Skip to content
Snippets Groups Projects
_plugin.py 10 KiB
Newer Older
  • Learn to ignore specific revisions
  • # Copyright 2019 PrivateStorage.io, LLC
    #
    # Licensed under the Apache License, Version 2.0 (the "License");
    # you may not use this file except in compliance with the License.
    # You may obtain a copy of the License at
    #
    #     http://www.apache.org/licenses/LICENSE-2.0
    #
    # Unless required by applicable law or agreed to in writing, software
    # distributed under the License is distributed on an "AS IS" BASIS,
    # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    # See the License for the specific language governing permissions and
    # limitations under the License.
    
    """
    
    The Twisted plugin that glues the Zero-Knowledge Access Pass system into
    
    Tom Prince's avatar
    Tom Prince committed
    from datetime import datetime, timedelta
    from functools import partial
    from weakref import WeakValueDictionary
    
    import attr
    
    Tom Prince's avatar
    Tom Prince committed
    from allmydata.client import _Client
    from allmydata.interfaces import IAnnounceableStorageServer, IFoolscapStoragePlugin
    from allmydata.node import MissingConfigEntry
    from challenge_bypass_ristretto import SigningKey
    from twisted.internet.defer import succeed
    from twisted.logger import Logger
    from twisted.python.filepath import FilePath
    from zope.interface import implementer
    
    from .api import ZKAPAuthorizerStorageClient, ZKAPAuthorizerStorageServer
    from .controller import get_redeemer
    
    from .lease_maintenance import (
        SERVICE_NAME,
        lease_maintenance_service,
        maintain_leases_from_root,
    )
    
    Tom Prince's avatar
    Tom Prince committed
    from .model import VoucherStore
    from .resource import from_configuration as resource_from_configuration
    from .spending import SpendingController
    from .storage_common import BYTES_PER_PASS, get_configured_pass_value
    
    Tom Prince's avatar
    Tom Prince committed
    
    
    @implementer(IAnnounceableStorageServer)
    @attr.s
    class AnnounceableStorageServer(object):
        announcement = attr.ib()
        storage_server = attr.ib()
    
    
    
    @implementer(IFoolscapStoragePlugin)
    
    class ZKAPAuthorizer(object):
    
        """
        A storage plugin which provides a token-based access control mechanism on
        top of the Tahoe-LAFS built-in storage server interface.
    
    
        :ivar WeakValueDictionary _stores: A mapping from node directories to this
            plugin's database connections for those nodes.  The existence of any
            kind of attribute to reference database connections (not so much the
            fact that it is a WeakValueDictionary; if it were just a weakref the
            same would be true) probably reflects an error in the interface which
            forces different methods to use instance state to share a database
            connection.
    
    Tom Prince's avatar
    Tom Prince committed
    
    
        name = attr.ib(default=u"privatestorageio-zkapauthz-v1")
        _stores = attr.ib(default=attr.Factory(WeakValueDictionary))
    
        def _get_store(self, node_config):
            """
            :return VoucherStore: The database for the given node.  At most one
                connection is made to the database per ``ZKAPAuthorizer`` instance.
            """
    
    Tom Prince's avatar
    Tom Prince committed
            key = node_config.get_config_path()
    
            try:
                s = self._stores[key]
            except KeyError:
    
                s = VoucherStore.from_node_config(node_config, datetime.now)
    
        def _get_redeemer(self, node_config, announcement, reactor):
            """
            :return IRedeemer: The voucher redeemer indicated by the given
                configuration.  A new instance is returned on every call because
                the redeemer interface is stateless.
            """
            return get_redeemer(self.name, node_config, announcement, reactor)
    
    
        def get_storage_server(self, configuration, get_anonymous_storage_server):
    
            kwargs = configuration.copy()
            root_url = kwargs.pop(u"ristretto-issuer-root-url")
    
            pass_value = int(kwargs.pop(u"pass-value", BYTES_PER_PASS))
    
            signing_key = load_signing_key(
    
                FilePath(
                    kwargs.pop(u"ristretto-signing-key-path"),
    
            announcement = {
                u"ristretto-issuer-root-url": root_url,
            }
    
            storage_server = ZKAPAuthorizerStorageServer(
    
                get_anonymous_storage_server(),
    
                pass_value=pass_value,
                signing_key=signing_key,
    
            return succeed(
                AnnounceableStorageServer(
                    announcement,
                    storage_server,
                ),
            )
    
    
        def get_storage_client(self, node_config, announcement, get_rref):
    
    Jean-Paul Calderone's avatar
    Jean-Paul Calderone committed
            """
            Create an ``IStorageClient`` that submits ZKAPs with certain requests in
            order to authorize them.  The ZKAPs are extracted from the database
            managed by this plugin in the node directory that goes along with
            ``node_config``.
            """
    
            redeemer = self._get_redeemer(node_config, announcement, reactor)
    
            store = self._get_store(node_config)
    
            controller = SpendingController.for_store(
                tokens_to_passes=redeemer.tokens_to_passes,
                store=store,
    
    Tom Prince's avatar
    Tom Prince committed
            )
    
            return ZKAPAuthorizerStorageClient(
    
                get_configured_pass_value(node_config),
    
    Jean-Paul Calderone's avatar
    Jean-Paul Calderone committed
                controller.get,
    
        def get_client_resource(self, node_config, reactor=None):
    
            """
            Get an ``IZKAPRoot`` for the given node configuration.
    
            :param allmydata.node._Config node_config: The configuration object
                for the relevant node.
            """
    
            if reactor is None:
                from twisted.internet import reactor
    
            return resource_from_configuration(
                node_config,
    
                store=self._get_store(node_config),
    
                redeemer=self._get_redeemer(node_config, None, reactor),
    
    
    
    _init_storage = _Client.__dict__["init_storage"]
    
    def maintenance_init_storage(self, announceable_storage_servers):
        """
        A monkey-patched version of ``_Client.init_storage`` which also
        initializes the lease maintenance service.
        """
        from twisted.internet import reactor
    
        result = _init_storage(self, announceable_storage_servers)
        _maybe_attach_maintenance_service(reactor, self)
        return result
    
    _Client.init_storage = maintenance_init_storage
    
    
    def _maybe_attach_maintenance_service(reactor, client_node):
        """
        Check for an existing lease maintenance service and if one is not found,
        create one.
    
        :param allmydata.client._Client client_node: The client node to check and,
            possibly, modify.  A lease maintenance service is added to it if and
            only if one is not already present.
        """
        try:
            # If there is already one we don't need another.
            client_node.getServiceNamed(SERVICE_NAME)
        except KeyError:
            # There isn't one so make it and add it.
            _log.info("Creating new lease maintenance service")
            _create_maintenance_service(
                reactor,
                client_node.config,
                client_node,
            ).setServiceParent(client_node)
    
            _log.failure("Attaching maintenance service to client node")
        else:
            _log.info("Found existing lease maintenance service")
    
    
    def _create_maintenance_service(reactor, node_config, client_node):
        """
        Create a lease maintenance service to be attached to the given client
        node.
    
        :param allmydata.node._Config node_config: The configuration for the node
            the lease maintenance service will be attached to.
    
        :param allmydata.client._Client client_node: The client node the lease
            maintenance service will be attached to.
        """
    
        def get_now():
            return datetime.utcfromtimestamp(reactor.seconds())
    
    
    Tom Prince's avatar
    Tom Prince committed
        from twisted.plugins.zkapauthorizer import storage_server
    
        store = storage_server._get_store(node_config)
    
    
        # Create the operation which performs the lease maintenance job when
        # called.
        maintain_leases = maintain_leases_from_root(
    
            get_root_nodes=partial(get_root_nodes, client_node, node_config),
            storage_broker=client_node.get_storage_broker(),
            secret_holder=client_node._secret_holder,
    
            # The greater the min lease remaining time, the more of each lease
            # period is "wasted" by renewing the lease before it has expired.  The
            # premise of ZKAPAuthorizer's use of leases is that if they expire,
            # the storage server is free to reclaim the storage by forgetting
            # about the share.  However, since we do not know of any
            # ZKAPAuthorizer-enabled storage grids which will garbage collect
            # shares when leases expire, we have no reason not to use a zero
            # duration here - for now.
            #
            # In the long run, storage servers must run with garbage collection
            # enabled.  Ideally, before that happens, we will have a system that
            # doesn't involve trading of wasted lease time against reliability of
            # leases being renewed before the shares are garbage collected.
    
            min_lease_remaining=timedelta(seconds=0),
    
            progress=store.start_lease_maintenance,
            get_now=get_now,
    
    Tom Prince's avatar
    Tom Prince committed
        last_run_path = FilePath(
            node_config.get_private_path(b"last-lease-maintenance-run")
        )
    
        # Create the service to periodically run the lease maintenance operation.
        return lease_maintenance_service(
            maintain_leases,
            reactor,
    
    
    
    def get_root_nodes(client_node, node_config):
        try:
            rootcap = node_config.get_private_config(b"rootcap")
        except MissingConfigEntry:
            return []
        else:
            return [client_node.create_node_from_uri(rootcap)]
    
    
    
    def load_signing_key(path):
        """
        Read a serialized Ristretto signing key from the given path and return it
        as a ``challenge_bypass_ristretto.SigningKey``.
    
        Unlike ``challenge_bypass_ristretto.SigningKey.decode_base64`` this
        function will clean up any whitespace around the key.
    
        :param FilePath path: The path from which to read the key.
    
        :raise challenge_bypass_ristretto.DecodeException: If
            ``SigningKey.decode_base64`` raises this exception it will be passed
            through.
    
        :return challenge_bypass_ristretto.SigningKey: An object representing the
            key read.
        """
    
        return SigningKey.decode_base64(path.getContent().strip())