Skip to content

Commit b10f174

Browse files
committed
add vonage wrapper code
1 parent 678e6e7 commit b10f174

11 files changed

+240
-48
lines changed

.gitignore

+3
Original file line numberDiff line numberDiff line change
@@ -55,3 +55,6 @@ env/
5555

5656
# Pyenv
5757
.python-version
58+
59+
# Credentials
60+
credentials/

CHANGES.md

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
# Release 3.11.0
2+
- OpenTok SDK now accepts Vonage credentials so it's possible to use the existing SDK with the Vonage Video API.
3+
14
# Release 3.10.0
25
- Add new `max_bitrate` option for archives
36
- Change to create JWTs by default in the `Client.generate_token` method. T1 tokens can still be created by setting `use_jwt=False` when generating a token.

Makefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ clean:
44
rm -rf dist build
55

66
coverage:
7-
pytest -v --cov
7+
pytest -v --cov=opentok
88
coverage html
99

1010
test:

opentok/opentok.py

+104-38
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
from datetime import datetime # generate_token
2+
import re
23
from typing import List, Optional # imports List, Optional type hint
34
import calendar # generate_token
45
import base64 # generate_token
@@ -7,6 +8,7 @@
78
import hmac # _sign_string
89
import hashlib
910
from typing import List
11+
import uuid
1012
import requests # create_session, archiving
1113
import json # archiving
1214
import platform # user-agent
@@ -19,7 +21,7 @@
1921

2022

2123
# compat
22-
from six.moves.urllib.parse import urlencode
24+
from urllib.parse import urlencode
2325
from six import text_type, u, b, PY3
2426
from enum import Enum
2527

@@ -111,6 +113,11 @@ class ArchiveModes(Enum):
111113
class Client(object):
112114
"""Use this SDK to create tokens and interface with the server-side portion
113115
of the Opentok API.
116+
117+
You can also interact with this client object with Vonage credentials. Instead of passing
118+
on OpenTok API key and secret, you can pass in a Vonage application ID and private key,
119+
e.g. api_key=VONAGE_APPLICATION_ID, api_secret=VONAGE_PRIVATE_KEY. You do not need to set the API
120+
URL differently, the SDK will set this for you.
114121
"""
115122

116123
TOKEN_SENTINEL = "T1=="
@@ -124,11 +131,25 @@ def __init__(
124131
timeout=None,
125132
app_version=None,
126133
):
134+
135+
if isinstance(api_secret, (str, bytes)) and re.search(
136+
"[.][a-zA-Z0-9_]+$", api_secret
137+
):
138+
# We have a private key so we assume we are using Vonage credentials
139+
self._using_vonage = True
140+
self._api_url = 'https://video.api.vonage.com'
141+
with open(api_secret, "rb") as key_file:
142+
self.api_secret = key_file.read()
143+
else:
144+
# We are using OpenTok credentials
145+
self._using_vonage = False
146+
self.api_secret = api_secret
147+
self._api_url = api_url
148+
127149
self.api_key = str(api_key)
128-
self.api_secret = api_secret
129150
self.timeout = timeout
130151
self._proxies = None
131-
self.endpoints = Endpoints(api_url, self.api_key)
152+
self.endpoints = Endpoints(self._api_url, self.api_key)
132153
self._app_version = __version__ if app_version == None else app_version
133154
self._user_agent = (
134155
f"OpenTok-Python-SDK/{self.app_version} python/{platform.python_version()}"
@@ -306,24 +327,41 @@ def generate_token(
306327

307328
if use_jwt:
308329
payload = {}
309-
payload['iss'] = self.api_key
310-
payload['ist'] = 'project'
330+
331+
payload['session_id'] = session_id
332+
payload['role'] = role.value
311333
payload['iat'] = now
312334
payload["exp"] = expire_time
313-
payload['nonce'] = random.randint(0, 999999)
314-
payload['role'] = role.value
315335
payload['scope'] = 'session.connect'
316-
payload['session_id'] = session_id
336+
317337
if initial_layout_class_list:
318338
payload['initial_layout_class_list'] = (
319339
initial_layout_class_list_serialized
320340
)
321341
if data:
322342
payload['connection_data'] = data
323343

324-
headers = {'alg': 'HS256', 'typ': 'JWT'}
344+
if not self._using_vonage:
345+
payload['iss'] = self.api_key
346+
payload['ist'] = 'project'
347+
payload['nonce'] = random.randint(0, 999999)
348+
349+
headers = {'alg': 'HS256', 'typ': 'JWT'}
325350

326-
token = encode(payload, self.api_secret, algorithm="HS256", headers=headers)
351+
token = encode(
352+
payload, self.api_secret, algorithm="HS256", headers=headers
353+
)
354+
else:
355+
payload['application_id'] = self.api_key
356+
payload['jti'] = str(uuid.uuid4())
357+
payload['subject'] = 'video'
358+
payload['acl'] = {'paths': {'/session/**': {}}}
359+
360+
headers = {'alg': 'RS256', 'typ': 'JWT'}
361+
362+
token = encode(
363+
payload, self.api_secret, algorithm="RS256", headers=headers
364+
)
327365

328366
return token
329367

@@ -500,39 +538,54 @@ def create_session(
500538
"POST to %r with params %r, headers %r, proxies %r",
501539
self.endpoints.get_session_url(),
502540
options,
503-
self.get_headers(),
541+
self.get_json_headers(),
504542
self.proxies,
505543
)
506-
response = requests.post(
507-
self.endpoints.get_session_url(),
508-
data=options,
509-
headers=self.get_headers(),
510-
proxies=self.proxies,
511-
timeout=self.timeout,
512-
)
544+
if not self._using_vonage:
545+
response = requests.post(
546+
self.endpoints.get_session_url(),
547+
data=options,
548+
headers=self.get_headers(),
549+
proxies=self.proxies,
550+
timeout=self.timeout,
551+
)
552+
else:
553+
headers = self.get_headers()
554+
headers['Accept'] = 'application/json'
555+
response = requests.post(
556+
self.endpoints.get_session_url(),
557+
data=options,
558+
headers=headers,
559+
proxies=self.proxies,
560+
timeout=self.timeout,
561+
)
513562
response.encoding = "utf-8"
514-
515563
if response.status_code == 403:
516564
raise AuthError("Failed to create session, invalid credentials")
517565
if not response.content:
518566
raise RequestError()
519-
dom = xmldom.parseString(response.content.decode("utf-8"))
520567
except Exception as e:
521568
raise RequestError("Failed to create session: %s" % str(e))
522569

523570
try:
524-
error = dom.getElementsByTagName("error")
525-
if error:
526-
error = error[0]
527-
raise AuthError(
528-
"Failed to create session (code=%s): %s"
529-
% (
530-
error.attributes["code"].value,
531-
error.firstChild.attributes["message"].value,
571+
content_type = response.headers["Content-Type"]
572+
if content_type != "application/json":
573+
dom = xmldom.parseString(response.content.decode("utf-8"))
574+
error = dom.getElementsByTagName("error")
575+
if error:
576+
error = error[0]
577+
raise AuthError(
578+
"Failed to create session (code=%s): %s"
579+
% (
580+
error.attributes["code"].value,
581+
error.firstChild.attributes["message"].value,
582+
)
532583
)
584+
session_id = (
585+
dom.getElementsByTagName("session_id")[0].childNodes[0].nodeValue
533586
)
534-
535-
session_id = dom.getElementsByTagName("session_id")[0].childNodes[0].nodeValue
587+
else:
588+
session_id = response.json()[0]["session_id"]
536589
return Session(
537590
self,
538591
session_id,
@@ -546,12 +599,18 @@ def create_session(
546599

