some debugging for bootstrap and route purge

This commit is contained in:
John Smith 2023-12-12 16:13:56 -05:00 committed by Christien Rioux
parent 97a9a8d3af
commit 7129343ea1
10 changed files with 25 additions and 11 deletions

View File

@ -1096,7 +1096,7 @@ impl NetworkManager {
Ok(true)
}
pub fn debug_restart_network(&self) {
pub fn restart_network(&self) {
self.net().restart_network();
}
}

View File

@ -38,6 +38,9 @@ pub use types::*;
//////////////////////////////////////////////////////////////////////////
/// How many nodes in our routing table we require for a functional PublicInternet RoutingDomain
pub const MIN_PUBLIC_INTERNET_ROUTING_DOMAIN_NODE_COUNT: usize = 4;
/// How frequently we tick the relay management routine
pub const RELAY_MANAGEMENT_INTERVAL_SECS: u32 = 1;

View File

@ -152,6 +152,10 @@ impl RouteSpecStore {
/// Purge the route spec store
pub async fn purge(&self) -> VeilidAPIResult<()> {
// Briefly pause routing table ticker while changes are made
let _tick_guard = self.unlocked_inner.routing_table.pause_tasks().await;
self.unlocked_inner.routing_table.cancel_tasks().await;
{
let inner = &mut *self.inner.lock();
inner.content = Default::default();

View File

@ -285,7 +285,8 @@ impl RoutingTable {
{
Ok(NodeContactMethod::Direct(v)) => v,
Ok(v) => {
log_rtab!(warn "invalid contact method for bootstrap: {:?}", v);
log_rtab!(warn "invalid contact method for bootstrap, restarting network: {:?}", v);
routing_table.network_manager().restart_network();
return;
}
Err(e) => {

View File

@ -157,7 +157,7 @@ impl RoutingTable {
for ck in VALID_CRYPTO_KINDS {
let eckey = (RoutingDomain::PublicInternet, ck);
let cnt = entry_counts.get(&eckey).copied().unwrap_or_default();
if cnt == 0 {
if cnt < MIN_PUBLIC_INTERNET_ROUTING_DOMAIN_NODE_COUNT {
needs_bootstrap = true;
} else if cnt < min_peer_count {
needs_peer_minimum_refresh = true;

View File

@ -2,7 +2,6 @@ use super::*;
use futures_util::stream::{FuturesUnordered, StreamExt};
use futures_util::FutureExt;
use stop_token::future::FutureExt as StopFutureExt;
const BACKGROUND_SAFETY_ROUTE_COUNT: usize = 2;
@ -103,10 +102,10 @@ impl RoutingTable {
}
/// Test set of routes and remove the ones that don't test clean
#[instrument(level = "trace", skip(self, stop_token), err)]
#[instrument(level = "trace", skip(self, _stop_token), err)]
async fn test_route_set(
&self,
stop_token: StopToken,
_stop_token: StopToken,
routes_needing_testing: Vec<RouteId>,
) -> EyreResult<()> {
if routes_needing_testing.is_empty() {
@ -158,7 +157,7 @@ impl RoutingTable {
}
// Wait for test_route futures to complete in parallel
while let Ok(Some(_)) = unord.next().timeout_at(stop_token.clone()).await {}
while unord.next().await.is_some() {}
}
// Process failed routes

View File

@ -809,7 +809,7 @@ impl VeilidAPI {
}
let netman = self.network_manager()?;
netman.debug_restart_network();
netman.restart_network();
Ok("Network restarted".to_owned())
} else {

View File

@ -166,8 +166,8 @@ async def test_routing_context_app_message_loopback_big_packets():
# import it as a remote route as well so we can send to it
prr = await api.import_remote_private_route(blob)
# do this test 1000 times
for _ in range(1000):
# do this test 100 times
for _ in range(100):
# send a random sized random app message to our own private route
message = random.randbytes(random.randint(0, 32768))
await rc.app_message(prr, message)
@ -230,7 +230,7 @@ async def test_routing_context_app_call_loopback_big_packets():
# import it as a remote route as well so we can send to it
prr = await api.import_remote_private_route(blob)
# do this test 10 times
for _ in range(10):
# send a random sized random app message to our own private route

View File

@ -35,6 +35,7 @@ rt-tokio = [
tracking = ["veilid-core/tracking"]
network-result-extra = ["veilid-core/network-result-extra"]
verbose-tracing = ["veilid-core/verbose-tracing"]
debug-json-api = []
[dependencies]
veilid-core = { path = "../veilid-core", default-features = false }

View File

@ -217,6 +217,9 @@ impl ClientApi {
// (trim all whitespace around input lines just to make things more permissive for API users)
let request: json_api::Request = deserialize_json(&sanitized_line)?;
#[cfg(feature = "debug-json-api")]
debug!("JSONAPI: Request: {:?}", request);
// See if this is a control message or a veilid-core message
let response = if let json_api::RequestOp::Control { args } = request.op {
// Process control messages
@ -231,6 +234,9 @@ impl ClientApi {
jrp.clone().process_request(request).await
};
#[cfg(feature = "debug-json-api")]
debug!("JSONAPI: Response: {:?}", response);
// Marshal json + newline => NDJSON
let response_string = serialize_json(json_api::RecvMessage::Response(response)) + "\n";
if let Err(e) = responses_tx.send_async(response_string).await {