mirror of
https://github.com/onionshare/onionshare.git
synced 2025-07-26 08:05:49 -04:00
added stem python library
This commit is contained in:
parent
8ffa569094
commit
619ab6db0f
37 changed files with 19032 additions and 0 deletions
945
lib/stem/response/events.py
Normal file
945
lib/stem/response/events.py
Normal file
|
@ -0,0 +1,945 @@
|
|||
# Copyright 2012-2013, Damian Johnson and The Tor Project
|
||||
# See LICENSE for licensing information
|
||||
|
||||
import datetime
|
||||
import io
|
||||
import re
|
||||
import time
|
||||
|
||||
import stem
|
||||
import stem.control
|
||||
import stem.descriptor.router_status_entry
|
||||
import stem.response
|
||||
import stem.version
|
||||
|
||||
from stem.util import connection, log, str_tools, tor_tools
|
||||
|
||||
# Matches keyword=value arguments. This can't be a simple "(.*)=(.*)" pattern
|
||||
# because some positional arguments, like circuit paths, can have an equal
|
||||
# sign.
|
||||
|
||||
KW_ARG = re.compile("^(.*) ([A-Za-z0-9_]+)=(\S*)$")
|
||||
QUOTED_KW_ARG = re.compile("^(.*) ([A-Za-z0-9_]+)=\"(.*)\"$")
|
||||
|
||||
|
||||
class Event(stem.response.ControlMessage):
|
||||
"""
|
||||
Base for events we receive asynchronously, as described in section 4.1 of the
|
||||
`control-spec
|
||||
<https://gitweb.torproject.org/torspec.git/blob/HEAD:/control-spec.txt>`_.
|
||||
|
||||
:var str type: event type
|
||||
:var int arrived_at: unix timestamp for when the message arrived
|
||||
:var list positional_args: positional arguments of the event
|
||||
:var dict keyword_args: key/value arguments of the event
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = () # attribute names for recognized positional arguments
|
||||
_KEYWORD_ARGS = {} # map of 'keyword => attribute' for recognized attributes
|
||||
_QUOTED = () # positional arguments that are quoted
|
||||
_OPTIONALLY_QUOTED = () # positional arguments that may or may not be quoted
|
||||
_SKIP_PARSING = False # skip parsing contents into our positional_args and keyword_args
|
||||
_VERSION_ADDED = stem.version.Version('0.1.1.1-alpha') # minimum version with control-spec V1 event support
|
||||
|
||||
def _parse_message(self, arrived_at = None):
|
||||
if arrived_at is None:
|
||||
arrived_at = int(time.time())
|
||||
|
||||
if not str(self).strip():
|
||||
raise stem.ProtocolError("Received a blank tor event. Events must at the very least have a type.")
|
||||
|
||||
self.type = str(self).split().pop(0)
|
||||
self.arrived_at = arrived_at
|
||||
|
||||
# if we're a recognized event type then translate ourselves into that subclass
|
||||
|
||||
if self.type in EVENT_TYPE_TO_CLASS:
|
||||
self.__class__ = EVENT_TYPE_TO_CLASS[self.type]
|
||||
|
||||
self.positional_args = []
|
||||
self.keyword_args = {}
|
||||
|
||||
if not self._SKIP_PARSING:
|
||||
self._parse_standard_attr()
|
||||
|
||||
self._parse()
|
||||
|
||||
def _parse_standard_attr(self):
|
||||
"""
|
||||
Most events are of the form...
|
||||
650 *( positional_args ) *( key "=" value )
|
||||
|
||||
This parses this standard format, populating our **positional_args** and
|
||||
**keyword_args** attributes and creating attributes if it's in our event's
|
||||
**_POSITIONAL_ARGS** and **_KEYWORD_ARGS**.
|
||||
"""
|
||||
|
||||
# Tor events contain some number of positional arguments followed by
|
||||
# key/value mappings. Parsing keyword arguments from the end until we hit
|
||||
# something that isn't a key/value mapping. The rest are positional.
|
||||
|
||||
content = str(self)
|
||||
|
||||
while True:
|
||||
match = QUOTED_KW_ARG.match(content)
|
||||
|
||||
if not match:
|
||||
match = KW_ARG.match(content)
|
||||
|
||||
if match:
|
||||
content, keyword, value = match.groups()
|
||||
self.keyword_args[keyword] = value
|
||||
else:
|
||||
break
|
||||
|
||||
# Setting attributes for the fields that we recognize.
|
||||
|
||||
self.positional_args = content.split()[1:]
|
||||
positional = list(self.positional_args)
|
||||
|
||||
for attr_name in self._POSITIONAL_ARGS:
|
||||
attr_value = None
|
||||
|
||||
if positional:
|
||||
if attr_name in self._QUOTED or (attr_name in self._OPTIONALLY_QUOTED and positional[0].startswith('"')):
|
||||
attr_values = [positional.pop(0)]
|
||||
|
||||
if not attr_values[0].startswith('"'):
|
||||
raise stem.ProtocolError("The %s value should be quoted, but didn't have a starting quote: %s" % (attr_name, self))
|
||||
|
||||
while True:
|
||||
if not positional:
|
||||
raise stem.ProtocolError("The %s value should be quoted, but didn't have an ending quote: %s" % (attr_name, self))
|
||||
|
||||
attr_values.append(positional.pop(0))
|
||||
|
||||
if attr_values[-1].endswith('"'):
|
||||
break
|
||||
|
||||
attr_value = " ".join(attr_values)[1:-1]
|
||||
else:
|
||||
attr_value = positional.pop(0)
|
||||
|
||||
setattr(self, attr_name, attr_value)
|
||||
|
||||
for controller_attr_name, attr_name in self._KEYWORD_ARGS.items():
|
||||
setattr(self, attr_name, self.keyword_args.get(controller_attr_name))
|
||||
|
||||
# method overwritten by our subclasses for special handling that they do
|
||||
def _parse(self):
|
||||
pass
|
||||
|
||||
def _log_if_unrecognized(self, attr, attr_enum):
|
||||
"""
|
||||
Checks if an attribute exists in a given enumeration, logging a message if
|
||||
it isn't. Attributes can either be for a string or collection of strings
|
||||
|
||||
:param str attr: name of the attribute to check
|
||||
:param stem.util.enum.Enum enum: enumeration to check against
|
||||
"""
|
||||
|
||||
attr_values = getattr(self, attr)
|
||||
|
||||
if attr_values:
|
||||
if isinstance(attr_values, (bytes, unicode)):
|
||||
attr_values = [attr_values]
|
||||
|
||||
for value in attr_values:
|
||||
if not value in attr_enum:
|
||||
log_id = "event.%s.unknown_%s.%s" % (self.type.lower(), attr, value)
|
||||
unrecognized_msg = "%s event had an unrecognized %s (%s). Maybe a new addition to the control protocol? Full Event: '%s'" % (self.type, attr, value, self)
|
||||
log.log_once(log_id, log.INFO, unrecognized_msg)
|
||||
|
||||
|
||||
class AddrMapEvent(Event):
|
||||
"""
|
||||
Event that indicates a new address mapping.
|
||||
|
||||
The ADDRMAP event was one of the first Control Protocol V1 events and was
|
||||
introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var str hostname: address being resolved
|
||||
:var str destination: destionation of the resolution, this is usually an ip,
|
||||
but could be a hostname if TrackHostExits is enabled or **NONE** if the
|
||||
resolution failed
|
||||
:var datetime expiry: expiration time of the resolution in local time
|
||||
:var str error: error code if the resolution failed
|
||||
:var datetime utc_expiry: expiration time of the resolution in UTC
|
||||
:var bool cached: **True** if the resolution will be kept until it expires,
|
||||
**False** otherwise or **None** if undefined
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("hostname", "destination", "expiry")
|
||||
_KEYWORD_ARGS = {
|
||||
"error": "error",
|
||||
"EXPIRES": "utc_expiry",
|
||||
"CACHED": "cached",
|
||||
}
|
||||
_OPTIONALLY_QUOTED = ("expiry")
|
||||
|
||||
def _parse(self):
|
||||
if self.destination == "<error>":
|
||||
self.destination = None
|
||||
|
||||
if self.expiry is not None:
|
||||
if self.expiry == "NEVER":
|
||||
self.expiry = None
|
||||
else:
|
||||
try:
|
||||
self.expiry = datetime.datetime.strptime(self.expiry, "%Y-%m-%d %H:%M:%S")
|
||||
except ValueError:
|
||||
raise stem.ProtocolError("Unable to parse date in ADDRMAP event: %s" % self)
|
||||
|
||||
if self.utc_expiry is not None:
|
||||
self.utc_expiry = datetime.datetime.strptime(self.utc_expiry, "%Y-%m-%d %H:%M:%S")
|
||||
|
||||
if self.cached is not None:
|
||||
if self.cached == "YES":
|
||||
self.cached = True
|
||||
elif self.cached == "NO":
|
||||
self.cached = False
|
||||
else:
|
||||
raise stem.ProtocolError("An ADDRMAP event's CACHED mapping can only be 'YES' or 'NO': %s" % self)
|
||||
|
||||
|
||||
class AuthDirNewDescEvent(Event):
|
||||
"""
|
||||
Event specific to directory authorities, indicating that we just received new
|
||||
descriptors. The descriptor type contained within this event is unspecified
|
||||
so the descriptor contents are left unparsed.
|
||||
|
||||
The AUTHDIR_NEWDESCS event was introduced in tor version 0.1.1.10-alpha.
|
||||
|
||||
:var stem.AuthDescriptorAction action: what is being done with the descriptor
|
||||
:var str message: explanation of why we chose this action
|
||||
:var str descriptor: content of the descriptor
|
||||
"""
|
||||
|
||||
_SKIP_PARSING = True
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_AUTHDIR_NEWDESCS
|
||||
|
||||
def _parse(self):
|
||||
lines = str(self).split('\n')
|
||||
|
||||
if len(lines) < 5:
|
||||
raise stem.ProtocolError("AUTHDIR_NEWDESCS events must contain lines for at least the type, action, message, descriptor, and terminating 'OK'")
|
||||
elif not lines[-1] == "OK":
|
||||
raise stem.ProtocolError("AUTHDIR_NEWDESCS doesn't end with an 'OK'")
|
||||
|
||||
self.action = lines[1]
|
||||
self.message = lines[2]
|
||||
self.descriptor = '\n'.join(lines[3:-1])
|
||||
|
||||
|
||||
class BandwidthEvent(Event):
|
||||
"""
|
||||
Event emitted every second with the bytes sent and received by tor.
|
||||
|
||||
The BW event was one of the first Control Protocol V1 events and was
|
||||
introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var long read: bytes received by tor that second
|
||||
:var long written: bytes sent by tor that second
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("read", "written")
|
||||
|
||||
def _parse(self):
|
||||
if not self.read:
|
||||
raise stem.ProtocolError("BW event is missing its read value")
|
||||
elif not self.written:
|
||||
raise stem.ProtocolError("BW event is missing its written value")
|
||||
elif not self.read.isdigit() or not self.written.isdigit():
|
||||
raise stem.ProtocolError("A BW event's bytes sent and received should be a positive numeric value, received: %s" % self)
|
||||
|
||||
self.read = long(self.read)
|
||||
self.written = long(self.written)
|
||||
|
||||
|
||||
class BuildTimeoutSetEvent(Event):
|
||||
"""
|
||||
Event indicating that the timeout value for a circuit has changed. This was
|
||||
first added in tor version 0.2.2.7.
|
||||
|
||||
The BUILDTIMEOUT_SET event was introduced in tor version 0.2.2.7-alpha.
|
||||
|
||||
:var stem.TimeoutSetType set_type: way in which the timeout is changing
|
||||
:var int total_times: circuit build times tor used to determine the timeout
|
||||
:var int timeout: circuit timeout value in milliseconds
|
||||
:var int xm: Pareto parameter Xm in milliseconds
|
||||
:var float alpha: Pareto parameter alpha
|
||||
:var float quantile: CDF quantile cutoff point
|
||||
:var float timeout_rate: ratio of circuits that have time out
|
||||
:var int close_timeout: duration to keep measurement circuits in milliseconds
|
||||
:var float close_rate: ratio of measurement circuits that are closed
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("set_type",)
|
||||
_KEYWORD_ARGS = {
|
||||
"TOTAL_TIMES": "total_times",
|
||||
"TIMEOUT_MS": "timeout",
|
||||
"XM": "xm",
|
||||
"ALPHA": "alpha",
|
||||
"CUTOFF_QUANTILE": "quantile",
|
||||
"TIMEOUT_RATE": "timeout_rate",
|
||||
"CLOSE_MS": "close_timeout",
|
||||
"CLOSE_RATE": "close_rate",
|
||||
}
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_BUILDTIMEOUT_SET
|
||||
|
||||
def _parse(self):
|
||||
# convert our integer and float parameters
|
||||
|
||||
for param in ('total_times', 'timeout', 'xm', 'close_timeout'):
|
||||
param_value = getattr(self, param)
|
||||
|
||||
if param_value is not None:
|
||||
try:
|
||||
setattr(self, param, int(param_value))
|
||||
except ValueError:
|
||||
raise stem.ProtocolError("The %s of a BUILDTIMEOUT_SET should be an integer: %s" % (param, self))
|
||||
|
||||
for param in ('alpha', 'quantile', 'timeout_rate', 'close_rate'):
|
||||
param_value = getattr(self, param)
|
||||
|
||||
if param_value is not None:
|
||||
try:
|
||||
setattr(self, param, float(param_value))
|
||||
except ValueError:
|
||||
raise stem.ProtocolError("The %s of a BUILDTIMEOUT_SET should be a float: %s" % (param, self))
|
||||
|
||||
self._log_if_unrecognized('set_type', stem.TimeoutSetType)
|
||||
|
||||
|
||||
class CircuitEvent(Event):
|
||||
"""
|
||||
Event that indicates that a circuit has changed.
|
||||
|
||||
The fingerprint or nickname values in our 'path' may be **None** if the
|
||||
VERBOSE_NAMES feature isn't enabled. The option was first introduced in tor
|
||||
version 0.1.2.2, and on by default after 0.2.2.1.
|
||||
|
||||
The CIRC event was one of the first Control Protocol V1 events and was
|
||||
introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var str id: circuit identifier
|
||||
:var stem.CircStatus status: reported status for the circuit
|
||||
:var tuple path: relays involved in the circuit, these are
|
||||
**(fingerprint, nickname)** tuples
|
||||
:var tuple build_flags: :data:`~stem.CircBuildFlag` attributes
|
||||
governing how the circuit is built
|
||||
:var stem.CircPurpose purpose: purpose that the circuit is intended for
|
||||
:var stem.HiddenServiceState hs_state: status if this is a hidden service circuit
|
||||
:var str rend_query: circuit's rendezvous-point if this is hidden service related
|
||||
:var datetime created: time when the circuit was created or cannibalized
|
||||
:var stem.CircClosureReason reason: reason for the circuit to be closed
|
||||
:var stem.CircClosureReason remote_reason: remote side's reason for the circuit to be closed
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("id", "status", "path")
|
||||
_KEYWORD_ARGS = {
|
||||
"BUILD_FLAGS": "build_flags",
|
||||
"PURPOSE": "purpose",
|
||||
"HS_STATE": "hs_state",
|
||||
"REND_QUERY": "rend_query",
|
||||
"TIME_CREATED": "created",
|
||||
"REASON": "reason",
|
||||
"REMOTE_REASON": "remote_reason",
|
||||
}
|
||||
|
||||
def _parse(self):
|
||||
self.path = tuple(stem.control._parse_circ_path(self.path))
|
||||
|
||||
if self.build_flags is not None:
|
||||
self.build_flags = tuple(self.build_flags.split(','))
|
||||
|
||||
if self.created is not None:
|
||||
try:
|
||||
self.created = str_tools._parse_iso_timestamp(self.created)
|
||||
except ValueError as exc:
|
||||
raise stem.ProtocolError("Unable to parse create date (%s): %s" % (exc, self))
|
||||
|
||||
if not tor_tools.is_valid_circuit_id(self.id):
|
||||
raise stem.ProtocolError("Circuit IDs must be one to sixteen alphanumeric characters, got '%s': %s" % (self.id, self))
|
||||
|
||||
self._log_if_unrecognized('status', stem.CircStatus)
|
||||
self._log_if_unrecognized('build_flags', stem.CircBuildFlag)
|
||||
self._log_if_unrecognized('purpose', stem.CircPurpose)
|
||||
self._log_if_unrecognized('hs_state', stem.HiddenServiceState)
|
||||
self._log_if_unrecognized('reason', stem.CircClosureReason)
|
||||
self._log_if_unrecognized('remote_reason', stem.CircClosureReason)
|
||||
|
||||
|
||||
class CircMinorEvent(Event):
|
||||
"""
|
||||
Event providing information about minor changes in our circuits. This was
|
||||
first added in tor version 0.2.3.11.
|
||||
|
||||
The CIRC_MINOR event was introduced in tor version 0.2.3.11-alpha.
|
||||
|
||||
:var str id: circuit identifier
|
||||
:var stem.CircEvent event: type of change in the circuit
|
||||
:var tuple path: relays involved in the circuit, these are
|
||||
**(fingerprint, nickname)** tuples
|
||||
:var tuple build_flags: :data:`~stem.CircBuildFlag` attributes
|
||||
governing how the circuit is built
|
||||
:var stem.CircPurpose purpose: purpose that the circuit is intended for
|
||||
:var stem.HiddenServiceState hs_state: status if this is a hidden service circuit
|
||||
:var str rend_query: circuit's rendezvous-point if this is hidden service related
|
||||
:var datetime created: time when the circuit was created or cannibalized
|
||||
:var stem.CircPurpose old_purpose: prior purpose for the circuit
|
||||
:var stem.HiddenServiceState old_hs_state: prior status as a hidden service circuit
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("id", "event", "path")
|
||||
_KEYWORD_ARGS = {
|
||||
"BUILD_FLAGS": "build_flags",
|
||||
"PURPOSE": "purpose",
|
||||
"HS_STATE": "hs_state",
|
||||
"REND_QUERY": "rend_query",
|
||||
"TIME_CREATED": "created",
|
||||
"OLD_PURPOSE": "old_purpose",
|
||||
"OLD_HS_STATE": "old_hs_state",
|
||||
}
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_CIRC_MINOR
|
||||
|
||||
def _parse(self):
|
||||
self.path = tuple(stem.control._parse_circ_path(self.path))
|
||||
|
||||
if self.build_flags is not None:
|
||||
self.build_flags = tuple(self.build_flags.split(','))
|
||||
|
||||
if self.created is not None:
|
||||
try:
|
||||
self.created = str_tools._parse_iso_timestamp(self.created)
|
||||
except ValueError as exc:
|
||||
raise stem.ProtocolError("Unable to parse create date (%s): %s" % (exc, self))
|
||||
|
||||
if not tor_tools.is_valid_circuit_id(self.id):
|
||||
raise stem.ProtocolError("Circuit IDs must be one to sixteen alphanumeric characters, got '%s': %s" % (self.id, self))
|
||||
|
||||
self._log_if_unrecognized('event', stem.CircEvent)
|
||||
self._log_if_unrecognized('build_flags', stem.CircBuildFlag)
|
||||
self._log_if_unrecognized('purpose', stem.CircPurpose)
|
||||
self._log_if_unrecognized('hs_state', stem.HiddenServiceState)
|
||||
self._log_if_unrecognized('old_purpose', stem.CircPurpose)
|
||||
self._log_if_unrecognized('old_hs_state', stem.HiddenServiceState)
|
||||
|
||||
|
||||
class ClientsSeenEvent(Event):
|
||||
"""
|
||||
Periodic event on bridge relays that provides a summary of our users.
|
||||
|
||||
The CLIENTS_SEEN event was introduced in tor version 0.2.1.10-alpha.
|
||||
|
||||
:var datetime start_time: time in UTC that we started collecting these stats
|
||||
:var dict locales: mapping of country codes to a rounded count for the number of users
|
||||
:var dict ip_versions: mapping of ip protocols to a rounded count for the number of users
|
||||
"""
|
||||
|
||||
_KEYWORD_ARGS = {
|
||||
"TimeStarted": "start_time",
|
||||
"CountrySummary": "locales",
|
||||
"IPVersions": "ip_versions",
|
||||
}
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_CLIENTS_SEEN
|
||||
|
||||
def _parse(self):
|
||||
if self.start_time is not None:
|
||||
self.start_time = datetime.datetime.strptime(self.start_time, "%Y-%m-%d %H:%M:%S")
|
||||
|
||||
if self.locales is not None:
|
||||
locale_to_count = {}
|
||||
|
||||
for entry in self.locales.split(','):
|
||||
if not '=' in entry:
|
||||
raise stem.ProtocolError("The CLIENTS_SEEN's CountrySummary should be a comma separated listing of '<locale>=<count>' mappings: %s" % self)
|
||||
|
||||
locale, count = entry.split('=', 1)
|
||||
|
||||
if len(locale) != 2:
|
||||
raise stem.ProtocolError("Locales should be a two character code, got '%s': %s" % (locale, self))
|
||||
elif not count.isdigit():
|
||||
raise stem.ProtocolError("Locale count was non-numeric (%s): %s" % (count, self))
|
||||
elif locale in locale_to_count:
|
||||
raise stem.ProtocolError("CountrySummary had multiple mappings for '%s': %s" % (locale, self))
|
||||
|
||||
locale_to_count[locale] = int(count)
|
||||
|
||||
self.locales = locale_to_count
|
||||
|
||||
if self.ip_versions is not None:
|
||||
protocol_to_count = {}
|
||||
|
||||
for entry in self.ip_versions.split(','):
|
||||
if not '=' in entry:
|
||||
raise stem.ProtocolError("The CLIENTS_SEEN's IPVersions should be a comma separated listing of '<protocol>=<count>' mappings: %s" % self)
|
||||
|
||||
protocol, count = entry.split('=', 1)
|
||||
|
||||
if not count.isdigit():
|
||||
raise stem.ProtocolError("IP protocol count was non-numeric (%s): %s" % (count, self))
|
||||
|
||||
protocol_to_count[protocol] = int(count)
|
||||
|
||||
self.ip_versions = protocol_to_count
|
||||
|
||||
|
||||
class ConfChangedEvent(Event):
|
||||
"""
|
||||
Event that indicates that our configuration changed, either in response to a
|
||||
SETCONF or RELOAD signal.
|
||||
|
||||
The CONF_CHANGED event was introduced in tor version 0.2.3.3-alpha.
|
||||
|
||||
:var dict config: mapping of configuration options to their new values
|
||||
(**None** if the option is being unset)
|
||||
"""
|
||||
|
||||
_SKIP_PARSING = True
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_CONF_CHANGED
|
||||
|
||||
def _parse(self):
|
||||
self.config = {}
|
||||
|
||||
# Skip first and last line since they're the header and footer. For
|
||||
# instance...
|
||||
#
|
||||
# 650-CONF_CHANGED
|
||||
# 650-ExitNodes=caerSidi
|
||||
# 650-ExitPolicy
|
||||
# 650-MaxCircuitDirtiness=20
|
||||
# 650 OK
|
||||
|
||||
for line in str(self).splitlines()[1:-1]:
|
||||
if '=' in line:
|
||||
key, value = line.split('=', 1)
|
||||
else:
|
||||
key, value = line, None
|
||||
|
||||
self.config[key] = value
|
||||
|
||||
|
||||
class DescChangedEvent(Event):
|
||||
"""
|
||||
Event that indicates that our descriptor has changed.
|
||||
|
||||
The DESCCHANGED event was introduced in tor version 0.1.2.2-alpha.
|
||||
"""
|
||||
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_DESCCHANGED
|
||||
|
||||
|
||||
class GuardEvent(Event):
|
||||
"""
|
||||
Event that indicates that our guard relays have changed. The 'endpoint' could
|
||||
be either a...
|
||||
|
||||
* fingerprint
|
||||
* 'fingerprint=nickname' pair
|
||||
|
||||
The derived 'endpoint_*' attributes are generally more useful.
|
||||
|
||||
The GUARD event was introduced in tor version 0.1.2.5-alpha.
|
||||
|
||||
:var stem.GuardType guard_type: purpose the guard relay is for
|
||||
:var str endpoint: relay that the event concerns
|
||||
:var str endpoint_fingerprint: endpoint's finterprint
|
||||
:var str endpoint_nickname: endpoint's nickname if it was provided
|
||||
:var stem.GuardStatus status: status of the guard relay
|
||||
"""
|
||||
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_GUARD
|
||||
_POSITIONAL_ARGS = ("guard_type", "endpoint", "status")
|
||||
|
||||
def _parse(self):
|
||||
self.endpoint_fingerprint = None
|
||||
self.endpoint_nickname = None
|
||||
|
||||
try:
|
||||
self.endpoint_fingerprint, self.endpoint_nickname = \
|
||||
stem.control._parse_circ_entry(self.endpoint)
|
||||
except stem.ProtocolError:
|
||||
raise stem.ProtocolError("ORCONN's endpoint doesn't match a ServerSpec: %s" % self)
|
||||
|
||||
self._log_if_unrecognized('guard_type', stem.GuardType)
|
||||
self._log_if_unrecognized('status', stem.GuardStatus)
|
||||
|
||||
|
||||
class LogEvent(Event):
|
||||
"""
|
||||
Tor logging event. These are the most visible kind of event since, by
|
||||
default, tor logs at the NOTICE :data:`~stem.Runlevel` to stdout.
|
||||
|
||||
The logging events were some of the first Control Protocol V1 events
|
||||
and were introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var stem.Runlevel runlevel: runlevel of the logged message
|
||||
:var str message: logged message
|
||||
"""
|
||||
|
||||
_SKIP_PARSING = True
|
||||
|
||||
def _parse(self):
|
||||
self.runlevel = self.type
|
||||
self._log_if_unrecognized('runlevel', stem.Runlevel)
|
||||
|
||||
# message is our content, minus the runlevel and ending "OK" if a
|
||||
# multi-line message
|
||||
|
||||
self.message = str(self)[len(self.runlevel) + 1:].rstrip("\nOK")
|
||||
|
||||
|
||||
class NetworkStatusEvent(Event):
|
||||
"""
|
||||
Event for when our copy of the consensus has changed. This was introduced in
|
||||
tor version 0.1.2.3.
|
||||
|
||||
The NS event was introduced in tor version 0.1.2.3-alpha.
|
||||
|
||||
:var list desc: :class:`~stem.descriptor.router_status_entry.RouterStatusEntryV3` for the changed descriptors
|
||||
"""
|
||||
|
||||
_SKIP_PARSING = True
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_NS
|
||||
|
||||
def _parse(self):
|
||||
content = str(self).lstrip("NS\n").rstrip("\nOK")
|
||||
|
||||
self.desc = list(stem.descriptor.router_status_entry._parse_file(
|
||||
io.BytesIO(str_tools._to_bytes(content)),
|
||||
True,
|
||||
entry_class = stem.descriptor.router_status_entry.RouterStatusEntryV3,
|
||||
))
|
||||
|
||||
|
||||
class NewConsensusEvent(Event):
|
||||
"""
|
||||
Event for when we have a new consensus. This is similar to
|
||||
:class:`~stem.response.events.NetworkStatusEvent`, except that it contains
|
||||
the whole consensus so anything not listed is implicitly no longer
|
||||
recommended.
|
||||
|
||||
The NEWCONSENSUS event was introduced in tor version 0.2.1.13-alpha.
|
||||
|
||||
:var list desc: :class:`~stem.descriptor.router_status_entry.RouterStatusEntryV3` for the changed descriptors
|
||||
"""
|
||||
|
||||
_SKIP_PARSING = True
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_NEWCONSENSUS
|
||||
|
||||
def _parse(self):
|
||||
content = str(self).lstrip("NEWCONSENSUS\n").rstrip("\nOK")
|
||||
|
||||
self.desc = list(stem.descriptor.router_status_entry._parse_file(
|
||||
io.BytesIO(str_tools._to_bytes(content)),
|
||||
True,
|
||||
entry_class = stem.descriptor.router_status_entry.RouterStatusEntryV3,
|
||||
))
|
||||
|
||||
|
||||
class NewDescEvent(Event):
|
||||
"""
|
||||
Event that indicates that a new descriptor is available.
|
||||
|
||||
The fingerprint or nickname values in our 'relays' may be **None** if the
|
||||
VERBOSE_NAMES feature isn't enabled. The option was first introduced in tor
|
||||
version 0.1.2.2, and on by default after 0.2.2.1.
|
||||
|
||||
The NEWDESC event was one of the first Control Protocol V1 events and was
|
||||
introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var tuple relays: **(fingerprint, nickname)** tuples for the relays with
|
||||
new descriptors
|
||||
"""
|
||||
|
||||
def _parse(self):
|
||||
self.relays = tuple([stem.control._parse_circ_entry(entry) for entry in str(self).split()[1:]])
|
||||
|
||||
|
||||
class ORConnEvent(Event):
|
||||
"""
|
||||
Event that indicates a change in a relay connection. The 'endpoint' could be
|
||||
any of several things including a...
|
||||
|
||||
* fingerprint
|
||||
* nickname
|
||||
* 'fingerprint=nickname' pair
|
||||
* address:port
|
||||
|
||||
The derived 'endpoint_*' attributes are generally more useful.
|
||||
|
||||
The ORCONN event was one of the first Control Protocol V1 events and was
|
||||
introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var str endpoint: relay that the event concerns
|
||||
:var str endpoint_fingerprint: endpoint's finterprint if it was provided
|
||||
:var str endpoint_nickname: endpoint's nickname if it was provided
|
||||
:var str endpoint_address: endpoint's address if it was provided
|
||||
:var int endpoint_port: endpoint's port if it was provided
|
||||
:var stem.ORStatus status: state of the connection
|
||||
:var stem.ORClosureReason reason: reason for the connection to be closed
|
||||
:var int circ_count: number of established and pending circuits
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("endpoint", "status")
|
||||
_KEYWORD_ARGS = {
|
||||
"REASON": "reason",
|
||||
"NCIRCS": "circ_count",
|
||||
}
|
||||
|
||||
def _parse(self):
|
||||
self.endpoint_fingerprint = None
|
||||
self.endpoint_nickname = None
|
||||
self.endpoint_address = None
|
||||
self.endpoint_port = None
|
||||
|
||||
try:
|
||||
self.endpoint_fingerprint, self.endpoint_nickname = \
|
||||
stem.control._parse_circ_entry(self.endpoint)
|
||||
except stem.ProtocolError:
|
||||
if not ':' in self.endpoint:
|
||||
raise stem.ProtocolError("ORCONN endpoint is neither a relay nor 'address:port': %s" % self)
|
||||
|
||||
address, port = self.endpoint.split(':', 1)
|
||||
|
||||
if not connection.is_valid_port(port):
|
||||
raise stem.ProtocolError("ORCONN's endpoint location's port is invalid: %s" % self)
|
||||
|
||||
self.endpoint_address = address
|
||||
self.endpoint_port = int(port)
|
||||
|
||||
if self.circ_count is not None:
|
||||
if not self.circ_count.isdigit():
|
||||
raise stem.ProtocolError("ORCONN event got a non-numeric circuit count (%s): %s" % (self.circ_count, self))
|
||||
|
||||
self.circ_count = int(self.circ_count)
|
||||
|
||||
self._log_if_unrecognized('status', stem.ORStatus)
|
||||
self._log_if_unrecognized('reason', stem.ORClosureReason)
|
||||
|
||||
|
||||
class SignalEvent(Event):
|
||||
"""
|
||||
Event that indicates that tor has received and acted upon a signal being sent
|
||||
to the process. As of tor version 0.2.4.6 the only signals conveyed by this
|
||||
event are...
|
||||
|
||||
* RELOAD
|
||||
* DUMP
|
||||
* DEBUG
|
||||
* NEWNYM
|
||||
* CLEARDNSCACHE
|
||||
|
||||
The SIGNAL event was introduced in tor version 0.2.3.1-alpha.
|
||||
|
||||
:var stem.Signal signal: signal that tor received
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("signal",)
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_SIGNAL
|
||||
|
||||
def _parse(self):
|
||||
# log if we recieved an unrecognized signal
|
||||
expected_signals = (
|
||||
stem.Signal.RELOAD,
|
||||
stem.Signal.DUMP,
|
||||
stem.Signal.DEBUG,
|
||||
stem.Signal.NEWNYM,
|
||||
stem.Signal.CLEARDNSCACHE,
|
||||
)
|
||||
|
||||
self._log_if_unrecognized('signal', expected_signals)
|
||||
|
||||
|
||||
class StatusEvent(Event):
|
||||
"""
|
||||
Notification of a change in tor's state. These are generally triggered for
|
||||
the same sort of things as log messages of the NOTICE level or higher.
|
||||
However, unlike :class:`~stem.response.events.LogEvent` these contain well
|
||||
formed data.
|
||||
|
||||
The STATUS_GENERAL, STATUS_CLIENT, STATUS_SERVER events were introduced
|
||||
in tor version 0.1.2.3-alpha.
|
||||
|
||||
:var stem.StatusType status_type: category of the status event
|
||||
:var stem.Runlevel runlevel: runlevel of the logged message
|
||||
:var str message: logged message
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("runlevel", "action")
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_STATUS
|
||||
|
||||
def _parse(self):
|
||||
if self.type == 'STATUS_GENERAL':
|
||||
self.status_type = stem.StatusType.GENERAL
|
||||
elif self.type == 'STATUS_CLIENT':
|
||||
self.status_type = stem.StatusType.CLIENT
|
||||
elif self.type == 'STATUS_SERVER':
|
||||
self.status_type = stem.StatusType.SERVER
|
||||
else:
|
||||
raise ValueError("BUG: Unrecognized status type (%s), likely an EVENT_TYPE_TO_CLASS addition without revising how 'status_type' is assigned." % self.type)
|
||||
|
||||
self._log_if_unrecognized('runlevel', stem.Runlevel)
|
||||
|
||||
|
||||
class StreamEvent(Event):
|
||||
"""
|
||||
Event that indicates that a stream has changed.
|
||||
|
||||
The STREAM event was one of the first Control Protocol V1 events and was
|
||||
introduced in tor version 0.1.1.1-alpha.
|
||||
|
||||
:var str id: stream identifier
|
||||
:var stem.StreamStatus status: reported status for the stream
|
||||
:var str circ_id: circuit that the stream is attached to
|
||||
:var str target: destination of the stream
|
||||
:var str target_address: destination address (ip, hostname, or '(Tor_internal)')
|
||||
:var int target_port: destination port
|
||||
:var stem.StreamClosureReason reason: reason for the stream to be closed
|
||||
:var stem.StreamClosureReason remote_reason: remote side's reason for the stream to be closed
|
||||
:var stem.StreamSource source: origin of the REMAP request
|
||||
:var str source_addr: requester of the connection
|
||||
:var str source_address: requester address (ip or hostname)
|
||||
:var int source_port: requester port
|
||||
:var stem.StreamPurpose purpose: purpose for the stream
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("id", "status", "circ_id", "target")
|
||||
_KEYWORD_ARGS = {
|
||||
"REASON": "reason",
|
||||
"REMOTE_REASON": "remote_reason",
|
||||
"SOURCE": "source",
|
||||
"SOURCE_ADDR": "source_addr",
|
||||
"PURPOSE": "purpose",
|
||||
}
|
||||
|
||||
def _parse(self):
|
||||
if self.target is None:
|
||||
raise stem.ProtocolError("STREAM event didn't have a target: %s" % self)
|
||||
else:
|
||||
if not ':' in self.target:
|
||||
raise stem.ProtocolError("Target location must be of the form 'address:port': %s" % self)
|
||||
|
||||
address, port = self.target.rsplit(':', 1)
|
||||
|
||||
if not connection.is_valid_port(port, allow_zero = True):
|
||||
raise stem.ProtocolError("Target location's port is invalid: %s" % self)
|
||||
|
||||
self.target_address = address
|
||||
self.target_port = int(port)
|
||||
|
||||
if self.source_addr is None:
|
||||
self.source_address = None
|
||||
self.source_port = None
|
||||
else:
|
||||
if not ':' in self.source_addr:
|
||||
raise stem.ProtocolError("Source location must be of the form 'address:port': %s" % self)
|
||||
|
||||
address, port = self.source_addr.split(':', 1)
|
||||
|
||||
if not connection.is_valid_port(port, allow_zero = True):
|
||||
raise stem.ProtocolError("Source location's port is invalid: %s" % self)
|
||||
|
||||
self.source_address = address
|
||||
self.source_port = int(port)
|
||||
|
||||
# spec specifies a circ_id of zero if the stream is unattached
|
||||
|
||||
if self.circ_id == "0":
|
||||
self.circ_id = None
|
||||
|
||||
self._log_if_unrecognized('reason', stem.StreamClosureReason)
|
||||
self._log_if_unrecognized('remote_reason', stem.StreamClosureReason)
|
||||
self._log_if_unrecognized('purpose', stem.StreamPurpose)
|
||||
|
||||
|
||||
class StreamBwEvent(Event):
|
||||
"""
|
||||
Event (emitted approximately every second) with the bytes sent and received
|
||||
by the application since the last such event on this stream.
|
||||
|
||||
The STREAM_BW event was introduced in tor version 0.1.2.8-beta.
|
||||
|
||||
:var str id: stream identifier
|
||||
:var long written: bytes sent by the application
|
||||
:var long read: bytes received by the application
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("id", "written", "read")
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_STREAM_BW
|
||||
|
||||
def _parse(self):
|
||||
if not tor_tools.is_valid_stream_id(self.id):
|
||||
raise stem.ProtocolError("Stream IDs must be one to sixteen alphanumeric characters, got '%s': %s" % (self.id, self))
|
||||
elif not self.written:
|
||||
raise stem.ProtocolError("STREAM_BW event is missing its written value")
|
||||
elif not self.read:
|
||||
raise stem.ProtocolError("STREAM_BW event is missing its read value")
|
||||
elif not self.read.isdigit() or not self.written.isdigit():
|
||||
raise stem.ProtocolError("A STREAM_BW event's bytes sent and received should be a positive numeric value, received: %s" % self)
|
||||
|
||||
self.read = long(self.read)
|
||||
self.written = long(self.written)
|
||||
|
||||
|
||||
class TransportLaunchedEvent(Event):
|
||||
"""
|
||||
Event triggered when a pluggable transport is launched.
|
||||
|
||||
The TRANSPORT_LAUNCHED event was introduced in tor version 0.2.5.0-alpha.
|
||||
|
||||
:var str type: 'server' or 'client'
|
||||
:var str name: name of the pluggable transport
|
||||
:var str address: IPv4 or IPv6 address where the transport is listening for
|
||||
connections
|
||||
:var int port: port where the transport is listening for connections
|
||||
"""
|
||||
|
||||
_POSITIONAL_ARGS = ("type", "name", "address", "port")
|
||||
_VERSION_ADDED = stem.version.Requirement.EVENT_TRANSPORT_LAUNCHED
|
||||
|
||||
def _parse(self):
|
||||
if not self.type in ('server', 'client'):
|
||||
raise stem.ProtocolError("Transport type should either be 'server' or 'client': %s" % self)
|
||||
|
||||
if not connection.is_valid_ipv4_address(self.address) and \
|
||||
not connection.is_valid_ipv6_address(self.address):
|
||||
raise stem.ProtocolError("Transport address isn't a valid IPv4 or IPv6 address: %s" % self)
|
||||
|
||||
if not connection.is_valid_port(self.port):
|
||||
raise stem.ProtocolError("Transport port is invalid: %s" % self)
|
||||
|
||||
self.port = int(self.port)
|
||||
|
||||
EVENT_TYPE_TO_CLASS = {
|
||||
"ADDRMAP": AddrMapEvent,
|
||||
"AUTHDIR_NEWDESCS": AuthDirNewDescEvent,
|
||||
"BUILDTIMEOUT_SET": BuildTimeoutSetEvent,
|
||||
"BW": BandwidthEvent,
|
||||
"CIRC": CircuitEvent,
|
||||
"CIRC_MINOR": CircMinorEvent,
|
||||
"CLIENTS_SEEN": ClientsSeenEvent,
|
||||
"CONF_CHANGED": ConfChangedEvent,
|
||||
"DEBUG": LogEvent,
|
||||
"DESCCHANGED": DescChangedEvent,
|
||||
"ERR": LogEvent,
|
||||
"GUARD": GuardEvent,
|
||||
"INFO": LogEvent,
|
||||
"NEWCONSENSUS": NewConsensusEvent,
|
||||
"NEWDESC": NewDescEvent,
|
||||
"NOTICE": LogEvent,
|
||||
"NS": NetworkStatusEvent,
|
||||
"ORCONN": ORConnEvent,
|
||||
"SIGNAL": SignalEvent,
|
||||
"STATUS_CLIENT": StatusEvent,
|
||||
"STATUS_GENERAL": StatusEvent,
|
||||
"STATUS_SERVER": StatusEvent,
|
||||
"STREAM": StreamEvent,
|
||||
"STREAM_BW": StreamBwEvent,
|
||||
"TRANSPORT_LAUNCHED": TransportLaunchedEvent,
|
||||
"WARN": LogEvent,
|
||||
|
||||
# accounting for a bug in tor 0.2.0.22
|
||||
"STATUS_SEVER": StatusEvent,
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue