LCOV - code coverage report
Current view: top level - src - net_permissions.cpp (source / functions) Coverage Total Hit
Test: total_coverage.info Lines: 98.8 % 85 84
Test Date: 2024-11-04 05:10:19 Functions: 100.0 % 4 4
Branches: 76.2 % 122 93

             Branch data     Line data    Source code
       1                 :             : // Copyright (c) 2009-2021 The Bitcoin Core developers
       2                 :             : // Distributed under the MIT software license, see the accompanying
       3                 :             : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
       4                 :             : 
       5                 :             : #include <common/messages.h>
       6                 :             : #include <common/system.h>
       7                 :             : #include <net_permissions.h>
       8                 :             : #include <netbase.h>
       9                 :             : #include <util/translation.h>
      10                 :             : 
      11                 :             : using common::ResolveErrMsg;
      12                 :             : 
      13                 :             : const std::vector<std::string> NET_PERMISSIONS_DOC{
      14                 :             :     "bloomfilter (allow requesting BIP37 filtered blocks and transactions)",
      15                 :             :     "noban (do not ban for misbehavior; implies download)",
      16                 :             :     "forcerelay (relay transactions that are already in the mempool; implies relay)",
      17                 :             :     "relay (relay even in -blocksonly mode, and unlimited transaction announcements)",
      18                 :             :     "mempool (allow requesting BIP35 mempool contents)",
      19                 :             :     "download (allow getheaders during IBD, no disconnect after maxuploadtarget limit)",
      20                 :             :     "addr (responses to GETADDR avoid hitting the cache and contain random records with the most up-to-date info)"
      21                 :             : };
      22                 :             : 
      23                 :             : namespace {
      24                 :             : 
      25                 :             : // Parse the following format: "perm1,perm2@xxxxxx"
      26                 :         169 : static bool TryParsePermissionFlags(const std::string& str, NetPermissionFlags& output, ConnectionDirection* output_connection_direction, size_t& readen, bilingual_str& error)
      27                 :             : {
      28                 :         169 :     NetPermissionFlags flags = NetPermissionFlags::None;
      29                 :         169 :     ConnectionDirection connection_direction = ConnectionDirection::None;
      30                 :         169 :     const auto atSeparator = str.find('@');
      31                 :             : 
      32                 :             :     // if '@' is not found (ie, "xxxxx"), the caller should apply implicit permissions
      33         [ +  + ]:         169 :     if (atSeparator == std::string::npos) {
      34                 :           9 :         NetPermissions::AddFlag(flags, NetPermissionFlags::Implicit);
      35                 :           9 :         readen = 0;
      36                 :             :     }
      37                 :             :     // else (ie, "perm1,perm2@xxxxx"), let's enumerate the permissions by splitting by ',' and calculate the flags
      38                 :             :     else {
      39                 :         160 :         readen = 0;
      40                 :             :         // permissions == perm1,perm2
      41                 :         160 :         const auto permissions = str.substr(0, atSeparator);
      42         [ +  + ]:         716 :         while (readen < permissions.length()) {
      43                 :         399 :             const auto commaSeparator = permissions.find(',', readen);
      44         [ +  + ]:         399 :             const auto len = commaSeparator == std::string::npos ? permissions.length() - readen : commaSeparator - readen;
      45                 :             :             // permission == perm1
      46         [ +  - ]:         399 :             const auto permission = permissions.substr(readen, len);
      47                 :         399 :             readen += len; // We read "perm1"
      48         [ +  + ]:         399 :             if (commaSeparator != std::string::npos) readen++; // We read ","
      49                 :             : 
      50   [ +  +  +  + ]:         399 :             if (permission == "bloomfilter" || permission == "bloom") NetPermissions::AddFlag(flags, NetPermissionFlags::BloomFilter);
      51         [ +  + ]:         385 :             else if (permission == "noban") NetPermissions::AddFlag(flags, NetPermissionFlags::NoBan);
      52         [ +  + ]:         252 :             else if (permission == "forcerelay") NetPermissions::AddFlag(flags, NetPermissionFlags::ForceRelay);
      53         [ +  + ]:         242 :             else if (permission == "mempool") NetPermissions::AddFlag(flags, NetPermissionFlags::Mempool);
      54         [ +  + ]:         239 :             else if (permission == "download") NetPermissions::AddFlag(flags, NetPermissionFlags::Download);
      55         [ +  + ]:         235 :             else if (permission == "all") NetPermissions::AddFlag(flags, NetPermissionFlags::All);
      56         [ +  + ]:         233 :             else if (permission == "relay") NetPermissions::AddFlag(flags, NetPermissionFlags::Relay);
      57         [ +  + ]:         225 :             else if (permission == "addr") NetPermissions::AddFlag(flags, NetPermissionFlags::Addr);
      58         [ +  + ]:         220 :             else if (permission == "in") connection_direction |= ConnectionDirection::In;
      59         [ +  + ]:         114 :             else if (permission == "out") {
      60         [ +  + ]:         108 :                 if (output_connection_direction == nullptr) {
      61                 :             :                     // Only NetWhitebindPermissions() should pass a nullptr.
      62         [ +  - ]:           1 :                     error = _("whitebind may only be used for incoming connections (\"out\" was passed)");
      63                 :           1 :                     return false;
      64                 :             :                 }
      65                 :         107 :                 connection_direction |= ConnectionDirection::Out;
      66                 :             :             }
      67         [ +  + ]:           6 :             else if (permission.length() == 0); // Allow empty entries
      68                 :             :             else {
      69   [ +  -  +  - ]:           4 :                 error = strprintf(_("Invalid P2P permission: '%s'"), permission);
      70                 :           2 :                 return false;
      71                 :             :             }
      72                 :         399 :         }
      73                 :         157 :         readen++;
      74                 :           3 :     }
      75                 :             : 
      76                 :             :     // By default, whitelist only applies to incoming connections
      77         [ +  + ]:         166 :     if (connection_direction == ConnectionDirection::None) {
      78                 :             :         connection_direction = ConnectionDirection::In;
      79         [ +  + ]:         108 :     } else if (flags == NetPermissionFlags::None) {
      80         [ +  - ]:           2 :         error = strprintf(_("Only direction was set, no permissions: '%s'"), str);
      81                 :           1 :         return false;
      82                 :             :     }
      83                 :             : 
      84                 :         165 :     output = flags;
      85         [ +  + ]:         165 :     if (output_connection_direction) *output_connection_direction = connection_direction;
      86         [ +  - ]:         330 :     error = Untranslated("");
      87                 :         165 :     return true;
      88                 :             : }
      89                 :             : 
      90                 :             : }
      91                 :             : 
      92                 :       13501 : std::vector<std::string> NetPermissions::ToStrings(NetPermissionFlags flags)
      93                 :             : {
      94                 :       13501 :     std::vector<std::string> strings;
      95   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::BloomFilter)) strings.emplace_back("bloomfilter");
      96   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::NoBan)) strings.emplace_back("noban");
      97   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::ForceRelay)) strings.emplace_back("forcerelay");
      98   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::Relay)) strings.emplace_back("relay");
      99   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::Mempool)) strings.emplace_back("mempool");
     100   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::Download)) strings.emplace_back("download");
     101   [ +  +  +  - ]:       13501 :     if (NetPermissions::HasFlag(flags, NetPermissionFlags::Addr)) strings.emplace_back("addr");
     102                 :       13501 :     return strings;
     103                 :           0 : }
     104                 :             : 
     105                 :          23 : bool NetWhitebindPermissions::TryParse(const std::string& str, NetWhitebindPermissions& output, bilingual_str& error)
     106                 :             : {
     107                 :          23 :     NetPermissionFlags flags;
     108                 :          23 :     size_t offset;
     109         [ +  + ]:          23 :     if (!TryParsePermissionFlags(str, flags, /*output_connection_direction=*/nullptr, offset, error)) return false;
     110                 :             : 
     111                 :          21 :     const std::string strBind = str.substr(offset);
     112   [ +  -  +  - ]:          21 :     const std::optional<CService> addrBind{Lookup(strBind, 0, false)};
     113         [ +  + ]:          21 :     if (!addrBind.has_value()) {
     114   [ +  -  +  - ]:           6 :         error = ResolveErrMsg("whitebind", strBind);
     115                 :           3 :         return false;
     116                 :             :     }
     117   [ +  -  +  + ]:          18 :     if (addrBind.value().GetPort() == 0) {
     118   [ +  -  +  - ]:           2 :         error = strprintf(_("Need to specify a port with -whitebind: '%s'"), strBind);
     119                 :           1 :         return false;
     120                 :             :     }
     121                 :             : 
     122                 :          17 :     output.m_flags = flags;
     123         [ +  - ]:          17 :     output.m_service = addrBind.value();
     124   [ +  -  +  - ]:          34 :     error = Untranslated("");
     125                 :          17 :     return true;
     126                 :          21 : }
     127                 :             : 
     128                 :         146 : bool NetWhitelistPermissions::TryParse(const std::string& str, NetWhitelistPermissions& output, ConnectionDirection& output_connection_direction, bilingual_str& error)
     129                 :             : {
     130                 :         146 :     NetPermissionFlags flags;
     131                 :         146 :     size_t offset;
     132                 :             :     // Only NetWhitebindPermissions should pass a nullptr for output_connection_direction.
     133         [ +  + ]:         146 :     if (!TryParsePermissionFlags(str, flags, &output_connection_direction, offset, error)) return false;
     134                 :             : 
     135                 :         144 :     const std::string net = str.substr(offset);
     136         [ +  - ]:         144 :     const CSubNet subnet{LookupSubNet(net)};
     137   [ +  -  +  + ]:         144 :     if (!subnet.IsValid()) {
     138   [ +  -  +  - ]:           4 :         error = strprintf(_("Invalid netmask specified in -whitelist: '%s'"), net);
     139                 :           2 :         return false;
     140                 :             :     }
     141                 :             : 
     142                 :         142 :     output.m_flags = flags;
     143                 :         142 :     output.m_subnet = subnet;
     144   [ +  -  +  - ]:         284 :     error = Untranslated("");
     145                 :         142 :     return true;
     146                 :         144 : }
        

Generated by: LCOV version 2.0-1