Line data Source code
1 : // Copyright (c) 2015-2022 The Bitcoin Core developers
2 : // Distributed under the MIT software license, see the accompanying
3 : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 :
5 : #if defined(HAVE_CONFIG_H)
6 : #include <config/bitcoin-config.h>
7 : #endif
8 :
9 : #include <httpserver.h>
10 :
11 : #include <chainparamsbase.h>
12 : #include <common/args.h>
13 : #include <compat/compat.h>
14 : #include <logging.h>
15 : #include <netbase.h>
16 : #include <node/interface_ui.h>
17 : #include <rpc/protocol.h> // For HTTP status codes
18 : #include <shutdown.h>
19 : #include <sync.h>
20 : #include <util/strencodings.h>
21 : #include <util/threadnames.h>
22 : #include <util/translation.h>
23 :
24 : #include <condition_variable>
25 : #include <cstdio>
26 : #include <cstdlib>
27 : #include <deque>
28 : #include <memory>
29 : #include <optional>
30 : #include <string>
31 : #include <unordered_set>
32 :
33 : #include <sys/types.h>
34 : #include <sys/stat.h>
35 :
36 : #include <event2/buffer.h>
37 : #include <event2/bufferevent.h>
38 : #include <event2/http.h>
39 : #include <event2/http_struct.h>
40 : #include <event2/keyvalq_struct.h>
41 : #include <event2/thread.h>
42 : #include <event2/util.h>
43 :
44 : #include <support/events.h>
45 :
46 : /** Maximum size of http request (request line + headers) */
47 : static const size_t MAX_HEADERS_SIZE = 8192;
48 :
49 : /** HTTP request work item */
50 : class HTTPWorkItem final : public HTTPClosure
51 : {
52 : public:
53 0 : HTTPWorkItem(std::unique_ptr<HTTPRequest> _req, const std::string &_path, const HTTPRequestHandler& _func):
54 0 : req(std::move(_req)), path(_path), func(_func)
55 0 : {
56 0 : }
57 0 : void operator()() override
58 : {
59 0 : func(req.get(), path);
60 0 : }
61 :
62 : std::unique_ptr<HTTPRequest> req;
63 :
64 : private:
65 : std::string path;
66 : HTTPRequestHandler func;
67 : };
68 :
69 : /** Simple work queue for distributing work over multiple threads.
70 : * Work items are simply callable objects.
71 : */
72 : template <typename WorkItem>
73 : class WorkQueue
74 2 : {
75 : private:
76 : Mutex cs;
77 : std::condition_variable cond GUARDED_BY(cs);
78 : std::deque<std::unique_ptr<WorkItem>> queue GUARDED_BY(cs);
79 0 : bool running GUARDED_BY(cs){true};
80 : const size_t maxDepth;
81 :
82 : public:
83 0 : explicit WorkQueue(size_t _maxDepth) : maxDepth(_maxDepth)
84 : {
85 0 : }
86 : /** Precondition: worker threads have all stopped (they have been joined).
