def _signed_cert_available(self, cert=None, certstr=None): if cert is None: _log.debug("_signed_cert_available, cert supplied={}".format(cert)) cert, certstr = certificate.get_own_cert(self._name) if cert is None: _log.error("No runtime certificate can be found") dht_id = self._derive_dht_id(cert) self.dht_server = ServerApp(AppendServer, dht_id, node_name=self._name) ip, port = self.dht_server.start(iface=self._iface) self._dlist.append(self.dht_server.bootstrap(self._bootstrap)) logger("Register service %s %s:%s" % (self._network, ip, port)) self._ssdps.register_service(self._network, ip, port) logger("Set client filter %s" % (self._network)) self._ssdps.set_client_filter(self._network) def bootstrap_proxy(addrs): def started(args): logger("DHT Started %s" % (args)) if not self._started and self._cb: reactor.callLater(.2, self._cb, True) self._started = True def failed(args): logger("DHT failed to bootstrap %s" % (args)) #reactor.callLater(.5, bootstrap_proxy, addrs) logger("Trying to bootstrap with %s" % (repr(addrs))) d = self.dht_server.bootstrap(addrs) d.addCallback(started) d.addErrback(failed) def start_msearch(args): def _later_start(): self._ssdps.start_search(SERVICE_UUID, callback=bootstrap_proxy, stop=False) self._ssdps.update_server_params(SERVICE_UUID, cert=certstr) logger("** msearch %s args: %s" % (self, repr(args))) reactor.callLater(0, _later_start) # Wait until servers all listen dl = defer.DeferredList(self._dlist) dl.addBoth(start_msearch) # Only for logging self.dht_server.kserver.protocol.sourceNode.port = port self.dht_server.kserver.protocol.sourceNode.ip = "0.0.0.0" #FIXME handle inside ServerApp self.dht_server.kserver.name = self._name self.dht_server.kserver.protocol.name = self._name self.dht_server.kserver.protocol.storeOwnCert(certstr) self.dht_server.kserver.protocol.getOwnCert() self.dht_server.kserver.protocol.setPrivateKey()
def start(self, iface='', network=None, bootstrap=None, cb=None, name=None, nodeid=None): if bootstrap is None: bootstrap = [] if network is None: network = _conf.get_in_order("dht_network_filter", "ALL") self._network = network self._iface = iface self._bootstrap = bootstrap self._cb = cb self._name = name self._dlist = [] self._ssdps = SSDPServiceDiscovery(iface) self._dlist += self._ssdps.start() domain = _conf.get("security", "security_domain_name") is_ca=False try: if _conf.get("security","certificate_authority")=="True": ca = certificate_authority.CA(domain) #make sure private key exist if ca.verify_private_key_exist(): is_ca = True except: is_ca = False self._ssdps.update_server_params(CA_SERVICE_UUID, sign=is_ca, name=name) cert, certstr = certificate.get_own_cert(self._name) if not cert: _log.debug("runtime cert not available, let's create CSR") if is_ca: # We are the CA, just generate CSR and sign it csrfile = certificate.new_runtime(name, domain, nodeid=nodeid) _log.debug("Local CA sign runtime CSR") try: content = open(csrfile, 'rt').read() certpath=ca.sign_csr(csrfile) certificate.store_own_cert(certpath=certpath) return self._signed_cert_available() except: _log.exception("Failed signing with local CA") raise else: # Discover the signing CA _log.debug("No signed cert, discover CA signing CSR") self._sde_client = sde.Client(name, nodeid, CalvinCB(self._ssdps.start_search, CA_SERVICE_UUID, callback=self._signed_cert_received), self._signed_cert_available) else: _log.debug("runtime cert available") self._signed_cert_available(cert=cert, certstr=certstr)
def start(self, iface='', network=None, bootstrap=None, cb=None, type=None, name=None, nodeid=None): self._name = name if bootstrap is None: bootstrap = [] cert, certstr = certificate.get_own_cert(self._name) key = cert.digest("sha256") newkey = key.replace(":", "") bytekey = newkey.decode("hex") if network is None: network = _conf.get_in_order("dht_network_filter", "ALL") if network is None: network = _conf.get_in_order("dht_network_filter", "ALL") self.dht_server = dht_server.ServerApp(evilAppendServer, bytekey[-20:], node_name=name) ip, port = self.dht_server.start(iface=iface) dlist = [] dlist.append(self.dht_server.bootstrap(bootstrap)) self._ssdps = service_discovery_ssdp.SSDPServiceDiscovery(iface) dlist += self._ssdps.start() _log.debug("Register service %s %s:%s" % (network, ip, port)) self._ssdps.register_service(network, ip, port) _log.debug("Set client filter %s" % (network)) self._ssdps.set_client_filter(network) def bootstrap_proxy(addrs): def started(args): _log.debug("DHT Started %s" % (args)) if not self._started and cb: service_discovery_ssdp.reactor.callLater(.2, cb, True) self._started = True def failed(args): _log.debug("DHT failed to bootstrap %s" % (args)) #reactor.callLater(.5, bootstrap_proxy, addrs) _log.debug("Trying to bootstrap with %s" % (repr(addrs))) d = self.dht_server.bootstrap(addrs) d.addCallback(started) d.addErrback(failed) def start_msearch(args): _log.debug("** msearch %s args: %s" % (self, repr(args))) def _later_start(): self._ssdps.start_search(service_discovery_ssdp.SERVICE_UUID, callback=bootstrap_proxy, stop=False) self._ssdps.update_server_params(service_discovery_ssdp.SERVICE_UUID, cert=certstr) service_discovery_ssdp.reactor.callLater(0, _later_start) # Wait until servers all listen dl = service_discovery_ssdp.defer.DeferredList(dlist) dl.addBoth(start_msearch) self.dht_server.kserver.protocol.evilType = type self.dht_server.kserver.protocol.sourceNode.port = port self.dht_server.kserver.protocol.sourceNode.ip = "0.0.0.0" self.dht_server.kserver.name = name self.dht_server.kserver.protocol.name = name self.dht_server.kserver.protocol.storeOwnCert(certstr) self.dht_server.kserver.protocol.setPrivateKey()
def start(self, iface='', network=None, bootstrap=None, cb=None, name=None, nodeid=None): if bootstrap is None: bootstrap = [] if network is None: network = _conf.get_in_order("dht_network_filter", "ALL") self._network = network self._iface = iface self._bootstrap = bootstrap self._cb = cb self._name = name self._dlist = [] self._ssdps = SSDPServiceDiscovery(iface) self._dlist += self._ssdps.start() domain = _conf.get("security", "security_domain_name") is_ca = False try: if _conf.get("security", "certificate_authority") == "True": ca = certificate_authority.CA(domain) #make sure private key exist if ca.verify_private_key_exist(): is_ca = True except: is_ca = False self._ssdps.update_server_params(CA_SERVICE_UUID, sign=is_ca, name=name) cert, certstr = certificate.get_own_cert(self._name) if not cert: _log.debug("runtime cert not available, let's create CSR") if is_ca: # We are the CA, just generate CSR and sign it csrfile = certificate.new_runtime(name, domain, nodeid=nodeid) _log.debug("Local CA sign runtime CSR") try: content = open(csrfile, 'rt').read() certpath = ca.sign_csr(csrfile) certificate.store_own_cert(certpath=certpath) return self._signed_cert_available() except: _log.exception("Failed signing with local CA") raise else: # Discover the signing CA _log.debug("No signed cert, discover CA signing CSR") self._sde_client = sde.Client( name, nodeid, CalvinCB(self._ssdps.start_search, CA_SERVICE_UUID, callback=self._signed_cert_received), self._signed_cert_available) else: _log.debug("runtime cert available") self._signed_cert_available(cert=cert, certstr=certstr)
def start(self, iface='', network=None, bootstrap=None, cb=None, type=None, name=None, nodeid=None): self._name = name if bootstrap is None: bootstrap = [] cert, certstr = certificate.get_own_cert(self._name) key = cert.digest("sha256") newkey = key.replace(":", "") bytekey = newkey.decode("hex") if network is None: network = _conf.get_in_order("dht_network_filter", "ALL") if network is None: network = _conf.get_in_order("dht_network_filter", "ALL") self.dht_server = dht_server.ServerApp(evilAppendServer, bytekey[-20:], node_name=name) ip, port = self.dht_server.start(iface=iface) dlist = [] dlist.append(self.dht_server.bootstrap(bootstrap)) self._ssdps = service_discovery_ssdp.SSDPServiceDiscovery(iface) dlist += self._ssdps.start() _log.debug("Register service %s %s:%s" % (network, ip, port)) self._ssdps.register_service(network, ip, port) _log.debug("Set client filter %s" % (network)) self._ssdps.set_client_filter(network) def bootstrap_proxy(addrs): def started(args): _log.debug("DHT Started %s" % (args)) if not self._started and cb: service_discovery_ssdp.reactor.callLater(.2, cb, True) self._started = True def failed(args): _log.debug("DHT failed to bootstrap %s" % (args)) #reactor.callLater(.5, bootstrap_proxy, addrs) _log.debug("Trying to bootstrap with %s" % (repr(addrs))) d = self.dht_server.bootstrap(addrs) d.addCallback(started) d.addErrback(failed) def start_msearch(args): _log.debug("** msearch %s args: %s" % (self, repr(args))) def _later_start(): self._ssdps.start_search(service_discovery_ssdp.SERVICE_UUID, callback=bootstrap_proxy, stop=False) self._ssdps.update_server_params( service_discovery_ssdp.SERVICE_UUID, cert=certstr) service_discovery_ssdp.reactor.callLater(0, _later_start) # Wait until servers all listen dl = service_discovery_ssdp.defer.DeferredList(dlist) dl.addBoth(start_msearch) self.dht_server.kserver.protocol.evilType = type self.dht_server.kserver.protocol.sourceNode.port = port self.dht_server.kserver.protocol.sourceNode.ip = "0.0.0.0" self.dht_server.kserver.name = name self.dht_server.kserver.protocol.name = name self.dht_server.kserver.protocol.storeOwnCert(certstr) self.dht_server.kserver.protocol.setPrivateKey()