websocket.go 5.5 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
// Copyright 2015 The go-ethereum Authors
// This file is part of the go-ethereum library.
//
// The go-ethereum library is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// The go-ethereum library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.

package rpc

import (
20
	"context"
21
	"encoding/base64"
22 23
	"fmt"
	"net/http"
24
	"net/url"
25
	"os"
26
	"strings"
27
	"sync"
28

29
	mapset "github.com/deckarep/golang-set"
30
	"github.com/ethereum/go-ethereum/log"
31
	"github.com/gorilla/websocket"
32 33
)

34 35 36 37 38 39 40 41 42 43 44 45
const (
	wsReadBuffer  = 1024
	wsWriteBuffer = 1024
)

var wsBufferPool = new(sync.Pool)

// NewWSServer creates a new websocket RPC server around an API provider.
//
// Deprecated: use Server.WebsocketHandler
func NewWSServer(allowedOrigins []string, srv *Server) *http.Server {
	return &http.Server{Handler: srv.WebsocketHandler(allowedOrigins)}
46 47
}

48 49 50 51
// WebsocketHandler returns a handler that serves JSON-RPC to WebSocket connections.
//
// allowedOrigins should be a comma-separated list of allowed origin URLs.
// To allow connections with any origin, pass "*".
52
func (s *Server) WebsocketHandler(allowedOrigins []string) http.Handler {
53 54 55 56 57 58 59 60 61 62 63
	var upgrader = websocket.Upgrader{
		ReadBufferSize:  wsReadBuffer,
		WriteBufferSize: wsWriteBuffer,
		WriteBufferPool: wsBufferPool,
		CheckOrigin:     wsHandshakeValidator(allowedOrigins),
	}
	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
		conn, err := upgrader.Upgrade(w, r, nil)
		if err != nil {
			log.Debug("WebSocket upgrade failed", "err", err)
			return
64
		}
65
		codec := newWebsocketCodec(conn)
66
		s.ServeCodec(codec, 0)
67
	})
68 69 70 71 72
}

// wsHandshakeValidator returns a handler that verifies the origin during the
// websocket upgrade process. When a '*' is specified as an allowed origins all
// connections are accepted.
73
func wsHandshakeValidator(allowedOrigins []string) func(*http.Request) bool {
74
	origins := mapset.NewSet()
75 76 77 78 79 80 81
	allowAllOrigins := false

	for _, origin := range allowedOrigins {
		if origin == "*" {
			allowAllOrigins = true
		}
		if origin != "" {
82
			origins.Add(strings.ToLower(origin))
83 84
		}
	}
85
	// allow localhost if no allowedOrigins are specified.
86
	if len(origins.ToSlice()) == 0 {
87 88
		origins.Add("http://localhost")
		if hostname, err := os.Hostname(); err == nil {
89
			origins.Add("http://" + strings.ToLower(hostname))
90 91
		}
	}
92
	log.Debug(fmt.Sprintf("Allowed origin(s) for WS RPC interface %v", origins.ToSlice()))
93

94
	f := func(req *http.Request) bool {
95 96 97 98 99
		// Skip origin verification if no Origin header is present. The origin check
		// is supposed to protect against browser based attacks. Browsers always set
		// Origin. Non-browser software can put anything in origin and checking it doesn't
		// provide additional security.
		if _, ok := req.Header["Origin"]; !ok {
100
			return true
101
		}
102
		// Verify origin against whitelist.
103
		origin := strings.ToLower(req.Header.Get("Origin"))
104
		if allowAllOrigins || origins.Contains(origin) {
105
			return true
106
		}
107
		log.Warn("Rejected WebSocket connection", "origin", origin)
108
		return false
109 110 111 112 113
	}

	return f
}

114 115 116 117
type wsHandshakeError struct {
	err    error
	status string
}
118

119 120 121 122
func (e wsHandshakeError) Error() string {
	s := e.err.Error()
	if e.status != "" {
		s += " (HTTP status " + e.status + ")"
123
	}
124
	return s
125 126
}

127 128 129
// DialWebsocketWithDialer creates a new RPC client that communicates with a JSON-RPC server
// that is listening on the given endpoint using the provided dialer.
func DialWebsocketWithDialer(ctx context.Context, endpoint, origin string, dialer websocket.Dialer) (*Client, error) {
130
	endpoint, header, err := wsClientHeaders(endpoint, origin)
131 132 133
	if err != nil {
		return nil, err
	}
134
	return newClient(ctx, func(ctx context.Context) (ServerCodec, error) {
135
		conn, resp, err := dialer.DialContext(ctx, endpoint, header)
136
		if err != nil {
137 138 139 140 141
			hErr := wsHandshakeError{err: err}
			if resp != nil {
				hErr.status = resp.Status
			}
			return nil, hErr
142 143
		}
		return newWebsocketCodec(conn), nil
144
	})
145 146
}

147 148 149 150 151 152 153 154 155 156 157 158 159 160
// DialWebsocket creates a new RPC client that communicates with a JSON-RPC server
// that is listening on the given endpoint.
//
// The context is used for the initial connection establishment. It does not
// affect subsequent interactions with the client.
func DialWebsocket(ctx context.Context, endpoint, origin string) (*Client, error) {
	dialer := websocket.Dialer{
		ReadBufferSize:  wsReadBuffer,
		WriteBufferSize: wsWriteBuffer,
		WriteBufferPool: wsBufferPool,
	}
	return DialWebsocketWithDialer(ctx, endpoint, origin, dialer)
}

161 162
func wsClientHeaders(endpoint, origin string) (string, http.Header, error) {
	endpointURL, err := url.Parse(endpoint)
163
	if err != nil {
164
		return endpoint, nil, err
165
	}
166 167 168
	header := make(http.Header)
	if origin != "" {
		header.Add("origin", origin)
169
	}
170 171 172 173
	if endpointURL.User != nil {
		b64auth := base64.StdEncoding.EncodeToString([]byte(endpointURL.User.String()))
		header.Add("authorization", "Basic "+b64auth)
		endpointURL.User = nil
174
	}
175
	return endpointURL.String(), header, nil
176 177
}

178 179
func newWebsocketCodec(conn *websocket.Conn) ServerCodec {
	conn.SetReadLimit(maxRequestContentLength)
180
	return NewFuncCodec(conn, conn.WriteJSON, conn.ReadJSON)
181
}