components-contrib/internal/authentication/sqlite/metadata.go

191 lines
6.0 KiB
Go

/*
Copyright 2023 The Dapr Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package sqlite
import (
"errors"
"fmt"
"net/url"
"strings"
"time"
// Blank import for the sqlite driver
_ "modernc.org/sqlite"
"github.com/dapr/kit/logger"
)
const (
DefaultTimeout = 20 * time.Second // Default timeout for database requests, in seconds
DefaultBusyTimeout = 2 * time.Second
)
// SqliteAuthMetadata contains the auth metadata for a SQLite component.
type SqliteAuthMetadata struct {
ConnectionString string `mapstructure:"connectionString" mapstructurealiases:"url"`
Timeout time.Duration `mapstructure:"timeout" mapstructurealiases:"timeoutInSeconds"`
BusyTimeout time.Duration `mapstructure:"busyTimeout"`
DisableWAL bool `mapstructure:"disableWAL"` // Disable WAL journaling. You should not use WAL if the database is stored on a network filesystem (or data corruption may happen). This is ignored if the database is in-memory.
}
// Reset the object
func (m *SqliteAuthMetadata) Reset() {
m.ConnectionString = ""
m.Timeout = DefaultTimeout
m.BusyTimeout = DefaultBusyTimeout
m.DisableWAL = false
}
// Validate the auth metadata and returns an error if it's not valid.
func (m *SqliteAuthMetadata) Validate() error {
// Validate and sanitize input
if m.ConnectionString == "" {
return errors.New("missing connection string")
}
if m.Timeout < time.Second {
return errors.New("invalid value for 'timeout': must be greater than 1s")
}
// Busy timeout
// Truncate values to milliseconds. Values <= 0 do not set any timeout
m.BusyTimeout = m.BusyTimeout.Truncate(time.Millisecond)
return nil
}
// IsInMemoryDB returns true if the connection string is for an in-memory database.
func (m SqliteAuthMetadata) IsInMemoryDB() bool {
lc := strings.ToLower(m.ConnectionString)
return strings.HasPrefix(lc, ":memory:") || strings.HasPrefix(lc, "file::memory:")
}
// GetConnectionString returns the parsed connection string.
func (m *SqliteAuthMetadata) GetConnectionString(log logger.Logger) (string, error) {
// Check if we're using the in-memory database
isMemoryDB := m.IsInMemoryDB()
// Get the "query string" from the connection string if present
idx := strings.IndexRune(m.ConnectionString, '?')
var qs url.Values
if idx > 0 {
qs, _ = url.ParseQuery(m.ConnectionString[(idx + 1):])
}
if len(qs) == 0 {
qs = make(url.Values, 2)
}
// If the database is in-memory, we must ensure that cache=shared is set
if isMemoryDB {
qs["cache"] = []string{"shared"}
}
// Check if the database is read-only or immutable
isReadOnly := false
if len(qs["mode"]) > 0 {
// Keep the first value only
qs["mode"] = []string{
qs["mode"][0],
}
if qs["mode"][0] == "ro" {
isReadOnly = true
}
}
if len(qs["immutable"]) > 0 {
// Keep the first value only
qs["immutable"] = []string{
qs["immutable"][0],
}
if qs["immutable"][0] == "1" {
isReadOnly = true
}
}
// We do not want to override a _txlock if set, but we'll show a warning if it's not "immediate"
if len(qs["_txlock"]) > 0 {
// Keep the first value only
qs["_txlock"] = []string{
strings.ToLower(qs["_txlock"][0]),
}
if qs["_txlock"][0] != "immediate" {
log.Warn("Database connection is being created with a _txlock different from the recommended value 'immediate'")
}
} else {
qs["_txlock"] = []string{"immediate"}
}
// Add pragma values
if len(qs["_pragma"]) == 0 {
qs["_pragma"] = make([]string, 0, 2)
} else {
for _, p := range qs["_pragma"] {
p = strings.ToLower(p)
if strings.HasPrefix(p, "busy_timeout") {
log.Error("Cannot set `_pragma=busy_timeout` option in the connection string; please use the `busyTimeout` metadata property instead")
return "", errors.New("found forbidden option '_pragma=busy_timeout' in the connection string")
} else if strings.HasPrefix(p, "journal_mode") {
log.Error("Cannot set `_pragma=journal_mode` option in the connection string; please use the `disableWAL` metadata property instead")
return "", errors.New("found forbidden option '_pragma=journal_mode' in the connection string")
}
}
}
if m.BusyTimeout > 0 {
qs["_pragma"] = append(qs["_pragma"], fmt.Sprintf("busy_timeout(%d)", m.BusyTimeout.Milliseconds()))
}
if isMemoryDB {
// For in-memory databases, set the journal to MEMORY, the only allowed option besides OFF (which would make transactions ineffective)
qs["_pragma"] = append(qs["_pragma"], "journal_mode(MEMORY)")
} else if m.DisableWAL || isReadOnly {
// Set the journaling mode to "DELETE" (the default) if WAL is disabled or if the database is read-only
qs["_pragma"] = append(qs["_pragma"], "journal_mode(DELETE)")
} else {
// Enable WAL
qs["_pragma"] = append(qs["_pragma"], "journal_mode(WAL)")
}
// Build the final connection string
connString := m.ConnectionString
if idx > 0 {
connString = connString[:idx]
}
connString += "?" + qs.Encode()
// If the connection string doesn't begin with "file:", add the prefix
if !strings.HasPrefix(strings.ToLower(m.ConnectionString), "file:") {
log.Debug("prefix 'file:' added to the connection string")
connString = "file:" + connString
}
return connString, nil
}
// Validates an identifier, such as table or DB name.
func ValidIdentifier(v string) bool {
if v == "" {
return false
}
// Loop through the string as byte slice as we only care about ASCII characters
b := []byte(v)
for i := 0; i < len(b); i++ {
if (b[i] >= '0' && b[i] <= '9') ||
(b[i] >= 'a' && b[i] <= 'z') ||
(b[i] >= 'A' && b[i] <= 'Z') ||
b[i] == '_' {
continue
}
return false
}
return true
}