|
|
|
|
@ -7,12 +7,27 @@ package tka |
|
|
|
|
|
|
|
|
|
import ( |
|
|
|
|
"bytes" |
|
|
|
|
"crypto/ed25519" |
|
|
|
|
"errors" |
|
|
|
|
"fmt" |
|
|
|
|
"os" |
|
|
|
|
"sort" |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
// Authority is a Tailnet Key Authority. This type is the main coupling
|
|
|
|
|
// point to the rest of the tailscale client.
|
|
|
|
|
//
|
|
|
|
|
// Authority objects can either be created from an existing, non-empty
|
|
|
|
|
// tailchonk (via tka.Open()), or created from scratch using tka.Bootstrap()
|
|
|
|
|
// or tka.Create().
|
|
|
|
|
type Authority struct { |
|
|
|
|
head AUM |
|
|
|
|
oldestAncestor AUM |
|
|
|
|
state State |
|
|
|
|
|
|
|
|
|
storage Chonk |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// A chain describes a linear sequence of updates from Oldest to Head,
|
|
|
|
|
// resulting in some State at Head.
|
|
|
|
|
type chain struct { |
|
|
|
|
@ -336,3 +351,195 @@ func computeActiveChain(storage Chonk, lastKnownOldest *AUMHash, maxIter int) (c |
|
|
|
|
} |
|
|
|
|
return out, nil |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// aumVerify verifies if an AUM is well-formed, correctly signed, and
|
|
|
|
|
// can be accepted for storage.
|
|
|
|
|
func aumVerify(aum AUM, state State, isGenesisAUM bool) error { |
|
|
|
|
if err := aum.StaticValidate(); err != nil { |
|
|
|
|
return fmt.Errorf("invalid: %v", err) |
|
|
|
|
} |
|
|
|
|
if !isGenesisAUM { |
|
|
|
|
if err := checkParent(aum, state); err != nil { |
|
|
|
|
return err |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
if len(aum.Signatures) == 0 { |
|
|
|
|
return errors.New("unsigned AUM") |
|
|
|
|
} |
|
|
|
|
sigHash := aum.SigHash() |
|
|
|
|
for i, sig := range aum.Signatures { |
|
|
|
|
key, err := state.GetKey(sig.KeyID) |
|
|
|
|
if err != nil { |
|
|
|
|
return fmt.Errorf("bad keyID on signature %d: %v", i, err) |
|
|
|
|
} |
|
|
|
|
if err := sig.Verify(sigHash, key); err != nil { |
|
|
|
|
return fmt.Errorf("signature %d: %v", i, err) |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
return nil |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
func checkParent(aum AUM, state State) error { |
|
|
|
|
parent, hasParent := aum.Parent() |
|
|
|
|
if !hasParent { |
|
|
|
|
return errors.New("aum has no parent") |
|
|
|
|
} |
|
|
|
|
if state.LastAUMHash == nil { |
|
|
|
|
return errors.New("cannot check update parent hash against a state with no previous AUM") |
|
|
|
|
} |
|
|
|
|
if *state.LastAUMHash != parent { |
|
|
|
|
return fmt.Errorf("aum with parent %x cannot be applied to a state with parent %x", state.LastAUMHash, parent) |
|
|
|
|
} |
|
|
|
|
return nil |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Head returns the AUM digest of the latest update applied to the state
|
|
|
|
|
// machine.
|
|
|
|
|
func (a *Authority) Head() AUMHash { |
|
|
|
|
return *a.state.LastAUMHash |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Open initializes an existing TKA from the given tailchonk.
|
|
|
|
|
//
|
|
|
|
|
// Only use this if the current node has initialized an Authority before.
|
|
|
|
|
// If a TKA exists on other nodes but theres nothing locally, use Bootstrap().
|
|
|
|
|
// If no TKA exists anywhere and you are creating it for the first
|
|
|
|
|
// time, use New().
|
|
|
|
|
func Open(storage Chonk) (*Authority, error) { |
|
|
|
|
a, err := storage.LastActiveAncestor() |
|
|
|
|
if err != nil { |
|
|
|
|
return nil, fmt.Errorf("reading last ancestor: %v", err) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
c, err := computeActiveChain(storage, a, 2000) |
|
|
|
|
if err != nil { |
|
|
|
|
return nil, fmt.Errorf("active chain: %v", err) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
return &Authority{ |
|
|
|
|
head: c.Head, |
|
|
|
|
oldestAncestor: c.Oldest, |
|
|
|
|
storage: storage, |
|
|
|
|
state: c.state, |
|
|
|
|
}, nil |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Create initializes a brand-new TKA, generating a genesis update
|
|
|
|
|
// and committing it to the given storage.
|
|
|
|
|
//
|
|
|
|
|
// The given signer must also be present in state as a trusted key.
|
|
|
|
|
//
|
|
|
|
|
// Do not use this to initialize a TKA that already exists, use Open()
|
|
|
|
|
// or Bootstrap() instead.
|
|
|
|
|
func Create(storage Chonk, state State, signer ed25519.PrivateKey) (*Authority, AUM, error) { |
|
|
|
|
// Generate & sign a checkpoint, our genesis update.
|
|
|
|
|
genesis := AUM{ |
|
|
|
|
MessageKind: AUMCheckpoint, |
|
|
|
|
State: &state, |
|
|
|
|
} |
|
|
|
|
if err := genesis.StaticValidate(); err != nil { |
|
|
|
|
// This serves as an easy way to validate the given state.
|
|
|
|
|
return nil, AUM{}, fmt.Errorf("invalid state: %v", err) |
|
|
|
|
} |
|
|
|
|
genesis.sign25519(signer) |
|
|
|
|
|
|
|
|
|
a, err := Bootstrap(storage, genesis) |
|
|
|
|
return a, genesis, err |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Bootstrap initializes a TKA based on the given checkpoint.
|
|
|
|
|
//
|
|
|
|
|
// Call this when setting up a new nodes' TKA, but other nodes
|
|
|
|
|
// with initialized TKA's exist.
|
|
|
|
|
//
|
|
|
|
|
// Pass the returned genesis AUM from Create(), or a later checkpoint AUM.
|
|
|
|
|
//
|
|
|
|
|
// TODO(tom): We should test an authority bootstrapped from a later checkpoint
|
|
|
|
|
// works fine with sync and everything.
|
|
|
|
|
func Bootstrap(storage Chonk, bootstrap AUM) (*Authority, error) { |
|
|
|
|
heads, err := storage.Heads() |
|
|
|
|
if err != nil { |
|
|
|
|
return nil, fmt.Errorf("reading heads: %v", err) |
|
|
|
|
} |
|
|
|
|
if len(heads) != 0 { |
|
|
|
|
return nil, errors.New("tailchonk is not empty") |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Check the AUM is well-formed.
|
|
|
|
|
if bootstrap.MessageKind != AUMCheckpoint { |
|
|
|
|
return nil, fmt.Errorf("bootstrap AUMs must be checkpoint messages, got %v", bootstrap.MessageKind) |
|
|
|
|
} |
|
|
|
|
if bootstrap.State == nil { |
|
|
|
|
return nil, errors.New("bootstrap AUM is missing state") |
|
|
|
|
} |
|
|
|
|
if err := aumVerify(bootstrap, *bootstrap.State, true); err != nil { |
|
|
|
|
return nil, fmt.Errorf("invalid bootstrap: %v", err) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Everything looks good, write it to storage.
|
|
|
|
|
if err := storage.CommitVerifiedAUMs([]AUM{bootstrap}); err != nil { |
|
|
|
|
return nil, fmt.Errorf("commit: %v", err) |
|
|
|
|
} |
|
|
|
|
if err := storage.SetLastActiveAncestor(bootstrap.Hash()); err != nil { |
|
|
|
|
return nil, fmt.Errorf("set ancestor: %v", err) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
return Open(storage) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Inform is called to tell the authority about new updates. Updates
|
|
|
|
|
// should be ordered oldest to newest. An error is returned if any
|
|
|
|
|
// of the updates could not be processed.
|
|
|
|
|
func (a *Authority) Inform(updates []AUM) error { |
|
|
|
|
stateAt := make(map[AUMHash]State, len(updates)+1) |
|
|
|
|
toCommit := make([]AUM, 0, len(updates)) |
|
|
|
|
|
|
|
|
|
for i, update := range updates { |
|
|
|
|
hash := update.Hash() |
|
|
|
|
if _, err := a.storage.AUM(hash); err == nil { |
|
|
|
|
// Already have this AUM.
|
|
|
|
|
continue |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
parent, hasParent := update.Parent() |
|
|
|
|
if !hasParent { |
|
|
|
|
return fmt.Errorf("update %d: missing parent", i) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
state, hasState := stateAt[parent] |
|
|
|
|
var err error |
|
|
|
|
if !hasState { |
|
|
|
|
if state, err = computeStateAt(a.storage, 2000, parent); err != nil { |
|
|
|
|
return fmt.Errorf("update %d computing state: %v", i, err) |
|
|
|
|
} |
|
|
|
|
stateAt[parent] = state |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
if err := aumVerify(update, state, false); err != nil { |
|
|
|
|
return fmt.Errorf("update %d invalid: %v", i, err) |
|
|
|
|
} |
|
|
|
|
if stateAt[hash], err = state.applyVerifiedAUM(update); err != nil { |
|
|
|
|
return fmt.Errorf("update %d cannot be applied: %v", i, err) |
|
|
|
|
} |
|
|
|
|
toCommit = append(toCommit, update) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
if err := a.storage.CommitVerifiedAUMs(toCommit); err != nil { |
|
|
|
|
return fmt.Errorf("commit: %v", err) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// TODO(tom): Theres no need to recompute the state from scratch
|
|
|
|
|
// in every case. We should detect when updates were
|
|
|
|
|
// a linear, non-forking series applied to head, and
|
|
|
|
|
// just use the last State we computed.
|
|
|
|
|
oldestAncestor := a.oldestAncestor.Hash() |
|
|
|
|
c, err := computeActiveChain(a.storage, &oldestAncestor, 2000) |
|
|
|
|
if err != nil { |
|
|
|
|
return fmt.Errorf("recomputing active chain: %v", err) |
|
|
|
|
} |
|
|
|
|
a.head = c.Head |
|
|
|
|
a.oldestAncestor = c.Oldest |
|
|
|
|
a.state = c.state |
|
|
|
|
return nil |
|
|
|
|
} |
|
|
|
|
|