web3-proxy/web3_proxy/src/frontend/rpc_proxy_ws.rs

255 lines
8.5 KiB
Rust
Raw Normal View History

2022-08-21 12:39:38 +03:00
use super::errors::FrontendResult;
use super::rate_limit::{rate_limit_by_ip, rate_limit_by_user_key};
2022-05-20 08:30:54 +03:00
use axum::{
2022-05-29 20:28:41 +03:00
extract::ws::{Message, WebSocket, WebSocketUpgrade},
2022-08-06 04:17:25 +03:00
extract::Path,
response::{IntoResponse, Redirect},
2022-06-05 22:58:47 +03:00
Extension,
2022-05-20 08:30:54 +03:00
};
2022-08-04 04:10:27 +03:00
use axum_client_ip::ClientIp;
use axum_macros::debug_handler;
2022-05-29 20:28:41 +03:00
use futures::SinkExt;
2022-05-31 04:55:04 +03:00
use futures::{
future::AbortHandle,
stream::{SplitSink, SplitStream, StreamExt},
};
2022-08-12 22:07:14 +03:00
use handlebars::Handlebars;
use hashbrown::HashMap;
2022-07-22 22:30:39 +03:00
use serde_json::{json, value::RawValue};
2022-08-27 05:13:36 +03:00
use std::sync::Arc;
2022-07-09 01:14:45 +03:00
use std::{str::from_utf8_mut, sync::atomic::AtomicUsize};
use tracing::{error, error_span, info, trace, Instrument};
2022-08-06 04:17:25 +03:00
use uuid::Uuid;
2022-06-16 05:53:37 +03:00
use crate::{
app::Web3ProxyApp,
jsonrpc::{JsonRpcForwardedResponse, JsonRpcForwardedResponseEnum, JsonRpcRequest},
stats::Protocol,
2022-06-16 05:53:37 +03:00
};
2022-05-20 08:30:54 +03:00
#[debug_handler]
2022-08-05 22:22:23 +03:00
pub async fn public_websocket_handler(
2022-07-07 06:22:09 +03:00
Extension(app): Extension<Arc<Web3ProxyApp>>,
2022-08-04 04:10:27 +03:00
ClientIp(ip): ClientIp,
2022-08-10 05:37:34 +03:00
ws_upgrade: Option<WebSocketUpgrade>,
2022-08-21 12:39:38 +03:00
) -> FrontendResult {
2022-08-27 05:13:36 +03:00
let _ip = rate_limit_by_ip(&app, ip).await?;
2022-08-04 04:10:27 +03:00
let user_id = 0;
let protocol = Protocol::Websocket;
let user_span = error_span!("user", user_id, ?protocol);
2022-08-11 03:16:13 +03:00
match ws_upgrade {
2022-08-21 12:39:38 +03:00
Some(ws) => Ok(ws
.on_upgrade(|socket| proxy_web3_socket(app, socket).instrument(user_span))
2022-08-21 12:39:38 +03:00
.into_response()),
None => {
2022-08-12 22:07:14 +03:00
// this is not a websocket. redirect to a friendly page
2022-08-21 12:39:38 +03:00
Ok(Redirect::to(&app.config.redirect_public_url).into_response())
}
}
2022-08-04 04:10:27 +03:00
}
#[debug_handler]
2022-08-04 04:10:27 +03:00
pub async fn user_websocket_handler(
Extension(app): Extension<Arc<Web3ProxyApp>>,
2022-08-06 04:17:25 +03:00
Path(user_key): Path<Uuid>,
2022-08-11 03:16:13 +03:00
ws_upgrade: Option<WebSocketUpgrade>,
2022-08-21 12:39:38 +03:00
) -> FrontendResult {
2022-08-21 12:47:38 +03:00
let user_id: u64 = rate_limit_by_user_key(&app, user_key).await?;
2022-08-04 04:10:27 +03:00
let protocol = Protocol::Websocket;
// log the id, not the address. we don't want to expose the user's address
// TODO: type that wraps Address and have it censor? would protect us from accidently logging addresses
let user_span = error_span!("user", user_id, ?protocol);
2022-08-11 03:16:13 +03:00
match ws_upgrade {
2022-08-21 12:39:38 +03:00
Some(ws_upgrade) => Ok(ws_upgrade
.on_upgrade(move |socket| proxy_web3_socket(app, socket).instrument(user_span))),
2022-08-11 03:16:13 +03:00
None => {
2022-08-12 22:07:14 +03:00
// TODO: store this on the app and use register_template?
let reg = Handlebars::new();
2022-09-05 08:53:58 +03:00
// TODO: show the user's address, not their id (remember to update the checks for {{user_address}}} in app.rs)
2022-08-12 04:48:32 +03:00
// TODO: query to get the user's address. expose that instead of user_id
2022-08-12 22:07:14 +03:00
let user_url = reg
.render_template(
&app.config.redirect_user_url,
&json!({ "user_id": user_id }),
)
.unwrap();
// this is not a websocket. redirect to a page for this user
2022-08-21 12:39:38 +03:00
Ok(Redirect::to(&user_url).into_response())
2022-08-11 03:16:13 +03:00
}
}
2022-05-29 20:28:41 +03:00
}
async fn proxy_web3_socket(app: Arc<Web3ProxyApp>, socket: WebSocket) {
2022-05-29 20:28:41 +03:00
// split the websocket so we can read and write concurrently
let (ws_tx, ws_rx) = socket.split();
// create a channel for our reader and writer can communicate. todo: benchmark different channels
let (response_sender, response_receiver) = flume::unbounded::<Message>();
2022-05-29 20:28:41 +03:00
tokio::spawn(write_web3_socket(response_receiver, ws_tx));
tokio::spawn(read_web3_socket(app, ws_rx, response_sender));
2022-05-29 20:28:41 +03:00
}
2022-07-25 03:27:00 +03:00
/// websockets support a few more methods than http clients
2022-05-31 04:55:04 +03:00
async fn handle_socket_payload(
2022-06-14 10:13:42 +03:00
app: Arc<Web3ProxyApp>,
2022-05-31 04:55:04 +03:00
payload: &str,
2022-07-09 01:14:45 +03:00
response_sender: &flume::Sender<Message>,
subscription_count: &AtomicUsize,
2022-05-31 04:55:04 +03:00
subscriptions: &mut HashMap<String, AbortHandle>,
) -> Message {
// TODO: do any clients send batches over websockets?
2022-05-31 04:55:04 +03:00
let (id, response) = match serde_json::from_str::<JsonRpcRequest>(payload) {
Ok(payload) => {
// TODO: should we use this id for the subscription id? it should be unique and means we dont need an atomic
2022-05-31 04:55:04 +03:00
let id = payload.id.clone();
let response: anyhow::Result<JsonRpcForwardedResponseEnum> = match &payload.method[..] {
"eth_subscribe" => {
// TODO: what should go in this span?
let span = error_span!("eth_subscribe");
2022-06-14 10:13:42 +03:00
let response = app
.clone()
2022-07-09 01:14:45 +03:00
.eth_subscribe(payload, subscription_count, response_sender.clone())
.instrument(span)
2022-06-14 10:13:42 +03:00
.await;
2022-05-31 04:55:04 +03:00
match response {
Ok((handle, response)) => {
// TODO: better key
subscriptions
.insert(response.result.as_ref().unwrap().to_string(), handle);
2022-05-31 04:55:04 +03:00
Ok(response.into())
}
Err(err) => Err(err),
2022-05-31 04:55:04 +03:00
}
}
"eth_unsubscribe" => {
// TODO: how should handle rate limits and stats on this?
