mirror of
https://git.asonix.dog/asonix/pict-rs
synced 2024-12-22 03:11:24 +00:00
Add postgres.md in docs/
This commit is contained in:
parent
a4f1a1e843
commit
378bde933e
1 changed files with 188 additions and 0 deletions
188
docs/postgres.md
Normal file
188
docs/postgres.md
Normal file
|
@ -0,0 +1,188 @@
|
||||||
|
# How to prepare postgres for pict-rs
|
||||||
|
|
||||||
|
## Preparing postgres
|
||||||
|
|
||||||
|
### I already have a postgres
|
||||||
|
|
||||||
|
If you already have a postgres server, we'll create an additional database in it for pict-rs. First,
|
||||||
|
you'll need to connect to your postgres server as an administrator. The general command should look
|
||||||
|
like the following.
|
||||||
|
```bash
|
||||||
|
psql -U postgres
|
||||||
|
```
|
||||||
|
> `postgres` here is the name of the administrator role. If your administrator role is named
|
||||||
|
something else (maybe `lemmy`) then use that instead.
|
||||||
|
|
||||||
|
If postgres is running in a docker-compose environment, it might look like this.
|
||||||
|
```bash
|
||||||
|
sudo docker-compose exec postgres psql -U postgres
|
||||||
|
```
|
||||||
|
> note that the first `postgres` in this command is the docker-compose service, and the second
|
||||||
|
`postgres` is the name of the database administrator role
|
||||||
|
|
||||||
|
Once you have a postgres shell, we'll configure the postgres user and database.
|
||||||
|
|
||||||
|
First, create the pictrs user.
|
||||||
|
```sql
|
||||||
|
CREATE USER pictrs;
|
||||||
|
```
|
||||||
|
|
||||||
|
Then set the pictrs user's password
|
||||||
|
```sql
|
||||||
|
\password pictrs -- allows setting the password for the postgres user
|
||||||
|
```
|
||||||
|
|
||||||
|
Finally, create the pictrs database giving ownership to the pictrs user.
|
||||||
|
```sql
|
||||||
|
CREATE DATABASE pictrs OWNER pictrs;
|
||||||
|
```
|
||||||
|
|
||||||
|
The database configuration is now complete.
|
||||||
|
|
||||||
|
### I don't have a postgres
|
||||||
|
|
||||||
|
Postgres can be installed in a variety of ways, but a simple way to do it is with docker-compose,
|
||||||
|
although installing docker and docker-compose is left as an exercise to the reader. An example
|
||||||
|
docker-compose file can be found below.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
version: '3.3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
postgres:
|
||||||
|
image: postgres:16-alpine
|
||||||
|
ports:
|
||||||
|
- "5432:5432"
|
||||||
|
environment:
|
||||||
|
- PG_DATA=/var/lib/postgresql/data
|
||||||
|
- POSTGRES_DB=pictrs
|
||||||
|
- POSTGRES_USER=pictrs
|
||||||
|
- POSTGRES_PASSWORD=CREATE_YOUR_OWN_PASSWORD
|
||||||
|
volumes:
|
||||||
|
- ./storage/postgres:/var/lib/postgresql/data
|
||||||
|
```
|
||||||
|
|
||||||
|
After the file is written, a quick `sudo docker-compose up -d` should launch the postgres server,
|
||||||
|
making it available on `localhost:5432`.
|
||||||
|
|
||||||
|
## Connecting to postgres
|
||||||
|
|
||||||
|
pict-rs can be configured to talk to your postgres server a few different ways.
|
||||||
|
1. environment variables
|
||||||
|
2. the `pict-rs.toml` file
|
||||||
|
3. commandline arguments
|
||||||
|
|
||||||
|
In many cases, environment variables will be the easiest.
|
||||||
|
|
||||||
|
### Environment Variables
|
||||||
|
|
||||||
|
The variables you'll need to set are the following
|
||||||
|
- `PICTRS__REPO__TYPE`
|
||||||
|
- `PICTRS__REPO__URL`
|
||||||
|
|
||||||
|
with a few optional variables for folks who have TLS involved
|
||||||
|
- `PICTRS__REPO__USE_TLS`
|
||||||
|
- `PICTRS__REPO__CERTIFICATE_FILE`
|
||||||
|
|
||||||
|
For a simple self-hosted postgres deployment, the following variables should be set:
|
||||||
|
```bash
|
||||||
|
PICTRS__REPO__TYPE=postgres
|
||||||
|
PICTRS__REPO__URL=postgres://pictrs:CREATE_YOUR_OWN_PASSWORD@localhost:5432/pictrs
|
||||||
|
```
|
||||||
|
|
||||||
|
If you're running pict-rs in the same docker-compose file as you are postgres, then change
|
||||||
|
`localhost` in the above URL to the name of your postgres service, e.g.
|
||||||
|
```yaml
|
||||||
|
- PICTRS__REPO__TYPE=postgres
|
||||||
|
- PICTRS__REPO__URL=postgres://pictrs:CREATE_YOUR_OWN_PASSWORD@postgres:5432/pictrs
|
||||||
|
```
|
||||||
|
|
||||||
|
If your postgres is provided by another party, or exists on a different host, then provide the
|
||||||
|
correct hostname or IP address to reach it.
