2018-01-18 23:25:10 +00:00
|
|
|
'''
|
|
|
|
Onionr - P2P Microblogging Platform & Social network
|
|
|
|
|
|
|
|
Netcontroller library, used to control/work with Tor/I2P and send requests through them
|
|
|
|
'''
|
|
|
|
'''
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
'''
|
2018-01-27 08:43:36 +00:00
|
|
|
import subprocess, os, random, sys, logger, time, signal
|
2018-01-18 23:25:10 +00:00
|
|
|
class NetController:
|
|
|
|
'''NetController
|
|
|
|
This class handles hidden service setup on Tor and I2P
|
|
|
|
'''
|
2018-01-19 09:16:38 +00:00
|
|
|
def __init__(self, hsPort):
|
2018-01-18 23:25:10 +00:00
|
|
|
self.torConfigLocation = 'data/torrc'
|
|
|
|
self.readyState = False
|
2018-01-19 21:28:34 +00:00
|
|
|
self.socksPort = random.randint(1024, 65535)
|
2018-01-19 09:16:38 +00:00
|
|
|
self.hsPort = hsPort
|
2018-01-27 08:43:36 +00:00
|
|
|
self._torInstnace = ''
|
2018-01-19 21:28:34 +00:00
|
|
|
self.myID = ''
|
2018-01-27 03:42:20 +00:00
|
|
|
'''
|
2018-01-19 09:16:38 +00:00
|
|
|
if os.path.exists(self.torConfigLocation):
|
|
|
|
torrc = open(self.torConfigLocation, 'r')
|
2018-01-20 18:06:25 +00:00
|
|
|
if not str(self.hsPort) in torrc.read():
|
2018-01-19 09:16:38 +00:00
|
|
|
os.remove(self.torConfigLocation)
|
2018-01-20 18:06:25 +00:00
|
|
|
torrc.close()
|
2018-01-27 03:42:20 +00:00
|
|
|
'''
|
2018-01-18 23:25:10 +00:00
|
|
|
return
|
|
|
|
def generateTorrc(self):
|
2018-01-19 09:16:38 +00:00
|
|
|
if os.path.exists(self.torConfigLocation):
|
|
|
|
os.remove(self.torConfigLocation)
|
2018-01-20 00:59:05 +00:00
|
|
|
torrcData = '''SocksPort ''' + str(self.socksPort) + '''
|
2018-01-19 21:28:34 +00:00
|
|
|
HiddenServiceDir data/hs/
|
|
|
|
HiddenServicePort 80 127.0.0.1:''' + str(self.hsPort) + '''
|
2018-01-18 23:25:10 +00:00
|
|
|
'''
|
2018-01-19 09:16:38 +00:00
|
|
|
torrc = open(self.torConfigLocation, 'w')
|
|
|
|
torrc.write(torrcData)
|
|
|
|
torrc.close()
|
2018-01-18 23:25:10 +00:00
|
|
|
return
|
|
|
|
|
|
|
|
def startTor(self):
|
2018-01-20 00:59:05 +00:00
|
|
|
'''Start Tor with onion service on port 80 & socks proxy on random port
|
|
|
|
'''
|
2018-01-19 21:28:34 +00:00
|
|
|
self.generateTorrc()
|
|
|
|
tor = subprocess.Popen(['tor', '-f', self.torConfigLocation], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
2018-01-20 00:59:05 +00:00
|
|
|
# wait for tor to get to 100% bootstrap
|
2018-01-19 21:28:34 +00:00
|
|
|
for line in iter(tor.stdout.readline, b''):
|
|
|
|
if 'Bootstrapped 100%: Done' in line.decode():
|
|
|
|
break
|
2018-01-20 00:59:05 +00:00
|
|
|
elif 'Opening Socks listener' in line.decode():
|
2018-01-26 07:22:48 +00:00
|
|
|
logger.debug(line.decode())
|
2018-01-27 03:42:20 +00:00
|
|
|
else:
|
|
|
|
logger.error('Failed to start Tor')
|
2018-01-26 07:22:48 +00:00
|
|
|
logger.info('Finished starting Tor')
|
2018-01-19 21:28:34 +00:00
|
|
|
self.readyState = True
|
|
|
|
myID = open('data/hs/hostname', 'r')
|
|
|
|
self.myID = myID.read()
|
|
|
|
myID.close()
|
2018-01-27 08:43:36 +00:00
|
|
|
torPidFile = open('data/torPid.txt', 'w')
|
|
|
|
torPidFile.write(str(tor.pid))
|
|
|
|
torPidFile.close()
|
2018-01-26 07:22:48 +00:00
|
|
|
return
|
2018-01-27 08:43:36 +00:00
|
|
|
def killTor(self):
|
|
|
|
try:
|
|
|
|
pid = open('data/torPid.txt', 'r')
|
|
|
|
pidN = pid.read()
|
|
|
|
pid.close()
|
|
|
|
except FileNotFoundError:
|
|
|
|
return
|
|
|
|
try:
|
|
|
|
int(pidN)
|
|
|
|
except:
|
|
|
|
return
|
|
|
|
os.kill(int(pidN), signal.SIGTERM)
|
|
|
|
os.remove('data/torPid.txt')
|