1 package Thrasher
::Component
;
9 Thrasher::Component - tie together XML stream processing and component
10 state into one module to handle a single "component"
14 Thrasher::Component implements a XEP-0100 compliant component, with
15 hooks for adding further stuff into the component in a defined
16 way. The component is primarily "private" and documented in comments,
17 but this POD will document two things: The interface for the
18 Thrasher::Protocol implementations, and the hooks provided
19 for extending the base XEP-0100 protocol.
23 # General overview of this file: Some support code for the component
24 # is written in the front, then after the
25 ###### PROTOCOL SUPPORT
26 # comment below, we'll be implementing the component protocol
27 # by following along the specification at
28 # http://www.xmpp.org/extensions/xep-0114.html
29 # which will be referenced by section number.
31 # This file should only implement the bare minimum protocol stuff;
32 # additional capabilities should live elsewhere, just to avoid this
33 # file getting pointlessly large, and to avoid mixing extensions
34 # in with the XEP-0100 stuff.
36 # Right now this only permits one protocol per connection, but
37 # I'm trying to structure this for multi-protocol support in the
38 # future, per the later XEP on components.
40 use Thrasher
::Log
qw(:all);
41 use Thrasher
::XMPPStreamOut
;
42 use Thrasher
::XMPPStreamIn
qw(:all);
43 use Thrasher
::Constants
qw(:all);
44 use Thrasher
::Plugin
qw(:all);
45 use Thrasher
::XML
qw(:all);
46 use Thrasher
::ConnectionManager
qw(:all);
47 use Thrasher
::XHTML_IM_Normalize
qw(xhtml_and_text text);
48 use Thrasher
::Callbacks
qw(:all);
50 use Thrasher
::Plugin
::Basic
;
53 use Carp
qw(confess longmess);
56 use Digest
::SHA1
qw(sha1_hex);
60 our @EXPORT_OK = qw(feature
61 has_subtags strip_resource no_match);
62 our %EXPORT_TAGS = (all
=> \
@EXPORT_OK);
64 my $DEBUG = $Thrasher::DEBUG
;
66 # This indicates whether or not to use the connection manager to
67 # prevent flooding and to tell whether or not the remote service is
68 # having trouble. This should generally only be turned off for
69 # debugging purposes, but it could be useful in other scenarios.
70 our $USE_CONNECTION_MANAGER = 1;
72 # For testing purposes, this allows use to simply tell the component
73 # whether it is getting directly connected or not, so we can
74 # test the XML output it is supposed to generate. In real execution
75 # this should never be set.
76 our $WILL_BE_DIRECTLY_CONNECTED = undef;
78 # Hmm, this isn't good, but ProxyFileTransfer needs it. When/if
79 # we ever want to run multiple components out of one protocol we
83 # This manages the input from and the output to the component, but is
84 # not responsible for managing the socket; it receives XML text and
85 # is expected to output XML text. This, again, allows us to trivially
86 # test this component in a unit test environment without having to
87 # connect to a real XMPP server.
89 # Text is received by this object by calling "->text_in". Text out
90 # is sent out along the closure received during object construction,
91 # converted through Thrasher::XMPPStreamOut into text. A
92 # method ->xml_out accepts XML for output, but should be internal-only.
94 # used to make unique IDs
97 return "id" . ($id++);
100 # States change mostly during connection. This changes which
101 # functions are passed the incoming XML events.
103 'disconnected' => sub { },
104 connecting
=> \
&xml_in_connecting
,
105 handshaking
=> \
&xml_in_handshaking
,
106 connected
=> \
&xml_in_connected
114 $self->{protocol
} = shift;
115 if (!UNIVERSAL
::isa
($self->{protocol
}, 'Thrasher::Protocol')) {
116 die "The first argument to the component needs to be "
117 ."a Thrasher::Protocol instance.";
120 my $text_output_closure = shift;
121 if (ref($text_output_closure) ne 'CODE') {
122 die "Creating a component requires a closure for the output"
125 $self->{output
} = $text_output_closure;
127 $self->setup_streams;
129 # Need info for the stream connect
130 $self->{secret
} = shift;
131 $self->{component_name
} = shift;
133 $self->{state} = 'disconnected';
134 $self->{xml_buf
} = [];
136 # This holds a jid => {registration_info => $registration_info,
137 # error_xml => $xml_tag} hash. If we get a login request, but
138 # we've already tried that registration info and the remote
139 # service told us it's bad, we don't re-try it. This is
140 # deliberately held in transient memory storage.
141 $self->{authentication_errors
} = {};
151 my $out_stream = new Thrasher
::XMPPStreamOut
($self->{output
});
152 $self->{out_stream
} = $out_stream;
154 my $in_stream = Thrasher
::XMPPStreamIn
::get_parser
();
155 $self->{in_stream
} = $in_stream;
158 # The usual xml_out used for most traffic, will buffer the
159 # XML if we're not currently connected.
163 if ($self->{state} ne 'connected') {
164 push @
{$self->{xml_buf
}}, @_;
167 $self->{out_stream
}->output(@_);
170 # xml_out used by connection routines, to force out the
171 # necessary handshaking.
174 $self->{out_stream
}->output(@_);
177 sub output_initial_stream_tag
{
181 [[$NS_STREAM, 'stream'],
182 {"{$NS_COMPONENT}to" => $self->{component_name
}},
184 $self->set_state('connecting');
185 # This is a direct call to output_tag_and_children so we can
186 # pass in the $is_root_element value, which this needs.
187 $self->{out_stream
}->output_tag_and_children($initial_stream, 1);
190 # Once we know we're connected, probe everybody in our list
191 sub initialize_connection
{
194 if ($self->{initialized
}) {
195 log("Already initialized connection.");
199 $self->{initialized
} = 1;
201 log("Initializing connection");
203 my $backend = $self->{protocol
}->{backend
};
204 my $all_jids = $backend->all_jids;
206 for my $jid (@
$all_jids) {
207 $self->send_presence_xml($jid, 'probe');
210 # Send a discovery request at the server, which we
211 # then recurse down one level to get the info for
213 # But only do it if we have a SERVER NAME.
214 if ($Thrasher::SERVER_NAME
) {
216 ([[$NS_COMPONENT, 'iq'],
217 {to
=> $Thrasher::SERVER_NAME
,
218 from
=> $self->{component_name
},
220 [[[$NS_DISCO_ITEMS, 'query'], {}, []]]],
222 my $component = shift;
223 my $iq_params = shift;
224 my $iq_packet = shift;
226 if ($iq_params->{type
} eq 'error') {
227 # FIXME: Schedule a timeout to try again.
228 log("Server discovery failed, this may cause "
229 ."odd, random problems.");
230 failed
("server_discovery_items");
235 extract_disco_items
($iq_params->{query
});
236 my %items_hash = map { $_ => 1} @
$items;
238 my $item_count = scalar(@
$items);
240 # For each item, fire off an info request
241 for my $item (@
$items) {
242 if ($item eq $self->{component_name
}) {
248 ([[$NS_COMPONENT, 'iq'],
250 from
=> $self->{component_name
},
252 [[[$NS_DISCO_INFO, 'query'], {}, []]]],
254 my $component = shift;
255 my $iq_params = shift;
256 my $iq_packet = shift;
257 debug
("Disco info got $iq_params->{type} from $item"
258 . " with $item_count remaining.");
260 if ($iq_params->{type
} ne 'error') {
261 my ($identities, $features) =
262 extract_disco_info
($iq_params->{query
});
263 $Thrasher::SERVER_INFO
->{$item} =
264 [$identities, $features];
266 # Server was configured to return this
267 # existed, but it doesn't seem to.
268 # Hopefully the proxy service isn't
270 delete $Thrasher::SERVER_INFO
->{$item};
275 if ($item_count == 0) {
276 succeeded
("server_discovery_items");
279 # Ensure server_discovery_items callbacks fire
280 # eventually even when some component doesn't reply.
281 # That would be one evil component...
282 my $no_reply_check_timeout = sub {
284 if ($item_count == scalar(@
{$items})) {
285 # ...not a single component responded?!!
286 failed
('server_discovery_items');
288 elsif ($item_count > 0) {
289 # ...got some responses, but not all.
290 # Give what we have to success callbacks--if
291 # we luck out the missing component(s) aren't
292 # the ones they need.
293 succeeded
('server_discovery_items');
295 return 0; # never repeat.
297 $self->{'event_loop'}->schedule($no_reply_check_timeout,
305 my ($self, $state) = @_;
306 $self->{state} = $state;
308 if ($state eq 'connected') {
309 log("State set to 'connected'");
310 $self->initialize_connection;
318 my $state_xml_func = $states->{$self->{state}};
319 if (!defined($state_xml_func)) {
320 die "Receiving xml, but I don't have a handler for "
321 ."state '" . $self->{state} . "', how odd! (1)";
324 my $parsed = $self->{in_stream
}->parse($xml);
325 for my $message (@
$parsed) {
326 $state_xml_func->($self, $message);
328 # State may change after processing a message
329 $state_xml_func = $states->{$self->{state}};
330 if (!defined($state_xml_func)) {
331 die "Receiving xml, but I don't have a handler for "
332 ."state '" . $self->{state} . "', how odd! (2)";
340 ## State handlers; mostly for connection, as once we're connected
341 ## this component is basicly in a steady state. (The individual
342 ## connections are more complicated, but not this.)
345 my $STREAM = [$NS_STREAM, 'stream'];
346 my $HANDSHAKE = [$NS_COMPONENT, 'handshake'];
348 # In this state, we've sent the original <stream:stream ...> tag,
349 # and we're expecting the stream tag from the server
350 sub xml_in_connecting
{
352 my $xml_message = shift;
358 # Expected case - stream returned from the server.
359 # Annoyingly, we can't really check for stream errors
360 # at this level, since the stream tag is exactly the
361 # same for success and failure, EXCEPT that we get
362 # an additional error tag upon failure.
363 [$STREAM, {from
=> save
('host'), id
=> save
('stream_id')}] =>
365 # Server is on the track we expect, send out the
368 my $handshake = lc(sha1_hex
($params->{stream_id
}
370 $self->set_state('handshaking');
372 $self->force_xml_out([$HANDSHAKE, {}, [$handshake]]);
376 log("Error in stream tag? Reconnecting:\n$@\n");
377 $self->reconnect_stream();
381 sub xml_in_handshaking
{
383 my $xml_message = shift;
385 # If this passes, we're connected.
387 multi_extract
($xml_message,
388 [[$NS_COMPONENT, 'handshake'], {}, []] =>
390 $self->set_state('connected');
391 callbacks
('connected', $self);
394 [[$NS_STREAM, 'error'], {}, save
('text')] =>
397 die "Stream error after handshake. Server said: $params->{text}";
401 log("Handshake error; reconnecting:\n$@\n");
402 $self->reconnect_stream();
406 # In this state, we are connected, and are receiving arbitrary
407 # packets from arbitrary users.
408 sub xml_in_connected
{
410 my $xml_message = shift;
412 # Route the XML message according to the nature of the message.
413 multi_extract
($xml_message,
416 [[$NS_COMPONENT, 'iq'],
417 {type
=> save
("type"),
418 from
=> save
("from"),
421 "{$NS_XML}lang" => save
("language", 1)
423 # Save first child under "query" whether or not
424 # that's the actual tag name (e.g. "si").
425 save_match
('query', [undef, undef, undef], 1)] =>
427 my $iq_params = shift;
429 # Get and set handlers
430 return $self->handle_iq($iq_params,
434 [[$NS_COMPONENT, 'presence'],
437 callbacks
('presence_in',
439 sub { $self->handle_presence($_[0]) },
443 [[$NS_COMPONENT, 'message'], {
445 from
=> save
('from'),
446 type
=> save
('type', 1),
449 save_match
('chatstate',
450 [[$NS_CHATSTATES, undef], undef, undef],
453 [[undef, 'body'], undef, undef],
457 my $message_params = shift;
458 $message_params->{'type'} ||= 'chat';
459 if ($message_params->{'chatstate'}) {
460 $message_params->{'chatstate'}
461 = $message_params->{'chatstate'}->[0]->[1];
463 $self->handle_message($message_params->{to
},
464 $message_params->{from
},
465 $message_params->{body
},
466 $message_params->{'type'},
467 $message_params->{'chatstate'});
471 [[$NS_STREAM, 'error']] =>
473 my $children = $xml_message->[2];
475 for my $child (@
$children) {
476 if (ref($child) eq 'ARRAY') {
483 # No error tag? Shouldn't happen. Panic!
488 my $tag_name = $first_tag->[0]->[1];
489 # If it's a "not well formed" error,
490 # we can try to reconnect. If it's anything
492 if ($tag_name eq 'xml-not-well-formed') {
493 $self->reconnect_stream;
499 # Default handler - complain about the unknown
500 # packet, but otherwise ignore it.
503 log "Unexpected packet: " . Dumper
($xml_message);
508 # $IQ_CALLBACKS{"${jid_without_resource}-${id}"} => \&callback;
510 # The request/response ID (generated in iq_query()) includes the bare
511 # JID in case another user tries to inject a forged response.
516 my $iq_params = shift;
517 my $iq_packet = shift;
519 my $id = $iq_packet->[1]->{'{}id'};
521 my $request_id = strip_resource
($iq_params->{'from'}) . '-' . $id;
522 my $callback = $IQ_CALLBACKS{$request_id};
524 # Must not mistake unrelated requests using the same ID
525 # scheme for the expected response (e.g. two Thrasher
526 # instances doing server disco at the same time).
527 && $iq_params->{type
} =~ /^(?:result|error)$/) {
530 $callback->($self, $iq_params, $iq_packet);
532 log "IQ callback error: $@" if ($@
);
533 delete($IQ_CALLBACKS{$request_id});
537 if (! $iq_params->{query
}
538 || @
{$iq_params->{query
}} == 0
539 || @
{$iq_params->{query
}->[0]} == 0) {
540 # Unused and causes interesting issues when replying
541 # especially if autovivification occurs.
542 log('Skipping childless IQ: ' . Dumper
($iq_packet));
546 my $query_ns = $iq_params->{query
}->[0]->[0];
547 my $query_type = $iq_packet->[1]->{'{}type'};
548 my $target = 'client';
549 if (!defined($iq_params->{to
}) ||
550 $iq_params->{to
} eq $self->{component_name
}) {
551 $target = 'component';
553 my $func = method_for_iq_namespace
($target, $query_type, $query_ns);
555 # Allow ourselves to suppress the error for some namespaces.
556 if ($func && $func eq 'ignore') {
557 $self->iq_error($iq_params, 'service_unavailable');
561 if (!defined($func)) {
562 log "Unexpected IQ query: " . Dumper
($iq_params,
563 $target, $query_type,
565 if ($query_type ne 'error') {
566 # Prevent loop with error response to error generating an error....
567 $self->iq_error($iq_params, 'service_unavailable');
572 return $func->($self, $iq_params, $iq_packet);
577 # Everything but the ID
578 my $iq_packet = shift;
579 my $callback = shift;
582 $iq_packet->[1]->{id
} = $id;
585 # get_id() never repeats within a Thrasher instance so the only way
586 # we can get a duplicate ID in responses from the same bare JID
587 # is if the user sends two from different resources. Oh, well.
588 my $to = $iq_packet->[1]->{'to'}
589 || $iq_packet->[1]->{'{}to'}
591 my $request_id = strip_resource
($to) . '-' . $id;
592 $IQ_CALLBACKS{$request_id} = $callback;
595 $self->xml_out($iq_packet);
599 ###### PROTOCOL SUPPORT
602 sub send_presence_xml
{
604 my $target_jid = shift;
605 my $presence_type = shift;
606 my $from_jid = shift || $self->{component_name
};
611 # target_jid can be unset when the presence tag is coming
612 # from the transport itself
614 my $session = $self->session_for($target_jid);
615 if ($session && $session->{status
} eq 'disconnecting') {
616 # Don't send presence info for connections we're
617 # currently disconnecting.
618 log("Bypassing a presence from $from_jid because disconnecting");
624 no warnings
'uninitialized';
625 if ($target_jid eq $from_jid &&
626 $target_jid eq $self->{component_name
}) {
627 log("Attempt to send presence to self: " . longmess
);
630 if ($target_jid =~ /$self->{component_name}$/ &&
631 $from_jid =~ /$self->{component_name}$/) {
632 log("Attempting to send presence to self: "
633 . Dumper
($target_jid, $from_jid) .
640 push @children, [[$NS_COMPONENT, 'show'], {}, [$show]];
643 push @children, [[$NS_COMPONENT, 'status'], {}, [$status]];
646 push @children, @
$extra;
649 my $presence_out_tag = [[$NS_COMPONENT, 'presence'],
650 {($presence_type ?
(type
=> $presence_type) : ()),
652 ($target_jid ?
(to
=>
653 strip_resource
($target_jid)) : ())},
656 callbacks
('presence_out',
658 sub { $self->xml_out($_[0]) },
664 my $session_for = shift;
665 $session_for = strip_resource
($session_for);
666 return $self->{sessions
}->{$session_for};
669 sub set_session_for
{
670 my ($self, $jid, $session) = @_;
671 $jid = strip_resource
($jid);
673 $self->{'sessions'}->{$jid} = $session;
676 # Welcome to the ugliest function in all of Thrasher!
677 sub handle_presence
{
679 my $presence_tag = shift;
681 my ($element, $atts, $children) = @
$presence_tag;
683 for my $att qw(to from) {
684 if (!$atts->{"{}$att"}) {
685 log "Presence received with no '$att'; ignored.";
690 my $type = $atts->{'{}type'};
692 if ($type && $type eq 'error') {
693 log("Got a presence error.");
697 # Section 4.1.1 #10 - our request accepted
698 # FIXME: What if the request is rejected?
699 if (defined($type) &&
700 ($type eq 'subscribed' || $type eq 'unsubscribed') &&
701 (!defined($atts->{'{}to'}) ||
702 $atts->{'{}to'} eq $self->{component_name
})) {
707 if (defined($type) &&
708 $type eq 'subscribe' &&
709 $atts->{'{}to'} eq $self->{component_name
}) {
711 # Hey, sure, buddy, no problem
712 # FIXME: There ought to be something about registration here.
713 $self->xml_out([[$NS_COMPONENT, 'presence'],
714 {type
=> 'subscribed',
715 from
=> $self->{component_name
},
716 to
=> $atts->{'{}from'}},
721 if (defined($type) &&
722 $type eq 'unsubscribe' &&
723 $atts->{'{}to'} eq $self->{component_name
}) {
726 $self->xml_out([[$NS_COMPONENT, 'presence'],
727 {type
=> 'unsubscribed',
728 from
=> $self->{component_name
},
729 to
=> $atts->{'{}from'}},
734 # Everything above here is there because it can be
735 # done without a session; below this, a session
738 my $from = strip_resource
($atts->{'{}from'});
739 my $session = $self->session_for($from);
741 if (!defined($session) && $atts->{'{}type'}) {
742 if ($atts->{'{}type'} && $atts->{'{}type'} eq 'probe') {
744 $self->send_presence_xml($atts->{'{}from'},
749 my $registration_info =
750 $self->{protocol
}->{backend
}->registered($from);
752 if (!defined($registration_info)) {
753 if ($atts->{'{}from'} =~ /$self->{component_name}$/) {
754 # Don't reply to what is effectively ourself.
758 if ($atts->{'{}to'} ne $self->{component_name
}) {
759 # If this was a directed presence and it wasn't
760 # directly for the transport, eat it.
764 $self->xml_out([[$NS_COMPONENT, 'presence'],
765 {from
=> $self->{component_name
},
766 to
=> $atts->{'{}from'},
768 [error_tag
('registration_required')]]);
771 # A presence tag has been sent other than to log in,
772 # such as to subscribe, but the user is not currently
773 # logged in. If they are unsubscribing, go ahead
774 # and say they are unsubscribed. Otherwise, this
776 if ($atts->{'{}type'} eq 'unsubscribe') {
778 ([[$NS_COMPONENT, 'presence'],
779 {from
=> $atts->{'{}to'},
780 to
=> $atts->{'{}from'},
781 type
=> 'unsubscribed'}, []]);
785 # This gets sent out after logging off; if I can
786 # work out a way to distinguish that case vs.
787 # other cases where this would be called for, we can
789 $self->xml_out([[$NS_COMPONENT, 'presence'],
790 {from
=> $self->{component_name
},
791 to
=> $atts->{'{}from'},
793 [error_tag
('not_authorized')]]);
799 if (!defined($type)) {
800 if (!defined($session)) {
801 $self->login($atts->{'{}from'}, $presence_tag);
802 if ($atts->{'{}to'} ne $self->{component_name
}) {
806 $self->echo_presence($session, $presence_tag);
811 if ($type eq 'subscribe') {
812 $session->subscribe($atts->{'{}to'});
816 if ($type eq 'unsubscribe') {
817 $session->unsubscribe($atts->{'{}to'});
821 if ($type eq 'subscribed' || $type eq 'unsubscribed') {
822 my $protocol = $self->{protocol
};
824 $self->xmpp_name_to_legacy($atts->{'{}from'},
826 if (!defined($legacy_name)) {
827 log "No legacy name for " . $atts->{'{}to'};
830 $protocol->$type($session, $self, $legacy_name);
835 # FIXME: This conforms to the specification, but I think
836 # we ought to track which resources are online and only
837 # disconnect if the user has no resources online.
838 if ($type eq 'unavailable') {
839 if (!$atts->{'{}to'} ||
840 $atts->{'{}to'} eq $self->{component_name
}) {
841 $self->logout($session);
844 # Maybe we should just skip this?
845 log ("Presence unavailable not handled properly: "
851 if (defined($session)) {
852 $self->echo_presence($session, $presence_tag);
856 if ($type eq 'probe') {
857 # We know who you are.
858 $self->send_presence_xml($atts->{'{}from'}, '');
862 # This shouldn't be able to happen, all bases should be
864 log "Received unexpected presence packet with no "
865 . "associated session: \n" . Dumper
($presence_tag);
868 # Echos the presence of the user back out to the protocol, be
869 # it a general update or a targetted update.
873 my $presence_tag = shift;
875 my $type = $presence_tag->[1]->{'{}type'};
878 for my $child (@
{$presence_tag->[2]}) {
880 $child->[0]->[1] eq 'show') {
881 $show = join '', @
{$child->[2]};
884 $child->[0]->[1] eq 'status') {
885 $status = join '', @
{$child->[2]};
889 my $to = $presence_tag->[1]->{'{}to'};
890 if ($to eq $self->{component_name
}) {
891 $self->{protocol
}->user_presence_update
892 ($session, $type, $show, $status);
895 $self->xmpp_name_to_legacy(strip_resource
($presence_tag->[1]->{'{}from'}),
898 $self->{protocol
}->user_targeted_presence_update
899 ($session, $type, $show, $status, $target_user);
901 log "Sent targetted presence to user "
902 .$presence_tag->[1]->{'{}from'} . ", but I have no such user.";
909 my $full_jid = shift;
910 my $original_presence_tag = shift;
911 my $jid = strip_resource
($full_jid);
913 # Already queued a past login attempt. Tell that attempt to use
914 # the current full JID and don't enqueue another one.
915 if ($self->{'connection_queued'}->{$jid}) {
916 $self->{'connection_queued'}->{$jid} = $full_jid;
917 $self->send_connection_queued($jid);
921 my $registration_info = $self->{protocol
}->{backend
}->registered($jid);
923 if (my $error = $self->{authentication_errors
}->{$jid}) {
924 my $bad_registration_info = $error->{registration_info
};
925 if (compare_hashref
($bad_registration_info,
926 $registration_info)) {
927 # It looks like this only happens when users ask for it,
928 # so dump out the XML.
929 $self->xml_out($error->{error_xml
});
931 # Note there is one case this doesn't cover well; the user
932 # entered the wrong password, gets it labelled as bad,
933 # then actually CHANGES THE PASSWORD on the remote service
934 # to match this password. I'll worry when that happens,
935 # I guess, because right now the wrongness of pounding on
936 # the remote service outweighs that chance.
937 log("Discarding login attempt by $jid, because the "
938 ."same registration info has already been labelled "
939 ."as bad by the remote service.");
943 # It's a new registration, so try again. But first...
944 delete $self->{authentication_errors
}->{$jid};
947 my $login_handler = sub {
948 # Result from session can be:
949 # * ref (implies its the Session object)
951 # * undef if there was an error and the Protocol is handling it.
952 my $session_or_error = shift;
954 # Failed login - Section 4.4.2
955 if (!ref(my $error = $session_or_error)) {
956 # Protocol can pass an error here to have XML generated or
959 my $packet = [[$NS_COMPONENT, 'presence'],
961 from
=> $self->{component_name
},
963 [error_tag
($error)]];
964 $self->xml_out($packet);
965 if ($error eq 'not_acceptable') {
967 $self->{authentication_errors
}->{$jid} = {
968 registration_info
=> $registration_info,
969 error_xml
=> $packet,
977 delete $self->{authentication_errors
}->{$jid};
979 $self->send_presence_xml($full_jid, '');
981 my $session = $session_or_error;
982 # In case protocol didn't already associate the session.
983 $self->set_session_for($jid, $session);
984 $self->{protocol
}->initial_login($session);
985 if (defined($original_presence_tag) &&
986 $original_presence_tag->[1]->{'{}to'} ne
987 $self->{component_name
}) {
988 $self->echo_presence($session, $original_presence_tag);
992 if (!defined($registration_info)) {
993 # FIXME: Determine if this happens and when; be sure
994 # to check the possibility of us losing the registration
995 # info while the user still thinks they are registered.
996 log "$jid sent us available presence but has no "
1001 # Verify that we have all required components
1002 my @required_items = $self->{protocol
}->registration_items;
1003 for my $item (@required_items) {
1004 if (!defined($registration_info->{$item})) {
1005 log("Registration item $item missing for $jid! Ack! Panic!");
1006 $self->{protocol
}->{backend
}->remove($jid);
1007 $self->xml_out([[$NS_COMPONENT, 'presence'],
1008 {from
=> $self->{component_name
},
1011 [error_tag
('registration_required')]]);
1016 my $protocol_login = sub {
1017 if ($self->session_for($jid)) {
1018 # Racing? Can't call ->login() with a session already defined.
1019 log("login($full_jid) reached protocol_login"
1020 . " but already has a session. WHAT IS GOING ON?\n");
1021 # Multiple active sessions for the same JID ends in tears.
1025 # If the connect was queued, a more current resource may have
1026 # been stored since this closure was created.
1027 my $last_full_jid = delete($self->{'connection_queued'}->{$jid})
1029 $self->{protocol
}->login($login_handler,
1034 $self->{'connection_queued'}->{$jid} = $full_jid;
1036 if (!$USE_CONNECTION_MANAGER) {
1037 $protocol_login->();
1039 my $immediate_connection = request_connect
($protocol_login);
1040 if (defined($WILL_BE_DIRECTLY_CONNECTED)) {
1041 $immediate_connection = $WILL_BE_DIRECTLY_CONNECTED;
1044 # In the event that an immediate connection is made, the rest
1045 # of the code already takes care of the presence tags.
1046 if (!$immediate_connection) {
1047 $self->send_connection_queued($jid);
1052 # Fires our extended "connection queued" presence tag at the given bare JID.
1053 sub send_connection_queued
{
1054 my ($self, $jid) = @_;
1056 my $thrasher_presence =
1057 [[[$NS_THRASHER_PRESENCE, 'connection-queued'], {}, []]];
1058 $self->send_presence_xml($jid,
1062 'connection queued',
1063 $thrasher_presence);
1068 my $session = shift;
1070 my $logout_status_message = shift;
1072 # Accept JIDs for the session
1073 if (!ref($session)) {
1074 $session = $self->session_for($session);
1077 if ($session->{status
} =~ /disconnecting/) {
1078 log("Already logging out $session->{jid}, but got another "
1079 ."request to log out.");
1083 log("Logging out $session->{jid}");
1085 $session->{status
} = 'disconnecting before presence';
1087 my $logout_handler = sub {
1088 # One way or another, logging off is successful.
1089 # Send logout packets; this should show everybody who
1090 # isn't offline as offline.
1092 if (!defined($session)) {
1093 # FIXME: This shouldn't happen.
1094 # Sequence to trigger:
1096 # * kill transport, whack database.
1097 # * come online still subscribed, go offline.
1098 # * this is reached.
1099 # As you can guess, the "whack database" step is frankly
1100 # more hostility than we can really plan for.
1102 confess
"Made it to logout handler without session.";
1105 $session->logout($self);
1107 my $roster = $self->{protocol
}->{backend
}->get_roster
1110 my @on_roster = map {
1111 $self->{protocol
}->{backend
}->legacy_name_to_jid($session->{jid
},
1113 $self->{component_name
})
1115 for my $roster_entry (@on_roster) {
1116 $self->send_presence_xml($session->{jid
}, 'unavailable',
1120 if ($extra && ref($extra) ne 'CODE') {
1121 log("Got 'extra' that isn't code: " . longmess
);
1126 $self->send_presence_xml($session->{jid
}, 'unavailable',
1127 undef, undef, $logout_status_message);
1129 $session->{status
} = 'disconnecting';
1131 delete $self->{sessions
}->{$session->{jid
}};
1133 log("session disconnected for $session->{jid}");
1136 # Do we also need to show all transport users as offline,
1137 # or does something in the server take care of that.
1138 $self->{protocol
}->logout($session, $logout_handler);
1141 sub handle_message
{
1145 my $body_xml = shift;
1147 my $chatstate = shift;
1149 if (defined($type) && $type eq 'error') {
1150 log("Got an error message from a user.");
1154 my $session = $self->session_for($from);
1156 # FIXME: There can be a race condition where the error sub is
1157 # called after the user disconnects. We shouldn't send this then.
1158 my $error_handler = sub {
1160 my $message = [[$NS_COMPONENT, 'message'],
1165 # $body_xml, # FIXME - better to send this?
1166 error_tag
($error)]];
1167 $self->xml_out($message);
1170 my $error_message = [[$NS_COMPONENT, 'message'],
1174 [error_tag
('registration_required'),
1177 my $registration_info = $self->registration_info($from);
1179 if (!defined($registration_info)) {
1180 $self->xml_out($error_message);
1184 # If we get here, the user has registered, and is sending
1185 # a message, but they are apparently not actually logged
1186 # in, perhaps because they deliberately logged off. I'm
1187 # choosing to allow them to log in this way.
1188 # FIXME: Hey, actually do that. For now you get an error.
