keys.py 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2015, 2016 OpenMarket Ltd
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. import logging
  16. from twisted.internet import defer
  17. from synapse.api.errors import SynapseError
  18. from synapse.http.servlet import (
  19. RestServlet,
  20. parse_integer,
  21. parse_json_object_from_request,
  22. parse_string,
  23. )
  24. from synapse.types import StreamToken
  25. from ._base import client_patterns
  26. logger = logging.getLogger(__name__)
  27. class KeyUploadServlet(RestServlet):
  28. """
  29. POST /keys/upload HTTP/1.1
  30. Content-Type: application/json
  31. {
  32. "device_keys": {
  33. "user_id": "<user_id>",
  34. "device_id": "<device_id>",
  35. "valid_until_ts": <millisecond_timestamp>,
  36. "algorithms": [
  37. "m.olm.curve25519-aes-sha256",
  38. ]
  39. "keys": {
  40. "<algorithm>:<device_id>": "<key_base64>",
  41. },
  42. "signatures:" {
  43. "<user_id>" {
  44. "<algorithm>:<device_id>": "<signature_base64>"
  45. } } },
  46. "one_time_keys": {
  47. "<algorithm>:<key_id>": "<key_base64>"
  48. },
  49. }
  50. """
  51. PATTERNS = client_patterns("/keys/upload(/(?P<device_id>[^/]+))?$")
  52. def __init__(self, hs):
  53. """
  54. Args:
  55. hs (synapse.server.HomeServer): server
  56. """
  57. super(KeyUploadServlet, self).__init__()
  58. self.auth = hs.get_auth()
  59. self.e2e_keys_handler = hs.get_e2e_keys_handler()
  60. @defer.inlineCallbacks
  61. def on_POST(self, request, device_id):
  62. requester = yield self.auth.get_user_by_req(request, allow_guest=True)
  63. user_id = requester.user.to_string()
  64. body = parse_json_object_from_request(request)
  65. if device_id is not None:
  66. # passing the device_id here is deprecated; however, we allow it
  67. # for now for compatibility with older clients.
  68. if requester.device_id is not None and device_id != requester.device_id:
  69. logger.warning(
  70. "Client uploading keys for a different device "
  71. "(logged in as %s, uploading for %s)",
  72. requester.device_id,
  73. device_id,
  74. )
  75. else:
  76. device_id = requester.device_id
  77. if device_id is None:
  78. raise SynapseError(
  79. 400, "To upload keys, you must pass device_id when authenticating"
  80. )
  81. result = yield self.e2e_keys_handler.upload_keys_for_user(
  82. user_id, device_id, body
  83. )
  84. return (200, result)
  85. class KeyQueryServlet(RestServlet):
  86. """
  87. POST /keys/query HTTP/1.1
  88. Content-Type: application/json
  89. {
  90. "device_keys": {
  91. "<user_id>": ["<device_id>"]
  92. } }
  93. HTTP/1.1 200 OK
  94. {
  95. "device_keys": {
  96. "<user_id>": {
  97. "<device_id>": {
  98. "user_id": "<user_id>", // Duplicated to be signed
  99. "device_id": "<device_id>", // Duplicated to be signed
  100. "valid_until_ts": <millisecond_timestamp>,
  101. "algorithms": [ // List of supported algorithms
  102. "m.olm.curve25519-aes-sha256",
  103. ],
  104. "keys": { // Must include a ed25519 signing key
  105. "<algorithm>:<key_id>": "<key_base64>",
  106. },
  107. "signatures:" {
  108. // Must be signed with device's ed25519 key
  109. "<user_id>/<device_id>": {
  110. "<algorithm>:<key_id>": "<signature_base64>"
  111. }
  112. // Must be signed by this server.
  113. "<server_name>": {
  114. "<algorithm>:<key_id>": "<signature_base64>"
  115. } } } } } }
  116. """
  117. PATTERNS = client_patterns("/keys/query$")
  118. def __init__(self, hs):
  119. """
  120. Args:
  121. hs (synapse.server.HomeServer):
  122. """
  123. super(KeyQueryServlet, self).__init__()
  124. self.auth = hs.get_auth()
  125. self.e2e_keys_handler = hs.get_e2e_keys_handler()
  126. @defer.inlineCallbacks
  127. def on_POST(self, request):
  128. yield self.auth.get_user_by_req(request, allow_guest=True)
  129. timeout = parse_integer(request, "timeout", 10 * 1000)
  130. body = parse_json_object_from_request(request)
  131. result = yield self.e2e_keys_handler.query_devices(body, timeout)
  132. return (200, result)
  133. class KeyChangesServlet(RestServlet):
  134. """Returns the list of changes of keys between two stream tokens (may return
  135. spurious extra results, since we currently ignore the `to` param).
  136. GET /keys/changes?from=...&to=...
  137. 200 OK
  138. { "changed": ["@foo:example.com"] }
  139. """
  140. PATTERNS = client_patterns("/keys/changes$")
  141. def __init__(self, hs):
  142. """
  143. Args:
  144. hs (synapse.server.HomeServer):
  145. """
  146. super(KeyChangesServlet, self).__init__()
  147. self.auth = hs.get_auth()
  148. self.device_handler = hs.get_device_handler()
  149. @defer.inlineCallbacks
  150. def on_GET(self, request):
  151. requester = yield self.auth.get_user_by_req(request, allow_guest=True)
  152. from_token_string = parse_string(request, "from")
  153. # We want to enforce they do pass us one, but we ignore it and return
  154. # changes after the "to" as well as before.
  155. parse_string(request, "to")
  156. from_token = StreamToken.from_string(from_token_string)
  157. user_id = requester.user.to_string()
  158. results = yield self.device_handler.get_user_ids_changed(user_id, from_token)
  159. return (200, results)
  160. class OneTimeKeyServlet(RestServlet):
  161. """
  162. POST /keys/claim HTTP/1.1
  163. {
  164. "one_time_keys": {
  165. "<user_id>": {
  166. "<device_id>": "<algorithm>"
  167. } } }
  168. HTTP/1.1 200 OK
  169. {
  170. "one_time_keys": {
  171. "<user_id>": {
  172. "<device_id>": {
  173. "<algorithm>:<key_id>": "<key_base64>"
  174. } } } }
  175. """
  176. PATTERNS = client_patterns("/keys/claim$")
  177. def __init__(self, hs):
  178. super(OneTimeKeyServlet, self).__init__()
  179. self.auth = hs.get_auth()
  180. self.e2e_keys_handler = hs.get_e2e_keys_handler()
  181. @defer.inlineCallbacks
  182. def on_POST(self, request):
  183. yield self.auth.get_user_by_req(request, allow_guest=True)
  184. timeout = parse_integer(request, "timeout", 10 * 1000)
  185. body = parse_json_object_from_request(request)
  186. result = yield self.e2e_keys_handler.claim_one_time_keys(body, timeout)
  187. return (200, result)
  188. def register_servlets(hs, http_server):
  189. KeyUploadServlet(hs).register(http_server)
  190. KeyQueryServlet(hs).register(http_server)
  191. KeyChangesServlet(hs).register(http_server)
  192. OneTimeKeyServlet(hs).register(http_server)