def on_message(ws, message): logging.info('Recv message:%s', message) retval = coapMessage.parseMessage(message) msg_id = retval['messageId'] token = retval['token'] payload = retval['payload'] device_id = ntohl(long(payload[0:7])) method = int(payload[8]) data = payload[9:] logging.info('code %d, msg_id %d, device_id %x, method %d', retval['code'], retval['messageId'], device_id, method) logging.info('Message data:%s', data) parameters = None parameters = json.loads(data) if parameters == None: logging.error('Invalid message parameters, Drop') return ''' code class can indicate a request (0), a success response (2), a client error response (4), or a server error response (5). (All other class values are reserved.) ''' code_class = retval['code'] >> 5 if code_class == 0: #request result = None if method == CONFIG_METHOD: result = devices_manager.device_config(device_id, parameters) elif method == RELOAD_METHOD: result = devices_manager.device_reload(device_id) else: logging.error('Unacceptable method:%d', method) if retval['type'] == TYPE_CON: if result: result = json.dumps(result, separators=(',', ':')) response_data = payload[0:8] + result response = coapMessage.buildMessage(msgtype=coapDefines.TYPE_ACK, token=token, code=(0x2 << 5 | 0x4), messageId=msg_id, payload=response_data) self.write_message(response) else: logging.info('Message result:%s', result) elif code_class == 2 or code_class == 4 or code_class == 5: #response logging.info('Resonpse received') else: logging.error('Unacceptable message code class:%d', code_class)
def test_parseMessage(logFixture, messageAndBytes): (msg,bytes) = messageAndBytes bytes = list(bytes) log.debug('bytes: {0}'.format(u.formatBuf(bytes))) log.debug('msg: {0}'.format(msg)) result = m.parseMessage(bytes) log.debug('result: {0}'.format(result)) assert result['type'] == msg[0] assert result['token'] == msg[1] assert result['code'] == msg[2] assert result['messageId'] == msg[3] assert len(result['options']) == len(msg[4]) for (o1,o2) in zip(result['options'],msg[4]): assert repr(o1)==repr(o2) assert result['payload'] == list(msg[5])
def test_parseMessage(logFixture, messageAndBytes): (msg, bytes) = messageAndBytes bytes = list(bytes) log.debug('bytes: {0}'.format(u.formatBuf(bytes))) log.debug('msg: {0}'.format(msg)) result = m.parseMessage(bytes) log.debug('result: {0}'.format(result)) assert result['type'] == msg[0] assert result['token'] == msg[1] assert result['code'] == msg[2] assert result['messageId'] == msg[3] assert len(result['options']) == len(msg[4]) for (o1, o2) in zip(result['options'], msg[4]): assert repr(o1) == repr(o2) assert result['payload'] == list(msg[5])
def _receive(self, timestamp, sender, rawbytes): # all UDP packets are received here output = [] output += ['\n{0} _receive message:'.format(self.name)] output += ['- timestamp: {0}'.format(timestamp)] output += ['- sender: {0}'.format(sender)] output += ['- bytes: {0}'.format(u.formatBuf(rawbytes))] output = '\n'.join(output) log.debug(output) srcIp = sender[0] srcIp = u.trimAddress(srcIp) srcPort = sender[1] # parse messages try: message = m.parseMessage(rawbytes) options = message['options'] except e.messageFormatError as err: log.warning('malformed message {0}: {1}'.format( u.formatBuf(rawbytes), str(err))) return # dispatch message try: if message['code'] in d.METHOD_ALL: # this is meant for a resource (request) #==== decrypt message if encrypted innerOptions = [] foundContext = None requestPartialIV = None if 'ciphertext' in message.keys(): # retrieve security context # before decrypting we don't know what resource this request is meant for # so we take the first binding with the correct context (recipientID) blindContext = self._securityContextLookup( u.buf2str(message['kid'])) if not blindContext: if self.secContextHandler: appContext = self.secContextHandler( u.buf2str(message['kid'])) if not appContext: raise e.coapRcUnauthorized( 'Security context not found.') else: raise e.coapRcUnauthorized( 'Security context not found.') foundContext = blindContext if blindContext != None else appContext requestPartialIV = u.zeroPadString( u.buf2str(message['partialIV']), foundContext.getIVLength()) # decrypt the message try: (innerOptions, plaintext) = oscoap.unprotectMessage( foundContext, version=message['version'], code=message['code'], options=message['options'], ciphertext=message['ciphertext'], partialIV=requestPartialIV) except e.oscoapError as err: raise e.coapRcBadRequest( 'OSCOAP unprotect failed: {0}'.format(str(err))) payload = plaintext else: # message not encrypted payload = message['payload'] options += innerOptions #==== find right resource # retrieve path path = coapUri.options2path(options) log.debug('path="{0}"'.format(path)) # find resource that matches this path resource = None with self.resourceLock: for r in self.resources: if r.matchesPath(path): resource = r break log.debug('resource={0}'.format(resource)) if not resource: raise e.coapRcNotFound() #==== check if appropriate security context was used for the resource (context, authorizedMethods) = resource.getSecurityBinding() if context is not None: if context != foundContext: raise e.coapRcUnauthorized( 'Unauthorized security context for the given resource' ) objectSecurity = oscoap.objectSecurityOptionLookUp(options) if objectSecurity: objectSecurity.setContext(foundContext) #==== get a response # call the right resource's method try: if message[ 'code'] == d.METHOD_GET and d.METHOD_GET in authorizedMethods: (respCode, respOptions, respPayload) = resource.GET(options=options) elif message[ 'code'] == d.METHOD_POST and d.METHOD_POST in authorizedMethods: (respCode, respOptions, respPayload) = resource.POST(options=options, payload=payload) elif message[ 'code'] == d.METHOD_PUT and d.METHOD_PUT in authorizedMethods: (respCode, respOptions, respPayload) = resource.PUT(options=options, payload=payload) elif message[ 'code'] == d.METHOD_DELETE and d.METHOD_DELETE in authorizedMethods: (respCode, respOptions, respPayload) = resource.DELETE(options=options) elif message['code'] not in d.METHOD_ALL: raise SystemError('unexpected code {0}'.format( message['code'])) else: raise e.coapRcUnauthorized( 'Unauthorized method for the given resource') except Exception as err: if isinstance(err, e.coapRc): raise else: raise e.coapRcInternalServerError() #==== send back response # determine type of response packet if message['type'] == d.TYPE_CON: responseType = d.TYPE_ACK elif message['type'] == d.TYPE_NON: responseType = d.TYPE_NON else: raise SystemError('unexpected type {0}'.format( message['type'])) # if resource is protected with a security context, add Object-Security option if foundContext: # verify that the Object-Security option was not set by the resource handler assert not any( isinstance(option, o.ObjectSecurity) for option in respOptions) objectSecurity = o.ObjectSecurity(context=foundContext) respOptions += [objectSecurity] # if Stateless-Proxy option was present in the request echo it for option in options: if isinstance(option, o.StatelessProxy): respOptions += [option] break # build response packets and pass partialIV from the request for OSCOAP's processing response = m.buildMessage(msgtype=responseType, token=message['token'], code=respCode, messageId=message['messageId'], options=respOptions, payload=respPayload, securityContext=foundContext, partialIV=requestPartialIV) # send self.socketUdp.sendUdp( destIp=srcIp, destPort=srcPort, msg=response, ) elif message['code'] in d.COAP_RC_ALL: # this is meant for a transmitter (response) # find transmitter msgkey = (srcIp, srcPort, message['token'], message['messageId']) found = False with self.transmittersLock: self._cleanupTransmitter() for (k, v) in self.transmitters.items(): # try matching if (msgkey[0] == k[0] and msgkey[1] == k[1] and (msgkey[2] == k[2] or msgkey[3] == k[3])): found = True v.receiveMessage(timestamp, srcIp, srcPort, message) break if found == False: raise e.coapRcBadRequest( 'could not find transmitter corresponding to {0}, transmitters are {1}' .format( msgkey, ','.join( [str(k) for k in self.transmitters.keys()]))) else: raise NotImplementedError() except e.coapRc as err: # log log.warning(err) # determine type of response packet if message['type'] == d.TYPE_CON: responseType = d.TYPE_ACK elif message['type'] == d.TYPE_NON: responseType = d.TYPE_NON else: raise SystemError('unexpected type {0}'.format( message['type'])) # if Stateless-Proxy option was present in the request echo it errorOptions = [] for option in options: if isinstance(option, o.StatelessProxy): errorOptions += [option] break # build response packets response = m.buildMessage( msgtype=responseType, token=message['token'], code=err.rc, messageId=message['messageId'], options=errorOptions, ) # send self.socketUdp.sendUdp( destIp=srcIp, destPort=srcPort, msg=response, ) except Exception as err: log.critical(traceback.format_exc())