2009-12-26 11:44:21 +08:00
|
|
|
=========
|
|
|
|
Databases
|
|
|
|
=========
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2019-10-03 23:52:50 +08:00
|
|
|
Django officially supports the following databases:
|
|
|
|
|
|
|
|
* :ref:`PostgreSQL <postgresql-notes>`
|
|
|
|
* :ref:`MariaDB <mariadb-notes>`
|
|
|
|
* :ref:`MySQL <mysql-notes>`
|
|
|
|
* :ref:`Oracle <oracle-notes>`
|
|
|
|
* :ref:`SQLite <sqlite-notes>`
|
|
|
|
|
|
|
|
There are also a number of :ref:`database backends provided by third parties
|
|
|
|
<third-party-notes>`.
|
|
|
|
|
2007-03-16 23:42:58 +08:00
|
|
|
Django attempts to support as many features as possible on all database
|
|
|
|
backends. However, not all database backends are alike, and we've had to make
|
|
|
|
design decisions on which features to support and which assumptions we can make
|
|
|
|
safely.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2007-03-16 23:42:58 +08:00
|
|
|
This file describes some of the features that might be relevant to Django
|
2020-05-01 20:37:21 +08:00
|
|
|
usage. It is not intended as a replacement for server-specific documentation or
|
|
|
|
reference manuals.
|
2007-03-16 23:42:58 +08:00
|
|
|
|
2013-02-18 18:37:26 +08:00
|
|
|
General notes
|
|
|
|
=============
|
|
|
|
|
|
|
|
.. _persistent-database-connections:
|
|
|
|
|
|
|
|
Persistent connections
|
|
|
|
----------------------
|
|
|
|
|
|
|
|
Persistent connections avoid the overhead of re-establishing a connection to
|
2013-05-09 21:42:14 +08:00
|
|
|
the database in each request. They're controlled by the
|
|
|
|
:setting:`CONN_MAX_AGE` parameter which defines the maximum lifetime of a
|
|
|
|
connection. It can be set independently for each database.
|
2013-02-18 18:37:26 +08:00
|
|
|
|
2013-05-09 21:42:14 +08:00
|
|
|
The default value is ``0``, preserving the historical behavior of closing the
|
|
|
|
database connection at the end of each request. To enable persistent
|
2020-03-27 05:22:15 +08:00
|
|
|
connections, set :setting:`CONN_MAX_AGE` to a positive integer of seconds. For
|
2013-05-09 21:42:14 +08:00
|
|
|
unlimited persistent connections, set it to ``None``.
|
2013-02-18 18:37:26 +08:00
|
|
|
|
|
|
|
Connection management
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Django opens a connection to the database when it first makes a database
|
|
|
|
query. It keeps this connection open and reuses it in subsequent requests.
|
|
|
|
Django closes the connection once it exceeds the maximum age defined by
|
|
|
|
:setting:`CONN_MAX_AGE` or when it isn't usable any longer.
|
|
|
|
|
|
|
|
In detail, Django automatically opens a connection to the database whenever it
|
|
|
|
needs one and doesn't have one already — either because this is the first
|
|
|
|
connection, or because the previous connection was closed.
|
|
|
|
|
|
|
|
At the beginning of each request, Django closes the connection if it has
|
|
|
|
reached its maximum age. If your database terminates idle connections after
|
|
|
|
some time, you should set :setting:`CONN_MAX_AGE` to a lower value, so that
|
|
|
|
Django doesn't attempt to use a connection that has been terminated by the
|
|
|
|
database server. (This problem may only affect very low traffic sites.)
|
|
|
|
|
|
|
|
At the end of each request, Django closes the connection if it has reached its
|
|
|
|
maximum age or if it is in an unrecoverable error state. If any database
|
|
|
|
errors have occurred while processing the requests, Django checks whether the
|
|
|
|
connection still works, and closes it if it doesn't. Thus, database errors
|
|
|
|
affect at most one request; if the connection becomes unusable, the next
|
|
|
|
request gets a fresh connection.
|
|
|
|
|
|
|
|
Caveats
|
|
|
|
~~~~~~~
|
|
|
|
|
|
|
|
Since each thread maintains its own connection, your database must support at
|
|
|
|
least as many simultaneous connections as you have worker threads.
|
|
|
|
|
|
|
|
Sometimes a database won't be accessed by the majority of your views, for
|
|
|
|
example because it's the database of an external system, or thanks to caching.
|
2013-05-09 21:42:14 +08:00
|
|
|
In such cases, you should set :setting:`CONN_MAX_AGE` to a low value or even
|
|
|
|
``0``, because it doesn't make sense to maintain a connection that's unlikely
|
|
|
|
to be reused. This will help keep the number of simultaneous connections to
|
|
|
|
this database small.
|
2013-02-18 18:37:26 +08:00
|
|
|
|
|
|
|
The development server creates a new thread for each request it handles,
|
2013-05-09 21:42:14 +08:00
|
|
|
negating the effect of persistent connections. Don't enable them during
|
|
|
|
development.
|
|
|
|
|
|
|
|
When Django establishes a connection to the database, it sets up appropriate
|
|
|
|
parameters, depending on the backend being used. If you enable persistent
|
|
|
|
connections, this setup is no longer repeated every request. If you modify
|
|
|
|
parameters such as the connection's isolation level or time zone, you should
|
|
|
|
either restore Django's defaults at the end of each request, force an
|
|
|
|
appropriate value at the beginning of each request, or disable persistent
|
|
|
|
connections.
|
2013-02-18 18:37:26 +08:00
|
|
|
|
2014-07-26 19:36:40 +08:00
|
|
|
Encoding
|
|
|
|
--------
|
|
|
|
|
|
|
|
Django assumes that all databases use UTF-8 encoding. Using other encodings may
|
|
|
|
result in unexpected behavior such as "value too long" errors from your
|
|
|
|
database for data that is valid in Django. See the database specific notes
|
|
|
|
below for information on how to set up your database correctly.
|
|
|
|
|
2009-03-24 07:25:03 +08:00
|
|
|
.. _postgresql-notes:
|
2009-03-11 15:06:50 +08:00
|
|
|
|
2009-02-02 20:03:31 +08:00
|
|
|
PostgreSQL notes
|
|
|
|
================
|
|
|
|
|
2020-05-14 12:33:00 +08:00
|
|
|
Django supports PostgreSQL 9.6 and higher. `psycopg2`_ 2.5.4 or higher is
|
2017-03-22 00:23:17 +08:00
|
|
|
required, though the latest release is recommended.
|
2015-02-17 01:11:39 +08:00
|
|
|
|
2020-01-29 08:58:39 +08:00
|
|
|
.. _psycopg2: https://www.psycopg.org/
|
2009-02-02 20:03:31 +08:00
|
|
|
|
2012-11-04 18:32:53 +08:00
|
|
|
PostgreSQL connection settings
|
2012-12-12 05:30:07 +08:00
|
|
|
-------------------------------
|
2012-11-04 18:32:53 +08:00
|
|
|
|
2012-12-12 05:30:07 +08:00
|
|
|
See :setting:`HOST` for details.
|
2012-11-04 18:32:53 +08:00
|
|
|
|
2011-12-11 16:19:04 +08:00
|
|
|
Optimizing PostgreSQL's configuration
|
|
|
|
-------------------------------------
|
|
|
|
|
|
|
|
Django needs the following parameters for its database connections:
|
|
|
|
|
|
|
|
- ``client_encoding``: ``'UTF8'``,
|
2013-03-03 22:55:11 +08:00
|
|
|
- ``default_transaction_isolation``: ``'read committed'`` by default,
|
|
|
|
or the value set in the connection options (see below),
|
2019-07-20 21:38:43 +08:00
|
|
|
- ``timezone``:
|
|
|
|
- when :setting:`USE_TZ` is ``True``, ``'UTC'`` by default, or the
|
|
|
|
:setting:`TIME_ZONE <DATABASE-TIME_ZONE>` value set for the connection,
|
|
|
|
- when :setting:`USE_TZ` is ``False``, the value of the global
|
|
|
|
:setting:`TIME_ZONE` setting.
|
2011-12-11 16:19:04 +08:00
|
|
|
|
|
|
|
If these parameters already have the correct values, Django won't set them for
|
|
|
|
every new connection, which improves performance slightly. You can configure
|
|
|
|
them directly in :file:`postgresql.conf` or more conveniently per database
|
|
|
|
user with `ALTER ROLE`_.
|
|
|
|
|
|
|
|
Django will work just fine without this optimization, but each new connection
|
|
|
|
will do some additional queries to set these parameters.
|
|
|
|
|
2019-03-30 09:49:44 +08:00
|
|
|
.. _ALTER ROLE: https://www.postgresql.org/docs/current/sql-alterrole.html
|
2011-12-11 16:19:04 +08:00
|
|
|
|
2013-06-06 00:55:50 +08:00
|
|
|
.. _database-isolation-level:
|
|
|
|
|
2013-03-02 22:00:28 +08:00
|
|
|
Isolation level
|
2013-03-03 22:55:11 +08:00
|
|
|
---------------
|
2013-03-02 22:00:28 +08:00
|
|
|
|
|
|
|
Like PostgreSQL itself, Django defaults to the ``READ COMMITTED`` `isolation
|
2013-05-31 16:16:06 +08:00
|
|
|
level`_. If you need a higher isolation level such as ``REPEATABLE READ`` or
|
|
|
|
``SERIALIZABLE``, set it in the :setting:`OPTIONS` part of your database
|
|
|
|
configuration in :setting:`DATABASES`::
|
2013-03-02 22:00:28 +08:00
|
|
|
|
|
|
|
import psycopg2.extensions
|
|
|
|
|
|
|
|
DATABASES = {
|
|
|
|
# ...
|
|
|
|
'OPTIONS': {
|
|
|
|
'isolation_level': psycopg2.extensions.ISOLATION_LEVEL_SERIALIZABLE,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
Under higher isolation levels, your application should be prepared to
|
|
|
|
handle exceptions raised on serialization failures. This option is
|
|
|
|
designed for advanced uses.
|
|
|
|
|
2019-03-30 09:49:44 +08:00
|
|
|
.. _isolation level: https://www.postgresql.org/docs/current/transaction-iso.html
|
2013-03-02 22:00:28 +08:00
|
|
|
|
2009-12-19 16:19:38 +08:00
|
|
|
Indexes for ``varchar`` and ``text`` columns
|
2013-03-03 22:55:11 +08:00
|
|
|
--------------------------------------------
|
2010-06-21 19:48:45 +08:00
|
|
|
|
2009-12-19 16:19:38 +08:00
|
|
|
When specifying ``db_index=True`` on your model fields, Django typically
|
|
|
|
outputs a single ``CREATE INDEX`` statement. However, if the database type
|
|
|
|
for the field is either ``varchar`` or ``text`` (e.g., used by ``CharField``,
|
|
|
|
``FileField``, and ``TextField``), then Django will create
|
|
|
|
an additional index that uses an appropriate `PostgreSQL operator class`_
|
2012-07-25 07:17:27 +08:00
|
|
|
for the column. The extra index is necessary to correctly perform
|
2009-12-19 16:19:38 +08:00
|
|
|
lookups that use the ``LIKE`` operator in their SQL, as is done with the
|
|
|
|
``contains`` and ``startswith`` lookup types.
|
|
|
|
|
2019-03-30 09:49:44 +08:00
|
|
|
.. _PostgreSQL operator class: https://www.postgresql.org/docs/current/indexes-opclass.html
|
2009-12-19 16:19:38 +08:00
|
|
|
|
2016-09-01 21:59:33 +08:00
|
|
|
Migration operation for adding extensions
|
|
|
|
-----------------------------------------
|
|
|
|
|
|
|
|
If you need to add a PostgreSQL extension (like ``hstore``, ``postgis``, etc.)
|
|
|
|
using a migration, use the
|
|
|
|
:class:`~django.contrib.postgres.operations.CreateExtension` operation.
|
|
|
|
|
2016-06-04 06:31:21 +08:00
|
|
|
.. _postgresql-server-side-cursors:
|
|
|
|
|
|
|
|
Server-side cursors
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
When using :meth:`QuerySet.iterator()
|
|
|
|
<django.db.models.query.QuerySet.iterator>`, Django opens a :ref:`server-side
|
|
|
|
cursor <psycopg2:server-side-cursors>`. By default, PostgreSQL assumes that
|
|
|
|
only the first 10% of the results of cursor queries will be fetched. The query
|
|
|
|
planner spends less time planning the query and starts returning results
|
|
|
|
faster, but this could diminish performance if more than 10% of the results are
|
|
|
|
retrieved. PostgreSQL's assumptions on the number of rows retrieved for a
|
|
|
|
cursor query is controlled with the `cursor_tuple_fraction`_ option.
|
|
|
|
|
2019-03-30 09:49:44 +08:00
|
|
|
.. _cursor_tuple_fraction: https://www.postgresql.org/docs/current/runtime-config-query.html#GUC-CURSOR-TUPLE-FRACTION
|
2016-06-04 06:31:21 +08:00
|
|
|
|
2017-05-06 10:19:34 +08:00
|
|
|
.. _transaction-pooling-server-side-cursors:
|
|
|
|
|
|
|
|
Transaction pooling and server-side cursors
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2020-04-01 20:48:52 +08:00
|
|
|
Using a connection pooler in transaction pooling mode (e.g. `PgBouncer`_)
|
2017-05-06 10:19:34 +08:00
|
|
|
requires disabling server-side cursors for that connection.
|
|
|
|
|
|
|
|
Server-side cursors are local to a connection and remain open at the end of a
|
|
|
|
transaction when :setting:`AUTOCOMMIT <DATABASE-AUTOCOMMIT>` is ``True``. A
|
|
|
|
subsequent transaction may attempt to fetch more results from a server-side
|
|
|
|
cursor. In transaction pooling mode, there's no guarantee that subsequent
|
|
|
|
transactions will use the same connection. If a different connection is used,
|
|
|
|
an error is raised when the transaction references the server-side cursor,
|
|
|
|
because server-side cursors are only accessible in the connection in which they
|
|
|
|
were created.
|
|
|
|
|
|
|
|
One solution is to disable server-side cursors for a connection in
|
|
|
|
:setting:`DATABASES` by setting :setting:`DISABLE_SERVER_SIDE_CURSORS
|
|
|
|
<DATABASE-DISABLE_SERVER_SIDE_CURSORS>` to ``True``.
|
|
|
|
|
|
|
|
To benefit from server-side cursors in transaction pooling mode, you could set
|
|
|
|
up :doc:`another connection to the database </topics/db/multi-db>` in order to
|
|
|
|
perform queries that use server-side cursors. This connection needs to either
|
|
|
|
be directly to the database or to a connection pooler in session pooling mode.
|
|
|
|
|
|
|
|
Another option is to wrap each ``QuerySet`` using server-side cursors in an
|
|
|
|
:func:`~django.db.transaction.atomic` block, because it disables ``autocommit``
|
|
|
|
for the duration of the transaction. This way, the server-side cursor will only
|
|
|
|
live for the duration of the transaction.
|
|
|
|
|
2020-04-01 20:48:52 +08:00
|
|
|
.. _PgBouncer: https://pgbouncer.github.io/
|
2017-05-06 10:19:34 +08:00
|
|
|
|
2017-06-18 11:17:15 +08:00
|
|
|
.. _manually-specified-autoincrement-pk:
|
|
|
|
|
|
|
|
Manually-specifying values of auto-incrementing primary keys
|
|
|
|
------------------------------------------------------------
|
|
|
|
|
|
|
|
Django uses PostgreSQL's `SERIAL data type`_ to store auto-incrementing primary
|
|
|
|
keys. A ``SERIAL`` column is populated with values from a `sequence`_ that
|
|
|
|
keeps track of the next available value. Manually assigning a value to an
|
|
|
|
auto-incrementing field doesn't update the field's sequence, which might later
|
|
|
|
cause a conflict. For example::
|
|
|
|
|
|
|
|
>>> from django.contrib.auth.models import User
|
|
|
|
>>> User.objects.create(username='alice', pk=1)
|
|
|
|
<User: alice>
|
|
|
|
>>> # The sequence hasn't been updated; its next value is 1.
|
|
|
|
>>> User.objects.create(username='bob')
|
|
|
|
...
|
|
|
|
IntegrityError: duplicate key value violates unique constraint
|
|
|
|
"auth_user_pkey" DETAIL: Key (id)=(1) already exists.
|
|
|
|
|
|
|
|
If you need to specify such values, reset the sequence afterwards to avoid
|
|
|
|
reusing a value that's already in the table. The :djadmin:`sqlsequencereset`
|
|
|
|
management command generates the SQL statements to do that.
|
|
|
|
|
2019-03-30 09:49:44 +08:00
|
|
|
.. _SERIAL data type: https://www.postgresql.org/docs/current/datatype-numeric.html#DATATYPE-SERIAL
|
|
|
|
.. _sequence: https://www.postgresql.org/docs/current/sql-createsequence.html
|
2017-06-18 11:17:15 +08:00
|
|
|
|
2016-08-15 22:10:40 +08:00
|
|
|
Test database templates
|
|
|
|
-----------------------
|
|
|
|
|
|
|
|
You can use the :setting:`TEST['TEMPLATE'] <TEST_TEMPLATE>` setting to specify
|
|
|
|
a `template`_ (e.g. ``'template0'``) from which to create a test database.
|
|
|
|
|
2019-03-30 09:49:44 +08:00
|
|
|
.. _template: https://www.postgresql.org/docs/current/sql-createdatabase.html
|
2016-08-15 22:10:40 +08:00
|
|
|
|
2015-07-21 20:51:58 +08:00
|
|
|
Speeding up test execution with non-durable settings
|
|
|
|
----------------------------------------------------
|
|
|
|
|
|
|
|
You can speed up test execution times by `configuring PostgreSQL to be
|
2019-03-30 09:49:44 +08:00
|
|
|
non-durable <https://www.postgresql.org/docs/current/non-durability.html>`_.
|
2015-07-21 20:51:58 +08:00
|
|
|
|
|
|
|
.. warning::
|
|
|
|
|
|
|
|
This is dangerous: it will make your database more susceptible to data loss
|
|
|
|
or corruption in the case of a server crash or power loss. Only use this on
|
|
|
|
a development machine where you can easily restore the entire contents of
|
|
|
|
all databases in the cluster.
|
|
|
|
|
2019-05-28 01:59:49 +08:00
|
|
|
.. _mariadb-notes:
|
|
|
|
|
|
|
|
MariaDB notes
|
|
|
|
=============
|
|
|
|
|
2019-10-16 18:58:05 +08:00
|
|
|
Django supports MariaDB 10.2 and higher.
|
2019-05-28 01:59:49 +08:00
|
|
|
|
|
|
|
To use MariaDB, use the MySQL backend, which is shared between the two. See the
|
|
|
|
:ref:`MySQL notes <mysql-notes>` for more details.
|
|
|
|
|
2008-09-04 07:10:07 +08:00
|
|
|
.. _mysql-notes:
|
|
|
|
|
2007-03-16 23:42:58 +08:00
|
|
|
MySQL notes
|
2007-03-14 20:08:19 +08:00
|
|
|
===========
|
|
|
|
|
2012-04-21 11:04:10 +08:00
|
|
|
Version support
|
|
|
|
---------------
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2020-05-19 16:56:39 +08:00
|
|
|
Django supports MySQL 5.7 and higher.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2014-08-02 22:27:01 +08:00
|
|
|
Django's ``inspectdb`` feature uses the ``information_schema`` database, which
|
|
|
|
contains detailed data on all database schemas.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2012-04-21 11:04:10 +08:00
|
|
|
Django expects the database to support Unicode (UTF-8 encoding) and delegates to
|
|
|
|
it the task of enforcing transactions and referential integrity. It is important
|
|
|
|
to be aware of the fact that the two latter ones aren't actually enforced by
|
|
|
|
MySQL when using the MyISAM storage engine, see the next section.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2012-04-22 06:52:03 +08:00
|
|
|
.. _mysql-storage-engines:
|
|
|
|
|
2007-03-16 23:42:58 +08:00
|
|
|
Storage engines
|
2007-03-14 20:08:19 +08:00
|
|
|
---------------
|
|
|
|
|
2013-07-19 16:01:13 +08:00
|
|
|
MySQL has several `storage engines`_. You can change the default storage engine
|
|
|
|
in the server configuration.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2017-08-25 02:56:09 +08:00
|
|
|
MySQL's default storage engine is InnoDB_. This engine is fully transactional
|
|
|
|
and supports foreign key references. It's the recommended choice. However, the
|
|
|
|
InnoDB autoincrement counter is lost on a MySQL restart because it does not
|
|
|
|
remember the ``AUTO_INCREMENT`` value, instead recreating it as "max(id)+1".
|
|
|
|
This may result in an inadvertent reuse of :class:`~django.db.models.AutoField`
|
|
|
|
values.
|
2012-02-19 15:39:05 +08:00
|
|
|
|
2017-08-25 02:56:09 +08:00
|
|
|
The main drawbacks of MyISAM_ are that it doesn't support transactions or
|
|
|
|
enforce foreign-key constraints.
|
2012-10-12 18:37:35 +08:00
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _storage engines: https://dev.mysql.com/doc/refman/en/storage-engines.html
|
|
|
|
.. _MyISAM: https://dev.mysql.com/doc/refman/en/myisam-storage-engine.html
|
|
|
|
.. _InnoDB: https://dev.mysql.com/doc/refman/en/innodb-storage-engine.html
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2013-11-11 15:46:54 +08:00
|
|
|
.. _mysql-db-api-drivers:
|
|
|
|
|
|
|
|
MySQL DB API Drivers
|
|
|
|
--------------------
|
|
|
|
|
2017-01-19 00:51:29 +08:00
|
|
|
MySQL has a couple drivers that implement the Python Database API described in
|
|
|
|
:pep:`249`:
|
|
|
|
|
|
|
|
- `mysqlclient`_ is a native driver. It's **the recommended choice**.
|
2013-11-11 15:46:54 +08:00
|
|
|
- `MySQL Connector/Python`_ is a pure Python driver from Oracle that does not
|
|
|
|
require the MySQL client library or any Python modules outside the standard
|
|
|
|
library.
|
|
|
|
|
2018-04-18 06:19:29 +08:00
|
|
|
.. _mysqlclient: https://pypi.org/project/mysqlclient/
|
2015-11-30 00:29:46 +08:00
|
|
|
.. _MySQL Connector/Python: https://dev.mysql.com/downloads/connector/python
|
2013-11-11 15:46:54 +08:00
|
|
|
|
2017-01-25 23:16:10 +08:00
|
|
|
These drivers are thread-safe and provide connection pooling.
|
2013-11-11 15:46:54 +08:00
|
|
|
|
2014-03-01 00:44:03 +08:00
|
|
|
In addition to a DB API driver, Django needs an adapter to access the database
|
2017-01-25 23:16:10 +08:00
|
|
|
drivers from its ORM. Django provides an adapter for mysqlclient while MySQL
|
|
|
|
Connector/Python includes `its own`_.
|
2013-11-11 15:46:54 +08:00
|
|
|
|
2015-11-30 00:29:46 +08:00
|
|
|
.. _its own: https://dev.mysql.com/doc/connector-python/en/connector-python-django-backend.html
|
2013-11-11 15:46:54 +08:00
|
|
|
|
2014-10-25 17:05:38 +08:00
|
|
|
mysqlclient
|
|
|
|
~~~~~~~~~~~
|
2013-05-06 01:44:43 +08:00
|
|
|
|
2020-04-10 18:45:42 +08:00
|
|
|
Django requires `mysqlclient`_ 1.4.0 or later.
|
2013-05-06 01:44:43 +08:00
|
|
|
|
2013-11-11 15:46:54 +08:00
|
|
|
MySQL Connector/Python
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
2013-05-08 21:33:02 +08:00
|
|
|
|
2014-06-03 15:02:03 +08:00
|
|
|
MySQL Connector/Python is available from the `download page`_.
|
|
|
|
The Django adapter is available in versions 1.1.X and later. It may not
|
|
|
|
support the most recent releases of Django.
|
2013-11-11 15:46:54 +08:00
|
|
|
|
2015-11-30 00:29:46 +08:00
|
|
|
.. _download page: https://dev.mysql.com/downloads/connector/python/
|
2013-05-06 01:44:43 +08:00
|
|
|
|
2013-12-27 04:50:33 +08:00
|
|
|
.. _mysql-time-zone-definitions:
|
|
|
|
|
|
|
|
Time zone definitions
|
|
|
|
---------------------
|
|
|
|
|
|
|
|
If you plan on using Django's :doc:`timezone support </topics/i18n/timezones>`,
|
|
|
|
use `mysql_tzinfo_to_sql`_ to load time zone tables into the MySQL database.
|
|
|
|
This needs to be done just once for your MySQL server, not per database.
|
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _mysql_tzinfo_to_sql: https://dev.mysql.com/doc/refman/en/mysql-tzinfo-to-sql.html
|
2013-12-27 04:50:33 +08:00
|
|
|
|
2007-03-14 20:08:19 +08:00
|
|
|
Creating your database
|
2007-03-16 23:42:58 +08:00
|
|
|
----------------------
|
2007-03-14 20:08:19 +08:00
|
|
|
|
|
|
|
You can `create your database`_ using the command-line tools and this SQL::
|
|
|
|
|
|
|
|
CREATE DATABASE <dbname> CHARACTER SET utf8;
|
2007-03-16 23:42:58 +08:00
|
|
|
|
|
|
|
This ensures all tables and columns will use UTF-8 by default.
|
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _create your database: https://dev.mysql.com/doc/refman/en/create-database.html
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2008-08-26 09:59:25 +08:00
|
|
|
.. _mysql-collation:
|
|
|
|
|
|
|
|
Collation settings
|
|
|
|
~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
The collation setting for a column controls the order in which data is sorted
|
2020-10-02 19:29:50 +08:00
|
|
|
as well as what strings compare as equal. You can specify the ``db_collation``
|
|
|
|
parameter to set the collation name of the column for
|
|
|
|
:attr:`CharField <django.db.models.CharField.db_collation>` and
|
|
|
|
:attr:`TextField <django.db.models.TextField.db_collation>`.
|
|
|
|
|
|
|
|
The collation can also be set on a database-wide level and per-table. This is
|
|
|
|
`documented thoroughly`_ in the MySQL documentation. In such cases, you must
|
|
|
|
set the collation by directly manipulating the database settings or tables.
|
|
|
|
Django doesn't provide an API to change them.
|
2008-08-26 09:59:25 +08:00
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _documented thoroughly: https://dev.mysql.com/doc/refman/en/charset.html
|
2008-08-26 09:59:25 +08:00
|
|
|
|
|
|
|
By default, with a UTF-8 database, MySQL will use the
|
2013-11-01 17:43:27 +08:00
|
|
|
``utf8_general_ci`` collation. This results in all string equality
|
2008-08-26 09:59:25 +08:00
|
|
|
comparisons being done in a *case-insensitive* manner. That is, ``"Fred"`` and
|
|
|
|
``"freD"`` are considered equal at the database level. If you have a unique
|
|
|
|
constraint on a field, it would be illegal to try to insert both ``"aa"`` and
|
|
|
|
``"AA"`` into the same column, since they compare as equal (and, hence,
|
2017-01-25 23:16:10 +08:00
|
|
|
non-unique) with the default collation. If you want case-sensitive comparisons
|
|
|
|
on a particular column or table, change the column or table to use the
|
|
|
|
``utf8_bin`` collation.
|
2008-08-26 09:59:25 +08:00
|
|
|
|
2014-04-19 00:41:29 +08:00
|
|
|
Please note that according to `MySQL Unicode Character Sets`_, comparisons for
|
|
|
|
the ``utf8_general_ci`` collation are faster, but slightly less correct, than
|
|
|
|
comparisons for ``utf8_unicode_ci``. If this is acceptable for your application,
|
|
|
|
you should use ``utf8_general_ci`` because it is faster. If this is not acceptable
|
|
|
|
(for example, if you require German dictionary order), use ``utf8_unicode_ci``
|
|
|
|
because it is more accurate.
|
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _MySQL Unicode Character Sets: https://dev.mysql.com/doc/refman/en/charset-unicode-sets.html
|
2014-04-19 00:41:29 +08:00
|
|
|
|
2014-12-08 23:49:35 +08:00
|
|
|
.. warning::
|
|
|
|
|
|
|
|
Model formsets validate unique fields in a case-sensitive manner. Thus when
|
|
|
|
using a case-insensitive collation, a formset with unique field values that
|
|
|
|
differ only by case will pass validation, but upon calling ``save()``, an
|
|
|
|
``IntegrityError`` will be raised.
|
|
|
|
|
2020-10-02 19:29:50 +08:00
|
|
|
.. versionchanged:: 3.2
|
|
|
|
|
|
|
|
Support for setting a database collation for the field was added.
|
|
|
|
|
2007-03-14 20:08:19 +08:00
|
|
|
Connecting to the database
|
2007-03-16 23:42:58 +08:00
|
|
|
--------------------------
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2010-08-20 03:27:44 +08:00
|
|
|
Refer to the :doc:`settings documentation </ref/settings>`.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
|
|
|
Connection settings are used in this order:
|
|
|
|
|
2018-11-16 02:54:28 +08:00
|
|
|
#. :setting:`OPTIONS`.
|
|
|
|
#. :setting:`NAME`, :setting:`USER`, :setting:`PASSWORD`, :setting:`HOST`,
|
|
|
|
:setting:`PORT`
|
|
|
|
#. MySQL option files.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2011-05-30 01:41:04 +08:00
|
|
|
In other words, if you set the name of the database in :setting:`OPTIONS`,
|
|
|
|
this will take precedence over :setting:`NAME`, which would override
|
2007-03-14 20:08:19 +08:00
|
|
|
anything in a `MySQL option file`_.
|
|
|
|
|
|
|
|
Here's a sample configuration which uses a MySQL option file::
|
|
|
|
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
# settings.py
|
2009-12-22 23:18:51 +08:00
|
|
|
DATABASES = {
|
|
|
|
'default': {
|
|
|
|
'ENGINE': 'django.db.backends.mysql',
|
|
|
|
'OPTIONS': {
|
|
|
|
'read_default_file': '/path/to/my.cnf',
|
|
|
|
},
|
|
|
|
}
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
}
|
2009-06-24 22:00:53 +08:00
|
|
|
|
2009-12-22 23:18:51 +08:00
|
|
|
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
# my.cnf
|
|
|
|
[client]
|
2009-12-22 23:18:51 +08:00
|
|
|
database = NAME
|
|
|
|
user = USER
|
|
|
|
password = PASSWORD
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
default-character-set = utf8
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2017-01-25 23:16:10 +08:00
|
|
|
Several other `MySQLdb connection options`_ may be useful, such as ``ssl``,
|
|
|
|
``init_command``, and ``sql_mode``.
|
2007-03-16 23:42:58 +08:00
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _MySQL option file: https://dev.mysql.com/doc/refman/en/option-files.html
|
2017-05-03 08:17:14 +08:00
|
|
|
.. _MySQLdb connection options: https://mysqlclient.readthedocs.io/user_guide.html#functions-and-attributes
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2016-04-07 03:25:55 +08:00
|
|
|
.. _mysql-sql-mode:
|
|
|
|
|
|
|
|
Setting ``sql_mode``
|
|
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2020-05-19 16:56:39 +08:00
|
|
|
From MySQL 5.7 onwards, the default value of the ``sql_mode`` option contains
|
|
|
|
``STRICT_TRANS_TABLES``. That option escalates warnings into errors when data
|
|
|
|
are truncated upon insertion, so Django highly recommends activating a
|
|
|
|
`strict mode`_ for MySQL to prevent data loss (either ``STRICT_TRANS_TABLES``
|
|
|
|
or ``STRICT_ALL_TABLES``).
|
2016-04-07 03:25:55 +08:00
|
|
|
|
2016-09-30 20:58:59 +08:00
|
|
|
.. _strict mode: https://dev.mysql.com/doc/refman/en/sql-mode.html#sql-mode-strict
|
2016-04-07 03:25:55 +08:00
|
|
|
|
|
|
|
If you need to customize the SQL mode, you can set the ``sql_mode`` variable
|
|
|
|
like other MySQL options: either in a config file or with the entry
|
|
|
|
``'init_command': "SET sql_mode='STRICT_TRANS_TABLES'"`` in the
|
|
|
|
:setting:`OPTIONS` part of your database configuration in :setting:`DATABASES`.
|
|
|
|
|
2017-01-18 00:16:15 +08:00
|
|
|
.. _mysql-isolation-level:
|
|
|
|
|
|
|
|
Isolation level
|
|
|
|
~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
When running concurrent loads, database transactions from different sessions
|
|
|
|
(say, separate threads handling different requests) may interact with each
|
|
|
|
other. These interactions are affected by each session's `transaction isolation
|
|
|
|
level`_. You can set a connection's isolation level with an
|
|
|
|
``'isolation_level'`` entry in the :setting:`OPTIONS` part of your database
|
|
|
|
configuration in :setting:`DATABASES`. Valid values for
|
|
|
|
this entry are the four standard isolation levels:
|
|
|
|
|
|
|
|
* ``'read uncommitted'``
|
|
|
|
* ``'read committed'``
|
|
|
|
* ``'repeatable read'``
|
|
|
|
* ``'serializable'``
|
|
|
|
|
|
|
|
or ``None`` to use the server's configured isolation level. However, Django
|
2017-02-02 04:34:17 +08:00
|
|
|
works best with and defaults to read committed rather than MySQL's default,
|
2019-05-17 18:23:10 +08:00
|
|
|
repeatable read. Data loss is possible with repeatable read. In particular,
|
|
|
|
you may see cases where :meth:`~django.db.models.query.QuerySet.get_or_create`
|
|
|
|
will raise an :exc:`~django.db.IntegrityError` but the object won't appear in
|
|
|
|
a subsequent :meth:`~django.db.models.query.QuerySet.get` call.
