Query your Postgres databases directly using gRPC, gRPC-web, or transcoded JSON.
Sometimes you want to use the full power of a Postgres database, but you aren't able to make direct connections or you don't want to write a custom API service that wraps your database queries. PostgRPC gives you the power of SQL over gRPC
or JSON, handling distributed transactions and connection management on your behalf.
PostgRPC fills a similar niche as the excellent PostgREST and PostGraphile projects. Unlike those projects, PostgRPC lets you use SQL directly rather than wrapping the interface in another query language (i.e. a REST DSL or GraphQL, respectively). In addition, PostgRPC lets you work with lower-level database constructs like transactions through the same gRPC
or JSON interface used to query your database.
- Performance: running a query over a persistent connection will always be the fastest option, but using PostgRPC should be the next-best option. Where concurrent queries are needed, and where those queries scale up faster than connections, PostgRPC should handle more concurrent query requests than any other direct-connection-based connection pool solution.
- Primitive Focus: where Postgres has a feature, PostgRPC should support that feature through the query interface. Where this is impossible, PostgRPC should strive to provide a distributed equivalent.
- Ease-of-Use: those looking to get started with PostgRPC should be able to spin it up as a service quickly on a variety of systems. PostgRPC should ship with sane defaults for most use-cases. For more limited cases, PostgRPC should be easy to configure through feature-gating and conditional compilation.
- Type Inference: PostgRPC should accomdate the flexibility of JSON in inputs and outputs rather than mapping JSON or
gRPC
types to Postgres types. This includes leveraging Postgres's built-in type inference wherever possible. - Customization: PostgRPC's provided binaries should be a reference implementation of a
gRPC
service. For those that need more flexibility, thepostgrpc
library is provided to handle custom connection pool logic.
- Auth: PostgRPC does not include authentication or authorization mechanisms beyond those provided by the Postgres database itself. Setting the Postgres
ROLE
can be done through anX-Postgres-Role
header (when therole-header
feature is enabled), and correctly deriving the value of that header is the responsibility of other services better suited to the task (e.g. Ory Oathkeeper) - Strict Request Types: PostgRPC will use binary encoding of input values where possible. Where the binary encoding of a parameter is not obvious, PostgRPC will use text encoding to leverage Postgres's built-in type inference. All outputs will be decoded as JSON-compatible dynamic types only, with no attempt to use stricter Postgres types.
- All-in-One: PostgRPC does not replace your application stack. Instead, PostgRPC is a sharp tool that's easy to integrate into a toolbox that includes things like user management, load balancing, and routing of traffic from public endpoints. Do not expose your database publicly through PostgRPC unless you know what you're doing (and even then, consider alternatives like those found in the
examples
directory).
For binary installations, use cargo install postgrpc
. The compilation of the postgrpc
executable can be customized with --features
.
For library installations, use cargo add postgrpc
within a cargo
-managed Rust project.
The postgrpc
executable can be configured with the following environment variables:
HOST
: the host that thepostgrpc
service uses. Defaults to127.0.0.1
.PORT
: the port that thepostgrpc
service uses. Defaults to50051
.TERMINATION_PERIOD
: the number of millisecondspostgrpc
waits before shutting down onSIGTERM
signals.postgrpc
shuts down gracefully, waiting for requests to finish where possible. This value is useful for waiting for proxies likeenvoy
to drain, allowingpostgrpc
to handle those requests without error as long as they take less thanTERMINATION_PERIOD
milliseconds.
In addition, the default connection pool can be configured with the following environment variables:
MAX_CONNECTION_POOL_SIZE
: the number of upstream database connections that the pool is allowed to hold onto. Defaults to 4x the number of CPUs available on the host machine.STATEMENT_TIMEOUT
: the number of millisecondspostgrpc
waits before aborting queries.RECYCLING_METHOD
: the recycling method run as connections are returned to the connection pool. Defaults toclean
.PGDBNAME
(required): the name of the Postgres database to connect to.PGHOST
: the host of the Postgres cluster to connect to. Defaults tolocalhost
.PGPASSWORD
(required): the password of the user to use when connecting to the Postgres database.PGPORT
: the port of the Postgres cluster to connect to. Defaults to5432
.PGUSER
(required): the user to use when connecting to the Postgres database.PGAPPNAME
: the application label to use when connecting to the Postgres database. Defaults topostgrpc
.PGSSLMODE
: thesslmode
to use when connecting to the Postgres database. Supported values aredisable
,prefer
, andrequire
.
With PostgRPC running on the default port and host, grpcurl
can be used to query the database:
grpcurl \
-plaintext \
-d '{"statement":"select 1 + 1 as two"}' \
[::]:50051 postgres.Postgres/Query
# { "two": 2 }
To use a different (pre-existing) ROLE
than the one used to connect to the database initially, use the X-Postgres-Role
header:
grpcurl \
-plaintext \
-d '{"statement":"select current_user"}' \
-H 'X-Postgres-Role: my-other-user' \
[::]:50051 postgres.Postgres/Query
# { "current_user": "my-other-user" }
All examples can be run from the ./examples
directory using docker-compose
. Click on the links below to learn more about each example.
- Who built PostgRPC? The team at Platter.
- Is PostgRPC ready for production? PostgRPC should be considered alpha-level software, and no warranty is given or implied. If you still want to run PostgRPC yourself, be sure to run it as a part of a stack that includes robust authentication and authorization, and ensure that you harden your Postgres database against malicious queries! But you were doing that with your Postgres database anyway, right?
- How do you pronounce PostgRPC? "post-ger-puck"
Contributions are welcome in the form of bug reporting, feature requests, software fixes, and documentation updates. Please submit all code contributions as pull requests through GitHub.
- Native JSON transcoding without needing an additional proxy
-
LISTEN
/NOTIFY
-based channels -
MATERIALIZED VIEW
-based update streams - Explicit query registration and compile-time gRPC-compatible
proto
generation for an alternative to the dynamicQuery
interfaces