operator-time
quadrismegistus 4 years ago
parent df61ec7569
commit 8e14d81baa

@ -1,6 +1,6 @@
# mine imports
import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
from komrade.operators.caller import Caller
from komrade.backend.caller import Caller
from komrade import KomradeException,Logger
# other imports

@ -1,6 +1,6 @@
import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
from komrade import *
from komrade.operators.crypt import *
from komrade.backend.crypt import *
class Keymaker(Logger):
def __init__(self,name=None,passphrase=None):

@ -24,8 +24,13 @@ def tor_request_in_python(url):
s.mount('http://', adapter)
s.mount('https://', adapter)
r = s.get(url, timeout=30)
# r = s.get(url, timeout=30)
# r = s.post('http://u7spnj3dmwumzoa4.onion/op/',data=b'hello world', timeout=30)
_dat = 'Z29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29rZ29iYmxlZHlnb29r'
r = s.get('http://u7spnj3dmwumzoa4.onion/op/'+_dat, timeout=30)
return r
#return r
# #r = s.get('http://u7spnj3dmwumzoa4.onion',timeout=30)
# print (r, r.text[:1000])

@ -5,13 +5,9 @@ Running on node prime.
# internal imports
import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
from komrade import *
from komrade.operators.crypt import *
from komrade.operators.keymaker import *
from komrade.operators.mazes import *
# external imports
from flask import Flask, request, jsonify
from flask_classful import FlaskView
from komrade.backend.crypt import *
from komrade.backend.keymaker import *
from komrade.backend.mazes import *
OPERATOR_NAME = 'TheOperator'
@ -100,95 +96,6 @@ class TheOperator(Operator):
print(data)
### ACTUAL PHONE CONNECTIONS
class TheTelephone(Logger):
"""
API client class for Caller to interact with The Operator.
"""
def __init__(self, caller):
self.caller = caller
@property
def sess(self):
"""
Get connection to Tor
"""
if not hasattr(self,'_sess'):
self._sess = get_tor_proxy_session()
return self._sess
def req(self,json_coming_from_phone={},json_coming_from_caller={}):
# Two parts of every request:
# 1) only overall encryption layer E2EE Telephone -> Operator:
req_data = []
if json_coming_from_phone:
json_coming_from_phone_s = json.dumps(json_coming_from_phone)
json_coming_from_phone_b = json_coming_from_phone_s.encode()
#json_coming_from_phone_b_encr = SMessage(TELEPHONE_PRIVKEY,OPERATOR_PUBKEY).wrap(json_coming_from_phone_b)
else:
json_coming_from_phone_b=b''
# 2) (optional) extra E2EE encrypted layer Caller -> Operator
if json_coming_from_caller:
json_coming_from_caller_s = json.dumps(json_coming_from_caller)
json_coming_from_caller_b = json_coming_from_caller_s.encode()
json_coming_from_caller_b_encr = SMessage(self.caller.privkey_,OPERATOR_PUBKEY).wrap(json_coming_from_caller_b)
else:
json_coming_from_caller_b_encr = b''
# encrypt whole package E2EE, Telephone to Operator
req_data = json_coming_from_phone_b + BSEP + json_coming_from_caller_b_encr
req_data_encr = SMessage(TELEPHONE_PRIVKEY, OPERATOR_PUBKEY).wrap(req_data)
req_data_encr_b64 = b64encode(req_data_encr)
self.log('req_data_encr_b64 <--',req_data_encr_b64)
# send!
res = self.sess.post(OPERATOR_API_URL, data=req_data_encr_b64)
self.log('result from operator?',res)
return res
def forge_new_keys(self, name, pubkey_is_public=False):
req_json = {'name':name, 'pubkey_is_public':pubkey_is_public}
req_json_s = jsonify(req_json)
req_json_s_encr = SMessage()
return self.sess.post(json=req_json)
OPERATOR = None
class TheSwitchboard(FlaskView, Logger):
#default_methods = ['POST']
def get(self):
return "We're sorry; we are unable to complete your call as dialed. Please check the number and dial again, or call your operator to help you."
def post(self):
data = request.data
self.log('incoming_data! <--',data)
# step 1: decode
data = b64decode(data)
self.log('decoded data:',data)
# step 2: decrypt from phone
data = SMessage(OPERATOR.privkey_, TELEPHONE_PUBKEY).unwrap(data)
self.log('decrypted data:',data)
# step 3: give to The Operator
res = OPERATOR.route(data)
# return response to caller
return res
def run_forever(port='8080'):
global OPERATOR
OPERATOR = TheOperator()
app = Flask(__name__)
TheSwitchboard.register(app, route_base='/op/', route_prefix=None)
app.run(debug=True, port=port, host='0.0.0.0')
def init_operators():
op = Operator(name=OPERATOR_NAME)

@ -0,0 +1,11 @@
import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
# from komrade import *
import sys
port = '8080' if len(sys.argv)<2 or not sys.argv[1].isdigit() else sys.argv[1]
from switchboard import run_forever
run_forever(port = port)

@ -0,0 +1,117 @@
# internal imports
import os,sys; sys.path.append(os.path.abspath(os.path.join(os.path.abspath(os.path.join(os.path.dirname(__file__),'..')),'..')))
from komrade import *
from komrade.backend.crypt import *
from komrade.backend.keymaker import *
from komrade.backend.mazes import *
from komrade.backend.operators import *
# external imports
from flask import Flask, request, jsonify
from flask_classful import FlaskView
### ACTUAL PHONE CONNECTIONS
class TheTelephone(Logger):
"""
API client class for Caller to interact with The Operator.
"""
def __init__(self, caller):
self.caller = caller
@property
def sess(self):
"""
Get connection to Tor
"""
if not hasattr(self,'_sess'):
self._sess = get_tor_proxy_session()
return self._sess
def req(self,json_coming_from_phone={},json_coming_from_caller={}):
# Two parts of every request:
# 1) only overall encryption layer E2EE Telephone -> Operator:
req_data = []
if json_coming_from_phone:
json_coming_from_phone_s = json.dumps(json_coming_from_phone)
json_coming_from_phone_b = json_coming_from_phone_s.encode()
#json_coming_from_phone_b_encr = SMessage(TELEPHONE_PRIVKEY,OPERATOR_PUBKEY).wrap(json_coming_from_phone_b)
else:
json_coming_from_phone_b=b''
# 2) (optional) extra E2EE encrypted layer Caller -> Operator
if json_coming_from_caller:
json_coming_from_caller_s = json.dumps(json_coming_from_caller)
json_coming_from_caller_b = json_coming_from_caller_s.encode()
json_coming_from_caller_b_encr = SMessage(self.caller.privkey_,OPERATOR_PUBKEY).wrap(json_coming_from_caller_b)
else:
json_coming_from_caller_b_encr = b''
# encrypt whole package E2EE, Telephone to Operator
req_data = json_coming_from_phone_b + BSEP + json_coming_from_caller_b_encr
req_data_encr = SMessage(TELEPHONE_PRIVKEY, OPERATOR_PUBKEY).wrap(req_data)
req_data_encr_b64 = b64encode(req_data_encr)
self.log('req_data_encr_b64 <--',req_data_encr_b64)
# send!
req_data_encr_b64_str = req_data_encr_b64.decode('utf-8')
res = self.sess.post(OPERATOR_API_URL + req_data_encr_b64)
self.log('result from operator?',res)
return res
def forge_new_keys(self, name, pubkey_is_public=False):
req_json = {'name':name, 'pubkey_is_public':pubkey_is_public}
req_json_s = jsonify(req_json)
req_json_s_encr = SMessage()
return self.sess.post(json=req_json)
OPERATOR = None
class TheSwitchboard(FlaskView, Logger):
#default_methods = ['POST']
#def get(self):
# return "We're sorry; we are unable to complete your call as dialed. Please check the number and dial again, or call your operator to help you."
def get(self,encr_b64_str):
# first try to get from string to bytes
self.log('incoming <--',encr_b64_str)
try:
encr_b64_b = encr_b64_str.decode('utf-8')
self.log('encr_b64_b',encr_b64_b)
encr_b = b64decode(encr_b64_b)
self.log('encr_b',encr_b)
except UnicodeDecodeError:
return OPERATOR_INTERCEPT_MESSAGE
if not encr_b64_str: return OPERATOR_INTERCEPT_MESSAGE
data = request.data
self.log('incoming_data! <--',data)
# step 1: decode
data = b64decode(data)
self.log('decoded data:',data)
# step 2: decrypt from phone
data = SMessage(OPERATOR.privkey_, TELEPHONE_PUBKEY).unwrap(data)
self.log('decrypted data:',data)
# step 3: give to The Operator
res = OPERATOR.route(data)
# return response to caller
return res
def run_forever(port='8080'):
global OPERATOR
OPERATOR = TheOperator()
app = Flask(__name__)
TheSwitchboard.register(app, route_base='/op/', route_prefix=None)
app.run(debug=True, port=port, host='0.0.0.0')

@ -4,7 +4,7 @@ KOMRADE_ONION = 'u7spnj3dmwumzoa4.onion'
KOMRADE_ONION2 = 'rwg4zcnpwshv4laq.onion' #'128.232.229.63' #'komrade.app'
OPERATOR_API_URL = f'http://{KOMRADE_ONION}:6999/op/'
OPERATOR_API_URL = f'http://{KOMRADE_ONION2}/op/'
# paths
@ -35,3 +35,5 @@ KEYNAMES = [
'pubkey_decr_encr','privkey_decr_encr','adminkey_decr_encr',
'pubkey_decr_decr','privkey_decr_decr','adminkey_decr_decr'
]
OPERATOR_INTERCEPT_MESSAGE = "If you'd like to make a call, please hang up and try again. If you need help, hang up, and then dial your operator."

@ -1,3 +0,0 @@
import sys
port = '8080' if len(sys.argv)<2 or not sys.argv[1].isdigit() else sys.argv[1]
from operators import run_forever; run_forever(port = port)
Loading…
Cancel
Save