You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
/// Only establish connections to the DB as needed. If set to `true`, the db connection will
67
75
/// be created using SQLx's [connect_lazy](https://docs.rs/sqlx/latest/sqlx/struct.Pool.html#method.connect_lazy)
68
76
/// method.
@@ -141,6 +149,28 @@ where
141
149
}
142
150
}
143
151
152
+
#[derive(Debug,Clone,Copy)]
153
+
/// Options for controlling the level of protection provided for MySQL or PostgreSQL SSL connections.
154
+
pubenumSSLMode{
155
+
/// I don't care about security, and I don't want to pay the overhead of encryption.
156
+
/// This corresponds to postgres `sslmode=disable` and mysql `ssl-mode=DISABLED`.
157
+
Disable,
158
+
/// I don't care about encryption, but I wish to pay the overhead of encryption if the server supports it.
159
+
/// This corresponds to postgres `sslmode=prefer` and mysql `ssl-mode=PREFERRED`.
160
+
/// This is the default.
161
+
Prefer,
162
+
/// I want my data to be encrypted, and I accept the overhead. I trust that the network will make sure I always connect to the server I want.
163
+
/// This corresponds to postgres `sslmode=require` and mysql `ssl-mode=REQUIRED`.
164
+
Require,
165
+
/// I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server that I trust.
166
+
/// like `Self::Require`, but additionally verify the server Certificate Authority (CA) certificate against the configured CA certificates.
167
+
/// This corresponds to postgres `sslmode=verify-ca` and mysql `ssl-mode=VERIFY_CA`.
168
+
VerifyCa,
169
+
/// I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server I trust, and that it's the one I specify.
170
+
/// like `Self::VerifyCa`, but additionally perform host name identity verification by checking the host name the client uses for connecting to the server against the identity in the certificate that the server sends to the client.
171
+
VerifyIdentity,
172
+
}
173
+
144
174
implConnectOptions{
145
175
/// Create new [ConnectOptions] for a [Database] by passing in a URI string
146
176
pubfnnew<T>(url:T) -> Self
@@ -163,6 +193,10 @@ impl ConnectOptions {
163
193
schema_search_path:None,
164
194
test_before_acquire:true,
165
195
connect_lazy:false,
196
+
ssl_mode:None,
197
+
ssl_client_cert:None,
198
+
ssl_client_key:None,
199
+
ssl_root_cert:None,
166
200
}
167
201
}
168
202
@@ -304,6 +338,99 @@ impl ConnectOptions {
304
338
self
305
339
}
306
340
341
+
/// Sets whether or with what priority a secure SSL TCP/IP connection will be negotiated
342
+
/// with the server.
343
+
///
344
+
/// By default, the SSL mode is [`Prefer`](SSLMode::Prefer), and the client will
345
+
/// first attempt an SSL connection but fallback to a non-SSL connection on failure.
346
+
///
347
+
/// Ignored for Unix domain socket communication.
348
+
///
349
+
/// # Example
350
+
///
351
+
/// ```rust
352
+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
353
+
/// let options = ConnectOptions::new().ssl_mode(SSLMode::Require);
354
+
/// ```
355
+
pubfnssl_mode(&mutself,mode:SSLMode) -> &mutSelf{
356
+
self.ssl_mode = Some(mode);
357
+
self
358
+
}
359
+
360
+
/// Sets the SSL client certificate as a PEM-encoded byte slice.
361
+
///
362
+
/// This should be an ASCII-encoded blob that starts with `-----BEGIN CERTIFICATE-----`.
363
+
///
364
+
/// # Example
365
+
/// Note: embedding SSL certificates and keys in the binary is not advised.
366
+
/// This is for illustration purposes only.
367
+
///
368
+
/// ```rust
369
+
/// # use sea_orm::database::{ConnectOptions, SSLMode};
370
+
///
371
+
/// const CERT: &[u8] = b"\
372
+
/// -----BEGIN CERTIFICATE-----
373
+
/// <Certificate data here.>
374
+
/// -----END CERTIFICATE-----";
375
+
///
376
+
/// let options = ConnectOptions::new()
377
+
/// // Providing a CA certificate with less than VerifyCa is pointless
0 commit comments