Compare commits
111 Commits
2f011de6f7
...
master
Author | SHA1 | Date | |
---|---|---|---|
228230bb1b | |||
9d3c011816 | |||
18bfac4a86 | |||
6d2441d931
|
|||
841c5d4c20
|
|||
0e3ba17a8e
|
|||
ec5a36c700
|
|||
fe26bd1727
|
|||
4466ee6172
|
|||
7f1a5f1013
|
|||
3bcb7e18ce
|
|||
37d2e06a18 | |||
978d7cf092 | |||
73c91d1426 | |||
fc5385af63
|
|||
fd4434f504
|
|||
152177473d
|
|||
00d4542404
|
|||
09c376debf
|
|||
8acd49fe09
|
|||
034f1e3403
|
|||
c4333ed827
|
|||
784f065478
|
|||
2d426a9f73
|
|||
cced3c49ef
|
|||
3d1178d8ac
|
|||
62dd8872d6
|
|||
66877d52a1
|
|||
b4a9ccb334
|
|||
d40b20e753
|
|||
90969aeadb
|
|||
101a8ab8d6
|
|||
540044c259
|
|||
1616150c2f
|
|||
c682fe1e2a
|
|||
4837948fba
|
|||
56d77f0476
|
|||
a8730ceac3
|
|||
f409aefdc0
|
|||
b08da25d21 | |||
3e0afb0d45
|
|||
df79776ede
|
|||
0c6c1c6622
|
|||
a14e0414b6
|
|||
ae743cde15
|
|||
772a9e6d2c
|
|||
6bf93241f1
|
|||
63733a317f
|
|||
ded1968f26
|
|||
4fc32ddeea
|
|||
45bab9c9f3 | |||
c5d4859326 | |||
149c206830
|
|||
798b74e5d8
|
|||
3ad96cf71a
|
|||
56a77f9c7e
|
|||
ccc664e0ea | |||
4e5634eb1d | |||
b6d46ea1bf
|
|||
b70c214584
|
|||
b6b3dd3a35
|
|||
f345d4b961 | |||
487f5ec772 | |||
5378ec8cdc
|
|||
89e8bd1295
|
|||
dc43cc3056
|
|||
8957cd6a04 | |||
81ea634b3a | |||
5e1e9f3e69 | |||
42fff36545
|
|||
621c59dce2
|
|||
a5490854af
|
|||
4bd161de54
|
|||
0874645719
|
|||
f6461273ab | |||
8d7754edc2
|
|||
7628156340 | |||
f8161f34fa | |||
7c0e66c450
|
|||
c091532f74
|
|||
c5d89d8b13 | |||
15bd2b13ca
|
|||
75f6e77668
|
|||
edfd2bd889
|
|||
e3d1280cb6
|
|||
904c01db47
|
|||
f1220dd49e | |||
3dbde8fbb8 | |||
c69241249e | |||
f0c5281697 | |||
b87e2c3b3d | |||
bfdec0e727 | |||
977b87634c | |||
d526063dcf
|
|||
a5b77d0306
|
|||
90396c2826
|
|||
4fae36ff79
|
|||
6157c68c30
|
|||
02ef40a303 | |||
4005a86058 | |||
1b802f9b6b
|
|||
3ca93438e6 | |||
be21d4100d | |||
a2e09b3656
|
|||
dd2f24f112
|
|||
893f264a5e
|
|||
cf46944e50 | |||
c8c1b560e8 | |||
094c1bcf35 | |||
23925d4b39 | |||
81211b1dd5 |
@ -1 +1,3 @@
|
|||||||
pycryptodome
|
pycryptodome
|
||||||
|
pydh
|
||||||
|
unipath
|
@ -1,3 +1,5 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
import json
|
import json
|
||||||
import logging
|
import logging
|
||||||
import os
|
import os
|
||||||
@ -7,17 +9,22 @@ from base64 import b64encode
|
|||||||
|
|
||||||
from Crypto.Hash import SHA256
|
from Crypto.Hash import SHA256
|
||||||
from Crypto.Protocol.KDF import bcrypt, bcrypt_check
|
from Crypto.Protocol.KDF import bcrypt, bcrypt_check
|
||||||
|
from Crypto.PublicKey import RSA
|
||||||
|
from Crypto.PublicKey.RSA import RsaKey
|
||||||
|
from Crypto.Random import get_random_bytes
|
||||||
|
|
||||||
auth_logger = logging.getLogger('AUTH APPLICATION ')
|
auth_logger = logging.getLogger('AUTH APPLICATION ')
|
||||||
auth_logger.root.setLevel(logging.INFO)
|
auth_logger.setLevel(logging.INFO)
|
||||||
|
|
||||||
|
|
||||||
class Authetication:
|
class Authetication:
|
||||||
ABSOLUTE_PATH = os.path.abspath(os.path.dirname(sys.argv[0]))
|
ABSOLUTE_PATH = os.path.abspath(os.path.dirname(sys.argv[0]))
|
||||||
HOME_DIRECTORY_LOCATION = ABSOLUTE_PATH + "\\home"
|
HOME_DIRECTORY_LOCATION = ABSOLUTE_PATH + os.path.sep + "home"
|
||||||
CONFIG_DIRECTORY_LOCATION = ABSOLUTE_PATH + "\\config"
|
CONFIG_DIRECTORY_LOCATION = ABSOLUTE_PATH + os.path.sep + "config"
|
||||||
|
CONFIG_FILE_LOCATION = ABSOLUTE_PATH + os.path.sep + "config" + os.path.sep + "config.txt"
|
||||||
|
PRIVATE_KEY_DIRECTORY_LOCATION = CONFIG_DIRECTORY_LOCATION + os.path.sep + "private_keys"
|
||||||
USER_INDEX = 0
|
USER_INDEX = 0
|
||||||
|
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
if not os.path.isdir(self.HOME_DIRECTORY_LOCATION):
|
if not os.path.isdir(self.HOME_DIRECTORY_LOCATION):
|
||||||
os.mkdir(self.HOME_DIRECTORY_LOCATION)
|
os.mkdir(self.HOME_DIRECTORY_LOCATION)
|
||||||
@ -25,30 +32,36 @@ class Authetication:
|
|||||||
if not os.path.isdir(self.CONFIG_DIRECTORY_LOCATION):
|
if not os.path.isdir(self.CONFIG_DIRECTORY_LOCATION):
|
||||||
os.mkdir(self.CONFIG_DIRECTORY_LOCATION)
|
os.mkdir(self.CONFIG_DIRECTORY_LOCATION)
|
||||||
|
|
||||||
if not os.path.isfile(self.CONFIG_DIRECTORY_LOCATION + "\\config.txt") or os.stat(
|
if not os.path.isdir(self.PRIVATE_KEY_DIRECTORY_LOCATION):
|
||||||
self.CONFIG_DIRECTORY_LOCATION + "\\config.txt").st_size == 0:
|
os.mkdir(self.PRIVATE_KEY_DIRECTORY_LOCATION)
|
||||||
|
|
||||||
|
if not os.path.isfile(self.CONFIG_FILE_LOCATION) or os.stat(
|
||||||
|
self.CONFIG_FILE_LOCATION).st_size == 0:
|
||||||
data = {'index': 0, 'user': []}
|
data = {'index': 0, 'user': []}
|
||||||
with open(self.CONFIG_DIRECTORY_LOCATION + "\\config.txt", 'w+') as outfile:
|
with open(self.CONFIG_FILE_LOCATION, 'w+') as outfile:
|
||||||
json.dump(data, outfile)
|
json.dump(data, outfile)
|
||||||
|
|
||||||
|
|
||||||
def login(self, username: str, password: str) -> str:
|
def login(self, username: str, password: str) -> str:
|
||||||
with open(self.CONFIG_DIRECTORY_LOCATION + '\\config.txt') as json_file:
|
with open(self.CONFIG_FILE_LOCATION) as json_file:
|
||||||
data = json.load(json_file)
|
data = json.load(json_file)
|
||||||
|
|
||||||
for user in data['user']:
|
for user in data['user']:
|
||||||
if username == user['username']:
|
if username == user['username']:
|
||||||
b64pwd = b64encode(SHA256.new(password.encode('utf-8')).digest())
|
|
||||||
try:
|
try:
|
||||||
b64pwd = b64encode(SHA256.new(password.encode('utf-8')).digest())
|
b64pwd = b64encode(SHA256.new(password.encode('utf-8')).digest())
|
||||||
bcrypt_check(b64pwd, user['password'].encode('utf-8'))
|
bcrypt_check(b64pwd, user['password'].encode('utf-8'))
|
||||||
|
auth_logger.debug("User logged in: " + username)
|
||||||
|
return self.HOME_DIRECTORY_LOCATION + os.path.sep + user['homeDir']
|
||||||
except ValueError:
|
except ValueError:
|
||||||
auth_logger.debug("User NOT logged in: " + username)
|
auth_logger.debug("User NOT logged in: " + username)
|
||||||
return ''
|
return ''
|
||||||
auth_logger.debug("User logged in: " + username)
|
else:
|
||||||
return user['homeDir']
|
auth_logger.error("User not found")
|
||||||
|
return ''
|
||||||
|
|
||||||
def checkUserExists(self, username: str) -> bool:
|
def checkUserExists(self, username: str) -> bool:
|
||||||
with open(self.CONFIG_DIRECTORY_LOCATION + '\\config.txt') as json_file:
|
with open(self.CONFIG_FILE_LOCATION) as json_file:
|
||||||
data = json.load(json_file)
|
data = json.load(json_file)
|
||||||
|
|
||||||
for user in data['user']:
|
for user in data['user']:
|
||||||
@ -56,41 +69,82 @@ class Authetication:
|
|||||||
return True
|
return True
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
def initConfig(self):
|
def initConfig(self):
|
||||||
data = {'index': 0, 'user': []}
|
data = {'index': 0, 'user': []}
|
||||||
with open(self.CONFIG_DIRECTORY_LOCATION + "\\config.txt", 'w+') as outfile:
|
with open(self.CONFIG_FILE_LOCATION, 'w+') as outfile:
|
||||||
json.dump(data, outfile)
|
json.dump(data, outfile)
|
||||||
|
|
||||||
shutil.rmtree(self.HOME_DIRECTORY_LOCATION)
|
shutil.rmtree(self.HOME_DIRECTORY_LOCATION)
|
||||||
os.mkdir(self.HOME_DIRECTORY_LOCATION)
|
os.mkdir(self.HOME_DIRECTORY_LOCATION)
|
||||||
|
os.mkdir(self.HOME_DIRECTORY_LOCATION + os.path.sep + '0')
|
||||||
|
shutil.rmtree(self.PRIVATE_KEY_DIRECTORY_LOCATION)
|
||||||
|
os.mkdir(self.PRIVATE_KEY_DIRECTORY_LOCATION)
|
||||||
|
|
||||||
|
|
||||||
def saveUser(self, username: str, password: str) -> bool:
|
def saveUser(self, username: str, password: str) -> bool:
|
||||||
|
user_salt = get_random_bytes(16)
|
||||||
bytePass = password.encode('utf-8')
|
bytePass = password.encode('utf-8')
|
||||||
b64pwd = b64encode(SHA256.new(bytePass).digest())
|
b64pwd = b64encode(SHA256.new(bytePass).digest())
|
||||||
bcrypt_hash = bcrypt(b64pwd, 12)
|
bcrypt_hash = bcrypt(password=b64pwd, cost=12, salt=user_salt)
|
||||||
|
|
||||||
with open(self.CONFIG_DIRECTORY_LOCATION + '\\config.txt') as json_file:
|
with open(self.CONFIG_FILE_LOCATION) as json_file:
|
||||||
data = json.load(json_file)
|
data = json.load(json_file)
|
||||||
|
|
||||||
user = {
|
|
||||||
'username': username,
|
|
||||||
'password': bcrypt_hash.decode('utf-8'),
|
|
||||||
'homeDir': str(data['index'] + 1)
|
|
||||||
}
|
|
||||||
|
|
||||||
data['index'] = data['index'] + 1
|
|
||||||
|
|
||||||
if self.checkUserExists(username):
|
if self.checkUserExists(username):
|
||||||
auth_logger.debug("User NOT saved! This username already exists!")
