forked from platypush/platypush
307 lines
13 KiB
Python
307 lines
13 KiB
Python
import json
|
|
import os
|
|
import threading
|
|
from typing import Optional
|
|
|
|
from platypush.backend import Backend
|
|
from platypush.config import Config
|
|
from platypush.context import get_plugin
|
|
from platypush.message import Message
|
|
from platypush.message.event.mqtt import MQTTMessageEvent
|
|
from platypush.message.request import Request
|
|
from platypush.plugins.mqtt import MqttPlugin as MQTTPlugin
|
|
from platypush.utils import set_thread_name
|
|
|
|
|
|
class MqttBackend(Backend):
|
|
"""
|
|
Backend that reads messages from a configured MQTT topic (default:
|
|
``platypush_bus_mq/<device_id>``) and posts them to the application bus.
|
|
|
|
Triggers:
|
|
|
|
* :class:`platypush.message.event.mqtt.MQTTMessageEvent` when a new
|
|
message is received on one of the custom listeners
|
|
|
|
Requires:
|
|
|
|
* **paho-mqtt** (``pip install paho-mqtt``)
|
|
"""
|
|
|
|
_default_mqtt_port = 1883
|
|
|
|
def __init__(self, host: Optional[str] = None, port: int = _default_mqtt_port,
|
|
topic='platypush_bus_mq', subscribe_default_topic: bool = True,
|
|
tls_cafile: Optional[str] = None, tls_certfile: Optional[str] = None,
|
|
tls_keyfile: Optional[str] = None, tls_version: Optional[str] = None,
|
|
tls_ciphers: Optional[str] = None, tls_insecure: bool = False,
|
|
username: Optional[str] = None, password: Optional[str] = None,
|
|
client_id: Optional[str] = None, listeners=None,
|
|
*args, **kwargs):
|
|
"""
|
|
:param host: MQTT broker host. If no host configuration is specified then
|
|
the backend will use the host configuration specified on the ``mqtt``
|
|
plugin if it's available.
|
|
:param port: MQTT broker port (default: 1883)
|
|
:param topic: Topic to read messages from (default: ``platypush_bus_mq/<device_id>``)
|
|
:param subscribe_default_topic: Whether the backend should subscribe the default topic (default:
|
|
``platypush_bus_mq/<device_id>``) and execute the messages received there as action requests
|
|
(default: True).
|
|
:param tls_cafile: If TLS/SSL is enabled on the MQTT server and the certificate requires a certificate authority
|
|
to authenticate it, `ssl_cafile` will point to the provided ca.crt file (default: None)
|
|
:param tls_certfile: If TLS/SSL is enabled on the MQTT server and a client certificate it required, specify it
|
|
here (default: None)
|
|
:param tls_keyfile: If TLS/SSL is enabled on the MQTT server and a client certificate key it required,
|
|
specify it here (default: None) :type tls_keyfile: str
|
|
:param tls_version: If TLS/SSL is enabled on the MQTT server and it requires a certain TLS version, specify it
|
|
here (default: None). Supported versions: ``tls`` (automatic), ``tlsv1``, ``tlsv1.1``, ``tlsv1.2``.
|
|
:param tls_ciphers: If TLS/SSL is enabled on the MQTT server and an explicit list of supported ciphers is
|
|
required, specify it here (default: None)
|
|
:param tls_insecure: Set to True to ignore TLS insecure warnings (default: False).
|
|
:param username: Specify it if the MQTT server requires authentication (default: None)
|
|
:param password: Specify it if the MQTT server requires authentication (default: None)
|
|
:param client_id: ID used to identify the client on the MQTT server (default: None).
|
|
If None is specified then ``Config.get('device_id')`` will be used.
|
|
:param listeners: If specified then the MQTT backend will also listen for
|
|
messages on the additional configured message queues. This parameter
|
|
is a list of maps where each item supports the same arguments passed
|
|
to the main backend configuration (host, port, topic, password etc.).
|
|
Note that the message queue configured on the main configuration
|
|
will expect valid Platypush messages that then can execute, while
|
|
message queues registered to the listeners will accept any message. Example::
|
|
|
|
listeners:
|
|
- host: localhost
|
|
topics:
|
|
- topic1
|
|
- topic2
|
|
- topic3
|
|
- host: sensors
|
|
topics:
|
|
- topic4
|
|
- topic5
|
|
|
|
"""
|
|
|
|
super().__init__(*args, **kwargs)
|
|
|
|
if host:
|
|
self.host = host
|
|
self.port = port
|
|
self.tls_cafile = self._expandpath(tls_cafile) if tls_cafile else None
|
|
self.tls_certfile = self._expandpath(tls_certfile) if tls_certfile else None
|
|
self.tls_keyfile = self._expandpath(tls_keyfile) if tls_keyfile else None
|
|
self.tls_version = MQTTPlugin.get_tls_version(tls_version)
|
|
self.tls_ciphers = tls_ciphers
|
|
self.tls_insecure = tls_insecure
|
|
self.username = username
|
|
self.password = password
|
|
self.client_id = client_id or Config.get('device_id')
|
|
else:
|
|
client = get_plugin('mqtt')
|
|
assert client.host, 'No host specified on backend.mqtt nor mqtt configuration'
|
|
|
|
self.host = client.host
|
|
self.port = client.port
|
|
self.tls_cafile = client.tls_cafile
|
|
self.tls_certfile = client.tls_certfile
|
|
self.tls_keyfile = client.tls_keyfile
|
|
self.tls_version = client.tls_version
|
|
self.tls_ciphers = client.tls_ciphers
|
|
self.tls_insecure = client.tls_insecure
|
|
self.username = client.username
|
|
self.password = client.password
|
|
self.client_id = client_id or client.client_id
|
|
|
|
self.topic = '{}/{}'.format(topic, self.device_id)
|
|
self.subscribe_default_topic = subscribe_default_topic
|
|
self._client = None
|
|
self._listeners = []
|
|
|
|
self.listeners_conf = listeners or []
|
|
|
|
def send_message(self, msg, topic: Optional[str] = None, **kwargs):
|
|
try:
|
|
client = get_plugin('mqtt')
|
|
client.send_message(topic=topic or self.topic, msg=msg, host=self.host,
|
|
port=self.port, username=self.username,
|
|
password=self.password, tls_cafile=self.tls_cafile,
|
|
tls_certfile=self.tls_certfile, tls_keyfile=self.tls_keyfile,
|
|
tls_version=self.tls_version, tls_insecure=self.tls_insecure,
|
|
tls_ciphers=self.tls_ciphers, client_id=self.client_id, **kwargs)
|
|
except Exception as e:
|
|
self.logger.exception(e)
|
|
|
|
@staticmethod
|
|
def on_connect(*topics):
|
|
# noinspection PyUnusedLocal
|
|
def handler(client, userdata, flags, rc):
|
|
for topic in topics:
|
|
client.subscribe(topic)
|
|
|
|
return handler
|
|
|
|
def on_mqtt_message(self):
|
|
def handler(client, _, msg):
|
|
data = msg.payload
|
|
# noinspection PyBroadException
|
|
try:
|
|
data = data.decode('utf-8')
|
|
data = json.loads(data)
|
|
except:
|
|
pass
|
|
|
|
# noinspection PyProtectedMember
|
|
self.bus.post(MQTTMessageEvent(host=client._host, port=client._port, topic=msg.topic, msg=data))
|
|
|
|
return handler
|
|
|
|
@staticmethod
|
|
def _expandpath(path: str) -> str:
|
|
return os.path.abspath(os.path.expanduser(path)) if path else path
|
|
|
|
def _initialize_listeners(self, listeners_conf):
|
|
import paho.mqtt.client as mqtt
|
|
|
|
def listener_thread(client_, host, port):
|
|
client_.connect(host, port)
|
|
client_.loop_forever()
|
|
|
|
# noinspection PyShadowingNames,PyUnusedLocal
|
|
for i, listener in enumerate(listeners_conf):
|
|
host = listener.get('host')
|
|
if host:
|
|
port = listener.get('port', self._default_mqtt_port)
|
|
topics = listener.get('topics')
|
|
username = listener.get('username')
|
|
password = listener.get('password')
|
|
tls_cafile = self._expandpath(listener.get('tls_cafile'))
|
|
tls_certfile = self._expandpath(listener.get('tls_certfile'))
|
|
