diff libervia/backend/plugins/plugin_misc_attach.py @ 4071:4b842c1fb686

refactoring: renamed `sat` package to `libervia.backend`
author Goffi <goffi@goffi.org>
date Fri, 02 Jun 2023 11:49:51 +0200
parents sat/plugins/plugin_misc_attach.py@524856bd7b19
children 0d7bb4df2343
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/libervia/backend/plugins/plugin_misc_attach.py	Fri Jun 02 11:49:51 2023 +0200
@@ -0,0 +1,278 @@
+#!/usr/bin/env python3
+
+# SàT plugin for attaching files
+# Copyright (C) 2009-2021 Jérôme Poisson (goffi@goffi.org)
+
+# This program is free software: you can redistribute it and/or modify
+# it under the terms of the GNU Affero General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU Affero General Public License for more details.
+
+# You should have received a copy of the GNU Affero General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+
+from collections import namedtuple
+import mimetypes
+from pathlib import Path
+import shutil
+import tempfile
+from typing import Callable, Optional
+
+from twisted.internet import defer
+
+from libervia.backend.core import exceptions
+from libervia.backend.core.constants import Const as C
+from libervia.backend.core.core_types import SatXMPPEntity
+from libervia.backend.core.i18n import _
+from libervia.backend.core.log import getLogger
+from libervia.backend.tools import utils
+from libervia.backend.tools import image
+
+
+log = getLogger(__name__)
+
+
+PLUGIN_INFO = {
+    C.PI_NAME: "File Attach",
+    C.PI_IMPORT_NAME: "ATTACH",
+    C.PI_TYPE: C.PLUG_TYPE_MISC,
+    C.PI_MODES: C.PLUG_MODE_BOTH,
+    C.PI_DEPENDENCIES: ["UPLOAD"],
+    C.PI_MAIN: "AttachPlugin",
+    C.PI_HANDLER: "no",
+    C.PI_DESCRIPTION: _("""Attachments handler"""),
+}
+
+
+AttachmentHandler = namedtuple('AttachmentHandler', ['can_handle', 'attach', 'priority'])
+
+
+class AttachPlugin:
+
+    def __init__(self, host):
+        log.info(_("plugin Attach initialization"))
+        self.host = host
+        self._u = host.plugins["UPLOAD"]
+        host.trigger.add("sendMessage", self._send_message_trigger)
+        host.trigger.add("sendMessageComponent", self._send_message_trigger)
+        self._attachments_handlers = {'clear': [], 'encrypted': []}
+        self.register(self.default_can_handle, self.default_attach, False, -1000)
+
+    def register(self, can_handle, attach, encrypted=False, priority=0):
+        """Register an attachments handler
+
+        @param can_handle(callable, coroutine, Deferred): a method which must return True
+            if this plugin can handle the upload, otherwise next ones will be tried.
+            This method will get client and mess_data as arguments, before the XML is
+            generated
+        @param attach(callable, coroutine, Deferred): attach the file
+            this method will get client and mess_data as arguments, after XML is
+            generated. Upload operation must be handled
+            hint: "UPLOAD" plugin can be used
+        @param encrypted(bool): True if the handler manages encrypted files
+            A handler can be registered twice if it handle both encrypted and clear
+            attachments
+        @param priority(int): priority of this handler, handler with higher priority will
+            be tried first
+        """
+        handler = AttachmentHandler(can_handle, attach, priority)
+        handlers = (
+            self._attachments_handlers['encrypted']
+            if encrypted else self._attachments_handlers['clear']
+        )
+        if handler in handlers:
+            raise exceptions.InternalError(
+                'Attachment handler has been registered twice, this should never happen'
+            )
+
+        handlers.append(handler)
+        handlers.sort(key=lambda h: h.priority, reverse=True)
+        log.debug(f"new attachments handler: {handler}")
+
+    async def attach_files(self, client, data):
+        """Main method to attach file
+
+        It will do generic pre-treatment, and call the suitable attachments handler
+        """
+        # we check attachment for pre-treatment like large image resizing
+        # media_type will be added if missing (and if it can be guessed from path)
+        attachments = data["extra"][C.KEY_ATTACHMENTS]
+        tmp_dirs_to_clean = []
+        for attachment in attachments:
+            if attachment.get(C.KEY_ATTACHMENTS_RESIZE, False):
+                path = Path(attachment["path"])
+                try:
+                    media_type = attachment[C.KEY_ATTACHMENTS_MEDIA_TYPE]
+                except KeyError:
+                    media_type = mimetypes.guess_type(path, strict=False)[0]
+                    if media_type is None:
+                        log.warning(
+                            _("Can't resize attachment of unknown type: {attachment}")
+                            .format(attachment=attachment))
+                        continue
+                    attachment[C.KEY_ATTACHMENTS_MEDIA_TYPE] = media_type
+
+                main_type = media_type.split('/')[0]
+                if main_type == "image":
+                    report = image.check(self.host, path)
+                    if report['too_large']:
+                        tmp_dir = Path(tempfile.mkdtemp())
+                        tmp_dirs_to_clean.append(tmp_dir)
+                        new_path = tmp_dir / path.name
+                        await image.resize(
+                            path, report["recommended_size"], dest=new_path)
+                        attachment["path"] = new_path
+                        log.info(
+                            _("Attachment {path!r} has been resized at {new_path!r}")
+                            .format(path=str(path), new_path=str(new_path)))
+                else:
+                    log.warning(
+                        _("Can't resize attachment of type {main_type!r}: {attachment}")
+                        .format(main_type=main_type, attachment=attachment))
+
+        if client.encryption.is_encryption_requested(data):
+            handlers = self._attachments_handlers['encrypted']
+        else:
+            handlers = self._attachments_handlers['clear']
+
+        for handler in handlers:
+            can_handle = await utils.as_deferred(handler.can_handle, client, data)
+            if can_handle:
+                break
+        else:
+            raise exceptions.NotFound(
+                _("No plugin can handle attachment with {destinee}").format(
+                destinee = data['to']
+            ))
+
+        await utils.as_deferred(handler.attach, client, data)
+
+        for dir_path in tmp_dirs_to_clean:
+            log.debug(f"Cleaning temporary directory at {dir_path}")
+            shutil.rmtree(dir_path)
+
+        return data
+
+    async def upload_files(
+        self,
+        client: SatXMPPEntity,
+        data: dict,
+        upload_cb: Optional[Callable] = None
+    ):
+        """Upload file, and update attachments
+
+        invalid attachments will be removed
+        @param client:
+        @param data(dict): message data
+        @param upload_cb(coroutine, Deferred, None): method to use for upload
+            if None, upload method from UPLOAD plugin will be used.
+            Otherwise, following kwargs will be used with the cb:
+                - client
+                - filepath
+                - filename
+                - options
+            the method must return a tuple similar to UPLOAD plugin's upload method,
+            it must contain:
+                - progress_id
+                - a deferred which fire download URL
+        """
+        if upload_cb is None:
+            upload_cb = self._u.upload
+
+        uploads_d = []
+        to_delete = []
+        attachments = data["extra"]["attachments"]
+
+        for attachment in attachments:
+            if "url" in attachment and not "path" in attachment:
+                log.debug(f"attachment is external, we don't upload it: {attachment}")
+                continue
+            try:
+                # we pop path because we don't want it to be stored, as the file can be
+                # only in a temporary location
+                path = Path(attachment.pop("path"))
+            except KeyError:
+                log.warning("no path in attachment: {attachment}")
+                to_delete.append(attachment)
+                continue
+
+            if "url" in attachment:
+                url = attachment.pop('url')
+                log.warning(
+                    f"unexpected URL in attachment: {url!r}\nattachment: {attachment}"
+                )
+
+            try:
+                name = attachment["name"]
+            except KeyError:
+                name = attachment["name"] = path.name
+
+            attachment["size"] = path.stat().st_size
+
+            extra = {
+                "attachment": attachment
+            }
+            progress_id = attachment.pop("progress_id", None)
+            if progress_id:
+                extra["progress_id"] = progress_id
+            check_certificate = self.host.memory.param_get_a(
+                "check_certificate", "Connection", profile_key=client.profile)
+            if not check_certificate:
+                extra['ignore_tls_errors'] = True
+                log.warning(
+                    _("certificate check disabled for upload, this is dangerous!"))
+
+            __, upload_d = await upload_cb(
+                client=client,
+                filepath=path,
+                filename=name,
+                extra=extra,
+            )
+            uploads_d.append(upload_d)
+
+        for attachment in to_delete:
+            attachments.remove(attachment)
+
+        upload_results = await defer.DeferredList(uploads_d)
+        for idx, (success, ret) in enumerate(upload_results):
+            attachment = attachments[idx]
+
+            if not success:
+                # ret is a failure here
+                log.warning(f"error while uploading {attachment}: {ret}")
+                continue
+
+            attachment["url"] = ret
+
+        return data
+
+    def _attach_files(self, data, client):
+        return defer.ensureDeferred(self.attach_files(client, data))
+
+    def _send_message_trigger(
+        self, client, mess_data, pre_xml_treatments, post_xml_treatments):
+        if mess_data['extra'].get(C.KEY_ATTACHMENTS):
+            post_xml_treatments.addCallback(self._attach_files, client=client)
+        return True
+
+    async def default_can_handle(self, client, data):
+        return True
+
+    async def default_attach(self, client, data):
+        await self.upload_files(client, data)
+        # TODO: handle xhtml-im
+        body_elt = data["xml"].body
+        if body_elt is None:
+            body_elt = data["xml"].addElement("body")
+        attachments = data["extra"][C.KEY_ATTACHMENTS]
+        if attachments:
+            body_links = '\n'.join(a['url'] for a in attachments)
+            if str(body_elt).strip():
+                # if there is already a body, we add a line feed before the first link
+                body_elt.addContent('\n')
+            body_elt.addContent(body_links)