fastapi-dls/app/main.py

864 lines
34 KiB
Python
Raw Normal View History

import logging
from base64 import b64encode as b64enc
2024-06-13 21:18:18 +03:00
from calendar import timegm
from contextlib import asynccontextmanager
from datetime import datetime, timedelta, UTC
2022-12-16 15:51:14 +03:00
from hashlib import sha256
2024-06-13 21:18:18 +03:00
from json import loads as json_loads
2022-12-28 13:53:56 +03:00
from os import getenv as env
2025-04-10 22:38:25 +03:00
from os.path import join, dirname, isfile
2025-04-14 11:48:43 +03:00
from random import randbytes
2024-06-13 21:18:18 +03:00
from uuid import uuid4
2024-06-13 21:18:18 +03:00
from dateutil.relativedelta import relativedelta
2022-12-21 12:53:51 +03:00
from dotenv import load_dotenv
from fastapi import FastAPI
2022-12-16 15:51:14 +03:00
from fastapi.requests import Request
from jose import jws, jwk, jwt, JWTError
2022-12-16 15:51:14 +03:00
from jose.constants import ALGORITHMS
2022-12-22 14:57:06 +03:00
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
2024-06-13 21:18:18 +03:00
from starlette.middleware.cors import CORSMiddleware
2025-04-11 22:22:44 +03:00
from starlette.responses import StreamingResponse, JSONResponse as JSONr, HTMLResponse as HTMLr, Response, RedirectResponse
from orm import Origin, Lease, init as db_init, migrate
2025-04-10 22:38:25 +03:00
from util import PrivateKey, PublicKey, load_file, Cert
2022-12-22 14:57:06 +03:00
2024-06-13 21:34:45 +03:00
# Load variables
2022-12-21 13:06:09 +03:00
load_dotenv('../version.env')
2024-06-13 21:34:45 +03:00
# Get current timezone
TZ = datetime.now().astimezone().tzinfo
2024-06-13 21:34:45 +03:00
# Load basic variables
2022-12-28 13:53:56 +03:00
VERSION, COMMIT, DEBUG = env('VERSION', 'unknown'), env('COMMIT', 'unknown'), bool(env('DEBUG', False))
2024-06-13 21:34:45 +03:00
# Database connection
2022-12-28 13:53:56 +03:00
db = create_engine(str(env('DATABASE', 'sqlite:///db.sqlite')))
db_init(db), migrate(db)
2022-12-16 15:51:14 +03:00
2024-06-13 21:34:45 +03:00
# Load DLS variables (all prefixed with "INSTANCE_*" is used as "SERVICE_INSTANCE_*" or "SI_*" in official dls service)
2022-12-28 13:53:56 +03:00
DLS_URL = str(env('DLS_URL', 'localhost'))
DLS_PORT = int(env('DLS_PORT', '443'))
SITE_KEY_XID = str(env('SITE_KEY_XID', '00000000-0000-0000-0000-000000000000'))
INSTANCE_REF = str(env('INSTANCE_REF', '10000000-0000-0000-0000-000000000001'))
ALLOTMENT_REF = str(env('ALLOTMENT_REF', '20000000-0000-0000-0000-000000000001'))
2025-03-18 16:47:33 +03:00
INSTANCE_KEY_RSA = PrivateKey.from_file(str(env('INSTANCE_KEY_RSA', join(dirname(__file__), 'cert/instance.private.pem'))))
INSTANCE_KEY_PUB = PublicKey.from_file(str(env('INSTANCE_KEY_PUB', join(dirname(__file__), 'cert/instance.public.pem'))))
2023-01-04 12:08:17 +03:00
TOKEN_EXPIRE_DELTA = relativedelta(days=int(env('TOKEN_EXPIRE_DAYS', 1)), hours=int(env('TOKEN_EXPIRE_HOURS', 0)))
LEASE_EXPIRE_DELTA = relativedelta(days=int(env('LEASE_EXPIRE_DAYS', 90)), hours=int(env('LEASE_EXPIRE_HOURS', 0)))
LEASE_RENEWAL_PERIOD = float(env('LEASE_RENEWAL_PERIOD', 0.15))
LEASE_RENEWAL_DELTA = timedelta(days=int(env('LEASE_EXPIRE_DAYS', 90)), hours=int(env('LEASE_EXPIRE_HOURS', 0)))
CLIENT_TOKEN_EXPIRE_DELTA = relativedelta(years=12)
2022-12-30 09:42:57 +03:00
CORS_ORIGINS = str(env('CORS_ORIGINS', '')).split(',') if (env('CORS_ORIGINS')) else [f'https://{DLS_URL}']
2025-04-11 21:14:17 +03:00
DT_FORMAT = '%Y-%m-%dT%H:%M:%S.%fZ'
jwt_encode_key = jwk.construct(INSTANCE_KEY_RSA.pem(), algorithm=ALGORITHMS.RS256)
jwt_decode_key = jwk.construct(INSTANCE_KEY_PUB.pem(), algorithm=ALGORITHMS.RS256)
2024-07-11 06:49:13 +03:00
# Logging
LOG_LEVEL = logging.DEBUG if DEBUG else logging.INFO
logging.basicConfig(format='[{levelname:^7}] [{module:^15}] {message}', style='{')
logger = logging.getLogger(__name__)
logger.setLevel(LOG_LEVEL)
logging.getLogger('util').setLevel(LOG_LEVEL)
logging.getLogger('NV').setLevel(LOG_LEVEL)
2024-06-13 21:34:45 +03:00
# FastAPI
@asynccontextmanager
async def lifespan(_: FastAPI):
# on startup
logger.info(f'''
Using timezone: {str(TZ)}. Make sure this is correct and match your clients!
Your clients renew their license every {str(Lease.calculate_renewal(LEASE_RENEWAL_PERIOD, LEASE_RENEWAL_DELTA))}.
If the renewal fails, the license is {str(LEASE_RENEWAL_DELTA)} valid.
Your client-token file (.tok) is valid for {str(CLIENT_TOKEN_EXPIRE_DELTA)}.
''')
logger.info(f'Debug is {"enabled" if DEBUG else "disabled"}.')
yield
# on shutdown
logger.info(f'Shutting down ...')
2024-06-13 21:34:45 +03:00
config = dict(openapi_url=None, docs_url=None, redoc_url=None) # dict(openapi_url='/-/openapi.json', docs_url='/-/docs', redoc_url='/-/redoc')
app = FastAPI(title='FastAPI-DLS', description='Minimal Delegated License Service (DLS).', version=VERSION, lifespan=lifespan, **config)
app.debug = DEBUG
app.add_middleware(
CORSMiddleware,
allow_origins=CORS_ORIGINS,
allow_credentials=True,
2022-12-29 22:40:42 +03:00
allow_methods=['*'],
allow_headers=['*'],
)
2022-12-16 15:51:14 +03:00
2024-06-13 21:34:45 +03:00
# Helper
2022-12-29 22:42:40 +03:00
def __get_token(request: Request) -> dict:
2022-12-29 22:40:42 +03:00
authorization_header = request.headers.get('authorization')
token = authorization_header.split(' ')[1]
2022-12-21 10:00:52 +03:00
return jwt.decode(token=token, key=jwt_decode_key, algorithms=ALGORITHMS.RS256, options={'verify_aud': False})
2024-06-13 21:34:45 +03:00
# Endpoints
2022-12-29 22:41:02 +03:00
@app.get('/', summary='Index')
2022-12-16 15:51:14 +03:00
async def index():
return RedirectResponse('/-/readme')
2022-12-16 15:51:14 +03:00
2022-12-29 22:41:02 +03:00
@app.get('/-/', summary='* Index')
async def _index():
return RedirectResponse('/-/readme')
@app.get('/-/health', summary='* Health')
2023-03-20 12:06:21 +03:00
async def _health():
return JSONr({'status': 'up'})
@app.get('/-/config', summary='* Config', description='returns environment variables.')
async def _config():
return JSONr({
'VERSION': str(VERSION),
'COMMIT': str(COMMIT),
'DEBUG': str(DEBUG),
'DLS_URL': str(DLS_URL),
'DLS_PORT': str(DLS_PORT),
'SITE_KEY_XID': str(SITE_KEY_XID),
'INSTANCE_REF': str(INSTANCE_REF),
'ALLOTMENT_REF': [str(ALLOTMENT_REF)],
'TOKEN_EXPIRE_DELTA': str(TOKEN_EXPIRE_DELTA),
'LEASE_EXPIRE_DELTA': str(LEASE_EXPIRE_DELTA),
'LEASE_RENEWAL_PERIOD': str(LEASE_RENEWAL_PERIOD),
'CORS_ORIGINS': str(CORS_ORIGINS),
'TZ': str(TZ),
})
@app.get('/-/readme', summary='* Readme')
async def _readme():
from markdown import markdown
2024-06-13 20:24:46 +03:00
content = load_file(join(dirname(__file__), '../README.md')).decode('utf-8')
return HTMLr(markdown(text=content, extensions=['tables', 'fenced_code', 'md_in_html', 'nl2br', 'toc']))
@app.get('/-/manage', summary='* Management UI')
2022-12-29 12:12:31 +03:00
async def _manage(request: Request):
response = '''
<!DOCTYPE html>
<html>
<head>
<title>FastAPI-DLS Management</title>
</head>
<body>
<button onclick="deleteOrigins()">delete ALL origins and their leases</button>
2022-12-29 12:12:31 +03:00
<button onclick="deleteLease()">delete specific lease</button>
<script>
function deleteOrigins() {
const response = confirm('Are you sure you want to delete all origins and their leases?');
if (response) {
var xhr = new XMLHttpRequest();
xhr.open("DELETE", '/-/origins', true);
xhr.send();
}
2022-12-29 12:12:31 +03:00
}
function deleteLease(lease_ref) {
if(lease_ref === undefined)
lease_ref = window.prompt("Please enter 'lease_ref' which should be deleted");
if(lease_ref === null || lease_ref === "")
return
var xhr = new XMLHttpRequest();
xhr.open("DELETE", `/-/lease/${lease_ref}`, true);
xhr.send();
}
</script>
</body>
</html>
'''
return HTMLr(response)
2022-12-29 12:12:31 +03:00
2022-12-29 12:35:15 +03:00
@app.get('/-/origins', summary='* Origins')
async def _origins(request: Request, leases: bool = False):
2022-12-23 15:21:52 +03:00
session = sessionmaker(bind=db)()
response = []
for origin in session.query(Origin).all():
x = origin.serialize()
if leases:
serialize = dict(renewal_period=LEASE_RENEWAL_PERIOD, renewal_delta=LEASE_RENEWAL_DELTA)
x['leases'] = list(map(lambda _: _.serialize(**serialize), Lease.find_by_origin_ref(db, origin.origin_ref)))
response.append(x)
2022-12-22 14:57:06 +03:00
session.close()
return JSONr(response)
2022-12-20 20:24:59 +03:00
2022-12-29 12:35:15 +03:00
@app.delete('/-/origins', summary='* Origins')
async def _origins_delete(request: Request):
Origin.delete(db)
return Response(status_code=201)
2022-12-29 12:35:15 +03:00
@app.get('/-/leases', summary='* Leases')
async def _leases(request: Request, origin: bool = False):
2022-12-23 15:21:52 +03:00
session = sessionmaker(bind=db)()
response = []
for lease in session.query(Lease).all():
serialize = dict(renewal_period=LEASE_RENEWAL_PERIOD, renewal_delta=LEASE_RENEWAL_DELTA)
x = lease.serialize(**serialize)
if origin:
lease_origin = session.query(Origin).filter(Origin.origin_ref == lease.origin_ref).first()
if lease_origin is not None:
x['origin'] = lease_origin.serialize()
response.append(x)
2022-12-22 14:57:06 +03:00
session.close()
return JSONr(response)
2022-12-20 20:24:59 +03:00
@app.delete('/-/leases/expired', summary='* Leases')
async def _lease_delete_expired(request: Request):
Lease.delete_expired(db)
return Response(status_code=201)
2022-12-29 12:35:15 +03:00
@app.delete('/-/lease/{lease_ref}', summary='* Lease')
async def _lease_delete(request: Request, lease_ref: str):
if Lease.delete(db, lease_ref) == 1:
return Response(status_code=201)
return JSONr(status_code=404, content={'status': 404, 'detail': 'lease not found'})
2022-12-16 15:51:14 +03:00
# venv/lib/python3.9/site-packages/nls_core_service_instance/service_instance_token_manager.py
@app.get('/-/client-token', summary='* Client-Token', description='creates a new messenger token for this service instance')
async def _client_token():
cur_time = datetime.now(UTC)
exp_time = cur_time + CLIENT_TOKEN_EXPIRE_DELTA
2022-12-19 17:51:49 +03:00
2022-12-16 15:51:14 +03:00
payload = {
"jti": str(uuid4()),
"iss": "NLS Service Instance",
"aud": "NLS Licensed Client",
"iat": timegm(cur_time.timetuple()),
"nbf": timegm(cur_time.timetuple()),
"exp": timegm(exp_time.timetuple()),
"protocol_version": "2.0",
2022-12-16 15:51:14 +03:00
"update_mode": "ABSOLUTE",
"scope_ref_list": [ALLOTMENT_REF],
2022-12-16 15:51:14 +03:00
"fulfillment_class_ref_list": [],
"service_instance_configuration": {
2022-12-23 15:22:06 +03:00
"nls_service_instance_ref": INSTANCE_REF,
2022-12-16 15:51:14 +03:00
"svc_port_set_list": [
{
"idx": 0,
"d_name": "DLS",
"svc_port_map": [{"service": "auth", "port": DLS_PORT}, {"service": "lease", "port": DLS_PORT}]
2022-12-16 15:51:14 +03:00
}
],
2022-12-19 16:44:26 +03:00
"node_url_list": [{"idx": 0, "url": DLS_URL, "url_qr": DLS_URL, "svc_port_set_idx": 0}]
2022-12-16 15:51:14 +03:00
},
2022-12-23 15:22:06 +03:00
"service_instance_public_key_configuration": {
"service_instance_public_key_me": {
"mod": hex(INSTANCE_KEY_PUB.raw().public_numbers().n)[2:],
"exp": int(INSTANCE_KEY_PUB.raw().public_numbers().e),
2022-12-23 15:22:06 +03:00
},
"service_instance_public_key_pem": INSTANCE_KEY_PUB.pem().decode('utf-8'),
2022-12-23 15:22:06 +03:00
"key_retention_mode": "LATEST_ONLY"
},
2022-12-16 15:51:14 +03:00
}
2022-12-21 10:00:52 +03:00
content = jws.sign(payload, key=jwt_encode_key, headers=None, algorithm=ALGORITHMS.RS256)
2022-12-16 15:51:14 +03:00
response = StreamingResponse(iter([content]), media_type="text/plain")
filename = f'client_configuration_token_{datetime.now().strftime("%d-%m-%y-%H-%M-%S")}.tok'
2022-12-20 00:20:50 +03:00
response.headers["Content-Disposition"] = f'attachment; filename={filename}'
2022-12-16 15:51:14 +03:00
return response
# venv/lib/python3.9/site-packages/nls_services_auth/test/test_origins_controller.py
2022-12-29 20:48:30 +03:00
@app.post('/auth/v1/origin', description='find or create an origin')
2022-12-21 10:00:52 +03:00
async def auth_v1_origin(request: Request):
j, cur_time = json_loads((await request.body()).decode('utf-8')), datetime.now(UTC)
origin_ref = j.get('candidate_origin_ref')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ origin ]: {origin_ref}: {j}')
2022-12-22 14:57:06 +03:00
data = Origin(
origin_ref=origin_ref,
hostname=j.get('environment').get('hostname'),
guest_driver_version=j.get('environment').get('guest_driver_version'),
os_platform=j.get('environment').get('os_platform'), os_version=j.get('environment').get('os_version'),
)
2022-12-22 14:57:06 +03:00
Origin.create_or_update(db, data)
2022-12-16 15:51:14 +03:00
2025-04-11 19:51:17 +03:00
environment = {
'raw_env': j.get('environment')
}
environment.update(j.get('environment'))
2022-12-16 15:51:14 +03:00
response = {
"origin_ref": origin_ref,
2025-04-11 19:51:17 +03:00
"environment": environment,
2022-12-16 15:51:14 +03:00
"svc_port_set_list": None,
"node_url_list": None,
"node_query_order": None,
"prompts": None,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT)
2022-12-16 15:51:14 +03:00
}
return JSONr(response)
2022-12-16 15:51:14 +03:00
2022-12-27 21:03:03 +03:00
# venv/lib/python3.9/site-packages/nls_services_auth/test/test_origins_controller.py
2022-12-29 20:48:30 +03:00
