config.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554
  1. // Copyright 2014 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package node
  17. import (
  18. "crypto/ecdsa"
  19. "fmt"
  20. "io/ioutil"
  21. "os"
  22. "path/filepath"
  23. "runtime"
  24. "strings"
  25. "sync"
  26. "github.com/ethereum/go-ethereum/accounts"
  27. "github.com/ethereum/go-ethereum/accounts/external"
  28. "github.com/ethereum/go-ethereum/accounts/keystore"
  29. "github.com/ethereum/go-ethereum/accounts/scwallet"
  30. "github.com/ethereum/go-ethereum/accounts/usbwallet"
  31. "github.com/ethereum/go-ethereum/common"
  32. "github.com/ethereum/go-ethereum/crypto"
  33. "github.com/ethereum/go-ethereum/log"
  34. "github.com/ethereum/go-ethereum/p2p"
  35. "github.com/ethereum/go-ethereum/p2p/enode"
  36. "github.com/ethereum/go-ethereum/rpc"
  37. )
  38. const (
  39. datadirPrivateKey = "nodekey" // Path within the datadir to the node's private key
  40. datadirDefaultKeyStore = "keystore" // Path within the datadir to the keystore
  41. datadirStaticNodes = "static-nodes.json" // Path within the datadir to the static node list
  42. datadirTrustedNodes = "trusted-nodes.json" // Path within the datadir to the trusted node list
  43. datadirNodeDatabase = "nodes" // Path within the datadir to store the node infos
  44. )
  45. // Config represents a small collection of configuration values to fine tune the
  46. // P2P network layer of a protocol stack. These values can be further extended by
  47. // all registered services.
  48. type Config struct {
  49. // Name sets the instance name of the node. It must not contain the / character and is
  50. // used in the devp2p node identifier. The instance name of geth is "geth". If no
  51. // value is specified, the basename of the current executable is used.
  52. Name string `toml:"-"`
  53. // UserIdent, if set, is used as an additional component in the devp2p node identifier.
  54. UserIdent string `toml:",omitempty"`
  55. // Version should be set to the version number of the program. It is used
  56. // in the devp2p node identifier.
  57. Version string `toml:"-"`
  58. // DataDir is the file system folder the node should use for any data storage
  59. // requirements. The configured data directory will not be directly shared with
  60. // registered services, instead those can use utility methods to create/access
  61. // databases or flat files. This enables ephemeral nodes which can fully reside
  62. // in memory.
  63. DataDir string
  64. // Configuration of peer-to-peer networking.
  65. P2P p2p.Config
  66. // KeyStoreDir is the file system folder that contains private keys. The directory can
  67. // be specified as a relative path, in which case it is resolved relative to the
  68. // current directory.
  69. //
  70. // If KeyStoreDir is empty, the default location is the "keystore" subdirectory of
  71. // DataDir. If DataDir is unspecified and KeyStoreDir is empty, an ephemeral directory
  72. // is created by New and destroyed when the node is stopped.
  73. KeyStoreDir string `toml:",omitempty"`
  74. // ExternalSigner specifies an external URI for a clef-type signer
  75. ExternalSigner string `toml:"omitempty"`
  76. // UseLightweightKDF lowers the memory and CPU requirements of the key store
  77. // scrypt KDF at the expense of security.
  78. UseLightweightKDF bool `toml:",omitempty"`
  79. // InsecureUnlockAllowed allows user to unlock accounts in unsafe http environment.
  80. InsecureUnlockAllowed bool `toml:",omitempty"`
  81. // NoUSB disables hardware wallet monitoring and connectivity.
  82. NoUSB bool `toml:",omitempty"`
  83. // SmartCardDaemonPath is the path to the smartcard daemon's socket
  84. SmartCardDaemonPath string `toml:",omitempty"`
  85. // IPCPath is the requested location to place the IPC endpoint. If the path is
  86. // a simple file name, it is placed inside the data directory (or on the root
  87. // pipe path on Windows), whereas if it's a resolvable path name (absolute or
  88. // relative), then that specific path is enforced. An empty path disables IPC.
  89. IPCPath string `toml:",omitempty"`
  90. // HTTPHost is the host interface on which to start the HTTP RPC server. If this
  91. // field is empty, no HTTP API endpoint will be started.
  92. HTTPHost string `toml:",omitempty"`
  93. // HTTPPort is the TCP port number on which to start the HTTP RPC server. The
  94. // default zero value is/ valid and will pick a port number randomly (useful
  95. // for ephemeral nodes).
  96. HTTPPort int `toml:",omitempty"`
  97. // HTTPCors is the Cross-Origin Resource Sharing header to send to requesting
  98. // clients. Please be aware that CORS is a browser enforced security, it's fully
  99. // useless for custom HTTP clients.
  100. HTTPCors []string `toml:",omitempty"`
  101. // HTTPVirtualHosts is the list of virtual hostnames which are allowed on incoming requests.
  102. // This is by default {'localhost'}. Using this prevents attacks like
  103. // DNS rebinding, which bypasses SOP by simply masquerading as being within the same
  104. // origin. These attacks do not utilize CORS, since they are not cross-domain.
  105. // By explicitly checking the Host-header, the server will not allow requests
  106. // made against the server with a malicious host domain.
  107. // Requests using ip address directly are not affected
  108. HTTPVirtualHosts []string `toml:",omitempty"`
  109. // HTTPModules is a list of API modules to expose via the HTTP RPC interface.
  110. // If the module list is empty, all RPC API endpoints designated public will be
  111. // exposed.
  112. HTTPModules []string `toml:",omitempty"`
  113. // HTTPTimeouts allows for customization of the timeout values used by the HTTP RPC
  114. // interface.
  115. HTTPTimeouts rpc.HTTPTimeouts
  116. // WSHost is the host interface on which to start the websocket RPC server. If
  117. // this field is empty, no websocket API endpoint will be started.
  118. WSHost string `toml:",omitempty"`
  119. // WSPort is the TCP port number on which to start the websocket RPC server. The
  120. // default zero value is/ valid and will pick a port number randomly (useful for
  121. // ephemeral nodes).
  122. WSPort int `toml:",omitempty"`
  123. // WSOrigins is the list of domain to accept websocket requests from. Please be
  124. // aware that the server can only act upon the HTTP request the client sends and
  125. // cannot verify the validity of the request header.
  126. WSOrigins []string `toml:",omitempty"`
  127. // WSModules is a list of API modules to expose via the websocket RPC interface.
  128. // If the module list is empty, all RPC API endpoints designated public will be
  129. // exposed.
  130. WSModules []string `toml:",omitempty"`
  131. // WSExposeAll exposes all API modules via the WebSocket RPC interface rather
  132. // than just the public ones.
  133. //
  134. // *WARNING* Only set this if the node is running in a trusted network, exposing
  135. // private APIs to untrusted users is a major security risk.
  136. WSExposeAll bool `toml:",omitempty"`
  137. // GraphQLHost is the host interface on which to start the GraphQL server. If this
  138. // field is empty, no GraphQL API endpoint will be started.
  139. GraphQLHost string `toml:",omitempty"`
  140. // GraphQLPort is the TCP port number on which to start the GraphQL server. The
  141. // default zero value is/ valid and will pick a port number randomly (useful
  142. // for ephemeral nodes).
  143. GraphQLPort int `toml:",omitempty"`
  144. // GraphQLCors is the Cross-Origin Resource Sharing header to send to requesting
  145. // clients. Please be aware that CORS is a browser enforced security, it's fully
  146. // useless for custom HTTP clients.
  147. GraphQLCors []string `toml:",omitempty"`
  148. // GraphQLVirtualHosts is the list of virtual hostnames which are allowed on incoming requests.
  149. // This is by default {'localhost'}. Using this prevents attacks like
  150. // DNS rebinding, which bypasses SOP by simply masquerading as being within the same
  151. // origin. These attacks do not utilize CORS, since they are not cross-domain.
  152. // By explicitly checking the Host-header, the server will not allow requests
  153. // made against the server with a malicious host domain.
  154. // Requests using ip address directly are not affected
  155. GraphQLVirtualHosts []string `toml:",omitempty"`
  156. // Logger is a custom logger to use with the p2p.Server.
  157. Logger log.Logger `toml:",omitempty"`
  158. LogConfig *LogConfig `toml:",omitempty"`
  159. staticNodesWarning bool
  160. trustedNodesWarning bool
  161. oldGethResourceWarning bool
  162. }
  163. // IPCEndpoint resolves an IPC endpoint based on a configured value, taking into
  164. // account the set data folders as well as the designated platform we're currently
  165. // running on.
  166. func (c *Config) IPCEndpoint() string {
  167. // Short circuit if IPC has not been enabled
  168. if c.IPCPath == "" {
  169. return ""
  170. }
  171. // On windows we can only use plain top-level pipes
  172. if runtime.GOOS == "windows" {
  173. if strings.HasPrefix(c.IPCPath, `\\.\pipe\`) {
  174. return c.IPCPath
  175. }
  176. return `\\.\pipe\` + c.IPCPath
  177. }
  178. // Resolve names into the data directory full paths otherwise
  179. if filepath.Base(c.IPCPath) == c.IPCPath {
  180. if c.DataDir == "" {
  181. return filepath.Join(os.TempDir(), c.IPCPath)
  182. }
  183. return filepath.Join(c.DataDir, c.IPCPath)
  184. }
  185. return c.IPCPath
  186. }
  187. // NodeDB returns the path to the discovery node database.
  188. func (c *Config) NodeDB() string {
  189. if c.DataDir == "" {
  190. return "" // ephemeral
  191. }
  192. return c.ResolvePath(datadirNodeDatabase)
  193. }
  194. // DefaultIPCEndpoint returns the IPC path used by default.
  195. func DefaultIPCEndpoint(clientIdentifier string) string {
  196. if clientIdentifier == "" {
  197. clientIdentifier = strings.TrimSuffix(filepath.Base(os.Args[0]), ".exe")
  198. if clientIdentifier == "" {
  199. panic("empty executable name")
  200. }
  201. }
  202. config := &Config{DataDir: DefaultDataDir(), IPCPath: clientIdentifier + ".ipc"}
  203. return config.IPCEndpoint()
  204. }
  205. // HTTPEndpoint resolves an HTTP endpoint based on the configured host interface
  206. // and port parameters.
  207. func (c *Config) HTTPEndpoint() string {
  208. if c.HTTPHost == "" {
  209. return ""
  210. }
  211. return fmt.Sprintf("%s:%d", c.HTTPHost, c.HTTPPort)
  212. }
  213. // GraphQLEndpoint resolves a GraphQL endpoint based on the configured host interface
  214. // and port parameters.
  215. func (c *Config) GraphQLEndpoint() string {
  216. if c.GraphQLHost == "" {
  217. return ""
  218. }
  219. return fmt.Sprintf("%s:%d", c.GraphQLHost, c.GraphQLPort)
  220. }
  221. // DefaultHTTPEndpoint returns the HTTP endpoint used by default.
  222. func DefaultHTTPEndpoint() string {
  223. config := &Config{HTTPHost: DefaultHTTPHost, HTTPPort: DefaultHTTPPort}
  224. return config.HTTPEndpoint()
  225. }
  226. // WSEndpoint resolves a websocket endpoint based on the configured host interface
  227. // and port parameters.
  228. func (c *Config) WSEndpoint() string {
  229. if c.WSHost == "" {
  230. return ""
  231. }
  232. return fmt.Sprintf("%s:%d", c.WSHost, c.WSPort)
  233. }
  234. // DefaultWSEndpoint returns the websocket endpoint used by default.
  235. func DefaultWSEndpoint() string {
  236. config := &Config{WSHost: DefaultWSHost, WSPort: DefaultWSPort}
  237. return config.WSEndpoint()
  238. }
  239. // ExtRPCEnabled returns the indicator whether node enables the external
  240. // RPC(http, ws or graphql).
  241. func (c *Config) ExtRPCEnabled() bool {
  242. return c.HTTPHost != "" || c.WSHost != "" || c.GraphQLHost != ""
  243. }
  244. // NodeName returns the devp2p node identifier.
  245. func (c *Config) NodeName() string {
  246. name := c.name()
  247. // Backwards compatibility: previous versions used title-cased "Geth", keep that.
  248. if name == "geth" || name == "geth-testnet" {
  249. name = "Geth"
  250. }
  251. if c.UserIdent != "" {
  252. name += "/" + c.UserIdent
  253. }
  254. if c.Version != "" {
  255. name += "/v" + c.Version
  256. }
  257. name += "/" + runtime.GOOS + "-" + runtime.GOARCH
  258. name += "/" + runtime.Version()
  259. return name
  260. }
  261. func (c *Config) name() string {
  262. if c.Name == "" {
  263. progname := strings.TrimSuffix(filepath.Base(os.Args[0]), ".exe")
  264. if progname == "" {
  265. panic("empty executable name, set Config.Name")
  266. }
  267. return progname
  268. }
  269. return c.Name
  270. }
  271. // These resources are resolved differently for "geth" instances.
  272. var isOldGethResource = map[string]bool{
  273. "chaindata": true,
  274. "nodes": true,
  275. "nodekey": true,
  276. "static-nodes.json": false, // no warning for these because they have their
  277. "trusted-nodes.json": false, // own separate warning.
  278. }
  279. // ResolvePath resolves path in the instance directory.
  280. func (c *Config) ResolvePath(path string) string {
  281. if filepath.IsAbs(path) {
  282. return path
  283. }
  284. if c.DataDir == "" {
  285. return ""
  286. }
  287. // Backwards-compatibility: ensure that data directory files created
  288. // by geth 1.4 are used if they exist.
  289. if warn, isOld := isOldGethResource[path]; isOld {
  290. oldpath := ""
  291. if c.name() == "geth" {
  292. oldpath = filepath.Join(c.DataDir, path)
  293. }
  294. if oldpath != "" && common.FileExist(oldpath) {
  295. if warn {
  296. c.warnOnce(&c.oldGethResourceWarning, "Using deprecated resource file %s, please move this file to the 'geth' subdirectory of datadir.", oldpath)
  297. }
  298. return oldpath
  299. }
  300. }
  301. return filepath.Join(c.instanceDir(), path)
  302. }
  303. func (c *Config) instanceDir() string {
  304. if c.DataDir == "" {
  305. return ""
  306. }
  307. return filepath.Join(c.DataDir, c.name())
  308. }
  309. // NodeKey retrieves the currently configured private key of the node, checking
  310. // first any manually set key, falling back to the one found in the configured
  311. // data folder. If no key can be found, a new one is generated.
  312. func (c *Config) NodeKey() *ecdsa.PrivateKey {
  313. // Use any specifically configured key.
  314. if c.P2P.PrivateKey != nil {
  315. return c.P2P.PrivateKey
  316. }
  317. // Generate ephemeral key if no datadir is being used.
  318. if c.DataDir == "" {
  319. key, err := crypto.GenerateKey()
  320. if err != nil {
  321. log.Crit(fmt.Sprintf("Failed to generate ephemeral node key: %v", err))
  322. }
  323. return key
  324. }
  325. keyfile := c.ResolvePath(datadirPrivateKey)
  326. if key, err := crypto.LoadECDSA(keyfile); err == nil {
  327. return key
  328. }
  329. // No persistent key found, generate and store a new one.
  330. key, err := crypto.GenerateKey()
  331. if err != nil {
  332. log.Crit(fmt.Sprintf("Failed to generate node key: %v", err))
  333. }
  334. instanceDir := filepath.Join(c.DataDir, c.name())
  335. if err := os.MkdirAll(instanceDir, 0700); err != nil {
  336. log.Error(fmt.Sprintf("Failed to persist node key: %v", err))
  337. return key
  338. }
  339. keyfile = filepath.Join(instanceDir, datadirPrivateKey)
  340. if err := crypto.SaveECDSA(keyfile, key); err != nil {
  341. log.Error(fmt.Sprintf("Failed to persist node key: %v", err))
  342. }
  343. return key
  344. }
  345. // StaticNodes returns a list of node enode URLs configured as static nodes.
  346. func (c *Config) StaticNodes() []*enode.Node {
  347. return c.parsePersistentNodes(&c.staticNodesWarning, c.ResolvePath(datadirStaticNodes))
  348. }
  349. // TrustedNodes returns a list of node enode URLs configured as trusted nodes.
  350. func (c *Config) TrustedNodes() []*enode.Node {
  351. return c.parsePersistentNodes(&c.trustedNodesWarning, c.ResolvePath(datadirTrustedNodes))
  352. }
  353. // parsePersistentNodes parses a list of discovery node URLs loaded from a .json
  354. // file from within the data directory.
  355. func (c *Config) parsePersistentNodes(w *bool, path string) []*enode.Node {
  356. // Short circuit if no node config is present
  357. if c.DataDir == "" {
  358. return nil
  359. }
  360. if _, err := os.Stat(path); err != nil {
  361. return nil
  362. }
  363. c.warnOnce(w, "Found deprecated node list file %s, please use the TOML config file instead.", path)
  364. // Load the nodes from the config file.
  365. var nodelist []string
  366. if err := common.LoadJSON(path, &nodelist); err != nil {
  367. log.Error(fmt.Sprintf("Can't load node list file: %v", err))
  368. return nil
  369. }
  370. // Interpret the list as a discovery node array
  371. var nodes []*enode.Node
  372. for _, url := range nodelist {
  373. if url == "" {
  374. continue
  375. }
  376. node, err := enode.Parse(enode.ValidSchemes, url)
  377. if err != nil {
  378. log.Error(fmt.Sprintf("Node URL %s: %v\n", url, err))
  379. continue
  380. }
  381. nodes = append(nodes, node)
  382. }
  383. return nodes
  384. }
  385. // AccountConfig determines the settings for scrypt and keydirectory
  386. func (c *Config) AccountConfig() (int, int, string, error) {
  387. scryptN := keystore.StandardScryptN
  388. scryptP := keystore.StandardScryptP
  389. if c.UseLightweightKDF {
  390. scryptN = keystore.LightScryptN
  391. scryptP = keystore.LightScryptP
  392. }
  393. var (
  394. keydir string
  395. err error
  396. )
  397. switch {
  398. case filepath.IsAbs(c.KeyStoreDir):
  399. keydir = c.KeyStoreDir
  400. case c.DataDir != "":
  401. if c.KeyStoreDir == "" {
  402. keydir = filepath.Join(c.DataDir, datadirDefaultKeyStore)
  403. } else {
  404. keydir, err = filepath.Abs(c.KeyStoreDir)
  405. }
  406. case c.KeyStoreDir != "":
  407. keydir, err = filepath.Abs(c.KeyStoreDir)
  408. }
  409. return scryptN, scryptP, keydir, err
  410. }
  411. func makeAccountManager(conf *Config) (*accounts.Manager, string, error) {
  412. scryptN, scryptP, keydir, err := conf.AccountConfig()
  413. var ephemeral string
  414. if keydir == "" {
  415. // There is no datadir.
  416. keydir, err = ioutil.TempDir("", "go-ethereum-keystore")
  417. ephemeral = keydir
  418. }
  419. if err != nil {
  420. return nil, "", err
  421. }
  422. if err := os.MkdirAll(keydir, 0700); err != nil {
  423. return nil, "", err
  424. }
  425. // Assemble the account manager and supported backends
  426. var backends []accounts.Backend
  427. if len(conf.ExternalSigner) > 0 {
  428. log.Info("Using external signer", "url", conf.ExternalSigner)
  429. if extapi, err := external.NewExternalBackend(conf.ExternalSigner); err == nil {
  430. backends = append(backends, extapi)
  431. } else {
  432. return nil, "", fmt.Errorf("error connecting to external signer: %v", err)
  433. }
  434. }
  435. if len(backends) == 0 {
  436. // For now, we're using EITHER external signer OR local signers.
  437. // If/when we implement some form of lockfile for USB and keystore wallets,
  438. // we can have both, but it's very confusing for the user to see the same
  439. // accounts in both externally and locally, plus very racey.
  440. backends = append(backends, keystore.NewKeyStore(keydir, scryptN, scryptP))
  441. if !conf.NoUSB {
  442. // Start a USB hub for Ledger hardware wallets
  443. if ledgerhub, err := usbwallet.NewLedgerHub(); err != nil {
  444. log.Warn(fmt.Sprintf("Failed to start Ledger hub, disabling: %v", err))
  445. } else {
  446. backends = append(backends, ledgerhub)
  447. }
  448. // Start a USB hub for Trezor hardware wallets (HID version)
  449. if trezorhub, err := usbwallet.NewTrezorHubWithHID(); err != nil {
  450. log.Warn(fmt.Sprintf("Failed to start HID Trezor hub, disabling: %v", err))
  451. } else {
  452. backends = append(backends, trezorhub)
  453. }
  454. // Start a USB hub for Trezor hardware wallets (WebUSB version)
  455. if trezorhub, err := usbwallet.NewTrezorHubWithWebUSB(); err != nil {
  456. log.Warn(fmt.Sprintf("Failed to start WebUSB Trezor hub, disabling: %v", err))
  457. } else {
  458. backends = append(backends, trezorhub)
  459. }
  460. }
  461. if len(conf.SmartCardDaemonPath) > 0 {
  462. // Start a smart card hub
  463. if schub, err := scwallet.NewHub(conf.SmartCardDaemonPath, scwallet.Scheme, keydir); err != nil {
  464. log.Warn(fmt.Sprintf("Failed to start smart card hub, disabling: %v", err))
  465. } else {
  466. backends = append(backends, schub)
  467. }
  468. }
  469. }
  470. return accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: conf.InsecureUnlockAllowed}, backends...), ephemeral, nil
  471. }
  472. var warnLock sync.Mutex
  473. func (c *Config) warnOnce(w *bool, format string, args ...interface{}) {
  474. warnLock.Lock()
  475. defer warnLock.Unlock()
  476. if *w {
  477. return
  478. }
  479. l := c.Logger
  480. if l == nil {
  481. l = log.Root()
  482. }
  483. l.Warn(fmt.Sprintf(format, args...))
  484. *w = true
  485. }
  486. type LogConfig struct {
  487. FileRoot string
  488. FilePath string
  489. MaxBytesSize uint
  490. Level string
  491. }