-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
App cannot connect to a managed postgresql cluster on digitalocean #55
Comments
conorsch
added a commit
that referenced
this issue
Sep 19, 2024
Adds opt-in support for declaring a CA certificate value for the database TLS connection. Some managed postgres solutions, such as DigitalOcean's, require this setting. In order to use it: 1. set the CA_CERT env var with the string contents of the db's CA 2. remove the `sslmode=require` from the connection auth string The need for 2 is because the `connectionString` param clobbers any manual `ssl` opts in the db config, and is documented here [0]. Closes #55. [0] https://node-postgres.com/features/ssl#usage-with-connectionstring
conorsch
added a commit
that referenced
this issue
Sep 19, 2024
Adds opt-in support for declaring a CA certificate value for the database TLS connection. Some managed postgres solutions, such as DigitalOcean's, require this setting. In order to use it: 1. set the CA_CERT env var with the string contents of the db's CA 2. remove the `sslmode=require` from the connection auth string The need for 2 is because the `connectionString` param clobbers any manual `ssl` opts in the db config, and is documented here [0]. Closes #55. [0] https://node-postgres.com/features/ssl#usage-with-connectionstring
conorsch
added a commit
that referenced
this issue
Sep 19, 2024
Adds opt-in support for declaring a CA certificate value for the database TLS connection. Some managed postgres solutions, such as DigitalOcean's, require this setting. In order to use it: 1. set the PENUMBRA_INDEXER_CA_CERT env var with the string contents of the db's CA 2. remove the `sslmode=require` from the connection auth string The need for 2 is because the `connectionString` param clobbers any manual `ssl` opts in the db config, and is documented here [0]. Closes #55. [0] https://node-postgres.com/features/ssl#usage-with-connectionstring
conorsch
added a commit
that referenced
this issue
Sep 19, 2024
Adds opt-in support for declaring a CA certificate value for the database TLS connection. Some managed postgres solutions, such as DigitalOcean's, require this setting. In order to use it: 1. set the PENUMBRA_INDEXER_CA_CERT env var with the string contents of the db's CA 2. remove the `sslmode=require` from the connection auth string The need for 2 is because the `connectionString` param clobbers any manual `ssl` opts in the db config, and is documented here [0]. Closes #55. [0] https://node-postgres.com/features/ssl#usage-with-connectionstring
conorsch
added a commit
that referenced
this issue
Sep 19, 2024
Adds opt-in support for declaring a CA certificate value for the database TLS connection. Some managed postgres solutions, such as DigitalOcean's, require this setting. In order to use it: 1. set the PENUMBRA_INDEXER_CA_CERT env var with the string contents of the db's CA 2. remove the `sslmode=require` from the connection auth string The need for 2 is because the `connectionString` param clobbers any manual `ssl` opts in the db config, and is documented here [0]. Closes #55. [0] https://node-postgres.com/features/ssl#usage-with-connectionstring
conorsch
added a commit
that referenced
this issue
Sep 20, 2024
Adds opt-in support for declaring a CA certificate value for the database TLS connection. Some managed postgres solutions, such as DigitalOcean's, require this setting. In order to use it: 1. set the PENUMBRA_INDEXER_CA_CERT env var with the string contents of the db's CA 2. remove the `sslmode=require` from the connection auth string The need for 2 is because the `connectionString` param clobbers any manual `ssl` opts in the db config, and is documented here [0]. Closes #55. [0] https://node-postgres.com/features/ssl#usage-with-connectionstring
conorsch
added a commit
to penumbra-zone/penumbers
that referenced
this issue
Oct 8, 2024
Creates an initial skeleton for CI runs, based on the standard JS tooling we support in other repos. The changes are unobjectionable: containerfile for building images, nix env with justfile for common local commands. Also modified the app code slightly to accept an optional database CA cert, which is necessary for the managed db services when leveraging node-postgres; see related discussion in [0]. Overhauls the README based on all the above. [0] penumbra-zone/dex-explorer#55
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
When connecting to a remote TLS endpoint for the postgres database, specifically hosted on DigitalOcean's managed setup, the app throws the error
SELF_SIGNED_CERT_IN_CHAIN
:Note that
psql
works just fine with this URL, so the connection problem is specific to the application code. We encountered the same problem in Cuiloa: penumbra-zone/cuiloa#193 and decided that providing a mechanism for supplying a CA_CERT env var was a good enough workaround.The text was updated successfully, but these errors were encountered: