36static std::vector<std::vector<std::string>>
g_rpcauth;
69 const std::string& salt = fields[1];
70 const std::string& hash = fields[2];
72 std::array<unsigned char, CHMAC_SHA256::OUTPUT_SIZE>
out;
83static bool RPCAuthorized(
const std::string& strAuth, std::string& strAuthUsernameOut)
85 if (!strAuth.starts_with(
"Basic "))
87 std::string_view strUserPass64 =
TrimStringView(std::string_view{strAuth}.substr(6));
89 std::string strUserPass;
90 if (!userpass_data)
return false;
91 strUserPass.assign(userpass_data->begin(), userpass_data->end());
93 size_t colon_pos = strUserPass.find(
':');
94 if (colon_pos == std::string::npos) {
97 std::string user = strUserPass.substr(0, colon_pos);
98 std::string pass = strUserPass.substr(colon_pos + 1);
99 strAuthUsernameOut = user;
115 jreq.
parse(valRequest);
135 }
else if (valRequest.
isArray()) {
137 if (user_has_whitelist) {
138 for (
unsigned int reqIdx = 0; reqIdx < valRequest.
size(); reqIdx++) {
139 if (!valRequest[reqIdx].isObject()) {
156 for (
size_t i{0}; i < valRequest.
size(); ++i) {
161 jreq.
parse(valRequest[i]);
165 }
catch (
const std::exception& e) {
181 if (reply.
size() == 0 && valRequest.
size() > 0) {
191 }
catch (
const std::exception& e) {
204 std::pair<bool, std::string> authHeader = req->
GetHeader(
"authorization");
205 if (!authHeader.first) {
243 req->
WriteHeader(
"Content-Type",
"application/json");
255 std::optional<fs::perms> cookie_perms{std::nullopt};
256 auto cookie_perms_arg{
gArgs.
GetArg(
"-rpccookieperms")};
257 if (cookie_perms_arg) {
260 LogError(
"Invalid -rpccookieperms=%s; must be one of 'owner', 'group', or 'all'.", *cookie_perms_arg);
263 cookie_perms = *perm_opt;
270 LogInfo(
"RPC authentication cookie file generation is disabled.");
273 LogInfo(
"Using random cookie authentication.");
277 LogInfo(
"Using rpcuser/rpcpassword authentication.");
278 LogWarning(
"The use of rpcuser/rpcpassword is less secure, because credentials are configured in plain text. It is recommended that locally-run instances switch to cookie-based auth, or otherwise to use hashed rpcauth credentials. See share/rpcauth in the source directory for more information.");
284 if (!user.empty() || !pass.empty()) {
286 std::array<unsigned char, 16> raw_salt;
288 std::string salt =
HexStr(raw_salt);
291 std::array<unsigned char, CHMAC_SHA256::OUTPUT_SIZE>
out;
299 LogInfo(
"Using rpcauth authentication.\n");
300 for (
const std::string& rpcauth :
gArgs.
GetArgs(
"-rpcauth")) {
301 std::vector<std::string> fields{
SplitString(rpcauth,
':')};
302 const std::vector<std::string> salt_hmac{
SplitString(fields.back(),
'$')};
303 if (fields.size() == 2 && salt_hmac.size() == 2) {
305 fields.insert(fields.end(), salt_hmac.begin(), salt_hmac.end());
315 for (
const std::string& strRPCWhitelist :
gArgs.
GetArgs(
"-rpcwhitelist")) {
316 auto pos = strRPCWhitelist.find(
':');
317 std::string strUser = strRPCWhitelist.substr(0, pos);
320 if (pos != std::string::npos) {
321 std::string strWhitelist = strRPCWhitelist.substr(pos + 1);
322 std::vector<std::string> whitelist_split =
SplitString(strWhitelist,
", ");
323 std::set<std::string> new_whitelist{
324 std::make_move_iterator(whitelist_split.begin()),
325 std::make_move_iterator(whitelist_split.end())};
327 std::set<std::string> tmp_whitelist;
328 std::set_intersection(new_whitelist.begin(), new_whitelist.end(),
329 whitelist.begin(), whitelist.end(), std::inserter(tmp_whitelist, tmp_whitelist.end()));
330 new_whitelist = std::move(tmp_whitelist);
332 whitelist = std::move(new_whitelist);
#define Assume(val)
Assume is the identity function.
std::vector< std::string > GetArgs(const std::string &strArg) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return a vector of strings of the given argument.
std::string GetArg(const std::string &strArg, const std::string &strDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return string argument or default value.
bool GetBoolArg(const std::string &strArg, bool fDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return boolean argument or default value.
A hasher class for HMAC-SHA-256.
CHMAC_SHA256 & Write(const unsigned char *data, size_t len)
void Finalize(unsigned char hash[OUTPUT_SIZE])
std::string ToStringAddrPort() const
std::pair< bool, std::string > GetHeader(const std::string &hdr) const
Get the request header specified by hdr, or an empty string.
std::string GetURI() const
Get requested URI.
void WriteReply(int nStatus, std::string_view reply="")
Write HTTP reply.
void WriteHeader(const std::string &hdr, const std::string &value)
Write output header.
RequestMethod GetRequestMethod() const
Get request method.
std::string ReadBody()
Read request body.
CService GetPeer() const
Get CService (address:ip) for the origin of the http request.
JSONRPCVersion m_json_version
bool IsNotification() const
void parse(const UniValue &valRequest)
std::optional< UniValue > id
void push_back(UniValue val)
const std::string & get_str() const
const UniValue & find_value(std::string_view key) const
std::string write(unsigned int prettyIndent=0, unsigned int indentLevel=0) const
const UniValue & get_obj() const
bool read(std::string_view raw)
virtual bool HasWalletSupport() const =0
Is the wallet component enabled.
const WalletInitInterface & g_wallet_init_interface
std::optional< fs::perms > InterpretPermString(const std::string &s)
Interpret a custom permissions level string as fs::perms.
std::string HexStr(const std::span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
static const char * WWW_AUTH_HEADER_DATA
WWW-Authenticate to present with 401 Unauthorized response.
UniValue ExecuteHTTPRPC(const UniValue &valRequest, JSONRPCRequest &jreq, HTTPStatusCode &status)
Execute a single HTTP request containing one or more JSONRPC requests.
void InterruptHTTPRPC()
Interrupt HTTP RPC subsystem.
void StopHTTPRPC()
Stop HTTP RPC subsystem.
static bool CheckUserAuthorized(std::string_view user, std::string_view pass)
bool StartHTTPRPC(const std::any &context)
Start HTTP RPC subsystem.
static bool g_rpc_whitelist_default
static void HTTPReq_JSONRPC(const std::any &context, HTTPRequest *req)
static bool RPCAuthorized(const std::string &strAuth, std::string &strAuthUsernameOut)
static std::vector< std::vector< std::string > > g_rpcauth
static bool InitRPCAuthentication()
static std::map< std::string, std::set< std::string > > g_rpc_whitelist
static UniValue JSONErrorReply(UniValue objError, const JSONRPCRequest &jreq, HTTPStatusCode &nStatus)
void UnregisterHTTPHandler(const std::string &prefix, bool exactMatch)
Unregister handler for prefix.
void RegisterHTTPHandler(const std::string &prefix, bool exactMatch, const HTTPRequestHandler &handler)
Register handler for prefix.
static struct event_base * eventBase
HTTP module state.
struct event_base * EventBase()
Return evhttp event base.
#define LogDebug(category,...)
std::vector< std::string > SplitString(std::string_view str, char sep)
std::string_view TrimStringView(std::string_view str, std::string_view pattern=" \f\n\r\t\v")
void GetStrongRandBytes(std::span< unsigned char > bytes) noexcept
Gather entropy from various sources, feed it into the internal PRNG, and generate random data using i...
UniValue JSONRPCError(int code, const std::string &message)
AuthCookieResult GenerateAuthCookie(const std::optional< fs::perms > &cookie_perms, std::string &user, std::string &pass)
Generate a new RPC authentication cookie and write it to disk.
UniValue JSONRPCReplyObj(UniValue result, UniValue error, std::optional< UniValue > id, JSONRPCVersion jsonrpc_version)
HTTPStatusCode
HTTP status codes.
@ HTTP_INTERNAL_SERVER_ERROR
@ RPC_INVALID_REQUEST
Standard JSON-RPC 2.0 errors.
UniValue JSONRPCExec(const JSONRPCRequest &jreq, bool catch_errors)
unsigned char * UCharCast(char *c)
bool TimingResistantEqual(const T &a, const T &b)
Timing-attack-resistant comparison.
const UniValue NullUniValue
std::optional< std::vector< unsigned char > > DecodeBase64(std::string_view str)
void UninterruptibleSleep(const std::chrono::microseconds &n)