2019-11-17 04:29:18 +00:00
// Copyright (c) 2014-2020, The Monero Project
2017-02-05 22:48:03 +00:00
//
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without modification, are
// permitted provided that the following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice, this list of
// conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
// of conditions and the following disclaimer in the documentation and/or other
// materials provided with the distribution.
//
// 3. Neither the name of the copyright holder nor the names of its contributors may be
// used to endorse or promote products derived from this software without specific
// prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//
# include "rpc_args.h"
2017-10-24 13:26:05 +00:00
# include <boost/algorithm/string.hpp>
2017-02-05 22:48:03 +00:00
# include <boost/asio/ip/address.hpp>
2020-06-01 01:18:11 +00:00
# include <functional>
2017-02-05 22:48:03 +00:00
# include "common/command_line.h"
# include "common/i18n.h"
2019-05-22 04:09:11 +00:00
# include "hex.h"
2017-02-05 22:48:03 +00:00
namespace cryptonote
{
2019-05-22 04:09:11 +00:00
namespace
{
boost : : optional < epee : : net_utils : : ssl_options_t > do_process_ssl ( const boost : : program_options : : variables_map & vm , const rpc_args : : descriptors & arg , const bool any_cert_option )
{
bool ssl_required = false ;
epee : : net_utils : : ssl_options_t ssl_options = epee : : net_utils : : ssl_support_t : : e_ssl_support_enabled ;
if ( any_cert_option & & command_line : : get_arg ( vm , arg . rpc_ssl_allow_any_cert ) )
ssl_options . verification = epee : : net_utils : : ssl_verification_t : : none ;
else
{
std : : string ssl_ca_file = command_line : : get_arg ( vm , arg . rpc_ssl_ca_certificates ) ;
const std : : vector < std : : string > ssl_allowed_fingerprints = command_line : : get_arg ( vm , arg . rpc_ssl_allowed_fingerprints ) ;
std : : vector < std : : vector < uint8_t > > allowed_fingerprints { ssl_allowed_fingerprints . size ( ) } ;
2019-11-17 04:29:18 +00:00
std : : transform ( ssl_allowed_fingerprints . begin ( ) , ssl_allowed_fingerprints . end ( ) , allowed_fingerprints . begin ( ) , epee : : from_hex_locale : : to_vector ) ;
2019-05-22 04:09:11 +00:00
for ( const auto & fpr : allowed_fingerprints )
{
if ( fpr . size ( ) ! = SSL_FINGERPRINT_SIZE )
{
MERROR ( " SHA-256 fingerprint should be " BOOST_PP_STRINGIZE ( SSL_FINGERPRINT_SIZE ) " bytes long. " ) ;
return boost : : none ;
}
}
if ( ! allowed_fingerprints . empty ( ) | | ! ssl_ca_file . empty ( ) )
{
ssl_required = true ;
ssl_options = epee : : net_utils : : ssl_options_t {
std : : move ( allowed_fingerprints ) , std : : move ( ssl_ca_file )
} ;
if ( command_line : : get_arg ( vm , arg . rpc_ssl_allow_chained ) )
ssl_options . verification = epee : : net_utils : : ssl_verification_t : : user_ca ;
}
}
// user specified CA file or fingeprints implies enabled SSL by default
if ( ! ssl_required & & ! epee : : net_utils : : ssl_support_from_string ( ssl_options . support , command_line : : get_arg ( vm , arg . rpc_ssl ) ) )
{
MERROR ( " Invalid argument for " < < std : : string ( arg . rpc_ssl . name ) ) ;
return boost : : none ;
}
ssl_options . auth = epee : : net_utils : : ssl_authentication_t {
command_line : : get_arg ( vm , arg . rpc_ssl_private_key ) , command_line : : get_arg ( vm , arg . rpc_ssl_certificate )
} ;
return { std : : move ( ssl_options ) } ;
}
} // anonymous
2017-02-05 22:48:03 +00:00
rpc_args : : descriptors : : descriptors ( )
2018-01-09 21:37:30 +00:00
: rpc_bind_ip ( { " rpc-bind-ip " , rpc_args : : tr ( " Specify IP to bind RPC server " ) , " 127.0.0.1 " } )
2019-04-10 22:34:30 +00:00
, rpc_bind_ipv6_address ( { " rpc-bind-ipv6-address " , rpc_args : : tr ( " Specify IPv6 address to bind RPC server " ) , " ::1 " } )
2020-10-28 23:47:42 +00:00
, rpc_restricted_bind_ip ( { " rpc-restricted-bind-ip " , rpc_args : : tr ( " Specify IP to bind restricted RPC server " ) , " 127.0.0.1 " } )
, rpc_restricted_bind_ipv6_address ( { " rpc-restricted-bind-ipv6-address " , rpc_args : : tr ( " Specify IPv6 address to bind restricted RPC server " ) , " ::1 " } )
2019-04-10 22:34:30 +00:00
, rpc_use_ipv6 ( { " rpc-use-ipv6 " , rpc_args : : tr ( " Allow IPv6 for RPC " ) , false } )
2019-10-13 13:27:46 +00:00
, rpc_ignore_ipv4 ( { " rpc-ignore-ipv4 " , rpc_args : : tr ( " Ignore unsuccessful IPv4 bind for RPC " ) , false } )
2017-02-05 22:48:03 +00:00
, rpc_login ( { " rpc-login " , rpc_args : : tr ( " Specify username[:password] required for RPC server " ) , " " , true } )
2017-02-23 21:02:15 +00:00
, confirm_external_bind ( { " confirm-external-bind " , rpc_args : : tr ( " Confirm rpc-bind-ip value is NOT a loopback (local) IP " ) } )
2017-10-24 13:26:05 +00:00
, rpc_access_control_origins ( { " rpc-access-control-origins " , rpc_args : : tr ( " Specify a comma separated list of origins to allow cross origin resource sharing " ) , " " } )
2019-05-22 04:09:11 +00:00
, rpc_ssl ( { " rpc-ssl " , rpc_args : : tr ( " Enable SSL on RPC connections: enabled|disabled|autodetect " ) , " autodetect " } )
, rpc_ssl_private_key ( { " rpc-ssl-private-key " , rpc_args : : tr ( " Path to a PEM format private key " ) , " " } )
, rpc_ssl_certificate ( { " rpc-ssl-certificate " , rpc_args : : tr ( " Path to a PEM format certificate " ) , " " } )
, rpc_ssl_ca_certificates ( { " rpc-ssl-ca-certificates " , rpc_args : : tr ( " Path to file containing concatenated PEM format certificate(s) to replace system CA(s). " ) , " " } )
, rpc_ssl_allowed_fingerprints ( { " rpc-ssl-allowed-fingerprints " , rpc_args : : tr ( " List of certificate fingerprints to allow " ) } )
, rpc_ssl_allow_chained ( { " rpc-ssl-allow-chained " , rpc_args : : tr ( " Allow user (via --rpc-ssl-certificates) chain certificates " ) , false } )
, rpc_ssl_allow_any_cert ( { " rpc-ssl-allow-any-cert " , rpc_args : : tr ( " Allow any peer certificate " ) , false } )
2019-12-04 12:21:39 +00:00
, disable_rpc_ban ( { " disable-rpc-ban " , rpc_args : : tr ( " Do not ban hosts on RPC errors " ) , false , false } )
2017-02-05 22:48:03 +00:00
{ }
const char * rpc_args : : tr ( const char * str ) { return i18n_translate ( str , " cryptonote::rpc_args " ) ; }
2019-05-22 04:09:11 +00:00
void rpc_args : : init_options ( boost : : program_options : : options_description & desc , const bool any_cert_option )
2017-02-05 22:48:03 +00:00
{
const descriptors arg { } ;
command_line : : add_arg ( desc , arg . rpc_bind_ip ) ;
2019-04-10 22:34:30 +00:00
command_line : : add_arg ( desc , arg . rpc_bind_ipv6_address ) ;
2020-10-28 23:47:42 +00:00
command_line : : add_arg ( desc , arg . rpc_restricted_bind_ip ) ;
command_line : : add_arg ( desc , arg . rpc_restricted_bind_ipv6_address ) ;
2019-04-10 22:34:30 +00:00
command_line : : add_arg ( desc , arg . rpc_use_ipv6 ) ;
2019-10-13 13:27:46 +00:00
command_line : : add_arg ( desc , arg . rpc_ignore_ipv4 ) ;
2017-02-05 22:48:03 +00:00
command_line : : add_arg ( desc , arg . rpc_login ) ;
command_line : : add_arg ( desc , arg . confirm_external_bind ) ;
2017-10-24 13:26:05 +00:00
command_line : : add_arg ( desc , arg . rpc_access_control_origins ) ;
2019-05-22 04:09:11 +00:00
command_line : : add_arg ( desc , arg . rpc_ssl ) ;
command_line : : add_arg ( desc , arg . rpc_ssl_private_key ) ;
command_line : : add_arg ( desc , arg . rpc_ssl_certificate ) ;
command_line : : add_arg ( desc , arg . rpc_ssl_ca_certificates ) ;
command_line : : add_arg ( desc , arg . rpc_ssl_allowed_fingerprints ) ;
command_line : : add_arg ( desc , arg . rpc_ssl_allow_chained ) ;
2019-12-04 12:21:39 +00:00
command_line : : add_arg ( desc , arg . disable_rpc_ban ) ;
2019-05-22 04:09:11 +00:00
if ( any_cert_option )
command_line : : add_arg ( desc , arg . rpc_ssl_allow_any_cert ) ;
2017-02-05 22:48:03 +00:00
}
2019-05-22 04:09:11 +00:00
boost : : optional < rpc_args > rpc_args : : process ( const boost : : program_options : : variables_map & vm , const bool any_cert_option )
2017-02-05 22:48:03 +00:00
{
const descriptors arg { } ;
rpc_args config { } ;
config . bind_ip = command_line : : get_arg ( vm , arg . rpc_bind_ip ) ;
2019-04-10 22:34:30 +00:00
config . bind_ipv6_address = command_line : : get_arg ( vm , arg . rpc_bind_ipv6_address ) ;
2020-10-28 23:47:42 +00:00
config . restricted_bind_ip = command_line : : get_arg ( vm , arg . rpc_restricted_bind_ip ) ;
config . restricted_bind_ipv6_address = command_line : : get_arg ( vm , arg . rpc_restricted_bind_ipv6_address ) ;
2019-04-10 22:34:30 +00:00
config . use_ipv6 = command_line : : get_arg ( vm , arg . rpc_use_ipv6 ) ;
2019-10-13 13:27:46 +00:00
config . require_ipv4 = ! command_line : : get_arg ( vm , arg . rpc_ignore_ipv4 ) ;
2019-12-04 12:21:39 +00:00
config . disable_rpc_ban = command_line : : get_arg ( vm , arg . disable_rpc_ban ) ;
2017-02-05 22:48:03 +00:00
if ( ! config . bind_ip . empty ( ) )
{
// always parse IP here for error consistency
boost : : system : : error_code ec { } ;
const auto parsed_ip = boost : : asio : : ip : : address : : from_string ( config . bind_ip , ec ) ;
if ( ec )
{
LOG_ERROR ( tr ( " Invalid IP address given for -- " ) < < arg . rpc_bind_ip . name ) ;
return boost : : none ;
}
if ( ! parsed_ip . is_loopback ( ) & & ! command_line : : get_arg ( vm , arg . confirm_external_bind ) )
{
LOG_ERROR (
" -- " < < arg . rpc_bind_ip . name < <
tr ( " permits inbound unencrypted external connections. Consider SSH tunnel or SSL proxy instead. Override with -- " ) < <
arg . confirm_external_bind . name
) ;
return boost : : none ;
2019-04-10 22:34:30 +00:00
}
}
if ( ! config . bind_ipv6_address . empty ( ) )
{
// allow square braces, but remove them here if present
if ( config . bind_ipv6_address . find ( ' [ ' ) ! = std : : string : : npos )
{
config . bind_ipv6_address = config . bind_ipv6_address . substr ( 1 , config . bind_ipv6_address . size ( ) - 2 ) ;
}
// always parse IP here for error consistency
boost : : system : : error_code ec { } ;
const auto parsed_ip = boost : : asio : : ip : : address : : from_string ( config . bind_ipv6_address , ec ) ;
if ( ec )
{
LOG_ERROR ( tr ( " Invalid IP address given for -- " ) < < arg . rpc_bind_ipv6_address . name ) ;
return boost : : none ;
}
if ( ! parsed_ip . is_loopback ( ) & & ! command_line : : get_arg ( vm , arg . confirm_external_bind ) )
{
LOG_ERROR (
" -- " < < arg . rpc_bind_ipv6_address . name < <
tr ( " permits inbound unencrypted external connections. Consider SSH tunnel or SSL proxy instead. Override with -- " ) < <
arg . confirm_external_bind . name
) ;
return boost : : none ;
2017-02-05 22:48:03 +00:00
}
}
2020-10-28 23:47:42 +00:00
if ( ! config . restricted_bind_ip . empty ( ) )
{
// always parse IP here for error consistency
boost : : system : : error_code ec { } ;
boost : : asio : : ip : : address : : from_string ( config . restricted_bind_ip , ec ) ;
if ( ec )
{
LOG_ERROR ( tr ( " Invalid IP address given for -- " ) < < arg . rpc_restricted_bind_ip . name ) ;
return boost : : none ;
}
}
if ( ! config . restricted_bind_ipv6_address . empty ( ) )
{
// allow square braces, but remove them here if present
if ( config . restricted_bind_ipv6_address . find ( ' [ ' ) ! = std : : string : : npos )
{
config . restricted_bind_ipv6_address = config . restricted_bind_ipv6_address . substr ( 1 , config . restricted_bind_ipv6_address . size ( ) - 2 ) ;
}
// always parse IP here for error consistency
boost : : system : : error_code ec { } ;
boost : : asio : : ip : : address : : from_string ( config . restricted_bind_ipv6_address , ec ) ;
if ( ec )
{
LOG_ERROR ( tr ( " Invalid IP address given for -- " ) < < arg . rpc_restricted_bind_ipv6_address . name ) ;
return boost : : none ;
}
}
2017-02-05 22:48:03 +00:00
2018-08-30 11:35:05 +00:00
const char * env_rpc_login = nullptr ;
const bool has_rpc_arg = command_line : : has_arg ( vm , arg . rpc_login ) ;
const bool use_rpc_env = ! has_rpc_arg & & ( env_rpc_login = getenv ( " RPC_LOGIN " ) ) ! = nullptr & & strlen ( env_rpc_login ) > 0 ;
boost : : optional < tools : : login > login { } ;
if ( has_rpc_arg | | use_rpc_env )
2017-02-05 22:48:03 +00:00
{
2018-08-30 11:35:05 +00:00
config . login = tools : : login : : parse (
has_rpc_arg ? command_line : : get_arg ( vm , arg . rpc_login ) : std : : string ( env_rpc_login ) , true , [ ] ( bool verify ) {
return tools : : password_container : : prompt ( verify , " RPC server password " ) ;
} ) ;
2017-02-05 22:48:03 +00:00
if ( ! config . login )
return boost : : none ;
if ( config . login - > username . empty ( ) )
{
LOG_ERROR ( tr ( " Username specified with -- " ) < < arg . rpc_login . name < < tr ( " cannot be empty " ) ) ;
return boost : : none ;
}
}
2017-10-24 13:26:05 +00:00
auto access_control_origins_input = command_line : : get_arg ( vm , arg . rpc_access_control_origins ) ;
if ( ! access_control_origins_input . empty ( ) )
{
if ( ! config . login )
{
2018-06-13 10:49:49 +00:00
LOG_ERROR ( arg . rpc_access_control_origins . name < < tr ( " requires RPC server password -- " ) < < arg . rpc_login . name < < tr ( " cannot be empty " ) ) ;
2017-10-24 13:26:05 +00:00
return boost : : none ;
}
std : : vector < std : : string > access_control_origins ;
boost : : split ( access_control_origins , access_control_origins_input , boost : : is_any_of ( " , " ) ) ;
2020-06-01 01:18:11 +00:00
std : : for_each ( access_control_origins . begin ( ) , access_control_origins . end ( ) , std : : bind ( & boost : : trim < std : : string > , std : : placeholders : : _1 , std : : locale : : classic ( ) ) ) ;
2017-10-24 13:26:05 +00:00
config . access_control_origins = std : : move ( access_control_origins ) ;
}
2019-05-22 04:09:11 +00:00
auto ssl_options = do_process_ssl ( vm , arg , any_cert_option ) ;
if ( ! ssl_options )
return boost : : none ;
config . ssl_options = std : : move ( * ssl_options ) ;
2017-02-05 22:48:03 +00:00
return { std : : move ( config ) } ;
}
2019-05-22 04:09:11 +00:00
boost : : optional < epee : : net_utils : : ssl_options_t > rpc_args : : process_ssl ( const boost : : program_options : : variables_map & vm , const bool any_cert_option )
{
const descriptors arg { } ;
return do_process_ssl ( vm , arg , any_cert_option ) ;
}
2017-02-05 22:48:03 +00:00
}