caretta-sync/lazy-supplements/src/config/node.rs

101 lines
3 KiB
Rust
Raw Normal View History

2025-06-01 15:18:17 +09:00
use std::{net::IpAddr, path::PathBuf};
2025-05-30 09:26:47 +09:00
2025-06-01 15:18:17 +09:00
use base64::{prelude::BASE64_STANDARD, Engine};
use libp2p::identity::{self, DecodingError, Keypair};
2025-05-24 06:11:00 +09:00
use serde::{Deserialize, Serialize};
2025-06-01 15:18:17 +09:00
use crate::{error::Error, global::DEFAULT_DATABASE_FILE_PATH};
use super::{DEFAULT_LISTEN_IPS, DEFAULT_PORT};
fn keypair_to_base64(keypair: &Keypair) -> Result<String, Error> {
let vec = keypair.to_protobuf_encoding()?;
let base64 = BASE64_STANDARD.encode(vec);
Ok(base64)
}
fn base64_to_keypair(base64: &str) -> Result<Keypair, Error> {
let vec = BASE64_STANDARD.decode(base64)?;
Ok(Keypair::from_protobuf_encoding(&vec)?)
}
2025-05-30 09:26:47 +09:00
2025-05-24 06:11:00 +09:00
#[derive(Debug, Deserialize, Serialize)]
pub struct NodeConfig {
2025-06-01 15:18:17 +09:00
#[serde(with = "keypair_parser")]
2025-05-24 06:11:00 +09:00
secret: Keypair,
2025-06-01 15:18:17 +09:00
database_path: PathBuf,
listen_ips: Vec<IpAddr>,
port: u16,
2025-05-30 09:26:47 +09:00
}
2025-06-01 15:18:17 +09:00
impl Default for NodeConfig {
fn default() -> NodeConfig{
NodeConfig {
2025-05-30 09:26:47 +09:00
secret: identity::Keypair::generate_ed25519(),
2025-06-01 15:18:17 +09:00
database_path: DEFAULT_DATABASE_FILE_PATH.to_path_buf(),
listen_ips: DEFAULT_LISTEN_IPS.to_vec(),
port: DEFAULT_PORT,
2025-05-30 09:26:47 +09:00
}
}
2025-06-01 15:18:17 +09:00
}
impl TryFrom<RawNodeConfig> for NodeConfig {
type Error = Error;
fn try_from(raw: RawNodeConfig) -> Result<NodeConfig, Self::Error> {
Ok(NodeConfig {
secret: base64_to_keypair(&raw.secret.ok_or(Error::MissingConfig("secret"))?)?,
database_path: raw.database_path.ok_or(Error::MissingConfig("database_path"))?,
listen_ips: raw.listen_ips.ok_or(Error::MissingConfig("listen_ips"))?,
port: raw.port.ok_or(Error::MissingConfig("port"))?
})
2025-05-30 09:26:47 +09:00
}
2025-05-24 06:11:00 +09:00
}
2025-06-01 15:18:17 +09:00
mod keypair_parser {
2025-05-24 06:11:00 +09:00
use libp2p::identity::Keypair;
use serde::{Deserialize, Deserializer, Serializer};
pub fn serialize<S>(keypair: &Keypair, serializer: S) -> Result<S::Ok, S::Error>
where S: Serializer
{
2025-06-01 15:18:17 +09:00
match super::keypair_to_base64(keypair) {
Ok(x) => serializer.serialize_str(&x),
Err(_) => Err(serde::ser::Error::custom("Decoding keypair error"))
}
2025-05-24 06:11:00 +09:00
}
pub fn deserialize<'de, D>(deserializer: D) -> Result<Keypair, D::Error>
where D: Deserializer<'de>
{
2025-06-01 15:18:17 +09:00
match super::base64_to_keypair(&String::deserialize(deserializer)?) {
Ok(x) => Ok(x),
Err(crate::error::Error::Base64Decode(_)) => Err(serde::de::Error::custom("Decoding base64 error")),
Err(_) => unreachable!()
}
2025-05-24 06:11:00 +09:00
}
}
2025-06-01 15:18:17 +09:00
#[derive(Debug, Deserialize, Serialize)]
pub struct RawNodeConfig {
secret: Option<String>,
database_path: Option<PathBuf>,
listen_ips: Option<Vec<IpAddr>>,
port: Option<u16>,
}
2025-05-24 06:11:00 +09:00
#[cfg(test)]
mod tests {
use libp2p::identity;
use super::*;
#[tokio::test]
2025-06-01 15:18:17 +09:00
async fn parse_keypair() {
2025-05-24 06:11:00 +09:00
let keypair = identity::Keypair::generate_ed25519();
2025-06-01 15:18:17 +09:00
let keypair2 = base64_to_keypair(&keypair_to_base64(&keypair).unwrap()).unwrap();
assert_eq!(keypair.public(), keypair2.public());
2025-05-24 06:11:00 +09:00
}
}