nucypher/tests/integration/characters/test_bob_joins_policy_and_r...

178 lines
7.3 KiB
Python
Raw Normal View History

"""
This file is part of nucypher.
nucypher is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
nucypher is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with nucypher. If not, see <https://www.gnu.org/licenses/>.
"""
2019-03-28 21:39:18 +00:00
import datetime
import maya
import os
import pytest
import time
from constant_sorrow.constants import NO_DECRYPTION_PERFORMED
from twisted.internet.task import Clock
from nucypher.characters.lawful import Bob, Enrico, Ursula
from nucypher.config.constants import TEMPORARY_DOMAIN
from nucypher.policy.maps import TreasureMap
from tests.constants import NUMBER_OF_URSULAS_IN_DEVELOPMENT_NETWORK
2020-05-13 03:21:15 +00:00
from tests.utils.middleware import MockRestMiddleware
def test_federated_bob_full_retrieve_flow(federated_ursulas,
federated_bob,
federated_alice,
capsule_side_channel,
federated_treasure_map,
enacted_federated_policy):
for ursula in federated_ursulas:
federated_bob.remember_node(ursula)
2018-11-02 20:03:36 +00:00
# The side channel delivers all that Bob needs at this point:
# - A single MessageKit, containing a Capsule
# - A representation of the data source
the_message_kit = capsule_side_channel()
alices_verifying_key = federated_alice.stamp.as_umbral_pubkey()
2021-09-08 15:21:03 +00:00
delivered_cleartexts = federated_bob.retrieve([the_message_kit],
policy_encrypting_key=enacted_federated_policy.public_key,
alice_verifying_key=alices_verifying_key,
encrypted_treasure_map=enacted_federated_policy.treasure_map)
# We show that indeed this is the passage originally encrypted by the Enrico.
assert b"Welcome to flippering number 1." == delivered_cleartexts[0]
def test_bob_retrieves(federated_alice,
federated_ursulas,
certificates_tempdir):
# Let's partition Ursulas in two parts
a_couple_of_ursulas = list(federated_ursulas)[:2]
rest_of_ursulas = list(federated_ursulas)[2:]
# Bob becomes
bob = Bob(federated_only=True,
domain=TEMPORARY_DOMAIN,
start_learning_now=True,
network_middleware=MockRestMiddleware(),
abort_on_learning_error=True,
known_nodes=a_couple_of_ursulas,
)
# Bob has only connected to - at most - 2 nodes.
assert sum(node.verified_node for node in bob.known_nodes) <= 2
# Alice creates a policy granting access to Bob
2018-11-02 20:03:36 +00:00
# Just for fun, let's assume she distributes KFrags among Ursulas unknown to Bob
shares = NUMBER_OF_URSULAS_IN_DEVELOPMENT_NETWORK - 2
label = b'label://' + os.urandom(32)
contract_end_datetime = maya.now() + datetime.timedelta(days=5)
policy = federated_alice.grant(bob=bob,
label=label,
threshold=3,
shares=shares,
expiration=contract_end_datetime,
handpicked_ursulas=set(rest_of_ursulas),
)
assert label == policy.label
# Enrico becomes
enrico = Enrico(policy_encrypting_key=policy.public_key)
plaintext = b"What's your approach? Mississippis or what?"
message_kit = enrico.encrypt_message(plaintext)
alices_verifying_key = federated_alice.stamp.as_umbral_pubkey()
2018-11-02 20:03:36 +00:00
# Bob takes the message_kit and retrieves the message within
2021-09-08 15:21:03 +00:00
delivered_cleartexts = bob.retrieve([message_kit],
policy_encrypting_key=policy.public_key,
alice_verifying_key=alices_verifying_key,
encrypted_treasure_map=policy.treasure_map)
assert plaintext == delivered_cleartexts[0]
2021-09-08 15:21:03 +00:00
cleartexts_delivered_a_second_time = bob.retrieve([message_kit],
policy_encrypting_key=policy.public_key,
2019-03-28 21:39:18 +00:00
alice_verifying_key=alices_verifying_key,
encrypted_treasure_map=policy.treasure_map)
2019-03-28 21:39:18 +00:00
# Indeed, they're the same cleartexts.
assert delivered_cleartexts == cleartexts_delivered_a_second_time
2019-03-28 21:39:18 +00:00
# Let's try retrieve again, but Alice revoked the policy.
receipt, failed_revocations = federated_alice.revoke(policy)
assert len(failed_revocations) == 0
# One thing to note here is that Bob *can* still retrieve with the cached CFrags,
# even though this Policy has been revoked. #892
2021-09-08 15:21:03 +00:00
_cleartexts = bob.retrieve([message_kit],
policy_encrypting_key=policy.public_key,
2019-03-28 21:42:24 +00:00
alice_verifying_key=alices_verifying_key,
encrypted_treasure_map=policy.treasure_map)
2019-03-28 21:42:24 +00:00
assert _cleartexts == delivered_cleartexts # TODO: 892
bob.disenchant()
def test_bob_retrieves_with_treasure_map(
federated_bob, federated_ursulas,
enacted_federated_policy, capsule_side_channel):
2019-11-06 21:14:25 +00:00
enrico = capsule_side_channel.enrico
message_kit = capsule_side_channel()
treasure_map = enacted_federated_policy.treasure_map
alice_verifying_key = enacted_federated_policy.publisher_verifying_key
# Teach Bob about the network
federated_bob.remember_node(list(federated_ursulas)[0])
federated_bob.learn_from_teacher_node(eager=True)
# Deserialized treasure map
text1 = federated_bob.retrieve(
2021-09-08 15:21:03 +00:00
[message_kit],
policy_encrypting_key=enacted_federated_policy.public_key,
2019-11-06 21:14:25 +00:00
alice_verifying_key=alice_verifying_key,
2021-08-17 22:05:28 +00:00
encrypted_treasure_map=treasure_map)
assert text1 == [b'Welcome to flippering number 2.']
def test_bob_retrieves_too_late(federated_bob, federated_ursulas,
enacted_federated_policy, capsule_side_channel):
clock = Clock()
clock.advance(time.time())
for urs in federated_ursulas:
if urs._datastore_pruning_task.running:
urs._datastore_pruning_task.stop()
urs._datastore_pruning_task.clock = clock
urs._datastore_pruning_task.start(interval=Ursula._pruning_interval)
2020-10-19 22:56:14 +00:00
clock.advance(86400 * 8) # 1 week # TODO: this is supposed to be seven days, not eight
enrico = capsule_side_channel.enrico
message_kit = capsule_side_channel()
treasure_map = enacted_federated_policy.treasure_map
alice_verifying_key = enacted_federated_policy.publisher_verifying_key
# with pytest.raises(Ursula.NotEnoughUrsulas):
federated_bob.retrieve(
2021-09-08 15:21:03 +00:00
[message_kit],
policy_encrypting_key=enacted_federated_policy.public_key,
alice_verifying_key=alice_verifying_key,
2021-09-03 03:55:39 +00:00
encrypted_treasure_map=treasure_map)