mirror of
https://github.com/matrix-org/dendrite
synced 2024-12-13 23:02:46 +00:00
Store keys rather than json in the keydatabase (#330)
* bump gomatrixserverlib (changes to KeyFetcher and KeyDatabase interfaces) * Store keys rather than json in the keydatabase Rather than storing the raw JSON returned from a /keys/v1/query call in the table, store the key itself. This makes keydb.Database implement the updated KeyDatabase interface.
This commit is contained in:
parent
7f85422471
commit
4124ce2ac0
11 changed files with 265 additions and 167 deletions
|
@ -48,14 +48,14 @@ func NewDatabase(dataSourceName string) (*Database, error) {
|
|||
func (d *Database) FetchKeys(
|
||||
ctx context.Context,
|
||||
requests map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.Timestamp,
|
||||
) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys, error) {
|
||||
) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult, error) {
|
||||
return d.statements.bulkSelectServerKeys(ctx, requests)
|
||||
}
|
||||
|
||||
// StoreKeys implements gomatrixserverlib.KeyDatabase
|
||||
func (d *Database) StoreKeys(
|
||||
ctx context.Context,
|
||||
keyMap map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys,
|
||||
keyMap map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult,
|
||||
) error {
|
||||
// TODO: Inserting all the keys within a single transaction may
|
||||
// be more efficient since the transaction overhead can be quite
|
||||
|
|
|
@ -17,14 +17,13 @@ package keydb
|
|||
import (
|
||||
"context"
|
||||
"database/sql"
|
||||
"encoding/json"
|
||||
|
||||
"github.com/lib/pq"
|
||||
"github.com/matrix-org/gomatrixserverlib"
|
||||
)
|
||||
|
||||
const serverKeysSchema = `
|
||||
-- A cache of server keys downloaded from remote servers.
|
||||
-- A cache of signing keys downloaded from remote servers.
|
||||
CREATE TABLE IF NOT EXISTS keydb_server_keys (
|
||||
-- The name of the matrix server the key is for.
|
||||
server_name TEXT NOT NULL,
|
||||
|
@ -33,10 +32,14 @@ CREATE TABLE IF NOT EXISTS keydb_server_keys (
|
|||
-- Combined server name and key ID separated by the ASCII unit separator
|
||||
-- to make it easier to run bulk queries.
|
||||
server_name_and_key_id TEXT NOT NULL,
|
||||
-- When the keys are valid until as a millisecond timestamp.
|
||||
-- When the key is valid until as a millisecond timestamp.
|
||||
-- 0 if this is an expired key (in which case expired_ts will be non-zero)
|
||||
valid_until_ts BIGINT NOT NULL,
|
||||
-- The raw JSON for the server key.
|
||||
server_key_json TEXT NOT NULL,
|
||||
-- When the key expired as a millisecond timestamp.
|
||||
-- 0 if this is an active key (in which case valid_until_ts will be non-zero)
|
||||
expired_ts BIGINT NOT NULL,
|
||||
-- The base64-encoded public key.
|
||||
server_key TEXT NOT NULL,
|
||||
CONSTRAINT keydb_server_keys_unique UNIQUE (server_name, server_key_id)
|
||||
);
|
||||
|
||||
|
@ -44,15 +47,16 @@ CREATE INDEX IF NOT EXISTS keydb_server_name_and_key_id ON keydb_server_keys (se
|
|||
`
|
||||
|
||||
const bulkSelectServerKeysSQL = "" +
|
||||
"SELECT server_name, server_key_id, server_key_json FROM keydb_server_keys" +
|
||||
"SELECT server_name, server_key_id, valid_until_ts, expired_ts, " +
|
||||
" server_key FROM keydb_server_keys" +
|
||||
" WHERE server_name_and_key_id = ANY($1)"
|
||||
|
||||
const upsertServerKeysSQL = "" +
|
||||
"INSERT INTO keydb_server_keys (server_name, server_key_id," +
|
||||
" server_name_and_key_id, valid_until_ts, server_key_json)" +
|
||||
" VALUES ($1, $2, $3, $4, $5)" +
|
||||
" server_name_and_key_id, valid_until_ts, expired_ts, server_key)" +
|
||||
" VALUES ($1, $2, $3, $4, $5, $6)" +
|
||||
" ON CONFLICT ON CONSTRAINT keydb_server_keys_unique" +
|
||||
" DO UPDATE SET valid_until_ts = $4, server_key_json = $5"
|
||||
" DO UPDATE SET valid_until_ts = $4, expired_ts = $5, server_key = $6"
|
||||
|
||||
type serverKeyStatements struct {
|
||||
bulkSelectServerKeysStmt *sql.Stmt
|
||||
|
@ -76,7 +80,7 @@ func (s *serverKeyStatements) prepare(db *sql.DB) (err error) {
|
|||
func (s *serverKeyStatements) bulkSelectServerKeys(
|
||||
ctx context.Context,
|
||||
requests map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.Timestamp,
|
||||
) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys, error) {
|
||||
) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult, error) {
|
||||
var nameAndKeyIDs []string
|
||||
for request := range requests {
|
||||
nameAndKeyIDs = append(nameAndKeyIDs, nameAndKeyID(request))
|
||||
|
@ -87,23 +91,30 @@ func (s *serverKeyStatements) bulkSelectServerKeys(
|
|||
return nil, err
|
||||
}
|
||||
defer rows.Close() // nolint: errcheck
|
||||
results := map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys{}
|
||||
results := map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult{}
|
||||
for rows.Next() {
|
||||
var serverName string
|
||||
var keyID string
|
||||
var keyJSON []byte
|
||||
if err := rows.Scan(&serverName, &keyID, &keyJSON); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
var serverKeys gomatrixserverlib.ServerKeys
|
||||
if err := json.Unmarshal(keyJSON, &serverKeys); err != nil {
|
||||
var key string
|
||||
var validUntilTS int64
|
||||
var expiredTS int64
|
||||
if err = rows.Scan(&serverName, &keyID, &validUntilTS, &expiredTS, &key); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
r := gomatrixserverlib.PublicKeyRequest{
|
||||
ServerName: gomatrixserverlib.ServerName(serverName),
|
||||
KeyID: gomatrixserverlib.KeyID(keyID),
|
||||
}
|
||||
results[r] = serverKeys
|
||||
vk := gomatrixserverlib.VerifyKey{}
|
||||
err = vk.Key.Decode(key)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
results[r] = gomatrixserverlib.PublicKeyLookupResult{
|
||||
VerifyKey: vk,
|
||||
ValidUntilTS: gomatrixserverlib.Timestamp(validUntilTS),
|
||||
ExpiredTS: gomatrixserverlib.Timestamp(expiredTS),
|
||||
}
|
||||
}
|
||||
return results, nil
|
||||
}
|
||||
|
@ -111,19 +122,16 @@ func (s *serverKeyStatements) bulkSelectServerKeys(
|
|||
func (s *serverKeyStatements) upsertServerKeys(
|
||||
ctx context.Context,
|
||||
request gomatrixserverlib.PublicKeyRequest,
|
||||
keys gomatrixserverlib.ServerKeys,
|
||||
key gomatrixserverlib.PublicKeyLookupResult,
|
||||
) error {
|
||||
keyJSON, err := json.Marshal(keys)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
_, err = s.upsertServerKeysStmt.ExecContext(
|
||||
_, err := s.upsertServerKeysStmt.ExecContext(
|
||||
ctx,
|
||||
string(request.ServerName),
|
||||
string(request.KeyID),
|
||||
nameAndKeyID(request),
|
||||
int64(keys.ValidUntilTS),
|
||||
keyJSON,
|
||||
key.ValidUntilTS,
|
||||
key.ExpiredTS,
|
||||
key.Key.Encode(),
|
||||
)
|
||||
return err
|
||||
}
|
||||
|
|
|
@ -38,7 +38,6 @@ func localKeys(cfg config.Dendrite, validUntil time.Time) (*gomatrixserverlib.Se
|
|||
var keys gomatrixserverlib.ServerKeys
|
||||
|
||||
keys.ServerName = cfg.Matrix.ServerName
|
||||
keys.FromServer = cfg.Matrix.ServerName
|
||||
|
||||
publicKey := cfg.Matrix.PrivateKey.Public().(ed25519.PublicKey)
|
||||
|
||||
|
|
2
vendor/manifest
vendored
2
vendor/manifest
vendored
|
@ -135,7 +135,7 @@
|
|||
{
|
||||
"importpath": "github.com/matrix-org/gomatrixserverlib",
|
||||
"repository": "https://github.com/matrix-org/gomatrixserverlib",
|
||||
"revision": "fb17c27f65a0699b0d15f5311a530225b4aea5e0",
|
||||
"revision": "076933f95312aae3a9476e78d6b4118e1b45d542",
|
||||
"branch": "master"
|
||||
},
|
||||
{
|
||||
|
|
|
@ -26,13 +26,31 @@ import (
|
|||
// When the bytes are unmarshalled from JSON they are decoded from base64.
|
||||
type Base64String []byte
|
||||
|
||||
// Encode encodes the bytes as base64
|
||||
func (b64 Base64String) Encode() string {
|
||||
return base64.RawStdEncoding.EncodeToString(b64)
|
||||
}
|
||||
|
||||
// Decode decodes the given input into this Base64String
|
||||
func (b64 *Base64String) Decode(str string) error {
|
||||
// We must check whether the string was encoded in a URL-safe way in order
|
||||
// to use the appropriate encoding.
|
||||
var err error
|
||||
if strings.ContainsAny(str, "-_") {
|
||||
*b64, err = base64.RawURLEncoding.DecodeString(str)
|
||||
} else {
|
||||
*b64, err = base64.RawStdEncoding.DecodeString(str)
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
// MarshalJSON encodes the bytes as base64 and then encodes the base64 as a JSON string.
|
||||
// This takes a value receiver so that maps and slices of Base64String encode correctly.
|
||||
func (b64 Base64String) MarshalJSON() ([]byte, error) {
|
||||
// This could be made more efficient by using base64.RawStdEncoding.Encode
|
||||
// to write the base64 directly to the JSON. We don't need to JSON escape
|
||||
// any of the characters used in base64.
|
||||
return json.Marshal(base64.RawStdEncoding.EncodeToString(b64))
|
||||
return json.Marshal(b64.Encode())
|
||||
}
|
||||
|
||||
// UnmarshalJSON decodes a JSON string and then decodes the resulting base64.
|
||||
|
@ -44,12 +62,6 @@ func (b64 *Base64String) UnmarshalJSON(raw []byte) (err error) {
|
|||
if err = json.Unmarshal(raw, &str); err != nil {
|
||||
return
|
||||
}
|
||||
// We must check whether the string was encoded in a URL-safe way in order
|
||||
// to use the appropriate encoding.
|
||||
if strings.ContainsAny(str, "-_") {
|
||||
*b64, err = base64.RawURLEncoding.DecodeString(str)
|
||||
} else {
|
||||
*b64, err = base64.RawStdEncoding.DecodeString(str)
|
||||
}
|
||||
err = b64.Decode(str)
|
||||
return
|
||||
}
|
||||
|
|
|
@ -26,10 +26,15 @@ import (
|
|||
"net/http"
|
||||
"net/url"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/matrix-org/gomatrix"
|
||||
"github.com/matrix-org/util"
|
||||
)
|
||||
|
||||
// Default HTTPS request timeout
|
||||
const requestTimeout time.Duration = time.Duration(30) * time.Second
|
||||
|
||||
// A Client makes request to the federation listeners of matrix
|
||||
// homeservers
|
||||
type Client struct {
|
||||
|
@ -41,9 +46,16 @@ type UserInfo struct {
|
|||
Sub string `json:"sub"`
|
||||
}
|
||||
|
||||
// NewClient makes a new Client
|
||||
// NewClient makes a new Client (with default timeout)
|
||||
func NewClient() *Client {
|
||||
return &Client{client: http.Client{Transport: newFederationTripper()}}
|
||||
return NewClientWithTimeout(requestTimeout)
|
||||
}
|
||||
|
||||
// NewClientWithTimeout makes a new Client with a specified request timeout
|
||||
func NewClientWithTimeout(timeout time.Duration) *Client {
|
||||
return &Client{client: http.Client{
|
||||
Transport: newFederationTripper(),
|
||||
Timeout: timeout}}
|
||||
}
|
||||
|
||||
type federationTripper struct {
|
||||
|
@ -132,7 +144,7 @@ func (fc *Client) LookupUserInfo(
|
|||
}
|
||||
|
||||
var response *http.Response
|
||||
response, err = fc.doHTTPRequest(ctx, req)
|
||||
response, err = fc.DoHTTPRequest(ctx, req)
|
||||
if response != nil {
|
||||
defer response.Body.Close() // nolint: errcheck
|
||||
}
|
||||
|
@ -171,10 +183,10 @@ func (fc *Client) LookupUserInfo(
|
|||
// Perspective servers can use that timestamp to determine whether they can
|
||||
// return a cached copy of the keys or whether they will need to retrieve a fresh
|
||||
// copy of the keys.
|
||||
// Returns the keys or an error if there was a problem talking to the server.
|
||||
func (fc *Client) LookupServerKeys( // nolint: gocyclo
|
||||
// Returns the keys returned by the server, or an error if there was a problem talking to the server.
|
||||
func (fc *Client) LookupServerKeys(
|
||||
ctx context.Context, matrixServer ServerName, keyRequests map[PublicKeyRequest]Timestamp,
|
||||
) (map[PublicKeyRequest]ServerKeys, error) {
|
||||
) ([]ServerKeys, error) {
|
||||
url := url.URL{
|
||||
Scheme: "matrix",
|
||||
Host: string(matrixServer),
|
||||
|
@ -203,48 +215,24 @@ func (fc *Client) LookupServerKeys( // nolint: gocyclo
|
|||
return nil, err
|
||||
}
|
||||
|
||||
var body struct {
|
||||
ServerKeyList []ServerKeys `json:"server_keys"`
|
||||
}
|
||||
|
||||
req, err := http.NewRequest("POST", url.String(), bytes.NewBuffer(requestBytes))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
req.Header.Add("Content-Type", "application/json")
|
||||
|
||||
response, err := fc.doHTTPRequest(ctx, req)
|
||||
if response != nil {
|
||||
defer response.Body.Close() // nolint: errcheck
|
||||
}
|
||||
err = fc.DoRequestAndParseResponse(
|
||||
ctx, req, &body,
|
||||
)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if response.StatusCode != 200 {
|
||||
var errorOutput []byte
|
||||
if errorOutput, err = ioutil.ReadAll(response.Body); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return nil, fmt.Errorf("HTTP %d : %s", response.StatusCode, errorOutput)
|
||||
}
|
||||
|
||||
var body struct {
|
||||
ServerKeyList []ServerKeys `json:"server_keys"`
|
||||
}
|
||||
if err = json.NewDecoder(response.Body).Decode(&body); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
result := map[PublicKeyRequest]ServerKeys{}
|
||||
for _, keys := range body.ServerKeyList {
|
||||
keys.FromServer = matrixServer
|
||||
// TODO: What happens if the same key ID appears in multiple responses?
|
||||
// We should probably take the response with the highest valid_until_ts.
|
||||
for keyID := range keys.VerifyKeys {
|
||||
result[PublicKeyRequest{keys.ServerName, keyID}] = keys
|
||||
}
|
||||
for keyID := range keys.OldVerifyKeys {
|
||||
result[PublicKeyRequest{keys.ServerName, keyID}] = keys
|
||||
}
|
||||
}
|
||||
return result, nil
|
||||
return body.ServerKeyList, nil
|
||||
}
|
||||
|
||||
// CreateMediaDownloadRequest creates a request for media on a homeserver and returns the http.Response or an error
|
||||
|
@ -257,10 +245,70 @@ func (fc *Client) CreateMediaDownloadRequest(
|
|||
return nil, err
|
||||
}
|
||||
|
||||
return fc.doHTTPRequest(ctx, req)
|
||||
return fc.DoHTTPRequest(ctx, req)
|
||||
}
|
||||
|
||||
func (fc *Client) doHTTPRequest(ctx context.Context, req *http.Request) (*http.Response, error) {
|
||||
// DoRequestAndParseResponse calls DoHTTPRequest and then decodes the response.
|
||||
//
|
||||
// If the HTTP response is not a 200, an attempt is made to parse the response
|
||||
// body into a gomatrix.RespError. In any case, a non-200 response will result
|
||||
// in a gomatrix.HTTPError.
|
||||
//
|
||||
func (fc *Client) DoRequestAndParseResponse(
|
||||
ctx context.Context,
|
||||
req *http.Request,
|
||||
result interface{},
|
||||
) error {
|
||||
response, err := fc.DoHTTPRequest(ctx, req)
|
||||
if response != nil {
|
||||
defer response.Body.Close() // nolint: errcheck
|
||||
}
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if response.StatusCode/100 != 2 { // not 2xx
|
||||
// Adapted from https://github.com/matrix-org/gomatrix/blob/master/client.go
|
||||
var contents []byte
|
||||
contents, err = ioutil.ReadAll(response.Body)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
var wrap error
|
||||
var respErr gomatrix.RespError
|
||||
if _ = json.Unmarshal(contents, &respErr); respErr.ErrCode != "" {
|
||||
wrap = respErr
|
||||
}
|
||||
|
||||
// If we failed to decode as RespError, don't just drop the HTTP body, include it in the
|
||||
// HTTP error instead (e.g proxy errors which return HTML).
|
||||
msg := "Failed to " + req.Method + " JSON to " + req.RequestURI
|
||||
if wrap == nil {
|
||||
msg = msg + ": " + string(contents)
|
||||
}
|
||||
|
||||
return gomatrix.HTTPError{
|
||||
Code: response.StatusCode,
|
||||
Message: msg,
|
||||
WrappedError: wrap,
|
||||
}
|
||||
}
|
||||
|
||||
if err = json.NewDecoder(response.Body).Decode(result); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// DoHTTPRequest creates an outgoing request ID and adds it to the context
|
||||
// before sending off the request and awaiting a response.
|
||||
//
|
||||
// If the returned error is nil, the Response will contain a non-nil
|
||||
// Body which the caller is expected to close.
|
||||
//
|
||||
func (fc *Client) DoHTTPRequest(ctx context.Context, req *http.Request) (*http.Response, error) {
|
||||
reqID := util.RandomString(12)
|
||||
logger := util.GetLogger(ctx).WithField("server", req.URL.Host).WithField("out.req.ID", reqID)
|
||||
newCtx := util.ContextWithLogger(ctx, logger)
|
||||
|
|
|
@ -2,17 +2,13 @@ package gomatrixserverlib
|
|||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
"net/url"
|
||||
|
||||
"github.com/matrix-org/gomatrix"
|
||||
"github.com/matrix-org/util"
|
||||
"golang.org/x/crypto/ed25519"
|
||||
)
|
||||
|
||||
// An FederationClient is a matrix federation client that adds
|
||||
// A FederationClient is a matrix federation client that adds
|
||||
// "Authorization: X-Matrix" headers to requests that need ed25519 signatures
|
||||
type FederationClient struct {
|
||||
Client
|
||||
|
@ -34,10 +30,6 @@ func NewFederationClient(
|
|||
}
|
||||
|
||||
func (ac *FederationClient) doRequest(ctx context.Context, r FederationRequest, resBody interface{}) error {
|
||||
reqID := util.RandomString(12)
|
||||
logger := util.GetLogger(ctx).WithField("server", r.fields.Destination).WithField("out.req.ID", reqID)
|
||||
newCtx := util.ContextWithLogger(ctx, logger)
|
||||
|
||||
if err := r.Sign(ac.serverName, ac.serverKeyID, ac.serverPrivateKey); err != nil {
|
||||
return err
|
||||
}
|
||||
|
@ -47,52 +39,7 @@ func (ac *FederationClient) doRequest(ctx context.Context, r FederationRequest,
|
|||
return err
|
||||
}
|
||||
|
||||
logger.Infof("Outgoing request %s %s", req.Method, req.URL)
|
||||
res, err := ac.client.Do(req.WithContext(newCtx))
|
||||
if res != nil {
|
||||
defer res.Body.Close() // nolint: errcheck
|
||||
}
|
||||
|
||||
if err != nil {
|
||||
logger.Infof("Outgoing request %s %s failed with %v", req.Method, req.URL, err)
|
||||
return err
|
||||
}
|
||||
|
||||
contents, err := ioutil.ReadAll(res.Body)
|
||||
|
||||
logger.Infof("Response %d from %s %s", res.StatusCode, req.Method, req.URL)
|
||||
|
||||
if res.StatusCode/100 != 2 { // not 2xx
|
||||
// Adapted from https://github.com/matrix-org/gomatrix/blob/master/client.go
|
||||
var wrap error
|
||||
var respErr gomatrix.RespError
|
||||
if _ = json.Unmarshal(contents, &respErr); respErr.ErrCode != "" {
|
||||
wrap = respErr
|
||||
}
|
||||
|
||||
// If we failed to decode as RespError, don't just drop the HTTP body, include it in the
|
||||
// HTTP error instead (e.g proxy errors which return HTML).
|
||||
msg := "Failed to " + r.Method() + " JSON to " + r.RequestURI()
|
||||
if wrap == nil {
|
||||
msg = msg + ": " + string(contents)
|
||||
}
|
||||
|
||||
return gomatrix.HTTPError{
|
||||
Code: res.StatusCode,
|
||||
Message: msg,
|
||||
WrappedError: wrap,
|
||||
}
|
||||
}
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if resBody == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
return json.Unmarshal(contents, resBody)
|
||||
return ac.Client.DoRequestAndParseResponse(ctx, req, resBody)
|
||||
}
|
||||
|
||||
var federationPathPrefix = "/_matrix/federation/v1"
|
||||
|
|
|
@ -17,6 +17,38 @@ type PublicKeyRequest struct {
|
|||
KeyID KeyID
|
||||
}
|
||||
|
||||
// PublicKeyNotExpired is a magic value for PublicKeyLookupResult.ExpiredTS:
|
||||
// it indicates that this is an active key which has not yet expired
|
||||
const PublicKeyNotExpired = Timestamp(0)
|
||||
|
||||
// PublicKeyNotValid is a magic value for PublicKeyLookupResult.ValidUntilTS:
|
||||
// it is used when we don't have a validity period for this key. Most likely
|
||||
// it is an old key with an expiry date.
|
||||
const PublicKeyNotValid = Timestamp(0)
|
||||
|
||||
// A PublicKeyLookupResult is the result of looking up a server signing key.
|
||||
type PublicKeyLookupResult struct {
|
||||
VerifyKey
|
||||
// if this key has expired, the time it stopped being valid for event signing in milliseconds.
|
||||
// if the key has not expired, the magic value PublicKeyNotExpired.
|
||||
ExpiredTS Timestamp
|
||||
// When this result is valid until in milliseconds.
|
||||
// if the key has expired, the magic value PublicKeyNotValid.
|
||||
ValidUntilTS Timestamp
|
||||
}
|
||||
|
||||
// WasValidAt checks if this signing key is valid for an event signed at the
|
||||
// given timestamp.
|
||||
func (r PublicKeyLookupResult) WasValidAt(atTs Timestamp) bool {
|
||||
if r.ExpiredTS != PublicKeyNotExpired && atTs >= r.ExpiredTS {
|
||||
return false
|
||||
}
|
||||
if r.ValidUntilTS == PublicKeyNotValid || atTs > r.ValidUntilTS {
|
||||
return false
|
||||
}
|
||||
return true
|
||||
}
|
||||
|
||||
// A KeyFetcher is a way of fetching public keys in bulk.
|
||||
type KeyFetcher interface {
|
||||
// Lookup a batch of public keys.
|
||||
|
@ -27,7 +59,7 @@ type KeyFetcher interface {
|
|||
// The result may have fewer (server name, key ID) pairs than were in the request.
|
||||
// The result may have more (server name, key ID) pairs than were in the request.
|
||||
// Returns an error if there was a problem fetching the keys.
|
||||
FetchKeys(ctx context.Context, requests map[PublicKeyRequest]Timestamp) (map[PublicKeyRequest]ServerKeys, error)
|
||||
FetchKeys(ctx context.Context, requests map[PublicKeyRequest]Timestamp) (map[PublicKeyRequest]PublicKeyLookupResult, error)
|
||||
}
|
||||
|
||||
// A KeyDatabase is a store for caching public keys.
|
||||
|
@ -40,7 +72,7 @@ type KeyDatabase interface {
|
|||
// to a concurrent FetchKeys(). This is acceptable since the database is
|
||||
// only used as a cache for the keys, so if a FetchKeys() races with a
|
||||
// StoreKeys() and some of the keys are missing they will be just be refetched.
|
||||
StoreKeys(ctx context.Context, results map[PublicKeyRequest]ServerKeys) error
|
||||
StoreKeys(ctx context.Context, results map[PublicKeyRequest]PublicKeyLookupResult) error
|
||||
}
|
||||
|
||||
// A KeyRing stores keys for matrix servers and provides methods for verifying JSON messages.
|
||||
|
@ -123,6 +155,8 @@ func (k KeyRing) VerifyJSONs(ctx context.Context, requests []VerifyJSONRequest)
|
|||
k.checkUsingKeys(requests, results, keyIDs, keysFromDatabase)
|
||||
|
||||
for i := range k.KeyFetchers {
|
||||
// TODO: we should distinguish here between expired keys, and those we don't have.
|
||||
// If the key has expired, it's no use re-requesting it.
|
||||
keyRequests := k.publicKeyRequests(requests, results, keyIDs)
|
||||
if len(keyRequests) == 0 {
|
||||
// There aren't any keys to fetch so we can stop here.
|
||||
|
@ -178,7 +212,7 @@ func (k *KeyRing) publicKeyRequests(
|
|||
|
||||
func (k *KeyRing) checkUsingKeys(
|
||||
requests []VerifyJSONRequest, results []VerifyJSONResult, keyIDs [][]KeyID,
|
||||
keys map[PublicKeyRequest]ServerKeys,
|
||||
keys map[PublicKeyRequest]PublicKeyLookupResult,
|
||||
) {
|
||||
for i := range requests {
|
||||
if results[i].Error == nil {
|
||||
|
@ -187,13 +221,12 @@ func (k *KeyRing) checkUsingKeys(
|
|||
continue
|
||||
}
|
||||
for _, keyID := range keyIDs[i] {
|
||||
serverKeys, ok := keys[PublicKeyRequest{requests[i].ServerName, keyID}]
|
||||
serverKey, ok := keys[PublicKeyRequest{requests[i].ServerName, keyID}]
|
||||
if !ok {
|
||||
// No key for this key ID so we continue onto the next key ID.
|
||||
continue
|
||||
}
|
||||
publicKey := serverKeys.PublicKey(keyID, requests[i].AtTS)
|
||||
if publicKey == nil {
|
||||
if !serverKey.WasValidAt(requests[i].AtTS) {
|
||||
// The key wasn't valid at the timestamp we needed it to be valid at.
|
||||
// So skip onto the next key.
|
||||
results[i].Error = fmt.Errorf(
|
||||
|
@ -203,7 +236,7 @@ func (k *KeyRing) checkUsingKeys(
|
|||
continue
|
||||
}
|
||||
if err := VerifyJSON(
|
||||
string(requests[i].ServerName), keyID, ed25519.PublicKey(publicKey), requests[i].Message,
|
||||
string(requests[i].ServerName), keyID, ed25519.PublicKey(serverKey.Key), requests[i].Message,
|
||||
); err != nil {
|
||||
// The signature wasn't valid, record the error and try the next key ID.
|
||||
results[i].Error = err
|
||||
|
@ -229,13 +262,15 @@ type PerspectiveKeyFetcher struct {
|
|||
// FetchKeys implements KeyFetcher
|
||||
func (p *PerspectiveKeyFetcher) FetchKeys(
|
||||
ctx context.Context, requests map[PublicKeyRequest]Timestamp,
|
||||
) (map[PublicKeyRequest]ServerKeys, error) {
|
||||
results, err := p.Client.LookupServerKeys(ctx, p.PerspectiveServerName, requests)
|
||||
) (map[PublicKeyRequest]PublicKeyLookupResult, error) {
|
||||
serverKeys, err := p.Client.LookupServerKeys(ctx, p.PerspectiveServerName, requests)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for req, keys := range results {
|
||||
results := map[PublicKeyRequest]PublicKeyLookupResult{}
|
||||
|
||||
for _, keys := range serverKeys {
|
||||
var valid bool
|
||||
keyIDs, err := ListKeyIDs(string(p.PerspectiveServerName), keys.Raw)
|
||||
if err != nil {
|
||||
|
@ -261,12 +296,16 @@ func (p *PerspectiveKeyFetcher) FetchKeys(
|
|||
return nil, fmt.Errorf("gomatrixserverlib: not signed with a known key for the perspective server")
|
||||
}
|
||||
|
||||
// Check that the keys are valid for the server.
