sqlite.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432
  1. //go:build !nosqlite
  2. // +build !nosqlite
  3. package dataprovider
  4. import (
  5. "context"
  6. "crypto/x509"
  7. "database/sql"
  8. "errors"
  9. "fmt"
  10. "path/filepath"
  11. "strings"
  12. // we import go-sqlite3 here to be able to disable SQLite support using a build tag
  13. _ "github.com/mattn/go-sqlite3"
  14. "github.com/drakkan/sftpgo/v2/logger"
  15. "github.com/drakkan/sftpgo/v2/util"
  16. "github.com/drakkan/sftpgo/v2/version"
  17. "github.com/drakkan/sftpgo/v2/vfs"
  18. )
  19. const (
  20. sqliteResetSQL = `DROP TABLE IF EXISTS "{{api_keys}}";
  21. DROP TABLE IF EXISTS "{{folders_mapping}}";
  22. DROP TABLE IF EXISTS "{{admins}}";
  23. DROP TABLE IF EXISTS "{{folders}}";
  24. DROP TABLE IF EXISTS "{{shares}}";
  25. DROP TABLE IF EXISTS "{{users}}";
  26. DROP TABLE IF EXISTS "{{defender_events}}";
  27. DROP TABLE IF EXISTS "{{defender_hosts}}";
  28. DROP TABLE IF EXISTS "{{schema_version}}";
  29. `
  30. sqliteInitialSQL = `CREATE TABLE "{{schema_version}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "version" integer NOT NULL);
  31. CREATE TABLE "{{admins}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "username" varchar(255) NOT NULL UNIQUE,
  32. "description" varchar(512) NULL, "password" varchar(255) NOT NULL, "email" varchar(255) NULL, "status" integer NOT NULL,
  33. "permissions" text NOT NULL, "filters" text NULL, "additional_info" text NULL, "last_login" bigint NOT NULL,
  34. "created_at" bigint NOT NULL, "updated_at" bigint NOT NULL);
  35. CREATE TABLE "{{defender_hosts}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "ip" varchar(50) NOT NULL UNIQUE,
  36. "ban_time" bigint NOT NULL, "updated_at" bigint NOT NULL);
  37. CREATE TABLE "{{defender_events}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "date_time" bigint NOT NULL,
  38. "score" integer NOT NULL, "host_id" integer NOT NULL REFERENCES "{{defender_hosts}}" ("id") ON DELETE CASCADE
  39. DEFERRABLE INITIALLY DEFERRED);
  40. CREATE TABLE "{{folders}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "name" varchar(255) NOT NULL UNIQUE,
  41. "description" varchar(512) NULL, "path" text NULL, "used_quota_size" bigint NOT NULL, "used_quota_files" integer NOT NULL,
  42. "last_quota_update" bigint NOT NULL, "filesystem" text NULL);
  43. CREATE TABLE "{{users}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "username" varchar(255) NOT NULL UNIQUE,
  44. "status" integer NOT NULL, "expiration_date" bigint NOT NULL, "description" varchar(512) NULL, "password" text NULL,
  45. "public_keys" text NULL, "home_dir" text NOT NULL, "uid" integer NOT NULL, "gid" integer NOT NULL,
  46. "max_sessions" integer NOT NULL, "quota_size" bigint NOT NULL, "quota_files" integer NOT NULL, "permissions" text NOT NULL,
  47. "used_quota_size" bigint NOT NULL, "used_quota_files" integer NOT NULL, "last_quota_update" bigint NOT NULL,
  48. "upload_bandwidth" integer NOT NULL, "download_bandwidth" integer NOT NULL, "last_login" bigint NOT NULL, "filters" text NULL,
  49. "filesystem" text NULL, "additional_info" text NULL, "created_at" bigint NOT NULL, "updated_at" bigint NOT NULL,
  50. "email" varchar(255) NULL);
