forked from mirrors/gecko-dev
		
	 8b8218c610
			
		
	
	
		8b8218c610
		
	
	
	
	
		
			
			This also fixes a bug in the test_connection_online_backup.js test which wasn't properly evaluating that the page_size PRAGMA was being copied properly. Differential Revision: https://phabricator.services.mozilla.com/D207471
		
			
				
	
	
		
			3014 lines
		
	
	
	
		
			98 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			3014 lines
		
	
	
	
		
			98 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
 | |
|  * vim: sw=2 ts=2 et lcs=trail\:.,tab\:>~ :
 | |
|  * This Source Code Form is subject to the terms of the Mozilla Public
 | |
|  * License, v. 2.0. If a copy of the MPL was not distributed with this
 | |
|  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 | |
| 
 | |
| #include "BaseVFS.h"
 | |
| #include "ErrorList.h"
 | |
| #include "nsError.h"
 | |
| #include "nsThreadUtils.h"
 | |
| #include "nsIFile.h"
 | |
| #include "nsIFileURL.h"
 | |
| #include "nsIXPConnect.h"
 | |
| #include "mozilla/AppShutdown.h"
 | |
| #include "mozilla/CheckedInt.h"
 | |
| #include "mozilla/Telemetry.h"
 | |
| #include "mozilla/Mutex.h"
 | |
| #include "mozilla/CondVar.h"
 | |
| #include "mozilla/Attributes.h"
 | |
| #include "mozilla/ErrorNames.h"
 | |
| #include "mozilla/Unused.h"
 | |
| #include "mozilla/dom/quota/QuotaObject.h"
 | |
| #include "mozilla/ScopeExit.h"
 | |
| #include "mozilla/SpinEventLoopUntil.h"
 | |
| #include "mozilla/StaticPrefs_storage.h"
 | |
| 
 | |
| #include "mozIStorageCompletionCallback.h"
 | |
| #include "mozIStorageFunction.h"
 | |
| 
 | |
| #include "mozStorageAsyncStatementExecution.h"
 | |
| #include "mozStorageSQLFunctions.h"
 | |
| #include "mozStorageConnection.h"
 | |
| #include "mozStorageService.h"
 | |
| #include "mozStorageStatement.h"
 | |
| #include "mozStorageAsyncStatement.h"
 | |
| #include "mozStorageArgValueArray.h"
 | |
| #include "mozStoragePrivateHelpers.h"
 | |
| #include "mozStorageStatementData.h"
 | |
| #include "ObfuscatingVFS.h"
 | |
| #include "QuotaVFS.h"
 | |
| #include "StorageBaseStatementInternal.h"
 | |
| #include "SQLCollations.h"
 | |
| #include "FileSystemModule.h"
 | |
| #include "mozStorageHelper.h"
 | |
| 
 | |
| #include "mozilla/Assertions.h"
 | |
| #include "mozilla/Logging.h"
 | |
| #include "mozilla/Printf.h"
 | |
| #include "mozilla/ProfilerLabels.h"
 | |
| #include "mozilla/RefPtr.h"
 | |
| #include "nsComponentManagerUtils.h"
 | |
| #include "nsProxyRelease.h"
 | |
| #include "nsStringFwd.h"
 | |
| #include "nsURLHelper.h"
 | |
| 
 | |
| #define MIN_AVAILABLE_BYTES_PER_CHUNKED_GROWTH 524288000  // 500 MiB
 | |
| 
 | |
| // Maximum size of the pages cache per connection.
 | |
| #define MAX_CACHE_SIZE_KIBIBYTES 2048  // 2 MiB
 | |
| 
 | |
| mozilla::LazyLogModule gStorageLog("mozStorage");
 | |
| 
 | |
| // Checks that the protected code is running on the main-thread only if the
 | |
| // connection was also opened on it.
 | |
| #ifdef DEBUG
 | |
| #  define CHECK_MAINTHREAD_ABUSE()                                   \
 | |
|     do {                                                             \
 | |
|       NS_WARNING_ASSERTION(                                          \
 | |
|           eventTargetOpenedOn == GetMainThreadSerialEventTarget() || \
 | |
|               !NS_IsMainThread(),                                    \
 | |
|           "Using Storage synchronous API on main-thread, but "       \
 | |
|           "the connection was opened on another thread.");           \
 | |
|     } while (0)
 | |
| #else
 | |
| #  define CHECK_MAINTHREAD_ABUSE() \
 | |
|     do { /* Nothing */             \
 | |
|     } while (0)
 | |
| #endif
 | |
| 
 | |
| namespace mozilla::storage {
 | |
| 
 | |
| using mozilla::dom::quota::QuotaObject;
 | |
| using mozilla::Telemetry::AccumulateCategoricalKeyed;
 | |
| using mozilla::Telemetry::LABELS_SQLITE_STORE_OPEN;
 | |
| using mozilla::Telemetry::LABELS_SQLITE_STORE_QUERY;
 | |
| 
 | |
| namespace {
 | |
| 
 | |
| int nsresultToSQLiteResult(nsresult aXPCOMResultCode) {
 | |
|   if (NS_SUCCEEDED(aXPCOMResultCode)) {
 | |
|     return SQLITE_OK;
 | |
|   }
 | |
| 
 | |
|   switch (aXPCOMResultCode) {
 | |
|     case NS_ERROR_FILE_CORRUPTED:
 | |
|       return SQLITE_CORRUPT;
 | |
|     case NS_ERROR_FILE_ACCESS_DENIED:
 | |
|       return SQLITE_CANTOPEN;
 | |
|     case NS_ERROR_STORAGE_BUSY:
 | |
|       return SQLITE_BUSY;
 | |
|     case NS_ERROR_FILE_IS_LOCKED:
 | |
|       return SQLITE_LOCKED;
 | |
|     case NS_ERROR_FILE_READ_ONLY:
 | |
|       return SQLITE_READONLY;
 | |
|     case NS_ERROR_STORAGE_IOERR:
 | |
|       return SQLITE_IOERR;
 | |
|     case NS_ERROR_FILE_NO_DEVICE_SPACE:
 | |
|       return SQLITE_FULL;
 | |
|     case NS_ERROR_OUT_OF_MEMORY:
 | |
|       return SQLITE_NOMEM;
 | |
|     case NS_ERROR_UNEXPECTED:
 | |
|       return SQLITE_MISUSE;
 | |
|     case NS_ERROR_ABORT:
 | |
|       return SQLITE_ABORT;
 | |
|     case NS_ERROR_STORAGE_CONSTRAINT:
 | |
|       return SQLITE_CONSTRAINT;
 | |
|     default:
 | |
|       return SQLITE_ERROR;
 | |
|   }
 | |
| 
 | |
|   MOZ_MAKE_COMPILER_ASSUME_IS_UNREACHABLE("Must return in switch above!");
 | |
| }
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// Variant Specialization Functions (variantToSQLiteT)
 | |
| 
 | |
| int sqlite3_T_int(sqlite3_context* aCtx, int aValue) {
 | |
|   ::sqlite3_result_int(aCtx, aValue);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| int sqlite3_T_int64(sqlite3_context* aCtx, sqlite3_int64 aValue) {
 | |
|   ::sqlite3_result_int64(aCtx, aValue);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| int sqlite3_T_double(sqlite3_context* aCtx, double aValue) {
 | |
|   ::sqlite3_result_double(aCtx, aValue);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| int sqlite3_T_text(sqlite3_context* aCtx, const nsCString& aValue) {
 | |
|   CheckedInt<int32_t> length(aValue.Length());
 | |
|   if (!length.isValid()) {
 | |
|     return SQLITE_MISUSE;
 | |
|   }
 | |
|   ::sqlite3_result_text(aCtx, aValue.get(), length.value(), SQLITE_TRANSIENT);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| int sqlite3_T_text16(sqlite3_context* aCtx, const nsString& aValue) {
 | |
|   CheckedInt<int32_t> n_bytes =
 | |
|       CheckedInt<int32_t>(aValue.Length()) * sizeof(char16_t);
 | |
|   if (!n_bytes.isValid()) {
 | |
|     return SQLITE_MISUSE;
 | |
|   }
 | |
|   ::sqlite3_result_text16(aCtx, aValue.get(), n_bytes.value(),
 | |
|                           SQLITE_TRANSIENT);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| int sqlite3_T_null(sqlite3_context* aCtx) {
 | |
|   ::sqlite3_result_null(aCtx);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| int sqlite3_T_blob(sqlite3_context* aCtx, const void* aData, int aSize) {
 | |
|   ::sqlite3_result_blob(aCtx, aData, aSize, free);
 | |
|   return SQLITE_OK;
 | |
| }
 | |
| 
 | |
| #include "variantToSQLiteT_impl.h"
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// Modules
 | |
| 
 | |
| struct Module {
 | |
|   const char* name;
 | |
|   int (*registerFunc)(sqlite3*, const char*);
 | |
| };
 | |
| 
 | |
| Module gModules[] = {{"filesystem", RegisterFileSystemModule}};
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// Local Functions
 | |
| 
 | |
| int tracefunc(unsigned aReason, void* aClosure, void* aP, void* aX) {
 | |
|   switch (aReason) {
 | |
|     case SQLITE_TRACE_STMT: {
 | |
|       // aP is a pointer to the prepared statement.
 | |
|       sqlite3_stmt* stmt = static_cast<sqlite3_stmt*>(aP);
 | |
|       // aX is a pointer to a string containing the unexpanded SQL or a comment,
 | |
|       // starting with "--"" in case of a trigger.
 | |
|       char* expanded = static_cast<char*>(aX);
 | |
|       // Simulate what sqlite_trace was doing.
 | |
|       if (!::strncmp(expanded, "--", 2)) {
 | |
|         MOZ_LOG(gStorageLog, LogLevel::Debug,
 | |
|                 ("TRACE_STMT on %p: '%s'", aClosure, expanded));
 | |
|       } else {
 | |
|         char* sql = ::sqlite3_expanded_sql(stmt);
 | |
|         MOZ_LOG(gStorageLog, LogLevel::Debug,
 | |
|                 ("TRACE_STMT on %p: '%s'", aClosure, sql));
 | |
|         ::sqlite3_free(sql);
 | |
|       }
 | |
|       break;
 | |
|     }
 | |
|     case SQLITE_TRACE_PROFILE: {
 | |
|       // aX is pointer to a 64bit integer containing nanoseconds it took to
 | |
|       // execute the last command.
 | |
|       sqlite_int64 time = *(static_cast<sqlite_int64*>(aX)) / 1000000;
 | |
|       if (time > 0) {
 | |
|         MOZ_LOG(gStorageLog, LogLevel::Debug,
 | |
|                 ("TRACE_TIME on %p: %lldms", aClosure, time));
 | |
|       }
 | |
|       break;
 | |
|     }
 | |
|   }
 | |
|   return 0;
 | |
| }
 | |
| 
 | |
| void basicFunctionHelper(sqlite3_context* aCtx, int aArgc,
 | |
|                          sqlite3_value** aArgv) {
 | |
|   void* userData = ::sqlite3_user_data(aCtx);
 | |
| 
 | |
|   mozIStorageFunction* func = static_cast<mozIStorageFunction*>(userData);
 | |
| 
 | |
|   RefPtr<ArgValueArray> arguments(new ArgValueArray(aArgc, aArgv));
 | |
|   if (!arguments) return;
 | |
| 
 | |
|   nsCOMPtr<nsIVariant> result;
 | |
|   nsresult rv = func->OnFunctionCall(arguments, getter_AddRefs(result));
 | |
|   if (NS_FAILED(rv)) {
 | |
|     nsAutoCString errorMessage;
 | |
|     GetErrorName(rv, errorMessage);
 | |
|     errorMessage.InsertLiteral("User function returned ", 0);
 | |
|     errorMessage.Append('!');
 | |
| 
 | |
|     NS_WARNING(errorMessage.get());
 | |
| 
 | |
|     ::sqlite3_result_error(aCtx, errorMessage.get(), -1);
 | |
|     ::sqlite3_result_error_code(aCtx, nsresultToSQLiteResult(rv));
 | |
|     return;
 | |
|   }
 | |
|   int retcode = variantToSQLiteT(aCtx, result);
 | |
|   if (retcode != SQLITE_OK) {
 | |
|     NS_WARNING("User function returned invalid data type!");
 | |
|     ::sqlite3_result_error(aCtx, "User function returned invalid data type",
 | |
|                            -1);
 | |
|   }
 | |
| }
 | |
| 
 | |
| RefPtr<QuotaObject> GetQuotaObject(sqlite3_file* aFile, bool obfuscatingVFS) {
 | |
|   return obfuscatingVFS
 | |
|              ? mozilla::storage::obfsvfs::GetQuotaObjectForFile(aFile)
 | |
|              : mozilla::storage::quotavfs::GetQuotaObjectForFile(aFile);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * This code is heavily based on the sample at:
 | |
|  *   http://www.sqlite.org/unlock_notify.html
 | |
|  */
 | |
| class UnlockNotification {
 | |
|  public:
 | |
|   UnlockNotification()
 | |
|       : mMutex("UnlockNotification mMutex"),
 | |
|         mCondVar(mMutex, "UnlockNotification condVar"),
 | |
|         mSignaled(false) {}
 | |
| 
 | |
|   void Wait() {
 | |
|     MutexAutoLock lock(mMutex);
 | |
|     while (!mSignaled) {
 | |
|       (void)mCondVar.Wait();
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   void Signal() {
 | |
|     MutexAutoLock lock(mMutex);
 | |
|     mSignaled = true;
 | |
|     (void)mCondVar.Notify();
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   Mutex mMutex MOZ_UNANNOTATED;
 | |
|   CondVar mCondVar;
 | |
|   bool mSignaled;
 | |
| };
 | |
| 
 | |
| void UnlockNotifyCallback(void** aArgs, int aArgsSize) {
 | |
|   for (int i = 0; i < aArgsSize; i++) {
 | |
|     UnlockNotification* notification =
 | |
|         static_cast<UnlockNotification*>(aArgs[i]);
 | |
|     notification->Signal();
 | |
|   }
 | |
| }
 | |
| 
 | |
| int WaitForUnlockNotify(sqlite3* aDatabase) {
 | |
|   UnlockNotification notification;
 | |
|   int srv =
 | |
|       ::sqlite3_unlock_notify(aDatabase, UnlockNotifyCallback, ¬ification);
 | |
|   MOZ_ASSERT(srv == SQLITE_LOCKED || srv == SQLITE_OK);
 | |
|   if (srv == SQLITE_OK) {
 | |
|     notification.Wait();
 | |
|   }
 | |
| 
 | |
|   return srv;
 | |
| }
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// Local Classes
 | |
| 
 | |
| class AsyncCloseConnection final : public Runnable {
 | |
|  public:
 | |
|   AsyncCloseConnection(Connection* aConnection, sqlite3* aNativeConnection,
 | |
|                        nsIRunnable* aCallbackEvent)
 | |
|       : Runnable("storage::AsyncCloseConnection"),
 | |
|         mConnection(aConnection),
 | |
|         mNativeConnection(aNativeConnection),
 | |
|         mCallbackEvent(aCallbackEvent) {}
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     // Make sure we don't dispatch to the current thread.
 | |
|     MOZ_ASSERT(!IsOnCurrentSerialEventTarget(mConnection->eventTargetOpenedOn));
 | |
| 
 | |
|     nsCOMPtr<nsIRunnable> event =
 | |
|         NewRunnableMethod("storage::Connection::shutdownAsyncThread",
 | |
|                           mConnection, &Connection::shutdownAsyncThread);
 | |
|     MOZ_ALWAYS_SUCCEEDS(NS_DispatchToMainThread(event));
 | |
| 
 | |
|     // Internal close.
 | |
|     (void)mConnection->internalClose(mNativeConnection);
 | |
| 
 | |
|     // Callback
 | |
|     if (mCallbackEvent) {
 | |
|       nsCOMPtr<nsIThread> thread;
 | |
|       (void)NS_GetMainThread(getter_AddRefs(thread));
 | |
|       (void)thread->Dispatch(mCallbackEvent, NS_DISPATCH_NORMAL);
 | |
|     }
 | |
| 
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   ~AsyncCloseConnection() override {
 | |
|     NS_ReleaseOnMainThread("AsyncCloseConnection::mConnection",
 | |
|                            mConnection.forget());
 | |
|     NS_ReleaseOnMainThread("AsyncCloseConnection::mCallbackEvent",
 | |
|                            mCallbackEvent.forget());
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   RefPtr<Connection> mConnection;
 | |
|   sqlite3* mNativeConnection;
 | |
|   nsCOMPtr<nsIRunnable> mCallbackEvent;
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * An event used to initialize the clone of a connection.
 | |
|  *
 | |
|  * Must be executed on the clone's async execution thread.
 | |
|  */
 | |
| class AsyncInitializeClone final : public Runnable {
 | |
|  public:
 | |
|   /**
 | |
|    * @param aConnection The connection being cloned.
 | |
|    * @param aClone The clone.
 | |
|    * @param aReadOnly If |true|, the clone is read only.
 | |
|    * @param aCallback A callback to trigger once initialization
 | |
|    *                  is complete. This event will be called on
 | |
|    *                  aClone->eventTargetOpenedOn.
 | |
|    */
 | |
|   AsyncInitializeClone(Connection* aConnection, Connection* aClone,
 | |
|                        const bool aReadOnly,
 | |
|                        mozIStorageCompletionCallback* aCallback)
 | |
|       : Runnable("storage::AsyncInitializeClone"),
 | |
|         mConnection(aConnection),
 | |
|         mClone(aClone),
 | |
|         mReadOnly(aReadOnly),
 | |
|         mCallback(aCallback) {
 | |
|     MOZ_ASSERT(NS_IsMainThread());
 | |
|   }
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     MOZ_ASSERT(!NS_IsMainThread());
 | |
|     nsresult rv = mConnection->initializeClone(mClone, mReadOnly);
 | |
|     if (NS_FAILED(rv)) {
 | |
|       return Dispatch(rv, nullptr);
 | |
|     }
 | |
|     return Dispatch(NS_OK,
 | |
|                     NS_ISUPPORTS_CAST(mozIStorageAsyncConnection*, mClone));
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   nsresult Dispatch(nsresult aResult, nsISupports* aValue) {
 | |
|     RefPtr<CallbackComplete> event =
 | |
|         new CallbackComplete(aResult, aValue, mCallback.forget());
 | |
|     return mClone->eventTargetOpenedOn->Dispatch(event, NS_DISPATCH_NORMAL);
 | |
|   }
 | |
| 
 | |
|   ~AsyncInitializeClone() override {
 | |
|     nsCOMPtr<nsIThread> thread;
 | |
|     DebugOnly<nsresult> rv = NS_GetMainThread(getter_AddRefs(thread));
 | |
|     MOZ_ASSERT(NS_SUCCEEDED(rv));
 | |
| 
 | |
|     // Handle ambiguous nsISupports inheritance.
 | |
|     NS_ProxyRelease("AsyncInitializeClone::mConnection", thread,
 | |
|                     mConnection.forget());
 | |
|     NS_ProxyRelease("AsyncInitializeClone::mClone", thread, mClone.forget());
 | |
| 
 | |
|     // Generally, the callback will be released by CallbackComplete.
 | |
|     // However, if for some reason Run() is not executed, we still
 | |
|     // need to ensure that it is released here.
 | |
|     NS_ProxyRelease("AsyncInitializeClone::mCallback", thread,
 | |
|                     mCallback.forget());
 | |
|   }
 | |
| 
 | |
|   RefPtr<Connection> mConnection;
 | |
|   RefPtr<Connection> mClone;
 | |
|   const bool mReadOnly;
 | |
|   nsCOMPtr<mozIStorageCompletionCallback> mCallback;
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * A listener for async connection closing.
 | |
|  */
 | |
| class CloseListener final : public mozIStorageCompletionCallback {
 | |
|  public:
 | |
|   NS_DECL_ISUPPORTS
 | |
|   CloseListener() : mClosed(false) {}
 | |
| 
 | |
|   NS_IMETHOD Complete(nsresult, nsISupports*) override {
 | |
|     mClosed = true;
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   bool mClosed;
 | |
| 
 | |
|  private:
 | |
|   ~CloseListener() = default;
 | |
| };
 | |
| 
 | |
| NS_IMPL_ISUPPORTS(CloseListener, mozIStorageCompletionCallback)
 | |
| 
 | |
| class AsyncVacuumEvent final : public Runnable {
 | |
|  public:
 | |
|   AsyncVacuumEvent(Connection* aConnection,
 | |
|                    mozIStorageCompletionCallback* aCallback,
 | |
|                    bool aUseIncremental, int32_t aSetPageSize)
 | |
|       : Runnable("storage::AsyncVacuum"),
 | |
|         mConnection(aConnection),
 | |
|         mCallback(aCallback),
 | |
|         mUseIncremental(aUseIncremental),
 | |
|         mSetPageSize(aSetPageSize),
 | |
|         mStatus(NS_ERROR_UNEXPECTED) {}
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     // This is initially dispatched to the helper thread, then re-dispatched
 | |
|     // to the opener thread, where it will callback.
 | |
|     if (IsOnCurrentSerialEventTarget(mConnection->eventTargetOpenedOn)) {
 | |
|       // Send the completion event.
 | |
|       if (mCallback) {
 | |
|         mozilla::Unused << mCallback->Complete(mStatus, nullptr);
 | |
|       }
 | |
|       return NS_OK;
 | |
|     }
 | |
| 
 | |
|     // Ensure to invoke the callback regardless of errors.
 | |
|     auto guard = MakeScopeExit([&]() {
 | |
|       mConnection->mIsStatementOnHelperThreadInterruptible = false;
 | |
|       mozilla::Unused << mConnection->eventTargetOpenedOn->Dispatch(
 | |
|           this, NS_DISPATCH_NORMAL);
 | |
|     });
 | |
| 
 | |
|     // Get list of attached databases.
 | |
|     nsCOMPtr<mozIStorageStatement> stmt;
 | |
|     nsresult rv = mConnection->CreateStatement(MOZ_STORAGE_UNIQUIFY_QUERY_STR
 | |
|                                                "PRAGMA database_list"_ns,
 | |
|                                                getter_AddRefs(stmt));
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
|     // We must accumulate names and loop through them later, otherwise VACUUM
 | |
|     // will see an ongoing statement and bail out.
 | |
|     nsTArray<nsCString> schemaNames;
 | |
|     bool hasResult = false;
 | |
|     while (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|       nsAutoCString name;
 | |
|       rv = stmt->GetUTF8String(1, name);
 | |
|       if (NS_SUCCEEDED(rv) && !name.EqualsLiteral("temp")) {
 | |
|         schemaNames.AppendElement(name);
 | |
|       }
 | |
|     }
 | |
|     mStatus = NS_OK;
 | |
|     // Mark this vacuum as an interruptible operation, so it can be interrupted
 | |
|     // if the connection closes during shutdown.
 | |
|     mConnection->mIsStatementOnHelperThreadInterruptible = true;
 | |
|     for (const nsCString& schemaName : schemaNames) {
 | |
|       rv = this->Vacuum(schemaName);
 | |
|       if (NS_FAILED(rv)) {
 | |
|         // This is sub-optimal since it's only keeping the last error reason,
 | |
|         // but it will do for now.
 | |
|         mStatus = rv;
 | |
|       }
 | |
|     }
 | |
|     return mStatus;
 | |
|   }
 | |
| 
 | |
|   nsresult Vacuum(const nsACString& aSchemaName) {
 | |
|     // Abort if we're in shutdown.
 | |
|     if (AppShutdown::IsInOrBeyond(ShutdownPhase::AppShutdownConfirmed)) {
 | |
|       return NS_ERROR_ABORT;
 | |
|     }
 | |
|     int32_t removablePages = mConnection->RemovablePagesInFreeList(aSchemaName);
 | |
|     if (!removablePages) {
 | |
|       // There's no empty pages to remove, so skip this vacuum for now.
 | |
|       return NS_OK;
 | |
|     }
 | |
|     nsresult rv;
 | |
|     bool needsFullVacuum = true;
 | |
| 
 | |
|     if (mSetPageSize) {
 | |
|       nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "PRAGMA ");
 | |
|       query.Append(aSchemaName);
 | |
|       query.AppendLiteral(".page_size = ");
 | |
|       query.AppendInt(mSetPageSize);
 | |
|       nsCOMPtr<mozIStorageStatement> stmt;
 | |
|       rv = mConnection->ExecuteSimpleSQL(query);
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
|     }
 | |
| 
 | |
|     // Check auto_vacuum.
 | |
|     {
 | |
|       nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "PRAGMA ");
 | |
|       query.Append(aSchemaName);
 | |
|       query.AppendLiteral(".auto_vacuum");
 | |
|       nsCOMPtr<mozIStorageStatement> stmt;
 | |
|       rv = mConnection->CreateStatement(query, getter_AddRefs(stmt));
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
|       bool hasResult = false;
 | |
|       bool changeAutoVacuum = false;
 | |
|       if (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|         bool isIncrementalVacuum = stmt->AsInt32(0) == 2;
 | |
|         changeAutoVacuum = isIncrementalVacuum != mUseIncremental;
 | |
|         if (isIncrementalVacuum && !changeAutoVacuum) {
 | |
|           needsFullVacuum = false;
 | |
|         }
 | |
|       }
 | |
|       // Changing auto_vacuum is only supported on the main schema.
 | |
|       if (aSchemaName.EqualsLiteral("main") && changeAutoVacuum) {
 | |
|         nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "PRAGMA ");
 | |
|         query.Append(aSchemaName);
 | |
|         query.AppendLiteral(".auto_vacuum = ");
 | |
|         query.AppendInt(mUseIncremental ? 2 : 0);
 | |
|         rv = mConnection->ExecuteSimpleSQL(query);
 | |
|         NS_ENSURE_SUCCESS(rv, rv);
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     if (needsFullVacuum) {
 | |
|       nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "VACUUM ");
 | |
|       query.Append(aSchemaName);
 | |
|       rv = mConnection->ExecuteSimpleSQL(query);
 | |
|       // TODO (Bug 1818039): Report failed vacuum telemetry.
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
|     } else {
 | |
|       nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "PRAGMA ");
 | |
|       query.Append(aSchemaName);
 | |
|       query.AppendLiteral(".incremental_vacuum(");
 | |
|       query.AppendInt(removablePages);
 | |
|       query.AppendLiteral(")");
 | |
|       rv = mConnection->ExecuteSimpleSQL(query);
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
|     }
 | |
| 
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   ~AsyncVacuumEvent() override {
 | |
|     NS_ReleaseOnMainThread("AsyncVacuum::mConnection", mConnection.forget());
 | |
|     NS_ReleaseOnMainThread("AsyncVacuum::mCallback", mCallback.forget());
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   RefPtr<Connection> mConnection;
 | |
|   nsCOMPtr<mozIStorageCompletionCallback> mCallback;
 | |
|   bool mUseIncremental;
 | |
|   int32_t mSetPageSize;
 | |
|   Atomic<nsresult> mStatus;
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * A runnable to perform an SQLite database backup when there may be one or more
 | |
|  * open connections on that database.
 | |
|  */
 | |
| class AsyncBackupDatabaseFile final : public Runnable, public nsITimerCallback {
 | |
|  public:
 | |
|   NS_DECL_ISUPPORTS_INHERITED
 | |
| 
 | |
|   /**
 | |
|    * @param aConnection The connection to the database being backed up.
 | |
|    * @param aNativeConnection The native connection to the database being backed
 | |
|    *                          up.
 | |
|    * @param aDestinationFile The destination file for the created backup.
 | |
|    * @param aCallback A callback to trigger once the backup process has
 | |
|    *                  completed. The callback will be supplied with an nsresult
 | |
|    *                  indicating whether or not the backup was successfully
 | |
|    *                  created. This callback will be called on the
 | |
|    *                  mConnection->eventTargetOpenedOn thread.
 | |
|    * @throws
 | |
|    */
 | |
|   AsyncBackupDatabaseFile(Connection* aConnection, sqlite3* aNativeConnection,
 | |
|                           nsIFile* aDestinationFile,
 | |
|                           mozIStorageCompletionCallback* aCallback,
 | |
|                           int32_t aPagesPerStep, uint32_t aStepDelayMs)
 | |
|       : Runnable("storage::AsyncBackupDatabaseFile"),
 | |
|         mConnection(aConnection),
 | |
|         mNativeConnection(aNativeConnection),
 | |
|         mDestinationFile(aDestinationFile),
 | |
|         mCallback(aCallback),
 | |
|         mPagesPerStep(aPagesPerStep),
 | |
|         mStepDelayMs(aStepDelayMs),
 | |
|         mBackupFile(nullptr),
 | |
|         mBackupHandle(nullptr) {
 | |
|     MOZ_ASSERT(NS_IsMainThread());
 | |
|   }
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     MOZ_ASSERT(!NS_IsMainThread());
 | |
| 
 | |
|     nsAutoString path;
 | |
|     nsresult rv = mDestinationFile->GetPath(path);
 | |
|     if (NS_FAILED(rv)) {
 | |
|       return Dispatch(rv, nullptr);
 | |
|     }
 | |
|     // Put a .tmp on the end of the destination while the backup is underway.
 | |
|     // This extension will be stripped off after the backup successfully
 | |
|     // completes.
 | |
|     path.AppendLiteral(".tmp");
 | |
| 
 | |
|     int srv = ::sqlite3_open(NS_ConvertUTF16toUTF8(path).get(), &mBackupFile);
 | |
|     if (srv != SQLITE_OK) {
 | |
|       return Dispatch(NS_ERROR_FAILURE, nullptr);
 | |
|     }
 | |
| 
 | |
|     static const char* mainDBName = "main";
 | |
| 
 | |
|     mBackupHandle = ::sqlite3_backup_init(mBackupFile, mainDBName,
 | |
|                                           mNativeConnection, mainDBName);
 | |
|     if (!mBackupHandle) {
 | |
|       MOZ_ALWAYS_TRUE(::sqlite3_close(mBackupFile) == SQLITE_OK);
 | |
|       return Dispatch(NS_ERROR_FAILURE, nullptr);
 | |
|     }
 | |
| 
 | |
|     return DoStep();
 | |
|   }
 | |
| 
 | |
|   NS_IMETHOD
 | |
|   Notify(nsITimer* aTimer) override { return DoStep(); }
 | |
| 
 | |
|  private:
 | |
|   nsresult DoStep() {
 | |
| #define DISPATCH_AND_RETURN_IF_FAILED(rv) \
 | |
|   if (NS_FAILED(rv)) {                    \
 | |
|     return Dispatch(rv, nullptr);         \
 | |
|   }
 | |
| 
 | |
|     // This guard is used to close the backup database in the event of
 | |
|     // some failure throughout this process. We release the exit guard
 | |
|     // only if we complete the backup successfully, or defer to another
 | |
|     // later call to DoStep.
 | |
|     auto guard = MakeScopeExit([&]() {
 | |
|       MOZ_ALWAYS_TRUE(::sqlite3_close(mBackupFile) == SQLITE_OK);
 | |
|       mBackupFile = nullptr;
 | |
|     });
 | |
| 
 | |
|     MOZ_ASSERT(!NS_IsMainThread());
 | |
|     nsAutoString originalPath;
 | |
|     nsresult rv = mDestinationFile->GetPath(originalPath);
 | |
|     DISPATCH_AND_RETURN_IF_FAILED(rv);
 | |
| 
 | |
|     nsAutoString tempPath = originalPath;
 | |
|     tempPath.AppendLiteral(".tmp");
 | |
| 
 | |
|     nsCOMPtr<nsIFile> file =
 | |
|         do_CreateInstance("@mozilla.org/file/local;1", &rv);
 | |
|     DISPATCH_AND_RETURN_IF_FAILED(rv);
 | |
| 
 | |
|     rv = file->InitWithPath(tempPath);
 | |
|     DISPATCH_AND_RETURN_IF_FAILED(rv);
 | |
| 
 | |
|     int srv = ::sqlite3_backup_step(mBackupHandle, mPagesPerStep);
 | |
|     if (srv == SQLITE_OK || srv == SQLITE_BUSY || srv == SQLITE_LOCKED) {
 | |
|       // We're continuing the backup later. Release the guard to avoid closing
 | |
|       // the database.
 | |
|       guard.release();
 | |
|       // Queue up the next step
 | |
|       return NS_NewTimerWithCallback(getter_AddRefs(mTimer), this, mStepDelayMs,
 | |
|                                      nsITimer::TYPE_ONE_SHOT,
 | |
|                                      GetCurrentSerialEventTarget());
 | |
|     }
 | |
| #ifdef DEBUG
 | |
|     if (srv != SQLITE_DONE) {
 | |
|       nsCString warnMsg;
 | |
|       warnMsg.AppendLiteral(
 | |
|           "The SQLite database copy could not be completed due to an error: ");
 | |
|       warnMsg.Append(::sqlite3_errmsg(mBackupFile));
 | |
|       NS_WARNING(warnMsg.get());
 | |
|     }
 | |
| #endif
 | |
| 
 | |
|     (void)::sqlite3_backup_finish(mBackupHandle);
 | |
|     MOZ_ALWAYS_TRUE(::sqlite3_close(mBackupFile) == SQLITE_OK);
 | |
|     mBackupFile = nullptr;
 | |
| 
 | |
|     // The database is already closed, so we can release this guard now.
 | |
|     guard.release();
 | |
| 
 | |
|     if (srv != SQLITE_DONE) {
 | |
|       NS_WARNING("Failed to create database copy.");
 | |
| 
 | |
|       // The partially created database file is not useful. Let's remove it.
 | |
|       rv = file->Remove(false);
 | |
|       if (NS_FAILED(rv)) {
 | |
|         NS_WARNING(
 | |
|             "Removing a partially backed up SQLite database file failed.");
 | |
|       }
 | |
| 
 | |
|       return Dispatch(convertResultCode(srv), nullptr);
 | |
|     }
 | |
| 
 | |
|     // Now that we've successfully created the copy, we'll strip off the .tmp
 | |
|     // extension.
 | |
| 
 | |
|     nsAutoString leafName;
 | |
|     rv = mDestinationFile->GetLeafName(leafName);
 | |
|     DISPATCH_AND_RETURN_IF_FAILED(rv);
 | |
| 
 | |
|     rv = file->RenameTo(nullptr, leafName);
 | |
|     DISPATCH_AND_RETURN_IF_FAILED(rv);
 | |
| 
 | |
| #undef DISPATCH_AND_RETURN_IF_FAILED
 | |
|     return Dispatch(NS_OK, nullptr);
 | |
|   }
 | |
| 
 | |
|   nsresult Dispatch(nsresult aResult, nsISupports* aValue) {
 | |
|     RefPtr<CallbackComplete> event =
 | |
|         new CallbackComplete(aResult, aValue, mCallback.forget());
 | |
|     return mConnection->eventTargetOpenedOn->Dispatch(event,
 | |
|                                                       NS_DISPATCH_NORMAL);
 | |
|   }
 | |
| 
 | |
|   ~AsyncBackupDatabaseFile() override {
 | |
|     nsresult rv;
 | |
|     nsCOMPtr<nsIThread> thread =
 | |
|         do_QueryInterface(mConnection->eventTargetOpenedOn, &rv);
 | |
|     MOZ_ASSERT(NS_SUCCEEDED(rv));
 | |
| 
 | |
|     // Handle ambiguous nsISupports inheritance.
 | |
|     NS_ProxyRelease("AsyncBackupDatabaseFile::mConnection", thread,
 | |
|                     mConnection.forget());
 | |
|     NS_ProxyRelease("AsyncBackupDatabaseFile::mDestinationFile", thread,
 | |
|                     mDestinationFile.forget());
 | |
| 
 | |
|     // Generally, the callback will be released by CallbackComplete.
 | |
|     // However, if for some reason Run() is not executed, we still
 | |
|     // need to ensure that it is released here.
 | |
|     NS_ProxyRelease("AsyncInitializeClone::mCallback", thread,
 | |
|                     mCallback.forget());
 | |
|   }
 | |
| 
 | |
|   RefPtr<Connection> mConnection;
 | |
|   sqlite3* mNativeConnection;
 | |
|   nsCOMPtr<nsITimer> mTimer;
 | |
|   nsCOMPtr<nsIFile> mDestinationFile;
 | |
|   nsCOMPtr<mozIStorageCompletionCallback> mCallback;
 | |
|   int32_t mPagesPerStep;
 | |
|   uint32_t mStepDelayMs;
 | |
|   sqlite3* mBackupFile;
 | |
|   sqlite3_backup* mBackupHandle;
 | |
| };
 | |
| 
 | |
| NS_IMPL_ISUPPORTS_INHERITED(AsyncBackupDatabaseFile, Runnable, nsITimerCallback)
 | |
| 
 | |
| }  // namespace
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// Connection
 | |
| 
 | |
| Connection::Connection(Service* aService, int aFlags,
 | |
|                        ConnectionOperation aSupportedOperations,
 | |
|                        const nsCString& aTelemetryFilename, bool aInterruptible,
 | |
|                        bool aIgnoreLockingMode)
 | |
|     : sharedAsyncExecutionMutex("Connection::sharedAsyncExecutionMutex"),
 | |
|       sharedDBMutex("Connection::sharedDBMutex"),
 | |
|       eventTargetOpenedOn(WrapNotNull(GetCurrentSerialEventTarget())),
 | |
|       mIsStatementOnHelperThreadInterruptible(false),
 | |
|       mDBConn(nullptr),
 | |
|       mDefaultTransactionType(mozIStorageConnection::TRANSACTION_DEFERRED),
 | |
|       mDestroying(false),
 | |
|       mProgressHandler(nullptr),
 | |
|       mStorageService(aService),
 | |
|       mFlags(aFlags),
 | |
|       mTransactionNestingLevel(0),
 | |
|       mSupportedOperations(aSupportedOperations),
 | |
|       mInterruptible(aSupportedOperations == Connection::ASYNCHRONOUS ||
 | |
|                      aInterruptible),
 | |
|       mIgnoreLockingMode(aIgnoreLockingMode),
 | |
|       mAsyncExecutionThreadShuttingDown(false),
 | |
|       mConnectionClosed(false),
 | |
|       mGrowthChunkSize(0) {
 | |
|   MOZ_ASSERT(!mIgnoreLockingMode || mFlags & SQLITE_OPEN_READONLY,
 | |
|              "Can't ignore locking for a non-readonly connection!");
 | |
|   mStorageService->registerConnection(this);
 | |
|   MOZ_ASSERT(!aTelemetryFilename.IsEmpty(),
 | |
|              "A telemetry filename should have been passed-in.");
 | |
|   mTelemetryFilename.Assign(aTelemetryFilename);
 | |
| }
 | |
| 
 | |
| Connection::~Connection() {
 | |
|   // Failsafe Close() occurs in our custom Release method because of
 | |
|   // complications related to Close() potentially invoking AsyncClose() which
 | |
|   // will increment our refcount.
 | |
|   MOZ_ASSERT(!mAsyncExecutionThread,
 | |
|              "The async thread has not been shutdown properly!");
 | |
| }
 | |
| 
 | |
| NS_IMPL_ADDREF(Connection)
 | |
| 
 | |
| NS_INTERFACE_MAP_BEGIN(Connection)
 | |
|   NS_INTERFACE_MAP_ENTRY(mozIStorageAsyncConnection)
 | |
|   NS_INTERFACE_MAP_ENTRY(nsIInterfaceRequestor)
 | |
|   NS_INTERFACE_MAP_ENTRY(mozIStorageConnection)
 | |
|   NS_INTERFACE_MAP_ENTRY_AMBIGUOUS(nsISupports, mozIStorageConnection)
 | |
| NS_INTERFACE_MAP_END
 | |
| 
 | |
| // This is identical to what NS_IMPL_RELEASE provides, but with the
 | |
| // extra |1 == count| case.
 | |
| NS_IMETHODIMP_(MozExternalRefCountType) Connection::Release(void) {
 | |
|   MOZ_ASSERT(0 != mRefCnt, "dup release");
 | |
|   nsrefcnt count = --mRefCnt;
 | |
|   NS_LOG_RELEASE(this, count, "Connection");
 | |
|   if (1 == count) {
 | |
|     // If the refcount went to 1, the single reference must be from
 | |
|     // gService->mConnections (in class |Service|).  And the code calling
 | |
|     // Release is either:
 | |
|     // - The "user" code that had created the connection, releasing on any
 | |
|     //   thread.
 | |
|     // - One of Service's getConnections() callers had acquired a strong
 | |
|     //   reference to the Connection that out-lived the last "user" reference,
 | |
|     //   and now that just got dropped.  Note that this reference could be
 | |
|     //   getting dropped on the main thread or Connection->eventTargetOpenedOn
 | |
|     //   (because of the NewRunnableMethod used by minimizeMemory).
 | |
|     //
 | |
|     // Either way, we should now perform our failsafe Close() and unregister.
 | |
|     // However, we only want to do this once, and the reality is that our
 | |
|     // refcount could go back up above 1 and down again at any time if we are
 | |
|     // off the main thread and getConnections() gets called on the main thread,
 | |
|     // so we use an atomic here to do this exactly once.
 | |
|     if (mDestroying.compareExchange(false, true)) {
 | |
|       // Close the connection, dispatching to the opening event target if we're
 | |
|       // not on that event target already and that event target is still
 | |
|       // accepting runnables. We do this because it's possible we're on the main
 | |
|       // thread because of getConnections(), and we REALLY don't want to
 | |
|       // transfer I/O to the main thread if we can avoid it.
 | |
|       if (IsOnCurrentSerialEventTarget(eventTargetOpenedOn)) {
 | |
|         // This could cause SpinningSynchronousClose() to be invoked and AddRef
 | |
|         // triggered for AsyncCloseConnection's strong ref if the conn was ever
 | |
|         // use for async purposes.  (Main-thread only, though.)
 | |
|         Unused << synchronousClose();
 | |
|       } else {
 | |
|         nsCOMPtr<nsIRunnable> event =
 | |
|             NewRunnableMethod("storage::Connection::synchronousClose", this,
 | |
|                               &Connection::synchronousClose);
 | |
|         if (NS_FAILED(eventTargetOpenedOn->Dispatch(event.forget(),
 | |
|                                                     NS_DISPATCH_NORMAL))) {
 | |
|           // The event target was dead and so we've just leaked our runnable.
 | |
|           // This should not happen because our non-main-thread consumers should
 | |
|           // be explicitly closing their connections, not relying on us to close
 | |
|           // them for them.  (It's okay to let a statement go out of scope for
 | |
|           // automatic cleanup, but not a Connection.)
 | |
|           MOZ_ASSERT(false,
 | |
|                      "Leaked Connection::synchronousClose(), ownership fail.");
 | |
|           Unused << synchronousClose();
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       // This will drop its strong reference right here, right now.
 | |
|       mStorageService->unregisterConnection(this);
 | |
|     }
 | |
|   } else if (0 == count) {
 | |
|     mRefCnt = 1; /* stabilize */
 | |
| #if 0            /* enable this to find non-threadsafe destructors: */
 | |
|     NS_ASSERT_OWNINGTHREAD(Connection);
 | |
| #endif
 | |
|     delete (this);
 | |
|     return 0;
 | |
|   }
 | |
|   return count;
 | |
| }
 | |
| 
 | |
| int32_t Connection::getSqliteRuntimeStatus(int32_t aStatusOption,
 | |
|                                            int32_t* aMaxValue) {
 | |
|   MOZ_ASSERT(connectionReady(), "A connection must exist at this point");
 | |
|   int curr = 0, max = 0;
 | |
|   DebugOnly<int> rc =
 | |
|       ::sqlite3_db_status(mDBConn, aStatusOption, &curr, &max, 0);
 | |
|   MOZ_ASSERT(NS_SUCCEEDED(convertResultCode(rc)));
 | |
|   if (aMaxValue) *aMaxValue = max;
 | |
|   return curr;
 | |
| }
 | |
| 
 | |
| nsIEventTarget* Connection::getAsyncExecutionTarget() {
 | |
|   NS_ENSURE_TRUE(IsOnCurrentSerialEventTarget(eventTargetOpenedOn), nullptr);
 | |
| 
 | |
|   // Don't return the asynchronous event target if we are shutting down.
 | |
|   if (mAsyncExecutionThreadShuttingDown) {
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   // Create the async event target if there's none yet.
 | |
|   if (!mAsyncExecutionThread) {
 | |
|     // Names start with "sqldb:" followed by a recognizable name, like the
 | |
|     // database file name, or a specially crafted name like "memory".
 | |
|     // This name will be surfaced on https://crash-stats.mozilla.org, so any
 | |
|     // sensitive part of the file name (e.g. an URL origin) should be replaced
 | |
|     // by passing an explicit telemetryName to openDatabaseWithFileURL.
 | |
|     nsAutoCString name("sqldb:"_ns);
 | |
|     name.Append(mTelemetryFilename);
 | |
|     static nsThreadPoolNaming naming;
 | |
|     nsresult rv = NS_NewNamedThread(naming.GetNextThreadName(name),
 | |
|                                     getter_AddRefs(mAsyncExecutionThread));
 | |
|     if (NS_FAILED(rv)) {
 | |
|       NS_WARNING("Failed to create async thread.");
 | |
|       return nullptr;
 | |
|     }
 | |
|     mAsyncExecutionThread->SetNameForWakeupTelemetry("mozStorage (all)"_ns);
 | |
|   }
 | |
| 
 | |
|   return mAsyncExecutionThread;
 | |
| }
 | |
| 
 | |
| void Connection::RecordOpenStatus(nsresult rv) {
 | |
|   nsCString histogramKey = mTelemetryFilename;
 | |
| 
 | |
|   if (histogramKey.IsEmpty()) {
 | |
|     histogramKey.AssignLiteral("unknown");
 | |
|   }
 | |
| 
 | |
|   if (NS_SUCCEEDED(rv)) {
 | |
|     AccumulateCategoricalKeyed(histogramKey, LABELS_SQLITE_STORE_OPEN::success);
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   switch (rv) {
 | |
|     case NS_ERROR_FILE_CORRUPTED:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_OPEN::corrupt);
 | |
|       break;
 | |
|     case NS_ERROR_STORAGE_IOERR:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_OPEN::diskio);
 | |
|       break;
 | |
|     case NS_ERROR_FILE_ACCESS_DENIED:
 | |
|     case NS_ERROR_FILE_IS_LOCKED:
 | |
|     case NS_ERROR_FILE_READ_ONLY:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_OPEN::access);
 | |
|       break;
 | |
|     case NS_ERROR_FILE_NO_DEVICE_SPACE:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_OPEN::diskspace);
 | |
|       break;
 | |
|     default:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_OPEN::failure);
 | |
|   }
 | |
| }
 | |
| 
 | |
| void Connection::RecordQueryStatus(int srv) {
 | |
|   nsCString histogramKey = mTelemetryFilename;
 | |
| 
 | |
|   if (histogramKey.IsEmpty()) {
 | |
|     histogramKey.AssignLiteral("unknown");
 | |
|   }
 | |
| 
 | |
|   switch (srv) {
 | |
|     case SQLITE_OK:
 | |
|     case SQLITE_ROW:
 | |
|     case SQLITE_DONE:
 | |
| 
 | |
|     // Note that these are returned when we intentionally cancel a statement so
 | |
|     // they aren't indicating a failure.
 | |
|     case SQLITE_ABORT:
 | |
|     case SQLITE_INTERRUPT:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::success);
 | |
|       break;
 | |
|     case SQLITE_CORRUPT:
 | |
|     case SQLITE_NOTADB:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::corrupt);
 | |
|       break;
 | |
|     case SQLITE_PERM:
 | |
|     case SQLITE_CANTOPEN:
 | |
|     case SQLITE_LOCKED:
 | |
|     case SQLITE_READONLY:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::access);
 | |
|       break;
 | |
|     case SQLITE_IOERR:
 | |
|     case SQLITE_NOLFS:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::diskio);
 | |
|       break;
 | |
|     case SQLITE_FULL:
 | |
|     case SQLITE_TOOBIG:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::diskspace);
 | |
|       break;
 | |
|     case SQLITE_CONSTRAINT:
 | |
|     case SQLITE_RANGE:
 | |
|     case SQLITE_MISMATCH:
 | |
|     case SQLITE_MISUSE:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::misuse);
 | |
|       break;
 | |
|     case SQLITE_BUSY:
 | |
|       AccumulateCategoricalKeyed(histogramKey, LABELS_SQLITE_STORE_QUERY::busy);
 | |
|       break;
 | |
|     default:
 | |
|       AccumulateCategoricalKeyed(histogramKey,
 | |
|                                  LABELS_SQLITE_STORE_QUERY::failure);
 | |
|   }
 | |
| }
 | |
| 
 | |
| nsresult Connection::initialize(const nsACString& aStorageKey,
 | |
|                                 const nsACString& aName) {
 | |
|   MOZ_ASSERT(aStorageKey.Equals(kMozStorageMemoryStorageKey));
 | |
|   NS_ASSERTION(!connectionReady(),
 | |
|                "Initialize called on already opened database!");
 | |
|   MOZ_ASSERT(!mIgnoreLockingMode, "Can't ignore locking on an in-memory db.");
 | |
|   AUTO_PROFILER_LABEL("Connection::initialize", OTHER);
 | |
| 
 | |
|   mStorageKey = aStorageKey;
 | |
|   mName = aName;
 | |
| 
 | |
|   // in memory database requested, sqlite uses a magic file name
 | |
| 
 | |
|   const nsAutoCString path =
 | |
|       mName.IsEmpty() ? nsAutoCString(":memory:"_ns)
 | |
|                       : "file:"_ns + mName + "?mode=memory&cache=shared"_ns;
 | |
| 
 | |
|   int srv = ::sqlite3_open_v2(path.get(), &mDBConn, mFlags,
 | |
|                               basevfs::GetVFSName(true));
 | |
|   if (srv != SQLITE_OK) {
 | |
|     mDBConn = nullptr;
 | |
|     nsresult rv = convertResultCode(srv);
 | |
|     RecordOpenStatus(rv);
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
| #ifdef MOZ_SQLITE_FTS3_TOKENIZER
 | |
|   srv =
 | |
|       ::sqlite3_db_config(mDBConn, SQLITE_DBCONFIG_ENABLE_FTS3_TOKENIZER, 1, 0);
 | |
|   MOZ_ASSERT(srv == SQLITE_OK,
 | |
|              "SQLITE_DBCONFIG_ENABLE_FTS3_TOKENIZER should be enabled");
 | |
| #endif
 | |
| 
 | |
|   // Do not set mDatabaseFile or mFileURL here since this is a "memory"
 | |
|   // database.
 | |
| 
 | |
|   nsresult rv = initializeInternal();
 | |
|   RecordOpenStatus(rv);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| nsresult Connection::initialize(nsIFile* aDatabaseFile) {
 | |
|   NS_ASSERTION(aDatabaseFile, "Passed null file!");
 | |
|   NS_ASSERTION(!connectionReady(),
 | |
|                "Initialize called on already opened database!");
 | |
|   AUTO_PROFILER_LABEL("Connection::initialize", OTHER);
 | |
| 
 | |
|   // Do not set mFileURL here since this is database does not have an associated
 | |
|   // URL.
 | |
|   mDatabaseFile = aDatabaseFile;
 | |
| 
 | |
|   nsAutoString path;
 | |
|   nsresult rv = aDatabaseFile->GetPath(path);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   bool exclusive = StaticPrefs::storage_sqlite_exclusiveLock_enabled();
 | |
|   int srv;
 | |
|   if (mIgnoreLockingMode) {
 | |
|     exclusive = false;
 | |
|     srv = ::sqlite3_open_v2(NS_ConvertUTF16toUTF8(path).get(), &mDBConn, mFlags,
 | |
|                             "readonly-immutable-nolock");
 | |
|   } else {
 | |
|     srv = ::sqlite3_open_v2(NS_ConvertUTF16toUTF8(path).get(), &mDBConn, mFlags,
 | |
|                             basevfs::GetVFSName(exclusive));
 | |
|     if (exclusive && (srv == SQLITE_LOCKED || srv == SQLITE_BUSY)) {
 | |
|       // Retry without trying to get an exclusive lock.
 | |
|       exclusive = false;
 | |
|       srv = ::sqlite3_open_v2(NS_ConvertUTF16toUTF8(path).get(), &mDBConn,
 | |
|                               mFlags, basevfs::GetVFSName(false));
 | |
|     }
 | |
|   }
 | |
|   if (srv != SQLITE_OK) {
 | |
|     mDBConn = nullptr;
 | |
|     rv = convertResultCode(srv);
 | |
|     RecordOpenStatus(rv);
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   rv = initializeInternal();
 | |
|   if (exclusive &&
 | |
|       (rv == NS_ERROR_STORAGE_BUSY || rv == NS_ERROR_FILE_IS_LOCKED)) {
 | |
|     // Usually SQLite will fail to acquire an exclusive lock on opening, but in
 | |
|     // some cases it may successfully open the database and then lock on the
 | |
|     // first query execution. When initializeInternal fails it closes the
 | |
|     // connection, so we can try to restart it in non-exclusive mode.
 | |
|     srv = ::sqlite3_open_v2(NS_ConvertUTF16toUTF8(path).get(), &mDBConn, mFlags,
 | |
|                             basevfs::GetVFSName(false));
 | |
|     if (srv == SQLITE_OK) {
 | |
|       rv = initializeInternal();
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   RecordOpenStatus(rv);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| nsresult Connection::initialize(nsIFileURL* aFileURL) {
 | |
|   NS_ASSERTION(aFileURL, "Passed null file URL!");
 | |
|   NS_ASSERTION(!connectionReady(),
 | |
|                "Initialize called on already opened database!");
 | |
|   AUTO_PROFILER_LABEL("Connection::initialize", OTHER);
 | |
| 
 | |
|   nsCOMPtr<nsIFile> databaseFile;
 | |
|   nsresult rv = aFileURL->GetFile(getter_AddRefs(databaseFile));
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   // Set both mDatabaseFile and mFileURL here.
 | |
|   mFileURL = aFileURL;
 | |
|   mDatabaseFile = databaseFile;
 | |
| 
 | |
|   nsAutoCString spec;
 | |
|   rv = aFileURL->GetSpec(spec);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   // If there is a key specified, we need to use the obfuscating VFS.
 | |
|   nsAutoCString query;
 | |
|   rv = aFileURL->GetQuery(query);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   bool hasKey = false;
 | |
|   bool hasDirectoryLockId = false;
 | |
| 
 | |
|   MOZ_ALWAYS_TRUE(
 | |
|       URLParams::Parse(query, true,
 | |
|                        [&hasKey, &hasDirectoryLockId](
 | |
|                            const nsACString& aName, const nsACString& aValue) {
 | |
|                          if (aName.EqualsLiteral("key")) {
 | |
|                            hasKey = true;
 | |
|                            return true;
 | |
|                          }
 | |
|                          if (aName.EqualsLiteral("directoryLockId")) {
 | |
|                            hasDirectoryLockId = true;
 | |
|                            return true;
 | |
|                          }
 | |
|                          return true;
 | |
|                        }));
 | |
| 
 | |
|   bool exclusive = StaticPrefs::storage_sqlite_exclusiveLock_enabled();
 | |
| 
 | |
|   const char* const vfs = hasKey               ? obfsvfs::GetVFSName()
 | |
|                           : hasDirectoryLockId ? quotavfs::GetVFSName()
 | |
|                                                : basevfs::GetVFSName(exclusive);
 | |
| 
 | |
|   int srv = ::sqlite3_open_v2(spec.get(), &mDBConn, mFlags, vfs);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     mDBConn = nullptr;
 | |
|     rv = convertResultCode(srv);
 | |
|     RecordOpenStatus(rv);
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   rv = initializeInternal();
 | |
|   RecordOpenStatus(rv);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| nsresult Connection::initializeInternal() {
 | |
|   MOZ_ASSERT(mDBConn);
 | |
|   auto guard = MakeScopeExit([&]() { initializeFailed(); });
 | |
| 
 | |
|   mConnectionClosed = false;
 | |
| 
 | |
| #ifdef MOZ_SQLITE_FTS3_TOKENIZER
 | |
|   DebugOnly<int> srv2 =
 | |
|       ::sqlite3_db_config(mDBConn, SQLITE_DBCONFIG_ENABLE_FTS3_TOKENIZER, 1, 0);
 | |
|   MOZ_ASSERT(srv2 == SQLITE_OK,
 | |
|              "SQLITE_DBCONFIG_ENABLE_FTS3_TOKENIZER should be enabled");
 | |
| #endif
 | |
| 
 | |
|   // Properly wrap the database handle's mutex.
 | |
|   sharedDBMutex.initWithMutex(sqlite3_db_mutex(mDBConn));
 | |
| 
 | |
|   // SQLite tracing can slow down queries (especially long queries)
 | |
|   // significantly. Don't trace unless the user is actively monitoring SQLite.
 | |
|   if (MOZ_LOG_TEST(gStorageLog, LogLevel::Debug)) {
 | |
|     ::sqlite3_trace_v2(mDBConn, SQLITE_TRACE_STMT | SQLITE_TRACE_PROFILE,
 | |
|                        tracefunc, this);
 | |
| 
 | |
|     MOZ_LOG(
 | |
|         gStorageLog, LogLevel::Debug,
 | |
|         ("Opening connection to '%s' (%p)", mTelemetryFilename.get(), this));
 | |
|   }
 | |
| 
 | |
|   int64_t pageSize = Service::kDefaultPageSize;
 | |
| 
 | |
|   // Set page_size to the preferred default value.  This is effective only if
 | |
|   // the database has just been created, otherwise, if the database does not
 | |
|   // use WAL journal mode, a VACUUM operation will updated its page_size.
 | |
|   nsAutoCString pageSizeQuery(MOZ_STORAGE_UNIQUIFY_QUERY_STR
 | |
|                               "PRAGMA page_size = ");
 | |
|   pageSizeQuery.AppendInt(pageSize);
 | |
|   int srv = executeSql(mDBConn, pageSizeQuery.get());
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   // Setting the cache_size forces the database open, verifying if it is valid
 | |
|   // or corrupt.  So this is executed regardless it being actually needed.
 | |
|   // The cache_size is calculated from the actual page_size, to save memory.
 | |
|   nsAutoCString cacheSizeQuery(MOZ_STORAGE_UNIQUIFY_QUERY_STR
 | |
|                                "PRAGMA cache_size = ");
 | |
|   cacheSizeQuery.AppendInt(-MAX_CACHE_SIZE_KIBIBYTES);
 | |
|   srv = executeSql(mDBConn, cacheSizeQuery.get());
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   // Register our built-in SQL functions.
 | |
|   srv = registerFunctions(mDBConn);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   // Register our built-in SQL collating sequences.
 | |
|   srv = registerCollations(mDBConn, mStorageService);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   // Set the default synchronous value. Each consumer can switch this
 | |
|   // accordingly to their needs.
 | |
| #if defined(ANDROID)
 | |
|   // Android prefers synchronous = OFF for performance reasons.
 | |
|   Unused << ExecuteSimpleSQL("PRAGMA synchronous = OFF;"_ns);
 | |
| #else
 | |
|   // Normal is the suggested value for WAL journals.
 | |
|   Unused << ExecuteSimpleSQL("PRAGMA synchronous = NORMAL;"_ns);
 | |
| #endif
 | |
| 
 | |
|   // Initialization succeeded, we can stop guarding for failures.
 | |
|   guard.release();
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| nsresult Connection::initializeOnAsyncThread(nsIFile* aStorageFile) {
 | |
|   MOZ_ASSERT(!IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
|   nsresult rv = aStorageFile
 | |
|                     ? initialize(aStorageFile)
 | |
|                     : initialize(kMozStorageMemoryStorageKey, VoidCString());
 | |
|   if (NS_FAILED(rv)) {
 | |
|     // Shutdown the async thread, since initialization failed.
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     mAsyncExecutionThreadShuttingDown = true;
 | |
|     nsCOMPtr<nsIRunnable> event =
 | |
|         NewRunnableMethod("Connection::shutdownAsyncThread", this,
 | |
|                           &Connection::shutdownAsyncThread);
 | |
|     Unused << NS_DispatchToMainThread(event);
 | |
|   }
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| void Connection::initializeFailed() {
 | |
|   {
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     mConnectionClosed = true;
 | |
|   }
 | |
|   MOZ_ALWAYS_TRUE(::sqlite3_close(mDBConn) == SQLITE_OK);
 | |
|   mDBConn = nullptr;
 | |
|   sharedDBMutex.destroy();
 | |
| }
 | |
| 
 | |
| nsresult Connection::databaseElementExists(
 | |
|     enum DatabaseElementType aElementType, const nsACString& aElementName,
 | |
|     bool* _exists) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_AVAILABLE;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   // When constructing the query, make sure to SELECT the correct db's
 | |
|   // sqlite_master if the user is prefixing the element with a specific db. ex:
 | |
|   // sample.test
 | |
|   nsCString query("SELECT name FROM (SELECT * FROM ");
 | |
|   nsDependentCSubstring element;
 | |
|   int32_t ind = aElementName.FindChar('.');
 | |
|   if (ind == kNotFound) {
 | |
|     element.Assign(aElementName);
 | |
|   } else {
 | |
|     nsDependentCSubstring db(Substring(aElementName, 0, ind + 1));
 | |
|     element.Assign(Substring(aElementName, ind + 1, aElementName.Length()));
 | |
|     query.Append(db);
 | |
|   }
 | |
|   query.AppendLiteral(
 | |
|       "sqlite_master UNION ALL SELECT * FROM sqlite_temp_master) WHERE type = "
 | |
|       "'");
 | |
| 
 | |
|   switch (aElementType) {
 | |
|     case INDEX:
 | |
|       query.AppendLiteral("index");
 | |
|       break;
 | |
|     case TABLE:
 | |
|       query.AppendLiteral("table");
 | |
|       break;
 | |
|   }
 | |
|   query.AppendLiteral("' AND name ='");
 | |
|   query.Append(element);
 | |
|   query.Append('\'');
 | |
| 
 | |
|   sqlite3_stmt* stmt;
 | |
|   int srv = prepareStatement(mDBConn, query, &stmt);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     RecordQueryStatus(srv);
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   srv = stepStatement(mDBConn, stmt);
 | |
|   // we just care about the return value from step
 | |
|   (void)::sqlite3_finalize(stmt);
 | |
| 
 | |
|   RecordQueryStatus(srv);
 | |
| 
 | |
|   if (srv == SQLITE_ROW) {
 | |
|     *_exists = true;
 | |
|     return NS_OK;
 | |
|   }
 | |
|   if (srv == SQLITE_DONE) {
 | |
|     *_exists = false;
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   return convertResultCode(srv);
 | |
| }
 | |
| 
 | |
| bool Connection::findFunctionByInstance(mozIStorageFunction* aInstance) {
 | |
|   sharedDBMutex.assertCurrentThreadOwns();
 | |
| 
 | |
|   for (const auto& data : mFunctions.Values()) {
 | |
|     if (data.function == aInstance) {
 | |
|       return true;
 | |
|     }
 | |
|   }
 | |
|   return false;
 | |
| }
 | |
| 
 | |
| /* static */
 | |
| int Connection::sProgressHelper(void* aArg) {
 | |
|   Connection* _this = static_cast<Connection*>(aArg);
 | |
|   return _this->progressHandler();
 | |
| }
 | |
| 
 | |
| int Connection::progressHandler() {
 | |
|   sharedDBMutex.assertCurrentThreadOwns();
 | |
|   if (mProgressHandler) {
 | |
|     bool result;
 | |
|     nsresult rv = mProgressHandler->OnProgress(this, &result);
 | |
|     if (NS_FAILED(rv)) return 0;  // Don't break request
 | |
|     return result ? 1 : 0;
 | |
|   }
 | |
|   return 0;
 | |
| }
 | |
| 
 | |
| nsresult Connection::setClosedState() {
 | |
|   // Flag that we are shutting down the async thread, so that
 | |
|   // getAsyncExecutionTarget knows not to expose/create the async thread.
 | |
|   MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|   NS_ENSURE_FALSE(mAsyncExecutionThreadShuttingDown, NS_ERROR_UNEXPECTED);
 | |
| 
 | |
|   mAsyncExecutionThreadShuttingDown = true;
 | |
| 
 | |
|   // Set the property to null before closing the connection, otherwise the
 | |
|   // other functions in the module may try to use the connection after it is
 | |
|   // closed.
 | |
|   mDBConn = nullptr;
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| bool Connection::operationSupported(ConnectionOperation aOperationType) {
 | |
|   if (aOperationType == ASYNCHRONOUS) {
 | |
|     // Async operations are supported for all connections, on any thread.
 | |
|     return true;
 | |
|   }
 | |
|   // Sync operations are supported for sync connections (on any thread), and
 | |
|   // async connections on a background thread.
 | |
|   MOZ_ASSERT(aOperationType == SYNCHRONOUS);
 | |
|   return mSupportedOperations == SYNCHRONOUS || !NS_IsMainThread();
 | |
| }
 | |
| 
 | |
| nsresult Connection::ensureOperationSupported(
 | |
|     ConnectionOperation aOperationType) {
 | |
|   if (NS_WARN_IF(!operationSupported(aOperationType))) {
 | |
| #ifdef DEBUG
 | |
|     if (NS_IsMainThread()) {
 | |
|       nsCOMPtr<nsIXPConnect> xpc = nsIXPConnect::XPConnect();
 | |
|       Unused << xpc->DebugDumpJSStack(false, false, false);
 | |
|     }
 | |
| #endif
 | |
|     MOZ_ASSERT(false,
 | |
|                "Don't use async connections synchronously on the main thread");
 | |
|     return NS_ERROR_NOT_AVAILABLE;
 | |
|   }
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| bool Connection::isConnectionReadyOnThisThread() {
 | |
|   MOZ_ASSERT_IF(connectionReady(), !mConnectionClosed);
 | |
|   if (mAsyncExecutionThread && mAsyncExecutionThread->IsOnCurrentThread()) {
 | |
|     return true;
 | |
|   }
 | |
|   return connectionReady();
 | |
| }
 | |
| 
 | |
| bool Connection::isClosing() {
 | |
|   MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|   return mAsyncExecutionThreadShuttingDown && !mConnectionClosed;
 | |
| }
 | |
| 
 | |
| bool Connection::isClosed() {
 | |
|   MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|   return mConnectionClosed;
 | |
| }
 | |
| 
 | |
| bool Connection::isClosed(MutexAutoLock& lock) { return mConnectionClosed; }
 | |
| 
 | |
| bool Connection::isAsyncExecutionThreadAvailable() {
 | |
|   MOZ_ASSERT(IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
|   return mAsyncExecutionThread && !mAsyncExecutionThreadShuttingDown;
 | |
| }
 | |
| 
 | |
| void Connection::shutdownAsyncThread() {
 | |
|   MOZ_ASSERT(IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
|   MOZ_ASSERT(mAsyncExecutionThread);
 | |
|   MOZ_ASSERT(mAsyncExecutionThreadShuttingDown);
 | |
| 
 | |
|   MOZ_ALWAYS_SUCCEEDS(mAsyncExecutionThread->Shutdown());
 | |
|   mAsyncExecutionThread = nullptr;
 | |
| }
 | |
| 
 | |
| nsresult Connection::internalClose(sqlite3* aNativeConnection) {
 | |
| #ifdef DEBUG
 | |
|   {  // Make sure we have marked our async thread as shutting down.
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     MOZ_ASSERT(mAsyncExecutionThreadShuttingDown,
 | |
|                "Did not call setClosedState!");
 | |
|     MOZ_ASSERT(!isClosed(lockedScope), "Unexpected closed state");
 | |
|   }
 | |
| #endif  // DEBUG
 | |
| 
 | |
|   if (MOZ_LOG_TEST(gStorageLog, LogLevel::Debug)) {
 | |
|     nsAutoCString leafName(":memory");
 | |
|     if (mDatabaseFile) (void)mDatabaseFile->GetNativeLeafName(leafName);
 | |
|     MOZ_LOG(gStorageLog, LogLevel::Debug,
 | |
|             ("Closing connection to '%s'", leafName.get()));
 | |
|   }
 | |
| 
 | |
|   // At this stage, we may still have statements that need to be
 | |
|   // finalized. Attempt to close the database connection. This will
 | |
|   // always disconnect any virtual tables and cleanly finalize their
 | |
|   // internal statements. Once this is done, closing may fail due to
 | |
|   // unfinalized client statements, in which case we need to finalize
 | |
|   // these statements and close again.
 | |
|   {
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     mConnectionClosed = true;
 | |
|   }
 | |
| 
 | |
|   // Nothing else needs to be done if we don't have a connection here.
 | |
|   if (!aNativeConnection) return NS_OK;
 | |
| 
 | |
|   int srv = ::sqlite3_close(aNativeConnection);
 | |
| 
 | |
|   if (srv == SQLITE_BUSY) {
 | |
|     {
 | |
|       // Nothing else should change the connection or statements status until we
 | |
|       // are done here.
 | |
|       SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|       // We still have non-finalized statements. Finalize them.
 | |
|       sqlite3_stmt* stmt = nullptr;
 | |
|       while ((stmt = ::sqlite3_next_stmt(aNativeConnection, stmt))) {
 | |
|         MOZ_LOG(gStorageLog, LogLevel::Debug,
 | |
|                 ("Auto-finalizing SQL statement '%s' (%p)", ::sqlite3_sql(stmt),
 | |
|                  stmt));
 | |
| 
 | |
| #ifdef DEBUG
 | |
|         SmprintfPointer msg = ::mozilla::Smprintf(
 | |
|             "SQL statement '%s' (%p) should have been finalized before closing "
 | |
|             "the connection",
 | |
|             ::sqlite3_sql(stmt), stmt);
 | |
|         NS_WARNING(msg.get());
 | |
| #endif  // DEBUG
 | |
| 
 | |
|         srv = ::sqlite3_finalize(stmt);
 | |
| 
 | |
| #ifdef DEBUG
 | |
|         if (srv != SQLITE_OK) {
 | |
|           SmprintfPointer msg = ::mozilla::Smprintf(
 | |
|               "Could not finalize SQL statement (%p)", stmt);
 | |
|           NS_WARNING(msg.get());
 | |
|         }
 | |
| #endif  // DEBUG
 | |
| 
 | |
|         // Ensure that the loop continues properly, whether closing has
 | |
|         // succeeded or not.
 | |
|         if (srv == SQLITE_OK) {
 | |
|           stmt = nullptr;
 | |
|         }
 | |
|       }
 | |
|       // Scope exiting will unlock the mutex before we invoke sqlite3_close()
 | |
|       // again, since Sqlite will try to acquire it.
 | |
|     }
 | |
| 
 | |
|     // Now that all statements have been finalized, we
 | |
|     // should be able to close.
 | |
|     srv = ::sqlite3_close(aNativeConnection);
 | |
|     MOZ_ASSERT(false,
 | |
|                "Had to forcibly close the database connection because not all "
 | |
|                "the statements have been finalized.");
 | |
|   }
 | |
| 
 | |
|   if (srv == SQLITE_OK) {
 | |
|     sharedDBMutex.destroy();
 | |
|   } else {
 | |
|     MOZ_ASSERT(false,
 | |
|                "sqlite3_close failed. There are probably outstanding "
 | |
|                "statements that are listed above!");
 | |
|   }
 | |
| 
 | |
|   return convertResultCode(srv);
 | |
| }
 | |
| 
 | |
| nsCString Connection::getFilename() { return mTelemetryFilename; }
 | |
| 
 | |
| int Connection::stepStatement(sqlite3* aNativeConnection,
 | |
|                               sqlite3_stmt* aStatement) {
 | |
|   MOZ_ASSERT(aStatement);
 | |
| 
 | |
|   AUTO_PROFILER_LABEL_DYNAMIC_CSTR("Connection::stepStatement", OTHER,
 | |
|                                    ::sqlite3_sql(aStatement));
 | |
| 
 | |
|   bool checkedMainThread = false;
 | |
|   TimeStamp startTime = TimeStamp::Now();
 | |
| 
 | |
|   // The connection may have been closed if the executing statement has been
 | |
|   // created and cached after a call to asyncClose() but before the actual
 | |
|   // sqlite3_close().  This usually happens when other tasks using cached
 | |
|   // statements are asynchronously scheduled for execution and any of them ends
 | |
|   // up after asyncClose. See bug 728653 for details.
 | |
|   if (!isConnectionReadyOnThisThread()) return SQLITE_MISUSE;
 | |
| 
 | |
|   (void)::sqlite3_extended_result_codes(aNativeConnection, 1);
 | |
| 
 | |
|   int srv;
 | |
|   while ((srv = ::sqlite3_step(aStatement)) == SQLITE_LOCKED_SHAREDCACHE) {
 | |
|     if (!checkedMainThread) {
 | |
|       checkedMainThread = true;
 | |
|       if (::NS_IsMainThread()) {
 | |
|         NS_WARNING("We won't allow blocking on the main thread!");
 | |
|         break;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     srv = WaitForUnlockNotify(aNativeConnection);
 | |
|     if (srv != SQLITE_OK) {
 | |
|       break;
 | |
|     }
 | |
| 
 | |
|     ::sqlite3_reset(aStatement);
 | |
|   }
 | |
| 
 | |
|   // Report very slow SQL statements to Telemetry
 | |
|   TimeDuration duration = TimeStamp::Now() - startTime;
 | |
|   const uint32_t threshold = NS_IsMainThread()
 | |
|                                  ? Telemetry::kSlowSQLThresholdForMainThread
 | |
|                                  : Telemetry::kSlowSQLThresholdForHelperThreads;
 | |
|   if (duration.ToMilliseconds() >= threshold) {
 | |
|     nsDependentCString statementString(::sqlite3_sql(aStatement));
 | |
|     Telemetry::RecordSlowSQLStatement(
 | |
|         statementString, mTelemetryFilename,
 | |
|         static_cast<uint32_t>(duration.ToMilliseconds()));
 | |
|   }
 | |
| 
 | |
|   (void)::sqlite3_extended_result_codes(aNativeConnection, 0);
 | |
|   // Drop off the extended result bits of the result code.
 | |
|   return srv & 0xFF;
 | |
| }
 | |
| 
 | |
| int Connection::prepareStatement(sqlite3* aNativeConnection,
 | |
|                                  const nsCString& aSQL, sqlite3_stmt** _stmt) {
 | |
|   // We should not even try to prepare statements after the connection has
 | |
|   // been closed.
 | |
|   if (!isConnectionReadyOnThisThread()) return SQLITE_MISUSE;
 | |
| 
 | |
|   bool checkedMainThread = false;
 | |
| 
 | |
|   (void)::sqlite3_extended_result_codes(aNativeConnection, 1);
 | |
| 
 | |
|   int srv;
 | |
|   while ((srv = ::sqlite3_prepare_v2(aNativeConnection, aSQL.get(), -1, _stmt,
 | |
|                                      nullptr)) == SQLITE_LOCKED_SHAREDCACHE) {
 | |
|     if (!checkedMainThread) {
 | |
|       checkedMainThread = true;
 | |
|       if (::NS_IsMainThread()) {
 | |
|         NS_WARNING("We won't allow blocking on the main thread!");
 | |
|         break;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     srv = WaitForUnlockNotify(aNativeConnection);
 | |
|     if (srv != SQLITE_OK) {
 | |
|       break;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (srv != SQLITE_OK) {
 | |
|     nsCString warnMsg;
 | |
|     warnMsg.AppendLiteral("The SQL statement '");
 | |
|     warnMsg.Append(aSQL);
 | |
|     warnMsg.AppendLiteral("' could not be compiled due to an error: ");
 | |
|     warnMsg.Append(::sqlite3_errmsg(aNativeConnection));
 | |
| 
 | |
| #ifdef DEBUG
 | |
|     NS_WARNING(warnMsg.get());
 | |
| #endif
 | |
|     MOZ_LOG(gStorageLog, LogLevel::Error, ("%s", warnMsg.get()));
 | |
|   }
 | |
| 
 | |
|   (void)::sqlite3_extended_result_codes(aNativeConnection, 0);
 | |
|   // Drop off the extended result bits of the result code.
 | |
|   int rc = srv & 0xFF;
 | |
|   // sqlite will return OK on a comment only string and set _stmt to nullptr.
 | |
|   // The callers of this function are used to only checking the return value,
 | |
|   // so it is safer to return an error code.
 | |
|   if (rc == SQLITE_OK && *_stmt == nullptr) {
 | |
|     return SQLITE_MISUSE;
 | |
|   }
 | |
| 
 | |
|   return rc;
 | |
| }
 | |
| 
 | |
| int Connection::executeSql(sqlite3* aNativeConnection, const char* aSqlString) {
 | |
|   if (!isConnectionReadyOnThisThread()) return SQLITE_MISUSE;
 | |
| 
 | |
|   AUTO_PROFILER_LABEL_DYNAMIC_CSTR("Connection::executeSql", OTHER, aSqlString);
 | |
| 
 | |
|   TimeStamp startTime = TimeStamp::Now();
 | |
|   int srv =
 | |
|       ::sqlite3_exec(aNativeConnection, aSqlString, nullptr, nullptr, nullptr);
 | |
|   RecordQueryStatus(srv);
 | |
| 
 | |
|   // Report very slow SQL statements to Telemetry
 | |
|   TimeDuration duration = TimeStamp::Now() - startTime;
 | |
|   const uint32_t threshold = NS_IsMainThread()
 | |
|                                  ? Telemetry::kSlowSQLThresholdForMainThread
 | |
|                                  : Telemetry::kSlowSQLThresholdForHelperThreads;
 | |
|   if (duration.ToMilliseconds() >= threshold) {
 | |
|     nsDependentCString statementString(aSqlString);
 | |
|     Telemetry::RecordSlowSQLStatement(
 | |
|         statementString, mTelemetryFilename,
 | |
|         static_cast<uint32_t>(duration.ToMilliseconds()));
 | |
|   }
 | |
| 
 | |
|   return srv;
 | |
| }
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// nsIInterfaceRequestor
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetInterface(const nsIID& aIID, void** _result) {
 | |
|   if (aIID.Equals(NS_GET_IID(nsIEventTarget))) {
 | |
|     nsIEventTarget* background = getAsyncExecutionTarget();
 | |
|     NS_IF_ADDREF(background);
 | |
|     *_result = background;
 | |
|     return NS_OK;
 | |
|   }
 | |
|   return NS_ERROR_NO_INTERFACE;
 | |
| }
 | |
| 
 | |
| ////////////////////////////////////////////////////////////////////////////////
 | |
| //// mozIStorageConnection
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::Close() {
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
|   return synchronousClose();
 | |
| }
 | |
| 
 | |
| nsresult Connection::synchronousClose() {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
| 
 | |
| #ifdef DEBUG
 | |
|   // Since we're accessing mAsyncExecutionThread, we need to be on the opener
 | |
|   // event target. We make this check outside of debug code below in
 | |
|   // setClosedState, but this is here to be explicit.
 | |
|   MOZ_ASSERT(IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
| #endif  // DEBUG
 | |
| 
 | |
|   // Make sure we have not executed any asynchronous statements.
 | |
|   // If this fails, the mDBConn may be left open, resulting in a leak.
 | |
|   // We'll try to finalize the pending statements and close the connection.
 | |
|   if (isAsyncExecutionThreadAvailable()) {
 | |
| #ifdef DEBUG
 | |
|     if (NS_IsMainThread()) {
 | |
|       nsCOMPtr<nsIXPConnect> xpc = nsIXPConnect::XPConnect();
 | |
|       Unused << xpc->DebugDumpJSStack(false, false, false);
 | |
|     }
 | |
| #endif
 | |
|     MOZ_ASSERT(false,
 | |
|                "Close() was invoked on a connection that executed asynchronous "
 | |
|                "statements. "
 | |
|                "Should have used asyncClose().");
 | |
|     // Try to close the database regardless, to free up resources.
 | |
|     Unused << SpinningSynchronousClose();
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
| 
 | |
|   // setClosedState nullifies our connection pointer, so we take a raw pointer
 | |
|   // off it, to pass it through the close procedure.
 | |
|   sqlite3* nativeConn = mDBConn;
 | |
|   nsresult rv = setClosedState();
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   return internalClose(nativeConn);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::SpinningSynchronousClose() {
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
|   if (!IsOnCurrentSerialEventTarget(eventTargetOpenedOn)) {
 | |
|     return NS_ERROR_NOT_SAME_THREAD;
 | |
|   }
 | |
| 
 | |
|   // As currently implemented, we can't spin to wait for an existing AsyncClose.
 | |
|   // Our only existing caller will never have called close; assert if misused
 | |
|   // so that no new callers assume this works after an AsyncClose.
 | |
|   MOZ_DIAGNOSTIC_ASSERT(connectionReady());
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
| 
 | |
|   RefPtr<CloseListener> listener = new CloseListener();
 | |
|   rv = AsyncClose(listener);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
|   MOZ_ALWAYS_TRUE(
 | |
|       SpinEventLoopUntil("storage::Connection::SpinningSynchronousClose"_ns,
 | |
|                          [&]() { return listener->mClosed; }));
 | |
|   MOZ_ASSERT(isClosed(), "The connection should be closed at this point");
 | |
| 
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::AsyncClose(mozIStorageCompletionCallback* aCallback) {
 | |
|   NS_ENSURE_TRUE(NS_IsMainThread(), NS_ERROR_NOT_SAME_THREAD);
 | |
|   // Check if AsyncClose or Close were already invoked.
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   // The two relevant factors at this point are whether we have a database
 | |
|   // connection and whether we have an async execution thread.  Here's what the
 | |
|   // states mean and how we handle them:
 | |
|   //
 | |
|   // - (mDBConn && asyncThread): The expected case where we are either an
 | |
|   //   async connection or a sync connection that has been used asynchronously.
 | |
|   //   Either way the caller must call us and not Close().  Nothing surprising
 | |
|   //   about this.  We'll dispatch AsyncCloseConnection to the already-existing
 | |
|   //   async thread.
 | |
|   //
 | |
|   // - (mDBConn && !asyncThread): A somewhat unusual case where the caller
 | |
|   //   opened the connection synchronously and was planning to use it
 | |
|   //   asynchronously, but never got around to using it asynchronously before
 | |
|   //   needing to shutdown.  This has been observed to happen for the cookie
 | |
|   //   service in a case where Firefox shuts itself down almost immediately
 | |
|   //   after startup (for unknown reasons).  In the Firefox shutdown case,
 | |
|   //   we may also fail to create a new async execution thread if one does not
 | |
|   //   already exist.  (nsThreadManager will refuse to create new threads when
 | |
|   //   it has already been told to shutdown.)  As such, we need to handle a
 | |
|   //   failure to create the async execution thread by falling back to
 | |
|   //   synchronous Close() and also dispatching the completion callback because
 | |
|   //   at least Places likes to spin a nested event loop that depends on the
 | |
|   //   callback being invoked.
 | |
|   //
 | |
|   //   Note that we have considered not trying to spin up the async execution
 | |
|   //   thread in this case if it does not already exist, but the overhead of
 | |
|   //   thread startup (if successful) is significantly less expensive than the
 | |
|   //   worst-case potential I/O hit of synchronously closing a database when we
 | |
|   //   could close it asynchronously.
 | |
|   //
 | |
|   // - (!mDBConn && asyncThread): This happens in some but not all cases where
 | |
|   //   OpenAsyncDatabase encountered a problem opening the database.  If it
 | |
|   //   happened in all cases AsyncInitDatabase would just shut down the thread
 | |
|   //   directly and we would avoid this case.  But it doesn't, so for simplicity
 | |
|   //   and consistency AsyncCloseConnection knows how to handle this and we
 | |
|   //   act like this was the (mDBConn && asyncThread) case in this method.
 | |
|   //
 | |
|   // - (!mDBConn && !asyncThread): The database was never successfully opened or
 | |
|   //   Close() or AsyncClose() has already been called (at least) once.  This is
 | |
|   //   undeniably a misuse case by the caller.  We could optimize for this
 | |
|   //   case by adding an additional check of mAsyncExecutionThread without using
 | |
|   //   getAsyncExecutionTarget() to avoid wastefully creating a thread just to
 | |
|   //   shut it down.  But this complicates the method for broken caller code
 | |
|   //   whereas we're still correct and safe without the special-case.
 | |
|   nsIEventTarget* asyncThread = getAsyncExecutionTarget();
 | |
| 
 | |
|   // Create our callback event if we were given a callback.  This will
 | |
|   // eventually be dispatched in all cases, even if we fall back to Close() and
 | |
|   // the database wasn't open and we return an error.  The rationale is that
 | |
|   // no existing consumer checks our return value and several of them like to
 | |
|   // spin nested event loops until the callback fires.  Given that, it seems
 | |
|   // preferable for us to dispatch the callback in all cases.  (Except the
 | |
|   // wrong thread misuse case we bailed on up above.  But that's okay because
 | |
|   // that is statically wrong whereas these edge cases are dynamic.)
 | |
|   nsCOMPtr<nsIRunnable> completeEvent;
 | |
|   if (aCallback) {
 | |
|     completeEvent = newCompletionEvent(aCallback);
 | |
|   }
 | |
| 
 | |
|   if (!asyncThread) {
 | |
|     // We were unable to create an async thread, so we need to fall back to
 | |
|     // using normal Close().  Since there is no async thread, Close() will
 | |
|     // not complain about that.  (Close() may, however, complain if the
 | |
|     // connection is closed, but that's okay.)
 | |
|     if (completeEvent) {
 | |
|       // Closing the database is more important than returning an error code
 | |
|       // about a failure to dispatch, especially because all existing native
 | |
|       // callers ignore our return value.
 | |
|       Unused << NS_DispatchToMainThread(completeEvent.forget());
 | |
|     }
 | |
|     MOZ_ALWAYS_SUCCEEDS(synchronousClose());
 | |
|     // Return a success inconditionally here, since Close() is unlikely to fail
 | |
|     // and we want to reassure the consumer that its callback will be invoked.
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   // If we're closing the connection during shutdown, and there is an
 | |
|   // interruptible statement running on the helper thread, issue a
 | |
|   // sqlite3_interrupt() to avoid crashing when that statement takes a long
 | |
|   // time (for example a vacuum).
 | |
|   if (AppShutdown::IsInOrBeyond(ShutdownPhase::AppShutdownConfirmed) &&
 | |
|       mInterruptible && mIsStatementOnHelperThreadInterruptible) {
 | |
|     MOZ_ASSERT(!isClosing(), "Must not be closing, see Interrupt()");
 | |
|     DebugOnly<nsresult> rv2 = Interrupt();
 | |
|     MOZ_ASSERT(NS_SUCCEEDED(rv2));
 | |
|   }
 | |
| 
 | |
|   // setClosedState nullifies our connection pointer, so we take a raw pointer
 | |
|   // off it, to pass it through the close procedure.
 | |
|   sqlite3* nativeConn = mDBConn;
 | |
|   rv = setClosedState();
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   // Create and dispatch our close event to the background thread.
 | |
|   nsCOMPtr<nsIRunnable> closeEvent =
 | |
|       new AsyncCloseConnection(this, nativeConn, completeEvent);
 | |
|   rv = asyncThread->Dispatch(closeEvent, NS_DISPATCH_NORMAL);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::AsyncClone(bool aReadOnly,
 | |
|                        mozIStorageCompletionCallback* aCallback) {
 | |
|   AUTO_PROFILER_LABEL("Connection::AsyncClone", OTHER);
 | |
| 
 | |
|   NS_ENSURE_TRUE(NS_IsMainThread(), NS_ERROR_NOT_SAME_THREAD);
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
|   if (!mDatabaseFile) return NS_ERROR_UNEXPECTED;
 | |
| 
 | |
|   int flags = mFlags;
 | |
|   if (aReadOnly) {
 | |
|     // Turn off SQLITE_OPEN_READWRITE, and set SQLITE_OPEN_READONLY.
 | |
|     flags = (~SQLITE_OPEN_READWRITE & flags) | SQLITE_OPEN_READONLY;
 | |
|     // Turn off SQLITE_OPEN_CREATE.
 | |
|     flags = (~SQLITE_OPEN_CREATE & flags);
 | |
|   }
 | |
| 
 | |
|   // The cloned connection will still implement the synchronous API, but throw
 | |
|   // if any synchronous methods are called on the main thread.
 | |
|   RefPtr<Connection> clone =
 | |
|       new Connection(mStorageService, flags, ASYNCHRONOUS, mTelemetryFilename);
 | |
| 
 | |
|   RefPtr<AsyncInitializeClone> initEvent =
 | |
|       new AsyncInitializeClone(this, clone, aReadOnly, aCallback);
 | |
|   // Dispatch to our async thread, since the originating connection must remain
 | |
|   // valid and open for the whole cloning process.  This also ensures we are
 | |
|   // properly serialized with a `close` operation, rather than race with it.
 | |
|   nsCOMPtr<nsIEventTarget> target = getAsyncExecutionTarget();
 | |
|   if (!target) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
|   return target->Dispatch(initEvent, NS_DISPATCH_NORMAL);
 | |
| }
 | |
| 
 | |
| nsresult Connection::initializeClone(Connection* aClone, bool aReadOnly) {
 | |
|   nsresult rv;
 | |
|   if (!mStorageKey.IsEmpty()) {
 | |
|     rv = aClone->initialize(mStorageKey, mName);
 | |
|   } else if (mFileURL) {
 | |
|     rv = aClone->initialize(mFileURL);
 | |
|   } else {
 | |
|     rv = aClone->initialize(mDatabaseFile);
 | |
|   }
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   auto guard = MakeScopeExit([&]() { aClone->initializeFailed(); });
 | |
| 
 | |
|   rv = aClone->SetDefaultTransactionType(mDefaultTransactionType);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   // Re-attach on-disk databases that were attached to the original connection.
 | |
|   {
 | |
|     nsCOMPtr<mozIStorageStatement> stmt;
 | |
|     rv = CreateStatement("PRAGMA database_list"_ns, getter_AddRefs(stmt));
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
|     bool hasResult = false;
 | |
|     while (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|       nsAutoCString name;
 | |
|       rv = stmt->GetUTF8String(1, name);
 | |
|       if (NS_SUCCEEDED(rv) && !name.EqualsLiteral("main") &&
 | |
|           !name.EqualsLiteral("temp")) {
 | |
|         nsCString path;
 | |
|         rv = stmt->GetUTF8String(2, path);
 | |
|         if (NS_SUCCEEDED(rv) && !path.IsEmpty()) {
 | |
|           nsCOMPtr<mozIStorageStatement> attachStmt;
 | |
|           rv = aClone->CreateStatement("ATTACH DATABASE :path AS "_ns + name,
 | |
|                                        getter_AddRefs(attachStmt));
 | |
|           NS_ENSURE_SUCCESS(rv, rv);
 | |
|           rv = attachStmt->BindUTF8StringByName("path"_ns, path);
 | |
|           NS_ENSURE_SUCCESS(rv, rv);
 | |
|           rv = attachStmt->Execute();
 | |
|           NS_ENSURE_SUCCESS(rv, rv);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Copy over pragmas from the original connection.
 | |
|   // LIMITATION WARNING!  Many of these pragmas are actually scoped to the
 | |
|   // schema ("main" and any other attached databases), and this implmentation
 | |
|   // fails to propagate them.  This is being addressed on trunk.
 | |
|   static const char* pragmas[] = {
 | |
|       "cache_size",  "temp_store",         "foreign_keys", "journal_size_limit",
 | |
|       "synchronous", "wal_autocheckpoint", "busy_timeout"};
 | |
|   for (auto& pragma : pragmas) {
 | |
|     // Read-only connections just need cache_size and temp_store pragmas.
 | |
|     if (aReadOnly && ::strcmp(pragma, "cache_size") != 0 &&
 | |
|         ::strcmp(pragma, "temp_store") != 0) {
 | |
|       continue;
 | |
|     }
 | |
| 
 | |
|     nsAutoCString pragmaQuery("PRAGMA ");
 | |
|     pragmaQuery.Append(pragma);
 | |
|     nsCOMPtr<mozIStorageStatement> stmt;
 | |
|     rv = CreateStatement(pragmaQuery, getter_AddRefs(stmt));
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
|     bool hasResult = false;
 | |
|     if (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|       pragmaQuery.AppendLiteral(" = ");
 | |
|       pragmaQuery.AppendInt(stmt->AsInt32(0));
 | |
|       rv = aClone->ExecuteSimpleSQL(pragmaQuery);
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Copy over temporary tables, triggers, and views from the original
 | |
|   // connections. Entities in `sqlite_temp_master` are only visible to the
 | |
|   // connection that created them.
 | |
|   if (!aReadOnly) {
 | |
|     rv = aClone->ExecuteSimpleSQL("BEGIN TRANSACTION"_ns);
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|     nsCOMPtr<mozIStorageStatement> stmt;
 | |
|     rv = CreateStatement(nsLiteralCString("SELECT sql FROM sqlite_temp_master "
 | |
|                                           "WHERE type IN ('table', 'view', "
 | |
|                                           "'index', 'trigger')"),
 | |
|                          getter_AddRefs(stmt));
 | |
|     // Propagate errors, because failing to copy triggers might cause schema
 | |
|     // coherency issues when writing to the database from the cloned connection.
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
|     bool hasResult = false;
 | |
|     while (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|       nsAutoCString query;
 | |
|       rv = stmt->GetUTF8String(0, query);
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|       // The `CREATE` SQL statements in `sqlite_temp_master` omit the `TEMP`
 | |
|       // keyword. We need to add it back, or we'll recreate temporary entities
 | |
|       // as persistent ones. `sqlite_temp_master` also holds `CREATE INDEX`
 | |
|       // statements, but those don't need `TEMP` keywords.
 | |
|       if (StringBeginsWith(query, "CREATE TABLE "_ns) ||
 | |
|           StringBeginsWith(query, "CREATE TRIGGER "_ns) ||
 | |
|           StringBeginsWith(query, "CREATE VIEW "_ns)) {
 | |
|         query.Replace(0, 6, "CREATE TEMP");
 | |
|       }
 | |
| 
 | |
|       rv = aClone->ExecuteSimpleSQL(query);
 | |
|       NS_ENSURE_SUCCESS(rv, rv);
 | |
|     }
 | |
| 
 | |
|     rv = aClone->ExecuteSimpleSQL("COMMIT"_ns);
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
|   }
 | |
| 
 | |
|   // Copy any functions that have been added to this connection.
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   for (const auto& entry : mFunctions) {
 | |
|     const nsACString& key = entry.GetKey();
 | |
|     Connection::FunctionInfo data = entry.GetData();
 | |
| 
 | |
|     rv = aClone->CreateFunction(key, data.numArgs, data.function);
 | |
|     if (NS_FAILED(rv)) {
 | |
|       NS_WARNING("Failed to copy function to cloned connection");
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Load SQLite extensions that were on this connection.
 | |
|   // Copy into an array rather than holding the mutex while we load extensions.
 | |
|   nsTArray<nsCString> loadedExtensions;
 | |
|   {
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     AppendToArray(loadedExtensions, mLoadedExtensions);
 | |
|   }
 | |
|   for (const auto& extension : loadedExtensions) {
 | |
|     (void)aClone->LoadExtension(extension, nullptr);
 | |
|   }
 | |
| 
 | |
|   guard.release();
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::Clone(bool aReadOnly, mozIStorageConnection** _connection) {
 | |
|   MOZ_ASSERT(IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
| 
 | |
|   AUTO_PROFILER_LABEL("Connection::Clone", OTHER);
 | |
| 
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   int flags = mFlags;
 | |
|   if (aReadOnly) {
 | |
|     // Turn off SQLITE_OPEN_READWRITE, and set SQLITE_OPEN_READONLY.
 | |
|     flags = (~SQLITE_OPEN_READWRITE & flags) | SQLITE_OPEN_READONLY;
 | |
|     // Turn off SQLITE_OPEN_CREATE.
 | |
|     flags = (~SQLITE_OPEN_CREATE & flags);
 | |
|   }
 | |
| 
 | |
|   RefPtr<Connection> clone =
 | |
|       new Connection(mStorageService, flags, mSupportedOperations,
 | |
|                      mTelemetryFilename, mInterruptible);
 | |
| 
 | |
|   rv = initializeClone(clone, aReadOnly);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   NS_IF_ADDREF(*_connection = clone);
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::Interrupt() {
 | |
|   MOZ_ASSERT(mInterruptible, "Interrupt method not allowed");
 | |
|   MOZ_ASSERT_IF(SYNCHRONOUS == mSupportedOperations,
 | |
|                 !IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
|   MOZ_ASSERT_IF(ASYNCHRONOUS == mSupportedOperations,
 | |
|                 IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
| 
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
| 
 | |
|   if (isClosing()) {  // Closing already in asynchronous case
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   {
 | |
|     // As stated on https://www.sqlite.org/c3ref/interrupt.html,
 | |
|     // it is not safe to call sqlite3_interrupt() when
 | |
|     // database connection is closed or might close before
 | |
|     // sqlite3_interrupt() returns.
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     if (!isClosed(lockedScope)) {
 | |
|       MOZ_ASSERT(mDBConn);
 | |
|       ::sqlite3_interrupt(mDBConn);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::AsyncVacuum(mozIStorageCompletionCallback* aCallback,
 | |
|                         bool aUseIncremental, int32_t aSetPageSize) {
 | |
|   NS_ENSURE_TRUE(NS_IsMainThread(), NS_ERROR_NOT_SAME_THREAD);
 | |
|   // Abort if we're shutting down.
 | |
|   if (AppShutdown::IsInOrBeyond(ShutdownPhase::AppShutdownConfirmed)) {
 | |
|     return NS_ERROR_ABORT;
 | |
|   }
 | |
|   // Check if AsyncClose or Close were already invoked.
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
|   nsIEventTarget* asyncThread = getAsyncExecutionTarget();
 | |
|   if (!asyncThread) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
| 
 | |
|   // Create and dispatch our vacuum event to the background thread.
 | |
|   nsCOMPtr<nsIRunnable> vacuumEvent =
 | |
|       new AsyncVacuumEvent(this, aCallback, aUseIncremental, aSetPageSize);
 | |
|   rv = asyncThread->Dispatch(vacuumEvent, NS_DISPATCH_NORMAL);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetDefaultPageSize(int32_t* _defaultPageSize) {
 | |
|   *_defaultPageSize = Service::kDefaultPageSize;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetConnectionReady(bool* _ready) {
 | |
|   MOZ_ASSERT(IsOnCurrentSerialEventTarget(eventTargetOpenedOn));
 | |
|   *_ready = connectionReady();
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetDatabaseFile(nsIFile** _dbFile) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   NS_IF_ADDREF(*_dbFile = mDatabaseFile);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetLastInsertRowID(int64_t* _id) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   sqlite_int64 id = ::sqlite3_last_insert_rowid(mDBConn);
 | |
|   *_id = id;
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetAffectedRows(int32_t* _rows) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   *_rows = ::sqlite3_changes(mDBConn);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetLastError(int32_t* _error) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   *_error = ::sqlite3_errcode(mDBConn);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetLastErrorString(nsACString& _errorString) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   const char* serr = ::sqlite3_errmsg(mDBConn);
 | |
|   _errorString.Assign(serr);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetSchemaVersion(int32_t* _version) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   nsCOMPtr<mozIStorageStatement> stmt;
 | |
|   (void)CreateStatement("PRAGMA user_version"_ns, getter_AddRefs(stmt));
 | |
|   NS_ENSURE_TRUE(stmt, NS_ERROR_OUT_OF_MEMORY);
 | |
| 
 | |
|   *_version = 0;
 | |
|   bool hasResult;
 | |
|   if (NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|     *_version = stmt->AsInt32(0);
 | |
|   }
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::SetSchemaVersion(int32_t aVersion) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   nsAutoCString stmt("PRAGMA user_version = "_ns);
 | |
|   stmt.AppendInt(aVersion);
 | |
| 
 | |
|   return ExecuteSimpleSQL(stmt);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::CreateStatement(const nsACString& aSQLStatement,
 | |
|                             mozIStorageStatement** _stmt) {
 | |
|   NS_ENSURE_ARG_POINTER(_stmt);
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   RefPtr<Statement> statement(new Statement());
 | |
|   NS_ENSURE_TRUE(statement, NS_ERROR_OUT_OF_MEMORY);
 | |
| 
 | |
|   rv = statement->initialize(this, mDBConn, aSQLStatement);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   Statement* rawPtr;
 | |
|   statement.forget(&rawPtr);
 | |
|   *_stmt = rawPtr;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::CreateAsyncStatement(const nsACString& aSQLStatement,
 | |
|                                  mozIStorageAsyncStatement** _stmt) {
 | |
|   NS_ENSURE_ARG_POINTER(_stmt);
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   RefPtr<AsyncStatement> statement(new AsyncStatement());
 | |
|   NS_ENSURE_TRUE(statement, NS_ERROR_OUT_OF_MEMORY);
 | |
| 
 | |
|   rv = statement->initialize(this, mDBConn, aSQLStatement);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|   AsyncStatement* rawPtr;
 | |
|   statement.forget(&rawPtr);
 | |
|   *_stmt = rawPtr;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::ExecuteSimpleSQL(const nsACString& aSQLStatement) {
 | |
|   CHECK_MAINTHREAD_ABUSE();
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   int srv = executeSql(mDBConn, PromiseFlatCString(aSQLStatement).get());
 | |
|   return convertResultCode(srv);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::ExecuteAsync(
 | |
|     const nsTArray<RefPtr<mozIStorageBaseStatement>>& aStatements,
 | |
|     mozIStorageStatementCallback* aCallback,
 | |
|     mozIStoragePendingStatement** _handle) {
 | |
|   nsTArray<StatementData> stmts(aStatements.Length());
 | |
|   for (uint32_t i = 0; i < aStatements.Length(); i++) {
 | |
|     nsCOMPtr<StorageBaseStatementInternal> stmt =
 | |
|         do_QueryInterface(aStatements[i]);
 | |
|     NS_ENSURE_STATE(stmt);
 | |
| 
 | |
|     // Obtain our StatementData.
 | |
|     StatementData data;
 | |
|     nsresult rv = stmt->getAsynchronousStatementData(data);
 | |
|     NS_ENSURE_SUCCESS(rv, rv);
 | |
| 
 | |
|     NS_ASSERTION(stmt->getOwner() == this,
 | |
|                  "Statement must be from this database connection!");
 | |
| 
 | |
|     // Now append it to our array.
 | |
|     stmts.AppendElement(data);
 | |
|   }
 | |
| 
 | |
|   // Dispatch to the background
 | |
|   return AsyncExecuteStatements::execute(std::move(stmts), this, mDBConn,
 | |
|                                          aCallback, _handle);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::ExecuteSimpleSQLAsync(const nsACString& aSQLStatement,
 | |
|                                   mozIStorageStatementCallback* aCallback,
 | |
|                                   mozIStoragePendingStatement** _handle) {
 | |
|   NS_ENSURE_TRUE(NS_IsMainThread(), NS_ERROR_NOT_SAME_THREAD);
 | |
| 
 | |
|   nsCOMPtr<mozIStorageAsyncStatement> stmt;
 | |
|   nsresult rv = CreateAsyncStatement(aSQLStatement, getter_AddRefs(stmt));
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   nsCOMPtr<mozIStoragePendingStatement> pendingStatement;
 | |
|   rv = stmt->ExecuteAsync(aCallback, getter_AddRefs(pendingStatement));
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   pendingStatement.forget(_handle);
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::TableExists(const nsACString& aTableName, bool* _exists) {
 | |
|   return databaseElementExists(TABLE, aTableName, _exists);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::IndexExists(const nsACString& aIndexName, bool* _exists) {
 | |
|   return databaseElementExists(INDEX, aIndexName, _exists);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetTransactionInProgress(bool* _inProgress) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   *_inProgress = transactionInProgress(lockedScope);
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetDefaultTransactionType(int32_t* _type) {
 | |
|   *_type = mDefaultTransactionType;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::SetDefaultTransactionType(int32_t aType) {
 | |
|   NS_ENSURE_ARG_RANGE(aType, TRANSACTION_DEFERRED, TRANSACTION_EXCLUSIVE);
 | |
|   mDefaultTransactionType = aType;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetVariableLimit(int32_t* _limit) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   int limit = ::sqlite3_limit(mDBConn, SQLITE_LIMIT_VARIABLE_NUMBER, -1);
 | |
|   if (limit < 0) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
|   *_limit = limit;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::SetVariableLimit(int32_t limit) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   int oldLimit = ::sqlite3_limit(mDBConn, SQLITE_LIMIT_VARIABLE_NUMBER, limit);
 | |
|   if (oldLimit < 0) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::BeginTransaction() {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   return beginTransactionInternal(lockedScope, mDBConn,
 | |
|                                   mDefaultTransactionType);
 | |
| }
 | |
| 
 | |
| nsresult Connection::beginTransactionInternal(
 | |
|     const SQLiteMutexAutoLock& aProofOfLock, sqlite3* aNativeConnection,
 | |
|     int32_t aTransactionType) {
 | |
|   if (transactionInProgress(aProofOfLock)) {
 | |
|     return NS_ERROR_FAILURE;
 | |
|   }
 | |
|   nsresult rv;
 | |
|   switch (aTransactionType) {
 | |
|     case TRANSACTION_DEFERRED:
 | |
|       rv = convertResultCode(executeSql(aNativeConnection, "BEGIN DEFERRED"));
 | |
|       break;
 | |
|     case TRANSACTION_IMMEDIATE:
 | |
|       rv = convertResultCode(executeSql(aNativeConnection, "BEGIN IMMEDIATE"));
 | |
|       break;
 | |
|     case TRANSACTION_EXCLUSIVE:
 | |
|       rv = convertResultCode(executeSql(aNativeConnection, "BEGIN EXCLUSIVE"));
 | |
|       break;
 | |
|     default:
 | |
|       return NS_ERROR_ILLEGAL_VALUE;
 | |
|   }
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::CommitTransaction() {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   return commitTransactionInternal(lockedScope, mDBConn);
 | |
| }
 | |
| 
 | |
| nsresult Connection::commitTransactionInternal(
 | |
|     const SQLiteMutexAutoLock& aProofOfLock, sqlite3* aNativeConnection) {
 | |
|   if (!transactionInProgress(aProofOfLock)) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
|   nsresult rv =
 | |
|       convertResultCode(executeSql(aNativeConnection, "COMMIT TRANSACTION"));
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::RollbackTransaction() {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   return rollbackTransactionInternal(lockedScope, mDBConn);
 | |
| }
 | |
| 
 | |
| nsresult Connection::rollbackTransactionInternal(
 | |
|     const SQLiteMutexAutoLock& aProofOfLock, sqlite3* aNativeConnection) {
 | |
|   if (!transactionInProgress(aProofOfLock)) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
| 
 | |
|   nsresult rv =
 | |
|       convertResultCode(executeSql(aNativeConnection, "ROLLBACK TRANSACTION"));
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::CreateTable(const char* aTableName, const char* aTableSchema) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   SmprintfPointer buf =
 | |
|       ::mozilla::Smprintf("CREATE TABLE %s (%s)", aTableName, aTableSchema);
 | |
|   if (!buf) return NS_ERROR_OUT_OF_MEMORY;
 | |
| 
 | |
|   int srv = executeSql(mDBConn, buf.get());
 | |
| 
 | |
|   return convertResultCode(srv);
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::CreateFunction(const nsACString& aFunctionName,
 | |
|                            int32_t aNumArguments,
 | |
|                            mozIStorageFunction* aFunction) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   // Check to see if this function is already defined.  We only check the name
 | |
|   // because a function can be defined with the same body but different names.
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   NS_ENSURE_FALSE(mFunctions.Contains(aFunctionName), NS_ERROR_FAILURE);
 | |
| 
 | |
|   int srv = ::sqlite3_create_function(
 | |
|       mDBConn, nsPromiseFlatCString(aFunctionName).get(), aNumArguments,
 | |
