Skip to content

Latest commit

 

History

History
248 lines (212 loc) · 8.86 KB

README.md

File metadata and controls

248 lines (212 loc) · 8.86 KB

github.com/sa6mwa/anystore

AnyStore is a Go thread-safe key/value store featuring optional mutex-style encrypted (and optionally gzipped) persistence for shared access from one or more instance(s). The persistence feature requires a system (file and operating system) supporting syscall.Flock (Linux, BSD, Darwin, NFSv4, etc).

AnyStore also feature a configuration mode with convenience-functions Stash, Unstash and EditThing. Whether you choose to hard-code an encryption key in the application or provide one via environment variables, using Stash, Unstash and EditThing is simple...

package main

import (
	"encoding/json"
	"fmt"
	"log"
	"os"

	"github.com/sa6mwa/anystore"
)

// All fields need to be exported.
type MyConfig struct {
	ListenAddress string
	Username      string
	Token         string
	Endpoints     []*Endpoint
}

type Endpoint struct {
	ID   int
	Name string
	URL  string
}

func main() {
	defaultConf := &MyConfig{
		ListenAddress: "0.0.0.0:1234",
		Username:      "superuser",
		Token:         "abc123",
		Endpoints: []*Endpoint{
			{ID: 1, Name: "Endpoint 1", URL: "https://endpoint1.local"},
			{ID: 2, Name: "Endpoint 2", URL: "https://endpoint2.local"},
		},
	}
	file := "~/.myconfigfile.db"

	var configuration MyConfig

	if err := anystore.Unstash(&anystore.StashConfig{
		File:          file,
		EncryptionKey: anystore.DefaultEncryptionKey,
		Key:           "configuration",
		Thing:         &configuration,
		DefaultThing:  defaultConf,
	}); err != nil {
		log.Fatal(err)
	}

	if len(os.Args) > 1 && os.Args[1] == "edit" {
		if err := anystore.EditThing(&anystore.StashConfig{
			File:          file,
			EncryptionKey: anystore.DefaultEncryptionKey,
			Key:           "configuration",
			Thing:         &configuration,
			// Editor: "/usr/bin/emacs",
		}); err != nil {
			log.Fatal(err)
		}
	}

	j, err := json.MarshalIndent(configuration, "", "  ")
	if err != nil {
		log.Fatal(err)
	}
	fmt.Println(string(j))
}

The Stash and Unstash functions also support io.Reader and io.Writer (io.WriteCloser). Stash will write to both a file and io.Writer if configured with both via the anystore.StashConfig struct. Unstash will prefer io.Reader over file if both are provided. Unstash will successfully unstash from the os.File io.Reader of os.Open(previously_Stashed_file).

Example with only reader and writer...

greeting := "Hello world"
var receivedGreeting string

reader, writer := io.Pipe()
defer reader.Close() // Stash closes the writer, it's an io.ReadCloser

errch := make(chan error)

go func() {
	defer close(errch)
	if err := anystore.Unstash(&anystore.StashConfig{
		Reader: reader,
		GZip:   true,
		Key:    "secret",
		Thing:  &receivedGreeting,
	}); err != nil {
		errch <- err
	}
	errch <- nil
}()

if err := anystore.Stash(&anystore.StashConfig{
	Writer: writer,
	GZip:   true,
	Key:    "secret",
	Thing:  &greeting,
}); err != nil {
	log.Fatal(err)
}

err := <-errch
if err != nil {
	log.Fatal(err)
}

fmt.Println(receivedGreeting)

Encrypted by default

There is a default encryption key constant (anystore.DefaultEncryptionKey) that will be used if no user-defined key is provided. It is obviously not secure to use the default asymmetric key as it is publicly known. You can generate your own random AES-256 base64-encoded encryption key using ./cmd/newkey...

go run github.com/sa6mwa/anystore/cmd/newkey

Encryption algorithm

AnyStore uses standard library cryptographics exclusively. crypto/aes is used to cipher the data, crypto/hmac and crypto/sha256 is used for hashing the IV (salt) and enciphered data. Technically, the data is encrypted using AES-128-CFB, AES-224-CFG or AES-256-CFB depending on the key length (where a 32 byte key is preferred to select AES-256) which is signed/authenticated using HMAC-SHA256.

Persistence, not performance

The persistence-feature is not designed for performance, but for simplicity, durability, and concurrent access by multiple processes/instances. The entire key/value store (map[any]any) is loaded and persisted on retrieving or storing every key/value pair making it slow with many keys (can be sharded manually by managing several AnyStores).

Concurrent access relies entirely on locking a lockfile using syscall.Flock (flock(2)). When new keys are stored, they are saved in a temporary file which is renamed to the main encrypted GOB file. A rename operation is atomic and survivable in case of failure. The flock on the lockfile is released when the rename has completed successfully. On load, the lock on the lockfile is not acquired - the operation relies on the atomic nature of rename.

## With HMAC-SHA256...

$ go test -v -run=^# -bench=. -count=5
goos: linux
goarch: amd64
pkg: github.com/sa6mwa/anystore
cpu: AMD A8-3870 APU with Radeon(tm) HD Graphics
BenchmarkStoreAndLoadPersistence
BenchmarkStoreAndLoadPersistence-4                    27          42327515 ns/op
BenchmarkStoreAndLoadPersistence-4                    28          41836633 ns/op
BenchmarkStoreAndLoadPersistence-4                    30          40339892 ns/op
BenchmarkStoreAndLoadPersistence-4                    30          42015679 ns/op
BenchmarkStoreAndLoadPersistence-4                    30          40638348 ns/op
BenchmarkStoreAndLoadGZippedPersistence
BenchmarkStoreAndLoadGZippedPersistence-4             30          41886859 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             37          42730788 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             28          40363376 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             30          40642576 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             37          41718753 ns/op
BenchmarkStoreAndLoad
BenchmarkStoreAndLoad-4                           355207              3397 ns/op
BenchmarkStoreAndLoad-4                           355897              3059 ns/op
BenchmarkStoreAndLoad-4                           390386              3295 ns/op
BenchmarkStoreAndLoad-4                           357904              3410 ns/op
BenchmarkStoreAndLoad-4                           358599              3370 ns/op
PASS
ok      github.com/sa6mwa/anystore      24.506s

## Original run w/o HMAC-SHA256 below, no significant performance impact.

$ go test -v -run=^# -bench=. -count=5
goos: linux
goarch: amd64
pkg: github.com/sa6mwa/anystore
cpu: AMD A8-3870 APU with Radeon(tm) HD Graphics
BenchmarkStoreAndLoadPersistence
BenchmarkStoreAndLoadPersistence-4                    28          42331426 ns/op
BenchmarkStoreAndLoadPersistence-4                    37          41519115 ns/op
BenchmarkStoreAndLoadPersistence-4                    30          42562259 ns/op
BenchmarkStoreAndLoadPersistence-4                    30          40343840 ns/op
BenchmarkStoreAndLoadPersistence-4                    30          40650118 ns/op
BenchmarkStoreAndLoadGZippedPersistence
BenchmarkStoreAndLoadGZippedPersistence-4             38          40602983 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             38          40317412 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             28          43019740 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             30          44645946 ns/op
BenchmarkStoreAndLoadGZippedPersistence-4             30          40907386 ns/op
BenchmarkStoreAndLoad
BenchmarkStoreAndLoad-4                           399135              3381 ns/op
BenchmarkStoreAndLoad-4                           370418              3428 ns/op
BenchmarkStoreAndLoad-4                           365362              3177 ns/op
BenchmarkStoreAndLoad-4                           383518              3351 ns/op
BenchmarkStoreAndLoad-4                           926636              2982 ns/op
PASS
ok      github.com/sa6mwa/anystore      26.854s

Fuzzing

Run the fuzz test with -parallel=1 or it will fail unexpectedly for unknown reasons. Running the tests again with go test -v automatically re-trying the failed fuzz testdata has so far never failed.

$ go test -v -fuzz=. -run='^#' -parallel=1
=== RUN   FuzzConcurrentPersistence
fuzz: elapsed: 0s, gathering baseline coverage: 0/8 completed
fuzz: elapsed: 3s, gathering baseline coverage: 2/8 completed
fuzz: elapsed: 6s, gathering baseline coverage: 2/8 completed
fuzz: elapsed: 9s, gathering baseline coverage: 2/8 completed
fuzz: elapsed: 12s, gathering baseline coverage: 4/8 completed
fuzz: elapsed: 15s, gathering baseline coverage: 4/8 completed
fuzz: elapsed: 18s, gathering baseline coverage: 4/8 completed
fuzz: elapsed: 21s, gathering baseline coverage: 7/8 completed
fuzz: elapsed: 21s, gathering baseline coverage: 8/8 completed, now fuzzing with 1 workers
fuzz: elapsed: 24s, execs: 12 (2/sec), new interesting: 0 (total: 8)
fuzz: elapsed: 27s, execs: 12 (0/sec), new interesting: 0 (total: 8)
fuzz: elapsed: 30s, execs: 12 (0/sec), new interesting: 0 (total: 8)
fuzz: elapsed: 33s, execs: 12 (0/sec), new interesting: 0 (total: 8)
fuzz: elapsed: 36s, execs: 12 (0/sec), new interesting: 0 (total: 8)