mentat/src/lib.rs

162 lines
4.6 KiB
Rust
Raw Normal View History

// Copyright 2016 Mozilla
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not use
// this file except in compliance with the License. You may obtain a copy of the
// License at http://www.apache.org/licenses/LICENSE-2.0
// Unless required by applicable law or agreed to in writing, software distributed
// under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
// CONDITIONS OF ANY KIND, either express or implied. See the License for the
// specific language governing permissions and limitations under the License.
#[macro_use]
extern crate lazy_static;
pub use edn;
#[macro_use]
extern crate core_traits;
pub use core_traits::{
now, Attribute, Binding, Entid, KnownEntid, StructuredMap, TypedValue, ValueType,
};
pub use mentat_core::{DateTime, HasSchema, Keyword, Schema, TxReport, Utc, Uuid};
pub use edn::query::FindSpec;
pub use mentat_db::{
new_connection, AttributeSet, TxObserver, CORE_SCHEMA_VERSION, DB_SCHEMA_CORE,
};
#[cfg(feature = "sqlcipher")]
pub use mentat_db::{change_encryption_key, new_connection_with_key};
2018-02-14 17:32:37 +00:00
/// Produce the appropriate `Variable` for the provided valid ?-prefixed name.
/// This lives here because we can't re-export macros:
/// https://github.com/rust-lang/rust/issues/29638.
#[macro_export]
macro_rules! var {
( ? $var:ident ) => {
$crate::Variable::from_valid_name(concat!("?", stringify!($var)))
};
}
/// Produce the appropriate `Keyword` for the provided namespace and name.
/// This lives here because we can't re-export macros:
/// https://github.com/rust-lang/rust/issues/29638.
#[macro_export]
macro_rules! kw {
2018-07-06 21:18:48 +00:00
( : $ns:ident$(. $nss:ident)+ / $nn:ident$(. $nns:ident)+ ) => {
$crate::Keyword::namespaced(
concat!(stringify!($ns) $(, ".", stringify!($nss))*),
concat!(stringify!($nn) $(, ".", stringify!($nns))*),
)
};
( : $ns:ident$(. $nss:ident)+ / $nn:ident ) => {
$crate::Keyword::namespaced(
concat!(stringify!($ns) $(, ".", stringify!($nss))*),
stringify!($nn)
)
};
2018-07-06 21:18:48 +00:00
( : $ns:ident / $nn:ident$(. $nns:ident)+ ) => {
$crate::Keyword::namespaced(
stringify!($ns),
2018-07-06 21:18:48 +00:00
concat!(stringify!($nn) $(, ".", stringify!($nns))*),
)
};
2018-07-06 21:18:48 +00:00
( : $ns:ident / $nn:ident ) => {
$crate::Keyword::namespaced(
2018-07-06 21:18:48 +00:00
stringify!($ns),
stringify!($nn)
)
};
( : $n:ident ) => {
$crate::Keyword::plain(
stringify!($n)
)
};
}
pub use public_traits::errors;
pub use public_traits::errors::{MentatError, Result};
pub use edn::{FromMicros, FromMillis, ParseError, ToMicros, ToMillis};
pub use mentat_query_projector::BindingTuple;
pub use query_algebrizer_traits::errors::AlgebrizerError;
pub use query_projector_traits::errors::ProjectorError;
pub use query_pull_traits::errors::PullError;
2018-08-08 20:19:08 +00:00
pub use sql_traits::errors::SQLError;
pub use mentat_transaction::Metadata;
pub use mentat_transaction::entity_builder;
pub use mentat_transaction::query;
pub use mentat_transaction::query::{
q_once, IntoResult, PlainSymbol, QueryExecutionResult, QueryExplanation, QueryInputs,
QueryOutput, QueryPlanStep, QueryResults, RelResult, Variable,
};
pub mod conn;
pub mod query_builder;
pub mod store;
pub mod vocabulary;
Basic sync support (#563) r=nalexander * Pre: remove remnants of 'open_empty' * Pre: Cleanup 'datoms' table after a timeline move Since timeline move operations use a transactor, they generate a "phantom" 'tx' and a 'txInstant' assertion. It is "phantom" in a sense that it was never present in the 'transactions' table, and is entirely synthetic as far as our database is concerned. It's an implementational artifact, and we were not cleaning it up. It becomes a problem when we start inserting transactions after a move. Once the transactor clashes with the phantom 'tx', it will retract the phantom 'txInstant' value, leaving the transactions log in an incorrect state. This patch adds a test for this scenario and elects the easy way out: simply remove the offending 'txInstant' datom. * Part 1: Sync without support for side-effects A "side-effect" is defined here as a mutation of a remote state as part of the sync. If, during a sync we determine that a remote state needs to be changed, bail out. This generally supports different variations of "baton-passing" syncing, where clients will succeed syncing if each change is non-conflicting. * Part 2: Support basic "side-effects" syncing This patch introduces a concept of a follow-up sync. If a sync generated a "merge transaction" (a regular transaction that contains assertions necessary for local and remote transaction logs to converge), then this transaction needs to be uploaded in a follow-up sync. Generated SyncReport indicates if a follow-up sync is required. Follow-up sync itself is just a regular sync. If remote state did not change, it will result in a simple RemoteFastForward. Otherwise, we'll continue merging and requesting a follow-up. Schema alterations are explicitly not supported. As local transactions are rebased on top of remote, following changes happen: - entids are changed into tempids, letting transactor upsert :db/unique values - entids for retractions are changed into lookup-refs if we're confident they'll succeed -- otherwise, retractions are dropped on the floor * Post: use a macro for more readable tests * Tolstoy README
2018-09-08 02:18:20 +00:00
#[cfg(feature = "syncable")]
mod sync;
#[cfg(feature = "syncable")]
pub use sync::Syncable;
Basic sync support (#563) r=nalexander * Pre: remove remnants of 'open_empty' * Pre: Cleanup 'datoms' table after a timeline move Since timeline move operations use a transactor, they generate a "phantom" 'tx' and a 'txInstant' assertion. It is "phantom" in a sense that it was never present in the 'transactions' table, and is entirely synthetic as far as our database is concerned. It's an implementational artifact, and we were not cleaning it up. It becomes a problem when we start inserting transactions after a move. Once the transactor clashes with the phantom 'tx', it will retract the phantom 'txInstant' value, leaving the transactions log in an incorrect state. This patch adds a test for this scenario and elects the easy way out: simply remove the offending 'txInstant' datom. * Part 1: Sync without support for side-effects A "side-effect" is defined here as a mutation of a remote state as part of the sync. If, during a sync we determine that a remote state needs to be changed, bail out. This generally supports different variations of "baton-passing" syncing, where clients will succeed syncing if each change is non-conflicting. * Part 2: Support basic "side-effects" syncing This patch introduces a concept of a follow-up sync. If a sync generated a "merge transaction" (a regular transaction that contains assertions necessary for local and remote transaction logs to converge), then this transaction needs to be uploaded in a follow-up sync. Generated SyncReport indicates if a follow-up sync is required. Follow-up sync itself is just a regular sync. If remote state did not change, it will result in a simple RemoteFastForward. Otherwise, we'll continue merging and requesting a follow-up. Schema alterations are explicitly not supported. As local transactions are rebased on top of remote, following changes happen: - entids are changed into tempids, letting transactor upsert :db/unique values - entids for retractions are changed into lookup-refs if we're confident they'll succeed -- otherwise, retractions are dropped on the floor * Post: use a macro for more readable tests * Tolstoy README
2018-09-08 02:18:20 +00:00
#[cfg(feature = "syncable")]
pub use mentat_tolstoy::SyncReport;
Basic sync support (#563) r=nalexander * Pre: remove remnants of 'open_empty' * Pre: Cleanup 'datoms' table after a timeline move Since timeline move operations use a transactor, they generate a "phantom" 'tx' and a 'txInstant' assertion. It is "phantom" in a sense that it was never present in the 'transactions' table, and is entirely synthetic as far as our database is concerned. It's an implementational artifact, and we were not cleaning it up. It becomes a problem when we start inserting transactions after a move. Once the transactor clashes with the phantom 'tx', it will retract the phantom 'txInstant' value, leaving the transactions log in an incorrect state. This patch adds a test for this scenario and elects the easy way out: simply remove the offending 'txInstant' datom. * Part 1: Sync without support for side-effects A "side-effect" is defined here as a mutation of a remote state as part of the sync. If, during a sync we determine that a remote state needs to be changed, bail out. This generally supports different variations of "baton-passing" syncing, where clients will succeed syncing if each change is non-conflicting. * Part 2: Support basic "side-effects" syncing This patch introduces a concept of a follow-up sync. If a sync generated a "merge transaction" (a regular transaction that contains assertions necessary for local and remote transaction logs to converge), then this transaction needs to be uploaded in a follow-up sync. Generated SyncReport indicates if a follow-up sync is required. Follow-up sync itself is just a regular sync. If remote state did not change, it will result in a simple RemoteFastForward. Otherwise, we'll continue merging and requesting a follow-up. Schema alterations are explicitly not supported. As local transactions are rebased on top of remote, following changes happen: - entids are changed into tempids, letting transactor upsert :db/unique values - entids for retractions are changed into lookup-refs if we're confident they'll succeed -- otherwise, retractions are dropped on the floor * Post: use a macro for more readable tests * Tolstoy README
2018-09-08 02:18:20 +00:00
pub use query_builder::QueryBuilder;
pub use conn::Conn;
pub use mentat_transaction::{CacheAction, CacheDirection, InProgress, Pullable, Queryable};
pub use store::Store;
#[cfg(test)]
mod tests {
use super::*;
use edn::symbols::Keyword;
#[test]
fn can_import_edn() {
assert_eq!(":foo", &Keyword::plain("foo").to_string());
}
#[test]
fn test_kw() {
assert_eq!(kw!(:foo/bar), Keyword::namespaced("foo", "bar"));
assert_eq!(
kw!(:org.mozilla.foo/bar_baz),
Keyword::namespaced("org.mozilla.foo", "bar_baz")
);
assert_eq!(
kw!(:_foo_/_bar_._baz_),
Keyword::namespaced("_foo_", "_bar_._baz_")
);
assert_eq!(
kw!(:_org_._mozilla_._foo_/_bar_._baz_),
Keyword::namespaced("_org_._mozilla_._foo_", "_bar_._baz_")
);
}
2018-02-14 17:32:37 +00:00
#[test]
fn test_var() {
let foo_baz = var!(?foo_baz);
let vu = var!(?);
assert_eq!(foo_baz, Variable::from_valid_name("?foo_baz"));
assert_eq!(vu, Variable::from_valid_name("?vü"));
assert_eq!(foo_baz.as_str(), "?foo_baz");
}
2017-01-07 01:19:21 +00:00
}