2015-12-25 07:07:00 +11:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2016-02-20 06:03:06 +11:00
|
|
|
###############################################################################
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
import requests
|
2016-03-23 19:42:59 +11:00
|
|
|
import xml.etree.ElementTree as etree
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-04-08 00:10:07 +10:00
|
|
|
import xbmcgui
|
|
|
|
|
2016-04-07 00:24:03 +10:00
|
|
|
from utils import logging, settings, window
|
2015-12-25 07:07:00 +11:00
|
|
|
import clientinfo
|
|
|
|
|
2016-02-20 06:03:06 +11:00
|
|
|
###############################################################################
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-04-07 02:23:51 +10:00
|
|
|
# Disable annoying requests warnings
|
|
|
|
import requests.packages.urllib3
|
|
|
|
requests.packages.urllib3.disable_warnings()
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-02-20 06:03:06 +11:00
|
|
|
###############################################################################
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
|
2016-04-07 00:24:03 +10:00
|
|
|
@logging
|
2015-12-25 07:07:00 +11:00
|
|
|
class DownloadUtils():
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
Manages any up/downloads with PKC. Careful to initiate correctly
|
|
|
|
Use startSession() to initiate.
|
|
|
|
If not initiated, e.g. SSL check will fallback to False
|
|
|
|
"""
|
2016-02-20 06:03:06 +11:00
|
|
|
|
2015-12-25 07:07:00 +11:00
|
|
|
# Borg - multiple instances, shared state
|
2016-02-07 22:38:50 +11:00
|
|
|
_shared_state = {}
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
# Requests session
|
2016-03-13 23:59:24 +11:00
|
|
|
timeout = 30
|
2016-04-13 20:14:16 +10:00
|
|
|
# How many failed attempts before declaring PMS dead?
|
2016-04-13 21:04:23 +10:00
|
|
|
connectionAttempts = 2
|
2016-04-13 20:14:16 +10:00
|
|
|
# How many 401 returns before declaring unauthorized?
|
2016-04-13 21:04:23 +10:00
|
|
|
unauthorizedAttempts = 2
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
def __init__(self):
|
2016-02-07 22:38:50 +11:00
|
|
|
self.__dict__ = self._shared_state
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
def setUsername(self, username):
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
Reserved for userclient only
|
|
|
|
"""
|
2015-12-25 07:07:00 +11:00
|
|
|
self.username = username
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Set username: %s" % username, 0)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
def setUserId(self, userId):
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
Reserved for userclient only
|
|
|
|
"""
|
2015-12-25 07:07:00 +11:00
|
|
|
self.userId = userId
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Set userId: %s" % userId, 0)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
def setServer(self, server):
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
Reserved for userclient only
|
|
|
|
"""
|
2015-12-25 07:07:00 +11:00
|
|
|
self.server = server
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Set server: %s" % server, 0)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
def setToken(self, token):
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
Reserved for userclient only
|
|
|
|
"""
|
2015-12-25 07:07:00 +11:00
|
|
|
self.token = token
|
2016-04-07 00:24:03 +10:00
|
|
|
if token == '':
|
|
|
|
self.logMsg('Set token: empty token!', 0)
|
2015-12-25 07:07:00 +11:00
|
|
|
else:
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Set token: xxxxxxx", 0)
|
|
|
|
|
|
|
|
def setSSL(self, verifySSL=None, certificate=None):
|
|
|
|
"""
|
|
|
|
Reserved for userclient only
|
|
|
|
|
|
|
|
verifySSL must be 'true' to enable certificate validation
|
|
|
|
|
|
|
|
certificate must be path to certificate or 'None'
|
|
|
|
"""
|
|
|
