Skip to content

Commit

Permalink
review comments
Browse files Browse the repository at this point in the history
  • Loading branch information
hansieodendaal committed May 17, 2024
1 parent c0d08f3 commit 4128be0
Show file tree
Hide file tree
Showing 5 changed files with 69 additions and 69 deletions.
55 changes: 9 additions & 46 deletions comms/core/src/protocol/rpc/client/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,6 @@ use crate::{
RpcError,
RpcServerError,
RpcStatus,
RPC_CHUNKING_MAX_CHUNKS,
},
ProtocolId,
},
Expand Down Expand Up @@ -932,53 +931,17 @@ where TSubstream: AsyncRead + AsyncWrite + Unpin

pub async fn read_response(&mut self) -> Result<proto::rpc::RpcResponse, RpcError> {
let timer = Instant::now();
let mut resp = self.next().await?;
let resp = self.next().await?;
self.time_to_first_msg = Some(timer.elapsed());
self.check_response(&resp)?;
let mut chunk_count = 1;
let mut last_chunk_flags =
RpcMessageFlags::from_bits(u8::try_from(resp.flags).map_err(|_| {
RpcStatus::protocol_error(&format!("invalid message flag: must be less than {}", u8::MAX))
})?)
.ok_or(RpcStatus::protocol_error(&format!(
"invalid message flag, does not match any flags ({})",
resp.flags
)))?;
let mut last_chunk_size = resp.payload.len();
self.bytes_read += last_chunk_size;
loop {
trace!(
target: LOG_TARGET,
"Chunk {} received (flags={:?}, {} bytes, {} total)",
chunk_count,
last_chunk_flags,
last_chunk_size,
resp.payload.len()
);
if !last_chunk_flags.is_more() {
return Ok(resp);
}

if chunk_count >= RPC_CHUNKING_MAX_CHUNKS {
return Err(RpcError::RemotePeerExceededMaxChunkCount {
expected: RPC_CHUNKING_MAX_CHUNKS,
});
}

let msg = self.next().await?;
last_chunk_flags = RpcMessageFlags::from_bits(u8::try_from(msg.flags).map_err(|_| {
RpcStatus::protocol_error(&format!("invalid message flag: must be less than {}", u8::MAX))
})?)
.ok_or(RpcStatus::protocol_error(&format!(
"invalid message flag, does not match any flags ({})",
resp.flags
)))?;
last_chunk_size = msg.payload.len();
self.bytes_read += last_chunk_size;
self.check_response(&resp)?;
resp.payload.extend(msg.payload);
chunk_count += 1;
}
self.bytes_read = resp.payload.len();
trace!(
target: LOG_TARGET,
"Received {} bytes in {:.2?}",
resp.payload.len(),
self.time_to_first_msg.unwrap_or_default()
);
Ok(resp)
}

pub async fn read_ack(&mut self) -> Result<proto::rpc::RpcResponse, RpcError> {
Expand Down
49 changes: 38 additions & 11 deletions comms/core/src/protocol/rpc/message.rs
Original file line number Diff line number Diff line change
Expand Up @@ -24,19 +24,24 @@ use std::{convert::TryFrom, fmt, time::Duration};

use bitflags::bitflags;
use bytes::Bytes;
use log::warn;

use super::RpcError;
use crate::{
proto,
proto::rpc::rpc_session_reply::SessionResult,
protocol::rpc::{
body::{Body, IntoBody},
context::RequestContext,
error::HandshakeRejectReason,
RpcStatusCode,
protocol::{
rpc,
rpc::{
body::{Body, IntoBody},
context::RequestContext,
error::HandshakeRejectReason,
RpcStatusCode,
},
},
};

const LOG_TARGET: &str = "comms::rpc::message";
#[derive(Debug)]
pub struct Request<T> {
pub(super) context: Option<RequestContext>,
Expand Down Expand Up @@ -203,8 +208,6 @@ bitflags! {
const FIN = 0x01;
/// Typically sent with empty contents and used to confirm a substream is alive.
const ACK = 0x02;
/// Another chunk to be received
const MORE = 0x04;
}
}
impl RpcMessageFlags {
Expand All @@ -215,10 +218,6 @@ impl RpcMessageFlags {
pub fn is_ack(self) -> bool {
self.contains(Self::ACK)
}

pub fn is_more(self) -> bool {
self.contains(Self::MORE)
}
}

impl Default for RpcMessageFlags {
Expand Down Expand Up @@ -267,6 +266,34 @@ pub struct RpcResponse {
pub payload: Bytes,
}

impl RpcResponse {
pub fn to_proto(&self) -> proto::rpc::RpcResponse {
proto::rpc::RpcResponse {
request_id: self.request_id,
status: self.status as u32,
flags: self.flags.bits().into(),
payload: self.payload.to_vec(),
}
}

pub fn exceeded_message_size(&mut self) -> RpcResponse {
const BYTES_PER_MB: f32 = 1024.0 * 1024.0;
// Precision loss is acceptable because this is for display purposes only
let msg = format!(
"The response size exceeded the maximum allowed payload size. Max = {:.4} MiB, Got = {:.4} MiB",
rpc::max_response_payload_size() as f32 / BYTES_PER_MB,
self.payload.len() as f32 / BYTES_PER_MB,
);
warn!(target: LOG_TARGET, "{}", msg);
RpcResponse {
request_id: self.request_id,
status: RpcStatusCode::MalformedResponse,
flags: RpcMessageFlags::FIN,
payload: msg.into_bytes().into(),
}
}
}

impl Default for RpcResponse {
fn default() -> Self {
Self {
Expand Down
15 changes: 13 additions & 2 deletions comms/core/src/protocol/rpc/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -31,14 +31,25 @@ mod test;
/// Maximum frame size of each RPC message. This is enforced in tokio's length delimited codec.
/// This can be thought of as the hard limit on message size.
pub const RPC_MAX_FRAME_SIZE: usize = 3 * 1024 * 1024; // 3 MiB
/// Maximum number of chunks into which a message can be broken up.
const RPC_CHUNKING_MAX_CHUNKS: usize = 16; // 16 x 256 Kib = 4 MiB max combined message size
/// The maximum size for a single RPC response message
pub const RPC_MAX_RESPONSE_SIZE: usize = 4 * 1024 * 1024; // 4 MiB

/// The maximum request payload size
const fn max_request_size() -> usize {
RPC_MAX_FRAME_SIZE
}

/// The maximum size for a single RPC response excluding overhead
const fn max_response_payload_size() -> usize {
// RpcResponse overhead is:
// - 4 varint protobuf fields, each field ID is 1 byte
// - 3 u32 fields, VarInt(u32::MAX) is 5 bytes
// - 1 length varint for the payload, allow for 5 bytes to be safe (max_payload_size being technically too small is
// fine, being too large isn't)
const MAX_HEADER_SIZE: usize = 4 + 4 * 5;
RPC_MAX_RESPONSE_SIZE - MAX_HEADER_SIZE
}

mod body;
pub use body::{Body, ClientStreaming, IntoBody, Streaming};

Expand Down
13 changes: 6 additions & 7 deletions comms/core/src/protocol/rpc/server/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,7 @@ use crate::{
peer_manager::NodeId,
proto,
protocol::{
rpc,
rpc::{
body::BodyBytes,
message::{RpcMethod, RpcResponse},
Expand Down Expand Up @@ -748,17 +749,15 @@ where
let mut stream = body
.into_message()
.map(|result| into_response(request_id, result))
.map(move |message| {
.map(move |mut message| {
if message.payload.len() > rpc::max_response_payload_size() {
message.exceeded_message_size();
}
#[cfg(feature = "metrics")]
if !message.status.is_ok() {
metrics::status_error_counter(&node_id, &protocol, message.status).inc();
}
proto::rpc::RpcResponse {
request_id,
status: message.status.as_u32(),
flags: message.flags.bits().into(),
payload: message.payload.to_vec(),
}
message.to_proto()
})
.map(|resp| Bytes::from(resp.to_encoded_bytes()));

Expand Down
6 changes: 3 additions & 3 deletions comms/core/src/protocol/rpc/test/smoke.rs
Original file line number Diff line number Diff line change
Expand Up @@ -282,7 +282,7 @@ async fn response_too_big() {
let (_inbound, outbound, _, _, _shutdown) = setup(GreetingService::new(&[]), 1).await;
let socket = outbound.get_yamux_control().open_stream().await.unwrap();

let framed = framing::canonical(socket, rpc::RPC_MAX_FRAME_SIZE);
let framed = framing::canonical(socket, rpc::RPC_MAX_RESPONSE_SIZE);
let mut client = GreetingClient::builder()
.with_deadline(Duration::from_secs(5))
.connect(framed)
Expand All @@ -291,15 +291,15 @@ async fn response_too_big() {

// RPC_MAX_FRAME_SIZE bytes will always be too large because of the overhead of the RpcResponse proto message
let err = client
.reply_with_msg_of_size(rpc::RPC_MAX_FRAME_SIZE as u64 + 1)
.reply_with_msg_of_size(rpc::max_response_payload_size() as u64 + 1)
.await
.unwrap_err();
unpack_enum!(RpcError::RequestFailed(status) = err);
unpack_enum!(RpcStatusCode::MalformedResponse = status.as_status_code());

// Check that the exact frame size boundary works and that the session is still going
let _string = client
.reply_with_msg_of_size(rpc::RPC_MAX_FRAME_SIZE as u64 - 9)
.reply_with_msg_of_size(rpc::max_response_payload_size() as u64 - 9)
.await
.unwrap();
}
Expand Down

0 comments on commit 4128be0

Please sign in to comment.