1#![warn(missing_docs)]
22
23pub mod middleware;
24pub mod utils;
25
26use std::{error::Error as StdError, net::SocketAddr, time::Duration};
27
28use jsonrpsee::{
29 core::BoxError,
30 server::{
31 serve_with_graceful_shutdown, stop_channel, ws, PingConfig, ServerHandle, StopHandle,
32 },
33 Methods, RpcModule,
34};
35use tower::Service;
36use utils::{
37 build_rpc_api, deny_unsafe, format_listen_addrs, get_proxy_ip, ListenAddrError, RpcSettings,
38};
39
40pub use ip_network::IpNetwork;
41pub use jsonrpsee::{
42 core::id_providers::{RandomIntegerIdProvider, RandomStringIdProvider},
43 server::{middleware::rpc::RpcServiceBuilder, BatchRequestConfig},
44};
45pub use middleware::{Metrics, MiddlewareLayer, NodeHealthProxyLayer, RpcMetrics};
46pub use utils::{RpcEndpoint, RpcMethods};
47
48const MEGABYTE: u32 = 1024 * 1024;
49
50pub struct Server {
52 handle: ServerHandle,
54 listen_addrs: Vec<SocketAddr>,
56}
57
58impl Server {
59 pub fn new(handle: ServerHandle, listen_addrs: Vec<SocketAddr>) -> Server {
61 Server { handle, listen_addrs }
62 }
63
64 pub fn handle(&self) -> &ServerHandle {
67 &self.handle
68 }
69
70 pub fn listen_addrs(&self) -> &[SocketAddr] {
72 &self.listen_addrs
73 }
74}
75
76impl Drop for Server {
77 fn drop(&mut self) {
78 let _ = self.handle.stop();
80 }
81}
82
83pub trait SubscriptionIdProvider:
85 jsonrpsee::core::traits::IdProvider + dyn_clone::DynClone
86{
87}
88
89dyn_clone::clone_trait_object!(SubscriptionIdProvider);
90
91#[derive(Debug)]
93pub struct Config<M: Send + Sync + 'static> {
94 pub endpoints: Vec<RpcEndpoint>,
96 pub metrics: Option<RpcMetrics>,
98 pub rpc_api: RpcModule<M>,
100 pub id_provider: Option<Box<dyn SubscriptionIdProvider>>,
102 pub tokio_handle: tokio::runtime::Handle,
104}
105
106#[derive(Debug, Clone)]
107struct PerConnection {
108 methods: Methods,
109 stop_handle: StopHandle,
110 metrics: Option<RpcMetrics>,
111 tokio_handle: tokio::runtime::Handle,
112}
113
114pub async fn start_server<M>(config: Config<M>) -> Result<Server, Box<dyn StdError + Send + Sync>>
116where
117 M: Send + Sync,
118{
119 let Config { endpoints, metrics, tokio_handle, rpc_api, id_provider } = config;
120
121 let (stop_handle, server_handle) = stop_channel();
122 let cfg = PerConnection {
123 methods: build_rpc_api(rpc_api).into(),
124 metrics,
125 tokio_handle: tokio_handle.clone(),
126 stop_handle,
127 };
128
129 let mut local_addrs = Vec::new();
130
131 for endpoint in endpoints {
132 let allowed_to_fail = endpoint.is_optional;
133 let local_addr = endpoint.listen_addr;
134
135 let mut listener = match endpoint.bind().await {
136 Ok(l) => l,
137 Err(e) if allowed_to_fail => {
138 log::debug!(target: "rpc", "JSON-RPC server failed to bind optional address: {:?}, error: {:?}", local_addr, e);
139 continue;
140 },
141 Err(e) => return Err(e),
142 };
143 let local_addr = listener.local_addr();
144 local_addrs.push(local_addr);
145 let cfg = cfg.clone();
146
147 let RpcSettings {
148 batch_config,
149 max_connections,
150 max_payload_in_mb,
151 max_payload_out_mb,
152 max_buffer_capacity_per_connection,
153 max_subscriptions_per_connection,
154 rpc_methods,
155 rate_limit_trust_proxy_headers,
156 rate_limit_whitelisted_ips,
157 host_filter,
158 cors,
159 rate_limit,
160 } = listener.rpc_settings();
161
162 let http_middleware = tower::ServiceBuilder::new()
163 .option_layer(host_filter)
164 .layer(NodeHealthProxyLayer::default())
167 .layer(cors);
168
169 let mut builder = jsonrpsee::server::Server::builder()
170 .max_request_body_size(max_payload_in_mb.saturating_mul(MEGABYTE))
171 .max_response_body_size(max_payload_out_mb.saturating_mul(MEGABYTE))
172 .max_connections(max_connections)
173 .max_subscriptions_per_connection(max_subscriptions_per_connection)
