2022-09-22 22:57:21 +03:00
|
|
|
use super::authorization::{ip_is_authorized, key_is_authorized};
|
2022-08-21 12:44:53 +03:00
|
|
|
use super::errors::FrontendResult;
|
2022-08-16 22:29:00 +03:00
|
|
|
use crate::{app::Web3ProxyApp, jsonrpc::JsonRpcRequestEnum};
|
2022-09-22 22:57:21 +03:00
|
|
|
use axum::extract::Path;
|
2022-09-09 00:01:36 +03:00
|
|
|
use axum::headers::{Referer, UserAgent};
|
|
|
|
use axum::TypedHeader;
|
2022-09-07 06:54:16 +03:00
|
|
|
use axum::{response::IntoResponse, Extension, Json};
|
2022-07-07 06:22:09 +03:00
|
|
|
use axum_client_ip::ClientIp;
|
2022-06-05 22:58:47 +03:00
|
|
|
use std::sync::Arc;
|
2022-09-22 22:57:21 +03:00
|
|
|
use tracing::{error_span, Instrument};
|
2022-08-06 04:17:25 +03:00
|
|
|
use uuid::Uuid;
|
2022-06-05 22:58:47 +03:00
|
|
|
|
2022-08-05 22:22:23 +03:00
|
|
|
pub async fn public_proxy_web3_rpc(
|
2022-07-07 06:22:09 +03:00
|
|
|
Extension(app): Extension<Arc<Web3ProxyApp>>,
|
|
|
|
ClientIp(ip): ClientIp,
|
2022-09-09 00:01:36 +03:00
|
|
|
Json(payload): Json<JsonRpcRequestEnum>,
|
|
|
|
referer: Option<TypedHeader<Referer>>,
|
|
|
|
user_agent: Option<TypedHeader<UserAgent>>,
|
2022-08-21 12:39:38 +03:00
|
|
|
) -> FrontendResult {
|
2022-09-22 02:50:55 +03:00
|
|
|
let request_span = error_span!("request", %ip, ?referer, ?user_agent);
|
2022-08-16 07:56:01 +03:00
|
|
|
|
2022-09-22 23:27:14 +03:00
|
|
|
let authorized_request = ip_is_authorized(&app, ip)
|
2022-09-09 00:01:36 +03:00
|
|
|
.instrument(request_span.clone())
|
|
|
|
.await?;
|
2022-08-13 01:12:46 +03:00
|
|
|
|
2022-09-22 23:27:14 +03:00
|
|
|
let request_span = error_span!("request", ?authorized_request);
|
|
|
|
|
|
|
|
let authorized_request = Arc::new(authorized_request);
|
|
|
|
|
|
|
|
let f = tokio::spawn(async move {
|
|
|
|
app.proxy_web3_rpc(&authorized_request, payload)
|
|
|
|
.instrument(request_span)
|
|
|
|
.await
|
|
|
|
});
|
2022-08-16 03:33:26 +03:00
|
|
|
|
2022-09-09 00:01:36 +03:00
|
|
|
let response = f.await.unwrap()?;
|
2022-08-21 12:39:38 +03:00
|
|
|
|
2022-09-07 06:54:16 +03:00
|
|
|
Ok(Json(&response).into_response())
|
2022-08-04 04:10:27 +03:00
|
|
|
}
|
2022-07-07 06:22:09 +03:00
|
|
|
|
2022-08-04 04:10:27 +03:00
|
|
|
pub async fn user_proxy_web3_rpc(
|
|
|
|
Extension(app): Extension<Arc<Web3ProxyApp>>,
|
2022-09-22 02:50:55 +03:00
|
|
|
ClientIp(ip): ClientIp,
|
2022-09-09 00:01:36 +03:00
|
|
|
Json(payload): Json<JsonRpcRequestEnum>,
|
2022-09-22 02:50:55 +03:00
|
|
|
referer: Option<TypedHeader<Referer>>,
|
2022-09-09 00:01:36 +03:00
|
|
|
user_agent: Option<TypedHeader<UserAgent>>,
|
2022-08-06 04:17:25 +03:00
|
|
|
Path(user_key): Path<Uuid>,
|
2022-08-21 12:39:38 +03:00
|
|
|
) -> FrontendResult {
|
2022-09-22 22:57:21 +03:00
|
|
|
let request_span = error_span!("request", %ip, ?referer, ?user_agent);
|
2022-09-09 00:01:36 +03:00
|
|
|
|
2022-09-22 02:50:55 +03:00
|
|
|
// TODO: this should probably return the user_key_id instead? or maybe both?
|
2022-09-22 22:57:21 +03:00
|
|
|
let authorized_request = key_is_authorized(
|
|
|
|
&app,
|
|
|
|
user_key,
|
|
|
|
ip,
|
|
|
|
referer.map(|x| x.0),
|
|
|
|
user_agent.map(|x| x.0),
|
|
|
|
)
|
|
|
|
.instrument(request_span.clone())
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
let request_span = error_span!("request", ?authorized_request);
|
2022-08-16 07:56:01 +03:00
|
|
|
|
2022-09-22 23:27:14 +03:00
|
|
|
let authorized_request = Arc::new(authorized_request);
|
|
|
|
|
|
|
|
let f = tokio::spawn(async move {
|
|
|
|
app.proxy_web3_rpc(&authorized_request, payload)
|
|
|
|
.instrument(request_span)
|
|
|
|
.await
|
|
|
|
});
|
2022-08-16 07:56:01 +03:00
|
|
|
|
2022-09-09 00:01:36 +03:00
|
|
|
let response = f.await.unwrap()?;
|
2022-08-21 12:39:38 +03:00
|
|
|
|
2022-09-07 06:54:16 +03:00
|
|
|
Ok(Json(&response).into_response())
|
2022-06-05 22:58:47 +03:00
|
|
|
}
|