feat(storage): add offline data validation and strengthen storage/index integrity checks

This commit is contained in:
2026-04-05 02:46:05 +00:00
parent b8567ebe08
commit 418e8dc052
13 changed files with 724 additions and 41 deletions

View File

@@ -1,5 +1,15 @@
# Changelog # Changelog
## 2026-04-05 - 2.5.0 - feat(storage)
add offline data validation and strengthen storage/index integrity checks
- adds a `--validate-data <PATH>` CLI mode to run offline integrity checks on storage directories
- introduces storage validation reporting for headers, checksums, duplicate ids, tombstones, and stale or orphaned hint entries
- pre-checks unique index constraints before insert, update, upsert, and findAndModify writes to prevent duplicate-key violations before storage changes
- validates hint files against data files during collection load and rebuilds indexes from data when hints are stale
- ensures new data files always receive a SMARTDB header and persists fresh hint files after successful compaction
- cleans up stale local Unix socket files before starting the TypeScript local server
## 2026-04-05 - 2.4.1 - fix(package) ## 2026-04-05 - 2.4.1 - fix(package)
update package metadata update package metadata

View File

@@ -3,7 +3,7 @@ use std::collections::HashMap;
use bson::{doc, oid::ObjectId, Bson, Document}; use bson::{doc, oid::ObjectId, Bson, Document};
use rustdb_index::IndexEngine; use rustdb_index::IndexEngine;
use rustdb_storage::OpType; use rustdb_storage::OpType;
use tracing::{debug, warn}; use tracing::debug;
use crate::context::CommandContext; use crate::context::CommandContext;
use crate::error::{CommandError, CommandResult}; use crate::error::{CommandError, CommandResult};
@@ -62,6 +62,23 @@ pub async fn handle(
doc.insert("_id", ObjectId::new()); doc.insert("_id", ObjectId::new());
} }
// Pre-check unique index constraints BEFORE storage write.
if let Some(engine) = ctx.indexes.get(&ns_key) {
if let Err(e) = engine.check_unique_constraints(&doc) {
let err_msg = e.to_string();
write_errors.push(doc! {
"index": idx as i32,
"code": 11000_i32,
"codeName": "DuplicateKey",
"errmsg": &err_msg,
});
if ordered {
break;
}
continue;
}
}
// Attempt storage insert. // Attempt storage insert.
match ctx.storage.insert_one(db, coll, doc.clone()).await { match ctx.storage.insert_one(db, coll, doc.clone()).await {
Ok(id_str) => { Ok(id_str) => {
@@ -81,10 +98,10 @@ pub async fn handle(
.entry(ns_key.clone()) .entry(ns_key.clone())
.or_insert_with(IndexEngine::new); .or_insert_with(IndexEngine::new);
if let Err(e) = engine.on_insert(&doc) { if let Err(e) = engine.on_insert(&doc) {
warn!( tracing::error!(
namespace = %ns_key, namespace = %ns_key,
error = %e, error = %e,
"index update failed after successful insert" "index update failed after successful insert (pre-check passed but insert failed)"
); );
} }
inserted_count += 1; inserted_count += 1;

