From 16e7488cffd4fe9d79855ad2b70f07d6cb036188 Mon Sep 17 00:00:00 2001 From: Jean-Paul Calderone <exarkun@twistedmatrix.com> Date: Wed, 13 Nov 2019 10:03:52 -0500 Subject: [PATCH] Add a `created` column to the voucher schema And a corresponding `created` field to the voucher model object which propagates to the web view. --- src/_zkapauthorizer/_plugin.py | 5 +- src/_zkapauthorizer/model.py | 60 ++++++++++++++---- .../tests/test_client_resource.py | 62 ++++++++++++------- src/_zkapauthorizer/tests/test_controller.py | 11 ++-- src/_zkapauthorizer/tests/test_model.py | 47 ++++++++------ src/_zkapauthorizer/tests/test_plugin.py | 10 +-- zkapauthorizer.nix | 3 +- 7 files changed, 135 insertions(+), 63 deletions(-) diff --git a/src/_zkapauthorizer/_plugin.py b/src/_zkapauthorizer/_plugin.py index 355642d..0711f2c 100644 --- a/src/_zkapauthorizer/_plugin.py +++ b/src/_zkapauthorizer/_plugin.py @@ -20,6 +20,9 @@ Tahoe-LAFS. from weakref import ( WeakValueDictionary, ) +from datetime import ( + datetime, +) import attr @@ -93,7 +96,7 @@ class ZKAPAuthorizer(object): try: s = self._stores[key] except KeyError: - s = VoucherStore.from_node_config(node_config) + s = VoucherStore.from_node_config(node_config, datetime.now) self._stores[key] = s return s diff --git a/src/_zkapauthorizer/model.py b/src/_zkapauthorizer/model.py index cf61f82..b42f78e 100644 --- a/src/_zkapauthorizer/model.py +++ b/src/_zkapauthorizer/model.py @@ -24,7 +24,9 @@ from json import ( loads, dumps, ) - +from datetime import ( + datetime, +) from sqlite3 import ( OperationalError, connect as _connect, @@ -32,6 +34,9 @@ from sqlite3 import ( import attr +from aniso8601 import ( + parse_datetime, +) from twisted.python.filepath import ( FilePath, ) @@ -117,6 +122,7 @@ def open_and_initialize(path, required_schema_version, connect=None): """ CREATE TABLE IF NOT EXISTS [vouchers] ( [number] text, + [created] text, -- An ISO8601 date+time string. [redeemed] num DEFAULT 0, PRIMARY KEY([number]) @@ -168,12 +174,17 @@ class VoucherStore(object): :ivar allmydata.node._Config node_config: The Tahoe-LAFS node configuration object for the node that owns the persisted vouchers. + + :ivar now: A no-argument callable that returns the time of the call as a + ``datetime`` instance. """ database_path = attr.ib(validator=attr.validators.instance_of(FilePath)) + now = attr.ib() + _connection = attr.ib() @classmethod - def from_node_config(cls, node_config, connect=None): + def from_node_config(cls, node_config, now, connect=None): """ Create or open the ``VoucherStore`` for a given node. @@ -181,6 +192,8 @@ class VoucherStore(object): configuration object for the node for which we want to open a store. + :param now: See ``VoucherStore.now``. + :param connect: An alternate database connection function. This is primarily for the purposes of the test suite. """ @@ -192,6 +205,7 @@ class VoucherStore(object): ) return cls( db_path, + now, conn, ) @@ -205,7 +219,7 @@ class VoucherStore(object): cursor.execute( """ SELECT - [number], [redeemed] + [number], [created], [redeemed] FROM [vouchers] WHERE @@ -216,7 +230,7 @@ class VoucherStore(object): refs = cursor.fetchall() if len(refs) == 0: raise KeyError(voucher) - return Voucher(refs[0][0], bool(refs[0][1])) + return Voucher.from_row(refs[0]) @with_cursor def add(self, cursor, voucher, tokens): @@ -228,11 +242,15 @@ class VoucherStore(object): :param list[RandomToken]: The tokens to add alongside the voucher. """ + now = self.now() + if not isinstance(now, datetime): + raise TypeError("{} returned {}, expected datetime".format(self.now, now)) + cursor.execute( """ - INSERT OR IGNORE INTO [vouchers] ([number]) VALUES (?) + INSERT OR IGNORE INTO [vouchers] ([number], [created]) VALUES (?, ?) """, - (voucher,) + (voucher, self.now()) ) if cursor.rowcount: # Something was inserted. Insert the tokens, too. It's okay to @@ -259,14 +277,14 @@ class VoucherStore(object): """ cursor.execute( """ - SELECT [number], [redeemed] FROM [vouchers] + SELECT [number], [created], [redeemed] FROM [vouchers] """, ) refs = cursor.fetchall() return list( - Voucher(number, bool(redeemed)) - for (number, redeemed) + Voucher.from_row(row) + for row in refs ) @@ -396,8 +414,23 @@ class RandomToken(object): @attr.s class Voucher(object): number = attr.ib() + created = attr.ib(default=None, validator=attr.validators.optional(attr.validators.instance_of(datetime))) redeemed = attr.ib(default=False, validator=attr.validators.instance_of(bool)) + @classmethod + def from_row(cls, row): + print(row[1]) + return cls( + row[0], + # All Python datetime-based date/time libraries fail to handle + # leap seconds. This parse call might raise an exception of the + # value represents a leap second. However, since we also use + # Python to generate the data in the first place, it should never + # represent a leap second... I hope. + parse_datetime(row[1], delimiter=u" "), + bool(row[2]), + ) + @classmethod def from_json(cls, json): values = loads(json) @@ -419,6 +452,9 @@ class Voucher(object): def to_json_v1(self): - result = attr.asdict(self) - result[u"version"] = 1 - return result + return { + u"number": self.number, + u"created": None if self.created is None else self.created.isoformat(), + u"redeemed": self.redeemed, + u"version": 1, + } diff --git a/src/_zkapauthorizer/tests/test_client_resource.py b/src/_zkapauthorizer/tests/test_client_resource.py index c456f32..e816998 100644 --- a/src/_zkapauthorizer/tests/test_client_resource.py +++ b/src/_zkapauthorizer/tests/test_client_resource.py @@ -27,6 +27,9 @@ from .._base64 import ( urlsafe_b64decode, ) +from datetime import ( + datetime, +) from json import ( dumps, loads, @@ -78,6 +81,7 @@ from hypothesis.strategies import ( integers, binary, text, + datetimes, ) from twisted.internet.defer import ( @@ -201,18 +205,22 @@ def invalid_bodies(): ) -def root_from_config(config): +def root_from_config(config, now): """ Create a client root resource from a Tahoe-LAFS configuration. :param _Config config: The Tahoe-LAFS configuration. + :param now: A no-argument callable that returns the time of the call as a + ``datetime`` instance. + :return IResource: The root client resource. """ return from_configuration( config, VoucherStore.from_node_config( config, + now, memory_connect, ), ) @@ -230,7 +238,7 @@ class ResourceTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) self.assertThat( getChildForRequest(root, request), Provides([IResource]), @@ -256,7 +264,7 @@ class UnblindedTokenTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) if num_tokens: # Put in a number of tokens with which to test. @@ -290,7 +298,7 @@ class UnblindedTokenTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) if num_tokens: # Put in a number of tokens with which to test. @@ -324,7 +332,7 @@ class UnblindedTokenTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) if num_tokens: # Put in a number of tokens with which to test. @@ -389,7 +397,7 @@ class UnblindedTokenTests(TestCase): tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) # Put in a number of tokens with which to test. redeeming = root.controller.redeem(voucher, num_tokens) @@ -481,7 +489,7 @@ class VoucherTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) agent = RequestTraversalAgent(root) producer = FileBodyProducer( BytesIO(dumps({u"voucher": voucher})), @@ -512,7 +520,7 @@ class VoucherTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) agent = RequestTraversalAgent(root) producer = FileBodyProducer( BytesIO(body), @@ -542,7 +550,7 @@ class VoucherTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) agent = RequestTraversalAgent(root) url = u"http://127.0.0.1/voucher/{}".format( quote( @@ -571,7 +579,7 @@ class VoucherTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, datetime.now) agent = RequestTraversalAgent(root) requesting = agent.request( b"GET", @@ -584,25 +592,25 @@ class VoucherTests(TestCase): ), ) - @given(tahoe_configs(client_nonredeemer_configurations()), vouchers()) - def test_get_known_voucher_unredeemed(self, get_config, voucher): + @given(tahoe_configs(client_nonredeemer_configurations()), datetimes(), vouchers()) + def test_get_known_voucher_unredeemed(self, get_config, now, voucher): """ When a voucher is first ``PUT`` and then later a ``GET`` is issued for the same voucher then the response code is **OK** and details about the voucher are included in a json-encoded response body. """ - return self._test_get_known_voucher(get_config, voucher, False) + return self._test_get_known_voucher(get_config, now, voucher, False) - @given(tahoe_configs(client_dummyredeemer_configurations()), vouchers()) - def test_get_known_voucher_redeemed(self, get_config, voucher): + @given(tahoe_configs(client_dummyredeemer_configurations()), datetimes(), vouchers()) + def test_get_known_voucher_redeemed(self, get_config, now, voucher): """ When a voucher is first ``PUT`` and then later a ``GET`` is issued for the same voucher then the response code is **OK** and details about the voucher are included in a json-encoded response body. """ - return self._test_get_known_voucher(get_config, voucher, True) + return self._test_get_known_voucher(get_config, now, voucher, True) - def _test_get_known_voucher(self, get_config, voucher, redeemed): + def _test_get_known_voucher(self, get_config, now, voucher, redeemed): """ Assert that a voucher that is ``PUT`` and then ``GET`` is represented in the JSON response. @@ -612,7 +620,7 @@ class VoucherTests(TestCase): """ tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, lambda: now) agent = RequestTraversalAgent(root) producer = FileBodyProducer( @@ -649,15 +657,19 @@ class VoucherTests(TestCase): AfterPreprocessing( json_content, succeeded( - Equals(Voucher(voucher, redeemed=redeemed).marshal()), + Equals(Voucher( + voucher, + created=now, + redeemed=redeemed, + ).marshal()), ), ), ), ), ) - @given(tahoe_configs(), lists(vouchers(), unique=True)) - def test_list_vouchers(self, get_config, vouchers): + @given(tahoe_configs(), datetimes(), lists(vouchers(), unique=True)) + def test_list_vouchers(self, get_config, now, vouchers): """ A ``GET`` to the ``VoucherCollection`` itself returns a list of existing vouchers. @@ -668,7 +680,7 @@ class VoucherTests(TestCase): # state behind that invalidates future iterations. tempdir = self.useFixture(TempDir()) config = get_config(tempdir.join(b"tahoe"), b"tub.port") - root = root_from_config(config) + root = root_from_config(config, lambda: now) agent = RequestTraversalAgent(root) note("{} vouchers".format(len(vouchers))) @@ -705,7 +717,11 @@ class VoucherTests(TestCase): succeeded( Equals({ u"vouchers": list( - Voucher(voucher, redeemed=True).marshal() + Voucher( + voucher, + created=now, + redeemed=True, + ).marshal() for voucher in vouchers ), diff --git a/src/_zkapauthorizer/tests/test_controller.py b/src/_zkapauthorizer/tests/test_controller.py index 6001b29..032ed09 100644 --- a/src/_zkapauthorizer/tests/test_controller.py +++ b/src/_zkapauthorizer/tests/test_controller.py @@ -58,6 +58,7 @@ from hypothesis import ( ) from hypothesis.strategies import ( integers, + datetimes, ) from twisted.python.url import ( URL, @@ -116,8 +117,8 @@ class PaymentControllerTests(TestCase): """ Tests for ``PaymentController``. """ - @given(tahoe_configs(), vouchers()) - def test_not_redeemed_while_redeeming(self, get_config, voucher): + @given(tahoe_configs(), datetimes(), vouchers()) + def test_not_redeemed_while_redeeming(self, get_config, now, voucher): """ A ``Voucher`` is not marked redeemed before ``IRedeemer.redeem`` completes. @@ -128,6 +129,7 @@ class PaymentControllerTests(TestCase): tempdir.join(b"node"), b"tub.port", ), + now=lambda: now, connect=memory_connect, ) controller = PaymentController( @@ -142,14 +144,15 @@ class PaymentControllerTests(TestCase): Equals(False), ) - @given(tahoe_configs(), vouchers()) - def test_redeemed_after_redeeming(self, get_config, voucher): + @given(tahoe_configs(), datetimes(), vouchers()) + def test_redeemed_after_redeeming(self, get_config, now, voucher): tempdir = self.useFixture(TempDir()) store = VoucherStore.from_node_config( get_config( tempdir.join(b"node"), b"tub.port", ), + now=lambda: now, connect=memory_connect, ) controller = PaymentController( diff --git a/src/_zkapauthorizer/tests/test_model.py b/src/_zkapauthorizer/tests/test_model.py index 282e3c3..319b363 100644 --- a/src/_zkapauthorizer/tests/test_model.py +++ b/src/_zkapauthorizer/tests/test_model.py @@ -50,6 +50,7 @@ from hypothesis import ( ) from hypothesis.strategies import ( lists, + datetimes, ) from twisted.python.filepath import ( @@ -93,8 +94,8 @@ class VoucherStoreTests(TestCase): ) - @given(tahoe_configs(), vouchers()) - def test_get_missing(self, get_config, voucher): + @given(tahoe_configs(), datetimes(), vouchers()) + def test_get_missing(self, get_config, now, voucher): """ ``VoucherStore.get`` raises ``KeyError`` when called with a voucher not previously added to the store. @@ -103,6 +104,7 @@ class VoucherStoreTests(TestCase): config = get_config(tempdir.join(b"node"), b"tub.port") store = VoucherStore.from_node_config( config, + lambda: now, memory_connect, ) self.assertThat( @@ -110,8 +112,8 @@ class VoucherStoreTests(TestCase): raises(KeyError), ) - @given(tahoe_configs(), vouchers(), lists(random_tokens(), unique=True)) - def test_add(self, get_config, voucher, tokens): + @given(tahoe_configs(), vouchers(), lists(random_tokens(), unique=True), datetimes()) + def test_add(self, get_config, voucher, tokens, now): """ ``VoucherStore.get`` returns a ``Voucher`` representing a voucher previously added to the store with ``VoucherStore.add``. @@ -120,6 +122,7 @@ class VoucherStoreTests(TestCase): config = get_config(tempdir.join(b"node"), b"tub.port") store = VoucherStore.from_node_config( config, + lambda: now, memory_connect, ) store.add(voucher, tokens) @@ -128,11 +131,12 @@ class VoucherStoreTests(TestCase): MatchesStructure( number=Equals(voucher), redeemed=Equals(False), + created=Equals(now), ), ) - @given(tahoe_configs(), vouchers(), lists(random_tokens(), unique=True)) - def test_add_idempotent(self, get_config, voucher, tokens): + @given(tahoe_configs(), vouchers(), datetimes(), lists(random_tokens(), unique=True)) + def test_add_idempotent(self, get_config, voucher, now, tokens): """ More than one call to ``VoucherStore.add`` with the same argument results in the same state as a single call. @@ -141,6 +145,7 @@ class VoucherStoreTests(TestCase): config = get_config(tempdir.join(b"node"), b"tub.port") store = VoucherStore.from_node_config( config, + lambda: now, memory_connect, ) store.add(voucher, tokens) @@ -149,12 +154,13 @@ class VoucherStoreTests(TestCase): store.get(voucher), MatchesStructure( number=Equals(voucher), + created=Equals(now), ), ) - @given(tahoe_configs(), lists(vouchers(), unique=True)) - def test_list(self, get_config, vouchers): + @given(tahoe_configs(), datetimes(), lists(vouchers(), unique=True)) + def test_list(self, get_config, now, vouchers): """ ``VoucherStore.list`` returns a ``list`` containing a ``Voucher`` object for each voucher previously added. @@ -164,6 +170,7 @@ class VoucherStoreTests(TestCase): config = get_config(nodedir, b"tub.port") store = VoucherStore.from_node_config( config, + lambda: now, memory_connect, ) @@ -173,14 +180,14 @@ class VoucherStoreTests(TestCase): self.assertThat( store.list(), Equals(list( - Voucher(number) + Voucher(number, created=now) for number in vouchers )), ) - @given(tahoe_configs()) - def test_uncreateable_store_directory(self, get_config): + @given(tahoe_configs(), datetimes()) + def test_uncreateable_store_directory(self, get_config, now): """ If the underlying directory in the node configuration cannot be created then ``VoucherStore.from_node_config`` raises ``StoreOpenError``. @@ -197,6 +204,7 @@ class VoucherStoreTests(TestCase): self.assertThat( lambda: VoucherStore.from_node_config( config, + lambda: now, memory_connect, ), Raises( @@ -218,8 +226,8 @@ class VoucherStoreTests(TestCase): ) - @given(tahoe_configs()) - def test_unopenable_store(self, get_config): + @given(tahoe_configs(), datetimes()) + def test_unopenable_store(self, get_config, now): """ If the underlying database file cannot be opened then ``VoucherStore.from_node_config`` raises ``StoreOpenError``. @@ -230,7 +238,7 @@ class VoucherStoreTests(TestCase): config = get_config(nodedir, b"tub.port") # Create the underlying database file. - store = VoucherStore.from_node_config(config) + store = VoucherStore.from_node_config(config, lambda: now) # Prevent further access to it. store.database_path.chmod(0o000) @@ -238,6 +246,7 @@ class VoucherStoreTests(TestCase): self.assertThat( lambda: VoucherStore.from_node_config( config, + lambda: now, ), raises(StoreOpenError), ) @@ -263,8 +272,8 @@ class UnblindedTokenStoreTests(TestCase): """ Tests for ``UnblindedToken``-related functionality of ``VoucherStore``. """ - @given(tahoe_configs(), vouchers(), lists(unblinded_tokens(), unique=True)) - def test_unblinded_tokens_round_trip(self, get_config, voucher_value, tokens): + @given(tahoe_configs(), datetimes(), vouchers(), lists(unblinded_tokens(), unique=True)) + def test_unblinded_tokens_round_trip(self, get_config, now, voucher_value, tokens): """ Unblinded tokens that are added to the store can later be retrieved. """ @@ -272,6 +281,7 @@ class UnblindedTokenStoreTests(TestCase): config = get_config(tempdir.join(b"node"), b"tub.port") store = VoucherStore.from_node_config( config, + lambda: now, memory_connect, ) store.insert_unblinded_tokens_for_voucher(voucher_value, tokens) @@ -282,8 +292,8 @@ class UnblindedTokenStoreTests(TestCase): more_unblinded_tokens = store.extract_unblinded_tokens(1) self.expectThat([], Equals(more_unblinded_tokens)) - @given(tahoe_configs(), vouchers(), random_tokens(), unblinded_tokens()) - def test_mark_vouchers_redeemed(self, get_config, voucher_value, token, one_token): + @given(tahoe_configs(), datetimes(), vouchers(), random_tokens(), unblinded_tokens()) + def test_mark_vouchers_redeemed(self, get_config, now, voucher_value, token, one_token): """ The voucher for unblinded tokens that are added to the store is marked as redeemed. @@ -292,6 +302,7 @@ class UnblindedTokenStoreTests(TestCase): config = get_config(tempdir.join(b"node"), b"tub.port") store = VoucherStore.from_node_config( config, + lambda: now, memory_connect, ) store.add(voucher_value, [token]) diff --git a/src/_zkapauthorizer/tests/test_plugin.py b/src/_zkapauthorizer/tests/test_plugin.py index ae958bc..9c97ea7 100644 --- a/src/_zkapauthorizer/tests/test_plugin.py +++ b/src/_zkapauthorizer/tests/test_plugin.py @@ -52,6 +52,7 @@ from hypothesis import ( ) from hypothesis.strategies import ( just, + datetimes, ) from foolscap.broker import ( Broker, @@ -97,6 +98,7 @@ from ..controller import ( from .strategies import ( minimal_tahoe_configs, tahoe_configs, + client_dummyredeemer_configurations, server_configurations, announcements, vouchers, @@ -246,9 +248,7 @@ class ServerPluginTests(TestCase): ) -tahoe_configs_with_dummy_redeemer = minimal_tahoe_configs({ - u"privatestorageio-zkapauthz-v1": just({u"redeemer": u"dummy"}), -}) +tahoe_configs_with_dummy_redeemer = tahoe_configs(client_dummyredeemer_configurations()) tahoe_configs_with_mismatched_issuer = minimal_tahoe_configs({ u"privatestorageio-zkapauthz-v1": just({u"ristretto-issuer-root-url": u"https://another-issuer.example.invalid/"}), @@ -310,6 +310,7 @@ class ClientPluginTests(TestCase): @given( tahoe_configs_with_dummy_redeemer, + datetimes(), announcements(), vouchers(), random_tokens(), @@ -323,6 +324,7 @@ class ClientPluginTests(TestCase): def test_unblinded_tokens_extracted( self, get_config, + now, announcement, voucher, token, @@ -343,7 +345,7 @@ class ClientPluginTests(TestCase): b"tub.port", ) - store = VoucherStore.from_node_config(node_config) + store = VoucherStore.from_node_config(node_config, lambda: now) store.add(voucher, [token]) store.insert_unblinded_tokens_for_voucher(voucher, [unblinded_token]) diff --git a/zkapauthorizer.nix b/zkapauthorizer.nix index fb54924..77bbf66 100644 --- a/zkapauthorizer.nix +++ b/zkapauthorizer.nix @@ -1,5 +1,5 @@ { buildPythonPackage, sphinx, circleci-cli -, attrs, zope_interface, twisted, tahoe-lafs, privacypass +, attrs, zope_interface, aniso8601, twisted, tahoe-lafs, privacypass , fixtures, testtools, hypothesis, pyflakes, treq, coverage , hypothesisProfile ? null , collectCoverage ? false @@ -27,6 +27,7 @@ buildPythonPackage rec { propagatedBuildInputs = [ attrs zope_interface + aniso8601 twisted tahoe-lafs privacypass -- GitLab