Results 56 comments of SSebo

I made a PR to opensrv-mysql to support MySQL TLS https://github.com/datafuselabs/opensrv/pull/34

@killme2008 Should this timeout config be in a config file? or in a DB `system` table?

@waynexia I dig around, found this function: https://github.com/GreptimeTeam/greptimedb/blob/57979c9d3dba13beef5d63b4dc73fa1b3281e7e6/src/storage/src/flush.rs#L37 Should we add a new `FlushStrategy` like `EventBasedStrategy` which holding a channel receiver be good? And this strategy also can be composed...

https://github.com/vthriller/promql this crate may be useful, but seems out dated.

How about add `UserConfig` struct with all other configs as attributes in it ?

@sunng87 @MichaelScofield Lack of testing for now. Can I add integration test which use `mysql-client` to execute `echo "SELECT * FROM foo" | mysql -h 127.0.0.1 --table --ssl-mode=REQUIRED` for mysql,...

> @SSebo Is ssl supported in those client libraries we are using for testing? Using `mysql-client` for testing will add more dependencies in our build and CI requirements, which is...

@sunng87 I found there is no way to force pgwire to reject connect if TlsAcceptor is supplied but client want to connect normally. This is used for `TlsMode::Require` https://github.com/sunng87/pgwire/pull/22

@sunng87 Since we should handle the plain client connect to secure required server as the real server, how about we put the logic in `opensrv-mysql` and `pgwire`. Every user who...

@sunng87 mysql and pg both covered by unit test.