shipfeedAI news, curated daily

01:16:33 CET
21 MAY01:16:33shipfeed
pull to refreshlast sync
Just in — 30 new
§ feed · storyline

Postgres connections now work through Sandbox firewall

Vercel Sandbox firewall adds support for Postgres connections by detecting the protocol's TCP-to-TLS upgrade sequence before applying domain-based access rules.

May 1 · · primary fetch1 sourceupdated May 1 ·

can now connect to hosted Postgres databases, including , , , , and . To enable a connection, add the database host to your Sandbox's allowed domains.Vercel SandboxNeonSupabaseAWS RDSNilePrisma Postgres When is used with Vercel Sandbox, the sandbox firewall restricts outbound network access by checking the domain name during a connection's TLS handshake. This works seamlessly for HTTPS traffic, where the domain is visible at the start of the connection.SNI based filtering Postgres, however, negotiates TLS differently. A Postgres client first opens a plain TCP connection and upgrades to TLS. Because the domain isn't available when the firewall first needs it, Postgres connections through a standard domain-restricted Sandbox would fail.then The Sandbox firewall now adjusts for the Postgres TLS negotiation flow.

It detects the protocol's startup sequence, waits for the TLS upgrade, and then applies your domain policy before forwarding the connection to the database. No changes are needed to your code or database configuration. Here's a full example: create a Sandbox, install a Postgres client, lock down the network to only the database host, and run a query. Learn more about the…

read full article on vercel.com
§ sources1 publication · timeline below
  1. vercel.comPostgres connections now work through Sandbox firewallprimary