2023-02-04 19:26:20 +01:00
|
|
|
// Copyright (c) 2020 The Bitcoin Core developers
|
|
|
|
// Distributed under the MIT software license, see the accompanying
|
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
|
|
|
#include <wallet/sqlite.h>
|
|
|
|
|
|
|
|
#include <chainparams.h>
|
|
|
|
#include <crypto/common.h>
|
|
|
|
#include <logging.h>
|
|
|
|
#include <sync.h>
|
|
|
|
#include <util/strencodings.h>
|
|
|
|
#include <util/system.h>
|
|
|
|
#include <util/translation.h>
|
|
|
|
#include <wallet/db.h>
|
|
|
|
|
|
|
|
#include <sqlite3.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
|
2021-05-15 18:45:20 +02:00
|
|
|
#include <optional>
|
2021-03-28 14:52:10 +02:00
|
|
|
#include <utility>
|
|
|
|
#include <vector>
|
|
|
|
|
2023-02-04 19:26:20 +01:00
|
|
|
static constexpr int32_t WALLET_SCHEMA_VERSION = 0;
|
|
|
|
|
|
|
|
static Mutex g_sqlite_mutex;
|
|
|
|
static int g_sqlite_count GUARDED_BY(g_sqlite_mutex) = 0;
|
|
|
|
|
|
|
|
static void ErrorLogCallback(void* arg, int code, const char* msg)
|
|
|
|
{
|
|
|
|
// From sqlite3_config() documentation for the SQLITE_CONFIG_LOG option:
|
|
|
|
// "The void pointer that is the second argument to SQLITE_CONFIG_LOG is passed through as
|
|
|
|
// the first parameter to the application-defined logger function whenever that function is
|
|
|
|
// invoked."
|
|
|
|
// Assert that this is the case:
|
|
|
|
assert(arg == nullptr);
|
|
|
|
LogPrintf("SQLite Error. Code: %d. Message: %s\n", code, msg);
|
|
|
|
}
|
|
|
|
|
2021-05-15 18:45:20 +02:00
|
|
|
static std::optional<int> ReadPragmaInteger(sqlite3* db, const std::string& key, const std::string& description, bilingual_str& error)
|
|
|
|
{
|
|
|
|
std::string stmt_text = strprintf("PRAGMA %s", key);
|
|
|
|
sqlite3_stmt* pragma_read_stmt{nullptr};
|
|
|
|
int ret = sqlite3_prepare_v2(db, stmt_text.c_str(), -1, &pragma_read_stmt, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
sqlite3_finalize(pragma_read_stmt);
|
|
|
|
error = Untranslated(strprintf("SQLiteDatabase: Failed to prepare the statement to fetch %s: %s", description, sqlite3_errstr(ret)));
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
ret = sqlite3_step(pragma_read_stmt);
|
|
|
|
if (ret != SQLITE_ROW) {
|
|
|
|
sqlite3_finalize(pragma_read_stmt);
|
|
|
|
error = Untranslated(strprintf("SQLiteDatabase: Failed to fetch %s: %s", description, sqlite3_errstr(ret)));
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
int result = sqlite3_column_int(pragma_read_stmt, 0);
|
|
|
|
sqlite3_finalize(pragma_read_stmt);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void SetPragma(sqlite3* db, const std::string& key, const std::string& value, const std::string& err_msg)
|
|
|
|
{
|
|
|
|
std::string stmt_text = strprintf("PRAGMA %s = %s", key, value);
|
|
|
|
int ret = sqlite3_exec(db, stmt_text.c_str(), nullptr, nullptr, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: %s: %s\n", err_msg, sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-04 19:26:20 +01:00
|
|
|
SQLiteDatabase::SQLiteDatabase(const fs::path& dir_path, const fs::path& file_path, bool mock)
|
|
|
|
: WalletDatabase(), m_mock(mock), m_dir_path(dir_path.string()), m_file_path(file_path.string())
|
|
|
|
{
|
|
|
|
{
|
|
|
|
LOCK(g_sqlite_mutex);
|
|
|
|
LogPrintf("Using SQLite Version %s\n", SQLiteDatabaseVersion());
|
|
|
|
LogPrintf("Using wallet %s\n", m_dir_path);
|
|
|
|
|
|
|
|
if (++g_sqlite_count == 1) {
|
|
|
|
// Setup logging
|
|
|
|
int ret = sqlite3_config(SQLITE_CONFIG_LOG, ErrorLogCallback, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to setup error log: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
// Force serialized threading mode
|
|
|
|
ret = sqlite3_config(SQLITE_CONFIG_SERIALIZED);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to configure serialized threading mode: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
int ret = sqlite3_initialize(); // This is a no-op if sqlite3 is already initialized
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to initialize SQLite: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
Open();
|
|
|
|
} catch (const std::runtime_error&) {
|
|
|
|
// If open fails, cleanup this object and rethrow the exception
|
|
|
|
Cleanup();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void SQLiteBatch::SetupSQLStatements()
|
|
|
|
{
|
2021-03-28 14:52:10 +02:00
|
|
|
const std::vector<std::pair<sqlite3_stmt**, const char*>> statements{
|
|
|
|
{&m_read_stmt, "SELECT value FROM main WHERE key = ?"},
|
|
|
|
{&m_insert_stmt, "INSERT INTO main VALUES(?, ?)"},
|
|
|
|
{&m_overwrite_stmt, "INSERT or REPLACE into main values(?, ?)"},
|
|
|
|
{&m_delete_stmt, "DELETE FROM main WHERE key = ?"},
|
|
|
|
{&m_cursor_stmt, "SELECT key, value FROM main"},
|
|
|
|
};
|
|
|
|
|
|
|
|
for (const auto& [stmt_prepared, stmt_text] : statements) {
|
|
|
|
if (*stmt_prepared == nullptr) {
|
|
|
|
int res = sqlite3_prepare_v2(m_database.m_db, stmt_text, -1, stmt_prepared, nullptr);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf(
|
|
|
|
"SQLiteDatabase: Failed to setup SQL statements: %s\n", sqlite3_errstr(res)));
|
|
|
|
}
|
2023-02-04 19:26:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SQLiteDatabase::~SQLiteDatabase()
|
|
|
|
{
|
|
|
|
Cleanup();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SQLiteDatabase::Cleanup() noexcept
|
|
|
|
{
|
|
|
|
Close();
|
|
|
|
|
|
|
|
LOCK(g_sqlite_mutex);
|
|
|
|
if (--g_sqlite_count == 0) {
|
|
|
|
int ret = sqlite3_shutdown();
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
LogPrintf("SQLiteDatabase: Failed to shutdown SQLite: %s\n", sqlite3_errstr(ret));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteDatabase::Verify(bilingual_str& error)
|
|
|
|
{
|
|
|
|
assert(m_db);
|
|
|
|
|
|
|
|
// Check the application ID matches our network magic
|
2021-05-15 18:45:20 +02:00
|
|
|
auto read_result = ReadPragmaInteger(m_db, "application_id", "the application id", error);
|
|
|
|
if (!read_result.has_value()) return false;
|
|
|
|
uint32_t app_id = static_cast<uint32_t>(read_result.value());
|
2023-02-04 19:26:20 +01:00
|
|
|
uint32_t net_magic = ReadBE32(Params().MessageStart());
|
|
|
|
if (app_id != net_magic) {
|
|
|
|
error = strprintf(_("SQLiteDatabase: Unexpected application id. Expected %u, got %u"), net_magic, app_id);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check our schema version
|
2021-05-15 18:45:20 +02:00
|
|
|
read_result = ReadPragmaInteger(m_db, "user_version", "sqlite wallet schema version", error);
|
|
|
|
