hypercore 10.0.0-alpha.12 → 10.0.0-alpha.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -63,6 +63,7 @@ Note that `tree`, `data`, and `bitfield` are normally heavily sparse files.
63
63
  createIfMissing: true, // create a new Hypercore key pair if none was present in storage
64
64
  overwrite: false, // overwrite any old Hypercore that might already exist
65
65
  valueEncoding: 'json' | 'utf-8' | 'binary', // defaults to binary
66
+ encodeBatch: batch => { ... }, // optionally apply an encoding to complete batches
66
67
  keyPair: kp, // optionally pass the public key and secret key as a key pair
67
68
  encryptionKey: k // optionally pass an encryption key to enable block encryption
68
69
  }
@@ -70,6 +71,8 @@ Note that `tree`, `data`, and `bitfield` are normally heavily sparse files.
70
71
 
71
72
  You can also set valueEncoding to any [abstract-encoding](https://github.com/mafintosh/abstract-encoding) or [compact-encoding](https://github.com/compact-encoding) instance.
72
73
 
74
+ valueEncodings will be applied to individually blocks, even if you append batches. If you want to control encoding at the batch-level, you can use the `encodeBatch` option, which is a function that takes a batch and returns a binary-encoded batch. If you provide a custom valueEncoding, it will not be applied prior to `encodeBatch`.
75
+
73
76
  #### `const seq = await core.append(block)`
74
77
 
75
78
  Append a block of data (or an array of blocks) to the core.
package/index.js CHANGED
@@ -14,7 +14,7 @@ const Replicator = require('./lib/replicator')
14
14
  const Extensions = require('./lib/extensions')
15
15
  const Core = require('./lib/core')
16
16
  const BlockEncryption = require('./lib/block-encryption')
17
- const { ReadStream } = require('./lib/streams')
17
+ const { ReadStream, WriteStream } = require('./lib/streams')
18
18
 
19
19
  const promises = Symbol.for('hypercore.promises')
20
20
  const inspect = Symbol.for('nodejs.util.inspect.custom')
@@ -55,6 +55,8 @@ module.exports = class Hypercore extends EventEmitter {
55
55
  this.cache = opts.cache === true ? new Xache({ maxSize: 65536, maxAge: 0 }) : (opts.cache || null)
56
56
 
57
57
  this.valueEncoding = null
58
+ this.encodeBatch = null
59
+
58
60
  this.key = key || null
59
61
  this.discoveryKey = null
60
62
  this.readable = true
@@ -66,7 +68,7 @@ module.exports = class Hypercore extends EventEmitter {
66
68
  this.autoClose = !!opts.autoClose
67
69
 
68
70
  this.closing = null
69
- this.opening = opts._opening || this._open(key, storage, opts)
71
+ this.opening = this._openSession(key, storage, opts)
70
72
  this.opening.catch(noop)
71
73
 
72
74
  this._preappend = preappend.bind(this)
@@ -115,31 +117,22 @@ module.exports = class Hypercore extends EventEmitter {
115
117
  }
116
118
 
117
119
  const Clz = opts.class || Hypercore
118
- const keyPair = opts.keyPair && opts.keyPair.secretKey && { ...opts.keyPair }
119
-
120
- // This only works if the hypercore was fully loaded,
121
- // but we only do this to validate the keypair to help catch bugs so yolo
122
- if (this.key && keyPair) keyPair.publicKey = this.key
123
-
124
120
  const s = new Clz(this.storage, this.key, {
125
121
  ...opts,
126
- sign: opts.sign || (keyPair && keyPair.secretKey && Core.createSigner(this.crypto, keyPair)) || this.sign,
127
- valueEncoding: this.valueEncoding,
128
122
  extensions: this.extensions,
129
123
  _opening: this.opening,
130
124
  _sessions: this.sessions
131
125
  })
132
126
 
133
- s._initSession(this)
127
+ s._passCapabilities(this)
134
128
  this.sessions.push(s)
135
129
 
136
130
  return s
137
131
  }
138
132
 
139
- _initSession (o) {
133
+ _passCapabilities (o) {
140
134
  if (!this.sign) this.sign = o.sign
141
135
  this.crypto = o.crypto
142
- this.opened = o.opened
143
136
  this.key = o.key
144
137
  this.discoveryKey = o.discoveryKey
145
138
  this.core = o.core
@@ -149,6 +142,101 @@ module.exports = class Hypercore extends EventEmitter {
149
142
  this.autoClose = o.autoClose
150
143
  }
151
144
 
145
+ async _openFromExisting (from, opts) {
146
+ await from.opening
147
+
148
+ for (const [name, ext] of this.extensions) {
149
+ from.extensions.register(name, null, ext)
150
+ }
151
+
152
+ this._passCapabilities(from)
153
+ this.extensions = from.extensions
154
+ this.sessions = from.sessions
155
+ this.storage = from.storage
156
+
157
+ this.sessions.push(this)
158
+ }
159
+
160
+ async _openSession (key, storage, opts) {
161
+ const isFirst = !opts._opening
162
+
163
+ if (!isFirst) await opts._opening
164
+ if (opts.preload) opts = { ...opts, ...(await opts.preload()) }
165
+
166
+ const keyPair = (key && opts.keyPair)
167
+ ? { ...opts.keyPair, publicKey: key }
168
+ : key
169
+ ? { publicKey: key, secretKey: null }
170
+ : opts.keyPair
171
+
172
+ // This only works if the hypercore was fully loaded,
173
+ // but we only do this to validate the keypair to help catch bugs so yolo
174
+ if (this.key && keyPair) keyPair.publicKey = this.key
175
+
176
+ if (opts.sign) {
177
+ this.sign = opts.sign
178
+ } else if (keyPair && keyPair.secretKey) {
179
+ this.sign = Core.createSigner(this.crypto, keyPair)
180
+ }
181
+
182
+ if (isFirst) {
183
+ await this._openCapabilities(keyPair, storage, opts)
184
+ // Only the root session should pass capabilities to other sessions.
185
+ for (let i = 0; i < this.sessions.length; i++) {
186
+ const s = this.sessions[i]
187
+ if (s !== this) s._passCapabilities(this)
188
+ }
189
+ }
190
+
191
+ if (!this.sign) this.sign = this.core.defaultSign
192
+ this.writable = !!this.sign
193
+
194
+ if (opts.valueEncoding) {
195
+ this.valueEncoding = c.from(codecs(opts.valueEncoding))
196
+ }
197
+ if (opts.encodeBatch) {
198
+ this.encodeBatch = opts.encodeBatch
199
+ }
200
+
201
+ // This is a hidden option that's only used by Corestore.
202
+ // It's required so that corestore can load a name from userData before 'ready' is emitted.
203
+ if (opts._preready) await opts._preready(this)
204
+
205
+ this.opened = true
206
+ this.emit('ready')
207
+ }
208
+
209
+ async _openCapabilities (keyPair, storage, opts) {
210
+ if (opts.from) return this._openFromExisting(opts.from, opts)
211
+
212
+ this.storage = Hypercore.defaultStorage(opts.storage || storage)
213
+
214
+ this.core = await Core.open(this.storage, {
215
+ keyPair,
216
+ crypto: this.crypto,
217
+ onupdate: this._oncoreupdate.bind(this)
218
+ })
219
+
220
+ if (opts.userData) {
221
+ for (const [key, value] of Object.entries(opts.userData)) {
222
+ await this.core.userData(key, value)
223
+ }
224
+ }
225
+
226
+ this.replicator = new Replicator(this.core, {
227
+ onupdate: this._onpeerupdate.bind(this)
228
+ })
229
+
230
+ this.discoveryKey = this.crypto.discoveryKey(this.core.header.signer.publicKey)
231
+ this.key = this.core.header.signer.publicKey
232
+
233
+ if (!this.encryption && opts.encryptionKey) {
234
+ this.encryption = new BlockEncryption(opts.encryptionKey, this.key)
235
+ }
236
+
237
+ this.extensions.attach(this.replicator)
238
+ }
239
+
152
240
  close () {
153
241
  if (this.closing) return this.closing
154
242
  this.closing = this._close()
@@ -237,71 +325,6 @@ module.exports = class Hypercore extends EventEmitter {
237
325
  return this.opening
238
326
  }
239
327
 
240
- async _open (key, storage, opts) {
241
- if (opts.preload) opts = { ...opts, ...(await opts.preload()) }
242
-
243
- this.valueEncoding = opts.valueEncoding ? c.from(codecs(opts.valueEncoding)) : null
244
-
245
- const keyPair = (key && opts.keyPair)
246
- ? { ...opts.keyPair, publicKey: key }
247
- : key
248
- ? { publicKey: key, secretKey: null }
249
- : opts.keyPair
250
-
251
- if (opts.from) {
252
- const from = opts.from
253
- await from.opening
254
- for (const [name, ext] of this.extensions) from.extensions.register(name, null, ext)
255
- this._initSession(from)
256
- this.extensions = from.extensions
257
- this.sessions = from.sessions
258
- this.storage = from.storage
259
- if (!this.sign) this.sign = opts.sign || ((keyPair && keyPair.secretKey) ? Core.createSigner(this.crypto, keyPair) : null)
260
- this.writable = !!this.sign
261
- this.sessions.push(this)
262
- return
263
- }
264
-
265
- if (!this.storage) this.storage = Hypercore.defaultStorage(opts.storage || storage)
266
-
267
- this.core = await Core.open(this.storage, {
268
- keyPair,
269
- crypto: this.crypto,
270
- onupdate: this._oncoreupdate.bind(this)
271
- })
272
-
273
- if (opts.userData) {
274
- for (const [key, value] of Object.entries(opts.userData)) {
275
- await this.core.userData(key, value)
276
- }
277
- }
278
-
279
- this.replicator = new Replicator(this.core, {
280
- onupdate: this._onpeerupdate.bind(this)
281
- })
282
-
283
- if (!this.sign) this.sign = opts.sign || this.core.defaultSign
284
-
285
- this.discoveryKey = this.crypto.discoveryKey(this.core.header.signer.publicKey)
286
- this.key = this.core.header.signer.publicKey
287
- this.writable = !!this.sign
288
-
289
- if (!this.encryption && opts.encryptionKey) {
290
- this.encryption = new BlockEncryption(opts.encryptionKey, this.key)
291
- }
292
-
293
- this.extensions.attach(this.replicator)
294
- this.opened = true
295
-
296
- if (opts.postload) await opts.postload(this)
297
-
298
- for (let i = 0; i < this.sessions.length; i++) {
299
- const s = this.sessions[i]
300
- if (s !== this) s._initSession(this)
301
- s.emit('ready')
302
- }
303
- }
304
-
305
328
  _oncoreupdate (status, bitfield, value, from) {
306
329
  if (status !== 0) {
307
330
  for (let i = 0; i < this.sessions.length; i++) {
@@ -405,6 +428,10 @@ module.exports = class Hypercore extends EventEmitter {
405
428
  return new ReadStream(this, opts)
406
429
  }
407
430
 
431
+ createWriteStream (opts) {
432
+ return new WriteStream(this, opts)
433
+ }
434
+
408
435
  download (range) {
409
436
  const linear = !!(range && range.linear)
410
437
 
@@ -462,10 +489,13 @@ module.exports = class Hypercore extends EventEmitter {
462
489
  blocks = Array.isArray(blocks) ? blocks : [blocks]
463
490
 
464
491
  const preappend = this.encryption && this._preappend
465
- const buffers = new Array(blocks.length)
466
492
 
467
- for (let i = 0; i < blocks.length; i++) {
468
- buffers[i] = this._encode(this.valueEncoding, blocks[i])
493
+ const buffers = this.encodeBatch !== null ? this.encodeBatch(blocks) : new Array(blocks.length)
494
+
495
+ if (this.encodeBatch === null) {
496
+ for (let i = 0; i < blocks.length; i++) {
497
+ buffers[i] = this._encode(this.valueEncoding, blocks[i])
498
+ }
469
499
  }
470
500
 
471
501
  return await this.core.append(buffers, this.sign, { preappend })
package/lib/core.js CHANGED
@@ -1,4 +1,5 @@
1
1
  const hypercoreCrypto = require('hypercore-crypto')
2
+ const b4a = require('b4a')
2
3
  const Oplog = require('./oplog')
3
4
  const Mutex = require('./mutex')
4
5
  const MerkleTree = require('./merkle-tree')
@@ -90,7 +91,7 @@ module.exports = class Core {
90
91
  await oplog.flush(header)
91
92
  }
92
93
 
93
- if (opts.keyPair && !header.signer.publicKey.equals(opts.keyPair.publicKey)) {
94
+ if (opts.keyPair && !b4a.equals(header.signer.publicKey, opts.keyPair.publicKey)) {
94
95
  throw new Error('Another hypercore is stored here')
95
96
  }
96
97
 
@@ -176,7 +177,7 @@ module.exports = class Core {
176
177
 
177
178
  for (const u of this.header.userData) {
178
179
  if (u.key !== key) continue
179
- if (value && u.value.equals(value)) return
180
+ if (value && b4a.equals(u.value, value)) return
180
181
  empty = false
181
182
  break
182
183
  }
@@ -215,7 +215,7 @@ class ReorgBatch extends MerkleTreeBatch {
215
215
  const nodes = []
216
216
  const root = verifyBlock(proof, this.tree.crypto, nodes)
217
217
 
218
- if (root === null || !root.hash.equals(this.diff.hash)) return false
218
+ if (root === null || !b4a.equals(root.hash, this.diff.hash)) return false
219
219
 
220
220
  this.nodes.push(...nodes)
221
221
  return this._update(nodes)
@@ -233,7 +233,7 @@ class ReorgBatch extends MerkleTreeBatch {
233
233
  if (!left) break
234
234
 
235
235
  const existing = await this.tree.get(left.index, false)
236
- if (!existing || !existing.hash.equals(left.hash)) {
236
+ if (!existing || !b4a.equals(existing.hash, left.hash)) {
237
237
  diff = left
238
238
  } else {
239
239
  diff = n.get(ite.sibling())
@@ -355,7 +355,7 @@ module.exports = class MerkleTree {
355
355
  }
356
356
 
357
357
  addNode (node) {
358
- if (node.size === 0 && node.hash.equals(BLANK_HASH)) node = blankNode(node.index)
358
+ if (node.size === 0 && b4a.equals(node.hash, BLANK_HASH)) node = blankNode(node.index)
359
359
  this.unflushed.set(node.index, node)
360
360
  }
361
361
 
@@ -379,6 +379,17 @@ module.exports = class MerkleTree {
379
379
  return this.signature !== null && this.crypto.verify(this.signable(), this.signature, key)
380
380
  }
381
381
 
382
+ getRoots (length) {
383
+ const indexes = flat.fullRoots(2 * length)
384
+ const roots = new Array(indexes.length)
385
+
386
+ for (let i = 0; i < indexes.length; i++) {
387
+ roots[i] = this.get(indexes[i], true)
388
+ }
389
+
390
+ return Promise.all(roots)
391
+ }
392
+
382
393
  get (index, error = true) {
383
394
  let node = this.unflushed.get(index)
384
395
 
@@ -534,7 +545,7 @@ module.exports = class MerkleTree {
534
545
 
535
546
  for (const root of batch.roots) {
536
547
  const existing = await this.get(root.index, false)
537
- if (existing && existing.hash.equals(root.hash)) continue
548
+ if (existing && b4a.equals(existing.hash, root.hash)) continue
538
549
  batch._updateDiffRoot(root)
539
550
  break
540
551
  }
@@ -562,7 +573,7 @@ module.exports = class MerkleTree {
562
573
 
563
574
  if (unverified) {
564
575
  const verified = await this.get(unverified.index)
565
- if (!verified.hash.equals(unverified.hash)) {
576
+ if (!b4a.equals(verified.hash, unverified.hash)) {
566
577
  throw new Error('Invalid checksum at node ' + unverified.index)
567
578
  }
568
579
  }
@@ -707,7 +718,7 @@ module.exports = class MerkleTree {
707
718
  await new Promise((resolve, reject) => {
708
719
  storage.read(0, OLD_TREE.length, (err, buf) => {
709
720
  if (err) return resolve()
710
- if (buf.equals(OLD_TREE)) return reject(new Error('Storage contains an incompatible merkle tree'))
721
+ if (b4a.equals(buf, OLD_TREE)) return reject(new Error('Storage contains an incompatible merkle tree'))
711
722
  resolve()
712
723
  })
713
724
  })
package/lib/streams.js CHANGED
@@ -1,4 +1,4 @@
1
- const { Readable } = require('streamx')
1
+ const { Writable, Readable } = require('streamx')
2
2
 
3
3
  class ReadStream extends Readable {
4
4
  constructor (core, opts = {}) {
@@ -37,3 +37,20 @@ class ReadStream extends Readable {
37
37
  }
38
38
 
39
39
  exports.ReadStream = ReadStream
40
+
41
+ class WriteStream extends Writable {
42
+ constructor (core) {
43
+ super()
44
+ this.core = core
45
+ }
46
+
47
+ _writev (batch, cb) {
48
+ this._writevP(batch).then(cb, cb)
49
+ }
50
+
51
+ async _writevP (batch) {
52
+ await this.core.append(batch)
53
+ }
54
+ }
55
+
56
+ exports.WriteStream = WriteStream
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "hypercore",
3
- "version": "10.0.0-alpha.12",
3
+ "version": "10.0.0-alpha.16",
4
4
  "description": "Hypercore 10",
5
5
  "main": "index.js",
6
6
  "scripts": {
@@ -27,15 +27,20 @@
27
27
  "url": "https://github.com/hypercore-protocol/hypercore/issues"
28
28
  },
29
29
  "homepage": "https://github.com/hypercore-protocol/hypercore#readme",
30
+ "files": [
31
+ "index.js",
32
+ "lib/**.js"
33
+ ],
30
34
  "dependencies": {
31
35
  "@hyperswarm/secret-stream": "^5.0.0",
32
36
  "b4a": "^1.1.0",
33
37
  "big-sparse-array": "^1.0.2",
34
- "codecs": "^2.2.0",
38
+ "codecs": "^3.0.0",
35
39
  "compact-encoding": "^2.5.0",
36
40
  "crc32-universal": "^1.0.1",
41
+ "events": "^3.3.0",
37
42
  "flat-tree": "^1.9.0",
38
- "hypercore-crypto": "^3.0.0",
43
+ "hypercore-crypto": "^3.1.0",
39
44
  "is-options": "^1.0.1",
40
45
  "random-access-file": "^2.1.4",
41
46
  "random-array-iterator": "^1.0.0",
@@ -1,23 +0,0 @@
1
- name: Build Status
2
- on:
3
- push:
4
- branches:
5
- - master
6
- pull_request:
7
- branches:
8
- - master
9
- jobs:
10
- build:
11
- strategy:
12
- matrix:
13
- node-version: [lts/*]
14
- os: [ubuntu-latest, macos-latest, windows-latest]
15
- runs-on: ${{ matrix.os }}
16
- steps:
17
- - uses: actions/checkout@v2
18
- - name: Use Node.js ${{ matrix.node-version }}
19
- uses: actions/setup-node@v2
20
- with:
21
- node-version: ${{ matrix.node-version }}
22
- - run: npm install
23
- - run: npm test
package/UPGRADE.md DELETED
@@ -1,9 +0,0 @@
1
- # Upgrade Notes
2
-
3
- Notes for downstream developers who are upgrading their modules to new, breaking versions of hypercore.
4
-
5
- ## 9.0.0
6
-
7
- - The format of signatures [has been changed](https://github.com/mafintosh/hypercore/issues/260). This is backwards-compatible (v9 can read v8 signatures), but forward-incompatible (v8 cannot read v9 signatures). If a v8 peer replicates with a v9 peer, it will emit a "REMOTE SIGNTURE INVALID" error on the replication stream.
8
- - The encryption ([NOISE](https://github.com/emilbayes/noise-protocol)) handshake has been changed in an backwards- and forwards-incompatible way. v8 peers can not handshake with v9 peers, and vice-versa. A NOISE-related error is emitted on the replication stream.
9
- - There is no way (yet) to detect whether a peer is running an incompatible version of hypercore at the replication level. One workaround for downstream developers is to include their own application-level handshake before piping to the replication stream, to communicate a "app protocol version" (maybe "v8" and "v9") and abort the connection if the peer is running an incompatible version.