mirror of https://github.com/nucypher/nucypher.git
63 lines
2.1 KiB
Python
63 lines
2.1 KiB
Python
import requests
|
|
from kademlia.node import Node
|
|
|
|
from nkms.crypto.constants import CFRAG_LENGTH
|
|
from bytestring_splitter import RepeatingBytestringSplitter
|
|
from nkms.network.capabilities import ServerCapability
|
|
|
|
from umbral.fragments import CapsuleFrag
|
|
|
|
|
|
class NuCypherNode(Node):
|
|
|
|
def __init__(self, id, ip=None, port=None, capabilities=None, capabilities_as_strings=[], *args, **kwargs):
|
|
self.id = id
|
|
self.ip = ip
|
|
self.port = port
|
|
self.long_id = int(id.hex(), 16)
|
|
|
|
self.capabilities = capabilities or []
|
|
|
|
for capability_name in capabilities_as_strings:
|
|
self.capabilities.append(ServerCapability.from_name(capability_name))
|
|
|
|
def can_store(self):
|
|
for c in self.capabilities:
|
|
if c.prohibits_storage:
|
|
return False
|
|
return True
|
|
|
|
|
|
class NetworkyStuff(object):
|
|
|
|
class NotEnoughQualifiedUrsulas(Exception):
|
|
pass
|
|
|
|
def find_ursula(self, id, offer=None):
|
|
pass
|
|
|
|
def reencrypt(self, work_order):
|
|
ursula_rest_response = self.send_work_order_payload_to_ursula(work_order)
|
|
cfrags = RepeatingBytestringSplitter((CapsuleFrag, CFRAG_LENGTH))(ursula_rest_response.content)
|
|
work_order.complete(cfrags) # TODO: We'll do verification of Ursula's signature here. #141
|
|
return cfrags
|
|
|
|
def get_competitive_rate(self):
|
|
return NotImplemented
|
|
|
|
def get_treasure_map_from_node(self, node, map_id):
|
|
response = requests.get("{}/treasure_map/{}".format(node.rest_url(), map_id.hex()), verify=False)
|
|
return response
|
|
|
|
def push_treasure_map_to_node(self, node, map_id, map_payload):
|
|
response = requests.post("{}/treasure_map/{}".format(node.rest_url(), map_id.hex()),
|
|
data=map_payload, verify=False)
|
|
return response
|
|
|
|
def send_work_order_payload_to_ursula(self, work_order):
|
|
payload = work_order.payload()
|
|
|
|
hrac_as_hex = work_order.kfrag_hrac.hex()
|
|
return requests.post('{}/kFrag/{}/reencrypt'.format(work_order.ursula.rest_url(), hrac_as_hex),
|
|
payload, verify=False)
|