You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

509 lines
12 KiB

/*
* Copyright 2014 Con Kolivas
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 3 of the License, or (at your option)
* any later version. See COPYING for more details.
*/
#include "config.h"
#include <sys/socket.h>
#include <jansson.h>
#include <string.h>
#include <unistd.h>
#include "ckpool.h"
#include "libckpool.h"
#include "generator.h"
#include "bitcoin.h"
/* Per proxied pool instance data */
struct proxy_instance {
char *auth;
char *pass;
char *enonce1;
char *enonce1bin;
char *sessionid;
int nonce2len;
tv_t last_message;
double diff;
int absolute_shares;
int diff_shares;
tv_t last_share;
int id; /* Message id for sending stratum messages */
bool no_sessionid; /* Doesn't support session id resume on subscribe */
bool no_params; /* Doesn't want any parameters on subscribe */
};
typedef struct proxy_instance proxy_instance_t;
static int gen_loop(proc_instance_t *pi, connsock_t *cs)
{
unixsock_t *us = &pi->us;
ckpool_t *ckp = pi->ckp;
int sockd, ret = 0;
char *buf = NULL;
gbtbase_t gbt;
char hash[68];
memset(&gbt, 0, sizeof(gbt));
retry:
sockd = accept(us->sockd, NULL, NULL);
if (sockd < 0) {
if (interrupted())
goto retry;
LOGERR("Failed to accept on generator socket");
ret = 1;
goto out;
}
dealloc(buf);
buf = recv_unix_msg(sockd);
if (!buf) {
LOGWARNING("Failed to get message in gen_loop");
close(sockd);
goto retry;
}
LOGDEBUG("Generator received request: %s", buf);
if (!strncasecmp(buf, "shutdown", 8)) {
ret = 0;
goto out;
}
if (!strncasecmp(buf, "getbase", 7)) {
if (!gen_gbtbase(cs, &gbt)) {
LOGWARNING("Failed to get block template from %s:%s",
cs->url, cs->port);
send_unix_msg(sockd, "Failed");
} else {
char *s = json_dumps(gbt.json, 0);
send_unix_msg(sockd, s);
free(s);
clear_gbtbase(&gbt);
}
} else if (!strncasecmp(buf, "getbest", 7)) {
if (!get_bestblockhash(cs, hash)) {
LOGWARNING("No best block hash support from %s:%s",
cs->url, cs->port);
send_unix_msg(sockd, "Failed");
} else {
send_unix_msg(sockd, hash);
}
} else if (!strncasecmp(buf, "getlast", 7)) {
int height = get_blockcount(cs);
if (height == -1)
send_unix_msg(sockd, "Failed");
else {
LOGDEBUG("Height: %d", height);
if (!get_blockhash(cs, height, hash))
send_unix_msg(sockd, "Failed");
else {
send_unix_msg(sockd, hash);
LOGDEBUG("Hash: %s", hash);
}
}
} else if (!strncasecmp(buf, "submitblock:", 12)) {
LOGNOTICE("Submitting block data!");
if (submit_block(cs, buf + 12))
send_proc(ckp->stratifier, "update");
/* FIXME Add logging of block solves */
} else if (!strncasecmp(buf, "ping", 4)) {
LOGDEBUG("Generator received ping request");
send_unix_msg(sockd, "pong");
}
close(sockd);
goto retry;
out:
dealloc(buf);
return ret;
}
static int server_mode(ckpool_t *ckp, proc_instance_t *pi, connsock_t *cs,
const char *auth, const char *pass)
{
char *userpass = NULL;
gbtbase_t gbt;
int ret = 1;
memset(&gbt, 0, sizeof(gbt));
userpass = strdup(auth);
realloc_strcat(&userpass, ":");
realloc_strcat(&userpass, pass);
cs->auth = http_base64(userpass);
if (!cs->auth) {
LOGWARNING("Failed to create base64 auth from %s", userpass);
goto out;
}
cs->fd = connect_socket(cs->url, cs->port);
if (cs->fd < 0) {
LOGWARNING("FATAL: Failed to connect socket to %s:%s !", cs->url, cs->port);
goto out;
}
keep_sockalive(cs->fd);
/* Test we can connect, authorise and get a block template */
if (!gen_gbtbase(cs, &gbt)) {
LOGWARNING("FATAL: Failed to get test block template from %s:%s auth %s !",
cs->url, cs->port, userpass);
goto out;
}
clear_gbtbase(&gbt);
if (!validate_address(cs, ckp->btcaddress)) {
LOGWARNING("FATAL: Invalid btcaddress: %s !", ckp->btcaddress);
goto out;
}
ret = gen_loop(pi, cs);
out:
close(cs->fd);
dealloc(userpass);
return ret;
}
static bool send_json_msg(connsock_t *cs, json_t *json_msg)
{
int len, sent;
char *s;
s = json_dumps(json_msg, JSON_ESCAPE_SLASH);
realloc_strcat(&s, "\n");
len = strlen(s);
sent = write_socket(cs->fd, s, len);
dealloc(s);
if (sent != len) {
LOGWARNING("Failed to send %d bytes in send_json_msg", len);
return false;
}
return true;
}
static bool connect_proxy(connsock_t *cs)
{
cs->fd = connect_socket(cs->url, cs->port);
if (cs->fd < 0) {
LOGWARNING("Failed to connect socket to %s:%s in connect_proxy",
cs->url, cs->port);
return false;
}
keep_sockalive(cs->fd);
return true;
}
/* Decode a string that should have a json message and return just the contents
* of the result key or NULL. */
static json_t *json_result(json_t *val)
{
json_t *res_val = NULL, *err_val;
res_val = json_object_get(val, "result");
if (json_is_null(res_val))
res_val = NULL;
if (!res_val) {
char *ss;
err_val = json_object_get(val, "error");
if (err_val)
ss = json_dumps(err_val, 0);
else
ss = strdup("(unknown reason)");
LOGWARNING("JSON-RPC decode failed: %s", ss);
free(ss);
}
return res_val;
}
/* Parse a string and return the json value it contains, if any, and the
* result in res_val. Return NULL if no result key is found. */
static json_t *json_msg_result(char *msg, json_t **res_val)
{
json_error_t err;
json_t *val;
*res_val = NULL;
val = json_loads(msg, 0, &err);
if (!val) {
LOGWARNING("Json decode failed(%d): %s", err.line, err.text);
goto out;
}
*res_val = json_result(val);
if (!*res_val) {
LOGWARNING("No json result found");
json_decref(val);
val = NULL;
}
out:
return val;
}
/* For some reason notify is buried at various different array depths so use
* a reentrant function to try and find it. */
static json_t *find_notify(json_t *val)
{
int arr_size, i;
json_t *ret;
const char *entry;
if (!json_is_array(val))
return NULL;
arr_size = json_array_size(val);
entry = json_string_value(json_array_get(val, 0));
if (entry && !strncasecmp(entry, "mining.notify", 13))
return val;
for (i = 0; i < arr_size; i++) {
json_t *arr_val;
arr_val = json_array_get(val, i);
ret = find_notify(arr_val);
if (ret)
break;
}
return ret;
}
static bool parse_subscribe(connsock_t *cs, proxy_instance_t *proxi)
{
json_t *val = NULL, *res_val, *notify_val, *tmp;
const char *string;
bool ret = false;
int size;
size = read_socket_line(cs);
if (size < 1) {
LOGWARNING("Failed to receive line in parse_subscribe");
goto out;
}
val = json_msg_result(cs->buf, &res_val);
if (!val) {
LOGWARNING("Failed to get a json result in parse_subscribe, got: %s", cs->buf);
goto out;
}
if (!json_is_array(res_val)) {
LOGWARNING("Result in parse_subscribe not an array");
goto out;
}
size = json_array_size(res_val);
if (size < 3) {
LOGWARNING("Result in parse_subscribe array too small");
goto out;
}
notify_val = find_notify(res_val);
if (!notify_val) {
LOGWARNING("Failed to find notify in parse_subscribe");
goto out;
}
if (!proxi->no_params && !proxi->no_sessionid && json_array_size(notify_val) > 1) {
/* Copy the session id if one exists. */
string = json_string_value(json_array_get(notify_val, 1));
if (string)
proxi->sessionid = strdup(string);
}
tmp = json_array_get(res_val, 1);
if (!tmp || !json_is_string(tmp)) {
LOGWARNING("Failed to parse enonce1 in parse_subscribe");
goto out;
}
string = json_string_value(tmp);
if (strlen(string) < 1) {
LOGWARNING("Invalid string length for enonce1 in parse_subscribe");
goto out;
}
proxi->enonce1 = strdup(string);
size = strlen(proxi->enonce1) / 2;
proxi->enonce1bin = ckalloc(size);
hex2bin(proxi->enonce1bin, proxi->enonce1, size);
tmp = json_array_get(res_val, 2);
if (!tmp || !json_is_integer(tmp)) {
LOGWARNING("Failed to parse nonce2len in parse_subscribe");
goto out;
}
size = json_integer_value(tmp);
if (size < 1 || size > 8) {
LOGWARNING("Invalid nonce2len %d in parse_subscribe", size);
goto out;
}
proxi->nonce2len = size;
LOGWARNING("Found notify with enonce %s nonce2len %d !", proxi->enonce1,
proxi->nonce2len);
out:
if (val)
json_decref(val);
return ret;
}
static bool subscribe_stratum(connsock_t *cs, proxy_instance_t *proxi)
{
json_t *req;
bool ret = false;
retry:
/* Attempt to reconnect if the pool supports resuming */
if (proxi->sessionid) {
req = json_pack("{s:i,s:s,s:[s,s]}",
"id", proxi->id++,
"method", "mining.subscribe",
"params", "ckproxy", proxi->sessionid);
/* Then attempt to connect with just the client description */
} else if (!proxi->no_params) {
req = json_pack("{s:i,s:s,s:[s]}",
"id", proxi->id++,
"method", "mining.subscribe",
"params", "ckproxy");
/* Then try without any parameters */
} else {
req = json_pack("{s:i,s:s,s:[]}",
"id", proxi->id++,
"method", "mining.subscribe",
"params");
}
ret = send_json_msg(cs, req);
json_decref(req);
if (!ret) {
LOGWARNING("Failed to send message in subscribe_stratum");
close(cs->fd);
goto out;
}
ret = parse_subscribe(cs, proxi);
if (ret)
goto out;
close(cs->fd);
if (proxi->no_params) {
LOGWARNING("Failed all subscription options in subscribe_stratum");
goto out;
}
if (proxi->sessionid) {
LOGNOTICE("Failed sessionid reconnect in subscribe_stratum, retrying without");
proxi->no_sessionid = true;
dealloc(proxi->sessionid);
} else {
LOGNOTICE("Failed connecting with parameters in subscribe_stratum, retrying without");
proxi->no_params = true;
}
ret = connect_proxy(cs);
if (!ret) {
LOGWARNING("Failed to reconnect in subscribe_stratum");
goto out;
}
goto retry;
out:
return ret;
}
static bool auth_stratum(connsock_t *cs, proxy_instance_t *proxi, const char *auth,
const char *pass)
{
json_t *req;
bool ret;
req = json_pack("{s:i,s:s,s:[s,s]}",
"id", proxi->id++,
"method", "mining.authorize",
"params", auth, pass);
ret = send_json_msg(cs, req);
json_decref(req);
if (!ret) {
LOGWARNING("Failed to send message in auth_stratum");
close(cs->fd);
goto out;
}
out:
return ret;
}
static int proxy_loop(proc_instance_t *pi, connsock_t *cs)
{
return 0;
}
static int proxy_mode(ckpool_t *ckp, proc_instance_t *pi, connsock_t *cs,
const char *auth, const char *pass)
{
proxy_instance_t proxi;
int ret = 1;
memset(&proxi, 0, sizeof(proxi));
if (!connect_proxy(cs)) {
LOGWARNING("FATAL: Failed to connect to %s:%s in proxy_mode!",
cs->url, cs->port);
goto out;
}
/* Test we can connect, authorise and get stratum information */
if (!subscribe_stratum(cs, &proxi)) {
LOGWARNING("FATAL: Failed initial subscribe to %s:%s !",
cs->url, cs->port);
goto out;
}
if (!auth_stratum(cs, &proxi, auth, pass)) {
LOGWARNING("FATAL: Failed initial authorise to %s:%s with %s:%s !",
cs->url, cs->port, auth, pass);
goto out;
}
ret = proxy_loop(pi, cs);
out:
close(cs->fd);
free(proxi.enonce1);
free(proxi.enonce1bin);
free(proxi.sessionid);
return ret;
}
/* FIXME: Hard wired to just use config 0 for now */
int generator(proc_instance_t *pi)
{
char *url, *auth, *pass, *userpass = NULL;
ckpool_t *ckp = pi->ckp;
connsock_t cs;
int ret = 1;
memset(&cs, 0, sizeof(cs));
if (!ckp->proxy) {
url = ckp->btcdurl[0];
auth = ckp->btcdauth[0];
pass = ckp->btcdpass[0];
} else {
url = ckp->proxyurl[0];
auth = ckp->proxyauth[0];
pass = ckp->proxypass[0];
}
if (!extract_sockaddr(url, &cs.url, &cs.port)) {
LOGWARNING("Failed to extract address from %s", url);
goto out;
}
if (!ckp->proxy)
ret = server_mode(ckp, pi, &cs, auth, pass);
else
ret = proxy_mode(ckp, pi, &cs, auth, pass);
out:
/* Clean up here */
dealloc(cs.url);
dealloc(cs.port);
dealloc(userpass);
LOGINFO("%s generator exiting with return code %d", ckp->name, ret);
if (ret) {
send_proc(&ckp->main, "shutdown");
sleep(1);
}
exit(ret);
}