-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathhttpclient.go
121 lines (107 loc) · 3.5 KB
/
httpclient.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
package main
import (
"bytes"
"crypto/tls"
"crypto/x509"
"fmt"
"github.com/json-iterator/go"
"io/ioutil"
"net"
"net/http"
"os"
"github.com/pkt-cash/PKT-FullNode/btcutil/er"
"github.com/pkt-cash/PKT-FullNode/pktconfig/version"
"github.com/pkt-cash/PKT-FullNode/btcjson"
)
// newHTTPClient returns a new HTTP client that is configured according
// to the TLS settings in the associated connection configuration.
func newHTTPClient(cfg *config) (*http.Client, er.R) {
var dial func(network, addr string) (net.Conn, error)
// Configure TLS if needed.
var tlsConfig *tls.Config
if cfg.TLS && cfg.RPCCert != "" {
pem, err := ioutil.ReadFile(cfg.RPCCert)
if err != nil {
return nil, er.E(err)
}
pool := x509.NewCertPool()
pool.AppendCertsFromPEM(pem)
tlsConfig = &tls.Config{
RootCAs: pool,
InsecureSkipVerify: cfg.TLSSkipVerify,
}
}
// Create and return the new HTTP client potentially configured with TLS.
client := http.Client{
Transport: &http.Transport{
Dial: dial,
TLSClientConfig: tlsConfig,
},
}
return &client, nil
}
// sendPostRequest sends the marshalled JSON-RPC command using HTTP-POST mode
// to the server described in the passed config struct. It also attempts to
// unmarshal the response as a JSON-RPC response and returns either the result
// field or the error field depending on whether or not there is an error.
func sendPostRequest(marshalledJSON []byte, cfg *config) (*btcjson.Response, er.R) {
// Generate a request to the configured RPC server.
protocol := "http"
if cfg.TLS {
protocol = "https"
}
url := protocol + "://" + cfg.RPCServer
bodyReader := bytes.NewReader(marshalledJSON)
httpRequest, errr := http.NewRequest("POST", url, bodyReader)
if errr != nil {
return nil, er.E(errr)
}
httpRequest.Close = true
httpRequest.Header.Set("Content-Type", "application/json")
httpRequest.Header.Set("X-Pkt-RPC-Version", fmt.Sprintf("%d", version.AppMajorVersion()))
// Configure basic access authorization.
httpRequest.SetBasicAuth(cfg.RPCUser, cfg.RPCPassword)
// Create the new HTTP client that is configured according to the user-
// specified options and submit the request.
httpClient, err := newHTTPClient(cfg)
if err != nil {
return nil, err
}
httpResponse, errr := httpClient.Do(httpRequest)
if errr != nil {
return nil, er.E(errr)
}
// Read the raw bytes and close the response.
respBytes, errr := ioutil.ReadAll(httpResponse.Body)
if errr != nil {
err = er.Errorf("error reading json reply: %v", errr)
return nil, err
}
errrr := httpResponse.Body.Close()
if errrr != nil {
err = er.Errorf("error closing connection: %v", errrr)
return nil, err
}
// Handle unsuccessful HTTP responses
if httpResponse.StatusCode < 200 || httpResponse.StatusCode >= 300 {
// Generate a standard error to return if the server body is
// empty. This should not happen very often, but it's better
// than showing nothing in case the target server has a poor
// implementation.
if len(respBytes) == 0 {
return nil, er.Errorf("%d %s", httpResponse.StatusCode,
http.StatusText(httpResponse.StatusCode))
}
additionalMessage := ""
if _, err := os.Stat(defaultConfigFile); httpResponse.StatusCode == 401 && err == nil {
additionalMessage = fmt.Sprintf(" (Try deleting %s)", defaultConfigFile)
}
return nil, er.Errorf("%s%s", respBytes, additionalMessage)
}
// Unmarshal the response.
var resp btcjson.Response
if err := er.E(jsoniter.Unmarshal(respBytes, &resp)); err != nil {
return nil, err
}
return &resp, nil
}