-
Notifications
You must be signed in to change notification settings - Fork 1.2k
[Fixes #13894] Expose PostgreSQL configuration files on host for tuning in GeoNode Docker setup #13886
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
[Fixes #13894] Expose PostgreSQL configuration files on host for tuning in GeoNode Docker setup #13886
Changes from 3 commits
15be0aa
d279916
4c35843
947e0b6
2151ece
691ce39
070e8f7
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,39 @@ | ||
| # Local Unix socket connections - trust for local admin access | ||
| local all postgres trust | ||
|
|
||
| # Localhost connections - trust for container internal access | ||
| host all postgres 127.0.0.1/32 trust | ||
| host all postgres ::1/128 trust | ||
|
|
||
| # Allow replication connections from localhost | ||
| local replication all trust | ||
| host replication all 127.0.0.1/32 trust | ||
| host replication all ::1/128 trust | ||
|
|
||
| # ============================================================================= | ||
| # Application-specific rules (evaluated in order) | ||
| # ============================================================================= | ||
|
|
||
| # GeoNode database - require SCRAM-SHA-256 authentication | ||
| # This matches connections from Django/Celery containers | ||
| host geonode geonode 172.19.0.0/16 scram-sha-256 | ||
|
|
||
| # GeoNode geodatabase - require SCRAM-SHA-256 authentication | ||
| # This matches connections from GeoServer | ||
| host geonode_data geonode_data 172.19.0.0/16 scram-sha-256 | ||
|
|
||
| # Template databases - no external access allowed | ||
| host template0 all all reject | ||
| host template1 all all reject | ||
|
|
||
| # Postgres database - admin only, require password | ||
| host postgres postgres 172.19.0.0/16 scram-sha-256 | ||
|
|
||
| # ============================================================================= | ||
| # Default catch-all rule - deny all other connections | ||
| # ============================================================================= | ||
| # Uncomment to explicitly deny all other connections: | ||
| # host all all all reject | ||
|
|
||
| # Or allow with password (current default): | ||
| host all all all scram-sha-256 | ||
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,13 @@ | ||
| # Data Directory (managed by Docker) | ||
| data_directory = '/var/lib/postgresql/data' | ||
|
|
||
| # Connection Settings | ||
| listen_addresses = '*' # Listen on all network interfaces | ||
|
|
||
| # Authentication Configuration File | ||
| hba_file = '/etc/postgresql/pg_hba.conf' | ||
|
|
||
| # Include additional configuration files from conf.d directory | ||
| # All .conf files in this directory will be processed | ||
| include_dir = 'conf.d' | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The
POSTGRESQL_MAX_CONNECTIONSenvironment variable, which was used here to configuremax_connections, is no longer effective with the new configuration approach. This is a potentially breaking change for users who were relying on it. It would be helpful to document this change and provide instructions for settingmax_connectionsvia the newconf.ddirectory mechanism.