SQLPage can be configured through either environment variables
or a JSON file placed in sqlpage/sqlpage.json.
You can find an example configuration file in sqlpage/sqlpage.json.
Here are the available configuration options and their default values:
| variable | default | description |
|---|---|---|
listen_on |
0.0.0.0:8080 | Interface and port on which the web server should listen |
database_url |
sqlite://sqlpage.db?mode=rwc or DSN=DuckDB |
Database connection URL, either dbengine://user:password@host:port/dbname or an ODBC connection string. Special characters should be percent-encoded. See Database connection strings for details and examples. |
database_password |
Database password. If set, this will override any password specified in the database_url. This allows you to keep the password separate from the connection string for better security. |
|
port |
8080 | Like listen_on, but specifies only the port. |
unix_socket |
Path to a UNIX socket to listen on instead of the TCP port. If specified, SQLPage will accept HTTP connections only on this socket and not on any TCP port. This option is mutually exclusive with listen_on and port. |
|
host |
The web address where your application is accessible (e.g., "myapp.example.com"). Used for login redirects with OIDC. | |
max_database_pool_connections |
PostgreSQL: 50 MySql: 75 SQLite: 16 MSSQL: 100 |
How many simultaneous database connections to open at most |
database_connection_idle_timeout_seconds |
SQLite: None All other: 30 minutes |
Automatically close database connections after this period of inactivity. Set to 0 to disable. |
database_connection_max_lifetime_seconds |
SQLite: None All other: 60 minutes |
Always close database connections after this amount of time. Set to 0 to disable. |
database_connection_retries |
6 | Database connection attempts before giving up. Retries will happen every 5 seconds. |
database_connection_acquire_timeout_seconds |
10 | How long to wait when acquiring a database connection from the pool before giving up and returning an error. |
sqlite_extensions |
An array of SQLite extensions to load, such as mod_spatialite |
|
web_root |
. |
The root directory of the web server, where the index.sql file is located. |
site_prefix |
/ |
Base path of the site. If you want to host SQLPage at https://example.com/sqlpage/, set this to /sqlpage/. When using a reverse proxy, this allows hosting SQLPage together with other applications on the same subdomain. |
configuration_directory |
./sqlpage/ |
The directory where the sqlpage.json file is located. This is used to find the path to templates/, migrations/, and on_connect.sql. Obviously, this configuration parameter can be set only through environment variables, not through the sqlpage.json file itself in order to find the sqlpage.json file. Be careful not to use a path that is accessible from the public WEB_ROOT |
allow_exec |
false | Allow usage of the sqlpage.exec function. Do this only if all users with write access to sqlpage query files and to the optional sqlpage_files table on the database are trusted. |
max_uploaded_file_size |
5242880 | Maximum size of forms and uploaded files in bytes. Defaults to 5 MiB. |
oidc_protected_paths |
["/"] |
A list of URL prefixes that should be protected by OIDC authentication. By default, all paths are protected (["/"]). If you want to make some pages public, you can restrict authentication to a sub-path, for instance ["/admin", "/users/settings"]. All paths must start with a "/" and will be prepended by site_prefix if defined. |
oidc_public_paths |
[] |
A list of URL prefixes that should be publicly available. By default, no paths are publicly accessible ([]). If you want to make some pages public, you can bypass authentication for a sub-path, for instance ["/public/", "/assets/"]. Keep in mind that without the closing backslashes, that any directory or file starting with public or assets will be publicly available. This will also overwrite any protected path restriction. If you have a private path /private and you define the public path /private/public/ everything in /private/public/ will be publicly accessible, while everything else in private will still need authentication. All paths must start with a "/" and will be prepended by site_prefix if defined. |
oidc_issuer_url |
The base URL of the OpenID Connect provider. Required for enabling Single Sign-On. | |
oidc_client_id |
sqlpage | The ID that identifies your SQLPage application to the OIDC provider. You get this when registering your app with the provider. |
oidc_client_secret |
The secret key for your SQLPage application. Keep this confidential as it allows your app to authenticate with the OIDC provider. | |
oidc_scopes |
openid email profile | Space-separated list of scopes your app requests from the OIDC provider. |
oidc_additional_trusted_audiences |
unset | A list of additional audiences that are allowed in JWT tokens, beyond the client ID. When empty or unset, any additional audience is accepted. For increased security, set to an empty list [] to only allow the client ID as audience. |
max_pending_rows |
256 | Maximum number of rendered rows that can be queued up in memory when a client is slow to receive them. |
compress_responses |
false | When the client supports it, compress the http response body. This can save bandwidth and speed up page loading on slow connections, but can also increase CPU usage and cause rendering delays on pages that take time to render (because streaming responses are buffered for longer than necessary). |
https_domain |
Domain name to request a certificate for. Setting this parameter will automatically make SQLPage listen on port 443 and request an SSL certificate. The server will take a little bit longer to start the first time it has to request a certificate. | |
https_certificate_email |
contact@<https_domain> | The email address to use when requesting a certificate. |
https_certificate_cache_dir |
./sqlpage/https | A writeable directory where to cache the certificates, so that SQLPage can serve https traffic immediately when it restarts. |
https_acme_directory_url |
https://acme-v02.api.letsencrypt.org/directory | The URL of the ACME directory to use when requesting a certificate. |
environment |
development | The environment in which SQLPage is running. Can be either development or production. In production mode, SQLPage will hide error messages and stack traces from the user, and will cache sql files in memory to avoid reloading them from disk. |
cache_stale_duration_ms |
1000 (prod), 0 (dev) | The duration in milliseconds that a file can be cached before its freshness is checked against the filesystem. Defaults to 1000ms (1 second) in production and 0ms in development. |
content_security_policy |
script-src 'self' 'nonce-{NONCE}' |
The Content Security Policy to set in the HTTP headers. If you get CSP errors in the browser console, you can set this to the empty string to disable CSP. If you want a custom CSP that contains a nonce, include the 'nonce-{NONCE}' directive in your configuration string and it will be populated with a random value per request. |
system_root_ca_certificates |
false | Whether to use the system root CA certificates to validate SSL certificates when making http requests with sqlpage.fetch. If set to false, SQLPage will use its own set of root CA certificates. If the SSL_CERT_FILE or SSL_CERT_DIR environment variables are set, they will be used instead of the system root CA certificates. |
max_recursion_depth |
10 | Maximum depth of recursion allowed in the run_sql function. Maximum value is 255. |
markdown_allow_dangerous_html |
false | Whether to allow raw HTML in markdown content. Only enable this if the markdown content is fully trusted (not user generated). |
markdown_allow_dangerous_protocol |
false | Whether to allow dangerous protocols (like javascript:) in markdown links. Only enable this if the markdown content is fully trusted (not user generated). |
Multiple configuration file formats are supported:
you can use a .json5 file, a .toml file, or a .yaml file.
All the parameters above can be set through environment variables.
The name of the environment variable is the same as the name of the configuration variable, but in uppercase.
The environment variable name can optionally be prefixed with SQLPAGE_.
Additionnally, when troubleshooting, you can set the RUST_LOG
environment variable to sqlpage=debug to get more detailed logs and see exactly what SQLPage is doing.
If you have a .env file in the current directory or in any of its parent directories, SQLPage will automatically load environment variables from it.
The database_url parameter sets all the connection parameters for the database, including
- the database engine type (
sqlite,postgres,mysql,mssql, or ODBC connection strings) - the username and password
- the host (or ip adress) and port
- the database name
- any additional parameters, including
mode=rwcfor SQLite to allow read-write connectionssslmode=require(ordisable,allow,verify-ca,verify-full) for PostgreSQL to enable or disable SSLsslrootcert=/path/to/ca.pemfor PostgreSQL to specify the path to the CA certificate filesslcert=/path/to/cert.pemto specify the path to the TLS client certificate file andsslkey=/path/to/key.pemto specify the path to the TLS client key file for PostgreSQL and MySQL.application_name=my_applicationfor PostgreSQL to set the application name, which can be useful for monitoring and logging on the database server side.collation=utf8mb4_unicode_cifor MySQL to set the collation of the connection
All the parameters need to be properly percent-encoded if they contain special characters like @ (%40), : (%3A), / (%2F), ? (%3F), # (%23).
A full connection string for a PostgreSQL database might look like this:
postgres://my_user:p%40ss@localhost:5432/my_database?sslmode=verify-ca&sslrootcert=/path/to/ca.pem&sslcert=/path/to/cert.pem&sslkey=/path/to/key.pem&application_name=my_application
For ODBC-compatible databases (Oracle, Snowflake, BigQuery, IBM DB2, etc.), you can use ODBC connection strings directly:
# Using a Data Source Name (DSN)
DATABASE_URL="DSN=MyDatabase"
# Using inline connection parameters
DATABASE_URL="Driver={PostgreSQL};Server=localhost;Port=5432;Database=mydb;UID=myuser;PWD=mypassword"
# Oracle example
DATABASE_URL="Driver={Oracle ODBC Driver};Server=localhost:1521/XE;UID=hr;PWD=password"
# Snowflake example
DATABASE_URL="Driver={SnowflakeDSIIDriver};Server=account.snowflakecomputing.com;Database=mydb;UID=user;PWD=password"ODBC drivers must be installed and configured on your system. On Linux, the unixODBC driver manager is statically linked into the SQLPage binary, so you usually only need to install and configure the database-specific ODBC driver for your target database (for example Snowflake, Oracle, DuckDB...).
If the database_password configuration parameter is set, it will override any password specified in the database_url.
It does not need to be percent-encoded.
This allows you to keep the password separate from the connection string, which can be useful for security purposes, especially when storing configurations in version control systems.
OpenID Connect (OIDC) is a secure way to let users log in to your SQLPage application using their existing accounts from popular services. When OIDC is configured, you can control which parts of your application require authentication using the oidc_protected_paths option. By default, all pages are protected. You can specify a list of URL prefixes to protect specific areas, allowing you to have a mix of public and private pages.
To set up OIDC, you'll need to:
- Register your application with an OIDC provider
- Configure the provider's details in SQLPage
When users log in through an OIDC provider, they need to be sent back to your application afterward. For this to work correctly, you need to tell SQLPage where your application is located online:
- Use the
hostsetting to specify your application's web address (for example, "myapp.example.com") - If you already have the
https_domainsetting set (to fetch https certificates for your site), then you don't need to duplicate it intohost.
Example configuration:
{
"oidc_issuer_url": "https://accounts.google.com",
"oidc_client_id": "your-client-id",
"oidc_client_secret": "your-client-secret",
"host": "myapp.example.com"
}-
Google
- Documentation: https://developers.google.com/identity/openid-connect/openid-connect
- Set oidc_issuer_url to
https://accounts.google.com
-
Microsoft Entra ID (formerly Azure AD)
- Documentation: https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app
- Set oidc_issuer_url to
https://login.microsoftonline.com/{tenant}/v2.0
-
GitHub
- Issuer URL:
https://github.com - Documentation: https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/authorizing-oauth-apps
- Issuer URL:
-
Keycloak
- Issuer URL:
https://your-keycloak-server/auth/realms/your-realm - Setup Guide
- Issuer URL:
-
Authentik
- Issuer URL:
https://your-authentik-server/application/o/your-application - Setup Guide
- Issuer URL:
After registering your application with the provider, you'll receive a client ID and client secret. These are used to configure SQLPage to work with your chosen provider.
Note: OIDC is optional. If you don't configure it, your SQLPage application will be accessible without authentication.
DATABASE_URL="postgres://my_user@localhost:5432/my_database?sslmode=verify-ca&sslrootcert=/path/to/ca.pem"
DATABASE_PASSWORD="my_secure_password"
SQLITE_EXTENSIONS="mod_spatialite crypto define regexp"SQLPage allows you to create custom components in addition to or instead of the default ones.
To create a custom component, create a .handlebars
file in the sqlpage/templates directory of your SQLPage installation.
For instance, if you want to create a custom my_component component, that displays the value of the my_column column, create a sqlpage/templates/my_component.handlebars file with the following content:
See the full custom component documentation.
SQLPage needs two important directories to work: the configuration directory, and the web root.
The configuration directory is the ./sqlpage/ folder by default.
In the official docker image, it is located in /etc/sqlpage/.
It can be configured using the --config-dir command-line argument, or the SQLPAGE_CONFIGURATION_DIRECTORY environment variable.
It can contain
- the
sqlpage.jsonconfiguration file, - the
templatesdirectory, - the
migrationsdirectory, - the connection management sql files.
The web root is where you place your sql files.
By default, it is set to the current working directory, from which the sqlpage binary is launched.
In the official docker image, the web root is set to /var/www.
It can be configured using the --web-root command-line argument, or the SQLPAGE_WEB_ROOT environment variable.
SQLPage allows you to run a SQL script when a new database connection is opened,
by simply creating a sqlpage/on_connect.sql file.
This can be useful to set up the database connection for your application.
For instance, on postgres, you can use this to set the search path and various other connection options.
SET TIME ZONE 'UTC';
SET search_path = my_schema;On SQLite, you can use this to ATTACH additional databases.
ATTACH DATABASE '/path/to/my_other_database.db' AS my_other_database;(and then, you can use my_other_database.my_table in your queries)
You can also use this to create temporary tables to store intermediate results that are useful in your SQLPage application, but that you don't want to store permanently in the database.
CREATE TEMPORARY TABLE my_temporary_table(
my_temp_column TEXT
);SQLPage allows you to run a SQL script after a request has been processed,
by simply creating a sqlpage/on_reset.sql file.
This can be useful to clean up temporary tables, rollback transactions that were left open, or other resources that were created during the request.
You can also use this script to close database connections that are
in an undesirable state, such as being in a transaction that was left open.
To close a connection, write a select statement that returns a single row
with a single boolean column named is_healthy, and set it to false.
You can automatically rollback any open transactions when a connection is returned to the pool, so that a new request is never executed in the context of an open transaction from a previous request.
For this to work, you need to create a sqlpage/on_reset.sql containing the following line:
ROLLBACK;Some databases allow you to clean up all the state associatPed with a connection.
By creating a sqlpage/on_reset.sql file containing a DISCARD ALL statement.
DISCARD ALL;By creating a sqlpage/on_reset.sql file containing a call to the sp_reset_connection stored procedure.
EXEC sp_reset_connection;SQLPage allows you to run SQL scripts when the database schema changes, by creating a sqlpage/migrations directory.
We have a guide on how to create migrations.
By default, SQLPage encourages a simple mapping between the URL and the SQL file that is executed.
You can also create custom URL routes by creating 404.sql files.
If you need advanced routing, you can also add a reverse proxy in front of SQLPage.