Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(postgres): ssl for postgres #2473

Open
wants to merge 44 commits into
base: main
Choose a base branch
from

Conversation

bearrito
Copy link
Contributor

@bearrito bearrito commented Apr 8, 2024

What does this PR do?

Enables SSL for postgres

The main thing to recognize when reviewing this is that the secret material must be owned by the postgres user.
The docker file copy api doesn't allowfor setting a user when copying. The only way I could think was to take wrap the entrypoint script with one that does what we want.

Why is it important?

User ran into issue trying to use SSL. It's not obviously supported (able) due to file permissions.

Related issues

Link related issues below. Insert the issue link or reference after the word "Closes" if merging this should automatically close it.

How to test this PR

Unit tests will work when complete.

@bearrito bearrito requested a review from a team as a code owner April 8, 2024 18:45
Copy link

netlify bot commented Apr 8, 2024

Deploy Preview for testcontainers-go ready!

Name Link
🔨 Latest commit e980a90
🔍 Latest deploy log https://app.netlify.com/sites/testcontainers-go/deploys/676b533dd45e9900083bdc39
😎 Deploy Preview https://deploy-preview-2473--testcontainers-go.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@bearrito bearrito changed the title [DRAFT] feat:SSL for postgres feat:SSL for postgres Apr 8, 2024
Copy link
Member

@mdelapenya mdelapenya left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We are in the right track with this one, although I left some comments that need to be addressed.

Besides that, we need to include the new option in the docs. Please check the docs/modules/postgres.md file for that. Remember adding this right after the option title:

- Not available until the next release of testcontainers-go <a href="https://github.com/testcontainers/testcontainers-go"><span class="tc-version">:material-tag: main</span></a>

Thanks!

modules/postgres/postgres_test.go Outdated Show resolved Hide resolved
modules/postgres/postgres.go Outdated Show resolved Hide resolved
modules/postgres/options.go Outdated Show resolved Hide resolved
@mdelapenya
Copy link
Member

@bearrito could you please take a look at #2478? I'm adding helper code to deal with TLS certificates in order to simplify the story for the client code. Wdyt?

@bearrito
Copy link
Contributor Author

bearrito commented Apr 10, 2024

@mdelapenya That makes a lot of sense. Much cleaner.

Do you want me to wait until that's done then base this on top of that?

@mdelapenya
Copy link
Member

@bearrito I went ahead and extracted the TLS cert generation to a separate go package, which makes more sense: https://github.com/mdelapenya/tlscert

Please take a look and use it as you need here!

@bearrito
Copy link
Contributor Author

@mdelapenya Updated to use your package.

Copy link
Member

@mdelapenya mdelapenya left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just one final concern regarding the entrypoint: do you think we need to pass it? Or is it something we can internally handle in the module, being transparent to the end users?

modules/postgres/go.mod Outdated Show resolved Hide resolved
modules/postgres/testdata/docker-entrypoint-ssl.bash Outdated Show resolved Hide resolved
@bearrito
Copy link
Contributor Author

@mdelapenya Update so that the entrypoint is coupled with the ssl settings. What about doing something similar for the conf file?

@bearrito
Copy link
Contributor Author

@mdelapenya added docs.

@bearrito
Copy link
Contributor Author

@mdelapenya Anything else on this? I'm going on holiday and am closing out my open pr's

Copy link
Member

@mdelapenya mdelapenya left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for the late response :(

I think we are close to make it into the project, but let's clarify the custom entry point, as I'm not sure if I understand its use case properly

Thanks!

os.RemoveAll(tmpDir)
})

caCert := tlscert.SelfSignedFromRequest(tlscert.Request{
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

modules/postgres/resources/customEntrypoint.sh Outdated Show resolved Hide resolved
@mdelapenya
Copy link
Member

@stevenh with the latest merges, I think we can prioritise this one using the new approach for TLS, wdyt?

@bearrito
Copy link
Contributor Author

@stevenh with the latest merges, I think we can prioritise this one using the new approach for TLS, wdyt?

I dropped off from this for a while. Two questions

  1. Is the PR still valid?
  2. Are there merged changes that invalidate any of the approaches?

Copy link
Collaborator

@stevenh stevenh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't believe we can use the new SSL wait as this container doesn't have the option to generate its own certs?

Assuming that's the case I've done review pass, so we can get this moving.

Comment on lines 219 to 225
expectedFiles := []string{sslSettings.CACertFile, sslSettings.CertFile, sslSettings.KeyFile}
for _, expectedFile := range expectedFiles {
_, err := os.Stat(expectedFile)
if err != nil {
return err
}
}
Copy link
Collaborator

@stevenh stevenh Dec 23, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggestion: I don't believe this is needed as it would caught by the copy handler, see full suggestion below.

modules/postgres/postgres_test.go Outdated Show resolved Hide resolved
modules/postgres/postgres_test.go Show resolved Hide resolved
modules/postgres/postgres_test.go Outdated Show resolved Hide resolved
modules/postgres/postgres_test.go Outdated Show resolved Hide resolved
modules/postgres/options.go Outdated Show resolved Hide resolved
modules/postgres/options.go Outdated Show resolved Hide resolved
modules/postgres/postgres.go Outdated Show resolved Hide resolved
modules/postgres/postgres.go Outdated Show resolved Hide resolved
modules/postgres/postgres.go Outdated Show resolved Hide resolved
Copy link
Collaborator

@stevenh stevenh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the changes, there's some outstanding bits needed to complete the switch to parameters, think I've caught them all in this pass.

modules/postgres/options.go Outdated Show resolved Hide resolved
modules/postgres/postgres_test.go Outdated Show resolved Hide resolved
modules/postgres/postgres_test.go Outdated Show resolved Hide resolved
modules/postgres/resources/customEntrypoint.sh Outdated Show resolved Hide resolved
modules/postgres/options.go Outdated Show resolved Hide resolved
@bearrito bearrito changed the title feat:SSL for postgres feat(postgres):SSL for postgres Dec 24, 2024
@bearrito bearrito changed the title feat(postgres):SSL for postgres feat(postgres): SSL for postgres Dec 24, 2024
@bearrito bearrito changed the title feat(postgres): SSL for postgres feat(postgres): ssl for postgres Dec 24, 2024
@bearrito
Copy link
Contributor Author

Addressed latest.

Copy link
Collaborator

@stevenh stevenh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the fast turnaround on the changes, looks good to me, happy holidays!

@bearrito
Copy link
Contributor Author

@mdelapenya Is this good to go from your end?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Bug]: File permissions with custom PostgreSQL image
3 participants