Skip to content

Latest commit

 

History

History
79 lines (56 loc) · 3.07 KB

README.md

File metadata and controls

79 lines (56 loc) · 3.07 KB

BlogEngine.NET with PostgreSQL

This repository contains the PostgreSQL port of BlogEngine.NET. Since BlogEngine.NET internally converts GUIDs into text before handing them over to the database provider some code changes are needed. The changes should be compatible with proper database providers, but I haven't tested them.

Also since the database contains columns named Key, Value and Attribute, some databases need escaping and this seems to be hardcoded into the source code. I've added hardcoded "no need to escape" versions for PostgreSQL.

Currently the code is very lightly tested, so YMMV.


This repository provides latest source code for BlogEngine.NET project.



BlogEngine Website   BlogEgnien Features   BlogEngine Themes   BlogEngine Docs   BlogEngine Donate

Installation

There are two download options for BlogEngine.NET:

1. Web Project

This is an ideal option that you just need to download and copy BlogEngine files on your website and then everything is ready:

Requirements:

  • ASP.NET 4.5 +

Steps:

  1. Download and extract zip file on root of your website.
  2. Add write permissions to the App_Data and Custom folder.
  3. Installation is done.
  4. You can navigate to administration by adding /admin/ to your website's URL, for example: http://yourblog.com/admin/
  5. Username: admin Password admin

2. Source Code

This is the developer option. If you are interested is seeing how things work or want to add to the functionality, this is your option.

Environment:

  • Visual Studio 2015 +
  • ASP.NET 4.5 +

Steps:

  1. Clone repository
  2. Open solution in Visual Studio 2015 +
  3. Create a database with use beUser
  4. Add the uuid-ossp extension
  5. Run the script from setup/PostgreSQL
  6. Build and run solution to load website in the browser
  7. Use Admin/admin to log into website administration

3. Security Update

After install, update machineKey in Web.config with values generated with tool like this. This will prevent known exploit (reported Sep 2019). This only effects if you use default admin account.

Screenshot

More screenshots on the website.

dashboard-3