ant_protocol/messages/cmd.rs
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128
// Copyright 2024 MaidSafe.net limited.
//
// This SAFE Network Software is licensed to you under The General Public License (GPL), version 3.
// Unless required by applicable law or agreed to in writing, the SAFE Network Software distributed
// under the GPL Licence is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. Please review the Licences for the specific language governing
// permissions and limitations relating to use of the SAFE Network Software.
#![allow(clippy::mutable_key_type)] // for Bytes in NetworkAddress
use crate::storage::DataTypes;
use crate::{storage::ValidationType, NetworkAddress};
use ant_evm::ProofOfPayment;
use serde::{Deserialize, Serialize};
/// Ant protocol cmds
///
/// See the [`protocol`] module documentation for more details of the types supported by the Safe
/// Network, and their semantics.
///
/// [`protocol`]: crate
#[derive(Eq, PartialEq, Clone, Serialize, Deserialize)]
pub enum Cmd {
/// Write operation to notify peer fetch a list of [`NetworkAddress`] from the holder.
///
/// [`NetworkAddress`]: crate::NetworkAddress
Replicate {
/// Holder of the replication keys.
holder: NetworkAddress,
/// Keys of copy that shall be replicated.
keys: Vec<(NetworkAddress, ValidationType)>,
},
/// Write operation to notify peer fetch a list of fresh [`NetworkAddress`] from the holder.
///
/// [`NetworkAddress`]: crate::NetworkAddress
FreshReplicate {
/// Holder of the replication keys.
holder: NetworkAddress,
/// Keys of copy that shall be replicated.
keys: Vec<(
NetworkAddress,
DataTypes,
ValidationType,
Option<ProofOfPayment>,
)>,
},
/// Notify the peer it is now being considered as BAD due to the included behaviour
PeerConsideredAsBad {
detected_by: NetworkAddress,
bad_peer: NetworkAddress,
bad_behaviour: String,
},
}
impl std::fmt::Debug for Cmd {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
match self {
Cmd::Replicate { holder, keys } => {
let first_ten_keys: Vec<_> = keys.iter().take(10).collect();
f.debug_struct("Cmd::Replicate")
.field("holder", holder)
.field("keys_len", &keys.len())
.field("first_ten_keys", &first_ten_keys)
.finish()
}
Cmd::FreshReplicate { holder, keys } => {
let first_ten_keys: Vec<_> = keys.iter().take(10).collect();
f.debug_struct("Cmd::FreshReplicate")
.field("holder", holder)
.field("keys_len", &keys.len())
.field("first_ten_keys", &first_ten_keys)
.finish()
}
Cmd::PeerConsideredAsBad {
detected_by,
bad_peer,
bad_behaviour,
} => f
.debug_struct("Cmd::PeerConsideredAsBad")
.field("detected_by", detected_by)
.field("bad_peer", bad_peer)
.field("bad_behaviour", bad_behaviour)
.finish(),
}
}
}
impl Cmd {
/// Used to send a cmd to the close group of the address.
pub fn dst(&self) -> NetworkAddress {
match self {
Cmd::Replicate { holder, .. } => holder.clone(),
Cmd::FreshReplicate { holder, .. } => holder.clone(),
Cmd::PeerConsideredAsBad { bad_peer, .. } => bad_peer.clone(),
}
}
}
impl std::fmt::Display for Cmd {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
match self {
Cmd::Replicate { holder, keys } => {
write!(
f,
"Cmd::Replicate({:?} has {} keys)",
holder.as_peer_id(),
keys.len()
)
}
Cmd::FreshReplicate { holder, keys } => {
write!(
f,
"Cmd::Replicate({:?} has {} keys)",
holder.as_peer_id(),
keys.len()
)
}
Cmd::PeerConsideredAsBad {
detected_by,
bad_peer,
bad_behaviour,
} => {
write!(
f,
"Cmd::PeerConsideredAsBad({detected_by:?} consider peer {bad_peer:?} as bad, due to {bad_behaviour:?})")
}
}
}
}