2016-09-20 22:58:30 +02:00
|
|
|
import logging
|
2016-11-18 19:26:04 +01:00
|
|
|
import urlparse
|
|
|
|
|
2016-09-20 22:58:30 +02:00
|
|
|
from decimal import Decimal
|
2016-09-22 03:36:06 +02:00
|
|
|
from zope.interface import implements
|
|
|
|
from twisted.web import server, resource
|
2016-09-20 22:58:30 +02:00
|
|
|
from twisted.internet import defer
|
2016-11-11 19:40:19 +01:00
|
|
|
from twisted.python.failure import Failure
|
2017-01-09 20:03:29 +01:00
|
|
|
from twisted.internet.error import ConnectionDone, ConnectionLost
|
2016-09-20 22:58:30 +02:00
|
|
|
from txjsonrpc import jsonrpclib
|
2017-01-09 20:03:29 +01:00
|
|
|
|
2016-12-21 20:55:43 +01:00
|
|
|
from lbrynet import conf
|
2017-02-15 18:35:49 +01:00
|
|
|
from lbrynet.core.Error import InvalidAuthenticationToken
|
2017-01-09 20:03:29 +01:00
|
|
|
from lbrynet.core import utils
|
2017-01-31 00:46:06 +01:00
|
|
|
from lbrynet.lbrynet_daemon.auth.util import APIKey, get_auth_message, jsonrpc_dumps_pretty
|
2016-09-21 09:49:52 +02:00
|
|
|
from lbrynet.lbrynet_daemon.auth.client import LBRY_SECRET
|
2016-09-20 22:58:30 +02:00
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
2017-01-09 20:03:25 +01:00
|
|
|
EMPTY_PARAMS = [{}]
|
|
|
|
|
2016-09-20 22:58:30 +02:00
|
|
|
|
|
|
|
def default_decimal(obj):
|
|
|
|
if isinstance(obj, Decimal):
|
|
|
|
return float(obj)
|
|
|
|
|
|
|
|
|
2016-11-11 19:40:19 +01:00
|
|
|
class JSONRPCException(Exception):
|
|
|
|
def __init__(self, err, code):
|
|
|
|
self.faultCode = code
|
2016-11-14 19:53:11 +01:00
|
|
|
self.err = err
|
|
|
|
|
|
|
|
@property
|
|
|
|
def faultString(self):
|
2017-01-31 00:46:06 +01:00
|
|
|
try:
|
|
|
|
return self.err.getTraceback()
|
|
|
|
except AttributeError:
|
|
|
|
return str(self.err)
|
2016-11-11 19:40:19 +01:00
|
|
|
|
|
|
|
|
2017-01-09 20:03:29 +01:00
|
|
|
class UnknownAPIMethodError(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class NotAllowedDuringStartupError(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
def trap(err, *to_trap):
|
|
|
|
err.trap(*to_trap)
|
|
|
|
|
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
class AuthorizedBase(object):
|
|
|
|
def __init__(self):
|
|
|
|
self.authorized_functions = []
|
|
|
|
self.callable_methods = {}
|
|
|
|
|
|
|
|
for methodname in dir(self):
|
|
|
|
if methodname.startswith("jsonrpc_"):
|
|
|
|
method = getattr(self, methodname)
|
|
|
|
self.callable_methods.update({methodname.split("jsonrpc_")[1]: method})
|
|
|
|
if hasattr(method, '_auth_required'):
|
|
|
|
self.authorized_functions.append(methodname.split("jsonrpc_")[1])
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def auth_required(f):
|
|
|
|
f._auth_required = True
|
|
|
