3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2011 thomasv@gitorious
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
20 import random, ast, re, errno, os
21 import threading, traceback, sys, time, json, Queue
26 from version import ELECTRUM_VERSION, PROTOCOL_VERSION
27 from util import print_error, print_msg
28 from simple_config import SimpleConfig
33 proxy_modes = ['socks4', 'socks5', 'http']
38 def cert_verify_hostname(s):
39 # hostname verification (disabled)
40 from backports.ssl_match_hostname import match_hostname, CertificateError
42 match_hostname(s.getpeercert(True), host)
43 print_error("hostname matches", host)
44 except CertificateError, ce:
45 print_error("hostname did not match", host)
49 class Interface(threading.Thread):
52 def __init__(self, server, config = None):
54 threading.Thread.__init__(self)
56 self.config = config if config is not None else SimpleConfig()
57 self.connect_event = threading.Event()
59 self.subscriptions = {}
60 self.lock = threading.Lock()
63 self.bytes_received = 0
64 self.is_connected = False
65 self.poll_interval = 1
67 self.debug = False # dump network messages. can be changed at runtime using the console
71 self.unanswered_requests = {}
76 host, port, protocol = self.server.split(':')
82 if protocol not in 'ghst':
83 raise Exception('Unknown protocol: %s'%protocol)
87 self.protocol = protocol
88 self.use_ssl = ( protocol in 'sg' )
89 self.proxy = self.parse_proxy_options(self.config.get('proxy'))
91 self.proxy_mode = proxy_modes.index(self.proxy["mode"]) + 1
97 def queue_json_response(self, c):
101 print_error( "<--",c )
104 error = c.get('error')
107 print_error("received error:", c)
108 if msg_id is not None:
110 method, params, callback = self.unanswered_requests.pop(msg_id)
111 callback(self,{'method':method, 'params':params, 'error':error, 'id':msg_id})
115 if msg_id is not None:
117 method, params, callback = self.unanswered_requests.pop(msg_id)
118 result = c.get('result')
122 method = c.get('method')
123 params = c.get('params')
125 if method == 'blockchain.numblocks.subscribe':
129 elif method == 'blockchain.headers.subscribe':
133 elif method == 'blockchain.address.subscribe':
139 for k,v in self.subscriptions.items():
140 if (method, params) in v:
144 print_error( "received unexpected notification", method, params)
145 print_error( self.subscriptions )
149 callback(self, {'method':method, 'params':params, 'result':result, 'id':msg_id})
152 def on_version(self, i, result):
153 self.server_version = result
156 def start_http(self):
157 self.session_id = None
158 self.is_connected = True
159 self.connection_msg = ('https' if self.use_ssl else 'http') + '://%s:%d'%( self.host, self.port )
163 print_error("http init session failed")
164 self.is_connected = False
168 print_error('http session:',self.session_id)
169 self.is_connected = True
171 self.is_connected = False
174 self.is_connected = True
175 while self.is_connected:
179 time.sleep(self.poll_interval)
180 except socket.gaierror:
185 traceback.print_exc(file=sys.stdout)
188 self.is_connected = False
195 def send_http(self, messages, callback):
196 import urllib2, json, time, cookielib
197 print_error( "send_http", messages )
200 socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]) )
201 socks.wrapmodule(urllib2)
203 cj = cookielib.CookieJar()
204 opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
205 urllib2.install_opener(opener)
213 if type(params) != type([]): params = [params]
214 data.append( { 'method':method, 'id':self.message_id, 'params':params } )
215 self.unanswered_requests[self.message_id] = method, params, callback
216 ids.append(self.message_id)
220 data_json = json.dumps(data)
226 headers = {'content-type': 'application/json'}
228 headers['cookie'] = 'SESSION=%s'%self.session_id
231 req = urllib2.Request(self.connection_msg, data_json, headers)
232 response_stream = urllib2.urlopen(req, timeout=DEFAULT_TIMEOUT)
236 for index, cookie in enumerate(cj):
237 if cookie.name=='SESSION':
238 self.session_id = cookie.value
240 response = response_stream.read()
241 self.bytes_received += len(response)
243 response = json.loads( response )
244 if type(response) is not type([]):
245 self.queue_json_response(response)
247 for item in response:
248 self.queue_json_response(item)
251 self.poll_interval = 1
253 if self.poll_interval < 15:
254 self.poll_interval += 1
255 #print self.poll_interval, response
257 self.rtime = time.time() - t1
258 self.is_connected = True
266 self.connection_msg = self.host + ':%d' % self.port
268 if self.proxy is not None:
270 socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]))
271 socket.socket = socks.socksocket
272 # prevent dns leaks, see http://stackoverflow.com/questions/13184205/dns-over-proxy
273 def getaddrinfo(*args):
274 return [(socket.AF_INET, socket.SOCK_STREAM, 6, '', (args[0], args[1]))]
275 socket.getaddrinfo = getaddrinfo
278 cert_path = os.path.join( self.config.path, 'certs', self.host)
280 if not os.path.exists(cert_path):
282 # get server certificate.
283 # Do not use ssl.get_server_certificate because it does not work with proxy
285 l = socket.getaddrinfo(self.host, self.port, socket.AF_UNSPEC, socket.SOCK_STREAM)
286 except socket.gaierror:
287 print_error("error: cannot resolve", self.host)
292 s = socket.socket( res[0], socket.SOCK_STREAM )
299 s = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_SSLv3, cert_reqs=ssl.CERT_NONE, ca_certs=None)
300 except ssl.SSLError, e:
301 print_error("SSL error retrieving SSL certificate:", self.host, e)
309 dercert = s.getpeercert(True)
311 cert = ssl.DER_cert_to_PEM_cert(dercert)
312 # workaround android bug
313 cert = re.sub("([^\n])-----END CERTIFICATE-----","\\1\n-----END CERTIFICATE-----",cert)
314 temporary_path = cert_path + '.temp'
315 with open(temporary_path,"w") as f:
322 addrinfo = socket.getaddrinfo(self.host, self.port, socket.AF_UNSPEC, socket.SOCK_STREAM)
323 except socket.gaierror:
324 print_error("error: cannot resolve", self.host)
329 s = socket.socket( res[0], socket.SOCK_STREAM )
331 s.setsockopt(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1)
339 print_error("failed to connect", self.host, self.port)
344 s = ssl.wrap_socket(s,
345 ssl_version=ssl.PROTOCOL_SSLv3,
346 cert_reqs=ssl.CERT_REQUIRED,
347 ca_certs= (temporary_path if is_new else cert_path),
348 do_handshake_on_connect=True)
349 except ssl.SSLError, e:
350 print_error("SSL error:", self.host, e)
354 rej = cert_path + '.rej'
355 if os.path.exists(rej):
357 os.rename(temporary_path, rej)
359 with open(cert_path) as f:
366 traceback.print_exc(file=sys.stdout)
367 print_error("wrong certificate", self.host)
372 print_error("certificate has expired:", cert_path)
375 print_error("wrong certificate", self.host)
378 print_error("wrap_socket failed", self.host)
379 traceback.print_exc(file=sys.stdout)
383 print_error("saving certificate for", self.host)
384 os.rename(temporary_path, cert_path)
388 self.is_connected = True
389 print_error("connected to", self.host, self.port)
394 #if self.use_ssl: self.s.do_handshake()
396 while self.is_connected:
399 msg = self.s.recv(1024)
400 except socket.timeout:
404 except socket.error, err:
407 elif err.errno in [11, 10035]:
408 print_error("socket errno", err.errno)
412 traceback.print_exc(file=sys.stdout)
416 # ping the server with server.version, as a real ping does not exist yet
417 self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
421 self.bytes_received += len(msg)
423 self.is_connected = False
431 self.queue_json_response(c)
434 traceback.print_exc(file=sys.stdout)
436 self.is_connected = False
439 def send_tcp(self, messages, callback):
440 """return the ids of the requests that we sent"""
445 request = json.dumps( { 'id':self.message_id, 'method':method, 'params':params } )
446 self.unanswered_requests[self.message_id] = method, params, callback
447 ids.append(self.message_id)
451 out += request + '\n'
454 sent = self.s.send( out )
456 except socket.error,e:
457 if e[0] in (errno.EWOULDBLOCK,errno.EAGAIN):
458 print_error( "EAGAIN: retrying")
462 traceback.print_exc(file=sys.stdout)
463 # this happens when we get disconnected
464 print_error( "Not connected, cannot send" )
472 def start_interface(self):
474 if self.protocol in 'st':
476 elif self.protocol in 'gh':
479 self.connect_event.set()
483 def stop_subscriptions(self):
484 for callback in self.subscriptions.keys():
486 self.subscriptions = {}
489 def send(self, messages, callback):
492 for message in messages:
494 if m[-10:] == '.subscribe':
499 if self.subscriptions.get(callback) is None:
500 self.subscriptions[callback] = []
502 if message not in self.subscriptions[callback]:
503 self.subscriptions[callback].append(message)
505 if not self.is_connected:
506 print_error("interface: trying to send while not connected")
509 if self.protocol in 'st':
511 out = self.send_tcp(messages, callback)
513 # do not use lock, http is synchronous
514 out = self.send_http(messages, callback)
519 def parse_proxy_options(self, s):
520 if type(s) == type({}): return s # fixme: type should be fixed
521 if type(s) != type(""): return None
522 if s.lower() == 'none': return None
523 proxy = { "mode":"socks5", "host":"localhost" }
526 if proxy_modes.count(args[n]) == 1:
527 proxy["mode"] = args[n]
530 proxy["host"] = args[n]
533 proxy["port"] = args[n]
535 proxy["port"] = "8080" if proxy["mode"] == "http" else "1080"
541 if self.is_connected and self.protocol in 'st' and self.s:
542 self.s.shutdown(socket.SHUT_RDWR)
545 self.is_connected = False
548 def is_up_to_date(self):
549 return self.unanswered_requests == {}
553 def start(self, queue = None, wait = False):
556 self.queue = queue if queue else Queue.Queue()
557 threading.Thread.start(self)
559 self.connect_event.wait()
563 self.start_interface()
564 if self.is_connected:
565 self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
567 self.run_tcp() if self.protocol in 'st' else self.run_http()
571 def change_status(self):
572 #print "change status", self.server, self.is_connected
576 def synchronous_get(self, requests, timeout=100000000):
577 queue = Queue.Queue()
578 ids = self.send(requests, lambda i,r: queue.put(r))
582 r = queue.get(True, timeout)
586 res[_id] = r.get('result')
595 def check_cert(host, cert):
601 traceback.print_exc(file=sys.stdout)
610 m = "host: %s\n"%host
611 m += "has_expired: %s\n"% expired
615 def test_certificates():
616 config = SimpleConfig()
617 mydir = os.path.join(config.path, "certs")
618 certs = os.listdir(mydir)
621 p = os.path.join(mydir,c)
626 if __name__ == "__main__":