1// Copyright 2020 The go-ethereum Authors
2// This file is part of the go-ethereum library.
3//
4// The go-ethereum library is free software: you can redistribute it and/or modify
5// it under the terms of the GNU Lesser General Public License as published by
6// the Free Software Foundation, either version 3 of the License, or
7// (at your option) any later version.
8//
9// The go-ethereum library is distributed in the hope that it will be useful,
10// but WITHOUT ANY WARRANTY; without even the implied warranty of
11// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12// GNU Lesser General Public License for more details.
13//
14// You should have received a copy of the GNU Lesser General Public License
15// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
16
17package node
18
19import (
20	"compress/gzip"
21	"context"
22	"fmt"
23	"io"
24	"io/ioutil"
25	"net"
26	"net/http"
27	"sort"
28	"strings"
29	"sync"
30	"sync/atomic"
31
32	"github.com/ethereum/go-ethereum/log"
33	"github.com/ethereum/go-ethereum/rpc"
34	"github.com/rs/cors"
35)
36
37// httpConfig is the JSON-RPC/HTTP configuration.
38type httpConfig struct {
39	Modules            []string
40	CorsAllowedOrigins []string
41	Vhosts             []string
42	prefix             string // path prefix on which to mount http handler
43}
44
45// wsConfig is the JSON-RPC/Websocket configuration
46type wsConfig struct {
47	Origins []string
48	Modules []string
49	prefix  string // path prefix on which to mount ws handler
50}
51
52type rpcHandler struct {
53	http.Handler
54	server *rpc.Server
55}
56
57type httpServer struct {
58	log      log.Logger
59	timeouts rpc.HTTPTimeouts
60	mux      http.ServeMux // registered handlers go here
61
62	mu       sync.Mutex
63	server   *http.Server
64	listener net.Listener // non-nil when server is running
65
66	// HTTP RPC handler things.
67
68	httpConfig  httpConfig
69	httpHandler atomic.Value // *rpcHandler
70
71	// WebSocket handler things.
72	wsConfig  wsConfig
73	wsHandler atomic.Value // *rpcHandler
74
75	// These are set by setListenAddr.
76	endpoint string
77	host     string
78	port     int
79
80	handlerNames map[string]string
81}
82
83func newHTTPServer(log log.Logger, timeouts rpc.HTTPTimeouts) *httpServer {
84	h := &httpServer{log: log, timeouts: timeouts, handlerNames: make(map[string]string)}
85
86	h.httpHandler.Store((*rpcHandler)(nil))
87	h.wsHandler.Store((*rpcHandler)(nil))
88	return h
89}
90
91// setListenAddr configures the listening address of the server.
92// The address can only be set while the server isn't running.
93func (h *httpServer) setListenAddr(host string, port int) error {
94	h.mu.Lock()
95	defer h.mu.Unlock()
96
97	if h.listener != nil && (host != h.host || port != h.port) {
98		return fmt.Errorf("HTTP server already running on %s", h.endpoint)
99	}
100
101	h.host, h.port = host, port
102	h.endpoint = fmt.Sprintf("%s:%d", host, port)
103	return nil
104}
105
106// listenAddr returns the listening address of the server.
107func (h *httpServer) listenAddr() string {
108	h.mu.Lock()
109	defer h.mu.Unlock()
110
111	if h.listener != nil {
112		return h.listener.Addr().String()
113	}
114	return h.endpoint
115}
116
117// start starts the HTTP server if it is enabled and not already running.
118func (h *httpServer) start() error {
119	h.mu.Lock()
120	defer h.mu.Unlock()
121
122	if h.endpoint == "" || h.listener != nil {
123		return nil // already running or not configured
124	}
125
126	// Initialize the server.
127	h.server = &http.Server{Handler: h}
128	if h.timeouts != (rpc.HTTPTimeouts{}) {
129		CheckTimeouts(&h.timeouts)
130		h.server.ReadTimeout = h.timeouts.ReadTimeout
131		h.server.WriteTimeout = h.timeouts.WriteTimeout
132		h.server.IdleTimeout = h.timeouts.IdleTimeout
133	}
134
135	// Start the server.
136	listener, err := net.Listen("tcp", h.endpoint)
137	if err != nil {
138		// If the server fails to start, we need to clear out the RPC and WS
139		// configuration so they can be configured another time.
140		h.disableRPC()
141		h.disableWS()
142		return err
143	}
144	h.listener = listener
145	go h.server.Serve(listener)
146
147	if h.wsAllowed() {
148		url := fmt.Sprintf("ws://%v", listener.Addr())
149		if h.wsConfig.prefix != "" {
150			url += h.wsConfig.prefix
151		}
152		h.log.Info("WebSocket enabled", "url", url)
153	}
154	// if server is websocket only, return after logging
155	if !h.rpcAllowed() {
156		return nil
157	}
158	// Log http endpoint.
159	h.log.Info("HTTP server started",
160		"endpoint", listener.Addr(),
161		"prefix", h.httpConfig.prefix,
162		"cors", strings.Join(h.httpConfig.CorsAllowedOrigins, ","),
163		"vhosts", strings.Join(h.httpConfig.Vhosts, ","),
164	)
165
166	// Log all handlers mounted on server.
167	var paths []string
168	for path := range h.handlerNames {
169		paths = append(paths, path)
170	}
171	sort.Strings(paths)
172	logged := make(map[string]bool, len(paths))
173	for _, path := range paths {
174		name := h.handlerNames[path]
175		if !logged[name] {
176			log.Info(name+" enabled", "url", "http://"+listener.Addr().String()+path)
177			logged[name] = true
178		}
179	}
180	return nil
181}
182
183func (h *httpServer) ServeHTTP(w http.ResponseWriter, r *http.Request) {
184	// check if ws request and serve if ws enabled
185	ws := h.wsHandler.Load().(*rpcHandler)
186	if ws != nil && isWebsocket(r) {
187		if checkPath(r, h.wsConfig.prefix) {
188			ws.ServeHTTP(w, r)
189		}
190		return
191	}
192	// if http-rpc is enabled, try to serve request
193	rpc := h.httpHandler.Load().(*rpcHandler)
194	if rpc != nil {
195		// First try to route in the mux.
196		// Requests to a path below root are handled by the mux,
197		// which has all the handlers registered via Node.RegisterHandler.
198		// These are made available when RPC is enabled.
199		muxHandler, pattern := h.mux.Handler(r)
200		if pattern != "" {
201			muxHandler.ServeHTTP(w, r)
202			return
203		}
204
205		if checkPath(r, h.httpConfig.prefix) {
206			rpc.ServeHTTP(w, r)
207			return
208		}
209	}
210	w.WriteHeader(http.StatusNotFound)
211}
212
213// checkPath checks whether a given request URL matches a given path prefix.
214func checkPath(r *http.Request, path string) bool {
215	// if no prefix has been specified, request URL must be on root
216	if path == "" {
217		return r.URL.Path == "/"
218	}
219	// otherwise, check to make sure prefix matches
220	return len(r.URL.Path) >= len(path) && r.URL.Path[:len(path)] == path
221}
222
223// validatePrefix checks if 'path' is a valid configuration value for the RPC prefix option.
224func validatePrefix(what, path string) error {
225	if path == "" {
226		return nil
227	}
228	if path[0] != '/' {
229		return fmt.Errorf(`%s RPC path prefix %q does not contain leading "/"`, what, path)
230	}
231	if strings.ContainsAny(path, "?#") {
232		// This is just to avoid confusion. While these would match correctly (i.e. they'd
233		// match if URL-escaped into path), it's not easy to understand for users when
234		// setting that on the command line.
235		return fmt.Errorf("%s RPC path prefix %q contains URL meta-characters", what, path)
236	}
237	return nil
238}
239
240// stop shuts down the HTTP server.
241func (h *httpServer) stop() {
242	h.mu.Lock()
243	defer h.mu.Unlock()
244	h.doStop()
245}
246
247func (h *httpServer) doStop() {
248	if h.listener == nil {
249		return // not running
250	}
251
252	// Shut down the server.
253	httpHandler := h.httpHandler.Load().(*rpcHandler)
254	wsHandler := h.wsHandler.Load().(*rpcHandler)
255	if httpHandler != nil {
256		h.httpHandler.Store((*rpcHandler)(nil))
257		httpHandler.server.Stop()
258	}
259	if wsHandler != nil {
260		h.wsHandler.Store((*rpcHandler)(nil))
261		wsHandler.server.Stop()
262	}
263	h.server.Shutdown(context.Background())
264	h.listener.Close()
265	h.log.Info("HTTP server stopped", "endpoint", h.listener.Addr())
266
267	// Clear out everything to allow re-configuring it later.
268	h.host, h.port, h.endpoint = "", 0, ""
269	h.server, h.listener = nil, nil
270}
271
272// enableRPC turns on JSON-RPC over HTTP on the server.
273func (h *httpServer) enableRPC(apis []rpc.API, config httpConfig) error {
274	h.mu.Lock()
275	defer h.mu.Unlock()
276
277	if h.rpcAllowed() {
278		return fmt.Errorf("JSON-RPC over HTTP is already enabled")
279	}
280
281	// Create RPC server and handler.
282	srv := rpc.NewServer()
283	if err := RegisterApis(apis, config.Modules, srv, false); err != nil {
284		return err
285	}
286	h.httpConfig = config
287	h.httpHandler.Store(&rpcHandler{
288		Handler: NewHTTPHandlerStack(srv, config.CorsAllowedOrigins, config.Vhosts),
289		server:  srv,
290	})
291	return nil
292}
293
294// disableRPC stops the HTTP RPC handler. This is internal, the caller must hold h.mu.
295func (h *httpServer) disableRPC() bool {
296	handler := h.httpHandler.Load().(*rpcHandler)
297	if handler != nil {
298		h.httpHandler.Store((*rpcHandler)(nil))
299		handler.server.Stop()
300	}
301	return handler != nil
302}
303
304// enableWS turns on JSON-RPC over WebSocket on the server.
305func (h *httpServer) enableWS(apis []rpc.API, config wsConfig) error {
306	h.mu.Lock()
307	defer h.mu.Unlock()
308
309	if h.wsAllowed() {
310		return fmt.Errorf("JSON-RPC over WebSocket is already enabled")
311	}
312
313	// Create RPC server and handler.
314	srv := rpc.NewServer()
315	if err := RegisterApis(apis, config.Modules, srv, false); err != nil {
316		return err
317	}
318	h.wsConfig = config
319	h.wsHandler.Store(&rpcHandler{
320		Handler: srv.WebsocketHandler(config.Origins),
321		server:  srv,
322	})
323	return nil
324}
325
326// stopWS disables JSON-RPC over WebSocket and also stops the server if it only serves WebSocket.
327func (h *httpServer) stopWS() {
328	h.mu.Lock()
329	defer h.mu.Unlock()
330
331	if h.disableWS() {
332		if !h.rpcAllowed() {
333			h.doStop()
334		}
335	}
336}
337
338// disableWS disables the WebSocket handler. This is internal, the caller must hold h.mu.
339func (h *httpServer) disableWS() bool {
340	ws := h.wsHandler.Load().(*rpcHandler)
341	if ws != nil {
342		h.wsHandler.Store((*rpcHandler)(nil))
343		ws.server.Stop()
344	}
345	return ws != nil
346}
347
348// rpcAllowed returns true when JSON-RPC over HTTP is enabled.
349func (h *httpServer) rpcAllowed() bool {
350	return h.httpHandler.Load().(*rpcHandler) != nil
351}
352
353// wsAllowed returns true when JSON-RPC over WebSocket is enabled.
354func (h *httpServer) wsAllowed() bool {
355	return h.wsHandler.Load().(*rpcHandler) != nil
356}
357
358// isWebsocket checks the header of an http request for a websocket upgrade request.
359func isWebsocket(r *http.Request) bool {
360	return strings.ToLower(r.Header.Get("Upgrade")) == "websocket" &&
361		strings.Contains(strings.ToLower(r.Header.Get("Connection")), "upgrade")
362}
363
364// NewHTTPHandlerStack returns wrapped http-related handlers
365func NewHTTPHandlerStack(srv http.Handler, cors []string, vhosts []string) http.Handler {
366	// Wrap the CORS-handler within a host-handler
367	handler := newCorsHandler(srv, cors)
368	handler = newVHostHandler(vhosts, handler)
369	return newGzipHandler(handler)
370}
371
372func newCorsHandler(srv http.Handler, allowedOrigins []string) http.Handler {
373	// disable CORS support if user has not specified a custom CORS configuration
374	if len(allowedOrigins) == 0 {
375		return srv
376	}
377	c := cors.New(cors.Options{
378		AllowedOrigins: allowedOrigins,
379		AllowedMethods: []string{http.MethodPost, http.MethodGet},
380		AllowedHeaders: []string{"*"},
381		MaxAge:         600,
382	})
383	return c.Handler(srv)
384}
385
386// virtualHostHandler is a handler which validates the Host-header of incoming requests.
387// Using virtual hosts can help prevent DNS rebinding attacks, where a 'random' domain name points to
388// the service ip address (but without CORS headers). By verifying the targeted virtual host, we can
389// ensure that it's a destination that the node operator has defined.
390type virtualHostHandler struct {
391	vhosts map[string]struct{}
392	next   http.Handler
393}
394
395func newVHostHandler(vhosts []string, next http.Handler) http.Handler {
396	vhostMap := make(map[string]struct{})
397	for _, allowedHost := range vhosts {
398		vhostMap[strings.ToLower(allowedHost)] = struct{}{}
399	}
400	return &virtualHostHandler{vhostMap, next}
401}
402
403// ServeHTTP serves JSON-RPC requests over HTTP, implements http.Handler
404func (h *virtualHostHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
405	// if r.Host is not set, we can continue serving since a browser would set the Host header
406	if r.Host == "" {
407		h.next.ServeHTTP(w, r)
408		return
409	}
410	host, _, err := net.SplitHostPort(r.Host)
411	if err != nil {
412		// Either invalid (too many colons) or no port specified
413		host = r.Host
414	}
415	if ipAddr := net.ParseIP(host); ipAddr != nil {
416		// It's an IP address, we can serve that
417		h.next.ServeHTTP(w, r)
418		return
419
420	}
421	// Not an IP address, but a hostname. Need to validate
422	if _, exist := h.vhosts["*"]; exist {
423		h.next.ServeHTTP(w, r)
424		return
425	}
426	if _, exist := h.vhosts[host]; exist {
427		h.next.ServeHTTP(w, r)
428		return
429	}
430	http.Error(w, "invalid host specified", http.StatusForbidden)
431}
432
433var gzPool = sync.Pool{
434	New: func() interface{} {
435		w := gzip.NewWriter(ioutil.Discard)
436		return w
437	},
438}
439
440type gzipResponseWriter struct {
441	io.Writer
442	http.ResponseWriter
443}
444
445func (w *gzipResponseWriter) WriteHeader(status int) {
446	w.Header().Del("Content-Length")
447	w.ResponseWriter.WriteHeader(status)
448}
449
450func (w *gzipResponseWriter) Write(b []byte) (int, error) {
451	return w.Writer.Write(b)
452}
453
454func newGzipHandler(next http.Handler) http.Handler {
455	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
456		if !strings.Contains(r.Header.Get("Accept-Encoding"), "gzip") {
457			next.ServeHTTP(w, r)
458			return
459		}
460
461		w.Header().Set("Content-Encoding", "gzip")
462
463		gz := gzPool.Get().(*gzip.Writer)
464		defer gzPool.Put(gz)
465
466		gz.Reset(w)
467		defer gz.Close()
468
469		next.ServeHTTP(&gzipResponseWriter{ResponseWriter: w, Writer: gz}, r)
470	})
471}
472
473type ipcServer struct {
474	log      log.Logger
475	endpoint string
476
477	mu       sync.Mutex
478	listener net.Listener
479	srv      *rpc.Server
480}
481
482func newIPCServer(log log.Logger, endpoint string) *ipcServer {
483	return &ipcServer{log: log, endpoint: endpoint}
484}
485
486// Start starts the httpServer's http.Server
487func (is *ipcServer) start(apis []rpc.API) error {
488	is.mu.Lock()
489	defer is.mu.Unlock()
490
491	if is.listener != nil {
492		return nil // already running
493	}
494	listener, srv, err := rpc.StartIPCEndpoint(is.endpoint, apis)
495	if err != nil {
496		is.log.Warn("IPC opening failed", "url", is.endpoint, "error", err)
497		return err
498	}
499	is.log.Info("IPC endpoint opened", "url", is.endpoint)
500	is.listener, is.srv = listener, srv
501	return nil
502}
503
504func (is *ipcServer) stop() error {
505	is.mu.Lock()
506	defer is.mu.Unlock()
507
508	if is.listener == nil {
509		return nil // not running
510	}
511	err := is.listener.Close()
512	is.srv.Stop()
513	is.listener, is.srv = nil, nil
514	is.log.Info("IPC endpoint closed", "url", is.endpoint)
515	return err
516}
517
518// RegisterApis checks the given modules' availability, generates an allowlist based on the allowed modules,
519// and then registers all of the APIs exposed by the services.
520func RegisterApis(apis []rpc.API, modules []string, srv *rpc.Server, exposeAll bool) error {
521	if bad, available := checkModuleAvailability(modules, apis); len(bad) > 0 {
522		log.Error("Unavailable modules in HTTP API list", "unavailable", bad, "available", available)
523	}
524	// Generate the allow list based on the allowed modules
525	allowList := make(map[string]bool)
526	for _, module := range modules {
527		allowList[module] = true
528	}
529	// Register all the APIs exposed by the services
530	for _, api := range apis {
531		if exposeAll || allowList[api.Namespace] || (len(allowList) == 0 && api.Public) {
532			if err := srv.RegisterName(api.Namespace, api.Service); err != nil {
533				return err
534			}
535		}
536	}
537	return nil
538}
539