-WIP-electrum-btcp/lib/paymentrequest.py

525 lines
17 KiB
Python
Raw Normal View History

#!/usr/bin/env python
#
# Electrum - lightweight Bitcoin client
# Copyright (C) 2014 Thomas Voegtlin
#
2016-02-23 02:36:42 -08:00
# Permission is hereby granted, free of charge, to any person
# obtaining a copy of this software and associated documentation files
# (the "Software"), to deal in the Software without restriction,
# including without limitation the rights to use, copy, modify, merge,
# publish, distribute, sublicense, and/or sell copies of the Software,
# and to permit persons to whom the Software is furnished to do so,
# subject to the following conditions:
#
2016-02-23 02:36:42 -08:00
# The above copyright notice and this permission notice shall be
# included in all copies or substantial portions of the Software.
#
2016-02-23 02:36:42 -08:00
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
2014-05-05 08:31:39 -07:00
import hashlib
import sys
import time
import traceback
import json
import requests
2014-05-05 08:31:39 -07:00
2017-09-04 05:43:31 -07:00
import urllib.parse
2017-01-22 10:25:24 -08:00
2014-05-05 08:31:39 -07:00
try:
2017-02-25 04:36:24 -08:00
from . import paymentrequest_pb2 as pb2
2015-01-27 01:01:40 -08:00
except ImportError:
2014-06-07 10:53:54 -07:00
sys.exit("Error: could not find paymentrequest_pb2.py. Create it with 'protoc --proto_path=lib/ --python_out=lib/ lib/paymentrequest.proto'")
2014-05-05 08:31:39 -07:00
2017-01-22 10:25:24 -08:00
from . import bitcoin
from . import util
2017-01-30 01:36:56 -08:00
from .util import print_error, bh2u, bfh
from .util import export_meta, import_meta
2017-01-22 10:25:24 -08:00
from . import transaction
from . import x509
from . import rsakey
2017-01-22 10:25:24 -08:00
from .bitcoin import TYPE_ADDRESS
2014-05-05 08:31:39 -07:00
REQUEST_HEADERS = {'Accept': 'application/bitcoin-paymentrequest', 'User-Agent': 'Electrum'}
ACK_HEADERS = {'Content-Type':'application/bitcoin-payment','Accept':'application/bitcoin-paymentack','User-Agent':'Electrum'}
ca_path = requests.certs.where()
2017-02-22 23:55:47 -08:00
ca_list = None
ca_keyID = None
def load_ca_list():
global ca_list, ca_keyID
if ca_list is None:
ca_list, ca_keyID = x509.load_certificates(ca_path)
2014-05-05 08:31:39 -07:00
# status of payment requests
PR_UNPAID = 0
PR_EXPIRED = 1
2015-06-02 02:36:06 -07:00
PR_UNKNOWN = 2 # sent but not propagated
PR_PAID = 3 # send and propagated
2014-05-05 08:31:39 -07:00
2014-06-07 10:53:54 -07:00
def get_payment_request(url):
2017-09-04 05:43:31 -07:00
u = urllib.parse.urlparse(url)
2017-01-16 01:18:00 -08:00
error = None
if u.scheme in ['http', 'https']:
try:
response = requests.request('GET', url, headers=REQUEST_HEADERS)
response.raise_for_status()
# Guard against `bitcoin:`-URIs with invalid payment request URLs
if "Content-Type" not in response.headers \
or response.headers["Content-Type"] != "application/bitcoin-paymentrequest":
data = None
error = "payment URL not pointing to a payment request handling server"
else:
data = response.content
print_error('fetched payment request', url, len(response.content))
except requests.exceptions.RequestException:
data = None
error = "payment URL not pointing to a valid server"
elif u.scheme == 'file':
try:
with open(u.path, 'r') as f:
data = f.read()
except IOError:
data = None
error = "payment URL not pointing to a valid file"
else:
raise BaseException("unknown scheme", url)
pr = PaymentRequest(data, error)
return pr
2014-06-07 10:53:54 -07:00
class PaymentRequest:
2014-06-07 10:53:54 -07:00
def __init__(self, data, error=None):
self.raw = data
self.error = error
self.parse(data)
self.requestor = None # known after verify
self.tx = None
2014-06-07 10:53:54 -07:00
def __str__(self):
return self.raw
2014-06-07 10:53:54 -07:00
def parse(self, r):
if self.error:
return
2017-01-30 01:36:56 -08:00
self.id = bh2u(bitcoin.sha256(r)[0:16])
2014-06-06 07:16:14 -07:00
try:
2015-04-05 09:57:00 -07:00
self.data = pb2.PaymentRequest()
2014-06-06 07:16:14 -07:00
self.data.ParseFromString(r)
2014-05-07 09:20:17 -07:00
except:
self.error = "cannot parse payment request"
return
self.details = pb2.PaymentDetails()
self.details.ParseFromString(self.data.serialized_payment_details)
self.outputs = []
for o in self.details.outputs:
addr = transaction.get_address_from_output_script(o.script)[1]
self.outputs.append((TYPE_ADDRESS, addr, o.amount))
self.memo = self.details.memo
self.payment_url = self.details.payment_url
2014-05-05 08:31:39 -07:00
def is_pr(self):
2016-02-19 04:53:01 -08:00
return self.get_amount() != 0
#return self.get_outputs() != [(TYPE_ADDRESS, self.get_requestor(), self.get_amount())]
def verify(self, contacts):
if self.error:
return False
if not self.raw:
self.error = "Empty request"
return False
pr = pb2.PaymentRequest()
try:
pr.ParseFromString(self.raw)
except:
self.error = "Error: Cannot parse payment request"
return False
if not pr.signature:
2016-02-12 03:01:13 -08:00
# the address will be dispayed as requestor
self.requestor = None
return True
if pr.pki_type in ["x509+sha256", "x509+sha1"]:
return self.verify_x509(pr)
elif pr.pki_type in ["dnssec+btc", "dnssec+ecdsa"]:
return self.verify_dnssec(pr, contacts)
else:
self.error = "ERROR: Unsupported PKI Type for Message Signature"
return False
def verify_x509(self, paymntreq):
2017-02-22 23:55:47 -08:00
load_ca_list()
if not ca_list:
self.error = "Trusted certificate authorities list not found"
return False
2015-04-05 09:57:00 -07:00
cert = pb2.X509Certificates()
2014-05-05 08:31:39 -07:00
cert.ParseFromString(paymntreq.pki_data)
2015-08-05 11:49:45 -07:00
# verify the chain of certificates
try:
x, ca = verify_cert_chain(cert.certificate)
except BaseException as e:
2015-09-09 09:15:38 -07:00
traceback.print_exc(file=sys.stderr)
2015-08-05 11:49:45 -07:00
self.error = str(e)
2014-05-05 08:31:39 -07:00
return False
2015-08-05 11:49:45 -07:00
# get requestor name
self.requestor = x.get_common_name()
if self.requestor.startswith('*.'):
self.requestor = self.requestor[2:]
# verify the BIP70 signature
pubkey0 = rsakey.RSAKey(x.modulus, x.exponent)
sig = paymntreq.signature
2017-02-18 11:22:46 -08:00
paymntreq.signature = b''
2014-05-05 08:31:39 -07:00
s = paymntreq.SerializeToString()
sigBytes = bytearray(sig)
msgBytes = bytearray(s)
2014-05-05 08:31:39 -07:00
if paymntreq.pki_type == "x509+sha256":
hashBytes = bytearray(hashlib.sha256(msgBytes).digest())
verify = pubkey0.verify(sigBytes, x509.PREFIX_RSA_SHA256 + hashBytes)
2014-05-05 08:31:39 -07:00
elif paymntreq.pki_type == "x509+sha1":
verify = pubkey0.hashAndVerify(sigBytes, msgBytes)
if not verify:
self.error = "ERROR: Invalid Signature for Payment Request Data"
2014-05-05 08:31:39 -07:00
return False
### SIG Verified
self.error = 'Signed by Trusted CA: ' + ca.get_common_name()
return True
2014-05-05 08:31:39 -07:00
