Rust implementation of NextGraph, a Decentralized and local-first web 3.0 ecosystem https://nextgraph.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
nextgraph-rs/ng-verifier/src/types.rs

235 lines
6.9 KiB

// Copyright (c) 2022-2024 Niko Bonnieure, Par le Peuple, NextGraph.org developers
// All rights reserved.
// Licensed under the Apache License, Version 2.0
// <LICENSE-APACHE2 or http://www.apache.org/licenses/LICENSE-2.0>
// or the MIT license <LICENSE-MIT or http://opensource.org/licenses/MIT>,
// at your option. All files in the project carrying such
// notice may not be copied, modified, or distributed except
// according to those terms.
//! Types for Verifier
use core::fmt;
use std::path::PathBuf;
use serde::{Deserialize, Serialize};
//use oxigraph::io::{RdfFormat, RdfParser, RdfSerializer};
//use oxigraph::store::Store;
//use oxigraph::model::GroundQuad;
//use yrs::{StateVector, Update};
use ng_repo::{errors::*, types::*};
use ng_net::types::*;
#[doc(hidden)]
#[derive(Clone, Debug, Serialize, Deserialize)]
pub enum SessionPeerLastSeq {
V0(u64),
V1((u64, Sig)),
}
impl SessionPeerLastSeq {
pub fn ser(&self) -> Result<Vec<u8>, NgError> {
Ok(serde_bare::to_vec(self)?)
}
pub fn deser(ser: &[u8]) -> Result<Self, NgError> {
Ok(serde_bare::from_slice(ser).map_err(|_| NgError::SerializationError)?)
}
}
#[derive(Debug, Clone, PartialEq, Eq)]
pub enum VerifierType {
/// nothing will be saved on disk during the session
Memory,
/// will save all user data locally, with RocksDb backend on native, and on webapp, will save only the session and wallet, not the data itself
Save,
/// the verifier will be remote. a Noise connection will be opened
/// optional peerId to connect to. If None, will try any that has the flag `can_verify`
Remote(Option<PubKey>),
/// IndexedDb based rocksdb compiled to WASM... not ready yet. obviously. only works in the browser
WebRocksDb,
// Server, this type is for Server Broker that act as verifier. They answer to VerifierType::Remote types of verifier. deprecated
}
impl VerifierType {
pub fn is_memory(&self) -> bool {
match self {
Self::Memory => true,
_ => false,
}
}
pub fn is_persistent(&self) -> bool {
match self {
Self::Save => true,
_ => false,
}
}
pub fn is_remote(&self) -> bool {
match self {
Self::Remote(_) => true,
_ => false,
}
}
}
#[doc(hidden)]
//type LastSeqFn = fn(peer_id: PubKey, qty: u16) -> Result<u64, NgError>;
pub type LastSeqFn = dyn Fn(PubKey, u16) -> Result<u64, NgError> + 'static + Sync + Send;
#[doc(hidden)]
// peer_id: PubKey, seq_num:u64, event_ser: vec<u8>,
pub type OutboxWriteFn =
dyn Fn(PubKey, u64, Vec<u8>) -> Result<(), NgError> + 'static + Sync + Send;
#[doc(hidden)]
// peer_id: PubKey,
pub type OutboxReadFn = dyn Fn(PubKey) -> Result<Vec<Vec<u8>>, NgError> + 'static + Sync + Send;
#[doc(hidden)]
pub struct JsSaveSessionConfig {
pub last_seq_function: Box<LastSeqFn>,
pub outbox_write_function: Box<OutboxWriteFn>,
pub outbox_read_function: Box<OutboxReadFn>,
}
impl fmt::Debug for JsSaveSessionConfig {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
write!(f, "JsSaveSessionConfig")
}
}
#[doc(hidden)]
#[derive(Debug)]
pub enum VerifierConfigType {
/// nothing will be saved on disk during the session
Memory,
/// only the session information is saved locally. the UserStorage is not saved.
JsSaveSession(JsSaveSessionConfig),
/// will save all user data locally, with RocksDb backend
RocksDb(PathBuf),
/// the verifier will be remote. a Noise connection will be opened
/// optional peerId to connect to. If None, will try any that has the flag `can_verify`
/// // TODO: Pass the AppConfig
Remote(Option<PubKey>),
/// IndexedDb based rocksdb compiled to WASM... not ready yet. obviously. only works in the browser
WebRocksDb,
/// headless
Headless(Credentials),
}
impl VerifierConfigType {
pub(crate) fn should_load_last_seq_num(&self) -> bool {
match self {
Self::JsSaveSession(_) | Self::RocksDb(_) => true,
_ => false,
}
}
pub(crate) fn is_persistent(&self) -> bool {
match self {
Self::RocksDb(_) => true,
_ => false,
}
}
#[allow(dead_code)]
pub(crate) fn is_in_memory(&self) -> bool {
match self {
Self::Memory | Self::JsSaveSession(_) => true,
_ => false,
}
}
}
#[derive(Debug)]
pub struct VerifierConfig {
pub config_type: VerifierConfigType,
/// not used for Memory
pub user_master_key: [u8; 32],
/// not used for Memory
pub peer_priv_key: PrivKey,
pub user_priv_key: PrivKey,
pub private_store_read_cap: Option<ObjectRef>,
pub private_store_id: Option<RepoId>,
pub public_store_id: Option<RepoId>,
pub protected_store_id: Option<RepoId>,
}
#[doc(hidden)]
pub type CancelFn = Box<dyn FnOnce() + Sync + Send>;
#[doc(hidden)]
#[derive(Debug, Clone)]
pub enum BrokerPeerId {
Local(DirectPeerId),
Direct(DirectPeerId),
None,
}
impl From<&BrokerPeerId> for Option<PubKey> {
fn from(bpi: &BrokerPeerId) -> Option<PubKey> {
match bpi {
BrokerPeerId::Local(_) => None,
BrokerPeerId::Direct(d) => Some(*d),
BrokerPeerId::None => panic!("cannot connect to a broker without a peerid"),
}
}
}
impl From<BrokerPeerId> for Option<PubKey> {
fn from(bpi: BrokerPeerId) -> Option<PubKey> {
(&bpi).into()
}
}
impl BrokerPeerId {
pub fn new_direct(peer: DirectPeerId) -> Self {
Self::Direct(peer)
}
pub fn is_some(&self) -> bool {
match self {
BrokerPeerId::Local(_) | BrokerPeerId::Direct(_) => true,
_ => false,
}
}
pub fn is_none(&self) -> bool {
!self.is_some()
}
pub fn connected_or_err(&self) -> Result<Option<PubKey>, NgError> {
match self {
BrokerPeerId::None => Err(NgError::NotConnected),
_ => Ok(self.into()),
}
}
pub fn broker_peer_id(&self) -> &DirectPeerId {
match self {
BrokerPeerId::Local(p) | BrokerPeerId::Direct(p) => p,
_ => panic!("dont call broker_peer_id on a BrokerPeerId::None"),
}
}
pub fn is_local(&self) -> bool {
match self {
BrokerPeerId::Local(_) => true,
_ => false,
}
}
pub fn is_direct(&self) -> bool {
match self {
BrokerPeerId::Direct(_) => true,
_ => false,
}
}
pub fn is_direct_or_err(&self) -> Result<(), NgError> {
match self {
BrokerPeerId::Direct(_) => Ok(()),
_ => Err(NgError::NotConnected),
}
}
pub fn to_direct_if_not_local(&self, peer: DirectPeerId) -> Result<Self, VerifierError> {
match self {
BrokerPeerId::Local(_) => Err(VerifierError::LocallyConnected),
_ => Ok(BrokerPeerId::Direct(peer)),
}
}
}