Line data Source code
1 : #define _GNU_SOURCE
2 : #include "fd_event_client.h"
3 :
4 : #include "../../waltz/resolv/fd_netdb.h"
5 : #include "../../waltz/http/fd_url.h"
6 : #include "../../waltz/grpc/fd_grpc_client.h"
7 : #include "../../waltz/grpc/fd_grpc_client_private.h"
8 : #include "../../ballet/pb/fd_pb_tokenize.h"
9 : #include "../../ballet/pb/fd_pb_encode.h"
10 : #include "../../util/net/fd_ip4.h"
11 : #include "../../util/log/fd_log.h"
12 : #include "../keyguard/fd_keyguard.h"
13 :
14 : #include <netinet/tcp.h>
15 : #include <unistd.h>
16 : #include <errno.h>
17 : #include <sys/socket.h>
18 : #include <netinet/in.h>
19 :
20 0 : #define DISCONNECT_REASON_IDENTITY_CHANGED (0)
21 0 : #define DISCONNECT_REASON_CONNECT_FAILED (1)
22 0 : #define DISCONNECT_REASON_DNS_RESOLVE_FAILED (2)
23 0 : #define DISCONNECT_REASON_TIMEOUT (3)
24 0 : #define DISCONNECT_REASON_TRANSPORT_FAILED (4)
25 0 : #define DISCONNECT_REASON_PEER_CLOSED (5)
26 0 : #define DISCONNECT_REASON_INVALID_CURSOR (6)
27 0 : #define DISCONNECT_REASON_AUTH_FAILED (7)
28 :
29 0 : #define FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE (1UL)
30 0 : #define FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH (2UL)
31 0 : #define FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS (3UL)
32 :
33 : struct fd_event_client {
34 : fd_grpc_client_t * grpc_client;
35 : fd_grpc_client_metrics_t grpc_metrics[1];
36 : fd_grpc_h2_stream_t * event_stream;
37 :
38 : char client_version[ 10UL ];
39 : uchar identity_pubkey[ 32UL ];
40 :
41 : int has_genesis_hash;
42 : fd_hash_t genesis_hash[1];
43 :
44 : ushort has_shred_version;
45 : ushort shred_version;
46 :
47 : ulong event_id;
48 :
49 : ulong instance_id;
50 : ulong boot_id;
51 : ulong machine_id;
52 :
53 : int defer_disconnect;
54 : ulong consecutive_failure_count;
55 :
56 : ulong state;
57 : union {
58 : struct {
59 : long reconnect_deadline;
60 : } disconnected;
61 :
62 : struct {
63 : long connect_deadline;
64 : } connecting;
65 :
66 : struct {
67 : long connected_timestamp;
68 : } connected;
69 : };
70 :
71 : int so_sndbuf;
72 : int sockfd;
73 :
74 : char server_fqdn[ 256 ]; /* cstr */
75 : ulong server_fqdn_len;
76 : uint server_ip4_addr;
77 : ushort server_tcp_port;
78 :
79 : fd_rng_t * rng;
80 : fd_circq_t * circq;
81 : fd_keyguard_client_t * keyguard_client;
82 :
83 : fd_event_client_metrics_t metrics;
84 : };
85 :
86 : FD_FN_CONST ulong
87 0 : fd_event_client_align( void ) {
88 0 : return alignof( fd_event_client_t );
89 0 : }
90 :
91 : FD_FN_CONST ulong
92 0 : fd_event_client_footprint( ulong buf_max ) {
93 0 : ulong l;
94 0 : l = FD_LAYOUT_INIT;
95 0 : l = FD_LAYOUT_APPEND( l, alignof(fd_event_client_t), sizeof(fd_event_client_t) );
96 0 : l = FD_LAYOUT_APPEND( l, fd_grpc_client_align(), fd_grpc_client_footprint( buf_max ) );
97 0 : return FD_LAYOUT_FINI( l, alignof(fd_event_client_t) );
98 0 : }
99 :
100 : void *
101 : fd_event_client_new( void * shmem,
102 : fd_keyguard_client_t * keyguard_client,
103 : fd_rng_t * rng,
104 : fd_circq_t * circq,
105 : int so_sndbuf,
106 : char const * _url,
107 : uchar const * identity_pubkey,
108 : char const * client_version,
109 : ulong instance_id,
110 : ulong boot_id,
111 : ulong machine_id,
112 0 : ulong buf_max ) {
113 0 : if( FD_UNLIKELY( !shmem ) ) {
114 0 : FD_LOG_WARNING(( "NULL shmem" ));
115 0 : return NULL;
116 0 : }
117 :
118 0 : if( FD_UNLIKELY( !fd_ulong_is_aligned( (ulong)shmem, fd_event_client_align() ) ) ) {
119 0 : FD_LOG_WARNING(( "misaligned shmem" ));
120 0 : return NULL;
121 0 : }
122 :
123 0 : FD_SCRATCH_ALLOC_INIT( l, shmem );
124 0 : fd_event_client_t * client = FD_SCRATCH_ALLOC_APPEND( l, alignof(fd_event_client_t), sizeof(fd_event_client_t) );
125 0 : void * grpc_client_mem = FD_SCRATCH_ALLOC_APPEND( l, fd_grpc_client_align(), fd_grpc_client_footprint( buf_max ) );
126 :
127 0 : fd_url_t url[1];
128 0 : _Bool _is_ssl = 0;
129 0 : if( FD_UNLIKELY( fd_url_parse_endpoint( url,
130 0 : _url,
131 0 : strlen( _url ),
132 0 : &client->server_tcp_port,
133 0 : &_is_ssl,
134 0 : "[tiles.event.url]" ) ) ) {
135 0 : FD_LOG_ERR(( "Could not parse [tiles.event.url]" ));
136 0 : }
137 0 : client->server_tcp_port = 7878;
138 0 : if( FD_UNLIKELY( url->host_len > 255 ) ) {
139 0 : FD_LOG_CRIT(( "Invalid url->host_len" )); /* unreachable */
140 0 : }
141 0 : fd_cstr_fini( fd_cstr_append_text( fd_cstr_init( client->server_fqdn ), url->host, url->host_len ) );
142 0 : client->server_fqdn_len = url->host_len;
143 :
144 0 : fd_memcpy( client->identity_pubkey, identity_pubkey, 32UL );
145 0 : strncpy( client->client_version, client_version, sizeof( client->client_version ) );
146 0 : client->client_version[ sizeof( client->client_version ) - 1UL ] = '\0';
147 :
148 0 : client->event_id = 0UL;
149 :
150 0 : client->instance_id = instance_id;
151 0 : client->boot_id = boot_id;
152 0 : client->machine_id = machine_id;
153 :
154 0 : client->has_genesis_hash = 0;
155 0 : client->has_shred_version = 0;
156 :
157 0 : client->so_sndbuf = so_sndbuf;
158 0 : client->sockfd = -1;
159 0 : client->state = FD_EVENT_CLIENT_STATE_DISCONNECTED;
160 0 : client->disconnected.reconnect_deadline = 0L;
161 :
162 0 : client->defer_disconnect = INT_MAX;
163 0 : client->consecutive_failure_count = 7UL; /* Start high, so if server is down we don't keep retrying on boot */
164 :
165 0 : client->circq = circq;
166 0 : client->rng = rng;
167 0 : client->keyguard_client = keyguard_client;
168 :
169 0 : extern fd_grpc_client_callbacks_t fd_event_client_grpc_callbacks;
170 0 : client->grpc_client = fd_grpc_client_new( grpc_client_mem, &fd_event_client_grpc_callbacks, client->grpc_metrics, client, buf_max, fd_rng_ulong( rng ) );
171 0 : FD_TEST( client->grpc_client );
172 :
173 0 : memset( &client->metrics, 0, sizeof(client->metrics) );
174 0 : memset( client->grpc_metrics, 0, sizeof(fd_grpc_client_metrics_t) );
175 :
176 0 : fd_grpc_client_set_version( client->grpc_client, client->client_version, strlen( client->client_version ) );
177 0 : fd_grpc_client_set_authority( client->grpc_client, client->server_fqdn, client->server_fqdn_len, client->server_tcp_port );
178 :
179 0 : return (void *)client;
180 0 : }
181 :
182 : fd_event_client_t *
183 0 : fd_event_client_join( void * shec ) {
184 0 : if( FD_UNLIKELY( !shec ) ) {
185 0 : FD_LOG_WARNING(( "NULL shec" ));
186 0 : return NULL;
187 0 : }
188 :
189 0 : if( FD_UNLIKELY( !fd_ulong_is_aligned( (ulong)shec, fd_event_client_align() ) ) ) {
190 0 : FD_LOG_WARNING(( "misaligned shec" ));
191 0 : return NULL;
192 0 : }
193 :
194 0 : fd_event_client_t * client = (fd_event_client_t *)shec;
195 :
196 0 : return client;
197 0 : }
198 :
199 : fd_event_client_metrics_t const *
200 0 : fd_event_client_metrics( fd_event_client_t const * client ) {
201 : /* Update bytes from grpc metrics */
202 0 : ((fd_event_client_t *)client)->metrics.bytes_written = client->grpc_metrics->stream_chunks_tx_bytes;
203 0 : ((fd_event_client_t *)client)->metrics.bytes_read = client->grpc_metrics->stream_chunks_rx_bytes;
204 0 : return &client->metrics;
205 0 : }
206 :
207 : ulong
208 0 : fd_event_client_state( fd_event_client_t const * client ) {
209 0 : return client->state;
210 0 : }
211 :
212 : ulong
213 0 : fd_event_client_id_reserve( fd_event_client_t * client ) {
214 0 : return client->event_id++;
215 0 : }
216 :
217 : void
218 : fd_event_client_init_genesis( fd_event_client_t * client,
219 0 : fd_genesis_meta_t const * meta ) {
220 0 : *client->genesis_hash = meta->genesis_hash;
221 0 : client->has_genesis_hash = 1;
222 0 : }
223 :
224 : void
225 : fd_event_client_init_shred_version( fd_event_client_t * client,
226 0 : ushort shred_version ) {
227 0 : client->shred_version = shred_version;
228 0 : client->has_shred_version = 1;
229 0 : }
230 :
231 : static void
232 0 : backoff( fd_event_client_t * client ) {
233 0 : long now = fd_log_wallclock();
234 0 : ulong backoff_base = 1UL << fd_ulong_min( client->consecutive_failure_count, 7UL ); /* max 4 mins */
235 0 : ulong backoff_jitter = fd_rng_ulong_roll( client->rng, backoff_base );
236 0 : client->disconnected.reconnect_deadline = now + (long)( backoff_base + backoff_jitter )*(long)1e9;
237 0 : client->consecutive_failure_count++;
238 0 : }
239 :
240 : static void
241 : disconnect( fd_event_client_t * client,
242 : int reason,
243 : int err,
244 0 : int _backoff ) {
245 0 : if( FD_LIKELY( -1!=client->sockfd ) ) {
246 0 : if( FD_UNLIKELY( -1==close( client->sockfd ) ) ) FD_LOG_ERR(( "close() failed (%d-%s)", errno, fd_io_strerror( errno ) ));
247 0 : client->sockfd = -1;
248 0 : client->state = FD_EVENT_CLIENT_STATE_DISCONNECTED;
249 0 : fd_circq_reset_cursor( client->circq );
250 0 : }
251 :
252 0 : switch( reason ) {
253 0 : case DISCONNECT_REASON_IDENTITY_CHANGED:
254 0 : FD_LOG_INFO(( "disconnected: identity changed" ));
255 0 : break;
256 0 : case DISCONNECT_REASON_CONNECT_FAILED:
257 0 : FD_LOG_WARNING(( "connecting to " FD_IP4_ADDR_FMT ":%u failed (%i-%s)", FD_IP4_ADDR_FMT_ARGS( client->server_ip4_addr ), client->server_tcp_port, errno, fd_io_strerror( errno ) ));
258 0 : client->metrics.transport_fail_cnt++;
259 0 : break;
260 0 : case DISCONNECT_REASON_DNS_RESOLVE_FAILED:
261 0 : FD_LOG_WARNING(( "failed to resolve host `%.*s` (%d-%s)", (int)client->server_fqdn_len, client->server_fqdn, err, fd_gai_strerror( err ) ));
262 0 : client->metrics.transport_fail_cnt++;
263 0 : break;
264 0 : case DISCONNECT_REASON_TIMEOUT:
265 0 : FD_LOG_INFO(( "connection failed: timeout" ));
266 0 : client->metrics.transport_fail_cnt++;
267 0 : break;
268 0 : case DISCONNECT_REASON_TRANSPORT_FAILED:
269 0 : FD_LOG_WARNING(( "disconnected: transport failed (%d-%s)", err, fd_io_strerror( err ) ));
270 0 : client->metrics.transport_fail_cnt++;
271 0 : break;
272 0 : case DISCONNECT_REASON_PEER_CLOSED:
273 0 : FD_LOG_WARNING(( "disconnected: peer closed connection" ));
274 0 : client->metrics.transport_fail_cnt++;
275 0 : break;
276 0 : case DISCONNECT_REASON_INVALID_CURSOR:
277 0 : FD_LOG_WARNING(( "disconnected: invalid cursor" ));
278 0 : client->metrics.transport_fail_cnt++;
279 0 : break;
280 0 : case DISCONNECT_REASON_AUTH_FAILED:
281 0 : FD_LOG_WARNING(( "disconnected: authentication failed" ));
282 0 : client->metrics.transport_fail_cnt++;
283 0 : break;
284 0 : default:
285 0 : FD_LOG_WARNING(( "disconnected: unknown reason %d", reason ));
286 0 : client->metrics.transport_fail_cnt++;
287 0 : break;
288 0 : }
289 :
290 0 : if( FD_LIKELY( _backoff ) ) backoff( client );
291 0 : }
292 :
293 : void
294 : fd_event_client_set_identity( fd_event_client_t * client,
295 0 : uchar const * identity_pubkey ) {
296 0 : fd_memcpy( client->identity_pubkey, identity_pubkey, 32UL );
297 0 : disconnect( client, DISCONNECT_REASON_IDENTITY_CHANGED, 0, 0 );
298 0 : }
299 :
300 : static void
301 : reconnect( fd_event_client_t * client,
302 0 : int * charge_busy ) {
303 0 : FD_TEST( client->state==FD_EVENT_CLIENT_STATE_DISCONNECTED );
304 :
305 0 : long now = fd_log_wallclock();
306 0 : if( FD_UNLIKELY( now<client->disconnected.reconnect_deadline ) ) return;
307 :
308 0 : *charge_busy = 1;
309 :
310 0 : FD_LOG_INFO(( "connecting to event server http://%.*s:%u", (int)client->server_fqdn_len, client->server_fqdn, client->server_tcp_port ));
311 :
312 : /* FIXME IPv6 support */
313 0 : fd_addrinfo_t hints = {0};
314 0 : hints.ai_family = AF_INET;
315 0 : fd_addrinfo_t * res = NULL;
316 0 : uchar scratch[ 4096 ];
317 0 : void * pscratch = scratch;
318 0 : int err = fd_getaddrinfo( client->server_fqdn, &hints, &res, &pscratch, sizeof(scratch) );
319 0 : if( FD_UNLIKELY( err ) ) {
320 0 : disconnect( client, DISCONNECT_REASON_DNS_RESOLVE_FAILED, err, 1 );
321 0 : return;
322 0 : }
323 :
324 0 : uint const ip4_addr = ((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr;
325 0 : client->server_ip4_addr = ip4_addr;
326 :
327 0 : client->sockfd = socket( AF_INET, SOCK_STREAM|SOCK_NONBLOCK, 0 );
328 0 : if( FD_UNLIKELY( -1==client->sockfd ) ) FD_LOG_ERR(( "socket() failed (%d-%s)", errno, fd_io_strerror( errno ) ));
329 :
330 0 : struct sockaddr_in addr;
331 0 : fd_memset( &addr, 0, sizeof( addr ) );
332 0 : addr.sin_family = AF_INET;
333 0 : addr.sin_port = fd_ushort_bswap( client->server_tcp_port );
334 0 : addr.sin_addr.s_addr = ip4_addr;
335 :
336 0 : int tcp_nodelay = 1;
337 0 : if( FD_UNLIKELY( -1==setsockopt( client->sockfd, SOL_TCP, TCP_NODELAY, &tcp_nodelay, sizeof(int) ) ) ) FD_LOG_ERR(( "setsockopt failed (%d-%s)", errno, fd_io_strerror( errno ) ));
338 0 : if( FD_UNLIKELY( -1==setsockopt( client->sockfd, SOL_SOCKET, SO_SNDBUF, &client->so_sndbuf, sizeof(int) ) ) ) FD_LOG_ERR(( "setsockopt(SOL_SOCKET,SO_SNDBUF,%i) failed (%i-%s)", client->so_sndbuf, errno, fd_io_strerror( errno ) ));
339 :
340 0 : if( FD_UNLIKELY( -1==connect( client->sockfd, fd_type_pun_const( &addr ), sizeof(struct sockaddr_in) ) && errno!=EINPROGRESS ) ) {
341 0 : disconnect( client, DISCONNECT_REASON_CONNECT_FAILED, errno, 1 );
342 0 : return;
343 0 : }
344 :
345 0 : fd_grpc_client_reset( client->grpc_client );
346 :
347 0 : client->state = FD_EVENT_CLIENT_STATE_CONNECTING;
348 0 : client->connecting.connect_deadline = now+(long)1L*(long)1e9; /* 1 second to connect */
349 0 : }
350 :
351 : static void
352 0 : fd_event_client_grpc_conn_established( void * app_ctx ) {
353 0 : fd_event_client_t * client = app_ctx;
354 :
355 0 : fd_pb_encoder_t auth_req[1];
356 0 : uchar buffer[ 256UL ];
357 0 : fd_pb_encoder_init( auth_req, buffer, sizeof(buffer) );
358 :
359 0 : fd_pb_push_bytes( auth_req, 1U, client->identity_pubkey, 32UL );
360 0 : fd_pb_push_string( auth_req, 2U, client->client_version, strlen( client->client_version ) );
361 0 : fd_pb_push_bytes( auth_req, 3U, client->genesis_hash, 32UL );
362 0 : fd_pb_push_uint64( auth_req, 4U, client->shred_version );
363 0 : fd_pb_push_uint64( auth_req, 5U, client->instance_id );
364 0 : fd_pb_push_uint64( auth_req, 6U, client->machine_id );
365 0 : fd_pb_push_uint64( auth_req, 7U, client->boot_id );
366 :
367 0 : fd_grpc_h2_stream_t * stream = fd_grpc_client_request_start1(
368 0 : client->grpc_client,
369 0 : "/events.v1.EventService/Authenticate", strlen("/events.v1.EventService/Authenticate"),
370 0 : FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE,
371 0 : buffer, fd_pb_encoder_out_sz( auth_req ),
372 0 : NULL, 0UL,
373 0 : 0 /* not streaming */ );
374 :
375 0 : if( FD_UNLIKELY( !stream ) ) {
376 0 : FD_LOG_WARNING(( "Failed to start Authenticate request" ));
377 0 : return;
378 0 : }
379 :
380 0 : client->state = FD_EVENT_CLIENT_STATE_AUTHENTICATING;
381 0 : FD_LOG_INFO(( "Requesting auth challenge from event server " FD_IP4_ADDR_FMT ":%u (%.*s)",
382 0 : FD_IP4_ADDR_FMT_ARGS( client->server_ip4_addr ), client->server_tcp_port,
383 0 : (int)client->server_fqdn_len, client->server_fqdn ));
384 0 : }
385 :
386 : static void
387 : fd_event_client_handle_auth_challenge_resp( fd_event_client_t * client,
388 : void const * protobuf,
389 0 : ulong protobuf_sz ) {
390 0 : fd_pb_inbuf_t inbuf[1];
391 0 : fd_pb_inbuf_init( inbuf, protobuf, protobuf_sz );
392 :
393 0 : if( FD_UNLIKELY( protobuf_sz==0UL ) ) {
394 0 : FD_LOG_WARNING(( "Empty auth challenge response" ));
395 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
396 0 : return;
397 0 : }
398 :
399 0 : fd_pb_tlv_t challenge_tlv;
400 0 : if( FD_UNLIKELY( !fd_pb_read_tlv( inbuf, &challenge_tlv ) ) ) {
401 0 : FD_LOG_WARNING(( "Failed to parse auth challenge response" ));
402 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
403 0 : return;
404 0 : }
405 :
406 0 : if( FD_UNLIKELY( challenge_tlv.field_id!=1U || challenge_tlv.wire_type!=FD_PB_WIRE_TYPE_LEN ) ) {
407 0 : FD_LOG_WARNING(( "Unexpected field in auth challenge response" ));
408 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
409 0 : return;
410 0 : }
411 :
412 0 : ulong challenge_len = challenge_tlv.len;
413 0 : if( FD_UNLIKELY( challenge_len!=32UL ) ) {
414 0 : FD_LOG_WARNING(( "Invalid challenge size: %lu bytes", challenge_len ));
415 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
416 0 : return;
417 0 : }
418 :
419 0 : if( FD_UNLIKELY( fd_pb_inbuf_sz( inbuf )<challenge_len ) ) {
420 0 : FD_LOG_WARNING(( "Truncated auth challenge response" ));
421 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
422 0 : return;
423 0 : }
424 :
425 0 : uchar signed_challenge[ 64UL ];
426 0 : fd_keyguard_client_sign( client->keyguard_client,
427 0 : signed_challenge,
428 0 : inbuf->cur,
429 0 : 32UL,
430 0 : FD_KEYGUARD_SIGN_TYPE_FD_EVENTS_AUTH_CONCAT_ED25519 );
431 :
432 0 : fd_pb_encoder_t confirm_req[1];
433 0 : uchar buffer[ 128UL ];
434 0 : fd_pb_encoder_init( confirm_req, buffer, sizeof(buffer) );
435 0 : fd_pb_push_bytes( confirm_req, 1U, signed_challenge, 64UL );
436 :
437 0 : fd_grpc_h2_stream_t * stream = fd_grpc_client_request_start1(
438 0 : client->grpc_client,
439 0 : "/events.v1.EventService/ConfirmAuthChallenge", strlen("/events.v1.EventService/ConfirmAuthChallenge"),
440 0 : FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH,
441 0 : buffer, fd_pb_encoder_out_sz( confirm_req ),
442 0 : NULL, 0UL,
443 0 : 0 /* not streaming */ );
444 :
445 0 : if( FD_UNLIKELY( !stream ) ) {
446 0 : FD_LOG_WARNING(( "Failed to start ConfirmAuthChallenge request" ));
447 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
448 0 : return;
449 0 : }
450 :
451 0 : client->state = FD_EVENT_CLIENT_STATE_CONFIRMING_AUTH;
452 0 : FD_LOG_DEBUG(( "Sent signed auth challenge" ));
453 0 : }
454 :
455 : static void
456 : fd_event_client_handle_confirm_auth_resp( fd_event_client_t * client,
457 : void const * protobuf,
458 0 : ulong protobuf_sz ) {
459 0 : (void)protobuf;
460 0 : (void)protobuf_sz;
461 :
462 0 : client->event_stream = NULL;
463 0 : client->metrics.transport_success_cnt++;
464 0 : client->state = FD_EVENT_CLIENT_STATE_CONNECTED;
465 0 : client->connected.connected_timestamp = fd_log_wallclock();
466 0 : FD_LOG_NOTICE(( "connected to event server " FD_IP4_ADDR_FMT ":%u (%.*s)",
467 0 : FD_IP4_ADDR_FMT_ARGS( client->server_ip4_addr ), client->server_tcp_port,
468 0 : (int)client->server_fqdn_len, client->server_fqdn ));
469 0 : }
470 :
471 : static void
472 : fd_event_client_grpc_conn_dead( void * app_ctx,
473 : uint h2_err,
474 0 : int closed_by ) {
475 0 : fd_event_client_t * client = app_ctx;
476 0 : FD_LOG_WARNING(( "Event gRPC connection closed %s (%u-%s)",
477 0 : closed_by ? "by peer" : "due to error",
478 0 : h2_err, fd_h2_strerror( h2_err ) ));
479 0 : disconnect( client, DISCONNECT_REASON_PEER_CLOSED, 0, 1 );
480 0 : }
481 :
482 : static void
483 : fd_event_client_grpc_tx_complete( void * app_ctx,
484 0 : ulong request_ctx ) {
485 0 : (void)app_ctx; (void)request_ctx;
486 0 : }
487 :
488 : void
489 : fd_event_client_grpc_rx_start( void * app_ctx,
490 0 : ulong request_ctx ) {
491 0 : (void)app_ctx; (void)request_ctx;
492 0 : }
493 :
494 : static void
495 : fd_event_client_handle_stream_events_resp( fd_event_client_t * client,
496 : void const * protobuf,
497 0 : ulong protobuf_sz ) {
498 0 : fd_pb_inbuf_t inbuf[1];
499 0 : fd_pb_inbuf_init( inbuf, protobuf, protobuf_sz );
500 :
501 0 : ulong nonce_ack;
502 0 : if( FD_UNLIKELY( protobuf_sz==0UL ) ) {
503 0 : nonce_ack = 0UL;
504 0 : } else {
505 0 : fd_pb_tlv_t event_id;
506 0 : FD_TEST( fd_pb_read_tlv( inbuf, &event_id ) );
507 0 : FD_TEST( event_id.field_id==1U ); /* event_id */
508 0 : FD_TEST( event_id.wire_type==FD_PB_WIRE_TYPE_VARINT );
509 0 : nonce_ack = event_id.varint;
510 0 : }
511 :
512 0 : client->metrics.events_acked++;
513 0 : if( FD_UNLIKELY( nonce_ack==ULONG_MAX ) ) return;
514 :
515 0 : int err = fd_circq_pop_until( client->circq, nonce_ack );
516 0 : if( FD_UNLIKELY( -1==err ) ) {
517 0 : FD_LOG_WARNING(( "Event gRPC rx msg: invalid cursor ack %lu", nonce_ack ));
518 0 : client->defer_disconnect = DISCONNECT_REASON_INVALID_CURSOR;
519 0 : }
520 0 : }
521 :
522 : void
523 : fd_event_client_grpc_rx_msg( void * app_ctx,
524 : void const * protobuf,
525 : ulong protobuf_sz,
526 0 : ulong request_ctx ) {
527 0 : fd_event_client_t * client = app_ctx;
528 :
529 0 : switch( request_ctx ) {
530 0 : case FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE:
531 0 : fd_event_client_handle_auth_challenge_resp( client, protobuf, protobuf_sz );
532 0 : break;
533 0 : case FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH:
534 0 : fd_event_client_handle_confirm_auth_resp( client, protobuf, protobuf_sz );
535 0 : break;
536 0 : case FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS:
537 0 : fd_event_client_handle_stream_events_resp( client, protobuf, protobuf_sz );
538 0 : break;
539 0 : default:
540 0 : FD_LOG_WARNING(( "Unknown request_ctx: %lu", request_ctx ));
541 0 : break;
542 0 : }
543 0 : }
544 :
545 : void
546 : fd_event_client_grpc_rx_end( void * app_ctx,
547 : ulong request_ctx,
548 0 : fd_grpc_resp_hdrs_t * resp ) {
549 0 : fd_event_client_t * client = app_ctx;
550 :
551 0 : if( FD_UNLIKELY( resp->h2_status!=200 ) ) {
552 0 : FD_LOG_WARNING(( "Event gRPC request failed (HTTP status %u)", resp->h2_status ));
553 0 : client->defer_disconnect = DISCONNECT_REASON_TRANSPORT_FAILED;
554 0 : return;
555 0 : }
556 :
557 0 : resp->grpc_msg_len = (uint)fd_url_unescape( resp->grpc_msg, resp->grpc_msg_len );
558 0 : if( !resp->grpc_msg_len ) {
559 0 : fd_memcpy( resp->grpc_msg, "unknown error", 13 );
560 0 : resp->grpc_msg_len = 13;
561 0 : }
562 :
563 0 : if( FD_UNLIKELY( resp->grpc_status!=FD_GRPC_STATUS_OK ) ) {
564 0 : switch( request_ctx ) {
565 0 : case FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE:
566 0 : case FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH:
567 0 : FD_LOG_WARNING(( "Event authentication failed (gRPC status %u-%s): %.*s",
568 0 : resp->grpc_status, fd_grpc_status_cstr( resp->grpc_status ),
569 0 : (int)resp->grpc_msg_len, resp->grpc_msg ));
570 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
571 0 : return;
572 0 : case FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS:
573 0 : FD_LOG_WARNING(( "Event stream failed (gRPC status %u-%s): %.*s",
574 0 : resp->grpc_status, fd_grpc_status_cstr( resp->grpc_status ),
575 0 : (int)resp->grpc_msg_len, resp->grpc_msg ));
576 0 : client->defer_disconnect = DISCONNECT_REASON_PEER_CLOSED;
577 0 : return;
578 0 : default:
579 0 : FD_LOG_WARNING(( "Event gRPC request failed (gRPC status %u-%s): %.*s",
580 0 : resp->grpc_status, fd_grpc_status_cstr( resp->grpc_status ),
581 0 : (int)resp->grpc_msg_len, resp->grpc_msg ));
582 0 : client->defer_disconnect = DISCONNECT_REASON_TRANSPORT_FAILED;
583 0 : return;
584 0 : }
585 0 : }
586 :
587 0 : if( request_ctx==FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS ) {
588 0 : FD_LOG_INFO(( "Event gRPC stream ended gracefully" ));
589 0 : client->defer_disconnect = DISCONNECT_REASON_PEER_CLOSED;
590 0 : }
591 0 : }
592 :
593 : void
594 : fd_event_client_grpc_rx_timeout( void * app_ctx,
595 : ulong request_ctx,
596 0 : int deadline_kind ) {
597 0 : (void)app_ctx; (void)request_ctx; (void)deadline_kind;
598 0 : FD_LOG_WARNING(( "Event gRPC rx timeout" ));
599 0 : }
600 :
601 : static void
602 0 : fd_event_client_grpc_ping_ack( void * app_ctx ) {
603 0 : (void)app_ctx;
604 0 : FD_LOG_WARNING(( "Event gRPC ping ack" ));
605 0 : }
606 :
607 : static void
608 : tx( fd_event_client_t * client,
609 0 : int * charge_busy ) {
610 0 : FD_TEST( client->state==FD_EVENT_CLIENT_STATE_CONNECTED );
611 :
612 0 : if( FD_UNLIKELY( fd_grpc_client_request_is_blocked( client->grpc_client ) ) ) return;
613 0 : if( FD_UNLIKELY( client->event_stream && client->grpc_client->request_stream != NULL && client->grpc_client->request_stream!=client->event_stream ) ) return;
614 :
615 0 : ulong msg_sz;
616 0 : uchar const * msg = fd_circq_cursor_advance( client->circq, &msg_sz );
617 0 : if( FD_LIKELY( !msg ) ) return;
618 :
619 0 : if( FD_UNLIKELY( !client->event_stream ) ) {
620 0 : client->event_stream = fd_grpc_client_request_start1(
621 0 : client->grpc_client,
622 0 : "/events.v1.EventService/StreamEvents", strlen("/events.v1.EventService/StreamEvents"),
623 0 : FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS,
624 0 : msg, msg_sz,
625 0 : NULL, 0UL,
626 0 : 1 /* streaming */ );
627 0 : if( FD_UNLIKELY( !client->event_stream ) ) return; /* Only reason for failure is too big message, so just skip it */
628 0 : } else {
629 0 : int result = fd_grpc_client_stream_send_msg1( client->grpc_client, client->event_stream, msg, msg_sz );
630 0 : if( FD_UNLIKELY( !result ) ) return; /* Only reason for failure is too big message, so just skip it */
631 0 : }
632 :
633 0 : client->metrics.events_sent++;
634 0 : *charge_busy = 1;
635 0 : }
636 :
637 : void
638 : fd_event_client_poll( fd_event_client_t * client,
639 0 : int * charge_busy ) {
640 0 : if( FD_UNLIKELY( !client->has_genesis_hash || !client->has_shred_version ) ) return;
641 :
642 0 : long now = fd_log_wallclock();
643 :
644 0 : if( FD_UNLIKELY( client->state==FD_EVENT_CLIENT_STATE_DISCONNECTED ) ) reconnect( client, charge_busy );
645 0 : if( FD_UNLIKELY( client->state==FD_EVENT_CLIENT_STATE_CONNECTING ) ) {
646 0 : if( FD_UNLIKELY( now>client->connecting.connect_deadline ) ) {
647 0 : disconnect( client, DISCONNECT_REASON_TIMEOUT, 0, 1 );
648 0 : return;
649 0 : }
650 0 : }
651 0 : if( FD_LIKELY( client->state!=FD_EVENT_CLIENT_STATE_DISCONNECTED ) ) {
652 0 : if( FD_UNLIKELY( -1==fd_grpc_client_rxtx_socket( client->grpc_client, client->sockfd, charge_busy ) ) ) {
653 0 : disconnect( client, DISCONNECT_REASON_TRANSPORT_FAILED, errno, 1 );
654 0 : return;
655 0 : }
656 0 : }
657 :
658 0 : if( FD_UNLIKELY( client->defer_disconnect!=INT_MAX ) ) {
659 0 : int reason = client->defer_disconnect;
660 0 : client->defer_disconnect = INT_MAX;
661 0 : disconnect( client, reason, 0, 1 );
662 0 : return;
663 0 : }
664 :
665 0 : if( FD_LIKELY( client->state==FD_EVENT_CLIENT_STATE_CONNECTED ) ) {
666 0 : if( FD_UNLIKELY( client->consecutive_failure_count && (now-client->connected.connected_timestamp>10L*(long)1e9 ) ) ) client->consecutive_failure_count = 0UL;
667 0 : tx( client, charge_busy );
668 0 : }
669 0 : }
670 :
671 : fd_grpc_client_callbacks_t fd_event_client_grpc_callbacks = {
672 : .conn_established = fd_event_client_grpc_conn_established,
673 : .conn_dead = fd_event_client_grpc_conn_dead,
674 : .tx_complete = fd_event_client_grpc_tx_complete,
675 : .rx_start = fd_event_client_grpc_rx_start,
676 : .rx_msg = fd_event_client_grpc_rx_msg,
677 : .rx_end = fd_event_client_grpc_rx_end,
678 : .rx_timeout = fd_event_client_grpc_rx_timeout,
679 : .ping_ack = fd_event_client_grpc_ping_ack,
680 : };
|