1use citadel_core::types::PageId;
2use citadel_core::{Error, Result};
3use citadel_core::{BODY_SIZE, DEK_SIZE, MAC_KEY_SIZE, PAGE_SIZE};
4
5use citadel_crypto::page_cipher;
6use citadel_io::file_manager::page_offset;
7use citadel_io::traits::PageIO;
8use citadel_page::page::Page;
9
10use crate::sieve::SieveCache;
11
12pub struct BufferPool {
22 cache: SieveCache<Page>,
23 capacity: usize,
24}
25
26impl BufferPool {
27 pub fn new(capacity: usize) -> Self {
28 Self {
29 cache: SieveCache::new(capacity),
30 capacity,
31 }
32 }
33
34 pub fn fetch(
39 &mut self,
40 io: &dyn PageIO,
41 page_id: PageId,
42 dek: &[u8; DEK_SIZE],
43 mac_key: &[u8; MAC_KEY_SIZE],
44 encryption_epoch: u32,
45 ) -> Result<&Page> {
46 let offset = page_offset(page_id);
47
48 if self.cache.contains(offset) {
50 return Ok(self.cache.get(offset).unwrap());
51 }
52
53 let page = self.read_and_decrypt(io, page_id, offset, dek, mac_key, encryption_epoch)?;
55
56 self.cache
58 .insert(offset, page)
59 .map_err(|()| Error::BufferPoolFull)?;
60
61 Ok(self.cache.get(offset).unwrap())
62 }
63
64 pub fn fetch_mut(
66 &mut self,
67 io: &dyn PageIO,
68 page_id: PageId,
69 dek: &[u8; DEK_SIZE],
70 mac_key: &[u8; MAC_KEY_SIZE],
71 encryption_epoch: u32,
72 ) -> Result<&mut Page> {
73 let offset = page_offset(page_id);
74
75 if !self.cache.contains(offset) {
76 let page =
77 self.read_and_decrypt(io, page_id, offset, dek, mac_key, encryption_epoch)?;
78 self.cache
79 .insert(offset, page)
80 .map_err(|()| Error::BufferPoolFull)?;
81 }
82
83 Ok(self.cache.get_mut(offset).unwrap())
84 }
85
86 pub fn insert_new(&mut self, page_id: PageId, page: Page) -> Result<()> {
89 let offset = page_offset(page_id);
90
91 if self.cache.len() >= self.capacity && !self.cache.contains(offset) {
93 self.cache
95 .insert(offset, page)
96 .map_err(|()| Error::TransactionTooLarge {
97 capacity: self.capacity,
98 })?;
99 } else {
100 self.cache
101 .insert(offset, page)
102 .map_err(|()| Error::BufferPoolFull)?;
103 }
104
105 self.cache.set_dirty(offset);
106 Ok(())
107 }
108
109 pub fn mark_dirty(&mut self, page_id: PageId) {
111 let offset = page_offset(page_id);
112 self.cache.set_dirty(offset);
113 }
114
115 pub fn flush_dirty(
118 &mut self,
119 io: &dyn PageIO,
120 dek: &[u8; DEK_SIZE],
121 mac_key: &[u8; MAC_KEY_SIZE],
122 encryption_epoch: u32,
123 ) -> Result<()> {
124 let dirty: Vec<(u64, PageId, [u8; BODY_SIZE])> = self
126 .cache
127 .dirty_entries()
128 .map(|(offset, page)| {
129 let page_id = page.page_id();
130 let body = *page.as_bytes();
131 (offset, page_id, body)
132 })
133 .collect();
134
135 for (offset, page_id, body) in &dirty {
136 let mut encrypted = [0u8; PAGE_SIZE];
137 page_cipher::encrypt_page(
138 dek,
139 mac_key,
140 *page_id,
141 encryption_epoch,
142 body,
143 &mut encrypted,
144 );
145 io.write_page(*offset, &encrypted)?;
146 }
147
148 self.cache.clear_all_dirty();
149 Ok(())
150 }
151
152 pub fn discard_dirty(&mut self) {
155 let dirty_offsets: Vec<u64> = self
156 .cache
157 .dirty_entries()
158 .map(|(offset, _)| offset)
159 .collect();
160
161 for offset in dirty_offsets {
162 self.cache.remove(offset);
163 }
164 }
165
166 fn read_and_decrypt(
