Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion Dockerfile-15
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@ COPY --from=walg /tmp/wal-g /usr/local/bin/

# # Initialise configs
COPY --chown=postgres:postgres ansible/files/postgresql_config/postgresql.conf.j2 /etc/postgresql/postgresql.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba.conf.j2 /etc/postgresql/pg_hba.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba.conf_15.j2 /etc/postgresql/pg_hba.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_ident.conf.j2 /etc/postgresql/pg_ident.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/postgresql-stdout-log.conf /etc/postgresql/logging.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/supautils.conf.j2 /etc/postgresql-custom/supautils.conf
Expand Down
2 changes: 2 additions & 0 deletions Dockerfile-17
Original file line number Diff line number Diff line change
Expand Up @@ -161,6 +161,8 @@ COPY --from=walg /tmp/wal-g /usr/local/bin/
# # Initialise configs
COPY --chown=postgres:postgres ansible/files/postgresql_config/postgresql.conf.j2 /etc/postgresql/postgresql.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba.conf.j2 /etc/postgresql/pg_hba.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba_users_public.conf.j2 /etc/postgresql/pg_hba_users_public.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba_public.conf.j2 /etc/postgresql/pg_hba_public.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_ident.conf.j2 /etc/postgresql/pg_ident.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/postgresql-stdout-log.conf /etc/postgresql/logging.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/supautils.conf.j2 /etc/postgresql-custom/supautils.conf
Expand Down
2 changes: 2 additions & 0 deletions Dockerfile-orioledb-17
Original file line number Diff line number Diff line change
Expand Up @@ -161,6 +161,8 @@ COPY --from=walg /tmp/wal-g /usr/local/bin/
# # Initialise configs
COPY --chown=postgres:postgres ansible/files/postgresql_config/postgresql.conf.j2 /etc/postgresql/postgresql.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba.conf.j2 /etc/postgresql/pg_hba.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba_users_public.conf.j2 /etc/postgresql/pg_hba_users_public.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_hba_public.conf.j2 /etc/postgresql/pg_hba_public.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/pg_ident.conf.j2 /etc/postgresql/pg_ident.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/postgresql-stdout-log.conf /etc/postgresql/logging.conf
COPY --chown=postgres:postgres ansible/files/postgresql_config/supautils.conf.j2 /etc/postgresql-custom/supautils.conf
Expand Down
106 changes: 27 additions & 79 deletions ansible/files/postgresql_config/pg_hba.conf.j2
Original file line number Diff line number Diff line change
@@ -1,94 +1,42 @@
# PostgreSQL Client Authentication Configuration File
# ===================================================
#
# Refer to the "Client Authentication" section in the PostgreSQL
# documentation for a complete description of this file. A short
# synopsis follows.
#
# This file controls: which hosts are allowed to connect, how clients
# are authenticated, which PostgreSQL user names they can use, which
# databases they can access. Records take one of these forms:
#
# local DATABASE USER METHOD [OPTIONS]
# host DATABASE USER ADDRESS METHOD [OPTIONS]
# hostssl DATABASE USER ADDRESS METHOD [OPTIONS]
# hostnossl DATABASE USER ADDRESS METHOD [OPTIONS]
# hostgssenc DATABASE USER ADDRESS METHOD [OPTIONS]
# hostnogssenc DATABASE USER ADDRESS METHOD [OPTIONS]
#
# (The uppercase items must be replaced by actual values.)
#
# The first field is the connection type: "local" is a Unix-domain
# socket, "host" is either a plain or SSL-encrypted TCP/IP socket,
# "hostssl" is an SSL-encrypted TCP/IP socket, and "hostnossl" is a
# non-SSL TCP/IP socket. Similarly, "hostgssenc" uses a
# GSSAPI-encrypted TCP/IP socket, while "hostnogssenc" uses a
# non-GSSAPI socket.
#
# DATABASE can be "all", "sameuser", "samerole", "replication", a
# database name, or a comma-separated list thereof. The "all"
# keyword does not match "replication". Access to replication
# must be enabled in a separate record (see example below).
#
# USER can be "all", a user name, a group name prefixed with "+", or a
# comma-separated list thereof. In both the DATABASE and USER fields
# you can also write a file name prefixed with "@" to include names
# from a separate file.
#
# ADDRESS specifies the set of hosts the record matches. It can be a
# host name, or it is made up of an IP address and a CIDR mask that is
# an integer (between 0 and 32 (IPv4) or 128 (IPv6) inclusive) that
# specifies the number of significant bits in the mask. A host name
# that starts with a dot (.) matches a suffix of the actual host name.
# Alternatively, you can write an IP address and netmask in separate
# columns to specify the set of hosts. Instead of a CIDR-address, you
# can write "samehost" to match any of the server's own IP addresses,
# or "samenet" to match any address in any subnet that the server is
# directly connected to.
#
# METHOD can be "trust", "reject", "md5", "password", "scram-sha-256",
# "gss", "sspi", "ident", "peer", "pam", "ldap", "radius" or "cert".
# Note that "password" sends passwords in clear text; "md5" or
# "scram-sha-256" are preferred since they send encrypted passwords.
#
# OPTIONS are a set of options for the authentication in the format
# NAME=VALUE. The available options depend on the different
# authentication methods -- refer to the "Client Authentication"
# section in the documentation for a list of which options are
# available for which authentication methods.
#
# Database and user names containing spaces, commas, quotes and other
# special characters must be quoted. Quoting one of the keywords
# "all", "sameuser", "samerole" or "replication" makes the name lose
# its special character, and just match a database or username with
# that name.
#
# This file is read on server startup and when the server receives a
# SIGHUP signal. If you edit the file on a running system, you have to
# SIGHUP the server for the changes to take effect, run "pg_ctl reload",
# or execute "SELECT pg_reload_conf()".
#
# Put your actual configuration here
# ----------------------------------
#
# If you want to allow non-local connections, you need to add more
# "host" records. In that case you will also need to make PostgreSQL
# listen on a non-local interface via the listen_addresses
# configuration parameter, or via the -i or -h command line switches.
# This file uses the include directive to selectively
# enable features. When present, the included files will
# take effect and order of precedence determines which auth
# rules are applied.

# TYPE DATABASE USER ADDRESS METHOD

# trust local connections
local all supabase_admin scram-sha-256
local all all peer map=supabase_map

# route for just-in-time access
include_if_exists pg_hba_pam_local.conf

# trust localhost connections
host all all 127.0.0.1/32 trust
host all all ::1/128 trust

# IPv4 external connections
# local network does not use just-in-time
host all all 10.0.0.0/8 scram-sha-256
host all all 172.16.0.0/12 scram-sha-256
host all all 172.16.0.0/12 scram-sha-256
host all all 192.168.0.0/16 scram-sha-256
host all all 0.0.0.0/0 scram-sha-256

# IPv6 external connections
host all all ::0/0 scram-sha-256
# if ssl is enforced, these files will exist and take precedence
include_if_exists pg_hba_users_public_ssl.conf
include_if_exists pg_hba_pam_public_ssl.conf
include_if_exists pg_hba_public_ssl.conf

# otherwise, non ssl enforced rules will apply
include_if_exists pg_hba_users_public.conf
include_if_exists pg_hba_pam_public.conf
include_if_exists pg_hba_public.conf

# replication specific routes
host replication supabase_replication_admin 0.0.0.0/0 scram-sha-256
host replication supabase_replication_admin ::0/0 scram-sha-256

# ultimately fallback to the original if none of the above exist
include_if_exists pg_hba.conf.orig
95 changes: 95 additions & 0 deletions ansible/files/postgresql_config/pg_hba.conf_15.j2
Original file line number Diff line number Diff line change
@@ -0,0 +1,95 @@
# PostgreSQL Client Authentication Configuration File
# ===================================================
#
# Refer to the "Client Authentication" section in the PostgreSQL
# documentation for a complete description of this file. A short
# synopsis follows.
#
# This file controls: which hosts are allowed to connect, how clients
# are authenticated, which PostgreSQL user names they can use, which
# databases they can access. Records take one of these forms:
#
# local DATABASE USER METHOD [OPTIONS]
# host DATABASE USER ADDRESS METHOD [OPTIONS]
# hostssl DATABASE USER ADDRESS METHOD [OPTIONS]
# hostnossl DATABASE USER ADDRESS METHOD [OPTIONS]
# hostgssenc DATABASE USER ADDRESS METHOD [OPTIONS]
# hostnogssenc DATABASE USER ADDRESS METHOD [OPTIONS]
#
# (The uppercase items must be replaced by actual values.)
#
# The first field is the connection type: "local" is a Unix-domain
# socket, "host" is either a plain or SSL-encrypted TCP/IP socket,
# "hostssl" is an SSL-encrypted TCP/IP socket, and "hostnossl" is a
# non-SSL TCP/IP socket. Similarly, "hostgssenc" uses a
# GSSAPI-encrypted TCP/IP socket, while "hostnogssenc" uses a
# non-GSSAPI socket.
#
# DATABASE can be "all", "sameuser", "samerole", "replication", a
# database name, or a comma-separated list thereof. The "all"
# keyword does not match "replication". Access to replication
# must be enabled in a separate record (see example below).
#
# USER can be "all", a user name, a group name prefixed with "+", or a
# comma-separated list thereof. In both the DATABASE and USER fields
# you can also write a file name prefixed with "@" to include names
# from a separate file.
#
# ADDRESS specifies the set of hosts the record matches. It can be a
# host name, or it is made up of an IP address and a CIDR mask that is
# an integer (between 0 and 32 (IPv4) or 128 (IPv6) inclusive) that
# specifies the number of significant bits in the mask. A host name
# that starts with a dot (.) matches a suffix of the actual host name.
# Alternatively, you can write an IP address and netmask in separate
# columns to specify the set of hosts. Instead of a CIDR-address, you
# can write "samehost" to match any of the server's own IP addresses,
# or "samenet" to match any address in any subnet that the server is
# directly connected to.
#
# METHOD can be "trust", "reject", "md5", "password", "scram-sha-256",
# "gss", "sspi", "ident", "peer", "pam", "ldap", "radius" or "cert".
# Note that "password" sends passwords in clear text; "md5" or
# "scram-sha-256" are preferred since they send encrypted passwords.
#
# OPTIONS are a set of options for the authentication in the format
# NAME=VALUE. The available options depend on the different
# authentication methods -- refer to the "Client Authentication"
# section in the documentation for a list of which options are
# available for which authentication methods.
#
# Database and user names containing spaces, commas, quotes and other
# special characters must be quoted. Quoting one of the keywords
# "all", "sameuser", "samerole" or "replication" makes the name lose
# its special character, and just match a database or username with
# that name.
#
# This file is read on server startup and when the server receives a
# SIGHUP signal. If you edit the file on a running system, you have to
# SIGHUP the server for the changes to take effect, run "pg_ctl reload",
# or execute "SELECT pg_reload_conf()".
#
# Put your actual configuration here
# ----------------------------------
#
# If you want to allow non-local connections, you need to add more
# "host" records. In that case you will also need to make PostgreSQL
# listen on a non-local interface via the listen_addresses
# configuration parameter, or via the -i or -h command line switches.

# TYPE DATABASE USER ADDRESS METHOD

# trust local connections
local all supabase_admin scram-sha-256
local all all peer map=supabase_map
host all all 127.0.0.1/32 trust
host all all ::1/128 trust

# IPv4 external connections
host all all 10.0.0.0/8 scram-sha-256
host all all 172.16.0.0/12 scram-sha-256
host all all 192.168.0.0/16 scram-sha-256
host all all 0.0.0.0/0 scram-sha-256

# IPv6 external connections
host all all ::0/0 scram-sha-256

2 changes: 2 additions & 0 deletions ansible/files/postgresql_config/pg_hba_public.conf.j2
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
host all all 0.0.0.0/0 scram-sha-256
host all all ::0/0 scram-sha-256
11 changes: 11 additions & 0 deletions ansible/files/postgresql_config/pg_hba_users_public.conf.j2
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
host all pgbouncer 0.0.0.0/0 scram-sha-256
host all supabase_admin 0.0.0.0/0 scram-sha-256
host all supabase_auth_admin 0.0.0.0/0 scram-sha-256
host all supabase_storage_admin 0.0.0.0/0 scram-sha-256
host all supabase_replication_admin 0.0.0.0/0 scram-sha-256

host all pgbouncer ::0/0 scram-sha-256
host all supabase_admin ::0/0 scram-sha-256
host all supabase_auth_admin ::0/0 scram-sha-256
host all supabase_storage_admin ::0/0 scram-sha-256
host all supabase_replication_admin ::0/0 scram-sha-256
2 changes: 2 additions & 0 deletions ansible/tasks/setup-pgbouncer.yml
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,8 @@
- name: Grant pg_hba and pgbouncer grp perm for adminapi updates
shell: |
chmod g+w /etc/postgresql/pg_hba.conf
chmod g+w /etc/postgresql/pg_hba_users_public.conf
chmod g+w /etc/postgresql/pg_hba_public.conf
chmod g+w /etc/pgbouncer-custom/ssl-config.ini

# Add fail2ban filter
Expand Down
29 changes: 26 additions & 3 deletions ansible/tasks/setup-postgres.yml
Original file line number Diff line number Diff line change
Expand Up @@ -140,12 +140,35 @@
when: debpkg_mode or nixpkg_mode

# Add pg_hba.conf
- name: import pg_hba.conf
- name: import pg_hba.conf psql_15
template:
src: files/postgresql_config/pg_hba.conf.j2
src: files/postgresql_config/pg_hba.conf_15.j2
dest: /etc/postgresql/pg_hba.conf
group: postgres
when: debpkg_mode or nixpkg_mode
when: (debpkg_mode or nixpkg_mode) and (postgresql_major | int == 15)

- name: create pg_hba.conf with includes
when: (debpkg_mode or nixpkg_mode) and (postgresql_major | int != 15)
block:
- name: import pg_hba.conf
template:
src: files/postgresql_config/pg_hba.conf.j2
dest: /etc/postgresql/pg_hba.conf
group: postgres

# Add pg_hba_public.conf
- name: import pg_hba_public.conf
template:
src: files/postgresql_config/pg_hba_public.conf.j2
dest: /etc/postgresql/pg_hba_public.conf
group: postgres

# Add pg_hba_users_public.conf
- name: import pg_hba_users_public.conf
template:
src: files/postgresql_config/pg_hba_users_public.conf.j2
dest: /etc/postgresql/pg_hba_users_public.conf
group: postgres

# Add pg_ident.conf
- name: import pg_ident.conf
Expand Down
8 changes: 4 additions & 4 deletions ansible/vars.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ postgres_major:

# Full version strings for each major version
postgres_release:
postgresorioledb-17: "17.5.1.018-orioledb"
postgres17: "17.4.1.075"
postgres15: "15.8.1.132"
postgresorioledb-17: "17.5.1.018-orioledb-pghba"
postgres17: "17.4.1.075-pghba"
postgres15: "15.8.1.132-pghba"

# Non Postgres Extensions
pgbouncer_release: "1.19.0"
Expand Down Expand Up @@ -52,7 +52,7 @@ postgres_exporter_release_checksum:
arm64: sha256:29ba62d538b92d39952afe12ee2e1f4401250d678ff4b354ff2752f4321c87a0
amd64: sha256:cb89fc5bf4485fb554e0d640d9684fae143a4b2d5fa443009bd29c59f9129e84

adminapi_release: 0.84.1
adminapi_release: 0.88.0
adminmgr_release: 0.25.1
supabase_admin_agent_release: 1.4.38
supabase_admin_agent_splay: 30
Expand Down
1 change: 1 addition & 0 deletions nix/checks.nix
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,7 @@
PGSODIUM_GETKEY = "${getkey-script}/bin/pgsodium-getkey";
PGSQL_DEFAULT_PORT = pgPort;
};
version = majorVersion;
};

getVersionArg =
Expand Down
1 change: 1 addition & 0 deletions nix/packages/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@
start-server = pkgs-lib.makePostgresDevSetup {
inherit pkgs;
name = "start-postgres-server";
version = activeVersion;
};
sync-exts-versions = pkgs.callPackage ./sync-exts-versions.nix { inherit (inputs') nix-editor; };
trigger-nix-build = pkgs.callPackage ./trigger-nix-build.nix { };
Expand Down
Loading
Loading