| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | // Copyright 2015 The go-ethereum Authors | 
					
						
							|  |  |  | // This file is part of the go-ethereum library. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The go-ethereum library is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Lesser General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The go-ethereum library is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 
					
						
							|  |  |  | // GNU Lesser General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Lesser General Public License | 
					
						
							|  |  |  | // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package rpc | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2016-02-02 19:29:54 +02:00
										 |  |  | 	"bytes" | 
					
						
							| 
									
										
										
										
											2017-03-22 18:20:33 +01:00
										 |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2016-02-02 19:29:54 +02:00
										 |  |  | 	"encoding/json" | 
					
						
							| 
									
										
										
										
											2017-11-17 14:18:46 +02:00
										 |  |  | 	"errors" | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2016-03-14 09:38:54 +01:00
										 |  |  | 	"io" | 
					
						
							| 
									
										
										
										
											2016-02-02 19:29:54 +02:00
										 |  |  | 	"io/ioutil" | 
					
						
							| 
									
										
										
										
											2017-11-09 10:54:58 +01:00
										 |  |  | 	"mime" | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	"net" | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 	"net/http" | 
					
						
							| 
									
										
										
										
											2018-03-13 13:23:44 +02:00
										 |  |  | 	"strings" | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	"sync" | 
					
						
							|  |  |  | 	"time" | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-07-31 02:16:14 -07:00
										 |  |  | 	"github.com/ethereum/go-ethereum/log" | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | 	"github.com/rs/cors" | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | const ( | 
					
						
							| 
									
										
										
										
											2018-09-25 19:27:18 +09:00
										 |  |  | 	maxRequestContentLength = 1024 * 512 | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | 	contentType             = "application/json" | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | // https://www.jsonrpc.org/historical/json-rpc-over-http.html#id13 | 
					
						
							|  |  |  | var acceptedContentTypes = []string{contentType, "application/json-rpc", "application/jsonrequest"} | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | type httpConn struct { | 
					
						
							|  |  |  | 	client    *http.Client | 
					
						
							|  |  |  | 	req       *http.Request | 
					
						
							|  |  |  | 	closeOnce sync.Once | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | 	closed    chan interface{} | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // httpConn is treated specially by Client. | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | func (hc *httpConn) Write(context.Context, interface{}) error { | 
					
						
							|  |  |  | 	panic("Write called on httpConn") | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (hc *httpConn) RemoteAddr() string { | 
					
						
							|  |  |  | 	return hc.req.URL.String() | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (hc *httpConn) Read() ([]*jsonrpcMessage, bool, error) { | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	<-hc.closed | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | 	return nil, false, io.EOF | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | func (hc *httpConn) Close() { | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	hc.closeOnce.Do(func() { close(hc.closed) }) | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (hc *httpConn) Closed() <-chan interface{} { | 
					
						
							|  |  |  | 	return hc.closed | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-07-31 02:16:14 -07:00
										 |  |  | // HTTPTimeouts represents the configuration params for the HTTP RPC server. | 
					
						
							|  |  |  | type HTTPTimeouts struct { | 
					
						
							|  |  |  | 	// ReadTimeout is the maximum duration for reading the entire | 
					
						
							|  |  |  | 	// request, including the body. | 
					
						
							|  |  |  | 	// | 
					
						
							|  |  |  | 	// Because ReadTimeout does not let Handlers make per-request | 
					
						
							|  |  |  | 	// decisions on each request body's acceptable deadline or | 
					
						
							|  |  |  | 	// upload rate, most users will prefer to use | 
					
						
							|  |  |  | 	// ReadHeaderTimeout. It is valid to use them both. | 
					
						
							|  |  |  | 	ReadTimeout time.Duration | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// WriteTimeout is the maximum duration before timing out | 
					
						
							|  |  |  | 	// writes of the response. It is reset whenever a new | 
					
						
							|  |  |  | 	// request's header is read. Like ReadTimeout, it does not | 
					
						
							|  |  |  | 	// let Handlers make decisions on a per-request basis. | 
					
						
							|  |  |  | 	WriteTimeout time.Duration | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// IdleTimeout is the maximum amount of time to wait for the | 
					
						
							|  |  |  | 	// next request when keep-alives are enabled. If IdleTimeout | 
					
						
							|  |  |  | 	// is zero, the value of ReadTimeout is used. If both are | 
					
						
							|  |  |  | 	// zero, ReadHeaderTimeout is used. | 
					
						
							|  |  |  | 	IdleTimeout time.Duration | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // DefaultHTTPTimeouts represents the default timeout values used if further | 
					
						
							|  |  |  | // configuration is not provided. | 
					
						
							|  |  |  | var DefaultHTTPTimeouts = HTTPTimeouts{ | 
					
						
							|  |  |  | 	ReadTimeout:  30 * time.Second, | 
					
						
							|  |  |  | 	WriteTimeout: 30 * time.Second, | 
					
						
							|  |  |  | 	IdleTimeout:  120 * time.Second, | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-24 09:59:15 +01:00
										 |  |  | // DialHTTPWithClient creates a new RPC client that connects to an RPC server over HTTP | 
					
						
							|  |  |  | // using the provided HTTP Client. | 
					
						
							|  |  |  | func DialHTTPWithClient(endpoint string, client *http.Client) (*Client, error) { | 
					
						
							| 
									
										
										
										
											2017-12-12 21:12:32 +03:00
										 |  |  | 	req, err := http.NewRequest(http.MethodPost, endpoint, nil) | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-11-17 04:07:11 -08:00
										 |  |  | 	req.Header.Set("Content-Type", contentType) | 
					
						
							|  |  |  | 	req.Header.Set("Accept", contentType) | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	initctx := context.Background() | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | 	return newClient(initctx, func(context.Context) (ServerCodec, error) { | 
					
						
							|  |  |  | 		return &httpConn{client: client, req: req, closed: make(chan interface{})}, nil | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-24 09:59:15 +01:00
										 |  |  | // DialHTTP creates a new RPC client that connects to an RPC server over HTTP. | 
					
						
							|  |  |  | func DialHTTP(endpoint string) (*Client, error) { | 
					
						
							|  |  |  | 	return DialHTTPWithClient(endpoint, new(http.Client)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | func (c *Client) sendHTTP(ctx context.Context, op *requestOp, msg interface{}) error { | 
					
						
							|  |  |  | 	hc := c.writeConn.(*httpConn) | 
					
						
							|  |  |  | 	respBody, err := hc.doRequest(ctx, msg) | 
					
						
							| 
									
										
										
										
											2018-04-19 15:32:43 +02:00
										 |  |  | 	if respBody != nil { | 
					
						
							|  |  |  | 		defer respBody.Close() | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2018-04-19 15:32:43 +02:00
										 |  |  | 		if respBody != nil { | 
					
						
							|  |  |  | 			buf := new(bytes.Buffer) | 
					
						
							|  |  |  | 			if _, err2 := buf.ReadFrom(respBody); err2 == nil { | 
					
						
							|  |  |  | 				return fmt.Errorf("%v %v", err, buf.String()) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	var respmsg jsonrpcMessage | 
					
						
							|  |  |  | 	if err := json.NewDecoder(respBody).Decode(&respmsg); err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	op.resp <- &respmsg | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | func (c *Client) sendBatchHTTP(ctx context.Context, op *requestOp, msgs []*jsonrpcMessage) error { | 
					
						
							|  |  |  | 	hc := c.writeConn.(*httpConn) | 
					
						
							|  |  |  | 	respBody, err := hc.doRequest(ctx, msgs) | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	defer respBody.Close() | 
					
						
							|  |  |  | 	var respmsgs []jsonrpcMessage | 
					
						
							|  |  |  | 	if err := json.NewDecoder(respBody).Decode(&respmsgs); err != nil { | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-06-26 17:26:22 +08:00
										 |  |  | 	for i := 0; i < len(respmsgs); i++ { | 
					
						
							|  |  |  | 		op.resp <- &respmsgs[i] | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | func (hc *httpConn) doRequest(ctx context.Context, msg interface{}) (io.ReadCloser, error) { | 
					
						
							|  |  |  | 	body, err := json.Marshal(msg) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-03-22 18:20:33 +01:00
										 |  |  | 	req := hc.req.WithContext(ctx) | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	req.Body = ioutil.NopCloser(bytes.NewReader(body)) | 
					
						
							|  |  |  | 	req.ContentLength = int64(len(body)) | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-03-22 18:20:33 +01:00
										 |  |  | 	resp, err := hc.client.Do(req) | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-04-19 15:32:43 +02:00
										 |  |  | 	if resp.StatusCode < 200 || resp.StatusCode >= 300 { | 
					
						
							|  |  |  | 		return resp.Body, errors.New(resp.Status) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	return resp.Body, nil | 
					
						
							| 
									
										
										
										
											2015-12-16 10:58:01 +01:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | // httpServerConn turns a HTTP connection into a Conn. | 
					
						
							|  |  |  | type httpServerConn struct { | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | 	io.Reader | 
					
						
							|  |  |  | 	io.Writer | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | 	r *http.Request | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | func newHTTPServerConn(r *http.Request, w http.ResponseWriter) ServerCodec { | 
					
						
							|  |  |  | 	body := io.LimitReader(r.Body, maxRequestContentLength) | 
					
						
							|  |  |  | 	conn := &httpServerConn{Reader: body, Writer: w, r: r} | 
					
						
							|  |  |  | 	return NewJSONCodec(conn) | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | // Close does nothing and always returns nil. | 
					
						
							|  |  |  | func (t *httpServerConn) Close() error { return nil } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // RemoteAddr returns the peer address of the underlying connection. | 
					
						
							|  |  |  | func (t *httpServerConn) RemoteAddr() string { | 
					
						
							|  |  |  | 	return t.r.RemoteAddr | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // SetWriteDeadline does nothing and always returns nil. | 
					
						
							|  |  |  | func (t *httpServerConn) SetWriteDeadline(time.Time) error { return nil } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | // NewHTTPServer creates a new HTTP RPC server around an API provider. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Deprecated: Server implements http.Handler | 
					
						
							| 
									
										
										
										
											2019-01-21 06:38:13 -08:00
										 |  |  | func NewHTTPServer(cors []string, vhosts []string, timeouts HTTPTimeouts, srv http.Handler) *http.Server { | 
					
						
							| 
									
										
										
										
											2018-02-12 13:52:07 +01:00
										 |  |  | 	// Wrap the CORS-handler within a host-handler | 
					
						
							|  |  |  | 	handler := newCorsHandler(srv, cors) | 
					
						
							|  |  |  | 	handler = newVHostHandler(vhosts, handler) | 
					
						
							| 
									
										
										
										
											2018-07-31 02:16:14 -07:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// Make sure timeout values are meaningful | 
					
						
							|  |  |  | 	if timeouts.ReadTimeout < time.Second { | 
					
						
							|  |  |  | 		log.Warn("Sanitizing invalid HTTP read timeout", "provided", timeouts.ReadTimeout, "updated", DefaultHTTPTimeouts.ReadTimeout) | 
					
						
							|  |  |  | 		timeouts.ReadTimeout = DefaultHTTPTimeouts.ReadTimeout | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if timeouts.WriteTimeout < time.Second { | 
					
						
							|  |  |  | 		log.Warn("Sanitizing invalid HTTP write timeout", "provided", timeouts.WriteTimeout, "updated", DefaultHTTPTimeouts.WriteTimeout) | 
					
						
							|  |  |  | 		timeouts.WriteTimeout = DefaultHTTPTimeouts.WriteTimeout | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if timeouts.IdleTimeout < time.Second { | 
					
						
							|  |  |  | 		log.Warn("Sanitizing invalid HTTP idle timeout", "provided", timeouts.IdleTimeout, "updated", DefaultHTTPTimeouts.IdleTimeout) | 
					
						
							|  |  |  | 		timeouts.IdleTimeout = DefaultHTTPTimeouts.IdleTimeout | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// Bundle and start the HTTP server | 
					
						
							| 
									
										
										
										
											2018-06-04 11:41:55 +02:00
										 |  |  | 	return &http.Server{ | 
					
						
							|  |  |  | 		Handler:      handler, | 
					
						
							| 
									
										
										
										
											2018-07-31 02:16:14 -07:00
										 |  |  | 		ReadTimeout:  timeouts.ReadTimeout, | 
					
						
							|  |  |  | 		WriteTimeout: timeouts.WriteTimeout, | 
					
						
							|  |  |  | 		IdleTimeout:  timeouts.IdleTimeout, | 
					
						
							| 
									
										
										
										
											2018-06-04 11:41:55 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // ServeHTTP serves JSON-RPC requests over HTTP. | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) { | 
					
						
							| 
									
										
										
										
											2017-11-16 13:51:06 +02:00
										 |  |  | 	// Permit dumb empty requests for remote health-checks (AWS) | 
					
						
							| 
									
										
										
										
											2017-12-12 21:12:32 +03:00
										 |  |  | 	if r.Method == http.MethodGet && r.ContentLength == 0 && r.URL.RawQuery == "" { | 
					
						
							| 
									
										
										
										
											2017-11-16 13:51:06 +02:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-11-17 14:18:46 +02:00
										 |  |  | 	if code, err := validateRequest(r); err != nil { | 
					
						
							|  |  |  | 		http.Error(w, err.Error(), code) | 
					
						
							| 
									
										
										
										
											2017-11-09 10:54:58 +01:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-11-16 13:51:06 +02:00
										 |  |  | 	// All checks passed, create a codec that reads direct from the request body | 
					
						
							|  |  |  | 	// untilEOF and writes the response to w and order the server to process a | 
					
						
							|  |  |  | 	// single request. | 
					
						
							| 
									
										
										
										
											2018-06-02 06:26:47 -04:00
										 |  |  | 	ctx := r.Context() | 
					
						
							| 
									
										
											  
											
												cmd/clef, signer: initial poc of the standalone signer (#16154)
* signer: introduce external signer command
* cmd/signer, rpc: Implement new signer. Add info about remote user to Context
* signer: refactored request/response, made use of urfave.cli
* cmd/signer: Use common flags
* cmd/signer: methods to validate calldata against abi
* cmd/signer: work on abi parser
* signer: add mutex around UI
* cmd/signer: add json 4byte directory, remove passwords from api
* cmd/signer: minor changes
* cmd/signer: Use ErrRequestDenied, enable lightkdf
* cmd/signer: implement tests
* cmd/signer: made possible for UI to modify tx parameters
* cmd/signer: refactors, removed channels in ui comms, added UI-api via stdin/out
* cmd/signer: Made lowercase json-definitions, added UI-signer test functionality
* cmd/signer: update documentation
* cmd/signer: fix bugs, improve abi detection, abi argument display
* cmd/signer: minor change in json format
* cmd/signer: rework json communication
* cmd/signer: implement mixcase addresses in API, fix json id bug
* cmd/signer: rename fromaccount, update pythonpoc with new json encoding format
* cmd/signer: make use of new abi interface
* signer: documentation
* signer/main: remove redundant  option
* signer: implement audit logging
* signer: create package 'signer', minor changes
* common: add 0x-prefix to mixcaseaddress in json marshalling + validation
* signer, rules, storage: implement rules + ephemeral storage for signer rules
* signer: implement OnApprovedTx, change signing response (API BREAKAGE)
* signer: refactoring + documentation
* signer/rules: implement dispatching to next handler
* signer: docs
* signer/rules: hide json-conversion from users, ensure context is cleaned
* signer: docs
* signer: implement validation rules, change signature of call_info
* signer: fix log flaw with string pointer
* signer: implement custom 4byte databsae that saves submitted signatures
* signer/storage: implement aes-gcm-backed credential storage
* accounts: implement json unmarshalling of url
* signer: fix listresponse, fix gas->uint64
* node: make http/ipc start methods public
* signer: add ipc capability+review concerns
* accounts: correct docstring
* signer: address review concerns
* rpc: go fmt -s
* signer: review concerns+ baptize Clef
* signer,node: move Start-functions to separate file
* signer: formatting
											
										 
											2018-04-16 14:04:32 +02:00
										 |  |  | 	ctx = context.WithValue(ctx, "remote", r.RemoteAddr) | 
					
						
							|  |  |  | 	ctx = context.WithValue(ctx, "scheme", r.Proto) | 
					
						
							|  |  |  | 	ctx = context.WithValue(ctx, "local", r.Host) | 
					
						
							| 
									
										
										
										
											2018-09-25 15:54:58 +02:00
										 |  |  | 	if ua := r.Header.Get("User-Agent"); ua != "" { | 
					
						
							|  |  |  | 		ctx = context.WithValue(ctx, "User-Agent", ua) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if origin := r.Header.Get("Origin"); origin != "" { | 
					
						
							|  |  |  | 		ctx = context.WithValue(ctx, "Origin", origin) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
											  