tls_keyfile = self._expandpath(listener.get('tls_keyfile'))
|
|
tls_version = MQTTPlugin.get_tls_version(listener.get('tls_version'))
|
|
tls_ciphers = listener.get('tls_ciphers')
|
|
tls_insecure = listener.get('tls_insecure')
|
|
else:
|
|
host = self.host
|
|
port = self.port
|
|
username = self.username
|
|
password = self.password
|
|
tls_cafile = self.tls_cafile
|
|
tls_certfile = self.tls_certfile
|
|
tls_keyfile = self.tls_keyfile
|
|
tls_version = self.tls_keyfile
|
|
tls_ciphers = self.tls_ciphers
|
|
tls_insecure = self.tls_insecure
|
|
|
|
topics = listener.get('topics')
|
|
if not topics:
|
|
self.logger.warning('No list of topics specified for listener n.{}'.format(i+1))
|
|
continue
|
|
|
|
client = mqtt.Client()
|
|
client.on_connect = self.on_connect(*topics)
|
|
client.on_message = self.on_mqtt_message()
|
|
|
|
if username and password:
|
|
client.username_pw_set(username, password)
|
|
|
|
if tls_cafile:
|
|
client.tls_set(ca_certs=tls_cafile,
|
|
certfile=tls_certfile,
|
|
keyfile=tls_keyfile,
|
|
tls_version=tls_version,
|
|
ciphers=tls_ciphers)
|
|
|
|
client.tls_insecure_set(tls_insecure)
|
|
|
|
threading.Thread(target=listener_thread, kwargs={
|
|
'client_': client, 'host': host, 'port': port}).start()
|
|
|
|
def on_exec_message(self):
|
|
def handler(_, __, msg):
|
|
# noinspection PyShadowingNames
|
|
def response_thread(msg):
|
|
set_thread_name('MQTTProcessor')
|
|
response = self.get_message_response(msg)
|
|
if not response:
|
|
return
|
|
response_topic = '{}/responses/{}'.format(self.topic, msg.id)
|
|
|
|
self.logger.info('Processing response on the MQTT topic {}: {}'.
|
|
format(response_topic, response))
|
|
|
|
self.send_message(response)
|
|
|
|
msg = msg.payload.decode('utf-8')
|
|
# noinspection PyBroadException
|
|
try:
|
|
msg = json.loads(msg)
|
|
msg = Message.build(msg)
|
|
except:
|
|
pass
|
|
|
|
if not msg:
|
|
return
|
|
|
|
self.logger.info('Received message on the MQTT backend: {}'.format(msg))
|
|
|
|
try:
|
|
self.on_message(msg)
|
|
except Exception as e:
|
|
self.logger.exception(e)
|
|
return
|
|
|
|
if isinstance(msg, Request):
|
|
threading.Thread(target=response_thread, name='MQTTProcessor', args=(msg,)).start()
|
|
|
|
return handler
|
|
|
|
def run(self):
|
|
import paho.mqtt.client as mqtt
|
|
|
|
super().run()
|
|
self._client = None
|
|
|
|
if self.host:
|
|
self._client = mqtt.Client(self.client_id)
|
|
if self.subscribe_default_topic:
|
|
self._client.on_connect = self.on_connect(self.topic)
|
|
|
|
self._client.on_message = self.on_exec_message()
|
|
if self.username and self.password:
|
|
self._client.username_pw_set(self.username, self.password)
|
|
|
|
if self.tls_cafile:
|
|
self._client.tls_set(ca_certs=self.tls_cafile, certfile=self.tls_certfile,
|
|
keyfile=self.tls_keyfile,
|
|
tls_version=self.tls_version,
|
|
ciphers=self.tls_ciphers)
|
|
|
|
self._client.tls_insecure_set(self.tls_insecure)
|
|
|
|
self._client.connect(self.host, self.port, 60)
|
|
self.logger.info('Initialized MQTT backend on host {}:{}, topic {}'.
|
|
format(self.host, self.port, self.topic))
|
|
|
|
self._initialize_listeners(self.listeners_conf)
|
|
if self._client:
|
|
self._client.loop_forever()
|
|
|
|
def stop(self):
|
|
self.logger.info('Received STOP event on MqttBackend')
|
|
if self._client:
|
|
self._client.disconnect()
|
|
self._client.loop_stop()
|
|
self._client = None
|
|
|
|
for listener in self._listeners:
|
|
try:
|
|
listener.loop_stop()
|
|
except Exception as e:
|
|
# noinspection PyProtectedMember
|
|
self.logger.warning('Could not stop listener {host}:{port}: {error}'.format(
|
|
host=listener._host, port=listener._port,
|
|
error=str(e)))
|
|
|
|
|
|
# vim:sw=4:ts=4:et:
|