tox_profile/README.md

142 lines
5.2 KiB
Markdown
Raw Normal View History

2022-09-21 11:21:48 +00:00
# tox_profile
2022-09-24 02:43:49 +00:00
Read and manipulate tox profile files. It started as a simple script from
<https://stackoverflow.com/questions/30901873/what-format-are-tox-files-stored-in>
2022-09-30 20:09:14 +00:00
For the moment logging_tox_savefile.py just reads a Tox profile and
prints to stdout various things that it finds. Then it writes what it
found in YAML to stderr. Later it can be extended to print out JSON
or YAML, and then extended to accept JSON or YAML to write a profile.
2022-09-24 02:43:49 +00:00
2022-10-01 23:38:28 +00:00
## Usage
Reads a tox profile and prints out information on what's in there to stderr.
2022-10-02 22:29:36 +00:00
Call it with one argument, the filename of the profile for the decrypt, edit
or info commands, or the filename of the nodes file for the nodes command.
2022-10-01 23:38:28 +00:00
3 commands are supported:
1. ```--command decrypt``` decrypts the profile and writes to the result
to stdout
2. ```--command info``` prints info about what's in the Tox profile to stderr
3. ```--command nodes``` assumes you are reading a json nodes file instead of
a profile
```
usage: logging_tox_savefile.py [-h] [--output OUTPUT]
[--command {info,decrypt,nodes}]
[--indent INDENT]
2022-10-02 03:36:34 +00:00
[--info {info,repr,yaml,json,pprint,nmap_udp,nmap_tcp}]
2022-10-01 23:38:28 +00:00
[--nodes {select_tcp,select_udp,select_version,nmap_tcp,nmap_udp}]
[--download_nodes_url DOWNLOAD_NODES_URL]
[profile]
```
Positional arguments:
```
profile tox profile file - may be encrypted
```
Optional arguments:
```
-h, --help show this help message and exit
--command {info,decrypt,nodes}
Action command - default: info
--output OUTPUT Destination for info/decrypt/nodes - defaults to stdout
2022-10-02 03:36:34 +00:00
--info {info,repr,yaml,json,pprint,nmap_udp,nmap_tcp}
2022-10-01 23:38:28 +00:00
Format for info command
--nodes {select_tcp,select_udp,select_version,nmap_tcp,nmap_udp}
Action for nodes command (requires jq)
--indent INDENT Indent for yaml/json/pprint
--download_nodes_url DOWNLOAD_NODES_URL
```
2022-10-02 03:36:34 +00:00
### --command info
```info``` will output the profile on stdout, or to a file with ```--output```
2022-10-02 22:29:36 +00:00
Choose one of ```{info,repr,yaml,json,pprint,save}```
2022-10-02 03:36:34 +00:00
for the format for info command.
Choose one of ```{nmap_udp,nmap_tcp}```
to run tests using ```nmap``` for the ```DHT``` and ```TCP_RELAY```
sections of the profile. Reguires ```nmap``` and uses ```sudo```.
2022-10-02 22:29:36 +00:00
#### Saving a copy
The code now can generate a saved copy of the profile as it parses the profile.
Use the command ```--command info --info save``` with ```--output```
and a filename, to process the file with info to stderr, and it will
save an copy of the file to the ```--output``` (unencrypted).
It may be shorter than the original profile by up to 512 bytes, as the
original toxic profile is padded at the end with nulls (or maybe in the
decryption).
2022-10-02 03:36:34 +00:00
### --command nodes
Takes a DHTnodes.json file as an argument.
Choose one of ```{select_tcp,select_udp,select_version}```
for ```--nodes``` to select TCP nodes, UDP nodes or nodes with the latest version.
Requires ```jq```.
Choose one of ```{nmap_tcp,nmap_udp}```
to run tests using ```nmap``` for the ```tcp``` and ```udp```
nodes. Reguires ```nmap``` and uses ```sudo```.
### --command decrypt
Decrypt a profile.
2022-10-02 22:29:36 +00:00
### --command edit
The code now can generate an edited copy of the profile.
Use the command ```--command edit --edit section,key,val``` with
```--output``` and a filename, to process the file with info to stderr,
and it will save an copy of the edited file to the
```--output``` file (unencrypted). There's not much editing yet; give
```--command edit --edit help``` to get a list of what Available Sections,
and Supported Quads (section,num,key,type) that can be edited.
Currently it is:
```
NAME,0,Nick_name,str
STATUSMESSAGE,0,Status_message,str
STATUS,0,Online_status,int
```
2022-09-24 02:43:49 +00:00
## Requirements
If you want to read encrypted profiles, you need to download
toxygen to deal with encrypted tox files, from:
2022-10-01 18:18:56 +00:00
<https://git.plastiras.org/emdee/toxygen_wrapper>
2022-09-24 02:43:49 +00:00
Just put the toxygen/toxygen directory on your PYTHONPATH
You also need to link your libtoxcore.so and libtoxav.so
2022-10-01 18:18:56 +00:00
and libtoxencryptsave.so into ```wrapper/../libs/```
2022-09-24 02:43:49 +00:00
Link all 3 from libtoxcore.so files if you have only libtoxcore.so
If you want to read the GROUPS section, you need Python msgpack:
<https://pypi.org/project/msgpack/>
2022-09-30 20:09:14 +00:00
If you want to write in YAML, you need Python yaml:
<https://pypi.org/project/PyYAML/>
2022-09-24 02:43:49 +00:00
If you have coloredlogs installed it will make use of it:
<https://pypi.org/project/coloredlogs/>
2022-10-02 22:29:36 +00:00
For the ```select``` and ```nmap``` commands, the ```jq``` utility is
required. It's available in most distros, or <https://stedolan.github.io/jq/>
For the ```nmap``` commands, the ```nmap``` utility is
required. It's available in most distros, or <https://nmap.org/>
2022-09-24 02:43:49 +00:00
## Future Directions
2022-10-02 22:29:36 +00:00
This has not been tested on Windwoes, but is should be simple to fix.
2022-09-24 02:43:49 +00:00
Because it's written in Python it is easy to extend to, for example,
rekeying a profile when copying a profile to a new device:
<https://git.plastiras.org/emdee/tox_profile/wiki/MultiDevice-Announcements-POC>
2022-10-01 23:38:28 +00:00
2022-10-02 08:44:33 +00:00
## Specification
2022-10-01 23:38:28 +00:00
There is a copy of the Tox [spec](https://toktok.ltd/spec.html)
in the repo - it is missing any description of the groups section.