2023-05-21 12:37:59 -04:00
|
|
|
package db
|
2020-06-21 06:32:08 -04:00
|
|
|
|
|
|
|
import (
|
2022-07-06 07:39:10 -04:00
|
|
|
"context"
|
2020-06-21 06:32:08 -04:00
|
|
|
"errors"
|
2022-03-01 11:31:25 -05:00
|
|
|
"fmt"
|
2022-09-02 03:13:50 -04:00
|
|
|
"net/netip"
|
2023-11-16 11:55:29 -05:00
|
|
|
"strings"
|
2023-05-11 03:09:18 -04:00
|
|
|
"sync"
|
2022-02-23 11:15:20 -05:00
|
|
|
"time"
|
2020-06-21 06:32:08 -04:00
|
|
|
|
2022-02-22 11:18:25 -05:00
|
|
|
"github.com/glebarez/sqlite"
|
2023-06-21 05:29:52 -04:00
|
|
|
"github.com/juanfont/headscale/hscontrol/notifier"
|
2023-05-21 12:37:59 -04:00
|
|
|
"github.com/juanfont/headscale/hscontrol/types"
|
|
|
|
"github.com/juanfont/headscale/hscontrol/util"
|
2022-02-28 13:05:03 -05:00
|
|
|
"github.com/rs/zerolog/log"
|
2021-06-24 09:44:19 -04:00
|
|
|
"gorm.io/driver/postgres"
|
|
|
|
"gorm.io/gorm"
|
2021-07-11 07:13:36 -04:00
|
|
|
"gorm.io/gorm/logger"
|
2020-06-21 06:32:08 -04:00
|
|
|
)
|
|
|
|
|
2021-11-15 14:18:14 -05:00
|
|
|
const (
|
2022-11-23 13:50:30 -05:00
|
|
|
dbVersion = "1"
|
2023-05-11 03:09:18 -04:00
|
|
|
Postgres = "postgres"
|
|
|
|
Sqlite = "sqlite3"
|
|
|
|
)
|
2022-11-23 13:50:30 -05:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
var (
|
|
|
|
errValueNotFound = errors.New("not found")
|
|
|
|
errDatabaseNotSupported = errors.New("database type not supported")
|
2021-11-15 14:18:14 -05:00
|
|
|
)
|
2020-06-21 06:32:08 -04:00
|
|
|
|
2021-02-23 14:11:30 -05:00
|
|
|
// KV is a key-value store in a psql table. For future use...
|
2023-05-11 03:09:18 -04:00
|
|
|
// TODO(kradalby): Is this used for anything?
|
2020-06-21 06:32:08 -04:00
|
|
|
type KV struct {
|
|
|
|
Key string
|
|
|
|
Value string
|
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
type HSDatabase struct {
|
2023-06-21 05:29:52 -04:00
|
|
|
db *gorm.DB
|
|
|
|
notifier *notifier.Notifier
|
2023-05-11 03:09:18 -04:00
|
|
|
|
2023-07-17 07:35:05 -04:00
|
|
|
mu sync.RWMutex
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
ipAllocationMutex sync.Mutex
|
|
|
|
|
2023-06-12 09:29:34 -04:00
|
|
|
ipPrefixes []netip.Prefix
|
|
|
|
baseDomain string
|
2023-05-11 03:09:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(kradalby): assemble this struct from toptions or something typed
|
|
|
|
// rather than arguments.
|
|
|
|
func NewHeadscaleDatabase(
|
|
|
|
dbType, connectionAddr string,
|
2023-06-12 09:29:34 -04:00
|
|
|
debug bool,
|
2023-06-21 05:29:52 -04:00
|
|
|
notifier *notifier.Notifier,
|
2023-05-11 03:09:18 -04:00
|
|
|
ipPrefixes []netip.Prefix,
|
|
|
|
baseDomain string,
|
|
|
|
) (*HSDatabase, error) {
|
|
|
|
dbConn, err := openDB(dbType, connectionAddr, debug)
|
2020-06-21 06:32:08 -04:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-07-04 15:40:46 -04:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
db := HSDatabase{
|
2023-06-21 05:29:52 -04:00
|
|
|
db: dbConn,
|
|
|
|
notifier: notifier,
|
2023-05-11 03:09:18 -04:00
|
|
|
|
2023-06-12 09:29:34 -04:00
|
|
|
ipPrefixes: ipPrefixes,
|
|
|
|
baseDomain: baseDomain,
|
2021-05-02 14:47:36 -04:00
|
|
|
}
|
2022-01-30 08:06:49 -05:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
log.Debug().Msgf("database %#v", dbConn)
|
2023-01-18 11:23:37 -05:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
if dbType == Postgres {
|
|
|
|
dbConn.Exec(`create extension if not exists "uuid-ossp";`)
|
|
|
|
}
|
|
|
|
|
|
|
|
_ = dbConn.Migrator().RenameTable("namespaces", "users")
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
// the big rename from Machine to Node
|
|
|
|
_ = dbConn.Migrator().RenameTable("machines", "nodes")
|
|
|
|
_ = dbConn.Migrator().RenameColumn(&types.Route{}, "machine_id", "node_id")
|
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
err = dbConn.AutoMigrate(types.User{})
|
2023-01-18 11:23:37 -05:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2023-01-18 11:23:37 -05:00
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
_ = dbConn.Migrator().RenameColumn(&types.Node{}, "namespace_id", "user_id")
|
2023-05-21 12:37:59 -04:00
|
|
|
_ = dbConn.Migrator().RenameColumn(&types.PreAuthKey{}, "namespace_id", "user_id")
|
2023-01-26 02:49:20 -05:00
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
_ = dbConn.Migrator().RenameColumn(&types.Node{}, "ip_address", "ip_addresses")
|
|
|
|
_ = dbConn.Migrator().RenameColumn(&types.Node{}, "name", "hostname")
|
2022-04-24 15:56:42 -04:00
|
|
|
|
|
|
|
// GivenName is used as the primary source of DNS names, make sure
|
|
|
|
// the field is populated and normalized if it was not when the
|
2023-09-24 07:42:05 -04:00
|
|
|
// node was registered.
|
|
|
|
_ = dbConn.Migrator().RenameColumn(&types.Node{}, "nickname", "given_name")
|
2022-01-30 08:06:49 -05:00
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
// If the MacNodehine table has a column for registered,
|
2022-02-28 13:05:03 -05:00
|
|
|
// find all occourences of "false" and drop them. Then
|
|
|
|
// remove the column.
|
2023-09-24 07:42:05 -04:00
|
|
|
if dbConn.Migrator().HasColumn(&types.Node{}, "registered") {
|
2022-02-28 13:05:03 -05:00
|
|
|
log.Info().
|
2023-09-24 07:42:05 -04:00
|
|
|
Msg(`Database has legacy "registered" column in node, removing...`)
|
2022-02-28 13:05:03 -05:00
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
nodes := types.Nodes{}
|
|
|
|
if err := dbConn.Not("registered").Find(&nodes).Error; err != nil {
|
2022-02-28 13:05:03 -05:00
|
|
|
log.Error().Err(err).Msg("Error accessing db")
|
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
for _, node := range nodes {
|
2022-02-28 13:05:03 -05:00
|
|
|
log.Info().
|
2023-09-24 07:42:05 -04:00
|
|
|
Str("node", node.Hostname).
|
|
|
|
Str("machine_key", node.MachineKey).
|
|
|
|
Msg("Deleting unregistered node")
|
|
|
|
if err := dbConn.Delete(&types.Node{}, node.ID).Error; err != nil {
|
2022-02-28 13:05:03 -05:00
|
|
|
log.Error().
|
|
|
|
Err(err).
|
2023-09-24 07:42:05 -04:00
|
|
|
Str("node", node.Hostname).
|
|
|
|
Str("machine_key", node.MachineKey).
|
|
|
|
Msg("Error deleting unregistered node")
|
2022-02-28 13:05:03 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
err := dbConn.Migrator().DropColumn(&types.Node{}, "registered")
|
2022-02-28 13:05:03 -05:00
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Error dropping registered column")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
err = dbConn.AutoMigrate(&types.Route{})
|
2022-11-23 13:50:30 -05:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2022-11-23 13:50:30 -05:00
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
if dbConn.Migrator().HasColumn(&types.Node{}, "enabled_routes") {
|
|
|
|
log.Info().Msgf("Database has legacy enabled_routes column in node, migrating...")
|
2022-11-23 13:50:30 -05:00
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
type NodeAux struct {
|
2022-11-23 13:50:30 -05:00
|
|
|
ID uint64
|
2023-05-21 12:37:59 -04:00
|
|
|
EnabledRoutes types.IPPrefixes
|
2022-11-23 13:50:30 -05:00
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
nodesAux := []NodeAux{}
|
|
|
|
err := dbConn.Table("nodes").Select("id, enabled_routes").Scan(&nodesAux).Error
|
2022-11-23 13:50:30 -05:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal().Err(err).Msg("Error accessing db")
|
|
|
|
}
|
2023-09-24 07:42:05 -04:00
|
|
|
for _, node := range nodesAux {
|
|
|
|
for _, prefix := range node.EnabledRoutes {
|
2022-11-23 13:50:30 -05:00
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Err(err).
|
|
|
|
Str("enabled_route", prefix.String()).
|
|
|
|
Msg("Error parsing enabled_route")
|
2022-11-25 10:29:45 -05:00
|
|
|
|
2022-11-23 13:50:30 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
err = dbConn.Preload("Node").
|
|
|
|
Where("node_id = ? AND prefix = ?", node.ID, types.IPPrefix(prefix)).
|
2023-05-21 12:37:59 -04:00
|
|
|
First(&types.Route{}).
|
2023-01-17 11:55:59 -05:00
|
|
|
Error
|
2022-11-23 13:50:30 -05:00
|
|
|
if err == nil {
|
|
|
|
log.Info().
|
|
|
|
Str("enabled_route", prefix.String()).
|
|
|
|
Msg("Route already migrated to new table, skipping")
|
2022-11-25 10:29:45 -05:00
|
|
|
|
2022-11-23 13:50:30 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
route := types.Route{
|
2023-09-24 07:42:05 -04:00
|
|
|
NodeID: node.ID,
|
2022-11-23 13:50:30 -05:00
|
|
|
Advertised: true,
|
|
|
|
Enabled: true,
|
2023-05-21 12:37:59 -04:00
|
|
|
Prefix: types.IPPrefix(prefix),
|
2022-11-23 13:50:30 -05:00
|
|
|
}
|
2023-05-11 03:09:18 -04:00
|
|
|
if err := dbConn.Create(&route).Error; err != nil {
|
2022-11-23 13:50:30 -05:00
|
|
|
log.Error().Err(err).Msg("Error creating route")
|
|
|
|
} else {
|
|
|
|
log.Info().
|
2023-09-24 07:42:05 -04:00
|
|
|
Uint64("node_id", route.NodeID).
|
2022-11-23 13:50:30 -05:00
|
|
|
Str("prefix", prefix.String()).
|
|
|
|
Msg("Route migrated")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
err = dbConn.Migrator().DropColumn(&types.Node{}, "enabled_routes")
|
2022-11-23 13:50:30 -05:00
|
|
|
if err != nil {
|
|
|
|
log.Error().Err(err).Msg("Error dropping enabled_routes column")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
err = dbConn.AutoMigrate(&types.Node{})
|
2021-06-24 09:44:19 -04:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2021-06-24 09:44:19 -04:00
|
|
|
}
|
2022-01-30 08:06:49 -05:00
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
if dbConn.Migrator().HasColumn(&types.Node{}, "given_name") {
|
|
|
|
nodes := types.Nodes{}
|
|
|
|
if err := dbConn.Find(&nodes).Error; err != nil {
|
2022-05-23 12:33:07 -04:00
|
|
|
log.Error().Err(err).Msg("Error accessing db")
|
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
for item, node := range nodes {
|
|
|
|
if node.GivenName == "" {
|
2023-06-12 09:29:34 -04:00
|
|
|
normalizedHostname, err := util.NormalizeToFQDNRulesConfigFromViper(
|
2023-09-24 07:42:05 -04:00
|
|
|
node.Hostname,
|
2022-05-23 12:33:07 -04:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
2023-09-24 07:42:05 -04:00
|
|
|
Str("hostname", node.Hostname).
|
2022-05-23 12:33:07 -04:00
|
|
|
Err(err).
|
2023-09-24 07:42:05 -04:00
|
|
|
Msg("Failed to normalize node hostname in DB migration")
|
2022-05-23 12:33:07 -04:00
|
|
|
}
|
|
|
|
|
2023-09-24 07:42:05 -04:00
|
|
|
err = db.RenameNode(nodes[item], normalizedHostname)
|
2022-05-23 12:33:07 -04:00
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
2023-09-24 07:42:05 -04:00
|
|
|
Str("hostname", node.Hostname).
|
2022-05-23 12:33:07 -04:00
|
|
|
Err(err).
|
2023-09-24 07:42:05 -04:00
|
|
|
Msg("Failed to save normalized node name in DB migration")
|
2022-05-23 12:33:07 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
err = dbConn.AutoMigrate(&KV{})
|
2021-06-24 09:44:19 -04:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2021-06-24 09:44:19 -04:00
|
|
|
}
|
2022-01-30 08:06:49 -05:00
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
err = dbConn.AutoMigrate(&types.PreAuthKey{})
|
2021-06-24 09:44:19 -04:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2021-06-24 09:44:19 -04:00
|
|
|
}
|
2020-06-21 06:32:08 -04:00
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
err = dbConn.AutoMigrate(&types.PreAuthKeyACLTag{})
|
2022-08-25 06:03:38 -04:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2022-08-25 06:03:38 -04:00
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
_ = dbConn.Migrator().DropTable("shared_machines")
|
2021-09-02 10:57:26 -04:00
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
err = dbConn.AutoMigrate(&types.APIKey{})
|
2022-01-25 17:11:05 -05:00
|
|
|
if err != nil {
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, err
|
2022-01-25 17:11:05 -05:00
|
|
|
}
|
|
|
|
|
2023-11-16 11:55:29 -05:00
|
|
|
// Ensure all keys have correct prefixes
|
|
|
|
// https://github.com/tailscale/tailscale/blob/main/types/key/node.go#L35
|
|
|
|
nodes := types.Nodes{}
|
|
|
|
if err := dbConn.Find(&nodes).Error; err != nil {
|
|
|
|
log.Error().Err(err).Msg("Error accessing db")
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, node := range nodes {
|
|
|
|
if !strings.HasPrefix(node.DiscoKey, "discokey:") {
|
|
|
|
node.DiscoKey = "discokey:" + node.DiscoKey
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.HasPrefix(node.NodeKey, "nodekey:") {
|
|
|
|
node.NodeKey = "nodekey:" + node.NodeKey
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.HasPrefix(node.MachineKey, "mkey:") {
|
|
|
|
node.MachineKey = "mkey:" + node.MachineKey
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
// TODO(kradalby): is this needed?
|
|
|
|
err = db.setValue("db_version", dbVersion)
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
return &db, err
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
func openDB(dbType, connectionAddr string, debug bool) (*gorm.DB, error) {
|
|
|
|
log.Debug().Str("type", dbType).Str("connection", connectionAddr).Msg("opening database")
|
2021-07-11 07:13:36 -04:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
var dbLogger logger.Interface
|
|
|
|
if debug {
|
|
|
|
dbLogger = logger.Default
|
2021-07-11 07:13:36 -04:00
|
|
|
} else {
|
2023-05-11 03:09:18 -04:00
|
|
|
dbLogger = logger.Default.LogMode(logger.Silent)
|
2021-07-11 07:13:36 -04:00
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
switch dbType {
|
2021-11-15 12:24:24 -05:00
|
|
|
case Sqlite:
|
2023-05-11 03:09:18 -04:00
|
|
|
db, err := gorm.Open(
|
|
|
|
sqlite.Open(connectionAddr+"?_synchronous=1&_journal_mode=WAL"),
|
2022-02-23 11:15:20 -05:00
|
|
|
&gorm.Config{
|
|
|
|
DisableForeignKeyConstraintWhenMigrating: true,
|
2023-05-11 03:09:18 -04:00
|
|
|
Logger: dbLogger,
|
2022-02-23 11:15:20 -05:00
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
db.Exec("PRAGMA foreign_keys=ON")
|
|
|
|
|
|
|
|
// The pure Go SQLite library does not handle locking in
|
|
|
|
// the same way as the C based one and we cant use the gorm
|
|
|
|
// connection pool as of 2022/02/23.
