2
0
mirror of https://github.com/ComradCollective/Comrad synced 2024-11-03 23:15:33 +00:00
Comrad/komrade/backend/mazes.py
quadrismegistus 8e14d81baa fixes
2020-09-05 22:11:42 +01:00

408 lines
13 KiB
Python

import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
from komrade import *
log=print
# def get_tor_python_session():
# tor = TorClient()
# with tor.get_guard() as guard:
# adapter = TorHttpAdapter(guard, 3, retries=RETRIES)
# with requests.Session() as s:
# s.headers.update({'User-Agent': 'Mozilla/5.0'})
# s.mount('http://', adapter)
# s.mount('https://', adapter)
# return s
def tor_request_in_python(url):
tor = TorClient()
with tor.get_guard() as guard:
adapter = TorHttpAdapter(guard, 3, retries=RETRIES)
with requests.Session() as s:
s.headers.update({'User-Agent': 'Mozilla/5.0'})
s.mount('http://', adapter)
s.mount('https://', adapter)
# r = s.get(url, timeout=30)
# r = s.post('http://u7spnj3dmwumzoa4.onion/op/',data=b'hello world', timeout=30)
_dat = 'Z29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29r'
r = s.get('http://u7spnj3dmwumzoa4.onion/op/'+_dat, timeout=30)
return r
#return r
# #r = s.get('http://u7spnj3dmwumzoa4.onion',timeout=30)
# print (r, r.text[:1000])
# return s
def get_tor_proxy_session():
import requests
session = requests.session()
# Tor uses the 9050 port as the default socks port
session.proxies = {'http': 'socks5://127.0.0.1:9050',
'https': 'socks5://127.0.0.1:9050'}
return session
def get_async_tor_proxy_session():
import requests_futures
from requests_futures.sessions import FuturesSession
session = FuturesSession()
# Tor uses the 9050 port as the default socks port
session.proxies = {'http': 'socks5://127.0.0.1:9050',
'https': 'socks5://127.0.0.1:9050'}
return session
def tor_request(url,method='get',data=None):
with get_tor_proxy_session() as s:
if method=='get':
return s.get(url)
elif method=='post':
log('data',data)
return s.post(url,data=data)
def request(Q,**kwargs):
log('request() Q:',Q)
res = tor_request(Q,**kwargs)
log('reqeust() <-',res)
return res
def test_torpy():
hostname = KOMRADE_ONION
from torpy import TorClient
tor = TorClient()
# Choose random guard node and create 3-hops circuit
with tor.create_circuit(3) as circuit:
# Create tor stream to host
with circuit.create_stream((hostname, 80)) as stream:
# Send some data to it
stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hostname.encode())
recv = recv_all(stream).decode()
#logger.warning('recv: %s', recv)
print('RECEIVED:',recv)
#### CODE FROM TORPY
# Copyright 2019 James Brown
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
import os
import socket
import logging
from threading import Event
from selectors import EVENT_READ
from multiprocessing.pool import ThreadPool
import requests
from torpy import TorClient
from torpy.stream import TorStream
from torpy.utils import AuthType, recv_all, retry
from torpy.http.adapter import TorHttpAdapter
from torpy.hiddenservice import HiddenService
from torpy.http.requests import TorRequests, tor_requests_session, do_request as requests_request
from torpy.http.urlopener import do_request as urllib_request
logging.getLogger('requests').setLevel(logging.CRITICAL)
logging.basicConfig(format='[%(asctime)s] [%(threadName)-16s] %(message)s', level=logging.DEBUG)
logger = logging.getLogger(__name__)
HS_BASIC_HOST = os.getenv('HS_BASIC_HOST')
HS_BASIC_AUTH = os.getenv('HS_BASIC_AUTH')
HS_STEALTH_HOST = os.getenv('HS_STEALTH_HOST')
HS_STEALTH_AUTH = os.getenv('HS_STEALTH_AUTH')
RETRIES = 3
@retry(RETRIES, (TimeoutError, ConnectionError, ))
def test_clearnet_raw():
hostname = 'ifconfig.me'
tor = TorClient()
# Choose random guard node and create 3-hops circuit
with tor.create_circuit(3) as circuit:
# Create tor stream to host
with circuit.create_stream((hostname, 80)) as stream:
# Send some data to it
stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hostname.encode())
recv = recv_all(stream).decode()
logger.warning('recv: %s', recv)
search_ip = '.'.join(circuit.last_node.router.ip.split('.')[:-1]) + '.'
assert search_ip in recv, 'wrong data received'
@retry(RETRIES, (TimeoutError, ConnectionError, ))
def test_onion_raw():
hostname = 'u7spnj3dmwumzoa4.onion'
tor = TorClient()
# Choose random guard node and create 3-hops circuit
with tor.create_circuit(3) as circuit:
# Create tor stream to host
with circuit.create_stream((hostname, 80)) as stream:
# Send some data to it
stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hostname.encode())
recv = recv_all(stream).decode()
logger.warning('recv: %s', recv)
assert 'StickyNotes' in recv, 'wrong data received'
def test_requests_no_agent():
data = requests_request('https://httpbin.org/headers', retries=RETRIES)
assert 'User-Agent' not in data
def test_requests():
data = requests_request('https://httpbin.org/headers', headers={'User-Agent': 'Mozilla/5.0'}, retries=RETRIES)
assert 'Mozilla' in data
def test_requests_session():
tor = TorClient()
with tor.get_guard() as guard:
adapter = TorHttpAdapter(guard, 3, retries=RETRIES)
with requests.Session() as s:
s.headers.update({'User-Agent': 'Mozilla/5.0'})
s.mount('http://', adapter)
s.mount('https://', adapter)
r = s.get('https://google.com', timeout=30)
logger.warning(r)
logger.warning(r.text)
assert r.text.rstrip().endswith('</html>')
r = s.get('https://stackoverflow.com/questions/tagged/python')
assert r.text.rstrip().endswith('</html>')
logger.warning(r)
logger.warning(r.text)
def test_requests_session2():
tor = TorClient()
with tor.get_guard() as guard:
adapter = TorHttpAdapter(guard, 3, retries=RETRIES)
with requests.Session() as s:
s.headers.update({'User-Agent': 'Mozilla/5.0'})
s.mount('http://', adapter)
s.mount('https://', adapter)
#r = s.get('https://google.com', timeout=30)
r = s.get('http://u7spnj3dmwumzoa4.onion',timeout=30)
print(r)
print(r.text[:1000])
def test_urlopener_no_agent():
data = urllib_request('https://httpbin.org/headers', verbose=1, retries=RETRIES)
assert 'User-Agent' not in data
def test_urlopener():
data = urllib_request('https://httpbin.org/headers', headers=[('User-Agent', 'Mozilla/5.0')], verbose=1,
retries=RETRIES)
assert 'Mozilla' in data
def test_multi_threaded():
auth_data = {HS_BASIC_HOST: (HS_BASIC_AUTH, AuthType.Basic)} if HS_BASIC_HOST and HS_BASIC_AUTH else None
with TorRequests(auth_data=auth_data) as tor_requests:
links = [
'https://httpbin.org/headers',
'https://google.com',
'https://ifconfig.me',
'http://facebookcorewwwi.onion',
]
if HS_BASIC_HOST:
links.append('http://' + HS_BASIC_HOST)
links = links * 10
with tor_requests.get_session(retries=RETRIES) as sess:
def process(link):
try:
logger.debug('get link: %s', link)
r = sess.get(link, timeout=30)
logger.warning('get link %s finish: %s', link, r)
return r
except BaseException:
logger.exception('get link %s error', link)
pool = ThreadPool(10)
for i, w in enumerate(pool._pool):
w.name = 'Worker{}'.format(i)
results = pool.map(process, links)
pool.close()
pool.join()
logger.debug('test_multi_threaded ends: %r', results)
@retry(RETRIES, (TimeoutError, ConnectionError, ))
def test_basic_auth():
"""Connecting to Hidden Service with 'Basic' authorization."""
if not HS_BASIC_HOST or not HS_BASIC_AUTH:
logger.warning('Skip test_basic_auth()')
return
hs = HiddenService(HS_BASIC_HOST, HS_BASIC_AUTH, AuthType.Basic)
tor = TorClient()
# Choose random guard node and create 3-hops circuit
with tor.create_circuit(3) as circuit:
# Create tor stream to host
with circuit.create_stream((hs, 80)) as stream:
# Send some data to it
stream.send(b'GET / HTTP/1.0\r\nHost: %s.onion\r\n\r\n' % hs.onion.encode())
recv = recv_all(stream).decode()
logger.warning('recv: %s', recv)
@retry(RETRIES, (TimeoutError, ConnectionError, ))
def test_stealth_auth():
"""Connecting to Hidden Service with 'Stealth' authorization."""
if not HS_STEALTH_HOST or not HS_STEALTH_AUTH:
logger.warning('Skip test_stealth_auth()')
return
hs = HiddenService(HS_STEALTH_HOST, HS_STEALTH_AUTH, AuthType.Stealth)
tor = TorClient()
# Choose random guard node and create 3-hops circuit
with tor.create_circuit(3) as circuit:
# Create tor stream to host
with circuit.create_stream((hs, 80)) as stream:
# Send some data to it
stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hs.hostname.encode())
recv = recv_all(stream).decode()
logger.warning('recv: %s', recv)
@retry(RETRIES, (TimeoutError, ConnectionError, ))
def test_basic_auth_pre():
"""Using pre-defined authorization data for making HTTP requests."""
if not HS_BASIC_HOST or not HS_BASIC_AUTH:
logger.warning('Skip test_basic_auth()')
return
hidden_service = HS_BASIC_HOST
auth_data = {HS_BASIC_HOST: (HS_BASIC_AUTH, AuthType.Basic)}
tor = TorClient(auth_data=auth_data)
# Choose random guard node and create 3-hops circuit
with tor.create_circuit(3) as circuit:
# Create tor stream to host
with circuit.create_stream((hidden_service, 80)) as stream:
# Send some data to it
stream.send(b'GET / HTTP/1.0\r\nHost: %s.onion\r\n\r\n' % hidden_service.encode())
recv = recv_all(stream).decode()
logger.warning('recv: %s', recv)
def test_requests_hidden():
"""Using pre-defined authorization data for making HTTP requests by tor_requests_session."""
if not HS_BASIC_HOST or not HS_BASIC_AUTH:
logger.warning('Skip test_requests_hidden()')
return
auth_data = {HS_BASIC_HOST: (HS_BASIC_AUTH, AuthType.Basic)}
with tor_requests_session(auth_data=auth_data, retries=RETRIES) as sess:
r = sess.get('http://{}/'.format(HS_BASIC_HOST), timeout=30)
logger.warning(r)
logger.warning(r.text)
@retry(2, (TimeoutError, ConnectionError, ))
def test_select():
sock_r, sock_w = socket.socketpair()
events = {TorStream: {'data': Event(), 'close': Event()},
socket.socket: {'data': Event(), 'close': Event()}}
hostname = 'ifconfig.me'
tor = TorClient()
with tor.get_guard() as guard:
def recv_callback(sock_or_stream, mask):
logger.debug(f'recv_callback {sock_or_stream}')
kind = type(sock_or_stream)
data = sock_or_stream.recv(1024)
logger.info('%s: %r', kind.__name__, data.decode())
if data:
events[kind]['data'].set()
else:
logger.debug('closing')
guard.unregister(sock_or_stream)
events[kind]['close'].set()
with guard.create_circuit(3) as circuit:
with circuit.create_stream((hostname, 80)) as stream:
guard.register(sock_r, EVENT_READ, recv_callback)
guard.register(stream, EVENT_READ, recv_callback)
stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hostname.encode())
sock_w.send(b'some data')
assert events[socket.socket]['data'].wait(10), 'no sock data received'
assert events[TorStream]['data'].wait(30), 'no stream data received'
sock_w.close()
assert events[socket.socket]['close'].wait(10), 'no sock close received'
assert events[TorStream]['close'].wait(10), 'no stream close received'
if __name__=='__main__':
test_torpy()