diff options
Diffstat (limited to 'Source/WebCore/storage/DatabaseTracker.cpp')
-rw-r--r-- | Source/WebCore/storage/DatabaseTracker.cpp | 1108 |
1 files changed, 1108 insertions, 0 deletions
diff --git a/Source/WebCore/storage/DatabaseTracker.cpp b/Source/WebCore/storage/DatabaseTracker.cpp new file mode 100644 index 0000000..0b47842 --- /dev/null +++ b/Source/WebCore/storage/DatabaseTracker.cpp @@ -0,0 +1,1108 @@ +/* + * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of + * its contributors may be used to endorse or promote products derived + * from this software without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY + * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY + * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "config.h" +#include "DatabaseTracker.h" + +#if ENABLE(DATABASE) + +#include "AbstractDatabase.h" +#include "Chrome.h" +#include "ChromeClient.h" +#include "DatabaseThread.h" +#include "DatabaseTrackerClient.h" +#include "Logging.h" +#include "OriginQuotaManager.h" +#include "Page.h" +#include "ScriptExecutionContext.h" +#include "SecurityOrigin.h" +#include "SecurityOriginHash.h" +#include "SQLiteFileSystem.h" +#include "SQLiteStatement.h" +#include <wtf/MainThread.h> +#include <wtf/StdLibExtras.h> +#include <wtf/text/CString.h> + +using namespace std; + +static WebCore::OriginQuotaManager& originQuotaManager() +{ + DEFINE_STATIC_LOCAL(WebCore::OriginQuotaManager, quotaManager, ()); + return quotaManager; +} + +namespace WebCore { + +static DatabaseTracker* staticTracker = 0; + +void DatabaseTracker::initializeTracker(const String& databasePath) +{ + ASSERT(!staticTracker); + if (staticTracker) + return; + + staticTracker = new DatabaseTracker(databasePath); +} + +DatabaseTracker& DatabaseTracker::tracker() +{ + if (!staticTracker) + staticTracker = new DatabaseTracker(""); + + return *staticTracker; +} + +DatabaseTracker::DatabaseTracker(const String& databasePath) + : m_client(0) +{ + setDatabaseDirectoryPath(databasePath); + + SQLiteFileSystem::registerSQLiteVFS(); + + MutexLocker lockDatabase(m_databaseGuard); + populateOrigins(); +} + +void DatabaseTracker::setDatabaseDirectoryPath(const String& path) +{ + MutexLocker lockDatabase(m_databaseGuard); + ASSERT(!m_database.isOpen()); + m_databaseDirectoryPath = path.threadsafeCopy(); +} + +String DatabaseTracker::databaseDirectoryPath() const +{ + return m_databaseDirectoryPath.threadsafeCopy(); +} + +String DatabaseTracker::trackerDatabasePath() const +{ + return SQLiteFileSystem::appendDatabaseFileNameToPath(m_databaseDirectoryPath, "Databases.db"); +} + +void DatabaseTracker::openTrackerDatabase(bool createIfDoesNotExist) +{ + ASSERT(!m_databaseGuard.tryLock()); + + if (m_database.isOpen()) + return; + + String databasePath = trackerDatabasePath(); + if (!SQLiteFileSystem::ensureDatabaseFileExists(databasePath, createIfDoesNotExist)) + return; + + if (!m_database.open(databasePath)) { + // FIXME: What do do here? + LOG_ERROR("Failed to open databasePath %s.", databasePath.ascii().data()); + return; + } + m_database.disableThreadingChecks(); + if (!m_database.tableExists("Origins")) { + if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) { + // FIXME: and here + LOG_ERROR("Failed to create Origins table"); + } + } + if (!m_database.tableExists("Databases")) { + if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) { + // FIXME: and here + LOG_ERROR("Failed to create Databases table"); + } + } +} + +bool DatabaseTracker::canEstablishDatabase(ScriptExecutionContext* context, const String& name, const String& displayName, unsigned long estimatedSize) +{ + SecurityOrigin* origin = context->securityOrigin(); + ProposedDatabase details; + + unsigned long long requirement; + { + MutexLocker lockDatabase(m_databaseGuard); + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + + if (!canCreateDatabase(origin, name)) + return false; + + recordCreatingDatabase(origin, name); + + // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker + // by fetching its current usage now. + unsigned long long usage = usageForOriginNoLock(origin); + + // If a database already exists, ignore the passed-in estimated size and say it's OK. + if (hasEntryForDatabase(origin, name)) + return true; + + // If the database will fit, allow its creation. + requirement = usage + max(1UL, estimatedSize); + if (requirement < usage) { + doneCreatingDatabase(origin, name); + return false; // If the estimated size is so big it causes an overflow, don't allow creation. + } + if (requirement <= quotaForOriginNoLock(origin)) + return true; + + // Give the chrome client a chance to increase the quota. + // Temporarily make the details of the proposed database available, so the client can get at them. + // FIXME: We should really just pass the details into this call, rather than using m_proposedDatabases. + details = ProposedDatabase(origin->threadsafeCopy(), DatabaseDetails(name.threadsafeCopy(), displayName.threadsafeCopy(), estimatedSize, 0)); + m_proposedDatabases.add(&details); + } + // Drop all locks before calling out; we don't know what they'll do. + context->databaseExceededQuota(name); + + MutexLocker lockDatabase(m_databaseGuard); + + m_proposedDatabases.remove(&details); + + // If the database will fit now, allow its creation. + if (requirement <= quotaForOriginNoLock(origin)) + return true; + + doneCreatingDatabase(origin, name); + + return false; +} + +bool DatabaseTracker::hasEntryForOriginNoLock(SecurityOrigin* origin) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(m_quotaMap); + return m_quotaMap->contains(origin); +} + +bool DatabaseTracker::hasEntryForOrigin(SecurityOrigin* origin) +{ + MutexLocker lockDatabase(m_databaseGuard); + return hasEntryForOriginNoLock(origin); +} + +bool DatabaseTracker::hasEntryForDatabase(SecurityOrigin* origin, const String& databaseIdentifier) +{ + ASSERT(!m_databaseGuard.tryLock()); + openTrackerDatabase(false); + if (!m_database.isOpen()) + return false; + SQLiteStatement statement(m_database, "SELECT guid FROM Databases WHERE origin=? AND name=?;"); + + if (statement.prepare() != SQLResultOk) + return false; + + statement.bindText(1, origin->databaseIdentifier()); + statement.bindText(2, databaseIdentifier); + + return statement.step() == SQLResultRow; +} + +unsigned long long DatabaseTracker::getMaxSizeForDatabase(const AbstractDatabase* database) +{ + // The maximum size for a database is the full quota for its origin, minus the current usage within the origin, + // plus the current usage of the given database + MutexLocker lockDatabase(m_databaseGuard); + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + SecurityOrigin* origin = database->securityOrigin(); + return quotaForOriginNoLock(origin) - originQuotaManager().diskUsage(origin) + SQLiteFileSystem::getDatabaseFileSize(database->fileName()); +} + +void DatabaseTracker::databaseChanged(AbstractDatabase* database) +{ + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + originQuotaManager().markDatabase(database); +} + +void DatabaseTracker::interruptAllDatabasesForContext(const ScriptExecutionContext* context) +{ + Vector<RefPtr<AbstractDatabase> > openDatabases; + { + MutexLocker openDatabaseMapLock(m_openDatabaseMapGuard); + + if (!m_openDatabaseMap) + return; + + DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin()); + if (!nameMap) + return; + + DatabaseNameMap::const_iterator dbNameMapEndIt = nameMap->end(); + for (DatabaseNameMap::const_iterator dbNameMapIt = nameMap->begin(); dbNameMapIt != dbNameMapEndIt; ++dbNameMapIt) { + DatabaseSet* databaseSet = dbNameMapIt->second; + DatabaseSet::const_iterator dbSetEndIt = databaseSet->end(); + for (DatabaseSet::const_iterator dbSetIt = databaseSet->begin(); dbSetIt != dbSetEndIt; ++dbSetIt) { + if ((*dbSetIt)->scriptExecutionContext() == context) + openDatabases.append(*dbSetIt); + } + } + } + + Vector<RefPtr<AbstractDatabase> >::const_iterator openDatabasesEndIt = openDatabases.end(); + for (Vector<RefPtr<AbstractDatabase> >::const_iterator openDatabasesIt = openDatabases.begin(); openDatabasesIt != openDatabasesEndIt; ++openDatabasesIt) + (*openDatabasesIt)->interrupt(); +} + +String DatabaseTracker::originPath(SecurityOrigin* origin) const +{ + return SQLiteFileSystem::appendDatabaseFileNameToPath(m_databaseDirectoryPath.threadsafeCopy(), origin->databaseIdentifier()); +} + +String DatabaseTracker::fullPathForDatabaseNoLock(SecurityOrigin* origin, const String& name, bool createIfNotExists) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(!originQuotaManager().tryLock()); + + for (HashSet<ProposedDatabase*>::iterator iter = m_proposedDatabases.begin(); iter != m_proposedDatabases.end(); ++iter) + if ((*iter)->second.name() == name && (*iter)->first->equal(origin)) + return String(); + + String originIdentifier = origin->databaseIdentifier(); + String originPath = this->originPath(origin); + + // Make sure the path for this SecurityOrigin exists + if (createIfNotExists && !SQLiteFileSystem::ensureDatabaseDirectoryExists(originPath)) + return String(); + + // See if we have a path for this database yet + if (!m_database.isOpen()) + return String(); + SQLiteStatement statement(m_database, "SELECT path FROM Databases WHERE origin=? AND name=?;"); + + if (statement.prepare() != SQLResultOk) + return String(); + + statement.bindText(1, originIdentifier); + statement.bindText(2, name); + + int result = statement.step(); + + if (result == SQLResultRow) + return SQLiteFileSystem::appendDatabaseFileNameToPath(originPath, statement.getColumnText(0)); + if (!createIfNotExists) + return String(); + + if (result != SQLResultDone) { + LOG_ERROR("Failed to retrieve filename from Database Tracker for origin %s, name %s", originIdentifier.ascii().data(), name.ascii().data()); + return String(); + } + statement.finalize(); + + String fileName = SQLiteFileSystem::getFileNameForNewDatabase(originPath, name, originIdentifier, &m_database); + if (!addDatabase(origin, name, fileName)) + return String(); + + // If this origin's quota is being tracked (open handle to a database in this origin), add this new database + // to the quota manager now + String fullFilePath = SQLiteFileSystem::appendDatabaseFileNameToPath(originPath, fileName); + if (originQuotaManager().tracksOrigin(origin)) + originQuotaManager().addDatabase(origin, name, fullFilePath); + + return fullFilePath; +} + +String DatabaseTracker::fullPathForDatabase(SecurityOrigin* origin, const String& name, bool createIfNotExists) +{ + MutexLocker lockDatabase(m_databaseGuard); + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + + return fullPathForDatabaseNoLock(origin, name, createIfNotExists).threadsafeCopy(); +} + +void DatabaseTracker::populateOrigins() +{ + ASSERT(!m_databaseGuard.tryLock()); + if (m_quotaMap) + return; + + m_quotaMap = adoptPtr(new QuotaMap); + + openTrackerDatabase(false); + if (!m_database.isOpen()) + return; + + SQLiteStatement statement(m_database, "SELECT origin, quota FROM Origins"); + + if (statement.prepare() != SQLResultOk) { + LOG_ERROR("Failed to prepare statement."); + return; + } + + int result; + while ((result = statement.step()) == SQLResultRow) { + RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); + m_quotaMap->set(origin.get()->threadsafeCopy(), statement.getColumnInt64(1)); + } + + if (result != SQLResultDone) + LOG_ERROR("Failed to read in all origins from the database."); +} + +void DatabaseTracker::origins(Vector<RefPtr<SecurityOrigin> >& result) +{ + MutexLocker lockDatabase(m_databaseGuard); + ASSERT(m_quotaMap); + copyKeysToVector(*m_quotaMap, result); +} + +bool DatabaseTracker::databaseNamesForOriginNoLock(SecurityOrigin* origin, Vector<String>& resultVector) +{ + ASSERT(!m_databaseGuard.tryLock()); + openTrackerDatabase(false); + if (!m_database.isOpen()) + return false; + + SQLiteStatement statement(m_database, "SELECT name FROM Databases where origin=?;"); + + if (statement.prepare() != SQLResultOk) + return false; + + statement.bindText(1, origin->databaseIdentifier()); + + int result; + while ((result = statement.step()) == SQLResultRow) + resultVector.append(statement.getColumnText(0)); + + if (result != SQLResultDone) { + LOG_ERROR("Failed to retrieve all database names for origin %s", origin->databaseIdentifier().ascii().data()); + return false; + } + + return true; +} + +bool DatabaseTracker::databaseNamesForOrigin(SecurityOrigin* origin, Vector<String>& resultVector) +{ + Vector<String> temp; + { + MutexLocker lockDatabase(m_databaseGuard); + if (!databaseNamesForOriginNoLock(origin, temp)) + return false; + } + + for (Vector<String>::iterator iter = temp.begin(); iter != temp.end(); ++iter) + resultVector.append(iter->threadsafeCopy()); + return true; +} + +DatabaseDetails DatabaseTracker::detailsForNameAndOrigin(const String& name, SecurityOrigin* origin) +{ + String originIdentifier = origin->databaseIdentifier(); + String displayName; + int64_t expectedUsage; + + { + MutexLocker lockDatabase(m_databaseGuard); + + for (HashSet<ProposedDatabase*>::iterator iter = m_proposedDatabases.begin(); iter != m_proposedDatabases.end(); ++iter) + if ((*iter)->second.name() == name && (*iter)->first->equal(origin)) { + ASSERT((*iter)->second.thread() == currentThread()); + return (*iter)->second; + } + + openTrackerDatabase(false); + if (!m_database.isOpen()) + return DatabaseDetails(); + SQLiteStatement statement(m_database, "SELECT displayName, estimatedSize FROM Databases WHERE origin=? AND name=?"); + if (statement.prepare() != SQLResultOk) + return DatabaseDetails(); + + statement.bindText(1, originIdentifier); + statement.bindText(2, name); + + int result = statement.step(); + if (result == SQLResultDone) + return DatabaseDetails(); + + if (result != SQLResultRow) { + LOG_ERROR("Error retrieving details for database %s in origin %s from tracker database", name.ascii().data(), originIdentifier.ascii().data()); + return DatabaseDetails(); + } + displayName = statement.getColumnText(0); + expectedUsage = statement.getColumnInt64(1); + } + + return DatabaseDetails(name, displayName, expectedUsage, usageForDatabase(name, origin)); +} + +void DatabaseTracker::setDatabaseDetails(SecurityOrigin* origin, const String& name, const String& displayName, unsigned long estimatedSize) +{ + String originIdentifier = origin->databaseIdentifier(); + int64_t guid = 0; + + MutexLocker lockDatabase(m_databaseGuard); + + openTrackerDatabase(true); + if (!m_database.isOpen()) + return; + SQLiteStatement statement(m_database, "SELECT guid FROM Databases WHERE origin=? AND name=?"); + if (statement.prepare() != SQLResultOk) + return; + + statement.bindText(1, originIdentifier); + statement.bindText(2, name); + + int result = statement.step(); + if (result == SQLResultRow) + guid = statement.getColumnInt64(0); + statement.finalize(); + + if (guid == 0) { + if (result != SQLResultDone) + LOG_ERROR("Error to determing existence of database %s in origin %s in tracker database", name.ascii().data(), originIdentifier.ascii().data()); + else { + // This case should never occur - we should never be setting database details for a database that doesn't already exist in the tracker + // But since the tracker file is an external resource not under complete control of our code, it's somewhat invalid to make this an ASSERT case + // So we'll print an error instead + LOG_ERROR("Could not retrieve guid for database %s in origin %s from the tracker database - it is invalid to set database details on a database that doesn't already exist in the tracker", + name.ascii().data(), originIdentifier.ascii().data()); + } + return; + } + + SQLiteStatement updateStatement(m_database, "UPDATE Databases SET displayName=?, estimatedSize=? WHERE guid=?"); + if (updateStatement.prepare() != SQLResultOk) + return; + + updateStatement.bindText(1, displayName); + updateStatement.bindInt64(2, estimatedSize); + updateStatement.bindInt64(3, guid); + + if (updateStatement.step() != SQLResultDone) { + LOG_ERROR("Failed to update details for database %s in origin %s", name.ascii().data(), originIdentifier.ascii().data()); + return; + } + + if (m_client) + m_client->dispatchDidModifyDatabase(origin, name); +} + +unsigned long long DatabaseTracker::usageForDatabase(const String& name, SecurityOrigin* origin) +{ + String path = fullPathForDatabase(origin, name, false); + if (path.isEmpty()) + return 0; + + return SQLiteFileSystem::getDatabaseFileSize(path); +} + +void DatabaseTracker::addOpenDatabase(AbstractDatabase* database) +{ + if (!database) + return; + + { + MutexLocker openDatabaseMapLock(m_openDatabaseMapGuard); + + if (!m_openDatabaseMap) + m_openDatabaseMap = adoptPtr(new DatabaseOriginMap); + + String name(database->stringIdentifier()); + DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); + if (!nameMap) { + nameMap = new DatabaseNameMap; + m_openDatabaseMap->set(database->securityOrigin()->threadsafeCopy(), nameMap); + } + + DatabaseSet* databaseSet = nameMap->get(name); + if (!databaseSet) { + databaseSet = new DatabaseSet; + nameMap->set(name.threadsafeCopy(), databaseSet); + } + + databaseSet->add(database); + + LOG(StorageAPI, "Added open Database %s (%p)\n", database->stringIdentifier().ascii().data(), database); + + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + if (!originQuotaManager().tracksOrigin(database->securityOrigin())) { + originQuotaManager().trackOrigin(database->securityOrigin()); + originQuotaManager().addDatabase(database->securityOrigin(), database->stringIdentifier(), database->fileName()); + } + } + + MutexLocker lockDatabase(m_databaseGuard); + doneCreatingDatabase(database->securityOrigin(), database->stringIdentifier()); +} + +void DatabaseTracker::removeOpenDatabase(AbstractDatabase* database) +{ + if (!database) + return; + + { + MutexLocker openDatabaseMapLock(m_openDatabaseMapGuard); + + if (!m_openDatabaseMap) { + ASSERT_NOT_REACHED(); + return; + } + + String name(database->stringIdentifier()); + DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); + if (!nameMap) { + ASSERT_NOT_REACHED(); + return; + } + + DatabaseSet* databaseSet = nameMap->get(name); + if (!databaseSet) { + ASSERT_NOT_REACHED(); + return; + } + + databaseSet->remove(database); + + LOG(StorageAPI, "Removed open Database %s (%p)\n", database->stringIdentifier().ascii().data(), database); + + if (!databaseSet->isEmpty()) + return; + + nameMap->remove(name); + delete databaseSet; + + if (!nameMap->isEmpty()) + return; + + m_openDatabaseMap->remove(database->securityOrigin()); + delete nameMap; + + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + originQuotaManager().removeOrigin(database->securityOrigin()); + } +} + +void DatabaseTracker::getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases) +{ + MutexLocker openDatabaseMapLock(m_openDatabaseMapGuard); + if (!m_openDatabaseMap) + return; + + DatabaseNameMap* nameMap = m_openDatabaseMap->get(origin); + if (!nameMap) + return; + + DatabaseSet* databaseSet = nameMap->get(name); + if (!databaseSet) + return; + + for (DatabaseSet::iterator it = databaseSet->begin(); it != databaseSet->end(); ++it) + databases->add(*it); +} + +unsigned long long DatabaseTracker::usageForOriginNoLock(SecurityOrigin* origin) +{ + ASSERT(!originQuotaManager().tryLock()); + + // Use the OriginQuotaManager mechanism to calculate the usage + if (originQuotaManager().tracksOrigin(origin)) + return originQuotaManager().diskUsage(origin); + + // If the OriginQuotaManager doesn't track this origin already, prime it to do so + originQuotaManager().trackOrigin(origin); + + Vector<String> names; + databaseNamesForOriginNoLock(origin, names); + + for (unsigned i = 0; i < names.size(); ++i) + originQuotaManager().addDatabase(origin, names[i], fullPathForDatabaseNoLock(origin, names[i], false)); + + if (!originQuotaManager().tracksOrigin(origin)) + return 0; + return originQuotaManager().diskUsage(origin); +} + +unsigned long long DatabaseTracker::usageForOrigin(SecurityOrigin* origin) +{ + MutexLocker lockDatabase(m_databaseGuard); + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + return usageForOriginNoLock(origin); +} + +unsigned long long DatabaseTracker::quotaForOriginNoLock(SecurityOrigin* origin) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(m_quotaMap); + return m_quotaMap->get(origin); +} + +unsigned long long DatabaseTracker::quotaForOrigin(SecurityOrigin* origin) +{ + MutexLocker lockDatabase(m_databaseGuard); + return quotaForOriginNoLock(origin); +} + +void DatabaseTracker::setQuota(SecurityOrigin* origin, unsigned long long quota) +{ + MutexLocker lockDatabase(m_databaseGuard); + + if (quotaForOriginNoLock(origin) == quota) + return; + + openTrackerDatabase(true); + if (!m_database.isOpen()) + return; + + if (!m_quotaMap->contains(origin)) { + SQLiteStatement statement(m_database, "INSERT INTO Origins VALUES (?, ?)"); + if (statement.prepare() != SQLResultOk) { + LOG_ERROR("Unable to establish origin %s in the tracker", origin->databaseIdentifier().ascii().data()); + } else { + statement.bindText(1, origin->databaseIdentifier()); + statement.bindInt64(2, quota); + + if (statement.step() != SQLResultDone) + LOG_ERROR("Unable to establish origin %s in the tracker", origin->databaseIdentifier().ascii().data()); + } + } else { + SQLiteStatement statement(m_database, "UPDATE Origins SET quota=? WHERE origin=?"); + bool error = statement.prepare() != SQLResultOk; + if (!error) { + statement.bindInt64(1, quota); + statement.bindText(2, origin->databaseIdentifier()); + + error = !statement.executeCommand(); + } + + if (error) +#if OS(WINDOWS) + LOG_ERROR("Failed to set quota %I64u in tracker database