2022-10-03 15:21:19 +02:00
|
|
|
|
mod config;
|
2022-10-06 15:28:25 +02:00
|
|
|
|
mod management;
|
|
|
|
|
|
mod peers;
|
2022-10-06 15:51:00 +02:00
|
|
|
|
mod relay;
|
2022-10-03 15:21:19 +02:00
|
|
|
|
|
|
|
|
|
|
// std
|
2022-10-06 15:51:00 +02:00
|
|
|
|
use aes_gcm::{Aes256Gcm, Key};
|
|
|
|
|
|
use libsecp256k1::{PublicKey, SecretKey};
|
2022-10-03 15:21:19 +02:00
|
|
|
|
use multiaddr::Multiaddr;
|
|
|
|
|
|
use std::marker::PhantomData;
|
|
|
|
|
|
use std::sync::Mutex;
|
2022-10-06 15:28:25 +02:00
|
|
|
|
use std::time::Duration;
|
2022-10-03 15:21:19 +02:00
|
|
|
|
// crates
|
|
|
|
|
|
// internal
|
2022-10-06 15:51:00 +02:00
|
|
|
|
use crate::general::{MessageId, PeerId, Result, WakuMessage, WakuPubSubTopic};
|
2022-10-03 15:21:19 +02:00
|
|
|
|
|
|
|
|
|
|
pub use config::WakuNodeConfig;
|
2022-10-06 15:28:25 +02:00
|
|
|
|
pub use peers::{Protocol, WakuPeerData, WakuPeers};
|
2022-10-06 15:51:00 +02:00
|
|
|
|
pub use relay::{waku_create_content_topic, waku_create_pubsub_topic, waku_dafault_pubsub_topic};
|
2022-10-03 15:21:19 +02:00
|
|
|
|
|
|
|
|
|
|
/// Shared flag to check if a waku node is already running in the current process
|
|
|
|
|
|
static WAKU_NODE_INITIALIZED: Mutex<bool> = Mutex::new(false);
|
|
|
|
|
|
|
|
|
|
|
|
/// Marker trait to disallow undesired waku node states in the handle
|
|
|
|
|
|
pub trait WakuNodeState {}
|
|
|
|
|
|
|
|
|
|
|
|
/// Waku node initialized state
|
|
|
|
|
|
pub struct Initialized;
|
|
|
|
|
|
|
|
|
|
|
|
/// Waku node running state
|
|
|
|
|
|
pub struct Running;
|
|
|
|
|
|
|
|
|
|
|
|
impl WakuNodeState for Initialized {}
|
|
|
|
|
|
impl WakuNodeState for Running {}
|
|
|
|
|
|
|
|
|
|
|
|
pub struct WakuNodeHandle<State: WakuNodeState>(PhantomData<State>);
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// We do not have any inner state, so the handle should be safe to be send among threads.
|
|
|
|
|
|
unsafe impl<State: WakuNodeState> Send for WakuNodeHandle<State> {}
|
|
|
|
|
|
|
|
|
|
|
|
/// References to the handle are safe to share, as they do not mutate the handle itself and
|
|
|
|
|
|
/// operations are performed by the bindings backend, which is supposed to be thread safe.
|
|
|
|
|
|
unsafe impl<State: WakuNodeState> Sync for WakuNodeHandle<State> {}
|
|
|
|
|
|
|
2022-10-03 15:21:19 +02:00
|
|
|
|
impl<State: WakuNodeState> WakuNodeHandle<State> {
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// If the execution is successful, the result is the peer ID as a string (base58 encoded)
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`management::waku_peer_id`]
|
|
|
|
|
|
pub fn peer_id(&self) -> Result<PeerId> {
|
2022-10-06 15:28:25 +02:00
|
|
|
|
management::waku_peer_id()
|
2022-10-03 15:21:19 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Get the multiaddresses the Waku node is listening to
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`management::waku_listen_addresses`]
|
2022-10-03 15:21:19 +02:00
|
|
|
|
pub fn listen_addresses(&self) -> Result<Vec<Multiaddr>> {
|
2022-10-06 15:51:00 +02:00
|
|
|
|
management::waku_listen_addresses()
|
2022-10-06 15:28:25 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Add a node multiaddress and protocol to the waku node’s peerstore
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`peers::waku_add_peers`]
|
|
|
|
|
|
pub fn add_peer(&self, address: Multiaddr, protocol_id: usize) -> Result<PeerId> {
|
2022-10-06 15:28:25 +02:00
|
|
|
|
peers::waku_add_peers(address, protocol_id)
|
2022-10-03 15:21:19 +02:00
|
|
|
|
}
|
|
|
|
|
|
}
|
2022-10-06 15:51:00 +02:00
|
|
|
|
|
2022-10-03 15:21:19 +02:00
|
|
|
|
fn stop_node() -> Result<()> {
|
|
|
|
|
|
let mut node_initialized = WAKU_NODE_INITIALIZED
|
|
|
|
|
|
.lock()
|
|
|
|
|
|
.expect("Access to the mutex at some point");
|
|
|
|
|
|
*node_initialized = false;
|
2022-10-06 15:28:25 +02:00
|
|
|
|
management::waku_stop().map(|_| ())
|
2022-10-03 15:21:19 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
impl WakuNodeHandle<Initialized> {
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Start a Waku node mounting all the protocols that were enabled during the Waku node instantiation
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`management::waku_start`]
|
2022-10-03 15:21:19 +02:00
|
|
|
|
pub fn start(self) -> Result<WakuNodeHandle<Running>> {
|
2022-10-06 15:28:25 +02:00
|
|
|
|
management::waku_start().map(|_| WakuNodeHandle(Default::default()))
|
2022-10-03 15:21:19 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Stops a Waku node
|
|
|
|
|
|
///
|
|
|
|
|
|
/// internally uses [`management::waku_stop`]
|
2022-10-03 15:21:19 +02:00
|
|
|
|
pub fn stop(self) -> Result<()> {
|
|
|
|
|
|
stop_node()
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
impl WakuNodeHandle<Running> {
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Stops a Waku node
|
|
|
|
|
|
///
|
|
|
|
|
|
/// internally uses [`management::waku_stop`]
|
2022-10-03 15:21:19 +02:00
|
|
|
|
pub fn stop(self) -> Result<()> {
|
|
|
|
|
|
stop_node()
|
|
|
|
|
|
}
|
2022-10-06 15:28:25 +02:00
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Dial peer using a multiaddress
|
|
|
|
|
|
/// If `timeout` as milliseconds doesn't fit into a `i32` it is clamped to [`i32::MAX`]
|
|
|
|
|
|
/// If the function execution takes longer than `timeout` value, the execution will be canceled and an error returned.
|
|
|
|
|
|
/// Use 0 for no timeout
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`peers::waku_connect_peer_with_address`]
|
2022-10-06 15:28:25 +02:00
|
|
|
|
pub fn connect_peer_with_address(
|
2022-10-06 15:51:00 +02:00
|
|
|
|
&self,
|
2022-10-06 15:28:25 +02:00
|
|
|
|
address: Multiaddr,
|
|
|
|
|
|
timeout: Option<Duration>,
|
|
|
|
|
|
) -> Result<()> {
|
|
|
|
|
|
peers::waku_connect_peer_with_address(address, timeout)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Dial peer using its peer ID
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`peers::waku_connect_peer_with_id`]
|
|
|
|
|
|
pub fn connect_peer_with_id(&self, peer_id: PeerId, timeout: Option<Duration>) -> Result<()> {
|
2022-10-06 15:28:25 +02:00
|
|
|
|
peers::waku_connect_peer_with_id(peer_id, timeout)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Disconnect a peer using its peerID
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`peers::waku_disconnect_peer_with_id`]
|
|
|
|
|
|
pub fn disconnect_peer_with_id(&self, peer_id: PeerId) -> Result<()> {
|
2022-10-06 15:28:25 +02:00
|
|
|
|
peers::waku_disconnect_peer_with_id(peer_id)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Get number of connected peers
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`peers::waku_peer_count`]
|
2022-10-06 15:28:25 +02:00
|
|
|
|
pub fn peer_count(&self) -> Result<usize> {
|
|
|
|
|
|
peers::waku_peer_count()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Retrieve the list of peers known by the Waku node
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`peers::waku_peers`]
|
2022-10-06 15:28:25 +02:00
|
|
|
|
pub fn peers(&self) -> Result<WakuPeers> {
|
|
|
|
|
|
peers::waku_peers()
|
|
|
|
|
|
}
|
2022-10-06 15:51:00 +02:00
|
|
|
|
|
|
|
|
|
|
/// Publish a message using Waku Relay
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`relay::waku_relay_publish_message`]
|
|
|
|
|
|
pub fn relay_publish_message(
|
|
|
|
|
|
&self,
|
|
|
|
|
|
message: &WakuMessage,
|
|
|
|
|
|
pubsub_topic: Option<WakuPubSubTopic>,
|
|
|
|
|
|
timeout: Duration,
|
|
|
|
|
|
) -> Result<MessageId> {
|
|
|
|
|
|
relay::waku_relay_publish_message(message, pubsub_topic, timeout)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// Optionally sign, encrypt using asymmetric encryption and publish a message using Waku Relay
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`relay::waku_relay_publish_encrypt_asymmetric`]
|
|
|
|
|
|
pub fn relay_publish_encrypt_asymmetric(
|
|
|
|
|
|
&self,
|
|
|
|
|
|
message: &WakuMessage,
|
|
|
|
|
|
pubsub_topic: Option<WakuPubSubTopic>,
|
|
|
|
|
|
public_key: &PublicKey,
|
|
|
|
|
|
signing_key: &SecretKey,
|
|
|
|
|
|
timeout: Duration,
|
|
|
|
|
|
) -> Result<MessageId> {
|
|
|
|
|
|
relay::waku_relay_publish_encrypt_asymmetric(
|
|
|
|
|
|
message,
|
|
|
|
|
|
pubsub_topic,
|
|
|
|
|
|
public_key,
|
|
|
|
|
|
signing_key,
|
|
|
|
|
|
timeout,
|
|
|
|
|
|
)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// Optionally sign, encrypt using symmetric encryption and publish a message using Waku Relay
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`relay::waku_relay_publish_encrypt_symmetric`]
|
|
|
|
|
|
pub fn relay_publish_encrypt_symmetric(
|
|
|
|
|
|
&self,
|
|
|
|
|
|
message: &WakuMessage,
|
|
|
|
|
|
pubsub_topic: Option<WakuPubSubTopic>,
|
|
|
|
|
|
symmetric_key: &Key<Aes256Gcm>,
|
|
|
|
|
|
signing_key: &SecretKey,
|
|
|
|
|
|
timeout: Duration,
|
|
|
|
|
|
) -> Result<MessageId> {
|
|
|
|
|
|
relay::waku_relay_publish_encrypt_symmetric(
|
|
|
|
|
|
message,
|
|
|
|
|
|
pubsub_topic,
|
|
|
|
|
|
symmetric_key,
|
|
|
|
|
|
signing_key,
|
|
|
|
|
|
timeout,
|
|
|
|
|
|
)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// Determine if there are enough peers to publish a message on a given pubsub topic
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`relay::waku_enough_peers`]
|
|
|
|
|
|
pub fn relay_enough_peers(&self, pubsub_topic: Option<WakuPubSubTopic>) -> Result<bool> {
|
|
|
|
|
|
relay::waku_enough_peers(pubsub_topic)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// Subscribe to a Waku Relay pubsub topic to receive messages
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`relay::waku_relay_subscribe`]
|
|
|
|
|
|
pub fn relay_subscribe(&self, pubsub_topic: Option<WakuPubSubTopic>) -> Result<()> {
|
|
|
|
|
|
relay::waku_relay_subscribe(pubsub_topic)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// Closes the pubsub subscription to a pubsub topic. No more messages will be received from this pubsub topic
|
|
|
|
|
|
///
|
|
|
|
|
|
/// wrapper around [`relay::waku_relay_unsubscribe`]
|
|
|
|
|
|
pub fn relay_unsubscribe(&self, pubsub_topic: Option<WakuPubSubTopic>) -> Result<()> {
|
|
|
|
|
|
relay::waku_relay_unsubscribe(pubsub_topic)
|
|
|
|
|
|
}
|
2022-10-03 15:21:19 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-10-06 15:51:00 +02:00
|
|
|
|
/// Spawn a new Waku node with the givent configuration (default configuration if `None` provided)
|
|
|
|
|
|
/// Internally uses [`management::waku_new`]
|
2022-10-03 15:21:19 +02:00
|
|
|
|
pub fn waku_new(config: Option<WakuNodeConfig>) -> Result<WakuNodeHandle<Initialized>> {
|
|
|
|
|
|
let mut node_initialized = WAKU_NODE_INITIALIZED
|
|
|
|
|
|
.lock()
|
|
|
|
|
|
.expect("Access to the mutex at some point");
|
|
|
|
|
|
if *node_initialized {
|
|
|
|
|
|
return Err("Waku node is already initialized".into());
|
|
|
|
|
|
}
|
|
|
|
|
|
*node_initialized = true;
|
2022-10-06 15:28:25 +02:00
|
|
|
|
management::waku_new(config).map(|_| WakuNodeHandle(Default::default()))
|
2022-10-03 15:21:19 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
|
|
mod tests {
|
|
|
|
|
|
use super::waku_new;
|
|
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
|
fn exclusive_running() {
|
|
|
|
|
|
let handle1 = waku_new(None).unwrap();
|
|
|
|
|
|
let handle2 = waku_new(None);
|
|
|
|
|
|
assert!(handle2.is_err());
|
|
|
|
|
|
let stop_handle = handle1.start().unwrap();
|
|
|
|
|
|
stop_handle.stop().unwrap();
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|