realm-js/shared_realm.cpp

405 lines
12 KiB
C++
Raw Normal View History

2015-06-18 23:04:41 +00:00
////////////////////////////////////////////////////////////////////////////
//
// Copyright 2015 Realm Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////
#include "shared_realm.hpp"
2015-08-10 17:49:59 +00:00
#include <realm/group_shared.hpp>
#include <realm/lang_bind_helper.hpp>
2015-06-18 23:04:41 +00:00
#include <realm/commit_log.hpp>
2015-07-27 19:42:55 +00:00
#include <memory>
2015-06-18 23:04:41 +00:00
using namespace realm;
RealmCache Realm::s_global_cache;
2015-07-20 23:11:15 +00:00
std::mutex Realm::s_init_mutex;
2015-06-18 23:04:41 +00:00
Realm::Config::Config(const Config& c) : path(c.path), read_only(c.read_only), in_memory(c.in_memory), schema_version(c.schema_version), encryption_key(c.encryption_key), migration_function(c.migration_function)
{
if (c.schema) {
2015-07-27 19:42:55 +00:00
schema = std::make_unique<Schema>(*c.schema);
2015-06-18 23:04:41 +00:00
}
}
2015-07-20 23:11:15 +00:00
Realm::Realm(Config &config) : m_config(config), m_thread_id(std::this_thread::get_id()), m_auto_refresh(true), m_in_transaction(false)
2015-06-18 23:04:41 +00:00
{
try {
if (config.read_only) {
2015-07-20 23:11:15 +00:00
m_read_only_group = std::make_unique<Group>(config.path, config.encryption_key.data(), Group::mode_ReadOnly);
2015-06-18 23:04:41 +00:00
m_group = m_read_only_group.get();
}
else {
2015-07-20 18:53:21 +00:00
m_history = realm::make_client_history(config.path, config.encryption_key.data());
2015-06-18 23:04:41 +00:00
SharedGroup::DurabilityLevel durability = config.in_memory ? SharedGroup::durability_MemOnly :
SharedGroup::durability_Full;
2015-07-20 23:11:15 +00:00
m_shared_group = std::make_unique<SharedGroup>(*m_history, durability, config.encryption_key.data());
2015-06-18 23:04:41 +00:00
m_group = nullptr;
}
}
catch (util::File::PermissionDenied const& ex) {
2015-07-27 19:42:55 +00:00
throw RealmFileException(RealmFileException::Kind::PermissionDenied, "Unable to open a realm at path '" + config.path +
2015-06-18 23:04:41 +00:00
"'. Please use a path where your app has " + (config.read_only ? "read" : "read-write") + " permissions.");
}
catch (util::File::Exists const& ex) {
2015-07-27 19:42:55 +00:00
throw RealmFileException(RealmFileException::Kind::Exists, "Unable to open a realm at path '" + config.path + "'");
2015-06-18 23:04:41 +00:00
}
catch (util::File::AccessError const& ex) {
2015-07-27 19:42:55 +00:00
throw RealmFileException(RealmFileException::Kind::AccessError, "Unable to open a realm at path '" + config.path + "'");
2015-06-18 23:04:41 +00:00
}
catch (IncompatibleLockFile const&) {
2015-07-27 19:42:55 +00:00
throw RealmFileException(RealmFileException::Kind::IncompatibleLockFile, "Realm file is currently open in another process "
2015-06-18 23:04:41 +00:00
"which cannot share access with this process. All processes sharing a single file must be the same architecture.");
}
}
2015-07-27 19:42:55 +00:00
Group *Realm::read_group()
{
2015-06-18 23:04:41 +00:00
if (!m_group) {
m_group = &const_cast<Group&>(m_shared_group->begin_read());
}
return m_group;
}
SharedRealm Realm::get_shared_realm(Config &config)
{
SharedRealm realm = s_global_cache.get_realm(config.path);
if (realm) {
if (realm->config().read_only != config.read_only) {
2015-07-27 19:42:55 +00:00
throw MismatchedConfigException("Realm at path already opened with different read permissions.");
2015-06-18 23:04:41 +00:00
}
if (realm->config().in_memory != config.in_memory) {
2015-07-27 19:42:55 +00:00
throw MismatchedConfigException("Realm at path already opened with different inMemory settings.");
2015-06-18 23:04:41 +00:00
}
2015-07-27 19:42:55 +00:00
if (realm->config().encryption_key != config.encryption_key) {
throw MismatchedConfigException("Realm at path already opened with a different encryption key.");
}
if (realm->config().schema_version != config.schema_version && config.schema_version != ObjectStore::NotVersioned) {
throw MismatchedConfigException("Realm at path already opened with different schema version.");
}
// FIXME - enable schma comparison
/*if (realm->config().schema != config.schema) {
throw MismatchedConfigException("Realm at path already opened with different schema");
}*/
realm->m_config.migration_function = config.migration_function;
2015-06-18 23:04:41 +00:00
return realm;
}
realm = SharedRealm(new Realm(config));
2015-06-18 23:04:41 +00:00
// we want to ensure we are only initializing a single realm at a time
2015-07-20 23:11:15 +00:00
std::lock_guard<std::mutex> lock(s_init_mutex);
2015-06-18 23:04:41 +00:00
2015-07-28 18:25:04 +00:00
uint64_t old_version = ObjectStore::get_schema_version(realm->read_group());
if (auto existing = s_global_cache.get_any_realm(realm->config().path)) {
// if there is an existing realm at the current path steal its schema/column mapping
// FIXME - need to validate that schemas match
realm->m_config.schema = std::make_unique<Schema>(*existing->m_config.schema);
}
else if (!realm->m_config.schema) {
2015-06-18 23:04:41 +00:00
// get schema from group and skip validation
2015-07-28 18:25:04 +00:00
realm->m_config.schema_version = old_version;
2015-07-27 19:42:55 +00:00
realm->m_config.schema = std::make_unique<Schema>(ObjectStore::schema_from_group(realm->read_group()));
2015-06-18 23:04:41 +00:00
}
2015-07-28 18:25:04 +00:00
else if (realm->m_config.read_only) {
if (old_version == ObjectStore::NotVersioned) {
throw UnitializedRealmException("Can't open an un-initizliazed Realm without a Schema");
2015-06-18 23:04:41 +00:00
}
2015-07-28 18:25:04 +00:00
ObjectStore::verify_schema(realm->read_group(), *realm->m_config.schema, true);
2015-06-18 23:04:41 +00:00
}
else {
// its a non-cached realm so update/migrate if needed
2015-07-28 18:25:04 +00:00
realm->update_schema(*realm->m_config.schema, realm->m_config.schema_version);
2015-06-18 23:04:41 +00:00
}
s_global_cache.cache_realm(realm, realm->m_thread_id);
return realm;
}
2015-07-27 19:42:55 +00:00
bool Realm::update_schema(Schema &schema, uint64_t version)
{
bool changed = false;
2015-07-27 19:42:55 +00:00
Config old_config(m_config);
// set new version/schema
if (m_config.schema.get() != &schema) {
m_config.schema = std::make_unique<Schema>(schema);
}
m_config.schema_version = version;
try {
2015-07-28 18:25:04 +00:00
if (!m_config.read_only && ObjectStore::realm_requires_update(read_group(), version, schema)) {
2015-07-27 19:42:55 +00:00
// keep old copy to pass to migration function
old_config.read_only = true;
SharedRealm old_realm = SharedRealm(new Realm(old_config)), updated_realm = shared_from_this();
// update and migrate
begin_transaction();
changed = ObjectStore::update_realm_with_schema(read_group(), version, *m_config.schema, [=](__unused Group *group, __unused Schema &target_schema) {
m_config.migration_function(old_realm, updated_realm);
});
commit_transaction();
}
else {
2015-07-28 18:25:04 +00:00
ObjectStore::verify_schema(read_group(), *m_config.schema, m_config.read_only);
}
}
catch (...) {
if (is_in_transaction()) {
cancel_transaction();
}
2015-07-27 19:42:55 +00:00
m_config.schema_version = old_config.schema_version;
m_config.schema = std::move(old_config.schema);
throw;
}
return changed;
}
static void check_read_write(Realm *realm)
{
2015-06-18 23:04:41 +00:00
if (realm->config().read_only) {
2015-07-27 19:42:55 +00:00
throw InvalidTransactionException("Can't perform transactions on read-only Realms.");
2015-06-18 23:04:41 +00:00
}
}
void Realm::verify_thread()
{
2015-07-20 23:11:15 +00:00
if (m_thread_id != std::this_thread::get_id()) {
2015-07-27 19:42:55 +00:00
throw IncorrectThreadException("Realm accessed from incorrect thread.");
2015-06-18 23:04:41 +00:00
}
}
void Realm::begin_transaction()
{
check_read_write(this);
verify_thread();
if (m_in_transaction) {
2015-07-27 19:42:55 +00:00
throw InvalidTransactionException("The Realm is already in a write transaction");
2015-06-18 23:04:41 +00:00
}
// if the upgrade to write will move the transaction forward, announce the change after promoting
bool announce = m_shared_group->has_changed();
// make sure we have a read transaction
read_group();
2015-07-20 18:53:21 +00:00
LangBindHelper::promote_to_write(*m_shared_group, *m_history);
2015-06-18 23:04:41 +00:00
m_in_transaction = true;
if (announce) {
send_local_notifications(DidChangeNotification);
}
}
void Realm::commit_transaction()
{
check_read_write(this);
verify_thread();
if (!m_in_transaction) {
2015-07-27 19:42:55 +00:00
throw InvalidTransactionException("Can't commit a non-existing write transaction");
2015-06-18 23:04:41 +00:00
}
LangBindHelper::commit_and_continue_as_read(*m_shared_group);
m_in_transaction = false;
send_external_notifications();
