summaryrefslogtreecommitdiff
path: root/vendor/github.com/cretz/bine/tor/tor.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/cretz/bine/tor/tor.go')
-rw-r--r--vendor/github.com/cretz/bine/tor/tor.go453
1 files changed, 453 insertions, 0 deletions
diff --git a/vendor/github.com/cretz/bine/tor/tor.go b/vendor/github.com/cretz/bine/tor/tor.go
new file mode 100644
index 0000000..0edd241
--- /dev/null
+++ b/vendor/github.com/cretz/bine/tor/tor.go
@@ -0,0 +1,453 @@
+package tor
+
+import (
+ "context"
+ "fmt"
+ "io"
+ "io/ioutil"
+ "net/textproto"
+ "os"
+ "path/filepath"
+ "strconv"
+ "time"
+
+ "github.com/cretz/bine/control"
+
+ "github.com/cretz/bine/process"
+)
+
+// Tor is the wrapper around the Tor process and control port connection. It
+// should be created with Start and developers should always call Close when
+// done.
+type Tor struct {
+ // Process is the Tor instance that is running.
+ Process process.Process
+
+ // Control is the Tor controller connection.
+ Control *control.Conn
+
+ // ProcessCancelFunc is the context cancellation func for the Tor process.
+ // It is used by Close and should not be called directly. This can be nil.
+ ProcessCancelFunc context.CancelFunc
+
+ // ControlPort is the port that Control is connected on. It is 0 if the
+ // connection is an embedded control connection.
+ ControlPort int
+
+ // DataDir is the path to the data directory that Tor is using.
+ DataDir string
+
+ // DeleteDataDirOnClose is true if, when Close is invoked, the entire
+ // directory will be deleted.
+ DeleteDataDirOnClose bool
+
+ // DebugWriter is the writer used for debug logs, or nil if debug logs
+ // should not be emitted.
+ DebugWriter io.Writer
+
+ // StopProcessOnClose, if true, will attempt to halt the process on close.
+ StopProcessOnClose bool
+
+ // GeoIPCreatedFile is the path, relative to DataDir, that was created from
+ // StartConf.GeoIPFileReader. It is empty if no file was created.
+ GeoIPCreatedFile string
+
+ // GeoIPv6CreatedFile is the path, relative to DataDir, that was created
+ // from StartConf.GeoIPFileReader. It is empty if no file was created.
+ GeoIPv6CreatedFile string
+}
+
+// StartConf is the configuration used for Start when starting a Tor instance. A
+// default instance with no fields set is the default used for Start.
+type StartConf struct {
+ // ExePath is the path to the Tor executable. If it is not present, "tor" is
+ // used either locally or on the PATH. This is ignored if ProcessCreator is
+ // set.
+ ExePath string
+
+ // ProcessCreator is the override to use a specific process creator. If set,
+ // ExePath is ignored.
+ ProcessCreator process.Creator
+
+ // UseEmbeddedControlConn can be set to true to use
+ // process.Process.EmbeddedControlConn() instead of creating a connection
+ // via ControlPort. Note, this only works when ProcessCreator is an
+ // embedded Tor creator with version >= 0.3.5.x.
+ UseEmbeddedControlConn bool
+
+ // ControlPort is the port to use for the Tor controller. If it is 0, Tor
+ // picks a port for use. This is ignored if UseEmbeddedControlConn is true.
+ ControlPort int
+
+ // DataDir is the directory used by Tor. If it is empty, a temporary
+ // directory is created in TempDataDirBase.
+ DataDir string
+
+ // TempDataDirBase is the parent directory that a temporary data directory
+ // will be created under for use by Tor. This is ignored if DataDir is not
+ // empty. If empty it is assumed to be the current working directory.
+ TempDataDirBase string
+
+ // RetainTempDataDir, if true, will not set the created temporary data
+ // directory to be deleted on close. This is ignored if DataDir is not
+ // empty.
+ RetainTempDataDir bool
+
+ // DisableCookieAuth, if true, will not use the default SAFECOOKIE
+ // authentication mechanism for the Tor controller.
+ DisableCookieAuth bool
+
+ // DisableEagerAuth, if true, will not authenticate on Start.
+ DisableEagerAuth bool
+
+ // EnableNetwork, if true, will connect to the wider Tor network on start.
+ EnableNetwork bool
+
+ // ExtraArgs is the set of extra args passed to the Tor instance when
+ // started.
+ ExtraArgs []string
+
+ // TorrcFile is the torrc file to set on start. If empty, a blank torrc is
+ // created in the data directory and is used instead.
+ TorrcFile string
+
+ // DebugWriter is the writer to use for debug logs, or nil for no debug
+ // logs.
+ DebugWriter io.Writer
+
+ // NoHush if true does not set --hush. By default --hush is set.
+ NoHush bool
+
+ // NoAutoSocksPort if true does not set "--SocksPort auto" as is done by
+ // default. This means the caller could set their own or just let it
+ // default to 9050.
+ NoAutoSocksPort bool
+
+ // GeoIPReader, if present, is called before start to copy geo IP files to
+ // the data directory. Errors are propagated. If the ReadCloser is present,
+ // it is copied to the data dir, overwriting as necessary, and then closed
+ // and the appropriate command line argument is added to reference it. If
+ // both the ReadCloser and error are nil, no copy or command line argument
+ // is used for that version. This is called twice, once with false and once
+ // with true for ipv6.
+ //
+ // This can be set to torutil/geoipembed.GeoIPReader to use an embedded
+ // source.
+ GeoIPFileReader func(ipv6 bool) (io.ReadCloser, error)
+}
+
+// Start a Tor instance and connect to it. If ctx is nil, context.Background()
+// is used. If conf is nil, a default instance is used.
+func Start(ctx context.Context, conf *StartConf) (*Tor, error) {
+ if ctx == nil {
+ ctx = context.Background()
+ }
+ if conf == nil {
+ conf = &StartConf{}
+ }
+ tor := &Tor{DataDir: conf.DataDir, DebugWriter: conf.DebugWriter, StopProcessOnClose: true}
+ // Create the data dir and make it absolute
+ if tor.DataDir == "" {
+ tempBase := conf.TempDataDirBase
+ if tempBase == "" {
+ tempBase = "."
+ }
+ var err error
+ if tempBase, err = filepath.Abs(tempBase); err != nil {
+ return nil, err
+ }
+ if tor.DataDir, err = ioutil.TempDir(tempBase, "data-dir-"); err != nil {
+ return nil, fmt.Errorf("Unable to create temp data dir: %v", err)
+ }
+ tor.Debugf("Created temp data directory at: %v", tor.DataDir)
+ tor.DeleteDataDirOnClose = !conf.RetainTempDataDir
+ } else if err := os.MkdirAll(tor.DataDir, 0700); err != nil {
+ return nil, fmt.Errorf("Unable to create data dir: %v", err)
+ }
+
+ // !!!! From this point on, we must close tor if we error !!!!
+
+ // Copy geoip stuff if necessary
+ err := tor.copyGeoIPFiles(conf)
+ // Start tor
+ if err == nil {
+ err = tor.startProcess(ctx, conf)
+ }
+ // Connect the controller
+ if err == nil {
+ err = tor.connectController(ctx, conf)
+ }
+ // Attempt eager auth w/ no password
+ if err == nil && !conf.DisableEagerAuth {
+ err = tor.Control.Authenticate("")
+ }
+ // If there was an error, we have to try to close here but it may leave the process open
+ if err != nil {
+ if closeErr := tor.Close(); closeErr != nil {
+ err = fmt.Errorf("Error on start: %v (also got error trying to close: %v)", err, closeErr)
+ }
+ }
+ return tor, err
+}
+
+func (t *Tor) copyGeoIPFiles(conf *StartConf) error {
+ if conf.GeoIPFileReader == nil {
+ return nil
+ }
+ if r, err := conf.GeoIPFileReader(false); err != nil {
+ return fmt.Errorf("Unable to read geoip file: %v", err)
+ } else if r != nil {
+ t.GeoIPCreatedFile = "geoip"
+ if err := createFile(filepath.Join(t.DataDir, "geoip"), r); err != nil {
+ return fmt.Errorf("Unable to create geoip file: %v", err)
+ }
+ }
+ if r, err := conf.GeoIPFileReader(true); err != nil {
+ return fmt.Errorf("Unable to read geoip6 file: %v", err)
+ } else if r != nil {
+ t.GeoIPv6CreatedFile = "geoip6"
+ if err := createFile(filepath.Join(t.DataDir, "geoip6"), r); err != nil {
+ return fmt.Errorf("Unable to create geoip6 file: %v", err)
+ }
+ }
+ return nil
+}
+
+func createFile(to string, from io.ReadCloser) error {
+ f, err := os.Create(to)
+ if err == nil {
+ _, err = io.Copy(f, from)
+ if closeErr := f.Close(); err == nil {
+ err = closeErr
+ }
+ }
+ if closeErr := from.Close(); err == nil {
+ err = closeErr
+ }
+ return err
+}
+
