//! Take a user's HTTP JSON-RPC requests and either respond from local data or proxy the request to a backend rpc server. use super::authorization::{ip_is_authorized, key_is_authorized}; use super::errors::FrontendResult; use crate::{app::Web3ProxyApp, jsonrpc::JsonRpcRequestEnum}; use axum::extract::Path; use axum::headers::{Origin, Referer, UserAgent}; use axum::TypedHeader; use axum::{response::IntoResponse, Extension, Json}; use axum_client_ip::ClientIp; use axum_macros::debug_handler; use std::sync::Arc; /// POST /rpc -- Public entrypoint for HTTP JSON-RPC requests. Web3 wallets use this. /// Defaults to rate limiting by IP address, but can also read the Authorization header for a bearer token. /// If possible, please use a WebSocket instead. #[debug_handler] pub async fn proxy_web3_rpc( Extension(app): Extension>, ClientIp(ip): ClientIp, origin: Option>, Json(payload): Json, ) -> FrontendResult { // TODO: do we care about keeping the TypedHeader wrapper? let origin = origin.map(|x| x.0); let (authorization, _semaphore) = ip_is_authorized(&app, ip, origin).await?; let authorization = Arc::new(authorization); // TODO: spawn earlier? i think we want ip_is_authorized in this future let f = tokio::spawn(async move { app.proxy_web3_rpc(authorization, payload).await }); let response = f.await.expect("joinhandle should always work")?; Ok(Json(&response).into_response()) } /// Authenticated entrypoint for HTTP JSON-RPC requests. Web3 wallets use this. /// Rate limit and billing based on the api key in the url. /// Can optionally authorized based on origin, referer, or user agent. /// If possible, please use a WebSocket instead. #[debug_handler] pub async fn proxy_web3_rpc_with_key( Extension(app): Extension>, ClientIp(ip): ClientIp, Json(payload): Json, origin: Option>, referer: Option>, user_agent: Option>, Path(rpc_key): Path, ) -> FrontendResult { let rpc_key = rpc_key.parse()?; // keep the semaphore until the end of the response let (authorization, _semaphore) = key_is_authorized( &app, rpc_key, ip, origin.map(|x| x.0), referer.map(|x| x.0), user_agent.map(|x| x.0), ) .await?; let authorization = Arc::new(authorization); // the request can take a while, so we spawn so that we can start serving another request // TODO: spawn even earlier? let f = tokio::spawn(async move { app.proxy_web3_rpc(authorization, payload) .await }); // if this is an error, we are likely shutting down let response = f.await??; Ok(Json(&response).into_response()) }