send_local_notifications(DidChangeNotification);
}
void Realm::cancel_transaction()
{
check_read_write(this);
verify_thread();
if (!m_in_transaction) {
2015-07-27 19:42:55 +00:00
throw InvalidTransactionException("Can't cancel a non-existing write transaction");
2015-06-18 23:04:41 +00:00
}
2015-07-20 18:53:21 +00:00
LangBindHelper::rollback_and_continue_as_read(*m_shared_group, *m_history);
2015-06-18 23:04:41 +00:00
m_in_transaction = false;
}
void Realm::invalidate()
{
verify_thread();
check_read_write(this);
if (m_in_transaction) {
cancel_transaction();
}
if (!m_group) {
return;
}
m_shared_group->end_read();
m_group = nullptr;
}
bool Realm::compact()
{
verify_thread();
bool success = false;
if (m_in_transaction) {
2015-07-27 19:42:55 +00:00
throw InvalidTransactionException("Can't compact a Realm within a write transaction");
2015-06-18 23:04:41 +00:00
}
for (auto &object_schema : *m_config.schema) {
2015-07-27 19:42:55 +00:00
ObjectStore::table_for_object_type(read_group(), object_schema.first)->optimize();
2015-06-18 23:04:41 +00:00
}
m_shared_group->end_read();
success = m_shared_group->compact();
m_shared_group->begin_read();
return success;
}
void Realm::notify()
{
verify_thread();
if (m_shared_group->has_changed()) { // Throws
if (m_auto_refresh) {
if (m_group) {
2015-07-20 18:53:21 +00:00
LangBindHelper::advance_read(*m_shared_group, *m_history);
2015-06-18 23:04:41 +00:00
}
send_local_notifications(DidChangeNotification);
}
else {
send_local_notifications(RefreshRequiredNotification);
}
}
}
2015-07-20 23:11:15 +00:00
void Realm::send_local_notifications(const std::string &type)
2015-06-18 23:04:41 +00:00
{
verify_thread();
for (NotificationFunction notification : m_notifications) {
(*notification)(type);
}
}
bool Realm::refresh()
{
verify_thread();
check_read_write(this);
// can't be any new changes if we're in a write transaction
if (m_in_transaction) {
return false;
}
// advance transaction if database has changed
if (!m_shared_group->has_changed()) { // Throws
return false;
}
if (m_group) {
2015-07-20 18:53:21 +00:00
LangBindHelper::advance_read(*m_shared_group, *m_history);
2015-06-18 23:04:41 +00:00
}
else {
// Create the read transaction
read_group();
}
send_local_notifications(DidChangeNotification);
return true;
}
SharedRealm RealmCache::get_realm(const std::string &path, std::thread::id thread_id)
{
2015-07-20 23:11:15 +00:00
std::lock_guard<std::mutex> lock(m_mutex);
2015-06-18 23:04:41 +00:00
auto path_iter = m_cache.find(path);
if (path_iter == m_cache.end()) {
return SharedRealm();
}
auto thread_iter = path_iter->second.find(thread_id);
if (thread_iter == path_iter->second.end()) {
return SharedRealm();
}
return thread_iter->second.lock();
}
SharedRealm RealmCache::get_any_realm(const std::string &path)
{
2015-07-20 23:11:15 +00:00
std::lock_guard<std::mutex> lock(m_mutex);
2015-06-18 23:04:41 +00:00
auto path_iter = m_cache.find(path);
if (path_iter == m_cache.end()) {
return SharedRealm();
}
auto thread_iter = path_iter->second.begin();
while (thread_iter != path_iter->second.end()) {
2015-06-18 23:04:41 +00:00
if (auto realm = thread_iter->second.lock()) {
return realm;
}
path_iter->second.erase(thread_iter++);
2015-06-18 23:04:41 +00:00
}
return SharedRealm();
}
void RealmCache::remove(const std::string &path, std::thread::id thread_id)
{
2015-07-20 23:11:15 +00:00
std::lock_guard<std::mutex> lock(m_mutex);
2015-06-18 23:04:41 +00:00
auto path_iter = m_cache.find(path);
if (path_iter == m_cache.end()) {
return;
}
auto thread_iter = path_iter->second.find(thread_id);
2015-07-27 19:42:55 +00:00
if (thread_iter != path_iter->second.end()) {
2015-06-18 23:04:41 +00:00
path_iter->second.erase(thread_iter);
}
if (path_iter->second.size() == 0) {
m_cache.erase(path_iter);
}
}
void RealmCache::cache_realm(SharedRealm &realm, std::thread::id thread_id)
{
2015-07-20 23:11:15 +00:00
std::lock_guard<std::mutex> lock(m_mutex);
2015-06-18 23:04:41 +00:00
auto path_iter = m_cache.find(realm->config().path);
if (path_iter == m_cache.end()) {
2015-07-20 23:11:15 +00:00
m_cache.emplace(realm->config().path, std::map<std::thread::id, WeakRealm>{{thread_id, realm}});
2015-06-18 23:04:41 +00:00
}
else {
path_iter->second.emplace(thread_id, realm);
}
}
2015-08-12 19:02:56 +00:00
void RealmCache::clear()
{
std::lock_guard<std::mutex> lock(m_mutex);
m_cache.clear();
}