2018-03-17 04:20:54 +00:00
|
|
|
package state
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/hashicorp/go-memdb"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2018-04-24 18:50:31 +00:00
|
|
|
caBuiltinProviderTableName = "connect-ca-builtin"
|
|
|
|
caConfigTableName = "connect-ca-config"
|
|
|
|
caRootTableName = "connect-ca-roots"
|
2019-01-11 21:04:57 +00:00
|
|
|
caLeafIndexName = "connect-ca-leaf-certs"
|
2018-03-17 04:20:54 +00:00
|
|
|
)
|
|
|
|
|
2018-04-24 18:50:31 +00:00
|
|
|
// caBuiltinProviderTableSchema returns a new table schema used for storing
|
|
|
|
// the built-in CA provider's state for connect. This is only used by
|
|
|
|
// the internal Consul CA provider.
|
|
|
|
func caBuiltinProviderTableSchema() *memdb.TableSchema {
|
|
|
|
return &memdb.TableSchema{
|
|
|
|
Name: caBuiltinProviderTableName,
|
|
|
|
Indexes: map[string]*memdb.IndexSchema{
|
|
|
|
"id": &memdb.IndexSchema{
|
|
|
|
Name: "id",
|
|
|
|
AllowMissing: false,
|
|
|
|
Unique: true,
|
|
|
|
Indexer: &memdb.StringFieldIndex{
|
|
|
|
Field: "ID",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-07 00:13:22 +00:00
|
|
|
// caConfigTableSchema returns a new table schema used for storing
|
|
|
|
// the CA config for Connect.
|
|
|
|
func caConfigTableSchema() *memdb.TableSchema {
|
|
|
|
return &memdb.TableSchema{
|
|
|
|
Name: caConfigTableName,
|
|
|
|
Indexes: map[string]*memdb.IndexSchema{
|
2018-04-24 18:50:31 +00:00
|
|
|
// This table only stores one row, so this just ignores the ID field
|
|
|
|
// and always overwrites the same config object.
|
2018-04-07 00:13:22 +00:00
|
|
|
"id": &memdb.IndexSchema{
|
|
|
|
Name: "id",
|
|
|
|
AllowMissing: true,
|
|
|
|
Unique: true,
|
|
|
|
Indexer: &memdb.ConditionalIndex{
|
|
|
|
Conditional: func(obj interface{}) (bool, error) { return true, nil },
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
// caRootTableSchema returns a new table schema used for storing
|
|
|
|
// CA roots for Connect.
|
|
|
|
func caRootTableSchema() *memdb.TableSchema {
|
|
|
|
return &memdb.TableSchema{
|
|
|
|
Name: caRootTableName,
|
|
|
|
Indexes: map[string]*memdb.IndexSchema{
|
|
|
|
"id": &memdb.IndexSchema{
|
|
|
|
Name: "id",
|
|
|
|
AllowMissing: false,
|
|
|
|
Unique: true,
|
2018-04-24 23:16:37 +00:00
|
|
|
Indexer: &memdb.StringFieldIndex{
|
2018-03-17 04:20:54 +00:00
|
|
|
Field: "ID",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
2018-04-24 18:50:31 +00:00
|
|
|
registerSchema(caBuiltinProviderTableSchema)
|
2018-04-07 00:13:22 +00:00
|
|
|
registerSchema(caConfigTableSchema)
|
2018-03-17 04:20:54 +00:00
|
|
|
registerSchema(caRootTableSchema)
|
|
|
|
}
|
|
|
|
|
2018-04-07 00:13:22 +00:00
|
|
|
// CAConfig is used to pull the CA config from the snapshot.
|
|
|
|
func (s *Snapshot) CAConfig() (*structs.CAConfiguration, error) {
|
2018-04-20 08:30:34 +00:00
|
|
|
c, err := s.tx.First(caConfigTableName, "id")
|
2018-04-07 00:13:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
config, ok := c.(*structs.CAConfiguration)
|
|
|
|
if !ok {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return config, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CAConfig is used when restoring from a snapshot.
