supautils

supautils

supautils : Extension that secures a cluster on a cloud environment

Overview

IDExtensionPackageVersionCategoryLicenseLanguage
7010
supautils
supautils
3.1.0
SEC
Apache-2.0
C
AttributeHas BinaryHas LibraryNeed LoadHas DDLRelocatableTrusted
--sL---
No
Yes
Yes
No
no
no
Relationships
See Also
passwordcheck_cracklib
pgsodium
supabase_vault
pg_session_jwt
anon
pg_tde
pgsmcrypto
pgaudit

Packages

TypeRepoVersionPG Major CompatibilityPackage PatternDependencies
EXT
PIGSTY
3.1.0
18
17
16
15
14
supautils-
RPM
PIGSTY
3.1.0
18
17
16
15
14
supautils_$v-
DEB
PIGSTY
3.1.0
18
17
16
15
14
postgresql-$v-supautils-
Linux / PGPG18PG17PG16PG15PG14
el8.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
el8.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
el9.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
el9.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
el10.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
el10.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
d12.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
d12.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
d13.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
d13.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
u22.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
u22.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
u24.x86_64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
u24.aarch64
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0
PIGSTY 3.1.0

Source

pig build pkg supautils;		# build rpm/deb

Install

Make sure PGDG and PIGSTY repo available:

pig repo add pgsql -u   # add both repo and update cache

Install this extension with pig:

pig install supautils;		# install via package name, for the active PG version

pig install supautils -v 18;   # install for PG 18
pig install supautils -v 17;   # install for PG 17
pig install supautils -v 16;   # install for PG 16
pig install supautils -v 15;   # install for PG 15
pig install supautils -v 14;   # install for PG 14

Config this extension to shared_preload_libraries:

shared_preload_libraries = 'supautils';

This extension does not need CREATE EXTENSION DDL command

Usage

supautils: Extension that secures a cluster on a cloud environment

supautils is a loadable library that securely allows creating event triggers, publications, and extensions for non-superusers. It is completely managed by configuration – no tables, functions, or security labels are added to your database.

Configuration

Add to postgresql.conf:

shared_preload_libraries = 'supautils'
supautils.privileged_role = 'your_privileged_role'

Or enable per-role:

ALTER ROLE role1 SET session_preload_libraries TO 'supautils';

Key GUC Parameters

ParameterDescription
supautils.privileged_roleProxy role for superuser operations
supautils.superuserThe actual superuser (defaults to bootstrap user)
supautils.privileged_extensionsExtensions allowed for non-superuser installation
supautils.privileged_role_allowed_configsSuperuser-only settings the privileged role may change
supautils.reserved_rolesRoles protected from mutation by CREATEROLE users
supautils.reserved_membershipsRole memberships restricted from being granted
supautils.constrained_extensionsJSON defining resource constraints for extensions
supautils.extensions_parameter_overridesJSON overriding CREATE EXTENSION parameters
supautils.policy_grantsJSON granting RLS policy management to non-owners
supautils.drop_trigger_grantsJSON granting trigger drop permission to non-owners

Non-Superuser Publications

SET ROLE privileged_role;
CREATE PUBLICATION p FOR ALL TABLES;
DROP PUBLICATION p;

Privileged Extensions

supautils.privileged_extensions = 'hstore'

Non-superusers can then create extensions that normally require superuser:

CREATE EXTENSION hstore;

Reserved Roles

supautils.reserved_roles = 'connector, storage_admin'

Users with CREATEROLE cannot ALTER or DROP these roles.

Table Ownership Bypass (RLS Policy Management)

supautils.policy_grants = '{ "my_role": ["public.not_my_table"] }'

Allows my_role to manage RLS policies on tables it does not own.

Last updated on