Go to file
Bryan Stitt 5f88146ac5 add certs to all the proxies 2023-07-09 21:57:39 -07:00
.cargo add cargo hakari and chef to build process 2023-06-27 11:59:49 -07:00
.vscode stats v2 2023-03-04 20:48:49 +01:00
bin use host networking 2022-09-08 22:24:27 +00:00
config stripe integration first mvp (replaces #140) (#154) 2023-06-29 14:32:05 -07:00
deferred-rate-limiter Premium tier changes (#170) 2023-07-07 15:15:41 -07:00
docs improvements for web3-this-then-that 2023-06-09 16:35:14 -07:00
entities David/remove balance logic non destructive (#173) 2023-07-09 19:23:32 -07:00
latency cargo upgrade 2023-07-07 15:16:14 -07:00
migration lint 2023-07-09 20:13:03 -07:00
payment-contracts build.rs tweaks 2023-07-05 11:45:22 -07:00
quick_cache_ttl drop workspace-hack for now 2023-06-30 13:18:37 -07:00
rate-counter drop workspace-hack for now 2023-06-30 13:18:37 -07:00
redis-rate-limiter drop workspace-hack for now 2023-06-30 13:18:37 -07:00
scripts David/remove balance logic non destructive (#173) 2023-07-09 19:23:32 -07:00
web3_proxy Bryan devel (#176) 2023-07-09 21:37:50 -07:00
wrk move data files 2022-05-06 01:40:43 +00:00
.dockerignore nested dockerignore doesnt work 2023-06-27 11:09:38 -07:00
.env rename stripe_api_key to stripe_whsec_key 2023-07-05 11:26:39 -07:00
.gitignore improve build process 2023-06-25 21:26:17 -07:00
Cargo.lock cargo upgrade 2023-07-07 15:16:14 -07:00
Cargo.toml drop workspace-hack for now 2023-06-30 13:18:37 -07:00
Dockerfile copy the app instead of mount to fix payment-contracts disappearing 2023-07-06 21:18:45 -07:00
FAQ.md more robust login 2022-10-20 08:14:38 +00:00
Jenkinsfile specify agent 2023-06-27 09:27:56 -07:00
LICENSE add LICENSE 2022-03-04 19:56:05 -08:00
README.md Bryan devel (#176) 2023-07-09 21:37:50 -07:00
TODO.md move floats and durations around for latency tracking 2023-06-18 10:46:22 -07:00
docker-compose.common.yml add certs to all the proxies 2023-07-09 21:57:39 -07:00
docker-compose.prod.yml add certs to all the proxies 2023-07-09 21:57:39 -07:00
docker-compose.yml trying to debug returning multiple files 2023-03-10 20:26:15 +01:00
example.sql David/remove balance logic non destructive (#173) 2023-07-09 19:23:32 -07:00
rust-toolchain.toml Revert "bump nightly" 2023-07-05 13:03:01 -07:00

web3_proxy

Web3_proxy is a fast caching and load balancing proxy for web3 (Ethereum or similar) JsonRPC servers.

Under construction! This code is under active development. If you want to run this proxy youself, send me a message on Twitter and I can explain things that aren't documented yet. Most RPC methods are supported, but filters are coming soon. And of course, more tests are always needed.

Signed transactions (eth_sendRawTransaction) are sent in parallel to the configured private RPCs (eden, ethermine, flashbots, etc.).

All other requests are sent to an RPC server on the latest block (llamanodes, alchemy, moralis, rivet, your own node, or one of many other providers). If multiple servers are in sync, they are prioritized by active_requests and request latency. Note that this means that the fastest server is most likely to serve requests and slow servers are unlikely to ever get any requests.

Each server has different limits to configure. The soft_limit is the number of parallel active requests where a server starts to slow down. The hard_limit is where a server starts giving rate limits or other errors.

Quick development

  1. brew install librdkafka or sudo apt-get install librdkafka-dev
  2. Run docker-compose up -d to start the database and caches. See docker-compose.yml for details.
  3. Copy ./config/example.toml to ./config/development.toml and change settings to match your setup.
  4. Run cargo commands:
$ cargo run --release -- --help
   Compiling web3_proxy v0.1.0 (/home/bryan/src/web3_proxy/web3_proxy)
    Finished release [optimized + debuginfo] target(s) in 17.69s
     Running `target/release/web3_proxy --help`
Usage: web3_proxy [--port <port>] [--workers <workers>] [--config <config>]

web3_proxy is a fast caching and load balancing proxy for web3 (Ethereum or similar) JsonRPC servers.

Options:
  --port            what port the proxy should listen on
  --workers         number of worker threads
  --config          path to a toml of rpc servers
  --help            display usage information

Start the server with the defaults (listen on http://localhost:8544 and use ./config/development.toml which uses the database and cache running under docker and proxies to a bunch of public nodes:

cargo run --release -- proxyd

Quickly run tests:

RUST_LOG=web3_proxy=trace,info cargo nextest run

Run more tests:

RUST_LOG=web3_proxy=trace,info cargo nextest run --features tests-needing-docker

Common commands

Create a user:

cargo run -- --db-url "$YOUR_DB_URL" create_user --address "$USER_ADDRESS_0x"

Check that the proxy is working:

curl -X POST -H "Content-Type: application/json" --data '{"jsonrpc":"2.0","method":"web3_clientVersion","id":1}' 127.0.0.1:8544
curl -X POST -H "Content-Type: application/json" --data '{"jsonrpc":"2.0","method":"eth_getBlockByNumber", "params": ["latest", false],"id":1}' 127.0.0.1:8544
curl -X POST -H "Content-Type: application/json" --data '{"jsonrpc":"2.0","method":"eth_getBalance", "params": ["0x0000000000000000000000000000000000000000", "latest"],"id":1}' 127.0.0.1:8544

Check that the websocket is working:

$ websocat ws://127.0.0.1:8544

{"jsonrpc": "2.0", "id": 1, "method": "eth_subscribe", "params": ["newHeads"]}

{"jsonrpc": "2.0", "id": 2, "method": "eth_subscribe", "params": ["newPendingTransactions"]}

{"jsonrpc": "2.0", "id": 3, "method": "eth_subscribe", "params": ["newPendingFullTransactions"]}

{"jsonrpc": "2.0", "id": 4, "method": "eth_subscribe", "params": ["newPendingRawTransactions"]}

You can copy config/example.toml to config/production-$CHAINNAME.toml and then run docker-compose up --build -d start proxies for many chains.

Compare 3 RPCs:

web3_proxy_cli health_compass https://eth.llamarpc.com https://eth-ski.llamarpc.com https://rpc.ankr.com/eth

Run migrations

Generally it is simplest to just run the app to run migrations. It runs migrations on start.

But if you want to run them manually (generally only useful in development):

cd migration
cargo run up

Create a user:

web3_proxy_cli --config ... create_user --address 0x0000000000000000000000000000000000000000 --email infra@llamanodes.com --description "..."

Give a user unlimited requests per second:

Copy the ULID key (or UUID key) out of the above command, and put it into the following command.

web3_proxy_cli --config ... change_user_tier_by_key "$RPC_ULID_KEY_FROM_PREV_COMMAND" "Unlimited"

Health compass

Health check 3 servers and error if the first one doesn't match the others.

web3_proxy_cli health_compass https://eth.llamarpc.com/ https://rpc.ankr.com/eth https://cloudflare-eth.com

Adding new database tables

cargo install sea-orm-cli
  1. (optional) drop the current dev db
  2. sea-orm-cli migrate
  3. sea-orm-cli generate entity -u mysql://root:dev_web3_proxy@127.0.0.1:13306/dev_web3_proxy -o entities/src --with-serde both
    • Be careful when adding the --tables THE,MODIFIED,TABLES flag. It will delete relationships if they aren't listed
  4. After running the above, you will need to manually fix some things

Flame Graphs

Flame graphs make a developer's join of finding slow code painless:

$ cat /proc/sys/kernel/kptr_restrict
1
$ echo 0 | sudo tee /proc/sys/kernel/kptr_restrict
0
$ cat /proc/sys/kernel/perf_event_paranoid
4
$ echo -1 | sudo tee /proc/sys/kernel/perf_event_paranoid
-1
$ CARGO_PROFILE_RELEASE_DEBUG=true cargo flamegraph --bin web3_proxy_cli --no-inline -- proxyd

Be sure to use --no-inline or perf will be VERY slow

GDB

Developers can run the proxy under gdb for advanced debugging:

cargo build --release && RUST_LOG=info,web3_proxy=debug,ethers_providers::rpc=off rust-gdb --args target/debug/web3_proxy --listen-port 7503 --rpc-config-path ./config/production-eth.toml

TODO: also enable debug symbols in the release build by modifying the root Cargo.toml

Load Testing

Test the proxy:

wrk -t12 -c400 -d30s --latency http://127.0.0.1:8544/health
wrk -t12 -c400 -d30s --latency http://127.0.0.1:8544/status
wrk -s ./wrk/getBlockNumber.lua -t12 -c400 -d30s --latency http://127.0.0.1:8544/u/$API_KEY
wrk -s ./wrk/getLatestBlockByNumber.lua -t12 -c400 -d30s --latency http://127.0.0.1:8544/u/$API_KEY

Test geth (assuming it is on 8545):

wrk -s ./wrk/getBlockNumber.lua -t12 -c400 -d30s --latency http://127.0.0.1:8545
wrk -s ./wrk/getLatestBlockByNumber.lua -t12 -c400 -d30s --latency http://127.0.0.1:8545

Test erigon (assuming it is on 8945):

wrk -s ./wrk/getBlockNumber.lua -t12 -c400 -d30s --latency http://127.0.0.1:8945
wrk -s ./wrk/getLatestBlockByNumber.lua -t12 -c400 -d30s --latency http://127.0.0.1:8945

Note: Testing with getLatestBlockByNumber.lua is not great because the latest block changes and so one run is likely to be very different than another.

Run ethspam and versus for a more realistic load test:

ethspam --rpc http://127.0.0.1:8544 | versus --concurrency=10 --stop-after=1000 http://127.0.0.1:8544

ethspam --rpc http://127.0.0.1:8544/u/$API_KEY | versus --concurrency=100 --stop-after=10000 http://127.0.0.1:8544/u/$API_KEY