fix connect on windows
[electrum-nvc.git] / lib / interface.py
1 #!/usr/bin/env python
2 #
3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2011 thomasv@gitorious
5 #
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
10 #
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
15 #
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18
19
20 import random, ast, re, errno, os
21 import threading, traceback, sys, time, json, Queue
22 import socks
23 import socket
24 import ssl
25
26 from version import ELECTRUM_VERSION, PROTOCOL_VERSION
27 from util import print_error, print_msg
28 from simple_config import SimpleConfig
29
30
31 DEFAULT_TIMEOUT = 5
32 proxy_modes = ['socks4', 'socks5', 'http']
33
34
35 def check_cert(host, cert):
36     from OpenSSL import crypto as c
37     _cert = c.load_certificate(c.FILETYPE_PEM, cert)
38
39     m = "host: %s\n"%host
40     m += "has_expired: %s\n"% _cert.has_expired()
41     m += "pubkey: %s bits\n" % _cert.get_pubkey().bits()
42     m += "serial number: %s\n"% _cert.get_serial_number() 
43     #m += "issuer: %s\n"% _cert.get_issuer()
44     #m += "algo: %s\n"% _cert.get_signature_algorithm() 
45     m += "version: %s\n"% _cert.get_version()
46     print_msg(m)
47
48
49 def cert_has_expired(cert_path):
50     try:
51         import OpenSSL
52     except Exception:
53         print_error("Warning: cannot import OpenSSL")
54         return False
55     from OpenSSL import crypto as c
56     with open(cert_path) as f:
57         cert = f.read()
58     _cert = c.load_certificate(c.FILETYPE_PEM, cert)
59     return _cert.has_expired()
60
61
62 def check_certificates():
63     config = SimpleConfig()
64     mydir = os.path.join(config.path, "certs")
65     certs = os.listdir(mydir)
66     for c in certs:
67         print c
68         p = os.path.join(mydir,c)
69         with open(p) as f:
70             cert = f.read()
71         check_cert(c, cert)
72     
73
74 def cert_verify_hostname(s):
75     # hostname verification (disabled)
76     from backports.ssl_match_hostname import match_hostname, CertificateError
77     try:
78         match_hostname(s.getpeercert(True), host)
79         print_error("hostname matches", host)
80     except CertificateError, ce:
81         print_error("hostname did not match", host)
82
83
84
85 class Interface(threading.Thread):
86
87
88     def __init__(self, server, config = None):
89
90         threading.Thread.__init__(self)
91         self.daemon = True
92         self.config = config if config is not None else SimpleConfig()
93         self.connect_event = threading.Event()
94
95         self.subscriptions = {}
96         self.lock = threading.Lock()
97
98         self.rtime = 0
99         self.bytes_received = 0
100         self.is_connected = False
101         self.poll_interval = 1
102
103         self.debug = False # dump network messages. can be changed at runtime using the console
104
105         #json
106         self.message_id = 0
107         self.unanswered_requests = {}
108         self.pending_transactions_for_notifications= []
109
110         # parse server
111         self.server = server
112         try:
113             host, port, protocol = self.server.split(':')
114             port = int(port)
115         except Exception:
116             self.server = None
117             return
118
119         if protocol not in 'ghst':
120             raise Exception('Unknown protocol: %s'%protocol)
121
122         self.host = host
123         self.port = port
124         self.protocol = protocol
125         self.use_ssl = ( protocol in 'sg' )
126         self.proxy = self.parse_proxy_options(self.config.get('proxy'))
127         if self.proxy:
128             self.proxy_mode = proxy_modes.index(self.proxy["mode"]) + 1
129
130
131
132
133
134     def queue_json_response(self, c):
135
136         # uncomment to debug
137         if self.debug:
138             print_error( "<--",c )
139
140         msg_id = c.get('id')
141         error = c.get('error')
142         
143         if error:
144             print_error("received error:", c)
145             if msg_id is not None:
146                 with self.lock: 
147                     method, params, callback = self.unanswered_requests.pop(msg_id)
148                 callback(self,{'method':method, 'params':params, 'error':error, 'id':msg_id})
149
150             return
151
152         if msg_id is not None:
153             with self.lock: 
154                 method, params, callback = self.unanswered_requests.pop(msg_id)
155             result = c.get('result')
156
157         else:
158             # notification
159             method = c.get('method')
160             params = c.get('params')
161
162             if method == 'blockchain.numblocks.subscribe':
163                 result = params[0]
164                 params = []
165
166             elif method == 'blockchain.headers.subscribe':
167                 result = params[0]
168                 params = []
169
170             elif method == 'blockchain.address.subscribe':
171                 addr = params[0]
172                 result = params[1]
173                 params = [addr]
174
175             with self.lock:
176                 for k,v in self.subscriptions.items():
177                     if (method, params) in v:
178                         callback = k
179                         break
180                 else:
181                     print_error( "received unexpected notification", method, params)
182                     print_error( self.subscriptions )
183                     return
184
185
186         callback(self, {'method':method, 'params':params, 'result':result, 'id':msg_id})
187
188
189     def on_version(self, i, result):
190         self.server_version = result
191
192
193     def start_http(self):
194         self.session_id = None
195         self.is_connected = True
196         self.connection_msg = ('https' if self.use_ssl else 'http') + '://%s:%d'%( self.host, self.port )
197         try:
198             self.poll()
199         except Exception:
200             print_error("http init session failed")
201             self.is_connected = False
202             return
203
204         if self.session_id:
205             print_error('http session:',self.session_id)
206             self.is_connected = True
207         else:
208             self.is_connected = False
209
210     def run_http(self):
211         self.is_connected = True
212         while self.is_connected:
213             try:
214                 if self.session_id:
215                     self.poll()
216                 time.sleep(self.poll_interval)
217             except socket.gaierror:
218                 break
219             except socket.error:
220                 break
221             except Exception:
222                 traceback.print_exc(file=sys.stdout)
223                 break
224             
225         self.is_connected = False
226
227                 
228     def poll(self):
229         self.send([], None)
230
231
232     def send_http(self, messages, callback):
233         import urllib2, json, time, cookielib
234         print_error( "send_http", messages )
235         
236         if self.proxy:
237             socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]) )
238             socks.wrapmodule(urllib2)
239
240         cj = cookielib.CookieJar()
241         opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
242         urllib2.install_opener(opener)
243
244         t1 = time.time()
245
246         data = []
247         for m in messages:
248             method, params = m
249             if type(params) != type([]): params = [params]
250             data.append( { 'method':method, 'id':self.message_id, 'params':params } )
251             self.unanswered_requests[self.message_id] = method, params, callback
252             self.message_id += 1
253
254         if data:
255             data_json = json.dumps(data)
256         else:
257             # poll with GET
258             data_json = None 
259
260             
261         headers = {'content-type': 'application/json'}
262         if self.session_id:
263             headers['cookie'] = 'SESSION=%s'%self.session_id
264
265         try:
266             req = urllib2.Request(self.connection_msg, data_json, headers)
267             response_stream = urllib2.urlopen(req, timeout=DEFAULT_TIMEOUT)
268         except Exception:
269             return
270
271         for index, cookie in enumerate(cj):
272             if cookie.name=='SESSION':
273                 self.session_id = cookie.value
274
275         response = response_stream.read()
276         self.bytes_received += len(response)
277         if response: 
278             response = json.loads( response )
279             if type(response) is not type([]):
280                 self.queue_json_response(response)
281             else:
282                 for item in response:
283                     self.queue_json_response(item)
284
285         if response: 
286             self.poll_interval = 1
287         else:
288             if self.poll_interval < 15: 
289                 self.poll_interval += 1
290         #print self.poll_interval, response
291
292         self.rtime = time.time() - t1
293         self.is_connected = True
294
295
296
297
298     def start_tcp(self):
299
300         self.connection_msg = self.host + ':%d' % self.port
301
302         if self.proxy is not None:
303
304             socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"]))
305             socket.socket = socks.socksocket
306             # prevent dns leaks, see http://stackoverflow.com/questions/13184205/dns-over-proxy
307             def getaddrinfo(*args):
308                 return [(socket.AF_INET, socket.SOCK_STREAM, 6, '', (args[0], args[1]))]
309             socket.getaddrinfo = getaddrinfo
310
311         if self.use_ssl:
312             cert_path = os.path.join( self.config.path, 'certs', self.host)
313
314             if not os.path.exists(cert_path):
315                 is_new = True
316                 # get server certificate.
317                 # Do not use ssl.get_server_certificate because it does not work with proxy
318                 s = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
319                 try:
320                     s.connect((self.host, self.port))
321                 except Exception:
322                     # print_error("failed to connect", self.host, self.port)
323                     return
324
325                 try:
326                     s = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_SSLv3, cert_reqs=ssl.CERT_NONE, ca_certs=None)
327                 except ssl.SSLError, e:
328                     print_error("SSL error:", self.host, e)
329                     return
330                 dercert = s.getpeercert(True)
331                 s.close()
332                 cert = ssl.DER_cert_to_PEM_cert(dercert)
333                 # workaround android bug
334                 cert = re.sub("([^\n])-----END CERTIFICATE-----","\\1\n-----END CERTIFICATE-----",cert)
335                 temporary_path = cert_path + '.temp'
336                 with open(temporary_path,"w") as f:
337                     f.write(cert)
338
339             else:
340                 is_new = False
341
342
343         s = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
344         s.settimeout(2)
345         s.setsockopt(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1)
346
347         try:
348             s.connect(( self.host.encode('ascii'), int(self.port)))
349         except Exception:
350             print_error("failed to connect", self.host, self.port)
351             return
352
353         if self.use_ssl:
354             try:
355                 s = ssl.wrap_socket(s,
356                                     ssl_version=ssl.PROTOCOL_SSLv3,
357                                     cert_reqs=ssl.CERT_REQUIRED,
358                                     ca_certs= (temporary_path if is_new else cert_path),
359                                     do_handshake_on_connect=True)
360             except ssl.SSLError, e:
361                 print_error("SSL error:", self.host, e)
362                 if e.errno != 1:
363                     return
364                 if is_new:
365                     rej = cert_path + '.rej'
366                     if os.path.exists(rej):
367                         os.unlink(rej)
368                     os.rename(temporary_path, rej)
369                 else:
370                     if cert_has_expired(cert_path):
371                         print_error("certificate has expired:", cert_path)
372                         os.unlink(cert_path)
373                     else:
374                         print_msg("wrong certificate", self.host)
375                 return
376             except Exception:
377                 print_error("wrap_socket failed", self.host)
378                 traceback.print_exc(file=sys.stdout)
379                 return
380
381             if is_new:
382                 print_error("saving certificate for", self.host)
383                 os.rename(temporary_path, cert_path)
384
385         s.settimeout(60)
386         self.s = s
387         self.is_connected = True
388         print_error("connected to", self.host, self.port)
389
390
391     def run_tcp(self):
392         try:
393             #if self.use_ssl: self.s.do_handshake()
394             out = ''
395             while self.is_connected:
396                 try: 
397                     timeout = False
398                     msg = self.s.recv(1024)
399                 except socket.timeout:
400                     timeout = True
401                 except ssl.SSLError:
402                     timeout = True
403                 except socket.error, err:
404                     if err.errno in [11, 10035]:
405                         print_error("socket errno", err.errno)
406                         time.sleep(0.1)
407                         continue
408                     else:
409                         traceback.print_exc(file=sys.stdout)
410                         raise
411
412                 if timeout:
413                     # ping the server with server.version, as a real ping does not exist yet
414                     self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
415                     continue
416
417                 out += msg
418                 self.bytes_received += len(msg)
419                 if msg == '': 
420                     self.is_connected = False
421
422                 while True:
423                     s = out.find('\n')
424                     if s==-1: break
425                     c = out[0:s]
426                     out = out[s+1:]
427                     c = json.loads(c)
428                     self.queue_json_response(c)
429
430         except Exception:
431             traceback.print_exc(file=sys.stdout)
432
433         self.is_connected = False
434
435
436     def send_tcp(self, messages, callback):
437         """return the ids of the requests that we sent"""
438         out = ''
439         ids = []
440         for m in messages:
441             method, params = m 
442             request = json.dumps( { 'id':self.message_id, 'method':method, 'params':params } )
443             self.unanswered_requests[self.message_id] = method, params, callback
444             ids.append(self.message_id)
445             if self.debug:
446                 print "-->", request
447             self.message_id += 1
448             out += request + '\n'
449         while out:
450             try:
451                 sent = self.s.send( out )
452                 out = out[sent:]
453             except socket.error,e:
454                 if e[0] in (errno.EWOULDBLOCK,errno.EAGAIN):
455                     print_error( "EAGAIN: retrying")
456                     time.sleep(0.1)
457                     continue
458                 else:
459                     traceback.print_exc(file=sys.stdout)
460                     # this happens when we get disconnected
461                     print_error( "Not connected, cannot send" )
462                     return None
463         return ids
464
465
466
467
468
469     def start_interface(self):
470
471         if self.protocol in 'st':
472             self.start_tcp()
473         elif self.protocol in 'gh':
474             self.start_http()
475
476         self.connect_event.set()
477
478
479
480     def stop_subscriptions(self):
481         for callback in self.subscriptions.keys():
482             callback(self, None)
483         self.subscriptions = {}
484
485
486     def send(self, messages, callback):
487
488         sub = []
489         for message in messages:
490             m, v = message
491             if m[-10:] == '.subscribe':
492                 sub.append(message)
493
494         if sub:
495             with self.lock:
496                 if self.subscriptions.get(callback) is None: 
497                     self.subscriptions[callback] = []
498                 for message in sub:
499                     if message not in self.subscriptions[callback]:
500                         self.subscriptions[callback].append(message)
501
502         if not self.is_connected: 
503             print_error("interface: trying to send while not connected")
504             return
505
506         if self.protocol in 'st':
507             with self.lock:
508                 out = self.send_tcp(messages, callback)
509         else:
510             # do not use lock, http is synchronous
511             out = self.send_http(messages, callback)
512
513         return out
514
515
516     def parse_proxy_options(self, s):
517         if type(s) == type({}): return s  # fixme: type should be fixed
518         if type(s) != type(""): return None  
519         if s.lower() == 'none': return None
520         proxy = { "mode":"socks5", "host":"localhost" }
521         args = s.split(':')
522         n = 0
523         if proxy_modes.count(args[n]) == 1:
524             proxy["mode"] = args[n]
525             n += 1
526         if len(args) > n:
527             proxy["host"] = args[n]
528             n += 1
529         if len(args) > n:
530             proxy["port"] = args[n]
531         else:
532             proxy["port"] = "8080" if proxy["mode"] == "http" else "1080"
533         return proxy
534
535
536
537     def stop(self):
538         if self.is_connected and self.protocol in 'st' and self.s:
539             self.s.shutdown(socket.SHUT_RDWR)
540             self.s.close()
541
542
543     def is_up_to_date(self):
544         return self.unanswered_requests == {}
545
546
547
548     def start(self, queue = None, wait = False):
549         if not self.server:
550             return
551         self.queue = queue if queue else Queue.Queue()
552         threading.Thread.start(self)
553         if wait:
554             self.connect_event.wait()
555
556
557     def run(self):
558         self.start_interface()
559         if self.is_connected:
560             self.send([('server.version', [ELECTRUM_VERSION, PROTOCOL_VERSION])], self.on_version)
561             self.change_status()
562             self.run_tcp() if self.protocol in 'st' else self.run_http()
563         self.change_status()
564         
565
566     def change_status(self):
567         #print "change status", self.server, self.is_connected
568         self.queue.put(self)
569
570
571
572 if __name__ == "__main__":
573
574     check_certificates()