-
-
Notifications
You must be signed in to change notification settings - Fork 227
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve SSL support #567
Improve SSL support #567
Conversation
Codecov ReportBase: 57.92% // Head: 57.89% // Decreases project coverage by
📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more Additional details and impacted files@@ Coverage Diff @@
## main #567 +/- ##
==========================================
- Coverage 57.92% 57.89% -0.04%
==========================================
Files 29 30 +1
Lines 2510 2546 +36
==========================================
+ Hits 1454 1474 +20
- Misses 1056 1072 +16
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
f0c48e2
to
3eca837
Compare
* remove `danger_accept_invalid_certs` -- turns out that behavior is expected by default unless ssl mode is set to verify - which upstream lib does not support (yet) - PR submitted. * added connection_timeout_ms option for postgres and set it to 5 seconds by default. This way it will fail out earlier. * added error reporting to bb8 - but it is currently broken upstream - not sure we can fix it easily, so may need to switch to deadpool later. * added docker-based TLS test (horray!) - wasn't trivial at all, despite ending up fairly simple. * important: if ca root file is set, it will be verified. The host will never be verified.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me 👍
One nit: could you please not remove the "Using with Heroku PostgreSQL" section from the README but drop the danger-accept
flag notion?
This is a partial fix for #496
psql
-- by default, if SSL is available on the server, it will be used, even though it will not verify that the server has a valid SSL certificatePGSSLCERT
,PGSSLKEY
, andPGSSLROOTCERT
env vars (and corresponding config keys) - same as psql.?sslmode=verify-ca
andverify-full
(just like psql). The verify modes require root and/or client cert & key.danger_accept_invalid_certs
-- turns out that behavior is expected by default unless ssl mode is set to verify - which upstream lib does not support - PR submitted.