|
return f
|
|
|
|
|
|
|
|
|
|
|
|
class AuthJSONRPCServer(AuthorizedBase):
|
2016-11-30 21:20:45 +01:00
|
|
|
"""Authorized JSONRPC server used as the base class for the LBRY API
|
2016-09-22 03:36:06 +02:00
|
|
|
|
|
|
|
API methods are named with a leading "jsonrpc_"
|
|
|
|
|
|
|
|
Decorators:
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2017-01-26 02:06:17 +01:00
|
|
|
@AuthJSONRPCServer.auth_required: this requires that the client
|
2016-11-30 21:20:45 +01:00
|
|
|
include a valid hmac authentication token in their request
|
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
Attributes:
|
2016-11-30 21:20:45 +01:00
|
|
|
allowed_during_startup (list): list of api methods that are
|
|
|
|
callable before the server has finished startup
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2016-11-30 21:20:45 +01:00
|
|
|
sessions (dict): dictionary of active session_id:
|
|
|
|
lbrynet.lbrynet_daemon.auth.util.APIKey values
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
authorized_functions (list): list of api methods that require authentication
|
|
|
|
|
|
|
|
callable_methods (dict): dictionary of api_callable_name: method values
|
2016-11-30 21:20:45 +01:00
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
"""
|
|
|
|
implements(resource.IResource)
|
2016-09-20 22:58:30 +02:00
|
|
|
|
|
|
|
isLeaf = True
|
2016-09-22 03:36:06 +02:00
|
|
|
OK = 200
|
|
|
|
UNAUTHORIZED = 401
|
2017-01-03 02:15:25 +01:00
|
|
|
# TODO: codes should follow jsonrpc spec: http://www.jsonrpc.org/specification#error_object
|
2016-09-22 03:36:06 +02:00
|
|
|
NOT_FOUND = 8001
|
|
|
|
FAILURE = 8002
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2016-12-21 20:55:43 +01:00
|
|
|
def __init__(self, use_authentication=None):
|
2016-09-22 03:36:06 +02:00
|
|
|
AuthorizedBase.__init__(self)
|
2016-12-21 20:55:43 +01:00
|
|
|
self._use_authentication = (
|
2017-01-17 18:31:48 +01:00
|
|
|
use_authentication if use_authentication is not None else conf.settings['use_auth_http']
|
|
|
|
)
|
2016-11-22 21:11:25 +01:00
|
|
|
self.announced_startup = False
|
2016-09-22 03:36:06 +02:00
|
|
|
self.allowed_during_startup = []
|
2016-09-20 22:58:30 +02:00
|
|
|
self.sessions = {}
|
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
def setup(self):
|
|
|
|
return NotImplementedError()
|
|
|
|
|
2017-01-09 20:03:29 +01:00
|
|
|
def _set_headers(self, request, data, update_secret=False):
|
2017-01-17 04:23:20 +01:00
|
|
|
if conf.settings['allowed_origin']:
|
|
|
|
request.setHeader("Access-Control-Allow-Origin", conf.settings['allowed_origin'])
|
2017-03-13 16:54:40 +01:00
|
|
|
request.setHeader("Content-Type", "application/json")
|
|
|
|
request.setHeader("Accept", "application/json-rpc")
|
2017-01-09 20:03:29 +01:00
|
|
|
request.setHeader("Content-Length", str(len(data)))
|
|
|
|
if update_secret:
|
|
|
|
session_id = request.getSession().uid
|
|
|
|
request.setHeader(LBRY_SECRET, self.sessions.get(session_id).secret)
|
|
|
|
|
|
|
|
def _render_message(self, request, message):
|
|
|
|
request.write(message)
|
|
|
|
request.finish()
|
|
|
|
|
2017-01-03 03:05:44 +01:00
|
|
|
def _render_error(self, failure, request, id_,
|
|
|
|
version=jsonrpclib.VERSION_2, response_code=FAILURE):
|
2017-01-31 00:46:06 +01:00
|
|
|
# TODO: is it necessary to wrap the failure in a Failure? if not, merge this with next fn
|
|
|
|
self._render_error_string(Failure(failure), request, id_, version, response_code)
|
|
|
|
|
|
|
|
def _render_error_string(self, error_string, request, id_, version=jsonrpclib.VERSION_2,
|
|
|
|
response_code=FAILURE):
|
|
|
|
err = JSONRPCException(error_string, response_code)
|
|
|
|
fault = jsonrpc_dumps_pretty(err, id=id_, version=version)
|
2016-11-11 19:40:19 +01:00
|
|
|
self._set_headers(request, fault)
|
|
|
|
if response_code != AuthJSONRPCServer.FAILURE:
|
|
|
|
request.setResponseCode(response_code)
|
2017-01-09 20:03:29 +01:00
|
|
|
self._render_message(request, fault)
|
|
|
|
|
|
|
|
def _handle_dropped_request(self, result, d, function_name):
|
|
|
|
if not d.called:
|
|
|
|
log.warning("Cancelling dropped api request %s", function_name)
|
|
|
|
d.cancel()
|
2016-11-11 19:40:19 +01:00
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
def render(self, request):
|
2017-01-09 20:03:29 +01:00
|
|
|
time_in = utils.now()
|
2017-01-17 03:08:44 +01:00
|
|
|
# assert self._check_headers(request), InvalidHeaderError
|
2016-09-22 03:36:06 +02:00
|
|
|
session = request.getSession()
|
|
|
|
session_id = session.uid
|
2017-01-09 20:03:29 +01:00
|
|
|
finished_deferred = request.notifyFinish()
|
2016-09-22 03:36:06 +02:00
|
|
|
|
2016-10-19 06:12:44 +02:00
|
|
|
if self._use_authentication:
|
2016-11-14 19:53:11 +01:00
|
|
|
# if this is a new session, send a new secret and set the expiration
|
|
|
|
# otherwise, session.touch()
|
2016-10-19 06:12:44 +02:00
|
|
|
if self._initialize_session(session_id):
|
|
|
|
def expire_session():
|
|
|
|
self._unregister_user_session(session_id)
|
2017-01-09 20:03:25 +01:00
|
|
|
|
2016-10-19 06:12:44 +02:00
|
|
|
session.startCheckingExpiration()
|
|
|
|
session.notifyOnExpire(expire_session)
|
|
|
|
message = "OK"
|
|
|
|
request.setResponseCode(self.OK)
|
|
|
|
self._set_headers(request, message, True)
|
|
|
|
self._render_message(request, message)
|
|
|
|
return server.NOT_DONE_YET
|
2017-01-10 01:31:06 +01:00
|
|
|
else:
|
|
|
|
session.touch()
|
2016-09-22 03:36:06 +02:00
|
|
|
|
|
|
|
request.content.seek(0, 0)
|
|
|
|
content = request.content.read()
|
|
|
|
try:
|
|
|
|
parsed = jsonrpclib.loads(content)
|
2017-01-31 00:46:06 +01:00
|
|
|
except ValueError:
|
2016-11-14 19:53:11 +01:00
|
|
|
log.warning("Unable to decode request json")
|
2017-01-31 00:46:06 +01:00
|
|
|
self._render_error_string('Invalid JSON', request, None)
|
2016-11-11 19:40:19 +01:00
|
|
|
return server.NOT_DONE_YET
|
2016-09-22 03:36:06 +02:00
|
|
|
|
|
|
|
function_name = parsed.get('method')
|
2017-01-31 00:46:06 +01:00
|
|
|
args = parsed.get('params', {})
|
2017-01-03 03:05:44 +01:00
|
|
|
id_ = parsed.get('id')
|
2016-09-22 03:36:06 +02:00
|
|
|
token = parsed.pop('hmac', None)
|
2017-01-03 03:05:44 +01:00
|
|
|
version = self._get_jsonrpc_version(parsed.get('jsonrpc'), id_)
|
2016-09-22 03:36:06 +02:00
|
|
|
|
|
|
|
reply_with_next_secret = False
|
2016-10-19 06:12:44 +02:00
|
|
|
if self._use_authentication:
|
|
|
|
if function_name in self.authorized_functions:
|
|
|
|
try:
|
|
|
|
self._verify_token(session_id, parsed, token)
|
2016-11-11 19:40:19 +01:00
|
|
|
except InvalidAuthenticationToken as err:
|
2016-11-14 19:53:11 +01:00
|
|
|
log.warning("API validation failed")
|
2016-11-30 21:20:45 +01:00
|
|
|
self._render_error(
|
2017-01-03 03:05:44 +01:00
|
|
|
err, request, id_, version=version,
|
|
|
|
response_code=AuthJSONRPCServer.UNAUTHORIZED)
|
2016-10-19 06:12:44 +02:00
|
|
|
return server.NOT_DONE_YET
|
|
|
|
self._update_session_secret(session_id)
|
|
|
|
reply_with_next_secret = True
|
2016-09-22 03:36:06 +02:00
|
|
|
|
|
|
|
try:
|
|
|
|
function = self._get_jsonrpc_method(function_name)
|
2017-01-09 20:03:29 +01:00
|
|
|
except (UnknownAPIMethodError, NotAllowedDuringStartupError) as err:
|
|
|
|
log.warning('Failed to get function %s: %s', function_name, err)
|
|
|
|
self._render_error(err, request, version)
|
2016-11-11 19:40:19 +01:00
|
|
|
return server.NOT_DONE_YET
|
2016-09-22 03:36:06 +02:00
|
|
|
|
2017-01-26 02:06:17 +01:00
|
|
|
if args == EMPTY_PARAMS or args == []:
|
2016-11-14 19:53:11 +01:00
|
|
|
d = defer.maybeDeferred(function)
|
2017-01-26 02:06:17 +01:00
|
|
|
elif isinstance(args, dict):
|
|
|
|
d = defer.maybeDeferred(function, **args)
|
|
|
|
elif len(args) == 1 and isinstance(args[0], dict):
|
|
|
|
# TODO: this is for backwards compatibility. Remove this once API and UI are updated
|
|
|
|
# TODO: also delete EMPTY_PARAMS then
|
|
|
|
d = defer.maybeDeferred(function, **args[0])
|
2016-11-14 19:53:11 +01:00
|
|
|
else:
|
2017-01-26 02:06:17 +01:00
|
|
|
# d = defer.maybeDeferred(function, *args) # if we want to support positional args too
|
|
|
|
raise ValueError('Args must be a dict')
|
2016-11-11 19:40:19 +01:00
|
|
|
|
2017-01-09 20:03:29 +01:00
|
|
|
# finished_deferred will callback when the request is finished
|
|
|
|
# and errback if something went wrong. If the errback is
|
|
|
|
# called, cancel the deferred stack. This is to prevent
|
|
|
|
# request.finish() from being called on a closed request.
|
|
|
|
finished_deferred.addErrback(self._handle_dropped_request, d, function_name)
|
|
|
|
|
2017-01-03 03:05:44 +01:00
|
|
|
d.addCallback(self._callback_render, request, id_, version, reply_with_next_secret)
|
2017-01-09 20:03:29 +01:00
|
|
|
# TODO: don't trap RuntimeError, which is presently caught to
|
|
|
|
# handle deferredLists that won't peacefully cancel, namely
|
|
|
|
# get_lbry_files
|
|
|
|
d.addErrback(trap, ConnectionDone, ConnectionLost, defer.CancelledError, RuntimeError)
|
2017-01-18 03:01:28 +01:00
|
|
|
d.addErrback(log.fail(self._render_error, request, id_, version=version),
|
2017-01-09 20:03:29 +01:00
|
|
|
'Failed to process %s', function_name)
|
|
|
|
d.addBoth(lambda _: log.debug("%s took %f",
|
|
|
|
function_name,
|
|
|
|
(utils.now() - time_in).total_seconds()))
|
2016-09-22 03:36:06 +02:00
|
|
|
return server.NOT_DONE_YET
|
|
|
|
|
2016-09-20 22:58:30 +02:00
|
|
|
def _register_user_session(self, session_id):
|
2016-09-22 03:36:06 +02:00
|
|
|
"""
|
|
|
|
Add or update a HMAC secret for a session
|
|
|
|
|
|
|
|
@param session_id:
|
|
|
|
@return: secret
|
|
|
|
"""
|
2016-10-19 06:12:44 +02:00
|
|
|
log.info("Register api session")
|
|
|
|
token = APIKey.new(seed=session_id)
|
2016-09-20 22:58:30 +02:00
|
|
|
self.sessions.update({session_id: token})
|
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
def _unregister_user_session(self, session_id):
|
|
|
|
log.info("Unregister API session")
|
|
|
|
del self.sessions[session_id]
|
|
|
|
|
2016-09-20 22:58:30 +02:00
|
|
|
def _check_headers(self, request):
|
2016-11-18 19:26:04 +01:00
|
|
|
return (
|
|
|
|
self._check_header_source(request, 'Origin') and
|
|
|
|
self._check_header_source(request, 'Referer'))
|
|
|
|
|
|
|
|
def _check_header_source(self, request, header):
|
|
|
|
"""Check if the source of the request is allowed based on the header value."""
|
|
|
|
source = request.getHeader(header)
|
|
|
|
if not self._check_source_of_request(source):
|
|
|
|
log.warning("Attempted api call from invalid %s: %s", header, source)
|
2016-09-22 03:36:06 +02:00
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
2016-11-18 19:26:04 +01:00
|
|
|
def _check_source_of_request(self, source):
|
|
|
|
if source is None:
|
|
|
|
return True
|
2017-01-17 04:23:20 +01:00
|
|
|
if conf.settings['api_host'] == '0.0.0.0':
|
2016-11-18 19:26:04 +01:00
|
|
|
return True
|
|
|
|
server, port = self.get_server_port(source)
|
2017-01-12 16:49:57 +01:00
|
|
|
return self._check_server_port(server, port)
|
|
|
|
|
|
|
|
def _check_server_port(self, server, port):
|
|
|
|
api = (conf.settings['api_host'], conf.settings['api_port'])
|
|
|
|
return (server, port) == api or self._is_from_allowed_origin(server, port)
|
|
|
|
|
|
|
|
def _is_from_allowed_origin(self, server, port):
|
|
|
|
allowed_origin = conf.settings['allowed_origin']
|
|
|
|
if not allowed_origin:
|
|
|
|
return False
|
|
|
|
if allowed_origin == '*':
|
|
|
|
return True
|
|
|
|
allowed_server, allowed_port = self.get_server_port(allowed_origin)
|
|
|
|
return (allowed_server, allowed_port) == (server, port)
|
2016-11-18 19:26:04 +01:00
|
|
|
return (
|
2017-01-17 04:23:20 +01:00
|
|
|
server == conf.settings['api_host'] and
|
|
|
|
port == conf.settings['api_port'])
|
