@kubun/plugin-p2p 0.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/LICENSE.md +57 -0
  2. package/lib/context/join.d.ts +4 -0
  3. package/lib/context/join.js +1 -0
  4. package/lib/context/space.d.ts +4 -0
  5. package/lib/context/space.js +1 -0
  6. package/lib/context/sync.d.ts +3 -0
  7. package/lib/context/sync.js +1 -0
  8. package/lib/context/types.d.ts +35 -0
  9. package/lib/context/types.js +1 -0
  10. package/lib/index.d.ts +25 -0
  11. package/lib/index.js +1 -0
  12. package/lib/migrations.d.ts +8 -0
  13. package/lib/migrations.js +1 -0
  14. package/lib/protocol.d.ts +175 -0
  15. package/lib/protocol.js +1 -0
  16. package/lib/schema.d.ts +3 -0
  17. package/lib/schema.js +187 -0
  18. package/lib/spaces/broadcast-codec.d.ts +3 -0
  19. package/lib/spaces/broadcast-codec.js +1 -0
  20. package/lib/spaces/broadcast-service.d.ts +59 -0
  21. package/lib/spaces/broadcast-service.js +1 -0
  22. package/lib/spaces/broadcast.d.ts +65 -0
  23. package/lib/spaces/broadcast.js +1 -0
  24. package/lib/spaces/events.d.ts +38 -0
  25. package/lib/spaces/events.js +1 -0
  26. package/lib/spaces/group-handle.d.ts +3 -0
  27. package/lib/spaces/group-handle.js +1 -0
  28. package/lib/spaces/invite-payload.d.ts +24 -0
  29. package/lib/spaces/invite-payload.js +1 -0
  30. package/lib/spaces/join-utils.d.ts +22 -0
  31. package/lib/spaces/join-utils.js +1 -0
  32. package/lib/spaces/manager.d.ts +147 -0
  33. package/lib/spaces/manager.js +1 -0
  34. package/lib/spaces/mls-json.d.ts +2 -0
  35. package/lib/spaces/mls-json.js +1 -0
  36. package/lib/spaces/mls-state.d.ts +27 -0
  37. package/lib/spaces/mls-state.js +1 -0
  38. package/lib/sync/catalog-scope.d.ts +17 -0
  39. package/lib/sync/catalog-scope.js +1 -0
  40. package/lib/sync/handlers.d.ts +19 -0
  41. package/lib/sync/handlers.js +1 -0
  42. package/lib/sync/merkle-apply.d.ts +12 -0
  43. package/lib/sync/merkle-apply.js +1 -0
  44. package/lib/sync/merkle-tree.d.ts +13 -0
  45. package/lib/sync/merkle-tree.js +1 -0
  46. package/lib/sync/peer-registry.d.ts +31 -0
  47. package/lib/sync/peer-registry.js +1 -0
  48. package/lib/sync/sync-client.d.ts +68 -0
  49. package/lib/sync/sync-client.js +1 -0
  50. package/lib/sync/sync-manager.d.ts +61 -0
  51. package/lib/sync/sync-manager.js +1 -0
  52. package/lib/types.d.ts +148 -0
  53. package/lib/types.js +1 -0
  54. package/package.json +64 -0
package/LICENSE.md ADDED
@@ -0,0 +1,57 @@
1
+ # The Prosperity Public License 3.0.0
2
+
3
+ Contributor: Paul Le Cam
4
+
5
+ Source Code: https://github.com/PaulLeCam/kubun
6
+
7
+ ## Purpose
8
+
9
+ This license allows you to use and share this software for noncommercial purposes for free and to try this software for commercial purposes for thirty days.
10
+
11
+ ## Agreement
12
+
13
+ In order to receive this license, you have to agree to its rules. Those rules are both obligations under that agreement and conditions to your license. Don't do anything with this software that triggers a rule you can't or won't follow.
14
+
15
+ ## Notices
16
+
17
+ Make sure everyone who gets a copy of any part of this software from you, with or without changes, also gets the text of this license and the contributor and source code lines above.
18
+
19
+ ## Commercial Trial
20
+
21
+ Limit your use of this software for commercial purposes to a thirty-day trial period. If you use this software for work, your company gets one trial period for all personnel, not one trial per person.
22
+
23
+ ## Contributions Back
24
+
25
+ Developing feedback, changes, or additions that you contribute back to the contributor on the terms of a standardized public software license such as [the Blue Oak Model License 1.0.0](https://blueoakcouncil.org/license/1.0.0), [the Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0.html), [the MIT license](https://spdx.org/licenses/MIT.html), or [the two-clause BSD license](https://spdx.org/licenses/BSD-2-Clause.html) doesn't count as use for a commercial purpose.
26
+
27
+ ## Personal Uses
28
+
29
+ Personal use for research, experiment, and testing for the benefit of public knowledge, personal study, private entertainment, hobby projects, amateur pursuits, or religious observance, without any anticipated commercial application, doesn't count as use for a commercial purpose.
30
+
31
+ ## Noncommercial Organizations
32
+
33
+ Use by any charitable organization, educational institution, public research organization, public safety or health organization, environmental protection organization, or government institution doesn't count as use for a commercial purpose regardless of the source of funding or obligations resulting from the funding.
34
+
35
+ ## Defense
36
+
37
+ Don't make any legal claim against anyone accusing this software, with or without changes, alone or with other technology, of infringing any patent.
38
+
39
+ ## Copyright
40
+
41
+ The contributor licenses you to do everything with this software that would otherwise infringe their copyright in it.
42
+
43
+ ## Patent
44
+
45
+ The contributor licenses you to do everything with this software that would otherwise infringe any patents they can license or become able to license.
46
+
47
+ ## Reliability
48
+
49
+ The contributor can't revoke this license.
50
+
51
+ ## Excuse
52
+
53
+ You're excused for unknowingly breaking [Notices](#notices) if you take all practical steps to comply within thirty days of learning you broke the rule.
54
+
55
+ ## No Liability
56
+
57
+ ***As far as the law allows, this software comes as is, without any warranty or condition, and the contributor won't be liable to anyone for any damages related to this software or this license, under any kind of legal claim.***
@@ -0,0 +1,4 @@
1
+ import type { ExecutionContext } from '@kubun/engine';
2
+ import type { P2PJoinRequestContext } from '../types.js';
3
+ import type { ContextDeps } from './types.js';
4
+ export declare function createJoinContext(ctx: ExecutionContext, deps: ContextDeps): P2PJoinRequestContext;
@@ -0,0 +1 @@
1
+ import{createKeyPackageBundle as e}from"@enkaku/group";import{decodeInvitePayload as i,encodeJoinRequest as t}from"../spaces/invite-payload.js";import{createSpaceFromJoin as a}from"../spaces/join-utils.js";import{checkPeerAccess as r}from"./types.js";export function createJoinContext(n,p){return{p2pPrepareJoinRequest:async()=>{r(n.viewerDID,p.identity.id,p.autoAcceptPeers);let i=p.identity,a=await e(i);return p.pendingJoinRequests.set(n.viewerDID,{publicPackage:a.publicPackage,privatePackage:a.privatePackage,did:i.id}),{joinRequest:t({did:i.id,publicPackage:a.publicPackage})}},p2pCompleteJoin:async e=>{r(n.viewerDID,p.identity.id,p.autoAcceptPeers);let t=p.pendingJoinRequests.get(n.viewerDID);if(null==t)throw Error("No pending join request found — call prepareJoinRequest first");let c=await p.getDB(),o=p.identity,s=i(e),d={publicPackage:t.publicPackage,privatePackage:t.privatePackage,ownerDID:o.id};await p.spaceManager.joinSpace({identity:o,spaceID:s.spaceID,invite:s.invite,keyPackageBundle:d,welcomeMessage:s.welcomeMessage,ratchetTree:s.ratchetTree},c);let u=await a({db:c,adapter:p.adapter,hlc:p.hlc,emitter:p.emitter,identity:o,invite:s});return p.pendingJoinRequests.delete(n.viewerDID),u}}}
@@ -0,0 +1,4 @@
1
+ import type { ExecutionContext } from '@kubun/engine';
2
+ import type { SpaceRequestContext } from '../types.js';
3
+ import type { ContextDeps } from './types.js';
4
+ export declare function createSpaceContext(ctx: ExecutionContext, deps: ContextDeps): SpaceRequestContext;
@@ -0,0 +1 @@
1
+ import{HLC as e}from"@kubun/hlc";import{restoreGroupHandle as t}from"../spaces/group-handle.js";import{decodeFullJoinRequest as a,decodeInvitePayload as r,decodeJoinRequest as i,encodeInvitePayload as c}from"../spaces/invite-payload.js";import{createSpaceFromJoin as l}from"../spaces/join-utils.js";import{checkPeerAccess as s,normalizeCredential as d,toISO as n}from"./types.js";export function createSpaceContext(p,o){return{spaceCreateSpace:async e=>await p.transaction(async t=>{let a=t.db,r=await o.spaceManager.createSpace({identity:o.identity,name:e.name,description:e.description},a);await t.db.updateTable("kubun_spaces").set({created_by:p.viewerDID}).where("id","=",r.spaceID).execute();let i=await t.db.selectFrom("kubun_spaces").selectAll().where("id","=",r.spaceID).executeTakeFirst();if(null==i)throw Error("Failed to create space");t.emit("space:created",{spaceID:r.spaceID});let c={id:i.id,name:i.name,description:i.description,createdBy:i.created_by,createdAt:n(i.created_at)};return await o.emitter.emit("spaceJoined",c),c}),spaceGetSpaces:async()=>{let e=await o.getDB();return(await e.selectFrom("kubun_spaces").selectAll().execute()).map(e=>({id:e.id,name:e.name,description:e.description,createdBy:e.created_by,createdAt:n(e.created_at)}))},spaceGetSpace:async e=>{let t=await o.getDB(),a=await t.selectFrom("kubun_spaces").selectAll().where("id","=",e).executeTakeFirst();return null==a?null:{id:a.id,name:a.name,description:a.description,createdBy:a.created_by,createdAt:n(a.created_at)}},spaceAddSpaceMember:async(e,t,a)=>{let r=await o.getDB();await r.insertInto("kubun_space_members").values({space_id:e,member_did:t,role:a}).onConflict(e=>e.columns(["space_id","member_did"]).doUpdateSet(e=>({role:e.ref("excluded.role"),updated_at:o.adapter.encodeTimestamp(new Date)}))).execute();let i=await r.selectFrom("kubun_space_members").selectAll().where("space_id","=",e).where("member_did","=",t).executeTakeFirst();if(null==i)throw Error("Failed to add space member");let c={spaceID:i.space_id,memberDID:i.member_did,role:i.role,createdAt:n(i.created_at)};return await o.emitter.emit("spaceMemberJoined",{...c,spaceID:c.spaceID}),c},spaceGetSpaceMembers:async e=>{let t=await o.getDB();return(await t.selectFrom("kubun_space_members").selectAll().where("space_id","=",e).execute()).map(e=>({spaceID:e.space_id,memberDID:e.member_did,role:e.role,createdAt:n(e.created_at)}))},spaceCreateCircle:async e=>{let t=await o.spaceManager.createCircle({spaceID:e.spaceID,name:e.name,description:e.description}),a=await o.getDB(),r=await a.selectFrom("kubun_circles").selectAll().where("id","=",t.circleID).executeTakeFirst();if(null==r)throw Error("Failed to create circle");let i={id:r.id,spaceID:r.space_id,name:r.name,description:r.description,createdAt:n(r.created_at)};return await o.emitter.emit("circleCreated",{...i,spaceID:i.spaceID}),i},spaceGetCircles:async e=>{let t=await o.getDB();return(await t.selectFrom("kubun_circles").selectAll().where("space_id","=",e).execute()).map(e=>({id:e.id,spaceID:e.space_id,name:e.name,description:e.description,createdAt:n(e.created_at)}))},spaceAddCircleMember:async(t,a,r)=>{let i=await o.getDB(),c=e.serialize(o.hlc.now());await i.insertInto("kubun_circle_members").values({circle_id:t,member_did:a,role:r,hlc:c}).onConflict(e=>e.columns(["circle_id","member_did"]).doUpdateSet(e=>({role:e.ref("excluded.role"),hlc:e.ref("excluded.hlc")}))).execute();let l=await i.selectFrom("kubun_circle_members").selectAll().where("circle_id","=",t).where("member_did","=",a).executeTakeFirst();if(null==l)throw Error("Failed to add circle member");let s={circleID:l.circle_id,memberDID:l.member_did,role:l.role,createdAt:n(l.created_at)};return await o.emitter.emit("circleMemberAdded",{...s,circleID:s.circleID}),s},spaceCreateCatalog:async t=>{let a=await o.getDB(),r=o.runtime.getRandomID(),i=e.serialize(o.hlc.now());await a.insertInto("kubun_catalogs").values({id:r,owner_did:p.viewerDID,name:t.name,description:t.description??"",filter_criteria:o.adapter.encodeJSON("string"==typeof t.filterCriteria?JSON.parse(t.filterCriteria):t.filterCriteria),hlc:i}).execute();let c=await a.selectFrom("kubun_catalogs").selectAll().where("id","=",r).executeTakeFirst();if(null==c)throw Error("Failed to create catalog");return{id:c.id,ownerDID:c.owner_did,name:c.name,description:c.description,filterCriteria:"string"==typeof c.filter_criteria?c.filter_criteria:JSON.stringify(c.filter_criteria),createdAt:n(c.created_at)}},spaceGetCatalogs:async e=>{let t=(await o.getDB()).selectFrom("kubun_catalogs").selectAll();return null!=e&&(t=t.where("owner_did","=",e)),(await t.execute()).map(e=>({id:e.id,ownerDID:e.owner_did,name:e.name,description:e.description,filterCriteria:"string"==typeof e.filter_criteria?e.filter_criteria:JSON.stringify(e.filter_criteria),createdAt:n(e.created_at)}))},spaceInviteToSpace:async(e,a)=>{s(p.viewerDID,o.identity.id,o.autoAcceptPeers);let r=await o.getDB(),l=o.identity,n=await r.selectFrom("kubun_space_mls_state").selectAll().where("space_id","=",e).where("device_id","=",l.id).executeTakeFirst();if(null==n)throw Error(`No MLS state for space ${e}`);let m=await t({mlsState:n.mls_state,credential:d(n.credential),epoch:n.epoch,rootCapability:n.root_capability}),u=i(a),w=await o.spaceManager.inviteToSpace({spaceID:e,identity:l,groupHandle:m,recipientDID:u.did,recipientKeyPackage:u.publicPackage,permission:"member"},r),_=await r.selectFrom("kubun_spaces").select(["name","hub_urls"]).where("id","=",e).executeTakeFirst(),D="string"==typeof _?.hub_urls?JSON.parse(_.hub_urls):_?.hub_urls??[],b=c({spaceID:e,spaceName:_?.name??"",hubURLs:D,invite:w.invite,welcomeMessage:w.welcomeMessage,ratchetTree:w.updatedGroupHandle.state.ratchetTree});return await o.emitter.emit("spaceMemberJoined",{spaceID:e,memberDID:u.did,role:"member",createdAt:new Date().toISOString()}),{invitePayload:b,spaceID:e,spaceName:_?.name??""}},spaceJoinSpace:async(e,t)=>{let i=await o.getDB(),c=o.identity,s=r(e),d=a(t),n={publicPackage:d.publicPackage,privatePackage:d.privatePackage,ownerDID:d.did};return await o.spaceManager.joinSpace({identity:c,spaceID:s.spaceID,invite:s.invite,keyPackageBundle:n,welcomeMessage:s.welcomeMessage,ratchetTree:s.ratchetTree},i),await l({db:i,adapter:o.adapter,hlc:o.hlc,emitter:o.emitter,identity:c,invite:s})},spaceLeaveSpace:async e=>{let t=await o.getDB(),a=await t.selectFrom("kubun_spaces").selectAll().where("id","=",e).executeTakeFirst(),r=o.identity;return await o.spaceManager.leaveSpace({spaceID:e,identity:r}),null!=a&&await o.emitter.emit("spaceLeft",{id:a.id,name:a.name,description:a.description,createdBy:a.created_by,createdAt:n(a.created_at),spaceID:e}),{spaceID:e}},spaceRemoveSpaceMember:async(e,a)=>{let r=await o.getDB(),i=o.identity,c=await r.selectFrom("kubun_space_mls_state").selectAll().where("space_id","=",e).where("device_id","=",i.id).executeTakeFirst();if(null==c)throw Error(`No MLS state for space ${e}`);let l=await t({mlsState:c.mls_state,credential:d(c.credential),epoch:c.epoch,rootCapability:c.root_capability});return await o.spaceManager.removeSpaceMember({spaceID:e,groupHandle:l,memberDID:a},r),await o.emitter.emit("spaceMemberLeft",{spaceID:e,memberDID:a,role:"",createdAt:new Date().toISOString()}),{spaceID:e}},spaceUpdateSpace:async e=>{await o.spaceManager.updateSpace({spaceID:e.spaceID,update:{name:e.name,description:e.description}});let t=await o.getDB(),a=await t.selectFrom("kubun_spaces").selectAll().where("id","=",e.spaceID).executeTakeFirst();if(null==a)throw Error(`Space ${e.spaceID} not found`);let r={id:a.id,name:a.name,description:a.description,createdBy:a.created_by,createdAt:n(a.created_at)};return await o.emitter.emit("spaceDataChanged",{...r,spaceID:e.spaceID}),r},spaceUpdateCircle:async e=>{await o.spaceManager.updateCircle({circleID:e.circleID,update:{name:e.name,description:e.description,catalogIDs:e.catalogIDs}});let t=await o.getDB(),a=await t.selectFrom("kubun_circles").selectAll().where("id","=",e.circleID).executeTakeFirst();if(null==a)throw Error(`Circle ${e.circleID} not found`);let r={id:a.id,spaceID:a.space_id,name:a.name,description:a.description,createdAt:n(a.created_at)};return null!=e.catalogIDs?await o.emitter.emit("circleCatalogsChanged",{...r,circleID:e.circleID}):await o.emitter.emit("circleDataChanged",{...r,circleID:e.circleID}),r},spaceUpdateCatalog:async t=>{let a=await o.getDB(),r={hlc:e.serialize(o.hlc.now())};null!=t.name&&(r.name=t.name),null!=t.filterCriteria&&(r.filter_criteria=o.adapter.encodeJSON("string"==typeof t.filterCriteria?JSON.parse(t.filterCriteria):t.filterCriteria)),r.updated_at=o.adapter.encodeTimestamp(new Date),await a.updateTable("kubun_catalogs").set(r).where("id","=",t.catalogID).execute();let i=await a.selectFrom("kubun_catalogs").selectAll().where("id","=",t.catalogID).executeTakeFirst();if(null==i)throw Error(`Catalog ${t.catalogID} not found`);return{id:i.id,ownerDID:i.owner_did,name:i.name,description:i.description,filterCriteria:"string"==typeof i.filter_criteria?i.filter_criteria:JSON.stringify(i.filter_criteria),createdAt:n(i.created_at)}},spaceDeleteCatalog:async e=>{let t=await o.getDB();return await t.deleteFrom("kubun_catalogs").where("id","=",e).execute(),{deletedID:e}},spaceDeleteCircle:async e=>{let t=await o.getDB(),a=await t.selectFrom("kubun_circles").selectAll().where("id","=",e).executeTakeFirst();return await o.spaceManager.deleteCircle({circleID:e}),null!=a&&await o.emitter.emit("circleDeleted",{id:a.id,spaceID:a.space_id,name:a.name,description:a.description,createdAt:n(a.created_at)}),{deletedID:e}},spaceRemoveCircleMember:async(e,t)=>(await o.spaceManager.removeCircleMember({circleID:e,memberDID:t}),await o.emitter.emit("circleMemberRemoved",{circleID:e,memberDID:t,role:"",createdAt:new Date().toISOString()}),{circleID:e,memberDID:t})}}
@@ -0,0 +1,3 @@
1
+ import type { SyncRequestContext } from '../types.js';
2
+ import type { ContextDeps } from './types.js';
3
+ export declare function createSyncContext(_ctx: unknown, deps: ContextDeps): SyncRequestContext;
@@ -0,0 +1 @@
1
+ export function createSyncContext(e,n){return{syncAddPeer:e=>n.syncManager.addPeer(e),syncRemovePeer:e=>n.syncManager.removePeer(e),syncListPeers:()=>n.syncManager.listPeers(),syncGetStatus:e=>n.syncManager.getStatus(e)}}
@@ -0,0 +1,35 @@
1
+ import type { KeyPackageBundle } from '@enkaku/group';
2
+ import type { Runtime } from '@enkaku/runtime';
3
+ import type { OwnIdentity } from '@enkaku/token';
4
+ import type { Database } from '@kubun/db';
5
+ import type { Adapter } from '@kubun/db-adapter';
6
+ import type { HLC } from '@kubun/hlc';
7
+ import type { Kysely } from 'kysely';
8
+ import type { SpaceEventEmitter } from '../spaces/events.js';
9
+ import type { SpaceManager } from '../spaces/manager.js';
10
+ import type { SyncManager } from '../sync/sync-manager.js';
11
+ export type PendingJoinRequest = {
12
+ publicPackage: KeyPackageBundle['publicPackage'];
13
+ privatePackage: KeyPackageBundle['privatePackage'];
14
+ did: string;
15
+ };
16
+ export type ContextDeps = {
17
+ identity: OwnIdentity;
18
+ spaceManager: SpaceManager;
19
+ syncManager: SyncManager;
20
+ adapter: Adapter;
21
+ hlc: HLC;
22
+ emitter: SpaceEventEmitter;
23
+ pendingJoinRequests: Map<string, PendingJoinRequest>;
24
+ getDB: () => Promise<Kysely<Database>>;
25
+ runtime: Runtime;
26
+ autoAcceptPeers?: Array<string>;
27
+ };
28
+ export declare function toISO(timestamp: unknown): string;
29
+ /**
30
+ * Normalize a credential value from the DB.
31
+ * Kysely's ParseJSONResultsPlugin may have already parsed the JSON string
32
+ * into an object. SerializedGroupState expects a JSON string.
33
+ */
34
+ export declare function normalizeCredential(value: unknown): string;
35
+ export declare function checkPeerAccess(viewerDID: string, identityID: string, autoAcceptPeers?: Array<string>): void;
@@ -0,0 +1 @@
1
+ export function toISO(e){return"number"==typeof e?new Date(1e3*e).toISOString():e instanceof Date?e.toISOString():String(e)}export function normalizeCredential(e){return"string"==typeof e?e:JSON.stringify(e)}export function checkPeerAccess(e,t,n){if(null!=n){if(!n.includes(e))throw Error("Peer not in autoAcceptPeers list")}else if(e!==t)throw Error("Only the engine identity can perform this operation")}
package/lib/index.d.ts ADDED
@@ -0,0 +1,25 @@
1
+ import type { KubunPlugin, PluginFactoryParams } from '@kubun/engine';
2
+ export type { ContextDeps, PendingJoinRequest } from './context/types.js';
3
+ export { createP2PMigrations, type MigrationContext } from './migrations.js';
4
+ export type { SyncClientMessage, SyncProtocol, SyncServerMessage } from './protocol.js';
5
+ export { createP2PSchemaExtension } from './schema.js';
6
+ export { type ProcessBroadcastParams, processBroadcast, type SpaceBroadcastMessage, } from './spaces/broadcast.js';
7
+ export { deserializeBroadcast, serializeBroadcast } from './spaces/broadcast-codec.js';
8
+ export { type BroadcastEvent, BroadcastService, type BroadcastServiceEvents, type BroadcastServiceParams, type ReceiveBroadcastParams, type ReceiveBroadcastResult, type SendBroadcastParams, type SendBroadcastResult, } from './spaces/broadcast-service.js';
9
+ export { createFilteredGenerator, createSpaceEventEmitter, type SpaceEventEmitter, type SpaceEventMap, } from './spaces/events.js';
10
+ export { restoreGroupHandle } from './spaces/group-handle.js';
11
+ export { decodeFullJoinRequest, decodeInvitePayload, decodeJoinRequest, encodeFullJoinRequest, encodeInvitePayload, encodeJoinRequest, type FullJoinRequestPayload, type InvitePayload, type JoinRequestPayload, } from './spaces/invite-payload.js';
12
+ export { type AddCircleMemberParams, type AddCircleMemberResult, type CreateCircleParams, type CreateCircleResult, type CreateSpaceParams, type CreateSpaceResult, type DeleteCircleParams, type DeleteCircleResult, type InviteToSpaceParams, type InviteToSpaceResult, type JoinSpaceParams, type JoinSpaceResult, type LeaveSpaceParams, type LeaveSpaceResult, type QueryRunner, type RemoveCircleMemberParams, type RemoveCircleMemberResult, type RemoveMemberParams, type RemoveMemberResult, type RemoveSpaceMemberParams, type RemoveSpaceMemberResult, SpaceManager, type SpaceManagerParams, type UpdateCircleParams, type UpdateCircleResult, type UpdateSpaceParams, type UpdateSpaceResult, } from './spaces/manager.js';
13
+ export { replacer as mlsJSONReplacer, reviver as mlsJSONReviver } from './spaces/mls-json.js';
14
+ export { deserializeGroupState, type GroupState, type SerializedGroupState, serializeGroupState, } from './spaces/mls-state.js';
15
+ export { type CatalogSyncScope, resolveCatalogSyncScopes } from './sync/catalog-scope.js';
16
+ export { checkSyncDelegation } from './sync/handlers.js';
17
+ export { type PeerConfig, type PeerConfigWithID, PeerRegistry } from './sync/peer-registry.js';
18
+ export { type MerkleSyncMessage, SyncClient, type SyncClientParams, type SyncScope, type SyncTransportProvider, } from './sync/sync-client.js';
19
+ export { type SyncEvent, SyncManager, type SyncManagerParams, type SyncSessionInfo, type SyncStatus, } from './sync/sync-manager.js';
20
+ export type { CatalogData, CircleData, CircleMemberData, DeleteCatalogData, DeleteCircleData, InviteToSpaceData, JoinSpaceData, LeaveSpaceData, P2PJoinRequestContext, RemoveCircleMemberData, RemoveSpaceMemberData, SpaceData, SpaceMemberData, SpaceRequestContext, SyncPluginAPI, SyncRequestContext, SyncSessionResult, UpdateCircleInput, UpdateSpaceInput, } from './types.js';
21
+ export type P2PPluginOptions = {
22
+ autoAcceptPeers?: Array<string>;
23
+ http?: boolean | string;
24
+ };
25
+ export declare function createP2PPlugin(options?: P2PPluginOptions): (params: PluginFactoryParams) => KubunPlugin;
package/lib/index.js ADDED
@@ -0,0 +1 @@
1
+ import{ServerTransport as e}from"@enkaku/http-server-transport";import{Server as t}from"@enkaku/server";import{DirectTransports as r}from"@enkaku/transport";import{HLC as s}from"@kubun/hlc";import{createJoinContext as o}from"./context/join.js";import{createSpaceContext as n}from"./context/space.js";import{createSyncContext as a}from"./context/sync.js";import{createP2PMigrations as c}from"./migrations.js";import{createP2PSchemaExtension as i}from"./schema.js";import{createSpaceEventEmitter as p}from"./spaces/events.js";import{SpaceManager as m}from"./spaces/manager.js";import{createSyncHandlers as d}from"./sync/handlers.js";import{SyncManager as l}from"./sync/sync-manager.js";export{createP2PMigrations}from"./migrations.js";export{createP2PSchemaExtension}from"./schema.js";export{processBroadcast}from"./spaces/broadcast.js";export{deserializeBroadcast,serializeBroadcast}from"./spaces/broadcast-codec.js";export{BroadcastService}from"./spaces/broadcast-service.js";export{createFilteredGenerator,createSpaceEventEmitter}from"./spaces/events.js";export{restoreGroupHandle}from"./spaces/group-handle.js";export{decodeFullJoinRequest,decodeInvitePayload,decodeJoinRequest,encodeFullJoinRequest,encodeInvitePayload,encodeJoinRequest}from"./spaces/invite-payload.js";export{SpaceManager}from"./spaces/manager.js";export{replacer as mlsJSONReplacer,reviver as mlsJSONReviver}from"./spaces/mls-json.js";export{deserializeGroupState,serializeGroupState}from"./spaces/mls-state.js";export{resolveCatalogSyncScopes}from"./sync/catalog-scope.js";export{checkSyncDelegation}from"./sync/handlers.js";export{PeerRegistry}from"./sync/peer-registry.js";export{SyncClient}from"./sync/sync-client.js";export{SyncManager}from"./sync/sync-manager.js";export function createP2PPlugin(g){return y=>{let u,f,j=y.db.getDB(),h=y.db.adapter,v=y.identity,x=new s({nodeID:v.id}),P=new m({kysely:j,adapter:h,identity:v,getRandomID:y.runtime.getRandomID}),S=p(),w=new l({db:y.db,deployClusters:async e=>{let t=Object.values(e);await y.engine.deployGraph({clusters:t})},runtime:y.runtime,identity:y.identity,logger:y.getLogger("sync")}),R=d({db:y.db,logger:y.getLogger("sync-handlers")}),b=new Map,k=[],I={types:h.types,functions:h.functions};async function D(){return await j}let C={addPeer:e=>w.addPeer(e),removePeer:e=>w.removePeer(e),listPeers:()=>w.listPeers(),syncWithPeer:({peerDID:e,scopes:t,delegationTokens:r,knownModelIDs:s})=>w.merkleSyncWithPeer(e,t,r,{knownModelIDs:s}),getStatus:e=>w.getStatus(e),onSyncEvent:e=>w.onSyncEvent(e),createSyncTransport:function(e){let s=new r({signal:e}),o=new t({accessControl:!1,getRandomID:y.runtime.getRandomID,handlers:R,logger:y.getLogger("sync-server"),transports:[s.server],signal:e});return k.push(o),s.client}};if(g?.http){let r="string"==typeof g.http?g.http.replace(/^\//,""):"sync";C.syncReady=(async()=>{let s=await y.engine.getAPI("http");await s.listening,u=new e({allowedOrigin:["*"]}),f=new t({accessControl:!1,getRandomID:y.runtime.getRandomID,handlers:R,logger:y.getLogger("sync-http-server"),transports:[u]}),k.push(f),s.registerProtocol(r,u.fetch.bind(u))})()}return{name:"p2p",migrations:{name:"p2p",migrations:()=>c(I)},schemaExtension:e=>i(S),api:C,createContextFactory:()=>{let e={identity:v,spaceManager:P,syncManager:w,adapter:h,hlc:x,emitter:S,pendingJoinRequests:b,getDB:D,runtime:y.runtime,autoAcceptPeers:g?.autoAcceptPeers};return t=>({...n(t,e),...a(t,e),...o(t,e)})},dispose:async()=>{for(let e of k)await e.dispose();await u?.dispose(),await w.dispose()}}}}
@@ -0,0 +1,8 @@
1
+ import type { Adapter } from '@kubun/db-adapter';
2
+ import type { PluginMigrationContext } from '@kubun/engine';
3
+ import type { Migration } from 'kysely';
4
+ export type MigrationContext = {
5
+ types: Adapter['types'];
6
+ functions: Adapter['functions'];
7
+ };
8
+ export declare function createP2PMigrations(ctx: MigrationContext | PluginMigrationContext): Record<string, Migration>;
@@ -0,0 +1 @@
1
+ export function createP2PMigrations(e){let t=e.types,a=e.functions;return{"001_create_p2p_tables":{async up(e){await e.schema.createTable("kubun_spaces").ifNotExists().addColumn("id",t.text,e=>e.notNull().primaryKey()).addColumn("name",t.text,e=>e.notNull()).addColumn("description",t.text,e=>e.notNull().defaultTo("")).addColumn("created_by",t.text,e=>e.notNull()).addColumn("hub_urls",t.json,e=>e.defaultTo("[]").notNull()).addColumn("hlc",t.text,e=>e.notNull()).addColumn("created_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addColumn("updated_at",t.timestamp).execute(),await e.schema.createTable("kubun_space_members").ifNotExists().addColumn("space_id",t.text,e=>e.notNull()).addColumn("member_did",t.text,e=>e.notNull()).addColumn("role",t.text,e=>e.notNull().defaultTo("member")).addColumn("created_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addColumn("updated_at",t.timestamp).addPrimaryKeyConstraint("pk_space_members",["space_id","member_did"]).execute(),await e.schema.createIndex("idx_space_members_did").ifNotExists().on("kubun_space_members").column("member_did").execute(),await e.schema.createTable("kubun_circles").ifNotExists().addColumn("id",t.text,e=>e.notNull().primaryKey()).addColumn("space_id",t.text,e=>e.notNull()).addColumn("name",t.text,e=>e.notNull()).addColumn("description",t.text,e=>e.notNull().defaultTo("")).addColumn("catalog_ids",t.json,e=>e.notNull().defaultTo("[]")).addColumn("hlc",t.text,e=>e.notNull()).addColumn("created_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addColumn("updated_at",t.timestamp).execute(),await e.schema.createIndex("idx_circles_space").ifNotExists().on("kubun_circles").column("space_id").execute(),await e.schema.createTable("kubun_circle_members").ifNotExists().addColumn("circle_id",t.text,e=>e.notNull()).addColumn("member_did",t.text,e=>e.notNull()).addColumn("role",t.text,e=>e.notNull().defaultTo("member")).addColumn("hlc",t.text,e=>e.notNull()).addColumn("created_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addColumn("updated_at",t.timestamp).addPrimaryKeyConstraint("pk_circle_members",["circle_id","member_did"]).execute(),await e.schema.createIndex("idx_circle_members_did").ifNotExists().on("kubun_circle_members").column("member_did").execute(),await e.schema.createTable("kubun_catalogs").ifNotExists().addColumn("id",t.text,e=>e.notNull().primaryKey()).addColumn("owner_did",t.text,e=>e.notNull()).addColumn("name",t.text,e=>e.notNull()).addColumn("description",t.text,e=>e.notNull().defaultTo("")).addColumn("filter_criteria",t.json,e=>e.notNull()).addColumn("hlc",t.text,e=>e.notNull()).addColumn("created_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addColumn("updated_at",t.timestamp).execute(),await e.schema.createIndex("idx_catalogs_owner").ifNotExists().on("kubun_catalogs").column("owner_did").execute(),await e.schema.createTable("kubun_space_mls_state").ifNotExists().addColumn("space_id",t.text,e=>e.notNull()).addColumn("device_id",t.text,e=>e.notNull()).addColumn("mls_state",t.binary,e=>e.notNull()).addColumn("credential",t.text,e=>e.notNull()).addColumn("epoch","integer",e=>e.notNull()).addColumn("root_capability",t.text,e=>e.notNull().defaultTo("")).addColumn("updated_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addPrimaryKeyConstraint("pk_space_mls_state",["space_id","device_id"]).execute(),await e.schema.createTable("kubun_sync_peers").ifNotExists().addColumn("id",t.text,e=>e.notNull().primaryKey()).addColumn("peer_did",t.text,e=>e.notNull().unique()).addColumn("endpoint",t.text,e=>e.notNull()).addColumn("mode",t.text,e=>e.notNull()).addColumn("allowed_users",t.json,e=>e.notNull()).addColumn("priority",t.text,e=>e.notNull().defaultTo("0")).addColumn("trust_level",t.text,e=>e.notNull()).addColumn("config",t.json,e=>e.notNull()).addColumn("created_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).addColumn("updated_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).execute(),await e.schema.createTable("kubun_sync_checkpoints").ifNotExists().addColumn("id",t.text,e=>e.notNull().primaryKey()).addColumn("peer_did",t.text,e=>e.notNull()).addColumn("scope",t.text,e=>e.notNull()).addColumn("checkpoint_hlc",t.text,e=>e.notNull()).addColumn("updated_at",t.timestamp,e=>e.defaultTo(a.now).notNull()).execute()},async down(e){await e.schema.dropTable("kubun_sync_checkpoints").ifExists().execute(),await e.schema.dropTable("kubun_sync_peers").ifExists().execute(),await e.schema.dropTable("kubun_space_mls_state").ifExists().execute(),await e.schema.dropTable("kubun_catalogs").ifExists().execute(),await e.schema.dropTable("kubun_circle_members").ifExists().execute(),await e.schema.dropTable("kubun_circles").ifExists().execute(),await e.schema.dropTable("kubun_space_members").ifExists().execute(),await e.schema.dropTable("kubun_spaces").ifExists().execute()}}}}
@@ -0,0 +1,175 @@
1
+ import type { AnyClientMessageOf, AnyServerMessageOf } from '@enkaku/protocol';
2
+ import type { FromSchema } from '@enkaku/schema';
3
+ export declare const syncProtocol: {
4
+ readonly 'sync/negotiate': {
5
+ readonly type: "request";
6
+ readonly param: {
7
+ readonly type: "object";
8
+ readonly properties: {
9
+ readonly scopes: {
10
+ readonly type: "array";
11
+ readonly items: {
12
+ readonly type: "object";
13
+ readonly properties: {
14
+ readonly modelID: {
15
+ readonly type: "string";
16
+ };
17
+ readonly ownerDID: {
18
+ readonly type: "string";
19
+ };
20
+ };
21
+ readonly required: readonly ["modelID", "ownerDID"];
22
+ readonly additionalProperties: false;
23
+ };
24
+ readonly description: "Requested sync scopes as (model, owner) pairs";
25
+ };
26
+ readonly delegationTokens: {
27
+ readonly type: "array";
28
+ readonly items: {
29
+ readonly type: "string";
30
+ };
31
+ readonly description: "JWT delegation tokens for authorization";
32
+ };
33
+ readonly catalogIDs: {
34
+ readonly type: "array";
35
+ readonly items: {
36
+ readonly type: "string";
37
+ };
38
+ readonly description: "Catalog IDs to resolve sync scope from criteria";
39
+ };
40
+ readonly knownModelIDs: {
41
+ readonly type: "array";
42
+ readonly items: {
43
+ readonly type: "string";
44
+ };
45
+ readonly description: "Model IDs the requester already has — used to identify missing clusters";
46
+ };
47
+ };
48
+ readonly required: readonly ["delegationTokens"];
49
+ readonly additionalProperties: false;
50
+ };
51
+ readonly result: {
52
+ readonly type: "object";
53
+ readonly properties: {
54
+ readonly acceptedScopes: {
55
+ readonly type: "array";
56
+ readonly items: {
57
+ readonly type: "object";
58
+ readonly properties: {
59
+ readonly modelID: {
60
+ readonly type: "string";
61
+ };
62
+ readonly ownerDID: {
63
+ readonly type: "string";
64
+ };
65
+ };
66
+ readonly required: readonly ["modelID", "ownerDID"];
67
+ readonly additionalProperties: false;
68
+ };
69
+ };
70
+ readonly excludedDocumentIDs: {
71
+ readonly type: "array";
72
+ readonly items: {
73
+ readonly type: "string";
74
+ };
75
+ };
76
+ readonly missingClusters: {
77
+ readonly type: "object";
78
+ readonly description: "Cluster definitions for models the requester does not have yet";
79
+ readonly additionalProperties: true;
80
+ };
81
+ };
82
+ readonly required: readonly ["acceptedScopes", "excludedDocumentIDs"];
83
+ readonly additionalProperties: false;
84
+ };
85
+ };
86
+ readonly 'sync/merkle-sync': {
87
+ readonly type: "stream";
88
+ readonly param: {
89
+ readonly type: "object";
90
+ readonly properties: {
91
+ readonly scopes: {
92
+ readonly type: "array";
93
+ readonly items: {
94
+ readonly type: "object";
95
+ readonly properties: {
96
+ readonly modelID: {
97
+ readonly type: "string";
98
+ };
99
+ readonly ownerDID: {
100
+ readonly type: "string";
101
+ };
102
+ };
103
+ readonly required: readonly ["modelID", "ownerDID"];
104
+ readonly additionalProperties: false;
105
+ };
106
+ };
107
+ readonly excludedDocumentIDs: {
108
+ readonly type: "array";
109
+ readonly items: {
110
+ readonly type: "string";
111
+ };
112
+ };
113
+ readonly tree: {
114
+ readonly type: "object";
115
+ readonly description: "Merkle tree bucket hashes from requester";
116
+ readonly additionalProperties: {
117
+ readonly type: "string";
118
+ };
119
+ };
120
+ };
121
+ readonly required: readonly ["scopes", "excludedDocumentIDs", "tree"];
122
+ readonly additionalProperties: false;
123
+ };
124
+ readonly receive: {
125
+ readonly type: "object";
126
+ readonly properties: {
127
+ readonly type: {
128
+ readonly type: "string";
129
+ readonly enum: readonly ["mutations", "complete"];
130
+ };
131
+ readonly mutationJWTs: {
132
+ readonly type: "array";
133
+ readonly items: {
134
+ readonly type: "string";
135
+ };
136
+ readonly description: "Signed mutation JWTs for divergent time buckets";
137
+ };
138
+ readonly divergentBuckets: {
139
+ readonly type: "number";
140
+ readonly description: "Number of divergent minute buckets found";
141
+ };
142
+ readonly totalMutations: {
143
+ readonly type: "number";
144
+ readonly description: "Total mutations sent";
145
+ };
146
+ };
147
+ readonly required: readonly ["type"];
148
+ readonly additionalProperties: false;
149
+ };
150
+ readonly result: {
151
+ readonly type: "object";
152
+ readonly properties: {
153
+ readonly success: {
154
+ readonly type: "boolean";
155
+ };
156
+ readonly divergentBuckets: {
157
+ readonly type: "number";
158
+ };
159
+ readonly mutationsSent: {
160
+ readonly type: "number";
161
+ };
162
+ };
163
+ readonly required: readonly ["success", "divergentBuckets", "mutationsSent"];
164
+ readonly additionalProperties: false;
165
+ };
166
+ };
167
+ };
168
+ export type SyncProtocol = typeof syncProtocol;
169
+ export type SyncNegotiateParams = FromSchema<SyncProtocol['sync/negotiate']['param']>;
170
+ export type SyncNegotiateResult = FromSchema<SyncProtocol['sync/negotiate']['result']>;
171
+ export type SyncMerkleSyncParams = FromSchema<SyncProtocol['sync/merkle-sync']['param']>;
172
+ export type SyncMerkleSyncReceive = FromSchema<SyncProtocol['sync/merkle-sync']['receive']>;
173
+ export type SyncMerkleSyncResult = FromSchema<SyncProtocol['sync/merkle-sync']['result']>;
174
+ export type SyncClientMessage = AnyClientMessageOf<SyncProtocol>;
175
+ export type SyncServerMessage = AnyServerMessageOf<SyncProtocol>;
@@ -0,0 +1 @@
1
+ export const syncProtocol={"sync/negotiate":{type:"request",param:{type:"object",properties:{scopes:{type:"array",items:{type:"object",properties:{modelID:{type:"string"},ownerDID:{type:"string"}},required:["modelID","ownerDID"],additionalProperties:!1},description:"Requested sync scopes as (model, owner) pairs"},delegationTokens:{type:"array",items:{type:"string"},description:"JWT delegation tokens for authorization"},catalogIDs:{type:"array",items:{type:"string"},description:"Catalog IDs to resolve sync scope from criteria"},knownModelIDs:{type:"array",items:{type:"string"},description:"Model IDs the requester already has — used to identify missing clusters"}},required:["delegationTokens"],additionalProperties:!1},result:{type:"object",properties:{acceptedScopes:{type:"array",items:{type:"object",properties:{modelID:{type:"string"},ownerDID:{type:"string"}},required:["modelID","ownerDID"],additionalProperties:!1}},excludedDocumentIDs:{type:"array",items:{type:"string"}},missingClusters:{type:"object",description:"Cluster definitions for models the requester does not have yet",additionalProperties:!0}},required:["acceptedScopes","excludedDocumentIDs"],additionalProperties:!1}},"sync/merkle-sync":{type:"stream",param:{type:"object",properties:{scopes:{type:"array",items:{type:"object",properties:{modelID:{type:"string"},ownerDID:{type:"string"}},required:["modelID","ownerDID"],additionalProperties:!1}},excludedDocumentIDs:{type:"array",items:{type:"string"}},tree:{type:"object",description:"Merkle tree bucket hashes from requester",additionalProperties:{type:"string"}}},required:["scopes","excludedDocumentIDs","tree"],additionalProperties:!1},receive:{type:"object",properties:{type:{type:"string",enum:["mutations","complete"]},mutationJWTs:{type:"array",items:{type:"string"},description:"Signed mutation JWTs for divergent time buckets"},divergentBuckets:{type:"number",description:"Number of divergent minute buckets found"},totalMutations:{type:"number",description:"Total mutations sent"}},required:["type"],additionalProperties:!1},result:{type:"object",properties:{success:{type:"boolean"},divergentBuckets:{type:"number"},mutationsSent:{type:"number"}},required:["success","divergentBuckets","mutationsSent"],additionalProperties:!1}}};
@@ -0,0 +1,3 @@
1
+ import type { SchemaExtension } from '@kubun/engine';
2
+ import { type SpaceEventEmitter } from './spaces/events.js';
3
+ export declare function createP2PSchemaExtension(emitter: SpaceEventEmitter): SchemaExtension;
package/lib/schema.js ADDED
@@ -0,0 +1,187 @@
1
+ import{createFilteredGenerator as e}from"./spaces/events.js";let a=`
2
+ type PeerSpace {
3
+ id: ID!
4
+ name: String!
5
+ description: String
6
+ createdBy: String!
7
+ createdAt: String!
8
+ }
9
+
10
+ type PeerSpaceMember {
11
+ spaceID: ID!
12
+ memberDID: String!
13
+ role: String!
14
+ createdAt: String!
15
+ }
16
+
17
+ type PeerCircle {
18
+ id: ID!
19
+ spaceID: ID!
20
+ name: String!
21
+ description: String
22
+ createdAt: String!
23
+ }
24
+
25
+ type PeerCircleMember {
26
+ circleID: ID!
27
+ memberDID: String!
28
+ role: String!
29
+ createdAt: String!
30
+ }
31
+
32
+ type PeerCatalog {
33
+ id: ID!
34
+ ownerDID: String!
35
+ name: String!
36
+ description: String
37
+ filterCriteria: String!
38
+ createdAt: String!
39
+ }
40
+
41
+ input CreateSpaceInput {
42
+ name: String!
43
+ description: String
44
+ }
45
+
46
+ type CreateSpacePayload {
47
+ space: PeerSpace!
48
+ }
49
+
50
+ type InviteToSpacePayload {
51
+ invitePayload: String!
52
+ spaceID: ID!
53
+ spaceName: String!
54
+ }
55
+
56
+ type JoinSpacePayload {
57
+ space: PeerSpace
58
+ }
59
+
60
+ type PrepareJoinRequestPayload {
61
+ joinRequest: String!
62
+ }
63
+
64
+ type CompleteJoinPayload {
65
+ space: PeerSpace
66
+ }
67
+
68
+ type LeaveSpacePayload {
69
+ spaceID: ID!
70
+ }
71
+
72
+ type RemoveSpaceMemberPayload {
73
+ spaceID: ID!
74
+ }
75
+
76
+ input UpdateCatalogInput {
77
+ catalogID: ID!
78
+ name: String
79
+ filterCriteria: String
80
+ }
81
+
82
+ input UpdateSpaceInput {
83
+ spaceID: ID!
84
+ name: String
85
+ description: String
86
+ }
87
+
88
+ type UpdateSpacePayload {
89
+ space: PeerSpace!
90
+ }
91
+
92
+ input UpdateCircleInput {
93
+ circleID: ID!
94
+ name: String
95
+ description: String
96
+ catalogIDs: [String!]
97
+ }
98
+
99
+ type UpdateCirclePayload {
100
+ circle: PeerCircle!
101
+ }
102
+
103
+ type DeleteCatalogPayload {
104
+ deletedID: ID!
105
+ }
106
+
107
+ type DeleteCirclePayload {
108
+ deletedID: ID!
109
+ }
110
+
111
+ type RemoveCircleMemberPayload {
112
+ circleID: ID!
113
+ memberDID: String!
114
+ }
115
+
116
+ type SyncPeer {
117
+ id: String!
118
+ peerDID: String!
119
+ endpoint: String!
120
+ mode: String!
121
+ priority: String!
122
+ trustLevel: String!
123
+ createdAt: Int!
124
+ updatedAt: Int!
125
+ }
126
+
127
+ type SyncSessionInfo {
128
+ peerID: String!
129
+ startTime: Int!
130
+ documentsAttempted: Int!
131
+ documentsCompleted: Int!
132
+ }
133
+
134
+ type SyncStatus {
135
+ activeSessions: [SyncSessionInfo!]!
136
+ lastSyncByPeer: String!
137
+ }
138
+
139
+ type RemoveSyncPeerPayload {
140
+ success: Boolean!
141
+ }
142
+
143
+ extend type Query {
144
+ spaces: [PeerSpace!]!
145
+ space(id: ID!): PeerSpace
146
+ spaceMembers(spaceID: ID!): [PeerSpaceMember!]!
147
+ circles(spaceID: ID!): [PeerCircle!]!
148
+ syncPeers: [SyncPeer!]!
149
+ syncStatus: SyncStatus!
150
+ }
151
+
152
+ extend type Mutation {
153
+ createSpace(input: CreateSpaceInput!): CreateSpacePayload!
154
+ addSpaceMember(spaceID: ID!, memberDID: String!, role: String!): PeerSpaceMember!
155
+ createCircle(spaceID: ID!, name: String!, description: String): PeerCircle!
156
+ addCircleMember(circleID: ID!, memberDID: String!, role: String!): PeerCircleMember!
157
+ createCatalog(name: String!, description: String, filterCriteria: String!): PeerCatalog!
158
+ inviteToSpace(spaceID: ID!, joinRequest: String!): InviteToSpacePayload!
159
+ joinSpace(invitePayload: String!, joinRequestPayload: String!): JoinSpacePayload!
160
+ prepareJoinRequest: PrepareJoinRequestPayload!
161
+ completeJoin(invitePayload: String!): CompleteJoinPayload!
162
+ leaveSpace(spaceID: ID!): LeaveSpacePayload!
163
+ removeSpaceMember(spaceID: ID!, memberDID: String!): RemoveSpaceMemberPayload!
164
+ updateCatalog(input: UpdateCatalogInput!): PeerCatalog!
165
+ updateSpace(input: UpdateSpaceInput!): UpdateSpacePayload!
166
+ updateCircle(input: UpdateCircleInput!): UpdateCirclePayload!
167
+ deleteCatalog(catalogID: ID!): DeleteCatalogPayload!
168
+ deleteCircle(circleID: ID!): DeleteCirclePayload!
169
+ removeCircleMember(circleID: ID!, memberDID: String!): RemoveCircleMemberPayload!
170
+ addSyncPeer(peerDID: String!, endpoint: String!, mode: String, priority: String, trustLevel: String): Boolean!
171
+ removeSyncPeer(peerDID: String!): RemoveSyncPeerPayload!
172
+ }
173
+
174
+ extend type Subscription {
175
+ spaceJoined: PeerSpace!
176
+ spaceLeft: PeerSpace!
177
+ spaceDataChanged(spaceID: ID!): PeerSpace!
178
+ spaceMemberJoined(spaceID: ID!): PeerSpaceMember!
179
+ spaceMemberLeft(spaceID: ID!): PeerSpaceMember!
180
+ circleCreated(spaceID: ID!): PeerCircle!
181
+ circleDeleted(spaceID: ID!): PeerCircle!
182
+ circleDataChanged(circleID: ID!): PeerCircle!
183
+ circleMemberAdded(circleID: ID!): PeerCircleMember!
184
+ circleMemberRemoved(circleID: ID!): PeerCircleMember!
185
+ circleCatalogsChanged(circleID: ID!): PeerCircle!
186
+ }
187
+ `;export function createP2PSchemaExtension(r){return{sdl:a,resolvers:{queryFields:{spaces:async(e,a,r)=>await r.spaceGetSpaces(),space:async(e,a,r)=>await r.spaceGetSpace(a.id),spaceMembers:async(e,a,r)=>await r.spaceGetSpaceMembers(a.spaceID),circles:async(e,a,r)=>await r.spaceGetCircles(a.spaceID),syncPeers:async(e,a,r)=>await r.syncListPeers(),syncStatus:(e,a,r)=>{let c=r.syncGetStatus();return{...c,lastSyncByPeer:JSON.stringify(c.lastSyncByPeer)}}},mutationFields:{createSpace:async(e,a,r)=>{let c=a.input;return{space:await r.spaceCreateSpace(c)}},addSpaceMember:async(e,a,r)=>await r.spaceAddSpaceMember(a.spaceID,a.memberDID,a.role),createCircle:async(e,a,r)=>await r.spaceCreateCircle({spaceID:a.spaceID,name:a.name,description:a.description}),addCircleMember:async(e,a,r)=>await r.spaceAddCircleMember(a.circleID,a.memberDID,a.role),createCatalog:async(e,a,r)=>await r.spaceCreateCatalog({name:a.name,description:a.description,filterCriteria:a.filterCriteria}),inviteToSpace:async(e,a,r)=>await r.spaceInviteToSpace(a.spaceID,a.joinRequest),joinSpace:async(e,a,r)=>await r.spaceJoinSpace(a.invitePayload,a.joinRequestPayload),prepareJoinRequest:async(e,a,r)=>await r.p2pPrepareJoinRequest(),completeJoin:async(e,a,r)=>await r.p2pCompleteJoin(a.invitePayload),leaveSpace:async(e,a,r)=>await r.spaceLeaveSpace(a.spaceID),removeSpaceMember:async(e,a,r)=>await r.spaceRemoveSpaceMember(a.spaceID,a.memberDID),updateCatalog:async(e,a,r)=>{let c=a.input;return await r.spaceUpdateCatalog(c)},updateSpace:async(e,a,r)=>{let c=a.input;return{space:await r.spaceUpdateSpace(c)}},updateCircle:async(e,a,r)=>{let c=a.input;return{circle:await r.spaceUpdateCircle(c)}},deleteCatalog:async(e,a,r)=>await r.spaceDeleteCatalog(a.catalogID),deleteCircle:async(e,a,r)=>await r.spaceDeleteCircle(a.circleID),removeCircleMember:async(e,a,r)=>await r.spaceRemoveCircleMember(a.circleID,a.memberDID),addSyncPeer:async(e,a,r)=>(await r.syncAddPeer({peerDID:a.peerDID,endpoint:a.endpoint,mode:a.mode??"on-demand",allowedUsers:{all:!0},priority:a.priority??"0",trustLevel:a.trustLevel??"trusted"}),!0),removeSyncPeer:async(e,a,r)=>(await r.syncRemovePeer(a.peerDID),{success:!0})},subscriptionFields:{spaceJoined:{resolve:e=>e,subscribe:()=>e(r,"spaceJoined")},spaceLeft:{resolve:e=>e,subscribe:()=>e(r,"spaceLeft")},spaceDataChanged:{resolve:e=>e,subscribe:(a,c)=>e(r,"spaceDataChanged",e=>e.spaceID===c.spaceID)},spaceMemberJoined:{resolve:e=>e,subscribe:(a,c)=>e(r,"spaceMemberJoined",e=>e.spaceID===c.spaceID)},spaceMemberLeft:{resolve:e=>e,subscribe:(a,c)=>e(r,"spaceMemberLeft",e=>e.spaceID===c.spaceID)},circleCreated:{resolve:e=>e,subscribe:(a,c)=>e(r,"circleCreated",e=>e.spaceID===c.spaceID)},circleDeleted:{resolve:e=>e,subscribe:(a,c)=>e(r,"circleDeleted",e=>e.spaceID===c.spaceID)},circleDataChanged:{resolve:e=>e,subscribe:(a,c)=>e(r,"circleDataChanged",e=>e.circleID===c.circleID)},circleMemberAdded:{resolve:e=>e,subscribe:(a,c)=>e(r,"circleMemberAdded",e=>e.circleID===c.circleID)},circleMemberRemoved:{resolve:e=>e,subscribe:(a,c)=>e(r,"circleMemberRemoved",e=>e.circleID===c.circleID)},circleCatalogsChanged:{resolve:e=>e,subscribe:(a,c)=>e(r,"circleCatalogsChanged",e=>e.circleID===c.circleID)}}}}}
@@ -0,0 +1,3 @@
1
+ import type { SpaceBroadcastMessage } from './broadcast.js';
2
+ export declare function serializeBroadcast(message: SpaceBroadcastMessage): Uint8Array;
3
+ export declare function deserializeBroadcast(bytes: Uint8Array): SpaceBroadcastMessage;
@@ -0,0 +1 @@
1
+ export function serializeBroadcast(e){return new TextEncoder().encode(JSON.stringify(e))}export function deserializeBroadcast(e){return JSON.parse(new TextDecoder().decode(e))}