Skip to content

Conversation

@andrewjstone
Copy link
Contributor

@andrewjstone andrewjstone commented Oct 28, 2025

This builds on #9258

NodeTask now uses the trust_quorum_protocol::Node and trust_quorum_protocol::NodeCtx to send and receive trust quorum messages. An API to drive this was added to the NodeTaskHandle.

The majority of code in this PR is tests using the API.

A follow up will deal with saving persistent state to a Ledger.

@andrewjstone andrewjstone force-pushed the tq-sprockets-2 branch 3 times, most recently from 4e7f80b to a505cda Compare October 28, 2025 18:24
andrewjstone added a commit that referenced this pull request Oct 29, 2025
Builds on #9296

This commit persists state to a ledger, following the pattern used in
the bootstore. It's done this way because the `PersistentState` itself
is contained in the sans-io layer, but we must save it in the async task
layer. The sans-io layer shouldn't know how the state is persisted, just
that it  is, and so we recreate the ledger for every time we write it.

A follow up will PR will deal with the early networking information saved
by the bootstore, and will be very similar.
andrewjstone added a commit that referenced this pull request Oct 29, 2025
Builds on #9296

This commit persists state to a ledger, following the pattern used in
the bootstore. It's done this way because the `PersistentState` itself
is contained in the sans-io layer, but we must save it in the async task
layer. The sans-io layer shouldn't know how the state is persisted, just
that it  is, and so we recreate the ledger for every time we write it.

A follow up will PR will deal with the early networking information saved
by the bootstore, and will be very similar.
@andrewjstone andrewjstone mentioned this pull request Oct 29, 2025
19 tasks
Copy link
Contributor

@sunshowers sunshowers left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Didn't look too closely at the tests, but the code itself looks great! just a few minor comments that I'll trust you to resolve :)

Comment on lines +264 to +270
/// Return `Ok(true)` if the configuration has committed, `Ok(false)` if
/// it hasn't committed yet, or an error otherwise.
///
/// Nexus will retry this operation and so we should only try once here.
/// This is in contrast to operations like `load_rack_secret` that are
/// called directly from sled agent.
pub async fn prepare_and_commit(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you return a two-valued enum here rather than bool?

What is the "otherwise" in "return an error otherwise" here? Just send and receive errors or something else?

Also since this doesn't loop I'd consider calling this try_prepare_and_commit. not relevant if we change load_rack_secret to not retry.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Totally. As I put that bool there, I knew you'd ask for this. Next time I'll do it before you ask ;)

/// Nexus will retry this operation and so we should only try once here.
/// This is in contrast to operations like `load_rack_secret` that are
/// called directly from sled agent.
pub async fn commit(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comments as above.

Ok(res)
}

pub async fn status(&self) -> Result<NodeStatus, NodeApiError> {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add a doc comment here?

Comment on lines +419 to 421
for envelope in self.ctx.drain_envelopes() {
self.conn_mgr.send(envelope).await;
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we want to do this concurrently, or is serially okay? I guess this shouldn't be cancelled since there's an instruction to make run a top-level task.

}
}

// TODO: Process `ctx`: save persistent state
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What's ctx here?

Comment on lines +108 to +117
/// Return the status of this node if it is a coordinator
CoordinatorStatus { responder: oneshot::Sender<Option<CoordinatorStatus>> },

/// Load a rack secret for the given epoch
LoadRackSecret {
epoch: Epoch,
responder: oneshot::Sender<
Result<Option<ReconstructedRackSecret>, LoadRackSecretError>,
>,
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

would consider calling all of the oneshot channels tx or similar

Comment on lines +936 to +937
&poll_interval,
&poll_max,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hmm, honestly this should take a Duration, not a reference to it. Worth fixing at some point.

`NodeTask` now uses the `trust_quorum_protocol::Node` and
`trust_quorum_protocol::NodeCtx` to send and receive trust quorum
messages. An API to drive this was added to the `NodeTaskHandle`.

The majority of code in this PR is tests using the API.

A follow up will deal with saving persistent state to a Ledger.
andrewjstone added a commit that referenced this pull request Oct 31, 2025
Builds on #9296

This commit persists state to a ledger, following the pattern used in
the bootstore. It's done this way because the `PersistentState` itself
is contained in the sans-io layer, but we must save it in the async task
layer. The sans-io layer shouldn't know how the state is persisted, just
that it  is, and so we recreate the ledger for every time we write it.

A follow up will PR will deal with the early networking information saved
by the bootstore, and will be very similar.
pub async fn send(&self, envelope: Envelope) {
let Envelope { to, msg, .. } = envelope;
info!(self.log, "Sending {msg:?}"; "peer_id" => %to);
if let Some(handle) = self.established.get1(&to) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was quite confused when I first saw this, since it silently discards the message if a connection with the recipient is not established.

Originally I was going to suggest to rename the function to try_send or similar, but poking at the rest of the code I learned errors are discarded everywhere (EstablishedConn::run only logs the error message and kills the connection, without reporting the failure down the stack).

This makes sense, as in general RFD 238 is designed to be resilient to nodes disappearing at any point in time. I'm not sure if I would do anything in response to this comment. Just leaving this as a note for future me.

async fn disconnect_client(&mut self, addr: SocketAddrV6) {
///
/// Return the `BaseboardId` of the peer if an established connection is
// torn down.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// torn down.
/// torn down.

Comment on lines +1149 to +1154
// Tell all but the last node how to reach each other
for h in &setup.node_handles {
h.load_peer_addresses(setup.listen_addrs.iter().cloned().collect())
.await
.unwrap();
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While in this case the code comment doesn't reflect the test, this is a more general review comment on these tests.

There is a lot of boilerplate copy/pasted between tests in each test, which makes it hard to see at a glance what a test is actually testing and what is the difference between tests.

We have a TestSetup struct we can add methods to. As an example, replacing connecting nodes with:

setup.connect_nodes(..).await;
setup.connect_nodes(1..).await;

...and similar for the rest of the large boilerplate blocks would make it way easier to review tests and make sure we cover every case.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I fully agree. Will do.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants