''' Onionr - P2P Microblogging Platform & Social network Netcontroller library, used to control/work with Tor/I2P and send requests through them ''' ''' This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . ''' import subprocess, os, random, sys, logger, time, signal class NetController: '''NetController This class handles hidden service setup on Tor and I2P ''' def __init__(self, hsPort): self.torConfigLocation = 'data/torrc' self.readyState = False self.socksPort = random.randint(1024, 65535) self.hsPort = hsPort self._torInstnace = '' self.myID = '' ''' if os.path.exists(self.torConfigLocation): torrc = open(self.torConfigLocation, 'r') if not str(self.hsPort) in torrc.read(): os.remove(self.torConfigLocation) torrc.close() ''' return def generateTorrc(self): if os.path.exists(self.torConfigLocation): os.remove(self.torConfigLocation) torrcData = '''SocksPort ''' + str(self.socksPort) + ''' HiddenServiceDir data/hs/ HiddenServicePort 80 127.0.0.1:''' + str(self.hsPort) + ''' ''' torrc = open(self.torConfigLocation, 'w') torrc.write(torrcData) torrc.close() return def startTor(self): '''Start Tor with onion service on port 80 & socks proxy on random port ''' self.generateTorrc() tor = subprocess.Popen(['tor', '-f', self.torConfigLocation], stdout=subprocess.PIPE, stderr=subprocess.PIPE) # wait for tor to get to 100% bootstrap for line in iter(tor.stdout.readline, b''): if 'Bootstrapped 100%: Done' in line.decode(): break elif 'Opening Socks listener' in line.decode(): logger.debug(line.decode()) else: logger.error('Failed to start Tor') logger.info('Finished starting Tor') self.readyState = True myID = open('data/hs/hostname', 'r') self.myID = myID.read() myID.close() torPidFile = open('data/torPid.txt', 'w') torPidFile.write(str(tor.pid)) torPidFile.close() return def killTor(self): '''properly kill tor based on pid saved to file''' try: pid = open('data/torPid.txt', 'r') pidN = pid.read() pid.close() except FileNotFoundError: return try: int(pidN) except: return os.kill(int(pidN), signal.SIGTERM) os.remove('data/torPid.txt')