use crate::common::{do_flush, run_query, run_query_on_row, TempDatabase}; use rand::{rng, RngCore}; use std::panic; use turso_core::Row; #[test] fn test_per_page_encryption() -> anyhow::Result<()> { let _ = env_logger::try_init(); let db_name = format!("test-{}.db", rng().next_u32()); let tmp_db = TempDatabase::new(&db_name, false); let db_path = tmp_db.path.clone(); { let conn = tmp_db.connect_limbo(); run_query( &tmp_db, &conn, "PRAGMA hexkey = 'b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327';", )?; run_query(&tmp_db, &conn, "PRAGMA cipher = 'aegis256';")?; run_query( &tmp_db, &conn, "CREATE TABLE test (id INTEGER PRIMARY KEY, value TEXT);", )?; run_query( &tmp_db, &conn, "INSERT INTO test (value) VALUES ('Hello, World!')", )?; let mut row_count = 0; run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |row: &Row| { assert_eq!(row.get::(0).unwrap(), 1); assert_eq!(row.get::(1).unwrap(), "Hello, World!"); row_count += 1; })?; assert_eq!(row_count, 1); do_flush(&conn, &tmp_db)?; } { //test connecting to the encrypted db using correct URI let uri = format!( "file:{}?cipher=aegis256&hexkey=b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327", db_path.to_str().unwrap() ); let (_io, conn) = turso_core::Connection::from_uri(&uri, true, false, false, false)?; let mut row_count = 0; run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |row: &Row| { assert_eq!(row.get::(0).unwrap(), 1); assert_eq!(row.get::(1).unwrap(), "Hello, World!"); row_count += 1; })?; assert_eq!(row_count, 1); } { //Try to create a table after reopening the encrypted db. let uri = format!( "file:{}?cipher=aegis256&hexkey=b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327", db_path.to_str().unwrap() ); let (_io, conn) = turso_core::Connection::from_uri(&uri, true, false, false, false)?; run_query( &tmp_db, &conn, "CREATE TABLE test1 (id INTEGER PRIMARY KEY, value TEXT);", )?; do_flush(&conn, &tmp_db)?; } { //Try to create a table after reopening the encrypted db. let uri = format!( "file:{}?cipher=aegis256&hexkey=b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327", db_path.to_str().unwrap() ); let (_io, conn) = turso_core::Connection::from_uri(&uri, true, false, false, false)?; run_query( &tmp_db, &conn, "INSERT INTO test1 (value) VALUES ('Hello, World!')", )?; let mut row_count = 0; run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |row: &Row| { assert_eq!(row.get::(0).unwrap(), 1); assert_eq!(row.get::(1).unwrap(), "Hello, World!"); row_count += 1; })?; assert_eq!(row_count, 1); do_flush(&conn, &tmp_db)?; } { // test connecting to encrypted db using wrong key(key is ending with 77.The correct key is ending with 27).This should panic. let uri = format!( "file:{}?cipher=aegis256&hexkey=b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76377", db_path.to_str().unwrap() ); let (_io, conn) = turso_core::Connection::from_uri(&uri, true, false, false, false)?; let should_panic = panic::catch_unwind(panic::AssertUnwindSafe(|| { run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |_row: &Row| {}).unwrap(); })); assert!( should_panic.is_err(), "should panic when accessing encrypted DB with wrong key" ); } { //test connecting to encrypted db using insufficient encryption parameters in URI.This should panic. let uri = format!("file:{}?cipher=aegis256", db_path.to_str().unwrap()); let should_panic = panic::catch_unwind(panic::AssertUnwindSafe(|| { turso_core::Connection::from_uri(&uri, true, false, false, false).unwrap(); })); assert!( should_panic.is_err(), "should panic when accessing encrypted DB without passing hexkey in URI" ); } { let uri = format!( "file:{}?hexkey=b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327", db_path.to_str().unwrap() ); let should_panic = panic::catch_unwind(panic::AssertUnwindSafe(|| { turso_core::Connection::from_uri(&uri, true, false, false, false).unwrap(); })); assert!( should_panic.is_err(), "should panic when accessing encrypted DB without passing cipher in URI" ); } { // Testing connecting to db without using URI.This should panic. let conn = tmp_db.connect_limbo(); let should_panic = panic::catch_unwind(panic::AssertUnwindSafe(|| { run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |_row: &Row| {}).unwrap(); })); assert!( should_panic.is_err(), "should panic when accessing encrypted DB without using URI" ); } Ok(()) } #[test] fn test_non_4k_page_size_encryption() -> anyhow::Result<()> { let _ = env_logger::try_init(); let db_name = format!("test-8k-{}.db", rng().next_u32()); let tmp_db = TempDatabase::new(&db_name, false); let db_path = tmp_db.path.clone(); { let conn = tmp_db.connect_limbo(); // Set page size to 8k (8192 bytes) and test encryption. Default page size is 4k. run_query(&tmp_db, &conn, "PRAGMA page_size = 8192;")?; run_query( &tmp_db, &conn, "PRAGMA hexkey = 'b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327';", )?; run_query(&tmp_db, &conn, "PRAGMA cipher = 'aegis256';")?; run_query( &tmp_db, &conn, "CREATE TABLE test (id INTEGER PRIMARY KEY, value TEXT);", )?; run_query( &tmp_db, &conn, "INSERT INTO test (value) VALUES ('Hello, World!')", )?; let mut row_count = 0; run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |row: &Row| { assert_eq!(row.get::(0).unwrap(), 1); assert_eq!(row.get::(1).unwrap(), "Hello, World!"); row_count += 1; })?; assert_eq!(row_count, 1); do_flush(&conn, &tmp_db)?; } { // Reopen the existing db with 8k page size and test encryption let uri = format!( "file:{}?cipher=aegis256&hexkey=b1bbfda4f589dc9daaf004fe21111e00dc00c98237102f5c7002a5669fc76327", db_path.to_str().unwrap() ); let (_io, conn) = turso_core::Connection::from_uri(&uri, true, false, false, false)?; run_query_on_row(&tmp_db, &conn, "SELECT * FROM test", |row: &Row| { assert_eq!(row.get::(0).unwrap(), 1); assert_eq!(row.get::(1).unwrap(), "Hello, World!"); })?; } Ok(()) }