2015-12-16 11:58:01 +02:00
|
|
|
// Copyright 2015 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package rpc
|
|
|
|
|
|
|
|
import (
|
2017-03-22 20:20:33 +03:00
|
|
|
"context"
|
2018-09-19 19:09:03 +03:00
|
|
|
"encoding/base64"
|
2015-12-16 11:58:01 +02:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2016-07-12 18:47:15 +03:00
|
|
|
"net/url"
|
2015-12-16 11:58:01 +02:00
|
|
|
"os"
|
2016-02-05 15:08:48 +02:00
|
|
|
"strings"
|
2019-07-22 13:22:39 +03:00
|
|
|
"sync"
|
2020-06-02 15:04:44 +03:00
|
|
|
"time"
|
2015-12-16 11:58:01 +02:00
|
|
|
|
2018-07-16 10:54:19 +03:00
|
|
|
mapset "github.com/deckarep/golang-set"
|
2017-02-22 15:10:07 +03:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2019-07-22 13:22:39 +03:00
|
|
|
"github.com/gorilla/websocket"
|
2015-12-16 11:58:01 +02:00
|
|
|
)
|
|
|
|
|
2019-07-22 13:22:39 +03:00
|
|
|
const (
|
2020-06-02 15:04:44 +03:00
|
|
|
wsReadBuffer = 1024
|
|
|
|
wsWriteBuffer = 1024
|
|
|
|
wsPingInterval = 60 * time.Second
|
|
|
|
wsPingWriteTimeout = 5 * time.Second
|
2021-09-27 17:31:45 +03:00
|
|
|
wsPongTimeout = 30 * time.Second
|
2021-02-26 15:40:35 +03:00
|
|
|
wsMessageSizeLimit = 15 * 1024 * 1024
|
2019-07-22 13:22:39 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
var wsBufferPool = new(sync.Pool)
|
|
|
|
|
2016-07-12 18:47:15 +03:00
|
|
|
// WebsocketHandler returns a handler that serves JSON-RPC to WebSocket connections.
|
|
|
|
//
|
|
|
|
// allowedOrigins should be a comma-separated list of allowed origin URLs.
|
|
|
|
// To allow connections with any origin, pass "*".
|
2019-02-04 15:47:34 +03:00
|
|
|
func (s *Server) WebsocketHandler(allowedOrigins []string) http.Handler {
|
2019-07-22 13:22:39 +03:00
|
|
|
var upgrader = websocket.Upgrader{
|
|
|
|
ReadBufferSize: wsReadBuffer,
|
|
|
|
WriteBufferSize: wsWriteBuffer,
|
|
|
|
WriteBufferPool: wsBufferPool,
|
|
|
|
CheckOrigin: wsHandshakeValidator(allowedOrigins),
|
|
|
|
}
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
conn, err := upgrader.Upgrade(w, r, nil)
|
|
|
|
if err != nil {
|
|
|
|
log.Debug("WebSocket upgrade failed", "err", err)
|
|
|
|
return
|
2019-02-04 15:47:34 +03:00
|
|
|
}
|
2019-07-22 13:22:39 +03:00
|
|
|
codec := newWebsocketCodec(conn)
|
2019-11-18 11:40:59 +03:00
|
|
|
s.ServeCodec(codec, 0)
|
2019-07-22 13:22:39 +03:00
|
|
|
})
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// wsHandshakeValidator returns a handler that verifies the origin during the
|
|
|
|
// websocket upgrade process. When a '*' is specified as an allowed origins all
|
|
|
|
// connections are accepted.
|
2019-07-22 13:22:39 +03:00
|
|
|
func wsHandshakeValidator(allowedOrigins []string) func(*http.Request) bool {
|
2018-07-16 10:54:19 +03:00
|
|
|
origins := mapset.NewSet()
|
2015-12-16 11:58:01 +02:00
|
|
|
allowAllOrigins := false
|
|
|
|
|
|
|
|
for _, origin := range allowedOrigins {
|
|
|
|
if origin == "*" {
|
|
|
|
allowAllOrigins = true
|
|
|
|
}
|
|
|
|
if origin != "" {
|
2020-11-19 16:54:49 +03:00
|
|
|
origins.Add(origin)
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
|
|
|
}
|
2016-05-10 19:01:58 +03:00
|
|
|
// allow localhost if no allowedOrigins are specified.
|
2018-07-16 10:54:19 +03:00
|
|
|
if len(origins.ToSlice()) == 0 {
|
2015-12-16 11:58:01 +02:00
|
|
|
origins.Add("http://localhost")
|
|
|
|
if hostname, err := os.Hostname(); err == nil {
|
2020-11-19 16:54:49 +03:00
|
|
|
origins.Add("http://" + hostname)
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
|
|
|
}
|
2019-02-04 15:47:34 +03:00
|
|
|
log.Debug(fmt.Sprintf("Allowed origin(s) for WS RPC interface %v", origins.ToSlice()))
|
2015-12-16 11:58:01 +02:00
|
|
|
|
2019-07-22 13:22:39 +03:00
|
|
|
f := func(req *http.Request) bool {
|
2019-02-19 13:49:43 +03:00
|
|
|
// Skip origin verification if no Origin header is present. The origin check
|
|
|
|
// is supposed to protect against browser based attacks. Browsers always set
|
|
|
|
// Origin. Non-browser software can put anything in origin and checking it doesn't
|
|
|
|
// provide additional security.
|
|
|
|
if _, ok := req.Header["Origin"]; !ok {
|
2019-07-22 13:22:39 +03:00
|
|
|
return true
|
2019-02-19 13:49:43 +03:00
|
|
|
}
|
2021-07-29 18:36:15 +03:00
|
|
|
// Verify origin against allow list.
|
2016-05-10 19:01:58 +03:00
|
|
|
origin := strings.ToLower(req.Header.Get("Origin"))
|
2020-11-19 16:54:49 +03:00
|
|
|
if allowAllOrigins || originIsAllowed(origins, origin) {
|
2019-07-22 13:22:39 +03:00
|
|
|
return true
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
2019-02-04 15:47:34 +03:00
|
|
|
log.Warn("Rejected WebSocket connection", "origin", origin)
|
2019-07-22 13:22:39 +03:00
|
|
|
return false
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
2019-07-22 13:22:39 +03:00
|
|
|
type wsHandshakeError struct {
|
|
|
|
err error
|
|
|
|
status string
|
|
|
|
}
|
2015-12-16 11:58:01 +02:00
|
|
|
|
2019-07-22 13:22:39 +03:00
|
|
|
func (e wsHandshakeError) Error() string {
|
|
|
|
s := e.err.Error()
|
|
|
|
if e.status != "" {
|
|
|
|
s += " (HTTP status " + e.status + ")"
|
2018-09-19 19:09:03 +03:00
|
|
|
}
|
2019-07-22 13:22:39 +03:00
|
|
|
return s
|
2018-09-19 19:09:03 +03:00
|
|
|
}
|
|
|
|
|
2020-11-19 16:54:49 +03:00
|
|
|
func originIsAllowed(allowedOrigins mapset.Set, browserOrigin string) bool {
|
|
|
|
it := allowedOrigins.Iterator()
|
|
|
|
for origin := range it.C {
|
|
|
|
if ruleAllowsOrigin(origin.(string), browserOrigin) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func ruleAllowsOrigin(allowedOrigin string, browserOrigin string) bool {
|
|
|
|
var (
|
|
|
|
allowedScheme, allowedHostname, allowedPort string
|
|
|
|
browserScheme, browserHostname, browserPort string
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
allowedScheme, allowedHostname, allowedPort, err = parseOriginURL(allowedOrigin)
|
|
|
|
if err != nil {
|
|
|
|
log.Warn("Error parsing allowed origin specification", "spec", allowedOrigin, "error", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
browserScheme, browserHostname, browserPort, err = parseOriginURL(browserOrigin)
|
|
|
|
if err != nil {
|
|
|
|
log.Warn("Error parsing browser 'Origin' field", "Origin", browserOrigin, "error", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if allowedScheme != "" && allowedScheme != browserScheme {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if allowedHostname != "" && allowedHostname != browserHostname {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if allowedPort != "" && allowedPort != browserPort {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseOriginURL(origin string) (string, string, string, error) {
|
|
|
|
parsedURL, err := url.Parse(strings.ToLower(origin))
|
|
|
|
if err != nil {
|
|
|
|
return "", "", "", err
|
|
|
|
}
|
|
|
|
var scheme, hostname, port string
|
|
|
|
if strings.Contains(origin, "://") {
|
|
|
|
scheme = parsedURL.Scheme
|
|
|
|
hostname = parsedURL.Hostname()
|
|
|
|
port = parsedURL.Port()
|
|
|
|
} else {
|
|
|
|
scheme = ""
|
|
|
|
hostname = parsedURL.Scheme
|
|
|
|
port = parsedURL.Opaque
|
|
|
|
if hostname == "" {
|
|
|
|
hostname = origin
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return scheme, hostname, port, nil
|
|
|
|
}
|
|
|
|
|
2020-01-06 14:06:29 +03:00
|
|
|
// DialWebsocketWithDialer creates a new RPC client that communicates with a JSON-RPC server
|
|
|
|
// that is listening on the given endpoint using the provided dialer.
|
|
|
|
func DialWebsocketWithDialer(ctx context.Context, endpoint, origin string, dialer websocket.Dialer) (*Client, error) {
|
2019-07-22 13:22:39 +03:00
|
|
|
endpoint, header, err := wsClientHeaders(endpoint, origin)
|
2018-09-19 19:09:03 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-02-04 15:47:34 +03:00
|
|
|
return newClient(ctx, func(ctx context.Context) (ServerCodec, error) {
|
2019-07-22 13:22:39 +03:00
|
|
|
conn, resp, err := dialer.DialContext(ctx, endpoint, header)
|
2019-02-04 15:47:34 +03:00
|
|
|
if err != nil {
|
2019-07-22 13:22:39 +03:00
|
|
|
hErr := wsHandshakeError{err: err}
|
|
|
|
if resp != nil {
|
|
|
|
hErr.status = resp.Status
|
|
|
|
}
|
|
|
|
return nil, hErr
|
2019-02-04 15:47:34 +03:00
|
|
|
}
|
|
|
|
return newWebsocketCodec(conn), nil
|
2016-07-12 18:47:15 +03:00
|
|
|
})
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
|
|
|
|
2020-01-06 14:06:29 +03:00
|
|
|
// DialWebsocket creates a new RPC client that communicates with a JSON-RPC server
|
|
|
|
// that is listening on the given endpoint.
|
|
|
|
//
|
|
|
|
// The context is used for the initial connection establishment. It does not
|
|
|
|
// affect subsequent interactions with the client.
|
|
|
|
func DialWebsocket(ctx context.Context, endpoint, origin string) (*Client, error) {
|
|
|
|
dialer := websocket.Dialer{
|
|
|
|
ReadBufferSize: wsReadBuffer,
|
|
|
|
WriteBufferSize: wsWriteBuffer,
|
|
|
|
WriteBufferPool: wsBufferPool,
|
|
|
|
}
|
|
|
|
return DialWebsocketWithDialer(ctx, endpoint, origin, dialer)
|
|
|
|
}
|
|
|
|
|
2019-07-22 13:22:39 +03:00
|
|
|
func wsClientHeaders(endpoint, origin string) (string, http.Header, error) {
|
|
|
|
endpointURL, err := url.Parse(endpoint)
|
2015-12-16 11:58:01 +02:00
|
|
|
if err != nil {
|
2019-07-22 13:22:39 +03:00
|
|
|
return endpoint, nil, err
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
2019-07-22 13:22:39 +03:00
|
|
|
header := make(http.Header)
|
|
|
|
if origin != "" {
|
|
|
|
header.Add("origin", origin)
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
2019-07-22 13:22:39 +03:00
|
|
|
if endpointURL.User != nil {
|
|
|
|
b64auth := base64.StdEncoding.EncodeToString([]byte(endpointURL.User.String()))
|
|
|
|
header.Add("authorization", "Basic "+b64auth)
|
|
|
|
endpointURL.User = nil
|
2015-12-16 11:58:01 +02:00
|
|
|
}
|
2019-07-22 13:22:39 +03:00
|
|
|
return endpointURL.String(), header, nil
|
2017-03-22 20:20:33 +03:00
|
|
|
}
|
|
|
|
|
2020-06-02 15:04:44 +03:00
|
|
|
type websocketCodec struct {
|
|
|
|
*jsonCodec
|
|
|
|
conn *websocket.Conn
|
|
|
|
|
|
|
|
wg sync.WaitGroup
|
|
|
|
pingReset chan struct{}
|
|
|
|
}
|
|
|
|
|
2019-07-22 13:22:39 +03:00
|
|
|
func newWebsocketCodec(conn *websocket.Conn) ServerCodec {
|
2021-02-26 15:40:35 +03:00
|
|
|
conn.SetReadLimit(wsMessageSizeLimit)
|
2021-09-27 17:31:45 +03:00
|
|
|
conn.SetPongHandler(func(appData string) error {
|
|
|
|
conn.SetReadDeadline(time.Time{})
|
|
|
|
return nil
|
|
|
|
})
|
2020-06-02 15:04:44 +03:00
|
|
|
wc := &websocketCodec{
|
|
|
|
jsonCodec: NewFuncCodec(conn, conn.WriteJSON, conn.ReadJSON).(*jsonCodec),
|
|
|
|
conn: conn,
|
|
|
|
pingReset: make(chan struct{}, 1),
|
|
|
|
}
|
|
|
|
wc.wg.Add(1)
|
|
|
|
go wc.pingLoop()
|
|
|
|
return wc
|
|
|
|
}
|
|
|
|
|
|
|
|
func (wc *websocketCodec) close() {
|
|
|
|
wc.jsonCodec.close()
|
|
|
|
wc.wg.Wait()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (wc *websocketCodec) writeJSON(ctx context.Context, v interface{}) error {
|
|
|
|
err := wc.jsonCodec.writeJSON(ctx, v)
|
|
|
|
if err == nil {
|
|
|
|
// Notify pingLoop to delay the next idle ping.
|
|
|
|
select {
|
|
|
|
case wc.pingReset <- struct{}{}:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// pingLoop sends periodic ping frames when the connection is idle.
|
|
|
|
func (wc *websocketCodec) pingLoop() {
|
|
|
|
var timer = time.NewTimer(wsPingInterval)
|
|
|
|
defer wc.wg.Done()
|
|
|
|
defer timer.Stop()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-wc.closed():
|
|
|
|
return
|
|
|
|
case <-wc.pingReset:
|
|
|
|
if !timer.Stop() {
|
|
|
|
<-timer.C
|
|
|
|
}
|
|
|
|
timer.Reset(wsPingInterval)
|
|
|
|
case <-timer.C:
|
|
|
|
wc.jsonCodec.encMu.Lock()
|
|
|
|
wc.conn.SetWriteDeadline(time.Now().Add(wsPingWriteTimeout))
|
|
|
|
wc.conn.WriteMessage(websocket.PingMessage, nil)
|
2021-09-27 17:31:45 +03:00
|
|
|
wc.conn.SetReadDeadline(time.Now().Add(wsPongTimeout))
|
2020-06-02 15:04:44 +03:00
|
|
|
wc.jsonCodec.encMu.Unlock()
|
|
|
|
timer.Reset(wsPingInterval)
|
|
|
|
}
|
|
|
|
}
|
2017-03-22 20:20:33 +03:00
|
|
|
}
|