Interesting design problem with serialization and deserialization
I have been working on a serialization framework I'm happy with for Python.
I want to be able to describe CAKE
protocol messages clearly and succinctly. This will make it easier to
tweak the messages without having to rip apart difficult to understand code.
It will also make it easier to understand if I drop the project again and
then come back to it years later, or if (by some miracle) someone else
decides to help me with it.
Here is what I've come up with as the interface, along with one
implementation fo that interface for a simple type:
class Serializer(object):
"""This is class is an abstract base class. Derived classes, when
instantiated, create objects that can serialize other objects of a
particular type to a sequence of bytes, or alternately deserialize
a sequence of bytes into an object of a particular type."""
__slots__ = ('__weakref__',)
def __init__(self):
super(Serializer, self).__init__()
def serialize(self, val):
"""x.serialize(value) -> b'serialized value'
This is implemented in terms of serialize_iter by default.
It is suggested that derived classes only implement serialize
or serialize_iter and implement one in terms of the other."""
if self.__class__ is Serializer:
raise NotImplentedError("This is an abstract class.")
return b''.join(x for x in self.serialize_iter(val))
def serialize_iter(self, val):
"""x.serialize_iter(value) -> an iterator over the bytes
sequences making p the seralized version of value."""
if self.__class__ is Serializer:
raise NotImplentedError("This is an abstract class.")
return iter((self.serialize(val),))
def deserialize(self, data, memo=None):
"""x.deserialize(data, [memo]) ->
(value of the appropriate type, memoryview(remaining_data))
data must be of type 'bytes', or 'memoryview'. The memo must
be a value extracted from a previous NotEnoughDataError.
It is undefined what happens if you use memo and do not pass
the same data (plus some possible extra data on the end) into
deserialize that you originally passed in when you got the
NotEnoughDataError you extracted the memo from.
May raise a ParseError if there is a problem with the data.
If the failure was because the parser ran out of data before
parsing was finished, this is required to be a
NotEnoughDataError."""
return self._deserialize(data if not isinstance(data, bytes) \
else memoryview(data),
memo)
def _deserialize(self, memview, memo=None):
"""x._deserialize(memoryview) ->
(value of the appropriate type, memoryview(remaining_data))
Exactly like deserialize, except a memoryview object is
required. deserialize is implemented in terms of
_deserialize. Derived classes are expected to override
_deserialize."""
raise NotImplentedError("This is an abstract class.")
class SmallInt(Serializer):
"""This class is for integers that are 8, 16, 32, or 64 bits long.
They may be signed or unsigned. No other sizes are supported.
>>> s = SmallInt(2, True)
Traceback (most recent call last):
...
ValueError: size is 2, must be 8, 16, 32 or 64
>>> s = SmallInt(8, True)
>>> b = list(s.serialize_iter(5))
>>> b == [b'\\x05']
True
>>> o = s.deserialize(b''.join(b))
>>> o = (o[0], o[1].tobytes())
>>> o == (5, b'')
True
>>> o = s.deserialize(b''.join(b) + b'z')
>>> o = (o[0], o[1].tobytes())
>>> o == (5, b'z')
True
>>> s = SmallInt(8, True)
>>> b = s.serialize(-5)
>>> b == b'\\xfb'
True
>>> s = SmallInt(8, True)
>>> s = s.serialize(128)
Traceback (most recent call last):
...
ValueError: 128 is out of range for an signed 8 bit integer
>>> s = SmallInt(64, False)
>>> b = s.serialize(2**64-1)
>>> b == b'\\xff\\xff\\xff\\xff\\xff\\xff\\xff\\xff'
True
>>> s = SmallInt(64, True)
>>> b = s.serialize(-2**63)
>>> b == b'\\x80\\x00\\x00\\x00\\x00\\x00\\x00\\x00'
True
"""
_formats = dict((
((8, True), '>b'),
((8, False), '>B'),
((16, True), '>h'),
((16, False), '>H'),
((32, True), '>i'),
((32, False), '>I'),
((64, True), '>q'),
((64, False), '>Q')
))
__slots__ = ('_size', '_signed', '_low', '_high', '_format')
def __init__(self, size, signed):
if size not in (8, 16, 32, 64):
raise ValueError("size is %d, must be 8, 16, 32 or 64" % (size,))
self._size = size
self._signed = bool(signed)
self._format = self._formats[(size, signed)]
def serialize(self, value):
if not isinstance(value, (int, long)):
raise TypeError("%r must be an int or long" % (value,))
value = int(value)
try:
ret = _struct.pack(self._format, value)
except _struct.error:
raise ValueError("%d is out of range for an %ssigned %d bit "
"integer" % (value,
("un" if not self._signed else ""),
self._size))
return ret
def _deserialize(self, memview, memo=None):
numbytes = self._size // 8
if len(memview) < numbytes:
raise _NotEnoughDataError((self._size // 8) - len(memview))
else:
data = memview[0:numbytes].tobytes()
remaining = memview[numbytes:]
try:
result = _struct.unpack(self._format, data)[0]
return result, remaining
except _struct.error as err:
raise ParseErrror(err)
There is also a CompoundNumbered
type for representing
tuples. This allows you to represent structured messages with multiple
fields. Here is example of how you might
represent CAKE new
session messages:
cake_newsess_v2 = _serial.CompoundNumbered(
_serial.Count(), # Version
_serial.Count(), # Type
_serial.KeyName(), # Destination key
_serial.KeyName(), # Source key
_serial.SmallInt(64, False), # Session serial #
_serial.CountDelimitedByteString(), # Encryption header
_serial.CountDelimitedByteString(), # Signature.
_serial.FixedLengthByteString(32) # Header HMAC
)
There is a problem though. The signature and header HMAC are supposed to be
encrypted, but the deserializer can't know the key to use until it's
decrypted the encryption header. This means that later parts of the
deserialization process need to know about things from previous parts.
I have a way for the deserialization process to save state. This is used so
that if deserialization throws a NotEnoughDataError
because not
enough data is available, the exception may have a memo
field.
This memo
field can then be passed in again to resume close to
where deserialization stopped. (Though now I'm sort of wondering if I
shouldn't do something generator based instead...)
But this mechanism does not allow state to be passed forward from a previous
deserializer to a new one. And this applies the other way around too. When
serializing there is stuff that's not really a part of the data being
serialized (like the current HMAC or encryption state) that needs to be known
by serializer in order to serialize properly.
I'm thinking of adding an optional context
parameter to the
serialization and deserialization functions that's just an empty dictionary
into which this sort of state can be stuffed. But this seems really messy.
Can anybody think of any better ways to do this that are fairly general?
Syndicated 2011-02-02 22:46:39 (Updated 2011-02-02 23:03:41) from Lover of ideas