Re: Refactor SASL exchange in preparation for OAuth Bearer

From: Daniel Gustafsson <daniel(at)yesql(dot)se>
To: Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com>
Cc: PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>
Subject: Re: Refactor SASL exchange in preparation for OAuth Bearer
Date: 2024-02-28 22:54:03
Message-ID: 86FCD541-91BD-48E6-9327-FEB162EADB31@yesql.se
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

> On 26 Feb 2024, at 19:56, Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com> wrote:

>> + * SASL_FAILED: The exchance has failed and the connection should be
>
> s/exchance/exchange/

I rank that as one of my better typos actually. Fixed though.

>> - if (final && !done)
>> + if (final && !(status == SASL_FAILED || status == SASL_COMPLETE))
>
> Since there's not yet a SASL_ASYNC, I wonder if this would be more
> readable if it were changed to
> if (final && status == SASL_CONTINUE)
> to match the if condition shortly after it.

Fair point, that's more readable in this commit.

> In 0002, at the beginning of pg_SASL_init, the `password` variable now
> has an uninitialized code path. The OAuth patchset initializes it to
> NULL:

Nice catch, fixed.

--
Daniel Gustafsson

Attachment Content-Type Size
v2-0001-Refactor-SASL-exchange-to-return-tri-state-status.patch application/octet-stream 9.9 KB
v2-0002-Explicitly-require-password-for-SCRAM-exchange.patch application/octet-stream 3.2 KB

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Tomas Vondra 2024-02-28 23:17:51 Re: BitmapHeapScan streaming read user and prelim refactoring
Previous Message Tom Lane 2024-02-28 22:23:22 Re: Relation bulk write facility