Contextual Sync (CSync) is an open source, real-time, continuous data synchronization service for building modern applications. The CSync data store is organized with key/values where keys have a hierarchical structure. Clients can obtain the current value for a key and any subsequent updates by listening on the key. Updates are delivered to all online clients in near-real time. Clients can also listen on a key pattern where some components contain wildcards.
CSync is structured as a tree of nodes referenced by period-delimited strings called keys.
To illustrate :
companies
/ \
ibm google
/ \ / \
stock offices stock offices
The above tree consists of the following keys : companies
, companies.ibm
, companies.google
, companies.ibm.stock
, companies.ibm.offices
, companies.google.stock
, companies.google.offices
. Any one of these keys can be listened to at a time and all changes to that singular node will be synced to the client device.
Keys can have a maximum of 16 parts and a total length of 200 characters. Key components may contain only uppercase and lowercase alphabetic, numeric, "_", and "-".
Valid key: this.is.a.valid.key.123456.7.8.9.10
Invalid key: this is an.invalidkey.🍕.4.5.6.7.8.9.10.11.12.13.14.15.16.17.18
Suppose a developer wishes to listen to a subset of the tree containing multiple nodes, CSync provides this ability through wildcards. Currently CSync supports *
and #
as wildcards.
An Asterisk (*
) wildcard will match any value in the part of the key where the wildcard is. As an example, if a developer listens to companies.*.stock
in the above tree, the client will sync with all stock nodes for all companies.
If a developer wishes to listen to all child nodes in a subset of the tree, the #
can appended to the end of a key and the client will sync with all child nodes of the specified key. For instance in the above tree if a user listens to companies.ibm.#
, then the client will sync with all child nodes of companies.ibm
which include companies.ibm.stock
and companies.ibm.offices
.
Note: Each listen is independent. For example, if a developer listens to both companies.*.stock
and companies.companyX.stock
, the data from companies.companyX.stock
will be received by both of the listeners.
Only the latest, most recent, values sync, so you’re never left with old data. CSync provides a consistent view of the values for keys in the CSync store. If no updates are made to a key for a long enough period of time, all subscribers to the key will see the same consistent value. CSync guarantees that the latest update will be reflected at all connected, subscribed clients, but not that all updates to a key will be delivered. Clients will not receive an older value than what they have already received for a given key.
Work offline, read and write, and have data automatically sync the next time you’re connected. CSync maintains a local cache of data that is available to the client even when the client is offline or otherwise not connected to the CSync service. The client may perform listens, writes, and deletes on the local store while offline. When the client reestablishes connectivity to the CSync service, the local cache is efficiently synchronized with the latest data from the CSync store. The local cache is persistent across application restarts and device reboots.
Authenticate in an ever-growing number of ways from the provider of your choice. Currently the following methods are supported:
- Google OAuth
google
- Github Auth
github
- Facebook Auth
facebook
- Demo Login
demo
The Demo Login is an easy way of getting started with CSync. Just provide the demo
authentication provider and the demoToken
to authenticate as a demo user. This token allows for multiple user accounts as long as it is in the form demoToken({someString})
. For example: demoToken(abc)
, demoToken
and demoToken(123)
would all be treated as different user accounts.
Use simple access controls to clearly state who can read and write, keeping your data safe. Each key in the CSync store has an associated access control list (ACL) that specifies which users can access the key.
Three specific forms of access are defined:
- Create: Users with create permission may create child keys of this key.
- Read: Users with read permission may read the data for the key.
- Write: Users with write permission may write the data for the key.
The creator of a key in the CSync store has special permissions to that key. In particular, the creator always has Read, Write, and Create permissions, and they also have permission to delete the key and change its ACL.
CSync provides eight "static" ACLs that can be used to provide any combination of Read, Write, and Create access to just the key's creator or all users.
- Private
- PublicRead
- PublicWrite
- PublicCreate
- PublicReadWrite
- PublicReadCreate
- PublicWriteCreate
- PublicReadWriteCreate
The ACL for a key is set when the key is created by the first write performed to the key. If the write operation specified an ACL, then this ACL is attached to the key. If no ACL was specified in the write, then the key inherits the ACL from its closest ancestor in the key space—its parent if the parent exists, else its grandparent if that key exists, possibly all the way back to the root key. The ACL of the root key is PublicCreate
, which permits any user to create a child key but does not allow public read or write access.
$ npm install csync --save
Applications use the CSync class to create a connection to a specific CSync service.
var csync = require('csync');
var app = csync({host: "localhost", port: 6005, useSSL: false});
Note: Update the host
and port
to your specific csync server instance.
app.authenticate("demo", "demoToken").then(function(authData){
/*Auth Data contains:
uid: a unique user id across all providers,
token: "demoToken" in this example,
provider: "demo" in this example,
expires: seconds since epoch as an int */
}, function(error){
//Authentication failed error information
});
Note: We are logging in as the Demo User
var myKey = app.key("a.b.c.d.e")
myKey.listen(function(error, value) {
if (error) {
// handle error
} else {
// value has key, data, acl, exists
}
}
var value = JSON.stringify({this: someValue, that: anotherValue});
myKey.write(msg).then(function(result) {
console.log("got write result: "+result);
}).catch(function(error) {
console.log("got error result: "+error);
});
Note: The ACL is inherited from its closest existing ancestor, up to the root key which has ACL PublicCreate
.
myKey.write(value,{acl: csync.acl.PublicReadCreate});
myKey.unlisten();
myKey.delete();
Note: A delete key can contain any number of wildcards as well. For example, the key a.b would be deleted by a.*
, but the key a.b.c
would not because the wildcard only covers the second part of the key. The key a.b.c
could be deleted by a.*.*
, a.b.*
, a.*.c
, *.*.c
or *.*.*
. The key *.*.*
would delete all keys of length 3. Wildcard deletes make a best effort to delete everything you have access to. If you do not delete anything, you will still get a successful return because the server succesfully deleted all nodes you had access to, even if none existed.
This library is licensed under Apache 2.0. Full license text is available in LICENSE.
Want to contribute? Take a look at our CONTRIBUTING.md