Skip to content
Snippets Groups Projects
keys.rs 14.7 KiB
Newer Older
  • Learn to ignore specific revisions
  • use std::{
    	collections::{hash_map, BTreeMap, HashMap, HashSet},
    	time::{Duration, Instant},
    };
    
    
    Jonas Platte's avatar
    Jonas Platte committed
    use futures_util::{stream::FuturesUnordered, StreamExt};
    
    Jonas Platte's avatar
    Jonas Platte committed
    use ruma::{
    
    	api::{
    		client::{
    			error::ErrorKind,
    			keys::{claim_keys, get_key_changes, get_keys, upload_keys, upload_signatures, upload_signing_keys},
    			uiaa::{AuthFlow, AuthType, UiaaInfo},
    		},
    		federation,
    	},
    	serde::Raw,
    	DeviceKeyAlgorithm, OwnedDeviceId, OwnedUserId, UserId,
    
    use serde_json::json;
    
    🥺's avatar
    🥺 committed
    use tracing::{debug, error};
    
    use super::SESSION_ID_LENGTH;
    use crate::{services, utils, Error, Result, Ruma};
    
    
    /// # `POST /_matrix/client/r0/keys/upload`
    ///
    /// Publish end-to-end encryption keys for the sender device.
    ///
    /// - Adds one time keys
    
    /// - If there are no device keys yet: Adds device keys (TODO: merge with
    ///   existing keys?)
    pub async fn upload_keys_route(body: Ruma<upload_keys::v3::Request>) -> Result<upload_keys::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    	let sender_device = body.sender_device.as_ref().expect("user is authenticated");
    
    	for (key_key, key_value) in &body.one_time_keys {
    
    🥺's avatar
    🥺 committed
    		services()
    			.users
    			.add_one_time_key(sender_user, sender_device, key_key, key_value)?;
    
    	}
    
    	if let Some(device_keys) = &body.device_keys {
    		// TODO: merge this and the existing event?
    		// This check is needed to assure that signatures are kept
    
    🥺's avatar
    🥺 committed
    		if services()
    			.users
    			.get_device_keys(sender_user, sender_device)?
    			.is_none()
    		{
    			services()
    				.users
    				.add_device_keys(sender_user, sender_device, device_keys)?;
    
    		}
    	}
    
    	Ok(upload_keys::v3::Response {
    
    🥺's avatar
    🥺 committed
    		one_time_key_counts: services()
    			.users
    			.count_one_time_keys(sender_user, sender_device)?,
    
    /// # `POST /_matrix/client/r0/keys/query`
    ///
    /// Get end-to-end encryption keys for the given users.
    ///
    /// - Always fetches users from other servers over federation
    /// - Gets master keys, self-signing keys, user signing keys and device keys.
    
    /// - The master and self-signing keys contain signatures that the user is
    ///   allowed to see
    
    Jonas Platte's avatar
    Jonas Platte committed
    pub async fn get_keys_route(body: Ruma<get_keys::v3::Request>) -> Result<get_keys::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	let response = get_keys_helper(
    		Some(sender_user),
    		&body.device_keys,
    		|u| u == sender_user,
    		true, // Always allow local users to see device names of other local users
    	)
    	.await?;
    
    	Ok(response)
    
    /// # `POST /_matrix/client/r0/keys/claim`
    ///
    /// Claims one-time keys
    
    pub async fn claim_keys_route(body: Ruma<claim_keys::v3::Request>) -> Result<claim_keys::v3::Response> {
    	let response = claim_keys_helper(&body.one_time_keys).await?;
    
    	Ok(response)
    
    /// # `POST /_matrix/client/r0/keys/device_signing/upload`
    ///
    /// Uploads end-to-end key information for the sender user.
    ///
    /// - Requires UIAA to verify password
    
    pub async fn upload_signing_keys_route(
    
    	body: Ruma<upload_signing_keys::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<upload_signing_keys::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    	let sender_device = body.sender_device.as_ref().expect("user is authenticated");
    
    	// UIAA
    	let mut uiaainfo = UiaaInfo {
    		flows: vec![AuthFlow {
    			stages: vec![AuthType::Password],
    		}],
    		completed: Vec::new(),
    		params: Box::default(),
    		session: None,
    		auth_error: None,
    	};
    
    	if let Some(auth) = &body.auth {
    
    🥺's avatar
    🥺 committed
    		let (worked, uiaainfo) = services()
    			.uiaa
    			.try_auth(sender_user, sender_device, auth, &uiaainfo)?;
    
    		if !worked {
    			return Err(Error::Uiaa(uiaainfo));
    		}
    	// Success!
    	} else if let Some(json) = body.json_body {
    		uiaainfo.session = Some(utils::random_string(SESSION_ID_LENGTH));
    
    🥺's avatar
    🥺 committed
    		services()
    			.uiaa
    			.create(sender_user, sender_device, &uiaainfo, &json)?;
    
    		return Err(Error::Uiaa(uiaainfo));
    	} else {
    		return Err(Error::BadRequest(ErrorKind::NotJson, "Not json."));
    	}
    
    	if let Some(master_key) = &body.master_key {
    		services().users.add_cross_signing_keys(
    			sender_user,
    			master_key,
    			&body.self_signing_key,
    			&body.user_signing_key,
    			true, // notify so that other users see the new keys
    		)?;
    	}
    
    	Ok(upload_signing_keys::v3::Response {})
    
    /// # `POST /_matrix/client/r0/keys/signatures/upload`
    ///
    /// Uploads end-to-end key signatures from the sender user.
    
    pub async fn upload_signatures_route(
    
    	body: Ruma<upload_signatures::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<upload_signatures::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	for (user_id, keys) in &body.signed_keys {
    		for (key_id, key) in keys {
    			let key = serde_json::to_value(key)
    				.map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid key JSON"))?;
    
    			for signature in key
    				.get("signatures")
    				.ok_or(Error::BadRequest(ErrorKind::InvalidParam, "Missing signatures field."))?
    				.get(sender_user.to_string())
    				.ok_or(Error::BadRequest(ErrorKind::InvalidParam, "Invalid user in signatures field."))?
    				.as_object()
    				.ok_or(Error::BadRequest(ErrorKind::InvalidParam, "Invalid signature."))?
    				.clone()
    			{
    				// Signature validation?
    				let signature = (
    					signature.0,
    					signature
    						.1
    						.as_str()
    						.ok_or(Error::BadRequest(ErrorKind::InvalidParam, "Invalid signature value."))?
    						.to_owned(),
    				);
    
    🥺's avatar
    🥺 committed
    				services()
    					.users
    					.sign_key(user_id, key_id, signature, sender_user)?;
    
    			}
    		}
    	}
    
    	Ok(upload_signatures::v3::Response {
    		failures: BTreeMap::new(), // TODO: integrate
    	})
    
    /// # `POST /_matrix/client/r0/keys/changes`
    ///
    
    /// Gets a list of users who have updated their device identity keys since the
    /// previous sync token.
    
    ///
    /// - TODO: left users
    
    pub async fn get_key_changes_route(body: Ruma<get_key_changes::v3::Request>) -> Result<get_key_changes::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	let mut device_list_updates = HashSet::new();
    
    	device_list_updates.extend(
    		services()
    			.users
    			.keys_changed(
    				sender_user.as_str(),
    
    🥺's avatar
    🥺 committed
    				body.from
    					.parse()
    					.map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid `from`."))?,
    				Some(
    					body.to
    						.parse()
    						.map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid `to`."))?,
    				),
    
    🥺's avatar
    🥺 committed
    	for room_id in services()
    		.rooms
    		.state_cache
    		.rooms_joined(sender_user)
    		.filter_map(Result::ok)
    	{
    
    		device_list_updates.extend(
    			services()
    				.users
    				.keys_changed(
    					room_id.as_ref(),
    
    🥺's avatar
    🥺 committed
    					body.from
    						.parse()
    						.map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid `from`."))?,
    					Some(
    						body.to
    							.parse()
    							.map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid `to`."))?,
    					),
    
    		);
    	}
    	Ok(get_key_changes::v3::Response {
    		changed: device_list_updates.into_iter().collect(),
    		left: Vec::new(), // TODO
    	})
    
    pub(crate) async fn get_keys_helper<F: Fn(&UserId) -> bool>(
    
    	sender_user: Option<&UserId>, device_keys_input: &BTreeMap<OwnedUserId, Vec<OwnedDeviceId>>, allowed_signatures: F,
    	include_display_names: bool,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<get_keys::v3::Response> {
    
    	let mut master_keys = BTreeMap::new();
    	let mut self_signing_keys = BTreeMap::new();
    	let mut user_signing_keys = BTreeMap::new();
    	let mut device_keys = BTreeMap::new();
    
    	let mut get_over_federation = HashMap::new();
    
    	for (user_id, device_ids) in device_keys_input {
    		let user_id: &UserId = user_id;
    
    		if user_id.server_name() != services().globals.server_name() {
    
    🥺's avatar
    🥺 committed
    			get_over_federation
    				.entry(user_id.server_name())
    				.or_insert_with(Vec::new)
    				.push((user_id, device_ids));
    
    			continue;
    		}
    
    		if device_ids.is_empty() {
    			let mut container = BTreeMap::new();
    			for device_id in services().users.all_device_ids(user_id) {
    				let device_id = device_id?;
    				if let Some(mut keys) = services().users.get_device_keys(user_id, &device_id)? {
    					let metadata = services()
    						.users
    						.get_device_metadata(user_id, &device_id)?
    						.ok_or_else(|| Error::bad_database("all_device_keys contained nonexistent device."))?;
    
    					add_unsigned_device_display_name(&mut keys, metadata, include_display_names)
    						.map_err(|_| Error::bad_database("invalid device keys in database"))?;
    
    					container.insert(device_id, keys);
    				}
    			}
    			device_keys.insert(user_id.to_owned(), container);
    		} else {
    			for device_id in device_ids {
    				let mut container = BTreeMap::new();
    				if let Some(mut keys) = services().users.get_device_keys(user_id, device_id)? {
    
    🥺's avatar
    🥺 committed
    					let metadata = services()
    						.users
    						.get_device_metadata(user_id, device_id)?
    						.ok_or(Error::BadRequest(
    							ErrorKind::InvalidParam,
    							"Tried to get keys for nonexistent device.",
    						))?;
    
    
    					add_unsigned_device_display_name(&mut keys, metadata, include_display_names)
    						.map_err(|_| Error::bad_database("invalid device keys in database"))?;
    					container.insert(device_id.to_owned(), keys);
    				}
    				device_keys.insert(user_id.to_owned(), container);
    			}
    		}
    
    
    🥺's avatar
    🥺 committed
    		if let Some(master_key) = services()
    			.users
    			.get_master_key(sender_user, user_id, &allowed_signatures)?
    		{
    
    			master_keys.insert(user_id.to_owned(), master_key);
    		}
    		if let Some(self_signing_key) =
    
    🥺's avatar
    🥺 committed
    			services()
    				.users
    				.get_self_signing_key(sender_user, user_id, &allowed_signatures)?
    
    		{
    			self_signing_keys.insert(user_id.to_owned(), self_signing_key);
    		}
    		if Some(user_id) == sender_user {
    			if let Some(user_signing_key) = services().users.get_user_signing_key(user_id)? {
    				user_signing_keys.insert(user_id.to_owned(), user_signing_key);
    			}
    		}
    	}
    
    	let mut failures = BTreeMap::new();
    
    
    🥺's avatar
    🥺 committed
    		match services()
    			.globals
    			.bad_query_ratelimiter
    			.write()
    			.await
    			.entry(id)
    		{
    
    			hash_map::Entry::Vacant(e) => {
    				e.insert((Instant::now(), 1));
    			},
    			hash_map::Entry::Occupied(mut e) => *e.get_mut() = (Instant::now(), e.get().1 + 1),
    		}
    
    	};
    
    	let mut futures: FuturesUnordered<_> = get_over_federation
    		.into_iter()
    		.map(|(server, vec)| async move {
    
    🥺's avatar
    🥺 committed
    			if let Some((time, tries)) = services()
    				.globals
    				.bad_query_ratelimiter
    				.read()
    				.await
    				.get(server)
    			{
    
    				// Exponential backoff
    				let mut min_elapsed_duration = Duration::from_secs(5 * 60) * (*tries) * (*tries);
    				if min_elapsed_duration > Duration::from_secs(60 * 60 * 24) {
    					min_elapsed_duration = Duration::from_secs(60 * 60 * 24);
    				}
    
    				if time.elapsed() < min_elapsed_duration {
    					debug!("Backing off query from {:?}", server);
    					return (server, Err(Error::BadServerResponse("bad query, still backing off")));
    				}
    			}
    
    			let mut device_keys_input_fed = BTreeMap::new();
    			for (user_id, keys) in vec {
    				device_keys_input_fed.insert(user_id.to_owned(), keys.clone());
    			}
    			(
    				server,
    				tokio::time::timeout(
    
    					Duration::from_secs(90),
    
    					services().sending.send_federation_request(
    						server,
    						federation::keys::get_keys::v1::Request {
    							device_keys: device_keys_input_fed,
    						},
    					),
    				)
    				.await
    				.map_err(|e| {
    
    					error!("get_keys_helper query took too long: {e}");
    
    					Error::BadServerResponse("get_keys_helper query took too long")
    				}),
    			)
    		})
    		.collect();
    
    	while let Some((server, response)) = futures.next().await {
    
    		if let Ok(Ok(response)) = response {
    			for (user, masterkey) in response.master_keys {
    				let (master_key_id, mut master_key) = services().users.parse_master_key(&user, &masterkey)?;
    
    				if let Some(our_master_key) =
    					services()
    						.users
    						.get_key(&master_key_id, sender_user, &user, &allowed_signatures)?
    				{
    					let (_, our_master_key) = services().users.parse_master_key(&user, &our_master_key)?;
    					master_key.signatures.extend(our_master_key.signatures);
    
    				let json = serde_json::to_value(master_key).expect("to_value always works");
    				let raw = serde_json::from_value(json).expect("Raw::from_value always works");
    				services().users.add_cross_signing_keys(
    					&user, &raw, &None, &None,
    					false, /* Dont notify. A notification would trigger another key request resulting in an
    					       * endless loop */
    				)?;
    				master_keys.insert(user, raw);
    			}
    
    			self_signing_keys.extend(response.self_signing_keys);
    			device_keys.extend(response.device_keys);
    		} else {
    			back_off(server.to_owned()).await;
    			failures.insert(server.to_string(), json!({}));
    
    		}
    	}
    
    	Ok(get_keys::v3::Response {
    
    		failures,
    		device_keys,
    
    		master_keys,
    		self_signing_keys,
    		user_signing_keys,
    	})
    
    Jonas Platte's avatar
    Jonas Platte committed
    fn add_unsigned_device_display_name(
    
    	keys: &mut Raw<ruma::encryption::DeviceKeys>, metadata: ruma::api::client::device::Device,
    	include_display_names: bool,
    
    Jonas Platte's avatar
    Jonas Platte committed
    ) -> serde_json::Result<()> {
    
    	if let Some(display_name) = metadata.display_name {
    		let mut object = keys.deserialize_as::<serde_json::Map<String, serde_json::Value>>()?;
    
    		let unsigned = object.entry("unsigned").or_insert_with(|| json!({}));
    		if let serde_json::Value::Object(unsigned_object) = unsigned {
    			if include_display_names {
    				unsigned_object.insert("device_display_name".to_owned(), display_name.into());
    			} else {
    				unsigned_object.insert(
    					"device_display_name".to_owned(),
    					Some(metadata.device_id.as_str().to_owned()).into(),
    				);
    			}
    		}
    
    		*keys = Raw::from_json(serde_json::value::to_raw_value(&object)?);
    	}
    
    	Ok(())
    
    Jonas Platte's avatar
    Jonas Platte committed
    }
    
    
    pub(crate) async fn claim_keys_helper(
    
    	one_time_keys_input: &BTreeMap<OwnedUserId, BTreeMap<OwnedDeviceId, DeviceKeyAlgorithm>>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<claim_keys::v3::Response> {
    
    	let mut one_time_keys = BTreeMap::new();
    
    	let mut get_over_federation = BTreeMap::new();
    
    	for (user_id, map) in one_time_keys_input {
    		if user_id.server_name() != services().globals.server_name() {
    
    🥺's avatar
    🥺 committed
    			get_over_federation
    				.entry(user_id.server_name())
    				.or_insert_with(Vec::new)
    				.push((user_id, map));
    
    		}
    
    		let mut container = BTreeMap::new();
    		for (device_id, key_algorithm) in map {
    
    🥺's avatar
    🥺 committed
    			if let Some(one_time_keys) = services()
    				.users
    				.take_one_time_key(user_id, device_id, key_algorithm)?
    			{
    
    				let mut c = BTreeMap::new();
    				c.insert(one_time_keys.0, one_time_keys.1);
    				container.insert(device_id.clone(), c);
    			}
    		}
    		one_time_keys.insert(user_id.clone(), container);
    	}
    
    	let mut failures = BTreeMap::new();
    
    	let mut futures: FuturesUnordered<_> = get_over_federation
    		.into_iter()
    		.map(|(server, vec)| async move {
    			let mut one_time_keys_input_fed = BTreeMap::new();
    			for (user_id, keys) in vec {
    				one_time_keys_input_fed.insert(user_id.clone(), keys.clone());
    			}
    			(
    				server,
    				services()
    					.sending
    					.send_federation_request(
    						server,
    						federation::keys::claim_keys::v1::Request {
    							one_time_keys: one_time_keys_input_fed,
    						},
    					)
    					.await,
    			)
    		})
    		.collect();
    
    	while let Some((server, response)) = futures.next().await {
    		match response {
    			Ok(keys) => {
    				one_time_keys.extend(keys.one_time_keys);
    			},
    			Err(_e) => {
    				failures.insert(server.to_string(), json!({}));
    			},
    		}
    	}
    
    	Ok(claim_keys::v3::Response {
    		failures,
    		one_time_keys,
    	})