Bitcoin Core 31.99.0
P2P Digital Currency
httprpc.cpp
Go to the documentation of this file.
1// Copyright (c) 2015-present The Bitcoin Core developers
2// Distributed under the MIT software license, see the accompanying
3// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5#include <httprpc.h>
6
7#include <common/args.h>
9#include <httpserver.h>
10#include <logging.h>
11#include <netaddress.h>
12#include <rpc/protocol.h>
13#include <rpc/server.h>
14#include <util/fs.h>
15#include <util/fs_helpers.h>
16#include <util/strencodings.h>
17#include <util/string.h>
18#include <walletinitinterface.h>
19
20#include <algorithm>
21#include <iterator>
22#include <map>
23#include <memory>
24#include <optional>
25#include <set>
26#include <string>
27#include <vector>
28
31
33static const char* WWW_AUTH_HEADER_DATA = "Basic realm=\"jsonrpc\"";
34
35/* List of -rpcauth values */
36static std::vector<std::vector<std::string>> g_rpcauth;
37/* RPC Auth Whitelist */
38static std::map<std::string, std::set<std::string>> g_rpc_whitelist;
39static bool g_rpc_whitelist_default = false;
40
41static UniValue JSONErrorReply(UniValue objError, const JSONRPCRequest& jreq, HTTPStatusCode& nStatus)
42{
43 // HTTP errors should never be returned if JSON-RPC v2 was requested. This
44 // function should only be called when a v1 request fails or when a request
45 // cannot be parsed, so the version is unknown.
47
48 // Send error reply from json-rpc error object
50 int code = objError.find_value("code").getInt<int>();
51
52 if (code == RPC_INVALID_REQUEST)
53 nStatus = HTTP_BAD_REQUEST;
54 else if (code == RPC_METHOD_NOT_FOUND)
55 nStatus = HTTP_NOT_FOUND;
56
57 return JSONRPCReplyObj(NullUniValue, std::move(objError), jreq.id, jreq.m_json_version);
58}
59
60//This function checks username and password against -rpcauth
61//entries from config file.
62static bool CheckUserAuthorized(std::string_view user, std::string_view pass)
63{
64 for (const auto& fields : g_rpcauth) {
65 if (!TimingResistantEqual(std::string_view(fields[0]), user)) {
66 continue;
67 }
68
69 const std::string& salt = fields[1];
70 const std::string& hash = fields[2];
71
72 std::array<unsigned char, CHMAC_SHA256::OUTPUT_SIZE> out;
73 CHMAC_SHA256(UCharCast(salt.data()), salt.size()).Write(UCharCast(pass.data()), pass.size()).Finalize(out.data());
74 std::string hash_from_pass = HexStr(out);
75
76 if (TimingResistantEqual(hash_from_pass, hash)) {
77 return true;
78 }
79 }
80 return false;
81}
82
83static bool RPCAuthorized(const std::string& strAuth, std::string& strAuthUsernameOut)
84{
85 if (!strAuth.starts_with("Basic "))
86 return false;
87 std::string_view strUserPass64 = TrimStringView(std::string_view{strAuth}.substr(6));
88 auto userpass_data = DecodeBase64(strUserPass64);
89 std::string strUserPass;
90 if (!userpass_data) return false;
91 strUserPass.assign(userpass_data->begin(), userpass_data->end());
92
93 size_t colon_pos = strUserPass.find(':');
94 if (colon_pos == std::string::npos) {
95 return false; // Invalid basic auth.
96 }
97 std::string user = strUserPass.substr(0, colon_pos);
98 std::string pass = strUserPass.substr(colon_pos + 1);
99 strAuthUsernameOut = user;
100 return CheckUserAuthorized(user, pass);
101}
102
104{
105 status = HTTP_OK;
106 try {
107 bool user_has_whitelist = g_rpc_whitelist.contains(jreq.authUser);
108 if (!user_has_whitelist && g_rpc_whitelist_default) {
109 LogWarning("RPC User %s not allowed to call any methods", jreq.authUser);
110 status = HTTP_FORBIDDEN;
111 return {};
112
113 // singleton request
114 } else if (valRequest.isObject()) {
115 jreq.parse(valRequest);
116 if (user_has_whitelist && !g_rpc_whitelist[jreq.authUser].contains(jreq.strMethod)) {
117 LogWarning("RPC User %s not allowed to call method %s", jreq.authUser, jreq.strMethod);
118 status = HTTP_FORBIDDEN;
119 return {};
120 }
121
122 // Legacy 1.0/1.1 behavior is for failed requests to throw
123 // exceptions which return HTTP errors and RPC errors to the client.
124 // 2.0 behavior is to catch exceptions and return HTTP success with
125 // RPC errors, as long as there is not an actual HTTP server error.
126 const bool catch_errors{jreq.m_json_version == JSONRPCVersion::V2};
127 UniValue reply{JSONRPCExec(jreq, catch_errors)};
128 if (jreq.IsNotification()) {
129 // Even though we do execute notifications, we do not respond to them
130 status = HTTP_NO_CONTENT;
131 return {};
132 }
133 return reply;
134 // array of requests
135 } else if (valRequest.isArray()) {
136 // Check authorization for each request's method
137 if (user_has_whitelist) {
138 for (unsigned int reqIdx = 0; reqIdx < valRequest.size(); reqIdx++) {
139 if (!valRequest[reqIdx].isObject()) {
140 throw JSONRPCError(RPC_INVALID_REQUEST, "Invalid Request object");
141 } else {
142 const UniValue& request = valRequest[reqIdx].get_obj();
143 // Parse method
144 std::string strMethod = request.find_value("method").get_str();
145 if (!g_rpc_whitelist[jreq.authUser].contains(strMethod)) {
146 LogWarning("RPC User %s not allowed to call method %s", jreq.authUser, strMethod);
147 status = HTTP_FORBIDDEN;
148 return {};
149 }
150 }
151 }
152 }
153
154 // Execute each request
155 UniValue reply = UniValue::VARR;
156 for (size_t i{0}; i < valRequest.size(); ++i) {
157 // Batches never throw HTTP errors, they are always just included
158 // in "HTTP OK" responses. Notifications never get any response.
159 UniValue response;
160 try {
161 jreq.parse(valRequest[i]);
162 response = JSONRPCExec(jreq, /*catch_errors=*/true);
163 } catch (UniValue& e) {
164 response = JSONRPCReplyObj(NullUniValue, std::move(e), jreq.id, jreq.m_json_version);
165 } catch (const std::exception& e) {
166 response = JSONRPCReplyObj(NullUniValue, JSONRPCError(RPC_PARSE_ERROR, e.what()), jreq.id, jreq.m_json_version);
167 }
168 if (!jreq.IsNotification()) {
169 reply.push_back(std::move(response));
170 }
171 }
172 // Return no response for an all-notification batch, but only if the
173 // batch request is non-empty. Technically according to the JSON-RPC
174 // 2.0 spec, an empty batch request should also return no response,
175 // However, if the batch request is empty, it means the request did
176 // not contain any JSON-RPC version numbers, so returning an empty
177 // response could break backwards compatibility with old RPC clients
178 // relying on previous behavior. Return an empty array instead of an
179 // empty response in this case to favor being backwards compatible
180 // over complying with the JSON-RPC 2.0 spec in this case.
181 if (reply.size() == 0 && valRequest.size() > 0) {
182 status = HTTP_NO_CONTENT;
183 return {};
184 }
185 return reply;
186 }
187 else
188 throw JSONRPCError(RPC_PARSE_ERROR, "Top-level object parse error");
189 } catch (UniValue& e) {
190 return JSONErrorReply(std::move(e), jreq, status);
191 } catch (const std::exception& e) {
192 return JSONErrorReply(JSONRPCError(RPC_PARSE_ERROR, e.what()), jreq, status);
193 }
194}
195
196static void HTTPReq_JSONRPC(const std::any& context, HTTPRequest* req)
197{
198 // JSONRPC handles only POST
199 if (req->GetRequestMethod() != HTTPRequest::POST) {
200 req->WriteReply(HTTP_BAD_METHOD, "JSONRPC server handles only POST requests");
201 return;
202 }
203 // Check authorization
204 std::pair<bool, std::string> authHeader = req->GetHeader("authorization");
205 if (!authHeader.first) {
206 req->WriteHeader("WWW-Authenticate", WWW_AUTH_HEADER_DATA);
208 return;
209 }
210
211 JSONRPCRequest jreq;
212 jreq.context = context;
213 jreq.peerAddr = req->GetPeer().ToStringAddrPort();
214 jreq.URI = req->GetURI();
215 if (!RPCAuthorized(authHeader.second, jreq.authUser)) {
216 LogWarning("ThreadRPCServer incorrect password attempt from %s", jreq.peerAddr);
217
218 /* Deter brute-forcing
219 If this results in a DoS the user really
220 shouldn't have their RPC port exposed. */
221 UninterruptibleSleep(std::chrono::milliseconds{250});
222
223 req->WriteHeader("WWW-Authenticate", WWW_AUTH_HEADER_DATA);
225 return;
226 }
227
228 // Generate reply
229 HTTPStatusCode status;
230 UniValue reply;
231 UniValue request;
232 if (request.read(req->ReadBody())) {
233 reply = ExecuteHTTPRPC(request, jreq, status);
234 } else {
235 reply = JSONErrorReply(JSONRPCError(RPC_PARSE_ERROR, "Parse error"), jreq, status);
236 }
237
238 // Write reply
239 if (reply.isNull()) {
240 // Error case or no-content notification reply.
241 req->WriteReply(status);
242 } else {
243 req->WriteHeader("Content-Type", "application/json");
244 req->WriteReply(status, reply.write() + "\n");
245 }
246}
247
249{
250 std::string user;
251 std::string pass;
252
253 if (gArgs.GetArg("-rpcpassword", "") == "")
254 {
255 std::optional<fs::perms> cookie_perms{std::nullopt};
256 auto cookie_perms_arg{gArgs.GetArg("-rpccookieperms")};
257 if (cookie_perms_arg) {
258 auto perm_opt = InterpretPermString(*cookie_perms_arg);
259 if (!perm_opt) {
260 LogError("Invalid -rpccookieperms=%s; must be one of 'owner', 'group', or 'all'.", *cookie_perms_arg);
261 return false;
262 }
263 cookie_perms = *perm_opt;
264 }
265
266 switch (GenerateAuthCookie(cookie_perms, user, pass)) {
268 return false;
270 LogInfo("RPC authentication cookie file generation is disabled.");
271 break;
273 LogInfo("Using random cookie authentication.");
274 break;
275 }
276 } else {
277 LogInfo("Using rpcuser/rpcpassword authentication.");
278 LogWarning("The use of rpcuser/rpcpassword is less secure, because credentials are configured in plain text. It is recommended that locally-run instances switch to cookie-based auth, or otherwise to use hashed rpcauth credentials. See share/rpcauth in the source directory for more information.");
279 user = gArgs.GetArg("-rpcuser", "");
280 pass = gArgs.GetArg("-rpcpassword", "");
281 }
282
283 // If there is a plaintext credential, hash it with a random salt before storage.
284 if (!user.empty() || !pass.empty()) {
285 // Generate a random 16 byte hex salt.
286 std::array<unsigned char, 16> raw_salt;
287 GetStrongRandBytes(raw_salt);
288 std::string salt = HexStr(raw_salt);
289
290 // Compute HMAC.
291 std::array<unsigned char, CHMAC_SHA256::OUTPUT_SIZE> out;
292 CHMAC_SHA256(UCharCast(salt.data()), salt.size()).Write(UCharCast(pass.data()), pass.size()).Finalize(out.data());
293 std::string hash = HexStr(out);
294
295 g_rpcauth.push_back({user, salt, hash});
296 }
297
298 if (!gArgs.GetArgs("-rpcauth").empty()) {
299 LogInfo("Using rpcauth authentication.\n");
300 for (const std::string& rpcauth : gArgs.GetArgs("-rpcauth")) {
301 std::vector<std::string> fields{SplitString(rpcauth, ':')};
302 const std::vector<std::string> salt_hmac{SplitString(fields.back(), '$')};
303 if (fields.size() == 2 && salt_hmac.size() == 2) {
304 fields.pop_back();
305 fields.insert(fields.end(), salt_hmac.begin(), salt_hmac.end());
306 g_rpcauth.push_back(fields);
307 } else {
308 LogWarning("Invalid -rpcauth argument.");
309 return false;
310 }
311 }
312 }
313
314 g_rpc_whitelist_default = gArgs.GetBoolArg("-rpcwhitelistdefault", !gArgs.GetArgs("-rpcwhitelist").empty());
315 for (const std::string& strRPCWhitelist : gArgs.GetArgs("-rpcwhitelist")) {
316 auto pos = strRPCWhitelist.find(':');
317 std::string strUser = strRPCWhitelist.substr(0, pos);
318 bool intersect = g_rpc_whitelist.contains(strUser);
319 std::set<std::string>& whitelist = g_rpc_whitelist[strUser];
320 if (pos != std::string::npos) {
321 std::string strWhitelist = strRPCWhitelist.substr(pos + 1);
322 std::vector<std::string> whitelist_split = SplitString(strWhitelist, ", ");
323 std::set<std::string> new_whitelist{
324 std::make_move_iterator(whitelist_split.begin()),
325 std::make_move_iterator(whitelist_split.end())};
326 if (intersect) {
327 std::set<std::string> tmp_whitelist;
328 std::set_intersection(new_whitelist.begin(), new_whitelist.end(),
329 whitelist.begin(), whitelist.end(), std::inserter(tmp_whitelist, tmp_whitelist.end()));
330 new_whitelist = std::move(tmp_whitelist);
331 }
332 whitelist = std::move(new_whitelist);
333 }
334 }
335
336 return true;
337}
338
339bool StartHTTPRPC(const std::any& context)
340{
341 LogDebug(BCLog::RPC, "Starting HTTP RPC server\n");
343 return false;
344
345 auto handle_rpc = [context](HTTPRequest* req, const std::string&) { return HTTPReq_JSONRPC(context, req); };
346 RegisterHTTPHandler("/", true, handle_rpc);
348 RegisterHTTPHandler("/wallet/", false, handle_rpc);
349 }
350 struct event_base* eventBase = EventBase();
352 return true;
353}
354
356{
357 LogDebug(BCLog::RPC, "Interrupting HTTP RPC server\n");
358}
359
361{
362 LogDebug(BCLog::RPC, "Stopping HTTP RPC server\n");
363 UnregisterHTTPHandler("/", true);
365 UnregisterHTTPHandler("/wallet/", false);
366 }
367}
ArgsManager gArgs
Definition: args.cpp:40
#define Assume(val)
Assume is the identity function.
Definition: check.h:128
std::vector< std::string > GetArgs(const std::string &strArg) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return a vector of strings of the given argument.
Definition: args.cpp:390
std::string GetArg(const std::string &strArg, const std::string &strDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return string argument or default value.
Definition: args.cpp:485
bool GetBoolArg(const std::string &strArg, bool fDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return boolean argument or default value.
Definition: args.cpp:539
A hasher class for HMAC-SHA-256.
Definition: hmac_sha256.h:14
CHMAC_SHA256 & Write(const unsigned char *data, size_t len)
Definition: hmac_sha256.h:23
void Finalize(unsigned char hash[OUTPUT_SIZE])
Definition: hmac_sha256.cpp:31
std::string ToStringAddrPort() const
Definition: netaddress.cpp:903
In-flight HTTP request.
Definition: httpserver.h:71
std::pair< bool, std::string > GetHeader(const std::string &hdr) const
Get the request header specified by hdr, or an empty string.
Definition: httpserver.cpp:540
std::string GetURI() const
Get requested URI.
Definition: httpserver.cpp:633
void WriteReply(int nStatus, std::string_view reply="")
Write HTTP reply.
Definition: httpserver.h:141
void WriteHeader(const std::string &hdr, const std::string &value)
Write output header.
Definition: httpserver.cpp:571
RequestMethod GetRequestMethod() const
Get request method.
Definition: httpserver.cpp:638
std::string ReadBody()
Read request body.
Definition: httpserver.cpp:551
CService GetPeer() const
Get CService (address:ip) for the origin of the http request.
Definition: httpserver.cpp:613
std::string strMethod
Definition: request.h:56
JSONRPCVersion m_json_version
Definition: request.h:63
bool IsNotification() const
Definition: request.h:66
std::string peerAddr
Definition: request.h:61
void parse(const UniValue &valRequest)
Definition: request.cpp:196
std::string URI
Definition: request.h:59
std::optional< UniValue > id
Definition: request.h:55
std::string authUser
Definition: request.h:60
std::any context
Definition: request.h:62
void push_back(UniValue val)
Definition: univalue.cpp:103
const std::string & get_str() const
bool isArray() const
Definition: univalue.h:87
const UniValue & find_value(std::string_view key) const
Definition: univalue.cpp:232
@ VARR
Definition: univalue.h:24
std::string write(unsigned int prettyIndent=0, unsigned int indentLevel=0) const
bool isNull() const
Definition: univalue.h:81
const UniValue & get_obj() const
size_t size() const
Definition: univalue.h:71
bool read(std::string_view raw)
Int getInt() const
Definition: univalue.h:140
bool isObject() const
Definition: univalue.h:88
virtual bool HasWalletSupport() const =0
Is the wallet component enabled.
const WalletInitInterface & g_wallet_init_interface
Definition: dummywallet.cpp:55
std::optional< fs::perms > InterpretPermString(const std::string &s)
Interpret a custom permissions level string as fs::perms.
Definition: fs_helpers.cpp:292
std::string HexStr(const std::span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
Definition: hex_base.cpp:30
static const char * WWW_AUTH_HEADER_DATA
WWW-Authenticate to present with 401 Unauthorized response.
Definition: httprpc.cpp:33
UniValue ExecuteHTTPRPC(const UniValue &valRequest, JSONRPCRequest &jreq, HTTPStatusCode &status)
Execute a single HTTP request containing one or more JSONRPC requests.
Definition: httprpc.cpp:103
void InterruptHTTPRPC()
Interrupt HTTP RPC subsystem.
Definition: httprpc.cpp:355
void StopHTTPRPC()
Stop HTTP RPC subsystem.
Definition: httprpc.cpp:360
static bool CheckUserAuthorized(std::string_view user, std::string_view pass)
Definition: httprpc.cpp:62
bool StartHTTPRPC(const std::any &context)
Start HTTP RPC subsystem.
Definition: httprpc.cpp:339
static bool g_rpc_whitelist_default
Definition: httprpc.cpp:39
static void HTTPReq_JSONRPC(const std::any &context, HTTPRequest *req)
Definition: httprpc.cpp:196
static bool RPCAuthorized(const std::string &strAuth, std::string &strAuthUsernameOut)
Definition: httprpc.cpp:83
static std::vector< std::vector< std::string > > g_rpcauth
Definition: httprpc.cpp:36
static bool InitRPCAuthentication()
Definition: httprpc.cpp:248
static std::map< std::string, std::set< std::string > > g_rpc_whitelist
Definition: httprpc.cpp:38
static UniValue JSONErrorReply(UniValue objError, const JSONRPCRequest &jreq, HTTPStatusCode &nStatus)
Definition: httprpc.cpp:41
void UnregisterHTTPHandler(const std::string &prefix, bool exactMatch)
Unregister handler for prefix.
Definition: httpserver.cpp:695
void RegisterHTTPHandler(const std::string &prefix, bool exactMatch, const HTTPRequestHandler &handler)
Register handler for prefix.
Definition: httpserver.cpp:688
static struct event_base * eventBase
HTTP module state.
Definition: httpserver.cpp:67
struct event_base * EventBase()
Return evhttp event base.
Definition: httpserver.cpp:494
#define LogWarning(...)
Definition: log.h:98
#define LogInfo(...)
Definition: log.h:97
#define LogError(...)
Definition: log.h:99
#define LogDebug(category,...)
Definition: log.h:117
@ RPC
Definition: categories.h:23
std::vector< std::string > SplitString(std::string_view str, char sep)
Definition: string.h:150
std::string_view TrimStringView(std::string_view str, std::string_view pattern=" \f\n\r\t\v")
Definition: string.h:160
void GetStrongRandBytes(std::span< unsigned char > bytes) noexcept
Gather entropy from various sources, feed it into the internal PRNG, and generate random data using i...
Definition: random.cpp:607
UniValue JSONRPCError(int code, const std::string &message)
Definition: request.cpp:70
AuthCookieResult GenerateAuthCookie(const std::optional< fs::perms > &cookie_perms, std::string &user, std::string &pass)
Generate a new RPC authentication cookie and write it to disk.
Definition: request.cpp:100
UniValue JSONRPCReplyObj(UniValue result, UniValue error, std::optional< UniValue > id, JSONRPCVersion jsonrpc_version)
Definition: request.cpp:51
HTTPStatusCode
HTTP status codes.
Definition: protocol.h:11
@ HTTP_BAD_REQUEST
Definition: protocol.h:14
@ HTTP_BAD_METHOD
Definition: protocol.h:18
@ HTTP_OK
Definition: protocol.h:12
@ HTTP_UNAUTHORIZED
Definition: protocol.h:15
@ HTTP_NOT_FOUND
Definition: protocol.h:17
@ HTTP_FORBIDDEN
Definition: protocol.h:16
@ HTTP_NO_CONTENT
Definition: protocol.h:13
@ HTTP_INTERNAL_SERVER_ERROR
Definition: protocol.h:19
@ RPC_PARSE_ERROR
Definition: protocol.h:37
@ RPC_METHOD_NOT_FOUND
Definition: protocol.h:32
@ RPC_INVALID_REQUEST
Standard JSON-RPC 2.0 errors.
Definition: protocol.h:29
UniValue JSONRPCExec(const JSONRPCRequest &jreq, bool catch_errors)
Definition: server.cpp:346
unsigned char * UCharCast(char *c)
Definition: span.h:95
bool TimingResistantEqual(const T &a, const T &b)
Timing-attack-resistant comparison.
Definition: strencodings.h:202
const UniValue NullUniValue
Definition: univalue.cpp:15
std::optional< std::vector< unsigned char > > DecodeBase64(std::string_view str)
void UninterruptibleSleep(const std::chrono::microseconds &n)
Definition: time.cpp:30
assert(!tx.IsCoinBase())