1 # Eloipool - Python Bitcoin pool server
2 # Copyright (C) 2011-2012 Luke Dashjr <luke-jr+eloipool@utopios.org>
4 # This program is free software: you can redistribute it and/or modify
5 # it under the terms of the GNU Affero General Public License as
6 # published by the Free Software Foundation, either version 3 of the
7 # License, or (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU Affero General Public License for more details.
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
25 WithinLongpoll = httpserver.AsyncRequest
27 class _SentJSONError(BaseException):
28 def __init__(self, rv):
31 class JSONRPCHandler(httpserver.HTTPHandler):
33 'NELH': None, # FIXME: identify which clients have a problem with this
37 'X-Long-Polling': None,
40 JSONRPCURIs = (b'/', b'/LP', b'/LP/')
42 logger = logging.getLogger('JSONRPCHandler')
44 def sendReply(self, status=200, body=b'', headers=None):
45 headers = dict(headers) if headers else {}
46 if body and body[0] == 123: # b'{'
47 headers.setdefault('Content-Type', 'application/json')
48 if status == 200 and self.path in self.JSONRPCURIs:
50 headers.setdefault('Content-Type', 'application/json')
51 headers.setdefault('X-Long-Polling', '/LP')
52 if self.JSONRPCMethod == 'getwork':
53 # FIXME: Move this to jsonrpc_getwork somehow
54 headers.setdefault('X-Roll-NTime', 'expire=120')
55 return super().sendReply(status, body, headers)
57 def fmtError(self, reason = '', code = 100):
58 reason = json.dumps(reason)
59 reason = r'{"result":null,"id":null,"error":{"name":"JSONRPCError","code":%d,"message":%s}}' % (code, reason)
60 reason = reason.encode('utf8')
63 def doError(self, reason = '', code = 100):
64 reason = self.fmtError(reason, code)
65 return self.sendReply(500, reason)
67 def checkAuthentication(self, un, pw):
70 _MidstateNotAdv = (b'phoenix', b'poclbm', b'gminor')
71 def doHeader_user_agent(self, value):
72 self.reqinfo['UA'] = value
74 (UA, v, *x) = value.split(b'/', 1) + [None]
76 # Temporary HACK to keep working with older gmp-proxy
77 # NOTE: This will go away someday.
78 if UA == b'AuthServiceProxy':
83 if v[0] == b'v': v = v[1:]
84 v = tuple(map(int, v.split(b'.'))) + (0,0,0)
87 if UA in self._MidstateNotAdv:
90 quirks['midstate'] = None
91 if v[0] < 2 and v[1] < 8 and v[2] < 1:
94 quirks['midstate'] = None
96 def doHeader_x_minimum_wait(self, value):
97 self.reqinfo['MinWait'] = int(value)
99 def doHeader_x_mining_extensions(self, value):
100 self.extensions = value.decode('ascii').lower().split(' ')
102 def doLongpoll(self, *a):
107 if 'NELH' not in self.quirks:
108 # [NOT No] Early Longpoll Headers
109 self.sendReply(200, body=None, headers=self.LPHeaders)
110 self.push(b"1\r\n{\r\n")
111 self.changeTask(self._chunkedKA, timeNow + 45)
113 self.changeTask(None)
115 waitTime = self.reqinfo.get('MinWait', 15) # TODO: make default configurable
116 self.waitTime = waitTime + timeNow
118 totfromme = self.LPTrack()
119 self.server._LPClients[id(self)] = self
120 self.logger.debug("New LP client; %d total; %d from %s" % (len(self.server._LPClients), totfromme, self.remoteHost))
124 def _chunkedKA(self):
125 # Keepalive via chunked transfer encoding
126 self.push(b"1\r\n \r\n")
127 self.changeTask(self._chunkedKA, time() + 45)
130 myip = self.remoteHost
131 if myip not in self.server.LPTracking:
132 self.server.LPTracking[myip] = 0
133 self.server.LPTracking[myip] += 1
134 return self.server.LPTracking[myip]
137 self.server.LPTracking[self.remoteHost] -= 1
140 # Called when the connection is closed
143 self.changeTask(None)
145 del self.server._LPClients[id(self)]
150 def wakeLongpoll(self):
152 if now < self.waitTime:
153 self.changeTask(self.wakeLongpoll, self.waitTime)
156 self.changeTask(None)
160 rv = self._doJSON_i(*self._LPCall, longpoll=True)
161 if 'NELH' not in self.quirks:
162 rv = rv[1:] # strip the '{' we already sent
163 self.push(('%x' % len(rv)).encode('utf8') + b"\r\n" + rv + b"\r\n0\r\n\r\n")
165 self.sendReply(200, body=rv, headers=self.LPHeaders)
169 def _doJSON_i(self, reqid, method, params, longpoll = False):
171 rv = getattr(self, method)(*params)
172 except Exception as e:
173 self.logger.error(("Error during JSON-RPC call: %s%s\n" % (method, params)) + traceback.format_exc())
174 efun = self.fmtError if longpoll else self.doError
175 return efun(r'Service error: %s' % (e,))
177 # response was already sent (eg, authentication request)
180 rv.setdefault('submitold', True)
183 rv = {'id': reqid, 'error': None, 'result': rv}
187 efun = self.fmtError if longpoll else self.doError
188 return efun(r'Error encoding reply in JSON')
189 rv = rv.encode('utf8')
190 return rv if longpoll else self.sendReply(200, rv, headers=self._JSONHeaders)
192 def doJSON(self, data, longpoll = False):
193 # TODO: handle JSON errors
194 data = data.decode('utf8')
195 if longpoll and not data:
196 return self.doLongpoll(1, 'doJSON_getwork', ())
198 data = json.loads(data)
199 method = str(data['method']).lower()
200 self.JSONRPCMethod = method
201 method = 'doJSON_' + method
203 return self.doError(r'Parse error')
205 return self.doError(r'Bad call')
206 if not hasattr(self, method):
207 return self.doError(r'Procedure not found')
208 # TODO: handle errors as JSON-RPC
209 self._JSONHeaders = {}
210 params = data.setdefault('params', ())
211 procfun = self._doJSON_i
212 if longpoll and not params:
213 procfun = self.doLongpoll
214 return procfun(data['id'], method, params)
216 def handle_close(self):
218 super().handle_close()
220 def handle_request(self):
221 if not self.method in (b'GET', b'POST'):
222 return self.sendReply(405)
223 if not self.path in self.JSONRPCURIs:
224 if self.path[:5] == b'/src/':
225 return self.handle_src_request()
226 return self.sendReply(404)
227 if not self.Username:
228 return self.doAuthenticate()
230 data = b''.join(self.incoming)
231 return self.doJSON(data, self.path[:3] == b'/LP')
234 except WithinLongpoll:
237 self.logger.error(traceback.format_exc())
238 return self.doError('uncaught error')
240 def reset_request(self):
242 self.JSONRPCMethod = None
243 super().reset_request()
245 setattr(JSONRPCHandler, 'doHeader_user-agent', JSONRPCHandler.doHeader_user_agent);
246 setattr(JSONRPCHandler, 'doHeader_x-minimum-wait', JSONRPCHandler.doHeader_x_minimum_wait);
247 setattr(JSONRPCHandler, 'doHeader_x-mining-extensions', JSONRPCHandler.doHeader_x_mining_extensions);
249 JSONRPCListener = networkserver.NetworkListener
251 class JSONRPCServer(networkserver.AsyncSocketServer):
252 logger = logging.getLogger('JSONRPCServer')
256 def __init__(self, *a, **ka):
257 ka.setdefault('RequestHandlerClass', JSONRPCHandler)
258 super().__init__(*a, **ka)
260 self.SecretUser = None
262 self.LPRequest = False
264 self._LPWaitTime = time() + 15
268 def pre_schedule(self):
269 if self.LPRequest == 1:
272 def wakeLongpoll(self):
274 self.logger.info('Ignoring longpoll attempt while another is waiting')
281 if self._LPWaitTime > now:
282 delay = self._LPWaitTime - now
283 self.logger.info('Waiting %.3g seconds to longpoll' % (delay,))
284 self.schedule(self._actualLP, self._LPWaitTime)
290 self.LPRequest = False
291 C = tuple(self._LPClients.values())
294 self.logger.info('Nobody to longpoll')
297 self.logger.debug("%d clients to wake up..." % (OC,))
306 # Ignore socket errors; let the main event loop take care of them later
309 self.logger.debug('Error waking longpoll handler:\n' + traceback.format_exc())
311 self._LPWaitTime = time()
312 self.logger.info('Longpoll woke up %d clients in %.3f seconds' % (OC, self._LPWaitTime - now))
313 self._LPWaitTime += 5 # TODO: make configurable: minimum time between longpolls
315 def TopLPers(self, n = 0x10):
316 tmp = list(self.LPTracking.keys())
317 tmp.sort(key=lambda k: self.LPTracking[k])
318 for jerk in map(lambda k: (k, self.LPTracking[k]), tmp[-n:]):