config.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554
  1. // Copyright 2014 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package node
  17. import (
  18. "crypto/ecdsa"
  19. "fmt"
  20. "io/ioutil"
  21. "os"
  22. "path/filepath"
  23. "runtime"
  24. "strings"
  25. "sync"
  26. "github.com/ethereum/go-ethereum/accounts"
  27. "github.com/ethereum/go-ethereum/accounts/external"
  28. "github.com/ethereum/go-ethereum/accounts/keystore"
  29. "github.com/ethereum/go-ethereum/accounts/scwallet"
  30. "github.com/ethereum/go-ethereum/accounts/usbwallet"
  31. "github.com/ethereum/go-ethereum/common"
  32. "github.com/ethereum/go-ethereum/crypto"
  33. "github.com/ethereum/go-ethereum/log"
  34. "github.com/ethereum/go-ethereum/p2p"
  35. "github.com/ethereum/go-ethereum/p2p/enode"
  36. "github.com/ethereum/go-ethereum/rpc"
  37. )
  38. const (
  39. datadirPrivateKey = "nodekey" // Path within the datadir to the node's private key
  40. datadirDefaultKeyStore = "keystore" // Path within the datadir to the keystore
  41. datadirStaticNodes = "static-nodes.json" // Path within the datadir to the static node list
  42. datadirTrustedNodes = "trusted-nodes.json" // Path within the datadir to the trusted node list
  43. datadirNodeDatabase = "nodes" // Path within the datadir to store the node infos
  44. )
  45. // Config represents a small collection of configuration values to fine tune the
  46. // P2P network layer of a protocol stack. These values can be further extended by
  47. // all registered services.
  48. type Config struct {
  49. // Name sets the instance name of the node. It must not contain the / character and is
  50. // used in the devp2p node identifier. The instance name of geth is "geth". If no
  51. // value is specified, the basename of the current executable is used.
  52. Name string `toml:"-"`
  53. // UserIdent, if set, is used as an additional component in the devp2p node identifier.
  54. UserIdent string `toml:",omitempty"`
  55. // Version should be set to the version number of the program. It is used
  56. // in the devp2p node identifier.
  57. Version string `toml:"-"`
  58. // DataDir is the file system folder the node should use for any data storage
  59. // requirements. The configured data directory will not be directly shared with
  60. // registered services, instead those can use utility methods to create/access
  61. // databases or flat files. This enables ephemeral nodes which can fully reside
  62. // in memory.
  63. DataDir string
  64. // Configuration of peer-to-peer networking.
  65. P2P p2p.Config
  66. // KeyStoreDir is the file system folder that contains private keys. The directory can
  67. // be specified as a relative path, in which case it is resolved relative to the
  68. // current directory.
  69. //
  70. // If KeyStoreDir is empty, the default location is the "keystore" subdirectory of
  71. // DataDir. If DataDir is unspecified and KeyStoreDir is empty, an ephemeral directory
  72. // is created by New and destroyed when the node is stopped.
  73. KeyStoreDir string `toml:",omitempty"`
  74. // ExternalSigner specifies an external URI for a clef-type signer
  75. ExternalSigner string `toml:",omitempty"`
  76. // UseLightweightKDF lowers the memory and CPU requirements of the key store
  77. // scrypt KDF at the expense of security.
  78. UseLightweightKDF bool `toml:",omitempty"`
  79. // InsecureUnlockAllowed allows user to unlock accounts in unsafe http environment.
  80. InsecureUnlockAllowed bool `toml:",omitempty"`
  81. // NoUSB disables hardware wallet monitoring and connectivity.
  82. NoUSB bool `toml:",omitempty"`
  83. // DirectBroadcast enable directly broadcast mined block to all peers
  84. DirectBroadcast bool `toml:",omitempty"`
  85. // RangeLimit enable 5000 blocks limit when handle range query
  86. RangeLimit bool `toml:",omitempty"`
  87. // USB enables hardware wallet monitoring and connectivity.
  88. USB bool `toml:",omitempty"`
  89. // SmartCardDaemonPath is the path to the smartcard daemon's socket
  90. SmartCardDaemonPath string `toml:",omitempty"`
  91. // IPCPath is the requested location to place the IPC endpoint. If the path is
  92. // a simple file name, it is placed inside the data directory (or on the root
  93. // pipe path on Windows), whereas if it's a resolvable path name (absolute or
  94. // relative), then that specific path is enforced. An empty path disables IPC.
  95. IPCPath string
  96. // HTTPHost is the host interface on which to start the HTTP RPC server. If this
  97. // field is empty, no HTTP API endpoint will be started.
  98. HTTPHost string
  99. // HTTPPort is the TCP port number on which to start the HTTP RPC server. The
  100. // default zero value is/ valid and will pick a port number randomly (useful
  101. // for ephemeral nodes).
  102. HTTPPort int `toml:",omitempty"`
  103. // HTTPCors is the Cross-Origin Resource Sharing header to send to requesting
  104. // clients. Please be aware that CORS is a browser enforced security, it's fully
  105. // useless for custom HTTP clients.
  106. HTTPCors []string `toml:",omitempty"`
  107. // HTTPVirtualHosts is the list of virtual hostnames which are allowed on incoming requests.
  108. // This is by default {'localhost'}. Using this prevents attacks like
  109. // DNS rebinding, which bypasses SOP by simply masquerading as being within the same
  110. // origin. These attacks do not utilize CORS, since they are not cross-domain.
  111. // By explicitly checking the Host-header, the server will not allow requests
  112. // made against the server with a malicious host domain.
  113. // Requests using ip address directly are not affected
  114. HTTPVirtualHosts []string `toml:",omitempty"`
  115. // HTTPModules is a list of API modules to expose via the HTTP RPC interface.
  116. // If the module list is empty, all RPC API endpoints designated public will be
  117. // exposed.
  118. HTTPModules []string
  119. // HTTPTimeouts allows for customization of the timeout values used by the HTTP RPC
  120. // interface.
  121. HTTPTimeouts rpc.HTTPTimeouts
  122. // HTTPPathPrefix specifies a path prefix on which http-rpc is to be served.
  123. HTTPPathPrefix string `toml:",omitempty"`
  124. // WSHost is the host interface on which to start the websocket RPC server. If
  125. // this field is empty, no websocket API endpoint will be started.
  126. WSHost string
  127. // WSPort is the TCP port number on which to start the websocket RPC server. The
  128. // default zero value is/ valid and will pick a port number randomly (useful for
  129. // ephemeral nodes).
  130. WSPort int `toml:",omitempty"`
  131. // WSPathPrefix specifies a path prefix on which ws-rpc is to be served.
  132. WSPathPrefix string `toml:",omitempty"`
  133. // WSOrigins is the list of domain to accept websocket requests from. Please be
  134. // aware that the server can only act upon the HTTP request the client sends and
  135. // cannot verify the validity of the request header.
  136. WSOrigins []string `toml:",omitempty"`
  137. // WSModules is a list of API modules to expose via the websocket RPC interface.
  138. // If the module list is empty, all RPC API endpoints designated public will be
  139. // exposed.
  140. WSModules []string
  141. // WSExposeAll exposes all API modules via the WebSocket RPC interface rather
  142. // than just the public ones.
  143. //
  144. // *WARNING* Only set this if the node is running in a trusted network, exposing
  145. // private APIs to untrusted users is a major security risk.
  146. WSExposeAll bool `toml:",omitempty"`
  147. // GraphQLCors is the Cross-Origin Resource Sharing header to send to requesting
  148. // clients. Please be aware that CORS is a browser enforced security, it's fully
  149. // useless for custom HTTP clients.
  150. GraphQLCors []string `toml:",omitempty"`
  151. // GraphQLVirtualHosts is the list of virtual hostnames which are allowed on incoming requests.
  152. // This is by default {'localhost'}. Using this prevents attacks like
  153. // DNS rebinding, which bypasses SOP by simply masquerading as being within the same
  154. // origin. These attacks do not utilize CORS, since they are not cross-domain.
  155. // By explicitly checking the Host-header, the server will not allow requests
  156. // made against the server with a malicious host domain.
  157. // Requests using ip address directly are not affected
  158. GraphQLVirtualHosts []string `toml:",omitempty"`
  159. // Logger is a custom logger to use with the p2p.Server.
  160. Logger log.Logger `toml:",omitempty"`
  161. LogConfig *LogConfig `toml:",omitempty"`
  162. staticNodesWarning bool
  163. trustedNodesWarning bool
  164. oldGethResourceWarning bool
  165. // AllowUnprotectedTxs allows non EIP-155 protected transactions to be send over RPC.
  166. AllowUnprotectedTxs bool `toml:",omitempty"`
  167. }
  168. // IPCEndpoint resolves an IPC endpoint based on a configured value, taking into
  169. // account the set data folders as well as the designated platform we're currently
  170. // running on.
