mirror of
https://gitlab.com/veilid/veilid.git
synced 2024-10-01 01:26:08 -04:00
network fixes
This commit is contained in:
parent
0fb49bf715
commit
f65400a1ce
1
Cargo.lock
generated
1
Cargo.lock
generated
@ -5872,7 +5872,6 @@ dependencies = [
|
||||
"oslog",
|
||||
"paranoid-android",
|
||||
"parking_lot 0.11.2",
|
||||
"parking_lot 0.12.1",
|
||||
"rand 0.7.3",
|
||||
"range-set-blaze",
|
||||
"rust-fsm",
|
||||
|
@ -80,7 +80,7 @@ core:
|
||||
set_value_count: 5
|
||||
set_value_fanout: 4
|
||||
min_peer_count: 20
|
||||
min_peer_refresh_time_ms: 2000
|
||||
min_peer_refresh_time_ms: 60000
|
||||
validate_dial_info_receipt_time_ms: 2000
|
||||
local_subkey_cache_size: 128
|
||||
local_max_subkey_cache_memory_mb: 256
|
||||
|
@ -247,7 +247,7 @@ dht:
|
||||
set_value_count: 5
|
||||
set_value_fanout: 4
|
||||
min_peer_count: 20
|
||||
min_peer_refresh_time_ms: 2000
|
||||
min_peer_refresh_time_ms: 60000
|
||||
validate_dial_info_receipt_time_ms: 2000
|
||||
local_subkey_cache_size: 128
|
||||
local_max_subkey_cache_memory_mb: 256
|
||||
|
@ -261,7 +261,7 @@ impl BucketEntryInner {
|
||||
// See if we have an existing signed_node_info to update or not
|
||||
let mut node_info_changed = false;
|
||||
if let Some(current_sni) = opt_current_sni {
|
||||
// Always allow overwriting invalid/unsigned node
|
||||
// Always allow overwriting unsigned node (bootstrap)
|
||||
if current_sni.has_any_signature() {
|
||||
// If the timestamp hasn't changed or is less, ignore this update
|
||||
if signed_node_info.timestamp() <= current_sni.timestamp() {
|
||||
|
@ -208,7 +208,7 @@ impl RoutingTable {
|
||||
rolling_transfers_task: TickTask::new(ROLLING_TRANSFERS_INTERVAL_SECS),
|
||||
kick_buckets_task: TickTask::new(1),
|
||||
bootstrap_task: TickTask::new(1),
|
||||
peer_minimum_refresh_task: TickTask::new_ms(c.network.dht.min_peer_refresh_time_ms),
|
||||
peer_minimum_refresh_task: TickTask::new(1),
|
||||
ping_validator_task: TickTask::new(1),
|
||||
relay_management_task: TickTask::new(RELAY_MANAGEMENT_INTERVAL_SECS),
|
||||
private_route_management_task: TickTask::new(PRIVATE_ROUTE_MANAGEMENT_INTERVAL_SECS),
|
||||
|
@ -19,12 +19,18 @@ impl RoutingTable {
|
||||
// Get counts by crypto kind
|
||||
let entry_count = self.inner.read().cached_entry_counts();
|
||||
|
||||
let min_peer_count = self.with_config(|c| c.network.dht.min_peer_count as usize);
|
||||
let (min_peer_count, min_peer_refresh_time_ms) = self.with_config(|c| {
|
||||
(
|
||||
c.network.dht.min_peer_count as usize,
|
||||
c.network.dht.min_peer_refresh_time_ms,
|
||||
)
|
||||
});
|
||||
|
||||
// For the PublicInternet routing domain, get list of all peers we know about
|
||||
// even the unreliable ones, and ask them to find nodes close to our node too
|
||||
|
||||
let mut ord = FuturesOrdered::new();
|
||||
let cur_ts = get_timestamp();
|
||||
|
||||
for crypto_kind in VALID_CRYPTO_KINDS {
|
||||
// Do we need to peer minimum refresh this crypto kind?
|
||||
@ -37,16 +43,26 @@ impl RoutingTable {
|
||||
}
|
||||
|
||||
let routing_table = self.clone();
|
||||
|
||||
let mut filters = VecDeque::new();
|
||||
let filter = Box::new(
|
||||
move |_rti: &RoutingTableInner, opt_entry: Option<Arc<BucketEntry>>| {
|
||||
move |rti: &RoutingTableInner, opt_entry: Option<Arc<BucketEntry>>| {
|
||||
let entry = opt_entry.unwrap().clone();
|
||||
entry.with(rti, |_rti, e| {
|
||||
// Keep only the entries that contain the crypto kind we're looking for
|
||||
if let Some(entry) = opt_entry {
|
||||
entry.with_inner(|e| e.crypto_kinds().contains(&crypto_kind))
|
||||
} else {
|
||||
VALID_CRYPTO_KINDS.contains(&crypto_kind)
|
||||
let compatible_crypto = e.crypto_kinds().contains(&crypto_kind);
|
||||
if !compatible_crypto {
|
||||
return false;
|
||||
}
|
||||
// Keep only the entries we haven't talked to in the min_peer_refresh_time
|
||||
if let Some(last_q_ts) = e.peer_stats().rpc_stats.last_question_ts {
|
||||
if cur_ts.saturating_sub(last_q_ts.as_u64())
|
||||
< (min_peer_refresh_time_ms as u64 * 1_000u64)
|
||||
{
|
||||
return false;
|
||||
}
|
||||
}
|
||||
true
|
||||
})
|
||||
},
|
||||
) as RoutingTableEntryFilter;
|
||||
filters.push_front(filter);
|
||||
|
@ -324,10 +324,13 @@ impl RPCProcessor {
|
||||
let timeout_us = TimestampDuration::new(ms_to_us(c.network.rpc.timeout_ms));
|
||||
let max_route_hop_count = c.network.rpc.max_route_hop_count as usize;
|
||||
if concurrency == 0 {
|
||||
concurrency = get_concurrency() / 2;
|
||||
concurrency = get_concurrency();
|
||||
if concurrency == 0 {
|
||||
concurrency = 1;
|
||||
}
|
||||
|
||||
// Default RPC concurrency is the number of CPUs * 16 rpc workers per core, as a single worker takes about 1% CPU when relaying and 16% is reasonable for baseline plus relay
|
||||
concurrency *= 16;
|
||||
}
|
||||
let validate_dial_info_receipt_time_ms = c.network.dht.validate_dial_info_receipt_time_ms;
|
||||
|
||||
|
@ -217,7 +217,7 @@ fn config_callback(key: String) -> ConfigCallbackReturn {
|
||||
"network.dht.set_value_count" => Ok(Box::new(5u32)),
|
||||
"network.dht.set_value_fanout" => Ok(Box::new(4u32)),
|
||||
"network.dht.min_peer_count" => Ok(Box::new(20u32)),
|
||||
"network.dht.min_peer_refresh_time_ms" => Ok(Box::new(2_000u32)),
|
||||
"network.dht.min_peer_refresh_time_ms" => Ok(Box::new(60_000u32)),
|
||||
"network.dht.validate_dial_info_receipt_time_ms" => Ok(Box::new(5_000u32)),
|
||||
"network.dht.local_subkey_cache_size" => Ok(Box::new(128u32)),
|
||||
"network.dht.local_max_subkey_cache_memory_mb" => Ok(Box::new(256u32)),
|
||||
@ -345,7 +345,7 @@ pub async fn test_config() {
|
||||
assert_eq!(inner.network.dht.set_value_count, 5u32);
|
||||
assert_eq!(inner.network.dht.set_value_fanout, 4u32);
|
||||
assert_eq!(inner.network.dht.min_peer_count, 20u32);
|
||||
assert_eq!(inner.network.dht.min_peer_refresh_time_ms, 2_000u32);
|
||||
assert_eq!(inner.network.dht.min_peer_refresh_time_ms, 60_000u32);
|
||||
assert_eq!(
|
||||
inner.network.dht.validate_dial_info_receipt_time_ms,
|
||||
5_000u32
|
||||
|
@ -118,7 +118,7 @@ Future<VeilidConfig> getDefaultVeilidConfig(String programName) async {
|
||||
setValueCount: 20,
|
||||
setValueFanout: 5,
|
||||
minPeerCount: 20,
|
||||
minPeerRefreshTimeMs: 2000,
|
||||
minPeerRefreshTimeMs: 60000,
|
||||
validateDialInfoReceiptTimeMs: 2000,
|
||||
localSubkeyCacheSize: getLocalSubkeyCacheSize(),
|
||||
localMaxSubkeyCacheMemoryMb: getLocalMaxSubkeyCacheMemoryMb(),
|
||||
|
@ -226,6 +226,8 @@ class RouteBlob with _$RouteBlob {
|
||||
/// VeilidRoutingContext
|
||||
|
||||
abstract class VeilidRoutingContext {
|
||||
void close();
|
||||
|
||||
// Modifiers
|
||||
VeilidRoutingContext withPrivacy();
|
||||
VeilidRoutingContext withCustomPrivacy(SafetySelection safetySelection);
|
||||
|
@ -176,10 +176,18 @@ abstract class VeilidCryptoSystem {
|
||||
Future<HashDigest> generateHash(Uint8List data);
|
||||
//Future<HashDigest> generateHashReader(Stream<List<int>> reader);
|
||||
Future<bool> validateKeyPair(PublicKey key, SecretKey secret);
|
||||
Future<bool> validateKeyPairWithKeyPair(KeyPair keyPair) {
|
||||
return validateKeyPair(keyPair.key, keyPair.secret);
|
||||
}
|
||||
|
||||
Future<bool> validateHash(Uint8List data, HashDigest hash);
|
||||
//Future<bool> validateHashReader(Stream<List<int>> reader, HashDigest hash);
|
||||
Future<CryptoKeyDistance> distance(CryptoKey key1, CryptoKey key2);
|
||||
Future<Signature> sign(PublicKey key, SecretKey secret, Uint8List data);
|
||||
Future<Signature> signWithKeyPair(KeyPair keyPair, Uint8List data) {
|
||||
return sign(keyPair.key, keyPair.secret, data);
|
||||
}
|
||||
|
||||
Future<void> verify(PublicKey key, Uint8List data, Signature signature);
|
||||
Future<int> aeadOverhead();
|
||||
Future<Uint8List> decryptAead(Uint8List body, Nonce nonce,
|
||||
|
@ -536,7 +536,7 @@ Stream<T> processStreamJson<T>(
|
||||
case messageStreamItemJson:
|
||||
{
|
||||
if (list[1] == null) {
|
||||
throw VeilidAPIExceptionInternal(
|
||||
throw const VeilidAPIExceptionInternal(
|
||||
"Null MESSAGE_STREAM_ITEM_JSON value");
|
||||
}
|
||||
var ret = jsonDecode(list[1] as String);
|
||||
@ -573,49 +573,70 @@ Stream<T> processStreamJson<T>(
|
||||
}
|
||||
|
||||
class _Ctx {
|
||||
final int id;
|
||||
int? id;
|
||||
final VeilidFFI ffi;
|
||||
_Ctx(this.id, this.ffi);
|
||||
_Ctx(int this.id, this.ffi);
|
||||
|
||||
void ensureValid() {
|
||||
if (id == null) {
|
||||
throw VeilidAPIExceptionNotInitialized();
|
||||
}
|
||||
}
|
||||
|
||||
void close() {
|
||||
if (id != null) {
|
||||
ffi._releaseRoutingContext(id!);
|
||||
id = null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// FFI implementation of VeilidRoutingContext
|
||||
class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
class VeilidRoutingContextFFI extends VeilidRoutingContext {
|
||||
final _Ctx _ctx;
|
||||
static final Finalizer<_Ctx> _finalizer =
|
||||
Finalizer((ctx) => ctx.ffi._releaseRoutingContext(ctx.id));
|
||||
static final Finalizer<_Ctx> _finalizer = Finalizer((ctx) => ctx.close());
|
||||
|
||||
VeilidRoutingContextFFI._(this._ctx) {
|
||||
_finalizer.attach(this, _ctx, detach: this);
|
||||
}
|
||||
|
||||
@override
|
||||
void close() {
|
||||
_ctx.close();
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidRoutingContextFFI withPrivacy() {
|
||||
final newId = _ctx.ffi._routingContextWithPrivacy(_ctx.id);
|
||||
_ctx.ensureValid();
|
||||
final newId = _ctx.ffi._routingContextWithPrivacy(_ctx.id!);
|
||||
return VeilidRoutingContextFFI._(_Ctx(newId, _ctx.ffi));
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidRoutingContextFFI withCustomPrivacy(SafetySelection safetySelection) {
|
||||
_ctx.ensureValid();
|
||||
final newId = _ctx.ffi._routingContextWithCustomPrivacy(
|
||||
_ctx.id, jsonEncode(safetySelection).toNativeUtf8());
|
||||
_ctx.id!, jsonEncode(safetySelection).toNativeUtf8());
|
||||
return VeilidRoutingContextFFI._(_Ctx(newId, _ctx.ffi));
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidRoutingContextFFI withSequencing(Sequencing sequencing) {
|
||||
_ctx.ensureValid();
|
||||
final newId = _ctx.ffi._routingContextWithSequencing(
|
||||
_ctx.id, jsonEncode(sequencing).toNativeUtf8());
|
||||
_ctx.id!, jsonEncode(sequencing).toNativeUtf8());
|
||||
return VeilidRoutingContextFFI._(_Ctx(newId, _ctx.ffi));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<Uint8List> appCall(String target, Uint8List request) async {
|
||||
_ctx.ensureValid();
|
||||
var nativeEncodedTarget = target.toNativeUtf8();
|
||||
var nativeEncodedRequest = base64UrlNoPadEncode(request).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("routing_context_app_call");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextAppCall(sendPort.nativePort, _ctx.id,
|
||||
_ctx.ffi._routingContextAppCall(sendPort.nativePort, _ctx.id!,
|
||||
nativeEncodedTarget, nativeEncodedRequest);
|
||||
final out = await processFuturePlain(recvPort.first);
|
||||
return base64UrlNoPadDecode(out);
|
||||
@ -623,12 +644,13 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
|
||||
@override
|
||||
Future<void> appMessage(String target, Uint8List message) {
|
||||
_ctx.ensureValid();
|
||||
final nativeEncodedTarget = target.toNativeUtf8();
|
||||
final nativeEncodedMessage = base64UrlNoPadEncode(message).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("routing_context_app_message");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextAppMessage(sendPort.nativePort, _ctx.id,
|
||||
_ctx.ffi._routingContextAppMessage(sendPort.nativePort, _ctx.id!,
|
||||
nativeEncodedTarget, nativeEncodedMessage);
|
||||
return processFutureVoid(recvPort.first);
|
||||
}
|
||||
@ -636,11 +658,12 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
@override
|
||||
Future<DHTRecordDescriptor> createDHTRecord(DHTSchema schema,
|
||||
{CryptoKind kind = 0}) async {
|
||||
_ctx.ensureValid();
|
||||
final nativeSchema = jsonEncode(schema).toNativeUtf8();
|
||||
final recvPort = ReceivePort("routing_context_create_dht_record");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextCreateDHTRecord(
|
||||
sendPort.nativePort, _ctx.id, nativeSchema, kind);
|
||||
sendPort.nativePort, _ctx.id!, nativeSchema, kind);
|
||||
final dhtRecordDescriptor =
|
||||
await processFutureJson(DHTRecordDescriptor.fromJson, recvPort.first);
|
||||
return dhtRecordDescriptor;
|
||||
@ -649,13 +672,14 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
@override
|
||||
Future<DHTRecordDescriptor> openDHTRecord(
|
||||
TypedKey key, KeyPair? writer) async {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final nativeWriter =
|
||||
writer != null ? jsonEncode(key).toNativeUtf8() : nullptr;
|
||||
final recvPort = ReceivePort("routing_context_open_dht_record");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextOpenDHTRecord(
|
||||
sendPort.nativePort, _ctx.id, nativeKey, nativeWriter);
|
||||
sendPort.nativePort, _ctx.id!, nativeKey, nativeWriter);
|
||||
final dhtRecordDescriptor =
|
||||
await processFutureJson(DHTRecordDescriptor.fromJson, recvPort.first);
|
||||
return dhtRecordDescriptor;
|
||||
@ -663,32 +687,35 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
|
||||
@override
|
||||
Future<void> closeDHTRecord(TypedKey key) {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final recvPort = ReceivePort("routing_context_close_dht_record");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi
|
||||
._routingContextCloseDHTRecord(sendPort.nativePort, _ctx.id, nativeKey);
|
||||
_ctx.ffi._routingContextCloseDHTRecord(
|
||||
sendPort.nativePort, _ctx.id!, nativeKey);
|
||||
return processFutureVoid(recvPort.first);
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> deleteDHTRecord(TypedKey key) {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final recvPort = ReceivePort("routing_context_delete_dht_record");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextDeleteDHTRecord(
|
||||
sendPort.nativePort, _ctx.id, nativeKey);
|
||||
sendPort.nativePort, _ctx.id!, nativeKey);
|
||||
return processFutureVoid(recvPort.first);
|
||||
}
|
||||
|
||||
@override
|
||||
Future<ValueData?> getDHTValue(
|
||||
TypedKey key, int subkey, bool forceRefresh) async {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final recvPort = ReceivePort("routing_context_get_dht_value");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextGetDHTValue(
|
||||
sendPort.nativePort, _ctx.id, nativeKey, subkey, forceRefresh);
|
||||
sendPort.nativePort, _ctx.id!, nativeKey, subkey, forceRefresh);
|
||||
final valueData = await processFutureJson(
|
||||
optFromJson(ValueData.fromJson), recvPort.first);
|
||||
return valueData;
|
||||
@ -697,13 +724,14 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
@override
|
||||
Future<ValueData?> setDHTValue(
|
||||
TypedKey key, int subkey, Uint8List data) async {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final nativeData = base64UrlNoPadEncode(data).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("routing_context_set_dht_value");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextSetDHTValue(
|
||||
sendPort.nativePort, _ctx.id, nativeKey, subkey, nativeData);
|
||||
sendPort.nativePort, _ctx.id!, nativeKey, subkey, nativeData);
|
||||
final valueData = await processFutureJson(
|
||||
optFromJson(ValueData.fromJson), recvPort.first);
|
||||
return valueData;
|
||||
@ -712,13 +740,14 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
@override
|
||||
Future<Timestamp> watchDHTValues(TypedKey key, List<ValueSubkeyRange> subkeys,
|
||||
Timestamp expiration, int count) async {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final nativeSubkeys = jsonEncode(subkeys).toNativeUtf8();
|
||||
final nativeExpiration = expiration.value.toInt();
|
||||
|
||||
final recvPort = ReceivePort("routing_context_watch_dht_values");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextWatchDHTValues(sendPort.nativePort, _ctx.id,
|
||||
_ctx.ffi._routingContextWatchDHTValues(sendPort.nativePort, _ctx.id!,
|
||||
nativeKey, nativeSubkeys, nativeExpiration, count);
|
||||
final actualExpiration = Timestamp(
|
||||
value: BigInt.from(await processFuturePlain<int>(recvPort.first)));
|
||||
@ -728,60 +757,82 @@ class VeilidRoutingContextFFI implements VeilidRoutingContext {
|
||||
@override
|
||||
Future<bool> cancelDHTWatch(
|
||||
TypedKey key, List<ValueSubkeyRange> subkeys) async {
|
||||
_ctx.ensureValid();
|
||||
final nativeKey = jsonEncode(key).toNativeUtf8();
|
||||
final nativeSubkeys = jsonEncode(subkeys).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("routing_context_cancel_dht_watch");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_ctx.ffi._routingContextCancelDHTWatch(
|
||||
sendPort.nativePort, _ctx.id, nativeKey, nativeSubkeys);
|
||||
sendPort.nativePort, _ctx.id!, nativeKey, nativeSubkeys);
|
||||
final cancelled = await processFuturePlain<bool>(recvPort.first);
|
||||
return cancelled;
|
||||
}
|
||||
}
|
||||
|
||||
class _TDBT {
|
||||
final int id;
|
||||
VeilidTableDBFFI tdbffi;
|
||||
VeilidFFI ffi;
|
||||
int? id;
|
||||
final VeilidTableDBFFI tdbffi;
|
||||
final VeilidFFI ffi;
|
||||
|
||||
_TDBT(this.id, this.tdbffi, this.ffi);
|
||||
_TDBT(int this.id, this.tdbffi, this.ffi);
|
||||
void ensureValid() {
|
||||
if (id == null) {
|
||||
throw VeilidAPIExceptionNotInitialized();
|
||||
}
|
||||
}
|
||||
|
||||
void close() {
|
||||
if (id != null) {
|
||||
ffi._releaseTableDbTransaction(id!);
|
||||
id = null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// FFI implementation of VeilidTableDBTransaction
|
||||
class VeilidTableDBTransactionFFI extends VeilidTableDBTransaction {
|
||||
final _TDBT _tdbt;
|
||||
static final Finalizer<_TDBT> _finalizer =
|
||||
Finalizer((tdbt) => tdbt.ffi._releaseTableDbTransaction(tdbt.id));
|
||||
static final Finalizer<_TDBT> _finalizer = Finalizer((tdbt) => tdbt.close());
|
||||
|
||||
VeilidTableDBTransactionFFI._(this._tdbt) {
|
||||
_finalizer.attach(this, _tdbt, detach: this);
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> commit() {
|
||||
bool isDone() {
|
||||
return _tdbt.id == null;
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> commit() async {
|
||||
_tdbt.ensureValid();
|
||||
final recvPort = ReceivePort("veilid_table_db_transaction_commit");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdbt.ffi._tableDbTransactionCommit(
|
||||
sendPort.nativePort,
|
||||
_tdbt.id,
|
||||
_tdbt.id!,
|
||||
);
|
||||
return processFutureVoid(recvPort.first);
|
||||
await processFutureVoid(recvPort.first);
|
||||
_tdbt.close();
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> rollback() {
|
||||
Future<void> rollback() async {
|
||||
_tdbt.ensureValid();
|
||||
final recvPort = ReceivePort("veilid_table_db_transaction_rollback");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdbt.ffi._tableDbTransactionRollback(
|
||||
sendPort.nativePort,
|
||||
_tdbt.id,
|
||||
_tdbt.id!,
|
||||
);
|
||||
return processFutureVoid(recvPort.first);
|
||||
await processFutureVoid(recvPort.first);
|
||||
_tdbt.close();
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> store(int col, Uint8List key, Uint8List value) {
|
||||
_tdbt.ensureValid();
|
||||
final nativeEncodedKey = base64UrlNoPadEncode(key).toNativeUtf8();
|
||||
final nativeEncodedValue = base64UrlNoPadEncode(value).toNativeUtf8();
|
||||
|
||||
@ -789,7 +840,7 @@ class VeilidTableDBTransactionFFI extends VeilidTableDBTransaction {
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdbt.ffi._tableDbTransactionStore(
|
||||
sendPort.nativePort,
|
||||
_tdbt.id,
|
||||
_tdbt.id!,
|
||||
col,
|
||||
nativeEncodedKey,
|
||||
nativeEncodedValue,
|
||||
@ -799,13 +850,14 @@ class VeilidTableDBTransactionFFI extends VeilidTableDBTransaction {
|
||||
|
||||
@override
|
||||
Future<void> delete(int col, Uint8List key) {
|
||||
_tdbt.ensureValid();
|
||||
final nativeEncodedKey = base64UrlNoPadEncode(key).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("veilid_table_db_transaction_delete");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdbt.ffi._tableDbTransactionDelete(
|
||||
sendPort.nativePort,
|
||||
_tdbt.id,
|
||||
_tdbt.id!,
|
||||
col,
|
||||
nativeEncodedKey,
|
||||
);
|
||||
@ -814,32 +866,51 @@ class VeilidTableDBTransactionFFI extends VeilidTableDBTransaction {
|
||||
}
|
||||
|
||||
class _TDB {
|
||||
final int id;
|
||||
VeilidFFI ffi;
|
||||
_TDB(this.id, this.ffi);
|
||||
int? id;
|
||||
final VeilidFFI ffi;
|
||||
_TDB(int this.id, this.ffi);
|
||||
void ensureValid() {
|
||||
if (id == null) {
|
||||
throw VeilidAPIExceptionNotInitialized();
|
||||
}
|
||||
}
|
||||
|
||||
void close() {
|
||||
if (id != null) {
|
||||
ffi._releaseTableDb(id!);
|
||||
id = null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// FFI implementation of VeilidTableDB
|
||||
class VeilidTableDBFFI extends VeilidTableDB {
|
||||
final _TDB _tdb;
|
||||
static final Finalizer<_TDB> _finalizer =
|
||||
Finalizer((tdb) => tdb.ffi._releaseTableDb(tdb.id));
|
||||
static final Finalizer<_TDB> _finalizer = Finalizer((tdb) => tdb.close());
|
||||
|
||||
VeilidTableDBFFI._(this._tdb) {
|
||||
_finalizer.attach(this, _tdb, detach: this);
|
||||
}
|
||||
|
||||
@override
|
||||
void close() {
|
||||
_tdb.close();
|
||||
}
|
||||
|
||||
@override
|
||||
int getColumnCount() {
|
||||
return _tdb.ffi._tableDbGetColumnCount(_tdb.id);
|
||||
_tdb.ensureValid();
|
||||
return _tdb.ffi._tableDbGetColumnCount(_tdb.id!);
|
||||
}
|
||||
|
||||
@override
|
||||
Future<List<Uint8List>> getKeys(int col) {
|
||||
_tdb.ensureValid();
|
||||
|
||||
final recvPort = ReceivePort("veilid_table_db_get_keys");
|
||||
final sendPort = recvPort.sendPort;
|
||||
|
||||
_tdb.ffi._tableDbGetKeys(sendPort.nativePort, _tdb.id, col);
|
||||
_tdb.ffi._tableDbGetKeys(sendPort.nativePort, _tdb.id!, col);
|
||||
|
||||
return processFutureJson(
|
||||
jsonListConstructor<Uint8List>(base64UrlNoPadDecodeDynamic),
|
||||
@ -848,12 +919,16 @@ class VeilidTableDBFFI extends VeilidTableDB {
|
||||
|
||||
@override
|
||||
VeilidTableDBTransaction transact() {
|
||||
final id = _tdb.ffi._tableDbTransact(_tdb.id);
|
||||
_tdb.ensureValid();
|
||||
|
||||
final id = _tdb.ffi._tableDbTransact(_tdb.id!);
|
||||
return VeilidTableDBTransactionFFI._(_TDBT(id, this, _tdb.ffi));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> store(int col, Uint8List key, Uint8List value) {
|
||||
_tdb.ensureValid();
|
||||
|
||||
final nativeEncodedKey = base64UrlNoPadEncode(key).toNativeUtf8();
|
||||
final nativeEncodedValue = base64UrlNoPadEncode(value).toNativeUtf8();
|
||||
|
||||
@ -861,7 +936,7 @@ class VeilidTableDBFFI extends VeilidTableDB {
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdb.ffi._tableDbStore(
|
||||
sendPort.nativePort,
|
||||
_tdb.id,
|
||||
_tdb.id!,
|
||||
col,
|
||||
nativeEncodedKey,
|
||||
nativeEncodedValue,
|
||||
@ -871,13 +946,14 @@ class VeilidTableDBFFI extends VeilidTableDB {
|
||||
|
||||
@override
|
||||
Future<Uint8List?> load(int col, Uint8List key) async {
|
||||
_tdb.ensureValid();
|
||||
final nativeEncodedKey = base64UrlNoPadEncode(key).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("veilid_table_db_load");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdb.ffi._tableDbLoad(
|
||||
sendPort.nativePort,
|
||||
_tdb.id,
|
||||
_tdb.id!,
|
||||
col,
|
||||
nativeEncodedKey,
|
||||
);
|
||||
@ -890,13 +966,14 @@ class VeilidTableDBFFI extends VeilidTableDB {
|
||||
|
||||
@override
|
||||
Future<Uint8List?> delete(int col, Uint8List key) async {
|
||||
_tdb.ensureValid();
|
||||
final nativeEncodedKey = base64UrlNoPadEncode(key).toNativeUtf8();
|
||||
|
||||
final recvPort = ReceivePort("veilid_table_db_delete");
|
||||
final sendPort = recvPort.sendPort;
|
||||
_tdb.ffi._tableDbDelete(
|
||||
sendPort.nativePort,
|
||||
_tdb.id,
|
||||
_tdb.id!,
|
||||
col,
|
||||
nativeEncodedKey,
|
||||
);
|
||||
@ -909,7 +986,7 @@ class VeilidTableDBFFI extends VeilidTableDB {
|
||||
}
|
||||
|
||||
// FFI implementation of VeilidCryptoSystem
|
||||
class VeilidCryptoSystemFFI implements VeilidCryptoSystem {
|
||||
class VeilidCryptoSystemFFI extends VeilidCryptoSystem {
|
||||
final CryptoKind _kind;
|
||||
final VeilidFFI _ffi;
|
||||
|
||||
@ -1154,7 +1231,7 @@ class VeilidCryptoSystemFFI implements VeilidCryptoSystem {
|
||||
}
|
||||
|
||||
// FFI implementation of high level Veilid API
|
||||
class VeilidFFI implements Veilid {
|
||||
class VeilidFFI extends Veilid {
|
||||
// veilid_core shared library
|
||||
final DynamicLibrary _dylib;
|
||||
|
||||
|
@ -22,75 +22,98 @@ Future<T> _wrapApiPromise<T>(Object p) {
|
||||
}
|
||||
|
||||
class _Ctx {
|
||||
final int id;
|
||||
int? id;
|
||||
final VeilidJS js;
|
||||
_Ctx(this.id, this.js);
|
||||
_Ctx(int this.id, this.js);
|
||||
void ensureValid() {
|
||||
if (id == null) {
|
||||
throw VeilidAPIExceptionNotInitialized();
|
||||
}
|
||||
}
|
||||
|
||||
void close() {
|
||||
if (id != null) {
|
||||
js_util.callMethod(wasm, "release_routing_context", [id!]);
|
||||
id = null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// JS implementation of VeilidRoutingContext
|
||||
class VeilidRoutingContextJS implements VeilidRoutingContext {
|
||||
