master
emdee 2 years ago
parent f30a1038ad
commit f83d1c97b9

@ -1,48 +1,51 @@
# -*- mode: python; indent-tabs-mode: nil; py-indent-offset: 4; coding: utf-8 -*- # -*- mode: python; indent-tabs-mode: nil; py-indent-offset: 4; coding: utf-8 -*-
import sys import ctypes
import logging
import os import os
import socket
import select
import re
import pickle import pickle
import logging import re
import ctypes import select
import socket
import sys
import traceback import traceback
from time import sleep
from threading import Thread
from random import shuffle
from errno import errorcode from errno import errorcode
from OpenSSL import SSL from random import shuffle
from time import sleep
import warnings from OpenSSL import SSL
warnings.filterwarnings('ignore')
import wrapper import wrapper
import wrapper.toxcore_enums_and_consts as enums
import wrapper_tests import wrapper_tests
from wrapper.tox import Tox from wrapper.tox import Tox
from wrapper.toxav import ToxAV from wrapper.toxav import ToxAV
import wrapper.toxcore_enums_and_consts as enums from wrapper.toxcore_enums_and_consts import (TOX_ADDRESS_SIZE, TOX_CONNECTION,
from wrapper.toxcore_enums_and_consts import \ TOX_FILE_CONTROL,
TOX_CONNECTION, TOX_USER_STATUS, TOX_MESSAGE_TYPE, \ TOX_GROUP_PRIVACY_STATE,
TOX_SECRET_KEY_SIZE, TOX_FILE_CONTROL, TOX_ADDRESS_SIZE, \ TOX_GROUP_ROLE, TOX_MESSAGE_TYPE,
TOX_GROUP_PRIVACY_STATE, TOX_GROUP_ROLE TOX_SECRET_KEY_SIZE,
TOX_USER_STATUS)
from wrapper_tests import socks from wrapper_tests import socks
try: try:
import support_testing as ts import support_testing as ts
except ImportError: except ImportError:
import wrapper_tests.support_testing as ts import wrapper_tests.support_testing as ts
import wrapper.toxencryptsave as tox_encrypt_save
import wrapper.toxencryptsave as tox_encrypt_save
global LOG global LOG
LOG = logging.getLogger('app.'+'ts') LOG = logging.getLogger('app.'+'ts')
import warnings
warnings.filterwarnings('ignore')
class SyniToxError(BaseException): pass class SyniToxError(BaseException): pass
NAME = 'SyniTox' NAME = 'SyniTox'
sMSG = 'MSG' sMSG = 'MSG'
sMSG = 'PRIVMSG'
SSL_TOR_RANGE = '172.' SSL_TOR_RANGE = '172.'
# possible CA locations picks the first one # possible CA locations picks the first one
lCAs = [# debian and gentoo lCAs = [# debian and gentoo
@ -138,10 +141,10 @@ class SyniTox(Tox):
opts = oTOX_OPTIONS opts = oTOX_OPTIONS
self._opts = opts self._opts = opts
self._oArgs = oArgs self._oargs = oArgs
# self._oArgs.profile # self._oargs.profile
self.load_profile(self._opts, self._oArgs, self._oArgs.password) self.load_profile(self._opts, self._oargs, self._oargs.password)
Tox.__init__(self, tox_options=self._opts) Tox.__init__(self, tox_options=self._opts)
self._address = self.self_get_address() self._address = self.self_get_address()
@ -170,7 +173,6 @@ class SyniTox(Tox):
def load_profile(self, tox_options, oArgs, password=''): def load_profile(self, tox_options, oArgs, password=''):
if oArgs.profile and os.path.exists(oArgs.profile): if oArgs.profile and os.path.exists(oArgs.profile):
data = open(oArgs.profile, 'rb').read() data = open(oArgs.profile, 'rb').read()
else: else:
data = None data = None
if data and self.has_password(): if data and self.has_password():
@ -191,20 +193,20 @@ class SyniTox(Tox):
data = self.pass_encrypt(data) data = self.pass_encrypt(data)
try: try:
suf = f"{os.getpid()}" suf = f"{os.getpid()}"
with open(self._oArgs.profile+suf, 'wb') as fl: with open(self._oargs.profile+suf, 'wb') as fl:
fl.write(data) fl.write(data)
stat = os.stat(self._oArgs.profile+suf) stat = os.stat(self._oargs.profile+suf)
if hasattr(stat, 'st_blocks'): if hasattr(stat, 'st_blocks'):
assert stat.st_blocks > 0, f"Zero length file {self._oArgs.profile+suf}" assert stat.st_blocks > 0, f"Zero length file {self._oargs.profile+suf}"
os.rename(self._oArgs.profile+suf, self._oArgs.profile) os.rename(self._oargs.profile+suf, self._oargs.profile)
LOG.info('Profile saved successfully to' +self._oArgs.profile) LOG.info('Profile saved successfully to' +self._oargs.profile)
except Exception as e: except Exception as e:
LOG.warn(f"Profile save failed to {self._oArgs.profile}\n{e}") LOG.warn(f"Profile save failed to {self._oargs.profile}\n{e}")
def start(self): def start(self):
self._tox = self self._tox = self
self._toxes = tox_encrypt_save.ToxEncryptSave() self._toxes = tox_encrypt_save.ToxEncryptSave()
self.self_set_name(self._oArgs.bot_name) self.self_set_name(self._oargs.bot_name)
self.self_set_status_message("Send me a message with the word 'invite'") self.self_set_status_message("Send me a message with the word 'invite'")
LOG.info('Our ToxID: %s' % self.self_get_toxid()) LOG.info('Our ToxID: %s' % self.self_get_toxid())
@ -220,17 +222,17 @@ class SyniTox(Tox):
try: try:
OP_NO_TLSv1_3 = SSL._lib.SSL_OP_NO_TLSv1_3 OP_NO_TLSv1_3 = SSL._lib.SSL_OP_NO_TLSv1_3
except AttributeError: except AttributeError:
if self._oArgs.irc_ssl == 'tlsv1.3': if self._oargs.irc_ssl == 'tlsv1.3':
LOG.warning("SSL._lib.SSL_OP_NO_TLSv1_3 is not supported") LOG.warning("SSL._lib.SSL_OP_NO_TLSv1_3 is not supported")
LOG.warning("Downgrading SSL to tlsv1.2 ") LOG.warning("Downgrading SSL to tlsv1.2 ")
self._oArgs.irc_ssl = 'tlsv1.2' self._oargs.irc_ssl = 'tlsv1.2'
else: else:
LOG.debug("SSL._lib.SSL_OP_NO_TLSv1_3 is not supported") LOG.debug("SSL._lib.SSL_OP_NO_TLSv1_3 is not supported")
else: else:
LOG.debug("SSL._lib.SSL_OP_NO_TLSv1_3 is supported") LOG.debug("SSL._lib.SSL_OP_NO_TLSv1_3 is supported")
if self._oArgs.irc_connect.endswith('.onion') or \ if self._oargs.irc_connect.endswith('.onion') or \
self._oArgs.irc_connect.startswith(SSL_TOR_RANGE): self._oargs.irc_connect.startswith(SSL_TOR_RANGE):
override = True override = True
else: else:
override = False override = False
@ -239,17 +241,17 @@ class SyniTox(Tox):
# SSL.OP_NO_TLSv1_1 is allowed # SSL.OP_NO_TLSv1_1 is allowed
context.set_options(SSL.OP_NO_SSLv2|SSL.OP_NO_SSLv3|SSL.OP_NO_TLSv1) context.set_options(SSL.OP_NO_SSLv2|SSL.OP_NO_SSLv3|SSL.OP_NO_TLSv1)
if self._oArgs.irc_crt and self._oArgs.irc_key: if self._oargs.irc_crt and self._oargs.irc_key:
assert os.path.exists(key), key
val = SSL.VERIFY_PEER | SSL.VERIFY_FAIL_IF_NO_PEER_CERT val = SSL.VERIFY_PEER | SSL.VERIFY_FAIL_IF_NO_PEER_CERT
LOG.info('Using keyfile: %s' % key)
if True: # required! if True: # required!
key = self._oArgs.irc_crt key = self._oargs.irc_crt
assert os.path.exists(key), key assert os.path.exists(key), key
LOG.info('Using keyfile: %s' % key)
context.use_certificate_file(key, filetype=SSL.FILETYPE_PEM) context.use_certificate_file(key, filetype=SSL.FILETYPE_PEM)
if True: # required! if True: # required!
key = self._oArgs.irc_key key = self._oargs.irc_key
assert os.path.exists(key), key assert os.path.exists(key), key
LOG.info('Using keyfile: %s' % key)
context.use_privatekey_file(key, filetype=SSL.FILETYPE_PEM) context.use_privatekey_file(key, filetype=SSL.FILETYPE_PEM)
#? load_client_ca #? load_client_ca
def SSL_hands_cb(oConn,iLine,iRet): def SSL_hands_cb(oConn,iLine,iRet):
@ -264,17 +266,17 @@ class SyniTox(Tox):
val = SSL.VERIFY_PEER val = SSL.VERIFY_PEER
context.set_verify(val, ssl_verify_cb(HOST, override)) context.set_verify(val, ssl_verify_cb(HOST, override))
if self._oArgs.irc_cafile: if self._oargs.irc_cafile:
# context.load_verify_locations(capath=self._oArgs.irc_ca) # context.load_verify_locations(capath=self._oargs.irc_ca)
context.load_verify_locations(self._oArgs.irc_cafile, capath=self._oArgs.irc_cadir) context.load_verify_locations(self._oargs.irc_cafile, capath=self._oargs.irc_cadir)
elif self._oArgs.irc_cadir: elif self._oargs.irc_cadir:
context.load_verify_locations(None, capath=self._oArgs.irc_cadir) context.load_verify_locations(None, capath=self._oargs.irc_cadir)
if self._oArgs.irc_ssl == 'tlsv1.1': if self._oargs.irc_ssl == 'tlsv1.1':
context.set_min_proto_version(SSL.TLS1_1_VERSION) context.set_min_proto_version(SSL.TLS1_1_VERSION)
elif self._oArgs.irc_ssl == 'tlsv1.2': elif self._oargs.irc_ssl == 'tlsv1.2':
context.set_cipher_list(bytes(':'.join(['DEFAULT@SECLEVEL=1']+lOPENSSL_12_CIPHERS), 'UTF-8')) context.set_cipher_list(bytes(':'.join(['DEFAULT@SECLEVEL=1']+lOPENSSL_12_CIPHERS), 'UTF-8'))
context.set_min_proto_version(SSL.TLS1_2_VERSION) context.set_min_proto_version(SSL.TLS1_2_VERSION)
elif self._oArgs.irc_ssl == 'tlsv1.3': elif self._oargs.irc_ssl == 'tlsv1.3':
context.set_cipher_list(bytes(':'.join(['DEFAULT@SECLEVEL=1']+lOPENSSL_13_CIPHERS), 'UTF-8')) context.set_cipher_list(bytes(':'.join(['DEFAULT@SECLEVEL=1']+lOPENSSL_13_CIPHERS), 'UTF-8'))
context.set_min_proto_version(SSL.TLS1_3_VERSION) context.set_min_proto_version(SSL.TLS1_3_VERSION)
self._ssl_context = context self._ssl_context = context
@ -282,7 +284,7 @@ class SyniTox(Tox):
return self._ssl_context return self._ssl_context
def bRouted(self): def bRouted(self):
if self._oArgs.network in ['local']: if self._oargs.network in ['local']:
return True return True
b = ts.bAreWeConnected() b = ts.bAreWeConnected()
if b is None: if b is None:
@ -295,9 +297,9 @@ class SyniTox(Tox):
return b return b
def test_net(self, lElts=None, oThread=None, iMax=4): def test_net(self, lElts=None, oThread=None, iMax=4):
LOG.debug("test_net network=" +self._oArgs.network ) LOG.debug("test_net network=" +self._oargs.network )
# bootstrap # bootstrap
lNodes = ts.generate_nodes(oArgs=self._oArgs, lNodes = ts.generate_nodes(oArgs=self._oargs,
ipv='ipv4', ipv='ipv4',
udp_not_tcp=True) udp_not_tcp=True)
self._settings['current_nodes_udp'] = ts.lDNSClean(lNodes) self._settings['current_nodes_udp'] = ts.lDNSClean(lNodes)
@ -306,7 +308,7 @@ class SyniTox(Tox):
else: else:
LOG.info(f'Called generate_nodes: udp {len(lNodes)}') LOG.info(f'Called generate_nodes: udp {len(lNodes)}')
lNodes = ts.generate_nodes(oArgs=self._oArgs, lNodes = ts.generate_nodes(oArgs=self._oargs,
ipv='ipv4', ipv='ipv4',
udp_not_tcp=False) udp_not_tcp=False)
self._settings['current_nodes_tcp'] = ts.lDNSClean(lNodes) self._settings['current_nodes_tcp'] = ts.lDNSClean(lNodes)
@ -341,8 +343,8 @@ class SyniTox(Tox):
# The code in tests_wrapper need extending and then # The code in tests_wrapper need extending and then
# wiring up to here. # wiring up to here.
# #
if self._oArgs.group_invite: if self._oargs.group_invite:
pk = self._oArgs.group_invite pk = self._oargs.group_invite
if pk not in self.self_get_friend_list(): if pk not in self.self_get_friend_list():
friend_number = self.add_friend(pk) friend_number = self.add_friend(pk)
else: else:
@ -351,8 +353,8 @@ class SyniTox(Tox):
LOG.info(f"A PK to invite to the group {b}") LOG.info(f"A PK to invite to the group {b}")
return True return True
if self._oArgs.group_moderator: if self._oargs.group_moderator:
pk = self._oArgs.group_moderator pk = self._oargs.group_moderator
if pk not in self.self_get_friend_list(): if pk not in self.self_get_friend_list():
friend_number = self.add_friend(pk) friend_number = self.add_friend(pk)
else: else:
@ -364,8 +366,8 @@ class SyniTox(Tox):
LOG.info("A PK to invite to the group as moderator {b}") LOG.info("A PK to invite to the group as moderator {b}")
return True return True
if self._oArgs.group_ignore: if self._oargs.group_ignore:
pk = self._oArgs.group_ignore pk = self._oargs.group_ignore
if pk not in self.self_get_friend_list(): if pk not in self.self_get_friend_list():
friend_number = self.add_friend(pk) friend_number = self.add_friend(pk)
else: else:
@ -379,21 +381,18 @@ class SyniTox(Tox):
return None return None
def create_group(self): def create_group(self):
privacy_state = TOX_GROUP_PRIVACY_STATE[self._oArgs.group_state.upper()] privacy_state = TOX_GROUP_PRIVACY_STATE[self._oargs.group_state.upper()]
nick = self._oArgs.group_nick nick = self._oargs.group_nick
group_name = self._oArgs.group_name
if not group_name:
group_name = self._oArgs.bot_name +self._oArgs.irc_chan
self._oArgs.group_name = group_name
status = TOX_USER_STATUS['NONE'] status = TOX_USER_STATUS['NONE']
group_name = self._oargs.group_name
num = self.group_new(privacy_state, group_name, nick, status) num = self.group_new(privacy_state, group_name, nick, status)
assert num >= 0, num assert num >= 0, num
self.group_set_topic(num, f"{group_name} IRC on {self._oArgs.irc_host}" ) self.group_set_topic(num, f"{group_name} IRC on {self._oargs.irc_host}" )
# self.tox_group_id = self.group_invite_accept(b'', friendid, nick) # self.tox_group_id = self.group_invite_accept(b'', friendid, nick)
chat_id = self.group_get_chat_id(num) chat_id = self.group_get_chat_id(num)
if self._oArgs.profile and os.path.exists(os.path.dirname(self._oArgs.profile)): if self._oargs.profile and os.path.exists(os.path.dirname(self._oargs.profile)):
f = os.path.splitext(self._oArgs.profile)[0] +'.chatid' f = os.path.splitext(self._oargs.profile)[0] +'.chatid'
open(f, 'rt').write(chat_id) open(f, 'rt').write(chat_id)
LOG.info(f"Chat Id: {chat_id} written to {f}") LOG.info(f"Chat Id: {chat_id} written to {f}")
else: else:
@ -401,16 +400,16 @@ class SyniTox(Tox):
# dunno # dunno
if self.self_get_friend_list(): if self.self_get_friend_list():
friendid = self.self_get_friend_list()[0] friendid = self.self_get_friend_list()[0]
i = on_group_invite(friendid, b'', 0) i = self.on_group_invite(friendid, b'', 0)
assert i assert i
self.tox_group_id = i self.tox_group_id = i
return num return num
def join_group(self): def join_group(self):
password = self._oArgs.group_pass password = self._oargs.group_pass
nick = self._oArgs.group_nick nick = self._oargs.group_nick
# is the chat_id the pk? # is the chat_id the pk?
chat_id = self._oArgs.group_chatid chat_id = self._oargs.group_chatid
if not chat_id: return -1 if not chat_id: return -1
num = self.group_join(chat_id, password, nick, status='') num = self.group_join(chat_id, password, nick, status='')
self.sGROUP_BOT_NUM = num self.sGROUP_BOT_NUM = num
@ -418,8 +417,7 @@ class SyniTox(Tox):
return num return num
def init_groups(self): def init_groups(self):
LOG.debug(f"init_groups proxy={self._oArgs.proxy_type}") LOG.debug(f"init_groups proxy={self._oargs.proxy_type}")
group_name = self._oArgs.bot_name +' Test ' +self._oArgs.irc_chan
if not self.bRouted(): return if not self.bRouted(): return
try: try:
if self.sGROUP_BOT_NUM < 0: if self.sGROUP_BOT_NUM < 0:
@ -458,7 +456,7 @@ class SyniTox(Tox):
self.callback_group_invite(gi_wrapped, 0) self.callback_group_invite(gi_wrapped, 0)
def scs_wrapped(iTox, friendid, status, *args): def scs_wrapped(iTox, friendid, status, *args):
LOG.debug(f'on_connection_status {friendId} {status}.') LOG.debug(f'on_connection_status {friendid} {status}.')
self.on_connection_status(friendid, status) self.on_connection_status(friendid, status)
self.callback_self_connection_status(scs_wrapped) self.callback_self_connection_status(scs_wrapped)
@ -505,62 +503,59 @@ class SyniTox(Tox):
LOG.debug(f"{cert.get_subject().CN} {cert.get_issuer()}") LOG.debug(f"{cert.get_subject().CN} {cert.get_issuer()}")
cipher_name = irc.get_cipher_name() cipher_name = irc.get_cipher_name()
if self._oArgs.irc_ssl == 'tlsv1.2': if self._oargs.irc_ssl == 'tlsv1.2':
assert cipher_name in lOPENSSL_12_CIPHERS or \ assert cipher_name in lOPENSSL_12_CIPHERS or \
cipher_name in lOPENSSL_13_CIPHERS, cipher_name cipher_name in lOPENSSL_13_CIPHERS, cipher_name
elif self._oArgs.irc_ssl == 'tlsv1.3': elif self._oargs.irc_ssl == 'tlsv1.3':
assert cipher_name in lOPENSSL_13_CIPHERS, cipher_name assert cipher_name in lOPENSSL_13_CIPHERS, cipher_name
got = irc.get_protocol_version_name().lower() got = irc.get_protocol_version_name().lower()
if got > self._oArgs.irc_ssl: if got > self._oargs.irc_ssl:
LOG.debug(f"Got: {irc.get_protocol_version_name().lower()} asked for {self._oArgs.irc_ssl}") LOG.debug(f"Got: {irc.get_protocol_version_name().lower()} asked for {self._oargs.irc_ssl}")
elif got < self._oArgs.irc_ssl: elif got < self._oargs.irc_ssl:
LOG.warn(f"Got: {irc.get_protocol_version_name().lower()} asked for {self._oArgs.irc_ssl}") LOG.warn(f"Got: {irc.get_protocol_version_name().lower()} asked for {self._oargs.irc_ssl}")
LOG.info(f"diagnose_ciphers {str(irc.get_state_string(), 'UTF-8')}") LOG.info(f"diagnose_ciphers {str(irc.get_state_string(), 'UTF-8')}")
def irc_init(self): def irc_init(self):
global iSocks5Error global iSocks5Error
if not self.bRouted(): return if not self.bRouted(): return
nick = self._oArgs.irc_nick nick = self._oargs.irc_nick
realname = self._oArgs.irc_name realname = self._oargs.irc_name
ident = self._oArgs.irc_ident ident = self._oargs.irc_ident
LOG.info(f"irc_init proxy={self._oArgs.proxy_type} SSL={self._oArgs.irc_ssl}") LOG.info(f"irc_init proxy={self._oargs.proxy_type} SSL={self._oargs.irc_ssl}")
try: try:
if self._oArgs.proxy_type == 2: if self._oargs.proxy_type == 2:
socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5,
self._oArgs.proxy_host, self._oargs.proxy_host,
self._oArgs.proxy_port) self._oargs.proxy_port)
irc = socks.socksocket() irc = socks.socksocket()
iTIMEOUT = 15 iTIMEOUT = 15
elif self._oArgs.proxy_type == 1: elif self._oargs.proxy_type == 1:
socks.setdefaultproxy(socks.PROXY_TYPE_HTTP, socks.setdefaultproxy(socks.PROXY_TYPE_HTTP,
self._oArgs.proxy_host, self._oargs.proxy_host,
self._oArgs.proxy_port) self._oargs.proxy_port)
irc = socks.socksocket() irc = socks.socksocket()
iTIMEOUT = 15 iTIMEOUT = 15
else: else:
irc = socket.socket() irc = socket.socket()
iTIMEOUT = 10 iTIMEOUT = 10
try: try:
ip = ts.sDNSLookup(self._oArgs.irc_connect) ip = ts.sDNSLookup(self._oargs.irc_connect)
except Exception as e: except Exception as e:
LOG.warn(f"{self._oArgs.irc_host} errored in resolve {e}") LOG.warn(f"{self._oargs.irc_host} errored in resolve {e}")
ip = self._oArgs.irc_connect ip = self._oargs.irc_connect
else: else:
if not ip: if not ip:
LOG.warn(f"{self._oArgs.irc_host} did not resolve.") LOG.warn(f"{self._oargs.irc_host} did not resolve.")
ip = self._oArgs.irc_connect ip = self._oargs.irc_connect
# https://github.com/pyca/pyopenssl/issues/168 # https://github.com/pyca/pyopenssl/issues/168
if self._oArgs.irc_ssl: if self._oargs.irc_ssl:
if not self._ssl_context: if not self._ssl_context:
self.start_ssl(self._oArgs.irc_connect) self.start_ssl(self._oargs.irc_connect)
irc = SSL.Connection(self._ssl_context, irc) irc = SSL.Connection(self._ssl_context, irc)
irc.connect((ip, self._oArgs.irc_port)) irc.connect((ip, self._oargs.irc_port))
if ip.endswith('.onion'): irc.set_tlsext_host_name(bytes(self._oargs.irc_host, 'UTF-8'))
irc.set_tlsext_host_name(None)
else:
irc.set_tlsext_host_name(bytes(self._oArgs.irc_host, 'UTF-8'))
while True: while True:
try: try:
irc.do_handshake() irc.do_handshake()
@ -569,15 +564,15 @@ class SyniTox(Tox):
if not rd: if not rd:
raise socket.timeout('timeout') raise socket.timeout('timeout')
continue continue
except SSL.Error as e: except SSL.Error as e: # noqa
raise raise
break break
self.diagnose_ciphers(irc) self.diagnose_ciphers(irc)
else: else:
irc.connect((ip, self._oArgs.irc_port)) irc.connect((ip, self._oargs.irc_port))
LOG.info(f"IRC SSL={self._oArgs.irc_ssl} connected ") LOG.info(f"IRC SSL={self._oargs.irc_ssl} connected ")
except (wrapper_tests.socks.GeneralProxyError, wrapper_tests.socks.Socks5Error) as e: except (wrapper_tests.socks.GeneralProxyError, wrapper_tests.socks.Socks5Error) as e: # noqa
iSocks5Error += 1 iSocks5Error += 1
if iSocks5Error >= iSocks5ErrorMax: if iSocks5Error >= iSocks5ErrorMax:
raise SyniToxError(f"{e.args}") raise SyniToxError(f"{e.args}")
@ -622,13 +617,13 @@ class SyniTox(Tox):
self.irc.send(bytes('CAP ' + 'LS' + '\r\n', 'UTF-8' )) self.irc.send(bytes('CAP ' + 'LS' + '\r\n', 'UTF-8' ))
self.irc.send(bytes('CAP ' + 'REQ :multi-prefix' + '\r\n', 'UTF-8')) self.irc.send(bytes('CAP ' + 'REQ :multi-prefix' + '\r\n', 'UTF-8'))
self.irc.send(bytes('CAP ' + 'END' + '\r\n', 'UTF-8' )) self.irc.send(bytes('CAP ' + 'END' + '\r\n', 'UTF-8' ))
# withh or without self._oArgs.irc_pem: # withh or without self._oargs.irc_pem:
LOG.info("Sent CAP sending NICK and USER") LOG.info("Sent CAP sending NICK and USER")
self.irc.send(bytes('NICK ' + nick + '\r\n', 'UTF-8' )) self.irc.send(bytes('NICK ' + nick + '\r\n', 'UTF-8' ))
self.irc.send(bytes('USER %s %s bla :%s\r\n' % ( self.irc.send(bytes('USER %s %s bla :%s\r\n' % (
self._oArgs.irc_ident, self._oargs.irc_ident,
self._oArgs.irc_host, self._oargs.irc_host,
self._oArgs.irc_name), 'UTF-8')) self._oargs.irc_name), 'UTF-8'))
# OSError: [Errno 9] Bad file descriptor # OSError: [Errno 9] Bad file descriptor
@ -638,7 +633,7 @@ class SyniTox(Tox):
self.test_net() self.test_net()
lNodes = self._settings['current_nodes_udp'] lNodes = self._settings['current_nodes_udp']
shuffle(lNodes) shuffle(lNodes)
if self._oArgs.proxy_type == 0: if self._oargs.proxy_type == 0:
ts.bootstrap_udp(lNodes[:6], [self]) ts.bootstrap_udp(lNodes[:6], [self])
else: else:
if self._bRouted is None: if self._bRouted is None:
@ -654,7 +649,7 @@ class SyniTox(Tox):
def get_all_groups(self): def get_all_groups(self):
try: try:
group_numbers = range(self._tox.group_get_number_groups()) group_numbers = range(self._tox.group_get_number_groups())
except Exception as e: except Exception as e: # noqa
return None return None
groups = map(lambda n: self.get_group_by_number(n), group_numbers) groups = map(lambda n: self.get_group_by_number(n), group_numbers)
@ -730,10 +725,10 @@ class SyniTox(Tox):
raise SyniToxError(line) raise SyniToxError(line)
def irc_readlines(self): def irc_readlines(self):
nick = self._oArgs.irc_nick nick = self._oargs.irc_nick
pwd = self._oArgs.irc_pass pwd = self._oargs.irc_pass
fp = self._oArgs.irc_fp fp = self._oargs.irc_fp
email = self._oArgs.irc_email email = self._oargs.irc_email
self.readbuffer += self.irc.recv(4096) self.readbuffer += self.irc.recv(4096)
lines = self.readbuffer.split(b'\n') lines = self.readbuffer.split(b'\n')
@ -754,7 +749,7 @@ class SyniTox(Tox):
print(line[i+1:]) print(line[i+1:])
rx = re.match(r':(.*?)!.*? PRIVMSG %s :(.*?)\r' % rx = re.match(r':(.*?)!.*? PRIVMSG %s :(.*?)\r' %
self._oArgs.irc_chan, line, re.S) self._oargs.irc_chan, line, re.S)
if l[0] == 'QUIT': if l[0] == 'QUIT':
LOG.info('QUIT') LOG.info('QUIT')
return return
@ -770,7 +765,7 @@ class SyniTox(Tox):
pass pass
elif l[1] in ['433']: elif l[1] in ['433']:
# maybe should be an outright fail # maybe should be an outright fail
if self._oArgs.irc_ssl: if self._oargs.irc_ssl:
LOG.warn("Maybe the certificate was not received") LOG.warn("Maybe the certificate was not received")
#? raise SyniToxError(line) #? raise SyniToxError(line)
# sometimes but not always: # sometimes but not always:
@ -783,13 +778,14 @@ class SyniTox(Tox):
# app.ts ERROR SSL error: (32, 'EPIPE') # app.ts ERROR SSL error: (32, 'EPIPE')
pass pass
elif l[1] in ['451', '462', '477']: elif l[1] in ['451', '462', '477']:
if self._oArgs.irc_crt and self._oArgs.irc_key: if self._oargs.irc_crt and self._oargs.irc_key:
LOG.warn("Maybe the certificate was not received") LOG.warn("Maybe the certificate was not received")
raise SyniToxError(line) raise SyniToxError(line)
elif l[1] in ['376']: elif l[1] in ['376']:
# :End of /MOTD command # :End of /MOTD command
if self._oArgs.irc_crt and self._oArgs.irc_key: if self._oargs.irc_crt and self._oargs.irc_key:
pass LOG.info(bytes(sMSG+' NickServ IDENTIFY %s %s\r\n'
% (nick, pwd,), 'UTF-8'))
elif email == '' and pwd: elif email == '' and pwd:
LOG.info(bytes(sMSG+' NickServ IDENTIFY %s %s\r\n' LOG.info(bytes(sMSG+' NickServ IDENTIFY %s %s\r\n'
% (nick, pwd,), 'UTF-8')) % (nick, pwd,), 'UTF-8'))
@ -805,8 +801,8 @@ class SyniTox(Tox):
raise RuntimeError("you must provide a password to register") raise RuntimeError("you must provide a password to register")
try: try:
self.irc.send(bytes(sMSG+' NickServ set cloak on\r\n', 'UTF-8')) self.irc.send(bytes(sMSG+' NickServ set cloak on\r\n', 'UTF-8'))
if self._oArgs.irc_chan: if self._oargs.irc_chan:
self.irc.send(bytes('JOIN %s\r\n' % self._oArgs.irc_chan, 'UTF-8')) self.irc.send(bytes('JOIN %s\r\n' % self._oargs.irc_chan, 'UTF-8'))
except BrokenPipeError: except BrokenPipeError:
raise SyniToxError('BrokenPipeError') raise SyniToxError('BrokenPipeError')
@ -869,13 +865,13 @@ class SyniTox(Tox):
iCount = 0 iCount = 0
iDelay = 10 iDelay = 10
nick = self._oArgs.irc_nick nick = self._oargs.irc_nick
realname = self._oArgs.irc_name realname = self._oargs.irc_name
ident = self._oArgs.irc_ident ident = self._oargs.irc_ident
pwd = self._oArgs.irc_pass pwd = self._oargs.irc_pass
email = self._oArgs.irc_email email = self._oargs.irc_email
LOG.info(f"Looping for Tox and IRC connections") LOG.info(f"Looping for Tox and IRC connections")
if iCount < self._oArgs.max_sleep: if iCount < self._oargs.max_sleep:
while True: while True:
iCount += 1 iCount += 1
# LOG.debug(f"Looping {iCount}") # LOG.debug(f"Looping {iCount}")
@ -909,7 +905,7 @@ class SyniTox(Tox):
#? self.bid = self.friend_by_public_key(self.sGROUP_BOT_PK) #? self.bid = self.friend_by_public_key(self.sGROUP_BOT_PK)
r = self.group_reconnect(self.sGROUP_BOT_NUM) r = self.group_reconnect(self.sGROUP_BOT_NUM)
LOG.info(f'Connected to group {r}') LOG.info(f'Connected to group {r}')
except ctypes.ArgumentError as e: except ctypes.ArgumentError as e: # noqa
self.bid = None self.bid = None
if self.bid == None: if self.bid == None:
@ -933,7 +929,7 @@ class SyniTox(Tox):
continue continue
LOG.info(f'Waiting on IRC to {self._oArgs.irc_host} on {self._oArgs.irc_port}') LOG.info(f'Waiting on IRC to {self._oargs.irc_host} on {self._oargs.irc_port}')
readable = self.spin(20) readable = self.spin(20)
if not readable or not readable[0]: if not readable or not readable[0]:
@ -993,7 +989,7 @@ class SyniTox(Tox):
def on_group_invite(self, friendid, invite_data, user_data): def on_group_invite(self, friendid, invite_data, user_data):
if not self.joined: if not self.joined:
self.joined = True self.joined = True
nick = self._oArgs.group_nick nick = self._oargs.group_nick
self.tox_group_id = self.group_invite_accept(invite_data, friendid, nick) self.tox_group_id = self.group_invite_accept(invite_data, friendid, nick)
LOG.info('Joined groupchat.') LOG.info('Joined groupchat.')
@ -1007,9 +1003,8 @@ class SyniTox(Tox):
print('TOX> %s: %s' % (name, message)) print('TOX> %s: %s' % (name, message))
if message.startswith('>'): if message.startswith('>'):
message = '\x0309%s\x03' % message message = '\x0309%s\x03' % message
self.irc_send(sMSG+' %s :[%s]: %s\r\n' %
self.irc_send(bsMSG+' %s :[%s]: %s\r\n' % (self._oargs.irc_chan, name, message))
(self._oArgs.irc_chan, name, message))
if message.startswith('^'): if message.startswith('^'):
self.handle_command(message) self.handle_command(message)
@ -1020,8 +1015,8 @@ class SyniTox(Tox):
print('TOX> %s: %s' % (name, action)) print('TOX> %s: %s' % (name, action))
if action.startswith('>'): if action.startswith('>'):
action = '\x0309%s\x03' % action action = '\x0309%s\x03' % action
self.irc_send(bytes(sMSG+' %s :\x01ACTION [%s]: %s\x01\r\n' % self.irc_send(bytes(sMSG' %s :\x01ACTION [%s]: %s\x01\r\n' %
(self._oArgs.irc_chan, name, action), 'UTF-8')) (self._oargs.irc_chan, name, action), 'UTF-8'))
def on_friend_request(self, pk, message): def on_friend_request(self, pk, message):
LOG.info('Friend request from %s: %s' % (pk, message)) LOG.info('Friend request from %s: %s' % (pk, message))
@ -1043,7 +1038,7 @@ class SyniTox(Tox):
def send_both(self, content): def send_both(self, content):
type_ = TOX_MESSAGE_TYPE['NORMAL'] type_ = TOX_MESSAGE_TYPE['NORMAL']
self.ensure_exe(self.group_send_message, self.sGROUP_BOT_NUM, type_, content) self.ensure_exe(self.group_send_message, self.sGROUP_BOT_NUM, type_, content)
self.irc_send(bytes(sMSG+' %s :%s\r\n' % (self._oArgs.irc_chan, content), 'UTF-8')) self.irc_send(bytes(sMSG+' %s :%s\r\n' % (self._oargs.irc_chan, content), 'UTF-8'))
def handle_command(self, cmd): def handle_command(self, cmd):
cmd = cmd[1:] cmd = cmd[1:]
@ -1067,13 +1062,13 @@ class SyniTox(Tox):
return len(data) > 0 and self._toxes.is_data_encrypted(data) return len(data) > 0 and self._toxes.is_data_encrypted(data)
def pass_encrypt(self, data): def pass_encrypt(self, data):
return self._toxes.pass_encrypt(data, self._oArgs.password) return self._toxes.pass_encrypt(data, self._oargs.password)
def has_password(self): def has_password(self):
return self._oArgs.password return self._oargs.password
def pass_decrypt(self, data): def pass_decrypt(self, data):
return self._toxes.pass_decrypt(data, self._oArgs.password) return self._toxes.pass_decrypt(data, self._oargs.password)
def iMain(oArgs, oOpts): def iMain(oArgs, oOpts):
@ -1091,7 +1086,7 @@ def iMain(oArgs, oOpts):
except ( SSL.Error, ) as e: except ( SSL.Error, ) as e:
LOG.error(f"SSL error: {e.args}") LOG.error(f"SSL error: {e.args}")
ret = 1 ret = 1
except (SSL.SysCallError, ) as e: except (SSL.SysCallError,) as e:
# OpenSSL.SSL.SysCallError: (9, 'EBADF') # OpenSSL.SSL.SysCallError: (9, 'EBADF')
LOG.error(f"SSL error: {e.args}") LOG.error(f"SSL error: {e.args}")
ret = 1 ret = 1
@ -1140,6 +1135,25 @@ def oToxygenToxOptions(oArgs):
return tox_options return tox_options
def vInitializeOargs():
global oTOX_OARGS
assert oTOX_OARGS.irc_host or oTOX_OARGS.irc_connect
if not oTOX_OARGS.irc_connect:
oTOX_OARGS.irc_connect = oTOX_OARGS.irc_host
if oTOX_OARGS.irc_cadir:
assert os.path.isdir(oTOX_OARGS.irc_cadir)
if oTOX_OARGS.irc_cafile:
assert os.path.isfile(oTOX_OARGS.irc_cafile)
if oTOX_OARGS.irc_crt:
assert os.path.isfile(oTOX_OARGS.irc_crt)
assert oTOX_OARGS.irc_key
if oTOX_OARGS.irc_key:
assert os.path.isfile(oTOX_OARGS.irc_key)
assert oTOX_OARGS.irc_crt
if not oTOX_OARGS.group_name:
group_name = oTOX_OARGS.bot_name +oTOX_OARGS.irc_chan
oTOX_OARGS.group_name = group_name
def oArgparse(lArgv): def oArgparse(lArgv):
parser = ts.oMainArgparser() parser = ts.oMainArgparser()
parser.add_argument('profile', type=str, nargs='?', default=None, parser.add_argument('profile', type=str, nargs='?', default=None,
@ -1179,7 +1193,7 @@ def oArgparse(lArgv):
help="TLS version; empty is no SSL", help="TLS version; empty is no SSL",
choices=['', 'tlsv1.1', 'tlsv1.2', 'tlsv1.3']) choices=['', 'tlsv1.1', 'tlsv1.2', 'tlsv1.3'])
parser.add_argument('--irc_cafile', type=str, parser.add_argument('--irc_cafile', type=str,
help="Certificate Authority file", help="Certificate Authority file (in PEM)",
default=CAfs[0]) default=CAfs[0])
parser.add_argument('--irc_cadir', type=str, parser.add_argument('--irc_cadir', type=str,
help="Certificate Authority directory", help="Certificate Authority directory",
@ -1243,14 +1257,7 @@ def main(lArgs=None):
oTOX_OARGS = oArgparse(lArgs) oTOX_OARGS = oArgparse(lArgs)
ts.clean_booleans(oTOX_OARGS) ts.clean_booleans(oTOX_OARGS)
vInitializeOargs()
assert oTOX_OARGS.irc_host or oTOX_OARGS.irc_connect
if not oTOX_OARGS.irc_connect:
oTOX_OARGS.irc_connect = oTOX_OARGS.irc_host
if oTOX_OARGS.irc_cadir:
assert os.path.isdir(oTOX_OARGS.irc_cadir)
if oTOX_OARGS.irc_cafile:
assert os.path.isfile(oTOX_OARGS.irc_cafile)
global oTOX_OPTIONS global oTOX_OPTIONS
oTOX_OPTIONS = oToxygenToxOptions(oTOX_OARGS) oTOX_OPTIONS = oToxygenToxOptions(oTOX_OARGS)

@ -119,7 +119,6 @@ if [ "$TLS" -ne 0 ] ; then
fi fi
ls -l -s $SD/$NICK.pem ls -l -s $SD/$NICK.pem
fi fi
exit 0
declare -a RARGS declare -a RARGS
if [ "$DEBUG" = 1 ] ; then if [ "$DEBUG" = 1 ] ; then

Loading…
Cancel
Save