No project description provided
Project description
rBloom
A fast, simple and lightweight
Bloom filter library for
Python, fully implemented in Rust. It's designed to be as pythonic as
possible, mimicking the built-in set
type where it can. While it's a new
kid on the block (this project was started in 2023), it's also currently
the fastest kid on the block by a long shot (see the section
Benchmarks). Releases are published on
PyPI.
Quickstart
This library defines only one class, which can be used as follows:
>>> from rbloom import Bloom
>>> bf = Bloom(200, 0.01) # 200 items max, false positive rate of 1%
>>> bf.add("hello")
>>> "hello" in bf
True
>>> "world" in bf
False
>>> bf.update(["hello", "world"]) # "hello" and "world" now in bf
>>> other_bf = Bloom(200, 0.01)
### add some items to other_bf
>>> third_bf = bf | other_bf # third_bf now contains all items in
# bf and other_bf
>>> third_bf = bf.copy()
... third_bf.update(other_bf) # same as above
Unlike BF's in real life, you can have as many of these as you want, and they all work well together!
For the full API, see the section Documentation.
Installation
On almost all platforms, simply run:
pip install rbloom
If you're on an uncommon platform, this may cause pip to build the library
from source, which requires the Rust
toolchain. You can also build
rbloom
by cloning this repository and running
maturin:
maturin build --release
This will create a wheel in the target/wheels/
directory, which can
subsequently also be passed to pip.
Why rBloom?
Why should you use this library instead of one of the other Bloom filter libraries on PyPI?
- Simple: Almost all important methods work exactly like their
counterparts in the built-in
set
type. - Fast:
rbloom
is implemented in Rust, which makes it blazingly fast. See section Benchmarks for more information. - Lightweight:
rbloom
has no dependencies of its own. - Maintainable: The entire library fits comfortably in
a few hundred lines of code, and it's written in idiomatic Rust. Even
if I were to stop maintaining
rbloom
(which I don't intend to), it would be trivially easy for you to fork it and keep it working for you.
I started rbloom
because I was looking for a simple Bloom filter
dependency for a project, but the pure Python implementations were too
slow. The only maintained fast alternative I could find,
pybloomfiltermmap3
(which is written in C and is a great
library), failed to work on recent versions of Python (see below),
so I felt very uncomfortable using it as a dependency. I also felt like
the thousands of lines of code in that library were a bit hard to
handle should it stop being maintained (which is what happened to the
original pybloomfiltermmap
). However, please note that
pybloomfiltermmap3
implements persistent filters, while rbloom
currently does not, so if that's something you require, you should
definitely give that library a try.
Benchmarks
I implemented the following simple benchmark in the respective API of each library:
bf = Bloom(10_000_000, 0.01)
for i in range(10_000_000):
bf.add(i + 0.5) # floats because ints are hashed as themselves
for i in range(10_000_000):
assert i + 0.5 in bf
This resulted in the following runtimes:
Library | Time | Notes |
---|---|---|
rBloom | 5.956s | works out-of-the-box |
pybloomfiltermmap3 | 11.280s | surprisingly hard to get working [1] |
pybloom3 | 75.871s | works out-of-the-box |
Flor | 128.837s | doesn't work on arbitrary objects [2] |
bloom-filter2 | 325.044s | doesn't work on arbitrary objects [2] |
[1] It refused to install on Python 3.11 and kept segfaulting on 3.10, so I
installed 3.7 on my machine for this benchmark.
[2] I tested both converting to bytes and pickling, and chose the faster time.
The benchmark was run on a 2019 Dell XPS 15 7590 with an Intel Core i5-9300H. It was run 5 times for each library, and the average time was used.
Also note that rbloom
is compiled against a stable ABI for
portability, and that you can get a small but measurable speedup by
removing the "abi3-py37"
flag from Cargo.toml
and building
it yourself.
Documentation
This library defines only one class, the signature of which should be thought of as:
class Bloom:
# expected_items: max number of items to be added to the filter
# false_positive_rate: max false positive rate of the filter
# hash_func: optional argument, see section "Cryptographic security"
def __init__(self, expected_items: int, false_positive_rate: float,
hash_func=__builtins__.hash)
@property
def size_in_bits(self) -> int # number of buckets in the filter
@property
def hash_func(self) -> Callable[[Any], int] # retrieve the hash_func
# given to __init__
@property
def approx_items(self) -> float # estimated number of items in
# the filter
# all subsequent methods are
# -------- equivalent to the corresponding methods ---------
# of the built-in set type
def add(self, object)
def __contains__(self, object) -> bool # object in self
def __bool__(self) -> bool # False if empty
def __repr__(self) -> str # Basic info
def __or__(self, other: Bloom) -> Bloom # self | other
def __ior__(self, other: Bloom) # self |= other
def __and__(self, other: Bloom) -> Bloom # self & other
def __iand__(self, other: Bloom) # self &= other
def update(self, *others: Union[Iterable, Bloom])
def intersection_update(self, *others: Union[Iterable, Bloom])
def clear(self) # remove all items
def copy(self) -> Bloom
To prevent death and destruction, the bitwise set operations only work on
filters where all parameters are equal (including the hash functions being
the exact same object). Because this is a Bloom filter, the __contains__
and approx_items
methods are probabilistic.
Cryptographic security
Python's built-in hash function is designed to be fast, not maximally collision-resistant, so if your program depends on the false positive rate being perfectly correct, you may want to supply your own hash function. This is especially the case when working with very large filters (more than a few tens of millions of items) or when false positives are very costly and could be exploited by an adversary. Just make sure that your hash function returns an integer between -2^127 and 2^127 - 1. Feel free to use the following example in your own code:
from rbloom import Bloom
from hashlib import sha256
from pickle import dumps
def hash_func(obj):
h = sha256(dumps(obj)).digest()
return int.from_bytes(h[:16], "big") - 2**127
bf = Bloom(100_000_000, 0.01, hash_func=hash_func)
When you throw away Python's built-in hash function and start hashing serialized representations of objects, however, you open up a breach into the scary realm of the unpythonic:
- Numbers like
2
,2.0
and2 + 0j
will suddenly no longer be equal. - Instances of classes with custom hashing logic (e.g. to stop caches inside instances from affecting their hashes) will suddenly display undefined behavior.
- Objects that can't be serialized simply won't be hashable at all.
Making you supply your own hash function in this case is a deliberate design decision intended to show you what you're doing and prevent you from shooting yourself in the foot.
This implementation of a Bloom filter doesn't use multiple hash functions, but instead works by redistributing the entropy of a single hash over multiple integers by using the single hash as the seed of a simple linear congruential generator (LCG). Those integers are then used as indexes for the bit array that makes up the filter. The constant used for the LCG is one proposed by (L'Ecuyer, 1999).
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distributions
Hashes for rbloom-1.1.0-cp37-abi3-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ff7f6efe1abb6818f45f9782ea1d8e93c0eea6acafc118976e04ea144161f990 |
|
MD5 | 8206cac8a1cf0fcea7b946587979287f |
|
BLAKE2b-256 | 7d2590f3d6ddaa7ef87c568f292d76a0edc2fdec1ee4a32779b8016dca0335bc |
Hashes for rbloom-1.1.0-cp37-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 678d10e62ebb18e20846f887dd98c2125d89b3afec8c53393f3f07c1f144c171 |
|
MD5 | c994ce8c29923b5cbf19228ccb655e29 |
|
BLAKE2b-256 | 6eb98f3486f37772662c1af99dbfbc825f67dfd1c250112f6b5fa5fcbc234645 |
Hashes for rbloom-1.1.0-cp37-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 4611f6d1861df39d90eeafd1b69381ed26d549c84001c51e3ca2899b17be53d2 |
|
MD5 | ddeccb4574a82c9a8857c4f2386642f0 |
|
BLAKE2b-256 | 15ba5fa1e6dcb8b0e4523dd28ef11db10708810fbdb0fc981d3d3d4e9356ac68 |
Hashes for rbloom-1.1.0-cp37-abi3-manylinux_2_5_i686.manylinux1_i686.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 51ac3da4e7d0b212a6b50630b8e784d62a086912bdaf4a47dc95e6fb54138e5a |
|
MD5 | 4250e4757ca7548b43176a116afcf1e1 |
|
BLAKE2b-256 | 681793a1c96a5e88ed012df9d3f93560f6887c1258af8030e09c0f4cc0a0e65b |
Hashes for rbloom-1.1.0-cp37-abi3-macosx_10_9_x86_64.macosx_11_0_arm64.macosx_10_9_universal2.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 213d54966184c76942f1db1ac5fdff861d1527cd4caca4bf3804de99e7474c6b |
|
MD5 | 7fe6e191ee24911ce441df222275fab0 |
|
BLAKE2b-256 | 34051a1221bf1b6d132f075ed0dfd2652ca311ff5fea21270eec8e7bddbfef7c |