Harmonize parameter names in ecpg code.
[pgsql.git] / src / include / libpq / libpq-be.h
blob6d452ec6d9564e35aab4f88aeb706dd2b9c0f9ad
1 /*-------------------------------------------------------------------------
3 * libpq-be.h
4 * This file contains definitions for structures and externs used
5 * by the postmaster during client authentication.
7 * Note that this is backend-internal and is NOT exported to clients.
8 * Structs that need to be client-visible are in pqcomm.h.
11 * Portions Copyright (c) 1996-2022, PostgreSQL Global Development Group
12 * Portions Copyright (c) 1994, Regents of the University of California
14 * src/include/libpq/libpq-be.h
16 *-------------------------------------------------------------------------
18 #ifndef LIBPQ_BE_H
19 #define LIBPQ_BE_H
21 #include <sys/time.h>
22 #ifdef USE_OPENSSL
23 #include <openssl/ssl.h>
24 #include <openssl/err.h>
25 #endif
26 #include <netinet/tcp.h>
28 #ifdef ENABLE_GSS
29 #if defined(HAVE_GSSAPI_H)
30 #include <gssapi.h>
31 #else
32 #include <gssapi/gssapi.h>
33 #endif /* HAVE_GSSAPI_H */
34 #endif /* ENABLE_GSS */
36 #ifdef ENABLE_SSPI
37 #define SECURITY_WIN32
38 #if defined(WIN32) && !defined(_MSC_VER)
39 #include <ntsecapi.h>
40 #endif
41 #include <security.h>
42 #undef SECURITY_WIN32
44 #ifndef ENABLE_GSS
46 * Define a fake structure compatible with GSSAPI on Unix.
48 typedef struct
50 void *value;
51 int length;
52 } gss_buffer_desc;
53 #endif
54 #endif /* ENABLE_SSPI */
56 #include "datatype/timestamp.h"
57 #include "libpq/hba.h"
58 #include "libpq/pqcomm.h"
61 typedef enum CAC_state
63 CAC_OK,
64 CAC_STARTUP,
65 CAC_SHUTDOWN,
66 CAC_RECOVERY,
67 CAC_NOTCONSISTENT,
68 CAC_TOOMANY
69 } CAC_state;
73 * GSSAPI specific state information
75 #if defined(ENABLE_GSS) | defined(ENABLE_SSPI)
76 typedef struct
78 gss_buffer_desc outbuf; /* GSSAPI output token buffer */
79 #ifdef ENABLE_GSS
80 gss_cred_id_t cred; /* GSSAPI connection cred's */
81 gss_ctx_id_t ctx; /* GSSAPI connection context */
82 gss_name_t name; /* GSSAPI client name */
83 char *princ; /* GSSAPI Principal used for auth, NULL if
84 * GSSAPI auth was not used */
85 bool auth; /* GSSAPI Authentication used */
86 bool enc; /* GSSAPI encryption in use */
87 #endif
88 } pg_gssinfo;
89 #endif
92 * ClientConnectionInfo includes the fields describing the client connection
93 * that are copied over to parallel workers as nothing from Port does that.
94 * The same rules apply for allocations here as for Port (everything must be
95 * malloc'd or palloc'd in TopMemoryContext).
97 * If you add a struct member here, remember to also handle serialization in
98 * SerializeClientConnectionInfo() and co.
100 typedef struct ClientConnectionInfo
103 * Authenticated identity. The meaning of this identifier is dependent on
104 * auth_method; it is the identity (if any) that the user presented during
105 * the authentication cycle, before they were assigned a database role.
106 * (It is effectively the "SYSTEM-USERNAME" of a pg_ident usermap --
107 * though the exact string in use may be different, depending on pg_hba
108 * options.)
110 * authn_id is NULL if the user has not actually been authenticated, for
111 * example if the "trust" auth method is in use.
113 const char *authn_id;
116 * The HBA method that determined the above authn_id. This only has
117 * meaning if authn_id is not NULL; otherwise it's undefined.
119 UserAuth auth_method;
120 } ClientConnectionInfo;
123 * This is used by the postmaster in its communication with frontends. It
124 * contains all state information needed during this communication before the
125 * backend is run. The Port structure is kept in malloc'd memory and is
126 * still available when a backend is running (see MyProcPort). The data
127 * it points to must also be malloc'd, or else palloc'd in TopMemoryContext,
128 * so that it survives into PostgresMain execution!
130 * remote_hostname is set if we did a successful reverse lookup of the
131 * client's IP address during connection setup.
132 * remote_hostname_resolv tracks the state of hostname verification:
133 * +1 = remote_hostname is known to resolve to client's IP address
134 * -1 = remote_hostname is known NOT to resolve to client's IP address
135 * 0 = we have not done the forward DNS lookup yet
136 * -2 = there was an error in name resolution
137 * If reverse lookup of the client IP address fails, remote_hostname will be
138 * left NULL while remote_hostname_resolv is set to -2. If reverse lookup
139 * succeeds but forward lookup fails, remote_hostname_resolv is also set to -2
140 * (the case is distinguishable because remote_hostname isn't NULL). In
141 * either of the -2 cases, remote_hostname_errcode saves the lookup return
142 * code for possible later use with gai_strerror.
145 typedef struct Port
147 pgsocket sock; /* File descriptor */
148 bool noblock; /* is the socket in non-blocking mode? */
149 ProtocolVersion proto; /* FE/BE protocol version */
150 SockAddr laddr; /* local addr (postmaster) */
151 SockAddr raddr; /* remote addr (client) */
152 char *remote_host; /* name (or ip addr) of remote host */
153 char *remote_hostname; /* name (not ip addr) of remote host, if
154 * available */
155 int remote_hostname_resolv; /* see above */
156 int remote_hostname_errcode; /* see above */
157 char *remote_port; /* text rep of remote port */
158 CAC_state canAcceptConnections; /* postmaster connection status */
161 * Information that needs to be saved from the startup packet and passed
162 * into backend execution. "char *" fields are NULL if not set.
163 * guc_options points to a List of alternating option names and values.
165 char *database_name;
166 char *user_name;
167 char *cmdline_options;
168 List *guc_options;
171 * The startup packet application name, only used here for the "connection
172 * authorized" log message. We shouldn't use this post-startup, instead
173 * the GUC should be used as application can change it afterward.
175 char *application_name;
178 * Information that needs to be held during the authentication cycle.
180 HbaLine *hba;
183 * TCP keepalive and user timeout settings.
185 * default values are 0 if AF_UNIX or not yet known; current values are 0
186 * if AF_UNIX or using the default. Also, -1 in a default value means we
187 * were unable to find out the default (getsockopt failed).
189 int default_keepalives_idle;
190 int default_keepalives_interval;
191 int default_keepalives_count;
192 int default_tcp_user_timeout;
193 int keepalives_idle;
194 int keepalives_interval;
195 int keepalives_count;
196 int tcp_user_timeout;
199 * GSSAPI structures.
201 #if defined(ENABLE_GSS) || defined(ENABLE_SSPI)
204 * If GSSAPI is supported and used on this connection, store GSSAPI
205 * information. Even when GSSAPI is not compiled in, store a NULL pointer
206 * to keep struct offsets the same (for extension ABI compatibility).
208 pg_gssinfo *gss;
209 #else
210 void *gss;
211 #endif
214 * SSL structures.
216 bool ssl_in_use;
217 char *peer_cn;
218 char *peer_dn;
219 bool peer_cert_valid;
222 * OpenSSL structures. (Keep these last so that the locations of other
223 * fields are the same whether or not you build with SSL enabled.)
225 #ifdef USE_OPENSSL
226 SSL *ssl;
227 X509 *peer;
228 #endif
229 } Port;
231 #ifdef USE_SSL
233 * Hardcoded DH parameters, used in ephemeral DH keying. (See also
234 * README.SSL for more details on EDH.)
236 * This is the 2048-bit DH parameter from RFC 3526. The generation of the
237 * prime is specified in RFC 2412 Appendix E, which also discusses the
238 * design choice of the generator. Note that when loaded with OpenSSL
239 * this causes DH_check() to fail on DH_NOT_SUITABLE_GENERATOR, where
240 * leaking a bit is preferred.
