feat: initial import
This commit is contained in:
commit
ac958c04f0
20 changed files with 1398 additions and 0 deletions
210
.gitignore
vendored
Normal file
210
.gitignore
vendored
Normal file
|
|
@ -0,0 +1,210 @@
|
||||||
|
# Byte-compiled / optimized / DLL files
|
||||||
|
__pycache__/
|
||||||
|
*.py[codz]
|
||||||
|
*$py.class
|
||||||
|
|
||||||
|
# C extensions
|
||||||
|
*.so
|
||||||
|
|
||||||
|
# Distribution / packaging
|
||||||
|
.Python
|
||||||
|
build/
|
||||||
|
develop-eggs/
|
||||||
|
dist/
|
||||||
|
downloads/
|
||||||
|
eggs/
|
||||||
|
.eggs/
|
||||||
|
lib/
|
||||||
|
lib64/
|
||||||
|
parts/
|
||||||
|
sdist/
|
||||||
|
var/
|
||||||
|
wheels/
|
||||||
|
share/python-wheels/
|
||||||
|
*.egg-info/
|
||||||
|
.installed.cfg
|
||||||
|
*.egg
|
||||||
|
MANIFEST
|
||||||
|
|
||||||
|
# PyInstaller
|
||||||
|
# Usually these files are written by a python script from a template
|
||||||
|
# before PyInstaller builds the exe, so as to inject date/other infos into it.
|
||||||
|
*.manifest
|
||||||
|
*.spec
|
||||||
|
|
||||||
|
# Installer logs
|
||||||
|
pip-log.txt
|
||||||
|
pip-delete-this-directory.txt
|
||||||
|
|
||||||
|
# Unit test / coverage reports
|
||||||
|
htmlcov/
|
||||||
|
.tox/
|
||||||
|
.nox/
|
||||||
|
.coverage
|
||||||
|
.coverage.*
|
||||||
|
.cache
|
||||||
|
nosetests.xml
|
||||||
|
coverage.xml
|
||||||
|
*.cover
|
||||||
|
*.py.cover
|
||||||
|
.hypothesis/
|
||||||
|
.pytest_cache/
|
||||||
|
cover/
|
||||||
|
|
||||||
|
# Translations
|
||||||
|
*.mo
|
||||||
|
*.pot
|
||||||
|
|
||||||
|
# Django stuff:
|
||||||
|
*.log
|
||||||
|
local_settings.py
|
||||||
|
db.sqlite3
|
||||||
|
db.sqlite3-journal
|
||||||
|
|
||||||
|
# Flask stuff:
|
||||||
|
instance/
|
||||||
|
.webassets-cache
|
||||||
|
|
||||||
|
# Scrapy stuff:
|
||||||
|
.scrapy
|
||||||
|
|
||||||
|
# Sphinx documentation
|
||||||
|
docs/_build/
|
||||||
|
|
||||||
|
# PyBuilder
|
||||||
|
.pybuilder/
|
||||||
|
target/
|
||||||
|
|
||||||
|
# Jupyter Notebook
|
||||||
|
.ipynb_checkpoints
|
||||||
|
|
||||||
|
# IPython
|
||||||
|
profile_default/
|
||||||
|
ipython_config.py
|
||||||
|
|
||||||
|
# pyenv
|
||||||
|
# For a library or package, you might want to ignore these files since the code is
|
||||||
|
# intended to run in multiple environments; otherwise, check them in:
|
||||||
|
# .python-version
|
||||||
|
|
||||||
|
# pipenv
|
||||||
|
# According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control.
|
||||||
|
# However, in case of collaboration, if having platform-specific dependencies or dependencies
|
||||||
|
# having no cross-platform support, pipenv may install dependencies that don't work, or not
|
||||||
|
# install all needed dependencies.
|
||||||
|
#Pipfile.lock
|
||||||
|
|
||||||
|
# UV
|
||||||
|
# Similar to Pipfile.lock, it is generally recommended to include uv.lock in version control.
|
||||||
|
# This is especially recommended for binary packages to ensure reproducibility, and is more
|
||||||
|
# commonly ignored for libraries.
|
||||||
|
#uv.lock
|
||||||
|
|
||||||
|
# poetry
|
||||||
|
# Similar to Pipfile.lock, it is generally recommended to include poetry.lock in version control.
|
||||||
|
# This is especially recommended for binary packages to ensure reproducibility, and is more
|
||||||
|
# commonly ignored for libraries.
|
||||||
|
# https://python-poetry.org/docs/basic-usage/#commit-your-poetrylock-file-to-version-control
|
||||||
|
#poetry.lock
|
||||||
|
#poetry.toml
|
||||||
|
|
||||||
|
# pdm
|
||||||
|
# Similar to Pipfile.lock, it is generally recommended to include pdm.lock in version control.
|
||||||
|
# pdm recommends including project-wide configuration in pdm.toml, but excluding .pdm-python.
|
||||||
|
# https://pdm-project.org/en/latest/usage/project/#working-with-version-control
|
||||||
|
#pdm.lock
|
||||||
|
#pdm.toml
|
||||||
|
.pdm-python
|
||||||
|
.pdm-build/
|
||||||
|
|
||||||
|
# pixi
|
||||||
|
# Similar to Pipfile.lock, it is generally recommended to include pixi.lock in version control.
|
||||||
|
#pixi.lock
|
||||||
|
# Pixi creates a virtual environment in the .pixi directory, just like venv module creates one
|
||||||
|
# in the .venv directory. It is recommended not to include this directory in version control.
|
||||||
|
.pixi
|
||||||
|
|
||||||
|
# PEP 582; used by e.g. github.com/David-OConnor/pyflow and github.com/pdm-project/pdm
|
||||||
|
__pypackages__/
|
||||||
|
|
||||||
|
# Celery stuff
|
||||||
|
celerybeat-schedule
|
||||||
|
celerybeat.pid
|
||||||
|
|
||||||
|
# SageMath parsed files
|
||||||
|
*.sage.py
|
||||||
|
|
||||||
|
# Environments
|
||||||
|
.env
|
||||||
|
.envrc
|
||||||
|
.venv
|
||||||
|
env/
|
||||||
|
venv/
|
||||||
|
ENV/
|
||||||
|
env.bak/
|
||||||
|
venv.bak/
|
||||||
|
|
||||||
|
# Spyder project settings
|
||||||
|
.spyderproject
|
||||||
|
.spyproject
|
||||||
|
|
||||||
|
# Rope project settings
|
||||||
|
.ropeproject
|
||||||
|
|
||||||
|
# mkdocs documentation
|
||||||
|
/site
|
||||||
|
|
||||||
|
# mypy
|
||||||
|
.mypy_cache/
|
||||||
|
.dmypy.json
|
||||||
|
dmypy.json
|
||||||
|
|
||||||
|
# Pyre type checker
|
||||||
|
.pyre/
|
||||||
|
|
||||||
|
# pytype static type analyzer
|
||||||
|
.pytype/
|
||||||
|
|
||||||
|
# Cython debug symbols
|
||||||
|
cython_debug/
|
||||||
|
|
||||||
|
# PyCharm
|
||||||
|
# JetBrains specific template is maintained in a separate JetBrains.gitignore that can
|
||||||
|
# be found at https://github.com/github/gitignore/blob/main/Global/JetBrains.gitignore
|
||||||
|
# and can be added to the global gitignore or merged into this file. For a more nuclear
|
||||||
|
# option (not recommended) you can uncomment the following to ignore the entire idea folder.
|
||||||
|
.idea/
|
||||||
|
|
||||||
|
# Abstra
|
||||||
|
# Abstra is an AI-powered process automation framework.
|
||||||
|
# Ignore directories containing user credentials, local state, and settings.
|
||||||
|
# Learn more at https://abstra.io/docs
|
||||||
|
.abstra/
|
||||||
|
|
||||||
|
# Visual Studio Code
|
||||||
|
# Visual Studio Code specific template is maintained in a separate VisualStudioCode.gitignore
|
||||||
|
# that can be found at https://github.com/github/gitignore/blob/main/Global/VisualStudioCode.gitignore
|
||||||
|
# and can be added to the global gitignore or merged into this file. However, if you prefer,
|
||||||
|
# you could uncomment the following to ignore the entire vscode folder
|
||||||
|
# .vscode/
|
||||||
|
|
||||||
|
# Ruff stuff:
|
||||||
|
.ruff_cache/
|
||||||
|
|
||||||
|
# PyPI configuration file
|
||||||
|
.pypirc
|
||||||
|
|
||||||
|
# Cursor
|
||||||
|
# Cursor is an AI-powered code editor. `.cursorignore` specifies files/directories to
|
||||||
|
# exclude from AI features like autocomplete and code analysis. Recommended for sensitive data
|
||||||
|
# refer to https://docs.cursor.com/context/ignore-files
|
||||||
|
.cursorignore
|
||||||
|
.cursorindexingignore
|
||||||
|
|
||||||
|
# Marimo
|
||||||
|
marimo/_static/
|
||||||
|
marimo/_lsp/
|
||||||
|
__marimo__/
|
||||||
|
|
||||||
|
# Streamlit
|
||||||
|
.streamlit/secrets.toml
|
||||||
3
Justfile
Normal file
3
Justfile
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
build:
|
||||||
|
rm -rf dist
|
||||||
|
hatch build -t sdist
|
||||||
70
README.md
Normal file
70
README.md
Normal file
|
|
@ -0,0 +1,70 @@
|
||||||
|
|
||||||
|
<h1 align="center">
|
||||||
|
<img src="https://gitlab.com/guardianproject/public-content/guardianprojectpublic/-/raw/master/Graphics/GuardianProject/pngs/logo-color-w512.png?ref_type=heads" alt="Guardian Project">
|
||||||
|
</h1>
|
||||||
|
|
||||||
|
<h2 align="center">bootbridge</h2>
|
||||||
|
<p align="center">
|
||||||
|
A command line tool to bootstrap a Tor bridge
|
||||||
|
<i>(not to be confused with <a href="https://gitlab.torproject.org/tpo/anti-censorship/bridgestrap">bridgestrap</a>).
|
||||||
|
</i>
|
||||||
|
</p>
|
||||||
|
<p align="center">
|
||||||
|
<img
|
||||||
|
alt="Language: Python"
|
||||||
|
src="https://img.shields.io/badge/lanuage-python-3178c6?style=flat-square">
|
||||||
|
<a href="https://opensource.org/licenses/BSD-2-Clause">
|
||||||
|
<img alt="Licence: BSD 2-Clause" src="https://img.shields.io/badge/license-bsd%202--clause-orange?style=flat-square">
|
||||||
|
</a>
|
||||||
|
<img alt="Lifecycle: Experimental" src="https://img.shields.io/badge/lifecycle-experimental-339999?style=flat-square">
|
||||||
|
<br>
|
||||||
|
<a href="https://guardianproject.dev/ops/bootbridge/issues">
|
||||||
|
<img alt="Issues" src="https://img.shields.io/gitea/issues/open/ops/bootbridge?gitea_url=https%3A%2F%2Fguardianproject.dev&style=flat-square">
|
||||||
|
</a>
|
||||||
|
<a href="https://opencollective.com/guardianproject">
|
||||||
|
<img alt="Open Collective backers and sponsors" src="https://img.shields.io/opencollective/all/guardianproject?style=flat-square">
|
||||||
|
</a>
|
||||||
|
</p>
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Purpose
|
||||||
|
|
||||||
|
You want to run many Tor bridges and would like to quickly bootstrap them from a fresh Debian installation.
|
||||||
|
|
||||||
|
### Requirements
|
||||||
|
|
||||||
|
* Debian stable VM fresh out of the box that won't be used for any other purpose
|
||||||
|
* Either:
|
||||||
|
* SSH access to that box
|
||||||
|
* Ability to give it cloud-init user data
|
||||||
|
|
||||||
|
### Caveats
|
||||||
|
|
||||||
|
* Many cloud providers now implement network firewalls outside the control of the operating system.
|
||||||
|
This is good for security in that if the virtual machine is compromised, it's not possible to change the firewall
|
||||||
|
rules, but it also means that you can't deliberately change the firewall rules from inside the virtual machine.
|
||||||
|
If your cloud has such a feature, it'll be up to you to configure that separately, perhaps with
|
||||||
|
[OpenTofu](https://opentofu.org/).
|
||||||
|
|
||||||
|
### Concept
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Copyright
|
||||||
|
|
||||||
|
Copyright © 2022-2025 SR2 Communications Limited.
|
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
|
||||||
|
following conditions are met:
|
||||||
|
|
||||||
|
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
|
||||||
|
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
|
||||||
|
|
||||||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
||||||
|
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||||
|
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
||||||
|
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||||
|
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
|
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
0
bootbridge/__init__.py
Normal file
0
bootbridge/__init__.py
Normal file
11
bootbridge/__main__.py
Normal file
11
bootbridge/__main__.py
Normal file
|
|
@ -0,0 +1,11 @@
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
if not __package__:
|
||||||
|
package_source_path = os.path.dirname(os.path.dirname(__file__))
|
||||||
|
sys.path.insert(0, package_source_path)
|
||||||
|
|
||||||
|
from bootbridge.app import app
|
||||||
|
|
||||||
|
app()
|
||||||
64
bootbridge/app.py
Normal file
64
bootbridge/app.py
Normal file
|
|
@ -0,0 +1,64 @@
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
import typer
|
||||||
|
from typing_extensions import Annotated
|
||||||
|
|
||||||
|
from bootbridge.settings import validate_settings, settings
|
||||||
|
from bootbridge.configure import ConfigureCommand
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.webtunnel import up_webtunnel
|
||||||
|
|
||||||
|
if not __package__:
|
||||||
|
package_source_path = os.path.dirname(os.path.dirname(__file__))
|
||||||
|
sys.path.insert(0, package_source_path)
|
||||||
|
|
||||||
|
app = typer.Typer(
|
||||||
|
help="Bootstrap a Tor bridge",
|
||||||
|
no_args_is_help=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@app.command(rich_help_panel="Configure")
|
||||||
|
def configure():
|
||||||
|
"""
|
||||||
|
Interactively define configuration for a Tor bridge.
|
||||||
|
"""
|
||||||
|
ConfigureCommand().run()
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@app.command(rich_help_panel="Provision")
|
||||||
|
def up(
|
||||||
|
force_tls_renewal: Annotated[
|
||||||
|
bool, typer.Option(help="Force renewal of TLS certificate(s), if any.")
|
||||||
|
] = False,
|
||||||
|
):
|
||||||
|
"""
|
||||||
|
Bootstrap a Tor bridge.
|
||||||
|
"""
|
||||||
|
up_functions = {
|
||||||
|
"webtunnel": up_webtunnel,
|
||||||
|
}
|
||||||
|
console.rule("[bold]bootbridge up")
|
||||||
|
validate_settings()
|
||||||
|
try:
|
||||||
|
up_functions[settings.bridge.transport](
|
||||||
|
settings.bridge, force_tls_renewal=force_tls_renewal
|
||||||
|
)
|
||||||
|
except KeyError:
|
||||||
|
raise NotImplementedError()
|
||||||
|
raise typer.Exit()
|
||||||
|
|
||||||
|
|
||||||
|
@app.command(rich_help_panel="Utilities")
|
||||||
|
def validate():
|
||||||
|
"""
|
||||||
|
Validate configuration.
|
||||||
|
"""
|
||||||
|
validate_settings()
|
||||||
|
raise typer.Exit()
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
app()
|
||||||
95
bootbridge/apt.py
Normal file
95
bootbridge/apt.py
Normal file
|
|
@ -0,0 +1,95 @@
|
||||||
|
import base64
|
||||||
|
import subprocess
|
||||||
|
from functools import cache
|
||||||
|
|
||||||
|
import typer
|
||||||
|
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.utils import run_command, requests_session, ensure_file
|
||||||
|
|
||||||
|
|
||||||
|
@cache
|
||||||
|
def get_codename() -> str:
|
||||||
|
return subprocess.check_output(["lsb_release", "-cs"], text=True).strip()
|
||||||
|
|
||||||
|
|
||||||
|
def setup_deb_tpo() -> None:
|
||||||
|
with console.status("Configuring Tor Project Debian repository..."):
|
||||||
|
s = requests_session()
|
||||||
|
r = s.get(
|
||||||
|
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
|
||||||
|
)
|
||||||
|
r.raise_for_status()
|
||||||
|
if r.headers["content-type"] == "application/pgp-keys":
|
||||||
|
key = r.content
|
||||||
|
else:
|
||||||
|
key = dearmor_gpg_key(r.content)
|
||||||
|
ensure_file(
|
||||||
|
"/usr/share/keyrings/tor-archive-keyring.gpg",
|
||||||
|
key,
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o644,
|
||||||
|
)
|
||||||
|
ensure_file(
|
||||||
|
"/etc/apt/sources.list.d/tor.list",
|
||||||
|
f"""deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org {get_codename()} main
|
||||||
|
deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org {get_codename()} main""",
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o644,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def apt_update(upgrade: bool = True) -> None:
|
||||||
|
for action in [
|
||||||
|
("Updating apt package lists", "update"),
|
||||||
|
("Upgrading apt packages", "upgrade"),
|
||||||
|
]:
|
||||||
|
with console.status(action[0] + "..."):
|
||||||
|
try:
|
||||||
|
command = ["apt", "-y", action[1]]
|
||||||
|
for output in run_command(command):
|
||||||
|
console.log("[gray30]" + output)
|
||||||
|
except subprocess.CalledProcessError:
|
||||||
|
console.log(f"[red]An error occurred while {action[0].lower()}. :boom:")
|
||||||
|
console.log(
|
||||||
|
f"[blue]To debug, you can try running '{' '.join(command)}' yourself."
|
||||||
|
)
|
||||||
|
raise typer.Exit(1)
|
||||||
|
console.log(
|
||||||
|
f":white_check_mark: Updated the apt package lists{' and upgraded packages' if upgrade else ''}."
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def apt_install(pkgs: str | list[str]) -> None:
|
||||||
|
with console.status(f"Installing apt packages ({', '.join(pkgs)})..."):
|
||||||
|
try:
|
||||||
|
if isinstance(pkgs, str):
|
||||||
|
pkgs = [pkgs]
|
||||||
|
command = ["apt", "install", "-y"] + pkgs
|
||||||
|
for output in run_command(command):
|
||||||
|
console.log("[gray30]" + output)
|
||||||
|
except subprocess.CalledProcessError:
|
||||||
|
console.log(
|
||||||
|
"[red]An error occurred while installing packages with apt. :boom:"
|
||||||
|
)
|
||||||
|
console.log(
|
||||||
|
f"[blue]To debug, you can try running 'apt install {' '.join(pkgs)}' yourself."
|
||||||
|
)
|
||||||
|
raise typer.Exit(1)
|
||||||
|
console.log(f":white_check_mark: Installed apt packages ({', '.join(pkgs)}).")
|
||||||
|
|
||||||
|
|
||||||
|
def dearmor_gpg_key(ascii_key: bytes) -> bytes:
|
||||||
|
lines = [line.strip() for line in ascii_key.strip().splitlines()]
|
||||||
|
if (
|
||||||
|
lines[0] != b"-----BEGIN PGP PUBLIC KEY BLOCK-----"
|
||||||
|
or lines[-1] != b"-----END PGP PUBLIC KEY BLOCK-----"
|
||||||
|
):
|
||||||
|
raise ValueError("Invalid PGP key format")
|
||||||
|
start_line = lines.index(b"")
|
||||||
|
body = lines[start_line:-1]
|
||||||
|
key_data = b"".join(body)
|
||||||
|
binary_key = base64.b64decode(key_data)
|
||||||
|
return binary_key
|
||||||
110
bootbridge/configure.py
Normal file
110
bootbridge/configure.py
Normal file
|
|
@ -0,0 +1,110 @@
|
||||||
|
import os
|
||||||
|
import random
|
||||||
|
import string
|
||||||
|
from typing import Any
|
||||||
|
|
||||||
|
import petname
|
||||||
|
import typer
|
||||||
|
import yaml
|
||||||
|
from rich.panel import Panel
|
||||||
|
from rich.prompt import Confirm, Prompt
|
||||||
|
|
||||||
|
from bootbridge.settings import CONFIG_PATH, validate_settings
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.utils import ensure_file
|
||||||
|
|
||||||
|
|
||||||
|
class ConfigureCommand:
|
||||||
|
settings: dict[str, Any]
|
||||||
|
old_settings: None | dict[str, Any] = None
|
||||||
|
|
||||||
|
def load_old_settings(self):
|
||||||
|
if os.path.exists(CONFIG_PATH):
|
||||||
|
if Confirm.ask("Would you like to load existing settings?"):
|
||||||
|
with open(CONFIG_PATH, "r") as config_file:
|
||||||
|
self.old_settings = yaml.safe_load(config_file)
|
||||||
|
|
||||||
|
def old_setting(
|
||||||
|
self, key: str, default: Any, current: None | dict[str, Any] = None
|
||||||
|
) -> Any:
|
||||||
|
if current is None:
|
||||||
|
if not (current := self.old_settings):
|
||||||
|
return default
|
||||||
|
key_parts = key.split(".")
|
||||||
|
if len(key_parts) == 1:
|
||||||
|
try:
|
||||||
|
return current[key_parts[0]]
|
||||||
|
except KeyError:
|
||||||
|
return default
|
||||||
|
else:
|
||||||
|
try:
|
||||||
|
return self.old_setting(
|
||||||
|
".".join(key_parts[1:]), default, current[key_parts[0]]
|
||||||
|
)
|
||||||
|
except KeyError:
|
||||||
|
return default
|
||||||
|
|
||||||
|
def ask_webtunnel(self):
|
||||||
|
self.ask(
|
||||||
|
"Enter a URL path",
|
||||||
|
"bridge.webtunnel.path",
|
||||||
|
"".join(
|
||||||
|
random.choice(string.ascii_letters + string.digits)
|
||||||
|
for _ in range(random.randint(30, 50))
|
||||||
|
),
|
||||||
|
)
|
||||||
|
self.ask(
|
||||||
|
"Choose a certificate method",
|
||||||
|
"bridge.webtunnel.certificate",
|
||||||
|
"zerossl-ip",
|
||||||
|
choices=["zerossl-ip"],
|
||||||
|
)
|
||||||
|
if self.settings["bridge"]["webtunnel"]["certificate"] == "zerossl-ip":
|
||||||
|
self.ask("Enter your ZeroSSL API token", "zerossl.token", None)
|
||||||
|
|
||||||
|
def ask(
|
||||||
|
self, prompt: str, key: str, default: str | None, choices: list[str] | None = None
|
||||||
|
) -> None:
|
||||||
|
result = Prompt.ask(
|
||||||
|
prompt, default=self.old_setting(key, default), choices=choices
|
||||||
|
)
|
||||||
|
key_parts = key.split(".")
|
||||||
|
current = self.settings
|
||||||
|
while len(key_parts) > 1:
|
||||||
|
head = key_parts.pop(0)
|
||||||
|
if head not in current:
|
||||||
|
current[head] = {}
|
||||||
|
current = current[head]
|
||||||
|
current[key_parts[0]] = result
|
||||||
|
|
||||||
|
def save(self):
|
||||||
|
ensure_file(
|
||||||
|
CONFIG_PATH,
|
||||||
|
yaml.dump(self.settings, indent=2),
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o600,
|
||||||
|
)
|
||||||
|
|
||||||
|
def run(self):
|
||||||
|
console.rule("bootbridge configure")
|
||||||
|
self.load_old_settings()
|
||||||
|
self.settings = {}
|
||||||
|
self.ask(
|
||||||
|
"Enter a nickname",
|
||||||
|
"bridge.nickname",
|
||||||
|
petname.Generate(3).title().replace("-", ""),
|
||||||
|
)
|
||||||
|
self.ask("Enter contact details", "bridge.contact", "n/a")
|
||||||
|
self.ask("Choose a transport", "bridge.transport", "webtunnel", ["webtunnel"])
|
||||||
|
if self.settings["bridge"]["transport"] == "webtunnel":
|
||||||
|
self.ask_webtunnel()
|
||||||
|
self.save()
|
||||||
|
validate_settings()
|
||||||
|
console.print(
|
||||||
|
Panel(
|
||||||
|
":floppy_disk: Configuration saved.\n\n"
|
||||||
|
":toolbox: Run [bold]bootbridge up[/bold] to bootstrap this bridge."
|
||||||
|
)
|
||||||
|
)
|
||||||
|
raise typer.Exit()
|
||||||
3
bootbridge/console.py
Normal file
3
bootbridge/console.py
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
from rich.console import Console
|
||||||
|
|
||||||
|
console = Console()
|
||||||
39
bootbridge/httpserver.py
Normal file
39
bootbridge/httpserver.py
Normal file
|
|
@ -0,0 +1,39 @@
|
||||||
|
import threading
|
||||||
|
import time
|
||||||
|
from http.server import BaseHTTPRequestHandler, HTTPServer
|
||||||
|
|
||||||
|
|
||||||
|
def bootstrap_http_handler(content: str):
|
||||||
|
class BootstrapHTTPHandler(BaseHTTPRequestHandler):
|
||||||
|
def do_GET(self) -> None:
|
||||||
|
self.send_response(200)
|
||||||
|
self.send_header("Content-type", "text/plain")
|
||||||
|
self.end_headers()
|
||||||
|
self.wfile.write(content.encode("utf-8"))
|
||||||
|
|
||||||
|
return BootstrapHTTPHandler
|
||||||
|
|
||||||
|
|
||||||
|
server_instance: HTTPServer | None = None
|
||||||
|
|
||||||
|
|
||||||
|
def _start_bootstrap_server(content: str) -> None:
|
||||||
|
global server_instance
|
||||||
|
server_address = ("", 80)
|
||||||
|
server_instance = HTTPServer(server_address, bootstrap_http_handler(content))
|
||||||
|
server_instance.serve_forever()
|
||||||
|
|
||||||
|
|
||||||
|
def start_bootstrap_server(content: str) -> None:
|
||||||
|
server_thread = threading.Thread(target=_start_bootstrap_server, args=(content,))
|
||||||
|
server_thread.daemon = True
|
||||||
|
server_thread.start()
|
||||||
|
time.sleep(1) # Give the server a second to start
|
||||||
|
|
||||||
|
|
||||||
|
def stop_bootstrap_server() -> None:
|
||||||
|
global server_instance
|
||||||
|
if server_instance:
|
||||||
|
server_instance.shutdown()
|
||||||
|
server_instance.server_close()
|
||||||
|
server_instance = None
|
||||||
96
bootbridge/settings.py
Normal file
96
bootbridge/settings.py
Normal file
|
|
@ -0,0 +1,96 @@
|
||||||
|
import os
|
||||||
|
import time
|
||||||
|
from typing import Literal, Type, Any
|
||||||
|
|
||||||
|
import typer
|
||||||
|
from pydantic import BaseModel, ValidationError
|
||||||
|
from pydantic_settings import (
|
||||||
|
BaseSettings,
|
||||||
|
PydanticBaseSettingsSource,
|
||||||
|
SettingsConfigDict,
|
||||||
|
YamlConfigSettingsSource,
|
||||||
|
)
|
||||||
|
|
||||||
|
from bootbridge.console import console
|
||||||
|
|
||||||
|
CONFIG_PATH = os.getenv("BOOTBRIDGE_CONFIG", "/etc/bootbridge.yaml")
|
||||||
|
|
||||||
|
|
||||||
|
class WebtunnelSettings(BaseModel):
|
||||||
|
certificate: Literal["zerossl-ip"]
|
||||||
|
path: str
|
||||||
|
|
||||||
|
|
||||||
|
class KeysSettings(BaseModel):
|
||||||
|
ed25519_master_id_public_key: str
|
||||||
|
ed25519_master_id_secret_key: str
|
||||||
|
secret_id_key: str
|
||||||
|
|
||||||
|
|
||||||
|
class BridgeSettings(BaseModel):
|
||||||
|
nickname: str # TODO: string constraints
|
||||||
|
contact: str # TODO: string constraints
|
||||||
|
transport: Literal["webtunnel"]
|
||||||
|
webtunnel: WebtunnelSettings | None = None
|
||||||
|
keys: KeysSettings | None = None
|
||||||
|
|
||||||
|
|
||||||
|
class ZerosslSettings(BaseModel):
|
||||||
|
token: str # TODO: string constraints?
|
||||||
|
|
||||||
|
|
||||||
|
class Settings(BaseSettings):
|
||||||
|
model_config = SettingsConfigDict(yaml_file=CONFIG_PATH)
|
||||||
|
|
||||||
|
bridge: BridgeSettings
|
||||||
|
zerossl: ZerosslSettings | None = None
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def settings_customise_sources(
|
||||||
|
cls,
|
||||||
|
settings_cls: Type[BaseSettings],
|
||||||
|
init_settings: PydanticBaseSettingsSource,
|
||||||
|
env_settings: PydanticBaseSettingsSource,
|
||||||
|
dotenv_settings: PydanticBaseSettingsSource,
|
||||||
|
file_secret_settings: PydanticBaseSettingsSource,
|
||||||
|
) -> tuple[PydanticBaseSettingsSource, ...]:
|
||||||
|
return (YamlConfigSettingsSource(settings_cls),)
|
||||||
|
|
||||||
|
|
||||||
|
settings: Settings
|
||||||
|
|
||||||
|
|
||||||
|
def ensure_setting(key: str, current: dict[str, Any] | None = None) -> None:
|
||||||
|
if current is None:
|
||||||
|
current = settings
|
||||||
|
if current is None:
|
||||||
|
console.log(":boom: No settings available.")
|
||||||
|
raise typer.Exit(1)
|
||||||
|
key_parts = key.split(".")
|
||||||
|
head = key_parts.pop(0)
|
||||||
|
return ensure_setting(head, current)
|
||||||
|
|
||||||
|
|
||||||
|
def validate_settings():
|
||||||
|
global settings
|
||||||
|
with console.status("Validating settings..."):
|
||||||
|
time.sleep(0.5)
|
||||||
|
try:
|
||||||
|
settings = Settings()
|
||||||
|
except ValidationError as exc:
|
||||||
|
console.log(str(exc))
|
||||||
|
raise typer.Exit(1)
|
||||||
|
bridge = settings.bridge
|
||||||
|
if bridge.transport == "webtunnel":
|
||||||
|
if bridge.webtunnel is None:
|
||||||
|
console.log(
|
||||||
|
":boom: [red]Missing webtunnel section in configuration file."
|
||||||
|
)
|
||||||
|
raise typer.Exit(1)
|
||||||
|
if bridge.webtunnel.certificate == "zerossl-ip":
|
||||||
|
if settings.zerossl is None:
|
||||||
|
console.log(
|
||||||
|
":boom: [red]Missing ZeroSSL section in configuration file."
|
||||||
|
)
|
||||||
|
typer.Exit(1)
|
||||||
|
console.log(":white_check_mark: Settings validated")
|
||||||
44
bootbridge/systemd.py
Normal file
44
bootbridge/systemd.py
Normal file
|
|
@ -0,0 +1,44 @@
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
import typer
|
||||||
|
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.utils import run_command
|
||||||
|
|
||||||
|
|
||||||
|
def start_service(service: str, enable: bool = False, restart: bool = False) -> None:
|
||||||
|
actions = ["restart" if restart else "start"]
|
||||||
|
if enable:
|
||||||
|
actions = ["enable"] + actions
|
||||||
|
with console.status(f"Starting {service}..."):
|
||||||
|
for action in actions:
|
||||||
|
try:
|
||||||
|
command = ["systemctl", action, service]
|
||||||
|
for output in run_command(command):
|
||||||
|
console.log("[gray30]" + output)
|
||||||
|
except subprocess.CalledProcessError:
|
||||||
|
console.log(f"[red]An error occurred while starting {service}. :boom:")
|
||||||
|
console.log(
|
||||||
|
f"[blue]To debug, you can try running '{' '.join(command)}' yourself."
|
||||||
|
)
|
||||||
|
raise typer.Exit(1)
|
||||||
|
console.log(f":white_check_mark: {'Res' if restart else 'S'}tarted {service}.")
|
||||||
|
|
||||||
|
|
||||||
|
def stop_service(service: str, disable: bool = False) -> None:
|
||||||
|
actions = ["stop"]
|
||||||
|
if disable:
|
||||||
|
actions = actions + ["disable"]
|
||||||
|
with console.status(f"Stopping {service}..."):
|
||||||
|
for action in actions:
|
||||||
|
try:
|
||||||
|
command = ["systemctl", action, service]
|
||||||
|
for output in run_command(command):
|
||||||
|
console.log("[gray30]" + output)
|
||||||
|
except subprocess.CalledProcessError:
|
||||||
|
console.log(f"[red]An error occurred while stopping {service}. :boom:")
|
||||||
|
console.log(
|
||||||
|
f"[blue]To debug, you can try running '{' '.join(command)}' yourself."
|
||||||
|
)
|
||||||
|
raise typer.Exit(1)
|
||||||
|
console.log(f":white_check_mark: Stopped {service}.")
|
||||||
73
bootbridge/tor.py
Normal file
73
bootbridge/tor.py
Normal file
|
|
@ -0,0 +1,73 @@
|
||||||
|
import base64
|
||||||
|
import os
|
||||||
|
import time
|
||||||
|
|
||||||
|
from bootbridge.settings import KeysSettings
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.utils import ensure_file, gid, uid, ensure_dir
|
||||||
|
|
||||||
|
|
||||||
|
def get_tor_data_file(filename: str) -> str: # TODO: add timeout
|
||||||
|
with console.status(f"Waiting for {filename.replace('-', ' ')}..."):
|
||||||
|
while not os.path.exists(f"/var/lib/tor/{filename}"):
|
||||||
|
time.sleep(1)
|
||||||
|
with open(f"/var/lib/tor/{filename}") as data_file:
|
||||||
|
return data_file.read()
|
||||||
|
|
||||||
|
|
||||||
|
def get_fingerprint():
|
||||||
|
return get_tor_data_file("fingerprint").split(" ")[1].strip()
|
||||||
|
|
||||||
|
|
||||||
|
def get_hashed_fingerprint():
|
||||||
|
return get_tor_data_file("hashed-fingerprint").split(" ")[1].strip()
|
||||||
|
|
||||||
|
|
||||||
|
def render_torrc(
|
||||||
|
nickname: str,
|
||||||
|
contact: str,
|
||||||
|
extra_config=list[str],
|
||||||
|
):
|
||||||
|
return "\n".join(
|
||||||
|
[
|
||||||
|
"# -- This file managed by bridgeboot. Don't edit it. --",
|
||||||
|
"DataDirectory /var/lib/tor",
|
||||||
|
"KeyDirectory /var/lib/tor/bootbridge_keys",
|
||||||
|
f"Nickname {nickname}",
|
||||||
|
f"ContactInfo {contact}",
|
||||||
|
"BridgeRelay 1",
|
||||||
|
"AssumeReachable 1",
|
||||||
|
"ORPort 127.0.0.1:auto",
|
||||||
|
"ExtORPort auto",
|
||||||
|
"SocksPort 0",
|
||||||
|
"Log notice file /var/log/tor/bootbridge.log" "",
|
||||||
|
"# -- Transport specific configuration below --",
|
||||||
|
]
|
||||||
|
+ extra_config
|
||||||
|
+ [""]
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def write_keys(keys: KeysSettings):
|
||||||
|
os.makedirs("/var/lib/tor/bootbridge_keys", exist_ok=True)
|
||||||
|
ensure_dir(
|
||||||
|
"/var/lib/tor/bootbridge_keys",
|
||||||
|
owner=uid("debian-tor"),
|
||||||
|
group=gid("debian-tor"),
|
||||||
|
mode=0o2700,
|
||||||
|
)
|
||||||
|
ensure_file(
|
||||||
|
"/var/lib/tor/bootbridge_keys/secret_id_key",
|
||||||
|
keys.secret_id_key,
|
||||||
|
uid("debian-tor"),
|
||||||
|
gid("debian-tor"),
|
||||||
|
0o600,
|
||||||
|
)
|
||||||
|
for key in ["ed25519_master_id_secret_key", "ed25519_master_id_public_key"]:
|
||||||
|
ensure_file(
|
||||||
|
f"/var/lib/tor/bootbridge_keys/{key}",
|
||||||
|
base64.b64decode(getattr(keys, key)),
|
||||||
|
uid("debian-tor"),
|
||||||
|
gid("debian-tor"),
|
||||||
|
0o600,
|
||||||
|
)
|
||||||
121
bootbridge/utils.py
Normal file
121
bootbridge/utils.py
Normal file
|
|
@ -0,0 +1,121 @@
|
||||||
|
import grp
|
||||||
|
import os
|
||||||
|
import pwd
|
||||||
|
import select
|
||||||
|
import subprocess
|
||||||
|
from functools import cache
|
||||||
|
from typing import Generator
|
||||||
|
|
||||||
|
import requests
|
||||||
|
from requests.adapters import HTTPAdapter
|
||||||
|
from rich.progress import Progress, TextColumn, BarColumn
|
||||||
|
from urllib3 import Retry
|
||||||
|
|
||||||
|
from bootbridge.console import console
|
||||||
|
|
||||||
|
|
||||||
|
def requests_session() -> requests.Session:
|
||||||
|
s = requests.Session()
|
||||||
|
retries = Retry(total=5, backoff_factor=1, status_forcelist=[500, 502, 503, 504])
|
||||||
|
s.mount("http://", HTTPAdapter(max_retries=retries))
|
||||||
|
s.mount("https://", HTTPAdapter(max_retries=retries))
|
||||||
|
return s
|
||||||
|
|
||||||
|
|
||||||
|
def download_file(
|
||||||
|
description: str, url: str, path: str, owner: int, group: int, mode: int = 0o644
|
||||||
|
) -> None:
|
||||||
|
response = requests.get(url, stream=True)
|
||||||
|
total_size = int(response.headers.get("content-length", 0))
|
||||||
|
with Progress(
|
||||||
|
TextColumn("[bold blue]{task.description}"),
|
||||||
|
BarColumn(),
|
||||||
|
TextColumn("[bold green]{task.completed}/{task.total}"),
|
||||||
|
transient=True,
|
||||||
|
) as progress:
|
||||||
|
task = progress.add_task(f"Downloading {description}...", total=total_size)
|
||||||
|
with open(path, "wb") as file:
|
||||||
|
for data in response.iter_content(chunk_size=1024):
|
||||||
|
file.write(data)
|
||||||
|
progress.update(task, advance=len(data))
|
||||||
|
console.log(f":floppy_disk: Saved {os.path.abspath(path)}.")
|
||||||
|
ensure_file(path, None, owner=owner, group=group, mode=mode)
|
||||||
|
|
||||||
|
|
||||||
|
@cache
|
||||||
|
def get_public_ip() -> str:
|
||||||
|
r = requests_session().get("https://ipv4.icanhazip.com/")
|
||||||
|
return r.text.strip()
|
||||||
|
|
||||||
|
|
||||||
|
@cache
|
||||||
|
def uid(user: str) -> int:
|
||||||
|
return pwd.getpwnam("debian-tor").pw_uid
|
||||||
|
|
||||||
|
|
||||||
|
@cache
|
||||||
|
def gid(group: str) -> int:
|
||||||
|
return grp.getgrnam("debian-tor").gr_gid
|
||||||
|
|
||||||
|
|
||||||
|
def ensure_dir(path: str, owner: int, group: int, mode: int = 0o755):
|
||||||
|
parts = path.split(os.sep)
|
||||||
|
current_path = ""
|
||||||
|
for part in parts:
|
||||||
|
if part: # Skip empty parts (e.g., leading separators)
|
||||||
|
current_path = os.path.join(current_path, part)
|
||||||
|
if not os.path.exists(current_path):
|
||||||
|
os.mkdir(current_path)
|
||||||
|
os.chown(current_path, owner, group)
|
||||||
|
os.chmod(current_path, mode)
|
||||||
|
console.log(f":floppy_disk: Created directory {current_path}.")
|
||||||
|
|
||||||
|
|
||||||
|
def ensure_file(
|
||||||
|
path: str,
|
||||||
|
content: None | str | bytes,
|
||||||
|
owner: int = 0,
|
||||||
|
group: int = 0,
|
||||||
|
mode: int = 0o640,
|
||||||
|
):
|
||||||
|
if content:
|
||||||
|
new_content = False
|
||||||
|
with open(path, "r" if isinstance(content, str) else "rb") as file:
|
||||||
|
new_content = file.read() != content
|
||||||
|
if new_content:
|
||||||
|
open_mode = "w" if isinstance(content, str) else "wb"
|
||||||
|
with open(path, open_mode) as file:
|
||||||
|
file.write(content)
|
||||||
|
console.log(f":floppy_disk: Saved {os.path.abspath(path)}.")
|
||||||
|
else:
|
||||||
|
console.log(f":floppy_disk: Already up to date {os.path.abspath(path)}.")
|
||||||
|
stat = os.stat(path)
|
||||||
|
if stat.st_uid != owner or stat.st_gid != group:
|
||||||
|
os.chown(path, owner, group)
|
||||||
|
console.log(f":floppy_disk: Changed ownership of {os.path.abspath(path)}.")
|
||||||
|
if stat.st_mode & 0o7777 != mode:
|
||||||
|
os.chmod(path, mode)
|
||||||
|
console.log(f":floppy_disk: Changed permissions of {os.path.abspath(path)}.")
|
||||||
|
|
||||||
|
|
||||||
|
def run_command(command: list[str]) -> Generator[str, None, None]:
|
||||||
|
process = subprocess.Popen(
|
||||||
|
command,
|
||||||
|
stdout=subprocess.PIPE,
|
||||||
|
stderr=subprocess.PIPE,
|
||||||
|
text=True,
|
||||||
|
env={"DEBIAN_FRONTEND": "noninteractive"},
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
reads = [process.stdout, process.stderr]
|
||||||
|
ready, _, _ = select.select(reads, [], [])
|
||||||
|
for stream in ready:
|
||||||
|
line = stream.readline()
|
||||||
|
if line:
|
||||||
|
yield line.strip()
|
||||||
|
else:
|
||||||
|
break
|
||||||
|
if process.poll() is not None:
|
||||||
|
break
|
||||||
|
if process.returncode != 0:
|
||||||
|
raise subprocess.CalledProcessError(process.returncode, command)
|
||||||
162
bootbridge/webtunnel.py
Normal file
162
bootbridge/webtunnel.py
Normal file
|
|
@ -0,0 +1,162 @@
|
||||||
|
import os
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
from rich.panel import Panel
|
||||||
|
|
||||||
|
from bootbridge.apt import apt_install, apt_update, setup_deb_tpo
|
||||||
|
from bootbridge.settings import BridgeSettings
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.systemd import start_service, stop_service
|
||||||
|
from bootbridge.tor import (
|
||||||
|
render_torrc,
|
||||||
|
get_hashed_fingerprint,
|
||||||
|
get_fingerprint,
|
||||||
|
write_keys,
|
||||||
|
)
|
||||||
|
from bootbridge.utils import download_file, ensure_file
|
||||||
|
import bootbridge.zerossl as zerossl
|
||||||
|
from bootbridge.utils import get_public_ip
|
||||||
|
|
||||||
|
NGINX_VIRTUALHOST_CONFIG = """
|
||||||
|
server {
|
||||||
|
listen 80 default_server;
|
||||||
|
listen [::]:80 default_server;
|
||||||
|
|
||||||
|
listen [::]:443 ssl http2 default_server;
|
||||||
|
listen 443 ssl http2 default_server;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
server_tokens off;
|
||||||
|
|
||||||
|
ssl_certificate /etc/ssl/private/combined.pem;
|
||||||
|
ssl_certificate_key /etc/ssl/private/key.pem;
|
||||||
|
|
||||||
|
ssl_session_timeout 15m;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
ssl_prefer_server_ciphers off;
|
||||||
|
ssl_session_tickets off;
|
||||||
|
|
||||||
|
add_header Strict-Transport-Security "max-age=63072000" always;
|
||||||
|
|
||||||
|
root /var/www/html;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri/ =403;
|
||||||
|
}
|
||||||
|
|
||||||
|
location = /!WEBTUNNEL_PATH! {
|
||||||
|
proxy_pass http://127.0.0.1:15000;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
|
||||||
|
proxy_set_header Accept-Encoding "";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
add_header Front-End-Https on;
|
||||||
|
|
||||||
|
proxy_redirect off;
|
||||||
|
access_log off;
|
||||||
|
error_log off;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
def download_webtunnel() -> None:
|
||||||
|
binary_path = "/usr/local/bin/webtunnel_server"
|
||||||
|
if not os.path.exists(binary_path):
|
||||||
|
download_file(
|
||||||
|
"Webtunnel server binary",
|
||||||
|
"https://guardianproject.dev/api/packages/irl/generic/webtunnel/202507080/webtunnel_server_amd64",
|
||||||
|
binary_path,
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o755,
|
||||||
|
)
|
||||||
|
console.log(":white_check_mark: Webtunnel server binary downloaded.")
|
||||||
|
else:
|
||||||
|
console.log(":white_check_mark: Webtunnel server binary already present.")
|
||||||
|
|
||||||
|
|
||||||
|
def write_nginx_vhost_config(path: str):
|
||||||
|
with console.status("Writing nginx virtual host configuration file..."):
|
||||||
|
ensure_file(
|
||||||
|
"/etc/nginx/sites-available/default",
|
||||||
|
NGINX_VIRTUALHOST_CONFIG.replace("!WEBTUNNEL_PATH!", path),
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o644,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def configure_tor(settings: BridgeSettings):
|
||||||
|
with console.status("Writing Tor configuration file..."):
|
||||||
|
torrc_extra_lines = [
|
||||||
|
"ServerTransportPlugin webtunnel exec /usr/local/bin/webtunnel_server",
|
||||||
|
"ServerTransportListenAddr webtunnel 127.0.0.1:15000",
|
||||||
|
f"ServerTransportOptions webtunnel url=https://{get_public_ip()}/{settings.webtunnel.path}",
|
||||||
|
]
|
||||||
|
ensure_file(
|
||||||
|
"/etc/tor/torrc",
|
||||||
|
render_torrc(
|
||||||
|
settings.nickname,
|
||||||
|
settings.contact,
|
||||||
|
extra_config=torrc_extra_lines,
|
||||||
|
),
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o644,
|
||||||
|
)
|
||||||
|
if settings.keys:
|
||||||
|
with console.status("Writing Tor keys..."):
|
||||||
|
write_keys(settings.keys)
|
||||||
|
|
||||||
|
|
||||||
|
def update_apparmor():
|
||||||
|
with console.status("Configure apparmor profile override..."):
|
||||||
|
ensure_file(
|
||||||
|
"/etc/apparmor.d/local/system_tor",
|
||||||
|
"/usr/local/bin/webtunnel_server ix,",
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o644,
|
||||||
|
)
|
||||||
|
subprocess.check_output(["apparmor_parser", "-r", "/etc/apparmor.d/system_tor"])
|
||||||
|
console.log(":white_check_mark: Apparmor profile override updated.")
