2016-02-16 20:29:18 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-02-16 19:11:56 +01:00
|
|
|
from ctypes import *
|
2016-02-16 21:10:34 +01:00
|
|
|
from platform import system
|
2016-02-18 18:18:25 +01:00
|
|
|
from toxcore_enums_and_consts import *
|
2016-02-16 21:30:43 +01:00
|
|
|
import os
|
2016-02-16 19:11:56 +01:00
|
|
|
|
2016-02-17 22:40:40 +01:00
|
|
|
|
2016-02-16 19:11:56 +01:00
|
|
|
class ToxOptions(Structure):
|
|
|
|
_fields_ = [
|
2016-02-17 22:40:40 +01:00
|
|
|
('ipv6_enabled', c_bool),
|
|
|
|
('udp_enabled', c_bool),
|
|
|
|
('proxy_type', c_int),
|
|
|
|
('proxy_host', c_char_p),
|
|
|
|
('proxy_port', c_uint16),
|
|
|
|
('start_port', c_uint16),
|
|
|
|
('end_port', c_uint16),
|
|
|
|
('tcp_port', c_uint16),
|
|
|
|
('savedata_type', c_int),
|
|
|
|
('savedata_data', c_char_p),
|
|
|
|
('savedata_length', c_size_t)
|
2016-02-18 11:18:28 +01:00
|
|
|
]
|
2016-02-16 19:11:56 +01:00
|
|
|
|
|
|
|
|
|
|
|
class Tox(object):
|
2016-02-18 18:18:25 +01:00
|
|
|
def __init__(self, *args):
|
2016-02-17 22:40:40 +01:00
|
|
|
# load toxcore
|
2016-02-16 21:10:34 +01:00
|
|
|
if system() == 'Linux':
|
2016-02-16 21:30:43 +01:00
|
|
|
temp = os.path.dirname(os.path.abspath(__file__)) + '/libs/'
|
|
|
|
os.chdir(temp)
|
|
|
|
self.libtoxcore = CDLL(temp + 'libtoxcore.so')
|
2016-02-16 21:10:34 +01:00
|
|
|
elif system() == 'Windows':
|
2016-02-17 19:19:45 +01:00
|
|
|
self.libtoxcore = CDLL('libs/libtox.dll')
|
2016-02-18 13:06:48 +01:00
|
|
|
else:
|
|
|
|
raise OSError('Unknown system.')
|
2016-02-17 22:40:40 +01:00
|
|
|
|
2016-02-18 18:18:25 +01:00
|
|
|
if len(args) == 2:
|
|
|
|
# creating tox options struct
|
|
|
|
tox_err_options = c_int()
|
|
|
|
self.libtoxcore.tox_options_new.restype = POINTER(ToxOptions)
|
|
|
|
self.tox_options = self.libtoxcore.tox_options_new(addressof(tox_err_options))
|
|
|
|
if tox_err_options == TOX_ERR_OPTIONS_NEW['TOX_ERR_OPTIONS_NEW_MALLOC']:
|
|
|
|
raise MemoryError('The function failed to allocate enough memory for the options struct.')
|
|
|
|
|
|
|
|
# filling tox options struct
|
|
|
|
savedata = args[0]
|
|
|
|
settings = args[1]
|
|
|
|
self.tox_options.contents.ipv6_enabled = settings['ipv6_enabled']
|
|
|
|
self.tox_options.contents.udp_enabled = settings['udp_enabled']
|
|
|
|
self.tox_options.contents.proxy_type = settings['proxy_type']
|
|
|
|
self.tox_options.contents.proxy_host = settings['proxy_host']
|
|
|
|
self.tox_options.contents.proxy_port = settings['proxy_port']
|
|
|
|
self.tox_options.contents.start_port = settings['start_port']
|
|
|
|
self.tox_options.contents.end_port = settings['end_port']
|
|
|
|
self.tox_options.contents.tcp_port = settings['tcp_port']
|
|
|
|
self.tox_options.contents.savedata_type = TOX_SAVEDATA_TYPE['TOX_SAVEDATA_TYPE_TOX_SAVE']
|
|
|
|
self.tox_options.contents.savedata_data = c_char_p(savedata)
|
|
|
|
self.tox_options.contents.savedata_length = len(savedata)
|
|
|
|
|
|
|
|
# creating tox object
|
|
|
|
tox_err = c_int()
|
|
|
|
self.libtoxcore.tox_new.restype = POINTER(c_void_p)
|
|
|
|
self._tox_pointer = self.libtoxcore.tox_new(self.tox_options, addressof(tox_err))
|
|
|
|
if tox_err == TOX_ERR_NEW['TOX_ERR_NEW_NULL']:
|
|
|
|
raise ArgumentError('One of the arguments to the function was NULL when it was not expected.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_MALLOC']:
|
|
|
|
raise MemoryError('The function was unable to allocate enough '
|
|
|
|
'memory to store the internal structures for the Tox object.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_PORT_ALLOC']:
|
|
|
|
raise MemoryError('The function was unable to bind to a port. This may mean that all ports have already'
|
|
|
|
' been bound, e.g. by other Tox instances, or it may mean a permission error. You may'
|
|
|
|
' be able to gather more information from errno.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_PROXY_BAD_TYPE']:
|
|
|
|
raise ArgumentError('proxy_type was invalid.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_PROXY_BAD_HOST']:
|
|
|
|
raise ArgumentError('proxy_type was valid but the proxy_host passed had an invalid format or was NULL.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_PROXY_BAD_PORT']:
|
|
|
|
raise ArgumentError('proxy_type was valid, but the proxy_port was invalid.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_PROXY_NOT_FOUND']:
|
|
|
|
raise ArgumentError('The proxy address passed could not be resolved.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_LOAD_ENCRYPTED']:
|
|
|
|
raise ArgumentError('The byte array to be loaded contained an encrypted save.')
|
|
|
|
elif tox_err == TOX_ERR_NEW['TOX_ERR_NEW_LOAD_BAD_FORMAT']:
|
|
|
|
raise ArgumentError('The data format was invalid. This can happen when loading data that was saved by'
|
|
|
|
' an older version of Tox, or when the data has been corrupted. When loading from'
|
|
|
|
' badly formatted data, some data may have been loaded, and the rest is discarded.'
|
|
|
|
' Passing an invalid length parameter also causes this error.')
|
|
|
|
elif len(args) == 1:
|
|
|
|
self._tox_pointer = args[0]
|
|
|
|
else:
|
|
|
|
raise ArgumentError('1 or 2 arguments expected')
|
2016-02-18 11:18:28 +01:00
|
|
|
|
2016-02-18 11:50:28 +01:00
|
|
|
def get_savedata_size(self):
|
|
|
|
return self.libtoxcore.tox_get_savedata_size(self._tox_pointer)
|
|
|
|
|
|
|
|
def get_savedata(self, savedata=None):
|
|
|
|
if savedata is None:
|
|
|
|
savedata_size = self.get_savedata_size()
|
|
|
|
savedata = create_string_buffer(savedata_size)
|
|
|
|
self.libtoxcore.tox_get_savedata(self._tox_pointer, savedata)
|
|
|
|
return savedata
|
|
|
|
|
2016-02-18 14:00:08 +01:00
|
|
|
def bootstrap(self, address, port, public_key):
|
|
|
|
tox_err_bootstrap = c_int()
|
|
|
|
result = self.libtoxcore.tox_bootstrap(self._tox_pointer, c_char_p(address), c_uint16(port),
|
|
|
|
c_char_p(public_key), addressof(tox_err_bootstrap))
|
|
|
|
if tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_OK']:
|
|
|
|
return bool(result)
|
|
|
|
elif tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_NULL']:
|
|
|
|
raise ArgumentError('One of the arguments to the function was NULL when it was not expected.')
|
|
|
|
elif tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_BAD_HOST']:
|
|
|
|
raise ArgumentError('The address could not be resolved to an IP '
|
|
|
|
'address, or the IP address passed was invalid.')
|
|
|
|
elif tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_BAD_PORT']:
|
|
|
|
raise ArgumentError('The port passed was invalid. The valid port range is (1, 65535).')
|
|
|
|
|
2016-02-18 16:46:06 +01:00
|
|
|
def add_tcp_relay(self, address, port, public_key):
|
|
|
|
tox_err_bootstrap = c_int()
|
|
|
|
result = self.libtoxcore.tox_add_tcp_relay(self._tox_pointer, c_char_p(address), c_uint16(port),
|
|
|
|
c_char_p(public_key), addressof(tox_err_bootstrap))
|
|
|
|
if tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_OK']:
|
|
|
|
return bool(result)
|
|
|
|
elif tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_NULL']:
|
|
|
|
raise ArgumentError('One of the arguments to the function was NULL when it was not expected.')
|
|
|
|
elif tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_BAD_HOST']:
|
|
|
|
raise ArgumentError('The address could not be resolved to an IP '
|
|
|
|
'address, or the IP address passed was invalid.')
|
|
|
|
elif tox_err_bootstrap == TOX_ERR_BOOTSTRAP['TOX_ERR_BOOTSTRAP_BAD_PORT']:
|
|
|
|
raise ArgumentError('The port passed was invalid. The valid port range is (1, 65535).')
|
|
|
|
|
|
|
|
def self_get_connection_status(self):
|
|
|
|
return self.libtoxcore.tox_self_get_connection_status(self._tox_pointer)
|
|
|
|
|
|
|
|
def callback_self_connection_status(self, callback, user_data):
|
|
|
|
tox_self_connection_status_cb = CFUNCTYPE(None, c_void_p, c_int, c_void_p)
|
|
|
|
c_callback = tox_self_connection_status_cb(callback)
|
|
|
|
self.libtoxcore.tox_callback_self_connection_status(self._tox_pointer, c_callback, c_void_p(user_data))
|
|
|
|
|
2016-02-18 18:18:25 +01:00
|
|
|
def iteration_interval(self):
|
|
|
|
return int(self.libtoxcore.tox_iteration_interval(self._tox_pointer).value)
|
2016-02-16 20:29:18 +01:00
|
|
|
|
2016-02-18 18:18:25 +01:00
|
|
|
def iterate(self):
|
|
|
|
self.libtoxcore.tox_iterate(self._tox_pointer)
|
|
|
|
|
|
|
|
def self_get_address(self, address=None):
|
|
|
|
if address is None:
|
|
|
|
address = create_string_buffer(TOX_ADDRESS_SIZE)
|
|
|
|
self.libtoxcore.tox_self_get_address(self._tox_pointer, address)
|
|
|
|
return address
|
|
|
|
|
2016-02-18 18:48:30 +01:00
|
|
|
def self_set_nospam(self, nospam):
|
|
|
|
self.libtoxcore.tox_self_set_nospam(self._tox_pointer, c_uint32(nospam))
|
|
|
|
|
|
|
|
def self_get_nospam(self):
|
|
|
|
return int(self.libtoxcore.tox_self_get_nospam(self._tox_pointer).value)
|
|
|
|
|
|
|
|
def self_get_public_key(self, public_key=None):
|
|
|
|
if public_key is None:
|
|
|
|
public_key = create_string_buffer(TOX_PUBLIC_KEY_SIZE)
|
|
|
|
self.libtoxcore.tox_self_get_address(self._tox_pointer, public_key)
|
|
|
|
return public_key
|
|
|
|
|
|
|
|
def self_get_secret_key(self, secret_key=None):
|
|
|
|
if secret_key is None:
|
|
|
|
secret_key = create_string_buffer(TOX_PUBLIC_KEY_SIZE)
|
|
|
|
self.libtoxcore.tox_self_get_secret_key(self._tox_pointer, secret_key)
|
|
|
|
return secret_key
|
|
|
|
|
2016-02-18 21:33:13 +01:00
|
|
|
def self_set_name(self, name, length):
|
|
|
|
tox_err_set_info = c_int()
|
|
|
|
result = self.libtoxcore.tox_self_set_name(self._tox_pointer, c_char_p(name),
|
|
|
|
c_size_t(length), addressof(tox_err_set_info))
|
|
|
|
if tox_err_set_info == TOX_ERR_SET_INFO['TOX_ERR_SET_INFO_OK']:
|
|
|
|
return bool(result)
|
|
|
|
elif tox_err_set_info == TOX_ERR_SET_INFO['TOX_ERR_SET_INFO_NULL']:
|
|
|
|
raise ArgumentError('One of the arguments to the function was NULL when it was not expected.')
|
|
|
|
elif tox_err_set_info == TOX_ERR_SET_INFO['TOX_ERR_SET_INFO_TOO_LONG']:
|
|
|
|
raise ArgumentError('Information length exceeded maximum permissible size.')
|
|
|
|
|
|
|
|
def self_get_name_size(self):
|
|
|
|
return int(self.libtoxcore.tox_self_get_name_size(self._tox_pointer).value)
|
|
|
|
|
|
|
|
def self_get_name(self, name=None):
|
|
|
|
if name is None:
|
|
|
|
name = create_string_buffer(self.self_get_name_size())
|
|
|
|
self.libtoxcore.tox_self_get_name(self._tox_pointer, name)
|
|
|
|
return name
|
|
|
|
|
|
|
|
def self_set_status_message(self, status_message, length):
|
|
|
|
tox_err_set_info = c_int()
|
|
|
|
result = self.libtoxcore.tox_self_set_status_message(self._tox_pointer, c_char_p(status_message),
|
|
|
|
c_size_t(length), addressof(tox_err_set_info))
|
|
|
|
if tox_err_set_info == TOX_ERR_SET_INFO['TOX_ERR_SET_INFO_OK']:
|
|
|
|
return bool(result)
|
|
|
|
elif tox_err_set_info == TOX_ERR_SET_INFO['TOX_ERR_SET_INFO_NULL']:
|
|
|
|
raise ArgumentError('One of the arguments to the function was NULL when it was not expected.')
|
|
|
|
elif tox_err_set_info == TOX_ERR_SET_INFO['TOX_ERR_SET_INFO_TOO_LONG']:
|
|
|
|
raise ArgumentError('Information length exceeded maximum permissible size.')
|
|
|
|
|
|
|
|
def self_get_status_message_size(self):
|
|
|
|
return int(self.libtoxcore.tox_self_get_status_message_size(self._tox_pointer).value)
|
|
|
|
|
|
|
|
def self_get_status_message(self, status_message=None):
|
|
|
|
if status_message is None:
|
|
|
|
status_message = create_string_buffer(self.self_get_status_message_size())
|
|
|
|
self.libtoxcore.tox_self_get_status_message(self._tox_pointer, status_message)
|
|
|
|
return status_message
|
|
|
|
|
2016-02-18 18:18:25 +01:00
|
|
|
def __del__(self):
|
|
|
|
if hasattr(self, 'tox_options'):
|
|
|
|
self.libtoxcore.tox_kill(self._tox_pointer)
|
|
|
|
self.libtoxcore.tox_options_free(self.tox_options)
|
2016-02-16 19:11:56 +01:00
|
|
|
|
2016-02-17 22:40:40 +01:00
|
|
|
if __name__ == '__main__':
|
2016-02-18 18:18:25 +01:00
|
|
|
pass
|