wip: work on deserialization

This commit is contained in:
Greg Heartsfield 2022-10-13 18:24:10 -05:00
parent 43b738c434
commit b3fe03279b
3 changed files with 65 additions and 4 deletions

13
Cargo.lock generated
View File

@ -1046,6 +1046,7 @@ dependencies = [
"secp256k1", "secp256k1",
"serde", "serde",
"serde_json", "serde_json",
"serde_urlencoded",
"thiserror", "thiserror",
"tokio", "tokio",
"tokio-tungstenite", "tokio-tungstenite",
@ -1766,6 +1767,18 @@ dependencies = [
"serde", "serde",
] ]
[[package]]
name = "serde_urlencoded"
version = "0.7.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d3491c14715ca2294c4d6a88f15e84739788c1d030eed8c110436aafdaa2f3fd"
dependencies = [
"form_urlencoded",
"itoa",
"ryu",
"serde",
]
[[package]] [[package]]
name = "sha-1" name = "sha-1"
version = "0.10.0" version = "0.10.0"

View File

@ -32,6 +32,7 @@ http = { version = "0.2" }
parse_duration = "2" parse_duration = "2"
rand = "0.8" rand = "0.8"
const_format = "0.2.28" const_format = "0.2.28"
serde_urlencoded = "0.7"
[dev-dependencies] [dev-dependencies]
anyhow = "1" anyhow = "1"

View File

@ -5,7 +5,7 @@
//use bitcoin_hashes::{sha256, Hash}; //use bitcoin_hashes::{sha256, Hash};
//use lazy_static::lazy_static; //use lazy_static::lazy_static;
//use secp256k1::{schnorr, Secp256k1, VerifyOnly, XOnlyPublicKey}; //use secp256k1::{schnorr, Secp256k1, VerifyOnly, XOnlyPublicKey};
use serde::{Deserialize, Serialize}; use serde::{Deserializer, Deserialize, Serialize};
//use serde_json::value::Value; //use serde_json::value::Value;
//use serde_json::Number; //use serde_json::Number;
//use std::collections::HashMap; //use std::collections::HashMap;
@ -33,6 +33,11 @@ use serde::{Deserialize, Serialize};
// different condition strings, since we do not support grouping or // different condition strings, since we do not support grouping or
// "OR" logic. // "OR" logic.
// using serde_urldecode, we can get a serde data format from the
// condition string. We will then map that with a deserializer that
// maps to a ConditionQuery.
#[derive(Serialize, Deserialize, PartialEq, Eq, Debug, Clone)] #[derive(Serialize, Deserialize, PartialEq, Eq, Debug, Clone)]
pub enum Field { pub enum Field {
Kind, Kind,
@ -48,16 +53,45 @@ pub enum Operator {
} }
#[derive(Serialize, Deserialize, PartialEq, Eq, Debug, Clone)] #[derive(Serialize, Deserialize, PartialEq, Eq, Debug, Clone)]
/// Values are the data associated with a restriction. For now, these can only be a single numbers.
pub enum Value { pub enum Value {
Number(u64), Number(u64),
List(Vec<Value>), }
#[derive(Serialize, PartialEq, Eq, Debug, Clone)]
pub struct ConditionQuery {
pub(crate) conditions: Vec<Condition>,
}
impl <'de> Deserialize<'de> for ConditionQuery {
fn deserialize<D>(d: D) -> Result<ConditionQuery, D::Error>
where
D: Deserializer<'de>,
{
// recv'd is an array of pairs.
let _recvd: Value = d.deserialize_seq
let cond_list = recvd.as_object().ok_or_else(|| {
serde::de::Error::invalid_type(
Unexpected::Other("reqfilter is not an object"),
&"a json object",
)
})?;
// all valid conditions will be put into this vec
let conditions : Vec<Condition> = vec![];
// loop through the parsed value, and identify if they are
// known attributes. unknown attributes will trigger failure,
// since we can't respect those restrictions.
Ok(ConditionQuery{conditions})
}
} }
/// Parsed delegation statement /// Parsed delegation statement
#[derive(Serialize, Deserialize, PartialEq, Eq, Debug, Clone)] #[derive(Serialize, Deserialize, PartialEq, Eq, Debug, Clone)]
pub struct Delegation { pub struct Delegation {
pub(crate) pubkey: String, pub(crate) pubkey: String,
pub(crate) conditions: Vec<Condition>, pub(crate) condition_query: ConditionQuery,
pub(crate) signature: String, pub(crate) signature: String,
} }
@ -68,5 +102,18 @@ pub struct Delegation {
pub struct Condition { pub struct Condition {
pub(crate) field: Field, pub(crate) field: Field,
pub(crate) operator: Operator, pub(crate) operator: Operator,
pub(crate) value: Value, pub(crate) values: Vec<Value>,
}
#[cfg(test)]
mod tests {
use super::*;
// parse condition strings
#[test]
fn parse_empty() {
// given an empty condition query, produce an empty vector
assert_eq!(Delegation::from(""), vec![]);
assert_eq!(serde_urlencoded::from_str::<Vec<(String, String)>>(""), vec![]);
}
} }