You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
/// Only establish connections to the DB as needed. If set to `true`, the db connection will
67
75
/// be created using SQLx's [connect_lazy](https://docs.rs/sqlx/latest/sqlx/struct.Pool.html#method.connect_lazy)
68
76
/// method.
@@ -141,6 +149,29 @@ where
141
149
}
142
150
}
143
151
152
+
#[derive(Debug,Clone,Copy)]
153
+
/// Options for controlling the level of protection provided for MySQL or PostgreSQL SSL connections.
154
+
pubenumSSLMode{
155
+
/// I don't care about security, and I don't want to pay the overhead of encryption.
156
+
/// This corresponds to postgres `sslmode=disable` and mysql `ssl-mode=DISABLED`.
157
+
Disable,
158
+
/// I don't care about encryption, but I wish to pay the overhead of encryption if the server supports it.
159
+
/// This corresponds to postgres `sslmode=prefer` and mysql `ssl-mode=PREFERRED`.
160
+
/// This is the default.
161
+
Prefer,
162
+
/// I want my data to be encrypted, and I accept the overhead. I trust that the network will make sure I always connect to the server I want.
163
+
/// This corresponds to postgres `sslmode=require` and mysql `ssl-mode=REQUIRED`.
164
+
Require,
165
+
/// I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server that I trust.
166
+
/// like `Self::Require`, but additionally verify the server Certificate Authority (CA) certificate against the configured CA certificates.
167
+
/// This corresponds to postgres `sslmode=verify-ca` and mysql `ssl-mode=VERIFY_CA`.
168
+
VerifyCa,
169
+
/// I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server I trust, and that it's the one I specify.
170
+
/// like `Self::VerifyCa`, but additionally perform host name identity verification by checking the host name the client uses for connecting to the server against the identity in the certificate that the server sends to the client.
171
+
/// This corresponds to postgres `sslmode=verify-full` and mysql `ssl-mode=VERIFY_IDENTITY`.
172
+
VerifyIdentity,
173
+
}
174
+
144
175
implConnectOptions{
145
176
/// Create new [ConnectOptions] for a [Database] by passing in a URI string
146
177
pubfnnew<T>(url:T) -> Self
@@ -163,6 +194,10 @@ impl ConnectOptions {
163
194
schema_search_path:None,
164
195
test_before_acquire:true,
165
196
connect_lazy:false,
197
+
ssl_mode:None,
198
+
ssl_client_cert:None,
199
+
ssl_client_key:None,
200
+
ssl_root_cert:None,
166
201
}
167
202
}
168
203
@@ -304,6 +339,99 @@ impl ConnectOptions {
304
339
self
305
340
}
306
341
342
+
/// Sets whether or with what priority a secure SSL TCP/IP connection will be negotiated
343
+
/// with the server.
344
+
///
345
+
/// By default, the SSL mode is [`Prefer`](SSLMode::Prefer), and the client will
346
+
/// first attempt an SSL connection but fallback to a non-SSL connection on failure.
347
+
///
348
+
/// Ignored for Unix domain socket communication.
349
+
///
350
+
/// # Example
351
+
///
352
+
/// ```rust
353
+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
354
+
/// let options = ConnectOptions::new().ssl_mode(SSLMode::Require);
355
+
/// ```
356
+
pubfnssl_mode(&mutself,mode:SSLMode) -> &mutSelf{
357
+
self.ssl_mode = Some(mode);
358
+
self
359
+
}
360
+
361
+
/// Sets the SSL client certificate as a PEM-encoded byte slice.
362
+
///
363
+
/// This should be an ASCII-encoded blob that starts with `-----BEGIN CERTIFICATE-----`.
364
+
///
365
+
/// # Example
366
+
/// Note: embedding SSL certificates and keys in the binary is not advised.
367
+
/// This is for illustration purposes only.
368
+
///
369
+
/// ```rust
370
+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
371
+
///
372
+
/// const CERT: &[u8] = b"\
373
+
/// -----BEGIN CERTIFICATE-----
374
+
/// <Certificate data here.>
375
+
/// -----END CERTIFICATE-----";
376
+
///
377
+
/// let options = ConnectOptions::new()
378
+
/// // Providing a CA certificate with less than VerifyCa is pointless
0 commit comments