class VeilidRoutingContextJS extends VeilidRoutingContext {
|
||||
final _Ctx _ctx;
|
||||
static final Finalizer<_Ctx> _finalizer = Finalizer(
|
||||
(ctx) => js_util.callMethod(wasm, "release_routing_context", [ctx.id]));
|
||||
static final Finalizer<_Ctx> _finalizer = Finalizer((ctx) => ctx.close());
|
||||
|
||||
VeilidRoutingContextJS._(this._ctx) {
|
||||
_finalizer.attach(this, _ctx, detach: this);
|
||||
}
|
||||
|
||||
@override
|
||||
void close() {
|
||||
_ctx.close();
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidRoutingContextJS withPrivacy() {
|
||||
_ctx.ensureValid();
|
||||
int newId =
|
||||
js_util.callMethod(wasm, "routing_context_with_privacy", [_ctx.id]);
|
||||
js_util.callMethod(wasm, "routing_context_with_privacy", [_ctx.id!]);
|
||||
return VeilidRoutingContextJS._(_Ctx(newId, _ctx.js));
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidRoutingContextJS withCustomPrivacy(SafetySelection safetySelection) {
|
||||
_ctx.ensureValid();
|
||||
final newId = js_util.callMethod(
|
||||
wasm,
|
||||
"routing_context_with_custom_privacy",
|
||||
[_ctx.id, jsonEncode(safetySelection)]);
|
||||
[_ctx.id!, jsonEncode(safetySelection)]);
|
||||
|
||||
return VeilidRoutingContextJS._(_Ctx(newId, _ctx.js));
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidRoutingContextJS withSequencing(Sequencing sequencing) {
|
||||
_ctx.ensureValid();
|
||||
final newId = js_util.callMethod(wasm, "routing_context_with_sequencing",
|
||||
[_ctx.id, jsonEncode(sequencing)]);
|
||||
[_ctx.id!, jsonEncode(sequencing)]);
|
||||
return VeilidRoutingContextJS._(_Ctx(newId, _ctx.js));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<Uint8List> appCall(String target, Uint8List request) async {
|
||||
_ctx.ensureValid();
|
||||
var encodedRequest = base64UrlNoPadEncode(request);
|
||||
|
||||
return base64UrlNoPadDecode(await _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "routing_context_app_call", [_ctx.id, target, encodedRequest])));
|
||||
wasm, "routing_context_app_call", [_ctx.id!, target, encodedRequest])));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> appMessage(String target, Uint8List message) {
|
||||
_ctx.ensureValid();
|
||||
var encodedMessage = base64UrlNoPadEncode(message);
|
||||
|
||||
return _wrapApiPromise(js_util.callMethod(wasm,
|
||||
"routing_context_app_message", [_ctx.id, target, encodedMessage]));
|
||||
"routing_context_app_message", [_ctx.id!, target, encodedMessage]));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<DHTRecordDescriptor> createDHTRecord(DHTSchema schema,
|
||||
{CryptoKind kind = 0}) async {
|
||||
_ctx.ensureValid();
|
||||
return DHTRecordDescriptor.fromJson(jsonDecode(await _wrapApiPromise(js_util
|
||||
.callMethod(wasm, "routing_context_create_dht_record",
|
||||
[_ctx.id, jsonEncode(schema), kind]))));
|
||||
[_ctx.id!, jsonEncode(schema), kind]))));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<DHTRecordDescriptor> openDHTRecord(
|
||||
TypedKey key, KeyPair? writer) async {
|
||||
_ctx.ensureValid();
|
||||
return DHTRecordDescriptor.fromJson(jsonDecode(await _wrapApiPromise(js_util
|
||||
.callMethod(wasm, "routing_context_open_dht_record", [
|
||||
_ctx.id,
|
||||
_ctx.id!,
|
||||
jsonEncode(key),
|
||||
writer != null ? jsonEncode(writer) : null
|
||||
]))));
|
||||
@ -98,42 +121,47 @@ class VeilidRoutingContextJS implements VeilidRoutingContext {
|
||||
|
||||
@override
|
||||
Future<void> closeDHTRecord(TypedKey key) {
|
||||
_ctx.ensureValid();
|
||||
return _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "routing_context_close_dht_record", [_ctx.id, jsonEncode(key)]));
|
||||
wasm, "routing_context_close_dht_record", [_ctx.id!, jsonEncode(key)]));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> deleteDHTRecord(TypedKey key) {
|
||||
return _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "routing_context_delete_dht_record", [_ctx.id, jsonEncode(key)]));
|
||||
_ctx.ensureValid();
|
||||
return _wrapApiPromise(js_util.callMethod(wasm,
|
||||
"routing_context_delete_dht_record", [_ctx.id!, jsonEncode(key)]));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<ValueData?> getDHTValue(
|
||||
TypedKey key, int subkey, bool forceRefresh) async {
|
||||
_ctx.ensureValid();
|
||||
final opt = await _wrapApiPromise(js_util.callMethod(
|
||||
wasm,
|
||||
"routing_context_get_dht_value",
|
||||
[_ctx.id, jsonEncode(key), subkey, forceRefresh]));
|
||||
[_ctx.id!, jsonEncode(key), subkey, forceRefresh]));
|
||||
return opt == null ? null : ValueData.fromJson(jsonDecode(opt));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<ValueData?> setDHTValue(
|
||||
TypedKey key, int subkey, Uint8List data) async {
|
||||
_ctx.ensureValid();
|
||||
final opt = await _wrapApiPromise(js_util.callMethod(
|
||||
wasm,
|
||||
"routing_context_set_dht_value",
|
||||
[_ctx.id, jsonEncode(key), subkey, base64UrlNoPadEncode(data)]));
|
||||
[_ctx.id!, jsonEncode(key), subkey, base64UrlNoPadEncode(data)]));
|
||||