2016-11-18 19:26:04 +01:00
|
|
|
|
|
|
|
def get_server_port(self, origin):
|
|
|
|
parsed = urlparse.urlparse(origin)
|
|
|
|
server_port = parsed.netloc.split(':')
|
|
|
|
assert len(server_port) <= 2
|
|
|
|
if len(server_port) == 2:
|
|
|
|
return server_port[0], int(server_port[1])
|
|
|
|
else:
|
|
|
|
return server_port[0], 80
|
|
|
|
|
2017-01-09 20:03:29 +01:00
|
|
|
def _verify_method_is_callable(self, function_path):
|
2016-09-22 03:36:06 +02:00
|
|
|
if function_path not in self.callable_methods:
|
2017-01-09 20:03:29 +01:00
|
|
|
raise UnknownAPIMethodError(function_path)
|
2016-09-22 03:36:06 +02:00
|
|
|
if not self.announced_startup:
|
|
|
|
if function_path not in self.allowed_during_startup:
|
2017-01-09 20:03:29 +01:00
|
|
|
raise NotAllowedDuringStartupError(function_path)
|
2016-09-22 03:36:06 +02:00
|
|
|
|
|
|
|
def _get_jsonrpc_method(self, function_path):
|
2017-01-09 20:03:29 +01:00
|
|
|
self._verify_method_is_callable(function_path)
|
2016-09-22 03:36:06 +02:00
|
|
|
return self.callable_methods.get(function_path)
|
|
|
|
|
|
|
|
def _initialize_session(self, session_id):
|
|
|
|
if not self.sessions.get(session_id, False):
|
2016-10-19 06:12:44 +02:00
|
|
|
self._register_user_session(session_id)
|
2016-09-22 03:36:06 +02:00
|
|
|
return True
|
|
|
|
return False
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
def _verify_token(self, session_id, message, token):
|
2017-01-10 01:31:06 +01:00
|
|
|
assert token is not None, InvalidAuthenticationToken
|
2016-09-22 03:36:06 +02:00
|
|
|
to_auth = get_auth_message(message)
|
|
|
|
api_key = self.sessions.get(session_id)
|
|
|
|
assert api_key.compare_hmac(to_auth, token), InvalidAuthenticationToken
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2016-09-22 03:36:06 +02:00
|
|
|
def _update_session_secret(self, session_id):
|
|
|
|
self.sessions.update({session_id: APIKey.new(name=session_id)})
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2017-01-31 00:46:06 +01:00
|
|
|
@staticmethod
|
|
|
|
def _get_jsonrpc_version(version=None, id_=None):
|
2016-09-20 22:58:30 +02:00
|
|
|
if version:
|
2017-01-31 00:46:06 +01:00
|
|
|
return int(float(version))
|
|
|
|
elif id_:
|
|
|
|
return jsonrpclib.VERSION_1
|
2016-09-20 22:58:30 +02:00
|
|
|
else:
|
2017-01-31 00:46:06 +01:00
|
|
|
return jsonrpclib.VERSION_PRE1
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2017-01-03 03:05:44 +01:00
|
|
|
def _callback_render(self, result, request, id_, version, auth_required=False):
|
2017-01-11 21:31:08 +01:00
|
|
|
result_for_return = result
|
2016-09-20 22:58:30 +02:00
|
|
|
|
|
|
|
if version == jsonrpclib.VERSION_PRE1:
|
|
|
|
if not isinstance(result, jsonrpclib.Fault):
|
2016-09-22 03:36:06 +02:00
|
|
|
result_for_return = (result_for_return,)
|
2017-01-09 20:03:25 +01:00
|
|
|
|
2016-09-20 22:58:30 +02:00
|
|
|
try:
|
2017-01-31 00:46:06 +01:00
|
|
|
encoded_message = jsonrpc_dumps_pretty(
|
2017-01-03 03:05:44 +01:00
|
|
|
result_for_return, id=id_, version=version, default=default_decimal)
|
2016-09-22 03:36:06 +02:00
|
|
|
self._set_headers(request, encoded_message, auth_required)
|
|
|
|
self._render_message(request, encoded_message)
|
2016-11-11 19:40:19 +01:00
|
|
|
except Exception as err:
|
2016-12-30 23:48:44 +01:00
|
|
|
log.exception("Failed to render API response: %s", result)
|
2017-01-03 03:05:44 +01:00
|
|
|
self._render_error(err, request, id_, version)
|
2016-09-20 22:58:30 +02:00
|
|
|
|
2017-01-31 00:46:06 +01:00
|
|
|
@staticmethod
|
|
|
|
def _render_response(result):
|
2017-01-11 21:31:08 +01:00
|
|
|
return defer.succeed(result)
|