pypush-plus-plus/apns.py

234 lines
6.5 KiB
Python
Raw Normal View History

2023-04-05 18:52:14 -05:00
from __future__ import annotations
2023-04-11 11:23:04 -05:00
import random
import socket
2023-04-07 21:32:00 -05:00
import threading
import time
2023-04-11 11:23:04 -05:00
from hashlib import sha1
import tlslite
2023-04-11 11:23:04 -05:00
import albert
COURIER_HOST = "windows.courier.push.apple.com" # TODO: Get this from config
COURIER_PORT = 5223
ALPN = [b"apns-security-v2"]
# Connect to the courier server
def _connect(private_key: str, cert: str) -> tlslite.TLSConnection:
# Connect to the courier server
sock = socket.create_connection((COURIER_HOST, COURIER_PORT))
# Wrap the socket in TLS
sock = tlslite.TLSConnection(sock)
# Parse the certificate and private key
cert = tlslite.X509CertChain([tlslite.X509().parse(cert)])
private_key = tlslite.parsePEMKey(private_key, private=True)
# Handshake with the server
sock.handshakeClientCert(cert, private_key, alpn=ALPN)
return sock
2023-04-11 11:23:04 -05:00
class APNSConnection:
2023-04-07 18:53:21 -05:00
incoming_queue = []
def _queue_filler(self):
while True and not self.sock.closed:
2023-04-11 11:23:04 -05:00
# print(self.sock.closed)
# print("QUEUE: Waiting for payload...")
# self.sock.read(1)
# print("QUEUE: Got payload?")
2023-04-07 18:53:21 -05:00
payload = _deserialize_payload(self.sock)
2023-04-11 11:23:04 -05:00
# print("QUEUE: Got payload?")
2023-04-07 18:53:21 -05:00
if payload is not None:
2023-04-11 11:23:04 -05:00
# print("QUEUE: Received payload: " + str(payload))
2023-04-07 18:53:21 -05:00
self.incoming_queue.append(payload)
2023-04-11 11:23:04 -05:00
# print("QUEUE: Thread ended")
2023-04-07 18:53:21 -05:00
def _pop_by_id(self, id: int) -> tuple[int, list[tuple[int, bytes]]] | None:
2023-04-11 11:23:04 -05:00
# print("QUEUE: Looking for id " + str(id) + " in " + str(self.incoming_queue))
2023-04-07 18:53:21 -05:00
for i in range(len(self.incoming_queue)):
if self.incoming_queue[i][0] == id:
return self.incoming_queue.pop(i)
return None
2023-04-11 11:23:04 -05:00
2023-04-07 21:32:00 -05:00
def wait_for_packet(self, id: int) -> tuple[int, list[tuple[int, bytes]]]:
payload = self._pop_by_id(id)
while payload is None:
payload = self._pop_by_id(id)
time.sleep(0.1)
return payload
2023-04-11 11:23:04 -05:00
def __init__(self, private_key=None, cert=None):
# Generate the private key and certificate if they're not provided
if private_key is None or cert is None:
self.private_key, self.cert = albert.generate_push_cert()
2023-04-05 20:01:07 -05:00
else:
self.private_key, self.cert = private_key, cert
2023-04-05 20:01:07 -05:00
self.sock = _connect(self.private_key, self.cert)
2023-04-05 20:01:07 -05:00
2023-04-07 18:53:21 -05:00
# Start the queue filler thread
2023-04-11 11:23:04 -05:00
self.queue_filler_thread = threading.Thread(
target=self._queue_filler, daemon=True
)
2023-04-07 18:53:21 -05:00
self.queue_filler_thread.start()
2023-04-07 15:24:05 -05:00
def connect(self, root: bool = True, token: bytes = None):
flags = 0b01000001
if root:
flags |= 0b0100
2023-04-11 11:23:04 -05:00
if token is None:
2023-04-11 11:23:04 -05:00
payload = _serialize_payload(
7, [(2, 0x01.to_bytes()), (5, flags.to_bytes(4))]
)
else:
2023-04-11 11:23:04 -05:00
payload = _serialize_payload(
7, [(1, token), (2, 0x01.to_bytes()), (5, flags.to_bytes(4))]
)
self.sock.write(payload)
2023-04-07 21:32:00 -05:00
payload = self.wait_for_packet(8)
2023-04-11 11:23:04 -05:00
if (
payload == None
or payload[0] != 8
or _get_field(payload[1], 1) != 0x00.to_bytes()
):
2023-04-05 20:01:07 -05:00
raise Exception("Failed to connect")
2023-04-11 11:23:04 -05:00
new_token = _get_field(payload[1], 3)
if new_token is not None:
self.token = new_token
elif token is not None:
self.token = token
else:
raise Exception("No token")
2023-04-05 20:01:07 -05:00
2023-04-07 15:24:05 -05:00
return self.token
2023-04-06 09:38:29 -05:00
def filter(self, topics: list[str]):
fields = [(1, self.token)]
for topic in topics:
fields.append((2, sha1(topic.encode()).digest()))
payload = _serialize_payload(9, fields)
self.sock.write(payload)
2023-04-11 11:23:04 -05:00
def send_message(self, topic: str, payload: str, id=None):
if id is None:
id = random.randbytes(4)
2023-04-11 11:23:04 -05:00
payload = _serialize_payload(
0x0A,
[
(4, id),
(1, sha1(topic.encode()).digest()),
(2, self.token),
(3, payload),
],
)
2023-04-07 00:48:07 -05:00
self.sock.write(payload)
2023-04-11 11:23:04 -05:00
payload = self.wait_for_packet(0x0B)
2023-04-07 21:32:00 -05:00
if payload[1][0][1] != 0x00.to_bytes():
2023-04-11 11:23:04 -05:00
raise Exception("Failed to send message")
2023-04-07 00:48:07 -05:00
2023-04-07 18:53:21 -05:00
def set_state(self, state: int):
2023-04-11 11:23:04 -05:00
self.sock.write(
_serialize_payload(
0x14, [(1, state.to_bytes(1)), (2, 0x7FFFFFFF.to_bytes(4))]
)
)
2023-04-07 18:53:21 -05:00
def keep_alive(self):
2023-04-11 11:23:04 -05:00
self.sock.write(_serialize_payload(0x0C, []))
2023-04-07 00:48:07 -05:00
# TODO: Find a way to make this non-blocking
2023-04-11 11:23:04 -05:00
# def expect_message(self) -> tuple[int, list[tuple[int, bytes]]] | None:
2023-04-07 21:32:00 -05:00
# return _deserialize_payload(self.sock)
def _serialize_field(id: int, value: bytes) -> bytes:
return id.to_bytes() + len(value).to_bytes(2, "big") + value
def _serialize_payload(id: int, fields: list[(int, bytes)]) -> bytes:
payload = b""
for fid, value in fields:
if fid is not None:
payload += _serialize_field(fid, value)
return id.to_bytes() + len(payload).to_bytes(4, "big") + payload
def _deserialize_field(stream: bytes) -> tuple[int, bytes]:
id = int.from_bytes(stream[:1], "big")
length = int.from_bytes(stream[1:3], "big")
value = stream[3 : 3 + length]
return id, value
2023-04-11 11:23:04 -05:00
2023-04-07 21:32:00 -05:00
# Note: Takes a stream, not a buffer, as we do not know the length of the payload
# WILL BLOCK IF THE STREAM IS EMPTY
def _deserialize_payload(stream) -> tuple[int, list[tuple[int, bytes]]] | None:
id = int.from_bytes(stream.read(1), "big")
if id == 0x0:
return None
length = int.from_bytes(stream.read(4), "big")
buffer = stream.read(length)
fields = []
while len(buffer) > 0:
fid, value = _deserialize_field(buffer)
fields.append((fid, value))
buffer = buffer[3 + len(value) :]
return id, fields
2023-04-11 11:23:04 -05:00
def _deserialize_payload_from_buffer(
buffer: bytes,
) -> tuple[int, list[tuple[int, bytes]]] | None:
2023-04-07 21:32:00 -05:00
id = int.from_bytes(buffer[:1], "big")
if id == 0x0:
return None
length = int.from_bytes(buffer[1:5], "big")
buffer = buffer[5:]
if len(buffer) < length:
raise Exception("Buffer is too short")
fields = []
while len(buffer) > 0:
fid, value = _deserialize_field(buffer)
fields.append((fid, value))
buffer = buffer[3 + len(value) :]
return id, fields
# Returns the value of the first field with the given id
def _get_field(fields: list[tuple[int, bytes]], id: int) -> bytes:
for field_id, value in fields:
if field_id == id:
return value
2023-04-11 11:23:04 -05:00
return None