Skip to content

Commit

Permalink
feat(network): broadcast stress test
Browse files Browse the repository at this point in the history
  • Loading branch information
eitanm-starkware committed Nov 13, 2024
1 parent 79248c0 commit 69c6105
Show file tree
Hide file tree
Showing 4 changed files with 296 additions and 1 deletion.
5 changes: 5 additions & 0 deletions crates/papyrus_network/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,8 @@ testing = []
async-stream.workspace = true
async-trait.workspace = true
bytes.workspace = true
clap.workspace = true
csv.workspace = true
derive_more.workspace = true
futures.workspace = true
lazy_static.workspace = true
Expand Down Expand Up @@ -54,5 +56,8 @@ tokio = { workspace = true, features = ["full", "sync", "test-util"] }
tokio-stream.workspace = true
void.workspace = true

[build-dependencies]


[lints]
workspace = true
Original file line number Diff line number Diff line change
@@ -0,0 +1,102 @@
{
"buffer_size": {
"description": "The buffer size for the network receiver.",
"privacy": "Public",
"value": 1000
},
"message_size": {
"description": "The size of the payload for the test messages.",
"privacy": "Public",
"value": 1000
},
"network_config.advertised_multiaddr": {
"description": "The external address other peers see this node. If this is set, the node will not try to find out which addresses it has and will write this address as external instead",
"privacy": "Public",
"value": ""
},
"network_config.advertised_multiaddr.#is_none": {
"description": "Flag for an optional field.",
"privacy": "TemporaryValue",
"value": true
},
"network_config.bootstrap_peer_multiaddr": {
"description": "The multiaddress of the peer node. It should include the peer's id. For more info: https://docs.libp2p.io/concepts/fundamentals/peers/",
"privacy": "Public",
"value": ""
},
"network_config.bootstrap_peer_multiaddr.#is_none": {
"description": "Flag for an optional field.",
"privacy": "TemporaryValue",
"value": true
},
"network_config.chain_id": {
"description": "The chain to follow. For more details see https://docs.starknet.io/documentation/architecture_and_concepts/Blocks/transactions/#chain-id.",
"privacy": "Public",
"value": "SN_MAIN"
},
"network_config.discovery_config.bootstrap_dial_retry_config.base_delay_millis": {
"description": "The base delay in milliseconds for the exponential backoff strategy.",
"privacy": "Public",
"value": 2
},
"network_config.discovery_config.bootstrap_dial_retry_config.factor": {
"description": "The factor for the exponential backoff strategy.",
"privacy": "Public",
"value": 5
},
"network_config.discovery_config.bootstrap_dial_retry_config.max_delay_seconds": {
"description": "The maximum delay in seconds for the exponential backoff strategy.",
"privacy": "Public",
"value": 5
},
"network_config.discovery_config.heartbeat_interval": {
"description": "The interval between each discovery (Kademlia) query in milliseconds.",
"privacy": "Public",
"value": 100
},
"network_config.idle_connection_timeout": {
"description": "Amount of time in seconds that a connection with no active sessions will stay alive.",
"privacy": "Public",
"value": 120
},
"network_config.peer_manager_config.malicious_timeout_seconds": {
"description": "The duration in seconds a peer is blacklisted after being marked as malicious.",
"privacy": "Public",
"value": 31536000
},
"network_config.peer_manager_config.unstable_timeout_millis": {
"description": "The duration in milliseconds a peer blacklisted after being reported as unstable.",
"privacy": "Public",
"value": 1000
},
"network_config.quic_port": {
"description": "The port that the node listens on for incoming quic connections.",
"privacy": "Public",
"value": 10001
},
"network_config.secret_key": {
"description": "The secret key used for building the peer id. If it's an empty string a random one will be used.",
"privacy": "Private",
"value": "0x0000000000000000000000000000000000000000000000000000000000000000"
},
"network_config.session_timeout": {
"description": "Maximal time in seconds that each session can take before failing on timeout.",
"privacy": "Public",
"value": 120
},
"network_config.tcp_port": {
"description": "The port that the node listens on for incoming tcp connections.",
"privacy": "Public",
"value": 10000
},
"num_messages": {
"description": "The amount of messages to send and receive.",
"privacy": "Public",
"value": 100000
},
"output_path": {
"description": "The path of the output file.",
"privacy": "Public",
"value": "crates/papyrus_network/src/bin/network_stress_test/bootstrap_output.csv"
}
}
88 changes: 87 additions & 1 deletion crates/papyrus_network/src/bin/network_stress_test/main.rs
Original file line number Diff line number Diff line change
@@ -1,3 +1,89 @@
use std::time::SystemTime;
use std::vec;

use clap::Command;
use converters::{StressTestMessage, METADATA_SIZE};
use futures::StreamExt;
use libp2p::gossipsub::Topic;
use papyrus_config::loading::load_and_process_config;
use papyrus_network::network_manager::{BroadcastTopicClientTrait, NetworkManager};
use tokio::time::timeout;
use utils::{Record, TestConfig, BOOTSTRAP_CONFIG_FILE_PATH};

mod converters;
mod utils;

fn main() {}
#[tokio::main]
async fn main() {
TestConfig::create_config_files();
let args = std::env::args().collect::<Vec<String>>();
let default_path = BOOTSTRAP_CONFIG_FILE_PATH.to_string();
let config_path = args.get(1).unwrap_or(&default_path);
let file = std::fs::File::open(config_path).unwrap();
let TestConfig { network_config, buffer_size, message_size, num_messages, output_path } =
load_and_process_config(file, Command::new("Stress Test"), vec![]).unwrap();
let mut network_manager = NetworkManager::new(network_config, None);
let mut network_channels = network_manager
.register_broadcast_topic::<StressTestMessage>(
Topic::new("stress_test_topic".to_string()),
buffer_size,
)
.unwrap();
let mut output_vector = Vec::<Record>::new();
tokio::select! {
_ = network_manager.run() => {}
_ = async {
let mut i = 0;
tokio::time::sleep(std::time::Duration::from_secs(5)).await;
loop {
let message = StressTestMessage::new(i, vec![0; message_size - METADATA_SIZE]);
network_channels.broadcast_topic_client.broadcast_message(message).await.unwrap();
i += 1;
if i == num_messages {
println!("Finished sending messages");
futures::future::pending::<()>().await;
}
}
} => {}
_ = async {
let mut i = 0;
loop {
let maybe_response = timeout(
std::time::Duration::from_secs(60),
network_channels.broadcasted_messages_receiver.next(),
).await;
match maybe_response {
Err(_) => {
println!("Timeout on message {}", i);
break;
}
Ok(None) => break,
Ok(Some((received_message, _report_callback))) => {
let received_message = received_message.unwrap();
output_vector.push(Record {
id: received_message.id,
start_time: received_message.time,
end_time: SystemTime::now(),
duration: SystemTime::now()
.duration_since(received_message.time)
.unwrap()
.as_micros(),
});
i += 1;
if i == num_messages {
tokio::time::sleep(std::time::Duration::from_secs(60)).await;
break;
}
}
}
}
} => {
println!("Finished receiving messages");
let mut wtr = csv::Writer::from_path(output_path).unwrap();
for record in output_vector {
wtr.serialize(record).unwrap();
}
tokio::time::sleep(std::time::Duration::from_secs(60)).await;
}
}
}
102 changes: 102 additions & 0 deletions crates/papyrus_network/src/bin/network_stress_test/test_config.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,102 @@
{
"buffer_size": {
"description": "The buffer size for the network receiver.",
"privacy": "Public",
"value": 1000
},
"message_size": {
"description": "The size of the payload for the test messages.",
"privacy": "Public",
"value": 1000
},
"network_config.advertised_multiaddr": {
"description": "The external address other peers see this node. If this is set, the node will not try to find out which addresses it has and will write this address as external instead",
"privacy": "Public",
"value": ""
},
"network_config.advertised_multiaddr.#is_none": {
"description": "Flag for an optional field.",
"privacy": "TemporaryValue",
"value": true
},
"network_config.bootstrap_peer_multiaddr": {
"description": "The multiaddress of the peer node. It should include the peer's id. For more info: https://docs.libp2p.io/concepts/fundamentals/peers/",
"privacy": "Public",
"value": "/ip4/127.0.0.1/tcp/10000/p2p/12D3KooWDpJ7As7BWAwRMfu1VU2WCqNjvq387JEYKDBj4kx6nXTN"
},
"network_config.bootstrap_peer_multiaddr.#is_none": {
"description": "Flag for an optional field.",
"privacy": "TemporaryValue",
"value": false
},
"network_config.chain_id": {
"description": "The chain to follow. For more details see https://docs.starknet.io/documentation/architecture_and_concepts/Blocks/transactions/#chain-id.",
"privacy": "Public",
"value": "SN_MAIN"
},
"network_config.discovery_config.bootstrap_dial_retry_config.base_delay_millis": {
"description": "The base delay in milliseconds for the exponential backoff strategy.",
"privacy": "Public",
"value": 2
},
"network_config.discovery_config.bootstrap_dial_retry_config.factor": {
"description": "The factor for the exponential backoff strategy.",
"privacy": "Public",
"value": 5
},
"network_config.discovery_config.bootstrap_dial_retry_config.max_delay_seconds": {
"description": "The maximum delay in seconds for the exponential backoff strategy.",
"privacy": "Public",
"value": 5
},
"network_config.discovery_config.heartbeat_interval": {
"description": "The interval between each discovery (Kademlia) query in milliseconds.",
"privacy": "Public",
"value": 100
},
"network_config.idle_connection_timeout": {
"description": "Amount of time in seconds that a connection with no active sessions will stay alive.",
"privacy": "Public",
"value": 120
},
"network_config.peer_manager_config.malicious_timeout_seconds": {
"description": "The duration in seconds a peer is blacklisted after being marked as malicious.",
"privacy": "Public",
"value": 31536000
},
"network_config.peer_manager_config.unstable_timeout_millis": {
"description": "The duration in milliseconds a peer blacklisted after being reported as unstable.",
"privacy": "Public",
"value": 1000
},
"network_config.quic_port": {
"description": "The port that the node listens on for incoming quic connections.",
"privacy": "Public",
"value": 10003
},
"network_config.secret_key": {
"description": "The secret key used for building the peer id. If it's an empty string a random one will be used.",
"privacy": "Private",
"value": ""
},
"network_config.session_timeout": {
"description": "Maximal time in seconds that each session can take before failing on timeout.",
"privacy": "Public",
"value": 120
},
"network_config.tcp_port": {
"description": "The port that the node listens on for incoming tcp connections.",
"privacy": "Public",
"value": 10002
},
"num_messages": {
"description": "The amount of messages to send and receive.",
"privacy": "Public",
"value": 100000
},
"output_path": {
"description": "The path of the output file.",
"privacy": "Public",
"value": "crates/papyrus_network/src/bin/network_stress_test/output.csv"
}
}

0 comments on commit 69c6105

Please sign in to comment.