2012-04-19 14:35:52 +08:00
|
|
|
/****************************************************************************
|
2012-09-24 21:22:20 +08:00
|
|
|
Copyright (c) 2010-2012 cocos2d-x.org
|
2018-01-29 16:25:32 +08:00
|
|
|
Copyright (c) 2013-2016 Chukong Technologies Inc.
|
|
|
|
Copyright (c) 2017-2018 Xiamen Yaji Software Co., Ltd.
|
2020-02-04 22:28:54 +08:00
|
|
|
Copyright (c) 2017-2020 c4games.com.
|
2012-04-19 14:35:52 +08:00
|
|
|
|
|
|
|
http://www.cocos2d-x.org
|
|
|
|
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
of this software and associated documentation files (the "Software"), to deal
|
|
|
|
in the Software without restriction, including without limitation the rights
|
|
|
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
copies of the Software, and to permit persons to whom the Software is
|
|
|
|
furnished to do so, subject to the following conditions:
|
|
|
|
|
|
|
|
The above copyright notice and this permission notice shall be included in
|
|
|
|
all copies or substantial portions of the Software.
|
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
THE SOFTWARE.
|
|
|
|
****************************************************************************/
|
2020-02-04 22:28:54 +08:00
|
|
|
#if defined(_WIN32)
|
|
|
|
#include <io.h>
|
|
|
|
#include <direct.h>
|
|
|
|
#else
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#endif
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
2020-10-02 19:52:32 +08:00
|
|
|
#include <inttypes.h>
|
|
|
|
|
2020-02-06 23:30:33 +08:00
|
|
|
#include "openssl/aes.h"
|
|
|
|
#include "openssl/modes.h"
|
2020-08-27 12:37:20 +08:00
|
|
|
#include "openssl/rc4.h"
|
2020-02-06 23:30:33 +08:00
|
|
|
|
2014-05-17 05:36:00 +08:00
|
|
|
#include "base/CCUserDefault.h"
|
|
|
|
#include "platform/CCCommon.h"
|
|
|
|
#include "platform/CCFileUtils.h"
|
2020-10-21 12:28:34 +08:00
|
|
|
#include "pugixml/pugixml.hpp"
|
2014-04-30 08:37:36 +08:00
|
|
|
#include "base/base64.h"
|
2014-07-14 23:05:16 +08:00
|
|
|
#include "base/ccUtils.h"
|
2013-03-05 14:53:37 +08:00
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
#include "yasio/ibstream.hpp"
|
|
|
|
#include "yasio/obstream.hpp"
|
|
|
|
#include "yasio/detail/sz.hpp"
|
|
|
|
|
2020-10-27 17:27:52 +08:00
|
|
|
#include "CCFileStream.h"
|
2020-02-04 22:28:54 +08:00
|
|
|
|
2020-02-06 21:15:15 +08:00
|
|
|
#define USER_DEFAULT_PLAIN_MODE 0
|
|
|
|
|
|
|
|
#if !USER_DEFAULT_PLAIN_MODE
|
2020-02-04 22:28:54 +08:00
|
|
|
#define USER_DEFAULT_FILENAME "UserDefault.bin"
|
2020-02-06 21:15:15 +08:00
|
|
|
#else
|
|
|
|
#define USER_DEFAULT_FILENAME "UserDefault.xml"
|
|
|
|
#endif
|
2012-04-19 14:35:52 +08:00
|
|
|
|
2020-02-06 01:08:51 +08:00
|
|
|
typedef int32_t udflen_t;
|
|
|
|
|
2012-04-19 14:35:52 +08:00
|
|
|
NS_CC_BEGIN
|
|
|
|
|
|
|
|
/**
|
2013-06-20 14:13:12 +08:00
|
|
|
* implements of UserDefault
|
2012-04-19 14:35:52 +08:00
|
|
|
*/
|
|
|
|
|
2013-12-20 14:06:24 +08:00
|
|
|
UserDefault* UserDefault::_userDefault = nullptr;
|
2012-04-19 14:35:52 +08:00
|
|
|
|
2020-02-06 23:30:33 +08:00
|
|
|
static void ud_setkey(std::string& lhs, const cxx17::string_view& rhs) {
|
|
|
|
static const size_t keyLen = 16;
|
|
|
|
if (!rhs.empty()) {
|
|
|
|
lhs.assign(rhs.data(), std::min(rhs.length(), keyLen));
|
|
|
|
if (lhs.size() < keyLen)
|
|
|
|
lhs.insert(lhs.end(), keyLen - lhs.size(), '\0'); // fill 0, if key insufficient
|
|
|
|
}
|
2020-02-06 01:08:51 +08:00
|
|
|
else
|
2020-02-06 23:30:33 +08:00
|
|
|
lhs.assign(keyLen, '\0');
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ud_write_v_s(yasio::obstream& obs, const cxx17::string_view value)
|
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
size_t value_offset = obs.length();
|
|
|
|
obs.write_v(value);
|
|
|
|
value_offset += (obs.length() - value_offset - value.length());
|
2020-02-06 23:30:33 +08:00
|
|
|
if(!value.empty())
|
2020-11-15 11:44:06 +08:00
|
|
|
UserDefault::getInstance()->encrypt(obs.wptr(value_offset), value.length(), AES_ENCRYPT);
|
2020-02-06 23:30:33 +08:00
|
|
|
}
|
|
|
|
|
2020-11-02 16:35:31 +08:00
|
|
|
void UserDefault::setEncryptEnabled(bool enabled, const std::string& key, const std::string& iv)
|
2020-02-06 23:30:33 +08:00
|
|
|
{
|
|
|
|
_encryptEnabled = enabled;
|
|
|
|
if (_encryptEnabled) {
|
|
|
|
ud_setkey(_key, key);
|
|
|
|
ud_setkey(_iv, iv);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void UserDefault::encrypt(std::string& inout, int enc)
|
|
|
|
{
|
|
|
|
if (!inout.empty())
|
|
|
|
encrypt(&inout.front(), inout.size(), enc);
|
|
|
|
}
|
|
|
|
|
|
|
|
void UserDefault::encrypt(char* inout, size_t size, int enc)
|
|
|
|
{
|
|
|
|
if (size > 0) {
|
|
|
|
AES_KEY aeskey;
|
|
|
|
AES_set_encrypt_key((const unsigned char*)_key.c_str(), 128, &aeskey);
|
|
|
|
|
|
|
|
unsigned char iv[16] = { 0 };
|
|
|
|
memcpy(iv, _iv.c_str(), std::min(sizeof(iv), _iv.size()));
|
|
|
|
|
|
|
|
int ignored_num = 0;
|
|
|
|
AES_cfb128_encrypt((unsigned char*)inout, (unsigned char*)inout, size, &aeskey, iv, &ignored_num, enc);
|
|
|
|
}
|
2020-02-06 01:08:51 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
UserDefault::~UserDefault()
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-02-06 01:08:51 +08:00
|
|
|
closeFileMapping();
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
UserDefault::UserDefault()
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2020-02-06 01:08:51 +08:00
|
|
|
void UserDefault::closeFileMapping()
|
|
|
|
{
|
|
|
|
_rwmmap.reset();
|
|
|
|
if (_fd != -1) {
|
|
|
|
posix_close(_fd);
|
|
|
|
_fd = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-12 06:24:23 +08:00
|
|
|
bool UserDefault::getBoolForKey(const char* pKey)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2013-07-12 06:24:23 +08:00
|
|
|
return getBoolForKey(pKey, false);
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
bool UserDefault::getBoolForKey(const char* pKey, bool defaultValue)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
auto pValue = getValueForKey(pKey);
|
|
|
|
if (pValue)
|
|
|
|
return *pValue == "true";
|
2013-01-26 10:41:27 +08:00
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
return defaultValue;
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
int UserDefault::getIntegerForKey(const char* pKey)
|
2012-11-16 14:11:21 +08:00
|
|
|
{
|
|
|
|
return getIntegerForKey(pKey, 0);
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
int UserDefault::getIntegerForKey(const char* pKey, int defaultValue)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
auto pValue = getValueForKey(pKey);
|
|
|
|
if (pValue)
|
|
|
|
return atoi(pValue->c_str());
|
2013-01-26 10:41:27 +08:00
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
return defaultValue;
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2020-10-02 19:52:32 +08:00
|
|
|
int64_t UserDefault::getLargeIntForKey(const char* key)
|
|
|
|
{
|
|
|
|
return getLargeIntForKey(key, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int64_t UserDefault::getLargeIntForKey(const char* key, int64_t defaultValue)
|
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
auto pValue = getValueForKey(key);
|
|
|
|
if (pValue)
|
|
|
|
return std::stoll(pValue->c_str());
|
2020-10-02 19:52:32 +08:00
|
|
|
|
|
|
|
return defaultValue;
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
float UserDefault::getFloatForKey(const char* pKey)
|
2012-11-16 14:11:21 +08:00
|
|
|
{
|
|
|
|
return getFloatForKey(pKey, 0.0f);
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
float UserDefault::getFloatForKey(const char* pKey, float defaultValue)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
return static_cast<float>(getDoubleForKey(pKey, defaultValue));
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
double UserDefault::getDoubleForKey(const char* pKey)
|
2012-11-16 14:11:21 +08:00
|
|
|
{
|
|
|
|
return getDoubleForKey(pKey, 0.0);
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
double UserDefault::getDoubleForKey(const char* pKey, double defaultValue)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
auto pValue = getValueForKey(pKey);
|
|
|
|
if (pValue)
|
|
|
|
return utils::atof(pValue->c_str());
|
2013-01-26 10:41:27 +08:00
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
return defaultValue;
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
std::string UserDefault::getStringForKey(const char* pKey)
|
2012-11-16 14:11:21 +08:00
|
|
|
{
|
|
|
|
return getStringForKey(pKey, "");
|
|
|
|
}
|
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
std::string UserDefault::getStringForKey(const char* pKey, const std::string & defaultValue)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
auto pValue = getValueForKey(pKey);
|
|
|
|
if (pValue)
|
|
|
|
return *pValue;
|
2013-01-26 10:41:27 +08:00
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
return defaultValue;
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2020-11-15 11:44:06 +08:00
|
|
|
const std::string* UserDefault::getValueForKey(const std::string& key)
|
|
|
|
{
|
|
|
|
// do lazyInit at here to make sure _encryptEnabled works well,
|
|
|
|
lazyInit();
|
|
|
|
|
|
|
|
auto it = this->_values.find(key);
|
|
|
|
if (it != this->_values.end())
|
|
|
|
return &it->second;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
void UserDefault::setBoolForKey(const char* pKey, bool value)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2012-09-17 15:02:24 +08:00
|
|
|
// save bool value as string
|
2020-02-04 22:28:54 +08:00
|
|
|
setStringForKey(pKey, value ? "true" : "false");
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
void UserDefault::setIntegerForKey(const char* pKey, int value)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
|
|
|
// check key
|
|
|
|
if (! pKey)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// format the value
|
|
|
|
char tmp[50];
|
2020-10-02 19:52:32 +08:00
|
|
|
memset(tmp, 0, sizeof(tmp));
|
2012-04-19 14:35:52 +08:00
|
|
|
sprintf(tmp, "%d", value);
|
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
setStringForKey(pKey, tmp);
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2020-10-02 19:52:32 +08:00
|
|
|
void UserDefault::setLargeIntForKey(const char* pKey, int64_t value)
|
|
|
|
{// check key
|
|
|
|
if (!pKey)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// format the value
|
|
|
|
char tmp[96];
|
|
|
|
memset(tmp, 0, sizeof(tmp));
|
|
|
|
sprintf(tmp, "%" PRId64, value);
|
|
|
|
|
|
|
|
setStringForKey(pKey, tmp);
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
void UserDefault::setFloatForKey(const char* pKey, float value)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
|
|
|
setDoubleForKey(pKey, value);
|
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
void UserDefault::setDoubleForKey(const char* pKey, double value)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
|
|
|
// check key
|
|
|
|
if (! pKey)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// format the value
|
|
|
|
char tmp[50];
|
|
|
|
memset(tmp, 0, 50);
|
|
|
|
sprintf(tmp, "%f", value);
|
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
setStringForKey(pKey, tmp);
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
void UserDefault::setStringForKey(const char* pKey, const std::string & value)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-02-06 01:08:51 +08:00
|
|
|
// ignore empty key
|
|
|
|
if (! pKey || !*pKey)
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-02-06 23:30:33 +08:00
|
|
|
setValueForKey(pKey, value);
|
2020-02-06 01:08:51 +08:00
|
|
|
|
2020-02-06 21:15:15 +08:00
|
|
|
#if !USER_DEFAULT_PLAIN_MODE
|
2020-02-06 01:08:51 +08:00
|
|
|
if (_rwmmap) {
|
|
|
|
yasio::obstream obs;
|
2020-02-06 23:30:33 +08:00
|
|
|
if (_encryptEnabled)
|
|
|
|
{
|
|
|
|
ud_write_v_s(obs, pKey);
|
|
|
|
ud_write_v_s(obs, value);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
obs.write_v(pKey);
|
|
|
|
obs.write_v(value);
|
|
|
|
}
|
|
|
|
|
2020-02-06 01:08:51 +08:00
|
|
|
if ((_realSize + obs.length() + sizeof(udflen_t)) < _curMapSize)
|
|
|
|
{
|
|
|
|
// increase entities count
|
2020-11-03 12:41:23 +08:00
|
|
|
yasio::obstream::swrite_ix(_rwmmap->data(), 1 + yasio::ibstream::sread_ix<udflen_t>(_rwmmap->data()));
|
2020-02-06 01:08:51 +08:00
|
|
|
|
2020-02-06 11:55:28 +08:00
|
|
|
// append entity
|
2020-02-06 01:08:51 +08:00
|
|
|
::memcpy(_rwmmap->data() + sizeof(udflen_t) + _realSize, obs.data(), obs.length());
|
|
|
|
_realSize += obs.length();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
flush();
|
|
|
|
}
|
|
|
|
}
|
2020-02-06 21:15:15 +08:00
|
|
|
#else
|
|
|
|
flush();
|
|
|
|
#endif
|
2013-05-29 08:06:41 +08:00
|
|
|
}
|
|
|
|
|
2020-02-06 23:30:33 +08:00
|
|
|
void UserDefault::setValueForKey(const std::string& key, const std::string& value)
|
2020-11-15 11:44:06 +08:00
|
|
|
{
|
|
|
|
// do lazyInit at here to make sure _encryptEnabled works well
|
|
|
|
lazyInit();
|
|
|
|
|
|
|
|
updateValueForKey(key, value);
|
|
|
|
}
|
|
|
|
|
|
|
|
void UserDefault::updateValueForKey(const std::string& key, const std::string& value)
|
2020-02-06 23:30:33 +08:00
|
|
|
{
|
|
|
|
auto it = _values.find(key);
|
|
|
|
if (it != _values.end())
|
|
|
|
it->second = value;
|
|
|
|
else
|
|
|
|
_values.emplace(key, value);
|
|
|
|
}
|
|
|
|
|
2013-07-12 06:24:23 +08:00
|
|
|
UserDefault* UserDefault::getInstance()
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
if (_userDefault) return _userDefault;
|
2012-04-19 14:35:52 +08:00
|
|
|
|
2020-11-15 11:44:06 +08:00
|
|
|
return ( _userDefault = new (std::nothrow) UserDefault() );
|
2013-07-12 06:24:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void UserDefault::destroyInstance()
|
|
|
|
{
|
2013-12-20 14:06:24 +08:00
|
|
|
CC_SAFE_DELETE(_userDefault);
|
2013-07-12 06:24:23 +08:00
|
|
|
}
|
|
|
|
|
2015-04-20 03:07:48 +08:00
|
|
|
void UserDefault::setDelegate(UserDefault *delegate)
|
|
|
|
{
|
|
|
|
if (_userDefault)
|
|
|
|
delete _userDefault;
|
|
|
|
|
|
|
|
_userDefault = delegate;
|
|
|
|
}
|
|
|
|
|
2020-11-15 11:44:06 +08:00
|
|
|
void UserDefault::lazyInit()
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-11-15 11:44:06 +08:00
|
|
|
if (_initialized) return;
|
|
|
|
|
|
|
|
_filePath = FileUtils::getInstance()->getWritablePath() + USER_DEFAULT_FILENAME;
|
2013-01-26 10:41:27 +08:00
|
|
|
|
2020-02-06 21:15:15 +08:00
|
|
|
#if !USER_DEFAULT_PLAIN_MODE
|
2020-11-15 11:44:06 +08:00
|
|
|
// construct file mapping
|
|
|
|
_fd = posix_open(_filePath.c_str(), O_OVERLAP_FLAGS);
|
|
|
|
if (_fd == -1) {
|
|
|
|
log("[Warnning] UserDefault::init open storage file '%s' failed!", _filePath.c_str());
|
|
|
|
return;
|
|
|
|
}
|
2019-11-24 23:15:56 +08:00
|
|
|
|
2020-11-15 11:44:06 +08:00
|
|
|
int filesize = posix_lseek(_fd, 0, SEEK_END);
|
|
|
|
posix_lseek(_fd, 0, SEEK_SET);
|
2013-01-26 10:41:27 +08:00
|
|
|
|
2020-11-15 11:44:06 +08:00
|
|
|
if (filesize < _curMapSize) { // construct a empty file mapping
|
|
|
|
posix_fsetsize(_fd, _curMapSize);
|
|
|
|
_rwmmap = std::make_shared<mio::mmap_sink>(posix_fd2fh(_fd), 0, _curMapSize);
|
|
|
|
}
|
|
|
|
else { /// load to memory _values
|
|
|
|
_rwmmap = std::make_shared<mio::mmap_sink>(posix_fd2fh(_fd), 0, mio::map_entire_file);
|
|
|
|
if (_rwmmap->is_mapped()) { // no error
|
|
|
|
yasio::ibstream_view ibs(_rwmmap->data(), _rwmmap->length());
|
|
|
|
|
|
|
|
if (ibs.length() > 0) {
|
|
|
|
// read count of keyvals.
|
|
|
|
int count = ibs.read_ix<int>();
|
|
|
|
for (auto i = 0; i < count; ++i) {
|
|
|
|
std::string key(ibs.read_v());
|
|
|
|
std::string value(ibs.read_v());
|
|
|
|
if (_encryptEnabled)
|
|
|
|
{
|
|
|
|
this->encrypt(key, AES_DECRYPT);
|
|
|
|
this->encrypt(value, AES_DECRYPT);
|
2020-02-06 01:08:51 +08:00
|
|
|
}
|
2020-11-15 11:44:06 +08:00
|
|
|
updateValueForKey(key, value);
|
2020-02-04 22:28:54 +08:00
|
|
|
}
|
2020-11-15 11:44:06 +08:00
|
|
|
_realSize = ibs.seek(0, SEEK_CUR) - sizeof(udflen_t);
|
2020-02-04 22:28:54 +08:00
|
|
|
}
|
2020-02-06 21:15:15 +08:00
|
|
|
}
|
|
|
|
else {
|
2020-11-15 11:44:06 +08:00
|
|
|
closeFileMapping();
|
|
|
|
::remove(_filePath.c_str());
|
|
|
|
log("[Warnning] UserDefault::init map file '%s' failed, we can't save data persisit this time, next time we will retry!", _filePath.c_str());
|
2020-02-06 21:15:15 +08:00
|
|
|
}
|
2020-11-15 11:44:06 +08:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
pugi::xml_document doc;
|
|
|
|
pugi::xml_parse_result ret = doc.load_file(_filePath.c_str());
|
|
|
|
if (ret) {
|
|
|
|
for (auto& elem : doc.document_element())
|
|
|
|
setValueForKey(elem.name(), elem.text().as_string());
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
log("UserDefault::init load xml file: %s failed, %s", _filePath.c_str(), ret.description());
|
|
|
|
}
|
2020-02-06 21:15:15 +08:00
|
|
|
#endif
|
2012-04-19 14:35:52 +08:00
|
|
|
|
2020-11-15 11:44:06 +08:00
|
|
|
_initialized = true;
|
2012-04-19 14:35:52 +08:00
|
|
|
}
|
|
|
|
|
2013-06-20 14:13:12 +08:00
|
|
|
void UserDefault::flush()
|
2012-04-19 14:35:52 +08:00
|
|
|
{
|
2020-02-06 21:15:15 +08:00
|
|
|
#if !USER_DEFAULT_PLAIN_MODE
|
2020-02-06 01:08:51 +08:00
|
|
|
if (_rwmmap) {
|
|
|
|
yasio::obstream obs;
|
2020-11-03 12:41:23 +08:00
|
|
|
obs.write_ix<int>(static_cast<int>(this->_values.size()));
|
2020-02-06 01:08:51 +08:00
|
|
|
for (auto& item : this->_values) {
|
2020-02-06 23:30:33 +08:00
|
|
|
if (_encryptEnabled)
|
|
|
|
{
|
|
|
|
ud_write_v_s(obs, item.first);
|
|
|
|
ud_write_v_s(obs, item.second);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
obs.write_v(item.first);
|
|
|
|
obs.write_v(item.second);
|
|
|
|
}
|
2020-02-06 01:08:51 +08:00
|
|
|
}
|
2015-07-06 17:01:17 +08:00
|
|
|
|
2020-02-06 11:55:28 +08:00
|
|
|
std::error_code error;
|
2020-02-06 01:08:51 +08:00
|
|
|
if (obs.length() > _curMapSize) {
|
|
|
|
_rwmmap->unmap();
|
|
|
|
_curMapSize <<= 1; // X2
|
2020-02-06 11:55:28 +08:00
|
|
|
posix_fsetsize(_fd, _curMapSize);
|
2020-02-06 01:08:51 +08:00
|
|
|
_rwmmap->map(posix_fd2fh(_fd), 0, _curMapSize, error);
|
|
|
|
}
|
2015-07-06 17:01:17 +08:00
|
|
|
|
2020-02-06 11:55:28 +08:00
|
|
|
if (!error && _rwmmap->is_mapped())
|
2020-02-06 01:08:51 +08:00
|
|
|
{ // mapping status is good
|
|
|
|
::memcpy(_rwmmap->data(), obs.data(), obs.length());
|
|
|
|
_realSize = obs.length() - sizeof(udflen_t);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// close file mapping and do a simple workaround fix to don't do persist later at this time
|
|
|
|
closeFileMapping();
|
|
|
|
::remove(_filePath.c_str());
|
|
|
|
}
|
|
|
|
}
|
2020-02-06 21:15:15 +08:00
|
|
|
#else
|
|
|
|
pugi::xml_document doc;
|
|
|
|
doc.load_string(R"(<?xml version="1.0" ?>
|
|
|
|
<r />)");
|
|
|
|
auto r = doc.document_element();
|
|
|
|
for(auto& kv : _values)
|
|
|
|
r.append_child(kv.first.c_str())
|
|
|
|
.append_child(pugi::xml_node_type::node_pcdata)
|
|
|
|
.set_value(kv.second.c_str());
|
|
|
|
doc.save_file(_filePath.c_str(), " ");
|
|
|
|
#endif
|
2020-02-04 22:28:54 +08:00
|
|
|
}
|
2015-07-06 17:01:17 +08:00
|
|
|
|
2020-02-04 22:28:54 +08:00
|
|
|
void UserDefault::deleteValueForKey(const char* key)
|
|
|
|
{
|
|
|
|
if(this->_values.erase(key) > 0)
|
|
|
|
flush();
|
2015-07-06 17:01:17 +08:00
|
|
|
}
|
|
|
|
|
2012-04-19 14:35:52 +08:00
|
|
|
NS_CC_END
|