|
|
|
|
func (s *Restore) CAConfig(config *structs.CAConfiguration) error {
|
2018-12-06 02:27:20 +00:00
|
|
|
// Don't restore a blank CA config
|
|
|
|
// https://github.com/hashicorp/consul/issues/4954
|
|
|
|
if config.Provider == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
if err := s.tx.Insert(caConfigTableName, config); err != nil {
|
2018-04-07 00:13:22 +00:00
|
|
|
return fmt.Errorf("failed restoring CA config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-21 01:46:02 +00:00
|
|
|
// CAConfig is used to get the current CA configuration.
|
2018-04-07 00:13:22 +00:00
|
|
|
func (s *Store) CAConfig() (uint64, *structs.CAConfiguration, error) {
|
|
|
|
tx := s.db.Txn(false)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
2018-04-21 01:46:02 +00:00
|
|
|
// Get the CA config
|
2018-04-20 08:30:34 +00:00
|
|
|
c, err := tx.First(caConfigTableName, "id")
|
2018-04-07 00:13:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return 0, nil, fmt.Errorf("failed CA config lookup: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config, ok := c.(*structs.CAConfiguration)
|
|
|
|
if !ok {
|
|
|
|
return 0, nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return config.ModifyIndex, config, nil
|
|
|
|
}
|
|
|
|
|
2018-04-21 01:46:02 +00:00
|
|
|
// CASetConfig is used to set the current CA configuration.
|
2018-04-07 00:13:22 +00:00
|
|
|
func (s *Store) CASetConfig(idx uint64, config *structs.CAConfiguration) error {
|
|
|
|
tx := s.db.Txn(true)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
if err := s.caSetConfigTxn(idx, tx, config); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-04-07 00:13:22 +00:00
|
|
|
|
|
|
|
tx.Commit()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CACheckAndSetConfig is used to try updating the CA configuration with a
|
|
|
|
// given Raft index. If the CAS index specified is not equal to the last observed index
|
|
|
|
// for the config, then the call is a noop,
|
|
|
|
func (s *Store) CACheckAndSetConfig(idx, cidx uint64, config *structs.CAConfiguration) (bool, error) {
|
|
|
|
tx := s.db.Txn(true)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
|
|
|
// Check for an existing config
|
2018-04-20 08:30:34 +00:00
|
|
|
existing, err := tx.First(caConfigTableName, "id")
|
2018-04-07 00:13:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed CA config lookup: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the existing index does not match the provided CAS
|
|
|
|
// index arg, then we shouldn't update anything and can safely
|
|
|
|
// return early here.
|
|
|
|
e, ok := existing.(*structs.CAConfiguration)
|
|
|
|
if !ok || e.ModifyIndex != cidx {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
if err := s.caSetConfigTxn(idx, tx, config); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2018-04-07 00:13:22 +00:00
|
|
|
|
|
|
|
tx.Commit()
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Store) caSetConfigTxn(idx uint64, tx *memdb.Txn, config *structs.CAConfiguration) error {
|
|
|
|
// Check for an existing config
|
2018-04-20 08:30:34 +00:00
|
|
|
prev, err := tx.First(caConfigTableName, "id")
|
2018-04-07 00:13:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed CA config lookup: %s", err)
|
|
|
|
}
|
2018-04-20 08:30:34 +00:00
|
|
|
// Set the indexes, prevent the cluster ID from changing.
|
|
|
|
if prev != nil {
|
|
|
|
existing := prev.(*structs.CAConfiguration)
|
|
|
|
config.CreateIndex = existing.CreateIndex
|
2018-11-07 06:46:06 +00:00
|
|
|
// Allow the ClusterID to change if it's provided by an internal operation, such
|
|
|
|
// as a primary datacenter being switched to secondary mode.
|
|
|
|
if config.ClusterID == "" {
|
|
|
|
config.ClusterID = existing.ClusterID
|
|
|
|
}
|
2018-04-07 00:13:22 +00:00
|
|
|
} else {
|
|
|
|
config.CreateIndex = idx
|
|
|
|
}
|
|
|
|
config.ModifyIndex = idx
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
if err := tx.Insert(caConfigTableName, config); err != nil {
|
2018-04-07 00:13:22 +00:00
|
|
|
return fmt.Errorf("failed updating CA config: %s", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-03-21 18:33:19 +00:00
|
|
|
// CARoots is used to pull all the CA roots for the snapshot.
|
|
|
|
func (s *Snapshot) CARoots() (structs.CARoots, error) {
|
|
|
|
ixns, err := s.tx.Get(caRootTableName, "id")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var ret structs.CARoots
|
|
|
|
for wrapped := ixns.Next(); wrapped != nil; wrapped = ixns.Next() {
|
|
|
|
ret = append(ret, wrapped.(*structs.CARoot))
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CARoots is used when restoring from a snapshot.
|
|
|
|
func (s *Restore) CARoot(r *structs.CARoot) error {
|
|
|
|
// Insert
|
|
|
|
if err := s.tx.Insert(caRootTableName, r); err != nil {
|
|
|
|
return fmt.Errorf("failed restoring CA root: %s", err)
|
|
|
|
}
|
|
|
|
if err := indexUpdateMaxTxn(s.tx, r.ModifyIndex, caRootTableName); err != nil {
|
|
|
|
return fmt.Errorf("failed updating index: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
// CARoots returns the list of all CA roots.
|
|
|
|
func (s *Store) CARoots(ws memdb.WatchSet) (uint64, structs.CARoots, error) {
|
|
|
|
tx := s.db.Txn(false)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
|
|
|
// Get the index
|
|
|
|
idx := maxIndexTxn(tx, caRootTableName)
|
|
|
|
|
|
|
|
// Get all
|
|
|
|
iter, err := tx.Get(caRootTableName, "id")
|
|
|
|
if err != nil {
|
|
|
|
return 0, nil, fmt.Errorf("failed CA root lookup: %s", err)
|
|
|
|
}
|
|
|
|
ws.Add(iter.WatchCh())
|
|
|
|
|
|
|
|
var results structs.CARoots
|
|
|
|
for v := iter.Next(); v != nil; v = iter.Next() {
|
|
|
|
results = append(results, v.(*structs.CARoot))
|
|
|
|
}
|
|
|
|
return idx, results, nil
|
|
|
|
}
|
|
|
|
|
2018-03-20 03:29:14 +00:00
|
|
|
// CARootActive returns the currently active CARoot.
|
|
|
|
func (s *Store) CARootActive(ws memdb.WatchSet) (uint64, *structs.CARoot, error) {
|
|
|
|
// Get all the roots since there should never be that many and just
|
|
|
|
// do the filtering in this method.
|
|
|
|
var result *structs.CARoot
|
|
|
|
idx, roots, err := s.CARoots(ws)
|
|
|
|
if err == nil {
|
|
|
|
for _, r := range roots {
|
|
|
|
if r.Active {
|
|
|
|
result = r
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return idx, result, err
|
|
|
|
}
|
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
// CARootSetCAS sets the current CA root state using a check-and-set operation.
|
|
|
|
// On success, this will replace the previous set of CARoots completely with
|
|
|
|
// the given set of roots.
|
2018-03-17 04:20:54 +00:00
|
|
|
//
|
2018-03-21 17:10:53 +00:00
|
|
|
// The first boolean result returns whether the transaction succeeded or not.
|
|
|
|
func (s *Store) CARootSetCAS(idx, cidx uint64, rs []*structs.CARoot) (bool, error) {
|
2018-03-17 04:20:54 +00:00
|
|
|
tx := s.db.Txn(true)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
2018-03-27 03:38:39 +00:00
|
|
|
// There must be exactly one active CA root.
|
|
|
|
activeCount := 0
|
|
|
|
for _, r := range rs {
|
|
|
|
if r.Active {
|
|
|
|
activeCount++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if activeCount != 1 {
|
|
|
|
return false, fmt.Errorf("there must be exactly one active CA")
|
|
|
|
}
|
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
// Get the current max index
|
|
|
|
if midx := maxIndexTxn(tx, caRootTableName); midx != cidx {
|
|
|
|
return false, nil
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
// Go through and find any existing matching CAs so we can preserve and
|
|
|
|
// update their Create/ModifyIndex values.
