Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/prisma/tiberius
TDS 7.2+ (Microsoft SQL Server) driver for Rust
https://github.com/prisma/tiberius
Last synced: about 17 hours ago
JSON representation
TDS 7.2+ (Microsoft SQL Server) driver for Rust
- Host: GitHub
- URL: https://github.com/prisma/tiberius
- Owner: prisma
- License: apache-2.0
- Created: 2020-03-26T15:33:30.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2024-07-31T15:43:41.000Z (4 months ago)
- Last Synced: 2024-11-27T15:09:17.199Z (15 days ago)
- Language: Rust
- Homepage:
- Size: 1.12 MB
- Stars: 330
- Watchers: 14
- Forks: 122
- Open Issues: 100
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE-APACHE.txt
- Security: SECURITY.md
Awesome Lists containing this project
- awesome-rust - prisma/tiberius
- awesome-rust-cn - prisma/tiberius
- awesome-rust - prisma/tiberius - [![Cargo tests](https://github.com/prisma/tiberius/actions/workflows/test.yml/badge.svg?branch=master)](https://github.com/prisma/tiberius/actions/workflows/test.yml) (Libraries / Database)
- fucking-awesome-rust - prisma/tiberius - [![Cargo tests](https://github.com/prisma/tiberius/actions/workflows/test.yml/badge.svg?branch=master)](https://github.com/prisma/tiberius/actions/workflows/test.yml) (Libraries / Database)
- fucking-awesome-rust - prisma/tiberius - [![Cargo tests](https://github.com/prisma/tiberius/actions/workflows/test.yml/badge.svg?branch=master)](https://github.com/prisma/tiberius/actions/workflows/test.yml) (Libraries / Database)
README
# Tiberius
[![crates.io](https://meritbadge.herokuapp.com/tiberius)](https://crates.io/crates/tiberius)
[![docs.rs](https://docs.rs/tiberius/badge.svg)](https://docs.rs/tiberius)
[![Cargo tests](https://github.com/prisma/tiberius/actions/workflows/test.yml/badge.svg)](https://github.com/prisma/tiberius/actions/workflows/test.yml)
[![Chat](https://img.shields.io/discord/664092374359605268)](https://discord.gg/xX4xp9x)A native Microsoft SQL Server (TDS) client for Rust.
### Goals
- A perfect implementation of the TDS protocol.
- Asynchronous network IO.
- Independent of the network protocol.
- Support for latest versions of Linux, Windows and macOS.### Non-goals
- Connection pooling (use [bb8](https://crates.io/crates/bb8), [mobc](https://crates.io/crates/mobc), [deadpool](https://crates.io/crates/deadpool) or any of the other asynchronous connection pools)
- Query building
- Object-relational mapping### Supported SQL Server versions
| Version | Support level | Notes |
|---------|---------------|-------------------------------------|
| 2022 | Tested on CI | |
| 2019 | Tested on CI | |
| 2017 | Tested on CI | |
| 2016 | Should work | |
| 2014 | Should work | |
| 2012 | Should work | |
| 2008 | Should work | |
| 2005 | Should work | With feature flag `tds73` disabled. |### Feature flags
| Flag | Description | Default |
|--------------------------|----------------------------------------------------------------------------------------------------------------------------------|------------|
| `tds73` | Support for new date and time types in TDS version 7.3. Disable if using version 7.2. | `enabled` |
| `native-tls` | Use operating system's TLS libraries for traffic encryption. | `enabled` |
| `rustls` | Use the builtin TLS implementation from rustls instead of linking to the operating system implementation for traffic encryption. | `disabled` |
| `vendored-openssl` | Statically link against OpenSSL instead of dynamically linking to the operating system implementation for traffic encryption. | `disabled` |
| `chrono` | Read and write date and time values using `chrono`'s types. (for greenfield, using time instead of chrono is recommended) | `disabled` |
| `time` | Read and write date and time values using `time` crate types. | `disabled` |
| `rust_decimal` | Read and write `numeric`/`decimal` values using `rust_decimal`'s `Decimal`. | `disabled` |
| `bigdecimal` | Read and write `numeric`/`decimal` values using `bigdecimal`'s `BigDecimal`. | `disabled` |
| `sql-browser-async-std` | SQL Browser implementation for the `TcpStream` of async-std. | `disabled` |
| `sql-browser-tokio` | SQL Browser implementation for the `TcpStream` of Tokio. | `disabled` |
| `sql-browser-smol` | SQL Browser implementation for the `TcpStream` of smol. | `disabled` |
| `integrated-auth-gssapi` | Support for using Integrated Auth via GSSAPI | `disabled` |### Supported protocols
Tiberius does not rely on any protocol when connecting to an SQL Server instance. Instead the `Client` takes a socket that implements the `AsyncRead` and `AsyncWrite` traits from the [futures-rs](https://crates.io/crates/futures) crate.
Currently there are good async implementations for TCP in the [async-std](https://crates.io/crates/async-std), [Tokio](https://crates.io/crates/tokio) and [Smol](https://crates.io/crates/smol) projects.
To be able to use them together with Tiberius on Windows platforms with SQL Server, you should make sure that the TCP protocol is enabled, as depending on the edition, this may not be the case. Standard and Enterprise editions will have the setting enabled by default, whereas Developer, Express editions and the Windows Internal Database feature of the Windows Server OS don't.
To enable the TCP/IP protocol you may want to use the [server settings](https://docs.microsoft.com/en-us/sql/database-engine/configure-windows/enable-or-disable-a-server-network-protocol) the [command line](https://docs.microsoft.com/en-us/sql/powershell/how-to-enable-tcp-sqlps).
In the official [Docker image](https://hub.docker.com/_/microsoft-mssql-server) TCP is is enabled by default.Named pipes should work by using the [NamedPipeClient](https://docs.rs/tokio/1.9.0/tokio/net/windows/named_pipe/struct.NamedPipeClient.html) from the latest Tokio versions.
The shared memory protocol is not documented and seems there are no Rust crates implementing it.
### Encryption (TLS/SSL)
Tiberius can be set to use two different implementations of TLS connection encryption. By default it uses `native-tls`, linking to the TLS library provided by the operating system. This is a good practice and in case of security vulnerabilities, upgrading the system libraries fixes the vulnerability in Tiberius without a recompilation. On Linux we link against OpenSSL, on Windows against schannel and on macOS against Security Framework.
Alternatively one can use the `rustls` feature flag to use the Rust native TLS implementation. This way there are no dynamic dependencies to the system. This might be useful in certain installations, but requires a rebuild to update to a new TLS version. For some reasons the Security Framework on macOS does not work with SQL Server TLS settings, and on Apple platforms if needing TLS it is recommended to use `rustls` instead of `native-tls`. The other option is to use the `vendored-openssl` feature flag, that statically links against the latest OpenSSL implementation.
The crate can also be compiled without TLS support, but not with both features enabled at the same time.
Tiberius has three runtime encryption settings:
| Encryption level | Description |
|------------------|--------------------------------------------------|
| `Required` | All traffic is encrypted. (default) |
| `Off` | Only the login procedure is encrypted. |
| `NotSupported` | None of the traffic is encrypted. |The encryption levels can be set when connecting to the database.
### Integrated Authentication (TrustedConnection) on \*nix
With the `integrated-auth-gssapi` feature enabled, the crate requires the GSSAPI/Kerberos libraries/headers installed:
* [CentOS](https://pkgs.org/download/krb5-devel)
* [Arch](https://www.archlinux.org/packages/core/x86_64/krb5/)
* [Debian](https://tracker.debian.org/pkg/krb5) (you need the -dev packages to build)
* [Ubuntu](https://packages.ubuntu.com/bionic-updates/libkrb5-dev)
* NixOS: Run `nix-shell shell.nix` on the repository root.
* Mac: as of version `0.4.2` the [libgssapi](https://crates.io/crates/libgssapi) crate used for this feature now uses Apple's [GSS Framework](https://developer.apple.com/documentation/gss?language=objc) which ships with MacOS 10.14+.Additionally, your runtime system will need to be trusted by and configured for the Active Directory domain your SQL Server is part of. In particular, you'll need to be able to get a valid TGT for your identity, via `kinit` or a keytab. This setup varies by environment and OS, but your friendly network/system administrator should be able to help figure out the specifics.
## Redirects
With certain Azure firewall settings, a login might return `Error::Routing { host, port }`. This means the user must create a new `TcpStream` to the given address, and connect again.
A simple connection procedure would then be:
```rust
use tiberius::{Client, Config, AuthMethod, error::Error};
use tokio_util::compat::TokioAsyncWriteCompatExt;
use tokio::net::TcpStream;#[tokio::main]
async fn main() -> Result<(), Box> {
let mut config = Config::new();config.host("0.0.0.0");
config.port(1433);
config.authentication(AuthMethod::sql_server("SA", ""));let tcp = TcpStream::connect(config.get_addr()).await?;
tcp.set_nodelay(true)?;let client = match Client::connect(config, tcp.compat_write()).await {
// Connection successful.
Ok(client) => client,
// The server wants us to redirect to a different address
Err(Error::Routing { host, port }) => {
let mut config = Config::new();config.host(&host);
config.port(port);
config.authentication(AuthMethod::sql_server("SA", ""));let tcp = TcpStream::connect(config.get_addr()).await?;
tcp.set_nodelay(true)?;// we should not have more than one redirect, so we'll short-circuit here.
Client::connect(config, tcp.compat_write()).await?
}
Err(e) => Err(e)?,
};Ok(())
}
```## Security
If you have a security issue to report, please contact us at [[email protected]](mailto:[email protected]?subject=[GitHub]%20Prisma%202%20Security%20Report%20Tiberius)