-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support TLS encryption #107
Comments
I'm guessing to do this, I'll need to change the functor to use Conduit: https://github.com/mirage/ocaml-conduit |
I'm wondering if it's possible to ignore this in the main functor and handle it entire in Pgx_async / Pgx_lwt /etc. We'll have to make sure there's reasonable error handling though. |
This comment has been minimized.
This comment has been minimized.
Here's the Postgres documentation for doing TLS: https://www.postgresql.org/docs/9.3/protocol-flow.html#AEN100021 Essentially we need to:
|
This adds TLS support for Pgx_async using Conduit. This is only a proof of concept because: - We're using the Conduit.V1 interface, which we may not want to rely on (the latest is V3) - We need to add support for Pgx_async - We probably need better error handling than asserts Resolves #107
This adds TLS support for Pgx_async using Conduit. There are a few things that aren't ideal about this: - We're using the Conduit.V1 interface, which we may not want to rely on (the latest is V3) - We haven't implemented this for Lwt yet since they don't expose the same SSL upgrade interface in Conduit Resolves #107
This adds TLS support for Pgx_async using Conduit. There are a few things that aren't ideal about this: - We're using the Conduit.V1 interface, which we may not want to rely on (the latest is V3) - We haven't implemented this for Lwt yet since they don't expose the same SSL upgrade interface in Conduit Resolves arenadotio#107
No description provided.
The text was updated successfully, but these errors were encountered: