Merge remote-tracking branch 'origin/networking' into networking
# Conflicts: # pypong/networking/gui.py # pypong/networking/host.py
This commit is contained in:
commit
38d51409b6
121
pypong/networking/client.py
Normal file
121
pypong/networking/client.py
Normal file
@ -0,0 +1,121 @@
|
|||||||
|
"""
|
||||||
|
Networking client to connect to a server and find server hosts
|
||||||
|
"""
|
||||||
|
import ipaddress
|
||||||
|
import random
|
||||||
|
|
||||||
|
import psutil
|
||||||
|
import socket
|
||||||
|
|
||||||
|
SERVER_PORT = 29987
|
||||||
|
SERVER_BUFFER = 1024
|
||||||
|
SCAN_TIMEOUT = 3
|
||||||
|
|
||||||
|
|
||||||
|
class InterfaceInfo:
|
||||||
|
"""
|
||||||
|
Class used for storing interface information to make it easier to use
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, interface_name, network):
|
||||||
|
self.interface_name = interface_name
|
||||||
|
self.network = network
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return 'Interface:{0}, Network:{1}'.format(self.interface_name, self.network)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return '(Interface:{0}, Network:{1})'.format(self.interface_name, self.network)
|
||||||
|
|
||||||
|
|
||||||
|
def request_server_info(server_ip, server_port):
|
||||||
|
"""
|
||||||
|
Request server info from a PyPong server given an IP and a port
|
||||||
|
|
||||||
|
:param server_ip: Server IP to request info from
|
||||||
|
:param server_port: Port to connect to server on
|
||||||
|
:return: response given by server (or lack thereof)
|
||||||
|
"""
|
||||||
|
request = 'PYPONGREQ;SVRINFO'
|
||||||
|
|
||||||
|
udp_client_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
||||||
|
# Timeout is set to SCAN_TIMEOUT plus a random number between 0 and SCAN_TIMEOUT so that threads can
|
||||||
|
# start asynchronously to avoid a lot of requests being sent to machines at once
|
||||||
|
# Average time is SCAN_TIMEOUT*1.5
|
||||||
|
udp_client_socket.settimeout(SCAN_TIMEOUT + (SCAN_TIMEOUT * random.random()))
|
||||||
|
try:
|
||||||
|
udp_client_socket.sendto(str.encode(request, 'UTF-8'), (server_ip, server_port))
|
||||||
|
except OSError:
|
||||||
|
pass
|
||||||
|
try:
|
||||||
|
server_response = udp_client_socket.recvfrom(SERVER_BUFFER)[0].decode('UTF-8')
|
||||||
|
except TimeoutError:
|
||||||
|
server_response = '{0};TIMEOUT'.format(server_ip)
|
||||||
|
except UnicodeDecodeError:
|
||||||
|
server_response = '{0};MANGLED_RESPONSE'.format(server_ip)
|
||||||
|
|
||||||
|
udp_client_socket.close()
|
||||||
|
return server_response
|
||||||
|
|
||||||
|
|
||||||
|
def get_interface_info():
|
||||||
|
"""
|
||||||
|
Gets information using psutil about the current machine's interfaces and their networks. This only works for IPv4
|
||||||
|
networks and will not return any data in regard to IPv6 links.
