Files
Hippolyzer/pyogp/lib/base/message/udpdeserializer.py

370 lines
15 KiB
Python

"""
@file udpdeserializer.py
@date 2008-09-16
Contributors can be viewed at:
http://svn.secondlife.com/svn/linden/projects/2008/pyogp/CONTRIBUTORS.txt
$LicenseInfo:firstyear=2008&license=apachev2$
Copyright 2008, Linden Research, Inc.
Licensed under the Apache License, Version 2.0 (the "License").
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
or in
http://svn.secondlife.com/svn/linden/projects/2008/pyogp/LICENSE.txt
$/LicenseInfo$
"""
#standard libs
import struct
from logging import getLogger, CRITICAL, ERROR, WARNING, INFO, DEBUG
#pyogp libs
from pyogp.lib.base.settings import Settings
from pyogp.lib.base.message.packethandler import PacketHandler
from template_dict import TemplateDictionary
from template import MsgData, MsgBlockData, MsgVariableData
from types import MsgType, MsgBlockType, MsgFrequency, PacketLayout, EndianType, PackFlags, sizeof
from data_unpacker import DataUnpacker
from packet import UDPPacket
from pyogp.lib.base import exc
logger = getLogger('message.udpdeserializer')
log = logger.log
class UDPPacketDeserializer(object):
def __init__(self, packet_handler = None, settings = None):
self.context = None
self.unpacker = DataUnpacker()
self.current_template = None
self.current_block = None
self.template_dict = TemplateDictionary()
# allow the settings to be passed in
# otherwise, grab the defaults
if settings != None:
self.settings = settings
else:
self.settings = Settings()
# we can skip parsing all the data in a packet if we know it's not being handled
# allow the packet_handler to be passed in
# otherwise, grab the defaults
if packet_handler != None:
self.packet_handler = packet_handler
elif self.settings.HANDLE_PACKETS:
self.packet_handler = PacketHandler()
def deserialize(self, context):
self.context = context
#Must first strip off acks if present, and zero-decode,
#if needed, in order to determine proper template
#once we can test again, do the commented out part below for the offset
temp_acks = []
msg_buff = self.context
msg_len = len(msg_buff)
if ord(msg_buff[0]) & PackFlags.LL_ACK_FLAG:
#print "have acks! that number: "
acks = ord(msg_buff[msg_len-1])
ack_offset = msg_len - 1 - 4*acks
temp_acks = msg_buff[:ack_offset]
#Now zero decode the entire msg except the acks, in order to get the correct evaluation of the template
if ord(msg_buff[0]) & PackFlags.LL_ZERO_CODE_FLAG:
'''
#offset = ord(msg_buff[5])
#header = msg_buff[:6+offset] #offset will be zero unless the header has extra data
header = msg_buff[:6]
#inputbuf = msg_buff[6+offset:] #not yet implemented because we can't test right now
inputbuf = msg_buff[6:]
input_len = len(inputbuf)
msg_buff = self.zero_code_expand(inputbuf, input_len)
'''
offset = ord(msg_buff[5])
header = msg_buff[:6+offset] #disregard#offset will be zero unless the header has extra data
#header = msg_buff[:6]
inputbuf = msg_buff[6+offset:] #disregard#not yet implemented because we can't test right now
#inputbuf = msg_buff[6:]
# debugger code commented out
#''.join( [ "%02X " % ord( x ) for x in byteStr ] ).strip()
#print "just did zerodecode " + ''.join( [ "%02X " % ord( x ) for x in header ] ).strip() + ' ' \
#+ ''.join( [ "%02X " % ord( x ) for x in msg_buff[:12] ] ).strip()
input_len = len(inputbuf)
msg_buff = self.zero_code_expand(inputbuf, input_len)
msg_buff = header + msg_buff
if self.__validate_message(msg_buff) == True:
# go ahead an merge the acks back in in order for the decode to work
# or to get the send_flags for acks
msg_buff = msg_buff + ''.join(temp_acks)
# if the packet is being handled, or if have have disabled deferred packet parsing, handle it!
if self.packet_handler.is_packet_handled(self.current_template.name) or not self.settings.ENABLE_DEFERRED_PACKET_PARSING:
try:
return self.__decode_data(msg_buff)
except exc.DataUnpackingError, error:
#log(WARNING, "Error parsing packet due to: %s" % (error))
raise exc.MessageDeserializationError("packet parsing", error)
return None
else:
if self.settings.LOG_VERBOSE and self.settings.ENABLE_UDP_LOGGING: log(DEBUG, 'Received packet : %s (Skipping)' % (self.current_template.name))
return None
def __validate_message(self, message_buffer):
""" Determines if the message follows a given template. """
if self.__decode_template(message_buffer) == True:
return True
return False
def __decode_template(self, message_buffer):
""" Determines the template that the message in the buffer
appears to be using. """
if PacketLayout.PACKET_ID_LENGTH >= len(message_buffer):
raise exc.MessageDeserializationError("packet length", "template mismatch")
header = message_buffer[PacketLayout.PACKET_ID_LENGTH:12]
self.current_template = self.__decode_header(header)
if self.current_template != None:
return True
log(INFO, "Received unknown packet: '%s', packet is not in our message_template" % (header))
return False
def __decode_header(self, header):
frequency = self.__decode_frequency(header)
num = self.__decode_num(header)
result = self.template_dict.get_template_by_pair(frequency, num)
return result
def __decode_frequency(self, header):
#if it is not a high
if header[0] == '\xFF':
#if it is not a medium frequency message
if header[1] == '\xFF':
#if it is a Fixed frequency message
if header[2] == '\xFF':
return 'Fixed'
#then it is low
else:
return 'Low'
#then it is medium
else:
return 'Medium'
#then it is high
else:
return 'High'
return None
def __decode_num(self, header):
frequency = self.__decode_frequency(header)
if frequency == 'Low':
return struct.unpack('>H', header[2:4])[0] #int("0x"+ByteToHex(header[2:4]).replace(' ', ''),16)
elif frequency == 'Medium':
return struct.unpack('>B', header[1:2])[0] #int("0x"+ByteToHex(header[1:2]).replace(' ', ''),16)
elif frequency == 'High':
return struct.unpack('>B', header[0])[0] #int("0x"+ByteToHex(header[0]), 16)
elif frequency == 'Fixed':
return struct.unpack('>B', header[3:4])[0] #int("0x"+ByteToHex(header[0:4]).replace(' ', ''), 16)
else:
return None
def __decode_data(self, data):
if self.current_template == None:
raise exc.MessageTemplateNotFound("deserializing data")
msg_data = MsgData(self.current_template.name)
packet = UDPPacket(msg_data)
msg_size = len(data)
packet.name = self.current_template.name
#determine packet flags
packet.send_flags = ord(data[0])
packet.packet_id = self.unpacker.unpack_data(data, MsgType.MVT_U32, 1, endian_type=EndianType.BIG)
##Zero code flag
#if packet.send_flags & PackFlags.LL_ZERO_CODE_FLAG:
#header = data[0:PacketLayout.PACKET_ID_LENGTH-1]
#inputbuf = data[PacketLayout.PACKET_ID_LENGTH-1:]
#input_len = len(inputbuf)
#data = self.zero_code_expand(inputbuf, input_len)
#data = header + data
#ACK_FLAG - means the incoming packet is acking some old packets of ours
if packet.send_flags & PackFlags.LL_ACK_FLAG:
msg_size -= 1
acks = self.unpacker.unpack_data(data, MsgType.MVT_U8, msg_size)
ack_start = acks * sizeof(MsgType.MVT_S32)
ack_data = data[msg_size-ack_start:]
ack_pos = 0
while acks > 0:
ack_packet_id = self.unpacker.unpack_data(ack_data, MsgType.MVT_S32, \
start_index=ack_pos)
ack_pos += sizeof(MsgType.MVT_S32)
packet.add_ack(ack_packet_id)
acks -= 1
#RELIABLE - means the message wants to be acked by us
if packet.send_flags & PackFlags.LL_RELIABLE_FLAG:
packet.reliable = True
#RESENT - packet that wasn't previously acked was resent
