Coverage Report

Created: 2026-04-29 19:21

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/tmp/bitcoin/src/httprpc.cpp
Line
Count
Source
1
// Copyright (c) 2015-present The Bitcoin Core developers
2
// Distributed under the MIT software license, see the accompanying
3
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5
#include <httprpc.h>
6
7
#include <common/args.h>
8
#include <crypto/hmac_sha256.h>
9
#include <httpserver.h>
10
#include <logging.h>
11
#include <netaddress.h>
12
#include <rpc/protocol.h>
13
#include <rpc/server.h>
14
#include <util/fs.h>
15
#include <util/fs_helpers.h>
16
#include <util/strencodings.h>
17
#include <util/string.h>
18
#include <walletinitinterface.h>
19
20
#include <algorithm>
21
#include <iterator>
22
#include <map>
23
#include <memory>
24
#include <optional>
25
#include <set>
26
#include <string>
27
#include <vector>
28
29
using util::SplitString;
30
using util::TrimStringView;
31
32
/** WWW-Authenticate to present with 401 Unauthorized response */
33
static const char* WWW_AUTH_HEADER_DATA = "Basic realm=\"jsonrpc\"";
34
35
/* List of -rpcauth values */
36
static std::vector<std::vector<std::string>> g_rpcauth;
37
/* RPC Auth Whitelist */
38
static std::map<std::string, std::set<std::string>> g_rpc_whitelist;
39
static bool g_rpc_whitelist_default = false;
40
41
static UniValue JSONErrorReply(UniValue objError, const JSONRPCRequest& jreq, HTTPStatusCode& nStatus)
42
6
{
43
    // HTTP errors should never be returned if JSON-RPC v2 was requested. This
44
    // function should only be called when a v1 request fails or when a request
45
    // cannot be parsed, so the version is unknown.
46
6
    Assume(jreq.m_json_version != JSONRPCVersion::V2);
47
48
    // Send error reply from json-rpc error object
49
6
    nStatus = HTTP_INTERNAL_SERVER_ERROR;
50
6
    int code = objError.find_value("code").getInt<int>();
51
52
6
    if (code == RPC_INVALID_REQUEST)
53
2
        nStatus = HTTP_BAD_REQUEST;
54
4
    else if (code == RPC_METHOD_NOT_FOUND)
55
1
        nStatus = HTTP_NOT_FOUND;
56
57
6
    return JSONRPCReplyObj(NullUniValue, std::move(objError), jreq.id, jreq.m_json_version);
58
6
}
59
60
//This function checks username and password against -rpcauth
61
//entries from config file.
62
static bool CheckUserAuthorized(std::string_view user, std::string_view pass)
63
170k
{
64
170k
    for (const auto& fields : g_rpcauth) {
65
170k
        if (!TimingResistantEqual(std::string_view(fields[0]), user)) {
66
159
            continue;
67
159
        }
68
69
170k
        const std::string& salt = fields[1];
70
170k
        const std::string& hash = fields[2];
71
72
170k
        std::array<unsigned char, CHMAC_SHA256::OUTPUT_SIZE> out;
73
170k
        CHMAC_SHA256(UCharCast(salt.data()), salt.size()).Write(UCharCast(pass.data()), pass.size()).Finalize(out.data());
74
170k
        std::string hash_from_pass = HexStr(out);
75
76
170k
        if (TimingResistantEqual(hash_from_pass, hash)) {
77
170k
            return true;
78
170k
        }
79
170k
    }
80
22
    return false;
81
170k
}
82
83
static bool RPCAuthorized(const std::string& strAuth, std::string& strAuthUsernameOut)
84
170k
{
85
170k
    if (!strAuth.starts_with("Basic "))
86
3
        return false;
87
170k
    std::string_view strUserPass64 = TrimStringView(std::string_view{strAuth}.substr(6));
88
170k
    auto userpass_data = DecodeBase64(strUserPass64);
89
170k
    std::string strUserPass;
90
170k
    if (!userpass_data) return false;
91
170k
    strUserPass.assign(userpass_data->begin(), userpass_data->end());
92
93
170k
    size_t colon_pos = strUserPass.find(':');
94
170k
    if (colon_pos == std::string::npos) {
95
1
        return false; // Invalid basic auth.
96
1
    }
97
170k
    std::string user = strUserPass.substr(0, colon_pos);
98
170k
    std::string pass = strUserPass.substr(colon_pos + 1);
99
170k
    strAuthUsernameOut = user;
100
170k
    return CheckUserAuthorized(user, pass);
101
170k
}
102
103
UniValue ExecuteHTTPRPC(const UniValue& valRequest, JSONRPCRequest& jreq, HTTPStatusCode& status)
104
170k
{
105
170k
    status = HTTP_OK;
106
170k
    try {
107
170k
        bool user_has_whitelist = g_rpc_whitelist.contains(jreq.authUser);
108
170k
        if (!user_has_whitelist && g_rpc_whitelist_default) {
109
4
            LogWarning("RPC User %s not allowed to call any methods", jreq.authUser);
110
4
            status = HTTP_FORBIDDEN;
111
4
            return {};
112
113
        // singleton request
114
170k
        } else if (valRequest.isObject()) {
115
170k
            jreq.parse(valRequest);
116
170k
            if (user_has_whitelist && !g_rpc_whitelist[jreq.authUser].contains(jreq.strMethod)) {
117
11
                LogWarning("RPC User %s not allowed to call method %s", jreq.authUser, jreq.strMethod);
118
11
                status = HTTP_FORBIDDEN;
119
11
                return {};
120
11
            }
121
122
            // Legacy 1.0/1.1 behavior is for failed requests to throw
123
            // exceptions which return HTTP errors and RPC errors to the client.
124
            // 2.0 behavior is to catch exceptions and return HTTP success with
125
            // RPC errors, as long as there is not an actual HTTP server error.
126
170k
            const bool catch_errors{jreq.m_json_version == JSONRPCVersion::V2};
127
170k
            UniValue reply{JSONRPCExec(jreq, catch_errors)};
128
170k
            if (jreq.IsNotification()) {
129
                // Even though we do execute notifications, we do not respond to them
130
2
                status = HTTP_NO_CONTENT;
131
2
                return {};
132
2
            }
133
170k
            return reply;
134
        // array of requests
135
170k
        } else if (valRequest.isArray()) {
136
            // Check authorization for each request's method
137
169
            if (user_has_whitelist) {
138
0
                for (unsigned int reqIdx = 0; reqIdx < valRequest.size(); reqIdx++) {
139
0
                    if (!valRequest[reqIdx].isObject()) {
140
0
                        throw JSONRPCError(RPC_INVALID_REQUEST, "Invalid Request object");
141
0
                    } else {
142
0
                        const UniValue& request = valRequest[reqIdx].get_obj();
143
                        // Parse method
144
0
                        std::string strMethod = request.find_value("method").get_str();
145
0
                        if (!g_rpc_whitelist[jreq.authUser].contains(strMethod)) {
146
0
                            LogWarning("RPC User %s not allowed to call method %s", jreq.authUser, strMethod);
147
0
                            status = HTTP_FORBIDDEN;
148
0
                            return {};
149
0
                        }
150
0
                    }
151
0
                }
152
0
            }
153
154
            // Execute each request
155
169
            UniValue reply = UniValue::VARR;
156
14.0k
            for (size_t i{0}; i < valRequest.size(); ++i) {
157
                // Batches never throw HTTP errors, they are always just included
158
                // in "HTTP OK" responses. Notifications never get any response.
159
13.8k
                UniValue response;
160
13.8k
                try {
161
13.8k
                    jreq.parse(valRequest[i]);
162
13.8k
                    response = JSONRPCExec(jreq, /*catch_errors=*/true);
163
13.8k
                } catch (UniValue& e) {
164
12
                    response = JSONRPCReplyObj(NullUniValue, std::move(e), jreq.id, jreq.m_json_version);
165
12
                } catch (const std::exception& e) {
166
0
                    response = JSONRPCReplyObj(NullUniValue, JSONRPCError(RPC_PARSE_ERROR, e.what()), jreq.id, jreq.m_json_version);
167
0
                }
168
13.8k
                if (!jreq.IsNotification()) {
169
13.8k
                    reply.push_back(std::move(response));
170
13.8k
                }
171
13.8k
            }
172
            // Return no response for an all-notification batch, but only if the
173
            // batch request is non-empty. Technically according to the JSON-RPC
174
            // 2.0 spec, an empty batch request should also return no response,
175
            // However, if the batch request is empty, it means the request did
176
            // not contain any JSON-RPC version numbers, so returning an empty
177
            // response could break backwards compatibility with old RPC clients
178
            // relying on previous behavior. Return an empty array instead of an
179
            // empty response in this case to favor being backwards compatible
180
            // over complying with the JSON-RPC 2.0 spec in this case.
181
169
            if (reply.size() == 0 && valRequest.size() > 0) {
182
1
                status = HTTP_NO_CONTENT;
183
1
                return {};
184
1
            }
185
168
            return reply;
186
169
        }
187
0
        else
188
0
            throw JSONRPCError(RPC_PARSE_ERROR, "Top-level object parse error");
189
170k
    } catch (UniValue& e) {
190
4
        return JSONErrorReply(std::move(e), jreq, status);
191
4
    } catch (const std::exception& e) {
192
0
        return JSONErrorReply(JSONRPCError(RPC_PARSE_ERROR, e.what()), jreq, status);
193
0
    }
194
170k
}
195
196
static void HTTPReq_JSONRPC(const std::any& context, HTTPRequest* req)
197
170k
{
198
    // JSONRPC handles only POST
199
170k
    if (req->GetRequestMethod() != HTTPRequest::POST) {
200
6
        req->WriteReply(HTTP_BAD_METHOD, "JSONRPC server handles only POST requests");
201
6
        return;
202
6
    }
203
    // Check authorization
204
170k
    std::pair<bool, std::string> authHeader = req->GetHeader("authorization");
205
170k
    if (!authHeader.first) {
206
0
        req->WriteHeader("WWW-Authenticate", WWW_AUTH_HEADER_DATA);
207
0
        req->WriteReply(HTTP_UNAUTHORIZED);
208
0
        return;
209
0
    }
210
211
170k
    JSONRPCRequest jreq;
212
170k
    jreq.context = context;
213
170k
    jreq.peerAddr = req->GetPeer().ToStringAddrPort();
214
170k
    jreq.URI = req->GetURI();
215
170k
    if (!RPCAuthorized(authHeader.second, jreq.authUser)) {
216
26
        LogWarning("ThreadRPCServer incorrect password attempt from %s", jreq.peerAddr);
217
218
        /* Deter brute-forcing
219
           If this results in a DoS the user really
220
           shouldn't have their RPC port exposed. */
221
26
        UninterruptibleSleep(std::chrono::milliseconds{250});
222
223
26
        req->WriteHeader("WWW-Authenticate", WWW_AUTH_HEADER_DATA);
224
26
        req->WriteReply(HTTP_UNAUTHORIZED);
225
26
        return;
226
26
    }
227
228
    // Generate reply
229
170k
    HTTPStatusCode status;
230
170k
    UniValue reply;
231
170k
    UniValue request;
232
170k
    if (request.read(req->ReadBody())) {
233
170k
        reply = ExecuteHTTPRPC(request, jreq, status);
234
170k
    } else {
235
2
        reply = JSONErrorReply(JSONRPCError(RPC_PARSE_ERROR, "Parse error"), jreq, status);
236
2
    }
237
238
    // Write reply
239
170k
    if (reply.isNull()) {
240
        // Error case or no-content notification reply.
241
18
        req->WriteReply(status);
242
170k
    } else {
243
170k
        req->WriteHeader("Content-Type", "application/json");
244
170k
        req->WriteReply(status, reply.write() + "\n");
245
170k
    }
246
170k
}
247
248
static bool InitRPCAuthentication()
249
1.09k
{
250
1.09k
    std::string user;
251
1.09k
    std::string pass;
252
253
1.09k
    if (gArgs.GetArg("-rpcpassword", "") == "")
254
1.09k
    {
255
1.09k
        std::optional<fs::perms> cookie_perms{std::nullopt};
256
1.09k
        auto cookie_perms_arg{gArgs.GetArg("-rpccookieperms")};
257
1.09k
        if (cookie_perms_arg) {
258
3
            auto perm_opt = InterpretPermString(*cookie_perms_arg);
259
3
            if (!perm_opt) {
260
0
                LogError("Invalid -rpccookieperms=%s; must be one of 'owner', 'group', or 'all'.", *cookie_perms_arg);
261
0
                return false;
262
0
            }
263
3
            cookie_perms = *perm_opt;
264
3
        }
265
266
1.09k
        switch (GenerateAuthCookie(cookie_perms, user, pass)) {
267
1
        case AuthCookieResult::Error:
268
1
            return false;
269
1
        case AuthCookieResult::Disabled:
270
1
            LogInfo("RPC authentication cookie file generation is disabled.");
271
1
            break;
272
1.09k
        case AuthCookieResult::Ok:
273
1.09k
            LogInfo("Using random cookie authentication.");
274
1.09k
            break;
275
1.09k
        }
276
1.09k
    } else {
277
1
        LogInfo("Using rpcuser/rpcpassword authentication.");
278
1
        LogWarning("The use of rpcuser/rpcpassword is less secure, because credentials are configured in plain text. It is recommended that locally-run instances switch to cookie-based auth, or otherwise to use hashed rpcauth credentials. See share/rpcauth in the source directory for more information.");
279
1
        user = gArgs.GetArg("-rpcuser", "");
280
1
        pass = gArgs.GetArg("-rpcpassword", "");
281
1
    }
282
283
    // If there is a plaintext credential, hash it with a random salt before storage.
284
1.09k
    if (!user.empty() || !pass.empty()) {
285
        // Generate a random 16 byte hex salt.
286
1.09k
        std::array<unsigned char, 16> raw_salt;
287
1.09k
        GetStrongRandBytes(raw_salt);
288
1.09k
        std::string salt = HexStr(raw_salt);
289
290
        // Compute HMAC.
291
1.09k
        std::array<unsigned char, CHMAC_SHA256::OUTPUT_SIZE> out;
292
1.09k
        CHMAC_SHA256(UCharCast(salt.data()), salt.size()).Write(UCharCast(pass.data()), pass.size()).Finalize(out.data());
293
1.09k
        std::string hash = HexStr(out);
294
295
1.09k
        g_rpcauth.push_back({user, salt, hash});
296
1.09k
    }
297
298
1.09k
    if (!gArgs.GetArgs("-rpcauth").empty()) {
299
18
        LogInfo("Using rpcauth authentication.\n");
300
51
        for (const std::string& rpcauth : gArgs.GetArgs("-rpcauth")) {
301
51
            std::vector<std::string> fields{SplitString(rpcauth, ':')};
302
51
            const std::vector<std::string> salt_hmac{SplitString(fields.back(), '$')};
303
51
            if (fields.size() == 2 && salt_hmac.size() == 2) {
304
40
                fields.pop_back();
305
40
                fields.insert(fields.end(), salt_hmac.begin(), salt_hmac.end());
306
40
                g_rpcauth.push_back(fields);
307
40
            } else {
308
11
                LogWarning("Invalid -rpcauth argument.");
309
11
                return false;
310
11
            }
311
51
        }
312
18
    }
313
314
1.08k
    g_rpc_whitelist_default = gArgs.GetBoolArg("-rpcwhitelistdefault", !gArgs.GetArgs("-rpcwhitelist").empty());
315
1.08k
    for (const std::string& strRPCWhitelist : gArgs.GetArgs("-rpcwhitelist")) {
316
26
        auto pos = strRPCWhitelist.find(':');
317
26
        std::string strUser = strRPCWhitelist.substr(0, pos);
318
26
        bool intersect = g_rpc_whitelist.contains(strUser);
319
26
        std::set<std::string>& whitelist = g_rpc_whitelist[strUser];
320
26
        if (pos != std::string::npos) {
321
23
            std::string strWhitelist = strRPCWhitelist.substr(pos + 1);
322
23
            std::vector<std::string> whitelist_split = SplitString(strWhitelist, ", ");
323
23
            std::set<std::string> new_whitelist{
324
23
                std::make_move_iterator(whitelist_split.begin()),
325
23
                std::make_move_iterator(whitelist_split.end())};
326
23
            if (intersect) {
327
3
                std::set<std::string> tmp_whitelist;
328
3
                std::set_intersection(new_whitelist.begin(), new_whitelist.end(),
329
3
                       whitelist.begin(), whitelist.end(), std::inserter(tmp_whitelist, tmp_whitelist.end()));
330
3
                new_whitelist = std::move(tmp_whitelist);
331
3
            }
332
23
            whitelist = std::move(new_whitelist);
333
23
        }
334
26
    }
335
336
1.08k
    return true;
337
1.09k
}
338
339
bool StartHTTPRPC(const std::any& context)
340
1.09k
{
341
1.09k
    LogDebug(BCLog::RPC, "Starting HTTP RPC server\n");
342
1.09k
    if (!InitRPCAuthentication())
343
12
        return false;
344
345
170k
    auto handle_rpc = [context](HTTPRequest* req, const std::string&) { return HTTPReq_JSONRPC(context, req); };
346
1.08k
    RegisterHTTPHandler("/", true, handle_rpc);
347
1.08k
    if (g_wallet_init_interface.HasWalletSupport()) {
348
1.08k
        RegisterHTTPHandler("/wallet/", false, handle_rpc);
349
1.08k
    }
350
1.08k
    struct event_base* eventBase = EventBase();
351
1.08k
    assert(eventBase);
352
1.08k
    return true;
353
1.08k
}
354
355
void InterruptHTTPRPC()
356
1.13k
{
357
1.13k
    LogDebug(BCLog::RPC, "Interrupting HTTP RPC server\n");
358
1.13k
}
359
360
void StopHTTPRPC()
361
1.13k
{
362
1.13k
    LogDebug(BCLog::RPC, "Stopping HTTP RPC server\n");
363
1.13k
    UnregisterHTTPHandler("/", true);
364
1.13k
    if (g_wallet_init_interface.HasWalletSupport()) {
365
1.13k
        UnregisterHTTPHandler("/wallet/", false);
366
1.13k
    }
367
1.13k
}