|
||||||
|
|
||||||
|
If your postgres supports TLS connections, as might be present in cloud environments, then the
|
||||||
|
following variables should be set.
|
||||||
|
```bash
|
||||||
|
PICTRS__REPO__USE_TLS=true
|
||||||
|
PICTRS__REPO__CERTIFICATE_FILE=/path/to/certificate/file.crt
|
||||||
|
```
|
||||||
|
> Note that if you provide a path to the certificate file, pict-rs must be able to read that path.
|
||||||
|
This means that if you're running pict-rs in docker, the certificate file needs to be mounted into
|
||||||
|
the container.
|
||||||
|
|
||||||
|
### pict-rs.toml
|
||||||
|
|
||||||
|
The toml configuration can be set pretty easily. The `repo` section should look like the following
|
||||||
|
```toml
|
||||||
|
[repo]
|
||||||
|
type = 'postgres'
|
||||||
|
url = 'postgres://pictrs:CREATE_YOUR_OWN_PASSWORD@postgres:5432/pictrs'
|
||||||
|
```
|
||||||
|
note that the hostname `postgres` should be changed to the host that your postgres server is
|
||||||
|
accessible at.
|
||||||
|
|
||||||
|
For enabling TLS, the configuration would look like the following:
|
||||||
|
```toml
|
||||||
|
[repo]
|
||||||
|
type = 'postgres'
|
||||||
|
url = 'postgres://pictrs:CREATE_YOUR_OWN_PASSWORD@postgres:5432/pictrs'
|
||||||
|
use_tls = true
|
||||||
|
certificate_file = '/path/to/certificate/file.crt'
|
||||||
|
```
|
||||||
|
|
||||||
|
### Commandline arguments
|
||||||
|
|
||||||
|
pict-rs can be configured entirely from the commandline. An example invocation could look like the
|
||||||
|
following:
|
||||||
|
```bash
|
||||||
|
pict-rs run \
|
||||||
|
filesytem -p /path/to/files \
|
||||||
|
postgres -u 'postgres://pictrs:CREATE_YOUR_OWN_PASSWORD@postgres:5432/pictrs'
|
||||||
|
```
|
||||||
|
|
||||||
|
with TLS it could look like this:
|
||||||
|
```bash
|
||||||
|
pict-rs run \
|
||||||
|
filesytem -p /path/to/files \
|
||||||
|
postgres \
|
||||||
|
-u 'postgres://pictrs:CREATE_YOUR_OWN_PASSWORD@postgres:5432/pictrs' \
|
||||||
|
-t \
|
||||||
|
-c /path/to/certificate/file.crt
|
||||||
|
```
|
||||||
|
|
||||||
|
## Additional comments
|
||||||
|
|
||||||
|
When configuring TLS, the `certificate_file` setting isn't required, however, it is likely it will
|
||||||
|
be used when TLS is enabled. A case when it might not be required is if your postgres publicly
|
||||||
|
accessible on the internet and receives a valid certificate from a trusted certificate authority.
|
||||||
|
|
||||||
|
For testing TLS, I've been using `certstrap` to generate a CA and certificates. I have a script
|
||||||
|
called `setup-tls.sh` that looks like this:
|
||||||
|
```bash
|
||||||
|
certstrap init --common-name pictrsCA
|
||||||
|
certstrap request-cert --common-name postgres --domain localhost
|
||||||
|
certstrap sign postgres --CA pictrsCA
|
||||||
|
```
|
||||||
|
|
||||||
|
This genrates a CA and uses that CA to sign a new certificate for `localhost`. Then I update
|
||||||
|
postgres' pg_hba.conf file to allow connections over TLS:
|
||||||
|
```pg_hba.conf
|
||||||
|
hostssl all all all cert clientcert=verify-full
|
||||||
|
```
|
||||||
|
|
||||||
|
Finally, I launch postgres with a custom commandline.
|
||||||
|
```
|
||||||
|
-c "ssl=on" \
|
||||||
|
-c "ssl_cert_file=/path/to/postgres.crt" \
|
||||||
|
-c "ssl_key_file=/path/to/postgres.key" \
|
||||||
|
-c "ssl_ca_file=/path/to/pictrsCA.crt" \
|
||||||
|
-c "ssl_crl_file=/path/to/pictrsCA.crl"
|
||||||
|
```
|
||||||
|
Alternatively, I could update the postgresql.conf file.
|
||||||
|
```postgresql.conf
|
||||||
|
ssl=on
|
||||||
|
ssl_cert_file=/path/to/postgres.crt
|
||||||
|
ssl_key_file=/path/to/postgres.key
|
||||||
|
ssl_ca_file=/path/to/pictrsCA.crt
|
||||||
|
ssl_crl_file=/path/to/pictrsCA.crl
|
||||||
|
```
|
Loading…
Reference in a new issue