Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
R
rust-rocksdb
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fangzongwu
rust-rocksdb
Commits
fa9f9b6e
Unverified
Commit
fa9f9b6e
authored
Dec 17, 2018
by
zhangjinpeng1987
Committed by
GitHub
Dec 17, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
support encryption for data store in disk (#247)
parent
43393ed5
Hide whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
203 additions
and
10 deletions
+203
-10
c.cc
librocksdb_sys/crocksdb/c.cc
+56
-4
c.h
librocksdb_sys/crocksdb/crocksdb/c.h
+5
-2
lib.rs
librocksdb_sys/src/lib.rs
+6
-2
lib.rs
src/lib.rs
+1
-0
rocksdb.rs
src/rocksdb.rs
+24
-2
util.rs
src/util.rs
+37
-0
mod.rs
tests/cases/mod.rs
+1
-0
test_encryption.rs
tests/cases/test_encryption.rs
+73
-0
No files found.
librocksdb_sys/crocksdb/c.cc
View file @
fa9f9b6e
...
@@ -15,6 +15,7 @@
...
@@ -15,6 +15,7 @@
#include "rocksdb/convenience.h"
#include "rocksdb/convenience.h"
#include "rocksdb/db.h"
#include "rocksdb/db.h"
#include "rocksdb/env.h"
#include "rocksdb/env.h"
#include "rocksdb/env_encryption.h"
#include "rocksdb/filter_policy.h"
#include "rocksdb/filter_policy.h"
#include "rocksdb/iterator.h"
#include "rocksdb/iterator.h"
#include "rocksdb/ldb_tool.h"
#include "rocksdb/ldb_tool.h"
...
@@ -31,12 +32,11 @@
...
@@ -31,12 +32,11 @@
#include "rocksdb/table_properties.h"
#include "rocksdb/table_properties.h"
#include "rocksdb/universal_compaction.h"
#include "rocksdb/universal_compaction.h"
#include "rocksdb/utilities/backupable_db.h"
#include "rocksdb/utilities/backupable_db.h"
#include "rocksdb/utilities/db_ttl.h"
#include "rocksdb/utilities/debug.h"
#include "rocksdb/utilities/debug.h"
#include "rocksdb/utilities/options_util.h"
#include "rocksdb/utilities/options_util.h"
#include "rocksdb/utilities/db_ttl.h"
#include "rocksdb/write_batch.h"
#include "rocksdb/write_batch.h"
#include "db/column_family.h"
#include "db/column_family.h"
#include "table/sst_file_writer_collectors.h"
#include "table/sst_file_writer_collectors.h"
#include "table/table_reader.h"
#include "table/table_reader.h"
...
@@ -71,6 +71,10 @@ using rocksdb::DBWithTTL;
...
@@ -71,6 +71,10 @@ using rocksdb::DBWithTTL;
using
rocksdb
::
DBOptions
;
using
rocksdb
::
DBOptions
;
using
rocksdb
::
Env
;
using
rocksdb
::
Env
;
using
rocksdb
::
EnvOptions
;
using
rocksdb
::
EnvOptions
;
using
rocksdb
::
EncryptionProvider
;
using
rocksdb
::
BlockCipher
;
using
rocksdb
::
CTREncryptionProvider
;
using
rocksdb
::
NewEncryptedEnv
;
using
rocksdb
::
ExternalFileIngestionInfo
;
using
rocksdb
::
ExternalFileIngestionInfo
;
using
rocksdb
::
EventListener
;
using
rocksdb
::
EventListener
;
using
rocksdb
::
InfoLogLevel
;
using
rocksdb
::
InfoLogLevel
;
...
@@ -460,6 +464,8 @@ struct crocksdb_mergeoperator_t : public MergeOperator {
...
@@ -460,6 +464,8 @@ struct crocksdb_mergeoperator_t : public MergeOperator {
struct
crocksdb_env_t
{
struct
crocksdb_env_t
{
Env
*
rep
;
Env
*
rep
;
bool
is_default
;
bool
is_default
;
EncryptionProvider
*
encryption_provoider
;
BlockCipher
*
block_cipher
;
};
};
struct
crocksdb_slicetransform_t
:
public
SliceTransform
{
struct
crocksdb_slicetransform_t
:
public
SliceTransform
{
...
@@ -3229,20 +3235,64 @@ void crocksdb_cache_set_capacity(crocksdb_cache_t* cache, size_t capacity) {
...
@@ -3229,20 +3235,64 @@ void crocksdb_cache_set_capacity(crocksdb_cache_t* cache, size_t capacity) {
cache
->
rep
->
SetCapacity
(
capacity
);
cache
->
rep
->
SetCapacity
(
capacity
);
}
}
crocksdb_env_t
*
crocksdb_
create_default_env
()
{
crocksdb_env_t
*
crocksdb_
default_env_create
()
{
crocksdb_env_t
*
result
=
new
crocksdb_env_t
;
crocksdb_env_t
*
result
=
new
crocksdb_env_t
;
result
->
rep
=
Env
::
Default
();
result
->
rep
=
Env
::
Default
();
result
->
block_cipher
=
nullptr
;
result
->
encryption_provoider
=
nullptr
;
result
->
is_default
=
true
;
result
->
is_default
=
true
;
return
result
;
return
result
;
}
}
crocksdb_env_t
*
crocksdb_
create_mem_env
()
{
crocksdb_env_t
*
crocksdb_
mem_env_create
()
{
crocksdb_env_t
*
result
=
new
crocksdb_env_t
;
crocksdb_env_t
*
result
=
new
crocksdb_env_t
;
result
->
rep
=
rocksdb
::
NewMemEnv
(
Env
::
Default
());
result
->
rep
=
rocksdb
::
NewMemEnv
(
Env
::
Default
());
result
->
block_cipher
=
nullptr
;
result
->
encryption_provoider
=
nullptr
;
result
->
is_default
=
false
;
result
->
is_default
=
false
;
return
result
;
return
result
;
}
}
struct
CTRBlockCipher
:
public
BlockCipher
{
CTRBlockCipher
(
size_t
block_size
,
const
std
::
string
&
cipertext
)
:
block_size_
(
block_size
),
cipertext_
(
cipertext
)
{
assert
(
block_size
==
cipertext
.
size
());
}
virtual
size_t
BlockSize
()
{
return
block_size_
;
}
virtual
Status
Encrypt
(
char
*
data
)
{
const
char
*
ciper_ptr
=
cipertext_
.
c_str
();
for
(
size_t
i
=
0
;
i
<
block_size_
;
i
++
)
{
data
[
i
]
=
data
[
i
]
^
ciper_ptr
[
i
];
}
return
Status
::
OK
();
}
virtual
Status
Decrypt
(
char
*
data
)
{
Encrypt
(
data
);
return
Status
::
OK
();
}
protected
:
std
::
string
cipertext_
;
size_t
block_size_
;
};
crocksdb_env_t
*
crocksdb_default_ctr_encrypted_env_create
(
const
char
*
ciphertext
,
size_t
ciphertext_len
)
{
auto
result
=
new
crocksdb_env_t
;
result
->
block_cipher
=
new
CTRBlockCipher
(
ciphertext_len
,
std
::
string
(
ciphertext
,
ciphertext_len
));
result
->
encryption_provoider
=
new
CTREncryptionProvider
(
*
result
->
block_cipher
);
result
->
rep
=
NewEncryptedEnv
(
Env
::
Default
(),
result
->
encryption_provoider
);
result
->
is_default
=
true
;
return
result
;
}
void
crocksdb_env_set_background_threads
(
crocksdb_env_t
*
env
,
int
n
)
{
void
crocksdb_env_set_background_threads
(
crocksdb_env_t
*
env
,
int
n
)
{
env
->
rep
->
SetBackgroundThreads
(
n
);
env
->
rep
->
SetBackgroundThreads
(
n
);
}
}
...
@@ -3265,6 +3315,8 @@ void crocksdb_env_delete_file(crocksdb_env_t* env, const char* path, char** errp
...
@@ -3265,6 +3315,8 @@ void crocksdb_env_delete_file(crocksdb_env_t* env, const char* path, char** errp
void
crocksdb_env_destroy
(
crocksdb_env_t
*
env
)
{
void
crocksdb_env_destroy
(
crocksdb_env_t
*
env
)
{
if
(
!
env
->
is_default
)
delete
env
->
rep
;
if
(
!
env
->
is_default
)
delete
env
->
rep
;
if
(
env
->
block_cipher
)
delete
env
->
block_cipher
;
if
(
env
->
encryption_provoider
)
delete
env
->
encryption_provoider
;
delete
env
;
delete
env
;
}
}
...
...
librocksdb_sys/crocksdb/crocksdb/c.h
View file @
fa9f9b6e
...
@@ -1305,8 +1305,11 @@ extern C_ROCKSDB_LIBRARY_API void crocksdb_cache_set_capacity(
...
@@ -1305,8 +1305,11 @@ extern C_ROCKSDB_LIBRARY_API void crocksdb_cache_set_capacity(
/* Env */
/* Env */
extern
C_ROCKSDB_LIBRARY_API
crocksdb_env_t
*
crocksdb_create_default_env
();
extern
C_ROCKSDB_LIBRARY_API
crocksdb_env_t
*
crocksdb_default_env_create
();
extern
C_ROCKSDB_LIBRARY_API
crocksdb_env_t
*
crocksdb_create_mem_env
();
extern
C_ROCKSDB_LIBRARY_API
crocksdb_env_t
*
crocksdb_mem_env_create
();
extern
C_ROCKSDB_LIBRARY_API
crocksdb_env_t
*
crocksdb_default_ctr_encrypted_env_create
(
const
char
*
ciphertext
,
size_t
ciphertext_len
);
extern
C_ROCKSDB_LIBRARY_API
void
crocksdb_env_set_background_threads
(
extern
C_ROCKSDB_LIBRARY_API
void
crocksdb_env_set_background_threads
(
crocksdb_env_t
*
env
,
int
n
);
crocksdb_env_t
*
env
,
int
n
);
extern
C_ROCKSDB_LIBRARY_API
void
extern
C_ROCKSDB_LIBRARY_API
void
...
...
librocksdb_sys/src/lib.rs
View file @
fa9f9b6e
...
@@ -1125,8 +1125,12 @@ extern "C" {
...
@@ -1125,8 +1125,12 @@ extern "C" {
pub
fn
crocksdb_compactionfilter_destroy
(
filter
:
*
mut
DBCompactionFilter
);
pub
fn
crocksdb_compactionfilter_destroy
(
filter
:
*
mut
DBCompactionFilter
);
// Env
// Env
pub
fn
crocksdb_create_default_env
()
->
*
mut
DBEnv
;
pub
fn
crocksdb_default_env_create
()
->
*
mut
DBEnv
;
pub
fn
crocksdb_create_mem_env
()
->
*
mut
DBEnv
;
pub
fn
crocksdb_mem_env_create
()
->
*
mut
DBEnv
;
pub
fn
crocksdb_default_ctr_encrypted_env_create
(
ciphertext
:
*
const
c_char
,
ciphertext_len
:
size_t
,
)
->
*
mut
DBEnv
;
pub
fn
crocksdb_env_file_exists
(
env
:
*
mut
DBEnv
,
path
:
*
const
c_char
,
err
:
*
mut
*
mut
c_char
);
pub
fn
crocksdb_env_file_exists
(
env
:
*
mut
DBEnv
,
path
:
*
const
c_char
,
err
:
*
mut
*
mut
c_char
);
pub
fn
crocksdb_env_delete_file
(
env
:
*
mut
DBEnv
,
path
:
*
const
c_char
,
err
:
*
mut
*
mut
c_char
);
pub
fn
crocksdb_env_delete_file
(
env
:
*
mut
DBEnv
,
path
:
*
const
c_char
,
err
:
*
mut
*
mut
c_char
);
pub
fn
crocksdb_env_destroy
(
env
:
*
mut
DBEnv
);
pub
fn
crocksdb_env_destroy
(
env
:
*
mut
DBEnv
);
...
...
src/lib.rs
View file @
fa9f9b6e
...
