Skip to content

Commit 8cca8ad

Browse files
committed
Add support to client SSL PEM cert and key and root CA
1 parent 4e3acb1 commit 8cca8ad

File tree

3 files changed

+176
-0
lines changed

3 files changed

+176
-0
lines changed

src/database/mod.rs

+128
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,14 @@ pub struct ConnectOptions {
6363
/// Schema search path (PostgreSQL only)
6464
pub(crate) schema_search_path: Option<String>,
6565
pub(crate) test_before_acquire: bool,
66+
/// Sets whether or with what priority a secure SSL TCP/IP connection will be negotiated
67+
pub(crate) ssl_mode: Option<SSLMode>,
68+
/// Sets the SSL client certificate as a PEM-encoded byte slice.
69+
pub(crate) ssl_client_cert: Option<Vec<u8>>,
70+
/// Sets the SSL client key as a PEM-encoded byte slice
71+
pub(crate) ssl_client_key: Option<Vec<u8>>,
72+
/// Sets PEM encoded trusted SSL Certificate Authorities (CA).
73+
pub(crate) ssl_root_cert: Option<Vec<u8>>,
6674
/// Only establish connections to the DB as needed. If set to `true`, the db connection will
6775
/// be created using SQLx's [connect_lazy](https://docs.rs/sqlx/latest/sqlx/struct.Pool.html#method.connect_lazy)
6876
/// method.
@@ -141,6 +149,29 @@ where
141149
}
142150
}
143151

152+
#[derive(Debug, Clone, Copy)]
153+
/// Options for controlling the level of protection provided for MySQL or PostgreSQL SSL connections.
154+
pub enum SSLMode {
155+
/// I don't care about security, and I don't want to pay the overhead of encryption.
156+
/// This corresponds to postgres `sslmode=disable` and mysql `ssl-mode=DISABLED`.
157+
Disable,
158+
/// I don't care about encryption, but I wish to pay the overhead of encryption if the server supports it.
159+
/// This corresponds to postgres `sslmode=prefer` and mysql `ssl-mode=PREFERRED`.
160+
/// This is the default.
161+
Prefer,
162+
/// I want my data to be encrypted, and I accept the overhead. I trust that the network will make sure I always connect to the server I want.
163+
/// This corresponds to postgres `sslmode=require` and mysql `ssl-mode=REQUIRED`.
164+
Require,
165+
/// I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server that I trust.
166+
/// like `Self::Require`, but additionally verify the server Certificate Authority (CA) certificate against the configured CA certificates.
167+
/// This corresponds to postgres `sslmode=verify-ca` and mysql `ssl-mode=VERIFY_CA`.
168+
VerifyCa,
169+
/// I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server I trust, and that it's the one I specify.
170+
/// like `Self::VerifyCa`, but additionally perform host name identity verification by checking the host name the client uses for connecting to the server against the identity in the certificate that the server sends to the client.
171+
/// This corresponds to postgres `sslmode=verify-full` and mysql `ssl-mode=VERIFY_IDENTITY`.
172+
VerifyIdentity,
173+
}
174+
144175
impl ConnectOptions {
145176
/// Create new [ConnectOptions] for a [Database] by passing in a URI string
146177
pub fn new<T>(url: T) -> Self
@@ -163,6 +194,10 @@ impl ConnectOptions {
163194
schema_search_path: None,
164195
test_before_acquire: true,
165196
connect_lazy: false,
197+
ssl_mode: None,
198+
ssl_client_cert: None,
199+
ssl_client_key: None,
200+
ssl_root_cert: None,
166201
}
167202
}
168203

@@ -304,6 +339,99 @@ impl ConnectOptions {
304339
self
305340
}
306341

342+
/// Sets whether or with what priority a secure SSL TCP/IP connection will be negotiated
343+
/// with the server.
344+
///
345+
/// By default, the SSL mode is [`Prefer`](SSLMode::Prefer), and the client will
346+
/// first attempt an SSL connection but fallback to a non-SSL connection on failure.
347+
///
348+
/// Ignored for Unix domain socket communication.
349+
///
350+
/// # Example
351+
///
352+
/// ```rust
353+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
354+
/// let options = ConnectOptions::new().ssl_mode(SSLMode::Require);
355+
/// ```
356+
pub fn ssl_mode(&mut self, mode: SSLMode) -> &mut Self {
357+
self.ssl_mode = Some(mode);
358+
self
359+
}
360+
361+
/// Sets the SSL client certificate as a PEM-encoded byte slice.
362+
///
363+
/// This should be an ASCII-encoded blob that starts with `-----BEGIN CERTIFICATE-----`.
364+
///
365+
/// # Example
366+
/// Note: embedding SSL certificates and keys in the binary is not advised.
367+
/// This is for illustration purposes only.
368+
///
369+
/// ```rust
370+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
371+
///
372+
/// const CERT: &[u8] = b"\
373+
/// -----BEGIN CERTIFICATE-----
374+
/// <Certificate data here.>
375+
/// -----END CERTIFICATE-----";
376+
///
377+
/// let options = ConnectOptions::new()
378+
/// // Providing a CA certificate with less than VerifyCa is pointless
379+
/// .ssl_mode(SSLMode::VerifyCa)
380+
/// .ssl_client_cert_pem(CERT);
381+
/// ```
382+
pub fn ssl_client_cert_pem(&mut self, cert: Vec<u8>) -> &mut Self {
383+
self.ssl_client_cert = Some(cert);
384+
self
385+
}
386+
387+
/// Sets the SSL client key as a PEM-encoded byte slice.
388+
///
389+
/// This should be an ASCII-encoded blob that starts with `-----BEGIN PRIVATE KEY-----`.
390+
///
391+
/// # Example
392+
/// Note: embedding SSL certificates and keys in the binary is not advised.
393+
/// This is for illustration purposes only.
394+
///
395+
/// ```rust
396+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
397+
///
398+
/// const KEY: &[u8] = b"\
399+
/// -----BEGIN PRIVATE KEY-----
400+
/// <Private key data here.>
401+
/// -----END PRIVATE KEY-----";
402+
///
403+
/// let options = ConnectOptions::new()
404+
/// // Providing a CA certificate with less than VerifyCa is pointless
405+
/// .ssl_mode(SSLMode::VerifyCa)
406+
/// .ssl_client_key_pem(KEY);
407+
/// ```
408+
pub fn ssl_client_key_pem(&mut self, key: Vec<u8>) -> &mut Self {
409+
self.ssl_client_key = Some(key);
410+
self
411+
}
412+
413+
/// Sets PEM encoded trusted SSL Certificate Authorities (CA).
414+
///
415+
/// # Example
416+
///
417+
/// ```rust
418+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
419+
///
420+
/// const CERT: &[u8] = b"\
421+
/// -----BEGIN CERTIFICATE-----
422+
/// <Certificate data here.>
423+
/// -----END CERTIFICATE-----";
424+
///
425+
/// let options = ConnectOptions::new()
426+
/// // Providing a CA certificate with less than VerifyCa is pointless
427+
/// .ssl_mode(SSLMode::VerifyCa)
428+
/// .ssl_root_cert_from_pem(vec![]);
429+
/// ```
430+
pub fn ssl_root_cert_from_pem(mut self, pem_certificate: Vec<u8>) -> Self {
431+
self.ssl_root_cert = Some(pem_certificate);
432+
self
433+
}
434+
307435
/// If set to `true`, the db connection pool will be created using SQLx's
308436
/// [connect_lazy](https://docs.rs/sqlx/latest/sqlx/struct.Pool.html#method.connect_lazy) method.
309437
pub fn connect_lazy(&mut self, value: bool) -> &mut Self {

src/driver/sqlx_mysql.rs

+24
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,18 @@ impl SqlxMySqlConnector {
7676
);
7777
}
7878
}
79+
if let Some(ssl_mode) = options.ssl_mode {
80+
opt = opt.ssl_mode(ssl_mode.into());
81+
}
82+
if let Some(cert_keyclient_cert) = &options.ssl_client_cert {
83+
opt = opt.ssl_client_cert_from_pem(cert_keyclient_cert);
84+
}
85+
if let Some(cert_keyclient_key) = &options.ssl_client_key {
86+
opt = opt.ssl_client_key_from_pem(cert_keyclient_key);
87+
}
88+
if let Some(cert_keyclient_ca) = &options.ssl_root_cert {
89+
opt = opt.ssl_ca_from_pem(cert_keyclient_ca.clone());
90+
}
7991
let pool = if options.connect_lazy {
8092
options.sqlx_pool_options().connect_lazy_with(opt)
8193
} else {
@@ -314,6 +326,18 @@ impl
314326
}
315327
}
316328

329+
impl From<crate::SSLMode> for sqlx::mysql::MySqlSslMode {
330+
fn from(mode: crate::SSLMode) -> Self {
331+
match mode {
332+
crate::SSLMode::Disable => Self::Disabled,
333+
crate::SSLMode::Prefer => Self::Preferred,
334+
crate::SSLMode::Require => Self::Required,
335+
crate::SSLMode::VerifyCa => Self::VerifyCa,
336+
crate::SSLMode::VerifyIdentity => Self::VerifyIdentity,
337+
}
338+
}
339+
}
340+
317341
impl crate::DatabaseTransaction {
318342
pub(crate) async fn new_mysql(
319343
inner: PoolConnection<sqlx::MySql>,

src/driver/sqlx_postgres.rs

+24
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,18 @@ impl SqlxPostgresConnector {
7676
);
7777
}
7878
}
79+
if let Some(ssl_mode) = options.ssl_mode {
80+
opt = opt.ssl_mode(ssl_mode.into());
81+
}
82+
if let Some(cert_keyclient_cert) = &options.ssl_client_cert {
83+
opt = opt.ssl_client_cert_from_pem(cert_keyclient_cert);
84+
}
85+
if let Some(cert_keyclient_key) = &options.ssl_client_key {
86+
opt = opt.ssl_client_key_from_pem(cert_keyclient_key);
87+
}
88+
if let Some(cert_keyclient_root_cert) = &options.ssl_root_cert {
89+
opt = opt.ssl_root_cert_from_pem(cert_keyclient_root_cert.clone());
90+
}
7991
let set_search_path_sql = options
8092
.schema_search_path
8193
.as_ref()
@@ -333,6 +345,18 @@ impl
333345
}
334346
}
335347

348+
impl From<crate::SSLMode> for sqlx::postgres::PgSslMode {
349+
fn from(mode: crate::SSLMode) -> Self {
350+
match mode {
351+
crate::SSLMode::Disable => Self::Disable,
352+
crate::SSLMode::Prefer => Self::Prefer,
353+
crate::SSLMode::Require => Self::Require,
354+
crate::SSLMode::VerifyCa => Self::VerifyCa,
355+
crate::SSLMode::VerifyIdentity => Self::VerifyFull,
356+
}
357+
}
358+
}
359+
336360
impl crate::DatabaseTransaction {
337361
pub(crate) async fn new_postgres(
338362
inner: PoolConnection<sqlx::Postgres>,

0 commit comments

Comments
 (0)