|       SQLITE_ANY, aFunction, basicFunctionHelper, nullptr, nullptr);
 | |
|   if (srv != SQLITE_OK) return convertResultCode(srv);
 | |
| 
 | |
|   FunctionInfo info = {aFunction, aNumArguments};
 | |
|   mFunctions.InsertOrUpdate(aFunctionName, info);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::RemoveFunction(const nsACString& aFunctionName) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   NS_ENSURE_TRUE(mFunctions.Get(aFunctionName, nullptr), NS_ERROR_FAILURE);
 | |
| 
 | |
|   int srv = ::sqlite3_create_function(
 | |
|       mDBConn, nsPromiseFlatCString(aFunctionName).get(), 0, SQLITE_ANY,
 | |
|       nullptr, nullptr, nullptr, nullptr);
 | |
|   if (srv != SQLITE_OK) return convertResultCode(srv);
 | |
| 
 | |
|   mFunctions.Remove(aFunctionName);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::SetProgressHandler(int32_t aGranularity,
 | |
|                                mozIStorageProgressHandler* aHandler,
 | |
|                                mozIStorageProgressHandler** _oldHandler) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   // Return previous one
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   NS_IF_ADDREF(*_oldHandler = mProgressHandler);
 | |
| 
 | |
|   if (!aHandler || aGranularity <= 0) {
 | |
|     aHandler = nullptr;
 | |
|     aGranularity = 0;
 | |
|   }
 | |
|   mProgressHandler = aHandler;
 | |
|   ::sqlite3_progress_handler(mDBConn, aGranularity, sProgressHelper, this);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::RemoveProgressHandler(mozIStorageProgressHandler** _oldHandler) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   // Return previous one
 | |
|   SQLiteMutexAutoLock lockedScope(sharedDBMutex);
 | |
|   NS_IF_ADDREF(*_oldHandler = mProgressHandler);
 | |
| 
 | |
|   mProgressHandler = nullptr;
 | |
|   ::sqlite3_progress_handler(mDBConn, 0, nullptr, nullptr);
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::SetGrowthIncrement(int32_t aChunkSize,
 | |
|                                const nsACString& aDatabaseName) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   // Bug 597215: Disk space is extremely limited on Android
 | |
|   // so don't preallocate space. This is also not effective
 | |
|   // on log structured file systems used by Android devices
 | |
| #if !defined(ANDROID) && !defined(MOZ_PLATFORM_MAEMO)
 | |
|   // Don't preallocate if less than 500MiB is available.
 | |
|   int64_t bytesAvailable;
 | |
|   rv = mDatabaseFile->GetDiskSpaceAvailable(&bytesAvailable);
 | |
|   NS_ENSURE_SUCCESS(rv, rv);
 | |
|   if (bytesAvailable < MIN_AVAILABLE_BYTES_PER_CHUNKED_GROWTH) {
 | |
|     return NS_ERROR_FILE_TOO_BIG;
 | |
|   }
 | |
| 
 | |
|   int srv = ::sqlite3_file_control(
 | |
|       mDBConn,
 | |
|       aDatabaseName.Length() ? nsPromiseFlatCString(aDatabaseName).get()
 | |
|                              : nullptr,
 | |
|       SQLITE_FCNTL_CHUNK_SIZE, &aChunkSize);
 | |
|   if (srv == SQLITE_OK) {
 | |
|     mGrowthChunkSize = aChunkSize;
 | |
|   }
 | |
| #endif
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| int32_t Connection::RemovablePagesInFreeList(const nsACString& aSchemaName) {
 | |
|   int32_t freeListPagesCount = 0;
 | |
|   if (!isConnectionReadyOnThisThread()) {
 | |
|     MOZ_ASSERT(false, "Database connection is not ready");
 | |
|     return freeListPagesCount;
 | |
|   }
 | |
|   {
 | |
|     nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "PRAGMA ");
 | |
|     query.Append(aSchemaName);
 | |
|     query.AppendLiteral(".freelist_count");
 | |
|     nsCOMPtr<mozIStorageStatement> stmt;
 | |
|     DebugOnly<nsresult> rv = CreateStatement(query, getter_AddRefs(stmt));
 | |
|     MOZ_ASSERT(NS_SUCCEEDED(rv));
 | |
|     bool hasResult = false;
 | |
|     if (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|       freeListPagesCount = stmt->AsInt32(0);
 | |
|     }
 | |
|   }
 | |
|   // If there's no chunk size set, any page is good to be removed.
 | |
|   if (mGrowthChunkSize == 0 || freeListPagesCount == 0) {
 | |
|     return freeListPagesCount;
 | |
|   }
 | |
|   int32_t pageSize;
 | |
|   {
 | |
|     nsAutoCString query(MOZ_STORAGE_UNIQUIFY_QUERY_STR "PRAGMA ");
 | |
|     query.Append(aSchemaName);
 | |
|     query.AppendLiteral(".page_size");
 | |
|     nsCOMPtr<mozIStorageStatement> stmt;
 | |
|     DebugOnly<nsresult> rv = CreateStatement(query, getter_AddRefs(stmt));
 | |
|     MOZ_ASSERT(NS_SUCCEEDED(rv));
 | |
|     bool hasResult = false;
 | |
|     if (stmt && NS_SUCCEEDED(stmt->ExecuteStep(&hasResult)) && hasResult) {
 | |
|       pageSize = stmt->AsInt32(0);
 | |
|     } else {
 | |
|       MOZ_ASSERT(false, "Couldn't get page_size");
 | |
|       return 0;
 | |
|     }
 | |
|   }
 | |
|   return std::max(0, freeListPagesCount - (mGrowthChunkSize / pageSize));
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::LoadExtension(const nsACString& aExtensionName,
 | |
|                           mozIStorageCompletionCallback* aCallback) {
 | |
|   AUTO_PROFILER_LABEL("Connection::LoadExtension", OTHER);
 | |
| 
 | |
|   // This is a static list of extensions we can load.
 | |
|   // Please use lowercase ASCII names and keep this list alphabetically ordered.
 | |
|   static constexpr nsLiteralCString sSupportedExtensions[] = {
 | |
|       // clang-format off
 | |
|       "fts5"_ns,
 | |
|       // clang-format on
 | |
|   };
 | |
|   if (std::find(std::begin(sSupportedExtensions),
 | |
|                 std::end(sSupportedExtensions),
 | |
|                 aExtensionName) == std::end(sSupportedExtensions)) {
 | |
|     return NS_ERROR_INVALID_ARG;
 | |
|   }
 | |
| 
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
| 
 | |
|   int srv = ::sqlite3_db_config(mDBConn, SQLITE_DBCONFIG_ENABLE_LOAD_EXTENSION,
 | |
|                                 1, nullptr);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return NS_ERROR_UNEXPECTED;
 | |
|   }
 | |
| 
 | |
|   // Track the loaded extension for later connection cloning operations.
 | |
|   {
 | |
|     MutexAutoLock lockedScope(sharedAsyncExecutionMutex);
 | |
|     if (!mLoadedExtensions.EnsureInserted(aExtensionName)) {
 | |
|       // Already loaded, bail out but issue a warning.
 | |
|       NS_WARNING(nsPrintfCString(
 | |
|                      "Tried to register '%s' SQLite extension multiple times!",
 | |
|                      PromiseFlatCString(aExtensionName).get())
 | |
|                      .get());
 | |
|       return NS_OK;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   nsAutoCString entryPoint("sqlite3_");
 | |
|   entryPoint.Append(aExtensionName);
 | |
|   entryPoint.AppendLiteral("_init");
 | |
| 
 | |
|   RefPtr<Runnable> loadTask = NS_NewRunnableFunction(
 | |
|       "mozStorageConnection::LoadExtension",
 | |
|       [this, self = RefPtr(this), entryPoint,
 | |
|        callback = RefPtr(aCallback)]() mutable {
 | |
|         MOZ_ASSERT(
 | |
|             !NS_IsMainThread() ||
 | |
|                 (operationSupported(Connection::SYNCHRONOUS) &&
 | |
|                  eventTargetOpenedOn == GetMainThreadSerialEventTarget()),
 | |
|             "Should happen on main-thread only for synchronous connections "
 | |
|             "opened on the main thread");
 | |
| #ifdef MOZ_FOLD_LIBS
 | |
|         int srv = ::sqlite3_load_extension(mDBConn,
 | |
|                                            MOZ_DLL_PREFIX "nss3" MOZ_DLL_SUFFIX,
 | |
|                                            entryPoint.get(), nullptr);
 | |
| #else
 | |
|         int srv = ::sqlite3_load_extension(
 | |
|             mDBConn, MOZ_DLL_PREFIX "mozsqlite3" MOZ_DLL_SUFFIX,
 | |
|             entryPoint.get(), nullptr);
 | |
| #endif
 | |
|         if (!callback) {
 | |
|           return;
 | |
|         };
 | |
|         RefPtr<Runnable> callbackTask = NS_NewRunnableFunction(
 | |
|             "mozStorageConnection::LoadExtension_callback",
 | |
|             [callback = std::move(callback), srv]() {
 | |
|               (void)callback->Complete(convertResultCode(srv), nullptr);
 | |
|             });
 | |
|         if (IsOnCurrentSerialEventTarget(eventTargetOpenedOn)) {
 | |
|           MOZ_ALWAYS_SUCCEEDS(callbackTask->Run());
 | |
|         } else {
 | |
|           // Redispatch the callback to the calling thread.
 | |
|           MOZ_ALWAYS_SUCCEEDS(eventTargetOpenedOn->Dispatch(
 | |
|               callbackTask.forget(), NS_DISPATCH_NORMAL));
 | |
|         }
 | |
|       });
 | |
| 
 | |
|   if (NS_IsMainThread() && !operationSupported(Connection::SYNCHRONOUS)) {
 | |
|     // This is a main-thread call to an async-only connection, thus we should
 | |
|     // load the library in the helper thread.
 | |
|     nsIEventTarget* helperThread = getAsyncExecutionTarget();
 | |
|     if (!helperThread) {
 | |
|       return NS_ERROR_NOT_INITIALIZED;
 | |
|     }
 | |
|     MOZ_ALWAYS_SUCCEEDS(
 | |
|         helperThread->Dispatch(loadTask.forget(), NS_DISPATCH_NORMAL));
 | |
|   } else {
 | |
|     // In any other case we just load the extension on the current thread.
 | |
|     MOZ_ALWAYS_SUCCEEDS(loadTask->Run());
 | |
|   }
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::EnableModule(const nsACString& aModuleName) {
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   for (auto& gModule : gModules) {
 | |
|     struct Module* m = &gModule;
 | |
|     if (aModuleName.Equals(m->name)) {
 | |
|       int srv = m->registerFunc(mDBConn, m->name);
 | |
|       if (srv != SQLITE_OK) return convertResultCode(srv);
 | |
| 
 | |
|       return NS_OK;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return NS_ERROR_FAILURE;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::GetQuotaObjects(QuotaObject** aDatabaseQuotaObject,
 | |
|                             QuotaObject** aJournalQuotaObject) {
 | |
|   MOZ_ASSERT(aDatabaseQuotaObject);
 | |
|   MOZ_ASSERT(aJournalQuotaObject);
 | |
| 
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(SYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   sqlite3_file* file;
 | |
|   int srv = ::sqlite3_file_control(mDBConn, nullptr, SQLITE_FCNTL_FILE_POINTER,
 | |
|                                    &file);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   sqlite3_vfs* vfs;
 | |
|   srv =
 | |
|       ::sqlite3_file_control(mDBConn, nullptr, SQLITE_FCNTL_VFS_POINTER, &vfs);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   bool obfusactingVFS = false;
 | |
| 
 | |
|   {
 | |
|     const nsDependentCString vfsName{vfs->zName};
 | |
| 
 | |
|     if (vfsName == obfsvfs::GetVFSName()) {
 | |
|       obfusactingVFS = true;
 | |
|     } else if (vfsName != quotavfs::GetVFSName()) {
 | |
|       NS_WARNING("Got unexpected vfs");
 | |
|       return NS_ERROR_FAILURE;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   RefPtr<QuotaObject> databaseQuotaObject =
 | |
|       GetQuotaObject(file, obfusactingVFS);
 | |
|   if (NS_WARN_IF(!databaseQuotaObject)) {
 | |
|     return NS_ERROR_FAILURE;
 | |
|   }
 | |
| 
 | |
|   srv = ::sqlite3_file_control(mDBConn, nullptr, SQLITE_FCNTL_JOURNAL_POINTER,
 | |
|                                &file);
 | |
|   if (srv != SQLITE_OK) {
 | |
|     return convertResultCode(srv);
 | |
|   }
 | |
| 
 | |
|   RefPtr<QuotaObject> journalQuotaObject = GetQuotaObject(file, obfusactingVFS);
 | |
|   if (NS_WARN_IF(!journalQuotaObject)) {
 | |
|     return NS_ERROR_FAILURE;
 | |
|   }
 | |
| 
 | |
|   databaseQuotaObject.forget(aDatabaseQuotaObject);
 | |
|   journalQuotaObject.forget(aJournalQuotaObject);
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| SQLiteMutex& Connection::GetSharedDBMutex() { return sharedDBMutex; }
 | |
| 
 | |
| uint32_t Connection::GetTransactionNestingLevel(
 | |
|     const mozilla::storage::SQLiteMutexAutoLock& aProofOfLock) {
 | |
|   return mTransactionNestingLevel;
 | |
| }
 | |
| 
 | |
| uint32_t Connection::IncreaseTransactionNestingLevel(
 | |
|     const mozilla::storage::SQLiteMutexAutoLock& aProofOfLock) {
 | |
|   return ++mTransactionNestingLevel;
 | |
| }
 | |
| 
 | |
| uint32_t Connection::DecreaseTransactionNestingLevel(
 | |
|     const mozilla::storage::SQLiteMutexAutoLock& aProofOfLock) {
 | |
|   return --mTransactionNestingLevel;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| Connection::BackupToFileAsync(nsIFile* aDestinationFile,
 | |
|                               mozIStorageCompletionCallback* aCallback,
 | |
|                               uint32_t aPagesPerStep, uint32_t aStepDelayMs) {
 | |
|   NS_ENSURE_ARG(aDestinationFile);
 | |
|   NS_ENSURE_ARG(aCallback);
 | |
|   NS_ENSURE_TRUE(NS_IsMainThread(), NS_ERROR_NOT_SAME_THREAD);
 | |
| 
 | |
|   // Abort if we're shutting down.
 | |
|   if (AppShutdown::IsInOrBeyond(ShutdownPhase::AppShutdownConfirmed)) {
 | |
|     return NS_ERROR_ABORT;
 | |
|   }
 | |
|   // Check if AsyncClose or Close were already invoked.
 | |
|   if (!connectionReady()) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
|   nsresult rv = ensureOperationSupported(ASYNCHRONOUS);
 | |
|   if (NS_FAILED(rv)) {
 | |
|     return rv;
 | |
|   }
 | |
|   nsIEventTarget* asyncThread = getAsyncExecutionTarget();
 | |
|   if (!asyncThread) {
 | |
|     return NS_ERROR_NOT_INITIALIZED;
 | |
|   }
 | |
| 
 | |
|   // The number of pages of the database to copy per step
 | |
|   static constexpr int32_t DEFAULT_PAGES_PER_STEP = 5;
 | |
|   // The number of milliseconds to wait between each step.
 | |
|   static constexpr uint32_t DEFAULT_STEP_DELAY_MS = 250;
 | |
| 
 | |
|   CheckedInt<int32_t> pagesPerStep(aPagesPerStep);
 | |
|   if (!pagesPerStep.isValid()) {
 | |
|     return NS_ERROR_INVALID_ARG;
 | |
|   }
 | |
| 
 | |
|   if (!pagesPerStep.value()) {
 | |
|     pagesPerStep = DEFAULT_PAGES_PER_STEP;
 | |
|   }
 | |
| 
 | |
|   if (!aStepDelayMs) {
 | |
|     aStepDelayMs = DEFAULT_STEP_DELAY_MS;
 | |
|   }
 | |
| 
 | |
|   // Create and dispatch our backup event to the execution thread.
 | |
|   nsCOMPtr<nsIRunnable> backupEvent =
 | |
|       new AsyncBackupDatabaseFile(this, mDBConn, aDestinationFile, aCallback,
 | |
|                                   pagesPerStep.value(), aStepDelayMs);
 | |
|   rv = asyncThread->Dispatch(backupEvent, NS_DISPATCH_NORMAL);
 | |
|   return rv;
 | |
| }
 | |
| 
 | |
| }  // namespace mozilla::storage
 |