| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167 |
- // Copyright 2015 The go-ethereum Authors
- // This file is part of the go-ethereum library.
- //
- // The go-ethereum library is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Lesser General Public License as published by
- // the Free Software Foundation, either version 3 of the License, or
- // (at your option) any later version.
- //
- // The go-ethereum library is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public License
- // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
- package rpc
- import (
- "context"
- "crypto/tls"
- "fmt"
- "net"
- "net/http"
- "net/url"
- "os"
- "strings"
- "time"
- "github.com/ethereum/go-ethereum/log"
- "golang.org/x/net/websocket"
- "gopkg.in/fatih/set.v0"
- )
- // WebsocketHandler returns a handler that serves JSON-RPC to WebSocket connections.
- //
- // allowedOrigins should be a comma-separated list of allowed origin URLs.
- // To allow connections with any origin, pass "*".
- func (srv *Server) WebsocketHandler(allowedOrigins []string) http.Handler {
- return websocket.Server{
- Handshake: wsHandshakeValidator(allowedOrigins),
- Handler: func(conn *websocket.Conn) {
- srv.ServeCodec(NewJSONCodec(conn), OptionMethodInvocation|OptionSubscriptions)
- },
- }
- }
- // NewWSServer creates a new websocket RPC server around an API provider.
- //
- // Deprecated: use Server.WebsocketHandler
- func NewWSServer(allowedOrigins []string, srv *Server) *http.Server {
- return &http.Server{Handler: srv.WebsocketHandler(allowedOrigins)}
- }
- // wsHandshakeValidator returns a handler that verifies the origin during the
- // websocket upgrade process. When a '*' is specified as an allowed origins all
- // connections are accepted.
- func wsHandshakeValidator(allowedOrigins []string) func(*websocket.Config, *http.Request) error {
- origins := set.New()
- allowAllOrigins := false
- for _, origin := range allowedOrigins {
- if origin == "*" {
- allowAllOrigins = true
- }
- if origin != "" {
- origins.Add(strings.ToLower(origin))
- }
- }
- // allow localhost if no allowedOrigins are specified.
- if len(origins.List()) == 0 {
- origins.Add("http://localhost")
- if hostname, err := os.Hostname(); err == nil {
- origins.Add("http://" + strings.ToLower(hostname))
- }
- }
- log.Debug(fmt.Sprintf("Allowed origin(s) for WS RPC interface %v\n", origins.List()))
- f := func(cfg *websocket.Config, req *http.Request) error {
- origin := strings.ToLower(req.Header.Get("Origin"))
- if allowAllOrigins || origins.Has(origin) {
- return nil
- }
- log.Warn(fmt.Sprintf("origin '%s' not allowed on WS-RPC interface\n", origin))
- return fmt.Errorf("origin %s not allowed", origin)
- }
- return f
- }
- // DialWebsocket creates a new RPC client that communicates with a JSON-RPC server
- // that is listening on the given endpoint.
- //
- // The context is used for the initial connection establishment. It does not
- // affect subsequent interactions with the client.
- func DialWebsocket(ctx context.Context, endpoint, origin string) (*Client, error) {
- if origin == "" {
- var err error
- if origin, err = os.Hostname(); err != nil {
- return nil, err
- }
- if strings.HasPrefix(endpoint, "wss") {
- origin = "https://" + strings.ToLower(origin)
- } else {
- origin = "http://" + strings.ToLower(origin)
- }
- }
- config, err := websocket.NewConfig(endpoint, origin)
- if err != nil {
- return nil, err
- }
- return newClient(ctx, func(ctx context.Context) (net.Conn, error) {
- return wsDialContext(ctx, config)
- })
- }
- func wsDialContext(ctx context.Context, config *websocket.Config) (*websocket.Conn, error) {
- var conn net.Conn
- var err error
- switch config.Location.Scheme {
- case "ws":
- conn, err = dialContext(ctx, "tcp", wsDialAddress(config.Location))
- case "wss":
- dialer := contextDialer(ctx)
- conn, err = tls.DialWithDialer(dialer, "tcp", wsDialAddress(config.Location), config.TlsConfig)
- default:
- err = websocket.ErrBadScheme
- }
- if err != nil {
- return nil, err
- }
- ws, err := websocket.NewClient(config, conn)
- if err != nil {
- conn.Close()
- return nil, err
- }
- return ws, err
- }
- var wsPortMap = map[string]string{"ws": "80", "wss": "443"}
- func wsDialAddress(location *url.URL) string {
- if _, ok := wsPortMap[location.Scheme]; ok {
- if _, _, err := net.SplitHostPort(location.Host); err != nil {
- return net.JoinHostPort(location.Host, wsPortMap[location.Scheme])
- }
- }
- return location.Host
- }
- func dialContext(ctx context.Context, network, addr string) (net.Conn, error) {
- d := &net.Dialer{KeepAlive: tcpKeepAliveInterval}
- return d.DialContext(ctx, network, addr)
- }
- func contextDialer(ctx context.Context) *net.Dialer {
- dialer := &net.Dialer{Cancel: ctx.Done(), KeepAlive: tcpKeepAliveInterval}
- if deadline, ok := ctx.Deadline(); ok {
- dialer.Deadline = deadline
- } else {
- dialer.Deadline = time.Now().Add(defaultDialTimeout)
- }
- return dialer
- }
|