
Product
Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.
github.com/abhinavdangeti/moss
moss provides a simple, fast, persistable, ordered key-val collection implementation as a 100% golang library.
moss stands for "memory-oriented sorted segments".
Apache 2.0
import github.com/couchbase/moss
c, err := moss.NewCollection(moss.CollectionOptions{})
defer c.Close()
batch, err := c.NewBatch(0, 0)
defer batch.Close()
batch.Set([]byte("car-0"), []byte("tesla"))
batch.Set([]byte("car-1"), []byte("honda"))
err = c.ExecuteBatch(batch, moss.WriteOptions{})
ss, err := c.Snapshot()
defer ss.Close()
ropts := moss.ReadOptions{}
val0, err := ss.Get([]byte("car-0"), ropts) // val0 == []byte("tesla").
valX, err := ss.Get([]byte("car-not-there"), ropts) // valX == nil.
For persistence, you can use...
store, collection, err := moss.OpenStoreCollection(directoryPath,
moss.StoreOptions{}, moss.StorePersistOptions{})
The design is similar to a (much) simplified LSM tree, with a stack of sorted, immutable key-val arrays or "segments".
To incorporate the next Batch of key-val mutations, the incoming key-val entries are first sorted into an immutable "segment", which is then atomically pushed onto the top of the stack of segments.
For readers, a higher segment in the stack will shadow entries of the same key from lower segments.
Separately, an asynchronous goroutine (the "merger") will continuously merge N sorted segments to keep stack height low.
In the best case, a remaining, single, large sorted segment will be efficient in memory usage and efficient for binary search and range iteration.
Iterations when the stack height is > 1 are implementing using a N-way heap merge.
In this design, the stack of segments is treated as immutable via a copy-on-write approach whenever the stack needs to be "modified". So, multiple readers and writers won't block each other, and taking a Snapshot is also a similarly cheap operation by cloning the stack.
See also the DESIGN.md writeup.
NOTE: Keys in a Batch must be unique. That is, myBatch.Set("x", "foo"); myBatch.Set("x", "bar") is not supported. Applications that do not naturally meet this requirement might maintain their own map[key]val data structures to ensure this uniqueness constraint.
Max key length is 2^24 (24 bits used to track key length).
Max val length is 2^28 (28 bits used to track val length).
Metadata overhead for each key-val operation is 16 bytes.
Read performance characterization is roughly O(log N) for key-val retrieval.
Write performance characterization is roughly O(M log M), where M is the number of mutations in a batch when invoking ExecuteBatch().
Those performance characterizations, however, don't account for background, asynchronous processing for the merging of segments and data structure maintenance.
A background merger task, for example, that is too slow can eventually stall ingest of new batches. (See the CollectionOptions settings that limit segment stack height.)
As another example, one slow reader that holds onto a Snapshot or onto an Iterator for a long time can hold onto a lot of resources. Worst case is the reader's Snapshot or Iterator may delay the reclaimation of large, old segments, where incoming mutations have obsoleted the immutable segments that the reader is still holding onto.
Please try go test -bench=.
for some basic performance tests.
Please see the CONTRIBUTING.md document.
FAQs
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.