Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2639)

Unified Diff: chrome/browser/net/sqlite_persistent_cookie_store.cc

Issue 201099: Convert the sqlite cookie database and web database to use the new sqlite... (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: '' Created 11 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/browser/net/sqlite_persistent_cookie_store.h ('k') | chrome/browser/profile.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/net/sqlite_persistent_cookie_store.cc
===================================================================
--- chrome/browser/net/sqlite_persistent_cookie_store.cc (revision 26016)
+++ chrome/browser/net/sqlite_persistent_cookie_store.cc (working copy)
@@ -1,18 +1,19 @@
-// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
+// Copyright (c) 2009 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
-#include "chrome/common/net/cookie_monster_sqlite.h"
+#include "chrome/browser/net/sqlite_persistent_cookie_store.h"
#include <list>
+#include "app/sql/statement.h"
+#include "app/sql/transaction.h"
#include "base/basictypes.h"
#include "base/logging.h"
#include "base/ref_counted.h"
+#include "base/scoped_ptr.h"
#include "base/string_util.h"
#include "base/thread.h"
-#include "chrome/common/sqlite_compiled_statement.h"
-#include "chrome/common/sqlite_utils.h"
using base::Time;
@@ -23,10 +24,9 @@
public:
// The passed database pointer must be already-initialized. This object will
// take ownership.
- explicit Backend(sqlite3* db, MessageLoop* loop)
+ explicit Backend(sql::Connection* db, MessageLoop* loop)
: db_(db),
background_loop_(loop),
- cache_(new SqliteStatementCache(db)),
num_pending_(0) {
DCHECK(db_) << "Database must exist.";
}
@@ -85,9 +85,8 @@
// Close() executed on the background thread.
void InternalBackgroundClose();
- sqlite3* db_;
+ sql::Connection* db_;
MessageLoop* background_loop_;
- SqliteStatementCache* cache_;
typedef std::list<PendingOperation*> PendingOperationsList;
PendingOperationsList pending_;
@@ -159,70 +158,69 @@
if (!db_ || ops.empty())
return;
- SQLITE_UNIQUE_STATEMENT(add_smt, *cache_,
+ sql::Statement add_smt(db_->GetCachedStatement(SQL_FROM_HERE,
"INSERT INTO cookies (creation_utc, host_key, name, value, path, "
"expires_utc, secure, httponly, last_access_utc) "
- "VALUES (?,?,?,?,?,?,?,?,?)");
- if (!add_smt.is_valid()) {
+ "VALUES (?,?,?,?,?,?,?,?,?)"));
+ if (!add_smt) {
NOTREACHED();
return;
}
- SQLITE_UNIQUE_STATEMENT(update_access_smt, *cache_,
- "UPDATE cookies SET last_access_utc=? "
- "WHERE creation_utc=?");
- if (!update_access_smt.is_valid()) {
+ sql::Statement update_access_smt(db_->GetCachedStatement(SQL_FROM_HERE,
+ "UPDATE cookies SET last_access_utc=? WHERE creation_utc=?"));
+ if (!update_access_smt) {
NOTREACHED();
return;
}
- SQLITE_UNIQUE_STATEMENT(del_smt, *cache_,
- "DELETE FROM cookies WHERE creation_utc=?");
- if (!del_smt.is_valid()) {
+ sql::Statement del_smt(db_->GetCachedStatement(SQL_FROM_HERE,
+ "DELETE FROM cookies WHERE creation_utc=?"));
+ if (!del_smt) {
NOTREACHED();
return;
}
- SQLTransaction transaction(db_);
- transaction.Begin();
+ sql::Transaction transaction(db_);
+ if (!transaction.Begin()) {
+ NOTREACHED();
+ return;
+ }
for (PendingOperationsList::iterator it = ops.begin();
it != ops.end(); ++it) {
// Free the cookies as we commit them to the database.
scoped_ptr<PendingOperation> po(*it);
switch (po->op()) {
case PendingOperation::COOKIE_ADD:
- add_smt->reset();
- add_smt->bind_int64(0, po->cc().CreationDate().ToInternalValue());
- add_smt->bind_string(1, po->key());
- add_smt->bind_string(2, po->cc().Name());
- add_smt->bind_string(3, po->cc().Value());
- add_smt->bind_string(4, po->cc().Path());
- add_smt->bind_int64(5, po->cc().ExpiryDate().ToInternalValue());
- add_smt->bind_int(6, po->cc().IsSecure());
- add_smt->bind_int(7, po->cc().IsHttpOnly());
- add_smt->bind_int64(8, po->cc().LastAccessDate().ToInternalValue());
- if (add_smt->step() != SQLITE_DONE) {
+ add_smt.Reset();
+ add_smt.BindInt64(0, po->cc().CreationDate().ToInternalValue());
+ add_smt.BindString(1, po->key());
+ add_smt.BindString(2, po->cc().Name());
+ add_smt.BindString(3, po->cc().Value());
+ add_smt.BindString(4, po->cc().Path());
+ add_smt.BindInt64(5, po->cc().ExpiryDate().ToInternalValue());
+ add_smt.BindInt(6, po->cc().IsSecure());
+ add_smt.BindInt(7, po->cc().IsHttpOnly());
+ add_smt.BindInt64(8, po->cc().LastAccessDate().ToInternalValue());
+ if (!add_smt.Run())
NOTREACHED() << "Could not add a cookie to the DB.";
- }
break;
case PendingOperation::COOKIE_UPDATEACCESS:
- update_access_smt->reset();
- update_access_smt->bind_int64(0,
+ update_access_smt.Reset();
+ update_access_smt.BindInt64(0,
po->cc().LastAccessDate().ToInternalValue());
- update_access_smt->bind_int64(1,
+ update_access_smt.BindInt64(1,
po->cc().CreationDate().ToInternalValue());
- if (update_access_smt->step() != SQLITE_DONE) {
+ if (!update_access_smt.Run())
NOTREACHED() << "Could not update cookie last access time in the DB.";
- }
break;
case PendingOperation::COOKIE_DELETE:
- del_smt->reset();
- del_smt->bind_int64(0, po->cc().CreationDate().ToInternalValue());
- if (del_smt->step() != SQLITE_DONE) {
+ del_smt.Reset();
+ del_smt.BindInt64(0, po->cc().CreationDate().ToInternalValue());
+ if (!del_smt.Run())
NOTREACHED() << "Could not delete a cookie from the DB.";
- }
break;
default:
@@ -248,15 +246,14 @@
DCHECK(MessageLoop::current() == background_loop_);
// Commit any pending operations
Commit();
- // We must destroy the cache before closing the database.
- delete cache_;
- cache_ = NULL;
- sqlite3_close(db_);
+
+ delete db_;
db_ = NULL;
}
SQLitePersistentCookieStore::SQLitePersistentCookieStore(
- const std::wstring& path, MessageLoop* background_loop)
+ const FilePath& path,
+ MessageLoop* background_loop)
: path_(path),
background_loop_(background_loop) {
DCHECK(background_loop) << "SQLitePersistentCookieStore needs a MessageLoop";
@@ -285,28 +282,25 @@
namespace {
// Initializes the cookies table, returning true on success.
-bool InitTable(sqlite3* db) {
- if (!DoesSqliteTableExist(db, "cookies")) {
- if (sqlite3_exec(db, "CREATE TABLE cookies ("
- "creation_utc INTEGER NOT NULL UNIQUE PRIMARY KEY,"
- "host_key TEXT NOT NULL,"
- "name TEXT NOT NULL,"
- "value TEXT NOT NULL,"
- "path TEXT NOT NULL,"
- // We only store persistent, so we know it expires
- "expires_utc INTEGER NOT NULL,"
- "secure INTEGER NOT NULL,"
- "httponly INTEGER NOT NULL,"
- "last_access_utc INTEGER NOT NULL)",
- NULL, NULL, NULL) != SQLITE_OK)
+bool InitTable(sql::Connection* db) {
+ if (!db->DoesTableExist("cookies")) {
+ if (!db->Execute("CREATE TABLE cookies ("
+ "creation_utc INTEGER NOT NULL UNIQUE PRIMARY KEY,"
+ "host_key TEXT NOT NULL,"
+ "name TEXT NOT NULL,"
+ "value TEXT NOT NULL,"
+ "path TEXT NOT NULL,"
+ // We only store persistent, so we know it expires
+ "expires_utc INTEGER NOT NULL,"
+ "secure INTEGER NOT NULL,"
+ "httponly INTEGER NOT NULL,"
+ "last_access_utc INTEGER NOT NULL)"))
return false;
}
// Try to create the index every time. Older versions did not have this index,
// so we want those people to get it. Ignore errors, since it may exist.
- sqlite3_exec(db, "CREATE INDEX cookie_times ON cookies (creation_utc)",
- NULL, NULL, NULL);
-
+ db->Execute("CREATE INDEX cookie_times ON cookies (creation_utc)");
return true;
}
@@ -314,65 +308,55 @@
bool SQLitePersistentCookieStore::Load(
std::vector<net::CookieMonster::KeyedCanonicalCookie>* cookies) {
- DCHECK(!path_.empty());
- sqlite3* db;
- if (sqlite3_open(WideToUTF8(path_).c_str(), &db) != SQLITE_OK) {
+ scoped_ptr<sql::Connection> db(new sql::Connection);
+ if (!db->Init(path_)) {
NOTREACHED() << "Unable to open cookie DB.";
return false;
}
- if (!EnsureDatabaseVersion(db) || !InitTable(db)) {
+ if (!EnsureDatabaseVersion(db.get()) || !InitTable(db.get())) {
NOTREACHED() << "Unable to initialize cookie DB.";
- sqlite3_close(db);
return false;
}
- MetaTableHelper::PrimeCache(std::string(), db);
+ db->Preload();
// Slurp all the cookies into the out-vector.
- SQLStatement smt;
- if (smt.prepare(db,
+ sql::Statement smt(db->GetUniqueStatement(
"SELECT creation_utc, host_key, name, value, path, expires_utc, secure, "
- "httponly, last_access_utc FROM cookies") != SQLITE_OK) {
+ "httponly, last_access_utc FROM cookies"));
+ if (!smt) {
NOTREACHED() << "select statement prep failed";
- sqlite3_close(db);
return false;
}
- while (smt.step() == SQLITE_ROW) {
- std::string key = smt.column_string(1);
+ while (smt.Step()) {
scoped_ptr<net::CookieMonster::CanonicalCookie> cc(
new net::CookieMonster::CanonicalCookie(
- smt.column_string(2), // name
- smt.column_string(3), // value
- smt.column_string(4), // path
- smt.column_int(6) != 0, // secure
- smt.column_int(7) != 0, // httponly
- Time::FromInternalValue(smt.column_int64(0)), // creation_utc
- Time::FromInternalValue(smt.column_int64(8)), // last_access_utc
- true, // has_expires
- Time::FromInternalValue(smt.column_int64(5)))); // expires_utc
- // Memory allocation failed.
- if (!cc.get())
- break;
-
+ smt.ColumnString(2), // name
+ smt.ColumnString(3), // value
+ smt.ColumnString(4), // path
+ smt.ColumnInt(6) != 0, // secure
+ smt.ColumnInt(7) != 0, // httponly
+ Time::FromInternalValue(smt.ColumnInt64(0)), // creation_utc
+ Time::FromInternalValue(smt.ColumnInt64(8)), // last_access_utc
+ true, // has_expires
+ Time::FromInternalValue(smt.ColumnInt64(5)))); // expires_utc
DLOG_IF(WARNING,
cc->CreationDate() > Time::Now()) << L"CreationDate too recent";
cookies->push_back(
- net::CookieMonster::KeyedCanonicalCookie(smt.column_string(1),
+ net::CookieMonster::KeyedCanonicalCookie(smt.ColumnString(1),
cc.release()));
}
// Create the backend, this will take ownership of the db pointer.
- backend_ = new Backend(db, background_loop_);
-
+ backend_ = new Backend(db.release(), background_loop_);
return true;
}
-bool SQLitePersistentCookieStore::EnsureDatabaseVersion(sqlite3* db) {
+bool SQLitePersistentCookieStore::EnsureDatabaseVersion(sql::Connection* db) {
// Version check.
- if (!meta_table_.Init(std::string(), kCurrentVersionNumber,
- kCompatibleVersionNumber, db))
+ if (!meta_table_.Init(db, kCurrentVersionNumber, kCompatibleVersionNumber))
return false;
if (meta_table_.GetCompatibleVersionNumber() > kCurrentVersionNumber) {
@@ -382,14 +366,12 @@
int cur_version = meta_table_.GetVersionNumber();
if (cur_version == 2) {
- SQLTransaction transaction(db);
- transaction.Begin();
- if ((sqlite3_exec(db,
- "ALTER TABLE cookies ADD COLUMN last_access_utc "
- "INTEGER DEFAULT 0", NULL, NULL, NULL) != SQLITE_OK) ||
- (sqlite3_exec(db,
- "UPDATE cookies SET last_access_utc = creation_utc",
- NULL, NULL, NULL) != SQLITE_OK)) {
+ sql::Transaction transaction(db);
+ if (!transaction.Begin())
+ return false;
+ if (!db->Execute("ALTER TABLE cookies ADD COLUMN last_access_utc "
+ "INTEGER DEFAULT 0") ||
+ !db->Execute("UPDATE cookies SET last_access_utc = creation_utc")) {
LOG(WARNING) << "Unable to update cookie database to version 3.";
return false;
}
@@ -407,30 +389,27 @@
// versions. So we have to be careful to only update times that are under
// the old system (which will appear to be from before 1970 in the new
// system). The magic number used below is 1970 in our time units.
- SQLTransaction transaction(db);
+ sql::Transaction transaction(db);
transaction.Begin();
#if !defined(OS_WIN)
- sqlite3_exec(db,
+ db->Execute(
"UPDATE cookies "
"SET creation_utc = creation_utc + 11644473600000000 "
"WHERE rowid IN "
"(SELECT rowid FROM cookies WHERE "
- "creation_utc > 0 AND creation_utc < 11644473600000000)",
- NULL, NULL, NULL);
- sqlite3_exec(db,
+ "creation_utc > 0 AND creation_utc < 11644473600000000)");
+ db->Execute(
"UPDATE cookies "
"SET expires_utc = expires_utc + 11644473600000000 "
"WHERE rowid IN "
"(SELECT rowid FROM cookies WHERE "
- "expires_utc > 0 AND expires_utc < 11644473600000000)",
- NULL, NULL, NULL);
- sqlite3_exec(db,
+ "expires_utc > 0 AND expires_utc < 11644473600000000)");
+ db->Execute(
"UPDATE cookies "
"SET last_access_utc = last_access_utc + 11644473600000000 "
"WHERE rowid IN "
"(SELECT rowid FROM cookies WHERE "
- "last_access_utc > 0 AND last_access_utc < 11644473600000000)",
- NULL, NULL, NULL);
+ "last_access_utc > 0 AND last_access_utc < 11644473600000000)");
#endif
++cur_version;
meta_table_.SetVersionNumber(cur_version);
Property changes on: chrome/browser/net/sqlite_persistent_cookie_store.cc
___________________________________________________________________
Added: svn:mergeinfo
Merged /branches/chrome_webkit_merge_branch/chrome/common/net/cookie_monster_sqlite.cc:r69-2775
« no previous file with comments | « chrome/browser/net/sqlite_persistent_cookie_store.h ('k') | chrome/browser/profile.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698