1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
|
try:
import simplejson as json
except ImportError:
import json # noqa
from u1db import Document
from u1db.remote.http_target import HTTPSyncTarget
from u1db.remote.http_database import HTTPDatabase
import base64
from soledad.util import GPGWrapper
class NoDefaultKey(Exception):
pass
class NoSoledadInstance(Exception):
pass
class LeapDocument(Document):
"""
LEAP Documents are standard u1db documents with cabability of returning an
encrypted version of the document json string as well as setting document
content based on an encrypted version of json string.
"""
def __init__(self, doc_id=None, rev=None, json='{}', has_conflicts=False,
encrypted_json=None, soledad=None):
super(LeapDocument, self).__init__(doc_id, rev, json, has_conflicts)
self._soledad = soledad
if encrypted_json:
self.set_encrypted_json(encrypted_json)
def get_encrypted_json(self):
"""
Returns document's json serialization encrypted with user's public key.
"""
if not self._soledad:
raise NoSoledadInstance()
ciphertext = self._soledad.encrypt_symmetric(self.get_json())
return json.dumps({'_encrypted_json' : ciphertext})
def set_encrypted_json(self, encrypted_json):
"""
Set document's content based on encrypted version of json string.
"""
if not self._soledad:
raise NoSoledadInstance()
ciphertext = json.loads(encrypted_json)['_encrypted_json']
plaintext = self._soledad.decrypt_symmetric(ciphertext)
return self.set_json(plaintext)
class LeapDatabase(HTTPDatabase):
"""Implement the HTTP remote database API to a Leap server."""
def __init__(self, url, document_factory=None, creds=None, soledad=None):
super(LeapDatabase, self).__init__(url, creds=creds)
self._soledad = soledad
self._factory = LeapDocument
@staticmethod
def open_database(url, create):
db = LeapDatabase(url)
db.open(create)
return db
@staticmethod
def delete_database(url):
db = LeapDatabase(url)
db._delete()
db.close()
def get_sync_target(self):
st = LeapSyncTarget(self._url.geturl())
st._creds = self._creds
return st
def create_doc_from_json(self, content, doc_id=None):
if doc_id is None:
doc_id = self._allocate_doc_id()
res, headers = self._request_json('PUT', ['doc', doc_id], {},
content, 'application/json')
new_doc = self._factory(doc_id, res['rev'], content, soledad=self._soledad)
return new_doc
class LeapSyncTarget(HTTPSyncTarget):
def __init__(self, url, creds=None, soledad=None):
super(LeapSyncTarget, self).__init__(url, creds)
self._soledad = soledad
def _parse_sync_stream(self, data, return_doc_cb, ensure_callback=None):
"""
Does the same as parent's method but ensures incoming content will be
decrypted.
"""
parts = data.splitlines() # one at a time
if not parts or parts[0] != '[':
raise BrokenSyncStream
data = parts[1:-1]
comma = False
if data:
line, comma = utils.check_and_strip_comma(data[0])
res = json.loads(line)
if ensure_callback and 'replica_uid' in res:
ensure_callback(res['replica_uid'])
for entry in data[1:]:
if not comma: # missing in between comma
raise BrokenSyncStream
line, comma = utils.check_and_strip_comma(entry)
entry = json.loads(line)
# decrypt after receiving from server.
doc = LeapDocument(entry['id'], entry['rev'],
encrypted_json=entry['content'],
soledad=self._soledad)
return_doc_cb(doc, entry['gen'], entry['trans_id'])
if parts[-1] != ']':
try:
partdic = json.loads(parts[-1])
except ValueError:
pass
else:
if isinstance(partdic, dict):
self._error(partdic)
raise BrokenSyncStream
if not data or comma: # no entries or bad extra comma
raise BrokenSyncStream
return res
def sync_exchange(self, docs_by_generations, source_replica_uid,
last_known_generation, last_known_trans_id,
return_doc_cb, ensure_callback=None):
"""
Does the same as parent's method but encrypts content before syncing.
"""
self._ensure_connection()
if self._trace_hook: # for tests
self._trace_hook('sync_exchange')
url = '%s/sync-from/%s' % (self._url.path, source_replica_uid)
self._conn.putrequest('POST', url)
self._conn.putheader('content-type', 'application/x-u1db-sync-stream')
for header_name, header_value in self._sign_request('POST', url, {}):
self._conn.putheader(header_name, header_value)
entries = ['[']
size = 1
def prepare(**dic):
entry = comma + '\r\n' + json.dumps(dic)
entries.append(entry)
return len(entry)
comma = ''
size += prepare(
last_known_generation=last_known_generation,
last_known_trans_id=last_known_trans_id,
ensure=ensure_callback is not None)
comma = ','
for doc, gen, trans_id in docs_by_generations:
# encrypt before sending to server.
size += prepare(id=doc.doc_id, rev=doc.rev,
content=doc.get_encrypted_json(),
gen=gen, trans_id=trans_id)
entries.append('\r\n]')
size += len(entries[-1])
self._conn.putheader('content-length', str(size))
self._conn.endheaders()
for entry in entries:
self._conn.send(entry)
entries = None
data, _ = self._response()
res = self._parse_sync_stream(data, return_doc_cb, ensure_callback)
data = None
return res['new_generation'], res['new_transaction_id']
|