											
												cmd/clef, signer: initial poc of the standalone signer (#16154)
* signer: introduce external signer command
* cmd/signer, rpc: Implement new signer. Add info about remote user to Context
* signer: refactored request/response, made use of urfave.cli
* cmd/signer: Use common flags
* cmd/signer: methods to validate calldata against abi
* cmd/signer: work on abi parser
* signer: add mutex around UI
* cmd/signer: add json 4byte directory, remove passwords from api
* cmd/signer: minor changes
* cmd/signer: Use ErrRequestDenied, enable lightkdf
* cmd/signer: implement tests
* cmd/signer: made possible for UI to modify tx parameters
* cmd/signer: refactors, removed channels in ui comms, added UI-api via stdin/out
* cmd/signer: Made lowercase json-definitions, added UI-signer test functionality
* cmd/signer: update documentation
* cmd/signer: fix bugs, improve abi detection, abi argument display
* cmd/signer: minor change in json format
* cmd/signer: rework json communication
* cmd/signer: implement mixcase addresses in API, fix json id bug
* cmd/signer: rename fromaccount, update pythonpoc with new json encoding format
* cmd/signer: make use of new abi interface
* signer: documentation
* signer/main: remove redundant  option
* signer: implement audit logging
* signer: create package 'signer', minor changes
* common: add 0x-prefix to mixcaseaddress in json marshalling + validation
* signer, rules, storage: implement rules + ephemeral storage for signer rules
* signer: implement OnApprovedTx, change signing response (API BREAKAGE)
* signer: refactoring + documentation
* signer/rules: implement dispatching to next handler
* signer: docs
* signer/rules: hide json-conversion from users, ensure context is cleaned
* signer: docs
* signer: implement validation rules, change signature of call_info
* signer: fix log flaw with string pointer
* signer: implement custom 4byte databsae that saves submitted signatures
* signer/storage: implement aes-gcm-backed credential storage
* accounts: implement json unmarshalling of url
* signer: fix listresponse, fix gas->uint64
* node: make http/ipc start methods public
* signer: add ipc capability+review concerns
* accounts: correct docstring
* signer: address review concerns
* rpc: go fmt -s
* signer: review concerns+ baptize Clef
* signer,node: move Start-functions to separate file
* signer: formatting
											
										 
											2018-04-16 14:04:32 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-11-17 14:18:46 +02:00
										 |  |  | 	w.Header().Set("content-type", contentType) | 
					
						
							| 
									
										
										
										
											2019-02-04 13:47:34 +01:00
										 |  |  | 	codec := newHTTPServerConn(r, w) | 
					
						
							|  |  |  | 	defer codec.Close() | 
					
						
							|  |  |  | 	s.serveSingleRequest(ctx, codec) | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-11-17 14:18:46 +02:00
										 |  |  | // validateRequest returns a non-zero response code and error message if the | 
					
						
							|  |  |  | // request is invalid. | 
					
						
							|  |  |  | func validateRequest(r *http.Request) (int, error) { | 
					
						
							| 
									
										
										
										
											2017-12-12 21:12:32 +03:00
										 |  |  | 	if r.Method == http.MethodPut || r.Method == http.MethodDelete { | 
					
						
							| 
									
										
										
										
											2017-11-17 14:18:46 +02:00
										 |  |  | 		return http.StatusMethodNotAllowed, errors.New("method not allowed") | 
					
						
							| 
									
										
										
										
											2017-11-17 04:07:11 -08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-03-13 13:23:44 +02:00
										 |  |  | 	if r.ContentLength > maxRequestContentLength { | 
					
						
							|  |  |  | 		err := fmt.Errorf("content length too large (%d>%d)", r.ContentLength, maxRequestContentLength) | 
					
						
							| 
									
										
										
										
											2017-11-17 14:18:46 +02:00
										 |  |  | 		return http.StatusRequestEntityTooLarge, err | 
					
						
							| 
									
										
										
										
											2017-11-17 04:07:11 -08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-12-14 11:08:11 +01:00
										 |  |  | 	// Allow OPTIONS (regardless of content-type) | 
					
						
							|  |  |  | 	if r.Method == http.MethodOptions { | 
					
						
							|  |  |  | 		return 0, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// Check content-type | 
					
						
							|  |  |  | 	if mt, _, err := mime.ParseMediaType(r.Header.Get("content-type")); err == nil { | 
					
						
							|  |  |  | 		for _, accepted := range acceptedContentTypes { | 
					
						
							|  |  |  | 			if accepted == mt { | 
					
						
							|  |  |  | 				return 0, nil | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2017-11-17 04:07:11 -08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-12-14 11:08:11 +01:00
										 |  |  | 	// Invalid content-type | 
					
						
							|  |  |  | 	err := fmt.Errorf("invalid content type, only %s is supported", contentType) | 
					
						
							|  |  |  | 	return http.StatusUnsupportedMediaType, err | 
					
						
							| 
									
										
										
										
											2017-11-17 04:07:11 -08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-01-21 06:38:13 -08:00
										 |  |  | func newCorsHandler(srv http.Handler, allowedOrigins []string) http.Handler { | 
					
						
							| 
									
										
										
										
											2017-05-02 11:14:40 +02:00
										 |  |  | 	// disable CORS support if user has not specified a custom CORS configuration | 
					
						
							|  |  |  | 	if len(allowedOrigins) == 0 { | 
					
						
							|  |  |  | 		return srv | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | 	c := cors.New(cors.Options{ | 
					
						
							|  |  |  | 		AllowedOrigins: allowedOrigins, | 
					
						
							| 
									
										
										
										
											2017-12-12 21:12:32 +03:00
										 |  |  | 		AllowedMethods: []string{http.MethodPost, http.MethodGet}, | 
					
						
							| 
									
										
										
										
											2016-11-01 17:23:24 +08:00
										 |  |  | 		MaxAge:         600, | 
					
						
							| 
									
										
										
										
											2017-03-15 20:34:08 -07:00
										 |  |  | 		AllowedHeaders: []string{"*"}, | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2016-07-12 17:47:15 +02:00
										 |  |  | 	return c.Handler(srv) | 
					
						
							| 
									
										
										
										
											2016-02-24 11:19:00 +01:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2018-02-12 13:52:07 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | // virtualHostHandler is a handler which validates the Host-header of incoming requests. | 
					
						
							|  |  |  | // The virtualHostHandler can prevent DNS rebinding attacks, which do not utilize CORS-headers, | 
					
						
							|  |  |  | // since they do in-domain requests against the RPC api. Instead, we can see on the Host-header | 
					
						
							|  |  |  | // which domain was used, and validate that against a whitelist. | 
					
						
							|  |  |  | type virtualHostHandler struct { | 
					
						
							|  |  |  | 	vhosts map[string]struct{} | 
					
						
							|  |  |  | 	next   http.Handler | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // ServeHTTP serves JSON-RPC requests over HTTP, implements http.Handler | 
					
						
							|  |  |  | func (h *virtualHostHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { | 
					
						
							|  |  |  | 	// if r.Host is not set, we can continue serving since a browser would set the Host header | 
					
						
							|  |  |  | 	if r.Host == "" { | 
					
						
							|  |  |  | 		h.next.ServeHTTP(w, r) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	host, _, err := net.SplitHostPort(r.Host) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		// Either invalid (too many colons) or no port specified | 
					
						
							|  |  |  | 		host = r.Host | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if ipAddr := net.ParseIP(host); ipAddr != nil { | 
					
						
							|  |  |  | 		// It's an IP address, we can serve that | 
					
						
							|  |  |  | 		h.next.ServeHTTP(w, r) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	// Not an ip address, but a hostname. Need to validate | 
					
						
							|  |  |  | 	if _, exist := h.vhosts["*"]; exist { | 
					
						
							|  |  |  | 		h.next.ServeHTTP(w, r) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if _, exist := h.vhosts[host]; exist { | 
					
						
							|  |  |  | 		h.next.ServeHTTP(w, r) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	http.Error(w, "invalid host specified", http.StatusForbidden) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func newVHostHandler(vhosts []string, next http.Handler) http.Handler { | 
					
						
							|  |  |  | 	vhostMap := make(map[string]struct{}) | 
					
						
							|  |  |  | 	for _, allowedHost := range vhosts { | 
					
						
							|  |  |  | 		vhostMap[strings.ToLower(allowedHost)] = struct{}{} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return &virtualHostHandler{vhostMap, next} | 
					
						
							|  |  |  | } |