  51. CREATE TABLE "{{folders_mapping}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "virtual_path" text NOT NULL,
  52. "quota_size" bigint NOT NULL, "quota_files" integer NOT NULL, "folder_id" integer NOT NULL REFERENCES "{{folders}}" ("id")
  53. ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, "user_id" integer NOT NULL REFERENCES "{{users}}" ("id") ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED,
  54. CONSTRAINT "{{prefix}}unique_mapping" UNIQUE ("user_id", "folder_id"));
  55. CREATE TABLE "{{shares}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "share_id" varchar(60) NOT NULL UNIQUE,
  56. "name" varchar(255) NOT NULL, "description" varchar(512) NULL, "scope" integer NOT NULL, "paths" text NOT NULL,
  57. "created_at" bigint NOT NULL, "updated_at" bigint NOT NULL, "last_use_at" bigint NOT NULL, "expires_at" bigint NOT NULL,
  58. "password" text NULL, "max_tokens" integer NOT NULL, "used_tokens" integer NOT NULL, "allow_from" text NULL,
  59. "user_id" integer NOT NULL REFERENCES "{{users}}" ("id") ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED);
  60. CREATE TABLE "{{api_keys}}" ("id" integer NOT NULL PRIMARY KEY AUTOINCREMENT, "name" varchar(255) NOT NULL,
  61. "key_id" varchar(50) NOT NULL UNIQUE, "api_key" varchar(255) NOT NULL UNIQUE, "scope" integer NOT NULL,
  62. "created_at" bigint NOT NULL, "updated_at" bigint NOT NULL, "last_use_at" bigint NOT NULL, "expires_at" bigint NOT NULL,
  63. "description" text NULL, "admin_id" integer NULL REFERENCES "{{admins}}" ("id") ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED,
  64. "user_id" integer NULL REFERENCES "{{users}}" ("id") ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED);
  65. CREATE INDEX "{{prefix}}folders_mapping_folder_id_idx" ON "{{folders_mapping}}" ("folder_id");
  66. CREATE INDEX "{{prefix}}folders_mapping_user_id_idx" ON "{{folders_mapping}}" ("user_id");
  67. CREATE INDEX "{{prefix}}api_keys_admin_id_idx" ON "{{api_keys}}" ("admin_id");
  68. CREATE INDEX "{{prefix}}api_keys_user_id_idx" ON "{{api_keys}}" ("user_id");
  69. CREATE INDEX "{{prefix}}users_updated_at_idx" ON "{{users}}" ("updated_at");
  70. CREATE INDEX "{{prefix}}shares_user_id_idx" ON "{{shares}}" ("user_id");
  71. CREATE INDEX "{{prefix}}defender_hosts_updated_at_idx" ON "{{defender_hosts}}" ("updated_at");
  72. CREATE INDEX "{{prefix}}defender_hosts_ban_time_idx" ON "{{defender_hosts}}" ("ban_time");
  73. CREATE INDEX "{{prefix}}defender_events_date_time_idx" ON "{{defender_events}}" ("date_time");
  74. CREATE INDEX "{{prefix}}defender_events_host_id_idx" ON "{{defender_events}}" ("host_id");
  75. INSERT INTO {{schema_version}} (version) VALUES (15);
  76. `
  77. )
  78. // SQLiteProvider defines the auth provider for SQLite database
  79. type SQLiteProvider struct {
  80. dbHandle *sql.DB
  81. }
  82. func init() {
  83. version.AddFeature("+sqlite")
  84. }
  85. func initializeSQLiteProvider(basePath string) error {
  86. var err error
  87. var connectionString string
  88. if config.ConnectionString == "" {
  89. dbPath := config.Name
  90. if !util.IsFileInputValid(dbPath) {
  91. return fmt.Errorf("invalid database path: %#v", dbPath)
  92. }
  93. if !filepath.IsAbs(dbPath) {
  94. dbPath = filepath.Join(basePath, dbPath)
  95. }
  96. connectionString = fmt.Sprintf("file:%v?cache=shared&_foreign_keys=1", dbPath)
  97. } else {
  98. connectionString = config.ConnectionString
  99. }
  100. dbHandle, err := sql.Open("sqlite3", connectionString)
  101. if err == nil {
  102. providerLog(logger.LevelDebug, "sqlite database handle created, connection string: %#v", connectionString)
  103. dbHandle.SetMaxOpenConns(1)
  104. provider = &SQLiteProvider{dbHandle: dbHandle}
  105. } else {
  106. providerLog(logger.LevelError, "error creating sqlite database handler, connection string: %#v, error: %v",
  107. connectionString, err)
  108. }
  109. return err
  110. }
  111. func (p *SQLiteProvider) checkAvailability() error {
  112. return sqlCommonCheckAvailability(p.dbHandle)
  113. }
  114. func (p *SQLiteProvider) validateUserAndPass(username, password, ip, protocol string) (User, error) {
  115. return sqlCommonValidateUserAndPass(username, password, ip, protocol, p.dbHandle)
  116. }
  117. func (p *SQLiteProvider) validateUserAndTLSCert(username, protocol string, tlsCert *x509.Certificate) (User, error) {
  118. return sqlCommonValidateUserAndTLSCertificate(username, protocol, tlsCert, p.dbHandle)
  119. }
  120. func (p *SQLiteProvider) validateUserAndPubKey(username string, publicKey []byte) (User, string, error) {
  121. return sqlCommonValidateUserAndPubKey(username, publicKey, p.dbHandle)
  122. }
  123. func (p *SQLiteProvider) updateQuota(username string, filesAdd int, sizeAdd int64, reset bool) error {
  124. return sqlCommonUpdateQuota(username, filesAdd, sizeAdd, reset, p.dbHandle)
  125. }
  126. func (p *SQLiteProvider) getUsedQuota(username string) (int, int64, error) {
  127. return sqlCommonGetUsedQuota(username, p.dbHandle)
  128. }
  129. func (p *SQLiteProvider) setUpdatedAt(username string) {
  130. sqlCommonSetUpdatedAt(username, p.dbHandle)
  131. }
  132. func (p *SQLiteProvider) updateLastLogin(username string) error {
  133. return sqlCommonUpdateLastLogin(username, p.dbHandle)
  134. }
  135. func (p *SQLiteProvider) updateAdminLastLogin(username string) error {
  136. return sqlCommonUpdateAdminLastLogin(username, p.dbHandle)
  137. }
  138. func (p *SQLiteProvider) userExists(username string) (User, error) {
  139. return sqlCommonGetUserByUsername(username, p.dbHandle)
  140. }
  141. func (p *SQLiteProvider) addUser(user *User) error {
  142. return sqlCommonAddUser(user, p.dbHandle)
  143. }
  144. func (p *SQLiteProvider) updateUser(user *User) error {
  145. return sqlCommonUpdateUser(user, p.dbHandle)
  146. }
  147. func (p *SQLiteProvider) deleteUser(user *User) error {
  148. return sqlCommonDeleteUser(user, p.dbHandle)
  149. }
  150. func (p *SQLiteProvider) dumpUsers() ([]User, error) {
  151. return sqlCommonDumpUsers(p.dbHandle)
  152. }
  153. // SQLite provider cannot be shared, so we always return no recently updated users
  154. func (p *SQLiteProvider) getRecentlyUpdatedUsers(after int64) ([]User, error) {
  155. return nil, nil
  156. }
  157. func (p *SQLiteProvider) getUsers(limit int, offset int, order string) ([]User, error) {
  158. return sqlCommonGetUsers(limit, offset, order, p.dbHandle)
  159. }
  160. func (p *SQLiteProvider) dumpFolders() ([]vfs.BaseVirtualFolder, error) {
  161. return sqlCommonDumpFolders(p.dbHandle)
  162. }