|
2017-02-02 04:34:17 +08:00
|
|
|
|
2017-01-18 00:16:15 +08:00
|
|
|
.. _transaction isolation level: https://dev.mysql.com/doc/refman/en/innodb-transaction-isolation-levels.html
|
|
|
|
|
2007-03-14 20:08:19 +08:00
|
|
|
Creating your tables
|
2007-03-16 23:42:58 +08:00
|
|
|
--------------------
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2007-03-16 23:42:58 +08:00
|
|
|
When Django generates the schema, it doesn't specify a storage engine, so
|
|
|
|
tables will be created with whatever default storage engine your database
|
|
|
|
server is configured for. The easiest solution is to set your database server's
|
|
|
|
default storage engine to the desired engine.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2007-03-16 23:42:58 +08:00
|
|
|
If you're using a hosting service and can't change your server's default
|
2007-03-14 20:08:19 +08:00
|
|
|
storage engine, you have a couple of options.
|
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* After the tables are created, execute an ``ALTER TABLE`` statement to
|
|
|
|
convert a table to a new storage engine (such as InnoDB)::
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
ALTER TABLE <tablename> ENGINE=INNODB;
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
This can be tedious if you have a lot of tables.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* Another option is to use the ``init_command`` option for MySQLdb prior to
|
|
|
|
creating your tables::
|
2007-03-16 23:42:58 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
'OPTIONS': {
|
2016-01-22 21:19:00 +08:00
|
|
|
'init_command': 'SET default_storage_engine=INNODB',
|
2011-10-14 08:12:01 +08:00
|
|
|
}
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
This sets the default storage engine upon connecting to the database.
|
2012-07-01 19:25:24 +08:00
|
|
|
After your tables have been created, you should remove this option as it
|
|
|
|
adds a query that is only needed during table creation to each database
|
|
|
|
connection.
|
2007-03-14 20:08:19 +08:00
|
|
|
|
2011-09-11 04:06:10 +08:00
|
|
|
Table names
|
|
|
|
-----------
|
|
|
|
|
|
|
|
There are `known issues`_ in even the latest versions of MySQL that can cause the
|
|
|
|
case of a table name to be altered when certain SQL statements are executed
|
|
|
|
under certain conditions. It is recommended that you use lowercase table
|
|
|
|
names, if possible, to avoid any problems that might arise from this behavior.
|
|
|
|
Django uses lowercase table names when it auto-generates table names from
|
|
|
|
models, so this is mainly a consideration if you are overriding the table name
|
|
|
|
via the :class:`~django.db.models.Options.db_table` parameter.
|
|
|
|
|
2015-11-30 00:29:46 +08:00
|
|
|
.. _known issues: https://bugs.mysql.com/bug.php?id=48875
|
2011-09-11 04:06:10 +08:00
|
|
|
|
2012-04-22 06:52:03 +08:00
|
|
|
Savepoints
|
|
|
|
----------
|
|
|
|
|
|
|
|
Both the Django ORM and MySQL (when using the InnoDB :ref:`storage engine
|
|
|
|
<mysql-storage-engines>`) support database :ref:`savepoints
|
2013-03-04 22:57:04 +08:00
|
|
|
<topics-db-transactions-savepoints>`.
|
2012-04-22 06:52:03 +08:00
|
|
|
|
|
|
|
If you use the MyISAM storage engine please be aware of the fact that you will
|
|
|
|
receive database-generated errors if you try to use the :ref:`savepoint-related
|
|
|
|
methods of the transactions API <topics-db-transactions-savepoints>`. The reason
|
|
|
|
for this is that detecting the storage engine of a MySQL database/table is an
|
|
|
|
expensive operation so it was decided it isn't worth to dynamically convert
|
|
|
|
these methods in no-op's based in the results of such detection.
|
|
|
|
|
2008-12-16 14:43:18 +08:00
|
|
|
Notes on specific fields
|
|
|
|
------------------------
|
|
|
|
|
2020-02-09 00:51:31 +08:00
|
|
|
.. _mysql-character-fields:
|
|
|
|
|
2008-12-16 14:43:18 +08:00
|
|
|
Character fields
|
|
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
|
2020-02-09 00:51:31 +08:00
|
|
|
Any fields that are stored with ``VARCHAR`` column types may have their
|
2008-12-16 14:43:18 +08:00
|
|
|
``max_length`` restricted to 255 characters if you are using ``unique=True``
|
|
|
|
for the field. This affects :class:`~django.db.models.CharField`,
|
2020-02-09 00:51:31 +08:00
|
|
|
:class:`~django.db.models.SlugField`. See `the MySQL documentation`_ for more
|
|
|
|
details.
|
|
|
|
|
|
|
|
.. _the MySQL documentation: https://dev.mysql.com/doc/refman/en/create-index.html#create-index-column-prefixes
|
2008-12-16 14:43:18 +08:00
|
|
|
|
2015-08-27 21:29:13 +08:00
|
|
|
``TextField`` limitations
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
MySQL can index only the first N chars of a ``BLOB`` or ``TEXT`` column. Since
|
|
|
|
``TextField`` doesn't have a defined length, you can't mark it as
|
|
|
|
``unique=True``. MySQL will report: "BLOB/TEXT column '<db_column>' used in key
|
|
|
|
specification without a key length".
|
|
|
|
|
2014-08-13 00:14:06 +08:00
|
|
|
.. _mysql-fractional-seconds:
|
2010-12-28 21:35:48 +08:00
|
|
|
|
2014-08-13 00:14:06 +08:00
|
|
|
Fractional seconds support for Time and DateTime fields
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2020-05-19 16:56:39 +08:00
|
|
|
MySQL can store fractional seconds, provided that the column definition
|
|
|
|
includes a fractional indication (e.g. ``DATETIME(6)``).
|
2014-08-13 00:14:06 +08:00
|
|
|
|
|
|
|
Django will not upgrade existing columns to include fractional seconds if the
|
|
|
|
database server supports it. If you want to enable them on an existing database,
|
|
|
|
it's up to you to either manually update the column on the target database, by
|
|
|
|
executing a command like::
|
|
|
|
|
|
|
|
ALTER TABLE `your_table` MODIFY `your_datetime_column` DATETIME(6)
|
|
|
|
|
|
|
|
or using a :class:`~django.db.migrations.operations.RunSQL` operation in a
|
|
|
|
:ref:`data migration <data-migrations>`.
|
|
|
|
|
2014-08-27 02:11:35 +08:00
|
|
|
``TIMESTAMP`` columns
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
If you are using a legacy database that contains ``TIMESTAMP`` columns, you must
|
|
|
|
set :setting:`USE_TZ = False <USE_TZ>` to avoid data corruption.
|
|
|
|
:djadmin:`inspectdb` maps these columns to
|
|
|
|
:class:`~django.db.models.DateTimeField` and if you enable timezone support,
|
|
|
|
both MySQL and Django will attempt to convert the values from UTC to local time.
|
|
|
|
|
2011-04-21 04:42:07 +08:00
|
|
|
Row locking with ``QuerySet.select_for_update()``
|
|
|
|
-------------------------------------------------
|
|
|
|
|
2019-11-05 05:44:10 +08:00
|
|
|
MySQL and MariaDB do not support some options to the ``SELECT ... FOR UPDATE``
|
|
|
|
statement. If ``select_for_update()`` is used with an unsupported option, then
|
|
|
|
a :exc:`~django.db.NotSupportedError` is raised.
|
|
|
|
|
|
|
|
=============== ========= ==========
|
|
|
|
Option MariaDB MySQL
|
|
|
|
=============== ========= ==========
|
|
|
|
``SKIP LOCKED`` X (≥8.0.1)
|
|
|
|
``NOWAIT`` X (≥10.3) X (≥8.0.1)
|
2020-07-12 12:25:03 +08:00
|
|
|
``OF`` X (≥8.0.1)
|
2020-05-11 00:25:06 +08:00
|
|
|
``NO KEY``
|
2019-11-05 05:44:10 +08:00
|
|
|
=============== ========= ==========
|
2011-04-21 04:42:07 +08:00
|
|
|
|
2019-10-25 05:39:12 +08:00
|
|
|
When using ``select_for_update()`` on MySQL, make sure you filter a queryset
|
|
|
|
against at least set of fields contained in unique constraints or only against
|
|
|
|
fields covered by indexes. Otherwise, an exclusive write lock will be acquired
|
|
|
|
over the full table for the duration of the transaction.
|
|
|
|
|
2014-04-21 04:13:41 +08:00
|
|
|
Automatic typecasting can cause unexpected results
|
|
|
|
--------------------------------------------------
|
|
|
|
|
|
|
|
When performing a query on a string type, but with an integer value, MySQL will
|
|
|
|
coerce the types of all values in the table to an integer before performing the
|
|
|
|
comparison. If your table contains the values ``'abc'``, ``'def'`` and you
|
|
|
|
query for ``WHERE mycolumn=0``, both rows will match. Similarly, ``WHERE mycolumn=1``
|
|
|
|
will match the value ``'abc1'``. Therefore, string type fields included in Django
|
|
|
|
will always cast the value to a string before using it in a query.
|
|
|
|
|
2015-08-04 04:27:49 +08:00
|
|
|
If you implement custom model fields that inherit from
|
|
|
|
:class:`~django.db.models.Field` directly, are overriding
|
|
|
|
:meth:`~django.db.models.Field.get_prep_value`, or use
|
|
|
|
:class:`~django.db.models.expressions.RawSQL`,
|
|
|
|
:meth:`~django.db.models.query.QuerySet.extra`, or
|
|
|
|
:meth:`~django.db.models.Manager.raw`, you should ensure that you perform
|
|
|
|
appropriate typecasting.
|
2014-04-21 04:13:41 +08:00
|
|
|
|
2008-09-04 05:10:42 +08:00
|
|
|
.. _sqlite-notes:
|
|
|
|
|
2009-01-29 18:46:36 +08:00
|
|
|
SQLite notes
|
|
|
|
============
|
|
|
|
|
2018-12-23 04:48:41 +08:00
|
|
|
Django supports SQLite 3.8.3 and later.
|
2018-08-03 22:36:02 +08:00
|
|
|
|
2009-01-06 11:34:47 +08:00
|
|
|
SQLite_ provides an excellent development alternative for applications that
|
|
|
|
are predominantly read-only or require a smaller installation footprint. As
|
|
|
|
with all database servers, though, there are some differences that are
|
|
|
|
specific to SQLite that you should be aware of.
|
|
|
|
|
2015-11-30 00:29:46 +08:00
|
|
|
.. _SQLite: https://www.sqlite.org/
|
2009-01-06 11:34:47 +08:00
|
|
|
|
|
|
|
.. _sqlite-string-matching:
|
|
|
|
|
2011-08-26 16:42:38 +08:00
|
|
|
Substring matching and case sensitivity
|
2017-03-21 06:30:32 +08:00
|
|
|
---------------------------------------
|
2011-08-26 16:42:38 +08:00
|
|
|
|
|
|
|
For all SQLite versions, there is some slightly counter-intuitive behavior when
|
|
|
|
attempting to match some types of strings. These are triggered when using the
|
|
|
|
:lookup:`iexact` or :lookup:`contains` filters in Querysets. The behavior
|
|
|
|
splits into two cases:
|
|
|
|
|
|
|
|
1. For substring matching, all matches are done case-insensitively. That is a
|
|
|
|
filter such as ``filter(name__contains="aa")`` will match a name of ``"Aabb"``.
|
|
|
|
|
|
|
|
2. For strings containing characters outside the ASCII range, all exact string
|
|
|
|
matches are performed case-sensitively, even when the case-insensitive options
|
|
|
|
are passed into the query. So the :lookup:`iexact` filter will behave exactly
|
|
|
|
the same as the :lookup:`exact` filter in these cases.
|
|
|
|
|
|
|
|
Some possible workarounds for this are `documented at sqlite.org`_, but they
|
2014-03-01 10:03:46 +08:00
|
|
|
aren't utilized by the default SQLite backend in Django, as incorporating them
|
2011-08-26 16:42:38 +08:00
|
|
|
would be fairly difficult to do robustly. Thus, Django exposes the default
|
|
|
|
SQLite behavior and you should be aware of this when doing case-insensitive or
|
|
|
|
substring filtering.
|
2009-01-06 11:34:47 +08:00
|
|
|
|
2015-11-30 00:29:46 +08:00
|
|
|
.. _documented at sqlite.org: https://www.sqlite.org/faq.html#q18
|
2009-01-06 11:34:47 +08:00
|
|
|
|
2019-09-09 05:25:53 +08:00
|
|
|
.. _sqlite-decimal-handling:
|
|
|
|
|
|
|
|
Decimal handling
|
|
|
|
----------------
|
|
|
|
|
|
|
|
SQLite has no real decimal internal type. Decimal values are internally
|
|
|
|
converted to the ``REAL`` data type (8-byte IEEE floating point number), as
|
|
|
|
explained in the `SQLite datatypes documentation`__, so they don't support
|
|
|
|
correctly-rounded decimal floating point arithmetic.
|
|
|
|
|
|
|
|
__ https://www.sqlite.org/datatype3.html#storage_classes_and_datatypes
|
|
|
|
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
"Database is locked" errors
|
2011-04-22 20:14:54 +08:00
|
|
|
---------------------------
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
|
|
|
|
SQLite is meant to be a lightweight database, and thus can't support a high
|
|
|
|
level of concurrency. ``OperationalError: database is locked`` errors indicate
|
|
|
|
that your application is experiencing more concurrency than ``sqlite`` can
|
|
|
|
handle in default configuration. This error means that one thread or process has
|
|
|
|
an exclusive lock on the database connection and another thread timed out
|
|
|
|
waiting for the lock the be released.
|
|
|
|
|
|
|
|
Python's SQLite wrapper has
|
|
|
|
a default timeout value that determines how long the second thread is allowed to
|
|
|
|
wait on the lock before it times out and raises the ``OperationalError: database
|
|
|
|
is locked`` error.
|
|
|
|
|
|
|
|
If you're getting this error, you can solve it by:
|
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* Switching to another database backend. At a certain point SQLite becomes
|
|
|
|
too "lite" for real-world applications, and these sorts of concurrency
|
|
|
|
errors indicate you've reached that point.
|
2009-06-24 22:00:53 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* Rewriting your code to reduce concurrency and ensure that database
|
|
|
|
transactions are short-lived.
|
2009-06-24 22:00:53 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* Increase the default timeout value by setting the ``timeout`` database
|
2015-03-10 17:10:24 +08:00
|
|
|
option::
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
'OPTIONS': {
|
|
|
|
# ...
|
|
|
|
'timeout': 20,
|
|
|
|
# ...
|
|
|
|
}
|
2009-06-24 22:00:53 +08:00
|
|
|
|
2019-06-17 22:54:55 +08:00
|
|
|
This will make SQLite wait a bit longer before throwing "database is locked"
|
|
|
|
errors; it won't really do anything to solve them.
|
Fixed a whole bunch of small docs typos, errors, and ommissions.
Fixes #8358, #8396, #8724, #9043, #9128, #9247, #9267, #9267, #9375, #9409, #9414, #9416, #9446, #9454, #9464, #9503, #9518, #9533, #9657, #9658, #9683, #9733, #9771, #9835, #9836, #9837, #9897, #9906, #9912, #9945, #9986, #9992, #10055, #10084, #10091, #10145, #10245, #10257, #10309, #10358, #10359, #10424, #10426, #10508, #10531, #10551, #10635, #10637, #10656, #10658, #10690, #10699, #19528.
Thanks to all the respective authors of those tickets.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@10371 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2009-04-04 02:30:54 +08:00
|
|
|
|
2011-04-21 04:42:07 +08:00
|
|
|
``QuerySet.select_for_update()`` not supported
|
|
|
|
----------------------------------------------
|
|
|
|
|
|
|
|
SQLite does not support the ``SELECT ... FOR UPDATE`` syntax. Calling it will
|
|
|
|
have no effect.
|
|
|
|
|
2013-06-28 11:15:03 +08:00
|
|
|
"pyformat" parameter style in raw queries not supported
|
|
|
|
-------------------------------------------------------
|
|
|
|
|
|
|
|
For most backends, raw queries (``Manager.raw()`` or ``cursor.execute()``)
|
|
|
|
can use the "pyformat" parameter style, where placeholders in the query
|
|
|
|
are given as ``'%(name)s'`` and the parameters are passed as a dictionary
|
|
|
|
rather than a list. SQLite does not support this.
|
|
|
|
|
2018-07-21 02:57:17 +08:00
|
|
|
.. _sqlite-isolation:
|
|
|
|
|
|
|
|
Isolation when using ``QuerySet.iterator()``
|
|
|
|
--------------------------------------------
|
|
|
|
|
|
|
|
There are special considerations described in `Isolation In SQLite`_ when
|
|
|
|
modifying a table while iterating over it using :meth:`.QuerySet.iterator`. If
|
|
|
|
a row is added, changed, or deleted within the loop, then that row may or may
|
|
|
|
not appear, or may appear twice, in subsequent results fetched from the
|
|
|
|
iterator. Your code must handle this.
|
|
|
|
|
|
|
|
.. _`Isolation in SQLite`: https://sqlite.org/isolation.html
|
|
|
|
|
2019-06-09 08:56:37 +08:00
|
|
|
.. _sqlite-json1:
|
|
|
|
|
|
|
|
Enabling JSON1 extension on SQLite
|
|
|
|
----------------------------------
|
|
|
|
|
|
|
|
To use :class:`~django.db.models.JSONField` on SQLite, you need to enable the
|
|
|
|
`JSON1 extension`_ on Python's :py:mod:`sqlite3` library. If the extension is
|
|
|
|
not enabled on your installation, a system error (``fields.E180``) will be
|
|
|
|
raised.
|
|
|
|
|
|
|
|
To enable the JSON1 extension you can follow the instruction on
|
|
|
|
`the wiki page`_.
|
|
|
|
|
|
|
|
.. _JSON1 extension: https://www.sqlite.org/json1.html
|
|
|
|
.. _the wiki page: https://code.djangoproject.com/wiki/JSON1Extension
|
|
|
|
|
2008-08-24 06:25:40 +08:00
|
|
|
.. _oracle-notes:
|
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
Oracle notes
|
2007-09-29 03:25:50 +08:00
|
|
|
============
|
|
|
|
|
2019-02-07 02:25:04 +08:00
|
|
|
Django supports `Oracle Database Server`_ versions 12.2 and higher. Version
|
2018-10-11 17:43:16 +08:00
|
|
|
6.0 or higher of the `cx_Oracle`_ Python driver is required.
|
2009-08-24 23:45:48 +08:00
|
|
|
|
2017-05-20 23:51:21 +08:00
|
|
|
.. _`Oracle Database Server`: https://www.oracle.com/
|
|
|
|
.. _`cx_Oracle`: https://oracle.github.io/python-cx_Oracle/
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2013-07-25 23:19:36 +08:00
|
|
|
In order for the ``python manage.py migrate`` command to work, your Oracle
|
2007-11-30 13:03:32 +08:00
|
|
|
database user must have privileges to run the following commands:
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* CREATE TABLE
|
|
|
|
* CREATE SEQUENCE
|
|
|
|
* CREATE PROCEDURE
|
|
|
|
* CREATE TRIGGER
|
2009-01-29 18:46:36 +08:00
|
|
|
|
2014-09-22 01:15:48 +08:00
|
|
|
To run a project's test suite, the user usually needs these *additional*
|
|
|
|
privileges:
|
2007-11-30 13:03:32 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* CREATE USER
|
2016-11-02 21:44:15 +08:00
|
|
|
* ALTER USER
|
2011-10-14 08:12:01 +08:00
|
|
|
* DROP USER
|
|
|
|
* CREATE TABLESPACE
|
|
|
|
* DROP TABLESPACE
|
2014-09-22 01:15:48 +08:00
|
|
|
* CREATE SESSION WITH ADMIN OPTION
|
|
|
|
* CREATE TABLE WITH ADMIN OPTION
|
|
|
|
* CREATE SEQUENCE WITH ADMIN OPTION
|
|
|
|
* CREATE PROCEDURE WITH ADMIN OPTION
|
|
|
|
* CREATE TRIGGER WITH ADMIN OPTION
|
|
|
|
|
2018-06-16 04:11:33 +08:00
|
|
|
While the ``RESOURCE`` role has the required ``CREATE TABLE``,
|
|
|
|
``CREATE SEQUENCE``, ``CREATE PROCEDURE``, and ``CREATE TRIGGER`` privileges,
|
|
|
|
and a user granted ``RESOURCE WITH ADMIN OPTION`` can grant ``RESOURCE``, such
|
|
|
|
a user cannot grant the individual privileges (e.g. ``CREATE TABLE``), and thus
|
|
|
|
``RESOURCE WITH ADMIN OPTION`` is not usually sufficient for running tests.
|
2014-09-22 01:15:48 +08:00
|
|
|
|
2018-11-27 02:45:05 +08:00
|
|
|
Some test suites also create views or materialized views; to run these, the
|
|
|
|
user also needs ``CREATE VIEW WITH ADMIN OPTION`` and
|
|
|
|
``CREATE MATERIALIZED VIEW WITH ADMIN OPTION`` privileges. In particular, this
|
|
|
|
is needed for Django's own test suite.
|
2014-09-22 01:15:48 +08:00
|
|
|
|
|
|
|
All of these privileges are included in the DBA role, which is appropriate
|
|
|
|
for use on a private developer's database.
|
2009-01-29 18:46:36 +08:00
|
|
|
|
2015-09-16 04:01:31 +08:00
|
|
|
The Oracle database backend uses the ``SYS.DBMS_LOB`` and ``SYS.DBMS_RANDOM``
|
|
|
|
packages, so your user will require execute permissions on it. It's normally
|
|
|
|
accessible to all users by default, but in case it is not, you'll need to grant
|
|
|
|
permissions like so:
|
2013-09-08 01:59:57 +08:00
|
|
|
|
|
|
|
.. code-block:: sql
|
|
|
|
|
|
|
|
GRANT EXECUTE ON SYS.DBMS_LOB TO user;
|
2015-09-16 04:01:31 +08:00
|
|
|
GRANT EXECUTE ON SYS.DBMS_RANDOM TO user;
|
2013-09-08 01:59:57 +08:00
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
Connecting to the database
|
2007-09-29 03:25:50 +08:00
|
|
|
--------------------------
|
|
|
|
|
2014-05-19 15:33:12 +08:00
|
|
|
To connect using the service name of your Oracle database, your ``settings.py``
|
|
|
|
file should look something like this::
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2009-12-22 23:18:51 +08:00
|
|
|
DATABASES = {
|
|
|
|
'default': {
|
|
|
|
'ENGINE': 'django.db.backends.oracle',
|
|
|
|
'NAME': 'xe',
|
|
|
|
'USER': 'a_user',
|
|
|
|
'PASSWORD': 'a_password',
|
|
|
|
'HOST': '',
|
2010-11-20 07:19:23 +08:00
|
|
|
'PORT': '',
|
2009-12-22 23:18:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2014-05-19 15:33:12 +08:00
|
|
|
In this case, you should leave both :setting:`HOST` and :setting:`PORT` empty.
|
|
|
|
However, if you don't use a ``tnsnames.ora`` file or a similar naming method
|
|
|
|
and want to connect using the SID ("xe" in this example), then fill in both
|
2011-05-30 01:41:04 +08:00
|
|
|
:setting:`HOST` and :setting:`PORT` like so::
|
2009-12-22 23:18:51 +08:00
|
|
|
|
|
|
|
DATABASES = {
|
|
|
|
'default': {
|
|
|
|
'ENGINE': 'django.db.backends.oracle',
|
|
|
|
'NAME': 'xe',
|
|
|
|
'USER': 'a_user',
|
|
|
|
'PASSWORD': 'a_password',
|
|
|
|
'HOST': 'dbprod01ned.mycompany.com',
|
|
|
|
'PORT': '1540',
|
|
|
|
}
|
|
|
|
}
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2014-05-19 15:33:12 +08:00
|
|
|
You should either supply both :setting:`HOST` and :setting:`PORT`, or leave
|
|
|
|
both as empty strings. Django will use a different connect descriptor depending
|
|
|
|
on that choice.
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2018-09-16 19:48:25 +08:00
|
|
|
Full DSN and Easy Connect
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
A Full DSN or Easy Connect string can be used in :setting:`NAME` if both
|
|
|
|
:setting:`HOST` and :setting:`PORT` are empty. This format is required when
|
|
|
|
using RAC or pluggable databases without ``tnsnames.ora``, for example.
|
|
|
|
|
|
|
|
Example of an Easy Connect string::
|
|
|
|
|
|
|
|
'NAME': 'localhost:1521/orclpdb1',
|
|
|
|
|
|
|
|
Example of a full DSN string::
|
|
|
|
|
|
|
|
'NAME': (
|
|
|
|
'(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=localhost)(PORT=1521))'
|
|
|
|
'(CONNECT_DATA=(SERVICE_NAME=orclpdb1)))'
|
|
|
|
),
|
|
|
|
|
2010-11-20 07:19:23 +08:00
|
|
|
Threaded option
|
2019-02-09 04:38:30 +08:00
|
|
|
---------------
|
2010-11-20 07:19:23 +08:00
|
|
|
|
2013-07-19 16:01:13 +08:00
|
|
|
If you plan to run Django in a multithreaded environment (e.g. Apache using the
|
2014-04-23 07:05:14 +08:00
|
|
|
default MPM module on any modern operating system), then you **must** set
|
2018-06-16 04:11:33 +08:00
|
|
|
the ``threaded`` option of your Oracle database configuration to ``True``::
|
2010-11-20 07:19:23 +08:00
|
|
|
|
2018-06-16 04:11:33 +08:00
|
|
|
'OPTIONS': {
|
|
|
|
'threaded': True,
|
|
|
|
},
|
2010-11-20 07:19:23 +08:00
|
|
|
|
|
|
|
Failure to do this may result in crashes and other odd behavior.
|
|
|
|
|
2010-12-02 07:36:56 +08:00
|
|
|
INSERT ... RETURNING INTO
|
|
|
|
-------------------------
|
|
|
|
|
|
|
|
By default, the Oracle backend uses a ``RETURNING INTO`` clause to efficiently
|
|
|
|
retrieve the value of an ``AutoField`` when inserting new rows. This behavior
|
|
|
|
may result in a ``DatabaseError`` in certain unusual setups, such as when
|
|
|
|
inserting into a remote table, or into a view with an ``INSTEAD OF`` trigger.
|
|
|
|
The ``RETURNING INTO`` clause can be disabled by setting the
|
2018-06-16 04:11:33 +08:00
|
|
|
``use_returning_into`` option of the database configuration to ``False``::
|
2010-12-02 07:36:56 +08:00
|
|
|
|
2018-06-16 04:11:33 +08:00
|
|
|
'OPTIONS': {
|
|
|
|
'use_returning_into': False,
|
|
|
|
},
|
2010-12-02 07:36:56 +08:00
|
|
|
|
|
|
|
In this case, the Oracle backend will use a separate ``SELECT`` query to
|
2018-06-16 04:11:33 +08:00
|
|
|
retrieve ``AutoField`` values.
|
2010-12-02 07:36:56 +08:00
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
Naming issues
|
2007-09-29 03:25:50 +08:00
|
|
|
-------------
|
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
Oracle imposes a name length limit of 30 characters. To accommodate this, the
|
2007-09-29 03:25:50 +08:00
|
|
|
backend truncates database identifiers to fit, replacing the final four
|
|
|
|
characters of the truncated name with a repeatable MD5 hash value.
|
2013-10-21 23:12:48 +08:00
|
|
|
Additionally, the backend turns database identifiers to all-uppercase.
|
|
|
|
|
|
|
|
To prevent these transformations (this is usually required only when dealing
|
|
|
|
with legacy databases or accessing tables which belong to other users), use
|
|
|
|
a quoted name as the value for ``db_table``::
|
|
|
|
|
|
|
|
class LegacyModel(models.Model):
|
|
|
|
class Meta:
|
2014-08-09 01:59:02 +08:00
|
|
|
db_table = '"name_left_in_lowercase"'
|
2013-10-21 23:12:48 +08:00
|
|
|
|
|
|
|
class ForeignModel(models.Model):
|
|
|
|
class Meta:
|
2014-08-09 01:59:02 +08:00
|
|
|
db_table = '"OTHER_USER"."NAME_ONLY_SEEMS_OVER_30"'
|
2013-10-21 23:12:48 +08:00
|
|
|
|
2013-11-12 00:07:52 +08:00
|
|
|
Quoted names can also be used with Django's other supported database
|
2013-10-21 23:12:48 +08:00
|
|
|
backends; except for Oracle, however, the quotes have no effect.
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2013-07-25 23:19:36 +08:00
|
|
|
When running ``migrate``, an ``ORA-06552`` error may be encountered if
|
2010-01-29 06:12:18 +08:00
|
|
|
certain Oracle keywords are used as the name of a model field or the
|
|
|
|
value of a ``db_column`` option. Django quotes all identifiers used
|
|
|
|
in queries to prevent most such problems, but this error can still
|
|
|
|
occur when an Oracle datatype is used as a column name. In
|
|
|
|
particular, take care to avoid using the names ``date``,
|
|
|
|
``timestamp``, ``number`` or ``float`` as a field name.
|
|
|
|
|
2018-01-15 05:00:16 +08:00
|
|
|
.. _oracle-null-empty-strings:
|
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
NULL and empty strings
|
2007-09-29 03:25:50 +08:00
|
|
|
----------------------
|
|
|
|
|
2018-06-16 04:11:33 +08:00
|
|
|
Django generally prefers to use the empty string (``''``) rather than
|
|
|
|
``NULL``, but Oracle treats both identically. To get around this, the
|
2012-04-30 00:25:46 +08:00
|
|
|
Oracle backend ignores an explicit ``null`` option on fields that
|
|
|
|
have the empty string as a possible value and generates DDL as if
|
|
|
|
``null=True``. When fetching from the database, it is assumed that
|
|
|
|
a ``NULL`` value in one of these fields really means the empty
|
|
|
|
string, and the data is silently converted to reflect this assumption.
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
``TextField`` limitations
|
|
|
|
-------------------------
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2007-11-30 13:03:32 +08:00
|
|
|
The Oracle backend stores ``TextFields`` as ``NCLOB`` columns. Oracle imposes
|
2007-09-29 03:25:50 +08:00
|
|
|
some limitations on the usage of such LOB columns in general:
|
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* LOB columns may not be used as primary keys.
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* LOB columns may not be used in indexes.
|
2007-09-29 03:25:50 +08:00
|
|
|
|
2011-10-14 08:12:01 +08:00
|
|
|
* LOB columns may not be used in a ``SELECT DISTINCT`` list. This means that
|
2011-10-14 08:16:14 +08:00
|
|
|
attempting to use the ``QuerySet.distinct`` method on a model that
|
2015-09-16 04:01:31 +08:00
|
|
|
includes ``TextField`` columns will result in an ``ORA-00932`` error when
|
|
|
|
run against Oracle. As a workaround, use the ``QuerySet.defer`` method in
|
|
|
|
conjunction with ``distinct()`` to prevent ``TextField`` columns from being
|
|
|
|
included in the ``SELECT DISTINCT`` list.
|
2009-06-24 22:00:53 +08:00
|
|
|
|
2019-09-09 20:01:01 +08:00
|
|
|
.. _subclassing-database-backends:
|
|
|
|
|
|
|
|
Subclassing the built-in database backends
|
|
|
|
==========================================
|
|
|
|
|
|
|
|
Django comes with built-in database backends. You may subclass an existing
|
|
|
|
database backends to modify its behavior, features, or configuration.
|
|
|
|
|
|
|
|
Consider, for example, that you need to change a single database feature.
|
|
|
|
First, you have to create a new directory with a ``base`` module in it. For
|
|
|
|
example::
|
|
|
|
|
|
|
|
mysite/
|
|
|
|
...
|
|
|
|
mydbengine/
|
|
|
|
__init__.py
|
|
|
|
base.py
|
|
|
|
|
|
|
|
The ``base.py`` module must contain a class named ``DatabaseWrapper`` that
|
|
|
|
subclasses an existing engine from the ``django.db.backends`` module. Here's an
|
|
|
|
example of subclassing the PostgreSQL engine to change a feature class
|
|
|
|
``allows_group_by_selected_pks_on_model``:
|
|
|
|
|
|
|
|
.. code-block:: python
|
|
|
|
:caption: mysite/mydbengine/base.py
|
|
|
|
|
|
|
|
from django.db.backends.postgresql import base, features
|
|
|
|
|
|
|
|
class DatabaseFeatures(features.DatabaseFeatures):
|
|
|
|
def allows_group_by_selected_pks_on_model(self, model):
|
|
|
|
return True
|
|
|
|
|
|
|
|
class DatabaseWrapper(base.DatabaseWrapper):
|
|
|
|
features_class = DatabaseFeatures
|
|
|
|
|
|
|
|
Finally, you must specify a :setting:`DATABASE-ENGINE` in your ``settings.py``
|
|
|
|
file::
|
|
|
|
|
|
|
|
DATABASES = {
|
|
|
|
'default': {
|
|
|
|
'ENGINE': 'mydbengine',
|
|
|
|
...
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
You can see the current list of database engines by looking in
|
|
|
|
:source:`django/db/backends`.
|
|
|
|
|
2009-06-24 22:00:53 +08:00
|
|
|
.. _third-party-notes:
|
|
|
|
|
|
|
|
Using a 3rd-party database backend
|
|
|
|
==================================
|
|
|
|
|
|
|
|
In addition to the officially supported databases, there are backends provided
|
|
|
|
by 3rd parties that allow you to use other databases with Django:
|
|
|
|
|
2020-05-22 02:54:42 +08:00
|
|
|
* `CockroachDB`_
|
|
|
|
* `Firebird`_
|
2013-12-19 07:48:21 +08:00
|
|
|
* `Microsoft SQL Server`_
|
2009-06-24 22:00:53 +08:00
|
|
|
|
|
|
|
The Django versions and ORM features supported by these unofficial backends
|
|
|
|
vary considerably. Queries regarding the specific capabilities of these
|
|
|
|
unofficial backends, along with any support queries, should be directed to
|
|
|
|
the support channels provided by each 3rd party project.
|
|
|
|
|
2020-05-22 02:54:42 +08:00
|
|
|
.. _CockroachDB: https://pypi.org/project/django-cockroachdb/
|
|
|
|
.. _Firebird: https://pypi.org/project/django-firebird/
|
|
|
|
.. _Microsoft SQL Server: https://pypi.org/project/django-mssql-backend/
|