http needs access to GridManager

This commit is contained in:
meejah 2023-02-20 12:09:51 -07:00
parent 5b14561ec0
commit a6cf06cc6d
2 changed files with 33 additions and 8 deletions

View File

@ -6,7 +6,11 @@ import sys
from datetime import ( from datetime import (
datetime, datetime,
) )
from typing import Optional, Union from typing import (
Optional,
Union,
List,
)
from twisted.python.filepath import FilePath from twisted.python.filepath import FilePath
@ -99,7 +103,7 @@ def create_grid_manager():
) )
def _load_certificates_for(config_path: Optional[FilePath], name: str, gm_key=Optional[ed25519.Ed25519PublicKey]): def _load_certificates_for(config_path: Optional[FilePath], name: str, gm_key=Optional[ed25519.Ed25519PublicKey]) -> List[_GridManagerCertificate]:
""" """
Load any existing certificates for the given storage-server. Load any existing certificates for the given storage-server.

View File

@ -293,17 +293,22 @@ class StorageFarmBroker(service.MultiService):
by the given announcement. by the given announcement.
""" """
assert isinstance(server_id, bytes) assert isinstance(server_id, bytes)
if len(server["ann"].get(ANONYMOUS_STORAGE_NURLS, [])) > 0:
s = HTTPNativeStorageServer(server_id, server["ann"])
s.on_status_changed(lambda _: self._got_connection())
return s
handler_overrides = server.get("connections", {})
gm_verifier = create_grid_manager_verifier( gm_verifier = create_grid_manager_verifier(
self.storage_client_config.grid_manager_keys, self.storage_client_config.grid_manager_keys,
server["ann"].get("grid-manager-certificates", []), server["ann"].get("grid-manager-certificates", []),
"pub-{}".format(str(server_id, "ascii")), # server_id is v0-<key> not pub-v0-key .. for reasons? "pub-{}".format(str(server_id, "ascii")), # server_id is v0-<key> not pub-v0-key .. for reasons?
) )
if len(server["ann"].get(ANONYMOUS_STORAGE_NURLS, [])) > 0:
s = HTTPNativeStorageServer(
server_id,
server["ann"],
grid_manager_verifier=gm_verifier,
)
s.on_status_changed(lambda _: self._got_connection())
return s
handler_overrides = server.get("connections", {})
s = NativeStorageServer( s = NativeStorageServer(
server_id, server_id,
server["ann"], server["ann"],
@ -1013,13 +1018,14 @@ class HTTPNativeStorageServer(service.MultiService):
"connected". "connected".
""" """
def __init__(self, server_id: bytes, announcement, reactor=reactor): def __init__(self, server_id: bytes, announcement, reactor=reactor, grid_manager_verifier=None):
service.MultiService.__init__(self) service.MultiService.__init__(self)
assert isinstance(server_id, bytes) assert isinstance(server_id, bytes)
self._server_id = server_id self._server_id = server_id
self.announcement = announcement self.announcement = announcement
self._on_status_changed = ObserverList() self._on_status_changed = ObserverList()
self._reactor = reactor self._reactor = reactor
self._grid_manager_verifier = grid_manager_verifier
furl = announcement["anonymous-storage-FURL"].encode("utf-8") furl = announcement["anonymous-storage-FURL"].encode("utf-8")
( (
self._nickname, self._nickname,
@ -1069,6 +1075,21 @@ class HTTPNativeStorageServer(service.MultiService):
""" """
return self._on_status_changed.subscribe(status_changed) return self._on_status_changed.subscribe(status_changed)
def upload_permitted(self):
"""
If our client is configured with Grid Manager public-keys, we will
only upload to storage servers that have a currently-valid
certificate signed by at least one of the Grid Managers we
accept.
:return: True if we should use this server for uploads, False
otherwise.
"""
# if we have no Grid Manager keys configured, choice is easy
if self._grid_manager_verifier is None:
return True
return self._grid_manager_verifier()
# Special methods used by copy.copy() and copy.deepcopy(). When those are # Special methods used by copy.copy() and copy.deepcopy(). When those are
# used in allmydata.immutable.filenode to copy CheckResults during # used in allmydata.immutable.filenode to copy CheckResults during
# repair, we want it to treat the IServer instances as singletons, and # repair, we want it to treat the IServer instances as singletons, and