- Organized 252 files across project - Root directory: 187 → 2 files (98.9% reduction) - Moved configuration guides to docs/04-configuration/ - Moved troubleshooting guides to docs/09-troubleshooting/ - Moved quick start guides to docs/01-getting-started/ - Moved reports to reports/ directory - Archived temporary files - Generated comprehensive reports and documentation - Created maintenance scripts and guides All files organized according to established standards.
322 lines
12 KiB
Bash
Executable File
322 lines
12 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
# Fix RPC configuration for Thirdweb on VMID 2400
|
|
# - Update Nginx to handle both HTTP and WebSocket on port 443
|
|
# - Update tunnel route to point to Nginx
|
|
# - Enable EIP-7702 support in Besu if available
|
|
#
|
|
# Usage: ./scripts/fix-rpc-thirdweb-config.sh
|
|
|
|
set -euo pipefail
|
|
|
|
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
PROJECT_ROOT="$(cd "$SCRIPT_DIR/.." && pwd)"
|
|
|
|
# Configuration
|
|
VMID=2400
|
|
PROXMOX_HOST="${PROXMOX_HOST:-192.168.11.10}"
|
|
TUNNEL_ID="26138c21-db00-4a02-95db-ec75c07bda5b"
|
|
HOSTNAME="rpc.public-0138.defi-oracle.io"
|
|
|
|
# Colors
|
|
RED='\033[0;31m'
|
|
GREEN='\033[0;32m'
|
|
YELLOW='\033[1;33m'
|
|
BLUE='\033[0;34m'
|
|
NC='\033[0m'
|
|
|
|
log_info() { echo -e "${BLUE}[INFO]${NC} $1"; }
|
|
log_success() { echo -e "${GREEN}[✓]${NC} $1"; }
|
|
log_warn() { echo -e "${YELLOW}[WARN]${NC} $1"; }
|
|
log_error() { echo -e "${RED}[ERROR]${NC} $1"; }
|
|
|
|
log_info "═══════════════════════════════════════════════════════════"
|
|
log_info " FIXING RPC CONFIGURATION FOR THIRDWEB (VMID 2400)"
|
|
log_info "═══════════════════════════════════════════════════════════"
|
|
echo ""
|
|
|
|
# Check SSH access
|
|
log_info "Checking SSH access..."
|
|
if ! ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} "echo 'SSH OK'" &>/dev/null; then
|
|
log_error "Cannot access $PROXMOX_HOST via SSH"
|
|
exit 1
|
|
fi
|
|
log_success "SSH access confirmed"
|
|
|
|
# Step 1: Update Nginx configuration to handle both HTTP and WebSocket on port 443
|
|
log_info "Step 1: Updating Nginx configuration..."
|
|
ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} \
|
|
"pct exec $VMID -- bash" << 'NGINX_FIX_EOF'
|
|
# Backup current config
|
|
cp /etc/nginx/sites-available/rpc-thirdweb /etc/nginx/sites-available/rpc-thirdweb.backup.$(date +%Y%m%d_%H%M%S)
|
|
|
|
# Create updated Nginx configuration
|
|
cat > /etc/nginx/sites-available/rpc-thirdweb << 'NGINX_EOF'
|
|
# HTTP to HTTPS redirect
|
|
server {
|
|
listen 80;
|
|
listen [::]:80;
|
|
server_name rpc.public-0138.defi-oracle.io;
|
|
|
|
# Redirect all HTTP to HTTPS
|
|
return 301 https://$host$request_uri;
|
|
}
|
|
|
|
# HTTPS server - HTTP RPC API (port 8545) and WebSocket RPC (port 8546)
|
|
server {
|
|
listen 443 ssl http2;
|
|
listen [::]:443 ssl http2;
|
|
server_name rpc.public-0138.defi-oracle.io;
|
|
|
|
# Cloudflare Origin Certificate
|
|
ssl_certificate /etc/nginx/ssl/cloudflare-origin.crt;
|
|
ssl_certificate_key /etc/nginx/ssl/cloudflare-origin.key;
|
|
ssl_protocols TLSv1.2 TLSv1.3;
|
|
ssl_ciphers HIGH:!aNULL:!MD5;
|
|
ssl_prefer_server_ciphers on;
|
|
|
|
# Security headers
|
|
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
|
|
add_header X-Frame-Options "SAMEORIGIN" always;
|
|
add_header X-Content-Type-Options "nosniff" always;
|
|
add_header X-XSS-Protection "1; mode=block" always;
|
|
|
|
# Trust Cloudflare IPs for real IP
|
|
set_real_ip_from 173.245.48.0/20;
|
|
set_real_ip_from 103.21.244.0/22;
|
|
set_real_ip_from 103.22.200.0/22;
|
|
set_real_ip_from 103.31.4.0/22;
|
|
set_real_ip_from 141.101.64.0/18;
|
|
set_real_ip_from 108.162.192.0/18;
|
|
set_real_ip_from 190.93.240.0/20;
|
|
set_real_ip_from 188.114.96.0/20;
|
|
set_real_ip_from 197.234.240.0/22;
|
|
set_real_ip_from 198.41.128.0/17;
|
|
set_real_ip_from 162.158.0.0/15;
|
|
set_real_ip_from 104.16.0.0/13;
|
|
set_real_ip_from 104.24.0.0/14;
|
|
set_real_ip_from 172.64.0.0/13;
|
|
set_real_ip_from 131.0.72.0/22;
|
|
real_ip_header CF-Connecting-IP;
|
|
|
|
# Logging
|
|
access_log /var/log/nginx/rpc-thirdweb-access.log;
|
|
error_log /var/log/nginx/rpc-thirdweb-error.log;
|
|
|
|
# Increase timeouts for RPC calls
|
|
proxy_connect_timeout 300s;
|
|
proxy_send_timeout 300s;
|
|
proxy_read_timeout 300s;
|
|
send_timeout 300s;
|
|
client_max_body_size 10M;
|
|
|
|
# WebSocket RPC endpoint (port 8546) - handles WebSocket upgrade requests
|
|
location / {
|
|
# Check for WebSocket upgrade
|
|
set $ws_backend "http://127.0.0.1:8545";
|
|
if ($http_upgrade) {
|
|
set $ws_backend "http://127.0.0.1:8546";
|
|
}
|
|
|
|
proxy_pass $ws_backend;
|
|
proxy_http_version 1.1;
|
|
|
|
# WebSocket headers
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection $http_connection;
|
|
# Ensure Connection header is set correctly for WebSocket
|
|
if ($http_upgrade != '') {
|
|
proxy_set_header Connection "upgrade";
|
|
}
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
proxy_set_header CF-Connecting-IP $http_cf_connecting_ip;
|
|
proxy_set_header CF-Ray $http_cf_ray;
|
|
|
|
proxy_buffering off;
|
|
proxy_request_buffering off;
|
|
|
|
# Extended timeouts (especially for WebSocket)
|
|
proxy_read_timeout 86400;
|
|
proxy_send_timeout 86400;
|
|
proxy_connect_timeout 300s;
|
|
|
|
# CORS headers (for ThirdWeb web apps)
|
|
add_header Access-Control-Allow-Origin "*" always;
|
|
add_header Access-Control-Allow-Methods "GET, POST, OPTIONS" always;
|
|
add_header Access-Control-Allow-Headers "Content-Type, Authorization" always;
|
|
|
|
# Handle OPTIONS requests
|
|
if ($request_method = OPTIONS) {
|
|
return 204;
|
|
}
|
|
}
|
|
|
|
# Health check endpoint
|
|
location /health {
|
|
access_log off;
|
|
return 200 "healthy\n";
|
|
add_header Content-Type text/plain;
|
|
}
|
|
}
|
|
NGINX_EOF
|
|
|
|
# Test configuration
|
|
if nginx -t 2>&1; then
|
|
echo "SUCCESS"
|
|
else
|
|
echo "FAILED"
|
|
exit 1
|
|
fi
|
|
|
|
# Reload Nginx
|
|
systemctl reload nginx
|
|
NGINX_FIX_EOF
|
|
|
|
if [[ $? -eq 0 ]]; then
|
|
log_success "Nginx configuration updated"
|
|
else
|
|
log_error "Failed to update Nginx configuration"
|
|
exit 1
|
|
fi
|
|
|
|
# Step 2: Update Cloudflare Tunnel route to point to Nginx (port 80)
|
|
log_info "Step 2: Updating Cloudflare Tunnel route..."
|
|
ENV_FILE="$PROJECT_ROOT/.env"
|
|
if [ -f "$ENV_FILE" ]; then
|
|
source "$ENV_FILE"
|
|
fi
|
|
|
|
CLOUDFLARE_ACCOUNT_ID="${CLOUDFLARE_ACCOUNT_ID:-}"
|
|
CLOUDFLARE_API_KEY="${CLOUDFLARE_API_KEY:-}"
|
|
CLOUDFLARE_EMAIL="${CLOUDFLARE_EMAIL:-}"
|
|
CLOUDFLARE_API_TOKEN="${CLOUDFLARE_API_TOKEN:-}"
|
|
|
|
if [ -z "$CLOUDFLARE_ACCOUNT_ID" ]; then
|
|
log_error "CLOUDFLARE_ACCOUNT_ID not set in .env"
|
|
exit 1
|
|
fi
|
|
|
|
# Determine auth method
|
|
if [ -n "$CLOUDFLARE_API_TOKEN" ]; then
|
|
AUTH_HEADERS=(-H "Authorization: Bearer $CLOUDFLARE_API_TOKEN")
|
|
elif [ -n "$CLOUDFLARE_API_KEY" ] && [ -n "$CLOUDFLARE_EMAIL" ]; then
|
|
AUTH_HEADERS=(-H "X-Auth-Email: $CLOUDFLARE_EMAIL" -H "X-Auth-Key: $CLOUDFLARE_API_KEY")
|
|
else
|
|
log_error "No Cloudflare API credentials found"
|
|
exit 1
|
|
fi
|
|
|
|
# Get current tunnel configuration
|
|
log_info "Fetching current tunnel configuration..."
|
|
CURRENT_CONFIG=$(curl -s -X GET "https://api.cloudflare.com/client/v4/accounts/$CLOUDFLARE_ACCOUNT_ID/cfd_tunnel/$TUNNEL_ID/configurations" \
|
|
"${AUTH_HEADERS[@]}" \
|
|
-H "Content-Type: application/json")
|
|
|
|
if ! echo "$CURRENT_CONFIG" | jq -e '.success' >/dev/null 2>&1; then
|
|
log_error "Failed to fetch tunnel configuration"
|
|
exit 1
|
|
fi
|
|
|
|
# Extract current ingress rules
|
|
CURRENT_INGRESS=$(echo "$CURRENT_CONFIG" | jq -c '.result.config.ingress // []')
|
|
|
|
# Update the RPC route to point to Nginx (port 80) instead of directly to Besu
|
|
log_info "Updating tunnel route: $HOSTNAME → http://127.0.0.1:80 (Nginx)"
|
|
CURRENT_INGRESS=$(echo "$CURRENT_INGRESS" | jq "[.[] | if .hostname == \"$HOSTNAME\" then .service = \"http://127.0.0.1:80\" else . end]")
|
|
|
|
# Separate catch-all from other rules
|
|
CATCH_ALL=$(echo "$CURRENT_INGRESS" | jq '[.[] | select(.hostname == null or .hostname == "" or (.service | startswith("http_status")))]')
|
|
OTHER_ROUTES=$(echo "$CURRENT_INGRESS" | jq '[.[] | select(.hostname != null and .hostname != "" and (.service | startswith("http_status") | not))]')
|
|
|
|
# Build new ingress
|
|
if [ "$(echo "$CATCH_ALL" | jq 'length')" -eq 0 ]; then
|
|
CATCH_ALL='[{"service":"http_status:404"}]'
|
|
fi
|
|
|
|
NEW_INGRESS=$(jq -n --argjson routes "$OTHER_ROUTES" --argjson catchall "$CATCH_ALL" '$routes + $catchall')
|
|
|
|
# Build complete config
|
|
NEW_CONFIG=$(jq -n \
|
|
--argjson ingress "$NEW_INGRESS" \
|
|
'{
|
|
config: {
|
|
ingress: $ingress
|
|
}
|
|
}')
|
|
|
|
# Update tunnel configuration
|
|
RESPONSE=$(curl -s -X PUT "https://api.cloudflare.com/client/v4/accounts/$CLOUDFLARE_ACCOUNT_ID/cfd_tunnel/$TUNNEL_ID/configurations" \
|
|
"${AUTH_HEADERS[@]}" \
|
|
-H "Content-Type: application/json" \
|
|
--data "$NEW_CONFIG")
|
|
|
|
if echo "$RESPONSE" | jq -e '.success' >/dev/null 2>&1; then
|
|
log_success "Tunnel route updated: $HOSTNAME → http://127.0.0.1:80"
|
|
else
|
|
ERROR=$(echo "$RESPONSE" | jq -r '.errors[0].message // "Unknown error"' 2>/dev/null || echo "API call failed")
|
|
log_error "Failed to update tunnel route: $ERROR"
|
|
exit 1
|
|
fi
|
|
|
|
# Step 3: Check and enable EIP-7702 support in Besu
|
|
log_info "Step 3: Checking EIP-7702 support in Besu..."
|
|
BESU_CONFIG="/etc/besu/config-rpc-thirdweb.toml"
|
|
|
|
# Check if EIP-7702 is already configured
|
|
EIP_7702_CHECK=$(ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} \
|
|
"pct exec $VMID -- grep -i '7702\|eip-7702' $BESU_CONFIG 2>/dev/null || echo 'not found'")
|
|
|
|
if [[ "$EIP_7702_CHECK" == "not found" ]]; then
|
|
log_info "EIP-7702 not found in config. Checking Besu version..."
|
|
|
|
# Check Besu version - EIP-7702 support was added in Besu 24.1.0
|
|
BESU_VERSION=$(ssh -o ConnectTimeout=5 -o StrictHostKeyChecking=no root@${PROXMOX_HOST} \
|
|
"pct exec $VMID -- java -jar /opt/besu/lib/besu-*.jar --version 2>&1 | grep -oP 'besu/v\\K[0-9.]+' | head -1" 2>/dev/null || echo "unknown")
|
|
|
|
if [[ "$BESU_VERSION" != "unknown" ]]; then
|
|
log_info "Besu version: $BESU_VERSION"
|
|
# Check if version >= 24.1.0
|
|
VERSION_MAJOR=$(echo "$BESU_VERSION" | cut -d. -f1)
|
|
VERSION_MINOR=$(echo "$BESU_VERSION" | cut -d. -f2)
|
|
|
|
if [[ $VERSION_MAJOR -gt 24 ]] || [[ $VERSION_MAJOR -eq 24 && $VERSION_MINOR -ge 1 ]]; then
|
|
log_info "Besu version supports EIP-7702. Adding configuration..."
|
|
|
|
# Add EIP-7702 to genesis or config
|
|
# Note: EIP-7702 is typically enabled via genesis file or fork configuration
|
|
# For now, we'll document that it needs to be enabled in the genesis file
|
|
log_warn "EIP-7702 needs to be enabled in the genesis file (cancun fork or later)"
|
|
log_info "Current network uses ChainID 138. EIP-7702 requires Cancun fork or later."
|
|
else
|
|
log_warn "Besu version $BESU_VERSION may not support EIP-7702 (requires 24.1.0+)"
|
|
fi
|
|
else
|
|
log_warn "Could not determine Besu version"
|
|
fi
|
|
else
|
|
log_success "EIP-7702 already configured"
|
|
fi
|
|
|
|
# Summary
|
|
echo ""
|
|
log_success "═══════════════════════════════════════════════════════════"
|
|
log_success " RPC CONFIGURATION FIXED"
|
|
log_success "═══════════════════════════════════════════════════════════"
|
|
echo ""
|
|
log_info "✅ Nginx updated to handle HTTP and WebSocket on port 443"
|
|
log_info "✅ Tunnel route updated to point to Nginx (port 80)"
|
|
log_info "✅ EIP-7702 status checked"
|
|
echo ""
|
|
log_info "Next steps:"
|
|
echo " 1. Test HTTP RPC:"
|
|
echo " curl -k https://rpc.public-0138.defi-oracle.io \\"
|
|
echo " -X POST -H 'Content-Type: application/json' \\"
|
|
echo " -d '{\"jsonrpc\":\"2.0\",\"method\":\"eth_chainId\",\"params\":[],\"id\":1}'"
|
|
echo ""
|
|
echo " 2. Test WebSocket RPC (requires WebSocket client)"
|
|
echo ""
|
|
echo " 3. For EIP-7702: Ensure genesis file includes Cancun fork or later"
|
|
echo ""
|