solana/README.md

137 lines
4.5 KiB
Markdown
Raw Normal View History

[![Silk crate](https://img.shields.io/crates/v/silk.svg)](https://crates.io/crates/silk)
[![Silk documentation](https://docs.rs/silk/badge.svg)](https://docs.rs/silk)
2018-02-16 10:49:21 -08:00
[![Build Status](https://travis-ci.org/loomprotocol/silk.svg?branch=master)](https://travis-ci.org/loomprotocol/silk)
[![codecov](https://codecov.io/gh/loomprotocol/silk/branch/master/graph/badge.svg)](https://codecov.io/gh/loomprotocol/silk)
2018-02-14 14:25:49 -08:00
Disclaimer
===
2018-02-15 12:59:33 -08:00
All claims, content, designs, algorithms, estimates, roadmaps, specifications, and performance measurements described in this project are done with the author's best effort. It is up to the reader to check and validate their accuracy and truthfulness. Furthermore nothing in this project constitutes a solicitation for investment.
Silk, a silky smooth implementation of the Loom specification
===
Loom™ is a new achitecture for a high performance blockchain. Its whitepaper boasts a theoretical
2018-02-16 11:51:57 -08:00
throughput of 710k transactions per second on a 1 gbps network. The specification is implemented
in two git repositories. Reserach is performed in the loom repository. That work drives the
Loom specification forward. This repository, on the other hand, aims to implement the specification
as-is. We care a great deal about quality, clarity and short learning curve. We avoid the use
of `unsafe` Rust and write tests for *everything*. Optimizations are only added when
2018-02-21 09:05:55 -08:00
corresponding benchmarks are also added that demonstrate real performance boosts. We expect the
2018-02-16 11:51:57 -08:00
feature set here will always be a ways behind the loom repo, but that this is an implementation
you can take to the bank, literally.
Usage
===
2018-02-19 08:19:26 -08:00
2018-02-19 11:12:45 -08:00
Add the latest [silk package](https://crates.io/crates/silk) to the `[dependencies]` section
2018-02-19 08:19:26 -08:00
of your Cargo.toml.
Create a *Historian* and send it *events* to generate an *event log*, where each log *entry*
is tagged with the historian's latest *hash*. Then ensure the order of events was not tampered
with by verifying each entry's hash can be generated from the hash in the previous entry:
2018-03-04 13:36:55 -08:00
![historian](https://user-images.githubusercontent.com/55449/36950845-459bdb58-1fb9-11e8-850e-894586f3729b.png)
2018-02-19 08:19:26 -08:00
```rust
extern crate silk;
2018-02-19 08:19:26 -08:00
use silk::historian::Historian;
2018-03-02 11:07:05 -08:00
use silk::log::{verify_slice, Entry, Sha256Hash};
use silk::event::{generate_keypair, get_pubkey, sign_claim_data, Event};
2018-02-21 10:52:03 -08:00
use std::thread::sleep;
use std::time::Duration;
2018-02-19 11:25:57 -08:00
use std::sync::mpsc::SendError;
2018-02-19 08:19:26 -08:00
2018-03-02 11:07:05 -08:00
fn create_log(hist: &Historian<Sha256Hash>) -> Result<(), SendError<Event<Sha256Hash>>> {
2018-02-21 10:52:03 -08:00
sleep(Duration::from_millis(15));
let data = Sha256Hash::default();
2018-03-02 11:07:05 -08:00
let keypair = generate_keypair();
let event0 = Event::new_claim(get_pubkey(&keypair), data, sign_claim_data(&data, &keypair));
hist.sender.send(event0)?;
2018-02-21 10:52:03 -08:00
sleep(Duration::from_millis(10));
2018-02-19 11:25:57 -08:00
Ok(())
}
2018-02-19 08:19:26 -08:00
fn main() {
2018-02-19 15:48:29 -08:00
let seed = Sha256Hash::default();
2018-02-21 10:52:03 -08:00
let hist = Historian::new(&seed, Some(10));
2018-02-19 11:25:57 -08:00
create_log(&hist).expect("send error");
drop(hist.sender);
2018-03-02 11:07:05 -08:00
let entries: Vec<Entry<Sha256Hash>> = hist.receiver.iter().collect();
for entry in &entries {
println!("{:?}", entry);
}
// Proof-of-History: Verify the historian learned about the events
// in the same order they appear in the vector.
2018-02-19 15:48:29 -08:00
assert!(verify_slice(&entries, &seed));
2018-02-19 08:19:26 -08:00
}
```
Running the program should produce a log similar to:
2018-02-19 15:48:29 -08:00
```rust
2018-03-04 06:34:38 -08:00
Entry { num_hashes: 0, id: [0, ...], event: Tick }
Entry { num_hashes: 3, id: [67, ...], event: Transaction { data: [37, ...] } }
2018-03-04 06:34:38 -08:00
Entry { num_hashes: 3, id: [123, ...], event: Tick }
```
Proof-of-History
---
Take note of the last line:
```rust
assert!(verify_slice(&entries, &seed));
```
[It's a proof!](https://en.wikipedia.org/wiki/CurryHoward_correspondence) For each entry returned by the
2018-03-04 06:34:38 -08:00
historian, we can verify that `id` is the result of applying a sha256 hash to the previous `id`
exactly `num_hashes` times, and then hashing then event data on top of that. Because the event data is
included in the hash, the events cannot be reordered without regenerating all the hashes.
Developing
===
Building
---
Install rustc, cargo and rustfmt:
```bash
$ curl https://sh.rustup.rs -sSf | sh
$ source $HOME/.cargo/env
$ rustup component add rustfmt-preview
```
Download the source code:
```bash
2018-02-16 10:49:21 -08:00
$ git clone https://github.com/loomprotocol/silk.git
$ cd silk
```
Testing
---
Run the test suite:
```bash
cargo test
```
Benchmarking
---
First install the nightly build of rustc. `cargo bench` requires unstable features:
```bash
$ rustup install nightly
```
Run the benchmarks:
```bash
$ cargo +nightly bench --features="asm,unstable"
```