1911 lines
65 KiB
Python
1911 lines
65 KiB
Python
# -*- coding:utf-8 -*-
|
|
## src/common/connection.py
|
|
##
|
|
## Copyright (C) 2003-2005 Vincent Hanquez <tab AT snarc.org>
|
|
## Copyright (C) 2003-2008 Yann Leboulanger <asterix AT lagaule.org>
|
|
## Copyright (C) 2005 Alex Mauer <hawke AT hawkesnest.net>
|
|
## Stéphan Kochen <stephan AT kochen.nl>
|
|
## Copyright (C) 2005-2006 Dimitur Kirov <dkirov AT gmail.com>
|
|
## Travis Shirk <travis AT pobox.com>
|
|
## Nikos Kouremenos <kourem AT gmail.com>
|
|
## Copyright (C) 2006 Junglecow J <junglecow AT gmail.com>
|
|
## Stefan Bethge <stefan AT lanpartei.de>
|
|
## Copyright (C) 2006-2008 Jean-Marie Traissard <jim AT lapin.org>
|
|
## Copyright (C) 2007 Tomasz Melcer <liori AT exroot.org>
|
|
## Julien Pivotto <roidelapluie AT gmail.com>
|
|
## Copyright (C) 2007-2008 Stephan Erb <steve-e AT h3c.de>
|
|
## Copyright (C) 2008 Brendan Taylor <whateley AT gmail.com>
|
|
## Jonathan Schleifer <js-gajim AT webkeks.org>
|
|
##
|
|
## This file is part of Gajim.
|
|
##
|
|
## Gajim is free software; you can redistribute it and/or modify
|
|
## it under the terms of the GNU General Public License as published
|
|
## by the Free Software Foundation; version 3 only.
|
|
##
|
|
## Gajim is distributed in the hope that it will be useful,
|
|
## but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
## GNU General Public License for more details.
|
|
##
|
|
## You should have received a copy of the GNU General Public License
|
|
## along with Gajim. If not, see <http://www.gnu.org/licenses/>.
|
|
##
|
|
|
|
import os
|
|
import random
|
|
import socket
|
|
import operator
|
|
|
|
import time
|
|
import locale
|
|
|
|
try:
|
|
randomsource = random.SystemRandom()
|
|
except Exception:
|
|
randomsource = random.Random()
|
|
randomsource.seed()
|
|
|
|
import signal
|
|
if os.name != 'nt':
|
|
signal.signal(signal.SIGPIPE, signal.SIG_DFL)
|
|
|
|
import common.xmpp
|
|
from common import helpers
|
|
from common import gajim
|
|
from common import GnuPG
|
|
from common import passwords
|
|
from common import exceptions
|
|
|
|
from connection_handlers import *
|
|
|
|
from string import Template
|
|
import logging
|
|
log = logging.getLogger('gajim.c.connection')
|
|
|
|
ssl_error = {
|
|
2: _("Unable to get issuer certificate"),
|
|
3: _("Unable to get certificate CRL"),
|
|
4: _("Unable to decrypt certificate's signature"),
|
|
5: _("Unable to decrypt CRL's signature"),
|
|
6: _("Unable to decode issuer public key"),
|
|
7: _("Certificate signature failure"),
|
|
8: _("CRL signature failure"),
|
|
9: _("Certificate is not yet valid"),
|
|
10: _("Certificate has expired"),
|
|
11: _("CRL is not yet valid"),
|
|
12: _("CRL has expired"),
|
|
13: _("Format error in certificate's notBefore field"),
|
|
14: _("Format error in certificate's notAfter field"),
|
|
15: _("Format error in CRL's lastUpdate field"),
|
|
16: _("Format error in CRL's nextUpdate field"),
|
|
17: _("Out of memory"),
|
|
18: _("Self signed certificate"),
|
|
19: _("Self signed certificate in certificate chain"),
|
|
20: _("Unable to get local issuer certificate"),
|
|
21: _("Unable to verify the first certificate"),
|
|
22: _("Certificate chain too long"),
|
|
23: _("Certificate revoked"),
|
|
24: _("Invalid CA certificate"),
|
|
25: _("Path length constraint exceeded"),
|
|
26: _("Unsupported certificate purpose"),
|
|
27: _("Certificate not trusted"),
|
|
28: _("Certificate rejected"),
|
|
29: _("Subject issuer mismatch"),
|
|
30: _("Authority and subject key identifier mismatch"),
|
|
31: _("Authority and issuer serial number mismatch"),
|
|
32: _("Key usage does not include certificate signing"),
|
|
50: _("Application verification failure")
|
|
}
|
|
class Connection(ConnectionHandlers):
|
|
'''Connection class'''
|
|
def __init__(self, name):
|
|
ConnectionHandlers.__init__(self)
|
|
self.name = name
|
|
# self.connected:
|
|
# 0=>offline,
|
|
# 1=>connection in progress,
|
|
# 2=>authorised
|
|
self.connected = 0
|
|
self.connection = None # xmpppy ClientCommon instance
|
|
# this property is used to prevent double connections
|
|
self.last_connection = None # last ClientCommon instance
|
|
# If we succeed to connect, remember it so next time we try (after a
|
|
# disconnection) we try only this type.
|
|
self.last_connection_type = None
|
|
self.lang = None
|
|
if locale.getdefaultlocale()[0]:
|
|
self.lang = locale.getdefaultlocale()[0].split('_')[0]
|
|
self.is_zeroconf = False
|
|
self.gpg = None
|
|
self.USE_GPG = False
|
|
if gajim.HAVE_GPG:
|
|
self.USE_GPG = True
|
|
self.gpg = GnuPG.GnuPG(gajim.config.get('use_gpg_agent'))
|
|
self.status = ''
|
|
self.priority = gajim.get_priority(name, 'offline')
|
|
self.old_show = ''
|
|
# increase/decrease default timeout for server responses
|
|
self.try_connecting_for_foo_secs = 45
|
|
# holds the actual hostname to which we are connected
|
|
self.connected_hostname = None
|
|
self.time_to_reconnect = None
|
|
self.last_time_to_reconnect = None
|
|
self.new_account_info = None
|
|
self.new_account_form = None
|
|
self.bookmarks = []
|
|
self.annotations = {}
|
|
self.on_purpose = False
|
|
self.last_io = gajim.idlequeue.current_time()
|
|
self.last_sent = []
|
|
self.last_history_time = {}
|
|
self.password = passwords.get_password(name)
|
|
self.server_resource = gajim.config.get_per('accounts', name, 'resource')
|
|
# All valid resource substitution strings should be added to this hash.
|
|
if self.server_resource:
|
|
self.server_resource = Template(self.server_resource).safe_substitute({
|
|
'hostname': socket.gethostname()
|
|
})
|
|
if gajim.config.get_per('accounts', self.name, 'keep_alives_enabled'):
|
|
self.keepalives = gajim.config.get_per('accounts', self.name,'keep_alive_every_foo_secs')
|
|
else:
|
|
self.keepalives = 0
|
|
self.privacy_rules_supported = False
|
|
self.blocked_list = []
|
|
self.blocked_contacts = []
|
|
self.blocked_groups = []
|
|
self.music_track_info = 0
|
|
self.pep_supported = False
|
|
self.mood = {}
|
|
self.tune = {}
|
|
self.activity = {}
|
|
# Do we continue connection when we get roster (send presence,get vcard..)
|
|
self.continue_connect_info = None
|
|
# Do we auto accept insecure connection
|
|
self.connection_auto_accepted = False
|
|
# To know the groupchat jid associated with a sranza ID. Useful to
|
|
# request vcard or os info... to a real JID but act as if it comes from
|
|
# the fake jid
|
|
self.groupchat_jids = {} # {ID : groupchat_jid}
|
|
self.pasword_callback = None
|
|
|
|
self.on_connect_success = None
|
|
self.on_connect_failure = None
|
|
self.retrycount = 0
|
|
self.jids_for_auto_auth = [] # list of jid to auto-authorize
|
|
self.muc_jid = {} # jid of muc server for each transport type
|
|
self.available_transports = {} # list of available transports on this
|
|
# server {'icq': ['icq.server.com', 'icq2.server.com'], }
|
|
self.vcard_supported = True
|
|
self.private_storage_supported = True
|
|
# END __init__
|
|
|
|
def put_event(self, ev):
|
|
if ev[0] in gajim.handlers:
|
|
log.debug('Sending %s event to GUI: %s' % (ev[0], ev[1:]))
|
|
gajim.handlers[ev[0]](self.name, ev[1])
|
|
|
|
def dispatch(self, event, data):
|
|
'''always passes account name as first param'''
|
|
self.put_event((event, data))
|
|
|
|
|
|
def _reconnect(self):
|
|
# Do not try to reco while we are already trying
|
|
self.time_to_reconnect = None
|
|
if self.connected < 2: # connection failed
|
|
log.debug('reconnect')
|
|
self.connected = 1
|
|
self.dispatch('STATUS', 'connecting')
|
|
self.retrycount += 1
|
|
self.on_connect_auth = self._init_roster
|
|
self.connect_and_init(self.old_show, self.status, self.USE_GPG)
|
|
else:
|
|
# reconnect succeeded
|
|
self.time_to_reconnect = None
|
|
self.retrycount = 0
|
|
|
|
# We are doing disconnect at so many places, better use one function in all
|
|
def disconnect(self, on_purpose=False):
|
|
gajim.interface.roster.music_track_changed(None, None, self.name)
|
|
self.on_purpose = on_purpose
|
|
self.connected = 0
|
|
self.time_to_reconnect = None
|
|
self.privacy_rules_supported = False
|
|
if self.connection:
|
|
# make sure previous connection is completely closed
|
|
gajim.proxy65_manager.disconnect(self.connection)
|
|
self.connection.disconnect()
|
|
self.last_connection = None
|
|
self.connection = None
|
|
|
|
def _disconnectedReconnCB(self):
|
|
'''Called when we are disconnected'''
|
|
log.info('disconnectedReconnCB called')
|
|
if gajim.account_is_connected(self.name):
|
|
# we cannot change our status to offline or connecting
|
|
# after we auth to server
|
|
self.old_show = gajim.SHOW_LIST[self.connected]
|
|
self.connected = 0
|
|
if not self.on_purpose:
|
|
self.dispatch('STATUS', 'offline')
|
|
self.disconnect()
|
|
if gajim.config.get_per('accounts', self.name, 'autoreconnect'):
|
|
self.connected = -1
|
|
self.dispatch('STATUS', 'error')
|
|
if gajim.status_before_autoaway[self.name]:
|
|
# We were auto away. So go back online
|
|
self.status = gajim.status_before_autoaway[self.name]
|
|
gajim.status_before_autoaway[self.name] = ''
|
|
self.old_show = 'online'
|
|
# this check has moved from _reconnect method
|
|
# do exponential backoff until 15 minutes,
|
|
# then small linear increase
|
|
if self.retrycount < 2 or self.last_time_to_reconnect is None:
|
|
self.last_time_to_reconnect = 5
|
|
if self.last_time_to_reconnect < 800:
|
|
self.last_time_to_reconnect *= 1.5
|
|
self.last_time_to_reconnect += randomsource.randint(0, 5)
|
|
self.time_to_reconnect = int(self.last_time_to_reconnect)
|
|
log.info("Reconnect to %s in %ss", self.name, self.time_to_reconnect)
|
|
gajim.idlequeue.set_alarm(self._reconnect_alarm,
|
|
self.time_to_reconnect)
|
|
elif self.on_connect_failure:
|
|
self.on_connect_failure()
|
|
self.on_connect_failure = None
|
|
else:
|
|
# show error dialog
|
|
self._connection_lost()
|
|
else:
|
|
self.disconnect()
|
|
self.on_purpose = False
|
|
# END disconenctedReconnCB
|
|
|
|
def _connection_lost(self):
|
|
log.debug('_connection_lost')
|
|
self.disconnect(on_purpose = False)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('CONNECTION_LOST',
|
|
(_('Connection with account "%s" has been lost') % self.name,
|
|
_('Reconnect manually.')))
|
|
|
|
def _event_dispatcher(self, realm, event, data):
|
|
if realm == common.xmpp.NS_REGISTER:
|
|
if event == common.xmpp.features_nb.REGISTER_DATA_RECEIVED:
|
|
# data is (agent, DataFrom, is_form, error_msg)
|
|
if self.new_account_info and \
|
|
self.new_account_info['hostname'] == data[0]:
|
|
# it's a new account
|
|
if not data[1]: # wrong answer
|
|
self.dispatch('ACC_NOT_OK', (
|
|
_('Server %(name)s answered wrongly to register request: '
|
|
'%(error)s') % {'name': data[0], 'error': data[3]}))
|
|
return
|
|
is_form = data[2]
|
|
conf = data[1]
|
|
if self.new_account_form:
|
|
def _on_register_result(result):
|
|
if not common.xmpp.isResultNode(result):
|
|
self.dispatch('ACC_NOT_OK', (result.getError()))
|
|
return
|
|
if gajim.HAVE_GPG:
|
|
self.USE_GPG = True
|
|
self.gpg = GnuPG.GnuPG(gajim.config.get(
|
|
'use_gpg_agent'))
|
|
self.dispatch('ACC_OK', (self.new_account_info))
|
|
self.new_account_info = None
|
|
self.new_account_form = None
|
|
if self.connection:
|
|
self.connection.UnregisterDisconnectHandler(
|
|
self._on_new_account)
|
|
self.disconnect(on_purpose=True)
|
|
# it's the second time we get the form, we have info user
|
|
# typed, so send them
|
|
if is_form:
|
|
#TODO: Check if form has changed
|
|
iq = common.xmpp.Iq('set', common.xmpp.NS_REGISTER, to=self._hostname)
|
|
iq.setTag('query').addChild(node=self.new_account_form)
|
|
self.connection.SendAndCallForResponse(iq,
|
|
_on_register_result)
|
|
else:
|
|
if self.new_account_form.keys().sort() != \
|
|
conf.keys().sort():
|
|
# requested config has changed since first connection
|
|
self.dispatch('ACC_NOT_OK', (_(
|
|
'Server %s provided a different registration form')\
|
|
% data[0]))
|
|
return
|
|
common.xmpp.features_nb.register(self.connection,
|
|
self._hostname, self.new_account_form,
|
|
_on_register_result)
|
|
return
|
|
try:
|
|
errnum = self.connection.Connection.ssl_errnum
|
|
except AttributeError:
|
|
errnum = -1 # we don't have an errnum
|
|
ssl_msg = ''
|
|
if errnum > 0:
|
|
ssl_msg = ssl_error.get(errnum, _('Unknown SSL error: %d') % errnum)
|
|
ssl_cert = ''
|
|
if hasattr(self.connection.Connection, 'ssl_cert_pem'):
|
|
ssl_cert = self.connection.Connection.ssl_cert_pem
|
|
ssl_fingerprint = ''
|
|
if hasattr(self.connection.Connection, 'ssl_fingerprint_sha1'):
|
|
ssl_fingerprint = \
|
|
self.connection.Connection.ssl_fingerprint_sha1
|
|
self.dispatch('NEW_ACC_CONNECTED', (conf, is_form, ssl_msg,
|
|
errnum, ssl_cert, ssl_fingerprint))
|
|
self.connection.UnregisterDisconnectHandler(
|
|
self._on_new_account)
|
|
self.disconnect(on_purpose=True)
|
|
return
|
|
if not data[1]: # wrong answer
|
|
self.dispatch('ERROR', (_('Invalid answer'),
|
|
_('Transport %(name)s answered wrongly to register request: '
|
|
'%(error)s') % {'name': data[0], 'error': data[3]}))
|
|
return
|
|
is_form = data[2]
|
|
conf = data[1]
|
|
self.dispatch('REGISTER_AGENT_INFO', (data[0], conf, is_form))
|
|
elif realm == common.xmpp.NS_PRIVACY:
|
|
if event == common.xmpp.features_nb.PRIVACY_LISTS_RECEIVED:
|
|
# data is (list)
|
|
self.dispatch('PRIVACY_LISTS_RECEIVED', (data))
|
|
elif event == common.xmpp.features_nb.PRIVACY_LIST_RECEIVED:
|
|
# data is (resp)
|
|
if not data:
|
|
return
|
|
rules = []
|
|
name = data.getTag('query').getTag('list').getAttr('name')
|
|
for child in data.getTag('query').getTag('list').getChildren():
|
|
dict_item = child.getAttrs()
|
|
childs = []
|
|
if 'type' in dict_item:
|
|
for scnd_child in child.getChildren():
|
|
childs += [scnd_child.getName()]
|
|
rules.append({'action':dict_item['action'],
|
|
'type':dict_item['type'], 'order':dict_item['order'],
|
|
'value':dict_item['value'], 'child':childs})
|
|
else:
|
|
for scnd_child in child.getChildren():
|
|
childs.append(scnd_child.getName())
|
|
rules.append({'action':dict_item['action'],
|
|
'order':dict_item['order'], 'child':childs})
|
|
self.dispatch('PRIVACY_LIST_RECEIVED', (name, rules))
|
|
elif event == common.xmpp.features_nb.PRIVACY_LISTS_ACTIVE_DEFAULT:
|
|
# data is (dict)
|
|
self.dispatch('PRIVACY_LISTS_ACTIVE_DEFAULT', (data))
|
|
elif realm == '':
|
|
if event == common.xmpp.transports_nb.DATA_RECEIVED:
|
|
self.dispatch('STANZA_ARRIVED', unicode(data, errors = 'ignore'))
|
|
elif event == common.xmpp.transports_nb.DATA_SENT:
|
|
self.dispatch('STANZA_SENT', unicode(data))
|
|
|
|
def _select_next_host(self, hosts):
|
|
'''Selects the next host according to RFC2782 p.3 based on it's
|
|
priority. Chooses between hosts with the same priority randomly,
|
|
where the probability of being selected is proportional to the weight
|
|
of the host.'''
|
|
|
|
hosts_by_prio = sorted(hosts, key=operator.itemgetter('prio'))
|
|
|
|
try:
|
|
lowest_prio = hosts_by_prio[0]['prio']
|
|
except IndexError:
|
|
raise ValueError("No hosts to choose from!")
|
|
|
|
hosts_lowest_prio = [h for h in hosts_by_prio if h['prio'] == lowest_prio]
|
|
|
|
if len(hosts_lowest_prio) == 1:
|
|
return hosts_lowest_prio[0]
|
|
else:
|
|
rndint = random.randint(0, sum(h['weight'] for h in hosts_lowest_prio))
|
|
weightsum = 0
|
|
for host in sorted(hosts_lowest_prio, key=operator.itemgetter(
|
|
'weight')):
|
|
weightsum += host['weight']
|
|
if weightsum >= rndint:
|
|
return host
|
|
|
|
def connect(self, data = None):
|
|
''' Start a connection to the Jabber server.
