/tmp/bitcoin/src/httpserver.cpp
Line | Count | Source |
1 | | // Copyright (c) 2015-present The Bitcoin Core developers |
2 | | // Distributed under the MIT software license, see the accompanying |
3 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
4 | | |
5 | | #include <httpserver.h> |
6 | | |
7 | | #include <chainparamsbase.h> |
8 | | #include <common/args.h> |
9 | | #include <common/messages.h> |
10 | | #include <compat/compat.h> |
11 | | #include <logging.h> |
12 | | #include <netbase.h> |
13 | | #include <node/interface_ui.h> |
14 | | #include <rpc/protocol.h> |
15 | | #include <sync.h> |
16 | | #include <util/check.h> |
17 | | #include <util/signalinterrupt.h> |
18 | | #include <util/strencodings.h> |
19 | | #include <util/threadnames.h> |
20 | | #include <util/threadpool.h> |
21 | | #include <util/translation.h> |
22 | | |
23 | | #include <condition_variable> |
24 | | #include <cstdio> |
25 | | #include <cstdlib> |
26 | | #include <deque> |
27 | | #include <memory> |
28 | | #include <optional> |
29 | | #include <span> |
30 | | #include <string> |
31 | | #include <thread> |
32 | | #include <unordered_map> |
33 | | #include <vector> |
34 | | |
35 | | #include <sys/types.h> |
36 | | #include <sys/stat.h> |
37 | | |
38 | | #include <event2/buffer.h> |
39 | | #include <event2/bufferevent.h> |
40 | | #include <event2/http.h> |
41 | | #include <event2/http_struct.h> |
42 | | #include <event2/keyvalq_struct.h> |
43 | | #include <event2/thread.h> |
44 | | #include <event2/util.h> |
45 | | |
46 | | #include <support/events.h> |
47 | | |
48 | | using common::InvalidPortErrMsg; |
49 | | |
50 | | /** Maximum size of http request (request line + headers) */ |
51 | | static const size_t MAX_HEADERS_SIZE = 8192; |
52 | | |
53 | | struct HTTPPathHandler |
54 | | { |
55 | | HTTPPathHandler(std::string _prefix, bool _exactMatch, HTTPRequestHandler _handler): |
56 | 2.17k | prefix(_prefix), exactMatch(_exactMatch), handler(_handler) |
57 | 2.17k | { |
58 | 2.17k | } |
59 | | std::string prefix; |
60 | | bool exactMatch; |
61 | | HTTPRequestHandler handler; |
62 | | }; |
63 | | |
64 | | /** HTTP module state */ |
65 | | |
66 | | //! libevent event loop |
67 | | static struct event_base* eventBase = nullptr; |
68 | | //! HTTP server |
69 | | static struct evhttp* eventHTTP = nullptr; |
70 | | //! List of subnets to allow RPC connections from |
71 | | static std::vector<CSubNet> rpc_allow_subnets; |
72 | | //! Handlers for (sub)paths |
73 | | static GlobalMutex g_httppathhandlers_mutex; |
74 | | static std::vector<HTTPPathHandler> pathHandlers GUARDED_BY(g_httppathhandlers_mutex); |
75 | | //! Bound listening sockets |
76 | | static std::vector<evhttp_bound_socket *> boundSockets; |
77 | | //! Http thread pool - future: encapsulate in HttpContext |
78 | | static ThreadPool g_threadpool_http("http"); |
79 | | static int g_max_queue_depth{100}; |
80 | | |
81 | | /** |
82 | | * @brief Helps keep track of open `evhttp_connection`s with active `evhttp_requests` |
83 | | * |
84 | | */ |
85 | | class HTTPRequestTracker |
86 | | { |
87 | | private: |
88 | | mutable Mutex m_mutex; |
89 | | mutable std::condition_variable m_cv; |
90 | | //! For each connection, keep a counter of how many requests are open |
91 | | std::unordered_map<const evhttp_connection*, size_t> m_tracker GUARDED_BY(m_mutex); |
92 | | |
93 | | void RemoveConnectionInternal(const decltype(m_tracker)::iterator it) EXCLUSIVE_LOCKS_REQUIRED(m_mutex) |
94 | 171k | { |
95 | 171k | m_tracker.erase(it); |
96 | 171k | if (m_tracker.empty()) m_cv.notify_all(); |
97 | 171k | } |
98 | | public: |
99 | | //! Increase request counter for the associated connection by 1 |
100 | | void AddRequest(evhttp_request* req) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex) |
101 | 171k | { |
102 | 171k | const evhttp_connection* conn{Assert(evhttp_request_get_connection(Assert(req)))}; |
103 | 171k | WITH_LOCK(m_mutex, ++m_tracker[conn]); |
104 | 171k | } |
105 | | //! Decrease request counter for the associated connection by 1, remove connection if counter is 0 |
106 | | void RemoveRequest(evhttp_request* req) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex) |
107 | 171k | { |
108 | 171k | const evhttp_connection* conn{Assert(evhttp_request_get_connection(Assert(req)))}; |
109 | 171k | LOCK(m_mutex); |
110 | 171k | auto it{m_tracker.find(conn)}; |
111 | 171k | if (it != m_tracker.end() && it->second > 0) { |
112 | 171k | if (--(it->second) == 0) RemoveConnectionInternal(it); |
113 | 171k | } |
114 | 171k | } |
115 | | //! Remove a connection entirely |
116 | | void RemoveConnection(const evhttp_connection* conn) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex) |
117 | 3.19k | { |
118 | 3.19k | LOCK(m_mutex); |
119 | 3.19k | auto it{m_tracker.find(Assert(conn))}; |
120 | 3.19k | if (it != m_tracker.end()) RemoveConnectionInternal(it); |
121 | 3.19k | } |
122 | | size_t CountActiveConnections() const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex) |
123 | 1.13k | { |
124 | 1.13k | return WITH_LOCK(m_mutex, return m_tracker.size()); |
125 | 1.13k | } |
126 | | //! Wait until there are no more connections with active requests in the tracker |
127 | | void WaitUntilEmpty() const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex) |
128 | 1.13k | { |
129 | 1.13k | WAIT_LOCK(m_mutex, lock); |
130 | 1.15k | m_cv.wait(lock, [this]() EXCLUSIVE_LOCKS_REQUIRED(m_mutex) { return m_tracker.empty(); }); |
131 | 1.13k | } |
132 | | }; |
133 | | //! Track active requests |
134 | | static HTTPRequestTracker g_requests; |
135 | | |
136 | | /** Check if a network address is allowed to access the HTTP server */ |
137 | | static bool ClientAllowed(const CNetAddr& netaddr) |
138 | 171k | { |
139 | 171k | if (!netaddr.IsValid()) |
140 | 0 | return false; |
141 | 171k | for(const CSubNet& subnet : rpc_allow_subnets) |
142 | 171k | if (subnet.Match(netaddr)) |
143 | 171k | return true; |
144 | 1 | return false; |
145 | 171k | } |
146 | | |
147 | | /** Initialize ACL list for HTTP server */ |
148 | | static bool InitHTTPAllowList() |
149 | 1.09k | { |
150 | 1.09k | rpc_allow_subnets.clear(); |
151 | 1.09k | rpc_allow_subnets.emplace_back(LookupHost("127.0.0.1", false).value(), 8); // always allow IPv4 local subnet |
152 | 1.09k | rpc_allow_subnets.emplace_back(LookupHost("::1", false).value()); // always allow IPv6 localhost |
153 | 1.09k | for (const std::string& strAllow : gArgs.GetArgs("-rpcallowip")) { |
154 | 13 | const CSubNet subnet{LookupSubNet(strAllow)}; |
155 | 13 | if (!subnet.IsValid()) { |
156 | 1 | uiInterface.ThreadSafeMessageBox( |
157 | 1 | Untranslated(strprintf("Invalid -rpcallowip subnet specification: %s. Valid values are a single IP (e.g. 1.2.3.4), a network/netmask (e.g. 1.2.3.4/255.255.255.0), a network/CIDR (e.g. 1.2.3.4/24), all ipv4 (0.0.0.0/0), or all ipv6 (::/0). RFC4193 is allowed only if -cjdnsreachable=0.", strAllow)), |
158 | 1 | CClientUIInterface::MSG_ERROR); |
159 | 1 | return false; |
160 | 1 | } |
161 | 12 | rpc_allow_subnets.push_back(subnet); |
162 | 12 | } |
163 | 1.09k | std::string strAllowed; |
164 | 1.09k | for (const CSubNet& subnet : rpc_allow_subnets) |
165 | 2.20k | strAllowed += subnet.ToString() + " "; |
166 | 1.09k | LogDebug(BCLog::HTTP, "Allowing HTTP connections from: %s\n", strAllowed); |
167 | 1.09k | return true; |
168 | 1.09k | } |
169 | | |
170 | | /** HTTP request method as string - use for logging only */ |
171 | | std::string RequestMethodString(HTTPRequest::RequestMethod m) |
172 | 171k | { |
173 | 171k | switch (m) { |
174 | 743 | case HTTPRequest::GET: |
175 | 743 | return "GET"; |
176 | 170k | case HTTPRequest::POST: |
177 | 170k | return "POST"; |
178 | 0 | case HTTPRequest::HEAD: |
179 | 0 | return "HEAD"; |
180 | 0 | case HTTPRequest::PUT: |
181 | 0 | return "PUT"; |
182 | 0 | case HTTPRequest::UNKNOWN: |
183 | 0 | return "unknown"; |
184 | 171k | } // no default case, so the compiler can warn about missing cases |
185 | 171k | assert(false); |
186 | 0 | } |
187 | | |
188 | | /** HTTP request callback */ |
189 | | static void http_request_cb(struct evhttp_request* req, void* arg) |
190 | 171k | { |
191 | 171k | evhttp_connection* conn{evhttp_request_get_connection(req)}; |
192 | | // Track active requests |
193 | 171k | { |
194 | 171k | g_requests.AddRequest(req); |
195 | 171k | evhttp_request_set_on_complete_cb(req, [](struct evhttp_request* req, void*) { |
196 | 171k | g_requests.RemoveRequest(req); |
197 | 171k | }, nullptr); |
198 | 171k | evhttp_connection_set_closecb(conn, [](evhttp_connection* conn, void* arg) { |
199 | 3.19k | g_requests.RemoveConnection(conn); |
200 | 3.19k | }, nullptr); |
201 | 171k | } |
202 | | |
203 | | // Disable reading to work around a libevent bug, fixed in 2.1.9 |
204 | | // See https://github.com/libevent/libevent/commit/5ff8eb26371c4dc56f384b2de35bea2d87814779 |
205 | | // and https://github.com/bitcoin/bitcoin/pull/11593. |
206 | 171k | if (event_get_version_number() >= 0x02010600 && event_get_version_number() < 0x02010900) { |
207 | 0 | if (conn) { |
208 | 0 | bufferevent* bev = evhttp_connection_get_bufferevent(conn); |
209 | 0 | if (bev) { |
210 | 0 | bufferevent_disable(bev, EV_READ); |
211 | 0 | } |
212 | 0 | } |
213 | 0 | } |
214 | 171k | auto hreq{std::make_shared<HTTPRequest>(req, *static_cast<const util::SignalInterrupt*>(arg))}; |
215 | | |
216 | | // Early address-based allow check |
217 | 171k | if (!ClientAllowed(hreq->GetPeer())) { |
218 | 1 | LogDebug(BCLog::HTTP, "HTTP request from %s rejected: Client network is not allowed RPC access\n", |
219 | 1 | hreq->GetPeer().ToStringAddrPort()); |
220 | 1 | hreq->WriteReply(HTTP_FORBIDDEN); |
221 | 1 | return; |
222 | 1 | } |
223 | | |
224 | | // Early reject unknown HTTP methods |
225 | 171k | if (hreq->GetRequestMethod() == HTTPRequest::UNKNOWN) { |
226 | 0 | LogDebug(BCLog::HTTP, "HTTP request from %s rejected: Unknown HTTP request method\n", |
227 | 0 | hreq->GetPeer().ToStringAddrPort()); |
228 | 0 | hreq->WriteReply(HTTP_BAD_METHOD); |
229 | 0 | return; |
230 | 0 | } |
231 | | |
232 | 171k | LogDebug(BCLog::HTTP, "Received a %s request for %s from %s\n", |
233 | 171k | RequestMethodString(hreq->GetRequestMethod()), SanitizeString(hreq->GetURI(), SAFE_CHARS_URI).substr(0, 100), hreq->GetPeer().ToStringAddrPort()); |
234 | | |
235 | | // Find registered handler for prefix |
236 | 171k | std::string strURI = hreq->GetURI(); |
237 | 171k | std::string path; |
238 | 171k | LOCK(g_httppathhandlers_mutex); |
239 | 171k | std::vector<HTTPPathHandler>::const_iterator i = pathHandlers.begin(); |
240 | 171k | std::vector<HTTPPathHandler>::const_iterator iend = pathHandlers.end(); |
241 | 196k | for (; i != iend; ++i) { |
242 | 196k | bool match = false; |
243 | 196k | if (i->exactMatch) |
244 | 171k | match = (strURI == i->prefix); |
245 | 25.7k | else |
246 | 25.7k | match = strURI.starts_with(i->prefix); |
247 | 196k | if (match) { |
248 | 171k | path = strURI.substr(i->prefix.size()); |
249 | 171k | break; |
250 | 171k | } |
251 | 196k | } |
252 | | |
253 | | // Dispatch to worker thread |
254 | 171k | if (i != iend) { |
255 | 171k | if (static_cast<int>(g_threadpool_http.WorkQueueSize()) >= g_max_queue_depth) { |
256 | 1 | LogWarning("Request rejected because http work queue depth exceeded, it can be increased with the -rpcworkqueue= setting"); |
257 | 1 | hreq->WriteReply(HTTP_SERVICE_UNAVAILABLE, "Work queue depth exceeded"); |
258 | 1 | return; |
259 | 1 | } |
260 | | |
261 | 171k | auto item = [req = hreq, in_path = std::move(path), fn = i->handler]() { |
262 | 171k | std::string err_msg; |
263 | 171k | try { |
264 | 171k | fn(req.get(), in_path); |
265 | 171k | return; |
266 | 171k | } catch (const std::exception& e) { |
267 | 0 | LogWarning("Unexpected error while processing request for '%s'. Error msg: '%s'", req->GetURI(), e.what()); |
268 | 0 | err_msg = e.what(); |
269 | 0 | } catch (...) { |
270 | 0 | LogWarning("Unknown error while processing request for '%s'", req->GetURI()); |
271 | 0 | err_msg = "unknown error"; |
272 | 0 | } |
273 | | // Reply so the client doesn't hang waiting for the response. |
274 | 0 | req->WriteHeader("Connection", "close"); |
275 | | // TODO: Implement specific error formatting for the REST and JSON-RPC servers responses. |
276 | 0 | req->WriteReply(HTTP_INTERNAL_SERVER_ERROR, err_msg); |
277 | 0 | }; |
278 | | |
279 | 171k | if (auto res = g_threadpool_http.Submit(std::move(item)); !res.has_value()) { |
280 | 0 | Assume(hreq.use_count() == 1); // ensure request will be deleted |
281 | | // Both SubmitError::Inactive and SubmitError::Interrupted mean shutdown |
282 | 0 | LogWarning("HTTP request rejected during server shutdown: '%s'", SubmitErrorString(res.error())); |
283 | 0 | hreq->WriteReply(HTTP_SERVICE_UNAVAILABLE, "Request rejected during server shutdown"); |
284 | 0 | return; |
285 | 0 | } |
286 | 171k | } else { |
287 | 3 | hreq->WriteReply(HTTP_NOT_FOUND); |
288 | 3 | } |
289 | 171k | } |
290 | | |
291 | | /** Callback to reject HTTP requests after shutdown. */ |
292 | | static void http_reject_request_cb(struct evhttp_request* req, void*) |
293 | 0 | { |
294 | 0 | LogDebug(BCLog::HTTP, "Rejecting request while shutting down\n"); |
295 | 0 | evhttp_send_error(req, HTTP_SERVUNAVAIL, nullptr); |
296 | 0 | } |
297 | | |
298 | | /** Event dispatcher thread */ |
299 | | static void ThreadHTTP(struct event_base* base) |
300 | 1.08k | { |
301 | 1.08k | util::ThreadRename("http"); |
302 | 1.08k | LogDebug(BCLog::HTTP, "Entering http event loop\n"); |
303 | 1.08k | event_base_dispatch(base); |
304 | | // Event loop will be interrupted by InterruptHTTPServer() |
305 | 1.08k | LogDebug(BCLog::HTTP, "Exited http event loop\n"); |
306 | 1.08k | } |
307 | | |
308 | | /** Bind HTTP server to specified addresses */ |
309 | | static bool HTTPBindAddresses(struct evhttp* http) |
310 | 1.09k | { |
311 | 1.09k | uint16_t http_port{static_cast<uint16_t>(gArgs.GetIntArg("-rpcport", BaseParams().RPCPort()))}; |
312 | 1.09k | std::vector<std::pair<std::string, uint16_t>> endpoints; |
313 | | |
314 | | // Determine what addresses to bind to |
315 | | // To prevent misconfiguration and accidental exposure of the RPC |
316 | | // interface, require -rpcallowip and -rpcbind to both be specified |
317 | | // together. If either is missing, ignore both values, bind to localhost |
318 | | // instead, and log warnings. |
319 | 1.09k | if (gArgs.GetArgs("-rpcallowip").empty() || gArgs.GetArgs("-rpcbind").empty()) { // Default to loopback if not allowing external IPs |
320 | 1.08k | endpoints.emplace_back("::1", http_port); |
321 | 1.08k | endpoints.emplace_back("127.0.0.1", http_port); |
322 | 1.08k | if (!gArgs.GetArgs("-rpcallowip").empty()) { |
323 | 3 | LogWarning("Option -rpcallowip was specified without -rpcbind; this doesn't usually make sense"); |
324 | 3 | } |
325 | 1.08k | if (!gArgs.GetArgs("-rpcbind").empty()) { |
326 | 0 | LogWarning("Option -rpcbind was ignored because -rpcallowip was not specified, refusing to allow everyone to connect"); |
327 | 0 | } |
328 | 1.08k | } else { // Specific bind addresses |
329 | 14 | for (const std::string& strRPCBind : gArgs.GetArgs("-rpcbind")) { |
330 | 14 | uint16_t port{http_port}; |
331 | 14 | std::string host; |
332 | 14 | if (!SplitHostPort(strRPCBind, port, host)) { |
333 | 0 | LogError("%s\n", InvalidPortErrMsg("-rpcbind", strRPCBind).original); |
334 | 0 | return false; |
335 | 0 | } |
336 | 14 | endpoints.emplace_back(host, port); |
337 | 14 | } |
338 | 9 | } |
339 | | |
340 | | // Bind addresses |
341 | 3.27k | for (std::vector<std::pair<std::string, uint16_t> >::iterator i = endpoints.begin(); i != endpoints.end(); ++i) { |
342 | 2.18k | LogInfo("Binding RPC on address %s port %i", i->first, i->second); |
343 | 2.18k | evhttp_bound_socket *bind_handle = evhttp_bind_socket_with_handle(http, i->first.empty() ? nullptr : i->first.c_str(), i->second); |
344 | 2.18k | if (bind_handle) { |
345 | 2.18k | const std::optional<CNetAddr> addr{LookupHost(i->first, false)}; |
346 | 2.18k | if (i->first.empty() || (addr.has_value() && addr->IsBindAny())) { |
347 | 0 | LogWarning("The RPC server is not safe to expose to untrusted networks such as the public internet"); |
348 | 0 | } |
349 | | // Set the no-delay option (disable Nagle's algorithm) on the TCP socket. |
350 | 2.18k | evutil_socket_t fd = evhttp_bound_socket_get_fd(bind_handle); |
351 | 2.18k | int one = 1; |
352 | 2.18k | if (setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, reinterpret_cast<char*>(&one), sizeof(one)) == SOCKET_ERROR) { |
353 | 0 | LogInfo("WARNING: Unable to set TCP_NODELAY on RPC server socket, continuing anyway\n"); |
354 | 0 | } |
355 | 2.18k | boundSockets.push_back(bind_handle); |
356 | 2.18k | } else { |
357 | 0 | LogWarning("Binding RPC on address %s port %i failed.", i->first, i->second); |
358 | 0 | } |
359 | 2.18k | } |
360 | 1.09k | return !boundSockets.empty(); |
361 | 1.09k | } |
362 | | |
363 | | /** libevent event log callback */ |
364 | | static void libevent_log_cb(int severity, const char *msg) |
365 | 0 | { |
366 | 0 | switch (severity) { |
367 | 0 | case EVENT_LOG_DEBUG: |
368 | 0 | LogDebug(BCLog::LIBEVENT, "%s", msg); |
369 | 0 | break; |
370 | 0 | case EVENT_LOG_MSG: |
371 | 0 | LogInfo("libevent: %s", msg); |
372 | 0 | break; |
373 | 0 | case EVENT_LOG_WARN: |
374 | 0 | LogWarning("libevent: %s", msg); |
375 | 0 | break; |
376 | 0 | default: // EVENT_LOG_ERR and others are mapped to error |
377 | 0 | LogError("libevent: %s", msg); |
378 | 0 | break; |
379 | 0 | } |
380 | 0 | } |
381 | | |
382 | | bool InitHTTPServer(const util::SignalInterrupt& interrupt) |
383 | 1.09k | { |
384 | 1.09k | if (!InitHTTPAllowList()) |
385 | 1 | return false; |
386 | | |
387 | | // Redirect libevent's logging to our own log |
388 | 1.09k | event_set_log_callback(&libevent_log_cb); |
389 | | // Update libevent's log handling. |
390 | 1.09k | UpdateHTTPServerLogging(LogInstance().WillLogCategory(BCLog::LIBEVENT)); |
391 | | |
392 | | #ifdef WIN32 |
393 | | evthread_use_windows_threads(); |
394 | | #else |
395 | 1.09k | evthread_use_pthreads(); |
396 | 1.09k | #endif |
397 | | |
398 | 1.09k | raii_event_base base_ctr = obtain_event_base(); |
399 | | |
400 | | /* Create a new evhttp object to handle requests. */ |
401 | 1.09k | raii_evhttp http_ctr = obtain_evhttp(base_ctr.get()); |
402 | 1.09k | struct evhttp* http = http_ctr.get(); |
403 | 1.09k | if (!http) { |
404 | 0 | LogError("Couldn't create evhttp. Exiting."); |
405 | 0 | return false; |
406 | 0 | } |
407 | | |
408 | 1.09k | evhttp_set_timeout(http, gArgs.GetIntArg("-rpcservertimeout", DEFAULT_HTTP_SERVER_TIMEOUT)); |
409 | 1.09k | evhttp_set_max_headers_size(http, MAX_HEADERS_SIZE); |
410 | 1.09k | evhttp_set_max_body_size(http, MAX_SIZE); |
411 | 1.09k | evhttp_set_gencb(http, http_request_cb, (void*)&interrupt); |
412 | | |
413 | 1.09k | if (!HTTPBindAddresses(http)) { |
414 | 0 | LogError("Unable to bind any endpoint for RPC server"); |
415 | 0 | return false; |
416 | 0 | } |
417 | | |
418 | 1.09k | LogDebug(BCLog::HTTP, "Initialized HTTP server\n"); |
419 | 1.09k | g_max_queue_depth = std::max(gArgs.GetArg("-rpcworkqueue", DEFAULT_HTTP_WORKQUEUE), 1); |
420 | 1.09k | LogDebug(BCLog::HTTP, "set work queue of depth %d", g_max_queue_depth); |
421 | | |
422 | | // transfer ownership to eventBase/HTTP via .release() |
423 | 1.09k | eventBase = base_ctr.release(); |
424 | 1.09k | eventHTTP = http_ctr.release(); |
425 | 1.09k | return true; |
426 | 1.09k | } |
427 | | |
428 | 1.09k | void UpdateHTTPServerLogging(bool enable) { |
429 | 1.09k | if (enable) { |
430 | 0 | event_enable_debug_logging(EVENT_DBG_ALL); |
431 | 1.09k | } else { |
432 | 1.09k | event_enable_debug_logging(EVENT_DBG_NONE); |
433 | 1.09k | } |
434 | 1.09k | } |
435 | | |
436 | | static std::thread g_thread_http; |
437 | | |
438 | | void StartHTTPServer() |
439 | 1.08k | { |
440 | 1.08k | int rpcThreads = std::max(gArgs.GetArg("-rpcthreads", DEFAULT_HTTP_THREADS), 1); |
441 | 1.08k | LogInfo("Starting HTTP server with %d worker threads", rpcThreads); |
442 | 1.08k | g_threadpool_http.Start(rpcThreads); |
443 | 1.08k | g_thread_http = std::thread(ThreadHTTP, eventBase); |
444 | 1.08k | } |
445 | | |
446 | | void InterruptHTTPServer() |
447 | 1.13k | { |
448 | 1.13k | LogDebug(BCLog::HTTP, "Interrupting HTTP server\n"); |
449 | 1.13k | if (eventHTTP) { |
450 | | // Reject requests on current connections |
451 | 1.09k | evhttp_set_gencb(eventHTTP, http_reject_request_cb, nullptr); |
452 | 1.09k | } |
453 | | // Interrupt pool after disabling requests |
454 | 1.13k | g_threadpool_http.Interrupt(); |
455 | 1.13k | } |
456 | | |
457 | | void StopHTTPServer() |
458 | 1.13k | { |
459 | 1.13k | LogDebug(BCLog::HTTP, "Stopping HTTP server\n"); |
460 | | |
461 | 1.13k | LogDebug(BCLog::HTTP, "Waiting for HTTP worker threads to exit\n"); |
462 | 1.13k | g_threadpool_http.Stop(); |
463 | | |
464 | | // Unlisten sockets, these are what make the event loop running, which means |
465 | | // that after this and all connections are closed the event loop will quit. |
466 | 2.18k | for (evhttp_bound_socket *socket : boundSockets) { |
467 | 2.18k | evhttp_del_accept_socket(eventHTTP, socket); |
468 | 2.18k | } |
469 | 1.13k | boundSockets.clear(); |
470 | 1.13k | { |
471 | 1.13k | if (const auto n_connections{g_requests.CountActiveConnections()}; n_connections != 0) { |
472 | 21 | LogDebug(BCLog::HTTP, "Waiting for %d connections to stop HTTP server\n", n_connections); |
473 | 21 | } |
474 | 1.13k | g_requests.WaitUntilEmpty(); |
475 | 1.13k | } |
476 | 1.13k | if (eventHTTP) { |
477 | | // Schedule a callback to call evhttp_free in the event base thread, so |
478 | | // that evhttp_free does not need to be called again after the handling |
479 | | // of unfinished request connections that follows. |
480 | 1.09k | event_base_once(eventBase, -1, EV_TIMEOUT, [](evutil_socket_t, short, void*) { |
481 | 539 | evhttp_free(eventHTTP); |
482 | 539 | eventHTTP = nullptr; |
483 | 539 | }, nullptr, nullptr); |
484 | 1.09k | } |
485 | 1.13k | if (eventBase) { |
486 | 1.09k | LogDebug(BCLog::HTTP, "Waiting for HTTP event thread to exit\n"); |
487 | 1.09k | if (g_thread_http.joinable()) g_thread_http.join(); |
488 | 1.09k | event_base_free(eventBase); |
489 | 1.09k | eventBase = nullptr; |
490 | 1.09k | } |
491 | 1.13k | LogDebug(BCLog::HTTP, "Stopped HTTP server\n"); |
492 | 1.13k | } |
493 | | |
494 | | struct event_base* EventBase() |
495 | 1.08k | { |
496 | 1.08k | return eventBase; |
497 | 1.08k | } |
498 | | |
499 | | static void httpevent_callback_fn(evutil_socket_t, short, void* data) |
500 | 171k | { |
501 | | // Static handler: simply call inner handler |
502 | 171k | HTTPEvent *self = static_cast<HTTPEvent*>(data); |
503 | 171k | self->handler(); |
504 | 171k | if (self->deleteWhenTriggered) |
505 | 171k | delete self; |
506 | 171k | } |
507 | | |
508 | | HTTPEvent::HTTPEvent(struct event_base* base, bool _deleteWhenTriggered, const std::function<void()>& _handler): |
509 | 171k | deleteWhenTriggered(_deleteWhenTriggered), handler(_handler) |
510 | 171k | { |
511 | 171k | ev = event_new(base, -1, 0, httpevent_callback_fn, this); |
512 | 171k | assert(ev); |
513 | 171k | } |
514 | | HTTPEvent::~HTTPEvent() |
515 | 171k | { |
516 | 171k | event_free(ev); |
517 | 171k | } |
518 | | void HTTPEvent::trigger(struct timeval* tv) |
519 | 171k | { |
520 | 171k | if (tv == nullptr) |
521 | 171k | event_active(ev, 0, 0); // immediately trigger event in main thread |
522 | 0 | else |
523 | 171k | evtimer_add(ev, tv); // trigger after timeval passed |
524 | 171k | } |
525 | | HTTPRequest::HTTPRequest(struct evhttp_request* _req, const util::SignalInterrupt& interrupt, bool _replySent) |
526 | 171k | : req(_req), m_interrupt(interrupt), replySent(_replySent) |
527 | 171k | { |
528 | 171k | } |
529 | | |
530 | | HTTPRequest::~HTTPRequest() |
531 | 171k | { |
532 | 171k | if (!replySent) { |
533 | | // Keep track of whether reply was sent to avoid request leaks |
534 | 0 | LogWarning("Unhandled HTTP request"); |
535 | 0 | WriteReply(HTTP_INTERNAL_SERVER_ERROR, "Unhandled request"); |
536 | 0 | } |
537 | | // evhttpd cleans up the request, as long as a reply was sent. |
538 | 171k | } |
539 | | |
540 | | std::pair<bool, std::string> HTTPRequest::GetHeader(const std::string& hdr) const |
541 | 170k | { |
542 | 170k | const struct evkeyvalq* headers = evhttp_request_get_input_headers(req); |
543 | 170k | assert(headers); |
544 | 170k | const char* val = evhttp_find_header(headers, hdr.c_str()); |
545 | 170k | if (val) |
546 | 170k | return std::make_pair(true, val); |
547 | 0 | else |
548 | 0 | return std::make_pair(false, ""); |
549 | 170k | } |
550 | | |
551 | | std::string HTTPRequest::ReadBody() |
552 | 170k | { |
553 | 170k | struct evbuffer* buf = evhttp_request_get_input_buffer(req); |
554 | 170k | if (!buf) |
555 | 0 | return ""; |
556 | 170k | size_t size = evbuffer_get_length(buf); |
557 | | /** Trivial implementation: if this is ever a performance bottleneck, |
558 | | * internal copying can be avoided in multi-segment buffers by using |
559 | | * evbuffer_peek and an awkward loop. Though in that case, it'd be even |
560 | | * better to not copy into an intermediate string but use a stream |
561 | | * abstraction to consume the evbuffer on the fly in the parsing algorithm. |
562 | | */ |
563 | 170k | const char* data = (const char*)evbuffer_pullup(buf, size); |
564 | 170k | if (!data) // returns nullptr in case of empty buffer |
565 | 18 | return ""; |
566 | 170k | std::string rv(data, size); |
567 | 170k | evbuffer_drain(buf, size); |
568 | 170k | return rv; |
569 | 170k | } |
570 | | |
571 | | void HTTPRequest::WriteHeader(const std::string& hdr, const std::string& value) |
572 | 172k | { |
573 | 172k | struct evkeyvalq* headers = evhttp_request_get_output_headers(req); |
574 | 172k | assert(headers); |
575 | 172k | evhttp_add_header(headers, hdr.c_str(), value.c_str()); |
576 | 172k | } |
577 | | |
578 | | /** Closure sent to main thread to request a reply to be sent to |
579 | | * a HTTP request. |
580 | | * Replies must be sent in the main loop in the main http thread, |
581 | | * this cannot be done from worker threads. |
582 | | */ |
583 | | void HTTPRequest::WriteReply(int nStatus, std::span<const std::byte> reply) |
584 | 171k | { |
585 | 171k | assert(!replySent && req); |
586 | 171k | if (m_interrupt) { |
587 | 972 | WriteHeader("Connection", "close"); |
588 | 972 | } |
589 | | // Send event to main http thread to send reply message |
590 | 171k | struct evbuffer* evb = evhttp_request_get_output_buffer(req); |
591 | 171k | assert(evb); |
592 | 171k | evbuffer_add(evb, reply.data(), reply.size()); |
593 | 171k | auto req_copy = req; |
594 | 171k | HTTPEvent* ev = new HTTPEvent(eventBase, true, [req_copy, nStatus]{ |
595 | 171k | evhttp_send_reply(req_copy, nStatus, nullptr, nullptr); |
596 | | // Re-enable reading from the socket. This is the second part of the libevent |
597 | | // workaround above. |
598 | 171k | if (event_get_version_number() >= 0x02010600 && event_get_version_number() < 0x02010900) { |
599 | 0 | evhttp_connection* conn = evhttp_request_get_connection(req_copy); |
600 | 0 | if (conn) { |
601 | 0 | bufferevent* bev = evhttp_connection_get_bufferevent(conn); |
602 | 0 | if (bev) { |
603 | 0 | bufferevent_enable(bev, EV_READ | EV_WRITE); |
604 | 0 | } |
605 | 0 | } |
606 | 0 | } |
607 | 171k | }); |
608 | 171k | ev->trigger(nullptr); |
609 | 171k | replySent = true; |
610 | 171k | req = nullptr; // transferred back to main thread |
611 | 171k | } |
612 | | |
613 | | CService HTTPRequest::GetPeer() const |
614 | 512k | { |
615 | 512k | evhttp_connection* con = evhttp_request_get_connection(req); |
616 | 512k | CService peer; |
617 | 512k | if (con) { |
618 | | // evhttp retains ownership over returned address string |
619 | 512k | const char* address = ""; |
620 | 512k | uint16_t port = 0; |
621 | | |
622 | | #ifdef HAVE_EVHTTP_CONNECTION_GET_PEER_CONST_CHAR |
623 | | evhttp_connection_get_peer(con, &address, &port); |
624 | | #else |
625 | 512k | evhttp_connection_get_peer(con, (char**)&address, &port); |
626 | 512k | #endif // HAVE_EVHTTP_CONNECTION_GET_PEER_CONST_CHAR |
627 | | |
628 | 512k | peer = MaybeFlipIPv6toCJDNS(LookupNumeric(address, port)); |
629 | 512k | } |
630 | 512k | return peer; |
631 | 512k | } |
632 | | |
633 | | std::string HTTPRequest::GetURI() const |
634 | 512k | { |
635 | 512k | return evhttp_request_get_uri(req); |
636 | 512k | } |
637 | | |
638 | | HTTPRequest::RequestMethod HTTPRequest::GetRequestMethod() const |
639 | 512k | { |
640 | 512k | switch (evhttp_request_get_command(req)) { |
641 | 1.49k | case EVHTTP_REQ_GET: |
642 | 1.49k | return GET; |
643 | 511k | case EVHTTP_REQ_POST: |
644 | 511k | return POST; |
645 | 0 | case EVHTTP_REQ_HEAD: |
646 | 0 | return HEAD; |
647 | 0 | case EVHTTP_REQ_PUT: |
648 | 0 | return PUT; |
649 | 0 | default: |
650 | 0 | return UNKNOWN; |
651 | 512k | } |
652 | 512k | } |
653 | | |
654 | | std::optional<std::string> HTTPRequest::GetQueryParameter(const std::string& key) const |
655 | 85 | { |
656 | 85 | const char* uri{evhttp_request_get_uri(req)}; |
657 | | |
658 | 85 | return GetQueryParameterFromUri(uri, key); |
659 | 85 | } |
660 | | |
661 | | std::optional<std::string> GetQueryParameterFromUri(const char* uri, const std::string& key) |
662 | 93 | { |
663 | 93 | evhttp_uri* uri_parsed{evhttp_uri_parse(uri)}; |
664 | 93 | if (!uri_parsed) { |
665 | 6 | throw std::runtime_error("URI parsing failed, it likely contained RFC 3986 invalid characters"); |
666 | 6 | } |
667 | 87 | const char* query{evhttp_uri_get_query(uri_parsed)}; |
668 | 87 | std::optional<std::string> result; |
669 | | |
670 | 87 | if (query) { |
671 | | // Parse the query string into a key-value queue and iterate over it |
672 | 80 | struct evkeyvalq params_q; |
673 | 80 | evhttp_parse_query_str(query, ¶ms_q); |
674 | | |
675 | 112 | for (struct evkeyval* param{params_q.tqh_first}; param != nullptr; param = param->next.tqe_next) { |
676 | 104 | if (param->key == key) { |
677 | 72 | result = param->value; |
678 | 72 | break; |
679 | 72 | } |
680 | 104 | } |
681 | 80 | evhttp_clear_headers(¶ms_q); |
682 | 80 | } |
683 | 87 | evhttp_uri_free(uri_parsed); |
684 | | |
685 | 87 | return result; |
686 | 93 | } |
687 | | |
688 | | void RegisterHTTPHandler(const std::string &prefix, bool exactMatch, const HTTPRequestHandler &handler) |
689 | 2.17k | { |
690 | 2.17k | LogDebug(BCLog::HTTP, "Registering HTTP handler for %s (exactmatch %d)\n", prefix, exactMatch); |
691 | 2.17k | LOCK(g_httppathhandlers_mutex); |
692 | 2.17k | pathHandlers.emplace_back(prefix, exactMatch, handler); |
693 | 2.17k | } |
694 | | |
695 | | void UnregisterHTTPHandler(const std::string &prefix, bool exactMatch) |
696 | 18.1k | { |
697 | 18.1k | LOCK(g_httppathhandlers_mutex); |
698 | 18.1k | std::vector<HTTPPathHandler>::iterator i = pathHandlers.begin(); |
699 | 18.1k | std::vector<HTTPPathHandler>::iterator iend = pathHandlers.end(); |
700 | 18.1k | for (; i != iend; ++i) |
701 | 2.17k | if (i->prefix == prefix && i->exactMatch == exactMatch) |
702 | 2.17k | break; |
703 | 18.1k | if (i != iend) |
704 | 2.17k | { |
705 | 2.17k | LogDebug(BCLog::HTTP, "Unregistering HTTP handler for %s (exactmatch %d)\n", prefix, exactMatch); |
706 | 2.17k | pathHandlers.erase(i); |
707 | 2.17k | } |
708 | 18.1k | } |