1 from __future__ import division
7 from twisted.internet import defer, reactor
8 from twisted.python import log
11 from p2pool import data as p2pool_data
12 from p2pool.util import jsonrpc, deferred_resource, variable
13 from p2pool.bitcoin import getwork
15 def get_memory(request):
16 if request.getHeader('X-Miner-Extensions') is not None and 'workidentifier' in request.getHeader('X-Miner-Extensions').split(' '):
18 if request.getHeader('X-Work-Identifier') is not None:
20 user_agent = request.getHeader('User-Agent')
21 user_agent2 = '' if user_agent is None else user_agent.lower()
22 if 'java' in user_agent2 or 'diablominer' in user_agent2: return 0 # hopefully diablominer...
23 if 'cpuminer' in user_agent2: return 0
24 if 'tenebrix miner' in user_agent2: return 0
25 if 'ufasoft' in user_agent2: return 0 # not confirmed
26 if 'cgminer' in user_agent2: return 0
27 if 'jansson' in user_agent2: return 0 # a version of optimized scrypt miner, once in Wuala. works fine here
28 if 'poclbm' in user_agent2: return 1
29 if 'phoenix' in user_agent2: return 2
30 print 'Unknown miner User-Agent:', repr(user_agent)
33 def get_max_target(request): # inclusive
34 if request.getHeader('X-All-Targets') is not None or (request.getHeader('X-Miner-Extensions') is not None and 'alltargets' in request.getHeader('X-Miner-Extensions')):
36 user_agent = request.getHeader('User-Agent')
37 user_agent2 = '' if user_agent is None else user_agent.lower()
38 if 'java' in user_agent2 or 'diablominer' in user_agent2: return 2**256//2**32-1 # hopefully diablominer...
39 if 'cpuminer' in user_agent2: return 2**256-1
40 if 'tenebrix miner' in user_agent2: return 2**256-1
41 if 'jansson' in user_agent2: return 2**256-1 # a version of optimized scrypt miner, once in Wuala. works fine here
42 if 'cgminer' in user_agent2: return 2**256//2**32-1
43 if 'poclbm' in user_agent2: return 2**256//2**32-1
44 if 'phoenix' in user_agent2: return 2**256//2**32-1
45 print 'Unknown miner User-Agent:', repr(user_agent)
46 return 2**256//2**32-1
48 def get_username(request):
50 return base64.b64decode(request.getHeader('Authorization').split(' ', 1)[1]).split(':')[0]
55 return request.getClientIP(), request.getHeader('Authorization')
61 @defer.inlineCallbacks
62 def wait_hold(self, request_id):
63 while request_id in self.holds:
64 yield self.holds[request_id].get_deferred()
66 def set_hold(self, request_id, dt):
67 if request_id in self.holds:
68 raise ValueError('hold already present!')
69 self.holds[request_id] = variable.Event()
70 self.holds[request_id].status = 0
72 if self.holds[request_id].status != 0:
73 raise AssertionError()
74 self.holds[request_id].status = 1
75 self.holds.pop(request_id).happened()
76 reactor.callLater(dt, cb)
78 class LongPollingWorkerInterface(deferred_resource.DeferredResource):
79 def __init__(self, parent):
82 @defer.inlineCallbacks
83 def render_GET(self, request):
84 request.setHeader('Content-Type', 'application/json')
85 request.setHeader('X-Long-Polling', '/long-polling')
86 request.setHeader('X-Roll-NTime', 'expire=60')
89 request.write(json.dumps({
92 'result': (yield self.parent.getwork(request, long_poll=True)),
98 log.err(None, 'Squelched long polling error:')
99 raise jsonrpc.Error(-32099, u'Unknown error')
100 except jsonrpc.Error, e:
101 request.write(json.dumps({
105 'error': e._to_obj(),
107 render_POST = render_GET
109 class WorkerInterface(jsonrpc.Server):
110 def __init__(self, compute, response_callback, new_work_event=variable.Event()):
111 jsonrpc.Server.__init__(self)
113 self.compute = compute
114 self.response_callback = response_callback
115 self.new_work_event = new_work_event
118 self.worker_views = {}
120 self.putChild('long-polling', LongPollingWorkerInterface(self))
121 self.putChild('', self)
123 @defer.inlineCallbacks
124 def rpc_getwork(self, request, data=None):
125 request.setHeader('X-Long-Polling', '/long-polling')
126 request.setHeader('X-Roll-NTime', 'expire=60')
129 defer.returnValue(self.response_callback(getwork.decode_data(data), request))
131 defer.returnValue((yield self.getwork(request)))
133 @defer.inlineCallbacks
134 def getwork(self, request, long_poll=False):
135 request_id = get_id(request)
136 memory = get_memory(request)
138 id = random.randrange(10000)
140 print 'POLL %i START long_poll=%r user_agent=%r x-work-identifier=%r user=%r' % (id, long_poll, request.getHeader('User-Agent'), request.getHeader('X-Work-Identifier'), get_username(request))
142 if request_id not in self.worker_views:
143 self.worker_views[request_id] = variable.Variable((0, (None, None))) # times, (previous_block/-1, previous_block/-2)
145 thought_times, thought_work = self.worker_views[request_id].value
147 if long_poll and thought_times == self.new_work_event.times:
149 print 'POLL %i WAITING user=%r' % (id, get_username(request))
150 yield defer.DeferredList([self.new_work_event.get_deferred(), self.worker_views[request_id].changed.get_deferred()], fireOnOneCallback=True)
152 yield self.holds.wait_hold(request_id)
154 res, identifier = self.compute(request)
156 if thought_work[-1] is not None and self.new_work_event.times != thought_times and any(x is None or res.previous_block == x for x in thought_work[-memory or len(thought_work):]):
157 # clients won't believe the update
158 res = res.update(previous_block=random.randrange(2**256))
160 print 'POLL %i FAKED user=%r' % (id, get_username(request))
161 self.holds.set_hold(request_id, .01)
163 self.worker_views[request_id].set((self.new_work_event.times if long_poll else thought_times, (thought_work[-1], res.previous_block)))
165 print 'POLL %i END %s user=%r' % (id, p2pool_data.format_hash(identifier), get_username(request)) # XXX identifier is hack
167 res = res.update(share_target=min(res.share_target, get_max_target(request)))
169 defer.returnValue(res.getwork(identifier=str(identifier)))