2015-03-02 16:20:00 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "mozilla/dom/cache/DBSchema.h"
|
|
|
|
|
|
|
|
#include "ipc/IPCMessageUtils.h"
|
2016-05-15 20:32:09 +03:00
|
|
|
#include "mozilla/BasePrincipal.h"
|
|
|
|
#include "mozilla/dom/HeadersBinding.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "mozilla/dom/InternalHeaders.h"
|
2017-07-10 11:54:20 +03:00
|
|
|
#include "mozilla/dom/InternalResponse.h"
|
2016-05-15 20:32:09 +03:00
|
|
|
#include "mozilla/dom/RequestBinding.h"
|
|
|
|
#include "mozilla/dom/ResponseBinding.h"
|
2015-04-16 22:00:15 +03:00
|
|
|
#include "mozilla/dom/cache/CacheTypes.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "mozilla/dom/cache/SavedTypes.h"
|
2015-04-16 22:00:15 +03:00
|
|
|
#include "mozilla/dom/cache/Types.h"
|
|
|
|
#include "mozilla/dom/cache/TypeUtils.h"
|
2017-11-15 13:19:26 +03:00
|
|
|
#include "mozilla/net/MozURL.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "mozIStorageConnection.h"
|
|
|
|
#include "mozIStorageStatement.h"
|
2015-09-01 00:26:30 +03:00
|
|
|
#include "mozStorageHelper.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "nsCOMPtr.h"
|
2015-03-17 17:30:30 +03:00
|
|
|
#include "nsCRT.h"
|
|
|
|
#include "nsHttp.h"
|
2016-05-15 20:32:09 +03:00
|
|
|
#include "nsIContentPolicy.h"
|
2015-05-22 04:16:36 +03:00
|
|
|
#include "nsICryptoHash.h"
|
2015-07-06 08:55:00 +03:00
|
|
|
#include "nsNetCID.h"
|
2016-05-15 20:32:09 +03:00
|
|
|
#include "nsPrintfCString.h"
|
|
|
|
#include "nsTArray.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
namespace cache {
|
2015-04-16 22:00:16 +03:00
|
|
|
namespace db {
|
2015-09-01 00:26:30 +03:00
|
|
|
const int32_t kFirstShippedSchemaVersion = 15;
|
2015-04-16 22:00:16 +03:00
|
|
|
namespace {
|
2017-10-03 17:02:49 +03:00
|
|
|
// ## Firefox 57 Cache API v25/v26/v27 Schema Hack Info
|
|
|
|
// ### Overview
|
|
|
|
// In Firefox 57 we introduced Cache API schema version 26 and Quota Manager
|
|
|
|
// schema v3 to support tracking padding for opaque responses. Unfortunately,
|
|
|
|
// Firefox 57 is a big release that may potentially result in users downgrading
|
|
|
|
// to Firefox 56 due to 57 retiring add-ons. These schema changes have the
|
|
|
|
// unfortunate side-effect of causing QuotaManager and all its clients to break
|
|
|
|
// if the user downgrades to 56. In order to avoid making a bad situation
|
|
|
|
// worse, we're now retrofitting 57 so that Firefox 56 won't freak out.
|
|
|
|
//
|
|
|
|
// ### Implementation
|
|
|
|
// We're introducing a new schema version 27 that uses an on-disk schema version
|
|
|
|
// of v25. We differentiate v25 from v27 by the presence of the column added
|
|
|
|
// by v26. This translates to:
|
|
|
|
// - v25: on-disk schema=25, no "response_padding_size" column in table
|
|
|
|
// "entries".
|
|
|
|
// - v26: on-disk schema=26, yes "response_padding_size" column in table
|
|
|
|
// "entries".
|
|
|
|
// - v27: on-disk schema=25, yes "response_padding_size" column in table
|
|
|
|
// "entries".
|
|
|
|
//
|
|
|
|
// ### Fallout
|
|
|
|
// Firefox 57 is happy because it sees schema 27 and everything is as it
|
|
|
|
// expects.
|
|
|
|
//
|
|
|
|
// Firefox 56 non-DEBUG build is fine/happy, but DEBUG builds will not be.
|
|
|
|
// - Our QuotaClient will invoke `NS_WARNING("Unknown Cache file found!");`
|
|
|
|
// at QuotaManager init time. This is harmless but annoying and potentially
|
|
|
|
// misleading.
|
|
|
|
// - The DEBUG-only Validate() call will error out whenever an attempt is made
|
|
|
|
// to open a DOM Cache database because it will notice the schema is broken
|
|
|
|
// and there is no attempt at recovery.
|
|
|
|
//
|
|
|
|
const int32_t kHackyDowngradeSchemaVersion = 25;
|
|
|
|
const int32_t kHackyPaddingSizePresentVersion = 27;
|
|
|
|
//
|
2015-09-01 00:26:30 +03:00
|
|
|
// Update this whenever the DB schema is changed.
|
2017-10-03 17:02:49 +03:00
|
|
|
const int32_t kLatestSchemaVersion = 27;
|
2015-09-01 00:26:29 +03:00
|
|
|
// ---------
|
|
|
|
// The following constants define the SQL schema. These are defined in the
|
2015-09-01 00:26:30 +03:00
|
|
|
// same order the SQL should be executed in CreateOrMigrateSchema(). They are
|
|
|
|
// broken out as constants for convenient use in validation and migration.
|
2015-09-01 00:26:29 +03:00
|
|
|
// ---------
|
|
|
|
// The caches table is the single source of truth about what Cache
|
|
|
|
// objects exist for the origin. The contents of the Cache are stored
|
|
|
|
// in the entries table that references back to caches.
|
|
|
|
//
|
|
|
|
// The caches table is also referenced from storage. Rows in storage
|
|
|
|
// represent named Cache objects. There are cases, however, where
|
|
|
|
// a Cache can still exist, but not be in a named Storage. For example,
|
|
|
|
// when content is still using the Cache after CacheStorage::Delete()
|
|
|
|
// has been run.
|
|
|
|
//
|
|
|
|
// For now, the caches table mainly exists for data integrity with
|
|
|
|
// foreign keys, but could be expanded to contain additional cache object
|
|
|
|
// information.
|
|
|
|
//
|
|
|
|
// AUTOINCREMENT is necessary to prevent CacheId values from being reused.
|
|
|
|
const char* const kTableCaches =
|
|
|
|
"CREATE TABLE caches ("
|
|
|
|
"id INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT "
|
|
|
|
")";
|
|
|
|
|
|
|
|
// Security blobs are quite large and duplicated for every Response from
|
|
|
|
// the same https origin. This table is used to de-duplicate this data.
|
|
|
|
const char* const kTableSecurityInfo =
|
|
|
|
"CREATE TABLE security_info ("
|
|
|
|
"id INTEGER NOT NULL PRIMARY KEY, "
|
|
|
|
"hash BLOB NOT NULL, " // first 8-bytes of the sha1 hash of data column
|
|
|
|
"data BLOB NOT NULL, " // full security info data, usually a few KB
|
|
|
|
"refcount INTEGER NOT NULL"
|
|
|
|
")";
|
|
|
|
|
|
|
|
// Index the smaller hash value instead of the large security data blob.
|
|
|
|
const char* const kIndexSecurityInfoHash =
|
|
|
|
"CREATE INDEX security_info_hash_index ON security_info (hash)";
|
|
|
|
|
|
|
|
const char* const kTableEntries =
|
|
|
|
"CREATE TABLE entries ("
|
|
|
|
"id INTEGER NOT NULL PRIMARY KEY, "
|
|
|
|
"request_method TEXT NOT NULL, "
|
|
|
|
"request_url_no_query TEXT NOT NULL, "
|
|
|
|
"request_url_no_query_hash BLOB NOT NULL, " // first 8-bytes of sha1 hash
|
|
|
|
"request_url_query TEXT NOT NULL, "
|
|
|
|
"request_url_query_hash BLOB NOT NULL, " // first 8-bytes of sha1 hash
|
|
|
|
"request_referrer TEXT NOT NULL, "
|
|
|
|
"request_headers_guard INTEGER NOT NULL, "
|
|
|
|
"request_mode INTEGER NOT NULL, "
|
|
|
|
"request_credentials INTEGER NOT NULL, "
|
|
|
|
"request_contentpolicytype INTEGER NOT NULL, "
|
|
|
|
"request_cache INTEGER NOT NULL, "
|
|
|
|
"request_body_id TEXT NULL, "
|
|
|
|
"response_type INTEGER NOT NULL, "
|
|
|
|
"response_status INTEGER NOT NULL, "
|
|
|
|
"response_status_text TEXT NOT NULL, "
|
|
|
|
"response_headers_guard INTEGER NOT NULL, "
|
|
|
|
"response_body_id TEXT NULL, "
|
|
|
|
"response_security_info_id INTEGER NULL REFERENCES security_info(id), "
|
|
|
|
"response_principal_info TEXT NOT NULL, "
|
2015-09-01 00:26:30 +03:00
|
|
|
"cache_id INTEGER NOT NULL REFERENCES caches(id) ON DELETE CASCADE, "
|
2016-02-27 22:08:58 +03:00
|
|
|
"request_redirect INTEGER NOT NULL, "
|
2016-09-07 05:20:23 +03:00
|
|
|
"request_referrer_policy INTEGER NOT NULL, "
|
2016-11-07 05:16:34 +03:00
|
|
|
"request_integrity TEXT NOT NULL, "
|
2017-07-10 11:45:56 +03:00
|
|
|
"request_url_fragment TEXT NOT NULL, "
|
|
|
|
"response_padding_size INTEGER NULL "
|
2015-09-01 00:26:30 +03:00
|
|
|
// New columns must be added at the end of table to migrate and
|
|
|
|
// validate properly.
|
2015-09-01 00:26:29 +03:00
|
|
|
")";
|
|
|
|
// Create an index to support the QueryCache() matching algorithm. This
|
|
|
|
// needs to quickly find entries in a given Cache that match the request
|
|
|
|
// URL. The url query is separated in order to support the ignoreSearch
|
|
|
|
// option. Finally, we index hashes of the URL values instead of the
|
|
|
|
// actual strings to avoid excessive disk bloat. The index will duplicate
|
|
|
|
// the contents of the columsn in the index. The hash index will prune
|
|
|
|
// the vast majority of values from the query result so that normal
|
|
|
|
// scanning only has to be done on a few values to find an exact URL match.
|
|
|
|
const char* const kIndexEntriesRequest =
|
|
|
|
"CREATE INDEX entries_request_match_index "
|
|
|
|
"ON entries (cache_id, request_url_no_query_hash, "
|
|
|
|
"request_url_query_hash)";
|
|
|
|
|
|
|
|
const char* const kTableRequestHeaders =
|
|
|
|
"CREATE TABLE request_headers ("
|
|
|
|
"name TEXT NOT NULL, "
|
|
|
|
"value TEXT NOT NULL, "
|
|
|
|
"entry_id INTEGER NOT NULL REFERENCES entries(id) ON DELETE CASCADE"
|
|
|
|
")";
|
|
|
|
|
|
|
|
const char* const kTableResponseHeaders =
|
|
|
|
"CREATE TABLE response_headers ("
|
|
|
|
"name TEXT NOT NULL, "
|
|
|
|
"value TEXT NOT NULL, "
|
|
|
|
"entry_id INTEGER NOT NULL REFERENCES entries(id) ON DELETE CASCADE"
|
|
|
|
")";
|
|
|
|
|
|
|
|
// We need an index on response_headers, but not on request_headers,
|
|
|
|
// because we quickly need to determine if a VARY header is present.
|
|
|
|
const char* const kIndexResponseHeadersName =
|
|
|
|
"CREATE INDEX response_headers_name_index "
|
|
|
|
"ON response_headers (name)";
|
|
|
|
|
2016-05-03 04:48:40 +03:00
|
|
|
const char* const kTableResponseUrlList =
|
|
|
|
"CREATE TABLE response_url_list ("
|
|
|
|
"url TEXT NOT NULL, "
|
|
|
|
"entry_id INTEGER NOT NULL REFERENCES entries(id) ON DELETE CASCADE"
|
|
|
|
")";
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
// NOTE: key allows NULL below since that is how "" is represented
|
|
|
|
// in a BLOB column. We use BLOB to avoid encoding issues
|
|
|
|
// with storing DOMStrings.
|
|
|
|
const char* const kTableStorage =
|
|
|
|
"CREATE TABLE storage ("
|
|
|
|
"namespace INTEGER NOT NULL, "
|
|
|
|
"key BLOB NULL, "
|
|
|
|
"cache_id INTEGER NOT NULL REFERENCES caches(id), "
|
|
|
|
"PRIMARY KEY(namespace, key) "
|
|
|
|
")";
|
|
|
|
|
|
|
|
// ---------
|
|
|
|
// End schema definition
|
|
|
|
// ---------
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
const int32_t kMaxEntriesPerStatement = 255;
|
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
const uint32_t kPageSize = 4 * 1024;
|
|
|
|
|
|
|
|
// Grow the database in chunks to reduce fragmentation
|
2015-05-28 17:52:35 +03:00
|
|
|
const uint32_t kGrowthSize = 32 * 1024;
|
2015-05-28 17:46:47 +03:00
|
|
|
const uint32_t kGrowthPages = kGrowthSize / kPageSize;
|
|
|
|
static_assert(kGrowthSize % kPageSize == 0,
|
|
|
|
"Growth size must be multiple of page size");
|
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
// Only release free pages when we have more than this limit
|
|
|
|
const int32_t kMaxFreePages = kGrowthPages;
|
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
// Limit WAL journal to a reasonable size
|
|
|
|
const uint32_t kWalAutoCheckpointSize = 512 * 1024;
|
|
|
|
const uint32_t kWalAutoCheckpointPages = kWalAutoCheckpointSize / kPageSize;
|
|
|
|
static_assert(kWalAutoCheckpointSize % kPageSize == 0,
|
|
|
|
"WAL checkpoint size must be multiple of page size");
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-24 19:55:28 +03:00
|
|
|
// If any of the static_asserts below fail, it means that you have changed
|
|
|
|
// the corresponding WebIDL enum in a way that may be incompatible with the
|
|
|
|
// existing data stored in the DOM Cache. You would need to update the Cache
|
|
|
|
// database schema accordingly and adjust the failing static_assert.
|
|
|
|
static_assert(int(HeadersGuardEnum::None) == 0 &&
|
|
|
|
int(HeadersGuardEnum::Request) == 1 &&
|
|
|
|
int(HeadersGuardEnum::Request_no_cors) == 2 &&
|
|
|
|
int(HeadersGuardEnum::Response) == 3 &&
|
|
|
|
int(HeadersGuardEnum::Immutable) == 4 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
HeadersGuardEnumValues::Count == 5,
|
2015-03-24 19:55:28 +03:00
|
|
|
"HeadersGuardEnum values are as expected");
|
2016-02-27 22:08:58 +03:00
|
|
|
static_assert(int(ReferrerPolicy::_empty) == 0 &&
|
|
|
|
int(ReferrerPolicy::No_referrer) == 1 &&
|
|
|
|
int(ReferrerPolicy::No_referrer_when_downgrade) == 2 &&
|
2016-04-20 03:16:39 +03:00
|
|
|
int(ReferrerPolicy::Origin) == 3 &&
|
2016-02-27 22:08:58 +03:00
|
|
|
int(ReferrerPolicy::Origin_when_cross_origin) == 4 &&
|
|
|
|
int(ReferrerPolicy::Unsafe_url) == 5 &&
|
2016-11-14 10:15:32 +03:00
|
|
|
int(ReferrerPolicy::Same_origin) == 6 &&
|
|
|
|
int(ReferrerPolicy::Strict_origin) == 7 &&
|
|
|
|
int(ReferrerPolicy::Strict_origin_when_cross_origin) == 8 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
ReferrerPolicyValues::Count == 9,
|
2016-02-27 22:08:58 +03:00
|
|
|
"ReferrerPolicy values are as expected");
|
2015-03-24 19:55:28 +03:00
|
|
|
static_assert(int(RequestMode::Same_origin) == 0 &&
|
|
|
|
int(RequestMode::No_cors) == 1 &&
|
|
|
|
int(RequestMode::Cors) == 2 &&
|
2016-01-14 02:15:37 +03:00
|
|
|
int(RequestMode::Navigate) == 3 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
RequestModeValues::Count == 4,
|
2015-03-24 19:55:28 +03:00
|
|
|
"RequestMode values are as expected");
|
|
|
|
static_assert(int(RequestCredentials::Omit) == 0 &&
|
|
|
|
int(RequestCredentials::Same_origin) == 1 &&
|
|
|
|
int(RequestCredentials::Include) == 2 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
RequestCredentialsValues::Count == 3,
|
2015-03-24 19:55:28 +03:00
|
|
|
"RequestCredentials values are as expected");
|
|
|
|
static_assert(int(RequestCache::Default) == 0 &&
|
|
|
|
int(RequestCache::No_store) == 1 &&
|
|
|
|
int(RequestCache::Reload) == 2 &&
|
|
|
|
int(RequestCache::No_cache) == 3 &&
|
|
|
|
int(RequestCache::Force_cache) == 4 &&
|
2016-05-17 06:20:52 +03:00
|
|
|
int(RequestCache::Only_if_cached) == 5 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
RequestCacheValues::Count == 6,
|
2015-03-24 19:55:28 +03:00
|
|
|
"RequestCache values are as expected");
|
2015-09-01 00:26:30 +03:00
|
|
|
static_assert(int(RequestRedirect::Follow) == 0 &&
|
|
|
|
int(RequestRedirect::Error) == 1 &&
|
|
|
|
int(RequestRedirect::Manual) == 2 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
RequestRedirectValues::Count == 3,
|
2015-09-01 00:26:30 +03:00
|
|
|
"RequestRedirect values are as expected");
|
2015-03-24 19:55:28 +03:00
|
|
|
static_assert(int(ResponseType::Basic) == 0 && int(ResponseType::Cors) == 1 &&
|
|
|
|
int(ResponseType::Default) == 2 &&
|
|
|
|
int(ResponseType::Error) == 3 &&
|
|
|
|
int(ResponseType::Opaque) == 4 &&
|
2015-09-01 00:26:30 +03:00
|
|
|
int(ResponseType::Opaqueredirect) == 5 &&
|
2019-10-23 06:54:39 +03:00
|
|
|
ResponseTypeValues::Count == 6,
|
2015-03-24 19:55:28 +03:00
|
|
|
"ResponseType values are as expected");
|
|
|
|
|
|
|
|
// If the static_asserts below fails, it means that you have changed the
|
|
|
|
// Namespace enum in a way that may be incompatible with the existing data
|
|
|
|
// stored in the DOM Cache. You would need to update the Cache database schema
|
|
|
|
// accordingly and adjust the failing static_assert.
|
|
|
|
static_assert(DEFAULT_NAMESPACE == 0 && CHROME_ONLY_NAMESPACE == 1 &&
|
|
|
|
NUMBER_OF_NAMESPACES == 2,
|
|
|
|
"Namespace values are as expected");
|
|
|
|
|
2015-03-27 00:10:39 +03:00
|
|
|
// If the static_asserts below fails, it means that you have changed the
|
|
|
|
// nsContentPolicy enum in a way that may be incompatible with the existing data
|
|
|
|
// stored in the DOM Cache. You would need to update the Cache database schema
|
|
|
|
// accordingly and adjust the failing static_assert.
|
|
|
|
static_assert(nsIContentPolicy::TYPE_INVALID == 0 &&
|
|
|
|
nsIContentPolicy::TYPE_OTHER == 1 &&
|
|
|
|
nsIContentPolicy::TYPE_SCRIPT == 2 &&
|
|
|
|
nsIContentPolicy::TYPE_IMAGE == 3 &&
|
|
|
|
nsIContentPolicy::TYPE_STYLESHEET == 4 &&
|
|
|
|
nsIContentPolicy::TYPE_OBJECT == 5 &&
|
|
|
|
nsIContentPolicy::TYPE_DOCUMENT == 6 &&
|
|
|
|
nsIContentPolicy::TYPE_SUBDOCUMENT == 7 &&
|
|
|
|
nsIContentPolicy::TYPE_REFRESH == 8 &&
|
|
|
|
nsIContentPolicy::TYPE_XBL == 9 &&
|
|
|
|
nsIContentPolicy::TYPE_PING == 10 &&
|
|
|
|
nsIContentPolicy::TYPE_XMLHTTPREQUEST == 11 &&
|
|
|
|
nsIContentPolicy::TYPE_DATAREQUEST == 11 &&
|
|
|
|
nsIContentPolicy::TYPE_OBJECT_SUBREQUEST == 12 &&
|
|
|
|
nsIContentPolicy::TYPE_DTD == 13 &&
|
|
|
|
nsIContentPolicy::TYPE_FONT == 14 &&
|
|
|
|
nsIContentPolicy::TYPE_MEDIA == 15 &&
|
|
|
|
nsIContentPolicy::TYPE_WEBSOCKET == 16 &&
|
|
|
|
nsIContentPolicy::TYPE_CSP_REPORT == 17 &&
|
|
|
|
nsIContentPolicy::TYPE_XSLT == 18 &&
|
|
|
|
nsIContentPolicy::TYPE_BEACON == 19 &&
|
|
|
|
nsIContentPolicy::TYPE_FETCH == 20 &&
|
2015-06-16 04:51:51 +03:00
|
|
|
nsIContentPolicy::TYPE_IMAGESET == 21 &&
|
|
|
|
nsIContentPolicy::TYPE_WEB_MANIFEST == 22 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_SCRIPT == 23 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_WORKER == 24 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER == 25 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_EMBED == 26 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_OBJECT == 27 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_FRAME == 28 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_IFRAME == 29 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_AUDIO == 30 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_VIDEO == 31 &&
|
2015-08-06 21:17:24 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_TRACK == 32 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_XMLHTTPREQUEST == 33 &&
|
2015-09-12 01:48:43 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_EVENTSOURCE == 34 &&
|
2015-09-21 00:55:44 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_SERVICE_WORKER == 35 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_SCRIPT_PRELOAD == 36 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_IMAGE == 37 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_IMAGE_PRELOAD == 38 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_STYLESHEET == 39 &&
|
2016-10-13 10:43:54 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD == 40 &&
|
2017-02-15 17:55:58 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_IMAGE_FAVICON == 41 &&
|
2018-03-24 01:27:08 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_WORKER_IMPORT_SCRIPTS == 42 &&
|
|
|
|
nsIContentPolicy::TYPE_SAVEAS_DOWNLOAD == 43 &&
|
2019-02-12 16:16:32 +03:00
|
|
|
nsIContentPolicy::TYPE_SPECULATIVE == 44 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_MODULE == 45 &&
|
2019-07-03 20:28:25 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_MODULE_PRELOAD == 46 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_DTD == 47 &&
|
2020-03-17 14:29:33 +03:00
|
|
|
nsIContentPolicy::TYPE_INTERNAL_FORCE_ALLOWED_DTD == 48 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_AUDIOWORKLET == 49 &&
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_PAINTWORKLET == 50,
|
2015-09-12 01:48:43 +03:00
|
|
|
"nsContentPolicyType values are as expected");
|
2015-03-27 00:10:39 +03:00
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
typedef int32_t EntryId;
|
|
|
|
|
2015-05-22 04:16:36 +03:00
|
|
|
struct IdCount {
|
|
|
|
explicit IdCount(int32_t aId) : mId(aId), mCount(1) {}
|
|
|
|
int32_t mId;
|
|
|
|
int32_t mCount;
|
|
|
|
};
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
static nsresult QueryAll(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
nsTArray<EntryId>& aEntryIdListOut);
|
|
|
|
static nsresult QueryCache(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest,
|
|
|
|
const CacheQueryParams& aParams,
|
|
|
|
nsTArray<EntryId>& aEntryIdListOut,
|
|
|
|
uint32_t aMaxResults = UINT32_MAX);
|
|
|
|
static nsresult MatchByVaryHeader(mozIStorageConnection* aConn,
|
|
|
|
const CacheRequest& aRequest, EntryId entryId,
|
|
|
|
bool* aSuccessOut);
|
|
|
|
static nsresult DeleteEntries(mozIStorageConnection* aConn,
|
|
|
|
const nsTArray<EntryId>& aEntryIdList,
|
|
|
|
nsTArray<nsID>& aDeletedBodyIdListOut,
|
2015-05-22 04:16:36 +03:00
|
|
|
nsTArray<IdCount>& aDeletedSecurityIdListOut,
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t* aDeletedPaddingSizeOut,
|
2015-04-16 22:00:16 +03:00
|
|
|
uint32_t aPos = 0, int32_t aLen = -1);
|
2015-05-25 21:21:05 +03:00
|
|
|
static nsresult InsertSecurityInfo(mozIStorageConnection* aConn,
|
2015-06-17 03:39:05 +03:00
|
|
|
nsICryptoHash* aCrypto,
|
2015-05-25 21:21:05 +03:00
|
|
|
const nsACString& aData, int32_t* aIdOut);
|
2015-05-22 04:16:36 +03:00
|
|
|
static nsresult DeleteSecurityInfo(mozIStorageConnection* aConn, int32_t aId,
|
|
|
|
int32_t aCount);
|
|
|
|
static nsresult DeleteSecurityInfoList(
|
|
|
|
mozIStorageConnection* aConn,
|
|
|
|
const nsTArray<IdCount>& aDeletedStorageIdList);
|
2015-04-16 22:00:16 +03:00
|
|
|
static nsresult InsertEntry(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest,
|
|
|
|
const nsID* aRequestBodyId,
|
|
|
|
const CacheResponse& aResponse,
|
|
|
|
const nsID* aResponseBodyId);
|
|
|
|
static nsresult ReadResponse(mozIStorageConnection* aConn, EntryId aEntryId,
|
|
|
|
SavedResponse* aSavedResponseOut);
|
|
|
|
static nsresult ReadRequest(mozIStorageConnection* aConn, EntryId aEntryId,
|
|
|
|
SavedRequest* aSavedRequestOut);
|
|
|
|
|
|
|
|
static void AppendListParamsToQuery(nsACString& aQuery,
|
|
|
|
const nsTArray<EntryId>& aEntryIdList,
|
|
|
|
uint32_t aPos, int32_t aLen);
|
|
|
|
static nsresult BindListParamsToQuery(mozIStorageStatement* aState,
|
|
|
|
const nsTArray<EntryId>& aEntryIdList,
|
|
|
|
uint32_t aPos, int32_t aLen);
|
2015-05-20 16:51:19 +03:00
|
|
|
static nsresult BindId(mozIStorageStatement* aState, const nsACString& aName,
|
2015-04-16 22:00:16 +03:00
|
|
|
const nsID* aId);
|
|
|
|
static nsresult ExtractId(mozIStorageStatement* aState, uint32_t aPos,
|
|
|
|
nsID* aIdOut);
|
2015-05-22 04:16:37 +03:00
|
|
|
static nsresult CreateAndBindKeyStatement(mozIStorageConnection* aConn,
|
|
|
|
const char* aQueryFormat,
|
|
|
|
const nsAString& aKey,
|
|
|
|
mozIStorageStatement** aStateOut);
|
2015-06-17 03:39:05 +03:00
|
|
|
static nsresult HashCString(nsICryptoHash* aCrypto, const nsACString& aIn,
|
|
|
|
nsACString& aOut);
|
2017-10-03 17:02:49 +03:00
|
|
|
nsresult GetEffectiveSchemaVersion(mozIStorageConnection* aConn,
|
|
|
|
int32_t& schemaVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
nsresult Validate(mozIStorageConnection* aConn);
|
2015-09-01 00:26:30 +03:00
|
|
|
nsresult Migrate(mozIStorageConnection* aConn);
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
class MOZ_RAII AutoDisableForeignKeyChecking {
|
|
|
|
public:
|
|
|
|
explicit AutoDisableForeignKeyChecking(mozIStorageConnection* aConn)
|
|
|
|
: mConn(aConn), mForeignKeyCheckingDisabled(false) {
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = mConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("PRAGMA foreign_keys;"), getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t mode;
|
|
|
|
rv = state->GetInt32(0, &mode);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mode) {
|
|
|
|
nsresult rv = mConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("PRAGMA foreign_keys = OFF;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
mForeignKeyCheckingDisabled = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
~AutoDisableForeignKeyChecking() {
|
|
|
|
if (mForeignKeyCheckingDisabled) {
|
|
|
|
nsresult rv = mConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("PRAGMA foreign_keys = ON;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
nsCOMPtr<mozIStorageConnection> mConn;
|
|
|
|
bool mForeignKeyCheckingDisabled;
|
|
|
|
};
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
nsresult CreateOrMigrateSchema(mozIStorageConnection* aConn) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
int32_t schemaVersion;
|
2017-10-03 17:02:49 +03:00
|
|
|
nsresult rv = GetEffectiveSchemaVersion(aConn, schemaVersion);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (schemaVersion == kLatestSchemaVersion) {
|
2015-09-01 00:26:30 +03:00
|
|
|
// We already have the correct schema version. Validate it matches
|
|
|
|
// our expected schema and then proceed.
|
|
|
|
rv = Validate(aConn);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
// Turn off checking foreign keys before starting a transaction, and restore
|
|
|
|
// it once we're done.
|
|
|
|
AutoDisableForeignKeyChecking restoreForeignKeyChecking(aConn);
|
2015-09-01 00:26:30 +03:00
|
|
|
mozStorageTransaction trans(aConn, false,
|
|
|
|
mozIStorageConnection::TRANSACTION_IMMEDIATE);
|
|
|
|
bool needVacuum = false;
|
|
|
|
|
|
|
|
if (schemaVersion) {
|
|
|
|
// A schema exists, but its not the current version. Attempt to
|
|
|
|
// migrate it to our new schema.
|
|
|
|
rv = Migrate(aConn);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Migrations happen infrequently and reflect a chance in DB structure.
|
2015-09-01 00:26:30 +03:00
|
|
|
// This is a good time to rebuild the database. It also helps catch
|
|
|
|
// if a new migration is incorrect by fast failing on the corruption.
|
2015-09-01 00:26:30 +03:00
|
|
|
needVacuum = true;
|
|
|
|
} else {
|
|
|
|
// There is no schema installed. Create the database from scratch.
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableCaches));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableSecurityInfo));
|
2015-05-22 04:16:36 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kIndexSecurityInfoHash));
|
2015-05-22 04:16:36 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableEntries));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kIndexEntriesRequest));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableRequestHeaders));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableResponseHeaders));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kIndexResponseHeadersName));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableResponseUrlList));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:29 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kTableStorage));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-10-03 17:02:49 +03:00
|
|
|
rv = aConn->SetSchemaVersion(kHackyDowngradeSchemaVersion);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-10-03 17:02:49 +03:00
|
|
|
rv = GetEffectiveSchemaVersion(aConn, schemaVersion);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
rv = Validate(aConn);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
rv = trans.Commit();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (needVacuum) {
|
|
|
|
// Unfortunately, this must be performed outside of the transaction.
|
|
|
|
aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING("VACUUM"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult InitializeConnection(mozIStorageConnection* aConn) {
|
2015-03-17 03:27:23 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-17 03:27:23 +03:00
|
|
|
|
|
|
|
// This function needs to perform per-connection initialization tasks that
|
|
|
|
// need to happen regardless of the schema.
|
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
nsPrintfCString pragmas(
|
|
|
|
// Use a smaller page size to improve perf/footprint; default is too large
|
|
|
|
"PRAGMA page_size = %u; "
|
2015-05-28 17:46:47 +03:00
|
|
|
// Enable auto_vacuum; this must happen after page_size and before WAL
|
|
|
|
"PRAGMA auto_vacuum = INCREMENTAL; "
|
2015-05-28 17:46:47 +03:00
|
|
|
"PRAGMA foreign_keys = ON; ",
|
2015-05-28 17:46:47 +03:00
|
|
|
kPageSize);
|
2015-03-17 03:27:23 +03:00
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
// Note, the default encoding of UTF-8 is preferred. mozStorage does all
|
|
|
|
// the work necessary to convert UTF-16 nsString values for us. We don't
|
|
|
|
// need ordering and the binary equality operations are correct. So, do
|
|
|
|
// NOT set PRAGMA encoding to UTF-16.
|
|
|
|
|
2015-03-17 03:27:23 +03:00
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(pragmas);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
// Limit fragmentation by growing the database by many pages at once.
|
|
|
|
rv = aConn->SetGrowthIncrement(kGrowthSize, EmptyCString());
|
|
|
|
if (rv == NS_ERROR_FILE_TOO_BIG) {
|
|
|
|
NS_WARNING("Not enough disk space to set sqlite growth increment.");
|
|
|
|
rv = NS_OK;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
// Enable WAL journaling. This must be performed in a separate transaction
|
|
|
|
// after changing the page_size and enabling auto_vacuum.
|
|
|
|
nsPrintfCString wal(
|
|
|
|
// WAL journal can grow to given number of *pages*
|
|
|
|
"PRAGMA wal_autocheckpoint = %u; "
|
|
|
|
// Always truncate the journal back to given number of *bytes*
|
|
|
|
"PRAGMA journal_size_limit = %u; "
|
|
|
|
// WAL must be enabled at the end to allow page size to be changed, etc.
|
|
|
|
"PRAGMA journal_mode = WAL; ",
|
|
|
|
kWalAutoCheckpointPages, kWalAutoCheckpointSize);
|
|
|
|
|
|
|
|
rv = aConn->ExecuteSimpleSQL(wal);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify that we successfully set the vacuum mode to incremental. It
|
|
|
|
// is very easy to put the database in a state where the auto_vacuum
|
|
|
|
// pragma above fails silently.
|
|
|
|
#ifdef DEBUG
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("PRAGMA auto_vacuum;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t mode;
|
|
|
|
rv = state->GetInt32(0, &mode);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// integer value 2 is incremental mode
|
|
|
|
if (NS_WARN_IF(mode != 2)) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-03-17 03:27:23 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult CreateCacheId(mozIStorageConnection* aConn, CacheId* aCacheIdOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCacheIdOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("INSERT INTO caches DEFAULT VALUES;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT last_insert_rowid()"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(!hasMoreData)) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
|
|
|
|
2015-04-03 03:11:41 +03:00
|
|
|
rv = state->GetInt64(0, aCacheIdOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult DeleteCacheId(mozIStorageConnection* aConn, CacheId aCacheId,
|
2017-07-10 11:54:20 +03:00
|
|
|
nsTArray<nsID>& aDeletedBodyIdListOut,
|
|
|
|
int64_t* aDeletedPaddingSizeOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2017-07-10 11:54:20 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aDeletedPaddingSizeOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
// Delete the bodies explicitly as we need to read out the body IDs
|
|
|
|
// anyway. These body IDs must be deleted one-by-one as content may
|
|
|
|
// still be referencing them invidivually.
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<EntryId, 256> matches;
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv = QueryAll(aConn, aCacheId, matches);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<IdCount, 16> deletedSecurityIdList;
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t deletedPaddingSize = 0;
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = DeleteEntries(aConn, matches, aDeletedBodyIdListOut,
|
2017-07-10 11:54:20 +03:00
|
|
|
deletedSecurityIdList, &deletedPaddingSize);
|
2015-05-22 04:16:36 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
*aDeletedPaddingSizeOut = deletedPaddingSize;
|
|
|
|
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = DeleteSecurityInfoList(aConn, deletedSecurityIdList);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete the remainder of the cache using cascade semantics.
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(
|
2015-05-20 16:51:19 +03:00
|
|
|
NS_LITERAL_CSTRING("DELETE FROM caches WHERE id=:id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("id"), aCacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult IsCacheOrphaned(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
bool* aOrphanedOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aOrphanedOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
// err on the side of not deleting user data
|
|
|
|
*aOrphanedOut = false;
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
2015-05-20 16:51:19 +03:00
|
|
|
"SELECT COUNT(*) FROM storage WHERE cache_id=:cache_id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("cache_id"), aCacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(hasMoreData);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
int32_t refCount;
|
|
|
|
rv = state->GetInt32(0, &refCount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aOrphanedOut = refCount == 0;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-26 08:22:46 +03:00
|
|
|
nsresult FindOrphanedCacheIds(mozIStorageConnection* aConn,
|
|
|
|
nsTArray<CacheId>& aOrphanedListOut) {
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("SELECT id FROM caches "
|
|
|
|
"WHERE id NOT IN (SELECT cache_id from storage);"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
CacheId cacheId = INVALID_CACHE_ID;
|
|
|
|
rv = state->GetInt64(0, &cacheId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aOrphanedListOut.AppendElement(cacheId);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-18 13:58:56 +03:00
|
|
|
nsresult FindOverallPaddingSize(mozIStorageConnection* aConn,
|
|
|
|
int64_t* aOverallPaddingSizeOut) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aOverallPaddingSizeOut);
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("SELECT response_padding_size FROM entries "
|
|
|
|
"WHERE response_padding_size IS NOT NULL;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int64_t overallPaddingSize = 0;
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
int64_t padding_size = 0;
|
|
|
|
rv = state->GetInt64(0, &padding_size);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(padding_size >= 0);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(INT64_MAX - padding_size >= overallPaddingSize);
|
|
|
|
overallPaddingSize += padding_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aOverallPaddingSizeOut = overallPaddingSize;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-26 08:22:46 +03:00
|
|
|
nsresult GetKnownBodyIds(mozIStorageConnection* aConn,
|
|
|
|
nsTArray<nsID>& aBodyIdListOut) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-06-26 08:22:46 +03:00
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
"SELECT request_body_id, response_body_id FROM entries;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
// extract 0 to 2 nsID structs per row
|
|
|
|
for (uint32_t i = 0; i < 2; ++i) {
|
|
|
|
bool isNull = false;
|
|
|
|
|
|
|
|
rv = state->GetIsNull(i, &isNull);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isNull) {
|
|
|
|
nsID id;
|
|
|
|
rv = ExtractId(state, i, &id);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aBodyIdListOut.AppendElement(id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult CacheMatch(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest,
|
|
|
|
const CacheQueryParams& aParams, bool* aFoundResponseOut,
|
|
|
|
SavedResponse* aSavedResponseOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aFoundResponseOut);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSavedResponseOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aFoundResponseOut = false;
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<EntryId, 1> matches;
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv = QueryCache(aConn, aCacheId, aRequest, aParams, matches, 1);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (matches.IsEmpty()) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = ReadResponse(aConn, matches[0], aSavedResponseOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aSavedResponseOut->mCacheId = aCacheId;
|
|
|
|
*aFoundResponseOut = true;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult CacheMatchAll(mozIStorageConnection* aConn, CacheId aCacheId,
|
2019-03-21 14:09:44 +03:00
|
|
|
const Maybe<CacheRequest>& aMaybeRequest,
|
2015-04-16 22:00:16 +03:00
|
|
|
const CacheQueryParams& aParams,
|
|
|
|
nsTArray<SavedResponse>& aSavedResponsesOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv;
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<EntryId, 256> matches;
|
2019-03-21 14:09:44 +03:00
|
|
|
if (aMaybeRequest.isNothing()) {
|
2015-03-02 16:20:00 +03:00
|
|
|
rv = QueryAll(aConn, aCacheId, matches);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
} else {
|
2019-03-21 14:09:44 +03:00
|
|
|
rv = QueryCache(aConn, aCacheId, aMaybeRequest.ref(), aParams, matches);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: replace this with a bulk load using SQL IN clause (bug 1110458)
|
|
|
|
for (uint32_t i = 0; i < matches.Length(); ++i) {
|
|
|
|
SavedResponse savedResponse;
|
|
|
|
rv = ReadResponse(aConn, matches[i], &savedResponse);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
savedResponse.mCacheId = aCacheId;
|
|
|
|
aSavedResponsesOut.AppendElement(savedResponse);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult CachePut(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest, const nsID* aRequestBodyId,
|
|
|
|
const CacheResponse& aResponse, const nsID* aResponseBodyId,
|
2017-07-10 11:54:20 +03:00
|
|
|
nsTArray<nsID>& aDeletedBodyIdListOut,
|
|
|
|
int64_t* aDeletedPaddingSizeOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2017-07-10 11:54:20 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aDeletedPaddingSizeOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-04-16 22:00:15 +03:00
|
|
|
CacheQueryParams params(false, false, false, false, NS_LITERAL_STRING(""));
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<EntryId, 256> matches;
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv = QueryCache(aConn, aCacheId, aRequest, params, matches);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<IdCount, 16> deletedSecurityIdList;
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t deletedPaddingSize = 0;
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = DeleteEntries(aConn, matches, aDeletedBodyIdListOut,
|
2017-07-10 11:54:20 +03:00
|
|
|
deletedSecurityIdList, &deletedPaddingSize);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = InsertEntry(aConn, aCacheId, aRequest, aRequestBodyId, aResponse,
|
|
|
|
aResponseBodyId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-22 04:16:36 +03:00
|
|
|
// Delete the security values after doing the insert to avoid churning
|
|
|
|
// the security table when its not necessary.
|
|
|
|
rv = DeleteSecurityInfoList(aConn, deletedSecurityIdList);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
*aDeletedPaddingSizeOut = deletedPaddingSize;
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult CacheDelete(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest,
|
|
|
|
const CacheQueryParams& aParams,
|
2017-07-10 11:54:20 +03:00
|
|
|
nsTArray<nsID>& aDeletedBodyIdListOut,
|
|
|
|
int64_t* aDeletedPaddingSizeOut, bool* aSuccessOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2017-07-10 11:54:20 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aDeletedPaddingSizeOut);
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSuccessOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aSuccessOut = false;
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<EntryId, 256> matches;
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv = QueryCache(aConn, aCacheId, aRequest, aParams, matches);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (matches.IsEmpty()) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<IdCount, 16> deletedSecurityIdList;
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t deletedPaddingSize = 0;
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = DeleteEntries(aConn, matches, aDeletedBodyIdListOut,
|
2017-07-10 11:54:20 +03:00
|
|
|
deletedSecurityIdList, &deletedPaddingSize);
|
2015-05-22 04:16:36 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
*aDeletedPaddingSizeOut = deletedPaddingSize;
|
|
|
|
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = DeleteSecurityInfoList(aConn, deletedSecurityIdList);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aSuccessOut = true;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult CacheKeys(mozIStorageConnection* aConn, CacheId aCacheId,
|
2019-03-21 14:09:44 +03:00
|
|
|
const Maybe<CacheRequest>& aMaybeRequest,
|
2015-04-16 22:00:16 +03:00
|
|
|
const CacheQueryParams& aParams,
|
|
|
|
nsTArray<SavedRequest>& aSavedRequestsOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv;
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<EntryId, 256> matches;
|
2019-03-21 14:09:44 +03:00
|
|
|
if (aMaybeRequest.isNothing()) {
|
2015-03-02 16:20:00 +03:00
|
|
|
rv = QueryAll(aConn, aCacheId, matches);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
} else {
|
2019-03-21 14:09:44 +03:00
|
|
|
rv = QueryCache(aConn, aCacheId, aMaybeRequest.ref(), aParams, matches);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: replace this with a bulk load using SQL IN clause (bug 1110458)
|
|
|
|
for (uint32_t i = 0; i < matches.Length(); ++i) {
|
|
|
|
SavedRequest savedRequest;
|
|
|
|
rv = ReadRequest(aConn, matches[i], &savedRequest);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
savedRequest.mCacheId = aCacheId;
|
|
|
|
aSavedRequestsOut.AppendElement(savedRequest);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult StorageMatch(mozIStorageConnection* aConn, Namespace aNamespace,
|
|
|
|
const CacheRequest& aRequest,
|
|
|
|
const CacheQueryParams& aParams, bool* aFoundResponseOut,
|
|
|
|
SavedResponse* aSavedResponseOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aFoundResponseOut);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSavedResponseOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aFoundResponseOut = false;
|
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
// If we are given a cache to check, then simply find its cache ID
|
|
|
|
// and perform the match.
|
|
|
|
if (!aParams.cacheName().EqualsLiteral("")) {
|
|
|
|
bool foundCache = false;
|
|
|
|
// no invalid CacheId, init to least likely real value
|
2015-04-03 03:11:41 +03:00
|
|
|
CacheId cacheId = INVALID_CACHE_ID;
|
2015-03-02 16:20:00 +03:00
|
|
|
rv = StorageGetCacheId(aConn, aNamespace, aParams.cacheName(), &foundCache,
|
|
|
|
&cacheId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2016-05-11 04:52:48 +03:00
|
|
|
if (!foundCache) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
rv = CacheMatch(aConn, cacheId, aRequest, aParams, aFoundResponseOut,
|
|
|
|
aSavedResponseOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise we need to get a list of all the cache IDs in this namespace.
