Onionr/onionr/netcontroller.py

65 lines
2.5 KiB
Python
Raw Normal View History

'''
Onionr - P2P Microblogging Platform & Social network
Netcontroller library, used to control/work with Tor/I2P and send requests through them
'''
'''
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
'''
2018-01-19 21:28:34 +00:00
import subprocess, os, random, sys
class NetController:
'''NetController
This class handles hidden service setup on Tor and I2P
'''
2018-01-19 09:16:38 +00:00
def __init__(self, hsPort):
self.torConfigLocation = 'data/torrc'
self.readyState = False
2018-01-19 21:28:34 +00:00
self.socksPort = random.randint(1024, 65535)
2018-01-19 09:16:38 +00:00
self.hsPort = hsPort
2018-01-19 21:28:34 +00:00
self.myID = ''
2018-01-19 09:16:38 +00:00
if os.path.exists(self.torConfigLocation):
torrc = open(self.torConfigLocation, 'r')
if not str(self.hsPort) in torrc.read():
2018-01-19 09:16:38 +00:00
os.remove(self.torConfigLocation)
torrc.close()
return
def generateTorrc(self):
2018-01-19 09:16:38 +00:00
if os.path.exists(self.torConfigLocation):
os.remove(self.torConfigLocation)
2018-01-20 00:59:05 +00:00
torrcData = '''SocksPort ''' + str(self.socksPort) + '''
2018-01-19 21:28:34 +00:00
HiddenServiceDir data/hs/
HiddenServicePort 80 127.0.0.1:''' + str(self.hsPort) + '''
'''
2018-01-19 09:16:38 +00:00
torrc = open(self.torConfigLocation, 'w')
torrc.write(torrcData)
torrc.close()
return
def startTor(self):
2018-01-20 00:59:05 +00:00
'''Start Tor with onion service on port 80 & socks proxy on random port
'''
2018-01-19 21:28:34 +00:00
self.generateTorrc()
tor = subprocess.Popen(['tor', '-f', self.torConfigLocation], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
2018-01-20 00:59:05 +00:00
# wait for tor to get to 100% bootstrap
2018-01-19 21:28:34 +00:00
for line in iter(tor.stdout.readline, b''):
if 'Bootstrapped 100%: Done' in line.decode():
break
2018-01-20 00:59:05 +00:00
elif 'Opening Socks listener' in line.decode():
print(line.decode())
2018-01-19 21:28:34 +00:00
print('Finished starting Tor')
self.readyState = True
myID = open('data/hs/hostname', 'r')
self.myID = myID.read()
myID.close()
return