From 3d03b24c350ab060bb223623bdff38835bd7afd0 Mon Sep 17 00:00:00 2001 From: Stephen Frost Date: Sat, 8 Apr 2023 07:21:35 -0400 Subject: Revert "Add support for Kerberos credential delegation" This reverts commit 3d4fa227bce4294ce1cc214b4a9d3b7caa3f0454. Per discussion and buildfarm, this depends on APIs that seem to not be available on at least one platform (NetBSD). Should be certainly possible to rework to be optional on that platform if necessary but bit late for that at this point. Discussion: https://postgr.es/m/3286097.1680922218@sss.pgh.pa.us --- doc/src/sgml/config.sgml | 17 ----------------- doc/src/sgml/dblink.sgml | 5 ++--- doc/src/sgml/libpq.sgml | 41 ----------------------------------------- doc/src/sgml/monitoring.sgml | 9 --------- doc/src/sgml/postgres-fdw.sgml | 7 +++---- 5 files changed, 5 insertions(+), 74 deletions(-) (limited to 'doc/src') diff --git a/doc/src/sgml/config.sgml b/doc/src/sgml/config.sgml index 091a79d4f36..f81c2045ec4 100644 --- a/doc/src/sgml/config.sgml +++ b/doc/src/sgml/config.sgml @@ -1190,23 +1190,6 @@ include_dir 'conf.d' - - gss_accept_deleg (boolean) - - gss_accept_deleg configuration parameter - - - - - Sets whether GSSAPI delegation should be accepted from the client. - The default is off meaning credentials from the client will - NOT be accepted. Changing this to on will make the server - accept credentials delegated to it from the client. This parameter can only be - set in the postgresql.conf file or on the server command line. - - - - db_user_namespace (boolean) diff --git a/doc/src/sgml/dblink.sgml b/doc/src/sgml/dblink.sgml index 7d25f24f490..17f9d99b1c7 100644 --- a/doc/src/sgml/dblink.sgml +++ b/doc/src/sgml/dblink.sgml @@ -117,9 +117,8 @@ dblink_connect(text connname, text connstr) returns text Only superusers may use dblink_connect to create - non-password-authenticated and non-GSSAPI-authenticated connections. - If non-superusers need this capability, use - dblink_connect_u instead. + non-password-authenticated connections. If non-superusers need this + capability, use dblink_connect_u instead. diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml index b8702284d0b..faa8aa3187e 100644 --- a/doc/src/sgml/libpq.sgml +++ b/doc/src/sgml/libpq.sgml @@ -2054,18 +2054,6 @@ postgresql://%2Fvar%2Flib%2Fpostgresql/dbname - - gssdeleg - - - Forward (delegate) GSS credentials to the server. The default is - disable which means credentials will not be forwarded - to the server. Set this to enable to have - credentials forwarded when possible. - - - - service @@ -2727,25 +2715,6 @@ int PQconnectionUsedPassword(const PGconn *conn); - - - PQconnectionUsedGSSAPIPQconnectionUsedGSSAPI - - - Returns true (1) if the connection authentication method - used GSSAPI. Returns false (0) if not. - - -int PQconnectionUsedGSSAPI(const PGconn *conn); - - - - - This function can be applied to detect whether the connection was - authenticated with GSSAPI. - - - @@ -8268,16 +8237,6 @@ myEventProc(PGEventId evtId, void *evtInfo, void *passThrough) - - - - PGGSSDELEG - - PGGSSDELEG behaves the same as the connection parameter. - - - diff --git a/doc/src/sgml/monitoring.sgml b/doc/src/sgml/monitoring.sgml index e8ab8032674..3f33a1c56c9 100644 --- a/doc/src/sgml/monitoring.sgml +++ b/doc/src/sgml/monitoring.sgml @@ -3573,15 +3573,6 @@ SELECT pid, wait_event_type, wait_event FROM pg_stat_activity WHERE wait_event i True if GSSAPI encryption is in use on this connection - - - - credentials_delegated boolean - - - True if GSSAPI credentials were delegated on this connection. - - diff --git a/doc/src/sgml/postgres-fdw.sgml b/doc/src/sgml/postgres-fdw.sgml index 281966f16ff..9e66987cf7f 100644 --- a/doc/src/sgml/postgres-fdw.sgml +++ b/doc/src/sgml/postgres-fdw.sgml @@ -169,10 +169,9 @@ sslcert or sslkey settings. - Non-superusers may connect to foreign servers using password - authentication or with GSSAPI delegated credentials, so specify the - password option for user mappings belonging to - non-superusers where password authentication is required. + Only superusers may connect to foreign servers without password + authentication, so always specify the password option + for user mappings belonging to non-superusers. A superuser may override this check on a per-user-mapping basis by setting -- cgit v1.2.3