2019-07-23 03:17:29 +00:00
|
|
|
use crate::config::{Host, TargetSessionAttrs};
|
2019-07-28 23:34:07 +00:00
|
|
|
use pin_utils::pin_mut;
|
2019-07-23 03:17:29 +00:00
|
|
|
use crate::connect_raw::connect_raw;
|
|
|
|
use crate::connect_socket::connect_socket;
|
|
|
|
use crate::tls::{MakeTlsConnect, TlsConnect};
|
2019-07-28 23:02:34 +00:00
|
|
|
use crate::{Client, Config, Connection, Error, SimpleQueryMessage, Socket};
|
|
|
|
use futures::TryStreamExt;
|
|
|
|
use std::io;
|
2019-07-22 04:42:42 +00:00
|
|
|
|
2019-07-23 03:17:29 +00:00
|
|
|
pub async fn connect<T>(
|
|
|
|
mut tls: T,
|
|
|
|
config: &Config,
|
|
|
|
) -> Result<(Client, Connection<Socket, T::Stream>), Error>
|
|
|
|
where
|
|
|
|
T: MakeTlsConnect<Socket>,
|
|
|
|
{
|
|
|
|
if config.host.is_empty() {
|
|
|
|
return Err(Error::config("host missing".into()));
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.port.len() > 1 && config.port.len() != config.host.len() {
|
|
|
|
return Err(Error::config("invalid number of ports".into()));
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut error = None;
|
|
|
|
for (i, host) in config.host.iter().enumerate() {
|
|
|
|
let hostname = match host {
|
|
|
|
Host::Tcp(host) => &**host,
|
|
|
|
// postgres doesn't support TLS over unix sockets, so the choice here doesn't matter
|
|
|
|
#[cfg(unix)]
|
|
|
|
Host::Unix(_) => "",
|
|
|
|
};
|
|
|
|
|
|
|
|
let tls = tls
|
|
|
|
.make_tls_connect(hostname)
|
|
|
|
.map_err(|e| Error::tls(e.into()))?;
|
|
|
|
|
|
|
|
match connect_once(i, tls, config).await {
|
|
|
|
Ok((client, connection)) => return Ok((client, connection)),
|
|
|
|
Err(e) => error = Some(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return Err(error.unwrap());
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn connect_once<T>(
|
|
|
|
idx: usize,
|
|
|
|
tls: T,
|
|
|
|
config: &Config,
|
|
|
|
) -> Result<(Client, Connection<Socket, T::Stream>), Error>
|
|
|
|
where
|
|
|
|
T: TlsConnect<Socket>,
|
|
|
|
{
|
|
|
|
let socket = connect_socket(idx, config).await?;
|
2019-07-28 23:02:34 +00:00
|
|
|
let (mut client, connection) = connect_raw(socket, tls, config, Some(idx)).await?;
|
2019-07-23 03:17:29 +00:00
|
|
|
|
|
|
|
if let TargetSessionAttrs::ReadWrite = config.target_session_attrs {
|
2019-07-28 23:34:07 +00:00
|
|
|
let rows = client.simple_query("SHOW transaction_read_only");
|
|
|
|
pin_mut!(rows);
|
2019-07-28 23:02:34 +00:00
|
|
|
|
|
|
|
loop {
|
|
|
|
match rows.try_next().await? {
|
|
|
|
Some(SimpleQueryMessage::Row(row)) => {
|
|
|
|
if row.try_get(0)? == Some("on") {
|
|
|
|
return Err(Error::connect(io::Error::new(
|
|
|
|
io::ErrorKind::PermissionDenied,
|
|
|
|
"database does not allow writes",
|
|
|
|
)));
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Some(_) => {}
|
|
|
|
None => return Err(Error::unexpected_message()),
|
|
|
|
}
|
|
|
|
}
|
2019-07-23 03:17:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
Ok((client, connection))
|
|
|
|
}
|