pypush-plus-plus/ids/__init__.py

73 lines
2.6 KiB
Python
Raw Normal View History

2023-05-09 19:36:33 +00:00
from base64 import b64encode
2023-05-09 21:03:27 +00:00
2023-05-09 19:36:33 +00:00
import apns
2023-05-09 21:03:27 +00:00
2023-05-09 22:01:32 +00:00
from . import _helpers, identity, profile, query
2023-05-09 21:03:27 +00:00
2023-05-09 19:36:33 +00:00
class IDSUser:
2023-05-09 20:09:28 +00:00
# Sets self.user_id and self._auth_token
2023-05-09 19:36:33 +00:00
def _authenticate_for_token(
self, username: str, password: str, factor_callback: callable = None
):
self.user_id, self._auth_token = profile._get_auth_token(
username, password, factor_callback
)
2023-05-09 20:09:28 +00:00
# Sets self._auth_keypair using self.user_id and self._auth_token
2023-05-09 19:36:33 +00:00
def _authenticate_for_cert(self):
self._auth_keypair = profile._get_auth_cert(self.user_id, self._auth_token)
# Factor callback will be called if a 2FA code is necessary
def __init__(
self,
push_connection: apns.APNSConnection,
):
self.push_connection = push_connection
2023-05-09 21:03:27 +00:00
self._push_keypair = _helpers.KeyPair(
self.push_connection.private_key, self.push_connection.cert
)
2023-05-09 20:09:28 +00:00
def __str__(self):
return f"IDSUser(user_id={self.user_id}, handles={self.handles}, push_token={b64encode(self.push_connection.token).decode()})"
2023-05-09 21:03:27 +00:00
2023-05-09 20:09:28 +00:00
# Authenticates with a username and password, to create a brand new authentication keypair
2023-05-09 21:03:27 +00:00
def authenticate(
self, username: str, password: str, factor_callback: callable = None
):
2023-05-09 19:36:33 +00:00
self._authenticate_for_token(username, password, factor_callback)
self._authenticate_for_cert()
self.handles = profile._get_handles(
b64encode(self.push_connection.token),
self.user_id,
self._auth_keypair,
2023-05-09 20:09:28 +00:00
self._push_keypair,
2023-05-09 19:36:33 +00:00
)
2023-05-09 20:09:28 +00:00
# Uses an existing authentication keypair
2023-05-09 21:03:27 +00:00
def restore_authentication(
self, auth_keypair: _helpers.KeyPair, user_id: str, handles: dict
):
2023-05-09 20:09:28 +00:00
self._auth_keypair = auth_keypair
self.user_id = user_id
self.handles = handles
2023-05-09 21:03:27 +00:00
2023-05-09 20:09:28 +00:00
# This is a separate call so that the user can make sure the first part succeeds before asking for validation data
def register(self, validation_data: str):
2023-05-09 21:03:27 +00:00
cert = identity.register(
2023-05-09 20:09:28 +00:00
b64encode(self.push_connection.token),
self.handles,
self.user_id,
self._auth_keypair,
self._push_keypair,
2023-05-09 21:03:27 +00:00
validation_data,
2023-05-09 20:09:28 +00:00
)
2023-05-09 21:03:27 +00:00
self._id_keypair = _helpers.KeyPair(self._auth_keypair.key, cert)
def restore_identity(self, id_keypair: _helpers.KeyPair):
self._id_keypair = id_keypair
2023-05-09 22:01:32 +00:00
def lookup(self, uris: list[str], topic: str = "com.apple.madrid") -> any:
return query.lookup(self.push_connection, self.handles[0], self._id_keypair, topic, uris)