/* XMRig * Copyright (c) 2018-2021 SChernykh * Copyright (c) 2016-2021 XMRig , * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include "base/api/Httpd.h" #include "3rdparty/llhttp/llhttp.h" #include "base/api/Api.h" #include "base/io/log/Log.h" #include "base/net/http/HttpApiResponse.h" #include "base/net/http/HttpData.h" #include "base/net/tools/TcpServer.h" #include "core/config/Config.h" #include "core/Controller.h" #ifdef XMRIG_FEATURE_TLS # include "base/net/https/HttpsServer.h" #else # include "base/net/http/HttpServer.h" #endif namespace xmrig { static const char *kAuthorization = "authorization"; #ifdef _WIN32 static const char *favicon = nullptr; static size_t faviconSize = 0; #endif } // namespace xmrig xmrig::Httpd::Httpd(Base *base) : m_base(base) { m_httpListener = std::make_shared(this); base->addListener(this); } xmrig::Httpd::~Httpd() = default; bool xmrig::Httpd::start() { const auto &config = m_base->config()->http(); if (!config.isEnabled()) { return true; } bool tls = false; # ifdef XMRIG_FEATURE_TLS m_http = new HttpsServer(m_httpListener); tls = m_http->setTls(m_base->config()->tls()); # else m_http = new HttpServer(m_httpListener); # endif m_server = new TcpServer(config.host(), config.port(), m_http); const int rc = m_server->bind(); Log::print(GREEN_BOLD(" * ") WHITE_BOLD("%-13s") CSI "1;%dm%s:%d" " " RED_BOLD("%s"), "HTTP API", tls ? 32 : 36, config.host().data(), rc < 0 ? config.port() : rc, rc < 0 ? uv_strerror(rc) : "" ); if (rc < 0) { stop(); return false; } m_port = static_cast(rc); # ifdef _WIN32 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-cstyle-cast, performance-no-int-to-ptr) HRSRC src = FindResource(nullptr, MAKEINTRESOURCE(1), RT_ICON); if (src != nullptr) { HGLOBAL res = LoadResource(nullptr, src); if (res != nullptr) { favicon = static_cast(LockResource(res)); faviconSize = SizeofResource(nullptr, src); } } # endif return true; } void xmrig::Httpd::stop() { delete m_server; delete m_http; m_server = nullptr; m_http = nullptr; m_port = 0; } void xmrig::Httpd::onConfigChanged(Config *config, Config *previousConfig) { if (config->http() == previousConfig->http()) { return; } stop(); start(); } void xmrig::Httpd::onHttpData(const HttpData &data) { if (data.method == HTTP_OPTIONS) { return HttpApiResponse(data.id()).end(); } if (data.method == HTTP_GET && data.url == "/favicon.ico") { # ifdef _WIN32 if (favicon != nullptr) { HttpResponse response(data.id()); response.setHeader(HttpData::kContentType, "image/x-icon"); return response.end(favicon, faviconSize); } # endif return HttpResponse(data.id(), 404 /* NOT_FOUND */).end(); } if (data.method > 4) { return HttpApiResponse(data.id(), 405 /* METHOD_NOT_ALLOWED */).end(); } const int status = auth(data); if (status != 200) { return HttpApiResponse(data.id(), status).end(); } if (data.method != HTTP_GET) { if (m_base->config()->http().isRestricted()) { return HttpApiResponse(data.id(), 403 /* FORBIDDEN */).end(); } if (!data.headers.count(HttpData::kContentTypeL) || data.headers.at(HttpData::kContentTypeL) != HttpData::kApplicationJson) { return HttpApiResponse(data.id(), 415 /* UNSUPPORTED_MEDIA_TYPE */).end(); } } m_base->api()->request(data); } int xmrig::Httpd::auth(const HttpData &req) const { const Http &config = m_base->config()->http(); if (!req.headers.count(kAuthorization)) { return config.isAuthRequired() ? 401 /* UNAUTHORIZED */ : 200; } if (config.token().isNull()) { return 401 /* UNAUTHORIZED */; } const std::string &token = req.headers.at(kAuthorization); const size_t size = token.size(); if (token.size() < 8 || config.token().size() != size - 7 || memcmp("Bearer ", token.c_str(), 7) != 0) { return 403 /* FORBIDDEN */; } return strncmp(config.token().data(), token.c_str() + 7, config.token().size()) == 0 ? 200 : 403 /* FORBIDDEN */; }