Hi,
has anyone used Fusionauth in Traefik to secure container access through forwardauth middleware?
https://doc.traefik.io/traefik/v2.4/middlewares/forwardauth/
trying to figure out right now how to do this.
br Michael
Hi,
has anyone used Fusionauth in Traefik to secure container access through forwardauth middleware?
https://doc.traefik.io/traefik/v2.4/middlewares/forwardauth/
trying to figure out right now how to do this.
br Michael
you can add to the database_url: ?ssl=true&sslmode=require (pick the mode you actually require)
if your server supports tls1.3+ you should force 1.2 on the client:
FUSIONAUTH_APP_ADDITIONAL_JAVA_ARGS="-Djdk.tls.client.protocols=TLSv1.2"
(https://fusionauth.io/community/forum/topic/938/secure-db-connection-with-tls-1-3/4?_=1629097757303)
 no worries around it.
 no worries around it.
Cockroach itself provides great support to run within kubernetes / running in multiple availability zones with automated sharding. (not the average use case^^)
whenever it will be fixed on the cockroach side https://github.com/cockroachdb/cockroach/issues/40963?version=v20.2 then I will of course report here if it works.
So far we are using fusionauth with cockroachdb and this is the only error that has pooped up till now.
Would it be possible to change the Query to something like:
DELETE FROM 
  user_registrations_application_roles 
WHERE 
  user_registrations_id IN 
    (
      SELECT 
        user_registrations.id
      FROM
        user_registrations
      WHERE
        user_registrations.id = user_registrations_application_roles.application_roles_id
        (...)
    )
So far we are using fusionauth with cockroachdb as our database. PW Logins are working.
Right now the only remaining problem we see is with:
DELETE
      FROM user_registrations_application_roles USING user_registrations
      WHERE user_registrations_application_roles.user_registrations_id = user_registrations.id AND (...)
      ^
  Hint: You have attempted to use a feature that is not yet implemented.
See: https://go.crdb.dev/issue-v/40963/v20.2
I cannot see the remainder of the query, but would it be possible to remove the "USING"?
Solved by:
        - name: FUSIONAUTH_APP_ADDITIONAL_JAVA_ARGS
          value: "-Djdk.tls.client.protocols=TLSv1.2"
I am trying to connect to a postgres db system with ssl, the tls1.3 config seems to have something in the certificate so that the handshake fails (all other clients I use with nodejs and python work with it)
jdbc:postgresql://hostname:26257/fusionauth?ssl=true
so far it seems like openjdk had a bug with this https://bugs.openjdk.java.net/browse/JDK-8236039
any ideas of how to solve it?
Caused by: javax.net.ssl.SSLHandshakeException: extension (5) should not be presented in certificate_request
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:312)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:268)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:259)
at java.base/sun.security.ssl.SSLExtensions.<init>(SSLExtensions.java:90)
at java.base/sun.security.ssl.CertificateRequest$T13CertificateRequestMessage.<init>(CertificateRequest.java:819)
at java.base/sun.security.ssl.CertificateRequest$T13CertificateRequestConsumer.consume(CertificateRequest.java:923)
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:396)
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:445)
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:423)
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:182)
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:167)
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1462)
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1370)
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:437)
at org.postgresql.ssl.MakeSSL.convert(MakeSSL.java:41)