Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
conduwuit
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
🥺
conduwuit
Commits
99fdf699
Commit
99fdf699
authored
1 year ago
by
🥺
Committed by
🥺
1 year ago
Browse files
Options
Downloads
Patches
Plain Diff
finish query_trusted_key_servers_first option
Signed-off-by:
strawberry
<
strawberry@puppygock.gay
>
parent
d2060c86
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
src/service/rooms/event_handler/mod.rs
+99
-36
99 additions, 36 deletions
src/service/rooms/event_handler/mod.rs
with
99 additions
and
36 deletions
src/service/rooms/event_handler/mod.rs
+
99
−
36
View file @
99fdf699
...
...
@@ -1290,6 +1290,8 @@ async fn get_server_keys_from_cache(
Ok
(())
}
/// Batch requests homeserver signing keys from trusted notary key servers
/// (`trusted_servers` config option)
async
fn
batch_request_signing_keys
(
&
self
,
mut
servers
:
BTreeMap
<
OwnedServerName
,
BTreeMap
<
OwnedServerSigningKeyId
,
QueryCriteria
>>
,
pub_key_map
:
&
RwLock
<
BTreeMap
<
String
,
BTreeMap
<
String
,
Base64
>>>
,
...
...
@@ -1336,6 +1338,8 @@ async fn batch_request_signing_keys(
Ok
(())
}
/// Requests multiple homeserver signing keys from individual servers (not
/// trused notary servers)
async
fn
request_signing_keys
(
&
self
,
servers
:
BTreeMap
<
OwnedServerName
,
BTreeMap
<
OwnedServerSigningKeyId
,
QueryCriteria
>>
,
pub_key_map
:
&
RwLock
<
BTreeMap
<
String
,
BTreeMap
<
String
,
Base64
>>>
,
...
...
@@ -1521,70 +1525,129 @@ pub async fn fetch_signing_keys_for_server(
}
}
debug!
(
"Loading signing keys for {
}"
,
origin
);
debug!
(
"Loading signing keys for {origin
} from our database if available"
);
let
mut
result
:
BTreeMap
<
_
,
_
>
=
services
()
.globals
.signing_keys_for
(
origin
)
?
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
))
.collect
();
if
contains_all_ids
(
&
result
)
{
debug!
(
"We have all homeserver signing keys locally for {origin}, not fetching any remotely"
);
return
Ok
(
result
);
}
debug!
(
"Fetching signing keys for {} over federation"
,
origin
);
if
let
Some
(
server_key
)
=
services
()
.sending
.send_federation_request
(
origin
,
get_server_keys
::
v2
::
Request
::
new
())
.await
.ok
()
.and_then
(|
resp
|
resp
.server_key
.deserialize
()
.ok
())
{
services
()
.globals
.add_signing_key
(
origin
,
server_key
.clone
())
?
;
// i didnt split this out into their own functions because it's relatively small
if
services
()
.globals
.query_trusted_key_servers_first
()
{
info!
(
"query_trusted_key_servers_first is set to true, querying notary trusted servers first for {origin}
\
keys"
);
result
.extend
(
server_key
.verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
result
.extend
(
server_key
.old_verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
for
server
in
services
()
.globals
.trusted_servers
()
{
debug!
(
"Asking notary server {server} for {origin}'s signing key"
);
if
let
Some
(
server_keys
)
=
services
()
.sending
.send_federation_request
(
server
,
get_remote_server_keys
::
v2
::
Request
::
new
(
origin
.to_owned
(),
MilliSecondsSinceUnixEpoch
::
from_system_time
(
SystemTime
::
now
()
.checked_add
(
Duration
::
from_secs
(
3600
))
.expect
(
"SystemTime too large"
),
)
.expect
(
"time is valid"
),
),
)
.await
.ok
()
.map
(|
resp
|
resp
.server_keys
.into_iter
()
.filter_map
(|
e
|
e
.deserialize
()
.ok
())
.collect
::
<
Vec
<
_
>>
())
{
debug!
(
"Got signing keys: {:?}"
,
server_keys
);
for
k
in
server_keys
{
services
()
.globals
.add_signing_key
(
origin
,
k
.clone
())
?
;
result
.extend
(
k
.verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
result
.extend
(
k
.old_verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
}
if
contains_all_ids
(
&
result
)
{
return
Ok
(
result
);
if
contains_all_ids
(
&
result
)
{
return
Ok
(
result
);
}
}
}
}
for
server
in
services
()
.globals
.trusted_servers
()
{
debug!
(
"Asking {} for {}'s signing key"
,
server
,
origin
);
if
let
Some
(
server_keys
)
=
services
()
debug!
(
"Asking {origin} for their signing keys over federation"
);
if
let
Some
(
server_key
)
=
services
()
.sending
.send_federation_request
(
server
,
get_remote_server_keys
::
v2
::
Request
::
new
(
origin
.to_owned
(),
MilliSecondsSinceUnixEpoch
::
from_system_time
(
SystemTime
::
now
()
.checked_add
(
Duration
::
from_secs
(
3600
))
.expect
(
"SystemTime too large"
),
)
.expect
(
"time is valid"
),
),
)
.send_federation_request
(
origin
,
get_server_keys
::
v2
::
Request
::
new
())
.await
.ok
()
.
map
(|
resp
|
resp
.server_key
s
.into_iter
()
.filter_map
(|
e
|
e
.deserialize
()
.ok
())
.collect
::
<
Vec
<
_
>>
())
.
and_then
(|
resp
|
resp
.server_key
.deserialize
()
.ok
())
{
debug!
(
"Got signing keys: {:?}"
,
server_keys
);
for
k
in
server_keys
{
services
()
.globals
.add_signing_key
(
origin
,
k
.clone
())
?
;
result
.extend
(
k
.verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
result
.extend
(
k
.old_verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
services
()
.globals
.add_signing_key
(
origin
,
server_key
.clone
())
?
;
result
.extend
(
server_key
.verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
result
.extend
(
server_key
.old_verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
if
contains_all_ids
(
&
result
)
{
return
Ok
(
result
);
}
}
}
else
{
info!
(
"query_trusted_key_servers_first is set to false, querying {origin} first"
);
debug!
(
"Asking {origin} for their signing keys over federation"
);
if
let
Some
(
server_key
)
=
services
()
.sending
.send_federation_request
(
origin
,
get_server_keys
::
v2
::
Request
::
new
())
.await
.ok
()
.and_then
(|
resp
|
resp
.server_key
.deserialize
()
.ok
())
{
services
()
.globals
.add_signing_key
(
origin
,
server_key
.clone
())
?
;
result
.extend
(
server_key
.verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
result
.extend
(
server_key
.old_verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
if
contains_all_ids
(
&
result
)
{
return
Ok
(
result
);
}
}
for
server
in
services
()
.globals
.trusted_servers
()
{
debug!
(
"Asking notary server {server} for {origin}'s signing key"
);
if
let
Some
(
server_keys
)
=
services
()
.sending
.send_federation_request
(
server
,
get_remote_server_keys
::
v2
::
Request
::
new
(
origin
.to_owned
(),
MilliSecondsSinceUnixEpoch
::
from_system_time
(
SystemTime
::
now
()
.checked_add
(
Duration
::
from_secs
(
3600
))
.expect
(
"SystemTime too large"
),
)
.expect
(
"time is valid"
),
),
)
.await
.ok
()
.map
(|
resp
|
resp
.server_keys
.into_iter
()
.filter_map
(|
e
|
e
.deserialize
()
.ok
())
.collect
::
<
Vec
<
_
>>
())
{
debug!
(
"Got signing keys: {:?}"
,
server_keys
);
for
k
in
server_keys
{
services
()
.globals
.add_signing_key
(
origin
,
k
.clone
())
?
;
result
.extend
(
k
.verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
result
.extend
(
k
.old_verify_keys
.into_iter
()
.map
(|(
k
,
v
)|
(
k
.to_string
(),
v
.key
)));
}
if
contains_all_ids
(
&
result
)
{
return
Ok
(
result
);
}
}
}
}
drop
(
permit
);
back_off
(
signature_ids
)
.await
;
warn!
(
"Failed to find public key for server: {
}"
,
origin
);
warn!
(
"Failed to find public key for server: {origin
}"
);
Err
(
Error
::
BadServerResponse
(
"Failed to find public key for server"
))
}
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment