1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
use crate::{
config::{LoggerConfig, SecureBackend},
keys::ConfigKey,
};
use diem_crypto::{ed25519::Ed25519PrivateKey, Uniform};
use diem_types::{network_address::NetworkAddress, waypoint::Waypoint, PeerId};
use rand::rngs::StdRng;
use serde::{Deserialize, Serialize};
use std::{
net::{SocketAddr, ToSocketAddrs},
path::PathBuf,
};
#[derive(Clone, Debug, Deserialize, PartialEq, Serialize)]
#[serde(default, deny_unknown_fields)]
pub struct SafetyRulesConfig {
pub backend: SecureBackend,
pub logger: LoggerConfig,
pub service: SafetyRulesService,
pub test: Option<SafetyRulesTestConfig>,
pub verify_vote_proposal_signature: bool,
pub export_consensus_key: bool,
pub network_timeout_ms: u64,
pub enable_cached_safety_data: bool,
pub decoupled_execution: bool,
}
impl Default for SafetyRulesConfig {
fn default() -> Self {
Self {
backend: SecureBackend::InMemoryStorage,
logger: LoggerConfig::default(),
service: SafetyRulesService::Thread,
test: None,
verify_vote_proposal_signature: true,
export_consensus_key: false,
network_timeout_ms: 30_000,
enable_cached_safety_data: true,
decoupled_execution: false,
}
}
}
impl SafetyRulesConfig {
pub fn set_data_dir(&mut self, data_dir: PathBuf) {
if let SecureBackend::OnDiskStorage(backend) = &mut self.backend {
backend.set_data_dir(data_dir);
}
}
}
#[derive(Clone, Debug, Deserialize, PartialEq, Eq, Serialize)]
#[serde(rename_all = "snake_case", tag = "type")]
pub enum SafetyRulesService {
Local,
Process(RemoteService),
Serializer,
Thread,
}
#[derive(Clone, Debug, Deserialize, PartialEq, Eq, Serialize)]
#[serde(deny_unknown_fields)]
pub struct RemoteService {
pub server_address: NetworkAddress,
}
impl RemoteService {
pub fn server_address(&self) -> SocketAddr {
self.server_address
.to_socket_addrs()
.expect("server_address invalid")
.next()
.expect("server_address invalid")
}
}
#[derive(Clone, Debug, Deserialize, PartialEq, Serialize)]
pub struct SafetyRulesTestConfig {
pub author: PeerId,
pub consensus_key: Option<ConfigKey<Ed25519PrivateKey>>,
pub execution_key: Option<ConfigKey<Ed25519PrivateKey>>,
pub waypoint: Option<Waypoint>,
}
impl SafetyRulesTestConfig {
pub fn new(author: PeerId) -> Self {
Self {
author,
consensus_key: None,
execution_key: None,
waypoint: None,
}
}
pub fn consensus_key(&mut self, key: Ed25519PrivateKey) {
self.consensus_key = Some(ConfigKey::new(key));
}
pub fn execution_key(&mut self, key: Ed25519PrivateKey) {
self.execution_key = Some(ConfigKey::new(key));
}
pub fn random_consensus_key(&mut self, rng: &mut StdRng) {
let privkey = Ed25519PrivateKey::generate(rng);
self.consensus_key = Some(ConfigKey::<Ed25519PrivateKey>::new(privkey));
}
pub fn random_execution_key(&mut self, rng: &mut StdRng) {
let privkey = Ed25519PrivateKey::generate(rng);
self.execution_key = Some(ConfigKey::<Ed25519PrivateKey>::new(privkey));
}
}