forked from indymedia/epicyon
180 lines
6.4 KiB
Python
180 lines
6.4 KiB
Python
__filename__ = "session.py"
|
|
__author__ = "Bob Mottram"
|
|
__license__ = "AGPL3+"
|
|
__version__ = "1.1.0"
|
|
__maintainer__ = "Bob Mottram"
|
|
__email__ = "bob@freedombone.net"
|
|
__status__ = "Production"
|
|
|
|
import os
|
|
import requests
|
|
from utils import urlPermitted
|
|
import json
|
|
|
|
baseDirectory = None
|
|
|
|
|
|
def createSession(proxyType: str):
|
|
session = None
|
|
try:
|
|
session = requests.session()
|
|
except BaseException:
|
|
print('ERROR: session request failed')
|
|
return None
|
|
if not session:
|
|
return None
|
|
if proxyType == 'tor':
|
|
session.proxies = {}
|
|
session.proxies['http'] = 'socks5h://localhost:9050'
|
|
session.proxies['https'] = 'socks5h://localhost:9050'
|
|
elif proxyType == 'i2p':
|
|
session.proxies = {}
|
|
session.proxies['http'] = 'socks5h://localhost:4444'
|
|
session.proxies['https'] = 'socks5h://localhost:4444'
|
|
elif proxyType == 'gnunet':
|
|
session.proxies = {}
|
|
session.proxies['http'] = 'socks5h://localhost:7777'
|
|
session.proxies['https'] = 'socks5h://localhost:7777'
|
|
return session
|
|
|
|
|
|
def getJson(session, url: str, headers: {}, params: {},
|
|
version='1.0.0', httpPrefix='https',
|
|
domain='testdomain') -> {}:
|
|
if not isinstance(url, str):
|
|
print('url: ' + str(url))
|
|
print('ERROR: getJson url should be a string')
|
|
return None
|
|
sessionParams = {}
|
|
sessionHeaders = {}
|
|
if headers:
|
|
sessionHeaders = headers
|
|
if params:
|
|
sessionParams = params
|
|
sessionHeaders['User-Agent'] = 'Epicyon/' + version
|
|
if domain:
|
|
sessionHeaders['User-Agent'] += \
|
|
'; +' + httpPrefix + '://' + domain + '/'
|
|
if not session:
|
|
print('WARN: no session specified for getJson')
|
|
try:
|
|
result = session.get(url, headers=sessionHeaders, params=sessionParams)
|
|
return result.json()
|
|
except Exception as e:
|
|
print('ERROR: getJson failed\nurl: ' + str(url) + '\n' +
|
|
'headers: ' + str(sessionHeaders) + '\n' +
|
|
'params: ' + str(sessionParams) + '\n')
|
|
print(e)
|
|
return None
|
|
|
|
|
|
def postJson(session, postJsonObject: {}, federationList: [],
|
|
inboxUrl: str, headers: {}, capability: str) -> str:
|
|
"""Post a json message to the inbox of another person
|
|
Supplying a capability, such as "inbox:write"
|
|
"""
|
|
# always allow capability requests
|
|
if not capability.startswith('cap'):
|
|
# check that we are posting to a permitted domain
|
|
if not urlPermitted(inboxUrl, federationList, capability):
|
|
print('postJson: ' + inboxUrl + ' not permitted')
|
|
return None
|
|
|
|
try:
|
|
postResult = \
|
|
session.post(url=inboxUrl,
|
|
data=json.dumps(postJsonObject),
|
|
headers=headers)
|
|
except BaseException:
|
|
print('ERROR: postJson failed ' + inboxUrl + ' ' +
|
|
json.dumps(postJsonObject) + ' ' + str(headers))
|
|
return None
|
|
if postResult:
|
|
return postResult.text
|
|
return None
|
|
|
|
|
|
def postJsonString(session, postJsonStr: str,
|
|
federationList: [],
|
|
inboxUrl: str,
|
|
headers: {},
|
|
capability: str,
|
|
debug: bool) -> (bool, bool):
|
|
"""Post a json message string to the inbox of another person
|
|
Supplying a capability, such as "inbox:write"
|
|
The second boolean returned is true if the send is unauthorized
|
|
NOTE: Here we post a string rather than the original json so that
|
|
conversions between string and json format don't invalidate
|
|
the message body digest of http signatures
|
|
"""
|
|
# always allow capability requests
|
|
if not capability.startswith('cap'):
|
|
# check that we are posting to a permitted domain
|
|
if not urlPermitted(inboxUrl, federationList, capability):
|
|
print('postJson: ' + inboxUrl + ' not permitted by capabilities')
|
|
return None, None
|
|
|
|
try:
|
|
postResult = \
|
|
session.post(url=inboxUrl, data=postJsonStr, headers=headers)
|
|
except BaseException:
|
|
print('ERROR: postJsonString failed ' + inboxUrl + ' ' +
|
|
postJsonStr + ' ' + str(headers))
|
|
return None, None
|
|
if postResult.status_code < 200 or postResult.status_code > 202:
|
|
if postResult.status_code >= 400 and \
|
|
postResult.status_code <= 405 and \
|
|
postResult.status_code != 404:
|
|
print('WARN: >>> Post to ' + inboxUrl +
|
|
' is unauthorized. Code ' +
|
|
str(postResult.status_code) + ' <<<')
|
|
return False, True
|
|
else:
|
|
print('WARN: Failed to post to ' + inboxUrl +
|
|
' with headers ' + str(headers))
|
|
print('status code ' + str(postResult.status_code))
|
|
return False, False
|
|
return True, False
|
|
|
|
|
|
def postImage(session, attachImageFilename: str, federationList: [],
|
|
inboxUrl: str, headers: {}, capability: str) -> str:
|
|
"""Post an image to the inbox of another person or outbox via c2s
|
|
Supplying a capability, such as "inbox:write"
|
|
"""
|
|
# always allow capability requests
|
|
if not capability.startswith('cap'):
|
|
# check that we are posting to a permitted domain
|
|
if not urlPermitted(inboxUrl, federationList, capability):
|
|
print('postJson: ' + inboxUrl + ' not permitted')
|
|
return None
|
|
|
|
if not (attachImageFilename.endswith('.jpg') or
|
|
attachImageFilename.endswith('.jpeg') or
|
|
attachImageFilename.endswith('.png') or
|
|
attachImageFilename.endswith('.gif')):
|
|
print('Image must be png, jpg, or gif')
|
|
return None
|
|
if not os.path.isfile(attachImageFilename):
|
|
print('Image not found: ' + attachImageFilename)
|
|
return None
|
|
contentType = 'image/jpeg'
|
|
if attachImageFilename.endswith('.png'):
|
|
contentType = 'image/png'
|
|
if attachImageFilename.endswith('.gif'):
|
|
contentType = 'image/gif'
|
|
headers['Content-type'] = contentType
|
|
|
|
with open(attachImageFilename, 'rb') as avFile:
|
|
mediaBinary = avFile.read()
|
|
try:
|
|
postResult = session.post(url=inboxUrl, data=mediaBinary,
|
|
headers=headers)
|
|
except BaseException:
|
|
print('ERROR: postImage failed ' + inboxUrl + ' ' +
|
|
str(headers))
|
|
return None
|
|
if postResult:
|
|
return postResult.text
|
|
return None
|