2
0
mirror of https://github.com/FluuxIO/go-xmpp synced 2024-11-15 18:13:07 +00:00
go-xmpp/component.go

196 lines
5.3 KiB
Go
Raw Normal View History

package xmpp
2018-01-11 21:15:54 +00:00
import (
"crypto/sha1"
"encoding/hex"
2018-01-11 22:00:59 +00:00
"encoding/xml"
"errors"
2018-01-11 21:15:54 +00:00
"fmt"
2018-01-11 22:00:59 +00:00
"io"
"gosrc.io/xmpp/stanza"
2018-01-11 21:15:54 +00:00
)
const componentStreamOpen = "<?xml version='1.0'?><stream:stream to='%s' xmlns='%s' xmlns:stream='%s'>"
type ComponentOptions struct {
2019-10-11 04:24:47 +00:00
TransportConfiguration
// =================================
// Component Connection Info
// Domain is the XMPP server subdomain that the component will handle
Domain string
// Secret is the "password" used by the XMPP server to secure component access
Secret string
// =================================
// Component discovery
// Component human readable name, that will be shown in XMPP discovery
Name string
// Typical categories and types: https://xmpp.org/registrar/disco-categories.html
Category string
Type string
// =================================
// Communication with developer client / StreamManager
// Track and broadcast connection state
EventManager
}
2018-01-11 21:15:54 +00:00
// Component implements an XMPP extension allowing to extend XMPP server
// using external components. Component specifications are defined
// in XEP-0114, XEP-0355 and XEP-0356.
type Component struct {
ComponentOptions
router *Router
2019-10-11 04:24:47 +00:00
transport Transport
2018-01-11 22:00:59 +00:00
// read / write
socketProxy io.ReadWriter // TODO
2018-01-11 22:00:59 +00:00
decoder *xml.Decoder
2018-01-11 21:15:54 +00:00
}
func NewComponent(opts ComponentOptions, r *Router) (*Component, error) {
c := Component{ComponentOptions: opts, router: r}
2019-06-09 10:48:22 +00:00
return &c, nil
}
2018-01-25 22:16:55 +00:00
// Connect triggers component connection to XMPP server component port.
// TODO: Failed handshake should be a permanent error
func (c *Component) Connect() error {
2019-09-05 20:01:40 +00:00
var state SMState
return c.Resume(state)
}
func (c *Component) Resume(sm SMState) error {
2018-01-11 21:15:54 +00:00
var err error
var streamId string
if c.ComponentOptions.TransportConfiguration.Domain == "" {
c.ComponentOptions.TransportConfiguration.Domain = c.ComponentOptions.Domain
2018-01-11 22:00:59 +00:00
}
c.transport = NewTransport(c.ComponentOptions.TransportConfiguration)
2018-01-11 22:00:59 +00:00
if streamId, err = c.transport.Connect(); err != nil {
2019-09-05 20:01:40 +00:00
c.updateState(StateStreamError)
return err
2018-01-11 21:15:54 +00:00
}
c.updateState(StateConnected)
2018-01-11 21:15:54 +00:00
// Authentication
2019-10-11 04:24:47 +00:00
if _, err := fmt.Fprintf(c.transport, "<handshake>%s</handshake>", c.handshake(streamId)); err != nil {
2019-09-05 20:01:40 +00:00
c.updateState(StateStreamError)
return NewConnError(errors.New("cannot send handshake "+err.Error()), false)
2018-01-11 22:00:59 +00:00
}
// Check server response for authentication
val, err := stanza.NextPacket(c.decoder)
2018-01-11 22:00:59 +00:00
if err != nil {
2019-09-05 20:01:40 +00:00
c.updateState(StateDisconnected)
return NewConnError(err, true)
2018-01-11 22:00:59 +00:00
}
switch v := val.(type) {
case stanza.StreamError:
2019-09-05 20:01:40 +00:00
c.streamError("conflict", "no auth loop")
return NewConnError(errors.New("handshake failed "+v.Error.Local), true)
case stanza.Handshake:
// Start the receiver go routine
2019-09-05 20:01:40 +00:00
c.updateState(StateSessionEstablished)
go c.recv()
2018-01-12 17:14:41 +00:00
return nil
2018-01-11 22:00:59 +00:00
default:
2019-09-05 20:01:40 +00:00
c.updateState(StateStreamError)
return NewConnError(errors.New("expecting handshake result, got "+v.Name()), true)
2018-01-11 22:00:59 +00:00
}
2018-01-12 17:14:41 +00:00
}
2018-01-11 22:00:59 +00:00
func (c *Component) Disconnect() {
// TODO: Add a way to wait for stream close acknowledgement from the server for clean disconnect
2019-10-11 04:24:47 +00:00
if c.transport != nil {
_ = c.transport.Close()
}
}
func (c *Component) SetHandler(handler EventHandler) {
c.Handler = handler
}
// Receiver Go routine receiver
func (c *Component) recv() (err error) {
for {
val, err := stanza.NextPacket(c.decoder)
if err != nil {
c.updateState(StateDisconnected)
return err
}
// Handle stream errors
switch p := val.(type) {
case stanza.StreamError:
c.router.route(c, val)
c.streamError(p.Error.Local, p.Text)
return errors.New("stream error: " + p.Error.Local)
}
c.router.route(c, val)
}
2018-01-12 18:08:47 +00:00
}
2018-01-26 08:55:39 +00:00
// Send marshalls XMPP stanza and sends it to the server.
func (c *Component) Send(packet stanza.Packet) error {
2019-10-11 04:24:47 +00:00
transport := c.transport
if transport == nil {
return errors.New("component is not connected")
}
2018-01-17 17:47:34 +00:00
data, err := xml.Marshal(packet)
if err != nil {
return errors.New("cannot marshal packet " + err.Error())
}
2019-10-11 04:24:47 +00:00
if _, err := fmt.Fprintf(transport, string(data)); err != nil {
2018-01-17 17:47:34 +00:00
return errors.New("cannot send packet " + err.Error())
}
return nil
}
2018-01-26 08:55:39 +00:00
// SendRaw sends an XMPP stanza as a string to the server.
// It can be invalid XML or XMPP content. In that case, the server will
// disconnect the component. It is up to the user of this method to
// carefully craft the XML content to produce valid XMPP.
func (c *Component) SendRaw(packet string) error {
2019-10-11 04:24:47 +00:00
transport := c.transport
if transport == nil {
return errors.New("component is not connected")
}
2019-06-09 10:21:20 +00:00
var err error
2019-10-11 04:24:47 +00:00
_, err = fmt.Fprintf(transport, packet)
2019-06-09 10:21:20 +00:00
return err
2018-01-26 08:55:39 +00:00
}
2018-01-25 22:16:55 +00:00
// handshake generates an authentication token based on StreamID and shared secret.
func (c *Component) handshake(streamId string) string {
// 1. Concatenate the Stream ID received from the server with the shared secret.
concatStr := streamId + c.Secret
// 2. Hash the concatenated string according to the SHA1 algorithm, i.e., SHA1( concat (sid, password)).
h := sha1.New()
h.Write([]byte(concatStr))
hash := h.Sum(nil)
// 3. Ensure that the hash output is in hexadecimal format, not binary or base64.
// 4. Convert the hash output to all lowercase characters.
encodedStr := hex.EncodeToString(hash)
return encodedStr
}
2019-06-09 11:02:58 +00:00
/*
TODO: Add support for discovery management directly in component
TODO: Support multiple identities on disco info
TODO: Support returning features on disco info
*/