@app.post('/auth/v1/origin/update', description='update an origin evidence')
2022-12-27 21:03:03 +03:00
async def auth_v1_origin_update(request: Request):
j, cur_time = json_loads((await request.body()).decode('utf-8')), datetime.now(UTC)
2022-12-27 21:03:03 +03:00
origin_ref = j.get('origin_ref')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ update ]: {origin_ref}: {j}')
2022-12-27 21:03:03 +03:00
data = Origin(
2022-12-27 21:03:03 +03:00
origin_ref=origin_ref,
hostname=j.get('environment').get('hostname'),
guest_driver_version=j.get('environment').get('guest_driver_version'),
os_platform=j.get('environment').get('os_platform'), os_version=j.get('environment').get('os_version'),
2022-12-27 21:03:03 +03:00
)
Origin.create_or_update(db, data)
2022-12-27 21:03:03 +03:00
response = {
"environment": j.get('environment'),
2022-12-27 21:03:03 +03:00
"prompts": None,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT)
2022-12-27 21:03:03 +03:00
}
return JSONr(response)
2022-12-27 21:03:03 +03:00
2022-12-16 15:51:14 +03:00
# venv/lib/python3.9/site-packages/nls_services_auth/test/test_auth_controller.py
# venv/lib/python3.9/site-packages/nls_core_auth/auth.py - CodeResponse
2022-12-29 20:48:30 +03:00
@app.post('/auth/v1/code', description='get an authorization code')
2022-12-21 10:00:52 +03:00
async def auth_v1_code(request: Request):
j, cur_time = json_loads((await request.body()).decode('utf-8')), datetime.now(UTC)
origin_ref = j.get('origin_ref')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ code ]: {origin_ref}: {j}')
2022-12-16 15:51:14 +03:00
delta = relativedelta(minutes=15)
expires = cur_time + delta
2022-12-16 15:51:14 +03:00
payload = {
'iat': timegm(cur_time.timetuple()),
'exp': timegm(expires.timetuple()),
'challenge': j.get('code_challenge'),
'origin_ref': j.get('origin_ref'),
2022-12-16 15:51:14 +03:00
'key_ref': SITE_KEY_XID,
'kid': SITE_KEY_XID
}
2022-12-21 10:00:52 +03:00
auth_code = jws.sign(payload, key=jwt_encode_key, headers={'kid': payload.get('kid')}, algorithm=ALGORITHMS.RS256)
2022-12-16 15:51:14 +03:00
response = {
"auth_code": auth_code,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
2022-12-16 15:51:14 +03:00
"prompts": None
}
return JSONr(response)
2022-12-16 15:51:14 +03:00
# venv/lib/python3.9/site-packages/nls_services_auth/test/test_auth_controller.py
# venv/lib/python3.9/site-packages/nls_core_auth/auth.py - TokenResponse
2022-12-29 20:48:30 +03:00
@app.post('/auth/v1/token', description='exchange auth code and verifier for token')
2022-12-21 10:00:52 +03:00
async def auth_v1_token(request: Request):
j, cur_time = json_loads((await request.body()).decode('utf-8')), datetime.now(UTC)
try:
payload = jwt.decode(token=j.get('auth_code'), key=jwt_decode_key, algorithms=ALGORITHMS.RS256)
except JWTError as e:
return JSONr(status_code=400, content={'status': 400, 'title': 'invalid token', 'detail': str(e)})
2022-12-16 15:51:14 +03:00
origin_ref = payload.get('origin_ref')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ auth ]: {origin_ref}: {j}')
2022-12-16 15:51:14 +03:00
# validate the code challenge
challenge = b64enc(sha256(j.get('code_verifier').encode('utf-8')).digest()).rstrip(b'=').decode('utf-8')
if payload.get('challenge') != challenge:
2023-01-04 12:14:00 +03:00
return JSONr(status_code=401, content={'status': 401, 'detail': 'expected challenge did not match verifier'})
2022-12-16 15:51:14 +03:00
access_expires_on = cur_time + TOKEN_EXPIRE_DELTA
2022-12-16 15:51:14 +03:00
new_payload = {
'iat': timegm(cur_time.timetuple()),
'nbf': timegm(cur_time.timetuple()),
'iss': 'https://cls.nvidia.org',
'aud': 'https://cls.nvidia.org',
'exp': timegm(access_expires_on.timetuple()),
'origin_ref': origin_ref,
2022-12-16 15:51:14 +03:00
'key_ref': SITE_KEY_XID,
'kid': SITE_KEY_XID,
}
2022-12-21 10:00:52 +03:00
auth_token = jwt.encode(new_payload, key=jwt_encode_key, headers={'kid': payload.get('kid')}, algorithm=ALGORITHMS.RS256)
2022-12-16 15:51:14 +03:00
response = {
2025-04-11 21:14:17 +03:00
"expires": access_expires_on.strftime(DT_FORMAT),
2022-12-16 15:51:14 +03:00
"auth_token": auth_token,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
2025-04-11 19:51:17 +03:00
"prompts": None
2022-12-16 15:51:14 +03:00
}
return JSONr(response)
2022-12-16 15:51:14 +03:00
# NLS 3.4.0 - venv/lib/python3.12/site-packages/nls_services_lease/test/test_lease_single_controller.py
@app.post('/leasing/v1/config-token', description='request to get config token for lease operations')
