tdlight/td/telegram/TdDb.cpp

686 lines
24 KiB
C++
Raw Normal View History

//
2022-12-31 22:28:08 +01:00
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2023
//
// Distributed under the Boost Software License, Version 1.0. (See accompanying
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
//
#include "td/telegram/TdDb.h"
#include "td/telegram/AttachMenuManager.h"
#include "td/telegram/DialogDb.h"
#include "td/telegram/files/FileDb.h"
#include "td/telegram/Global.h"
#include "td/telegram/logevent/LogEvent.h"
2022-11-09 18:35:22 +01:00
#include "td/telegram/MessageDb.h"
2022-11-10 17:46:17 +01:00
#include "td/telegram/MessageThreadDb.h"
#include "td/telegram/Td.h"
#include "td/telegram/Version.h"
#include "td/db/binlog/Binlog.h"
#include "td/db/binlog/ConcurrentBinlog.h"
#include "td/db/BinlogKeyValue.h"
#include "td/db/SqliteConnectionSafe.h"
#include "td/db/SqliteDb.h"
#include "td/db/SqliteKeyValue.h"
#include "td/db/SqliteKeyValueAsync.h"
#include "td/db/SqliteKeyValueSafe.h"
2022-06-14 15:11:38 +02:00
#include "td/actor/actor.h"
2021-09-18 23:47:05 +02:00
#include "td/actor/MultiPromise.h"
#include "td/utils/common.h"
#include "td/utils/format.h"
#include "td/utils/logging.h"
#include "td/utils/misc.h"
#include "td/utils/port/Clocks.h"
#include "td/utils/port/path.h"
#include "td/utils/port/Stat.h"
#include "td/utils/Random.h"
#include "td/utils/SliceBuilder.h"
#include "td/utils/StringBuilder.h"
#include <algorithm>
namespace td {
namespace {
2023-03-13 20:29:56 +01:00
std::string get_binlog_path(const TdDb::Parameters &parameters) {
return PSTRING() << parameters.database_directory_ << "td" << (parameters.is_test_dc_ ? "_test" : "") << ".binlog";
}
2023-03-13 20:29:56 +01:00
std::string get_sqlite_path(const TdDb::Parameters &parameters) {
const string db_name = "db" + (parameters.is_test_dc_ ? string("_test") : string());
return parameters.database_directory_ + db_name + ".sqlite";
}
Status init_binlog(Binlog &binlog, string path, BinlogKeyValue<Binlog> &binlog_pmc, BinlogKeyValue<Binlog> &config_pmc,
2022-06-10 15:44:53 +02:00
TdDb::OpenedDatabase &events, DbKey key) {
auto r_binlog_stat = stat(path);
if (r_binlog_stat.is_ok()) {
2023-01-04 15:49:53 +01:00
auto since_last_open = Clocks::system() - static_cast<double>(r_binlog_stat.ok().mtime_nsec_) * 1e-9;
if (since_last_open >= 86400) {
LOG(WARNING) << "Binlog wasn't opened for " << since_last_open << " seconds";
}
if (since_last_open > 0 && since_last_open < 1e12) {
events.since_last_open = static_cast<int64>(since_last_open);
}
}
auto callback = [&](const BinlogEvent &event) {
switch (event.type_) {
case LogEvent::HandlerType::SecretChats:
events.to_secret_chats_manager.push_back(event.clone());
break;
case LogEvent::HandlerType::Users:
events.user_events.push_back(event.clone());
break;
case LogEvent::HandlerType::Chats:
events.chat_events.push_back(event.clone());
break;
case LogEvent::HandlerType::Channels:
events.channel_events.push_back(event.clone());
break;
case LogEvent::HandlerType::SecretChatInfos:
events.secret_chat_events.push_back(event.clone());
break;
case LogEvent::HandlerType::WebPages:
events.web_page_events.push_back(event.clone());
break;
case LogEvent::HandlerType::SetPollAnswer:
case LogEvent::HandlerType::StopPoll:
events.to_poll_manager.push_back(event.clone());
break;
case LogEvent::HandlerType::SendMessage:
case LogEvent::HandlerType::DeleteMessage:
case LogEvent::HandlerType::DeleteMessagesOnServer:
case LogEvent::HandlerType::ReadHistoryOnServer:
case LogEvent::HandlerType::ReadMessageContentsOnServer:
case LogEvent::HandlerType::ForwardMessages:
case LogEvent::HandlerType::SendBotStartMessage:
case LogEvent::HandlerType::SendScreenshotTakenNotificationMessage:
case LogEvent::HandlerType::SendInlineQueryResultMessage:
case LogEvent::HandlerType::DeleteDialogHistoryOnServer:
case LogEvent::HandlerType::ReadAllDialogMentionsOnServer:
case LogEvent::HandlerType::DeleteAllChannelMessagesFromSenderOnServer:
case LogEvent::HandlerType::ToggleDialogIsPinnedOnServer:
case LogEvent::HandlerType::ReorderPinnedDialogsOnServer:
case LogEvent::HandlerType::SaveDialogDraftMessageOnServer:
case LogEvent::HandlerType::UpdateDialogNotificationSettingsOnServer:
case LogEvent::HandlerType::ResetAllNotificationSettingsOnServer:
case LogEvent::HandlerType::ToggleDialogReportSpamStateOnServer:
2021-10-27 14:27:09 +02:00
case LogEvent::HandlerType::RegetDialog:
case LogEvent::HandlerType::GetChannelDifference:
case LogEvent::HandlerType::ReadHistoryInSecretChat:
case LogEvent::HandlerType::ToggleDialogIsMarkedAsUnreadOnServer:
case LogEvent::HandlerType::SetDialogFolderIdOnServer:
case LogEvent::HandlerType::DeleteScheduledMessagesOnServer:
case LogEvent::HandlerType::ToggleDialogIsBlockedOnServer:
case LogEvent::HandlerType::ReadMessageThreadHistoryOnServer:
case LogEvent::HandlerType::BlockMessageSenderFromRepliesOnServer:
case LogEvent::HandlerType::UnpinAllDialogMessagesOnServer:
case LogEvent::HandlerType::DeleteAllCallMessagesOnServer:
2021-10-25 19:39:22 +02:00
case LogEvent::HandlerType::DeleteDialogMessagesByDateOnServer:
2022-01-30 10:37:24 +01:00
case LogEvent::HandlerType::ReadAllDialogReactionsOnServer:
2022-10-29 23:35:37 +02:00
case LogEvent::HandlerType::DeleteTopicHistoryOnServer:
case LogEvent::HandlerType::ToggleDialogIsTranslatableOnServer:
events.to_messages_manager.push_back(event.clone());
break;
case LogEvent::HandlerType::UpdateScopeNotificationSettingsOnServer:
events.to_notification_settings_manager.push_back(event.clone());
break;
case LogEvent::HandlerType::AddMessagePushNotification:
case LogEvent::HandlerType::EditMessagePushNotification:
events.to_notification_manager.push_back(event.clone());
break;
case LogEvent::HandlerType::SaveAppLog:
events.save_app_log_events.push_back(event.clone());
break;
case LogEvent::HandlerType::BinlogPmcMagic:
binlog_pmc.external_init_handle(event);
break;
case LogEvent::HandlerType::ConfigPmcMagic:
config_pmc.external_init_handle(event);
break;
default:
LOG(FATAL) << "Unsupported log event type " << event.type_;
}
};
2022-12-30 21:13:40 +01:00
auto init_status = binlog.init(std::move(path), callback, std::move(key));
if (init_status.is_error()) {
if (init_status.code() == static_cast<int>(Binlog::Error::WrongPassword)) {
return Status::Error(401, "Wrong database encryption key");
}
return Status::Error(400, init_status.message());
}
return Status::OK();
}
} // namespace
std::shared_ptr<FileDbInterface> TdDb::get_file_db_shared() {
return file_db_;
}
std::shared_ptr<SqliteConnectionSafe> &TdDb::get_sqlite_connection_safe() {
return sql_connection_;
}
BinlogInterface *TdDb::get_binlog_impl(const char *file, int line) {
LOG_CHECK(binlog_) << G()->close_flag() << " " << file << " " << line;
return binlog_.get();
}
std::shared_ptr<KeyValueSyncInterface> TdDb::get_binlog_pmc_shared() {
CHECK(binlog_pmc_);
return binlog_pmc_;
}
std::shared_ptr<KeyValueSyncInterface> TdDb::get_config_pmc_shared() {
CHECK(config_pmc_);
return config_pmc_;
}
2022-10-21 23:38:04 +02:00
KeyValueSyncInterface *TdDb::get_binlog_pmc_impl(const char *file, int line) {
LOG_CHECK(binlog_pmc_) << G()->close_flag() << ' ' << file << ' ' << line;
return binlog_pmc_.get();
}
KeyValueSyncInterface *TdDb::get_config_pmc() {
CHECK(config_pmc_);
return config_pmc_.get();
}
SqliteKeyValue *TdDb::get_sqlite_sync_pmc() {
CHECK(common_kv_safe_);
return &common_kv_safe_->get();
}
SqliteKeyValueAsyncInterface *TdDb::get_sqlite_pmc() {
CHECK(common_kv_async_);
return common_kv_async_.get();
}
2022-11-09 18:35:22 +01:00
MessageDbSyncInterface *TdDb::get_message_db_sync() {
return &message_db_sync_safe_->get();
}
2022-11-10 17:46:17 +01:00
2022-11-09 18:35:22 +01:00
MessageDbAsyncInterface *TdDb::get_message_db_async() {
return message_db_async_.get();
}
2022-11-10 17:46:17 +01:00
MessageThreadDbSyncInterface *TdDb::get_message_thread_db_sync() {
return &message_thread_db_sync_safe_->get();
}
MessageThreadDbAsyncInterface *TdDb::get_message_thread_db_async() {
return message_thread_db_async_.get();
}
DialogDbSyncInterface *TdDb::get_dialog_db_sync() {
return &dialog_db_sync_safe_->get();
}
2022-11-10 17:46:17 +01:00
DialogDbAsyncInterface *TdDb::get_dialog_db_async() {
return dialog_db_async_.get();
}
void TdDb::flush_all() {
LOG(INFO) << "Flush all databases";
2022-11-09 18:35:22 +01:00
if (message_db_async_) {
message_db_async_->force_flush();
}
2022-11-10 17:46:17 +01:00
if (message_thread_db_async_) {
message_thread_db_async_->force_flush();
}
2022-11-10 17:20:17 +01:00
if (dialog_db_async_) {
dialog_db_async_->force_flush();
}
binlog_->force_flush();
}
void TdDb::close_all(Promise<> on_finished) {
LOG(INFO) << "Close all databases";
do_close(std::move(on_finished), false /*destroy_flag*/);
}
void TdDb::close_and_destroy_all(Promise<> on_finished) {
LOG(INFO) << "Destroy all databases";
do_close(std::move(on_finished), true /*destroy_flag*/);
}
void TdDb::do_close(Promise<> on_finished, bool destroy_flag) {
MultiPromiseActorSafe mpas{"TdDbCloseMultiPromiseActor"};
mpas.add_promise(PromiseCreator::lambda(
[promise = std::move(on_finished), sql_connection = std::move(sql_connection_), destroy_flag](Unit) mutable {
if (sql_connection) {
LOG_CHECK(sql_connection.unique()) << sql_connection.use_count();
if (destroy_flag) {
sql_connection->close_and_destroy();
} else {
sql_connection->close();
}
sql_connection.reset();
}
promise.set_value(Unit());
}));
auto lock = mpas.get_promise();
if (file_db_) {
file_db_->close(mpas.get_promise());
file_db_.reset();
}
common_kv_safe_.reset();
if (common_kv_async_) {
common_kv_async_->close(mpas.get_promise());
}
2022-11-09 18:35:22 +01:00
message_db_sync_safe_.reset();
if (message_db_async_) {
message_db_async_->close(mpas.get_promise());
}
2022-11-10 17:46:17 +01:00
message_thread_db_sync_safe_.reset();
if (message_thread_db_async_) {
message_thread_db_async_->close(mpas.get_promise());
}
dialog_db_sync_safe_.reset();
if (dialog_db_async_) {
dialog_db_async_->close(mpas.get_promise());
}
// binlog_pmc is dependent on binlog_ and anyway it doesn't support close_and_destroy
CHECK(binlog_pmc_.unique());
binlog_pmc_.reset();
CHECK(config_pmc_.unique());
config_pmc_.reset();
if (binlog_) {
if (destroy_flag) {
binlog_->close_and_destroy(mpas.get_promise());
} else {
binlog_->close(mpas.get_promise());
}
binlog_.reset();
}
2021-10-07 17:14:49 +02:00
lock.set_value(Unit());
}
2023-03-13 20:29:56 +01:00
Status TdDb::init_sqlite(const Parameters &parameters, const DbKey &key, const DbKey &old_key,
BinlogKeyValue<Binlog> &binlog_pmc) {
2023-03-13 20:29:56 +01:00
CHECK(!parameters.use_message_database_ || parameters.use_chat_info_database_);
CHECK(!parameters.use_chat_info_database_ || parameters.use_file_database_);
const string sql_database_path = get_sqlite_path(parameters);
2023-03-13 20:29:56 +01:00
bool use_sqlite = parameters.use_file_database_;
bool use_file_database_ = parameters.use_file_database_;
bool use_dialog_db = parameters.use_message_database_;
bool use_message_thread_db = parameters.use_message_database_ && false;
bool use_message_database_ = parameters.use_message_database_;
if (!use_sqlite) {
SqliteDb::destroy(sql_database_path).ignore();
return Status::OK();
}
2023-03-13 20:34:23 +01:00
TRY_RESULT(db_instance, SqliteDb::change_key(sql_database_path, true, key, old_key));
sql_connection_ = std::make_shared<SqliteConnectionSafe>(sql_database_path, key, db_instance.get_cipher_version());
sql_connection_->set(std::move(db_instance));
auto &db = sql_connection_->get();
2021-09-23 10:20:42 +02:00
TRY_STATUS(db.exec("PRAGMA journal_mode=WAL"));
TRY_STATUS(db.exec("PRAGMA secure_delete=1"));
// Init databases
// Do initialization once and before everything else to avoid "database is locked" error.
// Must be in a transaction
// NB: when database is dropped we should also drop corresponding binlog events
TRY_STATUS(db.exec("BEGIN TRANSACTION"));
// Get 'PRAGMA user_version'
TRY_RESULT(user_version, db.user_version());
LOG(INFO) << "Have PRAGMA user_version = " << user_version;
// init DialogDb
bool dialog_db_was_created = false;
if (use_dialog_db) {
TRY_STATUS(init_dialog_db(db, user_version, binlog_pmc, dialog_db_was_created));
} else {
TRY_STATUS(drop_dialog_db(db, user_version));
}
2022-11-10 17:46:17 +01:00
// init MessageThreadDb
if (use_message_thread_db) {
TRY_STATUS(init_message_thread_db(db, user_version));
} else {
TRY_STATUS(drop_message_thread_db(db, user_version));
}
2022-11-09 18:35:22 +01:00
// init MessageDb
2023-03-13 20:29:56 +01:00
if (use_message_database_) {
2022-11-09 18:35:22 +01:00
TRY_STATUS(init_message_db(db, user_version));
} else {
2022-11-09 18:35:22 +01:00
TRY_STATUS(drop_message_db(db, user_version));
}
// init filesDb
2023-03-13 20:29:56 +01:00
if (use_file_database_) {
TRY_STATUS(init_file_db(db, user_version));
} else {
TRY_STATUS(drop_file_db(db, user_version));
}
// Update 'PRAGMA user_version'
auto db_version = current_db_version();
if (db_version != user_version) {
LOG(WARNING) << "Set PRAGMA user_version = " << db_version;
TRY_STATUS(db.set_user_version(db_version));
}
if (dialog_db_was_created) {
binlog_pmc.erase_by_prefix("pinned_dialog_ids");
binlog_pmc.erase_by_prefix("last_server_dialog_date");
binlog_pmc.erase_by_prefix("unread_message_count");
binlog_pmc.erase_by_prefix("unread_dialog_count");
binlog_pmc.erase("sponsored_dialog_id");
binlog_pmc.erase_by_prefix("top_dialogs");
binlog_pmc.erase("dlds_counter");
binlog_pmc.erase_by_prefix("dlds#");
}
if (user_version == 0) {
binlog_pmc.erase("next_contacts_sync_date");
binlog_pmc.erase("saved_contact_count");
binlog_pmc.erase("old_featured_sticker_set_count");
binlog_pmc.erase("invalidate_old_featured_sticker_sets");
binlog_pmc.erase(AttachMenuManager::get_attach_menu_bots_database_key());
}
binlog_pmc.force_sync({});
TRY_STATUS(db.exec("COMMIT TRANSACTION"));
2022-06-29 23:46:02 +02:00
file_db_ = create_file_db(sql_connection_);
common_kv_safe_ = std::make_shared<SqliteKeyValueSafe>("common", sql_connection_);
2022-06-29 23:46:02 +02:00
common_kv_async_ = create_sqlite_key_value_async(common_kv_safe_);
if (use_dialog_db) {
dialog_db_sync_safe_ = create_dialog_db_sync(sql_connection_);
2022-06-29 23:46:02 +02:00
dialog_db_async_ = create_dialog_db_async(dialog_db_sync_safe_);
}
2022-11-10 17:46:17 +01:00
if (use_message_thread_db) {
message_thread_db_sync_safe_ = create_message_thread_db_sync(sql_connection_);
message_thread_db_async_ = create_message_thread_db_async(message_thread_db_sync_safe_);
}
2023-03-13 20:29:56 +01:00
if (use_message_database_) {
2022-11-09 18:35:22 +01:00
message_db_sync_safe_ = create_message_db_sync(sql_connection_);
message_db_async_ = create_message_db_async(message_db_sync_safe_);
}
return Status::OK();
}
2023-03-13 20:29:56 +01:00
void TdDb::open(int32 scheduler_id, Parameters parameters, Promise<OpenedDatabase> &&promise) {
2022-06-29 23:46:02 +02:00
Scheduler::instance()->run_on_scheduler(
2023-03-13 20:29:56 +01:00
scheduler_id, [parameters = std::move(parameters), promise = std::move(promise)](Unit) mutable {
TdDb::open_impl(std::move(parameters), std::move(promise));
});
}
2023-03-13 20:29:56 +01:00
void TdDb::open_impl(Parameters parameters, Promise<OpenedDatabase> &&promise) {
TRY_STATUS_PROMISE(promise, check_parameters(parameters));
2022-06-10 15:44:53 +02:00
OpenedDatabase result;
// Init pmc
Binlog *binlog_ptr = nullptr;
auto binlog = std::shared_ptr<Binlog>(new Binlog, [&](Binlog *ptr) { binlog_ptr = ptr; });
auto binlog_pmc = make_unique<BinlogKeyValue<Binlog>>();
auto config_pmc = make_unique<BinlogKeyValue<Binlog>>();
binlog_pmc->external_init_begin(static_cast<int32>(LogEvent::HandlerType::BinlogPmcMagic));
config_pmc->external_init_begin(static_cast<int32>(LogEvent::HandlerType::ConfigPmcMagic));
2023-03-13 20:29:56 +01:00
bool encrypt_binlog = !parameters.encryption_key_.is_empty();
VLOG(td_init) << "Start binlog loading";
2023-03-13 20:29:56 +01:00
TRY_STATUS_PROMISE(promise, init_binlog(*binlog, get_binlog_path(parameters), *binlog_pmc, *config_pmc, result,
std::move(parameters.encryption_key_)));
VLOG(td_init) << "Finish binlog loading";
binlog_pmc->external_init_finish(binlog);
VLOG(td_init) << "Finish initialization of binlog PMC";
config_pmc->external_init_finish(binlog);
VLOG(td_init) << "Finish initialization of config PMC";
2023-03-13 20:29:56 +01:00
if (parameters.use_file_database_ && binlog_pmc->get("auth").empty()) {
LOG(INFO) << "Destroy SQLite database, because wasn't authorized yet";
SqliteDb::destroy(get_sqlite_path(parameters)).ignore();
}
DbKey new_sqlite_key;
DbKey old_sqlite_key;
bool encrypt_sqlite = encrypt_binlog;
bool drop_sqlite_key = false;
auto sqlite_key = binlog_pmc->get("sqlite_key");
if (encrypt_sqlite) {
if (sqlite_key.empty()) {
sqlite_key = string(32, ' ');
Random::secure_bytes(sqlite_key);
binlog_pmc->set("sqlite_key", sqlite_key);
binlog_pmc->force_sync(Auto());
}
new_sqlite_key = DbKey::raw_key(std::move(sqlite_key));
} else {
if (!sqlite_key.empty()) {
old_sqlite_key = DbKey::raw_key(std::move(sqlite_key));
drop_sqlite_key = true;
}
}
VLOG(td_init) << "Start to init database";
2022-06-10 15:44:53 +02:00
auto db = make_unique<TdDb>();
2022-06-29 23:46:02 +02:00
auto init_sqlite_status = db->init_sqlite(parameters, new_sqlite_key, old_sqlite_key, *binlog_pmc);
VLOG(td_init) << "Finish to init database";
if (init_sqlite_status.is_error()) {
LOG(ERROR) << "Destroy bad SQLite database because of " << init_sqlite_status;
2022-06-10 15:44:53 +02:00
if (db->sql_connection_ != nullptr) {
db->sql_connection_->get().close();
}
SqliteDb::destroy(get_sqlite_path(parameters)).ignore();
2022-12-30 21:13:40 +01:00
init_sqlite_status = db->init_sqlite(parameters, new_sqlite_key, old_sqlite_key, *binlog_pmc);
if (init_sqlite_status.is_error()) {
return promise.set_error(Status::Error(400, init_sqlite_status.message()));
}
}
if (drop_sqlite_key) {
binlog_pmc->erase("sqlite_key");
binlog_pmc->force_sync(Auto());
}
VLOG(td_init) << "Create concurrent_binlog_pmc";
auto concurrent_binlog_pmc = std::make_shared<BinlogKeyValue<ConcurrentBinlog>>();
concurrent_binlog_pmc->external_init_begin(binlog_pmc->get_magic());
concurrent_binlog_pmc->external_init_handle(std::move(*binlog_pmc));
VLOG(td_init) << "Create concurrent_config_pmc";
auto concurrent_config_pmc = std::make_shared<BinlogKeyValue<ConcurrentBinlog>>();
concurrent_config_pmc->external_init_begin(config_pmc->get_magic());
concurrent_config_pmc->external_init_handle(std::move(*config_pmc));
binlog.reset();
binlog_pmc.reset();
config_pmc.reset();
CHECK(binlog_ptr != nullptr);
VLOG(td_init) << "Create concurrent_binlog";
2022-06-29 23:46:02 +02:00
auto concurrent_binlog = std::make_shared<ConcurrentBinlog>(unique_ptr<Binlog>(binlog_ptr));
VLOG(td_init) << "Init concurrent_binlog_pmc";
concurrent_binlog_pmc->external_init_finish(concurrent_binlog);
VLOG(td_init) << "Init concurrent_config_pmc";
concurrent_config_pmc->external_init_finish(concurrent_binlog);
2023-03-13 20:29:56 +01:00
LOG(INFO) << "Successfully inited database in directory " << parameters.database_directory_ << " and files directory "
<< parameters.files_directory_;
db->parameters_ = std::move(parameters);
2022-06-10 15:44:53 +02:00
db->binlog_pmc_ = std::move(concurrent_binlog_pmc);
db->config_pmc_ = std::move(concurrent_config_pmc);
db->binlog_ = std::move(concurrent_binlog);
2022-06-10 15:44:53 +02:00
result.database = std::move(db);
promise.set_value(std::move(result));
}
TdDb::TdDb() = default;
TdDb::~TdDb() = default;
2023-03-13 20:29:56 +01:00
Status TdDb::check_parameters(Parameters &parameters) {
if (parameters.database_directory_.empty()) {
parameters.database_directory_ = ".";
}
2023-03-13 20:29:56 +01:00
if (parameters.use_message_database_ && !parameters.use_chat_info_database_) {
parameters.use_chat_info_database_ = true;
}
2023-03-13 20:29:56 +01:00
if (parameters.use_chat_info_database_ && !parameters.use_file_database_) {
parameters.use_file_database_ = true;
}
auto prepare_dir = [](string dir) -> Result<string> {
CHECK(!dir.empty());
if (dir.back() != TD_DIR_SLASH) {
dir += TD_DIR_SLASH;
}
TRY_STATUS(mkpath(dir, 0750));
TRY_RESULT(real_dir, realpath(dir, true));
2022-10-24 12:37:34 +02:00
if (real_dir.empty()) {
return Status::Error(PSTRING() << "Failed to get realpath for \"" << dir << '"');
}
if (real_dir.back() != TD_DIR_SLASH) {
real_dir += TD_DIR_SLASH;
}
return real_dir;
};
2023-03-13 20:29:56 +01:00
auto r_database_directory = prepare_dir(parameters.database_directory_);
if (r_database_directory.is_error()) {
2023-03-13 20:29:56 +01:00
VLOG(td_init) << "Invalid database directory";
return Status::Error(400, PSLICE() << "Can't init database in the directory \"" << parameters.database_directory_
2022-12-30 21:13:40 +01:00
<< "\": " << r_database_directory.error());
}
2023-03-13 20:29:56 +01:00
parameters.database_directory_ = r_database_directory.move_as_ok();
2023-03-13 20:29:56 +01:00
if (parameters.files_directory_.empty()) {
parameters.files_directory_ = parameters.database_directory_;
2023-03-13 19:33:35 +01:00
} else {
2023-03-13 20:29:56 +01:00
auto r_files_directory = prepare_dir(parameters.files_directory_);
2023-03-13 19:33:35 +01:00
if (r_files_directory.is_error()) {
2023-03-13 20:29:56 +01:00
VLOG(td_init) << "Invalid files directory";
return Status::Error(400, PSLICE() << "Can't init files directory \"" << parameters.files_directory_
