diff --git a/src/github.com/matrix-org/dendrite/common/keydb/keydb.go b/src/github.com/matrix-org/dendrite/common/keydb/keydb.go index 51444ab2..9e59f0ca 100644 --- a/src/github.com/matrix-org/dendrite/common/keydb/keydb.go +++ b/src/github.com/matrix-org/dendrite/common/keydb/keydb.go @@ -48,14 +48,14 @@ func NewDatabase(dataSourceName string) (*Database, error) { func (d *Database) FetchKeys( ctx context.Context, requests map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.Timestamp, -) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys, error) { +) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult, error) { return d.statements.bulkSelectServerKeys(ctx, requests) } // StoreKeys implements gomatrixserverlib.KeyDatabase func (d *Database) StoreKeys( ctx context.Context, - keyMap map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys, + keyMap map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult, ) error { // TODO: Inserting all the keys within a single transaction may // be more efficient since the transaction overhead can be quite diff --git a/src/github.com/matrix-org/dendrite/common/keydb/server_key_table.go b/src/github.com/matrix-org/dendrite/common/keydb/server_key_table.go index 7d9455c1..e3f2d0d0 100644 --- a/src/github.com/matrix-org/dendrite/common/keydb/server_key_table.go +++ b/src/github.com/matrix-org/dendrite/common/keydb/server_key_table.go @@ -17,14 +17,13 @@ package keydb import ( "context" "database/sql" - "encoding/json" "github.com/lib/pq" "github.com/matrix-org/gomatrixserverlib" ) const serverKeysSchema = ` --- A cache of server keys downloaded from remote servers. +-- A cache of signing keys downloaded from remote servers. CREATE TABLE IF NOT EXISTS keydb_server_keys ( -- The name of the matrix server the key is for. server_name TEXT NOT NULL, @@ -33,10 +32,14 @@ CREATE TABLE IF NOT EXISTS keydb_server_keys ( -- Combined server name and key ID separated by the ASCII unit separator -- to make it easier to run bulk queries. server_name_and_key_id TEXT NOT NULL, - -- When the keys are valid until as a millisecond timestamp. + -- When the key is valid until as a millisecond timestamp. + -- 0 if this is an expired key (in which case expired_ts will be non-zero) valid_until_ts BIGINT NOT NULL, - -- The raw JSON for the server key. - server_key_json TEXT NOT NULL, + -- When the key expired as a millisecond timestamp. + -- 0 if this is an active key (in which case valid_until_ts will be non-zero) + expired_ts BIGINT NOT NULL, + -- The base64-encoded public key. + server_key TEXT NOT NULL, CONSTRAINT keydb_server_keys_unique UNIQUE (server_name, server_key_id) ); @@ -44,15 +47,16 @@ CREATE INDEX IF NOT EXISTS keydb_server_name_and_key_id ON keydb_server_keys (se ` const bulkSelectServerKeysSQL = "" + - "SELECT server_name, server_key_id, server_key_json FROM keydb_server_keys" + + "SELECT server_name, server_key_id, valid_until_ts, expired_ts, " + + " server_key FROM keydb_server_keys" + " WHERE server_name_and_key_id = ANY($1)" const upsertServerKeysSQL = "" + "INSERT INTO keydb_server_keys (server_name, server_key_id," + - " server_name_and_key_id, valid_until_ts, server_key_json)" + - " VALUES ($1, $2, $3, $4, $5)" + + " server_name_and_key_id, valid_until_ts, expired_ts, server_key)" + + " VALUES ($1, $2, $3, $4, $5, $6)" + " ON CONFLICT ON CONSTRAINT keydb_server_keys_unique" + - " DO UPDATE SET valid_until_ts = $4, server_key_json = $5" + " DO UPDATE SET valid_until_ts = $4, expired_ts = $5, server_key = $6" type serverKeyStatements struct { bulkSelectServerKeysStmt *sql.Stmt @@ -76,7 +80,7 @@ func (s *serverKeyStatements) prepare(db *sql.DB) (err error) { func (s *serverKeyStatements) bulkSelectServerKeys( ctx context.Context, requests map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.Timestamp, -) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys, error) { +) (map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult, error) { var nameAndKeyIDs []string for request := range requests { nameAndKeyIDs = append(nameAndKeyIDs, nameAndKeyID(request)) @@ -87,23 +91,30 @@ func (s *serverKeyStatements) bulkSelectServerKeys( return nil, err } defer rows.Close() // nolint: errcheck - results := map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.ServerKeys{} + results := map[gomatrixserverlib.PublicKeyRequest]gomatrixserverlib.PublicKeyLookupResult{} for rows.Next() { var serverName string var keyID string - var keyJSON []byte - if err := rows.Scan(&serverName, &keyID, &keyJSON); err != nil { - return nil, err - } - var serverKeys gomatrixserverlib.ServerKeys - if err := json.Unmarshal(keyJSON, &serverKeys); err != nil { + var key string + var validUntilTS int64 + var expiredTS int64 + if err = rows.Scan(&serverName, &keyID, &validUntilTS, &expiredTS, &key); err != nil { return nil, err } r := gomatrixserverlib.PublicKeyRequest{ ServerName: gomatrixserverlib.ServerName(serverName), KeyID: gomatrixserverlib.KeyID(keyID), } - results[r] = serverKeys + vk := gomatrixserverlib.VerifyKey{} + err = vk.Key.Decode(key) + if err != nil { + return nil, err + } + results[r] = gomatrixserverlib.PublicKeyLookupResult{ + VerifyKey: vk, + ValidUntilTS: gomatrixserverlib.Timestamp(validUntilTS), + ExpiredTS: gomatrixserverlib.Timestamp(expiredTS), + } } return results, nil } @@ -111,19 +122,16 @@ func (s *serverKeyStatements) bulkSelectServerKeys( func (s *serverKeyStatements) upsertServerKeys( ctx context.Context, request gomatrixserverlib.PublicKeyRequest, - keys gomatrixserverlib.ServerKeys, + key gomatrixserverlib.PublicKeyLookupResult, ) error { - keyJSON, err := json.Marshal(keys) - if err != nil { - return err - } - _, err = s.upsertServerKeysStmt.ExecContext( + _, err := s.upsertServerKeysStmt.ExecContext( ctx, string(request.ServerName), string(request.KeyID), nameAndKeyID(request), - int64(keys.ValidUntilTS), - keyJSON, + key.ValidUntilTS, + key.ExpiredTS, + key.Key.Encode(), ) return err } diff --git a/src/github.com/matrix-org/dendrite/federationapi/routing/keys.go b/src/github.com/matrix-org/dendrite/federationapi/routing/keys.go index ea44e4c0..b96d8c5c 100644 --- a/src/github.com/matrix-org/dendrite/federationapi/routing/keys.go +++ b/src/github.com/matrix-org/dendrite/federationapi/routing/keys.go @@ -38,7 +38,6 @@ func localKeys(cfg config.Dendrite, validUntil time.Time) (*gomatrixserverlib.Se var keys gomatrixserverlib.ServerKeys keys.ServerName = cfg.Matrix.ServerName - keys.FromServer = cfg.Matrix.ServerName publicKey := cfg.Matrix.PrivateKey.Public().(ed25519.PublicKey) diff --git a/vendor/manifest b/vendor/manifest index 6ee014b4..ff61798d 100644 --- a/vendor/manifest +++ b/vendor/manifest @@ -135,7 +135,7 @@ { "importpath": "github.com/matrix-org/gomatrixserverlib", "repository": "https://github.com/matrix-org/gomatrixserverlib", - "revision": "fb17c27f65a0699b0d15f5311a530225b4aea5e0", + "revision": "076933f95312aae3a9476e78d6b4118e1b45d542", "branch": "master" }, { diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/base64.go b/vendor/src/github.com/matrix-org/gomatrixserverlib/base64.go index 63ff90bc..38ae7695 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/base64.go +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/base64.go @@ -26,13 +26,31 @@ import ( // When the bytes are unmarshalled from JSON they are decoded from base64. type Base64String []byte +// Encode encodes the bytes as base64 +func (b64 Base64String) Encode() string { + return base64.RawStdEncoding.EncodeToString(b64) +} + +// Decode decodes