diff options
Diffstat (limited to 'libs/tdlib/td/tddb/td/db/SqliteDb.cpp')
-rw-r--r-- | libs/tdlib/td/tddb/td/db/SqliteDb.cpp | 228 |
1 files changed, 228 insertions, 0 deletions
diff --git a/libs/tdlib/td/tddb/td/db/SqliteDb.cpp b/libs/tdlib/td/tddb/td/db/SqliteDb.cpp new file mode 100644 index 0000000000..819818197d --- /dev/null +++ b/libs/tdlib/td/tddb/td/db/SqliteDb.cpp @@ -0,0 +1,228 @@ +// +// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2018 +// +// Distributed under the Boost Software License, Version 1.0. (See accompanying +// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) +// +#include "td/db/SqliteDb.h" + +#include "td/utils/format.h" +#include "td/utils/port/path.h" +#include "td/utils/port/Stat.h" +#include "td/utils/Status.h" +#include "td/utils/StringBuilder.h" +#include "td/utils/Timer.h" + +#include "sqlite/sqlite3.h" + +namespace td { + +namespace { +string db_key_to_sqlcipher_key(const DbKey &db_key) { + if (db_key.is_empty()) { + return "''"; + } + if (db_key.is_password()) { + return PSTRING() << "'" << db_key.data().str() << "'"; + } + CHECK(db_key.is_raw_key()); + Slice raw_key = db_key.data(); + CHECK(raw_key.size() == 32); + size_t expected_size = 64 + 5; + string res(expected_size + 50, ' '); + StringBuilder sb(res); + sb << '"'; + sb << 'x'; + sb << '\''; + sb << format::as_hex_dump<0>(raw_key); + sb << '\''; + sb << '"'; + CHECK(!sb.is_error()); + CHECK(sb.as_cslice().size() == expected_size); + res.resize(expected_size); + return res; +} +} // namespace + +SqliteDb::~SqliteDb() = default; + +Status SqliteDb::init(CSlice path, bool *was_created) { + // If database does not exist, delete all other files which may left + // from older database + bool is_db_exists = stat(path).is_ok(); + if (!is_db_exists) { + destroy(path).ignore(); + } + + if (was_created != nullptr) { + *was_created = !is_db_exists; + } + sqlite3 *db; + CHECK(sqlite3_threadsafe() != 0); + int rc = sqlite3_open_v2(path.c_str(), &db, SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE /*| SQLITE_OPEN_SHAREDCACHE*/, + nullptr); + if (rc != SQLITE_OK) { + auto res = Status::Error(PSLICE() << "Failed to open db: " << detail::RawSqliteDb::last_error(db)); + sqlite3_close(db); + return res; + } + sqlite3_busy_timeout(db, 1000 * 5 /* 5 seconds */); + raw_ = std::make_shared<detail::RawSqliteDb>(db, path.str()); + return Status::OK(); +} + +static void trace_callback(void *ptr, const char *query) { + LOG(ERROR) << query; +} +static int trace_v2_callback(unsigned code, void *ctx, void *p_raw, void *x_raw) { + CHECK(code == SQLITE_TRACE_STMT); + auto x = static_cast<const char *>(x_raw); + if (x[0] == '-' && x[1] == '-') { + trace_callback(ctx, x); + } else { + trace_callback(ctx, sqlite3_expanded_sql(static_cast<sqlite3_stmt *>(p_raw))); + } + + return 0; +} +void SqliteDb::trace(bool flag) { + sqlite3_trace_v2(raw_->db(), SQLITE_TRACE_STMT, flag ? trace_v2_callback : nullptr, nullptr); +} + +Status SqliteDb::exec(CSlice cmd) { + CHECK(!empty()); + char *msg; + VLOG(sqlite) << "Start exec " << tag("cmd", cmd) << tag("db", raw_->db()); + auto rc = sqlite3_exec(raw_->db(), cmd.c_str(), nullptr, nullptr, &msg); + VLOG(sqlite) << "Finish exec " << tag("cmd", cmd) << tag("db", raw_->db()); + if (rc != SQLITE_OK) { + CHECK(msg != nullptr); + return Status::Error(PSLICE() << tag("query", cmd) << " failed: " << msg); + } + CHECK(msg == nullptr); + return Status::OK(); +} + +Result<bool> SqliteDb::has_table(Slice table) { + TRY_RESULT(stmt, get_statement(PSLICE() << "SELECT count(*) FROM sqlite_master WHERE type='table' AND name='" << table + << "'")); + TRY_STATUS(stmt.step()); + CHECK(stmt.has_row()); + auto cnt = stmt.view_int32(0); + return cnt == 1; +} +Result<string> SqliteDb::get_pragma(Slice name) { + TRY_RESULT(stmt, get_statement(PSLICE() << "PRAGMA " << name)); + TRY_STATUS(stmt.step()); + CHECK(stmt.has_row()); + auto res = stmt.view_blob(0).str(); + TRY_STATUS(stmt.step()); + CHECK(!stmt.can_step()); + return std::move(res); +} + +Result<int32> SqliteDb::user_version() { + TRY_RESULT(get_version_stmt, get_statement("PRAGMA user_version")); + TRY_STATUS(get_version_stmt.step()); + if (!get_version_stmt.has_row()) { + return Status::Error("PRAGMA user_version failed"); + } + return get_version_stmt.view_int32(0); +} + +Status SqliteDb::set_user_version(int32 version) { + return exec(PSLICE() << "PRAGMA user_version = " << version); +} + +Status SqliteDb::begin_transaction() { + return exec("BEGIN"); +} +Status SqliteDb::commit_transaction() { + return exec("COMMIT"); +} + +bool SqliteDb::is_encrypted() { + return exec("SELECT count(*) FROM sqlite_master").is_error(); +} + +Result<SqliteDb> SqliteDb::open_with_key(CSlice path, const DbKey &db_key) { + SqliteDb db; + TRY_STATUS(db.init(path)); + if (!db_key.is_empty()) { + if (!db.is_encrypted()) { + return Status::Error("No key is needed"); + } + auto key = db_key_to_sqlcipher_key(db_key); + TRY_STATUS(db.exec(PSLICE() << "PRAGMA key = " << key)); + } + if (db.is_encrypted()) { + return Status::Error("Wrong key"); + } + return std::move(db); +} + +Status SqliteDb::change_key(CSlice path, const DbKey &new_db_key, const DbKey &old_db_key) { + // fast path + { + auto r_db = open_with_key(path, new_db_key); + if (r_db.is_ok()) { + return Status::OK(); + } + } + + TRY_RESULT(db, open_with_key(path, old_db_key)); + TRY_RESULT(user_version, db.user_version()); + auto new_key = db_key_to_sqlcipher_key(new_db_key); + if (old_db_key.is_empty() && !new_db_key.is_empty()) { + LOG(DEBUG) << "ENCRYPT"; + // Encrypt + PerfWarningTimer timer("Encrypt sqlite database", 0.1); + auto tmp_path = path.str() + ".ecnrypted"; + unlink(tmp_path).ignore(); + + // make shure that database is not empty + TRY_STATUS(db.exec("CREATE TABLE IF NOT EXISTS encryption_dummy_table(id INT PRIMARY KEY)")); + //NB: not really safe + TRY_STATUS(db.exec(PSLICE() << "ATTACH DATABASE '" << tmp_path << "' AS encrypted KEY " << new_key)); + TRY_STATUS(db.exec("SELECT sqlcipher_export('encrypted')")); + TRY_STATUS(db.exec(PSLICE() << "PRAGMA encrypted.user_version = " << user_version)); + TRY_STATUS(db.exec("DETACH DATABASE encrypted")); + db.close(); + TRY_STATUS(rename(tmp_path, path)); + } else if (!old_db_key.is_empty() && new_db_key.is_empty()) { + LOG(DEBUG) << "DECRYPT"; + // Dectypt + PerfWarningTimer timer("Decrypt sqlite database", 0.1); + auto tmp_path = path.str() + ".ecnrypted"; + unlink(tmp_path).ignore(); + + //NB: not really safe + TRY_STATUS(db.exec(PSLICE() << "ATTACH DATABASE '" << tmp_path << "' AS decrypted KEY ''")); + TRY_STATUS(db.exec("SELECT sqlcipher_export('decrypted')")); + TRY_STATUS(db.exec(PSLICE() << "PRAGMA decrypted.user_version = " << user_version)); + TRY_STATUS(db.exec("DETACH DATABASE decrypted")); + db.close(); + TRY_STATUS(rename(tmp_path, path)); + } else { + LOG(DEBUG) << "REKEY"; + PerfWarningTimer timer("Rekey sqlite database", 0.1); + TRY_STATUS(db.exec(PSLICE() << "PRAGMA rekey = " << new_key)); + } + + TRY_RESULT(new_db, open_with_key(path, new_db_key)); + CHECK(new_db.user_version().ok() == user_version); + return Status::OK(); +} +Status SqliteDb::destroy(Slice path) { + return detail::RawSqliteDb::destroy(path); +} + +Result<SqliteStatement> SqliteDb::get_statement(CSlice statement) { + sqlite3_stmt *stmt = nullptr; + auto rc = sqlite3_prepare_v2(get_native(), statement.c_str(), static_cast<int>(statement.size()) + 1, &stmt, nullptr); + if (rc != SQLITE_OK) { + return Status::Error(PSLICE() << "Failed to prepare sqlite " << tag("stmt", statement) << raw_->last_error()); + } + return SqliteStatement(stmt, raw_); +} +} // namespace td |