> On Dec 1, 2021, at 5:36 AM, Amit Kapila <amit.kapil...@gmail.com> wrote:
> 
> On Wed, Dec 1, 2021 at 2:12 AM Jeff Davis <pg...@j-davis.com> wrote:
>> 
>> On Tue, 2021-11-30 at 17:25 +0530, Amit Kapila wrote:
>>> I think it would be better to do it before we allow subscription
>>> owners to be non-superusers.
>> 
>> There are a couple other things to consider before allowing non-
>> superusers to create subscriptions anyway. For instance, a non-
>> superuser shouldn't be able to use a connection string that reads the
>> certificate file from the server unless they also have
>> pg_read_server_files privs.
>> 
> 
> Isn't allowing to create subscriptions via non-superusers and allowing
> to change the owner two different things? I am under the impression
> that the latter one is more towards allowing the workers to apply
> changes with a non-superuser role.

The short-term goal is to have logical replication workers respect the 
privileges of the role which owns the subscription.

The long-term work probably includes creating a predefined role with permission 
to create subscriptions, and the ability to transfer those subscriptions to 
roles who might be neither superuser nor members of any particular predefined 
role; the idea being that logical replication subscriptions can be established 
without any superuser involvement, and may thereafter run without any special 
privilege.

The more recent patches on this thread are not as ambitious as the earlier 
patch-sets.  We are no longer trying to support transferring subscriptions to 
non-superusers.

Right now, on HEAD, if a subscription owner has superuser revoked, the 
subscription can continue to operate as superuser in so far as its replication 
actions are concerned.  That seems like a pretty big security hole.

This patch mostly plugs that hole by adding permissions checks, so that a 
subscription owned by a role who has privileges revoked cannot (for the most 
part) continue to act under the old privileges.

There are two problematic edge cases that can occur after transfer of 
ownership.  Remember, the new owner is required to be superuser for the 
transfer of ownership to occur.

1) A subscription is transferred to a new owner, and the new owner then has 
privilege revoked.

2) A subscription is transferred to a new owner, and then the old owner has 
privileges increased.

In both cases, a currently running logical replication worker may finish a 
transaction in progress acting with the current privileges of the old owner.  
The clearest solution is, as you suggest, to refuse transfer of ownership of 
subscriptions that are enabled.

Doing so will create a failure case for REASSIGN OWNED BY.  Will that be ok?

—
Mark Dilger
EnterpriseDB: http://www.enterprisedb.com
The Enterprise PostgreSQL Company





Reply via email to