2015-06-18 23:04:41 +00:00
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Copyright 2015 Realm Inc.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
//
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
#include "shared_realm.hpp"
|
2015-09-04 18:51:19 +00:00
|
|
|
|
|
|
|
#include <realm/commit_log.hpp>
|
2015-08-10 17:49:59 +00:00
|
|
|
#include <realm/group_shared.hpp>
|
|
|
|
#include <realm/lang_bind_helper.hpp>
|
2015-09-04 18:51:19 +00:00
|
|
|
|
2015-07-27 19:42:55 +00:00
|
|
|
#include <memory>
|
2015-08-24 20:14:59 +00:00
|
|
|
#include <mutex>
|
2015-06-18 23:04:41 +00:00
|
|
|
|
|
|
|
using namespace realm;
|
|
|
|
|
|
|
|
RealmCache Realm::s_global_cache;
|
|
|
|
|
2015-09-04 18:51:19 +00:00
|
|
|
Realm::Config::Config(const Config& c) : path(c.path), read_only(c.read_only), in_memory(c.in_memory), schema_version(c.schema_version), migration_function(c.migration_function)
|
2015-06-18 23:04:41 +00:00
|
|
|
{
|
|
|
|
if (c.schema) {
|
2015-07-27 19:42:55 +00:00
|
|
|
schema = std::make_unique<Schema>(*c.schema);
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
2015-09-04 18:51:19 +00:00
|
|
|
if (c.encryption_key) {
|
|
|
|
encryption_key = std::make_unique<char[]>(64);
|
|
|
|
memcpy(encryption_key.get(), c.encryption_key.get(), 64);
|
|
|
|
}
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
2015-08-24 20:16:31 +00:00
|
|
|
Realm::Realm(Config &config) : m_config(config)
|
2015-06-18 23:04:41 +00:00
|
|
|
{
|
|
|
|
try {
|
|
|
|
if (config.read_only) {
|
2015-09-04 18:51:19 +00:00
|
|
|
m_read_only_group = std::make_unique<Group>(config.path, config.encryption_key.get(), Group::mode_ReadOnly);
|
2015-06-18 23:04:41 +00:00
|
|
|
m_group = m_read_only_group.get();
|
|
|
|
}
|
|
|
|
else {
|
2015-09-04 18:51:19 +00:00
|
|
|
m_history = realm::make_client_history(config.path, config.encryption_key.get());
|
2015-06-18 23:04:41 +00:00
|
|
|
SharedGroup::DurabilityLevel durability = config.in_memory ? SharedGroup::durability_MemOnly :
|
|
|
|
SharedGroup::durability_Full;
|
2015-09-04 18:51:19 +00:00
|
|
|
m_shared_group = std::make_unique<SharedGroup>(*m_history, durability, config.encryption_key.get());
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (util::File::PermissionDenied const& ex) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw RealmFileException(RealmFileException::Kind::PermissionDenied, "Unable to open a realm at path '" + config.path +
|
2015-06-18 23:04:41 +00:00
|
|
|
"'. Please use a path where your app has " + (config.read_only ? "read" : "read-write") + " permissions.");
|
|
|
|
}
|
|
|
|
catch (util::File::Exists const& ex) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw RealmFileException(RealmFileException::Kind::Exists, "Unable to open a realm at path '" + config.path + "'");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
catch (util::File::AccessError const& ex) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw RealmFileException(RealmFileException::Kind::AccessError, "Unable to open a realm at path '" + config.path + "'");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
catch (IncompatibleLockFile const&) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw RealmFileException(RealmFileException::Kind::IncompatibleLockFile, "Realm file is currently open in another process "
|
2015-06-18 23:04:41 +00:00
|
|
|
"which cannot share access with this process. All processes sharing a single file must be the same architecture.");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-27 19:42:55 +00:00
|
|
|
Group *Realm::read_group()
|
|
|
|
{
|
2015-06-18 23:04:41 +00:00
|
|
|
if (!m_group) {
|
|
|
|
m_group = &const_cast<Group&>(m_shared_group->begin_read());
|
|
|
|
}
|
|
|
|
return m_group;
|
|
|
|
}
|
|
|
|
|
|
|
|
SharedRealm Realm::get_shared_realm(Config &config)
|
|
|
|
{
|
|
|
|
SharedRealm realm = s_global_cache.get_realm(config.path);
|
|
|
|
if (realm) {
|
|
|
|
if (realm->config().read_only != config.read_only) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw MismatchedConfigException("Realm at path already opened with different read permissions.");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
