#event-stream #stream #pub-sub #observer #future #data-stream #broadcast

pharos

Observer pattern which generates a futures 0.3 stream of events

14 releases

0.5.3 Oct 31, 2021
0.5.2 Jun 10, 2021
0.5.1 Feb 18, 2021
0.4.2 Nov 13, 2019
0.2.0 Jul 18, 2019

#70 in Asynchronous

Download history 59666/week @ 2024-06-14 62657/week @ 2024-06-21 55100/week @ 2024-06-28 48214/week @ 2024-07-05 51317/week @ 2024-07-12 52087/week @ 2024-07-19 53197/week @ 2024-07-26 49171/week @ 2024-08-02 53444/week @ 2024-08-09 54711/week @ 2024-08-16 49695/week @ 2024-08-23 55508/week @ 2024-08-30 57645/week @ 2024-09-06 48744/week @ 2024-09-13 54564/week @ 2024-09-20 45401/week @ 2024-09-27

217,783 downloads per month
Used in 431 crates (22 directly)

Unlicense

52KB
842 lines

pharos

standard-readme compliant Build Status Docs Crates.io Crates.io downloads

An introduction to pharos is available in many formats: video, wikipedia and it was even honored by many artists like this painting by Micheal Turner.

More seriously, pharos is a small observer library that let's you create futures 0.3 streams that observers can listen to.

I created it to leverage interoperability we can create by using async Stream and Sink from the futures library. So you can use all stream combinators, forward it into Sinks and so on.

Minimal rustc version: 1.39.

Table of Contents

Security

The main issue with this crate right now is the possibility for the observable to outpace the observer. When using bounded channels, there is back pressure, which might allow DDOS attacks if using the pattern on arriving network packets. When using the unbounded channels, it might lead to excessive memory consumption if observers are outpaced.

TODO: To mitigate these problems effectively, I will add a ring channel where the channel will only buffer a certain amount events and will overwrite the oldest event instead of blocking the sender when the buffer is full.

This crate has: #![ forbid( unsafe_code ) ], but it's dependency (futures library) uses a lot of unsafe code.

Limitations

  • only bounded and unbounded channel as back-end (for now)
  • Events is not clonable right now (would require support from the channels we use as back-ends, eg. broadcast type channel)
  • performance tweaking still needs to be done

Future work

Please check out the todo for ambitions.

Install

With cargo add: cargo add pharos

With cargo yaml:

dependencies:

  pharos: ^0.5

With raw Cargo.toml

[dependencies]

   pharos = "0.5"

Upgrade

Please check out the changelog when upgrading.

Dependencies

This crate only has but one dependency. Cargo will automatically handle it for you. This dependency contains unsafe code.

dependencies:

  futures: { version: ^0.3, default-features: false }

Usage

pharos only works from async code, implementing Sink to notify observers. You can notify observers from within poll_* methods by calling the poll methods of the Sink impl directly. In async context you can use SinkExt::send. Observers must consume the messages fast enough, otherwise they will slow down the observable (bounded channel) or cause memory leak (unbounded channel).

Whenever observers want to unsubscribe, they can just drop the stream or call close on it. If you are an observable and you want to notify observers that no more messages will follow, just drop the pharos object. Failing that, create an event type that signifies EOF and send that to observers.

Your event type will be cloned once for each observer, so you might want to put it in an Arc if it's bigger than 2 pointer sizes (eg. there's no point putting an enum without data in an Arc).

When you need to notify a pharos object from several async tasks, you can use SharedPharos. This type allows observing and notifying with a shared reference and handles synchronyzation internally.

Examples can be found in the examples directory. Here is the most basic one:

use
{
   pharos  :: { *                                      } ,
   futures :: { executor::block_on, StreamExt, SinkExt } ,
};


// here we put a pharos object on our struct
//
struct Goddess { pharos: Pharos<GoddessEvent> }


impl Goddess
{
   fn new() -> Self
   {
      Self { pharos: Pharos::default() }
   }

   // Send Goddess sailing so she can tweet about it!
   //
   pub async fn sail( &mut self )
   {
      // It's infallible. Observers that error will be dropped, since the only kind of errors on
      // channels are when the channel is closed.
      //
      self.pharos.send( GoddessEvent::Sailing ).await.expect( "notify observers" );
   }
}


// Event types need to implement clone, but you can wrap them in Arc if not. Also they will be
// cloned, so if you will have several observers and big event data, putting them in an Arc is
// definitely best. It has no benefit to put a simple dataless enum in an Arc though.
//
#[ derive( Clone, Debug, PartialEq, Copy ) ]
//
enum GoddessEvent
{
   Sailing
}


// This is the needed implementation of Observable. We might one day have a derive for this,
// but it's not so interesting, since you always have to point it to your pharos object,
// and when you want to be observable over several types of events, you might want to keep
// pharos in a hashmap over type_id, and a derive would quickly become a mess.
//
impl Observable<GoddessEvent> for Goddess
{
   type Error = PharErr;

   fn observe( &mut self, options: ObserveConfig<GoddessEvent>) -> Observe< '_, GoddessEvent, Self::Error >
   {
      self.pharos.observe( options )
   }
}


#[ async_std::main ]
//
async fn main()
{
  let mut isis = Goddess::new();

  // subscribe, the observe method takes options to let you choose:
  // - channel type (bounded/unbounded)
  // - a predicate to filter events
  //
  let mut events = isis.observe( Channel::Bounded( 3 ).into() ).await.expect( "observe" );

  // trigger an event
  //
  isis.sail().await;

  // read from stream and let's put on the console what the event looks like.
  //
  let evt = dbg!( events.next().await.unwrap() );

  // After this reads on the event stream will return None.
  //
  drop( isis );

  assert_eq!( GoddessEvent::Sailing, evt );
  assert_eq!( None, events.next().await );
}

Filter

Sometimes you are not interested in all event types an observable can emit. A common use case is only listening for a close event on a network connection. The observe method takes options which let you set the predicate. You can only set one predicate for a given observer.

use pharos::*;

#[ derive( Clone, Debug, PartialEq, Copy ) ]
//
enum NetworkEvent
{
   Open    ,
   Error   ,
   Closing ,
   Closed  ,
}

struct Connection { pharos: Pharos<NetworkEvent> }

impl Observable<NetworkEvent> for Connection
{
   type Error = PharErr;

   fn observe( &mut self, options: ObserveConfig<NetworkEvent>) -> Observe< '_, NetworkEvent, Self::Error >
   {
       self.pharos.observe( options )
   }
}


#[ async_std::main ]
//
async fn main()
{
   let mut conn = Connection{ pharos: Pharos::default() };

   // We will only get close events. Note that here we don't need access to any surrounding variables in
   // the closure, so we can use a function pointer which avoids having to box the closure.
   //
   // Filter also has a variant `Closure` which allows you to pass in a `Box<dyn FnMut(&Event) -> bool + Send>`
   // if you need access to surrounding context to make the decision.
   //
   let filter = Filter::Pointer( |e| e == &NetworkEvent::Closed );

   // By creating the config object through into, other options will be defaults, notably here
   // this will use unbounded channels.
   //
   let observer = conn.observe( filter.into() ).await.expect( "observe" );

   // Combine both options.
   //
   let filter = Filter::Pointer( |e| e != &NetworkEvent::Closed );
   let opts   = ObserveConfig::from( filter ).channel( Channel::Bounded(5) );

   // Get everything but close events over a bounded channel with queue size 5.
   //
   let bounded_observer = conn.observe( opts ).await.expect( "observe" );
}

API

API documentation can be found on docs.rs.

Contributing

Please check out the contribution guidelines.

Code of conduct

Any of the behaviors described in point 4 "Unacceptable Behavior" of the Citizens Code of Conduct are not welcome here and might get you banned. If anyone including maintainers and moderators of the project fail to respect these/your limits, you are entitled to call them out.

License

Unlicence

Dependencies

~0.8–1.1MB
~20K SLoC