Mercurial > libervia-backend
diff src/plugins/plugin_xep_0234.py @ 1620:4dd07d026214
plugin XEP-0234: hash checksum proper handling
author | Goffi <goffi@goffi.org> |
---|---|
date | Tue, 17 Nov 2015 20:13:27 +0100 |
parents | 0de5f210fe56 |
children | 63cef4dbf2a4 |
line wrap: on
line diff
--- a/src/plugins/plugin_xep_0234.py Tue Nov 17 19:51:52 2015 +0100 +++ b/src/plugins/plugin_xep_0234.py Tue Nov 17 20:13:27 2015 +0100 @@ -31,6 +31,8 @@ from twisted.python import failure from twisted.words.protocols.jabber.xmlstream import XMPPHandler from twisted.internet import defer +from twisted.internet import reactor +from twisted.internet import error as internet_error NS_JINGLE_FT = 'urn:xmpp:jingle:apps:file-transfer:4' @@ -49,7 +51,7 @@ class XEP_0234(object): # TODO: assure everything is closed when file is sent or session terminate is received - # TODO: call self._f.unregister when unloading order will be managing (i.e. when depenencies will be unloaded at the end) + # TODO: call self._f.unregister when unloading order will be managing (i.e. when dependencies will be unloaded at the end) def __init__(self, host): log.info(_("plugin Jingle File Transfer initialization")) @@ -139,6 +141,16 @@ file_data[name] = '' try: + hash_algo, file_data['hash_given'] = self._hash.parseHashElt(file_elt) + except exceptions.NotFound: + raise failure.Failure(exceptions.DataError) + + if hash_algo is not None: + file_data['hash_algo'] = hash_algo + file_data['hash_hasher'] = hasher = self._hash.getHasher(hash_algo) + file_data['data_cb'] = lambda data: hasher.update(data) + + try: file_data['size'] = int(file_data['size']) except ValueError: raise failure.Failure(exceptions.DataError) @@ -148,8 +160,6 @@ log.warning(u"File name contain path characters, we replace them: {}".format(name)) file_data['name'] = name.replace('/', '_').replace('\\', '_') - # TODO: parse hash using plugin XEP-0300 - content_data['application_data']['file_data'] = file_data # now we actualy request permission to user @@ -164,7 +174,6 @@ d.addCallback(gotConfirmation) return d - def jingleHandler(self, action, session, content_name, desc_elt, profile): content_data = session['contents'][content_name] application_data = content_data['application_data'] @@ -180,12 +189,16 @@ file_elt.addElement('range') elif action == self._j.A_SESSION_ACCEPT: assert not 'file_obj' in content_data + file_data = application_data['file_data'] file_path = application_data['file_path'] - size = application_data['file_data']['size'] + size = file_data['size'] + # XXX: hash security is not critical here, so we just take the higher mandatory one + hasher = file_data['hash_hasher'] = self._hash.getHasher('sha-256') content_data['file_obj'] = self._f.File(self.host, file_path, uid=self._getProgressId(session, content_name), size=size, + data_cb=lambda data: hasher.update(data), profile=profile ) finished_d = content_data['finished_d'] = defer.Deferred() @@ -195,13 +208,107 @@ log.warning(u"FIXME: unmanaged action {}".format(action)) return desc_elt + def jingleSessionInfo(self, action, session, content_name, jingle_elt, profile): + """Called on session-info action + + manage checksum, and ignore <received/> element + """ + # TODO: manage <received/> element + content_data = session['contents'][content_name] + elts = [elt for elt in jingle_elt.elements() if elt.uri == NS_JINGLE_FT] + if not elts: + return + for elt in elts: + if elt.name == 'received': + pass + elif elt.name == 'checksum': + # we have received the file hash, we need to parse it + if content_data['senders'] == session['role']: + log.warning(u"unexpected checksum received while we are the file sender") + raise exceptions.DataError + info_content_name = elt['name'] + if info_content_name != content_name: + # it was for an other content... + return + file_data = content_data['application_data']['file_data'] + try: + file_elt = elt.elements((NS_JINGLE_FT, 'file')).next() + except StopIteration: + raise exceptions.DataError + algo, file_data['hash_given'] = self._hash.parseHashElt(file_elt) + if algo != file_data.get('hash_algo'): + log.warning(u"Hash algorithm used in given hash ({peer_algo}) doesn't correspond to the one we have used ({our_algo})" + .format(peer_algo=algo, our_algo=file_data.get('hash_algo'))) + else: + self._receiverTryTerminate(session, content_name, content_data, profile=profile) + else: + raise NotImplementedError + + def _sendCheckSum(self, session, content_name, content_data, profile): + """Send the session-info with the hash checksum""" + file_data = content_data['application_data']['file_data'] + hasher = file_data['hash_hasher'] + hash_ = hasher.hexdigest() + log.debug(u"Calculated hash: {}".format(hash_)) + iq_elt, jingle_elt = self._j.buildSessionInfo(session, profile) + checksum_elt = jingle_elt.addElement((NS_JINGLE_FT, 'checksum')) + checksum_elt['creator'] = content_data['creator'] + checksum_elt['name'] = content_name + file_elt = checksum_elt.addElement('file') + file_elt.addChild(self._hash.buildHashElt(hash_)) + iq_elt.send() + + def _receiverTryTerminate(self, session, content_name, content_data, last_try=False, profile=C.PROF_KEY_NONE): + """Try to terminate the session + + This method must only be used by the receiver. + It check if transfer is finished, and hash available, + if everything is OK, it check hash and terminate the session + @param last_try(bool): if True this mean than session must be terminated even given hash is not available + @return (bool): True if session was terminated + """ + if not content_data.get('transfer_finished', False): + return False + file_data = content_data['application_data']['file_data'] + hash_given = file_data.get('hash_given') + if hash_given is None: + if last_try: + log.warning(u"sender didn't sent hash checksum, we can't check the file") + self._j.delayedContentTerminate(session, content_name, profile=profile) + content_data['file_obj'].close() + return True + return False + hasher = file_data['hash_hasher'] + hash_ = hasher.hexdigest() + + if hash_ == hash_given: + log.info(u"Hash checked, file was successfully transfered: {}".format(hash_)) + else: + log.warning(u"Hash mismatch, the file was not transfered correctly") + + self._j.delayedContentTerminate(session, content_name, profile=profile) + content_data['file_obj'].close() + # we may have the last_try timer still active, so we try to cancel it + try: + content_data['last_try_timer'].cancel() + except (KeyError, internet_error.AlreadyCalled): + pass + return True + def _finishedCb(self, dummy, session, content_name, content_data, profile): - log.info(u"File transfer completed successfuly") + log.info(u"File transfer completed") if content_data['senders'] != session['role']: - # we terminate the session only if we are the received, + # we terminate the session only if we are the receiver, # as recommanded in XEP-0234 ยง2 (after example 6) - self._j.contentTerminate(session, content_name, profile=profile) - content_data['file_obj'].close() + content_data['transfer_finished'] = True + if not self._receiverTryTerminate(session, content_name, content_data, profile=profile): + # we have not received the hash yet, we wait 5 more seconds + content_data['last_try_timer'] = reactor.callLater( + 5, self._receiverTryTerminate, session, content_name, content_data, last_try=True, profile=profile) + else: + # we are the sender, we send the checksum + self._sendCheckSum(session, content_name, content_data, profile) + content_data['file_obj'].close() def _finishedEb(self, failure, session, content_name, content_data, profile): log.warning(u"Error while streaming through s5b: {}".format(failure))