Skip to content

Enable TLS support for PostgreSQL#3831

Merged
mhutchinson merged 2 commits intogoogle:masterfrom
fghanmi:postgresql_tls
Dec 3, 2025
Merged

Enable TLS support for PostgreSQL#3831
mhutchinson merged 2 commits intogoogle:masterfrom
fghanmi:postgresql_tls

Conversation

@fghanmi
Copy link
Copy Markdown
Contributor

@fghanmi fghanmi commented Dec 1, 2025

This PR adds TLS support for PostgreSQL connections in the Trillian server/signer. The key changes include:
Added new flags:

  • postgresql_tls_ca: Path to the CA certificate file for PostgreSQL TLS connection.
  • postgresql_verify_full: Enable full TLS verification for PostgreSQL (sslmode=verify-full). If false, only sslmode=verify-ca is used.

If no TLS configuration is provided, the connection defaults to non-TLS, ensuring backward compatibility.

Tracking issue: #3830

Checklist

@fghanmi fghanmi requested a review from a team as a code owner December 1, 2025 10:29
@fghanmi fghanmi requested a review from AlCutter December 1, 2025 10:29
@roger2hk
Copy link
Copy Markdown
Contributor

roger2hk commented Dec 1, 2025

/gcbrun

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>
Copy link
Copy Markdown
Contributor

@mhutchinson mhutchinson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. @robstradling - over to you as the owner of this code.

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>
@mhutchinson
Copy link
Copy Markdown
Contributor

/gcbrun

Copy link
Copy Markdown
Contributor

@robstradling robstradling left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@mhutchinson mhutchinson merged commit 5b7143d into google:master Dec 3, 2025
12 checks passed
fghanmi added a commit to securesign/trillian that referenced this pull request Dec 4, 2025
This PR adds TLS support for PostgreSQL connections in the Trillian server/signer. The key changes include:
Added new flags:

postgresql_tls_ca: Path to the CA certificate file for PostgreSQL TLS connection.
postgresql_verify_full: Enable full TLS verification for PostgreSQL (sslmode=verify-full). If false, only sslmode=verify-ca is used.
If no TLS configuration is provided, the connection defaults to non-TLS, ensuring backward compatibility.

Tracking issue: google#3830

---------

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>
fghanmi added a commit to securesign/trillian that referenced this pull request Dec 10, 2025
* Enable TLS support for PostgreSQL (google#3831)

This PR adds TLS support for PostgreSQL connections in the Trillian server/signer. The key changes include:
Added new flags:

postgresql_tls_ca: Path to the CA certificate file for PostgreSQL TLS connection.
postgresql_verify_full: Enable full TLS verification for PostgreSQL (sslmode=verify-full). If false, only sslmode=verify-ca is used.
If no TLS configuration is provided, the connection defaults to non-TLS, ensuring backward compatibility.

Tracking issue: google#3830

---------

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>

* update trillian server/signer pipelines on-cel-expression

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>

---------

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>
himaschal pushed a commit to digicert/trillian that referenced this pull request Jan 23, 2026
This PR adds TLS support for PostgreSQL connections in the Trillian server/signer. The key changes include:
Added new flags:

postgresql_tls_ca: Path to the CA certificate file for PostgreSQL TLS connection.
postgresql_verify_full: Enable full TLS verification for PostgreSQL (sslmode=verify-full). If false, only sslmode=verify-ca is used.
If no TLS configuration is provided, the connection defaults to non-TLS, ensuring backward compatibility.

Tracking issue: google#3830

---------

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants