mirror of
https://github.com/SickGear/SickGear.git
synced 2024-12-22 10:43:38 +00:00
e56303798c
Initial SickGear for Python 3.
1132 lines
37 KiB
Python
1132 lines
37 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2019 Chris Caron <lead2gold@gmail.com>
|
|
# All rights reserved.
|
|
#
|
|
# This code is licensed under the MIT License.
|
|
#
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
# of this software and associated documentation files(the "Software"), to deal
|
|
# in the Software without restriction, including without limitation the rights
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and / or sell
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|
# furnished to do so, subject to the following conditions :
|
|
#
|
|
# The above copyright notice and this permission notice shall be included in
|
|
# all copies or substantial portions of the Software.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
# THE SOFTWARE.
|
|
|
|
# Great sources
|
|
# - https://github.com/matrix-org/matrix-python-sdk
|
|
# - https://github.com/matrix-org/synapse/blob/master/docs/reverse_proxy.rst
|
|
#
|
|
import re
|
|
import six
|
|
import requests
|
|
from json import dumps
|
|
from json import loads
|
|
from time import time
|
|
|
|
from .NotifyBase import NotifyBase
|
|
from ..URLBase import PrivacyMode
|
|
from ..common import NotifyType
|
|
from ..common import NotifyImageSize
|
|
from ..common import NotifyFormat
|
|
from ..utils import parse_bool
|
|
from ..utils import parse_list
|
|
from ..utils import validate_regex
|
|
from ..AppriseLocale import gettext_lazy as _
|
|
|
|
# Define default path
|
|
MATRIX_V2_API_PATH = '/_matrix/client/r0'
|
|
MATRIX_V1_WEBHOOK_PATH = '/api/v1/matrix/hook'
|
|
|
|
# Extend HTTP Error Messages
|
|
MATRIX_HTTP_ERROR_MAP = {
|
|
403: 'Unauthorized - Invalid Token.',
|
|
429: 'Rate limit imposed; wait 2s and try again',
|
|
}
|
|
|
|
# Matrix Room Syntax
|
|
IS_ROOM_ALIAS = re.compile(
|
|
r'^\s*(#|%23)?(?P<room>[a-z0-9-]+)((:|%3A)'
|
|
r'(?P<home_server>[a-z0-9.-]+))?\s*$', re.I)
|
|
|
|
# Room ID MUST start with an exclamation to avoid ambiguity
|
|
IS_ROOM_ID = re.compile(
|
|
r'^\s*(!|!|%21)(?P<room>[a-z0-9-]+)((:|%3A)'
|
|
r'(?P<home_server>[a-z0-9.-]+))?\s*$', re.I)
|
|
|
|
|
|
class MatrixWebhookMode(object):
|
|
# Webhook Mode is disabled
|
|
DISABLED = "off"
|
|
|
|
# The default webhook mode is to just be set to Matrix
|
|
MATRIX = "matrix"
|
|
|
|
# Support the slack webhook plugin
|
|
SLACK = "slack"
|
|
|
|
# Support the t2bot webhook plugin
|
|
T2BOT = "t2bot"
|
|
|
|
|
|
# webhook modes are placed ito this list for validation purposes
|
|
MATRIX_WEBHOOK_MODES = (
|
|
MatrixWebhookMode.DISABLED,
|
|
MatrixWebhookMode.MATRIX,
|
|
MatrixWebhookMode.SLACK,
|
|
MatrixWebhookMode.T2BOT,
|
|
)
|
|
|
|
|
|
class NotifyMatrix(NotifyBase):
|
|
"""
|
|
A wrapper for Matrix Notifications
|
|
"""
|
|
|
|
# The default descriptive name associated with the Notification
|
|
service_name = 'Matrix'
|
|
|
|
# The services URL
|
|
service_url = 'https://matrix.org/'
|
|
|
|
# The default protocol
|
|
protocol = 'matrix'
|
|
|
|
# The default secure protocol
|
|
secure_protocol = 'matrixs'
|
|
|
|
# A URL that takes you to the setup/help of the specific protocol
|
|
setup_url = 'https://github.com/caronc/apprise/wiki/Notify_matrix'
|
|
|
|
# Allows the user to specify the NotifyImageSize object
|
|
image_size = NotifyImageSize.XY_32
|
|
|
|
# The maximum allowable characters allowed in the body per message
|
|
body_maxlen = 1000
|
|
|
|
# Throttle a wee-bit to avoid thrashing
|
|
request_rate_per_sec = 0.5
|
|
|
|
# How many retry attempts we'll make in the event the server asks us to
|
|
# throttle back.
|
|
default_retries = 2
|
|
|
|
# The number of micro seconds to wait if we get a 429 error code and
|
|
# the server doesn't remind us how long we shoul wait for
|
|
default_wait_ms = 1000
|
|
|
|
# Define object templates
|
|
templates = (
|
|
# Targets are ignored when using t2bot mode; only a token is required
|
|
'{schema}://{token}',
|
|
'{schema}://{user}@{token}',
|
|
|
|
# All other non-t2bot setups require targets
|
|
'{schema}://{user}:{password}@{host}/{targets}',
|
|
'{schema}://{user}:{password}@{host}:{port}/{targets}',
|
|
'{schema}://{token}:{password}@{host}/{targets}',
|
|
'{schema}://{token}:{password}@{host}:{port}/{targets}',
|
|
'{schema}://{user}:{token}:{password}@{host}/{targets}',
|
|
'{schema}://{user}:{token}:{password}@{host}:{port}/{targets}',
|
|
)
|
|
|
|
# Define our template tokens
|
|
template_tokens = dict(NotifyBase.template_tokens, **{
|
|
'host': {
|
|
'name': _('Hostname'),
|
|
'type': 'string',
|
|
'required': True,
|
|
},
|
|
'port': {
|
|
'name': _('Port'),
|
|
'type': 'int',
|
|
'min': 1,
|
|
'max': 65535,
|
|
},
|
|
'user': {
|
|
'name': _('Username'),
|
|
'type': 'string',
|
|
},
|
|
'password': {
|
|
'name': _('Password'),
|
|
'type': 'string',
|
|
'private': True,
|
|
},
|
|
'token': {
|
|
'name': _('Access Token'),
|
|
'map_to': 'password',
|
|
},
|
|
'target_user': {
|
|
'name': _('Target User'),
|
|
'type': 'string',
|
|
'prefix': '@',
|
|
'map_to': 'targets',
|
|
},
|
|
'target_room_id': {
|
|
'name': _('Target Room ID'),
|
|
'type': 'string',
|
|
'prefix': '!',
|
|
'map_to': 'targets',
|
|
},
|
|
'target_room_alias': {
|
|
'name': _('Target Room Alias'),
|
|
'type': 'string',
|
|
'prefix': '!',
|
|
'map_to': 'targets',
|
|
},
|
|
'targets': {
|
|
'name': _('Targets'),
|
|
'type': 'list:string',
|
|
},
|
|
})
|
|
|
|
# Define our template arguments
|
|
template_args = dict(NotifyBase.template_args, **{
|
|
'image': {
|
|
'name': _('Include Image'),
|
|
'type': 'bool',
|
|
'default': False,
|
|
'map_to': 'include_image',
|
|
},
|
|
'mode': {
|
|
'name': _('Webhook Mode'),
|
|
'type': 'choice:string',
|
|
'values': MATRIX_WEBHOOK_MODES,
|
|
'default': MatrixWebhookMode.DISABLED,
|
|
},
|
|
'to': {
|
|
'alias_of': 'targets',
|
|
},
|
|
})
|
|
|
|
def __init__(self, targets=None, mode=None, include_image=False, **kwargs):
|
|
"""
|
|
Initialize Matrix Object
|
|
"""
|
|
super(NotifyMatrix, self).__init__(**kwargs)
|
|
|
|
# Prepare a list of rooms to connect and notify
|
|
self.rooms = parse_list(targets)
|
|
|
|
# our home server gets populated after a login/registration
|
|
self.home_server = None
|
|
|
|
# our user_id gets populated after a login/registration
|
|
self.user_id = None
|
|
|
|
# This gets initialized after a login/registration
|
|
self.access_token = None
|
|
|
|
# Place an image inline with the message body
|
|
self.include_image = include_image
|
|
|
|
# maintain a lookup of room alias's we already paired with their id
|
|
# to speed up future requests
|
|
self._room_cache = {}
|
|
|
|
# Setup our mode
|
|
self.mode = MatrixWebhookMode.DISABLED \
|
|
if not isinstance(mode, six.string_types) else mode.lower()
|
|
if self.mode and self.mode not in MATRIX_WEBHOOK_MODES:
|
|
msg = 'The mode specified ({}) is invalid.'.format(mode)
|
|
self.logger.warning(msg)
|
|
raise TypeError(msg)
|
|
|
|
if self.mode == MatrixWebhookMode.T2BOT:
|
|
# t2bot configuration requires that a webhook id is specified
|
|
self.access_token = validate_regex(
|
|
self.host, r'^[a-z0-9]{64}$', 'i')
|
|
if not self.access_token:
|
|
msg = 'An invalid T2Bot/Matrix Webhook ID ' \
|
|
'({}) was specified.'.format(self.host)
|
|
self.logger.warning(msg)
|
|
raise TypeError(msg)
|
|
|
|
def send(self, body, title='', notify_type=NotifyType.INFO, **kwargs):
|
|
"""
|
|
Perform Matrix Notification
|
|
"""
|
|
|
|
# Call the _send_ function applicable to whatever mode we're in
|
|
# - calls _send_webhook_notification if the mode variable is set
|
|
# - calls _send_server_notification if the mode variable is not set
|
|
return getattr(self, '_send_{}_notification'.format(
|
|
'webhook' if self.mode != MatrixWebhookMode.DISABLED
|
|
else 'server'))(
|
|
body=body, title=title, notify_type=notify_type, **kwargs)
|
|
|
|
def _send_webhook_notification(self, body, title='',
|
|
notify_type=NotifyType.INFO, **kwargs):
|
|
"""
|
|
Perform Matrix Notification as a webhook
|
|
"""
|
|
|
|
headers = {
|
|
'User-Agent': self.app_id,
|
|
'Content-Type': 'application/json',
|
|
}
|
|
|
|
if self.mode != MatrixWebhookMode.T2BOT:
|
|
# Acquire our access token from our URL
|
|
access_token = self.password if self.password else self.user
|
|
|
|
default_port = 443 if self.secure else 80
|
|
|
|
# Prepare our URL
|
|
url = '{schema}://{hostname}:{port}/{webhook_path}/{token}'.format(
|
|
schema='https' if self.secure else 'http',
|
|
hostname=self.host,
|
|
port='' if self.port is None
|
|
or self.port == default_port else self.port,
|
|
webhook_path=MATRIX_V1_WEBHOOK_PATH,
|
|
token=access_token,
|
|
)
|
|
|
|
else:
|
|
#
|
|
# t2bot Setup
|
|
#
|
|
|
|
# Prepare our URL
|
|
url = 'https://webhooks.t2bot.io/api/v1/matrix/hook/' \
|
|
'{token}'.format(token=self.access_token)
|
|
|
|
# Retrieve our payload
|
|
payload = getattr(self, '_{}_webhook_payload'.format(self.mode))(
|
|
body=body, title=title, notify_type=notify_type, **kwargs)
|
|
|
|
self.logger.debug('Matrix POST URL: %s (cert_verify=%r)' % (
|
|
url, self.verify_certificate,
|
|
))
|
|
self.logger.debug('Matrix Payload: %s' % str(payload))
|
|
|
|
# Always call throttle before any remote server i/o is made
|
|
self.throttle()
|
|
|
|
try:
|
|
r = requests.post(
|
|
url,
|
|
data=dumps(payload),
|
|
headers=headers,
|
|
verify=self.verify_certificate,
|
|
)
|
|
if r.status_code != requests.codes.ok:
|
|
# We had a problem
|
|
status_str = \
|
|
NotifyMatrix.http_response_code_lookup(
|
|
r.status_code, MATRIX_HTTP_ERROR_MAP)
|
|
|
|
self.logger.warning(
|
|
'Failed to send Matrix notification: '
|
|
'{}{}error={}.'.format(
|
|
status_str,
|
|
', ' if status_str else '',
|
|
r.status_code))
|
|
|
|
self.logger.debug('Response Details:\r\n{}'.format(r.content))
|
|
|
|
# Return; we're done
|
|
return False
|
|
|
|
else:
|
|
self.logger.info('Sent Matrix notification.')
|
|
|
|
except requests.RequestException as e:
|
|
self.logger.warning(
|
|
'A Connection error occured sending Matrix notification.'
|
|
)
|
|
self.logger.debug('Socket Exception: %s' % str(e))
|
|
# Return; we're done
|
|
return False
|
|
|
|
return True
|
|
|
|
def _slack_webhook_payload(self, body, title='',
|
|
notify_type=NotifyType.INFO, **kwargs):
|
|
"""
|
|
Format the payload for a Slack based message
|
|
|
|
"""
|
|
|
|
if not hasattr(self, '_re_slack_formatting_rules'):
|
|
# Prepare some one-time slack formating variables
|
|
|
|
self._re_slack_formatting_map = {
|
|
# New lines must become the string version
|
|
r'\r\*\n': '\\n',
|
|
# Escape other special characters
|
|
r'&': '&',
|
|
r'<': '<',
|
|
r'>': '>',
|
|
}
|
|
|
|
# Iterate over above list and store content accordingly
|
|
self._re_slack_formatting_rules = re.compile(
|
|
r'(' + '|'.join(self._re_slack_formatting_map.keys()) + r')',
|
|
re.IGNORECASE,
|
|
)
|
|
|
|
# Perform Formatting
|
|
title = self._re_slack_formatting_rules.sub( # pragma: no branch
|
|
lambda x: self._re_slack_formatting_map[x.group()], title,
|
|
)
|
|
|
|
body = self._re_slack_formatting_rules.sub( # pragma: no branch
|
|
lambda x: self._re_slack_formatting_map[x.group()], body,
|
|
)
|
|
|
|
# prepare JSON Object
|
|
payload = {
|
|
'username': self.user if self.user else self.app_id,
|
|
# Use Markdown language
|
|
'mrkdwn': (self.notify_format == NotifyFormat.MARKDOWN),
|
|
'attachments': [{
|
|
'title': title,
|
|
'text': body,
|
|
'color': self.color(notify_type),
|
|
'ts': time(),
|
|
'footer': self.app_id,
|
|
}],
|
|
}
|
|
|
|
return payload
|
|
|
|
def _matrix_webhook_payload(self, body, title='',
|
|
notify_type=NotifyType.INFO, **kwargs):
|
|
"""
|
|
Format the payload for a Matrix based message
|
|
|
|
"""
|
|
|
|
payload = {
|
|
'displayName':
|
|
self.user if self.user else self.app_id,
|
|
'format': 'html',
|
|
}
|
|
|
|
if self.notify_format == NotifyFormat.HTML:
|
|
payload['text'] = '{}{}'.format('' if not title else title, body)
|
|
|
|
else: # TEXT or MARKDOWN
|
|
|
|
# Ensure our content is escaped
|
|
title = NotifyMatrix.escape_html(title)
|
|
body = NotifyMatrix.escape_html(body)
|
|
|
|
payload['text'] = '{}{}'.format(
|
|
'' if not title else '<h4>{}</h4>'.format(title), body)
|
|
|
|
return payload
|
|
|
|
def _t2bot_webhook_payload(self, body, title='',
|
|
notify_type=NotifyType.INFO, **kwargs):
|
|
"""
|
|
Format the payload for a T2Bot Matrix based messages
|
|
|
|
"""
|
|
|
|
# Retrieve our payload
|
|
payload = self._matrix_webhook_payload(
|
|
body=body, title=title, notify_type=notify_type, **kwargs)
|
|
|
|
# Acquire our image url if we're configured to do so
|
|
image_url = None if not self.include_image else \
|
|
self.image_url(notify_type)
|
|
|
|
if image_url:
|
|
# t2bot can take an avatarUrl Entry
|
|
payload['avatarUrl'] = image_url
|
|
|
|
return payload
|
|
|
|
def _send_server_notification(self, body, title='',
|
|
notify_type=NotifyType.INFO, **kwargs):
|
|
"""
|
|
Perform Direct Matrix Server Notification (no webhook)
|
|
"""
|
|
|
|
if self.access_token is None:
|
|
# We need to register
|
|
if not self._login():
|
|
if not self._register():
|
|
return False
|
|
|
|
if len(self.rooms) == 0:
|
|
# Attempt to retrieve a list of already joined channels
|
|
self.rooms = self._joined_rooms()
|
|
|
|
if len(self.rooms) == 0:
|
|
# Nothing to notify
|
|
self.logger.warning(
|
|
'There were no Matrix rooms specified to notify.')
|
|
return False
|
|
|
|
# Create a copy of our rooms to join and message
|
|
rooms = list(self.rooms)
|
|
|
|
# Initiaize our error tracking
|
|
has_error = False
|
|
|
|
while len(rooms) > 0:
|
|
|
|
# Get our room
|
|
room = rooms.pop(0)
|
|
|
|
# Get our room_id from our response
|
|
room_id = self._room_join(room)
|
|
if not room_id:
|
|
# Notify our user about our failure
|
|
self.logger.warning(
|
|
'Could not join Matrix room {}.'.format((room)))
|
|
|
|
# Mark our failure
|
|
has_error = True
|
|
continue
|
|
|
|
# We have our data cached at this point we can freely use it
|
|
msg = '{title}{body}'.format(
|
|
title='' if not title else '{}\r\n'.format(title),
|
|
body=body)
|
|
|
|
# Acquire our image url if we're configured to do so
|
|
image_url = None if not self.include_image else \
|
|
self.image_url(notify_type)
|
|
|
|
if image_url:
|
|
# Define our payload
|
|
image_payload = {
|
|
'msgtype': 'm.image',
|
|
'url': image_url,
|
|
'body': '{}'.format(notify_type if not title else title),
|
|
}
|
|
# Build our path
|
|
path = '/rooms/{}/send/m.room.message'.format(
|
|
NotifyMatrix.quote(room_id))
|
|
|
|
# Post our content
|
|
postokay, response = self._fetch(path, payload=image_payload)
|
|
if not postokay:
|
|
# Mark our failure
|
|
has_error = True
|
|
continue
|
|
|
|
# Define our payload
|
|
payload = {
|
|
'msgtype': 'm.text',
|
|
'body': msg,
|
|
}
|
|
|
|
# Build our path
|
|
path = '/rooms/{}/send/m.room.message'.format(
|
|
NotifyMatrix.quote(room_id))
|
|
|
|
# Post our content
|
|
postokay, response = self._fetch(path, payload=payload)
|
|
if not postokay:
|
|
# Notify our user
|
|
self.logger.warning(
|
|
'Could not send notification Matrix room {}.'.format(room))
|
|
|
|
# Mark our failure
|
|
has_error = True
|
|
continue
|
|
|
|
return not has_error
|
|
|
|
def _register(self):
|
|
"""
|
|
Register with the service if possible.
|
|
"""
|
|
|
|
# Prepare our Registration Payload. This will only work if registration
|
|
# is enabled for the public
|
|
payload = {
|
|
'kind': 'user',
|
|
'auth': {'type': 'm.login.dummy'},
|
|
}
|
|
|
|
# parameters
|
|
params = {
|
|
'kind': 'user',
|
|
}
|
|
|
|
# If a user is not specified, one will be randomly generated for you.
|
|
# If you do not specify a password, you will be unable to login to the
|
|
# account if you forget the access_token.
|
|
if self.user:
|
|
payload['username'] = self.user
|
|
|
|
if self.password:
|
|
payload['password'] = self.password
|
|
|
|
# Register
|
|
postokay, response = \
|
|
self._fetch('/register', payload=payload, params=params)
|
|
if not (postokay and isinstance(response, dict)):
|
|
# Failed to register
|
|
return False
|
|
|
|
# Pull the response details
|
|
self.access_token = response.get('access_token')
|
|
self.home_server = response.get('home_server')
|
|
self.user_id = response.get('user_id')
|
|
|
|
if self.access_token is not None:
|
|
self.logger.debug(
|
|
'Registered successfully with Matrix server.')
|
|
return True
|
|
|
|
return False
|
|
|
|
def _login(self):
|
|
"""
|
|
Acquires the matrix token required for making future requests. If we
|
|
fail we return False, otherwise we return True
|
|
"""
|
|
|
|
if self.access_token:
|
|
# Login not required; silently skip-over
|
|
return True
|
|
|
|
if not (self.user and self.password):
|
|
# It's not possible to register since we need these 2 values to
|
|
# make the action possible.
|
|
self.logger.warning(
|
|
'Failed to login to Matrix server: '
|
|
'user/pass combo is missing.')
|
|
return False
|
|
|
|
# Prepare our Registration Payload
|
|
payload = {
|
|
'type': 'm.login.password',
|
|
'user': self.user,
|
|
'password': self.password,
|
|
}
|
|
|
|
# Build our URL
|
|
postokay, response = self._fetch('/login', payload=payload)
|
|
if not (postokay and isinstance(response, dict)):
|
|
# Failed to login
|
|
return False
|
|
|
|
# Pull the response details
|
|
self.access_token = response.get('access_token')
|
|
self.home_server = response.get('home_server')
|
|
self.user_id = response.get('user_id')
|
|
|
|
if not self.access_token:
|
|
return False
|
|
|
|
self.logger.debug(
|
|
'Authenticated successfully with Matrix server.')
|
|
return True
|
|
|
|
def _logout(self):
|
|
"""
|
|
Relinquishes token from remote server
|
|
"""
|
|
|
|
if not self.access_token:
|
|
# Login not required; silently skip-over
|
|
return True
|
|
|
|
# Prepare our Registration Payload
|
|
payload = {}
|
|
|
|
# Expire our token
|
|
postokay, response = self._fetch('/logout', payload=payload)
|
|
if not postokay:
|
|
# If we get here, the token was declared as having already
|
|
# been expired. The response looks like this:
|
|
# {
|
|
# u'errcode': u'M_UNKNOWN_TOKEN',
|
|
# u'error': u'Access Token unknown or expired',
|
|
# }
|
|
#
|
|
# In this case it's okay to safely return True because
|
|
# we're logged out in this case.
|
|
if response.get('errcode') != u'M_UNKNOWN_TOKEN':
|
|
return False
|
|
|
|
# else: The response object looks like this if we were successful:
|
|
# {}
|
|
|
|
# Pull the response details
|
|
self.access_token = None
|
|
self.home_server = None
|
|
self.user_id = None
|
|
|
|
# Clear our room cache
|
|
self._room_cache = {}
|
|
|
|
self.logger.debug(
|
|
'Unauthenticated successfully with Matrix server.')
|
|
|
|
return True
|
|
|
|
def _room_join(self, room):
|
|
"""
|
|
Joins a matrix room if we're not already in it. Otherwise it attempts
|
|
to create it if it doesn't exist and always returns
|
|
the room_id if it was successful, otherwise it returns None
|
|
|
|
"""
|
|
|
|
if not self.access_token:
|
|
# We can't join a room if we're not logged in
|
|
return None
|
|
|
|
if not isinstance(room, six.string_types):
|
|
# Not a supported string
|
|
return None
|
|
|
|
# Prepare our Join Payload
|
|
payload = {}
|
|
|
|
# Not in cache, next step is to check if it's a room id...
|
|
result = IS_ROOM_ID.match(room)
|
|
if result:
|
|
# We detected ourselves the home_server
|
|
home_server = result.group('home_server') \
|
|
if result.group('home_server') else self.home_server
|
|
|
|
# It was a room ID; simple mapping:
|
|
room_id = "!{}:{}".format(
|
|
result.group('room'),
|
|
home_server,
|
|
)
|
|
|
|
# Build our URL
|
|
path = '/join/{}'.format(NotifyMatrix.quote(room_id))
|
|
|
|
# Make our query
|
|
postokay, _ = self._fetch(path, payload=payload)
|
|
return room_id if postokay else None
|
|
|
|
# Try to see if it's an alias then...
|
|
result = IS_ROOM_ALIAS.match(room)
|
|
if not result:
|
|
# There is nothing else it could be
|
|
self.logger.warning(
|
|
'Ignoring illegally formed room {} '
|
|
'from Matrix server list.'.format(room))
|
|
return None
|
|
|
|
# If we reach here, we're dealing with a channel alias
|
|
home_server = self.home_server \
|
|
if not result.group('home_server') \
|
|
else result.group('home_server')
|
|
|
|
# tidy our room (alias) identifier
|
|
room = '#{}:{}'.format(result.group('room'), home_server)
|
|
|
|
# Check our cache for speed:
|
|
if room in self._room_cache:
|
|
# We're done as we've already joined the channel
|
|
return self._room_cache[room]['id']
|
|
|
|
# If we reach here, we need to join the channel
|
|
|
|
# Build our URL
|
|
path = '/join/{}'.format(NotifyMatrix.quote(room))
|
|
|
|
# Attempt to join the channel
|
|
postokay, response = self._fetch(path, payload=payload)
|
|
if postokay:
|
|
# Cache our entry for fast access later
|
|
self._room_cache[room] = {
|
|
'id': response.get('room_id'),
|
|
'home_server': home_server,
|
|
}
|
|
return self._room_cache[room]['id']
|
|
|
|
# Try to create the channel
|
|
return self._room_create(room)
|
|
|
|
def _room_create(self, room):
|
|
"""
|
|
Creates a matrix room and return it's room_id if successful
|
|
otherwise None is returned.
|
|
"""
|
|
if not self.access_token:
|
|
# We can't create a room if we're not logged in
|
|
return None
|
|
|
|
if not isinstance(room, six.string_types):
|
|
# Not a supported string
|
|
return None
|
|
|
|
# Build our room if we have to:
|
|
result = IS_ROOM_ALIAS.match(room)
|
|
if not result:
|
|
# Illegally formed room
|
|
return None
|
|
|
|
# Our home_server
|
|
home_server = result.group('home_server') \
|
|
if result.group('home_server') else self.home_server
|
|
|
|
# update our room details
|
|
room = '#{}:{}'.format(result.group('room'), home_server)
|
|
|
|
# Prepare our Create Payload
|
|
payload = {
|
|
'room_alias_name': result.group('room'),
|
|
# Set our channel name
|
|
'name': '#{} - {}'.format(result.group('room'), self.app_desc),
|
|
# hide the room by default; let the user open it up if they wish
|
|
# to others.
|
|
'visibility': 'private',
|
|
'preset': 'trusted_private_chat',
|
|
}
|
|
|
|
postokay, response = self._fetch('/createRoom', payload=payload)
|
|
if not postokay:
|
|
# Failed to create channel
|
|
# Typical responses:
|
|
# - {u'errcode': u'M_ROOM_IN_USE',
|
|
# u'error': u'Room alias already taken'}
|
|
# - {u'errcode': u'M_UNKNOWN',
|
|
# u'error': u'Internal server error'}
|
|
if (response and response.get('errcode') == 'M_ROOM_IN_USE'):
|
|
return self._room_id(room)
|
|
return None
|
|
|
|
# Cache our entry for fast access later
|
|
self._room_cache[response.get('room_alias')] = {
|
|
'id': response.get('room_id'),
|
|
'home_server': home_server,
|
|
}
|
|
|
|
return response.get('room_id')
|
|
|
|
def _joined_rooms(self):
|
|
"""
|
|
Returns a list of the current rooms the logged in user
|
|
is a part of.
|
|
"""
|
|
|
|
if not self.access_token:
|
|
# No list is possible
|
|
return list()
|
|
|
|
postokay, response = self._fetch(
|
|
'/joined_rooms', payload=None, method='GET')
|
|
if not postokay:
|
|
# Failed to retrieve listings
|
|
return list()
|
|
|
|
# Return our list of rooms
|
|
return response.get('joined_rooms', list())
|
|
|
|
def _room_id(self, room):
|
|
"""Get room id from its alias.
|
|
Args:
|
|
room (str): The room alias name.
|
|
|
|
Returns:
|
|
returns the room id if it can, otherwise it returns None
|
|
"""
|
|
|
|
if not self.access_token:
|
|
# We can't get a room id if we're not logged in
|
|
return None
|
|
|
|
if not isinstance(room, six.string_types):
|
|
# Not a supported string
|
|
return None
|
|
|
|
# Build our room if we have to:
|
|
result = IS_ROOM_ALIAS.match(room)
|
|
if not result:
|
|
# Illegally formed room
|
|
return None
|
|
|
|
# Our home_server
|
|
home_server = result.group('home_server') \
|
|
if result.group('home_server') else self.home_server
|
|
|
|
# update our room details
|
|
room = '#{}:{}'.format(result.group('room'), home_server)
|
|
|
|
# Make our request
|
|
postokay, response = self._fetch(
|
|
"/directory/room/{}".format(
|
|
NotifyMatrix.quote(room)), payload=None, method='GET')
|
|
|
|
if postokay:
|
|
return response.get("room_id")
|
|
|
|
return None
|
|
|
|
def _fetch(self, path, payload=None, params=None, method='POST'):
|
|
"""
|
|
Wrapper to request.post() to manage it's response better and make
|
|
the send() function cleaner and easier to maintain.
|
|
|
|
This function returns True if the _post was successful and False
|
|
if it wasn't.
|
|
"""
|
|
|
|
# Define our headers
|
|
headers = {
|
|
'User-Agent': self.app_id,
|
|
'Content-Type': 'application/json',
|
|
}
|
|
|
|
if self.access_token is not None:
|
|
headers["Authorization"] = 'Bearer %s' % self.access_token
|
|
|
|
default_port = 443 if self.secure else 80
|
|
|
|
url = \
|
|
'{schema}://{hostname}:{port}{matrix_api}{path}'.format(
|
|
schema='https' if self.secure else 'http',
|
|
hostname=self.host,
|
|
port='' if self.port is None
|
|
or self.port == default_port else self.port,
|
|
matrix_api=MATRIX_V2_API_PATH,
|
|
path=path)
|
|
|
|
# Our response object
|
|
response = {}
|
|
|
|
# fetch function
|
|
fn = requests.post if method == 'POST' else requests.get
|
|
|
|
# Define how many attempts we'll make if we get caught in a throttle
|
|
# event
|
|
retries = self.default_retries if self.default_retries > 0 else 1
|
|
while retries > 0:
|
|
|
|
# Decrement our throttle retry count
|
|
retries -= 1
|
|
|
|
self.logger.debug('Matrix POST URL: %s (cert_verify=%r)' % (
|
|
url, self.verify_certificate,
|
|
))
|
|
self.logger.debug('Matrix Payload: %s' % str(payload))
|
|
|
|
# Initialize our response object
|
|
r = None
|
|
|
|
try:
|
|
r = fn(
|
|
url,
|
|
data=dumps(payload),
|
|
params=params,
|
|
headers=headers,
|
|
verify=self.verify_certificate,
|
|
)
|
|
|
|
response = loads(r.content)
|
|
|
|
if r.status_code == 429:
|
|
wait = self.default_wait_ms / 1000
|
|
try:
|
|
wait = response['retry_after_ms'] / 1000
|
|
|
|
except KeyError:
|
|
try:
|
|
errordata = response['error']
|
|
wait = errordata['retry_after_ms'] / 1000
|
|
except KeyError:
|
|
pass
|
|
|
|
self.logger.warning(
|
|
'Matrix server requested we throttle back {}ms; '
|
|
'retries left {}.'.format(wait, retries))
|
|
self.logger.debug(
|
|
'Response Details:\r\n{}'.format(r.content))
|
|
|
|
# Throttle for specified wait
|
|
self.throttle(wait=wait)
|
|
|
|
# Try again
|
|
continue
|
|
|
|
elif r.status_code != requests.codes.ok:
|
|
# We had a problem
|
|
status_str = \
|
|
NotifyMatrix.http_response_code_lookup(
|
|
r.status_code, MATRIX_HTTP_ERROR_MAP)
|
|
|
|
self.logger.warning(
|
|
'Failed to handshake with Matrix server: '
|
|
'{}{}error={}.'.format(
|
|
status_str,
|
|
', ' if status_str else '',
|
|
r.status_code))
|
|
|
|
self.logger.debug(
|
|
'Response Details:\r\n{}'.format(r.content))
|
|
|
|
# Return; we're done
|
|
return (False, response)
|
|
|
|
except (AttributeError, TypeError, ValueError):
|
|
# This gets thrown if we can't parse our JSON Response
|
|
# - ValueError = r.content is Unparsable
|
|
# - TypeError = r.content is None
|
|
# - AttributeError = r is None
|
|
self.logger.warning('Invalid response from Matrix server.')
|
|
self.logger.debug(
|
|
'Response Details:\r\n{}'.format(r.content))
|
|
return (False, {})
|
|
|
|
except requests.RequestException as e:
|
|
self.logger.warning(
|
|
'A Connection error occured while registering with Matrix'
|
|
' server.')
|
|
self.logger.debug('Socket Exception: %s' % str(e))
|
|
# Return; we're done
|
|
return (False, response)
|
|
|
|
return (True, response)
|
|
|
|
# If we get here, we ran out of retries
|
|
return (False, {})
|
|
|
|
def __del__(self):
|
|
"""
|
|
Ensure we relinquish our token
|
|
"""
|
|
if self.mode != MatrixWebhookMode.T2BOT:
|
|
self._logout()
|
|
|
|
def url(self, privacy=False, *args, **kwargs):
|
|
"""
|
|
Returns the URL built dynamically based on specified arguments.
|
|
"""
|
|
|
|
# Define any arguments set
|
|
args = {
|
|
'format': self.notify_format,
|
|
'overflow': self.overflow_mode,
|
|
'image': 'yes' if self.include_image else 'no',
|
|
'verify': 'yes' if self.verify_certificate else 'no',
|
|
'mode': self.mode,
|
|
}
|
|
|
|
# Determine Authentication
|
|
auth = ''
|
|
if self.user and self.password:
|
|
auth = '{user}:{password}@'.format(
|
|
user=NotifyMatrix.quote(self.user, safe=''),
|
|
password=self.pprint(
|
|
self.password, privacy, mode=PrivacyMode.Secret, safe=''),
|
|
)
|
|
|
|
elif self.user:
|
|
auth = '{user}@'.format(
|
|
user=NotifyMatrix.quote(self.user, safe=''),
|
|
)
|
|
|
|
default_port = 443 if self.secure else 80
|
|
|
|
return '{schema}://{auth}{hostname}{port}/{rooms}?{args}'.format(
|
|
schema=self.secure_protocol if self.secure else self.protocol,
|
|
auth=auth,
|
|
hostname=NotifyMatrix.quote(self.host, safe=''),
|
|
port='' if self.port is None
|
|
or self.port == default_port else ':{}'.format(self.port),
|
|
rooms=NotifyMatrix.quote('/'.join(self.rooms)),
|
|
args=NotifyMatrix.urlencode(args),
|
|
)
|
|
|
|
@staticmethod
|
|
def parse_url(url):
|
|
"""
|
|
Parses the URL and returns enough arguments that can allow
|
|
us to substantiate this object.
|
|
|
|
"""
|
|
results = NotifyBase.parse_url(url, verify_host=False)
|
|
if not results:
|
|
# We're done early as we couldn't load the results
|
|
return results
|
|
|
|
if not results.get('host'):
|
|
return None
|
|
|
|
# Get our rooms
|
|
results['targets'] = NotifyMatrix.split_path(results['fullpath'])
|
|
|
|
# Support the 'to' variable so that we can support rooms this way too
|
|
# The 'to' makes it easier to use yaml configuration
|
|
if 'to' in results['qsd'] and len(results['qsd']['to']):
|
|
results['targets'] += NotifyMatrix.parse_list(results['qsd']['to'])
|
|
|
|
# Thumbnail (old way)
|
|
if 'thumbnail' in results['qsd']:
|
|
# Deprication Notice issued for v0.7.5
|
|
NotifyMatrix.logger.deprecate(
|
|
'The Matrix URL contains the parameter '
|
|
'"thumbnail=" which will be deprecated in an upcoming '
|
|
'release. Please use "image=" instead.'
|
|
)
|
|
|
|
# use image= for consistency with the other plugins but we also
|
|
# support thumbnail= for backwards compatibility.
|
|
results['include_image'] = \
|
|
parse_bool(results['qsd'].get(
|
|
'image', results['qsd'].get('thumbnail', False)))
|
|
|
|
# Webhook (old way)
|
|
if 'webhook' in results['qsd']:
|
|
# Deprication Notice issued for v0.7.5
|
|
NotifyMatrix.logger.deprecate(
|
|
'The Matrix URL contains the parameter '
|
|
'"webhook=" which will be deprecated in an upcoming '
|
|
'release. Please use "mode=" instead.'
|
|
)
|
|
|
|
# use mode= for consistency with the other plugins but we also
|
|
# support webhook= for backwards compatibility.
|
|
results['mode'] = results['qsd'].get(
|
|
'mode', results['qsd'].get('webhook'))
|
|
|
|
# t2bot detection... look for just a hostname, and/or just a user/host
|
|
# if we match this; we can go ahead and set the mode (but only if
|
|
# it was otherwise not set)
|
|
if results['mode'] is None \
|
|
and not results['password'] \
|
|
and not results['targets']:
|
|
|
|
# Default mode to t2bot
|
|
results['mode'] = MatrixWebhookMode.T2BOT
|
|
|
|
return results
|
|
|
|
@staticmethod
|
|
def parse_native_url(url):
|
|
"""
|
|
Support https://webhooks.t2bot.io/api/v1/matrix/hook/WEBHOOK_TOKEN/
|
|
"""
|
|
|
|
result = re.match(
|
|
r'^https?://webhooks\.t2bot\.io/api/v1/matrix/hook/'
|
|
r'(?P<webhook_token>[A-Z0-9_-]+)/?'
|
|
r'(?P<args>\?.+)?$', url, re.I)
|
|
|
|
if result:
|
|
mode = 'mode={}'.format(MatrixWebhookMode.T2BOT)
|
|
|
|
return NotifyMatrix.parse_url(
|
|
'{schema}://{webhook_token}/{args}'.format(
|
|
schema=NotifyMatrix.secure_protocol,
|
|
webhook_token=result.group('webhook_token'),
|
|
args='?{}'.format(mode) if not result.group('args')
|
|
else '{}&{}'.format(result.group('args'), mode)))
|
|
|
|
return None
|