Thread: Orphaned users in PG16 and above can only be managed by Superusers

Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi All,

Starting from PG16, it seems that orphaned users can only be managed
by superusers. For example, if userA creates userB, and userB creates
userC, then both userB (the parent of userC) and userA (the
grandparent of userC) would typically have the ability to
manage/administer userC. However, if userB is dropped, userA (the
grandparent of userC) loses the ability to administer userC as well.
This leads to a situation where only superusers can manage userC.

Shouldn't userA retain the permission to manage userC even if userB is
removed? Otherwise, only superusers would have the authority to
administer userC (the orphaned user in this case), which may not be
feasible for cloud environments where superuser access is restricted.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Robert Haas
Date:
On Thu, Jan 30, 2025 at 8:45 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
> Imagine a superuser creates role u1. Since the superuser is creating
> u1, it won't have membership in any role. Now, suppose u1 creates a
> new role, u2. In this case, u1 automatically becomes a member of u2
> with the admin option. However, at this point, there is no dependency
> between u1 and u2, meaning that dropping u2 shouldn't impact u1. Now,
> if u2 creates yet another role, u3, that's when u1 will start
> depending on u2. This is because if u2 were dropped, u1 would lose the
> ability to administer u3. At this stage, a dependency between u1 and
> u2 is recorded.

This seems to me to be assuming that who can administer which roles
won't change, but it can. The superuser is free to grant the ability
to administer u3 to some new user u4 or an existing user such as u1,
and is also free to remove that ability from u2.

I think if you want to legislate that attempting to drop u2 fails, you
have to do that by testing what the situation is at the time of the
drop command, not by adding dependencies in advance.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi Robert,

On Tue, Feb 4, 2025 at 10:54 PM Robert Haas <robertmhaas@gmail.com> wrote:
>
> On Thu, Jan 30, 2025 at 8:45 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
> > Imagine a superuser creates role u1. Since the superuser is creating
> > u1, it won't have membership in any role. Now, suppose u1 creates a
> > new role, u2. In this case, u1 automatically becomes a member of u2
> > with the admin option. However, at this point, there is no dependency
> > between u1 and u2, meaning that dropping u2 shouldn't impact u1. Now,
> > if u2 creates yet another role, u3, that's when u1 will start
> > depending on u2. This is because if u2 were dropped, u1 would lose the
> > ability to administer u3. At this stage, a dependency between u1 and
> > u2 is recorded.
>
> This seems to me to be assuming that who can administer which roles
> won't change, but it can. The superuser is free to grant the ability
> to administer u3 to some new user u4 or an existing user such as u1,
> and is also free to remove that ability from u2.
>

You're right, I'll fix that in the next patch.

> I think if you want to legislate that attempting to drop u2 fails, you
> have to do that by testing what the situation is at the time of the
> drop command, not by adding dependencies in advance.

I agree, and I will give this some thought to see if we can find a way
forward along these lines.

--
Thanks & Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Added a commitfest entry for this here:

https://commitfest.postgresql.org/patch/5608/

--
With Regards,
Ashutosh Sharma.

On Tue, Feb 18, 2025 at 2:54 PM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
>
> Hi Robert,
>
> On Tue, Feb 11, 2025 at 9:48 PM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
> >
> > Hi Robert,
> >
> > On Tue, Feb 4, 2025 at 10:54 PM Robert Haas <robertmhaas@gmail.com> wrote:
> > >
> > > On Thu, Jan 30, 2025 at 8:45 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
> > > > Imagine a superuser creates role u1. Since the superuser is creating
> > > > u1, it won't have membership in any role. Now, suppose u1 creates a
> > > > new role, u2. In this case, u1 automatically becomes a member of u2
> > > > with the admin option. However, at this point, there is no dependency
> > > > between u1 and u2, meaning that dropping u2 shouldn't impact u1. Now,
> > > > if u2 creates yet another role, u3, that's when u1 will start
> > > > depending on u2. This is because if u2 were dropped, u1 would lose the
> > > > ability to administer u3. At this stage, a dependency between u1 and
> > > > u2 is recorded.
> > >
> > > This seems to me to be assuming that who can administer which roles
> > > won't change, but it can. The superuser is free to grant the ability
> > > to administer u3 to some new user u4 or an existing user such as u1,
> > > and is also free to remove that ability from u2.
> > >
> >
> > You're right, I'll fix that in the next patch.
> >
> > > I think if you want to legislate that attempting to drop u2 fails, you
> > > have to do that by testing what the situation is at the time of the
> > > drop command, not by adding dependencies in advance.
> >
> > I agree, and I will give this some thought to see if we can find a way
> > forward along these lines.
> >
>
> Attached is a patch that checks for role dependencies when the DROP
> ROLE command is executed. If dependencies are found, the command is
> prevented from succeeding. Please review the attached patch and share
> your feedback. thanks.!
>
> --
> With Regards,
> Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Nathan Bossart
Date:
On Tue, Feb 18, 2025 at 02:54:46PM +0530, Ashutosh Sharma wrote:
> Attached is a patch that checks for role dependencies when the DROP
> ROLE command is executed. If dependencies are found, the command is
> prevented from succeeding. Please review the attached patch and share
> your feedback. thanks.!

Thanks for the patch.  I have two questions:

* The patch alleges to only block DROP ROLE commands when there exists
  _both_ admins of the target role and roles for which the target role is
  an admin.  However, it's not clear to me why both need to be true.  I
  might be able to glean the reason if I read this thread carefully or
  spend more time thinking about it, but IMHO that patch itself should make
  it obvious.  I'd suggest expanding the comment atop
  check_drop_role_dependency().

* Does this introduce any race conditions?  For example, is it possible for
  the new check to pass and then for a dependency to be added before the
  drop completes?

-- 
nathan



On Wed, Mar 5, 2025 at 3:13 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> * The patch alleges to only block DROP ROLE commands when there exists
>   _both_ admins of the target role and roles for which the target role is
>   an admin.  However, it's not clear to me why both need to be true.  I
>   might be able to glean the reason if I read this thread carefully or
>   spend more time thinking about it, but IMHO that patch itself should make
>   it obvious.  I'd suggest expanding the comment atop
>   check_drop_role_dependency().

The error message needs work, too. Nobody is ever going to guess what
the rule is from that error message.

> * Does this introduce any race conditions?  For example, is it possible for
>   the new check to pass and then for a dependency to be added before the
>   drop completes?

This is a serious concern for me as well.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Thanks, Nathan, for reviewing the patch. Below are my comments inline:

On Thu, Mar 6, 2025 at 1:43 AM Nathan Bossart <nathandbossart@gmail.com> wrote:
>
>
> * The patch alleges to only block DROP ROLE commands when there exists
>   _both_ admins of the target role and roles for which the target role is
>   an admin.  However, it's not clear to me why both need to be true.  I
>   might be able to glean the reason if I read this thread carefully or
>   spend more time thinking about it, but IMHO that patch itself should make
>   it obvious.  I'd suggest expanding the comment atop
>   check_drop_role_dependency().
>

I'll update the comments above the check_drop_role_dependency()
function to clarify things.

> * Does this introduce any race conditions?  For example, is it possible for
>   the new check to pass and then for a dependency to be added before the
>   drop completes?
>

I believe it is; I may need to adjust the location from where I'm
calling check_drop_role_dependency() to take care of this. I'll
address this in the next patch version. Thanks for bringing up this
concern.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi Robert,

Thanks for the review comments.

On Thu, Mar 6, 2025 at 2:10 AM Robert Haas <robertmhaas@gmail.com> wrote:
>
> On Wed, Mar 5, 2025 at 3:13 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> > * The patch alleges to only block DROP ROLE commands when there exists
> >   _both_ admins of the target role and roles for which the target role is
> >   an admin.  However, it's not clear to me why both need to be true.  I
> >   might be able to glean the reason if I read this thread carefully or
> >   spend more time thinking about it, but IMHO that patch itself should make
> >   it obvious.  I'd suggest expanding the comment atop
> >   check_drop_role_dependency().
>
> The error message needs work, too. Nobody is ever going to guess what
> the rule is from that error message.
>

I'll handle this in the next patch version.

> > * Does this introduce any race conditions?  For example, is it possible for
> >   the new check to pass and then for a dependency to be added before the
> >   drop completes?
>
> This is a serious concern for me as well.
>

This too will be taken care of in the next patch.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi,

Attached is the v2 patch with the following updates:

1) Added detailed comments atop check_drop_role_dependency() to
clarify role dependencies, addressing Nathan's comment.

2) Fixed a race condition where the dependency check could pass, but a
new dependency might be added before the role drop is completed,
addressing comments from Nathan and Robert.

3) Improved the error message to display the role dependencies in
detail, addressing feedback from Robert.

Please have a look and let me know for any further comments. Thanks.

--
With Regards,
Ashutosh Sharma.

Attachment

Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Nathan Bossart
Date:
On Thu, Mar 06, 2025 at 04:10:10PM +0530, Ashutosh Sharma wrote:
> Attached is the v2 patch with the following updates:
> 
> 1) Added detailed comments atop check_drop_role_dependency() to
> clarify role dependencies, addressing Nathan's comment.

Thanks!

> 2) Fixed a race condition where the dependency check could pass, but a
> new dependency might be added before the role drop is completed,
> addressing comments from Nathan and Robert.
> 
> 3) Improved the error message to display the role dependencies in
> detail, addressing feedback from Robert.
> 
> Please have a look and let me know for any further comments. Thanks.

I noticed that much of this code is lifted from DropRole(), and the new
check_drop_role_dependency() function is only used by DropRole() right
before it does the exact same scans.  Couldn't we put the new dependency
detection in those existing scans in DropRole()?

-- 
nathan



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi,

On Fri, Mar 7, 2025 at 10:55 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
>
> I noticed that much of this code is lifted from DropRole(), and the new
> check_drop_role_dependency() function is only used by DropRole() right
> before it does the exact same scans.  Couldn't we put the new dependency
> detection in those existing scans in DropRole()?
>

It can be done, but mixing the code that checks for the drop role
dependency with the code that removes entries for the role being
dropped from pg_auth_members could reduce clarity and precision. This
is more of a sanity check which I felt was necessary before we proceed
with actually dropping the role, starting with the deletion of drop
role entries from the system catalogs. I’m aware there’s some code
duplication, but I think it should be fine.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Nathan Bossart
Date:
On Mon, Mar 10, 2025 at 11:15:04AM +0530, Ashutosh Sharma wrote:
> On Fri, Mar 7, 2025 at 10:55 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
>> I noticed that much of this code is lifted from DropRole(), and the new
>> check_drop_role_dependency() function is only used by DropRole() right
>> before it does the exact same scans.  Couldn't we put the new dependency
>> detection in those existing scans in DropRole()?
> 
> It can be done, but mixing the code that checks for the drop role
> dependency with the code that removes entries for the role being
> dropped from pg_auth_members could reduce clarity and precision. This
> is more of a sanity check which I felt was necessary before we proceed
> with actually dropping the role, starting with the deletion of drop
> role entries from the system catalogs. I’m aware there’s some code
> duplication, but I think it should be fine.

Looking closer, we probably need to move this check to the second pass,
anyway:

    postgres=# CREATE ROLE a CREATEROLE;
    CREATE ROLE
    postgres=# SET ROLE a;
    SET
    postgres=> CREATE ROLE b CREATEROLE;
    CREATE ROLE
    postgres=> SET ROLE b;
    SET
    postgres=> CREATE ROLE c;
    CREATE ROLE
    postgres=> RESET ROLE;
    RESET
    postgres=# DROP ROLE b, c;
    ERROR:  role "b" cannot be dropped because some objects depend on it
    DETAIL:  role a inherits ADMIN privileges on role c through role b
    postgres=# DROP ROLE c, b;
    DROP ROLE

The first DROP ROLE should probably succeed, if for no other reason than
individually dropping role c followed by role b would succeed.

-- 
nathan



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi Nathan,

Thanks for the review comment.

On Mon, Mar 10, 2025 at 8:31 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
>
> On Mon, Mar 10, 2025 at 11:15:04AM +0530, Ashutosh Sharma wrote:
> > On Fri, Mar 7, 2025 at 10:55 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> >> I noticed that much of this code is lifted from DropRole(), and the new
> >> check_drop_role_dependency() function is only used by DropRole() right
> >> before it does the exact same scans.  Couldn't we put the new dependency
> >> detection in those existing scans in DropRole()?
> >
> > It can be done, but mixing the code that checks for the drop role
> > dependency with the code that removes entries for the role being
> > dropped from pg_auth_members could reduce clarity and precision. This
> > is more of a sanity check which I felt was necessary before we proceed
> > with actually dropping the role, starting with the deletion of drop
> > role entries from the system catalogs. I’m aware there’s some code
> > duplication, but I think it should be fine.
>
> Looking closer, we probably need to move this check to the second pass,
> anyway:
>
>         postgres=# CREATE ROLE a CREATEROLE;
>         CREATE ROLE
>         postgres=# SET ROLE a;
>         SET
>         postgres=> CREATE ROLE b CREATEROLE;
>         CREATE ROLE
>         postgres=> SET ROLE b;
>         SET
>         postgres=> CREATE ROLE c;
>         CREATE ROLE
>         postgres=> RESET ROLE;
>         RESET
>         postgres=# DROP ROLE b, c;
>         ERROR:  role "b" cannot be dropped because some objects depend on it
>         DETAIL:  role a inherits ADMIN privileges on role c through role b
>         postgres=# DROP ROLE c, b;
>         DROP ROLE
>
> The first DROP ROLE should probably succeed, if for no other reason than
> individually dropping role c followed by role b would succeed.
>

I initially thought this was fine because the sequence of dropping
roles matters. In the previous case (the first drop role statement),
the referenced role is dropped first, followed by the dependent role,
which causes the statement to fail. However, in the second statement,
the order is reversed, with the dependent role being dropped first,
allowing the referenced role to be dropped afterward, which makes the
statement succeed.

That said, I've realized this doesn't apply to the grantor role. If
both the grantor and grantee roles are dropped in a single statement,
the drop command succeeds regardless of the order. So, we need to
ensure that the same behavior is maintained here as well. I’ll address
this in the next patch version.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi Nathan,

On Mon, Mar 10, 2025 at 8:31 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
>
> On Mon, Mar 10, 2025 at 11:15:04AM +0530, Ashutosh Sharma wrote:
> > On Fri, Mar 7, 2025 at 10:55 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> >> I noticed that much of this code is lifted from DropRole(), and the new
> >> check_drop_role_dependency() function is only used by DropRole() right
> >> before it does the exact same scans.  Couldn't we put the new dependency
> >> detection in those existing scans in DropRole()?
> >
> > It can be done, but mixing the code that checks for the drop role
> > dependency with the code that removes entries for the role being
> > dropped from pg_auth_members could reduce clarity and precision. This
> > is more of a sanity check which I felt was necessary before we proceed
> > with actually dropping the role, starting with the deletion of drop
> > role entries from the system catalogs. I’m aware there’s some code
> > duplication, but I think it should be fine.
>
> Looking closer, we probably need to move this check to the second pass,
> anyway:
>

I think moving the check to the second pass won’t work in this case.
The reason is that we rely on entries in the pg_auth_members table. By
the time the check occurs in the second pass, the first pass will have
already removed all entries related to the roles being dropped from
pg_auth_members and incremented the command counter. As a result, when
check_drop_role_dependency() is called in the second pass, it won’t
find any entries in the table and won't be able to detect any ADMIN
privilege-related dependencies. Let me illustrate this with an example
(similar to yours, but with b creating an additional role d):

CREATE ROLE a CREATEROLE;
SET ROLE a;
CREATE ROLE b CREATEROLE;
SET ROLE b;
CREATE ROLE c;
CREATE ROLE d;
RESET ROLE;

At this point, the pg_auth_members table will contain the following entries:

ashu@postgres=# SELECT oid, roleid::regrole, member::regrole,
grantor::regrole, admin_option, xmin, xmax FROM pg_auth_members WHERE
roleid::regrole::text NOT LIKE 'pg_%';
  oid  | roleid | member | grantor | admin_option | xmin | xmax
-------+--------+--------+---------+--------------+------+------
 16394 | b      | a      | ashu    | t            |  756 |    0
 16396 | c      | b      | ashu    | t            |  757 |    0
 16398 | d      | b      | ashu    | t            |  758 |    0
(3 rows)

Now, when we run DROP ROLE b, c, the first pass in DropRole() will
remove all the entries from pg_auth_members for these roles, as
expected. So when check_drop_role_dependency() is called in the second
pass, it won’t find any entries in the table, and thus won’t identify
the dependency of role 'a' on role 'b' for role 'd'. As a result, the
drop would succeed, even though it should fail due to the dependency.

So, we need to explore alternative approaches to handle this better.
I’ll spend some more time today to investigate other possibilities for
addressing this issue.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Nathan Bossart
Date:
On Wed, Mar 12, 2025 at 12:10:30PM +0530, Ashutosh Sharma wrote:
> I think moving the check to the second pass won´t work in this case.
> The reason is that we rely on entries in the pg_auth_members table. By
> the time the check occurs in the second pass, the first pass will have
> already removed all entries related to the roles being dropped from
> pg_auth_members and incremented the command counter. As a result, when
> check_drop_role_dependency() is called in the second pass, it won´t
> find any entries in the table and won't be able to detect any ADMIN
> privilege-related dependencies.

Oh, good catch.

> So, we need to explore alternative approaches to handle this better.
> I´ll spend some more time today to investigate other possibilities for
> addressing this issue.

I think this approach has other problems.  For example, even if a role has
admin directly on the dropped role, we'll block DROP ROLE if it also has
admin indirectly:

    postgres=# create role a createrole;
    CREATE ROLE
    postgres=# set role a;
    SET
    postgres=> create role b createrole;
    CREATE ROLE
    postgres=> set role b;
    SET
    postgres=> create role c admin a;
    CREATE ROLE
    postgres=> reset role;
    RESET
    postgres=# drop role b;
    ERROR:  role "b" cannot be dropped because some objects depend on it
    DETAIL:  role a inherits ADMIN privileges on role c through role b

There are also other ways besides DROP ROLE that roles can end up without
any admins:

    postgres=# create role a createrole;
    CREATE ROLE
    postgres=# set role a;
    SET
    postgres=> create role b createrole;
    CREATE ROLE
    postgres=> set role b;
    SET
    postgres=> create role c;
    CREATE ROLE
    postgres=> reset role;
    RESET
    postgres=# revoke c from b;
    REVOKE ROLE

I wonder if we should adjust the requirements here to be "an operation
cannot result in a role with 0 admins."  That does mean you might lose
indirect admin privileges, but I'm not sure that's sustainable, anyway.
For example, if a role has 2 admins, should we block REVOKE from one of the
admins because another role inherited its privileges?  If nothing else, it
sounds like a complicated user experience.

If we just want to make sure that roles don't end up without admins, I
think we could just collect the set of roles losing an admin during DROP
ROLE, REVOKE, etc., and then once all removals have completed, we verify
that each of the collected roles has an admin.

-- 
nathan



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi,

On Wed, Mar 12, 2025 at 9:06 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
>
> I think this approach has other problems.  For example, even if a role has
> admin directly on the dropped role, we'll block DROP ROLE if it also has
> admin indirectly:
>

This is exactly what we're aiming for. We don't want the ADMIN
privilege, inherited by role 'a' on role 'c' via role 'b', to be
removed by the drop command. Therefore, we expect the command to fail.

> There are also other ways besides DROP ROLE that roles can end up without
> any admins:
>
>         postgres=# create role a createrole;
>         CREATE ROLE
>         postgres=# set role a;
>         SET
>         postgres=> create role b createrole;
>         CREATE ROLE
>         postgres=> set role b;
>         SET
>         postgres=> create role c;
>         CREATE ROLE
>         postgres=> reset role;
>         RESET
>         postgres=# revoke c from b;
>         REVOKE ROLE
>
> I wonder if we should adjust the requirements here to be "an operation
> cannot result in a role with 0 admins."  That does mean you might lose
> indirect admin privileges, but I'm not sure that's sustainable, anyway.
> For example, if a role has 2 admins, should we block REVOKE from one of the
> admins because another role inherited its privileges?  If nothing else, it
> sounds like a complicated user experience.
>

I think this is acceptable because role 'b', from which role 'a'
inherited the ADMIN privilege on role 'c', no longer has the privilege
either. Therefore, it's understandable for role 'a' to lose the
indirect privilege, as the role it was inheriting from has also lost
it. Moreover, this action is being performed by a superuser, the same
superuser who granted the ADMIN privilege on role 'c' to role 'b', and
it should have the ability to revoke it at any time. Once role 'b'
loses the ADMIN privilege on role 'c', it's expected that role 'a'
will also lose the privilege, as it was inherited from role 'b'. After
the ADMIN privilege is revoked, role 'a' will no longer have a
dependency on role 'b', so dropping role 'b' should succeed.

--
With Regards,
Ashutosh Sharma.



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Hi,

On Thu, Mar 13, 2025 at 11:14 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
>
> Hi,
>
> On Wed, Mar 12, 2025 at 9:06 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> >
> > There are also other ways besides DROP ROLE that roles can end up without
> > any admins:
> >
> >         postgres=# create role a createrole;
> >         CREATE ROLE
> >         postgres=# set role a;
> >         SET
> >         postgres=> create role b createrole;
> >         CREATE ROLE
> >         postgres=> set role b;
> >         SET
> >         postgres=> create role c;
> >         CREATE ROLE
> >         postgres=> reset role;
> >         RESET
> >         postgres=# revoke c from b;
> >         REVOKE ROLE
> >
> > I wonder if we should adjust the requirements here to be "an operation
> > cannot result in a role with 0 admins."  That does mean you might lose
> > indirect admin privileges, but I'm not sure that's sustainable, anyway.
> > For example, if a role has 2 admins, should we block REVOKE from one of the
> > admins because another role inherited its privileges?  If nothing else, it
> > sounds like a complicated user experience.
> >
>
> I think this is acceptable because role 'b', from which role 'a'
> inherited the ADMIN privilege on role 'c', no longer has the privilege
> either. Therefore, it's understandable for role 'a' to lose the
> indirect privilege, as the role it was inheriting from has also lost
> it. Moreover, this action is being performed by a superuser, the same
> superuser who granted the ADMIN privilege on role 'c' to role 'b', and
> it should have the ability to revoke it at any time. Once role 'b'
> loses the ADMIN privilege on role 'c', it's expected that role 'a'
> will also lose the privilege, as it was inherited from role 'b'. After
> the ADMIN privilege is revoked, role 'a' will no longer have a
> dependency on role 'b', so dropping role 'b' should succeed.
>

Here’s an example demonstrating the existing behavior of the DROP ROLE
command when attempting to drop a grantor role, which closely
resembles the behavior of the DROP ROLE command trying to drop a role
through which admin privileges are inherited by other role(s).

ashu@postgres=# create user a createrole login;
CREATE ROLE
ashu@postgres=# set role a;
SET
ashu@postgres=> create user b createrole login;
CREATE ROLE
ashu@postgres=> create user c createrole login;
CREATE ROLE
ashu@postgres=> grant c to b with admin true;
GRANT ROLE
ashu@postgres=> reset role;
RESET
ashu@postgres=# drop role a;
ERROR:  2BP01: role "a" cannot be dropped because some objects depend on it
DETAIL:  privileges for membership of role b in role c
LOCATION:  DropRole, user.c:1303
ashu@postgres=# set role a;
SET
ashu@postgres=> revoke c from b;
REVOKE ROLE
ashu@postgres=# drop role a;
DROP ROLE

In the example above, the DROP ROLE command for role 'a' failed
because 'a' had granted role 'c' to role 'b'. However, once role 'c'
was revoked from role 'b', the DROP ROLE command succeeded.

--
With Regards,
Ashutosh Sharma.



On Thu, Mar 13, 2025 at 1:44 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
> On Wed, Mar 12, 2025 at 9:06 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
> > I think this approach has other problems.  For example, even if a role has
> > admin directly on the dropped role, we'll block DROP ROLE if it also has
> > admin indirectly:
> >
>
> This is exactly what we're aiming for. We don't want the ADMIN
> privilege, inherited by role 'a' on role 'c' via role 'b', to be
> removed by the drop command. Therefore, we expect the command to fail.

I'm not sure what the right thing to do is here. This argument does
make some sense to me...

> >         postgres=# revoke c from b;
> >         REVOKE ROLE
>
> I think this is acceptable because role 'b', from which role 'a'
> inherited the ADMIN privilege on role 'c', no longer has the privilege
> either. Therefore, it's understandable for role 'a' to lose the
> indirect privilege, as the role it was inheriting from has also lost
> it. Moreover, this action is being performed by a superuser, the same
> superuser who granted the ADMIN privilege on role 'c' to role 'b', and
> it should have the ability to revoke it at any time. Once role 'b'
> loses the ADMIN privilege on role 'c', it's expected that role 'a'
> will also lose the privilege, as it was inherited from role 'b'. After
> the ADMIN privilege is revoked, role 'a' will no longer have a
> dependency on role 'b', so dropping role 'b' should succeed.

...as does this one. But if I accept both of those arguments, then
it's correct for the superuser to be blocked trying to "DROP ROLE b"
and also correct for the superuser to succeed trying to "REVOKE c FROM
b," and I'm not sure that really makes sense. I can understand why we
don't want a non-superuser to create a situation where the only
remaining administrator for a certain role is the superuser. But the
superuser themselves is not forbidden from creating such situations,
so why does it matter whether they try to create that situation via
DROP ROLE or via REVOKE?

I in general dislike throwing up barriers that prevent objects from
being dropped. As a user, I find such rules frustrating, especially if
I'm still allowed to accomplish the same drop indirectly by some
series of commands (e.g. REVOKE first, then DROP). If I'm allowed to
do it indirectly, then I should also be allowed to it directly, at
least in cases where there's only one way of fixing the problem that
is preventing me from doing the DROP, which I think is the case here.
For example, if bob owns a tractor and I want to DROP bob but the
tractor is indestructible, then it's reasonable to make the operation
fail. I need to give away bob's tractor before I drop him. But here,
if I say I want to DROP ROLE b, I'm going to have to first REVOKE c
FROM b -- there is no real other alternative. So why not make that
happen automatically? When I say I want to DROP something, I'm
serious: I really want it gone.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
"David G. Johnston"
Date:
On Wed, Mar 19, 2025 at 10:28 AM Robert Haas <robertmhaas@gmail.com> wrote:
I in general dislike throwing up barriers that prevent objects from
being dropped. As a user, I find such rules frustrating, especially if
I'm still allowed to accomplish the same drop indirectly by some
series of commands (e.g. REVOKE first, then DROP). If I'm allowed to
do it indirectly, then I should also be allowed to it directly, at
least in cases where there's only one way of fixing the problem that
is preventing me from doing the DROP, which I think is the case here.
For example, if bob owns a tractor and I want to DROP bob but the
tractor is indestructible, then it's reasonable to make the operation
fail. I need to give away bob's tractor before I drop him. But here,
if I say I want to DROP ROLE b, I'm going to have to first REVOKE c
FROM b -- there is no real other alternative. So why not make that
happen automatically? When I say I want to DROP something, I'm
serious: I really want it gone.


I'd rather that intent be communicated through CASCADE than just assumed, but I agree with the general point.

David J.

Robert Haas <robertmhaas@gmail.com> writes:
> if I say I want to DROP ROLE b, I'm going to have to first REVOKE c
> FROM b -- there is no real other alternative. So why not make that
> happen automatically? When I say I want to DROP something, I'm
> serious: I really want it gone.

For privileges on ordinary objects, we make you REVOKE them all first
before you can drop the grantee role, but that stems from an
implementation limitation: some of the privileges may be recorded in
the catalogs of other databases that we can't reach.  (We can see in
the shared pg_shdepend catalog that some privilege exists in another
DB, but we can't do anything about it.)

For grants on roles, all the moving parts are in the shared
pg_auth_members catalog, so from the implementation standpoint there's
nothing stopping us from auto-dropping such grants.  And AFAICS we do.
Certainly this is a bit inconsistent with the behavior for other
kinds of grants, but it's stood that way for awhile.  If we were to
try to make this consistent, I think we'd look for a way to auto-drop
privileges on ordinary objects, not start failing DROP ROLE because
privileges on roles exist.

That being the case, I'm against imposing restrictions on DROP ROLE
because of the properties of particular role grants.  If you get
into a situation where you need a superuser's help to undo something,
well hopefully you learned better and won't do that again.

I'm especially against making life more difficult for everyone who
uses Postgres in order to remove a problem that's only a problem for
people who don't have a superuser account available.

Furthermore, there is a standards-compliance argument.  The SQL
standard is unambiguous that auto-dropping privileges is what's
supposed to happen:

         <drop role statement> ::= DROP ROLE <role name>

         Syntax Rules

         1) Let R be the role identified by the specified <role name>.

         Access Rules

         1) At least one of the enabled authorization identifiers shall have
            a role authorization identifier that authorizes R with the WITH
            ADMIN OPTION.

         General Rules

         1) Let A be any <authorization identifier> identified by a role
            authorization descriptor as having been granted to R.

         2) The following <revoke role statement> is effectively executed
            without further Access Rule checking:

              REVOKE R FROM A

         3) The descriptor of R is destroyed.

There is nothing in rule (2) that suggests that implementations are
allowed to fail the DROP if they don't agree with what privileges are
being dropped.  (So our behavior for role privileges is spec-compliant
and our behavior for other privileges is not.)

In short, I don't like anything about this proposed patch and
think we should reject it.

            regards, tom lane



On Wed, Mar 19, 2025 at 1:55 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
> That being the case, I'm against imposing restrictions on DROP ROLE
> because of the properties of particular role grants.  If you get
> into a situation where you need a superuser's help to undo something,
> well hopefully you learned better and won't do that again.
>
> I'm especially against making life more difficult for everyone who
> uses Postgres in order to remove a problem that's only a problem for
> people who don't have a superuser account available.

You kind of lost me at this point. I mean, technically I agree that we
don't want to make life worse for everyone to help people who don't
have a superuser account available, but I don't see why it's written
in stone that we should have to make life worse for
superuser-administered installs in order to make it better for
non-superuser-administered installs.

Also, non-superuser-administered installs probably outnumber
superuser-administered ones already, maybe by a large margin, and I
think that's only going to accelerate as more things are done via
cloud providers. It's not some niche use case.

I am interested by your comment about the automatic DROP ROLE being
required by the spec, though. I rarely understand the spec, but I like
it when somebody says it agrees with what I already thought. :-)

--
Robert Haas
EDB: http://www.enterprisedb.com



Robert Haas <robertmhaas@gmail.com> writes:
> On Wed, Mar 19, 2025 at 1:55 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
>> I'm especially against making life more difficult for everyone who
>> uses Postgres in order to remove a problem that's only a problem for
>> people who don't have a superuser account available.

> You kind of lost me at this point. I mean, technically I agree that we
> don't want to make life worse for everyone to help people who don't
> have a superuser account available, but I don't see why it's written
> in stone that we should have to make life worse for
> superuser-administered installs in order to make it better for
> non-superuser-administered installs.

I didn't assert that that's a general problem.  I meant that this
particular patch makes life worse, by causing DROP ROLE to fail
unexpectedly.

BTW, I should note that I was quoting SQL99, because I have that
handy as plain text which is a lot easier to copy-n-paste from
than the PDF form of the later specs.  I looked into SQL:2021
and noted that DROP ROLE has grown a RESTRICT/CASCADE option,
which we have not implemented.  The RESTRICT form allows (if
I'm reading it right) failure if any indirect privilege grants
would have to be removed.  I haven't thought about it hard
enough to be sure if the situation Ashutosh is concerned about
would amount to removal of an indirect grant.  In any case,
CASCADE would still require such removal, and flat-out refusing
it would still be a spec violation.

Perhaps if we implemented RESTRICT/CASCADE here, that would
at least make it harder to fall into this trap?  In the spec,
that's simply passed on to the implied REVOKE commands, and
we do already support REVOKE ... RESTRICT/CASCADE, so maybe
that's not a hugely difficult patch.

            regards, tom lane



On Wed, Mar 19, 2025 at 2:32 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
> I didn't assert that that's a general problem.  I meant that this
> particular patch makes life worse, by causing DROP ROLE to fail
> unexpectedly.

I think that's only true of this particular version of the patch. I
believe it's likely resolvable somehow. As I see it, we're still
debating what the exact design should be.

> Perhaps if we implemented RESTRICT/CASCADE here, that would
> at least make it harder to fall into this trap?  In the spec,
> that's simply passed on to the implied REVOKE commands, and
> we do already support REVOKE ... RESTRICT/CASCADE, so maybe
> that's not a hugely difficult patch.

I have always assumed that the reason DROP ROLE blah CASCADE is not
implemented is (1) it would have to cascade to objects in other
databases which we can't do from an implementation perspective and (2)
cascading from roles to tables would create a terrifying amount of
room for user error. One could dismiss (2) if one were brave enough,
but (1) seems like an irreducible problem. No?

--
Robert Haas
EDB: http://www.enterprisedb.com



Robert Haas <robertmhaas@gmail.com> writes:
> On Wed, Mar 19, 2025 at 2:32 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
>> Perhaps if we implemented RESTRICT/CASCADE here, that would
>> at least make it harder to fall into this trap?

> I have always assumed that the reason DROP ROLE blah CASCADE is not
> implemented is (1) it would have to cascade to objects in other
> databases which we can't do from an implementation perspective and (2)
> cascading from roles to tables would create a terrifying amount of
> room for user error. One could dismiss (2) if one were brave enough,
> but (1) seems like an irreducible problem. No?

Yeah, I don't care for having it cascade to physical objects either.
But our current behavior is "RESTRICT if there are owned objects or
permissions on objects, but auto-CASCADE to role grants".  There's
no implementation reason why we couldn't make RESTRICT/CASCADE work
for role grants, and that'd be at least a smidge closer to what the
spec says.  It's not clear to me though if that could help for the
concern at hand.

            regards, tom lane



Re: Orphaned users in PG16 and above can only be managed by Superusers

From
Ashutosh Sharma
Date:
Thank you, Robert and Tom, for sharing your valuable insights, and
apologies for the slight delay in my response. From the discussion,
what I understand is that we aim to extend the current DROP ROLE
syntax to include the CASCADE/RESTRICT option, which has been
introduced in the latest SQL standard, as mentioned by Tom. However,
as Robert pointed out, implementing the CASCADE option for handling
dependent objects that span multiple databases is not feasible at the
moment. The RESTRICT option, as I understand it, is already the
default behavior. Therefore, we will proceed with implementing the
CASCADE/RESTRICT syntax specifically for handling dependent roles,
rather than the dependent database objects like tables, views, etc.,
which can span multiple databases.

Please correct me if I’m mistaken or if there’s anything I’ve missed
in my understanding. thanks.

--
With Regards,
Ashutosh Sharma.



On Mon, Mar 24, 2025 at 2:18 AM Ashutosh Sharma <ashu.coek88@gmail.com> wrote:
> Thank you, Robert and Tom, for sharing your valuable insights, and
> apologies for the slight delay in my response. From the discussion,
> what I understand is that we aim to extend the current DROP ROLE
> syntax to include the CASCADE/RESTRICT option, which has been
> introduced in the latest SQL standard, as mentioned by Tom. However,
> as Robert pointed out, implementing the CASCADE option for handling
> dependent objects that span multiple databases is not feasible at the
> moment. The RESTRICT option, as I understand it, is already the
> default behavior. Therefore, we will proceed with implementing the
> CASCADE/RESTRICT syntax specifically for handling dependent roles,
> rather than the dependent database objects like tables, views, etc.,
> which can span multiple databases.

I would be fairly strongly opposed to implementing RESTRICT and
CASCADE but having them only apply to role grants and not other
database objects.

I'm not entirely certain what the right thing to do is here, but I
don't think it's that.

--
Robert Haas
EDB: http://www.enterprisedb.com