You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
317 lines
7.4 KiB
317 lines
7.4 KiB
10 years ago
|
/*
|
||
|
* Copyright 2014 Andrew Smith
|
||
|
* Copyright 2014 Con Kolivas
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify it
|
||
|
* under the terms of the GNU General Public License as published by the Free
|
||
|
* Software Foundation; either version 3 of the License, or (at your option)
|
||
|
* any later version. See COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
#include "ckdb.h"
|
||
|
|
||
|
//#include <curl/curl.h>
|
||
|
|
||
|
#define GETBLOCKHASHCMD "getblockhash"
|
||
|
#define GETBLOCKHASH "{\"method\":\"" GETBLOCKHASHCMD "\",\"params\":[%d],\"id\":1}"
|
||
|
#define GETBLOCKHASHKEY ((const char *)"result")
|
||
|
|
||
|
#define GETBLOCKCMD "getblock"
|
||
|
#define GETBLOCK "{\"method\":\"" GETBLOCKCMD "\",\"params\":[\"%s\"],\"id\":1}"
|
||
|
#define GETBLOCKCONFKEY ((const char *)"confirmations")
|
||
|
|
||
|
static char *btc_data(char *json, size_t *len)
|
||
|
{
|
||
|
size_t off;
|
||
|
char tmp[1024];
|
||
|
char *buf;
|
||
|
|
||
|
APPEND_REALLOC_INIT(buf, off, *len);
|
||
|
APPEND_REALLOC(buf, off, *len, "POST / HTTP/1.1\n");
|
||
|
snprintf(tmp, sizeof(tmp), "Authorization: Basic %s\n", btc_auth);
|
||
|
APPEND_REALLOC(buf, off, *len, tmp);
|
||
|
snprintf(tmp, sizeof(tmp), "Host: %s/\n", btc_server);
|
||
|
APPEND_REALLOC(buf, off, *len, tmp);
|
||
|
APPEND_REALLOC(buf, off, *len, "Content-Type: application/json\n");
|
||
|
snprintf(tmp, sizeof(tmp), "Content-Length: %d\n\n", (int)strlen(json));
|
||
|
APPEND_REALLOC(buf, off, *len, tmp);
|
||
|
APPEND_REALLOC(buf, off, *len, json);
|
||
|
|
||
|
return buf;
|
||
|
}
|
||
|
|
||
|
#define SOCK_READ 8192
|
||
|
|
||
|
static int read_socket(int fd, char **buf, int timeout)
|
||
|
{
|
||
|
char tmp[SOCK_READ+1];
|
||
|
int ret, off, len;
|
||
|
tv_t tv_timeout;
|
||
|
fd_set readfs;
|
||
|
|
||
|
len = SOCK_READ;
|
||
|
*buf = malloc(len+1);
|
||
|
if (!(*buf))
|
||
|
quithere(1, "malloc (%d) OOM", len+1);
|
||
|
off = 0;
|
||
|
|
||
|
while (42) {
|
||
|
tv_timeout.tv_sec = timeout;
|
||
|
tv_timeout.tv_usec = 0;
|
||
|
FD_ZERO(&readfs);
|
||
|
FD_SET(fd, &readfs);
|
||
|
ret = select(fd + 1, &readfs, NULL, NULL, &tv_timeout);
|
||
|
if (ret == 0)
|
||
|
break;
|
||
|
|
||
|
if (ret < 0) {
|
||
|
LOGERR("%s() btc socket select error %d:%s",
|
||
|
__func__, errno, strerror(errno));
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
ret = recv(fd, tmp, SOCK_READ, 0);
|
||
|
if (ret == 0)
|
||
|
break;
|
||
|
if (ret < 0) {
|
||
|
LOGERR("%s() btc socket recv error %d:%s",
|
||
|
__func__, errno, strerror(errno));
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
if ((off + ret) > len) {
|
||
|
len += SOCK_READ;
|
||
|
*buf = realloc(*buf, len + 1);
|
||
|
if (!(*buf))
|
||
|
quithere(1, "realloc (%d) OOM", len);
|
||
|
}
|
||
|
|
||
|
memcpy(*buf + off, tmp, ret);
|
||
|
off += ret;
|
||
|
}
|
||
|
|
||
|
if (close(fd)) {
|
||
|
LOGERR("%s() btc socket close error %d:%s",
|
||
|
__func__, errno, strerror(errno));
|
||
|
}
|
||
|
|
||
|
return off;
|
||
|
}
|
||
|
|
||
|
#define btc_io(_cmd, _json) _btc_io(_cmd, _json, WHERE_FFL_HERE)
|
||
|
|
||
|
static char *_btc_io(__maybe_unused const char *cmd, char *json, WHERE_FFL_ARGS)
|
||
|
{
|
||
|
char *ip, *port;
|
||
|
char *data, *ans, *res, *ptr;
|
||
|
int fd, ret, red;
|
||
|
size_t len;
|
||
|
|
||
|
data = btc_data(json, &len);
|
||
|
if (!extract_sockaddr(btc_server, &ip, &port)) {
|
||
|
LOGERR("%s() invalid btc server '%s'",
|
||
|
__func__, btc_server);
|
||
|
return NULL;
|
||
|
}
|
||
|
fd = connect_socket(ip, port);
|
||
|
if (fd < 0) {
|
||
|
LOGERR("%s() failed to connect to btc server %s",
|
||
|
__func__, btc_server);
|
||
|
return NULL;
|
||
|
}
|
||
|
ret = write_socket(fd, data, len);
|
||
|
if (ret != (int)len) {
|
||
|
LOGERR("%s() failed to write to btc server %s",
|
||
|
__func__, btc_server);
|
||
|
return NULL;
|
||
|
}
|
||
|
red = read_socket(fd, &ans, btc_timeout);
|
||
|
ans[red] = '\0';
|
||
|
if (strncasecmp(ans, "HTTP/1.1 200 OK", 15)) {
|
||
|
char *text = safe_text(ans);
|
||
|
LOGERR("%s() btc server response not ok: %s",
|
||
|
__func__, text);
|
||
|
free(text);
|
||
|
free(ans);
|
||
|
res = strdup(EMPTY);
|
||
|
} else {
|
||
|
ptr = strstr(ans, "\n{");
|
||
|
if (ptr)
|
||
|
res = strdup(ptr+1);
|
||
|
else
|
||
|
res = strdup(EMPTY);
|
||
|
free(ans);
|
||
|
}
|
||
|
return res;
|
||
|
}
|
||
|
|
||
|
static char *single_decode_str(char *ans, const char *cmd, const char *key)
|
||
|
{
|
||
|
json_t *json_data, *json_ob;
|
||
|
json_error_t err_val;
|
||
|
const char *json_str;
|
||
|
|
||
|
if (ans) {
|
||
|
json_data = json_loads(ans, JSON_DISABLE_EOF_CHECK, &err_val);
|
||
|
if (!json_data) {
|
||
|
char *text = safe_text(ans);
|
||
|
LOGERR("%s() Json %s decode error "
|
||
|
"json_err=(%d:%d:%d)%s:%s ans='%s'",
|
||
|
__func__, cmd,
|
||
|
err_val.line, err_val.column,
|
||
|
err_val.position, err_val.source,
|
||
|
err_val.text, text);
|
||
|
free(text);
|
||
|
} else {
|
||
|
json_ob = json_object_get(json_data, key);
|
||
|
if (!json_ob) {
|
||
|
char *text = safe_text(ans);
|
||
|
LOGERR("%s() Json %s reply missing key %s "
|
||
|
"ans='%s'",
|
||
|
__func__, cmd, key, text);
|
||
|
free(text);
|
||
|
} else {
|
||
|
if (!json_is_string(json_ob)) {
|
||
|
char *text = safe_text(ans);
|
||
|
LOGERR("%s() Json %s key %s "
|
||
|
"not a string ans='%s'",
|
||
|
__func__, cmd, key, text);
|
||
|
free(text);
|
||
|
} else {
|
||
|
json_str = json_string_value(json_ob);
|
||
|
if (json_str)
|
||
|
return strdup(json_str);
|
||
|
else
|
||
|
return strdup(EMPTY);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
static int64_t single_decode_int(char *ans, const char *cmd, const char *key)
|
||
|
{
|
||
|
json_t *json_data, *json_ob;
|
||
|
json_error_t err_val;
|
||
|
|
||
|
if (ans) {
|
||
|
json_data = json_loads(ans, JSON_DISABLE_EOF_CHECK, &err_val);
|
||
|
if (!json_data) {
|
||
|
char *text = safe_text(ans);
|
||
|
LOGERR("%s() Json %s decode error "
|
||
|
"json_err=(%d:%d:%d)%s:%s ans='%s'",
|
||
|
__func__, cmd,
|
||
|
err_val.line, err_val.column,
|
||
