grim/src/node/config.rs
2023-07-11 23:37:17 +03:00

956 lines
No EOL
34 KiB
Rust

// Copyright 2023 The Grim Developers
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
use std::fs::File;
use std::io::{BufRead, BufReader, Write};
use std::net::{Ipv4Addr, SocketAddr, SocketAddrV4, TcpListener, ToSocketAddrs};
use std::path::PathBuf;
use std::str::FromStr;
use grin_config::{config, ConfigError, ConfigMembers, GlobalConfig};
use grin_config::config::{API_SECRET_FILE_NAME, FOREIGN_API_SECRET_FILE_NAME, SERVER_CONFIG_FILE_NAME};
use grin_core::global::ChainTypes;
use grin_p2p::{PeerAddr, Seeding};
use grin_p2p::msg::PeerAddrs;
use grin_servers::common::types::ChainValidationMode;
use serde::{Deserialize, Serialize};
use crate::{AppConfig, Settings};
use crate::node::Node;
/// Peers config to save peers DNS names into the file.
#[derive(Serialize, Deserialize, Default)]
pub struct PeersConfig {
seeds: Vec<String>,
allowed: Vec<String>,
denied: Vec<String>,
preferred: Vec<String>
}
impl PeersConfig {
/// File name for peers config.
pub const FILE_NAME: &'static str = "peers.toml";
/// Save peers config to the file.
pub fn save(&self) {
let chain_type = AppConfig::chain_type();
let config_path = Settings::get_config_path(Self::FILE_NAME, Some(&chain_type));
Settings::write_to_file(self, config_path);
}
/// Save seed peer.
pub fn save_seed(&mut self, peer: String) {
self.seeds.insert(self.seeds.len(), peer);
self.save();
}
/// Save allowed peer.
pub fn save_allowed(&mut self, peer: String) {
self.allowed.insert(self.allowed.len(), peer);
self.save();
}
/// Save denied peer.
pub fn save_denied(&mut self, peer: String) {
self.denied.insert(self.denied.len(), peer);
self.save();
}
/// Save preferred peer.
pub fn save_preferred(&mut self, peer: String) {
self.preferred.insert(self.preferred.len(), peer);
self.save();
}
/// Convert string to [`PeerAddr`] if address is in correct format (`host:port`) and available.
pub fn peer_to_addr(peer: String) -> Option<PeerAddr> {
match SocketAddr::from_str(peer.as_str()) {
// Try to parse IP address first.
Ok(ip) => Some(PeerAddr(ip)),
// If that fails it's probably a DNS record.
Err(_) => {
if let Ok(mut socket_addr_list) = peer.to_socket_addrs() {
if let Some(addr) = socket_addr_list.next() {
return Some(PeerAddr(addr));
}
}
None
}
}
}
/// Load saved peers to node server [`ConfigMembers`] config.
fn load_to_server_config() {
let mut w_node_config = Settings::node_config_to_update();
// Load seeds.
for seed in w_node_config.peers.seeds.clone() {
if let Some(p) = Self::peer_to_addr(seed.to_string()) {
let mut seeds = w_node_config
.node
.server
.p2p_config
.seeds
.clone()
.unwrap_or(PeerAddrs::default());
seeds.peers.insert(seeds.peers.len(), p);
w_node_config.node.server.p2p_config.seeds = Some(seeds);
}
}
// Load allowed peers.
for peer in w_node_config.peers.allowed.clone() {
if let Some(p) = Self::peer_to_addr(peer.clone()) {
let mut allowed = w_node_config
.node
.server
.p2p_config
.peers_allow
.clone()
.unwrap_or(PeerAddrs::default());
allowed.peers.insert(allowed.peers.len(), p);
w_node_config.node.server.p2p_config.peers_allow = Some(allowed);
}
}
// Load denied peers.
for peer in w_node_config.peers.denied.clone() {
if let Some(p) = Self::peer_to_addr(peer.clone()) {
let mut denied = w_node_config
.node
.server
.p2p_config
.peers_deny
.clone()
.unwrap_or(PeerAddrs::default());
denied.peers.insert(denied.peers.len(), p);
w_node_config.node.server.p2p_config.peers_deny = Some(denied);
}
}
// Load preferred peers.
