use anyhow::Result;
use std::collections::HashMap;
use std::path::PathBuf;
use std::time::Instant;
use crate::cli_utils::{format_bytes, format_number, format_qps};
#[allow(clippy::too_many_arguments)]
pub fn bench_pattern_database(
count: usize,
temp_file: &PathBuf,
keep: bool,
load_iterations: usize,
query_count: usize,
hit_rate: usize,
cache_size: usize,
cache_hit_rate: usize,
pattern_style: &str,
) -> Result<()> {
use matchy::Database;
use matchy::DatabaseBuilder;
use matchy::MatchMode;
println!("--- Phase 1: Build Pattern Database ---");
let build_start = Instant::now();
let mut builder = DatabaseBuilder::new(MatchMode::CaseSensitive)
.with_database_type("Benchmark-Pattern")
.with_description("en", "Pattern database benchmark");
let empty_data = HashMap::new();
let tlds = [
"com", "net", "org", "ru", "cn", "xyz", "tk", "info", "io", "cc",
];
let malicious_words = [
"malware", "phishing", "trojan", "evil", "attack", "botnet", "spam", "scam", "fake",
"virus",
];
let domains = [
"domain", "site", "server", "host", "web", "portal", "service", "cloud", "zone", "network",
];
for i in 0..count {
let pattern = match pattern_style {
"prefix" => {
let word = malicious_words[i % malicious_words.len()];
let domain_word = domains[(i / 7) % domains.len()];
let tld = tlds[i % tlds.len()];
match i % 4 {
0 => format!("{word}-{domain_word}-*"),
1 => format!("{}-{}-{}-*", word, domain_word, i % 1000),
2 => format!("threat-{domain_word}-*.{tld}"),
_ => format!("{}{}-*", word, i % 1000),
}
}
"suffix" => {
let word = malicious_words[i % malicious_words.len()];
let domain_word = domains[(i / 7) % domains.len()];
let tld = tlds[i % tlds.len()];
match i % 4 {
0 => format!("*.{word}-{domain_word}-{i}.{tld}"),
1 => format!("*.{domain_word}{i}.{tld}"),
2 => format!("*.{word}-threat.{tld}"),
_ => format!("*.evil-{}.{}", i % 1000, tld),
}
}
"mixed" => {
let word = malicious_words[i % malicious_words.len()];
let domain_word = domains[(i / 7) % domains.len()];
let tld = tlds[i % tlds.len()];
if i % 2 == 0 {
format!("{word}-{domain_word}-*")
} else {
format!("*.{word}-{domain_word}.{tld}")
}
}
_ => {
if i % 20 == 0 {
let word = malicious_words[i % malicious_words.len()];
let tld = tlds[(i / 20) % tlds.len()];
match (i / 20) % 4 {
0 => format!("*[0-9].*.{word}-attack-{i}.{tld}"),
1 => format!("{word}-*-server[0-9][0-9].evil-{i}.{tld}"),
2 => format!("*.{word}-campaign-*-{i}.{tld}"),
_ => format!("*bad*.{word}-?.infection-{i}.{tld}"),
}
} else {
let word = malicious_words[i % malicious_words.len()];
let domain_word = domains[(i / 7) % domains.len()];
let tld = tlds[i % tlds.len()];
match i % 8 {
0 => format!("*.{word}-{domain_word}-{i}.{tld}"),
1 => format!("{word}-{domain_word}*.bad-{i}.{tld}"),
2 => format!("evil-{domain_word}-*.tracker-{i}.{tld}"),
3 => format!("*-{word}-{domain_word}.threat{i}.{tld}"),
4 => format!("suspicious-*.{domain_word}-zone-{i}.{tld}"),
5 => format!("*.{word}{i}.{domain_word}-network.{tld}"),
6 => format!("bad-{word}-{i}.*.{tld}"),
_ => format!("{word}-threat-*.{domain_word}{i}.{tld}"),
}
}
}
};
builder.add_glob(&pattern, empty_data.clone())?;
if count > 10_000 && (i + 1) % 10_000 == 0 {
println!(
" Progress: {}/{}",
format_number(i + 1),
format_number(count)
);
}
}
let db_bytes = builder.build()?;
let build_time = build_start.elapsed();
let build_rate = count as f64 / build_time.as_secs_f64();
println!(" Build time: {:.2}s", build_time.as_secs_f64());
println!(" Build rate: {} patterns/sec", format_qps(build_rate));
println!(" DB size: {}", format_bytes(db_bytes.len()));
println!();
println!("--- Phase 2: Save to Disk ---");
let save_start = Instant::now();
std::fs::write(temp_file, &db_bytes)?;
let save_time = save_start.elapsed();
println!(" Save time: {:.2}s", save_time.as_secs_f64());
drop(db_bytes);
println!();
println!("--- Phase 3: Load Database (mmap) ---");
let mut load_times = Vec::new();
for i in 1..=load_iterations {
let load_start = Instant::now();
let _db = Database::from(temp_file.to_str().unwrap()).open()?;
let load_time = load_start.elapsed();
load_times.push(load_time);
println!(
" Load #{}: {:.3}ms",
i,
load_time.as_micros() as f64 / 1000.0
);
}
let avg_load = load_times.iter().sum::<std::time::Duration>()
/ u32::try_from(load_iterations).unwrap_or(1);
println!(" Average: {:.3}ms", avg_load.as_micros() as f64 / 1000.0);
println!();
println!("--- Phase 4: Query Performance ---");
let mut opener = Database::from(temp_file.to_str().unwrap());
if cache_size == 0 {
opener = opener.no_cache();
} else {
opener = opener.cache_capacity(cache_size);
}
let db = opener.open()?;
let bench_start = Instant::now();
let mut found = 0;
let tlds = [
"com", "net", "org", "ru", "cn", "xyz", "tk", "info", "io", "cc",
];
let malicious_words = [
"malware", "phishing", "trojan", "evil", "attack", "botnet", "spam", "scam", "fake",
"virus",
];
let domains = [
"domain", "site", "server", "host", "web", "portal", "service", "cloud", "zone", "network",
];
let unique_query_count = if cache_hit_rate == 0 {
query_count } else {
let unique_pct = 100 - cache_hit_rate;
(query_count * unique_pct / 100).max(1)
};
for i in 0..query_count {
let query_id = i % unique_query_count;
let should_hit = (query_id * 100 / unique_query_count) < hit_rate;
let test_str = if should_hit {
let pattern_id = (query_id * 43) % count;
let word = malicious_words[pattern_id % malicious_words.len()];
let domain_word = domains[(pattern_id / 7) % domains.len()];
let tld = tlds[pattern_id % tlds.len()];
match pattern_style {
"prefix" => {
match pattern_id % 4 {
0 => format!("{word}-{domain_word}-suffix-{i}"),
1 => format!("{}-{}-{}-end", word, domain_word, pattern_id % 1000),
2 => format!("threat-{domain_word}-middle.{tld}"),
_ => format!("{}{}-anything", word, pattern_id % 1000),
}
}
"suffix" => {
match pattern_id % 4 {
0 => format!("prefix.{word}-{domain_word}-{pattern_id}.{tld}"),
1 => format!("subdomain.{domain_word}{pattern_id}.{tld}"),
2 => format!("any.{word}-threat.{tld}"),
_ => format!("prefix.evil-{}.{}", pattern_id % 1000, tld),
}
}
"mixed" => {
if pattern_id.is_multiple_of(2) {
format!("{word}-{domain_word}-suffix")
} else {
format!("prefix.{word}-{domain_word}.{tld}")
}
}
_ => {
if pattern_id.is_multiple_of(20) {
match (pattern_id / 20) % 4 {
0 => format!("prefix5.middle.{word}-attack-{pattern_id}.{tld}"),
1 => format!("{word}-middle-server99.evil-{pattern_id}.{tld}"),
2 => format!("prefix.{word}-campaign-middle-{pattern_id}.{tld}"),
_ => format!("firstbadsecond.{word}-x.infection-{pattern_id}.{tld}"),
}
} else {
match pattern_id % 8 {
0 => format!("prefix.{word}-{domain_word}-{pattern_id}.{tld}"),
1 => {
format!("{word}-{domain_word}middle.bad-{pattern_id}.{tld}")
}
2 => format!("evil-{domain_word}-middle.tracker-{pattern_id}.{tld}"),
3 => format!("prefix-{word}-{domain_word}.threat{pattern_id}.{tld}"),
4 => format!("suspicious-middle.{domain_word}-zone-{pattern_id}.{tld}"),
5 => format!("prefix.{word}{pattern_id}.{domain_word}-network.{tld}"),
6 => format!("bad-{word}-{pattern_id}.middle.{tld}"),
_ => format!("{word}-threat-middle.{domain_word}{pattern_id}.{tld}"),
}
}
}
}
} else {
format!("benign-clean-traffic-{query_id}.legitimate-site.com")
};
if let Some(matchy::QueryResult::Pattern { pattern_ids, .. }) = db.lookup(&test_str)? {
if !pattern_ids.is_empty() {
found += 1;
}
}
}
let bench_time = bench_start.elapsed();
let qps = query_count as f64 / bench_time.as_secs_f64();
let avg_query = bench_time / u32::try_from(query_count).unwrap_or(1);
println!(" Query count: {}", format_number(query_count));
println!(" Total time: {:.2}s", bench_time.as_secs_f64());
println!(" QPS: {} queries/sec", format_qps(qps));
println!(
" Avg latency: {:.2}µs",
avg_query.as_nanos() as f64 / 1000.0
);
println!(
" Found: {}/{}",
format_number(found),
format_number(query_count)
);
println!();
if keep {
println!("✓ Benchmark complete (file kept: {})", temp_file.display());
} else {
std::fs::remove_file(temp_file)?;
println!("✓ Benchmark complete (temp file removed)");
}
Ok(())
}