|
if verifySSL is None:
|
|
|
|
verifySSL = settings('sslverify')
|
|
|
|
if certificate is None:
|
|
|
|
certificate = settings('sslcert')
|
|
|
|
self.logMsg("Verify SSL certificates set to: %s" % verifySSL, 0)
|
|
|
|
self.logMsg("SSL client side certificate set to: %s" % certificate, 0)
|
|
|
|
if verifySSL != 'true':
|
|
|
|
self.s.verify = False
|
|
|
|
if certificate != 'None':
|
|
|
|
self.s.cert = certificate
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-04-13 22:34:58 +10:00
|
|
|
def startSession(self, reset=False):
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
User should be authenticated when this method is called (via
|
|
|
|
userclient)
|
|
|
|
"""
|
2015-12-25 07:07:00 +11:00
|
|
|
# Start session
|
|
|
|
self.s = requests.Session()
|
2016-04-07 00:24:03 +10:00
|
|
|
|
|
|
|
client = clientinfo.ClientInfo()
|
|
|
|
self.deviceId = client.getDeviceId()
|
2016-04-06 04:10:29 +10:00
|
|
|
# Attach authenticated header to the session
|
|
|
|
self.s.headers = client.getXArgsDeviceInfo()
|
2016-04-07 00:24:03 +10:00
|
|
|
self.s.encoding = 'utf-8'
|
|
|
|
# Set SSL settings
|
|
|
|
self.setSSL()
|
|
|
|
|
|
|
|
# Set other stuff
|
|
|
|
self.setServer(window('pms_server'))
|
|
|
|
self.setToken(window('pms_token'))
|
|
|
|
self.setUserId(window('currUserId'))
|
|
|
|
self.setUsername(window('plex_username'))
|
|
|
|
|
2016-04-13 20:14:16 +10:00
|
|
|
# Counters to declare PMS dead or unauthorized
|
2016-04-13 21:04:23 +10:00
|
|
|
# Use window variables because start of movies will be called with a
|
|
|
|
# new plugin instance - it's impossible to share data otherwise
|
2016-04-13 22:34:58 +10:00
|
|
|
if reset is True:
|
2016-04-13 21:04:23 +10:00
|
|
|
window('countUnauthorized', value='0')
|
|
|
|
window('countError', value='0')
|
2016-04-13 20:14:16 +10:00
|
|
|
|
2015-12-25 07:07:00 +11:00
|
|
|
# Retry connections to the server
|
|
|
|
self.s.mount("http://", requests.adapters.HTTPAdapter(max_retries=1))
|
|
|
|
self.s.mount("https://", requests.adapters.HTTPAdapter(max_retries=1))
|
|
|
|
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Requests session started on: %s" % self.server, 0)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
def stopSession(self):
|
|
|
|
try:
|
|
|
|
self.s.close()
|
|
|
|
except:
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg("Requests session already closed", 0)
|
2016-04-06 04:10:29 +10:00
|
|
|
try:
|
2016-04-07 00:24:03 +10:00
|
|
|
del self.s
|
2016-04-06 04:10:29 +10:00
|
|
|
except:
|
2016-04-07 00:24:03 +10:00
|
|
|
pass
|
|
|
|
self.logMsg('Request session stopped', 0)
|
|
|
|
|
|
|
|
def getHeader(self, options=None):
|
|
|
|
header = clientinfo.ClientInfo().getXArgsDeviceInfo()
|
2016-04-06 04:10:29 +10:00
|
|
|
if options is not None:
|
|
|
|
header.update(options)
|
2015-12-25 07:07:00 +11:00
|
|
|
return header
|
|
|
|
|
2016-04-26 22:02:19 +10:00
|
|
|
def __doDownload(self, s, action_type, **kwargs):
|
|
|
|
if action_type == "GET":
|
2016-04-07 00:24:03 +10:00
|
|
|
r = s.get(**kwargs)
|
2016-04-26 22:02:19 +10:00
|
|
|
elif action_type == "POST":
|
2016-04-07 00:24:03 +10:00
|
|
|
r = s.post(**kwargs)
|
2016-04-26 22:02:19 +10:00
|
|
|
elif action_type == "DELETE":
|
2016-04-07 00:24:03 +10:00
|
|
|
r = s.delete(**kwargs)
|
2016-04-26 22:02:19 +10:00
|
|
|
elif action_type == "OPTIONS":
|
2016-04-07 00:24:03 +10:00
|
|
|
r = s.options(**kwargs)
|
2016-04-26 22:02:19 +10:00
|
|
|
elif action_type == "PUT":
|
2016-04-07 00:24:03 +10:00
|
|
|
r = s.put(**kwargs)
|
|
|
|
return r
|
|
|
|
|
2016-04-26 22:02:19 +10:00
|
|
|
def downloadUrl(self, url, action_type="GET", postBody=None,
|
|
|
|
parameters=None, authenticate=True, headerOptions=None,
|
2016-04-29 20:44:56 +10:00
|
|
|
verifySSL=True, timeout=None):
|
2016-04-07 00:24:03 +10:00
|
|
|
"""
|
|
|
|
Override SSL check with verifySSL=False
|
|
|
|
|
|
|
|
If authenticate=True, existing request session will be used/started
|
|
|
|
Otherwise, 'empty' request will be made
|
|
|
|
|
|
|
|
Returns:
|
2016-05-19 04:10:20 +10:00
|
|
|
None If an error occured
|
2016-04-07 00:24:03 +10:00
|
|
|
True If connection worked but no body was received
|
|
|
|
401, ... integer if PMS answered with HTTP error 401
|
|
|
|
(unauthorized) or other http error codes
|
|
|
|
xml xml etree root object, if applicable
|
|
|
|
JSON json() object, if applicable
|
|
|
|
"""
|
|
|
|
kwargs = {}
|
2016-04-13 20:14:16 +10:00
|
|
|
if authenticate is True:
|
2016-04-07 00:24:03 +10:00
|
|
|
# Get requests session
|
|
|
|
try:
|
|
|
|
s = self.s
|
|
|
|
except AttributeError:
|
|
|
|
self.logMsg("Request session does not exist: start one", 0)
|
|
|
|
self.startSession()
|
|
|
|
s = self.s
|
|
|
|
# Replace for the real values
|
|
|
|
url = url.replace("{server}", self.server)
|
|
|
|
else:
|
|
|
|
# User is not (yet) authenticated. Used to communicate with
|
|
|
|
# plex.tv and to check for PMS servers
|
|
|
|
s = requests
|
|
|
|
headerOptions = self.getHeader(options=headerOptions)
|
|
|
|
kwargs['timeout'] = self.timeout
|
|
|
|
if settings('sslcert') != 'None':
|
|
|
|
kwargs['cert'] = settings('sslcert')
|
|
|
|
|
|
|
|
# Set the variables we were passed (fallback to request session
|
|
|
|
# otherwise - faster)
|
|
|
|
kwargs['url'] = url
|
|
|
|
if verifySSL is False:
|
|
|
|
kwargs['verify'] = False
|
|
|
|
if headerOptions is not None:
|
|
|
|
kwargs['headers'] = headerOptions
|
|
|
|
if postBody is not None:
|
|
|
|
kwargs['data'] = postBody
|
|
|
|
if parameters is not None:
|
|
|
|
kwargs['params'] = parameters
|
2016-04-29 20:44:56 +10:00
|
|
|
if timeout is not None:
|
|
|
|
kwargs['timeout'] = timeout
|
2016-04-07 00:24:03 +10:00
|
|
|
|
|
|
|
# ACTUAL DOWNLOAD HAPPENING HERE
|
2015-12-25 07:07:00 +11:00
|
|
|
try:
|
2016-04-26 22:02:19 +10:00
|
|
|
r = self.__doDownload(s, action_type, **kwargs)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-04-07 00:24:03 +10:00
|
|
|
# THE EXCEPTIONS
|
2015-12-25 07:07:00 +11:00
|
|
|
except requests.exceptions.ConnectionError as e:
|
2016-04-07 00:24:03 +10:00
|
|
|
# Connection error
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg("Server unreachable at: %s" % url, -1)
|
|
|
|
self.logMsg(e, 1)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
except requests.exceptions.ConnectTimeout as e:
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Server timeout at: %s" % url, -1)
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg(e, 1)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
except requests.exceptions.HTTPError as e:
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg('HTTP Error at %s' % url, -1)
|
|
|
|
self.logMsg(e, 1)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
|
|
|
except requests.exceptions.SSLError as e:
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Invalid SSL certificate for: %s" % url, -1)
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg(e, 1)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-04-13 18:48:45 +10:00
|
|
|
except requests.exceptions.TooManyRedirects as e:
|
|
|
|
self.logMsg("Too many redirects connecting to: %s" % url, -1)
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg(e, 1)
|
2016-04-13 18:48:45 +10:00
|
|
|
|
2015-12-25 07:07:00 +11:00
|
|
|
except requests.exceptions.RequestException as e:
|
2016-04-07 00:24:03 +10:00
|
|
|
self.logMsg("Unknown error connecting to: %s" % url, -1)
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg(e, 1)
|
2015-12-25 07:07:00 +11:00
|
|
|
|
2016-04-10 00:57:45 +10:00
|
|
|
except SystemExit:
|
|
|
|
self.logMsg('SystemExit detected, aborting download', 0)
|
|
|
|
self.stopSession()
|
|
|
|
|
2016-04-07 00:24:03 +10:00
|
|
|
except:
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg('Unknown error while downloading. Traceback:', -1)
|
2016-04-07 00:24:03 +10:00
|
|
|
import traceback
|
|
|
|
self.logMsg(traceback.format_exc(), 0)
|
|
|
|
|
|
|
|
# THE RESPONSE #####
|
2016-04-13 20:14:16 +10:00
|
|
|
else:
|
|
|
|
# We COULD contact the PMS, hence it ain't dead
|
|
|
|
if authenticate is True:
|
2016-04-13 21:04:23 +10:00
|
|
|
window('countError', value='0')
|
2016-04-13 20:14:16 +10:00
|
|
|
if r.status_code != 401:
|
2016-04-13 21:04:23 +10:00
|
|
|
window('countUnauthorized', value='0')
|
2016-04-13 20:14:16 +10:00
|
|
|
|
|
|
|
if r.status_code == 204:
|
|
|
|
# No body in the response
|
|
|
|
return True
|
|
|
|
|
|
|
|
elif r.status_code == 401:
|
|
|
|
if authenticate is False:
|
|
|
|
# Called when checking a connect - no need for rash action
|
|
|
|
return 401
|
|
|
|
r.encoding = 'utf-8'
|
2016-04-13 22:42:04 +10:00
|
|
|
self.logMsg('HTTP error 401 from PMS %s' % url, -1)
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg(r.text, 1)
|
|
|
|
if '401 Unauthorized' in r.text:
|
|
|
|
# Truly unauthorized
|
2016-04-13 21:04:23 +10:00
|
|
|
window('countUnauthorized',
|
|
|
|
value=str(int(window('countUnauthorized')) + 1))
|
|
|
|
if (int(window('countUnauthorized')) >=
|
|
|
|
self.unauthorizedAttempts):
|
2016-04-13 20:14:16 +10:00
|
|
|
self.logMsg('We seem to be truly unauthorized for PMS'
|
2016-04-13 22:20:28 +10:00
|
|
|
' %s ' % url, -1)
|
2016-05-31 16:06:42 +10:00
|
|
|
if window('plex_serverStatus') not in ('401', 'Auth'):
|
2016-04-13 20:14:16 +10:00
|
|
|
# Tell userclient token has been revoked.
|
|
|
|
self.logMsg('Setting PMS server status to '
|
|
|
|
'unauthorized', 0)
|
2016-05-31 16:06:42 +10:00
|
|
|
window('plex_serverStatus', value="401")
|
2016-04-13 20:14:16 +10:00
|
|
|
xbmcgui.Dialog().notification(
|
|
|
|
self.addonName,
|
|
|
|
"Unauthorized for PMS",
|
|
|
|
xbmcgui.NOTIFICATION_ERROR)
|
|
|
|
else:
|
|
|
|
# there might be other 401 where e.g. PMS under strain
|
|
|
|
self.logMsg('PMS might only be under strain', 0)
|
2016-04-08 00:10:07 +10:00
|
|
|
return 401
|
|
|
|
|
2016-04-13 20:14:16 +10:00
|
|
|
elif r.status_code in (200, 201):
|
|
|
|
# 200: OK
|
|
|
|
# 201: Created
|
2016-04-07 00:24:03 +10:00
|
|
|
try:
|
2016-04-13 20:14:16 +10:00
|
|
|
# xml response
|
|
|
|
r = etree.fromstring(r.content)
|
2016-04-07 00:24:03 +10:00
|
|
|
return r
|
|
|
|
except:
|
2016-04-07 02:23:51 +10:00
|
|
|
r.encoding = 'utf-8'
|
2016-04-13 20:14:16 +10:00
|
|
|
if r.text == '':
|
|
|
|
# Answer does not contain a body
|
|
|
|
return True
|
|
|
|
try:
|
|
|
|
# UNICODE - JSON object
|
|
|
|
r = r.json()
|
|
|
|
return r
|
|
|
|
except:
|
|
|
|
if '200 OK' in r.text:
|
|
|
|
# Received fucked up OK from PMS on playstate
|
|
|
|
# update
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
self.logMsg("Unable to convert the response for: "
|
|
|
|
"%s" % url, -1)
|
|
|
|
self.logMsg("Received headers were: %s"
|
|
|
|
% r.headers, -1)
|
|
|
|
self.logMsg('Received text:', -1)
|
|
|
|
self.logMsg(r.text, -1)
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
self.logMsg('Unknown answer from PMS %s with status code %s. '
|
|
|
|
'Message:' % (url, r.status_code), -1)
|
|
|
|
r.encoding = 'utf-8'
|
|
|
|
self.logMsg(r.text, 1)
|
|
|
|
return True
|
|
|
|
|
|
|
|
# And now deal with the consequences of the exceptions
|
|
|
|
if authenticate is True:
|
|
|
|
# Make the addon aware of status
|
2016-04-18 19:23:05 +10:00
|
|
|
try:
|
|
|
|
window('countError',
|
|
|
|
value=str(int(window('countError')) + 1))
|
|
|
|
if int(window('countError')) >= self.connectionAttempts:
|
|
|
|
self.logMsg('Failed to connect to %s too many times. '
|
|
|
|
'Declare PMS dead' % url, -1)
|
2016-05-31 16:06:42 +10:00
|
|
|
window('plex_online', value="false")
|
2016-04-18 19:23:05 +10:00
|
|
|
except:
|
|
|
|
# 'countError' not yet set
|
|
|
|
pass
|
|
|
|
return None
|