167 &self,
168 io: &dyn PageIO,
169 page_id: PageId,
170 offset: u64,
171 dek: &[u8; DEK_SIZE],
172 mac_key: &[u8; MAC_KEY_SIZE],
173 encryption_epoch: u32,
174 ) -> Result<Page> {
175 let mut encrypted = [0u8; PAGE_SIZE];
176 io.read_page(offset, &mut encrypted)?;
177
178 let mut body = [0u8; BODY_SIZE];
180 page_cipher::decrypt_page(
181 dek,
182 mac_key,
183 page_id,
184 encryption_epoch,
185 &encrypted,
186 &mut body,
187 )?;
188
189 let page = Page::from_bytes(body);
190
191 if !page.verify_checksum() {
193 return Err(Error::ChecksumMismatch(page_id));
194 }
195
196 Ok(page)
197 }
198
199 pub fn len(&self) -> usize {
201 self.cache.len()
202 }
203
204 pub fn is_empty(&self) -> bool {
206 self.cache.is_empty()
207 }
208
209 pub fn dirty_count(&self) -> usize {
211 self.cache.dirty_count()
212 }
213
214 pub fn capacity(&self) -> usize {
216 self.capacity
217 }
218
219 pub fn is_cached(&self, page_id: PageId) -> bool {
221 let offset = page_offset(page_id);
222 self.cache.contains(offset)
223 }
224
225 pub fn clear(&mut self) {
227 self.cache.clear();
228 }
229}
230
231#[cfg(test)]
232mod tests {
233 use super::*;
234 use citadel_core::types::PageType;
235 use citadel_core::types::TxnId;
236 use citadel_crypto::hkdf_utils::derive_keys_from_rek;
237
238 struct MockIO {
239 pages: std::sync::Mutex<std::collections::HashMap<u64, [u8; PAGE_SIZE]>>,
240 }
241
242 impl MockIO {
243 fn new() -> Self {
244 Self {
245 pages: std::sync::Mutex::new(std::collections::HashMap::new()),
246 }
247 }
248 }
249
250 impl PageIO for MockIO {
251 fn read_page(&self, offset: u64, buf: &mut [u8; PAGE_SIZE]) -> Result<()> {
252 let pages = self.pages.lock().unwrap();
253 if let Some(data) = pages.get(&offset) {
254 buf.copy_from_slice(data);
255 Ok(())
256 } else {
257 Err(Error::Io(std::io::Error::new(
258 std::io::ErrorKind::NotFound,
259 format!("no page at offset {offset}"),
260 )))
261 }
262 }
263
264 fn write_page(&self, offset: u64, buf: &[u8; PAGE_SIZE]) -> Result<()> {
265 self.pages.lock().unwrap().insert(offset, *buf);
266 Ok(())
267 }
268
269 fn read_at(&self, _offset: u64, _buf: &mut [u8]) -> Result<()> {
270 Ok(())
271 }
272 fn write_at(&self, _offset: u64, _buf: &[u8]) -> Result<()> {
273 Ok(())
274 }
275 fn fsync(&self) -> Result<()> {
276 Ok(())
277 }
278 fn file_size(&self) -> Result<u64> {
279 Ok(0)
280 }
281 fn truncate(&self, _size: u64) -> Result<()> {
282 Ok(())
283 }
284 }
285
286 fn test_keys() -> ([u8; DEK_SIZE], [u8; MAC_KEY_SIZE]) {
287 let rek = [0x42u8; 32];
288 let keys = derive_keys_from_rek(&rek);
289 (keys.dek, keys.mac_key)
290 }
291
292 fn write_encrypted_page(
293 io: &MockIO,
294 page: &Page,
295 dek: &[u8; DEK_SIZE],
296 mac_key: &[u8; MAC_KEY_SIZE],
297 epoch: u32,
298 ) {
299 let page_id = page.page_id();
300 let offset = page_offset(page_id);
301 let mut encrypted = [0u8; PAGE_SIZE];
302 page_cipher::encrypt_page(
303 dek,
304 mac_key,
305 page_id,
306 epoch,
307 page.as_bytes(),
308 &mut encrypted,
309 );
310 io.write_page(offset, &encrypted).unwrap();
311 }
312
313 #[test]
314 fn fetch_reads_and_caches() {
315 let (dek, mac_key) = test_keys();
316 let io = MockIO::new();
