use alloc::vec::Vec;
use miden_crypto::hash::rpo::RpoDigest;
use crate::{
    errors::KernelError,
    utils::{ByteReader, ByteWriter, Deserializable, DeserializationError, Serializable},
};
#[derive(Debug, Clone, Default, PartialEq, Eq)]
pub struct Kernel(Vec<RpoDigest>);
impl Kernel {
    pub const MAX_NUM_PROCEDURES: usize = u8::MAX as usize;
    pub fn new(proc_hashes: &[RpoDigest]) -> Result<Self, KernelError> {
        if proc_hashes.len() > Self::MAX_NUM_PROCEDURES {
            Err(KernelError::TooManyProcedures(Self::MAX_NUM_PROCEDURES, proc_hashes.len()))
        } else {
            let mut hashes = proc_hashes.to_vec();
            hashes.sort_by_key(|v| v.as_bytes()); let duplicated = hashes.windows(2).any(|data| data[0] == data[1]);
            if duplicated {
                Err(KernelError::DuplicatedProcedures)
            } else {
                Ok(Self(hashes))
            }
        }
    }
    pub fn is_empty(&self) -> bool {
        self.0.is_empty()
    }
    pub fn contains_proc(&self, proc_hash: RpoDigest) -> bool {
        self.0.binary_search(&proc_hash).is_ok()
    }
    pub fn proc_hashes(&self) -> &[RpoDigest] {
        &self.0
    }
}
impl Serializable for Kernel {
    fn write_into<W: ByteWriter>(&self, target: &mut W) {
        target.write_u8(self.0.len().try_into().expect("too many kernel procedures"));
        target.write_many(&self.0)
    }
}
impl Deserializable for Kernel {
    fn read_from<R: ByteReader>(source: &mut R) -> Result<Self, DeserializationError> {
        let len = source.read_u8()? as usize;
        let kernel = source.read_many::<RpoDigest>(len)?;
        Ok(Self(kernel))
    }
}