This repository contains the logic to build SSL-enabled Postgres images with DuckDB support.
By default, when you deploy the pgduckdb template on Railway, the image that is used is built from this repository!
The official pgduckdb image in Docker hub does not come with SSL baked in.
Since this could pose a problem for applications or services attempting to connect to Postgres services, we decided to roll our own pgduckdb image with SSL enabled right out of the box.
The Dockerfiles contained in this repository start with the official pgduckdb image as base. Then the init-ssl.sh
script is copied into the docker-entrypoint-initdb.d/
directory to be executed upon initialization.
By default, the cert expiry is set to 820 days. You can control this by configuring the SSL_CERT_DAYS
environment variable as needed.
When a redeploy or restart is done the certificates expiry is checked, if it has expired or will expire in 30 days a new certificate is automatically generated.
By default, this image is hardcoded to listen on port 5432
regardless of what is set in the PGPORT
environment variable. We did this to allow connections to the postgres service over the RAILWAY_TCP_PROXY_PORT
. If you need to change this behavior, feel free to build your own image without passing the --port
parameter to the CMD
command in the Dockerfile.
If you are moving from timescaledb to duckdb, you will need update the source image of your service and then run the following SQL commands to enable duckdb:
DROP EXTENSION IF EXISTS timescaledb CASCADE;
ALTER SYSTEM SET shared_preload_libraries = 'pg_duckdb';
CREATE EXTENSION IF NOT EXISTS pg_duckdb;