async def leasing_v1_config_token(request: Request):
2025-03-10 00:02:51 +03:00
j, cur_time = json_loads((await request.body()).decode('utf-8')), datetime.now(UTC)
logger.debug(f'CALLED /leasing/v1/config-token')
logger.debug(f'Headers: {request.headers}')
logger.debug(f'Request: {j}')
2025-04-10 22:38:25 +03:00
# todo: THIS IS A DEMO ONLY
###
#
# https://git.collinwebdesigns.de/nvidia/nls/-/blob/main/src/test/test_config_token.py
#
###
2025-04-10 22:38:25 +03:00
root_private_key_filename = join(dirname(__file__), 'cert/my_demo_root_private_key.pem')
root_certificate_filename = join(dirname(__file__), 'cert/my_demo_root_certificate.pem')
ca_private_key_filename = join(dirname(__file__), 'cert/my_demo_ca_private_key.pem')
ca_certificate_filename = join(dirname(__file__), 'cert/my_demo_ca_certificate.pem')
si_private_key_filename = join(dirname(__file__), 'cert/my_demo_si_private_key.pem')
si_certificate_filename = join(dirname(__file__), 'cert/my_demo_si_certificate.pem')
def init_config_token_demo():
from cryptography import x509
from cryptography.hazmat._oid import NameOID
from cryptography.hazmat.primitives import serialization, hashes
from cryptography.hazmat.primitives.asymmetric.rsa import generate_private_key
from cryptography.hazmat.primitives.serialization import Encoding
""" Create Root Key and Certificate """
# create root keypair
my_root_private_key = generate_private_key(public_exponent=65537, key_size=4096)
my_root_public_key = my_root_private_key.public_key()
# create root-certificate subject
my_root_subject = x509.Name([
x509.NameAttribute(NameOID.COUNTRY_NAME, u'US'),
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u'California'),
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'Nvidia'),
x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, u'Nvidia Licensing Service (NLS)'),
x509.NameAttribute(NameOID.COMMON_NAME, u'NLS Root CA'),
])
# create self-signed root-certificate
my_root_certificate = (
x509.CertificateBuilder()
.subject_name(my_root_subject)
.issuer_name(my_root_subject)
.public_key(my_root_public_key)
.serial_number(x509.random_serial_number())
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
.add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_root_public_key), critical=False)
.sign(my_root_private_key, hashes.SHA256()))
my_root_private_key_as_pem = my_root_private_key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption(),
)
with open(root_private_key_filename, 'wb') as f:
f.write(my_root_private_key_as_pem)
with open(root_certificate_filename, 'wb') as f:
f.write(my_root_certificate.public_bytes(encoding=Encoding.PEM))
""" Create CA (Intermediate) Key and Certificate """
# create ca keypair
my_ca_private_key = generate_private_key(public_exponent=65537, key_size=4096)
my_ca_public_key = my_ca_private_key.public_key()
# create ca-certificate subject
my_ca_subject = x509.Name([
x509.NameAttribute(NameOID.COUNTRY_NAME, u'US'),
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u'California'),
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'Nvidia'),
x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, u'Nvidia Licensing Service (NLS)'),
x509.NameAttribute(NameOID.COMMON_NAME, u'NLS Intermediate CA'),
])
# create self-signed ca-certificate
my_ca_certificate = (
x509.CertificateBuilder()
.subject_name(my_ca_subject)
.issuer_name(my_root_subject)
.public_key(my_ca_public_key)
.serial_number(x509.random_serial_number())
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
.add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
.add_extension(x509.KeyUsage(digital_signature=False, key_encipherment=False, key_cert_sign=True,
key_agreement=False, content_commitment=False, data_encipherment=False,
crl_sign=True, encipher_only=False, decipher_only=False), critical=True)
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_ca_public_key), critical=False)
# .add_extension(x509.AuthorityKeyIdentifier.from_issuer_public_key(my_root_public_key), critical=False)
.add_extension(x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(
my_root_certificate.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value
), critical=False)
.sign(my_root_private_key, hashes.SHA256()))
my_ca_private_key_as_pem = my_ca_private_key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption(),
)
with open(ca_private_key_filename, 'wb') as f:
f.write(my_ca_private_key_as_pem)
with open(ca_certificate_filename, 'wb') as f:
f.write(my_ca_certificate.public_bytes(encoding=Encoding.PEM))
""" Create Service-Instance Key and Certificate """
# create si keypair
my_si_private_key = generate_private_key(public_exponent=65537, key_size=2048)
my_si_public_key = my_si_private_key.public_key()
my_si_private_key_as_pem = my_si_private_key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption(),
)
my_si_public_key_as_pem = my_si_public_key.public_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PublicFormat.SubjectPublicKeyInfo,
)
with open(si_private_key_filename, 'wb') as f:
f.write(my_si_private_key_as_pem)
# with open('instance.public.pem', 'wb') as f:
# f.write(my_si_public_key_as_pem)
# create si-certificate subject
my_si_subject = x509.Name([
# x509.NameAttribute(NameOID.COMMON_NAME, INSTANCE_REF),
x509.NameAttribute(NameOID.COMMON_NAME, j.get('service_instance_ref')),
])
# create self-signed si-certificate
my_si_certificate = (
x509.CertificateBuilder()
.subject_name(my_si_subject)
.issuer_name(my_ca_subject)
.public_key(my_si_public_key)
.serial_number(x509.random_serial_number())
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
.add_extension(x509.KeyUsage(digital_signature=True, key_encipherment=True, key_cert_sign=False,
key_agreement=True, content_commitment=False, data_encipherment=False,
crl_sign=False, encipher_only=False, decipher_only=False), critical=True)
.add_extension(x509.ExtendedKeyUsage([
x509.oid.ExtendedKeyUsageOID.SERVER_AUTH,
x509.oid.ExtendedKeyUsageOID.CLIENT_AUTH]
), critical=False)
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_si_public_key), critical=False)
# .add_extension(x509.AuthorityKeyIdentifier.from_issuer_public_key(my_ca_public_key), critical=False)
.add_extension(x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(
my_ca_certificate.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value
), critical=False)
.add_extension(x509.SubjectAlternativeName([
# x509.DNSName(INSTANCE_REF)
x509.DNSName(j.get('service_instance_ref'))
]), critical=False)
.sign(my_ca_private_key, hashes.SHA256()))
my_si_public_key_exp = my_si_certificate.public_key().public_numbers().e
my_si_public_key_mod = f'{my_si_certificate.public_key().public_numbers().n:x}' # hex value without "0x" prefix
with open(si_certificate_filename, 'wb') as f:
f.write(my_si_certificate.public_bytes(encoding=Encoding.PEM))
if not (isfile(root_private_key_filename)
and isfile(ca_private_key_filename)
and isfile(ca_certificate_filename)
and isfile(si_private_key_filename)
and isfile(si_certificate_filename)):
init_config_token_demo()
my_ca_certificate = Cert.from_file(ca_certificate_filename)
my_si_certificate = Cert.from_file(si_certificate_filename)
my_si_private_key = PrivateKey.from_file(si_private_key_filename)
my_si_private_key_as_pem = my_si_private_key.pem()
my_si_public_key = my_si_private_key.public_key().raw()
my_si_public_key_as_pem = my_si_private_key.public_key().pem()
""" build out payload """
cur_time = datetime.now(UTC)
exp_time = cur_time + CLIENT_TOKEN_EXPIRE_DELTA
payload = {
"iss": "NLS Service Instance",
"aud": "NLS Licensed Client",
"iat": timegm(cur_time.timetuple()),
"nbf": timegm(cur_time.timetuple()),
"exp": timegm(exp_time.timetuple()),
"protocol_version": "2.0",
"d_name": "DLS",
"service_instance_ref": j.get('service_instance_ref'),
"service_instance_public_key_configuration": {
"service_instance_public_key_me": {
"mod": hex(my_si_public_key.public_numbers().n)[2:],
"exp": int(my_si_public_key.public_numbers().e),
},
# 64 chars per line (pem default)
"service_instance_public_key_pem": my_si_public_key_as_pem.decode('utf-8').strip(),
"key_retention_mode": "LATEST_ONLY"
},
}
my_jwt_encode_key = jwk.construct(my_si_private_key_as_pem.decode('utf-8'), algorithm=ALGORITHMS.RS256)
config_token = jws.sign(payload, key=my_jwt_encode_key, headers=None, algorithm=ALGORITHMS.RS256)
2025-04-10 22:38:25 +03:00
response_ca_chain = my_ca_certificate.pem().decode('utf-8')
response_si_certificate = my_si_certificate.pem().decode('utf-8')
2025-03-10 00:02:51 +03:00
response = {
"certificateConfiguration": {
# 76 chars per line
"caChain": [response_ca_chain],
# 76 chars per line
"publicCert": response_si_certificate,
"publicKey": {
2025-04-10 22:38:25 +03:00
"exp": int(my_si_certificate.raw().public_key().public_numbers().e),
"mod": [hex(my_si_certificate.raw().public_key().public_numbers().n)[2:]],
},
},
"configToken": config_token,
}
2025-03-10 00:02:51 +03:00
logging.debug(response)
return JSONr(response, status_code=200)
2023-01-02 20:10:11 +03:00
# venv/lib/python3.9/site-packages/nls_services_lease/test/test_lease_multi_controller.py
2022-12-29 20:48:30 +03:00
@app.post('/leasing/v1/lessor', description='request multiple leases (borrow) for current origin')
2022-12-21 10:00:52 +03:00
async def leasing_v1_lessor(request: Request):
j, token, cur_time = json_loads((await request.body()).decode('utf-8')), __get_token(request), datetime.now(UTC)
2025-04-11 19:51:33 +03:00
logger.debug(j)
2025-04-11 22:22:56 +03:00
logger.debug(request.headers)
2025-04-11 19:51:33 +03:00
try:
token = __get_token(request)
except JWTError:
return JSONr(status_code=401, content={'status': 401, 'detail': 'token is not valid'})
2022-12-29 20:59:26 +03:00
origin_ref = token.get('origin_ref')
scope_ref_list = j.get('scope_ref_list')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ create ]: {origin_ref}: create leases for scope_ref_list {scope_ref_list}')
2022-12-16 15:51:14 +03:00
lease_result_list = []
2025-04-11 20:36:25 +03:00
# todo: for lease_proposal in lease_proposal_list
for scope_ref in scope_ref_list:
# if scope_ref not in [ALLOTMENT_REF]:
2023-01-04 12:14:00 +03:00
# return JSONr(status_code=500, detail=f'no service instances found for scopes: ["{scope_ref}"]')
lease_ref = str(uuid4())
expires = cur_time + LEASE_EXPIRE_DELTA
2022-12-16 15:51:14 +03:00
lease_result_list.append({
2025-04-11 21:38:58 +03:00
"ordinal": None,
"error": None,
# https://docs.nvidia.com/license-system/latest/nvidia-license-system-user-guide/index.html
2022-12-16 15:51:14 +03:00
"lease": {
"ref": lease_ref,
2025-04-11 21:14:17 +03:00
"created": cur_time.strftime(DT_FORMAT),
"expires": expires.strftime(DT_FORMAT),
"recommended_lease_renewal": LEASE_RENEWAL_PERIOD,
2025-04-11 23:22:22 +03:00
"offline_lease": "false", # todo
2025-04-11 19:51:17 +03:00
"license_type": "CONCURRENT_COUNTED_SINGLE",
"lease_intent_id": None,
"metadata": None,
2025-04-11 20:36:25 +03:00
"feature_name": "GRID-Virtual-WS", # todo
"product_name": "NVIDIA RTX Virtual Workstation", # todo
2022-12-16 15:51:14 +03:00
}
})
data = Lease(origin_ref=origin_ref, lease_ref=lease_ref, lease_created=cur_time, lease_expires=expires)
2022-12-22 14:57:06 +03:00
Lease.create_or_update(db, data)
2022-12-16 15:51:14 +03:00
response = {
"client_challenge": j.get('client_challenge'),
2022-12-16 15:51:14 +03:00
"lease_result_list": lease_result_list,
2025-04-11 21:14:17 +03:00
"result_code": None,
"sync_timestamp": cur_time.strftime(DT_FORMAT),
2022-12-16 15:51:14 +03:00
"prompts": None
}
2025-04-11 21:35:10 +03:00
logger.debug(response)
2025-04-14 12:05:17 +03:00
signature = f'b\'{randbytes(256).hex()}\''
return JSONr(response, headers={'access-control-expose-headers': 'X-NLS-Signature', 'x-nls-signature': signature})
2022-12-16 15:51:14 +03:00
# venv/lib/python3.9/site-packages/nls_services_lease/test/test_lease_multi_controller.py
# venv/lib/python3.9/site-packages/nls_dal_service_instance_dls/schema/service_instance/V1_0_21__product_mapping.sql
2022-12-29 20:48:30 +03:00
@app.get('/leasing/v1/lessor/leases', description='get active leases for current origin')
2022-12-21 10:00:52 +03:00
async def leasing_v1_lessor_lease(request: Request):
token, cur_time = __get_token(request), datetime.now(UTC)
2022-12-29 20:59:26 +03:00
origin_ref = token.get('origin_ref')
2022-12-27 22:05:55 +03:00
active_lease_list = list(map(lambda x: x.lease_ref, Lease.find_by_origin_ref(db, origin_ref)))
2025-03-12 00:04:35 +03:00
logger.info(f'> [ leases ]: {origin_ref}: found {len(active_lease_list)} active leases')
2022-12-16 15:51:14 +03:00
response = {
"active_lease_list": active_lease_list,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
2022-12-16 15:51:14 +03:00
"prompts": None
}
return JSONr(response)
2022-12-16 15:51:14 +03:00
2023-01-02 20:10:11 +03:00
# venv/lib/python3.9/site-packages/nls_services_lease/test/test_lease_single_controller.py
2022-12-19 15:15:19 +03:00
# venv/lib/python3.9/site-packages/nls_core_lease/lease_single.py
2022-12-29 20:48:30 +03:00
@app.put('/leasing/v1/lease/{lease_ref}', description='renew a lease')
2022-12-21 10:00:52 +03:00
async def leasing_v1_lease_renew(request: Request, lease_ref: str):
j, token, cur_time = json_loads((await request.body()).decode('utf-8')), __get_token(request), datetime.now(UTC)
2022-12-29 20:59:26 +03:00
origin_ref = token.get('origin_ref')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ renew ]: {origin_ref}: renew {lease_ref}')
2022-12-22 14:57:06 +03:00
entity = Lease.find_by_origin_ref_and_lease_ref(db, origin_ref, lease_ref)
if entity is None:
return JSONr(status_code=404, content={'status': 404, 'detail': 'requested lease not available'})
2022-12-19 15:15:19 +03:00
expires = cur_time + LEASE_EXPIRE_DELTA
2022-12-19 15:15:19 +03:00
response = {
"client_challenge": j.get('client_challenge'),
2022-12-19 15:15:19 +03:00
"lease_ref": lease_ref,
2025-04-11 21:14:17 +03:00
"expires": expires.strftime(DT_FORMAT),
"recommended_lease_renewal": LEASE_RENEWAL_PERIOD,
2022-12-19 15:15:19 +03:00
"offline_lease": True,
"prompts": None,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
2022-12-19 15:15:19 +03:00
}
2022-12-22 14:57:06 +03:00
Lease.renew(db, entity, expires, cur_time)
2025-04-14 12:05:17 +03:00
signature = f'b\'{randbytes(256).hex()}\''
return JSONr(response, headers={'access-control-expose-headers': 'X-NLS-Signature', 'x-nls-signature': signature})
2022-12-19 15:15:19 +03:00
2023-01-02 20:10:11 +03:00
# venv/lib/python3.9/site-packages/nls_services_lease/test/test_lease_single_controller.py
@app.delete('/leasing/v1/lease/{lease_ref}', description='release (return) a lease')
async def leasing_v1_lease_delete(request: Request, lease_ref: str):
token, cur_time = __get_token(request), datetime.now(UTC)
origin_ref = token.get('origin_ref')
2025-03-12 00:04:35 +03:00
logger.info(f'> [ return ]: {origin_ref}: return {lease_ref}')
entity = Lease.find_by_lease_ref(db, lease_ref)
if entity.origin_ref != origin_ref:
return JSONr(status_code=403, content={'status': 403, 'detail': 'access or operation forbidden'})
if entity is None:
return JSONr(status_code=404, content={'status': 404, 'detail': 'requested lease not available'})
if Lease.delete(db, lease_ref) == 0:
return JSONr(status_code=404, content={'status': 404, 'detail': 'lease not found'})
response = {
"client_challenge": None,
"lease_ref": lease_ref,
"prompts": None,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
}
return JSONr(response)
2023-01-02 20:10:11 +03:00
# venv/lib/python3.9/site-packages/nls_services_lease/test/test_lease_multi_controller.py
2022-12-29 20:48:30 +03:00
@app.delete('/leasing/v1/lessor/leases', description='release all leases')
2022-12-21 10:00:52 +03:00
async def leasing_v1_lessor_lease_remove(request: Request):
token, cur_time = __get_token(request), datetime.now(UTC)
2022-12-29 20:59:26 +03:00
origin_ref = token.get('origin_ref')
2022-12-22 14:57:06 +03:00
released_lease_list = list(map(lambda x: x.lease_ref, Lease.find_by_origin_ref(db, origin_ref)))
2022-12-27 22:10:18 +03:00
deletions = Lease.cleanup(db, origin_ref)
2025-03-12 00:04:35 +03:00
logger.info(f'> [ remove ]: {origin_ref}: removed {deletions} leases')
2022-12-16 15:51:14 +03:00
response = {
"released_lease_list": released_lease_list,
2022-12-16 15:51:14 +03:00
"release_failure_list": None,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
2022-12-16 15:51:14 +03:00
"prompts": None
}
2022-12-23 15:31:23 +03:00
return JSONr(response)
2022-12-16 15:51:14 +03:00
@app.post('/leasing/v1/lessor/shutdown', description='shutdown all leases')
async def leasing_v1_lessor_shutdown(request: Request):
j, cur_time = json_loads((await request.body()).decode('utf-8')), datetime.now(UTC)
token = j.get('token')
token = jwt.decode(token=token, key=jwt_decode_key, algorithms=ALGORITHMS.RS256, options={'verify_aud': False})
origin_ref = token.get('origin_ref')
released_lease_list = list(map(lambda x: x.lease_ref, Lease.find_by_origin_ref(db, origin_ref)))
deletions = Lease.cleanup(db, origin_ref)
2025-03-12 00:04:35 +03:00
logger.info(f'> [ shutdown ]: {origin_ref}: removed {deletions} leases')
response = {
"released_lease_list": released_lease_list,
"release_failure_list": None,
2025-04-11 21:14:17 +03:00
"sync_timestamp": cur_time.strftime(DT_FORMAT),
"prompts": None
}
return JSONr(response)
2022-12-16 15:51:14 +03:00
if __name__ == '__main__':
import uvicorn
###
#
# Running `python app/main.py` assumes that the user created a keypair, e.g. with openssl.
#
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout app/cert/webserver.key -out app/cert/webserver.crt
#
###
2022-12-16 15:51:14 +03:00
2025-03-12 00:04:35 +03:00
logger.info(f'> Starting dev-server ...')
2022-12-19 16:27:10 +03:00
ssl_keyfile = join(dirname(__file__), 'cert/webserver.key')
ssl_certfile = join(dirname(__file__), 'cert/webserver.crt')
uvicorn.run('main:app', host='0.0.0.0', port=443, ssl_keyfile=ssl_keyfile, ssl_certfile=ssl_certfile, reload=True)