mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 15:47:58 +00:00
Use same fmt and clippy configs as in Substrate (#7611)
* Use same rustfmt.toml as Substrate Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * format format file Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * Format with new config Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * Add Substrate Clippy config Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * Print Clippy version in CI Otherwise its difficult to reproduce locally. Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * Make fmt happy Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * Update node/core/pvf/src/error.rs Co-authored-by: Tsvetomir Dimitrov <tsvetomir@parity.io> * Update node/core/pvf/src/error.rs Co-authored-by: Tsvetomir Dimitrov <tsvetomir@parity.io> --------- Signed-off-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> Co-authored-by: Tsvetomir Dimitrov <tsvetomir@parity.io>
This commit is contained in:
committed by
GitHub
parent
ac435c96cf
commit
342d720573
@@ -17,17 +17,20 @@
|
||||
//! Grid topology support implementation
|
||||
//! The basic operation of the 2D grid topology is that:
|
||||
//! * A validator producing a message sends it to its row-neighbors and its column-neighbors
|
||||
//! * A validator receiving a message originating from one of its row-neighbors sends it to its column-neighbors
|
||||
//! * A validator receiving a message originating from one of its column-neighbors sends it to its row-neighbors
|
||||
//! * A validator receiving a message originating from one of its row-neighbors sends it to its
|
||||
//! column-neighbors
|
||||
//! * A validator receiving a message originating from one of its column-neighbors sends it to its
|
||||
//! row-neighbors
|
||||
//!
|
||||
//! This grid approach defines 2 unique paths for every validator to reach every other validator in at most 2 hops.
|
||||
//! This grid approach defines 2 unique paths for every validator to reach every other validator in
|
||||
//! at most 2 hops.
|
||||
//!
|
||||
//! However, we also supplement this with some degree of random propagation:
|
||||
//! every validator, upon seeing a message for the first time, propagates it to 8 random peers.
|
||||
//! This inserts some redundancy in case the grid topology isn't working or is being attacked -
|
||||
//! an adversary doesn't know which peers a validator will send to.
|
||||
//! This is combined with the property that the adversary doesn't know which validators will elect to check a block.
|
||||
//!
|
||||
//! This is combined with the property that the adversary doesn't know which validators will elect
|
||||
//! to check a block.
|
||||
|
||||
use crate::PeerId;
|
||||
use polkadot_primitives::{AuthorityDiscoveryId, SessionIndex, ValidatorIndex};
|
||||
@@ -188,7 +191,8 @@ impl GridNeighbors {
|
||||
(false, false) => RequiredRouting::None,
|
||||
(true, false) => RequiredRouting::GridY, // messages from X go to Y
|
||||
(false, true) => RequiredRouting::GridX, // messages from Y go to X
|
||||
(true, true) => RequiredRouting::GridXY, // if the grid works as expected, this shouldn't happen.
|
||||
(true, true) => RequiredRouting::GridXY, /* if the grid works as expected, this
|
||||
* shouldn't happen. */
|
||||
}
|
||||
}
|
||||
|
||||
@@ -213,7 +217,8 @@ impl GridNeighbors {
|
||||
"Grid topology is unexpected, play it safe and send to X AND Y"
|
||||
);
|
||||
RequiredRouting::GridXY
|
||||
}, // if the grid works as expected, this shouldn't happen.
|
||||
}, /* if the grid works as expected, this
|
||||
* shouldn't happen. */
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -91,7 +91,8 @@ impl Into<sc_network::ObservedRole> for ObservedRole {
|
||||
|
||||
/// Specialized wrapper around [`View`].
|
||||
///
|
||||
/// Besides the access to the view itself, it also gives access to the [`jaeger::Span`] per leave/head.
|
||||
/// Besides the access to the view itself, it also gives access to the [`jaeger::Span`] per
|
||||
/// leave/head.
|
||||
#[derive(Debug, Clone, Default)]
|
||||
pub struct OurView {
|
||||
view: View,
|
||||
@@ -131,7 +132,8 @@ impl std::ops::Deref for OurView {
|
||||
}
|
||||
}
|
||||
|
||||
/// Construct a new [`OurView`] with the given chain heads, finalized number 0 and disabled [`jaeger::Span`]'s.
|
||||
/// Construct a new [`OurView`] with the given chain heads, finalized number 0 and disabled
|
||||
/// [`jaeger::Span`]'s.
|
||||
///
|
||||
/// NOTE: Use for tests only.
|
||||
///
|
||||
|
||||
@@ -98,7 +98,8 @@ impl PeerSet {
|
||||
max_notification_size,
|
||||
handshake: None,
|
||||
set_config: SetConfig {
|
||||
// Non-authority nodes don't need to accept incoming connections on this peer set:
|
||||
// Non-authority nodes don't need to accept incoming connections on this peer
|
||||
// set:
|
||||
in_peers: if is_authority == IsAuthority::Yes { 100 } else { 0 },
|
||||
out_peers: 0,
|
||||
reserved_nodes: Vec::new(),
|
||||
|
||||
@@ -78,8 +78,8 @@ where
|
||||
/// reputation changes in that case.
|
||||
///
|
||||
/// Params:
|
||||
/// - The raw request to decode
|
||||
/// - Reputation changes to apply for the peer in case decoding fails.
|
||||
/// - The raw request to decode
|
||||
/// - Reputation changes to apply for the peer in case decoding fails.
|
||||
fn try_from_raw(
|
||||
raw: sc_network::config::IncomingRequest,
|
||||
reputation_changes: Vec<UnifiedReputationChange>,
|
||||
|
||||
@@ -110,9 +110,9 @@ pub const MAX_PARALLEL_STATEMENT_REQUESTS: u32 = 3;
|
||||
/// Response size limit for responses of POV like data.
|
||||
///
|
||||
/// This is larger than `MAX_POV_SIZE` to account for protocol overhead and for additional data in
|
||||
/// `CollationFetchingV1` or `AvailableDataFetchingV1` for example. We try to err on larger limits here
|
||||
/// as a too large limit only allows an attacker to waste our bandwidth some more, a too low limit
|
||||
/// might have more severe effects.
|
||||
/// `CollationFetchingV1` or `AvailableDataFetchingV1` for example. We try to err on larger limits
|
||||
/// here as a too large limit only allows an attacker to waste our bandwidth some more, a too low
|
||||
/// limit might have more severe effects.
|
||||
const POV_RESPONSE_SIZE: u64 = MAX_POV_SIZE as u64 + 10_000;
|
||||
|
||||
/// Maximum response sizes for `StatementFetchingV1`.
|
||||
|
||||
Reference in New Issue
Block a user