koi-net 1.0.0b19__py3-none-any.whl → 1.1.0b2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of koi-net might be problematic. Click here for more details.

@@ -0,0 +1,220 @@
1
+ import logging
2
+ from typing import Callable
3
+ from rid_lib.core import RIDType
4
+ from rid_lib.types import KoiNetEdge, KoiNetNode
5
+ from rid_lib.ext import Cache
6
+ from ..protocol.event import EventType
7
+ from ..network.request_handler import RequestHandler
8
+ from ..network.event_queue import NetworkEventQueue
9
+ from ..network.graph import NetworkGraph
10
+ from ..identity import NodeIdentity
11
+ from .handler import (
12
+ KnowledgeHandler,
13
+ HandlerType,
14
+ STOP_CHAIN,
15
+ StopChain
16
+ )
17
+ from .knowledge_object import KnowledgeObject
18
+
19
+ from typing import TYPE_CHECKING
20
+ if TYPE_CHECKING:
21
+ from ..context import HandlerContext
22
+
23
+ logger = logging.getLogger(__name__)
24
+
25
+
26
+ class KnowledgePipeline:
27
+ handler_context: "HandlerContext"
28
+ cache: Cache
29
+ identity: NodeIdentity
30
+ request_handler: RequestHandler
31
+ event_queue: NetworkEventQueue
32
+ graph: NetworkGraph
33
+ handlers: list[KnowledgeHandler]
34
+
35
+ def __init__(
36
+ self,
37
+ handler_context: "HandlerContext",
38
+ cache: Cache,
39
+ request_handler: RequestHandler,
40
+ event_queue: NetworkEventQueue,
41
+ graph: NetworkGraph,
42
+ default_handlers: list[KnowledgeHandler] = []
43
+ ):
44
+ self.handler_context = handler_context
45
+ self.cache = cache
46
+ self.request_handler = request_handler
47
+ self.event_queue = event_queue
48
+ self.graph = graph
49
+ self.handlers = default_handlers
50
+
51
+ def add_handler(self, handler: KnowledgeHandler):
52
+ self.handlers.append(handler)
53
+
54
+ def register_handler(
55
+ self,
56
+ handler_type: HandlerType,
57
+ rid_types: list[RIDType] | None = None,
58
+ event_types: list[EventType | None] | None = None
59
+ ):
60
+ """Assigns decorated function as handler for this processor."""
61
+ def decorator(func: Callable) -> Callable:
62
+ handler = KnowledgeHandler(func, handler_type, rid_types, event_types)
63
+ self.add_handler(handler)
64
+ return func
65
+ return decorator
66
+
67
+ def call_handler_chain(
68
+ self,
69
+ handler_type: HandlerType,
70
+ kobj: KnowledgeObject
71
+ ) -> KnowledgeObject | StopChain:
72
+ """Calls handlers of provided type, chaining their inputs and outputs together.
73
+
74
+ The knowledge object provided when this function is called will be passed to the first handler. A handler may return one of three types:
75
+ - `KnowledgeObject` - to modify the knowledge object for the next handler in the chain
76
+ - `None` - to keep the same knowledge object for the next handler in the chain
77
+ - `STOP_CHAIN` - to stop the handler chain and immediately exit the processing pipeline
78
+
79
+ Handlers will only be called in the chain if their handler and RID type match that of the inputted knowledge object.
80
+ """
81
+
82
+ for handler in self.handlers:
83
+ if handler_type != handler.handler_type:
84
+ continue
85
+
86
+ if handler.rid_types and type(kobj.rid) not in handler.rid_types:
87
+ continue
88
+
89
+ if handler.event_types and kobj.event_type not in handler.event_types:
90
+ continue
91
+
92
+ logger.debug(f"Calling {handler_type} handler '{handler.func.__name__}'")
93
+
94
+ resp = handler.func(
95
+ ctx=self.handler_context,
96
+ kobj=kobj.model_copy()
97
+ )
98
+
99
+ # stops handler chain execution
100
+ if resp is STOP_CHAIN:
101
+ logger.debug(f"Handler chain stopped by {handler.func.__name__}")
102
+ return STOP_CHAIN
103
+ # kobj unmodified
104
+ elif resp is None:
105
+ continue
106
+ # kobj modified by handler
107
+ elif isinstance(resp, KnowledgeObject):
108
+ kobj = resp
109
+ logger.debug(f"Knowledge object modified by {handler.func.__name__}")
110
+ else:
111
+ raise ValueError(f"Handler {handler.func.__name__} returned invalid response '{resp}'")
112
+
113
+ return kobj
114
+
115
+ def process(self, kobj: KnowledgeObject):
116
+ """Sends provided knowledge obejct through knowledge processing pipeline.
117
+
118
+ Handler chains are called in between major events in the pipeline, indicated by their handler type. Each handler type is guaranteed to have access to certain knowledge, and may affect a subsequent action in the pipeline. The five handler types are as follows:
119
+ - RID - provided RID; if event type is `FORGET`, this handler decides whether to delete the knowledge from the cache by setting the normalized event type to `FORGET`, otherwise this handler decides whether to validate the manifest (and fetch it if not provided).
120
+ - Manifest - provided RID, manifest; decides whether to validate the bundle (and fetch it if not provided).
121
+ - Bundle - provided RID, manifest, contents (bundle); decides whether to write knowledge to the cache by setting the normalized event type to `NEW` or `UPDATE`.
122
+ - Network - provided RID, manifest, contents (bundle); decides which nodes (if any) to broadcast an event about this knowledge to. (Note, if event type is `FORGET`, the manifest and contents will be retrieved from the local cache, and indicate the last state of the knowledge before it was deleted.)
123
+ - Final - provided RID, manifests, contents (bundle); final action taken after network broadcast.
124
+
125
+ The pipeline may be stopped by any point by a single handler returning the `STOP_CHAIN` sentinel. In that case, the process will exit immediately. Further handlers of that type and later handler chains will not be called.
126
+ """
127
+
128
+ logger.debug(f"Handling {kobj!r}")
129
+ kobj = self.call_handler_chain(HandlerType.RID, kobj)
130
+ if kobj is STOP_CHAIN: return
131
+
132
+ if kobj.event_type == EventType.FORGET:
133
+ bundle = self.cache.read(kobj.rid)
134
+ if not bundle:
135
+ logger.debug("Local bundle not found")
136
+ return
137
+
138
+ # the bundle (to be deleted) attached to kobj for downstream analysis
139
+ logger.debug("Adding local bundle (to be deleted) to knowledge object")
140
+ kobj.manifest = bundle.manifest
141
+ kobj.contents = bundle.contents
142
+
143
+ else:
144
+ # attempt to retrieve manifest
145
+ if not kobj.manifest:
146
+ logger.debug("Manifest not found")
147
+ if not kobj.source:
148
+ return
149
+
150
+ logger.debug("Attempting to fetch remote manifest from source")
151
+ payload = self.request_handler.fetch_manifests(
152
+ node=kobj.source,
153
+ rids=[kobj.rid]
154
+ )
155
+
156
+ if not payload.manifests:
157
+ logger.debug("Failed to find manifest")
158
+ return
159
+
160
+ kobj.manifest = payload.manifests[0]
161
+
162
+ kobj = self.call_handler_chain(HandlerType.Manifest, kobj)
163
+ if kobj is STOP_CHAIN: return
164
+
165
+ # attempt to retrieve bundle
166
+ if not kobj.bundle:
167
+ logger.debug("Bundle not found")
168
+ if kobj.source is None:
169
+ return
170
+
171
+ logger.debug("Attempting to fetch remote bundle from source")
172
+ payload = self.request_handler.fetch_bundles(
173
+ node=kobj.source,
174
+ rids=[kobj.rid]
175
+ )
176
+
177
+ if not payload.bundles:
178
+ logger.debug("Failed to find bundle")
179
+ return
180
+
181
+ bundle = payload.bundles[0]
182
+
183
+ if kobj.manifest != bundle.manifest:
184
+ logger.warning("Retrieved bundle contains a different manifest")
185
+
186
+ kobj.manifest = bundle.manifest
187
+ kobj.contents = bundle.contents
188
+
189
+ kobj = self.call_handler_chain(HandlerType.Bundle, kobj)
190
+ if kobj is STOP_CHAIN: return
191
+
192
+ if kobj.normalized_event_type in (EventType.UPDATE, EventType.NEW):
193
+ logger.info(f"Writing to cache: {kobj!r}")
194
+ self.cache.write(kobj.bundle)
195
+
196
+ elif kobj.normalized_event_type == EventType.FORGET:
197
+ logger.info(f"Deleting from cache: {kobj!r}")
198
+ self.cache.delete(kobj.rid)
199
+
200
+ else:
201
+ logger.debug("Normalized event type was never set, no cache or network operations will occur")
202
+ return
203
+
204
+ if type(kobj.rid) in (KoiNetNode, KoiNetEdge):
205
+ logger.debug("Change to node or edge, regenerating network graph")
206
+ self.graph.generate()
207
+
208
+ kobj = self.call_handler_chain(HandlerType.Network, kobj)
209
+ if kobj is STOP_CHAIN: return
210
+
211
+ if kobj.network_targets:
212
+ logger.debug(f"Broadcasting event to {len(kobj.network_targets)} network target(s)")
213
+ else:
214
+ logger.debug("No network targets set")
215
+
216
+ for node in kobj.network_targets:
217
+ self.event_queue.push_event_to(kobj.normalized_event, node)
218
+ self.event_queue.flush_webhook_queue(node)
219
+
220
+ kobj = self.call_handler_chain(HandlerType.Final, kobj)
@@ -4,6 +4,7 @@ from pydantic import BaseModel
4
4
  from rid_lib import RID, RIDType
5
5
  from rid_lib.ext import Bundle, Manifest
6
6
  from .event import Event
7
+ from .errors import ErrorTypes
7
8
 
8
9
 
9
10
  # REQUEST MODELS
@@ -41,7 +42,12 @@ class EventsPayload(BaseModel):
41
42
  events: list[Event]
42
43
 
43
44
 
45
+ # ERROR MODELS
46
+
47
+ class ErrorResponse(BaseModel):
48
+ error: ErrorTypes
49
+
44
50
  # TYPES
45
51
 
46
52
  type RequestModels = EventsPayload | PollEvents | FetchRids | FetchManifests | FetchBundles
47
- type ResponseModels = RidsPayload | ManifestsPayload | BundlesPayload | EventsPayload
53
+ type ResponseModels = RidsPayload | ManifestsPayload | BundlesPayload | EventsPayload | ErrorResponse
koi_net/protocol/edge.py CHANGED
@@ -1,7 +1,8 @@
1
1
  from enum import StrEnum
2
2
  from pydantic import BaseModel
3
3
  from rid_lib import RIDType
4
- from rid_lib.types import KoiNetNode
4
+ from rid_lib.ext.bundle import Bundle
5
+ from rid_lib.types import KoiNetEdge, KoiNetNode
5
6
 
6
7
 
7
8
  class EdgeStatus(StrEnum):
@@ -18,3 +19,24 @@ class EdgeProfile(BaseModel):
18
19
  edge_type: EdgeType
19
20
  status: EdgeStatus
20
21
  rid_types: list[RIDType]
22
+
23
+
24
+ def generate_edge_bundle(
25
+ source: KoiNetNode,
26
+ target: KoiNetNode,
27
+ rid_types: list[RIDType],
28
+ edge_type: EdgeType
29
+ ) -> Bundle:
30
+ edge_rid = KoiNetEdge.generate(source, target)
31
+ edge_profile = EdgeProfile(
32
+ source=source,
33
+ target=target,
34
+ rid_types=rid_types,
35
+ edge_type=edge_type,
36
+ status=EdgeStatus.PROPOSED
37
+ )
38
+ edge_bundle = Bundle.generate(
39
+ edge_rid,
40
+ edge_profile.model_dump()
41
+ )
42
+ return edge_bundle
@@ -0,0 +1,54 @@
1
+ import logging
2
+ from typing import Generic, TypeVar
3
+ from pydantic import BaseModel
4
+ from rid_lib.types import KoiNetNode
5
+
6
+ from .secure import PrivateKey, PublicKey
7
+ from .api_models import RequestModels, ResponseModels
8
+
9
+
10
+ logger = logging.getLogger(__name__)
11
+
12
+
13
+ T = TypeVar("T", bound=RequestModels | ResponseModels)
14
+
15
+ class SignedEnvelope(BaseModel, Generic[T]):
16
+ payload: T
17
+ source_node: KoiNetNode
18
+ target_node: KoiNetNode
19
+ signature: str
20
+
21
+ def verify_with(self, pub_key: PublicKey):
22
+ # IMPORTANT: calling `model_dump()` loses all typing! when converting between SignedEnvelope and UnsignedEnvelope, use the Pydantic classes, not the dictionary form
23
+ unsigned_envelope = UnsignedEnvelope[T](
24
+ payload=self.payload,
25
+ source_node=self.source_node,
26
+ target_node=self.target_node
27
+ )
28
+
29
+ logger.debug(f"Verifying envelope: {unsigned_envelope.model_dump_json()}")
30
+
31
+ pub_key.verify(
32
+ self.signature,
33
+ unsigned_envelope.model_dump_json().encode()
34
+ )
35
+
36
+ class UnsignedEnvelope(BaseModel, Generic[T]):
37
+ payload: T
38
+ source_node: KoiNetNode
39
+ target_node: KoiNetNode
40
+
41
+ def sign_with(self, priv_key: PrivateKey) -> SignedEnvelope[T]:
42
+ logger.debug(f"Signing envelope: {self.model_dump_json()}")
43
+ logger.debug(f"Type: [{type(self.payload)}]")
44
+
45
+ signature = priv_key.sign(
46
+ self.model_dump_json().encode()
47
+ )
48
+
49
+ return SignedEnvelope(
50
+ payload=self.payload,
51
+ source_node=self.source_node,
52
+ target_node=self.target_node,
53
+ signature=signature
54
+ )
@@ -0,0 +1,23 @@
1
+ from enum import StrEnum
2
+
3
+
4
+ class ErrorTypes(StrEnum):
5
+ UnknownNode = "unknown_node"
6
+ InvalidKey = "invalid_key"
7
+ InvalidSignature = "invalid_signature"
8
+ InvalidTarget = "invalid_target"
9
+
10
+ class ProtocolError(Exception):
11
+ error_type: ErrorTypes
12
+
13
+ class UnknownNodeError(ProtocolError):
14
+ error_type = ErrorTypes.UnknownNode
15
+
16
+ class InvalidKeyError(ProtocolError):
17
+ error_type = ErrorTypes.InvalidKey
18
+
19
+ class InvalidSignatureError(ProtocolError):
20
+ error_type = ErrorTypes.InvalidSignature
21
+
22
+ class InvalidTargetError(ProtocolError):
23
+ error_type = ErrorTypes.InvalidTarget
koi_net/protocol/node.py CHANGED
@@ -14,4 +14,5 @@ class NodeProvides(BaseModel):
14
14
  class NodeProfile(BaseModel):
15
15
  base_url: str | None = None
16
16
  node_type: NodeType
17
- provides: NodeProvides = NodeProvides()
17
+ provides: NodeProvides = NodeProvides()
18
+ public_key: str | None = None
@@ -0,0 +1,106 @@
1
+ import logging
2
+ from base64 import urlsafe_b64decode, urlsafe_b64encode
3
+ from cryptography.hazmat.primitives import hashes
4
+ from cryptography.hazmat.primitives.asymmetric import ec
5
+ from cryptography.hazmat.primitives import serialization
6
+ from rid_lib.ext.utils import sha256_hash
7
+
8
+ logger = logging.getLogger(__name__)
9
+
10
+
11
+ class PrivateKey:
12
+ priv_key: ec.EllipticCurvePrivateKey
13
+
14
+ def __init__(self, priv_key):
15
+ self.priv_key = priv_key
16
+
17
+ @classmethod
18
+ def generate(cls):
19
+ return cls(priv_key=ec.generate_private_key(ec.SECP192R1()))
20
+
21
+ def public_key(self) -> "PublicKey":
22
+ return PublicKey(self.priv_key.public_key())
23
+
24
+ @classmethod
25
+ def from_pem(cls, priv_key_pem: str, password: str):
26
+ return cls(
27
+ priv_key=serialization.load_pem_private_key(
28
+ data=priv_key_pem.encode(),
29
+ password=password.encode()
30
+ )
31
+ )
32
+
33
+ def to_pem(self, password: str) -> str:
34
+ return self.priv_key.private_bytes(
35
+ encoding=serialization.Encoding.PEM,
36
+ format=serialization.PrivateFormat.PKCS8,
37
+ encryption_algorithm=serialization.BestAvailableEncryption(password.encode())
38
+ ).decode()
39
+
40
+ def sign(self, message: bytes) -> str:
41
+ hashed_message = sha256_hash(message.decode())
42
+
43
+ signature = urlsafe_b64encode(
44
+ self.priv_key.sign(
45
+ data=message,
46
+ signature_algorithm=ec.ECDSA(hashes.SHA256())
47
+ )
48
+ ).decode()
49
+
50
+ logger.debug(f"Signing message with [{self.public_key().to_der()}]")
51
+ logger.debug(f"hash: {hashed_message}")
52
+ logger.debug(f"signature: {signature}")
53
+
54
+ return signature
55
+
56
+
57
+ class PublicKey:
58
+ pub_key: ec.EllipticCurvePublicKey
59
+
60
+ def __init__(self, pub_key):
61
+ self.pub_key = pub_key
62
+
63
+ @classmethod
64
+ def from_pem(cls, pub_key_pem: str):
65
+ return cls(
66
+ pub_key=serialization.load_pem_public_key(
67
+ data=pub_key_pem.encode()
68
+ )
69
+ )
70
+
71
+ def to_pem(self) -> str:
72
+ return self.pub_key.public_bytes(
73
+ encoding=serialization.Encoding.PEM,
74
+ format=serialization.PublicFormat.SubjectPublicKeyInfo
75
+ ).decode()
76
+
77
+ @classmethod
78
+ def from_der(cls, pub_key_der: str):
79
+ return cls(
80
+ pub_key=serialization.load_der_public_key(
81
+ data=urlsafe_b64decode(pub_key_der)
82
+ )
83
+ )
84
+
85
+ def to_der(self) -> str:
86
+ return urlsafe_b64encode(
87
+ self.pub_key.public_bytes(
88
+ encoding=serialization.Encoding.DER,
89
+ format=serialization.PublicFormat.SubjectPublicKeyInfo
90
+ )
91
+ ).decode()
92
+
93
+ def verify(self, signature: str, message: bytes) -> bool:
94
+ hashed_message = sha256_hash(message.decode())
95
+
96
+ logger.debug(f"Verifying message with [{self.to_der()}]")
97
+ logger.debug(f"hash: {hashed_message}")
98
+ logger.debug(f"signature: {signature}")
99
+
100
+ # NOTE: throws cryptography.exceptions.InvalidSignature on failure
101
+
102
+ self.pub_key.verify(
103
+ signature=urlsafe_b64decode(signature),
104
+ data=message,
105
+ signature_algorithm=ec.ECDSA(hashes.SHA256())
106
+ )
koi_net/secure.py ADDED
@@ -0,0 +1,117 @@
1
+ import logging
2
+ from functools import wraps
3
+
4
+ import cryptography.exceptions
5
+ from rid_lib.ext import Bundle
6
+ from rid_lib.ext.utils import sha256_hash
7
+ from .identity import NodeIdentity
8
+ from .protocol.envelope import UnsignedEnvelope, SignedEnvelope
9
+ from .protocol.secure import PublicKey
10
+ from .protocol.api_models import EventsPayload
11
+ from .protocol.event import EventType
12
+ from .protocol.node import NodeProfile
13
+ from .protocol.secure import PrivateKey
14
+ from .protocol.errors import (
15
+ UnknownNodeError,
16
+ InvalidKeyError,
17
+ InvalidSignatureError,
18
+ InvalidTargetError
19
+ )
20
+ from .effector import Effector
21
+ from .config import NodeConfig
22
+
23
+ logger = logging.getLogger(__name__)
24
+
25
+
26
+ class Secure:
27
+ identity: NodeIdentity
28
+ effector: Effector
29
+ config: NodeConfig
30
+ priv_key: PrivateKey
31
+
32
+ def __init__(
33
+ self,
34
+ identity: NodeIdentity,
35
+ effector: Effector,
36
+ config: NodeConfig
37
+ ):
38
+ self.identity = identity
39
+ self.effector = effector
40
+ self.config = config
41
+
42
+ self.priv_key = self._load_priv_key()
43
+
44
+ def _load_priv_key(self) -> PrivateKey:
45
+ with open(self.config.koi_net.private_key_pem_path, "r") as f:
46
+ priv_key_pem = f.read()
47
+
48
+ return PrivateKey.from_pem(
49
+ priv_key_pem=priv_key_pem,
50
+ password=self.config.env.priv_key_password
51
+ )
52
+
53
+ def _handle_unknown_node(self, envelope: SignedEnvelope) -> Bundle | None:
54
+ if type(envelope.payload) != EventsPayload:
55
+ return None
56
+
57
+ for event in envelope.payload.events:
58
+ # must be NEW event for bundle of source node's profile
59
+ if event.rid != envelope.source_node:
60
+ continue
61
+ if event.event_type != EventType.NEW:
62
+ continue
63
+
64
+ return event.bundle
65
+ return None
66
+
67
+ def create_envelope(self, payload, target) -> SignedEnvelope:
68
+ return UnsignedEnvelope(
69
+ payload=payload,
70
+ source_node=self.identity.rid,
71
+ target_node=target
72
+ ).sign_with(self.priv_key)
73
+
74
+ def validate_envelope(self, envelope: SignedEnvelope):
75
+ node_bundle = (
76
+ self.effector.deref(envelope.source_node) or
77
+ self._handle_unknown_node(envelope)
78
+ )
79
+
80
+ if not node_bundle:
81
+ raise UnknownNodeError(f"Couldn't resolve {envelope.source_node}")
82
+
83
+ node_profile = node_bundle.validate_contents(NodeProfile)
84
+
85
+ # check that public key matches source node RID
86
+ if envelope.source_node.hash != sha256_hash(node_profile.public_key):
87
+ raise InvalidKeyError("Invalid public key on new node!")
88
+
89
+ # check envelope signed by validated public key
90
+ pub_key = PublicKey.from_der(node_profile.public_key)
91
+ try:
92
+ envelope.verify_with(pub_key)
93
+ except cryptography.exceptions.InvalidSignature as err:
94
+ raise InvalidSignatureError(f"Signature {envelope.signature} is invalid.")
95
+
96
+ # check that this node is the target of the envelope
97
+ if envelope.target_node != self.identity.rid:
98
+ raise InvalidTargetError(f"Envelope target {envelope.target_node!r} is not me")
99
+
100
+ def envelope_handler(self, func):
101
+ @wraps(func)
102
+ async def wrapper(req: SignedEnvelope, *args, **kwargs) -> SignedEnvelope | None:
103
+ logger.info("Validating envelope")
104
+
105
+ self.validate_envelope(req)
106
+ logger.info("Calling endpoint handler")
107
+
108
+ result = await func(req, *args, **kwargs)
109
+
110
+ if result is not None:
111
+ logger.info("Creating response envelope")
112
+ return self.create_envelope(
113
+ payload=result,
114
+ target=req.source_node
115
+ )
116
+ return wrapper
117
+