for peer in &w_node_config.peers.preferred.clone() {
if let Some(p) = Self::peer_to_addr(peer.clone()) {
let mut preferred = w_node_config
.node
.server
.p2p_config
.peers_preferred
.clone()
.unwrap_or(PeerAddrs::default());
preferred.peers.insert(preferred.peers.len(), p);
w_node_config.node.server.p2p_config.peers_preferred = Some(preferred);
}
}
}
}
/// Wrapped node config to be used by [`grin_servers::Server`].
#[derive(Serialize, Deserialize)]
pub struct NodeConfig {
pub(crate) node: ConfigMembers,
pub(crate) peers: PeersConfig
}
impl NodeConfig {
/// Initialize config fields from provided [`ChainTypes`].
pub fn for_chain_type(chain_type: &ChainTypes) -> Self {
// Check secret files for current chain type.
let _ = Self::check_api_secret_files(chain_type, API_SECRET_FILE_NAME);
let _ = Self::check_api_secret_files(chain_type, FOREIGN_API_SECRET_FILE_NAME);
// Initialize peers config.
let peers_config = {
let path = Settings::get_config_path(PeersConfig::FILE_NAME, Some(chain_type));
let config = Settings::read_from_file::<PeersConfig>(path.clone());
if !path.exists() || config.is_err() {
Self::save_default_peers_config(chain_type)
} else {
config.unwrap()
}
};
// Initialize node config.
let node_config = {
let path = Settings::get_config_path(SERVER_CONFIG_FILE_NAME, Some(chain_type));
let config = Settings::read_from_file::<ConfigMembers>(path.clone());
if !path.exists() || config.is_err() {
Self::save_default_node_server_config(chain_type)
} else {
config.unwrap()
}
};
Self { node: node_config, peers: peers_config }
}
/// Save default node config for specified [`ChainTypes`].
fn save_default_node_server_config(chain_type: &ChainTypes) -> ConfigMembers {
let path = Settings::get_config_path(SERVER_CONFIG_FILE_NAME, Some(chain_type));
let mut default_config = GlobalConfig::for_chain(chain_type);
default_config.update_paths(&Settings::get_working_path(Some(chain_type)));
let config = default_config.members.unwrap();
Settings::write_to_file(&config, path);
config
}
/// Save default peers config for specified [`ChainTypes`].
fn save_default_peers_config(chain_type: &ChainTypes) -> PeersConfig {
let path = Settings::get_config_path(PeersConfig::FILE_NAME, Some(chain_type));
let config = PeersConfig::default();
Settings::write_to_file(&config, path);
config
}
/// Save node config to the file.
pub fn save(&self) {
let config_path = Settings::get_config_path(
SERVER_CONFIG_FILE_NAME,
Some(&self.node.server.chain_type)
);
Settings::write_to_file(&self.node, config_path);
}
/// Get server config to use for node server before start.
pub fn node_server_config() -> ConfigMembers {
PeersConfig::load_to_server_config();
let r_config = Settings::node_config_to_read();
r_config.node.clone()
}
/// Reset node config to default values.
pub fn reset_to_default() {
let chain_type = {
let r_config = Settings::node_config_to_read();
r_config.node.server.chain_type
};
let node_server_config = Self::save_default_node_server_config(&chain_type);
let peers_config = Self::save_default_peers_config(&chain_type);
{
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node = node_server_config;
w_node_config.peers = peers_config;
}
}
/// Check that the api secret files exist and are valid.
fn check_api_secret_files(
chain_type: &ChainTypes,
secret_file_name: &str,
) -> Result<(), ConfigError> {
let api_secret_path = Self::get_secret_path(chain_type, secret_file_name);
if !api_secret_path.exists() {
config::init_api_secret(&api_secret_path)
} else {
config::check_api_secret(&api_secret_path)
}
}
/// Get path for secret file.
fn get_secret_path(chain_type: &ChainTypes, secret_file_name: &str) -> PathBuf {
let grin_path = Settings::get_working_path(Some(chain_type));
let mut api_secret_path = grin_path;
api_secret_path.push(secret_file_name);
api_secret_path
}
/// List of available IP addresses.
pub fn get_ip_addrs() -> Vec<String> {
let mut ip_addrs = Vec::new();
for net_if in pnet::datalink::interfaces() {
for ip in net_if.ips {
if ip.is_ipv4() {
ip_addrs.push(ip.ip().to_string());
}
}
}
ip_addrs
}
/// Check whether a port is available on the provided host.
fn is_host_port_available(host: &String, port: &String) -> bool {
if let Ok(p) = port.parse::<u16>() {
let ip_addr = Ipv4Addr::from_str(host.as_str()).unwrap();
let ipv4 = SocketAddrV4::new(ip_addr, p);
return TcpListener::bind(ipv4).is_ok();
}
false
}
/// Check whether a port is available across the system at all hosts.
fn is_port_available(port: &String) -> bool {
if let Ok(p) = port.parse::<u16>() {
for ip in Self::get_ip_addrs() {
let ip_addr = Ipv4Addr::from_str(ip.as_str()).unwrap();
let ipv4 = SocketAddrV4::new(ip_addr, p);
if TcpListener::bind(ipv4).is_err() {
return false;
}
}
} else {
return false;
}
true
}
/// Get stratum server IP address and port.
pub fn get_stratum_address() -> (String, String) {
let r_config = Settings::node_config_to_read();
let saved_stratum_addr = r_config
.node
.server
.stratum_mining_config
.as_ref()
.unwrap()
.stratum_server_addr
.as_ref()
.unwrap();
let (addr, port) = saved_stratum_addr.split_once(":").unwrap();
(addr.into(), port.into())
}
/// Save stratum server IP address and port.
pub fn save_stratum_address(addr: &String, port: &String) {
let addr_to_save = format!("{}:{}", addr, port);
let mut w_node_config = Settings::node_config_to_update();
w_node_config
.node
.server
.stratum_mining_config
.as_mut()
.unwrap()
.stratum_server_addr = Some(addr_to_save);
w_node_config.save();
}
/// Check if stratum server port is available across the system and config.
pub fn is_stratum_port_available(ip: &String, port: &String) -> bool {
if Node::get_stratum_stats().is_running {
// Check if Stratum server with same address is running.
let (cur_ip, cur_port) = Self::get_stratum_address();
let same_running = ip == &cur_ip && port == &cur_port;
return same_running || Self::is_not_running_stratum_port_available(ip, port);
}
Self::is_not_running_stratum_port_available(&ip, &port)
}
/// Check if stratum port is available when server is not running.
fn is_not_running_stratum_port_available(ip: &String, port: &String) -> bool {
if Self::is_host_port_available(&ip, &port) {
if &Self::get_p2p_port() != port {
let (api_ip, api_port) = Self::get_api_address();
return if &api_ip == ip {
&api_port != port
} else {
true
};
}
}
false
}
/// Get stratum mining server wallet address to get rewards.
pub fn get_stratum_wallet_addr() -> String {
let r_config = Settings::node_config_to_read();
r_config.node.clone().server.stratum_mining_config.unwrap().wallet_listener_url
}
/// Get the amount of time in seconds to attempt to mine on a particular header.
pub fn get_stratum_attempt_time() -> String {
let r_config = Settings::node_config_to_read();
r_config.node
.clone()
.server
.stratum_mining_config
.unwrap()
.attempt_time_per_block
.to_string()
}
/// Save stratum attempt time value in seconds.
pub fn save_stratum_attempt_time(time: u32) {
let w_node_config = Settings::node_config_to_update();
w_node_config.node
.clone()
.server
.stratum_mining_config
.unwrap()
.attempt_time_per_block = time;
w_node_config.save();
}
/// Get minimum acceptable share difficulty to request from miners.
pub fn get_stratum_min_share_diff() -> String {
let r_config = Settings::node_config_to_read();
r_config.node
.clone()
.server
.stratum_mining_config
.unwrap()
.minimum_share_difficulty
.to_string()
}
/// Save minimum acceptable share difficulty.
pub fn save_stratum_min_share_diff(diff: u64) {
let w_node_config = Settings::node_config_to_update();
w_node_config.node
.clone()
.server
.stratum_mining_config
.unwrap()
.minimum_share_difficulty = diff;
w_node_config.save();
}
/// Check if stratum mining server autorun is enabled.
pub fn is_stratum_autorun_enabled() -> bool {
let stratum_config = Settings::node_config_to_read()
.node
.clone()
.server
.stratum_mining_config
.unwrap();
if let Some(enable) = stratum_config.enable_stratum_server {
return enable;
}
false
}
/// Toggle stratum mining server autorun.
pub fn toggle_stratum_autorun() {
let autorun = Self::is_stratum_autorun_enabled();
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node
.server
.stratum_mining_config
.as_mut()
.unwrap()
.enable_stratum_server = Some(!autorun);
w_node_config.save();
}
/// Get API server IP address and port.
pub fn get_api_address() -> (String, String) {
let r_config = Settings::node_config_to_read();
let saved_api_addr = r_config
.node
.server
.api_http_addr
.as_str();
let (addr, port) = saved_api_addr.split_once(":").unwrap();
(addr.into(), port.into())
}
/// Save API server IP address and port.
pub fn save_api_address(addr: &String, port: &String) {
let addr_to_save = format!("{}:{}", addr, port);
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.api_http_addr = addr_to_save;
w_node_config.save();
}
/// Check if api server port is available across the system and config.
pub fn is_api_port_available(ip: &String, port: &String) -> bool {
if Node::is_running() {
// Check if API server with same address is running.
let same_running = if let Some(running_addr) = Node::get_api_addr() {
running_addr == format!("{}:{}", ip, port)
} else {
false
};
if same_running || Self::is_host_port_available(ip, port) {
return &Self::get_p2p_port() != port;
}
return false;
} else if Self::is_host_port_available(ip, port) {
return &Self::get_p2p_port() != port;
}
false
}
/// Get API secret text.
pub fn get_api_secret() -> Option<String> {
let r_config = Settings::node_config_to_read();
let api_secret_path = r_config
.node
.server
.api_secret_path
.clone();
return if let Some(secret_path) = api_secret_path {
let api_secret_file = File::open(secret_path).unwrap();
let buf_reader = BufReader::new(api_secret_file);
let mut lines_iter = buf_reader.lines();
let first_line = lines_iter.next().unwrap();
Some(first_line.unwrap())
} else {
None
};
}
/// Save API secret text.
pub fn save_api_secret(api_secret: &String) {
Self::save_secret(api_secret, API_SECRET_FILE_NAME);
}
/// Get Foreign API secret text.
pub fn get_foreign_api_secret() -> Option<String> {
let r_config = Settings::node_config_to_read();
let foreign_secret_path = r_config
.node
.server
.foreign_api_secret_path
.clone();
return if let Some(secret_path) = foreign_secret_path {
let foreign_secret_file = File::open(secret_path).unwrap();
let buf_reader = BufReader::new(foreign_secret_file);
let mut lines_iter = buf_reader.lines();
let first_line = lines_iter.next().unwrap();
Some(first_line.unwrap())
} else {
None
};
}
/// Update Foreign API secret.
pub fn save_foreign_api_secret(api_secret: &String) {
Self::save_secret(api_secret, FOREIGN_API_SECRET_FILE_NAME);
}
/// Save secret value into specified file.
fn save_secret(value: &String, file_name: &str) {
// Remove config value to remove authorization.
if value.is_empty() {
let mut w_config = Settings::node_config_to_update();
match file_name {
API_SECRET_FILE_NAME => w_config.node.server.api_secret_path = None,
_ => w_config.node.server.foreign_api_secret_path = None
}
w_config.save();
return;
}
let mut secret_enabled = true;
// Get path for specified secret file.
let secret_path = {
let r_config = Settings::node_config_to_read();
let path = match file_name {
API_SECRET_FILE_NAME => r_config.node.server.api_secret_path.clone(),
_ => r_config.node.server.foreign_api_secret_path.clone()
};
path.unwrap_or_else(|| {
secret_enabled = false;
let chain_type = AppConfig::chain_type();
let path = Self::get_secret_path(&chain_type, file_name);
path.to_str().unwrap().to_string()
})
};
// Update secret path at config if authorization was disabled before.
if !secret_enabled {
let mut w_config = Settings::node_config_to_update();
match file_name {
API_SECRET_FILE_NAME => w_config
.node
.server
.api_secret_path = Some(secret_path.clone()),
_ => w_config.node.server.foreign_api_secret_path = Some(secret_path.clone())
};
w_config.save();
}
// Write secret text into file.
let mut secret_file = File::create(secret_path).unwrap();
secret_file.write_all(value.as_bytes()).unwrap();
}
/// Get Future Time Limit.
pub fn get_ftl() -> String {
Settings::node_config_to_read().node.server.future_time_limit.to_string()
}
/// Save Future Time Limit.
pub fn save_ftl(ftl: u64) {
let mut w_config = Settings::node_config_to_update();
w_config.node.server.future_time_limit = ftl;
w_config.save();
}
/// Check if full chain validation mode is enabled.
pub fn is_full_chain_validation() -> bool {
let mode = Settings::node_config_to_read().node.clone().server.chain_validation_mode;
mode == ChainValidationMode::EveryBlock
}
/// Toggle full chain validation.
pub fn toggle_full_chain_validation() {
let validation_enabled = Self::is_full_chain_validation();
let new_mode = if validation_enabled {
ChainValidationMode::Disabled
} else {
ChainValidationMode::EveryBlock
};
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.chain_validation_mode = new_mode;
w_node_config.save();
}
/// Check if node is running in archive mode.
pub fn is_archive_mode() -> bool {
let archive_mode = Settings::node_config_to_read().node.clone().server.archive_mode;
archive_mode.is_some() && archive_mode.unwrap()
}
/// Toggle archive node mode.
pub fn toggle_archive_mode() {
let archive_mode = Self::is_archive_mode();
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.archive_mode = Some(!archive_mode);
w_node_config.save();
}
// P2P settings
/// Get P2P server port.
pub fn get_p2p_port() -> String {
Settings::node_config_to_read().node.server.p2p_config.port.to_string()
}
/// Check if P2P server port is available across the system and config.
pub fn is_p2p_port_available(port: &String) -> bool {
if port.parse::<u16>().is_err() {
return false;
}
let (_, api_port) = Self::get_api_address();
if Node::is_running() {
// Check if P2P server with same port is running.
let same_running = if let Some(running_port) = Node::get_p2p_port() {
&running_port.to_string() == port
} else {
false
};
if same_running || Self::is_port_available(port) {
return &api_port != port;
}
return false;
} else if Self::is_port_available(port) {
return &api_port != port;
}
false
}
/// Save P2P server port.
pub fn save_p2p_port(port: u16) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.p2p_config.port = port;
w_node_config.save();
}
/// Check if default seed list is used.
pub fn is_default_seeding_type() -> bool {
Settings::node_config_to_read().node.server.p2p_config.seeding_type == Seeding::DNSSeed
}
/// Toggle seeding type to use default or custom seed list.
pub fn toggle_seeding_type() {
let seeding_type = if Self::is_default_seeding_type() {
Seeding::List
} else {
Seeding::DNSSeed
};
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.p2p_config.seeding_type = seeding_type;
w_node_config.save();
}
/// Get custom seed peers.
pub fn get_custom_seeds() -> Vec<String> {
Settings::node_config_to_read().peers.seeds.clone()
}
/// Save custom seed peer.
pub fn save_custom_seed(peer: String) {
let mut w_node_config = Settings::node_config_to_update();
let size = w_node_config.peers.seeds.len();
w_node_config.peers.seeds.insert(size, peer);
w_node_config.peers.save();
}
/// Remove custom seed peer.
pub fn remove_custom_seed(peer: &String) {
let mut w_node_config = Settings::node_config_to_update();
let mut seeds = w_node_config.peers.seeds.clone();
if let Some(index) = seeds.iter().position(|x| x == peer) {
seeds.remove(index);
}
w_node_config.peers.seeds = seeds;
w_node_config.peers.save();
}
/// Get denied peer list.
pub fn get_denied_peers() -> Vec<String> {
Settings::node_config_to_read().peers.denied.clone()
}
/// Save peer to denied list.
pub fn deny_peer(peer: String) {
let mut w_node_config = Settings::node_config_to_update();
let size = w_node_config.peers.denied.len();
w_node_config.peers.denied.insert(size, peer);
w_node_config.peers.save();
}
/// Remove denied peer.
pub fn remove_denied_peer(peer: &String) {
let mut w_node_config = Settings::node_config_to_update();
let mut denied = w_node_config.peers.denied.clone();
if let Some(index) = denied.iter().position(|x| x == peer) {
denied.remove(index);
}
w_node_config.peers.denied = denied;
w_node_config.peers.save();
}
/// Get allowed peer list.
pub fn get_allowed_peers() -> Vec<String> {
Settings::node_config_to_read().peers.allowed.clone()
}
/// Save peer to allowed list.
pub fn allow_peer(peer: String) {
let mut w_node_config = Settings::node_config_to_update();
let size = w_node_config.peers.allowed.len();
w_node_config.peers.allowed.insert(size, peer);
w_node_config.peers.save();
}
/// Remove allowed peer.
pub fn remove_allowed_peer(peer: &String) {
let mut w_node_config = Settings::node_config_to_update();
let mut allowed = w_node_config.peers.allowed.clone();
if let Some(index) = allowed.iter().position(|x| x == peer) {
allowed.remove(index);
}
w_node_config.peers.allowed = allowed;
w_node_config.peers.save();
}
/// Get preferred peer list.
pub fn get_preferred_peers() -> Vec<String> {
Settings::node_config_to_read().peers.preferred.clone()
}
/// Add peer at preferred list.
pub fn prefer_peer(peer: String) {
let mut w_node_config = Settings::node_config_to_update();
let size = w_node_config.peers.preferred.len();
w_node_config.peers.preferred.insert(size, peer);
w_node_config.peers.save();
}
/// Remove preferred peer.
pub fn remove_preferred_peer(peer: &String) {
let mut w_node_config = Settings::node_config_to_update();
let mut preferred = w_node_config.peers.preferred.clone();
if let Some(index) = preferred.iter().position(|x| x == peer) {
preferred.remove(index);
}
w_node_config.peers.preferred = preferred;
w_node_config.peers.save();
}
/// How long a banned peer should stay banned in ms.
pub fn get_p2p_ban_window() -> String {
Settings::node_config_to_read().node.server.p2p_config.ban_window().to_string()
}
/// Save for how long a banned peer should stay banned in ms.
pub fn save_p2p_ban_window(time: i64) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.p2p_config.ban_window = Some(time);
w_node_config.save();
}
/// Maximum number of inbound peer connections.
pub fn get_max_inbound_peers() -> String {
Settings::node_config_to_read()
.node.server
.p2p_config
.peer_max_inbound_count()
.to_string()
}
/// Save maximum number of inbound peer connections.
pub fn save_max_inbound_peers(count: u32) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.p2p_config.peer_max_inbound_count = Some(count);
w_node_config.save();
}
/// Maximum number of outbound peer connections.
pub fn get_max_outbound_peers() -> String {
Settings::node_config_to_read()
.node
.server
.p2p_config
.peer_max_outbound_count()
.to_string()
}
/// Save maximum number of outbound peer connections.
pub fn save_max_outbound_peers(count: u32) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.p2p_config.peer_max_outbound_count = Some(count);
w_node_config.save();
}
/// Minimum number of outbound peer connections.
pub fn get_min_outbound_peers() -> String {
Settings::node_config_to_read()
.node
.server
.p2p_config
.peer_min_preferred_outbound_count()
.to_string()
}
/// Save minimum number of outbound peer connections.
pub fn save_min_outbound_peers(count: u32) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.p2p_config.peer_min_preferred_outbound_count = Some(count);
w_node_config.save();
}
// Pool settings
/// Base fee that's accepted into the pool.
pub fn get_base_fee() -> String {
Settings::node_config_to_read().node.server.pool_config.accept_fee_base.to_string()
}
/// Save base fee that's accepted into the pool.
pub fn save_base_fee(fee: u64) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.pool_config.accept_fee_base = fee;
w_node_config.save();
}
/// Reorg cache retention period in minutes.
pub fn get_reorg_cache_period() -> String {
Settings::node_config_to_read().node.server.pool_config.reorg_cache_period.to_string()
}
/// Save reorg cache retention period in minutes.
pub fn save_reorg_cache_period(period: u32) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.pool_config.reorg_cache_period = period;
w_node_config.save();
}
/// Max amount of transactions at pool.
pub fn get_max_pool_size() -> String {
Settings::node_config_to_read().node.server.pool_config.max_pool_size.to_string()
}
/// Save max amount of transactions at pool.
pub fn save_max_pool_size(amount: usize) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.pool_config.max_pool_size = amount;
w_node_config.save();
}
/// Max amount of transactions at stem pool.
pub fn get_max_stempool_size() -> String {
Settings::node_config_to_read().node.server.pool_config.max_stempool_size.to_string()
}
/// Save max amount of transactions at stem pool.
pub fn save_max_stempool_size(amount: usize) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.pool_config.max_stempool_size = amount;
w_node_config.save();
}
/// Max total weight of transactions that can get selected to build a block.
pub fn get_mineable_max_weight() -> String {
Settings::node_config_to_read().node.server.pool_config.mineable_max_weight.to_string()
}
/// Set max total weight of transactions that can get selected to build a block.
pub fn save_mineable_max_weight(weight: u64) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.pool_config.mineable_max_weight = weight;
w_node_config.save();
}
// Dandelion settings
/// Dandelion epoch duration in seconds.
pub fn get_dandelion_epoch() -> String {
Settings::node_config_to_read().node.server.dandelion_config.epoch_secs.to_string()
}
/// Save Dandelion epoch duration in seconds.
pub fn save_dandelion_epoch(secs: u16) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.dandelion_config.epoch_secs = secs;
w_node_config.save();
}
/// Dandelion embargo timer in seconds.
/// Fluff and broadcast after embargo expires if tx not seen on network.
pub fn get_dandelion_embargo() -> String {
Settings::node_config_to_read().node.server.dandelion_config.embargo_secs.to_string()
}
/// Save Dandelion embargo timer in seconds.
pub fn save_dandelion_embargo(secs: u16) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.dandelion_config.embargo_secs = secs;
w_node_config.save();
}
/// Dandelion aggregation period in seconds.
pub fn get_dandelion_aggregation() -> String {
Settings::node_config_to_read().node.server.dandelion_config.aggregation_secs.to_string()
}
/// Save Dandelion aggregation period in seconds.
pub fn save_dandelion_aggregation(secs: u16) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.dandelion_config.aggregation_secs = secs;
w_node_config.save();
}
/// Dandelion stem probability (default: stem 90% of the time, fluff 10% of the time).
pub fn get_stem_probability() -> String {
Settings::node_config_to_read().node.server.dandelion_config.stem_probability.to_string()
}
/// Save Dandelion stem probability.
pub fn save_stem_probability(percent: u8) {
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.dandelion_config.stem_probability = percent;
w_node_config.save();
}
/// Default to always stem our txs as described in Dandelion++ paper.
pub fn always_stem_our_txs() -> bool {
Settings::node_config_to_read().node.server.dandelion_config.always_stem_our_txs
}
/// Toggle stem of our txs.
pub fn toggle_always_stem_our_txs() {
let stem_txs = Self::always_stem_our_txs();
let mut w_node_config = Settings::node_config_to_update();
w_node_config.node.server.dandelion_config.always_stem_our_txs = !stem_txs;
w_node_config.save();
}
}