OSDN Git Service

fix error exhibition (#1229)
[bytom/bytom.git] / api / api.go
1 package api
2
3 import (
4         "crypto/tls"
5         "net"
6         "net/http"
7         "sync"
8         "time"
9
10         "github.com/kr/secureheader"
11         log "github.com/sirupsen/logrus"
12         cmn "github.com/tendermint/tmlibs/common"
13
14         "github.com/bytom/accesstoken"
15         "github.com/bytom/blockchain/txfeed"
16         cfg "github.com/bytom/config"
17         "github.com/bytom/dashboard"
18         "github.com/bytom/equity"
19         "github.com/bytom/errors"
20         "github.com/bytom/mining/cpuminer"
21         "github.com/bytom/mining/miningpool"
22         "github.com/bytom/net/http/authn"
23         "github.com/bytom/net/http/gzip"
24         "github.com/bytom/net/http/httpjson"
25         "github.com/bytom/net/http/static"
26         "github.com/bytom/netsync"
27         "github.com/bytom/protocol"
28         "github.com/bytom/wallet"
29 )
30
31 var (
32         errNotAuthenticated = errors.New("not authenticated")
33         httpReadTimeout     = 2 * time.Minute
34         httpWriteTimeout    = time.Hour
35 )
36
37 const (
38         // SUCCESS indicates the rpc calling is successful.
39         SUCCESS = "success"
40         // FAIL indicated the rpc calling is failed.
41         FAIL               = "fail"
42         crosscoreRPCPrefix = "/rpc/"
43 )
44
45 // Response describes the response standard.
46 type Response struct {
47         Status      string      `json:"status,omitempty"`
48         Code        string      `json:"code,omitempty"`
49         Msg         string      `json:"msg,omitempty"`
50         ErrorDetail string      `json:"error_detail,omitempty"`
51         Data        interface{} `json:"data,omitempty"`
52 }
53
54 //NewSuccessResponse success response
55 func NewSuccessResponse(data interface{}) Response {
56         return Response{Status: SUCCESS, Data: data}
57 }
58
59 //FormatErrResp format error response
60 func FormatErrResp(err error) (response Response) {
61         response = Response{Status: FAIL}
62         root := errors.Root(err)
63         // Some types cannot be used as map keys, for example slices.
64         // If an error's underlying type is one of these, don't panic.
65         // Just treat it like any other missing entry.
66         defer func() {
67                 if err := recover(); err != nil {
68                         response.ErrorDetail = ""
69                 }
70         }()
71
72         if info, ok := respErrFormatter[root]; ok {
73                 response.Code = info.ChainCode
74                 response.Msg = info.Message
75                 response.ErrorDetail = err.Error()
76         } else {
77                 response.Code = respErrFormatter[ErrDefault].ChainCode
78                 response.Msg = respErrFormatter[ErrDefault].Message
79                 response.ErrorDetail = err.Error()
80         }
81         return response
82 }
83
84 //NewErrorResponse error response
85 func NewErrorResponse(err error) Response {
86         response := FormatErrResp(err)
87         return response
88 }
89
90 type waitHandler struct {
91         h  http.Handler
92         wg sync.WaitGroup
93 }
94
95 func (wh *waitHandler) Set(h http.Handler) {
96         wh.h = h
97         wh.wg.Done()
98 }
99
100 func (wh *waitHandler) ServeHTTP(w http.ResponseWriter, req *http.Request) {
101         wh.wg.Wait()
102         wh.h.ServeHTTP(w, req)
103 }
104
105 // API is the scheduling center for server
106 type API struct {
107         sync          *netsync.SyncManager
108         wallet        *wallet.Wallet
109         accessTokens  *accesstoken.CredentialStore
110         chain         *protocol.Chain
111         server        *http.Server
112         handler       http.Handler
113         txFeedTracker *txfeed.Tracker
114         cpuMiner      *cpuminer.CPUMiner
115         miningPool    *miningpool.MiningPool
116 }
117
118 func (a *API) initServer(config *cfg.Config) {
119         // The waitHandler accepts incoming requests, but blocks until its underlying
120         // handler is set, when the second phase is complete.
121         var coreHandler waitHandler
122         var handler http.Handler
123
124         coreHandler.wg.Add(1)
125         mux := http.NewServeMux()
126         mux.Handle("/", &coreHandler)
127
128         handler = mux
129         if config.Auth.Disable == false {
130                 handler = AuthHandler(handler, a.accessTokens)
131         }
132         handler = RedirectHandler(handler)
133
134         secureheader.DefaultConfig.PermitClearLoopback = true
135         secureheader.DefaultConfig.HTTPSRedirect = false
136         secureheader.DefaultConfig.Next = handler
137
138         a.server = &http.Server{
139                 // Note: we should not set TLSConfig here;
140                 // we took care of TLS with the listener in maybeUseTLS.
141                 Handler:      secureheader.DefaultConfig,
142                 ReadTimeout:  httpReadTimeout,
143                 WriteTimeout: httpWriteTimeout,
144                 // Disable HTTP/2 for now until the Go implementation is more stable.
145                 // https://github.com/golang/go/issues/16450
146                 // https://github.com/golang/go/issues/17071
147                 TLSNextProto: map[string]func(*http.Server, *tls.Conn, http.Handler){},
148         }
149
150         coreHandler.Set(a)
151 }
152
153 // StartServer start the server
154 func (a *API) StartServer(address string) {
155         log.WithField("api address:", address).Info("Rpc listen")
156         listener, err := net.Listen("tcp", address)
157         if err != nil {
158                 cmn.Exit(cmn.Fmt("Failed to register tcp port: %v", err))
159         }
160
161         // The `Serve` call has to happen in its own goroutine because
162         // it's blocking and we need to proceed to the rest of the core setup after
163         // we call it.
164         go func() {
165                 if err := a.server.Serve(listener); err != nil {
166                         log.WithField("error", errors.Wrap(err, "Serve")).Error("Rpc server")
167                 }
168         }()
169 }
170
171 // NewAPI create and initialize the API
172 func NewAPI(sync *netsync.SyncManager, wallet *wallet.Wallet, txfeeds *txfeed.Tracker, cpuMiner *cpuminer.CPUMiner, miningPool *miningpool.MiningPool, chain *protocol.Chain, config *cfg.Config, token *accesstoken.CredentialStore) *API {
173         api := &API{
174                 sync:          sync,
175                 wallet:        wallet,
176                 chain:         chain,
177                 accessTokens:  token,
178                 txFeedTracker: txfeeds,
179                 cpuMiner:      cpuMiner,
180                 miningPool:    miningPool,
181         }
182         api.buildHandler()
183         api.initServer(config)
184
185         return api
186 }
187
188 func (a *API) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
189         a.handler.ServeHTTP(rw, req)
190 }
191
192 // buildHandler is in charge of all the rpc handling.
193 func (a *API) buildHandler() {
194         walletEnable := false
195         m := http.NewServeMux()
196         if a.wallet != nil {
197                 walletEnable = true
198
199                 m.Handle("/create-account", jsonHandler(a.createAccount))
200                 m.Handle("/list-accounts", jsonHandler(a.listAccounts))
201                 m.Handle("/delete-account", jsonHandler(a.deleteAccount))
202
203                 m.Handle("/create-account-receiver", jsonHandler(a.createAccountReceiver))
204                 m.Handle("/list-addresses", jsonHandler(a.listAddresses))
205                 m.Handle("/validate-address", jsonHandler(a.validateAddress))
206                 m.Handle("/list-pubkeys", jsonHandler(a.listPubKeys))
207
208                 m.Handle("/get-mining-address", jsonHandler(a.getMiningAddress))
209                 m.Handle("/set-mining-address", jsonHandler(a.setMiningAddress))
210
211                 m.Handle("/create-asset", jsonHandler(a.createAsset))
212                 m.Handle("/update-asset-alias", jsonHandler(a.updateAssetAlias))
213                 m.Handle("/get-asset", jsonHandler(a.getAsset))
214                 m.Handle("/list-assets", jsonHandler(a.listAssets))
215
216                 m.Handle("/create-key", jsonHandler(a.pseudohsmCreateKey))
217                 m.Handle("/list-keys", jsonHandler(a.pseudohsmListKeys))
218                 m.Handle("/delete-key", jsonHandler(a.pseudohsmDeleteKey))
219                 m.Handle("/reset-key-password", jsonHandler(a.pseudohsmResetPassword))
220                 m.Handle("/sign-message", jsonHandler(a.signMessage))
221
222                 m.Handle("/build-transaction", jsonHandler(a.build))
223                 m.Handle("/sign-transaction", jsonHandler(a.pseudohsmSignTemplates))
224
225                 m.Handle("/get-transaction", jsonHandler(a.getTransaction))
226                 m.Handle("/list-transactions", jsonHandler(a.listTransactions))
227
228                 m.Handle("/list-balances", jsonHandler(a.listBalances))
229                 m.Handle("/list-unspent-outputs", jsonHandler(a.listUnspentOutputs))
230
231                 m.Handle("/backup-wallet", jsonHandler(a.backupWalletImage))
232                 m.Handle("/restore-wallet", jsonHandler(a.restoreWalletImage))
233                 m.Handle("/rescan-wallet", jsonHandler(a.rescanWallet))
234                 m.Handle("/wallet-info", jsonHandler(a.getWalletInfo))
235         } else {
236                 log.Warn("Please enable wallet")
237         }
238
239         m.Handle("/", alwaysError(errors.New("not Found")))
240         m.Handle("/error", jsonHandler(a.walletError))
241
242         m.Handle("/create-access-token", jsonHandler(a.createAccessToken))
243         m.Handle("/list-access-tokens", jsonHandler(a.listAccessTokens))
244         m.Handle("/delete-access-token", jsonHandler(a.deleteAccessToken))
245         m.Handle("/check-access-token", jsonHandler(a.checkAccessToken))
246
247         m.Handle("/create-transaction-feed", jsonHandler(a.createTxFeed))
248         m.Handle("/get-transaction-feed", jsonHandler(a.getTxFeed))
249         m.Handle("/update-transaction-feed", jsonHandler(a.updateTxFeed))
250         m.Handle("/delete-transaction-feed", jsonHandler(a.deleteTxFeed))
251         m.Handle("/list-transaction-feeds", jsonHandler(a.listTxFeeds))
252
253         m.Handle("/submit-transaction", jsonHandler(a.submit))
254         m.Handle("/estimate-transaction-gas", jsonHandler(a.estimateTxGas))
255
256         m.Handle("/get-unconfirmed-transaction", jsonHandler(a.getUnconfirmedTx))
257         m.Handle("/list-unconfirmed-transactions", jsonHandler(a.listUnconfirmedTxs))
258         m.Handle("/decode-raw-transaction", jsonHandler(a.decodeRawTransaction))
259
260         m.Handle("/get-block-hash", jsonHandler(a.getBestBlockHash))
261         m.Handle("/get-block-header", jsonHandler(a.getBlockHeader))
262         m.Handle("/get-block", jsonHandler(a.getBlock))
263         m.Handle("/get-block-count", jsonHandler(a.getBlockCount))
264         m.Handle("/get-difficulty", jsonHandler(a.getDifficulty))
265         m.Handle("/get-hash-rate", jsonHandler(a.getHashRate))
266
267         m.Handle("/is-mining", jsonHandler(a.isMining))
268         m.Handle("/set-mining", jsonHandler(a.setMining))
269
270         m.Handle("/get-work", jsonHandler(a.getWork))
271         m.Handle("/get-work-json", jsonHandler(a.getWorkJSON))
272         m.Handle("/submit-work", jsonHandler(a.submitWork))
273         m.Handle("/submit-work-json", jsonHandler(a.submitWorkJSON))
274
275         m.Handle("/verify-message", jsonHandler(a.verifyMessage))
276         m.Handle("/decode-program", jsonHandler(a.decodeProgram))
277         m.Handle("/compile", jsonHandler(a.compileEquity))
278
279         m.Handle("/gas-rate", jsonHandler(a.gasRate))
280         m.Handle("/net-info", jsonHandler(a.getNetInfo))
281
282         m.Handle("/list-peers", jsonHandler(a.listPeers))
283         m.Handle("/disconnect-peer", jsonHandler(a.disconnectPeer))
284         m.Handle("/connect-peer", jsonHandler(a.connectPeer))
285
286         handler := latencyHandler(m, walletEnable)
287         handler = maxBytesHandler(handler) // TODO(tessr): consider moving this to non-core specific mux
288         handler = webAssetsHandler(handler)
289         handler = gzip.Handler{Handler: handler}
290
291         a.handler = handler
292 }
293
294 func maxBytesHandler(h http.Handler) http.Handler {
295         const maxReqSize = 1e7 // 10MB
296         return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
297                 // A block can easily be bigger than maxReqSize, but everything
298                 // else should be pretty small.
