-
-
Notifications
You must be signed in to change notification settings - Fork 297
cargo-pgrx: use system certificate store for HTTPS validation #2074
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cargo-pgrx: use system certificate store for HTTPS validation #2074
Conversation
|
thanks! @charmitro , I will try it from my end |
|
From my testing, it worked. I tried the installation with and without the option My OS is Ubuntu24.04.2, rust version is Thanks for the fix @charmitro ! |
Perfect!
Not a problem, it's up to the maintainers now I guess. |
Use `platform-verifier` feature of ureq to validate TLS certificates
against the system's certificate store instead of bundled Mozilla
certificates. This allows cargo-pgrx to work properly with corporate
proxies (both explicit and transparent) that use custom certificate
authorities for SSL inspection.
Previously, cargo-pgrx would fail with:
Error:
0: unable to retrieve https://www.postgresql.org/versions.rss
1: io: invalid peer certificate: UnknownIssuer
when used behind corporate proxies, as it could not validate
certificates signed by corporate CAs. By using the system's trusted
certificate store, we can properly validate these certificates if they
are trusted by the host OS.
Signed-off-by: Charalampos Mitrodimas <[email protected]>
20123f8 to
cd0e1d8
Compare
|
CI issue should be fixed now. Can we re-run the CI? |
Yup. Thanks for the PR. Corporate networks are such a pain and basically impossible for the rest of us to even test/predict. |
Exactly, that's why I asked @tumluliu to test it, for which I'm thankful! |
|
Thanks for your work. Merging this now. I will probably get another pgrx release out this week, so y'all hang tight. |
…ralfoundation#2074) Use `platform-verifier` feature of `ureq` to validate TLS certificates against the system's certificate store instead of bundled Mozilla certificates. This allows cargo-pgrx to work properly with corporate proxies (both explicit and transparent) that use custom certificate authorities for SSL inspection. Signed-off-by: Charalampos Mitrodimas <[email protected]>
Welcome to pgrx v0.15.0. This begins a new series for pgrx that includes support for Postgres 18. As of this release, that means Postgres 18beta1. This release does contain a few breaking API changes but they're largely mechanical. Don't worry, the compiler will let you know! As always, please install our CI tool with `cargo install cargo-pgrx --version 0.15.0 --locked` and then run `cargo pgrx upgrade` in all of your extension crates. If you want to start working with Postgres 18beta1, you'll also need to re-init your pgrx environment with `cargo pgrx init`. That will automatically detect all the latest Postgres versions, including 18beta1. At the top here, I'd like to thank @silver-ymz for the 18beta1 support. It was a pleasant surprise to see that work come from the community -- it's no easy task to add a new Postgres version to pgrx! That said, as Postgres 18 is currently beta, you should consider pgrx' support for it as beta too. Please report any problems with 18beta1 (or discrepancies with other versions) as GitHub issues. Also, this release requires rust v1.88.0 or greater. `if-let` chains are now a thing and we're not afraid to use them. # What's Changed ## Postgres 18beta1 Support * Support Postgres 18beta1 by @silver-ymz in #2056 * pg18 support: add header and implement `#define` by @eeeebbbbrrrr in #2094 * improve pg_magic_func by @usamoi in #2088 ## More Headers * Added `catalog/heap.h` binding by @ccleve in #2072 * include `utils/pg_status.h` by @eeeebbbbrrrr in #2091 ## `cargo-pgrx` improvements * Pass `LLVM_*` variables to `--runas` command by @theory in #2083 * `does_db_exist()`: fix `psql` argument order by @eeeebbbbrrrr in #2093 * `cargo pgrx regress` output is no longer fully buffered by @eeeebbbbrrrr in #2095 * Detect `pgrx_embed` name from lib name by @YohDeadfall in #2035 * Fixed error message if no artifact found by @YohDeadfall in #2034 * `cargo-pgrx`: use system certificate store for HTTPS validation by @charmitro in #2074 * Decoding command output in Windows by @if0ne in #2084 ## Breaking Changes * fix GUC by @usamoi in #2064 * refactor GUC by @usamoi in #2066 ## New Stuff * Added `pg_binary_protocol` attribute to derive send and receive functions for `PostgresType` by @LucaCappelletti94 in #2068 * Expose guc hooks by @thesuhas in #2075 * Allows to create multiple aggregates for the same Rust type by @if0ne in #2078 ## General Code Cleanup * `cargo clippy --fix` by @eeeebbbbrrrr in #2092 * Use `if-let` to unpack Options by @stuhood in #2089 * docs: fix typo in `rust_byte_slice_to_bytea()` docs by @burmecia in #2071 * Added a missing `#[doc(hidden)]` by @LucaCappelletti94 in #2079 ## Administrative * Updated Fedora to latest in CI by @YohDeadfall in #2085 * fix ci on beta rust (1.89) by @usamoi in #2087 ## New Contributors Much thanks to our new contributors! Your work is sincerely appreciated! * @charmitro made their first contribution in #2074 * @thesuhas made their first contribution in #2075 * @if0ne made their first contribution in #2084 * @stuhood made their first contribution in #2089 **Full Changelog**: v0.14.3...v0.15.0
Use
platform-verifierfeature of ureq to validate TLS certificates against the system's certificate store instead of bundled Mozilla certificates. This allows cargo-pgrx to work properly with corporate proxies (both explicit and transparent) that use custom certificate authorities for SSL inspection.Previously, cargo-pgrx would fail with:
when used behind corporate proxies, as it could not validate certificates signed by corporate CAs. By using the system's trusted certificate store, we can properly validate these certificates if they are trusted by the host OS.
Closes #2047