|
|
|
|
for _, r := range rs {
|
|
|
|
if r.ID == "" {
|
|
|
|
return false, ErrMissingCARootID
|
|
|
|
}
|
|
|
|
|
|
|
|
existing, err := tx.First(caRootTableName, "id", r.ID)
|
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed CA root lookup: %s", err)
|
|
|
|
}
|
2018-03-17 04:20:54 +00:00
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
if existing != nil {
|
|
|
|
r.CreateIndex = existing.(*structs.CARoot).CreateIndex
|
|
|
|
} else {
|
|
|
|
r.CreateIndex = idx
|
|
|
|
}
|
|
|
|
r.ModifyIndex = idx
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
// Delete all
|
|
|
|
_, err := tx.DeleteAll(caRootTableName, "id")
|
2018-03-17 04:20:54 +00:00
|
|
|
if err != nil {
|
2018-03-21 17:10:53 +00:00
|
|
|
return false, err
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
// Insert all
|
|
|
|
for _, r := range rs {
|
|
|
|
if err := tx.Insert(caRootTableName, r); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
2018-03-21 17:10:53 +00:00
|
|
|
|
|
|
|
// Update the index
|
2018-03-17 04:20:54 +00:00
|
|
|
if err := tx.Insert("index", &IndexEntry{caRootTableName, idx}); err != nil {
|
2018-03-21 17:10:53 +00:00
|
|
|
return false, fmt.Errorf("failed updating index: %s", err)
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
|
|
|
|
2018-03-21 17:10:53 +00:00
|
|
|
tx.Commit()
|
|
|
|
return true, nil
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
2018-04-20 08:30:34 +00:00
|
|
|
|
2018-04-27 06:28:27 +00:00
|
|
|
// CAProviderState is used to pull the built-in provider states from the snapshot.
|
|
|
|
func (s *Snapshot) CAProviderState() ([]*structs.CAConsulProviderState, error) {
|
|
|
|
ixns, err := s.tx.Get(caBuiltinProviderTableName, "id")
|
2018-04-20 08:30:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-04-27 06:28:27 +00:00
|
|
|
var ret []*structs.CAConsulProviderState
|
|
|
|
for wrapped := ixns.Next(); wrapped != nil; wrapped = ixns.Next() {
|
|
|
|
ret = append(ret, wrapped.(*structs.CAConsulProviderState))
|
2018-04-20 08:30:34 +00:00
|
|
|
}
|
|
|
|
|
2018-04-27 06:28:27 +00:00
|
|
|
return ret, nil
|
2018-04-20 08:30:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// CAProviderState is used when restoring from a snapshot.
|
|
|
|
func (s *Restore) CAProviderState(state *structs.CAConsulProviderState) error {
|
2018-04-24 18:50:31 +00:00
|
|
|
if err := s.tx.Insert(caBuiltinProviderTableName, state); err != nil {
|
2018-04-20 08:30:34 +00:00
|
|
|
return fmt.Errorf("failed restoring built-in CA state: %s", err)
|
|
|
|
}
|
2018-04-27 06:28:27 +00:00
|
|
|
if err := indexUpdateMaxTxn(s.tx, state.ModifyIndex, caBuiltinProviderTableName); err != nil {
|
|
|
|
return fmt.Errorf("failed updating index: %s", err)
|
|
|
|
}
|
2018-04-20 08:30:34 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-21 01:46:02 +00:00
|
|
|
// CAProviderState is used to get the Consul CA provider state for the given ID.
|
|
|
|
func (s *Store) CAProviderState(id string) (uint64, *structs.CAConsulProviderState, error) {
|
2018-04-20 08:30:34 +00:00
|
|
|
tx := s.db.Txn(false)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
2018-04-21 01:46:02 +00:00
|
|
|
// Get the index
|
2018-04-24 18:50:31 +00:00
|
|
|
idx := maxIndexTxn(tx, caBuiltinProviderTableName)
|
2018-04-21 01:46:02 +00:00
|
|
|
|
|
|
|
// Get the provider config
|
2018-04-24 18:50:31 +00:00
|
|
|
c, err := tx.First(caBuiltinProviderTableName, "id", id)
|
2018-04-20 08:30:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return 0, nil, fmt.Errorf("failed built-in CA state lookup: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
state, ok := c.(*structs.CAConsulProviderState)
|
|
|
|
if !ok {
|
|
|
|
return 0, nil, nil
|
|
|
|
}
|
|
|
|
|
2018-04-21 01:46:02 +00:00
|
|
|
return idx, state, nil
|
|
|
|
}
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
// CASetProviderState is used to set the current built-in CA provider state.
