bump_python/bump/bump.py
raphael 750f79f03a adds minimal cli for qr code and pushing
- cli generated using typer package,
  which is added to the setup.py
- if optional argument to bump is not
  passed, the current secret is visualized
- if there is an argument, it is pushed
  as a message to the current sender
- adds setup.py command line script which
  adds a call to the bump.cli:main function
  passing the cli parameters along
- updates package version to 0.1.3

- Squashed commits:
  - commit e120815378
  - commit 3a47ee56bf
  - commit aeca052cbc
  - commit 2294650daa
2022-01-16 22:31:36 +01:00

218 lines
6.2 KiB
Python

import time
import json
import random
import qrcode
import requests
import base64
import re
import os
import typer
from random_word import RandomWords
SENDER_LENGTH = 4
PASSWORD_LENGTH = 8
import secrets
from base64 import urlsafe_b64encode as b64e, urlsafe_b64decode as b64d
from cryptography.fernet import Fernet
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
r = RandomWords()
backend = default_backend()
iterations = 100_000
def _derive_key(password: bytes, salt: bytes, iterations: int = iterations) -> bytes:
"""Derive a secret key from a given password and salt"""
kdf = PBKDF2HMAC(
algorithm=hashes.SHA256(), length=32, salt=salt,
iterations=iterations, backend=backend)
return b64e(kdf.derive(password))
def password_encrypt(message: bytes, password: str, iterations: int = iterations) -> bytes:
salt = secrets.token_bytes(16)
key = _derive_key(password.encode(), salt, iterations)
return b64e(
b'%b%b%b' % (
salt,
iterations.to_bytes(4, 'big'),
b64d(Fernet(key).encrypt(message)),
)
)
def password_decrypt(token: bytes, password: str) -> bytes:
decoded = b64d(token)
salt, iter, token = decoded[:16], decoded[16:20], b64e(decoded[20:])
iterations = int.from_bytes(iter, 'big')
key = _derive_key(password.encode(), salt, iterations)
return Fernet(key).decrypt(token)
class Bump:
def __init__(self, secret=None, secrets_file=None):
if None == secrets_file:
secrets_file = os.path.join(os.path.expanduser('~'), '.config/bump/secrets_file')
self.secrets = self._load_secrets(secret, secrets_file)
if self.secrets == []:
print("you seem to not have a secret in your secrets file! Creating one now...")
self.generate_secret(secrets_file)
self.URL = "https://bump.maenle.net/api/"
def _load_secrets(self, secret, secrets_file):
try:
with open(secrets_file, 'r') as f:
secrets = f.read().splitlines()
except FileNotFoundError:
secrets = []
if secret is not None and secret not in self.secrets:
secrets.append(secret)
return secrets
def generate_secret(self, secrets_file):
pattern = re.compile('^[a-zA-Z]+$')
WORDS = r.get_random_words()
secret = ""
word_count = 0
while word_count < SENDER_LENGTH + PASSWORD_LENGTH or len(secret[SENDER_LENGTH:]) < 32:
word = random.choice(WORDS)
print(pattern.match(word))
if pattern.match(word) and len(word) < 10:
secret += word + "-"
word_count += 1
secret = secret[:-1]
self.secrets.append(secret)
if not os.path.exists(os.path.dirname(secrets_file)):
os.makedirs(os.path.dirname(secrets_file))
with open(secrets_file, 'a+') as f:
f.write(secret + '\n')
def show_secret(self):
print("Scan this QR Code with the Bump app to connect")
for secret in self.secrets:
qr = qrcode.QRCode(
version=1,
error_correction=qrcode.constants.ERROR_CORRECT_L,
box_size=10,
border=4,
)
qr.add_data(secret)
qr.print_ascii()
print("")
print(secret)
def _get_password(self, index=0):
secret = self.secrets[index].split('-')
return "-".join(secret[SENDER_LENGTH:])
def _get_sender(self, index=0):
words = self.secrets[index].split('-')
return "-".join(words[0:SENDER_LENGTH])
def _encrypt(self, data):
password = self._get_password()
return password_encrypt(data.encode(), password)
def _decrypt(self, data):
password = self._get_password()
return password_decrypt(data, password).decode()
def push(self, title='', data=''):
params = {
'sender': self._get_sender(),
'title': title,
'data': self._encrypt(data)
}
return self._set_post("push", params)
def peek(self):
return self._get_post("peek")
def pop(self):
return self._get_post("pop")
def list(self):
params = {
'minutes': 2
}
return self._get_post("list", params)
def clear(self):
return self._get_post("clear")
def delete_sender(self):
return self._set_post("delete_sender")
def _set_post(self, mechanism, add_params = None):
url = self.URL + mechanism
params = {
'sender': self._get_sender(),
}
if add_params != None:
params.update(add_params)
messages = requests.post(url, params).json()
print(messages)
def _get_post(self, mechanism, add_params = None):
url = self.URL + mechanism
params = {
'sender': self._get_sender()
}
if add_params != None:
params.update(add_params)
messages = requests.post(url, params).json()
if(messages == {} or messages == None or
"messages" in messages and messages["messages"] == []):
return [{}]
elif "messages" in messages:
for message in messages.get("messages"):
message['data'] = self._decrypt(message.get('data'))
return messages
else:
messages['data'] = self._decrypt(messages.get('data'))
return [messages]
def _load_log(self):
with open('.bump_log', "r+") as f:
return f.readlines()
def _save_log(self, message):
with open('.bump_log', "a") as f:
f.write(self._to_log_line(message))
def _to_log_line(self, message):
return json.dumps(message) + "\n"
def alert(self, sleep_time=1):
log = self._load_log()
while True:
time.sleep(sleep_time)
messages = self.list()
for message in messages:
if self._to_log_line(message) not in log and message != {}:
print(message['data'])
self._save_log(message)
log = self.load_log()