2019-03-07 11:31:36 +01:00
|
|
|
package oss
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/md5"
|
2021-10-18 06:32:57 +02:00
|
|
|
"encoding/hex"
|
2019-03-07 11:31:36 +01:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2020-02-18 10:36:57 +01:00
|
|
|
"log"
|
|
|
|
"time"
|
|
|
|
|
2019-03-07 11:31:36 +01:00
|
|
|
"github.com/aliyun/aliyun-oss-go-sdk/oss"
|
2019-04-11 01:11:10 +02:00
|
|
|
"github.com/aliyun/aliyun-tablestore-go-sdk/tablestore"
|
|
|
|
"github.com/hashicorp/go-multierror"
|
2019-03-07 11:31:36 +01:00
|
|
|
uuid "github.com/hashicorp/go-uuid"
|
2021-10-18 06:32:57 +02:00
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
2021-05-17 21:43:35 +02:00
|
|
|
"github.com/hashicorp/terraform/internal/states/remote"
|
|
|
|
"github.com/hashicorp/terraform/internal/states/statemgr"
|
2019-03-07 11:31:36 +01:00
|
|
|
)
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
const (
|
2020-02-18 18:47:15 +01:00
|
|
|
// Store the last saved serial in tablestore with this suffix for consistency checks.
|
2019-04-11 01:11:10 +02:00
|
|
|
stateIDSuffix = "-md5"
|
2020-02-18 18:47:15 +01:00
|
|
|
|
|
|
|
pkName = "LockID"
|
2019-04-11 01:11:10 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// The amount of time we will retry a state waiting for it to match the
|
|
|
|
// expected checksum.
|
|
|
|
consistencyRetryTimeout = 10 * time.Second
|
|
|
|
|
|
|
|
// delay when polling the state
|
|
|
|
consistencyRetryPollInterval = 2 * time.Second
|
|
|
|
)
|
|
|
|
|
|
|
|
// test hook called when checksums don't match
|
|
|
|
var testChecksumHook func()
|
|
|
|
|
2019-03-07 11:31:36 +01:00
|
|
|
type RemoteClient struct {
|
|
|
|
ossClient *oss.Client
|
2019-04-11 01:11:10 +02:00
|
|
|
otsClient *tablestore.TableStoreClient
|
2019-03-07 11:31:36 +01:00
|
|
|
bucketName string
|
|
|
|
stateFile string
|
|
|
|
lockFile string
|
|
|
|
serverSideEncryption bool
|
|
|
|
acl string
|
2019-04-11 01:11:10 +02:00
|
|
|
otsTable string
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RemoteClient) Get() (payload *remote.Payload, err error) {
|
2019-04-11 01:11:10 +02:00
|
|
|
deadline := time.Now().Add(consistencyRetryTimeout)
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
// If we have a checksum, and the returned payload doesn't match, we retry
|
|
|
|
// up until deadline.
|
|
|
|
for {
|
|
|
|
payload, err = c.getObj()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
// If the remote state was manually removed the payload will be nil,
|
|
|
|
// but if there's still a digest entry for that state we will still try
|
|
|
|
// to compare the MD5 below.
|
|
|
|
var digest []byte
|
|
|
|
if payload != nil {
|
|
|
|
digest = payload.MD5
|
|
|
|
}
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
// verify that this state is what we expect
|
|
|
|
if expected, err := c.getMD5(); err != nil {
|
|
|
|
log.Printf("[WARN] failed to fetch state md5: %s", err)
|
|
|
|
} else if len(expected) > 0 && !bytes.Equal(expected, digest) {
|
|
|
|
log.Printf("[WARN] state md5 mismatch: expected '%x', got '%x'", expected, digest)
|
|
|
|
|
|
|
|
if testChecksumHook != nil {
|
|
|
|
testChecksumHook()
|
|
|
|
}
|
|
|
|
|
|
|
|
if time.Now().Before(deadline) {
|
|
|
|
time.Sleep(consistencyRetryPollInterval)
|
|
|
|
log.Println("[INFO] retrying OSS RemoteClient.Get...")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, fmt.Errorf(errBadChecksumFmt, digest)
|
|
|
|
}
|
|
|
|
|
|
|
|
break
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
return payload, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RemoteClient) Put(data []byte) error {
|
2019-04-11 01:11:10 +02:00
|
|
|
bucket, err := c.ossClient.Bucket(c.bucketName)
|
|
|
|
if err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return fmt.Errorf("error getting bucket: %#v", err)
|
2019-04-11 01:11:10 +02:00
|
|
|
}
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
body := bytes.NewReader(data)
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
var options []oss.Option
|
|
|
|
if c.acl != "" {
|
|
|
|
options = append(options, oss.ACL(oss.ACLType(c.acl)))
|
|
|
|
}
|
|
|
|
options = append(options, oss.ContentType("application/json"))
|
|
|
|
if c.serverSideEncryption {
|
|
|
|
options = append(options, oss.ServerSideEncryption("AES256"))
|
|
|
|
}
|
|
|
|
options = append(options, oss.ContentLength(int64(len(data))))
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
if body != nil {
|
|
|
|
if err := bucket.PutObject(c.stateFile, body, options...); err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return fmt.Errorf("failed to upload state %s: %#v", c.stateFile, err)
|
2019-04-11 01:11:10 +02:00
|
|
|
}
|
|
|
|
}
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
sum := md5.Sum(data)
|
|
|
|
if err := c.putMD5(sum[:]); err != nil {
|
|
|
|
// if this errors out, we unfortunately have to error out altogether,
|
|
|
|
// since the next Get will inevitably fail.
|
2021-10-18 06:32:57 +02:00
|
|
|
return fmt.Errorf("failed to store state MD5: %s", err)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2019-04-11 01:11:10 +02:00
|
|
|
return nil
|
|
|
|
}
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
func (c *RemoteClient) Delete() error {
|
2019-03-07 11:31:36 +01:00
|
|
|
bucket, err := c.ossClient.Bucket(c.bucketName)
|
|
|
|
if err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return fmt.Errorf("error getting bucket %s: %#v", c.bucketName, err)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
log.Printf("[DEBUG] Deleting remote state from OSS: %#v", c.stateFile)
|
|
|
|
|
|
|
|
if err := bucket.DeleteObject(c.stateFile); err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return fmt.Errorf("error deleting state %s: %#v", c.stateFile, err)
|
2019-04-11 01:11:10 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := c.deleteMD5(); err != nil {
|
|
|
|
log.Printf("[WARN] Error deleting state MD5: %s", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-08-11 17:43:01 +02:00
|
|
|
func (c *RemoteClient) Lock(info *statemgr.LockInfo) (string, error) {
|
2019-04-11 01:11:10 +02:00
|
|
|
if c.otsTable == "" {
|
|
|
|
return "", nil
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2020-02-18 10:40:44 +01:00
|
|
|
info.Path = c.lockPath()
|
|
|
|
|
2019-03-07 11:31:36 +01:00
|
|
|
if info.ID == "" {
|
|
|
|
lockID, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
info.ID = lockID
|
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
putParams := &tablestore.PutRowChange{
|
|
|
|
TableName: c.otsTable,
|
|
|
|
PrimaryKey: &tablestore.PrimaryKey{
|
|
|
|
PrimaryKeys: []*tablestore.PrimaryKeyColumn{
|
|
|
|
{
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnName: pkName,
|
2020-02-18 14:45:06 +01:00
|
|
|
Value: c.lockPath(),
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Columns: []tablestore.AttributeColumn{
|
|
|
|
{
|
|
|
|
ColumnName: "Info",
|
|
|
|
Value: string(info.Marshal()),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Condition: &tablestore.RowCondition{
|
|
|
|
RowExistenceExpectation: tablestore.RowExistenceExpectation_EXPECT_NOT_EXIST,
|
|
|
|
},
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2019-04-11 01:11:10 +02:00
|
|
|
|
2020-02-18 14:45:06 +01:00
|
|
|
log.Printf("[DEBUG] Recording state lock in tablestore: %#v", putParams)
|
2019-04-11 01:11:10 +02:00
|
|
|
|
|
|
|
_, err := c.otsClient.PutRow(&tablestore.PutRowRequest{
|
|
|
|
PutRowChange: putParams,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("[WARN] Error storing state lock in tablestore: %#v", err)
|
|
|
|
lockInfo, infoErr := c.getLockInfo()
|
|
|
|
if infoErr != nil {
|
|
|
|
log.Printf("[WARN] Error getting lock info: %#v", err)
|
|
|
|
err = multierror.Append(err, infoErr)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2020-08-11 17:43:01 +02:00
|
|
|
lockErr := &statemgr.LockError{
|
2019-04-11 01:11:10 +02:00
|
|
|
Err: err,
|
|
|
|
Info: lockInfo,
|
|
|
|
}
|
|
|
|
log.Printf("[WARN] state lock error: %#v", lockErr)
|
|
|
|
return "", lockErr
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return info.ID, nil
|
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
func (c *RemoteClient) getMD5() ([]byte, error) {
|
|
|
|
if c.otsTable == "" {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
getParams := &tablestore.SingleRowQueryCriteria{
|
|
|
|
TableName: c.otsTable,
|
|
|
|
PrimaryKey: &tablestore.PrimaryKey{
|
|
|
|
PrimaryKeys: []*tablestore.PrimaryKeyColumn{
|
|
|
|
{
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnName: pkName,
|
2020-02-18 14:45:06 +01:00
|
|
|
Value: c.lockPath() + stateIDSuffix,
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnsToGet: []string{pkName, "Digest"},
|
2019-04-11 01:11:10 +02:00
|
|
|
MaxVersion: 1,
|
|
|
|
}
|
2019-03-07 11:31:36 +01:00
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
log.Printf("[DEBUG] Retrieving state serial in tablestore: %#v", getParams)
|
|
|
|
|
|
|
|
object, err := c.otsClient.GetRow(&tablestore.GetRowRequest{
|
|
|
|
SingleRowQueryCriteria: getParams,
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var val string
|
|
|
|
if v, ok := object.GetColumnMap().Columns["Digest"]; ok && len(v) > 0 {
|
|
|
|
val = v[0].Value.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
sum, err := hex.DecodeString(val)
|
|
|
|
if err != nil || len(sum) != md5.Size {
|
|
|
|
return nil, errors.New("invalid md5")
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// store the hash of the state to that clients can check for stale state files.
|
|
|
|
func (c *RemoteClient) putMD5(sum []byte) error {
|
|
|
|
if c.otsTable == "" {
|
2019-03-07 11:31:36 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
if len(sum) != md5.Size {
|
|
|
|
return errors.New("invalid payload md5")
|
|
|
|
}
|
|
|
|
|
|
|
|
putParams := &tablestore.PutRowChange{
|
|
|
|
TableName: c.otsTable,
|
|
|
|
PrimaryKey: &tablestore.PrimaryKey{
|
|
|
|
PrimaryKeys: []*tablestore.PrimaryKeyColumn{
|
|
|
|
{
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnName: pkName,
|
2020-02-18 14:45:06 +01:00
|
|
|
Value: c.lockPath() + stateIDSuffix,
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Columns: []tablestore.AttributeColumn{
|
|
|
|
{
|
|
|
|
ColumnName: "Digest",
|
|
|
|
Value: hex.EncodeToString(sum),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Condition: &tablestore.RowCondition{
|
2020-02-18 14:45:06 +01:00
|
|
|
RowExistenceExpectation: tablestore.RowExistenceExpectation_IGNORE,
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Recoring state serial in tablestore: %#v", putParams)
|
|
|
|
|
|
|
|
_, err := c.otsClient.PutRow(&tablestore.PutRowRequest{
|
|
|
|
PutRowChange: putParams,
|
|
|
|
})
|
|
|
|
|
2019-03-07 11:31:36 +01:00
|
|
|
if err != nil {
|
2019-04-11 01:11:10 +02:00
|
|
|
log.Printf("[WARN] failed to record state serial in tablestore: %s", err)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove the hash value for a deleted state
|
|
|
|
func (c *RemoteClient) deleteMD5() error {
|
|
|
|
if c.otsTable == "" {
|
|
|
|
return nil
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2019-04-11 01:11:10 +02:00
|
|
|
|
|
|
|
params := &tablestore.DeleteRowRequest{
|
|
|
|
DeleteRowChange: &tablestore.DeleteRowChange{
|
|
|
|
TableName: c.otsTable,
|
|
|
|
PrimaryKey: &tablestore.PrimaryKey{
|
|
|
|
PrimaryKeys: []*tablestore.PrimaryKeyColumn{
|
|
|
|
{
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnName: pkName,
|
2020-02-18 14:45:06 +01:00
|
|
|
Value: c.lockPath() + stateIDSuffix,
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Condition: &tablestore.RowCondition{
|
|
|
|
RowExistenceExpectation: tablestore.RowExistenceExpectation_EXPECT_EXIST,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Deleting state serial in tablestore: %#v", params)
|
|
|
|
|
|
|
|
if _, err := c.otsClient.DeleteRow(params); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-03-07 11:31:36 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-08-11 17:43:01 +02:00
|
|
|
func (c *RemoteClient) getLockInfo() (*statemgr.LockInfo, error) {
|
2019-04-11 01:11:10 +02:00
|
|
|
getParams := &tablestore.SingleRowQueryCriteria{
|
|
|
|
TableName: c.otsTable,
|
|
|
|
PrimaryKey: &tablestore.PrimaryKey{
|
|
|
|
PrimaryKeys: []*tablestore.PrimaryKeyColumn{
|
|
|
|
{
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnName: pkName,
|
2020-02-18 14:45:06 +01:00
|
|
|
Value: c.lockPath(),
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnsToGet: []string{pkName, "Info"},
|
2019-04-11 01:11:10 +02:00
|
|
|
MaxVersion: 1,
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Retrieving state lock info from tablestore: %#v", getParams)
|
|
|
|
|
|
|
|
object, err := c.otsClient.GetRow(&tablestore.GetRowRequest{
|
|
|
|
SingleRowQueryCriteria: getParams,
|
|
|
|
})
|
2019-03-07 11:31:36 +01:00
|
|
|
if err != nil {
|
2019-04-11 01:11:10 +02:00
|
|
|
return nil, err
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
var infoData string
|
|
|
|
if v, ok := object.GetColumnMap().Columns["Info"]; ok && len(v) > 0 {
|
|
|
|
infoData = v[0].Value.(string)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2020-08-11 17:43:01 +02:00
|
|
|
lockInfo := &statemgr.LockInfo{}
|
2019-04-11 01:11:10 +02:00
|
|
|
err = json.Unmarshal([]byte(infoData), lockInfo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2019-04-11 01:11:10 +02:00
|
|
|
return lockInfo, nil
|
|
|
|
}
|
|
|
|
func (c *RemoteClient) Unlock(id string) error {
|
|
|
|
if c.otsTable == "" {
|
2019-03-07 11:31:36 +01:00
|
|
|
return nil
|
|
|
|
}
|
2019-04-11 01:11:10 +02:00
|
|
|
|
2020-08-11 17:43:01 +02:00
|
|
|
lockErr := &statemgr.LockError{}
|
2019-04-11 01:11:10 +02:00
|
|
|
|
|
|
|
lockInfo, err := c.getLockInfo()
|
|
|
|
if err != nil {
|
|
|
|
lockErr.Err = fmt.Errorf("failed to retrieve lock info: %s", err)
|
|
|
|
return lockErr
|
|
|
|
}
|
|
|
|
lockErr.Info = lockInfo
|
|
|
|
|
|
|
|
if lockInfo.ID != id {
|
|
|
|
lockErr.Err = fmt.Errorf("lock id %q does not match existing lock", id)
|
|
|
|
return lockErr
|
|
|
|
}
|
|
|
|
params := &tablestore.DeleteRowRequest{
|
|
|
|
DeleteRowChange: &tablestore.DeleteRowChange{
|
|
|
|
TableName: c.otsTable,
|
|
|
|
PrimaryKey: &tablestore.PrimaryKey{
|
|
|
|
PrimaryKeys: []*tablestore.PrimaryKeyColumn{
|
|
|
|
{
|
2020-02-18 18:47:15 +01:00
|
|
|
ColumnName: pkName,
|
2020-02-18 14:45:06 +01:00
|
|
|
Value: c.lockPath(),
|
2019-04-11 01:11:10 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Condition: &tablestore.RowCondition{
|
|
|
|
RowExistenceExpectation: tablestore.RowExistenceExpectation_EXPECT_EXIST,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Deleting state lock from tablestore: %#v", params)
|
|
|
|
|
|
|
|
_, err = c.otsClient.DeleteRow(params)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
lockErr.Err = err
|
|
|
|
return lockErr
|
|
|
|
}
|
|
|
|
|
2019-03-07 11:31:36 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
func (c *RemoteClient) lockPath() string {
|
|
|
|
return fmt.Sprintf("%s/%s", c.bucketName, c.stateFile)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RemoteClient) getObj() (*remote.Payload, error) {
|
2019-03-07 11:31:36 +01:00
|
|
|
bucket, err := c.ossClient.Bucket(c.bucketName)
|
|
|
|
if err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return nil, fmt.Errorf("error getting bucket %s: %#v", c.bucketName, err)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
if exist, err := bucket.IsObjectExist(c.stateFile); err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return nil, fmt.Errorf("estimating object %s is exist got an error: %#v", c.stateFile, err)
|
2019-03-07 11:31:36 +01:00
|
|
|
} else if !exist {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var options []oss.Option
|
2019-04-11 01:11:10 +02:00
|
|
|
output, err := bucket.GetObject(c.stateFile, options...)
|
2019-03-07 11:31:36 +01:00
|
|
|
if err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return nil, fmt.Errorf("error getting object: %#v", err)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
|
|
if _, err := io.Copy(buf, output); err != nil {
|
2021-10-18 06:32:57 +02:00
|
|
|
return nil, fmt.Errorf("failed to read remote state: %s", err)
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
2019-04-11 01:11:10 +02:00
|
|
|
sum := md5.Sum(buf.Bytes())
|
|
|
|
payload := &remote.Payload{
|
|
|
|
Data: buf.Bytes(),
|
|
|
|
MD5: sum[:],
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
// If there was no data, then return nil
|
|
|
|
if len(payload.Data) == 0 {
|
2019-03-07 11:31:36 +01:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
return payload, nil
|
2019-03-07 11:31:36 +01:00
|
|
|
}
|
|
|
|
|
2019-04-11 01:11:10 +02:00
|
|
|
const errBadChecksumFmt = `state data in OSS does not have the expected content.
|
|
|
|
|
|
|
|
This may be caused by unusually long delays in OSS processing a previous state
|
|
|
|
update. Please wait for a minute or two and try again. If this problem
|
|
|
|
persists, and neither OSS nor TableStore are experiencing an outage, you may need
|
|
|
|
to manually verify the remote state and update the Digest value stored in the
|
2021-10-18 06:32:57 +02:00
|
|
|
TableStore table to the following value: %x`
|