2018-02-15 01:31:20 +00:00
|
|
|
package spanner
|
|
|
|
|
|
|
|
import (
|
2018-07-13 15:00:38 +00:00
|
|
|
"context"
|
2018-02-15 01:31:20 +00:00
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"sort"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
metrics "github.com/armon/go-metrics"
|
2018-04-03 00:46:59 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2021-07-16 00:17:31 +00:00
|
|
|
"github.com/hashicorp/go-secure-stdlib/strutil"
|
2019-04-12 22:17:49 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/helper/useragent"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/physical"
|
2018-02-15 01:31:20 +00:00
|
|
|
"google.golang.org/api/iterator"
|
2018-02-15 23:30:31 +00:00
|
|
|
"google.golang.org/api/option"
|
2018-02-15 01:31:20 +00:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
|
|
|
|
"cloud.google.com/go/spanner"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Verify Backend satisfies the correct interfaces
|
2021-04-08 16:43:39 +00:00
|
|
|
var (
|
|
|
|
_ physical.Backend = (*Backend)(nil)
|
|
|
|
_ physical.Transactional = (*Backend)(nil)
|
|
|
|
)
|
2018-02-15 01:31:20 +00:00
|
|
|
|
|
|
|
const (
|
|
|
|
// envDatabase is the name of the environment variable to search for the
|
|
|
|
// database name.
|
|
|
|
envDatabase = "GOOGLE_SPANNER_DATABASE"
|
|
|
|
|
|
|
|
// envHAEnabled is the name of the environment variable to search for the
|
|
|
|
// boolean indicating if HA is enabled.
|
|
|
|
envHAEnabled = "GOOGLE_SPANNER_HA_ENABLED"
|
|
|
|
|
|
|
|
// envHATable is the name of the environment variable to search for the table
|
|
|
|
// name to use for HA.
|
|
|
|
envHATable = "GOOGLE_SPANNER_HA_TABLE"
|
|
|
|
|
|
|
|
// envTable is the name of the environment variable to search for the table
|
|
|
|
// name.
|
|
|
|
envTable = "GOOGLE_SPANNER_TABLE"
|
|
|
|
|
|
|
|
// defaultTable is the default table name if none is specified.
|
|
|
|
defaultTable = "Vault"
|
|
|
|
|
|
|
|
// defaultHASuffix is the default suffix to apply to the table name if no
|
|
|
|
// HA table is provided.
|
|
|
|
defaultHASuffix = "HA"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// metricDelete is the key for the metric for measuring a Delete call.
|
|
|
|
metricDelete = []string{"spanner", "delete"}
|
|
|
|
|
|
|
|
// metricGet is the key for the metric for measuring a Get call.
|
|
|
|
metricGet = []string{"spanner", "get"}
|
|
|
|
|
|
|
|
// metricList is the key for the metric for measuring a List call.
|
|
|
|
metricList = []string{"spanner", "list"}
|
|
|
|
|
|
|
|
// metricPut is the key for the metric for measuring a Put call.
|
|
|
|
metricPut = []string{"spanner", "put"}
|
2020-03-13 11:35:56 +00:00
|
|
|
|
|
|
|
// metricTxn is the key for the metric for measuring a Transaction call.
|
|
|
|
metricTxn = []string{"spanner", "txn"}
|
2018-02-15 01:31:20 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Backend implements physical.Backend and describes the steps necessary to
|
|
|
|
// persist data using Google Cloud Spanner.
|
|
|
|
type Backend struct {
|
|
|
|
// database is the name of the database to use for data storage and retrieval.
|
|
|
|
// This is supplied as part of user configuration.
|
|
|
|
database string
|
|
|
|
|
|
|
|
// table is the name of the table in the database.
|
|
|
|
table string
|
|
|
|
|
2020-07-09 20:52:29 +00:00
|
|
|
// client is the API client and permitPool is the allowed concurrent uses of
|
|
|
|
// the client.
|
|
|
|
client *spanner.Client
|
|
|
|
permitPool *physical.PermitPool
|
|
|
|
|
2018-02-15 01:31:20 +00:00
|
|
|
// haTable is the name of the table to use for HA in the database.
|
|
|
|
haTable string
|
|
|
|
|
|
|
|
// haEnabled indicates if high availability is enabled. Default: true.
|
|
|
|
haEnabled bool
|
|
|
|
|
2020-07-09 20:52:29 +00:00
|
|
|
// haClient is the API client. This is managed separately from the main client
|
|
|
|
// because a flood of requests should not block refreshing the TTLs on the
|
|
|
|
// lock.
|
|
|
|
//
|
|
|
|
// This value will be nil if haEnabled is false.
|
|
|
|
haClient *spanner.Client
|
2018-02-15 01:31:20 +00:00
|
|
|
|
2020-07-09 20:52:29 +00:00
|
|
|
// logger is the internal logger.
|
|
|
|
logger log.Logger
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewBackend creates a new Google Spanner storage backend with the given
|
|
|
|
// configuration. This uses the official Golang Cloud SDK and therefore supports
|
|
|
|
// specifying credentials via envvars, credential files, etc.
|
|
|
|
func NewBackend(c map[string]string, logger log.Logger) (physical.Backend, error) {
|
2018-04-03 00:46:59 +00:00
|
|
|
logger.Debug("configuring backend")
|
2018-02-15 01:31:20 +00:00
|
|
|
|
|
|
|
// Database name
|
|
|
|
database := os.Getenv(envDatabase)
|
|
|
|
if database == "" {
|
|
|
|
database = c["database"]
|
|
|
|
}
|
|
|
|
if database == "" {
|
|
|
|
return nil, errors.New("missing database name")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Table name
|
|
|
|
table := os.Getenv(envTable)
|
|
|
|
if table == "" {
|
|
|
|
table = c["table"]
|
|
|
|
}
|
|
|
|
if table == "" {
|
|
|
|
table = defaultTable
|
|
|
|
}
|
|
|
|
|
|
|
|
// HA table name
|
|
|
|
haTable := os.Getenv(envHATable)
|
|
|
|
if haTable == "" {
|
|
|
|
haTable = c["ha_table"]
|
|
|
|
}
|
|
|
|
if haTable == "" {
|
|
|
|
haTable = table + defaultHASuffix
|
|
|
|
}
|
|
|
|
|
|
|
|
// HA configuration
|
2020-07-09 20:52:29 +00:00
|
|
|
haClient := (*spanner.Client)(nil)
|
2018-02-15 01:31:20 +00:00
|
|
|
haEnabled := false
|
|
|
|
haEnabledStr := os.Getenv(envHAEnabled)
|
|
|
|
if haEnabledStr == "" {
|
|
|
|
haEnabledStr = c["ha_enabled"]
|
|
|
|
}
|
|
|
|
if haEnabledStr != "" {
|
|
|
|
var err error
|
|
|
|
haEnabled, err = strconv.ParseBool(haEnabledStr)
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse HA enabled: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
}
|
2020-07-09 20:52:29 +00:00
|
|
|
if haEnabled {
|
|
|
|
logger.Debug("creating HA client")
|
|
|
|
var err error
|
|
|
|
ctx := context.Background()
|
|
|
|
haClient, err = spanner.NewClient(ctx, database,
|
|
|
|
option.WithUserAgent(useragent.String()),
|
|
|
|
)
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to create HA client: %w", err)
|
2020-07-09 20:52:29 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-15 01:31:20 +00:00
|
|
|
|
|
|
|
// Max parallel
|
|
|
|
maxParallel, err := extractInt(c["max_parallel"])
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse max_parallel: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
2018-04-03 00:46:59 +00:00
|
|
|
logger.Debug("configuration",
|
2018-02-15 01:31:20 +00:00
|
|
|
"database", database,
|
|
|
|
"table", table,
|
|
|
|
"haEnabled", haEnabled,
|
|
|
|
"haTable", haTable,
|
|
|
|
"maxParallel", maxParallel,
|
|
|
|
)
|
|
|
|
|
2020-07-09 20:52:29 +00:00
|
|
|
logger.Debug("creating client")
|
2018-02-15 01:31:20 +00:00
|
|
|
ctx := context.Background()
|
2018-02-15 23:30:31 +00:00
|
|
|
client, err := spanner.NewClient(ctx, database,
|
|
|
|
option.WithUserAgent(useragent.String()),
|
|
|
|
)
|
2018-02-15 01:31:20 +00:00
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to create spanner client: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &Backend{
|
2020-07-09 20:52:29 +00:00
|
|
|
database: database,
|
|
|
|
table: table,
|
|
|
|
client: client,
|
|
|
|
permitPool: physical.NewPermitPool(maxParallel),
|
|
|
|
|
2018-02-15 01:31:20 +00:00
|
|
|
haEnabled: haEnabled,
|
|
|
|
haTable: haTable,
|
2020-07-09 20:52:29 +00:00
|
|
|
haClient: haClient,
|
2018-02-15 01:31:20 +00:00
|
|
|
|
2020-07-09 20:52:29 +00:00
|
|
|
logger: logger,
|
2018-02-15 01:31:20 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put creates or updates an entry.
|
|
|
|
func (b *Backend) Put(ctx context.Context, entry *physical.Entry) error {
|
|
|
|
defer metrics.MeasureSince(metricPut, time.Now())
|
|
|
|
|
|
|
|
// Pooling
|
|
|
|
b.permitPool.Acquire()
|
|
|
|
defer b.permitPool.Release()
|
|
|
|
|
|
|
|
// Insert
|
|
|
|
m := spanner.InsertOrUpdateMap(b.table, map[string]interface{}{
|
|
|
|
"Key": entry.Key,
|
|
|
|
"Value": entry.Value,
|
|
|
|
})
|
|
|
|
if _, err := b.client.Apply(ctx, []*spanner.Mutation{m}); err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return fmt.Errorf("failed to put data: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get fetches an entry. If there is no entry, this function returns nil.
|
|
|
|
func (b *Backend) Get(ctx context.Context, key string) (*physical.Entry, error) {
|
2020-03-13 11:35:56 +00:00
|
|
|
defer metrics.MeasureSince(metricGet, time.Now())
|
2018-02-15 01:31:20 +00:00
|
|
|
|
|
|
|
// Pooling
|
|
|
|
b.permitPool.Acquire()
|
|
|
|
defer b.permitPool.Release()
|
|
|
|
|
|
|
|
// Read
|
|
|
|
row, err := b.client.Single().ReadRow(ctx, b.table, spanner.Key{key}, []string{"Value"})
|
|
|
|
if spanner.ErrCode(err) == codes.NotFound {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to read value for %q: %w", key, err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var value []byte
|
|
|
|
if err := row.Column(0, &value); err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to decode value into bytes: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &physical.Entry{
|
|
|
|
Key: key,
|
|
|
|
Value: value,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete deletes an entry with the given key.
|
|
|
|
func (b *Backend) Delete(ctx context.Context, key string) error {
|
|
|
|
defer metrics.MeasureSince(metricDelete, time.Now())
|
|
|
|
|
|
|
|
// Pooling
|
|
|
|
b.permitPool.Acquire()
|
|
|
|
defer b.permitPool.Release()
|
|
|
|
|
|
|
|
// Delete
|
|
|
|
m := spanner.Delete(b.table, spanner.Key{key})
|
|
|
|
if _, err := b.client.Apply(ctx, []*spanner.Mutation{m}); err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return fmt.Errorf("failed to delete key: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// List enumerates all keys with the given prefix.
|
|
|
|
func (b *Backend) List(ctx context.Context, prefix string) ([]string, error) {
|
|
|
|
defer metrics.MeasureSince(metricList, time.Now())
|
|
|
|
|
|
|
|
// Pooling
|
|
|
|
b.permitPool.Acquire()
|
|
|
|
defer b.permitPool.Release()
|
|
|
|
|
|
|
|
// Sanitize
|
|
|
|
safeTable := sanitizeTable(b.table)
|
|
|
|
|
|
|
|
// List
|
|
|
|
iter := b.client.Single().Query(ctx, spanner.Statement{
|
|
|
|
SQL: "SELECT Key FROM " + safeTable + " WHERE STARTS_WITH(Key, @prefix)",
|
|
|
|
Params: map[string]interface{}{
|
|
|
|
"prefix": prefix,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
defer iter.Stop()
|
|
|
|
|
|
|
|
var keys []string
|
|
|
|
|
|
|
|
for {
|
|
|
|
row, err := iter.Next()
|
|
|
|
if err == iterator.Done {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to read row: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var key string
|
|
|
|
if err := row.Column(0, &key); err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("failed to decode key into string: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// The results will include the full prefix (folder) and any deeply-nested
|
|
|
|
// prefixes (subfolders). Vault expects only the top-most things to be
|
|
|
|
// included.
|
|
|
|
key = strings.TrimPrefix(key, prefix)
|
|
|
|
if i := strings.Index(key, "/"); i == -1 {
|
|
|
|
// Add objects only from the current 'folder'
|
|
|
|
keys = append(keys, key)
|
|
|
|
} else {
|
|
|
|
// Add truncated 'folder' paths
|
|
|
|
keys = strutil.AppendIfMissing(keys, string(key[:i+1]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sort because the resulting order is not predictable
|
|
|
|
sort.Strings(keys)
|
|
|
|
|
|
|
|
return keys, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transaction runs multiple entries via a single transaction.
|
|
|
|
func (b *Backend) Transaction(ctx context.Context, txns []*physical.TxnEntry) error {
|
2020-03-13 11:35:56 +00:00
|
|
|
defer metrics.MeasureSince(metricTxn, time.Now())
|
|
|
|
|
2018-02-15 01:31:20 +00:00
|
|
|
// Quit early if we can
|
|
|
|
if len(txns) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build all the ops before taking out the pool
|
|
|
|
ms := make([]*spanner.Mutation, len(txns))
|
|
|
|
for i, tx := range txns {
|
|
|
|
op, key, value := tx.Operation, tx.Entry.Key, tx.Entry.Value
|
|
|
|
|
|
|
|
switch op {
|
|
|
|
case physical.DeleteOperation:
|
|
|
|
ms[i] = spanner.Delete(b.table, spanner.Key{key})
|
|
|
|
case physical.PutOperation:
|
|
|
|
ms[i] = spanner.InsertOrUpdateMap(b.table, map[string]interface{}{
|
|
|
|
"Key": key,
|
|
|
|
"Value": value,
|
|
|
|
})
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("unsupported transaction operation: %q", op)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pooling
|
|
|
|
b.permitPool.Acquire()
|
|
|
|
defer b.permitPool.Release()
|
|
|
|
|
|
|
|
// Transactivate!
|
|
|
|
if _, err := b.client.Apply(ctx, ms); err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return fmt.Errorf("failed to commit transaction: %w", err)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// extractInt is a helper function that takes a string and converts that string
|
|
|
|
// to an int, but accounts for the empty string.
|
|
|
|
func extractInt(s string) (int, error) {
|
|
|
|
if s == "" {
|
|
|
|
return 0, nil
|
|
|
|
}
|
|
|
|
return strconv.Atoi(s)
|
|
|
|
}
|
|
|
|
|
|
|
|
// sanitizeTable attempts to sanitize the table name.
|
|
|
|
func sanitizeTable(s string) string {
|
|
|
|
end := strings.IndexRune(s, 0)
|
|
|
|
if end > -1 {
|
|
|
|
s = s[:end]
|
|
|
|
}
|
2022-08-03 19:22:48 +00:00
|
|
|
return strings.ReplaceAll(s, `"`, `""`)
|
2018-02-15 01:31:20 +00:00
|
|
|
}
|