2017-12-26 07:25:29 +00:00
|
|
|
'''
|
2018-11-11 02:10:58 +00:00
|
|
|
Onionr - P2P Anonymous Storage Network
|
2018-01-14 08:48:23 +00:00
|
|
|
|
|
|
|
This file handles all incoming http requests to the client, using Flask
|
|
|
|
'''
|
|
|
|
'''
|
2017-12-26 07:25:29 +00:00
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
'''
|
2017-12-27 05:00:02 +00:00
|
|
|
import flask
|
2018-07-27 05:48:22 +00:00
|
|
|
from flask import request, Response, abort, send_from_directory
|
2018-01-14 08:48:23 +00:00
|
|
|
from multiprocessing import Process
|
2018-11-11 02:10:58 +00:00
|
|
|
from gevent.pywsgi import WSGIServer
|
2018-08-04 03:47:56 +00:00
|
|
|
import sys, random, threading, hmac, hashlib, base64, time, math, os, json
|
2018-11-11 02:10:58 +00:00
|
|
|
import core
|
2018-05-19 22:11:51 +00:00
|
|
|
from onionrblockapi import Block
|
2018-08-13 03:48:33 +00:00
|
|
|
import onionrutils, onionrexceptions, onionrcrypto, blockimporter, onionrevents as events, logger, config
|
2018-05-19 22:11:51 +00:00
|
|
|
|
2017-12-26 07:25:29 +00:00
|
|
|
class API:
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
Main HTTP API (Flask)
|
|
|
|
'''
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 02:52:45 +00:00
|
|
|
callbacks = {'public' : {}, 'private' : {}}
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
def validateToken(self, token):
|
2018-01-14 08:48:23 +00:00
|
|
|
'''
|
2018-06-15 05:45:07 +00:00
|
|
|
Validate that the client token matches the given token
|
2018-01-14 08:48:23 +00:00
|
|
|
'''
|
2018-11-11 02:10:58 +00:00
|
|
|
if len(self.clientToken) == 0:
|
|
|
|
logger.error("client password needs to be set")
|
|
|
|
return False
|
2018-04-18 03:43:33 +00:00
|
|
|
try:
|
|
|
|
if not hmac.compare_digest(self.clientToken, token):
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return True
|
|
|
|
except TypeError:
|
2018-01-02 08:43:29 +00:00
|
|
|
return False
|
|
|
|
|
2018-08-04 02:52:45 +00:00
|
|
|
def guessMime(path):
|
|
|
|
'''
|
|
|
|
Guesses the mime type from the input filename
|
|
|
|
'''
|
|
|
|
|
|
|
|
mimetypes = {
|
|
|
|
'html' : 'text/html',
|
|
|
|
'js' : 'application/javascript',
|
|
|
|
'css' : 'text/css',
|
|
|
|
'png' : 'image/png',
|
|
|
|
'jpg' : 'image/jpeg'
|
|
|
|
}
|
|
|
|
|
|
|
|
for mimetype in mimetypes:
|
|
|
|
logger.debug(path + ' endswith .' + mimetype + '?')
|
|
|
|
if path.endswith('.%s' % mimetype):
|
|
|
|
logger.debug('- True!')
|
|
|
|
return mimetypes[mimetype]
|
|
|
|
else:
|
|
|
|
logger.debug('- no')
|
|
|
|
|
|
|
|
logger.debug('%s not in %s' % (path, mimetypes))
|
|
|
|
return 'text/plain'
|
|
|
|
|
2018-11-11 02:10:58 +00:00
|
|
|
def __init__(self, debug, API_VERSION):
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
Initialize the api server, preping variables for later use
|
2018-01-14 08:48:23 +00:00
|
|
|
|
2018-02-04 03:44:29 +00:00
|
|
|
This initilization defines all of the API entry points and handlers for the endpoints and errors
|
|
|
|
This also saves the used host (random localhost IP address) to the data folder in host.txt
|
2018-01-14 08:48:23 +00:00
|
|
|
'''
|
2018-02-23 01:58:36 +00:00
|
|
|
|
|
|
|
config.reload()
|
2018-05-19 22:11:51 +00:00
|
|
|
|
2018-06-14 04:17:58 +00:00
|
|
|
if config.get('dev_mode', True):
|
2018-01-10 03:50:38 +00:00
|
|
|
self._developmentMode = True
|
2018-01-26 07:22:48 +00:00
|
|
|
logger.set_level(logger.LEVEL_DEBUG)
|
2018-01-10 03:50:38 +00:00
|
|
|
else:
|
|
|
|
self._developmentMode = False
|
2018-01-26 07:22:48 +00:00
|
|
|
logger.set_level(logger.LEVEL_INFO)
|
|
|
|
|
2017-12-27 05:00:02 +00:00
|
|
|
self.debug = debug
|
2018-01-05 09:16:21 +00:00
|
|
|
self._privateDelayTime = 3
|
2018-11-11 02:10:58 +00:00
|
|
|
self._core = core.Core()
|
2018-02-07 09:04:58 +00:00
|
|
|
self._crypto = onionrcrypto.OnionrCrypto(self._core)
|
2018-01-26 06:28:11 +00:00
|
|
|
self._utils = onionrutils.OnionrUtils(self._core)
|
2017-12-27 05:00:02 +00:00
|
|
|
app = flask.Flask(__name__)
|
2018-06-14 04:17:58 +00:00
|
|
|
bindPort = int(config.get('client.port', 59496))
|
2018-01-02 08:43:29 +00:00
|
|
|
self.bindPort = bindPort
|
2018-06-14 04:17:58 +00:00
|
|
|
self.clientToken = config.get('client.hmac')
|
2018-04-16 02:22:19 +00:00
|
|
|
self.timeBypassToken = base64.b16encode(os.urandom(32)).decode()
|
|
|
|
|
2018-06-14 04:17:58 +00:00
|
|
|
self.i2pEnabled = config.get('i2p.host', False)
|
2018-05-19 21:32:21 +00:00
|
|
|
|
2018-04-23 01:43:17 +00:00
|
|
|
self.mimeType = 'text/plain'
|
2018-08-04 02:52:45 +00:00
|
|
|
self.overrideCSP = False
|
2018-04-23 01:43:17 +00:00
|
|
|
|
2018-11-11 02:10:58 +00:00
|
|
|
with open(self._core.dataDir + 'time-bypass.txt', 'w') as bypass:
|
2018-04-16 02:22:19 +00:00
|
|
|
bypass.write(self.timeBypassToken)
|
|
|
|
|
2018-01-14 08:48:23 +00:00
|
|
|
if not debug and not self._developmentMode:
|
2018-06-01 07:02:56 +00:00
|
|
|
hostOctets = [127, random.randint(0x02, 0xFF), random.randint(0x02, 0xFF), random.randint(0x02, 0xFF)]
|
|
|
|
self.host = '.'.join(hostOctets)
|
2017-12-27 01:13:19 +00:00
|
|
|
else:
|
2018-01-26 07:22:48 +00:00
|
|
|
self.host = '127.0.0.1'
|
2018-06-14 04:17:58 +00:00
|
|
|
|
2018-11-11 02:10:58 +00:00
|
|
|
with open(self._core.dataDir + 'host.txt', 'w') as file:
|
2018-06-01 04:25:28 +00:00
|
|
|
file.write(self.host)
|
2017-12-27 01:13:19 +00:00
|
|
|
|
2017-12-28 00:18:00 +00:00
|
|
|
@app.before_request
|
|
|
|
def beforeReq():
|
2018-01-14 08:48:23 +00:00
|
|
|
'''
|
2018-02-04 03:44:29 +00:00
|
|
|
Simply define the request as not having yet failed, before every request.
|
2018-01-14 08:48:23 +00:00
|
|
|
'''
|
2018-01-05 09:16:21 +00:00
|
|
|
self.requestFailed = False
|
2017-12-28 00:18:00 +00:00
|
|
|
return
|
|
|
|
|
2017-12-27 05:00:02 +00:00
|
|
|
@app.after_request
|
|
|
|
def afterReq(resp):
|
2018-01-05 09:16:21 +00:00
|
|
|
if not self.requestFailed:
|
|
|
|
resp.headers['Access-Control-Allow-Origin'] = '*'
|
2018-04-23 01:43:17 +00:00
|
|
|
#else:
|
|
|
|
# resp.headers['server'] = 'Onionr'
|
|
|
|
resp.headers['Content-Type'] = self.mimeType
|
2018-08-04 02:52:45 +00:00
|
|
|
if not self.overrideCSP:
|
|
|
|
resp.headers["Content-Security-Policy"] = "default-src 'none'; script-src 'none'; object-src 'none'; style-src data: 'unsafe-inline'; img-src data:; media-src 'none'; frame-src 'none'; font-src 'none'; connect-src 'none'"
|
2018-01-26 07:22:48 +00:00
|
|
|
resp.headers['X-Frame-Options'] = 'deny'
|
2018-01-28 01:53:24 +00:00
|
|
|
resp.headers['X-Content-Type-Options'] = "nosniff"
|
2018-11-11 02:10:58 +00:00
|
|
|
resp.headers['api'] = API_VERSION
|
2018-04-23 01:43:17 +00:00
|
|
|
|
|
|
|
# reset to text/plain to help prevent browser attacks
|
2018-08-04 02:52:45 +00:00
|
|
|
self.mimeType = 'text/plain'
|
|
|
|
self.overrideCSP = False
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2017-12-27 05:00:02 +00:00
|
|
|
return resp
|
2018-11-11 02:10:58 +00:00
|
|
|
|
2018-07-31 04:52:48 +00:00
|
|
|
@app.route('/www/private/<path:path>')
|
|
|
|
def www_private(path):
|
2018-07-27 05:48:22 +00:00
|
|
|
startTime = math.floor(time.time())
|
2018-07-31 04:41:32 +00:00
|
|
|
|
2018-07-27 05:48:22 +00:00
|
|
|
if request.args.get('timingToken') is None:
|
|
|
|
timingToken = ''
|
|
|
|
else:
|
|
|
|
timingToken = request.args.get('timingToken')
|
2018-07-31 04:41:32 +00:00
|
|
|
|
2018-07-31 04:52:48 +00:00
|
|
|
if not config.get("www.private.run", True):
|
2018-07-31 04:41:32 +00:00
|
|
|
abort(403)
|
2018-07-31 04:52:48 +00:00
|
|
|
|
|
|
|
self.validateHost('private')
|
|
|
|
|
|
|
|
endTime = math.floor(time.time())
|
|
|
|
elapsed = endTime - startTime
|
|
|
|
|
|
|
|
if not hmac.compare_digest(timingToken, self.timeBypassToken):
|
|
|
|
if elapsed < self._privateDelayTime:
|
|
|
|
time.sleep(self._privateDelayTime - elapsed)
|
|
|
|
|
|
|
|
return send_from_directory('static-data/www/private/', path)
|
|
|
|
|
|
|
|
@app.route('/www/public/<path:path>')
|
|
|
|
def www_public(path):
|
|
|
|
if not config.get("www.public.run", True):
|
|
|
|
abort(403)
|
|
|
|
|
|
|
|
self.validateHost('public')
|
|
|
|
|
|
|
|
return send_from_directory('static-data/www/public/', path)
|
|
|
|
|
2018-07-31 05:02:01 +00:00
|
|
|
@app.route('/ui/<path:path>')
|
2018-07-31 04:52:48 +00:00
|
|
|
def ui_private(path):
|
|
|
|
startTime = math.floor(time.time())
|
|
|
|
|
2018-08-04 02:52:45 +00:00
|
|
|
'''
|
2018-07-31 04:52:48 +00:00
|
|
|
if request.args.get('timingToken') is None:
|
|
|
|
timingToken = ''
|
|
|
|
else:
|
|
|
|
timingToken = request.args.get('timingToken')
|
2018-08-04 02:52:45 +00:00
|
|
|
'''
|
2018-07-31 04:52:48 +00:00
|
|
|
|
|
|
|
if not config.get("www.ui.run", True):
|
|
|
|
abort(403)
|
|
|
|
|
|
|
|
if config.get("www.ui.private", True):
|
2018-07-31 04:41:32 +00:00
|
|
|
self.validateHost('private')
|
2018-07-31 04:52:48 +00:00
|
|
|
else:
|
|
|
|
self.validateHost('public')
|
2018-07-31 04:41:32 +00:00
|
|
|
|
2018-08-04 02:52:45 +00:00
|
|
|
'''
|
2018-07-27 05:48:22 +00:00
|
|
|
endTime = math.floor(time.time())
|
|
|
|
elapsed = endTime - startTime
|
2018-07-31 04:41:32 +00:00
|
|
|
|
2018-07-27 05:48:22 +00:00
|
|
|
if not hmac.compare_digest(timingToken, self.timeBypassToken):
|
|
|
|
if elapsed < self._privateDelayTime:
|
|
|
|
time.sleep(self._privateDelayTime - elapsed)
|
2018-08-04 02:52:45 +00:00
|
|
|
'''
|
|
|
|
|
|
|
|
logger.debug('Serving %s' % path)
|
|
|
|
|
|
|
|
self.mimeType = API.guessMime(path)
|
|
|
|
self.overrideCSP = True
|
2018-07-31 04:41:32 +00:00
|
|
|
|
2018-08-04 02:52:45 +00:00
|
|
|
return send_from_directory('static-data/www/ui/dist/', path, mimetype = API.guessMime(path))
|
2018-07-27 05:48:22 +00:00
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
@app.route('/client/')
|
|
|
|
def private_handler():
|
2018-04-16 02:22:19 +00:00
|
|
|
if request.args.get('timingToken') is None:
|
|
|
|
timingToken = ''
|
|
|
|
else:
|
|
|
|
timingToken = request.args.get('timingToken')
|
2018-04-23 01:43:17 +00:00
|
|
|
data = request.args.get('data')
|
|
|
|
try:
|
|
|
|
data = data
|
|
|
|
except:
|
|
|
|
data = ''
|
2018-01-05 09:16:21 +00:00
|
|
|
startTime = math.floor(time.time())
|
2018-06-16 07:33:54 +00:00
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
action = request.args.get('action')
|
|
|
|
#if not self.debug:
|
|
|
|
token = request.args.get('token')
|
2018-04-16 02:22:19 +00:00
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
if not self.validateToken(token):
|
|
|
|
abort(403)
|
2018-07-31 04:41:32 +00:00
|
|
|
|
|
|
|
events.event('webapi_private', onionr = None, data = {'action' : action, 'data' : data, 'timingToken' : timingToken, 'token' : token})
|
|
|
|
|
2018-01-05 09:16:21 +00:00
|
|
|
self.validateHost('private')
|
2018-01-02 08:43:29 +00:00
|
|
|
if action == 'hello':
|
|
|
|
resp = Response('Hello, World! ' + request.host)
|
2018-01-14 08:48:23 +00:00
|
|
|
elif action == 'shutdown':
|
2018-05-02 06:50:29 +00:00
|
|
|
# request.environ.get('werkzeug.server.shutdown')()
|
2018-05-03 01:14:00 +00:00
|
|
|
self.http_server.stop()
|
2018-01-14 08:48:23 +00:00
|
|
|
resp = Response('Goodbye')
|
2018-04-16 02:22:19 +00:00
|
|
|
elif action == 'ping':
|
|
|
|
resp = Response('pong')
|
2018-07-30 00:37:12 +00:00
|
|
|
elif action == "insertBlock":
|
|
|
|
response = {'success' : False, 'reason' : 'An unknown error occurred'}
|
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
if not ((data is None) or (len(str(data).strip()) == 0)):
|
|
|
|
try:
|
|
|
|
decoded = json.loads(data)
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
block = Block()
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
sign = False
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
for key in decoded:
|
|
|
|
val = decoded[key]
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
key = key.lower()
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
if key == 'type':
|
|
|
|
block.setType(val)
|
|
|
|
elif key in ['body', 'content']:
|
|
|
|
block.setContent(val)
|
|
|
|
elif key == 'parent':
|
|
|
|
block.setParent(val)
|
|
|
|
elif key == 'sign':
|
|
|
|
sign = (str(val).lower() == 'true')
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
hash = block.save(sign = sign)
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-08-04 03:47:56 +00:00
|
|
|
if not hash is False:
|
|
|
|
response['success'] = True
|
|
|
|
response['hash'] = hash
|
|
|
|
response['reason'] = 'Successfully wrote block to file'
|
|
|
|
else:
|
|
|
|
response['reason'] = 'Failed to save the block'
|
|
|
|
except Exception as e:
|
|
|
|
logger.warn('insertBlock api request failed', error = e)
|
|
|
|
logger.debug('Here\'s the request: %s' % data)
|
|
|
|
else:
|
|
|
|
response = {'success' : False, 'reason' : 'Missing `data` parameter.', 'blocks' : {}}
|
2018-07-30 00:37:12 +00:00
|
|
|
|
|
|
|
resp = Response(json.dumps(response))
|
2018-08-04 03:47:56 +00:00
|
|
|
elif action == 'searchBlocks':
|
|
|
|
response = {'success' : False, 'reason' : 'An unknown error occurred', 'blocks' : {}}
|
|
|
|
|
|
|
|
if not ((data is None) or (len(str(data).strip()) == 0)):
|
|
|
|
try:
|
|
|
|
decoded = json.loads(data)
|
|
|
|
|
|
|
|
type = None
|
|
|
|
signer = None
|
|
|
|
signed = None
|
|
|
|
parent = None
|
|
|
|
reverse = False
|
|
|
|
limit = None
|
|
|
|
|
|
|
|
for key in decoded:
|
|
|
|
val = decoded[key]
|
|
|
|
|
|
|
|
key = key.lower()
|
|
|
|
|
|
|
|
if key == 'type':
|
|
|
|
type = str(val)
|
|
|
|
elif key == 'signer':
|
|
|
|
if isinstance(val, list):
|
|
|
|
signer = val
|
|
|
|
else:
|
|
|
|
signer = str(val)
|
|
|
|
elif key == 'signed':
|
|
|
|
signed = (str(val).lower() == 'true')
|
|
|
|
elif key == 'parent':
|
|
|
|
parent = str(val)
|
|
|
|
elif key == 'reverse':
|
|
|
|
reverse = (str(val).lower() == 'true')
|
|
|
|
elif key == 'limit':
|
|
|
|
limit = 10000
|
|
|
|
|
|
|
|
if val is None:
|
|
|
|
val = limit
|
|
|
|
|
|
|
|
limit = min(limit, int(val))
|
|
|
|
|
|
|
|
blockObjects = Block.getBlocks(type = type, signer = signer, signed = signed, parent = parent, reverse = reverse, limit = limit)
|
|
|
|
|
|
|
|
logger.debug('%s results for query %s' % (len(blockObjects), decoded))
|
|
|
|
|
|
|
|
blocks = list()
|
|
|
|
|
|
|
|
for block in blockObjects:
|
|
|
|
blocks.append({
|
|
|
|
'hash' : block.getHash(),
|
|
|
|
'type' : block.getType(),
|
|
|
|
'content' : block.getContent(),
|
|
|
|
'signature' : block.getSignature(),
|
|
|
|
'signedData' : block.getSignedData(),
|
|
|
|
'signed' : block.isSigned(),
|
|
|
|
'valid' : block.isValid(),
|
|
|
|
'date' : (int(block.getDate().strftime("%s")) if not block.getDate() is None else None),
|
|
|
|
'parent' : (block.getParent().getHash() if not block.getParent() is None else None),
|
|
|
|
'metadata' : block.getMetadata(),
|
|
|
|
'header' : block.getHeader()
|
|
|
|
})
|
|
|
|
|
|
|
|
response['success'] = True
|
|
|
|
response['blocks'] = blocks
|
|
|
|
response['reason'] = 'Success'
|
|
|
|
except Exception as e:
|
|
|
|
logger.warn('searchBlock api request failed', error = e)
|
|
|
|
logger.debug('Here\'s the request: %s' % data)
|
|
|
|
else:
|
|
|
|
response = {'success' : False, 'reason' : 'Missing `data` parameter.', 'blocks' : {}}
|
|
|
|
|
|
|
|
resp = Response(json.dumps(response))
|
|
|
|
|
2018-07-31 04:41:32 +00:00
|
|
|
elif action in API.callbacks['private']:
|
2018-07-30 00:37:12 +00:00
|
|
|
resp = Response(str(getCallback(action, scope = 'private')(request)))
|
2018-01-02 08:43:29 +00:00
|
|
|
else:
|
|
|
|
resp = Response('(O_o) Dude what? (invalid command)')
|
2018-01-05 09:16:21 +00:00
|
|
|
endTime = math.floor(time.time())
|
|
|
|
elapsed = endTime - startTime
|
2018-04-16 02:22:19 +00:00
|
|
|
|
|
|
|
# if bypass token not used, delay response to prevent timing attacks
|
|
|
|
if not hmac.compare_digest(timingToken, self.timeBypassToken):
|
|
|
|
if elapsed < self._privateDelayTime:
|
|
|
|
time.sleep(self._privateDelayTime - elapsed)
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2017-12-27 05:00:02 +00:00
|
|
|
return resp
|
2018-05-02 06:50:29 +00:00
|
|
|
|
2018-04-25 06:56:40 +00:00
|
|
|
@app.route('/')
|
|
|
|
def banner():
|
|
|
|
self.mimeType = 'text/html'
|
|
|
|
self.validateHost('public')
|
|
|
|
try:
|
|
|
|
with open('static-data/index.html', 'r') as html:
|
|
|
|
resp = Response(html.read())
|
|
|
|
except FileNotFoundError:
|
|
|
|
resp = Response("")
|
|
|
|
return resp
|
2017-12-27 05:00:02 +00:00
|
|
|
|
2018-07-23 07:43:10 +00:00
|
|
|
@app.route('/public/upload/', methods=['POST'])
|
|
|
|
def blockUpload():
|
|
|
|
self.validateHost('public')
|
|
|
|
resp = 'failure'
|
|
|
|
try:
|
|
|
|
data = request.form['block']
|
|
|
|
except KeyError:
|
|
|
|
logger.warn('No block specified for upload')
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
if sys.getsizeof(data) < 100000000:
|
2018-08-13 03:48:33 +00:00
|
|
|
try:
|
|
|
|
if blockimporter.importBlockFromData(data, self._core):
|
|
|
|
resp = 'success'
|
|
|
|
else:
|
|
|
|
logger.warn('Error encountered importing uploaded block')
|
|
|
|
except onionrexceptions.BlacklistedBlock:
|
|
|
|
logger.debug('uploaded block is blacklisted')
|
|
|
|
pass
|
2018-07-23 07:43:10 +00:00
|
|
|
|
|
|
|
resp = Response(resp)
|
|
|
|
return resp
|
2018-08-08 19:26:02 +00:00
|
|
|
|
|
|
|
@app.route('/public/announce/', methods=['POST'])
|
|
|
|
def acceptAnnounce():
|
|
|
|
self.validateHost('public')
|
|
|
|
resp = 'failure'
|
|
|
|
powHash = ''
|
|
|
|
randomData = ''
|
|
|
|
newNode = ''
|
|
|
|
ourAdder = self._core.hsAddress.encode()
|
|
|
|
try:
|
|
|
|
newNode = request.form['node'].encode()
|
|
|
|
except KeyError:
|
|
|
|
logger.warn('No block specified for upload')
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
randomData = request.form['random']
|
|
|
|
randomData = base64.b64decode(randomData)
|
|
|
|
except KeyError:
|
|
|
|
logger.warn('No random data specified for upload')
|
|
|
|
else:
|
|
|
|
nodes = newNode + self._core.hsAddress.encode()
|
|
|
|
nodes = self._core._crypto.blake2bHash(nodes)
|
|
|
|
powHash = self._core._crypto.blake2bHash(randomData + nodes)
|
|
|
|
try:
|
|
|
|
powHash = powHash.decode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
|
|
|
if powHash.startswith('0000'):
|
|
|
|
try:
|
|
|
|
newNode = newNode.decode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
|
|
|
if self._core.addAddress(newNode):
|
|
|
|
resp = 'Success'
|
|
|
|
else:
|
|
|
|
logger.warn(newNode.decode() + ' failed to meet POW: ' + powHash)
|
|
|
|
resp = Response(resp)
|
|
|
|
return resp
|
|
|
|
|
2018-01-05 09:16:21 +00:00
|
|
|
@app.route('/public/')
|
|
|
|
def public_handler():
|
|
|
|
# Public means it is publicly network accessible
|
|
|
|
self.validateHost('public')
|
|
|
|
action = request.args.get('action')
|
2018-01-11 09:04:12 +00:00
|
|
|
requestingPeer = request.args.get('myID')
|
2018-01-18 07:49:13 +00:00
|
|
|
data = request.args.get('data')
|
2018-04-19 01:17:47 +00:00
|
|
|
try:
|
2018-04-23 01:43:17 +00:00
|
|
|
data = data
|
2018-04-19 01:17:47 +00:00
|
|
|
except:
|
|
|
|
data = ''
|
2018-07-31 04:41:32 +00:00
|
|
|
|
|
|
|
events.event('webapi_public', onionr = None, data = {'action' : action, 'data' : data, 'requestingPeer' : requestingPeer, 'request' : request})
|
|
|
|
|
2018-01-10 03:50:38 +00:00
|
|
|
if action == 'firstConnect':
|
|
|
|
pass
|
2018-01-18 07:49:13 +00:00
|
|
|
elif action == 'ping':
|
|
|
|
resp = Response("pong!")
