This topic provides instructions for installing, running, and modifying the Go Snowflake Driver. The driver supports Go's database/sql package.
The following software packages are required to use the Go Snowflake Driver.
The latest driver requires the Go language 1.19 or higher. The supported operating systems are Linux, Mac OS, and Windows, but you may run the driver on other platforms if the Go language works correctly on those platforms.
If you don't have a project initialized, set it up.
go mod init example.com/snowflake
Get Gosnowflake source code, if not installed.
go get -u github.com/snowflakedb/gosnowflake
For detailed documentation and basic usage examples, please see the documentation at godoc.org.
Snowflake provides a set of sample programs to test with. Set the environment variable $GOPATH
to the top directory of your workspace, e.g., ~/go
and make certain to
include $GOPATH/bin
in the environment variable $PATH
. Run the make
command to build all sample programs.
make install
In the following example, the program select1.go
is built and installed in $GOPATH/bin
and can be run from the command line:
SNOWFLAKE_TEST_ACCOUNT=<your_account> \
SNOWFLAKE_TEST_USER=<your_user> \
SNOWFLAKE_TEST_PASSWORD=<your_password> \
select1
Congrats! You have successfully run SELECT 1 with Snowflake DB!
The developer notes are hosted with the source code on GitHub.
Set the Snowflake connection info in parameters.json
:
{
"testconnection": {
"SNOWFLAKE_TEST_USER": "<your_user>",
"SNOWFLAKE_TEST_PASSWORD": "<your_password>",
"SNOWFLAKE_TEST_ACCOUNT": "<your_account>",
"SNOWFLAKE_TEST_WAREHOUSE": "<your_warehouse>",
"SNOWFLAKE_TEST_DATABASE": "<your_database>",
"SNOWFLAKE_TEST_SCHEMA": "<your_schema>",
"SNOWFLAKE_TEST_ROLE": "<your_role>"
}
}
You can find the complete file in the [Sigma 1Password](https://my.1password.com/vaults/likk64vc3hl7iaozanwj3dn7vu/allitems/72eslwc2yrglsfadkepljc45ai)
Install jq so that the parameters can get parsed correctly, and run make test
in your Go development environment:
make test
Configure your testing environment as described above and run make cov
. The coverage percentage will be printed on the console when the testing completes.
make cov
For more detailed analysis, results are printed to coverage.txt
in the project directory.
To read the coverage report, run:
go tool cover -html=coverage.txt
You may use your preferred editor to edit the driver code. Make certain to run make fmt lint
before submitting any pull request to Snowflake. This command formats your source code according to the standard Go style and detects any coding style issues.
For official support, contact Snowflake support at: https://support.snowflake.net/.
You shouldn't need to do this, but in case we need to rotate the CI credentials, here are the steps I followed to create them:
- Install
gpg
if you don't already have it:
brew install gpg
-
Get the
gpg passphrase <https://my.1password.com/vaults/likk64vc3hl7iaozanwj3dn7vu/allitems/esdnmyqh5c3cze3k67tqrkd5s4>
_ and the rawparameters.json file <https://my.1password.com/vaults/likk64vc3hl7iaozanwj3dn7vu/allitems/72eslwc2yrglsfadkepljc45ai>
_ from the Sigma 1Password. -
Use
gpg
's symmetric encryption mode to encrypt theparameters.json
file. You'll be prompted twice to enter the passphrase:
gpg --symmetric --cipher-algo AES256 --output .github/workflows/parameters_aws_golang.json.gpg parameters.json
-
Get the
TEST_USER private key <https://sigmacomputing.1password.com/vaults/likk64vc3hl7iaozanwj3dn7vu/allitems/7g4gv6wjbbh6bgt7t6v6dlbhke>
_ from the Sigma 1Password. The TEST_USER keypair secret includes a public key, an encrypted private key, and the passphrase used to encrypt the private key; copy only the encrypted private key intorsa-2048-private-key-enc.p8
) -
Remove the passphrase from the private key (you'll be prompted for the private key passphrase), then use
gpg
's symmetric encryption mode to encrypt the resulting unencrypted private key (we only need one layer of encryption and it's easier to standardize ongpg
). As with theparameters.json
file, you'll be prompted twice to enter the gpg passphrase:
openssl pkcs8 -in rsa-2048-private-key-enc.p8 -out rsa-2048-private-key.p8
gpg --symmetric --cipher-algo AES256 --output .github/workflows/rsa-2048-private-key.p8.gpg rsa-2048-private-key.p8
- Ensure that the gpg passphrase is configured properly in the
GitHub Environment <https://docs.github.com/en/actions/reference/environments>
_