npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

sqlauthz

v1.0.5

Published

Declarative permission management for PostgreSQL

Downloads

313

Readme

sqlauthz - Declarative permissions management for PostgreSQL

sqlauthz allows you to manage your permissions in PostgresSQL in a declarative way using simple rules written in the Polar language. Polar is a language designed by Oso specifically for writing authorization rules, so its syntax is a great fit for declaring permissions. As an example of what this might look like, see the examples below:

# Give `user1` the `USAGE` permission on schema `myschema`;
allow("user1", "usage", "myschema");

# Allow `user1` to run `SELECT` queries on the columns "id" and "othercolumn"
# and rows where the "owner" column is equal to "owner1" in table "myschema.mytable"
allow("user1", action, resource)
    if action in ["select"]
    and resource == "myschema.mytable"
    and resource.col in ["id", "othercolumn"]
    and resource.row.owner == "owner1";

# Give `user2`, `user3`, and `user4` `USAGE` on the `test` schema
# And all permissions on all tables within the `test` schema
allow(actor, _, resource)
    if isInTestGroup(actor)
    and resource.schema == "test";
    
isInTestGroup(user) if user in ["user2", "user3"];
isInTestGroup("user4");

Currently sqlauthz support PostgreSQL as a backend, and it allows you to define:

  • Schema permissions
  • Table permissions including column and row-level security
  • View permissions
  • Function and procedure permissions
  • Sequence permissions

To get started, check out the Table of Contents below.

Table of Contents

Installation

sqlauthz is distributed as an npm package, so you can install it via your favorite package manager:

npm install --save-dev sqlauthz
# or, if using pnpm
pnpm add -D sqlauthz

You may not want to install it as a development dependency if you plan on using it as a library within your application.

Compatilibity

sqlauthz has automated testing in place and is compatible with node 18 and 20, and PostgreSQL versions 12-16. It may be compatible with older versions of either, but it has not been tested.

CLI

Most users will probably want to use sqlauthz via the command line. There are three ways to configure sqlauthz via CLI:

  • command line arguments
  • environment variables
  • under the sqlauthz key in package.json

In order to invoke the sqlauthz CLI, just invoke the sqlauthz command:

npm run sqlauthz
# or
npx sqlauthz
# or, if using pnpm
pnpm sqlauthz

CLI Configuration

The configuration options for sqlauthz can be found in the table below. Note that the argument name in the sqlauthz key of package.json is given first, then the CLI argument, then the environment variable:

| Name | Required | Default | Description | | ---- | -------- | ------- | ----------- | | databaseUrl-d, --database-urlSQLAUTHZ_DATABASE_URL | Yes | | Database URL to connect to for reading the current database object and executing queries (if one of the dryRun arguments is passed, it will only be used for reading the current database objects). Note that you can pass this in the form env:<name>, which will read the value from a specified environment variable, for example env:MY_DATABASE_URL will read the value from the MY_DATABASE_URL environment variable. | | rules-r, --rulesSQLAUTHZ_RULES | No | ['sqlauthz.polar'] | Path(s) to .polar files containing rules. Globs (e.g. sqlauthz/*.polar) are supported. Note that only a single path is supported when setting this argument via environment variable | | revokeReferenced--revoke-referencedSQLAUTHZ_REVOKE_REFERENCED | No | true | Use the referenced user revoke strategy. This is the default strategy. See User revoke strategies for details. Conflicts with revokeAll and revokeUsers. Note that if setting this via environment variable, the value must be true. | | revokeAll--revoke-allSQLAUTHZ_REVOKE_ALL | No | false | Use the all user revoke strategy. See User revoke strategies for details. Conflicts with revokeReferenced and revokeUsers. Note that if setting this via environment variable, the value must be true. | | revokeUsers--revoke-usersSQLAUTHZ_REVOKE_USERS | No | false | Use the users revoke strategy, revoking permissions from a list of users explicitly. See User revoke strategies for details. Conflicts with revokeReferenced and revokeAll. Note that if setting this via environment variable, only a single value can be passed. | | allowAnyActor--allow-any-actorSQLAUTHZ_ALLOW_ANY_ACTOR | No | false | Allow rules that do not put any limitations on the actor, so they apply to all users. This is potentially dangerous, particularly when used with revokeReferenced (the default), so it is disabled by default. This argument allows these rules (but make sure that you know what you're doing!). | | var--varSQLAUTHZ_VAR | No | | Inject variables into scope that can be utilized by your rules files. The syntax for variables injected via command line is <name>=<value>. The CLI will attempt to parse <value> a JSON string, and if that fails it will just be interpreted as a string. Within your rules files, variables can be access with var.<name>. This can be used to parametrize your rules files, and separate your configuration from your permissions logic. Also see --var-file for more flexibility. | | varFile--var-fileSQLAUTHZ_VAR_FILE | No | | Specify script(s) or JSON file(s) that will be loaded, and their exports will be used to inject variables into your rules files. Glob paths are supported e.g. *.js. The file(s) must have .js or .json extensions. Within your rules files, variables can be access with var.<name>. --var will take priority over variables loaded from file(s) loaded with this argument. This can be used to separate your permissions logic from your configuration. For an example, see the complete example below. | | dryRun--dry-runSQLAUTHZ_DRY_RUN | No | false | Print the full SQL query that would be executed instead of executing it. Note that if setting this via environment variable, the value must be true. This conflicts with dryRunShort | | dryRunShort--dry-run-shortSQLAUTHZ_DRY_RUN_SHORT | No | false | Print an abbreviated SQL query, only containing the GRANT queries that will be run, instead of executing anything. Note that if setting this via environment variable, the value must be true. This conflicts with dryRun | | debug--debugSQLAUTHZ_DEBUG | No | false | Print more detailed error information for debugging compilation failures. Note that if setting this via environment variable, the value must be true. |

NOTE: Environment variables will be loaded from your .env file and used as arguments where applicable. The order of precedence for configuration arguments is:

  • Command line args
  • Environment variables
  • The sqlauthz key in package.json You can disable the loading of environment variables from you .env file by setting the NO_DOTENV environment variable to any truthy value.

User revoke strategies

The intent of sqlauthz is the after you apply your permission rules, they will define the entire set of permissions for a user. Before sqlauthz applies new permissions, it revokes all permissions from a set of users first. It both revokes and grants the permissions as part of the same transaction, however, so in practice this does not lead to any "downtime" where a user has no permissions.

It's possible that you may not want to control the permissions of all of your users. This is particularly true if you're just trying sqlauthz out or adopting it incrementally. To allow you to use sqlauthz in a way that works for your use-case, there are three different "user revoke strategies" in sqlauthz. A "user revoke strategy" determines what users to revoke permissions from before granting permissions. The three strategies are as follows:

  • referenced (default) - Any user who would be granted a permission by your rules will have all of their permissions revoked beforehand. This has the benefit of only affecting users who reference in your rules, but it can be dangerous when used in conjunction with allowAnyActor. By default, this is enabled and allowAnyActor is disabled. Another downside of this strategy is that if you reference a particular user, apply permissions, then remove the rules that grant permissions to that user, the permissions will not be removed the next time you update permissions.
  • all - Revoke permissions from all non-superusers users before granting permissions. This has the benefit of being the most secure, as it ensures that your rules define the entire set of permissions for non-superusers in your database. It fixes the issue with the referenced strategy that removing rules for a particular user will revoke them the next time you apply your permissions, with the tradeoff that if you choose this strategy, you must manage all of your users' permissions this way.
  • users - Define a specific list of users whose permissions should be revoked before granting permissions. This is a balance between the referenced and all strategies if you have a specific set of users who you'd like to manage the permissions for using sqlauthz.

NOTE: Superuser's permissions cannot be limited using sqlauthz, because they cannot be limited by PostgreSQL permissions in general. They are ignored by sqlauthz entirely, and will never have permissions granted to or revoked from them.

NOTE: To avoid unintended behavior, sqlauthz is relatively strict about referencing actors. Specifically:

  • Referencing a user or group explicitly in rules that does not exist will cause an error.
  • Including a user that doesn't exist in a user user revoke strategy will cause an error.
  • Attempting to grant permissions to a user outside the scope of the user revoke strategy will cause an error.

Using sqlauthz as a library

If you want to embed sqlauthz within your application, you can also use it as a library. To do this, you must do three things:

  • Create an instance of PostgresBackend, passing in a pg.Client instance.
  • Call compileQuery to compile your query
  • Execute the query

Here's a simple usage example:

import pg from 'pg';
import {
  PostgresBackend,
  compileQuery
} from 'sqlauthz';

const client = new pg.Client('my-db-url');
await client.connect();

const result = await compileQuery({
  backend: new PostgresBackend(client),
  paths: ['./my-rules-file.polar']
});
if (result.type === 'success') {
  await client.query(result.query);
} else {
  console.log(result.errors);
}

await client.end();

The libary is quite simple, so if you need to do something different you can likely read the source code to figure out how to do it. If you have any issues, feel free to create an issue.

See the CompileQueryArgs type for a full definition of arguments that can be passed to compileQuery(). For the most part they are 1-1 with CLI arguments, with a few minor differences:

  • paths does not resolve globs
  • --dry-run-short is equivalent to compiling the query with includeTransaction: false and includeSetupAndTeardown: false

Writing Rules

Top-level rules are written via allow(actor, action, resource) declarations. Each of the actor, action, and resource variables has different semantics:

  • actor - Represents a user or group in PostgreSQL. Will always be a string. Users and groups must be compared directly, via actor == "some-user" or actor in ["some-user", "some-other-user"]. User/group names must exactly match the values you compare them to.

    • user - Can be compared directly with strings e.g. actor == "my_user"
      • actor.type - Equal to "user"
    • group - Can be compared directly with strings e.g. actor == "my_group"
      • actor.type - Equal to "group"
  • action - Will always be a string. Actions must be compared directly, via action == "some-action" or action in ["some-action", "some-other-action"]. Action names are case insensitive, so SELECT works exactly the same as select. The following privileges are currently supported:

    • Table permissions - "select", "insert", "update", "delete", "truncate", "references", "trigger"
      • Row-level security supported for select, insert, update, delete
      • Column-level security supported for select, insert, update
    • Schema permissions - "usage", "create"
    • View permissions - "select", "insert", "update", "delete", "trigger". Note that only "simple views" are updatable, see the postgres documentation for more details.
    • Function and procedure permissions - "execute"
    • Sequence permissions - "select", "update", "usage"
  • resource - This can represent either a table or a schema. The semantics are different for different types of database objects, described below:

    • tables - Can be compared directly with strings. When comparing directly table names must be schema-qualified. e.g. resource == "someschema.sometable"
      • resource.type - Equal to "table", e.g. resource.type == "table"
      • resource.name - The table name, without schema, e.g. resource.name == "sometable"
      • resource.schema - The schema name, e.g. resource.schema == "someschema"
      • resource.col - Filter which columns the permission applies to, e.g. resource.col in ["col1", "col2"]
      • resource.row.<col> - Filter which rows the permission applies to via row-level security policies, e.g. resource.row.id == 12.
    • schemas - Can be compared directly with strings, e.g. resource == "someschema"
      • resource.type - Equal to "schema", e.g. resource.type == "schema"
      • resource.name - Equal to the schema name, e.g. resource.name == "someschema"
      • resource.schema - Equal to the schema name, equivalent to resource.name. This only exists so that one can simply give permissions across an entire schema including both tables and the schema itself by writing resource.schema == "someschema".
    • views - Can be compared directly with strings, e.g. resource == "myschema.myview"
      • resource.type - Equal to "view" e.g. resource.type == "view"
      • resource.name - The view name, without schema e.g. resource.name == "someview"
      • resource.schema - The schema name, e.g. resource.schema == "someschema"
    • functions - Can be compared directly with strings, e.g. resource == "myschema.myfunction"
      • resource.type - Equal to "function" e.g. resource.type == "function"
      • resource.name - The function name, without schema e.g. resource.name == "somefunction"
      • resource.schema - The schema name, e.g. resource.schema == "someschema"
    • procedures - Can be compared directly with strings, e.g. resource == "myschema.myprocedure"
      • resource.type - Equal to "procedure" e.g. resource.type == "procedure"
      • resource.name - The procedure name, without schema e.g. resource.name == "someprocedure"
      • resource.schema - The schema name, e.g. resource.schema == "someschema"
    • sequences - Can be compared directly with strings e.g. resource == "myschema.mysequence"
      • resource.type - Equal to "sequence" e.g. resource.type == "sequence"
      • resource.name - The sequence name, without schema e.g. resource.name == "somesequence"
      • resource.schema - The schem aname, e.g. resource.shcmea == "someschema"

For a full explanation of polar semantics, you can read the Polar Documentation.

For complete examples of how rules look in practice, consult the examples.

Using SQL functions in row-level security clauses

sqlauthz supports using SQL functions in row-level security clauses, though there are some limitations. In order to use sql functions, you must use the syntax of sql.<function_name>. For example:

allow("bob", "select", table)
    if table == "my.table"
    and table.row.owner_id == sql.current_setting("my.custom.setting");

You can also use SQL functions that take columns as input. For example:

allow("bob", "select", table)
    if table == "my.table"
    and table.row.created_at == sql.date_trunc("day", table.row.updated_at);

You can also nest SQL function calls:

allow("bob", "select", table)
    if table == "my.table"
    and table.row.created_at == sql.date_trunc("day", sql.now());

You should be able to use any SQL function that is available in your database. You can also use schema-qualified functions for those that are not built in:

allow("bob", "select", table)
    if table == "my.table"
    and table.row.id == sql.my.function(table.row.owner_id);

Note that while this should work fine for simple row-level security policies, but if you try to do something arbitrary complex you may run into issues. Please open an issue if you do. One known limitation is that operating on a literal and a function call with a column on an input will require you to use the sql.lit helper function to declare the literal:

allow("bob", "select", table)
    if table == "my.table"
    and sql.date_trunc("day", table.row.updated_at) == sql.lit("2023-01-01T00:00:00");

Available constants

sqlauthz exposes some constants that you can use in your polar rules. Available constants:

  • sql - This contains utilities that you can use for writing row-level security rules with SQL functions. For examples see Using SQL functions in row-level security clauses. Available members:
    • <sql_function> - Built-in SQL functions in Postgres such as date_trunc. Only functions from the pg_catalog schema can be referenced without schema-qualification.
    • <schema>.<sql_function> - Schema-qualified SQL functions; typically these would be user-defined functions that you write.
    • lit - Due to limitations in sqlauthz, when writing row-level security rules that compare the result of a SQL function with a literal, lit() must be used to wrap the literal. There is an example in the previous section.
    • cast - corresponds to the SQL CAST(value AS type) syntax. This can be called with the value being a resource.row.<col> or the result of a SQL function, and the type should be a string literal. E.g. sql.cast(resource.row.id, "bigint")
  • permissions - This contains arrays of the available permissions for each object type that can be used in rules if you wish. Available members:
    • schema - ["USAGE", "CREATE"]
    • table - ["SELECT", "INSERT", "UPDATE", "DELETE", "TRUNCATE", "REFERENCES", "TRIGGER"]
    • view - ["SELECT", "INSERT", "UPDATE", "DELETE", "TRIGGER"]
    • function - ["EXECUTE"]
    • procedure - ["EXECUTE"]
    • sequence - ["USAGE", "SELECT", "UPDATE"]

Permissions that depend on one another

One thing to be careful of when defining permissions with sqlauthz is that there are some permissions in Postgres that depend on one another. This list is not exhaustive, but rather meant to highlight some of the most common "gotchas" with respect to dependent permissions. For complete and up-to-date information on PostgreSQL privileges you should consult the PostgreSQL documentation.

