1
use std::{
2
    collections::HashMap,
3
    path::{Path, PathBuf},
4
    time::Duration,
5
};
6

            
7
#[cfg(feature = "encryption")]
8
use bonsaidb_core::document::KeyId;
9
use bonsaidb_core::schema::{Schema, SchemaName};
10
use sysinfo::{RefreshKind, System, SystemExt};
11

            
12
#[cfg(feature = "encryption")]
13
use crate::vault::AnyVaultKeyStorage;
14
use crate::{
15
    storage::{DatabaseOpener, StorageSchemaOpener},
16
    Error,
17
};
18

            
19
#[cfg(feature = "password-hashing")]
20
mod argon;
21
#[cfg(feature = "password-hashing")]
22
pub use argon::*;
23

            
24
/// Configuration options for [`Storage`](crate::storage::Storage).
25
#[derive(Debug)]
26
#[non_exhaustive]
27
pub struct StorageConfiguration {
28
    /// The path to the database. Defaults to `db.bonsaidb` if not specified.
29
    pub path: Option<PathBuf>,
30

            
31
    /// The unique id of the server. If not specified, the server will randomly
32
    /// generate a unique id on startup. If the server generated an id and this
33
    /// value is subsequently set, the generated id will be overridden by the
34
    /// one specified here.
35
    pub unique_id: Option<u64>,
36

            
37
    /// The vault key storage to use. If not specified,
38
    /// [`LocalVaultKeyStorage`](crate::vault::LocalVaultKeyStorage) will be
39
    /// used with the server's data folder as the path. This is **incredibly
40
    /// insecure and should not be used outside of testing**.
41
    ///
42
    /// For secure encryption, it is important to store the vault keys in a
43
    /// location that is separate from the database. If the keys are on the same
44
    /// hardware as the encrypted content, anyone with access to the disk will
45
    /// be able to decrypt the stored data.
46
    #[cfg(feature = "encryption")]
47
    pub vault_key_storage: Option<Box<dyn AnyVaultKeyStorage>>,
48

            
49
    /// The default encryption key for the database. If specified, all documents
50
    /// will be stored encrypted at-rest using the key specified. Having this
51
    /// key specified will also encrypt views. Without this, views will be
52
    /// stored unencrypted.
53
    #[cfg(feature = "encryption")]
54
    pub default_encryption_key: Option<KeyId>,
55

            
56
    /// Configuration options related to background tasks.
57
    pub workers: Tasks,
58

            
59
    /// Configuration options related to views.
60
    pub views: Views,
61

            
62
    /// Controls how the key-value store persists keys, on a per-database basis.
63
    pub key_value_persistence: KeyValuePersistence,
64

            
65
    /// Password hashing configuration.
66
    #[cfg(feature = "password-hashing")]
67
    pub argon: ArgonConfiguration,
68

            
69
    pub(crate) initial_schemas: HashMap<SchemaName, Box<dyn DatabaseOpener>>,
70
}
71

            
72
impl Default for StorageConfiguration {
73
2063
    fn default() -> Self {
74
2063
        let system_specs = RefreshKind::new().with_cpu().with_memory();
75
2063
        let mut system = System::new_with_specifics(system_specs);
76
2063
        system.refresh_specifics(system_specs);
77
2063
        Self {
78
2063
            path: None,
79
2063
            unique_id: None,
80
2063
            #[cfg(feature = "encryption")]
81
2063
            vault_key_storage: None,
82
2063
            #[cfg(feature = "encryption")]
83
2063
            default_encryption_key: None,
84
2063
            workers: Tasks::default_for(&system),
85
2063
            views: Views::default(),
86
2063
            key_value_persistence: KeyValuePersistence::default(),
87
2063
            #[cfg(feature = "password-hashing")]
88
2063
            argon: ArgonConfiguration::default_for(&system),
89
2063
            initial_schemas: HashMap::default(),
90
2063
        }
91
2063
    }
92
}
93

            
94
impl StorageConfiguration {
95
    /// Registers the schema provided.
96
    pub fn register_schema<S: Schema>(&mut self) -> Result<(), Error> {
97
        self.initial_schemas
98
204
            .insert(S::schema_name(), Box::new(StorageSchemaOpener::<S>::new()?));
99
204
        Ok(())
100
204
    }
101
}
102

            
103
/// Configuration options for background tasks.
104
#[derive(Debug)]
105
pub struct Tasks {
106
    /// Defines how many workers should be spawned to process tasks. This
107
    /// defaults to the 2x the number of cpu cores available to the system or 4, whichever is larger.
108
    pub worker_count: usize,
109
}
110

            
111
impl SystemDefault for Tasks {
112
2063
    fn default_for(system: &System) -> Self {
113
2063
        Self {
114
2063
            worker_count: system
115
2063
                .physical_core_count()
116
2063
                .unwrap_or_else(|| system.processors().len())
117
2063
                * 2,
118
2063
        }
119
2063
    }
120
}
121

            
122
/// Configuration options for views.
123
2041
#[derive(Clone, Debug, Default)]
124
pub struct Views {
125
    /// If true, the database will scan all views during the call to
126
    /// `open_local`. This will cause database opening to take longer, but once
127
    /// the database is open, no request will need to wait for the integrity to
128
    /// be checked. However, for faster startup time, you may wish to delay the
129
    /// integrity scan. Default value is `false`.
130
    pub check_integrity_on_open: bool,
131
}
132

            
133
/// Rules for persisting key-value changes. Default persistence is to
134
/// immediately persist all changes. While this ensures data integrity, the
135
/// overhead of the key-value store can be significantly reduced by utilizing
136
/// lazy persistence strategies that delay writing changes until certain
137
/// thresholds have been met.
138
///
139
/// ## Immediate persistence
140
///
141
/// The default persistence mode will trigger commits always:
142
///
143
/// ```rust
144
/// # use bonsaidb_local::config::KeyValuePersistence;
145
/// # use std::time::Duration;
146
/// assert!(!KeyValuePersistence::default().should_commit(0, Duration::ZERO));
147
/// assert!(KeyValuePersistence::default().should_commit(1, Duration::ZERO));
148
/// ```
149
///
150
/// ## Lazy persistence
151
///
152
/// Lazy persistence allows setting multiple thresholds, allowing for customized
153
/// behavior that can help tune performance, especially under write-heavy loads.
154
///
155
/// It is good practice to include one [`PersistenceThreshold`] that has no
156
/// duration, as it will ensure that the in-memory cache cannot exceed a certain
157
/// size. This number is counted for each database indepenently.
158
///
159
/// ```rust
160
/// # use bonsaidb_local::config::{KeyValuePersistence, PersistenceThreshold};
161
/// # use std::time::Duration;
162
/// #
163
/// let persistence = KeyValuePersistence::lazy([
164
///     PersistenceThreshold::after_changes(1).and_duration(Duration::from_secs(120)),
165
///     PersistenceThreshold::after_changes(10).and_duration(Duration::from_secs(10)),
166
///     PersistenceThreshold::after_changes(100),
167
/// ]);
168
///
169
/// // After 1 change and 60 seconds, no changes would be committed:
170
/// assert!(!persistence.should_commit(1, Duration::from_secs(60)));
171
/// // But on or after 120 seconds, that change will be committed:
172
/// assert!(persistence.should_commit(1, Duration::from_secs(120)));
173
///
174
/// // After 10 changes and 10 seconds, changes will be committed:
175
/// assert!(persistence.should_commit(10, Duration::from_secs(10)));
176
///
177
/// // Once 100 changes have been accumulated, this ruleset will always commit
178
/// // regardless of duration.
179
/// assert!(persistence.should_commit(100, Duration::ZERO));
180
/// ```
181
17766
#[derive(Debug, Clone)]
182
#[must_use]
183
pub struct KeyValuePersistence(KeyValuePersistenceInner);
184

            
185
17766
#[derive(Debug, Clone)]
186
enum KeyValuePersistenceInner {
187
    Immediate,
188
    Lazy(Vec<PersistenceThreshold>),
189
}
190

            
191
impl Default for KeyValuePersistence {
192
    /// Returns [`KeyValuePersistence::immediate()`].
193
2068
    fn default() -> Self {
194
2068
        Self::immediate()
195
2068
    }
196
}
197

            
198
impl KeyValuePersistence {
199
    /// Returns a ruleset that commits all changes immediately.
200
2244
    pub const fn immediate() -> Self {
201
2244
        Self(KeyValuePersistenceInner::Immediate)
202
2244
    }
203

            
204
    /// Returns a ruleset that lazily commits data based on a list of thresholds.
205
13
    pub fn lazy<II>(rules: II) -> Self
206
13
    where
207
13
        II: IntoIterator<Item = PersistenceThreshold>,
208
13
    {
209
13
        let mut rules = rules.into_iter().collect::<Vec<_>>();
210
13
        rules.sort_by(|a, b| a.number_of_changes.cmp(&b.number_of_changes));
211
13
        Self(KeyValuePersistenceInner::Lazy(rules))
212
13
    }
213

            
214
    /// Returns true if these rules determine that the outstanding changes should be persisted.
215
    #[must_use]
216
145073
    pub fn should_commit(
217
145073
        &self,
218
145073
        number_of_changes: usize,
219
145073
        elapsed_since_last_commit: Duration,
220
145073
    ) -> bool {
221
145073
        self.duration_until_next_commit(number_of_changes, elapsed_since_last_commit)
222
145073
            == Duration::ZERO
223
145073
    }
224

            
225
290511
    pub(crate) fn duration_until_next_commit(
226
290511
        &self,
227
290511
        number_of_changes: usize,
228
290511
        elapsed_since_last_commit: Duration,
229
290511
    ) -> Duration {
230
290511
        if number_of_changes == 0 {
231
83503
            Duration::MAX
232
        } else {
233
207008
            match &self.0 {
234
206337
                KeyValuePersistenceInner::Immediate => Duration::ZERO,
235
671
                KeyValuePersistenceInner::Lazy(rules) => {
236
671
                    let mut shortest_duration = Duration::MAX;
237
671
                    for rule in rules
238
671
                        .iter()
239
675
                        .take_while(|rule| rule.number_of_changes <= number_of_changes)
240
                    {
241
7
                        let remaining_time =
242
7
                            rule.duration.saturating_sub(elapsed_since_last_commit);
243
7
                        shortest_duration = shortest_duration.min(remaining_time);
244
7

            
245
7
                        if shortest_duration == Duration::ZERO {
246
3
                            break;
247
4
                        }
248
                    }
249
671
                    shortest_duration
250
                }
251
            }
252
        }
253
290511
    }
254
}
255

            
256
/// A threshold controlling lazy commits. For a threshold to apply, both
257
/// `number_of_changes` must be met or surpassed and `duration` must have
258
/// elpased since the last commit.
259
///
260
/// A threshold with a duration of zero will not wait any time to persist
261
/// changes once the specified `number_of_changes` has been met or surpassed.
262
#[derive(Debug, Copy, Clone)]
263
#[must_use]
264
pub struct PersistenceThreshold {
265
    /// The minimum number of changes that must have occurred for this threshold to apply.
266
    pub number_of_changes: usize,
267
    /// The amount of time that must elapse since the last write for this threshold to apply.
268
    pub duration: Duration,
269
}
270

            
271
impl PersistenceThreshold {
272
    /// Returns a threshold that applies after a number of changes have elapsed.
273
224
    pub const fn after_changes(number_of_changes: usize) -> Self {
274
224
        Self {
275
224
            number_of_changes,
276
224
            duration: Duration::ZERO,
277
224
        }
278
224
    }
279

            
280
    /// Sets the duration of this threshold to `duration` and returns self.
281
1
    pub const fn and_duration(mut self, duration: Duration) -> Self {
282
1
        self.duration = duration;
283
1
        self
284
1
    }
285
}
286

            
287
/// Storage configuration builder methods.
288
pub trait Builder: Default {
289
    /// Creates a default configuration with `path` set.
290
131
    fn new<P: AsRef<Path>>(path: P) -> Self {
291
131
        Self::default().path(path)
292
131
    }
293

            
294
    /// Registers the schema and returns self.
295
    fn with_schema<S: Schema>(self) -> Result<Self, Error>;
296

            
297
    /// Sets [`StorageConfiguration::path`](StorageConfiguration#structfield.path) to `path` and returns self.
298
    fn path<P: AsRef<Path>>(self, path: P) -> Self;
299
    /// Sets [`StorageConfiguration::unique_id`](StorageConfiguration#structfield.unique_id) to `unique_id` and returns self.
300
    fn unique_id(self, unique_id: u64) -> Self;
301
    /// Sets [`StorageConfiguration::vault_key_storage`](StorageConfiguration#structfield.vault_key_storage) to `key_storage` and returns self.
302
    #[cfg(feature = "encryption")]
303
    fn vault_key_storage<VaultKeyStorage: AnyVaultKeyStorage>(
304
        self,
305
        key_storage: VaultKeyStorage,
306
    ) -> Self;
307
    /// Sets [`StorageConfiguration::default_encryption_key`](StorageConfiguration#structfield.default_encryption_key) to `path` and returns self.
308
    #[cfg(feature = "encryption")]
309
    fn default_encryption_key(self, key: KeyId) -> Self;
310
    /// Sets [`Tasks::worker_count`] to `worker_count` and returns self.
311
    fn tasks_worker_count(self, worker_count: usize) -> Self;
312
    /// Sets [`Views::check_integrity_on_open`] to `check` and returns self.
313
    fn check_view_integrity_on_open(self, check: bool) -> Self;
314

            
315
    /// Sets [`StorageConfiguration::key_value_persistence`](StorageConfiguration#structfield.key_value_persistence) to `persistence` and returns self.
316
    fn key_value_persistence(self, persistence: KeyValuePersistence) -> Self;
317
}
318

            
319
impl Builder for StorageConfiguration {
320
    fn with_schema<S: Schema>(mut self) -> Result<Self, Error> {
321
131
        self.register_schema::<S>()?;
322
131
        Ok(self)
323
131
    }
324

            
325
55
    fn path<P: AsRef<Path>>(mut self, path: P) -> Self {
326
55
        self.path = Some(path.as_ref().to_owned());
327
55
        self
328
55
    }
329

            
330
    fn unique_id(mut self, unique_id: u64) -> Self {
331
        self.unique_id = Some(unique_id);
332
        self
333
    }
334

            
335
    #[cfg(feature = "encryption")]
336
3
    fn vault_key_storage<VaultKeyStorage: AnyVaultKeyStorage>(
337
3
        mut self,
338
3
        key_storage: VaultKeyStorage,
339
3
    ) -> Self {
340
3
        self.vault_key_storage = Some(Box::new(key_storage));
341
3
        self
342
3
    }
343

            
344
    #[cfg(feature = "encryption")]
345
66
    fn default_encryption_key(mut self, key: KeyId) -> Self {
346
66
        self.default_encryption_key = Some(key);
347
66
        self
348
66
    }
349

            
350
    fn tasks_worker_count(mut self, worker_count: usize) -> Self {
351
        self.workers.worker_count = worker_count;
352
        self
353
    }
354

            
355
1
    fn check_view_integrity_on_open(mut self, check: bool) -> Self {
356
1
        self.views.check_integrity_on_open = check;
357
1
        self
358
1
    }
359

            
360
1
    fn key_value_persistence(mut self, persistence: KeyValuePersistence) -> Self {
361
1
        self.key_value_persistence = persistence;
362
1
        self
363
1
    }
364
}
365

            
366
pub(crate) trait SystemDefault: Sized {
367
    fn default_for(system: &System) -> Self;
368
1
    fn default() -> Self {
369
1
        let system_specs = RefreshKind::new().with_cpu().with_memory();
370
1
        let mut system = System::new_with_specifics(system_specs);
371
1
        system.refresh_specifics(system_specs);
372
1
        Self::default_for(&system)
373
1
    }
374
}