# Released under the MIT License. See LICENSE for details.#"""Functionality related to verifying ballistica server generated data."""importdatetimefromdataclassesimportdataclassfromtypingimportTYPE_CHECKING,Annotatedfromefro.utilimportutc_nowfromefro.dataclassioimportioprepped,IOAttrsifTYPE_CHECKING:pass
[docs]@ioprepped@dataclassclassSecureDataChecker:"""Verifies data as being signed by our master server."""# Time period this checker is valid for.starttime:datetime.datetimeendtime:datetime.datetime# Current set of public keys.publickeys:list[bytes]
[docs]defcheck(self,data:bytes,signature:bytes)->bool:"""Verify data, returning True if successful. Note that this call imports and uses the cryptography module and can be slow; it generally should be done in a background thread or on a server. """fromcryptography.hazmat.primitives.asymmetricimported25519fromcryptography.exceptionsimportInvalidSignaturenow=utc_now()# Make sure we seem valid based on local time.ifnow<self.starttime:raiseRuntimeError('SecureDataChecker starttime is in the future.')ifnow>self.endtime:raiseRuntimeError('SecureDataChecker endtime is in the past.')# Try our keys from newest to oldest. Most stuff will be using# the newest key so this should be most efficient.forkeyinreversed(self.publickeys):try:publickey=ed25519.Ed25519PublicKey.from_public_bytes(key)publickey.verify(signature,data)returnTrueexceptInvalidSignature:passreturnFalse
# Docs-generation hack; import some stuff that we likely only forward-declared# in our actual source code so that docs tools can find it.fromtypingimport(Coroutine,Any,Literal,Callable,Generator,Awaitable,Sequence,Self)importasynciofromconcurrent.futuresimportFuture