Merge pull request #91 from stabacov/master

Fixes MySQL custom TLS connection failure.
This commit is contained in:
Dale Hui 2018-08-15 00:03:14 -07:00 committed by GitHub
commit 8ed902364c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 25 additions and 16 deletions

View File

@ -10,9 +10,10 @@
| `password` | | The user's password | | `password` | | The user's password |
| `host` | | The host to connect to. | | `host` | | The host to connect to. |
| `port` | | The port to bind to. | | `port` | | The port to bind to. |
| `x-tls-ca` | | The location of the root certificate file. | | `tls` | | TLS / SSL encrypted connection parameter; see [go-sql-driver](https://github.com/go-sql-driver/mysql#tls). Use any name (e.g. `migrate`) if you want to use a custom TLS config (`x-tls-` queries). |
| `x-tls-cert` | | Cert file location. | | `x-tls-ca` | | The location of the CA (certificate authority) file. |
| `x-tls-key` | | Key file location. | | `x-tls-cert` | | The location of the client certicicate file. Must be used with `x-tls-key`. |
| `x-tls-key` | | The location of the private key file. Must be used with `x-tls-cert`. |
| `x-tls-insecure-skip-verify` | | Whether or not to use SSL (true\|false) | | `x-tls-insecure-skip-verify` | | Whether or not to use SSL (true\|false) |
## Use with existing client ## Use with existing client

View File

@ -35,6 +35,7 @@ var (
ErrNilConfig = fmt.Errorf("no config") ErrNilConfig = fmt.Errorf("no config")
ErrNoDatabaseName = fmt.Errorf("no database name") ErrNoDatabaseName = fmt.Errorf("no database name")
ErrAppendPEM = fmt.Errorf("failed to append PEM") ErrAppendPEM = fmt.Errorf("failed to append PEM")
ErrTLSCertKeyConfig = fmt.Errorf("To use TLS client authentication, both x-tls-cert and x-tls-key must not be empty")
) )
type Config struct { type Config struct {
@ -123,15 +124,6 @@ func (m *Mysql) Open(url string) (database.Driver, error) {
q.Set("multiStatements", "true") q.Set("multiStatements", "true")
purl.RawQuery = q.Encode() purl.RawQuery = q.Encode()
c, err := urlToMySQLConfig(*migrate.FilterCustomQuery(purl))
if err != nil {
return nil, err
}
db, err := sql.Open("mysql", c.FormatDSN())
if err != nil {
return nil, err
}
migrationsTable := purl.Query().Get("x-migrations-table") migrationsTable := purl.Query().Get("x-migrations-table")
if len(migrationsTable) == 0 { if len(migrationsTable) == 0 {
migrationsTable = DefaultMigrationsTable migrationsTable = DefaultMigrationsTable
@ -151,10 +143,17 @@ func (m *Mysql) Open(url string) (database.Driver, error) {
return nil, ErrAppendPEM return nil, ErrAppendPEM
} }
certs, err := tls.LoadX509KeyPair(purl.Query().Get("x-tls-cert"), purl.Query().Get("x-tls-key")) clientCert := make([]tls.Certificate, 0, 1)
if ccert, ckey := purl.Query().Get("x-tls-cert"), purl.Query().Get("x-tls-key"); ccert != "" || ckey != "" {
if ccert == "" || ckey == "" {
return nil, ErrTLSCertKeyConfig
}
certs, err := tls.LoadX509KeyPair(ccert, ckey)
if err != nil { if err != nil {
return nil, err return nil, err
} }
clientCert = append(clientCert, certs)
}
insecureSkipVerify := false insecureSkipVerify := false
if len(purl.Query().Get("x-tls-insecure-skip-verify")) > 0 { if len(purl.Query().Get("x-tls-insecure-skip-verify")) > 0 {
@ -167,12 +166,21 @@ func (m *Mysql) Open(url string) (database.Driver, error) {
mysql.RegisterTLSConfig(ctls, &tls.Config{ mysql.RegisterTLSConfig(ctls, &tls.Config{
RootCAs: rootCertPool, RootCAs: rootCertPool,
Certificates: []tls.Certificate{certs}, Certificates: clientCert,
InsecureSkipVerify: insecureSkipVerify, InsecureSkipVerify: insecureSkipVerify,
}) })
} }
} }
c, err := urlToMySQLConfig(*migrate.FilterCustomQuery(purl))
if err != nil {
return nil, err
}
db, err := sql.Open("mysql", c.FormatDSN())
if err != nil {
return nil, err
}
mx, err := WithInstance(db, &Config{ mx, err := WithInstance(db, &Config{
DatabaseName: purl.Path, DatabaseName: purl.Path,
MigrationsTable: migrationsTable, MigrationsTable: migrationsTable,