View File

@@ -150,6 +150,22 @@ async fn handle_update(
updated.get("_id").unwrap().clone() updated.get("_id").unwrap().clone()
}; };
// Pre-check unique index constraints before upsert insert.
if let Some(engine) = ctx.indexes.get(&ns_key) {
if let Err(e) = engine.check_unique_constraints(&updated) {
write_errors.push(doc! {
"index": idx as i32,
"code": 11000_i32,
"codeName": "DuplicateKey",
"errmsg": e.to_string(),
});
if ordered {
break;
}
continue;
}
}
// Insert the new document. // Insert the new document.
match ctx.storage.insert_one(db, coll, updated.clone()).await { match ctx.storage.insert_one(db, coll, updated.clone()).await {
Ok(id_str) => { Ok(id_str) => {
@@ -168,7 +184,9 @@ async fn handle_update(
.indexes .indexes
.entry(ns_key.clone()) .entry(ns_key.clone())
.or_insert_with(IndexEngine::new); .or_insert_with(IndexEngine::new);
let _ = engine.on_insert(&updated); if let Err(e) = engine.on_insert(&updated) {
tracing::error!(namespace = %ns_key, error = %e, "index update failed after upsert insert");
}
total_n += 1; total_n += 1;
upserted_list.push(doc! { upserted_list.push(doc! {
@@ -216,6 +234,22 @@ async fn handle_update(
array_filters.as_deref(), array_filters.as_deref(),
) { ) {
Ok(updated_doc) => { Ok(updated_doc) => {
// Pre-check unique index constraints before storage write.
if let Some(engine) = ctx.indexes.get(&ns_key) {
if let Err(e) = engine.check_unique_constraints_for_update(matched_doc, &updated_doc) {
write_errors.push(doc! {
"index": idx as i32,
"code": 11000_i32,
"codeName": "DuplicateKey",
"errmsg": e.to_string(),
});
if ordered {
break;
}
continue;
}
}
let id_str = extract_id_string(matched_doc); let id_str = extract_id_string(matched_doc);
match ctx match ctx
.storage .storage
@@ -235,7 +269,9 @@ async fn handle_update(
// Update index. // Update index.
if let Some(mut engine) = ctx.indexes.get_mut(&ns_key) { if let Some(mut engine) = ctx.indexes.get_mut(&ns_key) {
let _ = engine.on_update(matched_doc, &updated_doc); if let Err(e) = engine.on_update(matched_doc, &updated_doc) {
tracing::error!(namespace = %ns_key, error = %e, "index update failed after update");
}
} }
total_n += 1; total_n += 1;
// Check if the document actually changed. // Check if the document actually changed.
@@ -444,6 +480,13 @@ async fn handle_find_and_modify(
) )
.map_err(|e| CommandError::InternalError(e.to_string()))?; .map_err(|e| CommandError::InternalError(e.to_string()))?;
// Pre-check unique index constraints before storage write.
if let Some(engine) = ctx.indexes.get(&ns_key) {
if let Err(e) = engine.check_unique_constraints_for_update(&original_doc, &updated_doc) {
return Err(CommandError::StorageError(e.to_string()));
}
}
let id_str = extract_id_string(&original_doc); let id_str = extract_id_string(&original_doc);
ctx.storage ctx.storage
.update_by_id(db, coll, &id_str, updated_doc.clone()) .update_by_id(db, coll, &id_str, updated_doc.clone())
@@ -461,7 +504,9 @@ async fn handle_find_and_modify(
// Update index. // Update index.
if let Some(mut engine) = ctx.indexes.get_mut(&ns_key) { if let Some(mut engine) = ctx.indexes.get_mut(&ns_key) {
let _ = engine.on_update(&original_doc, &updated_doc); if let Err(e) = engine.on_update(&original_doc, &updated_doc) {
tracing::error!(namespace = %ns_key, error = %e, "index update failed after findAndModify update");
}
} }
let return_doc = if return_new { let return_doc = if return_new {
@@ -505,6 +550,13 @@ async fn handle_find_and_modify(
updated_doc.get("_id").unwrap().clone() updated_doc.get("_id").unwrap().clone()
}; };
// Pre-check unique index constraints before upsert insert.
if let Some(engine) = ctx.indexes.get(&ns_key) {
if let Err(e) = engine.check_unique_constraints(&updated_doc) {
return Err(CommandError::StorageError(e.to_string()));
}
}
let inserted_id_str = ctx.storage let inserted_id_str = ctx.storage
.insert_one(db, coll, updated_doc.clone()) .insert_one(db, coll, updated_doc.clone())
.await?; .await?;
@@ -525,7 +577,9 @@ async fn handle_find_and_modify(
.indexes .indexes
.entry(ns_key.clone()) .entry(ns_key.clone())
.or_insert_with(IndexEngine::new); .or_insert_with(IndexEngine::new);
let _ = engine.on_insert(&updated_doc); if let Err(e) = engine.on_insert(&updated_doc) {
tracing::error!(namespace = %ns_key, error = %e, "index update failed after findAndModify upsert");
}
} }
let value = if return_new { let value = if return_new {

View File

@@ -153,6 +153,55 @@ impl IndexEngine {
self.indexes.contains_key(name) self.indexes.contains_key(name)
} }
/// Check unique constraints for a document without modifying the index.
/// Returns Ok(()) if no conflict, Err(DuplicateKey) if a unique constraint
/// would be violated. This is a read-only check (immutable &self).
pub fn check_unique_constraints(&self, doc: &Document) -> Result<(), IndexError> {
for idx in self.indexes.values() {
if idx.unique {
let key_bytes = Self::extract_key_bytes(doc, &idx.key, idx.sparse);
if let Some(ref kb) = key_bytes {
if let Some(existing_ids) = idx.hash.get(kb) {
if !existing_ids.is_empty() {
return Err(IndexError::DuplicateKey {
index: idx.name.clone(),
key: format!("{:?}", kb),
});
}
}
}
}
}
Ok(())
}
/// Check unique constraints for an update, excluding the document being updated.
/// Returns Ok(()) if no conflict. This is a read-only check (immutable &self).
pub fn check_unique_constraints_for_update(
&self,
old_doc: &Document,
new_doc: &Document,
) -> Result<(), IndexError> {
let doc_id = Self::extract_id(old_doc);
for idx in self.indexes.values() {
if idx.unique {
let new_key_bytes = Self::extract_key_bytes(new_doc, &idx.key, idx.sparse);
if let Some(ref kb) = new_key_bytes {
if let Some(existing_ids) = idx.hash.get(kb) {
let has_conflict = existing_ids.iter().any(|id| *id != doc_id);
if has_conflict {
return Err(IndexError::DuplicateKey {
index: idx.name.clone(),
key: format!("{:?}", kb),
});
}
}
}
}
}
Ok(())
}
/// Notify the engine that a document has been inserted. /// Notify the engine that a document has been inserted.
/// Checks unique constraints and updates all index structures. /// Checks unique constraints and updates all index structures.
pub fn on_insert(&mut self, doc: &Document) -> Result<(), IndexError> { pub fn on_insert(&mut self, doc: &Document) -> Result<(), IndexError> {

View File

@@ -253,7 +253,7 @@ mod tests {
assert!(b_entry.offset > a_entry.offset); assert!(b_entry.offset > a_entry.offset);
// Verify the compacted file can be used to rebuild KeyDir // Verify the compacted file can be used to rebuild KeyDir
let (rebuilt, dead) = KeyDir::build_from_data_file(&data_path).unwrap(); let (rebuilt, dead, _stats) = KeyDir::build_from_data_file(&data_path).unwrap();
assert_eq!(rebuilt.len(), 2); assert_eq!(rebuilt.len(), 2);
assert_eq!(dead, 0); // no dead records in compacted file assert_eq!(dead, 0); // no dead records in compacted file
} }

View File

@@ -21,7 +21,7 @@ use std::sync::Arc;
use async_trait::async_trait; use async_trait::async_trait;
use bson::{doc, oid::ObjectId, Document}; use bson::{doc, oid::ObjectId, Document};
use dashmap::DashMap; use dashmap::DashMap;
use tracing::debug; use tracing::{debug, info};
use crate::adapter::StorageAdapter; use crate::adapter::StorageAdapter;
use crate::binary_wal::{BinaryWal, WalOpType}; use crate::binary_wal::{BinaryWal, WalOpType};
@@ -83,6 +83,20 @@ impl CollectionState {
.map_err(|e| StorageError::SerializationError(format!("BSON decode: {e}"))) .map_err(|e| StorageError::SerializationError(format!("BSON decode: {e}")))
} }
/// Ensure a data file has the 64-byte SMARTDB header.
/// If the file was just created (empty), writes the header and updates
/// the data_file_size counter. Must be called under write_lock.
fn ensure_data_header(&self, file: &mut std::fs::File) -> StorageResult<()> {
let pos = file.seek(SeekFrom::End(0))?;
if pos == 0 {
let hdr = FileHeader::new(FileType::Data);
file.write_all(&hdr.encode())?;
self.data_file_size
.fetch_add(FILE_HEADER_SIZE as u64, Ordering::Relaxed);
}
Ok(())
}
/// Append a data record and update the KeyDir. Must be called under write_lock. /// Append a data record and update the KeyDir. Must be called under write_lock.
fn append_record( fn append_record(
&self, &self,
@@ -104,6 +118,7 @@ impl CollectionState {
.append(true) .append(true)
.open(&data_path)?; .open(&data_path)?;
self.ensure_data_header(&mut file)?;
let offset = file.seek(SeekFrom::End(0))?; let offset = file.seek(SeekFrom::End(0))?;
file.write_all(&encoded)?; file.write_all(&encoded)?;
file.sync_all()?; file.sync_all()?;
@@ -137,6 +152,7 @@ impl CollectionState {
.append(true) .append(true)
.open(&data_path)?; .open(&data_path)?;
self.ensure_data_header(&mut file)?;
file.write_all(&encoded)?; file.write_all(&encoded)?;
file.sync_all()?; file.sync_all()?;
@@ -160,6 +176,11 @@ impl CollectionState {
&self.data_file_size, &self.data_file_size,
) { ) {
tracing::warn!("compaction failed for {:?}: {e}", self.coll_dir); tracing::warn!("compaction failed for {:?}: {e}", self.coll_dir);
} else {
// Persist hint file after successful compaction to prevent stale hints
if let Err(e) = self.keydir.persist_to_hint_file(&self.hint_path()) {
tracing::warn!("failed to persist hint after compaction for {:?}: {e}", self.coll_dir);
}
} }
} }
} }
@@ -234,33 +255,42 @@ impl FileStorageAdapter {
let hint_path = coll_dir.join("keydir.hint"); let hint_path = coll_dir.join("keydir.hint");
// Try loading from hint file first, fall back to data file scan // Try loading from hint file first, fall back to data file scan
let (keydir, dead_bytes) = if hint_path.exists() && data_path.exists() { let (keydir, dead_bytes, loaded_from_hint) = if hint_path.exists() && data_path.exists() {
match KeyDir::load_from_hint_file(&hint_path) { match KeyDir::load_from_hint_file(&hint_path) {
Ok(Some(kd)) => { Ok(Some(kd)) => {
debug!("loaded KeyDir from hint file: {:?}", hint_path); // Validate hint against actual data file
// We don't know dead_bytes from the hint file; estimate from file size let hint_valid = kd.validate_against_data_file(&data_path, 16)
let file_size = std::fs::metadata(&data_path) .unwrap_or(false);
.map(|m| m.len()) if hint_valid {
.unwrap_or(FILE_HEADER_SIZE as u64); debug!("loaded KeyDir from hint file: {:?}", hint_path);
let live_bytes: u64 = { let file_size = std::fs::metadata(&data_path)
let mut total = 0u64; .map(|m| m.len())
kd.for_each(|_, e| total += e.record_len as u64); .unwrap_or(FILE_HEADER_SIZE as u64);
total let live_bytes: u64 = {
}; let mut total = 0u64;
let dead = file_size.saturating_sub(FILE_HEADER_SIZE as u64).saturating_sub(live_bytes); kd.for_each(|_, e| total += e.record_len as u64);
(kd, dead) total
};
let dead = file_size.saturating_sub(FILE_HEADER_SIZE as u64).saturating_sub(live_bytes);
(kd, dead, true)
} else {
tracing::warn!("hint file {:?} is stale, rebuilding from data file", hint_path);
let (kd, dead, _stats) = KeyDir::build_from_data_file(&data_path)?;
(kd, dead, false)
}
} }
_ => { _ => {
debug!("hint file invalid, rebuilding KeyDir from data file"); debug!("hint file invalid, rebuilding KeyDir from data file");
KeyDir::build_from_data_file(&data_path)? let (kd, dead, _stats) = KeyDir::build_from_data_file(&data_path)?;
(kd, dead, false)
} }
} }
} else if data_path.exists() { } else if data_path.exists() {
KeyDir::build_from_data_file(&data_path)? let (kd, dead, _stats) = KeyDir::build_from_data_file(&data_path)?;
(kd, dead, false)
} else { } else {
(KeyDir::new(), 0) (KeyDir::new(), 0, false)
}; };
let doc_count = keydir.len(); let doc_count = keydir.len();
let data_file_size = if data_path.exists() { let data_file_size = if data_path.exists() {
std::fs::metadata(&data_path)?.len() std::fs::metadata(&data_path)?.len()
@@ -268,6 +298,15 @@ impl FileStorageAdapter {
FILE_HEADER_SIZE as u64 FILE_HEADER_SIZE as u64
}; };
info!(
collection = %coll_dir.display(),
documents = doc_count,
data_bytes = data_file_size,
dead_bytes = dead_bytes,
source = if loaded_from_hint { "hint" } else { "scan" },
"loaded collection"
);
// Initialize WAL and recover // Initialize WAL and recover
let wal = BinaryWal::new(wal_path); let wal = BinaryWal::new(wal_path);
wal.initialize()?; wal.initialize()?;
@@ -275,10 +314,10 @@ impl FileStorageAdapter {
// Recover uncommitted WAL entries // Recover uncommitted WAL entries
let uncommitted = wal.recover()?; let uncommitted = wal.recover()?;
if !uncommitted.is_empty() { if !uncommitted.is_empty() {
debug!( info!(
"recovering {} uncommitted WAL entries for {:?}", collection = %coll_dir.display(),
uncommitted.len(), entries = uncommitted.len(),
coll_dir "recovering uncommitted WAL entries"
); );
} }
@@ -415,15 +454,18 @@ impl FileStorageAdapter {
impl StorageAdapter for FileStorageAdapter { impl StorageAdapter for FileStorageAdapter {
async fn initialize(&self) -> StorageResult<()> { async fn initialize(&self) -> StorageResult<()> {
std::fs::create_dir_all(&self.base_path)?; std::fs::create_dir_all(&self.base_path)?;
debug!("FileStorageAdapter initialized at {:?}", self.base_path);
// Pre-load all existing collections // Pre-load all existing collections
let mut db_count: usize = 0;
if let Ok(entries) = std::fs::read_dir(&self.base_path) { if let Ok(entries) = std::fs::read_dir(&self.base_path) {
for entry in entries.flatten() { for entry in entries.flatten() {
if entry.file_type().map(|ft| ft.is_dir()).unwrap_or(false) { if entry.file_type().map(|ft| ft.is_dir()).unwrap_or(false) {
if let Some(db_name) = entry.file_name().to_str() { if let Some(db_name) = entry.file_name().to_str() {
let db_name = db_name.to_string(); let db_name = db_name.to_string();
if let Ok(colls) = self.list_collection_dirs(&db_name) { if let Ok(colls) = self.list_collection_dirs(&db_name) {
if !colls.is_empty() {
db_count += 1;
}
for coll_name in colls { for coll_name in colls {
let _ = self.get_or_init_collection(&db_name, &coll_name); let _ = self.get_or_init_collection(&db_name, &coll_name);
} }
@@ -433,6 +475,13 @@ impl StorageAdapter for FileStorageAdapter {
} }
} }
info!(
databases = db_count,
collections = self.collections.len(),
path = %self.base_path.display(),
"FileStorageAdapter initialization complete"
);
// Start periodic compaction task (runs every 24 hours) // Start periodic compaction task (runs every 24 hours)
{ {
let collections = self.collections.clone(); let collections = self.collections.clone();

View File

@@ -6,7 +6,7 @@
//! The KeyDir can be rebuilt from a data file scan, or loaded quickly from a //! The KeyDir can be rebuilt from a data file scan, or loaded quickly from a
//! persisted hint file for fast restart. //! persisted hint file for fast restart.
use std::io::{self, BufReader, BufWriter, Read, Write}; use std::io::{self, BufReader, BufWriter, Read, Seek, SeekFrom, Write};
use std::path::Path; use std::path::Path;
use std::sync::atomic::{AtomicU64, Ordering}; use std::sync::atomic::{AtomicU64, Ordering};
@@ -14,7 +14,7 @@ use dashmap::DashMap;
use crate::error::{StorageError, StorageResult}; use crate::error::{StorageError, StorageResult};
use crate::record::{ use crate::record::{
FileHeader, FileType, RecordScanner, FILE_HEADER_SIZE, FORMAT_VERSION, DataRecord, FileHeader, FileType, RecordScanner, FILE_HEADER_SIZE, FORMAT_VERSION,
}; };
// --------------------------------------------------------------------------- // ---------------------------------------------------------------------------
@@ -34,6 +34,23 @@ pub struct KeyDirEntry {
pub timestamp: u64, pub timestamp: u64,
} }
// ---------------------------------------------------------------------------
// BuildStats — statistics from building KeyDir from a data file scan
// ---------------------------------------------------------------------------
/// Statistics collected while building a KeyDir from a data file scan.
#[derive(Debug, Clone, Default)]
pub struct BuildStats {
/// Total records scanned (live + tombstones + superseded).
pub total_records_scanned: u64,
/// Number of live documents in the final KeyDir.
pub live_documents: u64,
/// Number of tombstone records encountered.
pub tombstones: u64,
/// Number of records superseded by a later write for the same key.
pub superseded_records: u64,
}
// --------------------------------------------------------------------------- // ---------------------------------------------------------------------------
// KeyDir // KeyDir
// --------------------------------------------------------------------------- // ---------------------------------------------------------------------------
@@ -116,9 +133,9 @@ impl KeyDir {
/// Rebuild the KeyDir by scanning an entire data file. /// Rebuild the KeyDir by scanning an entire data file.
/// The file must start with a valid `FileHeader`. /// The file must start with a valid `FileHeader`.
/// Returns `(keydir, dead_bytes)` where `dead_bytes` is the total size of /// Returns `(keydir, dead_bytes, stats)` where `dead_bytes` is the total size of
/// stale records (superseded by later writes or tombstoned). /// stale records (superseded by later writes or tombstoned).
pub fn build_from_data_file(path: &Path) -> StorageResult<(Self, u64)> { pub fn build_from_data_file(path: &Path) -> StorageResult<(Self, u64, BuildStats)> {
let file = std::fs::File::open(path)?; let file = std::fs::File::open(path)?;
let mut reader = BufReader::new(file); let mut reader = BufReader::new(file);
@@ -135,6 +152,7 @@ impl KeyDir {
let keydir = KeyDir::new(); let keydir = KeyDir::new();
let mut dead_bytes: u64 = 0; let mut dead_bytes: u64 = 0;
let mut stats = BuildStats::default();
let scanner = RecordScanner::new(reader, FILE_HEADER_SIZE as u64); let scanner = RecordScanner::new(reader, FILE_HEADER_SIZE as u64);
for result in scanner { for result in scanner {
@@ -146,7 +164,10 @@ impl KeyDir {
let key = String::from_utf8(record.key) let key = String::from_utf8(record.key)
.map_err(|e| StorageError::CorruptRecord(format!("invalid UTF-8 key: {e}")))?; .map_err(|e| StorageError::CorruptRecord(format!("invalid UTF-8 key: {e}")))?;
stats.total_records_scanned += 1;
if is_tombstone { if is_tombstone {
stats.tombstones += 1;
// Remove from index; the tombstone itself is dead weight // Remove from index; the tombstone itself is dead weight
if let Some(prev) = keydir.remove(&key) { if let Some(prev) = keydir.remove(&key) {
dead_bytes += prev.record_len as u64; dead_bytes += prev.record_len as u64;
@@ -162,11 +183,13 @@ impl KeyDir {
if let Some(prev) = keydir.insert(key, entry) { if let Some(prev) = keydir.insert(key, entry) {
// Previous version of same key is now dead // Previous version of same key is now dead
dead_bytes += prev.record_len as u64; dead_bytes += prev.record_len as u64;
stats.superseded_records += 1;
} }
} }
} }
Ok((keydir, dead_bytes)) stats.live_documents = keydir.len();
Ok((keydir, dead_bytes, stats))
} }
// ----------------------------------------------------------------------- // -----------------------------------------------------------------------
@@ -271,6 +294,86 @@ impl KeyDir {
Ok(Some(keydir)) Ok(Some(keydir))
} }
// -----------------------------------------------------------------------
// Hint file validation
// -----------------------------------------------------------------------
/// Validate this KeyDir (loaded from a hint file) against the actual data file.
/// Returns `Ok(true)` if the hint appears consistent, `Ok(false)` if a rebuild
/// from the data file is recommended.
///
/// Checks:
/// 1. All entry offsets + record_len fit within the data file size.
/// 2. All entry offsets are >= FILE_HEADER_SIZE.
/// 3. A random sample of entries is spot-checked by reading the record at
/// the offset and verifying the key matches.
pub fn validate_against_data_file(&self, data_path: &Path, sample_size: usize) -> StorageResult<bool> {
let file_size = std::fs::metadata(data_path)
.map(|m| m.len())
.unwrap_or(0);
if file_size < FILE_HEADER_SIZE as u64 {
// Data file is too small to even contain a header
return Ok(self.is_empty());
}
// Pass 1: bounds check all entries
let mut all_keys: Vec<(String, KeyDirEntry)> = Vec::with_capacity(self.len() as usize);
let mut bounds_ok = true;
self.for_each(|key, entry| {
if entry.offset < FILE_HEADER_SIZE as u64
|| entry.offset + entry.record_len as u64 > file_size
{
bounds_ok = false;
}
all_keys.push((key.to_string(), *entry));
});
if !bounds_ok {
return Ok(false);
}
// Pass 2: spot-check a sample of entries by reading records from data.rdb
if all_keys.is_empty() {
return Ok(true);
}
// Sort by offset for sequential I/O, take first `sample_size` entries
all_keys.sort_by_key(|(_, e)| e.offset);
let step = if all_keys.len() <= sample_size {
1
} else {
all_keys.len() / sample_size
};
let mut file = std::fs::File::open(data_path)?;
let mut checked = 0usize;
for (i, (expected_key, entry)) in all_keys.iter().enumerate() {
if checked >= sample_size {
break;
}
if i % step != 0 {
continue;
}
// Seek to the entry's offset and try to decode the record
file.seek(SeekFrom::Start(entry.offset))?;
match DataRecord::decode_from(&mut file) {
Ok(Some((record, _disk_size))) => {
let record_key = String::from_utf8_lossy(&record.key);
if record_key != *expected_key {
return Ok(false);
}
}
Ok(None) | Err(_) => {
return Ok(false);
}
}
checked += 1;
}
Ok(true)
}
} }
impl Default for KeyDir { impl Default for KeyDir {
@@ -372,7 +475,7 @@ mod tests {
f.write_all(&r3.encode()).unwrap(); f.write_all(&r3.encode()).unwrap();
} }
let (kd, dead_bytes) = KeyDir::build_from_data_file(&data_path).unwrap(); let (kd, dead_bytes, stats) = KeyDir::build_from_data_file(&data_path).unwrap();
// Only B should be live // Only B should be live
assert_eq!(kd.len(), 1); assert_eq!(kd.len(), 1);
@@ -381,6 +484,12 @@ mod tests {
// Dead bytes: r1 (aaa live, then superseded by tombstone) + r3 (tombstone itself) // Dead bytes: r1 (aaa live, then superseded by tombstone) + r3 (tombstone itself)
assert!(dead_bytes > 0); assert!(dead_bytes > 0);
// Stats
assert_eq!(stats.total_records_scanned, 3);
assert_eq!(stats.live_documents, 1);
assert_eq!(stats.tombstones, 1);
assert_eq!(stats.superseded_records, 0); // aaa was removed by tombstone, not superseded
} }
#[test] #[test]

View File

@@ -16,13 +16,14 @@ pub mod keydir;
pub mod memory; pub mod memory;
pub mod oplog; pub mod oplog;
pub mod record; pub mod record;
pub mod validate;
pub use adapter::StorageAdapter; pub use adapter::StorageAdapter;
pub use binary_wal::{BinaryWal, WalEntry, WalOpType}; pub use binary_wal::{BinaryWal, WalEntry, WalOpType};
pub use compaction::{compact_data_file, should_compact, CompactionResult}; pub use compaction::{compact_data_file, should_compact, CompactionResult};
pub use error::{StorageError, StorageResult}; pub use error::{StorageError, StorageResult};
pub use file::FileStorageAdapter; pub use file::FileStorageAdapter;
pub use keydir::{KeyDir, KeyDirEntry}; pub use keydir::{BuildStats, KeyDir, KeyDirEntry};
pub use memory::MemoryStorageAdapter; pub use memory::MemoryStorageAdapter;
pub use oplog::{OpLog, OpLogEntry, OpLogStats, OpType}; pub use oplog::{OpLog, OpLogEntry, OpLogStats, OpType};
pub use record::{ pub use record::{

View File

@@ -0,0 +1,324 @@
//! Data integrity validation for RustDb storage directories.
//!
//! Provides offline validation of data files without starting the server.
//! Checks header magic, record CRC32 checksums, duplicate IDs, and
//! keydir.hint consistency.
use std::collections::HashMap;
use std::io::{BufReader, Read};
use std::path::Path;
use crate::error::{StorageError, StorageResult};
use crate::keydir::KeyDir;
use crate::record::{FileHeader, FileType, RecordScanner, FILE_HEADER_SIZE};
/// Result of validating an entire data directory.
pub struct ValidationReport {
pub collections: Vec<CollectionReport>,
}
/// Result of validating a single collection.
pub struct CollectionReport {
pub db: String,
pub collection: String,
pub header_valid: bool,
pub total_records: u64,
pub live_documents: u64,
pub tombstones: u64,
pub duplicate_ids: Vec<String>,
pub checksum_errors: u64,
pub decode_errors: u64,
pub data_file_size: u64,
pub hint_file_exists: bool,
pub orphaned_hint_entries: u64,
pub errors: Vec<String>,
}
impl ValidationReport {
/// Whether any errors were found across all collections.
pub fn has_errors(&self) -> bool {
self.collections.iter().any(|c| {
!c.header_valid
|| !c.duplicate_ids.is_empty()
|| c.checksum_errors > 0
|| c.decode_errors > 0
|| c.orphaned_hint_entries > 0
|| !c.errors.is_empty()
})
}
/// Print a human-readable summary to stdout.
pub fn print_summary(&self) {
println!("=== SmartDB Data Integrity Report ===");
println!();
let mut total_errors = 0u64;
for report in &self.collections {
println!("Database: {}", report.db);
println!(" Collection: {}", report.collection);
println!(
" Header: {}",
if report.header_valid { "OK" } else { "INVALID" }
);
println!(
" Records: {} ({} live, {} tombstones)",
report.total_records, report.live_documents, report.tombstones
);
println!(" Data size: {} bytes", report.data_file_size);
if report.duplicate_ids.is_empty() {
println!(" Duplicates: 0");
} else {
let ids_preview: Vec<&str> = report.duplicate_ids.iter().take(5).map(|s| s.as_str()).collect();
let suffix = if report.duplicate_ids.len() > 5 {
format!(", ... and {} more", report.duplicate_ids.len() - 5)
} else {
String::new()
};
println!(
" Duplicates: {} (ids: {}{})",
report.duplicate_ids.len(),
ids_preview.join(", "),
suffix
);
}
if report.checksum_errors > 0 {
println!(" CRC errors: {}", report.checksum_errors);
} else {
println!(" CRC errors: 0");
}
if report.decode_errors > 0 {
println!(" Decode errors: {}", report.decode_errors);
}
if report.hint_file_exists {
if report.orphaned_hint_entries > 0 {
println!(
" Hint file: STALE ({} orphaned entries)",
report.orphaned_hint_entries
);
} else {
println!(" Hint file: OK");
}
} else {
println!(" Hint file: absent");
}
for err in &report.errors {
println!(" ERROR: {}", err);
}
println!();
if !report.header_valid { total_errors += 1; }
total_errors += report.duplicate_ids.len() as u64;
total_errors += report.checksum_errors;
total_errors += report.decode_errors;
total_errors += report.orphaned_hint_entries;
total_errors += report.errors.len() as u64;
}
println!(
"Summary: {} collection(s) checked, {} error(s) found.",
self.collections.len(),
total_errors
);
}
}
/// Validate all collections in a data directory.
///
/// The directory structure is expected to be:
/// ```text
/// {base_path}/{db}/{collection}/data.rdb
/// ```
pub fn validate_data_directory(base_path: &str) -> StorageResult<ValidationReport> {
let base = Path::new(base_path);
if !base.exists() {
return Err(StorageError::IoError(std::io::Error::new(
std::io::ErrorKind::NotFound,
format!("data directory not found: {base_path}"),
)));
}
let mut collections = Vec::new();
// Iterate database directories
let entries = std::fs::read_dir(base)?;
for entry in entries {
let entry = entry?;
if !entry.file_type()?.is_dir() {
continue;
}
let db_name = match entry.file_name().to_str() {
Some(s) => s.to_string(),
None => continue,
};
// Iterate collection directories
let db_entries = std::fs::read_dir(entry.path())?;
for coll_entry in db_entries {
let coll_entry = coll_entry?;
if !coll_entry.file_type()?.is_dir() {
continue;
}
let coll_name = match coll_entry.file_name().to_str() {
Some(s) => s.to_string(),
None => continue,
};
let data_path = coll_entry.path().join("data.rdb");
if !data_path.exists() {
continue;
}
let report = validate_collection(&db_name, &coll_name, &coll_entry.path());
collections.push(report);
}
}
// Sort for deterministic output
collections.sort_by(|a, b| (&a.db, &a.collection).cmp(&(&b.db, &b.collection)));
Ok(ValidationReport { collections })
}
/// Validate a single collection directory.
fn validate_collection(db: &str, coll: &str, coll_dir: &Path) -> CollectionReport {
let data_path = coll_dir.join("data.rdb");
let hint_path = coll_dir.join("keydir.hint");
let mut report = CollectionReport {
db: db.to_string(),
collection: coll.to_string(),
header_valid: false,
total_records: 0,
live_documents: 0,
tombstones: 0,
duplicate_ids: Vec::new(),
checksum_errors: 0,
decode_errors: 0,
data_file_size: 0,
hint_file_exists: hint_path.exists(),
orphaned_hint_entries: 0,
errors: Vec::new(),
};
// Get file size
match std::fs::metadata(&data_path) {
Ok(m) => report.data_file_size = m.len(),
Err(e) => {
report.errors.push(format!("cannot stat data.rdb: {e}"));
return report;
}
}
// Open and validate header
let file = match std::fs::File::open(&data_path) {
Ok(f) => f,
Err(e) => {
report.errors.push(format!("cannot open data.rdb: {e}"));
return report;
}
};
let mut reader = BufReader::new(file);
let mut hdr_buf = [0u8; FILE_HEADER_SIZE];
if let Err(e) = reader.read_exact(&mut hdr_buf) {
report.errors.push(format!("cannot read header: {e}"));
return report;
}
match FileHeader::decode(&hdr_buf) {
Ok(hdr) => {
if hdr.file_type != FileType::Data {
report.errors.push(format!(
"wrong file type: expected Data, got {:?}",
hdr.file_type
));
} else {
report.header_valid = true;
}
}
Err(e) => {
report.errors.push(format!("invalid header: {e}"));
return report;
}
}
// Scan all records
let mut id_counts: HashMap<String, u64> = HashMap::new();
let mut live_ids: std::collections::HashSet<String> = std::collections::HashSet::new();
let scanner = RecordScanner::new(reader, FILE_HEADER_SIZE as u64);
for result in scanner {
match result {
Ok((_offset, record)) => {
report.total_records += 1;
let key = String::from_utf8_lossy(&record.key).to_string();
if record.is_tombstone() {
report.tombstones += 1;
live_ids.remove(&key);
} else {
*id_counts.entry(key.clone()).or_insert(0) += 1;
live_ids.insert(key);
}
}
Err(e) => {
let err_str = e.to_string();
if err_str.contains("checksum") || err_str.contains("Checksum") {
report.checksum_errors += 1;
} else {
report.decode_errors += 1;
}
// Cannot continue scanning after a decode error — the stream position is lost
report.errors.push(format!("record decode error: {e}"));
break;
}
}
}
report.live_documents = live_ids.len() as u64;
// Find duplicates (keys that appeared more than once as live inserts)
for (id, count) in &id_counts {
if *count > 1 {
report.duplicate_ids.push(id.clone());
}
}
report.duplicate_ids.sort();
// Validate hint file if present
if hint_path.exists() {
match KeyDir::load_from_hint_file(&hint_path) {
Ok(Some(hint_kd)) => {
// Check for orphaned entries: keys in hint but not live in data
hint_kd.for_each(|key, _entry| {
if !live_ids.contains(key) {
report.orphaned_hint_entries += 1;
}
});
// Also check if hint references offsets beyond file size
hint_kd.for_each(|_key, entry| {
if entry.offset + entry.record_len as u64 > report.data_file_size {
report.orphaned_hint_entries += 1;
}
});
}
Ok(None) => {
// File existed but was empty or unreadable
report.errors.push("hint file exists but is empty".into());
}
Err(e) => {
report.errors.push(format!("hint file decode error: {e}"));
}
}
}
report
}

View File

@@ -25,6 +25,10 @@ struct Cli {
#[arg(long)] #[arg(long)]
validate: bool, validate: bool,
/// Validate data integrity of a storage directory (offline check)
#[arg(long, value_name = "PATH")]
validate_data: Option<String>,
/// Run in management mode (JSON-over-stdin IPC for TypeScript wrapper) /// Run in management mode (JSON-over-stdin IPC for TypeScript wrapper)
#[arg(long)] #[arg(long)]
management: bool, management: bool,
@@ -55,7 +59,7 @@ async fn main() -> Result<()> {
let options = RustDbOptions::from_file(&cli.config) let options = RustDbOptions::from_file(&cli.config)
.map_err(|e| anyhow::anyhow!("Failed to load config '{}': {}", cli.config, e))?; .map_err(|e| anyhow::anyhow!("Failed to load config '{}': {}", cli.config, e))?;
// Validate-only mode // Validate-only mode (config)
if cli.validate { if cli.validate {
match options.validate() { match options.validate() {
Ok(()) => { Ok(()) => {
@@ -69,6 +73,18 @@ async fn main() -> Result<()> {
} }
} }
// Validate data integrity mode
if let Some(ref data_path) = cli.validate_data {
tracing::info!("Validating data integrity at {}", data_path);
let report = rustdb_storage::validate::validate_data_directory(data_path)
.map_err(|e| anyhow::anyhow!("Validation failed: {}", e))?;
report.print_summary();
if report.has_errors() {
std::process::exit(1);
}
return Ok(());
}
// Create and start server // Create and start server
let mut db = RustDb::new(options).await?; let mut db = RustDb::new(options).await?;
db.start().await?; db.start().await?;

View File

@@ -3,6 +3,6 @@
*/ */
export const commitinfo = { export const commitinfo = {
name: '@push.rocks/smartdb', name: '@push.rocks/smartdb',
version: '2.4.1', version: '2.5.0',
description: 'A MongoDB-compatible embedded database server with wire protocol support, backed by a high-performance Rust engine.' description: 'A MongoDB-compatible embedded database server with wire protocol support, backed by a high-performance Rust engine.'
} }

View File

@@ -1,4 +1,6 @@
import * as crypto from 'crypto'; import * as crypto from 'crypto';
import * as fs from 'fs/promises';
import * as net from 'net';
import * as path from 'path'; import * as path from 'path';
import * as os from 'os'; import * as os from 'os';
import { SmartdbServer } from '../ts_smartdb/index.js'; import { SmartdbServer } from '../ts_smartdb/index.js';
@@ -66,6 +68,55 @@ export class LocalSmartDb {
return path.join(os.tmpdir(), `smartdb-${randomId}.sock`); return path.join(os.tmpdir(), `smartdb-${randomId}.sock`);
} }
/**
* Check if a Unix socket is alive by attempting to connect.
*/
private static isSocketAlive(socketPath: string): Promise<boolean> {
return new Promise((resolve) => {
const client = net.createConnection({ path: socketPath }, () => {
client.destroy();
resolve(true);
});
client.on('error', () => {
resolve(false);
});
client.setTimeout(500, () => {
client.destroy();
resolve(false);
});
});
}
/**
* Remove stale smartdb-*.sock files from /tmp.
* A socket is considered stale if connecting to it fails.
*/
private static async cleanStaleSockets(): Promise<void> {
const tmpDir = os.tmpdir();
let entries: string[];
try {
entries = await fs.readdir(tmpDir);
} catch {
return;
}
const socketFiles = entries.filter(
(f) => f.startsWith('smartdb-') && f.endsWith('.sock')
);
for (const name of socketFiles) {
const fullPath = path.join(tmpDir, name);
try {
const stat = await fs.stat(fullPath);
if (!stat.isSocket()) continue;
const alive = await LocalSmartDb.isSocketAlive(fullPath);
if (!alive) {
await fs.unlink(fullPath);
}
} catch {
// File may have been removed already; ignore
}
}
}
/** /**
* Start the local SmartDB server and return connection info * Start the local SmartDB server and return connection info
*/ */
@@ -74,6 +125,9 @@ export class LocalSmartDb {
throw new Error('LocalSmartDb is already running'); throw new Error('LocalSmartDb is already running');
} }
// Clean up stale sockets from previous crashed instances
await LocalSmartDb.cleanStaleSockets();
// Run storage migration before starting the Rust engine // Run storage migration before starting the Rust engine
const migrator = new StorageMigrator(this.options.folderPath); const migrator = new StorageMigrator(this.options.folderPath);
await migrator.run(); await migrator.run();

File diff suppressed because one or more lines are too long