Struct sqlx_postgres::PgConnectOptions
source · pub struct PgConnectOptions { /* private fields */ }
Expand description
Options and flags which can be used to configure a PostgreSQL connection.
A value of PgConnectOptions
can be parsed from a connection URL,
as described by libpq.
The general form for a connection URL is:
postgresql://[user[:password]@][host][:port][/dbname][?param1=value1&...]
This type also implements FromStr
so you can parse it from a string
containing a connection URL and then further adjust options if necessary (see example below).
§Parameters
Parameter | Default | Description |
---|---|---|
sslmode | prefer | Determines whether or with what priority a secure SSL TCP/IP connection will be negotiated. See PgSslMode . |
sslrootcert | None | Sets the name of a file containing a list of trusted SSL Certificate Authorities. |
statement-cache-capacity | 100 | The maximum number of prepared statements stored in the cache. Set to 0 to disable. |
host | None | Path to the directory containing a PostgreSQL unix domain socket, which will be used instead of TCP if set. |
hostaddr | None | Same as host , but only accepts IP addresses. |
application-name | None | The name will be displayed in the pg_stat_activity view and included in CSV log entries. |
user | result of whoami | PostgreSQL user name to connect as. |
password | None | Password to be used if the server demands password authentication. |
port | 5432 | Port number to connect to at the server host, or socket file name extension for Unix-domain connections. |
dbname | None | The database name. |
options | None | The runtime parameters to send to the server at connection start. |
The URL scheme designator can be either postgresql://
or postgres://
.
Each of the URL parts is optional.
postgresql://
postgresql://localhost
postgresql://localhost:5433
postgresql://localhost/mydb
postgresql://user@localhost
postgresql://user:secret@localhost
postgresql://localhost?dbname=mydb&user=postgres&password=postgres
§Example
use sqlx::{Connection, ConnectOptions};
use sqlx::postgres::{PgConnectOptions, PgConnection, PgPool, PgSslMode};
// URL connection string
let conn = PgConnection::connect("postgres://localhost/mydb").await?;
// Manually-constructed options
let conn = PgConnectOptions::new()
.host("secret-host")
.port(2525)
.username("secret-user")
.password("secret-password")
.ssl_mode(PgSslMode::Require)
.connect()
.await?;
// Modifying options parsed from a string
let mut opts: PgConnectOptions = "postgres://localhost/mydb".parse()?;
// Change the log verbosity level for queries.
// Information about SQL queries is logged at `DEBUG` level by default.
opts = opts.log_statements(log::LevelFilter::Trace);
let pool = PgPool::connect_with(&opts).await?;
Implementations§
source§impl PgConnectOptions
impl PgConnectOptions
sourcepub fn new() -> Self
pub fn new() -> Self
Creates a new, default set of options ready for configuration.
By default, this reads the following environment variables and sets their equivalent options.
PGHOST
PGPORT
PGUSER
PGPASSWORD
PGDATABASE
PGSSLROOTCERT
PGSSLCERT
PGSSLKEY
PGSSLMODE
PGAPPNAME
§Example
let options = PgConnectOptions::new();
pub fn new_without_pgpass() -> Self
sourcepub fn host(self, host: &str) -> Self
pub fn host(self, host: &str) -> Self
Sets the name of the host to connect to.
If a host name begins with a slash, it specifies Unix-domain communication rather than TCP/IP communication; the value is the name of the directory in which the socket file is stored.
The default behavior when host is not specified, or is empty, is to connect to a Unix-domain socket
§Example
let options = PgConnectOptions::new()
.host("localhost");
sourcepub fn port(self, port: u16) -> Self
pub fn port(self, port: u16) -> Self
Sets the port to connect to at the server host.
The default port for PostgreSQL is 5432
.
§Example
let options = PgConnectOptions::new()
.port(5432);
sourcepub fn socket(self, path: impl AsRef<Path>) -> Self
pub fn socket(self, path: impl AsRef<Path>) -> Self
Sets a custom path to a directory containing a unix domain socket, switching the connection method from TCP to the corresponding socket.
By default set to None
.
sourcepub fn username(self, username: &str) -> Self
pub fn username(self, username: &str) -> Self
Sets the username to connect as.
Defaults to be the same as the operating system name of the user running the application.
§Example
let options = PgConnectOptions::new()
.username("postgres");
sourcepub fn password(self, password: &str) -> Self
pub fn password(self, password: &str) -> Self
Sets the password to use if the server demands password authentication.
§Example
let options = PgConnectOptions::new()
.username("root")
.password("safe-and-secure");
sourcepub fn database(self, database: &str) -> Self
pub fn database(self, database: &str) -> Self
Sets the database name. Defaults to be the same as the user name.
§Example
let options = PgConnectOptions::new()
.database("postgres");
sourcepub fn ssl_mode(self, mode: PgSslMode) -> Self
pub fn ssl_mode(self, mode: PgSslMode) -> Self
Sets whether or with what priority a secure SSL TCP/IP connection will be negotiated with the server.
By default, the SSL mode is Prefer
, and the client will
first attempt an SSL connection but fallback to a non-SSL connection on failure.
Ignored for Unix domain socket communication.
§Example
let options = PgConnectOptions::new()
.ssl_mode(PgSslMode::Require);
sourcepub fn ssl_root_cert(self, cert: impl AsRef<Path>) -> Self
pub fn ssl_root_cert(self, cert: impl AsRef<Path>) -> Self
Sets the name of a file containing SSL certificate authority (CA) certificate(s). If the file exists, the server’s certificate will be verified to be signed by one of these authorities.
§Example
let options = PgConnectOptions::new()
// Providing a CA certificate with less than VerifyCa is pointless
.ssl_mode(PgSslMode::VerifyCa)
.ssl_root_cert("./ca-certificate.crt");
sourcepub fn ssl_client_cert(self, cert: impl AsRef<Path>) -> Self
pub fn ssl_client_cert(self, cert: impl AsRef<Path>) -> Self
Sets the name of a file containing SSL client certificate.
§Example
let options = PgConnectOptions::new()
// Providing a CA certificate with less than VerifyCa is pointless
.ssl_mode(PgSslMode::VerifyCa)
.ssl_client_cert("./client.crt");
sourcepub fn ssl_client_cert_from_pem(self, cert: impl AsRef<[u8]>) -> Self
pub fn ssl_client_cert_from_pem(self, cert: impl AsRef<[u8]>) -> Self
Sets the SSL client certificate as a PEM-encoded byte slice.
This should be an ASCII-encoded blob that starts with -----BEGIN CERTIFICATE-----
.
§Example
Note: embedding SSL certificates and keys in the binary is not advised. This is for illustration purposes only.
const CERT: &[u8] = b"\
-----BEGIN CERTIFICATE-----
<Certificate data here.>
-----END CERTIFICATE-----";
let options = PgConnectOptions::new()
// Providing a CA certificate with less than VerifyCa is pointless
.ssl_mode(PgSslMode::VerifyCa)
.ssl_client_cert_from_pem(CERT);
sourcepub fn ssl_client_key(self, key: impl AsRef<Path>) -> Self
pub fn ssl_client_key(self, key: impl AsRef<Path>) -> Self
Sets the name of a file containing SSL client key.
§Example
let options = PgConnectOptions::new()
// Providing a CA certificate with less than VerifyCa is pointless
.ssl_mode(PgSslMode::VerifyCa)
.ssl_client_key("./client.key");
sourcepub fn ssl_client_key_from_pem(self, key: impl AsRef<[u8]>) -> Self
pub fn ssl_client_key_from_pem(self, key: impl AsRef<[u8]>) -> Self
Sets the SSL client key as a PEM-encoded byte slice.
This should be an ASCII-encoded blob that starts with -----BEGIN PRIVATE KEY-----
.
§Example
Note: embedding SSL certificates and keys in the binary is not advised. This is for illustration purposes only.
const KEY: &[u8] = b"\
-----BEGIN PRIVATE KEY-----
<Private key data here.>
-----END PRIVATE KEY-----";
let options = PgConnectOptions::new()
// Providing a CA certificate with less than VerifyCa is pointless
.ssl_mode(PgSslMode::VerifyCa)
.ssl_client_key_from_pem(KEY);
sourcepub fn ssl_root_cert_from_pem(self, pem_certificate: Vec<u8>) -> Self
pub fn ssl_root_cert_from_pem(self, pem_certificate: Vec<u8>) -> Self
Sets PEM encoded trusted SSL Certificate Authorities (CA).
§Example
let options = PgConnectOptions::new()
// Providing a CA certificate with less than VerifyCa is pointless
.ssl_mode(PgSslMode::VerifyCa)
.ssl_root_cert_from_pem(vec![]);
sourcepub fn statement_cache_capacity(self, capacity: usize) -> Self
pub fn statement_cache_capacity(self, capacity: usize) -> Self
Sets the capacity of the connection’s statement cache in a number of stored distinct statements. Caching is handled using LRU, meaning when the amount of queries hits the defined limit, the oldest statement will get dropped.
The default cache capacity is 100 statements.
sourcepub fn application_name(self, application_name: &str) -> Self
pub fn application_name(self, application_name: &str) -> Self
Sets the application name. Defaults to None
§Example
let options = PgConnectOptions::new()
.application_name("my-app");
sourcepub fn extra_float_digits(
self,
extra_float_digits: impl Into<Option<i8>>
) -> Self
pub fn extra_float_digits( self, extra_float_digits: impl Into<Option<i8>> ) -> Self
Sets or removes the extra_float_digits
connection option.
This changes the default precision of floating-point values returned in text mode (when
not using prepared statements such as calling methods of Executor
directly).
Historically, Postgres would by default round floating-point values to 6 and 15 digits
for float4
/REAL
(f32
) and float8
/DOUBLE
(f64
), respectively, which would mean
that the returned value may not be exactly the same as its representation in Postgres.
The nominal range for this value is -15
to 3
, where negative values for this option
cause floating-points to be rounded to that many fewer digits than normal (-1
causes
float4
to be rounded to 5 digits instead of six, or 14 instead of 15 for float8
),
positive values cause Postgres to emit that many extra digits of precision over default
(or simply use maximum precision in Postgres 12 and later),
and 0 means keep the default behavior (or the “old” behavior described above
as of Postgres 12).
SQLx sets this value to 3 by default, which tells Postgres to return floating-point values at their maximum precision in the hope that the parsed value will be identical to its counterpart in Postgres. This is also the default in Postgres 12 and later anyway.
However, older versions of Postgres and alternative implementations that talk the Postgres protocol may not support this option, or the full range of values.
If you get an error like “unknown option extra_float_digits
” when connecting, try
setting this to None
or consult the manual of your database for the allowed range
of values.
For more information, see:
- Postgres manual, 20.11.2: Client Connection Defaults; Locale and Formatting
- Postgres manual, 8.1.3: Numeric Types; Floating-point Types
§Examples
let mut options = PgConnectOptions::new()
// for Redshift and Postgres 10
.extra_float_digits(2);
let mut options = PgConnectOptions::new()
// don't send the option at all (Postgres 9 and older)
.extra_float_digits(None);
source§impl PgConnectOptions
impl PgConnectOptions
sourcepub fn get_host(&self) -> &str
pub fn get_host(&self) -> &str
Get the current host.
§Example
let options = PgConnectOptions::new()
.host("127.0.0.1");
assert_eq!(options.get_host(), "127.0.0.1");
sourcepub fn get_port(&self) -> u16
pub fn get_port(&self) -> u16
Get the server’s port.
§Example
let options = PgConnectOptions::new()
.port(6543);
assert_eq!(options.get_port(), 6543);
sourcepub fn get_socket(&self) -> Option<&PathBuf>
pub fn get_socket(&self) -> Option<&PathBuf>
Get the socket path.
§Example
let options = PgConnectOptions::new()
.socket("/tmp");
assert!(options.get_socket().is_some());
sourcepub fn get_username(&self) -> &str
pub fn get_username(&self) -> &str
Get the server’s port.
§Example
let options = PgConnectOptions::new()
.username("foo");
assert_eq!(options.get_username(), "foo");
sourcepub fn get_database(&self) -> Option<&str>
pub fn get_database(&self) -> Option<&str>
Get the current database name.
§Example
let options = PgConnectOptions::new()
.database("postgres");
assert!(options.get_database().is_some());
sourcepub fn get_ssl_mode(&self) -> PgSslMode
pub fn get_ssl_mode(&self) -> PgSslMode
Get the SSL mode.
§Example
let options = PgConnectOptions::new();
assert!(matches!(options.get_ssl_mode(), PgSslMode::Prefer));
sourcepub fn get_application_name(&self) -> Option<&str>
pub fn get_application_name(&self) -> Option<&str>
Get the application name.
§Example
let options = PgConnectOptions::new()
.application_name("service");
assert!(options.get_application_name().is_some());
sourcepub fn get_options(&self) -> Option<&str>
pub fn get_options(&self) -> Option<&str>
Get the options.
§Example
let options = PgConnectOptions::new()
.options([("foo", "bar")]);
assert!(options.get_options().is_some());
Trait Implementations§
source§impl Clone for PgConnectOptions
impl Clone for PgConnectOptions
source§fn clone(&self) -> PgConnectOptions
fn clone(&self) -> PgConnectOptions
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl ConnectOptions for PgConnectOptions
impl ConnectOptions for PgConnectOptions
type Connection = PgConnection
source§fn to_url_lossy(&self) -> Url
fn to_url_lossy(&self) -> Url
ConnectOptions
. Read moresource§fn connect(&self) -> BoxFuture<'_, Result<Self::Connection, Error>>where
Self::Connection: Sized,
fn connect(&self) -> BoxFuture<'_, Result<Self::Connection, Error>>where
Self::Connection: Sized,
self
.source§fn log_statements(self, level: LevelFilter) -> Self
fn log_statements(self, level: LevelFilter) -> Self
level
source§fn log_slow_statements(self, level: LevelFilter, duration: Duration) -> Self
fn log_slow_statements(self, level: LevelFilter, duration: Duration) -> Self
duration
at the specified level
.