Re: Granting control of SUSET gucs to non-superusers - Mailing list pgsql-hackers

From Mark Dilger
Subject Re: Granting control of SUSET gucs to non-superusers
Date
Msg-id 2949B883-9FD9-437C-B6A5-F2FD2B47C8B3@enterprisedb.com
Whole thread Raw
In response to Granting control of SUSET gucs to non-superusers  (Mark Dilger <mark.dilger@enterprisedb.com>)
Responses Re: Granting control of SUSET gucs to non-superusers  (Robert Haas <robertmhaas@gmail.com>)
List pgsql-hackers

> On Apr 30, 2021, at 4:19 PM, Mark Dilger <mark.dilger@enterprisedb.com> wrote:
>
> Hackers,
>
> PostgreSQL defines a number of GUCs that can only be set by superusers.  I would like to support granting privileges
onsubsets of these to non-superuser roles, inspired by Stephen Frost's recent work on pg_read_all_data and
pg_write_all_dataroles. 
>
> The specific use case motivating this work is that of a PostgreSQL service provider.  The provider guarantees certain
aspectsof the service, such as periodic backups, replication, uptime, availability, etc., while making no guarantees of
otheraspects, such as performance associated with the design of the schema or the queries executed.  The provider
shouldbe able to grant to the tenant privileges to set any GUC which cannot be used to "escape the sandbox" and
interferewith the handful of metrics being guaranteed.  Given that the guarantees made by one provider may differ from
thosemade by another, the exact set of GUCs which the provider allows the tenant to control may differ. 
>
> By my count, there are currently 50 such GUCs, already broken down into 15 config groups.  Creating a single new role
pg_set_all_gucsseems much too coarse a control, but creating 50 new groups may be excessive.  We could certainly debate
whichGUCs could be used to escape the sandbox vs. which ones could not, but I would prefer a design that allows the
providerto make that determination.  The patch I would like to submit would only give the provider the mechanism for
controllingthese things, but would not make the security choices for them. 
>
> Do folks think it would make sense to create a role per config group?  Adding an extra 15 default roles seems high to
me,but organizing the feature this way would make the roles easier to document, because there would be a one-to-one
correlationbetween the roles and the config groups. 
>
> I have a WIP patch that I'm not attaching, but if I get any feedback, I might be able to adjust the patch before the
firstversion posted.  The basic idea is that it allows things like: 
>
>    GRANT pg_set_stats_monitoring TO tenant_role;
>
> And then tenant_role could, for example
>
>    SET log_parser_stats TO off;

Ok, here is the first version of the patch for the list (though it is the second version I developed.)  The patch is
quitelong, but most of it is mechanical. 

Overview:

- guc.h defines a new set of privilege masks
- pg_authid.dat defines a new set of roles, with a one-to-one correlation to the privilege masks
- guc_tables.h extends struct config_generic to include a privilege mask field
- guc.c extends the structs for all variables to include a mask of privileges required to set the variable, and checks
theprivileges against the current user's role membership when trying to SET or ALTER SYSTEM SET 
- DefineCustom*Variable functions are extended to take a privileges mask, and all calls to these functions are extended
toinclude privileges for the custom variable being defined 
- new regression tests guc_priv_admin and guc_priv_tenant are defined.  The first creates a role "admin" and assigns it
membershipto all the new roles added in pg_authid.dat.  The second creates a role "tenant" and assigns it to just the
fewnew roles that appear reasonable for a tenant.  Both tests then go on to SET SESSION AUTHORIZATION to the new role
andthen attempt to SET, RESET, ALTER SYSTEM SET, and ALTER SYSTEM RESET most of the variables defined in guc.c.   These
testsmight be too verbose to be worth committing, but I thought they made an easy reference for those reviewing the
patchwho just want to quickly see the behavior. 

One of the consequences of the design is that if a user belongs to a role with permission to SET a variable, they can
alsoALTER SYSTEM SET that variable, at least to the extent that ALTER SYSTEM SET would allow the superuser to do so.
Notall variables can be changed via ALTER SYSTEM SET, though.  This means that some variables, "data_directory" for
example,cannot be changed by any of the new roles.  The first version of the patch, never posted, allowed 'include'
directivesin postgresql.conf to be annotated with roles, such that the included file would be processed with privileges
restrictedto just the listed roles.  This patch doesn't bother, since everything we are likely to care about can be
performedusing ALTER SYSTEM SET, but I can resurrect the 'include' directive logic if there is general demand for that. 

Any user can still SET a PGC_USERSET variable, just as before this patch, but the default permission to do so does not
translateinto permission to ALTER SYSTEM SET that same variable.  For that, the user needs to belong to a role with
permissionto set the variable, which in general for PGC_USERSET variables is the "pg_internal_settings" role.  I'm not
surethis is the right role for all of these, for example "password_encryption" seems like a better fit for role
"pg_interface_settings",but for the first patch posted to the list I didn't fuss too much about roles assigned to
PGC_USERSETvariables.  

I didn't bother updating the docs yet, as I doubt the set of privileges/roles in this patch will survive contact with
thislist.  They are: 

pg_internal_settings:
    - changes to purely internal behavior
pg_stats_settings:
    - changes to stats collection
pg_maintenance_settings
    - changes to autovacuum behavior
pg_storage_settings
    - changes to dealing with storage errors, such as fsync or checksum failure
pg_wal_settings
    - changes to wal, recovery, and replication settings
pg_logging_settings
    - changes to what gets logged
pg_interface_settings
    - changes to the external interface, such as port, authentication, etc.
pg_resource_usage
    - changes to memory, cpu, and disk usage
pg_filesystem_security
    - changes to where files and directories are located, permissions bits on
      files and directories, etc.
pg_exec_command
    - changes to external commands that get executed
pg_server_configuration
    - changes to the configuration of the server vis-a-vis the operating system
      facilities, such as shared memory model used
pg_security_settings
    - changes that relax security, such as turning off privilege checking,
      changing security critical logging settings, adjusting developer options
      which have security implications, or changing settings which could be
      used to create a denial of services attack

Note that some GUC variables have more than one privilege bit set, meaning a user must belong to all corresponding
rolesbefore they can change the setting.  For example, "log_file_mode" requires both pg_filesystem_security and
pg_logging_settings.



—
Mark Dilger
EnterpriseDB: http://www.enterprisedb.com
The Enterprise PostgreSQL Company




Attachment

pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: Condition pushdown: why (=) is pushed down into join, but BETWEEN or >= is not?
Next
From: Laurenz Albe
Date:
Subject: Re: RFC: Logging plan of the running query