317 let epoch = 1;
318
319 let mut page = Page::new(PageId(0), PageType::Leaf, TxnId(1));
320 page.update_checksum();
321 write_encrypted_page(&io, &page, &dek, &mac_key, epoch);
322
323 let mut pool = BufferPool::new(16);
324 let fetched = pool.fetch(&io, PageId(0), &dek, &mac_key, epoch).unwrap();
325 assert_eq!(fetched.page_id(), PageId(0));
326 assert!(pool.is_cached(PageId(0)));
327 }
328
329 #[test]
330 fn fetch_from_cache_on_second_call() {
331 let (dek, mac_key) = test_keys();
332 let io = MockIO::new();
333 let epoch = 1;
334
335 let mut page = Page::new(PageId(0), PageType::Leaf, TxnId(1));
336 page.update_checksum();
337 write_encrypted_page(&io, &page, &dek, &mac_key, epoch);
338
339 let mut pool = BufferPool::new(16);
340 pool.fetch(&io, PageId(0), &dek, &mac_key, epoch).unwrap();
341
342 io.pages.lock().unwrap().clear();
344 let fetched = pool.fetch(&io, PageId(0), &dek, &mac_key, epoch).unwrap();
345 assert_eq!(fetched.page_id(), PageId(0));
346 }
347
348 #[test]
349 fn tampered_page_detected_on_fetch() {
350 let (dek, mac_key) = test_keys();
351 let io = MockIO::new();
352 let epoch = 1;
353
354 let mut page = Page::new(PageId(0), PageType::Leaf, TxnId(1));
355 page.update_checksum();
356 write_encrypted_page(&io, &page, &dek, &mac_key, epoch);
357
358 let offset = page_offset(PageId(0));
360 {
361 let mut pages = io.pages.lock().unwrap();
362 let data = pages.get_mut(&offset).unwrap();
363 data[100] ^= 0x01;
364 }
365
366 let mut pool = BufferPool::new(16);
367 let result = pool.fetch(&io, PageId(0), &dek, &mac_key, epoch);
368 assert!(matches!(result, Err(Error::PageTampered(_))));
369 }
370
371 #[test]
372 fn dirty_pages_survive_eviction() {
373 let mut pool = BufferPool::new(3);
374
375 for i in 0..3 {
377 let mut page = Page::new(PageId(i), PageType::Leaf, TxnId(1));
378 page.update_checksum();
379 pool.insert_new(PageId(i), page).unwrap();
380 }
381
382 assert_eq!(pool.dirty_count(), 3);
383
384 pool.cache.clear_dirty(page_offset(PageId(0)));
386 pool.cache.clear_dirty(page_offset(PageId(2)));
387
388 let mut page3 = Page::new(PageId(3), PageType::Leaf, TxnId(1));
390 page3.update_checksum();
391 pool.insert_new(PageId(3), page3).unwrap();
392 assert!(pool.is_cached(PageId(1)));
394 }
395
396 #[test]
397 fn flush_dirty_writes_encrypted() {
398 let (dek, mac_key) = test_keys();
399 let io = MockIO::new();
400 let epoch = 1;
401
402 let mut pool = BufferPool::new(16);
403 let mut page = Page::new(PageId(5), PageType::Leaf, TxnId(1));
404 page.update_checksum();
405 pool.insert_new(PageId(5), page).unwrap();
406
407 assert_eq!(pool.dirty_count(), 1);
408
409 pool.flush_dirty(&io, &dek, &mac_key, epoch).unwrap();
410 assert_eq!(pool.dirty_count(), 0);
411
412 let offset = page_offset(PageId(5));
414 assert!(io.pages.lock().unwrap().contains_key(&offset));
415 }
416
417 #[test]
418 fn discard_dirty_removes_from_cache() {
419 let mut pool = BufferPool::new(16);
420 let mut page = Page::new(PageId(1), PageType::Leaf, TxnId(1));
421 page.update_checksum();
422 pool.insert_new(PageId(1), page).unwrap();
423
424 assert_eq!(pool.len(), 1);
425 pool.discard_dirty();
426 assert_eq!(pool.len(), 0);
427 }
428}