Re: [OAuth2] Infrastructure for tracking token expiry time - Mailing list pgsql-hackers

From Zsolt Parragi
Subject Re: [OAuth2] Infrastructure for tracking token expiry time
Date
Msg-id CAN4CZFMaAvHSBbQ25o=yiWqn=p7jBNUBABZvqoU1x1-7NWPH9Q@mail.gmail.com
Whole thread
In response to Re: [OAuth2] Infrastructure for tracking token expiry time  (Daniel Gustafsson <daniel@yesql.se>)
Responses Re: [OAuth2] Infrastructure for tracking token expiry time
List pgsql-hackers
> but I still think that neither should overload
> what FATAL error means

I see, I misunderstood what you meant by graceful there. In this case,
this is also a good comment for the password expiration thread,
currently that also uses FATAL errors for terminating a connection
when the password expires.

What other option do you see? Something new for this use case like
GoAway, and clients not understanding it simply get disconnected after
some grace period? Or using the recently merged connectionWarning to
send a warning to the client, and disconnect it shortly if it doesn't
do anything to fix the situation?

When I tested the password expiration patch I noticed that deleted
users who still have remaining active connections currently get ERRORs
for every statement that requires permission checks, so in this regard
using ERROR/FATAL for the situation seemed fine to me - it's similar
to what already happens in some edge cases with authentication.



pgsql-hackers by date:

Previous
From: Andres Freund
Date:
Subject: Re: Lowering the default wal_blocksize to 4K
Next
From: Andreas Karlsson
Date:
Subject: Re: Use LOCKMODE in parse_relation.c/.h