Branch data Line data Source code
1 : : // Copyright (c) 2009-2021 The Bitcoin Core developers
2 : : // Distributed under the MIT software license, see the accompanying
3 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 : :
5 : : #include <common/messages.h>
6 : : #include <common/system.h>
7 : : #include <net_permissions.h>
8 : : #include <netbase.h>
9 : : #include <util/translation.h>
10 : :
11 : : using common::ResolveErrMsg;
12 : :
13 : : const std::vector<std::string> NET_PERMISSIONS_DOC{
14 : : "bloomfilter (allow requesting BIP37 filtered blocks and transactions)",
15 : : "noban (do not ban for misbehavior; implies download)",
16 : : "forcerelay (relay transactions that are already in the mempool; implies relay)",
17 : : "relay (relay even in -blocksonly mode, and unlimited transaction announcements)",
18 : : "mempool (allow requesting BIP35 mempool contents)",
19 : : "download (allow getheaders during IBD, no disconnect after maxuploadtarget limit)",
20 : : "addr (responses to GETADDR avoid hitting the cache and contain random records with the most up-to-date info)"
21 : : };
22 : :
23 : : namespace {
24 : :
25 : : // Parse the following format: "perm1,perm2@xxxxxx"
26 : 676 : static bool TryParsePermissionFlags(const std::string& str, NetPermissionFlags& output, ConnectionDirection* output_connection_direction, size_t& readen, bilingual_str& error)
27 : : {
28 : 676 : NetPermissionFlags flags = NetPermissionFlags::None;
29 : 676 : ConnectionDirection connection_direction = ConnectionDirection::None;
30 : 676 : const auto atSeparator = str.find('@');
31 : :
32 : : // if '@' is not found (ie, "xxxxx"), the caller should apply implicit permissions
33 [ + + ]: 676 : if (atSeparator == std::string::npos) {
34 : 380 : NetPermissions::AddFlag(flags, NetPermissionFlags::Implicit);
35 : 380 : readen = 0;
36 : : }
37 : : // else (ie, "perm1,perm2@xxxxx"), let's enumerate the permissions by splitting by ',' and calculate the flags
38 : : else {
39 : 296 : readen = 0;
40 : : // permissions == perm1,perm2
41 : 296 : const auto permissions = str.substr(0, atSeparator);
42 [ + + ]: 11839 : while (readen < permissions.length()) {
43 : 11366 : const auto commaSeparator = permissions.find(',', readen);
44 [ + + ]: 11366 : const auto len = commaSeparator == std::string::npos ? permissions.length() - readen : commaSeparator - readen;
45 : : // permission == perm1
46 [ + - ]: 11366 : const auto permission = permissions.substr(readen, len);
47 : 11366 : readen += len; // We read "perm1"
48 [ + + ]: 11366 : if (commaSeparator != std::string::npos) readen++; // We read ","
49 : :
50 [ + + + + ]: 11366 : if (permission == "bloomfilter" || permission == "bloom") NetPermissions::AddFlag(flags, NetPermissionFlags::BloomFilter);
51 [ + + ]: 11004 : else if (permission == "noban") NetPermissions::AddFlag(flags, NetPermissionFlags::NoBan);
52 [ + + ]: 10713 : else if (permission == "forcerelay") NetPermissions::AddFlag(flags, NetPermissionFlags::ForceRelay);
53 [ + + ]: 10621 : else if (permission == "mempool") NetPermissions::AddFlag(flags, NetPermissionFlags::Mempool);
54 [ + + ]: 10418 : else if (permission == "download") NetPermissions::AddFlag(flags, NetPermissionFlags::Download);
55 [ + + ]: 10190 : else if (permission == "all") NetPermissions::AddFlag(flags, NetPermissionFlags::All);
56 [ + + ]: 9801 : else if (permission == "relay") NetPermissions::AddFlag(flags, NetPermissionFlags::Relay);
57 [ + + ]: 9524 : else if (permission == "addr") NetPermissions::AddFlag(flags, NetPermissionFlags::Addr);
58 [ + + ]: 9227 : else if (permission == "in") connection_direction |= ConnectionDirection::In;
59 [ + + ]: 7912 : else if (permission == "out") {
60 [ + + ]: 500 : if (output_connection_direction == nullptr) {
61 : : // Only NetWhitebindPermissions() should pass a nullptr.
62 [ + - ]: 55 : error = _("whitebind may only be used for incoming connections (\"out\" was passed)");
63 : 55 : return false;
64 : : }
65 : 445 : connection_direction |= ConnectionDirection::Out;
66 : : }
67 [ + + ]: 7412 : else if (permission.length() == 0); // Allow empty entries
68 : : else {
69 [ + - + - ]: 128 : error = strprintf(_("Invalid P2P permission: '%s'"), permission);
70 : 64 : return false;
71 : : }
72 : 11366 : }
73 : 177 : readen++;
74 : 119 : }
75 : :
76 : : // By default, whitelist only applies to incoming connections
77 [ + + ]: 557 : if (connection_direction == ConnectionDirection::None) {
78 : : connection_direction = ConnectionDirection::In;
79 [ + + ]: 47 : } else if (flags == NetPermissionFlags::None) {
80 [ + - ]: 20 : error = strprintf(_("Only direction was set, no permissions: '%s'"), str);
81 : 10 : return false;
82 : : }
83 : :
84 : 547 : output = flags;
85 [ + + ]: 547 : if (output_connection_direction) *output_connection_direction = connection_direction;
86 [ + - ]: 1094 : error = Untranslated("");
87 : 547 : return true;
88 : : }
89 : :
90 : : }
91 : :
92 : 156 : std::vector<std::string> NetPermissions::ToStrings(NetPermissionFlags flags)
93 : : {
94 : 156 : std::vector<std::string> strings;
95 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::BloomFilter)) strings.emplace_back("bloomfilter");
96 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::NoBan)) strings.emplace_back("noban");
97 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::ForceRelay)) strings.emplace_back("forcerelay");
98 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::Relay)) strings.emplace_back("relay");
99 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::Mempool)) strings.emplace_back("mempool");
100 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::Download)) strings.emplace_back("download");
101 [ + + + - ]: 156 : if (NetPermissions::HasFlag(flags, NetPermissionFlags::Addr)) strings.emplace_back("addr");
102 : 156 : return strings;
103 : 0 : }
104 : :
105 : 338 : bool NetWhitebindPermissions::TryParse(const std::string& str, NetWhitebindPermissions& output, bilingual_str& error)
106 : : {
107 : 338 : NetPermissionFlags flags;
108 : 338 : size_t offset;
109 [ + + ]: 338 : if (!TryParsePermissionFlags(str, flags, /*output_connection_direction=*/nullptr, offset, error)) return false;
110 : :
111 : 258 : const std::string strBind = str.substr(offset);
112 [ + - + - ]: 258 : const std::optional<CService> addrBind{Lookup(strBind, 0, false)};
113 [ + + ]: 258 : if (!addrBind.has_value()) {
114 [ + - + - ]: 428 : error = ResolveErrMsg("whitebind", strBind);
115 : 214 : return false;
116 : : }
117 [ + - + + ]: 44 : if (addrBind.value().GetPort() == 0) {
118 [ + - + - ]: 66 : error = strprintf(_("Need to specify a port with -whitebind: '%s'"), strBind);
119 : 33 : return false;
120 : : }
121 : :
122 : 11 : output.m_flags = flags;
123 [ + - ]: 11 : output.m_service = addrBind.value();
124 [ + - + - ]: 22 : error = Untranslated("");
125 : 11 : return true;
126 : 258 : }
127 : :
128 : 338 : bool NetWhitelistPermissions::TryParse(const std::string& str, NetWhitelistPermissions& output, ConnectionDirection& output_connection_direction, bilingual_str& error)
129 : : {
130 : 338 : NetPermissionFlags flags;
131 : 338 : size_t offset;
132 : : // Only NetWhitebindPermissions should pass a nullptr for output_connection_direction.
133 [ + + ]: 338 : if (!TryParsePermissionFlags(str, flags, &output_connection_direction, offset, error)) return false;
134 : :
135 : 289 : const std::string net = str.substr(offset);
136 [ + - ]: 289 : const CSubNet subnet{LookupSubNet(net)};
137 [ + - + + ]: 289 : if (!subnet.IsValid()) {
138 [ + - + - ]: 444 : error = strprintf(_("Invalid netmask specified in -whitelist: '%s'"), net);
139 : 222 : return false;
140 : : }
141 : :
142 : 67 : output.m_flags = flags;
143 : 67 : output.m_subnet = subnet;
144 [ + - + - ]: 134 : error = Untranslated("");
145 : 67 : return true;
146 : 289 : }
|