87 : */
88 0 : ~WorkQueue() = default;
89 : /** Enqueue a work item */
90 0 : bool Enqueue(WorkItem* item) EXCLUSIVE_LOCKS_REQUIRED(!cs)
91 : {
92 0 : LOCK(cs);
93 0 : if (!running || queue.size() >= maxDepth) {
94 0 : return false;
95 : }
96 0 : queue.emplace_back(std::unique_ptr<WorkItem>(item));
97 0 : cond.notify_one();
98 0 : return true;
99 0 : }
100 : /** Thread function */
101 0 : void Run() EXCLUSIVE_LOCKS_REQUIRED(!cs)
102 : {
103 0 : while (true) {
104 0 : std::unique_ptr<WorkItem> i;
105 : {
106 0 : WAIT_LOCK(cs, lock);
107 0 : while (running && queue.empty())
108 0 : cond.wait(lock);
109 0 : if (!running && queue.empty())
110 0 : break;
111 0 : i = std::move(queue.front());
112 0 : queue.pop_front();
113 0 : }
114 0 : (*i)();
115 0 : }
116 0 : }
117 : /** Interrupt and exit loops */
118 0 : void Interrupt() EXCLUSIVE_LOCKS_REQUIRED(!cs)
119 : {
120 0 : LOCK(cs);
121 0 : running = false;
122 0 : cond.notify_all();
123 0 : }
124 : };
125 :
126 : struct HTTPPathHandler
127 : {
128 0 : HTTPPathHandler(std::string _prefix, bool _exactMatch, HTTPRequestHandler _handler):
129 0 : prefix(_prefix), exactMatch(_exactMatch), handler(_handler)
130 : {
131 0 : }
132 : std::string prefix;
133 : bool exactMatch;
134 : HTTPRequestHandler handler;
135 : };
136 :
137 : /** HTTP module state */
138 :
139 : //! libevent event loop
140 : static struct event_base* eventBase = nullptr;
141 : //! HTTP server
142 : static struct evhttp* eventHTTP = nullptr;
143 : //! List of subnets to allow RPC connections from
144 2 : static std::vector<CSubNet> rpc_allow_subnets;
145 : //! Work queue for handling longer requests off the event loop thread
146 : static std::unique_ptr<WorkQueue<HTTPClosure>> g_work_queue{nullptr};
147 : //! Handlers for (sub)paths
148 : static GlobalMutex g_httppathhandlers_mutex;
149 2 : static std::vector<HTTPPathHandler> pathHandlers GUARDED_BY(g_httppathhandlers_mutex);
150 : //! Bound listening sockets
151 2 : static std::vector<evhttp_bound_socket *> boundSockets;
152 : //! Track active requests
153 : static GlobalMutex g_requests_mutex;
154 2 : static std::condition_variable g_requests_cv;
155 2 : static std::unordered_set<evhttp_request*> g_requests GUARDED_BY(g_requests_mutex);
156 :
157 : /** Check if a network address is allowed to access the HTTP server */
158 0 : static bool ClientAllowed(const CNetAddr& netaddr)
159 : {
160 0 : if (!netaddr.IsValid())
161 0 : return false;
162 0 : for(const CSubNet& subnet : rpc_allow_subnets)
163 0 : if (subnet.Match(netaddr))
164 0 : return true;
165 0 : return false;
166 0 : }
167 :
168 : /** Initialize ACL list for HTTP server */
169 0 : static bool InitHTTPAllowList()
170 : {
171 0 : rpc_allow_subnets.clear();
172 0 : rpc_allow_subnets.push_back(CSubNet{LookupHost("127.0.0.1", false).value(), 8}); // always allow IPv4 local subnet
173 0 : rpc_allow_subnets.push_back(CSubNet{LookupHost("::1", false).value()}); // always allow IPv6 localhost
174 0 : for (const std::string& strAllow : gArgs.GetArgs("-rpcallowip")) {
175 0 : CSubNet subnet;
176 0 : LookupSubNet(strAllow, subnet);
177 0 : if (!subnet.IsValid()) {
178 0 : uiInterface.ThreadSafeMessageBox(
179 0 : strprintf(Untranslated("Invalid -rpcallowip subnet specification: %s. Valid are a single IP (e.g. 1.2.3.4), a network/netmask (e.g. 1.2.3.4/255.255.255.0) or a network/CIDR (e.g. 1.2.3.4/24)."), strAllow),
180 0 : "", CClientUIInterface::MSG_ERROR);
181 0 : return false;
182 : }
183 0 : rpc_allow_subnets.push_back(subnet);
184 0 : }
185 0 : std::string strAllowed;
186 0 : for (const CSubNet& subnet : rpc_allow_subnets)
187 0 : strAllowed += subnet.ToString() + " ";
188 0 : LogPrint(BCLog::HTTP, "Allowing HTTP connections from: %s\n", strAllowed);
189 0 : return true;
190 0 : }
191 :
192 : /** HTTP request method as string - use for logging only */
193 0 : std::string RequestMethodString(HTTPRequest::RequestMethod m)
194 : {
195 0 : switch (m) {
196 : case HTTPRequest::GET:
197 0 : return "GET";
198 : case HTTPRequest::POST:
199 0 : return "POST";
200 : case HTTPRequest::HEAD:
201 0 : return "HEAD";
202 : case HTTPRequest::PUT:
203 0 : return "PUT";
204 : case HTTPRequest::UNKNOWN:
205 0 : return "unknown";
206 : } // no default case, so the compiler can warn about missing cases
207 0 : assert(false);
208 0 : }
209 :
210 : /** HTTP request callback */
211 0 : static void http_request_cb(struct evhttp_request* req, void* arg)
212 : {
213 : // Track requests and notify when a request is completed.
214 : {
215 0 : WITH_LOCK(g_requests_mutex, g_requests.insert(req));
216 0 : g_requests_cv.notify_all();
217 0 : evhttp_request_set_on_complete_cb(req, [](struct evhttp_request* req, void*) {
218 0 : auto n{WITH_LOCK(g_requests_mutex, return g_requests.erase(req))};
219 0 : assert(n == 1);
220 0 : g_requests_cv.notify_all();
221 0 : }, nullptr);
222 : }
223 :
224 : // Disable reading to work around a libevent bug, fixed in 2.1.9
225 : // See https://github.com/libevent/libevent/commit/5ff8eb26371c4dc56f384b2de35bea2d87814779
226 : // and https://github.com/bitcoin/bitcoin/pull/11593.
227 0 : if (event_get_version_number() >= 0x02010600 && event_get_version_number() < 0x02010900) {
228 0 : evhttp_connection* conn = evhttp_request_get_connection(req);
229 0 : if (conn) {
230 0 : bufferevent* bev = evhttp_connection_get_bufferevent(conn);
231 0 : if (bev) {
232 0 : bufferevent_disable(bev, EV_READ);
233 0 : }
234 0 : }
235 0 : }
236 0 : std::unique_ptr<HTTPRequest> hreq(new HTTPRequest(req));
237 :
238 : // Early address-based allow check
239 0 : if (!ClientAllowed(hreq->GetPeer())) {
240 0 : LogPrint(BCLog::HTTP, "HTTP request from %s rejected: Client network is not allowed RPC access\n",
241 : hreq->GetPeer().ToStringAddrPort());
242 0 : hreq->WriteReply(HTTP_FORBIDDEN);
243 0 : return;
244 : }
245 :
246 : // Early reject unknown HTTP methods
247 0 : if (hreq->GetRequestMethod() == HTTPRequest::UNKNOWN) {
248 0 : LogPrint(BCLog::HTTP, "HTTP request from %s rejected: Unknown HTTP request method\n",
249 : hreq->GetPeer().ToStringAddrPort());
250 0 : hreq->WriteReply(HTTP_BAD_METHOD);
251 0 : return;
252 : }
253 :
254 0 : LogPrint(BCLog::HTTP, "Received a %s request for %s from %s\n",
255 : RequestMethodString(hreq->GetRequestMethod()), SanitizeString(hreq->GetURI(), SAFE_CHARS_URI).substr(0, 100), hreq->GetPeer().ToStringAddrPort());
256 :
257 : // Find registered handler for prefix
258 0 : std::string strURI = hreq->GetURI();
259 0 : std::string path;
260 0 : LOCK(g_httppathhandlers_mutex);
261 0 : std::vector<HTTPPathHandler>::const_iterator i = pathHandlers.begin();
262 0 : std::vector<HTTPPathHandler>::const_iterator iend = pathHandlers.end();
263 0 : for (; i != iend; ++i) {
264 0 : bool match = false;
265 0 : if (i->exactMatch)
266 0 : match = (strURI == i->prefix);
267 : else
268 0 : match = (strURI.substr(0, i->prefix.size()) == i->prefix);
269 0 : if (match) {
270 0 : path = strURI.substr(i->prefix.size());
271 0 : break;
272 : }
273 0 : }
274 :
275 : // Dispatch to worker thread
276 0 : if (i != iend) {
277 0 : std::unique_ptr<HTTPWorkItem> item(new HTTPWorkItem(std::move(hreq), path, i->handler));
278 0 : assert(g_work_queue);
279 0 : if (g_work_queue->Enqueue(item.get())) {
280 0 : item.release(); /* if true, queue took ownership */
281 0 : } else {
282 0 : LogPrintf("WARNING: request rejected because http work queue depth exceeded, it can be increased with the -rpcworkqueue= setting\n");
283 0 : item->req->WriteReply(HTTP_SERVICE_UNAVAILABLE, "Work queue depth exceeded");
284 : }
285 0 : } else {
286 0 : hreq->WriteReply(HTTP_NOT_FOUND);
287 : }
288 0 : }
289 :
290 : /** Callback to reject HTTP requests after shutdown. */
291 0 : static void http_reject_request_cb(struct evhttp_request* req, void*)
292 : {
293 0 : LogPrint(BCLog::HTTP, "Rejecting request while shutting down\n");
294 0 : evhttp_send_error(req, HTTP_SERVUNAVAIL, nullptr);
295 0 : }
296 :
297 : /** Event dispatcher thread */
298 0 : static void ThreadHTTP(struct event_base* base)
299 : {
300 0 : util::ThreadRename("http");
