2014-05-04 17:26:43 +00:00
|
|
|
# -*- coding: utf-8 -*-
|
2015-11-26 00:26:10 +00:00
|
|
|
from socketserver import ThreadingMixIn
|
|
|
|
from threading import Thread
|
|
|
|
import base64
|
|
|
|
import gzip
|
|
|
|
import hashlib
|
|
|
|
import http.server
|
|
|
|
import io
|
|
|
|
import json
|
2014-05-04 17:26:43 +00:00
|
|
|
import os
|
2015-11-26 00:26:10 +00:00
|
|
|
import socket
|
|
|
|
import socketserver
|
2016-01-18 15:45:59 +00:00
|
|
|
import time
|
2014-08-12 08:16:57 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
from Crypto.PublicKey import RSA
|
|
|
|
from Crypto.Util.asn1 import DerSequence
|
|
|
|
from OpenSSL.crypto import dump_privatekey, FILETYPE_ASN1
|
|
|
|
from OpenSSL.SSL import (
|
|
|
|
Context, Connection, TLSv1_2_METHOD,
|
|
|
|
VERIFY_PEER, VERIFY_FAIL_IF_NO_PEER_CERT, VERIFY_CLIENT_ONCE
|
|
|
|
)
|
2014-05-04 17:26:43 +00:00
|
|
|
|
2015-12-01 13:40:30 +00:00
|
|
|
import db
|
2014-08-12 08:16:57 +00:00
|
|
|
import settings
|
|
|
|
import state
|
|
|
|
import user
|
2017-06-03 20:50:14 +00:00
|
|
|
from changelog import changelog_size, changelog_path
|
2016-01-30 06:10:55 +00:00
|
|
|
from websocket import trigger_event
|
2014-05-04 17:26:43 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
from . import nodeapi
|
|
|
|
from .sslsocket import fileobject
|
|
|
|
|
2014-05-17 14:26:59 +00:00
|
|
|
import logging
|
2015-11-29 14:56:38 +00:00
|
|
|
logger = logging.getLogger(__name__)
|
2014-05-17 14:26:59 +00:00
|
|
|
|
2014-08-12 08:16:57 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
def get_service_id(key):
|
|
|
|
'''
|
|
|
|
service_id is the first half of the sha1 of the rsa public key encoded in base32
|
|
|
|
'''
|
|
|
|
# compute sha1 of public key and encode first half in base32
|
|
|
|
pub_der = DerSequence()
|
|
|
|
pub_der.decode(dump_privatekey(FILETYPE_ASN1, key))
|
|
|
|
public_key = RSA.construct((pub_der._seq[1], pub_der._seq[2])).exportKey('DER')[22:]
|
|
|
|
service_id = base64.b32encode(hashlib.sha1(public_key).digest()[:10]).lower().decode()
|
|
|
|
return service_id
|
|
|
|
|
|
|
|
class TLSTCPServer(socketserver.TCPServer):
|
|
|
|
|
|
|
|
def _accept(self, connection, x509, errnum, errdepth, ok):
|
|
|
|
# client_id is validated in request
|
|
|
|
return True
|
|
|
|
|
|
|
|
def __init__(self, server_address, HandlerClass, bind_and_activate=True):
|
|
|
|
socketserver.TCPServer.__init__(self, server_address, HandlerClass)
|
|
|
|
ctx = Context(TLSv1_2_METHOD)
|
2017-05-30 10:51:21 +00:00
|
|
|
ctx.use_privatekey_file(settings.ssl_key_path)
|
2015-11-26 00:26:10 +00:00
|
|
|
ctx.use_certificate_file(settings.ssl_cert_path)
|
|
|
|
# only allow clients with cert:
|
|
|
|
ctx.set_verify(VERIFY_PEER | VERIFY_CLIENT_ONCE | VERIFY_FAIL_IF_NO_PEER_CERT, self._accept)
|
|
|
|
#ctx.set_verify(VERIFY_PEER | VERIFY_CLIENT_ONCE, self._accept)
|
|
|
|
self.socket = Connection(ctx, socket.socket(self.address_family, self.socket_type))
|
|
|
|
if bind_and_activate:
|
|
|
|
self.server_bind()
|
|
|
|
self.server_activate()
|
|
|
|
|
2017-05-30 10:51:21 +00:00
|
|
|
def shutdown_request(self, request):
|
2015-11-26 00:26:10 +00:00
|
|
|
try:
|
|
|
|
request.shutdown()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
|
|
|
class NodeServer(ThreadingMixIn, TLSTCPServer):
|
2016-01-18 15:45:59 +00:00
|
|
|
_running = True
|
2015-11-26 00:26:10 +00:00
|
|
|
allow_reuse_address = True
|
|
|
|
|
|
|
|
|
|
|
|
def api_call(action, user_id, args):
|
|
|
|
with db.session():
|
|
|
|
u = user.models.User.get(user_id)
|
|
|
|
if action in (
|
2016-01-16 13:21:32 +00:00
|
|
|
'requestPeering', 'acceptPeering', 'rejectPeering',
|
|
|
|
'removePeering', 'cancelPeering'
|
2015-11-26 00:26:10 +00:00
|
|
|
) or (u and u.peered):
|
|
|
|
content = getattr(nodeapi, 'api_' + action)(user_id, *args)
|
|
|
|
else:
|
|
|
|
if u and u.pending:
|
2019-01-17 18:19:23 +00:00
|
|
|
logger.debug('ignore request from pending peer[%s] %s (%s) (pending state: %s)',
|
|
|
|
user_id, action, args, u.pending)
|
2015-11-26 00:26:10 +00:00
|
|
|
content = {}
|
|
|
|
else:
|
|
|
|
content = None
|
|
|
|
return content
|
|
|
|
|
|
|
|
class Handler(http.server.SimpleHTTPRequestHandler):
|
|
|
|
|
|
|
|
def setup(self):
|
|
|
|
self.connection = self.request
|
|
|
|
self.rfile = fileobject(self.connection, 'rb', self.rbufsize)
|
|
|
|
self.wfile = fileobject(self.connection, 'wb', self.wbufsize)
|
|
|
|
|
|
|
|
def version_string(self):
|
|
|
|
return settings.USER_AGENT
|
|
|
|
|
2015-11-29 16:07:01 +00:00
|
|
|
def log_message(self, format, *args):
|
|
|
|
if settings.DEBUG_HTTP:
|
|
|
|
logger.debug("%s - - [%s] %s\n", self.address_string(),
|
2017-05-30 10:51:21 +00:00
|
|
|
self.log_date_time_string(), format % args)
|
2015-11-29 16:07:01 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
def do_HEAD(self):
|
|
|
|
return self.do_GET()
|
|
|
|
|
|
|
|
def do_GET(self):
|
2019-01-01 00:44:33 +00:00
|
|
|
#x509 = self.connection.get_peer_certificate()
|
|
|
|
#user_id = get_service_id(x509.get_pubkey()) if x509 else None
|
2015-11-26 00:26:10 +00:00
|
|
|
import item.models
|
2016-01-15 07:28:01 +00:00
|
|
|
parts = self.path.split('/')
|
2017-05-30 10:51:21 +00:00
|
|
|
if len(parts) == 3 and parts[1] in ('get', 'preview'):
|
2016-01-15 07:28:01 +00:00
|
|
|
id = parts[2]
|
|
|
|
preview = parts[1] == 'preview'
|
|
|
|
else:
|
|
|
|
id = None
|
2015-11-26 00:26:10 +00:00
|
|
|
if id and len(id) == 32 and id.isalnum():
|
|
|
|
with db.session():
|
2016-01-15 07:28:01 +00:00
|
|
|
if preview:
|
2016-01-21 07:05:49 +00:00
|
|
|
from item.icons import get_icon_sync
|
2016-01-24 10:34:18 +00:00
|
|
|
try:
|
|
|
|
data = get_icon_sync(id, 'preview', 512)
|
|
|
|
except:
|
|
|
|
data = None
|
2016-01-15 07:28:01 +00:00
|
|
|
if data:
|
|
|
|
self.send_response(200, 'ok')
|
|
|
|
self.send_header('Content-type', 'image/jpg')
|
|
|
|
else:
|
|
|
|
self.send_response(404, 'Not Found')
|
|
|
|
self.send_header('Content-type', 'text/plain')
|
|
|
|
data = b'404 - Not Found'
|
2016-02-24 05:28:33 +00:00
|
|
|
content_length = len(data)
|
|
|
|
self.send_header('Content-Length', str(content_length))
|
2016-01-15 07:28:01 +00:00
|
|
|
self.end_headers()
|
2016-02-24 05:28:33 +00:00
|
|
|
self.write_with_limit(data, content_length)
|
2016-01-15 07:28:01 +00:00
|
|
|
return
|
2016-02-24 05:26:32 +00:00
|
|
|
file = item.models.File.get(id)
|
|
|
|
if not file:
|
|
|
|
self.send_response(404, 'Not Found')
|
|
|
|
self.send_header('Content-type', 'text/plain')
|
|
|
|
self.end_headers()
|
|
|
|
self.wfile.write(b'404 - Not Found')
|
|
|
|
return
|
|
|
|
path = file.fullpath()
|
2015-11-26 00:26:10 +00:00
|
|
|
mimetype = {
|
|
|
|
'epub': 'application/epub+zip',
|
|
|
|
'pdf': 'application/pdf',
|
|
|
|
'txt': 'text/plain',
|
|
|
|
}.get(path.split('.')[-1], None)
|
|
|
|
self.send_response(200, 'OK')
|
|
|
|
self.send_header('Content-Type', mimetype)
|
|
|
|
self.send_header('X-Node-Protocol', settings.NODE_PROTOCOL)
|
2016-02-24 05:26:32 +00:00
|
|
|
if mimetype == 'text/plain':
|
|
|
|
with open(path, 'rb') as f:
|
|
|
|
content = f.read()
|
|
|
|
content = self.gzip_data(content)
|
|
|
|
content_length = len(content)
|
|
|
|
else:
|
|
|
|
content = None
|
|
|
|
content_length = os.path.getsize(path)
|
|
|
|
self.send_header('Content-Length', str(content_length))
|
2015-11-26 00:26:10 +00:00
|
|
|
self.end_headers()
|
2016-02-24 05:26:32 +00:00
|
|
|
if content:
|
|
|
|
self.write_with_limit(content, content_length)
|
|
|
|
else:
|
|
|
|
self.write_file_with_limit(path, content_length)
|
2017-06-03 20:50:14 +00:00
|
|
|
elif len(parts) == 2 and parts[1] == 'log':
|
|
|
|
self._changelog()
|
2015-11-26 00:26:10 +00:00
|
|
|
else:
|
|
|
|
self.send_response(200, 'OK')
|
|
|
|
self.send_header('Content-type', 'text/plain')
|
|
|
|
self.send_header('X-Node-Protocol', settings.NODE_PROTOCOL)
|
|
|
|
self.end_headers()
|
|
|
|
self.wfile.write('Open Media Library\n'.encode())
|
|
|
|
|
2017-06-03 20:50:14 +00:00
|
|
|
def _denied(self):
|
|
|
|
self.send_response(403, 'denied')
|
|
|
|
self.end_headers()
|
|
|
|
|
|
|
|
def _changelog(self):
|
|
|
|
x509 = self.connection.get_peer_certificate()
|
|
|
|
user_id = get_service_id(x509.get_pubkey()) if x509 else None
|
|
|
|
with db.session():
|
|
|
|
u = user.models.User.get(user_id)
|
|
|
|
if not u:
|
|
|
|
return self._denied()
|
|
|
|
if not u.peered and u.pending == 'sent':
|
|
|
|
u.update_peering(True)
|
|
|
|
state.nodes.queue('add', u.id, True)
|
|
|
|
trigger_event('peering.accept', u.json())
|
2019-01-17 18:19:23 +00:00
|
|
|
if u.pending:
|
|
|
|
logger.debug('ignore request from pending peer[%s] changelog (pending sate: %s)', user_id, u.pending)
|
|
|
|
return self._denied()
|
2017-06-03 20:50:14 +00:00
|
|
|
if not u.peered:
|
|
|
|
return self._denied()
|
|
|
|
path = changelog_path()
|
|
|
|
content_length = changelog_size()
|
|
|
|
with open(path, 'rb') as log:
|
|
|
|
request_range = self.headers.get('Range', '')
|
|
|
|
if request_range:
|
|
|
|
r = request_range.split('=')[-1].split('-')
|
|
|
|
start = int(r[0])
|
|
|
|
end = int(r[1]) if r[1] else (content_length - 1)
|
|
|
|
if start == content_length:
|
|
|
|
content_length = 0
|
|
|
|
else:
|
|
|
|
content_length = end - start + 1
|
|
|
|
if content_length < 0:
|
|
|
|
content_length = os.path.getsize(path)
|
|
|
|
self.send_response(200, 'OK')
|
|
|
|
else:
|
|
|
|
log.seek(start)
|
|
|
|
self.send_response(206, 'OK')
|
|
|
|
else:
|
|
|
|
self.send_response(200, 'OK')
|
|
|
|
self.send_header('Content-type', 'text/json')
|
|
|
|
self.send_header('X-Node-Protocol', settings.NODE_PROTOCOL)
|
|
|
|
self.send_header('Content-Length', str(content_length))
|
|
|
|
self.end_headers()
|
|
|
|
self.write_fd_with_limit(log, content_length)
|
