Skip to content

Commit e7f5050

Browse files
Require complete documentation coverage (dfinity#315)
1 parent 10a1d31 commit e7f5050

32 files changed

+633
-37
lines changed

ic-agent/src/agent/agent_config.rs

+5-1
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,15 @@ use crate::{
55
use std::{sync::Arc, time::Duration};
66

77
/// A configuration for an agent.
8-
8+
#[derive(Debug)]
99
pub struct AgentConfig {
10+
/// See [`with_nonce_factory`](super::AgentBuilder::with_nonce_factory).
1011
pub nonce_factory: Arc<dyn NonceGenerator>,
12+
/// See [`with_identity`](super::AgentBuilder::with_identity).
1113
pub identity: Arc<dyn Identity>,
14+
/// See [`with_ingress_expiry`](super::AgentBuilder::with_ingress_expiry).
1215
pub ingress_expiry_duration: Option<Duration>,
16+
/// The [`with_transport`](super::AgentBuilder::with_transport).
1317
pub transport: Option<Arc<dyn ReplicaV2Transport>>,
1418
}
1519

ic-agent/src/agent/agent_error.rs

+60-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
//! Errors that can occur when using the replica agent.
2+
13
use crate::{agent::status::Status, hash_tree::Label, RequestIdError};
24
use leb128::read;
35
use std::{
@@ -6,122 +8,174 @@ use std::{
68
};
79
use thiserror::Error;
810

11+
/// An error that occurred when using the agent.
912
#[derive(Error, Debug)]
1013
pub enum AgentError {
14+
/// The replica URL was invalid.
1115
#[error(r#"Invalid Replica URL: "{0}""#)]
1216
InvalidReplicaUrl(String),
1317

18+
/// The request timed out.
1419
#[error("The request timed out.")]
1520
TimeoutWaitingForResponse(),
1621

22+
/// The waiter was restarted without being started first.
1723
#[error("The waiter was restarted without being started first.")]
1824
WaiterRestartError(),
1925

26+
/// An error occurred when signing with the identity.
2027
#[error("Identity had a signing error: {0}")]
2128
SigningError(String),
2229

30+
/// The data fetched was invalid CBOR.
2331
#[error("Invalid CBOR data, could not deserialize: {0}")]
2432
InvalidCborData(#[from] serde_cbor::Error),
2533

34+
/// There was an error calculating a request ID.
2635
#[error("Cannot calculate a RequestID: {0}")]
2736
CannotCalculateRequestId(#[from] RequestIdError),
2837

38+
/// There was an error when de/serializing with Candid.
2939
#[error("Candid returned an error: {0}")]
3040
CandidError(Box<dyn Send + Sync + std::error::Error>),
3141

42+
/// There was an error parsing a URL.
3243
#[error(r#"Cannot parse url: "{0}""#)]
3344
UrlParseError(#[from] url::ParseError),
3445

46+
/// The HTTP method was invalid.
3547
#[error(r#"Invalid method: "{0}""#)]
3648
InvalidMethodError(#[from] http::method::InvalidMethod),
3749

50+
/// The principal string was not a valid principal.
3851
#[error("Cannot parse Principal: {0}")]
3952
PrincipalError(#[from] crate::export::PrincipalError),
4053

54+
/// The replica rejected the message.
4155
#[error(r#"The Replica returned an error: code {reject_code}, message: "{reject_message}""#)]
4256
ReplicaError {
57+
/// The [reject code](https://smartcontracts.org/docs/interface-spec/index.html#reject-codes) returned by the replica.
4358
reject_code: u64,
59+
/// The rejection message.
4460
reject_message: String,
4561
},
4662

63+
/// The replica returned an HTTP error.
4764
#[error("The replica returned an HTTP Error: {0}")]
4865
HttpError(HttpErrorPayload),
4966

67+
/// Attempted to use HTTP authentication in a non-secure URL (either HTTPS or localhost).
5068
#[error("HTTP Authentication cannot be used in a non-secure URL (either HTTPS or localhost)")]
5169
CannotUseAuthenticationOnNonSecureUrl(),
5270

