dandelion-mesh 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +192 -0
- package/build/main/crypto/CryptoService.d.ts +31 -0
- package/build/main/crypto/CryptoService.js +78 -0
- package/build/main/index.d.ts +11 -0
- package/build/main/index.js +24 -0
- package/build/main/mesh/DandelionMesh.d.ts +115 -0
- package/build/main/mesh/DandelionMesh.js +368 -0
- package/build/main/mesh/types.d.ts +58 -0
- package/build/main/mesh/types.js +3 -0
- package/build/main/raft/RaftNode.d.ts +87 -0
- package/build/main/raft/RaftNode.js +443 -0
- package/build/main/raft/log/InMemoryRaftLog.d.ts +20 -0
- package/build/main/raft/log/InMemoryRaftLog.js +55 -0
- package/build/main/raft/log/LocalStorageRaftLog.d.ts +9 -0
- package/build/main/raft/log/LocalStorageRaftLog.js +16 -0
- package/build/main/raft/log/RaftLog.d.ts +30 -0
- package/build/main/raft/log/RaftLog.js +3 -0
- package/build/main/raft/log/RaftLog.test-util.d.ts +3 -0
- package/build/main/raft/log/RaftLog.test-util.js +82 -0
- package/build/main/raft/log/SessionStorageRaftLog.d.ts +9 -0
- package/build/main/raft/log/SessionStorageRaftLog.js +38 -0
- package/build/main/raft/log/StorageRaftLog.d.ts +28 -0
- package/build/main/raft/log/StorageRaftLog.js +117 -0
- package/build/main/raft/log/StorageRaftLog.test-util.d.ts +3 -0
- package/build/main/raft/log/StorageRaftLog.test-util.js +54 -0
- package/build/main/raft/types.d.ts +53 -0
- package/build/main/raft/types.js +3 -0
- package/build/main/transport/PeerJSTransport.d.ts +46 -0
- package/build/main/transport/PeerJSTransport.js +139 -0
- package/build/main/transport/Transport.d.ts +38 -0
- package/build/main/transport/Transport.js +8 -0
- package/build/module/crypto/CryptoService.d.ts +31 -0
- package/build/module/crypto/CryptoService.js +69 -0
- package/build/module/index.d.ts +11 -0
- package/build/module/index.js +11 -0
- package/build/module/mesh/DandelionMesh.d.ts +115 -0
- package/build/module/mesh/DandelionMesh.js +364 -0
- package/build/module/mesh/types.d.ts +58 -0
- package/build/module/mesh/types.js +2 -0
- package/build/module/raft/RaftNode.d.ts +87 -0
- package/build/module/raft/RaftNode.js +440 -0
- package/build/module/raft/log/InMemoryRaftLog.d.ts +20 -0
- package/build/module/raft/log/InMemoryRaftLog.js +48 -0
- package/build/module/raft/log/LocalStorageRaftLog.d.ts +9 -0
- package/build/module/raft/log/LocalStorageRaftLog.js +12 -0
- package/build/module/raft/log/RaftLog.d.ts +30 -0
- package/build/module/raft/log/RaftLog.js +2 -0
- package/build/module/raft/log/RaftLog.test-util.d.ts +3 -0
- package/build/module/raft/log/RaftLog.test-util.js +78 -0
- package/build/module/raft/log/SessionStorageRaftLog.d.ts +9 -0
- package/build/module/raft/log/SessionStorageRaftLog.js +34 -0
- package/build/module/raft/log/StorageRaftLog.d.ts +28 -0
- package/build/module/raft/log/StorageRaftLog.js +114 -0
- package/build/module/raft/log/StorageRaftLog.test-util.d.ts +3 -0
- package/build/module/raft/log/StorageRaftLog.test-util.js +50 -0
- package/build/module/raft/types.d.ts +53 -0
- package/build/module/raft/types.js +2 -0
- package/build/module/transport/PeerJSTransport.d.ts +46 -0
- package/build/module/transport/PeerJSTransport.js +134 -0
- package/build/module/transport/Transport.d.ts +38 -0
- package/build/module/transport/Transport.js +7 -0
- package/package.json +119 -0
|
@@ -0,0 +1,368 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.DandelionMesh = void 0;
|
|
4
|
+
const CryptoService_1 = require("../crypto/CryptoService");
|
|
5
|
+
const RaftNode_1 = require("../raft/RaftNode");
|
|
6
|
+
const InMemoryRaftLog_1 = require("../raft/log/InMemoryRaftLog");
|
|
7
|
+
/**
|
|
8
|
+
* DandelionMesh — a fault-tolerant P2P mesh network for browser applications.
|
|
9
|
+
*
|
|
10
|
+
* Combines three layers:
|
|
11
|
+
* - **Transport** (default: PeerJS) — handles peer-to-peer WebRTC connections.
|
|
12
|
+
* - **Crypto** — RSA-OAEP + AES-256-GCM hybrid encryption for private messages.
|
|
13
|
+
* - **Raft consensus** — leader election and totally-ordered log replication.
|
|
14
|
+
*
|
|
15
|
+
* All application messages (public broadcasts and encrypted private messages)
|
|
16
|
+
* flow through the Raft log, guaranteeing every peer sees the same events in
|
|
17
|
+
* the same order. Non-leader peers forward proposals to the current leader.
|
|
18
|
+
*
|
|
19
|
+
* ## Events
|
|
20
|
+
*
|
|
21
|
+
* | Event | Payload | When |
|
|
22
|
+
* |------------------|--------------------------------------|---------------------------------------------|
|
|
23
|
+
* | `ready` | `localPeerId: string` | Transport is open and Raft has started |
|
|
24
|
+
* | `message` | `MeshMessage<T>, replay: boolean` | A committed log entry is delivered |
|
|
25
|
+
* | `peersChanged` | `peers: string[]` | A peer connects or disconnects |
|
|
26
|
+
* | `leaderChanged` | `leaderId: string \| null` | Raft leader changes |
|
|
27
|
+
* | `error` | `Error` | Transport-level error |
|
|
28
|
+
*
|
|
29
|
+
* @typeParam T - The application-level payload type for messages.
|
|
30
|
+
*
|
|
31
|
+
* @example
|
|
32
|
+
* ```ts
|
|
33
|
+
* const transport = new PeerJSTransport({ peerId: 'alice' });
|
|
34
|
+
* const mesh = new DandelionMesh<GameAction>(transport, {
|
|
35
|
+
* bootstrapPeers: ['bob', 'charlie'],
|
|
36
|
+
* });
|
|
37
|
+
*
|
|
38
|
+
* mesh.on('ready', (id) => console.log('My ID:', id));
|
|
39
|
+
* mesh.on('message', (msg) => {
|
|
40
|
+
* if (msg.type === 'public') console.log(msg.sender, msg.data);
|
|
41
|
+
* if (msg.type === 'private') console.log('secret from', msg.sender);
|
|
42
|
+
* });
|
|
43
|
+
*
|
|
44
|
+
* await mesh.sendPublic({ action: 'bet', amount: 100 });
|
|
45
|
+
* await mesh.sendPrivate('bob', { cards: ['Ah', 'Kd'] });
|
|
46
|
+
* ```
|
|
47
|
+
*
|
|
48
|
+
* @example Providing a pre-generated crypto key bundle
|
|
49
|
+
* ```ts
|
|
50
|
+
* const bundle = await generateKeyBundle(2048);
|
|
51
|
+
* const mesh = new DandelionMesh(transport, { cryptoKeyBundle: bundle });
|
|
52
|
+
* ```
|
|
53
|
+
*/
|
|
54
|
+
class DandelionMesh {
|
|
55
|
+
constructor(transport, options) {
|
|
56
|
+
var _a, _b, _c, _d;
|
|
57
|
+
this.raftNode = null;
|
|
58
|
+
this.cryptoBundle = null;
|
|
59
|
+
this.peerPublicKeys = new Map();
|
|
60
|
+
this.pendingKeyWaiters = new Map();
|
|
61
|
+
this.lastAppliedIndex = 0;
|
|
62
|
+
this.listeners = {
|
|
63
|
+
ready: new Set(),
|
|
64
|
+
message: new Set(),
|
|
65
|
+
peersChanged: new Set(),
|
|
66
|
+
leaderChanged: new Set(),
|
|
67
|
+
error: new Set(),
|
|
68
|
+
};
|
|
69
|
+
// --- Transport event handlers ---
|
|
70
|
+
this.onTransportOpen = (peerId) => {
|
|
71
|
+
this.localPeerId = peerId;
|
|
72
|
+
// Connect to bootstrap peers
|
|
73
|
+
for (const bp of this.bootstrapPeers) {
|
|
74
|
+
if (bp !== peerId) {
|
|
75
|
+
this.transport.connect(bp);
|
|
76
|
+
}
|
|
77
|
+
}
|
|
78
|
+
// Initialize Raft node
|
|
79
|
+
this.raftNode = new RaftNode_1.RaftNode(peerId, this.raftLog, this.raftOptions);
|
|
80
|
+
this.raftNode.sendMessage = (toPeerId, message) => {
|
|
81
|
+
this.transport
|
|
82
|
+
.send(toPeerId, this.wireMessage('raft', message))
|
|
83
|
+
.catch(() => {
|
|
84
|
+
// Peer may have disconnected; non-fatal
|
|
85
|
+
});
|
|
86
|
+
};
|
|
87
|
+
this.raftNode.on('committed', this.onRaftCommitted);
|
|
88
|
+
this.raftNode.on('leaderChanged', (leaderId) => {
|
|
89
|
+
this.emit('leaderChanged', leaderId);
|
|
90
|
+
});
|
|
91
|
+
// Start Raft with currently connected peers
|
|
92
|
+
this.raftNode.start(this.transport.connectedPeers);
|
|
93
|
+
this.emit('ready', peerId);
|
|
94
|
+
// Propose our public key through Raft so all peers (including
|
|
95
|
+
// those joining later) receive it via log replay.
|
|
96
|
+
this.proposePublicKey();
|
|
97
|
+
};
|
|
98
|
+
this.onPeerConnected = (_remotePeerId) => {
|
|
99
|
+
var _a;
|
|
100
|
+
// Update Raft cluster membership
|
|
101
|
+
(_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.updatePeers(this.transport.connectedPeers);
|
|
102
|
+
this.emit('peersChanged', this.peers);
|
|
103
|
+
};
|
|
104
|
+
this.onPeerDisconnected = (_remotePeerId) => {
|
|
105
|
+
var _a;
|
|
106
|
+
(_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.updatePeers(this.transport.connectedPeers);
|
|
107
|
+
this.emit('peersChanged', this.peers);
|
|
108
|
+
};
|
|
109
|
+
this.onTransportMessage = (fromPeerId, data) => {
|
|
110
|
+
var _a;
|
|
111
|
+
const wire = data;
|
|
112
|
+
if (!wire || !wire.channel)
|
|
113
|
+
return;
|
|
114
|
+
if (wire.channel === 'raft') {
|
|
115
|
+
(_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.handleMessage(fromPeerId, wire.payload);
|
|
116
|
+
}
|
|
117
|
+
else if (wire.channel === 'control') {
|
|
118
|
+
this.handleControlMessage(wire.payload);
|
|
119
|
+
}
|
|
120
|
+
};
|
|
121
|
+
this.onTransportError = (error) => {
|
|
122
|
+
this.emit('error', error);
|
|
123
|
+
};
|
|
124
|
+
// --- Raft commit handler ---
|
|
125
|
+
this.onRaftCommitted = (entry, index) => {
|
|
126
|
+
const isReplay = index <= this.lastAppliedIndex;
|
|
127
|
+
const cmd = entry.command;
|
|
128
|
+
switch (cmd._meshType) {
|
|
129
|
+
case 'public':
|
|
130
|
+
this.emit('message', {
|
|
131
|
+
type: 'public',
|
|
132
|
+
sender: cmd.sender,
|
|
133
|
+
data: cmd.data,
|
|
134
|
+
}, isReplay);
|
|
135
|
+
break;
|
|
136
|
+
case 'encrypted':
|
|
137
|
+
this.handleEncryptedCommit(cmd, isReplay);
|
|
138
|
+
break;
|
|
139
|
+
case 'publicKey': {
|
|
140
|
+
if (!this.peerPublicKeys.has(cmd.peerId)) {
|
|
141
|
+
const keyPromise = (0, CryptoService_1.importPublicKey)(cmd.jwk);
|
|
142
|
+
this.peerPublicKeys.set(cmd.peerId, keyPromise);
|
|
143
|
+
// Notify any pending sendPrivate calls waiting for this key
|
|
144
|
+
const waiters = this.pendingKeyWaiters.get(cmd.peerId);
|
|
145
|
+
if (waiters) {
|
|
146
|
+
for (const resolve of waiters) {
|
|
147
|
+
resolve(keyPromise);
|
|
148
|
+
}
|
|
149
|
+
this.pendingKeyWaiters.delete(cmd.peerId);
|
|
150
|
+
}
|
|
151
|
+
}
|
|
152
|
+
break;
|
|
153
|
+
}
|
|
154
|
+
}
|
|
155
|
+
if (!isReplay) {
|
|
156
|
+
this.lastAppliedIndex = index;
|
|
157
|
+
}
|
|
158
|
+
};
|
|
159
|
+
this.transport = transport;
|
|
160
|
+
this.modulusLength = (_a = options === null || options === void 0 ? void 0 : options.modulusLength) !== null && _a !== void 0 ? _a : 4096;
|
|
161
|
+
this.raftOptions = (_b = options === null || options === void 0 ? void 0 : options.raft) !== null && _b !== void 0 ? _b : {};
|
|
162
|
+
this.raftLog =
|
|
163
|
+
(_c = options === null || options === void 0 ? void 0 : options.raftLog) !== null && _c !== void 0 ? _c : new InMemoryRaftLog_1.InMemoryRaftLog();
|
|
164
|
+
this.bootstrapPeers = (_d = options === null || options === void 0 ? void 0 : options.bootstrapPeers) !== null && _d !== void 0 ? _d : [];
|
|
165
|
+
this.lastAppliedIndex = this.raftLog.length();
|
|
166
|
+
// Use provided key bundle or generate a new one
|
|
167
|
+
this.cryptoReady = ((options === null || options === void 0 ? void 0 : options.cryptoKeyBundle)
|
|
168
|
+
? Promise.resolve(options.cryptoKeyBundle)
|
|
169
|
+
: (0, CryptoService_1.generateKeyBundle)(this.modulusLength)).then((bundle) => {
|
|
170
|
+
this.cryptoBundle = bundle;
|
|
171
|
+
return bundle;
|
|
172
|
+
});
|
|
173
|
+
// Wire up transport events
|
|
174
|
+
this.transport.on('open', this.onTransportOpen);
|
|
175
|
+
this.transport.on('peerConnected', this.onPeerConnected);
|
|
176
|
+
this.transport.on('peerDisconnected', this.onPeerDisconnected);
|
|
177
|
+
this.transport.on('message', this.onTransportMessage);
|
|
178
|
+
this.transport.on('error', this.onTransportError);
|
|
179
|
+
}
|
|
180
|
+
// --- Public API ---
|
|
181
|
+
/** Send a public (broadcast) message through the Raft cluster */
|
|
182
|
+
async sendPublic(data) {
|
|
183
|
+
if (!this.raftNode || !this.localPeerId)
|
|
184
|
+
return false;
|
|
185
|
+
const entry = {
|
|
186
|
+
_meshType: 'public',
|
|
187
|
+
sender: this.localPeerId,
|
|
188
|
+
data,
|
|
189
|
+
};
|
|
190
|
+
if (this.raftNode.isLeader()) {
|
|
191
|
+
return this.raftNode.propose(entry);
|
|
192
|
+
}
|
|
193
|
+
// Forward to leader
|
|
194
|
+
const leaderId = this.raftNode.getLeaderId();
|
|
195
|
+
if (!leaderId)
|
|
196
|
+
return false;
|
|
197
|
+
const propose = { _meshType: 'propose', command: entry };
|
|
198
|
+
await this.transport.send(leaderId, this.wireMessage('control', propose));
|
|
199
|
+
return true;
|
|
200
|
+
}
|
|
201
|
+
/** Send an encrypted private message through the Raft cluster */
|
|
202
|
+
async sendPrivate(recipientPeerId, data) {
|
|
203
|
+
if (!this.raftNode || !this.localPeerId)
|
|
204
|
+
return false;
|
|
205
|
+
const recipientKey = await this.getOrAwaitPublicKey(recipientPeerId);
|
|
206
|
+
const plaintext = new TextEncoder().encode(JSON.stringify(data));
|
|
207
|
+
const payload = await (0, CryptoService_1.encrypt)(plaintext, recipientKey);
|
|
208
|
+
const entry = {
|
|
209
|
+
_meshType: 'encrypted',
|
|
210
|
+
sender: this.localPeerId,
|
|
211
|
+
recipient: recipientPeerId,
|
|
212
|
+
payload,
|
|
213
|
+
};
|
|
214
|
+
if (this.raftNode.isLeader()) {
|
|
215
|
+
return this.raftNode.propose(entry);
|
|
216
|
+
}
|
|
217
|
+
// Forward to leader
|
|
218
|
+
const leaderId = this.raftNode.getLeaderId();
|
|
219
|
+
if (!leaderId)
|
|
220
|
+
return false;
|
|
221
|
+
const propose = { _meshType: 'propose', command: entry };
|
|
222
|
+
await this.transport.send(leaderId, this.wireMessage('control', propose));
|
|
223
|
+
return true;
|
|
224
|
+
}
|
|
225
|
+
/** Get all connected peer IDs (including self) */
|
|
226
|
+
get peers() {
|
|
227
|
+
const connected = [...this.transport.connectedPeers];
|
|
228
|
+
if (this.localPeerId)
|
|
229
|
+
connected.unshift(this.localPeerId);
|
|
230
|
+
return connected;
|
|
231
|
+
}
|
|
232
|
+
/** Get the current Raft leader ID */
|
|
233
|
+
get leaderId() {
|
|
234
|
+
var _a, _b;
|
|
235
|
+
return (_b = (_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.getLeaderId()) !== null && _b !== void 0 ? _b : null;
|
|
236
|
+
}
|
|
237
|
+
/** Whether this node is the Raft leader */
|
|
238
|
+
get isLeader() {
|
|
239
|
+
var _a, _b;
|
|
240
|
+
return (_b = (_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.isLeader()) !== null && _b !== void 0 ? _b : false;
|
|
241
|
+
}
|
|
242
|
+
/** The local peer ID (available after 'ready') */
|
|
243
|
+
get peerId() {
|
|
244
|
+
return this.localPeerId;
|
|
245
|
+
}
|
|
246
|
+
/** Register an event listener */
