2015-03-02 16:20:00 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "mozilla/dom/cache/FileUtils.h"
|
|
|
|
|
2017-10-26 14:35:08 +03:00
|
|
|
#include "DBSchema.h"
|
2017-07-10 12:02:44 +03:00
|
|
|
#include "mozilla/dom/InternalResponse.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "mozilla/dom/quota/FileStreams.h"
|
2017-05-23 13:33:47 +03:00
|
|
|
#include "mozilla/dom/quota/QuotaManager.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "mozilla/SnappyCompressOutputStream.h"
|
2016-08-23 07:09:32 +03:00
|
|
|
#include "mozilla/Unused.h"
|
2017-10-05 06:06:28 +03:00
|
|
|
#include "nsIObjectInputStream.h"
|
|
|
|
#include "nsIObjectOutputStream.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "nsIFile.h"
|
|
|
|
#include "nsIUUIDGenerator.h"
|
2015-07-07 05:17:00 +03:00
|
|
|
#include "nsNetCID.h"
|
2017-07-18 13:57:54 +03:00
|
|
|
#include "nsNetUtil.h"
|
2015-07-06 08:55:00 +03:00
|
|
|
#include "nsISimpleEnumerator.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "nsServiceManagerUtils.h"
|
|
|
|
#include "nsString.h"
|
|
|
|
#include "nsThreadUtils.h"
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
namespace cache {
|
|
|
|
|
|
|
|
using mozilla::dom::quota::FileInputStream;
|
|
|
|
using mozilla::dom::quota::FileOutputStream;
|
|
|
|
using mozilla::dom::quota::PERSISTENCE_TYPE_DEFAULT;
|
2017-05-23 13:33:47 +03:00
|
|
|
using mozilla::dom::quota::QuotaManager;
|
2017-07-10 12:02:44 +03:00
|
|
|
using mozilla::dom::quota::QuotaObject;
|
2015-04-16 22:00:16 +03:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2017-07-10 12:03:24 +03:00
|
|
|
// Const variable for generate padding size.
|
|
|
|
// XXX This will be tweaked to something more meaningful in Bug 1383656.
|
|
|
|
const int64_t kRoundUpNumber = 20480;
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
enum BodyFileType { BODY_FILE_FINAL, BODY_FILE_TMP };
|
|
|
|
|
|
|
|
nsresult BodyIdToFile(nsIFile* aBaseDir, const nsID& aId, BodyFileType aType,
|
|
|
|
nsIFile** aBodyFileOut);
|
|
|
|
|
2017-07-10 12:03:24 +03:00
|
|
|
int64_t RoundUp(const int64_t aX, const int64_t aY);
|
|
|
|
|
|
|
|
// The alogrithm for generating padding refers to the mitigation approach in
|
|
|
|
// https://github.com/whatwg/storage/issues/31.
|
|
|
|
// First, generate a random number between 0 and 100kB.
|
|
|
|
// Next, round up the sum of random number and response size to the nearest
|
|
|
|
// 20kB.
|
|
|
|
// Finally, the virtual padding size will be the result minus the response size.
|
|
|
|
int64_t BodyGeneratePadding(const int64_t aBodyFileSize,
|
|
|
|
const uint32_t aPaddingInfo);
|
2017-07-10 12:02:44 +03:00
|
|
|
|
2017-07-18 13:57:54 +03:00
|
|
|
nsresult LockedDirectoryPaddingWrite(nsIFile* aBaseDir,
|
|
|
|
DirPaddingFile aPaddingFileType,
|
|
|
|
int64_t aPaddingSize);
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
// static
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult BodyCreateDir(nsIFile* aBaseDir) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> aBodyDir;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(aBodyDir));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aBodyDir->Append(NS_LITERAL_STRING("morgue"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aBodyDir->Create(nsIFile::DIRECTORY_TYPE, 0755);
|
|
|
|
if (rv == NS_ERROR_FILE_ALREADY_EXISTS) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-03-05 01:05:37 +03:00
|
|
|
// static
|
2017-05-23 13:33:47 +03:00
|
|
|
nsresult BodyDeleteDir(const QuotaInfo& aQuotaInfo, nsIFile* aBaseDir) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
2015-03-05 01:05:37 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> aBodyDir;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(aBodyDir));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aBodyDir->Append(NS_LITERAL_STRING("morgue"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFileRecursively(aQuotaInfo, aBodyDir);
|
2015-03-05 01:05:37 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
// static
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult BodyGetCacheDir(nsIFile* aBaseDir, const nsID& aId,
|
|
|
|
nsIFile** aCacheDirOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCacheDirOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aCacheDirOut = nullptr;
|
|
|
|
|
|
|
|
nsresult rv = aBaseDir->Clone(aCacheDirOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(*aCacheDirOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
rv = (*aCacheDirOut)->Append(NS_LITERAL_STRING("morgue"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Some file systems have poor performance when there are too many files
|
|
|
|
// in a single directory. Mitigate this issue by spreading the body
|
|
|
|
// files out into sub-directories. We use the last byte of the ID for
|
|
|
|
// the name of the sub-directory.
