Skip to main content

Learning new things

It's important for every developer to learn new things. It's very easy to stay in your comfort zone, only take on tasks that you know exactly how to tackle and that can be very efficient as well - if there is something you're good at it makes sense to play to your strengths. The trouble is you don't gain experience without trying something new - go out of your comfort zone.

I've been wanting to try out the asyncio module in Python 3, and have also been meaning to try out Go for a long time. I've also been playing around with Xmpp - an open standard for messaging and presence, used for instant messaging systems - this seems like it might provide a good proving ground for comparing different programming languages. I know, I know, none of these are particularly new, but they're new to me.

My goal is to implement simple chat bots in both Python 3 and Go so I can compare and contrast the two. I'll cover this in several posts over the next weeks, with the full source available on GitHub. I'll write these posts in the style of tutorials - hopefully somebody out there will find them useful.

I'll start with a simple echo bot - all it does is echo back anything it receives. It's a simple feature set, but is very useful for getting started with Xmpp. A more interesting bot is what I've dubbed the jumper bot - it jumps between chat groups, saying a few phrases before moving on to the next group. The interesting bit for implementing it in Python 3 or Go is that I'll have one process running multiple bots, making use of the asynchronous features of each language.

In my next post I'll go over the steps of setting up an Xmpp server to experiment with, and start poking at it with some Python code, as preparation for starting the coding of the bots.



Comments

Popular posts from this blog

Working with Xmpp in Python

Xmpp is an open standard for messaging and presence, used for instant messaging systems. It is also used for chat systems in several games, most notably League of Legends made by Riot Games. Xmpp is an xml based protocol. Normally you work with xml documents - with Xmpp you work with a stream of xml elements, or stanzas - see https://tools.ietf.org/html/rfc3920 for the full definitions of these concepts. This has some implications on how best to work with the xml. To experiment with Xmpp, let's start by installing a chat server based on Xmpp and start interacting with it. For my purposes I've chosen Prosody - it's nice and simple to install, especially on macOS with Homebrew : brew tap prosody/prosody brew install prosody Start the server with prosodyctl - you may need to edit the configuration file (/usr/local/etc/prosody/prosody.cfg.lua on the Mac), adding entries for prosody_user and pidfile. Once the server is up and running we can start poking at it...

EchoBot

In a  previous blog  I started discussing Xmpp and showed how to set up an Xmpp server and connecting to it via Python. In this blog I will dig deeper and show how to implement a simple echo bot. The code for this lives on Github:  https://github.com/snorristurluson/xmpp-chatbot Connecting First, let's wrap the network layer. I've picked the Python 3  asyncio  for this task. Let's start by looking at  firstconnection.py . I've created a class called  FirstConnection  that inherits from  asyncio.Protocol . class FirstConnection ( asyncio . Protocol ): def __init__ ( self , host ): self .host = host self .transport = None def connect ( self ): loop = asyncio.get_event_loop() handler = loop.create_connection( lambda : self , self .host, 5222 ) loop.create_task(handler) def connection_made ( self , transport ): logger.debug( " Connection made " ) self .tra...

SSL issues in the ingame browser

EVE Online has an ingame browser, and under Wine that browser has issues with opening some websites using https. Those sites work in the game under Windows, so I knew it wasn't a browser issue per se. It wasn't an issue with all sites using https, either, so it wasn't a matter of SSL not working at all, either. With the help of CCP's security expert, we noticed that the sites that were failing had certificate chains up to a root certificate with a very strong signature algorithm, ecdsa-with-SHA384, and chances were that Wine did not support that particular algorithm. Now what? Personally I'm no expert in security algorithms, SSL or TSL or anything like that, so I wasn't sure where to even begin looking at Wine source code to see if this algorithm was supported. After some digging around I decided to look at the output of the secur32 channel: export WINEDEBUG=+secur32 Then I started up the EVE client and opened up the browser, entering https://zkillboar...