mirror of
https://github.com/gnh1201/caterpillar.git
synced 2024-11-26 07:21:46 +00:00
feat: refactoring typed programing
This commit is contained in:
parent
9c2b66fb07
commit
93e0b4edd9
21
base.py
21
base.py
|
@ -19,6 +19,7 @@ import importlib
|
||||||
import subprocess
|
import subprocess
|
||||||
import platform
|
import platform
|
||||||
|
|
||||||
|
from abc import ABC, abstractmethod
|
||||||
from datetime import datetime, timezone
|
from datetime import datetime, timezone
|
||||||
from typing import Union, List
|
from typing import Union, List
|
||||||
|
|
||||||
|
@ -47,14 +48,14 @@ def jsonrpc2_create_id(data):
|
||||||
def jsonrpc2_encode(method, params=None):
|
def jsonrpc2_encode(method, params=None):
|
||||||
data = {"jsonrpc": "2.0", "method": method, "params": params}
|
data = {"jsonrpc": "2.0", "method": method, "params": params}
|
||||||
id = jsonrpc2_create_id(data)
|
id = jsonrpc2_create_id(data)
|
||||||
id = data.get('id')
|
id = data.get("id")
|
||||||
return (id, json.dumps(data))
|
return (id, json.dumps(data))
|
||||||
|
|
||||||
|
|
||||||
def jsonrpc2_decode(text):
|
def jsonrpc2_decode(text):
|
||||||
data = json.loads(text)
|
data = json.loads(text)
|
||||||
type = 'error' if 'error' in data else 'result' if 'result' in data else None
|
type = "error" if "error" in data else "result" if "result" in data else None
|
||||||
id = data.get('id')
|
id = data.get("id")
|
||||||
rpcdata = data.get(type) if type else None
|
rpcdata = data.get(type) if type else None
|
||||||
return type, id, rpcdata
|
return type, id, rpcdata
|
||||||
|
|
||||||
|
@ -68,6 +69,7 @@ def jsonrpc2_error_encode(error, id=""):
|
||||||
data = {"jsonrpc": "2.0", "error": error, "id": id}
|
data = {"jsonrpc": "2.0", "error": error, "id": id}
|
||||||
return json.dumps(data)
|
return json.dumps(data)
|
||||||
|
|
||||||
|
|
||||||
def find_openssl_binpath():
|
def find_openssl_binpath():
|
||||||
system = platform.system()
|
system = platform.system()
|
||||||
|
|
||||||
|
@ -121,8 +123,19 @@ def find_openssl_binpath():
|
||||||
return "openssl"
|
return "openssl"
|
||||||
|
|
||||||
|
|
||||||
|
class ExtensionType:
|
||||||
|
def __init__(self):
|
||||||
|
self.type: str = None
|
||||||
|
self.method: str = None
|
||||||
|
self.exported_methods: list[str] = []
|
||||||
|
self.connection_type: str = None
|
||||||
|
|
||||||
|
|
||||||
|
type extension_type = ExtensionType
|
||||||
|
|
||||||
|
|
||||||
class Extension:
|
class Extension:
|
||||||
extensions = []
|
extensions: list[extension_type] = []
|
||||||
protocols = []
|
protocols = []
|
||||||
buffer_size = 8192
|
buffer_size = 8192
|
||||||
|
|
||||||
|
|
0
download_certs.sh
Normal file → Executable file
0
download_certs.sh
Normal file → Executable file
|
@ -29,9 +29,11 @@ except Exception as e:
|
||||||
|
|
||||||
es = Elasticsearch([es_host])
|
es = Elasticsearch([es_host])
|
||||||
|
|
||||||
|
|
||||||
def generate_id(url):
|
def generate_id(url):
|
||||||
"""Generate a unique ID for a URL by hashing it."""
|
"""Generate a unique ID for a URL by hashing it."""
|
||||||
return hashlib.sha256(url.encode('utf-8')).hexdigest()
|
return hashlib.sha256(url.encode("utf-8")).hexdigest()
|
||||||
|
|
||||||
|
|
||||||
def get_cached_page_from_google(url):
|
def get_cached_page_from_google(url):
|
||||||
status_code, content = (0, b"")
|
status_code, content = (0, b"")
|
||||||
|
@ -50,6 +52,7 @@ def get_cached_page_from_google(url):
|
||||||
|
|
||||||
return status_code, content
|
return status_code, content
|
||||||
|
|
||||||
|
|
||||||
# API documentation: https://archive.org/help/wayback_api.php
|
# API documentation: https://archive.org/help/wayback_api.php
|
||||||
def get_cached_page_from_wayback(url):
|
def get_cached_page_from_wayback(url):
|
||||||
status_code, content = (0, b"")
|
status_code, content = (0, b"")
|
||||||
|
@ -89,30 +92,37 @@ def get_cached_page_from_wayback(url):
|
||||||
|
|
||||||
return status_code, content
|
return status_code, content
|
||||||
|
|
||||||
|
|
||||||
def get_cached_page_from_elasticsearch(url):
|
def get_cached_page_from_elasticsearch(url):
|
||||||
url_id = generate_id(url)
|
url_id = generate_id(url)
|
||||||
try:
|
try:
|
||||||
result = es.get(index=es_index, id=url_id)
|
result = es.get(index=es_index, id=url_id)
|
||||||
logger.info(result['_source'])
|
logger.info(result["_source"])
|
||||||
return 200, result['_source']['content'].encode(client_encoding)
|
return 200, result["_source"]["content"].encode(client_encoding)
|
||||||
except NotFoundError:
|
except NotFoundError:
|
||||||
return 404, b""
|
return 404, b""
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
logger.error(f"Error fetching from Elasticsearch: {e}")
|
logger.error(f"Error fetching from Elasticsearch: {e}")
|
||||||
return 502, b""
|
return 502, b""
|
||||||
|
|
||||||
|
|
||||||
def cache_to_elasticsearch(url, data):
|
def cache_to_elasticsearch(url, data):
|
||||||
url_id = generate_id(url)
|
url_id = generate_id(url)
|
||||||
timestamp = datetime.utcnow().isoformat()
|
timestamp = datetime.utcnow().isoformat()
|
||||||
try:
|
try:
|
||||||
es.index(index=es_index, id=url_id, body={
|
es.index(
|
||||||
"url": url,
|
index=es_index,
|
||||||
"content": data.decode(client_encoding),
|
id=url_id,
|
||||||
"timestamp": timestamp
|
body={
|
||||||
})
|
"url": url,
|
||||||
|
"content": data.decode(client_encoding),
|
||||||
|
"timestamp": timestamp,
|
||||||
|
},
|
||||||
|
)
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
logger.error(f"Error caching to Elasticsearch: {e}")
|
logger.error(f"Error caching to Elasticsearch: {e}")
|
||||||
|
|
||||||
|
|
||||||
def get_page_from_origin_server(url):
|
def get_page_from_origin_server(url):
|
||||||
try:
|
try:
|
||||||
response = requests.get(url)
|
response = requests.get(url)
|
||||||
|
@ -120,6 +130,7 @@ def get_page_from_origin_server(url):
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
return 502, str(e).encode(client_encoding)
|
return 502, str(e).encode(client_encoding)
|
||||||
|
|
||||||
|
|
||||||
class AlwaysOnline(Extension):
|
class AlwaysOnline(Extension):
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
self.type = "connector" # this is a connector
|
self.type = "connector" # this is a connector
|
||||||
|
@ -128,13 +139,13 @@ class AlwaysOnline(Extension):
|
||||||
|
|
||||||
def connect(self, conn, data, webserver, port, scheme, method, url):
|
def connect(self, conn, data, webserver, port, scheme, method, url):
|
||||||
logger.info("[*] Connecting... Connecting...")
|
logger.info("[*] Connecting... Connecting...")
|
||||||
|
|
||||||
connected = False
|
connected = False
|
||||||
|
|
||||||
is_ssl = scheme in [b"https", b"tls", b"ssl"]
|
is_ssl = scheme in [b"https", b"tls", b"ssl"]
|
||||||
cache_hit = 0
|
cache_hit = 0
|
||||||
buffered = b""
|
buffered = b""
|
||||||
|
|
||||||
def sendall(sock, conn, data):
|
def sendall(sock, conn, data):
|
||||||
# send first chuck
|
# send first chuck
|
||||||
sock.send(data)
|
sock.send(data)
|
||||||
|
@ -151,11 +162,11 @@ class AlwaysOnline(Extension):
|
||||||
sock.send(chunk)
|
sock.send(chunk)
|
||||||
except:
|
except:
|
||||||
break
|
break