|
|
|
|
nsAutoString subDirName;
|
|
|
|
subDirName.AppendInt(aId.m3[7]);
|
|
|
|
rv = (*aCacheDirOut)->Append(subDirName);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = (*aCacheDirOut)->Create(nsIFile::DIRECTORY_TYPE, 0755);
|
|
|
|
if (rv == NS_ERROR_FILE_ALREADY_EXISTS) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult BodyStartWriteStream(const QuotaInfo& aQuotaInfo, nsIFile* aBaseDir,
|
|
|
|
nsIInputStream* aSource, void* aClosure,
|
|
|
|
nsAsyncCopyCallbackFun aCallback, nsID* aIdOut,
|
|
|
|
nsISupports** aCopyContextOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aSource);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aClosure);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCallback);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aIdOut);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCopyContextOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIUUIDGenerator> idGen =
|
|
|
|
do_GetService("@mozilla.org/uuid-generator;1", &rv);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = idGen->GenerateUUIDInPlace(aIdOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> finalFile;
|
|
|
|
rv = BodyIdToFile(aBaseDir, *aIdOut, BODY_FILE_FINAL,
|
|
|
|
getter_AddRefs(finalFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool exists;
|
|
|
|
rv = finalFile->Exists(&exists);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(exists)) {
|
|
|
|
return NS_ERROR_FILE_ALREADY_EXISTS;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> tmpFile;
|
|
|
|
rv = BodyIdToFile(aBaseDir, *aIdOut, BODY_FILE_TMP, getter_AddRefs(tmpFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = tmpFile->Exists(&exists);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(exists)) {
|
|
|
|
return NS_ERROR_FILE_ALREADY_EXISTS;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIOutputStream> fileStream = CreateFileOutputStream(
|
2018-08-20 15:32:33 +03:00
|
|
|
PERSISTENCE_TYPE_DEFAULT, aQuotaInfo.mGroup, aQuotaInfo.mOrigin, tmpFile);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(!fileStream)) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<SnappyCompressOutputStream> compressed =
|
2015-03-02 16:20:00 +03:00
|
|
|
new SnappyCompressOutputStream(fileStream);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIEventTarget> target =
|
|
|
|
do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID);
|
|
|
|
|
|
|
|
rv = NS_AsyncCopy(aSource, compressed, target, NS_ASYNCCOPY_VIA_WRITESEGMENTS,
|
|
|
|
compressed->BlockSize(), aCallback, aClosure, true,
|
|
|
|
true, // close streams
|
|
|
|
aCopyContextOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2015-04-16 22:00:16 +03:00
|
|
|
void BodyCancelWrite(nsIFile* aBaseDir, nsISupports* aCopyContext) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aCopyContext);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsresult rv = NS_CancelAsyncCopy(aCopyContext, NS_ERROR_ABORT);
|
2015-11-02 08:53:26 +03:00
|
|
|
Unused << NS_WARN_IF(NS_FAILED(rv));
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
// The partially written file must be cleaned up after the async copy
|
|
|
|
// makes its callback.
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult BodyFinalizeWrite(nsIFile* aBaseDir, const nsID& aId) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> tmpFile;
|
|
|
|
nsresult rv =
|
|
|
|
BodyIdToFile(aBaseDir, aId, BODY_FILE_TMP, getter_AddRefs(tmpFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> finalFile;
|
|
|
|
rv = BodyIdToFile(aBaseDir, aId, BODY_FILE_FINAL, getter_AddRefs(finalFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoString finalFileName;
|
|
|
|
rv = finalFile->GetLeafName(finalFileName);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
// It's fine to not notify the QuotaManager that the path has been changed,
|
|
|
|
// because its path will be updated and its size will be recalculated when
|
|
|
|
// opening file next time.
