2015-11-05 15:57:57 -06:00
|
|
|
// Copyright 2015 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package node
|
|
|
|
|
|
|
|
import (
|
2022-03-07 01:30:27 -06:00
|
|
|
crand "crypto/rand"
|
2015-11-05 15:57:57 -06:00
|
|
|
"errors"
|
2017-02-22 06:10:07 -06:00
|
|
|
"fmt"
|
2020-04-27 04:16:00 -05:00
|
|
|
"net/http"
|
2015-11-05 15:57:57 -06:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2015-11-17 10:33:25 -06:00
|
|
|
"reflect"
|
2016-08-18 06:28:17 -05:00
|
|
|
"strings"
|
2015-11-05 15:57:57 -06:00
|
|
|
"sync"
|
|
|
|
|
2016-08-15 11:38:32 -05:00
|
|
|
"github.com/ethereum/go-ethereum/accounts"
|
2022-03-07 01:30:27 -06:00
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
2018-09-24 07:57:49 -05:00
|
|
|
"github.com/ethereum/go-ethereum/core/rawdb"
|
2016-08-18 06:28:17 -05:00
|
|
|
"github.com/ethereum/go-ethereum/ethdb"
|
2015-11-05 15:57:57 -06:00
|
|
|
"github.com/ethereum/go-ethereum/event"
|
2017-02-22 06:10:07 -06:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2015-11-05 15:57:57 -06:00
|
|
|
"github.com/ethereum/go-ethereum/p2p"
|
2015-12-16 03:58:01 -06:00
|
|
|
"github.com/ethereum/go-ethereum/rpc"
|
2019-04-04 08:59:18 -05:00
|
|
|
"github.com/prometheus/tsdb/fileutil"
|
2015-11-05 15:57:57 -06:00
|
|
|
)
|
|
|
|
|
2016-08-18 06:28:17 -05:00
|
|
|
// Node is a container on which services can be registered.
|
2015-11-05 15:57:57 -06:00
|
|
|
type Node struct {
|
2020-08-03 12:40:46 -05:00
|
|
|
eventmux *event.TypeMux
|
|
|
|
config *Config
|
|
|
|
accman *accounts.Manager
|
|
|
|
log log.Logger
|
2021-08-25 15:34:22 -05:00
|
|
|
keyDir string // key store directory
|
|
|
|
keyDirTemp bool // If true, key directory will be removed by Stop
|
2020-08-03 12:40:46 -05:00
|
|
|
dirLock fileutil.Releaser // prevents concurrent use of instance directory
|
|
|
|
stop chan struct{} // Channel to wait for termination notifications
|
|
|
|
server *p2p.Server // Currently running P2P networking layer
|
|
|
|
startStopLock sync.Mutex // Start/Stop are protected by an additional lock
|
|
|
|
state int // Tracks state of node lifecycle
|
|
|
|
|
|
|
|
lock sync.Mutex
|
|
|
|
lifecycles []Lifecycle // All registered backends, services, and auxiliary services that have a lifecycle
|
2016-02-09 06:10:40 -06:00
|
|
|
rpcAPIs []rpc.API // List of APIs currently provided by the node
|
2020-08-03 12:40:46 -05:00
|
|
|
http *httpServer //
|
|
|
|
ws *httpServer //
|
2022-03-07 01:30:27 -06:00
|
|
|
httpAuth *httpServer //
|
|
|
|
wsAuth *httpServer //
|
2020-08-03 12:40:46 -05:00
|
|
|
ipc *ipcServer // Stores information about the ipc http server
|
2016-02-09 06:10:40 -06:00
|
|
|
inprocHandler *rpc.Server // In-process RPC request handler to process the API requests
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
databases map[*closeTrackingDB]struct{} // All open databases
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
const (
|
|
|
|
initializingState = iota
|
|
|
|
runningState
|
|
|
|
closedState
|
|
|
|
)
|
|
|
|
|
2015-11-05 15:57:57 -06:00
|
|
|
// New creates a new P2P node, ready for protocol registration.
|
|
|
|
func New(conf *Config) (*Node, error) {
|
2016-08-18 06:28:17 -05:00
|
|
|
// Copy config and resolve the datadir so future changes to the current
|
|
|
|
// working directory don't affect the node.
|
|
|
|
confCopy := *conf
|
|
|
|
conf = &confCopy
|
2015-11-05 15:57:57 -06:00
|
|
|
if conf.DataDir != "" {
|
2016-08-18 06:28:17 -05:00
|
|
|
absdatadir, err := filepath.Abs(conf.DataDir)
|
|
|
|
if err != nil {
|
2015-11-05 15:57:57 -06:00
|
|
|
return nil, err
|
|
|
|
}
|
2016-08-18 06:28:17 -05:00
|
|
|
conf.DataDir = absdatadir
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
if conf.Logger == nil {
|
|
|
|
conf.Logger = log.New()
|
|
|
|
}
|
|
|
|
|
2016-08-18 06:28:17 -05:00
|
|
|
// Ensure that the instance name doesn't cause weird conflicts with
|
|
|
|
// other files in the data directory.
|
|
|
|
if strings.ContainsAny(conf.Name, `/\`) {
|
|
|
|
return nil, errors.New(`Config.Name must not contain '/' or '\'`)
|
|
|
|
}
|
|
|
|
if conf.Name == datadirDefaultKeyStore {
|
|
|
|
return nil, errors.New(`Config.Name cannot be "` + datadirDefaultKeyStore + `"`)
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
2016-08-18 06:28:17 -05:00
|
|
|
if strings.HasSuffix(conf.Name, ".ipc") {
|
|
|
|
return nil, errors.New(`Config.Name cannot end in ".ipc"`)
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
|
|
|
|
node := &Node{
|
|
|
|
config: conf,
|
|
|
|
inprocHandler: rpc.NewServer(),
|
|
|
|
eventmux: new(event.TypeMux),
|
|
|
|
log: conf.Logger,
|
|
|
|
stop: make(chan struct{}),
|
|
|
|
server: &p2p.Server{Config: conf.P2P},
|
|
|
|
databases: make(map[*closeTrackingDB]struct{}),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register built-in APIs.
|
|
|
|
node.rpcAPIs = append(node.rpcAPIs, node.apis()...)
|
|
|
|
|
|
|
|
// Acquire the instance directory lock.
|
|
|
|
if err := node.openDataDir(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-08-25 15:34:22 -05:00
|
|
|
keyDir, isEphem, err := getKeyStoreDir(conf)
|
2016-08-15 11:38:32 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-08-25 15:34:22 -05:00
|
|
|
node.keyDir = keyDir
|
|
|
|
node.keyDirTemp = isEphem
|
|
|
|
// Creates an empty AccountManager with no backends. Callers (e.g. cmd/geth)
|
|
|
|
// are required to add the backends later on.
|
|
|
|
node.accman = accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: conf.InsecureUnlockAllowed})
|
2020-08-03 12:40:46 -05:00
|
|
|
|
|
|
|
// Initialize the p2p server. This creates the node key and discovery databases.
|
|
|
|
node.server.Config.PrivateKey = node.config.NodeKey()
|
|
|
|
node.server.Config.Name = node.config.NodeName()
|
|
|
|
node.server.Config.Logger = node.log
|
|
|
|
if node.server.Config.StaticNodes == nil {
|
|
|
|
node.server.Config.StaticNodes = node.config.StaticNodes()
|
|
|
|
}
|
|
|
|
if node.server.Config.TrustedNodes == nil {
|
|
|
|
node.server.Config.TrustedNodes = node.config.TrustedNodes()
|
2017-12-01 05:49:04 -06:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
if node.server.Config.NodeDatabase == "" {
|
|
|
|
node.server.Config.NodeDatabase = node.config.NodeDB()
|
|
|
|
}
|
|
|
|
|
2021-02-02 03:05:46 -06:00
|
|
|
// Check HTTP/WS prefixes are valid.
|
|
|
|
if err := validatePrefix("HTTP", conf.HTTPPathPrefix); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := validatePrefix("WebSocket", conf.WSPathPrefix); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// Configure RPC servers.
|
|
|
|
node.http = newHTTPServer(node.log, conf.HTTPTimeouts)
|
2022-03-07 01:30:27 -06:00
|
|
|
node.httpAuth = newHTTPServer(node.log, conf.HTTPTimeouts)
|
2020-08-03 12:40:46 -05:00
|
|
|
node.ws = newHTTPServer(node.log, rpc.DefaultHTTPTimeouts)
|
2022-03-07 01:30:27 -06:00
|
|
|
node.wsAuth = newHTTPServer(node.log, rpc.DefaultHTTPTimeouts)
|
2020-08-03 12:40:46 -05:00
|
|
|
node.ipc = newIPCServer(node.log, conf.IPCEndpoint())
|
|
|
|
|
|
|
|
return node, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start starts all registered lifecycles, RPC services and p2p networking.
|
|
|
|
// Node can only be started once.
|
|
|
|
func (n *Node) Start() error {
|
|
|
|
n.startStopLock.Lock()
|
|
|
|
defer n.startStopLock.Unlock()
|
|
|
|
|
|
|
|
n.lock.Lock()
|
|
|
|
switch n.state {
|
|
|
|
case runningState:
|
|
|
|
n.lock.Unlock()
|
|
|
|
return ErrNodeRunning
|
|
|
|
case closedState:
|
|
|
|
n.lock.Unlock()
|
|
|
|
return ErrNodeStopped
|
|
|
|
}
|
|
|
|
n.state = runningState
|
2021-01-04 05:39:25 -06:00
|
|
|
// open networking and RPC endpoints
|
|
|
|
err := n.openEndpoints()
|
2020-08-03 12:40:46 -05:00
|
|
|
lifecycles := make([]Lifecycle, len(n.lifecycles))
|
|
|
|
copy(lifecycles, n.lifecycles)
|
|
|
|
n.lock.Unlock()
|
|
|
|
|
2021-01-04 05:39:25 -06:00
|
|
|
// Check if endpoint startup failed.
|
2020-08-03 12:40:46 -05:00
|
|
|
if err != nil {
|
|
|
|
n.doClose(nil)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Start all registered lifecycles.
|
|
|
|
var started []Lifecycle
|
|
|
|
for _, lifecycle := range lifecycles {
|
|
|
|
if err = lifecycle.Start(); err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
started = append(started, lifecycle)
|
|
|
|
}
|
|
|
|
// Check if any lifecycle failed to start.
|
|
|
|
if err != nil {
|
|
|
|
n.stopServices(started)
|
|
|
|
n.doClose(nil)
|
|
|
|
}
|
|
|
|
return err
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
|
2019-02-07 04:40:36 -06:00
|
|
|
// Close stops the Node and releases resources acquired in
|
|
|
|
// Node constructor New.
|
|
|
|
func (n *Node) Close() error {
|
2020-08-03 12:40:46 -05:00
|
|
|
n.startStopLock.Lock()
|
|
|
|
defer n.startStopLock.Unlock()
|
2019-02-07 04:40:36 -06:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
n.lock.Lock()
|
|
|
|
state := n.state
|
|
|
|
n.lock.Unlock()
|
|
|
|
switch state {
|
|
|
|
case initializingState:
|
|
|
|
// The node was never started.
|
|
|
|
return n.doClose(nil)
|
|
|
|
case runningState:
|
|
|
|
// The node was started, release resources acquired by Start().
|
|
|
|
var errs []error
|
|
|
|
if err := n.stopServices(n.lifecycles); err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
|
|
|
return n.doClose(errs)
|
|
|
|
case closedState:
|
|
|
|
return ErrNodeStopped
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("node is in unknown state %d", state))
|
2019-02-07 04:40:36 -06:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// doClose releases resources acquired by New(), collecting errors.
|
|
|
|
func (n *Node) doClose(errs []error) error {
|
|
|
|
// Close databases. This needs the lock because it needs to
|
|
|
|
// synchronize with OpenDatabase*.
|
|
|
|
n.lock.Lock()
|
|
|
|
n.state = closedState
|
|
|
|
errs = append(errs, n.closeDatabases()...)
|
|
|
|
n.lock.Unlock()
|
|
|
|
|
2019-02-07 04:40:36 -06:00
|
|
|
if err := n.accman.Close(); err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
2021-08-25 15:34:22 -05:00
|
|
|
if n.keyDirTemp {
|
|
|
|
if err := os.RemoveAll(n.keyDir); err != nil {
|
2020-08-03 12:40:46 -05:00
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Release instance directory lock.
|
|
|
|
n.closeDataDir()
|
|
|
|
|
|
|
|
// Unblock n.Wait.
|
|
|
|
close(n.stop)
|
|
|
|
|
|
|
|
// Report any errors that might have occurred.
|
2019-02-07 04:40:36 -06:00
|
|
|
switch len(errs) {
|
|
|
|
case 0:
|
|
|
|
return nil
|
|
|
|
case 1:
|
|
|
|
return errs[0]
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("%v", errs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-04 05:39:25 -06:00
|
|
|
// openEndpoints starts all network and RPC endpoints.
|
|
|
|
func (n *Node) openEndpoints() error {
|
|
|
|
// start networking endpoints
|
2020-08-03 12:40:46 -05:00
|
|
|
n.log.Info("Starting peer-to-peer node", "instance", n.server.Name)
|
|
|
|
if err := n.server.Start(); err != nil {
|
|
|
|
return convertFileLockError(err)
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
2021-01-04 05:39:25 -06:00
|
|
|
// start RPC endpoints
|
2020-08-03 12:40:46 -05:00
|
|
|
err := n.startRPC()
|
|
|
|
if err != nil {
|
|
|
|
n.stopRPC()
|
|
|
|
n.server.Stop()
|
2016-08-18 06:28:17 -05:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
return err
|
|
|
|
}
|
2016-08-18 06:28:17 -05:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// containsLifecycle checks if 'lfs' contains 'l'.
|
|
|
|
func containsLifecycle(lfs []Lifecycle, l Lifecycle) bool {
|
|
|
|
for _, obj := range lfs {
|
|
|
|
if obj == l {
|
|
|
|
return true
|
2015-11-17 10:33:25 -06:00
|
|
|
}
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
return false
|
|
|
|
}
|
2015-11-17 10:33:25 -06:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// stopServices terminates running services, RPC and p2p networking.
|
|
|
|
// It is the inverse of Start.
|
|
|
|
func (n *Node) stopServices(running []Lifecycle) error {
|
|
|
|
n.stopRPC()
|
|
|
|
|
|
|
|
// Stop running lifecycles in reverse order.
|
|
|
|
failure := &StopError{Services: make(map[reflect.Type]error)}
|
|
|
|
for i := len(running) - 1; i >= 0; i-- {
|
|
|
|
if err := running[i].Stop(); err != nil {
|
|
|
|
failure.Services[reflect.TypeOf(running[i])] = err
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
|
|
|
|
// Stop p2p networking.
|
|
|
|
n.server.Stop()
|
|
|
|
|
|
|
|
if len(failure.Services) > 0 {
|
|
|
|
return failure
|
2016-02-02 11:06:43 -06:00
|
|
|
}
|
2015-11-05 15:57:57 -06:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-08-18 06:28:17 -05:00
|
|
|
func (n *Node) openDataDir() error {
|
|
|
|
if n.config.DataDir == "" {
|
|
|
|
return nil // ephemeral
|
|
|
|
}
|
|
|
|
|
|
|
|
instdir := filepath.Join(n.config.DataDir, n.config.name())
|
|
|
|
if err := os.MkdirAll(instdir, 0700); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-08-18 05:14:00 -05:00
|
|
|
// Lock the instance directory to prevent concurrent use by another instance as well as
|
|
|
|
// accidental use of the instance directory as a database.
|
2019-04-04 08:59:18 -05:00
|
|
|
release, _, err := fileutil.Flock(filepath.Join(instdir, "LOCK"))
|
2016-08-18 06:28:17 -05:00
|
|
|
if err != nil {
|
2017-08-18 05:14:00 -05:00
|
|
|
return convertFileLockError(err)
|
2016-08-18 06:28:17 -05:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
n.dirLock = release
|
2016-08-18 06:28:17 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
func (n *Node) closeDataDir() {
|
|
|
|
// Release instance directory lock.
|
|
|
|
if n.dirLock != nil {
|
|
|
|
if err := n.dirLock.Release(); err != nil {
|
|
|
|
n.log.Error("Can't release datadir lock", "err", err)
|
|
|
|
}
|
|
|
|
n.dirLock = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
// obtainJWTSecret loads the jwt-secret, either from the provided config,
|
|
|
|
// or from the default location. If neither of those are present, it generates
|
|
|
|
// a new secret and stores to the default location.
|
|
|
|
func (n *Node) obtainJWTSecret(cliParam string) ([]byte, error) {
|
2022-03-24 09:04:47 -05:00
|
|
|
fileName := cliParam
|
|
|
|
if len(fileName) == 0 {
|
2022-03-07 01:30:27 -06:00
|
|
|
// no path provided, use default
|
|
|
|
fileName = n.ResolvePath(datadirJWTKey)
|
|
|
|
}
|
|
|
|
// try reading from file
|
|
|
|
log.Debug("Reading JWT secret", "path", fileName)
|
|
|
|
if data, err := os.ReadFile(fileName); err == nil {
|
|
|
|
jwtSecret := common.FromHex(strings.TrimSpace(string(data)))
|
|
|
|
if len(jwtSecret) == 32 {
|
|
|
|
return jwtSecret, nil
|
|
|
|
}
|
|
|
|
log.Error("Invalid JWT secret", "path", fileName, "length", len(jwtSecret))
|
|
|
|
return nil, errors.New("invalid JWT secret")
|
|
|
|
}
|
|
|
|
// Need to generate one
|
|
|
|
jwtSecret := make([]byte, 32)
|
|
|
|
crand.Read(jwtSecret)
|
|
|
|
// if we're in --dev mode, don't bother saving, just show it
|
|
|
|
if fileName == "" {
|
|
|
|
log.Info("Generated ephemeral JWT secret", "secret", hexutil.Encode(jwtSecret))
|
|
|
|
return jwtSecret, nil
|
|
|
|
}
|
|
|
|
if err := os.WriteFile(fileName, []byte(hexutil.Encode(jwtSecret)), 0600); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
log.Info("Generated JWT secret", "path", fileName)
|
|
|
|
return jwtSecret, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// startRPC is a helper method to configure all the various RPC endpoints during node
|
2016-02-05 05:45:36 -06:00
|
|
|
// startup. It's not meant to be called at any time afterwards as it makes certain
|
|
|
|
// assumptions about the state of the node.
|
2020-08-03 12:40:46 -05:00
|
|
|
func (n *Node) startRPC() error {
|
|
|
|
if err := n.startInProc(); err != nil {
|
2016-02-05 05:45:36 -06:00
|
|
|
return err
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
|
|
|
|
// Configure IPC.
|
|
|
|
if n.ipc.endpoint != "" {
|
|
|
|
if err := n.ipc.start(n.rpcAPIs); err != nil {
|
2020-04-08 06:33:12 -05:00
|
|
|
return err
|
|
|
|
}
|
2016-02-05 07:08:48 -06:00
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
var (
|
|
|
|
servers []*httpServer
|
|
|
|
open, all = n.GetAPIs()
|
|
|
|
)
|
2020-04-08 06:33:12 -05:00
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
initHttp := func(server *httpServer, apis []rpc.API, port int) error {
|
|
|
|
if err := server.setListenAddr(n.config.HTTPHost, port); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := server.enableRPC(apis, httpConfig{
|
2020-08-03 12:40:46 -05:00
|
|
|
CorsAllowedOrigins: n.config.HTTPCors,
|
|
|
|
Vhosts: n.config.HTTPVirtualHosts,
|
|
|
|
Modules: n.config.HTTPModules,
|
2021-02-02 03:05:46 -06:00
|
|
|
prefix: n.config.HTTPPathPrefix,
|
2022-03-07 01:30:27 -06:00
|
|
|
}); err != nil {
|
|
|
|
return err
|
2020-08-03 12:40:46 -05:00
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
servers = append(servers, server)
|
|
|
|
return nil
|
|
|
|
}
|
2022-03-09 07:45:39 -06:00
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
initWS := func(apis []rpc.API, port int) error {
|
|
|
|
server := n.wsServerForPort(port, false)
|
|
|
|
if err := server.setListenAddr(n.config.WSHost, port); err != nil {
|
2020-08-03 12:40:46 -05:00
|
|
|
return err
|
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
if err := server.enableWS(n.rpcAPIs, wsConfig{
|
|
|
|
Modules: n.config.WSModules,
|
|
|
|
Origins: n.config.WSOrigins,
|
|
|
|
prefix: n.config.WSPathPrefix,
|
|
|
|
}); err != nil {
|
2016-02-09 06:10:40 -06:00
|
|
|
return err
|
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
servers = append(servers, server)
|
|
|
|
return nil
|
2016-02-09 06:10:40 -06:00
|
|
|
}
|
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
initAuth := func(apis []rpc.API, port int, secret []byte) error {
|
|
|
|
// Enable auth via HTTP
|
|
|
|
server := n.httpAuth
|
2022-03-17 10:20:03 -05:00
|
|
|
if err := server.setListenAddr(n.config.AuthAddr, port); err != nil {
|
2022-03-07 01:30:27 -06:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := server.enableRPC(apis, httpConfig{
|
|
|
|
CorsAllowedOrigins: DefaultAuthCors,
|
2022-03-17 10:20:03 -05:00
|
|
|
Vhosts: n.config.AuthVirtualHosts,
|
2022-03-07 01:30:27 -06:00
|
|
|
Modules: DefaultAuthModules,
|
|
|
|
prefix: DefaultAuthPrefix,
|
|
|
|
jwtSecret: secret,
|
|
|
|
}); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
servers = append(servers, server)
|
|
|
|
// Enable auth via WS
|
|
|
|
server = n.wsServerForPort(port, true)
|
2022-03-17 10:20:03 -05:00
|
|
|
if err := server.setListenAddr(n.config.AuthAddr, port); err != nil {
|
2022-03-07 01:30:27 -06:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := server.enableWS(apis, wsConfig{
|
|
|
|
Modules: DefaultAuthModules,
|
|
|
|
Origins: DefaultAuthOrigins,
|
|
|
|
prefix: DefaultAuthPrefix,
|
|
|
|
jwtSecret: secret,
|
|
|
|
}); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
servers = append(servers, server)
|
|
|
|
return nil
|
|
|
|
}
|
2022-03-09 07:45:39 -06:00
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
// Set up HTTP.
|
|
|
|
if n.config.HTTPHost != "" {
|
|
|
|
// Configure legacy unauthenticated HTTP.
|
|
|
|
if err := initHttp(n.http, open, n.config.HTTPPort); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
// Configure WebSocket.
|
|
|
|
if n.config.WSHost != "" {
|
2022-03-07 01:30:27 -06:00
|
|
|
// legacy unauthenticated
|
|
|
|
if err := initWS(open, n.config.WSPort); err != nil {
|
|
|
|
return err
|
2020-08-03 12:40:46 -05:00
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
}
|
|
|
|
// Configure authenticated API
|
|
|
|
if len(open) != len(all) {
|
|
|
|
jwtSecret, err := n.obtainJWTSecret(n.config.JWTSecret)
|
|
|
|
if err != nil {
|
2020-08-03 12:40:46 -05:00
|
|
|
return err
|
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
if err := initAuth(all, n.config.AuthPort, jwtSecret); err != nil {
|
2020-08-03 12:40:46 -05:00
|
|
|
return err
|
|
|
|
}
|
2016-02-09 06:10:40 -06:00
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
// Start the servers
|
|
|
|
for _, server := range servers {
|
|
|
|
if err := server.start(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-02-05 05:45:36 -06:00
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
return nil
|
2016-02-05 05:45:36 -06:00
|
|
|
}
|
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
func (n *Node) wsServerForPort(port int, authenticated bool) *httpServer {
|
|
|
|
httpServer, wsServer := n.http, n.ws
|
|
|
|
if authenticated {
|
|
|
|
httpServer, wsServer = n.httpAuth, n.wsAuth
|
|
|
|
}
|
|
|
|
if n.config.HTTPHost == "" || httpServer.port == port {
|
|
|
|
return httpServer
|
2016-02-02 11:06:43 -06:00
|
|
|
}
|
2022-03-07 01:30:27 -06:00
|
|
|
return wsServer
|
2016-02-05 05:45:36 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
func (n *Node) stopRPC() {
|
|
|
|
n.http.stop()
|
|
|
|
n.ws.stop()
|
2022-03-07 01:30:27 -06:00
|
|
|
n.httpAuth.stop()
|
|
|
|
n.wsAuth.stop()
|
2020-08-03 12:40:46 -05:00
|
|
|
n.ipc.stop()
|
|
|
|
n.stopInProc()
|
2016-02-02 11:06:43 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// startInProc registers all RPC APIs on the inproc server.
|
|
|
|
func (n *Node) startInProc() error {
|
|
|
|
for _, api := range n.rpcAPIs {
|
|
|
|
if err := n.inprocHandler.RegisterName(api.Namespace, api.Service); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-02-05 05:45:36 -06:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
return nil
|
2016-02-05 05:45:36 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// stopInProc terminates the in-process RPC endpoint.
|
|
|
|
func (n *Node) stopInProc() {
|
|
|
|
n.inprocHandler.Stop()
|
2016-02-05 07:08:48 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// Wait blocks until the node is closed.
|
|
|
|
func (n *Node) Wait() {
|
|
|
|
<-n.stop
|
2016-02-05 07:08:48 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// RegisterLifecycle registers the given Lifecycle on the node.
|
|
|
|
func (n *Node) RegisterLifecycle(lifecycle Lifecycle) {
|
2015-11-05 15:57:57 -06:00
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
if n.state != initializingState {
|
|
|
|
panic("can't register lifecycle on running/stopped node")
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
if containsLifecycle(n.lifecycles, lifecycle) {
|
|
|
|
panic(fmt.Sprintf("attempt to register lifecycle %T more than once", lifecycle))
|
2016-08-18 06:28:17 -05:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
n.lifecycles = append(n.lifecycles, lifecycle)
|
|
|
|
}
|
2016-08-18 06:28:17 -05:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// RegisterProtocols adds backend's protocols to the node's p2p server.
|
|
|
|
func (n *Node) RegisterProtocols(protocols []p2p.Protocol) {
|
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
2016-08-15 11:38:32 -05:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
if n.state != initializingState {
|
|
|
|
panic("can't register protocols on running/stopped node")
|
2016-08-15 11:38:32 -05:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
n.server.Protocols = append(n.server.Protocols, protocols...)
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// RegisterAPIs registers the APIs a service provides on the node.
|
|
|
|
func (n *Node) RegisterAPIs(apis []rpc.API) {
|
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
2015-11-17 10:33:25 -06:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
if n.state != initializingState {
|
|
|
|
panic("can't register APIs on running/stopped node")
|
|
|
|
}
|
|
|
|
n.rpcAPIs = append(n.rpcAPIs, apis...)
|
2015-11-17 10:33:25 -06:00
|
|
|
}
|
|
|
|
|
2022-03-07 01:30:27 -06:00
|
|
|
// GetAPIs return two sets of APIs, both the ones that do not require
|
|
|
|
// authentication, and the complete set
|
|
|
|
func (n *Node) GetAPIs() (unauthenticated, all []rpc.API) {
|
|
|
|
for _, api := range n.rpcAPIs {
|
|
|
|
if !api.Authenticated {
|
|
|
|
unauthenticated = append(unauthenticated, api)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return unauthenticated, n.rpcAPIs
|
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// RegisterHandler mounts a handler on the given path on the canonical HTTP server.
|
|
|
|
//
|
|
|
|
// The name of the handler is shown in a log message when the HTTP server starts
|
|
|
|
// and should be a descriptive term for the service provided by the handler.
|
|
|
|
func (n *Node) RegisterHandler(name, path string, handler http.Handler) {
|
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
|
|
|
|
|
|
|
if n.state != initializingState {
|
|
|
|
panic("can't register HTTP handler on running/stopped node")
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
2021-02-02 03:05:46 -06:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
n.http.mux.Handle(path, handler)
|
|
|
|
n.http.handlerNames[path] = name
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
|
2016-02-09 06:10:40 -06:00
|
|
|
// Attach creates an RPC client attached to an in-process API handler.
|
2016-07-12 10:47:15 -05:00
|
|
|
func (n *Node) Attach() (*rpc.Client, error) {
|
|
|
|
return rpc.DialInProc(n.inprocHandler), nil
|
2016-02-09 06:10:40 -06:00
|
|
|
}
|
|
|
|
|
2017-09-25 03:08:07 -05:00
|
|
|
// RPCHandler returns the in-process RPC request handler.
|
|
|
|
func (n *Node) RPCHandler() (*rpc.Server, error) {
|
2020-08-03 12:40:46 -05:00
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
2017-09-25 03:08:07 -05:00
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
if n.state == closedState {
|
2017-09-25 03:08:07 -05:00
|
|
|
return nil, ErrNodeStopped
|
|
|
|
}
|
|
|
|
return n.inprocHandler, nil
|
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// Config returns the configuration of node.