let subscription_id = payload.params.unwrap().to_string();
2022-05-31 04:55:04 +03:00
let partial_response = match subscriptions.remove(&subscription_id) {
None => false,
Some(handle) => {
handle.abort();
true
}
};
2022-05-31 04:55:04 +03:00
2022-07-22 22:30:39 +03:00
let response =
JsonRpcForwardedResponse::from_value(json!(partial_response), id.clone());
2022-05-31 04:55:04 +03:00
Ok(response.into())
}
2022-08-16 03:33:26 +03:00
_ => app.proxy_web3_rpc(payload.into()).await,
2022-05-31 04:55:04 +03:00
};
(id, response)
}
Err(err) => {
2022-06-06 01:39:44 +03:00
let id = RawValue::from_string("null".to_string()).unwrap();
2022-05-31 04:55:04 +03:00
(id, Err(err.into()))
}
};
let response_str = match response {
Ok(x) => serde_json::to_string(&x),
Err(err) => {
// we have an anyhow error. turn it into
let response = JsonRpcForwardedResponse::from_anyhow_error(err, id);
serde_json::to_string(&response)
}
}
.unwrap();
Message::Text(response_str)
}
2022-05-29 20:28:41 +03:00
async fn read_web3_socket(
2022-07-07 06:22:09 +03:00
app: Arc<Web3ProxyApp>,
2022-05-29 20:28:41 +03:00
mut ws_rx: SplitStream<WebSocket>,
2022-07-09 01:14:45 +03:00
response_sender: flume::Sender<Message>,
2022-05-29 20:28:41 +03:00
) {
let mut subscriptions = HashMap::new();
2022-07-09 01:14:45 +03:00
let subscription_count = AtomicUsize::new(1);
2022-05-29 20:28:41 +03:00
while let Some(Ok(msg)) = ws_rx.next().await {
// new message from our client. forward to a backend and then send it through response_tx
let response_msg = match msg {
Message::Text(payload) => {
2022-07-09 01:14:45 +03:00
handle_socket_payload(
app.clone(),
&payload,
&response_sender,
&subscription_count,
&mut subscriptions,
)
.await
2022-05-29 20:28:41 +03:00
}
Message::Ping(x) => Message::Pong(x),
2022-05-31 04:55:04 +03:00
Message::Pong(x) => {
2022-07-07 06:22:09 +03:00
trace!("pong: {:?}", x);
2022-05-31 04:55:04 +03:00
continue;
}
Message::Close(_) => {
info!("closing websocket connection");
break;
}
Message::Binary(mut payload) => {
2022-08-11 03:16:13 +03:00
// TODO: poke rate limit for the user/ip
2022-05-31 04:55:04 +03:00
let payload = from_utf8_mut(&mut payload).unwrap();
2022-07-09 01:14:45 +03:00
handle_socket_payload(
app.clone(),
payload,
&response_sender,
&subscription_count,
&mut subscriptions,
)
.await
2022-05-31 04:55:04 +03:00
}
2022-05-29 20:28:41 +03:00
};
2022-07-09 01:14:45 +03:00
match response_sender.send_async(response_msg).await {
2022-05-30 04:28:22 +03:00
Ok(_) => {}
Err(err) => {
error!("{}", err);
break;
}
2022-05-29 20:28:41 +03:00
};
}
}
async fn write_web3_socket(
response_rx: flume::Receiver<Message>,
mut ws_tx: SplitSink<WebSocket, Message>,
) {
2022-07-09 01:14:45 +03:00
// TODO: increment counter for open websockets
2022-05-29 20:28:41 +03:00
while let Ok(msg) = response_rx.recv_async().await {
2022-08-11 03:16:13 +03:00
// a response is ready
// TODO: poke rate limits for this user?
// forward the response to through the websocket
2022-06-16 05:53:37 +03:00
if let Err(err) = ws_tx.send(msg).await {
2022-07-09 01:14:45 +03:00
// this isn't a problem. this is common and happens whenever a client disconnects
trace!(?err, "unable to write to websocket");
2022-05-29 20:28:41 +03:00
break;
};
}
2022-07-09 01:14:45 +03:00
// TODO: decrement counter for open websockets
2022-05-29 20:28:41 +03:00
}