if (!read_result.has_value()) return false;
|
|
|
|
int32_t user_ver = read_result.value();
|
2023-02-04 19:26:20 +01:00
|
|
|
if (user_ver != WALLET_SCHEMA_VERSION) {
|
|
|
|
error = strprintf(_("SQLiteDatabase: Unknown sqlite wallet schema version %d. Only version %d is supported"), user_ver, WALLET_SCHEMA_VERSION);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
sqlite3_stmt* stmt{nullptr};
|
2021-05-15 18:45:20 +02:00
|
|
|
int ret = sqlite3_prepare_v2(m_db, "PRAGMA integrity_check", -1, &stmt, nullptr);
|
2023-02-04 19:26:20 +01:00
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
sqlite3_finalize(stmt);
|
|
|
|
error = strprintf(_("SQLiteDatabase: Failed to prepare statement to verify database: %s"), sqlite3_errstr(ret));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
while (true) {
|
|
|
|
ret = sqlite3_step(stmt);
|
|
|
|
if (ret == SQLITE_DONE) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (ret != SQLITE_ROW) {
|
|
|
|
error = strprintf(_("SQLiteDatabase: Failed to execute statement to verify database: %s"), sqlite3_errstr(ret));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
const char* msg = (const char*)sqlite3_column_text(stmt, 0);
|
|
|
|
if (!msg) {
|
|
|
|
error = strprintf(_("SQLiteDatabase: Failed to read database verification error: %s"), sqlite3_errstr(ret));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
std::string str_msg(msg);
|
|
|
|
if (str_msg == "ok") {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (error.empty()) {
|
|
|
|
error = _("Failed to verify database") + Untranslated("\n");
|
|
|
|
}
|
|
|
|
error += Untranslated(strprintf("%s\n", str_msg));
|
|
|
|
}
|
|
|
|
sqlite3_finalize(stmt);
|
|
|
|
return error.empty();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SQLiteDatabase::Open()
|
|
|
|
{
|
|
|
|
int flags = SQLITE_OPEN_FULLMUTEX | SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE;
|
|
|
|
if (m_mock) {
|
|
|
|
flags |= SQLITE_OPEN_MEMORY; // In memory database for mock db
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m_db == nullptr) {
|
2023-02-04 19:28:21 +01:00
|
|
|
if (!m_mock) {
|
|
|
|
TryCreateDirectories(m_dir_path);
|
|
|
|
}
|
2023-02-04 19:26:20 +01:00
|
|
|
int ret = sqlite3_open_v2(m_file_path.c_str(), &m_db, flags, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to open database: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
2021-09-28 00:26:11 +02:00
|
|
|
ret = sqlite3_extended_result_codes(m_db, 1);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to enable extended result codes: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
2023-02-04 19:26:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sqlite3_db_readonly(m_db, "main") != 0) {
|
|
|
|
throw std::runtime_error("SQLiteDatabase: Database opened in readonly mode but read-write permissions are needed");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Acquire an exclusive lock on the database
|
|
|
|
// First change the locking mode to exclusive
|
2021-05-15 18:45:20 +02:00
|
|
|
SetPragma(m_db, "locking_mode", "exclusive", "Unable to change database locking mode to exclusive");
|
2023-02-04 19:26:20 +01:00
|
|
|
// Now begin a transaction to acquire the exclusive lock. This lock won't be released until we close because of the exclusive locking mode.
|
2021-05-15 18:45:20 +02:00
|
|
|
int ret = sqlite3_exec(m_db, "BEGIN EXCLUSIVE TRANSACTION", nullptr, nullptr, nullptr);
|
2023-02-04 19:26:20 +01:00
|
|
|
if (ret != SQLITE_OK) {
|
2023-02-13 03:12:53 +01:00
|
|
|
throw std::runtime_error("SQLiteDatabase: Unable to obtain an exclusive lock on the database, is it being used by another dashd?\n");
|
2023-02-04 19:26:20 +01:00
|
|
|
}
|
|
|
|
ret = sqlite3_exec(m_db, "COMMIT", nullptr, nullptr, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Unable to end exclusive lock transaction: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable fullfsync for the platforms that use it
|
2021-05-15 18:45:20 +02:00
|
|
|
SetPragma(m_db, "fullfsync", "true", "Failed to enable fullfsync");
|
2023-02-04 19:26:20 +01:00
|
|
|
|
2021-04-08 02:55:09 +02:00
|
|
|
if (gArgs.GetBoolArg("-unsafesqlitesync", false)) {
|
|
|
|
// Use normal synchronous mode for the journal
|
|
|
|
LogPrintf("WARNING SQLite is configured to not wait for data to be flushed to disk. Data loss and corruption may occur.\n");
|
2021-05-15 18:45:20 +02:00
|
|
|
SetPragma(m_db, "synchronous", "OFF", "Failed to set synchronous mode to OFF");
|
2021-04-08 02:55:09 +02:00
|
|
|
}
|
|
|
|
|
2023-02-04 19:26:20 +01:00
|
|
|
// Make the table for our key-value pairs
|
|
|
|
// First check that the main table exists
|
|
|
|
sqlite3_stmt* check_main_stmt{nullptr};
|
|
|
|
ret = sqlite3_prepare_v2(m_db, "SELECT name FROM sqlite_master WHERE type='table' AND name='main'", -1, &check_main_stmt, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to prepare statement to check table existence: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
ret = sqlite3_step(check_main_stmt);
|
|
|
|
if (sqlite3_finalize(check_main_stmt) != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to finalize statement checking table existence: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
bool table_exists;
|
|
|
|
if (ret == SQLITE_DONE) {
|
|
|
|
table_exists = false;
|
|
|
|
} else if (ret == SQLITE_ROW) {
|
|
|
|
table_exists = true;
|
|
|
|
} else {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to execute statement to check table existence: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do the db setup things because the table doesn't exist only when we are creating a new wallet
|
|
|
|
if (!table_exists) {
|
|
|
|
ret = sqlite3_exec(m_db, "CREATE TABLE main(key BLOB PRIMARY KEY NOT NULL, value BLOB NOT NULL)", nullptr, nullptr, nullptr);
|
|
|
|
if (ret != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to create new database: %s\n", sqlite3_errstr(ret)));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the application id
|
|
|
|
uint32_t app_id = ReadBE32(Params().MessageStart());
|
2021-05-15 18:45:20 +02:00
|
|
|
SetPragma(m_db, "application_id", strprintf("%d", static_cast<int32_t>(app_id)),
|
|
|
|
"Failed to set the application id");
|
2023-02-04 19:26:20 +01:00
|
|
|
|
|
|
|
// Set the user version
|
2021-05-15 18:45:20 +02:00
|
|
|
SetPragma(m_db, "user_version", strprintf("%d", WALLET_SCHEMA_VERSION),
|
|
|
|
"Failed to set the wallet schema version");
|
2023-02-04 19:26:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteDatabase::Rewrite(const char* skip)
|
|
|
|
{
|
|
|
|
// Rewrite the database using the VACUUM command: https://sqlite.org/lang_vacuum.html
|
|
|
|
int ret = sqlite3_exec(m_db, "VACUUM", nullptr, nullptr, nullptr);
|
|
|
|
return ret == SQLITE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteDatabase::Backup(const std::string& dest) const
|
|
|
|
{
|
|
|
|
sqlite3* db_copy;
|
|
|
|
int res = sqlite3_open(dest.c_str(), &db_copy);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
sqlite3_close(db_copy);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
sqlite3_backup* backup = sqlite3_backup_init(db_copy, "main", m_db, "main");
|
|
|
|
if (!backup) {
|
|
|
|
LogPrintf("%s: Unable to begin backup: %s\n", __func__, sqlite3_errmsg(m_db));
|
|
|
|
sqlite3_close(db_copy);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// Specifying -1 will copy all of the pages
|
|
|
|
res = sqlite3_backup_step(backup, -1);
|
|
|
|
if (res != SQLITE_DONE) {
|
|
|
|
LogPrintf("%s: Unable to backup: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
sqlite3_backup_finish(backup);
|
|
|
|
sqlite3_close(db_copy);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
res = sqlite3_backup_finish(backup);
|
|
|
|
sqlite3_close(db_copy);
|
|
|
|
return res == SQLITE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SQLiteDatabase::Close()
|
|
|
|
{
|
|
|
|
int res = sqlite3_close(m_db);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
throw std::runtime_error(strprintf("SQLiteDatabase: Failed to close database: %s\n", sqlite3_errstr(res)));
|
|
|
|
}
|
|
|
|
m_db = nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<DatabaseBatch> SQLiteDatabase::MakeBatch(bool flush_on_close)
|
|
|
|
{
|
|
|
|
// We ignore flush_on_close because we don't do manual flushing for SQLite
|
|
|
|
return std::make_unique<SQLiteBatch>(*this);
|
|
|
|
}
|
|
|
|
|
|
|
|
SQLiteBatch::SQLiteBatch(SQLiteDatabase& database)
|
|
|
|
: m_database(database)
|
|
|
|
{
|
|
|
|
// Make sure we have a db handle
|
|
|
|
assert(m_database.m_db);
|
|
|
|
|
|
|
|
SetupSQLStatements();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SQLiteBatch::Close()
|
|
|
|
{
|
|
|
|
// If m_db is in a transaction (i.e. not in autocommit mode), then abort the transaction in progress
|
|
|
|
if (m_database.m_db && sqlite3_get_autocommit(m_database.m_db) == 0) {
|
|
|
|
if (TxnAbort()) {
|
|
|
|
LogPrintf("SQLiteBatch: Batch closed unexpectedly without the transaction being explicitly committed or aborted\n");
|
|
|
|
} else {
|
|
|
|
LogPrintf("SQLiteBatch: Batch closed and failed to abort transaction\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Free all of the prepared statements
|
2021-03-28 14:52:10 +02:00
|
|
|
const std::vector<std::pair<sqlite3_stmt**, const char*>> statements{
|
|
|
|
{&m_read_stmt, "read"},
|
|
|
|
{&m_insert_stmt, "insert"},
|
|
|
|
{&m_overwrite_stmt, "overwrite"},
|
|
|
|
{&m_delete_stmt, "delete"},
|
|
|
|
{&m_cursor_stmt, "cursor"},
|
|
|
|
};
|
|
|
|
|
|
|
|
for (const auto& [stmt_prepared, stmt_description] : statements) {
|
|
|
|
int res = sqlite3_finalize(*stmt_prepared);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("SQLiteBatch: Batch closed but could not finalize %s statement: %s\n",
|
|
|
|
stmt_description, sqlite3_errstr(res));
|
|
|
|
}
|
|
|
|
*stmt_prepared = nullptr;
|
2023-02-04 19:26:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::ReadKey(CDataStream&& key, CDataStream& value)
|
|
|
|
{
|
|
|
|
if (!m_database.m_db) return false;
|
|
|
|
assert(m_read_stmt);
|
|
|
|
|
|
|
|
// Bind: leftmost parameter in statement is index 1
|
|
|
|
int res = sqlite3_bind_blob(m_read_stmt, 1, key.data(), key.size(), SQLITE_STATIC);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("%s: Unable to bind statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
sqlite3_clear_bindings(m_read_stmt);
|
|
|
|
sqlite3_reset(m_read_stmt);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
res = sqlite3_step(m_read_stmt);
|
|
|
|
if (res != SQLITE_ROW) {
|
|
|
|
if (res != SQLITE_DONE) {
|
|
|
|
// SQLITE_DONE means "not found", don't log an error in that case.
