULT;
7888 10330 : old = conn->verbosity;
7889 10330 : conn->verbosity = verbosity;
7890 10330 : return old;
7891 : }
7892 :
7893 : PGContextVisibility
7894 10251 : PQsetErrorContextVisibility(PGconn *conn, PGContextVisibility show_context)
7895 : {
7896 : PGContextVisibility old;
7897 :
7898 10251 : if (!conn)
7899 0 : return PQSHOW_CONTEXT_ERRORS;
7900 10251 : old = conn->show_context;
7901 10251 : conn->show_context = show_context;
7902 10251 : return old;
7903 : }
7904 :
7905 : PQnoticeReceiver
7906 1257 : PQsetNoticeReceiver(PGconn *conn, PQnoticeReceiver proc, void *arg)
7907 : {
7908 : PQnoticeReceiver old;
7909 :
7910 1257 : if (conn == NULL)
7911 0 : return NULL;
7912 :
7913 1257 : old = conn->noticeHooks.noticeRec;
7914 1257 : if (proc)
7915 : {
7916 1257 : conn->noticeHooks.noticeRec = proc;
7917 1257 : conn->noticeHooks.noticeRecArg = arg;
7918 : }
7919 1257 : return old;
7920 : }
7921 :
7922 : PQnoticeProcessor
7923 11186 : PQsetNoticeProcessor(PGconn *conn, PQnoticeProcessor proc, void *arg)
7924 : {
7925 : PQnoticeProcessor old;
7926 :
7927 11186 : if (conn == NULL)
7928 0 : return NULL;
7929 :
7930 11186 : old = conn->noticeHooks.noticeProc;
7931 11186 : if (proc)
7932 : {
7933 11186 : conn->noticeHooks.noticeProc = proc;
7934 11186 : conn->noticeHooks.noticeProcArg = arg;
7935 : }
7936 11186 : return old;
7937 : }
7938 :
7939 : /*
7940 : * The default notice message receiver just gets the standard notice text
7941 : * and sends it to the notice processor. This two-level setup exists
7942 : * mostly for backwards compatibility; perhaps we should deprecate use of
7943 : * PQsetNoticeProcessor?
7944 : */
7945 : static void
7946 186437 : defaultNoticeReceiver(void *arg, const PGresult *res)
7947 : {
7948 : (void) arg; /* not used */
7949 186437 : if (res->noticeHooks.noticeProc != NULL)
7950 186437 : res->noticeHooks.noticeProc(res->noticeHooks.noticeProcArg,
7951 186437 : PQresultErrorMessage(res));
7952 186437 : }
7953 :
7954 : /*
7955 : * The default notice message processor just prints the
7956 : * message on stderr. Applications can override this if they
7957 : * want the messages to go elsewhere (a window, for example).
7958 : * Note that simply discarding notices is probably a bad idea.
7959 : */
7960 : static void
7961 69 : defaultNoticeProcessor(void *arg, const char *message)
7962 : {
7963 : (void) arg; /* not used */
7964 : /* Note: we expect the supplied string to end with a newline already. */
7965 69 : fprintf(stderr, "%s", message);
7966 69 : }
7967 :
7968 : /*
7969 : * returns a pointer to the next token or NULL if the current
7970 : * token doesn't match
7971 : */
7972 : static char *
7973 46 : pwdfMatchesString(char *buf, const char *token)
7974 : {
7975 : char *tbuf;
7976 : const char *ttok;
7977 46 : bool bslash = false;
7978 :
7979 46 : if (buf == NULL || token == NULL)
7980 0 : return NULL;
7981 46 : tbuf = buf;
7982 46 : ttok = token;
7983 46 : if (tbuf[0] == '*' && tbuf[1] == ':')
7984 28 : return tbuf + 2;
7985 146 : while (*tbuf != 0)
7986 : {
7987 146 : if (*tbuf == '\\' && !bslash)
7988 : {
7989 0 : tbuf++;
7990 0 : bslash = true;
7991 : }
7992 146 : if (*tbuf == ':' && *ttok == 0 && !bslash)
7993 13 : return tbuf + 1;
7994 133 : bslash = false;
7995 133 : if (*ttok == 0)
7996 0 : return NULL;
7997 133 : if (*tbuf == *ttok)
7998 : {
7999 128 : tbuf++;
8000 128 : ttok++;
8001 : }
8002 : else
8003 5 : return NULL;
8004 : }
8005 0 : return NULL;
8006 : }
8007 :
8008 : /*
8009 : * Get a password from the password file. Return value is malloc'd.