|
err_val.position, err_val.source,
|
||
|
err_val.text, text);
|
||
|
free(text);
|
||
|
} else {
|
||
|
json_ob = json_object_get(json_data, key);
|
||
|
if (!json_ob) {
|
||
|
char *text = safe_text(ans);
|
||
|
LOGERR("%s() Json %s reply missing key %s "
|
||
|
"ans='%s'",
|
||
|
__func__, cmd, key, text);
|
||
|
free(text);
|
||
|
} else
|
||
|
return (int64_t)json_integer_value(json_ob);
|
||
|
}
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static char *btc_blockhash(int32_t height)
|
||
|
{
|
||
|
char buf[1024];
|
||
|
char *ans;
|
||
|
char *hash;
|
||
|
|
||
|
snprintf(buf, sizeof(buf), GETBLOCKHASH, height);
|
||
|
ans = btc_io(GETBLOCKHASHCMD, buf);
|
||
|
hash = single_decode_str(ans, GETBLOCKHASHCMD, GETBLOCKHASHKEY);
|
||
|
free(ans);
|
||
|
return hash;
|
||
|
}
|
||
|
|
||
|
static __maybe_unused int32_t btc_confirms(int32_t height)
|
||
|
{
|
||
|
char buf[1024];
|
||
|
char *ans;
|
||
|
int32_t conf;
|
||
|
|
||
|
snprintf(buf, sizeof(buf), GETBLOCKHASH, height);
|
||
|
ans = btc_io(GETBLOCKHASHCMD, buf);
|
||
|
conf = (int32_t)single_decode_int(ans, GETBLOCKCMD, GETBLOCKCONFKEY);
|
||
|
free(ans);
|
||
|
return conf;
|
||
|
}
|
||
|
|
||
|
// Check for orphan or update confirm count
|
||
|
void btc_blockstatus(BLOCKS *blocks)
|
||
|
{
|
||
|
char hash[TXT_BIG+1];
|
||
|
char *blockhash;
|
||
|
size_t len;
|
||
|
tv_t now;
|
||
|
bool ok;
|
||
|
|
||
|
setnow(&now);
|
||
|
|
||
|
LOGDEBUG("%s() checking %d %s",
|
||
|
__func__,
|
||
|
blocks->height, blocks->blockhash);
|
||
|
|
||
|
// Caller must check this to avoid resending it every time
|
||
|
if (blocks->ignore) {
|
||
|
LOGERR("%s() ignored block %d passed",
|
||
|
__func__, blocks->height);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
len = strlen(blocks->blockhash);
|
||
|
if (len != SHA256SIZHEX) {
|
||
|
LOGERR("%s() invalid blockhash size %d (%d) for block %d",
|
||
|
__func__, len, SHA256SIZHEX, blocks->height);
|
||
|
|
||
|
/* So we don't keep repeating the message
|
||
|
* This should never happen */
|
||
|
blocks->ignore = true;
|
||
|
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
dbhash2btchash(blocks->blockhash, hash, sizeof(hash));
|
||
|
|
||
|
blockhash = btc_blockhash(blocks->height);
|
||
|
// Something's amiss - let it try again later
|
||
|
if (!blockhash)
|
||
|
return;
|
||
|
|
||
|
if (strcmp(blockhash, hash) != 0) {
|
||
|
char height_tmp[32];
|
||
|
|
||
|
snprintf(height_tmp, sizeof(height_tmp), "%d", blocks->height);
|
||
|
LOGERR("%s() flagging block %d(%s) as %s pool=%s btc=%s",
|
||
|
__func__,
|
||
|
blocks->height, height_tmp,
|
||
|
blocks_confirmed(BLOCKS_ORPHAN_STR),
|
||
|
hash, blockhash);
|
||
|
|
||
|
ok = blocks_add(NULL, height_tmp,
|
||
|
blocks->blockhash,
|
||
|
BLOCKS_ORPHAN_STR,
|
||
|
EMPTY, EMPTY, EMPTY, EMPTY,
|
||
|
EMPTY, EMPTY, EMPTY, EMPTY,
|
||
|
by_default, (char *)__func__, inet_default,
|
||
|
&now, false, id_default, NULL);
|
||
|
|
||
|
if (!ok)
|
||
|
blocks->ignore = true;
|
||
|
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
// confirms = btc_confirms(hash);
|
||
|
}
|