imag/doc/src/04000-lib-store.md

5.4 KiB

libstore

The "libstore" MUST define the programming-language level interface to the store on the file system. The library therefor MUST define and export types which can be used to get data from the filesystem.

Types

The types in @tbl:libstore:types are exported by the library.

Type Meaning
Entry Entity on the Filesystem, File
EntryContent User-Content of the Entry
EntryHeader Header of the Entry
Store Store interface
FileLockEntry Handle to an Entry

Table: Types the store library exports {#tbl:libstore:types}

Each of these types MUST export functions to work with the data the objects of the types contain.

Entry

The Entry type MUST hold the following content:

  • A path where on the filesystem the acutal file lives
  • An instance of EntryContent as interface to the content of the file (@sec:libstore:types:entrycontent).
  • An instance of EntryHeader as interface to the header of the file (@sec:libstore:types:entryheader).

The entry type MUST export functions to get

  • The content object
  • The header object
  • The path of the actual file

The entry type MUST export functions to set

  • The header object
  • The content object

EntryContent

The EntryContent type is an type-alias for String.

EntryHeader

The EntryHeader type is an wrapper around the type, the TOML-Parser library exports.

It SHOULD contain utility functions to work with the header in a convenient way.

Store

The Store type MUST represent the interface to the store on the filesystem. It MUST contain CRUD-functionality to work with the entries in the store. It MUST contain a variable which contains the path of the store on the filesystem which is represented by an object of this type. It also MUST contain a getter for this variable. It MUST NOT contain a setter for this variable, as changing the store while the programm is running is not allowed.

Hook system

The store library includes a hook system, which can be used to execute arbitrary code before or after the store was accessed. The following hooks are available:

  • PreReadHook
  • PostReadHook
  • PreCreateHook
  • PostCreateHook
  • PreUpdateHook
  • PostUpdateHook
  • PreDeleteHook
  • PostDeleteHook

These are called "Hook positions" in the following.

Which are executed before or after the store action is executed. The Pre-Hooks can deny the execution by returning an error. The Post-Hooks can (for the appropriate store actions) alter the hook result.

Registering hooks with the store is implemented via functions on the Store type itself. Hooks MUST NEVER be removed from the Store object during runtime, only adding hooks to the store is allowed.

As the hooks are simply trait objects, one is able to implement arbitrary hooks, for example

  • Simple consistency-checks for the store
  • Version control system adaption for the store (via git for example)
  • Encryption of store entries (via gnupg for example)
  • Automatic backup on every change to the store (via rsnapshot for example)

Some hooks MAY be shipped with the imag source distribution and be enabled by default.

Execution order of the hooks is a not-yet-solved problem.

Hook-Aspects

Each hook can be assigned to an "Aspect". There MAY BE zero or more aspects for each Hook position. Aspects can be sorted and configured via the configuration file, whereas each aspect has its own configuration section:

[store]

// Defines order of aspects for the pre-read hook position
pre-read-aspects  = [ "misc" ]

// Defines order of aspects for the post-read hook position
post-read-aspects = [ "decryption" ]

// ...

// configuration for the "misc" hook aspect
[[aspects.misc]]
parallel-execution = true

// configuration for the "decryption" hook aspect
[[aspects.decryption]]
parallel-execution = false

Aspects are executed in the same order they appear in the configuration (in the pre-read-aspects = [] array, for example). Aspects could be sorted in different order for each hook position.

Aspect names are unique, so one aspect "misc" in "pre-read-aspects" is the same as in "post-read-aspects" and both be configured via aspects.misc, though they do not share hooks.

Aspects where parallel execution is enabled MAY BE executed in sequence if one of the hooks wants mutable access to the data they hook into.

Hooks can then be assigned to one hook aspect. Hooks MUST never be assigned to more than one hook aspect. Hooks which are not assigned to any aspect MUST never be executed.

[hooks]

// decrypt hook with gnupg. An appropriate "gnupg-encrypt" hook must be defined
// to be fully operational, of course
[[gnupg-decrypt]]
aspect = "decryption"
key = "0x123456789"

// version control hook. Sorted into aspect "misc" here.
[[git]]
aspect = "misc"

// ...

Hooks MAY HAVE arbitrary configuration keys.