Files
proxmox/scripts/fix-rpc-thirdweb-config.sh
defiQUG cb47cce074 Complete markdown files cleanup and organization
- Organized 252 files across project
- Root directory: 187 → 2 files (98.9% reduction)
- Moved configuration guides to docs/04-configuration/
- Moved troubleshooting guides to docs/09-troubleshooting/
- Moved quick start guides to docs/01-getting-started/
- Moved reports to reports/ directory
- Archived temporary files
- Generated comprehensive reports and documentation
- Created maintenance scripts and guides

All files organized according to established standards.
2026-01-06 01:46:25 -08:00

322 lines
12 KiB
Bash
Executable File

#!/usr/bin/env bash
# Fix RPC configuration for Thirdweb on VMID 2400
# - Update Nginx to handle both HTTP and WebSocket on port 443
# - Update tunnel route to point to Nginx
# - Enable EIP-7702 support in Besu if available
#
# Usage: ./scripts/fix-rpc-thirdweb-config.sh
set -euo pipefail
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
PROJECT_ROOT="$(cd "$SCRIPT_DIR/.." && pwd)"
# Configuration
VMID=2400
PROXMOX_HOST="${PROXMOX_HOST:-192.168.11.10}"
TUNNEL_ID="26138c21-db00-4a02-95db-ec75c07bda5b"
HOSTNAME="rpc.public-0138.defi-oracle.io"
# Colors
RED='\033[0;31m'
GREEN='\033[0;32m'
YELLOW='\033[1;33m'
BLUE='\033[0;34m'
NC='\033[0m'
log_info() { echo -e "${BLUE}[INFO]${NC} $1"; }
log_success() { echo -e "${GREEN}[✓]${NC} $1"; }
log_warn() { echo -e "${YELLOW}[WARN]${NC} $1"; }
log_error() { echo -e "${RED}[ERROR]${NC} $1"; }
log_info "═══════════════════════════════════════════════════════════"
log_info " FIXING RPC CONFIGURATION FOR THIRDWEB (VMID 2400)"
log_info "═══════════════════════════════════════════════════════════"
echo ""
# Check SSH access
log_info "Checking SSH access..."
if ! ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} "echo 'SSH OK'" &>/dev/null; then
log_error "Cannot access $PROXMOX_HOST via SSH"
exit 1
fi
log_success "SSH access confirmed"
# Step 1: Update Nginx configuration to handle both HTTP and WebSocket on port 443
log_info "Step 1: Updating Nginx configuration..."
ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} \
"pct exec $VMID -- bash" << 'NGINX_FIX_EOF'
# Backup current config
cp /etc/nginx/sites-available/rpc-thirdweb /etc/nginx/sites-available/rpc-thirdweb.backup.$(date +%Y%m%d_%H%M%S)
# Create updated Nginx configuration
cat > /etc/nginx/sites-available/rpc-thirdweb << 'NGINX_EOF'
# HTTP to HTTPS redirect
server {
listen 80;
listen [::]:80;
server_name rpc.public-0138.defi-oracle.io;
# Redirect all HTTP to HTTPS
return 301 https://$host$request_uri;
}
# HTTPS server - HTTP RPC API (port 8545) and WebSocket RPC (port 8546)
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name rpc.public-0138.defi-oracle.io;
# Cloudflare Origin Certificate
ssl_certificate /etc/nginx/ssl/cloudflare-origin.crt;
ssl_certificate_key /etc/nginx/ssl/cloudflare-origin.key;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers HIGH:!aNULL:!MD5;
ssl_prefer_server_ciphers on;
# Security headers
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Content-Type-Options "nosniff" always;
add_header X-XSS-Protection "1; mode=block" always;
# Trust Cloudflare IPs for real IP
set_real_ip_from 173.245.48.0/20;
set_real_ip_from 103.21.244.0/22;
set_real_ip_from 103.22.200.0/22;
set_real_ip_from 103.31.4.0/22;
set_real_ip_from 141.101.64.0/18;
set_real_ip_from 108.162.192.0/18;
set_real_ip_from 190.93.240.0/20;
set_real_ip_from 188.114.96.0/20;
set_real_ip_from 197.234.240.0/22;
set_real_ip_from 198.41.128.0/17;
set_real_ip_from 162.158.0.0/15;
set_real_ip_from 104.16.0.0/13;
set_real_ip_from 104.24.0.0/14;
set_real_ip_from 172.64.0.0/13;
set_real_ip_from 131.0.72.0/22;
real_ip_header CF-Connecting-IP;
# Logging
access_log /var/log/nginx/rpc-thirdweb-access.log;
error_log /var/log/nginx/rpc-thirdweb-error.log;
# Increase timeouts for RPC calls
proxy_connect_timeout 300s;
proxy_send_timeout 300s;
proxy_read_timeout 300s;
send_timeout 300s;
client_max_body_size 10M;
# WebSocket RPC endpoint (port 8546) - handles WebSocket upgrade requests
location / {
# Check for WebSocket upgrade
set $ws_backend "http://127.0.0.1:8545";
if ($http_upgrade) {
set $ws_backend "http://127.0.0.1:8546";
}
proxy_pass $ws_backend;
proxy_http_version 1.1;
# WebSocket headers
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection;
# Ensure Connection header is set correctly for WebSocket
if ($http_upgrade != '') {
proxy_set_header Connection "upgrade";
}
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header CF-Connecting-IP $http_cf_connecting_ip;
proxy_set_header CF-Ray $http_cf_ray;
proxy_buffering off;
proxy_request_buffering off;
# Extended timeouts (especially for WebSocket)
proxy_read_timeout 86400;
proxy_send_timeout 86400;
proxy_connect_timeout 300s;
# CORS headers (for ThirdWeb web apps)
add_header Access-Control-Allow-Origin "*" always;
add_header Access-Control-Allow-Methods "GET, POST, OPTIONS" always;
add_header Access-Control-Allow-Headers "Content-Type, Authorization" always;
# Handle OPTIONS requests
if ($request_method = OPTIONS) {
return 204;
}
}
# Health check endpoint
location /health {
access_log off;
return 200 "healthy\n";
add_header Content-Type text/plain;
}
}
NGINX_EOF
# Test configuration
if nginx -t 2>&1; then
echo "SUCCESS"
else
echo "FAILED"
exit 1
fi
# Reload Nginx
systemctl reload nginx
NGINX_FIX_EOF
if [[ $? -eq 0 ]]; then
log_success "Nginx configuration updated"
else
log_error "Failed to update Nginx configuration"
exit 1
fi
# Step 2: Update Cloudflare Tunnel route to point to Nginx (port 80)
log_info "Step 2: Updating Cloudflare Tunnel route..."
ENV_FILE="$PROJECT_ROOT/.env"
if [ -f "$ENV_FILE" ]; then
source "$ENV_FILE"
fi
CLOUDFLARE_ACCOUNT_ID="${CLOUDFLARE_ACCOUNT_ID:-}"
CLOUDFLARE_API_KEY="${CLOUDFLARE_API_KEY:-}"
CLOUDFLARE_EMAIL="${CLOUDFLARE_EMAIL:-}"
CLOUDFLARE_API_TOKEN="${CLOUDFLARE_API_TOKEN:-}"
if [ -z "$CLOUDFLARE_ACCOUNT_ID" ]; then
log_error "CLOUDFLARE_ACCOUNT_ID not set in .env"
exit 1
fi
# Determine auth method
if [ -n "$CLOUDFLARE_API_TOKEN" ]; then
AUTH_HEADERS=(-H "Authorization: Bearer $CLOUDFLARE_API_TOKEN")
elif [ -n "$CLOUDFLARE_API_KEY" ] && [ -n "$CLOUDFLARE_EMAIL" ]; then
AUTH_HEADERS=(-H "X-Auth-Email: $CLOUDFLARE_EMAIL" -H "X-Auth-Key: $CLOUDFLARE_API_KEY")
else
log_error "No Cloudflare API credentials found"
exit 1
fi
# Get current tunnel configuration
log_info "Fetching current tunnel configuration..."
CURRENT_CONFIG=$(curl -s -X GET "https://api.cloudflare.com/client/v4/accounts/$CLOUDFLARE_ACCOUNT_ID/cfd_tunnel/$TUNNEL_ID/configurations" \
"${AUTH_HEADERS[@]}" \
-H "Content-Type: application/json")
if ! echo "$CURRENT_CONFIG" | jq -e '.success' >/dev/null 2>&1; then
log_error "Failed to fetch tunnel configuration"
exit 1
fi
# Extract current ingress rules
CURRENT_INGRESS=$(echo "$CURRENT_CONFIG" | jq -c '.result.config.ingress // []')
# Update the RPC route to point to Nginx (port 80) instead of directly to Besu
log_info "Updating tunnel route: $HOSTNAME → http://127.0.0.1:80 (Nginx)"
CURRENT_INGRESS=$(echo "$CURRENT_INGRESS" | jq "[.[] | if .hostname == \"$HOSTNAME\" then .service = \"http://127.0.0.1:80\" else . end]")
# Separate catch-all from other rules
CATCH_ALL=$(echo "$CURRENT_INGRESS" | jq '[.[] | select(.hostname == null or .hostname == "" or (.service | startswith("http_status")))]')
OTHER_ROUTES=$(echo "$CURRENT_INGRESS" | jq '[.[] | select(.hostname != null and .hostname != "" and (.service | startswith("http_status") | not))]')
# Build new ingress
if [ "$(echo "$CATCH_ALL" | jq 'length')" -eq 0 ]; then
CATCH_ALL='[{"service":"http_status:404"}]'
fi
NEW_INGRESS=$(jq -n --argjson routes "$OTHER_ROUTES" --argjson catchall "$CATCH_ALL" '$routes + $catchall')
# Build complete config
NEW_CONFIG=$(jq -n \
--argjson ingress "$NEW_INGRESS" \
'{
config: {
ingress: $ingress
}
}')
# Update tunnel configuration
RESPONSE=$(curl -s -X PUT "https://api.cloudflare.com/client/v4/accounts/$CLOUDFLARE_ACCOUNT_ID/cfd_tunnel/$TUNNEL_ID/configurations" \
"${AUTH_HEADERS[@]}" \
-H "Content-Type: application/json" \
--data "$NEW_CONFIG")
if echo "$RESPONSE" | jq -e '.success' >/dev/null 2>&1; then
log_success "Tunnel route updated: $HOSTNAME → http://127.0.0.1:80"
else
ERROR=$(echo "$RESPONSE" | jq -r '.errors[0].message // "Unknown error"' 2>/dev/null || echo "API call failed")
log_error "Failed to update tunnel route: $ERROR"
exit 1
fi
# Step 3: Check and enable EIP-7702 support in Besu
log_info "Step 3: Checking EIP-7702 support in Besu..."
BESU_CONFIG="/etc/besu/config-rpc-thirdweb.toml"
# Check if EIP-7702 is already configured
EIP_7702_CHECK=$(ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} \
"pct exec $VMID -- grep -i '7702\|eip-7702' $BESU_CONFIG 2>/dev/null || echo 'not found'")
if [[ "$EIP_7702_CHECK" == "not found" ]]; then
log_info "EIP-7702 not found in config. Checking Besu version..."
# Check Besu version - EIP-7702 support was added in Besu 24.1.0
BESU_VERSION=$(ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} \
"pct exec $VMID -- java -jar /opt/besu/lib/besu-*.jar --version 2>&1 | grep -oP 'besu/v\\K[0-9.]+' | head -1" 2>/dev/null || echo "unknown")
if [[ "$BESU_VERSION" != "unknown" ]]; then
log_info "Besu version: $BESU_VERSION"
# Check if version >= 24.1.0
VERSION_MAJOR=$(echo "$BESU_VERSION" | cut -d. -f1)
VERSION_MINOR=$(echo "$BESU_VERSION" | cut -d. -f2)
if [[ $VERSION_MAJOR -gt 24 ]] || [[ $VERSION_MAJOR -eq 24 && $VERSION_MINOR -ge 1 ]]; then
log_info "Besu version supports EIP-7702. Adding configuration..."
# Add EIP-7702 to genesis or config
# Note: EIP-7702 is typically enabled via genesis file or fork configuration
# For now, we'll document that it needs to be enabled in the genesis file
log_warn "EIP-7702 needs to be enabled in the genesis file (cancun fork or later)"
log_info "Current network uses ChainID 138. EIP-7702 requires Cancun fork or later."
else
log_warn "Besu version $BESU_VERSION may not support EIP-7702 (requires 24.1.0+)"
fi
else
log_warn "Could not determine Besu version"
fi
else
log_success "EIP-7702 already configured"
fi
# Summary
echo ""
log_success "═══════════════════════════════════════════════════════════"
log_success " RPC CONFIGURATION FIXED"
log_success "═══════════════════════════════════════════════════════════"
echo ""
log_info "✅ Nginx updated to handle HTTP and WebSocket on port 443"
log_info "✅ Tunnel route updated to point to Nginx (port 80)"
log_info "✅ EIP-7702 status checked"
echo ""
log_info "Next steps:"
echo " 1. Test HTTP RPC:"
echo " curl -k https://rpc.public-0138.defi-oracle.io \\"
echo " -X POST -H 'Content-Type: application/json' \\"
echo " -d '{\"jsonrpc\":\"2.0\",\"method\":\"eth_chainId\",\"params\":[],\"id\":1}'"
echo ""
echo " 2. Test WebSocket RPC (requires WebSocket client)"
echo ""
echo " 3. For EIP-7702: Ensure genesis file includes Cancun fork or later"
echo ""