|
auth_logger.debug("User NOT saved! This username already exists!")
|
||||||
return False
|
return False
|
||||||
else:
|
else:
|
||||||
if not os.path.isdir(self.HOME_DIRECTORY_LOCATION + "\\" + str(user['homeDir'])):
|
if not os.path.isdir(self.HOME_DIRECTORY_LOCATION + os.path.sep + str(data['index'] + 1)):
|
||||||
os.mkdir(self.HOME_DIRECTORY_LOCATION + "\\" + str(user['homeDir']))
|
data['index'] = data['index'] + 1
|
||||||
|
user = {
|
||||||
|
'username': username,
|
||||||
|
'password': bcrypt_hash.decode('utf-8'),
|
||||||
|
'homeDir': str(data['index']),
|
||||||
|
'publicKey': ''
|
||||||
|
}
|
||||||
|
|
||||||
|
##Create user HOME directory with index as name
|
||||||
|
os.mkdir(self.HOME_DIRECTORY_LOCATION + os.path.sep + str(data['index']))
|
||||||
|
|
||||||
|
##Save user data
|
||||||
data['user'].append(user)
|
data['user'].append(user)
|
||||||
with open(self.CONFIG_DIRECTORY_LOCATION + '\\config.txt', 'w') as outfile:
|
with open(self.CONFIG_FILE_LOCATION, 'w') as outfile:
|
||||||
json.dump(data, outfile)
|
json.dump(data, outfile)
|
||||||
|
|
||||||
auth_logger.debug("User saved!")
|
auth_logger.debug("User saved!")
|
||||||
else:
|
else:
|
||||||
auth_logger.debug("User NOT saved! Home directory already exists")
|
auth_logger.debug("User NOT saved! Home directory already exists")
|
||||||
|
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def loadUserPublicKeys(self) -> dict:
|
||||||
|
with open(self.CONFIG_FILE_LOCATION) as json_file:
|
||||||
|
data = json.load(json_file)
|
||||||
|
|
||||||
|
dictionary = dict()
|
||||||
|
|
||||||
|
for user in data['user']:
|
||||||
|
key = user['publicKey']
|
||||||
|
key = bytes.fromhex(key)
|
||||||
|
try:
|
||||||
|
rsaKey = RSA.import_key(key)
|
||||||
|
dictionary[user['username']] = rsaKey
|
||||||
|
except ValueError:
|
||||||
|
print('Invalid server public key!')
|
||||||
|
|
||||||
|
return dictionary
|
||||||
|
|
||||||
|
|
||||||
|
def loadServerPrivateKey(self, passphrase: str) -> RsaKey:
|
||||||
|
with open(self.CONFIG_FILE_LOCATION) as json_file:
|
||||||
|
data = json.load(json_file)
|
||||||
|
|
||||||
|
key = data['serverPrivateKey']
|
||||||
|
key = bytes.fromhex(key)
|
||||||
|
try:
|
||||||
|
rsaKey = RSA.import_key(key, passphrase)
|
||||||
|
except ValueError:
|
||||||
|
print('Invalid server private key!')
|
||||||
|
return rsaKey
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
from authentication import Authetication
|
from authentication import Authetication
|
||||||
|
import config_init as init
|
||||||
import json
|
import json
|
||||||
import logging
|
import logging
|
||||||
|
import os
|
||||||
|
|
||||||
test_logger = logging.getLogger('TEST ')
|
test_logger = logging.getLogger('TEST ')
|
||||||
test_logger.root.setLevel(logging.INFO)
|
test_logger.root.setLevel(logging.INFO)
|
||||||
@ -33,7 +35,7 @@ def testAuth(username: str, password: str):
|
|||||||
auth.saveUser(username, password)
|
auth.saveUser(username, password)
|
||||||
homeDir = auth.login(username, password)
|
homeDir = auth.login(username, password)
|
||||||
|
|
||||||
if homeDir == '1':
|
if homeDir == auth.HOME_DIRECTORY_LOCATION + os.path.sep + '1':
|
||||||
test_logger.info('TEST 1 --> Authentication test with VALID :: PASSED')
|
test_logger.info('TEST 1 --> Authentication test with VALID :: PASSED')
|
||||||
else:
|
else:
|
||||||
test_logger.info('TEST 1 --> Authentication test with VALID :: FAILED')
|
test_logger.info('TEST 1 --> Authentication test with VALID :: FAILED')
|
||||||
@ -62,7 +64,58 @@ def testUserExists(username: str, password: str):
|
|||||||
logging.info('TEST 2 --> User exists with INVALID user :: PASSED')
|
logging.info('TEST 2 --> User exists with INVALID user :: PASSED')
|
||||||
|
|
||||||
|
|
||||||
|
def testPersistency():
|
||||||
|
logging.info('PERSISTENCY TEST')
|
||||||
|
auth = Authetication()
|
||||||
|
auth.initConfig()
|
||||||
|
serverPublicKey = init.generatePrivateKeyForServer(auth, 'admin')
|
||||||
|
auth.saveUser('alma','alma')
|
||||||
|
homeDir = auth.login('alma','alma')
|
||||||
|
init.generatePrivateKeyForUser(auth, 'alma', 'amla', serverPublicKey, init.generateSourceAddress(homeDir))
|
||||||
|
auth.saveUser('citrom','citrom')
|
||||||
|
homeDir = auth.login('citrom','citrom')
|
||||||
|
init.generatePrivateKeyForUser(auth, 'citrom', 'mortic', serverPublicKey, init.generateSourceAddress(homeDir))
|
||||||
|
|
||||||
|
auth2 = Authetication()
|
||||||
|
if auth2.checkUserExists('alma'):
|
||||||
|
logging.info('TEST 1 --> Persictency test :: PASSED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 1 --> Persictency test :: FAILED')
|
||||||
|
|
||||||
|
if auth2.checkUserExists(""):
|
||||||
|
logging.info('TEST 2 --> Persictency test :: FAILED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 2 --> Persictency test :: PASSED')
|
||||||
|
|
||||||
|
if os.path.isdir(auth.HOME_DIRECTORY_LOCATION):
|
||||||
|
logging.info('TEST 3 --> Persictency test :: PASSED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 3 --> Persictency test :: FAILED')
|
||||||
|
|
||||||
|
if os.path.isdir(auth.CONFIG_DIRECTORY_LOCATION):
|
||||||
|
logging.info('TEST 4 --> Persictency test :: PASSED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 4 --> Persictency test :: FAILED')
|
||||||
|
|
||||||
|
if os.path.isfile(auth.CONFIG_FILE_LOCATION):
|
||||||
|
logging.info('TEST 5 --> Persictency test :: PASSED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 5 --> Persictency test :: FAILED')
|
||||||
|
|
||||||
|
if os.stat(auth.CONFIG_FILE_LOCATION).st_size > 0:
|
||||||
|
logging.info('TEST 6 --> Persictency test :: PASSED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 6 --> Persictency test :: FAILED')
|
||||||
|
|
||||||
|
if os.path.isdir(auth.PRIVATE_KEY_DIRECTORY_LOCATION):
|
||||||
|
logging.info('TEST 7 --> Persictency test :: PASSED')
|
||||||
|
else:
|
||||||
|
logging.info('TEST 7 --> Persictency test :: FAILED')
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
testSaveUser("Diósbejglia", "Diósbejgli")
|
testSaveUser("Diósbejglia", "Diósbejgli")
|
||||||
testAuth("Diósbejglia", "Diósbejgli")
|
testAuth("Diósbejglia", "Diósbejgli")
|
||||||
testUserExists("Diósbejglia", "Diósbejgli")
|
testUserExists("Diósbejglia", "Diósbejgli")
|
||||||
|
#testPersistency()
|
||||||
|
@ -1,2 +0,0 @@
|
|||||||
#!/usr/bin/env python3
|
|
||||||
|
|
File diff suppressed because one or more lines are too long
1
server/config/private_keys/1.txt
Normal file
1
server/config/private_keys/1.txt
Normal file
File diff suppressed because one or more lines are too long
1
server/config/private_keys/2.txt
Normal file
1
server/config/private_keys/2.txt
Normal file
File diff suppressed because one or more lines are too long
72
server/config_init.py
Normal file
72
server/config_init.py
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
|
||||||
|
from Crypto.PublicKey import RSA
|
||||||
|
|
||||||
|
from authentication import Authetication
|
||||||
|
|
||||||
|
def generatePrivateKeyForUser(auth: Authetication,username: str, user_passphrase: str, public_server_key: str,address: str) -> bool:
|
||||||
|
if auth.checkUserExists(username):
|
||||||
|
with open(auth.CONFIG_FILE_LOCATION) as json_file:
|
||||||
|
data = json.load(json_file)
|
||||||
|
|
||||||
|
private_key = RSA.generate(8192)
|
||||||
|
public_key = private_key.publickey()
|
||||||
|
private_key_value = bytes.hex(private_key.exportKey('DER', passphrase=user_passphrase, pkcs=8))
|
||||||
|
public_key_value = bytes.hex(public_key.exportKey('DER', pkcs=8))
|
||||||
|
|
||||||
|
##Save private key in separate file
|
||||||
|
user_privatekey = {'address': address,
|
||||||
|
'privateClientKey': private_key_value,
|
||||||
|
'publicServerKey': public_server_key}
|
||||||
|
with open(auth.PRIVATE_KEY_DIRECTORY_LOCATION + os.path.sep + str(data['index']) + '.txt',
|
||||||
|
'w+') as outfile:
|
||||||
|
json.dump(user_privatekey, outfile)
|
||||||
|
outfile.close()
|
||||||
|
|
||||||
|
##Save public key in users
|
||||||
|
for user in data['user']:
|
||||||
|
if username == user['username']:
|
||||||
|
user['publicKey'] = public_key_value
|
||||||
|
with open(auth.CONFIG_FILE_LOCATION, 'w+') as outfile:
|
||||||
|
json.dump(data, outfile)
|
||||||
|
break
|
||||||
|
outfile.close()
|
||||||
|
return True
|
||||||
|
else:
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def generatePrivateKeyForServer(auth: Authetication,passphrase: str) -> str:
|
||||||
|
with open(auth.CONFIG_FILE_LOCATION) as json_file:
|
||||||
|
data = json.load(json_file)
|
||||||
|
json_file.close()
|
||||||
|
|
||||||
|
private_key = RSA.generate(8192)
|
||||||
|
public_key = private_key.publickey()
|
||||||
|
private_key_value = bytes.hex(private_key.exportKey('DER', passphrase=passphrase, pkcs=8, protection="scryptAndAES128-CBC"))
|
||||||
|
public_key_value = bytes.hex(public_key.exportKey('DER', pkcs=8))
|
||||||
|
|
||||||
|
data['serverPrivateKey'] = private_key_value
|
||||||
|
with open(auth.CONFIG_FILE_LOCATION, 'w+') as outfile:
|
||||||
|
json.dump(data, outfile)
|
||||||
|
|
||||||
|
return public_key_value
|
||||||
|
|
||||||
|
|
||||||
|
def generateSourceAddress(index: str) -> chr:
|
||||||
|
return chr(ord(index[0]) + 17)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
auth = Authetication()
|
||||||
|
auth.initConfig()
|
||||||
|
serverPublicKey = generatePrivateKeyForServer(auth, 'admin')
|
||||||
