Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

PostgreSQL + Websockets

License

NotificationsYou must be signed in to change notification settings

diogob/postgres-websockets

Repository files navigation

postgres-websockets is amiddleware that adds websockets capabilites on top ofPostgreSQL's asynchronous notifications using LISTEN and NOTIFY commands.

postgres-websockets allows you to:

  • Send messages a websocket triggering aNOTIFY command in a PostgreSQL database.
  • Receive messages sent to any database channel though a websocket.
  • Authorize the use of channels using aJWT issued by another service.
  • Authorize read-only, write-only, or read and write websockets.

Running the server

Quickstart using docker-compose

Thedocker-compose.yml present in the repository will start a PostgreSQL database alongside a postgres-websockets and a pg-recorder.To try it out, you will needDocker installed andgit to clone this repository.

git clone https://github.com/diogob/postgres-websockets.gitcd postgres-websocketsdocker-compose up

Open your browser onhttp://localhost:3000 to see an example of usage.

Pre-compiled binaries

You can download binaries from thereleases page. Currently, only Linux binaries complied against Ubuntu on amd64 are provided.

Building from source

To build the project, I recommend the use ofGHCup to install GHC and cabal.You also need to havegit installed to download the source code.Having installed ghc and cabal the following commands should installpostgres-websockets into your~/.cabal/bin directory:

git clone https://github.com/diogob/postgres-websockets.gitcd postgres-websocketscabal install

If you have any problems processing any Postgres related library on a Mac, try installingPostgres.app.

After the build, you should be able to run the server using~/.cabal/bin/postgres-websockets.

To run the example below you will need a PostgreSQL server running on port 5432 of your localhost.

source sample-env&&~/.cabal/bin/postgres-websockets

Open your browser onhttp://localhost:3000 to see an example of usage.

Runtime configuration

The sample config file provided in thesample-env file has a jwt secret just for testing and is used in the sample client.

Opening a connection to one channel with a token

When you request access to a channel calledchat the address of the websockets will look like:

ws://chat/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJtb2RlIjoicncifQ.QKGnMJe41OFZcjz_qQSplmWAmVd_hmVjijKUNoJYpis

The token on the URL above has nochannels claim, therefore is can be used to open connections to any channel, be careful when issuing those.

When the token contains achannels claim, the value of that claim should be a list of allowed channels.Any requested channel not set in that claim will result in an error opening the connection.

Connecting to multiple channels

When you inform only the token on the websocket address, thechannels claim must be present.In this case, all channels present in the claim will be available simultaneously in the same connection.This is useful for clients that need to monitor or broadcast a set of channels, being more convenient than managing multiple websockets.The address will look like:

ws://eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJtb2RlIjoicnciLCJjaGFubmVsIjoiY2hhdCJ9.fEm6P7GHeJWZG8OtZhv3H0JdqPljE5dainvsoupM9pA

Receiving messages from the browser

Every message received from the browser will be in JSON format as:

{"event":"WebsocketMessage","channel":"destination_channel","payload":"message content","claims":{"message_delivered_at":0.0,"a_custom_claim_from_the_jwt":"your_custom_value"}}

Whereclaims contain any custom claims added to the JWT with the addedmessage_delivered_at which marks the timestamp in UNIX format of when the message was processed by postgres-websockets just before being sent to the database.Also,channel contains the channel used to send the message, this should be used to send any messages back to that particular client.Finally,payload contain a string with the message contents.

A easy way to process messages received asynchronously is to usepg-recorder with some custom stored procedures.For more options on notification processing, check thePostgREST documentation on the topic.

Sending messages to the browser

To send a message to a particular channel on the browser, one should notify the postgres-websockets listener channel and pass a JSON object containing the channel and payload such as:

SELECT pg_notify('postgres-websockets-listener',  json_build_object('event','WebsocketMessage','channel','chat','payload','test')::text);

Wherepostgres-websockets-listener is the database channel used by your instance of postgres-websockets andchat is the channel where the browser is connected (the same issued in the JWT used to connect).

Monitoring Connections

To monitor connection opening one should set the variablePGWS_META_CHANNEL which will enable the meta-data messages generation in the server on the channel name specified.When using the configuration in thesample-env the channelserver-info will receive see messages like the one below each time a connection is established (only after the JWT is validated).

{"event":"ConnectionOpen","channel":"server-info","payload":"server-info","claims":{"mode":"rw","message_delivered_at":1.602719440727465893e9}}

You can also read these messages having an additional database listener on thePGWS_LISTEN_CHANNEL.

Using a secure socket

To use a secure socket (wss://) you can set the configuration variablesPGWS_CERTIFICATE_FILE andPGWS_KEY_FILE. Once these two variables point to a valid X.509 certificate, the server will enable TLS connections. Below a quick example of how to generate a self-signed certificate usingOpenSSL command line tool:

openssl genrsa -out key.pem 2048openssl req -new -key key.pem -out certificate.csropenssl x509 -req -in certificate.csr -signkey key.pem -out certificate.pem

Recovering from listener database connection failures

The database connection used to wait for notification where theLISTEN command is issued can cause problems when it fails. To prevent this problem from completely disrupting our websockets server, there are two ways to configure postgres-websockets:

  • Self healing connection - postgres-websockets comes with a connection supervisor baked in. You just need to set the configurationPGWS_CHECK_LISTENER_INTERVAL to a number of milliseconds that will be the maximum amount of time losing messages. There is a cost for this since at each interval an additional SELECT query will be issued to ensure the listener connection is still active. If the connection is not found, the connection thread will be killed and respawned. This method has the advantage of keeping all channels and websocket connections alive while the database connection is severed (although messages will be lost).
  • Using external supervision - you can also unsetPGWS_CHECK_LISTENER_INTERVAL and postgres-websockets will try to shut down the server when the database connection is lost. Some external process can then restart the server. All websocket connections will be lost.

Acknowledgements

The project was largely inspired and originally designed for use withPostgREST.


[8]ページ先頭

©2009-2025 Movatter.jp