-
-
Notifications
You must be signed in to change notification settings - Fork 624
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: handshake SSL error with AWS RDS #2857
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #2857 +/- ##
==========================================
- Coverage 90.34% 88.18% -2.16%
==========================================
Files 71 71
Lines 15749 12874 -2875
Branches 1350 1351 +1
==========================================
- Hits 14228 11353 -2875
Misses 1521 1521
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
LGTM, thanks @wellwelwel ! |
Hi @sidorares Has this fix been published yet ? Currently I'm using promise-mysql which is a wrapper function of mysqljs Currently when I use ssl: awsCaBundle to pull in the new cert then I am getting the following error: "error": { And this is not related to the codebase. Is there something which I am doing here is wrong Our config |
Hi @mrajasekar-godaddy, can you perform a basic test? Instead of: {
ssl: awsCaBundle,
} Try: {
ssl: {
ca: awsCaBundle.ca,
}
} I'm a bit uncomfortable with the import approach, for example: import awsCaBundle from 'aws-ssl-profiles';
console.log(Object.getOwnPropertyNames(awsCaBundle));
// -> [ 'ca', 'proxyBundle' ]
|
Hi @wellwelwel, Thank you for the quick response. Sure will do test it Got it. Agree with your thought on using the import approach, that wouldn't be ideal to use. Will test out the suggestion and let you know.
|
Hi @wellwelwel I did try using this Thanks in Advance |
Hey @mrajasekar-godaddy, in that case, I recommend you to open an issue. If possible, share a minimal reproduction 🙋🏻♂️ |
Thank you for the quick response. Submitted an issue here [https://github.com//issues/2869] |
@wellwelwel Also, Added steps for reproducing the error in the issue. It would be great, if we could even schedule a call if that works. My observations ( if this would help by any chance ):
Thanks again |
@wellwelwel Hi, I was able to connect to SSL finally. Thank you for the support and the help Huge thanks to all the folks who contributed to creating this library. |
Closes #2581.
This PR deprecates the
ssl: 'Amazon RDS'
and uses the certificate bundle from aws-ssl-profiles dependency.The documentation has been updated to suggest installing aws-ssl-profiles for AWS RDS certificates.
Note
☔️ The coverage percentage was affected by removing the amount of previous lines from string certificates (~2,877 lines removed).