mirror of
https://github.com/Mikaela/Limnoria.git
synced 2024-12-27 21:22:39 +01:00
445 lines
17 KiB
Python
445 lines
17 KiB
Python
##
|
|
# Copyright (c) 2002-2004, Jeremiah Fincher
|
|
# Copyright (c) 2010, 2013, James McCoy
|
|
# All rights reserved.
|
|
#
|
|
# Redistribution and use in source and binary forms, with or without
|
|
# modification, are permitted provided that the following conditions are met:
|
|
#
|
|
# * Redistributions of source code must retain the above copyright notice,
|
|
# this list of conditions, and the following disclaimer.
|
|
# * Redistributions in binary form must reproduce the above copyright notice,
|
|
# this list of conditions, and the following disclaimer in the
|
|
# documentation and/or other materials provided with the distribution.
|
|
# * Neither the name of the author of this software nor the name of
|
|
# contributors to this software may be used to endorse or promote products
|
|
# derived from this software without specific prior written consent.
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
# POSSIBILITY OF SUCH DAMAGE.
|
|
###
|
|
|
|
"""
|
|
Contains simple socket drivers. Asyncore bugged (haha, pun!) me.
|
|
"""
|
|
|
|
from __future__ import division
|
|
|
|
import os
|
|
import sys
|
|
import time
|
|
import errno
|
|
import threading
|
|
import select
|
|
import socket
|
|
|
|
try:
|
|
import ipaddress # Python >= 3.3 or backported ipaddress
|
|
except ImportError:
|
|
# Python < 3.3
|
|
ipaddress = None
|
|
|
|
from .. import (conf, drivers, log, utils, world)
|
|
from ..utils import minisix
|
|
from ..utils.str import decode_raw_line
|
|
|
|
try:
|
|
import ssl
|
|
SSLError = ssl.SSLError
|
|
except:
|
|
drivers.log.debug('ssl module is not available, '
|
|
'cannot connect to SSL servers.')
|
|
class SSLError(Exception):
|
|
pass
|
|
|
|
class SocketDriver(drivers.IrcDriver, drivers.ServersMixin):
|
|
_instances = []
|
|
_selecting = threading.Lock()
|
|
def __init__(self, irc):
|
|
assert irc is not None
|
|
self.irc = irc
|
|
drivers.IrcDriver.__init__(self, irc)
|
|
drivers.ServersMixin.__init__(self, irc)
|
|
self.conn = None
|
|
self._attempt = -1
|
|
self.servers = ()
|
|
self.eagains = 0
|
|
self.inbuffer = b''
|
|
self.outbuffer = ''
|
|
self.zombie = False
|
|
self.connected = False
|
|
self.writeCheckTime = None
|
|
self.nextReconnectTime = None
|
|
self.resetDelay()
|
|
if self.networkGroup.get('ssl').value and 'ssl' not in globals():
|
|
drivers.log.error('The Socket driver can not connect to SSL '
|
|
'servers for your Python version.')
|
|
self.ssl = False
|
|
else:
|
|
self.ssl = self.networkGroup.get('ssl').value
|
|
self.connect()
|
|
|
|
def getDelay(self):
|
|
ret = self.currentDelay
|
|
self.currentDelay = min(self.currentDelay * 2,
|
|
conf.supybot.drivers.maxReconnectWait())
|
|
return ret
|
|
|
|
def resetDelay(self):
|
|
self.currentDelay = 10.0
|
|
|
|
def _getNextServer(self):
|
|
oldServer = getattr(self, 'currentServer', None)
|
|
server = drivers.ServersMixin._getNextServer(self)
|
|
if self.currentServer != oldServer:
|
|
self.resetDelay()
|
|
return server
|
|
|
|
def _handleSocketError(self, e):
|
|
# 'e is None' means the socket was closed.
|
|
#
|
|
# (11, 'Resource temporarily unavailable') raised if connect
|
|
# hasn't finished yet. We'll keep track of how many we get.
|
|
if e is None or e.args[0] != 11 or self.eagains > 120:
|
|
drivers.log.disconnect(self.currentServer, e)
|
|
if self in self._instances:
|
|
self._instances.remove(self)
|
|
try:
|
|
self.conn.close()
|
|
except:
|
|
pass
|
|
self.connected = False
|
|
self.scheduleReconnect()
|
|
else:
|
|
log.debug('Got EAGAIN, current count: %s.', self.eagains)
|
|
self.eagains += 1
|
|
|
|
def _sendIfMsgs(self):
|
|
if not self.connected:
|
|
return
|
|
if not self.zombie:
|
|
msgs = [self.irc.takeMsg()]
|
|
while msgs[-1] is not None:
|
|
msgs.append(self.irc.takeMsg())
|
|
del msgs[-1]
|
|
self.outbuffer += ''.join(map(str, msgs))
|
|
if self.outbuffer:
|
|
try:
|
|
if minisix.PY2:
|
|
sent = self.conn.send(self.outbuffer)
|
|
else:
|
|
sent = self.conn.send(self.outbuffer.encode())
|
|
self.outbuffer = self.outbuffer[sent:]
|
|
self.eagains = 0
|
|
except socket.error as e:
|
|
self._handleSocketError(e)
|
|
if self.zombie and not self.outbuffer:
|
|
self._reallyDie()
|
|
|
|
@classmethod
|
|
def _select(cls):
|
|
timeout = conf.supybot.drivers.poll()
|
|
try:
|
|
if not cls._selecting.acquire(blocking=False):
|
|
# there's already a thread running this code, abort.
|
|
return
|
|
for inst in cls._instances:
|
|
# Do not use a list comprehension here, we have to edit the list
|
|
# and not to reassign it.
|
|
if not inst.connected or \
|
|
(minisix.PY3 and inst.conn._closed) or \
|
|
(minisix.PY2 and
|
|
inst.conn._sock.__class__ is socket._closedsocket):
|
|
cls._instances.remove(inst)
|
|
elif inst.conn.fileno() == -1:
|
|
inst.reconnect()
|
|
if not cls._instances:
|
|
return
|
|
rlist, wlist, xlist = select.select([x.conn for x in cls._instances],
|
|
[], [], timeout)
|
|
for instance in cls._instances:
|
|
if instance.conn in rlist:
|
|
instance._read()
|
|
except select.error as e:
|
|
if e.args[0] != errno.EINTR:
|
|
# 'Interrupted system call'
|
|
raise
|
|
finally:
|
|
cls._selecting.release()
|
|
for instance in cls._instances:
|
|
if instance.irc and not instance.irc.zombie:
|
|
instance._sendIfMsgs()
|
|
|
|
|
|
def run(self):
|
|
now = time.time()
|
|
if self.nextReconnectTime is not None and now > self.nextReconnectTime:
|
|
self.reconnect()
|
|
elif self.writeCheckTime is not None and now > self.writeCheckTime:
|
|
self._checkAndWriteOrReconnect()
|
|
if not self.connected:
|
|
# We sleep here because otherwise, if we're the only driver, we'll
|
|
# spin at 100% CPU while we're disconnected.
|
|
time.sleep(conf.supybot.drivers.poll())
|
|
return
|
|
self._sendIfMsgs()
|
|
self._select()
|
|
|
|
def _read(self):
|
|
"""Called by _select() when we can read data."""
|
|
try:
|
|
new_data = self.conn.recv(1024)
|
|
if not new_data:
|
|
# Socket was closed
|
|
self._handleSocketError(None)
|
|
return
|
|
|
|
self.inbuffer += new_data
|
|
self.eagains = 0 # If we successfully recv'ed, we can reset this.
|
|
lines = self.inbuffer.split(b'\n')
|
|
self.inbuffer = lines.pop()
|
|
for line in lines:
|
|
line = decode_raw_line(line)
|
|
|
|
msg = drivers.parseMsg(line)
|
|
if msg is not None and self.irc is not None:
|
|
self.irc.feedMsg(msg)
|
|
except socket.timeout:
|
|
pass
|
|
except SSLError as e:
|
|
if e.args[0] == 'The read operation timed out':
|
|
pass
|
|
else:
|
|
self._handleSocketError(e)
|
|
return
|
|
except socket.error as e:
|
|
self._handleSocketError(e)
|
|
return
|
|
if self.irc and not self.irc.zombie:
|
|
self._sendIfMsgs()
|
|
|
|
def connect(self, **kwargs):
|
|
self.reconnect(reset=False, **kwargs)
|
|
|
|
def reconnect(self, wait=False, reset=True, server=None):
|
|
self._attempt += 1
|
|
self.nextReconnectTime = None
|
|
if self.connected:
|
|
self.onDisconnect()
|
|
drivers.log.reconnect(self.irc.network)
|
|
if self in self._instances:
|
|
self._instances.remove(self)
|
|
try:
|
|
self.conn.shutdown(socket.SHUT_RDWR)
|
|
except: # "Transport endpoint not connected"
|
|
pass
|
|
self.conn.close()
|
|
self.connected = False
|
|
if reset:
|
|
drivers.log.debug('Resetting %s.', self.irc)
|
|
self.irc.reset()
|
|
else:
|
|
drivers.log.debug('Not resetting %s.', self.irc)
|
|
if wait:
|
|
if server is not None:
|
|
# Make this server be the next one to be used.
|
|
self.servers.insert(0, server)
|
|
self.scheduleReconnect()
|
|
return
|
|
self.currentServer = server or self._getNextServer()
|
|
network_config = getattr(conf.supybot.networks, self.irc.network)
|
|
socks_proxy = network_config.socksproxy()
|
|
try:
|
|
if socks_proxy:
|
|
import socks
|
|
except ImportError:
|
|
log.error('Cannot use socks proxy (SocksiPy not installed), '
|
|
'using direct connection instead.')
|
|
socks_proxy = ''
|
|
else:
|
|
try:
|
|
hostname = utils.net.getAddressFromHostname(
|
|
self.currentServer.hostname,
|
|
attempt=self._attempt)
|
|
except (socket.gaierror, socket.error) as e:
|
|
drivers.log.connectError(self.currentServer, e)
|
|
self.scheduleReconnect()
|
|
return
|
|
drivers.log.connect(self.currentServer)
|
|
try:
|
|
self.conn = utils.net.getSocket(
|
|
self.currentServer.hostname,
|
|
port=self.currentServer.port,
|
|
socks_proxy=socks_proxy,
|
|
vhost=conf.supybot.protocols.irc.vhost(),
|
|
vhostv6=conf.supybot.protocols.irc.vhostv6(),
|
|
)
|
|
except socket.error as e:
|
|
drivers.log.connectError(self.currentServer, e)
|
|
self.scheduleReconnect()
|
|
return
|
|
# We allow more time for the connect here, since it might take longer.
|
|
# At least 10 seconds.
|
|
self.conn.settimeout(max(10, conf.supybot.drivers.poll()*10))
|
|
try:
|
|
# Connect before SSL, otherwise SSL is disabled if we use SOCKS.
|
|
# See http://stackoverflow.com/q/16136916/539465
|
|
self.conn.connect(
|
|
(self.currentServer.hostname, self.currentServer.port))
|
|
if network_config.ssl() or \
|
|
self.currentServer.force_tls_verification:
|
|
self.starttls()
|
|
|
|
# Suppress this warning for loopback IPs.
|
|
targetip = hostname
|
|
if sys.version_info[0] < 3:
|
|
# Backported Python 2 ipaddress demands unicode instead of str
|
|
targetip = targetip.decode('utf-8')
|
|
elif (not network_config.requireStarttls()) and \
|
|
(not network_config.ssl()) and \
|
|
(not self.currentServer.force_tls_verification) and \
|
|
(ipaddress is None or not ipaddress.ip_address(targetip).is_loopback):
|
|
drivers.log.warning(('Connection to network %s '
|
|
'does not use SSL/TLS, which makes it vulnerable to '
|
|
'man-in-the-middle attacks and passive eavesdropping. '
|
|
'You should consider upgrading your connection to SSL/TLS '
|
|
'<http://docs.limnoria.net/en/latest/use/faq.html#how-to-make-a-connection-secure>')
|
|
% self.irc.network)
|
|
|
|
conf.supybot.drivers.poll.addCallback(self.setTimeout)
|
|
self.setTimeout()
|
|
self.connected = True
|
|
self.resetDelay()
|
|
except socket.error as e:
|
|
if e.args[0] == 115:
|
|
now = time.time()
|
|
when = now + 60
|
|
whenS = log.timestamp(when)
|
|
drivers.log.debug('Connection in progress, scheduling '
|
|
'connectedness check for %s', whenS)
|
|
self.writeCheckTime = when
|
|
else:
|
|
drivers.log.connectError(self.currentServer, e)
|
|
self.scheduleReconnect()
|
|
return
|
|
self._instances.append(self)
|
|
|
|
def setTimeout(self):
|
|
try:
|
|
self.conn.settimeout(conf.supybot.drivers.poll())
|
|
except Exception:
|
|
drivers.log.exception('Could not set socket timeout:')
|
|
|
|
def _checkAndWriteOrReconnect(self):
|
|
self.writeCheckTime = None
|
|
drivers.log.debug('Checking whether we are connected.')
|
|
(_, w, _) = select.select([], [self.conn], [], 0)
|
|
if w:
|
|
drivers.log.debug('Socket is writable, it might be connected.')
|
|
self.connected = True
|
|
self.resetDelay()
|
|
else:
|
|
drivers.log.connectError(self.currentServer, 'Timed out')
|
|
self.reconnect()
|
|
|
|
def scheduleReconnect(self):
|
|
when = time.time() + self.getDelay()
|
|
if not world.dying:
|
|
drivers.log.reconnect(self.irc.network, when)
|
|
if self.nextReconnectTime:
|
|
drivers.log.error('Updating next reconnect time when one is '
|
|
'already present. This is a bug; please '
|
|
'report it, with an explanation of what caused '
|
|
'this to happen.')
|
|
self.nextReconnectTime = when
|
|
|
|
def die(self):
|
|
if self in self._instances:
|
|
self._instances.remove(self)
|
|
conf.supybot.drivers.poll.removeCallback(self.setTimeout)
|
|
self.zombie = True
|
|
if self.nextReconnectTime is not None:
|
|
self.nextReconnectTime = None
|
|
if self.writeCheckTime is not None:
|
|
self.writeCheckTime = None
|
|
drivers.log.die(self.irc)
|
|
drivers.IrcDriver.die(self)
|
|
drivers.ServersMixin.die(self)
|
|
|
|
def _reallyDie(self):
|
|
if self.conn is not None:
|
|
self.conn.close()
|
|
drivers.IrcDriver.die(self)
|
|
# self.irc.die() Kill off the ircs yourself, jerk!
|
|
|
|
def name(self):
|
|
return '%s(%s)' % (self.__class__.__name__, self.irc)
|
|
|
|
def anyCertValidationEnabled(self):
|
|
"""Returns whether any kind of certificate validation is enabled, other
|
|
than Server.force_tls_verification."""
|
|
network_config = getattr(conf.supybot.networks, self.irc.network)
|
|
return any([
|
|
conf.supybot.protocols.ssl.verifyCertificates(),
|
|
network_config.ssl.serverFingerprints(),
|
|
network_config.ssl.authorityCertificate(),
|
|
])
|
|
|
|
def starttls(self):
|
|
assert 'ssl' in globals()
|
|
network_config = getattr(conf.supybot.networks, self.irc.network)
|
|
certfile = network_config.certfile()
|
|
if not certfile:
|
|
certfile = conf.supybot.protocols.irc.certfile()
|
|
if not certfile:
|
|
certfile = None
|
|
elif not os.path.isfile(certfile):
|
|
drivers.log.warning('Could not find cert file %s.' %
|
|
certfile)
|
|
certfile = None
|
|
if self.currentServer.force_tls_verification \
|
|
and not self.anyCertValidationEnabled():
|
|
verifyCertificates = True
|
|
else:
|
|
verifyCertificates = conf.supybot.protocols.ssl.verifyCertificates()
|
|
if not self.currentServer.force_tls_verification \
|
|
and not self.anyCertValidationEnabled():
|
|
drivers.log.warning('Not checking SSL certificates, connections '
|
|
'are vulnerable to man-in-the-middle attacks. Set '
|
|
'supybot.protocols.ssl.verifyCertificates to "true" '
|
|
'to enable validity checks.')
|
|
try:
|
|
self.conn = utils.net.ssl_wrap_socket(self.conn,
|
|
logger=drivers.log,
|
|
hostname=self.currentServer.hostname,
|
|
certfile=certfile,
|
|
verify=verifyCertificates,
|
|
trusted_fingerprints=network_config.ssl.serverFingerprints(),
|
|
ca_file=network_config.ssl.authorityCertificate(),
|
|
)
|
|
except ssl.CertificateError as e:
|
|
drivers.log.error(('Certificate validation failed when '
|
|
'connecting to %s: %s\n'
|
|
'This means either someone is doing a man-in-the-middle '
|
|
'attack on your connection, or the server\'s certificate is '
|
|
'not in your trusted fingerprints list.')
|
|
% (self.irc.network, e.args[0]))
|
|
raise ssl.CertificateError('Aborting because of failed certificate '
|
|
'verification.')
|
|
|
|
|
|
|
|
Driver = SocketDriver
|
|
|
|
# vim:set shiftwidth=4 softtabstop=4 expandtab textwidth=79:
|
|
|