Skip to content
Snippets Groups Projects
keys.rs 18.7 KiB
Newer Older
  • Learn to ignore specific revisions
  • Jonathan de Jong's avatar
    Jonathan de Jong committed
    use super::SESSION_ID_LENGTH;
    
    Timo Kösters's avatar
    Timo Kösters committed
    use crate::{services, utils, Error, Result, Ruma};
    
    Jonas Platte's avatar
    Jonas Platte committed
    use futures_util::{stream::FuturesUnordered, StreamExt};
    
    Jonas Platte's avatar
    Jonas Platte committed
    use ruma::{
    
        api::{
            client::{
                error::ErrorKind,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
                keys::{
                    claim_keys, get_key_changes, get_keys, upload_keys, upload_signatures,
                    upload_signing_keys,
    
    Jonas Platte's avatar
    Jonas Platte committed
                },
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
                uiaa::{AuthFlow, AuthType, UiaaInfo},
    
    Jonas Platte's avatar
    Jonas Platte committed
        serde::Raw,
    
    Timo Kösters's avatar
    Timo Kösters committed
        DeviceKeyAlgorithm, OwnedDeviceId, OwnedUserId, UserId,
    
    use serde_json::json;
    
    use std::{
        collections::{hash_map, BTreeMap, HashMap, HashSet},
        time::{Duration, Instant},
    };
    use tracing::debug;
    
    /// # `POST /_matrix/client/r0/keys/upload`
    ///
    /// Publish end-to-end encryption keys for the sender device.
    ///
    /// - Adds one time keys
    /// - If there are no device keys yet: Adds device keys (TODO: merge with existing keys?)
    
    pub async fn upload_keys_route(
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        body: Ruma<upload_keys::v3::Request>,
    ) -> Result<upload_keys::v3::Response> {
    
        let sender_user = body.sender_user.as_ref().expect("user is authenticated");
        let sender_device = body.sender_device.as_ref().expect("user is authenticated");
    
    Jonas Platte's avatar
    Jonas Platte committed
        for (key_key, key_value) in &body.one_time_keys {
    
    Timo Kösters's avatar
    Timo Kösters committed
            services()
                .users
    
                .add_one_time_key(sender_user, sender_device, key_key, key_value)?;
    
        }
    
        if let Some(device_keys) = &body.device_keys {
    
            // TODO: merge this and the existing event?
    
            // This check is needed to assure that signatures are kept
    
            if services()
    
                .users
                .get_device_keys(sender_user, sender_device)?
                .is_none()
            {
    
    Timo Kösters's avatar
    Timo Kösters committed
                services()
                    .users
                    .add_device_keys(sender_user, sender_device, device_keys)?;
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        Ok(upload_keys::v3::Response {
    
    Timo Kösters's avatar
    Timo Kösters committed
            one_time_key_counts: services()
                .users
                .count_one_time_keys(sender_user, sender_device)?,
    
    /// # `POST /_matrix/client/r0/keys/query`
    ///
    /// Get end-to-end encryption keys for the given users.
    ///
    /// - Always fetches users from other servers over federation
    /// - Gets master keys, self-signing keys, user signing keys and device keys.
    /// - The master and self-signing keys contain signatures that the user is allowed to see
    
    Jonas Platte's avatar
    Jonas Platte committed
    pub async fn get_keys_route(body: Ruma<get_keys::v3::Request>) -> Result<get_keys::v3::Response> {
    
        let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
        let response = get_keys_helper(
            Some(sender_user),
            &body.device_keys,
            |u| u == sender_user,
            true, // Always allow local users to see device names of other local users
        )
        .await?;
    
    /// # `POST /_matrix/client/r0/keys/claim`
    ///
    /// Claims one-time keys
    
    pub async fn claim_keys_route(
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        body: Ruma<claim_keys::v3::Request>,
    ) -> Result<claim_keys::v3::Response> {
    
        let response = claim_keys_helper(&body.one_time_keys).await?;
    
    /// # `POST /_matrix/client/r0/keys/device_signing/upload`
    ///
    /// Uploads end-to-end key information for the sender user.
    ///
    /// - Requires UIAA to verify password
    
    pub async fn upload_signing_keys_route(
    
    Jonas Platte's avatar
    Jonas Platte committed
        body: Ruma<upload_signing_keys::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<upload_signing_keys::v3::Response> {
    
        let sender_user = body.sender_user.as_ref().expect("user is authenticated");
        let sender_device = body.sender_device.as_ref().expect("user is authenticated");
    
    
        // UIAA
        let mut uiaainfo = UiaaInfo {
            flows: vec![AuthFlow {
    
    Jonas Platte's avatar
    Jonas Platte committed
                stages: vec![AuthType::Password],
    
            }],
            completed: Vec::new(),
            params: Default::default(),
            session: None,
            auth_error: None,
        };
    
        if let Some(auth) = &body.auth {
    
    Timo Kösters's avatar
    Timo Kösters committed
            let (worked, uiaainfo) =
                services()
                    .uiaa
                    .try_auth(sender_user, sender_device, auth, &uiaainfo)?;
    
            if !worked {
                return Err(Error::Uiaa(uiaainfo));
            }
        // Success!
    
        } else if let Some(json) = body.json_body {
            uiaainfo.session = Some(utils::random_string(SESSION_ID_LENGTH));
    
    Timo Kösters's avatar
    Timo Kösters committed
            services()
                .uiaa
    
                .create(sender_user, sender_device, &uiaainfo, &json)?;
    
            return Err(Error::Uiaa(uiaainfo));
    
            return Err(Error::BadRequest(ErrorKind::NotJson, "Not json."));
    
        }
    
        if let Some(master_key) = &body.master_key {
    
            services().users.add_cross_signing_keys(
    
                sender_user,
    
                &body.self_signing_key,
                &body.user_signing_key,
    
                true, // notify so that other users see the new keys
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        Ok(upload_signing_keys::v3::Response {})
    
    /// # `POST /_matrix/client/r0/keys/signatures/upload`
    ///
    /// Uploads end-to-end key signatures from the sender user.
    
    pub async fn upload_signatures_route(
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        body: Ruma<upload_signatures::v3::Request>,
    ) -> Result<upload_signatures::v3::Response> {
    
        let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
        for (user_id, keys) in &body.signed_keys {
            for (key_id, key) in keys {
                let key = serde_json::to_value(key)
                    .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid key JSON"))?;
    
                for signature in key
    
                    .get("signatures")
                    .ok_or(Error::BadRequest(
                        ErrorKind::InvalidParam,
                        "Missing signatures field.",
                    ))?
    
                    .get(sender_user.to_string())
    
                    .ok_or(Error::BadRequest(
                        ErrorKind::InvalidParam,
                        "Invalid user in signatures field.",
                    ))?
                    .as_object()
                    .ok_or(Error::BadRequest(
                        ErrorKind::InvalidParam,
                        "Invalid signature.",
                    ))?
                    .clone()
                    .into_iter()
                {
                    // Signature validation?
                    let signature = (
                        signature.0,
                        signature
                            .1
                            .as_str()
                            .ok_or(Error::BadRequest(
                                ErrorKind::InvalidParam,
                                "Invalid signature value.",
                            ))?
                            .to_owned(),
                    );
    
    Timo Kösters's avatar
    Timo Kösters committed
                    services()
                        .users
                        .sign_key(user_id, key_id, signature, sender_user)?;
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        Ok(upload_signatures::v3::Response {
            failures: BTreeMap::new(), // TODO: integrate
        })
    
    /// # `POST /_matrix/client/r0/keys/changes`
    ///
    /// Gets a list of users who have updated their device identity keys since the previous sync token.
    ///
    /// - TODO: left users
    
    pub async fn get_key_changes_route(
    
    Jonas Platte's avatar
    Jonas Platte committed
        body: Ruma<get_key_changes::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<get_key_changes::v3::Response> {
    
        let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
        let mut device_list_updates = HashSet::new();
    
        device_list_updates.extend(
    
    Timo Kösters's avatar
    Timo Kösters committed
            services()
                .users
    
                .keys_changed(
    
                    sender_user.as_str(),
    
                    body.from
                        .parse()
                        .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid `from`."))?,
                    Some(
                        body.to
                            .parse()
                            .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid `to`."))?,
                    ),
                )
                .filter_map(|r| r.ok()),
        );
    
    
    Timo Kösters's avatar
    Timo Kösters committed
        for room_id in services()
            .rooms
            .state_cache
            .rooms_joined(sender_user)
            .filter_map(|r| r.ok())
        {
    
            device_list_updates.extend(
    
    Timo Kösters's avatar
    Timo Kösters committed
                services()
                    .users
    
                    .keys_changed(
    
    Nyaaori's avatar
    Nyaaori committed
                        room_id.as_ref(),
    
                        body.from.parse().map_err(|_| {
                            Error::BadRequest(ErrorKind::InvalidParam, "Invalid `from`.")
                        })?,
                        Some(body.to.parse().map_err(|_| {
                            Error::BadRequest(ErrorKind::InvalidParam, "Invalid `to`.")
                        })?),
                    )
                    .filter_map(|r| r.ok()),
            );
        }
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        Ok(get_key_changes::v3::Response {
    
            changed: device_list_updates.into_iter().collect(),
            left: Vec::new(), // TODO
    
    pub(crate) async fn get_keys_helper<F: Fn(&UserId) -> bool>(
    
    Timo Kösters's avatar
    Timo Kösters committed
        device_keys_input: &BTreeMap<OwnedUserId, Vec<OwnedDeviceId>>,
    
        include_display_names: bool,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<get_keys::v3::Response> {
    
        let mut master_keys = BTreeMap::new();
        let mut self_signing_keys = BTreeMap::new();
        let mut user_signing_keys = BTreeMap::new();
        let mut device_keys = BTreeMap::new();
    
    
        let mut get_over_federation = HashMap::new();
    
        for (user_id, device_ids) in device_keys_input {
    
    Nyaaori's avatar
    Nyaaori committed
            let user_id: &UserId = user_id;
    
    Jonas Platte's avatar
    Jonas Platte committed
    
    
            if user_id.server_name() != services().globals.server_name() {
    
                get_over_federation
                    .entry(user_id.server_name())
                    .or_insert_with(Vec::new)
                    .push((user_id, device_ids));
    
            if device_ids.is_empty() {
                let mut container = BTreeMap::new();
    
                for device_id in services().users.all_device_ids(user_id) {
    
                    if let Some(mut keys) = services().users.get_device_keys(user_id, &device_id)? {
                        let metadata = services()
    
                            .users
                            .get_device_metadata(user_id, &device_id)?
                            .ok_or_else(|| {
                                Error::bad_database("all_device_keys contained nonexistent device.")
                            })?;
    
    
                        add_unsigned_device_display_name(&mut keys, metadata, include_display_names)
    
    Jonas Platte's avatar
    Jonas Platte committed
                            .map_err(|_| Error::bad_database("invalid device keys in database"))?;
    
    Jonas Platte's avatar
    Jonas Platte committed
                device_keys.insert(user_id.to_owned(), container);
    
            } else {
                for device_id in device_ids {
                    let mut container = BTreeMap::new();
    
                    if let Some(mut keys) = services().users.get_device_keys(user_id, device_id)? {
    
    Timo Kösters's avatar
    Timo Kösters committed
                        let metadata = services()
                            .users
                            .get_device_metadata(user_id, device_id)?
                            .ok_or(Error::BadRequest(
    
                                ErrorKind::InvalidParam,
                                "Tried to get keys for nonexistent device.",
    
    Timo Kösters's avatar
    Timo Kösters committed
                            ))?;
    
                        add_unsigned_device_display_name(&mut keys, metadata, include_display_names)
    
    Jonas Platte's avatar
    Jonas Platte committed
                            .map_err(|_| Error::bad_database("invalid device keys in database"))?;
    
    Jonas Platte's avatar
    Jonas Platte committed
                        container.insert(device_id.to_owned(), keys);
    
    Jonas Platte's avatar
    Jonas Platte committed
                    device_keys.insert(user_id.to_owned(), container);
    
            if let Some(master_key) =
                services()
                    .users
                    .get_master_key(sender_user, user_id, &allowed_signatures)?
    
    Timo Kösters's avatar
    Timo Kösters committed
            {
    
    Jonas Platte's avatar
    Jonas Platte committed
                master_keys.insert(user_id.to_owned(), master_key);
    
            if let Some(self_signing_key) =
                services()
                    .users
                    .get_self_signing_key(sender_user, user_id, &allowed_signatures)?
    
    Jonas Platte's avatar
    Jonas Platte committed
                self_signing_keys.insert(user_id.to_owned(), self_signing_key);
    
            }
            if Some(user_id) == sender_user {
    
                if let Some(user_signing_key) = services().users.get_user_signing_key(user_id)? {
    
    Jonas Platte's avatar
    Jonas Platte committed
                    user_signing_keys.insert(user_id.to_owned(), user_signing_key);
    
        let mut failures = BTreeMap::new();
    
    
        let back_off = |id| match services()
            .globals
            .bad_query_ratelimiter
            .write()
            .unwrap()
            .entry(id)
        {
            hash_map::Entry::Vacant(e) => {
                e.insert((Instant::now(), 1));
            }
            hash_map::Entry::Occupied(mut e) => *e.get_mut() = (Instant::now(), e.get().1 + 1),
        };
    
    
    Jonas Platte's avatar
    Jonas Platte committed
        let mut futures: FuturesUnordered<_> = get_over_federation
    
            .into_iter()
            .map(|(server, vec)| async move {
    
                if let Some((time, tries)) = services()
                    .globals
                    .bad_query_ratelimiter
                    .read()
                    .unwrap()
                    .get(&*server)
                {
                    // Exponential backoff
                    let mut min_elapsed_duration = Duration::from_secs(30) * (*tries) * (*tries);
                    if min_elapsed_duration > Duration::from_secs(60 * 60 * 24) {
                        min_elapsed_duration = Duration::from_secs(60 * 60 * 24);
                    }
    
                    if time.elapsed() < min_elapsed_duration {
                        debug!("Backing off query from {:?}", server);
                        return (
                            server,
                            Err(Error::BadServerResponse("bad query, still backing off")),
                        );
                    }
                }
    
    
                let mut device_keys_input_fed = BTreeMap::new();
                for (user_id, keys) in vec {
    
    Jonas Platte's avatar
    Jonas Platte committed
                    device_keys_input_fed.insert(user_id.to_owned(), keys.clone());
    
                    tokio::time::timeout(
                        Duration::from_secs(25),
                        services().sending.send_federation_request(
    
                            server,
                            federation::keys::get_keys::v1::Request {
                                device_keys: device_keys_input_fed,
                            },
    
                        ),
                    )
                    .await
                    .map_err(|e| Error::BadServerResponse("Query took too long")),
    
    Jonas Platte's avatar
    Jonas Platte committed
            .collect();
    
    
        while let Some((server, response)) = futures.next().await {
            match response {
    
                Ok(Ok(response)) => {
    
                    for (user, masterkey) in response.master_keys {
                        let (master_key_id, mut master_key) =
                            services().users.parse_master_key(&user, &masterkey)?;
    
                        if let Some(our_master_key) = services().users.get_key(
                            &master_key_id,
                            sender_user,
                            &user,
                            &allowed_signatures,
                        )? {
                            let (_, our_master_key) =
                                services().users.parse_master_key(&user, &our_master_key)?;
                            master_key.signatures.extend(our_master_key.signatures);
                        }
                        let json = serde_json::to_value(master_key).expect("to_value always works");
                        let raw = serde_json::from_value(json).expect("Raw::from_value always works");
    
                        services().users.add_cross_signing_keys(
                            &user, &raw, &None, &None,
                            false, // Dont notify. A notification would trigger another key request resulting in an endless loop
                        )?;
    
                        master_keys.insert(user, raw);
                    }
    
    
                    self_signing_keys.extend(response.self_signing_keys);
                    device_keys.extend(response.device_keys);
                }
    
                _ => {
                    back_off(server.to_owned());
    
                    failures.insert(server.to_string(), json!({}));
                }
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        Ok(get_keys::v3::Response {
    
            master_keys,
            self_signing_keys,
            user_signing_keys,
            device_keys,
    
    Jonas Platte's avatar
    Jonas Platte committed
    fn add_unsigned_device_display_name(
        keys: &mut Raw<ruma::encryption::DeviceKeys>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        metadata: ruma::api::client::device::Device,
    
        include_display_names: bool,
    
    Jonas Platte's avatar
    Jonas Platte committed
    ) -> serde_json::Result<()> {
        if let Some(display_name) = metadata.display_name {
            let mut object = keys.deserialize_as::<serde_json::Map<String, serde_json::Value>>()?;
    
            let unsigned = object.entry("unsigned").or_insert_with(|| json!({}));
            if let serde_json::Value::Object(unsigned_object) = unsigned {
    
                if include_display_names {
                    unsigned_object.insert("device_display_name".to_owned(), display_name.into());
                } else {
                    unsigned_object.insert(
                        "device_display_name".to_owned(),
                        Some(metadata.device_id.as_str().to_string()).into(),
                    );
                }
    
    Jonas Platte's avatar
    Jonas Platte committed
            }
    
            *keys = Raw::from_json(serde_json::value::to_raw_value(&object)?);
        }
    
        Ok(())
    }
    
    
    pub(crate) async fn claim_keys_helper(
    
    Timo Kösters's avatar
    Timo Kösters committed
        one_time_keys_input: &BTreeMap<OwnedUserId, BTreeMap<OwnedDeviceId, DeviceKeyAlgorithm>>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<claim_keys::v3::Response> {
    
        let mut one_time_keys = BTreeMap::new();
    
    
        let mut get_over_federation = BTreeMap::new();
    
    
        for (user_id, map) in one_time_keys_input {
    
            if user_id.server_name() != services().globals.server_name() {
    
                get_over_federation
                    .entry(user_id.server_name())
                    .or_insert_with(Vec::new)
                    .push((user_id, map));
            }
    
    
            let mut container = BTreeMap::new();
            for (device_id, key_algorithm) in map {
                if let Some(one_time_keys) =
    
    Timo Kösters's avatar
    Timo Kösters committed
                    services()
                        .users
    
                        .take_one_time_key(user_id, device_id, key_algorithm)?
    
                {
                    let mut c = BTreeMap::new();
                    c.insert(one_time_keys.0, one_time_keys.1);
                    container.insert(device_id.clone(), c);
                }
            }
            one_time_keys.insert(user_id.clone(), container);
        }
    
    
        let mut failures = BTreeMap::new();
    
    
        let mut futures: FuturesUnordered<_> = get_over_federation
            .into_iter()
            .map(|(server, vec)| async move {
    
                let mut one_time_keys_input_fed = BTreeMap::new();
    
                for (user_id, keys) in vec {
                    one_time_keys_input_fed.insert(user_id.clone(), keys.clone());
                }
                (
    
                    services()
                        .sending
                        .send_federation_request(
                            server,
                            federation::keys::claim_keys::v1::Request {
                                one_time_keys: one_time_keys_input_fed,
                            },
                        )
                        .await,
    
    
        while let Some((server, response)) = futures.next().await {
            match response {
                Ok(keys) => {
                    one_time_keys.extend(keys.one_time_keys);
                }
                Err(_e) => {
                    failures.insert(server.to_string(), json!({}));
                }
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
        Ok(claim_keys::v3::Response {
    
            failures,