Fixed tcp
This commit is contained in:
parent
10d301d784
commit
050588cb73
3 changed files with 266 additions and 331 deletions
61
README.md
61
README.md
|
@ -3,10 +3,13 @@
|
|||
Read and manipulate tox profile files. It started as a simple script from
|
||||
<https://stackoverflow.com/questions/30901873/what-format-are-tox-files-stored-in>
|
||||
|
||||
```tox_savefile.py``` reads a Tox profile and prints to stderr various
|
||||
```tox_profile.py``` reads a Tox profile and prints to stderr various
|
||||
things that it finds. Then can write what it found in JSON/YAML/REPR/PPRINT
|
||||
to a file. It can also test the nodes in a profile using ```nmap```.
|
||||
|
||||
( There are somtimes problems with the json info dump of bytes keys:
|
||||
```TypeError: Object of type bytes is not JSON serializable```)
|
||||
|
||||
It can also download, select, or test nodes in a ```DHTnode.json``` file.
|
||||
|
||||
It can also decrypt a profile, saving the output to a file.
|
||||
|
@ -30,11 +33,11 @@ to stdout
|
|||
to a file.
|
||||
|
||||
```
|
||||
usage: tox_savefile.py [-h]
|
||||
usage: tox_profile.py [-h]
|
||||
[--command info|decrypt|nodes|edit]
|
||||
[--info info|repr|yaml|json|pprint|nmap_udp|nmap_tcp]
|
||||
[--info info|repr|yaml|json|pprint|nmap_dht|nmap_relay]
|
||||
[--indent INDENT]
|
||||
[--nodes select_tcp|select_udp|select_version|nmap_tcp|nmap_udp|download|check]
|
||||
[--nodes select_tcp|select_udp|select_version|nmap_tcp|nmap_udp|download|check|clean]
|
||||
[--download_nodes_url DOWNLOAD_NODES_URL]
|
||||
[--edit help|section,num,key,val]
|
||||
[--output OUTPUT]
|
||||
|
@ -50,7 +53,7 @@ Optional arguments:
|
|||
--command {info,decrypt,nodes,edit}
|
||||
Action command - default: info
|
||||
--output OUTPUT Destination for info/decrypt/nodes - can be the same as input
|
||||
--info info|repr|yaml|json|pprint|nmap_udp|nmap_tcp (may require nmap)
|
||||
--info info|repr|yaml|json|pprint|nmap_dht|nmap_relay (may require nmap)
|
||||
Format for info command
|
||||
--indent INDENT Indent for yaml/json/pprint
|
||||
--nodes select_tcp|select_udp|select_version|nmap_tcp|nmap_udp|download
|
||||
|
@ -66,10 +69,23 @@ Optional arguments:
|
|||
Choose one of ```{info,repr,yaml,json,pprint,save}```
|
||||
for the format for info command.
|
||||
|
||||
Choose one of ```{nmap_udp,nmap_tcp}```
|
||||
Choose one of ```{nmap_dht,nmap_relay,nmap_path}```
|
||||
to run tests using ```nmap``` for the ```DHT``` and ```TCP_RELAY```
|
||||
sections of the profile. Reguires ```nmap``` and uses ```sudo```.
|
||||
|
||||
```
|
||||
--info default='info',
|
||||
choices=[info, save, repr, yaml,json, pprint]
|
||||
with --info=info prints info about the profile to stderr
|
||||
yaml,json, pprint, repr - output format
|
||||
nmap_dht - test DHT nodes with nmap
|
||||
nmap_relay - test TCP_RELAY nodes with nmap
|
||||
nmap_path - test PATH_NODE nodes with nmap
|
||||
--indent for pprint/yaml/json default=2
|
||||
|
||||
|
||||
```
|
||||
|
||||
#### Saving a copy
|
||||
|
||||
The code now can generate a saved copy of the profile as it parses the profile.
|
||||
|
@ -83,6 +99,7 @@ decryption).
|
|||
|
||||
### --command nodes
|
||||
|
||||
|
||||
Takes a DHTnodes.json file as an argument.
|
||||
Choose one of ```{select_tcp,select_udp,select_version}```
|
||||
for ```--nodes``` to select TCP nodes, UDP nodes,
|
||||
|
@ -94,6 +111,29 @@ Reguires ```nmap``` and uses ```sudo```.
|
|||
|
||||
Choose ```download``` to download the nodes from ```--download_nodes_url```
|
||||
|
||||
Choose ```check``` to check the downloaded nodes, and the error return
|
||||
is the number of nodes with errors.
|
||||
|
||||
Choose ```clean``` to clean the downloaded nodes, and give
|
||||
```--output``` for the file the nodes ckeaned of errors.
|
||||
|
||||
Check and clean will also try to ping the nodes on the relevant ports,
|
||||
and clean will update the ```status_tcp``, ```status_udp```, and
|
||||
```last_ping``` fields of the nodes.
|
||||
|
||||
--nodes
|
||||
choices=[select_tcp, select_udp, nmap_tcp, select_version, nmap_udp, check, download]
|
||||
select_udp - select udp nodes
|
||||
select_tcp - select tcp nodes
|
||||
nmap_udp - test UDP nodes with nmap
|
||||
nmap_tcp - test TCP nodes with nmap
|
||||
select_version - select nodes that are the latest version
|
||||
download - download nodes from --download_nodes_url
|
||||
check - check nodes from --download_nodes_url
|
||||
clean - check nodes and save them as --output
|
||||
--download_nodes_url https://nodes.tox.chat/json
|
||||
```
|
||||
|
||||
### --command decrypt
|
||||
|
||||
Decrypt a profile, with ```--output``` to a filename.
|
||||
|
@ -124,6 +164,12 @@ The ```num``` field is to accomodate sections that have lists:
|
|||
The ```--output``` can be the same as input as the input file is read
|
||||
and closed before processing starts.
|
||||
|
||||
```
|
||||
--edit
|
||||
help - print a summary of what fields can be edited
|
||||
section,num,key,val - edit the field section,num,key with val
|
||||
```
|
||||
|
||||
You can use the ```---edit``` command to synchronize profiles, by
|
||||
keeping the keypair and synchronize profiles between different clients:
|
||||
e.g. your could keep your profile from toxic as master, and copy it over
|
||||
|
@ -132,7 +178,8 @@ your qtox/toxygen/TriFa profile while preserving their keypair and NOSPAM:
|
|||
1. Use ```--command info --info info``` on the target profile to get the
|
||||
```Nospam```, ```Public_key``` and ```Private_key``` of the target.
|
||||
2. Backup the target and copy the source profile to the target.
|
||||
3. Edit the target with the values from 1) with:```
|
||||
3. Edit the target with the values from 1) with:
|
||||
```
|
||||
--command edit --edit NOSPAMKEYS,.,Nospam,hexstr --output target target
|
||||
--command edit --edit NOSPAMKEYS,.,Public_key,hexstr --output target target
|
||||
--command edit --edit NOSPAMKEYS,.,Private_key,hexstr --output target target
|
||||
|
|
|
@ -27,9 +27,9 @@ commands, or the filename of the nodes file for the nodes command.
|
|||
choices=[info, save, repr, yaml,json, pprint]
|
||||
with --info=info prints info about the profile to stderr
|
||||
yaml,json, pprint, repr - output format
|
||||
nmap_udp - test DHT nodes with nmap
|
||||
nmap_tcp - test TCP_RELAY nodes with nmap
|
||||
nmap_onion - test PATH_NODE nodes with nmap
|
||||
nmap_dht - test DHT nodes with nmap
|
||||
nmap_relay - test TCP_RELAY nodes with nmap
|
||||
nmap_path - test PATH_NODE nodes with nmap
|
||||
--indent for pprint/yaml/json default=2
|
||||
|
||||
--nodes
|
||||
|
@ -41,6 +41,7 @@ commands, or the filename of the nodes file for the nodes command.
|
|||
select_version - select nodes that are the latest version
|
||||
download - download nodes from --download_nodes_url
|
||||
check - check nodes from --download_nodes_url
|
||||
clean - check nodes and save them as --output
|
||||
--download_nodes_url https://nodes.tox.chat/json
|
||||
|
||||
--edit
|
||||
|
@ -64,6 +65,9 @@ from pprint import pprint
|
|||
import shutil
|
||||
import json
|
||||
|
||||
import warnings
|
||||
warnings.filterwarnings('ignore')
|
||||
|
||||
try:
|
||||
# https://pypi.org/project/msgpack/
|
||||
import msgpack
|
||||
|
@ -103,7 +107,7 @@ LOG = logging.getLogger('TSF')
|
|||
# Fix for Windows
|
||||
sDIR = os.environ.get('TMPDIR', '/tmp')
|
||||
sTOX_VERSION = "1000002018"
|
||||
sVER_WANT = "1000002018"
|
||||
sVER_MIN = "1000002013"
|
||||
# 3 months
|
||||
iOLD_SECS = 60*60*24*30*3
|
||||
|
||||
|
@ -600,9 +604,10 @@ def process_chunk(index, state, oArgs=None):
|
|||
elif data_type == MESSENGER_STATE_TYPE_TCP_RELAY:
|
||||
if length > 0:
|
||||
lIN = lProcessNodeInfo(state, index, length, result, "TCPnode")
|
||||
LOG.info(f"TYPE_TCP_RELAY {len(lIN)} nodes {length} length")
|
||||
else:
|
||||
lIN = []
|
||||
LOG.info(f"NO {label}")
|
||||
LOG.warn(f"NO {label} {length} length")
|
||||
aOUT.update({label: lIN})
|
||||
if oArgs.command == 'edit' and section == label:
|
||||
## TCP_RELAY,.,TCPnode,
|
||||
|
@ -694,7 +699,7 @@ jq '.|with_entries(select(.key|match("nodes"))).nodes[]|select(.status_tcp)|sele
|
|||
fi
|
||||
done"""
|
||||
|
||||
def vBashFileNmapTcp():
|
||||
def sBashFileNmapTcp():
|
||||
assert bHAVE_JQ, "jq is required for this command"
|
||||
assert bHAVE_NMAP, "nmap is required for this command"
|
||||
assert bHAVE_BASH, "bash is required for this command"
|
||||
|
@ -704,6 +709,7 @@ def vBashFileNmapTcp():
|
|||
with open(sFile, 'wt') as iFd:
|
||||
iFd.write(sNMAP_TCP)
|
||||
os.chmod(sFile, 0o0775)
|
||||
assert os.path.exists(sFile)
|
||||
return sFile
|
||||
|
||||
def vBashFileNmapUdp():
|
||||
|
@ -720,21 +726,43 @@ def vBashFileNmapUdp():
|
|||
replace('tcp_ports','udp_ports').
|
||||
replace('status_tcp','status_udp'))
|
||||
os.chmod(sFile, 0o0775)
|
||||
assert os.path.exists(sFile)
|
||||
return sFile
|
||||
|
||||
def lParseNapOutput(sFile):
|
||||
lRet = []
|
||||
for sLine in open(sFile, 'rt').readlines():
|
||||
if sLine.startswith('Failed to resolve ') or \
|
||||
'Temporary failure in name resolution' in sLine:
|
||||
lRet += [sLine]
|
||||
return lRet
|
||||
|
||||
sBLURB = """
|
||||
I see you have a torrc. You can help the network by running a bootstrap daemon
|
||||
as a hidden service, or even using the --tcp_server option of your client.
|
||||
"""
|
||||
|
||||
def iNodesCheckNodes(json_nodes, oArgs):
|
||||
def lNodesCheckNodes(json_nodes, oArgs, bClean=False):
|
||||
"""
|
||||
Checking NODES.json
|
||||
"""
|
||||
iWarns = 0
|
||||
lErrs = []
|
||||
iErrs = 0
|
||||
nth = 0
|
||||
if bClean: lNew=[]
|
||||
# assert type(json_nodes) == dict
|
||||
for node in json_nodes:
|
||||
# new fields:
|
||||
if bClean:
|
||||
new_node = {}
|
||||
for key,val in node:
|
||||
if type(val) == bytes:
|
||||
new_node[key] = str(val, 'UTF-8')
|
||||
else:
|
||||
new_node[key] = val
|
||||
if 'onions' not in new_node:
|
||||
new_node['onions'] = []
|
||||
|
||||
for ipv in ['ipv4','ipv6']:
|
||||
if not node[ipv] in lNULLS:
|
||||
LOG.info(f"Checking {node[ipv]}")
|
||||
|
@ -752,11 +780,11 @@ def iNodesCheckNodes(json_nodes, oArgs):
|
|||
not node['tcp_ports'] and not '.onion' in node['location']:
|
||||
LOG.warn("No ports to contact the daemon on")
|
||||
|
||||
if node["version"] < "1000002013":
|
||||
iErrs += 1
|
||||
if node["version"] and node["version"] < "1000002013":
|
||||
lErrs += [nth]
|
||||
LOG.error(f"vulnerable version {node['version']} < 1000002013")
|
||||
elif node["version"] < sVER_WANT:
|
||||
LOG.warn(f"outdated version {node['version']} < {sVER_WANT}")
|
||||
elif node["version"] and node["version"] < sVER_MIN:
|
||||
LOG.warn(f"outdated version {node['version']} < {sVER_MIN}")
|
||||
|
||||
# Put the onion address in the location after the country code
|
||||
if len(node["location"]) not in [2, 65]:
|
||||
|
@ -786,39 +814,34 @@ def iNodesCheckNodes(json_nodes, oArgs):
|
|||
else:
|
||||
LOG.warn(f"Found an onion that resolves to {s}")
|
||||
|
||||
if node['last_ping'] == 0:
|
||||
iErrs += 1
|
||||
LOG.error(f"node has never been pinged")
|
||||
elif time.time() - node['last_ping'] > iOLD_SECS:
|
||||
LOG.error(f"node has not been pinged in more than 3 months")
|
||||
if node['last_ping'] and time.time() - node['last_ping'] > iOLD_SECS:
|
||||
LOG.debug(f"node has not been pinged in more than 3 months")
|
||||
|
||||
# suggestions YMMV
|
||||
if str(node['port']).startswith('3344'):
|
||||
LOG.debug(f"Maybe run on a non-standard port to resist blocking {node['port']}")
|
||||
|
||||
if node['tcp_ports']:
|
||||
for port in node['tcp_ports']:
|
||||
if str(port).startswith('3344') or port in [33445, 3389]:
|
||||
LOG.debug(f"Maybe run tcp_ports on a non-standard port to resist blocking: {node['port']}")
|
||||
if len(node['maintainer']) > 75 and len(node['motd']) < 75:
|
||||
pass
|
||||
# look for onion LOG.debug(f"Maybe put a ToxID: in motd so people can contact you.")
|
||||
|
||||
if len(node['maintainer']) < 75 and len(node['motd']) < 75:
|
||||
LOG.debug(f"Maybe add a ToxID: in the motd so people can contact you.")
|
||||
elif len(node['maintainer']) > 75 and len(node['motd']) < 75:
|
||||
LOG.debug(f"Maybe put the ToxID: in motd so people can contact you.")
|
||||
elif len(node['maintainer']) > 0 and len(node['motd']) < 1:
|
||||
LOG.debug(f"Maybe put a ToxID: in motd so people can contact you.")
|
||||
if bClean and not nth in lErrs:
|
||||
lNew+=[new_node]
|
||||
nth += 1
|
||||
|
||||
# fixme look for /etc/tor/torrc but it may not be readable
|
||||
if bHAVE_TOR and os.path.exists('/etc/tor/torrc'):
|
||||
print(sBLURB)
|
||||
return iErrs
|
||||
if bClean:
|
||||
return lNew
|
||||
else:
|
||||
return lErrs
|
||||
|
||||
def iNodesFileCheck(sProOrNodes):
|
||||
def iNodesFileCheck(sProOrNodes, oArgs, bClean=False):
|
||||
try:
|
||||
if not os.path.exists(sProOrNodes):
|
||||
raise RuntimeError("iNodesFileCheck file not found " +sProOrNodes)
|
||||
with open(sProOrNodes, 'rt') as fl:
|
||||
json_nodes = json.loads(fl.read())['nodes']
|
||||
json_all = json.loads(fl.read())
|
||||
json_nodes = json_all['nodes']
|
||||
except Exception as e:
|
||||
LOG.exception(f"{oArgs.command} error reading {sProOrNodes}")
|
||||
return 1
|
||||
|
@ -826,7 +849,24 @@ def iNodesFileCheck(sProOrNodes):
|
|||
LOG.info(f"iNodesFileCheck checking JSON")
|
||||
i = 0
|
||||
try:
|
||||
i = iNodesCheckNodes(json_nodes, oArgs)
|
||||
al = lNodesCheckNodes(json_nodes, oArgs, bClean=bClean)
|
||||
if bClean == False:
|
||||
i = len(al)
|
||||
else:
|
||||
now = time.time()
|
||||
aOut = dict(last_scan=json_all['last_scan'],
|
||||
last_refresh=now,
|
||||
nodes=al)
|
||||
sOut = oArgs.output
|
||||
try:
|
||||
LOG.debug(f"iNodesFileClean saving to {sOut}")
|
||||
oStream = open(sOut, 'wt', encoding=sENC)
|
||||
json.dump(aOut, oStream, indent=oArgs.indent)
|
||||
if oStream.write('\n') > 0: i = 0
|
||||
except Exception as e:
|
||||
LOG.exception(f"iNodesFileClean error dumping JSON to {sOUT}")
|
||||
return 3
|
||||
|
||||
except Exception as e:
|
||||
LOG.exception(f"iNodesFileCheck error checking JSON")
|
||||
i = -2
|
||||
|
@ -858,30 +898,41 @@ def iNodesFileClean(sProOrNodes):
|
|||
LOG.info(f"{oArgs.info}ing iRet={iRet} to {oArgs.output}")
|
||||
return 0
|
||||
|
||||
def vOsSystemNmapUdp(l, oArgs):
|
||||
iErrs = 0
|
||||
for elt in aOUT["DHT"]:
|
||||
cmd = f"sudo nmap -Pn -n -sU -p U:{elt['Port']} {elt['Ip']}"
|
||||
iErrs += os.system(cmd +f" >> {oArgs.output} 2>&1")
|
||||
if iErrs:
|
||||
LOG.warn(f"{oArgs.info} {iErrs} ERRORs to {oArgs.output}")
|
||||
print(f"{oArgs.info} {iErrs} ERRORs to {oArgs.output}")
|
||||
else:
|
||||
LOG.info(f"{oArgs.info} NO errors to {oArgs.output}")
|
||||
print(f"{oArgs.info} NO errors to {oArgs.output}")
|
||||
|
||||
def vOsSystemNmapTcp(l, oArgs):
|
||||
def iOsSystemNmapUdp(l, oArgs):
|
||||
iErrs = 0
|
||||
for elt in l:
|
||||
cmd = f"sudo nmap -Pn -n -sT -p T:{elt['Port']} {elt['Ip']}"
|
||||
print(f"{oArgs.info} NO errors to {oArgs.output}")
|
||||
cmd = f"sudo nmap -Pn -n -sU -p U:{elt['Port']} {elt['Ip']}"
|
||||
LOG.debug(f"{oArgs.info} {cmd} to {oArgs.output}")
|
||||
iErrs += os.system(cmd +f" >> {oArgs.output} 2>&1")
|
||||
if iErrs:
|
||||
LOG.warn(f"{oArgs.info} {iErrs} ERRORs to {oArgs.output}")
|
||||
print(f"{oArgs.info} {iErrs} ERRORs to {oArgs.output}")
|
||||
else:
|
||||
LOG.info(f"{oArgs.info} NO errors to {oArgs.output}")
|
||||
print(f"{oArgs.info} NO errors to {oArgs.output}")
|
||||
lRet = lParseNapOutput(oArgs.output)
|
||||
if lRet:
|
||||
for sLine in lRet:
|
||||
LOG.warn(f"{oArgs.nodes} {sLine}")
|
||||
iErr = len(lRet)
|
||||
iErrs += iErr
|
||||
return iErrs
|
||||
|
||||
def iOsSystemNmapTcp(l, oArgs):
|
||||
iErrs = 0
|
||||
LOG.debug(f"{len(l)} nodes to {oArgs.output}")
|
||||
for elt in l:
|
||||
cmd = f"sudo nmap -Pn -n -sT -p T:{elt['Port']} {elt['Ip']}"
|
||||
LOG.debug(f"iOsSystemNmapTcp {cmd} to {oArgs.output}")
|
||||
iErr += os.system(cmd +f" >> {oArgs.output} 2>&1")
|
||||
if iErr:
|
||||
LOG.warn(f"iOsSystemNmapTcp {iErrs} ERRORs to {oArgs.output}")
|
||||
else:
|
||||
lRet = lParseNapOutput(oArgs.output)
|
||||
if lRet:
|
||||
for sLine in lRet:
|
||||
LOG.warn(f"{oArgs.nodes} {sLine}")
|
||||
iErr = len(lRet)
|
||||
iErrs += iErr
|
||||
return iErrs
|
||||
|
||||
def vSetupLogging(loglevel=logging.DEBUG):
|
||||
global LOG
|
||||
|
@ -915,6 +966,7 @@ def iMain(sProOrNodes, oArgs):
|
|||
LOG.error(f"decrypting {sProOrNodes} - {e}")
|
||||
sys.exit(1)
|
||||
assert bSAVE
|
||||
LOG.debug(f"{oArgs.command} {len(bSAVE)} bytes")
|
||||
|
||||
oStream = None
|
||||
if oArgs.command == 'decrypt':
|
||||
|
@ -963,40 +1015,65 @@ def iMain(sProOrNodes, oArgs):
|
|||
assert oArgs.output, "--output required for this command"
|
||||
if not bAreWeConnected():
|
||||
LOG.warn(f"{oArgs.nodes} we are not connected")
|
||||
cmd = vBashFileNmapTcp()
|
||||
iRet = os.system(f"bash {cmd} < '{sProOrNodes}'" +f" >'{oArgs.output}'")
|
||||
else:
|
||||
cmd = sBashFileNmapTcp()
|
||||
cmd = f"bash {cmd} < '{sProOrNodes}' >'{oArgs.output}' 2>&1"
|
||||
LOG.debug(cmd)
|
||||
iRet = os.system(cmd)
|
||||
if iRet == 0:
|
||||
lRet = lParseNapOutput(oArgs.output)
|
||||
if lRet:
|
||||
for sLine in lRet:
|
||||
LOG.warn(f"{oArgs.nodes} {sLine}")
|
||||
iRet = len(lRet)
|
||||
|
||||
elif oArgs.nodes == 'nmap_udp':
|
||||
assert oArgs.output, "--output required for this command"
|
||||
if not bAreWeConnected():
|
||||
LOG.warn(f"{oArgs.nodes} we are not connected")
|
||||
elif bHAVE_TOR:
|
||||
LOG.warn(f"{oArgs.nodes} this wont work behind tor")
|
||||
cmd = vBashFileNmapUdp()
|
||||
iRet = os.system(f"bash {cmd} < '{sProOrNodes}'" +f" >'{oArgs.output}'")
|
||||
cmd = f"bash {cmd} < '{sProOrNodes}'" +f" >'{oArgs.output}' 2>&1"
|
||||
LOG.debug(cmd)
|
||||
iRet = os.system(cmd)
|
||||
if iRet == 0:
|
||||
lRet = lParseNapOutput(oArgs.output)
|
||||
if lRet:
|
||||
for sLine in lRet:
|
||||
LOG.warn(f"{oArgs.nodes} {sLine}")
|
||||
iRet = len(lRet)
|
||||
|
||||
elif oArgs.nodes == 'download' and download_url:
|
||||
if not bAreWeConnected():
|
||||
LOG.warn(f"{oArgs.nodes} we are not connected")
|
||||
url = oArgs.download_nodes_url
|
||||
b = download_url(url)
|
||||
if not bSAVE:
|
||||
if not b:
|
||||
LOG.warn("failed downloading list of nodes")
|
||||
iRet = -1
|
||||
else:
|
||||
if oArgs.output:
|
||||
oStream = open(oArgs.output, 'rb')
|
||||
oStream = open(oArgs.output, 'wb')
|
||||
oStream.write(b)
|
||||
else:
|
||||
oStream = sys.stdout
|
||||
oStream.write(str(b, sENC))
|
||||
iRet = -1
|
||||
iRet = 0
|
||||
LOG.info(f"downloaded list of nodes to {oStream}")
|
||||
|
||||
elif oArgs.nodes == 'check':
|
||||
i = iNodesFileCheck(sProOrNodes)
|
||||
return i
|
||||
i = iNodesFileCheck(sProOrNodes, oArgs, bClean=False)
|
||||
iRet = i
|
||||
|
||||
elif oArgs.nodes == 'clean':
|
||||
assert oArgs.output, "--output required for this command"
|
||||
i = iNodesFileCheck(sProOrNodes, oArgs, bClean=True)
|
||||
iRet = i
|
||||
|
||||
if iRet > 0:
|
||||
LOG.warn(f"{oArgs.nodes} iRet={iRet} to {oArgs.output}")
|
||||
|
||||
elif iRet == 0:
|
||||
LOG.info(f"{oArgs.nodes} iRet={iRet} to {oArgs.output}")
|
||||
|
||||
|
@ -1017,6 +1094,7 @@ def iMain(sProOrNodes, oArgs):
|
|||
process_chunk(len(bOUT), bSAVE, oArgs)
|
||||
if not bOUT:
|
||||
LOG.error(f"{oArgs.command} NO bOUT results")
|
||||
iRet = 1
|
||||
else:
|
||||
oStream = None
|
||||
LOG.debug(f"command={oArgs.command} len bOUT={len(bOUT)} results")
|
||||
|
@ -1028,42 +1106,83 @@ def iMain(sProOrNodes, oArgs):
|
|||
LOG.info(f"{oArgs.info}ed iRet={iRet} to {oArgs.output}")
|
||||
elif oArgs.info == 'info':
|
||||
pass
|
||||
elif oArgs.info == 'yaml' and yaml:
|
||||
iRet = 0
|
||||
elif oArgs.info == 'yaml':
|
||||
if not yaml:
|
||||
LOG.warn(f"{oArgs.command} no yaml support")
|
||||
iRet = -1
|
||||
else:
|
||||
LOG.debug(f"{oArgs.command} saving to {oArgs.output}")
|
||||
oStream = open(oArgs.output, 'wt', encoding=sENC)
|
||||
try:
|
||||
assert aOUT
|
||||
yaml.dump(aOUT, stream=oStream, indent=oArgs.indent)
|
||||
if oStream.write('\n') > 0: iRet = 0
