The hiqlite::Client
now provides a few more helpful functions and features:
put_bytes()
for the cache to be able to just cache raw bytes without any serializationquery_raw()
will return the rawhiqlite::Row
s from the database in cases where you might just want to have results without deserializing into astruct
.query_raw_one()
- the same as above, just returns a singlehiqlite::Row
query_raw_not_empty()
is a DX improvement. Often when you needquery_raw()
, you use it to retrieve a specific set of columns orCOUNT(*)
, but you also don't want to check that theRow
s are not empty before accessing. This function willErr()
if noRow
s have been returned and therefore reduced boilerplate in these situations.- The migration process will panic and error early on migration hash mismatches and provide more clear logging and information where exactly the issue is.
- The new
query_as_optional()
andquery_map_optional()
return aResult<Option<T>>
and don't error in case of no rows returned. execute_returning()
s return type has been changed to properly return a wrappingResult<_>
like the othersexecute_returning_map_one()
andexecute_returning_one()
are available as well now to reduce boilerplate.batch()
will exit and error early, if the writer had issues with bad syntax. Because of the internal design of theBatch
reader, it is impossible to recover from syntax errors. Therefore the whole batch will not be applied and the transaction will be rolled back in that case.
In addition, there is now:
impl<T> From<&Option<T>> for Param
impl From<&String> for Param
impl TryFrom<ValueOwned> for Option<bool>
Error::ConstraintViolation
and Error::QueryReturnedNoRows
have been added to be able to handle errors in downstream
applications more granular.
All query fn's from the client that end with *_one
and should only return a single row have been changed slightly.
Before, they would ignore any Rows after the first one, which can lead to very nasty bugs in production. They now only
return an Ok(_)
if exactly a single Row has been returned and will error otherwise.
To prevent information leakage from a world readable database by default, all Hiqlite folders will be restricted with proper access rights after creation to make them only accessible by the user.
If you have the dashboard
feature enabled, you can choose to not provide a HQL_PASSWORD_DASHBOARD
at startup.
This value was mandatory before and is optional now.
If not given, all routes for the dashboard will not exist. This makes it possible to compile with the dashboard
feature set and decide at runtime, if you maybe only want to enable is when necessary.
The dashboard has received a few improvements like resizeable result table columns and a nicer look. It has also been upgraded to the latest Svelte 5 stable.
A very simple rate-limiting has been added for the dashboard login. Only a single password hashing task can exist at a
time, guarded by a Mutex
. Concurrent logins will never be needed here and this is a good prevention against
brute-force and DoS at the same time.
I do have spow
set up for the dashboard login, but it is not in use currently. The reason is that the WASM will not
run in plain HTTP contexts, and it would therefore always require TLS. However, you may not wish to add TLS here because
it is maybe in a physically separate network, or inside its own VPN, or you simply only do a port forward via for
instance kubectl
to your localhost when you want to access the dashboard. If I can find a workaround for the WASM
issue, I will add spow
again in the future for additional security.
You need to set HQL_S3_PATH_STYLE
to either true
or false
now, while true
was the default before.
The Backup creation routine has reset the "wrong" metadata after backup creation. This is not an issue during runtime usually, because it will get overwritten with the correct data again very soon, but could cause issues if the instance crashes before this can happen. Now, the internal metadata for the newly created backup will be reset correctly instead of the live database.
A few additional checks and fixes have been applied to fight possible race conditions during for instance a rolling release of a Kubernetes StatefulSet when using the cache layer. Since it has no persistence, the Raft group formation could get into state where Kubernetes had to kill one of the containers after a rolling release to get them healthy again. This should now be fine as it was smooth like expected in the last tests.
The backups behavior has been changed slightly. It is still the case that only the current Raft leader will push the backup to S3 storage (if configured), but each node will create an keep its own local backup. This helps when you don't have S3 available and will make sure, that you will still have a backup "somewhere" even when you lose a full node.
The self-healing tests have been simplified to make them easier to maintain in the future. They do not decide between different folders being lost because you usually lose the whole volume or nothing at all. So if any issue comes up on a Raft member node, the easiest solution is to simply delete the whole volume, restart and let it rebuild anyway.
This releases fixes some usability issues of the initial version. It also brings clearer documentation in a lot of places.
- Removed the
compression
feature fromrust_embed
for better compatibility with other crates in the same project. hiqlite::Client::is_leader_db()
+::is_leader_cache
are nowpub
and can be used in downstream applications.- New functions
hiqlite::Client::clear_cache()
+::clear_cache_all()
to clear caches without a restart. - A few (on purpose)
panic!
,assert!
andexpect()
have been removed in favor of returnedResult
errors. - Hiqlite now always tries to install a
rustls
crypto provider which makes setup easier and less error-prone. It will only log adebug
if it fails to do so, which can only happen when it has been done already. - Additional type affinity checks for SQLite to be able to convert more things without user interaction, like for
instance
INT
will be caught as well, even though it is no SQLite type by definition. Basically, the rules from 3.1 https://www.sqlite.org/datatype3.html are applied. The "correct" SQLite type definitions will always be faster though and should always be preferred. - Additional type conversion for:
bool
- was missing,true
is now anINTEGER
of1
and0
forfalse
chrono::DateTime<Utc>
chrono::DateTime<Local>
chrono::DateTime<FixedOffset>
chrono::NaiveDate
chrono::NaiveTime
chrono::NaiveDateTime
serde_json::Value
The additionalchrono
andserde_json
types are stored asTEXT
inside the DB for compatibility with the underlyingrusqlite
crate. UsingINTEGER
forchrono::Naive*
andUtc
types would be faster more efficient, which may be changed in the future. For now, all Date and Time-like types are converted toTEXT
.
Note: These auto type conversions only work when you implement theFrom<hiqlite::Row>
and do not work with the auto-conversion from derivingserde::Deserialize
.
openraft
has been bumped tov0.9.16
which solves some issues with a not-so-pretty rolling restart of Kubernetes StatefulSets for instance due to a race condition.HIQLITE_BACKUP_RESTORE
env var to restore from a backup has been renamed toHQL_BACKUP_RESTORE
to match the other config vars regarding the prefix.
With this first version, it starts to make sense to use Hiqlite in real applications to further stabilize it.
This first release comes with the following features:
- full Raft cluster setup
- everything a Raft is expected to do (thanks to openraft)
- persistent storage for Raft logs (with rocksdb) and SQLite state machine
- "magic" auto setup, no need to do any manual init or management for the Raft
- self-healing - each node can automatically recover from:
- lost cached WAL buffer for the state machine
- complete loss of the state machine DB (SQLite)
- complete loss of the whole volume itself
- automatic database migrations
- fully authenticated networking
- optional TLS everywhere for a zero-trust philosophy
- fully encrypted backups to s3, cron job or manual ( with s3-simple + cryptr)
- restore from remote backup (with log index roll-over)
- strongly consistent, replicated
EXECUTE
queries- on a leader node, the client will not even bother with using networking
- on a non-leader node, it will automatically switch over to a network connection so the request is forwarded and initiated on the current Raft leader
- strongly consistent, replicated
EXECUTE
queries with returning statement through the Raft- you can either get a raw handle to the custom
RowOwned
struct - or you can map the
RETURNING
statement to an existing struct
- you can either get a raw handle to the custom
- transaction executes
- simple
String
batch executes - consistent read / select queries on leader
query_as()
for local reads with auto-mapping tostruct
s implementingserde::Deserialize
. This will end up behind aserde
feature in the future which is not implemented yet.query_map()
for local reads forstructs
that implementimpl<'r> From<hiqlite::Row<'r>>
which is the faster method with more manual work- in addition to SQLite - multiple in-memory K/V caches with optional independent TTL per entry per cache
- listen / notify to send real-time messages through the Raft
dlock
feature provides access to distributed locks- standalone binary with the
server
feature which can run as a single node, cluster, or proxy to an existing cluster - integrated simple dashboard UI for debugging the database in production - pretty basic for now but it gets the job done