|
||||||
|
|
||||||
target_url = url.decode(client_encoding)
|
target_url = url.decode(client_encoding)
|
||||||
target_scheme = scheme.decode(client_encoding)
|
target_scheme = scheme.decode(client_encoding)
|
||||||
target_webserver = webserver.decode(client_encoding)
|
target_webserver = webserver.decode(client_encoding)
|
||||||
|
|
||||||
if "://" not in target_url:
|
if "://" not in target_url:
|
||||||
target_url = f"{target_scheme}://{target_webserver}:{port}{target_url}"
|
target_url = f"{target_scheme}://{target_webserver}:{port}{target_url}"
|
||||||
|
|
||||||
|
|
|
@ -21,7 +21,17 @@ class Container(Extension):
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
self.type = "rpcmethod"
|
self.type = "rpcmethod"
|
||||||
self.method = "container_init"
|
self.method = "container_init"
|
||||||
self.exported_methods = ["container_cteate", "container_start", "container_run", "container_stop", "container_pause", "container_unpause", "container_restart", "container_kill", "container_remove"]
|
self.exported_methods = [
|
||||||
|
"container_cteate",
|
||||||
|
"container_start",
|
||||||
|
"container_run",
|
||||||
|
"container_stop",
|
||||||
|
"container_pause",
|
||||||
|
"container_unpause",
|
||||||
|
"container_restart",
|
||||||
|
"container_kill",
|
||||||
|
"container_remove",
|
||||||
|
]
|
||||||
|
|
||||||
# docker
|
# docker
|
||||||
self.client = docker.from_env()
|
self.client = docker.from_env()
|
||||||
|
@ -33,13 +43,13 @@ class Container(Extension):
|
||||||
def container_cteate(self, type, id, params, conn):
|
def container_cteate(self, type, id, params, conn):
|
||||||
# todo: -
|
# todo: -
|
||||||
return b"[*] Created"
|
return b"[*] Created"
|
||||||
|
|
||||||
def container_start(self, type, id, params, conn):
|
def container_start(self, type, id, params, conn):
|
||||||
name = params['name']
|
name = params["name"]
|
||||||
|
|
||||||
container = self.client.containers.get(name)
|
container = self.client.containers.get(name)
|
||||||
container.start()
|
container.start()
|
||||||
|
|
||||||
def container_run(self, type, id, params, conn):
|
def container_run(self, type, id, params, conn):
|
||||||
devices = params["devices"]
|
devices = params["devices"]
|
||||||
image = params["image"]
|
image = params["image"]
|
||||||
|
@ -68,35 +78,35 @@ class Container(Extension):
|
||||||
|
|
||||||
logger.info("[*] Stopped")
|
logger.info("[*] Stopped")
|
||||||
return b"[*] Stopped"
|
return b"[*] Stopped"
|
||||||
|
|
||||||
def container_pause(self, type, id, params, conn):
|
def container_pause(self, type, id, params, conn):
|
||||||
name = params['name']
|
name = params["name"]
|
||||||
|
|
||||||
container = self.client.containers.get(name)
|
container = self.client.containers.get(name)
|
||||||
container.pause()
|
container.pause()
|
||||||
return b"[*] Paused"
|
return b"[*] Paused"
|
||||||
|
|
||||||
def container_unpause(self, type, id, params, conn):
|
def container_unpause(self, type, id, params, conn):
|
||||||
name = params['name']
|
name = params["name"]
|
||||||
|
|
||||||
container = self.client.containers.get(name)
|
container = self.client.containers.get(name)
|
||||||
container.unpause()
|
container.unpause()
|
||||||
return b"[*] Unpaused"
|
return b"[*] Unpaused"
|
||||||
|
|
||||||
def container_restart(self, type, id, params, conn):
|
def container_restart(self, type, id, params, conn):
|
||||||
name = params['name']
|
name = params["name"]
|
||||||
|
|
||||||
container = self.client.containers.get(name)
|
container = self.client.containers.get(name)
|
||||||
container.restart()
|
container.restart()
|
||||||
return b"[*] Restarted"
|
return b"[*] Restarted"
|
||||||
|
|
||||||
def container_kill(self, type, id, params, conn):
|
def container_kill(self, type, id, params, conn):
|
||||||
# TODO: -
|
# TODO: -
|
||||||
return b"[*] Killed"
|
return b"[*] Killed"
|
||||||
|
|
||||||
def container_remove(self, type, id, params, conn):
|
def container_remove(self, type, id, params, conn):
|
||||||
name = params['name']
|
name = params["name"]
|
||||||
|
|
||||||
container = self.client.containers.get(name)
|
container = self.client.containers.get(name)
|
||||||
container.remove()
|
container.remove()
|
||||||
return b"[*] Removed"
|
return b"[*] Removed"
|
||||||
|
|
|
@ -25,6 +25,7 @@ import logging
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
class Serial(Extension):
|
class Serial(Extension):
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
self.type = "connector"
|
self.type = "connector"
|
||||||
|
@ -38,7 +39,7 @@ class Serial(Extension):
|
||||||
connected = False
|
connected = False
|
||||||
ser = None
|
ser = None
|
||||||
try:
|
try:
|
||||||
port_path = url.decode(client_encoding).replace('/', '')
|
port_path = url.decode(client_encoding).replace("/", "")
|
||||||
if not ser:
|
if not ser:
|
||||||
ser = serial.Serial(port_path, baudrate=9600, timeout=2)
|
ser = serial.Serial(port_path, baudrate=9600, timeout=2)
|
||||||
connected = True
|
connected = True
|
||||||
|
@ -49,7 +50,7 @@ class Serial(Extension):
|
||||||
|
|
||||||
ser_data = ser.read_all()
|
ser_data = ser.read_all()
|
||||||
logger.debug(f"Data received: {ser_data}")
|
logger.debug(f"Data received: {ser_data}")
|
||||||
|
|
||||||
if ser_data:
|
if ser_data:
|
||||||
conn.send(ser_data.decode(client_encoding))
|
conn.send(ser_data.decode(client_encoding))
|
||||||
except serial.SerialException as e:
|
except serial.SerialException as e:
|
||||||
|
|
138
server.py
138
server.py
|
@ -38,6 +38,7 @@ from base import (
|
||||||
Logger,
|
Logger,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
logger = Logger(name="server")
|
logger = Logger(name="server")
|
||||||
|
|
||||||
# initialization
|
# initialization
|
||||||
|
@ -47,11 +48,11 @@ try:
|
||||||
config("SERVER_URL", default="")
|
config("SERVER_URL", default="")
|
||||||
)
|
)
|
||||||
server_connection_type = config("SERVER_CONNECTION_TYPE", default="proxy")
|
server_connection_type = config("SERVER_CONNECTION_TYPE", default="proxy")
|
||||||
cakey = config("CA_KEY", default="ca.key")
|
ca_key = config("CA_KEY", default="ca.key")
|
||||||
cacert = config("CA_CERT", default="ca.crt")
|
ca_cert = config("CA_CERT", default="ca.crt")
|
||||||
certkey = config("CERT_KEY", default="cert.key")
|
cert_key = config("CERT_KEY", default="cert.key")
|
||||||
certdir = config("CERT_DIR", default="certs/")
|
cert_dir = config("CERT_DIR", default="certs/")
|
||||||
openssl_binpath = config("OPENSSL_BINPATH", default=find_openssl_binpath())
|
openssl_bin_path = config("OPENSSL_BINPATH", default=find_openssl_binpath())
|
||||||
client_encoding = config("CLIENT_ENCODING", default="utf-8")
|
client_encoding = config("CLIENT_ENCODING", default="utf-8")
|
||||||
local_domain = config("LOCAL_DOMAIN", default="")
|
local_domain = config("LOCAL_DOMAIN", default="")
|
||||||
proxy_pass = config("PROXY_PASS", default="")
|
proxy_pass = config("PROXY_PASS", default="")
|
||||||
|
@ -87,7 +88,7 @@ if _username:
|
||||||
auth = HTTPBasicAuth(_username, _password)
|
auth = HTTPBasicAuth(_username, _password)
|
||||||
|
|
||||||
|
|
||||||
def parse_first_data(data):
|
def parse_first_data(data: bytes):
|
||||||
parsed_data = (b"", b"", b"", b"", b"")
|
parsed_data = (b"", b"", b"", b"", b"")
|
||||||
|
|
||||||
try:
|
try:
|
||||||
|
@ -126,13 +127,13 @@ def parse_first_data(data):
|
||||||
return parsed_data
|
return parsed_data
|
||||||
|
|
||||||
|
|
||||||
def conn_string(conn, data, addr):
|
def conn_string(conn: socket.socket, data: bytes, addr: bytes):
|
||||||
# JSON-RPC 2.0 request
|
# JSON-RPC 2.0 request
|
||||||
def process_jsonrpc2(data):
|
def process_jsonrpc2(_data):
|
||||||
jsondata = json.loads(data.decode(client_encoding, errors="ignore"))
|
json_data = json.loads(_data.decode(client_encoding, errors="ignore"))
|
||||||
if jsondata["jsonrpc"] == "2.0":
|
if json_data["jsonrpc"] == "2.0":
|
||||||
jsonrpc2_server(
|
jsonrpc2_server(
|
||||||
conn, jsondata["id"], jsondata["method"], jsondata["params"]
|
conn, json_data["id"], json_data["method"], json_data["params"]
|
||||||
)
|
)
|
||||||
return True
|
return True
|
||||||
return False
|
return False
|
||||||
|
@ -166,42 +167,44 @@ def conn_string(conn, data, addr):
|
||||||
proxy_server(webserver, port, scheme, method, url, conn, addr, data)
|
proxy_server(webserver, port, scheme, method, url, conn, addr, data)
|
||||||
|
|
||||||
|
|
||||||
def jsonrpc2_server(conn, id, method, params):
|
def jsonrpc2_server(
|
||||||
|
conn: socket.socket, _id: str, method: str, params: dict[str, str | int]
|
||||||
|
):
|
||||||
if method == "relay_accept":
|
if method == "relay_accept":
|
||||||
accepted_relay[id] = conn
|
accepted_relay[_id] = conn
|
||||||
connection_speed = params["connection_speed"]
|
connection_speed = params["connection_speed"]
|
||||||
logger.info("[*] connection speed: %s milliseconds" % (str(connection_speed)))
|
logger.info("[*] connection speed: %s milliseconds" % str(connection_speed))
|
||||||
while conn.fileno() > -1:
|
while conn.fileno() > -1:
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
del accepted_relay[id]
|
del accepted_relay[_id]
|
||||||
logger.info("[*] relay destroyed: %s" % id)
|
logger.info("[*] relay destroyed: %s" % _id)
|
||||||
else:
|
else:
|
||||||
Extension.dispatch_rpcmethod(method, "call", id, params, conn)
|
Extension.dispatch_rpcmethod(method, "call", _id, params, conn)
|
||||||
|
|
||||||
# return in conn_string()
|
# return in conn_string()
|
||||||
|
|
||||||
|
|
||||||
def proxy_connect(webserver, conn):
|
def proxy_connect(webserver: bytes, conn: socket.socket):
|
||||||
hostname = webserver.decode(client_encoding)
|
hostname = webserver.decode(client_encoding)
|
||||||
certpath = "%s/%s.crt" % (certdir.rstrip("/"), hostname)
|
cert_path = "%s/%s.crt" % (cert_dir.rstrip("/"), hostname)
|
||||||
|
|
||||||
if not os.path.exists(certdir):
|
if not os.path.exists(cert_dir):
|
||||||
os.makedirs(certdir)
|
os.makedirs(cert_dir)
|
||||||
|
|
||||||
# https://stackoverflow.com/questions/24055036/handle-https-request-in-proxy-server-by-c-sharp-connect-tunnel
|
# https://stackoverflow.com/questions/24055036/handle-https-request-in-proxy-server-by-c-sharp-connect-tunnel
|
||||||
conn.send(b"HTTP/1.1 200 Connection Established\r\n\r\n")
|
conn.send(b"HTTP/1.1 200 Connection Established\r\n\r\n")
|
||||||
|
|
||||||
# https://github.com/inaz2/proxy2/blob/master/proxy2.py
|
# https://github.com/inaz2/proxy2/blob/master/proxy2.py
|
||||||
try:
|
try:
|
||||||
if not os.path.isfile(certpath):
|
if not os.path.isfile(cert_path):
|
||||||
epoch = "%d" % (time.time() * 1000)
|
epoch = "%d" % (time.time() * 1000)
|
||||||
p1 = Popen(
|
p1 = Popen(
|
||||||
[
|
[
|
||||||
openssl_binpath,
|
openssl_bin_path,
|
||||||
"req",
|
"req",
|
||||||
"-new",
|
"-new",
|
||||||
"-key",
|
"-key",
|
||||||
certkey,
|
cert_key,
|
||||||
"-subj",
|
"-subj",
|
||||||
"/CN=%s" % hostname,
|
"/CN=%s" % hostname,
|
||||||
],
|
],
|
||||||
|
@ -209,19 +212,19 @@ def proxy_connect(webserver, conn):
|
||||||
)
|
)
|
||||||
p2 = Popen(
|
p2 = Popen(
|
||||||
[
|
[
|
||||||
openssl_binpath,
|
openssl_bin_path,
|
||||||
"x509",
|
"x509",
|
||||||
"-req",
|
"-req",
|
||||||
"-days",
|
"-days",
|
||||||
"3650",
|
"3650",
|
||||||
"-CA",
|
"-CA",
|
||||||
cacert,
|
ca_cert,
|
||||||
"-CAkey",
|
"-CAkey",
|
||||||
cakey,
|
ca_key,
|
||||||
"-set_serial",
|
"-set_serial",
|
||||||
epoch,
|
epoch,
|
||||||
"-out",
|
"-out",
|
||||||
certpath,
|
cert_path,
|
||||||
],
|
],
|
||||||
stdin=p1.stdout,
|
stdin=p1.stdout,
|
||||||
stderr=PIPE,
|
stderr=PIPE,
|
||||||
|
@ -232,20 +235,20 @@ def proxy_connect(webserver, conn):
|
||||||
"[*] OpenSSL distribution not found on this system. Skipping certificate issuance.",
|
"[*] OpenSSL distribution not found on this system. Skipping certificate issuance.",
|
||||||
exc_info=e,
|
exc_info=e,
|
||||||
)
|
)
|
||||||
certpath = "default.crt"
|
cert_path = "default.crt"
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
logger.error("[*] Skipping certificate issuance.", exc_info=e)
|
logger.error("[*] Skipping certificate issuance.", exc_info=e)
|
||||||
certpath = "default.crt"
|
cert_path = "default.crt"
|
||||||
|
|
||||||
logger.info("[*] Certificate file: %s" % (certpath))
|
logger.info("[*] Certificate file: %s" % cert_path)
|
||||||
logger.info("[*] Private key file: %s" % (certkey))
|
logger.info("[*] Private key file: %s" % cert_key)
|
||||||
|
|
||||||
# https://stackoverflow.com/questions/11255530/python-simple-ssl-socket-server
|
# https://stackoverflow.com/questions/11255530/python-simple-ssl-socket-server
|
||||||
# https://docs.python.org/3/library/ssl.html
|
# https://docs.python.org/3/library/ssl.html
|
||||||
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
|
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
|
||||||
context.check_hostname = False
|
context.check_hostname = False
|
||||||
context.verify_mode = ssl.CERT_NONE
|
context.verify_mode = ssl.CERT_NONE
|
||||||
context.load_cert_chain(certfile=certpath, keyfile=certkey)
|
context.load_cert_chain(certfile=cert_path, keyfile=cert_key)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
# https://stackoverflow.com/questions/11255530/python-simple-ssl-socket-server
|
# https://stackoverflow.com/questions/11255530/python-simple-ssl-socket-server
|
||||||
|
@ -256,12 +259,14 @@ def proxy_connect(webserver, conn):
|
||||||
"[*] SSL negotiation failed.",
|
"[*] SSL negotiation failed.",
|
||||||
exc_info=e,
|
exc_info=e,
|
||||||
)
|
)
|
||||||
return (conn, b"")
|
return conn, b""
|
||||||
|
|
||||||
return (conn, data)
|
return conn, data
|
||||||
|
|
||||||
|
|
||||||
def proxy_check_filtered(data, webserver, port, scheme, method, url):
|
def proxy_check_filtered(
|
||||||
|
data: bytes, webserver: bytes, port: bytes, scheme: bytes, method: bytes, url: bytes
|
||||||
|
):
|
||||||
filtered = False
|
filtered = False
|
||||||
|
|
||||||
filters = Extension.get_filters()
|
filters = Extension.get_filters()
|
||||||
|
@ -272,7 +277,16 @@ def proxy_check_filtered(data, webserver, port, scheme, method, url):
|
||||||
return filtered
|
return filtered
|
||||||
|
|
||||||
|
|
||||||
def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
def proxy_server(
|
||||||
|
webserver: bytes,
|
||||||
|
port: bytes,
|
||||||
|
scheme: bytes,
|
||||||
|
method: bytes,
|
||||||
|
url: bytes,
|
||||||
|
conn: socket.socket,
|
||||||
|
addr: bytes,
|
||||||
|
data: bytes,
|
||||||
|
):
|
||||||
try:
|
try:
|
||||||
logger.info("[*] Started the request. %s" % (str(addr[0])))
|
logger.info("[*] Started the request. %s" % (str(addr[0])))
|
||||||
|
|
||||||
|
@ -296,14 +310,11 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
_, _, _, method, url = parse_first_data(data)
|
_, _, _, method, url = parse_first_data(data)
|
||||||
|
|
||||||
# https://stackoverflow.com/questions/44343739/python-sockets-ssl-eof-occurred-in-violation-of-protocol
|
# https://stackoverflow.com/questions/44343739/python-sockets-ssl-eof-occurred-in-violation-of-protocol
|
||||||
def sock_close(sock, is_ssl=False):
|
def sock_close(_sock: socket.socket):
|
||||||
# if is_ssl:
|
_sock.close()
|
||||||
# sock = sock.unwrap()
|
|
||||||
# sock.shutdown(socket.SHUT_RDWR)
|
|
||||||
sock.close()
|
|
||||||
|
|
||||||
# Wait to see if there is more data to transmit
|
# Wait to see if there is more data to transmit
|
||||||
def sendall(sock, conn, data):
|
def sendall(_sock: socket.socket, _conn: socket.socket, _data: bytes):
|
||||||
# send first chuck
|
# send first chuck
|
||||||
if proxy_check_filtered(data, webserver, port, scheme, method, url):
|
if proxy_check_filtered(data, webserver, port, scheme, method, url):
|
||||||
sock.close()
|
sock.close()
|
||||||
|
@ -324,7 +335,7 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
if proxy_check_filtered(
|
if proxy_check_filtered(
|
||||||
buffered, webserver, port, scheme, method, url
|
buffered, webserver, port, scheme, method, url
|
||||||
):
|
):
|
||||||
sock_close(sock, is_ssl)
|
sock_close(sock)
|
||||||
raise Exception("Filtered request")
|
raise Exception("Filtered request")
|
||||||
sock.send(chunk)
|
sock.send(chunk)
|
||||||
if len(buffered) > buffer_size * 2:
|
if len(buffered) > buffer_size * 2:
|
||||||
|
@ -354,7 +365,7 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
|
|
||||||
i = 0
|
i = 0
|
||||||
is_http_403 = False
|
is_http_403 = False
|
||||||
buffered = b""
|
_buffered = b""
|
||||||
while True:
|
while True:
|
||||||
chunk = sock.recv(buffer_size)
|
chunk = sock.recv(buffer_size)
|
||||||
if not chunk:
|
if not chunk:
|
||||||
|
@ -362,24 +373,26 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
if i == 0 and chunk.find(b"HTTP/1.1 403") == 0:
|
if i == 0 and chunk.find(b"HTTP/1.1 403") == 0:
|
||||||
is_http_403 = True
|
is_http_403 = True
|
||||||
break
|
break
|
||||||
buffered += chunk
|
_buffered += chunk
|
||||||
if proxy_check_filtered(buffered, webserver, port, scheme, method, url):
|
if proxy_check_filtered(
|
||||||
sock_close(sock, is_ssl)
|
_buffered, webserver, port, scheme, method, url
|
||||||
|
):
|
||||||
|
sock_close(sock)
|
||||||
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
|
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
|
||||||
raise Exception("Filtered response")
|
raise Exception("Filtered response")
|
||||||
conn.send(chunk)
|
conn.send(chunk)
|
||||||
if len(buffered) > buffer_size * 2:
|
if len(_buffered) > buffer_size * 2:
|
||||||
buffered = buffered[-buffer_size * 2 :]
|
_buffered = _buffered[-buffer_size * 2 :]
|
||||||
i += 1
|
i += 1
|
||||||
|
|
||||||
# when blocked
|
# when blocked
|
||||||
if is_http_403:
|
if is_http_403:
|
||||||
logger.warning(
|
logger.warning(
|
||||||
"[*] Blocked the request by remote server: %s"
|
"[*] Blocked the request by remote server: %s"
|
||||||
% (webserver.decode(client_encoding))
|
% webserver.decode(client_encoding)
|
||||||
)
|
)
|
||||||
|
|
||||||
def bypass_callback(response, *args, **kwargs):
|
def bypass_callback(response: requests.Response):
|
||||||
if response.status_code != 200:
|
if response.status_code != 200:
|
||||||
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
|
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
|
||||||
return
|
return
|
||||||
|
@ -420,7 +433,7 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
else:
|
else:
|
||||||
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
|
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
|
||||||
|
|
||||||
sock_close(sock, is_ssl)
|
sock_close(sock)
|
||||||
|
|
||||||
logger.info(
|
logger.info(
|
||||||
"[*] Received %s chunks. (%s bytes per chunk)"
|
"[*] Received %s chunks. (%s bytes per chunk)"
|
||||||
|
@ -509,27 +522,27 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
else:
|
else:
|
||||||
resolved_address_list.remove(resolved_address_list[0])
|
resolved_address_list.remove(resolved_address_list[0])
|
||||||
logger.info("[*] the relay is gone. %s" % id)
|
logger.info("[*] the relay is gone. %s" % id)
|
||||||
sock_close(sock, is_ssl)
|
sock_close(sock)
|
||||||
return
|
return
|
||||||
|
|
||||||
# get response
|
# get response
|
||||||
i = 0
|
i = 0
|
||||||
buffered = b""
|
buffered = b""
|
||||||
while True:
|
while True:
|
||||||
chunk = sock.recv(buffer_size)
|
_chunk = sock.recv(buffer_size)
|
||||||
if not chunk:
|
if not _chunk:
|
||||||
break
|
break
|
||||||
buffered += chunk
|
buffered += _chunk
|
||||||
if proxy_check_filtered(buffered, webserver, port, scheme, method, url):
|
if proxy_check_filtered(buffered, webserver, port, scheme, method, url):
|
||||||
sock_close(sock, is_ssl)
|
sock_close(sock)
|
||||||
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
|
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
|
||||||
raise Exception("Filtered response")
|
raise Exception("Filtered response")
|
||||||
conn.send(chunk)
|
conn.send(_chunk)
|
||||||
if len(buffered) > buffer_size * 2:
|
if len(buffered) > buffer_size * 2:
|
||||||
buffered = buffered[-buffer_size * 2 :]
|
buffered = buffered[-buffer_size * 2 :]
|
||||||
i += 1
|
i += 1
|
||||||
|
|
||||||
sock_close(sock, is_ssl)
|
sock_close(sock)
|
||||||
|
|
||||||
logger.info(
|
logger.info(
|
||||||
"[*] Received %s chunks. (%s bytes per chunk)"
|
"[*] Received %s chunks. (%s bytes per chunk)"
|
||||||
|
@ -604,7 +617,7 @@ def proxy_server(webserver, port, scheme, method, url, conn, addr, data):
|
||||||
|
|
||||||
|
|
||||||
# journaling a filtered hosts
|
# journaling a filtered hosts
|
||||||
def add_filtered_host(domain, ip_address):
|
def add_filtered_host(domain: str, ip_address: str):
|
||||||
hosts_path = "./filtered.hosts"
|
hosts_path = "./filtered.hosts"
|
||||||
with open(hosts_path, "r") as file:
|
with open(hosts_path, "r") as file:
|
||||||
lines = file.readlines()
|
lines = file.readlines()
|
||||||
|
@ -619,6 +632,7 @@ def add_filtered_host(domain, ip_address):
|
||||||
def start(): # Main Program
|
def start(): # Main Program
|
||||||
try:
|
try:
|
||||||
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
|
||||||
sock.bind(("", listening_port))
|
sock.bind(("", listening_port))
|
||||||
sock.listen(max_connection)
|
sock.listen(max_connection)
|
||||||
logger.info("[*] Server started successfully [ %d ]" % listening_port)
|
logger.info("[*] Server started successfully [ %d ]" % listening_port)
|
||||||
|
|
18
smtp.py
18
smtp.py
|
@ -40,6 +40,7 @@ auth = None
|
||||||
if _username:
|
if _username:
|
||||||
auth = HTTPBasicAuth(_username, _password)
|
auth = HTTPBasicAuth(_username, _password)
|
||||||
|
|
||||||
|
|
||||||
class CaterpillarSMTPHandler:
|
class CaterpillarSMTPHandler:
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
self.smtpd_hostname = "CaterpillarSMTPServer"
|
self.smtpd_hostname = "CaterpillarSMTPServer"
|
||||||
|
@ -53,8 +54,8 @@ class CaterpillarSMTPHandler:
|
||||||
message = EmailMessage()
|
message = EmailMessage()
|
||||||
message.set_content(data)
|
message.set_content(data)
|
||||||
|
|
||||||
subject = message.get('Subject', '')
|
subject = message.get("Subject", "")
|
||||||
to = message.get('To', '')
|
to = message.get("To", "")
|
||||||
|
|
||||||
proxy_data = {
|
proxy_data = {
|
||||||
"headers": {
|
"headers": {
|
||||||
|
@ -75,13 +76,13 @@ class CaterpillarSMTPHandler:
|
||||||
response = await asyncio.to_thread(
|
response = await asyncio.to_thread(
|
||||||
requests.post,
|
requests.post,
|
||||||
server_url,
|
server_url,
|
||||||
headers=proxy_data['headers'],
|
headers=proxy_data["headers"],
|
||||||
data=raw_data,
|
data=raw_data,
|
||||||
auth=auth
|
auth=auth,
|
||||||
)
|
)
|
||||||
if response.status_code == 200:
|
if response.status_code == 200:
|
||||||
type, id, rpcdata = jsonrpc2_decode(response.text)
|
type, id, rpcdata = jsonrpc2_decode(response.text)
|
||||||
if rpcdata['success']:
|
if rpcdata["success"]:
|
||||||
logger.info("[*] Email sent successfully.")
|
logger.info("[*] Email sent successfully.")
|
||||||
else:
|
else:
|
||||||
raise Exception(f"({rpcdata['code']}) {rpcdata['message']}")
|
raise Exception(f"({rpcdata['code']}) {rpcdata['message']}")
|
||||||
|
@ -89,9 +90,9 @@ class CaterpillarSMTPHandler:
|
||||||
raise Exception(f"Status {response.status_code}")
|
raise Exception(f"Status {response.status_code}")
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
logger.error("[*] Failed to send email", exc_info=e)
|
logger.error("[*] Failed to send email", exc_info=e)
|
||||||
return '500 Could not process your message. ' + str(e)
|
return "500 Could not process your message. " + str(e)
|
||||||
|
|
||||||
return '250 OK'
|
return "250 OK"
|
||||||
|
|
||||||
|
|
||||||
# https://aiosmtpd-pepoluan.readthedocs.io/en/latest/migrating.html
|
# https://aiosmtpd-pepoluan.readthedocs.io/en/latest/migrating.html
|
||||||
|
@ -101,11 +102,12 @@ def main():
|
||||||
# Run the event loop in a separate thread.
|
# Run the event loop in a separate thread.
|
||||||
controller.start()
|
controller.start()
|
||||||
# Wait for the user to press Return.
|
# Wait for the user to press Return.
|
||||||
input('SMTP server running. Press Return to stop server and exit.')
|
input("SMTP server running. Press Return to stop server and exit.")
|
||||||
controller.stop()
|
controller.stop()
|
||||||
logger.warning("[*] User has requested an interrupt")
|
logger.warning("[*] User has requested an interrupt")
|
||||||
logger.warning("[*] Application Exiting.....")
|
logger.warning("[*] Application Exiting.....")
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
main()
|
main()
|
||||||
|
|
Loading…
Reference in New Issue
Block a user