|
|
Returns connection, and connection type ('tls', 'ssl', 'plain', '')
|
|
data MUST contain hostname, usessl, proxy, use_custom_host,
|
|
custom_host (if use_custom_host), custom_port (if use_custom_host)'''
|
|
if self.connection:
|
|
return self.connection, ''
|
|
|
|
if data:
|
|
hostname = data['hostname']
|
|
self.try_connecting_for_foo_secs = 45
|
|
p = data['proxy']
|
|
use_srv = True
|
|
use_custom = data['use_custom_host']
|
|
if use_custom:
|
|
custom_h = data['custom_host']
|
|
custom_p = data['custom_port']
|
|
else:
|
|
hostname = gajim.config.get_per('accounts', self.name, 'hostname')
|
|
usessl = gajim.config.get_per('accounts', self.name, 'usessl')
|
|
self.try_connecting_for_foo_secs = gajim.config.get_per('accounts',
|
|
self.name, 'try_connecting_for_foo_secs')
|
|
p = gajim.config.get_per('accounts', self.name, 'proxy')
|
|
use_srv = gajim.config.get_per('accounts', self.name, 'use_srv')
|
|
use_custom = gajim.config.get_per('accounts', self.name,
|
|
'use_custom_host')
|
|
custom_h = gajim.config.get_per('accounts', self.name, 'custom_host')
|
|
custom_p = gajim.config.get_per('accounts', self.name, 'custom_port')
|
|
|
|
# create connection if it doesn't already exist
|
|
self.connected = 1
|
|
if p and p in gajim.config.get_per('proxies'):
|
|
proxy = {}
|
|
proxyptr = gajim.config.get_per('proxies', p)
|
|
for key in proxyptr.keys():
|
|
proxy[key] = proxyptr[key][1]
|
|
|
|
elif gajim.config.get_per('accounts', self.name, 'use_env_http_proxy'):
|
|
try:
|
|
try:
|
|
env_http_proxy = os.environ['HTTP_PROXY']
|
|
except Exception:
|
|
env_http_proxy = os.environ['http_proxy']
|
|
env_http_proxy = env_http_proxy.strip('"')
|
|
# Dispose of the http:// prefix
|
|
env_http_proxy = env_http_proxy.split('://')
|
|
env_http_proxy = env_http_proxy[len(env_http_proxy)-1]
|
|
env_http_proxy = env_http_proxy.split('@')
|
|
|
|
if len(env_http_proxy) == 2:
|
|
login = env_http_proxy[0].split(':')
|
|
addr = env_http_proxy[1].split(':')
|
|
else:
|
|
login = ['', '']
|
|
addr = env_http_proxy[0].split(':')
|
|
|
|
proxy = {'host': addr[0], 'type' : u'http', 'user':login[0]}
|
|
|
|
if len(addr) == 2:
|
|
proxy['port'] = addr[1]
|
|
else:
|
|
proxy['port'] = 3128
|
|
|
|
if len(login) == 2:
|
|
proxy['password'] = login[1]
|
|
else:
|
|
proxy['password'] = u''
|
|
|
|
except Exception:
|
|
proxy = None
|
|
else:
|
|
proxy = None
|
|
h = hostname
|
|
p = 5222
|
|
ssl_p = 5223
|
|
# use_srv = False # wants ssl? disable srv lookup
|
|
if use_custom:
|
|
h = custom_h
|
|
p = custom_p
|
|
ssl_p = custom_p
|
|
use_srv = False
|
|
|
|
# SRV resolver
|
|
self._proxy = proxy
|
|
self._hosts = [ {'host': h, 'port': p, 'ssl_port': ssl_p, 'prio': 10,
|
|
'weight': 10} ]
|
|
self._hostname = hostname
|
|
if use_srv:
|
|
# add request for srv query to the resolve, on result '_on_resolve'
|
|
# will be called
|
|
gajim.resolver.resolve('_xmpp-client._tcp.' + helpers.idn_to_ascii(h),
|
|
self._on_resolve)
|
|
else:
|
|
self._on_resolve('', [])
|
|
|
|
def _on_resolve(self, host, result_array):
|
|
# SRV query returned at least one valid result, we put it in hosts dict
|
|
if len(result_array) != 0:
|
|
self._hosts = [i for i in result_array]
|
|
# Add ssl port
|
|
ssl_p = 5223
|
|
if gajim.config.get_per('accounts', self.name, 'use_custom_host'):
|
|
ssl_p = gajim.config.get_per('accounts', self.name, 'custom_port')
|
|
for i in self._hosts:
|
|
i['ssl_port'] = ssl_p
|
|
self._connect_to_next_host()
|
|
|
|
|
|
def _connect_to_next_host(self, retry = False):
|
|
log.debug('Connection to next host')
|
|
if len(self._hosts):
|
|
# No config option exist when creating a new account
|
|
if self.last_connection_type:
|
|
self._connection_types = [self.last_connection_type]
|
|
elif self.name in gajim.config.get_per('accounts'):
|
|
self._connection_types = gajim.config.get_per('accounts', self.name,
|
|
'connection_types').split()
|
|
else:
|
|
self._connection_types = ['tls', 'ssl', 'plain']
|
|
|
|
if self._proxy and self._proxy['type']=='bosh':
|
|
# with BOSH, we can't do TLS negotiation with <starttls>, we do only "plain"
|
|
# connection and TLS with handshake right after TCP connecting ("ssl")
|
|
scheme = common.xmpp.transports_nb.urisplit(self._proxy['bosh_uri'])[0]
|
|
if scheme=='https':
|
|
self._connection_types = ['ssl']
|
|
else:
|
|
self._connection_types = ['plain']
|
|
|
|
host = self._select_next_host(self._hosts)
|
|
self._current_host = host
|
|
self._hosts.remove(host)
|
|
self.connect_to_next_type()
|
|
|
|
else:
|
|
if not retry and self.retrycount == 0:
|
|
log.debug("Out of hosts, giving up connecting to %s", self.name)
|
|
self.time_to_reconnect = None
|
|
if self.on_connect_failure:
|
|
self.on_connect_failure()
|
|
self.on_connect_failure = None
|
|
else:
|
|
# shown error dialog
|
|
self._connection_lost()
|
|
else:
|
|
# try reconnect if connection has failed before auth to server
|
|
self._disconnectedReconnCB()
|
|
|
|
def connect_to_next_type(self, retry=False):
|
|
if len(self._connection_types):
|
|
self._current_type = self._connection_types.pop(0)
|
|
if self.last_connection:
|
|
self.last_connection.socket.disconnect()
|
|
self.last_connection = None
|
|
self.connection = None
|
|
|
|
if self._current_type == 'ssl':
|
|
# SSL (force TLS on different port than plain)
|
|
# If we do TLS over BOSH, port of XMPP server should be the standard one
|
|
# and TLS should be negotiated because TLS on 5223 is deprecated
|
|
if self._proxy and self._proxy['type']=='bosh':
|
|
port = self._current_host['port']
|
|
else:
|
|
port = self._current_host['ssl_port']
|
|
elif self._current_type == 'tls':
|
|
# TLS - negotiate tls after XMPP stream is estabilished
|
|
port = self._current_host['port']
|
|
elif self._current_type == 'plain':
|
|
# plain connection on defined port
|
|
port = self._current_host['port']
|
|
|
|
cacerts = os.path.join(common.gajim.DATA_DIR, 'other', 'cacerts.pem')
|
|
mycerts = common.gajim.MY_CACERTS
|
|
secure_tuple = (self._current_type, cacerts, mycerts)
|
|
|
|
con = common.xmpp.NonBlockingClient(
|
|
domain=self._hostname,
|
|
caller=self,
|
|
idlequeue=gajim.idlequeue)
|
|
|
|
self.last_connection = con
|
|
# increase default timeout for server responses
|
|
common.xmpp.dispatcher_nb.DEFAULT_TIMEOUT_SECONDS = self.try_connecting_for_foo_secs
|
|
# FIXME: this is a hack; need a better way
|
|
if self.on_connect_success == self._on_new_account:
|
|
con.RegisterDisconnectHandler(self._on_new_account)
|
|
|
|
self.log_hosttype_info(port)
|
|
con.connect(
|
|
hostname=self._current_host['host'],
|
|
port=port,
|
|
on_connect=self.on_connect_success,
|
|
on_proxy_failure=self.on_proxy_failure,
|
|
on_connect_failure=self.connect_to_next_type,
|
|
proxy=self._proxy,
|
|
secure_tuple = secure_tuple)
|
|
else:
|
|
self._connect_to_next_host(retry)
|
|
|
|
def log_hosttype_info(self, port):
|
|
msg = '>>>>>> Connecting to %s [%s:%d], type = %s' % (self.name,
|
|
self._current_host['host'], port, self._current_type)
|
|
log.info(msg)
|
|
if self._proxy:
|
|
msg = '>>>>>> '
|
|
if self._proxy['type']=='bosh':
|
|
msg = '%s over BOSH %s:%s' % (msg, self._proxy['bosh_uri'], self._proxy['bosh_port'])
|
|
if self._proxy['type'] in ['http','socks5'] or self._proxy['bosh_useproxy']:
|
|
msg = '%s over proxy %s:%s' % (msg, self._proxy['host'], self._proxy['port'])
|
|
log.info(msg)
|
|
|
|
def _connect_failure(self, con_type = None):
|
|
if not con_type:
|
|
# we are not retrying, and not conecting
|
|
if not self.retrycount and self.connected != 0:
|
|
self.disconnect(on_purpose = True)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('CONNECTION_LOST',
|
|
(_('Could not connect to "%s"') % self._hostname,
|
|
_('Check your connection or try again later.')))
|
|
|
|
def on_proxy_failure(self, reason):
|
|
log.error('Connection to proxy failed: %s' % reason)
|
|
self.time_to_reconnect = None
|
|
self.on_connect_failure = None
|
|
self.disconnect(on_purpose = True)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('CONNECTION_LOST',
|
|
(_('Connection to proxy failed'), reason))
|
|
|
|
def _connect_success(self, con, con_type):
|
|
if not self.connected: # We went offline during connecting process
|
|
# FIXME - not possible, maybe it was when we used threads
|
|
return
|
|
_con_type = con_type
|
|
if _con_type != self._current_type:
|
|
log.info('Connecting to next type beacuse desired is %s and returned is %s'
|
|
% (self._current_type, _con_type))
|
|
self.connect_to_next_type()
|
|
return
|
|
con.RegisterDisconnectHandler(self._on_disconnected)
|
|
if _con_type == 'plain' and gajim.config.get_per('accounts', self.name,
|
|
'warn_when_plaintext_connection'):
|
|
self.dispatch('PLAIN_CONNECTION', (con,))
|
|
return True
|
|
if _con_type in ('tls', 'ssl') and not hasattr(con.Connection,
|
|
'_sslContext') and gajim.config.get_per('accounts', self.name,
|
|
'warn_when_insecure_ssl_connection') and \
|
|
not self.connection_auto_accepted:
|
|
# Pyopenssl is not used
|
|
self.dispatch('INSECURE_SSL_CONNECTION', (con, _con_type))
|
|
return True
|
|
return self.connection_accepted(con, con_type)
|
|
|
|
def connection_accepted(self, con, con_type):
|
|
if not con or not con.Connection:
|
|
self.disconnect(on_purpose=True)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('CONNECTION_LOST',
|
|
(_('Could not connect to account %s') % self.name,
|
|
_('Connection with account %s has been lost. Retry connecting.') % \
|
|
self.name))
|
|
return
|
|
self.hosts = []
|
|
self.connection_auto_accepted = False
|
|
self.connected_hostname = self._current_host['host']
|
|
self.on_connect_failure = None
|
|
con.UnregisterDisconnectHandler(self._on_disconnected)
|
|
con.RegisterDisconnectHandler(self._disconnectedReconnCB)
|
|
log.debug('Connected to server %s:%s with %s' % (
|
|
self._current_host['host'], self._current_host['port'], con_type))
|
|
|
|
self.last_connection_type = con_type
|
|
name = gajim.config.get_per('accounts', self.name, 'name')
|
|
hostname = gajim.config.get_per('accounts', self.name, 'hostname')
|
|
self.connection = con
|
|
try:
|
|
errnum = con.Connection.ssl_errnum
|
|
except AttributeError:
|
|
errnum = -1 # we don't have an errnum
|
|
if errnum > 0 and str(errnum) not in gajim.config.get_per('accounts',
|
|
self.name, 'ignore_ssl_errors'):
|
|
text = _('The authenticity of the %s certificate could be invalid.') %\
|
|
hostname
|
|
if errnum in ssl_error:
|
|
text += _('\nSSL Error: <b>%s</b>') % ssl_error[errnum]
|
|
else:
|
|
text += _('\nUnknown SSL error: %d') % errnum
|
|
self.dispatch('SSL_ERROR', (text, errnum, con.Connection.ssl_cert_pem,
|
|
con.Connection.ssl_fingerprint_sha1))
|
|
return True
|
|
if hasattr(con.Connection, 'ssl_fingerprint_sha1'):
|
|
saved_fingerprint = gajim.config.get_per('accounts', self.name, 'ssl_fingerprint_sha1')
|
|
if saved_fingerprint:
|
|
# Check sha1 fingerprint
|
|
if con.Connection.ssl_fingerprint_sha1 != saved_fingerprint:
|
|
self.dispatch('FINGERPRINT_ERROR',
|
|
(con.Connection.ssl_fingerprint_sha1,))
|
|
return True
|
|
else:
|
|
gajim.config.set_per('accounts', self.name, 'ssl_fingerprint_sha1',
|
|
con.Connection.ssl_fingerprint_sha1)
|
|
self._register_handlers(con, con_type)
|
|
con.auth(
|
|
user=name,
|
|
password=self.password,
|
|
resource=self.server_resource,
|
|
sasl=1,
|
|
on_auth=self.__on_auth)
|
|
|
|
def ssl_certificate_accepted(self):
|
|
if not self.connection:
|
|
self.disconnect(on_purpose=True)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('CONNECTION_LOST',
|
|
(_('Could not connect to account %s') % self.name,
|
|
_('Connection with account %s has been lost. Retry connecting.') % \
|
|
self.name))
|
|
return
|
|
name = gajim.config.get_per('accounts', self.name, 'name')
|
|
self._register_handlers(self.connection, 'ssl')
|
|
self.connection.auth(name, self.password, self.server_resource, 1,
|
|
self.__on_auth)
|
|
|
|
def _register_handlers(self, con, con_type):
|
|
self.peerhost = con.get_peerhost()
|
|
# notify the gui about con_type
|
|
self.dispatch('CON_TYPE', con_type)
|
|
ConnectionHandlers._register_handlers(self, con, con_type)
|
|
|
|
def __on_auth(self, con, auth):
|
|
if not con:
|
|
self.disconnect(on_purpose=True)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('CONNECTION_LOST',
|
|
(_('Could not connect to "%s"') % self._hostname,
|
|
_('Check your connection or try again later')))
|
|
if self.on_connect_auth:
|
|
self.on_connect_auth(None)
|
|
self.on_connect_auth = None
|
|
return
|
|
if not self.connected: # We went offline during connecting process
|
|
if self.on_connect_auth:
|
|
self.on_connect_auth(None)
|
|
self.on_connect_auth = None
|
|
return
|
|
if hasattr(con, 'Resource'):
|
|
self.server_resource = con.Resource
|
|
if auth:
|
|
self.last_io = gajim.idlequeue.current_time()
|
|
self.connected = 2
|
|
self.retrycount = 0
|
|
if self.on_connect_auth:
|
|
self.on_connect_auth(con)
|
|
self.on_connect_auth = None
|
|
else:
|
|
# Forget password, it's wrong
|
|
self.password = None
|
|
gajim.log.debug("Couldn't authenticate to %s" % self._hostname)
|
|
self.disconnect(on_purpose = True)
|
|
self.dispatch('STATUS', 'offline')
|
|
self.dispatch('ERROR', (_('Authentication failed with "%s"') % \
|
|
self._hostname,
|
|
_('Please check your login and password for correctness.')))
|
|
if self.on_connect_auth:
|
|
self.on_connect_auth(None)
|
|
self.on_connect_auth = None
|
|
# END connect
|
|
|
|
def quit(self, kill_core):
|
|
if kill_core and gajim.account_is_connected(self.name):
|
|
self.disconnect(on_purpose=True)
|
|
|
|
def add_lang(self, stanza):
|
|
if self.lang:
|
|
stanza.setAttr('xml:lang', self.lang)
|
|
|
|
def get_privacy_lists(self):
|
|
if not self.connection:
|
|
return
|
|
common.xmpp.features_nb.getPrivacyLists(self.connection)
|
|
|
|
def sendPing(self, pingTo=None):
|
|
'''Send XMPP Ping (XEP-0199) request. If pingTo is not set, ping is sent
|
|
to server to detect connection failure at application level.'''
|
|
if not self.connection:
|
|
return
|
|
id_ = self.connection.getAnID()
|
|
if pingTo:
|
|
to = pingTo.get_full_jid()
|
|
self.dispatch('PING_SENT', (pingTo))
|
|
else:
|
|
to = gajim.config.get_per('accounts', self.name, 'hostname')
|
|
self.awaiting_xmpp_ping_id = id_
|
|
iq = common.xmpp.Iq('get', to=to)
|
|
iq.addChild(name = 'ping', namespace = common.xmpp.NS_PING)
|
|
iq.setID(id_)
|
|
def _on_response(resp):
|
|
timePong = time_time()
|
|
if not common.xmpp.isResultNode(resp):
|
|
self.dispatch('PING_ERROR', (pingTo))
|
|
return
|
|
timeDiff = round(timePong - timePing,2)
|
|
self.dispatch('PING_REPLY', (pingTo, timeDiff))
|
|
if pingTo:
|
|
timePing = time_time()
|
|
self.connection.SendAndCallForResponse(iq, _on_response)
|
|
else:
|
|
self.connection.send(iq)
|
|
gajim.idlequeue.set_alarm(self.check_keepalive, gajim.config.get_per(
|
|
'accounts', self.name, 'time_for_keep_alive_answer'))
|
|
|
|
def get_active_default_lists(self):
|
|
if not self.connection:
|
|
return
|
|
common.xmpp.features_nb.getActiveAndDefaultPrivacyLists(self.connection)
|
|
|
|
def del_privacy_list(self, privacy_list):
|
|
if not self.connection:
|
|
return
|
|
def _on_del_privacy_list_result(result):
|
|
if result:
|
|
self.dispatch('PRIVACY_LIST_REMOVED', privacy_list)
|
|
else:
|
|
self.dispatch('ERROR', (_('Error while removing privacy list'),
|
|
_('Privacy list %s has not been removed. It is maybe active in '
|
|
'one of your connected resources. Deactivate it and try '
|
|
'again.') % privacy_list))
|
|
common.xmpp.features_nb.delPrivacyList(self.connection, privacy_list,
|
|
_on_del_privacy_list_result)
|
|
|
|
def get_privacy_list(self, title):
|
|
if not self.connection:
|
|
return
|
|
common.xmpp.features_nb.getPrivacyList(self.connection, title)
|
|
|
|
def set_privacy_list(self, listname, tags):
|
|
if not self.connection:
|
|
return
|
|
common.xmpp.features_nb.setPrivacyList(self.connection, listname, tags)
|
|
|
|
def set_active_list(self, listname):
|
|
if not self.connection:
|
|
return
|
|
common.xmpp.features_nb.setActivePrivacyList(self.connection, listname, 'active')
|
|
|
|
def set_default_list(self, listname):
|
|
if not self.connection:
|
|
return
|
|
common.xmpp.features_nb.setDefaultPrivacyList(self.connection, listname)
|
|
|
|
def build_privacy_rule(self, name, action, order=1):
|
|
'''Build a Privacy rule stanza for invisibility'''
|
|
iq = common.xmpp.Iq('set', common.xmpp.NS_PRIVACY, xmlns = '')
|
|
l = iq.getTag('query').setTag('list', {'name': name})
|
|
i = l.setTag('item', {'action': action, 'order': str(order)})
|
|
i.setTag('presence-out')
|
|
return iq
|
|
|
|
def build_invisible_rule(self):
|
|
iq = common.xmpp.Iq('set', common.xmpp.NS_PRIVACY, xmlns = '')
|
|
l = iq.getTag('query').setTag('list', {'name': 'invisible'})
|
|
if self.name in gajim.interface.status_sent_to_groups and \
|
|
len(gajim.interface.status_sent_to_groups[self.name]) > 0:
|
|
for group in gajim.interface.status_sent_to_groups[self.name]:
|
|
i = l.setTag('item', {'type': 'group', 'value': group,
|
|
'action': 'allow', 'order': '1'})
|
|
i.setTag('presence-out')
|
|
if self.name in gajim.interface.status_sent_to_users and \
|
|
len(gajim.interface.status_sent_to_users[self.name]) > 0:
|
|
for jid in gajim.interface.status_sent_to_users[self.name]:
|
|
i = l.setTag('item', {'type': 'jid', 'value': jid,
|
|
'action': 'allow', 'order': '2'})
|
|
i.setTag('presence-out')
|
|
i = l.setTag('item', {'action': 'deny', 'order': '3'})
|
|
i.setTag('presence-out')
|
|
return iq
|
|
|
|
def set_invisible_rule(self):
|
|
if not gajim.account_is_connected(self.name):
|
|
return
|
|
iq = self.build_invisible_rule()
|
|
self.connection.send(iq)
|
|
|
|
def activate_privacy_rule(self, name):
|
|
'''activate a privacy rule'''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq('set', common.xmpp.NS_PRIVACY, xmlns = '')
|
|
iq.getTag('query').setTag('active', {'name': name})
|
|
self.connection.send(iq)
|
|
|
|
def send_invisible_presence(self, msg, signed, initial = False):
|
|
if not self.connection:
|
|
return
|
|
if not self.privacy_rules_supported:
|
|
self.dispatch('STATUS', gajim.SHOW_LIST[self.connected])
|
|
self.dispatch('ERROR', (_('Invisibility not supported'),
|
|
_('Account %s doesn\'t support invisibility.') % self.name))
|
|
return
|
|
# If we are already connected, and privacy rules are supported, send
|
|
# offline presence first as it's required by XEP-0126
|
|
if self.connected > 1 and self.privacy_rules_supported:
|
|
self.on_purpose = True
|
|
p = common.xmpp.Presence(typ = 'unavailable')
|
|
p = self.add_sha(p, False)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
self.remove_all_transfers()
|
|
self.connection.send(p)
|
|
|
|
# try to set the privacy rule
|
|
iq = self.build_invisible_rule()
|
|
self.connection.SendAndCallForResponse(iq, self._continue_invisible,
|
|
{'msg': msg, 'signed': signed, 'initial': initial})
|
|
|
|
def _continue_invisible(self, con, iq_obj, msg, signed, initial):
|
|
if iq_obj.getType() == 'error': # server doesn't support privacy lists
|
|
return
|
|
# active the privacy rule
|
|
self.privacy_rules_supported = True
|
|
self.activate_privacy_rule('invisible')
|
|
self.connected = gajim.SHOW_LIST.index('invisible')
|
|
self.status = msg
|
|
priority = unicode(gajim.get_priority(self.name, 'invisible'))
|
|
p = common.xmpp.Presence(priority = priority)
|
|
p = self.add_sha(p, True)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
if signed:
|
|
p.setTag(common.xmpp.NS_SIGNED + ' x').setData(signed)
|
|
self.connection.send(p)
|
|
self.priority = priority
|
|
self.dispatch('STATUS', 'invisible')
|
|
if initial:
|
|
#ask our VCard
|
|
self.request_vcard(None)
|
|
|
|
#Get bookmarks from private namespace
|
|
self.get_bookmarks()
|
|
|
|
#Get annotations
|
|
self.get_annotations()
|
|
|
|
#Inform GUI we just signed in
|
|
self.dispatch('SIGNED_IN', ())
|
|
|
|
def test_gpg_passphrase(self, password):
|
|
if not self.gpg:
|
|
return False
|
|
self.gpg.passphrase = password
|
|
keyID = gajim.config.get_per('accounts', self.name, 'keyid')
|
|
signed = self.gpg.sign('test', keyID)
|
|
self.gpg.password = None
|
|
return signed != 'BAD_PASSPHRASE'
|
|
|
|
def get_signed_presence(self, msg, callback = None):
|
|
if gajim.config.get_per('accounts', self.name, 'gpg_sign_presence'):
|
|
return self.get_signed_msg(msg, callback)
|
|
return ''
|
|
|
|
def get_signed_msg(self, msg, callback = None):
|
|
'''returns the signed message if possible
|
|
or an empty string if gpg is not used
|
|
or None if waiting for passphrase.
