1use std::{
6 collections::{BTreeMap, BTreeSet},
7 net::{IpAddr, Ipv4Addr, SocketAddr},
8 num::NonZeroUsize,
9 path::{Path, PathBuf},
10 sync::Arc,
11 time::Duration,
12};
13
14use anyhow::Result;
15use consensus_config::Parameters as ConsensusParameters;
16use iota_keys::keypair_file::{read_authority_keypair_from_file, read_keypair_from_file};
17use iota_names::config::IotaNamesConfig;
18use iota_types::{
19 base_types::IotaAddress,
20 committee::EpochId,
21 crypto::{
22 AccountKeyPair, AuthorityKeyPair, AuthorityPublicKeyBytes, IotaKeyPair, KeypairTraits,
23 NetworkKeyPair, get_key_pair_from_rng,
24 },
25 messages_checkpoint::CheckpointSequenceNumber,
26 multiaddr::Multiaddr,
27 supported_protocol_versions::{Chain, SupportedProtocolVersions},
28 traffic_control::{PolicyConfig, RemoteFirewallConfig},
29};
30use once_cell::sync::OnceCell;
31use rand::rngs::OsRng;
32use serde::{Deserialize, Serialize};
33use starfish_config::Parameters as StarfishParameters;
34use tracing::info;
35
36use crate::{
37 Config, certificate_deny_config::CertificateDenyConfig, genesis,
38 migration_tx_data::MigrationTxData, object_storage_config::ObjectStoreConfig, p2p::P2pConfig,
39 transaction_deny_config::TransactionDenyConfig, verifier_signing_config::VerifierSigningConfig,
40};
41
42pub const DEFAULT_GRPC_CONCURRENCY_LIMIT: usize = 20000000000;
44
45pub const DEFAULT_VALIDATOR_GAS_PRICE: u64 = iota_types::transaction::DEFAULT_VALIDATOR_GAS_PRICE;
47
48pub const DEFAULT_COMMISSION_RATE: u64 = 200;
50
51#[derive(Clone, Debug, Deserialize, Serialize)]
52#[serde(rename_all = "kebab-case")]
53pub struct NodeConfig {
54 #[serde(default = "default_authority_key_pair")]
57 pub authority_key_pair: AuthorityKeyPairWithPath,
58 #[serde(default = "default_key_pair")]
61 pub protocol_key_pair: KeyPairWithPath,
62 #[serde(default = "default_key_pair")]
63 pub account_key_pair: KeyPairWithPath,
64 #[serde(default = "default_key_pair")]
67 pub network_key_pair: KeyPairWithPath,
68 pub db_path: PathBuf,
69
70 #[serde(default = "default_grpc_address")]
74 pub network_address: Multiaddr,
75 #[serde(default = "default_json_rpc_address")]
76 pub json_rpc_address: SocketAddr,
77
78 #[serde(default)]
81 pub enable_rest_api: bool,
82 #[serde(skip_serializing_if = "Option::is_none")]
83 pub rest: Option<iota_rest_api::Config>,
84
85 #[serde(default = "default_metrics_address")]
87 pub metrics_address: SocketAddr,
88
89 #[serde(default = "default_admin_interface_address")]
93 pub admin_interface_address: SocketAddr,
94
95 #[serde(skip_serializing_if = "Option::is_none")]
97 pub consensus_config: Option<ConsensusConfig>,
98
99 #[serde(default = "default_enable_index_processing")]
104 pub enable_index_processing: bool,
105
106 #[serde(default, skip_serializing_if = "std::ops::Not::not")]
107 pub remove_deprecated_tables: bool,
108
109 #[serde(default)]
111 pub jsonrpc_server_type: Option<ServerType>,
116
117 #[serde(default)]
121 pub grpc_load_shed: Option<bool>,
122
123 #[serde(default = "default_concurrency_limit")]
124 pub grpc_concurrency_limit: Option<usize>,
125
126 #[serde(default)]
128 pub p2p_config: P2pConfig,
129
130 pub genesis: Genesis,
134
135 pub migration_tx_data_path: Option<PathBuf>,
137
138 #[serde(default = "default_authority_store_pruning_config")]
141 pub authority_store_pruning_config: AuthorityStorePruningConfig,
142
143 #[serde(default = "default_end_of_epoch_broadcast_channel_capacity")]
148 pub end_of_epoch_broadcast_channel_capacity: usize,
149
150 #[serde(default)]
154 pub checkpoint_executor_config: CheckpointExecutorConfig,
155
156 #[serde(skip_serializing_if = "Option::is_none")]
157 pub metrics: Option<MetricsConfig>,
158
159 #[serde(skip)]
164 pub supported_protocol_versions: Option<SupportedProtocolVersions>,
165
166 #[serde(default)]
170 pub db_checkpoint_config: DBCheckpointConfig,
171
172 #[serde(default)]
174 pub expensive_safety_check_config: ExpensiveSafetyCheckConfig,
175
176 #[serde(default)]
180 pub transaction_deny_config: TransactionDenyConfig,
181
182 #[serde(default)]
188 pub certificate_deny_config: CertificateDenyConfig,
189
190 #[serde(default)]
193 pub state_debug_dump_config: StateDebugDumpConfig,
194
195 #[serde(default)]
199 pub state_archive_write_config: StateArchiveConfig,
200
201 #[serde(default)]
202 pub state_archive_read_config: Vec<StateArchiveConfig>,
203
204 #[serde(default)]
206 pub state_snapshot_write_config: StateSnapshotConfig,
207
208 #[serde(default)]
209 pub indexer_max_subscriptions: Option<usize>,
210
211 #[serde(default = "default_transaction_kv_store_config")]
212 pub transaction_kv_store_read_config: TransactionKeyValueStoreReadConfig,
213
214 #[serde(skip_serializing_if = "Option::is_none")]
216 pub transaction_kv_store_write_config: Option<TransactionKeyValueStoreWriteConfig>,
217
218 #[serde(default = "default_jwk_fetch_interval_seconds")]
219 pub jwk_fetch_interval_seconds: u64,
220
221 #[serde(default = "default_zklogin_oauth_providers")]
222 pub zklogin_oauth_providers: BTreeMap<Chain, BTreeSet<String>>,
223
224 #[serde(default = "default_authority_overload_config")]
227 pub authority_overload_config: AuthorityOverloadConfig,
