Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

secrets/mysql: Add tls_server_name and tls_skip_verify parameters #18799

Merged
merged 7 commits into from
Jan 23, 2023

Conversation

jasonodonnell
Copy link
Contributor

The MySQL implementation supports TLS verification and auth, however, when testing against Cloud SQL it was very painful to verify the CA. This is because Cloud SQL does not add IP SANs to the certificate. The SANs available reference internal VM names which aren't easily obtainable as a user. I've added these parameters to make the engine more flexible. Although the connection url does support these, the MySQL driver stores a tls.Config and references it by name in the connection URL, so it makes sense to add these there.

@jasonodonnell jasonodonnell added this to the 1.12.3 milestone Jan 23, 2023
@jasonodonnell jasonodonnell requested a review from a team January 23, 2023 19:25
Copy link
Contributor

@swenson swenson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM; a suggestion.

Were you able to test this?

plugins/database/mysql/connection_producer.go Outdated Show resolved Hide resolved
plugins/database/mysql/connection_producer.go Outdated Show resolved Hide resolved
@jasonodonnell
Copy link
Contributor Author

LGTM; a suggestion.

Were you able to test this?

@swenson Yup, tested it against an mTLS Google Cloud SQL instance. We have existing tests, however, they don't run in Circle and adding mTLS support to the test wasn't straight forward.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants