Re: Orphaned users in PG16 and above can only be managed by Superusers - Mailing list pgsql-hackers

From Ashutosh Sharma
Subject Re: Orphaned users in PG16 and above can only be managed by Superusers
Date
Msg-id CAE9k0Pkrm=7eWhU04hBpYFY5sYJ5ZRMMfns2-nUOJNxCVBoMNg@mail.gmail.com
Whole thread Raw
In response to Re: Orphaned users in PG16 and above can only be managed by Superusers  (Ashutosh Sharma <ashu.coek88@gmail.com>)
List pgsql-hackers
Hi,

On Thu, Mar 13, 2025 at 11:14 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
>
> Hi,
>
> On Wed, Mar 12, 2025 at 9:06 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> >
> > There are also other ways besides DROP ROLE that roles can end up without
> > any admins:
> >
> >         postgres=# create role a createrole;
> >         CREATE ROLE
> >         postgres=# set role a;
> >         SET
> >         postgres=> create role b createrole;
> >         CREATE ROLE
> >         postgres=> set role b;
> >         SET
> >         postgres=> create role c;
> >         CREATE ROLE
> >         postgres=> reset role;
> >         RESET
> >         postgres=# revoke c from b;
> >         REVOKE ROLE
> >
> > I wonder if we should adjust the requirements here to be "an operation
> > cannot result in a role with 0 admins."  That does mean you might lose
> > indirect admin privileges, but I'm not sure that's sustainable, anyway.
> > For example, if a role has 2 admins, should we block REVOKE from one of the
> > admins because another role inherited its privileges?  If nothing else, it
> > sounds like a complicated user experience.
> >
>
> I think this is acceptable because role 'b', from which role 'a'
> inherited the ADMIN privilege on role 'c', no longer has the privilege
> either. Therefore, it's understandable for role 'a' to lose the
> indirect privilege, as the role it was inheriting from has also lost
> it. Moreover, this action is being performed by a superuser, the same
> superuser who granted the ADMIN privilege on role 'c' to role 'b', and
> it should have the ability to revoke it at any time. Once role 'b'
> loses the ADMIN privilege on role 'c', it's expected that role 'a'
> will also lose the privilege, as it was inherited from role 'b'. After
> the ADMIN privilege is revoked, role 'a' will no longer have a
> dependency on role 'b', so dropping role 'b' should succeed.
>

Here’s an example demonstrating the existing behavior of the DROP ROLE
command when attempting to drop a grantor role, which closely
resembles the behavior of the DROP ROLE command trying to drop a role
through which admin privileges are inherited by other role(s).

ashu@postgres=# create user a createrole login;
CREATE ROLE
ashu@postgres=# set role a;
SET
ashu@postgres=> create user b createrole login;
CREATE ROLE
ashu@postgres=> create user c createrole login;
CREATE ROLE
ashu@postgres=> grant c to b with admin true;
GRANT ROLE
ashu@postgres=> reset role;
RESET
ashu@postgres=# drop role a;
ERROR:  2BP01: role "a" cannot be dropped because some objects depend on it
DETAIL:  privileges for membership of role b in role c
LOCATION:  DropRole, user.c:1303
ashu@postgres=# set role a;
SET
ashu@postgres=> revoke c from b;
REVOKE ROLE
ashu@postgres=# drop role a;
DROP ROLE

In the example above, the DROP ROLE command for role 'a' failed
because 'a' had granted role 'c' to role 'b'. However, once role 'c'
was revoked from role 'b', the DROP ROLE command succeeded.

--
With Regards,
Ashutosh Sharma.



pgsql-hackers by date:

Previous
From: Ashutosh Bapat
Date:
Subject: Re: Test to dump and restore objects left behind by regression
Next
From: Masahiko Sawada
Date:
Subject: Re: Parallel heap vacuum