-
-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for secure connections (TLS) #14
Comments
@luislavena it's doable i think. Right now we only set up a I was also willing to add a What about Eventually it would be good to support CA as in [net/connector]:(https://dev.mysql.com/doc/connector-net/en/connector-net-connection-options.html) for example:
Would be enough to have the ssl options [updated: to match mysql2 ssl option names as suggested by @spalladino] |
Just a detail: I'd follow the same naming conventions as the ubiquitous Ruby mysql2 adapter, which uses |
Another note: in the standard library we began using |
That is one of the reasons I mentioned in the title TLS instead of SSL, even when MySQL documentation says SSL 😄
Bear with me for a minute: SSL moniker is used extensively across many libraries in Ruby (Puma, MySQL2 adapter, Thin, Faraday, etc) But contrary to Ruby, Crystal don't carry that legacy name and weight of time on this option, as is shown by the usage of On the same line, PostgreSQL also refers to SSL for secure connections, but, like MySQL, there is a legacy baggage carried around. Now, Go for example uses I think there is a chance for us to unify such approach under the same convention so other SQL DB adapters follow the same approach. Just some thoughts to keep the conversation going 😃 Either way, thank you for your attention and time answering this. ❤️ ❤️ ❤️ |
Any updates on this? It would be very handy to have SSL enabled for cloud options (RDS comes to mind). |
This would be a nice feature to have. |
I started experimenting with this, gave up, and then started again. So far I think the initial MySQL handshake is properly implemented. The remaining piece is to figure out how to negotiate the SSL connection. I pasted in the implementation from the postgres driver, but it's not working yet. For reference, the MySQL protocal is very well defined here https://dev.mysql.com/doc/internals/en/ssl.html |
If someone wanted to help with this I'd be willing to pay a bounty of $100 💵 . |
Hello!
First want to thank you for working on the native protocol. I've compared the new version of the adapter against the old libmysql one and had incredible speedup on our scripted tasks! 😄
However, noticed that due the migration to native protocol, we lost the ability to use a secure connection (was hacky then, now not possible), which is essential when establishing connections between our app and the DB provider across regions when no VPN can be established (for example, when using Compose).
Was wondering if there are plans to integrate such support in the future?
Thank you in advance for your time
❤️ ❤️ ❤️
The text was updated successfully, but these errors were encountered: