123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265 |
- package rest
- import (
- "crypto/tls"
- "errors"
- "fmt"
- "net/http"
- "time"
- "github.com/justinas/alice"
- "github.com/zeromicro/go-zero/core/codec"
- "github.com/zeromicro/go-zero/core/load"
- "github.com/zeromicro/go-zero/core/stat"
- "github.com/zeromicro/go-zero/rest/handler"
- "github.com/zeromicro/go-zero/rest/httpx"
- "github.com/zeromicro/go-zero/rest/internal"
- "github.com/zeromicro/go-zero/rest/internal/response"
- )
- // use 1000m to represent 100%
- const topCpuUsage = 1000
- // ErrSignatureConfig is an error that indicates bad config for signature.
- var ErrSignatureConfig = errors.New("bad config for Signature")
- type engine struct {
- conf RestConf
- routes []featuredRoutes
- unauthorizedCallback handler.UnauthorizedCallback
- unsignedCallback handler.UnsignedCallback
- middlewares []Middleware
- shedder load.Shedder
- priorityShedder load.Shedder
- tlsConfig *tls.Config
- }
- func newEngine(c RestConf) *engine {
- svr := &engine{
- conf: c,
- }
- if c.CpuThreshold > 0 {
- svr.shedder = load.NewAdaptiveShedder(load.WithCpuThreshold(c.CpuThreshold))
- svr.priorityShedder = load.NewAdaptiveShedder(load.WithCpuThreshold(
- (c.CpuThreshold + topCpuUsage) >> 1))
- }
- return svr
- }
- func (ng *engine) addRoutes(r featuredRoutes) {
- ng.routes = append(ng.routes, r)
- }
- func (ng *engine) appendAuthHandler(fr featuredRoutes, chain alice.Chain,
- verifier func(alice.Chain) alice.Chain) alice.Chain {
- if fr.jwt.enabled {
- if len(fr.jwt.prevSecret) == 0 {
- chain = chain.Append(handler.Authorize(fr.jwt.secret,
- handler.WithUnauthorizedCallback(ng.unauthorizedCallback)))
- } else {
- chain = chain.Append(handler.Authorize(fr.jwt.secret,
- handler.WithPrevSecret(fr.jwt.prevSecret),
- handler.WithUnauthorizedCallback(ng.unauthorizedCallback)))
- }
- }
- return verifier(chain)
- }
- func (ng *engine) bindFeaturedRoutes(router httpx.Router, fr featuredRoutes, metrics *stat.Metrics) error {
- verifier, err := ng.signatureVerifier(fr.signature)
- if err != nil {
- return err
- }
- for _, route := range fr.routes {
- if err := ng.bindRoute(fr, router, metrics, route, verifier); err != nil {
- return err
- }
- }
- return nil
- }
- func (ng *engine) bindRoute(fr featuredRoutes, router httpx.Router, metrics *stat.Metrics,
- route Route, verifier func(chain alice.Chain) alice.Chain) error {
- chain := alice.New(
- handler.TracingHandler(ng.conf.Name, route.Path),
- ng.getLogHandler(),
- handler.PrometheusHandler(route.Path),
- handler.MaxConns(ng.conf.MaxConns),
- handler.BreakerHandler(route.Method, route.Path, metrics),
- handler.SheddingHandler(ng.getShedder(fr.priority), metrics),
- handler.TimeoutHandler(ng.checkedTimeout(fr.timeout)),
- handler.RecoverHandler,
- handler.MetricHandler(metrics),
- handler.MaxBytesHandler(ng.checkedMaxBytes(fr.maxBytes)),
- handler.GunzipHandler,
- )
- chain = ng.appendAuthHandler(fr, chain, verifier)
- for _, middleware := range ng.middlewares {
- chain = chain.Append(convertMiddleware(middleware))
- }
- handle := chain.ThenFunc(route.Handler)
- return router.Handle(route.Method, route.Path, handle)
- }
- func (ng *engine) bindRoutes(router httpx.Router) error {
- metrics := ng.createMetrics()
- for _, fr := range ng.routes {
- if err := ng.bindFeaturedRoutes(router, fr, metrics); err != nil {
- return err
- }
- }
- return nil
- }
- func (ng *engine) checkedTimeout(timeout time.Duration) time.Duration {
- if timeout > 0 {
- return timeout
- }
- return time.Duration(ng.conf.Timeout) * time.Millisecond
- }
- func (ng *engine) checkedMaxBytes(bytes int64) int64 {
- if bytes > 0 {
- return bytes
- }
- return ng.conf.MaxBytes
- }
- func (ng *engine) createMetrics() *stat.Metrics {
- var metrics *stat.Metrics
- if len(ng.conf.Name) > 0 {
- metrics = stat.NewMetrics(ng.conf.Name)
- } else {
- metrics = stat.NewMetrics(fmt.Sprintf("%s:%d", ng.conf.Host, ng.conf.Port))
- }
- return metrics
- }
- func (ng *engine) getLogHandler() func(http.Handler) http.Handler {
- if ng.conf.Verbose {
- return handler.DetailedLogHandler
- }
- return handler.LogHandler
- }
- func (ng *engine) getShedder(priority bool) load.Shedder {
- if priority && ng.priorityShedder != nil {
- return ng.priorityShedder
- }
- return ng.shedder
- }
- // notFoundHandler returns a middleware that handles 404 not found requests.
- func (ng *engine) notFoundHandler(next http.Handler) http.Handler {
- return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- chain := alice.New(
- handler.TracingHandler(ng.conf.Name, ""),
- ng.getLogHandler(),
- )
- var h http.Handler
- if next != nil {
- h = chain.Then(next)
- } else {
- h = chain.Then(http.NotFoundHandler())
- }
- cw := response.NewHeaderOnceResponseWriter(w)
- h.ServeHTTP(cw, r)
- cw.WriteHeader(http.StatusNotFound)
- })
- }
- func (ng *engine) setTlsConfig(cfg *tls.Config) {
- ng.tlsConfig = cfg
- }
- func (ng *engine) setUnauthorizedCallback(callback handler.UnauthorizedCallback) {
- ng.unauthorizedCallback = callback
- }
- func (ng *engine) setUnsignedCallback(callback handler.UnsignedCallback) {
- ng.unsignedCallback = callback
- }
- func (ng *engine) signatureVerifier(signature signatureSetting) (func(chain alice.Chain) alice.Chain, error) {
- if !signature.enabled {
- return func(chain alice.Chain) alice.Chain {
- return chain
- }, nil
- }
- if len(signature.PrivateKeys) == 0 {
- if signature.Strict {
- return nil, ErrSignatureConfig
- }
- return func(chain alice.Chain) alice.Chain {
- return chain
- }, nil
- }
- decrypters := make(map[string]codec.RsaDecrypter)
- for _, key := range signature.PrivateKeys {
- fingerprint := key.Fingerprint
- file := key.KeyFile
- decrypter, err := codec.NewRsaDecrypter(file)
- if err != nil {
- return nil, err
- }
- decrypters[fingerprint] = decrypter
- }
- return func(chain alice.Chain) alice.Chain {
- if ng.unsignedCallback != nil {
- return chain.Append(handler.ContentSecurityHandler(
- decrypters, signature.Expiry, signature.Strict, ng.unsignedCallback))
- }
- return chain.Append(handler.ContentSecurityHandler(
- decrypters, signature.Expiry, signature.Strict))
- }, nil
- }
- func (ng *engine) start(router httpx.Router) error {
- if err := ng.bindRoutes(router); err != nil {
- return err
- }
- if len(ng.conf.CertFile) == 0 && len(ng.conf.KeyFile) == 0 {
- return internal.StartHttp(ng.conf.Host, ng.conf.Port, router)
- }
- return internal.StartHttps(ng.conf.Host, ng.conf.Port, ng.conf.CertFile,
- ng.conf.KeyFile, router, func(svr *http.Server) {
- if ng.tlsConfig != nil {
- svr.TLSConfig = ng.tlsConfig
- }
- })
- }
- func (ng *engine) use(middleware Middleware) {
- ng.middlewares = append(ng.middlewares, middleware)
- }
- func convertMiddleware(ware Middleware) func(http.Handler) http.Handler {
- return func(next http.Handler) http.Handler {
- return ware(next.ServeHTTP)
- }
- }
|