|
|
callback is the function to call when user give the passphrase'''
|
|
signed = ''
|
|
keyID = gajim.config.get_per('accounts', self.name, 'keyid')
|
|
if keyID and self.USE_GPG:
|
|
use_gpg_agent = gajim.config.get('use_gpg_agent')
|
|
if self.gpg.passphrase is None and not use_gpg_agent:
|
|
# We didn't set a passphrase
|
|
return None
|
|
if self.gpg.passphrase is not None or use_gpg_agent:
|
|
signed = self.gpg.sign(msg, keyID)
|
|
if signed == 'BAD_PASSPHRASE':
|
|
self.USE_GPG = False
|
|
signed = ''
|
|
self.dispatch('BAD_PASSPHRASE', ())
|
|
return signed
|
|
|
|
def connect_and_auth(self):
|
|
self.on_connect_success = self._connect_success
|
|
self.on_connect_failure = self._connect_failure
|
|
self.connect()
|
|
|
|
def connect_and_init(self, show, msg, sign_msg):
|
|
self.continue_connect_info = [show, msg, sign_msg]
|
|
self.on_connect_auth = self._init_roster
|
|
self.connect_and_auth()
|
|
|
|
def _init_roster(self, con):
|
|
self.connection = con
|
|
if not self.connection:
|
|
return
|
|
self.connection.set_send_timeout(self.keepalives, self.sendPing)
|
|
self.connection.onreceive(None)
|
|
iq = common.xmpp.Iq('get', common.xmpp.NS_PRIVACY, xmlns = '')
|
|
id_ = self.connection.getAnID()
|
|
iq.setID(id_)
|
|
self.awaiting_answers[id_] = (PRIVACY_ARRIVED, )
|
|
self.connection.send(iq)
|
|
|
|
def send_custom_status(self, show, msg, jid):
|
|
if not show in gajim.SHOW_LIST:
|
|
return -1
|
|
if not self.connection:
|
|
return
|
|
sshow = helpers.get_xmpp_show(show)
|
|
if not msg:
|
|
msg = ''
|
|
if show == 'offline':
|
|
p = common.xmpp.Presence(typ = 'unavailable', to = jid)
|
|
p = self.add_sha(p, False)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
else:
|
|
signed = self.get_signed_presence(msg)
|
|
priority = unicode(gajim.get_priority(self.name, sshow))
|
|
p = common.xmpp.Presence(typ = None, priority = priority, show = sshow,
|
|
to = jid)
|
|
p = self.add_sha(p)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
if signed:
|
|
p.setTag(common.xmpp.NS_SIGNED + ' x').setData(signed)
|
|
self.connection.send(p)
|
|
|
|
def change_status(self, show, msg, auto = False):
|
|
if not show in gajim.SHOW_LIST:
|
|
return -1
|
|
sshow = helpers.get_xmpp_show(show)
|
|
if not msg:
|
|
msg = ''
|
|
sign_msg = False
|
|
if not auto and not show == 'offline':
|
|
sign_msg = True
|
|
if show != 'invisible':
|
|
# We save it only when privacy list is accepted
|
|
self.status = msg
|
|
if show != 'offline' and self.connected < 1:
|
|
# set old_show to requested 'show' in case we need to
|
|
# recconect before we auth to server
|
|
self.old_show = show
|
|
self.on_purpose = False
|
|
self.server_resource = gajim.config.get_per('accounts', self.name,
|
|
'resource')
|
|
# All valid resource substitution strings should be added to this hash.
|
|
if self.server_resource:
|
|
self.server_resource = Template(self.server_resource).\
|
|
safe_substitute({
|
|
'hostname': socket.gethostname()
|
|
})
|
|
if gajim.HAVE_GPG:
|
|
self.USE_GPG = True
|
|
self.gpg = GnuPG.GnuPG(gajim.config.get('use_gpg_agent'))
|
|
self.connect_and_init(show, msg, sign_msg)
|
|
|
|
elif show == 'offline':
|
|
self.connected = 0
|
|
if self.connection:
|
|
self.terminate_sessions()
|
|
|
|
self.on_purpose = True
|
|
p = common.xmpp.Presence(typ = 'unavailable')
|
|
p = self.add_sha(p, False)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
self.remove_all_transfers()
|
|
self.time_to_reconnect = None
|
|
|
|
self.connection.RegisterDisconnectHandler(self._on_disconnected)
|
|
self.connection.send(p, now=True)
|
|
self.connection.start_disconnect()
|
|
#self.connection.start_disconnect(p, self._on_disconnected)
|
|
else:
|
|
self.time_to_reconnect = None
|
|
self._on_disconnected()
|
|
|
|
elif show != 'offline' and self.connected > 0:
|
|
# dont'try to connect, when we are in state 'connecting'
|
|
if self.connected == 1:
|
|
return
|
|
if show == 'invisible':
|
|
signed = self.get_signed_presence(msg)
|
|
self.send_invisible_presence(msg, signed)
|
|
return
|
|
was_invisible = self.connected == gajim.SHOW_LIST.index('invisible')
|
|
self.connected = gajim.SHOW_LIST.index(show)
|
|
if was_invisible and self.privacy_rules_supported:
|
|
iq = self.build_privacy_rule('visible', 'allow')
|
|
self.connection.send(iq)
|
|
self.activate_privacy_rule('visible')
|
|
priority = unicode(gajim.get_priority(self.name, sshow))
|
|
p = common.xmpp.Presence(typ = None, priority = priority, show = sshow)
|
|
p = self.add_sha(p)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
signed = self.get_signed_presence(msg)
|
|
if signed:
|
|
p.setTag(common.xmpp.NS_SIGNED + ' x').setData(signed)
|
|
if self.connection:
|
|
self.connection.send(p)
|
|
self.priority = priority
|
|
self.dispatch('STATUS', show)
|
|
|
|
def _on_disconnected(self):
|
|
''' called when a disconnect request has completed successfully'''
|
|
self.disconnect(on_purpose=True)
|
|
self.dispatch('STATUS', 'offline')
|
|
|
|
def get_status(self):
|
|
return gajim.SHOW_LIST[self.connected]
|
|
|
|
|
|
def send_motd(self, jid, subject = '', msg = '', xhtml = None):
|
|
if not self.connection:
|
|
return
|
|
msg_iq = common.xmpp.Message(to = jid, body = msg, subject = subject,
|
|
xhtml = xhtml)
|
|
|
|
self.connection.send(msg_iq)
|
|
|
|
def send_message(self, jid, msg, keyID, type_='chat', subject='',
|
|
chatstate=None, msg_id=None, composing_xep=None, resource=None,
|
|
user_nick=None, xhtml=None, session=None, forward_from=None, form_node=None,
|
|
original_message=None, delayed=None, callback=None, callback_args=[]):
|
|
if not self.connection or self.connected < 2:
|
|
return 1
|
|
try:
|
|
jid = helpers.parse_jid(jid)
|
|
except helpers.InvalidFormat:
|
|
self.dispatch('ERROR', (_('Invalid Jabber ID'),
|
|
_('It is not possible to send a message to %s, this JID is not '
|
|
'valid.') % jid))
|
|
return
|
|
|
|
if msg and not xhtml and gajim.config.get(
|
|
'rst_formatting_outgoing_messages'):
|
|
from common.rst_xhtml_generator import create_xhtml
|
|
xhtml = create_xhtml(msg)
|
|
if not msg and chatstate is None and form_node is None:
|
|
return
|
|
fjid = jid
|
|
if resource:
|
|
fjid += '/' + resource
|
|
msgtxt = msg
|
|
msgenc = ''
|
|
|
|
if session:
|
|
fjid = str(session.jid)
|
|
|
|
if keyID and self.USE_GPG:
|
|
xhtml = None
|
|
if keyID == 'UNKNOWN':
|
|
error = _('Neither the remote presence is signed, nor a key was assigned.')
|
|
elif keyID.endswith('MISMATCH'):
|
|
error = _('The contact\'s key (%s) does not match the key assigned in Gajim.' % keyID[:8])
|
|
else:
|
|
def encrypt_thread(msg, keyID):
|
|
# encrypt message. This function returns (msgenc, error)
|
|
return self.gpg.encrypt(msg, [keyID])
|
|
gajim.thread_interface(encrypt_thread, [msg, keyID],
|
|
self._on_message_encrypted, [type_, msg, msgtxt,
|
|
original_message, fjid, resource, jid, xhtml, subject,
|
|
chatstate, composing_xep, forward_from, delayed, session,
|
|
form_node, user_nick, keyID, callback, callback_args])
|
|
return
|
|
|
|
self._on_message_encrypted(self, ('', error), type_, msg, msgtxt,
|
|
original_message, fjid, resource, jid, xhtml, subject, chatstate,
|
|
composing_xep, forward_from, delayed, session, form_node, user_nick,
|
|
keyID, callback, callback_args)
|
|
|
|
self._on_continue_message(type_, msg, msgtxt, original_message, fjid,
|
|
resource, jid, xhtml, subject, msgenc, keyID, chatstate, composing_xep,
|
|
forward_from, delayed, session, form_node, user_nick, callback,
|
|
callback_args)
|
|
|
|
def _on_message_encrypted(self, output, type_, msg, msgtxt, original_message,
|
|
fjid, resource, jid, xhtml, subject, chatstate, composing_xep, forward_from,
|
|
delayed, session, form_node, user_nick, keyID, callback, callback_args):
|
|
msgenc, error = output
|
|
|
|
if msgenc and not error:
|
|
msgtxt = '[This message is *encrypted* (See :XEP:`27`]'
|
|
lang = os.getenv('LANG')
|
|
if lang is not None and lang != 'en': # we're not english
|
|
# one in locale and one en
|
|
msgtxt = _('[This message is *encrypted* (See :XEP:`27`]') + \
|
|
' (' + msgtxt + ')'
|
|
self._on_continue_message(type_, msg, msgtxt, original_message, fjid,
|
|
resource, jid, xhtml, subject, msgenc, keyID, chatstate,
|
|
composing_xep, forward_from, delayed, session, form_node, user_nick,
|
|
callback, callback_args)
|
|
return
|
|
# Encryption failed, do not send message
|
|
tim = localtime()
|
|
self.dispatch('MSGNOTSENT', (jid, error, msgtxt, tim, session))
|
|
|
|
def _on_continue_message(self, type_, msg, msgtxt, original_message, fjid,
|
|
resource, jid, xhtml, subject, msgenc, keyID, chatstate, composing_xep,
|
|
forward_from, delayed, session, form_node, user_nick, callback,
|
|
callback_args):
|
|
if type_ == 'chat':
|
|
msg_iq = common.xmpp.Message(to=fjid, body=msgtxt, typ=type_,
|
|
xhtml=xhtml)
|
|
else:
|
|
if subject:
|
|
msg_iq = common.xmpp.Message(to=fjid, body=msgtxt, typ='normal',
|
|
subject=subject, xhtml=xhtml)
|
|
else:
|
|
msg_iq = common.xmpp.Message(to=fjid, body=msgtxt, typ='normal',
|
|
xhtml=xhtml)
|
|
if msgenc:
|
|
msg_iq.setTag(common.xmpp.NS_ENCRYPTED + ' x').setData(msgenc)
|
|
|
|
if form_node:
|
|
msg_iq.addChild(node=form_node)
|
|
|
|
# XEP-0172: user_nickname
|
|
if user_nick:
|
|
msg_iq.setTag('nick', namespace = common.xmpp.NS_NICK).setData(
|
|
user_nick)
|
|
|
|
# TODO: We might want to write a function so we don't need to
|
|
# reproduce that ugly if somewhere else.
|
|
if resource:
|
|
contact = gajim.contacts.get_contact(self.name, jid, resource)
|
|
else:
|
|
contact = gajim.contacts.get_contact_with_highest_priority(self.name,
|
|
jid)
|
|
|
|
# chatstates - if peer supports xep85 or xep22, send chatstates
|
|
# please note that the only valid tag inside a message containing a <body>
|
|
# tag is the active event
|
|
if chatstate is not None:
|
|
# XXX: Once we have fallback to disco,
|
|
# remove notexistant check
|
|
if ((composing_xep == 'XEP-0085' or not composing_xep) \
|
|
and composing_xep != 'asked_once') or \
|
|
(gajim.capscache.is_supported(contact,
|
|
common.xmpp.NS_CHATSTATES) and \
|
|
not gajim.capscache.is_supported(contact,
|
|
'notexistant')):
|
|
# XEP-0085
|
|
msg_iq.setTag(chatstate, namespace=common.xmpp.NS_CHATSTATES)
|
|
if composing_xep in ('XEP-0022', 'asked_once') or \
|
|
not composing_xep:
|
|
# XEP-0022
|
|
chatstate_node = msg_iq.setTag('x', namespace=common.xmpp.NS_EVENT)
|
|
if chatstate is 'composing' or msgtxt:
|
|
chatstate_node.addChild(name='composing')
|
|
|
|
if forward_from:
|
|
addresses = msg_iq.addChild('addresses',
|
|
namespace=common.xmpp.NS_ADDRESS)
|
|
addresses.addChild('address', attrs = {'type': 'ofrom',
|
|
'jid': forward_from})
|
|
|
|
# XEP-0203
|
|
if delayed:
|
|
our_jid = gajim.get_jid_from_account(self.name) + '/' + \
|
|
self.server_resource
|
|
timestamp = time.strftime('%Y-%m-%dT%H:%M:%SZ', time.gmtime(delayed))
|
|
msg_iq.addChild('delay', namespace=common.xmpp.NS_DELAY2,
|
|
attrs={'from': our_jid, 'stamp': timestamp})
|
|
|
|
# XEP-0184
|
|
if msgtxt and gajim.config.get_per('accounts', self.name,
|
|
'request_receipt') and gajim.capscache.is_supported(contact,
|
|
common.xmpp.NS_RECEIPTS):
|
|
msg_iq.setTag('request', namespace=common.xmpp.NS_RECEIPTS)
|
|
|
|
if session:
|
|
# XEP-0201
|
|
session.last_send = time.time()
|
|
msg_iq.setThread(session.thread_id)
|
|
|
|
# XEP-0200
|
|
if session.enable_encryption:
|
|
msg_iq = session.encrypt_stanza(msg_iq)
|
|
|
|
msg_id = self.connection.send(msg_iq)
|
|
if not forward_from and session and session.is_loggable():
|
|
ji = gajim.get_jid_without_resource(jid)
|
|
if gajim.config.should_log(self.name, ji):
|
|
log_msg = msg
|
|
if original_message is not None:
|
|
log_msg = original_message
|
|
if subject:
|
|
log_msg = _('Subject: %(subject)s\n%(message)s') % \
|
|
{'subject': subject, 'message': msg}
|
|
if log_msg:
|
|
if type_ == 'chat':
|
|
kind = 'chat_msg_sent'
|
|
else:
|
|
kind = 'single_msg_sent'
|
|
try:
|
|
gajim.logger.write(kind, jid, log_msg)
|
|
except exceptions.PysqliteOperationalError, e:
|
|
self.dispatch('ERROR', (_('Disk Write Error'), str(e)))
|
|
except exceptions.DatabaseMalformed:
|
|
pritext = _('Database Error')
|
|
sectext = _('The database file (%s) cannot be read. Try to '
|
|
'repair it (see http://trac.gajim.org/wiki/DatabaseBackup)'
|
|
' or remove it (all history will be lost).') % \
|
|
common.logger.LOG_DB_PATH
|
|
self.dispatch('MSGSENT', (jid, msg, keyID))
|
|
|
|
if callback:
|
|
callback(msg_id, *callback_args)
|
|
|
|
def send_stanza(self, stanza):
|
|
''' send a stanza untouched '''
|
|
if not self.connection:
|
|
return
|
|
self.connection.send(stanza)
|
|
|
|
def ack_subscribed(self, jid):
|
|
if not self.connection:
|
|
return
|
|
log.debug('ack\'ing subscription complete for %s' % jid)
|
|
p = common.xmpp.Presence(jid, 'subscribe')
|
|
self.connection.send(p)
|
|
|
|
def ack_unsubscribed(self, jid):
|
|
if not self.connection:
|
|
return
|
|
log.debug('ack\'ing unsubscription complete for %s' % jid)
|
|
p = common.xmpp.Presence(jid, 'unsubscribe')
|
|
self.connection.send(p)
|
|
|
|
def request_subscription(self, jid, msg = '', name = '', groups = [],
|
|
auto_auth = False, user_nick = ''):
|
|
if not self.connection:
|
|
return
|
|
log.debug('subscription request for %s' % jid)
|
|
if auto_auth:
|
|
self.jids_for_auto_auth.append(jid)
|
|
# RFC 3921 section 8.2
|
|
infos = {'jid': jid}
|
|
if name:
|
|
infos['name'] = name
|
|
iq = common.xmpp.Iq('set', common.xmpp.NS_ROSTER)
|
|
q = iq.getTag('query')
|
|
item = q.addChild('item', attrs = infos)
|
|
for g in groups:
|
|
item.addChild('group').setData(g)
|
|
self.connection.send(iq)
|
|
|
|
p = common.xmpp.Presence(jid, 'subscribe')
|
|
if user_nick:
|
|
p.setTag('nick', namespace = common.xmpp.NS_NICK).setData(user_nick)
|
|
p = self.add_sha(p)
|
|
if msg:
|
|
p.setStatus(msg)
|
|
self.connection.send(p)
|
|
|
|
def send_authorization(self, jid):
|
|
if not self.connection:
|
|
return
|
|
p = common.xmpp.Presence(jid, 'subscribed')
|
|
p = self.add_sha(p)
|
|
self.connection.send(p)
|
|
|
|
def refuse_authorization(self, jid):
|
|
if not self.connection:
|
|
return
|
|
p = common.xmpp.Presence(jid, 'unsubscribed')
|
|
p = self.add_sha(p)
|
|
self.connection.send(p)
|
|
|
|
def unsubscribe(self, jid, remove_auth = True):
|
|
if not self.connection:
|
|
return
|
|
if remove_auth:
|
|
self.connection.getRoster().delItem(jid)
|
|
jid_list = gajim.config.get_per('contacts')
|
|
for j in jid_list:
|
|
if j.startswith(jid):
|
|
gajim.config.del_per('contacts', j)
|
|
else:
|
|
self.connection.getRoster().Unsubscribe(jid)
|
|
self.update_contact(jid, '', [])
|
|
|
|
def unsubscribe_agent(self, agent):
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq('set', common.xmpp.NS_REGISTER, to = agent)
|
|
iq.getTag('query').setTag('remove')
|
|
id_ = self.connection.getAnID()
|
|
iq.setID(id_)
|
|
self.awaiting_answers[id_] = (AGENT_REMOVED, agent)
|
|
self.connection.send(iq)
|
|
self.connection.getRoster().delItem(agent)
|
|
|
|
def update_contact(self, jid, name, groups):
|
|
'''update roster item on jabber server'''
|
|
if self.connection:
|
|
self.connection.getRoster().setItem(jid = jid, name = name,
|
|
groups = groups)
|
|
|
|
def send_new_account_infos(self, form, is_form):
|
|
if is_form:
|
|
# Get username and password and put them in new_account_info
|
|
for field in form.iter_fields():
|
|
if field.var == 'username':
|
|
self.new_account_info['name'] = field.value
|
|
if field.var == 'password':
|
|
self.new_account_info['password'] = field.value
|
|
else:
|
|
# Get username and password and put them in new_account_info
|
|
if 'username' in form:
|
|
self.new_account_info['name'] = form['username']
|
|
if 'password' in form:
|
|
self.new_account_info['password'] = form['password']
|
|
self.new_account_form = form
|
|
self.new_account(self.name, self.new_account_info)
|
|
|
|
def new_account(self, name, config, sync = False):
|
|
# If a connection already exist we cannot create a new account
|
|
if self.connection:
|
|
return
|
|
self._hostname = config['hostname']
|
|
self.new_account_info = config
|
|
self.name = name
|
|
self.on_connect_success = self._on_new_account
|
|
self.on_connect_failure = self._on_new_account
|
|
self.connect(config)
|
|
|
|
def _on_new_account(self, con = None, con_type = None):
|
|
if not con_type:
|
|
if len(self._connection_types) or len(self._hosts):
|
|
# There are still other way to try to connect
|
|
return
|
|
self.dispatch('NEW_ACC_NOT_CONNECTED',
|
|
(_('Could not connect to "%s"') % self._hostname))
|
|
return
|
|
self.on_connect_failure = None
|
|
self.connection = con
|
|
common.xmpp.features_nb.getRegInfo(con, self._hostname)
|
|
|
|
def account_changed(self, new_name):
|
|
self.name = new_name
|
|
|
|
def request_last_status_time(self, jid, resource, groupchat_jid=None):
|
|
'''groupchat_jid is used when we want to send a request to a real jid
|
|
and act as if the answer comes from the groupchat_jid'''
|
|
if not self.connection:
|
|
return
|
|
to_whom_jid = jid
|
|
if resource:
|
|
to_whom_jid += '/' + resource
|
|
iq = common.xmpp.Iq(to = to_whom_jid, typ = 'get', queryNS =\
|
|
common.xmpp.NS_LAST)
|
|
id_ = self.connection.getAnID()
|
|
iq.setID(id_)
|
|
if groupchat_jid:
|
|
self.groupchat_jids[id_] = groupchat_jid
|
|
self.last_ids.append(id_)
|
|
self.connection.send(iq)
|
|
|
|
def request_os_info(self, jid, resource, groupchat_jid=None):
|
|
'''groupchat_jid is used when we want to send a request to a real jid
|
|
and act as if the answer comes from the groupchat_jid'''
|
|
if not self.connection:
|
|
return
|
|
# If we are invisible, do not request
|
|
if self.connected == gajim.SHOW_LIST.index('invisible'):
|
|
self.dispatch('OS_INFO', (jid, resource, _('Not fetched because of invisible status'), _('Not fetched because of invisible status')))
|
|
return
|
|
to_whom_jid = jid
|
|
if resource:
|
|
to_whom_jid += '/' + resource
|
|
iq = common.xmpp.Iq(to=to_whom_jid, typ='get', queryNS=\
|
|
common.xmpp.NS_VERSION)
|
|
id_ = self.connection.getAnID()
|
|
iq.setID(id_)
|
|
if groupchat_jid:
|
|
self.groupchat_jids[id_] = groupchat_jid
|
|
self.version_ids.append(id_)
|
|
self.connection.send(iq)
|
|
|
|
def request_entity_time(self, jid, resource, groupchat_jid=None):
|
|
'''groupchat_jid is used when we want to send a request to a real jid
|
|
and act as if the answer comes from the groupchat_jid'''
|
|
if not self.connection:
|
|
return
|
|
# If we are invisible, do not request
|
|
if self.connected == gajim.SHOW_LIST.index('invisible'):
|
|
self.dispatch('ENTITY_TIME', (jid, resource, _('Not fetched because of invisible status')))
|
|
return
|
|
to_whom_jid = jid
|
|
if resource:
|
|
to_whom_jid += '/' + resource
|
|
iq = common.xmpp.Iq(to=to_whom_jid, typ='get', queryNS=\
|
|
common.xmpp.NS_TIME_REVISED)
|
|
id_ = self.connection.getAnID()
|
|
iq.setID(id_)
|
|
if groupchat_jid:
|
|
self.groupchat_jids[id_] = groupchat_jid
|
|
self.entity_time_ids.append(id_)
|
|
self.connection.send(iq)
|
|
|
|
def get_settings(self):
|
|
''' Get Gajim settings as described in XEP 0049 '''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='get')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq2.addChild(name='gajim', namespace='gajim:prefs')
|
|
self.connection.send(iq)
|
|
|
|
def get_bookmarks(self):
|
|
'''Get Bookmarks from storage as described in XEP 0048'''
|
|
self.bookmarks = [] #avoid multiple bookmarks when re-connecting
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='get')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq2.addChild(name='storage', namespace='storage:bookmarks')
|
|
self.connection.send(iq)
|
|
|
|
def store_bookmarks(self):
|
|
''' Send bookmarks to the storage namespace '''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='set')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq3 = iq2.addChild(name='storage', namespace='storage:bookmarks')
|
|
for bm in self.bookmarks:
|
|
iq4 = iq3.addChild(name = "conference")
|
|
iq4.setAttr('jid', bm['jid'])
|
|
iq4.setAttr('autojoin', bm['autojoin'])
|
|
iq4.setAttr('minimize', bm['minimize'])
|
|
iq4.setAttr('name', bm['name'])
|
|
# Only add optional elements if not empty
|
|
# Note: need to handle both None and '' as empty
|
|
# thus shouldn't use "is not None"
|
|
if bm.get('nick', None):
|
|
iq4.setTagData('nick', bm['nick'])
|
|
if bm.get('password', None):
|
|
iq4.setTagData('password', bm['password'])
|
|
if bm.get('print_status', None):
|
|
iq4.setTagData('print_status', bm['print_status'])
|
|
self.connection.send(iq)
|
|
|
|
def get_annotations(self):
|
|
'''Get Annonations from storage as described in XEP 0048, and XEP 0145'''
|
|
self.annotations = {}
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='get')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq2.addChild(name='storage', namespace='storage:rosternotes')
|
|
self.connection.send(iq)
|
|
|
|
def store_annotations(self):
|
|
'''Set Annonations in private storage as described in XEP 0048, and XEP 0145'''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='set')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq3 = iq2.addChild(name='storage', namespace='storage:rosternotes')
|
|
for jid in self.annotations.keys():
|
|
if self.annotations[jid]:
|
|
iq4 = iq3.addChild(name = "note")
|
|
iq4.setAttr('jid', jid)
|
|
iq4.setData(self.annotations[jid])
|
|
self.connection.send(iq)
|
|
|
|
|
|
def get_metacontacts(self):
|
|
'''Get metacontacts list from storage as described in XEP 0049'''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='get')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq2.addChild(name='storage', namespace='storage:metacontacts')
|
|
id_ = self.connection.getAnID()
|
|
iq.setID(id_)
|
|
self.awaiting_answers[id_] = (METACONTACTS_ARRIVED, )
|
|
self.connection.send(iq)
|
|
|
|
def store_metacontacts(self, tags_list):
|
|
''' Send meta contacts to the storage namespace '''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ='set')
|
|
iq2 = iq.addChild(name='query', namespace=common.xmpp.NS_PRIVATE)
|
|
iq3 = iq2.addChild(name='storage', namespace='storage:metacontacts')
|
|
for tag in tags_list:
|
|
for data in tags_list[tag]:
|
|
jid = data['jid']
|
|
dict_ = {'jid': jid, 'tag': tag}
|
|
if 'order' in data:
|
|
dict_['order'] = data['order']
|
|
iq3.addChild(name = 'meta', attrs = dict_)
|
|
self.connection.send(iq)
|
|
|
|
def send_agent_status(self, agent, ptype):
|
|
if not self.connection:
|
|
return
|
|
show = helpers.get_xmpp_show(gajim.SHOW_LIST[self.connected])
|
|
p = common.xmpp.Presence(to = agent, typ = ptype, show = show)
|
|
p = self.add_sha(p, ptype != 'unavailable')
|
|
self.connection.send(p)
|
|
|
|
def check_unique_room_id_support(self, server, instance):
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'get', to = server)
|
|
iq.setAttr('id', 'unique1')
|
|
iq.addChild('unique', namespace=common.xmpp.NS_MUC_UNIQUE)
|
|
def _on_response(resp):
|
|
if not common.xmpp.isResultNode(resp):
|
|
self.dispatch('UNIQUE_ROOM_ID_UNSUPPORTED', (server, instance))
|
|
return
|
|
self.dispatch('UNIQUE_ROOM_ID_SUPPORTED', (server, instance,
|
|
resp.getTag('unique').getData()))
|
|
self.connection.SendAndCallForResponse(iq, _on_response)
|
|
|
|
def join_gc(self, nick, room_jid, password):
|
|
# FIXME: This room JID needs to be normalized; see #1364
|
|
if not self.connection:
|
|
return
|
|
show = helpers.get_xmpp_show(gajim.SHOW_LIST[self.connected])
|
|
if show == 'invisible':
|
|
# Never join a room when invisible
|
|
return
|
|
p = common.xmpp.Presence(to = '%s/%s' % (room_jid, nick),
|
|
show = show, status = self.status)
|
|
if gajim.config.get('send_sha_in_gc_presence'):
|
|
p = self.add_sha(p)
|
|
self.add_lang(p)
|
|
t = p.setTag(common.xmpp.NS_MUC + ' x')
|
|
if password:
|
|
t.setTagData('password', password)
|
|
self.connection.send(p)
|
|
|
|
# last date/time in history to avoid duplicate
|
|
if room_jid not in self.last_history_time:
|
|
# Not in memory, get it from DB
|
|
last_log = None
|
|
# Do not check if we are not logging for this room
|
|
if gajim.config.should_log(self.name, room_jid):
|
|
# Check time first in the FAST table
|
|
last_log = gajim.logger.get_room_last_message_time(room_jid)
|
|
if last_log is None:
|
|
# Not in special table, get it from messages DB
|
|
last_log = gajim.logger.get_last_date_that_has_logs(room_jid,
|
|
is_room = True)
|
|
# Create self.last_history_time[room_jid] even if not logging,
|
|
# could be used in connection_handlers
|
|
if last_log is None:
|
|
last_log = 0
|
|
self.last_history_time[room_jid]= last_log
|
|
|
|
def send_gc_message(self, jid, msg, xhtml = None):
|
|
if not self.connection:
|
|
return
|
|
if not xhtml and gajim.config.get('rst_formatting_outgoing_messages'):
|
|
from common.rst_xhtml_generator import create_xhtml
|
|
xhtml = create_xhtml(msg)
|
|
msg_iq = common.xmpp.Message(jid, msg, typ = 'groupchat', xhtml = xhtml)
|
|
self.connection.send(msg_iq)
|
|
self.dispatch('MSGSENT', (jid, msg))
|
|
|
|
def send_gc_subject(self, jid, subject):
|
|
if not self.connection:
|
|
return
|
|
msg_iq = common.xmpp.Message(jid,typ = 'groupchat', subject = subject)
|
|
self.connection.send(msg_iq)
|
|
|
|
def request_gc_config(self, room_jid):
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'get', queryNS = common.xmpp.NS_MUC_OWNER,
|
|
to = room_jid)
|
|
self.add_lang(iq)
|
|
self.connection.send(iq)
|
|
|
|
def destroy_gc_room(self, room_jid, reason = '', jid = ''):
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'set', queryNS = common.xmpp.NS_MUC_OWNER,
|
|
to = room_jid)
|
|
destroy = iq.getTag('query').setTag('destroy')
|
|
if reason:
|
|
destroy.setTagData('reason', reason)
|
|
if jid:
|
|
destroy.setAttr('jid', jid)
|
|
self.connection.send(iq)
|
|
|
|
def send_gc_status(self, nick, jid, show, status):
|
|
if not gajim.account_is_connected(self.name):
|
|
return
|
|
if show == 'invisible':
|
|
show = 'offline'
|
|
ptype = None
|
|
if show == 'offline':
|
|
ptype = 'unavailable'
|
|
xmpp_show = helpers.get_xmpp_show(show)
|
|
p = common.xmpp.Presence(to = '%s/%s' % (jid, nick), typ = ptype,
|
|
show = xmpp_show, status = status)
|
|
if gajim.config.get('send_sha_in_gc_presence') and show != 'offline':
|
|
p = self.add_sha(p, ptype != 'unavailable')
|
|
self.add_lang(p)
|
|
# send instantly so when we go offline, status is sent to gc before we
|
|
# disconnect from jabber server
|
|
self.connection.send(p)
|
|
|
|
def gc_got_disconnected(self, room_jid):
|
|
''' A groupchat got disconnected. This can be or purpose or not.