|
||||||
|
|
||||||
|
:return: List of InterfaceInfo objects containing information about all interfaces on the current machine excluding
|
||||||
|
the loopback interface (lo or 127.0.0.1)
|
||||||
|
"""
|
||||||
|
raw_interface_data = psutil.net_if_addrs()
|
||||||
|
interface_data = []
|
||||||
|
|
||||||
|
for interface in raw_interface_data:
|
||||||
|
# Extract needed information from psutil and put it into a InterfaceInfo object
|
||||||
|
address = (raw_interface_data.get(interface)[0]).address
|
||||||
|
cidr_suffix = ipaddress.IPv4Network('{0}/{1}'.format(address, raw_interface_data.get(interface)[0].netmask),
|
||||||
|
strict=False).prefixlen
|
||||||
|
|
||||||
|
# Do not add the loopback interface or IPv6 interfaces
|
||||||
|
if ':' not in address and address != '127.0.0.1':
|
||||||
|
interface_data.append(InterfaceInfo(interface, '{0}/{1}'.format(address, cidr_suffix)))
|
||||||
|
return interface_data
|
||||||
|
|
||||||
|
|
||||||
|
def get_ips_from_network(network):
|
||||||
|
"""
|
||||||
|
Generate a list of IP addresses given an address in CIDR notation. This works from smallest to largest, meaning that
|
||||||
|
it builds a list starting at <ADDRESS>/32 (aka just the current machine) decrementing the CIDR by 1 until the
|
||||||
|
correct subnet is reached.
|
||||||
|
|
||||||
|
:param network:
|
||||||
|
:return:
|
||||||
|
"""
|
||||||
|
network_split = network.split('/')
|
||||||
|
address = network_split[0]
|
||||||
|
cidr = int(network_split[1])
|
||||||
|
all_addresses = []
|
||||||
|
|
||||||
|
test_cidr = 32 # Start with the machine itself
|
||||||
|
while test_cidr >= cidr:
|
||||||
|
# Generate all addresses inside the current subnet given by 'address/test_cidr'
|
||||||
|
current_addresses = [str(ip) for ip in ipaddress.IPv4Network('{0}/{1}'.format(address, test_cidr),
|
||||||
|
strict=False)]
|
||||||
|
|
||||||
|
# Do not add the address again if it is already in the list of all addresses
|
||||||
|
for test_address in current_addresses:
|
||||||
|
if test_address not in all_addresses:
|
||||||
|
all_addresses.append(test_address)
|
||||||
|
test_cidr -= 1
|
||||||
|
|
||||||
|
return all_addresses
|
||||||
|
|
||||||
|
|
||||||
|
def check_ip(ip_address):
|
||||||
|
"""
|
||||||
|
Check a single IP address for a running game server
|
||||||
|
|
||||||
|
:param ip_address: IP address to check
|
||||||
|
:return: response of the server (or timeout if none)
|
||||||
|
"""
|
||||||
|
response = request_server_info(ip_address, SERVER_PORT)
|
||||||
|
return response
|
36
pypong/networking/packet.py
Normal file
36
pypong/networking/packet.py
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
"""
|
||||||
|
Contains the Packet class to help with the transmission, reading, and verification of infermation over the network
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
class Packet:
|
||||||
|
"""
|
||||||
|
Class that contains information to be sent over the network. Can self-verify and has methods (will have methods) to
|
||||||
|
easily encode and decode packet information
|
||||||
|
"""
|
||||||
|
VALID_HEADERS = [
|
||||||
|
'PYPONGREQ',
|
||||||
|
'PYPONGRST'
|
||||||
|
]
|
||||||
|
VALID_TYPES = [
|
||||||
|
'SVRINFO'
|
||||||
|
]
|
||||||
|
|
||||||
|
def __init__(self, header, msg_type, *message):
|
||||||
|
self.header = header
|
||||||
|
self.msg_type = msg_type
|
||||||
|
self.message = []
|
||||||
|
for x in message:
|
||||||
|
self.message.append(x)
|
||||||
|
|
||||||
|
def integrity_check(self):
|
||||||
|
"""
|
||||||
|
Verify that the information in the packet is correct and makes sense
|
||||||
|
|
||||||
|
:return: True if packet verifies correctly, False if not
|
||||||
|
"""
|
||||||
|
if self.header not in Packet.VALID_HEADERS:
|
||||||
|
return False
|
||||||
|
if self.msg_type not in Packet.VALID_TYPES:
|
||||||
|
return False
|
||||||
|
return True
|
Loading…
Reference in New Issue
Block a user