|
2015-03-02 16:20:00 +03:00
|
|
|
rv = tmpFile->RenameTo(nullptr, finalFileName);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2015-04-16 22:00:16 +03:00
|
|
|
nsresult BodyOpen(const QuotaInfo& aQuotaInfo, nsIFile* aBaseDir,
|
|
|
|
const nsID& aId, nsIInputStream** aStreamOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aStreamOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> finalFile;
|
|
|
|
nsresult rv =
|
|
|
|
BodyIdToFile(aBaseDir, aId, BODY_FILE_FINAL, getter_AddRefs(finalFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool exists;
|
|
|
|
rv = finalFile->Exists(&exists);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(!exists)) {
|
|
|
|
return NS_ERROR_FILE_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> fileStream =
|
2018-08-20 15:32:33 +03:00
|
|
|
CreateFileInputStream(PERSISTENCE_TYPE_DEFAULT, aQuotaInfo.mGroup,
|
|
|
|
aQuotaInfo.mOrigin, finalFile);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (NS_WARN_IF(!fileStream)) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
fileStream.forget(aStreamOut);
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 12:02:44 +03:00
|
|
|
// static
|
|
|
|
nsresult BodyMaybeUpdatePaddingSize(const QuotaInfo& aQuotaInfo,
|
|
|
|
nsIFile* aBaseDir, const nsID& aId,
|
2017-07-10 12:03:24 +03:00
|
|
|
const uint32_t aPaddingInfo,
|
|
|
|
int64_t* aPaddingSizeOut) {
|
2017-07-10 12:02:44 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aPaddingSizeOut);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> bodyFile;
|
|
|
|
nsresult rv =
|
|
|
|
BodyIdToFile(aBaseDir, aId, BODY_FILE_TMP, getter_AddRefs(bodyFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(bodyFile);
|
|
|
|
|
|
|
|
QuotaManager* quotaManager = QuotaManager::Get();
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(quotaManager);
|
|
|
|
|
|
|
|
int64_t fileSize = 0;
|
|
|
|
RefPtr<QuotaObject> quotaObject =
|
|
|
|
quotaManager->GetQuotaObject(PERSISTENCE_TYPE_DEFAULT, aQuotaInfo.mGroup,
|
2018-11-29 23:48:34 +03:00
|
|
|
aQuotaInfo.mOrigin, bodyFile, -1, &fileSize);
|
2017-07-10 12:02:44 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(quotaObject);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(fileSize >= 0);
|
2017-12-06 05:12:24 +03:00
|
|
|
// XXXtt: bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1422815
|
|
|
|
if (!quotaObject) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
2017-07-10 12:02:44 +03:00
|
|
|
|
|
|
|
if (*aPaddingSizeOut == InternalResponse::UNKNOWN_PADDING_SIZE) {
|
2017-07-10 12:03:24 +03:00
|
|
|
*aPaddingSizeOut = BodyGeneratePadding(fileSize, aPaddingInfo);
|
2017-07-10 12:02:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(*aPaddingSizeOut >= 0);
|
|
|
|
|
|
|
|
if (!quotaObject->IncreaseSize(*aPaddingSizeOut)) {
|
|
|
|
return NS_ERROR_FILE_NO_DEVICE_SPACE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
// static
|
2017-05-23 13:33:47 +03:00
|
|
|
nsresult BodyDeleteFiles(const QuotaInfo& aQuotaInfo, nsIFile* aBaseDir,
|
|
|
|
const nsTArray<nsID>& aIdList) {
|
2015-03-02 16:20:00 +03:00
|
|
|
nsresult rv = NS_OK;
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < aIdList.Length(); ++i) {
|
|
|
|
nsCOMPtr<nsIFile> tmpFile;
|
|
|
|
rv = BodyIdToFile(aBaseDir, aIdList[i], BODY_FILE_TMP,
|
|
|
|
getter_AddRefs(tmpFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFile(aQuotaInfo, tmpFile);
|
2015-03-02 16:20:00 +03:00
|
|
|
// Only treat file deletion as a hard failure in DEBUG builds. Users
|
|
|
|
// can unfortunately hit this on windows if anti-virus is scanning files,
|
|
|
|
// etc.
|
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> finalFile;
|
|
|
|
rv = BodyIdToFile(aBaseDir, aIdList[i], BODY_FILE_FINAL,
|
|
|
|
getter_AddRefs(finalFile));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFile(aQuotaInfo, finalFile);
|
2015-03-02 16:20:00 +03:00
|
|
|
// Again, only treat removal as hard failure in debug build.
|
2015-04-15 10:54:19 +03:00
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:16 +03:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
nsresult BodyIdToFile(nsIFile* aBaseDir, const nsID& aId, BodyFileType aType,
|
|
|
|
nsIFile** aBodyFileOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBodyFileOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
*aBodyFileOut = nullptr;
|
|
|
|
|
|
|
|
nsresult rv = BodyGetCacheDir(aBaseDir, aId, aBodyFileOut);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(*aBodyFileOut);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
char idString[NSID_LENGTH];
|
|
|
|
aId.ToProvidedString(idString);
|
|
|
|
|
|
|
|
NS_ConvertASCIItoUTF16 fileName(idString);
|
|
|
|
|
|
|
|
if (aType == BODY_FILE_FINAL) {
|
|
|
|
fileName.AppendLiteral(".final");
|
|
|
|
} else {
|
|
|
|
fileName.AppendLiteral(".tmp");
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = (*aBodyFileOut)->Append(fileName);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 12:03:24 +03:00
|
|
|
int64_t RoundUp(const int64_t aX, const int64_t aY) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aX >= 0);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aY > 0);
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(INT64_MAX - ((aX - 1) / aY) * aY >= aY);
|
|
|
|
return aY + ((aX - 1) / aY) * aY;
|
|
|
|
}
|
|
|
|
|
|
|
|
int64_t BodyGeneratePadding(const int64_t aBodyFileSize,
|
|
|
|
const uint32_t aPaddingInfo) {
|
|
|
|
// Generate padding
|
|
|
|
int64_t randomSize = static_cast<int64_t>(aPaddingInfo);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(INT64_MAX - aBodyFileSize >= randomSize);
|
|
|
|
randomSize += aBodyFileSize;
|
|
|
|
|
|
|
|
return RoundUp(randomSize, kRoundUpNumber) - aBodyFileSize;
|
2017-07-10 12:02:44 +03:00
|
|
|
}
|
|
|
|
|
2017-07-18 13:57:54 +03:00
|
|
|
nsresult LockedDirectoryPaddingWrite(nsIFile* aBaseDir,
|
|
|
|
DirPaddingFile aPaddingFileType,
|
|
|
|
int64_t aPaddingSize) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aPaddingSize >= 0);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(file));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aPaddingFileType == DirPaddingFile::TMP_FILE) {
|
|
|
|
rv = file->Append(NS_LITERAL_STRING(PADDING_TMP_FILE_NAME));
|
|
|
|
} else {
|
|
|
|
rv = file->Append(NS_LITERAL_STRING(PADDING_FILE_NAME));
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIOutputStream> outputStream;
|
|
|
|
rv = NS_NewLocalFileOutputStream(getter_AddRefs(outputStream), file);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-10-05 06:06:28 +03:00
|
|
|
nsCOMPtr<nsIObjectOutputStream> objectStream =
|
|
|
|
NS_NewObjectOutputStream(outputStream);
|
2017-07-18 13:57:54 +03:00
|
|
|
|
2017-10-05 06:06:28 +03:00
|
|
|
rv = objectStream->Write64(aPaddingSize);
|
2017-07-18 13:57:54 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-04-16 22:00:16 +03:00
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
nsresult BodyDeleteOrphanedFiles(const QuotaInfo& aQuotaInfo, nsIFile* aBaseDir,
|
|
|
|
nsTArray<nsID>& aKnownBodyIdList) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
2015-06-26 08:22:46 +03:00
|
|
|
|
|
|
|
// body files are stored in a directory structure like:
|
|
|
|
//
|
|
|
|
// /morgue/01/{01fdddb2-884d-4c3d-95ba-0c8062f6c325}.final
|
|
|
|
// /morgue/02/{02fdddb2-884d-4c3d-95ba-0c8062f6c325}.tmp
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> dir;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(dir));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the root morgue directory
|
|
|
|
rv = dir->Append(NS_LITERAL_STRING("morgue"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2018-05-20 06:17:45 +03:00
|
|
|
nsCOMPtr<nsIDirectoryEnumerator> entries;
|
2015-06-26 08:22:46 +03:00
|
|
|
rv = dir->GetDirectoryEntries(getter_AddRefs(entries));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Iterate over all the intermediate morgue subdirs
|
2018-05-20 06:17:45 +03:00
|
|
|
nsCOMPtr<nsIFile> subdir;
|
|
|
|
while (NS_SUCCEEDED(rv = entries->GetNextFile(getter_AddRefs(subdir))) &&
|
|
|
|
subdir) {
|
2015-06-26 08:22:46 +03:00
|
|
|
bool isDir = false;
|
|
|
|
rv = subdir->IsDirectory(&isDir);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If a file got in here somehow, try to remove it and move on
|
|
|
|
if (NS_WARN_IF(!isDir)) {
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFile(aQuotaInfo, subdir);
|
2015-06-26 08:22:46 +03:00
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2018-05-20 06:17:45 +03:00
|
|
|
nsCOMPtr<nsIDirectoryEnumerator> subEntries;
|
2015-06-26 08:22:46 +03:00
|
|
|
rv = subdir->GetDirectoryEntries(getter_AddRefs(subEntries));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now iterate over all the files in the subdir
|
2018-05-20 06:17:45 +03:00
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
while (NS_SUCCEEDED(rv = subEntries->GetNextFile(getter_AddRefs(file))) &&
|
|
|
|
file) {
|
2015-06-26 08:22:46 +03:00
|
|
|
nsAutoCString leafName;
|
|
|
|
rv = file->GetNativeLeafName(leafName);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete all tmp files regardless of known bodies. These are
|
|
|
|
// all considered orphans.
|
|
|
|
if (StringEndsWith(leafName, NS_LITERAL_CSTRING(".tmp"))) {
|
|
|
|
// remove recursively in case its somehow a directory
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFileRecursively(aQuotaInfo, file);
|
2015-06-26 08:22:46 +03:00
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCString suffix(NS_LITERAL_CSTRING(".final"));
|
|
|
|
|
|
|
|
// Otherwise, it must be a .final file. If its not, then just
|
|
|
|
// skip it.
|
|
|
|
if (NS_WARN_IF(!StringEndsWith(leafName, suffix) ||
|
|
|
|
leafName.Length() != NSID_LENGTH - 1 + suffix.Length())) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, parse the uuid out of the name. If its fails to parse,
|
|
|
|
// the ignore the file.
|
|
|
|
nsID id;
|
|
|
|
if (NS_WARN_IF(!id.Parse(leafName.BeginReading()))) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aKnownBodyIdList.Contains(id)) {
|
|
|
|
// remove recursively in case its somehow a directory
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFileRecursively(aQuotaInfo, file);
|
2015-06-26 08:22:46 +03:00
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
nsresult GetMarkerFileHandle(const QuotaInfo& aQuotaInfo, nsIFile** aFileOut) {
|
2017-01-06 23:41:15 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aFileOut);
|
2015-06-26 08:22:46 +03:00
|
|
|
|
2015-06-26 08:22:46 +03:00
|
|
|
nsCOMPtr<nsIFile> marker;
|
|
|
|
nsresult rv = aQuotaInfo.mDir->Clone(getter_AddRefs(marker));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = marker->Append(NS_LITERAL_STRING("cache"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = marker->Append(NS_LITERAL_STRING("context_open.marker"));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-26 08:22:46 +03:00
|
|
|
marker.forget(aFileOut);
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-06-26 08:22:46 +03:00
|
|
|
|
|
|
|
nsresult CreateMarkerFile(const QuotaInfo& aQuotaInfo) {
|
|
|
|
nsCOMPtr<nsIFile> marker;
|
|
|
|
nsresult rv = GetMarkerFileHandle(aQuotaInfo, getter_AddRefs(marker));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2015-06-26 08:22:46 +03:00
|
|
|
rv = marker->Create(nsIFile::NORMAL_FILE_TYPE, 0644);
|
|
|
|
if (rv == NS_ERROR_FILE_ALREADY_EXISTS) {
|
|
|
|
rv = NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Note, we don't need to fsync here. We only care about actually
|
|
|
|
// writing the marker if later modifications to the Cache are
|
|
|
|
// actually flushed to the disk. If the OS crashes before the marker
|
|
|
|
// is written then we are ensured no other changes to the Cache were
|
|
|
|
// flushed either.
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult DeleteMarkerFile(const QuotaInfo& aQuotaInfo) {
|
|
|
|
nsCOMPtr<nsIFile> marker;
|
2015-06-26 08:22:46 +03:00
|
|
|
nsresult rv = GetMarkerFileHandle(aQuotaInfo, getter_AddRefs(marker));
|
2015-06-26 08:22:46 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFile(aQuotaInfo, marker);
|
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
2015-06-26 08:22:46 +03:00
|
|
|
|
|
|
|
// Again, no fsync is necessary. If the OS crashes before the file
|
|
|
|
// removal is flushed, then the Cache will search for stale data on
|
|
|
|
// startup. This will cause the next Cache access to be a bit slow, but
|
|
|
|
// it seems appropriate after an OS crash.
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-06-26 08:22:46 +03:00
|
|
|
bool MarkerFileExists(const QuotaInfo& aQuotaInfo) {
|
|
|
|
nsCOMPtr<nsIFile> marker;
|
|
|
|
nsresult rv = GetMarkerFileHandle(aQuotaInfo, getter_AddRefs(marker));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool exists = false;
|
|
|
|
rv = marker->Exists(&exists);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return exists;
|
|
|
|
}
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
// static
|
|
|
|
nsresult RemoveNsIFileRecursively(const QuotaInfo& aQuotaInfo, nsIFile* aFile) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aFile);
|
|
|
|
|
|
|
|
bool isDirectory = false;
|
|
|
|
nsresult rv = aFile->IsDirectory(&isDirectory);
|
|
|
|
if (rv == NS_ERROR_FILE_NOT_FOUND ||
|
|
|
|
rv == NS_ERROR_FILE_TARGET_DOES_NOT_EXIST) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isDirectory) {
|
|
|
|
return RemoveNsIFile(aQuotaInfo, aFile);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unfortunately, we need to traverse all the entries and delete files one by
|
|
|
|
// one to update their usages to the QuotaManager.
|
2018-05-20 06:17:45 +03:00
|
|
|
nsCOMPtr<nsIDirectoryEnumerator> entries;
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = aFile->GetDirectoryEntries(getter_AddRefs(entries));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2018-05-20 06:17:45 +03:00
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
while (NS_SUCCEEDED((rv = entries->GetNextFile(getter_AddRefs(file)))) &&
|
|
|
|
file) {
|
2017-05-23 13:33:47 +03:00
|
|
|
rv = RemoveNsIFileRecursively(aQuotaInfo, file);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2017-07-18 13:57:54 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
2017-05-23 13:33:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// In the end, remove the folder
|
|
|
|
rv = aFile->Remove(/* recursive */ false);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
nsresult RemoveNsIFile(const QuotaInfo& aQuotaInfo, nsIFile* aFile) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aFile);
|
|
|
|
|
|
|
|
int64_t fileSize = 0;
|
|
|
|
nsresult rv = aFile->GetFileSize(&fileSize);
|
|
|
|
if (rv == NS_ERROR_FILE_NOT_FOUND ||
|
|
|
|
rv == NS_ERROR_FILE_TARGET_DOES_NOT_EXIST) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aFile->Remove(/* recursive */ false);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-10 12:02:44 +03:00
|
|
|
if (fileSize > 0) {
|
|
|
|
DecreaseUsageForQuotaInfo(aQuotaInfo, fileSize);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
void DecreaseUsageForQuotaInfo(const QuotaInfo& aQuotaInfo,
|
|
|
|
const int64_t& aUpdatingSize) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aUpdatingSize > 0);
|
|
|
|
|
2017-05-23 13:33:47 +03:00
|
|
|
QuotaManager* quotaManager = QuotaManager::Get();
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(quotaManager);
|
|
|
|
|
|
|
|
quotaManager->DecreaseUsageForOrigin(PERSISTENCE_TYPE_DEFAULT,
|
|
|
|
aQuotaInfo.mGroup, aQuotaInfo.mOrigin,
|
2017-07-10 12:02:44 +03:00
|
|
|
aUpdatingSize);
|
2017-05-23 13:33:47 +03:00
|
|
|
}
|
|
|
|
|
2017-07-18 13:57:54 +03:00
|
|
|
// static
|
|
|
|
bool DirectoryPaddingFileExists(nsIFile* aBaseDir,
|
|
|
|
DirPaddingFile aPaddingFileType) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(file));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsString fileName;
|
|
|
|
if (aPaddingFileType == DirPaddingFile::TMP_FILE) {
|
|
|
|
fileName = NS_LITERAL_STRING(PADDING_TMP_FILE_NAME);
|
|
|
|
} else {
|
|
|
|
fileName = NS_LITERAL_STRING(PADDING_FILE_NAME);
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = file->Append(fileName);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool exists = false;
|
|
|
|
rv = file->Exists(&exists);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return exists;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
nsresult LockedDirectoryPaddingGet(nsIFile* aBaseDir,
|
|
|
|
int64_t* aPaddingSizeOut) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aPaddingSizeOut);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
|
|
!DirectoryPaddingFileExists(aBaseDir, DirPaddingFile::TMP_FILE));
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(file));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = file->Append(NS_LITERAL_STRING(PADDING_FILE_NAME));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> stream;
|
|
|
|
rv = NS_NewLocalFileInputStream(getter_AddRefs(stream), file);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> bufferedStream;
|
2017-10-19 12:39:30 +03:00
|
|
|
rv = NS_NewBufferedInputStream(getter_AddRefs(bufferedStream),
|
|
|
|
stream.forget(), 512);
|
2017-07-18 13:57:54 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-10-05 06:06:28 +03:00
|
|
|
nsCOMPtr<nsIObjectInputStream> objectStream =
|
|
|
|
NS_NewObjectInputStream(bufferedStream);
|
2017-07-18 13:57:54 +03:00
|
|
|
|
|
|
|
uint64_t paddingSize = 0;
|
2017-10-05 06:06:28 +03:00
|
|
|
rv = objectStream->Read64(&paddingSize);
|
2017-07-18 13:57:54 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aPaddingSizeOut = paddingSize;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
nsresult LockedDirectoryPaddingInit(nsIFile* aBaseDir) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
|
|
|
|
nsresult rv = LockedDirectoryPaddingWrite(aBaseDir, DirPaddingFile::FILE, 0);
|
|
|
|
Unused << NS_WARN_IF(NS_FAILED(rv));
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2017-07-18 14:00:09 +03:00
|
|
|
nsresult LockedUpdateDirectoryPaddingFile(nsIFile* aBaseDir,
|
|
|
|
mozIStorageConnection* aConn,
|
|
|
|
const int64_t aIncreaseSize,
|
|
|
|
const int64_t aDecreaseSize,
|
|
|
|
const bool aTemporaryFileExist) {
|
2017-07-18 13:57:54 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aIncreaseSize >= 0);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aDecreaseSize >= 0);
|
|
|
|
|
|
|
|
int64_t currentPaddingSize = 0;
|
2017-09-09 04:30:05 +03:00
|
|
|
nsresult rv = NS_OK;
|
|
|
|
if (aTemporaryFileExist ||
|
|
|
|
NS_WARN_IF(NS_FAILED(
|
|
|
|
rv = LockedDirectoryPaddingGet(aBaseDir, ¤tPaddingSize)))) {
|
2017-07-18 13:57:54 +03:00
|
|
|
// Fail to read padding size from the dir padding file, so try to restore.
|
|
|
|
if (rv != NS_ERROR_FILE_NOT_FOUND &&
|
|
|
|
rv != NS_ERROR_FILE_TARGET_DOES_NOT_EXIST) {
|
|
|
|
// Not delete the temporary padding file here, because we're going to
|
|
|
|
// overwrite it below anyway.
|
|
|
|
rv = LockedDirectoryPaddingDeleteFile(aBaseDir, DirPaddingFile::FILE);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-18 13:58:56 +03:00
|
|
|
// We don't need to add the aIncreaseSize or aDecreaseSize here, because
|
|
|
|
// it's already encompassed within the database.
|
|
|
|
rv = db::FindOverallPaddingSize(aConn, ¤tPaddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
2017-07-18 13:57:54 +03:00
|
|
|
} else {
|
2017-10-06 10:18:06 +03:00
|
|
|
bool shouldRevise = false;
|
2017-07-18 13:57:54 +03:00
|
|
|
if (aIncreaseSize > 0) {
|
2017-10-06 10:18:06 +03:00
|
|
|
if (INT64_MAX - currentPaddingSize < aDecreaseSize) {
|
|
|
|
shouldRevise = true;
|
|
|
|
} else {
|
|
|
|
currentPaddingSize += aIncreaseSize;
|
|
|
|
}
|
2017-07-18 13:57:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (aDecreaseSize > 0) {
|
2017-10-06 10:18:06 +03:00
|
|
|
if (currentPaddingSize < aDecreaseSize) {
|
|
|
|
shouldRevise = true;
|
|
|
|
} else if (!shouldRevise) {
|
|
|
|
currentPaddingSize -= aDecreaseSize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (shouldRevise) {
|
|
|
|
// If somehow runing into this condition, the tracking padding size is
|
|
|
|
// incorrect.
|
|
|
|
// Delete padding file to indicate the padding size is incorrect for
|
|
|
|
// avoiding error happening in the following lines.
|
|
|
|
rv = LockedDirectoryPaddingDeleteFile(aBaseDir, DirPaddingFile::FILE);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
int64_t paddingSizeFromDB = 0;
|
|
|
|
rv = db::FindOverallPaddingSize(aConn, &paddingSizeFromDB);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
currentPaddingSize = paddingSizeFromDB;
|
|
|
|
|
|
|
|
// XXXtt: we should have an easy way to update (increase or recalulate)
|
|
|
|
// padding size in the QM. For now, only correct the padding size in
|
|
|
|
// padding file and make QM be able to get the correct size in the next QM
|
|
|
|
// initialization.
|
|
|
|
// We still want to catch this in the debug build.
|
|
|
|
MOZ_ASSERT(false, "The padding size is unsync with QM");
|
2017-07-18 13:57:54 +03:00
|
|
|
}
|
2017-07-18 13:58:56 +03:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
int64_t paddingSizeFromDB = 0;
|
|
|
|
rv = db::FindOverallPaddingSize(aConn, &paddingSizeFromDB);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(paddingSizeFromDB == currentPaddingSize);
|
|
|
|
#endif // DEBUG
|
2017-07-18 13:57:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(currentPaddingSize >= 0);
|
|
|
|
|
|
|
|
rv = LockedDirectoryPaddingTemporaryWrite(aBaseDir, currentPaddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
nsresult LockedDirectoryPaddingTemporaryWrite(nsIFile* aBaseDir,
|
|
|
|
int64_t aPaddingSize) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aPaddingSize >= 0);
|
|
|
|
|
|
|
|
nsresult rv = LockedDirectoryPaddingWrite(aBaseDir, DirPaddingFile::TMP_FILE,
|
|
|
|
aPaddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
nsresult LockedDirectoryPaddingFinalizeWrite(nsIFile* aBaseDir) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
|
|
DirectoryPaddingFileExists(aBaseDir, DirPaddingFile::TMP_FILE));
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(file));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = file->Append(NS_LITERAL_STRING(PADDING_TMP_FILE_NAME));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = file->RenameTo(nullptr, NS_LITERAL_STRING(PADDING_FILE_NAME));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2017-10-05 12:30:40 +03:00
|
|
|
nsresult LockedDirectoryPaddingRestore(nsIFile* aBaseDir,
|
|
|
|
mozIStorageConnection* aConn,
|
|
|
|
bool aMustRestore,
|
|
|
|
int64_t* aPaddingSizeOut) {
|
2017-07-18 13:57:54 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aConn);
|
2017-10-05 12:30:40 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aPaddingSizeOut);
|
2017-07-18 13:57:54 +03:00
|
|
|
|
|
|
|
// The content of padding file is untrusted, so remove it here.
|
|
|
|
nsresult rv =
|
|
|
|
LockedDirectoryPaddingDeleteFile(aBaseDir, DirPaddingFile::FILE);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2017-07-18 13:58:56 +03:00
|
|
|
int64_t paddingSize = 0;
|
|
|
|
rv = db::FindOverallPaddingSize(aConn, &paddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(paddingSize >= 0);
|
2017-10-05 12:30:40 +03:00
|
|
|
*aPaddingSizeOut = paddingSize;
|
2017-07-18 13:58:56 +03:00
|
|
|
|
2017-10-05 12:30:40 +03:00
|
|
|
rv = LockedDirectoryPaddingWrite(aBaseDir, DirPaddingFile::FILE, paddingSize);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
// If we cannot write the correct padding size to file, just keep the
|
|
|
|
// temporary file and let the padding size to be recalculate in the next
|
|
|
|
// action
|
|
|
|
return aMustRestore ? rv : NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = LockedDirectoryPaddingDeleteFile(aBaseDir, DirPaddingFile::TMP_FILE);
|
|
|
|
Unused << NS_WARN_IF(NS_FAILED(rv));
|
2017-07-18 13:57:54 +03:00
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
nsresult LockedDirectoryPaddingDeleteFile(nsIFile* aBaseDir,
|
|
|
|
DirPaddingFile aPaddingFileType) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aBaseDir);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
nsresult rv = aBaseDir->Clone(getter_AddRefs(file));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aPaddingFileType == DirPaddingFile::TMP_FILE) {
|
|
|
|
rv = file->Append(NS_LITERAL_STRING(PADDING_TMP_FILE_NAME));
|
|
|
|
} else {
|
|
|
|
rv = file->Append(NS_LITERAL_STRING(PADDING_FILE_NAME));
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = file->Remove(/* recursive */ false);
|
|
|
|
if (rv == NS_ERROR_FILE_NOT_FOUND ||
|
|
|
|
rv == NS_ERROR_FILE_TARGET_DOES_NOT_EXIST) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
} // namespace cache
|
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|