301 0 : LogPrint(BCLog::HTTP, "Entering http event loop\n");
302 0 : event_base_dispatch(base);
303 : // Event loop will be interrupted by InterruptHTTPServer()
304 0 : LogPrint(BCLog::HTTP, "Exited http event loop\n");
305 0 : }
306 :
307 : /** Bind HTTP server to specified addresses */
308 0 : static bool HTTPBindAddresses(struct evhttp* http)
309 : {
310 0 : uint16_t http_port{static_cast<uint16_t>(gArgs.GetIntArg("-rpcport", BaseParams().RPCPort()))};
311 0 : std::vector<std::pair<std::string, uint16_t>> endpoints;
312 :
313 : // Determine what addresses to bind to
314 0 : if (!(gArgs.IsArgSet("-rpcallowip") && gArgs.IsArgSet("-rpcbind"))) { // Default to loopback if not allowing external IPs
315 0 : endpoints.push_back(std::make_pair("::1", http_port));
316 0 : endpoints.push_back(std::make_pair("127.0.0.1", http_port));
317 0 : if (gArgs.IsArgSet("-rpcallowip")) {
318 0 : LogPrintf("WARNING: option -rpcallowip was specified without -rpcbind; this doesn't usually make sense\n");
319 0 : }
320 0 : if (gArgs.IsArgSet("-rpcbind")) {
321 0 : LogPrintf("WARNING: option -rpcbind was ignored because -rpcallowip was not specified, refusing to allow everyone to connect\n");
322 0 : }
323 0 : } else if (gArgs.IsArgSet("-rpcbind")) { // Specific bind address
324 0 : for (const std::string& strRPCBind : gArgs.GetArgs("-rpcbind")) {
325 0 : uint16_t port{http_port};
326 0 : std::string host;
327 0 : SplitHostPort(strRPCBind, port, host);
328 0 : endpoints.push_back(std::make_pair(host, port));
329 0 : }
330 0 : }
331 :
332 : // Bind addresses
333 0 : for (std::vector<std::pair<std::string, uint16_t> >::iterator i = endpoints.begin(); i != endpoints.end(); ++i) {
334 0 : LogPrintf("Binding RPC on address %s port %i\n", i->first, i->second);
335 0 : evhttp_bound_socket *bind_handle = evhttp_bind_socket_with_handle(http, i->first.empty() ? nullptr : i->first.c_str(), i->second);
336 0 : if (bind_handle) {
337 0 : const std::optional<CNetAddr> addr{LookupHost(i->first, false)};
338 0 : if (i->first.empty() || (addr.has_value() && addr->IsBindAny())) {
339 0 : LogPrintf("WARNING: the RPC server is not safe to expose to untrusted networks such as the public internet\n");
340 0 : }
341 0 : boundSockets.push_back(bind_handle);
342 0 : } else {
343 0 : LogPrintf("Binding RPC on address %s port %i failed.\n", i->first, i->second);
344 : }
345 0 : }
346 0 : return !boundSockets.empty();
347 0 : }
348 :
349 : /** Simple wrapper to set thread name and run work queue */
350 0 : static void HTTPWorkQueueRun(WorkQueue<HTTPClosure>* queue, int worker_num)
351 : {
352 0 : util::ThreadRename(strprintf("httpworker.%i", worker_num));
353 0 : queue->Run();
354 0 : }
355 :
356 : /** libevent event log callback */
357 0 : static void libevent_log_cb(int severity, const char *msg)
358 : {
359 : BCLog::Level level;
360 0 : switch (severity) {
361 : case EVENT_LOG_DEBUG:
362 0 : level = BCLog::Level::Debug;
363 0 : break;
364 : case EVENT_LOG_MSG:
365 0 : level = BCLog::Level::Info;
366 0 : break;
367 : case EVENT_LOG_WARN:
368 0 : level = BCLog::Level::Warning;
369 0 : break;
370 : default: // EVENT_LOG_ERR and others are mapped to error
371 0 : level = BCLog::Level::Error;
372 0 : break;
373 : }
374 0 : LogPrintLevel(BCLog::LIBEVENT, level, "%s\n", msg);
375 0 : }
376 :
377 0 : bool InitHTTPServer()
378 : {
379 0 : if (!InitHTTPAllowList())
380 0 : return false;
381 :
382 : // Redirect libevent's logging to our own log
383 0 : event_set_log_callback(&libevent_log_cb);
384 : // Update libevent's log handling.
385 0 : UpdateHTTPServerLogging(LogInstance().WillLogCategory(BCLog::LIBEVENT));
386 :
387 : #ifdef WIN32
388 : evthread_use_windows_threads();
389 : #else
390 0 : evthread_use_pthreads();
391 : #endif
392 :
393 0 : raii_event_base base_ctr = obtain_event_base();
394 :
395 : /* Create a new evhttp object to handle requests. */
396 0 : raii_evhttp http_ctr = obtain_evhttp(base_ctr.get());
397 0 : struct evhttp* http = http_ctr.get();
398 0 : if (!http) {
399 0 : LogPrintf("couldn't create evhttp. Exiting.\n");
400 0 : return false;
401 : }
402 :
403 0 : evhttp_set_timeout(http, gArgs.GetIntArg("-rpcservertimeout", DEFAULT_HTTP_SERVER_TIMEOUT));
404 0 : evhttp_set_max_headers_size(http, MAX_HEADERS_SIZE);
405 0 : evhttp_set_max_body_size(http, MAX_SIZE);
406 0 : evhttp_set_gencb(http, http_request_cb, nullptr);
407 :
408 0 : if (!HTTPBindAddresses(http)) {
409 0 : LogPrintf("Unable to bind any endpoint for RPC server\n");
410 0 : return false;
411 : }
412 :
413 0 : LogPrint(BCLog::HTTP, "Initialized HTTP server\n");
414 0 : int workQueueDepth = std::max((long)gArgs.GetIntArg("-rpcworkqueue", DEFAULT_HTTP_WORKQUEUE), 1L);
415 0 : LogPrintfCategory(BCLog::HTTP, "creating work queue of depth %d\n", workQueueDepth);
416 :
417 0 : g_work_queue = std::make_unique<WorkQueue<HTTPClosure>>(workQueueDepth);
418 : // transfer ownership to eventBase/HTTP via .release()
419 0 : eventBase = base_ctr.release();
420 0 : eventHTTP = http_ctr.release();
421 0 : return true;
422 0 : }
423 :
424 0 : void UpdateHTTPServerLogging(bool enable) {
425 0 : if (enable) {
426 0 : event_enable_debug_logging(EVENT_DBG_ALL);
427 0 : } else {
428 0 : event_enable_debug_logging(EVENT_DBG_NONE);
429 : }
430 0 : }
431 :
432 2 : static std::thread g_thread_http;
433 2 : static std::vector<std::thread> g_thread_http_workers;
434 :
435 0 : void StartHTTPServer()
436 : {
437 0 : LogPrint(BCLog::HTTP, "Starting HTTP server\n");
438 0 : int rpcThreads = std::max((long)gArgs.GetIntArg("-rpcthreads", DEFAULT_HTTP_THREADS), 1L);
439 0 : LogPrintfCategory(BCLog::HTTP, "starting %d worker threads\n", rpcThreads);
440 0 : g_thread_http = std::thread(ThreadHTTP, eventBase);
441 :
442 0 : for (int i = 0; i < rpcThreads; i++) {
443 0 : g_thread_http_workers.emplace_back(HTTPWorkQueueRun, g_work_queue.get(), i);
444 0 : }
445 0 : }
446 :
447 0 : void InterruptHTTPServer()
448 : {
449 0 : LogPrint(BCLog::HTTP, "Interrupting HTTP server\n");
450 0 : if (eventHTTP) {
451 : // Reject requests on current connections
452 0 : evhttp_set_gencb(eventHTTP, http_reject_request_cb, nullptr);
453 0 : }
454 0 : if (g_work_queue) {
455 0 : g_work_queue->Interrupt();
456 0 : }
457 0 : }
458 :
459 0 : void StopHTTPServer()
460 : {
461 0 : LogPrint(BCLog::HTTP, "Stopping HTTP server\n");
462 0 : if (g_work_queue) {
463 0 : LogPrint(BCLog::HTTP, "Waiting for HTTP worker threads to exit\n");
464 0 : for (auto& thread : g_thread_http_workers) {
465 0 : thread.join();