1189 $self->send_error_message
1190 ($from, "You must be logged in to send messages "
1191 ."to the remote service users.", 'service_unavailable',
1195 } elsif (!$session->is_registered) {
1196 $self->xml_out($error_message);
1200 my $converted_to = $self->xmpp_name_to_legacy($session->{jid
},
1201 strip_resource
($to));
1203 # Tie successful call to the protocol to the successful extraction
1204 # of the message from the input
1207 my $body = extract
([undef, undef,
1208 save_sub
("text", \
&text_extractor
)],
1211 my $body_text = join '', @
{$body->{text
} || []};
1213 $self->{protocol
}->send_message($session,
1220 log("Error in extracting message from "
1221 . Dumper
($body_xml) . ":\n" . $@
);
1227 $self->{protocol
}->outgoing_chatstate($session,
1232 log("Error in outgoing_chatstate:\n$@");
1236 if (! ($body_xml || $chatstate)) {
1237 log('Message without usable child.');
1242 sub registration_info
{
1245 my $stripped_jid = strip_resource
($jid);
1246 return $self->{protocol
}->{backend
}->registered($stripped_jid);
1249 sub legacy_name_to_xmpp
{
1251 my $user_jid = strip_resource
(shift());
1252 my $legacy_name = shift;
1253 my $lang = shift || 'en';
1255 # FIXME: XMPP is correct
1256 # FIXME: Lang on the user
1257 return $self->{protocol
}->{backend
}->legacy_name_to_jid
1258 ($user_jid, $legacy_name, $self->{component_name
}, $lang);
1261 sub xmpp_name_to_legacy
{
1263 my $user_jid = strip_resource
(shift());
1264 my $target_jid = strip_resource
(shift());
1266 return $self->{protocol
}->{backend
}->jid_to_legacy_name
1267 ($user_jid, $target_jid);
1272 =head1 PROTOCOL INTERFACE
1274 The protocol interface is intended to sheild Thrasher::Protocol
1275 implementers from potential changes to the Component interface.
1276 If you, as a Thrasher::Protocol implementer ever feel compelled
1277 to reach into the ::Component to do anything not accessible from
1278 this interface, please let us know so we can give you a more
1281 The officially-implemented methods are:
1286 C<add_contact>($jid, $legacy_user_name): This will send out
1287 the correct <presence> tag to attempt to add the $legacy_user_name
1288 to the given $jid. This corresponds with section 5.1 in the XEP.
1290 You should be able to retrieve the $jid out of the information you
1291 stored in the ::Session, and you should send in the $legacy_user_name
1292 as the raw username from the service; ::Component will take care of
1293 mapping it as appropriate, in accordance with the name translation
1301 my $legacy_user_name = shift;
1303 my $legacy_jid = $self->legacy_name_to_xmpp
1304 ($jid, $legacy_user_name);
1306 $self->send_presence_xml($jid, 'subscribe', $legacy_jid);
1312 C<send_presence>($jid, $legacy_user_name, $type, $show):
1313 Send the given presence for the given legacy_user_name.
1314 The ::Protocol implementation will need to convert the status
1315 into an XMPP-status and give us the "type" and "show".
1322 my $legacy_user_name = shift;
1327 my $from_jid = $self->legacy_name_to_xmpp($jid, $legacy_user_name);
1330 $status = text
($status);
1333 my $session = $self->session_for($jid);
1334 $session->{component
}->{presence
}->{strip_resource
($jid)}->{strip_resource
($from_jid)} =
1335 [$type, $show, $status];
1337 $self->send_presence_xml($jid, $type, $from_jid, $show, $status);
1343 C<delete_contact>($jid, $legacy_user_name): This will send out
1344 the necessary packets to indicate that a user has unsubscribed.
1348 sub delete_contact
{
1351 my $legacy_user_name = shift;
1353 my $legacy_jid = $self->legacy_name_to_xmpp($jid, $legacy_user_name);
1355 $self->send_presence_xml($jid, 'unsubscribe', $legacy_jid);
1356 $self->send_presence_xml($jid, 'unsubscribed', $legacy_jid);
1357 # FIXME: Example 50 says this should be to the JID w/
1359 $self->send_presence_xml($jid, 'unavailable', $legacy_jid);
1365 C<send_message>($jid_from, $jid_to, $message, $extra): Sends a message
1366 from the given jid to the given jid. $extra is a hash containing extra
1367 parametrs, which include:
1373 C<$is_xhtml_ish>: If false, sends the UTF-8 encoded $message to the
1376 If it is true, it will process the XHTML-ish message into an
1377 XHTML and a plain text string, and send the XHTML-ish message
1378 as an XHTML-IM message in complaince with XEP-0071. Note that
1379 there is a normalization step, so you don't need to sweat
1380 whether it is proper XHTML; this does a decent job of turning
1385 C<$nick>: If set to a true string, will broadcast the nick conforming
1386 to XEP-0172. Note that according to the XEP, nickname should be
1387 broadcast only once per connection per (legacy) user, and it
1388 is your responsibility to ensure this, not this method's.
1392 C<$type>: If set, will set the type of the message to the given
1401 my $jid_from = shift;
1403 my $message = shift;
1406 my $type = $extra->{type
} || 'chat';
1407 my $is_xhtml_ish = $extra->{is_xhtml_ish
};
1408 my $nick = $extra->{nick
};
1409 my $extra_children = $extra->{children
} || [];
1412 $nick = [[[$NS_NICK, 'nick'], {}, [$nick]]];
1417 if ($jid_from =~ / / ||
1419 log("Trying to send/receive message from a JID with "
1420 ."a space in it: from: $jid_from to: $jid_to "
1425 if (!$is_xhtml_ish) {
1426 $self->xml_out([[$NS_COMPONENT, 'message'],
1430 [[[$NS_COMPONENT, 'body'],
1433 @
$nick, @
$extra_children]]);
1435 my ($xhtml, $text) = xhtml_and_text
($message);
1436 $self->xml_out([[$NS_COMPONENT, 'message'],
1440 [[[$NS_COMPONENT, 'body'],
1442 @
$nick, @
$extra_children,
1443 [[$NS_XHTML_IM, 'html'], {},
1444 [[[$NS_XHTML, 'body'], {}, [\
$xhtml]]]]]]);
1452 C<send_error_message>($jid, $error_msg): Sends an error message
1453 to the user, coming from the transport.
1455 In my experience, this should be limited, because this gets very
1456 annoying very quickly. As the method name implies, reserve it
1459 You're responsible for providing the errors. The $session for a user
1460 may have their language available to you in $session->get_lang,
1461 but it depends on their XMPP client (and how carefully we picked the
1462 language out of the stream).
1466 sub send_error_message
{
1468 my $target_jid = shift;
1469 my $error_message = shift;
1470 my $error_type = shift;
1471 my $from = shift || $self->{component_name
};
1473 my $error_body = [];
1476 push @
$error_body, error_tag
($error_type);
1479 $self->send_message($from, $target_jid,
1481 {type
=> 'error', children
=> $error_body});
1488 C<set_roster_name>($jid, $legacy_jid, $name): Sets $jid's
1489 roster entry to $legacy_jid to have the given nickname,
1490 if $jid's client advertises support for XEP-0144, by
1491 sending a modify request.
1495 sub set_roster_name
{
1498 my $legacy_jid = shift;
1502 my $session = $self->session_for($jid);
1505 my $iq = [[$NS_COMPONENT, 'iq'],
1506 {from
=> $self->{component_name
},
1509 [[[$NS_ROSTER_EXCHANGE, 'x'], {},
1510 [[[$NS_ROSTER_EXCHANGE, 'item'],
1511 {action
=> 'modify',
1515 $self->iq_query($iq);
1521 $session->do_if_feature($NS_ROSTER_EXCHANGE,
1532 # For some reason, we can no longer continue. Send all presence
1533 # closing, terminate the connection, and terminate the mainloop.
1538 $args{reason
} ||= 'Internal error';
1540 if ($self->{I_AM_TERMINATING
}) {
1544 log("Component terminating");
1545 $self->{I_AM_TERMINATING
} = 1;
1547 my $protocol = $self->{protocol
};
1548 my $sessions = $self->{sessions
};
1550 # If we are terminating because the DB lost the connection,
1551 # we no longer know enough to actually log people off. If
1552 # we are terminating due to a signal, or most other reasons,
1553 # we can log people off cleanly.
1554 if (!$args{no_db
}) {
1555 for my $session (values %$sessions) {
1556 log("Terminating connection for $session->{jid}");
1557 $self->logout($session, undef, $args{reason
});
1561 # And terminate the event loop, which is currently
1563 $self->{event_loop
}->quit;
1566 # This is for when the XMPP server stream simply disappears.
1567 # This is probably because the server has crashed or gone down.
1568 # In this case, we want the full terminate routine since it
1569 # probably implies all users have been disconnected.
1570 # Unfortunately, we can't know this, but it's the best guess.
1571 sub lost_connection
{
1577 # This is for when we have screwed up and borked our stream.
1578 # If this ever triggers, it is almost certainly a bug in
1579 # Thrasher, but let's at least try to recover. We may lose
1580 # some messages from the server in the meantime.
1581 # FIXME: We ought to have a configuration setting for whether
1582 # we try this recovery or just give up, because if you're
1583 # using component load balancing, this will really screw your
1585 sub reconnect_stream
{
1588 log("Attempting to reconnect stream.");
1590 # This causes any events that may be generated by the protocol
1591 # side while we are reconnecting to be buffered.
1592 $self->set_state('disconnected');
1594 # By the time this is getting called, the socket is entirely gone.
1595 log("Closing socket");
1596 $self->{thrasher_socket
}->close();
1599 eval { $self->{thrasher_socket
}->connect(); };
1601 # We can't seem to connect to the server. This should
1602 # never happen, so just panic.
1603 log("Connection to server could not be re-established.");
1608 log("Connection to server re-established. Handshaking.");
1610 $self->setup_streams;
1611 $self->{thrasher_socket
}->establish_fd_watch;
1613 # Re-begin connection process
1614 $self->output_initial_stream_tag;
1617 sub socket_in_closure
{
1624 my $val = eval { $socket->read(); };
1627 $self->lost_connection();
1630 elsif (! defined($val)) {
1637 $self->xml_in($val);
1640 # Terminate immediately after an unhandled error.
1641 # Ugly, but better than leaving protocol-side online
1642 # but component-side unreachable from the XMPP server
1643 # because only the FD watch has gone.
1644 log("Fatal error handling XML input:\n$@\n");
1651 log "Connection to XMPP server lost.";
1652 $self->lost_connection();
1661 sub compare_hashref
{
1665 if (scalar(keys %$a) != scalar(keys %$b)) {
1669 while (my ($key, $value) = each %$a) {
1670 if ($b->{$key} ne $value) {