|
|
247
|
+
on(event, listener) {
|
|
248
|
+
this.listeners[event].add(listener);
|
|
249
|
+
}
|
|
250
|
+
/** Remove an event listener */
|
|
251
|
+
off(event, listener) {
|
|
252
|
+
this.listeners[event].delete(listener);
|
|
253
|
+
}
|
|
254
|
+
/** Shut down the mesh: stop Raft, close transport */
|
|
255
|
+
close() {
|
|
256
|
+
var _a;
|
|
257
|
+
(_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.destroy();
|
|
258
|
+
this.transport.off('open', this.onTransportOpen);
|
|
259
|
+
this.transport.off('peerConnected', this.onPeerConnected);
|
|
260
|
+
this.transport.off('peerDisconnected', this.onPeerDisconnected);
|
|
261
|
+
this.transport.off('message', this.onTransportMessage);
|
|
262
|
+
this.transport.off('error', this.onTransportError);
|
|
263
|
+
this.transport.close();
|
|
264
|
+
}
|
|
265
|
+
// --- Control message handling ---
|
|
266
|
+
handleControlMessage(msg) {
|
|
267
|
+
var _a;
|
|
268
|
+
switch (msg._meshType) {
|
|
269
|
+
case 'propose': {
|
|
270
|
+
// A non-leader peer is forwarding a command to us (the leader)
|
|
271
|
+
if ((_a = this.raftNode) === null || _a === void 0 ? void 0 : _a.isLeader()) {
|
|
272
|
+
this.raftNode.propose(msg.command);
|
|
273
|
+
}
|
|
274
|
+
break;
|
|
275
|
+
}
|
|
276
|
+
}
|
|
277
|
+
}
|
|
278
|
+
async handleEncryptedCommit(cmd, isReplay) {
|
|
279
|
+
if (!this.localPeerId)
|
|
280
|
+
return;
|
|
281
|
+
// Only the intended recipient decrypts
|
|
282
|
+
if (cmd.recipient !== this.localPeerId)
|
|
283
|
+
return;
|
|
284
|
+
if (!this.cryptoBundle) {
|
|
285
|
+
await this.cryptoReady;
|
|
286
|
+
}
|
|
287
|
+
try {
|
|
288
|
+
const plaintext = await (0, CryptoService_1.decrypt)(cmd.payload, this.cryptoBundle.privateKey);
|
|
289
|
+
const data = JSON.parse(new TextDecoder().decode(plaintext));
|
|
290
|
+
this.emit('message', {
|
|
291
|
+
type: 'private',
|
|
292
|
+
sender: cmd.sender,
|
|
293
|
+
recipient: cmd.recipient,
|
|
294
|
+
data,
|
|
295
|
+
}, isReplay);
|
|
296
|
+
}
|
|
297
|
+
catch (err) {
|
|
298
|
+
// Not for us or decryption failed — this is expected for other recipients
|
|
299
|
+
}
|
|
300
|
+
}
|
|
301
|
+
// --- Key management ---
|
|
302
|
+
async proposePublicKey() {
|
|
303
|
+
if (!this.cryptoBundle) {
|
|
304
|
+
await this.cryptoReady;
|
|
305
|
+
}
|
|
306
|
+
if (!this.localPeerId || !this.cryptoBundle || !this.raftNode)
|
|
307
|
+
return;
|
|
308
|
+
// Wait until a leader is available
|
|
309
|
+
if (!this.raftNode.isLeader() && !this.raftNode.getLeaderId()) {
|
|
310
|
+
await new Promise((resolve) => {
|
|
311
|
+
const onLeader = (leaderId) => {
|
|
312
|
+
if (leaderId) {
|
|
313
|
+
this.off('leaderChanged', onLeader);
|
|
314
|
+
resolve();
|
|
315
|
+
}
|
|
316
|
+
};
|
|
317
|
+
this.on('leaderChanged', onLeader);
|
|
318
|
+
});
|
|
319
|
+
}
|
|
320
|
+
if (!this.raftNode)
|
|
321
|
+
return;
|
|
322
|
+
const announcement = {
|
|
323
|
+
_meshType: 'publicKey',
|
|
324
|
+
peerId: this.localPeerId,
|
|
325
|
+
jwk: this.cryptoBundle.publicKeyJwk,
|
|
326
|
+
};
|
|
327
|
+
if (this.raftNode.isLeader()) {
|
|
328
|
+
this.raftNode.propose(announcement);
|
|
329
|
+
}
|
|
330
|
+
else {
|
|
331
|
+
const leaderId = this.raftNode.getLeaderId();
|
|
332
|
+
if (!leaderId)
|
|
333
|
+
return;
|
|
334
|
+
const propose = {
|
|
335
|
+
_meshType: 'propose',
|
|
336
|
+
command: announcement,
|
|
337
|
+
};
|
|
338
|
+
this.transport
|
|
339
|
+
.send(leaderId, this.wireMessage('control', propose))
|
|
340
|
+
.catch(() => { });
|
|
341
|
+
}
|
|
342
|
+
}
|
|
343
|
+
async getOrAwaitPublicKey(peerId) {
|
|
344
|
+
const existing = this.peerPublicKeys.get(peerId);
|
|
345
|
+
if (existing)
|
|
346
|
+
return existing;
|
|
347
|
+
// Wait for the key to arrive via Raft commit
|
|
348
|
+
return new Promise((resolve) => {
|
|
349
|
+
let waiters = this.pendingKeyWaiters.get(peerId);
|
|
350
|
+
if (!waiters) {
|
|
351
|
+
waiters = [];
|
|
352
|
+
this.pendingKeyWaiters.set(peerId, waiters);
|
|
353
|
+
}
|
|
354
|
+
waiters.push((keyPromise) => resolve(keyPromise));
|
|
355
|
+
});
|
|
356
|
+
}
|
|
357
|
+
// --- Helpers ---
|
|
358
|
+
wireMessage(channel, payload) {
|
|
359
|
+
return { channel, payload };
|
|
360
|
+
}
|
|
361
|
+
emit(event, ...args) {
|
|
362
|
+
for (const listener of this.listeners[event]) {
|
|
363
|
+
listener(...args);
|
|
364
|
+
}
|
|
365
|
+
}
|
|
366
|
+
}
|
|
367
|
+
exports.DandelionMesh = DandelionMesh;
|
|
368
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"DandelionMesh.js","sourceRoot":"","sources":["../../../src/mesh/DandelionMesh.ts"],"names":[],"mappings":";;;AAAA,2DAMiC;AACjC,+CAA6D;AAC7D,iEAA8D;AAuC9D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8CG;AACH,MAAa,aAAa;IA2BxB,YAAY,SAAoB,EAAE,OAA8B;;QAxBxD,aAAQ,GAAuC,IAAI,CAAC;QAIpD,iBAAY,GAA2B,IAAI,CAAC;QACnC,mBAAc,GAAG,IAAI,GAAG,EAA8B,CAAC;QACvD,sBAAiB,GAAG,IAAI,GAAG,EAGzC,CAAC;QAKI,qBAAgB,GAAG,CAAC,CAAC;QAEZ,cAAS,GAAmB;YAC3C,KAAK,EAAE,IAAI,GAAG,EAAE;YAChB,OAAO,EAAE,IAAI,GAAG,EAAE;YAClB,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,aAAa,EAAE,IAAI,GAAG,EAAE;YACxB,KAAK,EAAE,IAAI,GAAG,EAAE;SACjB,CAAC;QAoIF,mCAAmC;QAE3B,oBAAe,GAAG,CAAC,MAAc,EAAQ,EAAE;YACjD,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC;YAE1B,6BAA6B;YAC7B,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,cAAc,EAAE;gBACpC,IAAI,EAAE,KAAK,MAAM,EAAE;oBACjB,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;iBAC5B;aACF;YAED,uBAAuB;YACvB,IAAI,CAAC,QAAQ,GAAG,IAAI,mBAAQ,CAC1B,MAAM,EACN,IAAI,CAAC,OAAO,EACZ,IAAI,CAAC,WAAW,CACjB,CAAC;YACF,IAAI,CAAC,QAAQ,CAAC,WAAW,GAAG,CAAC,QAAQ,EAAE,OAAO,EAAE,EAAE;gBAChD,IAAI,CAAC,SAAS;qBACX,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;qBACjD,KAAK,CAAC,GAAG,EAAE;oBACV,wCAAwC;gBAC1C,CAAC,CAAC,CAAC;YACP,CAAC,CAAC;YACF,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,WAAW,EAAE,IAAI,CAAC,eAAe,CAAC,CAAC;YACpD,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,eAAe,EAAE,CAAC,QAAQ,EAAE,EAAE;gBAC7C,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,QAAQ,CAAC,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,4CAA4C;YAC5C,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,cAA0B,CAAC,CAAC;YAE/D,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;YAE3B,8DAA8D;YAC9D,kDAAkD;YAClD,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC,CAAC;QAEM,oBAAe,GAAG,CAAC,aAAqB,EAAQ,EAAE;;YACxD,iCAAiC;YACjC,MAAA,IAAI,CAAC,QAAQ,0CAAE,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,cAA0B,CAAC,CAAC;YACtE,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,CAAC;QACxC,CAAC,CAAC;QAEM,uBAAkB,GAAG,CAAC,aAAqB,EAAQ,EAAE;;YAC3D,MAAA,IAAI,CAAC,QAAQ,0CAAE,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,cAA0B,CAAC,CAAC;YACtE,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,CAAC;QACxC,CAAC,CAAC;QAEM,uBAAkB,GAAG,CAAC,UAAkB,EAAE,IAAa,EAAQ,EAAE;;YACvE,MAAM,IAAI,GAAG,IAAmB,CAAC;YACjC,IAAI,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO;gBAAE,OAAO;YAEnC,IAAI,IAAI,CAAC,OAAO,KAAK,MAAM,EAAE;gBAC3B,MAAA,IAAI,CAAC,QAAQ,0CAAE,aAAa,CAC1B,UAAU,EACV,IAAI,CAAC,OAAyC,CAC/C,CAAC;aACH;iBAAM,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,EAAE;gBACrC,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,OAAgC,CAAC,CAAC;aAClE;QACH,CAAC,CAAC;QAEM,qBAAgB,GAAG,CAAC,KAAY,EAAQ,EAAE;YAChD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;QAC5B,CAAC,CAAC;QAgBF,8BAA8B;QAEtB,oBAAe,GAAG,CACxB,KAAkC,EAClC,KAAa,EACP,EAAE;YACR,MAAM,QAAQ,GAAG,KAAK,IAAI,IAAI,CAAC,gBAAgB,CAAC;YAChD,MAAM,GAAG,GAAG,KAAK,CAAC,OAAO,CAAC;YAC1B,QAAQ,GAAG,CAAC,SAAS,EAAE;gBACrB,KAAK,QAAQ;oBACX,IAAI,CAAC,IAAI,CACP,SAAS,EACT;wBACE,IAAI,EAAE,QAAQ;wBACd,MAAM,EAAE,GAAG,CAAC,MAAM;wBAClB,IAAI,EAAE,GAAG,CAAC,IAAI;qBACG,EACnB,QAAQ,CACT,CAAC;oBACF,MAAM;gBAER,KAAK,WAAW;oBACd,IAAI,CAAC,qBAAqB,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;oBAC1C,MAAM;gBAER,KAAK,WAAW,CAAC,CAAC;oBAChB,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE;wBACxC,MAAM,UAAU,GAAG,IAAA,+BAAe,EAAC,GAAG,CAAC,GAAG,CAAC,CAAC;wBAC5C,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;wBAEhD,4DAA4D;wBAC5D,MAAM,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;wBACvD,IAAI,OAAO,EAAE;4BACX,KAAK,MAAM,OAAO,IAAI,OAAO,EAAE;gCAC7B,OAAO,CAAC,UAAU,CAAC,CAAC;6BACrB;4BACD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;yBAC3C;qBACF;oBACD,MAAM;iBACP;aACF;YAED,IAAI,CAAC,QAAQ,EAAE;gBACb,IAAI,CAAC,gBAAgB,GAAG,KAAK,CAAC;aAC/B;QACH,CAAC,CAAC;QAlQA,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,aAAa,GAAG,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,aAAa,mCAAI,IAAI,CAAC;QACpD,IAAI,CAAC,WAAW,GAAG,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,IAAI,mCAAI,EAAE,CAAC;QACvC,IAAI,CAAC,OAAO;YACV,MAAC,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,OAAsC,mCAChD,IAAI,iCAAe,EAAqB,CAAC;QAC3C,IAAI,CAAC,cAAc,GAAG,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,mCAAI,EAAE,CAAC;QACpD,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC;QAE9C,gDAAgD;QAChD,IAAI,CAAC,WAAW,GAAG,CACjB,CAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,eAAe;YACtB,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,OAAO,CAAC,eAAe,CAAC;YAC1C,CAAC,CAAC,IAAA,iCAAiB,EAAC,IAAI,CAAC,aAAa,CAAC,CAC1C,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,EAAE;YAChB,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC;YAC3B,OAAO,MAAM,CAAC;QAChB,CAAC,CAAC,CAAC;QAEH,2BAA2B;QAC3B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,MAAM,EAAE,IAAI,CAAC,eAAe,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,eAAe,EAAE,IAAI,CAAC,eAAe,CAAC,CAAC;QACzD,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB,CAAC,CAAC;QAC/D,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,SAAS,EAAE,IAAI,CAAC,kBAAkB,CAAC,CAAC;QACtD,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,gBAAgB,CAAC,CAAC;IACpD,CAAC;IAED,qBAAqB;IAErB,iEAAiE;IACjE,KAAK,CAAC,UAAU,CAAC,IAAO;QACtB,IAAI,CAAC,IAAI,CAAC,QAAQ,IAAI,CAAC,IAAI,CAAC,WAAW;YAAE,OAAO,KAAK,CAAC;QAEtD,MAAM,KAAK,GAA0B;YACnC,SAAS,EAAE,QAAQ;YACnB,MAAM,EAAE,IAAI,CAAC,WAAW;YACxB,IAAI;SACL,CAAC;QAEF,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,EAAE;YAC5B,OAAO,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;SACrC;QAED,oBAAoB;QACpB,MAAM,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;QAC7C,IAAI,CAAC,QAAQ;YAAE,OAAO,KAAK,CAAC;QAE5B,MAAM,OAAO,GAAsB,EAAE,SAAS,EAAE,SAAS,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC;QAC5E,MAAM,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAAC;QAC1E,OAAO,IAAI,CAAC;IACd,CAAC;IAED,iEAAiE;IACjE,KAAK,CAAC,WAAW,CAAC,eAAuB,EAAE,IAAO;QAChD,IAAI,CAAC,IAAI,CAAC,QAAQ,IAAI,CAAC,IAAI,CAAC,WAAW;YAAE,OAAO,KAAK,CAAC;QAEtD,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,eAAe,CAAC,CAAC;QACrE,MAAM,SAAS,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;QACjE,MAAM,OAAO,GAAG,MAAM,IAAA,uBAAO,EAAC,SAAS,EAAE,YAAY,CAAC,CAAC;QAEvD,MAAM,KAAK,GAA4B;YACrC,SAAS,EAAE,WAAW;YACtB,MAAM,EAAE,IAAI,CAAC,WAAW;YACxB,SAAS,EAAE,eAAe;YAC1B,OAAO;SACR,CAAC;QAEF,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,EAAE;YAC5B,OAAO,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;SACrC;QAED,oBAAoB;QACpB,MAAM,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;QAC7C,IAAI,CAAC,QAAQ;YAAE,OAAO,KAAK,CAAC;QAE5B,MAAM,OAAO,GAAsB,EAAE,SAAS,EAAE,SAAS,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC;QAC5E,MAAM,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAAC;QAC1E,OAAO,IAAI,CAAC;IACd,CAAC;IAED,kDAAkD;IAClD,IAAI,KAAK;QACP,MAAM,SAAS,GAAG,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,CAAC;QACrD,IAAI,IAAI,CAAC,WAAW;YAAE,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC1D,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,qCAAqC;IACrC,IAAI,QAAQ;;QACV,OAAO,MAAA,MAAA,IAAI,CAAC,QAAQ,0CAAE,WAAW,EAAE,mCAAI,IAAI,CAAC;IAC9C,CAAC;IAED,2CAA2C;IAC3C,IAAI,QAAQ;;QACV,OAAO,MAAA,MAAA,IAAI,CAAC,QAAQ,0CAAE,QAAQ,EAAE,mCAAI,KAAK,CAAC;IAC5C,CAAC;IAED,kDAAkD;IAClD,IAAI,MAAM;QACR,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;IAED,iCAAiC;IACjC,EAAE,CACA,KAAQ,EACR,QAAmC;QAElC,IAAI,CAAC,SAAS,CAAC,KAAK,CAAoC,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;IAC1E,CAAC;IAED,+BAA+B;IAC/B,GAAG,CACD,KAAQ,EACR,QAAmC;QAElC,IAAI,CAAC,SAAS,CAAC,KAAK,CAAoC,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;IAC7E,CAAC;IAED,qDAAqD;IACrD,KAAK;;QACH,MAAA,IAAI,CAAC,QAAQ,0CAAE,OAAO,EAAE,CAAC;QACzB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,MAAM,EAAE,IAAI,CAAC,eAAe,CAAC,CAAC;QACjD,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,eAAe,EAAE,IAAI,CAAC,eAAe,CAAC,CAAC;QAC1D,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB,CAAC,CAAC;QAChE,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,CAAC,kBAAkB,CAAC,CAAC;QACvD,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,CAAC,gBAAgB,CAAC,CAAC;QACnD,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,CAAC;IACzB,CAAC;IAuED,mCAAmC;IAE3B,oBAAoB,CAAC,GAA0B;;QACrD,QAAQ,GAAG,CAAC,SAAS,EAAE;YACrB,KAAK,SAAS,CAAC,CAAC;gBACd,+DAA+D;gBAC/D,IAAI,MAAA,IAAI,CAAC,QAAQ,0CAAE,QAAQ,EAAE,EAAE;oBAC7B,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;iBACpC;gBACD,MAAM;aACP;SACF;IACH,CAAC;IAkDO,KAAK,CAAC,qBAAqB,CACjC,GAA4B,EAC5B,QAAiB;QAEjB,IAAI,CAAC,IAAI,CAAC,WAAW;YAAE,OAAO;QAE9B,uCAAuC;QACvC,IAAI,GAAG,CAAC,SAAS,KAAK,IAAI,CAAC,WAAW;YAAE,OAAO;QAE/C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,CAAC,WAAW,CAAC;SACxB;QACD,IAAI;YACF,MAAM,SAAS,GAAG,MAAM,IAAA,uBAAO,EAC7B,GAAG,CAAC,OAAO,EACX,IAAI,CAAC,YAAa,CAAC,UAAU,CAC9B,CAAC;YACF,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,CAAM,CAAC;YAClE,IAAI,CAAC,IAAI,CACP,SAAS,EACT;gBACE,IAAI,EAAE,SAAS;gBACf,MAAM,EAAE,GAAG,CAAC,MAAM;gBAClB,SAAS,EAAE,GAAG,CAAC,SAAS;gBACxB,IAAI;aACa,EACnB,QAAQ,CACT,CAAC;SACH;QAAC,OAAO,GAAG,EAAE;YACZ,0EAA0E;SAC3E;IACH,CAAC;IAED,yBAAyB;IAEjB,KAAK,CAAC,gBAAgB;QAC5B,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,CAAC,WAAW,CAAC;SACxB;QACD,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,CAAC,IAAI,CAAC,YAAY,IAAI,CAAC,IAAI,CAAC,QAAQ;YAAE,OAAO;QAEtE,mCAAmC;QACnC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,EAAE;YAC7D,MAAM,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;gBAClC,MAAM,QAAQ,GAAG,CAAC,QAAuB,EAAE,EAAE;oBAC3C,IAAI,QAAQ,EAAE;wBACZ,IAAI,CAAC,GAAG,CAAC,eAAe,EAAE,QAAQ,CAAC,CAAC;wBACpC,OAAO,EAAE,CAAC;qBACX;gBACH,CAAC,CAAC;gBACF,IAAI,CAAC,EAAE,CAAC,eAAe,EAAE,QAAQ,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;SACJ;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ;YAAE,OAAO;QAE3B,MAAM,YAAY,GAA0B;YAC1C,SAAS,EAAE,WAAW;YACtB,MAAM,EAAE,IAAI,CAAC,WAAW;YACxB,GAAG,EAAE,IAAI,CAAC,YAAY,CAAC,YAAY;SACpC,CAAC;QAEF,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,EAAE;YAC5B,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;SACrC;aAAM;YACL,MAAM,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC7C,IAAI,CAAC,QAAQ;gBAAE,OAAO;YACtB,MAAM,OAAO,GAAsB;gBACjC,SAAS,EAAE,SAAS;gBACpB,OAAO,EAAE,YAAY;aACtB,CAAC;YACF,IAAI,CAAC,SAAS;iBACX,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;iBACpD,KAAK,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;SACpB;IACH,CAAC;IAEO,KAAK,CAAC,mBAAmB,CAAC,MAAc;QAC9C,MAAM,QAAQ,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,QAAQ;YAAE,OAAO,QAAQ,CAAC;QAE9B,6CAA6C;QAC7C,OAAO,IAAI,OAAO,CAAY,CAAC,OAAO,EAAE,EAAE;YACxC,IAAI,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YACjD,IAAI,CAAC,OAAO,EAAE;gBACZ,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;aAC7C;YACD,OAAO,CAAC,IAAI,CAAC,CAAC,UAAU,EAAE,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;QACpD,CAAC,CAAC,CAAC;IACL,CAAC;IAED,kBAAkB;IAEV,WAAW,CACjB,OAA2B,EAC3B,OAAgB;QAEhB,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC;IAC9B,CAAC;IAEO,IAAI,CACV,KAAQ,EACR,GAAG,IAA2C;QAE9C,KAAK,MAAM,QAAQ,IAAI,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,EAAE;YAC3C,QAAkE,CACjE,GAAG,IAAI,CACR,CAAC;SACH;IACH,CAAC;CACF;AA/YD,sCA+YC"}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import { EncryptedPayload } from '../crypto/CryptoService';
|
|
2
|
+
export interface PublicMessage<T = unknown> {
|
|
3
|
+
type: 'public';
|
|
4
|
+
sender: string;
|
|
5
|
+
data: T;
|
|
6
|
+
}
|
|
7
|
+
export interface PrivateMessage<T = unknown> {
|
|
8
|
+
type: 'private';
|
|
9
|
+
sender: string;
|
|
10
|
+
recipient: string;
|
|
11
|
+
data: T;
|
|
12
|
+
}
|
|
13
|
+
export type MeshMessage<T = unknown> = PublicMessage<T> | PrivateMessage<T>;
|
|
14
|
+
/** Broadcast of a peer's RSA public key */
|
|
15
|
+
export interface PublicKeyAnnouncement {
|
|
16
|
+
_meshType: 'publicKey';
|
|
17
|
+
peerId: string;
|
|
18
|
+
jwk: JsonWebKey;
|
|
19
|
+
}
|
|
20
|
+
/** An encrypted private message (the Raft log entry payload for private messages) */
|
|
21
|
+
export interface EncryptedPrivateMessage {
|
|
22
|
+
_meshType: 'encrypted';
|
|
23
|
+
sender: string;
|
|
24
|
+
recipient: string;
|
|
25
|
+
payload: EncryptedPayload;
|
|
26
|
+
}
|
|
27
|
+
/** A public message log entry */
|
|
28
|
+
export interface PublicMessageEntry<T = unknown> {
|
|
29
|
+
_meshType: 'public';
|
|
30
|
+
sender: string;
|
|
31
|
+
data: T;
|
|
32
|
+
}
|
|
33
|
+
/** Union of all Raft log command types */
|
|
34
|
+
export type MeshLogCommand<T = unknown> = PublicMessageEntry<T> | EncryptedPrivateMessage | PublicKeyAnnouncement;
|
|
35
|
+
/** A proposal forwarded from a non-leader to the leader */
|
|
36
|
+
export interface ProposeMessage<T = unknown> {
|
|
37
|
+
_meshType: 'propose';
|
|
38
|
+
command: MeshLogCommand<T>;
|
|
39
|
+
}
|
|
40
|
+
/** Internal transport-level messages (not replicated via Raft) */
|
|
41
|
+
export type MeshControlMessage<T = unknown> = ProposeMessage<T>;
|
|
42
|
+
/** Wrapper to distinguish Raft messages from mesh control messages on the wire */
|
|
43
|
+
export interface WireMessage {
|
|
44
|
+
channel: 'raft' | 'control';
|
|
45
|
+
payload: unknown;
|
|
46
|
+
}
|
|
47
|
+
export interface DandelionMeshEvents<T = unknown> {
|
|
48
|
+
/** Local peer is ready */
|
|
49
|
+
ready: (localPeerId: string) => void;
|
|
50
|
+
/** A message was committed and delivered */
|
|
51
|
+
message: (message: MeshMessage<T>, replay: boolean) => void;
|
|
52
|
+
/** The set of connected peer IDs changed */
|
|
53
|
+
peersChanged: (peers: string[]) => void;
|
|
54
|
+
/** The cluster leader changed */
|
|
55
|
+
leaderChanged: (leaderId: string | null) => void;
|
|
56
|
+
/** An error occurred */
|
|
57
|
+
error: (error: Error) => void;
|
|
58
|
+
}
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHlwZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvbWVzaC90eXBlcy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiIn0=
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
import { RaftLog } from './log/RaftLog';
|
|
2
|
+
import { RaftMessage, RaftNodeEvents, RaftRole } from './types';
|
|
3
|
+
export interface RaftNodeOptions {
|
|
4
|
+
/** Minimum election timeout in ms (default 2000) */
|
|
5
|
+
electionTimeoutMin?: number;
|
|
6
|
+
/** Maximum election timeout in ms (default 4000) */
|
|
7
|
+
electionTimeoutMax?: number;
|
|
8
|
+
/** Heartbeat interval in ms (default 400) */
|
|
9
|
+
heartbeatInterval?: number;
|
|
10
|
+
}
|
|
11
|
+
/**
|
|
12
|
+
* Core Raft consensus node.
|
|
13
|
+
*
|
|
14
|
+
* This class implements the Raft algorithm for leader election and log
|
|
15
|
+
* replication. It is transport-agnostic — the caller must wire up
|
|
16
|
+
* `sendMessage` to deliver RPCs, and call `handleMessage` when RPCs arrive.
|
|
17
|
+
*
|
|
18
|
+
* Log indices are 1-based per the Raft paper.
|
|
19
|
+
*/
|
|
20
|
+
export declare class RaftNode<T = unknown> {
|
|
21
|
+
readonly id: string;
|
|
22
|
+
private role;
|
|
23
|
+
private currentTerm;
|
|
24
|
+
private votedFor;
|
|
25
|
+
private leaderId;
|
|
26
|
+
private commitIndex;
|
|
27
|
+
private lastApplied;
|
|
28
|
+
private nextIndex;
|
|
29
|
+
private matchIndex;
|
|
30
|
+
private electionTimer;
|
|
31
|
+
private heartbeatTimer;
|
|
32
|
+
private readonly electionTimeoutMin;
|
|
33
|
+
private readonly electionTimeoutMax;
|
|
34
|
+
private readonly heartbeatInterval;
|
|
35
|
+
private peers;
|
|
36
|
+
private votesReceived;
|
|
37
|
+
private readonly log;
|
|
38
|
+
/** Called by the node to send an RPC to a peer — must be wired up externally */
|
|
39
|
+
sendMessage: (toPeerId: string, message: RaftMessage<T>) => void;
|
|
40
|
+
private readonly eventListeners;
|
|
41
|
+
private destroyed;
|
|
42
|
+
constructor(id: string, log: RaftLog<T>, options?: RaftNodeOptions);
|
|
43
|
+
/** Start the node (begin election timer as follower) */
|
|
44
|
+
start(peerIds: string[]): void;
|
|
45
|
+
/** Update the cluster membership dynamically (e.g. when peers join/leave) */
|
|
46
|
+
updatePeers(peerIds: string[]): void;
|
|
47
|
+
/** Submit a command to be replicated. Only succeeds on the leader. */
|
|
48
|
+
propose(command: T): boolean;
|
|
49
|
+
/** Handle an incoming Raft RPC message from a peer */
|
|
50
|
+
handleMessage(fromPeerId: string, message: RaftMessage<T>): void;
|
|
51
|
+
/** Get current role */
|
|
52
|
+
getRole(): RaftRole;
|
|
53
|
+
/** Get current term */
|
|
54
|
+
getCurrentTerm(): number;
|
|
55
|
+
/** Get the current leader ID (null if unknown) */
|
|
56
|
+
getLeaderId(): string | null;
|
|
57
|
+
/** Get the commit index */
|
|
58
|
+
getCommitIndex(): number;
|
|
59
|
+
/** Check if this node is the leader */
|
|
60
|
+
isLeader(): boolean;
|
|
61
|
+
/** Register an event listener */
|
|
62
|
+
on<E extends keyof RaftNodeEvents<T>>(event: E, listener: RaftNodeEvents<T>[E]): void;
|
|
63
|
+
/** Remove an event listener */
|
|
64
|
+
off<E extends keyof RaftNodeEvents<T>>(event: E, listener: RaftNodeEvents<T>[E]): void;
|
|
65
|
+
/** Stop all timers and clean up */
|
|
66
|
+
destroy(): void;
|
|
67
|
+
private becomeFollower;
|
|
68
|
+
private becomeCandidate;
|
|
69
|
+
private becomeLeader;
|
|
70
|
+
private handleRequestVote;
|
|
71
|
+
private handleRequestVoteResult;
|
|
72
|
+
/** Check if a candidate's log is at least as up-to-date as ours */
|
|
73
|
+
private isLogUpToDate;
|
|
74
|
+
private handleAppendEntries;
|
|
75
|
+
private handleAppendEntriesResult;
|
|
76
|
+
private sendAppendEntriesToAll;
|
|
77
|
+
private sendAppendEntriesTo;
|
|
78
|
+
/** Advance commitIndex if a majority of matchIndex values allow it */
|
|
79
|
+
private advanceCommitIndex;
|
|
80
|
+
/** Apply all committed but not-yet-applied entries */
|
|
81
|
+
private applyCommitted;
|
|
82
|
+
private resetElectionTimer;
|
|
83
|
+
private clearElectionTimer;
|
|
84
|
+
private clearHeartbeatTimer;
|
|
85
|
+
private persistState;
|
|
86
|
+
private emit;
|
|
87
|
+
}
|