for origin %s", quota, origin->databaseIdentifier().ascii().data()); +#else + LOG_ERROR("Failed to set quota %llu in tracker database for origin %s", quota, origin->databaseIdentifier().ascii().data()); +#endif + } + + // FIXME: Is it really OK to update the quota in memory if we failed to update it on disk? + m_quotaMap->set(origin->threadsafeCopy(), quota); + + if (m_client) + m_client->dispatchDidModifyOrigin(origin); +} + +bool DatabaseTracker::addDatabase(SecurityOrigin* origin, const String& name, const String& path) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(m_quotaMap); + openTrackerDatabase(true); + if (!m_database.isOpen()) + return false; + + // New database should never be added until the origin has been established + ASSERT(hasEntryForOriginNoLock(origin)); + + SQLiteStatement statement(m_database, "INSERT INTO Databases (origin, name, path) VALUES (?, ?, ?);"); + + if (statement.prepare() != SQLResultOk) + return false; + + statement.bindText(1, origin->databaseIdentifier()); + statement.bindText(2, name); + statement.bindText(3, path); + + if (!statement.executeCommand()) { + LOG_ERROR("Failed to add database %s to origin %s: %s\n", name.ascii().data(), origin->databaseIdentifier().ascii().data(), m_database.lastErrorMsg()); + return false; + } + + if (m_client) + m_client->dispatchDidModifyOrigin(origin); + + return true; +} + +void DatabaseTracker::deleteAllDatabases() +{ + Vector<RefPtr<SecurityOrigin> > originsCopy; + origins(originsCopy); + + for (unsigned i = 0; i < originsCopy.size(); ++i) + deleteOrigin(originsCopy[i].get()); +} + +// It is the caller's responsibility to make sure that nobody is trying to create, delete, open, or close databases in this origin while the deletion is +// taking place. +bool DatabaseTracker::deleteOrigin(SecurityOrigin* origin) +{ + Vector<String> databaseNames; + { + MutexLocker lockDatabase(m_databaseGuard); + openTrackerDatabase(false); + if (!m_database.isOpen()) + return false; + + if (!databaseNamesForOriginNoLock(origin, databaseNames)) { + LOG_ERROR("Unable to retrieve list of database names for origin %s", origin->databaseIdentifier().ascii().data()); + return false; + } + if (!canDeleteOrigin(origin)) { + LOG_ERROR("Tried to delete an origin (%s) while either creating database in it or already deleting it", origin->databaseIdentifier().ascii().data()); + ASSERT(false); + return false; + } + recordDeletingOrigin(origin); + } + + // We drop the lock here because holding locks during a call to deleteDatabaseFile will deadlock. + for (unsigned i = 0; i < databaseNames.size(); ++i) { + if (!deleteDatabaseFile(origin, databaseNames[i])) { + // Even if the file can't be deleted, we want to try and delete the rest, don't return early here. + LOG_ERROR("Unable to delete file for database %s in origin %s", databaseNames[i].ascii().data(), origin->databaseIdentifier().ascii().data()); + } + } + + { + MutexLocker lockDatabase(m_databaseGuard); + doneDeletingOrigin(origin); + + SQLiteStatement statement(m_database, "DELETE FROM Databases WHERE origin=?"); + if (statement.prepare() != SQLResultOk) { + LOG_ERROR("Unable to prepare deletion of databases from origin %s from tracker", origin->databaseIdentifier().ascii().data()); + return false; + } + + statement.bindText(1, origin->databaseIdentifier()); + + if (!statement.executeCommand()) { + LOG_ERROR("Unable to execute deletion of databases from origin %s from tracker", origin->databaseIdentifier().ascii().data()); + return false; + } + + SQLiteStatement originStatement(m_database, "DELETE FROM Origins WHERE origin=?"); + if (originStatement.prepare() != SQLResultOk) { + LOG_ERROR("Unable to prepare deletion of origin %s from tracker", origin->databaseIdentifier().ascii().data()); + return false; + } + + originStatement.bindText(1, origin->databaseIdentifier()); + + if (!originStatement.executeCommand()) { + LOG_ERROR("Unable to execute deletion of databases from origin %s from tracker", origin->databaseIdentifier().ascii().data()); + return false; + } + + SQLiteFileSystem::deleteEmptyDatabaseDirectory(originPath(origin)); + + RefPtr<SecurityOrigin> originPossiblyLastReference = origin; + m_quotaMap->remove(origin); + + { + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + originQuotaManager().removeOrigin(origin); + } + + // If we removed the last origin, do some additional deletion. + if (m_quotaMap->isEmpty()) { + if (m_database.isOpen()) + m_database.close(); + SQLiteFileSystem::deleteDatabaseFile(trackerDatabasePath()); + SQLiteFileSystem::deleteEmptyDatabaseDirectory(m_databaseDirectoryPath); + } + + if (m_client) { + m_client->dispatchDidModifyOrigin(origin); + for (unsigned i = 0; i < databaseNames.size(); ++i) + m_client->dispatchDidModifyDatabase(origin, databaseNames[i]); + } + } + return true; +} + +bool DatabaseTracker::canCreateDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + // Can't create a database while someone else is deleting it; there's a risk of leaving untracked database debris on the disk. + return !deletingDatabase(origin, name) && !deletingOrigin(origin); +} + +void DatabaseTracker::recordCreatingDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + NameCountMap* nameMap = m_beingCreated.get(origin); + if (!nameMap) { + nameMap = new NameCountMap(); + m_beingCreated.set(origin->threadsafeCopy(), nameMap); + } + long count = nameMap->get(name); + nameMap->set(name.threadsafeCopy(), count + 1); +} + +void DatabaseTracker::doneCreatingDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + NameCountMap* nameMap = m_beingCreated.get(origin); + if (nameMap) { + long count = nameMap->get(name); + ASSERT(count > 0); + if (count <= 1) { + nameMap->remove(name); + if (nameMap->isEmpty()) { + m_beingCreated.remove(origin); + delete nameMap; + } + } else + nameMap->set(name, count - 1); + } else + ASSERT(false); +} + +bool DatabaseTracker::creatingDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + NameCountMap* nameMap = m_beingCreated.get(origin); + return nameMap && nameMap->get(name); +} + +bool DatabaseTracker::canDeleteDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + return !creatingDatabase(origin, name) && !deletingDatabase(origin, name); +} + +void DatabaseTracker::recordDeletingDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(canDeleteDatabase(origin, name)); + NameSet* nameSet = m_beingDeleted.get(origin); + if (!nameSet) { + nameSet = new NameSet(); + m_beingDeleted.set(origin->threadsafeCopy(), nameSet); + } + ASSERT(!nameSet->contains(name)); + nameSet->add(name.threadsafeCopy()); +} + +void DatabaseTracker::doneDeletingDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + NameSet* nameSet = m_beingDeleted.get(origin); + if (nameSet) { + ASSERT(nameSet->contains(name)); + nameSet->remove(name); + if (nameSet->isEmpty()) { + m_beingDeleted.remove(origin); + delete nameSet; + } + } else { + ASSERT(false); + } +} + +bool DatabaseTracker::deletingDatabase(SecurityOrigin *origin, const String& name) +{ + ASSERT(!m_databaseGuard.tryLock()); + NameSet* nameSet = m_beingDeleted.get(origin); + return nameSet && nameSet->contains(name); +} + +bool DatabaseTracker::canDeleteOrigin(SecurityOrigin *origin) +{ + ASSERT(!m_databaseGuard.tryLock()); + return !(deletingOrigin(origin) || m_beingCreated.get(origin)); +} + +bool DatabaseTracker::deletingOrigin(SecurityOrigin *origin) +{ + ASSERT(!m_databaseGuard.tryLock()); + return m_originsBeingDeleted.contains(origin); +} + +void DatabaseTracker::recordDeletingOrigin(SecurityOrigin *origin) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(!deletingOrigin(origin)); + m_originsBeingDeleted.add(origin->threadsafeCopy()); +} + +void DatabaseTracker::doneDeletingOrigin(SecurityOrigin *origin) +{ + ASSERT(!m_databaseGuard.tryLock()); + ASSERT(deletingOrigin(origin)); + m_originsBeingDeleted.remove(origin); +} + +bool DatabaseTracker::deleteDatabase(SecurityOrigin* origin, const String& name) +{ + { + MutexLocker lockDatabase(m_databaseGuard); + openTrackerDatabase(false); + if (!m_database.isOpen()) + return false; + + if (!canDeleteDatabase(origin, name)) { + ASSERT(FALSE); + return false; + } + recordDeletingDatabase(origin, name); + } + + // We drop the lock here because holding locks during a call to deleteDatabaseFile will deadlock. + if (!deleteDatabaseFile(origin, name)) { + LOG_ERROR("Unable to delete file for database %s in origin %s", name.ascii().data(), origin->databaseIdentifier().ascii().data()); + MutexLocker lockDatabase(m_databaseGuard); + doneDeletingDatabase(origin, name); + return false; + } + + MutexLocker lockDatabase(m_databaseGuard); + + SQLiteStatement statement(m_database, "DELETE FROM Databases WHERE origin=? AND name=?"); + if (statement.prepare() != SQLResultOk) { + LOG_ERROR("Unable to prepare deletion of database %s from origin %s from tracker", name.ascii().data(), origin->databaseIdentifier().ascii().data()); + doneDeletingDatabase(origin, name); + return false; + } + + statement.bindText(1, origin->databaseIdentifier()); + statement.bindText(2, name); + + if (!statement.executeCommand()) { + LOG_ERROR("Unable to execute deletion of database %s from origin %s from tracker", name.ascii().data(), origin->databaseIdentifier().ascii().data()); + doneDeletingDatabase(origin, name); + return false; + } + + { + Locker<OriginQuotaManager> quotaManagerLocker(originQuotaManager()); + originQuotaManager().removeDatabase(origin, name); + } + + if (m_client) { + m_client->dispatchDidModifyOrigin(origin); + m_client->dispatchDidModifyDatabase(origin, name); + } + doneDeletingDatabase(origin, name); + + return true; +} + +// deleteDatabaseFile has to release locks between looking up the list of databases to close and closing them. While this is in progress, the caller +// is responsible for making sure no new databases are opened in the file to be deleted. +bool DatabaseTracker::deleteDatabaseFile(SecurityOrigin* origin, const String& name) +{ + String fullPath = fullPathForDatabase(origin, name, false); + if (fullPath.isEmpty()) + return true; + +#ifndef NDEBUG + { + MutexLocker lockDatabase(m_databaseGuard); + ASSERT(deletingDatabase(origin, name) || deletingOrigin(origin)); + } +#endif + + Vector<RefPtr<AbstractDatabase> > deletedDatabases; + + // Make sure not to hold the any locks when calling + // Database::markAsDeletedAndClose(), since that can cause a deadlock + // during the synchronous DatabaseThread call it triggers. + { + MutexLocker openDatabaseMapLock(m_openDatabaseMapGuard); + if (m_openDatabaseMap) { + // There are some open databases, lets check if they are for this origin. + DatabaseNameMap* nameMap = m_openDatabaseMap->get(origin); + if (nameMap && nameMap->size()) { + // There are some open databases for this origin, let's check + // if they are this database by name. + DatabaseSet* databaseSet = nameMap->get(name); + if (databaseSet && databaseSet->size()) { + // We have some database open with this name. Mark them as deleted. + DatabaseSet::const_iterator end = databaseSet->end(); + for (DatabaseSet::const_iterator it = databaseSet->begin(); it != end; ++it) + deletedDatabases.append(*it); + } + } + } + } + + for (unsigned i = 0; i < deletedDatabases.size(); ++i) + deletedDatabases[i]->markAsDeletedAndClose(); + + return SQLiteFileSystem::deleteDatabaseFile(fullPath); +} + +void DatabaseTracker::setClient(DatabaseTrackerClient* client) +{ + m_client = client; +} + +static Mutex& notificationMutex() +{ + DEFINE_STATIC_LOCAL(Mutex, mutex, ()); + return mutex; +} + +typedef Vector<pair<RefPtr<SecurityOrigin>, String> > NotificationQueue; + +static NotificationQueue& notificationQueue() +{ + DEFINE_STATIC_LOCAL(NotificationQueue, queue, ()); + return queue; +} + +void DatabaseTracker::scheduleNotifyDatabaseChanged(SecurityOrigin* origin, const String& name) +{ + MutexLocker locker(notificationMutex()); + + notificationQueue().append(pair<RefPtr<SecurityOrigin>, String>(origin->threadsafeCopy(), name.crossThreadString())); + scheduleForNotification(); +} + +static bool notificationScheduled = false; + +void DatabaseTracker::scheduleForNotification() +{ + ASSERT(!notificationMutex().tryLock()); + + if (!notificationScheduled) { + callOnMainThread(DatabaseTracker::notifyDatabasesChanged, 0); + notificationScheduled = true; + } +} + +void DatabaseTracker::notifyDatabasesChanged(void*) +{ + // Note that if DatabaseTracker ever becomes non-singleton, we'll have to amend this notification + // mechanism to include which tracker the notification goes out on as well. + DatabaseTracker& theTracker(tracker()); + + NotificationQueue notifications; + { + MutexLocker locker(notificationMutex()); + + notifications.swap(notificationQueue()); + + notificationScheduled = false; + } + + if (!theTracker.m_client) + return; + + for (unsigned i = 0; i < notifications.size(); ++i) + theTracker.m_client->dispatchDidModifyDatabase(notifications[i].first.get(), notifications[i].second); +} + + +} // namespace WebCore +#endif |