1use chrono::Utc;
2
3use super::network_error::NetworkError;
4use super::providers::get_network_provider;
5use super::{HttpMethod, NetworkProvider, RequestArgs, Response};
6use crate::networking::proxy_config::ProxyConfig;
7use crate::observability::ops_stats::{OpsStatsForInstance, OPS_STATS};
8use crate::observability::ErrorBoundaryEvent;
9use crate::sdk_diagnostics::marker::{ActionType, Marker, StepType};
10use crate::{log_d, log_i, log_w, StatsigOptions};
11use std::collections::HashMap;
12use std::sync::atomic::{AtomicBool, Ordering};
13use std::sync::{Arc, Weak};
14use std::time::Duration;
15
16const NON_RETRY_CODES: [u16; 6] = [
17 400, 403, 413, 405, 429, 501, ];
24const SHUTDOWN_ERROR: &str = "Request was aborted because the client is shutting down";
25
26const TAG: &str = stringify!(NetworkClient);
27
28pub struct NetworkClient {
29 headers: HashMap<String, String>,
30 is_shutdown: Arc<AtomicBool>,
31 ops_stats: Arc<OpsStatsForInstance>,
32 net_provider: Weak<dyn NetworkProvider>,
33 disable_network: bool,
34 proxy_config: Option<ProxyConfig>,
35 silent_on_network_failure: bool,
36 disable_file_streaming: bool,
37}
38
39impl NetworkClient {
40 #[must_use]
41 pub fn new(
42 sdk_key: &str,
43 headers: Option<HashMap<String, String>>,
44 options: Option<&StatsigOptions>,
45 ) -> Self {
46 let net_provider = get_network_provider();
47 let (disable_network, proxy_config) = options
48 .map(|opts| {
49 (
50 opts.disable_network.unwrap_or(false),
51 opts.proxy_config.clone(),
52 )
53 })
54 .unwrap_or((false, None));
55
56 NetworkClient {
57 headers: headers.unwrap_or_default(),
58 is_shutdown: Arc::new(AtomicBool::new(false)),
59 net_provider,
60 ops_stats: OPS_STATS.get_for_instance(sdk_key),
61 disable_network,
62 proxy_config,
63 silent_on_network_failure: false,
64 disable_file_streaming: options
65 .map(|opts| opts.disable_disk_access.unwrap_or(false))
66 .unwrap_or(false),
67 }
68 }
69
70 pub fn shutdown(&self) {
71 self.is_shutdown.store(true, Ordering::SeqCst);
72 }
73
74 pub async fn get(&self, request_args: RequestArgs) -> Result<Response, NetworkError> {
75 self.make_request(HttpMethod::GET, request_args).await
76 }
77
78 pub async fn post(
79 &self,
80 mut request_args: RequestArgs,
81 body: Option<Vec<u8>>,
82 ) -> Result<Response, NetworkError> {
83 request_args.body = body;
84 self.make_request(HttpMethod::POST, request_args).await
85 }
86
87 async fn make_request(
88 &self,
89 method: HttpMethod,
90 mut request_args: RequestArgs,
91 ) -> Result<Response, NetworkError> {
92 let is_shutdown = if let Some(is_shutdown) = &request_args.is_shutdown {
93 is_shutdown.clone()
94 } else {
95 self.is_shutdown.clone()
96 };
97
98 if self.disable_network {
99 log_d!(TAG, "Network is disabled, not making requests");
100 return Err(NetworkError::DisableNetworkOn(request_args.url));
101 }
102
103 request_args.populate_headers(self.headers.clone());
104
105 if request_args.disable_file_streaming.is_none() {
106 request_args.disable_file_streaming = Some(self.disable_file_streaming);
107 }
108
109 let mut merged_headers = request_args.headers.unwrap_or_default();
110 if !self.headers.is_empty() {
111 merged_headers.extend(self.headers.clone());
112 }
113 merged_headers.insert(
114 "STATSIG-CLIENT-TIME".into(),
115 Utc::now().timestamp_millis().to_string(),
116 );
117 request_args.headers = Some(merged_headers);
118
119 if let Some(proxy_config) = &self.proxy_config {
121 request_args.proxy_config = Some(proxy_config.clone());
122 }
123 let mut attempt = 0;
124
125 loop {
126 if let Some(key) = request_args.diagnostics_key {
127 self.ops_stats.add_marker(
128 Marker::new(key, ActionType::Start, Some(StepType::NetworkRequest))
129 .with_attempt(attempt)
130 .with_url(request_args.url.clone()),
131 None,
132 );
133 }
134 if is_shutdown.load(Ordering::SeqCst) {
135 log_i!(TAG, "{}", SHUTDOWN_ERROR);
136 return Err(NetworkError::ShutdownError(request_args.url));
137 }
138
139 let mut response = match self.net_provider.upgrade() {
140 Some(net_provider) => net_provider.send(&method, &request_args).await,
141 None => {
142 return Err(NetworkError::RequestFailed(
143 request_args.url,
144 None,
145 "Failed to get a NetworkProvider instance".to_string(),
146 ));
147 }
148 };
149
150 let status = response.status_code;
151 let error_message = response
152 .error
153 .clone()
154 .unwrap_or_else(|| get_error_message_for_status(status, response.data.as_mut()));
155
156 let content_type = response
157 .data
158 .as_ref()
159 .and_then(|data| data.get_header_ref("content-type"));
160
161 log_d!(
162 TAG,
163 "Response url({}) status({:?}) content-type({:?})",
164 &request_args.url,
165 response.status_code,
166 content_type
167 );
168
169 let sdk_region_str = response
170 .data
171 .as_ref()
172 .and_then(|data| data.get_header_ref("x-statsig-region").cloned());
173 let success = (200..300).contains(&status.unwrap_or(0));
174
175 if let Some(key) = request_args.diagnostics_key {
176 let mut end_marker =
177 Marker::new(key, ActionType::End, Some(StepType::NetworkRequest))
178 .with_attempt(attempt)
179 .with_url(request_args.url.clone())
180 .with_is_success(success)
181 .with_content_type(content_type.cloned())
182 .with_sdk_region(sdk_region_str.map(|s| s.to_owned()));
183
184 if let Some(status_code) = status {
185 end_marker = end_marker.with_status_code(status_code);
186 }
187
188 let error_map = if !error_message.is_empty() {
189 let mut map = HashMap::new();
190 map.insert("name".to_string(), "NetworkError".to_string());
191 map.insert("message".to_string(), error_message.clone());
192 let status_string = match status {
193 Some(code) => code.to_string(),
194 None => "None".to_string(),
195 };
196 map.insert("code".to_string(), status_string);
197 Some(map)
198 } else {
199 None
200 };
201
202 if let Some(error_map) = error_map {
203 end_marker = end_marker.with_error(error_map);
204 }
205
206 self.ops_stats.add_marker(end_marker, None);
207 }
208
209 if success {
210 return Ok(response);
211 }
212
213 if NON_RETRY_CODES.contains(&status.unwrap_or(0)) {
214 let error = NetworkError::RequestNotRetryable(
215 request_args.url.clone(),
216 status,
217 error_message,
218 );
219 self.log_warning(&error, &request_args);
220 return Err(error);
221 }
222
223 if attempt >= request_args.retries {
224 let error = NetworkError::RetriesExhausted(
225 request_args.url.clone(),
226 status,
227 attempt + 1,
228 error_message,
229 );
230 self.log_warning(&error, &request_args);
231 return Err(error);
232 }
233
234 attempt += 1;
235 let backoff_ms = 2_u64.pow(attempt) * 100;
236
237 log_i!(
238 TAG, "Network request failed with status code {} (attempt {}/{}), will retry after {}ms...\n{}",
239 status.map_or("unknown".to_string(), |s| s.to_string()),
240 attempt,
241 request_args.retries + 1,
242 backoff_ms,
243 error_message
244 );
245
246 tokio::time::sleep(Duration::from_millis(backoff_ms)).await;
247 }
248 }
249
250 pub fn mute_network_error_log(mut self) -> Self {
251 self.silent_on_network_failure = true;
252 self
253 }
254
255 fn log_warning(&self, error: &NetworkError, args: &RequestArgs) {
256 let exception = error.name();
257
258 log_w!(TAG, "{}", error);
259 if !self.silent_on_network_failure {
260 let dedupe_key = format!("{:?}", args.diagnostics_key);
261 self.ops_stats.log_error(ErrorBoundaryEvent {
262 tag: TAG.to_string(),
263 exception: exception.to_string(),
264 bypass_dedupe: false,
265 info: serde_json::to_string(error).unwrap_or_default(),
266 dedupe_key: Some(dedupe_key),
267 extra: None,
268 });
269 }
270 }
271}
272
273fn get_error_message_for_status(
274 status: Option<u16>,
275 data: Option<&mut super::ResponseData>,
276) -> String {
277 if (200..300).contains(&status.unwrap_or(0)) {
278 return String::new();
279 }
280
281 let mut message = String::new();
282 if let Some(data) = data {
283 let lossy_str = data.read_to_string().unwrap_or_default();
284 if lossy_str.is_ascii() {
285 message = lossy_str.to_string();
286 }
287 }
288
289 let status_value = match status {
290 Some(code) => code,
291 None => return format!("HTTP Error None: {message}"),
292 };
293
294 let generic_message = match status_value {
295 400 => "Bad Request",
296 401 => "Unauthorized",
297 403 => "Forbidden",
298 404 => "Not Found",
299 405 => "Method Not Allowed",
300 406 => "Not Acceptable",
301 408 => "Request Timeout",
302 500 => "Internal Server Error",
303 502 => "Bad Gateway",
304 503 => "Service Unavailable",
305 504 => "Gateway Timeout",
306 0 => "Unknown Error",
307 _ => return format!("HTTP Error {status_value}: {message}"),
308 };
309
310 if message.is_empty() {
311 return generic_message.to_string();
312 }
313
314 format!("{generic_message}: {message}")
315}