Syncstorage-rs
Mozilla’s Sync provides a secure method for users to synchronize their data across Mozilla applications (like Firefox) using a Mozilla account. This project encapsulates the backend of the Sync service. It can be run using either a Postgres, Spanner, or MySQL database backend.
Sync operates by storing a combined version of your data on a remote server, which then synchronizes with the local Firefox copy across all your signed-in instances (referred to as connected devices, linked through a Mozilla account).
Get up and Running
To get up and running quickly, see Run Your Own Sync with Docker for instructions on deploying with Docker.
For a complete list of available configuration options you’ll need to consider, see the Configuration reference.
Below are detailed instructions for other setup configurations, including bootstrapping and migration instructions for Postgres, MySQL, and using the Google Spanner Emulator.
Mozilla Sync Storage built with Rust. Our documentation is generated using mdBook and published to GitHub Pages.
Initial Setup - Bootstrapping
General PostgreSQL Setup
Syncstorage-rs supports PostgreSQL as a database backend. The database connection is specified with a DSN like:
postgres://_user_:_password_@_host_/_database_
This DSN is then used for the SYNC_TOKENSERVER__DATABASE_URL & SYNC_SYNCSTORAGE__DATABASE_URL URLs.
These values are environment variables set for the application. You can view all configurations and environment variables in the Configuration documentation, specifically SYNC_TOKENSERVER__DATABASE_URL and SYNC_SYNCSTORAGE__DATABASE_URL.
Use your preferred methods, however here are some general instructions on how to setup a fresh PostgreSQL database and user:
-
First make sure you have a PostgreSQL server running. On most systems, you can start it with:
# On macOS with Homebrew brew services start postgresql # On Ubuntu/Debian sudo systemctl start postgresql -
Create the databases using
createdb:createdb -U postgres syncstorage createdb -U postgres tokenserver -
Connect to PostgreSQL to create a user and grant privileges:
psql -U postgres -d syncstorage -
Run the following SQL statements:
CREATE USER sample_user WITH PASSWORD 'sample_password'; GRANT ALL PRIVILEGES ON DATABASE syncstorage TO sample_user; GRANT ALL PRIVILEGES ON DATABASE tokenserver TO sample_user;
Connection pattern: The general pattern for connecting to a PostgreSQL database is:
psql -d database_name -U username
The -d flag is a shorter alternative for --dbname while -U is an alternative for --username.
Environment configuration: You can optionally create a .env file with your database URL:
echo "DATABASE_URL=postgres://sample_user:sample_password@localhost/syncstorage" > .env
Or manually create the file:
touch .env
And add:
DATABASE_URL=postgres://sample_user:sample_password@localhost/syncstorage
Important Note about .env files:
We don’t tend to use the .env configuration in the production version of Sync, but for some choosing to self host, the .env solution may be useful. The .env file serves different purposes depending on the context:
-
For Diesel CLI migrations: Diesel automatically reads
DATABASE_URLfrom a.envfile in the current directory. When running migrations fromtokenserver-postgres/orsyncstorage-postgres/, you can create a.envfile in that specific directory with the appropriate database URL. This allows you to rundiesel migration runwithout the--database-urlflag. -
For running the application: The syncstorage-rs application uses prefixed environment variables:
SYNC_TOKENSERVER__DATABASE_URLfor the tokenserver databaseSYNC_SYNCSTORAGE__DATABASE_URLfor the syncstorage database
These can also be set in a
.envfile at the project root.
Example .env file for the application (at project root):
SYNC_TOKENSERVER__DATABASE_URL=postgres://sample_user:sample_password@localhost/tokenserver
SYNC_SYNCSTORAGE__DATABASE_URL=postgres://sample_user:sample_password@localhost/syncstorage
Example .env file for diesel migrations (in tokenserver-postgres/ directory):
DATABASE_URL=postgres://sample_user:sample_password@localhost/tokenserver
Example .env file for diesel migrations (in syncstorage-postgres/ directory):
DATABASE_URL=postgres://sample_user:sample_password@localhost/syncstorage
Bootstrapping Tokenserver (Postgres)
Tokenserver includes migrations to initialize its database, but they do not run by default. These can be enabled via the setting:
SYNC_TOKENSERVER__RUN_MIGRATIONS=true
Once you have created and defined your database, copy the URL.
SYNC_TOKENSERVER__DATABASE_URL=postgres://<DB URL>
Running Migrations Manually for Tokenserver
If you prefer to run migrations manually instead of using SYNC_TOKENSERVER__RUN_MIGRATIONS=true, you can use Diesel CLI:
Prerequisites:
-
Install diesel_cli with PostgreSQL support:
cargo install diesel_cli --no-default-features --features postgres -
Optional: Install diesel_cli_ext for additional features (schema/model generation):
cargo install diesel_cli_extFor more information on diesel_cli_ext, see the diesel_cli_ext repository.
Running Migrations:
The migrations are located in the tokenserver-postgres/migrations directory. To run them:
cd tokenserver-postgres
diesel migration run --database-url="postgres://<DB URL>"
Alternatively, if you’ve set the DATABASE_URL environment variable:
cd tokenserver-postgres
export DATABASE_URL="postgres://<DB URL>"
diesel migration run
Undoing Migrations:
To undo the last migration:
cd tokenserver-postgres
diesel migration redo --database-url="postgres://<DB URL>"
Note: The diesel.toml configuration file in the tokenserver-postgres directory specifies the migrations directory path and schema generation settings.
Note: We have automated support for this in Tokenserver, however the manual query that must run for Tokenserver is as follows:
After migrations run, insert a node entry:
INSERT INTO nodes (id, service, node, available, current_load, capacity, downed, backoff)
VALUES (1, 1, 'https://<SYNCSTORAGE URL HERE>', 100000, 0, 100000, 0, 0)
ON CONFLICT DO NOTHING;
Bootstrapping Syncstorage (Postgres)
Syncstorage includes migrations to initialize its database. These run by default (unlike Tokenserver).
Configure the database URL:
SYNC_SYNCSTORAGE__DATABASE_URL=postgres://<DB URL>
Running Migrations Manually for Syncstorage
If you need to run Syncstorage migrations manually, you can use Diesel CLI:
Prerequisites: Install diesel_cli with PostgreSQL support (if not already installed):
cargo install diesel_cli --no-default-features --features postgres
Running Migrations:
The migrations are located in the syncstorage-postgres/migrations directory. To run them:
cd syncstorage-postgres
diesel migration run --database-url="postgres://<DB URL>"
Or with the DATABASE_URL environment variable:
cd syncstorage-postgres
export DATABASE_URL="postgres://<DB URL>"
diesel migration run
Undoing Migrations:
To undo the last migration:
cd syncstorage-postgres
diesel migration redo --database-url="postgres://<DB URL>"
Note: Both syncstorage-postgres and tokenserver-postgres directories contain their own diesel.toml configuration files and separate migrations directories. Each must be run from its respective directory.
Bootstrapping Tokenserver (MySQL)
Tokenserver includes migrations to initialize its database, but they do not run by default. These can be enabled via the setting:
SYNC_TOKENSERVER__RUN_MIGRATIONS=true
NOTE: These migrations don’t run with any locking (at least on MySQL), it’s probably safest to limit the node count to 1 during the first run.
After migrations run, insert service and node entries:
INSERT INTO services (id, service, pattern)
VALUES (1, 'sync-1.5', '{node}/1.5/{uid}');
INSERT IGNORE INTO nodes (id, service, node, available, current_load, capacity, downed, backoff)
VALUES (1, 1, 'https://ent-dev.sync.nonprod.webservices.mozgcp.net', 100, 0, 100, 0, 0);
Bootstrapping Syncstorage (Cloud Spanner)
Syncstorage does not support initializing Cloud Spanner instances; this must be done manually. It does support initializing its MySQL backend and will support initializing the PostgreSQL backend in the future.
The schema DDL is available here: schema.ddl
We include a basic script to create an instance and initialize the schema via Spanner’s REST API: prepare-spanner.sh. This script is currently oriented to run against Cloud Spanner emulators, but it may be adapted to run against a real Spanner database.
System Requirements
- cmake (>= 3.5 and < 3.30)
- gcc
- golang
- libcurl4-openssl-dev
- libssl-dev
- make
- pkg-config
- Rust stable
- python 3.9+
- MySQL 8.0 (or compatible)
- libmysqlclient (
brew install mysqlon macOS,apt install libmysqlclient-devon Ubuntu,apt install libmariadb-dev-compaton Debian)
- libmysqlclient (
Depending on your OS, you may also need to install libgrpcdev,
and protobuf-compiler-grpc. Note: if the code complies cleanly,
but generates a Segmentation Fault within Sentry init, you probably
are missing libcurl4-openssl-dev.
Local Setup
-
Follow the instructions below to use either MySQL or Spanner as your DB.
-
Now
cp config/local.example.toml config/local.toml. Openconfig/local.tomland make sure you have the desired settings configured. For a complete list of available configuration options, check out docs/config.md. -
To start a local server in debug mode, run either:
make run_mysqlif using MySQL or,make run_spannerif using spanner.
The above starts the server in debug mode, using your new
local.tomlfile for config options. Or, simplycargo runwith your own config options provided as env vars. -
Visit
http://localhost:8000/__heartbeat__to make sure the server is running.
MySQL
Durable sync needs only a valid mysql DSN in order to set up connections to a MySQL database. The database can be local and is usually specified with a DSN like:
mysql://_user_:_password_@_host_/_database_
To setup a fresh MySQL DB and user:
- First make sure that you have a MySQL server running, to do that run:
mysqld - Then, run the following to launch a mysql shell
mysql -u root - Finally, run each of the following SQL statements
CREATE USER "sample_user"@"localhost" IDENTIFIED BY "sample_password";
CREATE DATABASE syncstorage_rs;
CREATE DATABASE tokenserver_rs;
GRANT ALL PRIVILEGES on syncstorage_rs.* to sample_user@localhost;
GRANT ALL PRIVILEGES on tokenserver_rs.* to sample_user@localhost;
Note that if you are running MySQL with Docker and encountered a socket connection error, change the MySQL DSN from localhost to 127.0.0.1 to use a TCP connection.
Spanner
Authenticating via OAuth
The correct way to authenticate with Spanner is by generating an OAuth token and pointing your local application server to the token. In order for this to work, your Google Cloud account must have the correct permissions; contact the Ops team to ensure the correct permissions are added to your account.
First, install the Google Cloud command-line interface by following the instructions for your operating system here. Next, run the following to log in with your Google account (this should be the Google account associated with your Mozilla LDAP credentials):
gcloud auth application-default login
The above command will prompt you to visit a webpage in your browser to complete the login process. Once completed, ensure that a file called application_default_credentials.json has been created in the appropriate directory (on Linux, this directory is $HOME/.config/gcloud/). The Google Cloud SDK knows to check this location for your credentials, so no further configuration is needed.
Key Revocation
Accidents happen, and you may need to revoke the access of a set of credentials if they have been publicly leaked. To do this, run:
gcloud auth application-default revoke
This will revoke the access of the credentials currently stored in the application_default_credentials.json file. If the file in that location does not contain the leaked credentials, you will need to copy the file containing the leaked credentials to that location and re-run the above command. You can ensure that the leaked credentials are no longer active by attempting to connect to Spanner using the credentials. If access has been revoked, your application server should print an error saying that the token has expired or has been revoked.
Authenticating via Service Account
An alternative to authentication via application default credentials is authentication via a service account. Note that this method of authentication is not recommended. Service accounts are intended to be used by other applications or virtual machines and not people. See this article for more information.
Your system administrator will be able to tell you which service account keys have access to the Spanner instance to which you are trying to connect. Once you are given the email identifier of an active key, log into the Google Cloud Console Service Accounts page. Be sure to select the correct project.
- Locate the email identifier of the access key and pick the vertical dot menu at the far right of the row.
- Select “Create Key” from the pop-up menu.
- Select “JSON” from the Dialog Box.
A proper key file will be downloaded to your local directory. It’s important to safeguard that key file. For this example, we’re going to name the file
service-account.json.
The proper key file is in JSON format. An example file is provided below, with private information replaced by “...”
{
"type": "service_account",
"project_id": "...",
"private_key_id": "...",
"private_key": "...",
"client_email": "...",
"client_id": "...",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
"client_x509_cert_url": "..."
}
Note that the name service-account.json must be exactly correct to be ignored by .gitignore.
Connecting to Spanner
To point to a GCP-hosted Spanner instance from your local machine, follow these steps:
- Authenticate via either of the two methods outlined above.
- Open
local.tomland replacedatabase_urlwith a link to your spanner instance. - Open the Makefile and ensure you’ve correctly set you
PATH_TO_GRPC_CERT. make run_spanner.- Visit
http://localhost:8000/__heartbeat__to make sure the server is running.
Note, that unlike MySQL, there is no automatic migrations facility. Currently, the Spanner schema must be hand edited and modified.
Emulator
Google supports an in-memory Spanner emulator, which can run on your local machine for development purposes. You can install the emulator via the gcloud CLI or Docker by following the instructions here. Once the emulator is running, you’ll need to create a new instance and a new database.
Quick Setup Using prepare-spanner.sh
The easiest way to set up a Spanner emulator database is to use the prepare-spanner.sh script:
SYNC_SYNCSTORAGE__SPANNER_EMULATOR_HOST=localhost:9020 ./scripts/prepare-spanner.sh
This script will automatically:
- Create a test instance (
test-instance) on a test project (test-project) - Create a test database (
test-database) with the schema fromschema.ddl - Apply all DDL statements to set up the database structure
The script looks for schema.ddl in either the current directory or in syncstorage-spanner/src/. Make sure the SYNC_SYNCSTORAGE__SPANNER_EMULATOR_HOST environment variable points to your emulator’s REST API endpoint (typically localhost:9020).
After running the script, make sure that the database_url config variable in your local.toml file reflects the created database (i.e. spanner://projects/test-project/instances/test-instance/databases/test-database).
To run an application server that points to the local Spanner emulator:
SYNC_SYNCSTORAGE__SPANNER_EMULATOR_HOST=localhost:9010 make run_spanner
Manual Setup Using curl
If you prefer to manually create the instance and database, or need custom project/instance/database names, you can use the REST API directly. The Spanner emulator exposes a REST API on port 9020. To create an instance, use curl:
curl --request POST \
"localhost:9020/v1/projects/$PROJECT_ID/instances" \
--header 'Accept: application/json' \
--header 'Content-Type: application/json' \
--data "{\"instance\":{\"config\":\"emulator-test-config\",\"nodeCount\":1,\"displayName\":\"Test Instance\"},\"instanceId\":\"$INSTANCE_ID\"}"
Note that you may set PROJECT_ID and INSTANCE_ID to your liking. To create a new database on this instance, you’ll need to include information about the database schema. Since we don’t have migrations for Spanner, we keep an up-to-date schema in src/db/spanner/schema.ddl. The jq utility allows us to parse this file for use in the JSON body of an HTTP POST request:
DDL_STATEMENTS=$(
grep -v ^-- schema.ddl \
| sed -n 's/ \+/ /gp' \
| tr -d '\n' \
| sed 's/\(.*\);/\1/' \
| jq -R -s -c 'split(";")'
)
This command:
- Filters out SQL comments (lines starting with
--) - Normalizes whitespace
- Removes newlines to create a single line
- Removes the trailing semicolon from the concatenated string
- Splits the DDL statements back into an array using
jq
Finally, to create the database:
curl -sS --request POST \
"localhost:9020/v1/projects/$PROJECT_ID/instances/$INSTANCE_ID/databases" \
--header 'Accept: application/json' \
--header 'Content-Type: application/json' \
--data "{\"createStatement\":\"CREATE DATABASE \`$DATABASE_ID\`\",\"extraStatements\":$DDL_STATEMENTS}"
Note that, again, you may set DATABASE_ID to your liking. Make sure that the database_url config variable in your local.toml file reflects your choice of project name, instance name, and database name (i.e. it should be of the format spanner://projects/<your project ID here>/instances/<your instance ID here>/databases/<your database ID here>).
To run the application server that points to the local Spanner emulator:
SYNC_SYNCSTORAGE__SPANNER_EMULATOR_HOST=localhost:9010 make run_spanner
Running via Docker
This requires access to Google Cloud Rust (raw) crate. Please note that due to interdependencies, you will need to ensure that grpcio and protobuf match the version used by google-cloud-rust-raw.
-
Make sure you have Docker installed locally.
-
Copy the contents of mozilla-rust-sdk into top level root dir here.
-
Comment out the
imagevalue undersyncserverin either docker-compose.mysql.yml or docker-compose.spanner.yml (depending on which database backend you want to run), and add this instead:build: context: . -
If you are using MySQL, adjust the MySQL db credentials in docker-compose.mysql.yml to match your local setup.
-
make docker_start_mysqlormake docker_start_spanner- You can verify it’s working by visiting localhost:8000/__heartbeat__
Connecting to Firefox
This will walk you through the steps to connect this project to your local copy of Firefox.
- Follow the steps outlined above for running this project using MySQL or Spanner.
- In Firefox, go to
about:config. Changeidentity.sync.tokenserver.uritohttp://localhost:8000/1.0/sync/1.5. - Restart Firefox. Now, try syncing. You should see new BSOs in your MySQL or Spanner instance.
Logging
Sentry:
- If you want to connect to the existing Sentry project for local development, login to Sentry, and go to the page with api keys. Copy the
DSNvalue. - Comment out the
human_logsline in yourconfig/local.tomlfile. - You can force an error to appear in Sentry by adding a
panic!into main.rs, just before the finalOk(()). - Now,
SENTRY_DSN={INSERT_DSN_FROM_STEP_1_HERE} make run. - You may need to stop the local server after it hits the panic! before errors will appear in Sentry.
RUST_LOG
We use env_logger: set the RUST_LOG env var.
The logging of non-Spanner SQL queries is supported in non-optimized builds via RUST_LOG=syncserver=debug.
Troubleshooting
-
rm Cargo.lock; cargo clean;- Try this if you’re having problems compiling. -
Some versions of OpenSSL 1.1.1 can conflict with grpcio’s built in BoringSSL. These errors can cause syncstorage to fail to run or compile. If you see a problem related to
libsslyou may need to specify thecargooption--features grpcio/opensslto force grpcio to use OpenSSL.
Sentry
- If you’re having trouble working with Sentry to create releases, try authenticating using their self hosted server option that’s outlined here Ie,
sentry-cli --url https://selfhosted.url.com/ login. It’s also recommended to create a.sentryclircconfig file. See this example for the config values you’ll need.
Tests
Unit tests
Run unit tests for a specific database backend using one of the following make targets:
- MySQL:
make testormake test_with_coverage - Postgres:
make postgres_test_with_coverage - Spanner:
make spanner_test_with_coverage
These commands will run the Rust test suite using cargo-nextest and generate coverage reports using cargo-llvm-cov.
End-to-End tests
End-to-end (E2E) tests validate the complete integration of syncstorage-rs with a real database backend and mock Firefox Accounts server. These tests run the full Python integration test suite located in tools/integration_tests/.
Running E2E Tests Locally
To run E2E tests, you’ll need to:
- Build a Docker image for your target backend using the appropriate Makefile target
- Run the E2E test suite using docker-compose
The E2E tests are available for three database backends:
MySQL:
make docker_run_mysql_e2e_tests
Postgres:
make docker_run_postgres_e2e_tests
Spanner:
make docker_run_spanner_e2e_tests
Each E2E test run:
- Starts the required services (database, mock FxA server, syncserver) using docker-compose
- Runs the Python integration tests with JWK caching enabled
- Runs the tests again with JWK caching disabled
- Outputs JUnit XML test results
The E2E test configurations are defined in:
These compose files extend the base service definitions from their corresponding docker-compose.<backend>.yaml files.
How E2E Tests Work
The E2E tests:
- Run in a containerized environment with all dependencies (database, syncserver, mock FxA)
- Execute integration tests from tools/integration_tests/ using pytest
- Test OAuth token validation with both cached and non-cached JWKs
- Validate tokenserver functionality, including user allocation and token generation
- Test syncstorage operations like BSO creation, retrieval, and deletion
CI/CD
In GitHub Actions, E2E tests run as part of the CI/CD pipeline for each backend:
- .github/workflows/mysql.yml -
mysql-e2e-testsjob - .github/workflows/postgres.yml -
postgres-e2e-testsjob - .github/workflows/spanner.yml -
spanner-e2e-testsjob
Each workflow builds a Docker image, runs unit tests, then executes E2E tests using the same make targets described above.
- System Requirements
- Local Setup
- Logging
- Tests
- Creating Releases
- Troubleshooting
- Related Documentation
System Requirements
- cmake (>= 3.5 and < 3.30)
- gcc
- golang
- libcurl4-openssl-dev
- libssl-dev
- make
- pkg-config
- Rust stable
- python 3.9+
- MySQL 8.0 (or compatible)
- libmysqlclient (
brew install mysqlon macOS,apt install libmysqlclient-devon Ubuntu,apt install libmariadb-dev-compaton Debian)
- libmysqlclient (
Depending on your OS, you may also need to install libgrpcdev,
and protobuf-compiler-grpc. Note: if the code complies cleanly,
but generates a Segmentation Fault within Sentry init, you probably
are missing libcurl4-openssl-dev.