299                 if req.URL.Path != crosscoreRPCPrefix+"signer/sign-block" {
300                         req.Body = http.MaxBytesReader(w, req.Body, maxReqSize)
301                 }
302                 h.ServeHTTP(w, req)
303         })
304 }
305
306 // json Handler
307 func jsonHandler(f interface{}) http.Handler {
308         h, err := httpjson.Handler(f, errorFormatter.Write)
309         if err != nil {
310                 panic(err)
311         }
312         return h
313 }
314
315 // error Handler
316 func alwaysError(err error) http.Handler {
317         return jsonHandler(func() error { return err })
318 }
319
320 func webAssetsHandler(next http.Handler) http.Handler {
321         mux := http.NewServeMux()
322         mux.Handle("/dashboard/", http.StripPrefix("/dashboard/", static.Handler{
323                 Assets:  dashboard.Files,
324                 Default: "index.html",
325         }))
326         mux.Handle("/equity/", http.StripPrefix("/equity/", static.Handler{
327                 Assets:  equity.Files,
328                 Default: "index.html",
329         }))
330         mux.Handle("/", next)
331
332         return mux
333 }
334
335 // AuthHandler access token auth Handler
336 func AuthHandler(handler http.Handler, accessTokens *accesstoken.CredentialStore) http.Handler {
337         authenticator := authn.NewAPI(accessTokens)
338
339         return http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {
340                 // TODO(tessr): check that this path exists; return early if this path isn't legit
341                 req, err := authenticator.Authenticate(req)
342                 if err != nil {
343                         log.WithField("error", errors.Wrap(err, "Serve")).Error("Authenticate fail")
344                         err = errors.Sub(errNotAuthenticated, err)
345                         errorFormatter.Write(req.Context(), rw, err)
346                         return
347                 }
348                 handler.ServeHTTP(rw, req)
349         })
350 }
351
352 // RedirectHandler redirect to dashboard handler
353 func RedirectHandler(next http.Handler) http.Handler {
354         return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
355                 if req.URL.Path == "/" {
356                         http.Redirect(w, req, "/dashboard/", http.StatusFound)
357                         return
358                 }
359                 next.ServeHTTP(w, req)
360         })
361 }
362
363 // latencyHandler take latency for the request url path, and redirect url path to wait-disable when wallet is closed
364 func latencyHandler(m *http.ServeMux, walletEnable bool) http.Handler {
365         return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
366                 // latency for the request url path
367                 if l := latency(m, req); l != nil {
368                         defer l.RecordSince(time.Now())
369                 }
370
371                 // when the wallet is not been opened and the url path is not been found, modify url path to error,
372                 // and redirect handler to error
373                 if _, pattern := m.Handler(req); pattern != req.URL.Path && !walletEnable {
374                         req.URL.Path = "/error"
375                         walletRedirectHandler(w, req)
376                         return
377                 }
378
379                 m.ServeHTTP(w, req)
380         })
381 }
382
383 // walletRedirectHandler redirect to error when the wallet is closed
384 func walletRedirectHandler(w http.ResponseWriter, req *http.Request) {
385         h := http.RedirectHandler(req.URL.String(), http.StatusMovedPermanently)
386         h.ServeHTTP(w, req)
387 }