342 lines
10 KiB
C++
342 lines
10 KiB
C++
|
////////////////////////////////////////////////////////////////////////////
|
||
|
//
|
||
|
// Copyright 2015 Realm Inc.
|
||
|
//
|
||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
// you may not use this file except in compliance with the License.
|
||
|
// You may obtain a copy of the License at
|
||
|
//
|
||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||
|
//
|
||
|
// Unless required by applicable law or agreed to in writing, software
|
||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
// See the License for the specific language governing permissions and
|
||
|
// limitations under the License.
|
||
|
//
|
||
|
////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
#include "shared_realm.hpp"
|
||
|
|
||
|
#include <realm/commit_log.hpp>
|
||
|
|
||
|
using namespace std;
|
||
|
using namespace realm;
|
||
|
|
||
|
RealmCache Realm::s_global_cache;
|
||
|
mutex Realm::s_init_mutex;
|
||
|
|
||
|
Realm::Config::Config(const Config& c) : path(c.path), read_only(c.read_only), in_memory(c.in_memory), schema_version(c.schema_version), encryption_key(c.encryption_key), migration_function(c.migration_function)
|
||
|
{
|
||
|
if (c.schema) {
|
||
|
schema = std::make_unique<ObjectStore::Schema>(*c.schema);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
Realm::Realm(Config &config) : m_config(config), m_thread_id(this_thread::get_id()), m_auto_refresh(true), m_in_transaction(false)
|
||
|
{
|
||
|
try {
|
||
|
if (config.read_only) {
|
||
|
m_read_only_group = make_unique<Group>(config.path, config.encryption_key.data(), Group::mode_ReadOnly);
|
||
|
m_group = m_read_only_group.get();
|
||
|
}
|
||
|
else {
|
||
|
m_replication = realm::makeWriteLogCollector(config.path, false, config.encryption_key.data());
|
||
|
SharedGroup::DurabilityLevel durability = config.in_memory ? SharedGroup::durability_MemOnly :
|
||
|
SharedGroup::durability_Full;
|
||
|
m_shared_group = make_unique<SharedGroup>(*m_replication, durability, config.encryption_key.data());
|
||
|
m_group = nullptr;
|
||
|
}
|
||
|
}
|
||
|
catch (util::File::PermissionDenied const& ex) {
|
||
|
throw RealmException(RealmException::Kind::FilePermissionDenied, "Unable to open a realm at path '" + config.path +
|
||
|
"'. Please use a path where your app has " + (config.read_only ? "read" : "read-write") + " permissions.");
|
||
|
}
|
||
|
catch (util::File::Exists const& ex) {
|
||
|
throw RealmException(RealmException::Kind::FileExists, "Unable to open a realm at path '" + config.path + "'");
|
||
|
}
|
||
|
catch (util::File::AccessError const& ex) {
|
||
|
throw RealmException(RealmException::Kind::FileAccessError, "Unable to open a realm at path '" + config.path + "'");
|
||
|
}
|
||
|
catch (IncompatibleLockFile const&) {
|
||
|
throw RealmException(RealmException::Kind::IncompatibleLockFile, "Realm file is currently open in another process "
|
||
|
"which cannot share access with this process. All processes sharing a single file must be the same architecture.");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
Group *Realm::read_group() {
|
||
|
if (!m_group) {
|
||
|
m_group = &const_cast<Group&>(m_shared_group->begin_read());
|
||
|
}
|
||
|
return m_group;
|
||
|
}
|
||
|
|
||
|
SharedRealm Realm::get_shared_realm(Config &config)
|
||
|
{
|
||
|
SharedRealm realm = s_global_cache.get_realm(config.path);
|
||
|
if (realm) {
|
||
|
if (realm->config().read_only != config.read_only) {
|
||
|
throw RealmException(RealmException::Kind::MismatchedConfig, "Realm at path already opened with different read permissions");
|
||
|
}
|
||
|
if (realm->config().in_memory != config.in_memory) {
|
||
|
throw RealmException(RealmException::Kind::MismatchedConfig, "Realm at path already opened with different inMemory settings");
|
||
|
}
|
||
|
return realm;
|
||
|
}
|
||
|
|
||
|
realm = make_shared<Realm>(config);
|
||
|
|
||
|
// we want to ensure we are only initializing a single realm at a time
|
||
|
lock_guard<mutex> lock(s_init_mutex);
|
||
|
|
||
|
if (!config.schema) {
|
||
|
// get schema from group and skip validation
|
||
|
realm->m_config.schema = make_unique<ObjectStore::Schema>(ObjectStore::schema_from_group(realm->read_group()));
|
||
|
}
|
||
|
else if (config.read_only) {
|
||
|
// for read-only validate all existing tables
|
||
|
for (auto &object_schema : *realm->m_config.schema) {
|
||
|
if (ObjectStore::table_for_object_type(realm->read_group(), object_schema.name)) {
|
||
|
ObjectStore::validate_object_schema(realm->read_group(), object_schema);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
else if(auto existing = s_global_cache.get_any_realm(realm->config().path)) {
|
||
|
// if there is an existing realm at the current path steal its schema/column mapping
|
||
|
// FIXME - need to validate that schemas match
|
||
|
realm->m_config.schema = make_unique<ObjectStore::Schema>(*existing->m_config.schema);
|
||
|
}
|
||
|
else {
|
||
|
// its a new realm so update/migrate if needed
|
||
|
ObjectStore::update_realm_with_schema(realm->read_group(), config.schema_version, *realm->m_config.schema, realm->m_config.migration_function);
|
||
|
}
|
||
|
|
||
|
s_global_cache.cache_realm(realm, realm->m_thread_id);
|
||
|
return realm;
|
||
|
}
|
||
|
|
||
|
static void check_read_write(Realm *realm) {
|
||
|
if (realm->config().read_only) {
|
||
|
throw RealmException(RealmException::Kind::InvalidTransaction, "Can't perform transactions on read-only Realms.");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void Realm::verify_thread() {
|
||
|
if (m_thread_id != this_thread::get_id()) {
|
||
|
throw RealmException(RealmException::Kind::IncorrectThread, "Realm accessed from incorrect thread.");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void Realm::begin_transaction()
|
||
|
{
|
||
|
check_read_write(this);
|
||
|
verify_thread();
|
||
|
|
||
|
if (m_in_transaction) {
|
||
|
throw RealmException(RealmException::Kind::InvalidTransaction, "The Realm is already in a write transaction");
|
||
|
}
|
||
|
|
||
|
// if the upgrade to write will move the transaction forward, announce the change after promoting
|
||
|
bool announce = m_shared_group->has_changed();
|
||
|
|
||
|
// make sure we have a read transaction
|
||
|
read_group();
|
||
|
|
||
|
LangBindHelper::promote_to_write(*m_shared_group);
|
||
|
m_in_transaction = true;
|
||
|
|
||
|
if (announce) {
|
||
|
send_local_notifications(DidChangeNotification);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void Realm::commit_transaction()
|
||
|
{
|
||
|
check_read_write(this);
|
||
|
verify_thread();
|
||
|
|
||
|
if (!m_in_transaction) {
|
||
|
throw RealmException(RealmException::Kind::InvalidTransaction, "Can't commit a non-existing write transaction");
|
||
|
}
|
||
|
|
||
|
LangBindHelper::commit_and_continue_as_read(*m_shared_group);
|
||
|
m_in_transaction = false;
|
||
|
|
||
|
send_external_notifications();
|
||
|
send_local_notifications(DidChangeNotification);
|
||
|
}
|
||
|
|
||
|
void Realm::cancel_transaction()
|
||
|
{
|
||
|
check_read_write(this);
|
||
|
verify_thread();
|
||
|
|
||
|
if (!m_in_transaction) {
|
||
|
throw RealmException(RealmException::Kind::InvalidTransaction, "Can't cancel a non-existing write transaction");
|
||
|
}
|
||
|
|
||
|
LangBindHelper::rollback_and_continue_as_read(*m_shared_group);
|
||
|
m_in_transaction = false;
|
||
|
}
|
||
|
|
||
|
|
||
|
void Realm::invalidate()
|
||
|
{
|
||
|
verify_thread();
|
||
|
check_read_write(this);
|
||
|
|
||
|
if (m_in_transaction) {
|
||
|
cancel_transaction();
|
||
|
}
|
||
|
if (!m_group) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
m_shared_group->end_read();
|
||
|
m_group = nullptr;
|
||
|
}
|
||
|
|
||
|
bool Realm::compact()
|
||
|
{
|
||
|
verify_thread();
|
||
|
|
||
|
bool success = false;
|
||
|
if (m_in_transaction) {
|
||
|
throw RealmException(RealmException::Kind::InvalidTransaction, "Can't compact a Realm within a write transaction");
|
||
|
}
|
||
|
|
||
|
for (auto &object_schema : *m_config.schema) {
|
||
|
ObjectStore::table_for_object_type(read_group(), object_schema.name)->optimize();
|
||
|
}
|
||
|
|
||
|
m_shared_group->end_read();
|
||
|
success = m_shared_group->compact();
|
||
|
m_shared_group->begin_read();
|
||
|
|
||
|
return success;
|
||
|
}
|
||
|
|
||
|
void Realm::notify()
|
||
|
{
|
||
|
verify_thread();
|
||
|
|
||
|
if (m_shared_group->has_changed()) { // Throws
|
||
|
if (m_auto_refresh) {
|
||
|
if (m_group) {
|
||
|
LangBindHelper::advance_read(*m_shared_group);
|
||
|
}
|
||
|
send_local_notifications(DidChangeNotification);
|
||
|
}
|
||
|
else {
|
||
|
send_local_notifications(RefreshRequiredNotification);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
|
||
|
void Realm::send_local_notifications(const string &type)
|
||
|
{
|
||
|
verify_thread();
|
||
|
for (NotificationFunction notification : m_notifications) {
|
||
|
(*notification)(type);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
|
||
|
bool Realm::refresh()
|
||
|
{
|
||
|
verify_thread();
|
||
|
check_read_write(this);
|
||
|
|
||
|
// can't be any new changes if we're in a write transaction
|
||
|
if (m_in_transaction) {
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
// advance transaction if database has changed
|
||
|
if (!m_shared_group->has_changed()) { // Throws
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
if (m_group) {
|
||
|
LangBindHelper::advance_read(*m_shared_group);
|
||
|
}
|
||
|
else {
|
||
|
// Create the read transaction
|
||
|
read_group();
|
||
|
}
|
||
|
|
||
|
send_local_notifications(DidChangeNotification);
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
SharedRealm RealmCache::get_realm(const std::string &path, std::thread::id thread_id)
|
||
|
{
|
||
|
lock_guard<mutex> lock(m_mutex);
|
||
|
|
||
|
auto path_iter = m_cache.find(path);
|
||
|
if (path_iter == m_cache.end()) {
|
||
|
return SharedRealm();
|
||
|
}
|
||
|
|
||
|
auto thread_iter = path_iter->second.find(thread_id);
|
||
|
if (thread_iter == path_iter->second.end()) {
|
||
|
return SharedRealm();
|
||
|
}
|
||
|
|
||
|
return thread_iter->second.lock();
|
||
|
}
|
||
|
|
||
|
SharedRealm RealmCache::get_any_realm(const std::string &path)
|
||
|
{
|
||
|
lock_guard<mutex> lock(m_mutex);
|
||
|
|
||
|
auto path_iter = m_cache.find(path);
|
||
|
if (path_iter == m_cache.end()) {
|
||
|
return SharedRealm();
|
||
|
}
|
||
|
|
||
|
for (auto thread_iter = path_iter->second.begin(); thread_iter != path_iter->second.end(); thread_iter++) {
|
||
|
if (auto realm = thread_iter->second.lock()) {
|
||
|
return realm;
|
||
|
}
|
||
|
path_iter->second.erase(thread_iter);
|
||
|
}
|
||
|
|
||
|
return SharedRealm();
|
||
|
}
|
||
|
|
||
|
void RealmCache::remove(const std::string &path, std::thread::id thread_id)
|
||
|
{
|
||
|
lock_guard<mutex> lock(m_mutex);
|
||
|
|
||
|
auto path_iter = m_cache.find(path);
|
||
|
if (path_iter == m_cache.end()) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
auto thread_iter = path_iter->second.find(thread_id);
|
||
|
if (thread_iter == path_iter->second.end()) {
|
||
|
path_iter->second.erase(thread_iter);
|
||
|
}
|
||
|
|
||
|
if (path_iter->second.size() == 0) {
|
||
|
m_cache.erase(path_iter);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void RealmCache::cache_realm(SharedRealm &realm, std::thread::id thread_id)
|
||
|
{
|
||
|
lock_guard<mutex> lock(m_mutex);
|
||
|
|
||
|
auto path_iter = m_cache.find(realm->config().path);
|
||
|
if (path_iter == m_cache.end()) {
|
||
|
m_cache.emplace(realm->config().path, map<std::thread::id, WeakRealm>{{thread_id, realm}});
|
||
|
}
|
||
|
else {
|
||
|
path_iter->second.emplace(thread_id, realm);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
|