2018-08-17 15:52:56 +00:00
.. highlight :: kotlin
.. raw :: html
<script type="text/javascript" src="_static/jquery.js"></script>
<script type="text/javascript" src="_static/codesets.js"></script>
Interacting with a node
=======================
2016-08-26 13:31:17 +00:00
2018-01-30 16:06:20 +00:00
.. contents ::
2016-08-26 13:31:17 +00:00
2018-01-30 16:06:20 +00:00
Overview
--------
2018-10-30 18:06:01 +00:00
To interact with your node, you need to write a client in a JVM-compatible language using the `CordaRPCClient`_ class.
This class allows you to connect to your node via a message queue protocol and provides a simple RPC interface for
interacting with the node. You make calls on a JVM object as normal, and the marshalling back-and-forth is handled for
you.
2018-08-17 15:52:56 +00:00
.. warning :: The built-in Corda webserver is deprecated and unsuitable for production use. If you want to interact with
2018-10-30 18:06:01 +00:00
your node via HTTP, you will need to stand up your own webserver that connects to your node using the
`CordaRPCClient`_ class. You can find an example of how to do this using the popular Spring Boot server
`here <https://github.com/corda/spring-webserver> `_ .
2018-08-17 15:52:56 +00:00
2019-01-11 13:23:51 +00:00
.. _clientrpc_connect_ref:
2018-08-17 15:52:56 +00:00
Connecting to a node via RPC
----------------------------
2018-10-30 18:06:01 +00:00
To use `CordaRPCClient`_ , you must add `` net.corda:corda-rpc:$corda_release_version `` as a `` cordaCompile `` dependency
in your client's `` build.gradle `` file.
`CordaRPCClient`_ has a `` start `` method that takes the node's RPC address and returns a `CordaRPCConnection`_ .
`CordaRPCConnection`_ has a `` proxy `` method that takes an RPC username and password and returns a `CordaRPCOps`_
2018-08-17 15:52:56 +00:00
object that you can use to interact with the node.
Here is an example of using `CordaRPCClient`_ to connect to a node and log the current time on its internal clock:
.. container :: codeset
2018-09-24 14:00:31 +00:00
.. literalinclude :: example-code/src/main/kotlin/net/corda/docs/kotlin/ClientRpcExample.kt
2018-08-17 15:52:56 +00:00
:language: kotlin
:start-after: START 1
:end-before: END 1
2018-01-30 16:06:20 +00:00
2018-09-24 14:00:31 +00:00
.. literalinclude :: example-code/src/main/java/net/corda/docs/java/ClientRpcExample.java
2018-08-17 15:52:56 +00:00
:language: java
:start-after: START 1
:end-before: END 1
2016-08-26 13:31:17 +00:00
2017-05-11 16:44:45 +00:00
.. warning :: The returned `CordaRPCConnection`_ is somewhat expensive to create and consumes a small amount of
server side resources. When you're done with it, call `` close `` on it. Alternatively you may use the `` use ``
method on `CordaRPCClient`_ which cleans up automatically after the passed in lambda finishes. Don't create
a new proxy for every call you make - reuse an existing one.
2016-08-26 13:31:17 +00:00
2018-08-17 15:52:56 +00:00
For further information on using the RPC API, see :doc: `tutorial-clientrpc-api` .
2016-10-05 09:38:26 +00:00
2017-07-25 08:26:35 +00:00
RPC permissions
---------------
2018-01-30 16:06:20 +00:00
For a node's owner to interact with their node via RPC, they must define one or more RPC users. Each user is
authenticated with a username and password, and is assigned a set of permissions that control which RPC operations they
2018-03-16 11:37:23 +00:00
can perform. Permissions are not required to interact with the node via the shell, unless the shell is being accessed via SSH.
2017-07-25 08:26:35 +00:00
2018-01-30 16:06:20 +00:00
RPC users are created by adding them to the `` rpcUsers `` list in the node's `` node.conf `` file:
2017-07-25 08:26:35 +00:00
.. container :: codeset
.. sourcecode :: groovy
rpcUsers=[
{
username=exampleUser
password=examplePass
permissions=[]
}
...
]
2018-01-30 16:06:20 +00:00
By default, RPC users are not permissioned to perform any RPC operations.
Granting flow permissions
~~~~~~~~~~~~~~~~~~~~~~~~~
You provide an RPC user with the permission to start a specific flow using the syntax
`` StartFlow.<fully qualified flow name> `` :
2017-07-25 08:26:35 +00:00
.. container :: codeset
.. sourcecode :: groovy
rpcUsers=[
{
username=exampleUser
password=examplePass
permissions=[
"StartFlow.net.corda.flows.ExampleFlow1",
"StartFlow.net.corda.flows.ExampleFlow2"
]
}
...
]
2018-01-30 16:06:20 +00:00
You can also provide an RPC user with the permission to start any flow using the syntax
`` InvokeRpc.startFlow `` :
2017-11-02 15:09:49 +00:00
2018-01-30 16:06:20 +00:00
.. container :: codeset
.. sourcecode :: groovy
2017-11-02 15:09:49 +00:00
2018-01-30 16:06:20 +00:00
rpcUsers=[
{
username=exampleUser
password=examplePass
permissions=[
"InvokeRpc.startFlow"
]
}
...
]
Granting other RPC permissions
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You provide an RPC user with the permission to perform a specific RPC operation using the syntax
`` InvokeRpc.<rpc method name> `` :
.. container :: codeset
.. sourcecode :: groovy
rpcUsers=[
{
username=exampleUser
password=examplePass
permissions=[
"InvokeRpc.nodeInfo",
"InvokeRpc.networkMapSnapshot"
]
}
...
]
Granting all permissions
~~~~~~~~~~~~~~~~~~~~~~~~
You can provide an RPC user with the permission to perform any RPC operation (including starting any flow) using the
`` ALL `` permission:
.. container :: codeset
.. sourcecode :: groovy
rpcUsers=[
{
username=exampleUser
password=examplePass
permissions=[
"ALL"
]
}
...
]
2017-11-02 15:09:49 +00:00
2018-03-14 10:05:38 +00:00
.. _rpc_security_mgmt_ref:
2017-12-13 17:09:09 +00:00
RPC security management
-----------------------
2017-12-14 15:42:34 +00:00
Setting `` rpcUsers `` provides a simple way of granting RPC permissions to a fixed set of users, but has some
obvious shortcomings. To support use cases aiming for higher security and flexibility, Corda offers additional security
features such as:
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
* Fetching users credentials and permissions from an external data source (e.g.: a remote RDBMS), with optional in-memory
caching. In particular, this allows credentials and permissions to be updated externally without requiring nodes to be
restarted.
2017-12-13 17:09:09 +00:00
* Password stored in hash-encrypted form. This is regarded as must-have when security is a concern. Corda currently supports
2017-12-14 15:42:34 +00:00
a flexible password hash format conforming to the Modular Crypt Format provided by the `Apache Shiro framework <https://shiro.apache.org/static/1.2.5/apidocs/org/apache/shiro/crypto/hash/format/Shiro1CryptFormat.html> `_
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
These features are controlled by a set of options nested in the `` security `` field of `` node.conf `` .
The following example shows how to configure retrieval of users credentials and permissions from a remote database with
passwords in hash-encrypted format and enable in-memory caching of users data:
2017-12-13 17:09:09 +00:00
.. container :: codeset
.. sourcecode :: groovy
security = {
authService = {
dataSource = {
type = "DB",
passwordEncryption = "SHIRO_1_CRYPT",
connection = {
jdbcUrl = "<jdbc connection string>"
username = "<db username>"
password = "<db user password>"
driverClassName = "<JDBC driver>"
}
}
options = {
cache = {
expireAfterSecs = 120
maxEntries = 10000
}
}
}
}
2017-12-14 15:42:34 +00:00
It is also possible to have a static list of users embedded in the `` security `` structure by specifying a `` dataSource ``
of `` INMEMORY `` type:
2017-12-13 17:09:09 +00:00
.. container :: codeset
.. sourcecode :: groovy
security = {
authService = {
dataSource = {
type = "INMEMORY",
users = [
{
username = "<username>",
password = "<password>",
permissions = ["<permission 1>", "<permission 2>", ...]
},
...
]
}
}
}
2017-12-14 15:42:34 +00:00
.. warning :: A valid configuration cannot specify both the `` rpcUsers `` and `` security `` fields. Doing so will trigger
an exception at node startup.
2017-12-13 17:09:09 +00:00
Authentication/authorisation data
2018-05-09 14:19:35 +00:00
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
The `` dataSource `` structure defines the data provider supplying credentials and permissions for users. There exist two
supported types of such data source, identified by the `` dataSource.type `` field:
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
:INMEMORY: A static list of user credentials and permissions specified by the ``users`` field.
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
:DB: An external RDBMS accessed via the JDBC connection described by ``connection``. Note that, unlike the ``INMEMORY``
case, in a user database permissions are assigned to *roles* rather than individual users. The current implementation
expects the database to store data according to the following schema:
2017-12-13 17:09:09 +00:00
- Table `` users `` containing columns `` username `` and `` password `` . The `` username `` column *must have unique values* .
2017-12-14 15:42:34 +00:00
- Table `` user_roles `` containing columns `` username `` and `` role_name `` associating a user to a set of *roles* .
2017-12-13 17:09:09 +00:00
- Table `` roles_permissions `` containing columns `` role_name `` and `` permission `` associating a role to a set of
2017-12-14 15:42:34 +00:00
permission strings.
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
.. note :: There is no prescription on the SQL type of each column (although our tests were conducted on `` username `` and
2017-12-13 17:09:09 +00:00
`` role_name `` declared of SQL type `` VARCHAR `` and `` password `` of `` TEXT `` type). It is also possible to have extra columns
in each table alongside the expected ones.
Password encryption
2018-05-09 14:19:35 +00:00
~~~~~~~~~~~~~~~~~~~
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
Storing passwords in plain text is discouraged in applications where security is critical. Passwords are assumed
to be in plain format by default, unless a different format is specified by the `` passwordEncryption `` field, like:
2017-12-13 17:09:09 +00:00
.. container :: codeset
.. sourcecode :: groovy
passwordEncryption = SHIRO_1_CRYPT
`` SHIRO_1_CRYPT `` identifies the `Apache Shiro fully reversible
Modular Crypt Format <https://shiro.apache.org/static/1.2.5/apidocs/org/apache/shiro/crypto/hash/format/Shiro1CryptFormat.html>`_,
2017-12-14 15:42:34 +00:00
it is currently the only non-plain password hash-encryption format supported. Hash-encrypted passwords in this
format can be produced by using the `Apache Shiro Hasher command line tool <https://shiro.apache.org/command-line-hasher.html> `_ .
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
Caching user accounts data
2018-05-09 14:19:35 +00:00
~~~~~~~~~~~~~~~~~~~~~~~~~~
2017-12-13 17:09:09 +00:00
2017-12-14 15:42:34 +00:00
A cache layer on top of the external data source of users credentials and permissions can significantly improve
2017-12-13 17:09:09 +00:00
performances in some cases, with the disadvantage of causing a (controllable) delay in picking up updates to the underlying data.
Caching is disabled by default, it can be enabled by defining the `` options.cache `` field in `` security.authService `` ,
for example:
.. container :: codeset
.. sourcecode :: groovy
options = {
cache = {
expireAfterSecs = 120
maxEntries = 10000
}
}
This will enable a non-persistent cache contained in the node's memory with maximum number of entries set to `` maxEntries ``
2017-12-14 15:42:34 +00:00
where entries are expired and refreshed after `` expireAfterSecs `` seconds.
2017-12-13 17:09:09 +00:00
2016-08-26 13:31:17 +00:00
Observables
-----------
The RPC system handles observables in a special way. When a method returns an observable, whether directly or
as a sub-object of the response object graph, an observable is created on the client to match the one on the
server. Objects emitted by the server-side observable are pushed onto a queue which is then drained by the client.
The returned observable may even emit object graphs with even more observables in them, and it all works as you
would expect.
This feature comes with a cost: the server must queue up objects emitted by the server-side observable until you
2017-05-11 16:44:45 +00:00
download them. Note that the server side observation buffer is bounded, once it fills up the client is considered
2018-08-27 20:41:00 +00:00
slow and will be disconnected. You are expected to subscribe to all the observables returned, otherwise client-side
memory starts filling up as observations come in. If you don't want an observable then subscribe then unsubscribe
immediately to clear the client-side buffers and to stop the server from streaming. For Kotlin users there is a
convenience extension method called `` notUsed() `` which can be called on an observable to automate this step.
If your app quits then server side resources will be freed automatically.
2016-08-26 13:31:17 +00:00
2017-05-11 16:44:45 +00:00
.. warning :: If you leak an observable on the client side and it gets garbage collected, you will get a warning
printed to the logs and the observable will be unsubscribed for you. But don't rely on this, as garbage collection
2018-08-27 20:41:00 +00:00
is non-deterministic. If you set `` -Dnet.corda.client.rpc.trackRpcCallSites=true `` on the JVM command line then
this warning comes with a stack trace showing where the RPC that returned the forgotten observable was called from.
This feature is off by default because tracking RPC call sites is moderately slow.
2016-08-26 13:31:17 +00:00
2018-08-06 08:11:15 +00:00
.. note :: Observables can only be used as return arguments of an RPC call. It is not currently possible to pass
2018-08-27 20:41:00 +00:00
Observables as parameters to the RPC methods. In other words the streaming is always server to client and not
the other way around.
2018-08-06 08:11:15 +00:00
2017-02-01 21:27:06 +00:00
Futures
-------
2018-08-06 08:11:15 +00:00
A method can also return a `` CordaFuture `` in its object graph and it will be treated in a similar manner to
2018-08-27 20:41:00 +00:00
observables. Calling the `` cancel `` method on the future will unsubscribe it from any future value and release
any resources.
2017-02-01 21:27:06 +00:00
2016-08-26 13:31:17 +00:00
Versioning
----------
2018-08-27 20:41:00 +00:00
The client RPC protocol is versioned using the node's platform version number (see :doc: `versioning` ). When a proxy is created
2017-04-19 10:05:27 +00:00
the server is queried for its version, and you can specify your minimum requirement. Methods added in later versions
are tagged with the `` @RPCSinceVersion `` annotation. If you try to use a method that the server isn't advertising support
of, an `` UnsupportedOperationException `` is thrown. If you want to know the version of the server, just use the
`` protocolVersion `` property (i.e. `` getProtocolVersion `` in Java).
2016-08-26 13:31:17 +00:00
2018-08-27 20:41:00 +00:00
The RPC client library defaults to requiring the platform version it was built with. That means if you use the client
library released as part of Corda N, then the node it connects to must be of version N or above. This is checked when
the client first connects. If you want to override this behaviour, you can alter the `` minimumServerProtocolVersion ``
field in the `` CordaRPCClientConfiguration `` object passed to the client. Alternatively, just link your app against
an older version of the library.
2016-08-26 13:31:17 +00:00
Thread safety
-------------
2017-05-11 16:44:45 +00:00
A proxy is thread safe, blocking, and allows multiple RPCs to be in flight at once. Any observables that are returned and
you subscribe to will have objects emitted in order on a background thread pool. Each Observable stream is tied to a single
thread, however note that two separate Observables may invoke their respective callbacks on different threads.
2016-08-26 13:31:17 +00:00
Error handling
--------------
If something goes wrong with the RPC infrastructure itself, an `` RPCException `` is thrown. If you call a method that
requires a higher version of the protocol than the server supports, `` UnsupportedOperationException `` is thrown.
2018-09-17 14:44:51 +00:00
Otherwise the behaviour depends on the `` devMode `` node configuration option.
In `` devMode `` , if the server implementation throws an exception, that exception is serialised and rethrown on the client
2016-08-26 13:31:17 +00:00
side as if it was thrown from inside the called RPC method. These exceptions can be caught as normal.
2018-09-17 14:44:51 +00:00
When not in `` devMode `` , the server will mask exceptions not meant for clients and return an `` InternalNodeException `` instead.
This does not expose internal information to clients, strengthening privacy and security. CorDapps can have exceptions implement
`` ClientRelevantError `` to allow them to reach RPC clients.
2018-05-21 12:39:38 +00:00
Connection management
---------------------
2018-08-17 15:52:56 +00:00
It is possible to not be able to connect to the server on the first attempt. In that case, the `` CordaRPCClient.start() ``
2018-05-21 12:39:38 +00:00
method will throw an exception. The following code snippet is an example of how to write a simple retry mechanism for
such situations:
.. sourcecode :: Kotlin
fun establishConnectionWithRetry(nodeHostAndPort: NetworkHostAndPort, username: String, password: String): CordaRPCConnection {
val retryInterval = 5.seconds
do {
val connection = try {
logger.info("Connecting to: $nodeHostAndPort")
val client = CordaRPCClient(
nodeHostAndPort,
object : CordaRPCClientConfiguration {
override val connectionMaxRetryInterval = retryInterval
}
)
val _connection = client.start(username, password)
// Check connection is truly operational before returning it.
val nodeInfo = _connection.proxy.nodeInfo()
require(nodeInfo.legalIdentitiesAndCerts.isNotEmpty())
_connection
} catch(secEx: ActiveMQSecurityException) {
// Happens when incorrect credentials provided - no point to retry connecting.
throw secEx
}
catch(ex: RPCException) {
// Deliberately not logging full stack trace as it will be full of internal stacktraces.
logger.info("Exception upon establishing connection: " + ex.message)
null
}
if(connection != null) {
logger.info("Connection successfully established with: $nodeHostAndPort")
return connection
}
// Could not connect this time round - pause before giving another try.
Thread.sleep(retryInterval.toMillis())
} while (connection == null)
}
After a successful connection, it is possible for the server to become unavailable. In this case, all RPC calls will throw
an exception and created observables will no longer receive observations. Below is an example of how to reconnect and
back-fill any data that might have been missed while the connection was down. This is done by using the `` onError `` handler
on the `` Observable `` returned by `` CordaRPCOps `` .
.. sourcecode :: Kotlin
fun performRpcReconnect(nodeHostAndPort: NetworkHostAndPort, username: String, password: String) {
val connection = establishConnectionWithRetry(nodeHostAndPort, username, password)
val proxy = connection.proxy
val (stateMachineInfos, stateMachineUpdatesRaw) = proxy.stateMachinesFeed()
val retryableStateMachineUpdatesSubscription: AtomicReference<Subscription?> = AtomicReference(null)
val subscription: Subscription = stateMachineUpdatesRaw
.startWith(stateMachineInfos.map { StateMachineUpdate.Added(it) })
.subscribe({ clientCode(it) /* Client code here * / }, {
// Terminate subscription such that nothing gets past this point to downstream Observables.
retryableStateMachineUpdatesSubscription.get()?.unsubscribe()
// It is good idea to close connection to properly mark the end of it. During re-connect we will create a new
// client and a new connection, so no going back to this one. Also the server might be down, so we are
// force closing the connection to avoid propagation of notification to the server side.
connection.forceClose()
// Perform re-connect.
performRpcReconnect(nodeHostAndPort, username, password)
})
retryableStateMachineUpdatesSubscription.set(subscription)
}
In this code snippet it is possible to see that function `` performRpcReconnect `` creates an RPC connection and implements
the error handler upon subscription to an `` Observable `` . The call to this `` onError `` handler will be made when failover
happens then the code will terminate existing subscription, closes RPC connection and recursively calls `` performRpcReconnect ``
which will re-subscribe once RPC connection comes back online.
2018-06-21 15:57:30 +00:00
Client code if fed with instances of `` StateMachineInfo `` using call `` clientCode(it) `` . Upon re-connecting, this code receives
2018-05-21 12:39:38 +00:00
all the items. Some of these items might have already been delivered to client code prior to failover occurred.
It is down to client code in this case handle those duplicate items as appropriate.
2018-01-23 16:23:37 +00:00
Wire security
-------------
2019-02-13 17:54:30 +00:00
If TLS communications to the RPC endpoint are required the node should be configured with `` rpcSettings.useSSL=true `` see :doc: `corda-configuration-file` .
The node admin should then create a node specific RPC certificate and key, by running the node once with `` generate-rpc-ssl-settings `` command specified (see :doc: `node-commandline` ).
The generated RPC TLS trust root certificate will be exported to a `` certificates/export/rpcssltruststore.jks `` file which should be distributed to the authorised RPC clients.
2018-01-23 16:23:37 +00:00
2019-02-13 17:54:30 +00:00
The connecting `` CordaRPCClient `` code must then use one of the constructors with a parameter of type `` ClientRpcSslOptions `` (`JavaDoc <api/javadoc/net/corda/client/rpc/CordaRPCClient.html> `_ ) and set this constructor
argument with the appropriate path for the `` rpcssltruststore.jks `` file. The client connection will then use this to validate the RPC server handshake.
2018-05-21 10:05:08 +00:00
2019-02-13 17:54:30 +00:00
Note that RPC TLS does not use mutual authentication, and delegates fine grained user authentication and authorisation to the RPC security features detailed above.
2018-05-21 10:05:08 +00:00
2017-02-28 08:12:18 +00:00
Whitelisting classes with the Corda node
----------------------------------------
2017-07-25 08:26:35 +00:00
CorDapps must whitelist any classes used over RPC with Corda's serialization framework, unless they are whitelisted by
default in `` DefaultWhitelist `` . The whitelisting is done either via the plugin architecture or by using the
`` @CordaSerializable `` annotation. See :doc: `serialization` . An example is shown in :doc: `tutorial-clientrpc-api` .
2016-11-15 17:16:33 +00:00
2017-05-11 16:44:45 +00:00
.. _CordaRPCClient: api/javadoc/net/corda/client/rpc/CordaRPCClient.html
.. _CordaRPCOps: api/javadoc/net/corda/core/messaging/CordaRPCOps.html
.. _CordaRPCConnection: api/javadoc/net/corda/client/rpc/CordaRPCConnection.html