py-libp2p/libp2p/pubsub/pb/rpc.proto

79 lines
1.7 KiB
Protocol Buffer
Raw Normal View History

2019-04-04 02:08:05 +08:00
// Modified from https://github.com/libp2p/go-libp2p-pubsub/blob/master/pb/rpc.proto
2019-03-28 21:41:38 +08:00
syntax = "proto2";
package pubsub.pb;
message RPC {
repeated SubOpts subscriptions = 1;
repeated Message publish = 2;
message SubOpts {
2019-10-25 01:12:15 +08:00
optional bool subscribe = 1; // subscribe or unsubscribe
2019-03-28 21:41:38 +08:00
optional string topicid = 2;
}
optional ControlMessage control = 3;
}
message Message {
2019-03-29 03:23:56 +08:00
optional bytes from_id = 1;
2019-03-28 21:41:38 +08:00
optional bytes data = 2;
optional bytes seqno = 3;
repeated string topicIDs = 4;
optional bytes signature = 5;
optional bytes key = 6;
}
message ControlMessage {
repeated ControlIHave ihave = 1;
repeated ControlIWant iwant = 2;
repeated ControlGraft graft = 3;
repeated ControlPrune prune = 4;
}
message ControlIHave {
optional string topicID = 1;
repeated string messageIDs = 2;
}
message ControlIWant {
repeated string messageIDs = 1;
}
message ControlGraft {
optional string topicID = 1;
}
message ControlPrune {
optional string topicID = 1;
}
message TopicDescriptor {
optional string name = 1;
optional AuthOpts auth = 2;
optional EncOpts enc = 3;
message AuthOpts {
optional AuthMode mode = 1;
repeated bytes keys = 2; // root keys to trust
enum AuthMode {
NONE = 0; // no authentication, anyone can publish
KEY = 1; // only messages signed by keys in the topic descriptor are accepted
WOT = 2; // web of trust, certificates can allow publisher set to grow
}
}
message EncOpts {
optional EncMode mode = 1;
repeated bytes keyHashes = 2; // the hashes of the shared keys used (salted)
enum EncMode {
NONE = 0; // no encryption, anyone can read
SHAREDKEY = 1; // messages are encrypted with shared key
WOT = 2; // web of trust, certificates can allow publisher set to grow
}
}
2019-10-25 01:12:15 +08:00
}