71+
/// The password manager returned an error.
5372
#[error("Password Manager returned an error: {0}")]
5473
AuthenticationError(String),
5574

75+
/// The status endpoint returned an invalid status.
5676
#[error("Status endpoint returned an invalid status.")]
5777
InvalidReplicaStatus,
5878

79+
/// The call was marked done, but no reply was provided.
5980
#[error("Call was marked as done but we never saw the reply. Request ID: {0}")]
6081
RequestStatusDoneNoReply(String),
6182

83+
/// A string error occurred in an external tool.
6284
#[error("A tool returned a string message error: {0}")]
6385
MessageError(String),
6486

87+
/// An error occurred in an external tool.
6588
#[error("A tool returned a custom error: {0}")]
6689
CustomError(#[from] Box<dyn Send + Sync + std::error::Error>),
6790

91+
/// There was an error reading a LEB128 value.
6892
#[error("Error reading LEB128 value: {0}")]
6993
Leb128ReadError(#[from] read::Error),
7094

95+
/// A string was invalid UTF-8.
7196
#[error("Error in UTF-8 string: {0}")]
7297
Utf8ReadError(#[from] Utf8Error),
7398

99+
/// The lookup path was absent in the certificate.
74100
#[error("The lookup path ({0:?}) is absent in the certificate.")]
75101
LookupPathAbsent(Vec<Label>),
76102

103+
/// The lookup path was unknown in the certificate.
77104
#[error("The lookup path ({0:?}) is unknown in the certificate.")]
78105
LookupPathUnknown(Vec<Label>),
79106

107+
/// The lookup path did not make sense for the certificate.
80108
#[error("The lookup path ({0:?}) does not make sense for the certificate.")]
81109
LookupPathError(Vec<Label>),
82110

111+
/// The request status at the requested path was invalid.
83112
#[error("The request status ({1}) at path {0:?} is invalid.")]
84113
InvalidRequestStatus(Vec<Label>, String),
85114

115+
/// The certificate verification failed.
86116
#[error("Certificate verification failed.")]
87117
CertificateVerificationFailed(),
88118

119+
/// There was a length mismatch between the expected and actual length of the BLS DER-encoded public key.
89120
#[error(
90121
r#"BLS DER-encoded public key must be ${expected} bytes long, but is {actual} bytes long."#
91122
)]
92-
DerKeyLengthMismatch { expected: usize, actual: usize },
123+
DerKeyLengthMismatch {
124+
/// The expected length of the key.
125+
expected: usize,
126+
/// The actual length of the key.
127+
actual: usize,
128+
},
93129

130+
/// There was a mismatch between the expected and actual prefix of the BLS DER-encoded public key.
94131
#[error("BLS DER-encoded public key is invalid. Expected the following prefix: ${expected:?}, but got ${actual:?}")]
95-
DerPrefixMismatch { expected: Vec<u8>, actual: Vec<u8> },
132+
DerPrefixMismatch {
133+
/// The expected key prefix.
134+
expected: Vec<u8>,
135+
/// The actual key prefix.
136+
actual: Vec<u8>,
137+
},
96138

139+
/// The status response did not contain a root key.
97140
#[error("The status response did not contain a root key. Status: {0}")]
98141
NoRootKeyInStatus(Status),
99142

143+
/// Could not read the replica root key.
100144
#[error("Could not read the root key")]
101145
CouldNotReadRootKey(),
102146

147+
/// Failed to initialize the BLS library.
103148
#[error("Failed to initialize the BLS library")]
104149
BlsInitializationFailure(),
105150

151+
/// The invocation to the wallet call forward method failed with an error.
106152
#[error("The invocation to the wallet call forward method failed with the error: {0}")]
107153
WalletCallFailed(String),
108154

155+
/// The wallet operation failed.
109156
#[error("The wallet operation failed: {0}")]
110157
WalletError(String),
111158

159+
/// The wallet canister must be upgraded. See [`dfx wallet upgrade`](https://smartcontracts.org/docs/developers-guide/cli-reference/dfx-wallet.html)
112160
#[error("The wallet canister must be upgraded: {0}")]
113161
WalletUpgradeRequired(String),
114162

163+
/// The transport was not specified in the [`AgentBuilder`](super::AgentBuilder).
115164
#[error("Missing replica transport in the Agent Builder.")]
116165
MissingReplicaTransport(),
117166

167+
/// An unknown error occurred during communication with the replica.
118168
#[error("An error happened during communication with the replica: {0}")]
119169
TransportError(Box<dyn std::error::Error + Send + Sync>),
120170

171+
/// There was a mismatch between the expected and actual CBOR data during inspection.
121172
#[error("There is a mismatch between the CBOR encoded call and the arguments: field {field}, value in argument is {value_arg}, value in CBOR is {value_cbor}")]
122173
CallDataMismatch {
174+
/// The field that was mismatched.
123175
field: String,
176+
/// The value that was expected to be in the CBOR.
124177
value_arg: String,
178+
/// The value that was actually in the CBOR.
125179
value_cbor: String,
126180
},
127181
}
@@ -134,9 +188,13 @@ impl PartialEq for AgentError {
134188
}
135189
}
136190

191+
/// A HTTP error from the replica.
137192
pub struct HttpErrorPayload {
193+
/// The HTTP status code.
138194
pub status: u16,
195+
/// The MIME type of `content`.
139196
pub content_type: Option<String>,
197+
/// The body of the error.
140198
pub content: Vec<u8>,
141199
}
142200

ic-agent/src/agent/builder.rs

+2
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ use crate::{
44
};
55
use std::sync::Arc;
66

7+
/// A builder for an [`Agent`].
8+
#[derive(Debug)]
79
pub struct AgentBuilder {
810
config: AgentConfig,
911
}

ic-agent/src/agent/http_transport.rs

+7
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,10 @@ pub trait PasswordManager: Send + Sync {
2222
fn required(&self, url: &str) -> Result<(String, String), String>;
2323
}
2424

25+
impl_debug_empty!(dyn PasswordManager);
26+
2527
/// A [ReplicaV2Transport] using Reqwest to make HTTP calls to the internet computer.
28+
#[derive(Debug)]
2629
pub struct ReqwestHttpReplicaV2Transport {
2730
url: reqwest::Url,
2831
client: reqwest::Client,
@@ -33,6 +36,7 @@ const IC0_DOMAIN: &str = "ic0.app";
3336
const IC0_SUB_DOMAIN: &str = ".ic0.app";
3437

3538
impl ReqwestHttpReplicaV2Transport {
39+
/// Creates a replica transport from a HTTP URL.
3640
pub fn create<U: Into<String>>(url: U) -> Result<Self, AgentError> {
3741
let mut tls_config = rustls::ClientConfig::builder()
3842
.with_safe_defaults()
@@ -64,6 +68,7 @@ impl ReqwestHttpReplicaV2Transport {
6468
})
6569
}
6670

71+
/// Sets a password manager to use with HTTP authentication.
6772
pub fn with_password_manager<P: 'static + PasswordManager>(self, password_manager: P) -> Self {
6873
ReqwestHttpReplicaV2Transport {
6974
password_manager: Some(Arc::new(password_manager)),
@@ -72,6 +77,7 @@ impl ReqwestHttpReplicaV2Transport {
7277
}
7378
}
7479

80+
/// Same as [`with_password_manager`], but providing the Arc so one does not have to be created.
7581
pub fn with_arc_password_manager(self, password_manager: Arc<dyn PasswordManager>) -> Self {
7682
ReqwestHttpReplicaV2Transport {
7783
password_manager: Some(password_manager),
@@ -80,6 +86,7 @@ impl ReqwestHttpReplicaV2Transport {
8086
}
8187
}
8288

89+
/// Gets the set password manager, if one exists. Otherwise returns None.
8390
pub fn password_manager(&self) -> Option<&dyn PasswordManager> {
8491
self.password_manager.as_deref()
8592
}

0 commit comments

Comments
 (0)