  171. func (c *Config) IPCEndpoint() string {
  172. // Short circuit if IPC has not been enabled
  173. if c.IPCPath == "" {
  174. return ""
  175. }
  176. // On windows we can only use plain top-level pipes
  177. if runtime.GOOS == "windows" {
  178. if strings.HasPrefix(c.IPCPath, `\\.\pipe\`) {
  179. return c.IPCPath
  180. }
  181. return `\\.\pipe\` + c.IPCPath
  182. }
  183. // Resolve names into the data directory full paths otherwise
  184. if filepath.Base(c.IPCPath) == c.IPCPath {
  185. if c.DataDir == "" {
  186. return filepath.Join(os.TempDir(), c.IPCPath)
  187. }
  188. return filepath.Join(c.DataDir, c.IPCPath)
  189. }
  190. return c.IPCPath
  191. }
  192. // NodeDB returns the path to the discovery node database.
  193. func (c *Config) NodeDB() string {
  194. if c.DataDir == "" {
  195. return "" // ephemeral
  196. }
  197. return c.ResolvePath(datadirNodeDatabase)
  198. }
  199. // DefaultIPCEndpoint returns the IPC path used by default.
  200. func DefaultIPCEndpoint(clientIdentifier string) string {
  201. if clientIdentifier == "" {
  202. clientIdentifier = strings.TrimSuffix(filepath.Base(os.Args[0]), ".exe")
  203. if clientIdentifier == "" {
  204. panic("empty executable name")
  205. }
  206. }
  207. config := &Config{DataDir: DefaultDataDir(), IPCPath: clientIdentifier + ".ipc"}
  208. return config.IPCEndpoint()
  209. }
  210. // HTTPEndpoint resolves an HTTP endpoint based on the configured host interface
  211. // and port parameters.
  212. func (c *Config) HTTPEndpoint() string {
  213. if c.HTTPHost == "" {
  214. return ""
  215. }
  216. return fmt.Sprintf("%s:%d", c.HTTPHost, c.HTTPPort)
  217. }
  218. // DefaultHTTPEndpoint returns the HTTP endpoint used by default.
  219. func DefaultHTTPEndpoint() string {
  220. config := &Config{HTTPHost: DefaultHTTPHost, HTTPPort: DefaultHTTPPort}
  221. return config.HTTPEndpoint()
  222. }
  223. // WSEndpoint resolves a websocket endpoint based on the configured host interface
  224. // and port parameters.
  225. func (c *Config) WSEndpoint() string {
  226. if c.WSHost == "" {
  227. return ""
  228. }
  229. return fmt.Sprintf("%s:%d", c.WSHost, c.WSPort)
  230. }
  231. // DefaultWSEndpoint returns the websocket endpoint used by default.
  232. func DefaultWSEndpoint() string {
  233. config := &Config{WSHost: DefaultWSHost, WSPort: DefaultWSPort}
  234. return config.WSEndpoint()
  235. }
  236. // ExtRPCEnabled returns the indicator whether node enables the external
  237. // RPC(http, ws or graphql).
  238. func (c *Config) ExtRPCEnabled() bool {
  239. return c.HTTPHost != "" || c.WSHost != ""
  240. }
  241. // NodeName returns the devp2p node identifier.
  242. func (c *Config) NodeName() string {
  243. name := c.name()
  244. // Backwards compatibility: previous versions used title-cased "Geth", keep that.
  245. if name == "geth" || name == "geth-testnet" {
  246. name = "Geth"
  247. }
  248. if c.UserIdent != "" {
  249. name += "/" + c.UserIdent
  250. }
  251. if c.Version != "" {
  252. name += "/v" + c.Version
  253. }
  254. name += "/" + runtime.GOOS + "-" + runtime.GOARCH
  255. name += "/" + runtime.Version()
  256. return name
  257. }
  258. func (c *Config) name() string {
  259. if c.Name == "" {
  260. progname := strings.TrimSuffix(filepath.Base(os.Args[0]), ".exe")
  261. if progname == "" {
  262. panic("empty executable name, set Config.Name")
  263. }
  264. return progname
  265. }
  266. return c.Name
  267. }
  268. // These resources are resolved differently for "geth" instances.
  269. var isOldGethResource = map[string]bool{
  270. "chaindata": true,
  271. "nodes": true,
  272. "nodekey": true,
  273. "static-nodes.json": false, // no warning for these because they have their
  274. "trusted-nodes.json": false, // own separate warning.
  275. }
  276. // ResolvePath resolves path in the instance directory.
  277. func (c *Config) ResolvePath(path string) string {
  278. if filepath.IsAbs(path) {
  279. return path
  280. }
  281. if c.DataDir == "" {
  282. return ""
  283. }
  284. // Backwards-compatibility: ensure that data directory files created
  285. // by geth 1.4 are used if they exist.
  286. if warn, isOld := isOldGethResource[path]; isOld {
  287. oldpath := ""
  288. if c.name() == "geth" {
  289. oldpath = filepath.Join(c.DataDir, path)
  290. }
  291. if oldpath != "" && common.FileExist(oldpath) {
  292. if warn {
  293. c.warnOnce(&c.oldGethResourceWarning, "Using deprecated resource file %s, please move this file to the 'geth' subdirectory of datadir.", oldpath)
  294. }
  295. return oldpath
  296. }
  297. }
  298. return filepath.Join(c.instanceDir(), path)
  299. }
  300. func (c *Config) instanceDir() string {
  301. if c.DataDir == "" {
  302. return ""
  303. }
  304. return filepath.Join(c.DataDir, c.name())
  305. }
  306. // NodeKey retrieves the currently configured private key of the node, checking
  307. // first any manually set key, falling back to the one found in the configured
  308. // data folder. If no key can be found, a new one is generated.
  309. func (c *Config) NodeKey() *ecdsa.PrivateKey {
  310. // Use any specifically configured key.
  311. if c.P2P.PrivateKey != nil {
  312. return c.P2P.PrivateKey
  313. }
  314. // Generate ephemeral key if no datadir is being used.
  315. if c.DataDir == "" {
  316. key, err := crypto.GenerateKey()
  317. if err != nil {
  318. log.Crit(fmt.Sprintf("Failed to generate ephemeral node key: %v", err))
  319. }
  320. return key
  321. }
  322. keyfile := c.ResolvePath(datadirPrivateKey)
  323. if key, err := crypto.LoadECDSA(keyfile); err == nil {
  324. return key
  325. }
  326. // No persistent key found, generate and store a new one.
  327. key, err := crypto.GenerateKey()
  328. if err != nil {
  329. log.Crit(fmt.Sprintf("Failed to generate node key: %v", err))
  330. }
  331. instanceDir := filepath.Join(c.DataDir, c.name())
  332. if err := os.MkdirAll(instanceDir, 0700); err != nil {
  333. log.Error(fmt.Sprintf("Failed to persist node key: %v", err))
  334. return key
  335. }
  336. keyfile = filepath.Join(instanceDir, datadirPrivateKey)
  337. if err := crypto.SaveECDSA(keyfile, key); err != nil {
  338. log.Error(fmt.Sprintf("Failed to persist node key: %v", err))
  339. }
  340. return key
  341. }
  342. // StaticNodes returns a list of node enode URLs configured as static nodes.
  343. func (c *Config) StaticNodes() []*enode.Node {
  344. return c.parsePersistentNodes(&c.staticNodesWarning, c.ResolvePath(datadirStaticNodes))
  345. }
  346. // TrustedNodes returns a list of node enode URLs configured as trusted nodes.
  347. func (c *Config) TrustedNodes() []*enode.Node {
  348. return c.parsePersistentNodes(&c.trustedNodesWarning, c.ResolvePath(datadirTrustedNodes))
  349. }
  350. // parsePersistentNodes parses a list of discovery node URLs loaded from a .json
  351. // file from within the data directory.
  352. func (c *Config) parsePersistentNodes(w *bool, path string) []*enode.Node {
  353. // Short circuit if no node config is present
  354. if c.DataDir == "" {
  355. return nil
  356. }
  357. if _, err := os.Stat(path); err != nil {
  358. return nil
  359. }
  360. c.warnOnce(w, "Found deprecated node list file %s, please use the TOML config file instead.", path)
  361. // Load the nodes from the config file.
  362. var nodelist []string
  363. if err := common.LoadJSON(path, &nodelist); err != nil {
  364. log.Error(fmt.Sprintf("Can't load node list file: %v", err))
  365. return nil
  366. }
  367. // Interpret the list as a discovery node array
  368. var nodes []*enode.Node
  369. for _, url := range nodelist {
  370. if url == "" {
  371. continue
  372. }
  373. node, err := enode.Parse(enode.ValidSchemes, url)
  374. if err != nil {
  375. log.Error(fmt.Sprintf("Node URL %s: %v\n", url, err))
  376. continue
  377. }
  378. nodes = append(nodes, node)
  379. }
  380. return nodes
  381. }
  382. // AccountConfig determines the settings for scrypt and keydirectory
  383. func (c *Config) AccountConfig() (int, int, string, error) {
  384. scryptN := keystore.StandardScryptN
  385. scryptP := keystore.StandardScryptP
  386. if c.UseLightweightKDF {
  387. scryptN = keystore.LightScryptN
  388. scryptP = keystore.LightScryptP
  389. }
  390. var (
  391. keydir string
  392. err error
  393. )
  394. switch {
  395. case filepath.IsAbs(c.KeyStoreDir):
  396. keydir = c.KeyStoreDir
  397. case c.DataDir != "":
  398. if c.KeyStoreDir == "" {
  399. keydir = filepath.Join(c.DataDir, datadirDefaultKeyStore)
  400. } else {
  401. keydir, err = filepath.Abs(c.KeyStoreDir)
  402. }
  403. case c.KeyStoreDir != "":
  404. keydir, err = filepath.Abs(c.KeyStoreDir)
  405. }
  406. return scryptN, scryptP, keydir, err
  407. }
  408. func makeAccountManager(conf *Config) (*accounts.Manager, string, error) {
  409. scryptN, scryptP, keydir, err := conf.AccountConfig()
  410. var ephemeral string
  411. if keydir == "" {
  412. // There is no datadir.
  413. keydir, err = ioutil.TempDir("", "go-ethereum-keystore")
  414. ephemeral = keydir
  415. }
  416. if err != nil {
  417. return nil, "", err
  418. }
  419. if err := os.MkdirAll(keydir, 0700); err != nil {
  420. return nil, "", err
  421. }
  422. // Assemble the account manager and supported backends
  423. var backends []accounts.Backend
  424. if len(conf.ExternalSigner) > 0 {
  425. log.Info("Using external signer", "url", conf.ExternalSigner)
  426. if extapi, err := external.NewExternalBackend(conf.ExternalSigner); err == nil {
  427. backends = append(backends, extapi)
  428. } else {
  429. return nil, "", fmt.Errorf("error connecting to external signer: %v", err)
  430. }
  431. }
  432. if len(backends) == 0 {
  433. // For now, we're using EITHER external signer OR local signers.
  434. // If/when we implement some form of lockfile for USB and keystore wallets,
  435. // we can have both, but it's very confusing for the user to see the same
  436. // accounts in both externally and locally, plus very racey.
  437. backends = append(backends, keystore.NewKeyStore(keydir, scryptN, scryptP))
  438. if conf.USB {
  439. // Start a USB hub for Ledger hardware wallets
  440. if ledgerhub, err := usbwallet.NewLedgerHub(); err != nil {
  441. log.Warn(fmt.Sprintf("Failed to start Ledger hub, disabling: %v", err))
  442. } else {
  443. backends = append(backends, ledgerhub)
  444. }
  445. // Start a USB hub for Trezor hardware wallets (HID version)
  446. if trezorhub, err := usbwallet.NewTrezorHubWithHID(); err != nil {
  447. log.Warn(fmt.Sprintf("Failed to start HID Trezor hub, disabling: %v", err))
  448. } else {
  449. backends = append(backends, trezorhub)
  450. }
  451. // Start a USB hub for Trezor hardware wallets (WebUSB version)
  452. if trezorhub, err := usbwallet.NewTrezorHubWithWebUSB(); err != nil {
  453. log.Warn(fmt.Sprintf("Failed to start WebUSB Trezor hub, disabling: %v", err))
  454. } else {
  455. backends = append(backends, trezorhub)
  456. }
  457. }
  458. if len(conf.SmartCardDaemonPath) > 0 {
  459. // Start a smart card hub
  460. if schub, err := scwallet.NewHub(conf.SmartCardDaemonPath, scwallet.Scheme, keydir); err != nil {
  461. log.Warn(fmt.Sprintf("Failed to start smart card hub, disabling: %v", err))
  462. } else {
  463. backends = append(backends, schub)
  464. }
  465. }
  466. }
  467. return accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: conf.InsecureUnlockAllowed}, backends...), ephemeral, nil
  468. }
  469. var warnLock sync.Mutex
  470. func (c *Config) warnOnce(w *bool, format string, args ...interface{}) {
  471. warnLock.Lock()
  472. defer warnLock.Unlock()
  473. if *w {
  474. return
  475. }
  476. l := c.Logger
  477. if l == nil {
  478. l = log.Root()
  479. }
  480. l.Warn(fmt.Sprintf(format, args...))
  481. *w = true
  482. }
  483. type LogConfig struct {
  484. FileRoot string
  485. FilePath string
  486. MaxBytesSize uint
  487. Level string
  488. }