OAuth validator modules implement their functionality by defining a set of callbacks. The server will call them as required to process the authentication request from the user.
The startup_cb
callback is executed directly after
loading the module. This callback can be used to set up local state and
perform additional initialization if required. If the validator module
has state it can use state->private_data
to
store it.
typedef void (*ValidatorStartupCB) (ValidatorModuleState *state);
The validate_cb
callback is executed during the OAuth
exchange when a user attempts to authenticate using OAuth. Any state set in
previous calls will be available in state->private_data
.
typedef bool (*ValidatorValidateCB) (const ValidatorModuleState *state, const char *token, const char *role, ValidatorModuleResult *result);
token
will contain the bearer token to validate.
PostgreSQL has ensured that the token is well-formed syntactically, but no
other validation has been performed. role
will
contain the role the user has requested to log in as. The callback must
set output parameters in the result
struct, which is
defined as below:
typedef struct ValidatorModuleResult { bool authorized; char *authn_id; } ValidatorModuleResult;
The connection will only proceed if the module sets
result->authorized
to true
. To
authenticate the user, the authenticated user name (as determined using the
token) shall be palloc'd and returned in the result->authn_id
field. Alternatively, result->authn_id
may be set to
NULL if the token is valid but the associated user identity cannot be
determined.
A validator may return false
to signal an internal error,
in which case any result parameters are ignored and the connection fails.
Otherwise the validator should return true
to indicate
that it has processed the token and made an authorization decision.
The behavior after validate_cb
returns depends on the
specific HBA setup. Normally, the result->authn_id
user
name must exactly match the role that the user is logging in as. (This
behavior may be modified with a usermap.) But when authenticating against
an HBA rule with delegate_ident_mapping
turned on,
PostgreSQL will not perform any checks on the value of
result->authn_id
at all; in this case it is up to the
validator to ensure that the token carries enough privileges for the user to
log in under the indicated role
.
The shutdown_cb
callback is executed when the backend
process associated with the connection exits. If the validator module has
any allocated state, this callback should free it to avoid resource leaks.
typedef void (*ValidatorShutdownCB) (ValidatorModuleState *state);