From 8a0c8b2a0cfa2ad84113d1e041fa4ce4c8704ffc Mon Sep 17 00:00:00 2001 From: "Kali Kaneko (leap communications)" Date: Thu, 27 Apr 2017 20:00:50 +0200 Subject: [docs] update the manhole documentation --- docs/changelog.rst | 1 + docs/hacking/index.rst | 5 +++++ docs/hacking/manhole.rst | 24 ++++++++++++++++++++++++ docs/mail/hacking.rst | 22 ---------------------- 4 files changed, 30 insertions(+), 22 deletions(-) create mode 100644 docs/hacking/manhole.rst diff --git a/docs/changelog.rst b/docs/changelog.rst index 0a478bea..04c43445 100644 --- a/docs/changelog.rst +++ b/docs/changelog.rst @@ -19,6 +19,7 @@ Features - VPN and Mail status displayed in the UI - Port Pixelated UA integration from legacy bitmask - Add Pixelated Button to the UI +- Add ability to ssh into the bitmask daemon for debug Bugfixes ~~~~~~~~ diff --git a/docs/hacking/index.rst b/docs/hacking/index.rst index c9143bde..af3c5f25 100644 --- a/docs/hacking/index.rst +++ b/docs/hacking/index.rst @@ -104,6 +104,11 @@ This extension gets published to the `mozilla addons page`_. .. _`this repo`: https://0xacab.org/leap/bitmask_thunderbird .. _`mozilla addons page`: https://addons.mozilla.org/en-US/thunderbird/addon/bitmask +Debugging Bitmask +--------------------------------- + +A must-read for debugging the Bitmask Core daemon is the :ref:`manhole HowTo `. + How to contribute code --------------------------------- diff --git a/docs/hacking/manhole.rst b/docs/hacking/manhole.rst new file mode 100644 index 00000000..cea3581d --- /dev/null +++ b/docs/hacking/manhole.rst @@ -0,0 +1,24 @@ +.. _manhole: + +The manhole HowTo +------------------------------------------------- + +Troubles with Bitmask Daemon? Don't panic! Just SSH into it + +If you want to inspect the objects living in your application memory, in +realtime, you can ssh into it. + +For that, you must add the following section to your ``bitmaskd.cfg`` +configuration file:: + + [manhole] + user = bitmask + passwd = + port = 22900 + + +And then you can ssh into your application:: + + ssh bitmask@localhost -p 22900 + +Did I mention how *awesome* twisted is?? ``:)`` diff --git a/docs/mail/hacking.rst b/docs/mail/hacking.rst index 27087e52..10e3dbcb 100644 --- a/docs/mail/hacking.rst +++ b/docs/mail/hacking.rst @@ -6,28 +6,6 @@ Hacking on Bitmask Mail Some hints oriented to `leap.mail` hackers. These notes are mostly related to the imap server, although they probably will be useful for other pieces too. -Don't panic! Just manhole into it ---------------------------------- - - -If you want to inspect the objects living in your application memory, in -realtime, you can manhole into it. - -First of all, check that the modules ``PyCrypto`` and ``pyasn1`` are installed -into your system, they are needed for it to work. - -You just have to pass the ``LEAP_MAIL_MANHOLE=1`` enviroment variable while -launching the client:: - - LEAP_MAIL_MANHOLE=1 bitmask --debug - -And then you can ssh into your application! (password is "leap"):: - - ssh boss@localhost -p 2222 - -Did I mention how *awesome* twisted is?? ``:)`` - - Profiling ---------- -- cgit v1.2.3