zed/crates/db/src/db.rs

407 lines
14 KiB
Rust
Raw Normal View History

pub mod kvp;
pub mod query;
2022-10-13 23:31:26 +00:00
// Re-export
pub use anyhow;
use anyhow::Context;
use gpui::MutableAppContext;
pub use indoc::indoc;
pub use lazy_static;
use parking_lot::{Mutex, RwLock};
pub use smol;
pub use sqlez;
pub use sqlez_macros;
pub use util::channel::{RELEASE_CHANNEL, RELEASE_CHANNEL_NAME};
pub use util::paths::DB_DIR;
2022-10-18 18:43:18 +00:00
use sqlez::domain::Migrator;
2022-11-01 20:15:58 +00:00
use sqlez::thread_safe_connection::ThreadSafeConnection;
use sqlez_macros::sql;
2022-12-04 00:26:37 +00:00
use std::fs::create_dir_all;
use std::future::Future;
use std::path::{Path, PathBuf};
use std::sync::atomic::{AtomicBool, Ordering};
use std::time::{SystemTime, UNIX_EPOCH};
use util::channel::ReleaseChannel;
2022-12-19 16:11:10 +00:00
use util::{async_iife, ResultExt};
const CONNECTION_INITIALIZE_QUERY: &'static str = sql!(
PRAGMA foreign_keys=TRUE;
);
const DB_INITIALIZE_QUERY: &'static str = sql!(
PRAGMA journal_mode=WAL;
PRAGMA busy_timeout=1;
PRAGMA case_sensitive_like=TRUE;
PRAGMA synchronous=NORMAL;
);
const FALLBACK_DB_NAME: &'static str = "FALLBACK_MEMORY_DB";
2022-12-02 22:30:26 +00:00
const DB_FILE_NAME: &'static str = "db.sqlite";
lazy_static::lazy_static! {
2023-03-01 03:20:21 +00:00
// !!!!!!! CHANGE BACK TO DEFAULT FALSE BEFORE SHIPPING
2023-03-09 03:03:44 +00:00
static ref ZED_STATELESS: bool = std::env::var("ZED_STATELESS").map_or(false, |v| !v.is_empty());
static ref DB_FILE_OPERATIONS: Mutex<()> = Mutex::new(());
pub static ref BACKUP_DB_PATH: RwLock<Option<PathBuf>> = RwLock::new(None);
2022-12-19 16:11:10 +00:00
pub static ref ALL_FILE_DB_FAILED: AtomicBool = AtomicBool::new(false);
}
/// Open or create a database at the given directory path.
/// This will retry a couple times if there are failures. If opening fails once, the db directory
/// is moved to a backup folder and a new one is created. If that fails, a shared in memory db is created.
/// In either case, static variables are set so that the user can be notified.
2022-12-19 16:11:10 +00:00
pub async fn open_db<M: Migrator + 'static>(
db_dir: &Path,
release_channel: &ReleaseChannel,
) -> ThreadSafeConnection<M> {
if *ZED_STATELESS {
return open_fallback_db().await;
}
2022-12-02 22:30:26 +00:00
let release_channel_name = release_channel.dev_name();
let main_db_dir = db_dir.join(Path::new(&format!("0-{}", release_channel_name)));
let connection = async_iife!({
// Note: This still has a race condition where 1 set of migrations succeeds
// (e.g. (Workspace, Editor)) and another fails (e.g. (Workspace, Terminal))
2023-03-09 03:03:44 +00:00
// This will cause the first connection to have the database taken out
// from under it. This *should* be fine though. The second dabatase failure will
// cause errors in the log and so should be observed by developers while writing
// soon-to-be good migrations. If user databases are corrupted, we toss them out
2023-03-09 03:03:44 +00:00
// and try again from a blank. As long as running all migrations from start to end
// on a blank database is ok, this race condition will never be triggered.
//
// Basically: Don't ever push invalid migrations to stable or everyone will have
// a bad time.
2022-12-19 16:11:10 +00:00
// If no db folder, create one at 0-{channel}
create_dir_all(&main_db_dir).context("Could not create db directory")?;
2022-12-02 22:30:26 +00:00
let db_path = main_db_dir.join(Path::new(DB_FILE_NAME));
2022-12-19 16:11:10 +00:00
// Optimistically open databases in parallel
if !DB_FILE_OPERATIONS.is_locked() {
// Try building a connection
if let Some(connection) = open_main_db(&db_path).await {
return Ok(connection)
};
}
2022-12-19 16:11:10 +00:00
2023-03-09 03:03:44 +00:00
// Take a lock in the failure case so that we move the db once per process instead
// of potentially multiple times from different threads. This shouldn't happen in the
// normal path
let _lock = DB_FILE_OPERATIONS.lock();
if let Some(connection) = open_main_db(&db_path).await {
return Ok(connection)
};
2022-12-19 16:11:10 +00:00
let backup_timestamp = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("System clock is set before the unix timestamp, Zed does not support this region of spacetime")
.as_millis();
2022-12-19 16:11:10 +00:00
// If failed, move 0-{channel} to {current unix timestamp}-{channel}
let backup_db_dir = db_dir.join(Path::new(&format!(
"{}-{}",
backup_timestamp,
2022-12-02 22:30:26 +00:00
release_channel_name,
)));
std::fs::rename(&main_db_dir, &backup_db_dir)
.context("Failed clean up corrupted database, panicking.")?;
// Set a static ref with the failed timestamp and error so we can notify the user
{
let mut guard = BACKUP_DB_PATH.write();
*guard = Some(backup_db_dir);
}
2022-12-19 16:11:10 +00:00
// Create a new 0-{channel}
create_dir_all(&main_db_dir).context("Should be able to create the database directory")?;
2022-12-02 22:30:26 +00:00
let db_path = main_db_dir.join(Path::new(DB_FILE_NAME));
// Try again
open_main_db(&db_path).await.context("Could not newly created db")
}).await.log_err();
if let Some(connection) = connection {
return connection;
}
2022-12-19 16:11:10 +00:00
// Set another static ref so that we can escalate the notification
ALL_FILE_DB_FAILED.store(true, Ordering::Release);
2022-12-19 16:11:10 +00:00
// If still failed, create an in memory db with a known name
open_fallback_db().await
}
async fn open_main_db<M: Migrator>(db_path: &PathBuf) -> Option<ThreadSafeConnection<M>> {
log::info!("Opening main db");
ThreadSafeConnection::<M>::builder(db_path.to_string_lossy().as_ref(), true)
.with_db_initialization_query(DB_INITIALIZE_QUERY)
.with_connection_initialize_query(CONNECTION_INITIALIZE_QUERY)
.build()
.await
.log_err()
}
async fn open_fallback_db<M: Migrator>() -> ThreadSafeConnection<M> {
log::info!("Opening fallback db");
ThreadSafeConnection::<M>::builder(FALLBACK_DB_NAME, false)
.with_db_initialization_query(DB_INITIALIZE_QUERY)
.with_connection_initialize_query(CONNECTION_INITIALIZE_QUERY)
.build()
.await
.expect(
"Fallback in memory database failed. Likely initialization queries or migrations have fundamental errors",
)
}
2022-10-13 22:43:42 +00:00
#[cfg(any(test, feature = "test-support"))]
pub async fn open_test_db<M: Migrator>(db_name: &str) -> ThreadSafeConnection<M> {
use sqlez::thread_safe_connection::locking_queue;
ThreadSafeConnection::<M>::builder(db_name, false)
.with_db_initialization_query(DB_INITIALIZE_QUERY)
.with_connection_initialize_query(CONNECTION_INITIALIZE_QUERY)
2022-11-30 20:34:42 +00:00
// Serialize queued writes via a mutex and run them synchronously
.with_write_queue_constructor(locking_queue())
.build()
.await
.unwrap()
}
/// Implements a basic DB wrapper for a given domain
#[macro_export]
macro_rules! define_connection {
(pub static ref $id:ident: $t:ident<()> = $migrations:expr;) => {
pub struct $t($crate::sqlez::thread_safe_connection::ThreadSafeConnection<$t>);
impl ::std::ops::Deref for $t {
type Target = $crate::sqlez::thread_safe_connection::ThreadSafeConnection<$t>;
fn deref(&self) -> &Self::Target {
&self.0
}
}
2022-12-19 16:11:10 +00:00
impl $crate::sqlez::domain::Domain for $t {
fn name() -> &'static str {
stringify!($t)
}
2022-12-19 16:11:10 +00:00
fn migrations() -> &'static [&'static str] {
$migrations
2022-12-19 16:11:10 +00:00
}
}
#[cfg(any(test, feature = "test-support"))]
$crate::lazy_static::lazy_static! {
pub static ref $id: $t = $t($crate::smol::block_on($crate::open_test_db(stringify!($id))));
}
#[cfg(not(any(test, feature = "test-support")))]
$crate::lazy_static::lazy_static! {
2022-12-04 00:26:37 +00:00
pub static ref $id: $t = $t($crate::smol::block_on($crate::open_db(&$crate::DB_DIR, &$crate::RELEASE_CHANNEL)));
2022-11-21 18:38:16 +00:00
}
};
(pub static ref $id:ident: $t:ident<$($d:ty),+> = $migrations:expr;) => {
pub struct $t($crate::sqlez::thread_safe_connection::ThreadSafeConnection<( $($d),+, $t )>);
impl ::std::ops::Deref for $t {
type Target = $crate::sqlez::thread_safe_connection::ThreadSafeConnection<($($d),+, $t)>;
fn deref(&self) -> &Self::Target {
&self.0
}
}
2022-12-19 16:11:10 +00:00
impl $crate::sqlez::domain::Domain for $t {
fn name() -> &'static str {
stringify!($t)
}
2022-12-19 16:11:10 +00:00
fn migrations() -> &'static [&'static str] {
$migrations
2022-12-19 16:11:10 +00:00
}
}
#[cfg(any(test, feature = "test-support"))]
$crate::lazy_static::lazy_static! {
pub static ref $id: $t = $t($crate::smol::block_on($crate::open_test_db(stringify!($id))));
}
#[cfg(not(any(test, feature = "test-support")))]
$crate::lazy_static::lazy_static! {
2022-12-04 00:26:37 +00:00
pub static ref $id: $t = $t($crate::smol::block_on($crate::open_db(&$crate::DB_DIR, &$crate::RELEASE_CHANNEL)));
}
};
}
2022-11-21 18:52:19 +00:00
pub fn write_and_log<F>(cx: &mut MutableAppContext, db_write: impl FnOnce() -> F + Send + 'static)
where
F: Future<Output = anyhow::Result<()>> + Send,
{
cx.background()
.spawn(async move { db_write().await.log_err() })
.detach()
}
#[cfg(test)]
mod tests {
2022-12-04 00:26:37 +00:00
use std::{fs, thread};
2022-12-19 16:11:10 +00:00
use sqlez::{connection::Connection, domain::Domain};
use sqlez_macros::sql;
use tempdir::TempDir;
2022-12-02 22:30:26 +00:00
use crate::{open_db, DB_FILE_NAME};
2022-12-19 16:11:10 +00:00
// Test bad migration panics
2022-12-02 22:30:26 +00:00
#[gpui::test]
#[should_panic]
async fn test_bad_migration_panics() {
enum BadDB {}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
impl Domain for BadDB {
fn name() -> &'static str {
"db_tests"
}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
fn migrations() -> &'static [&'static str] {
2022-12-19 16:11:10 +00:00
&[
sql!(CREATE TABLE test(value);),
2022-12-02 22:30:26 +00:00
// failure because test already exists
2022-12-19 16:11:10 +00:00
sql!(CREATE TABLE test(value);),
]
2022-12-02 22:30:26 +00:00
}
}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
let tempdir = TempDir::new("DbTests").unwrap();
2022-12-04 00:26:37 +00:00
let _bad_db = open_db::<BadDB>(tempdir.path(), &util::channel::ReleaseChannel::Dev).await;
}
2022-12-19 16:11:10 +00:00
/// Test that DB exists but corrupted (causing recreate)
2022-12-02 22:30:26 +00:00
#[gpui::test]
async fn test_db_corruption() {
enum CorruptedDB {}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
impl Domain for CorruptedDB {
fn name() -> &'static str {
"db_tests"
}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
fn migrations() -> &'static [&'static str] {
&[sql!(CREATE TABLE test(value);)]
}
}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
enum GoodDB {}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
impl Domain for GoodDB {
fn name() -> &'static str {
"db_tests" //Notice same name
}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
fn migrations() -> &'static [&'static str] {
&[sql!(CREATE TABLE test2(value);)] //But different migration
}
}
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
let tempdir = TempDir::new("DbTests").unwrap();
{
2022-12-19 16:11:10 +00:00
let corrupt_db =
open_db::<CorruptedDB>(tempdir.path(), &util::channel::ReleaseChannel::Dev).await;
2022-12-02 22:30:26 +00:00
assert!(corrupt_db.persistent());
}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
let good_db = open_db::<GoodDB>(tempdir.path(), &util::channel::ReleaseChannel::Dev).await;
2022-12-19 16:11:10 +00:00
assert!(
good_db.select_row::<usize>("SELECT * FROM test2").unwrap()()
.unwrap()
.is_none()
);
let mut corrupted_backup_dir = fs::read_dir(tempdir.path())
.unwrap()
.find(|entry| {
!entry
.as_ref()
.unwrap()
.file_name()
.to_str()
.unwrap()
.starts_with("0")
})
.unwrap()
.unwrap()
.path();
2022-12-02 22:30:26 +00:00
corrupted_backup_dir.push(DB_FILE_NAME);
2022-12-19 16:11:10 +00:00
2022-12-02 22:30:26 +00:00
let backup = Connection::open_file(&corrupted_backup_dir.to_string_lossy());
2022-12-19 16:11:10 +00:00
assert!(backup.select_row::<usize>("SELECT * FROM test").unwrap()()
.unwrap()
.is_none());
}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
/// Test that DB exists but corrupted (causing recreate)
#[gpui::test]
async fn test_simultaneous_db_corruption() {
enum CorruptedDB {}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
impl Domain for CorruptedDB {
fn name() -> &'static str {
"db_tests"
}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
fn migrations() -> &'static [&'static str] {
&[sql!(CREATE TABLE test(value);)]
}
}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
enum GoodDB {}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
impl Domain for GoodDB {
fn name() -> &'static str {
"db_tests" //Notice same name
}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
fn migrations() -> &'static [&'static str] {
&[sql!(CREATE TABLE test2(value);)] //But different migration
}
}
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
let tempdir = TempDir::new("DbTests").unwrap();
{
// Setup the bad database
2022-12-19 16:11:10 +00:00
let corrupt_db =
open_db::<CorruptedDB>(tempdir.path(), &util::channel::ReleaseChannel::Dev).await;
2022-12-04 00:26:37 +00:00
assert!(corrupt_db.persistent());
}
2022-12-19 16:11:10 +00:00
// Try to connect to it a bunch of times at once
2022-12-04 00:26:37 +00:00
let mut guards = vec![];
for _ in 0..10 {
let tmp_path = tempdir.path().to_path_buf();
let guard = thread::spawn(move || {
2022-12-19 16:11:10 +00:00
let good_db = smol::block_on(open_db::<GoodDB>(
tmp_path.as_path(),
&util::channel::ReleaseChannel::Dev,
));
assert!(
good_db.select_row::<usize>("SELECT * FROM test2").unwrap()()
.unwrap()
.is_none()
);
2022-12-04 00:26:37 +00:00
});
2022-12-19 16:11:10 +00:00
2022-12-04 00:26:37 +00:00
guards.push(guard);
}
2022-12-19 16:11:10 +00:00
for guard in guards.into_iter() {
assert!(guard.join().is_ok());
}
2022-12-04 00:26:37 +00:00
}
}