Compare commits
7 Commits
f3677ad45e
...
05c9ae8d6e
Author | SHA1 | Date | |
---|---|---|---|
05c9ae8d6e | |||
64b9698010 | |||
d9e68d50fe | |||
1c6da7a091 | |||
609ccfbf27 | |||
a78cddfdb1 | |||
a38b6ee751 |
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -6,3 +6,4 @@ venv
|
||||||
/*.egg-info
|
/*.egg-info
|
||||||
*.pyc
|
*.pyc
|
||||||
__pycache__
|
__pycache__
|
||||||
|
.idea
|
34
build-deb.sh
34
build-deb.sh
|
@ -1,33 +1,35 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
TORCH_VERSION=$(git describe --tags --abbrev=0)
|
if [[ -z "${DEB_EMAIL}" ]]; then
|
||||||
PROJECT=torch-agent-$TORCH_VERSION
|
DEB_EMAIL="$1"
|
||||||
|
|
||||||
if [[ -z "${DEBEMAIL}" ]]; then
|
|
||||||
DEBEMAIL="$1"
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ -z "${DEBEMAIL}" ]]; then
|
if [[ -z "${DEB_EMAIL}" ]]; then
|
||||||
echo "E-mail address required for packaging signing with gpg key!"
|
echo "E-mail address required for packaging signing with gpg key!"
|
||||||
echo "Usage: ./build-deb.sh EMAIL"
|
echo "Usage: ./build-deb.sh EMAIL"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
TORCH_VERSION=$(git describe --tags --abbrev=0)
|
||||||
|
PROJECT=torch-agent-$TORCH_VERSION
|
||||||
|
|
||||||
BUILD_DIR=dist
|
BUILD_DIR=dist
|
||||||
DEB_DIR=$BUILD_DIR/$PROJECT
|
DEB_DIR=$BUILD_DIR/$PROJECT
|
||||||
|
|
||||||
rm -rf $BUILD_DIR/*
|
rm -rf "${BUILD_DIR:?}/"*
|
||||||
|
|
||||||
|
pip3 install -r requirements.txt
|
||||||
python3 setup.py sdist
|
python3 setup.py sdist
|
||||||
|
|
||||||
mkdir -p $DEB_DIR/src/etc/torch
|
mkdir -p "$DEB_DIR/src/etc/torch"
|
||||||
cp -r debian $DEB_DIR/
|
cp -r debian "$DEB_DIR/"
|
||||||
cp torch.conf $DEB_DIR/src/etc/torch/
|
cp torch.conf "$DEB_DIR/src/etc/torch/"
|
||||||
|
|
||||||
cd $BUILD_DIR
|
cd $BUILD_DIR || exit
|
||||||
tar -xzmf $PROJECT.tar.gz
|
tar -xzmf "$PROJECT.tar.gz"
|
||||||
|
|
||||||
cd $PROJECT
|
cd "$PROJECT" || exit
|
||||||
export USER=`whoami`
|
export USER
|
||||||
dh_make --createorig -e $DEBEMAIL -s -y
|
USER=$(whoami)
|
||||||
dpkg-buildpackage -k$DEBEMAIL
|
dh_make --createorig -e "$DEB_EMAIL" -s -y
|
||||||
|
dpkg-buildpackage -k"$DEB_EMAIL"
|
||||||
|
|
3
pyproject.toml
Normal file
3
pyproject.toml
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[build-system]
|
||||||
|
requires = ["setuptools", "wheel"]
|
||||||
|
build-backend = "setuptools.build_meta"
|
5
requirements.txt
Normal file
5
requirements.txt
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
pip~=20.2.4
|
||||||
|
setuptools~=50.3.2
|
||||||
|
stdeb3~=0.9.0.post2
|
||||||
|
paho-mqtt~=1.5.1
|
||||||
|
stem>=1.8.0
|
|
@ -1,5 +0,0 @@
|
||||||
wheel>=0.35.1
|
|
||||||
setuptools>=44.0.0
|
|
||||||
stem>=1.8.0
|
|
||||||
paho-mqtt>=1.5.1
|
|
||||||
PySocks>=1.7.1
|
|
24
setup.cfg
Normal file
24
setup.cfg
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
[metadata]
|
||||||
|
name = torch-agent
|
||||||
|
version = attrib: torch_agent.__version__
|
||||||
|
author = Benjamin Dweck
|
||||||
|
author_email = bjdweck@gmail.com
|
||||||
|
description = TORch: Illuminate the Way to your Node
|
||||||
|
url = https://git.rudefox.io/bj/torch-agent
|
||||||
|
classifiers =
|
||||||
|
Programming Language :: Python :: 3
|
||||||
|
License :: OSI Approved :: MIT License
|
||||||
|
|
||||||
|
[options]
|
||||||
|
packages = find:
|
||||||
|
install_requires =
|
||||||
|
paho-mqtt~=1.5.1
|
||||||
|
setuptools~=50.3.1
|
||||||
|
pip~=20.2.3
|
||||||
|
stem
|
||||||
|
|
||||||
|
[options.entry_points]
|
||||||
|
console_scripts = torch-agent=torch_agent.torch_agent:main
|
||||||
|
|
||||||
|
[options.packages.find]
|
||||||
|
exclude=test
|
30
setup.py
30
setup.py
|
@ -1,32 +1,4 @@
|
||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
import setuptools
|
import setuptools
|
||||||
import torch_agent
|
|
||||||
|
|
||||||
with open("README.md", "r") as fh:
|
|
||||||
long_description = fh.read()
|
|
||||||
|
|
||||||
setuptools.setup(
|
|
||||||
name="torch-agent",
|
|
||||||
version=torch_agent.__version__,
|
|
||||||
author="B.J. Dweck",
|
|
||||||
author_email="bjdweck@gmail.com",
|
|
||||||
description="TORch: Iluminate the Way to your Node",
|
|
||||||
long_description=long_description,
|
|
||||||
long_description_content_type="text/markdown",
|
|
||||||
url="https://git.rudefox.io/bj/torch-agent",
|
|
||||||
packages=setuptools.find_packages(),
|
|
||||||
install_requires=[
|
|
||||||
'stem',
|
|
||||||
'paho-mqtt>=1.5.1',
|
|
||||||
'PySocks',
|
|
||||||
],
|
|
||||||
entry_points = {
|
|
||||||
'console_scripts': ['torch-agent=torch_agent.torch_agent:main'],
|
|
||||||
},
|
|
||||||
classifiers=[
|
|
||||||
"Programming Language :: Python :: 3",
|
|
||||||
"License :: OSI Approved :: MIT License",
|
|
||||||
],
|
|
||||||
python_requires='>=3.6',
|
|
||||||
)
|
|
||||||
|
|
||||||
|
setuptools.setup()
|
||||||
|
|
|
@ -6,7 +6,10 @@ ControllerPort = 9051
|
||||||
Port = 22
|
Port = 22
|
||||||
|
|
||||||
[mqtt]
|
[mqtt]
|
||||||
BrokerHost = mqtt.example.com # OR example1i3uyrbfoi3fi.onion
|
|
||||||
|
BrokerHost = mqtt.example.com
|
||||||
|
#BrokerHost = example1i3uyrbfoi3fi.onion
|
||||||
|
|
||||||
BrokerPort = 1883
|
BrokerPort = 1883
|
||||||
ClientID = my-client
|
ClientID = my-client
|
||||||
Topic = example/topic
|
Topic = example/topic
|
||||||
|
|
|
@ -1,8 +1,8 @@
|
||||||
from stem.control import Controller
|
from stem.control import Controller
|
||||||
import stem.connection
|
import stem.connection
|
||||||
import paho.mqtt.client as mqtt
|
import paho.mqtt.client as mqtt
|
||||||
|
from paho.mqtt.client import socks
|
||||||
import ssl
|
import ssl
|
||||||
import socks
|
|
||||||
import socket
|
import socket
|
||||||
import json
|
import json
|
||||||
import configparser
|
import configparser
|
||||||
|
@ -10,88 +10,89 @@ import argparse
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
from os import environ
|
from os import environ
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
parser = argparse.ArgumentParser(description='Broadcast SSH hidden service hostname via MQTT')
|
parser = argparse.ArgumentParser(description='Broadcast SSH hidden service hostname via MQTT')
|
||||||
|
|
||||||
parser.add_argument('--config-dir', nargs='?', dest='configPath', default='/etc/torch',
|
parser.add_argument('--config-dir', nargs='?', dest='configPath', default='/etc/torch',
|
||||||
help='configuration directory (default: /etc/torch)')
|
help='configuration directory (default: /etc/torch)')
|
||||||
|
|
||||||
args = parser.parse_args()
|
args = parser.parse_args()
|
||||||
|
|
||||||
configPath = args.configPath
|
config_path = args.configPath
|
||||||
|
|
||||||
if "TORCH_CONFIG_DIR" in environ:
|
if "TORCH_CONFIG_DIR" in environ:
|
||||||
configPath = environ.get("TORCH_CONFIG_DIR")
|
config_path = environ.get("TORCH_CONFIG_DIR")
|
||||||
|
|
||||||
if not configPath.endswith("/"):
|
if not config_path.endswith("/"):
|
||||||
configPath = configPath + "/"
|
config_path = config_path + "/"
|
||||||
|
|
||||||
print("Using torch configuration path: " + configPath)
|
print("Using torch configuration path: " + config_path)
|
||||||
|
|
||||||
config = configparser.ConfigParser()
|
config = configparser.ConfigParser()
|
||||||
config.read(configPath + "torch.conf")
|
config.read(config_path + "torch.conf")
|
||||||
|
|
||||||
torProxyPort = config['tor'].getint('ProxyPort', fallback = 9050)
|
tor_proxy_port = config['tor'].getint('ProxyPort', fallback=9050)
|
||||||
torControllerPort = config['tor'].getint('ControllerPort', fallback = 9051)
|
tor_controller_port = config['tor'].getint('ControllerPort', fallback=9051)
|
||||||
|
|
||||||
sshPort = config['ssh'].getint('Port', fallback = 22)
|
ssh_port = config['ssh'].getint('Port', fallback=22)
|
||||||
|
|
||||||
mqttConfig = config['mqtt']
|
mqtt_config = config['mqtt']
|
||||||
mqttBrokerHost = mqttConfig.get('BrokerHost', fallback = "localhost")
|
mqtt_broker_host = mqtt_config.get('BrokerHost', fallback="localhost")
|
||||||
mqttBrokerPort = mqttConfig.getint('BrokerPort', fallback = 1883)
|
mqtt_broker_port = mqtt_config.getint('BrokerPort', fallback=1883)
|
||||||
clientID = mqttConfig.get('ClientID', fallback = socket.gethostname())
|
client_id = mqtt_config.get('ClientID', fallback=socket.gethostname())
|
||||||
mqttTopic = mqttConfig.get('Topic', fallback = "torch/%s/onion_url" % (clientID))
|
mqtt_topic = mqtt_config.get('Topic', fallback="torch/%s/onion_url" % client_id)
|
||||||
|
|
||||||
mqttRequireCertificate = mqttConfig.getboolean(
|
mqtt_require_certificate = mqtt_config.getboolean(
|
||||||
'RequireCertificate',
|
'RequireCertificate',
|
||||||
fallback = False)
|
fallback=False)
|
||||||
|
|
||||||
mqttCaFile = configPath + mqttConfig.get('CaFile')
|
mqtt_ca_file = config_path + mqtt_config.get('CaFile')
|
||||||
mqttCertFile = configPath + mqttConfig.get('CertFile')
|
mqtt_cert_file = config_path + mqtt_config.get('CertFile')
|
||||||
mqttKeyFile = configPath + mqttConfig.get('KeyFile')
|
mqtt_key_file = config_path + mqtt_config.get('KeyFile')
|
||||||
|
|
||||||
with Controller.from_port(port = torControllerPort) as controller:
|
with Controller.from_port(port=tor_controller_port) as controller:
|
||||||
|
|
||||||
protocolInfo = stem.connection.get_protocolinfo(controller)
|
|
||||||
|
|
||||||
stem.connection.authenticate_safecookie(
|
protocol_info = stem.connection.get_protocolinfo(controller)
|
||||||
controller,
|
|
||||||
protocolInfo.cookie_path)
|
|
||||||
|
|
||||||
print("Connected to Tor on port %s" % (torControllerPort))
|
|
||||||
|
|
||||||
service = controller.create_ephemeral_hidden_service(sshPort, detached = True)
|
stem.connection.authenticate_safecookie(
|
||||||
|
controller,
|
||||||
|
protocol_info.cookie_path)
|
||||||
|
|
||||||
onionAddress = "%s.onion" % (service.service_id)
|
print("Connected to Tor on port %s" % tor_controller_port)
|
||||||
|
|
||||||
print("Created Tor Hidden Service for local port %s at %s" % (sshPort, onionAddress))
|
service = controller.create_ephemeral_hidden_service(ssh_port, detached=True)
|
||||||
|
|
||||||
payload = {
|
onion_address = "%s.onion" % service.service_id
|
||||||
'clientId': clientID,
|
|
||||||
'timestamp': datetime.now().strftime("%d-%b-%Y (%H:%M:%S.%f)"),
|
print("Created Tor Hidden Service for local port %s at %s" % (ssh_port, onion_address))
|
||||||
'onionAddress': onionAddress,
|
|
||||||
'sshPort': sshPort
|
payload = {
|
||||||
|
'clientId': client_id,
|
||||||
|
'timestamp': datetime.now().strftime("%d-%b-%Y (%H:%M:%S.%f)"),
|
||||||
|
'onionAddress': onion_address,
|
||||||
|
'sshPort': ssh_port
|
||||||
}
|
}
|
||||||
|
|
||||||
client = mqtt.Client()
|
client = mqtt.Client()
|
||||||
protocol = "mqtt"
|
protocol = "mqtt"
|
||||||
|
|
||||||
if mqttRequireCertificate:
|
if mqtt_require_certificate:
|
||||||
client.tls_set(
|
client.tls_set(
|
||||||
ca_certs = mqttCaFile,
|
ca_certs=mqtt_ca_file,
|
||||||
certfile = mqttCertFile,
|
certfile=mqtt_cert_file,
|
||||||
keyfile = mqttKeyFile,
|
keyfile=mqtt_key_file,
|
||||||
cert_reqs=ssl.CERT_REQUIRED)
|
cert_reqs=ssl.CERT_REQUIRED)
|
||||||
protocol = "mqtts"
|
protocol = "mqtts"
|
||||||
|
|
||||||
if mqttBrokerHost.endswith(".onion"):
|
if mqtt_broker_host.endswith(".onion"):
|
||||||
client.proxy_set(proxy_type=socks.SOCKS5, proxy_addr="localhost", proxy_port=torProxyPort)
|
client.proxy_set(proxy_type=socks.SOCKS5, proxy_addr="localhost", proxy_port=tor_proxy_port)
|
||||||
client.tls_insecure_set(True)
|
client.tls_insecure_set(True)
|
||||||
|
|
||||||
client.connect(mqttBrokerHost, mqttBrokerPort, 60)
|
client.connect(mqtt_broker_host, mqtt_broker_port, 60)
|
||||||
client.publish(mqttTopic, json.dumps(payload))
|
client.publish(mqtt_topic, json.dumps(payload))
|
||||||
print("Connected to MQTT Broker at %s://%s:%s/%s" % (protocol, mqttBrokerHost, mqttBrokerPort, mqttTopic))
|
print("Connected to MQTT Broker at %s://%s:%s/%s" % (protocol, mqtt_broker_host, mqtt_broker_port, mqtt_topic))
|
||||||
print("Published payload: " + json.dumps(payload))
|
print("Published payload: " + json.dumps(payload))
|
||||||
|
|
||||||
client.disconnect()
|
client.disconnect()
|
||||||
print("Disconnected from MQTT Broker")
|
print("Disconnected from MQTT Broker")
|
||||||
|
|
Loading…
Reference in New Issue
Block a user