INSTALL

Install on RedHat / CentOS

This is the recommended way to install the extension

Step 0: Add the PostgreSQL Official RPM Repo to your system. It shouldb be something like:

$ sudo yum install https://.../pgdg-redhat-repo-latest.noarch.rpm

Step 1: Install

$ sudo yum install postgresql_anonymizer12

(Replace 12 with the major version of your PostgreSQL instance.)

Step 2: Add 'anon' in the shared_preload_libraries parameter of your postgresql.conf file. For example:

shared_preload_libraries = 'pg_stat_statements, anon'

Step 3: Restart your instance.

Install With PGXN :

Step 1: Install the extension on the server with:

$ sudo apt install pgxnclient postgresql-server-dev-12 
$ sudo pgxn install ddlx
$ sudo pgxn install postgresql_anonymizer

(Replace 12 with the major version of your PostgreSQL instance.)

Step 2: Add 'anon' in the shared_preload_libraries parameter of your postgresql.conf file. For example:

shared_preload_libraries = 'pg_stat_statements, anon'

Step 3: Restart your instance.

Additional notes:

  • PGXN can also be installed with pip install pgxn
  • If you have several versions of PostgreSQL installed on your system, you may have to point to the right version with the --pg_config parameter. See Issue #93 for more details.
  • Check out the pgxn install documentation for more information.

Install From source

Step 0: First you need to install the postgresql development libraries. On most distribution, this is available through a package called postgresql-devel or postgresql-server-dev.

Step 1: Build the project like any other PostgreSQL extension:

$ make extension
$ sudo make install

Step 2: Add 'anon' in the shared_preload_libraries parameter of your postgresql.conf file. For example:

shared_preload_libraries = 'pg_stat_statements, anon'

Step 3: Restart your instance.

Install in the cloud

DISCLAIMER if privacy and anonymity are a concern to you, hosting your data on someone else's computer is probably not a clever idea....

Generally Database As A Service operators ( such as Amazon RDS ) do not allow their clients to load any extension. Instead they support only a limited subset of extensions, such as PostGIS or pgcrypto. You can ask them if they plan to support this one in the near future, but you shouldn't bet your life on it 😃

However this tool is set of plpgsql functions, which means should you be able to install it directly without declaring an extension.

Here's a few steps to try it out:

$ git clone https://gitlab.com/dalibo/postgresql_anonymizer.git
$ make standalone
$ psql ..... -f anon_standalone_PG11.sql

NB : Replace PG11 with the version of Postgres offered by your DBaaS operator.

In this situation, you will have to declare the masking rules with COMMENT instead of security labels. See Declaring Rules with COMMENTs for more details.

When you activate the masking engine, you need also to disable autoload:

SELECT anon.start_dynamic_masking( autoload := FALSE );

Install with Docker

If you can't (or don't want to) install the PostgreSQL Anonymizer extension directly inside your instance, then you can use the docker image :

$ docker pull registry.gitlab.com/dalibo/postgresql_anonymizer

You can now run the docker image like the regular postgres docker image.

For example:

Launch start a postgres docker container

$ docker run -d --name anon -p 6543:5432 registry.gitlab.com/dalibo/postgresql_anonymizer

Connect :

$ psql -h localhost -p6543 -U postgres

The extension is already loaded, you can use it directly:

# SELECT anon.partial_email('daamien@gmail.com');
     partial_email     
-----------------------
 da******@gm******.com
(1 row)

Install as a "Black Box"

You can also treat the docker image as an "anonymizing black box" by using a specific entrypoint script called /anon.sh. You pass the original data and the masking rules to the /anon.sh script and it will return a anonymized dump.

Here's an example in 4 steps:

Step 1: Dump your original data (for instance dump.sql)

$ pg_dump [...] my_database > dump.sql

Step 2: Write your masking rules in a separate file (for instance rules.sql)

SELECT pg_catalog.set_config('search_path', 'public', false); 

CREATE EXTENSION anon CASCADE;
SELECT anon.load();

SECURITY LABEL FOR anon ON COLUMN people.lastname
IS 'MASKED WITH FUNCTION anon.fake_last_name()';

etc.

Step 3: Pass the dump and the rules through the docker image and receive an anonymized dump !

$ IMG=registry.gitlab.com/dalibo/postgresql_anonymizer
$ ANON="docker run --rm -i $IMG /anon.sh" 
$ cat dump.sql rules.sql | $ANON > anon_dump.sql

(this last step is written on 3 lines for clarity)

NB: You can also gather step 1 and step 3 in a single command:

$ pg_dump my_database | cat - rules.sql | $ANON > anon_dump.sql

Install on MacOS

Although the extension is not officially supported on MacOS systems, it should be possible to build the extension with the following lines:

$ export C_INCLUDE_PATH="$(xcrun --show-sdk-path)/usr/include" 
$ make extension
$ make install