|
||||
except Exception as e:
|
||||
LOG.warn(f'WARN: {e}')
|
||||
else:
|
||||
oStream.write('\n')
|
||||
iRet = 0
|
||||
LOG.info(f"{oArgs.info}ing iRet={iRet} to {oArgs.output}")
|
||||
elif oArgs.info == 'json' and json:
|
||||
|
||||
elif oArgs.info == 'json':
|
||||
if not yaml:
|
||||
LOG.warn(f"{oArgs.command} no json support")
|
||||
iRet = -1
|
||||
else:
|
||||
LOG.debug(f"{oArgs.command} saving to {oArgs.output}")
|
||||
oStream = open(oArgs.output, 'wt', encoding=sENC)
|
||||
json.dump(aOUT, oStream, indent=oArgs.indent)
|
||||
if oStream.write('\n') > 0: iRet = 0
|
||||
try:
|
||||
json.dump(aOUT, oStream, indent=oArgs.indent, skipkeys=True)
|
||||
except:
|
||||
LOG.warn("There are somtimes problems with the json info dump of bytes keys: ```TypeError: Object of type bytes is not JSON serializable```")
|
||||
oStream.write('\n') > 0
|
||||
iRet = 0
|
||||
LOG.info(f"{oArgs.info}ing iRet={iRet} to {oArgs.output}")
|
||||
|
||||
elif oArgs.info == 'repr':
|
||||
LOG.debug(f"{oArgs.command} saving to {oArgs.output}")
|
||||
oStream = open(oArgs.output, 'wt', encoding=sENC)
|
||||
if oStream.write(repr(bOUT)) > 0: iRet = 0
|
||||
if oStream.write('\n') > 0: iRet = 0
|
||||
LOG.info(f"{oArgs.info}ing iRet={iRet} to {oArgs.output}")
|
||||
|
||||
elif oArgs.info == 'pprint':
|
||||
LOG.debug(f"{oArgs.command} saving to {oArgs.output}")
|
||||
oStream = open(oArgs.output, 'wt', encoding=sENC)
|
||||
pprint(aOUT, stream=oStream, indent=oArgs.indent, width=80)
|
||||
iRet = 0
|
||||
LOG.info(f"{oArgs.info}ing iRet={iRet} to {oArgs.output}")
|
||||
elif oArgs.info == 'nmap_tcp' and bHAVE_NMAP:
|
||||
|
||||
elif oArgs.info == 'nmap_relay':
|
||||
assert bHAVE_NMAP, "nmap is required for this command"
|
||||
assert oArgs.output, "--output required for this command"
|
||||
vOsSystemNmapTcp(aOUT["TCP_RELAY"], oArgs)
|
||||
elif oArgs.info == 'nmap_udp' and bHAVE_NMAP:
|
||||
if aOUT["TCP_RELAY"]:
|
||||
iRet = iOsSystemNmapTcp(aOUT["TCP_RELAY"], oArgs)
|
||||
else:
|
||||
LOG.warn(f"{oArgs.info} no TCP_RELAY")
|
||||
iRet = 0
|
||||
|
||||
elif oArgs.info == 'nmap_dht':
|
||||
assert bHAVE_NMAP, "nmap is required for this command"
|
||||
assert oArgs.output, "--output required for this command"
|
||||
vOsSystemNmapUdp(aOUT["DHT"], oArgs)
|
||||
elif oArgs.info == 'nmap_onion' and bHAVE_NMAP:
|
||||
if aOUT["DHT"]:
|
||||
iRet = iOsSystemNmapUdp(aOUT["DHT"], oArgs)
|
||||
else:
|
||||
LOG.warn(f"{oArgs.info} no DHT")
|
||||
iRet = 0
|
||||
|
||||
elif oArgs.info == 'nmap_path':
|
||||
assert bHAVE_NMAP, "nmap is required for this command"
|
||||
assert oArgs.output, "--output required for this command"
|
||||
vOsSystemNmapUdp(aOUT["PATH_NODE"], oArgs)
|
||||
if aOUT["PATH_NODE"]:
|
||||
iRet = iOsSystemNmapUdp(aOUT["PATH_NODE"], oArgs)
|
||||
else:
|
||||
LOG.warn(f"{oArgs.info} no PATH_NODE")
|
||||
iRet = 0
|
||||
|
||||
if oStream and oStream != sys.stdout and oStream != sys.stderr:
|
||||
oStream.close()
|
||||
return iRet
|
||||
|
||||
def oMainArgparser(_=None):
|
||||
if not os.path.exists('/proc/sys/net/ipv6'):
|
||||
|
@ -1087,11 +1206,12 @@ def oMainArgparser(_=None):
|
|||
parser.add_argument('--indent', type=int, default=2,
|
||||
help='Indent for yaml/json/pprint')
|
||||
choices=['info', 'save', 'repr', 'yaml','json', 'pprint']
|
||||
if bHAVE_NMAP: choices += ['nmap_tcp', 'nmap_udp', 'nmap_onion']
|
||||
if bHAVE_NMAP:
|
||||
choices += ['nmap_relay', 'nmap_dht', 'nmap_path']
|
||||
parser.add_argument('--info', type=str, default='info',
|
||||
choices=choices,
|
||||
help='Format for info command')
|
||||
choices = ['check']
|
||||
choices = ['check', 'clean']
|
||||
if bHAVE_JQ:
|
||||
choices += ['select_tcp', 'select_udp', 'select_version']
|
||||
if bHAVE_NMAP: choices += ['nmap_tcp', 'nmap_udp']
|
|
@ -1,232 +0,0 @@
|
|||
#!/bin/sh
|
||||
# -*- mode: sh; fill-column: 75; tab-width: 8; coding: utf-8-unix -*-
|
||||
|
||||
# tox_savefile.py has a lot of features so it needs test coverage
|
||||
|
||||
PREFIX=/mnt/o/var/local/src
|
||||
EXE=python3.sh
|
||||
WRAPPER=$PREFIX/toxygen_wrapper
|
||||
|
||||
[ -f /usr/local/bin/usr_local_tput.bash ] && \
|
||||
. /usr/local/bin/usr_local_tput.bash || {
|
||||
DEBUG() { echo DEBUG $* ; }
|
||||
INFO() { echo INFO $* ; }
|
||||
WARN() { echo WARN $* ; }
|
||||
ERROR() { echo ERROR $* ; }
|
||||
}
|
||||
|
||||
# set -- -e
|
||||
target=$PREFIX/tox_profile/tox_savefile.py
|
||||
[ -s $target ] || exit 1
|
||||
|
||||
tox=$HOME/.config/tox/toxic_profile.tox
|
||||
[ -s $tox ] || exit 2
|
||||
|
||||
[ -d $WRAPPER ] || {
|
||||
ERROR wrapper is required https://git.plastiras.org/emdee/toxygen_wrapper
|
||||
exit 3
|
||||
}
|
||||
export PYTHONPATH=$WRAPPER
|
||||
|
||||
json=$HOME/.config/tox/DHTnodes.json
|
||||
[ -s $json ] || exit 4
|
||||
|
||||
which jq > /dev/null && HAVE_JQ=1 || HAVE_JQ=0
|
||||
which nmap > /dev/null && HAVE_NMAP=1 || HAVE_NMAP=0
|
||||
|
||||
sudo rm -f /tmp/toxic_profile.* /tmp/toxic_nodes.*
|
||||
|
||||
test_jq () {
|
||||
[ $# -eq 3 ] || {
|
||||
ERROR test_jq '#' "$@"
|
||||
return 3
|
||||
}
|
||||
in=$1
|
||||
out=$2
|
||||
err=$3
|
||||
[ -s $in ] || {
|
||||
ERROR $i test_jq null $in
|
||||
return 4
|
||||
}
|
||||
jq . < $in >$out 2>$err || {
|
||||
ERROR $i test_jq $json
|
||||
return 5
|
||||
}
|
||||
grep error: $err && {
|
||||
ERROR $i test_jq $json
|
||||
return 6
|
||||
}
|
||||
[ -s $out ] || {
|
||||
ERROR $i null $out
|
||||
return 7
|
||||
}
|
||||
[ -s $err ] || rm -f $err
|
||||
return 0
|
||||
}
|
||||
|
||||
i=0
|
||||
[ "$HAVE_JQ" = 0 ] || \
|
||||
test_jq $json /tmp/toxic_nodes.json /tmp/toxic_nodes.err || exit ${i}$?
|
||||
[ -f /tmp/toxic_nodes.json ] || cp -p $json /tmp/toxic_nodes.json
|
||||
json=/tmp/toxic_nodes.json
|
||||
|
||||
i=1
|
||||
# required password
|
||||
INFO $i decrypt /tmp/toxic_profile.bin
|
||||
$EXE $target --command decrypt --output /tmp/toxic_profile.bin $tox || exit ${i}1
|
||||
[ -s /tmp/toxic_profile.bin ] || exit ${i}2
|
||||
|
||||
tox=/tmp/toxic_profile.bin
|
||||
INFO $i info $tox
|
||||
$EXE $target --command info --info info $tox 2>/tmp/toxic_profile.info || {
|
||||
ERROR $i $EXE $target --command info --info info $tox
|
||||
exit ${i}3
|
||||
}
|
||||
[ -s /tmp/toxic_profile.info ] || exit ${i}4
|
||||
|
||||
INFO $i /tmp/toxic_profile.save
|
||||
$EXE $target --command info --info save --output /tmp/toxic_profile.save $tox 2>/dev/null || exit ${i}5
|
||||
[ -s /tmp/toxic_profile.save ] || exit ${i}6
|
||||
|
||||
i=2
|
||||
for the_tox in $tox /tmp/toxic_profile.save ; do
|
||||
DBUG $i $the_tox
|
||||
the_base=`echo $the_tox | sed -e 's/.save$//' -e 's/.tox$//'`
|
||||
for elt in json yaml pprint repr ; do
|
||||
INFO $i $the_base.$elt
|
||||
DBUG $EXE $target \
|
||||
--command info --info $elt \
|
||||
--output $the_base.$elt $the_tox '2>'$the_base.$elt.err
|
||||
$EXE $target --command info --info $elt \
|
||||
--output $the_base.$elt $the_tox 2>$the_base.$nmap.err || exit ${i}0
|
||||
[ -s $the_base.$elt ] || exit ${i}1
|
||||
done
|
||||
|
||||
$EXE $target --command edit --edit help $the_tox 2>/dev/null || exit ${i}2
|
||||
|
||||
# edit the status message
|
||||
INFO $i $the_base.Status_message 'STATUSMESSAGE,.,Status_message,Toxxed on Toxic'
|
||||
$EXE $target --command edit --edit 'STATUSMESSAGE,.,Status_message,Toxxed on Toxic' \
|
||||
--output $the_base.Status_message.tox $the_tox 2>&1|grep EDIT || exit ${i}3
|
||||
[ -s $the_base.Status_message.tox ] || exit ${i}3
|
||||
$EXE $target --command info $the_base.Status_message.tox 2>&1|grep Toxxed || exit ${i}4
|
||||
|
||||
# edit the nick_name
|
||||
INFO $i $the_base.Nick_name 'NAME,.,Nick_name,FooBar'
|
||||
$EXE $target --command edit --edit 'NAME,.,Nick_name,FooBar' \
|
||||
--output $the_base.Nick_name.tox $the_tox 2>&1|grep EDIT || exit ${i}5
|
||||
[ -s $the_base.Nick_name.tox ] || exit ${i}5
|
||||
$EXE $target --command info $the_base.Nick_name.tox 2>&1|grep FooBar || exit ${i}6
|
||||
|
||||
# set the DHTnodes to empty
|
||||
INFO $i $the_base.noDHT 'DHT,.,DHTnode,'
|
||||
$EXE $target --command edit --edit 'DHT,.,DHTnode,' \
|
||||
--output $the_base.noDHT.tox $the_tox 2>&1|grep EDIT || exit ${i}7
|
||||
[ -s $the_base.noDHT.tox ] || exit ${i}7
|
||||
$EXE $target --command info $the_base.noDHT.tox 2>&1|grep 'NO DHT' || exit ${i}8
|
||||
|
||||
done
|
||||
|
||||
i=3
|
||||
[ "$HAVE_JQ" = 0 ] || \
|
||||
for the_json in $json ; do
|
||||
DBUG $i $the_json
|
||||
the_base=`echo $the_json | sed -e 's/.json$//' -e 's/.tox$//'`
|
||||
for nmap in select_tcp select_udp select_version ; do
|
||||
$EXE $target --command nodes --nodes $nmap \
|
||||
--output $the_base.$nmap.json $the_json || {
|
||||
WARN $i $the_json $nmap ${i}1
|
||||
continue
|
||||
}
|
||||
[ -s $the_base.$nmap.json ] || {
|
||||
WARN $i $the_json $nmap ${i}2
|
||||
continue
|
||||
}
|
||||
[ $nmap = select_tcp ] && \
|
||||
grep '"status_tcp": false' $the_base.$nmap.json && {
|
||||
WARN $i $the_json $nmap ${i}3
|
||||
continue
|
||||
}
|
||||
[ $nmap = select_udp ] && \
|
||||
grep '"status_udp": false' $the_base.$nmap.json && {
|
||||
WARN $i $the_json $nmap ${i}4
|
||||
continue
|
||||
}
|
||||
test_jq $the_base.$nmap.json $the_base.$nmap.json.out /tmp/toxic_nodes.err || {
|
||||
retval=$?
|
||||
WARN $i $the_base.$nmap.json 3$?
|
||||
}
|
||||
INFO $i $the_base.$nmap
|
||||
done
|
||||
done
|
||||
|
||||
ls -l /tmp/toxic_profile.* /tmp/toxic_nodes.*
|
||||
|
||||
# DEBUG=0 /usr/local/bin/proxy_ping_test.bash tor || exit 0
|
||||
ip route | grep ^def || exit 0
|
||||
|
||||
i=4
|
||||
the_tox=$tox
|
||||
[ "$HAVE_JQ" = 0 ] || \
|
||||
[ "$HAVE_NMAP" = 0 ] || \
|
||||
for the_tox in $tox /tmp/toxic_profile.save ; do
|
||||
DBUG $i $the_tox
|
||||
the_base=`echo $the_tox | sed -e 's/.save$//' -e 's/.tox$//'`
|
||||
for nmap in nmap_tcp nmap_udp nmap_onion ; do
|
||||
# [ $nmap = select_tcp ] && continue
|
||||
# [ $nmap = select_udp ] && continue
|
||||
INFO $i $the_base.$nmap
|
||||
$EXE $target --command info --info $nmap \
|
||||
--output $the_base.$nmap.out $the_tox 2>$the_base.$nmap.err || {
|
||||
# select_tcp may be empty and jq errors
|
||||
# exit ${i}1
|
||||
WARN $i $the_base.$nmap.err
|
||||
continue
|
||||
}
|
||||
[ -s $the_base.$nmap.out ] || {
|
||||
ERROR $i $the_base.$nmap.out
|
||||
continue
|
||||
}
|
||||
done
|
||||
done
|
||||
|
||||
i=5
|
||||
[ "$HAVE_JQ" = 0 ] || \
|
||||
for the_json in $json ; do
|
||||
DBUG $i $the_json
|
||||
the_base=`echo $the_json | sed -e 's/.save$//' -e 's/.json$//'`
|
||||
for nmap in nmap_tcp nmap_udp ; do
|
||||
INFO $i $the_base.$nmap
|
||||
$EXE $target --command nodes --nodes $nmap \
|
||||
--output $the_base.$nmap $the_json 2>$the_base.$nmap.err || {
|
||||
WARN $i $the_json $nmap ${i}1
|
||||
continue
|
||||
}
|
||||
[ -s $the_base.$nmap ] || {
|
||||
ERROR $i $the_json $nmap ${i}2
|
||||
exit ${i}2
|
||||
}
|
||||
done
|
||||
done
|
||||
|
||||
i=6
|
||||
DBUG $i
|
||||
$EXE $target --command nodes --nodes download \
|
||||
--output /tmp/toxic_nodes.new $json || {
|
||||
ERROR $i $EXE $target --command nodes --nodes download $json
|
||||
exit ${i}1
|
||||
}
|
||||
[ -s /tmp/toxic_nodes.new ] || exit ${i}4
|
||||
json=/tmp/toxic_nodes.new
|
||||
[ "$HAVE_JQ" = 0 ] || \
|
||||
jq . < $json >/tmp/toxic_nodes.new.json 2>>/tmp/toxic_nodes.new.err || {
|
||||
ERROR $i jq $json
|
||||
exit ${i}2
|
||||
}
|
||||
[ "$HAVE_JQ" = 0 ] || \
|
||||
grep error: /tmp/toxic_nodes.new.err && {
|
||||
ERROR $i jq $json
|
||||
exit ${i}3
|
||||
}
|
||||
|
||||
exit 0
|
Loading…
Reference in a new issue