This adds a generic mechanism for 'dial options' in the RPC client, and also implements a specific dial option for the JWT authentication mechanism used by the engine API. Some real tests for the server-side authentication handling are also added. Co-authored-by: Joshua Gutow <jgutow@optimism.io> Co-authored-by: Felix Lange <fjl@twurst.com>
		
			
				
	
	
		
			46 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			46 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2022 The go-ethereum Authors
 | 
						|
// This file is part of the go-ethereum library.
 | 
						|
//
 | 
						|
// The go-ethereum library is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU Lesser General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// The go-ethereum library is distributed in the hope that it will be useful,
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | 
						|
// GNU Lesser General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU Lesser General Public License
 | 
						|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
package node
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/ethereum/go-ethereum/rpc"
 | 
						|
	"github.com/golang-jwt/jwt/v4"
 | 
						|
)
 | 
						|
 | 
						|
// NewJWTAuth creates an rpc client authentication provider that uses JWT. The
 | 
						|
// secret MUST be 32 bytes (256 bits) as defined by the Engine-API authentication spec.
 | 
						|
//
 | 
						|
// See https://github.com/ethereum/execution-apis/blob/main/src/engine/authentication.md
 | 
						|
// for more details about this authentication scheme.
 | 
						|
func NewJWTAuth(jwtsecret [32]byte) rpc.HTTPAuth {
 | 
						|
	return func(h http.Header) error {
 | 
						|
		token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{
 | 
						|
			"iat": &jwt.NumericDate{Time: time.Now()},
 | 
						|
		})
 | 
						|
		s, err := token.SignedString(jwtsecret[:])
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("failed to create JWT token: %w", err)
 | 
						|
		}
 | 
						|
		h.Set("Authorization", "Bearer "+s)
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
}
 |