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
def gzip_data(self, data):
|
|
|
|
encoding = self.headers.get('Accept-Encoding')
|
|
|
|
if encoding.find('gzip') != -1:
|
|
|
|
self.send_header('Content-Encoding', 'gzip')
|
|
|
|
bytes_io = io.BytesIO()
|
|
|
|
gzip_file = gzip.GzipFile(fileobj=bytes_io, mode='wb')
|
|
|
|
gzip_file.write(data)
|
|
|
|
gzip_file.close()
|
|
|
|
result = bytes_io.getvalue()
|
|
|
|
bytes_io.close()
|
|
|
|
return result
|
|
|
|
else:
|
|
|
|
return data
|
2014-05-04 17:26:43 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
def gunzip_data(self, data):
|
|
|
|
bytes_io = io.BytesIO(data)
|
|
|
|
gzip_file = gzip.GzipFile(fileobj=bytes_io, mode='rb')
|
|
|
|
result = gzip_file.read()
|
|
|
|
gzip_file.close()
|
|
|
|
return result
|
2014-05-04 17:26:43 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
def do_POST(self):
|
2014-05-21 22:41:29 +00:00
|
|
|
'''
|
|
|
|
API
|
|
|
|
requestPeering username message
|
|
|
|
acceptPeering username message
|
|
|
|
rejectPeering message
|
|
|
|
removePeering message
|
|
|
|
|
|
|
|
ping responds public ip
|
|
|
|
'''
|
2015-11-26 00:26:10 +00:00
|
|
|
x509 = self.connection.get_peer_certificate()
|
|
|
|
user_id = get_service_id(x509.get_pubkey()) if x509 else None
|
2014-05-21 22:41:29 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
content = {}
|
|
|
|
try:
|
|
|
|
content_len = int(self.headers.get('content-length', 0))
|
|
|
|
data = self.rfile.read(content_len)
|
|
|
|
if self.headers.get('Content-Encoding') == 'gzip':
|
|
|
|
data = self.gunzip_data(data)
|
|
|
|
except:
|
2016-01-24 09:13:03 +00:00
|
|
|
logger.debug('invalid request', exc_info=True)
|
2015-11-26 00:26:10 +00:00
|
|
|
response_status = (500, 'invalid request')
|
|
|
|
self.write_response(response_status, content)
|
|
|
|
return
|
|
|
|
|
|
|
|
response_status = (200, 'OK')
|
|
|
|
if self.headers.get('X-Node-Protocol', '') > settings.NODE_PROTOCOL:
|
2014-05-21 22:41:29 +00:00
|
|
|
state.update_required = True
|
2015-11-26 00:26:10 +00:00
|
|
|
if self.headers.get('X-Node-Protocol', '') != settings.NODE_PROTOCOL:
|
|
|
|
logger.debug('protocol missmatch %s vs %s',
|
2017-05-30 10:51:21 +00:00
|
|
|
self.headers.get('X-Node-Protocol', ''), settings.NODE_PROTOCOL)
|
2015-11-26 00:26:10 +00:00
|
|
|
logger.debug('headers %s', self.headers)
|
2014-05-21 22:41:29 +00:00
|
|
|
content = settings.release
|
|
|
|
else:
|
2015-11-26 00:26:10 +00:00
|
|
|
try:
|
2014-10-31 14:41:46 +00:00
|
|
|
action, args = json.loads(data.decode('utf-8'))
|
2015-11-26 00:26:10 +00:00
|
|
|
except:
|
2016-01-24 09:13:03 +00:00
|
|
|
logger.debug('invalid data: %s', data, exc_info=True)
|
2015-11-26 00:26:10 +00:00
|
|
|
response_status = (500, 'invalid request')
|
|
|
|
content = {
|
|
|
|
'status': 'invalid request'
|
|
|
|
}
|
|
|
|
self.write_response(response_status, content)
|
2014-05-26 16:02:41 +00:00
|
|
|
return
|
2016-04-04 23:28:55 +00:00
|
|
|
logger.debug('%s requests %s%s', user_id, action, args)
|
2015-11-26 00:26:10 +00:00
|
|
|
if action == 'ping':
|
|
|
|
content = {
|
|
|
|
'status': 'ok'
|
|
|
|
}
|
|
|
|
else:
|
|
|
|
content = api_call(action, user_id, args)
|
|
|
|
if content is None:
|
|
|
|
content = {'status': 'not peered'}
|
|
|
|
logger.debug('PEER %s IS UNKNOWN SEND 403', user_id)
|
|
|
|
response_status = (403, 'UNKNOWN USER')
|
|
|
|
content = {}
|
2015-12-01 09:39:47 +00:00
|
|
|
#else:
|
|
|
|
# logger.debug('RESPONSE %s: %s', action, content)
|
2015-11-26 00:26:10 +00:00
|
|
|
self.write_response(response_status, content)
|
|
|
|
|
|
|
|
def write_response(self, response_status, content):
|
|
|
|
self.send_response(*response_status)
|
|
|
|
self.send_header('X-Node-Protocol', settings.NODE_PROTOCOL)
|
|
|
|
self.send_header('Content-Type', 'application/json')
|
|
|
|
content = json.dumps(content, ensure_ascii=False).encode('utf-8')
|
|
|
|
content = self.gzip_data(content)
|
2016-04-04 23:28:55 +00:00
|
|
|
content_length = len(content)
|
|
|
|
self.send_header('Content-Length', str(content_length))
|
2015-11-26 00:26:10 +00:00
|
|
|
self.end_headers()
|
|
|
|
self.wfile.write(content)
|
2016-04-04 23:28:55 +00:00
|
|
|
logger.debug('%s bytes response', content_length)
|
2015-11-26 00:26:10 +00:00
|
|
|
|
2016-02-24 05:26:32 +00:00
|
|
|
def chunk_size(self, content_length):
|
|
|
|
return min(16*1024, content_length)
|
|
|
|
|
|
|
|
def write_with_limit(self, content, content_length):
|
|
|
|
chunk_size = self.chunk_size(content_length)
|
|
|
|
position = 0
|
|
|
|
while position < content_length:
|
|
|
|
if state.bandwidth:
|
|
|
|
while not state.bandwidth.upload(chunk_size) and self.server._running:
|
|
|
|
time.sleep(0.1)
|
|
|
|
data = content[position:position+chunk_size]
|
|
|
|
self.wfile.write(data)
|
|
|
|
position += chunk_size
|
|
|
|
|
2017-06-03 20:50:14 +00:00
|
|
|
def write_fd_with_limit(self, f, content_length):
|
2016-02-24 05:26:32 +00:00
|
|
|
chunk_size = self.chunk_size(content_length)
|
2017-06-03 20:50:14 +00:00
|
|
|
position = 0
|
|
|
|
while True:
|
|
|
|
data = f.read(chunk_size)
|
|
|
|
if not data:
|
|
|
|
break
|
|
|
|
self.wfile.write(data)
|
|
|
|
position += chunk_size
|
|
|
|
if position + chunk_size > content_length:
|
|
|
|
chunk_size = content_length - position
|
|
|
|
if chunk_size <= 0:
|
|
|
|
break
|
|
|
|
if state.bandwidth:
|
|
|
|
while not state.bandwidth.upload(chunk_size) and self.server._running:
|
|
|
|
time.sleep(0.1)
|
|
|
|
|
|
|
|
def write_file_with_limit(self, path, content_length):
|
2016-02-24 05:26:32 +00:00
|
|
|
with open(path, 'rb') as f:
|
2017-06-03 20:50:14 +00:00
|
|
|
self.write_fd_with_limit(f, content_length)
|
2016-02-24 05:26:32 +00:00
|
|
|
|
2015-11-26 00:26:10 +00:00
|
|
|
class Server(Thread):
|
|
|
|
http_server = None
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
Thread.__init__(self)
|
|
|
|
address = (settings.server['node_address'], settings.server['node_port'])
|
|
|
|
self.http_server = NodeServer(address, Handler)
|
|
|
|
self.daemon = True
|
|
|
|
self.start()
|
|
|
|
|
|
|
|
def run(self):
|
|
|
|
self.http_server.serve_forever()
|
|
|
|
|
|
|
|
def stop(self):
|
|
|
|
if self.http_server:
|
2016-01-18 15:45:59 +00:00
|
|
|
self.http_server._running = False
|
2015-11-26 00:26:10 +00:00
|
|
|
self.http_server.shutdown()
|
|
|
|
self.http_server.socket.close()
|
|
|
|
return Thread.join(self)
|
2014-05-17 00:14:15 +00:00
|
|
|
|
2014-08-09 16:33:59 +00:00
|
|
|
def start():
|
2015-11-26 00:26:10 +00:00
|
|
|
return Server()
|
|
|
|
|