|
||||||
|
|
||||||
|
|
||||||
|
def up_webtunnel(settings: BridgeSettings, force_tls_renewal: bool = False):
|
||||||
|
console.rule("Install system packages")
|
||||||
|
setup_deb_tpo()
|
||||||
|
apt_update()
|
||||||
|
apt_install(["tor", "nginx"])
|
||||||
|
download_webtunnel()
|
||||||
|
console.rule("Provision TLS certificate")
|
||||||
|
if not os.path.exists("/etc/ssl/private/combined.pem"):
|
||||||
|
stop_service("nginx")
|
||||||
|
else:
|
||||||
|
start_service("nginx")
|
||||||
|
if settings.webtunnel.certificate == "zerossl-ip":
|
||||||
|
zerossl.zerossl_ip_certificate(force_renew=force_tls_renewal)
|
||||||
|
console.rule("Configure nginx")
|
||||||
|
write_nginx_vhost_config(settings.webtunnel.path)
|
||||||
|
start_service("nginx", enable=True, restart=True)
|
||||||
|
console.rule("Configure Tor")
|
||||||
|
configure_tor(settings)
|
||||||
|
update_apparmor()
|
||||||
|
start_service("tor", enable=True, restart=True)
|
||||||
|
console.print(
|
||||||
|
Panel(
|
||||||
|
":thumbsup: Your Tor bridge is up.\n\n"
|
||||||
|
":globe_with_meridians: Connect to your bridge with the following bridgeline:\n\n"
|
||||||
|
f" webtunnel 10.0.0.2:443 {get_fingerprint()} url=https://{get_public_ip()}/{settings.webtunnel.path}\n\n"
|
||||||
|
":bar_chart: Check out your bridge metrics on the Tor Metrics website (may take a while to appear):\n\n"
|
||||||
|
f" https://metrics.torproject.org/rs.html#details/{get_hashed_fingerprint()}\n\n"
|
||||||
|
":vertical_traffic_light: Check the status of your bridge (may take a while to appear):\n\n"
|
||||||
|
f" https://bridges.torproject.org/status?id={get_hashed_fingerprint()}"
|
||||||
|
)
|
||||||
|
)
|
||||||
234
bootbridge/zerossl.py
Normal file
234
bootbridge/zerossl.py
Normal file
|
|
@ -0,0 +1,234 @@
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
import time
|
||||||
|
from ipaddress import IPv4Address
|
||||||
|
from typing import Any
|
||||||
|
|
||||||
|
import typer
|
||||||
|
from cryptography import x509
|
||||||
|
from cryptography.hazmat.backends import default_backend
|
||||||
|
from cryptography.hazmat.primitives import hashes, serialization
|
||||||
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
||||||
|
|
||||||
|
from bootbridge.console import console
|
||||||
|
from bootbridge.httpserver import start_bootstrap_server, stop_bootstrap_server
|
||||||
|
from bootbridge.settings import settings
|
||||||
|
from bootbridge.utils import get_public_ip, requests_session, ensure_file, ensure_dir
|
||||||
|
|
||||||
|
ID_PATH = "/etc/ssl/private/certificate.id"
|
||||||
|
KEY_PATH = "/etc/ssl/private/key.pem"
|
||||||
|
CERTIFICATE_PATH = "/etc/ssl/private/certificate.pem"
|
||||||
|
BUNDLE_PATH = "/etc/ssl/private/bundle.pem"
|
||||||
|
COMBINED_PATH = "/etc/ssl/private/combined.pem"
|
||||||
|
|
||||||
|
WEBROOT_PATH = "/var/www/html"
|
||||||
|
VALIDATION_PATH = "/.well-known/pki-validation"
|
||||||
|
|
||||||
|
def stage_validation(url: str, content: str) -> None:
|
||||||
|
validation_dir = os.path.join(WEBROOT_PATH, VALIDATION_PATH)
|
||||||
|
filename = os.path.basename(url)
|
||||||
|
ensure_dir(validation_dir, owner=0, group=0, mode=0o755)
|
||||||
|
ensure_file(
|
||||||
|
os.path.join(validation_dir, filename),
|
||||||
|
"\n".join(content),
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o644,
|
||||||
|
)
|
||||||
|
|
||||||
|
def get_certificate_id() -> str | None:
|
||||||
|
if os.path.exists(ID_PATH):
|
||||||
|
with open(ID_PATH, "r") as id_file:
|
||||||
|
return id_file.read()
|
||||||
|
return None
|
||||||
|
|
||||||
|
def generate_tls_key() -> rsa.RSAPrivateKey:
|
||||||
|
private_key = rsa.generate_private_key(
|
||||||
|
public_exponent=65537, key_size=2048, backend=default_backend()
|
||||||
|
)
|
||||||
|
return private_key
|
||||||
|
|
||||||
|
def write_tls_key(private_key: rsa.RSAPrivateKey) -> None:
|
||||||
|
ensure_file(
|
||||||
|
KEY_PATH,
|
||||||
|
private_key.private_bytes(
|
||||||
|
encoding=serialization.Encoding.PEM,
|
||||||
|
encryption_algorithm=serialization.NoEncryption(),
|
||||||
|
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
||||||
|
),
|
||||||
|
owner=0,
|
||||||
|
group=0,
|
||||||
|
mode=0o600,
|
||||||
|
)
|
||||||
|
|
||||||
|
def read_tls_key() -> rsa.RSAPrivateKey:
|
||||||
|
with open(KEY_PATH, "rb") as key_file:
|
||||||
|
key = serialization.load_pem_private_key(
|
||||||
|
key_file.read(), password=None, backend=default_backend()
|
||||||
|
)
|
||||||
|
assert isinstance(key, rsa.RSAPrivateKey)
|
||||||
|
return key
|
||||||
|
|
||||||
|
def generate_tls_csr(ip, private_key: rsa.RSAPrivateKey) -> str:
|
||||||
|
subject = x509.Name([x509.NameAttribute(x509.NameOID.COMMON_NAME, ip)])
|
||||||
|
alt_names = x509.SubjectAlternativeName([x509.IPAddress(IPv4Address(ip))])
|
||||||
|
csr = (
|
||||||
|
x509.CertificateSigningRequestBuilder()
|
||||||
|
.subject_name(subject)
|
||||||
|
.add_extension(alt_names, critical=False)
|
||||||
|
.sign(private_key, hashes.SHA256(), default_backend())
|
||||||
|
)
|
||||||
|
return csr.public_bytes(serialization.Encoding.PEM).decode("utf-8")
|
||||||
|
|
||||||
|
def write_certificate(cert: str, bundle: str) -> None:
|
||||||
|
ensure_file(CERTIFICATE_PATH, cert, owner=0, group=0, mode=0o644)
|
||||||
|
ensure_file(BUNDLE_PATH, bundle, owner=0, group=0, mode=0o644)
|
||||||
|
ensure_file(COMBINED_PATH, cert + "\n" + bundle, owner=0, group=0, mode=0o644)
|
||||||
|
|
||||||
|
def save_certificate_id(id: str):
|
||||||
|
with open(ID_PATH, "w") as id_file:
|
||||||
|
id_file.write(id)
|
||||||
|
|
||||||
|
class ZeroSSLManager:
|
||||||
|
def __init__(self, token: str):
|
||||||
|
self.token = token
|
||||||
|
|
||||||
|
def create_certificate(self, ip: str, csr: str) -> dict[str, Any]:
|
||||||
|
data = {
|
||||||
|
"certificate_domains": ip,
|
||||||
|
"certificate_csr": csr,
|
||||||
|
}
|
||||||
|
response = requests_session().post(
|
||||||
|
"https://api.zerossl.com/certificates",
|
||||||
|
json=data,
|
||||||
|
params={"access_key": self.token},
|
||||||
|
)
|
||||||
|
response.raise_for_status()
|
||||||
|
return response.json()
|
||||||
|
|
||||||
|
def validate_certificate(self, id: str) -> dict[str, Any]:
|
||||||
|
data = {
|
||||||
|
"validation_method": "HTTP_CSR_HASH",
|
||||||
|
}
|
||||||
|
response = requests_session().post(
|
||||||
|
f"https://api.zerossl.com/certificates/{id}/challenges",
|
||||||
|
json=data,
|
||||||
|
params={"access_key": self.token},
|
||||||
|
)
|
||||||
|
response.raise_for_status()
|
||||||
|
return response.json()
|
||||||
|
|
||||||
|
def get_certificate(self, id: str) -> dict[str, Any]:
|
||||||
|
response = requests_session().get(
|
||||||
|
f"https://api.zerossl.com/certificates/{id}",
|
||||||
|
params={"access_key": self.token},
|
||||||
|
)
|
||||||
|
response.raise_for_status()
|
||||||
|
return response.json()
|
||||||
|
|
||||||
|
def download_certificate(self, id: str) -> dict[str, Any]:
|
||||||
|
response = requests_session().get(
|
||||||
|
f"https://api.zerossl.com/certificates/{id}/download/return",
|
||||||
|
params={"access_key": self.token},
|
||||||
|
)
|
||||||
|
response.raise_for_status()
|
||||||
|
return response.json()
|
||||||
|
|
||||||
|
def revoke_certificate(self, id: str, reason: str = "Superseded"):
|
||||||
|
data = {
|
||||||
|
"reason": reason,
|
||||||
|
}
|
||||||
|
response = requests_session().post(
|
||||||
|
f"https://api.zerossl.com/certificates/{id}/revoke",
|
||||||
|
json=data,
|
||||||
|
params={"access_key": self.token},
|
||||||
|
)
|
||||||
|
response.raise_for_status()
|
||||||
|
return response.json()
|
||||||
|
|
||||||
|
|
||||||
|
def zerossl_ip_certificate(force_renew: bool = False):
|
||||||
|
bootstrap = True
|
||||||
|
ip = get_public_ip()
|
||||||
|
console.log(
|
||||||
|
f":globe_with_meridians: [blue]Your public IP is {ip}. This will be used for the TLS certificate."
|
||||||
|
)
|
||||||
|
if settings.zerossl is None:
|
||||||
|
console.log(":boom: No ZeroSSL token in configuration.")
|
||||||
|
raise typer.Exit(1)
|
||||||
|
z = ZeroSSLManager(settings.zerossl.token)
|
||||||
|
if os.path.exists(KEY_PATH):
|
||||||
|
console.log(
|
||||||
|
":locked_with_key: [blue]Found an existing TLS private key, so not generating a new one."
|
||||||
|
)
|
||||||
|
key = read_tls_key()
|
||||||
|
else:
|
||||||
|
with console.status("Generating TLS private key..."):
|
||||||
|
key = generate_tls_key()
|
||||||
|
with console.status("Saving TLS private key..."):
|
||||||
|
write_tls_key(key)
|
||||||
|
console.log(":white_check_mark: TLS private key generated and saved.")
|
||||||
|
if os.path.exists(CERTIFICATE_PATH):
|
||||||
|
bootstrap = False # TODO: determine based on anything listening on port 80
|
||||||
|
days_since_modification = (time.time() - os.stat(CERTIFICATE_PATH).st_mtime) / (
|
||||||
|
60 * 60 * 24
|
||||||
|
)
|
||||||
|
console.log(
|
||||||
|
f":locked_with_key: [blue]Found an existing TLS certificate, which was last modified {int(days_since_modification)} days ago."
|
||||||
|
)
|
||||||
|
# TODO: Actually check the certificate expiry
|
||||||
|
if days_since_modification > 80:
|
||||||
|
console.log(":clock9: [blue]Certificate is due for renewal.")
|
||||||
|
elif force_renew:
|
||||||
|
console.log(":clock12: [orange3]Certificate renewal is forced.")
|
||||||
|
else:
|
||||||
|
console.log(":white_check_mark: Certificate is still fine.")
|
||||||
|
return
|
||||||
|
with console.status("Generating TLS certificate signing request (CSR)..."):
|
||||||
|
csr = generate_tls_csr(ip, key)
|
||||||
|
console.log(":white_check_mark: TLS CSR generated.")
|
||||||
|
with console.status("Requesting to create certificate..."):
|
||||||
|
cert = z.create_certificate(ip, csr)
|
||||||
|
console.log(f":white_check_mark: Certificate created with ID {cert['id']}.")
|
||||||
|
if bootstrap:
|
||||||
|
with console.status("Starting bootstrap server... (background)"):
|
||||||
|
start_bootstrap_server(
|
||||||
|
"\n".join(
|
||||||
|
cert["validation"]["other_methods"][ip]["file_validation_content"]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
console.log(
|
||||||
|
f":white_check_mark: Started bootstrap server listening at http://{ip}/."
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
with console.status("Writing validation file to webroot..."):
|
||||||
|
stage_validation(
|
||||||
|
cert["validation"]["other_methods"][ip]["file_validation_url_http"],
|
||||||
|
cert["validation"]["other_methods"][ip]["file_validation_content"],
|
||||||
|
)
|
||||||
|
console.log(":white_check_mark: Wrote validation file to webroot.")
|
||||||
|
with console.status("Starting validation process..."):
|
||||||
|
cert = z.validate_certificate(cert["id"])
|
||||||
|
while cert["status"] == "pending_validation":
|
||||||
|
time.sleep(1)
|
||||||
|
cert = z.get_certificate(cert["id"])
|
||||||
|
if cert["status"] != "issued":
|
||||||
|
console.log(
|
||||||
|
":boom: Invalid certificate state, something went wrong so I give up."
|
||||||
|
)
|
||||||
|
sys.exit(1)
|
||||||
|
console.log(":white_check_mark: Certificate has been issued.")
|
||||||
|
stop_bootstrap_server()
|
||||||
|
with console.status("Downloading certificate..."):
|
||||||
|
dl = z.download_certificate(cert["id"])
|
||||||
|
with console.status("Saving certificate..."):
|
||||||
|
write_certificate(dl["certificate.crt"], dl["ca_bundle.crt"])
|
||||||
|
console.log(":white_check_mark: TLS certificate downloaded and saved.")
|
||||||
|
if old_id := get_certificate_id():
|
||||||
|
console.log(f"[blue]Found ID for the previous certificate {old_id}.")
|
||||||
|
with console.status("Revoking old certificate..."):
|
||||||
|
z.revoke_certificate(old_id) # TODO: check return status
|
||||||
|
console.log(":white_check_mark: Old certificate revoked.")
|
||||||
|
with console.status("Saving new certificate ID..."):
|
||||||
|
save_certificate_id(cert["id"])
|
||||||
|
console.log(":white_check_mark: New certificate ID saved.")
|
||||||
7
config.toml.example
Normal file
7
config.toml.example
Normal file
|
|
@ -0,0 +1,7 @@
|
||||||
|
[bridge]
|
||||||
|
nickname = "VastlyClearFrog"
|
||||||
|
transport = "webtunnel"
|
||||||
|
|
||||||
|
[bridge.webtunnel]
|
||||||
|
path = "mA8gsdsnJKSJGea4zF8BxVnzNCb75obO2f6KmzDHYeVkD5"
|
||||||
|
certificate = "zerossl-ip"
|
||||||
BIN
docs/concept.jpg
Normal file
BIN
docs/concept.jpg
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 69 KiB |
14
install.sh
Normal file
14
install.sh
Normal file
|
|
@ -0,0 +1,14 @@
|
||||||
|
#!/bin/bash
|
||||||
|
CODENAME=$(grep VERSION_CODENAME /etc/os-release | cut -d '=' -f 2)
|
||||||
|
apt update && apt install -y apt-transport-https git gnupg pipx wget
|
||||||
|
wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --dearmor > /usr/share/keyrings/deb.torproject.org-keyring.gpg
|
||||||
|
echo "deb [signed-by=/usr/share/keyrings/deb.torproject.org-keyring.gpg] https://deb.torproject.org/torproject.org $CODENAME main" > /etc/apt/sources.list.d/tor.list
|
||||||
|
echo "deb-src [signed-by=/usr/share/keyrings/deb.torproject.org-keyring.gpg] https://deb.torproject.org/torproject.org $CODENAME main" >> /etc/apt/sources.list.d/tor.list
|
||||||
|
apt update && apt install -y tor nginx deb.torproject.org-keyring
|
||||||
|
systemctl stop tor nginx && systemctl disable tor nginx
|
||||||
|
git clone https://guardianproject.dev/ops/bootbridge.git /opt/bootbridge
|
||||||
|
cd /opt/bootbridge
|
||||||
|
python3 -m venv venv
|
||||||
|
source venv/bin/activate
|
||||||
|
pip install .
|
||||||
|
|
||||||
42
pyproject.toml
Normal file
42
pyproject.toml
Normal file
|
|
@ -0,0 +1,42 @@
|
||||||
|
[build-system]
|
||||||
|
requires = ["hatchling >= 1.26"]
|
||||||
|
build-backend = "hatchling.build"
|
||||||
|
|
||||||
|
[project]
|
||||||
|
name = "bootbridge"
|
||||||
|
version = "0.0.0"
|
||||||
|
authors = [
|
||||||
|
{ name = "irl", email = "irl@sr2.group" },
|
||||||
|
]
|
||||||
|
description = "A simple tool to bootstrap a Tor bridge"
|
||||||
|
readme = "README.md"
|
||||||
|
license = "BSD-2-Clause"
|
||||||
|
keywords = ["tor", "censorship circumvention", "obfs4", "webtunnel"]
|
||||||
|
dependencies = [
|
||||||
|
"cryptography",
|
||||||
|
"petname",
|
||||||
|
"pydantic",
|
||||||
|
"pydantic-settings",
|
||||||
|
"pyyaml",
|
||||||
|
"requests",
|
||||||
|
"typer",
|
||||||
|
"typing-extensions",
|
||||||
|
]
|
||||||
|
|
||||||
|
[project.optional-dependencies]
|
||||||
|
dev = [
|
||||||
|
"black",
|
||||||
|
"mypy",
|
||||||
|
"ruff",
|
||||||
|
"types-pyyaml",
|
||||||
|
"types-requests",
|
||||||
|
]
|
||||||
|
|
||||||
|
[project.scripts]
|
||||||
|
bootbridge = "bootbridge.app:app"
|
||||||
|
|
||||||
|
[tool.hatch.build.targets.binary]
|
||||||
|
scripts = ["bootbridge"]
|
||||||
|
|
||||||
|
[tool.hatch.build.targets.wheel]
|
||||||
|
packages = ["bootbridge"]
|
||||||
Loading…
Add table
Add a link
Reference in a new issue