Mozilla Sync Storage built with Rust.
- System Requirements
- Local Setup
- Logging
- Tests
- Creating Releases
- Troubleshooting
- Related Documentation
- cmake
- gcc
- golang
- libcurl4-openssl-dev
- libssl-dev
- make
- pkg-config
- Rust stable
- python 3.9+
- At least one database backend (depending on which one you'll be running)
- MySQL 5.7 (or compatible)
- libmysqlclient (
brew install mysql
on macOS,apt install libmysqlclient-dev
on Ubuntu,apt install libmariadb-dev-compat
on Debian)
- libmysqlclient (
- SQLite v3.24 or greater
- MySQL 5.7 (or compatible)
Depending on your OS, you may also need to install libgrpcdev
,
and protobuf-compiler-grpc
. Note: if the code complies cleanly,
but generates a Segmentation Fault within Sentry init, you probably
are missing libcurl4-openssl-dev
.
-
Follow the instructions below to use either MySQL, Spanner, or SQLite as your DB.
-
Now
cp config/local.example.toml config/local.toml
. Openconfig/local.toml
and make sure you have the desired settings configured. For a complete list of available configuration options, check out docs/config.md. -
To start a local server in debug mode, run either:
make run_mysql
if using MySQL or,make run_spanner
if using spanner or,make run_sqlite
if using SQLite.
The above starts the server in debug mode, using your new
local.toml
file for config options. Or, simplycargo run
with your own config options provided as env vars. -
Visit
http://localhost:8000/__heartbeat__
to make sure the server is running.
Durable sync needs only a valid mysql DSN in order to set up connections to a MySQL database. The database can be local and is usually specified with a DSN like:
mysql://_user_:_password_@_host_/_database_
To setup a fresh MySQL DB and user:
- First make sure that you have a MySQL server running, to do that run:
mysqld
- Then, run the following to launch a mysql shell
mysql -u root
- Finally, run each of the following SQL statements
CREATE USER "sample_user"@"localhost" IDENTIFIED BY "sample_password";
CREATE DATABASE syncstorage_rs;
CREATE DATABASE tokenserver_rs;
GRANT ALL PRIVILEGES on syncstorage_rs.* to sample_user@localhost;
GRANT ALL PRIVILEGES on tokenserver_rs.* to sample_user@localhost;
The correct way to authenticate with Spanner is by generating an OAuth token and pointing your local application server to the token. In order for this to work, your Google Cloud account must have the correct permissions; contact the Ops team to ensure the correct permissions are added to your account.
First, install the Google Cloud command-line interface by following the instructions for your operating system here. Next, run the following to log in with your Google account (this should be the Google account associated with your Mozilla LDAP credentials):
gcloud auth application-default login
The above command will prompt you to visit a webpage in your browser to complete the login process.
Once completed, ensure that a file called application_default_credentials.json
has been created in the appropriate directory
(on Linux, this directory is $HOME/.config/gcloud/
).
The Google Cloud SDK knows to check this location for your credentials,
so no further configuration is needed.
Accidents happen, and you may need to revoke the access of a set of credentials if they have been publicly leaked. To do this, run:
gcloud auth application-default revoke
This will revoke the access of the credentials currently stored in the application_default_credentials.json
file.
If the file in that location does not contain the leaked credentials,
you will need to copy the file containing the leaked credentials to that location and re-run the above command.
You can ensure that the leaked credentials are no longer active by attempting to connect to Spanner using the credentials.
If access has been revoked, your application server should print an error saying that the token has expired or has been revoked.
An alternative to authentication via application default credentials is authentication via a service account. Note that this method of authentication is not recommended. Service accounts are intended to be used by other applications or virtual machines and not people. See this article for more information.
Your system administrator will be able to tell you which service account keys have access to the Spanner instance to which you are trying to connect. Once you are given the email identifier of an active key, log into the Google Cloud Console Service Accounts page. Be sure to select the correct project.
- Locate the email identifier of the access key and pick the vertical dot menu at the far right of the row.
- Select "Create Key" from the pop-up menu.
- Select "JSON" from the Dialog Box.
A proper key file will be downloaded to your local directory.
It's important to safeguard that key file.
For this example, we're going to name the file
service-account.json
.
The proper key file is in JSON format.
An example file is provided below, with private information replaced by "...
"
{
"type": "service_account",
"project_id": "...",
"private_key_id": "...",
"private_key": "...",
"client_email": "...",
"client_id": "...",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
"client_x509_cert_url": "..."
}
Note that the name service-account.json
must be exactly correct to be ignored by .gitignore
.
To point to a GCP-hosted Spanner instance from your local machine, follow these steps:
- Authenticate via either of the two methods outlined above.
- Open
local.toml
and replacedatabase_url
with a link to your spanner instance. - Open the Makefile and ensure you've correctly set you
PATH_TO_GRPC_CERT
. make run_spanner
.- Visit
http://localhost:8000/__heartbeat__
to make sure the server is running.
Note, that unlike MySQL, there is no automatic migrations facility. Currently, the Spanner schema must be hand edited and modified.
Google supports an in-memory Spanner emulator, which can run on your local machine for development purposes.
You can install the emulator via the gcloud CLI or Docker by following the instructions
here.
Once the emulator is running, you'll need to create a new instance and a new database.
To create an instance using the REST API (exposed via port 9020 on the emulator),
we can use curl
:
curl --request POST \
"localhost:9020/v1/projects/$PROJECT_ID/instances" \
--header 'Accept: application/json' \
--header 'Content-Type: application/json' \
--data "{\"instance\":{\"config\":\"emulator-test-config\",\"nodeCount\":1,\"displayName\":\"Test Instance\"},\"instanceId\":\"$INSTANCE_ID\"}"
Note that you may set PROJECT_ID
and INSTANCE_ID
to your liking.
To create a new database on this instance, we'll use a similar HTTP request,
but we'll need to include information about the database schema.
Since we don't have migrations for Spanner, we keep an up-to-date schema in src/db/spanner/schema.ddl
.
The jq
utility allows us to parse this file for use in the JSON body of an HTTP POST request:
DDL_STATEMENTS=$(
grep -v ^-- schema.ddl \
| sed -n 's/ \+/ /gp' \
| tr -d '\n' \
| sed 's/\(.*\);/\1/' \
| jq -R -s -c 'split(";")'
)
Finally, to create the database:
curl -sS --request POST \
"localhost:9020/v1/projects/$PROJECT_ID/instances/$INSTANCE_ID/databases" \
--header 'Accept: application/json' \
--header 'Content-Type: application/json' \
--data "{\"createStatement\":\"CREATE DATABASE \`$DATABASE_ID\`\",\"extraStatements\":$DDL_STATEMENTS}"
Note that, again, you may set DATABASE_ID
to your liking.
Make sure that the database_url
config variable reflects your choice of project name,
instance name, and database name
(i.e. it should be of the format spanner://projects/<your project ID here>/instances/<your instance ID here>/databases/<your database ID here>
).
To run an application server that points to the local Spanner emulator:
SYNC_SYNCSTORAGE__SPANNER_EMULATOR_HOST=localhost:9010 make run_spanner
Setting up the server with SQLite only requires a path to the database file, which will be created automatically:
One for the syncserver data
sqlite://<path>/syncdb.sqlite
And one for the tokenserver data
sqlite://<path>/tokendb.sqlite
Note that after database initialisation you will still need to run two SQL insert on the tokenserver database to announce the presence of your syncserver to the clients.
-- Create a new service record
INSERT INTO `services` (`id`, `service`, `pattern`)
VALUES ('1', 'sync-1.5', '{node}/1.5/{uid}');
-- Create a new service node record. Set the node field to the path of your
-- syncserver.
INSERT INTO `nodes` (`id`, `service`, `node`, `available`, `current_load`, `capacity`, `downed`, `backoff`)
VALUES ('1', '1', 'http://localhost:8000', '1', '0', '1', '0', '0');
This requires access to Google Cloud Rust (raw) crate.
Please note that due to interdependencies,
you will need to ensure that grpcio
and protobuf
match the version used by google-cloud-rust-raw
.
-
Make sure you have Docker installed locally.
-
Copy the contents of mozilla-rust-sdk into top level root dir here.
-
Comment out the
image
value undersyncserver
in either docker-compose.mysql.yml or docker-compose.spanner.yml (depending on which database backend you want to run), and add this instead:build: context: .
-
If you are using MySQL, adjust the MySQL db credentials in docker-compose.mysql.yml to match your local setup.
-
make docker_start_mysql
ormake docker_start_spanner
- You can verify it's working by visiting localhost:8000/__heartbeat__
This will walk you through the steps to connect this project to your local copy of Firefox.
-
Follow the steps outlined above for running this project using MySQL or SQLite.
-
Setup a local copy of syncserver, with a few special changes to syncserver.ini; make sure that you're using the following values (in addition to all of the other defaults):
[server:main] port = 5000 [syncserver] public_url = http://localhost:5000/ # This value needs to match your "master_secret" for syncstorage-rs! secret = INSERT_SECRET_KEY_HERE [tokenserver] node_url = http://localhost:8000 sqluri = pymysql://sample_user:[email protected]/syncstorage_rs [endpoints] sync-1.5 = "http://localhost:8000/1.5/1"
-
In Firefox, go to
about:config
. Changeidentity.sync.tokenserver.uri
tohttp://localhost:5000/1.0/sync/1.5
. -
Restart Firefox. Now, try syncing. You should see new BSOs in your local MySQL instance.
- If you want to connect to the existing
Sentry project for local development,
login to Sentry, and go to the page with
api keys.
Copy the
DSN
value. - Comment out the
human_logs
line in yourconfig/local.toml
file. - You can force an error to appear in Sentry by adding a
panic!
into main.rs, just before the finalOk(())
. - Now,
SENTRY_DSN={INSERT_DSN_FROM_STEP_1_HERE} make run
. - You may need to stop the local server after it hits the panic! before errors will appear in Sentry.
We use env_logger: set the RUST_LOG
env var.
make test
- open the Makefile to adjust your SYNC_SYNCSTORAGE__DATABASE_URL
as needed.
In some cases, it is useful to inspect the mysql state of a failed test. By default, we use the diesel test_transaction functionality to ensure test data is not committed to the database. Therefore, there is an environment variable which can be used to turn off test_transaction.
SYNC_SYNCSTORAGE__DATABASE_USE_TEST_TRANSACTIONS=false cargo test [testname]
Note that you will almost certainly want to pass a single test name. When running the entire test suite, data from previous tests will cause future tests to fail.
To reset the database state between test runs, drop and recreate the database in the mysql client:
drop database syncstorage_rs; create database syncstorage_rs; use syncstorage_rs;
Functional tests live in server-syncstorage and can be run against a local server, e.g.:
-
If you haven't already followed the instructions here to get all the dependencies for the server-syncstorage repo, you should start there.
-
Install (Python) server-syncstorage:
$ git clone https://github.com/mozilla-services/server-syncstorage/ $ cd server-syncstorage $ make build
-
Run an instance of syncstorage-rs (
cargo run
in this repo). -
To run all tests:
$ ./local/bin/python syncstorage/tests/functional/test_storage.py http://localhost:8000#
- Individual tests can be specified via the
SYNC_TEST_PREFIX
env var:
$ SYNC_TEST_PREFIX=test_get_collection
./local/bin/python syncstorage/tests/functional/test_storage.py http://localhost:8000#
- Switch to master branch of syncstorage-rs
git pull
to ensure that the local copy is up-to-date.git pull origin master
to make sure that you've incorporated any changes to the master branch.git diff origin/master
to ensure that there are no local staged or uncommited changes.- Bump the version number in Cargo.toml
(this new version number will be designated as
<version>
in this checklist) - create a git branch for the new version
git checkout -b release/<version>
cargo build --release
- Build with the release profile release mode.clog -C CHANGELOG.md
- Generate release notes. We're using clog for release notes. Add a-p
,-m
or-M
flag to denote major/minor/patch version, ieclog -C CHANGELOG.md -p
.- Review the
CHANGELOG.md
file and ensure all relevant changes since the last tag are included. - Create a new release in Sentry:
VERSION={release-version-here} bash scripts/sentry-release.sh
. If you're doing this for the first time, checkout the tips below for troubleshooting sentry cli access. git commit -am "chore: tag <version>"
to commit the new version and changesgit tag -s -m "chore: tag <version>" <version>
to create a signed tag of the current HEAD commit for release.git push origin release/<version>
to push the commits to a new origin release branchgit push --tags origin release/<version>
to push the tags to the release branch.- Submit a Pull Request (PR) on github to merge the release branch to master.
- Go to the GitHub release, you should see the new tag with no release information.
- Click the
Draft a new release
button. - Enter the <version> number for
Tag version
. - Copy and paste the most recent change set from
CHANGELOG.md
into the release description, omitting the top 2 lines (the name and version) - Once your PR merges, click [Publish Release] on the GitHub release page.
Sync server is automatically deployed to STAGE, however QA may need to be notified if testing is required. Once QA signs off, then a bug should be filed to promote the server to PRODUCTION.
-
rm Cargo.lock; cargo clean;
- Try this if you're having problems compiling. -
Some versions of OpenSSL 1.1.1 can conflict with grpcio's built in BoringSSL. These errors can cause syncstorage to fail to run or compile. If you see a problem related to
libssl
you may need to specify thecargo
option--features grpcio/openssl
to force grpcio to use OpenSSL.
- If you're having trouble working with Sentry to create releases,
try authenticating using their self hosted server option that's outlined
here Ie,
sentry-cli --url https://selfhosted.url.com/ login
. It's also recommended to create a.sentryclirc
config file. See this example for the config values you'll need.