466 : }
467 0 : g_thread_http_workers.clear();
468 0 : }
469 : // Unlisten sockets, these are what make the event loop running, which means
470 : // that after this and all connections are closed the event loop will quit.
471 0 : for (evhttp_bound_socket *socket : boundSockets) {
472 0 : evhttp_del_accept_socket(eventHTTP, socket);
473 : }
474 0 : boundSockets.clear();
475 : {
476 0 : WAIT_LOCK(g_requests_mutex, lock);
477 0 : if (!g_requests.empty()) {
478 0 : LogPrint(BCLog::HTTP, "Waiting for %d requests to stop HTTP server\n", g_requests.size());
479 0 : }
480 0 : g_requests_cv.wait(lock, []() EXCLUSIVE_LOCKS_REQUIRED(g_requests_mutex) {
481 0 : return g_requests.empty();
482 : });
483 0 : }
484 0 : if (eventHTTP) {
485 : // Schedule a callback to call evhttp_free in the event base thread, so
486 : // that evhttp_free does not need to be called again after the handling
487 : // of unfinished request connections that follows.
488 0 : event_base_once(eventBase, -1, EV_TIMEOUT, [](evutil_socket_t, short, void*) {
489 0 : evhttp_free(eventHTTP);
490 0 : eventHTTP = nullptr;
491 0 : }, nullptr, nullptr);
492 0 : }
493 0 : if (eventBase) {
494 0 : LogPrint(BCLog::HTTP, "Waiting for HTTP event thread to exit\n");
495 0 : if (g_thread_http.joinable()) g_thread_http.join();
496 0 : event_base_free(eventBase);
497 0 : eventBase = nullptr;
498 0 : }
499 0 : g_work_queue.reset();
500 0 : LogPrint(BCLog::HTTP, "Stopped HTTP server\n");
501 0 : }
502 :
503 0 : struct event_base* EventBase()
504 : {
505 0 : return eventBase;
506 : }
507 :
508 0 : static void httpevent_callback_fn(evutil_socket_t, short, void* data)
509 : {
510 : // Static handler: simply call inner handler
511 0 : HTTPEvent *self = static_cast<HTTPEvent*>(data);
512 0 : self->handler();
513 0 : if (self->deleteWhenTriggered)
514 0 : delete self;
515 0 : }
516 :
517 0 : HTTPEvent::HTTPEvent(struct event_base* base, bool _deleteWhenTriggered, const std::function<void()>& _handler):
518 0 : deleteWhenTriggered(_deleteWhenTriggered), handler(_handler)
519 : {
520 0 : ev = event_new(base, -1, 0, httpevent_callback_fn, this);
521 0 : assert(ev);
522 0 : }
523 0 : HTTPEvent::~HTTPEvent()
524 : {
525 0 : event_free(ev);
526 0 : }
527 0 : void HTTPEvent::trigger(struct timeval* tv)
528 : {
529 0 : if (tv == nullptr)
530 0 : event_active(ev, 0, 0); // immediately trigger event in main thread
531 : else
532 0 : evtimer_add(ev, tv); // trigger after timeval passed
533 0 : }
534 0 : HTTPRequest::HTTPRequest(struct evhttp_request* _req, bool _replySent) : req(_req), replySent(_replySent)
535 : {
536 0 : }
537 :
538 0 : HTTPRequest::~HTTPRequest()
539 : {
540 0 : if (!replySent) {
541 : // Keep track of whether reply was sent to avoid request leaks
542 0 : LogPrintf("%s: Unhandled request\n", __func__);
543 0 : WriteReply(HTTP_INTERNAL_SERVER_ERROR, "Unhandled request");
544 0 : }
545 : // evhttpd cleans up the request, as long as a reply was sent.
546 0 : }
547 :
548 0 : std::pair<bool, std::string> HTTPRequest::GetHeader(const std::string& hdr) const
549 : {
550 0 : const struct evkeyvalq* headers = evhttp_request_get_input_headers(req);
551 0 : assert(headers);
552 0 : const char* val = evhttp_find_header(headers, hdr.c_str());
553 0 : if (val)
554 0 : return std::make_pair(true, val);
555 : else
556 0 : return std::make_pair(false, "");
557 0 : }
558 :
559 0 : std::string HTTPRequest::ReadBody()
560 : {
561 0 : struct evbuffer* buf = evhttp_request_get_input_buffer(req);
562 0 : if (!buf)
563 0 : return "";
564 0 : size_t size = evbuffer_get_length(buf);
565 : /** Trivial implementation: if this is ever a performance bottleneck,
566 : * internal copying can be avoided in multi-segment buffers by using
567 : * evbuffer_peek and an awkward loop. Though in that case, it'd be even
568 : * better to not copy into an intermediate string but use a stream
569 : * abstraction to consume the evbuffer on the fly in the parsing algorithm.
570 : */
571 0 : const char* data = (const char*)evbuffer_pullup(buf, size);
572 0 : if (!data) // returns nullptr in case of empty buffer
573 0 : return "";
574 0 : std::string rv(data, size);
575 0 : evbuffer_drain(buf, size);
576 0 : return rv;
577 0 : }
578 :
579 0 : void HTTPRequest::WriteHeader(const std::string& hdr, const std::string& value)
580 : {
581 0 : struct evkeyvalq* headers = evhttp_request_get_output_headers(req);
582 0 : assert(headers);
583 0 : evhttp_add_header(headers, hdr.c_str(), value.c_str());
584 0 : }
585 :
586 : /** Closure sent to main thread to request a reply to be sent to
587 : * a HTTP request.
588 : * Replies must be sent in the main loop in the main http thread,
589 : * this cannot be done from worker threads.
590 : */
591 0 : void HTTPRequest::WriteReply(int nStatus, const std::string& strReply)
592 : {
593 0 : assert(!replySent && req);
594 0 : if (ShutdownRequested()) {
595 0 : WriteHeader("Connection", "close");
596 0 : }
597 : // Send event to main http thread to send reply message
598 0 : struct evbuffer* evb = evhttp_request_get_output_buffer(req);
599 0 : assert(evb);
600 0 : evbuffer_add(evb, strReply.data(), strReply.size());
601 0 : auto req_copy = req;
602 0 : HTTPEvent* ev = new HTTPEvent(eventBase, true, [req_copy, nStatus]{
603 0 : evhttp_send_reply(req_copy, nStatus, nullptr, nullptr);
604 : // Re-enable reading from the socket. This is the second part of the libevent
605 : // workaround above.
606 0 : if (event_get_version_number() >= 0x02010600 && event_get_version_number() < 0x02010900) {
607 0 : evhttp_connection* conn = evhttp_request_get_connection(req_copy);
608 0 : if (conn) {
609 0 : bufferevent* bev = evhttp_connection_get_bufferevent(conn);
610 0 : if (bev) {
611 0 : bufferevent_enable(bev, EV_READ | EV_WRITE);
612 0 : }
613 0 : }
614 0 : }
615 0 : });
616 0 : ev->trigger(nullptr);
617 0 : replySent = true;
618 0 : req = nullptr; // transferred back to main thread
619 0 : }
620 :
621 0 : CService HTTPRequest::GetPeer() const
622 : {
623 0 : evhttp_connection* con = evhttp_request_get_connection(req);
624 0 : CService peer;
625 0 : if (con) {
626 : // evhttp retains ownership over returned address string
627 0 : const char* address = "";
628 0 : uint16_t port = 0;
629 :
630 : #ifdef HAVE_EVHTTP_CONNECTION_GET_PEER_CONST_CHAR
631 : evhttp_connection_get_peer(con, &address, &port);
632 : #else
633 0 : evhttp_connection_get_peer(con, (char**)&address, &port);
634 : #endif // HAVE_EVHTTP_CONNECTION_GET_PEER_CONST_CHAR
635 :
636 0 : peer = LookupNumeric(address, port);
637 0 : }
638 0 : return peer;
639 0 : }
640 :
641 0 : std::string HTTPRequest::GetURI() const
642 : {
643 0 : return evhttp_request_get_uri(req);
644 0 : }
645 :
646 0 : HTTPRequest::RequestMethod HTTPRequest::GetRequestMethod() const
647 : {
648 0 : switch (evhttp_request_get_command(req)) {
649 : case EVHTTP_REQ_GET:
650 0 : return GET;
651 : case EVHTTP_REQ_POST:
652 0 : return POST;
653 : case EVHTTP_REQ_HEAD:
654 0 : return HEAD;
655 : case EVHTTP_REQ_PUT:
656 0 : return PUT;
657 : default:
658 0 : return UNKNOWN;
659 : }
660 0 : }
661 :
662 0 : std::optional<std::string> HTTPRequest::GetQueryParameter(const std::string& key) const
663 : {
664 0 : const char* uri{evhttp_request_get_uri(req)};
665 :
666 0 : return GetQueryParameterFromUri(uri, key);
667 : }
668 :
669 0 : std::optional<std::string> GetQueryParameterFromUri(const char* uri, const std::string& key)
670 : {
671 0 : evhttp_uri* uri_parsed{evhttp_uri_parse(uri)};
672 0 : if (!uri_parsed) {
673 0 : throw std::runtime_error("URI parsing failed, it likely contained RFC 3986 invalid characters");
674 : }
675 0 : const char* query{evhttp_uri_get_query(uri_parsed)};
676 0 : std::optional<std::string> result;
677 :
678 0 : if (query) {
679 : // Parse the query string into a key-value queue and iterate over it
680 : struct evkeyvalq params_q;
681 0 : evhttp_parse_query_str(query, ¶ms_q);
682 :
683 0 : for (struct evkeyval* param{params_q.tqh_first}; param != nullptr; param = param->next.tqe_next) {
684 0 : if (param->key == key) {
685 0 : result = param->value;
686 0 : break;
687 : }
688 0 : }
689 0 : evhttp_clear_headers(¶ms_q);
690 0 : }
691 0 : evhttp_uri_free(uri_parsed);
692 :
693 0 : return result;
694 0 : }
695 :
696 0 : void RegisterHTTPHandler(const std::string &prefix, bool exactMatch, const HTTPRequestHandler &handler)
697 : {
698 0 : LogPrint(BCLog::HTTP, "Registering HTTP handler for %s (exactmatch %d)\n", prefix, exactMatch);
699 0 : LOCK(g_httppathhandlers_mutex);
700 0 : pathHandlers.push_back(HTTPPathHandler(prefix, exactMatch, handler));
701 0 : }
702 :
703 0 : void UnregisterHTTPHandler(const std::string &prefix, bool exactMatch)
704 : {
705 0 : LOCK(g_httppathhandlers_mutex);
706 0 : std::vector<HTTPPathHandler>::iterator i = pathHandlers.begin();
707 0 : std::vector<HTTPPathHandler>::iterator iend = pathHandlers.end();
708 0 : for (; i != iend; ++i)
709 0 : if (i->prefix == prefix && i->exactMatch == exactMatch)
710 0 : break;
711 0 : if (i != iend)
712 : {
713 0 : LogPrint(BCLog::HTTP, "Unregistering HTTP handler for %s (exactmatch %d)\n", prefix, exactMatch);
714 0 : pathHandlers.erase(i);
715 0 : }
716 0 : }
|