sui_indexer_alt_jsonrpc/api/name_service/
response.rs

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
// Copyright (c) Mysten Labs, Inc.
// SPDX-License-Identifier: Apache-2.0

use anyhow::Context as _;
use diesel::{ExpressionMethods, QueryDsl};
use futures::future::OptionFuture;
use sui_indexer_alt_schema::schema::watermarks;
use sui_name_service::{Domain, NameRecord, NameServiceError};
use sui_types::{base_types::SuiAddress, dynamic_field::Field};
use tokio::join;

use crate::{
    context::Context,
    data::objects::load_live,
    error::{invalid_params, InternalContext, RpcError},
};

use super::Error;

/// Attempt to to translate the given SuiNS `name` to its address, as long as the mapping exists,
/// and it hasn't expired.
pub(super) async fn resolved_address(
    ctx: &Context,
    name: &str,
) -> Result<Option<SuiAddress>, RpcError<Error>> {
    use Error as E;

    let domain: Domain = name
        .parse()
        .map_err(|e| invalid_params(E::NameService(e)))?;

    let config = &ctx.config().name_service;
    let domain_record_id = config.record_field_id(&domain);
    let parent_record_id = config.record_field_id(&domain.parent());

    let domain_object = load_live(ctx, domain_record_id);
    let parent_object: OptionFuture<_> = domain
        .is_subdomain()
        .then(|| load_live(ctx, parent_record_id))
        .into();

    // Fetch the current timestamp, the domain record. If the domain being resolved is a
    // sub-domain, then also fetch the parent record, because its expiry is controlled by its
    // parent's.
    let (timestamp_ms, domain_object, parent_object) =
        join!(latest_timestamp_ms(ctx), domain_object, parent_object);

    let timestamp_ms = timestamp_ms.context("Failed to fetch latest timestamp")?;

    let Some(domain_object) = domain_object.context("Failed to fetch domain record")? else {
        return Err(invalid_params(E::NotFound(domain.to_string())));
    };

    let domain_record =
        NameRecord::try_from(domain_object).context("Failed to deserialize domain record")?;

    // If the domain being fetched is not a leaf node, then check its expiry directly.
    if !domain_record.is_leaf_record() {
        return if !domain_record.is_node_expired(timestamp_ms) {
            Ok(domain_record.target_address)
        } else {
            return Err(invalid_params(E::NameService(
                NameServiceError::NameExpired,
            )));
        };
    }

    // Otherwise its expiry depends on its parent's record: It must exist, and the domain's record
    // must recognise the fetched parent as its parent, and the parent must not be expired.
    let Some(parent_object) = parent_object
        .transpose()
        .context("Failed to fetch parent record")?
        .flatten()
    else {
        // If the domain object exists but the parent object does not, it could indicate the
        // sub-domain has expired because the parent has been re-registered.
        return Err(invalid_params(E::NotFound(domain.parent().to_string())));
    };

    let parent_record =
        NameRecord::try_from(parent_object).context("Failed to deserialize parent record")?;

    if parent_record.is_valid_leaf_parent(&domain_record)
        && !parent_record.is_node_expired(timestamp_ms)
    {
        Ok(domain_record.target_address)
    } else {
        Err(invalid_params(E::NameService(
            NameServiceError::NameExpired,
        )))
    }
}

/// Attempt to to translate the given `address` to its SuiNS name, as long as the reverse mapping
/// exists, and the forward mapping points to the address.
pub(super) async fn resolved_name(
    ctx: &Context,
    address: SuiAddress,
) -> Result<Option<String>, RpcError<Error>> {
    let config = &ctx.config().name_service;

    let reverse_record_id = config.reverse_record_field_id(address.as_ref());
    let Some(reverse_record_object) = load_live(ctx, reverse_record_id)
        .await
        .context("Failed to fetch reverse record")?
    else {
        return Ok(None);
    };

    let reverse_record: Field<SuiAddress, Domain> = bcs::from_bytes(
        reverse_record_object
            .data
            .try_as_move()
            .context("Reverse record not a Move object")?
            .contents(),
    )
    .context("Failed to deserialize reverse record")?;

    // Before returning the domain, check that it is still valid. If forward resolution fails with
    // a user error, it means the reverse record is no longer valid. Internal errors are unexpected
    // and should be propagated.
    //
    // There is strong on-chain enforcement that the forward and reverse mappings are consistent
    // with each other, so we don't need to check the forward mapping, if we find one.
    let domain = reverse_record.value.to_string();
    match resolved_address(ctx, &domain).await {
        Ok(Some(_)) => Ok(Some(domain)),
        Ok(None) | Err(RpcError::InvalidParams(_)) => Ok(None),
        Err(e) => Err(e).internal_context("Failed to resolve address"),
    }
}

/// Fetch the latest timestamp from the database, based on the watermark for the `obj_info`
/// pipeline, because we know that the `obj_info` pipeline is being queried as part of address
/// resolution.
async fn latest_timestamp_ms(ctx: &Context) -> Result<u64, RpcError<Error>> {
    use watermarks::dsl as w;

    let mut conn = ctx
        .pg_reader()
        .connect()
        .await
        .context("Failed to connect to database")?;

    let query = w::watermarks
        .select(w::timestamp_ms_hi_inclusive)
        .filter(w::pipeline.eq("obj_info"));

    let timestamp_ms: i64 = conn
        .first(query)
        .await
        .context("Failed to fetch latest timestamp")?;

    Ok(timestamp_ms as u64)
}