mirror of
https://github.com/neondatabase/neon.git
synced 2026-01-11 15:32:56 +00:00
## Problem Debugging IP deny errors is difficult for our users ## Summary of changes Include the client IP in the deny message
151 lines
4.5 KiB
Rust
151 lines
4.5 KiB
Rust
//! Client authentication mechanisms.
|
|
|
|
pub mod backend;
|
|
pub use backend::BackendType;
|
|
|
|
mod credentials;
|
|
pub use credentials::{
|
|
check_peer_addr_is_in_list, endpoint_sni, ComputeUserInfoMaybeEndpoint,
|
|
ComputeUserInfoParseError, IpPattern,
|
|
};
|
|
|
|
mod password_hack;
|
|
pub use password_hack::parse_endpoint_param;
|
|
use password_hack::PasswordHackPayload;
|
|
|
|
mod flow;
|
|
pub use flow::*;
|
|
use tokio::time::error::Elapsed;
|
|
|
|
use crate::{
|
|
console,
|
|
error::{ReportableError, UserFacingError},
|
|
};
|
|
use std::{io, net::IpAddr};
|
|
use thiserror::Error;
|
|
|
|
/// Convenience wrapper for the authentication error.
|
|
pub type Result<T> = std::result::Result<T, AuthError>;
|
|
|
|
/// Common authentication error.
|
|
#[derive(Debug, Error)]
|
|
pub enum AuthErrorImpl {
|
|
#[error(transparent)]
|
|
Link(#[from] backend::LinkAuthError),
|
|
|
|
#[error(transparent)]
|
|
GetAuthInfo(#[from] console::errors::GetAuthInfoError),
|
|
|
|
/// SASL protocol errors (includes [SCRAM](crate::scram)).
|
|
#[error(transparent)]
|
|
Sasl(#[from] crate::sasl::Error),
|
|
|
|
#[error("Unsupported authentication method: {0}")]
|
|
BadAuthMethod(Box<str>),
|
|
|
|
#[error("Malformed password message: {0}")]
|
|
MalformedPassword(&'static str),
|
|
|
|
#[error(
|
|
"Endpoint ID is not specified. \
|
|
Either please upgrade the postgres client library (libpq) for SNI support \
|
|
or pass the endpoint ID (first part of the domain name) as a parameter: '?options=endpoint%3D<endpoint-id>'. \
|
|
See more at https://neon.tech/sni"
|
|
)]
|
|
MissingEndpointName,
|
|
|
|
#[error("password authentication failed for user '{0}'")]
|
|
AuthFailed(Box<str>),
|
|
|
|
/// Errors produced by e.g. [`crate::stream::PqStream`].
|
|
#[error(transparent)]
|
|
Io(#[from] io::Error),
|
|
|
|
#[error(
|
|
"This IP address {0} is not allowed to connect to this endpoint. \
|
|
Please add it to the allowed list in the Neon console. \
|
|
Make sure to check for IPv4 or IPv6 addresses."
|
|
)]
|
|
IpAddressNotAllowed(IpAddr),
|
|
|
|
#[error("Too many connections to this endpoint. Please try again later.")]
|
|
TooManyConnections,
|
|
|
|
#[error("Authentication timed out")]
|
|
UserTimeout(Elapsed),
|
|
}
|
|
|
|
#[derive(Debug, Error)]
|
|
#[error(transparent)]
|
|
pub struct AuthError(Box<AuthErrorImpl>);
|
|
|
|
impl AuthError {
|
|
pub fn bad_auth_method(name: impl Into<Box<str>>) -> Self {
|
|
AuthErrorImpl::BadAuthMethod(name.into()).into()
|
|
}
|
|
|
|
pub fn auth_failed(user: impl Into<Box<str>>) -> Self {
|
|
AuthErrorImpl::AuthFailed(user.into()).into()
|
|
}
|
|
|
|
pub fn ip_address_not_allowed(ip: IpAddr) -> Self {
|
|
AuthErrorImpl::IpAddressNotAllowed(ip).into()
|
|
}
|
|
|
|
pub fn too_many_connections() -> Self {
|
|
AuthErrorImpl::TooManyConnections.into()
|
|
}
|
|
|
|
pub fn is_auth_failed(&self) -> bool {
|
|
matches!(self.0.as_ref(), AuthErrorImpl::AuthFailed(_))
|
|
}
|
|
|
|
pub fn user_timeout(elapsed: Elapsed) -> Self {
|
|
AuthErrorImpl::UserTimeout(elapsed).into()
|
|
}
|
|
}
|
|
|
|
impl<E: Into<AuthErrorImpl>> From<E> for AuthError {
|
|
fn from(e: E) -> Self {
|
|
Self(Box::new(e.into()))
|
|
}
|
|
}
|
|
|
|
impl UserFacingError for AuthError {
|
|
fn to_string_client(&self) -> String {
|
|
use AuthErrorImpl::*;
|
|
match self.0.as_ref() {
|
|
Link(e) => e.to_string_client(),
|
|
GetAuthInfo(e) => e.to_string_client(),
|
|
Sasl(e) => e.to_string_client(),
|
|
AuthFailed(_) => self.to_string(),
|
|
BadAuthMethod(_) => self.to_string(),
|
|
MalformedPassword(_) => self.to_string(),
|
|
MissingEndpointName => self.to_string(),
|
|
Io(_) => "Internal error".to_string(),
|
|
IpAddressNotAllowed(_) => self.to_string(),
|
|
TooManyConnections => self.to_string(),
|
|
UserTimeout(_) => self.to_string(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ReportableError for AuthError {
|
|
fn get_error_kind(&self) -> crate::error::ErrorKind {
|
|
use AuthErrorImpl::*;
|
|
match self.0.as_ref() {
|
|
Link(e) => e.get_error_kind(),
|
|
GetAuthInfo(e) => e.get_error_kind(),
|
|
Sasl(e) => e.get_error_kind(),
|
|
AuthFailed(_) => crate::error::ErrorKind::User,
|
|
BadAuthMethod(_) => crate::error::ErrorKind::User,
|
|
MalformedPassword(_) => crate::error::ErrorKind::User,
|
|
MissingEndpointName => crate::error::ErrorKind::User,
|
|
Io(_) => crate::error::ErrorKind::ClientDisconnect,
|
|
IpAddressNotAllowed(_) => crate::error::ErrorKind::User,
|
|
TooManyConnections => crate::error::ErrorKind::RateLimit,
|
|
UserTimeout(_) => crate::error::ErrorKind::User,
|
|
}
|
|
}
|
|
}
|