-
Notifications
You must be signed in to change notification settings - Fork 458
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add secure option for "Build an App" #631
Comments
There are a few steps here, for each example:
|
A user shared a working node.js example on the forum: https://forum.cockroachlabs.com/t/basic-example-in-secure-mode/1339/6?u=knz |
From #2089: Here is a quick secure example for PHP if needed. Current insecure example:
Secure example:
|
Ping on this: java is particularly tricky and could use an example. See cockroachdb/cockroach#24487 |
Thanks, @mberhault. @awoods187, let's talk about prioritizing this as a docs/eng project for 2.1, perhaps focusing just on jdbc and hibernate. |
For 2.1, part of #2943. |
As part of this document, suggest we provide a link to an overview of certificates & how SSL works. My sense is that this is in part a user education effort. |
Addresses #631 Summary of changes: - Update code samples for the following languages/ORMs to connect to secure local cluster using certs: - Java JDBC - Java Hibernate - Ruby pg - Ruby ActiveRecord - Python psycopg2 - Python SQLAlchemy - Node.js pg - Update cluster startup instructions for the above languages to use secure practices - Create a new versioned include directory for 2.1 docs, which holds all secure code and cluster setup instructions
Addresses #631 Summary of changes: - Update code samples for the following languages/ORMs to connect to secure local cluster using certs: - Java JDBC - Java Hibernate - Ruby pg - Ruby ActiveRecord - Python psycopg2 - Python SQLAlchemy - Node.js pg - Update cluster startup instructions for the above languages to use secure practices - Create a new versioned include directory for 2.1 docs, which holds all secure code and cluster setup instructions - Explain special private key format munging needed by Java applications (.key to .pk8 using `openssl` magic strings)
Addresses #631 Summary of changes: - Update code samples for the following languages/ORMs to connect to secure local cluster using certs: - Java JDBC - Java Hibernate - Ruby pg - Ruby ActiveRecord - Python psycopg2 - Python SQLAlchemy - Node.js pg - Update cluster startup instructions for the above languages to use secure practices - Create a new versioned include directory for 2.1 docs, which holds all secure code and cluster setup instructions - Explain special private key format munging needed by Java applications (.key to .pk8 using `openssl` magic strings)
Addresses #631 Summary of changes: - Update code samples for the following languages/ORMs to connect to secure and insecure local clusters: - Java JDBC - Java Hibernate - Ruby pg - Ruby ActiveRecord - Python psycopg2 - Python SQLAlchemy - Node.js pg - Link out to cluster startup instructions for secure/insecure local clusters - Create a new versioned include directory for 2.1 docs, which holds all secure and insecure code samples - Explain special private key format munging needed by Java applications (.key to .pk8 using `openssl` magic strings)
Addresses #631 Summary of changes: - Update code samples for the following languages/ORMs to connect to secure and insecure local clusters: - Java JDBC - Java Hibernate - Ruby pg - Ruby ActiveRecord - Python psycopg2 - Python SQLAlchemy - Node.js pg - Link out to cluster startup instructions for secure/insecure local clusters - Create a new versioned include directory for 2.1 docs, which holds all secure and insecure code samples - Explain special private key format munging needed by Java applications (.key to .pk8 using `openssl` magic strings)
Addresses #631 Summary of changes: - Update code samples for the following languages/ORMs to connect to secure and insecure local clusters: - Java JDBC - Java Hibernate - Ruby pg - Ruby ActiveRecord - Python psycopg2 - Python SQLAlchemy - Node.js pg - Link out to cluster startup instructions for secure/insecure local clusters - Create a new versioned include directory for 2.1 docs, which holds all secure and insecure code samples - Explain special private key format munging needed by Java applications (.key to .pk8 using `openssl` magic strings)
Addresses #631. Summary of changes: - Update Node Sequelize with secure cluster option - Update Go pq example with secure cluster option - Update Go GORM example with secure cluster option - Update PHP example with secure cluster option
Addresses #631. Summary of changes: - Update Node Sequelize with secure cluster option - Update Go pq example with secure cluster option - Update Go GORM example with secure cluster option - Update PHP example with secure cluster option
Current "Build a Test App" tutorial assumes insecure clusters. Add in an option for secure clusters.
conn = psycopg2.connect(database='bank',user='maxroach',host='localhost',port=26257, sslmode='require', sslrootcert='certs/ca.cert', sslcert='certs/maxroach.cert', sslkey='certs/maxroach.key')
The text was updated successfully, but these errors were encountered: