Backup/Restore Managed Instance (#1428)

* Enabled backup to and restore from URL

* Created RPC, but when process tries to load Microsoft.Azure.Storage.Blob.dll, it crashes

* Added create shared access token

* Code refactor

* Minor changes

* Changed RPC path

* Moved createSas RPC to the newly created BlobService, fixed PR comments

* Added sas expiration date parameter to the RPC

* Added copyright headers

* Removed ConnectionInstance property from BlobService

* Removed unhelpful comment

* Removed unused using statements

* Changed copy/paste comments

* Disposable objects fix

* Small formatting fix

* Changed backup to/restore from url supported device types

* Added backup to url integration test

* Created restore integration test. Test are now getting azure blob params from env variables instead of file.

* Culture invariant epiration date param, fixed comment, and typo

* Updated headers

* PR comments fix

* Changed supported device type logic

* string localization fix

* String formatting fix

* build failure fix

* Typo

* Updated supported restore device types
This commit is contained in:
Nemanja Milovančević
2022-04-20 23:01:13 +02:00
committed by GitHub
parent 35e1782a3f
commit 881c335cdf
21 changed files with 828 additions and 7 deletions

View File

@@ -40,5 +40,6 @@
<PackageReference Update="xunit.runner.visualstudio" Version="2.4.1" /> <PackageReference Update="xunit.runner.visualstudio" Version="2.4.1" />
<PackageReference Update="Microsoft.NET.Test.Sdk" Version="16.6.1" /> <PackageReference Update="Microsoft.NET.Test.Sdk" Version="16.6.1" />
<PackageReference Update="Microsoft.SqlServer.TransactSql.ScriptDom.NRT" Version="1.2.10202.1" /> <PackageReference Update="Microsoft.SqlServer.TransactSql.ScriptDom.NRT" Version="1.2.10202.1" />
<PackageReference Update="Azure.Storage.Blobs" Version="12.10.0" />
</ItemGroup> </ItemGroup>
</Project> </Project>

View File

@@ -0,0 +1,81 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using System;
using System.Threading.Tasks;
using Microsoft.Data.SqlClient;
using Microsoft.SqlServer.Management.Common;
using Microsoft.SqlServer.Management.Smo;
using Microsoft.SqlTools.Hosting.Protocol;
using Microsoft.SqlTools.ServiceLayer.AzureBlob.Contracts;
using Microsoft.SqlTools.ServiceLayer.Connection;
namespace Microsoft.SqlTools.ServiceLayer.AzureBlob
{
public class BlobService
{
private static readonly Lazy<BlobService> instance = new Lazy<BlobService>(() => new BlobService());
/// <summary>
/// Default, parameterless constructor.
/// </summary>
internal BlobService()
{
}
/// <summary>
/// Gets the singleton instance object
/// </summary>
public static BlobService Instance
{
get { return instance.Value; }
}
public void InitializeService(IProtocolEndpoint serviceHost)
{
serviceHost.SetRequestHandler(CreateSasRequest.Type, HandleCreateSasRequest);
}
internal async Task HandleCreateSasRequest(
CreateSasParams optionsParams,
RequestContext<CreateSasResponse> requestContext)
{
try
{
ConnectionInfo connInfo;
ConnectionService.Instance.TryFindConnection(
optionsParams.OwnerUri,
out connInfo);
var response = new CreateSasResponse();
if (connInfo == null)
{
await requestContext.SendError(SR.ConnectionServiceListDbErrorNotConnected(optionsParams.OwnerUri));
return;
}
if (connInfo.IsCloud)
{
await requestContext.SendError(SR.NotSupportedCloudCreateSas);
return;
}
using (SqlConnection sqlConn = ConnectionService.OpenSqlConnection(connInfo, "AzureBlob"))
{
// Connection gets disconnected when backup is done
ServerConnection serverConnection = new ServerConnection(sqlConn);
Server sqlServer = new Server(serverConnection);
SharedAccessSignatureCreator sharedAccessSignatureCreator = new SharedAccessSignatureCreator(sqlServer);
string sharedAccessSignature = sharedAccessSignatureCreator.CreateSqlSASCredential(optionsParams.StorageAccountName, optionsParams.BlobContainerKey, optionsParams.BlobContainerUri, optionsParams.ExpirationDate);
response.SharedAccessSignature = sharedAccessSignature;
await requestContext.SendResult(response);
}
}
catch (Exception ex)
{
await requestContext.SendError(ex);
}
}
}
}

View File

@@ -0,0 +1,37 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
namespace Microsoft.SqlTools.ServiceLayer.AzureBlob.Contracts
{
public static class BlobSasResource
{
/*
* Specify "c" if the shared resource is a blob container.
* This grants access to the content and metadata of any blob in the container,
* and to the list of blobs in the container.
*/
public const string BLOB_CONTAINER = "c";
/*
* Specify "b" if the shared resource is a blob.
* This grants access to the content and metadata of the blob.
*/
public const string BLOB = "b";
/*
* Beginning in version 2018-11-09, specify "bs" if the shared resource is a blob snapshot.
* This grants access to the content and metadata of the specific snapshot,
* but not the corresponding root blob.
*/
public const string BLOB_SNAPSHOT = "bs";
/*
* Beginning in version 2019-12-12, specify "bv" if the shared resource is a blob version.
* This grants access to the content and metadata of the specific version,
* but not the corresponding root blob.
*/
public const string BLOB_VERSION = "bv";
}
}

View File

@@ -0,0 +1,55 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using Microsoft.SqlTools.Hosting.Protocol.Contracts;
namespace Microsoft.SqlTools.ServiceLayer.AzureBlob.Contracts
{
/// <summary>
/// Parameters passed for creating shared access signature
/// </summary>
public class CreateSasParams
{
/// <summary>
/// Connection URI
/// </summary>
public string OwnerUri { get; set; }
/// <summary>
/// Blob container URI
/// </summary>
public string BlobContainerUri { get; set; }
/// <summary>
/// Blob container key
/// </summary>
public string BlobContainerKey { get; set; }
/// <summary>
/// Storage account name
/// </summary>
public string StorageAccountName { get; set; }
/// <summary>
/// Shared access signature expiration date
/// </summary>
public string ExpirationDate { get; set; }
}
/// <summary>
/// Response class for creating shared access signature
/// </summary>
public class CreateSasResponse
{
public string SharedAccessSignature { get; set; }
}
/// <summary>
/// Request class for creating shared access signature
/// </summary>
public class CreateSasRequest
{
public static readonly
RequestType<CreateSasParams, CreateSasResponse> Type =
RequestType<CreateSasParams, CreateSasResponse>.Create("blob/createSas");
}
}

View File

@@ -0,0 +1,116 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using System;
using Microsoft.SqlServer.Management.Smo;
using Azure.Storage.Blobs;
using Azure.Storage;
using Azure.Storage.Sas;
using Microsoft.SqlTools.ServiceLayer.AzureBlob.Contracts;
using System.Globalization;
namespace Microsoft.SqlTools.ServiceLayer.AzureBlob
{
class SharedAccessSignatureCreator
{
private Server sqlServer;
public SharedAccessSignatureCreator(Server sqlServer)
{
this.sqlServer = sqlServer;
}
public string CreateSqlSASCredential(string accountName, string accountKey, string containerUri, string expirationDateString)
{
DateTimeOffset? expirationDate = null;
if (!String.IsNullOrEmpty(expirationDateString))
{
expirationDate = DateTimeOffset.Parse(expirationDateString, CultureInfo.InvariantCulture);
}
var containerClient = new BlobContainerClient(new Uri(containerUri), new StorageSharedKeyCredential(accountName, accountKey));
Uri secretStringUri = GetServiceSasUriForContainer(containerClient, null, expirationDate);
string secretString = secretStringUri.ToString().Split('?')[1];
string identity = "Shared Access Signature";
WriteSASCredentialToSqlServer(containerUri, identity, secretString);
return secretString;
}
/// <summary>
/// Create sql sas credential with the given credential name
/// </summary>
/// <param name="credentialName">Name of sas credential, here is the same of the full container url.</param>
/// <param name="identity">Identity for credential, here is fixed as "Shared Access Signature"</param>
/// <param name="secretString">Secret of credential, which is sharedAccessSignatureForContainer </param>
/// <returns> The newly created SAS credential</returns>
public Credential WriteSASCredentialToSqlServer(string credentialName, string identity, string secretString)
{
try
{
// Format of Sql SAS credential:
// CREATE CREDENTIAL [https://<StorageAccountName>.blob.core.windows.net/<ContainerName>] WITH IDENTITY = N'Shared Access Signature',
// SECRET = N'sv=2014-02-14&sr=c&sig=lxb2aXr%2Bi0Aeygg%2B0a4REZ%2BqsUxxxxxxsqUybg0tVzg%3D&st=2015-10-15T08%3A00%3A00Z&se=2015-11-15T08%3A00%3A00Z&sp=rwdl'
//
CredentialCollection credentials = sqlServer.Credentials;
Credential azureCredential = new Credential(sqlServer, credentialName);
// Container can have many SAS credentials coexisting, here we'll always drop existing one once customer choose to create new credential
// since sql customer has no way to know its existency and even harder to retrive its secret string.
if (credentials.Contains(credentialName))
{
Credential oldCredential = credentials[credentialName];
oldCredential.Drop();
}
azureCredential.Create(identity, secretString);
return azureCredential;
}
catch (Exception ex)
{
throw new FailedOperationException(SR.WriteSASCredentialToSqlServerFailed, ex);
}
}
/// <summary>
/// Create Shared Access Policy for container
/// Default Accesss permission is Write/List/Read/Delete
/// </summary>
/// <param name="container"></param>
/// <param name="policyName"></param>
/// <param name="selectedSaredAccessExpiryTime"></param>
public Uri GetServiceSasUriForContainer(BlobContainerClient containerClient,
string storedPolicyName = null,
DateTimeOffset? expiringDate = null)
{
// Check whether this BlobContainerClient object has been authorized with Shared Key.
if (containerClient.CanGenerateSasUri)
{
// Create a SAS token
BlobSasBuilder sasBuilder = new BlobSasBuilder()
{
BlobContainerName = containerClient.Name,
Resource = BlobSasResource.BLOB_CONTAINER
};
if (storedPolicyName == null)
{
sasBuilder.ExpiresOn = (DateTimeOffset)(expiringDate == null ? DateTimeOffset.UtcNow.AddYears(1) : expiringDate);
sasBuilder.SetPermissions(BlobContainerSasPermissions.Read | BlobContainerSasPermissions.List | BlobContainerSasPermissions.Write | BlobContainerSasPermissions.Delete);
}
else
{
sasBuilder.Identifier = storedPolicyName;
}
Uri sasUri = containerClient.GenerateSasUri(sasBuilder);
return sasUri;
}
else
{
throw new FailedOperationException(SR.CreateSasForBlobContainerFailed);
}
}
}
}

View File

@@ -211,12 +211,12 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery
{ {
string destName = Convert.ToString(this.backupInfo.BackupPathList[i], System.Globalization.CultureInfo.InvariantCulture); string destName = Convert.ToString(this.backupInfo.BackupPathList[i], System.Globalization.CultureInfo.InvariantCulture);
int deviceType = (int)(this.backupInfo.BackupPathDevices[destName]); int deviceType = (int)(this.backupInfo.BackupPathDevices[destName]);
int backupDeviceType =
GetDeviceType(Convert.ToString(destName,
System.Globalization.CultureInfo.InvariantCulture));
switch (deviceType) switch (deviceType)
{ {
case (int)DeviceType.LogicalDevice: case (int)DeviceType.LogicalDevice:
int backupDeviceType =
GetDeviceType(Convert.ToString(destName,
System.Globalization.CultureInfo.InvariantCulture));
if (this.backupDeviceType == BackupDeviceType.Disk && backupDeviceType == constDeviceTypeFile) if (this.backupDeviceType == BackupDeviceType.Disk && backupDeviceType == constDeviceTypeFile)
{ {
@@ -229,6 +229,12 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery
this.backup.Devices.AddDevice(destName, DeviceType.File); this.backup.Devices.AddDevice(destName, DeviceType.File);
} }
break; break;
case (int)DeviceType.Url:
if (this.backupDeviceType == BackupDeviceType.Url)
{
this.backup.Devices.AddDevice(destName, DeviceType.Url);
}
break;
} }
} }

View File

@@ -51,6 +51,18 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.Contracts
} }
} }
internal int DeviceType
{
get
{
return GetOptionValue<int>(RestoreOptionsHelper.DeviceType);
}
set
{
SetOptionValue(RestoreOptionsHelper.DeviceType, value);
}
}
/// <summary> /// <summary>
/// Target Database name to restore to /// Target Database name to restore to
/// </summary> /// </summary>

View File

@@ -77,6 +77,12 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation
private bool? isTailLogBackupWithNoRecoveryPossible = null; private bool? isTailLogBackupWithNoRecoveryPossible = null;
private string backupMediaList = string.Empty; private string backupMediaList = string.Empty;
private Server server; private Server server;
private static readonly DeviceType[] managedInstanceSupportedDeviceTypes = { DeviceType.Url };
private static readonly DeviceType[] defaultSupportedDeviceTypes = { DeviceType.File, DeviceType.Url };
private static readonly Dictionary<Edition, DeviceType[]> specialEngineEditionSupportedDeviceTypes = new Dictionary<Edition, DeviceType[]>
{
{ Edition.SqlManagedInstance, managedInstanceSupportedDeviceTypes },
};
public RestoreDatabaseTaskDataObject(Server server, String databaseName) public RestoreDatabaseTaskDataObject(Server server, String databaseName)
{ {
@@ -195,8 +201,10 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation
/// Add a backup file to restore plan media list /// Add a backup file to restore plan media list
/// </summary> /// </summary>
/// <param name="filePaths"></param> /// <param name="filePaths"></param>
public void AddFiles(string filePaths) /// <param name="deviceType"></deviceType>
public void AddDevices(string filePaths, DeviceType deviceType)
{ {
ThrowIfUnsupportedDeviceType(this.Server.EngineEdition, deviceType);
backupMediaList = filePaths; backupMediaList = filePaths;
PlanUpdateRequired = true; PlanUpdateRequired = true;
if (!string.IsNullOrWhiteSpace(filePaths)) if (!string.IsNullOrWhiteSpace(filePaths))
@@ -209,7 +217,7 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation
{ {
this.RestorePlanner.BackupMediaList.Add(new BackupDeviceItem this.RestorePlanner.BackupMediaList.Add(new BackupDeviceItem
{ {
DeviceType = DeviceType.File, DeviceType = deviceType,
Name = file Name = file
}); });
} }
@@ -223,6 +231,20 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation
} }
} }
private void ThrowIfUnsupportedDeviceType(Edition engineEdition, DeviceType deviceType)
{
if (!IsSupportedDeviceType(engineEdition, deviceType))
{
throw new UnsupportedDeviceTypeException(engineEdition, deviceType);
}
}
private bool IsSupportedDeviceType(Edition engineEdition, DeviceType deviceType)
{
return (defaultSupportedDeviceTypes.Contains(deviceType) && !specialEngineEditionSupportedDeviceTypes.ContainsKey(engineEdition))
|| (specialEngineEditionSupportedDeviceTypes.ContainsKey(engineEdition) && specialEngineEditionSupportedDeviceTypes[engineEdition].Contains(deviceType));
}
/// <summary> /// <summary>
/// Returns the last backup taken /// Returns the last backup taken
@@ -1368,7 +1390,7 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation
if (!string.IsNullOrEmpty(RestoreParams.BackupFilePaths) && RestoreParams.ReadHeaderFromMedia) if (!string.IsNullOrEmpty(RestoreParams.BackupFilePaths) && RestoreParams.ReadHeaderFromMedia)
{ {
AddFiles(RestoreParams.BackupFilePaths); AddDevices(RestoreParams.BackupFilePaths, (DeviceType)RestoreParams.DeviceType);
} }
else else
{ {

View File

@@ -0,0 +1,17 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using System;
using Microsoft.SqlServer.Management.Smo;
namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation
{
public class UnsupportedDeviceTypeException: Exception
{
public UnsupportedDeviceTypeException(Edition engineEdition, DeviceType deviceType) : base(SR.UnsupportedDeviceType(deviceType.ToString(), engineEdition.ToString()))
{
}
}
}

View File

@@ -62,6 +62,9 @@ namespace Microsoft.SqlTools.ServiceLayer.DisasterRecovery
//The key name to use to set the backup file paths in the request //The key name to use to set the backup file paths in the request
internal const string BackupFilePaths = "backupFilePaths"; internal const string BackupFilePaths = "backupFilePaths";
//The key name to use to set the device type
internal const string DeviceType = "deviceType";
//The key name to use to set the target database name in the request //The key name to use to set the target database name in the request
internal const string TargetDatabaseName = "targetDatabaseName"; internal const string TargetDatabaseName = "targetDatabaseName";

View File

@@ -36,6 +36,7 @@ using Microsoft.SqlTools.ServiceLayer.Workspace;
using Microsoft.SqlTools.ServiceLayer.NotebookConvert; using Microsoft.SqlTools.ServiceLayer.NotebookConvert;
using Microsoft.SqlTools.ServiceLayer.ModelManagement; using Microsoft.SqlTools.ServiceLayer.ModelManagement;
using Microsoft.SqlTools.ServiceLayer.TableDesigner; using Microsoft.SqlTools.ServiceLayer.TableDesigner;
using Microsoft.SqlTools.ServiceLayer.AzureBlob;
using Microsoft.SqlTools.ServiceLayer.ExecutionPlan; using Microsoft.SqlTools.ServiceLayer.ExecutionPlan;
namespace Microsoft.SqlTools.ServiceLayer namespace Microsoft.SqlTools.ServiceLayer
@@ -164,6 +165,9 @@ namespace Microsoft.SqlTools.ServiceLayer
TableDesignerService.Instance.InitializeService(serviceHost); TableDesignerService.Instance.InitializeService(serviceHost);
serviceProvider.RegisterSingleService(TableDesignerService.Instance); serviceProvider.RegisterSingleService(TableDesignerService.Instance);
BlobService.Instance.InitializeService(serviceHost);
serviceProvider.RegisterSingleService(BlobService.Instance);
InitializeHostedServices(serviceProvider, serviceHost); InitializeHostedServices(serviceProvider, serviceHost);
serviceHost.ServiceProvider = serviceProvider; serviceHost.ServiceProvider = serviceProvider;

View File

@@ -2589,6 +2589,30 @@ namespace Microsoft.SqlTools.ServiceLayer
} }
} }
public static string NotSupportedCloudCreateSas
{
get
{
return Keys.GetString(Keys.NotSupportedCloudCreateSas);
}
}
public static string CreateSasForBlobContainerFailed
{
get
{
return Keys.GetString(Keys.CreateSasForBlobContainerFailed);
}
}
public static string WriteSASCredentialToSqlServerFailed
{
get
{
return Keys.GetString(Keys.WriteSASCredentialToSqlServerFailed);
}
}
public static string CategoryLocal public static string CategoryLocal
{ {
get get
@@ -9192,6 +9216,11 @@ namespace Microsoft.SqlTools.ServiceLayer
return Keys.GetString(Keys.EditDataIncorrectTable, tableName); return Keys.GetString(Keys.EditDataIncorrectTable, tableName);
} }
public static string UnsupportedDeviceType(String deviceType, String engineEdition)
{
return Keys.GetString(Keys.UnsupportedDeviceType, deviceType, engineEdition);
}
public static string CreateSessionFailed(String error) public static string CreateSessionFailed(String error)
{ {
return Keys.GetString(Keys.CreateSessionFailed, error); return Keys.GetString(Keys.CreateSessionFailed, error);
@@ -10388,6 +10417,9 @@ namespace Microsoft.SqlTools.ServiceLayer
public const string NoBackupsetsToRestore = "NoBackupsetsToRestore"; public const string NoBackupsetsToRestore = "NoBackupsetsToRestore";
public const string UnsupportedDeviceType = "UnsupportedDeviceType";
public const string ScriptTaskName = "ScriptTaskName"; public const string ScriptTaskName = "ScriptTaskName";
@@ -10418,6 +10450,15 @@ namespace Microsoft.SqlTools.ServiceLayer
public const string SessionAlreadyExists = "SessionAlreadyExists"; public const string SessionAlreadyExists = "SessionAlreadyExists";
public const string NotSupportedCloudCreateSas = "NotSupportedCloudCreateSas";
public const string CreateSasForBlobContainerFailed = "CreateSasForBlobContainerFailed";
public const string WriteSASCredentialToSqlServerFailed = "WriteSASCredentialToSqlServerFailed";
public const string CategoryLocal = "CategoryLocal"; public const string CategoryLocal = "CategoryLocal";

View File

@@ -1532,6 +1532,11 @@
<value>No backupset selected to be restored</value> <value>No backupset selected to be restored</value>
<comment></comment> <comment></comment>
</data> </data>
<data name="UnsupportedDeviceType" xml:space="preserve">
<value>Unsupported device type {0} for engine edition {1}.</value>
<comment>.
Parameters: 0 - deviceType (String), 1 - engineEdition (String) </comment>
</data>
<data name="ScriptTaskName" xml:space="preserve"> <data name="ScriptTaskName" xml:space="preserve">
<value>scripting</value> <value>scripting</value>
<comment></comment> <comment></comment>
@@ -1577,6 +1582,18 @@
<comment>. <comment>.
Parameters: 0 - sessionName (String) </comment> Parameters: 0 - sessionName (String) </comment>
</data> </data>
<data name="NotSupportedCloudCreateSas" xml:space="preserve">
<value>Create shared access signature is not supported for cloud instances.</value>
<comment></comment>
</data>
<data name="CreateSasForBlobContainerFailed" xml:space="preserve">
<value>Cannot generate SAS URI for blob container.</value>
<comment></comment>
</data>
<data name="WriteSASCredentialToSqlServerFailed" xml:space="preserve">
<value>Failed storing shared access signature token on the SQL Servers.</value>
<comment></comment>
</data>
<data name="CategoryLocal" xml:space="preserve"> <data name="CategoryLocal" xml:space="preserve">
<value>[Uncategorized (Local)]</value> <value>[Uncategorized (Local)]</value>
<comment>job categories</comment> <comment>job categories</comment>

View File

@@ -742,6 +742,7 @@ RestoreBackupSetUserName = User Name
RestoreBackupSetExpiration = Expiration RestoreBackupSetExpiration = Expiration
TheLastBackupTaken = The last backup taken ({0}) TheLastBackupTaken = The last backup taken ({0})
NoBackupsetsToRestore = No backupset selected to be restored NoBackupsetsToRestore = No backupset selected to be restored
UnsupportedDeviceType(String deviceType, String engineEdition) = Unsupported device type {0} for engine edition {1}.
############################################################################ ############################################################################
# Generate Script # Generate Script
@@ -762,6 +763,11 @@ StopSessionFailed(String error) = Failed to stop session: {0}
SessionNotFound = Cannot find requested XEvent session SessionNotFound = Cannot find requested XEvent session
SessionAlreadyExists(String sessionName) = An XEvent session named {0} already exists SessionAlreadyExists(String sessionName) = An XEvent session named {0} already exists
############################################################################
# Azure Blob Service
NotSupportedCloudCreateSas = Create shared access signature is not supported for cloud instances.
CreateSasForBlobContainerFailed = Cannot generate SAS URI for blob container.
WriteSASCredentialToSqlServerFailed = Failed storing shared access signature token on the SQL Servers.
;job categories ;job categories
CategoryLocal = [Uncategorized (Local)] CategoryLocal = [Uncategorized (Local)]

View File

@@ -5757,6 +5757,26 @@ The Query Processor estimates that implementing the following index could improv
*/</target> */</target>
<note>title of missing index details</note> <note>title of missing index details</note>
</trans-unit> </trans-unit>
<trans-unit id="CreateSasForBlobContainerFailed">
<source>Cannot generate SAS URI for blob container.</source>
<target state="new">Cannot generate SAS URI for blob container.</target>
<note></note>
</trans-unit>
<trans-unit id="WriteSASCredentialToSqlServerFailed">
<source>Failed storing shared access signature token on the SQL Servers.</source>
<target state="new">Failed storing shared access signature token on the SQL Servers.</target>
<note></note>
</trans-unit>
<trans-unit id="UnsupportedDeviceType">
<source>Unsupported device type {0} for engine edition {1}.</source>
<target state="new">Unsupported device type {0} for engine edition {1}.</target>
<note></note>
</trans-unit>
<trans-unit id="NotSupportedCloudCreateSas">
<source>Create shared access signature is not supported for cloud instances.</source>
<target state="new">Create shared access signature is not supported for cloud instances.</target>
<note></note>
</trans-unit>
<trans-unit id="TableDesignerGraphTableTypeTitle"> <trans-unit id="TableDesignerGraphTableTypeTitle">
<source>Type</source> <source>Type</source>
<target state="new">Type</target> <target state="new">Type</target>

View File

@@ -21,6 +21,7 @@
</PropertyGroup> </PropertyGroup>
<ItemGroup> <ItemGroup>
<PackageReference Include="Azure.Storage.Blobs" />
<PackageReference Include="Microsoft.CodeAnalysis.CSharp" /> <PackageReference Include="Microsoft.CodeAnalysis.CSharp" />
<PackageReference Include="Microsoft.CodeAnalysis.CSharp.Workspaces" /> <PackageReference Include="Microsoft.CodeAnalysis.CSharp.Workspaces" />
<PackageReference Include="Microsoft.CodeAnalysis.Workspaces.Common" /> <PackageReference Include="Microsoft.CodeAnalysis.Workspaces.Common" />
@@ -29,7 +30,7 @@
<PackageReference Include="System.Text.Encoding.CodePages" /> <PackageReference Include="System.Text.Encoding.CodePages" />
<PackageReference Include="Microsoft.SqlServer.Assessment" /> <PackageReference Include="Microsoft.SqlServer.Assessment" />
<PackageReference Include="Microsoft.SqlServer.Migration.Assessment" /> <PackageReference Include="Microsoft.SqlServer.Migration.Assessment" />
<PackageReference Include="Microsoft.SqlServer.Management.SqlParser"/> <PackageReference Include="Microsoft.SqlServer.Management.SqlParser" />
<PackageReference Include="System.Text.Encoding.CodePages" /> <PackageReference Include="System.Text.Encoding.CodePages" />
<PackageReference Include="Microsoft.SqlServer.TransactSql.ScriptDom.NRT"> <PackageReference Include="Microsoft.SqlServer.TransactSql.ScriptDom.NRT">
<Aliases>ASAScriptDom</Aliases> <Aliases>ASAScriptDom</Aliases>

View File

@@ -0,0 +1,253 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using System;
using System.Collections.Generic;
using System.Globalization;
using System.IO;
using System.Linq;
using System.Threading.Tasks;
using Azure.Storage;
using Azure.Storage.Blobs;
using Microsoft.Data.SqlClient;
using Microsoft.SqlServer.Management.Common;
using Microsoft.SqlServer.Management.Smo;
using Microsoft.SqlTools.ServiceLayer.Admin;
using Microsoft.SqlTools.ServiceLayer.AzureBlob;
using Microsoft.SqlTools.ServiceLayer.Connection;
using Microsoft.SqlTools.ServiceLayer.DisasterRecovery;
using Microsoft.SqlTools.ServiceLayer.DisasterRecovery.Contracts;
using Microsoft.SqlTools.ServiceLayer.DisasterRecovery.RestoreOperation;
using Microsoft.SqlTools.ServiceLayer.IntegrationTests.Utility;
using Microsoft.SqlTools.ServiceLayer.Management;
using Microsoft.SqlTools.ServiceLayer.TaskServices;
using Microsoft.SqlTools.ServiceLayer.Test.Common;
using NUnit.Framework;
using static Microsoft.SqlTools.ServiceLayer.IntegrationTests.Utility.LiveConnectionHelper;
namespace Microsoft.SqlTools.ServiceLayer.IntegrationTests.DisasterRecovery
{
class BackupRestoreUrlTests
{
/// <summary>
/// Create simple backup test
/// </summary>
[Test]
public async Task BackupDatabaseToUrlAndRestoreFromUrlTest()
{
DisasterRecoveryService service = new DisasterRecoveryService();
string databaseName = "SqlToolsService_TestBackupToUrl_" + new Random().Next(10000000, 99999999);
using (SqlTestDb testDb = SqlTestDb.CreateNew(TestServerType.OnPrem, false, databaseName))
{
var liveConnection = LiveConnectionHelper.InitLiveConnectionInfo(databaseName);
using (DatabaseTaskHelper helper = AdminService.CreateDatabaseTaskHelper(liveConnection.ConnectionInfo, databaseExists: true))
using (SqlConnection sqlConn = ConnectionService.OpenSqlConnection(liveConnection.ConnectionInfo))
{
ServerConnection serverConn = new ServerConnection(sqlConn);
Server server = new Server(serverConn);
SharedAccessSignatureCreator sasCreator = new SharedAccessSignatureCreator(server);
AzureBlobConnectionSetting azureBlobConnection = TestAzureBlobConnectionService.Instance.Settings;
sasCreator.CreateSqlSASCredential(azureBlobConnection.AccountName, azureBlobConnection.AccountKey, azureBlobConnection.BlobContainerUri, "");
string backupPath = GetAzureBlobBackupPath(databaseName);
BackupInfo backupInfo = CreateDefaultBackupInfo(databaseName,
BackupType.Full,
new List<string>() { backupPath },
new Dictionary<string, int>() { { backupPath, (int)DeviceType.Url } });
BackupOperation backupOperation = CreateBackupOperation(service, liveConnection.ConnectionInfo.OwnerUri, backupInfo, helper.DataContainer, sqlConn);
// Backup the database
service.PerformBackup(backupOperation);
testDb.Cleanup();
}
}
await VerifyRestore(databaseName, true, TaskExecutionModeFlag.Execute, databaseName);
VerifyAndCleanAzureBlobBackup(databaseName);
}
private BackupInfo CreateDefaultBackupInfo(string databaseName, BackupType backupType, List<string> backupPathList, Dictionary<string, int> backupPathDevices)
{
BackupInfo backupInfo = new BackupInfo();
backupInfo.BackupComponent = (int)BackupComponent.Database;
backupInfo.BackupDeviceType = (int)BackupDeviceType.Url;
backupInfo.BackupPathDevices = backupPathDevices;
backupInfo.BackupPathList = backupPathList;
backupInfo.BackupsetName = "default_backup";
backupInfo.BackupType = (int)backupType;
backupInfo.DatabaseName = databaseName;
backupInfo.SelectedFileGroup = null;
backupInfo.SelectedFiles = "";
return backupInfo;
}
private string GetAzureBlobBackupPath(string databaseName)
{
AzureBlobConnectionSetting azureBlobConnection = TestAzureBlobConnectionService.Instance.Settings;
return azureBlobConnection.BlobContainerUri + "/" + databaseName + ".bak";
}
private void VerifyAndCleanAzureBlobBackup(string databaseName)
{
AzureBlobConnectionSetting azureBlobConnection = TestAzureBlobConnectionService.Instance.Settings;
string blobUri = GetAzureBlobBackupPath(databaseName);
string accountKey = azureBlobConnection.AccountKey;
string accountName = azureBlobConnection.AccountName;
bool result = BlobDropIfExists(blobUri, accountName, accountKey);
Assert.True(result, "Backup doesn't exists on Azure blob storage");
}
public static bool BlobDropIfExists(string blobUri, string accountName, string accountKey)
{
BlobClient client = new BlobClient(new Uri(blobUri), new StorageSharedKeyCredential(accountName, accountKey));
return client.DeleteIfExists();
}
private BackupOperation CreateBackupOperation(DisasterRecoveryService service, string uri, BackupInfo backupInfo, CDataContainer dataContainer, SqlConnection sqlConn)
{
var backupParams = new BackupParams
{
OwnerUri = uri,
BackupInfo = backupInfo,
};
return service.CreateBackupOperation(dataContainer, sqlConn, backupParams.BackupInfo);
}
private async Task<RestorePlanResponse> VerifyRestore(
string sourceDbName = null,
bool canRestore = true,
TaskExecutionModeFlag executionMode = TaskExecutionModeFlag.None,
string targetDatabase = null,
string[] selectedBackupSets = null,
Dictionary<string, object> options = null,
Func<Database, bool> verifyDatabase = null,
bool shouldFail = false)
{
string backUpFilePath = GetAzureBlobBackupPath(targetDatabase);
using (SqlTestDb testDb = SqlTestDb.CreateNew(TestServerType.OnPrem, false, "master"))
{
TestConnectionResult connectionResult = await LiveConnectionHelper.InitLiveConnectionInfoAsync("master", testDb.ConnectionString);
RestoreDatabaseHelper service = new RestoreDatabaseHelper();
// If source database is sepecified verfiy it's part of source db list
if (!string.IsNullOrEmpty(sourceDbName))
{
RestoreConfigInfoResponse configInfoResponse = service.CreateConfigInfoResponse(new RestoreConfigInfoRequestParams
{
OwnerUri = testDb.ConnectionString
});
IEnumerable<string> dbNames = configInfoResponse.ConfigInfo[RestoreOptionsHelper.SourceDatabaseNamesWithBackupSets] as IEnumerable<string>;
Assert.True(dbNames.Any(x => x == sourceDbName));
}
var request = new RestoreParams
{
BackupFilePaths = backUpFilePath,
TargetDatabaseName = targetDatabase,
OwnerUri = testDb.ConnectionString,
SelectedBackupSets = selectedBackupSets,
SourceDatabaseName = sourceDbName,
DeviceType = (int)DeviceType.Url
};
request.Options[RestoreOptionsHelper.ReadHeaderFromMedia] = string.IsNullOrEmpty(backUpFilePath);
if (options != null)
{
foreach (var item in options)
{
if (!request.Options.ContainsKey(item.Key))
{
request.Options.Add(item.Key, item.Value);
}
}
}
var restoreDataObject = service.CreateRestoreDatabaseTaskDataObject(request, connectionResult.ConnectionInfo);
restoreDataObject.ConnectionInfo = connectionResult.ConnectionInfo;
var response = service.CreateRestorePlanResponse(restoreDataObject);
Assert.NotNull(response);
Assert.False(string.IsNullOrWhiteSpace(response.SessionId));
Assert.AreEqual(response.CanRestore, canRestore);
if (canRestore)
{
Assert.True(response.DbFiles.Any());
if (string.IsNullOrEmpty(targetDatabase))
{
targetDatabase = response.DatabaseName;
}
Assert.AreEqual(response.DatabaseName, targetDatabase);
Assert.NotNull(response.PlanDetails);
Assert.True(response.PlanDetails.Any());
Assert.NotNull(response.PlanDetails[RestoreOptionsHelper.BackupTailLog]);
Assert.NotNull(response.PlanDetails[RestoreOptionsHelper.TailLogBackupFile]);
Assert.NotNull(response.PlanDetails[RestoreOptionsHelper.DataFileFolder]);
Assert.NotNull(response.PlanDetails[RestoreOptionsHelper.LogFileFolder]);
Assert.NotNull(response.PlanDetails[RestoreOptionsHelper.StandbyFile]);
Assert.NotNull(response.PlanDetails[RestoreOptionsHelper.StandbyFile]);
if (executionMode != TaskExecutionModeFlag.None)
{
try
{
request.SessionId = response.SessionId;
restoreDataObject = service.CreateRestoreDatabaseTaskDataObject(request);
Assert.AreEqual(response.SessionId, restoreDataObject.SessionId);
request.RelocateDbFiles = !restoreDataObject.DbFilesLocationAreValid();
restoreDataObject.Execute((TaskExecutionMode)Enum.Parse(typeof(TaskExecutionMode), executionMode.ToString()));
if (executionMode.HasFlag(TaskExecutionModeFlag.Execute))
{
Assert.True(restoreDataObject.Server.Databases.Contains(targetDatabase));
if (verifyDatabase != null)
{
Assert.True(verifyDatabase(restoreDataObject.Server.Databases[targetDatabase]));
}
//To verify the backupset that are restored, verifying the database is a better options.
//Some tests still verify the number of backup sets that are executed which in some cases can be less than the selected list
if (verifyDatabase == null && selectedBackupSets != null)
{
Assert.AreEqual(selectedBackupSets.Count(), restoreDataObject.RestorePlanToExecute.RestoreOperations.Count());
}
}
if (executionMode.HasFlag(TaskExecutionModeFlag.Script))
{
Assert.False(string.IsNullOrEmpty(restoreDataObject.ScriptContent));
}
}
catch (Exception ex)
{
if (!shouldFail)
{
Assert.False(true, ex.Message);
}
}
finally
{
await DropDatabase(targetDatabase);
}
}
}
return response;
}
}
private async Task DropDatabase(string databaseName)
{
string dropDatabaseQuery = string.Format(CultureInfo.InvariantCulture,
Scripts.DropDatabaseIfExist, databaseName);
await TestServiceProvider.Instance.RunQueryAsync(TestServerType.OnPrem, "master", dropDatabaseQuery);
}
}
}

View File

@@ -0,0 +1,17 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
namespace Microsoft.SqlTools.ServiceLayer.Test.Common
{
public class AzureBlobConnectionSetting
{
public string BlobContainerUri { get; set; }
public string AccountKey { get; set; }
public string AccountName { get; set; }
}
}

View File

@@ -9,6 +9,12 @@ namespace Microsoft.SqlTools.ServiceLayer.Test.Common
{ {
public const string SqlConectionSettingsEnvironmentVariable = "SettingsFileName"; public const string SqlConectionSettingsEnvironmentVariable = "SettingsFileName";
public const string AzureStorageAccountKey = "AzureStorageAccountKey";
public const string AzureStorageAccountName = "AzureStorageAccountName";
public const string AzureBlobContainerUri = "AzureBlobContainerUri";
/// <summary> /// <summary>
/// Environment variable used to get the TSDATA source directory root. /// Environment variable used to get the TSDATA source directory root.
/// K2 is under it. /// K2 is under it.

View File

@@ -0,0 +1,65 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using System;
namespace Microsoft.SqlTools.ServiceLayer.Test.Common
{
public class TestAzureBlobConnectionService
{
private static Lazy<TestAzureBlobConnectionService> instance = new Lazy<TestAzureBlobConnectionService>(() => new TestAzureBlobConnectionService());
private AzureBlobConnectionSetting settings;
private TestAzureBlobConnectionService()
{
LoadInstanceSettings();
}
public static TestAzureBlobConnectionService Instance
{
get
{
return instance.Value;
}
}
public AzureBlobConnectionSetting Settings
{
get
{
return settings;
}
}
internal void LoadInstanceSettings()
{
try
{
this.settings = TestAzureBlobConnectionService.InitAzureBlobConnectionSetting();
}
catch (Exception ex)
{
throw new Exception("Fail to load the SQL connection instances.", ex);
}
}
internal static AzureBlobConnectionSetting InitAzureBlobConnectionSetting()
{
try
{
AzureBlobConnectionSetting settings = new AzureBlobConnectionSetting();
settings.AccountKey = Environment.GetEnvironmentVariable(Constants.AzureStorageAccountKey);
settings.AccountName = Environment.GetEnvironmentVariable(Constants.AzureStorageAccountName);
settings.BlobContainerUri = Environment.GetEnvironmentVariable(Constants.AzureBlobContainerUri);
Console.WriteLine("Azure Blob Connection Settings loaded successfully");
return settings;
}
catch (Exception ex)
{
throw new Exception("Failed to load the azure blob connection settings.", ex);
}
}
}
}

View File

@@ -0,0 +1,41 @@
//
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
//
using System;
using Moq;
using NUnit.Framework;
using Azure.Storage.Blobs;
using Microsoft.SqlTools.ServiceLayer.AzureBlob;
using Microsoft.SqlServer.Management.Smo;
using Azure.Storage.Sas;
namespace Microsoft.SqlTools.ServiceLayer.UnitTests.DisasterRecovery
{
class SharedAccessSignatureCreatorTests
{
[Test]
public void GetServiceSasUriForContainerReturnsNullWhenCannotGenerateSasUri()
{
var mockBlobContainerClient = new Mock<BlobContainerClient>();
mockBlobContainerClient.Setup(x => x.CanGenerateSasUri).Returns(false);
var mockServer = new Server();
SharedAccessSignatureCreator sharedAccessSignatureCreator = new SharedAccessSignatureCreator(mockServer);
Assert.Throws<FailedOperationException>(() => sharedAccessSignatureCreator.GetServiceSasUriForContainer(mockBlobContainerClient.Object));
}
[Test]
public void GetServiceSasUriForContainerReturnsSasUri()
{
Uri sharedAccessSignatureUriMock = new Uri("https://azureblob/mocked-shared-access-signature");
var mockBlobContainerClient = new Mock<BlobContainerClient>();
mockBlobContainerClient.Setup(x => x.CanGenerateSasUri).Returns(true);
mockBlobContainerClient.Setup(x => x.GenerateSasUri(It.IsAny<BlobSasBuilder>())).Returns(sharedAccessSignatureUriMock);
var mockServer = new Server();
SharedAccessSignatureCreator sharedAccessSignatureCreator = new SharedAccessSignatureCreator(mockServer);
Uri result = sharedAccessSignatureCreator.GetServiceSasUriForContainer(mockBlobContainerClient.Object);
Assert.AreEqual(result, sharedAccessSignatureUriMock);
}
}
}