mirror of
https://github.com/tahoe-lafs/tahoe-lafs.git
synced 2024-12-27 08:22:32 +00:00
110 lines
3.8 KiB
Python
110 lines
3.8 KiB
Python
|
|
import os
|
|
import time
|
|
|
|
import foolscap
|
|
from zope.interface import implements
|
|
from twisted.internet import reactor
|
|
from twisted.application import service
|
|
from twisted.python import log
|
|
|
|
from pycryptopp.publickey import rsa
|
|
from allmydata.interfaces import RIKeyGenerator
|
|
|
|
class KeyGenerator(service.MultiService, foolscap.Referenceable):
|
|
implements(RIKeyGenerator)
|
|
|
|
pool_size = 16 # no. keys to keep on hand in the pool
|
|
pool_refresh_delay = 6 # no. sec to wait after a fetch before generating new keys
|
|
verbose = False
|
|
|
|
def __init__(self, default_key_size=2048):
|
|
service.MultiService.__init__(self)
|
|
self.keypool = []
|
|
self.last_fetch = 0
|
|
self.default_key_size = default_key_size
|
|
|
|
def startService(self):
|
|
self.timer = reactor.callLater(0, self.maybe_refill_pool)
|
|
return service.MultiService.startService(self)
|
|
|
|
def stopService(self):
|
|
if self.timer.active():
|
|
self.timer.cancel()
|
|
return service.MultiService.stopService(self)
|
|
|
|
def __repr__(self):
|
|
return '<KeyGenerator[%s]>' % (len(self.keypool),)
|
|
|
|
def vlog(self, msg):
|
|
if self.verbose:
|
|
log.msg(msg)
|
|
|
|
def reset_timer(self):
|
|
self.last_fetch = time.time()
|
|
if self.timer.active():
|
|
self.timer.reset(self.pool_refresh_delay)
|
|
else:
|
|
self.timer = reactor.callLater(self.pool_refresh_delay, self.maybe_refill_pool)
|
|
|
|
def maybe_refill_pool(self):
|
|
now = time.time()
|
|
if self.last_fetch + self.pool_refresh_delay < now:
|
|
self.vlog('%s refilling pool' % (self,))
|
|
while len(self.keypool) < self.pool_size:
|
|
self.keypool.append(self.gen_key(self.default_key_size))
|
|
else:
|
|
self.vlog('%s not refilling pool' % (self,))
|
|
reactor.callLater(1, self.maybe_refill_pool)
|
|
|
|
def gen_key(self, key_size):
|
|
self.vlog('%s generating key size %s' % (self, key_size, ))
|
|
signer = rsa.generate(key_size)
|
|
verifier = signer.get_verifying_key()
|
|
return verifier.serialize(), signer.serialize()
|
|
|
|
def remote_get_rsa_key_pair(self, key_size):
|
|
self.vlog('%s remote_get_key' % (self,))
|
|
if key_size != self.default_key_size or not self.keypool:
|
|
key = self.gen_key(key_size)
|
|
self.reset_timer()
|
|
return key
|
|
else:
|
|
self.reset_timer()
|
|
return self.keypool.pop()
|
|
|
|
class KeyGeneratorService(service.MultiService):
|
|
furl_file = 'key_generator.furl'
|
|
|
|
def __init__(self, basedir='.', display_furl=True, default_key_size=2048):
|
|
service.MultiService.__init__(self)
|
|
self.basedir = basedir
|
|
self.tub = foolscap.Tub(certFile=os.path.join(self.basedir, 'key_generator.pem'))
|
|
self.tub.setServiceParent(self)
|
|
self.key_generator = KeyGenerator(default_key_size=default_key_size)
|
|
self.key_generator.setServiceParent(self)
|
|
|
|
portnum = self.get_portnum()
|
|
self.listener = self.tub.listenOn(portnum or 'tcp:0')
|
|
d = self.tub.setLocationAutomatically()
|
|
if portnum is None:
|
|
d.addCallback(self.save_portnum)
|
|
d.addCallback(self.tub_ready, display_furl)
|
|
d.addErrback(log.err)
|
|
|
|
def get_portnum(self):
|
|
portnumfile = os.path.join(self.basedir, 'portnum')
|
|
if os.path.exists(portnumfile):
|
|
return file(portnumfile, 'rb').read().strip()
|
|
|
|
def save_portnum(self, junk):
|
|
portnum = self.listener.getPortnum()
|
|
portnumfile = os.path.join(self.basedir, 'portnum')
|
|
file(portnumfile, 'wb').write('%d\n' % (portnum,))
|
|
|
|
def tub_ready(self, junk, display_furl):
|
|
kgf = os.path.join(self.basedir, self.furl_file)
|
|
self.keygen_furl = self.tub.registerReference(self.key_generator, furlFile=kgf)
|
|
if display_furl:
|
|
print 'key generator at:', self.keygen_furl
|