2023-04-05 22:19:03 +03:00
|
|
|
use super::StatType;
|
2023-01-26 08:24:09 +03:00
|
|
|
use crate::app::Web3ProxyApp;
|
2023-05-31 07:26:11 +03:00
|
|
|
use crate::errors::{Web3ProxyError, Web3ProxyResponse, Web3ProxyResult};
|
2023-01-26 08:24:09 +03:00
|
|
|
use crate::http_params::{
|
|
|
|
get_chain_id_from_params, get_page_from_params, get_query_start_from_params,
|
|
|
|
get_query_window_seconds_from_params, get_user_id_from_params,
|
|
|
|
};
|
2022-10-20 07:44:33 +03:00
|
|
|
use anyhow::Context;
|
2023-03-17 05:38:11 +03:00
|
|
|
use axum::response::IntoResponse;
|
2022-12-16 09:32:58 +03:00
|
|
|
use axum::Json;
|
2022-10-20 09:17:20 +03:00
|
|
|
use axum::{
|
|
|
|
headers::{authorization::Bearer, Authorization},
|
|
|
|
TypedHeader,
|
|
|
|
};
|
2023-01-26 08:24:09 +03:00
|
|
|
use entities::{rpc_accounting, rpc_key};
|
2022-10-20 02:02:34 +03:00
|
|
|
use hashbrown::HashMap;
|
2023-01-26 08:24:09 +03:00
|
|
|
use log::warn;
|
2022-11-14 21:24:52 +03:00
|
|
|
use migration::sea_orm::{
|
2023-01-26 08:24:09 +03:00
|
|
|
ColumnTrait, EntityTrait, PaginatorTrait, QueryFilter, QueryOrder, QuerySelect, Select,
|
2022-10-20 00:34:05 +03:00
|
|
|
};
|
2022-11-14 21:24:52 +03:00
|
|
|
use migration::{Condition, Expr, SimpleExpr};
|
2022-12-16 09:32:58 +03:00
|
|
|
use redis_rate_limiter::redis;
|
2023-01-26 08:24:09 +03:00
|
|
|
use redis_rate_limiter::redis::AsyncCommands;
|
2022-12-16 09:32:58 +03:00
|
|
|
use serde_json::json;
|
2022-10-20 09:17:20 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
pub fn filter_query_window_seconds(
|
2022-12-16 09:32:58 +03:00
|
|
|
query_window_seconds: u64,
|
2022-11-04 07:32:09 +03:00
|
|
|
response: &mut HashMap<&str, serde_json::Value>,
|
|
|
|
q: Select<rpc_accounting::Entity>,
|
2023-03-17 05:38:11 +03:00
|
|
|
) -> Web3ProxyResult<Select<rpc_accounting::Entity>> {
|
2022-11-04 07:32:09 +03:00
|
|
|
if query_window_seconds == 0 {
|
|
|
|
// TODO: order by more than this?
|
|
|
|
// query_window_seconds is not set so we aggregate all records
|
|
|
|
// TODO: i am pretty sure we need to filter by something
|
|
|
|
return Ok(q);
|
|
|
|
}
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// TODO: is there a better way to do this? how can we get "period_datetime" into this with types?
|
|
|
|
// TODO: how can we get the first window to start at query_start_timestamp
|
|
|
|
let expr = Expr::cust_with_values(
|
|
|
|
"FLOOR(UNIX_TIMESTAMP(rpc_accounting.period_datetime) / ?) * ?",
|
|
|
|
[query_window_seconds, query_window_seconds],
|
|
|
|
);
|
2022-10-20 02:02:34 +03:00
|
|
|
|
2022-10-20 09:17:20 +03:00
|
|
|
response.insert(
|
2022-11-04 07:32:09 +03:00
|
|
|
"query_window_seconds",
|
|
|
|
serde_json::Value::Number(query_window_seconds.into()),
|
2022-10-20 09:17:20 +03:00
|
|
|
);
|
2022-10-20 02:02:34 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
let q = q
|
2022-11-04 22:01:17 +03:00
|
|
|
.column_as(expr, "query_window_timestamp")
|
|
|
|
.group_by(Expr::cust("query_window_timestamp"))
|
2022-11-04 07:32:09 +03:00
|
|
|
// TODO: is there a simpler way to order_by?
|
2022-11-04 22:01:17 +03:00
|
|
|
.order_by_asc(SimpleExpr::Custom("query_window_timestamp".to_string()));
|
2022-11-04 07:32:09 +03:00
|
|
|
|
|
|
|
Ok(q)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn query_user_stats<'a>(
|
|
|
|
app: &'a Web3ProxyApp,
|
|
|
|
bearer: Option<TypedHeader<Authorization<Bearer>>>,
|
|
|
|
params: &'a HashMap<String, String>,
|
2023-01-26 08:24:09 +03:00
|
|
|
stat_response_type: StatType,
|
2023-03-17 05:38:11 +03:00
|
|
|
) -> Web3ProxyResponse {
|
2022-12-16 11:48:24 +03:00
|
|
|
let db_conn = app.db_conn().context("query_user_stats needs a db")?;
|
|
|
|
let db_replica = app
|
|
|
|
.db_replica()
|
|
|
|
.context("query_user_stats needs a db replica")?;
|
|
|
|
let mut redis_conn = app
|
|
|
|
.redis_conn()
|
|
|
|
.await
|
2022-12-29 09:21:09 +03:00
|
|
|
.context("query_user_stats had a redis connection error")?
|
2022-12-16 11:48:24 +03:00
|
|
|
.context("query_user_stats needs a redis")?;
|
2022-12-16 09:32:58 +03:00
|
|
|
|
|
|
|
// get the user id first. if it is 0, we should use a cache on the app
|
2022-12-16 11:48:24 +03:00
|
|
|
let user_id =
|
|
|
|
get_user_id_from_params(&mut redis_conn, &db_conn, &db_replica, bearer, params).await?;
|
2022-12-16 09:32:58 +03:00
|
|
|
// get the query window seconds now so that we can pick a cache with a good TTL
|
|
|
|
// TODO: for now though, just do one cache. its easier
|
|
|
|
let query_window_seconds = get_query_window_seconds_from_params(params)?;
|
|
|
|
let query_start = get_query_start_from_params(params)?;
|
|
|
|
let chain_id = get_chain_id_from_params(app, params)?;
|
|
|
|
let page = get_page_from_params(params)?;
|
2022-11-04 07:32:09 +03:00
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
let cache_key = if user_id == 0 {
|
|
|
|
// TODO: cacheable query_window_seconds from config
|
|
|
|
if [60, 600, 3600, 86400, 86400 * 7, 86400 * 30].contains(&query_window_seconds)
|
|
|
|
&& query_start.timestamp() % (query_window_seconds as i64) == 0
|
|
|
|
{
|
|
|
|
None
|
|
|
|
} else {
|
|
|
|
// TODO: is this a good key?
|
|
|
|
let redis_cache_key = format!(
|
|
|
|
"query_user_stats:{}:{}:{}:{}:{}",
|
|
|
|
chain_id, user_id, query_start, query_window_seconds, page,
|
|
|
|
);
|
|
|
|
|
|
|
|
let cached_result: Result<(String, u64), _> = redis::pipe()
|
|
|
|
.atomic()
|
|
|
|
// get the key and its ttl
|
|
|
|
.get(&redis_cache_key)
|
|
|
|
.ttl(&redis_cache_key)
|
|
|
|
// do the query
|
|
|
|
.query_async(&mut redis_conn)
|
|
|
|
.await;
|
|
|
|
|
|
|
|
// redis being down should not break the stats page!
|
|
|
|
if let Ok((body, ttl)) = cached_result {
|
|
|
|
let mut response = body.into_response();
|
|
|
|
|
|
|
|
let headers = response.headers_mut();
|
|
|
|
|
|
|
|
headers.insert(
|
|
|
|
"Cache-Control",
|
|
|
|
format!("max-age={}", ttl)
|
|
|
|
.parse()
|
|
|
|
.expect("max-age should always parse"),
|
|
|
|
);
|
|
|
|
|
2022-12-16 11:48:24 +03:00
|
|
|
// TODO: emit a stat
|
2022-12-16 09:32:58 +03:00
|
|
|
|
|
|
|
return Ok(response);
|
|
|
|
}
|
|
|
|
|
|
|
|
Some(redis_cache_key)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut response_body = HashMap::new();
|
2022-11-04 07:32:09 +03:00
|
|
|
|
2022-12-15 23:27:39 +03:00
|
|
|
let mut q = rpc_accounting::Entity::find()
|
2022-10-20 02:02:34 +03:00
|
|
|
.select_only()
|
|
|
|
.column_as(
|
|
|
|
rpc_accounting::Column::FrontendRequests.sum(),
|
2022-11-04 07:40:39 +03:00
|
|
|
"total_frontend_requests",
|
2022-10-20 02:02:34 +03:00
|
|
|
)
|
2022-11-03 02:14:16 +03:00
|
|
|
.column_as(
|
|
|
|
rpc_accounting::Column::BackendRequests.sum(),
|
2022-11-04 07:32:09 +03:00
|
|
|
"total_backend_retries",
|
2022-11-03 02:14:16 +03:00
|
|
|
)
|
2022-10-20 02:02:34 +03:00
|
|
|
.column_as(
|
|
|
|
rpc_accounting::Column::CacheMisses.sum(),
|
|
|
|
"total_cache_misses",
|
|
|
|
)
|
|
|
|
.column_as(rpc_accounting::Column::CacheHits.sum(), "total_cache_hits")
|
|
|
|
.column_as(
|
|
|
|
rpc_accounting::Column::SumResponseBytes.sum(),
|
|
|
|
"total_response_bytes",
|
|
|
|
)
|
|
|
|
.column_as(
|
|
|
|
rpc_accounting::Column::ErrorResponse.sum(),
|
|
|
|
"total_error_responses",
|
|
|
|
)
|
|
|
|
.column_as(
|
|
|
|
rpc_accounting::Column::SumResponseMillis.sum(),
|
|
|
|
"total_response_millis",
|
2022-11-04 07:32:09 +03:00
|
|
|
);
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-11-30 08:51:31 +03:00
|
|
|
// TODO: make this and q mutable and clean up the code below. no need for more `let q`
|
2022-12-15 23:27:39 +03:00
|
|
|
let mut condition = Condition::all();
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2023-01-26 08:24:09 +03:00
|
|
|
if let StatType::Detailed = stat_response_type {
|
2022-11-04 07:32:09 +03:00
|
|
|
// group by the columns that we use as keys in other places of the code
|
2022-12-15 23:27:39 +03:00
|
|
|
q = q
|
|
|
|
.column(rpc_accounting::Column::ErrorResponse)
|
2022-11-04 07:32:09 +03:00
|
|
|
.group_by(rpc_accounting::Column::ErrorResponse)
|
|
|
|
.column(rpc_accounting::Column::Method)
|
|
|
|
.group_by(rpc_accounting::Column::Method)
|
|
|
|
.column(rpc_accounting::Column::ArchiveRequest)
|
2022-12-15 23:27:39 +03:00
|
|
|
.group_by(rpc_accounting::Column::ArchiveRequest);
|
|
|
|
}
|
2022-11-04 07:32:09 +03:00
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
// TODO: have q be &mut?
|
|
|
|
q = filter_query_window_seconds(query_window_seconds, &mut response_body, q)?;
|
2022-11-04 07:32:09 +03:00
|
|
|
|
|
|
|
// aggregate stats after query_start
|
2022-12-16 09:32:58 +03:00
|
|
|
// TODO: maximum query_start of 90 days ago?
|
2022-11-04 07:32:09 +03:00
|
|
|
// TODO: if no query_start, don't add to response or condition
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert(
|
2022-11-04 07:32:09 +03:00
|
|
|
"query_start",
|
|
|
|
serde_json::Value::Number(query_start.timestamp().into()),
|
|
|
|
);
|
2022-12-15 23:27:39 +03:00
|
|
|
condition = condition.add(rpc_accounting::Column::PeriodDatetime.gte(query_start));
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-12-15 23:27:39 +03:00
|
|
|
if chain_id == 0 {
|
|
|
|
// fetch all the chains
|
2022-10-20 07:44:33 +03:00
|
|
|
} else {
|
2022-12-16 09:32:58 +03:00
|
|
|
// filter on chain_id
|
2022-12-15 23:27:39 +03:00
|
|
|
condition = condition.add(rpc_accounting::Column::ChainId.eq(chain_id));
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert("chain_id", serde_json::Value::Number(chain_id.into()));
|
2022-12-15 23:27:39 +03:00
|
|
|
}
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-12-15 23:27:39 +03:00
|
|
|
if user_id == 0 {
|
2022-11-05 01:58:15 +03:00
|
|
|
// 0 means everyone. don't filter on user
|
|
|
|
} else {
|
2022-12-15 23:27:39 +03:00
|
|
|
q = q.left_join(rpc_key::Entity);
|
2022-11-05 01:58:15 +03:00
|
|
|
|
2022-12-15 23:27:39 +03:00
|
|
|
condition = condition.add(rpc_key::Column::UserId.eq(user_id));
|
2022-11-05 01:58:15 +03:00
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert("user_id", serde_json::Value::Number(user_id.into()));
|
2022-12-15 23:27:39 +03:00
|
|
|
}
|
2022-11-05 01:58:15 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// filter on rpc_key_id
|
2022-11-08 22:58:11 +03:00
|
|
|
// if rpc_key_id, all the requests without a key will be loaded
|
2022-11-04 07:32:09 +03:00
|
|
|
// TODO: move getting the param and checking the bearer token into a helper function
|
2022-12-15 23:27:39 +03:00
|
|
|
if let Some(rpc_key_id) = params.get("rpc_key_id") {
|
2022-11-04 07:32:09 +03:00
|
|
|
let rpc_key_id = rpc_key_id.parse::<u64>().map_err(|e| {
|
User Balance + Referral Logic (#44)
* will implement balance topup endpoint
* will quickly fix other PR reviews
* merging from master
* will finish up godmoe
* will finish up login
* added logic to top up balance (first iteration)
* should implement additional columns soon (currency, amount, tx-hash), as well as a new table for spend
* updated migrations, will account for spend next
* get back to this later
* will merge PR from stats-v2
* stats v2
rebased all my commits and squashed them down to one
* cargo upgrade
* added migrtation for spend in accounting table. will run test-deposit next
* trying to get request from polygon
* first iteration /user/balance/:tx_hash works, needs to add accepted tokens next
* creating the referral code seems to work
* will now check if spending enough credits will lead to both parties receiving credits
* rpcstats takes care of accounting for spend data
* removed track spend from table
* Revert "removed track spend from table"
This reverts commit a50802d6ae75f786864c5ec42d0ceb2cb27124ed.
* Revert "rpcstats takes care of accounting for spend data"
This reverts commit 1cec728bf241e4cfd24351134637ed81c1a5a10b.
* removed rpc request table entity
* updated referral code to use ulid s
* credits used are aggregated
* added a bunch of fields to referrer
* added database logic whenever an aggregate stats is added. will have to iterate over this a couple times i think. go to (1) detecting accepted stables next, (2) fix influxdb bug and (3) start to write test
* removed track spend as this will occur in the database
* will first work on "balance", then referral. these should really be treated as two separate PRs (although already convoluted)
* balance logic initial commit
* breaking WIP, changing the RPC call logic functions
* will start testing next
* got rid of warnings & lint
* will proceed with subtracting / adding to balance
* added decimal points, balance tracking seems to work
* will beautify code a bit
* removed deprecated dependency, and added topic + deposit contract to app.yaml
* brownie test suite does not rely on local contract files it pulls all from polygonscan
* will continue with referral
* should perhaps (in a future revision) recordhow much the referees got for free. marking referrals seems to work rn
* user is upgraded to premium if they deposit more than 10$. we dont accept more than $10M in a single tx
* will start PR, referral seems to be fine so far, perhaps up to some numbers that still may need tweaking
* will start PR
* removed rogue comments, cleaned up payments a bit
* changes before PR
* apply stats
* added unique constraint
* some refactoring such that the user file is not too bloated
* compiling
* progress with subusers, creating a table entry seems to work
* good response type is there as well now, will work on getters from primary user and secondary user next
* subuser logic also seems fine now
* downgrade logic
* fixed bug influxdb does not support different types in same query (which makes sense)
* WIP temporary commit
* merging with PR
* Delete daemon.rs
there are multiple daemons now, so this was moved to `proxyd`
* will remove request clone to &mut
* multiple request handles for payment
* making requests still seem fine
* removed redundant commented out bits
* added deposit endpoint, added deposit amount and deposit user, untested yet
* small bug with downgrade tier id
* will add authorization so balance can be received for users
* balance history should be set now too
* will check balance over time again
* subususer can see rpc key balance if admin or owner
* stats also seems to work fine now with historical balance
* things seem to be building and working
* removed clone from OpenRequestHandle
* removed influxdb from workspace members
* changed config files
* reran sea-orm generate entities, added a foreign key, should be proper now
* removed contract from commit
* made deposit contract optional
* added topic in polygon dev
* changed deposit contract to deposit factory contract
* added selfrelation on user_tier
* added payment required
* changed chain id to u64
* add wss in polygon llamarpc
* removed origin and method from the table
* added onchain transactions naming (and forgot to add a migration before)
* changed foreign key to be the referrer (id), not the code itself
* forgot to add id as the target foreign key
* WIP adding cache to update role
* fixed merge conflicts
---------
Co-authored-by: Bryan Stitt <bryan@llamanodes.com>
Co-authored-by: Bryan Stitt <bryan@stitthappens.com>
2023-05-12 19:45:15 +03:00
|
|
|
Web3ProxyError::BadRequest(format!("Unable to parse rpc_key_id. {:?}", e))
|
2022-11-04 07:32:09 +03:00
|
|
|
})?;
|
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert("rpc_key_id", serde_json::Value::Number(rpc_key_id.into()));
|
2022-11-04 01:16:27 +03:00
|
|
|
|
2022-12-15 23:27:39 +03:00
|
|
|
condition = condition.add(rpc_accounting::Column::RpcKeyId.eq(rpc_key_id));
|
2022-11-04 01:16:27 +03:00
|
|
|
|
2022-12-15 23:27:39 +03:00
|
|
|
q = q.group_by(rpc_accounting::Column::RpcKeyId);
|
2022-10-27 03:12:42 +03:00
|
|
|
|
2022-11-08 22:58:11 +03:00
|
|
|
if user_id == 0 {
|
|
|
|
// no user id, we did not join above
|
2022-12-15 23:27:39 +03:00
|
|
|
q = q.left_join(rpc_key::Entity);
|
2022-11-08 22:58:11 +03:00
|
|
|
} else {
|
|
|
|
// user_id added a join on rpc_key already. only filter on user_id
|
2022-12-15 23:27:39 +03:00
|
|
|
condition = condition.add(rpc_key::Column::UserId.eq(user_id));
|
2022-11-05 01:58:15 +03:00
|
|
|
}
|
2022-12-15 23:27:39 +03:00
|
|
|
}
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// now that all the conditions are set up. add them to the query
|
2022-12-15 23:27:39 +03:00
|
|
|
q = q.filter(condition);
|
2022-10-20 22:01:07 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// TODO: trace log query here? i think sea orm has a useful log level for this
|
2022-10-20 22:01:07 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// set up pagination
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert("page", serde_json::Value::Number(page.into()));
|
2022-10-20 23:26:14 +03:00
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// TODO: page size from param with a max from the config
|
2022-12-16 09:32:58 +03:00
|
|
|
let page_size = 1_000;
|
|
|
|
response_body.insert("page_size", serde_json::Value::Number(page_size.into()));
|
2022-10-20 07:44:33 +03:00
|
|
|
|
2022-12-15 05:45:54 +03:00
|
|
|
// query the database for number of items and pages
|
|
|
|
let pages_result = q
|
|
|
|
.clone()
|
2023-05-31 02:32:34 +03:00
|
|
|
.paginate(db_replica.as_ref(), page_size)
|
2022-12-15 05:45:54 +03:00
|
|
|
.num_items_and_pages()
|
|
|
|
.await?;
|
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert("num_items", pages_result.number_of_items.into());
|
|
|
|
response_body.insert("num_pages", pages_result.number_of_pages.into());
|
2022-12-15 05:45:54 +03:00
|
|
|
|
|
|
|
// query the database (todo: combine with the pages_result query?)
|
2022-11-04 07:32:09 +03:00
|
|
|
let query_response = q
|
2022-10-20 07:44:33 +03:00
|
|
|
.into_json()
|
2023-05-31 02:32:34 +03:00
|
|
|
.paginate(db_replica.as_ref(), page_size)
|
2022-10-20 07:44:33 +03:00
|
|
|
.fetch_page(page)
|
|
|
|
.await?;
|
|
|
|
|
2022-12-16 09:32:58 +03:00
|
|
|
// TODO: be a lot smart about caching
|
|
|
|
let ttl = 60;
|
|
|
|
|
2022-11-04 07:32:09 +03:00
|
|
|
// add the query_response to the json response
|
2022-12-16 09:32:58 +03:00
|
|
|
response_body.insert("result", serde_json::Value::Array(query_response));
|
|
|
|
|
|
|
|
let mut response = Json(&response_body).into_response();
|
|
|
|
|
|
|
|
let headers = response.headers_mut();
|
|
|
|
|
|
|
|
if let Some(cache_key) = cache_key {
|
|
|
|
headers.insert(
|
|
|
|
"Cache-Control",
|
|
|
|
format!("public, max-age={}", ttl)
|
|
|
|
.parse()
|
|
|
|
.expect("max-age should always parse"),
|
|
|
|
);
|
|
|
|
|
2023-05-13 01:15:32 +03:00
|
|
|
// TODO: get this from `response` isntead of json serializing twice
|
2022-12-16 09:32:58 +03:00
|
|
|
let cache_body = json!(response_body).to_string();
|
|
|
|
|
|
|
|
if let Err(err) = redis_conn
|
|
|
|
.set_ex::<_, _, ()>(cache_key, cache_body, ttl)
|
|
|
|
.await
|
|
|
|
{
|
|
|
|
warn!("Redis error while caching query_user_stats: {:?}", err);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
headers.insert(
|
|
|
|
"Cache-Control",
|
|
|
|
format!("private, max-age={}", ttl)
|
|
|
|
.parse()
|
|
|
|
.expect("max-age should always parse"),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: Last-Modified header?
|
2022-10-20 07:44:33 +03:00
|
|
|
|
|
|
|
Ok(response)
|
|
|
|
}
|