Encrypted Connections
It usually isn't straightforward to stablish encrypted connections with PostgreSQL or MySQL, worse yet, wtx
has a set of limited SSL policies that doesn't allow the by-passing of invalid certificates.
The following sections will briefly demonstrate how to configure both servers and clients to establish encrypted connections using self-signed certificates with Podman or Docker. Most of the procedures can be adapted for non-containerized environments and also for certificates issued by trusted actors.
In case of doubt, always remember that a server needs a key and a certificate while both parties need a root authority certificate. Sometimes even a CA certificate isn't necessary.
Generate certificates
Just an example, you can use other tools like cert-manager
or other algorithms like ed25519
.
CERTS_DIR="SOME_DIRECTORY"
openssl req -newkey rsa:2048 -nodes -subj "/C=FI/CN=vahid" -keyout $CERTS_DIR/key.pem -out $CERTS_DIR/key.csr
openssl x509 -signkey $CERTS_DIR/key.pem -in $CERTS_DIR/key.csr -req -days 1825 -out $CERTS_DIR/cert.pem
openssl req -x509 -sha256 -nodes -subj "/C=FI/CN=vahid" -days 1825 -newkey rsa:2048 -keyout $CERTS_DIR/root-ca.key -out $CERTS_DIR/root-ca.crt
cat <<'EOF' >> $CERTS_DIR/localhost.ext
authorityKeyIdentifier=keyid,issuer
basicConstraints=CA:FALSE
subjectAltName = @alt_names
[alt_names]
DNS.1 = localhost
IP.1 = 127.0.0.1
EOF
openssl x509 -req -CA $CERTS_DIR/root-ca.crt -CAkey $CERTS_DIR/root-ca.key -in $CERTS_DIR/key.csr -out $CERTS_DIR/cert.pem -days 1825 -CAcreateserial -extfile $CERTS_DIR/localhost.ext
rm $CERTS_DIR/key.csr
rm $CERTS_DIR/localhost.ext
rm $CERTS_DIR/root-ca.srl
MySQL
Let's start with a my.cnf
file that tells, among other things, where the certificates are located. MySQL permits the placement of my.cnf
in a set of pre-configured paths but here we will put it in /etc/mysql
.
[mysqld]
ssl-ca=/var/lib/mysql/root-ca.crt
ssl-cert=/var/lib/mysql/cert.pem
ssl-key=/var/lib/mysql/key.pem
Then you need to place these certificates in the container at the specified location AND set the same files as read-only for the current user. As far as I can tell, there are three possible ways.
- Create a custom Docker image.
- List a set of volume mappings along side some initial script.
- Inline certificates in
docker-entrypoint-initdb.d
Let's use option 3 for the sake of simplicity with a script named setup.sh
.
#!/usr/bin/env bash
echo "Contents of the generated root CA certificate file" > /var/lib/mysql/root-ca.crt
echo "Contents of the generated certificate file" > $/var/lib/mysql/cert.pem
echo "Contents of the generated key file" > /var/lib/mysql/cert.pem
chown mysql:mysql /var/lib/mysql/cert.pem /var/lib/mysql/key.pem
chmod 0600 /var/lib/mysql/cert.pem /var/lib/mysql/key.pem
Everything should be ready on the server side.
podman run \
--name SOME_CONTAINER_NAME \
-d \
-e MYSQL_DATABASE=SOME_DATABASE \
-e MYSQL_PASSWORD=SOME_PASSWORD \
-e MYSQL_ROOT_PASSWORD=SOME_ROOT_PASSWORD \
-e MYSQL_USER=SOME_USER \
-p 3306:3306 \
-v SOME_DIRECTORY/my.cnf:/etc/mysql/my.cnf \
-v SOME_DIRECTORY/setup.sh:/docker-entrypoint-initdb.d/setup.sh \
docker.io/library/mysql:9
Now it is just a matter of including the root CA certificate in the wtx
client. With everything properly configured, a successful encrypted connection should be expected.
#[tokio::test]
async fn tls() {
let uri = UriRef::new("SOME_URI");
let mut rng = rand_chacha::ChaCha20Rng::try_from_os_rng().unwrap();
let _executor = MysqlExecutor::<crate::Error, _, _>::connect_encrypted(
&Config::from_uri(&uri).unwrap(),
ExecutorBuffer::new(usize::MAX, &mut rng),
&mut rng,
TcpStream::connect(uri.hostname_with_implied_port()).await.unwrap(),
|stream| async {
Ok(
crate::misc::TokioRustlsConnector::default()
.push_certs(include_bytes!("SOME_DIRECTORY/root-ca.crt"))
.unwrap()
.connect_without_client_auth(uri.hostname(), stream)
.await
.unwrap(),
)
},
)
.await?;
}
PostgreSQL
The steps for PostgreSQL are almost the same of MySQL. One major difference is the fact that postgresql.conf
(my.cnf
counterpart) is created on the fly instead of being mapped as a volume.
With the above MySQL instructions and the following PostgreSQL snippets an encrypted connection should be properly established.
#!/usr/bin/env bash
echo "Contents of the generated root CA certificate file" > $PGDATA/root-ca.crt
echo "Contents of the generated certificate file" > $PGDATA/cert.pem
echo "Contents of the generated key file" > $PGDATA/cert.pem
chmod 0600 $PGDATA/cert.pem $PGDATA/key.pem
cat >> "$PGDATA/postgresql.conf" <<-EOF
ssl = on
ssl_ca_file = 'root-ca.crt'
ssl_cert_file = 'cert.pem'
ssl_key_file = 'key.pem'
EOF
podman run \
--name SOME_CONTAINER_NAME \
-d \
-e POSTGRES_DB=SOME_DB \
-e POSTGRES_PASSWORD=SOME_PASSWORD \
-p 5432:5432 \
-v SOME_DIRECTORY/setup.sh:/docker-entrypoint-initdb.d/setup.sh \
docker.io/library/postgres:17