sui_edge_proxy/
config.rs

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
// Copyright (c) Mysten Labs, Inc.
// SPDX-License-Identifier: Apache-2.0

use anyhow::{Context, Result};
use reqwest::Client;
use serde::{Deserialize, Serialize};
use serde_with::serde_as;
use serde_with::DurationSeconds;
use std::{net::SocketAddr, time::Duration};
use tracing::error;
use url::Url;

#[serde_as]
#[derive(Clone, Debug, Deserialize, Serialize)]
#[serde(rename_all = "kebab-case")]
pub struct ProxyConfig {
    pub listen_address: SocketAddr,
    pub metrics_address: SocketAddr,
    pub execution_peer: PeerConfig,
    pub read_peer: PeerConfig,
    /// Maximum number of idle connections to keep in the connection pool.
    /// When set, this limits the number of connections that remain open but unused,
    /// helping to conserve system resources.
    #[serde(default = "default_max_idle_connections")]
    pub max_idle_connections: usize,
    /// Idle timeout for connections in the connection pool.
    /// This should be set to a value less than the keep-alive timeout of the server to avoid sending requests to a closed connection.
    /// if your you expect sui-edge-proxy to recieve a small number of requests per second, you should set this to a higher value.
    #[serde_as(as = "DurationSeconds")]
    #[serde(default = "default_idle_timeout")]
    pub idle_timeout_seconds: Duration,
    /// Logging configuration for read requests including sample rate and log file path.
    #[serde(default)]
    pub logging: LoggingConfig,
}

fn default_max_idle_connections() -> usize {
    100
}

fn default_idle_timeout() -> Duration {
    Duration::from_secs(60)
}

#[derive(Clone, Debug, Deserialize, Serialize)]
#[serde(rename_all = "kebab-case")]
pub struct PeerConfig {
    pub address: Url,
}

#[derive(Clone, Debug, Default, Deserialize, Serialize)]
#[serde(rename_all = "kebab-case")]
pub struct LoggingConfig {
    /// The sample rate for read-request logging. 0.0 = no logs;
    /// 1.0 = log all read requests.
    #[serde(default = "default_sample_rate")]
    pub read_request_sample_rate: f64,
}

fn default_sample_rate() -> f64 {
    0.0
}

/// Load and validate configuration
pub async fn load<P: AsRef<std::path::Path>>(path: P) -> Result<(ProxyConfig, Client)> {
    let path = path.as_ref();
    let config: ProxyConfig = serde_yaml::from_reader(
        std::fs::File::open(path).context(format!("cannot open {:?}", path))?,
    )?;

    // Build a reqwest client that supports HTTP/2
    let client = reqwest::ClientBuilder::new()
        .http2_prior_knowledge()
        .http2_keep_alive_while_idle(true)
        .pool_idle_timeout(config.idle_timeout_seconds)
        .pool_max_idle_per_host(config.max_idle_connections)
        .build()
        .expect("Failed to build HTTP/2 client");

    validate_peer_url(&client, &config.read_peer).await?;
    validate_peer_url(&client, &config.execution_peer).await?;

    Ok((config, client))
}

/// Validate that the given PeerConfig URL has a valid host
async fn validate_peer_url(client: &Client, peer: &PeerConfig) -> Result<()> {
    let health_url = peer
        .address
        .join("/health")
        .context("Failed to construct health check URL")?;

    const RETRY_DELAY: Duration = Duration::from_secs(1);
    const REQUEST_TIMEOUT: Duration = Duration::from_secs(5);

    let mut attempt = 1;
    loop {
        match client
            .get(health_url.clone())
            .timeout(REQUEST_TIMEOUT)
            .send()
            .await
        {
            Ok(response) => {
                if response.version() != reqwest::Version::HTTP_2 {
                    tracing::warn!(
                        "Peer {} does not support HTTP/2 (using {:?})",
                        peer.address,
                        response.version()
                    );
                }

                if !response.status().is_success() {
                    tracing::warn!(
                        "Health check failed for peer {} with status {}",
                        peer.address,
                        response.status()
                    );
                }
                return Ok(());
            }
            Err(e) => {
                error!(
                    "Failed to connect to peer {} (attempt {}): {}",
                    peer.address, attempt, e
                );
                tokio::time::sleep(RETRY_DELAY).await;
                attempt += 1;
                continue;
            }
        }
    }
}