Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
41 changes: 22 additions & 19 deletions common/persistence/sql/sqlplugin/postgresql/session/session.go
Original file line number Diff line number Diff line change
Expand Up @@ -91,25 +91,7 @@ func buildDSN(
}

func buildDSNAttr(cfg *config.SQL) url.Values {
parameters := url.Values{}
if cfg.TLS != nil && cfg.TLS.Enabled {
if !cfg.TLS.EnableHostVerification {
parameters.Set(sslMode, sslModeRequire)
} else {
parameters.Set(sslMode, sslModeFull)
}

if cfg.TLS.CaFile != "" {
parameters.Set(sslCA, cfg.TLS.CaFile)
}
if cfg.TLS.KeyFile != "" && cfg.TLS.CertFile != "" {
parameters.Set(sslKey, cfg.TLS.KeyFile)
parameters.Set(sslCert, cfg.TLS.CertFile)
}
} else {
parameters.Set(sslMode, sslModeNoop)
}

parameters := make(url.Values, len(cfg.ConnectAttributes))
for k, v := range cfg.ConnectAttributes {
key := strings.TrimSpace(k)
value := strings.TrimSpace(v)
Expand All @@ -122,5 +104,26 @@ func buildDSNAttr(cfg *config.SQL) url.Values {
}
parameters.Set(key, value)
}

if cfg.TLS != nil && cfg.TLS.Enabled {
if parameters.Get(sslMode) == "" {
if cfg.TLS.EnableHostVerification {
parameters.Set(sslMode, sslModeFull)
} else {
parameters.Set(sslMode, sslModeRequire)
}
}

if parameters.Get(sslCA) == "" && cfg.TLS.CaFile != "" {
parameters.Set(sslCA, cfg.TLS.CaFile)
}
if parameters.Get(sslKey) == "" && cfg.TLS.KeyFile != "" && parameters.Get(sslCert) == "" && cfg.TLS.CertFile != "" {
parameters.Set(sslKey, cfg.TLS.KeyFile)
parameters.Set(sslCert, cfg.TLS.CertFile)
}
} else if parameters.Get(sslMode) == "" {
parameters.Set(sslMode, sslModeNoop)
}

return parameters
}
163 changes: 163 additions & 0 deletions common/persistence/sql/sqlplugin/postgresql/session/session_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,163 @@
package session

import (
"net/url"
"testing"

"github.com/stretchr/testify/require"
"go.temporal.io/server/common/auth"
"go.temporal.io/server/common/config"
)

func TestBuildDSNAttr_NoTLS_NoConnectAttributes(t *testing.T) {
cfg := &config.SQL{}
result := buildDSNAttr(cfg)
require.Equal(t, "disable", result.Get(sslMode), "should default to sslmode=disable when no TLS and no connect attributes")
}

func TestBuildDSNAttr_TLSEnabled_NoHostVerification(t *testing.T) {
cfg := &config.SQL{
TLS: &auth.TLS{
Enabled: true,
EnableHostVerification: false,
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "require", result.Get(sslMode), "should set sslmode=require when TLS enabled without host verification")
}

func TestBuildDSNAttr_TLSEnabled_WithHostVerification(t *testing.T) {
cfg := &config.SQL{
TLS: &auth.TLS{
Enabled: true,
EnableHostVerification: true,
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "verify-full", result.Get(sslMode), "should set sslmode=verify-full when TLS enabled with host verification")
}

func TestBuildDSNAttr_TLSEnabled_WithCertificates(t *testing.T) {
cfg := &config.SQL{
TLS: &auth.TLS{
Enabled: true,
EnableHostVerification: true,
CaFile: "/path/to/ca.crt",
CertFile: "/path/to/client.crt",
KeyFile: "/path/to/client.key",
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "verify-full", result.Get(sslMode))
require.Equal(t, "/path/to/ca.crt", result.Get(sslCA))
require.Equal(t, "/path/to/client.crt", result.Get(sslCert))
require.Equal(t, "/path/to/client.key", result.Get(sslKey))
}

func TestBuildDSNAttr_CustomSSLMode_PreferredOverDisable(t *testing.T) {
cfg := &config.SQL{
ConnectAttributes: map[string]string{
"sslmode": "verify-ca",
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "verify-ca", result.Get(sslMode), "should use custom sslmode instead of default disable")
}

func TestBuildDSNAttr_TLSEnabledButCustomSSLModeInAttributes_PreferredOverDisable(t *testing.T) {
cfg := &config.SQL{
TLS: &auth.TLS{
Enabled: true,
EnableHostVerification: true,
},
ConnectAttributes: map[string]string{
"sslmode": "verify-ca",
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "verify-ca", result.Get(sslMode), "should use custom sslmode instead of default disable")
}

func TestBuildDSNAttr_ConnectAttributes(t *testing.T) {
cfg := &config.SQL{
ConnectAttributes: map[string]string{
"connect_timeout": "10",
"application_name": "temporal",
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "10", result.Get("connect_timeout"))
require.Equal(t, "temporal", result.Get("application_name"))
require.Equal(t, "disable", result.Get(sslMode), "should still set default sslmode")
}

func TestBuildDSNAttr_ConnectAttributesWithSpaces(t *testing.T) {
cfg := &config.SQL{
ConnectAttributes: map[string]string{
" application_name ": " temporal ",
},
}
result := buildDSNAttr(cfg)
require.Equal(t, "temporal", result.Get("application_name"), "should trim spaces from key and value")
}

func TestBuildDSNAttr_DuplicateConnectAttribute_Panics(t *testing.T) {
cfg := &config.SQL{
TLS: &auth.TLS{
Enabled: true,
EnableHostVerification: true,
},
ConnectAttributes: map[string]string{
"sslmode": "require",
"sslmode ": "verify-full",
},
}
require.Panics(t, func() {
buildDSNAttr(cfg)
}, "Should panic when duplicate keys are detected")
}

func TestBuildDSN(t *testing.T) {
cfg := &config.SQL{
User: "testuser",
Password: "testpass",
ConnectAddr: "localhost:5432",
DatabaseName: "testdb",
ConnectAttributes: map[string]string{
"connect_timeout": "10",
},
}
mockResolver := &mockServiceResolver{addr: "localhost:5432"}
result := buildDSN(cfg, mockResolver)
u, err := url.Parse(result)
require.NoError(t, err)
require.Equal(t, "postgres", u.Scheme)
require.Equal(t, "testuser:testpass", u.User.String())
require.Equal(t, "localhost:5432", u.Host)
require.Equal(t, "/testdb", u.Path)
require.Equal(t, "10", u.Query().Get("connect_timeout"))
require.Equal(t, "disable", u.Query().Get("sslmode"))
}

func TestBuildDSN_PasswordEscaping(t *testing.T) {
cfg := &config.SQL{
User: "testuser",
Password: "p@ss:w/rd&special",
ConnectAddr: "localhost:5432",
DatabaseName: "testdb",
}
mockResolver := &mockServiceResolver{addr: "localhost:5432"}
result := buildDSN(cfg, mockResolver)
parsed, err := url.Parse(result)
require.NoError(t, err)
password, _ := parsed.User.Password()
require.Equal(t, "p@ss:w/rd&special", password, "password should be properly escaped and parsed")
}

type mockServiceResolver struct {
addr string
}

func (m *mockServiceResolver) Resolve(addr string) []string {
return []string{m.addr}
}
Loading