|
||||
checks, _, _ := CheckKeys(req.ServerName, time.Unix(0, 0), keys, nil)
|
||||
// Check that the keys are valid for the server they claim to be
|
||||
checks, _, _ := CheckKeys(keys.ServerName, time.Unix(0, 0), keys, nil)
|
||||
if !checks.AllChecksOK {
|
||||
// This is bad because it means that the perspective server was trying to feed us an invalid response.
|
||||
return nil, fmt.Errorf("gomatrixserverlib: key response from perspective server failed checks")
|
||||
}
|
||||
|
||||
// TODO: What happens if the same key ID appears in multiple responses?
|
||||
// We should probably take the response with the highest valid_until_ts.
|
||||
mapServerKeysToPublicKeyLookupResult(keys, results)
|
||||
}
|
||||
|
||||
return results, nil
|
||||
|
@ -282,7 +321,7 @@ type DirectKeyFetcher struct {
|
|||
// FetchKeys implements KeyFetcher
|
||||
func (d *DirectKeyFetcher) FetchKeys(
|
||||
ctx context.Context, requests map[PublicKeyRequest]Timestamp,
|
||||
) (map[PublicKeyRequest]ServerKeys, error) {
|
||||
) (map[PublicKeyRequest]PublicKeyLookupResult, error) {
|
||||
byServer := map[ServerName]map[PublicKeyRequest]Timestamp{}
|
||||
for req, ts := range requests {
|
||||
server := byServer[req.ServerName]
|
||||
|
@ -293,7 +332,7 @@ func (d *DirectKeyFetcher) FetchKeys(
|
|||
server[req] = ts
|
||||
}
|
||||
|
||||
results := map[PublicKeyRequest]ServerKeys{}
|
||||
results := map[PublicKeyRequest]PublicKeyLookupResult{}
|
||||
for server, reqs := range byServer {
|
||||
// TODO: make these requests in parallel
|
||||
serverResults, err := d.fetchKeysForServer(ctx, server, reqs)
|
||||
|
@ -310,19 +349,50 @@ func (d *DirectKeyFetcher) FetchKeys(
|
|||
|
||||
func (d *DirectKeyFetcher) fetchKeysForServer(
|
||||
ctx context.Context, serverName ServerName, requests map[PublicKeyRequest]Timestamp,
|
||||
) (map[PublicKeyRequest]ServerKeys, error) {
|
||||
results, err := d.Client.LookupServerKeys(ctx, serverName, requests)
|
||||
) (map[PublicKeyRequest]PublicKeyLookupResult, error) {
|
||||
serverKeys, err := d.Client.LookupServerKeys(ctx, serverName, requests)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for req, keys := range results {
|
||||
results := map[PublicKeyRequest]PublicKeyLookupResult{}
|
||||
for _, keys := range serverKeys {
|
||||
// Check that the keys are valid for the server.
|
||||
checks, _, _ := CheckKeys(req.ServerName, time.Unix(0, 0), keys, nil)
|
||||
checks, _, _ := CheckKeys(serverName, time.Unix(0, 0), keys, nil)
|
||||
if !checks.AllChecksOK {
|
||||
return nil, fmt.Errorf("gomatrixserverlib: key response direct from %q failed checks", serverName)
|
||||
}
|
||||
|
||||
// TODO: What happens if the same key ID appears in multiple responses?
|
||||
// We should probably take the response with the highest valid_until_ts.
|
||||
mapServerKeysToPublicKeyLookupResult(keys, results)
|
||||
}
|
||||
|
||||
return results, nil
|
||||
}
|
||||
|
||||
// mapServerKeysToPublicKeyLookupResult takes the (verified) result from a
|
||||
// /key/v2/query call and inserts it into a PublicKeyRequest->PublicKeyLookupResult
|
||||
// map.
|
||||
func mapServerKeysToPublicKeyLookupResult(serverKeys ServerKeys, results map[PublicKeyRequest]PublicKeyLookupResult) {
|
||||
for keyID, key := range serverKeys.VerifyKeys {
|
||||
results[PublicKeyRequest{
|
||||
ServerName: serverKeys.ServerName,
|
||||
KeyID: keyID,
|
||||
}] = PublicKeyLookupResult{
|
||||
VerifyKey: key,
|
||||
ValidUntilTS: serverKeys.ValidUntilTS,
|
||||
ExpiredTS: PublicKeyNotExpired,
|
||||
}
|
||||
}
|
||||
for keyID, key := range serverKeys.OldVerifyKeys {
|
||||
results[PublicKeyRequest{
|
||||
ServerName: serverKeys.ServerName,
|
||||
KeyID: keyID,
|
||||
}] = PublicKeyLookupResult{
|
||||
VerifyKey: key.VerifyKey,
|
||||
ValidUntilTS: PublicKeyNotValid,
|
||||
ExpiredTS: key.ExpiredTS,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -2,7 +2,6 @@ package gomatrixserverlib
|
|||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"testing"
|
||||
)
|
||||
|
||||
|
@ -39,26 +38,44 @@ type testKeyDatabase struct{}
|
|||
|
||||
func (db *testKeyDatabase) FetchKeys(
|
||||
ctx context.Context, requests map[PublicKeyRequest]Timestamp,
|
||||
) (map[PublicKeyRequest]ServerKeys, error) {
|
||||
results := map[PublicKeyRequest]ServerKeys{}
|
||||
var keys ServerKeys
|
||||
if err := json.Unmarshal([]byte(testKeys), &keys); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
) (map[PublicKeyRequest]PublicKeyLookupResult, error) {
|
||||
results := map[PublicKeyRequest]PublicKeyLookupResult{}
|
||||
|
||||
req1 := PublicKeyRequest{"localhost:8800", "ed25519:old"}
|
||||
req2 := PublicKeyRequest{"localhost:8800", "ed25519:a_Obwu"}
|
||||
|
||||
for req := range requests {
|
||||
if req == req1 || req == req2 {
|
||||
results[req] = keys
|
||||
if req == req1 {
|
||||
vk := VerifyKey{}
|
||||
err := vk.Key.Decode("O2onvM62pC1io6jQKm8Nc2UyFXcd4kOmOsBIoYtZ2ik")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
results[req] = PublicKeyLookupResult{
|
||||
VerifyKey: vk,
|
||||
ValidUntilTS: PublicKeyNotValid,
|
||||
ExpiredTS: 929059200,
|
||||
}
|
||||
}
|
||||
|
||||
if req == req2 {
|
||||
vk := VerifyKey{}
|
||||
err := vk.Key.Decode("2UwTWD4+tgTgENV7znGGNqhAOGY+BW1mRAnC6W6FBQg")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
results[req] = PublicKeyLookupResult{
|
||||
VerifyKey: vk,
|
||||
ValidUntilTS: 1493142432964,
|
||||
ExpiredTS: PublicKeyNotExpired,
|
||||
}
|
||||
}
|
||||
}
|
||||
return results, nil
|
||||
}
|
||||
|
||||
func (db *testKeyDatabase) StoreKeys(
|
||||
ctx context.Context, requests map[PublicKeyRequest]ServerKeys,
|
||||
ctx context.Context, requests map[PublicKeyRequest]PublicKeyLookupResult,
|
||||
) error {
|
||||
return nil
|
||||
}
|
||||
|
@ -136,12 +153,12 @@ var testErrorStore = erroringKeyDatabaseError(2)
|
|||
|
||||
func (e *erroringKeyDatabase) FetchKeys(
|
||||
ctx context.Context, requests map[PublicKeyRequest]Timestamp,
|
||||
) (map[PublicKeyRequest]ServerKeys, error) {
|
||||
) (map[PublicKeyRequest]PublicKeyLookupResult, error) {
|
||||
return nil, &testErrorFetch
|
||||
}
|
||||
|
||||
func (e *erroringKeyDatabase) StoreKeys(
|
||||
ctx context.Context, keys map[PublicKeyRequest]ServerKeys,
|
||||
ctx context.Context, keys map[PublicKeyRequest]PublicKeyLookupResult,
|
||||
) error {
|
||||
return &testErrorStore
|
||||
}
|
||||
|
|
|
@ -37,8 +37,6 @@ type ServerName string
|
|||
type ServerKeys struct {
|
||||
// Copy of the raw JSON for signature checking.
|
||||
Raw []byte
|
||||
// The server the raw JSON was downloaded from.
|
||||
FromServer ServerName
|
||||
// The decoded JSON fields.
|
||||
ServerKeyFields
|
||||
}
|
||||
|
@ -140,7 +138,6 @@ func FetchKeysDirect(serverName ServerName, addr, sni string) (*ServerKeys, *tls
|
|||
return nil, nil, err
|
||||
}
|
||||
var keys ServerKeys
|
||||
keys.FromServer = serverName
|
||||
if err = json.NewDecoder(response.Body).Decode(&keys); err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
"golint",
|
||||
"varcheck",
|
||||
"structcheck",
|
||||
"aligncheck",
|
||||
"maligned",
|
||||
"ineffassign",
|
||||
"gas",
|
||||
"misspell",
|
||||
|
|
Loading…
Reference in a new issue