|
|
Save the time we quit to avoid duplicate logs AND be faster than get that
|
|
date from DB. Save it in mem AND in a small table (with fast access)
|
|
'''
|
|
log_time = time_time()
|
|
self.last_history_time[room_jid] = log_time
|
|
gajim.logger.set_room_last_message_time(room_jid, log_time)
|
|
|
|
def gc_set_role(self, room_jid, nick, role, reason = ''):
|
|
'''role is for all the life of the room so it's based on nick'''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'set', to = room_jid, queryNS =\
|
|
common.xmpp.NS_MUC_ADMIN)
|
|
item = iq.getTag('query').setTag('item')
|
|
item.setAttr('nick', nick)
|
|
item.setAttr('role', role)
|
|
if reason:
|
|
item.addChild(name = 'reason', payload = reason)
|
|
self.connection.send(iq)
|
|
|
|
def gc_set_affiliation(self, room_jid, jid, affiliation, reason = ''):
|
|
'''affiliation is for all the life of the room so it's based on jid'''
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'set', to = room_jid, queryNS =\
|
|
common.xmpp.NS_MUC_ADMIN)
|
|
item = iq.getTag('query').setTag('item')
|
|
item.setAttr('jid', jid)
|
|
item.setAttr('affiliation', affiliation)
|
|
if reason:
|
|
item.addChild(name = 'reason', payload = reason)
|
|
self.connection.send(iq)
|
|
|
|
def send_gc_affiliation_list(self, room_jid, users_dict):
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'set', to = room_jid, queryNS = \
|
|
common.xmpp.NS_MUC_ADMIN)
|
|
item = iq.getTag('query')
|
|
for jid in users_dict:
|
|
item_tag = item.addChild('item', {'jid': jid,
|
|
'affiliation': users_dict[jid]['affiliation']})
|
|
if 'reason' in users_dict[jid] and users_dict[jid]['reason']:
|
|
item_tag.setTagData('reason', users_dict[jid]['reason'])
|
|
self.connection.send(iq)
|
|
|
|
def get_affiliation_list(self, room_jid, affiliation):
|
|
if not self.connection:
|
|
return
|
|
iq = common.xmpp.Iq(typ = 'get', to = room_jid, queryNS = \
|
|
common.xmpp.NS_MUC_ADMIN)
|
|
item = iq.getTag('query').setTag('item')
|
|
item.setAttr('affiliation', affiliation)
|
|
self.connection.send(iq)
|
|
|
|
def send_gc_config(self, room_jid, form):
|
|
iq = common.xmpp.Iq(typ = 'set', to = room_jid, queryNS =\
|
|
common.xmpp.NS_MUC_OWNER)
|
|
query = iq.getTag('query')
|
|
form.setAttr('type', 'submit')
|
|
query.addChild(node = form)
|
|
self.connection.send(iq)
|
|
|
|
def gpg_passphrase(self, passphrase):
|
|
if self.gpg:
|
|
use_gpg_agent = gajim.config.get('use_gpg_agent')
|
|
if use_gpg_agent:
|
|
self.gpg.passphrase = None
|
|
else:
|
|
self.gpg.passphrase = passphrase
|
|
|
|
def ask_gpg_keys(self):
|
|
if self.gpg:
|
|
keys = self.gpg.get_keys()
|
|
return keys
|
|
return None
|
|
|
|
def ask_gpg_secrete_keys(self):
|
|
if self.gpg:
|
|
keys = self.gpg.get_secret_keys()
|
|
return keys
|
|
return None
|
|
|
|
def change_password(self, password):
|
|
if not self.connection:
|
|
return
|
|
hostname = gajim.config.get_per('accounts', self.name, 'hostname')
|
|
username = gajim.config.get_per('accounts', self.name, 'name')
|
|
iq = common.xmpp.Iq(typ = 'set', to = hostname)
|
|
q = iq.setTag(common.xmpp.NS_REGISTER + ' query')
|
|
q.setTagData('username',username)
|
|
q.setTagData('password',password)
|
|
self.connection.send(iq)
|
|
|
|
def get_password(self, callback):
|
|
if self.password:
|
|
callback(self.password)
|
|
return
|
|
self.pasword_callback = callback
|
|
self.dispatch('PASSWORD_REQUIRED', None)
|
|
|
|
def set_password(self, password):
|
|
self.password = password
|
|
if self.pasword_callback:
|
|
self.pasword_callback(password)
|
|
self.pasword_callback = None
|
|
|
|
def unregister_account(self, on_remove_success):
|
|
# no need to write this as a class method and keep the value of
|
|
# on_remove_success as a class property as pass it as an argument
|
|
def _on_unregister_account_connect(con):
|
|
self.on_connect_auth = None
|
|
if gajim.account_is_connected(self.name):
|
|
hostname = gajim.config.get_per('accounts', self.name, 'hostname')
|
|
iq = common.xmpp.Iq(typ = 'set', to = hostname)
|
|
iq.setTag(common.xmpp.NS_REGISTER + ' query').setTag('remove')
|
|
con.send(iq)
|
|
on_remove_success(True)
|
|
return
|
|
on_remove_success(False)
|
|
if self.connected == 0:
|
|
self.on_connect_auth = _on_unregister_account_connect
|
|
self.connect_and_auth()
|
|
else:
|
|
_on_unregister_account_connect(self.connection)
|
|
|
|
def send_invite(self, room, to, reason='', continue_tag=False):
|
|
'''sends invitation'''
|
|
message=common.xmpp.Message(to = room)
|
|
c = message.addChild(name = 'x', namespace = common.xmpp.NS_MUC_USER)
|
|
c = c.addChild(name = 'invite', attrs={'to' : to})
|
|
if continue_tag:
|
|
c.addChild(name = 'continue')
|
|
if reason != '':
|
|
c.setTagData('reason', reason)
|
|
self.connection.send(message)
|
|
|
|
def check_keepalive(self):
|
|
if self.awaiting_xmpp_ping_id:
|
|
# We haven't got the pong in time, disco and reconnect
|
|
self._disconnectedReconnCB()
|
|
|
|
def _reconnect_alarm(self):
|
|
if self.time_to_reconnect:
|
|
if self.connected < 2:
|
|
self._reconnect()
|
|
else:
|
|
self.time_to_reconnect = None
|
|
|
|
def request_search_fields(self, jid):
|
|
iq = common.xmpp.Iq(typ = 'get', to = jid, queryNS = \
|
|
common.xmpp.NS_SEARCH)
|
|
self.connection.send(iq)
|
|
|
|
def send_search_form(self, jid, form, is_form):
|
|
iq = common.xmpp.Iq(typ = 'set', to = jid, queryNS = \
|
|
common.xmpp.NS_SEARCH)
|
|
item = iq.getTag('query')
|
|
if is_form:
|
|
item.addChild(node = form)
|
|
else:
|
|
for i in form.keys():
|
|
item.setTagData(i,form[i])
|
|
def _on_response(resp):
|
|
jid = jid = helpers.get_jid_from_iq(resp)
|
|
tag = resp.getTag('query', namespace = common.xmpp.NS_SEARCH)
|
|
if not tag:
|
|
self.dispatch('SEARCH_RESULT', (jid, None, False))
|
|
return
|
|
df = tag.getTag('x', namespace = common.xmpp.NS_DATA)
|
|
if df:
|
|
self.dispatch('SEARCH_RESULT', (jid, df, True))
|
|
return
|
|
df = []
|
|
for item in tag.getTags('item'):
|
|
# We also show attributes. jid is there
|
|
f = item.attrs
|
|
for i in item.getPayload():
|
|
f[i.getName()] = i.getData()
|
|
df.append(f)
|
|
self.dispatch('SEARCH_RESULT', (jid, df, False))
|
|
|
|
self.connection.SendAndCallForResponse(iq, _on_response)
|
|
|
|
# END Connection
|
|
|
|
# vim: se ts=3:
|