Onionr/src/lan/server/__init__.py

98 lines
3.5 KiB
Python
Raw Normal View History

"""Onionr - Private P2P Communication.
LAN transport server thread
"""
2020-06-19 05:55:13 +00:00
import ipaddress
from threading import Thread
2020-03-14 04:47:44 +00:00
from gevent.pywsgi import WSGIServer
from flask import Flask
from flask import Response
2020-03-20 08:51:08 +00:00
from flask import request
2020-04-06 13:51:20 +00:00
from flask import abort
from onionrblocks.onionrblockapi import Block
from httpapi.fdsafehandler import FDSafeHandler
from netcontroller import get_open_port
import config
from coredb.blockmetadb import get_block_list
2020-06-19 05:55:13 +00:00
from lan.getip import best_ip, lan_ips
from onionrutils import stringvalidators
2020-03-20 08:51:08 +00:00
from httpapi.miscpublicapi.upload import accept_upload
2020-04-06 13:51:20 +00:00
import logger
2020-06-19 05:55:13 +00:00
from utils.bettersleep import better_sleep
"""
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
"""
2020-06-19 05:55:13 +00:00
ports = range(1337, 1340)
2020-03-14 04:47:44 +00:00
class LANServer:
def __init__(self, shared_state):
app = Flask(__name__)
self.app = app
self.host = config.get('lan.bind_ip', '')
self.server = None
if self.host == '':
self.host = best_ip
self.port = None
2020-04-06 13:51:20 +00:00
@app.before_request
def dns_rebinding_prevention():
2020-06-19 05:55:13 +00:00
if request.remote_addr in lan_ips or ipaddress.ip_address(request.remote_addr).is_loopback:
abort(403)
2020-04-06 13:51:20 +00:00
if request.host != f'{self.host}:{self.port}':
logger.warn('Potential DNS rebinding attack on LAN server:')
logger.warn(f'Hostname {request.host} was used instead of {self.host}:{self.port}')
abort(403)
@app.route('/blist/<time>')
def get_block_list_for_lan(time):
return Response('\n'.join(get_block_list(dateRec=time)))
@app.route('/get/<block>')
def get_block_data(block):
if not stringvalidators.validate_hash(block):
raise ValueError
2020-03-20 08:51:08 +00:00
return Response(
Block(block).raw, mimetype='application/octet-stream')
2020-03-14 04:47:44 +00:00
@app.route("/ping")
2020-03-14 04:47:44 +00:00
def ping():
2020-04-06 13:51:20 +00:00
return Response("onionr!")
2020-03-20 08:51:08 +00:00
@app.route('/upload', methods=['POST'])
def upload_endpoint():
return accept_upload(request)
def start_server(self):
2020-06-19 05:55:13 +00:00
def _show_lan_bind(port):
better_sleep(1)
if self.server.started and port == self.server.server_port:
logger.info(f'Serving to LAN on {self.host}:{self.port}', terminal=True)
for i in ports:
self.server = WSGIServer((self.host, i),
self.app, log=None,
handler_class=FDSafeHandler)
self.port = self.server.server_port
try:
Thread(target=_show_lan_bind, args=[i], daemon=True).start()
self.server.serve_forever()
except OSError:
pass
else:
break
else:
logger.warn("Could not bind to any LAN ports " + str(min(ports)) + "-" + str(max(ports)), terminal=True)
return