+func (t *Tor) startProcess(ctx context.Context, conf *StartConf) error {
+ // Get the creator
+ creator := conf.ProcessCreator
+ if creator == nil {
+ torPath := conf.ExePath
+ if torPath == "" {
+ torPath = "tor"
+ }
+ creator = process.NewCreator(torPath)
+ }
+ // Build the args
+ args := []string{"--DataDirectory", t.DataDir}
+ if !conf.DisableCookieAuth {
+ args = append(args, "--CookieAuthentication", "1")
+ }
+ if !conf.EnableNetwork {
+ args = append(args, "--DisableNetwork", "1")
+ }
+ if !conf.NoHush {
+ args = append(args, "--hush")
+ }
+ if !conf.NoAutoSocksPort {
+ args = append(args, "--SocksPort", "auto")
+ }
+ if t.GeoIPCreatedFile != "" {
+ args = append(args, "--GeoIPFile", filepath.Join(t.DataDir, t.GeoIPCreatedFile))
+ }
+ if t.GeoIPv6CreatedFile != "" {
+ args = append(args, "--GeoIPv6File", filepath.Join(t.DataDir, t.GeoIPv6CreatedFile))
+ }
+ // If there is no Torrc file, create a blank temp one
+ torrcFileName := conf.TorrcFile
+ if torrcFileName == "" {
+ torrcFile, err := ioutil.TempFile(t.DataDir, "torrc-")
+ if err != nil {
+ return err
+ }
+ torrcFileName = torrcFile.Name()
+ if err = torrcFile.Close(); err != nil {
+ return err
+ }
+ }
+ args = append(args, "-f", torrcFileName)
+ // Create file for Tor to write the control port to if it's not told to us and we're not embedded
+ var controlPortFileName string
+ var err error
+ if !conf.UseEmbeddedControlConn {
+ if conf.ControlPort == 0 {
+ controlPortFile, err := ioutil.TempFile(t.DataDir, "control-port-")
+ if err != nil {
+ return err
+ }
+ controlPortFileName = controlPortFile.Name()
+ if err = controlPortFile.Close(); err != nil {
+ return err
+ }
+ args = append(args, "--ControlPort", "auto", "--ControlPortWriteToFile", controlPortFile.Name())
+ } else {
+ args = append(args, "--ControlPort", strconv.Itoa(conf.ControlPort))
+ }
+ }
+ // Create process creator with args
+ var processCtx context.Context
+ processCtx, t.ProcessCancelFunc = context.WithCancel(ctx)
+ args = append(args, conf.ExtraArgs...)
+ p, err := creator.New(processCtx, args...)
+ if err != nil {
+ return err
+ }
+ // Use the embedded conn if requested
+ if conf.UseEmbeddedControlConn {
+ t.Debugf("Using embedded control connection")
+ conn, err := p.EmbeddedControlConn()
+ if err != nil {
+ return fmt.Errorf("Unable to get embedded control conn: %v", err)
+ }
+ t.Control = control.NewConn(textproto.NewConn(conn))
+ t.Control.DebugWriter = t.DebugWriter
+ }
+ // Start process with the args
+ t.Debugf("Starting tor with args %v", args)
+ if err = p.Start(); err != nil {
+ return err
+ }
+ t.Process = p
+ // If not embedded, try a few times to read the control port file if we need to
+ if !conf.UseEmbeddedControlConn {
+ t.ControlPort = conf.ControlPort
+ if t.ControlPort == 0 {
+ ControlPortCheck:
+ for i := 0; i < 10; i++ {
+ select {
+ case <-ctx.Done():
+ err = ctx.Err()
+ break ControlPortCheck
+ default:
+ // Try to read the controlport file, or wait a bit
+ var byts []byte
+ if byts, err = ioutil.ReadFile(controlPortFileName); err != nil {
+ break ControlPortCheck
+ } else if t.ControlPort, err = process.ControlPortFromFileContents(string(byts)); err == nil {
+ break ControlPortCheck
+ }
+ time.Sleep(200 * time.Millisecond)
+ }
+ }
+ if err != nil {
+ return fmt.Errorf("Unable to read control port file: %v", err)
+ }
+ }
+ }
+ return nil
+}
+
+func (t *Tor) connectController(ctx context.Context, conf *StartConf) error {
+ // This doesn't apply if already connected (e.g. using embedded conn)
+ if t.Control != nil {
+ return nil
+ }
+ t.Debugf("Connecting to control port %v", t.ControlPort)
+ textConn, err := textproto.Dial("tcp", "127.0.0.1:"+strconv.Itoa(t.ControlPort))
+ if err != nil {
+ return err
+ }
+ t.Control = control.NewConn(textConn)
+ t.Control.DebugWriter = t.DebugWriter
+ return nil
+}
+
+// EnableNetwork sets DisableNetwork to 0 and optionally waits for bootstrap to
+// complete. The context can be nil. If DisableNetwork isnt 1, this does
+// nothing.
+func (t *Tor) EnableNetwork(ctx context.Context, wait bool) error {
+ if ctx == nil {
+ ctx = context.Background()
+ }
+ // Only enable if DisableNetwork is 1
+ if vals, err := t.Control.GetConf("DisableNetwork"); err != nil {
+ return err
+ } else if len(vals) == 0 || vals[0].Key != "DisableNetwork" || vals[0].Val != "1" {
+ return nil
+ }
+ // Enable the network
+ if err := t.Control.SetConf(control.KeyVals("DisableNetwork", "0")...); err != nil {
+ return nil
+ }
+ // If not waiting, leave
+ if !wait {
+ return nil
+ }
+ // Wait for progress to hit 100
+ _, err := t.Control.EventWait(ctx, []control.EventCode{control.EventCodeStatusClient},
+ func(evt control.Event) (bool, error) {
+ if status, _ := evt.(*control.StatusEvent); status != nil && status.Action == "BOOTSTRAP" {
+ if status.Severity == "NOTICE" && status.Arguments["PROGRESS"] == "100" {
+ return true, nil
+ } else if status.Severity == "ERR" {
+ return false, fmt.Errorf("Failing bootstrapping, Tor warning: %v", status.Arguments["WARNING"])
+ }
+ }
+ return false, nil
+ })
+ return err
+}
+
+// Close sends a halt to the Tor process if it can, closes the controller
+// connection, and stops the process.
+func (t *Tor) Close() error {
+ t.Debugf("Closing Tor")
+ errs := []error{}
+ // If controller is authenticated, send the quit signal to the process. Otherwise, just close the controller.
+ sentHalt := false
+ if t.Control != nil {
+ if t.Control.Authenticated && t.StopProcessOnClose {
+ if err := t.Control.Signal("HALT"); err != nil {
+ errs = append(errs, fmt.Errorf("Unable to signal halt: %v", err))
+ } else {
+ sentHalt = true
+ }
+ }
+ // Now close the controller
+ if err := t.Control.Close(); err != nil {
+ errs = append(errs, fmt.Errorf("Unable to close contrlller: %v", err))
+ } else {
+ t.Control = nil
+ }
+ }
+ if t.Process != nil {
+ // If we didn't halt, we have to force kill w/ the cancel func
+ if !sentHalt && t.StopProcessOnClose {
+ t.ProcessCancelFunc()
+ }
+ // Wait for a bit to make sure it stopped
+ errCh := make(chan error, 1)
+ var waitErr error
+ go func() { errCh <- t.Process.Wait() }()
+ select {
+ case waitErr = <-errCh:
+ if waitErr != nil {
+ errs = append(errs, fmt.Errorf("Process wait failed: %v", waitErr))
+ }
+ case <-time.After(300 * time.Millisecond):
+ errs = append(errs, fmt.Errorf("Process did not exit after 300 ms"))
+ }
+ if waitErr == nil {
+ t.Process = nil
+ }
+ }
+ // Get rid of the entire data dir
+ if t.DeleteDataDirOnClose {
+ if err := os.RemoveAll(t.DataDir); err != nil {
+ errs = append(errs, fmt.Errorf("Failed to remove data dir %v: %v", t.DataDir, err))
+ }
+ }
+ // Combine the errors if present
+ if len(errs) == 0 {
+ return nil
+ } else if len(errs) == 1 {
+ t.Debugf("Error while closing Tor: %v", errs[0])
+ return errs[0]
+ }
+ t.Debugf("Errors while closing Tor: %v", errs)
+ return fmt.Errorf("Got %v errors while closing - %v", len(errs), errs)
+}