return opt == null ? null : ValueData.fromJson(jsonDecode(opt));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<Timestamp> watchDHTValues(TypedKey key, List<ValueSubkeyRange> subkeys,
|
||||
Timestamp expiration, int count) async {
|
||||
_ctx.ensureValid();
|
||||
final ts = await _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "routing_context_watch_dht_values", [
|
||||
_ctx.id,
|
||||
_ctx.id!,
|
||||
jsonEncode(key),
|
||||
jsonEncode(subkeys),
|
||||
expiration.toString(),
|
||||
@ -144,15 +172,16 @@ class VeilidRoutingContextJS implements VeilidRoutingContext {
|
||||
|
||||
@override
|
||||
Future<bool> cancelDHTWatch(TypedKey key, List<ValueSubkeyRange> subkeys) {
|
||||
_ctx.ensureValid();
|
||||
return _wrapApiPromise(js_util.callMethod(
|
||||
wasm,
|
||||
"routing_context_cancel_dht_watch",
|
||||
[_ctx.id, jsonEncode(key), jsonEncode(subkeys)]));
|
||||
[_ctx.id!, jsonEncode(key), jsonEncode(subkeys)]));
|
||||
}
|
||||
}
|
||||
|
||||
// JS implementation of VeilidCryptoSystem
|
||||
class VeilidCryptoSystemJS implements VeilidCryptoSystem {
|
||||
class VeilidCryptoSystemJS extends VeilidCryptoSystem {
|
||||
final CryptoKind _kind;
|
||||
final VeilidJS _js;
|
||||
|
||||
@ -327,105 +356,146 @@ class VeilidCryptoSystemJS implements VeilidCryptoSystem {
|
||||
}
|
||||
|
||||
class _TDBT {
|
||||
final int id;
|
||||
VeilidTableDBJS tdbjs;
|
||||
VeilidJS js;
|
||||
int? id;
|
||||
final VeilidTableDBJS tdbjs;
|
||||
final VeilidJS js;
|
||||
|
||||
_TDBT(this.id, this.tdbjs, this.js);
|
||||
void ensureValid() {
|
||||
if (id == null) {
|
||||
throw VeilidAPIExceptionNotInitialized();
|
||||
}
|
||||
}
|
||||
|
||||
void close() {
|
||||
if (id != null) {
|
||||
js_util.callMethod(wasm, "release_table_db_transaction", [id!]);
|
||||
id = null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// JS implementation of VeilidTableDBTransaction
|
||||
class VeilidTableDBTransactionJS extends VeilidTableDBTransaction {
|
||||
final _TDBT _tdbt;
|
||||
static final Finalizer<_TDBT> _finalizer = Finalizer((tdbt) =>
|
||||
js_util.callMethod(wasm, "release_table_db_transaction", [tdbt.id]));
|
||||
static final Finalizer<_TDBT> _finalizer = Finalizer((tdbt) => tdbt.close());
|
||||
|
||||
VeilidTableDBTransactionJS._(this._tdbt) {
|
||||
_finalizer.attach(this, _tdbt, detach: this);
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> commit() {
|
||||
return _wrapApiPromise(
|
||||
js_util.callMethod(wasm, "table_db_transaction_commit", [_tdbt.id]));
|
||||
bool isDone() {
|
||||
return _tdbt.id == null;
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> rollback() {
|
||||
return _wrapApiPromise(
|
||||
js_util.callMethod(wasm, "table_db_transaction_rollback", [_tdbt.id]));
|
||||
Future<void> commit() async {
|
||||
_tdbt.ensureValid();
|
||||
await _wrapApiPromise(
|
||||
js_util.callMethod(wasm, "table_db_transaction_commit", [_tdbt.id!]));
|
||||
_tdbt.close();
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> store(int col, Uint8List key, Uint8List value) {
|
||||
Future<void> rollback() async {
|
||||
_tdbt.ensureValid();
|
||||
await _wrapApiPromise(
|
||||
js_util.callMethod(wasm, "table_db_transaction_rollback", [_tdbt.id!]));
|
||||
_tdbt.close();
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> store(int col, Uint8List key, Uint8List value) async {
|
||||
_tdbt.ensureValid();
|
||||
final encodedKey = base64UrlNoPadEncode(key);
|
||||
final encodedValue = base64UrlNoPadEncode(value);
|
||||
|
||||
return _wrapApiPromise(js_util.callMethod(
|
||||
wasm,
|
||||
"table_db_transaction_store",
|
||||
[_tdbt.id, col, encodedKey, encodedValue]));
|
||||
await _wrapApiPromise(js_util.callMethod(wasm, "table_db_transaction_store",
|
||||
[_tdbt.id!, col, encodedKey, encodedValue]));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> delete(int col, Uint8List key) {
|
||||
Future<void> delete(int col, Uint8List key) async {
|
||||
_tdbt.ensureValid();
|
||||
final encodedKey = base64UrlNoPadEncode(key);
|
||||
|
||||
return _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "table_db_transaction_delete", [_tdbt.id, col, encodedKey]));
|
||||
await _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "table_db_transaction_delete", [_tdbt.id!, col, encodedKey]));
|
||||
}
|
||||
}
|
||||
|
||||
class _TDB {
|
||||
final int id;
|
||||
VeilidJS js;
|
||||
int? id;
|
||||
final VeilidJS js;
|
||||
|
||||
_TDB(this.id, this.js);
|
||||
_TDB(int this.id, this.js);
|
||||
void ensureValid() {
|
||||
if (id == null) {
|
||||
throw VeilidAPIExceptionNotInitialized();
|
||||
}
|
||||
}
|
||||
|
||||
void close() {
|
||||
if (id != null) {
|
||||
js_util.callMethod(wasm, "release_table_db", [id!]);
|
||||
id = null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// JS implementation of VeilidTableDB
|
||||
class VeilidTableDBJS extends VeilidTableDB {
|
||||
final _TDB _tdb;
|
||||
static final Finalizer<_TDB> _finalizer = Finalizer(
|
||||
(tdb) => js_util.callMethod(wasm, "release_table_db", [tdb.id]));
|
||||
static final Finalizer<_TDB> _finalizer = Finalizer((tdb) => tdb.close());
|
||||
|
||||
VeilidTableDBJS._(this._tdb) {
|
||||
_finalizer.attach(this, _tdb, detach: this);
|
||||
}
|
||||
|
||||
@override
|
||||
void close() {
|
||||
_tdb.close();
|
||||
}
|
||||
|
||||
@override
|
||||
int getColumnCount() {
|
||||
return js_util.callMethod(wasm, "table_db_get_column_count", [_tdb.id]);
|
||||
_tdb.ensureValid();
|
||||
return js_util.callMethod(wasm, "table_db_get_column_count", [_tdb.id!]);
|
||||
}
|
||||
|
||||
@override
|
||||
Future<List<Uint8List>> getKeys(int col) async {
|
||||
_tdb.ensureValid();
|
||||
return jsonListConstructor(base64UrlNoPadDecodeDynamic)(jsonDecode(
|
||||
await js_util.callMethod(wasm, "table_db_get_keys", [_tdb.id, col])));
|
||||
await js_util.callMethod(wasm, "table_db_get_keys", [_tdb.id!, col])));
|
||||
}
|
||||
|
||||
@override
|
||||
VeilidTableDBTransaction transact() {
|
||||
final id = js_util.callMethod(wasm, "table_db_transact", [_tdb.id]);
|
||||
_tdb.ensureValid();
|
||||
final id = js_util.callMethod(wasm, "table_db_transact", [_tdb.id!]);
|
||||
|
||||
return VeilidTableDBTransactionJS._(_TDBT(id, this, _tdb.js));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<void> store(int col, Uint8List key, Uint8List value) {
|
||||
_tdb.ensureValid();
|
||||
final encodedKey = base64UrlNoPadEncode(key);
|
||||
final encodedValue = base64UrlNoPadEncode(value);
|
||||
|
||||
return _wrapApiPromise(js_util.callMethod(
|
||||
wasm, "table_db_store", [_tdb.id, col, encodedKey, encodedValue]));
|
||||
wasm, "table_db_store", [_tdb.id!, col, encodedKey, encodedValue]));
|
||||
}
|
||||
|
||||
@override
|
||||
Future<Uint8List?> load(int col, Uint8List key) async {
|
||||
_tdb.ensureValid();
|
||||
final encodedKey = base64UrlNoPadEncode(key);
|
||||
|
||||
String? out = await _wrapApiPromise(
|
||||
js_util.callMethod(wasm, "table_db_load", [_tdb.id, col, encodedKey]));
|
||||
js_util.callMethod(wasm, "table_db_load", [_tdb.id!, col, encodedKey]));
|
||||
if (out == null) {
|
||||
return null;
|
||||
}
|
||||
@ -434,16 +504,17 @@ class VeilidTableDBJS extends VeilidTableDB {
|
||||
|
||||
@override
|
||||
Future<Uint8List?> delete(int col, Uint8List key) {
|
||||
_tdb.ensureValid();
|
||||
final encodedKey = base64UrlNoPadEncode(key);
|
||||
|
||||
return _wrapApiPromise(js_util
|
||||
.callMethod(wasm, "table_db_delete", [_tdb.id, col, encodedKey]));
|
||||
.callMethod(wasm, "table_db_delete", [_tdb.id!, col, encodedKey]));
|
||||
}
|
||||
}
|
||||
|
||||
// JS implementation of high level Veilid API
|
||||
|
||||
class VeilidJS implements Veilid {
|
||||
class VeilidJS extends Veilid {
|
||||
@override
|
||||
void initializeVeilidCore(Map<String, dynamic> platformConfigJson) {
|
||||
var platformConfigJsonString = jsonEncode(platformConfigJson);
|
||||
|
@ -5,6 +5,7 @@ import 'dart:convert';
|
||||
/////////////////////////////////////
|
||||
/// VeilidTableDB
|
||||
abstract class VeilidTableDBTransaction {
|
||||
bool isDone();
|
||||
Future<void> commit();
|
||||
Future<void> rollback();
|
||||
Future<void> store(int col, Uint8List key, Uint8List value);
|
||||
@ -24,6 +25,7 @@ abstract class VeilidTableDBTransaction {
|
||||
}
|
||||
|
||||
abstract class VeilidTableDB {
|
||||
void close();
|
||||
int getColumnCount();
|
||||
Future<List<Uint8List>> getKeys(int col);
|
||||
VeilidTableDBTransaction transact();
|
||||
|
@ -126,9 +126,6 @@ fn main() -> EyreResult<()> {
|
||||
}
|
||||
|
||||
// --- Normal Startup ---
|
||||
let panic_on_shutdown = matches.occurrences_of("panic") != 0;
|
||||
ctrlc::set_handler(move || {
|
||||
if panic_on_shutdown {
|
||||
let orig_hook = std::panic::take_hook();
|
||||
std::panic::set_hook(Box::new(move |panic_info| {
|
||||
// invoke the default handler and exit the process
|
||||
@ -137,8 +134,13 @@ fn main() -> EyreResult<()> {
|
||||
let backtrace = backtrace::Backtrace::new();
|
||||
eprintln!("Backtrace:\n{:?}", backtrace);
|
||||
|
||||
eprintln!("exiting!");
|
||||
std::process::exit(1);
|
||||
}));
|
||||
|
||||
let panic_on_shutdown = matches.occurrences_of("panic") != 0;
|
||||
ctrlc::set_handler(move || {
|
||||
if panic_on_shutdown {
|
||||
panic!("panic requested");
|
||||
} else {
|
||||
shutdown();
|
||||
|
@ -102,7 +102,7 @@ core:
|
||||
set_value_count: 5
|
||||
set_value_fanout: 4
|
||||
min_peer_count: 20
|
||||
min_peer_refresh_time_ms: 2000
|
||||
min_peer_refresh_time_ms: 60000
|
||||
validate_dial_info_receipt_time_ms: 2000
|
||||
local_subkey_cache_size: 128
|
||||
local_max_subkey_cache_memory_mb: 256
|
||||
@ -1620,7 +1620,7 @@ mod tests {
|
||||
assert_eq!(s.core.network.dht.set_value_count, 5u32);
|
||||
assert_eq!(s.core.network.dht.set_value_fanout, 4u32);
|
||||
assert_eq!(s.core.network.dht.min_peer_count, 20u32);
|
||||
assert_eq!(s.core.network.dht.min_peer_refresh_time_ms, 2_000u32);
|
||||
assert_eq!(s.core.network.dht.min_peer_refresh_time_ms, 60_000u32);
|
||||
assert_eq!(
|
||||
s.core.network.dht.validate_dial_info_receipt_time_ms,
|
||||
2_000u32
|
||||
|
Loading…
Reference in New Issue
Block a user