Robert Haas wrote:
> So is this one Ready for Committer?

Here we go, I think this one is ready. In addition to previous patches,
it does:

 * Use some techniques from postfix for getting interface addresses.
   Couldn't use code outright, due to license incompatibilities.
 * Tested on Solaris, FreeBSD, Linux and Windows. As far as I can tell
   this should also work on Mac OS, HPUX and AIX, and probably others.
 * Added src/tools/ifaddrs/test_ifaddrs tool for testing interface
   address code.

Cheers,

Stef
diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml
index ad4d084..e5152f4 100644
*** a/doc/src/sgml/client-auth.sgml
--- b/doc/src/sgml/client-auth.sgml
*************** hostnossl  <replaceable>database</replac
*** 244,249 ****
--- 244,255 ----
         support for IPv6 addresses.
        </para>
  
+       <para>Instead of a <replaceable>CIDR-address</replaceable>, you can specify 
+        <literal>samehost</literal> to match any of the server's own IP addresses,
+        or <literal>samenet</literal> to match any address in a subnet that the 
+        server belongs to.
+       </para>
+ 
        <para>
         This field only applies to <literal>host</literal>,
         <literal>hostssl</literal>, and <literal>hostnossl</> records.
diff --git a/src/backend/libpq/hba.c b/src/backend/libpq/hba.c
index e6f7db2..702971a 100644
*** a/src/backend/libpq/hba.c
--- b/src/backend/libpq/hba.c
*************** check_db(const char *dbname, const char 
*** 512,517 ****
--- 512,608 ----
  	return false;
  }
  
+ /*
+  * Check to see if a connecting IP matches the address and netmask.
+  */
+ static bool
+ check_ip(SockAddr *raddr, struct sockaddr *addr, struct sockaddr *mask)
+ {
+ 	if (raddr->addr.ss_family == addr->sa_family)
+ 	{
+ 		/* Same address family */
+ 		if (!pg_range_sockaddr(&raddr->addr, (struct sockaddr_storage*)addr, 
+ 		                       (struct sockaddr_storage*)mask))
+ 			return false;
+ 	}
+ #ifdef HAVE_IPV6
+ 	else if (addr->sa_family == AF_INET &&
+ 			 raddr->addr.ss_family == AF_INET6)
+ 	{
+ 		/*
+ 		 * Wrong address family.  We allow only one case: if the file
+ 		 * has IPv4 and the port is IPv6, promote the file address to
+ 		 * IPv6 and try to match that way.
+ 		 */
+ 		struct sockaddr_storage addrcopy,
+ 					maskcopy;
+ 
+ 		memcpy(&addrcopy, &addr, sizeof(addrcopy));
+ 		memcpy(&maskcopy, &mask, sizeof(maskcopy));
+ 		pg_promote_v4_to_v6_addr(&addrcopy);
+ 		pg_promote_v4_to_v6_mask(&maskcopy);
+ 
+ 		if (!pg_range_sockaddr(&raddr->addr, &addrcopy, &maskcopy))
+ 			return false;
+ 	}
+ #endif   /* HAVE_IPV6 */
+ 	else
+ 	{
+ 		/* Wrong address family, no IPV6 */
+ 		return false;
+ 	}
+ 
+ 	return true;
+ }
+ 
+ typedef struct CheckNetwork {
+ 	NetMethod method;
+ 	SockAddr *raddr;
+ 	bool result;	
+ } CheckNetwork;
+ 
+ static void
+ callback_check_network(struct sockaddr *addr, struct sockaddr *netmask, void *data)
+ {
+ 	CheckNetwork *cn = data;
+ 	struct sockaddr_storage mask;
+ 
+ 	/* Already found a match */
+ 	if (cn->result)
+ 		return;
+ 
+ 	/* Make a fully 1's netmask of appropriate length */
+ 	if (cn->method == nmSameHost)
+ 	{
+ 		pg_sockaddr_cidr_mask(&mask, NULL, addr->sa_family);
+ 		cn->result = check_ip(cn->raddr, addr, (struct sockaddr*)&mask);
+ 	}
+ 
+ 	/* Use the netmask of the interface itself */
+ 	else
+ 	{
+ 		cn->result = check_ip(cn->raddr, addr, netmask);
+ 	}
+ }
+ 
+ static bool
+ check_same_host_or_net(SockAddr *raddr, NetMethod method)
+ {
+ 	CheckNetwork cn;
+ 	cn.method = method;
+ 	cn.raddr = raddr;
+ 	cn.result = false;
+ 
+ 	if (pg_foreach_ifaddr(callback_check_network, &cn) < 0)
+ 	{
+ 		ereport(LOG,
+ 		        (errcode(ERRCODE_WARNING),
+ 		         errmsg("Error enumerating network interfaces")));
+ 		return false;
+ 	}
+ 
+ 	return cn.result;
+ }
  
  /*
   * Macros used to check and report on invalid configuration options.
*************** parse_hba_line(List *line, int line_num,
*** 658,756 ****
  								line_num, HbaFileName)));
  			return false;
  		}
- 		token = pstrdup(lfirst(line_item));
  
! 		/* Check if it has a CIDR suffix and if so isolate it */
! 		cidr_slash = strchr(token, '/');
! 		if (cidr_slash)
! 			*cidr_slash = '\0';
! 
! 		/* Get the IP address either way */
! 		hints.ai_flags = AI_NUMERICHOST;
! 		hints.ai_family = PF_UNSPEC;
! 		hints.ai_socktype = 0;
! 		hints.ai_protocol = 0;
! 		hints.ai_addrlen = 0;
! 		hints.ai_canonname = NULL;
! 		hints.ai_addr = NULL;
! 		hints.ai_next = NULL;
  
! 		ret = pg_getaddrinfo_all(token, NULL, &hints, &gai_result);
! 		if (ret || !gai_result)
  		{
! 			ereport(LOG,
! 					(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 					 errmsg("invalid IP address \"%s\": %s",
! 							token, gai_strerror(ret)),
! 					 errcontext("line %d of configuration file \"%s\"",
! 								line_num, HbaFileName)));
! 			if (cidr_slash)
! 				*cidr_slash = '/';
! 			if (gai_result)
! 				pg_freeaddrinfo_all(hints.ai_family, gai_result);
! 			return false;
  		}
  
! 		if (cidr_slash)
! 			*cidr_slash = '/';
! 
! 		memcpy(&parsedline->addr, gai_result->ai_addr, gai_result->ai_addrlen);
! 		pg_freeaddrinfo_all(hints.ai_family, gai_result);
! 
! 		/* Get the netmask */
! 		if (cidr_slash)
  		{
! 			if (pg_sockaddr_cidr_mask(&parsedline->mask, cidr_slash + 1,
! 									  parsedline->addr.ss_family) < 0)
! 			{
! 				ereport(LOG,
! 						(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 						 errmsg("invalid CIDR mask in address \"%s\"",
! 								token),
! 						 errcontext("line %d of configuration file \"%s\"",
! 									line_num, HbaFileName)));
! 				return false;
! 			}
  		}
  		else
  		{
! 			/* Read the mask field. */
! 			line_item = lnext(line_item);
! 			if (!line_item)
! 			{
! 				ereport(LOG,
! 						(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 						 errmsg("end-of-line before netmask specification"),
! 						 errcontext("line %d of configuration file \"%s\"",
! 									line_num, HbaFileName)));
! 				return false;
! 			}
! 			token = lfirst(line_item);
  
  			ret = pg_getaddrinfo_all(token, NULL, &hints, &gai_result);
  			if (ret || !gai_result)
  			{
  				ereport(LOG,
  						(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 						 errmsg("invalid IP mask \"%s\": %s",
  								token, gai_strerror(ret)),
  						 errcontext("line %d of configuration file \"%s\"",
  									line_num, HbaFileName)));
  				if (gai_result)
  					pg_freeaddrinfo_all(hints.ai_family, gai_result);
  				return false;
  			}
  
! 			memcpy(&parsedline->mask, gai_result->ai_addr, gai_result->ai_addrlen);
  			pg_freeaddrinfo_all(hints.ai_family, gai_result);
  
! 			if (parsedline->addr.ss_family != parsedline->mask.ss_family)
  			{
! 				ereport(LOG,
! 						(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 						 errmsg("IP address and mask do not match in file \"%s\" line %d",
! 								HbaFileName, line_num)));
! 				return false;
  			}
  		}
  	}							/* != ctLocal */
--- 749,868 ----
  								line_num, HbaFileName)));
  			return false;
  		}
  
! 		/* Is it equal to 'samehost' or 'samenet'? */
! 		token = lfirst(line_item);
  
! 		/* Any IP on this host is allowed to connect */
! 		if (strcmp(token, "samehost") == 0)
  		{
! 			parsedline->net_method = nmSameHost;
  		}
  
! 		/* Any IP on the host's subnets is allowed to connect */
! 		else if (strcmp(token, "samenet") == 0)
  		{
! 			parsedline->net_method = nmSameNet;
  		}
+ 
+ 		/* IP and netmask are specified */
  		else
  		{
! 			parsedline->net_method = nmCompare;
! 			token = pstrdup(token);
! 
! 			/* Check if it has a CIDR suffix and if so isolate it */
! 			cidr_slash = strchr(token, '/');
! 			if (cidr_slash)
! 				*cidr_slash = '\0';
! 
! 			/* Get the IP address either way */
! 			hints.ai_flags = AI_NUMERICHOST;
! 			hints.ai_family = PF_UNSPEC;
! 			hints.ai_socktype = 0;
! 			hints.ai_protocol = 0;
! 			hints.ai_addrlen = 0;
! 			hints.ai_canonname = NULL;
! 			hints.ai_addr = NULL;
! 			hints.ai_next = NULL;
  
  			ret = pg_getaddrinfo_all(token, NULL, &hints, &gai_result);
  			if (ret || !gai_result)
  			{
  				ereport(LOG,
  						(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 						 errmsg("invalid IP address \"%s\": %s",
  								token, gai_strerror(ret)),
  						 errcontext("line %d of configuration file \"%s\"",
  									line_num, HbaFileName)));
+ 				if (cidr_slash)
+ 					*cidr_slash = '/';
  				if (gai_result)
  					pg_freeaddrinfo_all(hints.ai_family, gai_result);
  				return false;
  			}
  
! 			if (cidr_slash)
! 				*cidr_slash = '/';
! 
! 			memcpy(&parsedline->addr, gai_result->ai_addr, gai_result->ai_addrlen);
  			pg_freeaddrinfo_all(hints.ai_family, gai_result);
  
! 			/* Get the netmask */
! 			if (cidr_slash)
  			{
! 				if (pg_sockaddr_cidr_mask(&parsedline->mask, cidr_slash + 1,
! 										  parsedline->addr.ss_family) < 0)
! 				{
! 					ereport(LOG,
! 							(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 							 errmsg("invalid CIDR mask in address \"%s\"",
! 									token),
! 							 errcontext("line %d of configuration file \"%s\"",
! 										line_num, HbaFileName)));
! 					return false;
! 				}
! 			}
! 			else
! 			{
! 				/* Read the mask field. */
! 				line_item = lnext(line_item);
! 				if (!line_item)
! 				{
! 					ereport(LOG,
! 							(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 							 errmsg("end-of-line before netmask specification"),
! 							 errcontext("line %d of configuration file \"%s\"",
! 										line_num, HbaFileName)));
! 					return false;
! 				}
! 				token = lfirst(line_item);
! 
! 				ret = pg_getaddrinfo_all(token, NULL, &hints, &gai_result);
! 				if (ret || !gai_result)
! 				{
! 					ereport(LOG,
! 							(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 							 errmsg("invalid IP mask \"%s\": %s",
! 									token, gai_strerror(ret)),
! 							 errcontext("line %d of configuration file \"%s\"",
! 										line_num, HbaFileName)));
! 					if (gai_result)
! 						pg_freeaddrinfo_all(hints.ai_family, gai_result);
! 					return false;
! 				}
! 
! 				memcpy(&parsedline->mask, gai_result->ai_addr, gai_result->ai_addrlen);
! 				pg_freeaddrinfo_all(hints.ai_family, gai_result);
! 
! 				if (parsedline->addr.ss_family != parsedline->mask.ss_family)
! 				{
! 					ereport(LOG,
! 							(errcode(ERRCODE_CONFIG_FILE_ERROR),
! 							 errmsg("IP address and mask do not match in file \"%s\" line %d",
! 									HbaFileName, line_num)));
! 					return false;
! 				}
  			}
  		}
  	}							/* != ctLocal */
*************** check_hba(hbaPort *port)
*** 1096,1131 ****
  				continue;
  #endif
  
! 			/* Check IP address */
! 			if (port->raddr.addr.ss_family == hba->addr.ss_family)
  			{
! 				if (!pg_range_sockaddr(&port->raddr.addr, &hba->addr, &hba->mask))
  					continue;
! 			}
! #ifdef HAVE_IPV6
! 			else if (hba->addr.ss_family == AF_INET &&
! 					 port->raddr.addr.ss_family == AF_INET6)
! 			{
! 				/*
! 				 * Wrong address family.  We allow only one case: if the file
! 				 * has IPv4 and the port is IPv6, promote the file address to
! 				 * IPv6 and try to match that way.
! 				 */
! 				struct sockaddr_storage addrcopy,
! 							maskcopy;
! 
! 				memcpy(&addrcopy, &hba->addr, sizeof(addrcopy));
! 				memcpy(&maskcopy, &hba->mask, sizeof(maskcopy));
! 				pg_promote_v4_to_v6_addr(&addrcopy);
! 				pg_promote_v4_to_v6_mask(&maskcopy);
! 
! 				if (!pg_range_sockaddr(&port->raddr.addr, &addrcopy, &maskcopy))
  					continue;
! 			}
! #endif   /* HAVE_IPV6 */
! 			else
! 				/* Wrong address family, no IPV6 */
  				continue;
  		}						/* != ctLocal */
  
  		/* Check database and role */
--- 1208,1228 ----
  				continue;
  #endif
  
! 			switch (hba->net_method)
  			{
! 			case nmCompare:
! 				if (!check_ip(&port->raddr, (struct sockaddr*)&hba->addr, 
! 				              (struct sockaddr*)&hba->mask))
  					continue;
! 				break;
! 			case nmSameHost:
! 			case nmSameNet:
! 				if (!check_same_host_or_net(&port->raddr, hba->net_method))
  					continue;
! 				break;
! 			default:
  				continue;
+ 			}
  		}						/* != ctLocal */
  
  		/* Check database and role */
diff --git a/src/backend/libpq/ip.c b/src/backend/libpq/ip.c
index 0c35ddd..f0b7411 100644
*** a/src/backend/libpq/ip.c
--- b/src/backend/libpq/ip.c
*************** range_sockaddr_AF_INET6(const struct soc
*** 333,338 ****
--- 333,340 ----
   *	pg_sockaddr_cidr_mask - make a network mask of the appropriate family
   *	  and required number of significant bits
   *
+  * numbits can be null, in which case the mask is fully set.
+  *
   * The resulting mask is placed in *mask, which had better be big enough.
   *
   * Return value is 0 if okay, -1 if not.
*************** pg_sockaddr_cidr_mask(struct sockaddr_st
*** 343,352 ****
  	long		bits;
  	char	   *endptr;
  
! 	bits = strtol(numbits, &endptr, 10);
! 
! 	if (*numbits == '\0' || *endptr != '\0')
! 		return -1;
  
  	switch (family)
  	{
--- 345,360 ----
  	long		bits;
  	char	   *endptr;
  
! 	if (numbits == NULL)
! 	{
! 		bits = (family == AF_INET) ? 32 : 128;
! 	}
! 	else
! 	{
! 		bits = strtol(numbits, &endptr, 10);
! 		if (*numbits == '\0' || *endptr != '\0')
! 			return -1;
! 	}
  
  	switch (family)
  	{
*************** pg_promote_v4_to_v6_mask(struct sockaddr
*** 476,478 ****
--- 484,747 ----
  }
  
  #endif   /* HAVE_IPV6 */
+ 
+ 
+ static void
+ run_ifaddr_callback(PgIfAddrCallback callback, void * cb_data, 
+                     struct sockaddr * addr, struct sockaddr * mask)
+ {
+ 	struct sockaddr_storage full;
+ 
+ 	if (!addr)
+ 		return;
+ 
+ 	/* Check that the mask is valid */
+ 	if (mask) 
+ 	{
+ 		if (mask->sa_family != addr->sa_family)
+ 		{		
+ 			mask = NULL;
+ 		}
+ 
+ 		else if (mask->sa_family == AF_INET)
+ 		{
+ 			if (((struct sockaddr_in*)mask)->sin_addr.s_addr == INADDR_ANY)
+ 				mask = NULL;
+ 		}
+ #ifdef HAVE_IPV6
+ 		else if (mask->sa_family == AF_INET6)
+ 		{
+ 			if (IN6_IS_ADDR_UNSPECIFIED(&((struct sockaddr_in6*)mask)->sin6_addr))
+ 				mask = NULL;
+ 		}
+ #endif
+ 	}
+ 
+ 	/* If mask is invalid, generate our own fully set mask */
+ 	if (!mask) 
+ 	{
+ 		pg_sockaddr_cidr_mask(&full, NULL, addr->sa_family);
+ 		mask = (struct sockaddr*)&full;
+ 	}
+ 
+ 	(callback) (addr, mask, cb_data);
+ }        
+ 
+ /* 
+  * Enumerate network interface addresses on Win32. This uses
+  * the Winsock 2 functions (ie: ws2_32.dll)
+  */
+ #ifdef WIN32
+ 
+ #include <winsock2.h>
+ #include <ws2tcpip.h>
+ 
+ int
+ pg_foreach_ifaddr(PgIfAddrCallback callback, void * cb_data)
+ {
+ 	INTERFACE_INFO ii[64];
+ 	unsigned long length, i;
+ 	SOCKET sock;
+ 
+ 	sock = WSASocket(AF_INET, SOCK_DGRAM, 0, 0, 0, 0);
+ 	if (sock == SOCKET_ERROR)
+ 		return -1;
+ 
+ 	if (WSAIoctl(sock, SIO_GET_INTERFACE_LIST, 0, 0, &ii,
+ 	             sizeof(ii), &length, 0, 0) == SOCKET_ERROR)
+ 	{
+ 		closesocket(sock);
+ 		return -1;
+ 	}
+ 
+ 	for (i = 0; i < length / sizeof (INTERFACE_INFO); ++i)
+ 		run_ifaddr_callback (callback, cb_data, 
+ 		                     (struct sockaddr*)&ii[i].iiAddress,
+ 		                     (struct sockaddr*)&ii[i].iiNetmask);
+ 
+ 	closesocket(sock);
+ 	return 0;
+ }
+ 
+ /* 
+  * Enumerate interfaces on BSDs, AIX and modern Linux. 
+  * Uses the getifaddrs() interface, clean and simple.
+  */
+ 
+ #elif HAVE_GETIFADDRS /* && !WIN32 */
+ 
+ #include <ifaddrs.h>
+ 
+ int
+ pg_foreach_ifaddr(PgIfAddrCallback callback, void * cb_data)
+ {
+ 	struct ifaddrs *ifa, *l;
+ 
+ 	if (getifaddrs(&ifa) < 0)
+ 		return -1;
+ 
+ 	for (l = ifa; l; l = l->ifa_next)
+ 		run_ifaddr_callback (callback, cb_data, 
+ 		                     l->ifa_addr, l->ifa_netmask);
+ 
+ 	freeifaddrs(ifa);
+ 	return 0;
+ }
+ 
+ #else /* !HAVE_GETIFADDRS && !WIN32 */
+ 
+ #include <sys/ioctl.h>
+ #include <net/if.h>
+ 
+ #ifdef HAVE_SYS_SOCKIO_H
+ #include <sys/sockio.h>
+ #endif
+ 
+ /*
+  * SIOCGIFCONF does not return IPv6 addresses on Solaris,
+  * and HP/UX. So we use SIOCGLIFCONF if it's available.
+  */
+ 
+ #ifdef SIOCGLIFCONF 
+ 
+ int
+ pg_foreach_ifaddr(PgIfAddrCallback callback, void *cb_data)
+ {
+ 	struct lifconf lifc;
+ 	struct lifreq *lifr, lmask;
+ 	struct sockaddr *addr, *mask;
+ 	char buffer[10240];
+ 	int sock, fd;
+ #ifdef HAVE_IPV6
+ 	int sock6;
+ #endif
+ 	int i, total;
+ 
+ 	sock = socket(AF_INET, SOCK_DGRAM, 0);
+ 	if (sock == -1)
+ 		return -1;
+ 
+ #ifdef HAVE_IPV6
+ 	sock6 = socket(AF_INET6, SOCK_DGRAM, 0);
+ 	if (sock6 == -1) 
+ 	{
+ 		close(sock);
+ 		return -1;
+ 	}
+ #endif
+ 
+ 	memset(&lifc, 0, sizeof (lifc));
+ 	lifc.lifc_family = AF_UNSPEC;
+ 	lifc.lifc_len = sizeof (buffer);
+ 	lifc.lifc_buf = buffer;
+ 
+ 	if (ioctl(sock, SIOCGLIFCONF, &lifc) < 0) 
+ 	{
+ 		close(sock);
+ #ifdef HAVE_IPV6
+ 		close(sock6);
+ #endif
+ 		return -1;
+ 	}
+ 
+ 	total = lifc.lifc_len / sizeof(struct lifreq);
+ 	lifr = lifc.lifc_req;
+ 	for (i = 0; i < total; ++i) 
+ 	{
+ 		addr = (struct sockaddr*)&lifr[i].lifr_addr;
+ 		memcpy(&lmask, &lifr[i], sizeof (struct lifreq));
+ #ifdef HAVE_IPV6
+ 		fd = addr->sa_family == AF_INET6 ? sock6 : sock;
+ #else
+ 		fd = sock;
+ #endif
+ 		if (ioctl(fd, SIOCGLIFNETMASK, &lmask) < 0)
+ 			mask = NULL;
+ 		else
+ 			mask = (struct sockaddr*)&lmask.lifr_addr;
+ 		run_ifaddr_callback (callback, cb_data, addr, mask);
+ 	}
+ 
+ 	close(sock);
+ #ifdef HAVE_IPV6
+ 	close(sock6);
+ #endif
+ 	return 0;
+ }
+ 
+ /* 
+  * Remaining Unixes use SIOCGIFCONF. Some only return IPv4 information
+  * here, so this is the least preferred method. Note that there is no 
+  * standard way to iterate the struct ifreq returned in the array. 
+  * On some OSs the structures are padded large enough for any address, 
+  * on others you have to calculate the size of the struct ifreq.
+  */
+ 
+ #elif defined(SIOCGIFCONF)
+ 
+ /* Some OSs have _SIZEOF_ADDR_IFREQ, so just use that */
+ #ifndef _SIZEOF_ADDR_IFREQ
+ 
+ /* Calculate based on sockaddr.sa_len */
+ #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
+ #define _SIZEOF_ADDR_IFREQ(ifr) \
+         ((ifr).ifr_addr.sa_len > sizeof(struct sockaddr) ? \
+          (sizeof(struct ifreq) - sizeof(struct sockaddr) + \
+           (ifr).ifr_addr.sa_len) : sizeof(struct ifreq))
+ 
+ /* Padded ifreq structure, simple */
+ #else
+ #define _SIZEOF_ADDR_IFREQ(ifr) \
+ 	sizeof (struct ifreq)
+ 
+ #endif
+ #endif
+ 
+ int
+ pg_foreach_ifaddr(PgIfAddrCallback callback, void * cb_data)
+ {
+ 	struct ifconf ifc;
+ 	struct ifreq *ifr, *end, addr, mask;
+ 	char buffer[10240];
+ 	int sock;
+ 
+ 	sock = socket(AF_INET, SOCK_DGRAM, 0);
+ 	if (sock == -1)
+ 		return -1;
+ 
+ 	ifc.ifc_buf = buffer;
+ 	ifc.ifc_len = sizeof(buffer);
+ 
+ 	if (ioctl(sock, SIOCGIFCONF, &ifc) < 0) 
+ 	{
+ 		close(sock);
+ 		return -1;
+ 	}
+ 
+ 	end = (struct ifreq*)(buffer + ifc.ifc_len);
+ 	for (ifr = ifc.ifc_req; ifr < end;)
+ 	{
+ 		memcpy(&addr, ifr, sizeof (addr));
+ 		memcpy(&mask, ifr, sizeof (mask));
+ 		if (ioctl(sock, SIOCGIFADDR, &addr, sizeof(addr)) == 0 &&
+ 		    ioctl(sock, SIOCGIFNETMASK, &mask, sizeof(mask)) == 0)
+ 			run_ifaddr_callback(callback, cb_data, 
+ 			                    &addr.ifr_addr, &mask.ifr_addr);
+ 		ifr = (struct ifreq*)((char*)ifr + _SIZEOF_ADDR_IFREQ(*ifr));
+ 	}
+ 
+ 	close(sock);
+ 	return 0;
+ }
+ 
+ #else /* !defined(SIOCGIFCONF) */
+ 
+ int
+ pg_foreach_ifaddr(PgIfAddrCallback callback, void * cb_data)
+ {
+ 	return -1;
+ }
+ 
+ #endif /* !defined(SIOCGIFCONF) */
+ 
+ #endif /* !HAVE_GETIFADDRS */
diff --git a/src/backend/libpq/pg_hba.conf.sample b/src/backend/libpq/pg_hba.conf.sample
index f1c0457..65966da 100644
*** a/src/backend/libpq/pg_hba.conf.sample
--- b/src/backend/libpq/pg_hba.conf.sample
***************
*** 33,38 ****
--- 33,41 ----
  # (between 0 and 32 (IPv4) or 128 (IPv6) inclusive) that specifies
  # the number of significant bits in the mask.  Alternatively, you can write
  # an IP address and netmask in separate columns to specify the set of hosts.
+ # Instead of a CIDR-address, you can specify "samehost" to match any of the 
+ # server's own IP addresses, or "samenet" to match any address in a subnet that 
+ # the server belongs to.
  #
  # METHOD can be "trust", "reject", "md5", "password", "gss", "sspi", "krb5",
  # "ident", "pam", "ldap" or "cert".  Note that "password" sends passwords
diff --git a/src/include/libpq/hba.h b/src/include/libpq/hba.h
index b538ee4..5193f38 100644
*** a/src/include/libpq/hba.h
--- b/src/include/libpq/hba.h
*************** typedef enum UserAuth
*** 30,35 ****
--- 30,42 ----
  	uaCert
  } UserAuth;
  