228
229 #[serde(skip_serializing_if = "Option::is_none")]
233 pub run_with_range: Option<RunWithRange>,
234
235 #[serde(skip_serializing_if = "Option::is_none")]
237 pub policy_config: Option<PolicyConfig>,
238
239 #[serde(skip_serializing_if = "Option::is_none")]
240 pub firewall_config: Option<RemoteFirewallConfig>,
241
242 #[serde(default)]
243 pub execution_cache: ExecutionCacheType,
244
245 #[serde(default)]
246 pub execution_cache_config: ExecutionCacheConfig,
247
248 #[serde(default = "bool_true")]
249 pub enable_validator_tx_finalizer: bool,
250
251 #[serde(default)]
252 pub verifier_signing_config: VerifierSigningConfig,
253
254 #[serde(skip_serializing_if = "Option::is_none")]
258 pub enable_db_write_stall: Option<bool>,
259
260 #[serde(default, skip_serializing_if = "Option::is_none")]
261 pub iota_names_config: Option<IotaNamesConfig>,
262
263 #[serde(default)]
265 pub enable_grpc_api: bool,
266 #[serde(
267 default = "default_grpc_api_config",
268 skip_serializing_if = "Option::is_none"
269 )]
270 pub grpc_api_config: Option<GrpcApiConfig>,
271
272 #[serde(skip_serializing_if = "Option::is_none")]
277 pub chain_override_for_testing: Option<Chain>,
278}
279
280#[derive(Clone, Debug, serde::Deserialize, serde::Serialize)]
282#[serde(rename_all = "kebab-case")]
283pub struct GrpcApiConfig {
284 #[serde(default = "default_grpc_api_address")]
286 pub address: std::net::SocketAddr,
287
288 #[serde(default = "default_checkpoint_broadcast_buffer_size")]
290 pub checkpoint_broadcast_buffer_size: usize,
291
292 #[serde(default = "default_event_broadcast_buffer_size")]
294 pub event_broadcast_buffer_size: usize,
295}
296
297impl Default for GrpcApiConfig {
298 fn default() -> Self {
299 Self {
300 address: default_grpc_api_address(),
301 checkpoint_broadcast_buffer_size: default_checkpoint_broadcast_buffer_size(),
302 event_broadcast_buffer_size: default_event_broadcast_buffer_size(),
303 }
304 }
305}
306
307fn default_grpc_api_address() -> std::net::SocketAddr {
308 use std::net::{IpAddr, Ipv4Addr};
309 std::net::SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), 50051)
310}
311
312fn default_checkpoint_broadcast_buffer_size() -> usize {
313 100
314}
315
316fn default_event_broadcast_buffer_size() -> usize {
317 1000
318}
319
320#[derive(Clone, Copy, Debug, Default, Deserialize, Serialize)]
321#[serde(rename_all = "kebab-case")]
322pub enum ExecutionCacheType {
323 #[default]
324 WritebackCache,
325 PassthroughCache,
326}
327
328impl From<ExecutionCacheType> for u8 {
329 fn from(cache_type: ExecutionCacheType) -> Self {
330 match cache_type {
331 ExecutionCacheType::WritebackCache => 0,
332 ExecutionCacheType::PassthroughCache => 1,
333 }
334 }
335}
336
337impl From<&u8> for ExecutionCacheType {
338 fn from(cache_type: &u8) -> Self {
339 match cache_type {
340 0 => ExecutionCacheType::WritebackCache,
341 1 => ExecutionCacheType::PassthroughCache,
342 _ => unreachable!("Invalid value for ExecutionCacheType"),
343 }
344 }
345}
346
347pub type ExecutionCacheTypeAtomicU8 = std::sync::atomic::AtomicU8;
350
351impl From<ExecutionCacheType> for ExecutionCacheTypeAtomicU8 {
352 fn from(cache_type: ExecutionCacheType) -> Self {
353 ExecutionCacheTypeAtomicU8::new(u8::from(cache_type))
354 }
355}
356
357impl ExecutionCacheType {
358 pub fn cache_type(self) -> Self {
359 if std::env::var("DISABLE_WRITEBACK_CACHE").is_ok() {
360 Self::PassthroughCache
361 } else {
362 self
363 }
364 }
365}
366
367#[derive(Clone, Debug, Default, Deserialize, Serialize)]
368#[serde(rename_all = "kebab-case")]
369pub struct ExecutionCacheConfig {
370 #[serde(default)]
371 pub writeback_cache: WritebackCacheConfig,
372}
373
374#[derive(Clone, Debug, Default, Deserialize, Serialize)]
375#[serde(rename_all = "kebab-case")]
376pub struct WritebackCacheConfig {
377 #[serde(default, skip_serializing_if = "Option::is_none")]
380 pub max_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
383 pub package_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
386 pub object_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
388 pub marker_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
390 pub object_by_id_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
393 pub transaction_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
395 pub executed_effect_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
397 pub effect_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
400 pub events_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
403 pub transaction_objects_cache_size: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
408 pub backpressure_threshold: Option<u64>, #[serde(default, skip_serializing_if = "Option::is_none")]
414 pub backpressure_threshold_for_rpc: Option<u64>, }
416
417impl WritebackCacheConfig {
418 pub fn max_cache_size(&self) -> u64 {
419 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_MAX")
420 .ok()
421 .and_then(|s| s.parse().ok())
422 .or(self.max_cache_size)
423 .unwrap_or(100000)
424 }
425
426 pub fn package_cache_size(&self) -> u64 {
427 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_PACKAGE")
428 .ok()
429 .and_then(|s| s.parse().ok())
430 .or(self.package_cache_size)
431 .unwrap_or(1000)
432 }
433
434 pub fn object_cache_size(&self) -> u64 {
435 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_OBJECT")
436 .ok()
437 .and_then(|s| s.parse().ok())
438 .or(self.object_cache_size)
439 .unwrap_or_else(|| self.max_cache_size())
440 }
441
442 pub fn marker_cache_size(&self) -> u64 {
443 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_MARKER")
444 .ok()
445 .and_then(|s| s.parse().ok())
446 .or(self.marker_cache_size)
447 .unwrap_or_else(|| self.object_cache_size())
448 }
449
450 pub fn object_by_id_cache_size(&self) -> u64 {
451 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_OBJECT_BY_ID")
452 .ok()
453 .and_then(|s| s.parse().ok())
454 .or(self.object_by_id_cache_size)
455 .unwrap_or_else(|| self.object_cache_size())
456 }
457
458 pub fn transaction_cache_size(&self) -> u64 {
459 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_TRANSACTION")
460 .ok()
461 .and_then(|s| s.parse().ok())
462 .or(self.transaction_cache_size)
463 .unwrap_or_else(|| self.max_cache_size())
464 }
465
466 pub fn executed_effect_cache_size(&self) -> u64 {
467 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_EXECUTED_EFFECT")
468 .ok()
469 .and_then(|s| s.parse().ok())
470 .or(self.executed_effect_cache_size)
471 .unwrap_or_else(|| self.transaction_cache_size())
472 }
473
474 pub fn effect_cache_size(&self) -> u64 {
475 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_EFFECT")
476 .ok()
477 .and_then(|s| s.parse().ok())
478 .or(self.effect_cache_size)
479 .unwrap_or_else(|| self.executed_effect_cache_size())
480 }
481
482 pub fn events_cache_size(&self) -> u64 {
483 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_EVENTS")
484 .ok()
485 .and_then(|s| s.parse().ok())
486 .or(self.events_cache_size)
487 .unwrap_or_else(|| self.transaction_cache_size())
488 }
489
490 pub fn transaction_objects_cache_size(&self) -> u64 {
491 std::env::var("IOTA_CACHE_WRITEBACK_SIZE_TRANSACTION_OBJECTS")
492 .ok()
493 .and_then(|s| s.parse().ok())
494 .or(self.transaction_objects_cache_size)
495 .unwrap_or(1000)
496 }
497
498 pub fn backpressure_threshold(&self) -> u64 {
499 std::env::var("IOTA_CACHE_WRITEBACK_BACKPRESSURE_THRESHOLD")
500 .ok()
501 .and_then(|s| s.parse().ok())
502 .or(self.backpressure_threshold)
503 .unwrap_or(100_000)
504 }
505
506 pub fn backpressure_threshold_for_rpc(&self) -> u64 {
507 std::env::var("IOTA_CACHE_WRITEBACK_BACKPRESSURE_THRESHOLD_FOR_RPC")
508 .ok()
509 .and_then(|s| s.parse().ok())
510 .or(self.backpressure_threshold_for_rpc)
511 .unwrap_or(self.backpressure_threshold())
512 }
513}
514
515#[derive(Clone, Copy, Debug, Deserialize, Serialize)]
516#[serde(rename_all = "lowercase")]
517pub enum ServerType {
518 WebSocket,
519 Http,
520 Both,
521}
522
523#[derive(Clone, Debug, Deserialize, Serialize)]
524#[serde(rename_all = "kebab-case")]
525pub struct TransactionKeyValueStoreReadConfig {
526 #[serde(default = "default_base_url")]
527 pub base_url: String,
528
529 #[serde(default = "default_cache_size")]
530 pub cache_size: u64,
531}
532
533impl Default for TransactionKeyValueStoreReadConfig {
534 fn default() -> Self {
535 Self {
536 base_url: default_base_url(),
537 cache_size: default_cache_size(),
538 }
539 }
540}
541
542fn default_base_url() -> String {
543 "".to_string()
544}
545
546fn default_cache_size() -> u64 {
547 100_000
548}
549
550fn default_jwk_fetch_interval_seconds() -> u64 {
551 3600
552}
553
554pub fn default_zklogin_oauth_providers() -> BTreeMap<Chain, BTreeSet<String>> {
555 let mut map = BTreeMap::new();
556
557 let experimental_providers = BTreeSet::from([
559 "Google".to_string(),
560 "Facebook".to_string(),
561 "Twitch".to_string(),
562 "Kakao".to_string(),
563 "Apple".to_string(),
564 "Slack".to_string(),
565 "TestIssuer".to_string(),
566 "Microsoft".to_string(),
567 "KarrierOne".to_string(),
568 "Credenza3".to_string(),
569 ]);
570
571 let providers = BTreeSet::from([
573 "Google".to_string(),
574 "Facebook".to_string(),
575 "Twitch".to_string(),
576 "Apple".to_string(),
577 "KarrierOne".to_string(),
578 "Credenza3".to_string(),
579 ]);
580 map.insert(Chain::Mainnet, providers.clone());
581 map.insert(Chain::Testnet, providers);
582 map.insert(Chain::Unknown, experimental_providers);
583 map
584}
585
586fn default_transaction_kv_store_config() -> TransactionKeyValueStoreReadConfig {
587 TransactionKeyValueStoreReadConfig::default()
588}
589
590fn default_authority_store_pruning_config() -> AuthorityStorePruningConfig {
591 AuthorityStorePruningConfig::default()
592}
593
594pub fn default_enable_index_processing() -> bool {
595 true
596}
597
598fn default_grpc_address() -> Multiaddr {
599 "/ip4/0.0.0.0/tcp/8080".parse().unwrap()
600}
601fn default_authority_key_pair() -> AuthorityKeyPairWithPath {
602 AuthorityKeyPairWithPath::new(get_key_pair_from_rng::<AuthorityKeyPair, _>(&mut OsRng).1)
603}
604
605fn default_key_pair() -> KeyPairWithPath {
606 KeyPairWithPath::new(
607 get_key_pair_from_rng::<AccountKeyPair, _>(&mut OsRng)
608 .1
609 .into(),
610 )
611}
612
613fn default_metrics_address() -> SocketAddr {
614 use std::net::{IpAddr, Ipv4Addr};
615 SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), 9184)
616}
617
618pub fn default_admin_interface_address() -> SocketAddr {
619 SocketAddr::new(IpAddr::V4(Ipv4Addr::LOCALHOST), 1337)
620}
621
622pub fn default_json_rpc_address() -> SocketAddr {
623 use std::net::{IpAddr, Ipv4Addr};
624 SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), 9000)
625}
626
627pub fn default_grpc_api_config() -> Option<GrpcApiConfig> {
628 None
629}
630
631pub fn default_concurrency_limit() -> Option<usize> {
632 Some(DEFAULT_GRPC_CONCURRENCY_LIMIT)
633}
634
635pub fn default_end_of_epoch_broadcast_channel_capacity() -> usize {
636 128
637}
638
639pub fn bool_true() -> bool {
640 true
641}
642
643fn is_true(value: &bool) -> bool {
644 *value
645}
646
647impl Config for NodeConfig {}
648
649impl NodeConfig {
650 pub fn authority_key_pair(&self) -> &AuthorityKeyPair {
651 self.authority_key_pair.authority_keypair()
652 }
653
654 pub fn protocol_key_pair(&self) -> &NetworkKeyPair {
655 match self.protocol_key_pair.keypair() {
656 IotaKeyPair::Ed25519(kp) => kp,
657 other => {
658 panic!("invalid keypair type: {other:?}, only Ed25519 is allowed for protocol key")
659 }
660 }
661 }
662
663 pub fn network_key_pair(&self) -> &NetworkKeyPair {
664 match self.network_key_pair.keypair() {
665 IotaKeyPair::Ed25519(kp) => kp,
666 other => {
667 panic!("invalid keypair type: {other:?}, only Ed25519 is allowed for network key")
668 }
669 }
670 }
671
672 pub fn authority_public_key(&self) -> AuthorityPublicKeyBytes {
673 self.authority_key_pair().public().into()
674 }
675
676 pub fn db_path(&self) -> PathBuf {
677 self.db_path.join("live")
678 }
679
680 pub fn db_checkpoint_path(&self) -> PathBuf {
681 self.db_path.join("db_checkpoints")
682 }
683
684 pub fn archive_path(&self) -> PathBuf {
685 self.db_path.join("archive")
686 }
687
688 pub fn snapshot_path(&self) -> PathBuf {
689 self.db_path.join("snapshot")
690 }
691
692 pub fn network_address(&self) -> &Multiaddr {
693 &self.network_address
694 }
695
696 pub fn consensus_config(&self) -> Option<&ConsensusConfig> {
697 self.consensus_config.as_ref()
698 }
699
700 pub fn genesis(&self) -> Result<&genesis::Genesis> {
701 self.genesis.genesis()
702 }
703
704 pub fn load_migration_tx_data(&self) -> Result<MigrationTxData> {
705 let Some(location) = &self.migration_tx_data_path else {
706 anyhow::bail!("no file location set");
707 };
708
709 let migration_tx_data = MigrationTxData::load(location)?;
711
712 migration_tx_data.validate_from_genesis(self.genesis.genesis()?)?;
714 Ok(migration_tx_data)
715 }
716
717 pub fn iota_address(&self) -> IotaAddress {
718 (&self.account_key_pair.keypair().public()).into()
719 }
720
721 pub fn archive_reader_config(&self) -> Vec<ArchiveReaderConfig> {
722 self.state_archive_read_config
723 .iter()
724 .flat_map(|config| {
725 config
726 .object_store_config
727 .as_ref()
728 .map(|remote_store_config| ArchiveReaderConfig {
729 remote_store_config: remote_store_config.clone(),
730 download_concurrency: NonZeroUsize::new(config.concurrency)
731 .unwrap_or(NonZeroUsize::new(5).unwrap()),
732 use_for_pruning_watermark: config.use_for_pruning_watermark,
733 })
734 })
735 .collect()
736 }
737
738 pub fn jsonrpc_server_type(&self) -> ServerType {
739 self.jsonrpc_server_type.unwrap_or(ServerType::Http)
740 }
741}
742
743#[derive(Debug, Clone, Deserialize, Serialize)]
744pub enum ConsensusProtocol {
745 #[serde(rename = "mysticeti")]
746 Mysticeti,
747 #[serde(rename = "starfish")]
748 Starfish,
749}
750
751#[derive(Debug, Clone, Deserialize, Serialize)]
752#[serde(rename_all = "kebab-case")]
753pub struct ConsensusConfig {
754 pub db_path: PathBuf,
756
757 pub db_retention_epochs: Option<u64>,
760
761 pub db_pruner_period_secs: Option<u64>,
764
765 pub max_pending_transactions: Option<usize>,
771
772 pub max_submit_position: Option<usize>,
778
779 pub submit_delay_step_override_millis: Option<u64>,
785
786 pub parameters: Option<ConsensusParameters>,
788
789 #[serde(skip_serializing_if = "Option::is_none")]
791 pub starfish_parameters: Option<StarfishParameters>,
792}
793
794impl ConsensusConfig {
795 pub fn db_path(&self) -> &Path {
796 &self.db_path
797 }
798
799 pub fn max_pending_transactions(&self) -> usize {
800 self.max_pending_transactions.unwrap_or(20_000)
801 }
802
803 pub fn submit_delay_step_override(&self) -> Option<Duration> {
804 self.submit_delay_step_override_millis
805 .map(Duration::from_millis)
806 }
807
808 pub fn db_retention_epochs(&self) -> u64 {
809 self.db_retention_epochs.unwrap_or(0)
810 }
811
812 pub fn db_pruner_period(&self) -> Duration {
813 self.db_pruner_period_secs
815 .map(Duration::from_secs)
816 .unwrap_or(Duration::from_secs(3_600))
817 }
818}
819
820#[derive(Clone, Debug, Deserialize, Serialize)]
821#[serde(rename_all = "kebab-case")]
822pub struct CheckpointExecutorConfig {
823 #[serde(default = "default_checkpoint_execution_max_concurrency")]
828 pub checkpoint_execution_max_concurrency: usize,
829
830 #[serde(default = "default_local_execution_timeout_sec")]
836 pub local_execution_timeout_sec: u64,
837
838 #[serde(default, skip_serializing_if = "Option::is_none")]
843 pub data_ingestion_dir: Option<PathBuf>,
844}
845
846#[derive(Clone, Debug, Default, Deserialize, Serialize)]
847#[serde(rename_all = "kebab-case")]
848pub struct ExpensiveSafetyCheckConfig {
849 #[serde(default)]
854 enable_epoch_iota_conservation_check: bool,
855
856 #[serde(default)]
860 enable_deep_per_tx_iota_conservation_check: bool,
861
862 #[serde(default)]
865 force_disable_epoch_iota_conservation_check: bool,
866
867 #[serde(default)]
870 enable_state_consistency_check: bool,
871
872 #[serde(default)]
874 force_disable_state_consistency_check: bool,
875
876 #[serde(default)]
877 enable_secondary_index_checks: bool,
878 }
880
881impl ExpensiveSafetyCheckConfig {
882 pub fn new_enable_all() -> Self {
883 Self {
884 enable_epoch_iota_conservation_check: true,
885 enable_deep_per_tx_iota_conservation_check: true,
886 force_disable_epoch_iota_conservation_check: false,
887 enable_state_consistency_check: true,
888 force_disable_state_consistency_check: false,
889 enable_secondary_index_checks: false, }
891 }
892
893 pub fn new_disable_all() -> Self {
894 Self {
895 enable_epoch_iota_conservation_check: false,
896 enable_deep_per_tx_iota_conservation_check: false,
897 force_disable_epoch_iota_conservation_check: true,
898 enable_state_consistency_check: false,
899 force_disable_state_consistency_check: true,
900 enable_secondary_index_checks: false,
901 }
902 }
903
904 pub fn force_disable_epoch_iota_conservation_check(&mut self) {
905 self.force_disable_epoch_iota_conservation_check = true;
906 }
907
908 pub fn enable_epoch_iota_conservation_check(&self) -> bool {
909 (self.enable_epoch_iota_conservation_check || cfg!(debug_assertions))
910 && !self.force_disable_epoch_iota_conservation_check
911 }
912
913 pub fn force_disable_state_consistency_check(&mut self) {
914 self.force_disable_state_consistency_check = true;
915 }
916
917 pub fn enable_state_consistency_check(&self) -> bool {
918 (self.enable_state_consistency_check || cfg!(debug_assertions))
919 && !self.force_disable_state_consistency_check
920 }
921
922 pub fn enable_deep_per_tx_iota_conservation_check(&self) -> bool {
923 self.enable_deep_per_tx_iota_conservation_check || cfg!(debug_assertions)
924 }
925
926 pub fn enable_secondary_index_checks(&self) -> bool {
927 self.enable_secondary_index_checks
928 }
929}
930
931fn default_checkpoint_execution_max_concurrency() -> usize {
932 40
933}
934
935fn default_local_execution_timeout_sec() -> u64 {
936 30
937}
938
939impl Default for CheckpointExecutorConfig {
940 fn default() -> Self {
941 Self {
942 checkpoint_execution_max_concurrency: default_checkpoint_execution_max_concurrency(),
943 local_execution_timeout_sec: default_local_execution_timeout_sec(),
944 data_ingestion_dir: None,
945 }
946 }
947}
948
949#[derive(Debug, Clone, Deserialize, Serialize)]
950#[serde(rename_all = "kebab-case")]
951pub struct AuthorityStorePruningConfig {
952 #[serde(default = "default_num_latest_epoch_dbs_to_retain")]
954 pub num_latest_epoch_dbs_to_retain: usize,
955 #[serde(default = "default_epoch_db_pruning_period_secs")]
958 pub epoch_db_pruning_period_secs: u64,
959 #[serde(default)]
964 pub num_epochs_to_retain: u64,
965 #[serde(skip_serializing_if = "Option::is_none")]
967 pub pruning_run_delay_seconds: Option<u64>,
968 #[serde(default = "default_max_checkpoints_in_batch")]
971 pub max_checkpoints_in_batch: usize,
972 #[serde(default = "default_max_transactions_in_batch")]
974 pub max_transactions_in_batch: usize,
975 #[serde(
980 default = "default_periodic_compaction_threshold_days",
981 skip_serializing_if = "Option::is_none"
982 )]
983 pub periodic_compaction_threshold_days: Option<usize>,
984 #[serde(skip_serializing_if = "Option::is_none")]
987 pub num_epochs_to_retain_for_checkpoints: Option<u64>,
988 #[serde(default = "default_smoothing", skip_serializing_if = "is_true")]
989 pub smooth: bool,
990 #[serde(default, skip_serializing_if = "std::ops::Not::not")]
996 pub enable_compaction_filter: bool,
997 #[serde(skip_serializing_if = "Option::is_none")]
998 pub num_epochs_to_retain_for_indexes: Option<u64>,
999}
1000
1001fn default_num_latest_epoch_dbs_to_retain() -> usize {
1002 3
1003}
1004
1005fn default_epoch_db_pruning_period_secs() -> u64 {
1006 3600
1007}
1008
1009fn default_max_transactions_in_batch() -> usize {
1010 1000
1011}
1012
1013fn default_max_checkpoints_in_batch() -> usize {
1014 10
1015}
1016
1017fn default_smoothing() -> bool {
1018 cfg!(not(test))
1019}
1020
1021fn default_periodic_compaction_threshold_days() -> Option<usize> {
1022 Some(1)
1023}
1024
1025impl Default for AuthorityStorePruningConfig {
1026 fn default() -> Self {
1027 Self {
1028 num_latest_epoch_dbs_to_retain: default_num_latest_epoch_dbs_to_retain(),
1029 epoch_db_pruning_period_secs: default_epoch_db_pruning_period_secs(),
1030 num_epochs_to_retain: 0,
1031 pruning_run_delay_seconds: if cfg!(msim) { Some(2) } else { None },
1032 max_checkpoints_in_batch: default_max_checkpoints_in_batch(),
1033 max_transactions_in_batch: default_max_transactions_in_batch(),
1034 periodic_compaction_threshold_days: None,
1035 num_epochs_to_retain_for_checkpoints: if cfg!(msim) { Some(2) } else { None },
1036 smooth: true,
1037 enable_compaction_filter: cfg!(test) || cfg!(msim),
1038 num_epochs_to_retain_for_indexes: None,
1039 }
1040 }
1041}
1042
1043impl AuthorityStorePruningConfig {
1044 pub fn set_num_epochs_to_retain(&mut self, num_epochs_to_retain: u64) {
1045 self.num_epochs_to_retain = num_epochs_to_retain;
1046 }
1047
1048 pub fn set_num_epochs_to_retain_for_checkpoints(&mut self, num_epochs_to_retain: Option<u64>) {
1049 self.num_epochs_to_retain_for_checkpoints = num_epochs_to_retain;
1050 }
1051
1052 pub fn num_epochs_to_retain_for_checkpoints(&self) -> Option<u64> {
1053 self.num_epochs_to_retain_for_checkpoints
1054 .map(|n| {
1056 if n < 2 {
1057 info!("num_epochs_to_retain_for_checkpoints must be at least 2, rounding up from {}", n);
1058 2
1059 } else {
1060 n
1061 }
1062 })
1063 }
1064}
1065
1066#[derive(Debug, Clone, Deserialize, Serialize)]
1067#[serde(rename_all = "kebab-case")]
1068pub struct MetricsConfig {
1069 #[serde(skip_serializing_if = "Option::is_none")]
1070 pub push_interval_seconds: Option<u64>,
1071 #[serde(skip_serializing_if = "Option::is_none")]
1072 pub push_url: Option<String>,
1073}
1074
1075#[derive(Default, Debug, Clone, Deserialize, Serialize)]
1076#[serde(rename_all = "kebab-case")]
1077pub struct DBCheckpointConfig {
1078 #[serde(default)]
1079 pub perform_db_checkpoints_at_epoch_end: bool,
1080 #[serde(skip_serializing_if = "Option::is_none")]
1081 pub checkpoint_path: Option<PathBuf>,
1082 #[serde(skip_serializing_if = "Option::is_none")]
1083 pub object_store_config: Option<ObjectStoreConfig>,
1084 #[serde(skip_serializing_if = "Option::is_none")]
1085 pub perform_index_db_checkpoints_at_epoch_end: Option<bool>,
1086 #[serde(skip_serializing_if = "Option::is_none")]
1087 pub prune_and_compact_before_upload: Option<bool>,
1088}
1089
1090#[derive(Debug, Clone)]
1091pub struct ArchiveReaderConfig {
1092 pub remote_store_config: ObjectStoreConfig,
1093 pub download_concurrency: NonZeroUsize,
1094 pub use_for_pruning_watermark: bool,
1095}
1096
1097#[derive(Default, Debug, Clone, Deserialize, Serialize)]
1098#[serde(rename_all = "kebab-case")]
1099pub struct StateArchiveConfig {
1100 #[serde(skip_serializing_if = "Option::is_none")]
1101 pub object_store_config: Option<ObjectStoreConfig>,
1102 pub concurrency: usize,
1103 pub use_for_pruning_watermark: bool,
1104}
1105
1106#[derive(Default, Debug, Clone, Deserialize, Serialize)]
1107#[serde(rename_all = "kebab-case")]
1108pub struct StateSnapshotConfig {
1109 #[serde(skip_serializing_if = "Option::is_none")]
1110 pub object_store_config: Option<ObjectStoreConfig>,
1111 pub concurrency: usize,
1112}
1113
1114#[derive(Default, Debug, Clone, Deserialize, Serialize)]
1115#[serde(rename_all = "kebab-case")]
1116pub struct TransactionKeyValueStoreWriteConfig {
1117 pub aws_access_key_id: String,
1118 pub aws_secret_access_key: String,
1119 pub aws_region: String,
1120 pub table_name: String,
1121 pub bucket_name: String,
1122 pub concurrency: usize,
1123}
1124
1125#[derive(Clone, Debug, Deserialize, Serialize)]
1130#[serde(rename_all = "kebab-case")]
1131pub struct AuthorityOverloadConfig {
1132 #[serde(default = "default_max_txn_age_in_queue")]
1133 pub max_txn_age_in_queue: Duration,
1134
1135 #[serde(default = "default_overload_monitor_interval")]
1137 pub overload_monitor_interval: Duration,
1138
1139 #[serde(default = "default_execution_queue_latency_soft_limit")]
1141 pub execution_queue_latency_soft_limit: Duration,
1142
1143 #[serde(default = "default_execution_queue_latency_hard_limit")]
1145 pub execution_queue_latency_hard_limit: Duration,
1146
1147 #[serde(default = "default_max_load_shedding_percentage")]
1149 pub max_load_shedding_percentage: u32,
1150
1151 #[serde(default = "default_min_load_shedding_percentage_above_hard_limit")]
1154 pub min_load_shedding_percentage_above_hard_limit: u32,
1155
1156 #[serde(default = "default_safe_transaction_ready_rate")]
1159 pub safe_transaction_ready_rate: u32,
1160
1161 #[serde(default = "default_check_system_overload_at_signing")]
1164 pub check_system_overload_at_signing: bool,
1165
1166 #[serde(default, skip_serializing_if = "std::ops::Not::not")]
1169 pub check_system_overload_at_execution: bool,
1170
1171 #[serde(default = "default_max_transaction_manager_queue_length")]
1174 pub max_transaction_manager_queue_length: usize,
1175
1176 #[serde(default = "default_max_transaction_manager_per_object_queue_length")]
1179 pub max_transaction_manager_per_object_queue_length: usize,
1180}
1181
1182fn default_max_txn_age_in_queue() -> Duration {
1183 Duration::from_millis(500)
1184}
1185
1186fn default_overload_monitor_interval() -> Duration {
1187 Duration::from_secs(10)
1188}
1189
1190fn default_execution_queue_latency_soft_limit() -> Duration {
1191 Duration::from_secs(1)
1192}
1193
1194fn default_execution_queue_latency_hard_limit() -> Duration {
1195 Duration::from_secs(10)
1196}
1197
1198fn default_max_load_shedding_percentage() -> u32 {
1199 95
1200}
1201
1202fn default_min_load_shedding_percentage_above_hard_limit() -> u32 {
1203 50
1204}
1205
1206fn default_safe_transaction_ready_rate() -> u32 {
1207 100
1208}
1209
1210fn default_check_system_overload_at_signing() -> bool {
1211 true
1212}
1213
1214fn default_max_transaction_manager_queue_length() -> usize {
1215 100_000
1216}
1217
1218fn default_max_transaction_manager_per_object_queue_length() -> usize {
1219 20
1220}
1221
1222impl Default for AuthorityOverloadConfig {
1223 fn default() -> Self {
1224 Self {
1225 max_txn_age_in_queue: default_max_txn_age_in_queue(),
1226 overload_monitor_interval: default_overload_monitor_interval(),
1227 execution_queue_latency_soft_limit: default_execution_queue_latency_soft_limit(),
1228 execution_queue_latency_hard_limit: default_execution_queue_latency_hard_limit(),
1229 max_load_shedding_percentage: default_max_load_shedding_percentage(),
1230 min_load_shedding_percentage_above_hard_limit:
1231 default_min_load_shedding_percentage_above_hard_limit(),
1232 safe_transaction_ready_rate: default_safe_transaction_ready_rate(),
1233 check_system_overload_at_signing: true,
1234 check_system_overload_at_execution: false,
1235 max_transaction_manager_queue_length: default_max_transaction_manager_queue_length(),
1236 max_transaction_manager_per_object_queue_length:
1237 default_max_transaction_manager_per_object_queue_length(),
1238 }
1239 }
1240}
1241
1242fn default_authority_overload_config() -> AuthorityOverloadConfig {
1243 AuthorityOverloadConfig::default()
1244}
1245
1246#[derive(Debug, Clone, PartialEq, Deserialize, Serialize, Eq)]
1247pub struct Genesis {
1248 #[serde(flatten)]
1249 location: Option<GenesisLocation>,
1250
1251 #[serde(skip)]
1252 genesis: once_cell::sync::OnceCell<genesis::Genesis>,
1253}
1254
1255impl Genesis {
1256 pub fn new(genesis: genesis::Genesis) -> Self {
1257 Self {
1258 location: Some(GenesisLocation::InPlace {
1259 genesis: Box::new(genesis),
1260 }),
1261 genesis: Default::default(),
1262 }
1263 }
1264
1265 pub fn new_from_file<P: Into<PathBuf>>(path: P) -> Self {
1266 Self {
1267 location: Some(GenesisLocation::File {
1268 genesis_file_location: path.into(),
1269 }),
1270 genesis: Default::default(),
1271 }
1272 }
1273
1274 pub fn new_empty() -> Self {
1275 Self {
1276 location: None,
1277 genesis: Default::default(),
1278 }
1279 }
1280
1281 pub fn genesis(&self) -> Result<&genesis::Genesis> {
1282 match &self.location {
1283 Some(GenesisLocation::InPlace { genesis }) => Ok(genesis),
1284 Some(GenesisLocation::File {
1285 genesis_file_location,
1286 }) => self
1287 .genesis
1288 .get_or_try_init(|| genesis::Genesis::load(genesis_file_location)),
1289 None => anyhow::bail!("no genesis location set"),
1290 }
1291 }
1292}
1293
1294#[derive(Debug, Clone, PartialEq, Deserialize, Serialize, Eq)]
1295#[serde(untagged)]
1296enum GenesisLocation {
1297 InPlace {
1298 genesis: Box<genesis::Genesis>,
1299 },
1300 File {
1301 #[serde(rename = "genesis-file-location")]
1302 genesis_file_location: PathBuf,
1303 },
1304}
1305
1306#[derive(Clone, Debug, PartialEq, Eq, Deserialize, Serialize)]
1309pub struct KeyPairWithPath {
1310 #[serde(flatten)]
1311 location: KeyPairLocation,
1312
1313 #[serde(skip)]
1314 keypair: OnceCell<Arc<IotaKeyPair>>,
1315}
1316
1317#[derive(Debug, Clone, PartialEq, Deserialize, Serialize, Eq)]
1318#[serde(untagged)]
1319enum KeyPairLocation {
1320 InPlace {
1321 #[serde(with = "bech32_formatted_keypair")]
1322 value: Arc<IotaKeyPair>,
1323 },
1324 File {
1325 path: PathBuf,
1326 },
1327}
1328
1329impl KeyPairWithPath {
1330 pub fn new(kp: IotaKeyPair) -> Self {
1331 let cell: OnceCell<Arc<IotaKeyPair>> = OnceCell::new();
1332 let arc_kp = Arc::new(kp);
1333 cell.set(arc_kp.clone()).expect("failed to set keypair");
1336 Self {
1337 location: KeyPairLocation::InPlace { value: arc_kp },
1338 keypair: cell,
1339 }
1340 }
1341
1342 pub fn new_from_path(path: PathBuf) -> Self {
1343 let cell: OnceCell<Arc<IotaKeyPair>> = OnceCell::new();
1344 cell.set(Arc::new(read_keypair_from_file(&path).unwrap_or_else(
1347 |e| panic!("invalid keypair file at path {:?}: {e}", &path),
1348 )))
1349 .expect("failed to set keypair");
1350 Self {
1351 location: KeyPairLocation::File { path },
1352 keypair: cell,
1353 }
1354 }
1355
1356 pub fn keypair(&self) -> &IotaKeyPair {
1357 self.keypair
1358 .get_or_init(|| match &self.location {
1359 KeyPairLocation::InPlace { value } => value.clone(),
1360 KeyPairLocation::File { path } => {
1361 Arc::new(
1364 read_keypair_from_file(path).unwrap_or_else(|e| {
1365 panic!("invalid keypair file at path {path:?}: {e}")
1366 }),
1367 )
1368 }
1369 })
1370 .as_ref()
1371 }
1372}
1373
1374#[derive(Clone, Debug, PartialEq, Eq, Deserialize, Serialize)]
1377pub struct AuthorityKeyPairWithPath {
1378 #[serde(flatten)]
1379 location: AuthorityKeyPairLocation,
1380
1381 #[serde(skip)]
1382 keypair: OnceCell<Arc<AuthorityKeyPair>>,
1383}
1384
1385#[derive(Debug, Clone, PartialEq, Deserialize, Serialize, Eq)]
1386#[serde(untagged)]
1387enum AuthorityKeyPairLocation {
1388 InPlace { value: Arc<AuthorityKeyPair> },
1389 File { path: PathBuf },
1390}
1391
1392impl AuthorityKeyPairWithPath {
1393 pub fn new(kp: AuthorityKeyPair) -> Self {
1394 let cell: OnceCell<Arc<AuthorityKeyPair>> = OnceCell::new();
1395 let arc_kp = Arc::new(kp);
1396 cell.set(arc_kp.clone())
1399 .expect("failed to set authority keypair");
1400 Self {
1401 location: AuthorityKeyPairLocation::InPlace { value: arc_kp },
1402 keypair: cell,
1403 }
1404 }
1405
1406 pub fn new_from_path(path: PathBuf) -> Self {
1407 let cell: OnceCell<Arc<AuthorityKeyPair>> = OnceCell::new();
1408 cell.set(Arc::new(
1411 read_authority_keypair_from_file(&path)
1412 .unwrap_or_else(|_| panic!("invalid authority keypair file at path {:?}", &path)),
1413 ))
1414 .expect("failed to set authority keypair");
1415 Self {
1416 location: AuthorityKeyPairLocation::File { path },
1417 keypair: cell,
1418 }
1419 }
1420
1421 pub fn authority_keypair(&self) -> &AuthorityKeyPair {
1422 self.keypair
1423 .get_or_init(|| match &self.location {
1424 AuthorityKeyPairLocation::InPlace { value } => value.clone(),
1425 AuthorityKeyPairLocation::File { path } => {
1426 Arc::new(
1429 read_authority_keypair_from_file(path).unwrap_or_else(|_| {
1430 panic!("invalid authority keypair file {:?}", &path)
1431 }),
1432 )
1433 }
1434 })
1435 .as_ref()
1436 }
1437}
1438
1439#[derive(Clone, Debug, Deserialize, Serialize, Default)]
1442#[serde(rename_all = "kebab-case")]
1443pub struct StateDebugDumpConfig {
1444 #[serde(skip_serializing_if = "Option::is_none")]
1445 pub dump_file_directory: Option<PathBuf>,
1446}
1447
1448#[cfg(test)]
1449mod tests {
1450 use std::path::PathBuf;
1451
1452 use fastcrypto::traits::KeyPair;
1453 use iota_keys::keypair_file::{write_authority_keypair_to_file, write_keypair_to_file};
1454 use iota_types::crypto::{
1455 AuthorityKeyPair, IotaKeyPair, NetworkKeyPair, get_key_pair_from_rng,
1456 };
1457 use rand::{SeedableRng, rngs::StdRng};
1458
1459 use super::Genesis;
1460 use crate::NodeConfig;
1461
1462 #[test]
1463 fn serialize_genesis_from_file() {
1464 let g = Genesis::new_from_file("path/to/file");
1465
1466 let s = serde_yaml::to_string(&g).unwrap();
1467 assert_eq!("---\ngenesis-file-location: path/to/file\n", s);
1468 let loaded_genesis: Genesis = serde_yaml::from_str(&s).unwrap();
1469 assert_eq!(g, loaded_genesis);
1470 }
1471
1472 #[test]
1473 fn fullnode_template() {
1474 const TEMPLATE: &str = include_str!("../data/fullnode-template.yaml");
1475
1476 let _template: NodeConfig = serde_yaml::from_str(TEMPLATE).unwrap();
1477 }
1478
1479 #[test]
1480 fn load_key_pairs_to_node_config() {
1481 let authority_key_pair: AuthorityKeyPair =
1482 get_key_pair_from_rng(&mut StdRng::from_seed([0; 32])).1;
1483 let protocol_key_pair: NetworkKeyPair =
1484 get_key_pair_from_rng(&mut StdRng::from_seed([0; 32])).1;
1485 let network_key_pair: NetworkKeyPair =
1486 get_key_pair_from_rng(&mut StdRng::from_seed([0; 32])).1;
1487
1488 write_authority_keypair_to_file(&authority_key_pair, PathBuf::from("authority.key"))
1489 .unwrap();
1490 write_keypair_to_file(
1491 &IotaKeyPair::Ed25519(protocol_key_pair.copy()),
1492 PathBuf::from("protocol.key"),
1493 )
1494 .unwrap();
1495 write_keypair_to_file(
1496 &IotaKeyPair::Ed25519(network_key_pair.copy()),
1497 PathBuf::from("network.key"),
1498 )
1499 .unwrap();
1500
1501 const TEMPLATE: &str = include_str!("../data/fullnode-template-with-path.yaml");
1502 let template: NodeConfig = serde_yaml::from_str(TEMPLATE).unwrap();
1503 assert_eq!(
1504 template.authority_key_pair().public(),
1505 authority_key_pair.public()
1506 );
1507 assert_eq!(
1508 template.network_key_pair().public(),
1509 network_key_pair.public()
1510 );
1511 assert_eq!(
1512 template.protocol_key_pair().public(),
1513 protocol_key_pair.public()
1514 );
1515 }
1516}
1517
1518#[derive(Clone, Copy, PartialEq, Debug, Serialize, Deserialize)]
1522pub enum RunWithRange {
1523 Epoch(EpochId),
1524 Checkpoint(CheckpointSequenceNumber),
1525}
1526
1527impl RunWithRange {
1528 pub fn is_epoch_gt(&self, epoch_id: EpochId) -> bool {
1530 matches!(self, RunWithRange::Epoch(e) if epoch_id > *e)
1531 }
1532
1533 pub fn matches_checkpoint(&self, seq_num: CheckpointSequenceNumber) -> bool {
1534 matches!(self, RunWithRange::Checkpoint(seq) if *seq == seq_num)
1535 }
1536
1537 pub fn into_checkpoint_bound(self) -> Option<CheckpointSequenceNumber> {
1538 match self {
1539 RunWithRange::Epoch(_) => None,
1540 RunWithRange::Checkpoint(seq) => Some(seq),
1541 }
1542 }
1543}
1544
1545mod bech32_formatted_keypair {
1549 use std::ops::Deref;
1550
1551 use iota_types::crypto::{EncodeDecodeBase64, IotaKeyPair};
1552 use serde::{Deserialize, Deserializer, Serializer};
1553
1554 pub fn serialize<S, T>(kp: &T, serializer: S) -> Result<S::Ok, S::Error>
1555 where
1556 S: Serializer,
1557 T: Deref<Target = IotaKeyPair>,
1558 {
1559 use serde::ser::Error;
1560
1561 let s = kp.encode().map_err(Error::custom)?;
1563
1564 serializer.serialize_str(&s)
1565 }
1566
1567 pub fn deserialize<'de, D, T>(deserializer: D) -> Result<T, D::Error>
1568 where
1569 D: Deserializer<'de>,
1570 T: From<IotaKeyPair>,
1571 {
1572 use serde::de::Error;
1573
1574 let s = String::deserialize(deserializer)?;
1575
1576 IotaKeyPair::decode(&s)
1578 .or_else(|_| {
1579 IotaKeyPair::decode_base64(&s)
1581 })
1582 .map(Into::into)
1583 .map_err(Error::custom)
1584 }
1585}