PostgreSQL Source Code git master
Loading...
Searching...
No Matches
connection.c
Go to the documentation of this file.
1/*-------------------------------------------------------------------------
2 *
3 * connection.c
4 * Connection management functions for postgres_fdw
5 *
6 * Portions Copyright (c) 2012-2026, PostgreSQL Global Development Group
7 *
8 * IDENTIFICATION
9 * contrib/postgres_fdw/connection.c
10 *
11 *-------------------------------------------------------------------------
12 */
13#include "postgres.h"
14
15#if HAVE_POLL_H
16#include <poll.h>
17#endif
18
19#include "access/htup_details.h"
20#include "access/xact.h"
22#include "commands/defrem.h"
23#include "common/base64.h"
24#include "funcapi.h"
25#include "libpq/libpq-be.h"
27#include "mb/pg_wchar.h"
28#include "miscadmin.h"
29#include "pgstat.h"
30#include "postgres_fdw.h"
31#include "storage/latch.h"
32#include "utils/builtins.h"
33#include "utils/hsearch.h"
34#include "utils/inval.h"
35#include "utils/syscache.h"
36#include "utils/tuplestore.h"
37
38/*
39 * Connection cache hash table entry
40 *
41 * The lookup key in this hash table is the user mapping OID. We use just one
42 * connection per user mapping ID, which ensures that all the scans use the
43 * same snapshot during a query. Using the user mapping OID rather than
44 * the foreign server OID + user OID avoids creating multiple connections when
45 * the public user mapping applies to all user OIDs.
46 *
47 * The "conn" pointer can be NULL if we don't currently have a live connection.
48 * When we do have a connection, xact_depth tracks the current depth of
49 * transactions and subtransactions open on the remote side. We need to issue
50 * commands at the same nesting depth on the remote as we're executing at
51 * ourselves, so that rolling back a subtransaction will kill the right
52 * queries and not the wrong ones.
53 */
55
56typedef struct ConnCacheEntry
57{
58 ConnCacheKey key; /* hash key (must be first) */
59 PGconn *conn; /* connection to foreign server, or NULL */
60 /* Remaining fields are invalid when conn is NULL: */
61 int xact_depth; /* 0 = no xact open, 1 = main xact open, 2 =
62 * one level of subxact open, etc */
63 bool have_prep_stmt; /* have we prepared any stmts in this xact? */
64 bool have_error; /* have any subxacts aborted in this xact? */
65 bool changing_xact_state; /* xact state change in process */
66 bool parallel_commit; /* do we commit (sub)xacts in parallel? */
67 bool parallel_abort; /* do we abort (sub)xacts in parallel? */
68 bool invalidated; /* true if reconnect is pending */
69 bool keep_connections; /* setting value of keep_connections
70 * server option */
71 Oid serverid; /* foreign server OID used to get server name */
72 uint32 server_hashvalue; /* hash value of foreign server OID */
73 uint32 mapping_hashvalue; /* hash value of user mapping OID */
74 PgFdwConnState state; /* extra per-connection state */
76
77/*
78 * Connection cache (initialized on first use)
79 */
81
82/* for assigning cursor numbers and prepared statement numbers */
83static unsigned int cursor_number = 0;
84static unsigned int prep_stmt_number = 0;
85
86/* tracks whether any work is needed in callback functions */
87static bool xact_got_connection = false;
88
89/* custom wait event values, retrieved from shared memory */
93
94/*
95 * Milliseconds to wait to cancel an in-progress query or execute a cleanup
96 * query; if it takes longer than 30 seconds to do these, we assume the
97 * connection is dead.
98 */
99#define CONNECTION_CLEANUP_TIMEOUT 30000
100
101/*
102 * Milliseconds to wait before issuing another cancel request. This covers
103 * the race condition where the remote session ignored our cancel request
104 * because it arrived while idle.
105 */
106#define RETRY_CANCEL_TIMEOUT 1000
107
108/* Macro for constructing abort command to be sent */
109#define CONSTRUCT_ABORT_COMMAND(sql, entry, toplevel) \
110 do { \
111 if (toplevel) \
112 snprintf((sql), sizeof(sql), \
113 "ABORT TRANSACTION"); \
114 else \
115 snprintf((sql), sizeof(sql), \
116 "ROLLBACK TO SAVEPOINT s%d; RELEASE SAVEPOINT s%d", \
117 (entry)->xact_depth, (entry)->xact_depth); \
118 } while(0)
119
120/*
121 * Extension version number, for supporting older extension versions' objects
122 */
128
129/*
130 * SQL functions
131 */
137
138/* prototypes of private functions */
141static void disconnect_pg_server(ConnCacheEntry *entry);
142static void check_conn_params(const char **keywords, const char **values, UserMapping *user);
144static void do_sql_command_begin(PGconn *conn, const char *sql);
145static void do_sql_command_end(PGconn *conn, const char *sql,
146 bool consume_input);
147static void begin_remote_xact(ConnCacheEntry *entry);
148static void pgfdw_report_internal(int elevel, PGresult *res, PGconn *conn,
149 const char *sql);
150static void pgfdw_xact_callback(XactEvent event, void *arg);
151static void pgfdw_subxact_callback(SubXactEvent event,
154 void *arg);
156 uint32 hashvalue);
158static void pgfdw_reset_xact_state(ConnCacheEntry *entry, bool toplevel);
159static bool pgfdw_cancel_query(PGconn *conn);
163 bool consume_input);
164static bool pgfdw_exec_cleanup_query(PGconn *conn, const char *query,
165 bool ignore_errors);
166static bool pgfdw_exec_cleanup_query_begin(PGconn *conn, const char *query);
167static bool pgfdw_exec_cleanup_query_end(PGconn *conn, const char *query,
169 bool consume_input,
170 bool ignore_errors);
173 PGresult **result, bool *timed_out);
174static void pgfdw_abort_cleanup(ConnCacheEntry *entry, bool toplevel);
175static bool pgfdw_abort_cleanup_begin(ConnCacheEntry *entry, bool toplevel,
180 int curlevel);
183 bool toplevel);
184static void pgfdw_security_check(const char **keywords, const char **values,
188static bool disconnect_cached_connections(Oid serverid);
190 enum pgfdwVersion api_version);
191static int pgfdw_conn_check(PGconn *conn);
192static bool pgfdw_conn_checkable(void);
193static bool pgfdw_has_required_scram_options(const char **keywords, const char **values);
194
195/*
196 * Get a PGconn which can be used to execute queries on the remote PostgreSQL
197 * server with the user's authorization. A new connection is established
198 * if we don't already have a suitable one, and a transaction is opened at
199 * the right subtransaction nesting depth if we didn't do that already.
200 *
201 * will_prep_stmt must be true if caller intends to create any prepared
202 * statements. Since those don't go away automatically at transaction end
203 * (not even on error), we need this flag to cue manual cleanup.
204 *
205 * If state is not NULL, *state receives the per-connection state associated
206 * with the PGconn.
207 */
208PGconn *
210{
211 bool found;
212 bool retry = false;
213 ConnCacheEntry *entry;
214 ConnCacheKey key;
216
217 /* First time through, initialize connection cache hashtable */
218 if (ConnectionHash == NULL)
219 {
220 HASHCTL ctl;
221
222 if (pgfdw_we_get_result == 0)
224 WaitEventExtensionNew("PostgresFdwGetResult");
225
226 ctl.keysize = sizeof(ConnCacheKey);
227 ctl.entrysize = sizeof(ConnCacheEntry);
228 ConnectionHash = hash_create("postgres_fdw connections", 8,
229 &ctl,
231
232 /*
233 * Register some callback functions that manage connection cleanup.
234 * This should be done just once in each backend.
235 */
242 }
243
244 /* Set flag that we did GetConnection during the current transaction */
245 xact_got_connection = true;
246
247 /* Create hash key for the entry. Assume no pad bytes in key struct */
248 key = user->umid;
249
250 /*
251 * Find or create cached entry for requested connection.
252 */
253 entry = hash_search(ConnectionHash, &key, HASH_ENTER, &found);
254 if (!found)
255 {
256 /*
257 * We need only clear "conn" here; remaining fields will be filled
258 * later when "conn" is set.
259 */
260 entry->conn = NULL;
261 }
262
263 /* Reject further use of connections which failed abort cleanup. */
265
266 /*
267 * If the connection needs to be remade due to invalidation, disconnect as
268 * soon as we're out of all transactions.
269 */
270 if (entry->conn != NULL && entry->invalidated && entry->xact_depth == 0)
271 {
272 elog(DEBUG3, "closing connection %p for option changes to take effect",
273 entry->conn);
275 }
276
277 /*
278 * If cache entry doesn't have a connection, we have to establish a new
279 * connection. (If connect_pg_server throws an error, the cache entry
280 * will remain in a valid empty state, ie conn == NULL.)
281 */
282 if (entry->conn == NULL)
284
285 /*
286 * We check the health of the cached connection here when using it. In
287 * cases where we're out of all transactions, if a broken connection is
288 * detected, we try to reestablish a new connection later.
289 */
290 PG_TRY();
291 {
292 /* Process a pending asynchronous request if any. */
293 if (entry->state.pendingAreq)
295 /* Start a new transaction or subtransaction if needed. */
296 begin_remote_xact(entry);
297 }
298 PG_CATCH();
299 {
302
303 /*
304 * Determine whether to try to reestablish the connection.
305 *
306 * After a broken connection is detected in libpq, any error other
307 * than connection failure (e.g., out-of-memory) can be thrown
308 * somewhere between return from libpq and the expected ereport() call
309 * in pgfdw_report_error(). In this case, since PQstatus() indicates
310 * CONNECTION_BAD, checking only PQstatus() causes the false detection
311 * of connection failure. To avoid this, we also verify that the
312 * error's sqlstate is ERRCODE_CONNECTION_FAILURE. Note that also
313 * checking only the sqlstate can cause another false detection
314 * because pgfdw_report_error() may report ERRCODE_CONNECTION_FAILURE
315 * for any libpq-originated error condition.
316 */
317 if (errdata->sqlerrcode != ERRCODE_CONNECTION_FAILURE ||
318 PQstatus(entry->conn) != CONNECTION_BAD ||
319 entry->xact_depth > 0)
320 {
322 PG_RE_THROW();
323 }
324
325 /* Clean up the error state */
328 errdata = NULL;
329
330 retry = true;
331 }
332 PG_END_TRY();
333
334 /*
335 * If a broken connection is detected, disconnect it, reestablish a new
336 * connection and retry a new remote transaction. If connection failure is
337 * reported again, we give up getting a connection.
338 */
339 if (retry)
340 {
341 Assert(entry->xact_depth == 0);
342
344 (errmsg_internal("could not start remote transaction on connection %p",
345 entry->conn)),
347
348 elog(DEBUG3, "closing connection %p to reestablish a new one",
349 entry->conn);
351
353
354 begin_remote_xact(entry);
355 }
356
357 /* Remember if caller will prepare statements */
359
360 /* If caller needs access to the per-connection state, return it. */
361 if (state)
362 *state = &entry->state;
363
364 return entry->conn;
365}
366
367/*
368 * Reset all transient state fields in the cached connection entry and
369 * establish new connection to the remote server.
370 */
371static void
373{
374 ForeignServer *server = GetForeignServer(user->serverid);
375 ListCell *lc;
376
377 Assert(entry->conn == NULL);
378
379 /* Reset all transient state fields, to be sure all are clean */
380 entry->xact_depth = 0;
381 entry->have_prep_stmt = false;
382 entry->have_error = false;
383 entry->changing_xact_state = false;
384 entry->invalidated = false;
385 entry->serverid = server->serverid;
386 entry->server_hashvalue =
388 ObjectIdGetDatum(server->serverid));
389 entry->mapping_hashvalue =
391 ObjectIdGetDatum(user->umid));
392 memset(&entry->state, 0, sizeof(entry->state));
393
394 /*
395 * Determine whether to keep the connection that we're about to make here
396 * open even after the transaction using it ends, so that the subsequent
397 * transactions can re-use it.
398 *
399 * By default, all the connections to any foreign servers are kept open.
400 *
401 * Also determine whether to commit/abort (sub)transactions opened on the
402 * remote server in parallel at (sub)transaction end, which is disabled by
403 * default.
404 *
405 * Note: it's enough to determine these only when making a new connection
406 * because if these settings for it are changed, it will be closed and
407 * re-made later.
408 */
409 entry->keep_connections = true;
410 entry->parallel_commit = false;
411 entry->parallel_abort = false;
412 foreach(lc, server->options)
413 {
414 DefElem *def = (DefElem *) lfirst(lc);
415
416 if (strcmp(def->defname, "keep_connections") == 0)
417 entry->keep_connections = defGetBoolean(def);
418 else if (strcmp(def->defname, "parallel_commit") == 0)
419 entry->parallel_commit = defGetBoolean(def);
420 else if (strcmp(def->defname, "parallel_abort") == 0)
421 entry->parallel_abort = defGetBoolean(def);
422 }
423
424 /* Now try to make the connection */
425 entry->conn = connect_pg_server(server, user);
426
427 elog(DEBUG3, "new postgres_fdw connection %p for server \"%s\" (user mapping oid %u, userid %u)",
428 entry->conn, server->servername, user->umid, user->userid);
429}
430
431/*
432 * Check that non-superuser has used password or delegated credentials
433 * to establish connection; otherwise, he's piggybacking on the
434 * postgres server's user identity. See also dblink_security_check()
435 * in contrib/dblink and check_conn_params.
436 */
437static void
439{
440 /* Superusers bypass the check */
441 if (superuser_arg(user->userid))
442 return;
443
444#ifdef ENABLE_GSS
445 /* Connected via GSSAPI with delegated credentials- all good. */
447 return;
448#endif
449
450 /* Ok if superuser set PW required false. */
452 return;
453
454 /* Connected via PW, with PW required true, and provided non-empty PW. */
456 {
457 /* ok if params contain a non-empty password */
458 for (int i = 0; keywords[i] != NULL; i++)
459 {
460 if (strcmp(keywords[i], "password") == 0 && values[i][0] != '\0')
461 return;
462 }
463 }
464
465 /*
466 * Ok if SCRAM pass-through is being used and all required SCRAM options
467 * are set correctly. If pgfdw_has_required_scram_options returns true we
468 * assume that UseScramPassthrough is also true since SCRAM options are
469 * only set when UseScramPassthrough is enabled.
470 */
472 return;
473
476 errmsg("password or GSSAPI delegated credentials required"),
477 errdetail("Non-superuser cannot connect if the server does not request a password or use GSSAPI with delegated credentials."),
478 errhint("Target server's authentication method must be changed or password_required=false set in the user mapping attributes.")));
479}
480
481/*
482 * Construct connection params from generic options of ForeignServer and
483 * UserMapping. (Some of them might not be libpq options, in which case we'll
484 * just waste a few array slots.)
485 */
486static void
488 const char ***p_keywords, const char ***p_values,
489 char **p_appname)
490{
491 const char **keywords;
492 const char **values;
493 char *appname = NULL;
494 int n;
495
496 /*
497 * Add 4 extra slots for application_name, fallback_application_name,
498 * client_encoding, end marker, and 3 extra slots for scram keys and
499 * required scram pass-through options.
500 */
501 n = list_length(server->options) + list_length(user->options) + 4 + 3;
502 keywords = (const char **) palloc(n * sizeof(char *));
503 values = (const char **) palloc(n * sizeof(char *));
504
505 n = 0;
507 keywords + n, values + n);
508 n += ExtractConnectionOptions(user->options,
509 keywords + n, values + n);
510
511 /*
512 * Use pgfdw_application_name as application_name if set.
513 *
514 * PQconnectdbParams() processes the parameter arrays from start to end.
515 * If any key word is repeated, the last value is used. Therefore note
516 * that pgfdw_application_name must be added to the arrays after options
517 * of ForeignServer are, so that it can override application_name set in
518 * ForeignServer.
519 */
521 {
522 keywords[n] = "application_name";
524 n++;
525 }
526
527 /*
528 * Search the parameter arrays to find application_name setting, and
529 * replace escape sequences in it with status information if found. The
530 * arrays are searched backwards because the last value is used if
531 * application_name is repeatedly set.
532 */
533 for (int i = n - 1; i >= 0; i--)
534 {
535 if (strcmp(keywords[i], "application_name") == 0 &&
536 *(values[i]) != '\0')
537 {
538 /*
539 * Use this application_name setting if it's not empty string even
540 * after any escape sequences in it are replaced.
541 */
542 appname = process_pgfdw_appname(values[i]);
543 if (appname[0] != '\0')
544 {
545 values[i] = appname;
546 break;
547 }
548
549 /*
550 * This empty application_name is not used, so we set values[i] to
551 * NULL and keep searching the array to find the next one.
552 */
553 values[i] = NULL;
554 pfree(appname);
555 appname = NULL;
556 }
557 }
558
559 *p_appname = appname;
560
561 /* Use "postgres_fdw" as fallback_application_name */
562 keywords[n] = "fallback_application_name";
563 values[n] = "postgres_fdw";
564 n++;
565
566 /* Set client_encoding so that libpq can convert encoding properly. */
567 keywords[n] = "client_encoding";
569 n++;
570
571 /* Add required SCRAM pass-through connection options if it's enabled. */
573 {
574 int len;
575 int encoded_len;
576
577 keywords[n] = "scram_client_key";
579 /* don't forget the zero-terminator */
580 values[n] = palloc0(len + 1);
583 (char *) values[n], len);
584 if (encoded_len < 0)
585 elog(ERROR, "could not encode SCRAM client key");
586 n++;
587
588 keywords[n] = "scram_server_key";
590 /* don't forget the zero-terminator */
591 values[n] = palloc0(len + 1);
594 (char *) values[n], len);
595 if (encoded_len < 0)
596 elog(ERROR, "could not encode SCRAM server key");
597 n++;
598
599 /*
600 * Require scram-sha-256 to ensure that no other auth method is used
601 * when connecting with foreign server.
602 */
603 keywords[n] = "require_auth";
604 values[n] = "scram-sha-256";
605 n++;
606 }
607
608 keywords[n] = values[n] = NULL;
609
610 /* Verify the set of connection parameters. */
612
614 *p_values = values;
615}
616
617/*
618 * Connect to remote server using specified server and user mapping properties.
619 */
620static PGconn *
622{
623 PGconn *volatile conn = NULL;
624
625 /*
626 * Use PG_TRY block to ensure closing connection on error.
627 */
628 PG_TRY();
629 {
630 const char **keywords;
631 const char **values;
632 char *appname;
633
634 construct_connection_params(server, user, &keywords, &values, &appname);
635
636 /* first time, allocate or get the custom wait event */
637 if (pgfdw_we_connect == 0)
638 pgfdw_we_connect = WaitEventExtensionNew("PostgresFdwConnect");
639
640 /* OK to make connection */
642 false, /* expand_dbname */
644
645 if (!conn || PQstatus(conn) != CONNECTION_OK)
648 errmsg("could not connect to server \"%s\"",
649 server->servername),
651
653 "received message via remote connection");
654
655 /* Perform post-connection security checks. */
657
658 /* Prepare new session for use */
660
661 if (appname != NULL)
662 pfree(appname);
664 pfree(values);
665 }
666 PG_CATCH();
667 {
669 PG_RE_THROW();
670 }
671 PG_END_TRY();
672
673 return conn;
674}
675
676/*
677 * Disconnect any open connection for a connection cache entry.
678 */
679static void
681{
682 if (entry->conn != NULL)
683 {
685 entry->conn = NULL;
686 }
687}
688
689/*
690 * Check and return the value of password_required, if defined; otherwise,
691 * return true, which is the default value of it. The mapping has been
692 * pre-validated.
693 */
694static bool
696{
697 ListCell *cell;
698
699 foreach(cell, user->options)
700 {
701 DefElem *def = (DefElem *) lfirst(cell);
702
703 if (strcmp(def->defname, "password_required") == 0)
704 return defGetBoolean(def);
705 }
706
707 return true;
708}
709
710static bool
712{
713 ListCell *cell;
714
715 foreach(cell, server->options)
716 {
717 DefElem *def = (DefElem *) lfirst(cell);
718
719 if (strcmp(def->defname, "use_scram_passthrough") == 0)
720 return defGetBoolean(def);
721 }
722
723 foreach(cell, user->options)
724 {
725 DefElem *def = (DefElem *) lfirst(cell);
726
727 if (strcmp(def->defname, "use_scram_passthrough") == 0)
728 return defGetBoolean(def);
729 }
730
731 return false;
732}
733
734/*
735 * For non-superusers, insist that the connstr specify a password or that the
736 * user provided their own GSSAPI delegated credentials. This
737 * prevents a password from being picked up from .pgpass, a service file, the
738 * environment, etc. We don't want the postgres user's passwords,
739 * certificates, etc to be accessible to non-superusers. (See also
740 * dblink_connstr_check in contrib/dblink.)
741 */
742static void
743check_conn_params(const char **keywords, const char **values, UserMapping *user)
744{
745 int i;
746
747 /* no check required if superuser */
748 if (superuser_arg(user->userid))
749 return;
750
751#ifdef ENABLE_GSS
752 /* ok if the user provided their own delegated credentials */
754 return;
755#endif
756
757 /* ok if params contain a non-empty password */
758 for (i = 0; keywords[i] != NULL; i++)
759 {
760 if (strcmp(keywords[i], "password") == 0 && values[i][0] != '\0')
761 return;
762 }
763
764 /* ok if the superuser explicitly said so at user mapping creation time */
766 return;
767
768 /*
769 * Ok if SCRAM pass-through is being used and all required scram options
770 * are set correctly. If pgfdw_has_required_scram_options returns true we
771 * assume that UseScramPassthrough is also true since SCRAM options are
772 * only set when UseScramPassthrough is enabled.
773 */
775 return;
776
779 errmsg("password or GSSAPI delegated credentials required"),
780 errdetail("Non-superusers must delegate GSSAPI credentials, provide a password, or enable SCRAM pass-through in user mapping.")));
781}
782
783/*
784 * Issue SET commands to make sure remote session is configured properly.
785 *
786 * We do this just once at connection, assuming nothing will change the
787 * values later. Since we'll never send volatile function calls to the
788 * remote, there shouldn't be any way to break this assumption from our end.
789 * It's possible to think of ways to break it at the remote end, eg making
790 * a foreign table point to a view that includes a set_config call ---
791 * but once you admit the possibility of a malicious view definition,
792 * there are any number of ways to break things.
793 */
794static void
796{
798
799 /* Force the search path to contain only pg_catalog (see deparse.c) */
800 do_sql_command(conn, "SET search_path = pg_catalog");
801
802 /*
803 * Set remote timezone; this is basically just cosmetic, since all
804 * transmitted and returned timestamptzs should specify a zone explicitly
805 * anyway. However it makes the regression test outputs more predictable.
806 *
807 * We don't risk setting remote zone equal to ours, since the remote
808 * server might use a different timezone database. Instead, use GMT
809 * (quoted, because very old servers are picky about case). That's
810 * guaranteed to work regardless of the remote's timezone database,
811 * because pg_tzset() hard-wires it (at least in PG 9.2 and later).
812 */
813 do_sql_command(conn, "SET timezone = 'GMT'");
814
815 /*
816 * Set values needed to ensure unambiguous data output from remote. (This
817 * logic should match what pg_dump does. See also set_transmission_modes
818 * in postgres_fdw.c.)
819 */
820 do_sql_command(conn, "SET datestyle = ISO");
821 if (remoteversion >= 80400)
822 do_sql_command(conn, "SET intervalstyle = postgres");
823 if (remoteversion >= 90000)
824 do_sql_command(conn, "SET extra_float_digits = 3");
825 else
826 do_sql_command(conn, "SET extra_float_digits = 2");
827}
828
829/*
830 * Convenience subroutine to issue a non-data-returning SQL command to remote
831 */
832void
833do_sql_command(PGconn *conn, const char *sql)
834{
836 do_sql_command_end(conn, sql, false);
837}
838
839static void
841{
842 if (!PQsendQuery(conn, sql))
844}
845
846static void
848{
849 PGresult *res;
850
851 /*
852 * If requested, consume whatever data is available from the socket. (Note
853 * that if all data is available, this allows pgfdw_get_result to call
854 * PQgetResult without forcing the overhead of WaitLatchOrSocket, which
855 * would be large compared to the overhead of PQconsumeInput.)
856 */
859 res = pgfdw_get_result(conn);
861 pgfdw_report_error(res, conn, sql);
862 PQclear(res);
863}
864
865/*
866 * Start remote transaction or subtransaction, if needed.
867 *
868 * Note that we always use at least REPEATABLE READ in the remote session.
869 * This is so that, if a query initiates multiple scans of the same or
870 * different foreign tables, we will get snapshot-consistent results from
871 * those scans. A disadvantage is that we can't provide sane emulation of
872 * READ COMMITTED behavior --- it would be nice if we had some other way to
873 * control which remote queries share a snapshot.
874 */
875static void
877{
879
880 /* Start main transaction if we haven't yet */
881 if (entry->xact_depth <= 0)
882 {
883 const char *sql;
884
885 elog(DEBUG3, "starting remote transaction on connection %p",
886 entry->conn);
887
889 sql = "START TRANSACTION ISOLATION LEVEL SERIALIZABLE";
890 else
891 sql = "START TRANSACTION ISOLATION LEVEL REPEATABLE READ";
892 entry->changing_xact_state = true;
893 do_sql_command(entry->conn, sql);
894 entry->xact_depth = 1;
895 entry->changing_xact_state = false;
896 }
897
898 /*
899 * If we're in a subtransaction, stack up savepoints to match our level.
900 * This ensures we can rollback just the desired effects when a
901 * subtransaction aborts.
902 */
903 while (entry->xact_depth < curlevel)
904 {
905 char sql[64];
906
907 snprintf(sql, sizeof(sql), "SAVEPOINT s%d", entry->xact_depth + 1);
908 entry->changing_xact_state = true;
909 do_sql_command(entry->conn, sql);
910 entry->xact_depth++;
911 entry->changing_xact_state = false;
912 }
913}
914
915/*
916 * Release connection reference count created by calling GetConnection.
917 */
918void
920{
921 /*
922 * Currently, we don't actually track connection references because all
923 * cleanup is managed on a transaction or subtransaction basis instead. So
924 * there's nothing to do here.
925 */
926}
927
928/*
929 * Assign a "unique" number for a cursor.
930 *
931 * These really only need to be unique per connection within a transaction.
932 * For the moment we ignore the per-connection point and assign them across
933 * all connections in the transaction, but we ask for the connection to be
934 * supplied in case we want to refine that.
935 *
936 * Note that even if wraparound happens in a very long transaction, actual
937 * collisions are highly improbable; just be sure to use %u not %d to print.
938 */
939unsigned int
941{
942 return ++cursor_number;
943}
944
945/*
946 * Assign a "unique" number for a prepared statement.
947 *
948 * This works much like GetCursorNumber, except that we never reset the counter
949 * within a session. That's because we can't be 100% sure we've gotten rid
950 * of all prepared statements on all connections, and it's not really worth
951 * increasing the risk of prepared-statement name collisions by resetting.
952 */
953unsigned int
958
959/*
960 * Submit a query and wait for the result.
961 *
962 * Since we don't use non-blocking mode, this can't process interrupts while
963 * pushing the query text to the server. That risk is relatively small, so we
964 * ignore that for now.
965 *
966 * Caller is responsible for the error handling on the result.
967 */
968PGresult *
970{
971 /* First, process a pending asynchronous request, if any. */
972 if (state && state->pendingAreq)
973 process_pending_request(state->pendingAreq);
974
975 if (!PQsendQuery(conn, query))
976 return NULL;
977 return pgfdw_get_result(conn);
978}
979
980/*
981 * Wrap libpqsrv_get_result_last(), adding wait event.
982 *
983 * Caller is responsible for the error handling on the result.
984 */
985PGresult *
990
991/*
992 * Report an error we got from the remote server.
993 *
994 * Callers should use pgfdw_report_error() to throw an error, or use
995 * pgfdw_report() for lesser message levels. (We make this distinction
996 * so that pgfdw_report_error() can be marked noreturn.)
997 *
998 * res: PGresult containing the error (might be NULL)
999 * conn: connection we did the query on
1000 * sql: NULL, or text of remote command we tried to execute
1001 *
1002 * If "res" is not NULL, it'll be PQclear'ed here (unless we throw error,
1003 * in which case memory context cleanup will clear it eventually).
1004 *
1005 * Note: callers that choose not to throw ERROR for a remote error are
1006 * responsible for making sure that the associated ConnCacheEntry gets
1007 * marked with have_error = true.
1008 */
1009void
1010pgfdw_report_error(PGresult *res, PGconn *conn, const char *sql)
1011{
1012 pgfdw_report_internal(ERROR, res, conn, sql);
1014}
1015
1016void
1017pgfdw_report(int elevel, PGresult *res, PGconn *conn, const char *sql)
1018{
1019 Assert(elevel < ERROR); /* use pgfdw_report_error for that */
1020 pgfdw_report_internal(elevel, res, conn, sql);
1021}
1022
1023static void
1025 const char *sql)
1026{
1032 int sqlstate;
1033
1034 if (diag_sqlstate)
1035 sqlstate = MAKE_SQLSTATE(diag_sqlstate[0],
1036 diag_sqlstate[1],
1037 diag_sqlstate[2],
1038 diag_sqlstate[3],
1039 diag_sqlstate[4]);
1040 else
1041 sqlstate = ERRCODE_CONNECTION_FAILURE;
1042
1043 /*
1044 * If we don't get a message from the PGresult, try the PGconn. This is
1045 * needed because for connection-level failures, PQgetResult may just
1046 * return NULL, not a PGresult at all.
1047 */
1048 if (message_primary == NULL)
1050
1051 ereport(elevel,
1052 (errcode(sqlstate),
1053 (message_primary != NULL && message_primary[0] != '\0') ?
1055 errmsg("could not obtain message string for remote error"),
1057 message_hint ? errhint("%s", message_hint) : 0,
1059 sql ? errcontext("remote SQL command: %s", sql) : 0));
1060 PQclear(res);
1061}
1062
1063/*
1064 * pgfdw_xact_callback --- cleanup at main-transaction end.
1065 *
1066 * This runs just late enough that it must not enter user-defined code
1067 * locally. (Entering such code on the remote side is fine. Its remote
1068 * COMMIT TRANSACTION may run deferred triggers.)
1069 */
1070static void
1072{
1073 HASH_SEQ_STATUS scan;
1074 ConnCacheEntry *entry;
1077
1078 /* Quick exit if no connections were touched in this transaction. */
1080 return;
1081
1082 /*
1083 * Scan all connection cache entries to find open remote transactions, and
1084 * close them.
1085 */
1087 while ((entry = (ConnCacheEntry *) hash_seq_search(&scan)))
1088 {
1089 PGresult *res;
1090
1091 /* Ignore cache entry if no open connection right now */
1092 if (entry->conn == NULL)
1093 continue;
1094
1095 /* If it has an open remote transaction, try to close it */
1096 if (entry->xact_depth > 0)
1097 {
1098 elog(DEBUG3, "closing remote transaction on connection %p",
1099 entry->conn);
1100
1101 switch (event)
1102 {
1105
1106 /*
1107 * If abort cleanup previously failed for this connection,
1108 * we can't issue any more commands against it.
1109 */
1111
1112 /* Commit all remote transactions during pre-commit */
1113 entry->changing_xact_state = true;
1114 if (entry->parallel_commit)
1115 {
1116 do_sql_command_begin(entry->conn, "COMMIT TRANSACTION");
1118 continue;
1119 }
1120 do_sql_command(entry->conn, "COMMIT TRANSACTION");
1121 entry->changing_xact_state = false;
1122
1123 /*
1124 * If there were any errors in subtransactions, and we
1125 * made prepared statements, do a DEALLOCATE ALL to make
1126 * sure we get rid of all prepared statements. This is
1127 * annoying and not terribly bulletproof, but it's
1128 * probably not worth trying harder.
1129 *
1130 * DEALLOCATE ALL only exists in 8.3 and later, so this
1131 * constrains how old a server postgres_fdw can
1132 * communicate with. We intentionally ignore errors in
1133 * the DEALLOCATE, so that we can hobble along to some
1134 * extent with older servers (leaking prepared statements
1135 * as we go; but we don't really support update operations
1136 * pre-8.3 anyway).
1137 */
1138 if (entry->have_prep_stmt && entry->have_error)
1139 {
1140 res = pgfdw_exec_query(entry->conn, "DEALLOCATE ALL",
1141 NULL);
1142 PQclear(res);
1143 }
1144 entry->have_prep_stmt = false;
1145 entry->have_error = false;
1146 break;
1148
1149 /*
1150 * We disallow any remote transactions, since it's not
1151 * very reasonable to hold them open until the prepared
1152 * transaction is committed. For the moment, throw error
1153 * unconditionally; later we might allow read-only cases.
1154 * Note that the error will cause us to come right back
1155 * here with event == XACT_EVENT_ABORT, so we'll clean up
1156 * the connection state at that point.
1157 */
1158 ereport(ERROR,
1160 errmsg("cannot PREPARE a transaction that has operated on postgres_fdw foreign tables")));
1161 break;
1163 case XACT_EVENT_COMMIT:
1164 case XACT_EVENT_PREPARE:
1165 /* Pre-commit should have closed the open transaction */
1166 elog(ERROR, "missed cleaning up connection during pre-commit");
1167 break;
1169 case XACT_EVENT_ABORT:
1170 /* Rollback all remote transactions during abort */
1171 if (entry->parallel_abort)
1172 {
1173 if (pgfdw_abort_cleanup_begin(entry, true,
1176 continue;
1177 }
1178 else
1179 pgfdw_abort_cleanup(entry, true);
1180 break;
1181 }
1182 }
1183
1184 /* Reset state to show we're out of a transaction */
1185 pgfdw_reset_xact_state(entry, true);
1186 }
1187
1188 /* If there are any pending connections, finish cleaning them up */
1190 {
1191 if (event == XACT_EVENT_PARALLEL_PRE_COMMIT ||
1192 event == XACT_EVENT_PRE_COMMIT)
1193 {
1196 }
1197 else
1198 {
1200 event == XACT_EVENT_ABORT);
1202 true);
1203 }
1204 }
1205
1206 /*
1207 * Regardless of the event type, we can now mark ourselves as out of the
1208 * transaction. (Note: if we are here during PRE_COMMIT or PRE_PREPARE,
1209 * this saves a useless scan of the hashtable during COMMIT or PREPARE.)
1210 */
1211 xact_got_connection = false;
1212
1213 /* Also reset cursor numbering for next transaction */
1214 cursor_number = 0;
1215}
1216
1217/*
1218 * pgfdw_subxact_callback --- cleanup at subtransaction end.
1219 */
1220static void
1223{
1224 HASH_SEQ_STATUS scan;
1225 ConnCacheEntry *entry;
1226 int curlevel;
1229
1230 /* Nothing to do at subxact start, nor after commit. */
1231 if (!(event == SUBXACT_EVENT_PRE_COMMIT_SUB ||
1232 event == SUBXACT_EVENT_ABORT_SUB))
1233 return;
1234
1235 /* Quick exit if no connections were touched in this transaction. */
1237 return;
1238
1239 /*
1240 * Scan all connection cache entries to find open remote subtransactions
1241 * of the current level, and close them.
1242 */
1245 while ((entry = (ConnCacheEntry *) hash_seq_search(&scan)))
1246 {
1247 char sql[100];
1248
1249 /*
1250 * We only care about connections with open remote subtransactions of
1251 * the current level.
1252 */
1253 if (entry->conn == NULL || entry->xact_depth < curlevel)
1254 continue;
1255
1256 if (entry->xact_depth > curlevel)
1257 elog(ERROR, "missed cleaning up remote subtransaction at level %d",
1258 entry->xact_depth);
1259
1260 if (event == SUBXACT_EVENT_PRE_COMMIT_SUB)
1261 {
1262 /*
1263 * If abort cleanup previously failed for this connection, we
1264 * can't issue any more commands against it.
1265 */
1267
1268 /* Commit all remote subtransactions during pre-commit */
1269 snprintf(sql, sizeof(sql), "RELEASE SAVEPOINT s%d", curlevel);
1270 entry->changing_xact_state = true;
1271 if (entry->parallel_commit)
1272 {
1273 do_sql_command_begin(entry->conn, sql);
1275 continue;
1276 }
1277 do_sql_command(entry->conn, sql);
1278 entry->changing_xact_state = false;
1279 }
1280 else
1281 {
1282 /* Rollback all remote subtransactions during abort */
1283 if (entry->parallel_abort)
1284 {
1285 if (pgfdw_abort_cleanup_begin(entry, false,
1288 continue;
1289 }
1290 else
1291 pgfdw_abort_cleanup(entry, false);
1292 }
1293
1294 /* OK, we're outta that level of subtransaction */
1295 pgfdw_reset_xact_state(entry, false);
1296 }
1297
1298 /* If there are any pending connections, finish cleaning them up */
1300 {
1301 if (event == SUBXACT_EVENT_PRE_COMMIT_SUB)
1302 {
1305 }
1306 else
1307 {
1310 false);
1311 }
1312 }
1313}
1314
1315/*
1316 * Connection invalidation callback function
1317 *
1318 * After a change to a pg_foreign_server or pg_user_mapping catalog entry,
1319 * close connections depending on that entry immediately if current transaction
1320 * has not used those connections yet. Otherwise, mark those connections as
1321 * invalid and then make pgfdw_xact_callback() close them at the end of current
1322 * transaction, since they cannot be closed in the midst of the transaction
1323 * using them. Closed connections will be remade at the next opportunity if
1324 * necessary.
1325 *
1326 * Although most cache invalidation callbacks blow away all the related stuff
1327 * regardless of the given hashvalue, connections are expensive enough that
1328 * it's worth trying to avoid that.
1329 *
1330 * NB: We could avoid unnecessary disconnection more strictly by examining
1331 * individual option values, but it seems too much effort for the gain.
1332 */
1333static void
1335{
1336 HASH_SEQ_STATUS scan;
1337 ConnCacheEntry *entry;
1338
1340
1341 /* ConnectionHash must exist already, if we're registered */
1343 while ((entry = (ConnCacheEntry *) hash_seq_search(&scan)))
1344 {
1345 /* Ignore invalid entries */
1346 if (entry->conn == NULL)
1347 continue;
1348
1349 /* hashvalue == 0 means a cache reset, must clear all state */
1350 if (hashvalue == 0 ||
1352 entry->server_hashvalue == hashvalue) ||
1353 (cacheid == USERMAPPINGOID &&
1354 entry->mapping_hashvalue == hashvalue))
1355 {
1356 /*
1357 * Close the connection immediately if it's not used yet in this
1358 * transaction. Otherwise mark it as invalid so that
1359 * pgfdw_xact_callback() can close it at the end of this
1360 * transaction.
1361 */
1362 if (entry->xact_depth == 0)
1363 {
1364 elog(DEBUG3, "discarding connection %p", entry->conn);
1365 disconnect_pg_server(entry);
1366 }
1367 else
1368 entry->invalidated = true;
1369 }
1370 }
1371}
1372
1373/*
1374 * Raise an error if the given connection cache entry is marked as being
1375 * in the middle of an xact state change. This should be called at which no
1376 * such change is expected to be in progress; if one is found to be in
1377 * progress, it means that we aborted in the middle of a previous state change
1378 * and now don't know what the remote transaction state actually is.
1379 * Such connections can't safely be further used. Re-establishing the
1380 * connection would change the snapshot and roll back any writes already
1381 * performed, so that's not an option, either. Thus, we must abort.
1382 */
1383static void
1385{
1386 ForeignServer *server;
1387
1388 /* nothing to do for inactive entries and entries of sane state */
1389 if (entry->conn == NULL || !entry->changing_xact_state)
1390 return;
1391
1392 /* make sure this entry is inactive */
1393 disconnect_pg_server(entry);
1394
1395 /* find server name to be shown in the message below */
1396 server = GetForeignServer(entry->serverid);
1397
1398 ereport(ERROR,
1400 errmsg("connection to server \"%s\" was lost",
1401 server->servername)));
1402}
1403
1404/*
1405 * Reset state to show we're out of a (sub)transaction.
1406 */
1407static void
1409{
1410 if (toplevel)
1411 {
1412 /* Reset state to show we're out of a transaction */
1413 entry->xact_depth = 0;
1414
1415 /*
1416 * If the connection isn't in a good idle state, it is marked as
1417 * invalid or keep_connections option of its server is disabled, then
1418 * discard it to recover. Next GetConnection will open a new
1419 * connection.
1420 */
1421 if (PQstatus(entry->conn) != CONNECTION_OK ||
1423 entry->changing_xact_state ||
1424 entry->invalidated ||
1425 !entry->keep_connections)
1426 {
1427 elog(DEBUG3, "discarding connection %p", entry->conn);
1428 disconnect_pg_server(entry);
1429 }
1430 }
1431 else
1432 {
1433 /* Reset state to show we're out of a subtransaction */
1434 entry->xact_depth--;
1435 }
1436}
1437
1438/*
1439 * Cancel the currently-in-progress query (whose query text we do not have)
1440 * and ignore the result. Returns true if we successfully cancel the query
1441 * and discard any pending result, and false if not.
1442 *
1443 * It's not a huge problem if we throw an ERROR here, but if we get into error
1444 * recursion trouble, we'll end up slamming the connection shut, which will
1445 * necessitate failing the entire toplevel transaction even if subtransactions
1446 * were used. Try to use WARNING where we can.
1447 *
1448 * XXX: if the query was one sent by fetch_more_data_begin(), we could get the
1449 * query text from the pendingAreq saved in the per-connection state, then
1450 * report the query using it.
1451 */
1452static bool
1454{
1458
1459 /*
1460 * If it takes too long to cancel the query and discard the result, assume
1461 * the connection is dead.
1462 */
1464
1465 /*
1466 * Also, lose patience and re-issue the cancel request after a little bit.
1467 * (This serves to close some race conditions.)
1468 */
1470
1472 return false;
1474}
1475
1476/*
1477 * Submit a cancel request to the given connection, waiting only until
1478 * the given time.
1479 *
1480 * We sleep interruptibly until we receive confirmation that the cancel
1481 * request has been accepted, and if it is, return true; if the timeout
1482 * lapses without that, or the request fails for whatever reason, return
1483 * false.
1484 */
1485static bool
1487{
1488 const char *errormsg = libpqsrv_cancel(conn, endtime);
1489
1490 if (errormsg != NULL)
1493 errmsg("could not send cancel request: %s", errormsg));
1494
1495 return errormsg == NULL;
1496}
1497
1498static bool
1501{
1502 PGresult *result;
1503 bool timed_out;
1504
1505 /*
1506 * If requested, consume whatever data is available from the socket. (Note
1507 * that if all data is available, this allows pgfdw_get_cleanup_result to
1508 * call PQgetResult without forcing the overhead of WaitLatchOrSocket,
1509 * which would be large compared to the overhead of PQconsumeInput.)
1510 */
1512 {
1515 errmsg("could not get result of cancel request: %s",
1517 return false;
1518 }
1519
1520 /* Get and discard the result of the query. */
1522 &result, &timed_out))
1523 {
1524 if (timed_out)
1526 (errmsg("could not get result of cancel request due to timeout")));
1527 else
1530 errmsg("could not get result of cancel request: %s",
1532
1533 return false;
1534 }
1535 PQclear(result);
1536
1537 return true;
1538}
1539
1540/*
1541 * Submit a query during (sub)abort cleanup and wait up to 30 seconds for the
1542 * result. If the query is executed without error, the return value is true.
1543 * If the query is executed successfully but returns an error, the return
1544 * value is true if and only if ignore_errors is set. If the query can't be
1545 * sent or times out, the return value is false.
1546 *
1547 * It's not a huge problem if we throw an ERROR here, but if we get into error
1548 * recursion trouble, we'll end up slamming the connection shut, which will
1549 * necessitate failing the entire toplevel transaction even if subtransactions
1550 * were used. Try to use WARNING where we can.
1551 */
1552static bool
1554{
1556
1557 /*
1558 * If it takes too long to execute a cleanup query, assume the connection
1559 * is dead. It's fairly likely that this is why we aborted in the first
1560 * place (e.g. statement timeout, user cancel), so the timeout shouldn't
1561 * be too long.
1562 */
1565
1567 return false;
1569 false, ignore_errors);
1570}
1571
1572static bool
1574{
1575 Assert(query != NULL);
1576
1577 /*
1578 * Submit a query. Since we don't use non-blocking mode, this also can
1579 * block. But its risk is relatively small, so we ignore that for now.
1580 */
1581 if (!PQsendQuery(conn, query))
1582 {
1583 pgfdw_report(WARNING, NULL, conn, query);
1584 return false;
1585 }
1586
1587 return true;
1588}
1589
1590static bool
1593 bool ignore_errors)
1594{
1595 PGresult *result;
1596 bool timed_out;
1597
1598 Assert(query != NULL);
1599
1600 /*
1601 * If requested, consume whatever data is available from the socket. (Note
1602 * that if all data is available, this allows pgfdw_get_cleanup_result to
1603 * call PQgetResult without forcing the overhead of WaitLatchOrSocket,
1604 * which would be large compared to the overhead of PQconsumeInput.)
1605 */
1607 {
1608 pgfdw_report(WARNING, NULL, conn, query);
1609 return false;
1610 }
1611
1612 /* Get the result of the query. */
1614 {
1615 if (timed_out)
1617 (errmsg("could not get query result due to timeout"),
1618 errcontext("remote SQL command: %s", query)));
1619 else
1620 pgfdw_report(WARNING, NULL, conn, query);
1621
1622 return false;
1623 }
1624
1625 /* Issue a warning if not successful. */
1626 if (PQresultStatus(result) != PGRES_COMMAND_OK)
1627 {
1628 pgfdw_report(WARNING, result, conn, query);
1629 return ignore_errors;
1630 }
1631 PQclear(result);
1632
1633 return true;
1634}
1635
1636/*
1637 * Get, during abort cleanup, the result of a query that is in progress.
1638 * This might be a query that is being interrupted by a cancel request or by
1639 * transaction abort, or it might be a query that was initiated as part of
1640 * transaction abort to get the remote side back to the appropriate state.
1641 *
1642 * endtime is the time at which we should give up and assume the remote side
1643 * is dead. retrycanceltime is the time at which we should issue a fresh
1644 * cancel request (pass the same value as endtime if this is not wanted).
1645 *
1646 * Returns true if the timeout expired or connection trouble occurred,
1647 * false otherwise. Sets *result except in case of a true result.
1648 * Sets *timed_out to true only when the timeout expired.
1649 */
1650static bool
1653 PGresult **result,
1654 bool *timed_out)
1655{
1656 bool failed = false;
1657 PGresult *last_res = NULL;
1659
1660 *result = NULL;
1661 *timed_out = false;
1662 for (;;)
1663 {
1664 PGresult *res;
1665
1666 while (PQisBusy(conn))
1667 {
1668 int wc;
1670 long cur_timeout;
1671
1672 /* If timeout has expired, give up. */
1673 if (now >= endtime)
1674 {
1675 *timed_out = true;
1676 failed = true;
1677 goto exit;
1678 }
1679
1680 /* If we need to re-issue the cancel request, do that. */
1681 if (now >= retrycanceltime)
1682 {
1683 /* We ignore failure to issue the repeated request. */
1685
1686 /* Recompute "now" in case that took measurable time. */
1688
1689 /* Adjust re-cancel timeout in increasing steps. */
1691 canceldelta);
1693 }
1694
1695 /* If timeout has expired, give up, else get sleep time. */
1697 Min(endtime,
1699 if (cur_timeout <= 0)
1700 {
1701 *timed_out = true;
1702 failed = true;
1703 goto exit;
1704 }
1705
1706 /* first time, allocate or get the custom wait event */
1707 if (pgfdw_we_cleanup_result == 0)
1708 pgfdw_we_cleanup_result = WaitEventExtensionNew("PostgresFdwCleanupResult");
1709
1710 /* Sleep until there's something to do */
1714 PQsocket(conn),
1717
1719
1720 /* Data available in socket? */
1721 if (wc & WL_SOCKET_READABLE)
1722 {
1723 if (!PQconsumeInput(conn))
1724 {
1725 /* connection trouble */
1726 failed = true;
1727 goto exit;
1728 }
1729 }
1730 }
1731
1732 res = PQgetResult(conn);
1733 if (res == NULL)
1734 break; /* query is complete */
1735
1736 PQclear(last_res);
1737 last_res = res;
1738 }
1739exit:
1740 if (failed)
1741 PQclear(last_res);
1742 else
1743 *result = last_res;
1744 return failed;
1745}
1746
1747/*
1748 * Abort remote transaction or subtransaction.
1749 *
1750 * "toplevel" should be set to true if toplevel (main) transaction is
1751 * rollbacked, false otherwise.
1752 *
1753 * Set entry->changing_xact_state to false on success, true on failure.
1754 */
1755static void
1757{
1758 char sql[100];
1759
1760 /*
1761 * Don't try to clean up the connection if we're already in error
1762 * recursion trouble.
1763 */
1765 entry->changing_xact_state = true;
1766
1767 /*
1768 * If connection is already unsalvageable, don't touch it further.
1769 */
1770 if (entry->changing_xact_state)
1771 return;
1772
1773 /*
1774 * Mark this connection as in the process of changing transaction state.
1775 */
1776 entry->changing_xact_state = true;
1777
1778 /* Assume we might have lost track of prepared statements */
1779 entry->have_error = true;
1780
1781 /*
1782 * If a command has been submitted to the remote server by using an
1783 * asynchronous execution function, the command might not have yet
1784 * completed. Check to see if a command is still being processed by the
1785 * remote server, and if so, request cancellation of the command.
1786 */
1787 if (PQtransactionStatus(entry->conn) == PQTRANS_ACTIVE &&
1788 !pgfdw_cancel_query(entry->conn))
1789 return; /* Unable to cancel running query */
1790
1791 CONSTRUCT_ABORT_COMMAND(sql, entry, toplevel);
1792 if (!pgfdw_exec_cleanup_query(entry->conn, sql, false))
1793 return; /* Unable to abort remote (sub)transaction */
1794
1795 if (toplevel)
1796 {
1797 if (entry->have_prep_stmt && entry->have_error &&
1799 "DEALLOCATE ALL",
1800 true))
1801 return; /* Trouble clearing prepared statements */
1802
1803 entry->have_prep_stmt = false;
1804 entry->have_error = false;
1805 }
1806
1807 /*
1808 * If pendingAreq of the per-connection state is not NULL, it means that
1809 * an asynchronous fetch begun by fetch_more_data_begin() was not done
1810 * successfully and thus the per-connection state was not reset in
1811 * fetch_more_data(); in that case reset the per-connection state here.
1812 */
1813 if (entry->state.pendingAreq)
1814 memset(&entry->state, 0, sizeof(entry->state));
1815
1816 /* Disarm changing_xact_state if it all worked */
1817 entry->changing_xact_state = false;
1818}
1819
1820/*
1821 * Like pgfdw_abort_cleanup, submit an abort command or cancel request, but
1822 * don't wait for the result.
1823 *
1824 * Returns true if the abort command or cancel request is successfully issued,
1825 * false otherwise. If the abort command is successfully issued, the given
1826 * connection cache entry is appended to *pending_entries. Otherwise, if the
1827 * cancel request is successfully issued, it is appended to *cancel_requested.
1828 */
1829static bool
1832{
1833 /*
1834 * Don't try to clean up the connection if we're already in error
1835 * recursion trouble.
1836 */
1838 entry->changing_xact_state = true;
1839
1840 /*
1841 * If connection is already unsalvageable, don't touch it further.
1842 */
1843 if (entry->changing_xact_state)
1844 return false;
1845
1846 /*
1847 * Mark this connection as in the process of changing transaction state.
1848 */
1849 entry->changing_xact_state = true;
1850
1851 /* Assume we might have lost track of prepared statements */
1852 entry->have_error = true;
1853
1854 /*
1855 * If a command has been submitted to the remote server by using an
1856 * asynchronous execution function, the command might not have yet
1857 * completed. Check to see if a command is still being processed by the
1858 * remote server, and if so, request cancellation of the command.
1859 */
1861 {
1863
1867 return false; /* Unable to cancel running query */
1869 }
1870 else
1871 {
1872 char sql[100];
1873
1874 CONSTRUCT_ABORT_COMMAND(sql, entry, toplevel);
1875 if (!pgfdw_exec_cleanup_query_begin(entry->conn, sql))
1876 return false; /* Unable to abort remote transaction */
1878 }
1879
1880 return true;
1881}
1882
1883/*
1884 * Finish pre-commit cleanup of connections on each of which we've sent a
1885 * COMMIT command to the remote server.
1886 */
1887static void
1889{
1890 ConnCacheEntry *entry;
1892 ListCell *lc;
1893
1895
1896 /*
1897 * Get the result of the COMMIT command for each of the pending entries
1898 */
1899 foreach(lc, pending_entries)
1900 {
1901 entry = (ConnCacheEntry *) lfirst(lc);
1902
1904
1905 /*
1906 * We might already have received the result on the socket, so pass
1907 * consume_input=true to try to consume it first
1908 */
1909 do_sql_command_end(entry->conn, "COMMIT TRANSACTION", true);
1910 entry->changing_xact_state = false;
1911
1912 /* Do a DEALLOCATE ALL in parallel if needed */
1913 if (entry->have_prep_stmt && entry->have_error)
1914 {
1915 /* Ignore errors (see notes in pgfdw_xact_callback) */
1916 if (PQsendQuery(entry->conn, "DEALLOCATE ALL"))
1917 {
1919 continue;
1920 }
1921 }
1922 entry->have_prep_stmt = false;
1923 entry->have_error = false;
1924
1925 pgfdw_reset_xact_state(entry, true);
1926 }
1927
1928 /* No further work if no pending entries */
1929 if (!pending_deallocs)
1930 return;
1931
1932 /*
1933 * Get the result of the DEALLOCATE command for each of the pending
1934 * entries
1935 */
1936 foreach(lc, pending_deallocs)
1937 {
1938 PGresult *res;
1939
1940 entry = (ConnCacheEntry *) lfirst(lc);
1941
1942 /* Ignore errors (see notes in pgfdw_xact_callback) */
1943 while ((res = PQgetResult(entry->conn)) != NULL)
1944 {
1945 PQclear(res);
1946 /* Stop if the connection is lost (else we'll loop infinitely) */
1947 if (PQstatus(entry->conn) == CONNECTION_BAD)
1948 break;
1949 }
1950 entry->have_prep_stmt = false;
1951 entry->have_error = false;
1952
1953 pgfdw_reset_xact_state(entry, true);
1954 }
1955}
1956
1957/*
1958 * Finish pre-subcommit cleanup of connections on each of which we've sent a
1959 * RELEASE command to the remote server.
1960 */
1961static void
1963{
1964 ConnCacheEntry *entry;
1965 char sql[100];
1966 ListCell *lc;
1967
1969
1970 /*
1971 * Get the result of the RELEASE command for each of the pending entries
1972 */
1973 snprintf(sql, sizeof(sql), "RELEASE SAVEPOINT s%d", curlevel);
1974 foreach(lc, pending_entries)
1975 {
1976 entry = (ConnCacheEntry *) lfirst(lc);
1977
1979
1980 /*
1981 * We might already have received the result on the socket, so pass
1982 * consume_input=true to try to consume it first
1983 */
1984 do_sql_command_end(entry->conn, sql, true);
1985 entry->changing_xact_state = false;
1986
1987 pgfdw_reset_xact_state(entry, false);
1988 }
1989}
1990
1991/*
1992 * Finish abort cleanup of connections on each of which we've sent an abort
1993 * command or cancel request to the remote server.
1994 */
1995static void
1997 bool toplevel)
1998{
2000 ListCell *lc;
2001
2002 /*
2003 * For each of the pending cancel requests (if any), get and discard the
2004 * result of the query, and submit an abort command to the remote server.
2005 */
2006 if (cancel_requested)
2007 {
2008 foreach(lc, cancel_requested)
2009 {
2010 ConnCacheEntry *entry = (ConnCacheEntry *) lfirst(lc);
2014 char sql[100];
2015
2017
2018 /*
2019 * Set end time. You might think we should do this before issuing
2020 * cancel request like in normal mode, but that is problematic,
2021 * because if, for example, it took longer than 30 seconds to
2022 * process the first few entries in the cancel_requested list, it
2023 * would cause a timeout error when processing each of the
2024 * remaining entries in the list, leading to slamming that entry's
2025 * connection shut.
2026 */
2031
2032 if (!pgfdw_cancel_query_end(entry->conn, endtime,
2033 retrycanceltime, true))
2034 {
2035 /* Unable to cancel running query */
2036 pgfdw_reset_xact_state(entry, toplevel);
2037 continue;
2038 }
2039
2040 /* Send an abort command in parallel if needed */
2041 CONSTRUCT_ABORT_COMMAND(sql, entry, toplevel);
2042 if (!pgfdw_exec_cleanup_query_begin(entry->conn, sql))
2043 {
2044 /* Unable to abort remote (sub)transaction */
2045 pgfdw_reset_xact_state(entry, toplevel);
2046 }
2047 else
2049 }
2050 }
2051
2052 /* No further work if no pending entries */
2053 if (!pending_entries)
2054 return;
2055
2056 /*
2057 * Get the result of the abort command for each of the pending entries
2058 */
2059 foreach(lc, pending_entries)
2060 {
2061 ConnCacheEntry *entry = (ConnCacheEntry *) lfirst(lc);
2063 char sql[100];
2064
2066
2067 /*
2068 * Set end time. We do this now, not before issuing the command like
2069 * in normal mode, for the same reason as for the cancel_requested
2070 * entries.
2071 */
2074
2075 CONSTRUCT_ABORT_COMMAND(sql, entry, toplevel);
2076 if (!pgfdw_exec_cleanup_query_end(entry->conn, sql, endtime,
2077 true, false))
2078 {
2079 /* Unable to abort remote (sub)transaction */
2080 pgfdw_reset_xact_state(entry, toplevel);
2081 continue;
2082 }
2083
2084 if (toplevel)
2085 {
2086 /* Do a DEALLOCATE ALL in parallel if needed */
2087 if (entry->have_prep_stmt && entry->have_error)
2088 {
2090 "DEALLOCATE ALL"))
2091 {
2092 /* Trouble clearing prepared statements */
2093 pgfdw_reset_xact_state(entry, toplevel);
2094 }
2095 else
2097 continue;
2098 }
2099 entry->have_prep_stmt = false;
2100 entry->have_error = false;
2101 }
2102
2103 /* Reset the per-connection state if needed */
2104 if (entry->state.pendingAreq)
2105 memset(&entry->state, 0, sizeof(entry->state));
2106
2107 /* We're done with this entry; unset the changing_xact_state flag */
2108 entry->changing_xact_state = false;
2109 pgfdw_reset_xact_state(entry, toplevel);
2110 }
2111
2112 /* No further work if no pending entries */
2113 if (!pending_deallocs)
2114 return;
2115 Assert(toplevel);
2116
2117 /*
2118 * Get the result of the DEALLOCATE command for each of the pending
2119 * entries
2120 */
2121 foreach(lc, pending_deallocs)
2122 {
2123 ConnCacheEntry *entry = (ConnCacheEntry *) lfirst(lc);
2125
2127 Assert(entry->have_prep_stmt);
2128 Assert(entry->have_error);
2129
2130 /*
2131 * Set end time. We do this now, not before issuing the command like
2132 * in normal mode, for the same reason as for the cancel_requested
2133 * entries.
2134 */
2137
2138 if (!pgfdw_exec_cleanup_query_end(entry->conn, "DEALLOCATE ALL",
2139 endtime, true, true))
2140 {
2141 /* Trouble clearing prepared statements */
2142 pgfdw_reset_xact_state(entry, toplevel);
2143 continue;
2144 }
2145 entry->have_prep_stmt = false;
2146 entry->have_error = false;
2147
2148 /* Reset the per-connection state if needed */
2149 if (entry->state.pendingAreq)
2150 memset(&entry->state, 0, sizeof(entry->state));
2151
2152 /* We're done with this entry; unset the changing_xact_state flag */
2153 entry->changing_xact_state = false;
2154 pgfdw_reset_xact_state(entry, toplevel);
2155 }
2156}
2157
2158/* Number of output arguments (columns) for various API versions */
2159#define POSTGRES_FDW_GET_CONNECTIONS_COLS_V1_1 2
2160#define POSTGRES_FDW_GET_CONNECTIONS_COLS_V1_2 6
2161#define POSTGRES_FDW_GET_CONNECTIONS_COLS 6 /* maximum of above */
2162
2163/*
2164 * Internal function used by postgres_fdw_get_connections variants.
2165 *
2166 * For API version 1.1, this function takes no input parameter and
2167 * returns a set of records with the following values:
2168 *
2169 * - server_name - server name of active connection. In case the foreign server
2170 * is dropped but still the connection is active, then the server name will
2171 * be NULL in output.
2172 * - valid - true/false representing whether the connection is valid or not.
2173 * Note that connections can become invalid in pgfdw_inval_callback.
2174 *
2175 * For API version 1.2 and later, this function takes an input parameter
2176 * to check a connection status and returns the following
2177 * additional values along with the four values from version 1.1:
2178 *
2179 * - user_name - the local user name of the active connection. In case the
2180 * user mapping is dropped but the connection is still active, then the
2181 * user name will be NULL in the output.
2182 * - used_in_xact - true if the connection is used in the current transaction.
2183 * - closed - true if the connection is closed.
2184 * - remote_backend_pid - process ID of the remote backend, on the foreign
2185 * server, handling the connection.
2186 *
2187 * No records are returned when there are no cached connections at all.
2188 */
2189static void
2191 enum pgfdwVersion api_version)
2192{
2194 HASH_SEQ_STATUS scan;
2195 ConnCacheEntry *entry;
2196
2197 InitMaterializedSRF(fcinfo, 0);
2198
2199 /* If cache doesn't exist, we return no records */
2200 if (!ConnectionHash)
2201 return;
2202
2203 /* Check we have the expected number of output arguments */
2204 switch (rsinfo->setDesc->natts)
2205 {
2207 if (api_version != PGFDW_V1_1)
2208 elog(ERROR, "incorrect number of output arguments");
2209 break;
2211 if (api_version != PGFDW_V1_2)
2212 elog(ERROR, "incorrect number of output arguments");
2213 break;
2214 default:
2215 elog(ERROR, "incorrect number of output arguments");
2216 }
2217
2219 while ((entry = (ConnCacheEntry *) hash_seq_search(&scan)))
2220 {
2221 ForeignServer *server;
2223 bool nulls[POSTGRES_FDW_GET_CONNECTIONS_COLS] = {0};
2224 int i = 0;
2225
2226 /* We only look for open remote connections */
2227 if (!entry->conn)
2228 continue;
2229
2231
2232 /*
2233 * The foreign server may have been dropped in current explicit
2234 * transaction. It is not possible to drop the server from another
2235 * session when the connection associated with it is in use in the
2236 * current transaction, if tried so, the drop query in another session
2237 * blocks until the current transaction finishes.
2238 *
2239 * Even though the server is dropped in the current transaction, the
2240 * cache can still have associated active connection entry, say we
2241 * call such connections dangling. Since we can not fetch the server
2242 * name from system catalogs for dangling connections, instead we show
2243 * NULL value for server name in output.
2244 *
2245 * We could have done better by storing the server name in the cache
2246 * entry instead of server oid so that it could be used in the output.
2247 * But the server name in each cache entry requires 64 bytes of
2248 * memory, which is huge, when there are many cached connections and
2249 * the use case i.e. dropping the foreign server within the explicit
2250 * current transaction seems rare. So, we chose to show NULL value for
2251 * server name in output.
2252 *
2253 * Such dangling connections get closed either in next use or at the
2254 * end of current explicit transaction in pgfdw_xact_callback.
2255 */
2256 if (!server)
2257 {
2258 /*
2259 * If the server has been dropped in the current explicit
2260 * transaction, then this entry would have been invalidated in
2261 * pgfdw_inval_callback at the end of drop server command. Note
2262 * that this connection would not have been closed in
2263 * pgfdw_inval_callback because it is still being used in the
2264 * current explicit transaction. So, assert that here.
2265 */
2266 Assert(entry->conn && entry->xact_depth > 0 && entry->invalidated);
2267
2268 /* Show null, if no server name was found */
2269 nulls[i++] = true;
2270 }
2271 else
2272 values[i++] = CStringGetTextDatum(server->servername);
2273
2274 if (api_version >= PGFDW_V1_2)
2275 {
2276 HeapTuple tp;
2277
2278 /* Use the system cache to obtain the user mapping */
2280
2281 /*
2282 * Just like in the foreign server case, user mappings can also be
2283 * dropped in the current explicit transaction. Therefore, the
2284 * similar check as in the server case is required.
2285 */
2286 if (!HeapTupleIsValid(tp))
2287 {
2288 /*
2289 * If we reach here, this entry must have been invalidated in
2290 * pgfdw_inval_callback, same as in the server case.
2291 */
2292 Assert(entry->conn && entry->xact_depth > 0 &&
2293 entry->invalidated);
2294
2295 nulls[i++] = true;
2296 }
2297 else
2298 {
2299 Oid userid;
2300
2301 userid = ((Form_pg_user_mapping) GETSTRUCT(tp))->umuser;
2303 ReleaseSysCache(tp);
2304 }
2305 }
2306
2307 values[i++] = BoolGetDatum(!entry->invalidated);
2308
2309 if (api_version >= PGFDW_V1_2)
2310 {
2311 bool check_conn = PG_GETARG_BOOL(0);
2312
2313 /* Is this connection used in the current transaction? */
2314 values[i++] = BoolGetDatum(entry->xact_depth > 0);
2315
2316 /*
2317 * If a connection status check is requested and supported, return
2318 * whether the connection is closed. Otherwise, return NULL.
2319 */
2321 values[i++] = BoolGetDatum(pgfdw_conn_check(entry->conn) != 0);
2322 else
2323 nulls[i++] = true;
2324
2325 /* Return process ID of remote backend */
2326 values[i++] = Int32GetDatum(PQbackendPID(entry->conn));
2327 }
2328
2329 tuplestore_putvalues(rsinfo->setResult, rsinfo->setDesc, values, nulls);
2330 }
2331}
2332
2333/*
2334 * Values in connection strings must be enclosed in single quotes. Single
2335 * quotes and backslashes must be escaped with backslash. NB: these rules are
2336 * different from the rules for escaping a SQL literal.
2337 */
2338static void
2340{
2342 for (int i = 0; val[i] != '\0'; i++)
2343 {
2344 if (val[i] == '\\' || val[i] == '\'')
2347 }
2349}
2350
2351Datum
2353{
2354 Oid userid = PG_GETARG_OID(0);
2355 Oid serverid = PG_GETARG_OID(1);
2356 ForeignServer *server = GetForeignServer(serverid);
2357 UserMapping *user = GetUserMapping(userid, serverid);
2359 const char **keywords;
2360 const char **values;
2361 char *appname;
2362 char *sep = "";
2363
2364 construct_connection_params(server, user, &keywords, &values, &appname);
2365
2367 for (int i = 0; keywords[i] != NULL; i++)
2368 {
2369 if (values[i] == NULL)
2370 continue;
2371 appendStringInfo(&str, "%s%s = ", sep, keywords[i]);
2373 sep = " ";
2374 }
2375
2376 if (appname != NULL)
2377 pfree(appname);
2378 pfree(keywords);
2379 pfree(values);
2381}
2382
2383/*
2384 * List active foreign server connections.
2385 *
2386 * The SQL API of this function has changed multiple times, and will likely
2387 * do so again in future. To support the case where a newer version of this
2388 * loadable module is being used with an old SQL declaration of the function,
2389 * we continue to support the older API versions.
2390 */
2391Datum
2398
2399Datum
2406
2407/*
2408 * Disconnect the specified cached connections.
2409 *
2410 * This function discards the open connections that are established by
2411 * postgres_fdw from the local session to the foreign server with
2412 * the given name. Note that there can be multiple connections to
2413 * the given server using different user mappings. If the connections
2414 * are used in the current local transaction, they are not disconnected
2415 * and warning messages are reported. This function returns true
2416 * if it disconnects at least one connection, otherwise false. If no
2417 * foreign server with the given name is found, an error is reported.
2418 */
2419Datum
2421{
2422 ForeignServer *server;
2423 char *servername;
2424
2425 servername = text_to_cstring(PG_GETARG_TEXT_PP(0));
2426 server = GetForeignServerByName(servername, false);
2427
2429}
2430
2431/*
2432 * Disconnect all the cached connections.
2433 *
2434 * This function discards all the open connections that are established by
2435 * postgres_fdw from the local session to the foreign servers.
2436 * If the connections are used in the current local transaction, they are
2437 * not disconnected and warning messages are reported. This function
2438 * returns true if it disconnects at least one connection, otherwise false.
2439 */
2440Datum
2445
2446/*
2447 * Workhorse to disconnect cached connections.
2448 *
2449 * This function scans all the connection cache entries and disconnects
2450 * the open connections whose foreign server OID matches with
2451 * the specified one. If InvalidOid is specified, it disconnects all
2452 * the cached connections.
2453 *
2454 * This function emits a warning for each connection that's used in
2455 * the current transaction and doesn't close it. It returns true if
2456 * it disconnects at least one connection, otherwise false.
2457 *
2458 * Note that this function disconnects even the connections that are
2459 * established by other users in the same local session using different
2460 * user mappings. This leads even non-superuser to be able to close
2461 * the connections established by superusers in the same local session.
2462 *
2463 * XXX As of now we don't see any security risk doing this. But we should
2464 * set some restrictions on that, for example, prevent non-superuser
2465 * from closing the connections established by superusers even
2466 * in the same session?
2467 */
2468static bool
2470{
2471 HASH_SEQ_STATUS scan;
2472 ConnCacheEntry *entry;
2473 bool all = !OidIsValid(serverid);
2474 bool result = false;
2475
2476 /*
2477 * Connection cache hashtable has not been initialized yet in this
2478 * session, so return false.
2479 */
2480 if (!ConnectionHash)
2481 return false;
2482
2484 while ((entry = (ConnCacheEntry *) hash_seq_search(&scan)))
2485 {
2486 /* Ignore cache entry if no open connection right now. */
2487 if (!entry->conn)
2488 continue;
2489
2490 if (all || entry->serverid == serverid)
2491 {
2492 /*
2493 * Emit a warning because the connection to close is used in the
2494 * current transaction and cannot be disconnected right now.
2495 */
2496 if (entry->xact_depth > 0)
2497 {
2498 ForeignServer *server;
2499
2500 server = GetForeignServerExtended(entry->serverid,
2502
2503 if (!server)
2504 {
2505 /*
2506 * If the foreign server was dropped while its connection
2507 * was used in the current transaction, the connection
2508 * must have been marked as invalid by
2509 * pgfdw_inval_callback at the end of DROP SERVER command.
2510 */
2511 Assert(entry->invalidated);
2512
2514 (errmsg("cannot close dropped server connection because it is still in use")));
2515 }
2516 else
2518 (errmsg("cannot close connection for server \"%s\" because it is still in use",
2519 server->servername)));
2520 }
2521 else
2522 {
2523 elog(DEBUG3, "discarding connection %p", entry->conn);
2524 disconnect_pg_server(entry);
2525 result = true;
2526 }
2527 }
2528 }
2529
2530 return result;
2531}
2532
2533/*
2534 * Check if the remote server closed the connection.
2535 *
2536 * Returns 1 if the connection is closed, -1 if an error occurred,
2537 * and 0 if it's not closed or if the connection check is unavailable
2538 * on this platform.
2539 */
2540static int
2542{
2543 int sock = PQsocket(conn);
2544
2545 if (PQstatus(conn) != CONNECTION_OK || sock == -1)
2546 return -1;
2547
2548#if (defined(HAVE_POLL) && defined(POLLRDHUP))
2549 {
2550 struct pollfd input_fd;
2551 int result;
2552
2553 input_fd.fd = sock;
2554 input_fd.events = POLLRDHUP;
2555 input_fd.revents = 0;
2556
2557 do
2558 result = poll(&input_fd, 1, 0);
2559 while (result < 0 && errno == EINTR);
2560
2561 if (result < 0)
2562 return -1;
2563
2564 return (input_fd.revents &
2565 (POLLRDHUP | POLLHUP | POLLERR | POLLNVAL)) ? 1 : 0;
2566 }
2567#else
2568 return 0;
2569#endif
2570}
2571
2572/*
2573 * Check if connection status checking is available on this platform.
2574 *
2575 * Returns true if available, false otherwise.
2576 */
2577static bool
2579{
2580#if (defined(HAVE_POLL) && defined(POLLRDHUP))
2581 return true;
2582#else
2583 return false;
2584#endif
2585}
2586
2587/*
2588 * Ensure that require_auth and SCRAM keys are correctly set on values. SCRAM
2589 * keys used to pass-through are coming from the initial connection from the
2590 * client with the server.
2591 *
2592 * All required SCRAM options are set by postgres_fdw, so we just need to
2593 * ensure that these options are not overwritten by the user.
2594 */
2595static bool
2597{
2598 bool has_scram_server_key = false;
2599 bool has_scram_client_key = false;
2600 bool has_require_auth = false;
2601 bool has_scram_keys = false;
2602
2603 /*
2604 * Continue iterating even if we found the keys that we need to validate
2605 * to make sure that there is no other declaration of these keys that can
2606 * overwrite the first.
2607 */
2608 for (int i = 0; keywords[i] != NULL; i++)
2609 {
2610 if (strcmp(keywords[i], "scram_client_key") == 0)
2611 {
2612 if (values[i] != NULL && values[i][0] != '\0')
2613 has_scram_client_key = true;
2614 else
2615 has_scram_client_key = false;
2616 }
2617
2618 if (strcmp(keywords[i], "scram_server_key") == 0)
2619 {
2620 if (values[i] != NULL && values[i][0] != '\0')
2621 has_scram_server_key = true;
2622 else
2623 has_scram_server_key = false;
2624 }
2625
2626 if (strcmp(keywords[i], "require_auth") == 0)
2627 {
2628 if (values[i] != NULL && strcmp(values[i], "scram-sha-256") == 0)
2629 has_require_auth = true;
2630 else
2631 has_require_auth = false;
2632 }
2633 }
2634
2636
2637 return (has_scram_keys && has_require_auth);
2638}
long TimestampDifferenceMilliseconds(TimestampTz start_time, TimestampTz stop_time)
Definition timestamp.c:1748
TimestampTz GetCurrentTimestamp(void)
Definition timestamp.c:1636
Datum now(PG_FUNCTION_ARGS)
Definition timestamp.c:1600
int pg_b64_enc_len(int srclen)
Definition base64.c:224
int pg_b64_encode(const uint8 *src, int len, char *dst, int dstlen)
Definition base64.c:49
bool be_gssapi_get_delegation(Port *port)
static Datum values[MAXATTR]
Definition bootstrap.c:188
#define CStringGetTextDatum(s)
Definition builtins.h:98
#define Min(x, y)
Definition c.h:1093
uint32 SubTransactionId
Definition c.h:742
#define Assert(condition)
Definition c.h:945
#define pg_unreachable()
Definition c.h:361
uint32_t uint32
Definition c.h:618
#define OidIsValid(objectId)
Definition c.h:860
Oid ConnCacheKey
Definition connection.c:54
static unsigned int prep_stmt_number
Definition connection.c:84
unsigned int GetCursorNumber(PGconn *conn)
Definition connection.c:940
static bool UserMappingPasswordRequired(UserMapping *user)
Definition connection.c:695
Datum postgres_fdw_get_connections(PG_FUNCTION_ARGS)
void do_sql_command(PGconn *conn, const char *sql)
Definition connection.c:833
#define POSTGRES_FDW_GET_CONNECTIONS_COLS_V1_2
static void construct_connection_params(ForeignServer *server, UserMapping *user, const char ***p_keywords, const char ***p_values, char **p_appname)
Definition connection.c:487
PGresult * pgfdw_exec_query(PGconn *conn, const char *query, PgFdwConnState *state)
Definition connection.c:969
static void pgfdw_finish_pre_subcommit_cleanup(List *pending_entries, int curlevel)
static void disconnect_pg_server(ConnCacheEntry *entry)
Definition connection.c:680
void ReleaseConnection(PGconn *conn)
Definition connection.c:919
static uint32 pgfdw_we_get_result
Definition connection.c:92
static bool UseScramPassthrough(ForeignServer *server, UserMapping *user)
Definition connection.c:711
#define RETRY_CANCEL_TIMEOUT
Definition connection.c:106
PGresult * pgfdw_get_result(PGconn *conn)
Definition connection.c:986
void pgfdw_report_error(PGresult *res, PGconn *conn, const char *sql)
static bool pgfdw_cancel_query_begin(PGconn *conn, TimestampTz endtime)
static void pgfdw_finish_abort_cleanup(List *pending_entries, List *cancel_requested, bool toplevel)
static void pgfdw_reset_xact_state(ConnCacheEntry *entry, bool toplevel)
static int pgfdw_conn_check(PGconn *conn)
#define POSTGRES_FDW_GET_CONNECTIONS_COLS_V1_1
static void configure_remote_session(PGconn *conn)
Definition connection.c:795
static bool pgfdw_cancel_query_end(PGconn *conn, TimestampTz endtime, TimestampTz retrycanceltime, bool consume_input)
static bool xact_got_connection
Definition connection.c:87
#define POSTGRES_FDW_GET_CONNECTIONS_COLS
void pgfdw_report(int elevel, PGresult *res, PGconn *conn, const char *sql)
Datum postgres_fdw_disconnect_all(PG_FUNCTION_ARGS)
static void do_sql_command_end(PGconn *conn, const char *sql, bool consume_input)
Definition connection.c:847
#define CONSTRUCT_ABORT_COMMAND(sql, entry, toplevel)
Definition connection.c:109
static bool pgfdw_conn_checkable(void)
static uint32 pgfdw_we_cleanup_result
Definition connection.c:90
static bool pgfdw_abort_cleanup_begin(ConnCacheEntry *entry, bool toplevel, List **pending_entries, List **cancel_requested)
static void appendEscapedValue(StringInfo str, const char *val)
static HTAB * ConnectionHash
Definition connection.c:80
static bool pgfdw_exec_cleanup_query_end(PGconn *conn, const char *query, TimestampTz endtime, bool consume_input, bool ignore_errors)
static unsigned int cursor_number
Definition connection.c:83
static bool pgfdw_has_required_scram_options(const char **keywords, const char **values)
static void make_new_connection(ConnCacheEntry *entry, UserMapping *user)
Definition connection.c:372
static void pgfdw_security_check(const char **keywords, const char **values, UserMapping *user, PGconn *conn)
Definition connection.c:438
Datum postgres_fdw_disconnect(PG_FUNCTION_ARGS)
static void pgfdw_subxact_callback(SubXactEvent event, SubTransactionId mySubid, SubTransactionId parentSubid, void *arg)
static PGconn * connect_pg_server(ForeignServer *server, UserMapping *user)
Definition connection.c:621
static bool pgfdw_exec_cleanup_query(PGconn *conn, const char *query, bool ignore_errors)
Datum postgres_fdw_connection(PG_FUNCTION_ARGS)
unsigned int GetPrepStmtNumber(PGconn *conn)
Definition connection.c:954
Datum postgres_fdw_get_connections_1_2(PG_FUNCTION_ARGS)
static bool pgfdw_exec_cleanup_query_begin(PGconn *conn, const char *query)
static void pgfdw_reject_incomplete_xact_state_change(ConnCacheEntry *entry)
static void check_conn_params(const char **keywords, const char **values, UserMapping *user)
Definition connection.c:743
static uint32 pgfdw_we_connect
Definition connection.c:91
static void pgfdw_xact_callback(XactEvent event, void *arg)
static void postgres_fdw_get_connections_internal(FunctionCallInfo fcinfo, enum pgfdwVersion api_version)
static void pgfdw_report_internal(int elevel, PGresult *res, PGconn *conn, const char *sql)
#define CONNECTION_CLEANUP_TIMEOUT
Definition connection.c:99
static void do_sql_command_begin(PGconn *conn, const char *sql)
Definition connection.c:840
static void pgfdw_abort_cleanup(ConnCacheEntry *entry, bool toplevel)
static bool pgfdw_get_cleanup_result(PGconn *conn, TimestampTz endtime, TimestampTz retrycanceltime, PGresult **result, bool *timed_out)
static void begin_remote_xact(ConnCacheEntry *entry)
Definition connection.c:876
pgfdwVersion
Definition connection.c:124
@ PGFDW_V1_1
Definition connection.c:125
@ PGFDW_V1_2
Definition connection.c:126
static void pgfdw_inval_callback(Datum arg, SysCacheIdentifier cacheid, uint32 hashvalue)
static bool pgfdw_cancel_query(PGconn *conn)
static void pgfdw_finish_pre_commit_cleanup(List *pending_entries)
static bool disconnect_cached_connections(Oid serverid)
int ExtractConnectionOptions(List *defelems, const char **keywords, const char **values)
Definition option.c:414
char * pgfdw_application_name
Definition option.c:46
char * process_pgfdw_appname(const char *appname)
Definition option.c:491
int64 TimestampTz
Definition timestamp.h:39
bool defGetBoolean(DefElem *def)
Definition define.c:93
void * hash_search(HTAB *hashp, const void *keyPtr, HASHACTION action, bool *foundPtr)
Definition dynahash.c:952
HTAB * hash_create(const char *tabname, int64 nelem, const HASHCTL *info, int flags)
Definition dynahash.c:358
void * hash_seq_search(HASH_SEQ_STATUS *status)
Definition dynahash.c:1415
void hash_seq_init(HASH_SEQ_STATUS *status, HTAB *hashp)
Definition dynahash.c:1380
Datum arg
Definition elog.c:1322
void FreeErrorData(ErrorData *edata)
Definition elog.c:2013
ErrorData * CopyErrorData(void)
Definition elog.c:1941
void FlushErrorState(void)
Definition elog.c:2062
int errcode(int sqlerrcode)
Definition elog.c:874
bool in_error_recursion_trouble(void)
Definition elog.c:305
#define PG_RE_THROW()
Definition elog.h:405
int int errdetail_internal(const char *fmt,...) pg_attribute_printf(1
#define errcontext
Definition elog.h:198
int errhint(const char *fmt,...) pg_attribute_printf(1
#define DEBUG3
Definition elog.h:28
int errdetail(const char *fmt,...) pg_attribute_printf(1
int int errmsg_internal(const char *fmt,...) pg_attribute_printf(1
#define PG_TRY(...)
