Crate hdi

source ·
Expand description

Holochain Deterministic Integrity (HDI) is Holochain’s data model and integrity toolset for writing zomes.

The logic of a Holochain DNA can be divided into two parts: integrity and coordination. Integrity is the part of the hApp that defines the data types and validates data manipulations. Coordination encompasses the domain logic and implements the functions that manipulate data.


An example of an integrity zome with data definition and data validation can be found in the wasm workspace of the Holochain repository:

Data definition

The DNA’s data model is defined in integrity zomes. They comprise all data type definitions as well as relationships between those types. Integrity zomes are purely definitions and do not contain functions to manipulate the data. Therefore a hApp’s data model is encapsulated and completely independent of the domain logic, which is encoded in coordinator zomes.

The MVC (model, view, controller) design pattern can be used as an analogy. The application’s integrity zomes comprise its model layer — everything that defines the shape of the data. In practice, this means three things:

  • entry type definitions
  • link type definitions
  • a validation callback that constrains the kinds of data that can validly be called entries and links of those types (see also Op).

The coordination zomes comprise the application’s controller layer — the code that actually writes and retrieves data, handles countersigning sessions and sends and receives messages between peers or between a cell and its UI. In other words, all the zome functions, init functions, remote signal receivers, and scheduler callbacks will all live in coordinator zomes.

Advantages of this approach are:

  • The DNA hash is constant as long as the integrity zomes remain the same. The peer network of a DNA is tied to its hash. Changes to the DNA hash result in a new peer network. Changes to the domain logic enclosed in coordinator zomes, however, do not affect the DNA hash. Hence the DNAs and therefore hApps can be modified without creating a new peer network on every deployment.
  • Integrity zomes can be shared among DNAs. Any coordinator zome can import an integrity zome’s data types and implement functions for data manipulation. This composability of integrity and coordinator zomes allows for a multitude of permutations with shared integrity zomes, i. e. a shared data model.

Data validation

The second fundamental part of integrity zomes is data validation. For every operation that is produced by an action, a validation rule can be specified. Both data types and data values can be validated.

All of these validation rules are declared in the validate callback. It is executed for a new action by each validation authority.

There’s a helper type called FlatOp available for easy access to all link and entry variants when validating an operation. In many cases, this type can be easier to work with than the bare Op. FlatOp contains the same information as Op but with a flatter, more accessible data structure than Op’s deeply nested and concise structure.

match op.flattened()? {
    FlatOp::StoreEntry(OpEntry::CreateEntry { app_entry, .. }) => match app_entry {
        EntryTypes::A(_) => Ok(ValidateCallbackResult::Valid),
        EntryTypes::B(_) => Ok(ValidateCallbackResult::Invalid(
            "No Bs allowed in this app".to_string(),
    FlatOp::RegisterCreateLink {
        base_address: _,
        target_address: _,
        tag: _,
        action: _,
    } => match link_type {
        LinkTypes::A => Ok(ValidateCallbackResult::Valid),
        LinkTypes::B => Ok(ValidateCallbackResult::Invalid(
            "No Bs allowed in this app".to_string(),
    _ => Ok(ValidateCallbackResult::Valid),

See an example of the validate callback in an integrity zome in the WASM workspace: Many more validation examples can be browsed in that very workspace.



  • Chain Activity
  • Create and verify signatures for serializable Rust structures and raw binary data.
  • Working with app and system entries.
  • An alternative to [Op] using a flatter structure, and user-defined deserialized entry included where appropriate
  • Functions to generate standardized hashes of Holochain records and arbitrary bytes.
  • The interface between the host and guest is implemented as an HdiT trait.
  • Request contextual information from the Holochain host.
  • Maps a Rust function to an extern that WASM can expose to the Holochain host.
  • Helper types for working with Ops
  • Exports common types and functions according to the Rust prelude pattern.
  • Encryption and decryption using the (secret)box algorithms popularised by Libsodium.


  • Implements conversion traits to allow a struct to be handled as an app entry. If you have some need to implement custom serialization logic or metadata injection you can do so by implementing these traits manually instead.


Attribute Macros