1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
use crate::{
persistent_safety_storage::PersistentSafetyStorage,
remote_service::{self, RemoteService},
safety_rules_manager,
};
use diem_config::config::{SafetyRulesConfig, SafetyRulesService};
use std::net::SocketAddr;
pub struct Process {
data: Option<ProcessData>,
}
impl Process {
pub fn new(config: SafetyRulesConfig) -> Self {
let storage = safety_rules_manager::storage(&config);
let verify_vote_proposal_signature = config.verify_vote_proposal_signature;
let export_consensus_key = config.export_consensus_key;
let service = match &config.service {
SafetyRulesService::Process(service) => service,
_ => panic!("Unexpected SafetyRules service: {:?}", config.service),
};
let server_addr = service.server_address();
Self {
data: Some(ProcessData {
server_addr,
storage,
verify_vote_proposal_signature,
export_consensus_key,
network_timeout: config.network_timeout_ms,
decoupled_execution: config.decoupled_execution,
}),
}
}
pub fn start(&mut self) {
let data = self.data.take().expect("Unable to retrieve ProcessData");
remote_service::execute(
data.storage,
data.server_addr,
data.verify_vote_proposal_signature,
data.export_consensus_key,
data.network_timeout,
data.decoupled_execution,
);
}
}
struct ProcessData {
server_addr: SocketAddr,
storage: PersistentSafetyStorage,
verify_vote_proposal_signature: bool,
export_consensus_key: bool,
network_timeout: u64,
decoupled_execution: bool,
}
pub struct ProcessService {
server_addr: SocketAddr,
network_timeout_ms: u64,
}
impl ProcessService {
pub fn new(server_addr: SocketAddr, network_timeout: u64) -> Self {
Self {
server_addr,
network_timeout_ms: network_timeout,
}
}
}
impl RemoteService for ProcessService {
fn server_address(&self) -> SocketAddr {
self.server_addr
}
fn network_timeout_ms(&self) -> u64 {
self.network_timeout_ms
}
}