use super::types::{Activity, Context}; use crate::{ simplex::signing_scheme::Scheme, types::{Epoch, View}, Automaton, Relay, Reporter, }; use commonware_cryptography::{Digest, PublicKey}; use commonware_p2p::Blocker; use commonware_runtime::buffer::PoolRef; use governor::Quota; use std::{num::NonZeroUsize, time::Duration}; /// Configuration for the consensus engine. pub struct Config< P: PublicKey, S: Scheme, B: Blocker, D: Digest, A: Automaton>, R: Relay, F: Reporter>, > { /// Signing scheme for the consensus engine. /// /// Consensus messages can be signed with a cryptosystem that differs from the static /// participant identity keys exposed in `participants`. For example, we can authenticate peers /// on the network with [commonware_cryptography::ed25519] keys while signing votes with shares distributed /// via [commonware_cryptography::bls12381::dkg] (which change each epoch). The scheme implementation is /// responsible for reusing the exact participant ordering carried by `participants` so that signer indices /// remain stable across both key spaces; if the order diverges, validators will reject votes as coming from /// the wrong validator. pub scheme: S, /// Blocker for the network. /// /// Blocking is handled by [commonware_p2p]. pub blocker: B, /// Automaton for the consensus engine. pub automaton: A, /// Relay for the consensus engine. pub relay: R, /// Reporter for the consensus engine. /// /// All activity is exported for downstream applications that benefit from total observability, /// consider wrapping with [`crate::simplex::signing_scheme::reporter::AttributableReporter`] to /// automatically filter and verify activities based on scheme attributability. pub reporter: F, /// Partition for the consensus engine. pub partition: String, /// Maximum number of messages to buffer on channels inside the consensus /// engine before blocking. pub mailbox_size: usize, /// Epoch for the consensus engine. Each running engine should have a unique epoch. pub epoch: Epoch, /// Prefix for all signed messages to prevent replay attacks. pub namespace: Vec, /// Number of bytes to buffer when replaying during startup. pub replay_buffer: NonZeroUsize, /// The size of the write buffer to use for each blob in the journal. pub write_buffer: NonZeroUsize, /// Buffer pool for the journal. pub buffer_pool: PoolRef, /// Amount of time to wait for a leader to propose a payload /// in a view. pub leader_timeout: Duration, /// Amount of time to wait for a quorum of notarizations in a view /// before attempting to skip the view. pub notarization_timeout: Duration, /// Amount of time to wait before retrying a nullify broadcast if /// stuck in a view. pub nullify_retry: Duration, /// Number of views behind finalized tip to track /// and persist activity derived from validator messages. pub activity_timeout: View, /// Move to nullify immediately if the selected leader has been inactive /// for this many views. /// /// This number should be less than or equal to `activity_timeout` (how /// many views we are tracking). pub skip_timeout: View, /// Timeout to wait for a peer to respond to a request. pub fetch_timeout: Duration, /// Maximum number of notarizations/nullifications to request/respond with at once. pub max_fetch_count: usize, /// Maximum rate of requests to send to a given peer. /// /// Inbound rate limiting is handled by [commonware_p2p]. pub fetch_rate_per_peer: Quota, /// Number of concurrent requests to make at once. pub fetch_concurrent: usize, } impl< P: PublicKey, S: Scheme, B: Blocker, D: Digest, A: Automaton>, R: Relay, F: Reporter>, > Config { /// Assert enforces that all configuration values are valid. pub fn assert(&self) { assert!( !self.scheme.participants().is_empty(), "there must be at least one participant" ); assert!( self.leader_timeout > Duration::default(), "leader timeout must be greater than zero" ); assert!( self.notarization_timeout > Duration::default(), "notarization timeout must be greater than zero" ); assert!( self.leader_timeout <= self.notarization_timeout, "leader timeout must be less than or equal to notarization timeout" ); assert!( self.nullify_retry > Duration::default(), "nullify retry broadcast must be greater than zero" ); assert!( self.activity_timeout > 0, "activity timeout must be greater than zero" ); assert!( self.skip_timeout > 0, "skip timeout must be greater than zero" ); assert!( self.skip_timeout <= self.activity_timeout, "skip timeout must be less than or equal to activity timeout" ); assert!( self.fetch_timeout > Duration::default(), "fetch timeout must be greater than zero" ); assert!( self.max_fetch_count > 0, "it must be possible to fetch at least one container per request" ); assert!( self.fetch_concurrent > 0, "it must be possible to fetch from at least one peer at a time" ); } }