+ typedef enum NetMethod
+ {
+ 	nmCompare,
+ 	nmSameHost,
+ 	nmSameNet
+ } NetMethod;
+ 
  typedef enum ConnType
  {
  	ctLocal,
*************** typedef struct
*** 44,49 ****
--- 51,57 ----
  	ConnType	conntype;
  	char	   *database;
  	char	   *role;
+ 	NetMethod	net_method;
  	struct sockaddr_storage addr;
  	struct sockaddr_storage mask;
  	UserAuth	auth_method;
diff --git a/src/include/libpq/ip.h b/src/include/libpq/ip.h
index 1934957..9bd562c 100644
*** a/src/include/libpq/ip.h
--- b/src/include/libpq/ip.h
*************** extern void pg_promote_v4_to_v6_mask(str
*** 47,50 ****
--- 47,56 ----
  #define IS_AF_UNIX(fam) (0)
  #endif
  
+ typedef void (*PgIfAddrCallback)(struct sockaddr * addr,
+                                  struct sockaddr * netmask,
+                                  void * cb_data);
+ 
+ extern int pg_foreach_ifaddr(PgIfAddrCallback callback, void * cb_data);
+ 
  #endif   /* IP_H */
diff --git a/src/tools/ifaddrs/Makefile b/src/tools/ifaddrs/Makefile
index ...4ec26c1 .
*** a/src/tools/ifaddrs/Makefile
--- b/src/tools/ifaddrs/Makefile
***************
*** 0 ****
--- 1,26 ----
+ #-------------------------------------------------------------------------
+ #
+ # Makefile for src/tools/ifaddrs
+ #
+ # Copyright (c) 2003-2009, PostgreSQL Global Development Group
+ #
+ # $PostgreSQL$
+ #
+ #-------------------------------------------------------------------------
+ 
+ subdir = src/tools/ifaddrs
+ top_builddir = ../../..
+ include $(top_builddir)/src/Makefile.global
+ 
+ libpq_backdir = $(top_builddir)/src/backend/libpq/
+ override CPPFLAGS := -I$(libpq_backdir) $(CPPFLAGS)
+ 
+ OBJS= test_ifaddrs.o
+ 
+ all: test_ifaddrs
+ 
+ test_ifaddrs: test_ifaddrs.o $(libpq_backdir)/ip.o
+ 	$(CC) $(CFLAGS) test_ifaddrs.o $(libpq_backdir)/ip.o $(LDFLAGS) $(LIBS) -o $...@$(X)
+ 
+ clean distclean maintainer-clean:
+ 	rm -f test_ifaddrs$(X) $(OBJS)
diff --git a/src/tools/ifaddrs/README b/src/tools/ifaddrs/README
index ...98e84ff .
*** a/src/tools/ifaddrs/README
--- b/src/tools/ifaddrs/README
***************
*** 0 ****
--- 1,10 ----
+ $PostgreSQL$
+ 
+ ifaddrs
+ =======
+ 
+ This program looks up all the IPv4 and IPv6 interfaces on the local machine. It is useful for testing that this functionality works on various platforms.
+ 
+ 	Usage:	test_ifaddrs
+ 
+ 
diff --git a/src/tools/ifaddrs/test_ifaddrs.c b/src/tools/ifaddrs/test_ifaddrs.c
index ...4e77cbd .
*** a/src/tools/ifaddrs/test_ifaddrs.c
--- b/src/tools/ifaddrs/test_ifaddrs.c
***************
*** 0 ****
--- 1,72 ----
+ /*
+  * $PostgreSQL$
+  *
+  *
+  *	test_ifaddrs.c
+  *		test pg_foreach_ifaddr()
+  */
+ 
+ #include "postgres.h"
+ 
+ #include "libpq/ip.h"
+ 
+ #include <sys/types.h>
+ #include <sys/socket.h>
+ 
+ #include <errno.h>
+ #include <stdio.h>
+ #include <stdlib.h>
+ 
+ #include <netinet/in.h>
+ #include <arpa/inet.h>
+ 
+ static void
+ print_addr(struct sockaddr *addr)
+ {
+ 	char buffer[256];
+ 	int ret, len;
+ 
+ 	switch (addr->sa_family)
+ 	{
+ 	case AF_INET:
+ 		len = sizeof (struct sockaddr_in);
+ 		break;
+ 	case AF_INET6:
+ 		len = sizeof (struct sockaddr_in6);
+ 		break;
+ 	default:
+ 		len = sizeof (struct sockaddr_storage);
+ 		break;
+ 	}
+ 
+ 	ret = getnameinfo(addr, len, buffer, 256, NULL, 0, NI_NUMERICHOST);
+ 	if (ret != 0)
+ 		printf ("[unknown:%d]", addr->sa_family);
+ 	else
+ 		printf ("%s", buffer);
+ }
+ 
+ static void
+ callback(struct sockaddr *addr, struct sockaddr *mask, void *unused)
+ {
+ 	printf ("addr: ");
+ 	print_addr (addr);
+ 	printf ("  mask: ");
+ 	print_addr (mask);
+ 	printf ("\n");
+ }
+ 
+ int
+ main(int argc, char *argv[])
+ {
+ #ifdef WIN32
+ 	WSADATA wsaData;
+ 	if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
+ 		fprintf (stderr, "WSAStartup failed\n");
+ 	else
+ #endif
+ 	if (pg_foreach_ifaddr (callback, NULL) < 0)
+ 		fprintf (stderr, "pg_foreach_ifaddr failed: %s\n", strerror (errno));
+ 	return 0;
+ }
+ 
diff --git a/src/tools/msvc/Mkvcbuild.pm b/src/tools/msvc/Mkvcbuild.pm
index f5a01b3..2187420 100644
*** a/src/tools/msvc/Mkvcbuild.pm
--- b/src/tools/msvc/Mkvcbuild.pm
*************** sub mkvcbuild
*** 147,152 ****
--- 147,153 ----
      $libpq->AddIncludeDir('src\port');
      $libpq->AddLibrary('wsock32.lib');
      $libpq->AddLibrary('secur32.lib');
+     $libpq->AddLibrary('ws2_32.lib');
      $libpq->AddLibrary('wldap32.lib') if ($solution->{options}->{ldap});
      $libpq->UseDef('src\interfaces\libpq\libpqdll.def');
      $libpq->ReplaceFile('src\interfaces\libpq\libpqrc.c','src\interfaces\libpq\libpq.rc');
-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to