aboutsummaryrefslogtreecommitdiff
path: root/xmpp-vala
diff options
context:
space:
mode:
authorfiaxh <git@lightrise.org>2018-11-14 18:17:10 +0100
committerfiaxh <git@lightrise.org>2018-11-27 03:38:42 +0100
commit2208ff9799b8b551b4da5227a32a09f9e00ffb6a (patch)
tree9c8c4d91f6b4c3e9e825bf5148db9932a3ecc97d /xmpp-vala
parentd9cbf571b0a5154d524ca65485dbb86a51268a06 (diff)
downloaddino-2208ff9799b8b551b4da5227a32a09f9e00ffb6a.tar.gz
dino-2208ff9799b8b551b4da5227a32a09f9e00ffb6a.zip
Restructure (http) file provider flow: Separate download&get_info, download in provider, move XmppStreamModule into xmpp-vala
Diffstat (limited to 'xmpp-vala')
-rw-r--r--xmpp-vala/CMakeLists.txt1
-rw-r--r--xmpp-vala/src/module/xep/0363_http_file_upload.vala160
2 files changed, 161 insertions, 0 deletions
diff --git a/xmpp-vala/CMakeLists.txt b/xmpp-vala/CMakeLists.txt
index 1649411e..fba9966d 100644
--- a/xmpp-vala/CMakeLists.txt
+++ b/xmpp-vala/CMakeLists.txt
@@ -68,6 +68,7 @@ SOURCES
"src/module/xep/0280_message_carbons.vala"
"src/module/xep/0313_message_archive_management.vala"
"src/module/xep/0333_chat_markers.vala"
+ "src/module/xep/0363_http_file_upload.vala"
"src/module/xep/0368_srv_records_tls.vala"
"src/module/xep/0380_explicit_encryption.vala"
"src/module/xep/pixbuf_storage.vala"
diff --git a/xmpp-vala/src/module/xep/0363_http_file_upload.vala b/xmpp-vala/src/module/xep/0363_http_file_upload.vala
new file mode 100644
index 00000000..d2e2af2c
--- /dev/null
+++ b/xmpp-vala/src/module/xep/0363_http_file_upload.vala
@@ -0,0 +1,160 @@
+using Xmpp;
+using Xmpp;
+using Xmpp.Xep;
+
+namespace Xmpp.Xep.HttpFileUpload {
+
+private const string NS_URI = "urn:xmpp:http:upload";
+private const string NS_URI_0 = "urn:xmpp:http:upload:0";
+
+public class Module : XmppStreamModule {
+ public static Xmpp.ModuleIdentity<Module> IDENTITY = new Xmpp.ModuleIdentity<Module>(NS_URI, "0363_http_file_upload");
+
+ public signal void feature_available(XmppStream stream, long max_file_size);
+ public signal void received_url(XmppStream stream, MessageStanza message);
+
+ public delegate void OnSlotOk(XmppStream stream, string url_get, string url_put);
+ public delegate void OnError(XmppStream stream, string error);
+ public void request_slot(XmppStream stream, string filename, int file_size, string? content_type, owned OnSlotOk listener, owned OnError error_listener) {
+ Flag? flag = stream.get_flag(Flag.IDENTITY);
+ if (flag == null) return;
+
+ StanzaNode? request_node = null;
+ switch (flag.ns_ver) {
+ case NS_URI_0:
+ request_node = new StanzaNode.build("request", NS_URI_0).add_self_xmlns();
+ request_node.put_attribute("filename", filename).put_attribute("size", file_size.to_string());
+ if (content_type != null) request_node.put_attribute("content-type", content_type);
+ break;
+ case NS_URI:
+ request_node = new StanzaNode.build("request", NS_URI).add_self_xmlns()
+ .put_node(new StanzaNode.build("filename", NS_URI).put_node(new StanzaNode.text(filename)))
+ .put_node(new StanzaNode.build("size", NS_URI).put_node(new StanzaNode.text(file_size.to_string())));
+ if (content_type != null) {
+ request_node.put_node(new StanzaNode.build("content-type", NS_URI).put_node(new StanzaNode.text(content_type)));
+ }
+ break;
+ }
+ Iq.Stanza iq = new Iq.Stanza.get(request_node) { to=flag.file_store_jid };
+ stream.get_module(Iq.Module.IDENTITY).send_iq(stream, iq, (stream, iq) => {
+ if (iq.is_error()) {
+ error_listener(stream, "Error getting upload/download url (Error Iq)");
+ return;
+ }
+ string? url_get = null, url_put = null;
+ // FIXME change back to switch on version in a while (prosody bug)
+ url_get = iq.stanza.get_deep_attribute(flag.ns_ver + ":slot", flag.ns_ver + ":get", flag.ns_ver + ":url");
+ url_put = iq.stanza.get_deep_attribute(flag.ns_ver + ":slot", flag.ns_ver + ":put", flag.ns_ver + ":url");
+ if (url_get == null && url_put == null) {
+ url_get = iq.stanza.get_deep_string_content(flag.ns_ver + ":slot", flag.ns_ver + ":get");
+ url_put = iq.stanza.get_deep_string_content(flag.ns_ver + ":slot", flag.ns_ver + ":put");
+ }
+ if (url_get == null || url_put == null) {
+ error_listener(stream, "Error getting upload/download url");
+ }
+ listener(stream, url_get, url_put);
+ });
+ }
+
+ public override void attach(XmppStream stream) {
+ stream.stream_negotiated.connect(query_availability);
+ }
+
+ public override void detach(XmppStream stream) {
+ stream.get_module(Bind.Module.IDENTITY).bound_to_resource.disconnect(query_availability);
+ }
+
+ public override string get_ns() { return NS_URI; }
+ public override string get_id() { return IDENTITY.id; }
+
+ private void query_availability(XmppStream stream) {
+ stream.get_module(ServiceDiscovery.Module.IDENTITY).request_info(stream, stream.remote_name, (stream, info_result) => {
+ bool available = check_ns_in_info(stream, stream.remote_name, info_result);
+ if (!available) {
+ stream.get_module(ServiceDiscovery.Module.IDENTITY).request_items(stream, stream.remote_name, (stream, items_result) => {
+ foreach (Xep.ServiceDiscovery.Item item in items_result.items) {
+ stream.get_module(ServiceDiscovery.Module.IDENTITY).request_info(stream, item.jid, (stream, info_result) => {
+ check_ns_in_info(stream, item.jid, info_result);
+ });
+ }
+ });
+ }
+ });
+ }
+
+ private bool check_ns_in_info(XmppStream stream, Jid jid, Xep.ServiceDiscovery.InfoResult info_result) {
+ bool ver_available = false;
+ bool ver_0_available = false;
+ foreach (string feature in info_result.features) {
+ if (feature == NS_URI_0) {
+ ver_0_available = true;
+ break;
+ } else if (feature == NS_URI) {
+ ver_available = true;
+ }
+ }
+
+ if (ver_available || ver_0_available) {
+ long max_file_size = extract_max_file_size(info_result);
+ if (ver_0_available) {
+ stream.add_flag(new Flag(jid, NS_URI_0));
+ } else if (ver_available) {
+ stream.add_flag(new Flag(jid, NS_URI));
+ }
+
+ feature_available(stream, max_file_size);
+ return true;
+ }
+ return false;
+ }
+
+ private long extract_max_file_size(Xep.ServiceDiscovery.InfoResult info_result) {
+ string? max_file_size_str = null;
+ StanzaNode x_node = info_result.iq.stanza.get_deep_subnode("http://jabber.org/protocol/disco#info:query", "jabber:x:data:x");
+ Gee.List<StanzaNode> field_nodes = x_node.get_subnodes("field", "jabber:x:data");
+ foreach (StanzaNode node in field_nodes) {
+ string? var_attr = node.get_attribute("var");
+ if (var_attr == "max-file-size") {
+ StanzaNode value_node = node.get_subnode("value", "jabber:x:data");
+ max_file_size_str = value_node.get_string_content();
+ break;
+ }
+ }
+ if (max_file_size_str != null) return long.parse(max_file_size_str);
+ return -1;
+ }
+}
+
+public class ReceivedPipelineListener : StanzaListener<MessageStanza> {
+
+ private const string[] after_actions_const = {"EXTRACT_MESSAGE_2"};
+
+ public override string action_group { get { return "EXTRACT_MESSAGE_2"; } }
+ public override string[] after_actions { get { return after_actions_const; } }
+
+ public override async bool run(XmppStream stream, MessageStanza message) {
+ string? oob_url = OutOfBandData.get_url_from_message(message);
+ if (oob_url != null && oob_url == message.body) {
+ stream.get_module(Module.IDENTITY).received_url(stream, message);
+ }
+ return true;
+ }
+}
+
+public class Flag : XmppStreamFlag {
+ public static FlagIdentity<Flag> IDENTITY = new FlagIdentity<Flag>(NS_URI, "http_file_upload");
+
+ public Jid file_store_jid;
+ public string ns_ver;
+ public int? max_file_size;
+
+ public Flag(Jid file_store_jid, string ns_ver) {
+ this.file_store_jid = file_store_jid;
+ this.ns_ver = ns_ver;
+ }
+
+ public override string get_ns() { return NS_URI; }
+ public override string get_id() { return IDENTITY.id; }
+}
+
+}