2023-03-13 19:33:35 +01:00
<< "\": " << r_files_directory.error());
}
2023-03-13 20:29:56 +01:00
parameters.files_directory_ = r_files_directory.move_as_ok();
}
return Status::OK();
}
void TdDb::change_key(DbKey key, Promise<> promise) {
get_binlog()->change_key(std::move(key), std::move(promise));
}
2023-03-13 20:29:56 +01:00
Status TdDb::destroy(const Parameters &parameters) {
SqliteDb::destroy(get_sqlite_path(parameters)).ignore();
Binlog::destroy(get_binlog_path(parameters)).ignore();
return Status::OK();
}
2021-10-19 17:11:16 +02:00
void TdDb::with_db_path(const std::function<void(CSlice)> &callback) {
2023-03-13 20:41:59 +01:00
SqliteDb::with_db_path(get_sqlite_path(parameters_), callback);
callback(binlog_->get_path());
}
Result<string> TdDb::get_stats() {
auto sb = StringBuilder({}, true);
auto &sql = sql_connection_->get();
auto run_query = [&](CSlice query, Slice desc) -> Status {
TRY_RESULT(stmt, sql.get_statement(query));
TRY_STATUS(stmt.step());
CHECK(stmt.has_row());
auto key_size = stmt.view_int64(0);
auto value_size = stmt.view_int64(1);
auto count = stmt.view_int64(2);
sb << query << "\n";
sb << desc << ":\n";
sb << format::as_size(key_size + value_size) << "\t";
sb << format::as_size(key_size) << "\t";
sb << format::as_size(value_size) << "\t";
sb << format::as_size((key_size + value_size) / (count ? count : 1)) << "\t";
sb << "\n";
return Status::OK();
};
auto run_kv_query = [&](Slice mask, Slice table = Slice("common")) {
return run_query(PSLICE() << "SELECT SUM(length(k)), SUM(length(v)), COUNT(*) FROM " << table << " WHERE k like '"
<< mask << "'",
PSLICE() << table << ":" << mask);
};
TRY_STATUS(run_query("SELECT 0, SUM(length(data)), COUNT(*) FROM messages WHERE 1", "messages"));
TRY_STATUS(run_query("SELECT 0, SUM(length(data)), COUNT(*) FROM dialogs WHERE 1", "dialogs"));
TRY_STATUS(run_kv_query("%", "common"));
TRY_STATUS(run_kv_query("%", "files"));
TRY_STATUS(run_kv_query("wp%"));
TRY_STATUS(run_kv_query("wpurl%"));
TRY_STATUS(run_kv_query("wpiv%"));
TRY_STATUS(run_kv_query("us%"));
TRY_STATUS(run_kv_query("ch%"));
TRY_STATUS(run_kv_query("ss%"));
TRY_STATUS(run_kv_query("gr%"));
vector<int32> prev(1);
size_t count = 0;
int32 max_bad_to = 0;
size_t bad_count = 0;
file_db_->pmc().get_by_range("file0", "file:", [&](Slice key, Slice value) {
if (value.substr(0, 2) != "@@") {
return true;
}
count++;
auto from = to_integer<int32>(key.substr(4));
auto to = to_integer<int32>(value.substr(2));
if (from <= to) {
LOG(DEBUG) << "Have forward reference from " << from << " to " << to;
if (to > max_bad_to) {
max_bad_to = to;
}
bad_count++;
return true;
}
if (static_cast<size_t>(from) >= prev.size()) {
prev.resize(from + 1);
}
if (static_cast<size_t>(to) >= prev.size()) {
prev.resize(to + 1);
}
prev[from] = to;
return true;
});
for (size_t i = 1; i < prev.size(); i++) {
if (!prev[i]) {
continue;
}
prev[i] = prev[prev[i]] + 1;
}
sb << "Max file database depth out of " << prev.size() << '/' << count
<< " elements: " << *std::max_element(prev.begin(), prev.end()) << "\n";
sb << "Have " << bad_count << " forward references with maximum reference to " << max_bad_to;
return sb.as_cslice().str();
}
} // namespace td