• Stars
    star
    201
  • Rank 194,491 (Top 4 %)
  • Language
    Rust
  • Created about 7 years ago
  • Updated 3 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

An example Rust web application with a focus on module structure

An Example Rust Application

Rust

This application requires a nightly compiler to run. Call:

cargo run

from the repository root and you're ready to go.

Also try exploring the API docs to get an idea of where everything lives:

cargo doc --open

What's this all about?

This repository contains a sample Rust application for an online store. The goal is to explore some design patterns that leverage the Rust language to build scalable and maintainable applications.

It's a playground for different ideas, some of them might not pan out in practice. If you have any feedback on anything here please feel free to open up an issue!

It's difficult to design software in a vacuum. When you don't have a real domain to drive what's important then design decisions can feel arbitrary. I've made an effort to document decisions and the reasons behind them, but questions like should we split order items from orders? or should queries in orders be able to access database tables for products? can't really be answered from a purely technical standpoint. They require perspective on the goals of the project too. For anyone reading this code, I'd encourage you to scrutinise it based on those arbitrary design decisions, think of the constraints you face in your own environment and how those might inform your own decisions when building applications in Rust.

What's this not about?

It's not about specific Rust frameworks or libraries, or about solving problems inherent to an online shopping application.

How it works

The following sections describe parts of the application and explain why they're put together the way they are.

Domain modules

The project layout is focused on privacy. By limiting the scope of certain items you also limit the scope of potential breakage. By limiting the scope of certain items you also limit the scope of the burden of maintaining application state. In Rust, items that are private in a module are visible to all of that module's children. That might sound like a bad thing, but we leverage it to prevent domain APIs from leaking implementation details for the sake of outside concerns, like serialization and storage.

Each core business concept in the application is split into its own (mostly) self-contained folder, like products or customers. Each module encapsulates everything there is to know about a particular set of entities:

  • What data those entities encapsulate
  • How that data is stored (/store)
  • How that data can be queried (/queries)
  • How that data can be changed (/commands)

Entities can depend on entities from another module, like an Order depending on a Product when adding it. There's a privacy hierarchy in each domain module:

  • Entities are globally accessible, but have a private from_data method
  • The store is only accessible within the domain module and depends on from_data to hydrate entities
  • Commands and queries are globally accessible and depend on the store as an implementation detail

These modules are a bit heavy-weight, but in a proper application adding new domain modules could be simplified using macros. I haven't used macros in this application so the code remains easy to follow.

One problem with a perfectly crafted module hierarchy is that it can all fall apart when you end up with a concept that simply doesn't fit in the current layout. The more frequently this happens, the more difficult it becomes to conform to the layout that existed before because it becomes impossible to tell what it should be.

We want these modules to manage their own destiny, but we don't want them to be self-contained to the point where they could be split into separate services. This is to keep things simple. If you did want to do this then I'd suggest using separate crates instead of just separate modules.

Commands and queries

The application follows a simple command query responsibility segregation design. This is an approach that works nicely for data-driven application without a lot of complex logic. The commands capture some domain interaction and work directly on entities whereas queries are totally arbitrary. This application doesn't use any special infrastructure for realising CQRS, they're just simple traits implemented using a dependency injection pattern. Essentially:

  • Commands return a Result<()>
  • Queries return a Result<T>
  • Commands require a &mut self receiver
  • Queries require a &self receiver

The difference in mutability means commands can call queries but queries can't call commands.

Models

The entities are the heart of the application. Despite the lack of a real business, I've made an effort to keep the domain model rich. Entities aren't just bags of CRUDdy state. They are:

  • A collection of data types with behavior implemented on top of them
  • Write-only. You can get a read-only view of an entity by calling .to_data(). While viewing an entity you can't call modifying behavior on it. This is guaranteed by Rust's borrowing system. An entity can move ownership into its read-only data with .into_data(). This is a one-way operation, so any changes made to state can't be persisted back to the store.

The goal of an entity is to encapsulate the invariants of some key domain concept. The entities here are easy to use with either a mock in-memory store or an external database. We should be careful not to rely on state changes with one entity being reflected in another because they happen to point to the same source.

Entities also need to be careful not to depend on the data types of another entity because there's no guarantee that data is actually valid. Instead they depend on an entity and convert it into data as needed, so they always know that state is valid.

Stores

We use the following Rust features to protect our entity state:

  • Stores are child modules of entities, which means they can depend on internal details to hydrate an entity, but the rest of the world can't
  • Moving an entity into its data means you can freely modify that state, but can't pretend it's an entity anymore. This means we don't lose Rust's ergonomics around structures, but don't also have the burden of maintaining invariants
  • Invariants are captured in new types that are as thin as possible
  • Types with invariants don't implement Serialize or Deserialize. This may be changed down the track, but I find it easier to keep serializable state fast-and-loose for backwards compatibility.

Data

Entities encapsulate some state, or data and ensure any changes made to that data don't break any invariants that data expects to hold. Rather than implementing getters, we expose a read-only view of the data as a structure. The benefit is that you don't have to give up Rust's nice features for working with datastructures, like you would with getter methods. This view is read-only, so changes can't be written directly back to the structure. The entity still provides setter methods for that.

You could argue that exposing state in this way leaks implementation details, like the version that have no value being public. This is probably true. To work around it, you could move the lifetime of the read-only view onto the fields, and compose a potentially different borrowed view of the state, and keep the data structure managed by the entity private.

You could also argue that holding invariants on a structure that isn't storing them is brittle. This makes sense when the privacy boundary for some field is at the object-level, like it is in C#. Rust is a bit different though. The tightest privacy boundary is at the module and its children. So the burden of maintaining the invariants of a given field falls on all items in the module it's defined in, plus all of that module's children.

This may sound like an awful leak but this application exploits that to build nicely abstracted storage. Instead of having to expose holes in our API to support an ORM, maintaining the state of invariants simply extends into the model store, without leaking back out to the public.

Ids and versions

The Id and Version types both have a phantom generic parameter. This parameter exists purely to let you express ids with incompatible types, like Id<ProductData> and Id<OrderData>, but still share other implementation details.

It's a pattern that's easier to follow than using a macro to reduce boilerplate because there's always a difinition in source you can go back to.

Optimistic concurrency

Each persistable entity has a version field. This field is a non-sequential identifier that corresponds to the state of the entity at a given point in time. When an entity is fetched from the store we hydrate its version, this is then checked just before updating and if they don't match we balk.

The version check works fine for the in-memory store because we have an exclusive lock on the data (only 1 caller can modify state at a time), but will need a different approach for a proper db. We can probably update where the id and version match, select the number of updated records and balk if it's 0 (means the version didn't match, or it doesn't exist).

Transactions

The storage layer uses a simple transactional scheme that allows independent data stores to participate in transactions. A central repository keeps track of active transactions and is consulted when data is fetched from data stores to make sure they're ready to be used. The optimistic concurrency on data ensures multiple active transactions can't try set the same value at the same time. This violates true isolation, but keeps things simple, and lets us minimize the state needed for each value being stored.

Dependency injection

Dependency injection is beneficial as a practice to lean on when designing applications. It lets you separate the concerns of dependency resolution from app logic. It also gives you an obvious way to scale an application. This application adopts a simple pattern that gives us these benefits without a lot of infrastructure.

This application doesn't use an inversion of control container like you might be used to if you write .NET applications. This is mostly because there aren't really any for Rust. It's a hard problem. It does utilise a simple dependency injection pattern for composing commands and queries though, even without a sophisticated container.

The main goal of dependency injection here isn't to support mocking. It's to reduce complexity by pushing peripheral concerns further away from the logic of an individual component.

What you need to worry about when doing dependency injection

  • Resolution: what dependencies do I need to build this thing?
  • Injection: how do I get these dependencies into this thing?
  • Storage: where do I store shared dependencies and remain abstract over it?

How it works

Injectable components live in their own module. That module contains:

  • Resolution: an impl block for a shared Resolver type that contains a method that returns the default implementation without requiring its dependencies.
  • Injection: a function that provides a default implementation, requiring its dependencies as generics and returning an impl Trait. You never know what concrete type this default implementation uses.
  • Storage: A trait that describes the component that is blanket implemented for a few smart pointers, like Arc, Box.

The shared Resolver sounds a bit service-locator-y, and it is, but because the dependency resolution is wholly contained in impl blocks on the Resolver itself we avoid the issue of depending on magic global state in our app logic.

To reduce boilerplate, for components with only a single method we also blanket implement them for Fn traits. This lets you avoid declaring a structure for them that's generic over all of their dependencies. The Rust compiler will take care of that for you.

This pattern is difficult to describe in prose, you need to see it. Have a look at the domain/products/commands/create_product module, or the domain/products/model/store modules for examples of this dependency injection pattern at work.

Isn't Resolver a "god object"?

A god object" is an object in your application that collects all the important logic to a point that you can't work with components without also working through the god object. They're a problem because they become difficult to construct or change. The Resolver pattern here is a god object, but isn't necessary to construct individual components. The Resolver deals only with handing a component the dependencies it asks for, it's not needed to build or work with components themselves.

More Repositories

1

rust-csharp-ffi

An example Rust + C# hybrid application
C#
194
star
2

rust-cross-compile

An example of cross compiling Rust apps to Linux on Windows, with only rustup
PowerShell
89
star
3

rust-ioc

Playground for dependency injection in Rust
Rust
54
star
4

rust-no-std

An example of making sure your Rust library actually builds in no-std environments
Rust
36
star
5

cargo-nuget

A tool for packaging Native Rust libs as Nuget nupkgs
Rust
33
star
6

emit

Structured diagnostics for Rust applications
Rust
31
star
7

old-csharp-rust

Playground for C#/Rust Interop
C#
16
star
8

tantivy-log

An example of structured logging with tantivy
Rust
6
star
9

decstr

IEEE 754 decimal floating point bitstrings
Rust
6
star
10

json_str

Rust library for tidy json string literals
Rust
5
star
11

old-rust-web-app

A sample web app written in Rust
Rust
4
star
12

serde_fmt

A serde Serializer for the standard formatting machinery
Rust
3
star
13

log-enrich

Rust
3
star
14

serde_buf

Value buffering for serde
Rust
3
star
15

vscode-verona-syntax

Syntax highlighting for the Verona research language in VS Code
2
star
16

fluent_builder

A simple builder API
Rust
2
star
17

csharp-aot

Some examples of compiling C# ahead-of-time
C#
1
star
18

hifive1-revb-exec

An example of running some Rust code on a HiFive1 RevB
Rust
1
star
19

leaf-samples

Basic samples for the Leaf deep learning framework
Rust
1
star
20

easy-mesos

Super simple docker-compose for mesos in dev
Shell
1
star
21

bitflags-serde-legacy

Implement serde traits for bitflags 2.x types compatibly with 1.x
Rust
1
star
22

kafka-rs

Rust
1
star
23

poison-guard

Rust
1
star
24

hifive1-revb-template

A Cargo template for running Rust on RISC-V based HiFive1 boards
Rust
1
star
25

ser

A tiny serialization API with optional serde support for Rust
Rust
1
star
26

intro-to-rust

Intro to Rust Talk
HTML
1
star
27

ipcheck

Checking the behavior of std::net::IpAddr against other langauges
Rust
1
star