3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2011 thomasv@gitorious
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
20 import random, ast, re, errno, os
21 import threading, traceback, sys, time, json, Queue
26 from version import ELECTRUM_VERSION, PROTOCOL_VERSION
27 from util import print_error, print_msg
28 from simple_config import SimpleConfig
32 proxy_modes = ['socks4', 'socks5', 'http']
35 def check_cert(host, cert):
36 from OpenSSL import crypto as c
37 _cert = c.load_certificate(c.FILETYPE_PEM, cert)
40 m += "has_expired: %s\n"% _cert.has_expired()
41 m += "pubkey: %s bits\n" % _cert.get_pubkey().bits()
42 m += "serial number: %s\n"% _cert.get_serial_number()
43 #m += "issuer: %s\n"% _cert.get_issuer()
44 #m += "algo: %s\n"% _cert.get_signature_algorithm()
45 m += "version: %s\n"% _cert.get_version()
49 def cert_has_expired(cert_path):
53 print_error("Warning: cannot import OpenSSL")
55 from OpenSSL import crypto as c
56 with open(cert_path) as f:
58 _cert = c.load_certificate(c.FILETYPE_PEM, cert)
59 return _cert.has_expired()
62 def check_certificates():
63 config = SimpleConfig()
64 mydir = os.path.join(config.path, "certs")
65 certs = os.listdir(mydir)
68 p = os.path.join(mydir,c)
74 def cert_verify_hostname(s):
75 # hostname verification (disabled)
76 from backports.ssl_match_hostname import match_hostname, CertificateError
78 match_hostname(s.getpeercert(True), host)
79 print_error("hostname matches", host)
80 except CertificateError, ce:
81 print_error("hostname did not match", host)
85 class Interface(threading.Thread):
88 def __init__(self, config=None):
91 config = SimpleConfig()
93 threading.Thread.__init__(self)
96 self.connect_event = threading.Event()
98 self.subscriptions = {}
99 self.lock = threading.Lock()
102 self.bytes_received = 0
103 self.is_connected = False
104 self.poll_interval = 1
106 self.debug = False # dump network messages. can be changed at runtime using the console
110 self.unanswered_requests = {}
111 self.pending_transactions_for_notifications= []
114 self.server = config.get('server')
115 host, port, protocol = self.server.split(':')
118 if protocol not in 'ghst':
119 raise BaseException('Unknown protocol: %s'%protocol)
123 self.protocol = protocol
124 self.use_ssl = ( protocol in 'sg' )
125 self.proxy = self.parse_proxy_options(config.get('proxy'))
127 self.proxy_mode = proxy_modes.index(self.proxy["mode"]) + 1
133 def queue_json_response(self, c):
137 print_error( "<--",c )
140 error = c.get('error')
143 print_error("received error:", c)
144 if msg_id is not None:
146 method, params, callback = self.unanswered_requests.pop(msg_id)
147 callback(self,{'method':method, 'params':params, 'error':error, 'id':msg_id})
151 if msg_id is not None:
153 method, params, callback = self.unanswered_requests.pop(msg_id)
154 result = c.get('result')
158 method = c.get('method')
159 params = c.get('params')
161 if method == 'blockchain.numblocks.subscribe':
165 elif method == 'blockchain.headers.subscribe':
169 elif method == 'blockchain.address.subscribe':
175 for k,v in self.subscriptions.items():
176 if (method, params) in v:
180 print_error( "received unexpected notification", method, params)
181 print_error( self.subscriptions )
185 callback(self, {'method':method, 'params':params, 'result':result, 'id':msg_id})
188 def on_version(self, i, result):
189 self.server_version = result
192 def start_http(self):
193 self.session_id = None
194 self.is_connected = True
195 self.connection_msg = ('https' if self.use_ssl else 'http') + '://%s:%d'%( self.host, self.port )
199 print_error("http init session failed")
200 self.is_connected = False
204 print_error('http session:',self.session_id)
205 self.is_connected = True
207 self.is_connected = False
210 self.is_connected = True
211 while self.is_connected:
215 time.sleep(self.poll_interval)
216 except socket.gaierror:
221 traceback.print_exc(file=sys.stdout)
224 self.is_connected = False
231 def send_http(self, messages, callback):
232 import urllib2, json, time, cookielib
233 print_error( "send_http", messages )
236 socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]) )
237 socks.wrapmodule(urllib2)
239 cj = cookielib.CookieJar()
240 opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
241 urllib2.install_opener(opener)
248 if type(params) != type([]): params = [params]
249 data.append( { 'method':method, 'id':self.message_id, 'params':params } )
250 self.unanswered_requests[self.message_id] = method, params, callback
254 data_json = json.dumps(data)
260 headers = {'content-type': 'application/json'}
262 headers['cookie'] = 'SESSION=%s'%self.session_id
265 req = urllib2.Request(self.connection_msg, data_json, headers)
266 response_stream = urllib2.urlopen(req, timeout=DEFAULT_TIMEOUT)
270 for index, cookie in enumerate(cj):
271 if cookie.name=='SESSION':
272 self.session_id = cookie.value
274 response = response_stream.read()
275 self.bytes_received += len(response)
277 response = json.loads( response )
278 if type(response) is not type([]):
279 self.queue_json_response(response)
281 for item in response:
282 self.queue_json_response(item)
285 self.poll_interval = 1
287 if self.poll_interval < 15:
288 self.poll_interval += 1
289 #print self.poll_interval, response
291 self.rtime = time.time() - t1
292 self.is_connected = True
299 self.connection_msg = self.host + ':%d' % self.port
301 if self.proxy is not None:
303 socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]))
304 socket.socket = socks.socksocket
305 # prevent dns leaks, see http://stackoverflow.com/questions/13184205/dns-over-proxy
306 def getaddrinfo(*args):
307 return [(socket.AF_INET, socket.SOCK_STREAM, 6, '', (args[0], args[1]))]
308 socket.getaddrinfo = getaddrinfo
311 cert_path = os.path.join( self.config.get('path'), 'certs', self.host)
313 if not os.path.exists(cert_path):
315 # get server certificate.
316 # Do not use ssl.get_server_certificate because it does not work with proxy
317 s = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
319 s.connect((self.host, self.port))
321 # print_error("failed to connect", self.host, self.port)
325 s = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_SSLv3, cert_reqs=ssl.CERT_NONE, ca_certs=None)
326 except ssl.SSLError, e:
327 print_error("SSL error:", self.host, e)
329 dercert = s.getpeercert(True)
331 cert = ssl.DER_cert_to_PEM_cert(dercert)
332 temporary_path = cert_path + '.temp'
333 with open(temporary_path,"w") as f:
340 s = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
342 s.setsockopt(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1)
345 s.connect(( self.host.encode('ascii'), int(self.port)))
347 print_error("failed to connect", self.host, self.port)
352 s = ssl.wrap_socket(s,
353 ssl_version=ssl.PROTOCOL_SSLv3,
354 cert_reqs=ssl.CERT_REQUIRED,
355 ca_certs= (temporary_path if is_new else cert_path),
356 do_handshake_on_connect=True)
357 except ssl.SSLError, e:
358 print_error("SSL error:", self.host, e)
362 os.rename(temporary_path, cert_path + '.rej')
364 if cert_has_expired(cert_path):
365 print_error("certificate has expired:", cert_path)
368 print_msg("wrong certificate", self.host)
371 print_error("wrap_socket failed", self.host)
372 traceback.print_exc(file=sys.stdout)
376 print_error("saving certificate for", self.host)
377 os.rename(temporary_path, cert_path)
381 self.is_connected = True
382 print_error("connected to", self.host, self.port)
387 #if self.use_ssl: self.s.do_handshake()
389 while self.is_connected:
392 msg = self.s.recv(1024)
393 except socket.timeout:
397 except socket.error, err:
398 if err.errno in [11, 10035]:
399 print_error("socket errno", err.errno)
403 traceback.print_exc(file=sys.stdout)
407 # ping the server with server.version, as a real ping does not exist yet
408 self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
412 self.bytes_received += len(msg)
414 self.is_connected = False
422 self.queue_json_response(c)
425 traceback.print_exc(file=sys.stdout)
427 self.is_connected = False
430 def send_tcp(self, messages, callback):
431 """return the ids of the requests that we sent"""
436 request = json.dumps( { 'id':self.message_id, 'method':method, 'params':params } )
437 self.unanswered_requests[self.message_id] = method, params, callback
438 ids.append(self.message_id)
442 out += request + '\n'
445 sent = self.s.send( out )
447 except socket.error,e:
448 if e[0] in (errno.EWOULDBLOCK,errno.EAGAIN):
449 print_error( "EAGAIN: retrying")
453 traceback.print_exc(file=sys.stdout)
454 # this happens when we get disconnected
455 print_error( "Not connected, cannot send" )
463 def start_interface(self):
465 if self.protocol in 'st':
467 elif self.protocol in 'gh':
470 self.connect_event.set()
474 def stop_subscriptions(self):
475 for callback in self.subscriptions.keys():
477 self.subscriptions = {}
480 def send(self, messages, callback):
483 for message in messages:
485 if m[-10:] == '.subscribe':
490 if self.subscriptions.get(callback) is None:
491 self.subscriptions[callback] = []
493 if message not in self.subscriptions[callback]:
494 self.subscriptions[callback].append(message)
496 if not self.is_connected:
497 print_error("interface: trying to send while not connected")
500 if self.protocol in 'st':
502 out = self.send_tcp(messages, callback)
504 # do not use lock, http is synchronous
505 out = self.send_http(messages, callback)
510 def parse_proxy_options(self, s):
511 if type(s) == type({}): return s # fixme: type should be fixed
512 if type(s) != type(""): return None
513 if s.lower() == 'none': return None
514 proxy = { "mode":"socks5", "host":"localhost" }
517 if proxy_modes.count(args[n]) == 1:
518 proxy["mode"] = args[n]
521 proxy["host"] = args[n]
524 proxy["port"] = args[n]
526 proxy["port"] = "8080" if proxy["mode"] == "http" else "1080"
532 if self.is_connected and self.protocol in 'st' and self.s:
533 self.s.shutdown(socket.SHUT_RDWR)
537 def is_up_to_date(self):
538 return self.unanswered_requests == {}
542 def start(self, queue):
544 threading.Thread.start(self)
548 self.start_interface()
549 if self.is_connected:
550 self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
552 self.run_tcp() if self.protocol in 'st' else self.run_http()
556 def change_status(self):
557 #print "change status", self.server, self.is_connected
562 if __name__ == "__main__":