mirror of
https://github.com/grafana/grafana.git
synced 2024-11-25 10:20:29 -06:00
388 lines
12 KiB
Go
388 lines
12 KiB
Go
package mssql
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/url"
|
|
"reflect"
|
|
"regexp"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/grafana/grafana-azure-sdk-go/azcredentials"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend/datasource"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend/instancemgmt"
|
|
sdkproxy "github.com/grafana/grafana-plugin-sdk-go/backend/proxy"
|
|
"github.com/grafana/grafana-plugin-sdk-go/data"
|
|
"github.com/grafana/grafana-plugin-sdk-go/data/sqlutil"
|
|
mssql "github.com/microsoft/go-mssqldb"
|
|
_ "github.com/microsoft/go-mssqldb/azuread"
|
|
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend/log"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/grafana/grafana/pkg/tsdb/mssql/utils"
|
|
"github.com/grafana/grafana/pkg/tsdb/sqleng"
|
|
"github.com/grafana/grafana/pkg/tsdb/sqleng/proxyutil"
|
|
"github.com/grafana/grafana/pkg/util"
|
|
)
|
|
|
|
type Service struct {
|
|
im instancemgmt.InstanceManager
|
|
logger log.Logger
|
|
}
|
|
|
|
const (
|
|
azureAuthentication = "Azure AD Authentication"
|
|
windowsAuthentication = "Windows Authentication"
|
|
sqlServerAuthentication = "SQL Server Authentication"
|
|
)
|
|
|
|
func ProvideService(cfg *setting.Cfg) *Service {
|
|
logger := backend.NewLoggerWith("logger", "tsdb.mssql")
|
|
return &Service{
|
|
im: datasource.NewInstanceManager(newInstanceSettings(cfg, logger)),
|
|
logger: logger,
|
|
}
|
|
}
|
|
|
|
func (s *Service) getDataSourceHandler(ctx context.Context, pluginCtx backend.PluginContext) (*sqleng.DataSourceHandler, error) {
|
|
i, err := s.im.Get(ctx, pluginCtx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
instance := i.(*sqleng.DataSourceHandler)
|
|
return instance, nil
|
|
}
|
|
|
|
func (s *Service) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
|
dsHandler, err := s.getDataSourceHandler(ctx, req.PluginContext)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return dsHandler.QueryData(ctx, req)
|
|
}
|
|
|
|
func newInstanceSettings(cfg *setting.Cfg, logger log.Logger) datasource.InstanceFactoryFunc {
|
|
return func(_ context.Context, settings backend.DataSourceInstanceSettings) (instancemgmt.Instance, error) {
|
|
jsonData := sqleng.JsonData{
|
|
MaxOpenConns: cfg.SqlDatasourceMaxOpenConnsDefault,
|
|
MaxIdleConns: cfg.SqlDatasourceMaxIdleConnsDefault,
|
|
ConnMaxLifetime: cfg.SqlDatasourceMaxConnLifetimeDefault,
|
|
Encrypt: "false",
|
|
ConnectionTimeout: 0,
|
|
SecureDSProxy: false,
|
|
}
|
|
azureCredentials, err := utils.GetAzureCredentials(settings)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error reading azure credentials")
|
|
}
|
|
err = json.Unmarshal(settings.JSONData, &jsonData)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error reading settings: %w", err)
|
|
}
|
|
|
|
database := jsonData.Database
|
|
if database == "" {
|
|
database = settings.Database
|
|
}
|
|
|
|
dsInfo := sqleng.DataSourceInfo{
|
|
JsonData: jsonData,
|
|
URL: settings.URL,
|
|
User: settings.User,
|
|
Database: database,
|
|
ID: settings.ID,
|
|
Updated: settings.Updated,
|
|
UID: settings.UID,
|
|
DecryptedSecureJSONData: settings.DecryptedSecureJSONData,
|
|
}
|
|
cnnstr, err := generateConnectionString(dsInfo, cfg, azureCredentials, logger)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if cfg.Env == setting.Dev {
|
|
logger.Debug("GetEngine", "connection", cnnstr)
|
|
}
|
|
driverName := "mssql"
|
|
if jsonData.AuthenticationType == azureAuthentication {
|
|
driverName = "azuresql"
|
|
}
|
|
|
|
// register a new proxy driver if the secure socks proxy is enabled
|
|
proxyOpts := proxyutil.GetSQLProxyOptions(cfg.SecureSocksDSProxy, dsInfo)
|
|
if sdkproxy.New(proxyOpts).SecureSocksProxyEnabled() {
|
|
URL, err := ParseURL(dsInfo.URL, logger)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
driverName, err = createMSSQLProxyDriver(cnnstr, URL.Hostname(), proxyOpts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
config := sqleng.DataPluginConfiguration{
|
|
DSInfo: dsInfo,
|
|
MetricColumnTypes: []string{"VARCHAR", "CHAR", "NVARCHAR", "NCHAR"},
|
|
RowLimit: cfg.DataProxyRowLimit,
|
|
}
|
|
|
|
queryResultTransformer := mssqlQueryResultTransformer{
|
|
userError: cfg.UserFacingDefaultError,
|
|
}
|
|
|
|
db, err := sql.Open(driverName, cnnstr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
db.SetMaxOpenConns(config.DSInfo.JsonData.MaxOpenConns)
|
|
db.SetMaxIdleConns(config.DSInfo.JsonData.MaxIdleConns)
|
|
db.SetConnMaxLifetime(time.Duration(config.DSInfo.JsonData.ConnMaxLifetime) * time.Second)
|
|
|
|
return sqleng.NewQueryDataHandler(cfg, db, config, &queryResultTransformer, newMssqlMacroEngine(), logger)
|
|
}
|
|
}
|
|
|
|
// ParseURL is called also from pkg/api/datasource/validation.go,
|
|
// which uses a different logging interface,
|
|
// so we have a special minimal interface that is fulfilled by
|
|
// both places.
|
|
type DebugOnlyLogger interface {
|
|
Debug(msg string, args ...interface{})
|
|
}
|
|
|
|
// ParseURL tries to parse an MSSQL URL string into a URL object.
|
|
func ParseURL(u string, logger DebugOnlyLogger) (*url.URL, error) {
|
|
logger.Debug("Parsing MSSQL URL", "url", u)
|
|
|
|
// Recognize ODBC connection strings like host\instance:1234
|
|
reODBC := regexp.MustCompile(`^[^\\:]+(?:\\[^:]+)?(?::\d+)?(?:;.+)?$`)
|
|
var host string
|
|
switch {
|
|
case reODBC.MatchString(u):
|
|
logger.Debug("Recognized as ODBC URL format", "url", u)
|
|
host = u
|
|
default:
|
|
logger.Debug("Couldn't recognize as valid MSSQL URL", "url", u)
|
|
return nil, fmt.Errorf("unrecognized MSSQL URL format: %q", u)
|
|
}
|
|
return &url.URL{
|
|
Scheme: "sqlserver",
|
|
Host: host,
|
|
}, nil
|
|
}
|
|
|
|
func generateConnectionString(dsInfo sqleng.DataSourceInfo, cfg *setting.Cfg, azureCredentials azcredentials.AzureCredentials, logger log.Logger) (string, error) {
|
|
const dfltPort = "0"
|
|
var addr util.NetworkAddress
|
|
if dsInfo.URL != "" {
|
|
u, err := ParseURL(dsInfo.URL, logger)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
addr, err = util.SplitHostPortDefault(u.Host, "localhost", dfltPort)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
} else {
|
|
addr = util.NetworkAddress{
|
|
Host: "localhost",
|
|
Port: dfltPort,
|
|
}
|
|
}
|
|
|
|
args := []any{
|
|
"url", dsInfo.URL, "host", addr.Host,
|
|
}
|
|
if addr.Port != "0" {
|
|
args = append(args, "port", addr.Port)
|
|
}
|
|
logger.Debug("Generating connection string", args...)
|
|
|
|
encrypt := dsInfo.JsonData.Encrypt
|
|
tlsSkipVerify := dsInfo.JsonData.TlsSkipVerify
|
|
hostNameInCertificate := dsInfo.JsonData.Servername
|
|
certificate := dsInfo.JsonData.RootCertFile
|
|
connStr := fmt.Sprintf("server=%s;database=%s;",
|
|
addr.Host,
|
|
dsInfo.Database,
|
|
)
|
|
|
|
switch dsInfo.JsonData.AuthenticationType {
|
|
case azureAuthentication:
|
|
azureCredentialDSNFragment, err := getAzureCredentialDSNFragment(azureCredentials, cfg)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
connStr += azureCredentialDSNFragment
|
|
case windowsAuthentication:
|
|
// No user id or password. We're using windows single sign on.
|
|
default:
|
|
connStr += fmt.Sprintf("user id=%s;password=%s;", dsInfo.User, dsInfo.DecryptedSecureJSONData["password"])
|
|
}
|
|
|
|
// Port number 0 means to determine the port automatically, so we can let the driver choose
|
|
if addr.Port != "0" {
|
|
connStr += fmt.Sprintf("port=%s;", addr.Port)
|
|
}
|
|
if encrypt == "true" {
|
|
connStr += fmt.Sprintf("encrypt=%s;TrustServerCertificate=%t;", encrypt, tlsSkipVerify)
|
|
if hostNameInCertificate != "" {
|
|
connStr += fmt.Sprintf("hostNameInCertificate=%s;", hostNameInCertificate)
|
|
}
|
|
|
|
if certificate != "" {
|
|
connStr += fmt.Sprintf("certificate=%s;", certificate)
|
|
}
|
|
} else if encrypt == "disable" {
|
|
connStr += fmt.Sprintf("encrypt=%s;", dsInfo.JsonData.Encrypt)
|
|
}
|
|
|
|
if dsInfo.JsonData.ConnectionTimeout != 0 {
|
|
connStr += fmt.Sprintf("connection timeout=%d;", dsInfo.JsonData.ConnectionTimeout)
|
|
}
|
|
|
|
return connStr, nil
|
|
}
|
|
|
|
func getAzureCredentialDSNFragment(azureCredentials azcredentials.AzureCredentials, cfg *setting.Cfg) (string, error) {
|
|
connStr := ""
|
|
switch c := azureCredentials.(type) {
|
|
case *azcredentials.AzureManagedIdentityCredentials:
|
|
if cfg.Azure.ManagedIdentityClientId != "" {
|
|
connStr += fmt.Sprintf("user id=%s;", cfg.Azure.ManagedIdentityClientId)
|
|
}
|
|
connStr += fmt.Sprintf("fedauth=%s;",
|
|
"ActiveDirectoryManagedIdentity")
|
|
case *azcredentials.AzureClientSecretCredentials:
|
|
connStr += fmt.Sprintf("user id=%s@%s;password=%s;fedauth=%s;",
|
|
c.ClientId,
|
|
c.TenantId,
|
|
c.ClientSecret,
|
|
"ActiveDirectoryApplication",
|
|
)
|
|
default:
|
|
return "", fmt.Errorf("unsupported azure authentication type")
|
|
}
|
|
return connStr, nil
|
|
}
|
|
|
|
type mssqlQueryResultTransformer struct {
|
|
userError string
|
|
}
|
|
|
|
func (t *mssqlQueryResultTransformer) TransformQueryError(logger log.Logger, err error) error {
|
|
// go-mssql overrides source error, so we currently match on string
|
|
// ref https://github.com/denisenkom/go-mssqldb/blob/045585d74f9069afe2e115b6235eb043c8047043/tds.go#L904
|
|
if strings.HasPrefix(strings.ToLower(err.Error()), "unable to open tcp connection with host") {
|
|
logger.Error("Query error", "error", err)
|
|
return sqleng.ErrConnectionFailed.Errorf("failed to connect to server - %s", t.userError)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// CheckHealth pings the connected SQL database
|
|
func (s *Service) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
|
dsHandler, err := s.getDataSourceHandler(ctx, req.PluginContext)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = dsHandler.Ping()
|
|
|
|
if err != nil {
|
|
return &backend.CheckHealthResult{Status: backend.HealthStatusError, Message: dsHandler.TransformQueryError(s.logger, err).Error()}, nil
|
|
}
|
|
|
|
return &backend.CheckHealthResult{Status: backend.HealthStatusOk, Message: "Database Connection OK"}, nil
|
|
}
|
|
|
|
func (t *mssqlQueryResultTransformer) GetConverterList() []sqlutil.StringConverter {
|
|
return []sqlutil.StringConverter{
|
|
{
|
|
Name: "handle MONEY",
|
|
InputScanKind: reflect.Slice,
|
|
InputTypeName: "MONEY",
|
|
ConversionFunc: func(in *string) (*string, error) { return in, nil },
|
|
Replacer: &sqlutil.StringFieldReplacer{
|
|
OutputFieldType: data.FieldTypeNullableFloat64,
|
|
ReplaceFunc: func(in *string) (any, error) {
|
|
if in == nil {
|
|
return nil, nil
|
|
}
|
|
v, err := strconv.ParseFloat(*in, 64)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &v, nil
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "handle SMALLMONEY",
|
|
InputScanKind: reflect.Slice,
|
|
InputTypeName: "SMALLMONEY",
|
|
ConversionFunc: func(in *string) (*string, error) { return in, nil },
|
|
Replacer: &sqlutil.StringFieldReplacer{
|
|
OutputFieldType: data.FieldTypeNullableFloat64,
|
|
ReplaceFunc: func(in *string) (any, error) {
|
|
if in == nil {
|
|
return nil, nil
|
|
}
|
|
v, err := strconv.ParseFloat(*in, 64)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &v, nil
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "handle DECIMAL",
|
|
InputScanKind: reflect.Slice,
|
|
InputTypeName: "DECIMAL",
|
|
ConversionFunc: func(in *string) (*string, error) { return in, nil },
|
|
Replacer: &sqlutil.StringFieldReplacer{
|
|
OutputFieldType: data.FieldTypeNullableFloat64,
|
|
ReplaceFunc: func(in *string) (any, error) {
|
|
if in == nil {
|
|
return nil, nil
|
|
}
|
|
v, err := strconv.ParseFloat(*in, 64)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &v, nil
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "handle UNIQUEIDENTIFIER",
|
|
InputScanKind: reflect.Slice,
|
|
InputTypeName: "UNIQUEIDENTIFIER",
|
|
ConversionFunc: func(in *string) (*string, error) { return in, nil },
|
|
Replacer: &sqlutil.StringFieldReplacer{
|
|
OutputFieldType: data.FieldTypeNullableString,
|
|
ReplaceFunc: func(in *string) (any, error) {
|
|
if in == nil {
|
|
return nil, nil
|
|
}
|
|
uuid := &mssql.UniqueIdentifier{}
|
|
if err := uuid.Scan([]byte(*in)); err != nil {
|
|
return nil, err
|
|
}
|
|
v := uuid.String()
|
|
return &v, nil
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|