websocket.go 4.96 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
// Copyright 2015 The go-ethereum Authors
// This file is part of the go-ethereum library.
//
// The go-ethereum library is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// The go-ethereum library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.

package rpc

import (
20
	"context"
21
	"crypto/tls"
22
	"fmt"
23
	"net"
24
	"net/http"
25
	"net/url"
26
	"os"
27
	"strings"
28
	"time"
29

30
	"github.com/ethereum/go-ethereum/log"
31 32 33 34
	"golang.org/x/net/websocket"
	"gopkg.in/fatih/set.v0"
)

35 36 37 38
// WebsocketHandler returns a handler that serves JSON-RPC to WebSocket connections.
//
// allowedOrigins should be a comma-separated list of allowed origin URLs.
// To allow connections with any origin, pass "*".
39
func (srv *Server) WebsocketHandler(allowedOrigins []string) http.Handler {
40
	return websocket.Server{
41
		Handshake: wsHandshakeValidator(allowedOrigins),
42 43 44 45
		Handler: func(conn *websocket.Conn) {
			srv.ServeCodec(NewJSONCodec(conn), OptionMethodInvocation|OptionSubscriptions)
		},
	}
46 47
}

48 49 50
// NewWSServer creates a new websocket RPC server around an API provider.
//
// Deprecated: use Server.WebsocketHandler
51
func NewWSServer(allowedOrigins []string, srv *Server) *http.Server {
52
	return &http.Server{Handler: srv.WebsocketHandler(allowedOrigins)}
53 54 55 56 57 58 59 60 61 62 63 64 65 66
}

// wsHandshakeValidator returns a handler that verifies the origin during the
// websocket upgrade process. When a '*' is specified as an allowed origins all
// connections are accepted.
func wsHandshakeValidator(allowedOrigins []string) func(*websocket.Config, *http.Request) error {
	origins := set.New()
	allowAllOrigins := false

	for _, origin := range allowedOrigins {
		if origin == "*" {
			allowAllOrigins = true
		}
		if origin != "" {
67
			origins.Add(strings.ToLower(origin))
68 69 70
		}
	}

71
	// allow localhost if no allowedOrigins are specified.
72 73 74
	if len(origins.List()) == 0 {
		origins.Add("http://localhost")
		if hostname, err := os.Hostname(); err == nil {
75
			origins.Add("http://" + strings.ToLower(hostname))
76 77 78
		}
	}

79
	log.Debug(fmt.Sprintf("Allowed origin(s) for WS RPC interface %v\n", origins.List()))
80 81

	f := func(cfg *websocket.Config, req *http.Request) error {
82
		origin := strings.ToLower(req.Header.Get("Origin"))
83 84 85
		if allowAllOrigins || origins.Has(origin) {
			return nil
		}
86
		log.Debug(fmt.Sprintf("origin '%s' not allowed on WS-RPC interface\n", origin))
87 88 89 90 91 92
		return fmt.Errorf("origin %s not allowed", origin)
	}

	return f
}

93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112
// DialWebsocket creates a new RPC client that communicates with a JSON-RPC server
// that is listening on the given endpoint.
//
// The context is used for the initial connection establishment. It does not
// affect subsequent interactions with the client.
func DialWebsocket(ctx context.Context, endpoint, origin string) (*Client, error) {
	if origin == "" {
		var err error
		if origin, err = os.Hostname(); err != nil {
			return nil, err
		}
		if strings.HasPrefix(endpoint, "wss") {
			origin = "https://" + strings.ToLower(origin)
		} else {
			origin = "http://" + strings.ToLower(origin)
		}
	}
	config, err := websocket.NewConfig(endpoint, origin)
	if err != nil {
		return nil, err
113 114
	}

115 116 117
	return newClient(ctx, func(ctx context.Context) (net.Conn, error) {
		return wsDialContext(ctx, config)
	})
118 119
}

120 121 122 123 124 125 126 127 128 129 130
func wsDialContext(ctx context.Context, config *websocket.Config) (*websocket.Conn, error) {
	var conn net.Conn
	var err error
	switch config.Location.Scheme {
	case "ws":
		conn, err = dialContext(ctx, "tcp", wsDialAddress(config.Location))
	case "wss":
		dialer := contextDialer(ctx)
		conn, err = tls.DialWithDialer(dialer, "tcp", wsDialAddress(config.Location), config.TlsConfig)
	default:
		err = websocket.ErrBadScheme
131 132 133 134
	}
	if err != nil {
		return nil, err
	}
135 136 137 138
	ws, err := websocket.NewClient(config, conn)
	if err != nil {
		conn.Close()
		return nil, err
139
	}
140
	return ws, err
141 142
}

143
var wsPortMap = map[string]string{"ws": "80", "wss": "443"}
144

145 146 147 148
func wsDialAddress(location *url.URL) string {
	if _, ok := wsPortMap[location.Scheme]; ok {
		if _, _, err := net.SplitHostPort(location.Host); err != nil {
			return net.JoinHostPort(location.Host, wsPortMap[location.Scheme])
149 150
		}
	}
151
	return location.Host
152
}
153 154 155 156 157 158 159 160 161 162 163 164 165 166 167

func dialContext(ctx context.Context, network, addr string) (net.Conn, error) {
	d := &net.Dialer{KeepAlive: tcpKeepAliveInterval}
	return d.DialContext(ctx, network, addr)
}

func contextDialer(ctx context.Context) *net.Dialer {
	dialer := &net.Dialer{Cancel: ctx.Done(), KeepAlive: tcpKeepAliveInterval}
	if deadline, ok := ctx.Deadline(); ok {
		dialer.Deadline = deadline
	} else {
		dialer.Deadline = time.Now().Add(defaultDialTimeout)
	}
	return dialer
}