8010 : *
8011 : * On failure, *errmsg is set to an error to be returned. It is
8012 : * left NULL on success, or if no password could be found.
8013 : */
8014 : static char *
8015 15427 : passwordFromFile(const char *hostname, const char *port,
8016 : const char *dbname, const char *username,
8017 : const char *pgpassfile, const char **errmsg)
8018 : {
8019 : FILE *fp;
8020 : #ifndef WIN32
8021 : struct stat stat_buf;
8022 : #endif
8023 : PQExpBufferData buf;
8024 :
8025 15427 : *errmsg = NULL;
8026 :
8027 15427 : if (dbname == NULL || dbname[0] == '\0')
8028 0 : return NULL;
8029 :
8030 15427 : if (username == NULL || username[0] == '\0')
8031 0 : return NULL;
8032 :
8033 : /* 'localhost' matches pghost of '' or the default socket directory */
8034 15427 : if (hostname == NULL || hostname[0] == '\0')
8035 0 : hostname = DefaultHost;
8036 15427 : else if (is_unixsock_path(hostname))
8037 :
8038 : /*
8039 : * We should probably use canonicalize_path(), but then we have to
8040 : * bring path.c into libpq, and it doesn't seem worth it.
8041 : */
8042 15095 : if (strcmp(hostname, DEFAULT_PGSOCKET_DIR) == 0)
8043 0 : hostname = DefaultHost;
8044 :
8045 15427 : if (port == NULL || port[0] == '\0')
8046 0 : port = DEF_PGPORT_STR;
8047 :
8048 : /* If password file cannot be opened, ignore it. */
8049 15427 : fp = fopen(pgpassfile, "r");
8050 15427 : if (fp == NULL)
8051 15419 : return NULL;
8052 :
8053 : #ifndef WIN32
8054 8 : if (fstat(fileno(fp), &stat_buf) != 0)
8055 : {
8056 0 : fclose(fp);
8057 0 : return NULL;
8058 : }
8059 :
8060 8 : if (!S_ISREG(stat_buf.st_mode))
8061 : {
8062 0 : fprintf(stderr,
8063 0 : libpq_gettext("WARNING: password file \"%s\" is not a plain file\n"),
8064 : pgpassfile);
8065 0 : fclose(fp);
8066 0 : return NULL;
8067 : }
8068 :
8069 : /* If password file is insecure, alert the user and ignore it. */
8070 8 : if (stat_buf.st_mode & (S_IRWXG | S_IRWXO))
8071 : {
8072 0 : fprintf(stderr,
8073 0 : libpq_gettext("WARNING: password file \"%s\" has group or world access; permissions should be u=rw (0600) or less\n"),
8074 : pgpassfile);
8075 0 : fclose(fp);
8076 0 : return NULL;
8077 : }
8078 : #else
8079 :
8080 : /*
8081 : * On Win32, the directory is protected, so we don't have to check the
8082 : * file.
8083 : */
8084 : #endif
8085 :
8086 : /* Use an expansible buffer to accommodate any reasonable line length */
8087 8 : initPQExpBuffer(&buf);
8088 :
8089 40 : while (!feof(fp) && !ferror(fp))
8090 : {
8091 : /* Make sure there's a reasonable amount of room in the buffer */
8092 40 : if (!enlargePQExpBuffer(&buf, 128))
8093 : {
8094 0 : *errmsg = libpq_gettext("out of memory");
8095 0 : break;
8096 : }
8097 :
8098 : /* Read some data, appending it to what we already have */
8099 40 : if (fgets(buf.data + buf.len, buf.maxlen - buf.len, fp) == NULL)
8100 1 : break;
8101 39 : buf.len += strlen(buf.data + buf.len);
8102 :
8103 : /* If we don't yet have a whole line, loop around to read more */
8104 39 : if (!(buf.len > 0 && buf.data[buf.len - 1] == '\n') && !feof(fp))
8105 8 : continue;
8106 :
8107 : /* ignore comments */
8108 31 : if (buf.data[0] != '#')
8109 : {
8110 23 : char *t = buf.data;
8111 : int len;
8112 :
8113 : /* strip trailing newline and carriage return */
8114 23 : len = pg_strip_crlf(t);
8115 :
8116 35 : if (len > 0 &&
8117 24 : (t = pwdfMatchesString(t, hostname)) != NULL &&
8118 24 : (t = pwdfMatchesString(t, port)) != NULL &&
8119 22 : (t = pwdfMatchesString(t, dbname)) != NULL &&
8120 10 : (t = pwdfMatchesString(t, username)) != NULL)
8121 : {
8122 : /* Found a match. */
8123 : char *ret,
8124 : *p1,
8125 : *p2;
8126 :
8127 7 : ret = strdup(t);
8128 :
8129 7 : fclose(fp);
8130 7 : explicit_bzero(buf.data, buf.maxlen);
8131 7 : termPQExpBuffer(&buf);
8132 :
8133 7 : if (!ret)
8134 : {
8135 0 : *errmsg = libpq_gettext("out of memory");
8136 0 : return NULL;
8137 : }
8138 :
8139 : /* De-escape password. */
8140 35 : for (p1 = p2 = ret; *p1 != ':' && *p1 != '\0'; ++p1, ++p2)
8141 : {
8142 28 : if (*p1 == '\\' && p1[1] != '\0')
8143 3 : ++p1;
8144 28 : *p2 = *p1;
8145 : }
8146 7 : *p2 = '\0';
8147 :
8148 7 : return ret;
8149 : }
8150 : }
8151 :
8152 : /* No match, reset buffer to prepare for next line. */
8153 24 : buf.len = 0;
8154 : }
8155 :
8156 1 : fclose(fp);
8157 1 : explicit_bzero(buf.data, buf.maxlen);
8158 1 : termPQExpBuffer(&buf);
8159 1 : return NULL;
8160 : }
8161 :
8162 :
8163 : /*
8164 : * If the connection failed due to bad password, we should mention
8165 : * if we got the password from the pgpassfile.
8166 : */
8167 : static void
8168 55 : pgpassfileWarning(PGconn *conn)
8169 : {
8170 : /* If it was 'invalid authorization', add pgpassfile mention */
8171 : /* only works with >= 9.0 servers */
8172 55 : if (conn->password_needed &&
8173 22 : conn->connhost[conn->whichhost].password != NULL &&
8174 0 : conn->result)
8175 : {
8176 0 : const char *sqlstate = PQresultErrorField(conn->result,
8177 : PG_DIAG_SQLSTATE);
8178 :
8179 0 : if (sqlstate && strcmp(sqlstate, ERRCODE_INVALID_PASSWORD) == 0)
8180 0 : libpq_append_conn_error(conn, "password retrieved from file \"%s\"",
8181 : conn->pgpassfile);
8182 : }
8183 55 : }
8184 :
8185 : /*
8186 : * Check if the SSL protocol value given in input is valid or not.
8187 : * This is used as a sanity check routine for the connection parameters
8188 : * ssl_min_protocol_version and ssl_max_protocol_version.
8189 : */
8190 : static bool
8191 31001 : sslVerifyProtocolVersion(const char *version)
8192 : {
8193 : /*
8194 : * An empty string and a NULL value are considered valid as it is
8195 : * equivalent to ignoring the parameter.
8196 : */
8197 31001 : if (!version || strlen(version) == 0)
8198 15496 : return true;
8199 :
8200 31010 : if (pg_strcasecmp(version, "TLSv1") == 0 ||
8201 31009 : pg_strcasecmp(version, "TLSv1.1") == 0 ||
8202 15506 : pg_strcasecmp(version, "TLSv1.2") == 0 ||
8203 2 : pg_strcasecmp(version, "TLSv1.3") == 0)
8204 15503 : return true;
8205 :
8206 : /* anything else is wrong */
8207 2 : return false;
8208 : }
8209 :
8210 :
8211 : /*
8212 : * Ensure that the SSL protocol range given in input is correct. The check
8213 : * is performed on the input string to keep it TLS backend agnostic. Input
8214 : * to this function is expected verified with sslVerifyProtocolVersion().
8215 : */
8216 : static bool
8217 15499 : sslVerifyProtocolRange(const char *min, const char *max)
8218 : {
8219 : Assert(sslVerifyProtocolVersion(min) &&
8220 : sslVerifyProtocolVersion(max));
8221 :
8222 : /* If at least one of the bounds is not set, the range is valid */
8223 15499 : if (min == NULL || max == NULL || strlen(min) == 0 || strlen(max) == 0)
8224 15496 : return true;
8225 :
8226 : /*
8227 : * If the minimum version is the lowest one we accept, then all options
8228 : * for the maximum are valid.
8229 : */
8230 3 : if (pg_strcasecmp(min, "TLSv1") == 0)
8231 0 : return true;
8232 :
8233 : /*
8234 : * The minimum bound is valid, and cannot be TLSv1, so using TLSv1 for the
8235 : * maximum is incorrect.
8236 : */
8237 3 : if (pg_strcasecmp(max, "TLSv1") == 0)
8238 0 : return false;
8239 :
8240 : /*
8241 : * At this point we know that we have a mix of TLSv1.1 through 1.3
8242 : * versions.
8243 : */
8244 3 : if (pg_strcasecmp(min, max) > 0)
8245 1 : return false;
8246 :
8247 2 : return true;
8248 : }
8249 :
8250 :
8251 : /*
8252 : * Obtain user's home directory, return in given buffer
8253 : *
8254 : * On Unix, this actually returns the user's home directory. On Windows
8255 : * it returns the PostgreSQL-specific application data folder.
8256 : *
8257 : * This is essentially the same as get_home_path(), but we don't use that
8258 : * because we don't want to pull path.c into libpq (it pollutes application
8259 : * namespace).
8260 : *
8261 : * Returns true on success, false on failure to obtain the directory name.
8262 : *
8263 : * CAUTION: although in most situations failure is unexpected, there are users
8264 : * who like to run applications in a home-directory-less environment. On
8265 : * failure, you almost certainly DO NOT want to report an error. Just act as
8266 : * though whatever file you were hoping to find in the home directory isn't
8267 : * there (which it isn't).
8268 : */
8269 : bool
8270 15109 : pqGetHomeDirectory(char *buf, int bufsize)
8271 : {
8272 : #ifndef WIN32
8273 : const char *home;
8274 :
8275 15109 : home = getenv("HOME");
8276 15109 : if (home && home[0])
8277 : {
8278 15109 : strlcpy(buf, home, bufsize);
8279 15109 : return true;
8280 : }
8281 : else
8282 : {
8283 : struct passwd pwbuf;
8284 : struct passwd *pw;
8285 : char tmpbuf[1024];
8286 : int rc;
8287 :
8288 0 : rc = getpwuid_r(geteuid(), &pwbuf, tmpbuf, sizeof tmpbuf, &pw);
8289 0 : if (rc != 0 || !pw)
8290 0 : return false;
8291 0 : strlcpy(buf, pw->pw_dir, bufsize);
8292 0 : return true;
8293 : }
8294 : #else
8295 : char tmppath[MAX_PATH];
8296 :
8297 : ZeroMemory(tmppath, sizeof(tmppath));
8298 : if (SHGetFolderPath(NULL, CSIDL_APPDATA, NULL, 0, tmppath) != S_OK)
8299 : return false;
8300 : snprintf(buf, bufsize, "%s/postgresql", tmppath);
8301 : return true;
8302 : #endif
8303 : }
8304 :
8305 : /*
8306 : * Parse and try to interpret "value" as an integer value, and if successful,
8307 : * store it in *result, complaining if there is any trailing garbage or an
8308 : * overflow. This allows any number of leading and trailing whitespaces.
8309 : */
8310 : bool
8311 15507 : pqParseIntParam(const char *value, int *result, PGconn *conn,
8312 : const char *context)
8313 : {
8314 : char *end;
8315 : long numval;
8316 :
8317 : Assert(value != NULL);
8318 :
8319 15507 : *result = 0;
8320 :
8321 : /* strtol(3) skips leading whitespaces */
8322 15507 : errno = 0;
8323 15507 : numval = strtol(value, &end, 10);
8324 :
8325 : /*
8326 : * If no progress was done during the parsing or an error happened, fail.
8327 : * This tests properly for overflows of the result.
8328 : */
8329 15507 : if (value == end || errno != 0 || numval != (int) numval)
8330 0 : goto error;
8331 :
8332 : /*
8333 : * Skip any trailing whitespace; if anything but whitespace remains before
8334 : * the terminating character, fail
8335 : */
8336 15507 : while (*end != '\0' && isspace((unsigned char) *end))
8337 0 : end++;
8338 :
8339 15507 : if (*end != '\0')
8340 0 : goto error;
8341 :
8342 15507 : *result = numval;
8343 15507 : return true;
8344 :
8345 0 : error:
8346 0 : libpq_append_conn_error(conn, "invalid integer value \"%s\" for connection option \"%s\"",
8347 : value, context);
8348 0 : return false;
8349 : }
8350 :
8351 : /*
8352 : * Parse and try to interpret "value" as a ProtocolVersion value, and if
8353 : * successful, store it in *result.
8354 : */
8355 : static bool
8356 24 : pqParseProtocolVersion(const char *value, ProtocolVersion *result, PGconn *conn,
8357 : const char *context)
8358 : {
8359 24 : if (strcmp(value, "latest") == 0)
8360 : {
8361 17 : *result = PG_PROTOCOL_LATEST;
8362 17 : return true;
8363 : }
8364 7 : if (strcmp(value, "3.0") == 0)
8365 : {
8366 5 : *result = PG_PROTOCOL(3, 0);
8367 5 : return true;
8368 : }
8369 :
8370 : /* 3.1 never existed, we went straight from 3.0 to 3.2 */
8371 :
8372 2 : if (strcmp(value, "3.2") == 0)
8373 : {
8374 1 : *result = PG_PROTOCOL(3, 2);
8375 1 : return true;
8376 : }
8377 :
8378 1 : libpq_append_conn_error(conn, "invalid %s value: \"%s\"",
8379 : context, value);
8380 1 : return false;
8381 : }
8382 :
8383 : /*
8384 : * To keep the API consistent, the locking stubs are always provided, even
8385 : * if they are not required.
8386 : *
8387 : * Since we neglected to provide any error-return convention in the
8388 : * pgthreadlock_t API, we can't do much except Assert upon failure of any
8389 : * mutex primitive. Fortunately, such failures appear to be nonexistent in
8390 : * the field.
8391 : */
8392 :
8393 : static void
8394 0 : default_threadlock(int acquire)
8395 : {
8396 : static pthread_mutex_t singlethread_lock = PTHREAD_MUTEX_INITIALIZER;
8397 :
8398 0 : if (acquire)
8399 : {
8400 0 : if (pthread_mutex_lock(&singlethread_lock))
8401 : Assert(false);
8402 : }
8403 : else
8404 : {
8405 0 : if (pthread_mutex_unlock(&singlethread_lock))
8406 : Assert(false);
8407 : }
8408 0 : }
8409 :
8410 : pgthreadlock_t
8411 0 : PQregisterThreadLock(pgthreadlock_t newhandler)
8412 : {
8413 0 : pgthreadlock_t prev = pg_g_threadlock;
8414 :
8415 0 : if (newhandler)
8416 0 : pg_g_threadlock = newhandler;
8417 : else
8418 0 : pg_g_threadlock = default_threadlock;
8419 :
8420 0 : return prev;
8421 : }
8422 :
8423 : pgthreadlock_t
8424 0 : PQgetThreadLock(void)
8425 : {
8426 : Assert(pg_g_threadlock);
8427 0 : return pg_g_threadlock;
8428 : }
|