package rest import ( "crypto/tls" "errors" "fmt" "net/http" "time" "github.com/justinas/alice" "github.com/tal-tech/go-zero/core/codec" "github.com/tal-tech/go-zero/core/load" "github.com/tal-tech/go-zero/core/stat" "github.com/tal-tech/go-zero/rest/handler" "github.com/tal-tech/go-zero/rest/httpx" "github.com/tal-tech/go-zero/rest/internal" "github.com/tal-tech/go-zero/rest/router" ) // use 1000m to represent 100% const topCpuUsage = 1000 // ErrSignatureConfig is an error that indicates bad config for signature. var ErrSignatureConfig = errors.New("bad config for Signature") type engine struct { conf RestConf routes []featuredRoutes unauthorizedCallback handler.UnauthorizedCallback unsignedCallback handler.UnsignedCallback middlewares []Middleware shedder load.Shedder priorityShedder load.Shedder tlsConfig *tls.Config } func newEngine(c RestConf) *engine { srv := &engine{ conf: c, } if c.CpuThreshold > 0 { srv.shedder = load.NewAdaptiveShedder(load.WithCpuThreshold(c.CpuThreshold)) srv.priorityShedder = load.NewAdaptiveShedder(load.WithCpuThreshold( (c.CpuThreshold + topCpuUsage) >> 1)) } return srv } func (ng *engine) AddRoutes(r featuredRoutes) { ng.routes = append(ng.routes, r) } func (ng *engine) SetUnauthorizedCallback(callback handler.UnauthorizedCallback) { ng.unauthorizedCallback = callback } func (ng *engine) SetUnsignedCallback(callback handler.UnsignedCallback) { ng.unsignedCallback = callback } func (ng *engine) Start() error { return ng.StartWithRouter(router.NewRouter()) } func (ng *engine) StartWithRouter(router httpx.Router) error { if err := ng.bindRoutes(router); err != nil { return err } if len(ng.conf.CertFile) == 0 && len(ng.conf.KeyFile) == 0 { return internal.StartHttp(ng.conf.Host, ng.conf.Port, router) } return internal.StartHttps(ng.conf.Host, ng.conf.Port, ng.conf.CertFile, ng.conf.KeyFile, router, func(srv *http.Server) { if ng.tlsConfig != nil { srv.TLSConfig = ng.tlsConfig } }) } func (ng *engine) appendAuthHandler(fr featuredRoutes, chain alice.Chain, verifier func(alice.Chain) alice.Chain) alice.Chain { if fr.jwt.enabled { if len(fr.jwt.prevSecret) == 0 { chain = chain.Append(handler.Authorize(fr.jwt.secret, handler.WithUnauthorizedCallback(ng.unauthorizedCallback))) } else { chain = chain.Append(handler.Authorize(fr.jwt.secret, handler.WithPrevSecret(fr.jwt.prevSecret), handler.WithUnauthorizedCallback(ng.unauthorizedCallback))) } } return verifier(chain) } func (ng *engine) bindFeaturedRoutes(router httpx.Router, fr featuredRoutes, metrics *stat.Metrics) error { verifier, err := ng.signatureVerifier(fr.signature) if err != nil { return err } for _, route := range fr.routes { if err := ng.bindRoute(fr, router, metrics, route, verifier); err != nil { return err } } return nil } func (ng *engine) bindRoute(fr featuredRoutes, router httpx.Router, metrics *stat.Metrics, route Route, verifier func(chain alice.Chain) alice.Chain) error { chain := alice.New( handler.TracingHandler(ng.conf.Name, route.Path), ng.getLogHandler(), handler.PrometheusHandler(route.Path), handler.MaxConns(ng.conf.MaxConns), handler.BreakerHandler(route.Method, route.Path, metrics), handler.SheddingHandler(ng.getShedder(fr.priority), metrics), handler.TimeoutHandler(ng.checkedTimeout(fr.timeout)), handler.RecoverHandler, handler.MetricHandler(metrics), handler.MaxBytesHandler(ng.conf.MaxBytes), handler.GunzipHandler, ) chain = ng.appendAuthHandler(fr, chain, verifier) for _, middleware := range ng.middlewares { chain = chain.Append(convertMiddleware(middleware)) } handle := chain.ThenFunc(route.Handler) return router.Handle(route.Method, route.Path, handle) } func (ng *engine) bindRoutes(router httpx.Router) error { metrics := ng.createMetrics() for _, fr := range ng.routes { if err := ng.bindFeaturedRoutes(router, fr, metrics); err != nil { return err } } return nil } func (ng *engine) checkedTimeout(timeout time.Duration) time.Duration { if timeout > 0 { return timeout } return time.Duration(ng.conf.Timeout) * time.Millisecond } func (ng *engine) createMetrics() *stat.Metrics { var metrics *stat.Metrics if len(ng.conf.Name) > 0 { metrics = stat.NewMetrics(ng.conf.Name) } else { metrics = stat.NewMetrics(fmt.Sprintf("%s:%d", ng.conf.Host, ng.conf.Port)) } return metrics } func (ng *engine) getLogHandler() func(http.Handler) http.Handler { if ng.conf.Verbose { return handler.DetailedLogHandler } return handler.LogHandler } func (ng *engine) getShedder(priority bool) load.Shedder { if priority && ng.priorityShedder != nil { return ng.priorityShedder } return ng.shedder } func (ng *engine) setTlsConfig(cfg *tls.Config) { ng.tlsConfig = cfg } func (ng *engine) signatureVerifier(signature signatureSetting) (func(chain alice.Chain) alice.Chain, error) { if !signature.enabled { return func(chain alice.Chain) alice.Chain { return chain }, nil } if len(signature.PrivateKeys) == 0 { if signature.Strict { return nil, ErrSignatureConfig } return func(chain alice.Chain) alice.Chain { return chain }, nil } decrypters := make(map[string]codec.RsaDecrypter) for _, key := range signature.PrivateKeys { fingerprint := key.Fingerprint file := key.KeyFile decrypter, err := codec.NewRsaDecrypter(file) if err != nil { return nil, err } decrypters[fingerprint] = decrypter } return func(chain alice.Chain) alice.Chain { if ng.unsignedCallback != nil { return chain.Append(handler.ContentSecurityHandler( decrypters, signature.Expiry, signature.Strict, ng.unsignedCallback)) } return chain.Append(handler.ContentSecurityHandler( decrypters, signature.Expiry, signature.Strict)) }, nil } func (ng *engine) use(middleware Middleware) { ng.middlewares = append(ng.middlewares, middleware) } func convertMiddleware(ware Middleware) func(http.Handler) http.Handler { return func(next http.Handler) http.Handler { return ware(next.ServeHTTP) } }