mirror of
https://github.com/denoland/deno.git
synced 2024-11-21 20:38:55 +00:00
231 lines
6.8 KiB
Rust
231 lines
6.8 KiB
Rust
// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license.
|
|
|
|
use std::borrow::Cow;
|
|
use std::cell::RefCell;
|
|
use std::collections::HashMap;
|
|
use std::env::current_dir;
|
|
use std::io::ErrorKind;
|
|
use std::marker::PhantomData;
|
|
use std::path::Path;
|
|
use std::path::PathBuf;
|
|
use std::rc::Rc;
|
|
use std::sync::Arc;
|
|
use std::sync::Mutex;
|
|
use std::sync::OnceLock;
|
|
|
|
use crate::DatabaseHandler;
|
|
use async_trait::async_trait;
|
|
use deno_core::error::type_error;
|
|
use deno_core::error::AnyError;
|
|
use deno_core::unsync::spawn_blocking;
|
|
use deno_core::OpState;
|
|
use deno_path_util::normalize_path;
|
|
use deno_permissions::PermissionCheckError;
|
|
pub use denokv_sqlite::SqliteBackendError;
|
|
use denokv_sqlite::SqliteConfig;
|
|
use denokv_sqlite::SqliteNotifier;
|
|
use rand::SeedableRng;
|
|
use rusqlite::OpenFlags;
|
|
|
|
static SQLITE_NOTIFIERS_MAP: OnceLock<Mutex<HashMap<PathBuf, SqliteNotifier>>> =
|
|
OnceLock::new();
|
|
|
|
pub struct SqliteDbHandler<P: SqliteDbHandlerPermissions + 'static> {
|
|
pub default_storage_dir: Option<PathBuf>,
|
|
versionstamp_rng_seed: Option<u64>,
|
|
_permissions: PhantomData<P>,
|
|
}
|
|
|
|
pub trait SqliteDbHandlerPermissions {
|
|
#[must_use = "the resolved return value to mitigate time-of-check to time-of-use issues"]
|
|
fn check_read(
|
|
&mut self,
|
|
p: &str,
|
|
api_name: &str,
|
|
) -> Result<PathBuf, PermissionCheckError>;
|
|
#[must_use = "the resolved return value to mitigate time-of-check to time-of-use issues"]
|
|
fn check_write<'a>(
|
|
&mut self,
|
|
p: &'a Path,
|
|
api_name: &str,
|
|
) -> Result<Cow<'a, Path>, PermissionCheckError>;
|
|
}
|
|
|
|
impl SqliteDbHandlerPermissions for deno_permissions::PermissionsContainer {
|
|
#[inline(always)]
|
|
fn check_read(
|
|
&mut self,
|
|
p: &str,
|
|
api_name: &str,
|
|
) -> Result<PathBuf, PermissionCheckError> {
|
|
deno_permissions::PermissionsContainer::check_read(self, p, api_name)
|
|
}
|
|
|
|
#[inline(always)]
|
|
fn check_write<'a>(
|
|
&mut self,
|
|
p: &'a Path,
|
|
api_name: &str,
|
|
) -> Result<Cow<'a, Path>, PermissionCheckError> {
|
|
deno_permissions::PermissionsContainer::check_write_path(self, p, api_name)
|
|
}
|
|
}
|
|
|
|
impl<P: SqliteDbHandlerPermissions> SqliteDbHandler<P> {
|
|
pub fn new(
|
|
default_storage_dir: Option<PathBuf>,
|
|
versionstamp_rng_seed: Option<u64>,
|
|
) -> Self {
|
|
Self {
|
|
default_storage_dir,
|
|
versionstamp_rng_seed,
|
|
_permissions: PhantomData,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[async_trait(?Send)]
|
|
impl<P: SqliteDbHandlerPermissions> DatabaseHandler for SqliteDbHandler<P> {
|
|
type DB = denokv_sqlite::Sqlite;
|
|
|
|
async fn open(
|
|
&self,
|
|
state: Rc<RefCell<OpState>>,
|
|
path: Option<String>,
|
|
) -> Result<Self::DB, AnyError> {
|
|
#[must_use = "the resolved return value to mitigate time-of-check to time-of-use issues"]
|
|
fn validate_path<P: SqliteDbHandlerPermissions + 'static>(
|
|
state: &RefCell<OpState>,
|
|
path: Option<String>,
|
|
) -> Result<Option<String>, AnyError> {
|
|
let Some(path) = path else {
|
|
return Ok(None);
|
|
};
|
|
if path == ":memory:" {
|
|
return Ok(Some(path));
|
|
}
|
|
if path.is_empty() {
|
|
return Err(type_error("Filename cannot be empty"));
|
|
}
|
|
if path.starts_with(':') {
|
|
return Err(type_error(
|
|
"Filename cannot start with ':' unless prefixed with './'",
|
|
));
|
|
}
|
|
{
|
|
let mut state = state.borrow_mut();
|
|
let permissions = state.borrow_mut::<P>();
|
|
let path = permissions.check_read(&path, "Deno.openKv")?;
|
|
let path = permissions.check_write(&path, "Deno.openKv")?;
|
|
Ok(Some(path.to_string_lossy().to_string()))
|
|
}
|
|
}
|
|
|
|
let path = validate_path::<P>(&state, path)?;
|
|
let default_storage_dir = self.default_storage_dir.clone();
|
|
type ConnGen =
|
|
Arc<dyn Fn() -> rusqlite::Result<rusqlite::Connection> + Send + Sync>;
|
|
let (conn_gen, notifier_key): (ConnGen, _) = spawn_blocking(move || {
|
|
denokv_sqlite::sqlite_retry_loop(|| {
|
|
let (conn, notifier_key) = match (path.as_deref(), &default_storage_dir)
|
|
{
|
|
(Some(":memory:"), _) | (None, None) => (
|
|
Arc::new(rusqlite::Connection::open_in_memory) as ConnGen,
|
|
None,
|
|
),
|
|
(Some(path), _) => {
|
|
let flags =
|
|
OpenFlags::default().difference(OpenFlags::SQLITE_OPEN_URI);
|
|
let resolved_path = canonicalize_path(&PathBuf::from(path))
|
|
.map_err(anyhow::Error::from)?;
|
|
let path = path.to_string();
|
|
(
|
|
Arc::new(move || {
|
|
rusqlite::Connection::open_with_flags(&path, flags)
|
|
}) as ConnGen,
|
|
Some(resolved_path),
|
|
)
|
|
}
|
|
(None, Some(path)) => {
|
|
std::fs::create_dir_all(path).map_err(anyhow::Error::from)?;
|
|
let path = path.join("kv.sqlite3");
|
|
let path2 = path.clone();
|
|
(
|
|
Arc::new(move || rusqlite::Connection::open(&path2)) as ConnGen,
|
|
Some(path),
|
|
)
|
|
}
|
|
};
|
|
|
|
Ok::<_, SqliteBackendError>((conn, notifier_key))
|
|
})
|
|
})
|
|
.await
|
|
.unwrap()?;
|
|
|
|
let notifier = if let Some(notifier_key) = notifier_key {
|
|
SQLITE_NOTIFIERS_MAP
|
|
.get_or_init(Default::default)
|
|
.lock()
|
|
.unwrap()
|
|
.entry(notifier_key)
|
|
.or_default()
|
|
.clone()
|
|
} else {
|
|
SqliteNotifier::default()
|
|
};
|
|
|
|
let versionstamp_rng_seed = self.versionstamp_rng_seed;
|
|
|
|
let config = SqliteConfig {
|
|
batch_timeout: None,
|
|
num_workers: 1,
|
|
};
|
|
|
|
denokv_sqlite::Sqlite::new(
|
|
move || {
|
|
let conn = conn_gen()?;
|
|
conn.pragma_update(None, "journal_mode", "wal")?;
|
|
Ok((
|
|
conn,
|
|
match versionstamp_rng_seed {
|
|
Some(seed) => Box::new(rand::rngs::StdRng::seed_from_u64(seed)),
|
|
None => Box::new(rand::rngs::StdRng::from_entropy()),
|
|
},
|
|
))
|
|
},
|
|
notifier,
|
|
config,
|
|
)
|
|
}
|
|
}
|
|
|
|
/// Same as Path::canonicalize, but also handles non-existing paths.
|
|
fn canonicalize_path(path: &Path) -> Result<PathBuf, AnyError> {
|
|
let path = normalize_path(path);
|
|
let mut path = path;
|
|
let mut names_stack = Vec::new();
|
|
loop {
|
|
match path.canonicalize() {
|
|
Ok(mut canonicalized_path) => {
|
|
for name in names_stack.into_iter().rev() {
|
|
canonicalized_path = canonicalized_path.join(name);
|
|
}
|
|
return Ok(canonicalized_path);
|
|
}
|
|
Err(err) if err.kind() == ErrorKind::NotFound => {
|
|
let file_name = path.file_name().map(|os_str| os_str.to_os_string());
|
|
if let Some(file_name) = file_name {
|
|
names_stack.push(file_name.to_str().unwrap().to_string());
|
|
path = path.parent().unwrap().to_path_buf();
|
|
} else {
|
|
names_stack.push(path.to_str().unwrap().to_string());
|
|
let current_dir = current_dir()?;
|
|
path.clone_from(¤t_dir);
|
|
}
|
|
}
|
|
Err(err) => return Err(err.into()),
|
|
}
|
|
}
|
|
}
|