(u)canto is a library for UCAN based RPC that provides:
- A declarative system for defining capabilities (roughly equivalent to HTTP routes in REST).
- A system for binding capability handles (a.k.a providers) to form services with built-in routing.
- A UCAN validation system.
- A runtime for executing UCAN capability invocations.
- A pluggable transport layer.
- A client supporting batched invocations and full type inference.
the name ucanto is a word play on UCAN and canto (one of the major divisions of a long poem)
To get a taste of the libary we will build up a "filesystem" service, in which:
- Top level paths are did:key identifiers, here on referred to as (user) drives.
- Drives are owned by users holding a private key corresponding to the did:key of the drive.
- Drive owners can mutate the filesystem within their drive's path and delegate that ability to others.
The very first thing we want to do is define the set of capabilities our service will provide. Each (cap)ability MUST:
- Have a
can
field denoting an action it can perform. - Have a
with
URI denoting the resource it can perform that action on. - Be comparable to other capabilities (with set semantics, as in does capability
a
include capabilityb
?)
Let's define the file/link
capability, where resources are identified via file:
URLs and MAY contain a link
to be mapped to a given path.
import { capability, URI, Link, Failure } from '@ucanto/server'
const Add = capability({
can: 'file/link',
with: URI.match({ protocol: 'file:' }),
nb: { link: Link },
derives: (claimed, delegated) =>
// Can be derived if claimed capability path is contained in the delegated
// capability path.
claimed.uri.href.startsWith(ensureTrailingDelimiter(delegated.uri.href)) ||
new Failure(`Notebook ${claimed.uri} is not included in ${delegaed.uri}`),
})
const ensureTrailingDelimiter = uri => (uri.endsWith('/') ? uri : `${uri}/`)
Please note that the library guarantees that both
claimed
anddelegated
capabilities will have{can: "file/link", with: string nb: { link?: CID }}
type inferred from the definition.We will explore more complicated cases later where a capability may be derived from a different capability or even a set.
Now that we have a file/link
capability we can define a service providing it:
import { provide, Failure, MalformedCapability } from '@ucanto/server'
const service = (context: { store: Map<string, string> }) => {
const add = provide(Add, ({ capability, invocation }) => {
store.set(capability.uri.href, capability.nb.link)
return {
with: capability.with,
link: capability.nb.link,
}
})
return { file: { add } }
}
The provide
building block used above will take care of associating a handler to the
given capability and performing necessary UCAN validation steps when add
is
invoked.
The library provides a pluggable transport architecture so you can expose a service in various content encodings. To do so you have to provide:
decoder
that will take{ headers: Record<string, string>, body: Uint8Array }
object and decode it into{ invocations: Invocation[] }
.encoder
that will takeunknown[]
(corresponding to values returned by handlers) and encode it into{ headers: Record<string, string>, body: Uint8Array }
.
Note that the actual encoder / decoder types are more complicated as they capture capability types, the number of invocations, and corresponding return types. This allows them to provide good type inference. But ignoring those details, that is what they are in a nutshell.
The library comes with several transport layer codecs you can pick from, but you can also bring one yourself. Below we will take invocations encoded in CAR format and produce responses encoded in DAG-CBOR format:
import * as Server from "@ucanto/server"
import * as CAR from "@ucanto/transport/car"
import * as CBOR from "@ucanto/transport/cbor"
import { ed25519 } from "@ucanto/principal"
import * as HTTP from "node:http"
import * as Buffer from "node:buffer"
export const server = (context { store = new Map() } : { store: Map<string, string> }) =>
Server.create({
id: ed25519.Signer.parse(process.env.SERVICE_SECRET),
service: service(context),
decoder: CAR,
encoder: CBOR,
// We tell server that capability can be self-issued by a drive owner
canIssue: (capability, issuer) => {
if (capability.uri.protocol === "file:") {
const [did] = capability.uri.pathname.split("/")
return did === issuer
}
return false
},
})
Please note that server does not do HTTP as bindings may differ across runtimes, so it is up to you to plug one in.
In nodejs we could expose our service as follows:
export const listen = ({ port = 8080, context = new Map() }) => {
HTTP.createServer(async (request, response) => {
const chunks = []
for await (const chunk of request) {
chunks.push(chunk)
}
const { headers, body } = await fileServer.request({
headers: request.headers,
body: Buffer.concat(chunks),
})
response.writeHead(200, headers)
response.write(body)
response.end()
}).listen(port)
}
Client can be used to issue and execute UCAN invocations. Here is an example of
invoking the file/link
capability we've defined earlier:
import * as Client from '@ucanto/client'
import { ed25519 } from '@ucanto/principal'
import { CID } from 'multiformats'
// Service will have a well known DID
const service = ed25519.Verifier.parse(process.env.SERVICE_ID)
// Client keypair
const issuer = ed25519.Signer.parse(process.env.MY_KEPAIR)
const demo1 = async connection => {
const me = await Client.invoke({
issuer: alice,
audience: service,
capability: {
can: 'file/link',
with: `file://${issuer.did()}/me/about`,
link: CID.parse(process.env.ME_CID),
},
})
const result = await connection.execute([me])
if (result.error) {
console.error('oops', result)
} else {
console.log('file got linked', result.link.toString())
}
}
Note that the client will get full type inference on when
connection
captures a type of the service on the other side of the wire.
Just like the server, the client has a pluggable transport layer which you provide when you create a connection. We could create an in-process connection with our service simply by providing service as a channel:
import * as CAR from "@ucanto/transport/car"
import * as CBOR from "@ucanto/transport/cbor"
const connection = Client.connect({
encoder: CAR, // encode as CAR because server decodes from car
decoder: CBOR, // decode as CBOR because server encodes as CBOR
channel: server(), // simply pass the server
})
In practice you probably would want client/server communication to happen across the wire, or at least across processes. You can bring your own transport channel, or choose an existing one. For example:
import * as CAR from "@ucanto/transport/car"
import * as CBOR from "@ucanto/transport/cbor"
import * as HTTP from "@ucanto/transport/http"
const connection = Client.connect({
encoder: CAR, // encode as CAR because server decodes from car
decoder: CBOR, // decode as CBOR because server encodes as CBOR
/** @type {Transport.Channel<ReturnType<typeof service>>} */
channel: HTTP.open({ url: new URL(process.env.SERVICE_URL) }),
})
Note: That in the second example you need to provide a type annotations, so that client can infer what capabilities can be invoked and what the return types it will correspond to.
The library supports batch invocations and takes care of all the nitty gritty details when it comes to UCAN delegation chains, specifically taking chains apart to encode as blocks in CAR and putting them back together into a chain on the other side. All you need to do is provide a delegation in the proofs:
import { ed25519 } from '@ucanto/principal'
import * as Client from '@ucanto/client'
import { CID } from 'multiformats'
const service = ed25519.Verifier.parse(process.env.SERVICE_DID)
const alice = ed25519.Signer.parse(process.env.ALICE_KEYPAIR)
const bob = ed25519.Signer.parse(process.env.BOB_KEYPAIR)
const demo2 = async connection => {
// Alice delegates capability to mutate FS under bob's namespace
const proof = await Client.delegate({
issuer: alice,
audience: bob.principal,
capabilities: [
{
can: 'file/link',
with: `file://${alice.did()}/friends/${bob.did()}/`,
},
],
})
const aboutBob = Client.invoke({
issuer: bob,
audience: service,
capability: {
can: 'file/link',
with: `file://${alice.did()}/friends/${bob.did()}/about`,
link: CID.parse(process.env.BOB_CID),
},
})
const aboutMallory = Client.invoke({
issuer: bob,
audience: service,
capability: {
can: 'file/link',
with: `file://${alice.did()}/friends/${MALLORY_DID}/about`,
link: CID.parse(process.env.MALLORY_CID),
},
})
const [bobResult, malloryResult] = connection.execute([
aboutBob,
aboutMallory,
])
if (bobResult.error) {
console.error('oops', r1)
} else {
console.log('about bob is linked', r1)
}
if (malloryResult.error) {
console.log('oops', r2)
} else {
console.log('about mallory is linked', r2)
}
}
In the example above, the first invocation will succeed, but the second one will not because Bob has not been granted a capability to mutate Mallory's namespace. Also note that both invocations are sent in a single request.