github.com/zjj1991/quorum@v0.0.0-20190524123704-ae4b0a1e1a19/p2p/enode/urlv4.go (about) 1 // Copyright 2018 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package enode 18 19 import ( 20 "crypto/ecdsa" 21 "encoding/hex" 22 "errors" 23 "fmt" 24 "net" 25 "net/url" 26 "regexp" 27 "strconv" 28 29 "github.com/ethereum/go-ethereum/common/math" 30 "github.com/ethereum/go-ethereum/crypto" 31 "github.com/ethereum/go-ethereum/p2p/enr" 32 ) 33 34 var incompleteNodeURL = regexp.MustCompile("(?i)^(?:enode://)?([0-9a-f]+)$") 35 36 // MustParseV4 parses a node URL. It panics if the URL is not valid. 37 func MustParseV4(rawurl string) *Node { 38 n, err := ParseV4(rawurl) 39 if err != nil { 40 panic("invalid node URL: " + err.Error()) 41 } 42 return n 43 } 44 45 // ParseV4 parses a node URL. 46 // 47 // There are two basic forms of node URLs: 48 // 49 // - incomplete nodes, which only have the public key (node ID) 50 // - complete nodes, which contain the public key and IP/Port information 51 // 52 // For incomplete nodes, the designator must look like one of these 53 // 54 // enode://<hex node id> 55 // <hex node id> 56 // 57 // For complete nodes, the node ID is encoded in the username portion 58 // of the URL, separated from the host by an @ sign. The hostname can 59 // only be given as an IP address, DNS domain names are not allowed. 60 // The port in the host name section is the TCP listening port. If the 61 // TCP and UDP (discovery) ports differ, the UDP port is specified as 62 // query parameter "discport". 63 // 64 // In the following example, the node URL describes 65 // a node with IP address 10.3.58.6, TCP listening port 30303 66 // and UDP discovery port 30301. 67 // 68 // enode://<hex node id>@10.3.58.6:30303?discport=30301 69 func ParseV4(rawurl string) (*Node, error) { 70 if m := incompleteNodeURL.FindStringSubmatch(rawurl); m != nil { 71 id, err := parsePubkey(m[1]) 72 if err != nil { 73 return nil, fmt.Errorf("invalid node ID (%v)", err) 74 } 75 return NewV4(id, nil, 0, 0, 0), nil 76 } 77 return parseComplete(rawurl) 78 } 79 80 // NewV4 creates a node from discovery v4 node information. The record 81 // contained in the node has a zero-length signature. 82 func NewV4(pubkey *ecdsa.PublicKey, ip net.IP, tcp, udp, raftPort int) *Node { 83 var r enr.Record 84 if ip != nil { 85 r.Set(enr.IP(ip)) 86 } 87 if udp != 0 { 88 r.Set(enr.UDP(udp)) 89 } 90 if tcp != 0 { 91 r.Set(enr.TCP(tcp)) 92 } 93 94 if raftPort != 0 { 95 r.Set(enr.RaftPort(raftPort)) 96 } 97 98 signV4Compat(&r, pubkey) 99 n, err := New(v4CompatID{}, &r) 100 if err != nil { 101 panic(err) 102 } 103 return n 104 } 105 106 func parseComplete(rawurl string) (*Node, error) { 107 var ( 108 id *ecdsa.PublicKey 109 ip net.IP 110 tcpPort, udpPort uint64 111 ) 112 u, err := url.Parse(rawurl) 113 if err != nil { 114 return nil, err 115 } 116 if u.Scheme != "enode" { 117 return nil, errors.New("invalid URL scheme, want \"enode\"") 118 } 119 // Parse the Node ID from the user portion. 120 if u.User == nil { 121 return nil, errors.New("does not contain node ID") 122 } 123 if id, err = parsePubkey(u.User.String()); err != nil { 124 return nil, fmt.Errorf("invalid node ID (%v)", err) 125 } 126 // Parse the IP address. 127 host, port, err := net.SplitHostPort(u.Host) 128 if err != nil { 129 return nil, fmt.Errorf("invalid host: %v", err) 130 } 131 if ip = net.ParseIP(host); ip == nil { 132 return nil, errors.New("invalid IP address") 133 } 134 // Ensure the IP is 4 bytes long for IPv4 addresses. 135 if ipv4 := ip.To4(); ipv4 != nil { 136 ip = ipv4 137 } 138 // Parse the port numbers. 139 if tcpPort, err = strconv.ParseUint(port, 10, 16); err != nil { 140 return nil, errors.New("invalid port") 141 } 142 udpPort = tcpPort 143 qv := u.Query() 144 if qv.Get("discport") != "" { 145 udpPort, err = strconv.ParseUint(qv.Get("discport"), 10, 16) 146 if err != nil { 147 return nil, errors.New("invalid discport in query") 148 } 149 } 150 151 var node *Node 152 153 if qv.Get("raftport") != "" { 154 raftPort, err := strconv.ParseUint(qv.Get("raftport"), 10, 16) 155 if err != nil { 156 return nil, errors.New("invalid raftport in query") 157 } 158 node = NewV4(id, ip, int(tcpPort), int(udpPort), int(raftPort)) 159 } else { 160 node = NewV4(id, ip, int(tcpPort), int(udpPort), 0) 161 } 162 return node, nil 163 164 } 165 166 func HexPubkey(h string) (*ecdsa.PublicKey, error) { 167 k, err := parsePubkey(h) 168 if err != nil { 169 return nil, err 170 } 171 return k, err 172 } 173 174 // parsePubkey parses a hex-encoded secp256k1 public key. 175 func parsePubkey(in string) (*ecdsa.PublicKey, error) { 176 b, err := hex.DecodeString(in) 177 if err != nil { 178 return nil, err 179 } else if len(b) != 64 { 180 return nil, fmt.Errorf("wrong length, want %d hex chars", 128) 181 } 182 b = append([]byte{0x4}, b...) 183 return crypto.UnmarshalPubkey(b) 184 } 185 186 // used by Quorum RAFT - to derive enodeID 187 func (n *Node) EnodeID() string { 188 var ( 189 scheme enr.ID 190 nodeid string 191 key ecdsa.PublicKey 192 ) 193 n.Load(&scheme) 194 n.Load((*Secp256k1)(&key)) 195 switch { 196 case scheme == "v4" || key != ecdsa.PublicKey{}: 197 nodeid = fmt.Sprintf("%x", crypto.FromECDSAPub(&key)[1:]) 198 default: 199 nodeid = fmt.Sprintf("%s.%x", scheme, n.id[:]) 200 } 201 return nodeid 202 } 203 204 func (n *Node) v4URL() string { 205 var ( 206 scheme enr.ID 207 nodeid string 208 key ecdsa.PublicKey 209 ) 210 n.Load(&scheme) 211 n.Load((*Secp256k1)(&key)) 212 switch { 213 case scheme == "v4" || key != ecdsa.PublicKey{}: 214 nodeid = fmt.Sprintf("%x", crypto.FromECDSAPub(&key)[1:]) 215 default: 216 nodeid = fmt.Sprintf("%s.%x", scheme, n.id[:]) 217 } 218 u := url.URL{Scheme: "enode"} 219 if n.Incomplete() { 220 u.Host = nodeid 221 } else { 222 addr := net.TCPAddr{IP: n.IP(), Port: n.TCP()} 223 u.User = url.User(nodeid) 224 u.Host = addr.String() 225 if n.UDP() != n.TCP() { 226 u.RawQuery = "discport=" + strconv.Itoa(n.UDP()) 227 } 228 raftPort := n.RaftPort() 229 if raftPort != 0 { 230 raftQuery := "raftport=" + strconv.Itoa(raftPort) 231 if len(u.RawQuery) > 0 { 232 u.RawQuery = u.RawQuery + "&" + raftQuery 233 } else { 234 u.RawQuery = raftQuery 235 } 236 } 237 } 238 return u.String() 239 } 240 241 // PubkeyToIDV4 derives the v4 node address from the given public key. 242 func PubkeyToIDV4(key *ecdsa.PublicKey) ID { 243 e := make([]byte, 64) 244 math.ReadBits(key.X, e[:len(e)/2]) 245 math.ReadBits(key.Y, e[len(e)/2:]) 246 return ID(crypto.Keccak256Hash(e)) 247 }