mirror of
https://github.com/ComradCollective/Comrad
synced 2024-11-05 21:20:51 +00:00
275 lines
9.1 KiB
Python
275 lines
9.1 KiB
Python
import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
|
|
from komrade import *
|
|
from komrade.backend import *
|
|
|
|
def is_valid_msg_d(msg_d):
|
|
if not type(msg_d)==dict: return False
|
|
to_name=msg_d.get('to_name')
|
|
to_pub=msg_d.get('to')
|
|
from_name=msg_d.get('from_name')
|
|
from_pub=msg_d.get('from')
|
|
msg=msg_d.get('msg')
|
|
# if to_name and to_pub and from_name and from_pub and msg: return True
|
|
if to_pub and from_pub and msg: return True
|
|
return False
|
|
|
|
|
|
class Message(Logger):
|
|
def __init__(self,msg_d,from_whom=None,to_whom=None,messenger=None,embedded_msg=None,is_encrypted=False):
|
|
# check input
|
|
if not is_valid_msg_d(msg_d):
|
|
raise KomradeException('This is not a valid msg_d:',msg_d)
|
|
# set fields
|
|
self.msg_d=msg_d
|
|
self.to_name=msg_d.get('to_name')
|
|
self.to_pubkey=msg_d.get('to')
|
|
self.from_name=msg_d.get('from_name')
|
|
self.from_pubkey=msg_d.get('from')
|
|
self.msg=msg_d.get('msg')
|
|
self.embedded_msg=embedded_msg # only if this message has an embedded one
|
|
self._route=msg_d.get(ROUTE_KEYNAME)
|
|
self._from_whom=from_whom
|
|
self._to_whom=to_whom
|
|
self.messenger=None
|
|
self._is_encrypted=None
|
|
# get operators straight away?
|
|
if not self._from_whom or not self._to_whom:
|
|
self.get_whoms()
|
|
|
|
if not self.from_name:
|
|
self.from_name=self.from_whom.name
|
|
if not self.to_name:
|
|
self.to_name=self.to_whom.name
|
|
if not self.to_pubkey:
|
|
self.to_pubkey=self.to_whom.pubkey.data
|
|
if not self.from_pubkey:
|
|
self.from_pubkey=self.from_whom.pubkey.data
|
|
if isBase64(self.to_pubkey): self.to_pubkey = b64decode(self.to_pubkey)
|
|
if isBase64(self.from_pubkey): self.from_pubkey = b64decode(self.from_pubkey)
|
|
|
|
def __repr__(self):
|
|
if type(self.msg)==dict:
|
|
if is_valid_msg_d(self.msg):
|
|
import textwrap
|
|
msg = textwrap.indent(repr(Message(self.msg)),' '*10)
|
|
else:
|
|
msg=dict_format(self.msg,tab=4)
|
|
elif type(self.msg)==bytes:
|
|
msg=b64encode(self.msg).decode() if not isBase64(self.msg) else self.msg
|
|
else:
|
|
msg=self.msg
|
|
return f"""
|
|
from: {self.from_whom.find_name(b64encode(self.from_pubkey))}
|
|
({b64encode(self.from_pubkey).decode()})
|
|
|
|
to: {'@'+self.to_whom.name}
|
|
({b64encode(self.to_pubkey).decode()})
|
|
|
|
msg: {msg}
|
|
"""
|
|
|
|
|
|
@property
|
|
def data(self):
|
|
md={}
|
|
msg_d=self.msg_d
|
|
while msg_d:
|
|
for k,v in msg_d.items(): md[k]=v
|
|
msg_d = msg_d.get('msg',{})
|
|
if type(msg_d)!=dict: msg_d=None
|
|
if 'msg' in md and type(md['msg']) == dict:
|
|
del md['msg']
|
|
del md[ROUTE_KEYNAME]
|
|
return md
|
|
|
|
def mark_return_to_sender(self,new_msg=None):
|
|
self._from_whom,self._to_whom = self._to_whom,self._from_whom
|
|
self.msg_d['from'],self.msg_d['to'] = self.msg_d['to'],self.msg_d['from'],
|
|
self.msg_d['from_name'],self.msg_d['to_name'] = self.msg_d['to_name'],self.msg_d['from_name'],
|
|
if new_msg:
|
|
self.msg=self.msg_d['msg']=new_msg
|
|
|
|
def get_whom(self,name=None,pubkey=None):
|
|
from komrade.backend.operators import locate_an_operator
|
|
return locate_an_operator(name=None,pubkey=None)
|
|
|
|
@property
|
|
def from_whom(self):
|
|
if not self._from_whom:
|
|
self._from_whom,self._to_whom = self.get_whoms()
|
|
return self._from_whom
|
|
|
|
@property
|
|
def to_whom(self):
|
|
if not self._to_whom:
|
|
self._from_whom,self._to_whom = self.get_whoms()
|
|
return self._to_whom
|
|
|
|
def get_whoms(self):
|
|
if self._from_whom is None or self._to_whom is None:
|
|
self._from_whom = locate_an_operator(self.from_name,self.from_pubkey)
|
|
self._to_whom = locate_an_operator(self.to_name,self.to_pubkey)
|
|
return self._from_whom,self._to_whom
|
|
|
|
|
|
## loading messages
|
|
def get_whoms1(self):
|
|
if self._from_whom is not None and self._to_whom is not None:
|
|
return (self._from_whom,self._to_whom)
|
|
alleged_from_whom = self.get_whom(self.from_name)
|
|
alleged_to_whom = self.get_whom(self.to_name)
|
|
if not self.whom_records_match(alleged_from_whom,alleged_to_whom):
|
|
raise KomradeException('Records of from_whoms on The Operator and the from_whom do not match. Something fishy going on?')
|
|
else:
|
|
self._from_whom = alleged_from_whom
|
|
self._to_whom = alleged_to_whom
|
|
return (self._from_whom,self._to_whom)
|
|
|
|
def whom_records_match(self,alleged_from_whom,alleged_to_whom):
|
|
alleged_from_whom_name = self.from_name
|
|
alleged_from_whom_pubkey = self.from_pubkey
|
|
alleged_to_whom_name = self.to_name
|
|
alleged_to_whom_pubkey = self.to_pubkey
|
|
|
|
# self.log('from_whom names:',alleged_from_whom.name, alleged_from_whom_name)
|
|
# self.log('from_whom pubs:',alleged_from_whom.pubkey, alleged_from_whom_pubkey)
|
|
# self.log('to_whom names:',alleged_to_whom.name, alleged_to_whom_name)
|
|
# self.log('to_whom pubs:',alleged_to_whom.pubkey, alleged_to_whom_pubkey)
|
|
|
|
if alleged_to_whom.name != alleged_to_whom_name:
|
|
return False
|
|
if alleged_from_whom.name != alleged_from_whom_name:
|
|
return False
|
|
if alleged_to_whom.pubkey != alleged_to_whom_pubkey:
|
|
return False
|
|
if alleged_from_whom.pubkey != alleged_from_whom_pubkey:
|
|
return False
|
|
return True
|
|
|
|
def decrypt(self,recursive=False):
|
|
# check if needs decryption
|
|
if not self.is_encrypted: return
|
|
|
|
# otherwise lets do it
|
|
self.msg_encr = self.msg
|
|
self.log(f'attempting to decrypt {self}')
|
|
|
|
# decrypt msg
|
|
self.msg = self.msg_d['msg'] = decr_msg_b = SMessage(
|
|
self.to_whom.privkey.data,
|
|
self.from_pubkey
|
|
).unwrap(self.msg)
|
|
# self.log('Am I decrypted?',self)
|
|
|
|
# unpickle
|
|
self.msg = self.msg_d['msg'] = decr_msg = pickle.loads(decr_msg_b)
|
|
self.log('I am now decrypted and unpickled:',self)
|
|
|
|
# now, is the decrypted message itself a message?
|
|
if is_valid_msg_d(decr_msg):
|
|
self.log('Once decrypted, I discovered that I contain a valid msg in its own right!',self)
|
|
# then ... make that, a message object and decrypt it too!
|
|
self.msg = Message(decr_msg)
|
|
|
|
if recursive and self.msg.is_encrypted:
|
|
self.msg.decrypt()
|
|
|
|
# self.log(f'done decrypting! {self}')
|
|
return decr_msg
|
|
|
|
@property
|
|
def is_encrypted(self):
|
|
return type(self.msg) == bytes
|
|
# if self.msg._is_encrypted is not None:
|
|
# return self.msg._is_encrypted
|
|
|
|
|
|
|
|
def encrypt(self): # each child message should already be encrypted before coming to its parent message ,recursive=False):
|
|
if self._is_encrypted: return
|
|
# self.log(f'attempting to encrypt msg {self.msg} from {self.from_whom} to {self.to_whom}')
|
|
self.log(f'Before encrypting the message from @{self.from_name} to @{self.to_name}, it looks like:\n{self}')
|
|
|
|
# make sure msg is not meeta
|
|
if self.has_embedded_msg:
|
|
self.msg = self.msg.msg_d
|
|
self.log('woops, first had to replace Message object with dict',self)
|
|
|
|
# binarize msg
|
|
msg_b = pickle.dumps(self.msg)
|
|
|
|
# encrypt it!
|
|
msg_encr = SMessage(
|
|
self.from_whom.privkey.data,
|
|
self.to_pubkey
|
|
).wrap(msg_b)
|
|
|
|
self.msg_decr = self.msg
|
|
self.msg_d['msg'] = self.msg = b64encode(msg_encr)
|
|
self.log(f'After encrypting the message from {self.from_whom} to {self.to_whom}, it looks like:\n{self}')
|
|
self.msg_d['msg'] = self.msg = msg_encr
|
|
self._is_encrypted = True
|
|
|
|
|
|
|
|
|
|
|
|
## msg properties
|
|
@property
|
|
def has_embedded_msg(self):
|
|
return type(self.msg) == Message
|
|
|
|
@property
|
|
def messages(self):
|
|
# move through msgs recursively
|
|
def _msgs():
|
|
msg=self
|
|
while True:
|
|
yield msg
|
|
if msg.has_embedded_msg:
|
|
msg=msg.msg
|
|
break
|
|
return list(_msgs())
|
|
|
|
@property
|
|
def route(self):
|
|
if type(self.msg)==dict:
|
|
rte=self.msg.get(ROUTE_KEYNAME)
|
|
if rte:
|
|
return rte
|
|
if self.has_embedded_msg:
|
|
return self.msg.route
|
|
return None
|
|
|
|
def delete_route(self):
|
|
if type(self.msg)==dict:
|
|
del self.msg[ROUTE_KEYNAME]
|
|
if ROUTE_KEYNAME in self.msg_d['msg']:
|
|
del self.msg_d['msg'][ROUTE_KEYNAME]
|
|
|
|
if self.has_embedded_msg:
|
|
self.msg.delete_route()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_msg():
|
|
phone = TheTelephone()
|
|
op = TheOperator()
|
|
|
|
pprint(op.pubkey)
|
|
print('?keychains?')
|
|
pprint(phone.pubkey)
|
|
|
|
msg={'_route':'forge_new_keys'}
|
|
|
|
|
|
resp_msp_obj = phone.ring_ring(msg)
|
|
print(resp_msp_obj)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
test_msg() |