// Commons for HTTP handling
|
|
package rpcserver
|
|
|
|
import (
|
|
"bufio"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"runtime/debug"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
"golang.org/x/net/netutil"
|
|
|
|
"github.com/tendermint/tendermint/libs/log"
|
|
types "github.com/tendermint/tendermint/rpc/lib/types"
|
|
)
|
|
|
|
// Config is an RPC server configuration.
|
|
type Config struct {
|
|
MaxOpenConnections int
|
|
}
|
|
|
|
const (
|
|
// maxBodyBytes controls the maximum number of bytes the
|
|
// server will read parsing the request body.
|
|
maxBodyBytes = int64(1000000) // 1MB
|
|
|
|
// same as the net/http default
|
|
maxHeaderBytes = 1 << 20
|
|
|
|
// Timeouts for reading/writing to the http connection.
|
|
// Public so handlers can read them -
|
|
// /broadcast_tx_commit has it's own timeout, which should
|
|
// be less than the WriteTimeout here.
|
|
// TODO: use a config instead.
|
|
ReadTimeout = 3 * time.Second
|
|
WriteTimeout = 20 * time.Second
|
|
)
|
|
|
|
// StartHTTPServer takes a listener and starts an HTTP server with the given handler.
|
|
// It wraps handler with RecoverAndLogHandler.
|
|
// NOTE: This function blocks - you may want to call it in a go-routine.
|
|
func StartHTTPServer(listener net.Listener, handler http.Handler, logger log.Logger) error {
|
|
logger.Info(fmt.Sprintf("Starting RPC HTTP server on %s", listener.Addr()))
|
|
s := &http.Server{
|
|
Handler: RecoverAndLogHandler(maxBytesHandler{h: handler, n: maxBodyBytes}, logger),
|
|
ReadTimeout: ReadTimeout,
|
|
WriteTimeout: WriteTimeout,
|
|
MaxHeaderBytes: maxHeaderBytes,
|
|
}
|
|
err := s.Serve(listener)
|
|
logger.Info("RPC HTTP server stopped", "err", err)
|
|
return err
|
|
}
|
|
|
|
// StartHTTPAndTLSServer takes a listener and starts an HTTPS server with the given handler.
|
|
// It wraps handler with RecoverAndLogHandler.
|
|
// NOTE: This function blocks - you may want to call it in a go-routine.
|
|
func StartHTTPAndTLSServer(
|
|
listener net.Listener,
|
|
handler http.Handler,
|
|
certFile, keyFile string,
|
|
logger log.Logger,
|
|
) error {
|
|
logger.Info(fmt.Sprintf("Starting RPC HTTPS server on %s (cert: %q, key: %q)",
|
|
listener.Addr(), certFile, keyFile))
|
|
s := &http.Server{
|
|
Handler: RecoverAndLogHandler(maxBytesHandler{h: handler, n: maxBodyBytes}, logger),
|
|
ReadTimeout: ReadTimeout,
|
|
WriteTimeout: WriteTimeout,
|
|
MaxHeaderBytes: maxHeaderBytes,
|
|
}
|
|
err := s.ServeTLS(listener, certFile, keyFile)
|
|
|
|
logger.Error("RPC HTTPS server stopped", "err", err)
|
|
return err
|
|
}
|
|
|
|
func WriteRPCResponseHTTPError(
|
|
w http.ResponseWriter,
|
|
httpCode int,
|
|
res types.RPCResponse,
|
|
) {
|
|
jsonBytes, err := json.MarshalIndent(res, "", " ")
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
w.WriteHeader(httpCode)
|
|
w.Write(jsonBytes) // nolint: errcheck, gas
|
|
}
|
|
|
|
func WriteRPCResponseHTTP(w http.ResponseWriter, res types.RPCResponse) {
|
|
jsonBytes, err := json.MarshalIndent(res, "", " ")
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
w.Header().Set("Content-Type", "application/json")
|
|
w.WriteHeader(200)
|
|
w.Write(jsonBytes) // nolint: errcheck, gas
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// Wraps an HTTP handler, adding error logging.
|
|
// If the inner function panics, the outer function recovers, logs, sends an
|
|
// HTTP 500 error response.
|
|
func RecoverAndLogHandler(handler http.Handler, logger log.Logger) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
// Wrap the ResponseWriter to remember the status
|
|
rww := &ResponseWriterWrapper{-1, w}
|
|
begin := time.Now()
|
|
|
|
rww.Header().Set("X-Server-Time", fmt.Sprintf("%v", begin.Unix()))
|
|
|
|
defer func() {
|
|
// Send a 500 error if a panic happens during a handler.
|
|
// Without this, Chrome & Firefox were retrying aborted ajax requests,
|
|
// at least to my localhost.
|
|
if e := recover(); e != nil {
|
|
|
|
// If RPCResponse
|
|
if res, ok := e.(types.RPCResponse); ok {
|
|
WriteRPCResponseHTTP(rww, res)
|
|
} else {
|
|
// For the rest,
|
|
logger.Error(
|
|
"Panic in RPC HTTP handler", "err", e, "stack",
|
|
string(debug.Stack()),
|
|
)
|
|
WriteRPCResponseHTTPError(rww, http.StatusInternalServerError, types.RPCInternalError(types.JSONRPCStringID(""), e.(error)))
|
|
}
|
|
}
|
|
|
|
// Finally, log.
|
|
durationMS := time.Since(begin).Nanoseconds() / 1000000
|
|
if rww.Status == -1 {
|
|
rww.Status = 200
|
|
}
|
|
logger.Info("Served RPC HTTP response",
|
|
"method", r.Method, "url", r.URL,
|
|
"status", rww.Status, "duration", durationMS,
|
|
"remoteAddr", r.RemoteAddr,
|
|
)
|
|
}()
|
|
|
|
handler.ServeHTTP(rww, r)
|
|
})
|
|
}
|
|
|
|
// Remember the status for logging
|
|
type ResponseWriterWrapper struct {
|
|
Status int
|
|
http.ResponseWriter
|
|
}
|
|
|
|
func (w *ResponseWriterWrapper) WriteHeader(status int) {
|
|
w.Status = status
|
|
w.ResponseWriter.WriteHeader(status)
|
|
}
|
|
|
|
// implements http.Hijacker
|
|
func (w *ResponseWriterWrapper) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
|
return w.ResponseWriter.(http.Hijacker).Hijack()
|
|
}
|
|
|
|
type maxBytesHandler struct {
|
|
h http.Handler
|
|
n int64
|
|
}
|
|
|
|
func (h maxBytesHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
r.Body = http.MaxBytesReader(w, r.Body, h.n)
|
|
h.h.ServeHTTP(w, r)
|
|
}
|
|
|
|
// Listen starts a new net.Listener on the given address.
|
|
// It returns an error if the address is invalid or the call to Listen() fails.
|
|
func Listen(addr string, config Config) (listener net.Listener, err error) {
|
|
parts := strings.SplitN(addr, "://", 2)
|
|
if len(parts) != 2 {
|
|
return nil, errors.Errorf(
|
|
"Invalid listening address %s (use fully formed addresses, including the tcp:// or unix:// prefix)",
|
|
addr,
|
|
)
|
|
}
|
|
proto, addr := parts[0], parts[1]
|
|
listener, err = net.Listen(proto, addr)
|
|
if err != nil {
|
|
return nil, errors.Errorf("Failed to listen on %v: %v", addr, err)
|
|
}
|
|
if config.MaxOpenConnections > 0 {
|
|
listener = netutil.LimitListener(listener, config.MaxOpenConnections)
|
|
}
|
|
|
|
return listener, nil
|
|
}
|