-
Notifications
You must be signed in to change notification settings - Fork 217
PostgreSQL Connection Configurations
CoCalc uses a PostgreSQL database to persist all information except the actual files residing in the projects. If desired, it is possible to set various aspects regarding how CoCalc connects to the PostgreSQL database.
The following environment variables are used to configure this connection:
Variable Name | Description | Default |
---|---|---|
PGHOST |
External database host/port. | /projects/postgres/data/socket |
PGUSER |
PostgreSQL user to connect as. | smc |
SMC_DB |
Database name | smc |
SMC_DB_SSL_CA_FILE |
Server certificate authority file path | |
SMC_DB_SSL_CLIENT_CERT_FILE |
Client certificate file path | |
SMC_DB_SSL_CLIENT_KEY_FILE |
Client certificate key file path | |
SMC_DB_SSL_CLIENT_KEY_PASSPHRASE |
Client certificate key passphrase |
Note: The database password is mounted into the Docker container via the filesystem so that it is not explicitly passed via the command line. Inside the Docker container, this file resides at
/projects/secrets/postgres
. In a Kubernetes environment, this is usually provided by mounting the value of a "Secret".
Since we're using Docker to run both PostgreSQL and CoCalc Docker as separate containers, these two services by default are isolated from one another and cannot communicate. To resolve this, we'll create a Docker networks in order to specify that these two containers are allowed to connect:
~ $ docker network create -d bridge cocalc-network
Note: This step is only required since we are using Docker to run a local PostgreSQL instance. When connecting to an externally-managed database (e.g., Supabase, Amazon RDS, etc.), it is not necessary to create a Docker network.
Note: Generating self-signed SSL certificates is an optional part of this tutorial. Steps which must be followed to use an SSL-encrypted database connection are marked with an asterisk (*).
First, we'll generate some SSL certificates with OpenSSL in order to secure our connection between CoCalc and PostgreSQL. For the sake of completeness, we will generate a server-side root certificate authority (CA) and use it to sign a server certificate for PostgreSQL to present to CoCalc. We'll also generate a client certificate which CoCalc will use to authenticate with our PostgreSQL server in what is commonly known as mutual TLS authentication.
We'll need eight files in total, of which seven will be generated via command-line:
-
ca.key
: The private key for the Certificate Authority. -
ca.crt
: The self-signed certificate which acts as the root certificate authority. -
server.key
: The private key for the server. -
server.csr
: The Certificate Signing Request for the server. -
server.crt
: The signed certificate for the server. -
client.key
: The private key for the client. -
client.csr
: The Certificate Signing Request for the client. -
client.crt
: The signed certificate for the client.
First, we'll create a directory in which to store these files:
~ $ mkdir -p ~/cocalc-extdb/ssl
Now we can generate the above files in order. First, we generate the requisite private key/certificate pair to establish a root certificate authority. You'll be prompted for some information to embed into the certificate authority. Go ahead and enter whatever information feels right. Unless otherwise specified, this tutorial assumes that all default values are used.
~ $ openssl req -nodes -new -x509 -days 3650 -keyout ~/cocalc-extdb/ssl/ca.key -out ~/cocalc-extdb/ssl/ca.crt
Next, we'll create a server certificate/key pair for PostgreSQL to use. This time, we need to create
a certificate signing request (CSR), which our newly-minted certificate authority will sign. You'll
be prompted for some information again; note that the certificate Common Name MUST be set to
postgres
but all other configuration may be set to whatever you wish (or left empty).
~ $ openssl req -nodes -new -keyout ~/cocalc-extdb/ssl/server.key -out ~/cocalc-extdb/ssl/server.csr
...
Common Name (e.g. server FQDN or YOUR name) []:postgres
...
With our CSR in hand, we'll create a configuration file for signing our server certificate with our certificate authority:
~ $ echo "[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
prompt = no
[req_distinguished_name]
CN = postgres
[v3_req]
subjectAltName = @alt_names
[alt_names]
DNS.1 = postgres
DNS.2 = localhost" > ~/cocalc-extdb/ssl/server.cnf
Next, we sign the server certificate (to be valid for five years) with the certificate authority we generated in the first step:
~ $ openssl x509 -req -days 1825 -in ~/cocalc-extdb/ssl/server.csr \
-CA ~/cocalc-extdb/ssl/ca.crt \
-CAkey ~/cocalc-extdb/ssl/ca.key \
-extfile ~/cocalc-extdb/ssl/server.cnf \
-out ~/cocalc-extdb/ssl/server.crt \
-extensions v3_req \
-CAcreateserial
Lastly, we repeat the above steps to generate a client certificate for CoCalc to use as
authentication against the client database. First, we generate the certificate signing request
and key pair. When prompted for the Common Name, enter cocalc
for this certificate:
~ $ openssl req -nodes -new -keyout ~/cocalc-extdb/ssl/client.key -out ~/cocalc-extdb/ssl/client.csr
...
Common Name (e.g. server FQDN or YOUR name) []:cocalc
...
As before, we create a configuration file to specify some necessary configuration when signing the client certificate:
~ $ echo "[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
prompt = no
[req_distinguished_name]
CN = cocalc
[v3_req]
subjectAltName = @alt_names
[alt_names]
DNS.1 = cocalc" > ~/cocalc-extdb/ssl/client.cnf
...and now we can finally sign this client certificate request (again, for five years):
~ $ openssl x509 -req -days 1825 -in ~/cocalc-extdb/ssl/client.csr \
-CA ~/cocalc-extdb/ssl/ca.crt \
-CAkey ~/cocalc-extdb/ssl/ca.key \
-extfile ~/cocalc-extdb/ssl/client.cnf \
-out ~/cocalc-extdb/ssl/client.crt \
-extensions v3_req \
-CAcreateserial
With all the SSL certificates we could possibly desire, we're ready to move on to actually getting everything up and running.
For the sake of completeness, we'll start with a base Ubuntu image and walk through the full PostgreSQL installation and configuration process in order to better understand how each part works.
To begin, we create a long-running Ubuntu Docker container which will serve PostgreSQL on port 5432, and then install PostgreSQL 14 via apt:
~ $ docker run -d --name=postgres --network=cocalc-network ubuntu:22.04 sleep infinity
~ $ docker exec postgres bash -c 'apt update && DEBIAN_FRONTEND=noninteractive apt install -y postgresql-14'
If you created SSL certificates earlier, we'll need to copy those files into our
container; here, we simply copy them in via docker cp
instead of using a
bind mount in order to ease file permissions
management:
~ $ docker cp ~/cocalc-extdb/ssl postgres:/var/lib/postgresql/14/main/
~ $ docker exec postgres bash -c 'chown postgres:postgres /var/lib/postgresql/14/main/ssl -R'
From here, we'll create the necessary databases and credentials we need in order to run CoCalc. That
is, we'll create a cocalc
database and a cocalc
user with cocalc
as the password. If you are
planning to use this container anywhere other than your own computer for personal use, we
highly recommend using at least a randomly-generated password. Run the following command to
configure the PostgreSQL server to listen on all IP addresses:
~ $ docker exec -it postgres bash
root@56103ab68131:/# echo "listen_addresses = '*'" >> /etc/postgresql/14/main/postgresql.conf
Next, run the following command to configure password authentication:
# Without SSL:
root@56103ab68131:/# echo "host all all 0.0.0.0/0 md5" >> /etc/postgresql/14/main/pg_hba.conf
# or, if SSL is to be used:
root@56103ab68131:/# echo "hostssl all all 0.0.0.0/0 cert" >> /etc/postgresql/14/main/pg_hba.conf
root@56103ab68131:/# echo "ssl = on
ssl_ca_file = 'ssl/ca.crt'
ssl_cert_file = 'ssl/server.crt'
ssl_key_file = 'ssl/server.key'" >> /etc/postgresql/14/main/postgresql.conf
root@56103ab68131:/# service postgresql start
root@56103ab68131:/# su - postgres
postgres@56103ab68131:~$ psql
psql (14.10 (Ubuntu 14.10-0ubuntu0.22.04.1))
Type "help" for help.
postgres=# create user cocalc with encrypted password 'cocalc';
CREATE ROLE
postgres=# create database cocalc;
CREATE DATABASE
postgres=# grant all privileges on database cocalc to cocalc;
GRANT
postgres=# exit
postgres@56103ab68131:~$ exit
root@56103ab68131:/# exit
We are now ready to run CoCalc with the database instance we created. We first need to create a password file from which CoCalc will read database credentials. Note: In a Kubernetes environment, this is usually provided by mounting a "Secret".
~ $ mkdir -p ~/cocalc-extdb/secrets
~ $ echo "cocalc" > ~/cocalc-extdb/secrets/postgres
Note: For security reasons, permissions on the host directory
~/cocalc-extdb/secrets/
should be very restrictive (i.e., root only) so that normal users can't read the password.
Note: This step is technically optional if you are only interested in client certificate authentication. Since that use-case is somewhat rare however, we treat this as a required step.
Finally, we run cocalc-docker
itself, attaching it to the Docker network we created earlier and
mounting our secrets file into the running container:
# Without SSL:
~ $ docker run -d --name=cocalc -p 5123:443 --network=cocalc-network \
-e PGHOST=postgres \
-e PGUSER=cocalc \
-e SMC_DB=cocalc \
-v ~/cocalc-extdb:/projects \
sagemathinc/cocalc-docker
# or, if SSL is to be used:
~ $ docker run -d --name=cocalc -p 5123:443 --network=cocalc-network \
-e PGHOST=postgres \
-e PGUSER=cocalc \
-e SMC_DB=cocalc \
-e SMC_DB_SSL_CA_FILE=/projects/ssl/ca.crt \
-e SMC_DB_SSL_CLIENT_CERT_FILE=/projects/ssl/client.crt \
-e SMC_DB_SSL_CLIENT_KEY_FILE=/projects/ssl/client.key \
-v ~/cocalc-extdb:/projects \
sagemathinc/cocalc-docker
To view CoCalc logs, run:
~ $ docker logs cocalc
Once everything is up and running, you should be able to view CoCalc in your browser at https://localhost:5123.
Connect to https://localhost:5123 and make an account. Then get a shell in your database container and confirm that your account is listed in the database!
~ $ docker exec -it postgres bash
root@56103ab68131:/# su - postgres
postgres@56103ab68131:~$ PGHOST=localhost PGUSER=cocalc psql
Password for user cocalc:
psql (14.6 (Ubuntu 14.6-0ubuntu0.22.04.1))
cocalc=> select account_id, email_address from accounts;
account_id | email_address
--------------------------------------+------------------
1111f1fb-0769-45f3-a115-d14a6dc37362 | [email protected]
cocalc=> exit
postgres@56103ab68131:~$ exit
root@56103ab68131:/# exit
Once you're done running CoCalc locally, you can run the following commands to stop the cocalc
and
postgres
containers we created:
~ $ docker stop postgres cocalc
...and to pick up where you left off, simply run:
~ $ docker start postgres cocalc
~ $ docker exec postgres service postgresql start
Run the following commands to remove the Docker containers we created in this tutorial along
with the data stored in the ~/cocalc-extdb
we created:
Warning: These commands will delete all CoCalc data, including accounts, projects, notebooks, etc. Only do this if you want to completely remove CoCalc from your machine. If you're interested in keeping your data around for a long period of time or on a shared server, we recommend learning more about persistent data storage with Docker. Alternatively, if you're interested in a robust, reliable, and scalable CoCalc solution, check out CoCald Cloud to see if it meets your needs.
~ $ docker rm -f postgres cocalc
~ $ docker network rm cocalc-network
~ $ rm -rf ~/cocalc-extdb/
Warning: You may need to prepend
sudo
to the last command, since Docker automatically creates some files there which are owned by the root user.
This Wiki is for CoCalc.com.
A more structured documentation is the CoCalc User Manual.
For further questions, please contact us.