#![allow(clippy::items_after_statements)]
use std::collections::BTreeSet;
use std::sync::{Arc, RwLock};
use std::vec::Vec;
use miden_client::Word;
use miden_client::account::AccountId;
use miden_client::note::{BlockNumber, NoteTag};
use miden_client::store::{AccountSmtForest, StoreError};
use miden_client::sync::{NoteTagRecord, NoteTagSource, PublicAccountUpdate, StateSyncUpdate};
use miden_client::utils::{Deserializable, Serializable};
use rusqlite::{Connection, Transaction, params};
use super::SqliteStore;
use crate::note::apply_note_updates_tx;
use crate::sql_error::SqlResultExt;
use crate::transaction::upsert_transaction_record;
use crate::{insert_sql, subst};
impl SqliteStore {
pub(crate) fn get_note_tags(conn: &mut Connection) -> Result<Vec<NoteTagRecord>, StoreError> {
const QUERY: &str = "SELECT tag, source FROM tags";
conn.prepare_cached(QUERY)
.into_store_error()?
.query_map([], |row| Ok((row.get(0)?, row.get(1)?)))
.expect("no binding parameters used in query")
.map(|result| {
let (tag, source): (Vec<u8>, Vec<u8>) = result.into_store_error()?;
Ok(NoteTagRecord {
tag: NoteTag::read_from_bytes(&tag)
.map_err(StoreError::DataDeserializationError)?,
source: NoteTagSource::read_from_bytes(&source)
.map_err(StoreError::DataDeserializationError)?,
})
})
.collect::<Result<Vec<NoteTagRecord>, _>>()
}
pub(crate) fn get_unique_note_tags(
conn: &mut Connection,
) -> Result<BTreeSet<NoteTag>, StoreError> {
const QUERY: &str = "SELECT DISTINCT tag FROM tags";
conn.prepare_cached(QUERY)
.into_store_error()?
.query_map([], |row| row.get(0))
.expect("no binding parameters used in query")
.map(|result| {
let tag: Vec<u8> = result.into_store_error()?;
NoteTag::read_from_bytes(&tag).map_err(StoreError::DataDeserializationError)
})
.collect::<Result<BTreeSet<NoteTag>, _>>()
}
pub(super) fn add_note_tag(
conn: &mut Connection,
tag: NoteTagRecord,
) -> Result<bool, StoreError> {
if Self::get_note_tags(conn)?.contains(&tag) {
return Ok(false);
}
let tx = conn.transaction().into_store_error()?;
add_note_tag_tx(&tx, &tag)?;
tx.commit().into_store_error()?;
Ok(true)
}
pub(super) fn remove_note_tag(
conn: &mut Connection,
tag: NoteTagRecord,
) -> Result<usize, StoreError> {
let tx = conn.transaction().into_store_error()?;
let removed_tags = remove_note_tag_tx(&tx, tag)?;
tx.commit().into_store_error()?;
Ok(removed_tags)
}
pub(super) fn get_sync_height(conn: &mut Connection) -> Result<BlockNumber, StoreError> {
const QUERY: &str = "SELECT block_num FROM state_sync";
conn.prepare_cached(QUERY)
.into_store_error()?
.query_map([], |row| row.get(0))
.expect("no binding parameters used in query")
.map(|result| {
let v: i64 = result.into_store_error()?;
Ok(BlockNumber::from(u32::try_from(v).expect("block number is always positive")))
})
.next()
.expect("state sync block number exists")
}
pub(super) fn apply_state_sync(
conn: &mut Connection,
smt_forest: &Arc<RwLock<AccountSmtForest>>,
state_sync_update: StateSyncUpdate,
) -> Result<(), StoreError> {
let StateSyncUpdate {
block_num,
block_updates,
note_updates,
transaction_updates,
account_updates,
} = state_sync_update;
let tx = conn.transaction().into_store_error()?;
const BLOCK_NUMBER_QUERY: &str = "UPDATE state_sync SET block_num = ? WHERE block_num < ?";
tx.execute(
BLOCK_NUMBER_QUERY,
params![i64::from(block_num.as_u32()), i64::from(block_num.as_u32())],
)
.into_store_error()?;
for (block_header, block_has_relevant_notes, new_mmr_peaks) in block_updates.block_headers()
{
Self::insert_block_header_tx(
&tx,
block_header,
new_mmr_peaks,
*block_has_relevant_notes,
)?;
}
Self::insert_partial_blockchain_nodes_tx(&tx, block_updates.new_authentication_nodes())?;
apply_note_updates_tx(&tx, ¬e_updates)?;
let tags_to_remove = note_updates
.updated_input_notes()
.filter_map(|note_update| {
let note = note_update.inner();
if note.is_committed() {
Some(NoteTagRecord {
tag: note.metadata().expect("Committed notes should have metadata").tag(),
source: NoteTagSource::Note(note.id()),
})
} else {
None
}
})
.collect::<Vec<_>>();
for tag in tags_to_remove {
remove_note_tag_tx(&tx, tag)?;
}
for transaction_record in transaction_updates
.committed_transactions()
.chain(transaction_updates.discarded_transactions())
{
upsert_transaction_record(&tx, transaction_record)?;
}
let discarded_states: Vec<(AccountId, Word)> = transaction_updates
.discarded_transactions()
.map(|tx| (tx.details.account_id, tx.details.final_account_state))
.collect();
let mut smt_forest = smt_forest.write().expect("smt_forest write lock not poisoned");
Self::undo_account_state(&tx, &mut smt_forest, &discarded_states)?;
for committed_tx in transaction_updates.committed_transactions() {
smt_forest.commit_roots(committed_tx.details.account_id);
}
for update in account_updates.updated_public_accounts() {
match update {
PublicAccountUpdate::Full(account) => {
Self::update_account_state(&tx, &mut smt_forest, account)?;
},
PublicAccountUpdate::Delta { new_header, delta } => {
Self::apply_sync_account_delta(&tx, &mut smt_forest, new_header, delta)?;
},
}
}
drop(smt_forest);
for (account_id, digest) in account_updates.mismatched_private_accounts() {
Self::lock_account_on_unexpected_commitment(&tx, account_id, digest)?;
}
tx.commit().into_store_error()?;
Ok(())
}
}
pub(super) fn add_note_tag_tx(tx: &Transaction<'_>, tag: &NoteTagRecord) -> Result<(), StoreError> {
const QUERY: &str = insert_sql!(tags { tag, source });
tx.execute(QUERY, params![tag.tag.to_bytes(), tag.source.to_bytes()])
.into_store_error()?;
Ok(())
}
pub(super) fn remove_note_tag_tx(
tx: &Transaction<'_>,
tag: NoteTagRecord,
) -> Result<usize, StoreError> {
const QUERY: &str = "DELETE FROM tags WHERE tag = ? AND source = ?";
let removed_tags = tx
.execute(QUERY, params![tag.tag.to_bytes(), tag.source.to_bytes()])
.into_store_error()?;
Ok(removed_tags)
}