2018-01-02 08:43:29 +00:00
|
|
|
'''
|
|
|
|
Onionr - P2P Microblogging Platform & Social network
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
'''
|
2018-01-07 08:55:44 +00:00
|
|
|
import sqlite3, os, time, math, gnupg, base64, tarfile, getpass, simplecrypt
|
|
|
|
from Crypto.Cipher import AES
|
|
|
|
from Crypto import Random
|
|
|
|
|
|
|
|
|
2018-01-02 08:43:29 +00:00
|
|
|
class Core:
|
|
|
|
def __init__(self):
|
|
|
|
self.queueDB = 'data/queue.db'
|
2018-01-10 03:50:38 +00:00
|
|
|
self.peerDB = 'data/peers.db'
|
|
|
|
|
2018-01-04 07:12:46 +00:00
|
|
|
#self.daemonQueue() # Call to create the DB if it doesn't exist
|
2018-01-02 08:43:29 +00:00
|
|
|
return
|
|
|
|
|
2018-01-05 09:16:21 +00:00
|
|
|
def generateMainPGP(self):
|
|
|
|
# Generate main pgp key
|
|
|
|
gpg = gnupg.GPG(gnupghome='data/pgp/')
|
2018-01-06 08:51:26 +00:00
|
|
|
input_data = gpg.gen_key_input(key_type="RSA", key_length=2048, name_real='anon', name_comment='Onionr key', name_email='anon@onionr')
|
|
|
|
key = gpg.gen_key(input_data)
|
|
|
|
return
|
2018-01-10 03:50:38 +00:00
|
|
|
|
|
|
|
def addPeer(self, id, name=''):
|
|
|
|
# This function simply adds a peer to the DB
|
|
|
|
return
|
|
|
|
|
|
|
|
def createPeerDB(self):
|
|
|
|
# generate the peer database
|
|
|
|
conn = sqlite3.connect(self.peerDB)
|
|
|
|
c = conn.cursor()
|
|
|
|
c.execute('''
|
|
|
|
create table users(
|
|
|
|
ID text not null,
|
|
|
|
name text,
|
|
|
|
pgpKey text,
|
|
|
|
hmacKey text,
|
|
|
|
forwardKey text,
|
|
|
|
dateSeen not null,
|
|
|
|
trust int);
|
|
|
|
''')
|
|
|
|
conn.commit()
|
|
|
|
conn.close()
|
2018-01-06 08:51:26 +00:00
|
|
|
|
2018-01-08 09:25:32 +00:00
|
|
|
def dataDirEncrypt(self, password):
|
|
|
|
# Encrypt data directory (don't delete it in this function)
|
|
|
|
if os.path.exists('data.tar'):
|
|
|
|
os.remove('data.tar')
|
|
|
|
tar = tarfile.open("data.tar", "w")
|
|
|
|
for name in ['data']:
|
|
|
|
tar.add(name)
|
|
|
|
tar.close()
|
|
|
|
tarData = open('data.tar', 'r', encoding = "ISO-8859-1").read()
|
|
|
|
encrypted = simplecrypt.encrypt(password, tarData)
|
|
|
|
open('data-encrypted.dat', 'wb').write(encrypted)
|
|
|
|
os.remove('data.tar')
|
2018-01-05 09:16:21 +00:00
|
|
|
return
|
2018-01-08 09:25:32 +00:00
|
|
|
def dataDirDecrypt(self, password):
|
|
|
|
# Decrypt data directory
|
|
|
|
if not os.path.exists('data-encrypted.dat'):
|
|
|
|
return (False, 'encrypted archive does not exist')
|
|
|
|
data = open('data-encrypted.dat', 'rb').read()
|
|
|
|
try:
|
|
|
|
decrypted = simplecrypt.decrypt(password, data)
|
|
|
|
except simplecrypt.DecryptionException:
|
2018-01-09 22:58:12 +00:00
|
|
|
return (False, 'wrong password (or corrupted archive)')
|
2018-01-08 09:25:32 +00:00
|
|
|
else:
|
|
|
|
open('data.tar', 'wb').write(decrypted)
|
2018-01-09 22:58:12 +00:00
|
|
|
tar = tarfile.open('data.tar')
|
|
|
|
tar.extractall()
|
|
|
|
tar.close()
|
2018-01-08 09:25:32 +00:00
|
|
|
return (True, '')
|
2018-01-02 08:43:29 +00:00
|
|
|
def daemonQueue(self):
|
2018-01-04 07:12:46 +00:00
|
|
|
# This function intended to be used by the client
|
2018-01-02 08:43:29 +00:00
|
|
|
# Queue to exchange data between "client" and server.
|
|
|
|
retData = False
|
|
|
|
if not os.path.exists(self.queueDB):
|
2018-01-04 07:12:46 +00:00
|
|
|
conn = sqlite3.connect(self.queueDB)
|
|
|
|
c = conn.cursor()
|
2018-01-02 08:43:29 +00:00
|
|
|
# Create table
|
|
|
|
c.execute('''CREATE TABLE commands
|
|
|
|
(id integer primary key autoincrement, command text, data text, date text)''')
|
|
|
|
conn.commit()
|
|
|
|
else:
|
2018-01-04 07:12:46 +00:00
|
|
|
conn = sqlite3.connect(self.queueDB)
|
|
|
|
c = conn.cursor()
|
|
|
|
for row in c.execute('SELECT command, data, date, min(ID) FROM commands group by id'):
|
|
|
|
retData = row
|
|
|
|
break
|
|
|
|
if retData != False:
|
|
|
|
c.execute('delete from commands where id = ?', (retData[3],))
|
|
|
|
conn.commit()
|
2018-01-02 08:43:29 +00:00
|
|
|
conn.close()
|
|
|
|
|
|
|
|
return retData
|
|
|
|
|
|
|
|
def daemonQueueAdd(self, command, data=''):
|
2018-01-04 07:12:46 +00:00
|
|
|
# Intended to be used by the web server
|
2018-01-02 08:43:29 +00:00
|
|
|
date = math.floor(time.time())
|
|
|
|
conn = sqlite3.connect(self.queueDB)
|
|
|
|
c = conn.cursor()
|
|
|
|
t = (command, data, date)
|
|
|
|
c.execute('INSERT into commands (command, data, date) values (?, ?, ?)', t)
|
|
|
|
conn.commit()
|
|
|
|
conn.close()
|
|
|
|
return
|