mod response_ext;
pub use response_ext::ResponseExt;
use tap::Pipe;
use tonic::metadata::MetadataMap;
use crate::field_mask::FieldMaskUtil;
use crate::proto::node::v2::node_service_client::NodeServiceClient;
use crate::proto::node::v2::{
EffectsFinality, ExecuteTransactionResponse, GetCheckpointResponse, GetFullCheckpointResponse,
GetObjectResponse,
};
use crate::proto::types::Bcs;
use crate::proto::TryFromProtoError;
use prost_types::FieldMask;
use sui_types::base_types::{ObjectID, SequenceNumber};
use sui_types::effects::{TransactionEffects, TransactionEvents};
use sui_types::full_checkpoint_content::CheckpointData;
use sui_types::messages_checkpoint::{CertifiedCheckpointSummary, CheckpointSequenceNumber};
use sui_types::object::Object;
use sui_types::transaction::Transaction;
pub type Result<T, E = tonic::Status> = std::result::Result<T, E>;
pub type BoxError = Box<dyn std::error::Error + Send + Sync + 'static>;
use tonic::transport::channel::ClientTlsConfig;
use tonic::Status;
#[derive(Clone)]
pub struct Client {
#[allow(unused)]
uri: http::Uri,
channel: tonic::transport::Channel,
auth: AuthInterceptor,
}
impl Client {
pub fn new<T>(uri: T) -> Result<Self>
where
T: TryInto<http::Uri>,
T::Error: Into<BoxError>,
{
let uri = uri
.try_into()
.map_err(Into::into)
.map_err(Status::from_error)?;
let mut endpoint = tonic::transport::Endpoint::from(uri.clone());
if uri.scheme() == Some(&http::uri::Scheme::HTTPS) {
endpoint = endpoint
.tls_config(ClientTlsConfig::new().with_enabled_roots())
.map_err(Into::into)
.map_err(Status::from_error)?;
}
let channel = endpoint.connect_lazy();
Ok(Self {
uri,
channel,
auth: Default::default(),
})
}
pub fn with_auth(mut self, auth: AuthInterceptor) -> Self {
self.auth = auth;
self
}
pub fn raw_client(
&self,
) -> NodeServiceClient<
tonic::service::interceptor::InterceptedService<tonic::transport::Channel, AuthInterceptor>,
> {
NodeServiceClient::with_interceptor(self.channel.clone(), self.auth.clone())
}
pub async fn get_latest_checkpoint(&self) -> Result<CertifiedCheckpointSummary> {
self.get_checkpoint_internal(None).await
}
pub async fn get_checkpoint_summary(
&self,
sequence_number: CheckpointSequenceNumber,
) -> Result<CertifiedCheckpointSummary> {
self.get_checkpoint_internal(Some(sequence_number)).await
}
async fn get_checkpoint_internal(
&self,
sequence_number: Option<CheckpointSequenceNumber>,
) -> Result<CertifiedCheckpointSummary> {
let request = crate::proto::node::v2::GetCheckpointRequest {
sequence_number,
digest: None,
read_mask: FieldMask::from_paths(["summary_bcs", "signature"]).pipe(Some),
};
let (
metadata,
GetCheckpointResponse {
summary_bcs,
signature,
..
},
_extentions,
) = self
.raw_client()
.get_checkpoint(request)
.await?
.into_parts();
certified_checkpoint_summary_try_from_proto(summary_bcs, signature)
.map_err(|e| status_from_error_with_metadata(e, metadata))
}
pub async fn get_full_checkpoint(
&self,
sequence_number: CheckpointSequenceNumber,
) -> Result<CheckpointData> {
let request = crate::proto::node::v2::GetFullCheckpointRequest {
sequence_number: Some(sequence_number),
digest: None,
read_mask: FieldMask::from_paths([
"summary_bcs",
"signature",
"contents_bcs",
"transactions.transaction_bcs",
"transactions.effects_bcs",
"transactions.events_bcs",
"transactions.input_objects.object_bcs",
"transactions.output_objects.object_bcs",
])
.pipe(Some),
};
let (metadata, response, _extentions) = self
.raw_client()
.max_decoding_message_size(128 * 1024 * 1024)
.get_full_checkpoint(request)
.await?
.into_parts();
checkpoint_data_try_from_proto(response)
.map_err(|e| status_from_error_with_metadata(e, metadata))
}
pub async fn get_object(&self, object_id: ObjectID) -> Result<Object> {
self.get_object_internal(object_id, None).await
}
pub async fn get_object_with_version(
&self,
object_id: ObjectID,
version: SequenceNumber,
) -> Result<Object> {
self.get_object_internal(object_id, Some(version.value()))
.await
}
async fn get_object_internal(
&self,
object_id: ObjectID,
version: Option<u64>,
) -> Result<Object> {
let request = crate::proto::node::v2::GetObjectRequest {
object_id: Some(sui_sdk_types::ObjectId::from(object_id).into()),
version,
read_mask: FieldMask::from_paths(["object_bcs"]).pipe(Some),
};
let (metadata, GetObjectResponse { object_bcs, .. }, _extentions) =
self.raw_client().get_object(request).await?.into_parts();
object_try_from_proto(object_bcs).map_err(|e| status_from_error_with_metadata(e, metadata))
}
pub async fn execute_transaction(
&self,
transaction: &Transaction,
) -> Result<TransactionExecutionResponse> {
let signatures = transaction
.inner()
.tx_signatures
.iter()
.map(|signature| signature.as_ref().to_vec().into())
.collect();
let request = crate::proto::node::v2::ExecuteTransactionRequest {
transaction: None,
transaction_bcs: Some(
crate::proto::types::Bcs::serialize(&transaction.inner().intent_message.value)
.map_err(|e| Status::from_error(e.into()))?,
),
signatures: Vec::new(),
signatures_bytes: signatures,
read_mask: FieldMask::from_paths([
"finality",
"effects_bcs",
"events_bcs",
"balance_changes",
])
.pipe(Some),
};
let (metadata, response, _extentions) = self
.raw_client()
.execute_transaction(request)
.await?
.into_parts();
execute_transaction_response_try_from_proto(response)
.map_err(|e| status_from_error_with_metadata(e, metadata))
}
}
#[derive(Debug)]
pub struct TransactionExecutionResponse {
pub finality: EffectsFinality,
pub effects: TransactionEffects,
pub events: Option<TransactionEvents>,
pub balance_changes: Vec<sui_sdk_types::BalanceChange>,
}
fn certified_checkpoint_summary_try_from_proto(
summary_bcs: Option<Bcs>,
signature: Option<crate::proto::types::ValidatorAggregatedSignature>,
) -> Result<CertifiedCheckpointSummary, TryFromProtoError> {
let summary = summary_bcs
.ok_or_else(|| TryFromProtoError::missing("summary_bcs"))?
.deserialize()
.map_err(TryFromProtoError::from_error)?;
let signature = sui_types::crypto::AuthorityStrongQuorumSignInfo::from(
sui_sdk_types::ValidatorAggregatedSignature::try_from(
signature
.as_ref()
.ok_or_else(|| TryFromProtoError::missing("signature"))?,
)
.map_err(TryFromProtoError::from_error)?,
);
Ok(CertifiedCheckpointSummary::new_from_data_and_sig(
summary, signature,
))
}
fn checkpoint_data_try_from_proto(
GetFullCheckpointResponse {
summary_bcs,
signature,
contents_bcs,
transactions,
..
}: GetFullCheckpointResponse,
) -> Result<CheckpointData, TryFromProtoError> {
let checkpoint_summary = certified_checkpoint_summary_try_from_proto(summary_bcs, signature)?;
let checkpoint_contents = contents_bcs
.ok_or_else(|| TryFromProtoError::missing("contents_bcs"))?
.deserialize::<sui_types::messages_checkpoint::CheckpointContents>()
.map_err(TryFromProtoError::from_error)?;
let transactions = transactions
.into_iter()
.zip(
checkpoint_contents
.clone()
.into_iter_with_signatures()
.map(|(_digests, signatures)| signatures),
)
.map(
|(
crate::proto::node::v2::FullCheckpointTransaction {
transaction_bcs,
effects_bcs,
events_bcs,
input_objects,
output_objects,
..
},
signatures,
)| {
let transaction = transaction_bcs
.ok_or_else(|| TryFromProtoError::missing("transaction_bcs"))?
.deserialize()
.map_err(TryFromProtoError::from_error)?;
let transaction = Transaction::from_generic_sig_data(transaction, signatures);
let effects = effects_bcs
.ok_or_else(|| TryFromProtoError::missing("effects_bcs"))?
.deserialize()
.map_err(TryFromProtoError::from_error)?;
let events = events_bcs
.map(|bcs| bcs.deserialize())
.transpose()
.map_err(TryFromProtoError::from_error)?;
let input_objects = input_objects
.into_iter()
.map(|object| object_try_from_proto(object.object_bcs))
.collect::<Result<_, TryFromProtoError>>()?;
let output_objects = output_objects
.into_iter()
.map(|object| object_try_from_proto(object.object_bcs))
.collect::<Result<_, TryFromProtoError>>()?;
Result::<_, TryFromProtoError>::Ok(
sui_types::full_checkpoint_content::CheckpointTransaction {
transaction,
effects,
events,
input_objects,
output_objects,
},
)
},
)
.collect::<Result<_, _>>()?;
Ok(CheckpointData {
checkpoint_summary,
checkpoint_contents,
transactions,
})
}
fn object_try_from_proto(object_bcs: Option<Bcs>) -> Result<Object, TryFromProtoError> {
object_bcs
.as_ref()
.ok_or_else(|| TryFromProtoError::missing("object_bcs"))?
.deserialize()
.map_err(TryFromProtoError::from_error)
}
fn execute_transaction_response_try_from_proto(
ExecuteTransactionResponse {
finality,
effects_bcs,
events_bcs,
balance_changes,
..
}: ExecuteTransactionResponse,
) -> Result<TransactionExecutionResponse, TryFromProtoError> {
let finality = finality.ok_or_else(|| TryFromProtoError::missing("finality"))?;
let effects = effects_bcs
.ok_or_else(|| TryFromProtoError::missing("effects_bcs"))?
.deserialize()
.map_err(TryFromProtoError::from_error)?;
let events = events_bcs
.map(|bcs| bcs.deserialize())
.transpose()
.map_err(TryFromProtoError::from_error)?;
let balance_changes = balance_changes
.iter()
.map(TryInto::try_into)
.collect::<Result<_, _>>()?;
TransactionExecutionResponse {
finality,
effects,
events,
balance_changes,
}
.pipe(Ok)
}
fn status_from_error_with_metadata<T: Into<BoxError>>(err: T, metadata: MetadataMap) -> Status {
let mut status = Status::from_error(err.into());
*status.metadata_mut() = metadata;
status
}
#[derive(Clone, Debug, Default)]
pub struct AuthInterceptor {
auth: Option<tonic::metadata::MetadataValue<tonic::metadata::Ascii>>,
}
impl AuthInterceptor {
pub fn basic<U, P>(username: U, password: Option<P>) -> Self
where
U: std::fmt::Display,
P: std::fmt::Display,
{
use base64::prelude::BASE64_STANDARD;
use base64::write::EncoderWriter;
use std::io::Write;
let mut buf = b"Basic ".to_vec();
{
let mut encoder = EncoderWriter::new(&mut buf, &BASE64_STANDARD);
let _ = write!(encoder, "{username}:");
if let Some(password) = password {
let _ = write!(encoder, "{password}");
}
}
let mut header = tonic::metadata::MetadataValue::try_from(buf)
.expect("base64 is always valid HeaderValue");
header.set_sensitive(true);
Self { auth: Some(header) }
}
pub fn bearer<T>(token: T) -> Self
where
T: std::fmt::Display,
{
let header_value = format!("Bearer {token}");
let mut header = tonic::metadata::MetadataValue::try_from(header_value)
.expect("token is always valid HeaderValue");
header.set_sensitive(true);
Self { auth: Some(header) }
}
}
impl tonic::service::Interceptor for AuthInterceptor {
fn call(
&mut self,
mut request: tonic::Request<()>,
) -> std::result::Result<tonic::Request<()>, Status> {
if let Some(auth) = self.auth.clone() {
request
.metadata_mut()
.insert(http::header::AUTHORIZATION.as_str(), auth);
}
Ok(request)
}
}