  • table/view/sequence/function/procedure permissions depend on the schema's usage permission - If you defined permission on objects within a schema such a SELECT on a table or view, you will still get a "permission denied" message with the user attempting to utilize that permission unless you grant USAGE on the schema in which the object exists. For example, if you grant a user the SELECT permission on a table called app.users, you must also grant the user the USAGE permission on the app schema in order to utilize it.

  • insert permissions for autoincremented primary keys depend on the sequence's usage permission - If you defined an INSERT permission for a table and are using an autoincremented primary key such as a SERIAL or BIGSERIAL type, you will get a "permission denied" error if you do not also grant access to the underlying sequence that provides values for that column. Sequences created for autoincremented postgres columns are created in the same schema as the table, and are named <schema>.<table>_<name>_seq. E.g. for the id column of a table called app.users, the sequence would be app.users_id_seq.

It can often be tricky to get permissions right on the first try; for this reason, it's recommended that you do some testing after applying your permissions to confirm that they're doing what you expect.

Incremental Adoption

In most cases, you'll be adopting sqlauthz into an existing database that already has roles, and possibly permissions, defined. It's a good idea to start by creating new role(s) to be managed by sqlauthz, and managing only those roles with sqlauthz. To achieve this, you should use the users revoke strategy to ensure you don't affect the permissions of any of your existing users. You can achieve this using the revokeUsers argument. For example, in your package.json:

{
    ...
    "sqlauthz": {
        "revokeUsers": ["user1", "user2", "user3"]
    }
}

This can also be specified on the command line. See the CLI Configuration section for details.

Examples

These are a limited set of examples on how you can express certain rule sets in sqlauthz using polar. Note that the possiblities are nearly endless, and you should learn about the Polar language if you want to have a firm grasp on everything that's possible. You can also check out the tests, which includes many minimal examples of rules. If you're not sure if something's possible or how to do it, always feel free to open an issue and I'll be happy to help you our and/or augment these examples with what you're looking for.

A complete example

This example shows how you can effectively segment your permissions into various virtual "roles" that can easily be assigned to new users and/or groups. This is split up into multiple scripts as an example of how you might want to organize your rules into a few different files. This also showcases how you can use the varFile argument to parametrize your rules and separate your configuration from your permissions logic. For this example, you would add the following configuration to your package.json (alternatively, specify --var-file roles.json -r permissions.polar roles.polar on the command line):

{
    ...
    "sqlauthz": {
        "rules": ["permissions.polar", "roles.polar"],
        "varFile": ["roles.json"]
    }
}

permissions.polar

# Grant everyone USAGE on all schemas except the `sensitive` one
allow(actor, "usage", resource)
    if isQA(actor)
    and resource.type == "schema"
    and resource != "sensitive";

# Grant devs USAGE on the `sensitive` schema
allow(actor, "usage", "sensitive") if isDev(actor);

# Grant QA read-only access to all tables and views except those in the "sensitive"
# schema. Grant devs read-only access on the `usage` tables as well
allow(actor, "select", resource)
    if isQA(actor)
    and obj_type in ["table", "view"]
    and resource.type == obj_type
    and resource.schema != "sensitive";

# Grant devs full access on all tables and views, and sequences
# except the TRUNCATE permission
allow(actor, permission, resource)
    if isDev(actor)
    and permission != "truncate"
    and obj_type in ["table", "view", "sequence"]
    and resource.type == obj_type;

# Grant app users usage on the app schema
allow(actor, "usage", "app") if isApp(actor);

# Grant app users usage on the app.users_id_seq sequence
allow(actor, "usage", "app.users_id_seq") if isApp(actor);

# Grant app users access to the `app.users` table limited by row-level security
# based on the current user.org_id setting. This would be set in the application
# code via a `SET ` query before running other queries, and queries would fail without
# this set. Do not allow them to access the "internal_notes" column
allow(actor, permission, resource)
    if isApp(actor)
    and permission in ["select", "insert", "update", "delete"]
    and resource == "app.users"
    # Note: for multiple columns this could either be stated
    # as `resource.col != "internal_notes" and resource.col != "other"`
    # or `forall(x in ["internal_notes", "other"], resource.col != x)`
    # `not resource.col in ["internal_notes", "other"]` does NOT work
    and resource.col != "internal_notes"
    and resource.row.org_id == sql.current_setting("user.org_id");

roles.polar

# Assign some users as "devs", which will get a certain set of permissions
isDev(actor)
    if name in var.devUsers
    and actor.type == "user"
    and actor == name;