  163. func (p *SQLiteProvider) getFolders(limit, offset int, order string) ([]vfs.BaseVirtualFolder, error) {
  164. return sqlCommonGetFolders(limit, offset, order, p.dbHandle)
  165. }
  166. func (p *SQLiteProvider) getFolderByName(name string) (vfs.BaseVirtualFolder, error) {
  167. ctx, cancel := context.WithTimeout(context.Background(), defaultSQLQueryTimeout)
  168. defer cancel()
  169. return sqlCommonGetFolderByName(ctx, name, p.dbHandle)
  170. }
  171. func (p *SQLiteProvider) addFolder(folder *vfs.BaseVirtualFolder) error {
  172. return sqlCommonAddFolder(folder, p.dbHandle)
  173. }
  174. func (p *SQLiteProvider) updateFolder(folder *vfs.BaseVirtualFolder) error {
  175. return sqlCommonUpdateFolder(folder, p.dbHandle)
  176. }
  177. func (p *SQLiteProvider) deleteFolder(folder *vfs.BaseVirtualFolder) error {
  178. return sqlCommonDeleteFolder(folder, p.dbHandle)
  179. }
  180. func (p *SQLiteProvider) updateFolderQuota(name string, filesAdd int, sizeAdd int64, reset bool) error {
  181. return sqlCommonUpdateFolderQuota(name, filesAdd, sizeAdd, reset, p.dbHandle)
  182. }
  183. func (p *SQLiteProvider) getUsedFolderQuota(name string) (int, int64, error) {
  184. return sqlCommonGetFolderUsedQuota(name, p.dbHandle)
  185. }
  186. func (p *SQLiteProvider) adminExists(username string) (Admin, error) {
  187. return sqlCommonGetAdminByUsername(username, p.dbHandle)
  188. }
  189. func (p *SQLiteProvider) addAdmin(admin *Admin) error {
  190. return sqlCommonAddAdmin(admin, p.dbHandle)
  191. }
  192. func (p *SQLiteProvider) updateAdmin(admin *Admin) error {
  193. return sqlCommonUpdateAdmin(admin, p.dbHandle)
  194. }
  195. func (p *SQLiteProvider) deleteAdmin(admin *Admin) error {
  196. return sqlCommonDeleteAdmin(admin, p.dbHandle)
  197. }
  198. func (p *SQLiteProvider) getAdmins(limit int, offset int, order string) ([]Admin, error) {
  199. return sqlCommonGetAdmins(limit, offset, order, p.dbHandle)
  200. }
  201. func (p *SQLiteProvider) dumpAdmins() ([]Admin, error) {
  202. return sqlCommonDumpAdmins(p.dbHandle)
  203. }
  204. func (p *SQLiteProvider) validateAdminAndPass(username, password, ip string) (Admin, error) {
  205. return sqlCommonValidateAdminAndPass(username, password, ip, p.dbHandle)
  206. }
  207. func (p *SQLiteProvider) apiKeyExists(keyID string) (APIKey, error) {
  208. return sqlCommonGetAPIKeyByID(keyID, p.dbHandle)
  209. }
  210. func (p *SQLiteProvider) addAPIKey(apiKey *APIKey) error {
  211. return sqlCommonAddAPIKey(apiKey, p.dbHandle)
  212. }
  213. func (p *SQLiteProvider) updateAPIKey(apiKey *APIKey) error {
  214. return sqlCommonUpdateAPIKey(apiKey, p.dbHandle)
  215. }
  216. func (p *SQLiteProvider) deleteAPIKey(apiKey *APIKey) error {
  217. return sqlCommonDeleteAPIKey(apiKey, p.dbHandle)
  218. }
  219. func (p *SQLiteProvider) getAPIKeys(limit int, offset int, order string) ([]APIKey, error) {
  220. return sqlCommonGetAPIKeys(limit, offset, order, p.dbHandle)
  221. }
  222. func (p *SQLiteProvider) dumpAPIKeys() ([]APIKey, error) {
  223. return sqlCommonDumpAPIKeys(p.dbHandle)
  224. }
  225. func (p *SQLiteProvider) updateAPIKeyLastUse(keyID string) error {
  226. return sqlCommonUpdateAPIKeyLastUse(keyID, p.dbHandle)
  227. }
  228. func (p *SQLiteProvider) shareExists(shareID, username string) (Share, error) {
  229. return sqlCommonGetShareByID(shareID, username, p.dbHandle)
  230. }
  231. func (p *SQLiteProvider) addShare(share *Share) error {
  232. return sqlCommonAddShare(share, p.dbHandle)
  233. }
  234. func (p *SQLiteProvider) updateShare(share *Share) error {
  235. return sqlCommonUpdateShare(share, p.dbHandle)
  236. }
  237. func (p *SQLiteProvider) deleteShare(share *Share) error {
  238. return sqlCommonDeleteShare(share, p.dbHandle)
  239. }
  240. func (p *SQLiteProvider) getShares(limit int, offset int, order, username string) ([]Share, error) {
  241. return sqlCommonGetShares(limit, offset, order, username, p.dbHandle)
  242. }
  243. func (p *SQLiteProvider) dumpShares() ([]Share, error) {
  244. return sqlCommonDumpShares(p.dbHandle)
  245. }
  246. func (p *SQLiteProvider) updateShareLastUse(shareID string, numTokens int) error {
  247. return sqlCommonUpdateShareLastUse(shareID, numTokens, p.dbHandle)
  248. }
  249. func (p *SQLiteProvider) getDefenderHosts(from int64, limit int) ([]*DefenderEntry, error) {
  250. return sqlCommonGetDefenderHosts(from, limit, p.dbHandle)
  251. }
  252. func (p *SQLiteProvider) getDefenderHostByIP(ip string, from int64) (*DefenderEntry, error) {
  253. return sqlCommonGetDefenderHostByIP(ip, from, p.dbHandle)
  254. }
  255. func (p *SQLiteProvider) isDefenderHostBanned(ip string) (*DefenderEntry, error) {
  256. return sqlCommonIsDefenderHostBanned(ip, p.dbHandle)
  257. }
  258. func (p *SQLiteProvider) updateDefenderBanTime(ip string, minutes int) error {
  259. return sqlCommonDefenderIncrementBanTime(ip, minutes, p.dbHandle)
  260. }
  261. func (p *SQLiteProvider) deleteDefenderHost(ip string) error {
  262. return sqlCommonDeleteDefenderHost(ip, p.dbHandle)
  263. }
  264. func (p *SQLiteProvider) addDefenderEvent(ip string, score int) error {
  265. return sqlCommonAddDefenderHostAndEvent(ip, score, p.dbHandle)
  266. }
  267. func (p *SQLiteProvider) setDefenderBanTime(ip string, banTime int64) error {
  268. return sqlCommonSetDefenderBanTime(ip, banTime, p.dbHandle)
  269. }
  270. func (p *SQLiteProvider) cleanupDefender(from int64) error {
  271. return sqlCommonDefenderCleanup(from, p.dbHandle)
  272. }
  273. func (p *SQLiteProvider) close() error {
  274. return p.dbHandle.Close()
  275. }
  276. func (p *SQLiteProvider) reloadConfig() error {
  277. return nil
  278. }
  279. // initializeDatabase creates the initial database structure
  280. func (p *SQLiteProvider) initializeDatabase() error {
  281. dbVersion, err := sqlCommonGetDatabaseVersion(p.dbHandle, false)
  282. if err == nil && dbVersion.Version > 0 {
  283. return ErrNoInitRequired
  284. }
  285. if errors.Is(err, sql.ErrNoRows) {
  286. return errSchemaVersionEmpty
  287. }
  288. logger.InfoToConsole("creating initial database schema, version 15")
  289. providerLog(logger.LevelInfo, "creating initial database schema, version 15")
  290. initialSQL := strings.ReplaceAll(sqliteInitialSQL, "{{schema_version}}", sqlTableSchemaVersion)
  291. initialSQL = strings.ReplaceAll(initialSQL, "{{admins}}", sqlTableAdmins)
  292. initialSQL = strings.ReplaceAll(initialSQL, "{{folders}}", sqlTableFolders)
  293. initialSQL = strings.ReplaceAll(initialSQL, "{{users}}", sqlTableUsers)
  294. initialSQL = strings.ReplaceAll(initialSQL, "{{folders_mapping}}", sqlTableFoldersMapping)
  295. initialSQL = strings.ReplaceAll(initialSQL, "{{api_keys}}", sqlTableAPIKeys)
  296. initialSQL = strings.ReplaceAll(initialSQL, "{{shares}}", sqlTableShares)
  297. initialSQL = strings.ReplaceAll(initialSQL, "{{defender_events}}", sqlTableDefenderEvents)
  298. initialSQL = strings.ReplaceAll(initialSQL, "{{defender_hosts}}", sqlTableDefenderHosts)
  299. initialSQL = strings.ReplaceAll(initialSQL, "{{prefix}}", config.SQLTablesPrefix)
  300. return sqlCommonExecSQLAndUpdateDBVersion(p.dbHandle, []string{initialSQL}, 15)
  301. }
  302. func (p *SQLiteProvider) migrateDatabase() error {
  303. dbVersion, err := sqlCommonGetDatabaseVersion(p.dbHandle, true)
  304. if err != nil {
  305. return err
  306. }
  307. switch version := dbVersion.Version; {
  308. case version == sqlDatabaseVersion:
  309. providerLog(logger.LevelDebug, "sql database is up to date, current version: %v", version)
  310. return ErrNoInitRequired
  311. case version < 15:
  312. err = fmt.Errorf("database version %v is too old, please see the upgrading docs", version)
  313. providerLog(logger.LevelError, "%v", err)
  314. logger.ErrorToConsole("%v", err)
  315. return err
  316. default:
  317. if version > sqlDatabaseVersion {
  318. providerLog(logger.LevelError, "database version %v is newer than the supported one: %v", version,
  319. sqlDatabaseVersion)
  320. logger.WarnToConsole("database version %v is newer than the supported one: %v", version,
  321. sqlDatabaseVersion)
  322. return nil
  323. }
  324. return fmt.Errorf("database version not handled: %v", version)
  325. }
  326. }
  327. func (p *SQLiteProvider) revertDatabase(targetVersion int) error {
  328. dbVersion, err := sqlCommonGetDatabaseVersion(p.dbHandle, true)
  329. if err != nil {
  330. return err
  331. }
  332. if dbVersion.Version == targetVersion {
  333. return errors.New("current version match target version, nothing to do")
  334. }
  335. switch dbVersion.Version {
  336. default:
  337. return fmt.Errorf("database version not handled: %v", dbVersion.Version)
  338. }
  339. }
  340. func (p *SQLiteProvider) resetDatabase() error {
  341. sql := strings.ReplaceAll(sqliteResetSQL, "{{schema_version}}", sqlTableSchemaVersion)
  342. sql = strings.ReplaceAll(sql, "{{admins}}", sqlTableAdmins)
  343. sql = strings.ReplaceAll(sql, "{{folders}}", sqlTableFolders)
  344. sql = strings.ReplaceAll(sql, "{{users}}", sqlTableUsers)
  345. sql = strings.ReplaceAll(sql, "{{folders_mapping}}", sqlTableFoldersMapping)
  346. sql = strings.ReplaceAll(sql, "{{api_keys}}", sqlTableAPIKeys)
  347. sql = strings.ReplaceAll(sql, "{{shares}}", sqlTableShares)
  348. sql = strings.ReplaceAll(sql, "{{defender_events}}", sqlTableDefenderEvents)
  349. sql = strings.ReplaceAll(sql, "{{defender_hosts}}", sqlTableDefenderHosts)
  350. return sqlCommonExecSQLAndUpdateDBVersion(p.dbHandle, []string{sql}, 0)
  351. }
  352. /*func setPragmaFK(dbHandle *sql.DB, value string) error {
  353. ctx, cancel := context.WithTimeout(context.Background(), longSQLQueryTimeout)
  354. defer cancel()
  355. sql := fmt.Sprintf("PRAGMA foreign_keys=%v;", value)
  356. _, err := dbHandle.ExecContext(ctx, sql)
  357. return err
  358. }*/