databases.txt 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922
  1. =========
  2. Databases
  3. =========
  4. Django attempts to support as many features as possible on all database
  5. backends. However, not all database backends are alike, and we've had to make
  6. design decisions on which features to support and which assumptions we can make
  7. safely.
  8. This file describes some of the features that might be relevant to Django
  9. usage. Of course, it is not intended as a replacement for server-specific
  10. documentation or reference manuals.
  11. General notes
  12. =============
  13. .. _persistent-database-connections:
  14. Persistent connections
  15. ----------------------
  16. Persistent connections avoid the overhead of re-establishing a connection to
  17. the database in each request. They're controlled by the
  18. :setting:`CONN_MAX_AGE` parameter which defines the maximum lifetime of a
  19. connection. It can be set independently for each database.
  20. The default value is ``0``, preserving the historical behavior of closing the
  21. database connection at the end of each request. To enable persistent
  22. connections, set :setting:`CONN_MAX_AGE` to a positive number of seconds. For
  23. unlimited persistent connections, set it to ``None``.
  24. Connection management
  25. ~~~~~~~~~~~~~~~~~~~~~
  26. Django opens a connection to the database when it first makes a database
  27. query. It keeps this connection open and reuses it in subsequent requests.
  28. Django closes the connection once it exceeds the maximum age defined by
  29. :setting:`CONN_MAX_AGE` or when it isn't usable any longer.
  30. In detail, Django automatically opens a connection to the database whenever it
  31. needs one and doesn't have one already — either because this is the first
  32. connection, or because the previous connection was closed.
  33. At the beginning of each request, Django closes the connection if it has
  34. reached its maximum age. If your database terminates idle connections after
  35. some time, you should set :setting:`CONN_MAX_AGE` to a lower value, so that
  36. Django doesn't attempt to use a connection that has been terminated by the
  37. database server. (This problem may only affect very low traffic sites.)
  38. At the end of each request, Django closes the connection if it has reached its
  39. maximum age or if it is in an unrecoverable error state. If any database
  40. errors have occurred while processing the requests, Django checks whether the
  41. connection still works, and closes it if it doesn't. Thus, database errors
  42. affect at most one request; if the connection becomes unusable, the next
  43. request gets a fresh connection.
  44. Caveats
  45. ~~~~~~~
  46. Since each thread maintains its own connection, your database must support at
  47. least as many simultaneous connections as you have worker threads.
  48. Sometimes a database won't be accessed by the majority of your views, for
  49. example because it's the database of an external system, or thanks to caching.
  50. In such cases, you should set :setting:`CONN_MAX_AGE` to a low value or even
  51. ``0``, because it doesn't make sense to maintain a connection that's unlikely
  52. to be reused. This will help keep the number of simultaneous connections to
  53. this database small.
  54. The development server creates a new thread for each request it handles,
  55. negating the effect of persistent connections. Don't enable them during
  56. development.
  57. When Django establishes a connection to the database, it sets up appropriate
  58. parameters, depending on the backend being used. If you enable persistent
  59. connections, this setup is no longer repeated every request. If you modify
  60. parameters such as the connection's isolation level or time zone, you should
  61. either restore Django's defaults at the end of each request, force an
  62. appropriate value at the beginning of each request, or disable persistent
  63. connections.
  64. Encoding
  65. --------
  66. Django assumes that all databases use UTF-8 encoding. Using other encodings may
  67. result in unexpected behavior such as "value too long" errors from your
  68. database for data that is valid in Django. See the database specific notes
  69. below for information on how to set up your database correctly.
  70. .. _postgresql-notes:
  71. PostgreSQL notes
  72. ================
  73. Django supports PostgreSQL 9.3 and higher. `psycopg2`_ 2.5.4 or higher is
  74. required, though the latest release is recommended.
  75. .. _psycopg2: http://initd.org/psycopg/
  76. PostgreSQL connection settings
  77. -------------------------------
  78. See :setting:`HOST` for details.
  79. Optimizing PostgreSQL's configuration
  80. -------------------------------------
  81. Django needs the following parameters for its database connections:
  82. - ``client_encoding``: ``'UTF8'``,
  83. - ``default_transaction_isolation``: ``'read committed'`` by default,
  84. or the value set in the connection options (see below),
  85. - ``timezone``: ``'UTC'`` when :setting:`USE_TZ` is ``True``, value of
  86. :setting:`TIME_ZONE` otherwise.
  87. If these parameters already have the correct values, Django won't set them for
  88. every new connection, which improves performance slightly. You can configure
  89. them directly in :file:`postgresql.conf` or more conveniently per database
  90. user with `ALTER ROLE`_.
  91. Django will work just fine without this optimization, but each new connection
  92. will do some additional queries to set these parameters.