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(
|
2015-05-20 16:51:19 +03:00
|
|
|
NS_LITERAL_CSTRING("SELECT cache_id FROM storage WHERE "
|
|
|
|
"namespace=:namespace ORDER BY rowid;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("namespace"), aNamespace);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<CacheId, 32> cacheIdList;
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
2015-04-03 03:11:41 +03:00
|
|
|
CacheId cacheId = INVALID_CACHE_ID;
|
|
|
|
rv = state->GetInt64(0, &cacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
cacheIdList.AppendElement(cacheId);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now try to find a match in each cache in order
|
|
|
|
for (uint32_t i = 0; i < cacheIdList.Length(); ++i) {
|
|
|
|
rv = CacheMatch(aConn, cacheIdList[i], aRequest, aParams, aFoundResponseOut,
|
|
|
|
aSavedResponseOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*aFoundResponseOut) {
|
|
|
|
aSavedResponseOut->mCacheId = cacheIdList[i];
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult StorageGetCacheId(mozIStorageConnection* aConn, Namespace aNamespace,
|
|
|
|
const nsAString& aKey, bool* aFoundCacheOut,
|
|
|
|
CacheId* aCacheIdOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aFoundCacheOut);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCacheIdOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aFoundCacheOut = false;
|
|
|
|
|
2015-05-22 04:16:37 +03:00
|
|
|
// How we constrain the key column depends on the value of our key. Use
|
|
|
|
// a format string for the query and let CreateAndBindKeyStatement() fill
|
|
|
|
// it in for us.
|
|
|
|
const char* query =
|
|
|
|
"SELECT cache_id FROM storage "
|
|
|
|
"WHERE namespace=:namespace AND %s "
|
|
|
|
"ORDER BY rowid;";
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
2015-05-22 04:16:37 +03:00
|
|
|
nsresult rv =
|
|
|
|
CreateAndBindKeyStatement(aConn, query, aKey, getter_AddRefs(state));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("namespace"), aNamespace);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!hasMoreData) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-03 03:11:41 +03:00
|
|
|
rv = state->GetInt64(0, aCacheIdOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aFoundCacheOut = true;
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult StoragePutCache(mozIStorageConnection* aConn, Namespace aNamespace,
|
|
|
|
const nsAString& aKey, CacheId aCacheId) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
2015-05-20 16:51:19 +03:00
|
|
|
NS_LITERAL_CSTRING("INSERT INTO storage (namespace, key, cache_id) "
|
|
|
|
"VALUES (:namespace, :key, :cache_id);"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("namespace"), aNamespace);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindStringAsBlobByName(NS_LITERAL_CSTRING("key"), aKey);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("cache_id"), aCacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult StorageForgetCache(mozIStorageConnection* aConn, Namespace aNamespace,
|
|
|
|
const nsAString& aKey) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-05-22 04:16:37 +03:00
|
|
|
// How we constrain the key column depends on the value of our key. Use
|
|
|
|
// a format string for the query and let CreateAndBindKeyStatement() fill
|
|
|
|
// it in for us.
|
|
|
|
const char* query = "DELETE FROM storage WHERE namespace=:namespace AND %s;";
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
2015-05-22 04:16:37 +03:00
|
|
|
nsresult rv =
|
|
|
|
CreateAndBindKeyStatement(aConn, query, aKey, getter_AddRefs(state));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("namespace"), aNamespace);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult StorageGetKeys(mozIStorageConnection* aConn, Namespace aNamespace,
|
|
|
|
nsTArray<nsString>& aKeysOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
2015-05-20 16:51:19 +03:00
|
|
|
"SELECT key FROM storage WHERE namespace=:namespace ORDER BY rowid;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("namespace"), aNamespace);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
nsAutoString key;
|
2015-04-29 19:03:15 +03:00
|
|
|
rv = state->GetBlobAsString(0, key);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-04-29 19:03:15 +03:00
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
aKeysOut.AppendElement(key);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
nsresult QueryAll(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
nsTArray<EntryId>& aEntryIdListOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
2015-05-20 16:51:19 +03:00
|
|
|
"SELECT id FROM entries WHERE cache_id=:cache_id ORDER BY id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("cache_id"), aCacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
EntryId entryId = INT32_MAX;
|
|
|
|
rv = state->GetInt32(0, &entryId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aEntryIdListOut.AppendElement(entryId);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult QueryCache(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest,
|
|
|
|
const CacheQueryParams& aParams,
|
|
|
|
nsTArray<EntryId>& aEntryIdListOut, uint32_t aMaxResults) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aMaxResults > 0);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2016-12-14 11:26:48 +03:00
|
|
|
if (!aParams.ignoreMethod() &&
|
|
|
|
!aRequest.method().LowerCaseEqualsLiteral("get")) {
|
2015-03-02 16:20:00 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString query(
|
|
|
|
"SELECT id, COUNT(response_headers.name) AS vary_count "
|
|
|
|
"FROM entries "
|
|
|
|
"LEFT OUTER JOIN response_headers ON "
|
|
|
|
"entries.id=response_headers.entry_id "
|
2018-12-19 17:48:30 +03:00
|
|
|
"AND response_headers.name='vary' COLLATE NOCASE "
|
2015-05-20 16:51:19 +03:00
|
|
|
"WHERE entries.cache_id=:cache_id "
|
2015-06-17 03:39:05 +03:00
|
|
|
"AND entries.request_url_no_query_hash=:url_no_query_hash ");
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
if (!aParams.ignoreSearch()) {
|
|
|
|
query.AppendLiteral("AND entries.request_url_query_hash=:url_query_hash ");
|
|
|
|
}
|
|
|
|
|
|
|
|
query.AppendLiteral("AND entries.request_url_no_query=:url_no_query ");
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
if (!aParams.ignoreSearch()) {
|
|
|
|
query.AppendLiteral("AND entries.request_url_query=:url_query ");
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
query.AppendLiteral("GROUP BY entries.id ORDER BY entries.id;");
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(query, getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("cache_id"), aCacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsCOMPtr<nsICryptoHash> crypto =
|
|
|
|
do_CreateInstance(NS_CRYPTO_HASH_CONTRACTID, &rv);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString urlWithoutQueryHash;
|
|
|
|
rv = HashCString(crypto, aRequest.urlWithoutQuery(), urlWithoutQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(
|
|
|
|
NS_LITERAL_CSTRING("url_no_query_hash"), urlWithoutQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aParams.ignoreSearch()) {
|
|
|
|
nsAutoCString urlQueryHash;
|
|
|
|
rv = HashCString(crypto, aRequest.urlQuery(), urlQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(NS_LITERAL_CSTRING("url_query_hash"),
|
|
|
|
urlQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("url_no_query"),
|
|
|
|
aRequest.urlWithoutQuery());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
if (!aParams.ignoreSearch()) {
|
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("url_query"),
|
|
|
|
aRequest.urlQuery());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
// no invalid EntryId, init to least likely real value
|
|
|
|
EntryId entryId = INT32_MAX;
|
|
|
|
rv = state->GetInt32(0, &entryId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t varyCount;
|
|
|
|
rv = state->GetInt32(1, &varyCount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aParams.ignoreVary() && varyCount > 0) {
|
|
|
|
bool matchedByVary = false;
|
|
|
|
rv = MatchByVaryHeader(aConn, aRequest, entryId, &matchedByVary);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (!matchedByVary) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
aEntryIdListOut.AppendElement(entryId);
|
|
|
|
|
|
|
|
if (aEntryIdListOut.Length() == aMaxResults) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult MatchByVaryHeader(mozIStorageConnection* aConn,
|
|
|
|
const CacheRequest& aRequest, EntryId entryId,
|
|
|
|
bool* aSuccessOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aSuccessOut = false;
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("SELECT value FROM response_headers "
|
2018-12-19 17:48:30 +03:00
|
|
|
"WHERE name='vary' COLLATE NOCASE "
|
|
|
|
"AND entry_id=:entry_id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), entryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<nsCString, 8> varyValues;
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
nsAutoCString value;
|
|
|
|
rv = state->GetUTF8String(0, value);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
varyValues.AppendElement(value);
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should not have called this function if this was not the case
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!varyValues.IsEmpty());
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
state->Reset();
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("SELECT name, value FROM request_headers "
|
2015-05-20 16:51:19 +03:00
|
|
|
"WHERE entry_id=:entry_id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), entryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> cachedHeaders =
|
2015-04-16 22:00:15 +03:00
|
|
|
new InternalHeaders(HeadersGuardEnum::None);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
nsAutoCString name;
|
|
|
|
nsAutoCString value;
|
|
|
|
rv = state->GetUTF8String(0, name);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
rv = state->GetUTF8String(1, value);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-03-17 17:57:05 +03:00
|
|
|
ErrorResult errorResult;
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
cachedHeaders->Append(name, value, errorResult);
|
2016-01-22 18:58:49 +03:00
|
|
|
if (errorResult.Failed()) {
|
|
|
|
return errorResult.StealNSResult();
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2017-07-10 11:54:20 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> queryHeaders =
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToInternalHeaders(aRequest.headers());
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
// Assume the vary headers match until we find a conflict
|
|
|
|
bool varyHeadersMatch = true;
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < varyValues.Length(); ++i) {
|
2015-03-17 17:30:30 +03:00
|
|
|
// Extract the header names inside the Vary header value.
|
|
|
|
nsAutoCString varyValue(varyValues[i]);
|
|
|
|
char* rawBuffer = varyValue.BeginWriting();
|
|
|
|
char* token = nsCRT::strtok(rawBuffer, NS_HTTP_HEADER_SEPS, &rawBuffer);
|
|
|
|
bool bailOut = false;
|
|
|
|
for (; token;
|
|
|
|
token = nsCRT::strtok(rawBuffer, NS_HTTP_HEADER_SEPS, &rawBuffer)) {
|
|
|
|
nsDependentCString header(token);
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!header.EqualsLiteral("*"),
|
|
|
|
"We should have already caught this in "
|
|
|
|
"TypeUtils::ToPCacheResponseWithoutBody()");
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-17 17:57:05 +03:00
|
|
|
ErrorResult errorResult;
|
2015-03-17 17:30:30 +03:00
|
|
|
nsAutoCString queryValue;
|
|
|
|
queryHeaders->Get(header, queryValue, errorResult);
|
|
|
|
if (errorResult.Failed()) {
|
2015-04-27 05:38:17 +03:00
|
|
|
errorResult.SuppressException();
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(queryValue.IsEmpty());
|
2015-03-17 17:30:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString cachedValue;
|
|
|
|
cachedHeaders->Get(header, cachedValue, errorResult);
|
|
|
|
if (errorResult.Failed()) {
|
2015-04-27 05:38:17 +03:00
|
|
|
errorResult.SuppressException();
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(cachedValue.IsEmpty());
|
2015-03-17 17:30:30 +03:00
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-17 17:30:30 +03:00
|
|
|
if (queryValue != cachedValue) {
|
|
|
|
varyHeadersMatch = false;
|
|
|
|
bailOut = true;
|
|
|
|
break;
|
|
|
|
}
|
2015-03-17 02:10:35 +03:00
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-17 17:30:30 +03:00
|
|
|
if (bailOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*aSuccessOut = varyHeadersMatch;
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult DeleteEntries(mozIStorageConnection* aConn,
|
|
|
|
const nsTArray<EntryId>& aEntryIdList,
|
|
|
|
nsTArray<nsID>& aDeletedBodyIdListOut,
|
2015-05-22 04:16:36 +03:00
|
|
|
nsTArray<IdCount>& aDeletedSecurityIdListOut,
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t* aDeletedPaddingSizeOut, uint32_t aPos,
|
2015-04-16 22:00:16 +03:00
|
|
|
int32_t aLen) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2017-07-10 11:54:20 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aDeletedPaddingSizeOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
if (aEntryIdList.IsEmpty()) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aPos < aEntryIdList.Length());
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
if (aLen < 0) {
|
|
|
|
aLen = aEntryIdList.Length() - aPos;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sqlite limits the number of entries allowed for an IN clause,
|
|
|
|
// so split up larger operations.
|
|
|
|
if (aLen > kMaxEntriesPerStatement) {
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t overallDeletedPaddingSize = 0;
|
2015-03-02 16:20:00 +03:00
|
|
|
uint32_t curPos = aPos;
|
|
|
|
int32_t remaining = aLen;
|
|
|
|
while (remaining > 0) {
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t deletedPaddingSize = 0;
|
2015-03-02 16:20:00 +03:00
|
|
|
int32_t max = kMaxEntriesPerStatement;
|
|
|
|
int32_t curLen = std::min(max, remaining);
|
|
|
|
nsresult rv = DeleteEntries(aConn, aEntryIdList, aDeletedBodyIdListOut,
|
2017-07-10 11:54:20 +03:00
|
|
|
aDeletedSecurityIdListOut,
|
|
|
|
&deletedPaddingSize, curPos, curLen);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(INT64_MAX - deletedPaddingSize >=
|
|
|
|
overallDeletedPaddingSize);
|
|
|
|
overallDeletedPaddingSize += deletedPaddingSize;
|
2015-03-02 16:20:00 +03:00
|
|
|
curPos += curLen;
|
|
|
|
remaining -= curLen;
|
|
|
|
}
|
2017-07-10 11:54:20 +03:00
|
|
|
|
|
|
|
*aDeletedPaddingSizeOut += overallDeletedPaddingSize;
|
2015-03-02 16:20:00 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsAutoCString query(
|
2017-07-10 11:54:20 +03:00
|
|
|
"SELECT "
|
|
|
|
"request_body_id, "
|
|
|
|
"response_body_id, "
|
|
|
|
"response_security_info_id, "
|
|
|
|
"response_padding_size "
|
2015-05-22 04:16:36 +03:00
|
|
|
"FROM entries WHERE id IN (");
|
2015-03-02 16:20:00 +03:00
|
|
|
AppendListParamsToQuery(query, aEntryIdList, aPos, aLen);
|
|
|
|
query.AppendLiteral(")");
|
|
|
|
|
|
|
|
nsresult rv = aConn->CreateStatement(query, getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = BindListParamsToQuery(state, aEntryIdList, aPos, aLen);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
int64_t overallPaddingSize = 0;
|
2015-03-02 16:20:00 +03:00
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
// extract 0 to 2 nsID structs per row
|
|
|
|
for (uint32_t i = 0; i < 2; ++i) {
|
|
|
|
bool isNull = false;
|
|
|
|
|
|
|
|
rv = state->GetIsNull(i, &isNull);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isNull) {
|
|
|
|
nsID id;
|
|
|
|
rv = ExtractId(state, i, &id);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aDeletedBodyIdListOut.AppendElement(id);
|
|
|
|
}
|
|
|
|
}
|
2015-05-22 04:16:36 +03:00
|
|
|
|
|
|
|
// and then a possible third entry for the security id
|
|
|
|
bool isNull = false;
|
|
|
|
rv = state->GetIsNull(2, &isNull);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isNull) {
|
|
|
|
int32_t securityId = -1;
|
|
|
|
rv = state->GetInt32(2, &securityId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// First try to increment the count for this ID if we're already
|
|
|
|
// seen it
|
|
|
|
bool found = false;
|
|
|
|
for (uint32_t i = 0; i < aDeletedSecurityIdListOut.Length(); ++i) {
|
|
|
|
if (aDeletedSecurityIdListOut[i].mId == securityId) {
|
|
|
|
found = true;
|
|
|
|
aDeletedSecurityIdListOut[i].mCount += 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise add a new entry for this ID with a count of 1
|
|
|
|
if (!found) {
|
|
|
|
aDeletedSecurityIdListOut.AppendElement(IdCount(securityId));
|
|
|
|
}
|
|
|
|
}
|
2017-07-10 11:54:20 +03:00
|
|
|
|
|
|
|
// It's possible to have null padding size for non-opaque response
|
|
|
|
rv = state->GetIsNull(3, &isNull);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isNull) {
|
|
|
|
int64_t paddingSize = 0;
|
|
|
|
rv = state->GetInt64(3, &paddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(paddingSize >= 0);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(INT64_MAX - overallPaddingSize >= paddingSize);
|
|
|
|
overallPaddingSize += paddingSize;
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
*aDeletedPaddingSizeOut = overallPaddingSize;
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
// Dependent records removed via ON DELETE CASCADE
|
|
|
|
|
|
|
|
query = NS_LITERAL_CSTRING("DELETE FROM entries WHERE id IN (");
|
|
|
|
AppendListParamsToQuery(query, aEntryIdList, aPos, aLen);
|
|
|
|
query.AppendLiteral(")");
|
|
|
|
|
|
|
|
rv = aConn->CreateStatement(query, getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = BindListParamsToQuery(state, aEntryIdList, aPos, aLen);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsresult InsertSecurityInfo(mozIStorageConnection* aConn,
|
|
|
|
nsICryptoHash* aCrypto, const nsACString& aData,
|
|
|
|
int32_t* aIdOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCrypto);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aIdOut);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!aData.IsEmpty());
|
2015-05-22 04:16:36 +03:00
|
|
|
|
|
|
|
// We want to use an index to find existing security blobs, but indexing
|
|
|
|
// the full blob would be quite expensive. Instead, we index a small
|
|
|
|
// hash value. Calculate this hash as the first 8 bytes of the SHA1 of
|
|
|
|
// the full data.
|
2015-06-17 03:39:05 +03:00
|
|
|
nsAutoCString hash;
|
|
|
|
nsresult rv = HashCString(aCrypto, aData, hash);
|
2015-05-22 04:16:36 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, search for an existing entry for this blob by comparing the hash
|
|
|
|
// value first and then the full data. SQLite is smart enough to use
|
|
|
|
// the index on the hash to search the table before doing the expensive
|
|
|
|
// comparison of the large data column. (This was verified with EXPLAIN.)
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
// Note that hash and data are blobs, but we can use = here since the
|
|
|
|
// columns are NOT NULL.
|
|
|
|
"SELECT id, refcount FROM security_info WHERE hash=:hash AND "
|
|
|
|
"data=:data;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(NS_LITERAL_CSTRING("hash"), hash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(NS_LITERAL_CSTRING("data"), aData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// This security info blob is already in the database
|
|
|
|
if (hasMoreData) {
|
|
|
|
// get the existing security blob id to return
|
|
|
|
rv = state->GetInt32(0, aIdOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t refcount = -1;
|
|
|
|
rv = state->GetInt32(1, &refcount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// But first, update the refcount in the database.
|
|
|
|
refcount += 1;
|
|
|
|
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
"UPDATE security_info SET refcount=:refcount WHERE id=:id;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("refcount"), refcount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("id"), *aIdOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// This is a new security info blob. Create a new row in the security table
|
|
|
|
// with an initial refcount of 1.
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("INSERT INTO security_info (hash, data, refcount) "
|
|
|
|
"VALUES (:hash, :data, 1);"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(NS_LITERAL_CSTRING("hash"), hash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(NS_LITERAL_CSTRING("data"), aData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT last_insert_rowid()"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->GetInt32(0, aIdOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult DeleteSecurityInfo(mozIStorageConnection* aConn, int32_t aId,
|
|
|
|
int32_t aCount) {
|
|
|
|
// First, we need to determine the current refcount for this security blob.
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("SELECT refcount FROM security_info WHERE id=:id;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("id"), aId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t refcount = -1;
|
|
|
|
rv = state->GetInt32(0, &refcount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(refcount >= aCount);
|
2015-05-22 04:16:36 +03:00
|
|
|
|
|
|
|
// Next, calculate the new refcount
|
|
|
|
int32_t newCount = refcount - aCount;
|
|
|
|
|
|
|
|
// If the last reference to this security blob was removed we can
|
|
|
|
// just remove the entire row.
|
|
|
|
if (newCount == 0) {
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("DELETE FROM security_info WHERE id=:id;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("id"), aId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise update the refcount in the table to reflect the reduced
|
|
|
|
// number of references to the security blob.
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
"UPDATE security_info SET refcount=:refcount WHERE id=:id;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("refcount"), newCount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("id"), aId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult DeleteSecurityInfoList(
|
|
|
|
mozIStorageConnection* aConn,
|
|
|
|
const nsTArray<IdCount>& aDeletedStorageIdList) {
|
|
|
|
for (uint32_t i = 0; i < aDeletedStorageIdList.Length(); ++i) {
|
|
|
|
nsresult rv = DeleteSecurityInfo(aConn, aDeletedStorageIdList[i].mId,
|
|
|
|
aDeletedStorageIdList[i].mCount);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult InsertEntry(mozIStorageConnection* aConn, CacheId aCacheId,
|
|
|
|
const CacheRequest& aRequest, const nsID* aRequestBodyId,
|
|
|
|
const CacheResponse& aResponse,
|
|
|
|
const nsID* aResponseBodyId) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-05-22 04:16:36 +03:00
|
|
|
nsresult rv = NS_OK;
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsCOMPtr<nsICryptoHash> crypto =
|
|
|
|
do_CreateInstance(NS_CRYPTO_HASH_CONTRACTID, &rv);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t securityId = -1;
|
2015-05-25 21:21:05 +03:00
|
|
|
if (!aResponse.channelInfo().securityInfo().IsEmpty()) {
|
2015-06-17 03:39:05 +03:00
|
|
|
rv = InsertSecurityInfo(
|
2015-05-25 21:21:05 +03:00
|
|
|
aConn, crypto, aResponse.channelInfo().securityInfo(), &securityId);
|
2015-05-22 04:16:36 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("INSERT INTO entries ("
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_method, "
|
|
|
|
"request_url_no_query, "
|
2015-06-17 03:39:05 +03:00
|
|
|
"request_url_no_query_hash, "
|
2015-06-17 03:39:05 +03:00
|
|
|
"request_url_query, "
|
2015-06-17 03:39:05 +03:00
|
|
|
"request_url_query_hash, "
|
2016-11-07 05:16:34 +03:00
|
|
|
"request_url_fragment, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_referrer, "
|
2016-02-27 22:08:58 +03:00
|
|
|
"request_referrer_policy, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_headers_guard, "
|
|
|
|
"request_mode, "
|
|
|
|
"request_credentials, "
|
2015-03-27 00:10:39 +03:00
|
|
|
"request_contentpolicytype, "
|
2015-03-22 20:12:43 +03:00
|
|
|
"request_cache, "
|
2015-09-01 00:26:30 +03:00
|
|
|
"request_redirect, "
|
2016-09-07 05:20:23 +03:00
|
|
|
"request_integrity, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_body_id, "
|
|
|
|
"response_type, "
|
|
|
|
"response_status, "
|
|
|
|
"response_status_text, "
|
|
|
|
"response_headers_guard, "
|
|
|
|
"response_body_id, "
|
2015-05-22 04:16:36 +03:00
|
|
|
"response_security_info_id, "
|
2015-06-05 07:39:34 +03:00
|
|
|
"response_principal_info, "
|
2017-07-10 11:54:20 +03:00
|
|
|
"response_padding_size, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"cache_id "
|
2015-05-20 16:51:19 +03:00
|
|
|
") VALUES ("
|
|
|
|
":request_method, "
|
|
|
|
":request_url_no_query, "
|
2015-06-17 03:39:05 +03:00
|
|
|
":request_url_no_query_hash, "
|
2015-06-17 03:39:05 +03:00
|
|
|
":request_url_query, "
|
2015-06-17 03:39:05 +03:00
|
|
|
":request_url_query_hash, "
|
2016-11-07 05:16:34 +03:00
|
|
|
":request_url_fragment, "
|
2015-05-20 16:51:19 +03:00
|
|
|
":request_referrer, "
|
2016-02-27 22:08:58 +03:00
|
|
|
":request_referrer_policy, "
|
2015-05-20 16:51:19 +03:00
|
|
|
":request_headers_guard, "
|
|
|
|
":request_mode, "
|
|
|
|
":request_credentials, "
|
|
|
|
":request_contentpolicytype, "
|
|
|
|
":request_cache, "
|
2015-09-01 00:26:30 +03:00
|
|
|
":request_redirect, "
|
2016-09-07 05:20:23 +03:00
|
|
|
":request_integrity, "
|
2015-05-20 16:51:19 +03:00
|
|
|
":request_body_id, "
|
|
|
|
":response_type, "
|
|
|
|
":response_status, "
|
|
|
|
":response_status_text, "
|
|
|
|
":response_headers_guard, "
|
|
|
|
":response_body_id, "
|
2015-05-22 04:16:36 +03:00
|
|
|
":response_security_info_id, "
|
2015-06-05 07:39:34 +03:00
|
|
|
":response_principal_info, "
|
2017-07-10 11:54:20 +03:00
|
|
|
":response_padding_size, "
|
2015-05-20 16:51:19 +03:00
|
|
|
":cache_id "
|
|
|
|
");"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("request_method"),
|
|
|
|
aRequest.method());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("request_url_no_query"),
|
|
|
|
aRequest.urlWithoutQuery());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsAutoCString urlWithoutQueryHash;
|
|
|
|
rv = HashCString(crypto, aRequest.urlWithoutQuery(), urlWithoutQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(
|
|
|
|
NS_LITERAL_CSTRING("request_url_no_query_hash"), urlWithoutQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("request_url_query"),
|
|
|
|
aRequest.urlQuery());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsAutoCString urlQueryHash;
|
|
|
|
rv = HashCString(crypto, aRequest.urlQuery(), urlQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
rv = state->BindUTF8StringAsBlobByName(
|
|
|
|
NS_LITERAL_CSTRING("request_url_query_hash"), urlQueryHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("request_url_fragment"),
|
|
|
|
aRequest.urlFragment());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-06-17 03:39:05 +03:00
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindStringByName(NS_LITERAL_CSTRING("request_referrer"),
|
|
|
|
aRequest.referrer());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2016-02-27 22:08:58 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("request_referrer_policy"),
|
|
|
|
static_cast<int32_t>(aRequest.referrerPolicy()));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("request_headers_guard"),
|
2015-03-02 16:20:00 +03:00
|
|
|
static_cast<int32_t>(aRequest.headersGuard()));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("request_mode"),
|
|
|
|
static_cast<int32_t>(aRequest.mode()));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("request_credentials"),
|
2015-03-02 16:20:00 +03:00
|
|
|
static_cast<int32_t>(aRequest.credentials()));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(
|
|
|
|
NS_LITERAL_CSTRING("request_contentpolicytype"),
|
2015-03-27 00:10:39 +03:00
|
|
|
static_cast<int32_t>(aRequest.contentPolicyType()));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("request_cache"),
|
2015-03-22 20:12:43 +03:00
|
|
|
static_cast<int32_t>(aRequest.requestCache()));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("request_redirect"),
|
|
|
|
static_cast<int32_t>(aRequest.requestRedirect()));
|
|
|
|
|
2016-09-07 05:20:23 +03:00
|
|
|
rv = state->BindStringByName(NS_LITERAL_CSTRING("request_integrity"),
|
|
|
|
aRequest.integrity());
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = BindId(state, NS_LITERAL_CSTRING("request_body_id"), aRequestBodyId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("response_type"),
|
|
|
|
static_cast<int32_t>(aResponse.type()));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("response_status"),
|
|
|
|
aResponse.status());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("response_status_text"),
|
|
|
|
aResponse.statusText());
|
2015-03-22 20:12:43 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("response_headers_guard"),
|
2015-03-02 16:20:00 +03:00
|
|
|
static_cast<int32_t>(aResponse.headersGuard()));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = BindId(state, NS_LITERAL_CSTRING("response_body_id"), aResponseBodyId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-25 21:21:05 +03:00
|
|
|
if (aResponse.channelInfo().securityInfo().IsEmpty()) {
|
2015-05-22 04:16:36 +03:00
|
|
|
rv = state->BindNullByName(NS_LITERAL_CSTRING("response_security_info_id"));
|
|
|
|
} else {
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("response_security_info_id"),
|
|
|
|
securityId);
|
|
|
|
}
|
2015-03-05 01:18:27 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-05 07:39:34 +03:00
|
|
|
nsAutoCString serializedInfo;
|
|
|
|
// We only allow content serviceworkers right now.
|
2019-03-05 17:41:42 +03:00
|
|
|
if (aResponse.principalInfo().isSome()) {
|
2015-06-05 07:39:34 +03:00
|
|
|
const mozilla::ipc::PrincipalInfo& principalInfo =
|
2019-03-05 17:41:42 +03:00
|
|
|
aResponse.principalInfo().ref();
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(principalInfo.type() ==
|
|
|
|
mozilla::ipc::PrincipalInfo::TContentPrincipalInfo);
|
2015-06-05 07:39:34 +03:00
|
|
|
const mozilla::ipc::ContentPrincipalInfo& cInfo =
|
|
|
|
principalInfo.get_ContentPrincipalInfo();
|
|
|
|
|
|
|
|
serializedInfo.Append(cInfo.spec());
|
|
|
|
|
|
|
|
nsAutoCString suffix;
|
2015-09-23 13:19:06 +03:00
|
|
|
cInfo.attrs().CreateSuffix(suffix);
|
2015-06-05 07:39:34 +03:00
|
|
|
serializedInfo.Append(suffix);
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringByName(
|
|
|
|
NS_LITERAL_CSTRING("response_principal_info"), serializedInfo);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
if (aResponse.paddingSize() == InternalResponse::UNKNOWN_PADDING_SIZE) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aResponse.type() != ResponseType::Opaque);
|
|
|
|
rv = state->BindNullByName(NS_LITERAL_CSTRING("response_padding_size"));
|
|
|
|
} else {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aResponse.paddingSize() >= 0);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aResponse.type() == ResponseType::Opaque);
|
|
|
|
|
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("response_padding_size"),
|
|
|
|
aResponse.paddingSize());
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt64ByName(NS_LITERAL_CSTRING("cache_id"), aCacheId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT last_insert_rowid()"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t entryId;
|
|
|
|
rv = state->GetInt32(0, &entryId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("INSERT INTO request_headers ("
|
|
|
|
"name, "
|
|
|
|
"value, "
|
|
|
|
"entry_id "
|
2015-05-20 16:51:19 +03:00
|
|
|
") VALUES (:name, :value, :entry_id)"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:15 +03:00
|
|
|
const nsTArray<HeadersEntry>& requestHeaders = aRequest.headers();
|
2015-03-02 16:20:00 +03:00
|
|
|
for (uint32_t i = 0; i < requestHeaders.Length(); ++i) {
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("name"),
|
|
|
|
requestHeaders[i].name());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("value"),
|
|
|
|
requestHeaders[i].value());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), entryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("INSERT INTO response_headers ("
|
|
|
|
"name, "
|
|
|
|
"value, "
|
|
|
|
"entry_id "
|
2015-05-20 16:51:19 +03:00
|
|
|
") VALUES (:name, :value, :entry_id)"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:15 +03:00
|
|
|
const nsTArray<HeadersEntry>& responseHeaders = aResponse.headers();
|
2015-03-02 16:20:00 +03:00
|
|
|
for (uint32_t i = 0; i < responseHeaders.Length(); ++i) {
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("name"),
|
|
|
|
responseHeaders[i].name());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("value"),
|
|
|
|
responseHeaders[i].value());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), entryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("INSERT INTO response_url_list ("
|
|
|
|
"url, "
|
|
|
|
"entry_id "
|
|
|
|
") VALUES (:url, :entry_id)"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
const nsTArray<nsCString>& responseUrlList = aResponse.urlList();
|
|
|
|
for (uint32_t i = 0; i < responseUrlList.Length(); ++i) {
|
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("url"),
|
|
|
|
responseUrlList[i]);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), entryId);
|
2016-05-03 04:48:40 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult ReadResponse(mozIStorageConnection* aConn, EntryId aEntryId,
|
|
|
|
SavedResponse* aSavedResponseOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSavedResponseOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
"SELECT "
|
2015-05-22 04:16:36 +03:00
|
|
|
"entries.response_type, "
|
|
|
|
"entries.response_status, "
|
|
|
|
"entries.response_status_text, "
|
|
|
|
"entries.response_headers_guard, "
|
|
|
|
"entries.response_body_id, "
|
2015-06-05 07:39:34 +03:00
|
|
|
"entries.response_principal_info, "
|
2017-07-10 11:54:20 +03:00
|
|
|
"entries.response_padding_size, "
|
2015-05-22 04:16:36 +03:00
|
|
|
"security_info.data "
|
2015-03-02 16:20:00 +03:00
|
|
|
"FROM entries "
|
2015-05-22 04:16:36 +03:00
|
|
|
"LEFT OUTER JOIN security_info "
|
|
|
|
"ON entries.response_security_info_id=security_info.id "
|
|
|
|
"WHERE entries.id=:id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("id"), aEntryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t type;
|
|
|
|
rv = state->GetInt32(0, &type);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedResponseOut->mValue.type() = static_cast<ResponseType>(type);
|
|
|
|
|
|
|
|
int32_t status;
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = state->GetInt32(1, &status);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedResponseOut->mValue.status() = status;
|
|
|
|
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = state->GetUTF8String(2, aSavedResponseOut->mValue.statusText());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t guard;
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = state->GetInt32(3, &guard);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedResponseOut->mValue.headersGuard() =
|
|
|
|
static_cast<HeadersGuardEnum>(guard);
|
|
|
|
|
|
|
|
bool nullBody = false;
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = state->GetIsNull(4, &nullBody);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedResponseOut->mHasBodyId = !nullBody;
|
|
|
|
|
|
|
|
if (aSavedResponseOut->mHasBodyId) {
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = ExtractId(state, 4, &aSavedResponseOut->mBodyId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-05 07:39:34 +03:00
|
|
|
nsAutoCString serializedInfo;
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = state->GetUTF8String(5, serializedInfo);
|
2015-06-03 01:02:05 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-06-05 07:39:34 +03:00
|
|
|
|
2019-03-05 17:41:42 +03:00
|
|
|
aSavedResponseOut->mValue.principalInfo() = Nothing();
|
2015-06-05 07:39:34 +03:00
|
|
|
if (!serializedInfo.IsEmpty()) {
|
2017-03-20 18:03:45 +03:00
|
|
|
nsAutoCString specNoSuffix;
|
2017-01-12 19:38:48 +03:00
|
|
|
OriginAttributes attrs;
|
2017-03-20 18:03:45 +03:00
|
|
|
if (!attrs.PopulateFromOrigin(serializedInfo, specNoSuffix)) {
|
2015-06-05 07:39:34 +03:00
|
|
|
NS_WARNING("Something went wrong parsing a serialized principal!");
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2017-11-15 13:19:26 +03:00
|
|
|
RefPtr<net::MozURL> url;
|
|
|
|
rv = net::MozURL::Init(getter_AddRefs(url), specNoSuffix);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
2018-03-08 21:24:15 +03:00
|
|
|
nsDependentCSubstring scheme = url->Scheme();
|
2017-11-15 13:19:26 +03:00
|
|
|
MOZ_ASSERT(scheme == "http" || scheme == "https" || scheme == "file");
|
|
|
|
#endif
|
|
|
|
|
|
|
|
nsCString origin;
|
2018-03-08 21:24:15 +03:00
|
|
|
url->Origin(origin);
|
2017-11-15 13:19:26 +03:00
|
|
|
|
2019-02-08 23:01:50 +03:00
|
|
|
nsCString baseDomain;
|
2019-02-23 19:01:22 +03:00
|
|
|
rv = url->BaseDomain(baseDomain);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
2019-02-08 23:01:50 +03:00
|
|
|
}
|
|
|
|
|
2015-06-05 07:39:34 +03:00
|
|
|
aSavedResponseOut->mValue.principalInfo() =
|
2019-03-05 17:41:42 +03:00
|
|
|
Some(mozilla::ipc::ContentPrincipalInfo(attrs, origin, specNoSuffix,
|
2019-05-22 02:14:27 +03:00
|
|
|
Nothing(), baseDomain));
|
2015-06-05 07:39:34 +03:00
|
|
|
}
|
|
|
|
|
2017-07-10 11:54:20 +03:00
|
|
|
bool nullPadding = false;
|
|
|
|
rv = state->GetIsNull(6, &nullPadding);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nullPadding) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSavedResponseOut->mValue.type() !=
|
|
|
|
ResponseType::Opaque);
|
|
|
|
aSavedResponseOut->mValue.paddingSize() =
|
|
|
|
InternalResponse::UNKNOWN_PADDING_SIZE;
|
|
|
|
} else {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSavedResponseOut->mValue.type() ==
|
|
|
|
ResponseType::Opaque);
|
|
|
|
int64_t paddingSize = 0;
|
|
|
|
rv = state->GetInt64(6, &paddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(paddingSize >= 0);
|
|
|
|
aSavedResponseOut->mValue.paddingSize() = paddingSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->GetBlobAsUTF8String(
|
|
|
|
7, aSavedResponseOut->mValue.channelInfo().securityInfo());
|
2015-03-05 01:18:27 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT "
|
|
|
|
"name, "
|
|
|
|
"value "
|
|
|
|
"FROM response_headers "
|
2015-05-20 16:51:19 +03:00
|
|
|
"WHERE entry_id=:entry_id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), aEntryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
2015-04-16 22:00:15 +03:00
|
|
|
HeadersEntry header;
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
rv = state->GetUTF8String(0, header.name());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->GetUTF8String(1, header.value());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aSavedResponseOut->mValue.headers().AppendElement(header);
|
|
|
|
}
|
|
|
|
|
2016-05-03 04:48:40 +03:00
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT "
|
|
|
|
"url "
|
|
|
|
"FROM response_url_list "
|
|
|
|
"WHERE entry_id=:entry_id;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), aEntryId);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
nsCString url;
|
|
|
|
|
|
|
|
rv = state->GetUTF8String(0, url);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aSavedResponseOut->mValue.urlList().AppendElement(url);
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult ReadRequest(mozIStorageConnection* aConn, EntryId aEntryId,
|
|
|
|
SavedRequest* aSavedRequestOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSavedRequestOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv =
|
|
|
|
aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT "
|
|
|
|
"request_method, "
|
|
|
|
"request_url_no_query, "
|
2015-06-17 03:39:05 +03:00
|
|
|
"request_url_query, "
|
2016-11-07 05:16:34 +03:00
|
|
|
"request_url_fragment, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_referrer, "
|
2016-02-27 22:08:58 +03:00
|
|
|
"request_referrer_policy, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_headers_guard, "
|
|
|
|
"request_mode, "
|
|
|
|
"request_credentials, "
|
2015-03-27 00:10:39 +03:00
|
|
|
"request_contentpolicytype, "
|
2015-03-22 20:12:43 +03:00
|
|
|
"request_cache, "
|
2015-09-01 00:26:30 +03:00
|
|
|
"request_redirect, "
|
2016-09-07 05:20:23 +03:00
|
|
|
"request_integrity, "
|
2015-03-02 16:20:00 +03:00
|
|
|
"request_body_id "
|
|
|
|
"FROM entries "
|
2015-05-20 16:51:19 +03:00
|
|
|
"WHERE id=:id;"),
|
2015-03-02 16:20:00 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("id"), aEntryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->GetUTF8String(0, aSavedRequestOut->mValue.method());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-06-17 03:39:05 +03:00
|
|
|
rv = state->GetUTF8String(1, aSavedRequestOut->mValue.urlWithoutQuery());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-06-17 03:39:05 +03:00
|
|
|
rv = state->GetUTF8String(2, aSavedRequestOut->mValue.urlQuery());
|
2015-06-17 03:39:05 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetUTF8String(3, aSavedRequestOut->mValue.urlFragment());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
rv = state->GetString(4, aSavedRequestOut->mValue.referrer());
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
int32_t referrerPolicy;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(5, &referrerPolicy);
|
2016-02-27 22:08:58 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.referrerPolicy() =
|
|
|
|
static_cast<ReferrerPolicy>(referrerPolicy);
|
2015-03-02 16:20:00 +03:00
|
|
|
int32_t guard;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(6, &guard);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.headersGuard() =
|
|
|
|
static_cast<HeadersGuardEnum>(guard);
|
|
|
|
int32_t mode;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(7, &mode);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.mode() = static_cast<RequestMode>(mode);
|
|
|
|
int32_t credentials;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(8, &credentials);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.credentials() =
|
|
|
|
static_cast<RequestCredentials>(credentials);
|
2015-03-27 00:10:39 +03:00
|
|
|
int32_t requestContentPolicyType;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(9, &requestContentPolicyType);
|
2015-03-27 00:10:39 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.contentPolicyType() =
|
|
|
|
static_cast<nsContentPolicyType>(requestContentPolicyType);
|
2015-03-22 20:12:43 +03:00
|
|
|
int32_t requestCache;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(10, &requestCache);
|
2015-03-22 20:12:43 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.requestCache() =
|
|
|
|
static_cast<RequestCache>(requestCache);
|
2015-09-01 00:26:30 +03:00
|
|
|
int32_t requestRedirect;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetInt32(11, &requestRedirect);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mValue.requestRedirect() =
|
|
|
|
static_cast<RequestRedirect>(requestRedirect);
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetString(12, aSavedRequestOut->mValue.integrity());
|
2016-09-07 05:20:23 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
bool nullBody = false;
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = state->GetIsNull(13, &nullBody);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
aSavedRequestOut->mHasBodyId = !nullBody;
|
|
|
|
if (aSavedRequestOut->mHasBodyId) {
|
2016-11-07 05:16:34 +03:00
|
|
|
rv = ExtractId(state, 13, &aSavedRequestOut->mBodyId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2017-10-03 17:02:49 +03:00
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("SELECT "
|
2018-11-30 13:46:48 +03:00
|
|
|
"name, "
|
|
|
|
"value "
|
2015-03-02 16:20:00 +03:00
|
|
|
"FROM request_headers "
|
2015-05-20 16:51:19 +03:00
|
|
|
"WHERE entry_id=:entry_id;"),
|
2016-02-27 22:08:58 +03:00
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = state->BindInt32ByName(NS_LITERAL_CSTRING("entry_id"), aEntryId);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
2015-04-16 22:00:15 +03:00
|
|
|
HeadersEntry header;
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
rv = state->GetUTF8String(0, header.name());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->GetUTF8String(1, header.value());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aSavedRequestOut->mValue.headers().AppendElement(header);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
void AppendListParamsToQuery(nsACString& aQuery,
|
|
|
|
const nsTArray<EntryId>& aEntryIdList,
|
|
|
|
uint32_t aPos, int32_t aLen) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT((aPos + aLen) <= aEntryIdList.Length());
|
2015-03-02 16:20:00 +03:00
|
|
|
for (int32_t i = aPos; i < aLen; ++i) {
|
|
|
|
if (i == 0) {
|
|
|
|
aQuery.AppendLiteral("?");
|
|
|
|
} else {
|
|
|
|
aQuery.AppendLiteral(",?");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult BindListParamsToQuery(mozIStorageStatement* aState,
|
|
|
|
const nsTArray<EntryId>& aEntryIdList,
|
|
|
|
uint32_t aPos, int32_t aLen) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT((aPos + aLen) <= aEntryIdList.Length());
|
2015-03-02 16:20:00 +03:00
|
|
|
for (int32_t i = aPos; i < aLen; ++i) {
|
2015-05-20 16:51:19 +03:00
|
|
|
nsresult rv = aState->BindInt32ByIndex(i, aEntryIdList[i]);
|
2015-03-02 16:20:00 +03:00
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:51:19 +03:00
|
|
|
nsresult BindId(mozIStorageStatement* aState, const nsACString& aName,
|
|
|
|
const nsID* aId) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aState);
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
if (!aId) {
|
2015-05-20 16:51:19 +03:00
|
|
|
rv = aState->BindNullByName(aName);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
char idBuf[NSID_LENGTH];
|
|
|
|
aId->ToProvidedString(idBuf);
|
2016-04-16 02:46:45 +03:00
|
|
|
rv = aState->BindUTF8StringByName(aName, nsDependentCString(idBuf));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult ExtractId(mozIStorageStatement* aState, uint32_t aPos, nsID* aIdOut) {
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aState);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aIdOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsAutoCString idString;
|
|
|
|
nsresult rv = aState->GetUTF8String(aPos, idString);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool success = aIdOut->Parse(idString.get());
|
|
|
|
if (NS_WARN_IF(!success)) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-05-22 04:16:37 +03:00
|
|
|
nsresult CreateAndBindKeyStatement(mozIStorageConnection* aConn,
|
|
|
|
const char* aQueryFormat,
|
|
|
|
const nsAString& aKey,
|
|
|
|
mozIStorageStatement** aStateOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aQueryFormat);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aStateOut);
|
2015-05-22 04:16:37 +03:00
|
|
|
|
|
|
|
// The key is stored as a blob to avoid encoding issues. An empty string
|
|
|
|
// is mapped to NULL for blobs. Normally we would just write the query
|
|
|
|
// as "key IS :key" to do the proper NULL checking, but that prevents
|
|
|
|
// sqlite from using the key index. Therefore use "IS NULL" explicitly
|
|
|
|
// if the key is empty, otherwise use "=:key" so that sqlite uses the
|
|
|
|
// index.
|
|
|
|
const char* constraint = nullptr;
|
|
|
|
if (aKey.IsEmpty()) {
|
|
|
|
constraint = "key IS NULL";
|
|
|
|
} else {
|
|
|
|
constraint = "key=:key";
|
|
|
|
}
|
|
|
|
|
|
|
|
nsPrintfCString query(aQueryFormat, constraint);
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(query, getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aKey.IsEmpty()) {
|
|
|
|
rv = state->BindStringAsBlobByName(NS_LITERAL_CSTRING("key"), aKey);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
state.forget(aStateOut);
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsresult HashCString(nsICryptoHash* aCrypto, const nsACString& aIn,
|
|
|
|
nsACString& aOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCrypto);
|
2015-06-17 03:39:05 +03:00
|
|
|
|
|
|
|
nsresult rv = aCrypto->Init(nsICryptoHash::SHA1);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aCrypto->Update(reinterpret_cast<const uint8_t*>(aIn.BeginReading()),
|
|
|
|
aIn.Length());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString fullHash;
|
|
|
|
rv = aCrypto->Finish(false /* based64 result */, fullHash);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aOut = Substring(fullHash, 0, 8);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-04-16 22:00:16 +03:00
|
|
|
|
2015-05-28 17:46:47 +03:00
|
|
|
nsresult IncrementalVacuum(mozIStorageConnection* aConn) {
|
|
|
|
// Determine how much free space is in the database.
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("PRAGMA freelist_count;"), getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t freePages = 0;
|
|
|
|
rv = state->GetInt32(0, &freePages);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We have a relatively small page size, so we want to be careful to avoid
|
|
|
|
// fragmentation. We already use a growth incremental which will cause
|
|
|
|
// sqlite to allocate and release multiple pages at the same time. We can
|
|
|
|
// further reduce fragmentation by making our allocated chunks a bit
|
|
|
|
// "sticky". This is done by creating some hysteresis where we allocate
|
|
|
|
// pages/chunks as soon as we need them, but we only release pages/chunks
|
|
|
|
// when we have a large amount of free space. This helps with the case
|
|
|
|
// where a page is adding and remove resources causing it to dip back and
|
|
|
|
// forth across a chunk boundary.
|
|
|
|
//
|
|
|
|
// So only proceed with releasing pages if we have more than our constant
|
|
|
|
// threshold.
|
|
|
|
if (freePages <= kMaxFreePages) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Release the excess pages back to the sqlite VFS. This may also release
|
|
|
|
// chunks of multiple pages back to the OS.
|
|
|
|
int32_t pagesToRelease = freePages - kMaxFreePages;
|
|
|
|
|
|
|
|
rv = aConn->ExecuteSimpleSQL(
|
|
|
|
nsPrintfCString("PRAGMA incremental_vacuum(%d);", pagesToRelease));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify that our incremental vacuum actually did something
|
|
|
|
#ifdef DEBUG
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("PRAGMA freelist_count;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
freePages = 0;
|
|
|
|
rv = state->GetInt32(0, &freePages);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_ASSERT(freePages <= kMaxFreePages);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
namespace {
|
|
|
|
|
2017-10-03 17:02:49 +03:00
|
|
|
// Wrapper around mozIStorageConnection::GetSchemaVersion() that compensates
|
|
|
|
// for hacky downgrade schema version tricks. See the block comments for
|
|
|
|
// kHackyDowngradeSchemaVersion and kHackyPaddingSizePresentVersion.
|
|
|
|
nsresult GetEffectiveSchemaVersion(mozIStorageConnection* aConn,
|
|
|
|
int32_t& schemaVersion) {
|
|
|
|
nsresult rv = aConn->GetSchemaVersion(&schemaVersion);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (schemaVersion == kHackyDowngradeSchemaVersion) {
|
|
|
|
// This is the special case. Check for the existence of the
|
|
|
|
// "response_padding_size" colum in table "entries".
|
|
|
|
//
|
|
|
|
// (pragma_table_info is a table-valued function format variant of
|
|
|
|
// "PRAGMA table_info" supported since SQLite 3.16.0. Firefox 53 shipped
|
|
|
|
// was the first release with this functionality, shipping 3.16.2.)
|
|
|
|
nsCOMPtr<mozIStorageStatement> stmt;
|
|
|
|
nsresult rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
"SELECT name FROM pragma_table_info('entries') WHERE "
|
|
|
|
"name = 'response_padding_size'"),
|
|
|
|
getter_AddRefs(stmt));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If there are any result rows, then the column is present.
|
|
|
|
bool hasColumn = false;
|
|
|
|
rv = stmt->ExecuteStep(&hasColumn);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (hasColumn) {
|
|
|
|
schemaVersion = kHackyPaddingSizePresentVersion;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
#ifdef DEBUG
|
|
|
|
struct Expect {
|
|
|
|
// Expect exact SQL
|
|
|
|
Expect(const char* aName, const char* aType, const char* aSql)
|
|
|
|
: mName(aName), mType(aType), mSql(aSql), mIgnoreSql(false) {}
|
|
|
|
|
|
|
|
// Ignore SQL
|
|
|
|
Expect(const char* aName, const char* aType)
|
|
|
|
: mName(aName), mType(aType), mIgnoreSql(true) {}
|
|
|
|
|
|
|
|
const nsCString mName;
|
|
|
|
const nsCString mType;
|
|
|
|
const nsCString mSql;
|
|
|
|
const bool mIgnoreSql;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
nsresult Validate(mozIStorageConnection* aConn) {
|
|
|
|
int32_t schemaVersion;
|
2017-10-03 17:02:49 +03:00
|
|
|
nsresult rv = GetEffectiveSchemaVersion(aConn, schemaVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NS_WARN_IF(schemaVersion != kLatestSchemaVersion)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
// This is the schema we expect the database at the latest version to
|
|
|
|
// contain. Update this list if you add a new table or index.
|
|
|
|
Expect expect[] = {
|
|
|
|
Expect("caches", "table", kTableCaches),
|
|
|
|
Expect("sqlite_sequence", "table"), // auto-gen by sqlite
|
|
|
|
Expect("security_info", "table", kTableSecurityInfo),
|
|
|
|
Expect("security_info_hash_index", "index", kIndexSecurityInfoHash),
|
|
|
|
Expect("entries", "table", kTableEntries),
|
|
|
|
Expect("entries_request_match_index", "index", kIndexEntriesRequest),
|
|
|
|
Expect("request_headers", "table", kTableRequestHeaders),
|
|
|
|
Expect("response_headers", "table", kTableResponseHeaders),
|
|
|
|
Expect("response_headers_name_index", "index", kIndexResponseHeadersName),
|
2016-05-03 04:48:40 +03:00
|
|
|
Expect("response_url_list", "table", kTableResponseUrlList),
|
2015-09-01 00:26:30 +03:00
|
|
|
Expect("storage", "table", kTableStorage),
|
|
|
|
Expect("sqlite_autoindex_storage_1", "index"), // auto-gen by sqlite
|
|
|
|
};
|
|
|
|
const uint32_t expectLength = sizeof(expect) / sizeof(Expect);
|
|
|
|
|
|
|
|
// Read the schema from the sqlite_master table and compare.
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING("SELECT name, type, sql FROM sqlite_master;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
while (NS_SUCCEEDED(state->ExecuteStep(&hasMoreData)) && hasMoreData) {
|
|
|
|
nsAutoCString name;
|
|
|
|
rv = state->GetUTF8String(0, name);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString type;
|
|
|
|
rv = state->GetUTF8String(1, type);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString sql;
|
|
|
|
rv = state->GetUTF8String(2, sql);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool foundMatch = false;
|
|
|
|
for (uint32_t i = 0; i < expectLength; ++i) {
|
|
|
|
if (name == expect[i].mName) {
|
|
|
|
if (type != expect[i].mType) {
|
|
|
|
NS_WARNING(
|
|
|
|
nsPrintfCString("Unexpected type for Cache schema entry %s",
|
|
|
|
name.get())
|
|
|
|
.get());
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!expect[i].mIgnoreSql && sql != expect[i].mSql) {
|
|
|
|
NS_WARNING(nsPrintfCString("Unexpected SQL for Cache schema entry %s",
|
|
|
|
name.get())
|
|
|
|
.get());
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
foundMatch = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NS_WARN_IF(!foundMatch)) {
|
|
|
|
NS_WARNING(nsPrintfCString("Unexpected schema entry %s in Cache database",
|
|
|
|
name.get())
|
|
|
|
.get());
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
// -----
|
|
|
|
// Schema migration code
|
|
|
|
// -----
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
typedef nsresult (*MigrationFunc)(mozIStorageConnection*, bool&);
|
2015-09-01 00:26:30 +03:00
|
|
|
struct Migration {
|
2016-07-09 00:39:53 +03:00
|
|
|
constexpr Migration(int32_t aFromVersion, MigrationFunc aFunc)
|
2015-09-01 00:26:30 +03:00
|
|
|
: mFromVersion(aFromVersion), mFunc(aFunc) {}
|
|
|
|
int32_t mFromVersion;
|
|
|
|
MigrationFunc mFunc;
|
|
|
|
};
|
|
|
|
|
|
|
|
// Declare migration functions here. Each function should upgrade
|
|
|
|
// the version by a single increment. Don't skip versions.
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult MigrateFrom15To16(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
|
|
|
nsresult MigrateFrom16To17(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
|
|
|
nsresult MigrateFrom17To18(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
|
|
|
nsresult MigrateFrom18To19(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
|
|
|
nsresult MigrateFrom19To20(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2016-05-03 04:48:40 +03:00
|
|
|
nsresult MigrateFrom20To21(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2016-09-07 05:20:23 +03:00
|
|
|
nsresult MigrateFrom21To22(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2016-10-25 16:27:01 +03:00
|
|
|
nsresult MigrateFrom22To23(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2016-11-07 05:16:34 +03:00
|
|
|
nsresult MigrateFrom23To24(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2017-02-15 17:55:58 +03:00
|
|
|
nsresult MigrateFrom24To25(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2017-07-10 11:45:56 +03:00
|
|
|
nsresult MigrateFrom25To26(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2017-10-03 17:02:49 +03:00
|
|
|
nsresult MigrateFrom26To27(mozIStorageConnection* aConn, bool& aRewriteSchema);
|
2015-09-01 00:26:30 +03:00
|
|
|
// Configure migration functions to run for the given starting version.
|
|
|
|
Migration sMigrationList[] = {
|
2015-09-16 00:50:09 +03:00
|
|
|
Migration(15, MigrateFrom15To16), Migration(16, MigrateFrom16To17),
|
2016-01-20 00:01:31 +03:00
|
|
|
Migration(17, MigrateFrom17To18), Migration(18, MigrateFrom18To19),
|
2016-05-03 04:48:40 +03:00
|
|
|
Migration(19, MigrateFrom19To20), Migration(20, MigrateFrom20To21),
|
2016-10-25 16:27:01 +03:00
|
|
|
Migration(21, MigrateFrom21To22), Migration(22, MigrateFrom22To23),
|
2017-02-15 17:55:58 +03:00
|
|
|
Migration(23, MigrateFrom23To24), Migration(24, MigrateFrom24To25),
|
2017-10-03 17:02:49 +03:00
|
|
|
Migration(25, MigrateFrom25To26), Migration(26, MigrateFrom26To27),
|
2015-09-01 00:26:30 +03:00
|
|
|
};
|
|
|
|
uint32_t sMigrationListLength = sizeof(sMigrationList) / sizeof(Migration);
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult RewriteEntriesSchema(mozIStorageConnection* aConn) {
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("PRAGMA writable_schema = ON"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(
|
|
|
|
NS_LITERAL_CSTRING(
|
|
|
|
"UPDATE sqlite_master SET sql=:sql WHERE name='entries'"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->BindUTF8StringByName(NS_LITERAL_CSTRING("sql"),
|
|
|
|
nsDependentCString(kTableEntries));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = state->Execute();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("PRAGMA writable_schema = OFF"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
nsresult Migrate(mozIStorageConnection* aConn) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-09-01 00:26:30 +03:00
|
|
|
|
|
|
|
int32_t currentVersion = 0;
|
2017-10-03 17:02:49 +03:00
|
|
|
nsresult rv = GetEffectiveSchemaVersion(aConn, currentVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
bool rewriteSchema = false;
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
while (currentVersion < kLatestSchemaVersion) {
|
|
|
|
// Wiping old databases is handled in DBAction because it requires
|
|
|
|
// making a whole new mozIStorageConnection. Make sure we don't
|
|
|
|
// accidentally get here for one of those old databases.
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(currentVersion >= kFirstShippedSchemaVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
|
|
|
|
for (uint32_t i = 0; i < sMigrationListLength; ++i) {
|
|
|
|
if (sMigrationList[i].mFromVersion == currentVersion) {
|
2016-02-27 22:08:58 +03:00
|
|
|
bool shouldRewrite = false;
|
|
|
|
rv = sMigrationList[i].mFunc(aConn, shouldRewrite);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2016-02-27 22:08:58 +03:00
|
|
|
if (shouldRewrite) {
|
|
|
|
rewriteSchema = true;
|
|
|
|
}
|
2015-09-01 00:26:30 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-26 19:53:35 +03:00
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
2017-01-06 23:41:15 +03:00
|
|
|
int32_t lastVersion = currentVersion;
|
|
|
|
#endif
|
2017-10-03 17:02:49 +03:00
|
|
|
rv = GetEffectiveSchemaVersion(aConn, currentVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(currentVersion > lastVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
}
|
|
|
|
|
2017-02-21 18:14:31 +03:00
|
|
|
// Don't release assert this since people do sometimes share profiles
|
|
|
|
// across schema versions. Our check in Validate() will catch it.
|
|
|
|
MOZ_ASSERT(currentVersion == kLatestSchemaVersion);
|
2015-09-01 00:26:30 +03:00
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
if (rewriteSchema) {
|
|
|
|
// Now overwrite the master SQL for the entries table to remove the column
|
|
|
|
// default value. This is also necessary for our Validate() method to
|
|
|
|
// pass on this database.
|
|
|
|
rv = RewriteEntriesSchema(aConn);
|
|
|
|
}
|
2015-09-16 00:50:09 +03:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult MigrateFrom15To16(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
2015-09-01 00:26:30 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-09-01 00:26:30 +03:00
|
|
|
|
|
|
|
// Add the request_redirect column with a default value of "follow". Note,
|
|
|
|
// we only use a default value here because its required by ALTER TABLE and
|
|
|
|
// we need to apply the default "follow" to existing records in the table.
|
|
|
|
// We don't actually want to keep the default in the schema for future
|
|
|
|
// INSERTs.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"ALTER TABLE entries "
|
|
|
|
"ADD COLUMN request_redirect INTEGER NOT NULL DEFAULT 0"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
rv = aConn->SetSchemaVersion(16);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
aRewriteSchema = true;
|
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult MigrateFrom16To17(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
2015-09-16 00:50:09 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2015-09-16 00:50:09 +03:00
|
|
|
|
|
|
|
// This migration path removes the response_redirected and
|
|
|
|
// response_redirected_url columns from the entries table. sqlite doesn't
|
|
|
|
// support removing a column from a table using ALTER TABLE, so we need to
|
|
|
|
// create a new table without those columns, fill it up with the existing
|
|
|
|
// data, and then drop the original table and rename the new one to the old
|
|
|
|
// one.
|
|
|
|
|
|
|
|
// Create a new_entries table with the new fields as of version 17.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"CREATE TABLE new_entries ("
|
|
|
|
"id INTEGER NOT NULL PRIMARY KEY, "
|
|
|
|
"request_method TEXT NOT NULL, "
|
|
|
|
"request_url_no_query TEXT NOT NULL, "
|
|
|
|
"request_url_no_query_hash BLOB NOT NULL, "
|
|
|
|
"request_url_query TEXT NOT NULL, "
|
|
|
|
"request_url_query_hash BLOB NOT NULL, "
|
|
|
|
"request_referrer TEXT NOT NULL, "
|
|
|
|
"request_headers_guard INTEGER NOT NULL, "
|
|
|
|
"request_mode INTEGER NOT NULL, "
|
|
|
|
"request_credentials INTEGER NOT NULL, "
|
|
|
|
"request_contentpolicytype INTEGER NOT NULL, "
|
|
|
|
"request_cache INTEGER NOT NULL, "
|
|
|
|
"request_body_id TEXT NULL, "
|
|
|
|
"response_type INTEGER NOT NULL, "
|
|
|
|
"response_url TEXT NOT NULL, "
|
|
|
|
"response_status INTEGER NOT NULL, "
|
|
|
|
"response_status_text TEXT NOT NULL, "
|
|
|
|
"response_headers_guard INTEGER NOT NULL, "
|
|
|
|
"response_body_id TEXT NULL, "
|
|
|
|
"response_security_info_id INTEGER NULL REFERENCES security_info(id), "
|
|
|
|
"response_principal_info TEXT NOT NULL, "
|
|
|
|
"cache_id INTEGER NOT NULL REFERENCES caches(id) ON DELETE CASCADE, "
|
|
|
|
"request_redirect INTEGER NOT NULL"
|
|
|
|
")"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy all of the data to the newly created table.
|
2015-09-01 00:26:30 +03:00
|
|
|
rv =
|
|
|
|
aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING("INSERT INTO new_entries ("
|
2015-09-16 00:50:09 +03:00
|
|
|
"id, "
|
|
|
|
"request_method, "
|
|
|
|
"request_url_no_query, "
|
|
|
|
"request_url_no_query_hash, "
|
|
|
|
"request_url_query, "
|
|
|
|
"request_url_query_hash, "
|
|
|
|
"request_referrer, "
|
|
|
|
"request_headers_guard, "
|
|
|
|
"request_mode, "
|
|
|
|
"request_credentials, "
|
|
|
|
"request_contentpolicytype, "
|
|
|
|
"request_cache, "
|
|
|
|
"request_redirect, "
|
|
|
|
"request_body_id, "
|
|
|
|
"response_type, "
|
|
|
|
"response_url, "
|
|
|
|
"response_status, "
|
|
|
|
"response_status_text, "
|
|
|
|
"response_headers_guard, "
|
|
|
|
"response_body_id, "
|
|
|
|
"response_security_info_id, "
|
|
|
|
"response_principal_info, "
|
|
|
|
"cache_id "
|
|
|
|
") SELECT "
|
|
|
|
"id, "
|
|
|
|
"request_method, "
|
|
|
|
"request_url_no_query, "
|
|
|
|
"request_url_no_query_hash, "
|
|
|
|
"request_url_query, "
|
|
|
|
"request_url_query_hash, "
|
|
|
|
"request_referrer, "
|
|
|
|
"request_headers_guard, "
|
|
|
|
"request_mode, "
|
|
|
|
"request_credentials, "
|
|
|
|
"request_contentpolicytype, "
|
|
|
|
"request_cache, "
|
|
|
|
"request_redirect, "
|
|
|
|
"request_body_id, "
|
|
|
|
"response_type, "
|
|
|
|
"response_url, "
|
|
|
|
"response_status, "
|
|
|
|
"response_status_text, "
|
|
|
|
"response_headers_guard, "
|
|
|
|
"response_body_id, "
|
|
|
|
"response_security_info_id, "
|
|
|
|
"response_principal_info, "
|
|
|
|
"cache_id "
|
|
|
|
"FROM entries;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the old table.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING("DROP TABLE entries;"));
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
// Rename new_entries to entries.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("ALTER TABLE new_entries RENAME to entries;"));
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
// Now, recreate our indices.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kIndexEntriesRequest));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Revalidate the foreign key constraints, and ensure that there are no
|
|
|
|
// violations.
|
2015-09-01 00:26:30 +03:00
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("PRAGMA foreign_key_check;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2015-09-16 00:50:09 +03:00
|
|
|
if (NS_WARN_IF(hasMoreData)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
2015-09-01 00:26:30 +03:00
|
|
|
|
2015-09-16 00:50:09 +03:00
|
|
|
rv = aConn->SetSchemaVersion(17);
|
2015-09-01 00:26:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult MigrateFrom17To18(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
2016-01-15 01:15:16 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-01-15 01:15:16 +03:00
|
|
|
|
|
|
|
// This migration is needed in order to remove "only-if-cached" RequestCache
|
|
|
|
// values from the database. This enum value was removed from the spec in
|
|
|
|
// https://github.com/whatwg/fetch/issues/39 but we unfortunately happily
|
|
|
|
// accepted this value in the Request constructor.
|
|
|
|
//
|
|
|
|
// There is no good value to upgrade this to, so we just stick to "default".
|
|
|
|
|
|
|
|
static_assert(int(RequestCache::Default) == 0,
|
|
|
|
"This is where the 0 below comes from!");
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("UPDATE entries SET request_cache = 0 "
|
|
|
|
"WHERE request_cache = 5;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(18);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult MigrateFrom18To19(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
2016-01-20 00:01:31 +03:00
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-01-20 00:01:31 +03:00
|
|
|
|
|
|
|
// This migration is needed in order to update the RequestMode values for
|
|
|
|
// Request objects corresponding to a navigation content policy type to
|
|
|
|
// "navigate".
|
|
|
|
|
|
|
|
static_assert(int(nsIContentPolicy::TYPE_DOCUMENT) == 6 &&
|
|
|
|
int(nsIContentPolicy::TYPE_SUBDOCUMENT) == 7 &&
|
|
|
|
int(nsIContentPolicy::TYPE_INTERNAL_FRAME) == 28 &&
|
|
|
|
int(nsIContentPolicy::TYPE_INTERNAL_IFRAME) == 29 &&
|
|
|
|
int(nsIContentPolicy::TYPE_REFRESH) == 8 &&
|
|
|
|
int(RequestMode::Navigate) == 3,
|
|
|
|
"This is where the numbers below come from!");
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"UPDATE entries SET request_mode = 3 "
|
|
|
|
"WHERE request_contentpolicytype IN (6, 7, 28, 29, 8);"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(19);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-02-27 22:08:58 +03:00
|
|
|
nsresult MigrateFrom19To20(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-02-27 22:08:58 +03:00
|
|
|
|
|
|
|
// Add the request_referrer_policy column with a default value of
|
|
|
|
// "no-referrer-when-downgrade". Note, we only use a default value here
|
|
|
|
// because its required by ALTER TABLE and we need to apply the default
|
|
|
|
// "no-referrer-when-downgrade" to existing records in the table. We don't
|
|
|
|
// actually want to keep the default in the schema for future INSERTs.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"ALTER TABLE entries "
|
|
|
|
"ADD COLUMN request_referrer_policy INTEGER NOT NULL DEFAULT 2"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(20);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aRewriteSchema = true;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-05-03 04:48:40 +03:00
|
|
|
nsresult MigrateFrom20To21(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-05-03 04:48:40 +03:00
|
|
|
|
|
|
|
// This migration creates response_url_list table to store response_url and
|
|
|
|
// removes the response_url column from the entries table.
|
|
|
|
// sqlite doesn't support removing a column from a table using ALTER TABLE,
|
|
|
|
// so we need to create a new table without those columns, fill it up with the
|
|
|
|
// existing data, and then drop the original table and rename the new one to
|
|
|
|
// the old one.
|
|
|
|
|
|
|
|
// Create a new_entries table with the new fields as of version 21.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"CREATE TABLE new_entries ("
|
|
|
|
"id INTEGER NOT NULL PRIMARY KEY, "
|
|
|
|
"request_method TEXT NOT NULL, "
|
|
|
|
"request_url_no_query TEXT NOT NULL, "
|
|
|
|
"request_url_no_query_hash BLOB NOT NULL, "
|
|
|
|
"request_url_query TEXT NOT NULL, "
|
|
|
|
"request_url_query_hash BLOB NOT NULL, "
|
|
|
|
"request_referrer TEXT NOT NULL, "
|
|
|
|
"request_headers_guard INTEGER NOT NULL, "
|
|
|
|
"request_mode INTEGER NOT NULL, "
|
|
|
|
"request_credentials INTEGER NOT NULL, "
|
|
|
|
"request_contentpolicytype INTEGER NOT NULL, "
|
|
|
|
"request_cache INTEGER NOT NULL, "
|
|
|
|
"request_body_id TEXT NULL, "
|
|
|
|
"response_type INTEGER NOT NULL, "
|
|
|
|
"response_status INTEGER NOT NULL, "
|
|
|
|
"response_status_text TEXT NOT NULL, "
|
|
|
|
"response_headers_guard INTEGER NOT NULL, "
|
|
|
|
"response_body_id TEXT NULL, "
|
|
|
|
"response_security_info_id INTEGER NULL REFERENCES security_info(id), "
|
|
|
|
"response_principal_info TEXT NOT NULL, "
|
|
|
|
"cache_id INTEGER NOT NULL REFERENCES caches(id) ON DELETE CASCADE, "
|
|
|
|
"request_redirect INTEGER NOT NULL, "
|
|
|
|
"request_referrer_policy INTEGER NOT NULL"
|
|
|
|
")"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a response_url_list table with the new fields as of version 21.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"CREATE TABLE response_url_list ("
|
|
|
|
"url TEXT NOT NULL, "
|
|
|
|
"entry_id INTEGER NOT NULL REFERENCES entries(id) ON DELETE CASCADE"
|
|
|
|
")"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy all of the data to the newly created entries table.
|
|
|
|
rv =
|
|
|
|
aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING("INSERT INTO new_entries ("
|
|
|
|
"id, "
|
|
|
|
"request_method, "
|
|
|
|
"request_url_no_query, "
|
|
|
|
"request_url_no_query_hash, "
|
|
|
|
"request_url_query, "
|
|
|
|
"request_url_query_hash, "
|
|
|
|
"request_referrer, "
|
|
|
|
"request_headers_guard, "
|
|
|
|
"request_mode, "
|
|
|
|
"request_credentials, "
|
|
|
|
"request_contentpolicytype, "
|
|
|
|
"request_cache, "
|
|
|
|
"request_redirect, "
|
|
|
|
"request_referrer_policy, "
|
|
|
|
"request_body_id, "
|
|
|
|
"response_type, "
|
|
|
|
"response_status, "
|
|
|
|
"response_status_text, "
|
|
|
|
"response_headers_guard, "
|
|
|
|
"response_body_id, "
|
|
|
|
"response_security_info_id, "
|
|
|
|
"response_principal_info, "
|
|
|
|
"cache_id "
|
|
|
|
") SELECT "
|
|
|
|
"id, "
|
|
|
|
"request_method, "
|
|
|
|
"request_url_no_query, "
|
|
|
|
"request_url_no_query_hash, "
|
|
|
|
"request_url_query, "
|
|
|
|
"request_url_query_hash, "
|
|
|
|
"request_referrer, "
|
|
|
|
"request_headers_guard, "
|
|
|
|
"request_mode, "
|
|
|
|
"request_credentials, "
|
|
|
|
"request_contentpolicytype, "
|
|
|
|
"request_cache, "
|
|
|
|
"request_redirect, "
|
|
|
|
"request_referrer_policy, "
|
|
|
|
"request_body_id, "
|
|
|
|
"response_type, "
|
|
|
|
"response_status, "
|
|
|
|
"response_status_text, "
|
|
|
|
"response_headers_guard, "
|
|
|
|
"response_body_id, "
|
|
|
|
"response_security_info_id, "
|
|
|
|
"response_principal_info, "
|
|
|
|
"cache_id "
|
|
|
|
"FROM entries;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy reponse_url to the newly created response_url_list table.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("INSERT INTO response_url_list ("
|
|
|
|
"url, "
|
|
|
|
"entry_id "
|
|
|
|
") SELECT "
|
|
|
|
"response_url, "
|
|
|
|
"id "
|
|
|
|
"FROM entries;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the old table.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING("DROP TABLE entries;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Rename new_entries to entries.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("ALTER TABLE new_entries RENAME to entries;"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now, recreate our indices.
|
|
|
|
rv = aConn->ExecuteSimpleSQL(nsDependentCString(kIndexEntriesRequest));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Revalidate the foreign key constraints, and ensure that there are no
|
|
|
|
// violations.
|
|
|
|
nsCOMPtr<mozIStorageStatement> state;
|
|
|
|
rv = aConn->CreateStatement(NS_LITERAL_CSTRING("PRAGMA foreign_key_check;"),
|
|
|
|
getter_AddRefs(state));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hasMoreData = false;
|
|
|
|
rv = state->ExecuteStep(&hasMoreData);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(hasMoreData)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(21);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aRewriteSchema = true;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
2016-01-15 01:15:16 +03:00
|
|
|
|
2016-09-07 05:20:23 +03:00
|
|
|
nsresult MigrateFrom21To22(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-09-07 05:20:23 +03:00
|
|
|
|
|
|
|
// Add the request_integrity column.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("ALTER TABLE entries "
|
|
|
|
"ADD COLUMN request_integrity TEXT NULL"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(22);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aRewriteSchema = true;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-10-25 16:27:01 +03:00
|
|
|
nsresult MigrateFrom22To23(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-10-25 16:27:01 +03:00
|
|
|
|
|
|
|
// The only change between 22 and 23 was a different snappy compression
|
|
|
|
// format, but it's backwards-compatible.
|
|
|
|
nsresult rv = aConn->SetSchemaVersion(23);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2016-11-07 05:16:34 +03:00
|
|
|
return rv;
|
|
|
|
}
|
2017-02-15 17:55:58 +03:00
|
|
|
|
2016-11-07 05:16:34 +03:00
|
|
|
nsresult MigrateFrom23To24(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2016-11-07 05:16:34 +03:00
|
|
|
|
|
|
|
// Add the request_url_fragment column.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(NS_LITERAL_CSTRING(
|
|
|
|
"ALTER TABLE entries "
|
|
|
|
"ADD COLUMN request_url_fragment TEXT NOT NULL DEFAULT ''"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(24);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aRewriteSchema = true;
|
2016-10-25 16:27:01 +03:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-02-15 17:55:58 +03:00
|
|
|
nsresult MigrateFrom24To25(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
|
|
|
|
// The only change between 24 and 25 was a new nsIContentPolicy type.
|
|
|
|
nsresult rv = aConn->SetSchemaVersion(25);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 11:45:56 +03:00
|
|
|
nsresult MigrateFrom25To26(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
|
|
|
|
// Add the response_padding_size column.
|
|
|
|
// Note: only opaque repsonse should be non-null interger.
|
|
|
|
nsresult rv = aConn->ExecuteSimpleSQL(
|
|
|
|
NS_LITERAL_CSTRING("ALTER TABLE entries "
|
|
|
|
"ADD COLUMN response_padding_size INTEGER NULL "));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-09-11 09:57:06 +03:00
|
|
|
rv = aConn->ExecuteSimpleSQL(
|
2017-09-08 10:56:53 +03:00
|
|
|
NS_LITERAL_CSTRING("UPDATE entries SET response_padding_size = 0 "
|
|
|
|
"WHERE response_type = 4" // opaque response
|
2017-07-10 11:45:56 +03:00
|
|
|
));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aConn->SetSchemaVersion(26);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
aRewriteSchema = true;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-10-03 17:02:49 +03:00
|
|
|
nsresult MigrateFrom26To27(mozIStorageConnection* aConn, bool& aRewriteSchema) {
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
|
|
|
|
nsresult rv = aConn->SetSchemaVersion(kHackyDowngradeSchemaVersion);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
} // anonymous namespace
|
2015-04-16 22:00:16 +03:00
|
|
|
} // namespace db
|
2015-03-02 16:20:00 +03:00
|
|
|
} // namespace cache
|
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|