mithril_aggregator/database/record/
single_signature.rs1use chrono::{DateTime, Utc};
2use uuid::Uuid;
3
4use mithril_common::entities::{Epoch, HexEncodedSingleSignature, LotteryIndex, SingleSignatures};
5use mithril_common::{StdError, StdResult};
6use mithril_persistence::sqlite::{HydrationError, Projection, SqLiteEntity};
7
8#[derive(Debug, PartialEq, Clone)]
10pub struct SingleSignatureRecord {
11 pub open_message_id: Uuid,
13
14 pub signer_id: String,
16
17 pub registration_epoch_settings_id: Epoch,
19
20 pub lottery_indexes: Vec<LotteryIndex>,
22
23 pub signature: HexEncodedSingleSignature,
25
26 pub created_at: DateTime<Utc>,
28}
29
30impl SingleSignatureRecord {
31 pub(crate) fn try_from_single_signatures(
32 other: &SingleSignatures,
33 open_message_id: &Uuid,
34 registration_epoch_settings_id: Epoch,
35 ) -> StdResult<Self> {
36 let record = SingleSignatureRecord {
37 open_message_id: open_message_id.to_owned(),
38 signer_id: other.party_id.to_owned(),
39 registration_epoch_settings_id,
40 lottery_indexes: other.won_indexes.to_owned(),
41 signature: other.signature.to_json_hex()?,
42 created_at: Utc::now(),
43 };
44
45 Ok(record)
46 }
47}
48
49impl TryFrom<SingleSignatureRecord> for SingleSignatures {
50 type Error = StdError;
51
52 fn try_from(value: SingleSignatureRecord) -> Result<Self, Self::Error> {
53 let signatures = SingleSignatures {
54 party_id: value.signer_id,
55 won_indexes: value.lottery_indexes,
56 signature: value.signature.try_into()?,
57 authentication_status: Default::default(),
58 };
59
60 Ok(signatures)
61 }
62}
63
64impl SqLiteEntity for SingleSignatureRecord {
65 fn hydrate(row: sqlite::Row) -> Result<Self, HydrationError>
66 where
67 Self: Sized,
68 {
69 let open_message_id = row.read::<&str, _>(0);
70 let open_message_id = Uuid::parse_str(open_message_id).map_err(|e| {
71 HydrationError::InvalidData(format!(
72 "Invalid UUID in single_signature.open_message_id: '{open_message_id}'. Error: {e}"
73 ))
74 })?;
75 let signer_id = row.read::<&str, _>(1).to_string();
76 let registration_epoch_settings_id_int = row.read::<i64, _>(2);
77 let lottery_indexes_str = row.read::<&str, _>(3);
78 let signature = row.read::<&str, _>(4).to_string();
79 let created_at = row.read::<&str, _>(5);
80
81 let single_signature_record = Self {
82 open_message_id,
83 signer_id,
84 registration_epoch_settings_id: Epoch(
85 registration_epoch_settings_id_int.try_into().map_err(|e| {
86 HydrationError::InvalidData(format!(
87 "Could not cast i64 ({registration_epoch_settings_id_int}) to u64. Error: '{e}'"
88 ))
89 })?,
90 ),
91 lottery_indexes: serde_json::from_str(lottery_indexes_str).map_err(|e| {
92 HydrationError::InvalidData(format!(
93 "Could not turn string '{lottery_indexes_str}' to Vec<LotteryIndex>. Error: {e}"
94 ))
95 })?,
96 signature,
97 created_at: DateTime::parse_from_rfc3339(created_at)
98 .map_err(|e| {
99 HydrationError::InvalidData(format!(
100 "Could not turn string '{created_at}' to rfc3339 Datetime. Error: {e}"
101 ))
102 })?
103 .with_timezone(&Utc),
104 };
105
106 Ok(single_signature_record)
107 }
108
109 fn get_projection() -> Projection {
110 let mut projection = Projection::default();
111 projection.add_field(
112 "open_message_id",
113 "{:single_signature:}.open_message_id",
114 "text",
115 );
116 projection.add_field("signer_id", "{:single_signature:}.signer_id", "text");
117 projection.add_field(
118 "registration_epoch_setting_id",
119 "{:single_signature:}.registration_epoch_setting_id",
120 "integer",
121 );
122 projection.add_field(
123 "lottery_indexes",
124 "{:single_signature:}.lottery_indexes",
125 "text",
126 );
127 projection.add_field("signature", "{:single_signature:}.signature", "text");
128 projection.add_field("created_at", "{:single_signature:}.created_at", "text");
129
130 projection
131 }
132}
133
134#[cfg(test)]
135mod tests {
136 use mithril_common::test_utils::fake_data;
137
138 use super::*;
139
140 #[test]
141 fn test_convert_single_signatures() {
142 let single_signature = fake_data::single_signatures(vec![1, 3, 4, 6, 7, 9]);
143 let open_message_id = Uuid::parse_str("193d1442-e89b-43cf-9519-04d8db9a12ff").unwrap();
144 let single_signature_record = SingleSignatureRecord::try_from_single_signatures(
145 &single_signature,
146 &open_message_id,
147 Epoch(1),
148 )
149 .unwrap();
150 let single_signature_returned = single_signature_record.try_into().unwrap();
151
152 assert_eq!(single_signature, single_signature_returned);
153 }
154}