|
2022-02-22 14:04:52 -05:00
|
|
|
sqlDB, _ := db.DB()
|
2022-02-23 11:15:20 -05:00
|
|
|
sqlDB.SetMaxIdleConns(1)
|
2022-02-22 14:04:52 -05:00
|
|
|
sqlDB.SetMaxOpenConns(1)
|
2022-02-23 11:15:20 -05:00
|
|
|
sqlDB.SetConnMaxIdleTime(time.Hour)
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
return db, err
|
|
|
|
|
2021-11-15 12:24:24 -05:00
|
|
|
case Postgres:
|
2023-05-11 03:09:18 -04:00
|
|
|
return gorm.Open(postgres.Open(connectionAddr), &gorm.Config{
|
2021-06-24 17:05:26 -04:00
|
|
|
DisableForeignKeyConstraintWhenMigrating: true,
|
2023-05-11 03:09:18 -04:00
|
|
|
Logger: dbLogger,
|
2021-06-24 17:05:26 -04:00
|
|
|
})
|
2021-06-24 09:44:19 -04:00
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
return nil, fmt.Errorf(
|
|
|
|
"database of type %s is not supported: %w",
|
|
|
|
dbType,
|
|
|
|
errDatabaseNotSupported,
|
|
|
|
)
|
|
|
|
}
|
2021-07-11 07:13:36 -04:00
|
|
|
|
2021-11-13 03:39:04 -05:00
|
|
|
// getValue returns the value for the given key in KV.
|
2023-05-11 03:09:18 -04:00
|
|
|
func (hsdb *HSDatabase) getValue(key string) (string, error) {
|
2020-06-21 06:32:08 -04:00
|
|
|
var row KV
|
2023-05-11 03:09:18 -04:00
|
|
|
if result := hsdb.db.First(&row, "key = ?", key); errors.Is(
|
2021-11-13 03:36:45 -05:00
|
|
|
result.Error,
|
|
|
|
gorm.ErrRecordNotFound,
|
|
|
|
) {
|
2021-11-15 14:18:14 -05:00
|
|
|
return "", errValueNotFound
|
2020-06-21 06:32:08 -04:00
|
|
|
}
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2020-06-21 06:32:08 -04:00
|
|
|
return row.Value, nil
|
|
|
|
}
|
|
|
|
|
2021-11-13 03:39:04 -05:00
|
|
|
// setValue sets value for the given key in KV.
|
2023-05-11 03:09:18 -04:00
|
|
|
func (hsdb *HSDatabase) setValue(key string, value string) error {
|
2021-11-15 11:15:50 -05:00
|
|
|
keyValue := KV{
|
2020-06-21 06:32:08 -04:00
|
|
|
Key: key,
|
|
|
|
Value: value,
|
|
|
|
}
|
2021-07-04 15:40:46 -04:00
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
if _, err := hsdb.getValue(key); err == nil {
|
|
|
|
hsdb.db.Model(&keyValue).Where("key = ?", key).Update("value", value)
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2020-06-21 06:32:08 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
if err := hsdb.db.Create(keyValue).Error; err != nil {
|
2022-05-30 09:39:24 -04:00
|
|
|
return fmt.Errorf("failed to create key value pair in the database: %w", err)
|
|
|
|
}
|
2021-11-14 10:46:09 -05:00
|
|
|
|
2020-06-21 06:32:08 -04:00
|
|
|
return nil
|
|
|
|
}
|
2022-03-01 11:31:25 -05:00
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
func (hsdb *HSDatabase) PingDB(ctx context.Context) error {
|
2022-09-04 05:43:09 -04:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, time.Second)
|
2022-07-06 07:39:10 -04:00
|
|
|
defer cancel()
|
2023-05-11 03:09:18 -04:00
|
|
|
sqlDB, err := hsdb.db.DB()
|
2022-07-06 07:39:10 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-05-11 03:09:18 -04:00
|
|
|
return sqlDB.PingContext(ctx)
|
2022-07-06 07:39:10 -04:00
|
|
|
}
|
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
func (hsdb *HSDatabase) Close() error {
|
|
|
|
db, err := hsdb.db.DB()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2022-03-01 11:31:25 -05:00
|
|
|
}
|
|
|
|
|
2023-05-21 12:37:59 -04:00
|
|
|
return db.Close()
|
2022-03-01 11:31:25 -05:00
|
|
|
}
|