242 #define FILE_DH2048 \
243 "-----BEGIN DH PARAMETERS-----\n\
244 MIIBCAKCAQEA///////////JD9qiIWjCNMTGYouA3BzRKQJOCIpnzHQCC76mOxOb\n\
245 IlFKCHmONATd75UZs806QxswKwpt8l8UN0/hNW1tUcJF5IW1dmJefsb0TELppjft\n\
246 awv/XLb0Brft7jhr+1qJn6WunyQRfEsf5kkoZlHs5Fs9wgB8uKFjvwWY2kg2HFXT\n\
247 mmkWP6j9JM9fg2VdI9yjrZYcYvNWIIVSu57VKQdwlpZtZww1Tkq8mATxdGwIyhgh\n\
248 fDKQXkYuNs474553LBgOhgObJ4Oi7Aeij7XFXfBvTFLJ3ivL9pVYFxg5lUl86pVq\n\
249 5RXSJhiY+gUQFXKOWoqsqmj//////////wIBAg==\n\
250 -----END DH PARAMETERS-----\n"
253 * These functions are implemented by the glue code specific to each
254 * SSL implementation (e.g. be-secure-openssl.c)
258 * Initialize global SSL context.
260 * If isServerStart is true, report any errors as FATAL (so we don't return).
261 * Otherwise, log errors at LOG level and return -1 to indicate trouble,
262 * preserving the old SSL state if any. Returns 0 if OK.
264 extern int be_tls_init(bool isServerStart);
267 * Destroy global SSL context, if any.
269 extern void be_tls_destroy(void);
272 * Attempt to negotiate SSL connection.
274 extern int be_tls_open_server(Port *port);
277 * Close SSL connection.
279 extern void be_tls_close(Port *port);
282 * Read data from a secure connection.
284 extern ssize_t be_tls_read(Port *port, void *ptr, size_t len, int *waitfor);
287 * Write data to a secure connection.
289 extern ssize_t be_tls_write(Port *port, void *ptr, size_t len, int *waitfor);
292 * Return information about the SSL connection.
294 extern int be_tls_get_cipher_bits(Port *port);
295 extern const char *be_tls_get_version(Port *port);
296 extern const char *be_tls_get_cipher(Port *port);
297 extern void be_tls_get_peer_subject_name(Port *port, char *ptr, size_t len);
298 extern void be_tls_get_peer_issuer_name(Port *port, char *ptr, size_t len);
299 extern void be_tls_get_peer_serial(Port *port, char *ptr, size_t len);
302 * Get the server certificate hash for SCRAM channel binding type
303 * tls-server-end-point.
305 * The result is a palloc'd hash of the server certificate with its
306 * size, and NULL if there is no certificate available.
308 * This is not supported with old versions of OpenSSL that don't have
309 * the X509_get_signature_nid() function.
311 #if defined(USE_OPENSSL) && defined(HAVE_X509_GET_SIGNATURE_NID)
312 #define HAVE_BE_TLS_GET_CERTIFICATE_HASH
313 extern char *be_tls_get_certificate_hash(Port *port, size_t *len);
314 #endif
316 /* init hook for SSL, the default sets the password callback if appropriate */
317 #ifdef USE_OPENSSL
318 typedef void (*openssl_tls_init_hook_typ) (SSL_CTX *context, bool isServerStart);
319 extern PGDLLIMPORT openssl_tls_init_hook_typ openssl_tls_init_hook;
320 #endif
322 #endif /* USE_SSL */
324 #ifdef ENABLE_GSS
326 * Return information about the GSSAPI authenticated connection
328 extern bool be_gssapi_get_auth(Port *port);
329 extern bool be_gssapi_get_enc(Port *port);
330 extern const char *be_gssapi_get_princ(Port *port);
332 /* Read and write to a GSSAPI-encrypted connection. */
333 extern ssize_t be_gssapi_read(Port *port, void *ptr, size_t len);
334 extern ssize_t be_gssapi_write(Port *port, void *ptr, size_t len);
335 #endif /* ENABLE_GSS */
337 extern PGDLLIMPORT ProtocolVersion FrontendProtocol;
338 extern PGDLLIMPORT ClientConnectionInfo MyClientConnectionInfo;
340 /* TCP keepalives configuration. These are no-ops on an AF_UNIX socket. */
342 extern int pq_getkeepalivesidle(Port *port);
343 extern int pq_getkeepalivesinterval(Port *port);
344 extern int pq_getkeepalivescount(Port *port);
345 extern int pq_gettcpusertimeout(Port *port);
347 extern int pq_setkeepalivesidle(int idle, Port *port);
348 extern int pq_setkeepalivesinterval(int interval, Port *port);
349 extern int pq_setkeepalivescount(int count, Port *port);
350 extern int pq_settcpusertimeout(int timeout, Port *port);
352 #endif /* LIBPQ_BE_H */