mirror of
https://github.com/Xahau/xahaud.git
synced 2025-11-20 02:25:53 +00:00
1146 lines
34 KiB
C++
1146 lines
34 KiB
C++
//------------------------------------------------------------------------------
|
|
/*
|
|
This file is part of rippled: https://github.com/ripple/rippled
|
|
Copyright (c) 2012, 2013 Ripple Labs Inc.
|
|
|
|
Permission to use, copy, modify, and/or distribute this software for any
|
|
purpose with or without fee is hereby granted, provided that the above
|
|
copyright notice and this permission notice appear in all copies.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
//==============================================================================
|
|
|
|
#include <ripple/app/main/Application.h>
|
|
#include <ripple/app/misc/NetworkOPs.h>
|
|
#include <ripple/basics/base64.h>
|
|
#include <ripple/beast/rfc2616.h>
|
|
#include <ripple/beast/net/IPAddressConversion.h>
|
|
#include <ripple/json/json_reader.h>
|
|
#include <ripple/rpc/json_body.h>
|
|
#include <ripple/rpc/ServerHandler.h>
|
|
#include <ripple/server/Server.h>
|
|
#include <ripple/server/impl/JSONRPCUtil.h>
|
|
#include <ripple/rpc/impl/ServerHandlerImp.h>
|
|
#include <ripple/basics/contract.h>
|
|
#include <ripple/basics/Log.h>
|
|
#include <ripple/basics/make_SSLContext.h>
|
|
#include <ripple/core/JobQueue.h>
|
|
#include <ripple/json/to_string.h>
|
|
#include <ripple/net/RPCErr.h>
|
|
#include <ripple/overlay/Overlay.h>
|
|
#include <ripple/resource/ResourceManager.h>
|
|
#include <ripple/resource/Fees.h>
|
|
#include <ripple/rpc/impl/Tuning.h>
|
|
#include <ripple/rpc/RPCHandler.h>
|
|
#include <ripple/server/SimpleWriter.h>
|
|
#include <boost/beast/http/fields.hpp>
|
|
#include <boost/beast/http/string_body.hpp>
|
|
#include <boost/algorithm/string.hpp>
|
|
#include <boost/type_traits.hpp>
|
|
#include <boost/optional.hpp>
|
|
#include <boost/regex.hpp>
|
|
#include <algorithm>
|
|
#include <stdexcept>
|
|
|
|
namespace ripple {
|
|
|
|
static
|
|
bool
|
|
isStatusRequest(
|
|
http_request_type const& request)
|
|
{
|
|
return
|
|
request.version() >= 11 &&
|
|
request.target() == "/" &&
|
|
request.body().size() == 0 &&
|
|
request.method() == boost::beast::http::verb::get;
|
|
}
|
|
|
|
static
|
|
Handoff
|
|
statusRequestResponse(
|
|
http_request_type const& request, boost::beast::http::status status)
|
|
{
|
|
using namespace boost::beast::http;
|
|
Handoff handoff;
|
|
response<string_body> msg;
|
|
msg.version(request.version());
|
|
msg.result(status);
|
|
msg.insert("Server", BuildInfo::getFullVersionString());
|
|
msg.insert("Content-Type", "text/html");
|
|
msg.insert("Connection", "close");
|
|
msg.body() = "Invalid protocol.";
|
|
msg.prepare_payload();
|
|
handoff.response = std::make_shared<SimpleWriter>(msg);
|
|
return handoff;
|
|
}
|
|
|
|
// VFALCO TODO Rewrite to use boost::beast::http::fields
|
|
static
|
|
bool
|
|
authorized (
|
|
Port const& port,
|
|
std::map<std::string, std::string> const& h)
|
|
{
|
|
if (port.user.empty() || port.password.empty())
|
|
return true;
|
|
|
|
auto const it = h.find ("authorization");
|
|
if ((it == h.end ()) || (it->second.substr (0, 6) != "Basic "))
|
|
return false;
|
|
std::string strUserPass64 = it->second.substr (6);
|
|
boost::trim (strUserPass64);
|
|
std::string strUserPass = base64_decode (strUserPass64);
|
|
std::string::size_type nColon = strUserPass.find (":");
|
|
if (nColon == std::string::npos)
|
|
return false;
|
|
std::string strUser = strUserPass.substr (0, nColon);
|
|
std::string strPassword = strUserPass.substr (nColon + 1);
|
|
return strUser == port.user && strPassword == port.password;
|
|
}
|
|
|
|
|
|
ServerHandlerImp::ServerHandlerImp (Application& app, Stoppable& parent,
|
|
boost::asio::io_service& io_service, JobQueue& jobQueue,
|
|
NetworkOPs& networkOPs, Resource::Manager& resourceManager,
|
|
CollectorManager& cm)
|
|
: Stoppable("ServerHandler", parent)
|
|
, app_ (app)
|
|
, m_resourceManager (resourceManager)
|
|
, m_journal (app_.journal("Server"))
|
|
, m_networkOPs (networkOPs)
|
|
, m_server (make_Server(
|
|
*this, io_service, app_.journal("Server")))
|
|
, m_jobQueue (jobQueue)
|
|
{
|
|
auto const& group (cm.group ("rpc"));
|
|
rpc_requests_ = group->make_counter ("requests");
|
|
rpc_size_ = group->make_event ("size");
|
|
rpc_time_ = group->make_event ("time");
|
|
}
|
|
|
|
ServerHandlerImp::~ServerHandlerImp()
|
|
{
|
|
m_server = nullptr;
|
|
}
|
|
|
|
void
|
|
ServerHandlerImp::setup (Setup const& setup, beast::Journal journal)
|
|
{
|
|
setup_ = setup;
|
|
m_server->ports (setup.ports);
|
|
}
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
void
|
|
ServerHandlerImp::onStop()
|
|
{
|
|
m_server->close();
|
|
}
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
bool
|
|
ServerHandlerImp::onAccept (Session& session,
|
|
boost::asio::ip::tcp::endpoint endpoint)
|
|
{
|
|
std::lock_guard<std::mutex> lock(countlock_);
|
|
|
|
auto const c = ++count_[session.port()];
|
|
|
|
if (session.port().limit && c >= session.port().limit)
|
|
{
|
|
JLOG (m_journal.trace()) <<
|
|
session.port().name << " is full; dropping " <<
|
|
endpoint;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
Handoff
|
|
ServerHandlerImp::onHandoff(
|
|
Session& session,
|
|
std::unique_ptr<beast::asio::ssl_bundle>&& bundle,
|
|
http_request_type&& request,
|
|
boost::asio::ip::tcp::endpoint const& remote_address)
|
|
{
|
|
using namespace boost::beast;
|
|
auto const& p {session.port().protocol};
|
|
bool const is_ws {
|
|
p.count("ws") > 0 || p.count("ws2") > 0 ||
|
|
p.count("wss") > 0 || p.count("wss2") > 0};
|
|
|
|
if(websocket::is_upgrade(request))
|
|
{
|
|
if (!is_ws)
|
|
return statusRequestResponse(request, http::status::unauthorized);
|
|
|
|
std::shared_ptr<WSSession> ws;
|
|
try
|
|
{
|
|
ws = session.websocketUpgrade();
|
|
}
|
|
catch (std::exception const& e)
|
|
{
|
|
JLOG(m_journal.error())
|
|
<< "Exception upgrading websocket: " << e.what() << "\n";
|
|
return statusRequestResponse(request,
|
|
http::status::internal_server_error);
|
|
}
|
|
|
|
auto is {std::make_shared<WSInfoSub>(m_networkOPs, ws)};
|
|
is->getConsumer() = requestInboundEndpoint(
|
|
m_resourceManager,
|
|
beast::IPAddressConversion::from_asio(remote_address),
|
|
session.port(),
|
|
is->user());
|
|
ws->appDefined = std::move(is);
|
|
ws->run();
|
|
|
|
Handoff handoff;
|
|
handoff.moved = true;
|
|
return handoff;
|
|
}
|
|
|
|
if (bundle && p.count("peer") > 0)
|
|
return app_.overlay().onHandoff(std::move(bundle),
|
|
std::move(request), remote_address);
|
|
|
|
if (is_ws && isStatusRequest(request))
|
|
return statusResponse(request);
|
|
|
|
// Otherwise pass to legacy onRequest or websocket
|
|
return {};
|
|
}
|
|
|
|
static inline
|
|
Json::Output makeOutput (Session& session)
|
|
{
|
|
return [&](boost::beast::string_view const& b)
|
|
{
|
|
session.write (b.data(), b.size());
|
|
};
|
|
}
|
|
|
|
// HACK!
|
|
static
|
|
std::map<std::string, std::string>
|
|
build_map(boost::beast::http::fields const& h)
|
|
{
|
|
std::map <std::string, std::string> c;
|
|
for (auto const& e : h)
|
|
{
|
|
auto key (e.name_string().to_string());
|
|
// TODO Replace with safe C++14 version
|
|
std::transform (key.begin(), key.end(), key.begin(),
|
|
[](auto c)
|
|
{
|
|
return ::tolower(static_cast<unsigned char>(c));
|
|
});
|
|
c [key] = e.value().to_string();
|
|
}
|
|
return c;
|
|
}
|
|
|
|
template<class ConstBufferSequence>
|
|
static
|
|
std::string
|
|
buffers_to_string(ConstBufferSequence const& bs)
|
|
{
|
|
using boost::asio::buffer_cast;
|
|
using boost::asio::buffer_size;
|
|
std::string s;
|
|
s.reserve(buffer_size(bs));
|
|
for(auto const& b : bs)
|
|
s.append(buffer_cast<char const*>(b),
|
|
buffer_size(b));
|
|
return s;
|
|
}
|
|
|
|
void
|
|
ServerHandlerImp::onRequest (Session& session)
|
|
{
|
|
// Make sure RPC is enabled on the port
|
|
if (session.port().protocol.count("http") == 0 &&
|
|
session.port().protocol.count("https") == 0)
|
|
{
|
|
HTTPReply (403, "Forbidden", makeOutput (session), app_.journal ("RPC"));
|
|
session.close (true);
|
|
return;
|
|
}
|
|
|
|
// Check user/password authorization
|
|
if (! authorized (
|
|
session.port(), build_map(session.request())))
|
|
{
|
|
HTTPReply (403, "Forbidden", makeOutput (session), app_.journal ("RPC"));
|
|
session.close (true);
|
|
return;
|
|
}
|
|
|
|
std::shared_ptr<Session> detachedSession = session.detach();
|
|
auto const postResult = m_jobQueue.postCoro(jtCLIENT, "RPC-Client",
|
|
[this, detachedSession](std::shared_ptr<JobQueue::Coro> coro)
|
|
{
|
|
processSession(detachedSession, coro);
|
|
});
|
|
if (postResult == nullptr)
|
|
{
|
|
// The coroutine was rejected, probably because we're shutting down.
|
|
HTTPReply(503, "Service Unavailable",
|
|
makeOutput(*detachedSession), app_.journal("RPC"));
|
|
detachedSession->close(true);
|
|
return;
|
|
}
|
|
}
|
|
|
|
void
|
|
ServerHandlerImp::onWSMessage(
|
|
std::shared_ptr<WSSession> session,
|
|
std::vector<boost::asio::const_buffer> const& buffers)
|
|
{
|
|
Json::Value jv;
|
|
auto const size = boost::asio::buffer_size(buffers);
|
|
if (size > RPC::Tuning::maxRequestSize ||
|
|
! Json::Reader{}.parse(jv, buffers) ||
|
|
! jv.isObject())
|
|
{
|
|
Json::Value jvResult(Json::objectValue);
|
|
jvResult[jss::type] = jss::error;
|
|
jvResult[jss::error] = "jsonInvalid";
|
|
jvResult[jss::value] = buffers_to_string(buffers);
|
|
boost::beast::multi_buffer sb;
|
|
Json::stream(jvResult,
|
|
[&sb](auto const p, auto const n)
|
|
{
|
|
sb.commit(boost::asio::buffer_copy(
|
|
sb.prepare(n), boost::asio::buffer(p, n)));
|
|
});
|
|
JLOG(m_journal.trace())
|
|
<< "Websocket sending '" << jvResult << "'";
|
|
session->send(std::make_shared<
|
|
StreambufWSMsg<decltype(sb)>>(std::move(sb)));
|
|
session->complete();
|
|
return;
|
|
}
|
|
|
|
JLOG(m_journal.trace())
|
|
<< "Websocket received '" << jv << "'";
|
|
|
|
auto const postResult = m_jobQueue.postCoro(jtCLIENT, "WS-Client",
|
|
[this, session, jv = std::move(jv)]
|
|
(std::shared_ptr<JobQueue::Coro> const& coro)
|
|
{
|
|
auto const jr =
|
|
this->processSession(session, coro, jv);
|
|
auto const s = to_string(jr);
|
|
auto const n = s.length();
|
|
boost::beast::multi_buffer sb(n);
|
|
sb.commit(boost::asio::buffer_copy(
|
|
sb.prepare(n), boost::asio::buffer(s.c_str(), n)));
|
|
session->send(std::make_shared<
|
|
StreambufWSMsg<decltype(sb)>>(std::move(sb)));
|
|
session->complete();
|
|
});
|
|
if (postResult == nullptr)
|
|
{
|
|
// The coroutine was rejected, probably because we're shutting down.
|
|
session->close();
|
|
}
|
|
}
|
|
|
|
void
|
|
ServerHandlerImp::onClose (Session& session,
|
|
boost::system::error_code const&)
|
|
{
|
|
std::lock_guard<std::mutex> lock(countlock_);
|
|
--count_[session.port()];
|
|
}
|
|
|
|
void
|
|
ServerHandlerImp::onStopped (Server&)
|
|
{
|
|
stopped();
|
|
}
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
Json::Value
|
|
ServerHandlerImp::processSession(
|
|
std::shared_ptr<WSSession> const& session,
|
|
std::shared_ptr<JobQueue::Coro> const& coro,
|
|
Json::Value const& jv)
|
|
{
|
|
auto is = std::static_pointer_cast<WSInfoSub> (session->appDefined);
|
|
if (is->getConsumer().disconnect())
|
|
{
|
|
session->close();
|
|
// FIX: This rpcError is not delivered since the session
|
|
// was just closed.
|
|
return rpcError(rpcSLOW_DOWN);
|
|
}
|
|
|
|
// Requests without "command" are invalid.
|
|
Json::Value jr(Json::objectValue);
|
|
Resource::Charge loadType = Resource::feeReferenceRPC;
|
|
try
|
|
{
|
|
if ((!jv.isMember(jss::command) && !jv.isMember(jss::method)) ||
|
|
(jv.isMember(jss::command) && !jv[jss::command].isString()) ||
|
|
(jv.isMember(jss::method) && !jv[jss::method].isString()) ||
|
|
(jv.isMember(jss::command) && jv.isMember(jss::method) &&
|
|
jv[jss::command].asString() != jv[jss::method].asString()))
|
|
{
|
|
jr[jss::type] = jss::response;
|
|
jr[jss::status] = jss::error;
|
|
jr[jss::error] = jss::missingCommand;
|
|
jr[jss::request] = jv;
|
|
if (jv.isMember (jss::id))
|
|
jr[jss::id] = jv[jss::id];
|
|
if (jv.isMember(jss::jsonrpc))
|
|
jr[jss::jsonrpc] = jv[jss::jsonrpc];
|
|
if (jv.isMember(jss::ripplerpc))
|
|
jr[jss::ripplerpc] = jv[jss::ripplerpc];
|
|
|
|
is->getConsumer().charge(Resource::feeInvalidRPC);
|
|
return jr;
|
|
}
|
|
|
|
auto required = RPC::roleRequired(jv.isMember(jss::command) ?
|
|
jv[jss::command].asString() :
|
|
jv[jss::method].asString());
|
|
auto role = requestRole(
|
|
required,
|
|
session->port(),
|
|
jv,
|
|
beast::IP::from_asio(session->remote_endpoint().address()),
|
|
is->user());
|
|
if (Role::FORBID == role)
|
|
{
|
|
loadType = Resource::feeInvalidRPC;
|
|
jr[jss::result] = rpcError (rpcFORBIDDEN);
|
|
}
|
|
else
|
|
{
|
|
RPC::Context context{
|
|
app_.journal("RPCHandler"),
|
|
jv,
|
|
app_,
|
|
loadType,
|
|
app_.getOPs(),
|
|
app_.getLedgerMaster(),
|
|
is->getConsumer(),
|
|
role,
|
|
coro,
|
|
is,
|
|
{is->user(), is->forwarded_for()}
|
|
};
|
|
RPC::doCommand(context, jr[jss::result]);
|
|
}
|
|
}
|
|
catch (std::exception const& ex)
|
|
{
|
|
jr[jss::result] = RPC::make_error(rpcINTERNAL);
|
|
JLOG(m_journal.error())
|
|
<< "Exception while processing WS: " << ex.what() << "\n"
|
|
<< "Input JSON: " << Json::Compact{Json::Value{jv}};
|
|
}
|
|
|
|
is->getConsumer().charge(loadType);
|
|
if (is->getConsumer().warn())
|
|
jr[jss::warning] = jss::load;
|
|
|
|
// Currently we will simply unwrap errors returned by the RPC
|
|
// API, in the future maybe we can make the responses
|
|
// consistent.
|
|
//
|
|
// Regularize result. This is duplicate code.
|
|
if (jr[jss::result].isMember(jss::error))
|
|
{
|
|
jr = jr[jss::result];
|
|
jr[jss::status] = jss::error;
|
|
|
|
auto rq = jv;
|
|
|
|
if (rq.isObject())
|
|
{
|
|
if (rq.isMember(jss::passphrase.c_str()))
|
|
rq[jss::passphrase.c_str()] = "<masked>";
|
|
if (rq.isMember(jss::secret.c_str()))
|
|
rq[jss::secret.c_str()] = "<masked>";
|
|
if (rq.isMember(jss::seed.c_str()))
|
|
rq[jss::seed.c_str()] = "<masked>";
|
|
if (rq.isMember(jss::seed_hex.c_str()))
|
|
rq[jss::seed_hex.c_str()] = "<masked>";
|
|
}
|
|
|
|
jr[jss::request] = rq;
|
|
}
|
|
else
|
|
{
|
|
jr[jss::status] = jss::success;
|
|
|
|
// For testing resource limits on this connection.
|
|
if (is->getConsumer().isUnlimited() &&
|
|
jv[jss::command].isString() &&
|
|
jv[jss::command].asString() == "ping")
|
|
jr[jss::unlimited] = true;
|
|
}
|
|
|
|
if (jv.isMember(jss::id))
|
|
jr[jss::id] = jv[jss::id];
|
|
if (jv.isMember(jss::jsonrpc))
|
|
jr[jss::jsonrpc] = jv[jss::jsonrpc];
|
|
if (jv.isMember(jss::ripplerpc))
|
|
jr[jss::ripplerpc] = jv[jss::ripplerpc];
|
|
jr[jss::type] = jss::response;
|
|
return jr;
|
|
}
|
|
|
|
// Run as a coroutine.
|
|
void
|
|
ServerHandlerImp::processSession (std::shared_ptr<Session> const& session,
|
|
std::shared_ptr<JobQueue::Coro> coro)
|
|
{
|
|
processRequest (
|
|
session->port(), buffers_to_string(
|
|
session->request().body().data()),
|
|
session->remoteAddress().at_port (0),
|
|
makeOutput (*session), coro,
|
|
[&]
|
|
{
|
|
auto const iter =
|
|
session->request().find(
|
|
"X-Forwarded-For");
|
|
if(iter != session->request().end())
|
|
return iter->value().to_string();
|
|
return std::string{};
|
|
}(),
|
|
[&]
|
|
{
|
|
auto const iter =
|
|
session->request().find(
|
|
"X-User");
|
|
if(iter != session->request().end())
|
|
return iter->value().to_string();
|
|
return std::string{};
|
|
}());
|
|
|
|
if(beast::rfc2616::is_keep_alive(session->request()))
|
|
session->complete();
|
|
else
|
|
session->close (true);
|
|
}
|
|
|
|
static
|
|
Json::Value
|
|
make_json_error(Json::Int code, Json::Value&& message)
|
|
{
|
|
Json::Value sub{Json::objectValue};
|
|
sub["code"] = code;
|
|
sub["message"] = std::move(message);
|
|
Json::Value r{Json::objectValue};
|
|
r["error"] = sub;
|
|
return r;
|
|
}
|
|
|
|
Json::Int constexpr method_not_found = -32601;
|
|
Json::Int constexpr server_overloaded = -32604;
|
|
Json::Int constexpr forbidden = -32605;
|
|
|
|
void
|
|
ServerHandlerImp::processRequest (Port const& port,
|
|
std::string const& request, beast::IP::Endpoint const& remoteIPAddress,
|
|
Output&& output, std::shared_ptr<JobQueue::Coro> coro,
|
|
std::string forwardedFor, std::string user)
|
|
{
|
|
auto rpcJ = app_.journal ("RPC");
|
|
|
|
Json::Value jsonOrig;
|
|
{
|
|
Json::Reader reader;
|
|
if ((request.size () > RPC::Tuning::maxRequestSize) ||
|
|
! reader.parse (request, jsonOrig) ||
|
|
! jsonOrig ||
|
|
! jsonOrig.isObject ())
|
|
{
|
|
HTTPReply (400, "Unable to parse request: " +
|
|
reader.getFormatedErrorMessages(), output, rpcJ);
|
|
return;
|
|
}
|
|
}
|
|
|
|
bool batch = false;
|
|
unsigned size = 1;
|
|
if (jsonOrig.isMember(jss::method) && jsonOrig[jss::method] == "batch")
|
|
{
|
|
batch = true;
|
|
if(!jsonOrig.isMember(jss::params) || !jsonOrig[jss::params].isArray())
|
|
{
|
|
HTTPReply (400, "Malformed batch request", output, rpcJ);
|
|
return;
|
|
}
|
|
size = jsonOrig[jss::params].size();
|
|
}
|
|
|
|
Json::Value reply(batch ? Json::arrayValue : Json::objectValue);
|
|
auto const start (std::chrono::high_resolution_clock::now ());
|
|
for (unsigned i = 0; i < size; ++i)
|
|
{
|
|
Json::Value const& jsonRPC =
|
|
batch ? jsonOrig[jss::params][i] : jsonOrig;
|
|
|
|
if (!jsonRPC.isObject())
|
|
{
|
|
Json::Value r(Json::objectValue);
|
|
r[jss::request] = jsonRPC;
|
|
r[jss::error] = make_json_error(method_not_found, "Method not found");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
|
|
/* ------------------------------------------------------------------ */
|
|
auto role = Role::FORBID;
|
|
auto required = Role::FORBID;
|
|
if (jsonRPC.isMember(jss::method) && jsonRPC[jss::method].isString())
|
|
required = RPC::roleRequired(jsonRPC[jss::method].asString());
|
|
|
|
if (jsonRPC.isMember(jss::params) &&
|
|
jsonRPC[jss::params].isArray() &&
|
|
jsonRPC[jss::params].size() > 0 &&
|
|
jsonRPC[jss::params][Json::UInt(0)].isObjectOrNull())
|
|
{
|
|
role = requestRole(
|
|
required,
|
|
port,
|
|
jsonRPC[jss::params][Json::UInt(0)],
|
|
remoteIPAddress,
|
|
user);
|
|
}
|
|
else
|
|
{
|
|
role = requestRole(required, port, Json::objectValue,
|
|
remoteIPAddress, user);
|
|
}
|
|
|
|
Resource::Consumer usage;
|
|
if (isUnlimited(role))
|
|
{
|
|
usage = m_resourceManager.newUnlimitedEndpoint(
|
|
remoteIPAddress.to_string());
|
|
}
|
|
else
|
|
{
|
|
usage = m_resourceManager.newInboundEndpoint(remoteIPAddress);
|
|
if (usage.disconnect())
|
|
{
|
|
if (!batch)
|
|
{
|
|
HTTPReply(503, "Server is overloaded", output, rpcJ);
|
|
return;
|
|
}
|
|
Json::Value r = jsonRPC;
|
|
r[jss::error] = make_json_error(server_overloaded, "Server is overloaded");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
if (role == Role::FORBID)
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
if (!batch)
|
|
{
|
|
HTTPReply (403, "Forbidden", output, rpcJ);
|
|
return;
|
|
}
|
|
Json::Value r = jsonRPC;
|
|
r[jss::error] = make_json_error(forbidden, "Forbidden");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
|
|
if (!jsonRPC.isMember(jss::method) || jsonRPC[jss::method].isNull())
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
if (!batch)
|
|
{
|
|
HTTPReply (400, "Null method", output, rpcJ);
|
|
return;
|
|
}
|
|
Json::Value r = jsonRPC;
|
|
r[jss::error] = make_json_error(method_not_found, "Null method");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
|
|
Json::Value const& method = jsonRPC[jss::method];
|
|
if (! method.isString ())
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
if (!batch)
|
|
{
|
|
HTTPReply (400, "method is not string", output, rpcJ);
|
|
return;
|
|
}
|
|
Json::Value r = jsonRPC;
|
|
r[jss::error] = make_json_error(method_not_found, "method is not string");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
|
|
std::string strMethod = method.asString ();
|
|
if (strMethod.empty())
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
if (!batch)
|
|
{
|
|
HTTPReply (400, "method is empty", output, rpcJ);
|
|
return;
|
|
}
|
|
Json::Value r = jsonRPC;
|
|
r[jss::error] = make_json_error(method_not_found, "method is empty");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
|
|
// Extract request parameters from the request Json as `params`.
|
|
//
|
|
// If the field "params" is empty, `params` is an empty object.
|
|
//
|
|
// Otherwise, that field must be an array of length 1 (why?)
|
|
// and we take that first entry and validate that it's an object.
|
|
Json::Value params;
|
|
if (!batch)
|
|
{
|
|
params = jsonRPC [jss::params];
|
|
if (! params)
|
|
params = Json::Value (Json::objectValue);
|
|
|
|
else if (!params.isArray() || params.size() != 1)
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
HTTPReply (400, "params unparseable", output, rpcJ);
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
params = std::move (params[0u]);
|
|
if (!params.isObjectOrNull())
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
HTTPReply (400, "params unparseable", output, rpcJ);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
else // batch
|
|
{
|
|
params = jsonRPC;
|
|
}
|
|
|
|
std::string ripplerpc = "1.0";
|
|
if (params.isMember(jss::ripplerpc))
|
|
{
|
|
if (!params[jss::ripplerpc].isString())
|
|
{
|
|
usage.charge(Resource::feeInvalidRPC);
|
|
if (!batch)
|
|
{
|
|
HTTPReply(400, "ripplerpc is not a string", output, rpcJ);
|
|
return;
|
|
}
|
|
|
|
Json::Value r = jsonRPC;
|
|
r[jss::error] = make_json_error(
|
|
method_not_found, "ripplerpc is not a string");
|
|
reply.append(r);
|
|
continue;
|
|
}
|
|
ripplerpc = params[jss::ripplerpc].asString();
|
|
}
|
|
|
|
/**
|
|
* Clear header-assigned values if not positively identified from a
|
|
* secure_gateway.
|
|
*/
|
|
if (role != Role::IDENTIFIED)
|
|
{
|
|
forwardedFor.clear();
|
|
user.clear();
|
|
}
|
|
|
|
JLOG(m_journal.debug()) << "Query: " << strMethod << params;
|
|
|
|
// Provide the JSON-RPC method as the field "command" in the request.
|
|
params[jss::command] = strMethod;
|
|
JLOG (m_journal.trace())
|
|
<< "doRpcCommand:" << strMethod << ":" << params;
|
|
|
|
Resource::Charge loadType = Resource::feeReferenceRPC;
|
|
|
|
RPC::Context context {m_journal, params, app_, loadType, m_networkOPs,
|
|
app_.getLedgerMaster(), usage, role, coro, InfoSub::pointer(),
|
|
{user, forwardedFor}};
|
|
Json::Value result;
|
|
RPC::doCommand (context, result);
|
|
usage.charge (loadType);
|
|
if (usage.warn())
|
|
result[jss::warning] = jss::load;
|
|
|
|
Json::Value r(Json::objectValue);
|
|
if (ripplerpc >= "2.0")
|
|
{
|
|
if (result.isMember(jss::error))
|
|
{
|
|
result[jss::status] = jss::error;
|
|
result["code"] = result[jss::error_code];
|
|
result["message"] = result[jss::error_message];
|
|
result.removeMember(jss::error_message);
|
|
JLOG (m_journal.debug()) <<
|
|
"rpcError: " << result [jss::error] <<
|
|
": " << result [jss::error_message];
|
|
r[jss::error] = std::move(result);
|
|
}
|
|
else
|
|
{
|
|
result[jss::status] = jss::success;
|
|
r[jss::result] = std::move(result);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Always report "status". On an error report the request as received.
|
|
if (result.isMember (jss::error))
|
|
{
|
|
auto rq = params;
|
|
|
|
if (rq.isObject())
|
|
{ // But mask potentially sensitive information.
|
|
if (rq.isMember(jss::passphrase.c_str()))
|
|
rq[jss::passphrase.c_str()] = "<masked>";
|
|
if (rq.isMember(jss::secret.c_str()))
|
|
rq[jss::secret.c_str()] = "<masked>";
|
|
if (rq.isMember(jss::seed.c_str()))
|
|
rq[jss::seed.c_str()] = "<masked>";
|
|
if (rq.isMember(jss::seed_hex.c_str()))
|
|
rq[jss::seed_hex.c_str()] = "<masked>";
|
|
}
|
|
|
|
result[jss::status] = jss::error;
|
|
result[jss::request] = rq;
|
|
|
|
JLOG (m_journal.debug()) <<
|
|
"rpcError: " << result [jss::error] <<
|
|
": " << result [jss::error_message];
|
|
}
|
|
else
|
|
{
|
|
result[jss::status] = jss::success;
|
|
}
|
|
r[jss::result] = std::move(result);
|
|
}
|
|
|
|
if (params.isMember(jss::jsonrpc))
|
|
r[jss::jsonrpc] = params[jss::jsonrpc];
|
|
if (params.isMember(jss::ripplerpc))
|
|
r[jss::ripplerpc] = params[jss::ripplerpc];
|
|
if (params.isMember(jss::id))
|
|
r[jss::id] = params[jss::id];
|
|
if (batch)
|
|
reply.append(std::move(r));
|
|
else
|
|
reply = std::move(r);
|
|
}
|
|
auto response = to_string (reply);
|
|
|
|
rpc_time_.notify (
|
|
std::chrono::duration_cast <std::chrono::milliseconds> (
|
|
std::chrono::high_resolution_clock::now () - start));
|
|
++rpc_requests_;
|
|
rpc_size_.notify (beast::insight::Event::value_type{response.size()});
|
|
|
|
response += '\n';
|
|
|
|
if (auto stream = m_journal.debug())
|
|
{
|
|
static const int maxSize = 10000;
|
|
if (response.size() <= maxSize)
|
|
stream << "Reply: " << response;
|
|
else
|
|
stream << "Reply: " << response.substr (0, maxSize);
|
|
}
|
|
|
|
HTTPReply (200, response, output, rpcJ);
|
|
}
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
/* This response is used with load balancing.
|
|
If the server is overloaded, status 500 is reported. Otherwise status 200
|
|
is reported, meaning the server can accept more connections.
|
|
*/
|
|
Handoff
|
|
ServerHandlerImp::statusResponse(
|
|
http_request_type const& request) const
|
|
{
|
|
using namespace boost::beast::http;
|
|
Handoff handoff;
|
|
response<string_body> msg;
|
|
std::string reason;
|
|
if (app_.serverOkay(reason))
|
|
{
|
|
msg.result(boost::beast::http::status::ok);
|
|
msg.body() = "<!DOCTYPE html><html><head><title>" + systemName() +
|
|
" Test page for rippled</title></head><body><h1>" +
|
|
systemName() + " Test</h1><p>This page shows rippled http(s) "
|
|
"connectivity is working.</p></body></html>";
|
|
}
|
|
else
|
|
{
|
|
msg.result(boost::beast::http::status::internal_server_error);
|
|
msg.body() = "<HTML><BODY>Server cannot accept clients: " +
|
|
reason + "</BODY></HTML>";
|
|
}
|
|
msg.version(request.version());
|
|
msg.insert("Server", BuildInfo::getFullVersionString());
|
|
msg.insert("Content-Type", "text/html");
|
|
msg.insert("Connection", "close");
|
|
msg.prepare_payload();
|
|
handoff.response = std::make_shared<SimpleWriter>(msg);
|
|
return handoff;
|
|
}
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
void
|
|
ServerHandler::Setup::makeContexts()
|
|
{
|
|
for(auto& p : ports)
|
|
{
|
|
if (p.secure())
|
|
{
|
|
if (p.ssl_key.empty() && p.ssl_cert.empty() &&
|
|
p.ssl_chain.empty())
|
|
p.context = make_SSLContext(p.ssl_ciphers);
|
|
else
|
|
p.context = make_SSLContextAuthed (
|
|
p.ssl_key, p.ssl_cert, p.ssl_chain,
|
|
p.ssl_ciphers);
|
|
}
|
|
else
|
|
{
|
|
p.context = std::make_shared<
|
|
boost::asio::ssl::context>(
|
|
boost::asio::ssl::context::sslv23);
|
|
}
|
|
}
|
|
}
|
|
|
|
static
|
|
Port
|
|
to_Port(ParsedPort const& parsed, std::ostream& log)
|
|
{
|
|
Port p;
|
|
p.name = parsed.name;
|
|
|
|
if (! parsed.ip)
|
|
{
|
|
log << "Missing 'ip' in [" << p.name << "]";
|
|
Throw<std::exception> ();
|
|
}
|
|
p.ip = *parsed.ip;
|
|
|
|
if (! parsed.port)
|
|
{
|
|
log << "Missing 'port' in [" << p.name << "]";
|
|
Throw<std::exception> ();
|
|
}
|
|
else if (*parsed.port == 0)
|
|
{
|
|
log << "Port " << *parsed.port << "in [" << p.name << "] is invalid";
|
|
Throw<std::exception> ();
|
|
}
|
|
p.port = *parsed.port;
|
|
if (parsed.admin_ip)
|
|
p.admin_ip = *parsed.admin_ip;
|
|
if (parsed.secure_gateway_ip)
|
|
p.secure_gateway_ip = *parsed.secure_gateway_ip;
|
|
|
|
if (parsed.protocol.empty())
|
|
{
|
|
log << "Missing 'protocol' in [" << p.name << "]";
|
|
Throw<std::exception> ();
|
|
}
|
|
p.protocol = parsed.protocol;
|
|
|
|
p.user = parsed.user;
|
|
p.password = parsed.password;
|
|
p.admin_user = parsed.admin_user;
|
|
p.admin_password = parsed.admin_password;
|
|
p.ssl_key = parsed.ssl_key;
|
|
p.ssl_cert = parsed.ssl_cert;
|
|
p.ssl_chain = parsed.ssl_chain;
|
|
p.ssl_ciphers = parsed.ssl_ciphers;
|
|
p.pmd_options = parsed.pmd_options;
|
|
p.ws_queue_limit = parsed.ws_queue_limit;
|
|
p.limit = parsed.limit;
|
|
|
|
return p;
|
|
}
|
|
|
|
static
|
|
std::vector<Port>
|
|
parse_Ports (
|
|
Config const& config,
|
|
std::ostream& log)
|
|
{
|
|
std::vector<Port> result;
|
|
|
|
if (! config.exists("server"))
|
|
{
|
|
log <<
|
|
"Required section [server] is missing";
|
|
Throw<std::exception> ();
|
|
}
|
|
|
|
ParsedPort common;
|
|
parse_Port (common, config["server"], log);
|
|
|
|
auto const& names = config.section("server").values();
|
|
result.reserve(names.size());
|
|
for (auto const& name : names)
|
|
{
|
|
if (! config.exists(name))
|
|
{
|
|
log <<
|
|
"Missing section: [" << name << "]";
|
|
Throw<std::exception> ();
|
|
}
|
|
ParsedPort parsed = common;
|
|
parsed.name = name;
|
|
parse_Port(parsed, config[name], log);
|
|
result.push_back(to_Port(parsed, log));
|
|
}
|
|
|
|
if (config.standalone())
|
|
{
|
|
auto it = result.begin ();
|
|
|
|
while (it != result.end())
|
|
{
|
|
auto& p = it->protocol;
|
|
|
|
// Remove the peer protocol, and if that would
|
|
// leave the port empty, remove the port as well
|
|
if (p.erase ("peer") && p.empty())
|
|
it = result.erase (it);
|
|
else
|
|
++it;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
auto const count = std::count_if (
|
|
result.cbegin(), result.cend(),
|
|
[](Port const& p)
|
|
{
|
|
return p.protocol.count("peer") != 0;
|
|
});
|
|
|
|
if (count > 1)
|
|
{
|
|
log << "Error: More than one peer protocol configured in [server]";
|
|
Throw<std::exception> ();
|
|
}
|
|
|
|
if (count == 0)
|
|
log << "Warning: No peer protocol configured";
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
// Fill out the client portion of the Setup
|
|
static
|
|
void
|
|
setup_Client (ServerHandler::Setup& setup)
|
|
{
|
|
decltype(setup.ports)::const_iterator iter;
|
|
for (iter = setup.ports.cbegin();
|
|
iter != setup.ports.cend(); ++iter)
|
|
if (iter->protocol.count("http") > 0 ||
|
|
iter->protocol.count("https") > 0)
|
|
break;
|
|
if (iter == setup.ports.cend())
|
|
return;
|
|
setup.client.secure =
|
|
iter->protocol.count("https") > 0;
|
|
setup.client.ip =
|
|
beast::IP::is_unspecified(iter->ip) ?
|
|
// VFALCO HACK! to make localhost work
|
|
(iter->ip.is_v6() ? "::1" : "127.0.0.1") :
|
|
iter->ip.to_string();
|
|
setup.client.port = iter->port;
|
|
setup.client.user = iter->user;
|
|
setup.client.password = iter->password;
|
|
setup.client.admin_user = iter->admin_user;
|
|
setup.client.admin_password = iter->admin_password;
|
|
}
|
|
|
|
// Fill out the overlay portion of the Setup
|
|
static
|
|
void
|
|
setup_Overlay (ServerHandler::Setup& setup)
|
|
{
|
|
auto const iter = std::find_if(
|
|
setup.ports.cbegin(), setup.ports.cend(),
|
|
[](Port const& port)
|
|
{
|
|
return port.protocol.count("peer") != 0;
|
|
});
|
|
if (iter == setup.ports.cend())
|
|
{
|
|
setup.overlay.port = 0;
|
|
return;
|
|
}
|
|
setup.overlay.ip = iter->ip;
|
|
setup.overlay.port = iter->port;
|
|
}
|
|
|
|
ServerHandler::Setup
|
|
setup_ServerHandler(
|
|
Config const& config,
|
|
std::ostream&& log)
|
|
{
|
|
ServerHandler::Setup setup;
|
|
setup.ports = parse_Ports(config, log);
|
|
|
|
setup_Client(setup);
|
|
setup_Overlay(setup);
|
|
|
|
return setup;
|
|
}
|
|
|
|
std::unique_ptr <ServerHandler>
|
|
make_ServerHandler (Application& app, Stoppable& parent,
|
|
boost::asio::io_service& io_service, JobQueue& jobQueue,
|
|
NetworkOPs& networkOPs, Resource::Manager& resourceManager,
|
|
CollectorManager& cm)
|
|
{
|
|
return std::make_unique<ServerHandlerImp>(app, parent,
|
|
io_service, jobQueue, networkOPs, resourceManager, cm);
|
|
}
|
|
|
|
} // ripple
|