1
use std::{
2
    collections::HashMap,
3
    path::{Path, PathBuf},
4
    time::Duration,
5
};
6

            
7
#[cfg(feature = "encryption")]
8
use bonsaidb_core::document::KeyId;
9
use bonsaidb_core::schema::{Schema, SchemaName};
10
use sysinfo::{RefreshKind, System, SystemExt};
11

            
12
#[cfg(feature = "encryption")]
13
use crate::vault::AnyVaultKeyStorage;
14
use crate::{
15
    storage::{DatabaseOpener, StorageSchemaOpener},
16
    Error,
17
};
18

            
19
#[cfg(feature = "password-hashing")]
20
mod argon;
21
#[cfg(feature = "password-hashing")]
22
pub use argon::*;
23

            
24
/// Configuration options for [`Storage`](crate::storage::Storage).
25
#[derive(Debug)]
26
#[non_exhaustive]
27
pub struct StorageConfiguration {
28
    /// The path to the database. Defaults to `db.bonsaidb` if not specified.
29
    pub path: Option<PathBuf>,
30

            
31
    /// Prevents storing data on the disk. This is intended for testing purposes
32
    /// primarily. Keep in mind that the underlying storage format is
33
    /// append-only.
34
    pub memory_only: bool,
35

            
36
    /// The unique id of the server. If not specified, the server will randomly
37
    /// generate a unique id on startup. If the server generated an id and this
38
    /// value is subsequently set, the generated id will be overridden by the
39
    /// one specified here.
40
    pub unique_id: Option<u64>,
41

            
42
    /// The vault key storage to use. If not specified,
43
    /// [`LocalVaultKeyStorage`](crate::vault::LocalVaultKeyStorage) will be
44
    /// used with the server's data folder as the path. This is **incredibly
45
    /// insecure and should not be used outside of testing**.
46
    ///
47
    /// For secure encryption, it is important to store the vault keys in a
48
    /// location that is separate from the database. If the keys are on the same
49
    /// hardware as the encrypted content, anyone with access to the disk will
50
    /// be able to decrypt the stored data.
51
    #[cfg(feature = "encryption")]
52
    pub vault_key_storage: Option<Box<dyn AnyVaultKeyStorage>>,
53

            
54
    /// The default encryption key for the database. If specified, all documents
55
    /// will be stored encrypted at-rest using the key specified. Having this
56
    /// key specified will also encrypt views. Without this, views will be
57
    /// stored unencrypted.
58
    #[cfg(feature = "encryption")]
59
    pub default_encryption_key: Option<KeyId>,
60

            
61
    /// Configuration options related to background tasks.
62
    pub workers: Tasks,
63

            
64
    /// Configuration options related to views.
65
    pub views: Views,
66

            
67
    /// Controls how the key-value store persists keys, on a per-database basis.
68
    pub key_value_persistence: KeyValuePersistence,
69

            
70
    /// Password hashing configuration.
71
    #[cfg(feature = "password-hashing")]
72
    pub argon: ArgonConfiguration,
73

            
74
    pub(crate) initial_schemas: HashMap<SchemaName, Box<dyn DatabaseOpener>>,
75
}
76

            
77
impl Default for StorageConfiguration {
78
2277
    fn default() -> Self {
79
2277
        let system_specs = RefreshKind::new().with_cpu().with_memory();
80
2277
        let mut system = System::new_with_specifics(system_specs);
81
2277
        system.refresh_specifics(system_specs);
82
2277
        Self {
83
2277
            path: None,
84
2277
            memory_only: false,
85
2277
            unique_id: None,
86
2277
            #[cfg(feature = "encryption")]
87
2277
            vault_key_storage: None,
88
2277
            #[cfg(feature = "encryption")]
89
2277
            default_encryption_key: None,
90
2277
            workers: Tasks::default_for(&system),
91
2277
            views: Views::default(),
92
2277
            key_value_persistence: KeyValuePersistence::default(),
93
2277
            #[cfg(feature = "password-hashing")]
94
2277
            argon: ArgonConfiguration::default_for(&system),
95
2277
            initial_schemas: HashMap::default(),
96
2277
        }
97
2277
    }
98
}
99

            
100
impl StorageConfiguration {
101
    /// Registers the schema provided.
102
    pub fn register_schema<S: Schema>(&mut self) -> Result<(), Error> {
103
        self.initial_schemas
104
234
            .insert(S::schema_name(), Box::new(StorageSchemaOpener::<S>::new()?));
105
234
        Ok(())
106
234
    }
107
}
108

            
109
/// Configuration options for background tasks.
110
#[derive(Debug)]
111
pub struct Tasks {
112
    /// Defines how many workers should be spawned to process tasks. This
113
    /// defaults to the 2x the number of cpu cores available to the system or 4, whichever is larger.
114
    pub worker_count: usize,
115
}
116

            
117
impl SystemDefault for Tasks {
118
2277
    fn default_for(system: &System) -> Self {
119
2277
        Self {
120
2277
            worker_count: system
121
2277
                .physical_core_count()
122
2277
                .unwrap_or_else(|| system.processors().len())
123
2277
                * 2,
124
2277
        }
125
2277
    }
126
}
127

            
128
/// Configuration options for views.
129
2277
#[derive(Clone, Debug, Default)]
130
pub struct Views {
131
    /// If true, the database will scan all views during the call to
132
    /// `open_local`. This will cause database opening to take longer, but once
133
    /// the database is open, no request will need to wait for the integrity to
134
    /// be checked. However, for faster startup time, you may wish to delay the
135
    /// integrity scan. Default value is `false`.
136
    pub check_integrity_on_open: bool,
137
}
138

            
139
/// Rules for persisting key-value changes. Default persistence is to
140
/// immediately persist all changes. While this ensures data integrity, the
141
/// overhead of the key-value store can be significantly reduced by utilizing
142
/// lazy persistence strategies that delay writing changes until certain
143
/// thresholds have been met.
144
///
145
/// ## Immediate persistence
146
///
147
/// The default persistence mode will trigger commits always:
148
///
149
/// ```rust
150
/// # use bonsaidb_local::config::KeyValuePersistence;
151
/// # use std::time::Duration;
152
/// assert!(!KeyValuePersistence::default().should_commit(0, Duration::ZERO));
153
/// assert!(KeyValuePersistence::default().should_commit(1, Duration::ZERO));
154
/// ```
155
///
156
/// ## Lazy persistence
157
///
158
/// Lazy persistence allows setting multiple thresholds, allowing for customized
159
/// behavior that can help tune performance, especially under write-heavy loads.
160
///
161
/// It is good practice to include one [`PersistenceThreshold`] that has no
162
/// duration, as it will ensure that the in-memory cache cannot exceed a certain
163
/// size. This number is counted for each database indepenently.
164
///
165
/// ```rust
166
/// # use bonsaidb_local::config::{KeyValuePersistence, PersistenceThreshold};
167
/// # use std::time::Duration;
168
/// #
169
/// let persistence = KeyValuePersistence::lazy([
170
///     PersistenceThreshold::after_changes(1).and_duration(Duration::from_secs(120)),
171
///     PersistenceThreshold::after_changes(10).and_duration(Duration::from_secs(10)),
172
///     PersistenceThreshold::after_changes(100),
173
/// ]);
174
///
175
/// // After 1 change and 60 seconds, no changes would be committed:
176
/// assert!(!persistence.should_commit(1, Duration::from_secs(60)));
177
/// // But on or after 120 seconds, that change will be committed:
178
/// assert!(persistence.should_commit(1, Duration::from_secs(120)));
179
///
180
/// // After 10 changes and 10 seconds, changes will be committed:
181
/// assert!(persistence.should_commit(10, Duration::from_secs(10)));
182
///
183
/// // Once 100 changes have been accumulated, this ruleset will always commit
184
/// // regardless of duration.
185
/// assert!(persistence.should_commit(100, Duration::ZERO));
186
/// ```
187
19434
#[derive(Debug, Clone)]
188
#[must_use]
189
pub struct KeyValuePersistence(KeyValuePersistenceInner);
190

            
191
19434
#[derive(Debug, Clone)]
192
enum KeyValuePersistenceInner {
193
    Immediate,
194
    Lazy(Vec<PersistenceThreshold>),
195
}
196

            
197
impl Default for KeyValuePersistence {
198
    /// Returns [`KeyValuePersistence::immediate()`].
199
2282
    fn default() -> Self {
200
2282
        Self::immediate()
201
2282
    }
202
}
203

            
204
impl KeyValuePersistence {
205
    /// Returns a ruleset that commits all changes immediately.
206
2474
    pub const fn immediate() -> Self {
207
2474
        Self(KeyValuePersistenceInner::Immediate)
208
2474
    }
209

            
210
    /// Returns a ruleset that lazily commits data based on a list of thresholds.
211
13
    pub fn lazy<II>(rules: II) -> Self
212
13
    where
213
13
        II: IntoIterator<Item = PersistenceThreshold>,
214
13
    {
215
13
        let mut rules = rules.into_iter().collect::<Vec<_>>();
216
13
        rules.sort_by(|a, b| a.number_of_changes.cmp(&b.number_of_changes));
217
13
        Self(KeyValuePersistenceInner::Lazy(rules))
218
13
    }
219

            
220
    /// Returns true if these rules determine that the outstanding changes should be persisted.
221
    #[must_use]
222
176216
    pub fn should_commit(
223
176216
        &self,
224
176216
        number_of_changes: usize,
225
176216
        elapsed_since_last_commit: Duration,
226
176216
    ) -> bool {
227
176216
        self.duration_until_next_commit(number_of_changes, elapsed_since_last_commit)
228
176216
            == Duration::ZERO
229
176216
    }
230

            
231
352782
    pub(crate) fn duration_until_next_commit(
232
352782
        &self,
233
352782
        number_of_changes: usize,
234
352782
        elapsed_since_last_commit: Duration,
235
352782
    ) -> Duration {
236
352782
        if number_of_changes == 0 {
237
108873
            Duration::MAX
238
        } else {
239
243909
            match &self.0 {
240
243178
                KeyValuePersistenceInner::Immediate => Duration::ZERO,
241
731
                KeyValuePersistenceInner::Lazy(rules) => {
242
731
                    let mut shortest_duration = Duration::MAX;
243
731
                    for rule in rules
244
731
                        .iter()
245
735
                        .take_while(|rule| rule.number_of_changes <= number_of_changes)
246
                    {
247
7
                        let remaining_time =
248
7
                            rule.duration.saturating_sub(elapsed_since_last_commit);
249
7
                        shortest_duration = shortest_duration.min(remaining_time);
250
7

            
251
7
                        if shortest_duration == Duration::ZERO {
252
3
                            break;
253
4
                        }
254
                    }
255
731
                    shortest_duration
256
                }
257
            }
258
        }
259
352782
    }
260
}
261

            
262
/// A threshold controlling lazy commits. For a threshold to apply, both
263
/// `number_of_changes` must be met or surpassed and `duration` must have
264
/// elpased since the last commit.
265
///
266
/// A threshold with a duration of zero will not wait any time to persist
267
/// changes once the specified `number_of_changes` has been met or surpassed.
268
#[derive(Debug, Copy, Clone)]
269
#[must_use]
270
pub struct PersistenceThreshold {
271
    /// The minimum number of changes that must have occurred for this threshold to apply.
272
    pub number_of_changes: usize,
273
    /// The amount of time that must elapse since the last write for this threshold to apply.
274
    pub duration: Duration,
275
}
276

            
277
impl PersistenceThreshold {
278
    /// Returns a threshold that applies after a number of changes have elapsed.
279
244
    pub const fn after_changes(number_of_changes: usize) -> Self {
280
244
        Self {
281
244
            number_of_changes,
282
244
            duration: Duration::ZERO,
283
244
        }
284
244
    }
285

            
286
    /// Sets the duration of this threshold to `duration` and returns self.
287
1
    pub const fn and_duration(mut self, duration: Duration) -> Self {
288
1
        self.duration = duration;
289
1
        self
290
1
    }
291
}
292

            
293
/// Storage configuration builder methods.
294
pub trait Builder: Default {
295
    /// Creates a default configuration with `path` set.
296
161
    fn new<P: AsRef<Path>>(path: P) -> Self {
297
161
        Self::default().path(path)
298
161
    }
299

            
300
    /// Sets [`StorageConfiguration::path`](StorageConfiguration#structfield.memory_only) to true and returns self.
301
    fn memory_only(self) -> Self;
302

            
303
    /// Registers the schema and returns self.
304
    fn with_schema<S: Schema>(self) -> Result<Self, Error>;
305

            
306
    /// Sets [`StorageConfiguration::path`](StorageConfiguration#structfield.path) to `path` and returns self.
307
    fn path<P: AsRef<Path>>(self, path: P) -> Self;
308
    /// Sets [`StorageConfiguration::unique_id`](StorageConfiguration#structfield.unique_id) to `unique_id` and returns self.
309
    fn unique_id(self, unique_id: u64) -> Self;
310
    /// Sets [`StorageConfiguration::vault_key_storage`](StorageConfiguration#structfield.vault_key_storage) to `key_storage` and returns self.
311
    #[cfg(feature = "encryption")]
312
    fn vault_key_storage<VaultKeyStorage: AnyVaultKeyStorage>(
313
        self,
314
        key_storage: VaultKeyStorage,
315
    ) -> Self;
316
    /// Sets [`StorageConfiguration::default_encryption_key`](StorageConfiguration#structfield.default_encryption_key) to `path` and returns self.
317
    #[cfg(feature = "encryption")]
318
    fn default_encryption_key(self, key: KeyId) -> Self;
319
    /// Sets [`Tasks::worker_count`] to `worker_count` and returns self.
320
    fn tasks_worker_count(self, worker_count: usize) -> Self;
321
    /// Sets [`Views::check_integrity_on_open`] to `check` and returns self.
322
    fn check_view_integrity_on_open(self, check: bool) -> Self;
323

            
324
    /// Sets [`StorageConfiguration::key_value_persistence`](StorageConfiguration#structfield.key_value_persistence) to `persistence` and returns self.
325
    fn key_value_persistence(self, persistence: KeyValuePersistence) -> Self;
326
}
327

            
328
impl Builder for StorageConfiguration {
329
    fn with_schema<S: Schema>(mut self) -> Result<Self, Error> {
330
161
        self.register_schema::<S>()?;
331
161
        Ok(self)
332
161
    }
333

            
334
30
    fn memory_only(mut self) -> Self {
335
30
        self.memory_only = true;
336
30
        self
337
30
    }
338

            
339
85
    fn path<P: AsRef<Path>>(mut self, path: P) -> Self {
340
85
        self.path = Some(path.as_ref().to_owned());
341
85
        self
342
85
    }
343

            
344
    fn unique_id(mut self, unique_id: u64) -> Self {
345
        self.unique_id = Some(unique_id);
346
        self
347
    }
348

            
349
    #[cfg(feature = "encryption")]
350
3
    fn vault_key_storage<VaultKeyStorage: AnyVaultKeyStorage>(
351
3
        mut self,
352
3
        key_storage: VaultKeyStorage,
353
3
    ) -> Self {
354
3
        self.vault_key_storage = Some(Box::new(key_storage));
355
3
        self
356
3
    }
357

            
358
    #[cfg(feature = "encryption")]
359
72
    fn default_encryption_key(mut self, key: KeyId) -> Self {
360
72
        self.default_encryption_key = Some(key);
361
72
        self
362
72
    }
363

            
364
    fn tasks_worker_count(mut self, worker_count: usize) -> Self {
365
        self.workers.worker_count = worker_count;
366
        self
367
    }
368

            
369
1
    fn check_view_integrity_on_open(mut self, check: bool) -> Self {
370
1
        self.views.check_integrity_on_open = check;
371
1
        self
372
1
    }
373

            
374
1
    fn key_value_persistence(mut self, persistence: KeyValuePersistence) -> Self {
375
1
        self.key_value_persistence = persistence;
376
1
        self
377
1
    }
378
}
379

            
380
pub(crate) trait SystemDefault: Sized {
381
    fn default_for(system: &System) -> Self;
382
1
    fn default() -> Self {
383
1
        let system_specs = RefreshKind::new().with_cpu().with_memory();
384
1
        let mut system = System::new_with_specifics(system_specs);
385
1
        system.refresh_specifics(system_specs);
386
1
        Self::default_for(&system)
387
1
    }
388
}