  93. .. _ALTER ROLE: https://www.postgresql.org/docs/current/static/sql-alterrole.html
  94. .. _database-isolation-level:
  95. Isolation level
  96. ---------------
  97. Like PostgreSQL itself, Django defaults to the ``READ COMMITTED`` `isolation
  98. level`_. If you need a higher isolation level such as ``REPEATABLE READ`` or
  99. ``SERIALIZABLE``, set it in the :setting:`OPTIONS` part of your database
  100. configuration in :setting:`DATABASES`::
  101. import psycopg2.extensions
  102. DATABASES = {
  103. # ...
  104. 'OPTIONS': {
  105. 'isolation_level': psycopg2.extensions.ISOLATION_LEVEL_SERIALIZABLE,
  106. },
  107. }
  108. .. note::
  109. Under higher isolation levels, your application should be prepared to
  110. handle exceptions raised on serialization failures. This option is
  111. designed for advanced uses.
  112. .. _isolation level: https://www.postgresql.org/docs/current/static/transaction-iso.html
  113. Indexes for ``varchar`` and ``text`` columns
  114. --------------------------------------------
  115. When specifying ``db_index=True`` on your model fields, Django typically
  116. outputs a single ``CREATE INDEX`` statement. However, if the database type
  117. for the field is either ``varchar`` or ``text`` (e.g., used by ``CharField``,
  118. ``FileField``, and ``TextField``), then Django will create
  119. an additional index that uses an appropriate `PostgreSQL operator class`_
  120. for the column. The extra index is necessary to correctly perform
  121. lookups that use the ``LIKE`` operator in their SQL, as is done with the
  122. ``contains`` and ``startswith`` lookup types.
  123. .. _PostgreSQL operator class: https://www.postgresql.org/docs/current/static/indexes-opclass.html
  124. Migration operation for adding extensions
  125. -----------------------------------------
  126. If you need to add a PostgreSQL extension (like ``hstore``, ``postgis``, etc.)
  127. using a migration, use the
  128. :class:`~django.contrib.postgres.operations.CreateExtension` operation.
  129. .. _postgresql-server-side-cursors:
  130. Server-side cursors
  131. -------------------
  132. .. versionadded:: 1.11
  133. When using :meth:`QuerySet.iterator()
  134. <django.db.models.query.QuerySet.iterator>`, Django opens a :ref:`server-side
  135. cursor <psycopg2:server-side-cursors>`. By default, PostgreSQL assumes that
  136. only the first 10% of the results of cursor queries will be fetched. The query
  137. planner spends less time planning the query and starts returning results
  138. faster, but this could diminish performance if more than 10% of the results are
  139. retrieved. PostgreSQL's assumptions on the number of rows retrieved for a
  140. cursor query is controlled with the `cursor_tuple_fraction`_ option.
  141. .. _cursor_tuple_fraction: https://www.postgresql.org/docs/current/static/runtime-config-query.html#GUC-CURSOR-TUPLE-FRACTION
  142. .. _transaction-pooling-server-side-cursors:
  143. Transaction pooling and server-side cursors
  144. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  145. .. versionadded:: 1.11.1
  146. Using a connection pooler in transaction pooling mode (e.g. `pgBouncer`_)
  147. requires disabling server-side cursors for that connection.
  148. Server-side cursors are local to a connection and remain open at the end of a
  149. transaction when :setting:`AUTOCOMMIT <DATABASE-AUTOCOMMIT>` is ``True``. A
  150. subsequent transaction may attempt to fetch more results from a server-side
  151. cursor. In transaction pooling mode, there's no guarantee that subsequent
  152. transactions will use the same connection. If a different connection is used,
  153. an error is raised when the transaction references the server-side cursor,
  154. because server-side cursors are only accessible in the connection in which they
  155. were created.
  156. One solution is to disable server-side cursors for a connection in
  157. :setting:`DATABASES` by setting :setting:`DISABLE_SERVER_SIDE_CURSORS
  158. <DATABASE-DISABLE_SERVER_SIDE_CURSORS>` to ``True``.
  159. To benefit from server-side cursors in transaction pooling mode, you could set
  160. up :doc:`another connection to the database </topics/db/multi-db>` in order to
  161. perform queries that use server-side cursors. This connection needs to either
  162. be directly to the database or to a connection pooler in session pooling mode.
  163. Another option is to wrap each ``QuerySet`` using server-side cursors in an
  164. :func:`~django.db.transaction.atomic` block, because it disables ``autocommit``
  165. for the duration of the transaction. This way, the server-side cursor will only
  166. live for the duration of the transaction.
  167. .. _pgBouncer: https://pgbouncer.github.io/
  168. Test database templates
  169. -----------------------
  170. .. versionadded:: 1.11
  171. You can use the :setting:`TEST['TEMPLATE'] <TEST_TEMPLATE>` setting to specify
  172. a `template`_ (e.g. ``'template0'``) from which to create a test database.
  173. .. _template: https://www.postgresql.org/docs/current/static/sql-createdatabase.html
  174. Speeding up test execution with non-durable settings
  175. ----------------------------------------------------
  176. You can speed up test execution times by `configuring PostgreSQL to be
  177. non-durable <https://www.postgresql.org/docs/current/static/non-durability.html>`_.
  178. .. warning::
  179. This is dangerous: it will make your database more susceptible to data loss
  180. or corruption in the case of a server crash or power loss. Only use this on
  181. a development machine where you can easily restore the entire contents of
  182. all databases in the cluster.
  183. .. _mysql-notes:
  184. MySQL notes
  185. ===========
  186. Version support
  187. ---------------
  188. Django supports MySQL 5.5 and higher.
  189. Django's ``inspectdb`` feature uses the ``information_schema`` database, which
  190. contains detailed data on all database schemas.
  191. Django expects the database to support Unicode (UTF-8 encoding) and delegates to
  192. it the task of enforcing transactions and referential integrity. It is important
  193. to be aware of the fact that the two latter ones aren't actually enforced by
  194. MySQL when using the MyISAM storage engine, see the next section.
  195. .. _mysql-storage-engines:
  196. Storage engines
  197. ---------------
  198. MySQL has several `storage engines`_. You can change the default storage engine
  199. in the server configuration.
  200. Until MySQL 5.5.4, the default engine was MyISAM_ [#]_. The main drawbacks of
  201. MyISAM are that it doesn't support transactions or enforce foreign-key
  202. constraints. On the plus side, it was the only engine that supported full-text
  203. indexing and searching until MySQL 5.6.4.
  204. Since MySQL 5.5.5, the default storage engine is InnoDB_. This engine is fully
  205. transactional and supports foreign key references. It's probably the best
  206. choice at this point. However, note that the InnoDB autoincrement counter
  207. is lost on a MySQL restart because it does not remember the
  208. ``AUTO_INCREMENT`` value, instead recreating it as "max(id)+1". This may
  209. result in an inadvertent reuse of :class:`~django.db.models.AutoField` values.
  210. If you upgrade an existing project to MySQL 5.5.5 and subsequently add some
  211. tables, ensure that your tables are using the same storage engine (i.e. MyISAM
  212. vs. InnoDB). Specifically, if tables that have a ``ForeignKey`` between them
  213. use different storage engines, you may see an error like the following when
  214. running ``migrate``::
  215. _mysql_exceptions.OperationalError: (
  216. 1005, "Can't create table '\\db_name\\.#sql-4a8_ab' (errno: 150)"
  217. )
  218. .. _storage engines: https://dev.mysql.com/doc/refman/en/storage-engines.html
  219. .. _MyISAM: https://dev.mysql.com/doc/refman/en/myisam-storage-engine.html
  220. .. _InnoDB: https://dev.mysql.com/doc/refman/en/innodb-storage-engine.html
  221. .. [#] Unless this was changed by the packager of your MySQL package. We've
  222. had reports that the Windows Community Server installer sets up InnoDB as
  223. the default storage engine, for example.
  224. .. _mysql-db-api-drivers:
  225. MySQL DB API Drivers
  226. --------------------
  227. MySQL has a couple drivers that implement the Python Database API described in
  228. :pep:`249`:
  229. - `mysqlclient`_ is a native driver. It's **the recommended choice**.
  230. - `MySQL Connector/Python`_ is a pure Python driver from Oracle that does not
  231. require the MySQL client library or any Python modules outside the standard
  232. library.
  233. .. _mysqlclient: https://pypi.python.org/pypi/mysqlclient
  234. .. _MySQL Connector/Python: https://dev.mysql.com/downloads/connector/python
  235. These drivers are thread-safe and provide connection pooling.
  236. In addition to a DB API driver, Django needs an adapter to access the database
  237. drivers from its ORM. Django provides an adapter for mysqlclient while MySQL
  238. Connector/Python includes `its own`_.
  239. .. _its own: https://dev.mysql.com/doc/connector-python/en/connector-python-django-backend.html
  240. mysqlclient
  241. ~~~~~~~~~~~
  242. Django requires `mysqlclient`_ 1.3.3 or later.
  243. MySQL Connector/Python
  244. ~~~~~~~~~~~~~~~~~~~~~~
  245. MySQL Connector/Python is available from the `download page`_.
  246. The Django adapter is available in versions 1.1.X and later. It may not
  247. support the most recent releases of Django.
  248. .. _download page: https://dev.mysql.com/downloads/connector/python/
  249. .. _mysql-time-zone-definitions:
  250. Time zone definitions
  251. ---------------------
  252. If you plan on using Django's :doc:`timezone support </topics/i18n/timezones>`,
  253. use `mysql_tzinfo_to_sql`_ to load time zone tables into the MySQL database.
  254. This needs to be done just once for your MySQL server, not per database.
  255. .. _mysql_tzinfo_to_sql: https://dev.mysql.com/doc/refman/en/mysql-tzinfo-to-sql.html
  256. Creating your database
  257. ----------------------
  258. You can `create your database`_ using the command-line tools and this SQL::
  259. CREATE DATABASE <dbname> CHARACTER SET utf8;
  260. This ensures all tables and columns will use UTF-8 by default.
  261. .. _create your database: https://dev.mysql.com/doc/refman/en/create-database.html
  262. .. _mysql-collation:
  263. Collation settings
  264. ~~~~~~~~~~~~~~~~~~
  265. The collation setting for a column controls the order in which data is sorted
  266. as well as what strings compare as equal. It can be set on a database-wide
  267. level and also per-table and per-column. This is `documented thoroughly`_ in
  268. the MySQL documentation. In all cases, you set the collation by directly
  269. manipulating the database tables; Django doesn't provide a way to set this on
  270. the model definition.
  271. .. _documented thoroughly: https://dev.mysql.com/doc/refman/en/charset.html
  272. By default, with a UTF-8 database, MySQL will use the
  273. ``utf8_general_ci`` collation. This results in all string equality
  274. comparisons being done in a *case-insensitive* manner. That is, ``"Fred"`` and
  275. ``"freD"`` are considered equal at the database level. If you have a unique
  276. constraint on a field, it would be illegal to try to insert both ``"aa"`` and
  277. ``"AA"`` into the same column, since they compare as equal (and, hence,
  278. non-unique) with the default collation. If you want case-sensitive comparisons
  279. on a particular column or table, change the column or table to use the
  280. ``utf8_bin`` collation.
  281. Please note that according to `MySQL Unicode Character Sets`_, comparisons for
  282. the ``utf8_general_ci`` collation are faster, but slightly less correct, than
  283. comparisons for ``utf8_unicode_ci``. If this is acceptable for your application,
  284. you should use ``utf8_general_ci`` because it is faster. If this is not acceptable
  285. (for example, if you require German dictionary order), use ``utf8_unicode_ci``
  286. because it is more accurate.
  287. .. _MySQL Unicode Character Sets: https://dev.mysql.com/doc/refman/en/charset-unicode-sets.html
  288. .. warning::
  289. Model formsets validate unique fields in a case-sensitive manner. Thus when
  290. using a case-insensitive collation, a formset with unique field values that
  291. differ only by case will pass validation, but upon calling ``save()``, an
  292. ``IntegrityError`` will be raised.
  293. Connecting to the database
  294. --------------------------
  295. Refer to the :doc:`settings documentation </ref/settings>`.
  296. Connection settings are used in this order:
  297. 1. :setting:`OPTIONS`.
  298. 2. :setting:`NAME`, :setting:`USER`, :setting:`PASSWORD`,
  299. :setting:`HOST`, :setting:`PORT`
  300. 3. MySQL option files.
  301. In other words, if you set the name of the database in :setting:`OPTIONS`,
  302. this will take precedence over :setting:`NAME`, which would override
  303. anything in a `MySQL option file`_.
  304. Here's a sample configuration which uses a MySQL option file::
  305. # settings.py
  306. DATABASES = {
  307. 'default': {
  308. 'ENGINE': 'django.db.backends.mysql',
  309. 'OPTIONS': {
  310. 'read_default_file': '/path/to/my.cnf',
  311. },
  312. }
  313. }
  314. # my.cnf
  315. [client]
  316. database = NAME
  317. user = USER
  318. password = PASSWORD
  319. default-character-set = utf8
  320. Several other `MySQLdb connection options`_ may be useful, such as ``ssl``,
  321. ``init_command``, and ``sql_mode``.
  322. .. _MySQL option file: https://dev.mysql.com/doc/refman/en/option-files.html
  323. .. _MySQLdb connection options: https://mysqlclient.readthedocs.io/user_guide.html#functions-and-attributes
  324. .. _mysql-sql-mode:
  325. Setting ``sql_mode``
  326. ~~~~~~~~~~~~~~~~~~~~
  327. From MySQL 5.7 onwards and on fresh installs of MySQL 5.6, the default value of
  328. the ``sql_mode`` option contains ``STRICT_TRANS_TABLES``. That option escalates
  329. warnings into errors when data are truncated upon insertion, so Django highly
  330. recommends activating a `strict mode`_ for MySQL to prevent data loss (either
  331. ``STRICT_TRANS_TABLES`` or ``STRICT_ALL_TABLES``).
  332. .. _strict mode: https://dev.mysql.com/doc/refman/en/sql-mode.html#sql-mode-strict
  333. If you need to customize the SQL mode, you can set the ``sql_mode`` variable
  334. like other MySQL options: either in a config file or with the entry
  335. ``'init_command': "SET sql_mode='STRICT_TRANS_TABLES'"`` in the
  336. :setting:`OPTIONS` part of your database configuration in :setting:`DATABASES`.
  337. .. _mysql-isolation-level:
  338. Isolation level
  339. ~~~~~~~~~~~~~~~
  340. .. versionadded:: 1.11
  341. When running concurrent loads, database transactions from different sessions
  342. (say, separate threads handling different requests) may interact with each
  343. other. These interactions are affected by each session's `transaction isolation
  344. level`_. You can set a connection's isolation level with an
  345. ``'isolation_level'`` entry in the :setting:`OPTIONS` part of your database
  346. configuration in :setting:`DATABASES`. Valid values for
  347. this entry are the four standard isolation levels:
  348. * ``'read uncommitted'``
  349. * ``'read committed'``
  350. * ``'repeatable read'``
  351. * ``'serializable'``
  352. or ``None`` to use the server's configured isolation level. However, Django
  353. works best with and defaults to read committed rather than MySQL's default,
  354. repeatable read. Data loss is possible with repeatable read.
  355. .. versionchanged:: 2.0
  356. In older versions, the MySQL database backend defaults to using the
  357. database's isolation level (which defaults to repeatable read) rather
  358. than read committed.
  359. .. _transaction isolation level: https://dev.mysql.com/doc/refman/en/innodb-transaction-isolation-levels.html
  360. Creating your tables
  361. --------------------
  362. When Django generates the schema, it doesn't specify a storage engine, so
  363. tables will be created with whatever default storage engine your database
  364. server is configured for. The easiest solution is to set your database server's
  365. default storage engine to the desired engine.
  366. If you're using a hosting service and can't change your server's default
  367. storage engine, you have a couple of options.
  368. * After the tables are created, execute an ``ALTER TABLE`` statement to
  369. convert a table to a new storage engine (such as InnoDB)::
  370. ALTER TABLE <tablename> ENGINE=INNODB;
  371. This can be tedious if you have a lot of tables.
  372. * Another option is to use the ``init_command`` option for MySQLdb prior to
  373. creating your tables::
  374. 'OPTIONS': {
  375. 'init_command': 'SET default_storage_engine=INNODB',
  376. }
  377. This sets the default storage engine upon connecting to the database.
  378. After your tables have been created, you should remove this option as it
  379. adds a query that is only needed during table creation to each database
  380. connection.
  381. Table names
  382. -----------
  383. There are `known issues`_ in even the latest versions of MySQL that can cause the
  384. case of a table name to be altered when certain SQL statements are executed
  385. under certain conditions. It is recommended that you use lowercase table
  386. names, if possible, to avoid any problems that might arise from this behavior.
  387. Django uses lowercase table names when it auto-generates table names from
  388. models, so this is mainly a consideration if you are overriding the table name
  389. via the :class:`~django.db.models.Options.db_table` parameter.
  390. .. _known issues: https://bugs.mysql.com/bug.php?id=48875
  391. Savepoints
  392. ----------
  393. Both the Django ORM and MySQL (when using the InnoDB :ref:`storage engine
  394. <mysql-storage-engines>`) support database :ref:`savepoints
  395. <topics-db-transactions-savepoints>`.
  396. If you use the MyISAM storage engine please be aware of the fact that you will
  397. receive database-generated errors if you try to use the :ref:`savepoint-related
  398. methods of the transactions API <topics-db-transactions-savepoints>`. The reason
  399. for this is that detecting the storage engine of a MySQL database/table is an
  400. expensive operation so it was decided it isn't worth to dynamically convert
  401. these methods in no-op's based in the results of such detection.
  402. Notes on specific fields
  403. ------------------------
  404. Character fields
  405. ~~~~~~~~~~~~~~~~
  406. Any fields that are stored with ``VARCHAR`` column types have their
  407. ``max_length`` restricted to 255 characters if you are using ``unique=True``
  408. for the field. This affects :class:`~django.db.models.CharField`,
  409. :class:`~django.db.models.SlugField`.
  410. ``TextField`` limitations
  411. ~~~~~~~~~~~~~~~~~~~~~~~~~
  412. MySQL can index only the first N chars of a ``BLOB`` or ``TEXT`` column. Since
  413. ``TextField`` doesn't have a defined length, you can't mark it as
  414. ``unique=True``. MySQL will report: "BLOB/TEXT column '<db_column>' used in key
  415. specification without a key length".
  416. .. _mysql-fractional-seconds:
  417. Fractional seconds support for Time and DateTime fields
  418. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  419. MySQL 5.6.4 and later can store fractional seconds, provided that the
  420. column definition includes a fractional indication (e.g. ``DATETIME(6)``).
  421. Earlier versions do not support them at all.
  422. Django will not upgrade existing columns to include fractional seconds if the
  423. database server supports it. If you want to enable them on an existing database,
  424. it's up to you to either manually update the column on the target database, by
  425. executing a command like::
  426. ALTER TABLE `your_table` MODIFY `your_datetime_column` DATETIME(6)
  427. or using a :class:`~django.db.migrations.operations.RunSQL` operation in a
  428. :ref:`data migration <data-migrations>`.
  429. ``TIMESTAMP`` columns
  430. ~~~~~~~~~~~~~~~~~~~~~
  431. If you are using a legacy database that contains ``TIMESTAMP`` columns, you must
  432. set :setting:`USE_TZ = False <USE_TZ>` to avoid data corruption.
  433. :djadmin:`inspectdb` maps these columns to
  434. :class:`~django.db.models.DateTimeField` and if you enable timezone support,
  435. both MySQL and Django will attempt to convert the values from UTC to local time.
  436. Row locking with ``QuerySet.select_for_update()``
  437. -------------------------------------------------
  438. MySQL does not support the ``NOWAIT`` and ``SKIP LOCKED`` options to the
  439. ``SELECT ... FOR UPDATE`` statement. If ``select_for_update()`` is used with
  440. ``nowait=True`` or ``skip_locked=True``, then a
  441. :exc:`~django.db.NotSupportedError` is raised.
  442. Automatic typecasting can cause unexpected results
  443. --------------------------------------------------
  444. When performing a query on a string type, but with an integer value, MySQL will
  445. coerce the types of all values in the table to an integer before performing the
  446. comparison. If your table contains the values ``'abc'``, ``'def'`` and you
  447. query for ``WHERE mycolumn=0``, both rows will match. Similarly, ``WHERE mycolumn=1``
  448. will match the value ``'abc1'``. Therefore, string type fields included in Django
  449. will always cast the value to a string before using it in a query.
  450. If you implement custom model fields that inherit from
  451. :class:`~django.db.models.Field` directly, are overriding
  452. :meth:`~django.db.models.Field.get_prep_value`, or use
  453. :class:`~django.db.models.expressions.RawSQL`,
  454. :meth:`~django.db.models.query.QuerySet.extra`, or
  455. :meth:`~django.db.models.Manager.raw`, you should ensure that you perform
  456. appropriate typecasting.
  457. .. _sqlite-notes:
  458. SQLite notes
  459. ============
  460. SQLite_ provides an excellent development alternative for applications that
  461. are predominantly read-only or require a smaller installation footprint. As
  462. with all database servers, though, there are some differences that are
  463. specific to SQLite that you should be aware of.
  464. .. _SQLite: https://www.sqlite.org/
  465. .. _sqlite-string-matching:
  466. Substring matching and case sensitivity
  467. ---------------------------------------
  468. For all SQLite versions, there is some slightly counter-intuitive behavior when
  469. attempting to match some types of strings. These are triggered when using the
  470. :lookup:`iexact` or :lookup:`contains` filters in Querysets. The behavior
  471. splits into two cases:
  472. 1. For substring matching, all matches are done case-insensitively. That is a
  473. filter such as ``filter(name__contains="aa")`` will match a name of ``"Aabb"``.
  474. 2. For strings containing characters outside the ASCII range, all exact string
  475. matches are performed case-sensitively, even when the case-insensitive options
  476. are passed into the query. So the :lookup:`iexact` filter will behave exactly
  477. the same as the :lookup:`exact` filter in these cases.
  478. Some possible workarounds for this are `documented at sqlite.org`_, but they
  479. aren't utilized by the default SQLite backend in Django, as incorporating them
  480. would be fairly difficult to do robustly. Thus, Django exposes the default
  481. SQLite behavior and you should be aware of this when doing case-insensitive or
  482. substring filtering.
  483. .. _documented at sqlite.org: https://www.sqlite.org/faq.html#q18
  484. "Database is locked" errors
  485. ---------------------------
  486. SQLite is meant to be a lightweight database, and thus can't support a high
  487. level of concurrency. ``OperationalError: database is locked`` errors indicate
  488. that your application is experiencing more concurrency than ``sqlite`` can
  489. handle in default configuration. This error means that one thread or process has
  490. an exclusive lock on the database connection and another thread timed out
  491. waiting for the lock the be released.
  492. Python's SQLite wrapper has
  493. a default timeout value that determines how long the second thread is allowed to
  494. wait on the lock before it times out and raises the ``OperationalError: database
  495. is locked`` error.
  496. If you're getting this error, you can solve it by:
  497. * Switching to another database backend. At a certain point SQLite becomes
  498. too "lite" for real-world applications, and these sorts of concurrency
  499. errors indicate you've reached that point.
  500. * Rewriting your code to reduce concurrency and ensure that database
  501. transactions are short-lived.
  502. * Increase the default timeout value by setting the ``timeout`` database
  503. option::
  504. 'OPTIONS': {
  505. # ...
  506. 'timeout': 20,
  507. # ...
  508. }
  509. This will simply make SQLite wait a bit longer before throwing "database
  510. is locked" errors; it won't really do anything to solve them.
  511. ``QuerySet.select_for_update()`` not supported
  512. ----------------------------------------------
  513. SQLite does not support the ``SELECT ... FOR UPDATE`` syntax. Calling it will
  514. have no effect.
  515. "pyformat" parameter style in raw queries not supported
  516. -------------------------------------------------------
  517. For most backends, raw queries (``Manager.raw()`` or ``cursor.execute()``)
  518. can use the "pyformat" parameter style, where placeholders in the query
  519. are given as ``'%(name)s'`` and the parameters are passed as a dictionary
  520. rather than a list. SQLite does not support this.
  521. .. _oracle-notes:
  522. Oracle notes
  523. ============
  524. Django supports `Oracle Database Server`_ versions 12.1 and higher. Version
  525. 5.2 or higher of the `cx_Oracle`_ Python driver is required.
  526. .. _`Oracle Database Server`: http://www.oracle.com/
  527. .. _`cx_Oracle`: http://cx-oracle.sourceforge.net/
  528. In order for the ``python manage.py migrate`` command to work, your Oracle
  529. database user must have privileges to run the following commands:
  530. * CREATE TABLE
  531. * CREATE SEQUENCE
  532. * CREATE PROCEDURE
  533. * CREATE TRIGGER
  534. To run a project's test suite, the user usually needs these *additional*
  535. privileges:
  536. * CREATE USER
  537. * ALTER USER
  538. * DROP USER
  539. * CREATE TABLESPACE
  540. * DROP TABLESPACE
  541. * CREATE SESSION WITH ADMIN OPTION
  542. * CREATE TABLE WITH ADMIN OPTION
  543. * CREATE SEQUENCE WITH ADMIN OPTION
  544. * CREATE PROCEDURE WITH ADMIN OPTION
  545. * CREATE TRIGGER WITH ADMIN OPTION
  546. Note that, while the RESOURCE role has the required CREATE TABLE, CREATE
  547. SEQUENCE, CREATE PROCEDURE and CREATE TRIGGER privileges, and a user
  548. granted RESOURCE WITH ADMIN OPTION can grant RESOURCE, such a user cannot
  549. grant the individual privileges (e.g. CREATE TABLE), and thus RESOURCE
  550. WITH ADMIN OPTION is not usually sufficient for running tests.
  551. Some test suites also create views; to run these, the user also needs
  552. the CREATE VIEW WITH ADMIN OPTION privilege. In particular, this is needed
  553. for Django's own test suite.
  554. All of these privileges are included in the DBA role, which is appropriate
  555. for use on a private developer's database.
  556. The Oracle database backend uses the ``SYS.DBMS_LOB`` and ``SYS.DBMS_RANDOM``
  557. packages, so your user will require execute permissions on it. It's normally
  558. accessible to all users by default, but in case it is not, you'll need to grant
  559. permissions like so:
  560. .. code-block:: sql
  561. GRANT EXECUTE ON SYS.DBMS_LOB TO user;
  562. GRANT EXECUTE ON SYS.DBMS_RANDOM TO user;
  563. Connecting to the database
  564. --------------------------
  565. To connect using the service name of your Oracle database, your ``settings.py``
  566. file should look something like this::
  567. DATABASES = {
  568. 'default': {
  569. 'ENGINE': 'django.db.backends.oracle',
  570. 'NAME': 'xe',
  571. 'USER': 'a_user',
  572. 'PASSWORD': 'a_password',
  573. 'HOST': '',
  574. 'PORT': '',
  575. }
  576. }
  577. In this case, you should leave both :setting:`HOST` and :setting:`PORT` empty.
  578. However, if you don't use a ``tnsnames.ora`` file or a similar naming method
  579. and want to connect using the SID ("xe" in this example), then fill in both
  580. :setting:`HOST` and :setting:`PORT` like so::
  581. DATABASES = {
  582. 'default': {
  583. 'ENGINE': 'django.db.backends.oracle',
  584. 'NAME': 'xe',
  585. 'USER': 'a_user',
  586. 'PASSWORD': 'a_password',
  587. 'HOST': 'dbprod01ned.mycompany.com',
  588. 'PORT': '1540',
  589. }
  590. }
  591. You should either supply both :setting:`HOST` and :setting:`PORT`, or leave
  592. both as empty strings. Django will use a different connect descriptor depending
  593. on that choice.
  594. Threaded option
  595. ----------------
  596. If you plan to run Django in a multithreaded environment (e.g. Apache using the
  597. default MPM module on any modern operating system), then you **must** set
  598. the ``threaded`` option of your Oracle database configuration to True::
  599. 'OPTIONS': {
  600. 'threaded': True,
  601. },
  602. Failure to do this may result in crashes and other odd behavior.
  603. INSERT ... RETURNING INTO
  604. -------------------------
  605. By default, the Oracle backend uses a ``RETURNING INTO`` clause to efficiently
  606. retrieve the value of an ``AutoField`` when inserting new rows. This behavior
  607. may result in a ``DatabaseError`` in certain unusual setups, such as when
  608. inserting into a remote table, or into a view with an ``INSTEAD OF`` trigger.
  609. The ``RETURNING INTO`` clause can be disabled by setting the
  610. ``use_returning_into`` option of the database configuration to False::
  611. 'OPTIONS': {
  612. 'use_returning_into': False,
  613. },
  614. In this case, the Oracle backend will use a separate ``SELECT`` query to
  615. retrieve AutoField values.
  616. Naming issues
  617. -------------
  618. Oracle imposes a name length limit of 30 characters. To accommodate this, the
  619. backend truncates database identifiers to fit, replacing the final four
  620. characters of the truncated name with a repeatable MD5 hash value.
  621. Additionally, the backend turns database identifiers to all-uppercase.
  622. To prevent these transformations (this is usually required only when dealing
  623. with legacy databases or accessing tables which belong to other users), use
  624. a quoted name as the value for ``db_table``::
  625. class LegacyModel(models.Model):
  626. class Meta:
  627. db_table = '"name_left_in_lowercase"'
  628. class ForeignModel(models.Model):
  629. class Meta:
  630. db_table = '"OTHER_USER"."NAME_ONLY_SEEMS_OVER_30"'
  631. Quoted names can also be used with Django's other supported database
  632. backends; except for Oracle, however, the quotes have no effect.
  633. When running ``migrate``, an ``ORA-06552`` error may be encountered if
  634. certain Oracle keywords are used as the name of a model field or the
  635. value of a ``db_column`` option. Django quotes all identifiers used
  636. in queries to prevent most such problems, but this error can still
  637. occur when an Oracle datatype is used as a column name. In
  638. particular, take care to avoid using the names ``date``,
  639. ``timestamp``, ``number`` or ``float`` as a field name.
  640. NULL and empty strings
  641. ----------------------
  642. Django generally prefers to use the empty string ('') rather than
  643. NULL, but Oracle treats both identically. To get around this, the
  644. Oracle backend ignores an explicit ``null`` option on fields that
  645. have the empty string as a possible value and generates DDL as if
  646. ``null=True``. When fetching from the database, it is assumed that
  647. a ``NULL`` value in one of these fields really means the empty
  648. string, and the data is silently converted to reflect this assumption.
  649. ``TextField`` limitations
  650. -------------------------
  651. The Oracle backend stores ``TextFields`` as ``NCLOB`` columns. Oracle imposes
  652. some limitations on the usage of such LOB columns in general:
  653. * LOB columns may not be used as primary keys.
  654. * LOB columns may not be used in indexes.
  655. * LOB columns may not be used in a ``SELECT DISTINCT`` list. This means that
  656. attempting to use the ``QuerySet.distinct`` method on a model that
  657. includes ``TextField`` columns will result in an ``ORA-00932`` error when
  658. run against Oracle. As a workaround, use the ``QuerySet.defer`` method in
  659. conjunction with ``distinct()`` to prevent ``TextField`` columns from being
  660. included in the ``SELECT DISTINCT`` list.
  661. .. _third-party-notes:
  662. Using a 3rd-party database backend
  663. ==================================
  664. In addition to the officially supported databases, there are backends provided
  665. by 3rd parties that allow you to use other databases with Django:
  666. * `SAP SQL Anywhere`_
  667. * `IBM DB2`_
  668. * `Microsoft SQL Server`_
  669. * Firebird_
  670. * ODBC_
  671. The Django versions and ORM features supported by these unofficial backends
  672. vary considerably. Queries regarding the specific capabilities of these
  673. unofficial backends, along with any support queries, should be directed to
  674. the support channels provided by each 3rd party project.
  675. .. _SAP SQL Anywhere: https://github.com/sqlanywhere/sqlany-django
  676. .. _IBM DB2: https://pypi.python.org/pypi/ibm_db/
  677. .. _Microsoft SQL Server: https://django-mssql.readthedocs.io/en/latest/
  678. .. _Firebird: https://github.com/maxirobaina/django-firebird
  679. .. _ODBC: https://github.com/lionheart/django-pyodbc/