Line data Source code
1 : #define _GNU_SOURCE
2 : #include "fd_event_client.h"
3 :
4 : #include "../../waltz/resolv/fd_netdb.h"
5 : #include "../../waltz/http/fd_url.h"
6 : #include "../../waltz/grpc/fd_grpc_client.h"
7 : #include "../../waltz/grpc/fd_grpc_client_private.h"
8 : #include "../../ballet/pb/fd_pb_tokenize.h"
9 : #include "../../ballet/pb/fd_pb_encode.h"
10 : #include "../../util/net/fd_ip4.h"
11 : #include "../../util/log/fd_log.h"
12 : #include "../keyguard/fd_keyguard.h"
13 :
14 : #include <netinet/tcp.h>
15 : #include <unistd.h>
16 : #include <errno.h>
17 : #include <sys/socket.h>
18 : #include <netinet/in.h>
19 :
20 0 : #define DISCONNECT_REASON_IDENTITY_CHANGED (0)
21 0 : #define DISCONNECT_REASON_CONNECT_FAILED (1)
22 0 : #define DISCONNECT_REASON_DNS_RESOLVE_FAILED (2)
23 0 : #define DISCONNECT_REASON_TIMEOUT (3)
24 0 : #define DISCONNECT_REASON_TRANSPORT_FAILED (4)
25 0 : #define DISCONNECT_REASON_PEER_CLOSED (5)
26 0 : #define DISCONNECT_REASON_INVALID_CURSOR (6)
27 0 : #define DISCONNECT_REASON_AUTH_FAILED (7)
28 :
29 0 : #define FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE (1UL)
30 0 : #define FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH (2UL)
31 0 : #define FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS (3UL)
32 :
33 : struct fd_event_client {
34 : fd_grpc_client_t * grpc_client;
35 : fd_grpc_client_metrics_t grpc_metrics[1];
36 : fd_grpc_h2_stream_t * event_stream;
37 :
38 : char client_version[ 10UL ];
39 : uchar identity_pubkey[ 32UL ];
40 :
41 : int has_genesis_hash;
42 : fd_hash_t genesis_hash[1];
43 :
44 : ushort has_shred_version;
45 : ushort shred_version;
46 :
47 : ulong event_id;
48 :
49 : ulong instance_id;
50 : ulong boot_id;
51 : ulong machine_id;
52 :
53 : int defer_disconnect;
54 : ulong consecutive_failure_count;
55 :
56 : ulong state;
57 : union {
58 : struct {
59 : long reconnect_deadline;
60 : } disconnected;
61 :
62 : struct {
63 : long connect_deadline;
64 : } connecting;
65 :
66 : struct {
67 : long connected_timestamp;
68 : } connected;
69 : };
70 :
71 : int so_sndbuf;
72 : int sockfd;
73 :
74 : char server_fqdn[ 256 ]; /* cstr */
75 : ulong server_fqdn_len;
76 : uint server_ip4_addr;
77 : ushort server_tcp_port;
78 :
79 : fd_rng_t * rng;
80 : fd_circq_t * circq;
81 : fd_keyguard_client_t * keyguard_client;
82 :
83 : fd_event_client_metrics_t metrics;
84 : };
85 :
86 : FD_FN_CONST ulong
87 0 : fd_event_client_align( void ) {
88 0 : return alignof( fd_event_client_t );
89 0 : }
90 :
91 : FD_FN_CONST ulong
92 0 : fd_event_client_footprint( ulong buf_max ) {
93 0 : ulong l;
94 0 : l = FD_LAYOUT_INIT;
95 0 : l = FD_LAYOUT_APPEND( l, alignof(fd_event_client_t), sizeof(fd_event_client_t) );
96 0 : l = FD_LAYOUT_APPEND( l, fd_grpc_client_align(), fd_grpc_client_footprint( buf_max ) );
97 0 : return FD_LAYOUT_FINI( l, alignof(fd_event_client_t) );
98 0 : }
99 :
100 : void *
101 : fd_event_client_new( void * shmem,
102 : fd_keyguard_client_t * keyguard_client,
103 : fd_rng_t * rng,
104 : fd_circq_t * circq,
105 : int so_sndbuf,
106 : char const * _url,
107 : uchar const * identity_pubkey,
108 : char const * client_version,
109 : ulong instance_id,
110 : ulong boot_id,
111 : ulong machine_id,
112 0 : ulong buf_max ) {
113 0 : if( FD_UNLIKELY( !shmem ) ) {
114 0 : FD_LOG_WARNING(( "NULL shmem" ));
115 0 : return NULL;
116 0 : }
117 :
118 0 : if( FD_UNLIKELY( !fd_ulong_is_aligned( (ulong)shmem, fd_event_client_align() ) ) ) {
119 0 : FD_LOG_WARNING(( "misaligned shmem" ));
120 0 : return NULL;
121 0 : }
122 :
123 0 : FD_SCRATCH_ALLOC_INIT( l, shmem );
124 0 : fd_event_client_t * client = FD_SCRATCH_ALLOC_APPEND( l, alignof(fd_event_client_t), sizeof(fd_event_client_t) );
125 0 : void * grpc_client_mem = FD_SCRATCH_ALLOC_APPEND( l, fd_grpc_client_align(), fd_grpc_client_footprint( buf_max ) );
126 :
127 0 : fd_url_t url[1];
128 0 : _Bool _is_ssl = 0;
129 0 : if( FD_UNLIKELY( fd_url_parse_endpoint( url,
130 0 : _url,
131 0 : strlen( _url ),
132 0 : &client->server_tcp_port,
133 0 : &_is_ssl,
134 0 : "[tiles.event.url]" ) ) ) {
135 0 : FD_LOG_ERR(( "Could not parse [tiles.event.url]" ));
136 0 : }
137 0 : if( FD_UNLIKELY( url->host_len > 255 ) ) {
138 0 : FD_LOG_CRIT(( "Invalid url->host_len" )); /* unreachable */
139 0 : }
140 0 : fd_cstr_fini( fd_cstr_append_text( fd_cstr_init( client->server_fqdn ), url->host, url->host_len ) );
141 0 : client->server_fqdn_len = url->host_len;
142 :
143 0 : fd_memcpy( client->identity_pubkey, identity_pubkey, 32UL );
144 0 : strncpy( client->client_version, client_version, sizeof( client->client_version ) );
145 0 : client->client_version[ sizeof( client->client_version ) - 1UL ] = '\0';
146 :
147 0 : client->event_id = 0UL;
148 :
149 0 : client->instance_id = instance_id;
150 0 : client->boot_id = boot_id;
151 0 : client->machine_id = machine_id;
152 :
153 0 : client->has_genesis_hash = 0;
154 0 : client->has_shred_version = 0;
155 :
156 0 : client->so_sndbuf = so_sndbuf;
157 0 : client->sockfd = -1;
158 0 : client->state = FD_EVENT_CLIENT_STATE_DISCONNECTED;
159 0 : client->disconnected.reconnect_deadline = 0L;
160 :
161 0 : client->defer_disconnect = INT_MAX;
162 0 : client->consecutive_failure_count = 7UL; /* Start high, so if server is down we don't keep retrying on boot */
163 :
164 0 : client->circq = circq;
165 0 : client->rng = rng;
166 0 : client->keyguard_client = keyguard_client;
167 :
168 0 : extern fd_grpc_client_callbacks_t fd_event_client_grpc_callbacks;
169 0 : client->grpc_client = fd_grpc_client_new( grpc_client_mem, &fd_event_client_grpc_callbacks, client->grpc_metrics, client, buf_max, fd_rng_ulong( rng ) );
170 0 : FD_TEST( client->grpc_client );
171 :
172 0 : memset( &client->metrics, 0, sizeof(client->metrics) );
173 0 : memset( client->grpc_metrics, 0, sizeof(fd_grpc_client_metrics_t) );
174 :
175 0 : fd_grpc_client_set_version( client->grpc_client, client->client_version, strlen( client->client_version ) );
176 0 : fd_grpc_client_set_authority( client->grpc_client, client->server_fqdn, client->server_fqdn_len, client->server_tcp_port );
177 :
178 0 : return (void *)client;
179 0 : }
180 :
181 : fd_event_client_t *
182 0 : fd_event_client_join( void * shec ) {
183 0 : if( FD_UNLIKELY( !shec ) ) {
184 0 : FD_LOG_WARNING(( "NULL shec" ));
185 0 : return NULL;
186 0 : }
187 :
188 0 : if( FD_UNLIKELY( !fd_ulong_is_aligned( (ulong)shec, fd_event_client_align() ) ) ) {
189 0 : FD_LOG_WARNING(( "misaligned shec" ));
190 0 : return NULL;
191 0 : }
192 :
193 0 : fd_event_client_t * client = (fd_event_client_t *)shec;
194 :
195 0 : return client;
196 0 : }
197 :
198 : fd_event_client_metrics_t const *
199 0 : fd_event_client_metrics( fd_event_client_t const * client ) {
200 : /* Update bytes from grpc metrics */
201 0 : ((fd_event_client_t *)client)->metrics.bytes_written = client->grpc_metrics->stream_chunks_tx_bytes;
202 0 : ((fd_event_client_t *)client)->metrics.bytes_read = client->grpc_metrics->stream_chunks_rx_bytes;
203 0 : return &client->metrics;
204 0 : }
205 :
206 : ulong
207 0 : fd_event_client_state( fd_event_client_t const * client ) {
208 0 : return client->state;
209 0 : }
210 :
211 : ulong
212 0 : fd_event_client_id_reserve( fd_event_client_t * client ) {
213 0 : return client->event_id++;
214 0 : }
215 :
216 : void
217 : fd_event_client_init_genesis( fd_event_client_t * client,
218 0 : fd_genesis_meta_t const * meta ) {
219 0 : *client->genesis_hash = meta->genesis_hash;
220 0 : client->has_genesis_hash = 1;
221 0 : }
222 :
223 : void
224 : fd_event_client_init_shred_version( fd_event_client_t * client,
225 0 : ushort shred_version ) {
226 0 : client->shred_version = shred_version;
227 0 : client->has_shred_version = 1;
228 0 : }
229 :
230 : static void
231 0 : backoff( fd_event_client_t * client ) {
232 0 : long now = fd_log_wallclock();
233 0 : ulong backoff_base = 1UL << fd_ulong_min( client->consecutive_failure_count, 7UL ); /* max 4 mins */
234 0 : ulong backoff_jitter = fd_rng_ulong_roll( client->rng, backoff_base );
235 0 : client->disconnected.reconnect_deadline = now + (long)( backoff_base + backoff_jitter )*(long)1e9;
236 0 : client->consecutive_failure_count++;
237 0 : }
238 :
239 : static void
240 : disconnect( fd_event_client_t * client,
241 : int reason,
242 : int err,
243 0 : int _backoff ) {
244 0 : if( FD_LIKELY( -1!=client->sockfd ) ) {
245 0 : if( FD_UNLIKELY( -1==close( client->sockfd ) ) ) FD_LOG_ERR(( "close() failed (%d-%s)", errno, fd_io_strerror( errno ) ));
246 0 : client->sockfd = -1;
247 0 : client->state = FD_EVENT_CLIENT_STATE_DISCONNECTED;
248 0 : fd_circq_reset_cursor( client->circq );
249 0 : }
250 :
251 0 : switch( reason ) {
252 0 : case DISCONNECT_REASON_IDENTITY_CHANGED:
253 0 : FD_LOG_INFO(( "disconnected: identity changed" ));
254 0 : break;
255 0 : case DISCONNECT_REASON_CONNECT_FAILED:
256 0 : FD_LOG_WARNING(( "connecting to " FD_IP4_ADDR_FMT ":%u failed (%i-%s)", FD_IP4_ADDR_FMT_ARGS( client->server_ip4_addr ), client->server_tcp_port, errno, fd_io_strerror( errno ) ));
257 0 : client->metrics.transport_fail_cnt++;
258 0 : break;
259 0 : case DISCONNECT_REASON_DNS_RESOLVE_FAILED:
260 0 : FD_LOG_WARNING(( "failed to resolve host `%.*s` (%d-%s)", (int)client->server_fqdn_len, client->server_fqdn, err, fd_gai_strerror( err ) ));
261 0 : client->metrics.transport_fail_cnt++;
262 0 : break;
263 0 : case DISCONNECT_REASON_TIMEOUT:
264 0 : FD_LOG_INFO(( "connection failed: timeout" ));
265 0 : client->metrics.transport_fail_cnt++;
266 0 : break;
267 0 : case DISCONNECT_REASON_TRANSPORT_FAILED:
268 0 : FD_LOG_WARNING(( "disconnected: transport failed (%d-%s)", err, fd_io_strerror( err ) ));
269 0 : client->metrics.transport_fail_cnt++;
270 0 : break;
271 0 : case DISCONNECT_REASON_PEER_CLOSED:
272 0 : FD_LOG_WARNING(( "disconnected: peer closed connection" ));
273 0 : client->metrics.transport_fail_cnt++;
274 0 : break;
275 0 : case DISCONNECT_REASON_INVALID_CURSOR:
276 0 : FD_LOG_WARNING(( "disconnected: invalid cursor" ));
277 0 : client->metrics.transport_fail_cnt++;
278 0 : break;
279 0 : case DISCONNECT_REASON_AUTH_FAILED:
280 0 : FD_LOG_WARNING(( "disconnected: authentication failed" ));
281 0 : client->metrics.transport_fail_cnt++;
282 0 : break;
283 0 : default:
284 0 : FD_LOG_WARNING(( "disconnected: unknown reason %d", reason ));
285 0 : client->metrics.transport_fail_cnt++;
286 0 : break;
287 0 : }
288 :
289 0 : if( FD_LIKELY( _backoff ) ) backoff( client );
290 0 : }
291 :
292 : void
293 : fd_event_client_set_identity( fd_event_client_t * client,
294 0 : uchar const * identity_pubkey ) {
295 0 : fd_memcpy( client->identity_pubkey, identity_pubkey, 32UL );
296 0 : disconnect( client, DISCONNECT_REASON_IDENTITY_CHANGED, 0, 0 );
297 0 : }
298 :
299 : static void
300 : reconnect( fd_event_client_t * client,
301 0 : int * charge_busy ) {
302 0 : FD_TEST( client->state==FD_EVENT_CLIENT_STATE_DISCONNECTED );
303 :
304 0 : long now = fd_log_wallclock();
305 0 : if( FD_UNLIKELY( now<client->disconnected.reconnect_deadline ) ) return;
306 :
307 0 : *charge_busy = 1;
308 :
309 0 : FD_LOG_INFO(( "connecting to event server http://%.*s:%u", (int)client->server_fqdn_len, client->server_fqdn, client->server_tcp_port ));
310 :
311 : /* FIXME IPv6 support */
312 0 : fd_addrinfo_t hints = {0};
313 0 : hints.ai_family = AF_INET;
314 0 : fd_addrinfo_t * res = NULL;
315 0 : uchar scratch[ 4096 ];
316 0 : void * pscratch = scratch;
317 0 : int err = fd_getaddrinfo( client->server_fqdn, &hints, &res, &pscratch, sizeof(scratch) );
318 0 : if( FD_UNLIKELY( err ) ) {
319 0 : disconnect( client, DISCONNECT_REASON_DNS_RESOLVE_FAILED, err, 1 );
320 0 : return;
321 0 : }
322 :
323 0 : uint const ip4_addr = ((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr;
324 0 : client->server_ip4_addr = ip4_addr;
325 :
326 0 : client->sockfd = socket( AF_INET, SOCK_STREAM|SOCK_NONBLOCK, 0 );
327 0 : if( FD_UNLIKELY( -1==client->sockfd ) ) FD_LOG_ERR(( "socket() failed (%d-%s)", errno, fd_io_strerror( errno ) ));
328 :
329 0 : struct sockaddr_in addr;
330 0 : fd_memset( &addr, 0, sizeof( addr ) );
331 0 : addr.sin_family = AF_INET;
332 0 : addr.sin_port = fd_ushort_bswap( client->server_tcp_port );
333 0 : addr.sin_addr.s_addr = ip4_addr;
334 :
335 0 : int tcp_nodelay = 1;
336 0 : if( FD_UNLIKELY( -1==setsockopt( client->sockfd, SOL_TCP, TCP_NODELAY, &tcp_nodelay, sizeof(int) ) ) ) FD_LOG_ERR(( "setsockopt failed (%d-%s)", errno, fd_io_strerror( errno ) ));
337 0 : if( FD_UNLIKELY( -1==setsockopt( client->sockfd, SOL_SOCKET, SO_SNDBUF, &client->so_sndbuf, sizeof(int) ) ) ) FD_LOG_ERR(( "setsockopt(SOL_SOCKET,SO_SNDBUF,%i) failed (%i-%s)", client->so_sndbuf, errno, fd_io_strerror( errno ) ));
338 :
339 0 : if( FD_UNLIKELY( -1==connect( client->sockfd, fd_type_pun_const( &addr ), sizeof(struct sockaddr_in) ) && errno!=EINPROGRESS ) ) {
340 0 : disconnect( client, DISCONNECT_REASON_CONNECT_FAILED, errno, 1 );
341 0 : return;
342 0 : }
343 :
344 0 : fd_grpc_client_reset( client->grpc_client );
345 :
346 0 : client->state = FD_EVENT_CLIENT_STATE_CONNECTING;
347 0 : client->connecting.connect_deadline = now+(long)1L*(long)1e9; /* 1 second to connect */
348 0 : }
349 :
350 : static void
351 0 : fd_event_client_grpc_conn_established( void * app_ctx ) {
352 0 : fd_event_client_t * client = app_ctx;
353 :
354 0 : fd_pb_encoder_t auth_req[1];
355 0 : uchar buffer[ 256UL ];
356 0 : fd_pb_encoder_init( auth_req, buffer, sizeof(buffer) );
357 :
358 0 : fd_pb_push_bytes( auth_req, 1U, client->identity_pubkey, 32UL );
359 0 : fd_pb_push_string( auth_req, 2U, client->client_version, strlen( client->client_version ) );
360 0 : fd_pb_push_bytes( auth_req, 3U, client->genesis_hash, 32UL );
361 0 : fd_pb_push_uint64( auth_req, 4U, client->shred_version );
362 0 : fd_pb_push_uint64( auth_req, 5U, client->instance_id );
363 0 : fd_pb_push_uint64( auth_req, 6U, client->machine_id );
364 0 : fd_pb_push_uint64( auth_req, 7U, client->boot_id );
365 :
366 0 : fd_grpc_h2_stream_t * stream = fd_grpc_client_request_start1(
367 0 : client->grpc_client,
368 0 : "/events.v1.EventService/Authenticate", strlen("/events.v1.EventService/Authenticate"),
369 0 : FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE,
370 0 : buffer, fd_pb_encoder_out_sz( auth_req ),
371 0 : NULL, 0UL,
372 0 : 0 /* not streaming */ );
373 :
374 0 : if( FD_UNLIKELY( !stream ) ) {
375 0 : FD_LOG_WARNING(( "Failed to start Authenticate request" ));
376 0 : return;
377 0 : }
378 :
379 0 : client->state = FD_EVENT_CLIENT_STATE_AUTHENTICATING;
380 0 : FD_LOG_INFO(( "Requesting auth challenge from event server " FD_IP4_ADDR_FMT ":%u (%.*s)",
381 0 : FD_IP4_ADDR_FMT_ARGS( client->server_ip4_addr ), client->server_tcp_port,
382 0 : (int)client->server_fqdn_len, client->server_fqdn ));
383 0 : }
384 :
385 : static void
386 : fd_event_client_handle_auth_challenge_resp( fd_event_client_t * client,
387 : void const * protobuf,
388 0 : ulong protobuf_sz ) {
389 0 : fd_pb_inbuf_t inbuf[1];
390 0 : fd_pb_inbuf_init( inbuf, protobuf, protobuf_sz );
391 :
392 0 : if( FD_UNLIKELY( protobuf_sz==0UL ) ) {
393 0 : FD_LOG_WARNING(( "Empty auth challenge response" ));
394 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
395 0 : return;
396 0 : }
397 :
398 0 : fd_pb_tlv_t challenge_tlv;
399 0 : if( FD_UNLIKELY( !fd_pb_read_tlv( inbuf, &challenge_tlv ) ) ) {
400 0 : FD_LOG_WARNING(( "Failed to parse auth challenge response" ));
401 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
402 0 : return;
403 0 : }
404 :
405 0 : if( FD_UNLIKELY( challenge_tlv.field_id!=1U || challenge_tlv.wire_type!=FD_PB_WIRE_TYPE_LEN ) ) {
406 0 : FD_LOG_WARNING(( "Unexpected field in auth challenge response" ));
407 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
408 0 : return;
409 0 : }
410 :
411 0 : ulong challenge_len = challenge_tlv.len;
412 0 : if( FD_UNLIKELY( challenge_len!=32UL ) ) {
413 0 : FD_LOG_WARNING(( "Invalid challenge size: %lu bytes", challenge_len ));
414 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
415 0 : return;
416 0 : }
417 :
418 0 : if( FD_UNLIKELY( fd_pb_inbuf_sz( inbuf )<challenge_len ) ) {
419 0 : FD_LOG_WARNING(( "Truncated auth challenge response" ));
420 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
421 0 : return;
422 0 : }
423 :
424 0 : uchar signed_challenge[ 64UL ];
425 0 : fd_keyguard_client_sign( client->keyguard_client,
426 0 : signed_challenge,
427 0 : inbuf->cur,
428 0 : 32UL,
429 0 : FD_KEYGUARD_SIGN_TYPE_FD_EVENTS_AUTH_CONCAT_ED25519 );
430 :
431 0 : fd_pb_encoder_t confirm_req[1];
432 0 : uchar buffer[ 128UL ];
433 0 : fd_pb_encoder_init( confirm_req, buffer, sizeof(buffer) );
434 0 : fd_pb_push_bytes( confirm_req, 1U, signed_challenge, 64UL );
435 :
436 0 : fd_grpc_h2_stream_t * stream = fd_grpc_client_request_start1(
437 0 : client->grpc_client,
438 0 : "/events.v1.EventService/ConfirmAuthChallenge", strlen("/events.v1.EventService/ConfirmAuthChallenge"),
439 0 : FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH,
440 0 : buffer, fd_pb_encoder_out_sz( confirm_req ),
441 0 : NULL, 0UL,
442 0 : 0 /* not streaming */ );
443 :
444 0 : if( FD_UNLIKELY( !stream ) ) {
445 0 : FD_LOG_WARNING(( "Failed to start ConfirmAuthChallenge request" ));
446 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
447 0 : return;
448 0 : }
449 :
450 0 : client->state = FD_EVENT_CLIENT_STATE_CONFIRMING_AUTH;
451 0 : FD_LOG_DEBUG(( "Sent signed auth challenge" ));
452 0 : }
453 :
454 : static void
455 : fd_event_client_handle_confirm_auth_resp( fd_event_client_t * client,
456 : void const * protobuf,
457 0 : ulong protobuf_sz ) {
458 0 : (void)protobuf;
459 0 : (void)protobuf_sz;
460 :
461 0 : client->event_stream = NULL;
462 0 : client->metrics.transport_success_cnt++;
463 0 : client->state = FD_EVENT_CLIENT_STATE_CONNECTED;
464 0 : client->connected.connected_timestamp = fd_log_wallclock();
465 0 : FD_LOG_NOTICE(( "connected to event server " FD_IP4_ADDR_FMT ":%u (%.*s)",
466 0 : FD_IP4_ADDR_FMT_ARGS( client->server_ip4_addr ), client->server_tcp_port,
467 0 : (int)client->server_fqdn_len, client->server_fqdn ));
468 0 : }
469 :
470 : static void
471 : fd_event_client_grpc_conn_dead( void * app_ctx,
472 : uint h2_err,
473 0 : int closed_by ) {
474 0 : fd_event_client_t * client = app_ctx;
475 0 : FD_LOG_WARNING(( "Event gRPC connection closed %s (%u-%s)",
476 0 : closed_by ? "by peer" : "due to error",
477 0 : h2_err, fd_h2_strerror( h2_err ) ));
478 0 : disconnect( client, DISCONNECT_REASON_PEER_CLOSED, 0, 1 );
479 0 : }
480 :
481 : static void
482 : fd_event_client_grpc_tx_complete( void * app_ctx,
483 0 : ulong request_ctx ) {
484 0 : (void)app_ctx; (void)request_ctx;
485 0 : }
486 :
487 : void
488 : fd_event_client_grpc_rx_start( void * app_ctx,
489 0 : ulong request_ctx ) {
490 0 : (void)app_ctx; (void)request_ctx;
491 0 : }
492 :
493 : static void
494 : fd_event_client_handle_stream_events_resp( fd_event_client_t * client,
495 : void const * protobuf,
496 0 : ulong protobuf_sz ) {
497 0 : fd_pb_inbuf_t inbuf[1];
498 0 : fd_pb_inbuf_init( inbuf, protobuf, protobuf_sz );
499 :
500 0 : ulong nonce_ack;
501 0 : if( FD_UNLIKELY( protobuf_sz==0UL ) ) {
502 0 : nonce_ack = 0UL;
503 0 : } else {
504 0 : fd_pb_tlv_t event_id;
505 0 : FD_TEST( fd_pb_read_tlv( inbuf, &event_id ) );
506 0 : FD_TEST( event_id.field_id==1U ); /* event_id */
507 0 : FD_TEST( event_id.wire_type==FD_PB_WIRE_TYPE_VARINT );
508 0 : nonce_ack = event_id.varint;
509 0 : }
510 :
511 0 : client->metrics.events_acked++;
512 0 : if( FD_UNLIKELY( nonce_ack==ULONG_MAX ) ) return;
513 :
514 0 : int err = fd_circq_pop_until( client->circq, nonce_ack );
515 0 : if( FD_UNLIKELY( -1==err ) ) {
516 0 : FD_LOG_WARNING(( "Event gRPC rx msg: invalid cursor ack %lu", nonce_ack ));
517 0 : client->defer_disconnect = DISCONNECT_REASON_INVALID_CURSOR;
518 0 : }
519 0 : }
520 :
521 : void
522 : fd_event_client_grpc_rx_msg( void * app_ctx,
523 : void const * protobuf,
524 : ulong protobuf_sz,
525 0 : ulong request_ctx ) {
526 0 : fd_event_client_t * client = app_ctx;
527 :
528 0 : switch( request_ctx ) {
529 0 : case FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE:
530 0 : fd_event_client_handle_auth_challenge_resp( client, protobuf, protobuf_sz );
531 0 : break;
532 0 : case FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH:
533 0 : fd_event_client_handle_confirm_auth_resp( client, protobuf, protobuf_sz );
534 0 : break;
535 0 : case FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS:
536 0 : fd_event_client_handle_stream_events_resp( client, protobuf, protobuf_sz );
537 0 : break;
538 0 : default:
539 0 : FD_LOG_WARNING(( "Unknown request_ctx: %lu", request_ctx ));
540 0 : break;
541 0 : }
542 0 : }
543 :
544 : void
545 : fd_event_client_grpc_rx_end( void * app_ctx,
546 : ulong request_ctx,
547 0 : fd_grpc_resp_hdrs_t * resp ) {
548 0 : fd_event_client_t * client = app_ctx;
549 :
550 0 : if( FD_UNLIKELY( resp->h2_status!=200 ) ) {
551 0 : FD_LOG_WARNING(( "Event gRPC request failed (HTTP status %u)", resp->h2_status ));
552 0 : client->defer_disconnect = DISCONNECT_REASON_TRANSPORT_FAILED;
553 0 : return;
554 0 : }
555 :
556 0 : resp->grpc_msg_len = (uint)fd_url_unescape( resp->grpc_msg, resp->grpc_msg_len );
557 0 : if( !resp->grpc_msg_len ) {
558 0 : fd_memcpy( resp->grpc_msg, "unknown error", 13 );
559 0 : resp->grpc_msg_len = 13;
560 0 : }
561 :
562 0 : if( FD_UNLIKELY( resp->grpc_status!=FD_GRPC_STATUS_OK ) ) {
563 0 : switch( request_ctx ) {
564 0 : case FD_EVENT_CLIENT_REQ_CTX_AUTHENTICATE:
565 0 : case FD_EVENT_CLIENT_REQ_CTX_CONFIRM_AUTH:
566 0 : FD_LOG_WARNING(( "Event authentication failed (gRPC status %u-%s): %.*s",
567 0 : resp->grpc_status, fd_grpc_status_cstr( resp->grpc_status ),
568 0 : (int)resp->grpc_msg_len, resp->grpc_msg ));
569 0 : client->defer_disconnect = DISCONNECT_REASON_AUTH_FAILED;
570 0 : return;
571 0 : case FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS:
572 0 : FD_LOG_WARNING(( "Event stream failed (gRPC status %u-%s): %.*s",
573 0 : resp->grpc_status, fd_grpc_status_cstr( resp->grpc_status ),
574 0 : (int)resp->grpc_msg_len, resp->grpc_msg ));
575 0 : client->defer_disconnect = DISCONNECT_REASON_PEER_CLOSED;
576 0 : return;
577 0 : default:
578 0 : FD_LOG_WARNING(( "Event gRPC request failed (gRPC status %u-%s): %.*s",
579 0 : resp->grpc_status, fd_grpc_status_cstr( resp->grpc_status ),
580 0 : (int)resp->grpc_msg_len, resp->grpc_msg ));
581 0 : client->defer_disconnect = DISCONNECT_REASON_TRANSPORT_FAILED;
582 0 : return;
583 0 : }
584 0 : }
585 :
586 0 : if( request_ctx==FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS ) {
587 0 : FD_LOG_INFO(( "Event gRPC stream ended gracefully" ));
588 0 : client->defer_disconnect = DISCONNECT_REASON_PEER_CLOSED;
589 0 : }
590 0 : }
591 :
592 : void
593 : fd_event_client_grpc_rx_timeout( void * app_ctx,
594 : ulong request_ctx,
595 0 : int deadline_kind ) {
596 0 : (void)app_ctx; (void)request_ctx; (void)deadline_kind;
597 0 : FD_LOG_WARNING(( "Event gRPC rx timeout" ));
598 0 : }
599 :
600 : static void
601 0 : fd_event_client_grpc_ping_ack( void * app_ctx ) {
602 0 : (void)app_ctx;
603 0 : FD_LOG_WARNING(( "Event gRPC ping ack" ));
604 0 : }
605 :
606 : static void
607 : tx( fd_event_client_t * client,
608 0 : int * charge_busy ) {
609 0 : FD_TEST( client->state==FD_EVENT_CLIENT_STATE_CONNECTED );
610 :
611 0 : if( FD_UNLIKELY( fd_grpc_client_request_is_blocked( client->grpc_client ) ) ) return;
612 0 : if( FD_UNLIKELY( client->event_stream && client->grpc_client->request_stream != NULL && client->grpc_client->request_stream!=client->event_stream ) ) return;
613 :
614 0 : ulong msg_sz;
615 0 : uchar const * msg = fd_circq_cursor_advance( client->circq, &msg_sz );
616 0 : if( FD_LIKELY( !msg ) ) return;
617 :
618 0 : if( FD_UNLIKELY( !client->event_stream ) ) {
619 0 : client->event_stream = fd_grpc_client_request_start1(
620 0 : client->grpc_client,
621 0 : "/events.v1.EventService/StreamEvents", strlen("/events.v1.EventService/StreamEvents"),
622 0 : FD_EVENT_CLIENT_REQ_CTX_STREAM_EVENTS,
623 0 : msg, msg_sz,
624 0 : NULL, 0UL,
625 0 : 1 /* streaming */ );
626 0 : if( FD_UNLIKELY( !client->event_stream ) ) return; /* Only reason for failure is too big message, so just skip it */
627 0 : } else {
628 0 : int result = fd_grpc_client_stream_send_msg1( client->grpc_client, client->event_stream, msg, msg_sz );
629 0 : if( FD_UNLIKELY( !result ) ) return; /* Only reason for failure is too big message, so just skip it */
630 0 : }
631 :
632 0 : client->metrics.events_sent++;
633 0 : *charge_busy = 1;
634 0 : }
635 :
636 : void
637 : fd_event_client_poll( fd_event_client_t * client,
638 0 : int * charge_busy ) {
639 0 : if( FD_UNLIKELY( !client->has_genesis_hash || !client->has_shred_version ) ) return;
640 :
641 0 : long now = fd_log_wallclock();
642 :
643 0 : if( FD_UNLIKELY( client->state==FD_EVENT_CLIENT_STATE_DISCONNECTED ) ) reconnect( client, charge_busy );
644 0 : if( FD_UNLIKELY( client->state==FD_EVENT_CLIENT_STATE_CONNECTING ) ) {
645 0 : if( FD_UNLIKELY( now>client->connecting.connect_deadline ) ) {
646 0 : disconnect( client, DISCONNECT_REASON_TIMEOUT, 0, 1 );
647 0 : return;
648 0 : }
649 0 : }
650 0 : if( FD_LIKELY( client->state!=FD_EVENT_CLIENT_STATE_DISCONNECTED ) ) {
651 0 : if( FD_UNLIKELY( -1==fd_grpc_client_rxtx_socket( client->grpc_client, client->sockfd, charge_busy ) ) ) {
652 0 : disconnect( client, DISCONNECT_REASON_TRANSPORT_FAILED, errno, 1 );
653 0 : return;
654 0 : }
655 0 : }
656 :
657 0 : if( FD_UNLIKELY( client->defer_disconnect!=INT_MAX ) ) {
658 0 : int reason = client->defer_disconnect;
659 0 : client->defer_disconnect = INT_MAX;
660 0 : disconnect( client, reason, 0, 1 );
661 0 : return;
662 0 : }
663 :
664 0 : if( FD_LIKELY( client->state==FD_EVENT_CLIENT_STATE_CONNECTED ) ) {
665 0 : if( FD_UNLIKELY( client->consecutive_failure_count && (now-client->connected.connected_timestamp>10L*(long)1e9 ) ) ) client->consecutive_failure_count = 0UL;
666 0 : tx( client, charge_busy );
667 0 : }
668 0 : }
669 :
670 : fd_grpc_client_callbacks_t fd_event_client_grpc_callbacks = {
671 : .conn_established = fd_event_client_grpc_conn_established,
672 : .conn_dead = fd_event_client_grpc_conn_dead,
673 : .tx_complete = fd_event_client_grpc_tx_complete,
674 : .rx_start = fd_event_client_grpc_rx_start,
675 : .rx_msg = fd_event_client_grpc_rx_msg,
676 : .rx_end = fd_event_client_grpc_rx_end,
677 : .rx_timeout = fd_event_client_grpc_rx_timeout,
678 : .ping_ack = fd_event_client_grpc_ping_ack,
679 : };
|