|
|
|
|
LogPrintf("%s: Unable to execute statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
}
|
|
|
|
sqlite3_clear_bindings(m_read_stmt);
|
|
|
|
sqlite3_reset(m_read_stmt);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// Leftmost column in result is index 0
|
|
|
|
const char* data = reinterpret_cast<const char*>(sqlite3_column_blob(m_read_stmt, 0));
|
|
|
|
int data_size = sqlite3_column_bytes(m_read_stmt, 0);
|
|
|
|
value.write(data, data_size);
|
|
|
|
|
|
|
|
sqlite3_clear_bindings(m_read_stmt);
|
|
|
|
sqlite3_reset(m_read_stmt);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::WriteKey(CDataStream&& key, CDataStream&& value, bool overwrite)
|
|
|
|
{
|
|
|
|
if (!m_database.m_db) return false;
|
|
|
|
assert(m_insert_stmt && m_overwrite_stmt);
|
|
|
|
|
|
|
|
sqlite3_stmt* stmt;
|
|
|
|
if (overwrite) {
|
|
|
|
stmt = m_overwrite_stmt;
|
|
|
|
} else {
|
|
|
|
stmt = m_insert_stmt;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Bind: leftmost parameter in statement is index 1
|
|
|
|
// Insert index 1 is key, 2 is value
|
|
|
|
int res = sqlite3_bind_blob(stmt, 1, key.data(), key.size(), SQLITE_STATIC);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("%s: Unable to bind key to statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
sqlite3_clear_bindings(stmt);
|
|
|
|
sqlite3_reset(stmt);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
res = sqlite3_bind_blob(stmt, 2, value.data(), value.size(), SQLITE_STATIC);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("%s: Unable to bind value to statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
sqlite3_clear_bindings(stmt);
|
|
|
|
sqlite3_reset(stmt);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
res = sqlite3_step(stmt);
|
|
|
|
sqlite3_clear_bindings(stmt);
|
|
|
|
sqlite3_reset(stmt);
|
|
|
|
if (res != SQLITE_DONE) {
|
|
|
|
LogPrintf("%s: Unable to execute statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
}
|
|
|
|
return res == SQLITE_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::EraseKey(CDataStream&& key)
|
|
|
|
{
|
|
|
|
if (!m_database.m_db) return false;
|
|
|
|
assert(m_delete_stmt);
|
|
|
|
|
|
|
|
// Bind: leftmost parameter in statement is index 1
|
|
|
|
int res = sqlite3_bind_blob(m_delete_stmt, 1, key.data(), key.size(), SQLITE_STATIC);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("%s: Unable to bind statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
sqlite3_clear_bindings(m_delete_stmt);
|
|
|
|
sqlite3_reset(m_delete_stmt);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Execute
|
|
|
|
res = sqlite3_step(m_delete_stmt);
|
|
|
|
sqlite3_clear_bindings(m_delete_stmt);
|
|
|
|
sqlite3_reset(m_delete_stmt);
|
|
|
|
if (res != SQLITE_DONE) {
|
|
|
|
LogPrintf("%s: Unable to execute statement: %s\n", __func__, sqlite3_errstr(res));
|
|
|
|
}
|
|
|
|
return res == SQLITE_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::HasKey(CDataStream&& key)
|
|
|
|
{
|
|
|
|
if (!m_database.m_db) return false;
|
|
|
|
assert(m_read_stmt);
|
|
|
|
|
|
|
|
// Bind: leftmost parameter in statement is index 1
|
|
|
|
bool ret = false;
|
|
|
|
int res = sqlite3_bind_blob(m_read_stmt, 1, key.data(), key.size(), SQLITE_STATIC);
|
|
|
|
if (res == SQLITE_OK) {
|
|
|
|
res = sqlite3_step(m_read_stmt);
|
|
|
|
if (res == SQLITE_ROW) {
|
|
|
|
ret = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sqlite3_clear_bindings(m_read_stmt);
|
|
|
|
sqlite3_reset(m_read_stmt);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::StartCursor()
|
|
|
|
{
|
|
|
|
assert(!m_cursor_init);
|
|
|
|
if (!m_database.m_db) return false;
|
|
|
|
m_cursor_init = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::ReadAtCursor(CDataStream& key, CDataStream& value, bool& complete)
|
|
|
|
{
|
|
|
|
complete = false;
|
|
|
|
|
|
|
|
if (!m_cursor_init) return false;
|
|
|
|
|
|
|
|
int res = sqlite3_step(m_cursor_stmt);
|
|
|
|
if (res == SQLITE_DONE) {
|
|
|
|
complete = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (res != SQLITE_ROW) {
|
|
|
|
LogPrintf("SQLiteBatch::ReadAtCursor: Unable to execute cursor step: %s\n", sqlite3_errstr(res));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Leftmost column in result is index 0
|
|
|
|
const char* key_data = reinterpret_cast<const char*>(sqlite3_column_blob(m_cursor_stmt, 0));
|
|
|
|
int key_data_size = sqlite3_column_bytes(m_cursor_stmt, 0);
|
|
|
|
key.write(key_data, key_data_size);
|
|
|
|
const char* value_data = reinterpret_cast<const char*>(sqlite3_column_blob(m_cursor_stmt, 1));
|
|
|
|
int value_data_size = sqlite3_column_bytes(m_cursor_stmt, 1);
|
|
|
|
value.write(value_data, value_data_size);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SQLiteBatch::CloseCursor()
|
|
|
|
{
|
|
|
|
sqlite3_reset(m_cursor_stmt);
|
|
|
|
m_cursor_init = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::TxnBegin()
|
|
|
|
{
|
|
|
|
if (!m_database.m_db || sqlite3_get_autocommit(m_database.m_db) == 0) return false;
|
|
|
|
int res = sqlite3_exec(m_database.m_db, "BEGIN TRANSACTION", nullptr, nullptr, nullptr);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("SQLiteBatch: Failed to begin the transaction\n");
|
|
|
|
}
|
|
|
|
return res == SQLITE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::TxnCommit()
|
|
|
|
{
|
|
|
|
if (!m_database.m_db || sqlite3_get_autocommit(m_database.m_db) != 0) return false;
|
|
|
|
int res = sqlite3_exec(m_database.m_db, "COMMIT TRANSACTION", nullptr, nullptr, nullptr);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("SQLiteBatch: Failed to commit the transaction\n");
|
|
|
|
}
|
|
|
|
return res == SQLITE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SQLiteBatch::TxnAbort()
|
|
|
|
{
|
|
|
|
if (!m_database.m_db || sqlite3_get_autocommit(m_database.m_db) != 0) return false;
|
|
|
|
int res = sqlite3_exec(m_database.m_db, "ROLLBACK TRANSACTION", nullptr, nullptr, nullptr);
|
|
|
|
if (res != SQLITE_OK) {
|
|
|
|
LogPrintf("SQLiteBatch: Failed to abort the transaction\n");
|
|
|
|
}
|
|
|
|
return res == SQLITE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<SQLiteDatabase> MakeSQLiteDatabase(const fs::path& path, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error)
|
|
|
|
{
|
|
|
|
try {
|
2023-02-04 19:29:32 +01:00
|
|
|
fs::path data_file = SQLiteDataFile(path);
|
|
|
|
auto db = std::make_unique<SQLiteDatabase>(data_file.parent_path(), data_file);
|
2023-02-04 19:26:20 +01:00
|
|
|
if (options.verify && !db->Verify(error)) {
|
|
|
|
status = DatabaseStatus::FAILED_VERIFY;
|
|
|
|
return nullptr;
|
|
|
|
}
|
2023-01-21 12:30:26 +01:00
|
|
|
status = DatabaseStatus::SUCCESS;
|
2023-02-04 19:26:20 +01:00
|
|
|
return db;
|
|
|
|
} catch (const std::runtime_error& e) {
|
|
|
|
status = DatabaseStatus::FAILED_LOAD;
|
2020-11-05 10:28:37 +01:00
|
|
|
error = Untranslated(e.what());
|
2023-02-04 19:26:20 +01:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string SQLiteDatabaseVersion()
|
|
|
|
{
|
|
|
|
return std::string(sqlite3_libversion());
|
|
|
|
}
|