mirror of
https://github.com/jackc/pgx.git
synced 2025-05-11 18:10:13 +00:00
The PostgreSQL server will reject messages greater than ~1 GB anyway. However, worse than that is that a message that is larger than 4 GB could wrap the 32-bit integer message size and be interpreted by the server as multiple messages. This could allow a malicious client to inject arbitrary protocol messages. https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv
50 lines
1.0 KiB
Go
50 lines
1.0 KiB
Go
package pgproto3
|
|
|
|
import (
|
|
"encoding/binary"
|
|
"encoding/json"
|
|
"errors"
|
|
|
|
"github.com/jackc/pgx/v5/internal/pgio"
|
|
)
|
|
|
|
const gssEncReqNumber = 80877104
|
|
|
|
type GSSEncRequest struct {
|
|
}
|
|
|
|
// Frontend identifies this message as sendable by a PostgreSQL frontend.
|
|
func (*GSSEncRequest) Frontend() {}
|
|
|
|
func (dst *GSSEncRequest) Decode(src []byte) error {
|
|
if len(src) < 4 {
|
|
return errors.New("gss encoding request too short")
|
|
}
|
|
|
|
requestCode := binary.BigEndian.Uint32(src)
|
|
|
|
if requestCode != gssEncReqNumber {
|
|
return errors.New("bad gss encoding request code")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Encode encodes src into dst. dst will include the 4 byte message length.
|
|
func (src *GSSEncRequest) Encode(dst []byte) ([]byte, error) {
|
|
dst = pgio.AppendInt32(dst, 8)
|
|
dst = pgio.AppendInt32(dst, gssEncReqNumber)
|
|
return dst, nil
|
|
}
|
|
|
|
// MarshalJSON implements encoding/json.Marshaler.
|
|
func (src GSSEncRequest) MarshalJSON() ([]byte, error) {
|
|
return json.Marshal(struct {
|
|
Type string
|
|
ProtocolVersion uint32
|
|
Parameters map[string]string
|
|
}{
|
|
Type: "GSSEncRequest",
|
|
})
|
|
}
|