# Assign some users to the QA group, which will get a certain set of permissions
# This is equivalent to the isDev syntax above except these rules don't check that
# the actor is a user and not a group (which usually shouldn't be an issue, but it
# could depend on how your DB is set up. When using `sqlauthz` using postgresql groups
# shouldn't really be necessary)
isQA(actor) if actor in var.qaUsers;

# Devs should have all of the QA permissions
isQA(actor) if isDev(actor);

# Virtual group for DB roles used by apps
isApp(actor) if actor in var.appUsers;

roles.json

{
    "devUsers": ["bob", "greg", "julie", "marianne"],
    "qaUsers": ["randy", "john", "ariel"],
    "appUsers": ["api_svc", "worker_svc"]
}

Grant a user or group all permissions on all schemas

allow("bob", _, _);

Grant multiple users or groups all permissions on a schema

allow(actor, _, resource)
    if isInGroup(actor)
    and resource.schema == "schema1";

isInGroup("bob");
isInGroup(actor) if actor in ["jenny", "james"];

Grant a group read-only access on a schema

allow(actor, action, resource)
    if actor == "bob"
    and actor.type == "group"
    and action in ["select", "usage"]
    and resource.schema == "schema1";

Grant a user or group read permissions on a limited set of rows and columns in a table

allow("bob", "select", resource)
    if resource == "api.mytable"
    and (resource.row.mycol == "abc" or resource.row.mycol2 < 12)
    and resource.row.col in ["mycol", "mycol3"];

Integrating into a production application

If you're considering integrating sqlauthz into a production application, there probably at least two important things you'll want to consider:

  • How to integrate sqlauthz into your CI/CD pipeline
  • How to integrate sqlauthz into your tests

This section goes through some recommendations for how to do each of these things. These recommendations are based on my experience integrating sqlauthz into a couple of production applications that I've worked on.

Integrating into CI/CD

It's highly recommended if you use sqlauthz in production to automate applying permissions so that they keep in sync with your database schema.

The best time to do this is right after you've applied your database migrations, whether that be in a CI/CD process, before your application starts up (read on for more specific recommendations related to this approach), or otherwise.

You want to apply sqlauthz after your database migrations have run because sqlauthz will only create permissions for database objects that exist at the time it runs. If you apply sqlauthz before running your database migrations, you will find that roles are missing permissions for newly-created database objects until it's run again.

In order to run sqlauthz you will have to use a role that has a very high level of permissions, often a superuser role. For this reason, if you are using a database role whose permissions are provisioned by sqlauthz in your application, it's ideal to not have those elevated credentials available to your application at all (the same applies to running database migrations in general).

For this reason, it's recommended to apply both your migrations and your permissions via sqlauthz in a separate process from your actual application, whether that be in a CI/CD container or some kind of initialization container that runs before your application starts up. Many container orchestration systems like AWS ECS and Kubernetes have a first-class way to implement this. This is as opposed to simply running sqlauthz right before the command that actually starts your application. There are other good reasons why this is a good idea as well, such as the ability to set stricter health checks on your application.

NOTE: sqlauthz runs all of its REVOKE and GRANT queries for a single run in a single transaction, so it's all or nothing--either all permissions will be updated appropriately according to your desired configuration, or no changes will be made if there's a failure.

Integrating into tests

A good way to avoid any unexpected issues when deploying your application is by using a database role in your tests that mimics the permissions of the role(s) that you have in your production application. This will ensure that if you forget to provision permissions to something that your application requires, you should see test failures rather than errors in your production or staging environment.

A good approach for doing this is to provision the same roles in your local database that you do in your production or staging database. An easy way to do this without needing to build your own postgres image or do anything hacky is to make use of the /docker-entrypoint-initdb.d directory, which can contain scripts that will be automatically run when the database container starts.

For example, if you have a postgres container in a docker-compose.yaml file like this:

version: '3'
services:
  database:
    image: postgres
    environment:
      - POSTGRES_USER=postgres
      - POSTGRES_PASSWORD=password
      - POSTGRES_DB=testdb
    ports:
      - '5432:5432'

Create a directory to store your init script:

mkdir local_postgres_init

And then create a SQL script like the following at local_postgres_init/create_default_users.sql:

CREATE USER app PASSWORD 'password';

Finally, add it to your postgres container by adding the following to your docker-compose.yaml:

version: '3'
services:
  database:
    image: postgres
    environment:
      - POSTGRES_USER=postgres
      - POSTGRES_PASSWORD=password
      - POSTGRES_DB=testdb
    ports:
      - '5432:5432'
    volumes:
      - ./local_postgres_init:/docker-entrypoint-initdb.d

Now when you run docker compose up -d, the app role will be created automatically. You can test this by running:

psql -h localhost -p 5432 -U app --password testdb

And entering password when prompted for a password.

Now all you have to do is:

  • Set your database URL to postgres://app:password@localhost:5432/testdb (specifics, particularly the protocol, will depend on what postgres client library you are using. The above will work for the node pg library) when running your tests
  • Make sure to run sqlauthz after running your migrations in your test database.

And you will be using a role whose permissions match your production database roles'.

Considerations when using row-level security

There are a couple of relevant behaviors to be aware of when using sqlauthz for row-level security policies:

  • If you write a rule that makes use of row-level security (i.e. using table.row.<col> in one of your rules) and row-level security is not enabled for that table, it will be enabled on that table. This should not affect existing users because by default sqlauthz will add an empty "permissive" policy for the table, so any users not targeted in your sqlauthz rules will still be able to access the table normally.
  • sqlauthz will drop existing "restrictive" RLS policies before creating new ones based on your Polar rules. This means that if you add a "restrictive" policy manually, it may be dropped next time you run sqlauthz. This only applies where both of the following conditions where the policy is both:
    • on a table where you are granting a permission to any user using RLS
    • targetting a user in your user revoke strategy
  • sqlauthz will add an empty "permissive" policy that applies to all users when it enables row-level security on a table. However, when row-level security is already enabled on a table, it will only create "missing" permissive policies. A permissive policy is created for any user and permission that is granted access to a given table where none exist, regardless of whether their access is limited with any restrictive RLS policies. This only happens to tables where RLS is "required" meaning that your polar rules specify at least one permission that requires a RLS policy on that table AND tables where RLS is already enabled.

For more information on RLS in Postgres and to learn more about "permissive" and "restrictive" policies, check out the docs.

Usage with VSCode

You can use the Oso VSCode plugin to get syntax highlighting and LSP support for your .polar files. However, you should add this setting to your .vscode/settings.json to avoid syntax errors:

{
    "oso.polarLanguageServer.validations": "library"
}

For more details, see Oso Library Deprecation.

Oso Library Deprecation

In its current state, sqlauthz depends heavily on the oso library. In December 2023 Oso marked this library for deprecation in favor of their cloud service, though they have indicated that they will continue to support the library version until they can replace it with something that makes use of the newer codebase that they built for their Oso Cloud product. Their new codebase uses slightly different Polar syntax, and specifically it does not allow certain things that were supported by the library. See Usage with VSCode for instructions on how to instruct the VSCode plugin to use the polar syntax supported by the library version.

NOTE: For sqlauthz, Oso Cloud is not a useful abstraction and unless something fundamentally changes there are no plans to ever have sqlauthz depend on Oso cloud. If and when they come out with a replacement for the existing library version of oso, I may consider using that if it makes sense. The oso library does not depend on Oso cloud and its only npm dependency is on lodash.isequal, so other than a deprecation warning continuing to use the oso library despite its deprecation should be relatively safe.

Motivation

The primary motivation for creating sqlauthz was that although PostgreSQL supports fine-grained permissions including row and column-level security, I've always found it difficult to take advantage of these features in real production systems.

The difficult thing about fully making use of fine-grained permissions is mainly maintaining them as the number of roles and database objects grow, which tends to happen at a pretty rapid clip in many actively developed applications. Using most SQL migration tools, either:

  • You do define your objects declaratively (e.g. many ORMs) and the tool generates your SQL scripts for you, but typically these tools only support operations tables.
  • Your write your SQL scripts yourself, in which case it can be very difficult to understand the current state of your database as the number of scripts grow.

Declarative configuration is an excellent fit for maintaining complex systems as they change over time because the maintainer need only decide the state they want their system to be in, not the steps needed to get there. This is a very popular feature of ORMs, where they inspect models declared in code and generate SQL migrations scripts to update the database to match the state of the declared models. Similarly, infrastructure-as-code tools take a declarative configuration of desired cloud resources and make API calls to update your cloud resources to the desired state.

sqlauthz takes the declarative configuration approach and applies it to PostgreSQL permissions. It's designed so that writing simple rules is simple, but it's also easy to scale the complexity of the rules to be as fine-grained as you want them to be. It takes a zero-access-by-default approach, so that all permissions need to be explicitly granted to a user. I chose the polar language because I've had success with it in other projects as a great, clean way to write authorization rules.

Limitations

sqlauthz is still very early in its development and while it should have enough functionality to be usable for a lot of use-cases, there's a lot of functionality missing as well. More or less all of these are on my radar as improvement to make eventually, however if any of these are particularly important to you feel free to open an issue and let me know. That will help me prioritize what to work on first.

  • Currently only supports permissions on tables, views, schemas, functions, procedures, and sequences (not types, languages, large objects, etc.).

  • sqlauthz never alters default privileges. Let me know via opening an issue if this is something you're interested in. In particular, by default all users have EXECUTE privleges on functions and procedures. To change this, you can use the following one-time query:

ALTER DEFAULT PRIVILEGES
REVOKE ALL PRIVILEGES ON ROUTINES FROM PUBLIC;
  • Does not support setting permissions on built-in functions or procedures (defined as functions in the pg_catalog schema)

  • Support for using SQL functions in row-level security clauses is imperfect. It works for simple cases, but there are some known limitations (See Using SQL functions in row-level security clauses for an explanation of how to use SQL functions in row-level security clauses):

    • You cannot write a clause that compares the results of two function calls e.g. sql.date_trunc("hour", table.row.created_at) == sql.date_trunc("hour", table.row.updated_at). At the moment there is no workaround; this is something that is very difficult to support with the oso Polar engine.
    • When writing a clause that operates on the result of a function call and a literal, you will have to use the sql.lit helper to declare the literal. E.g. rather than sql.date_trunc("hour", table.row.created_at) == "2023-01-01T00:00:00" you would have to write sql.date_trunc("hour", table.row.created_at) == sql.lit("2023-01-01T00:00:00").
      • This includes if you use a SQL function that returns a boolean e.g. rather than if sql.my_func.is_ok(resource.row.id) you should write if sql.my_func.is_ok(resource.row.id) == sql.lit(true)
  • When using SQL functions in row-level security clauses, number and type of arguments are unchecked. This means that if you pass an invalid number or type of arguments to a SQL function, the operation will only fail when the actual SQL to set the permissions is executed. Whether a particular function exists, however, is checked, and will emit an error if a function that doesn't exist is referenced.

  • Currently there is no way to use joins or select from other tables in row-level security queries.

  • At the moment will only grant permissions on objects that exist in the database at the time of applying permissions. For example, if you write a rule that allows access to all objects within a schema, sqlauthz will generate a GRANT query for each one of those objects individual rather than one with FOR ALL TABLES IN SCHEMA <schema>.

Support and Feature Requests

If you encounter a bug with sqlauthz, want to request support for another SQL backend, or would like to see more features added to sqlauthz, please open an issue and I'll try to help you out.