mirror of
https://github.com/freedombox/FreedomBox.git
synced 2026-01-28 08:03:36 +00:00
- ugettext functions will be removed in Django 4.0. Each use emits a warning when running with Django 3.2. Since we have warnings enabled in developer mode, we see quite a few messages because of this. - ugettext is already a simple alias of gettext. So, no regressions are expected. Tests: - Accessing an affected app in UI with Django 3.2 and Django 2.2 works fine. - Using Django 3.2 there are no warnings related to removal of ugettext functions. - Ran regular unit tests. Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org> Reviewed-by: James Valleroy <jvalleroy@mailbox.org>
162 lines
5.2 KiB
Python
162 lines
5.2 KiB
Python
# SPDX-License-Identifier: AGPL-3.0-or-later
|
|
"""
|
|
FreedomBox app for configuring Tor.
|
|
"""
|
|
from django.contrib import messages
|
|
from django.template.response import TemplateResponse
|
|
from django.utils.translation import gettext as _
|
|
|
|
from plinth import actions
|
|
from plinth.errors import ActionError
|
|
from plinth.modules import tor
|
|
from plinth.modules.firewall.components import Firewall
|
|
|
|
from . import utils as tor_utils
|
|
from .forms import TorForm
|
|
|
|
config_process = None
|
|
|
|
|
|
def index(request):
|
|
"""Serve configuration page."""
|
|
if config_process:
|
|
_collect_config_result(request)
|
|
|
|
status = tor_utils.get_status()
|
|
form = None
|
|
|
|
if request.method == 'POST':
|
|
form = TorForm(request.POST, prefix='tor')
|
|
# pylint: disable=E1101
|
|
if form.is_valid():
|
|
_apply_changes(request, status, form.cleaned_data)
|
|
status = tor_utils.get_status()
|
|
form = TorForm(initial=status, prefix='tor')
|
|
else:
|
|
form = TorForm(initial=status, prefix='tor')
|
|
|
|
return TemplateResponse(
|
|
request, 'tor.html', {
|
|
'app_id': 'tor',
|
|
'app_info': tor.app.info,
|
|
'status': status,
|
|
'config_running': bool(config_process),
|
|
'form': form,
|
|
'firewall': tor.app.get_components_of_type(Firewall),
|
|
'has_diagnostics': True,
|
|
'is_enabled': status['enabled'],
|
|
'is_running': status['is_running'],
|
|
'refresh_page_sec': 3 if bool(config_process) else None,
|
|
})
|
|
|
|
|
|
def _apply_changes(request, old_status, new_status):
|
|
"""Try to apply changes and handle errors."""
|
|
try:
|
|
__apply_changes(request, old_status, new_status)
|
|
except ActionError as exception:
|
|
messages.error(
|
|
request,
|
|
_('Action error: {0} [{1}] [{2}]').format(exception.args[0],
|
|
exception.args[1],
|
|
exception.args[2]))
|
|
|
|
|
|
def __apply_changes(request, old_status, new_status):
|
|
"""Apply the changes."""
|
|
global config_process
|
|
if config_process:
|
|
# Already running a configuration task
|
|
return
|
|
|
|
needs_restart = False
|
|
arguments = []
|
|
|
|
if old_status['relay_enabled'] != new_status['relay_enabled']:
|
|
arg_value = 'enable' if new_status['relay_enabled'] else 'disable'
|
|
arguments.extend(['--relay', arg_value])
|
|
needs_restart = True
|
|
|
|
if old_status['bridge_relay_enabled'] != \
|
|
new_status['bridge_relay_enabled']:
|
|
arg_value = 'enable'
|
|
if not new_status['bridge_relay_enabled']:
|
|
arg_value = 'disable'
|
|
arguments.extend(['--bridge-relay', arg_value])
|
|
needs_restart = True
|
|
|
|
if old_status['hs_enabled'] != new_status['hs_enabled']:
|
|
arg_value = 'enable' if new_status['hs_enabled'] else 'disable'
|
|
arguments.extend(['--hidden-service', arg_value])
|
|
needs_restart = True
|
|
|
|
if old_status['apt_transport_tor_enabled'] != \
|
|
new_status['apt_transport_tor_enabled']:
|
|
arg_value = 'disable'
|
|
if new_status['enabled'] and new_status['apt_transport_tor_enabled']:
|
|
arg_value = 'enable'
|
|
arguments.extend(['--apt-transport-tor', arg_value])
|
|
|
|
if old_status['use_upstream_bridges'] != \
|
|
new_status['use_upstream_bridges']:
|
|
arg_value = 'disable'
|
|
if new_status['enabled'] and new_status['use_upstream_bridges']:
|
|
arg_value = 'enable'
|
|
arguments.extend(['--use-upstream-bridges', arg_value])
|
|
needs_restart = True
|
|
|
|
if old_status['upstream_bridges'] != new_status['upstream_bridges']:
|
|
arguments.extend(
|
|
['--upstream-bridges', new_status['upstream_bridges']])
|
|
needs_restart = True
|
|
|
|
if old_status['enabled'] != new_status['enabled']:
|
|
arg_value = 'enable' if new_status['enabled'] else 'disable'
|
|
arguments.extend(['--service', arg_value])
|
|
# XXX: Perform app enable/disable within the background process
|
|
if new_status['enabled']:
|
|
tor.app.enable()
|
|
else:
|
|
tor.app.disable()
|
|
|
|
config_process = actions.superuser_run('tor',
|
|
['configure'] + arguments,
|
|
run_in_background=True)
|
|
return
|
|
|
|
if arguments:
|
|
actions.superuser_run('tor', ['configure'] + arguments)
|
|
if not needs_restart:
|
|
messages.success(request, _('Configuration updated.'))
|
|
|
|
if needs_restart and new_status['enabled']:
|
|
config_process = actions.superuser_run('tor', ['restart'],
|
|
run_in_background=True)
|
|
|
|
if not arguments:
|
|
messages.info(request, _('Setting unchanged'))
|
|
|
|
|
|
def _collect_config_result(request):
|
|
"""Handle config process completion."""
|
|
global config_process
|
|
if not config_process:
|
|
return
|
|
|
|
return_code = config_process.poll()
|
|
|
|
# Config process is not complete yet
|
|
if return_code is None:
|
|
return
|
|
|
|
status = tor_utils.get_status()
|
|
|
|
tor.update_hidden_service_domain(status)
|
|
|
|
if not return_code:
|
|
messages.success(request, _('Configuration updated.'))
|
|
else:
|
|
messages.error(request, _('An error occurred during configuration.'))
|
|
|
|
config_process = None
|