the given input into this Base64String +func (b64 *Base64String) Decode(str string) error { + // We must check whether the string was encoded in a URL-safe way in order + // to use the appropriate encoding. + var err error + if strings.ContainsAny(str, "-_") { + *b64, err = base64.RawURLEncoding.DecodeString(str) + } else { + *b64, err = base64.RawStdEncoding.DecodeString(str) + } + return err +} + // MarshalJSON encodes the bytes as base64 and then encodes the base64 as a JSON string. // This takes a value receiver so that maps and slices of Base64String encode correctly. func (b64 Base64String) MarshalJSON() ([]byte, error) { // This could be made more efficient by using base64.RawStdEncoding.Encode // to write the base64 directly to the JSON. We don't need to JSON escape // any of the characters used in base64. - return json.Marshal(base64.RawStdEncoding.EncodeToString(b64)) + return json.Marshal(b64.Encode()) } // UnmarshalJSON decodes a JSON string and then decodes the resulting base64. @@ -44,12 +62,6 @@ func (b64 *Base64String) UnmarshalJSON(raw []byte) (err error) { if err = json.Unmarshal(raw, &str); err != nil { return } - // We must check whether the string was encoded in a URL-safe way in order - // to use the appropriate encoding. - if strings.ContainsAny(str, "-_") { - *b64, err = base64.RawURLEncoding.DecodeString(str) - } else { - *b64, err = base64.RawStdEncoding.DecodeString(str) - } + err = b64.Decode(str) return } diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/client.go b/vendor/src/github.com/matrix-org/gomatrixserverlib/client.go index 4274169a..cad361ae 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/client.go +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/client.go @@ -26,10 +26,15 @@ import ( "net/http" "net/url" "strings" + "time" + "github.com/matrix-org/gomatrix" "github.com/matrix-org/util" ) +// Default HTTPS request timeout +const requestTimeout time.Duration = time.Duration(30) * time.Second + // A Client makes request to the federation listeners of matrix // homeservers type Client struct { @@ -41,9 +46,16 @@ type UserInfo struct { Sub string `json:"sub"` } -// NewClient makes a new Client +// NewClient makes a new Client (with default timeout) func NewClient() *Client { - return &Client{client: http.Client{Transport: newFederationTripper()}} + return NewClientWithTimeout(requestTimeout) +} + +// NewClientWithTimeout makes a new Client with a specified request timeout +func NewClientWithTimeout(timeout time.Duration) *Client { + return &Client{client: http.Client{ + Transport: newFederationTripper(), + Timeout: timeout}} } type federationTripper struct { @@ -132,7 +144,7 @@ func (fc *Client) LookupUserInfo( } var response *http.Response - response, err = fc.doHTTPRequest(ctx, req) + response, err = fc.DoHTTPRequest(ctx, req) if response != nil { defer response.Body.Close() // nolint: errcheck } @@ -171,10 +183,10 @@ func (fc *Client) LookupUserInfo( // Perspective servers can use that timestamp to determine whether they can // return a cached copy of the keys or whether they will need to retrieve a fresh // copy of the keys. -// Returns the keys or an error if there was a problem talking to the server. -func (fc *Client) LookupServerKeys( // nolint: gocyclo +// Returns the keys returned by the server, or an error if there was a problem talking to the server. +func (fc *Client) LookupServerKeys( ctx context.Context, matrixServer ServerName, keyRequests map[PublicKeyRequest]Timestamp, -) (map[PublicKeyRequest]ServerKeys, error) { +) ([]ServerKeys, error) { url := url.URL{ Scheme: "matrix", Host: string(matrixServer), @@ -203,48 +215,24 @@ func (fc *Client) LookupServerKeys( // nolint: gocyclo return nil, err } + var body struct { + ServerKeyList []ServerKeys `json:"server_keys"` + } + req, err := http.NewRequest("POST", url.String(), bytes.NewBuffer(requestBytes)) if err != nil { return nil, err } req.Header.Add("Content-Type", "application/json") - response, err := fc.doHTTPRequest(ctx, req) - if response != nil { - defer response.Body.Close() // nolint: errcheck - } + err = fc.DoRequestAndParseResponse( + ctx, req, &body, + ) if err != nil { return nil, err } - if response.StatusCode != 200 { - var errorOutput []byte - if errorOutput, err = ioutil.ReadAll(response.Body); err != nil { - return nil, err - } - return nil, fmt.Errorf("HTTP %d : %s", response.StatusCode, errorOutput) - } - - var body struct { - ServerKeyList []ServerKeys `json:"server_keys"` - } - if err = json.NewDecoder(response.Body).Decode(&body); err != nil { - return nil, err - } - - result := map[PublicKeyRequest]ServerKeys{} - for _, keys := range body.ServerKeyList { - keys.FromServer = matrixServer - // TODO: What happens if the same key ID appears in multiple responses? - // We should probably take the response with the highest valid_until_ts. - for keyID := range keys.VerifyKeys { - result[PublicKeyRequest{keys.ServerName, keyID}] = keys - } - for keyID := range keys.OldVerifyKeys { - result[PublicKeyRequest{keys.ServerName, keyID}] = keys - } - } - return result, nil + return body.ServerKeyList, nil } // CreateMediaDownloadRequest creates a request for media on a homeserver and returns the http.Response or an error @@ -257,10 +245,70 @@ func (fc *Client) CreateMediaDownloadRequest( return nil, err } - return fc.doHTTPRequest(ctx, req) + return fc.DoHTTPRequest(ctx, req) } -func (fc *Client) doHTTPRequest(ctx context.Context, req *http.Request) (*http.Response, error) { +// DoRequestAndParseResponse calls DoHTTPRequest and then decodes the response. +// +// If the HTTP response is not a 200, an attempt is made to parse the response +// body into a gomatrix.RespError. In any case, a non-200 response will result +// in a gomatrix.HTTPError. +// +func (fc *Client) DoRequestAndParseResponse( + ctx context.Context, + req *http.Request, + result interface{}, +) error { + response, err := fc.DoHTTPRequest(ctx, req) + if response != nil { + defer response.Body.Close() // nolint: errcheck + } + if err != nil { + return err + } + + if response.StatusCode/100 != 2 { // not 2xx + // Adapted from https://github.com/matrix-org/gomatrix/blob/master/client.go + var contents []byte + contents, err = ioutil.ReadAll(response.Body) + if err != nil { + return err + } + + var wrap error + var respErr gomatrix.RespError + if _ = json.Unmarshal(contents, &respErr); respErr.ErrCode != "" { + wrap = respErr + } + + // If we failed to decode as RespError, don't just drop the HTTP body, include it in the + // HTTP error instead (e.g proxy errors which return HTML). + msg := "Failed to " + req.Method + " JSON to " + req.RequestURI + if wrap == nil { + msg = msg + ": " + string(contents) + } + + return gomatrix.HTTPError{ + Code: response.StatusCode, + Message: msg, + WrappedError: wrap, + } + } + + if err = json.NewDecoder(response.Body).Decode(result); err != nil { + return err + } + + return nil +} + +// DoHTTPRequest creates an outgoing request ID and adds it to the context +// before sending off the request and awaiting a response. +// +// If the returned error is nil, the Response will contain a non-nil +// Body which the caller is expected to close. +// +func (fc *Client) DoHTTPRequest(ctx context.Context, req *http.Request) (*http.Response, error) { reqID := util.RandomString(12) logger := util.GetLogger(ctx).WithField("server", req.URL.Host).WithField("out.req.ID", reqID) newCtx := util.ContextWithLogger(ctx, logger) diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/federationclient.go b/vendor/src/github.com/matrix-org/gomatrixserverlib/federationclient.go index 06db3d86..299f0841 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/federationclient.go +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/federationclient.go @@ -2,17 +2,13 @@ package gomatrixserverlib import ( "context" - "encoding/json" - "io/ioutil" "net/http" "net/url" - "github.com/matrix-org/gomatrix" - "github.com/matrix-org/util" "golang.org/x/crypto/ed25519" ) -// An FederationClient is a matrix federation client that adds +// A FederationClient is a matrix federation client that adds // "Authorization: X-Matrix" headers to requests that need ed25519 signatures type FederationClient struct { Client @@ -34,10 +30,6 @@ func NewFederationClient( } func (ac *FederationClient) doRequest(ctx context.Context, r FederationRequest, resBody interface{}) error { - reqID := util.RandomString(12) - logger := util.GetLogger(ctx).WithField("server", r.fields.Destination).WithField("out.req.ID", reqID) - newCtx := util.ContextWithLogger(ctx, logger) - if err := r.Sign(ac.serverName, ac.serverKeyID, ac.serverPrivateKey); err != nil { return err } @@ -47,52 +39,7 @@ func (ac *FederationClient) doRequest(ctx context.Context, r FederationRequest, return err } - logger.Infof("Outgoing request %s %s", req.Method, req.URL) - res, err := ac.client.Do(req.WithContext(newCtx)) - if res != nil { - defer res.Body.Close() // nolint: errcheck - } - - if err != nil { - logger.Infof("Outgoing request %s %s failed with %v", req.Method, req.URL, err) - return err - } - - contents, err := ioutil.ReadAll(res.Body) - - logger.Infof("Response %d from %s %s", res.StatusCode, req.Method, req.URL) - - if res.StatusCode/100 != 2 { // not 2xx - // Adapted from https://github.com/matrix-org/gomatrix/blob/master/client.go - var wrap error - var respErr gomatrix.RespError - if _ = json.Unmarshal(contents, &respErr); respErr.ErrCode != "" { - wrap = respErr - } - - // If we failed to decode as RespError, don't just drop the HTTP body, include it in the - // HTTP error instead (e.g proxy errors which return HTML). - msg := "Failed to " + r.Method() + " JSON to " + r.RequestURI() - if wrap == nil { - msg = msg + ": " + string(contents) - } - - return gomatrix.HTTPError{ - Code: res.StatusCode, - Message: msg, - WrappedError: wrap, - } - } - - if err != nil { - return err - } - - if resBody == nil { - return nil - } - - return json.Unmarshal(contents, resBody) + return ac.Client.DoRequestAndParseResponse(ctx, req, resBody) } var federationPathPrefix = "/_matrix/federation/v1" diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring.go b/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring.go index 324e59d1..cd74de67 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring.go +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring.go @@ -17,6 +17,38 @@ type PublicKeyRequest struct { KeyID KeyID } +// PublicKeyNotExpired is a magic value for PublicKeyLookupResult.ExpiredTS: +// it indicates that this is an active key which has not yet expired +const PublicKeyNotExpired = Timestamp(0) + +// PublicKeyNotValid is a magic value for PublicKeyLookupResult.ValidUntilTS: +// it is used when we don't have a validity period for this key. Most likely +// it is an old key with an expiry date. +const PublicKeyNotValid = Timestamp(0) + +// A PublicKeyLookupResult is the result of looking up a server signing key. +type PublicKeyLookupResult struct { + VerifyKey + // if this key has expired, the time it stopped being valid for event signing in milliseconds. + // if the key has not expired, the magic value PublicKeyNotExpired. + ExpiredTS Timestamp + // When this result is valid until in milliseconds. + // if the key has expired, the magic value PublicKeyNotValid. + ValidUntilTS Timestamp +} + +// WasValidAt checks if this signing key is valid for an event signed at the +// given timestamp. +func (r PublicKeyLookupResult) WasValidAt(atTs Timestamp) bool { + if r.ExpiredTS != PublicKeyNotExpired && atTs >= r.ExpiredTS { + return false + } + if r.ValidUntilTS == PublicKeyNotValid || atTs > r.ValidUntilTS { + return false + } + return true +} + // A KeyFetcher is a way of fetching public keys in bulk. type KeyFetcher interface { // Lookup a batch of public keys. @@ -27,7 +59,7 @@ type KeyFetcher interface { // The result may have fewer (server name, key ID) pairs than were in the request. // The result may have more (server name, key ID) pairs than were in the request. // Returns an error if there was a problem fetching the keys. - FetchKeys(ctx context.Context, requests map[PublicKeyRequest]Timestamp) (map[PublicKeyRequest]ServerKeys, error) + FetchKeys(ctx context.Context, requests map[PublicKeyRequest]Timestamp) (map[PublicKeyRequest]PublicKeyLookupResult, error) } // A KeyDatabase is a store for caching public keys. @@ -40,7 +72,7 @@ type KeyDatabase interface { // to a concurrent FetchKeys(). This is acceptable since the database is // only used as a cache for the keys, so if a FetchKeys() races with a // StoreKeys() and some of the keys are missing they will be just be refetched. - StoreKeys(ctx context.Context, results map[PublicKeyRequest]ServerKeys) error + StoreKeys(ctx context.Context, results map[PublicKeyRequest]PublicKeyLookupResult) error } // A KeyRing stores keys for matrix servers and provides methods for verifying JSON messages. @@ -123,6 +155,8 @@ func (k KeyRing) VerifyJSONs(ctx context.Context, requests []VerifyJSONRequest) k.checkUsingKeys(requests, results, keyIDs, keysFromDatabase) for i := range k.KeyFetchers { + // TODO: we should distinguish here between expired keys, and those we don't have. + // If the key has expired, it's no use re-requesting it. keyRequests := k.publicKeyRequests(requests, results, keyIDs) if len(keyRequests) == 0 { // There aren't any keys to fetch so we can stop here. @@ -178,7 +212,7 @@ func (k *KeyRing) publicKeyRequests( func (k *KeyRing) checkUsingKeys( requests []VerifyJSONRequest, results []VerifyJSONResult, keyIDs [][]KeyID, - keys map[PublicKeyRequest]ServerKeys, + keys map[PublicKeyRequest]PublicKeyLookupResult, ) { for i := range requests { if results[i].Error == nil { @@ -187,13 +221,12 @@ func (k *KeyRing) checkUsingKeys( continue } for _, keyID := range keyIDs[i] { - serverKeys, ok := keys[PublicKeyRequest{requests[i].ServerName, keyID}] + serverKey, ok := keys[PublicKeyRequest{requests[i].ServerName, keyID}] if !ok { // No key for this key ID so we continue onto the next key ID. continue } - publicKey := serverKeys.PublicKey(keyID, requests[i].AtTS) - if publicKey == nil { + if !serverKey.WasValidAt(requests[i].AtTS) { // The key wasn't valid at the timestamp we needed it to be valid at. // So skip onto the next key. results[i].Error = fmt.Errorf( @@ -203,7 +236,7 @@ func (k *KeyRing) checkUsingKeys( continue } if err := VerifyJSON( - string(requests[i].ServerName), keyID, ed25519.PublicKey(publicKey), requests[i].Message, + string(requests[i].ServerName), keyID, ed25519.PublicKey(serverKey.Key), requests[i].Message, ); err != nil { // The signature wasn't valid, record the error and try the next key ID. results[i].Error = err @@ -229,13 +262,15 @@ type PerspectiveKeyFetcher struct { // FetchKeys implements KeyFetcher func (p *PerspectiveKeyFetcher) FetchKeys( ctx context.Context, requests map[PublicKeyRequest]Timestamp, -) (map[PublicKeyRequest]ServerKeys, error) { - results, err := p.Client.LookupServerKeys(ctx, p.PerspectiveServerName, requests) +) (map[PublicKeyRequest]PublicKeyLookupResult, error) { + serverKeys, err := p.Client.LookupServerKeys(ctx, p.PerspectiveServerName, requests) if err != nil { return nil, err } - for req, keys := range results { + results := map[PublicKeyRequest]PublicKeyLookupResult{} + + for _, keys := range serverKeys { var valid bool keyIDs, err := ListKeyIDs(string(p.PerspectiveServerName), keys.Raw) if err != nil { @@ -261,12 +296,16 @@ func (p *PerspectiveKeyFetcher) FetchKeys( return nil, fmt.Errorf("gomatrixserverlib: not signed with a known key for the perspective server") } - // Check that the keys are valid for the server. - checks, _, _ := CheckKeys(req.ServerName, time.Unix(0, 0), keys, nil) + // Check that the keys are valid for the server they claim to be + checks, _, _ := CheckKeys(keys.ServerName, time.Unix(0, 0), keys, nil) if !checks.AllChecksOK { // This is bad because it means that the perspective server was trying to feed us an invalid response. return nil, fmt.Errorf("gomatrixserverlib: key response from perspective server failed checks") } + + // TODO: What happens if the same key ID appears in multiple responses? + // We should probably take the response with the highest valid_until_ts. + mapServerKeysToPublicKeyLookupResult(keys, results) } return results, nil @@ -282,7 +321,7 @@ type DirectKeyFetcher struct { // FetchKeys implements KeyFetcher func (d *DirectKeyFetcher) FetchKeys( ctx context.Context, requests map[PublicKeyRequest]Timestamp, -) (map[PublicKeyRequest]ServerKeys, error) { +) (map[PublicKeyRequest]PublicKeyLookupResult, error) { byServer := map[ServerName]map[PublicKeyRequest]Timestamp{} for req, ts := range requests { server := byServer[req.ServerName] @@ -293,7 +332,7 @@ func (d *DirectKeyFetcher) FetchKeys( server[req] = ts } - results := map[PublicKeyRequest]ServerKeys{} + results := map[PublicKeyRequest]PublicKeyLookupResult{} for server, reqs := range byServer { // TODO: make these requests in parallel serverResults, err := d.fetchKeysForServer(ctx, server, reqs) @@ -310,19 +349,50 @@ func (d *DirectKeyFetcher) FetchKeys( func (d *DirectKeyFetcher) fetchKeysForServer( ctx context.Context, serverName ServerName, requests map[PublicKeyRequest]Timestamp, -) (map[PublicKeyRequest]ServerKeys, error) { - results, err := d.Client.LookupServerKeys(ctx, serverName, requests) +) (map[PublicKeyRequest]PublicKeyLookupResult, error) { + serverKeys, err := d.Client.LookupServerKeys(ctx, serverName, requests) if err != nil { return nil, err } - for req, keys := range results { + results := map[PublicKeyRequest]PublicKeyLookupResult{} + for _, keys := range serverKeys { // Check that the keys are valid for the server. - checks, _, _ := CheckKeys(req.ServerName, time.Unix(0, 0), keys, nil) + checks, _, _ := CheckKeys(serverName, time.Unix(0, 0), keys, nil) if !checks.AllChecksOK { return nil, fmt.Errorf("gomatrixserverlib: key response direct from %q failed checks", serverName) } + + // TODO: What happens if the same key ID appears in multiple responses? + // We should probably take the response with the highest valid_until_ts. + mapServerKeysToPublicKeyLookupResult(keys, results) } return results, nil } + +// mapServerKeysToPublicKeyLookupResult takes the (verified) result from a +// /key/v2/query call and inserts it into a PublicKeyRequest->PublicKeyLookupResult +// map. +func mapServerKeysToPublicKeyLookupResult(serverKeys ServerKeys, results map[PublicKeyRequest]PublicKeyLookupResult) { + for keyID, key := range serverKeys.VerifyKeys { + results[PublicKeyRequest{ + ServerName: serverKeys.ServerName, + KeyID: keyID, + }] = PublicKeyLookupResult{ + VerifyKey: key, + ValidUntilTS: serverKeys.ValidUntilTS, + ExpiredTS: PublicKeyNotExpired, + } + } + for keyID, key := range serverKeys.OldVerifyKeys { + results[PublicKeyRequest{ + ServerName: serverKeys.ServerName, + KeyID: keyID, + }] = PublicKeyLookupResult{ + VerifyKey: key.VerifyKey, + ValidUntilTS: PublicKeyNotValid, + ExpiredTS: key.ExpiredTS, + } + } +} diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring_test.go b/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring_test.go index 5414e806..07d1995a 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring_test.go +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/keyring_test.go @@ -2,7 +2,6 @@ package gomatrixserverlib import ( "context" - "encoding/json" "testing" ) @@ -39,26 +38,44 @@ type testKeyDatabase struct{} func (db *testKeyDatabase) FetchKeys( ctx context.Context, requests map[PublicKeyRequest]Timestamp, -) (map[PublicKeyRequest]ServerKeys, error) { - results := map[PublicKeyRequest]ServerKeys{} - var keys ServerKeys - if err := json.Unmarshal([]byte(testKeys), &keys); err != nil { - return nil, err - } +) (map[PublicKeyRequest]PublicKeyLookupResult, error) { + results := map[PublicKeyRequest]PublicKeyLookupResult{} req1 := PublicKeyRequest{"localhost:8800", "ed25519:old"} req2 := PublicKeyRequest{"localhost:8800", "ed25519:a_Obwu"} for req := range requests { - if req == req1 || req == req2 { - results[req] = keys + if req == req1 { + vk := VerifyKey{} + err := vk.Key.Decode("O2onvM62pC1io6jQKm8Nc2UyFXcd4kOmOsBIoYtZ2ik") + if err != nil { + return nil, err + } + results[req] = PublicKeyLookupResult{ + VerifyKey: vk, + ValidUntilTS: PublicKeyNotValid, + ExpiredTS: 929059200, + } + } + + if req == req2 { + vk := VerifyKey{} + err := vk.Key.Decode("2UwTWD4+tgTgENV7znGGNqhAOGY+BW1mRAnC6W6FBQg") + if err != nil { + return nil, err + } + results[req] = PublicKeyLookupResult{ + VerifyKey: vk, + ValidUntilTS: 1493142432964, + ExpiredTS: PublicKeyNotExpired, + } } } return results, nil } func (db *testKeyDatabase) StoreKeys( - ctx context.Context, requests map[PublicKeyRequest]ServerKeys, + ctx context.Context, requests map[PublicKeyRequest]PublicKeyLookupResult, ) error { return nil } @@ -136,12 +153,12 @@ var testErrorStore = erroringKeyDatabaseError(2) func (e *erroringKeyDatabase) FetchKeys( ctx context.Context, requests map[PublicKeyRequest]Timestamp, -) (map[PublicKeyRequest]ServerKeys, error) { +) (map[PublicKeyRequest]PublicKeyLookupResult, error) { return nil, &testErrorFetch } func (e *erroringKeyDatabase) StoreKeys( - ctx context.Context, keys map[PublicKeyRequest]ServerKeys, + ctx context.Context, keys map[PublicKeyRequest]PublicKeyLookupResult, ) error { return &testErrorStore } diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/keys.go b/vendor/src/github.com/matrix-org/gomatrixserverlib/keys.go index 099f3404..98ff87fd 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/keys.go +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/keys.go @@ -37,8 +37,6 @@ type ServerName string type ServerKeys struct { // Copy of the raw JSON for signature checking. Raw []byte - // The server the raw JSON was downloaded from. - FromServer ServerName // The decoded JSON fields. ServerKeyFields } @@ -140,7 +138,6 @@ func FetchKeysDirect(serverName ServerName, addr, sni string) (*ServerKeys, *tls return nil, nil, err } var keys ServerKeys - keys.FromServer = serverName if err = json.NewDecoder(response.Body).Decode(&keys); err != nil { return nil, nil, err } diff --git a/vendor/src/github.com/matrix-org/gomatrixserverlib/linter.json b/vendor/src/github.com/matrix-org/gomatrixserverlib/linter.json index 8ad86b87..aae74954 100644 --- a/vendor/src/github.com/matrix-org/gomatrixserverlib/linter.json +++ b/vendor/src/github.com/matrix-org/gomatrixserverlib/linter.json @@ -9,7 +9,7 @@ "golint", "varcheck", "structcheck", - "aligncheck", + "maligned", "ineffassign", "gas", "misspell",