@@ -64,3 +64,4 @@ mod table_filter;
...
@@ -64,3 +64,4 @@ mod table_filter;
mod
table_properties
;
mod
table_properties
;
mod
table_properties_collector
;
mod
table_properties_collector
;
mod
table_properties_collector_factory
;
mod
table_properties_collector_factory
;
mod
util
;
src/rocksdb.rs
View file @
fa9f9b6e
...
@@ -28,12 +28,14 @@ use std::collections::BTreeMap;
...
@@ -28,12 +28,14 @@ use std::collections::BTreeMap;
use
std
::
ffi
::{
CStr
,
CString
};
use
std
::
ffi
::{
CStr
,
CString
};
use
std
::
fmt
::{
self
,
Debug
,
Formatter
};
use
std
::
fmt
::{
self
,
Debug
,
Formatter
};
use
std
::
io
;
use
std
::
io
;
use
std
::
mem
;
use
std
::
ops
::
Deref
;
use
std
::
ops
::
Deref
;
use
std
::
path
::{
Path
,
PathBuf
};
use
std
::
path
::{
Path
,
PathBuf
};
use
std
::
str
::
from_utf8
;
use
std
::
str
::
from_utf8
;
use
std
::
sync
::
Arc
;
use
std
::
sync
::
Arc
;
use
std
::{
fs
,
ptr
,
slice
};
use
std
::{
fs
,
ptr
,
slice
};
use
table_properties
::
TablePropertiesCollection
;
use
table_properties
::
TablePropertiesCollection
;
use
util
::
is_power_of_two
;
pub
struct
CFHandle
{
pub
struct
CFHandle
{
inner
:
*
mut
DBCFHandle
,
inner
:
*
mut
DBCFHandle
,
...
@@ -2090,7 +2092,7 @@ impl Default for Env {
...
@@ -2090,7 +2092,7 @@ impl Default for Env {
fn
default
()
->
Env
{
fn
default
()
->
Env
{
unsafe
{
unsafe
{
Env
{
Env
{
inner
:
crocksdb_ffi
::
crocksdb_
create_default_env
(),
inner
:
crocksdb_ffi
::
crocksdb_
default_env_create
(),
}
}
}
}
}
}
...
@@ -2100,11 +2102,31 @@ impl Env {
...
@@ -2100,11 +2102,31 @@ impl Env {
pub
fn
new_mem
()
->
Env
{
pub
fn
new_mem
()
->
Env
{
unsafe
{
unsafe
{
Env
{
Env
{
inner
:
crocksdb_ffi
::
crocksdb_
create_mem_env
(),
inner
:
crocksdb_ffi
::
crocksdb_
mem_env_create
(),
}
}
}
}
}
}
// Create a ctr encrypted env with the default env and a given ciper text.
// The length of ciper text must be 2^n, and must be less or equal to 2048.
// The recommanded block size are 1024, 512 and 256.
pub
fn
new_default_ctr_encrypted_env
(
ciphertext
:
&
[
u8
])
->
Result
<
Env
,
String
>
{
let
len
=
ciphertext
.len
();
if
len
>
2048
||
!
is_power_of_two
(
len
)
{
return
Err
(
"ciphertext length must be less or equal to 2048, and must be power of 2"
.to_owned
(),
);
}
let
env
=
unsafe
{
crocksdb_ffi
::
crocksdb_default_ctr_encrypted_env_create
(
mem
::
transmute
(
&
ciphertext
[
0
]),
len
,
)
};
Ok
(
Env
{
inner
:
env
})
}
pub
fn
new_sequential_file
(
pub
fn
new_sequential_file
(
&
self
,
&
self
,
path
:
&
str
,
path
:
&
str
,
...
...
src/util.rs
0 → 100644
View file @
fa9f9b6e
// Copyright 2018 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// See the License for the specific language governing permissions and
// limitations under the License.
pub
fn
is_power_of_two
(
mut
n
:
usize
)
->
bool
{
if
n
==
0
{
return
false
;
}
while
n
%
2
==
0
{
n
=
n
/
2
;
}
n
==
1
}
#[cfg(test)]
mod
test
{
use
super
::
*
;
#[test]
fn
test_is_power_of_two
()
{
assert_eq!
(
is_power_of_two
(
0
),
false
);
assert_eq!
(
is_power_of_two
(
1
),
true
);
assert_eq!
(
is_power_of_two
(
2
),
true
);
assert_eq!
(
is_power_of_two
(
4
),
true
);
assert_eq!
(
is_power_of_two
(
8
),
true
);
assert_eq!
(
is_power_of_two
(
5
),
false
);
}
}
tests/cases/mod.rs
View file @
fa9f9b6e
...
@@ -3,6 +3,7 @@ mod test_compact_range;
...
@@ -3,6 +3,7 @@ mod test_compact_range;
mod
test_compaction_filter
;
mod
test_compaction_filter
;
mod
test_delete_files_in_range
;
mod
test_delete_files_in_range
;
mod
test_delete_range
;
mod
test_delete_range
;
mod
test_encryption
;
mod
test_event_listener
;
mod
test_event_listener
;
mod
test_ingest_external_file
;
mod
test_ingest_external_file
;
mod
test_iterator
;
mod
test_iterator
;
...
...
tests/cases/test_encryption.rs
0 → 100644
View file @
fa9f9b6e
// Copyright 2018 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// See the License for the specific language governing permissions and
// limitations under the License.
use
rocksdb
::
Env
;
use
rocksdb
::{
DBOptions
,
Writable
,
DB
};
use
std
::
sync
::
Arc
;
use
tempdir
::
TempDir
;
#[test]
fn
test_ctr_encrypted_env
()
{
let
test_cipher_texts
:
&
[
&
[
u8
]]
=
&
[
&
[
16
,
15
,
14
,
13
,
12
,
11
,
10
,
9
,
8
,
7
,
6
,
5
,
4
,
3
,
2
,
1
],
&
[
8
,
7
,
6
,
5
,
4
,
3
,
2
,
1
],
];
for
ciphertext
in
test_cipher_texts
{
test_ctr_encrypted_env_impl
(
Arc
::
new
(
Env
::
new_default_ctr_encrypted_env
(
ciphertext
)
.unwrap
(),
));
}
}
fn
test_ctr_encrypted_env_impl
(
encrypted_env
:
Arc
<
Env
>
)
{
let
path
=
TempDir
::
new
(
"_rust_rocksdb_cryption_env"
)
.expect
(
""
);
let
path_str
=
path
.path
()
.to_str
()
.unwrap
();
let
mut
opts
=
DBOptions
::
new
();
opts
.create_if_missing
(
true
);
opts
.set_env
(
encrypted_env
.clone
());
let
db
=
DB
::
open
(
opts
,
path_str
)
.unwrap
();
let
samples
=
vec!
[
(
b
"key1"
.to_vec
(),
b
"value1"
.to_vec
()),
(
b
"key2"
.to_vec
(),
b
"value2"
.to_vec
()),
(
b
"key3"
.to_vec
(),
b
"value3"
.to_vec
()),
(
b
"key4"
.to_vec
(),
b
"value4"
.to_vec
()),
];
for
&
(
ref
k
,
ref
v
)
in
&
samples
{
db
.put
(
k
,
v
)
.unwrap
();
// check value
assert_eq!
(
v
.as_slice
(),
&*
db
.get
(
k
)
.unwrap
()
.unwrap
());
}
// flush to sst file
db
.flush
(
true
)
.unwrap
();
// check value in db
for
&
(
ref
k
,
ref
v
)
in
&
samples
{
assert_eq!
(
v
.as_slice
(),
&*
db
.get
(
k
)
.unwrap
()
.unwrap
());
}
// close db and open again.
drop
(
db
);
let
mut
opts
=
DBOptions
::
new
();
opts
.create_if_missing
(
true
);
opts
.set_env
(
encrypted_env
);
let
db
=
DB
::
open
(
opts
,
path_str
)
.unwrap
();
// check value in db again
for
&
(
ref
k
,
ref
v
)
in
&
samples
{
assert_eq!
(
v
.as_slice
(),
&*
db
.get
(
k
)
.unwrap
()
.unwrap
());
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment