-
Notifications
You must be signed in to change notification settings - Fork 83
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
13 changed files
with
1,201 additions
and
290 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,239 @@ | ||
// Copyright 2020-2022 IOTA Stiftung | ||
// SPDX-License-Identifier: Apache-2.0 | ||
|
||
use criterion::Throughput; | ||
use identity_core::convert::FromJson; | ||
// This is a benchmark measuring the time it takes to deserialize a DID document from JSON. | ||
use criterion::criterion_group; | ||
use criterion::criterion_main; | ||
use criterion::BenchmarkId; | ||
use criterion::Criterion; | ||
use identity_did::document::CoreDocument; | ||
|
||
const JSON_DOC_SHORT: &str = r#" | ||
{ | ||
"id": "did:iota:0xaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", | ||
"verificationMethod": [ | ||
{ | ||
"id": "did:iota:0xaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa#issuerKey", | ||
"controller": "did:iota:0xaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyMultibase": "zFVen3X669xLzsi6N2V91DoiyzHzg1uAgqiT8jZ9nS96Z" | ||
} | ||
] | ||
}"#; | ||
|
||
const JSON_DOC_DID_KEY: &str = r#"{ | ||
"@context": [ | ||
"https://www.w3.org/ns/did/v1", | ||
"https://w3id.org/security/suites/ed25519-2020/v1", | ||
"https://w3id.org/security/suites/x25519-2020/v1" | ||
], | ||
"id": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK", | ||
"verificationMethod": [{ | ||
"id": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK", | ||
"publicKeyMultibase": "z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK" | ||
}], | ||
"authentication": [ | ||
"did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK" | ||
], | ||
"assertionMethod": [ | ||
"did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK" | ||
], | ||
"capabilityDelegation": [ | ||
"did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK" | ||
], | ||
"capabilityInvocation": [ | ||
"did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK" | ||
], | ||
"keyAgreement": [{ | ||
"id": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6LSj72tK8brWgZja8NLRwPigth2T9QRiG1uH9oKZuKjdh9p", | ||
"type": "X25519KeyAgreementKey2019", | ||
"controller": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK", | ||
"publicKeyMultibase": "z6LSj72tK8brWgZja8NLRwPigth2T9QRiG1uH9oKZuKjdh9p" | ||
}] | ||
}"#; | ||
|
||
// This is not a realistic document in any way. | ||
const JSON_DOCUMENT_LARGE: &str = r#"{ | ||
"@context": [ | ||
"https://www.w3.org/ns/did/v1", | ||
"https://w3id.org/security/suites/ed25519-2020/v1" | ||
], | ||
"id": "did:example:123", | ||
"verificationMethod": [ | ||
{ | ||
"id": "did:example:123#key1", | ||
"controller": "did:example:1234", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J" | ||
}, | ||
{ | ||
"id": "did:example:123#key2", | ||
"controller": "did:example:1234", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J" | ||
}, | ||
{ | ||
"id": "did:example:123#key3", | ||
"controller": "did:example:1234", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J" | ||
}, | ||
{ | ||
"id": "did:example:123#key4", | ||
"controller": "did:example:1234", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J" | ||
}, | ||
{ | ||
"id": "did:example:123#key5", | ||
"controller": "did:example:1234", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J" | ||
}, | ||
{ | ||
"id": "did:example:123#key6", | ||
"controller": "did:example:1234", | ||
"type": "Ed25519VerificationKey2018", | ||
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J" | ||
} | ||
], | ||
"authentication": [ | ||
{ | ||
"id": "did:example:123#z6MkecaLyHuYWkayBDLw5ihndj3T1m6zKTGqau3A51G7RBf3EMB1", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "zAKJP3f7BD6W4iWEQ9jwndVTCBq8ua2Utt8EEjJ6Vxsf" | ||
}, | ||
"did:example:123#key1", | ||
{ | ||
"id": "did:example:123#z6MkecaLyHuYWkayBDLw5ihndj3T1m6zKTGqau3A51G7RBf3EMB2", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "zAKJP3f7BD6W4iWEQ9jwndVTCBq8ua2Utt8EEjJ6Vxsf" | ||
}, | ||
"did:example:123#key4", | ||
"did:example:123#key2", | ||
{ | ||
"id": "did:example:123#z6MkecaLyHuYWkayBDLw5ihndj3T1m6zKTGqau3A51G7RBf3EMB3", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "zAKJP3f7BD6W4iWEQ9jwndVTCBq8ua2Utt8EEjJ6Vxsf" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkecaLyHuYWkayBDLw5ihndj3T1m6zKTGqau3A51G7RBf3EMB4", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "zAKJP3f7BD6W4iWEQ9jwndVTCBq8ua2Utt8EEjJ6Vxsf" | ||
} | ||
], | ||
"capabilityInvocation": [ | ||
{ | ||
"id": "did:example:123#z6MkhdmzFu659ZJ4XKj31vtEDmjvsi5yDZG5L7Caz63oP39k", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z4BWwfeqdp1obQptLLMvPNgBw48p7og1ie6Hf9p5nTpNN" | ||
}, | ||
"did:example:123#key1", | ||
{ | ||
"id": "did:example:123#z6MkhdmzFu659ZJ4XKj31vtEDmjvsi5yDZG5L7Caz63oP39kEMB2", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z4BWwfeqdp1obQptLLMvPNgBw48p7og1ie6Hf9p5nTpNN" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkhdmzFu659ZJ4XKj31vtEDmjvsi5yDZG5L7Caz63oP39kEMB3", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z4BWwfeqdp1obQptLLMvPNgBw48p7og1ie6Hf9p5nTpNN" | ||
}, | ||
"did:example:123#key5" | ||
], | ||
"capabilityDelegation": [ | ||
{ | ||
"id": "did:example:123#z6Mkw94ByR26zMSkNdCUi6FNRsWnc2DFEeDXyBGJ5KTzSWyi", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "zHgo9PAmfeoxHG8Mn2XHXamxnnSwPpkyBHAMNF3VyXJCL" | ||
}, | ||
"did:example:123#key6" | ||
], | ||
"assertionMethod": [ | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomY", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomYEMB2", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomYEMB3", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomYEMB4", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomYEMB5", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
}, | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomYEMB6", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
}, | ||
"did:example:123#key4", | ||
{ | ||
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomYEMB7", | ||
"type": "Ed25519VerificationKey2018", | ||
"controller": "did:example:123", | ||
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA" | ||
} | ||
], | ||
"service": [{ | ||
"id":"did:example:123#linked-domain", | ||
"type": "LinkedDomains", | ||
"serviceEndpoint": "https://bar.example.com" | ||
}] | ||
}"#; | ||
|
||
fn deserialize_json_document(c: &mut Criterion) { | ||
let mut group = c.benchmark_group("deserialize_json_document"); | ||
for (json, name) in [ | ||
(JSON_DOC_SHORT, "short document"), | ||
(JSON_DOC_DID_KEY, "did:key document"), | ||
(JSON_DOCUMENT_LARGE, "large document"), | ||
] { | ||
group.throughput(Throughput::Bytes(json.as_bytes().len() as u64)); | ||
group.bench_with_input( | ||
BenchmarkId::from_parameter(format!("{name}, document size: {} bytes", json.as_bytes().len())), | ||
json, | ||
|b, json| { | ||
b.iter(|| { | ||
let doc: Result<CoreDocument, _> = CoreDocument::from_json(json); | ||
assert!(doc.is_ok(), "bench {name} failed: {:#?}", doc); | ||
}) | ||
}, | ||
); | ||
} | ||
group.finish(); | ||
} | ||
|
||
criterion_group!(benches, deserialize_json_document); | ||
criterion_main!(benches); |
Oops, something went wrong.