if packet.send_flags & PackFlags.LL_RESENT_FLAG:
#check if its a duplicate and the sender messed up somewhere
#case - ack we sent wasn't received by the sender
pass
#at the offset position, the messages stores the offset to where the
#payload begins (may be extra header information)
#print "Decoding offset"
offset = self.unpacker.unpack_data(data, MsgType.MVT_U8, PacketLayout.PHL_OFFSET)
freq_bytes = self.current_template.frequency
#HACK: fixed case
if freq_bytes == -1:
freq_bytes = 4
decode_pos = PacketLayout.PACKET_ID_LENGTH + \
freq_bytes + \
offset
for block in self.current_template.blocks:
repeat_count = 0
if block.block_type == MsgBlockType.MBT_SINGLE:
repeat_count = 1
elif block.block_type == MsgBlockType.MBT_MULTIPLE:
repeat_count = block.number
elif block.block_type == MsgBlockType.MBT_VARIABLE:
#if the block type is VARIABLE, then the current position
#will be the repeat count written in
#print "Reading VARIABLE block repeat count"
repeat_count = self.unpacker.unpack_data(data, \
MsgType.MVT_U8, \
decode_pos)
decode_pos += 1
else:
log(WARNING, "ERROR: Unknown block type: %s in %s packet." % (str(block.block_type), packet.name))
return None
for i in range(repeat_count):
block_data = MsgBlockData(block.name)
block_data.block_number = i
self.current_block = block_data
msg_data.add_block(self.current_block)
for variable in block.variables:
var_size = variable.size
if variable.type == MsgType.MVT_VARIABLE:
#this isn't the size of the data, but the max bytes
#the data can be
#need to copy because we have to advance our decode_pos
#afterwards
data_size = var_size
#HACK: this is a slow procedure, should passed in
templen = len(data)
if (decode_pos + data_size) > templen:
log(WARNING, "ERROR: trying to read %s from a buffer of len %s in %s" % (str(decode_pos + var_size), str(len(data)), packet.name))
return None
if data_size == 1:
#print "Reading VARIABLE variable size 1 byte"
var_size = self.unpacker.unpack_data(data, \
MsgType.MVT_U8, \
decode_pos)
elif data_size == 2:
#print "Reading VARIABLE variable size 2 bytes"
var_size = self.unpacker.unpack_data(data, \
MsgType.MVT_U16, \
decode_pos)
elif data_size == 4:
#print "Reading VARIABLE variable size 4 bytes"
var_size = self.unpacker.unpack_data(data, \
MsgType.MVT_U32, \
decode_pos)
else:
raise exc.MessageDeserializationError("variable", "unknown data size")
decode_pos += data_size
#HACK: this is a slow procedure, should passed in
if (decode_pos + var_size) > len(data):
log(WARNING, "ERROR: trying to read %s from a buffer of len %s in %s" % (str(decode_pos + var_size), str(len(data)), packet.name))
return None
unpacked_data = self.unpacker.unpack_data(data, \
variable.type, \
decode_pos, \
var_size=var_size)
var_data = MsgVariableData(variable.name, unpacked_data, variable.type)
self.current_block.add_variable(var_data)
decode_pos += var_size
if len(msg_data.blocks) <= 0 and len(self.current_template.blocks) > 0:
raise exc.MessageDeserializationError("message", "message is empty")
packet.message_data = msg_data
return packet
def zero_code_expand(self, msg_buf, msg_size):
"""made this call more generic due to changes in how zero_code_expand is called.
no more header issues in actual call. Its taken care of earlier in process"""
#if ord(msg_buf[0]) & PackFlags.LL_ZERO_CODE_FLAG == 0:
#return msg_buf
#header = msg_buf[0:PacketLayout.PACKET_ID_LENGTH]
#inputbuf = msg_buf[PacketLayout.PACKET_ID_LENGTH:]
inputbuf = msg_buf[:]
newstring = ""
in_zero = False
for c in inputbuf:
if c != '\0':
if in_zero == True:
zero_count = ord(c)
zero_count = zero_count -1
while zero_count>0:
newstring = newstring + '\x00'
zero_count = zero_count -1
in_zero = False
else:
newstring = newstring + c
else:
newstring = newstring + c
in_zero = True
#return header + newstring
return newstring