fix: harden internal runtime and transport paths — reduce fail-open behavior and churn#95
Merged
fix: harden internal runtime and transport paths — reduce fail-open behavior and churn#95
Conversation
added 30 commits
April 9, 2026 21:39
added 28 commits
April 10, 2026 21:01
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
This PR hardens SOF's internal runtime, provider-stream, extension-host, derived-state, and tx transport paths while preserving the current feature surface and public-facing behavior.
The branch combines the runtime-churn reduction work with follow-up correctness, robustness, and security hardening. The result is less internal churn on hot paths, earlier rejection of invalid configs, bounded network/file IO on more edges, and tighter startup/runtime invariants without adding new APIs or features.
Changes
Detailed list of what changed:
crates/sof-observer/src/framework/extension_host.rscrates/sof-observer/src/framework/derived_state.rscrates/sof-observer/src/provider_stream/websocket.rscrates/sof-observer/src/provider_stream/yellowstone.rscrates/sof-observer/src/provider_stream/laserstream.rscrates/sof-tx/src/providers.rscrates/sof-tx/src/submit/rpc.rscrates/sof-tx/src/submit/jito.rscrates/sof-tx/src/submit/jito_grpc.rscrates/sof-tx/src/submit/types.rscrates/sof-tx/src/adapters/{plugin_host,derived_state}.rscrates/sof-observer/src/app/runtime/*,ingest/*,repair/*,relay/*,verify/*,shred/*,crates/sof-support/src/lib.rsvendor/helius-laserstream/*For slice-related changes, include:
frameworkprovider_streamingestapp/runtimerepairrelayverifyshredsof-txsof-supportMotivation
Business motivation:
Technical motivation:
Alternative approaches considered:
cargo audit: deferred because the remaining real advisories are rooted in the vendored Solana/Agave chain and require an upstream version move rather than a localized branch fix.Scope and impact
framework,provider_stream,ingest,app/runtime,repair,relay,verify,shred,sof-tx,sof-supportcargo auditstill reports 2 real vulnerabilities plus advisory warnings, but the remaining real findings are upstream in the Solana/Agave dependency chain (sof-solana-gossip->solana-runtime->agave-precompiles) and are not locally fixable on this branch without a larger dependency moveTesting
Commands/results:
Results:
cargo make cipassed locallycargo audit --quietstill reports upstream dependency-chain advisories rooted in Solana/Agave crates; no local suppression policy was added in this branchAdditional focused validation run during the branch:
cargo clippy -p sof --lib --tests -- -D warningscargo clippy -p sof-tx --lib --tests -- -D warningsRelated issues and documentation
docs/architecture/README.mddocs/architecture/ard/0002-testing-strategy-and-quality-gates.mddocs/architecture/ard/0003-slice-dependency-contracts.mddocs/architecture/ard/0004-error-taxonomy-and-failure-handling.mddocs/architecture/ard/0005-type-system-and-newtype-guidelines.mddocs/architecture/ard/0007-infrastructure-composition-and-runtime-model.mddocs/architecture/ard/0008-observability-and-operability-standards.mdReviewer checklist
docs/architecture/ard/0003-slice-dependency-contracts.md)Additional notes
cargo auditfindings should be tracked as upstream dependency risk. Clearing them cleanly will require coordinated Solana/Agave dependency movement rather than more local hardening in SOF.