def verify_dnssec(self, pr, contacts):
sig = pr.signature
alias = pr.pki_data
info = contacts.resolve(alias)
if info.get('validated') is not True:
self.error = "Alias verification failed (DNSSEC)"
return False
if pr.pki_type == "dnssec+btc":
self.requestor = alias
address = info.get('address')
pr.signature = ''
message = pr.SerializeToString()
if bitcoin.verify_message(address, sig, message):
self.error = 'Verified with DNSSEC'
return True
else:
self.error = "verify failed"
return False
else:
self.error = "unknown algo"
return False
2014-06-07 10:53:54 -07:00
def has_expired(self):
return self.details.expires and self.details.expires < int(time.time())
2014-05-05 08:31:39 -07:00
2014-06-13 07:53:43 -07:00
def get_expiration_date(self):
return self.details.expires
2014-06-06 07:16:14 -07:00
def get_amount(self):
return sum(map(lambda x:x[2], self.outputs))
2014-06-06 07:16:14 -07:00
2016-02-09 03:48:25 -08:00
def get_address(self):
o = self.outputs[0]
assert o[0] == TYPE_ADDRESS
return o[1]
def get_requestor(self):
2016-02-09 03:48:25 -08:00
return self.requestor if self.requestor else self.get_address()
def get_verify_status(self):
2016-02-13 02:00:00 -08:00
return self.error if self.requestor else "No Signature"
2014-06-06 07:16:14 -07:00
2014-06-12 01:20:06 -07:00
def get_memo(self):
return self.memo
2016-02-15 04:49:33 -08:00
def get_dict(self):
return {
'requestor': self.get_requestor(),
'memo':self.get_memo(),
'exp': self.get_expiration_date(),
'amount': self.get_amount(),
'signature': self.get_verify_status(),
'txid': self.tx,
'outputs': self.get_outputs()
2016-02-15 04:49:33 -08:00
}
2014-06-06 07:16:14 -07:00
def get_id(self):
2016-02-09 03:48:25 -08:00
return self.id if self.requestor else self.get_address()
2014-05-05 08:31:39 -07:00
2014-06-07 10:53:54 -07:00
def get_outputs(self):
2014-06-12 02:27:18 -07:00
return self.outputs[:]
2014-06-07 10:53:54 -07:00
2014-05-05 08:31:39 -07:00
def send_ack(self, raw_tx, refund_addr):
2014-06-07 10:53:54 -07:00
pay_det = self.details
if not self.details.payment_url:
return False, "no url"
2015-06-23 07:58:21 -07:00
paymnt = pb2.Payment()
2014-05-07 09:59:51 -07:00
paymnt.merchant_data = pay_det.merchant_data
2017-08-13 03:00:33 -07:00
paymnt.transactions.append(bfh(raw_tx))
2014-05-07 09:59:51 -07:00
ref_out = paymnt.refund_to.add()
2017-09-12 06:05:48 -07:00
ref_out.script = util.bfh(transaction.Transaction.pay_script(TYPE_ADDRESS, refund_addr))
2014-05-07 09:59:51 -07:00
paymnt.memo = "Paid using Electrum"
pm = paymnt.SerializeToString()
2017-09-04 05:43:31 -07:00
payurl = urllib.parse.urlparse(pay_det.payment_url)
2014-05-07 09:59:51 -07:00
try:
r = requests.post(payurl.geturl(), data=pm, headers=ACK_HEADERS, verify=ca_path)
except requests.exceptions.SSLError:
2017-01-22 10:25:24 -08:00
print("Payment Message/PaymentACK verify Failed")
2014-05-05 08:31:39 -07:00
try:
2014-05-07 09:59:51 -07:00
r = requests.post(payurl.geturl(), data=pm, headers=ACK_HEADERS, verify=False)
except Exception as e:
2017-01-22 10:25:24 -08:00
print(e)
return False, "Payment Message/PaymentACK Failed"
if r.status_code >= 500:
return False, r.reason
2014-05-07 09:59:51 -07:00
try:
2015-04-05 09:57:00 -07:00
paymntack = pb2.PaymentACK()
2014-05-07 09:59:51 -07:00
paymntack.ParseFromString(r.content)
except Exception:
return False, "PaymentACK could not be processed. Payment was sent; please manually verify that payment was received."
2017-01-22 10:25:24 -08:00
print("PaymentACK message received: %s" % paymntack.memo)
return True, paymntack.memo
2014-05-05 08:31:39 -07:00
2015-07-11 11:26:30 -07:00
def make_unsigned_request(req):
2017-01-22 10:25:24 -08:00
from .transaction import Transaction
2015-07-11 11:26:30 -07:00
addr = req['address']
2015-07-21 07:30:25 -07:00
time = req.get('time', 0)
2015-07-22 06:33:50 -07:00
exp = req.get('exp', 0)
2015-07-22 06:28:43 -07:00
if time and type(time) != int:
time = 0
2015-07-22 06:28:43 -07:00
if exp and type(exp) != int:
exp = 0
2015-07-11 11:26:30 -07:00
amount = req['amount']
2015-07-13 12:37:41 -07:00
if amount is None:
amount = 0
2015-07-11 11:26:30 -07:00
memo = req['memo']
2017-01-30 01:36:56 -08:00
script = bfh(Transaction.pay_script(TYPE_ADDRESS, addr))
2015-07-11 11:26:30 -07:00
outputs = [(script, amount)]
2015-04-05 09:57:00 -07:00
pd = pb2.PaymentDetails()
for script, amount in outputs:
pd.outputs.add(amount=amount, script=script)
pd.time = time
2015-07-22 06:33:50 -07:00
pd.expires = time + exp if exp else 0
2015-04-05 09:57:00 -07:00
pd.memo = memo
pr = pb2.PaymentRequest()
pr.serialized_payment_details = pd.SerializeToString()
pr.signature = util.to_bytes('')
2015-07-11 11:26:30 -07:00
return pr
2015-07-11 11:26:30 -07:00
def sign_request_with_alias(pr, alias, alias_privkey):
pr.pki_type = 'dnssec+btc'
pr.pki_data = str(alias)
message = pr.SerializeToString()
ec_key = bitcoin.regenerate_key(alias_privkey)
address = bitcoin.address_from_private_key(alias_privkey)
compressed = bitcoin.is_compressed(alias_privkey)
pr.signature = ec_key.sign_message(message, compressed, address)
2015-07-11 11:26:30 -07:00
2015-08-05 11:49:45 -07:00
def verify_cert_chain(chain):
""" Verify a chain of certificates. The last certificate is the CA"""
2017-02-22 23:55:47 -08:00
load_ca_list()
2015-08-05 11:49:45 -07:00
# parse the chain
cert_num = len(chain)
x509_chain = []
for i in range(cert_num):
2015-08-07 02:39:30 -07:00
x = x509.X509(bytearray(chain[i]))
2015-08-05 11:49:45 -07:00
x509_chain.append(x)
if i == 0:
x.check_date()
else:
if not x.check_ca():
raise BaseException("ERROR: Supplied CA Certificate Error")
if not cert_num > 1:
raise BaseException("ERROR: CA Certificate Chain Not Provided by Payment Processor")
# if the root CA is not supplied, add it to the chain
ca = x509_chain[cert_num-1]
if ca.getFingerprint() not in ca_list:
keyID = ca.get_issuer_keyID()
f = ca_keyID.get(keyID)
if f:
root = ca_list[f]
x509_chain.append(root)
else:
raise BaseException("Supplied CA Not Found in Trusted CA Store.")
# verify the chain of signatures
cert_num = len(x509_chain)
for i in range(1, cert_num):
x = x509_chain[i]
prev_x = x509_chain[i-1]
algo, sig, data = prev_x.get_signature()
sig = bytearray(sig)
pubkey = rsakey.RSAKey(x.modulus, x.exponent)
if algo == x509.ALGO_RSA_SHA1:
verify = pubkey.hashAndVerify(sig, data)
elif algo == x509.ALGO_RSA_SHA256:
hashBytes = bytearray(hashlib.sha256(data).digest())
verify = pubkey.verify(sig, x509.PREFIX_RSA_SHA256 + hashBytes)
elif algo == x509.ALGO_RSA_SHA384:
hashBytes = bytearray(hashlib.sha384(data).digest())
verify = pubkey.verify(sig, x509.PREFIX_RSA_SHA384 + hashBytes)
elif algo == x509.ALGO_RSA_SHA512:
hashBytes = bytearray(hashlib.sha512(data).digest())
verify = pubkey.verify(sig, x509.PREFIX_RSA_SHA512 + hashBytes)
else:
raise BaseException("Algorithm not supported")
util.print_error(self.error, algo.getComponentByName('algorithm'))
if not verify:
raise BaseException("Certificate not Signed by Provided CA Certificate Chain")
return x509_chain[0], ca
def check_ssl_config(config):
2017-01-22 10:25:24 -08:00
from . import pem
2015-08-05 11:49:45 -07:00
key_path = config.get('ssl_privkey')
cert_path = config.get('ssl_chain')
with open(key_path, 'r') as f:
params = pem.parse_private_key(f.read())
with open(cert_path, 'r') as f:
s = f.read()
2015-08-05 11:59:51 -07:00
bList = pem.dePemList(s, "CERTIFICATE")
2015-08-05 11:49:45 -07:00
# verify chain
x, ca = verify_cert_chain(bList)
2015-08-05 11:59:51 -07:00
# verify that privkey and pubkey match
privkey = rsakey.RSAKey(*params)
pubkey = rsakey.RSAKey(x.modulus, x.exponent)
assert x.modulus == params[0]
assert x.exponent == params[1]
# return requestor
requestor = x.get_common_name()
if requestor.startswith('*.'):
requestor = requestor[2:]
return requestor
2015-08-05 11:49:45 -07:00
2015-07-11 12:09:56 -07:00
def sign_request_with_x509(pr, key_path, cert_path):
2017-01-22 10:25:24 -08:00
from . import pem
2015-07-11 11:26:30 -07:00
with open(key_path, 'r') as f:
params = pem.parse_private_key(f.read())
privkey = rsakey.RSAKey(*params)
2015-07-11 11:26:30 -07:00
with open(cert_path, 'r') as f:
s = f.read()
bList = pem.dePemList(s, "CERTIFICATE")
2015-07-11 11:26:30 -07:00
certificates = pb2.X509Certificates()
certificates.certificate.extend(map(bytes, bList))
2015-07-11 11:26:30 -07:00
pr.pki_type = 'x509+sha256'
pr.pki_data = certificates.SerializeToString()
msgBytes = bytearray(pr.SerializeToString())
hashBytes = bytearray(hashlib.sha256(msgBytes).digest())
sig = privkey.sign(x509.PREFIX_RSA_SHA256 + hashBytes)
2015-07-11 11:26:30 -07:00
pr.signature = bytes(sig)
def serialize_request(req):
pr = make_unsigned_request(req)
signature = req.get('sig')
2015-07-21 03:26:37 -07:00
requestor = req.get('name')
if requestor and signature:
2017-01-30 01:36:56 -08:00
pr.signature = bfh(signature)
2015-07-11 11:26:30 -07:00
pr.pki_type = 'dnssec+btc'
pr.pki_data = str(requestor)
return pr
2015-04-05 09:57:00 -07:00
2015-07-22 00:06:03 -07:00
def make_request(config, req):
2015-07-11 11:26:30 -07:00
pr = make_unsigned_request(req)
2015-06-07 09:44:33 -07:00
key_path = config.get('ssl_privkey')
cert_path = config.get('ssl_chain')
2015-07-11 11:26:30 -07:00
if key_path and cert_path:
sign_request_with_x509(pr, key_path, cert_path)
2015-07-22 00:06:03 -07:00
return pr
2015-07-11 11:26:30 -07:00
2015-06-07 09:44:33 -07:00
class InvoiceStore(object):
def __init__(self, storage):
self.storage = storage
self.invoices = {}
self.paid = {}
d = self.storage.get('invoices', {})
self.load(d)
def set_paid(self, pr, txid):
pr.tx = txid
self.paid[txid] = pr.get_id()
def load(self, d):
for k, v in d.items():
try:
2017-02-18 11:22:46 -08:00
pr = PaymentRequest(bfh(v.get('hex')))
pr.tx = v.get('txid')
pr.requestor = v.get('requestor')
self.invoices[k] = pr
if pr.tx:
self.paid[pr.tx] = k
except:
continue
def import_file(self, path):
2018-02-21 09:55:37 -08:00
def validate(data):
return data # TODO
import_meta(path, validate, self.on_import)
def on_import(self, data):
self.load(data)
self.save()
2018-02-21 09:55:37 -08:00
def export_file(self, filename):
export_meta(self.dump(), filename)
2018-02-21 09:55:37 -08:00
def dump(self):
d = {}
for k, pr in self.invoices.items():
2018-02-21 09:55:37 -08:00
d[k] = {
2017-08-13 03:00:33 -07:00
'hex': bh2u(pr.raw),
2016-02-09 03:48:25 -08:00
'requestor': pr.requestor,
'txid': pr.tx
}
2018-02-21 09:55:37 -08:00
return d
def save(self):
2018-02-21 09:55:37 -08:00
self.storage.put('invoices', self.dump())
2015-04-22 04:36:07 -07:00
def get_status(self, key):
pr = self.get(key)
if pr is None:
print_error("[InvoiceStore] get_status() can't find pr for", key)
return
2015-04-22 04:36:07 -07:00
if pr.tx is not None:
return PR_PAID
if pr.has_expired():
return PR_EXPIRED
return PR_UNPAID
def add(self, pr):
key = pr.get_id()
self.invoices[key] = pr
self.save()
return key
def remove(self, key):
self.invoices.pop(key)
self.save()
def get(self, k):
return self.invoices.get(k)
def sorted_list(self):
# sort
return self.invoices.values()
def unpaid_invoices(self):
return [ self.invoices[k] for k in filter(lambda x: self.get_status(x)!=PR_PAID, self.invoices.keys())]