mirror of
https://github.com/oven-sh/bun
synced 2026-02-10 02:48:50 +00:00
### What does this PR do? Fixes https://github.com/oven-sh/bun/issues/22312 Fixes https://github.com/oven-sh/bun/issues/22313 The correct flow for TLS handshaking is: Server sending [Protocol::Handshake](https://dev.mysql.com/doc/dev/mysql-server/8.4.5/page_protocol_connection_phase_packets_protocol_handshake.html) Client replying with [Protocol::SSLRequest:](https://dev.mysql.com/doc/dev/mysql-server/8.4.5/page_protocol_connection_phase_packets_protocol_ssl_request.html) The usual SSL exchange leading to establishing SSL connection Client sends [Protocol::HandshakeResponse:](https://dev.mysql.com/doc/dev/mysql-server/8.4.5/page_protocol_connection_phase_packets_protocol_handshake_response.html) <img width="460" height="305" alt="Screenshot 2025-09-03 at 15 02 25" src="https://github.com/user-attachments/assets/091bbc54-75bc-44ac-98b8-5996e8d69ed8" /> Source: https://dev.mysql.com/doc/dev/mysql-server/8.4.5/page_protocol_connection_phase.html ### How did you verify your code works? Tests --------- Co-authored-by: autofix-ci[bot] <114827586+autofix-ci[bot]@users.noreply.github.com>
8 lines
193 B
INI
8 lines
193 B
INI
[mysqld]
|
|
require_secure_transport=ON
|
|
ssl_ca=/etc/mysql/ssl/ca.pem
|
|
ssl_cert=/etc/mysql/ssl/server-cert.pem
|
|
ssl_key=/etc/mysql/ssl/server-key.pem
|
|
tls_version=TLSv1.2,TLSv1.3
|
|
skip_name_resolve=ON
|