|
2018-02-07 09:04:58 +00:00
|
|
|
elif action == 'getSymmetric':
|
2018-02-08 22:58:39 +00:00
|
|
|
resp = Response(self._crypto.generateSymmetric())
|
2018-01-26 06:28:11 +00:00
|
|
|
elif action == 'getDBHash':
|
|
|
|
resp = Response(self._utils.getBlockDBHash())
|
|
|
|
elif action == 'getBlockHashes':
|
2018-05-19 21:32:21 +00:00
|
|
|
resp = Response('\n'.join(self._core.getBlockList()))
|
2018-01-25 22:39:09 +00:00
|
|
|
# setData should be something the communicator initiates, not this api
|
2018-01-21 09:12:41 +00:00
|
|
|
elif action == 'getData':
|
2018-06-07 08:15:01 +00:00
|
|
|
resp = ''
|
2018-04-23 02:10:09 +00:00
|
|
|
if self._utils.validateHash(data):
|
2018-11-11 02:10:58 +00:00
|
|
|
if os.path.exists(self._core.dataDir + 'blocks/' + data + '.dat'):
|
2018-06-22 00:34:42 +00:00
|
|
|
block = Block(hash=data.encode(), core=self._core)
|
2018-06-08 07:47:14 +00:00
|
|
|
resp = base64.b64encode(block.getRaw().encode()).decode()
|
2018-06-07 08:15:01 +00:00
|
|
|
if len(resp) == 0:
|
2018-01-27 21:49:48 +00:00
|
|
|
abort(404)
|
|
|
|
resp = ""
|
|
|
|
resp = Response(resp)
|
2018-02-27 21:23:49 +00:00
|
|
|
elif action == 'pex':
|
|
|
|
response = ','.join(self._core.listAdders())
|
|
|
|
if len(response) == 0:
|
|
|
|
response = 'none'
|
|
|
|
resp = Response(response)
|
2018-03-16 20:38:33 +00:00
|
|
|
elif action == 'kex':
|
2018-05-07 06:55:03 +00:00
|
|
|
peers = self._core.listPeers(getPow=True)
|
|
|
|
response = ','.join(peers)
|
2018-03-16 20:38:33 +00:00
|
|
|
resp = Response(response)
|
2018-07-31 04:41:32 +00:00
|
|
|
elif action in API.callbacks['public']:
|
2018-07-30 00:37:12 +00:00
|
|
|
resp = Response(str(getCallback(action, scope = 'public')(request)))
|
2018-01-27 21:49:48 +00:00
|
|
|
else:
|
|
|
|
resp = Response("")
|
2018-01-18 07:49:13 +00:00
|
|
|
|
|
|
|
return resp
|
2018-01-05 09:16:21 +00:00
|
|
|
|
2017-12-27 05:00:02 +00:00
|
|
|
@app.errorhandler(404)
|
|
|
|
def notfound(err):
|
2018-01-05 09:16:21 +00:00
|
|
|
self.requestFailed = True
|
|
|
|
resp = Response("")
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
return resp
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
@app.errorhandler(403)
|
|
|
|
def authFail(err):
|
2018-01-05 09:16:21 +00:00
|
|
|
self.requestFailed = True
|
|
|
|
resp = Response("403")
|
2017-12-27 05:00:02 +00:00
|
|
|
return resp
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-22 02:49:11 +00:00
|
|
|
@app.errorhandler(401)
|
|
|
|
def clientError(err):
|
|
|
|
self.requestFailed = True
|
|
|
|
resp = Response("Invalid request")
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-22 02:49:11 +00:00
|
|
|
return resp
|
2018-02-21 02:44:56 +00:00
|
|
|
if not os.environ.get("WERKZEUG_RUN_MAIN") == "true":
|
2018-06-01 04:25:28 +00:00
|
|
|
logger.info('Starting client on ' + self.host + ':' + str(bindPort) + '...', timestamp=False)
|
2017-12-27 01:13:19 +00:00
|
|
|
|
2018-03-03 04:19:01 +00:00
|
|
|
try:
|
2018-08-08 19:26:02 +00:00
|
|
|
while len(self._core.hsAddress) == 0:
|
|
|
|
self._core.refreshFirstStartVars()
|
|
|
|
time.sleep(0.5)
|
2018-11-11 02:10:58 +00:00
|
|
|
self.http_server = WSGIServer((self.host, bindPort), app, log=None)
|
2018-05-03 01:14:00 +00:00
|
|
|
self.http_server.serve_forever()
|
2018-05-01 07:25:31 +00:00
|
|
|
except KeyboardInterrupt:
|
|
|
|
pass
|
2018-03-03 04:19:01 +00:00
|
|
|
except Exception as e:
|
|
|
|
logger.error(str(e))
|
|
|
|
logger.fatal('Failed to start client on ' + self.host + ':' + str(bindPort) + ', exiting...')
|
|
|
|
exit(1)
|
2018-01-26 07:22:48 +00:00
|
|
|
|
2018-01-05 09:16:21 +00:00
|
|
|
def validateHost(self, hostType):
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
Validate various features of the request including:
|
|
|
|
|
2018-01-14 08:48:23 +00:00
|
|
|
If private (/client/), is the host header local?
|
|
|
|
If public (/public/), is the host header onion or i2p?
|
2018-01-26 07:22:48 +00:00
|
|
|
|
|
|
|
Was X-Request-With used?
|
2018-01-14 08:48:23 +00:00
|
|
|
'''
|
2017-12-27 05:00:02 +00:00
|
|
|
if self.debug:
|
|
|
|
return
|
2017-12-27 01:13:19 +00:00
|
|
|
# Validate host header, to protect against DNS rebinding attacks
|
2018-01-02 08:43:29 +00:00
|
|
|
host = self.host
|
2018-01-05 09:16:21 +00:00
|
|
|
if hostType == 'private':
|
2018-01-27 00:10:38 +00:00
|
|
|
if not request.host.startswith('127') and not self._utils.checkIsIP(request.host):
|
2018-01-05 09:16:21 +00:00
|
|
|
abort(403)
|
|
|
|
elif hostType == 'public':
|
2018-01-18 07:49:13 +00:00
|
|
|
if not request.host.endswith('onion') and not request.host.endswith('i2p'):
|
2018-01-05 09:16:21 +00:00
|
|
|
abort(403)
|
2017-12-27 01:13:19 +00:00
|
|
|
# Validate x-requested-with, to protect against CSRF/metadata leaks
|
2018-05-19 21:32:21 +00:00
|
|
|
|
|
|
|
if not self.i2pEnabled and request.host.endswith('i2p'):
|
|
|
|
abort(403)
|
|
|
|
|
2018-01-12 09:06:24 +00:00
|
|
|
if not self._developmentMode:
|
2018-01-10 03:50:38 +00:00
|
|
|
try:
|
2018-01-26 07:22:48 +00:00
|
|
|
request.headers['X-Requested-With']
|
2018-01-10 03:50:38 +00:00
|
|
|
except:
|
|
|
|
# we exit rather than abort to avoid fingerprinting
|
2018-01-26 07:22:48 +00:00
|
|
|
logger.debug('Avoiding fingerprinting, exiting...')
|
|
|
|
sys.exit(1)
|
2018-07-30 00:37:12 +00:00
|
|
|
|
|
|
|
def setCallback(action, callback, scope = 'public'):
|
2018-07-31 04:41:32 +00:00
|
|
|
if not scope in API.callbacks:
|
2018-07-30 00:37:12 +00:00
|
|
|
return False
|
|
|
|
|
2018-07-31 04:41:32 +00:00
|
|
|
API.callbacks[scope][action] = callback
|
2018-07-30 00:37:12 +00:00
|
|
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
def removeCallback(action, scope = 'public'):
|
2018-07-31 04:41:32 +00:00
|
|
|
if (not scope in API.callbacks) or (not action in API.callbacks[scope]):
|
2018-07-30 00:37:12 +00:00
|
|
|
return False
|
|
|
|
|
2018-07-31 04:41:32 +00:00
|
|
|
del API.callbacks[scope][action]
|
2018-07-30 00:37:12 +00:00
|
|
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
def getCallback(action, scope = 'public'):
|
2018-07-31 04:41:32 +00:00
|
|
|
if (not scope in API.callbacks) or (not action in API.callbacks[scope]):
|
2018-07-30 00:37:12 +00:00
|
|
|
return None
|
|
|
|
|
2018-07-31 04:41:32 +00:00
|
|
|
return API.callbacks[scope][action]
|
2018-07-30 00:37:12 +00:00
|
|
|
|
|
|
|
def getCallbacks(scope = None):
|
2018-07-31 04:41:32 +00:00
|
|
|
if (not scope is None) and (scope in API.callbacks):
|
|
|
|
return API.callbacks[scope]
|
2018-07-30 00:37:12 +00:00
|
|
|
|
2018-07-31 04:41:32 +00:00
|
|
|
return API.callbacks
|