793 lines
31 KiB
Python
793 lines
31 KiB
Python
|
# -*- mode: python; indent-tabs-mode: nil; py-indent-offset: 4; coding: utf-8 -*-
|
||
|
|
||
|
import os
|
||
|
import sys
|
||
|
import argparse
|
||
|
import re
|
||
|
import logging
|
||
|
import urllib
|
||
|
import json
|
||
|
from ctypes import *
|
||
|
from io import BytesIO
|
||
|
import time, contextlib
|
||
|
import unittest
|
||
|
from random import Random
|
||
|
random = Random()
|
||
|
|
||
|
try:
|
||
|
import pycurl
|
||
|
except ImportError:
|
||
|
pycurl = None
|
||
|
try:
|
||
|
import requests
|
||
|
except ImportError:
|
||
|
requests = None
|
||
|
|
||
|
from PyQt5 import QtCore, QtWidgets
|
||
|
from qtpy.QtWidgets import QApplication
|
||
|
|
||
|
import wrapper
|
||
|
from wrapper.toxcore_enums_and_consts import TOX_CONNECTION, TOX_USER_STATUS
|
||
|
try:
|
||
|
from user_data.settings import get_user_config_path
|
||
|
except ImportError:
|
||
|
get_user_config_path = None
|
||
|
|
||
|
# LOG=util.log
|
||
|
global LOG
|
||
|
LOG = logging.getLogger('app.'+'ts')
|
||
|
|
||
|
def LOG_ERROR(l): print('ERRORc: '+l)
|
||
|
def LOG_WARN(l): print('WARNc: ' +l)
|
||
|
def LOG_INFO(l): print('INFOc: ' +l)
|
||
|
def LOG_DEBUG(l): print('DEBUGc: '+l)
|
||
|
def LOG_TRACE(l): pass # print('TRACE+ '+l)
|
||
|
|
||
|
try:
|
||
|
from trepan.interfaces import server as Mserver
|
||
|
from trepan.api import debug
|
||
|
except:
|
||
|
print('trepan3 TCP server NOT available.')
|
||
|
else:
|
||
|
print('trepan3 TCP server available.')
|
||
|
def trepan_handler(num=None, f=None):
|
||
|
connection_opts={'IO': 'TCP', 'PORT': 6666}
|
||
|
intf = Mserver.ServerInterface(connection_opts=connection_opts)
|
||
|
dbg_opts = { 'interface': intf }
|
||
|
print('Starting TCP server listening on port 6666.')
|
||
|
debug(dbg_opts=dbg_opts)
|
||
|
return
|
||
|
|
||
|
# self._audio_thread.isAlive
|
||
|
iTHREAD_TIMEOUT = 1
|
||
|
iTHREAD_SLEEP = 1
|
||
|
iTHREAD_JOINS = 5
|
||
|
CONNECT_TIMEOUT = 20.0
|
||
|
|
||
|
lToxSamplerates = [8000, 12000, 16000, 24000, 48000]
|
||
|
lToxSampleratesK = [8, 12, 16, 24, 48]
|
||
|
lBOOLEANS = [
|
||
|
'local_discovery_enabled',
|
||
|
'udp_enabled',
|
||
|
'ipv6_enabled',
|
||
|
'compact_mode',
|
||
|
'allow_inline',
|
||
|
'notifications',
|
||
|
'sound_notifications',
|
||
|
'hole_punching_enabled',
|
||
|
'dht_announcements_enabled',
|
||
|
'save_history',
|
||
|
'download_nodes_list']
|
||
|
lBOOLEANS = [
|
||
|
'local_discovery_enabled',
|
||
|
'udp_enabled',
|
||
|
'ipv6_enabled',
|
||
|
'compact_mode',
|
||
|
'allow_inline',
|
||
|
'notifications',
|
||
|
'sound_notifications',
|
||
|
'hole_punching_enabled',
|
||
|
'dht_announcements_enabled',
|
||
|
'save_history',
|
||
|
'download_nodes_list'
|
||
|
'core_logging',
|
||
|
]
|
||
|
|
||
|
|
||
|
def bAreWeConnected():
|
||
|
# FixMe: Linux
|
||
|
sFile = f"/proc/{os.getpid()}/net/route"
|
||
|
if not os.path.isfile(sFile): return None
|
||
|
i = 0
|
||
|
for elt in open(sFile, "r").readlines():
|
||
|
if elt.startswith('Iface'): continue
|
||
|
if elt.startswith('lo'): continue
|
||
|
i += 1
|
||
|
return i > 0
|
||
|
|
||
|
lNEW = [ # ngc_jfreeg2:
|
||
|
('104.244.74.69', 38445, # tox.plastiras.org
|
||
|
'5E47BA1DC3913EB2CBF2D64CE4F23D8BFE5391BFABE5C43C5BAD13F0A414CD77'),
|
||
|
('172.93.52.70', 33445,
|
||
|
'79CADA4974B0926F286F025CD5FFDF3E654A3758C53E0273ECFC4D12C21DCA48'),
|
||
|
]
|
||
|
|
||
|
lGOOD = [
|
||
|
("95.79.50.56",
|
||
|
33445,
|
||
|
"8E7D0B859922EF569298B4D261A8CCB5FEA14FB91ED412A7603A585A25698832"),
|
||
|
("85.143.221.42",
|
||
|
33445,
|
||
|
"DA4E4ED4B697F2E9B000EEFE3A34B554ACD3F45F5C96EAEA2516DD7FF9AF7B43"),
|
||
|
("tox.verdict.gg",
|
||
|
33445,
|
||
|
"1C5293AEF2114717547B39DA8EA6F1E331E5E358B35F9B6B5F19317911C5F976"),
|
||
|
("tox.initramfs.io",
|
||
|
33445,
|
||
|
"3F0A45A268367C1BEA652F258C85F4A66DA76BCAA667A49E770BCC4917AB6A25"),
|
||
|
("144.217.167.73",
|
||
|
33445,
|
||
|
"7E5668E0EE09E19F320AD47902419331FFEE147BB3606769CFBE921A2A2FD34C"),
|
||
|
("tox.abilinski.com",
|
||
|
33445,
|
||
|
"10C00EB250C3233E343E2AEBA07115A5C28920E9C8D29492F6D00B29049EDC7E"),
|
||
|
("tox.novg.net",
|
||
|
33445,
|
||
|
"D527E5847F8330D628DAB1814F0A422F6DC9D0A300E6C357634EE2DA88C35463"),
|
||
|
("198.199.98.108",
|
||
|
33445,
|
||
|
"BEF0CFB37AF874BD17B9A8F9FE64C75521DB95A37D33C5BDB00E9CF58659C04F"),
|
||
|
('82.196.15.215', 33445, # tox.kurnevsky.net
|
||
|
"82EF82BA33445A1F91A7DB27189ECFC0C013E06E3DA71F588ED692BED625EC23"),
|
||
|
("81.169.136.229",
|
||
|
33445,
|
||
|
"E0DB78116AC6500398DDBA2AEEF3220BB116384CAB714C5D1FCD61EA2B69D75E"),
|
||
|
("tox2.abilinski.com",
|
||
|
33445,
|
||
|
"7A6098B590BDC73F9723FC59F82B3F9085A64D1B213AAF8E610FD351930D052D"),
|
||
|
("bg.tox.dcntrlzd.network",
|
||
|
33445,
|
||
|
"20AD2A54D70E827302CDF5F11D7C43FA0EC987042C36628E64B2B721A1426E36"),
|
||
|
("46.101.197.175",
|
||
|
33445,
|
||
|
"CD133B521159541FB1D326DE9850F5E56A6C724B5B8E5EB5CD8D950408E95707"),
|
||
|
("tox1.mf-net.eu",
|
||
|
33445,
|
||
|
"B3E5FA80DC8EBD1149AD2AB35ED8B85BD546DEDE261CA593234C619249419506"),
|
||
|
("tox2.mf-net.eu",
|
||
|
33445,
|
||
|
"70EA214FDE161E7432530605213F18F7427DC773E276B3E317A07531F548545F"),
|
||
|
("195.201.7.101",
|
||
|
33445,
|
||
|
"B84E865125B4EC4C368CD047C72BCE447644A2DC31EF75BD2CDA345BFD310107"),
|
||
|
("gt.sot-te.ch",
|
||
|
33445,
|
||
|
"F4F4856F1A311049E0262E9E0A160610284B434F46299988A9CB42BD3D494618"),
|
||
|
("5.19.249.240",
|
||
|
38296,
|
||
|
"DA98A4C0CD7473A133E115FEA2EBDAEEA2EF4F79FD69325FC070DA4DE4BA3238"),
|
||
|
("188.225.9.167",
|
||
|
33445,
|
||
|
"1911341A83E02503AB1FD6561BD64AF3A9D6C3F12B5FBB656976B2E678644A67"),
|
||
|
("122.116.39.151",
|
||
|
33445,
|
||
|
"5716530A10D362867C8E87EE1CD5362A233BAFBBA4CF47FA73B7CAD368BD5E6E"),
|
||
|
("195.123.208.139",
|
||
|
33445,
|
||
|
"534A589BA7427C631773D13083570F529238211893640C99D1507300F055FE73"),
|
||
|
("104.225.141.59",
|
||
|
43334,
|
||
|
"933BA20B2E258B4C0D475B6DECE90C7E827FE83EFA9655414E7841251B19A72C"),
|
||
|
("139.162.110.188",
|
||
|
33445,
|
||
|
"F76A11284547163889DDC89A7738CF271797BF5E5E220643E97AD3C7E7903D55"),
|
||
|
("198.98.49.206",
|
||
|
33445,
|
||
|
"28DB44A3CEEE69146469855DFFE5F54DA567F5D65E03EFB1D38BBAEFF2553255"),
|
||
|
("172.105.109.31",
|
||
|
33445,
|
||
|
"D46E97CF995DC1820B92B7D899E152A217D36ABE22730FEA4B6BF1BFC06C617C"),
|
||
|
("ru.tox.dcntrlzd.network",
|
||
|
33445,
|
||
|
"DBB2E896990ECC383DA2E68A01CA148105E34F9B3B9356F2FE2B5096FDB62762"),
|
||
|
("91.146.66.26",
|
||
|
33445,
|
||
|
"B5E7DAC610DBDE55F359C7F8690B294C8E4FCEC4385DE9525DBFA5523EAD9D53"),
|
||
|
("tox01.ky0uraku.xyz",
|
||
|
33445,
|
||
|
"FD04EB03ABC5FC5266A93D37B4D6D6171C9931176DC68736629552D8EF0DE174"),
|
||
|
("tox02.ky0uraku.xyz",
|
||
|
33445,
|
||
|
"D3D6D7C0C7009FC75406B0A49E475996C8C4F8BCE1E6FC5967DE427F8F600527"),
|
||
|
("tox.plastiras.org",
|
||
|
33445,
|
||
|
"8E8B63299B3D520FB377FE5100E65E3322F7AE5B20A0ACED2981769FC5B43725"),
|
||
|
("141.95.108.234",
|
||
|
33445,
|
||
|
"2DEF3156812324B1593A6442C937EAE0A8BD98DE529D2D4A7DD4BA6CB3ECF262"),
|
||
|
("kusoneko.moe",
|
||
|
33445,
|
||
|
"BE7ED53CD924813507BA711FD40386062E6DC6F790EFA122C78F7CDEEE4B6D1B"),
|
||
|
("tox2.plastiras.org",
|
||
|
33445,
|
||
|
"B6626D386BE7E3ACA107B46F48A5C4D522D29281750D44A0CBA6A2721E79C951"),
|
||
|
("tox.plastiras.org",
|
||
|
33445,
|
||
|
"8E8B63299B3D520FB377FE5100E65E3322F7AE5B20A0ACED2981769FC5B43725"),
|
||
|
("141.95.108.234",
|
||
|
33445,
|
||
|
"2DEF3156812324B1593A6442C937EAE0A8BD98DE529D2D4A7DD4BA6CB3ECF262"),
|
||
|
("kusoneko.moe",
|
||
|
33445,
|
||
|
"BE7ED53CD924813507BA711FD40386062E6DC6F790EFA122C78F7CDEEE4B6D1B"),
|
||
|
('84.22.115.205', 33445, # tox.verdict.gg
|
||
|
'1C5293AEF2114717547B39DA8EA6F1E331E5E358B35F9B6B5F19317911C5F976'),
|
||
|
]
|
||
|
|
||
|
lRELAYS = [
|
||
|
("tox02.ky0uraku.xyz",33445, "D3D6D7C0C7009FC75406B0A49E475996C8C4F8BCE1E6FC5967DE427F8F600527"),
|
||
|
("tox.plastiras.org", 443, "8E8B63299B3D520FB377FE5100E65E3322F7AE5B20A0ACED2981769FC5B43725"),
|
||
|
("46.101.197.175", 33445, "CD133B521159541FB1D326DE9850F5E56A6C724B5B8E5EB5CD8D950408E95707"),
|
||
|
("122.116.39.151", 3389, "5716530A10D362867C8E87EE1CD5362A233BAFBBA4CF47FA73B7CAD368BD5E6E"),
|
||
|
("172.105.109.31", 33445, "D46E97CF995DC1820B92B7D899E152A217D36ABE22730FEA4B6BF1BFC06C617C"),
|
||
|
("178.62.250.138", 33445, "788236D34978D1D5BD822F0A5BEBD2C53C64CC31CD3149350EE27D4D9A2F9B6B"),
|
||
|
("198.46.138.44", 33445, "F404ABAA1C99A9D37D61AB54898F56793E1DEF8BD46B1038B9D822E8460FAB67"),
|
||
|
("51.15.37.145", 33445, "6FC41E2BD381D37E9748FC0E0328CE086AF9598BECC8FEB7DDF2E440475F300E"),
|
||
|
("130.133.110.14", 33445, "461FA3776EF0FA655F1A05477DF1B3B614F7D6B124F7DB1DD4FE3C08B03B640F"),
|
||
|
("198.98.51.198", 33445, "1D5A5F2F5D6233058BF0259B09622FB40B482E4FA0931EB8FD3AB8E7BF7DAF6F"),
|
||
|
("108.61.165.198", 33445, "8E7D0B859922EF569298B4D261A8CCB5FEA14FB91ED412A7603A585A25698832"),
|
||
|
("185.25.116.107", 33445, "DA4E4ED4B697F2E9B000EEFE3A34B554ACD3F45F5C96EAEA2516DD7FF9AF7B43"),
|
||
|
("5.189.176.217", 5190, "2B2137E094F743AC8BD44652C55F41DFACC502F125E99E4FE24D40537489E32F"),
|
||
|
("217.182.143.254", 2306, "7AED21F94D82B05774F697B209628CD5A9AD17E0C073D9329076A4C28ED28147"),
|
||
|
("104.223.122.15", 33445, "0FB96EEBFB1650DDB52E70CF773DDFCABE25A95CC3BB50FC251082E4B63EF82A"),
|
||
|
("d4rk4.ru", 1813, "53737F6D47FA6BD2808F378E339AF45BF86F39B64E79D6D491C53A1D522E7039"),
|
||
|
("104.233.104.126", 33445, "EDEE8F2E839A57820DE3DA4156D88350E53D4161447068A3457EE8F59F362414"),
|
||
|
("51.254.84.212", 33445, "AEC204B9A4501412D5F0BB67D9C81B5DB3EE6ADA64122D32A3E9B093D544327D"),
|
||
|
("88.99.133.52", 33445, "2D320F971EF2CA18004416C2AAE7BA52BF7949DB34EA8E2E21AF67BD367BE211"),
|
||
|
("185.58.206.164", 33445, "24156472041E5F220D1FA11D9DF32F7AD697D59845701CDD7BE7D1785EB9DB39"),
|
||
|
("92.54.84.70", 33445, "5625A62618CB4FCA70E147A71B29695F38CC65FF0CBD68AD46254585BE564802"),
|
||
|
("195.93.190.6", 33445, "FB4CE0DDEFEED45F26917053E5D24BDDA0FA0A3D83A672A9DA2375928B37023D"),
|
||
|
("tox.uplinklabs.net", 33445, "1A56EA3EDF5DF4C0AEABBF3C2E4E603890F87E983CAC8A0D532A335F2C6E3E1F"),
|
||
|
("95.215.44.78", 33445, "672DBE27B4ADB9D5FB105A6BB648B2F8FDB89B3323486A7A21968316E012023C"),
|
||
|
("163.172.136.118", 33445, "2C289F9F37C20D09DA83565588BF496FAB3764853FA38141817A72E3F18ACA0B"),
|
||
|
("sorunome.de", 33445, "02807CF4F8BB8FB390CC3794BDF1E8449E9A8392C5D3F2200019DA9F1E812E46"),
|
||
|
("37.97.185.116", 33445, "E59A0E71ADA20D35BD1B0957059D7EF7E7792B3D680AE25C6F4DBBA09114D165"),
|
||
|
("193.124.186.205", 5228, "9906D65F2A4751068A59D30505C5FC8AE1A95E0843AE9372EAFA3BAB6AC16C2C"),
|
||
|
("80.87.193.193", 33445, "B38255EE4B054924F6D79A5E6E5889EC94B6ADF6FE9906F97A3D01E3D083223A"),
|
||
|
("hibiki.eve.moe", 33445, "D3EB45181B343C2C222A5BCF72B760638E15ED87904625AAD351C594EEFAE03E"),
|
||
|
("46.229.52.198", 33445, "813C8F4187833EF0655B10F7752141A352248462A567529A38B6BBF73E979307"),
|
||
|
("144.217.86.39", 33445, "7E5668E0EE09E19F320AD47902419331FFEE147BB3606769CFBE921A2A2FD34C"),
|
||
|
("77.37.160.178", 33440, "CE678DEAFA29182EFD1B0C5B9BC6999E5A20B50A1A6EC18B91C8EBB591712416"),
|
||
|
("85.21.144.224", 33445, "8F738BBC8FA9394670BCAB146C67A507B9907C8E564E28C2B59BEBB2FF68711B"),
|
||
|
("95.215.46.114", 33445, "5823FB947FF24CF83DDFAC3F3BAA18F96EA2018B16CC08429CB97FA502F40C23"),
|
||
|
]
|
||
|
|
||
|
lBAD = [('xxx.garbage.zzz', 33445,
|
||
|
'0123456789114717547B39DA8EA6F1E331E5E358B35F9B6B5F19317911C5F976',),
|
||
|
('www.google.com', 33445, # no port
|
||
|
'0123456789114717547B39DA8EA6F1E331E5E358B35F9B6B5F19317911C5F976',),
|
||
|
('www.google.com', 80, # no ToX port
|
||
|
'0123456789114717547B39DA8EA6F1E331E5E358B35F9B6B5F19317911C5F976',)]
|
||
|
|
||
|
lLOCAL = [# /etc/init.d/tox-bootstrapd.conf
|
||
|
('127.0.0.1', 33446,
|
||
|
'EC8F7405F79F281569B6C66D9F03490973AB99BC9175C44FBEF4C3428A63B80D'),
|
||
|
('127.0.0.1', 33447,
|
||
|
'EC8F7405F79F281569B6C66D9F03490973AB99BC9175C44FBEF4C3428A63B80D'),
|
||
|
('127.0.0.1', 3389,
|
||
|
'EC8F7405F79F281569B6C66D9F03490973AB99BC9175C44FBEF4C3428A63B80D'),
|
||
|
# /var/local/src/c-toxcore/build/DHT_bootstrap
|
||
|
('127.0.0.1', 33445,
|
||
|
'6DB2DEA1785F4A7AEAB52F1F4BC90D6266FBC375DEF316DED59F4E814F97F438'),
|
||
|
# /var/local/src/toxcore/build/DHT_bootstrap
|
||
|
('127.0.0.1', 33445,
|
||
|
'A22E68642917F424E5B38E98CACE38A4906B67228D83E507084400B597D5722E'),
|
||
|
]
|
||
|
|
||
|
lNO_PROXY = ['localhost', '127.0.0.1']
|
||
|
|
||
|
def assert_main_thread():
|
||
|
# this "instance" method is very useful!
|
||
|
app_thread = QtWidgets.QApplication.instance().thread()
|
||
|
curr_thread = QtCore.QThread.currentThread()
|
||
|
if app_thread != curr_thread:
|
||
|
raise RuntimeError('attempt to call MainWindow.append_message from non-app thread')
|
||
|
|
||
|
@contextlib.contextmanager
|
||
|
def ignoreStdout():
|
||
|
devnull = os.open(os.devnull, os.O_WRONLY)
|
||
|
old_stdout = os.dup(1)
|
||
|
sys.stdout.flush()
|
||
|
os.dup2(devnull, 1)
|
||
|
os.close(devnull)
|
||
|
try:
|
||
|
yield
|
||
|
finally:
|
||
|
os.dup2(old_stdout, 1)
|
||
|
os.close(old_stdout)
|
||
|
|
||
|
@contextlib.contextmanager
|
||
|
def ignoreStderr():
|
||
|
devnull = os.open(os.devnull, os.O_WRONLY)
|
||
|
old_stderr = os.dup(2)
|
||
|
sys.stderr.flush()
|
||
|
os.dup2(devnull, 2)
|
||
|
os.close(devnull)
|
||
|
try:
|
||
|
yield
|
||
|
finally:
|
||
|
os.dup2(old_stderr, 2)
|
||
|
os.close(old_stderr)
|
||
|
|
||
|
with ignoreStderr():
|
||
|
import pyaudio
|
||
|
oPyA = pyaudio.PyAudio()
|
||
|
|
||
|
def on_log(iTox, level, filename, line, func, message, *data):
|
||
|
# LOG.debug(repr((level, filename, line, func, message,)))
|
||
|
tox_log_cb(level, filename, line, func, message)
|
||
|
|
||
|
def tox_log_cb(level, filename, line, func, message, *args):
|
||
|
"""
|
||
|
* @param level The severity of the log message.
|
||
|
* @param filename The source file from which the message originated.
|
||
|
* @param line The source line from which the message originated.
|
||
|
* @param func The function from which the message originated.
|
||
|
* @param message The log message.
|
||
|
* @param user_data The user data pointer passed to tox_new in options.
|
||
|
"""
|
||
|
if type(func) == bytes:
|
||
|
func = str(func, 'utf-8')
|
||
|
message = str(message, 'UTF-8')
|
||
|
filename = str(filename, 'UTF-8')
|
||
|
|
||
|
if filename == 'network.c':
|
||
|
if line == 660: return
|
||
|
# root WARNING 3network.c#944:b'send_packet'attempted to send message with network family 10 (probably IPv6) on IPv4 socket
|
||
|
if line == 944: return
|
||
|
i = message.find('07 = GET_NODES')
|
||
|
if i > 0:
|
||
|
return
|
||
|
if filename == 'TCP_common.c': return
|
||
|
|
||
|
i = message.find(' | ')
|
||
|
if i > 0:
|
||
|
message = message[:i]
|
||
|
# message = filename +'#' +str(line) +':'+func +' '+message
|
||
|
|
||
|
name = 'core'
|
||
|
# old level is meaningless
|
||
|
level = 10 # LOG.level
|
||
|
|
||
|
# LOG._log(LOG.level, f"{level}: {message}", list())
|
||
|
|
||
|
i = message.find('(0: OK)')
|
||
|
if i > 0:
|
||
|
level = 10 # LOG.debug
|
||
|
else:
|
||
|
i = message.find('(1: ')
|
||
|
if i > 0:
|
||
|
level = 30 # LOG.warn
|
||
|
else:
|
||
|
level = 20 # LOG.info
|
||
|
|
||
|
o = LOG.makeRecord(filename, level, func, line, message, list(), None)
|
||
|
LOG.handle(o)
|
||
|
return
|
||
|
|
||
|
elif level == 1:
|
||
|
LOG.critical(f"{level}: {message}")
|
||
|
elif level == 2:
|
||
|
LOG.error(f"{level}: {message}")
|
||
|
elif level == 3:
|
||
|
LOG.warn(f"{level}: {message}")
|
||
|
elif level == 4:
|
||
|
LOG.info(f"{level}: {message}")
|
||
|
elif level == 5:
|
||
|
LOG.debug(f"{level}: {message}")
|
||
|
else:
|
||
|
LOG.trace(f"{level}: {message}")
|
||
|
|
||
|
def vAddLoggerCallback(tox_options, callback=None):
|
||
|
if callback is None:
|
||
|
wrapper.tox.Tox.libtoxcore.tox_options_set_log_callback(
|
||
|
tox_options._options_pointer,
|
||
|
POINTER(None)())
|
||
|
tox_options.self_logger_cb = None
|
||
|
return
|
||
|
|
||
|
c_callback = CFUNCTYPE(None, c_void_p, c_int, c_char_p, c_int, c_char_p, c_char_p, c_void_p)
|
||
|
tox_options.self_logger_cb = c_callback(callback)
|
||
|
wrapper.tox.Tox.libtoxcore.tox_options_set_log_callback(
|
||
|
tox_options._options_pointer,
|
||
|
tox_options.self_logger_cb)
|
||
|
|
||
|
def get_video_indexes():
|
||
|
# Linux
|
||
|
return [str(l[5:]) for l in os.listdir('/dev/') if l.startswith('video')]
|
||
|
|
||
|
def get_audio():
|
||
|
input_devices = output_devices = 0
|
||
|
for i in range(oPyA.get_device_count()):
|
||
|
device = oPyA.get_device_info_by_index(i)
|
||
|
if device["maxInputChannels"]:
|
||
|
input_devices += 1
|
||
|
if device["maxOutputChannels"]:
|
||
|
output_devices += 1
|
||
|
# {'index': 21, 'structVersion': 2, 'name': 'default', 'hostApi': 0, 'maxInputChannels': 64, 'maxOutputChannels': 64, 'defaultLowInputLatency': 0.008707482993197279, 'defaultLowOutputLatency': 0.008707482993197279, 'defaultHighInputLatency': 0.034829931972789115, 'defaultHighOutputLatency': 0.034829931972789115, 'defaultSampleRate': 44100.0}
|
||
|
audio = {'input': oPyA.get_default_input_device_info()['index'] if input_devices else -1,
|
||
|
'output': oPyA.get_default_output_device_info()['index'] if output_devices else -1,
|
||
|
'enabled': input_devices and output_devices}
|
||
|
return audio
|
||
|
|
||
|
def oMainArgparser(_=None):
|
||
|
if not os.path.exists('/proc/sys/net/ipv6'):
|
||
|
bIpV6 = 'False'
|
||
|
else:
|
||
|
bIpV6 = 'True'
|
||
|
lIpV6Choices=[bIpV6, 'False']
|
||
|
|
||
|
# need:
|
||
|
# 'audio_input': oPyA.get_default_input_device_info()['index']
|
||
|
# 'audio_output': oPyA.get_default_output_device_info()['index']
|
||
|
audio = get_audio()
|
||
|
# unfinished
|
||
|
|
||
|
logfile = os.path.join(os.environ.get('TMPDIR', '/tmp'), 'tests_toxygen.log')
|
||
|
|
||
|
parser = argparse.ArgumentParser()
|
||
|
parser.add_argument('--proxy_host', '--proxy-host', type=str,
|
||
|
default='',
|
||
|
help='proxy host')
|
||
|
parser.add_argument('--proxy_port', '--proxy-port', default=0, type=int,
|
||
|
help='proxy port')
|
||
|
parser.add_argument('--proxy_type', '--proxy-type', default=0, type=int,
|
||
|
choices=[0,1,2],
|
||
|
help='proxy type 1=http, 2=socks')
|
||
|
parser.add_argument('--udp_enabled', type=str, default='True',
|
||
|
choices=['True', 'False'],
|
||
|
help='En/Disable udp')
|
||
|
parser.add_argument('--ipv6_enabled', type=str, default=bIpV6,
|
||
|
choices=lIpV6Choices,
|
||
|
help=f"En/Disable ipv6 - default {bIpV6}")
|
||
|
parser.add_argument('--download_nodes_list', type=str, default='False',
|
||
|
choices=['True', 'False'],
|
||
|
help='Download nodes list')
|
||
|
parser.add_argument('--nodes_json', type=str,
|
||
|
default='')
|
||
|
parser.add_argument('--network', type=str,
|
||
|
choices=['old', 'new', 'local', 'newlocal'],
|
||
|
default='new')
|
||
|
parser.add_argument('--download_nodes_url', type=str,
|
||
|
default='https://nodes.tox.chat/json')
|
||
|
parser.add_argument('--logfile', default=logfile,
|
||
|
help='Filename for logging')
|
||
|
parser.add_argument('--loglevel', default=logging.INFO, type=int,
|
||
|
# choices=[logging.info,logging.trace,logging.debug,logging.error]
|
||
|
help='Threshold for logging (lower is more) default: 20')
|
||
|
parser.add_argument('--tcp_port', '--tcp-port', default=0, type=int,
|
||
|
help='tcp port')
|
||
|
parser.add_argument('--mode', type=int, default=2,
|
||
|
help='Mode: 0=chat 1=chat+audio 2=chat+audio+video default: 0')
|
||
|
parser.add_argument('--sleep', type=str, default='time',
|
||
|
# could expand this to tk, gtk, gevent...
|
||
|
choices=['qt','gevent','time'],
|
||
|
help='Sleep method - one of qt, gevent , time')
|
||
|
return parser
|
||
|
|
||
|
def vOargsToxPreamble(oArgs, Tox, ToxTest):
|
||
|
kwargs = dict(level=oArgs.loglevel,
|
||
|
format='%(levelname)-8s %(message)s')
|
||
|
if oArgs.logfile:
|
||
|
kwargs['filename'] = oArgs.logfile
|
||
|
logging.basicConfig(**kwargs)
|
||
|
|
||
|
methods = set([x for x in dir(Tox) if not x[0].isupper()
|
||
|
and not x[0] == '_'])
|
||
|
docs = "".join([getattr(ToxTest, x).__doc__ for x in dir(ToxTest)
|
||
|
if getattr(ToxTest, x).__doc__ is not None])
|
||
|
|
||
|
tested = set(re.findall(r't:(.*?)\n', docs))
|
||
|
not_tested = methods.difference(tested)
|
||
|
|
||
|
logging.info('Test Coverage: %.2f%%' % (len(tested) * 100.0 / len(methods)))
|
||
|
if len(not_tested):
|
||
|
logging.info('Not tested:\n %s' % "\n ".join(sorted(list(not_tested))))
|
||
|
|
||
|
def signal_handler(num, f):
|
||
|
from trepan.interfaces import server as Mserver
|
||
|
from trepan.api import debug
|
||
|
connection_opts={'IO': 'TCP', 'PORT': 6666}
|
||
|
intf = Mserver.ServerInterface(connection_opts=connection_opts)
|
||
|
dbg_opts = {'interface': intf}
|
||
|
LOG.info('Starting TCP server listening on port 6666.')
|
||
|
debug(dbg_opts=dbg_opts)
|
||
|
return
|
||
|
|
||
|
def merge_args_into_settings(args, settings):
|
||
|
from user_data.settings import clean_settings
|
||
|
if args:
|
||
|
for key in settings.keys():
|
||
|
# proxy_type proxy_port proxy_host
|
||
|
not_key = 'not_' +key
|
||
|
if hasattr(args, key):
|
||
|
val = getattr(args, key)
|
||
|
if type(val) == bytes:
|
||
|
# proxy_host - ascii?
|
||
|
# filenames - ascii?
|
||
|
val = str(val, 'UTF-8')
|
||
|
settings[key] = val
|
||
|
elif hasattr(args, not_key):
|
||
|
val = not getattr(args, not_key)
|
||
|
settings[key] = val
|
||
|
clean_settings(settings)
|
||
|
return
|
||
|
|
||
|
def lSdSamplerates(iDev):
|
||
|
try:
|
||
|
import sounddevice as sd
|
||
|
except ImportError:
|
||
|
return []
|
||
|
samplerates = (32000, 44100, 48000, 96000, )
|
||
|
device = iDev
|
||
|
supported_samplerates = []
|
||
|
for fs in samplerates:
|
||
|
try:
|
||
|
sd.check_output_settings(device=device, samplerate=fs)
|
||
|
except Exception as e:
|
||
|
# LOG.debug(f"Sample rate not supported {fs}" +' '+str(e))
|
||
|
pass
|
||
|
else:
|
||
|
supported_samplerates.append(fs)
|
||
|
return supported_samplerates
|
||
|
|
||
|
def should_we_pick_up_proxy_from_environ():
|
||
|
retval = dict()
|
||
|
if os.environ.get('socks_proxy', ''):
|
||
|
# socks_proxy takes precedence over https/http
|
||
|
proxy = os.environ.get('socks_proxy', '')
|
||
|
i = proxy.find('//')
|
||
|
if i >= 0: proxy = proxy[i+2:]
|
||
|
retval['proxy_host'] = proxy.split(':')[0]
|
||
|
retval['proxy_port'] = proxy.split(':')[-1]
|
||
|
retval['proxy_type'] = 2
|
||
|
retval['udp_enabled'] = False
|
||
|
elif os.environ.get('https_proxy', ''):
|
||
|
# https takes precedence over http
|
||
|
proxy = os.environ.get('https_proxy', '')
|
||
|
i = proxy.find('//')
|
||
|
if i >= 0: proxy = proxy[i+2:]
|
||
|
retval['proxy_host'] = proxy.split(':')[0]
|
||
|
retval['proxy_port'] = proxy.split(':')[-1]
|
||
|
retval['proxy_type'] = 1
|
||
|
retval['udp_enabled'] = False
|
||
|
elif os.environ.get('http_proxy', ''):
|
||
|
proxy = os.environ.get('http_proxy', '')
|
||
|
i = proxy.find('//')
|
||
|
if i >= 0: proxy = proxy[i+2:]
|
||
|
retval['proxy_host'] = proxy.split(':')[0]
|
||
|
retval['proxy_port'] = proxy.split(':')[-1]
|
||
|
retval['proxy_type'] = 1
|
||
|
retval['udp_enabled'] = False
|
||
|
return retval
|
||
|
|
||
|
def download_url(url, app):
|
||
|
if not bAreWeConnected(): return ''
|
||
|
|
||
|
settings = app._settings
|
||
|
if pycurl:
|
||
|
LOG.debug('nodes loading with pycurl: ' + str(url))
|
||
|
buffer = BytesIO()
|
||
|
c = pycurl.Curl()
|
||
|
c.setopt(c.URL, url)
|
||
|
c.setopt(c.WRITEDATA, buffer)
|
||
|
# Follow redirect.
|
||
|
c.setopt(c.FOLLOWLOCATION, True)
|
||
|
|
||
|
# cookie jar
|
||
|
cjar = os.path.join(os.environ['HOME'], '.local', 'jar.cookie')
|
||
|
if os.path.isfile(cjar):
|
||
|
c.setopt(c.COOKIEFILE, cjar)
|
||
|
# LARGS+=( --cookie-jar --junk-session-cookies )
|
||
|
|
||
|
#? c.setopt(c.ALTSVC_CTRL, 16)
|
||
|
|
||
|
c.setopt(c.NOPROXY, ','.join(lNO_PROXY))
|
||
|
#? c.setopt(c.CAINFO, certifi.where())
|
||
|
if settings['proxy_type'] == 2 and settings['proxy_host']:
|
||
|
socks_proxy = 'socks5h://'+settings['proxy_host']+':'+str(settings['proxy_port'])
|
||
|
settings['udp_enabled'] = False
|
||
|
c.setopt(c.PROXY, socks_proxy)
|
||
|
c.setopt(c.PROXYTYPE, pycurl.PROXYTYPE_SOCKS5_HOSTNAME)
|
||
|
elif settings['proxy_type'] == 1 and settings['proxy_host']:
|
||
|
https_proxy = 'https://'+settings['proxy_host']+':'+str(settings['proxy_port'])
|
||
|
c.setopt(c.PROXY, https_proxy)
|
||
|
elif settings['proxy_type'] == 1 and settings['proxy_host']:
|
||
|
http_proxy = 'http://'+settings['proxy_host']+':'+str(settings['proxy_port'])
|
||
|
c.setopt(c.PROXY, http_proxy)
|
||
|
c.setopt(c.PROTOCOLS, c.PROTO_HTTPS)
|
||
|
try:
|
||
|
c.perform()
|
||
|
c.close()
|
||
|
#? assert c.getinfo(c.RESPONSE_CODE) < 300
|
||
|
result = buffer.getvalue()
|
||
|
# Body is a byte string.
|
||
|
LOG_INFO('nodes loaded with pycurl: ' + str(url))
|
||
|
return result
|
||
|
except Exception as ex:
|
||
|
LOG_ERROR('TOX nodes loading error with pycurl: ' + str(ex))
|
||
|
# drop through
|
||
|
|
||
|
if requests:
|
||
|
LOG_DEBUG('nodes loading with requests: ' + str(url))
|
||
|
try:
|
||
|
headers = dict()
|
||
|
headers['Content-Type'] = 'application/json'
|
||
|
proxies = dict()
|
||
|
if settings['proxy_type'] == 2 and settings['proxy_host']:
|
||
|
socks_proxy = 'socks5://'+settings['proxy_host']+':'+str(settings['proxy_port'])
|
||
|
settings['udp_enabled'] = False
|
||
|
proxies['https'] = socks_proxy
|
||
|
elif settings['proxy_type'] == 1 and settings['proxy_host']:
|
||
|
https_proxy = 'https://'+settings['proxy_host']+':'+str(settings['proxy_port'])
|
||
|
proxies['https'] = https_proxy
|
||
|
elif settings['proxy_type'] == 1 and settings['proxy_host']:
|
||
|
http_proxy = 'http://'+settings['proxy_host']+':'+str(settings['proxy_port'])
|
||
|
proxies['http'] = http_proxy
|
||
|
req = requests.get(url,
|
||
|
headers=headers,
|
||
|
proxies=proxies,
|
||
|
timeout=CONNECT_TIMEOUT)
|
||
|
# max_retries=3
|
||
|
assert req.status_code < 300
|
||
|
result = req.content
|
||
|
LOG_INFO('nodes loaded with requests: ' + str(url))
|
||
|
return result
|
||
|
except Exception as ex:
|
||
|
LOG_ERROR('TOX nodes loading error with requests: ' + str(ex))
|
||
|
# drop through
|
||
|
|
||
|
if not settings['proxy_type']: # no proxy
|
||
|
LOG_DEBUG('nodes loading with no proxy: ' + str(url))
|
||
|
try:
|
||
|
req = urllib.request.Request(url)
|
||
|
req.add_header('Content-Type', 'application/json')
|
||
|
response = urllib.request.urlopen(req)
|
||
|
result = response.read()
|
||
|
LOG_INFO('nodes loaded with no proxy: ' + str(url))
|
||
|
return result
|
||
|
except Exception as ex:
|
||
|
LOG_ERROR('TOX nodes loading ' + str(ex))
|
||
|
return ''
|
||
|
else: # proxy
|
||
|
from PyQt5 import QtNetwork
|
||
|
|
||
|
LOG_DEBUG(f"TOX nodes loading with QT proxy: {url}")
|
||
|
netman = QtNetwork.QNetworkAccessManager()
|
||
|
proxy = QtNetwork.QNetworkProxy()
|
||
|
proxy.setType(
|
||
|
QtNetwork.QNetworkProxy.Socks5Proxy if settings['proxy_type'] == 2 \
|
||
|
else QtNetwork.QNetworkProxy.HttpProxy )
|
||
|
proxy.setHostName(settings['proxy_host'])
|
||
|
proxy.setPort(settings['proxy_port'])
|
||
|
netman.setProxy(proxy)
|
||
|
try:
|
||
|
request = QtNetwork.QNetworkRequest()
|
||
|
request.setUrl(QtCore.QUrl(url))
|
||
|
reply = netman.get(request)
|
||
|
|
||
|
while not reply.isFinished():
|
||
|
QtCore.QThread.msleep(1)
|
||
|
QtCore.QCoreApplication.processEvents()
|
||
|
result = bytes(reply.readAll().data())
|
||
|
LOG_INFO('TOX nodes loading with QT proxy: ' + str(url))
|
||
|
return result
|
||
|
except Exception as ex:
|
||
|
LOG_ERROR('TOX nodes loading error with proxy: ' + str(ex))
|
||
|
return ''
|
||
|
|
||
|
def _get_nodes_path(oArgs=None):
|
||
|
if oArgs and hasattr(oArgs, 'nodes_json') and oArgs.nodes_json:
|
||
|
LOG.debug("_get_nodes_path: " +oArgs.nodes_json)
|
||
|
return oArgs.nodes_json
|
||
|
default = os.path.join(get_user_config_path(), 'toxygen_nodes.json')
|
||
|
LOG.debug("_get_nodes_path: " +default)
|
||
|
return default
|
||
|
|
||
|
DEFAULT_NODES_COUNT = 4
|
||
|
|
||
|
def generate_nodes(nodes_count=DEFAULT_NODES_COUNT, oArgs=None):
|
||
|
sFile = _get_nodes_path(oArgs=oArgs)
|
||
|
return generate_nodes_from_file(sFile, nodes_count)
|
||
|
|
||
|
def generate_nodes_from_file(sFile, nodes_count=DEFAULT_NODES_COUNT):
|
||
|
if not os.path.exists(sFile):
|
||
|
LOG.error("generate_nodes_from_file file not found " +sFile)
|
||
|
return []
|
||
|
LOG.info("generate_nodes_from_file " +sFile)
|
||
|
with open(sFile, 'rt') as fl:
|
||
|
json_nodes = json.loads(fl.read())['nodes']
|
||
|
nodes = [(node['ipv4'], node['port'], node['public_key'],) for
|
||
|
node in json_nodes if node['ipv4'] != 'NONE']
|
||
|
sorted_nodes = nodes
|
||
|
random.shuffle(sorted_nodes)
|
||
|
if nodes_count is not None and len(sorted_nodes) > nodes_count:
|
||
|
sorted_nodes = sorted_nodes[-nodes_count:]
|
||
|
return sorted_nodes
|
||
|
|
||
|
def tox_bootstrapd_port():
|
||
|
port = 33446
|
||
|
sFile = '/etc/tox-bootstrapd.conf'
|
||
|
if os.path.exists(sFile):
|
||
|
with open(sFile, 'rt') as oFd:
|
||
|
for line in oFd.readlines():
|
||
|
if line.startswith('port = '):
|
||
|
port = int(line[7:])
|
||
|
return port
|
||
|
|
||
|
def bootstrap_local(self, elts):
|
||
|
if os.path.exists('/run/tox-bootstrapd/tox-bootstrapd.pid'):
|
||
|
LOG.debug('/run/tox-bootstrapd/tox-bootstrapd.pid')
|
||
|
iRet = True
|
||
|
else:
|
||
|
iRet = os.system("netstat -nle4|grep -q :33")
|
||
|
if iRet > 0:
|
||
|
LOG.warn('bootstraping local No local DHT running')
|
||
|
LOG.info('bootstraping local')
|
||
|
return bootstrap_good(self, elts)
|
||
|
|
||
|
def bootstrap_good(self, lelts):
|
||
|
LOG.info('bootstraping udp')
|
||
|
for elt in ['bob', 'alice']:
|
||
|
for largs in lelts:
|
||
|
try:
|
||
|
oRet = getattr(self, elt).bootstrap(largs[0],
|
||
|
int(largs[1]),
|
||
|
largs[2])
|
||
|
except Exception as e:
|
||
|
LOG.error('bootstrap to ' +largs[0] +':' +str(largs[1]) \
|
||
|
+' ' +str(e))
|
||
|
continue
|
||
|
if not oRet:
|
||
|
LOG.warn('bootstrap failed to ' +largs[0] +' : ' +str(oRet))
|
||
|
else:
|
||
|
if getattr(self, elt).self_get_connection_status() != TOX_CONNECTION['NONE']:
|
||
|
LOG.debug('bootstrap to ' +largs[0] +' connected')
|
||
|
return
|
||
|
|
||
|
def bootstrap_tcp(self, lelts):
|
||
|
LOG.info('bootstraping tcp')
|
||
|
for elt in ['alice', 'bob']:
|
||
|
for largs in lelts:
|
||
|
try:
|
||
|
oRet = getattr(self, elt).add_tcp_relay(largs[0],
|
||
|
int(largs[1]),
|
||
|
largs[2])
|
||
|
except Exception as e:
|
||
|
LOG.error('bootstrap_tcp to ' +largs[0] +' : ' +str(e))
|
||
|
continue
|
||
|
if not oRet:
|
||
|
LOG.warn('bootstrap_tcp failed to ' +largs[0] +' : ' +str(oRet))
|
||
|
else:
|
||
|
if getattr(self, elt).self_get_connection_status() != TOX_CONNECTION['NONE']:
|
||
|
LOG.debug('bootstrap_tcp to ' +largs[0] +' connected')
|
||
|
break
|
||
|
|
||
|
def caseFactory(cases):
|
||
|
"""We want the tests run in order."""
|
||
|
if len(cases) > 1:
|
||
|
ordered_cases = sorted(cases, key=lambda f: findsource(f)[1])
|
||
|
else:
|
||
|
ordered_cases = cases
|
||
|
return ordered_cases
|
||
|
|
||
|
def suiteFactory(*testcases):
|
||
|
"""We want the tests run in order."""
|
||
|
linen = lambda f: getattr(tc, f).__code__.co_firstlineno
|
||
|
lncmp = lambda a, b: linen(a) - linen(b)
|
||
|
|
||
|
test_suite = unittest.TestSuite()
|
||
|
for tc in testcases:
|
||
|
test_suite.addTest(unittest.makeSuite(tc, sortUsing=lncmp))
|
||
|
return test_suite
|