This tutorial shows the installation of SFTPGo on Ubuntu 20.04 (Focal Fossa) with PostgreSQL data provider and S3 backend. SFTPGo will run as an unprivileged (non-root) user. We assume that you want to serve a single S3 bucket and you want to assign different "virtual folders" of this bucket to different SFTPGo virtual users.
Before proceeding further you need to have a basic minimal installation of Ubuntu 20.04.
Before installing any packages on the Ubuntu system, update and upgrade all packages using the apt
commands below.
sudo apt update
sudo apt upgrade
Install PostgreSQL with this apt
command.
sudo apt -y install postgresql
Once installation is completed, start the PostgreSQL service and add it to the system boot.
sudo systemctl start postgresql
sudo systemctl enable postgresql
Next, check the PostgreSQL service using the following command.
systemctl status postgresql
PostgreSQL uses roles for user authentication and authorization, it just like Unix-Style permissions. By default, PostgreSQL creates a new user called postgres
for basic authentication.
In this step, we will create a new PostgreSQL user for SFTPGo.
Login to the PostgreSQL shell using the command below.
sudo -i -u postgres psql
Next, create a new role sftpgo
with the password sftpgo_pg_pwd
using the following query.
create user "sftpgo" with encrypted password 'sftpgo_pg_pwd';
Next, create a new database sftpgo.db
for the SFTPGo service using the following queries.
create database "sftpgo.db";
grant all privileges on database "sftpgo.db" to "sftpgo";
Exit from the PostgreSQL shell typing \q
.
Download a binary SFTPGo release or a build artifact for the latest commit.
In this tutorial we assume you downloaded the debian build artifact named sftpgo-v1.0.1-dev.68-x86_64-deb.zip
inside the current directory.
Install unzip
, if not already installed, and extract the archive with the following commands.
sudo apt install unzip
unzip sftpgo-v1.0.1-dev.68-x86_64-deb.zip
Next install SFTPGo.
sudo apt install ./sftpgo_1.0.1-1~dev.68_amd64.deb
After installation SFTPGo should already be running with default configuration and configured to start automatically at boot, check its status using the following command.
systemctl status sftpgo
We assume that you want to serve a single S3 bucket and you want to assign different "virtual folders" of this bucket to different SFTPGo virtual users. In this case is very convenient to configure a credential file so SFTPGo will automatically use it and you don't need to specify the same AWS credentials for each user.
You can manually create the /var/lib/sftpgo/.aws/credentials
file and write your AWS credentials like this.
[default]
aws_access_key_id=AKIAIOSFODNN7EXAMPLE
aws_secret_access_key=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Alternately you can install AWS CLI
and manage the credential using this tool.
sudo apt install awscli
and now set your credentials, region, and output format with the following command.
aws configure
Confirm that you can list your bucket contents with the following command.
aws s3 ls s3://mybucket
The AWS CLI will create the credential file in ~/.aws/credentials
. The SFTPGo service runs using the sftpgo
system user whose home directory is /var/lib/sftpgo
so you need to copy the credentials file to the sftpgo home directory and assign it the proper permissions.
sudo mkdir /var/lib/sftpgo/.aws
sudo cp ~/.aws/credentials /var/lib/sftpgo/.aws/
sudo chown -R sftpgo:sftpgo /var/lib/sftpgo/.aws
Now open the SFTPGo configuration.
sudo vi /etc/sftpgo/sftpgo.json
Search for the data_provider
section and change it as follow.
"data_provider": {
"driver": "postgresql",
"name": "sftpgo.db",
"host": "127.0.0.1",
"port": 5432,
"username": "sftpgo",
"password": "sftpgo_pg_pwd",
...
"users_base_dir": "/tmp",
}
This way we set the PostgreSQL connection parameters and a default base directory for new users.
Since we use S3 and not the local filesystem as backend we set /tmp
as default base directory so when we add a new user the home directory will be automatically defined as the path obtained joining /tmp
and the username.
If you want to connect to PostgreSQL over a Unix Domain socket you have to set the value /var/run/postgresql
for the host
configuration key instead of 127.0.0.1
.
You can further customize your configuration adding custom actions and other hooks. A full explanation of all configuration parameters can be found here.
Next, initialize the data provider with the following command.
$ sudo su - sftpgo -s /bin/bash -c 'sftpgo initprovider -c /etc/sftpgo'
2020-09-12T21:07:50.000 DBG Initializing provider: "postgresql" config file: "/etc/sftpgo/sftpgo.json"
2020-09-12T21:07:50.000 DBG Data provider successfully initialized
Next restart the sftpgo service to use the new configuration and check that it is running.
sudo systemctl restart sftpgo
systemctl status sftpgo
The easiest way to add virtual users is to use the built-in Web interface.
You can expose the Web Admin interface over the network replacing "bind_address": "127.0.0.1"
in the httpd
configuration section with "bind_address": ""
and apply the change restarting the SFTPGo service with the following command.
sudo systemctl restart sftpgo
So now open the Web Admin URL.
Click Add
and fill the user details, the minimum required parameters are:
Username
Password
or Public keys
Permissions
Home Dir
can be empty since we defined a default base dirAmazon S3 (Compatible)
as storage and then set Bucket
, Region
and optionally a Key Prefix
if you want to restrict the user to a specific virtual folder in the bucket. The specified virtual folder does not need to be pre-created. You can leave Access Key
and Access Secret
empty since we defined global credentials for the sftpgo
user and we use this system user to run the SFTPGo service.You are done! Now you can connect to you SFTPGo instance using any compatible sftp
client on port 2022
.
You can mix S3 users with local users but please be aware that we are running the service as the unprivileged sftpgo
system user so if you set storage as local
for an SFTPGo virtual user then the home directory for this user need to be owned by the sftpgo
system user.