import json import os import threading from typing import Optional from platypush.backend import Backend from platypush.config import Config from platypush.context import get_plugin from platypush.message import Message from platypush.message.event.mqtt import MQTTMessageEvent from platypush.message.request import Request from platypush.plugins.mqtt import MqttPlugin as MQTTPlugin from platypush.utils import set_thread_name class MqttBackend(Backend): """ Backend that reads messages from a configured MQTT topic (default: ``platypush_bus_mq/``) and posts them to the application bus. Triggers: * :class:`platypush.message.event.mqtt.MQTTMessageEvent` when a new message is received on one of the custom listeners Requires: * **paho-mqtt** (``pip install paho-mqtt``) """ _default_mqtt_port = 1883 def __init__(self, host: Optional[str] = None, port: int = _default_mqtt_port, topic='platypush_bus_mq', subscribe_default_topic: bool = True, tls_cafile: Optional[str] = None, tls_certfile: Optional[str] = None, tls_keyfile: Optional[str] = None, tls_version: Optional[str] = None, tls_ciphers: Optional[str] = None, tls_insecure: bool = False, username: Optional[str] = None, password: Optional[str] = None, client_id: Optional[str] = None, listeners=None, *args, **kwargs): """ :param host: MQTT broker host. If no host configuration is specified then the backend will use the host configuration specified on the ``mqtt`` plugin if it's available. :param port: MQTT broker port (default: 1883) :param topic: Topic to read messages from (default: ``platypush_bus_mq/``) :param subscribe_default_topic: Whether the backend should subscribe the default topic (default: ``platypush_bus_mq/``) and execute the messages received there as action requests (default: True). :param tls_cafile: If TLS/SSL is enabled on the MQTT server and the certificate requires a certificate authority to authenticate it, `ssl_cafile` will point to the provided ca.crt file (default: None) :param tls_certfile: If TLS/SSL is enabled on the MQTT server and a client certificate it required, specify it here (default: None) :param tls_keyfile: If TLS/SSL is enabled on the MQTT server and a client certificate key it required, specify it here (default: None) :type tls_keyfile: str :param tls_version: If TLS/SSL is enabled on the MQTT server and it requires a certain TLS version, specify it here (default: None). Supported versions: ``tls`` (automatic), ``tlsv1``, ``tlsv1.1``, ``tlsv1.2``. :param tls_ciphers: If TLS/SSL is enabled on the MQTT server and an explicit list of supported ciphers is required, specify it here (default: None) :param tls_insecure: Set to True to ignore TLS insecure warnings (default: False). :param username: Specify it if the MQTT server requires authentication (default: None) :param password: Specify it if the MQTT server requires authentication (default: None) :param client_id: ID used to identify the client on the MQTT server (default: None). If None is specified then ``Config.get('device_id')`` will be used. :param listeners: If specified then the MQTT backend will also listen for messages on the additional configured message queues. This parameter is a list of maps where each item supports the same arguments passed to the main backend configuration (host, port, topic, password etc.). Note that the message queue configured on the main configuration will expect valid Platypush messages that then can execute, while message queues registered to the listeners will accept any message. Example:: listeners: - host: localhost topics: - topic1 - topic2 - topic3 - host: sensors topics: - topic4 - topic5 """ super().__init__(*args, **kwargs) if host: self.host = host self.port = port self.tls_cafile = self._expandpath(tls_cafile) if tls_cafile else None self.tls_certfile = self._expandpath(tls_certfile) if tls_certfile else None self.tls_keyfile = self._expandpath(tls_keyfile) if tls_keyfile else None self.tls_version = MQTTPlugin.get_tls_version(tls_version) self.tls_ciphers = tls_ciphers self.tls_insecure = tls_insecure self.username = username self.password = password self.client_id = client_id or Config.get('device_id') else: client = get_plugin('mqtt') assert client.host, 'No host specified on backend.mqtt nor mqtt configuration' self.host = client.host self.port = client.port self.tls_cafile = client.tls_cafile self.tls_certfile = client.tls_certfile self.tls_keyfile = client.tls_keyfile self.tls_version = client.tls_version self.tls_ciphers = client.tls_ciphers self.tls_insecure = client.tls_insecure self.username = client.username self.password = client.password self.client_id = client_id or client.client_id self.topic = '{}/{}'.format(topic, self.device_id) self.subscribe_default_topic = subscribe_default_topic self._client = None self._listeners = [] self.listeners_conf = listeners or [] def send_message(self, msg, topic: Optional[str] = None, **kwargs): try: client = get_plugin('mqtt') client.send_message(topic=topic or self.topic, msg=msg, host=self.host, port=self.port, username=self.username, password=self.password, tls_cafile=self.tls_cafile, tls_certfile=self.tls_certfile, tls_keyfile=self.tls_keyfile, tls_version=self.tls_version, tls_insecure=self.tls_insecure, tls_ciphers=self.tls_ciphers, client_id=self.client_id, **kwargs) except Exception as e: self.logger.exception(e) @staticmethod def on_connect(*topics): # noinspection PyUnusedLocal def handler(client, userdata, flags, rc): for topic in topics: client.subscribe(topic) return handler def on_mqtt_message(self): def handler(client, _, msg): data = msg.payload # noinspection PyBroadException try: data = data.decode('utf-8') data = json.loads(data) except: pass # noinspection PyProtectedMember self.bus.post(MQTTMessageEvent(host=client._host, port=client._port, topic=msg.topic, msg=data)) return handler @staticmethod def _expandpath(path: str) -> str: return os.path.abspath(os.path.expanduser(path)) if path else path def _initialize_listeners(self, listeners_conf): import paho.mqtt.client as mqtt def listener_thread(client_, host, port): client_.connect(host, port) client_.loop_forever() # noinspection PyShadowingNames,PyUnusedLocal for i, listener in enumerate(listeners_conf): host = listener.get('host') if host: port = listener.get('port', self._default_mqtt_port) topics = listener.get('topics') username = listener.get('username') password = listener.get('password') tls_cafile = self._expandpath(listener.get('tls_cafile')) tls_certfile = self._expandpath(listener.get('tls_certfile')) tls_keyfile = self._expandpath(listener.get('tls_keyfile')) tls_version = MQTTPlugin.get_tls_version(listener.get('tls_version')) tls_ciphers = listener.get('tls_ciphers') tls_insecure = listener.get('tls_insecure') else: host = self.host port = self.port username = self.username password = self.password tls_cafile = self.tls_cafile tls_certfile = self.tls_certfile tls_keyfile = self.tls_keyfile tls_version = self.tls_keyfile tls_ciphers = self.tls_ciphers tls_insecure = self.tls_insecure topics = listener.get('topics') if not topics: self.logger.warning('No list of topics specified for listener n.{}'.format(i+1)) continue client = mqtt.Client() client.on_connect = self.on_connect(*topics) client.on_message = self.on_mqtt_message() if username and password: client.username_pw_set(username, password) if tls_cafile: client.tls_set(ca_certs=tls_cafile, certfile=tls_certfile, keyfile=tls_keyfile, tls_version=tls_version, ciphers=tls_ciphers) client.tls_insecure_set(tls_insecure) threading.Thread(target=listener_thread, kwargs={ 'client_': client, 'host': host, 'port': port}).start() def on_exec_message(self): def handler(_, __, msg): # noinspection PyShadowingNames def response_thread(msg): set_thread_name('MQTTProcessor') response = self.get_message_response(msg) if not response: return response_topic = '{}/responses/{}'.format(self.topic, msg.id) self.logger.info('Processing response on the MQTT topic {}: {}'. format(response_topic, response)) self.send_message(response) msg = msg.payload.decode('utf-8') # noinspection PyBroadException try: msg = json.loads(msg) msg = Message.build(msg) except: pass if not msg: return self.logger.info('Received message on the MQTT backend: {}'.format(msg)) try: self.on_message(msg) except Exception as e: self.logger.exception(e) return if isinstance(msg, Request): threading.Thread(target=response_thread, name='MQTTProcessor', args=(msg,)).start() return handler def run(self): import paho.mqtt.client as mqtt super().run() self._client = None if self.host: self._client = mqtt.Client(self.client_id) if self.subscribe_default_topic: self._client.on_connect = self.on_connect(self.topic) self._client.on_message = self.on_exec_message() if self.username and self.password: self._client.username_pw_set(self.username, self.password) if self.tls_cafile: self._client.tls_set(ca_certs=self.tls_cafile, certfile=self.tls_certfile, keyfile=self.tls_keyfile, tls_version=self.tls_version, ciphers=self.tls_ciphers) self._client.tls_insecure_set(self.tls_insecure) self._client.connect(self.host, self.port, 60) self.logger.info('Initialized MQTT backend on host {}:{}, topic {}'. format(self.host, self.port, self.topic)) self._initialize_listeners(self.listeners_conf) if self._client: self._client.loop_forever() def stop(self): self.logger.info('Received STOP event on MqttBackend') if self._client: self._client.disconnect() self._client.loop_stop() self._client = None for listener in self._listeners: try: listener.loop_stop() except Exception as e: # noinspection PyProtectedMember self.logger.warning('Could not stop listener {host}:{port}: {error}'.format( host=listener._host, port=listener._port, error=str(e))) # vim:sw=4:ts=4:et: