SleekXMPP/sleekxmpp/__init__.py

346 lines
14 KiB
Python
Raw Normal View History

2009-06-03 22:56:51 +00:00
#!/usr/bin/python2.5
"""
2010-05-12 20:51:14 +00:00
SleekXMPP: The Sleek XMPP Library
Copyright (C) 2010 Nathanael C. Fritz
This file is part of SleekXMPP.
2009-06-03 22:56:51 +00:00
2010-05-12 20:51:14 +00:00
See the file license.txt for copying permission.
2009-06-03 22:56:51 +00:00
"""
from __future__ import absolute_import, unicode_literals
2009-06-03 22:56:51 +00:00
from . basexmpp import basexmpp
from xml.etree import cElementTree as ET
from . xmlstream.xmlstream import XMLStream
from . xmlstream.xmlstream import RestartStream
from . xmlstream.matcher.xmlmask import MatchXMLMask
from . xmlstream.matcher.xpath import MatchXPath
from . xmlstream.matcher.many import MatchMany
from . xmlstream.handler.callback import Callback
from . xmlstream.stanzabase import StanzaBase
from . xmlstream import xmlstream as xmlstreammod
2009-12-10 07:33:59 +00:00
from . stanza.message import Message
from . stanza.iq import Iq
2009-06-03 22:56:51 +00:00
import time
import logging
import base64
import sys
import random
import copy
from . import plugins
2010-06-18 13:51:29 +00:00
from xml.etree.cElementTree import tostring
from xml.etree.cElementTree import Element
from cStringIO import StringIO
#from . import stanza
2009-06-03 22:56:51 +00:00
srvsupport = True
try:
import dns.resolver
import dns.rdatatype
2009-06-03 22:56:51 +00:00
except ImportError:
srvsupport = False
#class PresenceStanzaType(object):
#
# def fromXML(self, xml):
# self.ptype = xml.get('type')
class ClientXMPP(basexmpp, XMLStream):
"""SleekXMPP's client class. Use only for good, not evil."""
def __init__(self, jid, password, ssl=False, plugin_config = {}, plugin_whitelist=[], escape_quotes=True):
global srvsupport
XMLStream.__init__(self)
self.default_ns = 'jabber:client'
basexmpp.__init__(self)
self.plugin_config = plugin_config
self.escape_quotes = escape_quotes
self.set_jid(jid)
2010-05-12 20:51:14 +00:00
self.server = None
self.port = 5222 # not used if DNS SRV is used
2009-06-03 22:56:51 +00:00
self.plugin_whitelist = plugin_whitelist
self.auto_reconnect = True
self.srvsupport = srvsupport
self.password = password
self.registered_features = []
2010-05-12 20:51:14 +00:00
self.stream_header = """<stream:stream to='%s' xmlns:stream='http://etherx.jabber.org/streams' xmlns='%s' version='1.0'>""" % (self.domain,self.default_ns)
2009-06-03 22:56:51 +00:00
self.stream_footer = "</stream:stream>"
#self.map_namespace('http://etherx.jabber.org/streams', 'stream')
#self.map_namespace('jabber:client', '')
self.features = []
#TODO: Use stream state here
2009-06-03 22:56:51 +00:00
self.authenticated = False
self.sessionstarted = False
self.bound = False
2010-06-02 04:44:54 +00:00
self.bindfail = False
2010-06-18 13:51:29 +00:00
self.digest_auth_started = False
XMLStream.registerHandler(self, Callback('Stream Features', MatchXPath('{http://etherx.jabber.org/streams}features'), self._handleStreamFeatures, thread=True))
XMLStream.registerHandler(self, Callback('Roster Update', MatchXPath('{%s}iq/{jabber:iq:roster}query' % self.default_ns), self._handleRoster, thread=True))
#SASL Auth handlers
basexmpp.add_handler(self, "<challenge xmlns='urn:ietf:params:xml:ns:xmpp-sasl' />", self.handler_sasl_digest_md5_auth, instream=True)
basexmpp.add_handler(self, "<response xmlns='urn:ietf:params:xml:ns:xmpp-sasl'/>", self.handler_sasl_digest_md5_auth_fail, instream=True)
basexmpp.add_handler(self, "<success xmlns='urn:ietf:params:xml:ns:xmpp-sasl' />", self.handler_auth_success, instream=True)
basexmpp.add_handler(self, "<failure xmlns='urn:ietf:params:xml:ns:xmpp-sasl' />", self.handler_auth_fail, instream=True)
2010-03-26 21:02:10 +00:00
#self.registerHandler(Callback('Roster Update', MatchXMLMask("<presence xmlns='%s' type='subscribe' />" % self.default_ns), self._handlePresenceSubscribe, thread=True))
2009-06-03 22:56:51 +00:00
self.registerFeature("<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls' />", self.handler_starttls, True)
self.registerFeature("<mechanisms xmlns='urn:ietf:params:xml:ns:xmpp-sasl' />", self.handler_sasl_auth, True)
self.registerFeature("<bind xmlns='urn:ietf:params:xml:ns:xmpp-bind' />", self.handler_bind_resource)
2009-06-24 06:09:20 +00:00
self.registerFeature("<session xmlns='urn:ietf:params:xml:ns:xmpp-session' />", self.handler_start_session)
2009-06-03 22:56:51 +00:00
#self.registerStanzaExtension('PresenceStanza', PresenceStanzaType)
#self.register_plugins()
def __getitem__(self, key):
if key in self.plugin:
2009-06-03 22:56:51 +00:00
return self.plugin[key]
else:
logging.warning("""Plugin "%s" is not loaded.""" % key)
return False
def get(self, key, default):
return self.plugin.get(key, default)
2010-05-12 20:51:14 +00:00
def connect(self, host=None, port=None):
2009-06-03 22:56:51 +00:00
"""Connect to the Jabber Server. Attempts SRV lookup, and if it fails, uses
the JID server."""
2010-05-12 20:51:14 +00:00
2010-06-02 02:51:49 +00:00
if self.state['connected']: return True
2010-05-12 20:51:14 +00:00
if host:
self.server = host
if port is None: port = self.port
else:
2009-06-03 22:56:51 +00:00
if not self.srvsupport:
2010-05-12 20:51:14 +00:00
logging.debug("Did not supply (address, port) to connect to and no SRV support is installed (http://www.dnspython.org). Continuing to attempt connection, using domain from JID.")
2009-06-03 22:56:51 +00:00
else:
logging.debug("Since no address is supplied, attempting SRV lookup.")
try:
2010-05-26 18:37:01 +00:00
answers = dns.resolver.query("_xmpp-client._tcp.%s" % self.server, dns.rdatatype.SRV)
2009-06-03 22:56:51 +00:00
except dns.resolver.NXDOMAIN:
logging.debug("No appropriate SRV record found. Using JID server name.")
else:
# pick a random answer, weighted by priority
# there are less verbose ways of doing this (random.choice() with answer * priority), but I chose this way anyway
# suggestions are welcome
addresses = {}
intmax = 0
priorities = []
for answer in answers:
intmax += answer.priority
addresses[intmax] = (answer.target.to_text()[:-1], answer.port)
priorities.append(intmax) # sure, I could just do priorities = addresses.keys()\n priorities.sort()
picked = random.randint(0, intmax)
for priority in priorities:
if picked <= priority:
2010-05-12 20:51:14 +00:00
(host,port) = addresses[priority]
2009-06-03 22:56:51 +00:00
break
2010-05-12 20:51:14 +00:00
# if SRV lookup was successful, we aren't using a particular server.
self.server = None
if not host:
2009-06-03 22:56:51 +00:00
# if all else fails take server from JID.
2010-05-12 20:51:14 +00:00
(host,port) = (self.domain, self.port)
self.server = None
logging.debug('Attempting connection to %s:%d', host, port )
#TODO option to not use TLS?
result = XMLStream.connect(self, host, port, use_tls=True)
2009-06-03 22:56:51 +00:00
if result:
self.event("connected")
else:
logging.warning("Failed to connect")
2009-06-03 22:56:51 +00:00
self.event("disconnected")
return result
# overriding reconnect and disconnect so that we can get some events
# should events be part of or required by xmlstream? Maybe that would be cleaner
def reconnect(self):
self.disconnect(reconnect=True)
2009-06-03 22:56:51 +00:00
def disconnect(self, reconnect=False, error=False):
2009-06-03 22:56:51 +00:00
self.event("disconnected")
Fixes for disconnection problems detailed in http://github.com/fritzy/SleekXMPP/issues/#issue/20 Fixes to both ClientXMPP & xmlstream. ClientXMPP was not tracking the changes to authenticated and sessionstarted after the client was disconnected. xmlstream had some funkyness with state in the _process method that was cleaned up and hopefully made a little cleaner. Also changed a DNS issue that was occuring that rendered me unable to disconnect. I would recieve the following error upon reconnect. Exception in thread process: Exception in thread process: Traceback (most recent call last): File "/usr/local/lib/python2.6/threading.py", line 532, in __bootstrap_inner self.run() File "/usr/local/lib/python2.6/threading.py", line 484, in run self.__target(*self.__args, **self.__kwargs) File "/home/macdiesel/tmp/workspace/SleekXMPP/sleekxmpp/xmlstream/xmlstream.py", line 202, in _process self.reconnect() File "/home/macdiesel/tmp/workspace/SleekXMPP/sleekxmpp/__init__.py", line 134, in reconnect XMLStream.reconnect(self) File "/home/macdiesel/tmp/workspace/SleekXMPP/sleekxmpp/xmlstream/xmlstream.py", line 289, in reconnect self.connect() File "/home/macdiesel/tmp/workspace/SleekXMPP/sleekxmpp/__init__.py", line 99, in connect answers = dns.resolver.query("_xmpp-client._tcp.%s" % self.server, "SRV") File "/usr/local/lib/python2.6/site-packages/dns/resolver.py", line 732, in query return get_default_resolver().query(qname, rdtype, rdclass, tcp, source) File "/usr/local/lib/python2.6/site-packages/dns/resolver.py", line 617, in query source=source) File "/usr/local/lib/python2.6/site-packages/dns/query.py", line 113, in udp wire = q.to_wire() File "/usr/local/lib/python2.6/site-packages/dns/message.py", line 404, in to_wire r.add_question(rrset.name, rrset.rdtype, rrset.rdclass) File "/usr/local/lib/python2.6/site-packages/dns/renderer.py", line 152, in add_question self.output.write(struct.pack("!HH", rdtype, rdclass)) TypeError: unsupported operand type(s) for &: 'unicode' and 'long' Seems I was getting this error when calling line 99 in ClientXMPP. You can't bit-shift a 1 and a string and this is why this error is coming up. I removed the "SRV" argument and used the default of 1. not sure exactly what this should be so it may need to be fixed back before it's merged back to trunk. The line in question: answers = dns.resolver.query("_xmpp-client._tcp.%s" % self.server, "SRV")
2010-05-04 18:03:38 +00:00
self.authenticated = False
self.sessionstarted = False
XMLStream.disconnect(self, reconnect, error)
def sendRaw(self, data, priority=5, init=False):
if not init and not self.sessionstarted:
logging.warn("Attempt to send stanza before session has started:\n%s", data)
return False
XMLStream.sendRaw(self, data, priority, init)
2009-06-03 22:56:51 +00:00
def registerFeature(self, mask, pointer, breaker = False):
"""Register a stream feature."""
self.registered_features.append((MatchXMLMask(mask), pointer, breaker))
def updateRoster(self, jid, name=None, subscription=None, groups=[]):
"""Add or change a roster item."""
iq = self.Iq().setValues({'type': 'set'})
iq['roster'] = {jid: {'name': name, 'subscription': subscription, 'groups': groups}}
#self.send(iq, self.Iq().setValues({'id': iq['id']}))
r = iq.send()
return r['type'] == 'result'
2009-06-03 22:56:51 +00:00
def getRoster(self):
"""Request the roster be sent."""
2010-03-26 20:55:03 +00:00
iq = self.Iq().setValues({'type': 'get'}).enable('roster').send()
self._handleRoster(iq, request=True)
2009-06-03 22:56:51 +00:00
def _handleStreamFeatures(self, features):
2010-06-02 02:51:49 +00:00
logging.debug('handling stream features')
2009-09-25 17:35:10 +00:00
self.features = []
2009-06-24 06:09:20 +00:00
for sub in features.xml:
self.features.append(sub.tag)
2009-06-03 22:56:51 +00:00
for subelement in features.xml:
for feature in self.registered_features:
if feature[0].match(subelement):
#if self.maskcmp(subelement, feature[0], True):
2010-06-02 02:51:49 +00:00
# This calls the feature handler & optionally breaks
2009-06-03 22:56:51 +00:00
if feature[1](subelement) and feature[2]: #if breaker, don't continue
return True
def handler_starttls(self, xml):
2010-06-02 02:51:49 +00:00
logging.debug( 'TLS start handler; SSL support: %s', self.ssl_support )
2009-09-25 17:35:10 +00:00
if not self.authenticated and self.ssl_support:
2010-06-02 02:51:49 +00:00
_stanza = "<proceed xmlns='urn:ietf:params:xml:ns:xmpp-tls' />"
if not self.event_handlers.get(_stanza,None): # don't add handler > once
self.add_handler( _stanza, self.handler_tls_start, instream=True )
self.sendRaw(self.tostring(xml), priority=1, init=True)
2009-06-03 22:56:51 +00:00
return True
else:
logging.warning("The module tlslite is required in to some servers, and has not been found.")
return False
def handler_tls_start(self, xml):
logging.debug("Starting TLS")
if self.startTLS():
raise RestartStream()
def handler_sasl_auth(self, xml):
2009-09-25 17:35:10 +00:00
if '{urn:ietf:params:xml:ns:xmpp-tls}starttls' in self.features:
return False
2009-06-03 22:56:51 +00:00
logging.debug("Starting SASL Auth")
sasl_mechs = xml.findall('{urn:ietf:params:xml:ns:xmpp-sasl}mechanism')
if len(sasl_mechs):
for sasl_mech in sasl_mechs:
self.features.append("sasl:%s" % sasl_mech.text)
2010-06-18 13:51:29 +00:00
if 'sasl:DIGEST-MD5' in self.features:
self.sendRaw("<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='DIGEST-MD5'/>", priority=1, init=True)
2010-06-18 13:51:29 +00:00
elif 'sasl:PLAIN' in self.features:
2010-01-08 06:03:02 +00:00
if sys.version_info < (3,0):
self.sendRaw("<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN'>%s</auth>" \
% base64.b64encode(b'\x00' + bytes(self.username) + b'\x00' + bytes(self.password)).decode('utf-8'),
priority=1, init=True)
2010-01-08 06:03:02 +00:00
else:
self.sendRaw("<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN'>%s</auth>" \
% base64.b64encode(b'\x00' + bytes(self.username, 'utf-8') + b'\x00' + bytes(self.password, 'utf-8')).decode('utf-8'),
priority=1, init=True)
2009-06-03 22:56:51 +00:00
else:
logging.error("No appropriate login method.")
self.disconnect()
#if 'sasl:DIGEST-MD5' in self.features:
# self._auth_digestmd5()
return True
2010-06-18 13:51:29 +00:00
def handler_sasl_digest_md5_auth(self, xml):
if self.digest_auth_started == False:
challenge = [item.split('=', 1) for item in base64.b64decode(xml.text).replace("\"", "").split(',', 6) ]
challenge = dict(challenge)
2010-07-07 19:19:31 +00:00
logging.debug("MD5 auth challenge: %s", challenge)
2010-06-18 13:51:29 +00:00
#Realm, nonce, qop should all be present
if not challenge['realm'] or not challenge['qop'] or not challenge['nonce']:
logging.error("Error during digest-md5 authentication. Challenge missing critical information. Challenge: %s" %base64.b64decode(xml.text))
self.disconnect()
self.event("failed_auth")
return
#TODO: charset can be either UTF-8 or if not present use ISO 8859-1 defaulting for UTF-8 for now
#Compute the cnonce - a unique hex string only used in this request
2010-06-21 13:23:56 +00:00
cnonce = ""
for i in range(7):
cnonce+=hex(int(random.random()*65536*4096))[2:]
2010-06-18 13:51:29 +00:00
cnonce = base64.encodestring(cnonce)[0:-1]
a1 = b"%s:%s:%s" %(md5("%s:%s:%s" % (self.username, self.domain, self.password)), challenge["nonce"].encode("UTF-8"), cnonce.encode("UTF-8") )
a2 = "AUTHENTICATE:xmpp/%s" %self.domain
responseHash = md5digest("%s:%s:00000001:%s:auth:%s" %(md5digest(a1), challenge["nonce"], cnonce, md5digest(a2) ) )
response = 'charset=utf-8,username="%s",realm="%s",nonce="%s",nc=00000001,cnonce="%s",digest-uri="%s",response=%s,qop=%s,' \
% (self.username, self.domain, challenge["nonce"], cnonce, "xmpp/%s" % self.domain, responseHash, challenge["qop"])
self.sendRaw("<response xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>%s</response>" % base64.encodestring(response)[:-1],
priority=1, init=True )
2010-06-18 13:51:29 +00:00
else:
2010-06-30 18:48:45 +00:00
logging.warn("handler_sasl_digest_md5_auth called while digest_auth_started is True (has already begun)")
2010-06-18 13:51:29 +00:00
def handler_sasl_digest_md5_auth_fail(self, xml):
self.digest_auth_started = False
self.handler_auth_fail(xml)
2009-06-03 22:56:51 +00:00
def handler_auth_success(self, xml):
2010-06-02 02:51:49 +00:00
logging.debug("Authentication successful.")
2009-06-03 22:56:51 +00:00
self.authenticated = True
self.features = []
raise RestartStream()
def handler_auth_fail(self, xml):
2010-06-02 02:51:49 +00:00
logging.warning("Authentication failed.")
2010-06-18 13:51:29 +00:00
logging.debug(tostring(xml, 'utf-8'))
2009-06-03 22:56:51 +00:00
self.disconnect()
self.event("failed_auth")
def handler_bind_resource(self, xml):
logging.debug("Requesting resource: %s" % self.resource)
iq = self.Iq(stype='set')
2009-06-03 22:56:51 +00:00
res = ET.Element('resource')
res.text = self.resource
xml.append(res)
iq.append(xml)
response = iq.send(priority=2,init=True)
#response = self.send(iq, self.Iq(sid=iq['id']))
self.set_jid(response.xml.find('{urn:ietf:params:xml:ns:xmpp-bind}bind/{urn:ietf:params:xml:ns:xmpp-bind}jid').text)
self.bound = True
2009-06-03 22:56:51 +00:00
logging.info("Node set to: %s" % self.fulljid)
2010-06-02 04:44:54 +00:00
if "{urn:ietf:params:xml:ns:xmpp-session}session" not in self.features or self.bindfail:
2009-06-24 06:09:20 +00:00
logging.debug("Established Session")
self.sessionstarted = True
self.event("session_start")
2009-06-03 22:56:51 +00:00
def handler_start_session(self, xml):
if self.authenticated and self.bound:
iq = self.makeIqSet(xml)
response = iq.send(priority=2,init=True)
2009-06-03 22:56:51 +00:00
logging.debug("Established Session")
self.sessionstarted = True
self.event("session_start")
2010-06-02 04:44:54 +00:00
else:
logging.warn("Bind has failed; not starting session!")
2010-06-02 04:44:54 +00:00
self.bindfail = True
2009-06-03 22:56:51 +00:00
2010-03-26 20:55:03 +00:00
def _handleRoster(self, iq, request=False):
if iq['type'] == 'set' or (iq['type'] == 'result' and request):
for jid in iq['roster']['items']:
if not jid in self.roster:
self.roster[jid] = {'groups': [], 'name': '', 'subscription': 'none', 'presence': {}, 'in_roster': True}
self.roster[jid].update(iq['roster']['items'][jid])
if iq['type'] == 'set':
self.send(self.Iq().setValues({'type': 'result', 'id': iq['id']}).enable('roster'))
self.event("roster_update", iq)
2010-06-18 13:51:29 +00:00
def md5(data):
2010-06-18 13:51:29 +00:00
try:
import hashlib
md5 = hashlib.md5(data)
2010-06-18 13:51:29 +00:00
except ImportError:
import md5
md5 = md5.new(data)
2010-06-18 13:51:29 +00:00
return md5.digest()
def md5digest(data):
try:
import hashlib
md5 = hashlib.md5(data)
except ImportError:
import md5
md5 = md5.new(data)
return md5.hexdigest()