diff options
author | Dan Klein <danklei@cisco.com> | 2015-08-24 13:22:48 +0300 |
---|---|---|
committer | Dan Klein <danklei@cisco.com> | 2015-08-24 13:22:48 +0300 |
commit | dab741a80699f86e86c91718872a052cca9bbb25 (patch) | |
tree | 1959c4a2cea440170a5113dcb067796cb20ffb64 /external_libs/python/pyzmq-14.7.0/examples/security/ioloop-ironhouse.py | |
parent | d3f26ece7d4383df0b22fe9c3cb3e695381ec737 (diff) |
Fixed dependencies of Control Plane to use external_lib sources
Diffstat (limited to 'external_libs/python/pyzmq-14.7.0/examples/security/ioloop-ironhouse.py')
-rw-r--r-- | external_libs/python/pyzmq-14.7.0/examples/security/ioloop-ironhouse.py | 116 |
1 files changed, 116 insertions, 0 deletions
diff --git a/external_libs/python/pyzmq-14.7.0/examples/security/ioloop-ironhouse.py b/external_libs/python/pyzmq-14.7.0/examples/security/ioloop-ironhouse.py new file mode 100644 index 00000000..fbde3062 --- /dev/null +++ b/external_libs/python/pyzmq-14.7.0/examples/security/ioloop-ironhouse.py @@ -0,0 +1,116 @@ +#!/usr/bin/env python + +''' +Ironhouse extends Stonehouse with client public key authentication. + +This is the strongest security model we have today, protecting against every +attack we know about, except end-point attacks (where an attacker plants +spyware on a machine to capture data before it's encrypted, or after it's +decrypted). + +This example demonstrates using the IOLoopAuthenticator. + +Author: Chris Laws +''' + +import logging +import os +import sys + +import zmq +import zmq.auth +from zmq.auth.ioloop import IOLoopAuthenticator +from zmq.eventloop import ioloop, zmqstream + +def echo(server, msg): + logging.debug("server recvd %s", msg) + reply = msg + [b'World'] + logging.debug("server sending %s", reply) + server.send_multipart(reply) + +def setup_server(server_secret_file, endpoint='tcp://127.0.0.1:9000'): + """setup a simple echo server with CURVE auth""" + server = zmq.Context.instance().socket(zmq.ROUTER) + + server_public, server_secret = zmq.auth.load_certificate(server_secret_file) + server.curve_secretkey = server_secret + server.curve_publickey = server_public + server.curve_server = True # must come before bind + server.bind(endpoint) + + server_stream = zmqstream.ZMQStream(server) + # simple echo + server_stream.on_recv_stream(echo) + return server_stream + +def client_msg_recvd(msg): + logging.debug("client recvd %s", msg) + logging.info("Ironhouse test OK") + # stop the loop when we get the reply + ioloop.IOLoop.instance().stop() + +def setup_client(client_secret_file, server_public_file, endpoint='tcp://127.0.0.1:9000'): + """setup a simple client with CURVE auth""" + + client = zmq.Context.instance().socket(zmq.DEALER) + + # We need two certificates, one for the client and one for + # the server. The client must know the server's public key + # to make a CURVE connection. + client_public, client_secret = zmq.auth.load_certificate(client_secret_file) + client.curve_secretkey = client_secret + client.curve_publickey = client_public + + server_public, _ = zmq.auth.load_certificate(server_public_file) + # The client must know the server's public key to make a CURVE connection. + client.curve_serverkey = server_public + client.connect(endpoint) + + client_stream = zmqstream.ZMQStream(client) + client_stream.on_recv(client_msg_recvd) + return client_stream + + +def run(): + '''Run Ironhouse example''' + + # These direcotries are generated by the generate_certificates script + base_dir = os.path.dirname(__file__) + keys_dir = os.path.join(base_dir, 'certificates') + public_keys_dir = os.path.join(base_dir, 'public_keys') + secret_keys_dir = os.path.join(base_dir, 'private_keys') + + if not (os.path.exists(keys_dir) and + os.path.exists(public_keys_dir) and + os.path.exists(secret_keys_dir)): + logging.critical("Certificates are missing - run generate_certificates script first") + sys.exit(1) + + # Start an authenticator for this context. + auth = IOLoopAuthenticator() + auth.allow('127.0.0.1') + # Tell authenticator to use the certificate in a directory + auth.configure_curve(domain='*', location=public_keys_dir) + + server_secret_file = os.path.join(secret_keys_dir, "server.key_secret") + server = setup_server(server_secret_file) + server_public_file = os.path.join(public_keys_dir, "server.key") + client_secret_file = os.path.join(secret_keys_dir, "client.key_secret") + client = setup_client(client_secret_file, server_public_file) + client.send(b'Hello') + + auth.start() + ioloop.IOLoop.instance().start() + +if __name__ == '__main__': + if zmq.zmq_version_info() < (4,0): + raise RuntimeError("Security is not supported in libzmq version < 4.0. libzmq version {0}".format(zmq.zmq_version())) + + if '-v' in sys.argv: + level = logging.DEBUG + else: + level = logging.INFO + + logging.basicConfig(level=level, format="[%(levelname)s] %(message)s") + + run() |