keys.py 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2015, 2016 OpenMarket Ltd
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. import logging
  16. from twisted.internet import defer
  17. from synapse.api.errors import SynapseError
  18. from synapse.http.servlet import (
  19. RestServlet, parse_json_object_from_request, parse_integer
  20. )
  21. from synapse.http.servlet import parse_string
  22. from synapse.types import StreamToken
  23. from ._base import client_v2_patterns
  24. logger = logging.getLogger(__name__)
  25. class KeyUploadServlet(RestServlet):
  26. """
  27. POST /keys/upload HTTP/1.1
  28. Content-Type: application/json
  29. {
  30. "device_keys": {
  31. "user_id": "<user_id>",
  32. "device_id": "<device_id>",
  33. "valid_until_ts": <millisecond_timestamp>,
  34. "algorithms": [
  35. "m.olm.curve25519-aes-sha256",
  36. ]
  37. "keys": {
  38. "<algorithm>:<device_id>": "<key_base64>",
  39. },
  40. "signatures:" {
  41. "<user_id>" {
  42. "<algorithm>:<device_id>": "<signature_base64>"
  43. } } },
  44. "one_time_keys": {
  45. "<algorithm>:<key_id>": "<key_base64>"
  46. },
  47. }
  48. """
  49. PATTERNS = client_v2_patterns("/keys/upload(/(?P<device_id>[^/]+))?$",
  50. releases=())
  51. def __init__(self, hs):
  52. """
  53. Args:
  54. hs (synapse.server.HomeServer): server
  55. """
  56. super(KeyUploadServlet, self).__init__()
  57. self.auth = hs.get_auth()
  58. self.e2e_keys_handler = hs.get_e2e_keys_handler()
  59. @defer.inlineCallbacks
  60. def on_POST(self, request, device_id):
  61. requester = yield self.auth.get_user_by_req(request, allow_guest=True)
  62. user_id = requester.user.to_string()
  63. body = parse_json_object_from_request(request)
  64. if device_id is not None:
  65. # passing the device_id here is deprecated; however, we allow it
  66. # for now for compatibility with older clients.
  67. if (requester.device_id is not None and
  68. device_id != requester.device_id):
  69. logger.warning("Client uploading keys for a different device "
  70. "(logged in as %s, uploading for %s)",
  71. requester.device_id, device_id)
  72. else:
  73. device_id = requester.device_id
  74. if device_id is None:
  75. raise SynapseError(
  76. 400,
  77. "To upload keys, you must pass device_id when authenticating"
  78. )
  79. result = yield self.e2e_keys_handler.upload_keys_for_user(
  80. user_id, device_id, body
  81. )
  82. defer.returnValue((200, result))
  83. class KeyQueryServlet(RestServlet):
  84. """
  85. POST /keys/query HTTP/1.1
  86. Content-Type: application/json
  87. {
  88. "device_keys": {
  89. "<user_id>": ["<device_id>"]
  90. } }
  91. HTTP/1.1 200 OK
  92. {
  93. "device_keys": {
  94. "<user_id>": {
  95. "<device_id>": {
  96. "user_id": "<user_id>", // Duplicated to be signed
  97. "device_id": "<device_id>", // Duplicated to be signed
  98. "valid_until_ts": <millisecond_timestamp>,
  99. "algorithms": [ // List of supported algorithms
  100. "m.olm.curve25519-aes-sha256",
  101. ],
  102. "keys": { // Must include a ed25519 signing key
  103. "<algorithm>:<key_id>": "<key_base64>",
  104. },
  105. "signatures:" {
  106. // Must be signed with device's ed25519 key
  107. "<user_id>/<device_id>": {
  108. "<algorithm>:<key_id>": "<signature_base64>"
  109. }
  110. // Must be signed by this server.
  111. "<server_name>": {
  112. "<algorithm>:<key_id>": "<signature_base64>"
  113. } } } } } }
  114. """
  115. PATTERNS = client_v2_patterns(
  116. "/keys/query$",
  117. releases=()
  118. )
  119. def __init__(self, hs):
  120. """
  121. Args:
  122. hs (synapse.server.HomeServer):
  123. """
  124. super(KeyQueryServlet, self).__init__()
  125. self.auth = hs.get_auth()
  126. self.e2e_keys_handler = hs.get_e2e_keys_handler()
  127. @defer.inlineCallbacks
  128. def on_POST(self, request):
  129. yield self.auth.get_user_by_req(request, allow_guest=True)
  130. timeout = parse_integer(request, "timeout", 10 * 1000)
  131. body = parse_json_object_from_request(request)
  132. result = yield self.e2e_keys_handler.query_devices(body, timeout)
  133. defer.returnValue((200, result))
  134. class KeyChangesServlet(RestServlet):
  135. """Returns the list of changes of keys between two stream tokens (may return
  136. spurious extra results, since we currently ignore the `to` param).
  137. GET /keys/changes?from=...&to=...
  138. 200 OK
  139. { "changed": ["@foo:example.com"] }
  140. """
  141. PATTERNS = client_v2_patterns(
  142. "/keys/changes$",
  143. releases=()
  144. )
  145. def __init__(self, hs):
  146. """
  147. Args:
  148. hs (synapse.server.HomeServer):
  149. """
  150. super(KeyChangesServlet, self).__init__()
  151. self.auth = hs.get_auth()
  152. self.device_handler = hs.get_device_handler()
  153. @defer.inlineCallbacks
  154. def on_GET(self, request):
  155. requester = yield self.auth.get_user_by_req(request, allow_guest=True)
  156. from_token_string = parse_string(request, "from")
  157. # We want to enforce they do pass us one, but we ignore it and return
  158. # changes after the "to" as well as before.
  159. parse_string(request, "to")
  160. from_token = StreamToken.from_string(from_token_string)
  161. user_id = requester.user.to_string()
  162. changed = yield self.device_handler.get_user_ids_changed(
  163. user_id, from_token,
  164. )
  165. defer.returnValue((200, {
  166. "changed": list(changed),
  167. }))
  168. class OneTimeKeyServlet(RestServlet):
  169. """
  170. POST /keys/claim HTTP/1.1
  171. {
  172. "one_time_keys": {
  173. "<user_id>": {
  174. "<device_id>": "<algorithm>"
  175. } } }
  176. HTTP/1.1 200 OK
  177. {
  178. "one_time_keys": {
  179. "<user_id>": {
  180. "<device_id>": {
  181. "<algorithm>:<key_id>": "<key_base64>"
  182. } } } }
  183. """
  184. PATTERNS = client_v2_patterns(
  185. "/keys/claim$",
  186. releases=()
  187. )
  188. def __init__(self, hs):
  189. super(OneTimeKeyServlet, self).__init__()
  190. self.auth = hs.get_auth()
  191. self.e2e_keys_handler = hs.get_e2e_keys_handler()
  192. @defer.inlineCallbacks
  193. def on_POST(self, request):
  194. yield self.auth.get_user_by_req(request, allow_guest=True)
  195. timeout = parse_integer(request, "timeout", 10 * 1000)
  196. body = parse_json_object_from_request(request)
  197. result = yield self.e2e_keys_handler.claim_one_time_keys(
  198. body,
  199. timeout,
  200. )
  201. defer.returnValue((200, result))
  202. def register_servlets(hs, http_server):
  203. KeyUploadServlet(hs).register(http_server)
  204. KeyQueryServlet(hs).register(http_server)
  205. KeyChangesServlet(hs).register(http_server)
  206. OneTimeKeyServlet(hs).register(http_server)