|
|
|
|
func (s *Store) CASetProviderState(idx uint64, state *structs.CAConsulProviderState) (bool, error) {
|
|
|
|
tx := s.db.Txn(true)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
|
|
|
// Check for an existing config
|
2018-04-24 18:50:31 +00:00
|
|
|
existing, err := tx.First(caBuiltinProviderTableName, "id", state.ID)
|
2018-04-20 08:30:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed built-in CA state lookup: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the indexes.
|
|
|
|
if existing != nil {
|
2018-04-21 01:46:02 +00:00
|
|
|
state.CreateIndex = existing.(*structs.CAConsulProviderState).CreateIndex
|
2018-04-20 08:30:34 +00:00
|
|
|
} else {
|
|
|
|
state.CreateIndex = idx
|
|
|
|
}
|
|
|
|
state.ModifyIndex = idx
|
|
|
|
|
2018-04-24 18:50:31 +00:00
|
|
|
if err := tx.Insert(caBuiltinProviderTableName, state); err != nil {
|
2018-04-20 08:30:34 +00:00
|
|
|
return false, fmt.Errorf("failed updating built-in CA state: %s", err)
|
|
|
|
}
|
2018-04-21 01:46:02 +00:00
|
|
|
|
|
|
|
// Update the index
|
2018-04-24 18:50:31 +00:00
|
|
|
if err := tx.Insert("index", &IndexEntry{caBuiltinProviderTableName, idx}); err != nil {
|
2018-04-21 01:46:02 +00:00
|
|
|
return false, fmt.Errorf("failed updating index: %s", err)
|
|
|
|
}
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
tx.Commit()
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|
2018-04-21 01:46:02 +00:00
|
|
|
|
2018-04-27 06:28:27 +00:00
|
|
|
// CADeleteProviderState is used to remove the built-in Consul CA provider
|
|
|
|
// state for the given ID.
|
2018-04-21 01:46:02 +00:00
|
|
|
func (s *Store) CADeleteProviderState(id string) error {
|
|
|
|
tx := s.db.Txn(true)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
|
|
|
// Get the index
|
2018-04-24 18:50:31 +00:00
|
|
|
idx := maxIndexTxn(tx, caBuiltinProviderTableName)
|
2018-04-21 01:46:02 +00:00
|
|
|
|
|
|
|
// Check for an existing config
|
2018-04-24 18:50:31 +00:00
|
|
|
existing, err := tx.First(caBuiltinProviderTableName, "id", id)
|
2018-04-21 01:46:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed built-in CA state lookup: %s", err)
|
|
|
|
}
|
|
|
|
if existing == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
providerState := existing.(*structs.CAConsulProviderState)
|
|
|
|
|
|
|
|
// Do the delete and update the index
|
2018-04-24 18:50:31 +00:00
|
|
|
if err := tx.Delete(caBuiltinProviderTableName, providerState); err != nil {
|
2018-04-21 01:46:02 +00:00
|
|
|
return err
|
|
|
|
}
|
2018-04-24 18:50:31 +00:00
|
|
|
if err := tx.Insert("index", &IndexEntry{caBuiltinProviderTableName, idx}); err != nil {
|
2018-04-21 01:46:02 +00:00
|
|
|
return fmt.Errorf("failed updating index: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tx.Commit()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2019-01-11 21:04:57 +00:00
|
|
|
|
|
|
|
func (s *Store) CALeafSetIndex(index uint64) error {
|
|
|
|
tx := s.db.Txn(true)
|
|
|
|
defer tx.Abort()
|
|
|
|
|
|
|
|
return indexUpdateMaxTxn(tx, index, caLeafIndexName)
|
|
|
|
}
|