1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
|
// Package tor manages and automates starting a child tor process for exposing TCP services into onionland.
package tor
import (
"crypto/rsa"
"fmt"
"log"
"strconv"
"time"
"github.com/Yawning/bulb"
"github.com/phayes/freeport"
"github.com/sycamoreone/orc/tor"
)
// Config is a wrapper struct for tor configuration.
type Config struct {
DataDir string
HashedControlPassword string
ClearPassword string
Timeout time.Duration
}
// StartTor starts a new instance of tor or doesn't with the reason why.
func StartTor(cfg Config) (*Tor, error) {
tc := tor.NewConfig()
tc.Set("DataDirectory", cfg.DataDir)
tc.Set("HashedControlPassword", cfg.HashedControlPassword)
tc.Set("SocksPort", "0")
port, err := freeport.GetFreePort()
if err != nil {
return nil, err
}
tc.Set("ControlPort", fmt.Sprint(port))
tc.Timeout = cfg.Timeout
tcmd, err := tor.NewCmd(tc)
if err != nil {
return nil, err
}
err = tcmd.Start()
if err != nil {
return nil, err
}
log.Println("tor started, sleeping for a few seconds for it to settle...")
time.Sleep(5 * time.Second)
bc, err := bulb.Dial("tcp", "127.0.0.1:"+strconv.Itoa(port))
if err != nil {
return nil, err
}
err = bc.Authenticate(cfg.ClearPassword)
if err != nil {
return nil, err
}
t := &Tor{
tc: tc,
tcmd: tcmd,
bc: bc,
}
return t, nil
}
// Tor is a higher level wrapper to a child tor process
type Tor struct {
tc *tor.Config
tcmd *tor.Cmd
bc *bulb.Conn
}
// AddOnion adds an onion service to this machine with the given private key
// (can be nil for an auto-generated key), virtual onion port and TCP destunation.
func (t *Tor) AddOnion(pKey *rsa.PrivateKey, virtPort uint16, destination string) (*bulb.OnionInfo, error) {
return t.bc.AddOnion([]bulb.OnionPortSpec{
{
VirtPort: virtPort,
Target: destination,
},
}, pKey, true)
}
|