2017-01-18 00:34:40 +01:00
|
|
|
# Copyright (c) 2011 Jeff Garzik
|
|
|
|
#
|
|
|
|
# Previous copyright, from python-jsonrpc/jsonrpc/proxy.py:
|
|
|
|
#
|
|
|
|
# Copyright (c) 2007 Jan-Klaas Kollhof
|
|
|
|
#
|
|
|
|
# This file is part of jsonrpc.
|
|
|
|
#
|
|
|
|
# jsonrpc is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
# the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This software is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU Lesser General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
|
|
# along with this software; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
"""HTTP proxy for opening RPC connection to bitcoind.
|
|
|
|
|
|
|
|
AuthServiceProxy has the following improvements over python-jsonrpc's
|
|
|
|
ServiceProxy class:
|
|
|
|
|
|
|
|
- HTTP connections persist for the life of the AuthServiceProxy object
|
|
|
|
(if server supports HTTP/1.1)
|
|
|
|
- sends protocol 'version', per JSON-RPC 1.1
|
|
|
|
- sends proper, incrementing 'id'
|
|
|
|
- sends Basic HTTP authentication headers
|
|
|
|
- parses all JSON numbers that look like floats as Decimal
|
|
|
|
- uses standard Python json lib
|
2014-03-13 22:51:05 +01:00
|
|
|
"""
|
|
|
|
|
|
|
|
import base64
|
|
|
|
import decimal
|
2019-02-27 15:37:45 +01:00
|
|
|
from http import HTTPStatus
|
2017-07-17 19:09:04 +02:00
|
|
|
import http.client
|
2014-07-08 20:31:13 +02:00
|
|
|
import json
|
|
|
|
import logging
|
2018-08-19 20:54:54 +02:00
|
|
|
import os
|
2016-11-02 20:08:54 +01:00
|
|
|
import socket
|
2017-04-17 10:50:00 +02:00
|
|
|
import time
|
2017-07-17 19:09:04 +02:00
|
|
|
import urllib.parse
|
2014-03-13 22:51:05 +01:00
|
|
|
|
|
|
|
HTTP_TIMEOUT = 30
|
2017-07-17 19:16:57 +02:00
|
|
|
USER_AGENT = "AuthServiceProxy/0.1"
|
2014-03-13 22:51:05 +01:00
|
|
|
|
2014-07-08 20:31:13 +02:00
|
|
|
log = logging.getLogger("BitcoinRPC")
|
2014-03-13 22:51:05 +01:00
|
|
|
|
|
|
|
class JSONRPCException(Exception):
|
2019-02-27 15:37:45 +01:00
|
|
|
def __init__(self, rpc_error, http_status=None):
|
2016-09-25 20:02:14 +02:00
|
|
|
try:
|
|
|
|
errmsg = '%(message)s (%(code)i)' % rpc_error
|
|
|
|
except (KeyError, TypeError):
|
|
|
|
errmsg = ''
|
2017-07-17 19:09:04 +02:00
|
|
|
super().__init__(errmsg)
|
2014-03-13 22:51:05 +01:00
|
|
|
self.error = rpc_error
|
2019-02-27 15:37:45 +01:00
|
|
|
self.http_status = http_status
|
2014-03-13 22:51:05 +01:00
|
|
|
|
|
|
|
|
2014-07-08 20:31:13 +02:00
|
|
|
def EncodeDecimal(o):
|
|
|
|
if isinstance(o, decimal.Decimal):
|
2016-03-28 11:44:19 +02:00
|
|
|
return str(o)
|
2014-07-08 20:31:13 +02:00
|
|
|
raise TypeError(repr(o) + " is not JSON serializable")
|
|
|
|
|
2017-10-17 03:46:23 +02:00
|
|
|
class AuthServiceProxy():
|
2014-07-08 20:31:13 +02:00
|
|
|
__id_count = 0
|
|
|
|
|
2016-04-28 15:17:41 +02:00
|
|
|
# ensure_ascii: escape unicode as \uXXXX, passed to json.dumps
|
|
|
|
def __init__(self, service_url, service_name=None, timeout=HTTP_TIMEOUT, connection=None, ensure_ascii=True):
|
2014-03-13 22:51:05 +01:00
|
|
|
self.__service_url = service_url
|
2015-10-11 07:41:19 +02:00
|
|
|
self._service_name = service_name
|
2017-07-17 19:16:57 +02:00
|
|
|
self.ensure_ascii = ensure_ascii # can be toggled on the fly by tests
|
2017-07-17 19:09:04 +02:00
|
|
|
self.__url = urllib.parse.urlparse(service_url)
|
2017-10-10 16:49:28 +02:00
|
|
|
user = None if self.__url.username is None else self.__url.username.encode('utf8')
|
|
|
|
passwd = None if self.__url.password is None else self.__url.password.encode('utf8')
|
2014-03-13 22:51:05 +01:00
|
|
|
authpair = user + b':' + passwd
|
|
|
|
self.__auth_header = b'Basic ' + base64.b64encode(authpair)
|
2018-08-19 20:54:54 +02:00
|
|
|
self.timeout = timeout
|
|
|
|
self._set_conn(connection)
|
2014-03-13 22:51:05 +01:00
|
|
|
|
|
|
|
def __getattr__(self, name):
|
|
|
|
if name.startswith('__') and name.endswith('__'):
|
|
|
|
# Python internal stuff
|
|
|
|
raise AttributeError
|
2015-10-11 07:41:19 +02:00
|
|
|
if self._service_name is not None:
|
|
|
|
name = "%s.%s" % (self._service_name, name)
|
2014-03-13 22:51:05 +01:00
|
|
|
return AuthServiceProxy(self.__service_url, name, connection=self.__conn)
|
|
|
|
|
2015-09-19 14:12:44 +02:00
|
|
|
def _request(self, method, path, postdata):
|
|
|
|
'''
|
|
|
|
Do a HTTP request, with retry if we get disconnected (e.g. due to a timeout).
|
|
|
|
This is a workaround for https://bugs.python.org/issue3566 which is fixed in Python 3.5.
|
|
|
|
'''
|
|
|
|
headers = {'Host': self.__url.hostname,
|
|
|
|
'User-Agent': USER_AGENT,
|
|
|
|
'Authorization': self.__auth_header,
|
|
|
|
'Content-type': 'application/json'}
|
2018-08-19 20:54:54 +02:00
|
|
|
if os.name == 'nt':
|
|
|
|
# Windows somehow does not like to re-use connections
|
|
|
|
# TODO: Find out why the connection would disconnect occasionally and make it reusable on Windows
|
2020-04-11 17:53:16 +02:00
|
|
|
# Avoid "ConnectionAbortedError: [WinError 10053] An established connection was aborted by the software in your host machine"
|
2018-08-19 20:54:54 +02:00
|
|
|
self._set_conn()
|
2015-09-19 14:12:44 +02:00
|
|
|
try:
|
|
|
|
self.__conn.request(method, path, postdata, headers)
|
|
|
|
return self._get_response()
|
2017-07-17 19:16:57 +02:00
|
|
|
except (BrokenPipeError, ConnectionResetError):
|
2020-04-12 02:31:31 +02:00
|
|
|
# Python 3.5+ raises BrokenPipeError when the connection was reset
|
|
|
|
# ConnectionResetError happens on FreeBSD
|
2016-05-13 04:49:19 +02:00
|
|
|
self.__conn.close()
|
|
|
|
self.__conn.request(method, path, postdata, headers)
|
|
|
|
return self._get_response()
|
2020-04-12 02:29:35 +02:00
|
|
|
except OSError as e:
|
|
|
|
retry = (
|
|
|
|
'[WinError 10053] An established connection was aborted by the software in your host machine' in str(e))
|
2020-06-24 12:49:04 +02:00
|
|
|
# Workaround for a bug on macOS. See https://bugs.python.org/issue33450
|
|
|
|
retry = retry or ('[Errno 41] Protocol wrong type for socket' in str(e))
|
2020-04-12 02:29:35 +02:00
|
|
|
if retry:
|
|
|
|
self.__conn.close()
|
|
|
|
self.__conn.request(method, path, postdata, headers)
|
|
|
|
return self._get_response()
|
|
|
|
else:
|
|
|
|
raise
|
2015-09-19 14:12:44 +02:00
|
|
|
|
2017-09-07 23:38:11 +02:00
|
|
|
def get_request(self, *args, **argsn):
|
2014-07-08 20:31:13 +02:00
|
|
|
AuthServiceProxy.__id_count += 1
|
2014-03-13 22:51:05 +01:00
|
|
|
|
2019-04-08 23:34:42 +02:00
|
|
|
log.debug("-{}-> {} {}".format(
|
|
|
|
AuthServiceProxy.__id_count,
|
|
|
|
self._service_name,
|
|
|
|
json.dumps(args or argsn, default=EncodeDecimal, ensure_ascii=self.ensure_ascii),
|
|
|
|
))
|
2016-09-25 20:29:26 +02:00
|
|
|
if args and argsn:
|
|
|
|
raise ValueError('Cannot handle both named and positional arguments')
|
2017-09-07 23:38:11 +02:00
|
|
|
return {'version': '1.1',
|
|
|
|
'method': self._service_name,
|
|
|
|
'params': args or argsn,
|
|
|
|
'id': AuthServiceProxy.__id_count}
|
|
|
|
|
|
|
|
def __call__(self, *args, **argsn):
|
|
|
|
postdata = json.dumps(self.get_request(*args, **argsn), default=EncodeDecimal, ensure_ascii=self.ensure_ascii)
|
2019-02-27 15:37:45 +01:00
|
|
|
response, status = self._request('POST', self.__url.path, postdata.encode('utf-8'))
|
2014-03-13 22:51:05 +01:00
|
|
|
if response['error'] is not None:
|
2019-02-27 15:37:45 +01:00
|
|
|
raise JSONRPCException(response['error'], status)
|
2014-03-13 22:51:05 +01:00
|
|
|
elif 'result' not in response:
|
|
|
|
raise JSONRPCException({
|
2019-02-27 15:37:45 +01:00
|
|
|
'code': -343, 'message': 'missing JSON-RPC result'}, status)
|
|
|
|
elif status != HTTPStatus.OK:
|
|
|
|
raise JSONRPCException({
|
|
|
|
'code': -342, 'message': 'non-200 HTTP status code but no JSON-RPC error'}, status)
|
2014-03-13 22:51:05 +01:00
|
|
|
else:
|
|
|
|
return response['result']
|
|
|
|
|
2017-09-07 23:38:11 +02:00
|
|
|
def batch(self, rpc_call_list):
|
2016-04-28 15:17:41 +02:00
|
|
|
postdata = json.dumps(list(rpc_call_list), default=EncodeDecimal, ensure_ascii=self.ensure_ascii)
|
2017-07-17 19:16:57 +02:00
|
|
|
log.debug("--> " + postdata)
|
2019-02-27 15:37:45 +01:00
|
|
|
response, status = self._request('POST', self.__url.path, postdata.encode('utf-8'))
|
|
|
|
if status != HTTPStatus.OK:
|
|
|
|
raise JSONRPCException({
|
|
|
|
'code': -342, 'message': 'non-200 HTTP status code but no JSON-RPC error'}, status)
|
|
|
|
return response
|
2014-03-13 22:51:05 +01:00
|
|
|
|
|
|
|
def _get_response(self):
|
2017-04-17 10:50:00 +02:00
|
|
|
req_start_time = time.time()
|
2016-11-02 20:08:54 +01:00
|
|
|
try:
|
|
|
|
http_response = self.__conn.getresponse()
|
2018-03-29 17:47:06 +02:00
|
|
|
except socket.timeout:
|
2016-11-02 20:08:54 +01:00
|
|
|
raise JSONRPCException({
|
|
|
|
'code': -344,
|
|
|
|
'message': '%r RPC took longer than %f seconds. Consider '
|
|
|
|
'using larger timeout for calls that take '
|
|
|
|
'longer to return.' % (self._service_name,
|
|
|
|
self.__conn.timeout)})
|
2014-03-13 22:51:05 +01:00
|
|
|
if http_response is None:
|
|
|
|
raise JSONRPCException({
|
|
|
|
'code': -342, 'message': 'missing HTTP response from server'})
|
|
|
|
|
2016-04-07 15:21:01 +02:00
|
|
|
content_type = http_response.getheader('Content-Type')
|
|
|
|
if content_type != 'application/json':
|
2019-02-27 15:37:45 +01:00
|
|
|
raise JSONRPCException(
|
|
|
|
{'code': -342, 'message': 'non-JSON HTTP response with \'%i %s\' from server' % (http_response.status, http_response.reason)},
|
|
|
|
http_response.status)
|
2016-04-07 15:21:01 +02:00
|
|
|
|
2014-07-08 20:31:13 +02:00
|
|
|
responsedata = http_response.read().decode('utf8')
|
|
|
|
response = json.loads(responsedata, parse_float=decimal.Decimal)
|
2017-04-17 10:50:00 +02:00
|
|
|
elapsed = time.time() - req_start_time
|
2014-07-08 20:31:13 +02:00
|
|
|
if "error" in response and response["error"] is None:
|
2017-07-17 19:16:57 +02:00
|
|
|
log.debug("<-%s- [%.6f] %s" % (response["id"], elapsed, json.dumps(response["result"], default=EncodeDecimal, ensure_ascii=self.ensure_ascii)))
|
2014-07-08 20:31:13 +02:00
|
|
|
else:
|
2017-07-17 19:16:57 +02:00
|
|
|
log.debug("<-- [%.6f] %s" % (elapsed, responsedata))
|
2019-02-27 15:37:45 +01:00
|
|
|
return response, http_response.status
|
2017-07-13 16:53:42 +02:00
|
|
|
|
|
|
|
def __truediv__(self, relative_uri):
|
|
|
|
return AuthServiceProxy("{}/{}".format(self.__service_url, relative_uri), self._service_name, connection=self.__conn)
|
2018-08-19 20:54:54 +02:00
|
|
|
|
|
|
|
def _set_conn(self, connection=None):
|
|
|
|
port = 80 if self.__url.port is None else self.__url.port
|
|
|
|
if connection:
|
|
|
|
self.__conn = connection
|
|
|
|
self.timeout = connection.timeout
|
|
|
|
elif self.__url.scheme == 'https':
|
|
|
|
self.__conn = http.client.HTTPSConnection(self.__url.hostname, port, timeout=self.timeout)
|
|
|
|
else:
|
|
|
|
self.__conn = http.client.HTTPConnection(self.__url.hostname, port, timeout=self.timeout)
|