use crate::manifest::{
FleetBackupManifest, FleetMember, IdentityMode, ManifestDesignConformanceReport,
ManifestValidationError, SourceSnapshot, VerificationCheck, VerificationPlan,
};
use candid::Principal;
use serde::{Deserialize, Serialize};
use std::{
collections::{BTreeMap, BTreeSet},
str::FromStr,
};
use thiserror::Error as ThisError;
#[derive(Clone, Debug, Default, Deserialize, Serialize)]
pub struct RestoreMapping {
pub members: Vec<RestoreMappingEntry>,
}
impl RestoreMapping {
fn target_for(&self, source_canister: &str) -> Option<&str> {
self.members
.iter()
.find(|entry| entry.source_canister == source_canister)
.map(|entry| entry.target_canister.as_str())
}
}
#[derive(Clone, Debug, Deserialize, Serialize)]
pub struct RestoreMappingEntry {
pub source_canister: String,
pub target_canister: String,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestorePlan {
pub backup_id: String,
pub source_environment: String,
pub source_root_canister: String,
pub topology_hash: String,
pub member_count: usize,
pub identity_summary: RestoreIdentitySummary,
pub snapshot_summary: RestoreSnapshotSummary,
pub verification_summary: RestoreVerificationSummary,
pub readiness_summary: RestoreReadinessSummary,
pub operation_summary: RestoreOperationSummary,
pub ordering_summary: RestoreOrderingSummary,
#[serde(default)]
pub design_conformance: Option<ManifestDesignConformanceReport>,
#[serde(default)]
pub fleet_verification_checks: Vec<VerificationCheck>,
pub phases: Vec<RestorePhase>,
}
impl RestorePlan {
#[must_use]
pub fn ordered_members(&self) -> Vec<&RestorePlanMember> {
self.phases
.iter()
.flat_map(|phase| phase.members.iter())
.collect()
}
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreIdentitySummary {
pub mapping_supplied: bool,
pub all_sources_mapped: bool,
pub fixed_members: usize,
pub relocatable_members: usize,
pub in_place_members: usize,
pub mapped_members: usize,
pub remapped_members: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
#[expect(
clippy::struct_excessive_bools,
reason = "restore summaries intentionally expose machine-readable readiness flags"
)]
pub struct RestoreSnapshotSummary {
pub all_members_have_module_hash: bool,
pub all_members_have_wasm_hash: bool,
pub all_members_have_code_version: bool,
pub all_members_have_checksum: bool,
pub members_with_module_hash: usize,
pub members_with_wasm_hash: usize,
pub members_with_code_version: usize,
pub members_with_checksum: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreVerificationSummary {
pub verification_required: bool,
pub all_members_have_checks: bool,
pub fleet_checks: usize,
pub member_check_groups: usize,
pub member_checks: usize,
pub members_with_checks: usize,
pub total_checks: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreReadinessSummary {
pub ready: bool,
pub reasons: Vec<String>,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreOperationSummary {
#[serde(default)]
pub planned_snapshot_uploads: usize,
pub planned_snapshot_loads: usize,
pub planned_code_reinstalls: usize,
pub planned_verification_checks: usize,
#[serde(default)]
pub planned_operations: usize,
pub planned_phases: usize,
}
impl RestoreOperationSummary {
#[must_use]
pub const fn effective_planned_snapshot_uploads(&self, member_count: usize) -> usize {
if self.planned_snapshot_uploads == 0 && member_count > 0 {
return member_count;
}
self.planned_snapshot_uploads
}
#[must_use]
pub const fn effective_planned_operations(&self, member_count: usize) -> usize {
if self.planned_operations == 0 {
return self.effective_planned_snapshot_uploads(member_count)
+ self.planned_snapshot_loads
+ self.planned_code_reinstalls
+ self.planned_verification_checks;
}
self.planned_operations
}
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreOrderingSummary {
pub phase_count: usize,
pub dependency_free_members: usize,
pub in_group_parent_edges: usize,
pub cross_group_parent_edges: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestorePhase {
pub restore_group: u16,
pub members: Vec<RestorePlanMember>,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestorePlanMember {
pub source_canister: String,
pub target_canister: String,
pub role: String,
pub parent_source_canister: Option<String>,
pub parent_target_canister: Option<String>,
pub ordering_dependency: Option<RestoreOrderingDependency>,
pub phase_order: usize,
pub restore_group: u16,
pub identity_mode: IdentityMode,
pub verification_class: String,
pub verification_checks: Vec<VerificationCheck>,
pub source_snapshot: SourceSnapshot,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreOrderingDependency {
pub source_canister: String,
pub target_canister: String,
pub relationship: RestoreOrderingRelationship,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
#[serde(rename_all = "kebab-case")]
pub enum RestoreOrderingRelationship {
ParentInSameGroup,
ParentInEarlierGroup,
}
pub struct RestorePlanner;
impl RestorePlanner {
pub fn plan(
manifest: &FleetBackupManifest,
mapping: Option<&RestoreMapping>,
) -> Result<RestorePlan, RestorePlanError> {
manifest.validate()?;
if let Some(mapping) = mapping {
validate_mapping(mapping)?;
validate_mapping_sources(manifest, mapping)?;
}
let members = resolve_members(manifest, mapping)?;
let identity_summary = restore_identity_summary(&members, mapping.is_some());
let snapshot_summary = restore_snapshot_summary(&members);
let verification_summary = restore_verification_summary(manifest, &members);
let readiness_summary = restore_readiness_summary(&snapshot_summary, &verification_summary);
validate_restore_group_dependencies(&members)?;
let phases = group_and_order_members(members)?;
let ordering_summary = restore_ordering_summary(&phases);
let operation_summary =
restore_operation_summary(manifest.fleet.members.len(), &verification_summary, &phases);
Ok(RestorePlan {
backup_id: manifest.backup_id.clone(),
source_environment: manifest.source.environment.clone(),
source_root_canister: manifest.source.root_canister.clone(),
topology_hash: manifest.fleet.topology_hash.clone(),
member_count: manifest.fleet.members.len(),
identity_summary,
snapshot_summary,
verification_summary,
readiness_summary,
operation_summary,
ordering_summary,
design_conformance: Some(manifest.design_conformance_report()),
fleet_verification_checks: manifest.verification.fleet_checks.clone(),
phases,
})
}
}
#[derive(Debug, ThisError)]
pub enum RestorePlanError {
#[error(transparent)]
InvalidManifest(#[from] ManifestValidationError),
#[error("field {field} must be a valid principal: {value}")]
InvalidPrincipal { field: &'static str, value: String },
#[error("mapping contains duplicate source canister {0}")]
DuplicateMappingSource(String),
#[error("mapping contains duplicate target canister {0}")]
DuplicateMappingTarget(String),
#[error("mapping references unknown source canister {0}")]
UnknownMappingSource(String),
#[error("mapping is missing source canister {0}")]
MissingMappingSource(String),
#[error("fixed-identity member {source_canister} cannot be mapped to {target_canister}")]
FixedIdentityRemap {
source_canister: String,
target_canister: String,
},
#[error("restore plan contains duplicate target canister {0}")]
DuplicatePlanTarget(String),
#[error("restore group {0} contains a parent cycle or unresolved dependency")]
RestoreOrderCycle(u16),
#[error(
"restore plan places parent {parent_source_canister} in group {parent_restore_group} after child {child_source_canister} in group {child_restore_group}"
)]
ParentRestoreGroupAfterChild {
child_source_canister: String,
parent_source_canister: String,
child_restore_group: u16,
parent_restore_group: u16,
},
}
fn validate_mapping(mapping: &RestoreMapping) -> Result<(), RestorePlanError> {
let mut sources = BTreeSet::new();
let mut targets = BTreeSet::new();
for entry in &mapping.members {
validate_principal("mapping.members[].source_canister", &entry.source_canister)?;
validate_principal("mapping.members[].target_canister", &entry.target_canister)?;
if !sources.insert(entry.source_canister.clone()) {
return Err(RestorePlanError::DuplicateMappingSource(
entry.source_canister.clone(),
));
}
if !targets.insert(entry.target_canister.clone()) {
return Err(RestorePlanError::DuplicateMappingTarget(
entry.target_canister.clone(),
));
}
}
Ok(())
}
fn validate_mapping_sources(
manifest: &FleetBackupManifest,
mapping: &RestoreMapping,
) -> Result<(), RestorePlanError> {
let sources = manifest
.fleet
.members
.iter()
.map(|member| member.canister_id.as_str())
.collect::<BTreeSet<_>>();
for entry in &mapping.members {
if !sources.contains(entry.source_canister.as_str()) {
return Err(RestorePlanError::UnknownMappingSource(
entry.source_canister.clone(),
));
}
}
Ok(())
}
fn resolve_members(
manifest: &FleetBackupManifest,
mapping: Option<&RestoreMapping>,
) -> Result<Vec<RestorePlanMember>, RestorePlanError> {
let mut plan_members = Vec::with_capacity(manifest.fleet.members.len());
let mut targets = BTreeSet::new();
let mut source_to_target = BTreeMap::new();
for member in &manifest.fleet.members {
let target = resolve_target(member, mapping)?;
if !targets.insert(target.clone()) {
return Err(RestorePlanError::DuplicatePlanTarget(target));
}
source_to_target.insert(member.canister_id.clone(), target.clone());
plan_members.push(RestorePlanMember {
source_canister: member.canister_id.clone(),
target_canister: target,
role: member.role.clone(),
parent_source_canister: member.parent_canister_id.clone(),
parent_target_canister: None,
ordering_dependency: None,
phase_order: 0,
restore_group: member.restore_group,
identity_mode: member.identity_mode.clone(),
verification_class: member.verification_class.clone(),
verification_checks: concrete_member_verification_checks(
member,
&manifest.verification,
),
source_snapshot: member.source_snapshot.clone(),
});
}
for member in &mut plan_members {
member.parent_target_canister = member
.parent_source_canister
.as_ref()
.and_then(|parent| source_to_target.get(parent))
.cloned();
}
Ok(plan_members)
}
fn concrete_member_verification_checks(
member: &FleetMember,
verification: &VerificationPlan,
) -> Vec<VerificationCheck> {
let mut checks = member
.verification_checks
.iter()
.filter(|check| verification_check_applies_to_role(check, &member.role))
.cloned()
.collect::<Vec<_>>();
for group in &verification.member_checks {
if group.role != member.role {
continue;
}
checks.extend(
group
.checks
.iter()
.filter(|check| verification_check_applies_to_role(check, &member.role))
.cloned(),
);
}
checks
}
fn verification_check_applies_to_role(check: &VerificationCheck, role: &str) -> bool {
check.roles.is_empty() || check.roles.iter().any(|check_role| check_role == role)
}
fn resolve_target(
member: &FleetMember,
mapping: Option<&RestoreMapping>,
) -> Result<String, RestorePlanError> {
let target = match mapping {
Some(mapping) => mapping
.target_for(&member.canister_id)
.ok_or_else(|| RestorePlanError::MissingMappingSource(member.canister_id.clone()))?
.to_string(),
None => member.canister_id.clone(),
};
if matches!(member.identity_mode, IdentityMode::Fixed) && target != member.canister_id {
return Err(RestorePlanError::FixedIdentityRemap {
source_canister: member.canister_id.clone(),
target_canister: target,
});
}
Ok(target)
}
fn restore_identity_summary(
members: &[RestorePlanMember],
mapping_supplied: bool,
) -> RestoreIdentitySummary {
let mut summary = RestoreIdentitySummary {
mapping_supplied,
all_sources_mapped: false,
fixed_members: 0,
relocatable_members: 0,
in_place_members: 0,
mapped_members: 0,
remapped_members: 0,
};
for member in members {
match member.identity_mode {
IdentityMode::Fixed => summary.fixed_members += 1,
IdentityMode::Relocatable => summary.relocatable_members += 1,
}
if member.source_canister == member.target_canister {
summary.in_place_members += 1;
} else {
summary.remapped_members += 1;
}
if mapping_supplied {
summary.mapped_members += 1;
}
}
summary.all_sources_mapped = mapping_supplied && summary.mapped_members == members.len();
summary
}
fn restore_snapshot_summary(members: &[RestorePlanMember]) -> RestoreSnapshotSummary {
let members_with_module_hash = members
.iter()
.filter(|member| member.source_snapshot.module_hash.is_some())
.count();
let members_with_wasm_hash = members
.iter()
.filter(|member| member.source_snapshot.wasm_hash.is_some())
.count();
let members_with_code_version = members
.iter()
.filter(|member| member.source_snapshot.code_version.is_some())
.count();
let members_with_checksum = members
.iter()
.filter(|member| member.source_snapshot.checksum.is_some())
.count();
RestoreSnapshotSummary {
all_members_have_module_hash: members_with_module_hash == members.len(),
all_members_have_wasm_hash: members_with_wasm_hash == members.len(),
all_members_have_code_version: members_with_code_version == members.len(),
all_members_have_checksum: members_with_checksum == members.len(),
members_with_module_hash,
members_with_wasm_hash,
members_with_code_version,
members_with_checksum,
}
}
fn restore_readiness_summary(
snapshot: &RestoreSnapshotSummary,
verification: &RestoreVerificationSummary,
) -> RestoreReadinessSummary {
let mut reasons = Vec::new();
if !snapshot.all_members_have_module_hash {
reasons.push("missing-module-hash".to_string());
}
if !snapshot.all_members_have_wasm_hash {
reasons.push("missing-wasm-hash".to_string());
}
if !snapshot.all_members_have_code_version {
reasons.push("missing-code-version".to_string());
}
if !snapshot.all_members_have_checksum {
reasons.push("missing-snapshot-checksum".to_string());
}
if !verification.all_members_have_checks {
reasons.push("missing-verification-checks".to_string());
}
RestoreReadinessSummary {
ready: reasons.is_empty(),
reasons,
}
}
fn restore_verification_summary(
manifest: &FleetBackupManifest,
members: &[RestorePlanMember],
) -> RestoreVerificationSummary {
let fleet_checks = manifest.verification.fleet_checks.len();
let member_check_groups = manifest.verification.member_checks.len();
let member_checks = members
.iter()
.map(|member| member.verification_checks.len())
.sum::<usize>();
let members_with_checks = members
.iter()
.filter(|member| !member.verification_checks.is_empty())
.count();
RestoreVerificationSummary {
verification_required: true,
all_members_have_checks: members_with_checks == members.len(),
fleet_checks,
member_check_groups,
member_checks,
members_with_checks,
total_checks: fleet_checks + member_checks,
}
}
const fn restore_operation_summary(
member_count: usize,
verification_summary: &RestoreVerificationSummary,
phases: &[RestorePhase],
) -> RestoreOperationSummary {
RestoreOperationSummary {
planned_snapshot_uploads: member_count,
planned_snapshot_loads: member_count,
planned_code_reinstalls: 0,
planned_verification_checks: verification_summary.total_checks,
planned_operations: member_count + member_count + verification_summary.total_checks,
planned_phases: phases.len(),
}
}
fn validate_restore_group_dependencies(
members: &[RestorePlanMember],
) -> Result<(), RestorePlanError> {
let groups_by_source = members
.iter()
.map(|member| (member.source_canister.as_str(), member.restore_group))
.collect::<BTreeMap<_, _>>();
for member in members {
let Some(parent) = &member.parent_source_canister else {
continue;
};
let Some(parent_group) = groups_by_source.get(parent.as_str()) else {
continue;
};
if *parent_group > member.restore_group {
return Err(RestorePlanError::ParentRestoreGroupAfterChild {
child_source_canister: member.source_canister.clone(),
parent_source_canister: parent.clone(),
child_restore_group: member.restore_group,
parent_restore_group: *parent_group,
});
}
}
Ok(())
}
fn group_and_order_members(
members: Vec<RestorePlanMember>,
) -> Result<Vec<RestorePhase>, RestorePlanError> {
let mut groups = BTreeMap::<u16, Vec<RestorePlanMember>>::new();
for member in members {
groups.entry(member.restore_group).or_default().push(member);
}
groups
.into_iter()
.map(|(restore_group, members)| {
let members = order_group(restore_group, members)?;
Ok(RestorePhase {
restore_group,
members,
})
})
.collect()
}
fn order_group(
restore_group: u16,
members: Vec<RestorePlanMember>,
) -> Result<Vec<RestorePlanMember>, RestorePlanError> {
let mut remaining = members;
let group_sources = remaining
.iter()
.map(|member| member.source_canister.clone())
.collect::<BTreeSet<_>>();
let mut emitted = BTreeSet::new();
let mut ordered = Vec::with_capacity(remaining.len());
while !remaining.is_empty() {
let Some(index) = remaining
.iter()
.position(|member| parent_satisfied(member, &group_sources, &emitted))
else {
return Err(RestorePlanError::RestoreOrderCycle(restore_group));
};
let mut member = remaining.remove(index);
member.phase_order = ordered.len();
member.ordering_dependency = ordering_dependency(&member, &group_sources);
emitted.insert(member.source_canister.clone());
ordered.push(member);
}
Ok(ordered)
}
fn ordering_dependency(
member: &RestorePlanMember,
group_sources: &BTreeSet<String>,
) -> Option<RestoreOrderingDependency> {
let parent_source = member.parent_source_canister.as_ref()?;
let parent_target = member.parent_target_canister.as_ref()?;
let relationship = if group_sources.contains(parent_source) {
RestoreOrderingRelationship::ParentInSameGroup
} else {
RestoreOrderingRelationship::ParentInEarlierGroup
};
Some(RestoreOrderingDependency {
source_canister: parent_source.clone(),
target_canister: parent_target.clone(),
relationship,
})
}
fn restore_ordering_summary(phases: &[RestorePhase]) -> RestoreOrderingSummary {
let mut summary = RestoreOrderingSummary {
phase_count: phases.len(),
dependency_free_members: 0,
in_group_parent_edges: 0,
cross_group_parent_edges: 0,
};
for member in phases.iter().flat_map(|phase| phase.members.iter()) {
match &member.ordering_dependency {
Some(dependency)
if dependency.relationship == RestoreOrderingRelationship::ParentInSameGroup =>
{
summary.in_group_parent_edges += 1;
}
Some(dependency)
if dependency.relationship == RestoreOrderingRelationship::ParentInEarlierGroup =>
{
summary.cross_group_parent_edges += 1;
}
Some(_) => {}
None => summary.dependency_free_members += 1,
}
}
summary
}
fn parent_satisfied(
member: &RestorePlanMember,
group_sources: &BTreeSet<String>,
emitted: &BTreeSet<String>,
) -> bool {
match &member.parent_source_canister {
Some(parent) if group_sources.contains(parent) => emitted.contains(parent),
_ => true,
}
}
fn validate_principal(field: &'static str, value: &str) -> Result<(), RestorePlanError> {
Principal::from_str(value)
.map(|_| ())
.map_err(|_| RestorePlanError::InvalidPrincipal {
field,
value: value.to_string(),
})
}