if (realm->config().in_memory != config.in_memory) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw MismatchedConfigException("Realm at path already opened with different inMemory settings.");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
2015-07-27 19:42:55 +00:00
|
|
|
if (realm->config().encryption_key != config.encryption_key) {
|
|
|
|
throw MismatchedConfigException("Realm at path already opened with a different encryption key.");
|
|
|
|
}
|
|
|
|
if (realm->config().schema_version != config.schema_version && config.schema_version != ObjectStore::NotVersioned) {
|
|
|
|
throw MismatchedConfigException("Realm at path already opened with different schema version.");
|
|
|
|
}
|
|
|
|
// FIXME - enable schma comparison
|
|
|
|
/*if (realm->config().schema != config.schema) {
|
|
|
|
throw MismatchedConfigException("Realm at path already opened with different schema");
|
|
|
|
}*/
|
|
|
|
|
|
|
|
realm->m_config.migration_function = config.migration_function;
|
|
|
|
|
2015-06-18 23:04:41 +00:00
|
|
|
return realm;
|
|
|
|
}
|
|
|
|
|
2015-06-22 17:32:31 +00:00
|
|
|
realm = SharedRealm(new Realm(config));
|
2015-06-18 23:04:41 +00:00
|
|
|
|
|
|
|
// we want to ensure we are only initializing a single realm at a time
|
2015-08-24 20:14:59 +00:00
|
|
|
static std::mutex s_init_mutex;
|
2015-07-20 23:11:15 +00:00
|
|
|
std::lock_guard<std::mutex> lock(s_init_mutex);
|
2015-06-18 23:04:41 +00:00
|
|
|
|
2015-07-28 18:25:04 +00:00
|
|
|
uint64_t old_version = ObjectStore::get_schema_version(realm->read_group());
|
2015-08-12 18:07:06 +00:00
|
|
|
if (auto existing = s_global_cache.get_any_realm(realm->config().path)) {
|
|
|
|
// if there is an existing realm at the current path steal its schema/column mapping
|
|
|
|
// FIXME - need to validate that schemas match
|
|
|
|
realm->m_config.schema = std::make_unique<Schema>(*existing->m_config.schema);
|
|
|
|
}
|
|
|
|
else if (!realm->m_config.schema) {
|
2015-06-18 23:04:41 +00:00
|
|
|
// get schema from group and skip validation
|
2015-07-28 18:25:04 +00:00
|
|
|
realm->m_config.schema_version = old_version;
|
2015-07-27 19:42:55 +00:00
|
|
|
realm->m_config.schema = std::make_unique<Schema>(ObjectStore::schema_from_group(realm->read_group()));
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
2015-07-28 18:25:04 +00:00
|
|
|
else if (realm->m_config.read_only) {
|
|
|
|
if (old_version == ObjectStore::NotVersioned) {
|
|
|
|
throw UnitializedRealmException("Can't open an un-initizliazed Realm without a Schema");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
2015-07-28 18:25:04 +00:00
|
|
|
ObjectStore::verify_schema(realm->read_group(), *realm->m_config.schema, true);
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
else {
|
2015-06-22 17:32:31 +00:00
|
|
|
// its a non-cached realm so update/migrate if needed
|
2015-07-28 18:25:04 +00:00
|
|
|
realm->update_schema(*realm->m_config.schema, realm->m_config.schema_version);
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
s_global_cache.cache_realm(realm, realm->m_thread_id);
|
|
|
|
return realm;
|
|
|
|
}
|
|
|
|
|
2015-07-27 19:42:55 +00:00
|
|
|
bool Realm::update_schema(Schema &schema, uint64_t version)
|
2015-06-22 17:32:31 +00:00
|
|
|
{
|
|
|
|
bool changed = false;
|
2015-07-27 19:42:55 +00:00
|
|
|
Config old_config(m_config);
|
|
|
|
|
|
|
|
// set new version/schema
|
|
|
|
if (m_config.schema.get() != &schema) {
|
|
|
|
m_config.schema = std::make_unique<Schema>(schema);
|
|
|
|
}
|
|
|
|
m_config.schema_version = version;
|
|
|
|
|
2015-06-22 17:32:31 +00:00
|
|
|
try {
|
2015-07-28 18:25:04 +00:00
|
|
|
if (!m_config.read_only && ObjectStore::realm_requires_update(read_group(), version, schema)) {
|
2015-07-27 19:42:55 +00:00
|
|
|
// keep old copy to pass to migration function
|
|
|
|
old_config.read_only = true;
|
|
|
|
SharedRealm old_realm = SharedRealm(new Realm(old_config)), updated_realm = shared_from_this();
|
|
|
|
|
|
|
|
// update and migrate
|
|
|
|
begin_transaction();
|
|
|
|
changed = ObjectStore::update_realm_with_schema(read_group(), version, *m_config.schema, [=](__unused Group *group, __unused Schema &target_schema) {
|
|
|
|
m_config.migration_function(old_realm, updated_realm);
|
|
|
|
});
|
|
|
|
commit_transaction();
|
|
|
|
}
|
|
|
|
else {
|
2015-07-28 18:25:04 +00:00
|
|
|
ObjectStore::verify_schema(read_group(), *m_config.schema, m_config.read_only);
|
2015-06-22 17:32:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (...) {
|
|
|
|
if (is_in_transaction()) {
|
|
|
|
cancel_transaction();
|
|
|
|
}
|
2015-07-27 19:42:55 +00:00
|
|
|
m_config.schema_version = old_config.schema_version;
|
|
|
|
m_config.schema = std::move(old_config.schema);
|
2015-06-22 17:32:31 +00:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
return changed;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void check_read_write(Realm *realm)
|
|
|
|
{
|
2015-06-18 23:04:41 +00:00
|
|
|
if (realm->config().read_only) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw InvalidTransactionException("Can't perform transactions on read-only Realms.");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-22 17:32:31 +00:00
|
|
|
void Realm::verify_thread()
|
|
|
|
{
|
2015-07-20 23:11:15 +00:00
|
|
|
if (m_thread_id != std::this_thread::get_id()) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw IncorrectThreadException("Realm accessed from incorrect thread.");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Realm::begin_transaction()
|
|
|
|
{
|
|
|
|
check_read_write(this);
|
|
|
|
verify_thread();
|
|
|
|
|
|
|
|
if (m_in_transaction) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw InvalidTransactionException("The Realm is already in a write transaction");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// if the upgrade to write will move the transaction forward, announce the change after promoting
|
|
|
|
bool announce = m_shared_group->has_changed();
|
|
|
|
|
|
|
|
// make sure we have a read transaction
|
|
|
|
read_group();
|
|
|
|
|
2015-07-20 18:53:21 +00:00
|
|
|
LangBindHelper::promote_to_write(*m_shared_group, *m_history);
|
2015-06-18 23:04:41 +00:00
|
|
|
m_in_transaction = true;
|
|
|
|
|
|
|
|
if (announce) {
|
|
|
|
send_local_notifications(DidChangeNotification);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Realm::commit_transaction()
|
|
|
|
{
|
|
|
|
check_read_write(this);
|
|
|
|
verify_thread();
|
|
|
|
|
|
|
|
if (!m_in_transaction) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw InvalidTransactionException("Can't commit a non-existing write transaction");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
LangBindHelper::commit_and_continue_as_read(*m_shared_group);
|
|
|
|
m_in_transaction = false;
|
|
|
|
|
|
|
|
send_external_notifications();
|
|
|
|
send_local_notifications(DidChangeNotification);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Realm::cancel_transaction()
|
|
|
|
{
|
|
|
|
check_read_write(this);
|
|
|
|
verify_thread();
|
|
|
|
|
|
|
|
if (!m_in_transaction) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw InvalidTransactionException("Can't cancel a non-existing write transaction");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
2015-07-20 18:53:21 +00:00
|
|
|
LangBindHelper::rollback_and_continue_as_read(*m_shared_group, *m_history);
|
2015-06-18 23:04:41 +00:00
|
|
|
m_in_transaction = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Realm::invalidate()
|
|
|
|
{
|
|
|
|
verify_thread();
|
|
|
|
check_read_write(this);
|
|
|
|
|
|
|
|
if (m_in_transaction) {
|
|
|
|
cancel_transaction();
|
|
|
|
}
|
|
|
|
if (!m_group) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
m_shared_group->end_read();
|
|
|
|
m_group = nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Realm::compact()
|
|
|
|
{
|
|
|
|
verify_thread();
|
|
|
|
|
|
|
|
bool success = false;
|
|
|
|
if (m_in_transaction) {
|
2015-07-27 19:42:55 +00:00
|
|
|
throw InvalidTransactionException("Can't compact a Realm within a write transaction");
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for (auto &object_schema : *m_config.schema) {
|
2015-07-27 19:42:55 +00:00
|
|
|
ObjectStore::table_for_object_type(read_group(), object_schema.first)->optimize();
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
m_shared_group->end_read();
|
|
|
|
success = m_shared_group->compact();
|
|
|
|
m_shared_group->begin_read();
|
|
|
|
|
|
|
|
return success;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Realm::notify()
|
|
|
|
{
|
|
|
|
verify_thread();
|
|
|
|
|
|
|
|
if (m_shared_group->has_changed()) { // Throws
|
|
|
|
if (m_auto_refresh) {
|
|
|
|
if (m_group) {
|
2015-07-20 18:53:21 +00:00
|
|
|
LangBindHelper::advance_read(*m_shared_group, *m_history);
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
send_local_notifications(DidChangeNotification);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
send_local_notifications(RefreshRequiredNotification);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-20 23:11:15 +00:00
|
|
|
void Realm::send_local_notifications(const std::string &type)
|
2015-06-18 23:04:41 +00:00
|
|
|
{
|
|
|
|
verify_thread();
|
|
|
|
for (NotificationFunction notification : m_notifications) {
|
|
|
|
(*notification)(type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool Realm::refresh()
|
|
|
|
{
|
|
|
|
verify_thread();
|
|
|
|
check_read_write(this);
|
|
|
|
|
|
|
|
// can't be any new changes if we're in a write transaction
|
|
|
|
if (m_in_transaction) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// advance transaction if database has changed
|
|
|
|
if (!m_shared_group->has_changed()) { // Throws
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m_group) {
|
2015-07-20 18:53:21 +00:00
|
|
|
LangBindHelper::advance_read(*m_shared_group, *m_history);
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
// Create the read transaction
|
|
|
|
read_group();
|
|
|
|
}
|
|
|
|
|
|
|
|
send_local_notifications(DidChangeNotification);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
SharedRealm RealmCache::get_realm(const std::string &path, std::thread::id thread_id)
|
|
|
|
{
|
2015-07-20 23:11:15 +00:00
|
|
|
std::lock_guard<std::mutex> lock(m_mutex);
|
2015-06-18 23:04:41 +00:00
|
|
|
|
|
|
|
auto path_iter = m_cache.find(path);
|
|
|
|
if (path_iter == m_cache.end()) {
|
|
|
|
return SharedRealm();
|
|
|
|
}
|
|
|
|
|
|
|
|
auto thread_iter = path_iter->second.find(thread_id);
|
|
|
|
if (thread_iter == path_iter->second.end()) {
|
|
|
|
return SharedRealm();
|
|
|
|
}
|
|
|
|
|
|
|
|
return thread_iter->second.lock();
|
|
|
|
}
|
|
|
|
|
|
|
|
SharedRealm RealmCache::get_any_realm(const std::string &path)
|
|
|
|
{
|
2015-07-20 23:11:15 +00:00
|
|
|
std::lock_guard<std::mutex> lock(m_mutex);
|
2015-06-18 23:04:41 +00:00
|
|
|
|
|
|
|
auto path_iter = m_cache.find(path);
|
|
|
|
if (path_iter == m_cache.end()) {
|
|
|
|
return SharedRealm();
|
|
|
|
}
|
|
|
|
|
2015-08-12 18:07:06 +00:00
|
|
|
auto thread_iter = path_iter->second.begin();
|
|
|
|
while (thread_iter != path_iter->second.end()) {
|
2015-06-18 23:04:41 +00:00
|
|
|
if (auto realm = thread_iter->second.lock()) {
|
|
|
|
return realm;
|
|
|
|
}
|
2015-08-12 18:07:06 +00:00
|
|
|
path_iter->second.erase(thread_iter++);
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return SharedRealm();
|
|
|
|
}
|
|
|
|
|
|
|
|
void RealmCache::remove(const std::string &path, std::thread::id thread_id)
|
|
|
|
{
|
2015-07-20 23:11:15 +00:00
|
|
|
std::lock_guard<std::mutex> lock(m_mutex);
|
2015-06-18 23:04:41 +00:00
|
|
|
|
|
|
|
auto path_iter = m_cache.find(path);
|
|
|
|
if (path_iter == m_cache.end()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto thread_iter = path_iter->second.find(thread_id);
|
2015-07-27 19:42:55 +00:00
|
|
|
if (thread_iter != path_iter->second.end()) {
|
2015-06-18 23:04:41 +00:00
|
|
|
path_iter->second.erase(thread_iter);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (path_iter->second.size() == 0) {
|
|
|
|
m_cache.erase(path_iter);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void RealmCache::cache_realm(SharedRealm &realm, std::thread::id thread_id)
|
|
|
|
{
|
2015-07-20 23:11:15 +00:00
|
|
|
std::lock_guard<std::mutex> lock(m_mutex);
|
2015-06-18 23:04:41 +00:00
|
|
|
|
|
|
|
auto path_iter = m_cache.find(realm->config().path);
|
|
|
|
if (path_iter == m_cache.end()) {
|
2015-07-20 23:11:15 +00:00
|
|
|
m_cache.emplace(realm->config().path, std::map<std::thread::id, WeakRealm>{{thread_id, realm}});
|
2015-06-18 23:04:41 +00:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
path_iter->second.emplace(thread_id, realm);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-12 19:02:56 +00:00
|
|
|
void RealmCache::clear()
|
|
|
|
{
|
|
|
|
std::lock_guard<std::mutex> lock(m_mutex);
|
|
|
|
|
|
|
|
m_cache.clear();
|
|
|
|
}
|
|
|
|
|