0
0
Fork 0
mirror of https://codeberg.org/forgejo/docs.git synced 2024-11-28 18:42:51 -05:00
forgejo-docs/docs/admin/database-preparation.md

320 lines
13 KiB
Markdown
Raw Normal View History

2023-03-08 08:37:08 -05:00
---
title: 'Database Preparation'
license: 'Apache-2.0'
origin_url: 'https://github.com/go-gitea/gitea/blob/e865de1e9d65dc09797d165a51c8e705d2a86030/docs/content/installation/database-preparation.en-us.md'
2023-03-08 08:37:08 -05:00
---
You need a database to use Forgejo. The easiest option is SQLite which managed files next to Forgejo and does not require setting up a database server. However, if you plan to use Forgejo with several hundreds of users, or if you already run a databse server, you might want to choose another option.
Forgejo supports:
- MariaDB (>=10.0)
- MySQL (>=8.0)
- PostgreSQL (>=12)
- SQLite3
This page will guide into preparing the database. Also take a look at the [database section of the config cheat sheet](https://forgejo.org/docs/latest/admin/config-cheat-sheet/#database-database) for a detailed list of options in Forgejo.
2023-03-08 08:37:08 -05:00
Database instance can be on same machine as Forgejo (local database setup), or on different machine (remote database).
2023-03-08 08:37:08 -05:00
## SQLite
Forgejo distributes binaries that come with SQLite support and you don't need to install additional dependencies on your system.
> **Note:** If you build Forgejo from source, build with `make TAGS="sqlite sqlite_unlock_notify" build` to include SQLite support.
Choosing SQLite only requires setting the database type and optionally the path to a database file:
```
[database]
DB_TYPE = sqlite3
# optional if you want to specify another location
# by default, the database file will be stored relative to other data
PATH = data/forgejo.db
```
If you want to maximize performance, you might want to take a look at the `[database].SQLITE_JOURNAL_MODE` setting and consider using the [WAL mode](https://www.sqlite.org/wal.html).
2023-03-08 08:37:08 -05:00
## MySQL/MariaDB
2023-03-08 08:37:08 -05:00
1. Install the MariaDB or MySQL server component on the system you would like to store the database on.
2023-03-08 08:37:08 -05:00
2. Protect the `root` user with a secure password or disable the login.
2023-03-08 08:37:08 -05:00
3. On the database instance, login to database console as root:
2023-03-08 08:37:08 -05:00
```
mysql -u root -p
```
2023-03-08 08:37:08 -05:00
Enter the password as prompted.
2023-03-08 08:37:08 -05:00
4. Create a new database user which will be used by Forgejo, authenticated by password. This example uses `'passw0rd'` as password. **Please use a secure password for your instance.**
2023-03-08 08:37:08 -05:00
For a local database:
2023-03-08 08:37:08 -05:00
```sql
SET old_passwords=0;
CREATE USER 'forgejo'@'%' IDENTIFIED BY 'passw0rd';
```
2023-03-08 08:37:08 -05:00
If your database is hosted on another system than Forgejo (includes some containerized deployments):
2023-03-08 08:37:08 -05:00
```sql
SET old_passwords=0;
CREATE USER 'forgejo'@'192.0.2.10' IDENTIFIED BY 'passw0rd';
```
2023-03-08 08:37:08 -05:00
where `192.0.2.10` is the IP address of your Forgejo instance.
2023-03-08 08:37:08 -05:00
Replace username and password above as appropriate.
2023-03-08 08:37:08 -05:00
5. Create database with UTF-8 charset and case-sensitive collation.
`utf8mb4_bin` is a common collation for both MySQL/MariaDB.
When Forgejo starts, it will try to find a better collation (`utf8mb4_0900_as_cs` or `uca1400_as_cs`) and alter the database if it is possible.
If you would like to use another collation, you can set `[database].CHARSET_COLLATION` in the `app.ini` file.
2023-03-08 08:37:08 -05:00
```sql
CREATE DATABASE forgejodb CHARACTER SET 'utf8mb4' COLLATE 'utf8mb4_bin';
```
2023-03-08 08:37:08 -05:00
Replace database name as appropriate.
2023-03-08 08:37:08 -05:00
**Using an accent- and case sensitive collation such as `utf8mb4_bin` is important**, because Forgejo often relies on these sensitivities, and if those assumptions are broken, that may lead to internal server errors or other unexpected results.
6. Grant all privileges on the database to the database user created above.
2023-03-08 08:37:08 -05:00
For local database:
2023-03-08 08:37:08 -05:00
```sql
GRANT ALL PRIVILEGES ON forgejodb.* TO 'forgejo';
FLUSH PRIVILEGES;
```
2023-03-08 08:37:08 -05:00
For remote database:
2023-03-08 08:37:08 -05:00
```sql
GRANT ALL PRIVILEGES ON forgejodb.* TO 'forgejo'@'192.0.2.10';
FLUSH PRIVILEGES;
```
2023-03-08 08:37:08 -05:00
7. Quit from database console by typing `exit`.
2023-03-08 08:37:08 -05:00
8. Optional: On your Forgejo server, test connection to the database (requires that you have a client library installed. The client is not necessary for Forgejo itself):
2023-03-08 08:37:08 -05:00
```
mysql -u forgejo -h 203.0.113.3 -p forgejodb
```
2023-03-08 08:37:08 -05:00
where `forgejo` is database username, `forgejodb` is database name, and `203.0.113.3` is IP address of database instance. Omit `-h` option for local database.
2023-03-08 08:37:08 -05:00
You should be connected to the database.
2023-03-08 08:37:08 -05:00
## PostgreSQL
1. Install the PostgreSQL server component on the system you would like to store the database on.
2023-03-08 08:37:08 -05:00
2. Protect the `root` user with a secure password or disable the login.
2023-03-08 08:37:08 -05:00
3. If you use a PostgreSQL version lower than 14, the `md5` challenge-response encryption scheme for password authentication is used by default. Nowadays this scheme is not considered secure anymore. Use SCRAM-SHA-256 scheme instead by editing the `postgresql.conf` configuration file on the database server to:
2023-03-08 08:37:08 -05:00
```ini
password_encryption = scram-sha-256
```
2023-03-08 08:37:08 -05:00
Restart PostgreSQL to apply the setting.
2023-03-08 08:37:08 -05:00
4. On the database server, login to the database console as superuser:
2023-03-08 08:37:08 -05:00
```
su -c "psql" - postgres
```
2023-03-08 08:37:08 -05:00
5. Create database user (role in PostgreSQL terms) with login privilege and password. _Please use a secure, strong password instead of `'passw0rd'` below:_
2023-03-08 08:37:08 -05:00
```sql
CREATE ROLE forgejo WITH LOGIN PASSWORD 'passw0rd';
```
2023-03-08 08:37:08 -05:00
Replace username and password as appropriate.
2023-03-08 08:37:08 -05:00
6. Create database with UTF-8 charset and owned by the database user created earlier. Any `libc` collations can be specified with `LC_COLLATE` and `LC_CTYPE` parameter, depending on expected content:
2023-03-08 08:37:08 -05:00
```sql
CREATE DATABASE forgejodb WITH OWNER forgejo TEMPLATE template0 ENCODING UTF8 LC_COLLATE 'en_US.UTF-8' LC_CTYPE 'en_US.UTF-8';
```
2023-03-08 08:37:08 -05:00
Replace database name as appropriate.
2023-03-08 08:37:08 -05:00
7. Allow the database user to access the database created above by adding the following authentication rules to `pg_hba.conf`.
2023-03-08 08:37:08 -05:00
For local database:
2023-03-08 08:37:08 -05:00
```ini
local forgejodb forgejo scram-sha-256
2023-07-26 11:27:09 -04:00
host forgejodb forgejo 127.0.0.1/32 scram-sha-256 # IPv4 local connections
host forgejodb forgejo ::1/128 scram-sha-256 # IPv6 local connections
```
2023-03-08 08:37:08 -05:00
For remote database:
2023-03-08 08:37:08 -05:00
```ini
host forgejodb forgejo 192.0.2.10/32 scram-sha-256
```
2023-03-08 08:37:08 -05:00
Replace database name, user, and IP address of Forgejo instance with your own.
2023-03-08 08:37:08 -05:00
Note: rules on `pg_hba.conf` are evaluated sequentially, that is the first matching rule will be used for authentication. Your PostgreSQL installation may come with generic authentication rules that match all users and databases. You may need to place the rules presented here above such generic rules if it is the case.
2023-03-08 08:37:08 -05:00
Restart PostgreSQL to apply new authentication rules.
2023-03-08 08:37:08 -05:00
8. Optional: Test connection to the database from the Forgejo container.
2023-03-08 08:37:08 -05:00
For local database:
2023-03-08 08:37:08 -05:00
```
psql -U forgejo -d forgejodb -h localhost
```
2023-03-08 08:37:08 -05:00
For remote database:
2023-03-08 08:37:08 -05:00
```
psql "postgres://forgejo@203.0.113.3/forgejodb"
```
2023-03-08 08:37:08 -05:00
where `forgejo` is database user, `forgejodb` is database name, and `203.0.113.3` is IP address of your database instance.
2023-03-08 08:37:08 -05:00
You should be prompted to enter password for the database user, and connected to the database.
2023-03-08 08:37:08 -05:00
## Database Connection over TLS
If the communication between Forgejo and your database instance is performed through a private network, or if Forgejo and the database are running on the same server, this section can be omitted since the security between Forgejo and the database instance is not critically exposed. If instead the database instance is on a public network, use TLS to encrypt the connection to the database, as it is possible for third-parties to intercept the traffic data.
2023-03-08 08:37:08 -05:00
### Prerequisites
- You need two valid TLS certificates, one for the database instance (database server) and one for the Forgejo instance (database client). Both certificates must be signed by a trusted CA.
2023-03-08 08:37:08 -05:00
- The database certificate must contain `TLS Web Server Authentication` in the `X509v3 Extended Key Usage` extension attribute, while the client certificate needs `TLS Web Client Authentication` in the corresponding attribute.
- On the database server certificate, one of `Subject Alternative Name` or `Common Name` entries must be the fully-qualified domain name (FQDN) of the database instance (e.g. `db.example.com`). On the database client certificate, one of the entries mentioned above must contain the database username that Forgejo will be using to connect.
- You need domain name mappings of both Forgejo and database servers to their respective IP addresses. Either set up DNS records for them or add local mappings to `/etc/hosts` (`%WINDIR%\System32\drivers\etc\hosts` in Windows) on each system. This allows the database connections to be performed by domain name instead of IP address. See documentation of your system for details.
2023-03-08 08:37:08 -05:00
### PostgreSQL
The PostgreSQL driver used by Forgejo supports two-way TLS. In two-way TLS, both database client and server authenticate each other by sending their respective certificates to their respective opposite for validation. In other words, the server verifies client certificate, and the client verifies server certificate.
2023-03-08 08:37:08 -05:00
1. On the server with the database instance, place the following credentials:
- `/path/to/postgresql.crt`: Database instance certificate
- `/path/to/postgresql.key`: Database instance private key
- `/path/to/root.crt`: CA certificate chain to validate client certificates
2023-03-08 08:37:08 -05:00
2. Add following options to `postgresql.conf`:
```ini
ssl = on
ssl_ca_file = '/path/to/root.crt'
ssl_cert_file = '/path/to/postgresql.crt'
ssl_key_file = '/path/to/postgresql.key'
ssl_min_protocol_version = 'TLSv1.2'
```
2023-03-08 08:37:08 -05:00
3. Adjust credentials ownership and permission, as required by PostgreSQL:
```
chown postgres:postgres /path/to/root.crt /path/to/postgresql.crt /path/to/postgresql.key
chmod 0600 /path/to/root.crt /path/to/postgresql.crt /path/to/postgresql.key
```
2023-03-08 08:37:08 -05:00
4. Edit `pg_hba.conf` rule to only allow Forgejo database user to connect over SSL, and to require client certificate verification.
2023-03-08 08:37:08 -05:00
For PostgreSQL 12:
2023-03-08 08:37:08 -05:00
```ini
hostssl forgejodb forgejo 192.0.2.10/32 scram-sha-256 clientcert=verify-full
```
2023-03-08 08:37:08 -05:00
For PostgreSQL 11 and earlier:
2023-03-08 08:37:08 -05:00
```ini
hostssl forgejodb forgejo 192.0.2.10/32 scram-sha-256 clientcert=1
```
2023-03-08 08:37:08 -05:00
Replace database name, user, and IP address of Forgejo instance as appropriate.
2023-03-08 08:37:08 -05:00
5. Restart PostgreSQL to apply configurations above.
6. On the server running the Forgejo instance, place the following credentials under the home directory of the user who runs Forgejo (e.g. `git`):
2023-03-08 08:37:08 -05:00
- `~/.postgresql/postgresql.crt`: Database client certificate
- `~/.postgresql/postgresql.key`: Database client private key
- `~/.postgresql/root.crt`: CA certificate chain to validate server certificate
2023-03-08 08:37:08 -05:00
Note: Those file names above are hardcoded in PostgreSQL and it is not possible to change them.
2023-03-08 08:37:08 -05:00
7. Adjust credentials, ownership and permission as required:
```
chown git:git ~/.postgresql/postgresql.crt ~/.postgresql/postgresql.key ~/.postgresql/root.crt
chown 0600 ~/.postgresql/postgresql.crt ~/.postgresql/postgresql.key ~/.postgresql/root.crt
```
2023-03-08 08:37:08 -05:00
8. Test the connection to the database:
```
psql "postgres://forgejo@example.db/forgejodb?sslmode=verify-full"
```
2023-03-08 08:37:08 -05:00
You should be prompted to enter password for the database user, and then be connected to the database.
2023-03-08 08:37:08 -05:00
### MySQL/MariaDB
2023-03-08 08:37:08 -05:00
While the MySQL/MariaDB driver used by Forgejo also supports two-way TLS, Forgejo currently supports only one-way TLS. See the "Add TLS File Path Options for MySQL/MariaDB Database Connection](https://github.com/go-gitea/gitea/issues/10828)" issue for details.
2023-03-08 08:37:08 -05:00
In one-way TLS, the database client verifies the certificate sent from server during the connection handshake, and the server assumes that the connected client is legitimate, since client certificate verification doesn't take place.
1. On the database instance, place the following credentials:
- `/path/to/mysql.crt`: Database instance certificate
- `/path/to/mysql.key`: Database instance key
- `/path/to/ca.crt`: CA certificate chain. This file isn't used on one-way TLS, but is used to validate client certificates on two-way TLS.
2023-03-08 08:37:08 -05:00
2. Add following options to `my.cnf`:
```ini
[mysqld]
ssl-ca = /path/to/ca.crt
ssl-cert = /path/to/mysql.crt
ssl-key = /path/to/mysql.key
tls-version = TLSv1.2,TLSv1.3
```
2023-03-08 08:37:08 -05:00
3. Adjust credentials ownership and permission:
```
chown mysql:mysql /path/to/ca.crt /path/to/mysql.crt /path/to/mysql.key
chmod 0600 /path/to/ca.crt /path/to/mysql.crt /path/to/mysql.key
```
2023-03-08 08:37:08 -05:00
4. Restart MySQL/MariaDB to apply the setting.
2023-03-08 08:37:08 -05:00
5. The database user for Forgejo may have been created earlier, but it would authenticate only against the IP addresses of the server running Forgejo. To authenticate against its domain name, recreate the user, and this time also set it to require TLS for connecting to the database:
2023-03-08 08:37:08 -05:00
```sql
DROP USER 'forgejo'@'192.0.2.10';
CREATE USER 'forgejo'@'example.forgejo' IDENTIFIED BY 'passw0rd' REQUIRE SSL;
GRANT ALL PRIVILEGES ON forgejodb.* TO 'forgejo'@'example.forgejo';
FLUSH PRIVILEGES;
```
2023-03-08 08:37:08 -05:00
Replace database user name, password, and Forgejo instance domain as appropriate.
2023-03-08 08:37:08 -05:00
6. Make sure that the CA certificate chain required to validate the database server certificate is on the system certificate store of both the database and Forgejo servers. Consult your system documentation for instructions on adding a CA certificate to the certificate store.
2023-03-08 08:37:08 -05:00
7. On the server running Forgejo, test connection to the database:
2023-03-08 08:37:08 -05:00
```
mysql -u forgejo -h example.db -p --ssl
```
2023-03-08 08:37:08 -05:00
You should be connected to the database.