Definition elog.h:372
#define WARNING
Definition elog.h:36
#define PG_END_TRY(...)
Definition elog.h:397
#define ERROR
Definition elog.h:39
#define PG_CATCH(...)
Definition elog.h:382
#define MAKE_SQLSTATE(ch1, ch2, ch3, ch4, ch5)
Definition elog.h:56
#define elog(elevel,...)
Definition elog.h:226
#define ereport(elevel,...)
Definition elog.h:150
int PQserverVersion(const PGconn *conn)
PGTransactionStatusType PQtransactionStatus(const PGconn *conn)
int PQconnectionUsedPassword(const PGconn *conn)
int PQconnectionUsedGSSAPI(const PGconn *conn)
ConnStatusType PQstatus(const PGconn *conn)
PQnoticeReceiver PQsetNoticeReceiver(PGconn *conn, PQnoticeReceiver proc, void *arg)
int PQbackendPID(const PGconn *conn)
char * PQerrorMessage(const PGconn *conn)
int PQsocket(const PGconn *conn)
int PQconsumeInput(PGconn *conn)
Definition fe-exec.c:2001
int PQsendQuery(PGconn *conn, const char *query)
Definition fe-exec.c:1433
int PQisBusy(PGconn *conn)
Definition fe-exec.c:2048
#define PG_RETURN_VOID()
Definition fmgr.h:350
#define PG_GETARG_OID(n)
Definition fmgr.h:275
#define PG_GETARG_TEXT_PP(n)
Definition fmgr.h:310
#define PG_FUNCTION_INFO_V1(funcname)
Definition fmgr.h:417
#define PG_RETURN_TEXT_P(x)
Definition fmgr.h:374
#define PG_GETARG_BOOL(n)
Definition fmgr.h:274
#define PG_FUNCTION_ARGS
Definition fmgr.h:193
#define PG_RETURN_BOOL(x)
Definition fmgr.h:360
ForeignServer * GetForeignServerByName(const char *srvname, bool missing_ok)
Definition foreign.c:210
UserMapping * GetUserMapping(Oid userid, Oid serverid)
Definition foreign.c:289
ForeignServer * GetForeignServer(Oid serverid)
Definition foreign.c:114
ForeignServer * GetForeignServerExtended(Oid serverid, bits16 flags)
Definition foreign.c:126
#define MappingUserName(userid)
Definition foreign.h:20
#define FSV_MISSING_OK
Definition foreign.h:62
void InitMaterializedSRF(FunctionCallInfo fcinfo, bits32 flags)
Definition funcapi.c:76
struct Port * MyProcPort
Definition globals.c:51
struct Latch * MyLatch
Definition globals.c:63
const char * str
@ HASH_ENTER
Definition hsearch.h:114
#define HASH_ELEM
Definition hsearch.h:95
#define HASH_BLOBS
Definition hsearch.h:97
#define HeapTupleIsValid(tuple)
Definition htup.h:78
static void * GETSTRUCT(const HeapTupleData *tuple)
long val
Definition informix.c:689
void CacheRegisterSyscacheCallback(SysCacheIdentifier cacheid, SyscacheCallbackFunction func, Datum arg)
Definition inval.c:1816
int i
Definition isn.c:77
static const JsonPathKeyword keywords[]
int WaitLatchOrSocket(Latch *latch, int wakeEvents, pgsocket sock, long timeout, uint32 wait_event_info)
Definition latch.c:223
void ResetLatch(Latch *latch)
Definition latch.c:374
static const char * libpqsrv_cancel(PGconn *conn, TimestampTz endtime)
static PGconn * libpqsrv_connect_params(const char *const *keywords, const char *const *values, int expand_dbname, uint32 wait_event_info)
static void libpqsrv_notice_receiver(void *arg, const PGresult *res)
static void libpqsrv_disconnect(PGconn *conn)
static PGresult * libpqsrv_get_result_last(PGconn *conn, uint32 wait_event_info)
#define PQgetResult
#define PQclear
#define PQresultErrorField
#define PQresultStatus
@ CONNECTION_BAD
Definition libpq-fe.h:91
@ CONNECTION_OK
Definition libpq-fe.h:90
@ PGRES_COMMAND_OK
Definition libpq-fe.h:131
@ PQTRANS_IDLE
Definition libpq-fe.h:153
@ PQTRANS_ACTIVE
Definition libpq-fe.h:154
List * lappend(List *list, void *datum)
Definition list.c:339
const char * GetDatabaseEncodingName(void)
Definition mbutils.c:1395
void pfree(void *pointer)
Definition mcxt.c:1616
void * palloc0(Size size)
Definition mcxt.c:1417
char * pchomp(const char *in)
Definition mcxt.c:1809
void * palloc(Size size)
Definition mcxt.c:1387
MemoryContext CurrentMemoryContext
Definition mcxt.c:160
#define CHECK_FOR_INTERRUPTS()
Definition miscadmin.h:123
static char * errmsg
static MemoryContext MemoryContextSwitchTo(MemoryContext context)
Definition palloc.h:124
const void size_t len
#define lfirst(lc)
Definition pg_list.h:172
static int list_length(const List *l)
Definition pg_list.h:152
#define NIL
Definition pg_list.h:68
static char * user
Definition pg_regress.c:119
END_CATALOG_STRUCT typedef FormData_pg_user_mapping * Form_pg_user_mapping
#define snprintf
Definition port.h:260
static Datum BoolGetDatum(bool X)
Definition postgres.h:112
static Datum ObjectIdGetDatum(Oid X)
Definition postgres.h:252
uint64_t Datum
Definition postgres.h:70
static Datum Int32GetDatum(int32 X)
Definition postgres.h:212
#define InvalidOid
unsigned int Oid
#define PG_DIAG_MESSAGE_HINT
#define PG_DIAG_SQLSTATE
#define PG_DIAG_MESSAGE_PRIMARY
#define PG_DIAG_MESSAGE_DETAIL
#define PG_DIAG_CONTEXT
void process_pending_request(AsyncRequest *areq)
static int fb(int x)
tree ctl
Definition radixtree.h:1838
PGconn * GetConnection(void)
Definition streamutil.c:60
PGconn * conn
Definition streamutil.c:52
void appendStringInfo(StringInfo str, const char *fmt,...)
Definition stringinfo.c:145
void appendStringInfoChar(StringInfo str, char ch)
Definition stringinfo.c:242
void initStringInfo(StringInfo str)
Definition stringinfo.c:97
PGconn * conn
Definition connection.c:59
bool have_prep_stmt
Definition connection.c:63
PgFdwConnState state
Definition connection.c:74
ConnCacheKey key
Definition connection.c:58
bool parallel_commit
Definition connection.c:66
uint32 server_hashvalue
Definition connection.c:72
uint32 mapping_hashvalue
Definition connection.c:73
bool keep_connections
Definition connection.c:69
bool parallel_abort
Definition connection.c:67
bool changing_xact_state
Definition connection.c:65
char * defname
Definition parsenodes.h:857
List * options
Definition foreign.h:43
char * servername
Definition foreign.h:40
Definition pg_list.h:54
AsyncRequest * pendingAreq
uint8 scram_ServerKey[SCRAM_MAX_KEY_LEN]
Definition libpq-be.h:187
bool has_scram_keys
Definition libpq-be.h:188
uint8 scram_ClientKey[SCRAM_MAX_KEY_LEN]
Definition libpq-be.h:186
bool superuser_arg(Oid roleid)
Definition superuser.c:57
void ReleaseSysCache(HeapTuple tuple)
Definition syscache.c:264
HeapTuple SearchSysCache1(SysCacheIdentifier cacheId, Datum key1)
Definition syscache.c:220
#define GetSysCacheHashValue1(cacheId, key1)
Definition syscache.h:118
void tuplestore_putvalues(Tuplestorestate *state, TupleDesc tdesc, const Datum *values, const bool *isnull)
Definition tuplestore.c:785
#define TimestampTzPlusMilliseconds(tz, ms)
Definition timestamp.h:85
text * cstring_to_text(const char *s)
Definition varlena.c:184
char * text_to_cstring(const text *t)
Definition varlena.c:217
uint32 WaitEventExtensionNew(const char *wait_event_name)
Definition wait_event.c:163
#define WL_SOCKET_READABLE
#define WL_TIMEOUT
#define WL_EXIT_ON_PM_DEATH
#define WL_LATCH_SET
#define EINTR
Definition win32_port.h:361
int GetCurrentTransactionNestLevel(void)
Definition xact.c:931
void RegisterXactCallback(XactCallback callback, void *arg)
Definition xact.c:3827
void RegisterSubXactCallback(SubXactCallback callback, void *arg)
Definition xact.c:3887
SubXactEvent
Definition xact.h:142
@ SUBXACT_EVENT_PRE_COMMIT_SUB
Definition xact.h:146
@ SUBXACT_EVENT_ABORT_SUB
Definition xact.h:145
XactEvent
Definition xact.h:128
@ XACT_EVENT_PRE_PREPARE
Definition xact.h:136
@ XACT_EVENT_COMMIT
Definition xact.h:129
@ XACT_EVENT_PARALLEL_PRE_COMMIT
Definition xact.h:135
@ XACT_EVENT_PARALLEL_COMMIT
Definition xact.h:130
@ XACT_EVENT_ABORT
Definition xact.h:131
@ XACT_EVENT_PRE_COMMIT
Definition xact.h:134
@ XACT_EVENT_PARALLEL_ABORT
Definition xact.h:132
@ XACT_EVENT_PREPARE
Definition xact.h:133
#define IsolationIsSerializable()
Definition xact.h:53