547600
def get_headers(self):
548601
"""For internal use."""
602+
if not self._using_vonage:
603+
return {
604+
"User-Agent": "OpenTok-Python-SDK/"
605+
+ self.app_version
606+
+ " python/"
607+
+ platform.python_version(),
608+
"X-OPENTOK-AUTH": self._create_jwt_auth_header(),
609+
}
549610
return {
550-
"User-Agent": "OpenTok-Python-SDK/"
551-
+ self.app_version
552-
+ " python/"
553-
+ platform.python_version(),
554-
"X-OPENTOK-AUTH": self._create_jwt_auth_header(),
611+
"User-Agent": self.user_agent + " OpenTok-With-Vonage-API-Backend",
612+
"Authorization": "Bearer " + self._create_jwt_auth_header(),
613+
"Accept": "application/json",
555614
}
556615

557616
def headers(self):
@@ -2090,14 +2149,21 @@ def _sign_string(self, string, secret):
20902149
def _create_jwt_auth_header(self):
20912150
payload = {
20922151
"ist": "project",
2093-
"iss": self.api_key,
20942152
"iat": int(time.time()), # current time in unix time (seconds)
20952153
"exp": int(time.time())
20962154
+ (60 * self._jwt_livetime), # 3 minutes in the future (seconds)
2097-
"jti": "{0}".format(0, random.random()),
20982155
}
20992156

2100-
return encode(payload, self.api_secret, algorithm="HS256")
2157+
if not self._using_vonage:
2158+
payload["iss"] = self.api_key
2159+
payload["jti"] = str(random.random())
2160+
return encode(payload, self.api_secret, algorithm="HS256")
2161+
2162+
payload["application_id"] = self.api_key
2163+
payload["jti"] = str(uuid.uuid4())
2164+
headers = {"typ": "JWT", "alg": "RS256"}
2165+
2166+
return encode(payload, self.api_secret, algorithm='RS256', headers=headers)
21012167

21022168
def mute_all(
21032169
self, session_id: str, excludedStreamIds: Optional[List[str]]

tests/fake_data/dummy_private_key.txt

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
-----BEGIN PRIVATE KEY-----
2+
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDQdAHqJHs/a+Ra
3+
2ubvSd1vz/aWlJ9BqnMUtB7guTlyggdENAbleIkzep6mUHepDJdQh8Qv6zS3lpUe
4+
K0UkDfr1/FvsvxurGw/YYPagUEhP/HxMbs2rnQTiAdWOT+Ux9vPABoyNYvZB90xN
5+
IVhBDRWgkz1HPQBRNjFcm3NOol83h5Uwp5YroGTWx+rpmIiRhQj3mv6luk102d95
6+
4ulpPpzcYWKIpJNdclJrEkBZaghDZTOpbv79qd+ds9AVp1j8i9cG/owBJpsJWxfw
7+
StMDpNeEZqopeQWmA121sSEsxpAbKJ5DA7F/lmckx74sulKHX1fDWT76cRhloaEQ
8+
VmETdj0VAgMBAAECggEAZ+SBtchz8vKbsBqtAbM/XcR5Iqi1TR2eWMHDJ/65HpSm
9+
+XuyujjerN0e6EZvtT4Uxmq8QaPJNP0kmhI31hXvsB0UVcUUDa4hshb1pIYO3Gq7
10+
Kr8I29EZB2mhndm9Ii9yYhEBiVA66zrNeR225kkWr97iqjhBibhoVr8Vc6oiqcIP
11+
nFy5zSFtQSkhucaPge6rW00JSOD3wg2GM+rgS6r22t8YmqTzAwvwfil5pQfUngal
12+
oywqLOf6CUYXPBleJc1KgaIIP/cSvqh6b/t25o2VXnI4rpRhtleORvYBbH6K6xLa
13+
OWgg6B58T+0/QEqtZIAn4miYtVCkYLB78Ormc7Q9ewKBgQDuSytuYqxdZh/L/RDU
14+
CErFcNO5I1e9fkLAs5dQEBvvdQC74+oA1MsDEVv0xehFa1JwPKSepmvB2UznZg9L
15+
CtR7QKMDZWvS5xx4j0E/b+PiNQ/tlcFZB2UZ0JwviSxdd7omOTscq9c3RIhFHar1
16+
Y38Fixkfm44Ij/K3JqIi2v2QMwKBgQDf8TYOOmAr9UuipUDxMsRSqTGVIY8B+aEJ
17+
W+2aLrqJVkLGTRfrbjzXWYo3+n7kNJjFgNkltDq6HYtufHMYRs/0PPtNR0w0cDPS
18+
Xr7m2LNHTDcBalC/AS4yKZJLNLm+kXA84vkw4qiTjc0LSFxJkouTQzkea0l8EWHt
19+
zRMv/qYVlwKBgBaJOWRJJK/4lo0+M7c5yYh+sSdTNlsPc9Sxp1/FBj9RO26JkXne
20+
pgx2OdIeXWcjTTqcIZ13c71zhZhkyJF6RroZVNFfaCEcBk9IjQ0o0c504jq/7Pc0
21+
gdU9K2g7etykFBDFXNfLUKFDc/fFZIOskzi8/PVGStp4cqXrm23cdBqNAoGBAKtf
22+
A2bP9ViuVjsZCyGJIAPBxlfBXpa8WSe4WZNrvwPqJx9pT6yyp4yE0OkVoJUyStaZ
23+
S5M24NocUd8zDUC+r9TP9d+leAOI+Z87MgumOUuOX2mN2kzQsnFgrrsulhXnZmSx
24+
rNBkI20HTqobrcP/iSAgiU1l/M4c3zwDe3N3A9HxAoGBAM2hYu0Ij6htSNgo/WWr
25+
IEYYXuwf8hPkiuwzlaiWhD3eocgd4S8SsBu/bTCY19hQ2QbBPaYyFlNem+ynQyXx
26+
IOacrgIHCrYnRCxjPfFF/MxgUHJb8ZoiexprP/FME5p0PoRQIEFYa+jVht3hT5wC
27+
9aedWufq4JJb+akO6MVUjTvs
28+
-----END PRIVATE KEY-----

tests/fake_data/dummy_public_key.txt

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
-----BEGIN PUBLIC KEY-----
2+
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0HQB6iR7P2vkWtrm70nd
3+
b8/2lpSfQapzFLQe4Lk5coIHRDQG5XiJM3qeplB3qQyXUIfEL+s0t5aVHitFJA36
4+
9fxb7L8bqxsP2GD2oFBIT/x8TG7Nq50E4gHVjk/lMfbzwAaMjWL2QfdMTSFYQQ0V
5+
oJM9Rz0AUTYxXJtzTqJfN4eVMKeWK6Bk1sfq6ZiIkYUI95r+pbpNdNnfeeLpaT6c
6+
3GFiiKSTXXJSaxJAWWoIQ2UzqW7+/anfnbPQFadY/IvXBv6MASabCVsX8ErTA6TX
7+
hGaqKXkFpgNdtbEhLMaQGyieQwOxf5ZnJMe+LLpSh19Xw1k++nEYZaGhEFZhE3Y9
8+
FQIDAQAB
9+
-----END PUBLIC KEY-----

tests/helpers.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def token_decoder(token: str, secret: str = None):
2626
return token_data
2727

2828
encoded = token.replace('Bearer ', '').strip()
29-
return decode(encoded, secret, algorithms='HS256')
29+
return decode(encoded, secret, algorithms=['HS256', 'RS256'])
3030

3131

3232
def token_signature_validator(token, secret):

tests/test_session_creation.py

+75-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
1+
from time import time
2+
from jwt import decode
13
import pytest
24
import unittest
35
from six import u, b
4-
from six.moves.urllib.parse import parse_qs
6+
from urllib.parse import parse_qs
57
from expects import *
68
import httpretty
79
from .validate_jwt import validate_jwt_header
@@ -62,6 +64,78 @@ def test_create_default_session(self):
6264
expect(session).to(have_property(u("location"), None))
6365
expect(session).to(have_property(u("e2ee"), False))
6466

67+
@httpretty.activate
68+
def test_create_default_vonage_session(self):
69+
httpretty.register_uri(
70+
httpretty.POST,
71+
u("https://video.api.vonage.com/session/create"),
72+
body="""
73+
[
74+
{
75+
"session_id": "1_MX4yOWY3NjBmOC03Y2UxLTQ2YzktYWRlMy1mMmRlZGVlNGVkNWZ-fjE3MjY0NjI1ODg2NDd-MTF4TGExYmJoelBlR1FHbVhzbWd4STBrfn5-",
76+
"project_id": "29f760f8-7ce1-46c9-ade3-f2dedee4ed5f",
77+
"partner_id": "29f760f8-7ce1-46c9-ade3-f2dedee4ed5f",
78+
"create_dt": "Sun Sep 15 21:56:28 PDT 2024",
79+
"session_status": null,
80+
"status_invalid": null,
81+
"media_server_hostname": null,
82+
"messaging_server_url": null,
83+
"messaging_url": null,
84+
"symphony_address": null,
85+
"properties": null,
86+
"ice_server": null,
87+
"session_segment_id": "35308566-4012-4c1e-90f7-cc15b5a390fe",
88+
"ice_servers": null,
89+
"ice_credential_expiration": 86100
90+
}
91+
]""",
92+
status=200,
93+
content_type="application/json",
94+
)
95+
96+
self.api_secret = './tests/fake_data/dummy_private_key.txt'
97+
vonage_wrapper = Client(self.api_key, self.api_secret)
98+
session = vonage_wrapper.create_session()
99+
100+
public_key = ""
101+
with open('./tests/fake_data/dummy_public_key.txt', 'r') as file:
102+
public_key = file.read()
103+
104+
decoded_jwt = decode(
105+
httpretty.last_request().headers[u("Authorization")].split(None, 1)[1],
106+
public_key,
107+
algorithms=["RS256"],
108+
)
109+
110+
expect(decoded_jwt["application_id"]).to(equal(vonage_wrapper.api_key))
111+
expect(decoded_jwt["ist"]).to(equal("project"))
112+
expect(decoded_jwt["exp"]).to(be_above(time()))
113+
114+
expect(httpretty.last_request().headers[u("user-agent")]).to(
115+
equal(
116+
u("OpenTok-Python-SDK/")
117+
+ __version__
118+
+ " python/"
119+
+ platform.python_version()
120+
+ " OpenTok-With-Vonage-API-Backend"
121+
)
122+
)
123+
body = parse_qs(httpretty.last_request().body)
124+
expect(body).to(have_key(b("p2p.preference"), [b("enabled")]))
125+
expect(body).to(have_key(b("archiveMode"), [b("manual")]))
126+
expect(session).to(be_a(Session))
127+
expect(session).to(
128+
have_property(
129+
u("session_id"),
130+
u(
131+
"1_MX4yOWY3NjBmOC03Y2UxLTQ2YzktYWRlMy1mMmRlZGVlNGVkNWZ-fjE3MjY0NjI1ODg2NDd-MTF4TGExYmJoelBlR1FHbVhzbWd4STBrfn5-"
132+
),
133+
)
134+
)
135+
expect(session).to(have_property(u("media_mode"), MediaModes.relayed))
136+
expect(session).to(have_property(u("location"), None))
137+
expect(session).to(have_property(u("e2ee"), False))
138+
65139
@httpretty.activate
66140
def test_create_routed_session(self):
67141
httpretty.register_uri(

0 commit comments

Comments
 (0)