use crate::{database::Config, utils, Error, Result}; use log::{error, info}; use ruma::{ api::federation::discovery::{ServerSigningKeys, VerifyKey}, ServerName, ServerSigningKeyId, }; use rustls::{ServerCertVerifier, WebPKIVerifier}; use std::{ collections::{BTreeMap, HashMap}, sync::{Arc, RwLock}, time::Duration, }; use trust_dns_resolver::TokioAsyncResolver; pub const COUNTER: &str = "c"; type WellKnownMap = HashMap, (String, String)>; type TlsNameMap = HashMap; #[derive(Clone)] pub struct Globals { pub actual_destination_cache: Arc>, // actual_destination, host pub tls_name_override: Arc>, pub(super) globals: sled::Tree, config: Config, keypair: Arc, reqwest_client: reqwest::Client, dns_resolver: TokioAsyncResolver, jwt_decoding_key: Option>, pub(super) servertimeout_signingkey: sled::Tree, // ServerName + Timeout Timestamp -> algorithm:key + pubkey } struct MatrixServerVerifier { inner: WebPKIVerifier, tls_name_override: Arc>, } impl ServerCertVerifier for MatrixServerVerifier { fn verify_server_cert( &self, roots: &rustls::RootCertStore, presented_certs: &[rustls::Certificate], dns_name: webpki::DNSNameRef<'_>, ocsp_response: &[u8], ) -> std::result::Result { if let Some(override_name) = self.tls_name_override.read().unwrap().get(dns_name.into()) { let result = self.inner.verify_server_cert( roots, presented_certs, override_name.as_ref(), ocsp_response, ); if result.is_ok() { return result; } info!("Server {:?} is non-compliant, retrying TLS verification with original name", dns_name); } self.inner .verify_server_cert(roots, presented_certs, dns_name, ocsp_response) } } impl Globals { pub fn load( globals: sled::Tree, servertimeout_signingkey: sled::Tree, config: Config, ) -> Result { let bytes = &*globals .update_and_fetch("keypair", utils::generate_keypair)? .expect("utils::generate_keypair always returns Some"); let mut parts = bytes.splitn(2, |&b| b == 0xff); let keypair = utils::string_from_bytes( // 1. version parts .next() .expect("splitn always returns at least one element"), ) .map_err(|_| Error::bad_database("Invalid version bytes in keypair.")) .and_then(|version| { // 2. key parts .next() .ok_or_else(|| Error::bad_database("Invalid keypair format in database.")) .map(|key| (version, key)) }) .and_then(|(version, key)| { ruma::signatures::Ed25519KeyPair::new(&key, version) .map_err(|_| Error::bad_database("Private or public keys are invalid.")) }); let keypair = match keypair { Ok(k) => k, Err(e) => { error!("Keypair invalid. Deleting..."); globals.remove("keypair")?; return Err(e); } }; let tls_name_override = Arc::new(RwLock::new(TlsNameMap::new())); let verifier = Arc::new(MatrixServerVerifier { inner: WebPKIVerifier::new(), tls_name_override: tls_name_override.clone(), }); let mut tlsconfig = rustls::ClientConfig::new(); tlsconfig.dangerous().set_certificate_verifier(verifier); tlsconfig.root_store = rustls_native_certs::load_native_certs().expect("Error loading system certificates"); let reqwest_client = reqwest::Client::builder() .connect_timeout(Duration::from_secs(30)) .timeout(Duration::from_secs(60 * 3)) .pool_max_idle_per_host(1) .use_preconfigured_tls(tlsconfig) .build() .unwrap(); let jwt_decoding_key = config .jwt_secret .as_ref() .map(|secret| jsonwebtoken::DecodingKey::from_secret(secret.as_bytes()).into_static()); Ok(Self { globals, config, keypair: Arc::new(keypair), reqwest_client, dns_resolver: TokioAsyncResolver::tokio_from_system_conf().map_err(|_| { Error::bad_config("Failed to set up trust dns resolver with system config.") })?, actual_destination_cache: Arc::new(RwLock::new(WellKnownMap::new())), tls_name_override, servertimeout_signingkey, jwt_decoding_key, }) } /// Returns this server's keypair. pub fn keypair(&self) -> &ruma::signatures::Ed25519KeyPair { &self.keypair } /// Returns a reqwest client which can be used to send requests. pub fn reqwest_client(&self) -> &reqwest::Client { &self.reqwest_client } pub fn next_count(&self) -> Result { Ok(utils::u64_from_bytes( &self .globals .update_and_fetch(COUNTER, utils::increment)? .expect("utils::increment will always put in a value"), ) .map_err(|_| Error::bad_database("Count has invalid bytes."))?) } pub fn current_count(&self) -> Result { self.globals.get(COUNTER)?.map_or(Ok(0_u64), |bytes| { Ok(utils::u64_from_bytes(&bytes) .map_err(|_| Error::bad_database("Count has invalid bytes."))?) }) } pub fn server_name(&self) -> &ServerName { self.config.server_name.as_ref() } pub fn max_request_size(&self) -> u32 { self.config.max_request_size } pub fn allow_registration(&self) -> bool { self.config.allow_registration } pub fn allow_encryption(&self) -> bool { self.config.allow_encryption } pub fn allow_federation(&self) -> bool { self.config.allow_federation } pub fn trusted_servers(&self) -> &[Box] { &self.config.trusted_servers } pub fn dns_resolver(&self) -> &TokioAsyncResolver { &self.dns_resolver } pub fn jwt_decoding_key(&self) -> Option<&jsonwebtoken::DecodingKey<'_>> { self.jwt_decoding_key.as_ref() } /// TODO: the key valid until timestamp is only honored in room version > 4 /// Remove the outdated keys and insert the new ones. /// /// This doesn't actually check that the keys provided are newer than the old set. pub fn add_signing_key(&self, origin: &ServerName, keys: &ServerSigningKeys) -> Result<()> { let mut key1 = origin.as_bytes().to_vec(); key1.push(0xff); let mut key2 = key1.clone(); let ts = keys .valid_until_ts .duration_since(std::time::UNIX_EPOCH) .expect("time is valid") .as_millis() as u64; key1.extend_from_slice(&ts.to_be_bytes()); key2.extend_from_slice(&(ts + 1).to_be_bytes()); self.servertimeout_signingkey.insert( key1, serde_json::to_vec(&keys.verify_keys).expect("ServerSigningKeys are a valid string"), )?; self.servertimeout_signingkey.insert( key2, serde_json::to_vec(&keys.old_verify_keys) .expect("ServerSigningKeys are a valid string"), )?; Ok(()) } /// This returns an empty `Ok(BTreeMap<..>)` when there are no keys found for the server. pub fn signing_keys_for( &self, origin: &ServerName, ) -> Result> { let mut response = BTreeMap::new(); let now = crate::utils::millis_since_unix_epoch(); for item in self.servertimeout_signingkey.scan_prefix(origin.as_bytes()) { let (k, bytes) = item?; let valid_until = k .splitn(2, |&b| b == 0xff) .nth(1) .map(crate::utils::u64_from_bytes) .ok_or_else(|| Error::bad_database("Invalid signing keys."))? .map_err(|_| Error::bad_database("Invalid signing key valid until bytes"))?; // If these keys are still valid use em! if valid_until > now { let btree: BTreeMap<_, _> = serde_json::from_slice(&bytes) .map_err(|_| Error::bad_database("Invalid BTreeMap<> of signing keys"))?; response.extend(btree); } } Ok(response) } }