174 .enable_ws_ping(
175 PingConfig::new()
176 .ping_interval(Duration::from_secs(30))
177 .inactive_limit(Duration::from_secs(60))
178 .max_failures(3),
179 )
180 .set_http_middleware(http_middleware)
181 .set_message_buffer_capacity(max_buffer_capacity_per_connection)
182 .set_batch_request_config(batch_config)
183 .custom_tokio_runtime(cfg.tokio_handle.clone());
184
185 if let Some(provider) = id_provider.clone() {
186 builder = builder.set_id_provider(provider);
187 } else {
188 builder = builder.set_id_provider(RandomStringIdProvider::new(16));
189 };
190
191 let service_builder = builder.to_service_builder();
192 let deny_unsafe = deny_unsafe(&local_addr, &rpc_methods);
193
194 tokio_handle.spawn(async move {
195 loop {
196 let (sock, remote_addr) = tokio::select! {
197 res = listener.accept() => {
198 match res {
199 Ok(s) => s,
200 Err(e) => {
201 log::debug!(target: "rpc", "Failed to accept connection: {:?}", e);
202 continue;
203 }
204 }
205 }
206 _ = cfg.stop_handle.clone().shutdown() => break,
207 };
208
209 let ip = remote_addr.ip();
210 let cfg2 = cfg.clone();
211 let service_builder2 = service_builder.clone();
212 let rate_limit_whitelisted_ips2 = rate_limit_whitelisted_ips.clone();
213
214 let svc =
215 tower::service_fn(move |mut req: http::Request<hyper::body::Incoming>| {
216 req.extensions_mut().insert(deny_unsafe);
217
218 let PerConnection { methods, metrics, tokio_handle, stop_handle } =
219 cfg2.clone();
220 let service_builder = service_builder2.clone();
221
222 let proxy_ip =
223 if rate_limit_trust_proxy_headers { get_proxy_ip(&req) } else { None };
224
225 let rate_limit_cfg = if rate_limit_whitelisted_ips2
226 .iter()
227 .any(|ips| ips.contains(proxy_ip.unwrap_or(ip)))
228 {
229 log::debug!(target: "rpc", "ip={ip}, proxy_ip={:?} is trusted, disabling rate-limit", proxy_ip);
230 None
231 } else {
232 if !rate_limit_whitelisted_ips2.is_empty() {
233 log::debug!(target: "rpc", "ip={ip}, proxy_ip={:?} is not trusted, rate-limit enabled", proxy_ip);
234 }
235 rate_limit
236 };
237
238 let is_websocket = ws::is_upgrade_request(&req);
239 let transport_label = if is_websocket { "ws" } else { "http" };
240
241 let middleware_layer = match (metrics, rate_limit_cfg) {
242 (None, None) => None,
243 (Some(metrics), None) => Some(
244 MiddlewareLayer::new()
245 .with_metrics(Metrics::new(metrics, transport_label)),
246 ),
247 (None, Some(rate_limit)) =>
248 Some(MiddlewareLayer::new().with_rate_limit_per_minute(rate_limit)),
249 (Some(metrics), Some(rate_limit)) => Some(
250 MiddlewareLayer::new()
251 .with_metrics(Metrics::new(metrics, transport_label))
252 .with_rate_limit_per_minute(rate_limit),
253 ),
254 };
255
256 let rpc_middleware = RpcServiceBuilder::new()
257 .rpc_logger(1024)
258 .option_layer(middleware_layer.clone());
259 let mut svc = service_builder
260 .set_rpc_middleware(rpc_middleware)
261 .build(methods, stop_handle);
262
263 async move {
264 if is_websocket {
265 let on_disconnect = svc.on_session_closed();
266
267 tokio_handle.spawn(async move {
269 let now = std::time::Instant::now();
270 middleware_layer.as_ref().map(|m| m.ws_connect());
271 on_disconnect.await;
272 middleware_layer.as_ref().map(|m| m.ws_disconnect(now));
273 });
274 }
275
276 svc.call(req).await.map_err(|e| BoxError::from(e))
280 }
281 });
282
283 cfg.tokio_handle.spawn(serve_with_graceful_shutdown(
284 sock,
285 svc,
286 cfg.stop_handle.clone().shutdown(),
287 ));
288 }
289 });
290 }
291
292 if local_addrs.is_empty() {
293 return Err(Box::new(ListenAddrError));
294 }
295
296 log::info!("Running JSON-RPC server: addr={}", format_listen_addrs(&local_addrs));
305
306 Ok(Server::new(server_handle, local_addrs))
307}