mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-09 11:47:59 +00:00
e16ef0861f
This is a rather big change in jsonrpsee, the major things in this bump are: - Server backpressure (the subscription impls are modified to deal with that) - Allow custom error types / return types (remove jsonrpsee::core::Error and jsonrpee::core::CallError) - Bug fixes (graceful shutdown in particular not used by substrate anyway) - Less dependencies for the clients in particular - Return type requires Clone in method call responses - Moved to tokio channels - Async subscription API (not used in this PR) Major changes in this PR: - The subscriptions are now bounded and if subscription can't keep up with the server it is dropped - CLI: add parameter to configure the jsonrpc server bounded message buffer (default is 64) - Add our own subscription helper to deal with the unbounded streams in substrate The most important things in this PR to review is the added helpers functions in `substrate/client/rpc/src/utils.rs` and the rest is pretty much chore. Regarding the "bounded buffer limit" it may cause the server to handle the JSON-RPC calls slower than before. The message size limit is bounded by "--rpc-response-size" thus "by default 10MB * 64 = 640MB" but the subscription message size is not covered by this limit and could be capped as well. Hopefully the last release prior to 1.0, sorry in advance for a big PR Previous attempt: https://github.com/paritytech/substrate/pull/13992 Resolves https://github.com/paritytech/polkadot-sdk/issues/748, resolves https://github.com/paritytech/polkadot-sdk/issues/627
188 lines
6.5 KiB
Rust
188 lines
6.5 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: GPL-3.0-or-later WITH Classpath-exception-2.0
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
//! Substrate system API.
|
|
|
|
#[cfg(test)]
|
|
mod tests;
|
|
|
|
use futures::channel::oneshot;
|
|
use jsonrpsee::core::{async_trait, JsonValue};
|
|
use sc_rpc_api::DenyUnsafe;
|
|
use sc_tracing::logging;
|
|
use sc_utils::mpsc::TracingUnboundedSender;
|
|
use sp_runtime::traits::{self, Header as HeaderT};
|
|
|
|
pub use self::helpers::{Health, NodeRole, PeerInfo, SyncState, SystemInfo};
|
|
pub use sc_rpc_api::system::*;
|
|
|
|
/// System API implementation
|
|
pub struct System<B: traits::Block> {
|
|
info: SystemInfo,
|
|
send_back: TracingUnboundedSender<Request<B>>,
|
|
deny_unsafe: DenyUnsafe,
|
|
}
|
|
|
|
/// Request to be processed.
|
|
pub enum Request<B: traits::Block> {
|
|
/// Must return the health of the network.
|
|
Health(oneshot::Sender<Health>),
|
|
/// Must return the base58-encoded local `PeerId`.
|
|
LocalPeerId(oneshot::Sender<String>),
|
|
/// Must return the string representation of the addresses we listen on, including the
|
|
/// trailing `/p2p/`.
|
|
LocalListenAddresses(oneshot::Sender<Vec<String>>),
|
|
/// Must return information about the peers we are connected to.
|
|
Peers(oneshot::Sender<Vec<PeerInfo<B::Hash, <B::Header as HeaderT>::Number>>>),
|
|
/// Must return the state of the network.
|
|
NetworkState(oneshot::Sender<serde_json::Value>),
|
|
/// Must return any potential parse error.
|
|
NetworkAddReservedPeer(String, oneshot::Sender<error::Result<()>>),
|
|
/// Must return any potential parse error.
|
|
NetworkRemoveReservedPeer(String, oneshot::Sender<error::Result<()>>),
|
|
/// Must return the list of reserved peers
|
|
NetworkReservedPeers(oneshot::Sender<Vec<String>>),
|
|
/// Must return the node role.
|
|
NodeRoles(oneshot::Sender<Vec<NodeRole>>),
|
|
/// Must return the state of the node syncing.
|
|
SyncState(oneshot::Sender<SyncState<<B::Header as HeaderT>::Number>>),
|
|
}
|
|
|
|
impl<B: traits::Block> System<B> {
|
|
/// Creates new `System`.
|
|
///
|
|
/// The `send_back` will be used to transmit some of the requests. The user is responsible for
|
|
/// reading from that channel and answering the requests.
|
|
pub fn new(
|
|
info: SystemInfo,
|
|
send_back: TracingUnboundedSender<Request<B>>,
|
|
deny_unsafe: DenyUnsafe,
|
|
) -> Self {
|
|
System { info, send_back, deny_unsafe }
|
|
}
|
|
}
|
|
|
|
#[async_trait]
|
|
impl<B: traits::Block> SystemApiServer<B::Hash, <B::Header as HeaderT>::Number> for System<B> {
|
|
fn system_name(&self) -> Result<String, Error> {
|
|
Ok(self.info.impl_name.clone())
|
|
}
|
|
|
|
fn system_version(&self) -> Result<String, Error> {
|
|
Ok(self.info.impl_version.clone())
|
|
}
|
|
|
|
fn system_chain(&self) -> Result<String, Error> {
|
|
Ok(self.info.chain_name.clone())
|
|
}
|
|
|
|
fn system_type(&self) -> Result<sc_chain_spec::ChainType, Error> {
|
|
Ok(self.info.chain_type.clone())
|
|
}
|
|
|
|
fn system_properties(&self) -> Result<sc_chain_spec::Properties, Error> {
|
|
Ok(self.info.properties.clone())
|
|
}
|
|
|
|
async fn system_health(&self) -> Result<Health, Error> {
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::Health(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_local_peer_id(&self) -> Result<String, Error> {
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::LocalPeerId(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_local_listen_addresses(&self) -> Result<Vec<String>, Error> {
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::LocalListenAddresses(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_peers(
|
|
&self,
|
|
) -> Result<Vec<PeerInfo<B::Hash, <B::Header as HeaderT>::Number>>, Error> {
|
|
self.deny_unsafe.check_if_safe()?;
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::Peers(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_network_state(&self) -> Result<JsonValue, Error> {
|
|
self.deny_unsafe.check_if_safe()?;
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::NetworkState(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_add_reserved_peer(&self, peer: String) -> Result<(), Error> {
|
|
self.deny_unsafe.check_if_safe()?;
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::NetworkAddReservedPeer(peer, tx));
|
|
match rx.await {
|
|
Ok(Ok(())) => Ok(()),
|
|
Ok(Err(e)) => Err(e),
|
|
Err(e) => Err(Error::Internal(e.to_string())),
|
|
}
|
|
}
|
|
|
|
async fn system_remove_reserved_peer(&self, peer: String) -> Result<(), Error> {
|
|
self.deny_unsafe.check_if_safe()?;
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::NetworkRemoveReservedPeer(peer, tx));
|
|
match rx.await {
|
|
Ok(Ok(())) => Ok(()),
|
|
Ok(Err(e)) => Err(e),
|
|
Err(e) => Err(Error::Internal(e.to_string())),
|
|
}
|
|
}
|
|
|
|
async fn system_reserved_peers(&self) -> Result<Vec<String>, Error> {
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::NetworkReservedPeers(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_node_roles(&self) -> Result<Vec<NodeRole>, Error> {
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::NodeRoles(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
async fn system_sync_state(&self) -> Result<SyncState<<B::Header as HeaderT>::Number>, Error> {
|
|
let (tx, rx) = oneshot::channel();
|
|
let _ = self.send_back.unbounded_send(Request::SyncState(tx));
|
|
rx.await.map_err(|e| Error::Internal(e.to_string()))
|
|
}
|
|
|
|
fn system_add_log_filter(&self, directives: String) -> Result<(), Error> {
|
|
self.deny_unsafe.check_if_safe()?;
|
|
|
|
logging::add_directives(&directives);
|
|
logging::reload_filter().map_err(|e| Error::Internal(e))
|
|
}
|
|
|
|
fn system_reset_log_filter(&self) -> Result<(), Error> {
|
|
self.deny_unsafe.check_if_safe()?;
|
|
logging::reset_log_filter().map_err(|e| Error::Internal(e))
|
|
}
|
|
}
|