|
|
|
|
func (n *Node) Config() *Config {
|
|
|
|
return n.config
|
|
|
|
}
|
|
|
|
|
2015-11-05 15:57:57 -06:00
|
|
|
// Server retrieves the currently running P2P network layer. This method is meant
|
2020-08-03 12:40:46 -05:00
|
|
|
// only to inspect fields of the currently running server. Callers should not
|
|
|
|
// start or stop the returned server.
|
2015-11-05 15:57:57 -06:00
|
|
|
func (n *Node) Server() *p2p.Server {
|
2020-08-03 12:40:46 -05:00
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
2015-11-05 15:57:57 -06:00
|
|
|
|
2015-11-17 10:33:25 -06:00
|
|
|
return n.server
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// DataDir retrieves the current datadir used by the protocol stack.
|
2016-11-10 10:03:24 -06:00
|
|
|
// Deprecated: No files should be stored in this directory, use InstanceDir instead.
|
2015-11-05 15:57:57 -06:00
|
|
|
func (n *Node) DataDir() string {
|
2016-08-18 06:28:17 -05:00
|
|
|
return n.config.DataDir
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
|
|
|
|
2016-11-10 10:03:24 -06:00
|
|
|
// InstanceDir retrieves the instance directory used by the protocol stack.
|
|
|
|
func (n *Node) InstanceDir() string {
|
|
|
|
return n.config.instanceDir()
|
|
|
|
}
|
|
|
|
|
2021-08-25 15:34:22 -05:00
|
|
|
// KeyStoreDir retrieves the key directory
|
|
|
|
func (n *Node) KeyStoreDir() string {
|
|
|
|
return n.keyDir
|
|
|
|
}
|
|
|
|
|
2016-08-15 11:38:32 -05:00
|
|
|
// AccountManager retrieves the account manager used by the protocol stack.
|
|
|
|
func (n *Node) AccountManager() *accounts.Manager {
|
|
|
|
return n.accman
|
|
|
|
}
|
|
|
|
|
2016-02-09 05:24:42 -06:00
|
|
|
// IPCEndpoint retrieves the current IPC endpoint used by the protocol stack.
|
|
|
|
func (n *Node) IPCEndpoint() string {
|
2020-08-03 12:40:46 -05:00
|
|
|
return n.ipc.endpoint
|
2016-02-02 11:06:43 -06:00
|
|
|
}
|
|
|
|
|
2021-02-02 03:05:46 -06:00
|
|
|
// HTTPEndpoint returns the URL of the HTTP server. Note that this URL does not
|
|
|
|
// contain the JSON-RPC path prefix set by HTTPPathPrefix.
|
2016-02-09 06:10:40 -06:00
|
|
|
func (n *Node) HTTPEndpoint() string {
|
2020-08-03 12:40:46 -05:00
|
|
|
return "http://" + n.http.listenAddr()
|
2016-02-09 06:10:40 -06:00
|
|
|
}
|
|
|
|
|
2021-02-02 03:05:46 -06:00
|
|
|
// WSEndpoint returns the current JSON-RPC over WebSocket endpoint.
|
2016-02-09 06:10:40 -06:00
|
|
|
func (n *Node) WSEndpoint() string {
|
2020-08-03 12:40:46 -05:00
|
|
|
if n.http.wsAllowed() {
|
2021-02-02 03:05:46 -06:00
|
|
|
return "ws://" + n.http.listenAddr() + n.http.wsConfig.prefix
|
2018-10-11 13:32:14 -05:00
|
|
|
}
|
2021-02-02 03:05:46 -06:00
|
|
|
return "ws://" + n.ws.listenAddr() + n.ws.wsConfig.prefix
|
2016-02-09 06:10:40 -06:00
|
|
|
}
|
|
|
|
|
2015-11-05 15:57:57 -06:00
|
|
|
// EventMux retrieves the event multiplexer used by all the network services in
|
|
|
|
// the current protocol stack.
|
|
|
|
func (n *Node) EventMux() *event.TypeMux {
|
2015-11-17 10:33:25 -06:00
|
|
|
return n.eventmux
|
2015-11-05 15:57:57 -06:00
|
|
|
}
|
2015-10-15 09:07:19 -05:00
|
|
|
|
2016-08-18 06:28:17 -05:00
|
|
|
// OpenDatabase opens an existing database with the given name (or creates one if no
|
|
|
|
// previous can be found) from within the node's instance directory. If the node is
|
|
|
|
// ephemeral, a memory database is returned.
|
2021-03-22 13:06:30 -05:00
|
|
|
func (n *Node) OpenDatabase(name string, cache, handles int, namespace string, readonly bool) (ethdb.Database, error) {
|
2020-08-03 12:40:46 -05:00
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
|
|
|
if n.state == closedState {
|
|
|
|
return nil, ErrNodeStopped
|
|
|
|
}
|
|
|
|
|
|
|
|
var db ethdb.Database
|
|
|
|
var err error
|
2016-08-18 06:28:17 -05:00
|
|
|
if n.config.DataDir == "" {
|
2020-08-03 12:40:46 -05:00
|
|
|
db = rawdb.NewMemoryDatabase()
|
|
|
|
} else {
|
2021-03-22 13:06:30 -05:00
|
|
|
db, err = rawdb.NewLevelDBDatabase(n.ResolvePath(name), cache, handles, namespace, readonly)
|
2016-08-18 06:28:17 -05:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
|
|
|
|
if err == nil {
|
|
|
|
db = n.wrapDatabase(db)
|
|
|
|
}
|
|
|
|
return db, err
|
2016-08-18 06:28:17 -05:00
|
|
|
}
|
|
|
|
|
2019-03-08 07:56:20 -06:00
|
|
|
// OpenDatabaseWithFreezer opens an existing database with the given name (or
|
|
|
|
// creates one if no previous can be found) from within the node's data directory,
|
|
|
|
// also attaching a chain freezer to it that moves ancient chain data from the
|
|
|
|
// database to immutable append-only files. If the node is an ephemeral one, a
|
|
|
|
// memory database is returned.
|
2021-03-22 13:06:30 -05:00
|
|
|
func (n *Node) OpenDatabaseWithFreezer(name string, cache, handles int, freezer, namespace string, readonly bool) (ethdb.Database, error) {
|
2020-08-03 12:40:46 -05:00
|
|
|
n.lock.Lock()
|
|
|
|
defer n.lock.Unlock()
|
|
|
|
if n.state == closedState {
|
|
|
|
return nil, ErrNodeStopped
|
|
|
|
}
|
|
|
|
|
|
|
|
var db ethdb.Database
|
|
|
|
var err error
|
2019-03-08 07:56:20 -06:00
|
|
|
if n.config.DataDir == "" {
|
2020-08-03 12:40:46 -05:00
|
|
|
db = rawdb.NewMemoryDatabase()
|
|
|
|
} else {
|
|
|
|
root := n.ResolvePath(name)
|
|
|
|
switch {
|
|
|
|
case freezer == "":
|
|
|
|
freezer = filepath.Join(root, "ancient")
|
|
|
|
case !filepath.IsAbs(freezer):
|
|
|
|
freezer = n.ResolvePath(freezer)
|
|
|
|
}
|
2021-03-22 13:06:30 -05:00
|
|
|
db, err = rawdb.NewLevelDBDatabaseWithFreezer(root, cache, handles, freezer, namespace, readonly)
|
2019-03-08 07:56:20 -06:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
if err == nil {
|
|
|
|
db = n.wrapDatabase(db)
|
2019-03-08 07:56:20 -06:00
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
return db, err
|
2019-03-08 07:56:20 -06:00
|
|
|
}
|
|
|
|
|
2016-08-18 06:28:17 -05:00
|
|
|
// ResolvePath returns the absolute path of a resource in the instance directory.
|
|
|
|
func (n *Node) ResolvePath(x string) string {
|
cmd, dashboard, log: log collection and exploration (#17097)
* cmd, dashboard, internal, log, node: logging feature
* cmd, dashboard, internal, log: requested changes
* dashboard, vendor: gofmt, govendor, use vendored file watcher
* dashboard, log: gofmt -s -w, goimports
* dashboard, log: gosimple
2018-07-11 02:59:04 -05:00
|
|
|
return n.config.ResolvePath(x)
|
2016-08-18 06:28:17 -05:00
|
|
|
}
|
|
|
|
|
2020-08-03 12:40:46 -05:00
|
|
|
// closeTrackingDB wraps the Close method of a database. When the database is closed by the
|
|
|
|
// service, the wrapper removes it from the node's database map. This ensures that Node
|
|
|
|
// won't auto-close the database if it is closed by the service that opened it.
|
|
|
|
type closeTrackingDB struct {
|
|
|
|
ethdb.Database
|
|
|
|
n *Node
|
|
|
|
}
|
|
|
|
|
|
|
|
func (db *closeTrackingDB) Close() error {
|
|
|
|
db.n.lock.Lock()
|
|
|
|
delete(db.n.databases, db)
|
|
|
|
db.n.lock.Unlock()
|
|
|
|
return db.Database.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
// wrapDatabase ensures the database will be auto-closed when Node is closed.
|
|
|
|
func (n *Node) wrapDatabase(db ethdb.Database) ethdb.Database {
|
|
|
|
wrapper := &closeTrackingDB{db, n}
|
|
|
|
n.databases[wrapper] = struct{}{}
|
|
|
|
return wrapper
|
|
|
|
}
|
|
|
|
|
|
|
|
// closeDatabases closes all open databases.
|
|
|
|
func (n *Node) closeDatabases() (errors []error) {
|
|
|
|
for db := range n.databases {
|
|
|
|
delete(n.databases, db)
|
|
|
|
if err := db.Database.Close(); err != nil {
|
|
|
|
errors = append(errors, err)
|
2020-04-08 06:33:12 -05:00
|
|
|
}
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
return errors
|
2020-04-08 06:33:12 -05:00
|
|
|
}
|