1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-11-26 16:09:27 -05:00
denoland-deno/ext/kv
2023-10-04 21:42:17 +02:00
..
proto feat(ext/kv): support key expiration in remote backend (#20688) 2023-09-27 13:34:09 +08:00
01_db.ts fix(kv_queues): graceful shutdown (#20627) 2023-09-26 20:06:57 -07:00
build.rs feat(ext/kv): connect to remote database (#20178) 2023-08-22 13:56:00 +08:00
Cargo.toml fix(ext/kv): send queue wake messages accross different kv instances (#20465) 2023-09-29 11:40:36 -07:00
codec.rs fix(ext/kv): reverse mapping between AnyValue::Bool and KeyPart::Bool (#18365) 2023-03-22 21:53:16 +01:00
dynamic.rs fix(kv_queues): graceful shutdown (#20627) 2023-09-26 20:06:57 -07:00
interface.rs fix(kv_queues): graceful shutdown (#20627) 2023-09-26 20:06:57 -07:00
lib.rs refactor: use deno_core::FeatureChecker for unstable checks (#20765) 2023-10-04 21:42:17 +02:00
README.md feat(ext/kv): connect to remote database (#20178) 2023-08-22 13:56:00 +08:00
remote.rs feat(ext/kv): support key expiration in remote backend (#20688) 2023-09-27 13:34:09 +08:00
sqlite.rs fix(ext/kv): send queue wake messages accross different kv instances (#20465) 2023-09-29 11:40:36 -07:00

deno_kv

This crate provides a key/value store for Deno. For an overview of Deno KV, please read the manual.

Storage Backends

Deno KV has a pluggable storage interface that supports multiple backends:

  • SQLite - backed by a local SQLite database. This backend is suitable for development and is the default when running locally.
  • Remote - backed by a remote service that implements the KV Connect protocol, for example Deno Deploy.

Additional backends can be added by implementing the DatabaseHandler trait.

KV Connect

The KV Connect protocol has separate control and data planes to maximize throughput and minimize latency. Metadata Exchange and Data Path are the two sub-protocols that are used when talking to a KV Connect-compatible service.

Metadata Exchange

To connect to a KV Connect service, the user provides an HTTP or HTTPS URL to Deno.openKv. A background task is then spawned to periodically make HTTP POST requests to the provided URL to refresh database metadata.

The HTTP Authorization header is included and have the format Bearer <access-token>. The <access-token> is a static token issued by the service provider. For Deno Deploy, this is the personal access token generated from the dashboard. You can specify the access token with the environment variable DENO_KV_ACCESS_TOKEN.

Request body is currently unused. The response is a JSON message that satisfies the JSON Schema definition in cli/schemas/kv-metadata-exchange-response.v1.json.

Semantics of the response fields:

  • version: Protocol version. The only supported value is 1.
  • databaseId: UUID of the database.
  • endpoints: Data plane endpoints that can serve requests to the database, along with their consistency levels.
  • token: An ephemeral authentication token that must be included in all requests to the data plane. This value is an opaque string and the client should not depend on its format.
  • expiresAt: The time at which the token expires. Encoded as an ISO 8601 string.

Data Path

After the first metadata exchange has completed, the client can talk to the data plane endpoints listed in the endpoints field using a Protobuf-over-HTTP protocol called the Data Path. The Protobuf messages are defined in proto/datapath.proto.

Two sub-endpoints are available under a data plane endpoint URL:

  • POST /snapshot_read: Used for read operations: kv.get() and kv.getMany().
    • Request type: SnapshotRead
    • Response type: SnapshotReadOutput
  • POST /atomic_write: Used for write operations: kv.set() and kv.atomic().commit().
    • Request type: AtomicWrite
    • Response type: AtomicWriteOutput

An HTTP Authorization header in the format Bearer <ephemeral-token> must be included in all requests to the data plane. The value of <ephemeral-token> is the token field from the metadata exchange response.

Error handling

All non-client errors (i.e. network errors and HTTP 5xx status codes) are handled by retrying the request. Randomized exponential backoff is applied to each retry.

Client errors cannot be recovered by retrying. A JavaScript exception is generated for each of those errors.