123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488 |
- #!/usr/bin/env python3
- #
- # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
- # Copyright (C)2013-2023 The MMGen Project <mmgen@tuta.io>
- #
- # This program is free software: you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation, either version 3 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program. If not, see <http://www.gnu.org/licenses/>.
- """
- rpc: Cryptocoin RPC library for the MMGen suite
- """
- import re,base64,json,asyncio,importlib
- from decimal import Decimal
- from collections import namedtuple
- from .cfg import gc
- from .util import msg,die,fmt,fmt_list,pp_fmt,oneshot_warning
- from .base_obj import AsyncInit
- from .obj import NonNegativeInt
- from .objmethods import Hilite,InitErrors,MMGenObject
- auth_data = namedtuple('rpc_auth_data',['user','passwd'])
- def dmsg_rpc(fs,data=None,is_json=False):
- msg(
- fs if data == None else
- fs.format(pp_fmt(json.loads(data) if is_json else data))
- )
- def dmsg_rpc_backend(host_url,host_path,payload):
- msg(
- f'\n RPC URL: {host_url}{host_path}' +
- f'\n RPC PAYLOAD data (httplib) ==>' +
- f'\n{pp_fmt(payload)}\n' )
- def noop(*args,**kwargs):
- pass
- class IPPort(str,Hilite,InitErrors):
- color = 'yellow'
- width = 0
- trunc_ok = False
- min_len = 9 # 0.0.0.0:0
- max_len = 21 # 255.255.255.255:65535
- def __new__(cls,s):
- if type(s) == cls:
- return s
- try:
- m = re.fullmatch(r'{q}\.{q}\.{q}\.{q}:(\d{{1,10}})'.format(q=r'([0-9]{1,3})'),s)
- assert m is not None, f'{s!r}: invalid IP:HOST specifier'
- for e in m.groups():
- if len(e) != 1 and e[0] == '0':
- raise ValueError(f'{e}: leading zeroes not permitted in dotted decimal element or port number')
- res = [int(e) for e in m.groups()]
- for e in res[:4]:
- assert e <= 255, f'{e}: dotted decimal element > 255'
- assert res[4] <= 65535, f'{res[4]}: port number > 65535'
- me = str.__new__(cls,s)
- me.ip = '{}.{}.{}.{}'.format(*res)
- me.ip_num = sum( res[i] * ( 2 ** (-(i-3)*8) ) for i in range(4) )
- me.port = res[4]
- return me
- except Exception as e:
- return cls.init_fail(e,s)
- class json_encoder(json.JSONEncoder):
- def default(self,obj):
- if isinstance(obj,Decimal):
- return str(obj)
- else:
- return json.JSONEncoder.default(self,obj)
- class RPCBackends:
- class base:
- def __init__(self,caller):
- self.cfg = caller.cfg
- self.host = caller.host
- self.port = caller.port
- self.proxy = caller.proxy
- self.host_url = caller.host_url
- self.timeout = caller.timeout
- self.http_hdrs = caller.http_hdrs
- self.name = type(self).__name__
- class aiohttp(base,metaclass=AsyncInit):
- """
- Contrary to the requests library, aiohttp won’t read environment variables by
- default. But you can do so by passing trust_env=True into aiohttp.ClientSession
- constructor to honor HTTP_PROXY, HTTPS_PROXY, WS_PROXY or WSS_PROXY environment
- variables (all are case insensitive).
- """
- def __del__(self):
- self.connector.close()
- self.session.detach()
- del self.session
- async def __init__(self,caller):
- super().__init__(caller)
- import aiohttp
- self.connector = aiohttp.TCPConnector(limit_per_host=self.cfg.aiohttp_rpc_queue_len)
- self.session = aiohttp.ClientSession(
- headers = { 'Content-Type': 'application/json' },
- connector = self.connector,
- )
- if caller.auth_type == 'basic':
- self.auth = aiohttp.BasicAuth(*caller.auth,encoding='UTF-8')
- else:
- self.auth = None
- async def run(self,payload,timeout,host_path):
- dmsg_rpc_backend(self.host_url,host_path,payload)
- async with self.session.post(
- url = self.host_url + host_path,
- auth = self.auth,
- data = json.dumps(payload,cls=json_encoder),
- timeout = timeout or self.timeout,
- ) as res:
- return (await res.text(),res.status)
- class requests(base):
- def __del__(self):
- self.session.close()
- def __init__(self,caller):
- super().__init__(caller)
- import requests,urllib3
- urllib3.disable_warnings()
- self.session = requests.Session()
- self.session.trust_env = False # ignore *_PROXY environment vars
- self.session.headers = caller.http_hdrs
- if caller.auth_type:
- auth = 'HTTP' + caller.auth_type.capitalize() + 'Auth'
- self.session.auth = getattr(requests.auth,auth)(*caller.auth)
- if self.proxy:
- self.session.proxies.update({
- 'http': f'socks5h://{self.proxy}',
- 'https': f'socks5h://{self.proxy}'
- })
- async def run(self,*args,**kwargs):
- return self.run_noasync(*args,**kwargs)
- def run_noasync(self,payload,timeout,host_path):
- dmsg_rpc_backend(self.host_url,host_path,payload)
- res = self.session.post(
- url = self.host_url + host_path,
- data = json.dumps(payload,cls=json_encoder),
- timeout = timeout or self.timeout,
- verify = False )
- return (res.content,res.status_code)
- class httplib(base):
- """
- Ignores *_PROXY environment vars
- """
- def __del__(self):
- self.session.close()
- def __init__(self,caller):
- super().__init__(caller)
- import http.client
- self.session = http.client.HTTPConnection(caller.host,caller.port,caller.timeout)
- if caller.auth_type == 'basic':
- auth_str = f'{caller.auth.user}:{caller.auth.passwd}'
- auth_str_b64 = 'Basic ' + base64.b64encode(auth_str.encode()).decode()
- self.http_hdrs.update({ 'Host': self.host, 'Authorization': auth_str_b64 })
- dmsg_rpc(' RPC AUTHORIZATION data ==> raw: [{}]\n{:>31}enc: [{}]\n'.format(
- auth_str,
- '',
- auth_str_b64 ))
- async def run(self,payload,timeout,host_path):
- dmsg_rpc_backend(self.host_url,host_path,payload)
- if timeout:
- import http.client
- s = http.client.HTTPConnection(self.host,self.port,timeout)
- else:
- s = self.session
- try:
- s.request(
- method = 'POST',
- url = host_path,
- body = json.dumps(payload,cls=json_encoder),
- headers = self.http_hdrs )
- r = s.getresponse() # => http.client.HTTPResponse instance
- except Exception as e:
- die( 'RPCFailure', str(e) )
- if timeout:
- ret = ( r.read(), r.status )
- s.close()
- return ret
- else:
- return ( r.read(), r.status )
- class curl(base):
- def __init__(self,caller):
- def gen_opts():
- for k,v in caller.http_hdrs.items():
- for s in ('--header',f'{k}: {v}'):
- yield s
- if caller.auth_type:
- """
- Authentication with curl is insecure, as it exposes the user's credentials
- via the command line. Use for testing only.
- """
- for s in ('--user',f'{caller.auth.user}:{caller.auth.passwd}'):
- yield s
- if caller.auth_type == 'digest':
- yield '--digest'
- if caller.network_proto == 'https' and caller.verify_server == False:
- yield '--insecure'
- super().__init__(caller)
- self.exec_opts = list(gen_opts()) + ['--silent']
- self.arg_max = 8192 # set way below system ARG_MAX, just to be safe
- async def run(self,payload,timeout,host_path):
- data = json.dumps(payload,cls=json_encoder)
- if len(data) > self.arg_max:
- return self.httplib(payload,timeout=timeout)
- dmsg_rpc_backend(self.host_url,host_path,payload)
- exec_cmd = [
- 'curl',
- '--proxy', f'socks5h://{self.proxy}' if self.proxy else '',
- '--connect-timeout', str(timeout or self.timeout),
- '--write-out', '%{http_code}',
- '--data-binary', data
- ] + self.exec_opts + [self.host_url + host_path]
- dmsg_rpc(' RPC curl exec data ==>\n{}\n',exec_cmd)
- from subprocess import run,PIPE
- from .color import set_vt100
- res = run(exec_cmd,stdout=PIPE,check=True).stdout.decode()
- set_vt100()
- # res = run(exec_cmd,stdout=PIPE,check=True,text='UTF-8').stdout # Python 3.7+
- return (res[:-3],int(res[-3:]))
- class RPCClient(MMGenObject):
- auth_type = None
- has_auth_cookie = False
- network_proto = 'http'
- proxy = None
- def __init__(self,cfg,host,port,test_connection=True):
- self.cfg = cfg
- # aiohttp workaround, and may speed up RPC performance overall on some systems:
- if gc.platform == 'win' and host == 'localhost':
- host = '127.0.0.1'
- global dmsg_rpc,dmsg_rpc_backend
- if not self.cfg.debug_rpc:
- dmsg_rpc = dmsg_rpc_backend = noop
- dmsg_rpc(f'=== {type(self).__name__}.__init__() debug ===')
- dmsg_rpc(f' cls [{type(self).__name__}] host [{host}] port [{port}]\n')
- if test_connection:
- import socket
- try:
- socket.create_connection((host,port),timeout=1).close()
- except:
- die( 'SocketError', f'Unable to connect to {host}:{port}' )
- self.http_hdrs = { 'Content-Type': 'application/json' }
- self.host_url = f'{self.network_proto}://{host}:{port}'
- self.host = host
- self.port = port
- self.timeout = self.cfg.http_timeout
- self.auth = None
- def _get_backend(self,backend):
- backend_id = backend or self.cfg.rpc_backend
- if backend_id == 'auto':
- return {'linux':RPCBackends.httplib,'win':RPCBackends.requests}[gc.platform](self)
- else:
- return getattr(RPCBackends,backend_id)(self)
- def set_backend(self,backend=None):
- self.backend = self._get_backend(backend)
- async def set_backend_async(self,backend=None):
- ret = self._get_backend(backend)
- self.backend = (await ret) if type(ret).__name__ == 'coroutine' else ret
- # Call family of methods - direct-to-daemon RPC call:
- # positional params are passed to the daemon, 'timeout' and 'wallet' kwargs to the backend
- async def call(self,method,*params,timeout=None,wallet=None):
- """
- default call: call with param list unrolled, exactly as with cli
- """
- return self.process_http_resp(await self.backend.run(
- payload = {'id': 1, 'jsonrpc': '2.0', 'method': method, 'params': params },
- timeout = timeout,
- host_path = self.make_host_path(wallet)
- ))
- async def batch_call(self,method,param_list,timeout=None,wallet=None):
- """
- Make a single call with a list of tuples as first argument
- For RPC calls that return a list of results
- """
- return self.process_http_resp(await self.backend.run(
- payload = [{
- 'id': n,
- 'jsonrpc': '2.0',
- 'method': method,
- 'params': params } for n,params in enumerate(param_list,1) ],
- timeout = timeout,
- host_path = self.make_host_path(wallet)
- ),batch=True)
- async def gathered_call(self,method,args_list,timeout=None,wallet=None):
- """
- Perform multiple RPC calls, returning results in a list
- Can be called two ways:
- 1) method = methodname, args_list = [args_tuple1, args_tuple2,...]
- 2) method = None, args_list = [(methodname1,args_tuple1), (methodname2,args_tuple2), ...]
- """
- cmd_list = args_list if method == None else tuple(zip([method] * len(args_list), args_list))
- cur_pos = 0
- chunk_size = 1024
- ret = []
- while cur_pos < len(cmd_list):
- tasks = [self.backend.run(
- payload = {'id': n, 'jsonrpc': '2.0', 'method': method, 'params': params },
- timeout = timeout,
- host_path = self.make_host_path(wallet)
- ) for n,(method,params) in enumerate(cmd_list[cur_pos:chunk_size+cur_pos],1)]
- ret.extend(await asyncio.gather(*tasks))
- cur_pos += chunk_size
- return [self.process_http_resp(r) for r in ret]
- # Icall family of methods - indirect RPC call using CallSigs mechanism:
- # - 'timeout' and 'wallet' kwargs are passed to corresponding Call method
- # - remaining kwargs are passed to CallSigs method
- # - CallSigs method returns method and positional params for Call method
- def icall(self,method,**kwargs):
- timeout = kwargs.pop('timeout',None)
- wallet = kwargs.pop('wallet',None)
- return self.call(
- *getattr(self.call_sigs,method)(**kwargs),
- timeout = timeout,
- wallet = wallet )
- def gathered_icall(self,method,args_list,timeout=None,wallet=None):
- return self.gathered_call(
- method,
- [getattr(self.call_sigs,method)(*a)[1:] for a in args_list],
- timeout = timeout,
- wallet = wallet )
- def process_http_resp(self,run_ret,batch=False,json_rpc=True):
- text,status = run_ret
- if status == 200:
- dmsg_rpc(' RPC RESPONSE data ==>\n{}\n',text,is_json=True)
- if batch:
- return [r['result'] for r in json.loads(text,parse_float=Decimal)]
- else:
- try:
- if json_rpc:
- return json.loads(text,parse_float=Decimal)['result']
- else:
- return json.loads(text,parse_float=Decimal)
- except:
- t = json.loads(text)
- try:
- m = t['error']['message']
- except:
- try: m = t['error']
- except: m = t
- die( 'RPCFailure', m )
- else:
- import http
- m,s = ( '', http.HTTPStatus(status) )
- if text:
- try:
- m = json.loads(text)['error']['message']
- except:
- try: m = text.decode()
- except: m = text
- die( 'RPCFailure', f'{s.value} {s.name}: {m}' )
- async def stop_daemon(self,quiet=False,silent=False):
- if self.daemon.state == 'ready':
- if not (quiet or silent):
- msg(f'Stopping {self.daemon.desc} on port {self.daemon.bind_port}')
- ret = await self.do_stop_daemon(silent=silent)
- if self.daemon.wait:
- self.daemon.wait_for_state('stopped')
- return ret
- else:
- if not (quiet or silent):
- msg(f'{self.daemon.desc} on port {self.daemon.bind_port} not running')
- return True
- async def restart_daemon(self,quiet=False,silent=False):
- await self.stop_daemon(quiet=quiet,silent=silent)
- return self.daemon.start(silent=silent)
- def handle_unsupported_daemon_version(self,name,warn_only):
- class daemon_version_warning(oneshot_warning):
- color = 'yellow'
- message = 'ignoring unsupported {} daemon version at user request'
- if warn_only:
- daemon_version_warning(div=name,fmt_args=[self.daemon.coind_name])
- else:
- name = self.daemon.coind_name
- die(2,'\n'+fmt(f"""
- The running {name} daemon has version {self.daemon_version_str}.
- This version of MMGen is tested only on {name} v{self.daemon.coind_version_str} and below.
- To avoid this error, downgrade your daemon to a supported version.
- Alternatively, you may invoke the command with the --ignore-daemon-version
- option, in which case you proceed at your own risk.
- """,indent=' '))
- async def rpc_init(
- cfg,
- proto = None,
- backend = None,
- daemon = None,
- ignore_daemon_version = False,
- ignore_wallet = False ):
- proto = proto or cfg._proto
- if not 'rpc_init' in proto.mmcaps:
- die(1,f'rpc_init() not supported for {proto.name} protocol!')
- cls = getattr(
- importlib.import_module(f'mmgen.proto.{proto.base_proto_coin.lower()}.rpc'),
- proto.base_proto + 'RPCClient' )
- from .daemon import CoinDaemon
- rpc = await cls(
- cfg = cfg,
- proto = proto,
- daemon = daemon or CoinDaemon(cfg,proto=proto,test_suite=cfg.test_suite),
- backend = backend or cfg.rpc_backend,
- ignore_wallet = ignore_wallet )
- if rpc.daemon_version > rpc.daemon.coind_version:
- rpc.handle_unsupported_daemon_version(
- proto.name,
- ignore_daemon_version or proto.ignore_daemon_version or cfg.ignore_daemon_version )
- if rpc.chain not in proto.chain_names:
- die( 'RPCChainMismatch', '\n' + fmt(f"""
- Protocol: {proto.cls_name}
- Valid chain names: {fmt_list(proto.chain_names,fmt='bare')}
- RPC client chain: {rpc.chain}
- """,indent=' ').rstrip() )
- rpc.blockcount = NonNegativeInt(rpc.blockcount)
- return rpc
|