-
Notifications
You must be signed in to change notification settings - Fork 847
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RedShift doesn't support ssl_renegotiation_limit #321
Comments
I'd prefer to avoid needing named modes for "almost PostgreSQL" servers. It's not the end of the world, but if possible I'd prefer to expose settings that can configure the connection to be compatible with various servers. See also #320 for more discussion of connecting to "almost PostgreSQL" servers. In RedShift's case there are 2 issues. The first is the inability to connect due to the At the time Go did not support renegotiation at all. But now Go at least has partial opt-in support. I don't know if it is sufficient. If not, there's nothing we can do. But if it is, then there is a clean solution. The only reason we send So I guess all we need to do is remove the default startup parameter message. Anyone who really needs it can easily add it back with If we go this route it might be worth adding documentation next to the current SSL explanation regarding renegotiate and RedShift. |
This addresses jackc#321 with the fix @jackc proposed there. Redshift users that need to connect w/ SSL currently fork the library to delete this parameter, e.g. segmentio@8e0028d And, that's annoying to keep up-to-date :)
Sent a PR with your proposal :) #476 |
This addresses jackc#321 with the fix @jackc proposed there. Redshift users that need to connect w/ SSL currently fork the library to delete this parameter, e.g. segmentio@8e0028d And, that's annoying to keep up-to-date :)
This addresses jackc#321 with the fix @jackc proposed there. Redshift users that need to connect w/ SSL currently fork the library to delete this parameter, e.g. segmentio@8e0028d And, that's annoying to keep up-to-date :)
This addresses jackc#321 with the fix @jackc proposed there. Redshift users that need to connect w/ SSL currently fork the library to delete this parameter, e.g. segmentio@8e0028d And, that's annoying to keep up-to-date :)
Fixed in PR #476. |
(Originally mentioned in #282)
pgx can't connect to a RedShift cluster when the cluster is configured to require SSL. The patch below illustrates a workaround, not a fix; there should be a more thoughtful way to approach this problem.
As RedShift inevitably continues to diverge from Postgres, it might make sense to add a new query parameter to the data source name parser. For example,
redshift=true
. This could be translated to a boolean field of theConnConfig
struct, made available for future RedShift-specific workarounds. If that sounds like a good idea, I'll be happy to write a PR.RedShift have so far not committed to a fix, but at least someone there is aware of the problem.
https://forums.aws.amazon.com/thread.jspa?threadID=229990
The text was updated successfully, but these errors were encountered: