This is a utility to administer postgres databases that are behind a firewall.
Using a lambda that is on the same VPC as the database, this utility can ensure a database exists with a specific owner. This utilizes AWS IAM to secure administration instead of using an SSH Tunnel or VPN. This also limits the actions that a user can take, making it extremely hard to perform malicious commands.
The Lambda requires specific configuration to work properly:
- A SecretsManager Secret containing the connection string as a postgres URL.
DB_CONN_URL_SECRET_ID
env var containing ARN of the AWS SecretsManager Secret.- The execution role must have access to the above secret.
- The executing lambda must have network access to the postgres cluster.
There are 3 actions that the AWS code performs to grant database access:
create-database
create-user
create-db-access
This action performs the following steps:
- Ensures that a new user exists whose role name is
databaseName
. - Ensures that a database with the injected
databaseName
exists. - The newly-created database has an owner of the
databaseName
role.
This action performs the following steps:
- Ensure the user
username
exists. - If
username
role already exists, set the password topassword
.
This action performs the following steps:
- Add
username
as a member to the owner of the database. - Alters
username
so that the database owner has access to any schema objects created byusername
. - Grant all privileges on the
databaseName
and thepublic
schema indatabaseName
.
In practice, the following should be true.
- An application role runs migrations to create and alter schema objects.
- Implicitly, this application role owns newly-created schema objects.
- All application roles are a member of the role that owns the database -- giving them implicit access to all schema objects.
- The database owner role is given access to all schema objects (present and future).
It's important to note that an application user created for a worker application typically does not perform migrations. This application user is granted access to schema objects because it has membership in the database owner role (which has explicit access to schema objects).
In early versions of this module (below v0.2.0), schema objects were created and managed differently. Your database may be left in a bad state. To fix, follow these steps:
- Set the database owner to a role with the same name as the database.
- Ensure all application roles have membership to the database owner role.
- Alter default privileges
FOR ROLE <application-role>
TO <database-owner-role>
. - Grant privileges to all schema objects to application role on database and schema.
- Set ownership of tables to any application role.
oracle-> \dp
Access privileges
Schema | Name | Type | Access privileges | Column privileges | Policies
--------+-----------------------+-------+-----------------------------+-------------------+----------
public | expiring_downloads | table | postgres0=arwdDxt/postgres0+| |
| | | oracle=arwdDxt/postgres0 | |
public | flyway_schema_history | table | postgres0=arwdDxt/postgres0+| |
| | | oracle=arwdDxt/postgres0 | |
public | module_artifacts | table | postgres0=arwdDxt/postgres0+| |
| | | oracle=arwdDxt/postgres0 | |
public | module_versions | table | postgres0=arwdDxt/postgres0+| |
| | | oracle=arwdDxt/postgres0 | |
public | modules | table | postgres0=arwdDxt/postgres0+| |
| | | oracle=arwdDxt/postgres0 | |
(5 rows)
oracle-> \ddp
Default access privileges
Owner | Schema | Type | Access privileges
--------------+--------+----------+---------------------------------------
oracle-zshgw | | function | =X/"oracle-zshgw" +
| | | oracle=X/"oracle-zshgw" +
| | | "oracle-zshgw"=X/"oracle-zshgw"
oracle-zshgw | | schema | oracle=UC/"oracle-zshgw" +
| | | "oracle-zshgw"=UC/"oracle-zshgw"
oracle-zshgw | | sequence | oracle=rwU/"oracle-zshgw" +
| | | "oracle-zshgw"=rwU/"oracle-zshgw"
oracle-zshgw | | table | oracle=arwdDxt/"oracle-zshgw" +
| | | "oracle-zshgw"=arwdDxt/"oracle-zshgw"
oracle-zshgw | | type | =U/"oracle-zshgw" +
| | | oracle=U/"oracle-zshgw" +
| | | "oracle-zshgw"=U/"oracle-zshgw"
(5 rows)