manage subscriptions in network.py
[electrum-nvc.git] / lib / interface.py
1 #!/usr/bin/env python
2 #
3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2011 thomasv@gitorious
5 #
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
10 #
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
15 #
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18
19
20 import random, ast, re, errno, os
21 import threading, traceback, sys, time, json, Queue
22 import socks
23 import socket
24 import ssl
25
26 from version import ELECTRUM_VERSION, PROTOCOL_VERSION
27 from util import print_error, print_msg
28 from simple_config import SimpleConfig
29
30
31 DEFAULT_TIMEOUT = 5
32 proxy_modes = ['socks4', 'socks5', 'http']
33
34
35 def check_cert(host, cert):
36     from OpenSSL import crypto as c
37     _cert = c.load_certificate(c.FILETYPE_PEM, cert)
38
39     m = "host: %s\n"%host
40     m += "has_expired: %s\n"% _cert.has_expired()
41     m += "pubkey: %s bits\n" % _cert.get_pubkey().bits()
42     m += "serial number: %s\n"% _cert.get_serial_number() 
43     #m += "issuer: %s\n"% _cert.get_issuer()
44     #m += "algo: %s\n"% _cert.get_signature_algorithm() 
45     m += "version: %s\n"% _cert.get_version()
46     print_msg(m)
47
48
49
50 def check_certificates():
51     config = SimpleConfig()
52     mydir = os.path.join(config.path, "certs")
53     certs = os.listdir(mydir)
54     for c in certs:
55         print c
56         p = os.path.join(mydir,c)
57         with open(p) as f:
58             cert = f.read()
59         check_cert(c, cert)
60     
61
62 def cert_verify_hostname(s):
63     # hostname verification (disabled)
64     from backports.ssl_match_hostname import match_hostname, CertificateError
65     try:
66         match_hostname(s.getpeercert(True), host)
67         print_error("hostname matches", host)
68     except CertificateError, ce:
69         print_error("hostname did not match", host)
70
71
72
73 class Interface(threading.Thread):
74
75
76     def __init__(self, config=None):
77
78         if config is None:
79             config = SimpleConfig()
80
81         threading.Thread.__init__(self)
82         self.daemon = True
83         self.config = config
84         self.connect_event = threading.Event()
85
86         self.subscriptions = {}
87         self.lock = threading.Lock()
88
89         self.rtime = 0
90         self.bytes_received = 0
91         self.is_connected = False
92         self.poll_interval = 1
93
94         #json
95         self.message_id = 0
96         self.unanswered_requests = {}
97         self.pending_transactions_for_notifications= []
98
99         # parse server
100         s = config.get('server')
101         host, port, protocol = s.split(':')
102         port = int(port)
103             
104         if protocol not in 'ghst':
105             raise BaseException('Unknown protocol: %s'%protocol)
106
107         self.host = host
108         self.port = port
109         self.protocol = protocol
110         self.use_ssl = ( protocol in 'sg' )
111         self.proxy = self.parse_proxy_options(config.get('proxy'))
112         if self.proxy:
113             self.proxy_mode = proxy_modes.index(self.proxy["mode"]) + 1
114         self.server = host + ':%d:%s'%(port, protocol)
115
116
117
118
119
120     def queue_json_response(self, c):
121
122         # uncomment to debug
123         # print_error( "<--",c )
124
125         msg_id = c.get('id')
126         error = c.get('error')
127         
128         if error:
129             print_error("received error:", c)
130             if msg_id is not None:
131                 with self.lock: 
132                     method, params, callback = self.unanswered_requests.pop(msg_id)
133                 callback(self,{'method':method, 'params':params, 'error':error, 'id':msg_id})
134
135             return
136
137         if msg_id is not None:
138             with self.lock: 
139                 method, params, callback = self.unanswered_requests.pop(msg_id)
140             result = c.get('result')
141
142         else:
143             # notification
144             method = c.get('method')
145             params = c.get('params')
146
147             if method == 'blockchain.numblocks.subscribe':
148                 result = params[0]
149                 params = []
150
151             elif method == 'blockchain.headers.subscribe':
152                 result = params[0]
153                 params = []
154
155             elif method == 'blockchain.address.subscribe':
156                 addr = params[0]
157                 result = params[1]
158                 params = [addr]
159
160             with self.lock:
161                 for k,v in self.subscriptions.items():
162                     if (method, params) in v:
163                         callback = k
164                         break
165                 else:
166                     print_error( "received unexpected notification", method, params)
167                     print_error( self.subscriptions )
168                     return
169
170
171         callback(self, {'method':method, 'params':params, 'result':result, 'id':msg_id})
172
173
174     def on_version(self, i, result):
175         self.server_version = result
176
177
178     def start_http(self):
179         self.session_id = None
180         self.is_connected = True
181         self.connection_msg = ('https' if self.use_ssl else 'http') + '://%s:%d'%( self.host, self.port )
182         try:
183             self.poll()
184         except:
185             print_error("http init session failed")
186             self.is_connected = False
187             return
188
189         if self.session_id:
190             print_error('http session:',self.session_id)
191             self.is_connected = True
192         else:
193             self.is_connected = False
194
195     def run_http(self):
196         self.is_connected = True
197         while self.is_connected:
198             try:
199                 if self.session_id:
200                     self.poll()
201                 time.sleep(self.poll_interval)
202             except socket.gaierror:
203                 break
204             except socket.error:
205                 break
206             except:
207                 traceback.print_exc(file=sys.stdout)
208                 break
209             
210         self.is_connected = False
211
212                 
213     def poll(self):
214         self.send([])
215
216
217     def send_http(self, messages, callback):
218         import urllib2, json, time, cookielib
219         print_error( "send_http", messages )
220         
221         if self.proxy:
222             socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]) )
223             socks.wrapmodule(urllib2)
224
225         cj = cookielib.CookieJar()
226         opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
227         urllib2.install_opener(opener)
228
229         t1 = time.time()
230
231         data = []
232         for m in messages:
233             method, params = m
234             if type(params) != type([]): params = [params]
235             data.append( { 'method':method, 'id':self.message_id, 'params':params } )
236             self.unanswered_requests[self.message_id] = method, params, callback
237             self.message_id += 1
238
239         if data:
240             data_json = json.dumps(data)
241         else:
242             # poll with GET
243             data_json = None 
244
245             
246         headers = {'content-type': 'application/json'}
247         if self.session_id:
248             headers['cookie'] = 'SESSION=%s'%self.session_id
249
250         try:
251             req = urllib2.Request(self.connection_msg, data_json, headers)
252             response_stream = urllib2.urlopen(req, timeout=DEFAULT_TIMEOUT)
253         except:
254             return
255
256         for index, cookie in enumerate(cj):
257             if cookie.name=='SESSION':
258                 self.session_id = cookie.value
259
260         response = response_stream.read()
261         self.bytes_received += len(response)
262         if response: 
263             response = json.loads( response )
264             if type(response) is not type([]):
265                 self.queue_json_response(response)
266             else:
267                 for item in response:
268                     self.queue_json_response(item)
269
270         if response: 
271             self.poll_interval = 1
272         else:
273             if self.poll_interval < 15: 
274                 self.poll_interval += 1
275         #print self.poll_interval, response
276
277         self.rtime = time.time() - t1
278         self.is_connected = True
279
280
281
282
283     def start_tcp(self):
284
285         self.connection_msg = self.host + ':%d' % self.port
286
287         if self.proxy is not None:
288
289             socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]))
290             socket.socket = socks.socksocket
291             # prevent dns leaks, see http://stackoverflow.com/questions/13184205/dns-over-proxy
292             def getaddrinfo(*args):
293                 return [(socket.AF_INET, socket.SOCK_STREAM, 6, '', (args[0], args[1]))]
294             socket.getaddrinfo = getaddrinfo
295
296         if self.use_ssl:
297             cert_path = os.path.join( self.config.get('path'), 'certs', self.host)
298
299             if not os.path.exists(cert_path):
300                 is_new = True
301                 # get server certificate.
302                 # Do not use ssl.get_server_certificate because it does not work with proxy
303                 s = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
304                 try:
305                     s.connect((self.host, self.port))
306                 except:
307                     # print_error("failed to connect", self.host, self.port)
308                     return
309
310                 s = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_SSLv3, cert_reqs=ssl.CERT_NONE, ca_certs=None)
311                 dercert = s.getpeercert(True)
312                 s.close()
313                 cert = ssl.DER_cert_to_PEM_cert(dercert)
314                 temporary_path = cert_path + '.temp'
315                 with open(temporary_path,"w") as f:
316                     f.write(cert)
317
318             else:
319                 is_new = False
320
321
322         s = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
323         s.settimeout(2)
324         s.setsockopt(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1)
325
326         try:
327             s.connect(( self.host.encode('ascii'), int(self.port)))
328         except:
329             print_error("failed to connect", self.host, self.port)
330             return
331
332         if self.use_ssl:
333             try:
334                 s = ssl.wrap_socket(s,
335                                     ssl_version=ssl.PROTOCOL_SSLv3,
336                                     cert_reqs=ssl.CERT_REQUIRED,
337                                     ca_certs= (temporary_path if is_new else cert_path),
338                                     do_handshake_on_connect=True)
339             except ssl.SSLError, e:
340                 print_error("SSL error:", self.host, e)
341                 if e.errno != 1:
342                     return
343                 if is_new:
344                     os.rename(temporary_path, cert_path + '.rej')
345                 else:
346                     from OpenSSL import crypto as c
347                     with open(cert_path) as f:
348                         cert = f.read()
349                     _cert = c.load_certificate(c.FILETYPE_PEM, cert)
350                     if _cert.has_expired():
351                         print_error("certificate has expired:", cert_path)
352                         os.unlink(cert_path)
353                     else:
354                         print_msg("wrong certificate", self.host)
355
356                 return
357             except:
358                 print_error("wrap_socket failed", self.host)
359                 traceback.print_exc(file=sys.stdout)
360                 return
361
362             if is_new:
363                 print_error("saving certificate for", self.host)
364                 os.rename(temporary_path, cert_path)
365
366
367         s.settimeout(60)
368         self.s = s
369         self.is_connected = True
370         print_error("connected to", self.host, self.port)
371
372
373     def run_tcp(self):
374         try:
375             #if self.use_ssl: self.s.do_handshake()
376             out = ''
377             while self.is_connected:
378                 try: 
379                     timeout = False
380                     msg = self.s.recv(1024)
381                 except socket.timeout:
382                     timeout = True
383                 except ssl.SSLError:
384                     timeout = True
385                 except socket.error, err:
386                     if err.errno in [11, 10035]:
387                         print_error("socket errno", err.errno)
388                         time.sleep(0.1)
389                         continue
390                     else:
391                         traceback.print_exc(file=sys.stdout)
392                         raise
393
394                 if timeout:
395                     # ping the server with server.version, as a real ping does not exist yet
396                     self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
397                     continue
398
399                 out += msg
400                 self.bytes_received += len(msg)
401                 if msg == '': 
402                     self.is_connected = False
403
404                 while True:
405                     s = out.find('\n')
406                     if s==-1: break
407                     c = out[0:s]
408                     out = out[s+1:]
409                     c = json.loads(c)
410                     self.queue_json_response(c)
411
412         except:
413             traceback.print_exc(file=sys.stdout)
414
415         self.is_connected = False
416
417
418     def send_tcp(self, messages, callback):
419         """return the ids of the requests that we sent"""
420         out = ''
421         ids = []
422         for m in messages:
423             method, params = m 
424             request = json.dumps( { 'id':self.message_id, 'method':method, 'params':params } )
425             self.unanswered_requests[self.message_id] = method, params, callback
426             ids.append(self.message_id)
427             # uncomment to debug
428             # print "-->", request
429             self.message_id += 1
430             out += request + '\n'
431         while out:
432             try:
433                 sent = self.s.send( out )
434                 out = out[sent:]
435             except socket.error,e:
436                 if e[0] in (errno.EWOULDBLOCK,errno.EAGAIN):
437                     print_error( "EAGAIN: retrying")
438                     time.sleep(0.1)
439                     continue
440                 else:
441                     traceback.print_exc(file=sys.stdout)
442                     # this happens when we get disconnected
443                     print_error( "Not connected, cannot send" )
444                     return None
445         return ids
446
447
448
449
450
451     def start_interface(self):
452
453         if self.protocol in 'st':
454             self.start_tcp()
455         elif self.protocol in 'gh':
456             self.start_http()
457
458         self.connect_event.set()
459
460
461
462     def stop_subscriptions(self):
463         for callback in self.subscriptions.keys():
464             callback(self, None)
465         self.subscriptions = {}
466
467
468     def send(self, messages, callback):
469
470         sub = []
471         for message in messages:
472             m, v = message
473             if m[-10:] == '.subscribe':
474                 sub.append(message)
475
476         if sub:
477             with self.lock:
478                 if self.subscriptions.get(callback) is None: 
479                     self.subscriptions[callback] = []
480                 for message in sub:
481                     if message not in self.subscriptions[callback]:
482                         self.subscriptions[callback].append(message)
483
484         if not self.is_connected: 
485             print_error("interface: trying to send while not connected")
486             return
487
488         if self.protocol in 'st':
489             with self.lock:
490                 out = self.send_tcp(messages, callback)
491         else:
492             # do not use lock, http is synchronous
493             out = self.send_http(messages, callback)
494
495         return out
496
497
498     def parse_proxy_options(self, s):
499         if type(s) == type({}): return s  # fixme: type should be fixed
500         if type(s) != type(""): return None  
501         if s.lower() == 'none': return None
502         proxy = { "mode":"socks5", "host":"localhost" }
503         args = s.split(':')
504         n = 0
505         if proxy_modes.count(args[n]) == 1:
506             proxy["mode"] = args[n]
507             n += 1
508         if len(args) > n:
509             proxy["host"] = args[n]
510             n += 1
511         if len(args) > n:
512             proxy["port"] = args[n]
513         else:
514             proxy["port"] = "8080" if proxy["mode"] == "http" else "1080"
515         return proxy
516
517
518
519     def stop(self):
520         if self.is_connected and self.protocol in 'st' and self.s:
521             self.s.shutdown(socket.SHUT_RDWR)
522             self.s.close()
523
524
525     def is_up_to_date(self):
526         return self.unanswered_requests == {}
527
528
529     def synchronous_get(self, requests, timeout=100000000):
530         # todo: use generators, unanswered_requests should be a list of arrays...
531         queue = Queue.Queue()
532         ids = self.send(requests, lambda i,r: queue.put(r))
533         id2 = ids[:]
534         res = {}
535         while ids:
536             r = queue.get(True, timeout)
537             _id = r.get('id')
538             if _id in ids:
539                 ids.remove(_id)
540                 res[_id] = r.get('result')
541         out = []
542         for _id in id2:
543             out.append(res[_id])
544         return out
545
546
547     def start(self, queue):
548         self.queue = queue
549         threading.Thread.start(self)
550
551
552     def run(self):
553         self.start_interface()
554         if self.is_connected:
555             self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
556             self.change_status()
557             self.run_tcp() if self.protocol in 'st' else self.run_http()
558         self.change_status()
559         
560
561     def change_status(self):
562         #print "change status", self.server, self.is_connected
563         self.queue.put(self)
564
565
566
567 if __name__ == "__main__":
568
569     check_certificates()