|
auth.saveUser('alma', 'alma')
|
||||||
|
homeDir = auth.login('alma', 'alma')
|
||||||
|
generatePrivateKeyForUser(auth, 'alma', 'amla', serverPublicKey, generateSourceAddress(homeDir))
|
||||||
|
auth.saveUser('citrom', 'citrom')
|
||||||
|
homeDir = auth.login('citrom', 'citrom')
|
||||||
|
generatePrivateKeyForUser(auth, 'citrom', 'mortic', serverPublicKey, generateSourceAddress(homeDir))
|
@ -3,16 +3,14 @@
|
|||||||
import os
|
import os
|
||||||
import re
|
import re
|
||||||
|
|
||||||
|
from unipath import Path
|
||||||
|
|
||||||
class Executor:
|
class Executor:
|
||||||
"""This class executes commands recieved by the server"""
|
"""This class executes commands recieved by the server"""
|
||||||
|
|
||||||
def __init__(self, currentDiectory: str, baseDir: str = ""):
|
def __init__(self, baseDir: str):
|
||||||
self.currentDirectory = currentDiectory
|
self.currentDirectory = ""
|
||||||
if baseDir == "":
|
self.baseDir = baseDir + os.path.sep
|
||||||
self.baseDir = self.currentDirectory
|
|
||||||
else:
|
|
||||||
self.baseDir = baseDir
|
|
||||||
|
|
||||||
def sanitizeDirectory(self, inDirectory: str) -> str:
|
def sanitizeDirectory(self, inDirectory: str) -> str:
|
||||||
return re.sub('[^a-zA-Z0-9]', '', inDirectory)
|
return re.sub('[^a-zA-Z0-9]', '', inDirectory)
|
||||||
@ -22,14 +20,15 @@ class Executor:
|
|||||||
|
|
||||||
def createDirectory(self, dirName: str) -> str:
|
def createDirectory(self, dirName: str) -> str:
|
||||||
dirName = self.sanitizeDirectory(dirName)
|
dirName = self.sanitizeDirectory(dirName)
|
||||||
actualDirName = os.path.join(self.currentDirectory, dirName)
|
actualDirName: str = os.path.join(self.baseDir,self.currentDirectory,dirName)
|
||||||
os.mkdir(actualDirName)
|
os.mkdir(actualDirName)
|
||||||
return actualDirName
|
return actualDirName
|
||||||
|
|
||||||
def removeDirectory(self, dirName: str) -> str:
|
def removeDirectory(self, dirName: str) -> str:
|
||||||
dirName = self.sanitizeDirectory(dirName)
|
dirName = self.sanitizeDirectory(dirName)
|
||||||
actualDirName = os.path.join(self.currentDirectory, dirName)
|
actualDirName: str = os.path.join(self.baseDir, self.currentDirectory, dirName)
|
||||||
os.rmdir(actualDirName)
|
if actualDirName:
|
||||||
|
os.rmdir(actualDirName)
|
||||||
return actualDirName
|
return actualDirName
|
||||||
|
|
||||||
def getCurrentDirectory(self) -> str:
|
def getCurrentDirectory(self) -> str:
|
||||||
@ -37,44 +36,58 @@ class Executor:
|
|||||||
|
|
||||||
def setCurrentDirectory(self, dirName: str) -> str:
|
def setCurrentDirectory(self, dirName: str) -> str:
|
||||||
if dirName == "..":
|
if dirName == "..":
|
||||||
if self.currentDirectory == self.baseDir:
|
p = Path(os.path.join(self.baseDir, self.currentDirectory))
|
||||||
|
parentpath = p.parent
|
||||||
|
if (str(parentpath) + os.path.sep)== self.baseDir:
|
||||||
|
self.currentDirectory = ""
|
||||||
return self.currentDirectory
|
return self.currentDirectory
|
||||||
else:
|
else:
|
||||||
directories = self.currentDirectory.split("/")
|
if len(str(parentpath).split('/')) < len(self.baseDir.split('/')):
|
||||||
strdirectory = ""
|
return self.currentDirectory
|
||||||
for dir in directories:
|
newpath = str(parentpath).replace(self.baseDir,'')
|
||||||
strdirectory += dir + "/"
|
if os.path.exists(os.path.join(self.baseDir,newpath)):
|
||||||
strdirectory = strdirectory[:-3]
|
self.currentDirectory = newpath
|
||||||
self.currentDirectory = strdirectory
|
|
||||||
return self.currentDirectory
|
return self.currentDirectory
|
||||||
else:
|
else:
|
||||||
dirName = self.sanitizeDirectory(dirName)
|
dirName = self.sanitizeDirectory(dirName)
|
||||||
self.currentDirectory = os.path.join(self.currentDirectory, dirName)
|
joinedDir = os.path.join(self.currentDirectory, dirName)
|
||||||
|
if os.path.join(self.baseDir, joinedDir):
|
||||||
|
self.currentDirectory = joinedDir
|
||||||
return self.currentDirectory
|
return self.currentDirectory
|
||||||
|
|
||||||
def listCurrentDirectoryContent(self) -> str:
|
def listCurrentDirectoryContent(self) -> str:
|
||||||
contents = os.listdir(self.currentDirectory)
|
contents = os.listdir(os.path.join(self.baseDir, self.currentDirectory))
|
||||||
strdirectory = ""
|
strdirectory = ""
|
||||||
for content in contents:
|
for content in contents:
|
||||||
strdirectory += content + ", "
|
strdirectory += content + ", "
|
||||||
strdirectory = strdirectory[:-1]
|
strdirectory = strdirectory[:-1]
|
||||||
return strdirectory
|
return strdirectory
|
||||||
|
|
||||||
def putFileInCurrentDirectory(self, filename: str, content) -> str:
|
def putFileInCurrentDirectory(self, filename: str, content: bytes) -> str:
|
||||||
filename = self.sanitizeFile(filename)
|
filename = self.sanitizeFile(filename)
|
||||||
currenctfile = os.path.join(self.currentDirectory, filename)
|
currenctfile = os.path.join(self.baseDir, self.currentDirectory, filename)
|
||||||
f = open(currenctfile, "wb")
|
f = open(currenctfile, "wb")
|
||||||
f.write(content)
|
f.write(content)
|
||||||
f.close()
|
f.close()
|
||||||
return currenctfile
|
return currenctfile
|
||||||
|
|
||||||
def getFileInCurrentDirectory(self, file: str):
|
def getFileInCurrentDirectory(self, file: str) -> bytes:
|
||||||
file = self.sanitizeFile(file)
|
file = self.sanitizeFile(file)
|
||||||
currentfile = os.path.join(self.currentDirectory, file)
|
currentfile = os.path.join(self.baseDir, self.currentDirectory, file)
|
||||||
return open(currentfile, "r")
|
if os.path.exists(currentfile):
|
||||||
|
f = open(currentfile, "rb")
|
||||||
|
content = f.read()
|
||||||
|
f.close()
|
||||||
|
return content
|
||||||
|
else:
|
||||||
|
raise Exception('File not found')
|
||||||
|
|
||||||
def removeFileInCurrentDirectory(self, file: str) -> str:
|
def removeFileInCurrentDirectory(self, file: str) -> str:
|
||||||
file = self.sanitizeFile(file)
|
file = self.sanitizeFile(file)
|
||||||
currentfile = os.path.join(self.currentDirectory, file)
|
if self.currentDirectory == "":
|
||||||
os.remove(currentfile)
|
currentfile = os.path.join(self.baseDir, file)
|
||||||
|
else:
|
||||||
|
currentfile = os.path.join(self.baseDir, self.currentDirectory, file)
|
||||||
|
if os.path.exists(currentfile):
|
||||||
|
os.remove(currentfile)
|
||||||
return currentfile
|
return currentfile
|
||||||
|
@ -1,4 +1,7 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
|
from server import Server
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
print("hi")
|
server = Server()
|
||||||
|
server.initServer()
|
||||||
|
server.startServer()
|
||||||
|
@ -1 +1,186 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
|
import json
|
||||||
|
from base64 import b64encode, b64decode
|
||||||
|
import pyDH
|
||||||
|
from Crypto.Hash import SHA512
|
||||||
|
from Crypto.Cipher import PKCS1_OAEP
|
||||||
|
from Crypto.Cipher import ChaCha20_Poly1305
|
||||||
|
from Crypto.PublicKey.RSA import RsaKey
|
||||||
|
from Crypto.Signature import pkcs1_15
|
||||||
|
|
||||||
|
from netsim import network_interface
|
||||||
|
from authentication import Authetication
|
||||||
|
|
||||||
|
|
||||||
|
class NetWrapper:
|
||||||
|
|
||||||
|
def __init__(self, clientPublicKey: dict, serverPrivateKey: RsaKey, authenticationInstance: Authetication):
|
||||||
|
self.clientPublicKey = clientPublicKey
|
||||||
|
self.currentClientPublicKey = "".encode('UTF-8')
|
||||||
|
self.serverPrivateKey = serverPrivateKey
|
||||||
|
self.cipherkey = "".encode('UTF-8')
|
||||||
|
self.network = network_interface('./../../netsim/network/', 'A')
|
||||||
|
self.clientAddr = ""
|
||||||
|
self.currentUser = ""
|
||||||
|
self.homeDirectory = ""
|
||||||
|
self.authenticationInstance = authenticationInstance
|
||||||
|
|
||||||
|
def encryptRSAMessage(self, message: bytes) -> bytes:
|
||||||
|
cipher_rsa = PKCS1_OAEP.new(self.currentClientPublicKey)
|
||||||
|
encrypted_msg = cipher_rsa.encrypt(message)
|
||||||
|
return encrypted_msg
|
||||||
|
|
||||||
|
def signRSAHeader(self, type: str, extradata: dict) -> (bytes, bytes):
|
||||||
|
mandatory = {'type': type, 'source': self.network.own_addr}
|
||||||
|
header = json.dumps({**mandatory, **extradata}).encode('UTF-8')
|
||||||
|
h = SHA512.new(header)
|
||||||
|
headersignature = pkcs1_15.new(self.serverPrivateKey).sign(h)
|
||||||
|
return header, headersignature
|
||||||
|
|
||||||
|
def verifyRSAHeaderSignature(self, header: bytes, headersignature: bytes) -> bool:
|
||||||
|
h = SHA512.new(header)
|
||||||
|
try:
|
||||||
|
pkcs1_15.new(self.currentClientPublicKey).verify(h, headersignature)
|
||||||
|
return True
|
||||||
|
except Exception:
|
||||||
|
return False
|
||||||
|
|
||||||
|
def decryptRSAMessage(self, message: bytes) -> bytes:
|
||||||
|
cipher_rsa = PKCS1_OAEP.new(self.serverPrivateKey)
|
||||||
|
return cipher_rsa.decrypt(message)
|
||||||
|
|
||||||
|
def serverIdentify(self, msg: bytes) -> None:
|
||||||
|
incommingJson = json.loads(msg.decode('UTF-8'))
|
||||||
|
header = json.loads(b64decode(incommingJson['header']).decode('UTF-8'))
|
||||||
|
self.clientAddr = header['source']
|
||||||
|
self.currentUser = header['username']
|
||||||
|
self.currentClientPublicKey = self.clientPublicKey[self.currentUser]
|
||||||
|
if not self.verifyRSAHeaderSignature(b64decode(incommingJson['header']),
|
||||||
|
b64decode(incommingJson['headersignature'])) or header[
|
||||||
|
'type'] != 'IDY':
|
||||||
|
raise Exception('Bad initial message')
|
||||||
|
retheader, retheadersignature = self.signRSAHeader("IDY", {})
|
||||||
|
dcryptedmsg = self.decryptRSAMessage(b64decode(incommingJson['message']))
|
||||||
|
retmsg = self.encryptRSAMessage(dcryptedmsg)
|
||||||
|
identMsg = json.dumps(
|
||||||
|
{'header': b64encode(retheader).decode('UTF-8'),
|
||||||
|
'headersignature': b64encode(retheadersignature).decode('UTF-8'),
|
||||||
|
'message': b64encode(retmsg).decode('UTF-8')}).encode(
|
||||||
|
'UTF-8')
|
||||||
|
self.network.send_msg(self.clientAddr, identMsg)
|
||||||
|
|
||||||
|
def sendMessage(self, message: bytes) -> None:
|
||||||
|
self.sendTypedMessage(message, "CMD")
|
||||||
|
|
||||||
|
def sendTypedMessage(self, message: bytes, type: str) -> None:
|
||||||
|
if not (type == "AUT" or type == "CMD"):
|
||||||
|
raise Exception('Unknown message type')
|
||||||
|
cipher = ChaCha20_Poly1305.new(key=self.cipherkey)
|
||||||
|
header = json.dumps({'source': self.network.own_addr, 'type': type}).encode('UTF-8')
|
||||||
|
cipher.update(header)
|
||||||
|
ciphertext, tag = cipher.encrypt_and_digest(message)
|
||||||
|
nonce = b64encode(cipher.nonce).decode('UTF-8')
|
||||||
|
ct = b64encode(ciphertext).decode('UTF-8')
|
||||||
|
b64tag = b64encode(tag).decode('UTF-8')
|
||||||
|
sendjson = json.dumps(
|
||||||
|
{'header': b64encode(header).decode('UTF-8'), 'nonce': nonce, 'message': ct, 'tag': b64tag}).encode(
|
||||||
|
'UTF-8')
|
||||||
|
self.network.send_msg(self.clientAddr, sendjson)
|
||||||
|
|
||||||
|
def keyExchange(self) -> None:
|
||||||
|
dh = pyDH.DiffieHellman()
|
||||||
|
mypubkey = self.encryptRSAMessage(str(dh.gen_public_key()).encode('UTF-8'))
|
||||||
|
header, headersignature = self.signRSAHeader("DH", {})
|
||||||
|
jsonmsg = json.dumps(
|
||||||
|
{'header': b64encode(header).decode('UTF-8'), 'headersignature': b64encode(headersignature).decode('UTF-8'),
|
||||||
|
'message': b64encode(mypubkey).decode('UTF-8')}).encode('UTF-8')
|
||||||
|
self.network.send_msg(self.clientAddr, jsonmsg)
|
||||||
|
status, msg = self.network.receive_msg(blocking=True)
|
||||||
|
if not status:
|
||||||
|
raise Exception('Network error during connection.')
|
||||||
|
decodedmsg = json.loads(msg.decode('UTF-8'))
|
||||||
|
header = json.loads(b64decode(decodedmsg['header']).decode('UTF-8'))
|
||||||
|
if not self.verifyRSAHeaderSignature(b64decode(decodedmsg['header']),
|
||||||
|
b64decode(decodedmsg['headersignature'])) or not (
|
||||||
|
header['source'] == self.clientAddr and header['type'] == 'DH'):
|
||||||
|
raise Exception('Header signature error')
|
||||||
|
clientpubkey = int(self.decryptRSAMessage(b64decode(decodedmsg['message'])).decode('UTF-8'))
|
||||||
|
cipherkey = dh.gen_shared_key(clientpubkey).encode('UTF-8')
|
||||||
|
hasher = SHA512.new()
|
||||||
|
hasher.update(cipherkey)
|
||||||
|
self.cipherkey = (hasher.hexdigest()[:32]).encode('UTF-8')
|
||||||
|
|
||||||
|
def login(self) -> bool:
|
||||||
|
status, msg = self.network.receive_msg(blocking=True)
|
||||||
|
if not status:
|
||||||
|
raise Exception('Network error during connection.')
|
||||||
|
cleartext = self.recieveEncryptedMessage(msg, "AUT").decode('UTF-8')
|
||||||
|
if cleartext == "ERROR":
|
||||||
|
return False
|
||||||
|
else:
|
||||||
|
plaintext = cleartext.split(' ')
|
||||||
|
self.homeDirectory = self.authenticationInstance.login(plaintext[1], plaintext[2])
|
||||||
|
linsuccess = (not (len(plaintext) != 3 or plaintext[0] != "LIN" or plaintext[
|
||||||
|
1] != self.currentUser)) and self.homeDirectory
|
||||||
|
if linsuccess:
|
||||||
|
message = "OK".encode('UTF-8')
|
||||||
|
else:
|
||||||
|
message = "ERROR".encode('UTF-8')
|
||||||
|
self.sendTypedMessage(message, "AUT")
|
||||||
|
return linsuccess
|
||||||
|
|
||||||
|
def initClientConnection(self, msg: bytes) -> bytes:
|
||||||
|
print('A client is trying to connect')
|
||||||
|
try:
|
||||||
|
print('Server and Client identity verification started')
|
||||||
|
self.serverIdentify(msg)
|
||||||
|
print('Key exchange started')
|
||||||
|
self.keyExchange()
|
||||||
|
print('Authorization started')
|
||||||
|
success = self.login()
|
||||||
|
print(f'Authorization completed, success: {success}')
|
||||||
|
if success:
|
||||||
|
return "LINOK".encode('UTF-8')
|
||||||
|
else:
|
||||||
|
self.logout()
|
||||||
|
return "LINERROR".encode('UTF-8')
|
||||||
|
except Exception:
|
||||||
|
print("Error ecountered, resetting")
|
||||||
|
self.logout()
|
||||||
|
return "LINERROR".encode('UTF-8')
|
||||||
|
|
||||||
|
def recieveMessage(self) -> bytes:
|
||||||
|
status, msg = self.network.receive_msg(blocking=True)
|
||||||
|
if not status:
|
||||||
|
raise Exception('Network error during connection.')
|
||||||
|
if not self.clientAddr:
|
||||||
|
return self.initClientConnection(msg)
|
||||||
|
else:
|
||||||
|
return self.recieveEncryptedMessage(msg, "CMD")
|
||||||
|
|
||||||
|
def logout(self) -> None:
|
||||||
|
self.clientAddr = ""
|
||||||
|
self.cipherkey = "".encode('UTF-8')
|
||||||
|
self.currentClientPublicKey = "".encode('UTF-8')
|
||||||
|
self.currentUser = ""
|
||||||
|
self.homeDirectory = ""
|
||||||
|
|
||||||
|
def recieveEncryptedMessage(self, msg: bytes, type: str) -> bytes:
|
||||||
|
if not (type == "AUT" or type == "CMD"):
|
||||||
|
raise Exception('Unknown message type')
|
||||||
|
try:
|
||||||
|
b64 = json.loads(msg.decode('UTF-8'))
|
||||||
|
retheader = json.loads(b64decode(b64['header']).decode('UTF-8'))
|
||||||
|
retnonce = b64decode(b64['nonce'])
|
||||||
|
retciphertext = b64decode(b64['message'])
|
||||||
|
rettag = b64decode(b64['tag'])
|
||||||
|
retcipher = ChaCha20_Poly1305.new(key=self.cipherkey, nonce=retnonce)
|
||||||
|
retcipher.update(b64decode(b64['header']))
|
||||||
|
plaintext = retcipher.decrypt_and_verify(retciphertext, rettag)
|
||||||
|
if not (retheader['source'] == self.clientAddr and retheader['type'] == type):
|
||||||
|
return "ERROR".encode('UTF-8')
|
||||||
|
else:
|
||||||
|
return plaintext
|
||||||
|
except Exception:
|
||||||
|
print("Incorrect decryption")
|
||||||
|
return "ERROR".encode('UTF-8')
|
||||||
|
125
server/server.py
125
server/server.py
@ -1,2 +1,127 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
|
import os
|
||||||
|
from authentication import Authetication
|
||||||
|
from executor import Executor
|
||||||
|
from netwrapper import NetWrapper
|
||||||
|
|
||||||
|
|
||||||
|
class Server:
|
||||||
|
|
||||||
|
def __init__(self, sessionTimeout: int = 120, availableServer: bool = True):
|
||||||
|
self.isAuthenticated = False
|
||||||
|
self.sessionTimeout = sessionTimeout
|
||||||
|
self.availableServer = availableServer
|
||||||
|
self.executor = Executor("")
|
||||||
|
self.auth = Authetication()
|
||||||
|
|
||||||
|
def initServer(self):
|
||||||
|
print("Please enter your private key passphrase")
|
||||||
|
passphrase = input()
|
||||||
|
self.networkInstance = NetWrapper(self.auth.loadUserPublicKeys(), self.auth.loadServerPrivateKey(passphrase),
|
||||||
|
self.auth)
|
||||||
|
|
||||||
|
def login(self, homeDir: str) -> None:
|
||||||
|
self.isAuthenticated = True
|
||||||
|
self.executor = Executor(homeDir + os.path.sep)
|
||||||
|
|
||||||
|
def logout(self) -> None:
|
||||||
|
self.networkInstance.logout()
|
||||||
|
self.isAuthenticated = False
|
||||||
|
self.availableServer = False
|
||||||
|
self.executor = Executor("")
|
||||||
|
|
||||||
|
def parseCommand(self, command: str) -> None:
|
||||||
|
if command == "LINOK":
|
||||||
|
self.login(self.networkInstance.homeDirectory)
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
return None
|
||||||
|
elif command == "LINERROR":
|
||||||
|
return None
|
||||||
|
elif command == "ERROR":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
return None
|
||||||
|
parsedCommand = command.split(" ")
|
||||||
|
if len(parsedCommand) > 3:
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
elif len(parsedCommand) == 1:
|
||||||
|
self.execute(parsedCommand[0])
|
||||||
|
elif len(parsedCommand) == 2:
|
||||||
|
self.execute(parsedCommand[0], parsedCommand[1])
|
||||||
|
elif len(parsedCommand) == 3:
|
||||||
|
self.execute(parsedCommand[0], parsedCommand[1], parsedCommand[2])
|
||||||
|
|
||||||
|
def execute(self, command: str, firstParam: str = "", secondParam: str = "") -> None:
|
||||||
|
if self.executor.baseDir == "":
|
||||||
|
raise Exception("Home directory must not be empty string. Did the user log in?")
|
||||||
|
if command == "LOUT":
|
||||||
|
if not (secondParam == "" and firstParam == ""):
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
self.logout()
|
||||||
|
elif command == "MKD":
|
||||||
|
if secondParam != "":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.executor.createDirectory(firstParam)
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
elif command == "RMD":
|
||||||
|
if secondParam != "":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.executor.removeDirectory(firstParam)
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
elif command == "GWD":
|
||||||
|
if not (secondParam == "" and firstParam == ""):
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.networkInstance.sendMessage(self.executor.getCurrentDirectory().encode('UTF-8'))
|
||||||
|
elif command == "CWD":
|
||||||
|
if secondParam != "":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.executor.setCurrentDirectory(firstParam)
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
elif command == "LST":
|
||||||
|
if not (secondParam == "" and firstParam == ""):
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.networkInstance.sendMessage(self.executor.listCurrentDirectoryContent().encode('UTF-8'))
|
||||||
|
elif command == "RMF":
|
||||||
|
if secondParam != "":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.executor.removeFileInCurrentDirectory(firstParam)
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
elif command == "UPL":
|
||||||
|
if secondParam != "":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
fileMessage = self.networkInstance.recieveMessage()
|
||||||
|
eof = self.networkInstance.recieveMessage().decode('UTF-8')
|
||||||
|
if eof == "EOF":
|
||||||
|
self.executor.putFileInCurrentDirectory(firstParam, fileMessage)
|
||||||
|
self.networkInstance.sendMessage("OK".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
elif command == "DNL":
|
||||||
|
if secondParam != "":
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
try:
|
||||||
|
file = self.executor.getFileInCurrentDirectory(firstParam)
|
||||||
|
self.networkInstance.sendMessage(file)
|
||||||
|
self.networkInstance.sendMessage("EOF".encode('UTF-8'))
|
||||||
|
except Exception:
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
else:
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
|
||||||
|
def startServer(self):
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
message = self.networkInstance.recieveMessage().decode('UTF-8')
|
||||||
|
self.parseCommand(message)
|
||||||
|
except Exception as e:
|
||||||
|
self.networkInstance.sendMessage("ERROR".encode('UTF-8'))
|
||||||
|
print(e)
|
||||||
|
Reference in New Issue
Block a user