You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
OpenJDK will use the default truststore if user don't supply any truststore configuretion. And seems corretto also tries to do so but something weird happens. It cannot open the path /etc/pki/java/cacerts in Lambda.
Screenshots
If applicable, add screenshots to help explain your problem.
Platform information
OS: [e.g. Amazon Linux 2]
Version [e.g. "11.0.1+13-1" (output from "java -version")]
Additional context
Actually, last year, a same bug is reported corretto/corretto-8#320, it is closed as there is a "solution". But I can't agree. Although setting sslMode=REQUIRED could establish connection successfully, but it won't check the server's cert or even host name. This is not what I want and expose users to MITM problems.
The text was updated successfully, but these errors were encountered:
hi, @zhangyangyu ,
I think your question is more like how to use lambda java runtime rather than Correto.
I will try to seek helps from colleagues who are familiar with this domain. stay tuned.
Describe the bug
When trying to connect to a MySQL server using MySQL Connector/J 8.0.29 using TLS connection like:
sslMode=VERIFY_IDENTITY&enabledTLSProtocols=TLSv1.2,TLSv1.3
it throws:
To Reproduce
Just connect to a MySQL Server enables TLS using the settings above.
You can also check template https://github.com/pingcap-inc/tidb-appflow-integration/blob/main/template.yml#L11.
Expected behavior
OpenJDK will use the default truststore if user don't supply any truststore configuretion. And seems corretto also tries to do so but something weird happens. It cannot open the path
/etc/pki/java/cacerts
in Lambda.Screenshots
If applicable, add screenshots to help explain your problem.
Platform information
Additional context
Actually, last year, a same bug is reported corretto/corretto-8#320, it is closed as there is a "solution". But I can't agree. Although setting
sslMode=REQUIRED
could establish connection successfully, but it won't check the server's cert or even host name. This is not what I want and expose users to MITM problems.The text was updated successfully, but these errors were encountered: