Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
synapse
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Monitor
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Maunium
synapse
Commits
0a016b05
Commit
0a016b05
authored
9 years ago
by
Erik Johnston
Browse files
Options
Downloads
Patches
Plain Diff
Pull inner function out.
parent
e701aec2
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
synapse/crypto/keyring.py
+77
-76
77 additions, 76 deletions
synapse/crypto/keyring.py
with
77 additions
and
76 deletions
synapse/crypto/keyring.py
+
77
−
76
View file @
0a016b05
...
...
@@ -101,92 +101,93 @@ class Keyring(object):
defer
.
returnValue
(
cached
[
0
])
return
@defer.inlineCallbacks
def
fetch_keys
():
# Try to fetch the key from the remote server.
limiter
=
yield
get_retry_limiter
(
server_name
,
self
.
clock
,
self
.
store
,
)
download
=
self
.
key_downloads
.
get
(
server_name
)
with
limiter
:
(
response
,
tls_certificate
)
=
yield
fetch_server_key
(
server_name
,
self
.
hs
.
tls_context_factory
)
if
download
is
None
:
download
=
self
.
_get_server_verify_key_impl
(
server_name
,
key_ids
)
self
.
key_downloads
[
server_name
]
=
download
@download.addBoth
def
callback
(
ret
):
del
self
.
key_downloads
[
server_name
]
return
ret
r
=
yield
create_observer
(
download
)
defer
.
returnValue
(
r
)
# Check the response.
x509_certificate_bytes
=
crypto
.
dump_certificate
(
crypto
.
FILETYPE_ASN1
,
tls_certificate
@defer.inlineCallbacks
def
_get_server_verify_key_impl
(
self
,
server_name
,
key_ids
):
# Try to fetch the key from the remote server.
limiter
=
yield
get_retry_limiter
(
server_name
,
self
.
clock
,
self
.
store
,
)
with
limiter
:
(
response
,
tls_certificate
)
=
yield
fetch_server_key
(
server_name
,
self
.
hs
.
tls_context_factory
)
if
(
"
signatures
"
not
in
response
or
server_name
not
in
response
[
"
signatures
"
]):
raise
ValueError
(
"
Key response not signed by remote server
"
)
if
"
tls_certificate
"
not
in
response
:
raise
ValueError
(
"
Key response missing TLS certificate
"
)
tls_certificate_b64
=
response
[
"
tls_certificate
"
]
if
encode_base64
(
x509_certificate_bytes
)
!=
tls_certificate_b64
:
raise
ValueError
(
"
TLS certificate doesn
'
t match
"
)
verify_keys
=
{}
for
key_id
,
key_base64
in
response
[
"
verify_keys
"
].
items
():
if
is_signing_algorithm_supported
(
key_id
):
key_bytes
=
decode_base64
(
key_base64
)
verify_key
=
decode_verify_key_bytes
(
key_id
,
key_bytes
)
verify_keys
[
key_id
]
=
verify_key
for
key_id
in
response
[
"
signatures
"
][
server_name
]:
if
key_id
not
in
response
[
"
verify_keys
"
]:
raise
ValueError
(
"
Key response must include verification keys for all
"
"
signatures
"
)
if
key_id
in
verify_keys
:
verify_signed_json
(
response
,
server_name
,
verify_keys
[
key_id
]
)
# Cache the result in the datastore.
time_now_ms
=
self
.
clock
.
time_msec
()
yield
self
.
store
.
store_server_certificate
(
server_name
,
server_name
,
time_now_ms
,
tls_certificate
,
)
# Check the response.
x509_certificate_bytes
=
crypto
.
dump_certificate
(
crypto
.
FILETYPE_ASN1
,
tls_certificate
)
for
key_id
,
key
in
verify_keys
.
items
():
yield
self
.
store
.
store_server_verify_key
(
server_name
,
server_name
,
time_now_ms
,
key
if
(
"
signatures
"
not
in
response
or
server_name
not
in
response
[
"
signatures
"
]):
raise
ValueError
(
"
Key response not signed by remote server
"
)
if
"
tls_certificate
"
not
in
response
:
raise
ValueError
(
"
Key response missing TLS certificate
"
)
tls_certificate_b64
=
response
[
"
tls_certificate
"
]
if
encode_base64
(
x509_certificate_bytes
)
!=
tls_certificate_b64
:
raise
ValueError
(
"
TLS certificate doesn
'
t match
"
)
verify_keys
=
{}
for
key_id
,
key_base64
in
response
[
"
verify_keys
"
].
items
():
if
is_signing_algorithm_supported
(
key_id
):
key_bytes
=
decode_base64
(
key_base64
)
verify_key
=
decode_verify_key_bytes
(
key_id
,
key_bytes
)
verify_keys
[
key_id
]
=
verify_key
for
key_id
in
response
[
"
signatures
"
][
server_name
]:
if
key_id
not
in
response
[
"
verify_keys
"
]:
raise
ValueError
(
"
Key response must include verification keys for all
"
"
signatures
"
)
if
key_id
in
verify_keys
:
verify_signed_json
(
response
,
server_name
,
verify_keys
[
key_id
]
)
for
key_id
in
key_ids
:
if
key_id
in
verify_keys
:
defer
.
returnValue
(
verify_keys
[
key_id
])
return
# Cache the result in the datastore.
raise
ValueError
(
"
No verification key found for given key ids
"
)
time_now_ms
=
self
.
clock
.
time_msec
(
)
download
=
self
.
key_downloads
.
get
(
server_name
)
yield
self
.
store
.
store_server_certificate
(
server_name
,
server_name
,
time_now_ms
,
tls_certificate
,
)
if
download
is
None
:
download
=
fetch_keys
()
self
.
key_downloads
[
server_name
]
=
download
for
key_id
,
key
in
verify_keys
.
items
():
yield
self
.
store
.
store_server_verify_key
(
server_name
,
server_name
,
time_now_ms
,
key
)
@download.addBoth
def
callback
(
ret
)
:
de
l
self
.
key_downloads
[
server_name
]
return
ret
for
key_id
in
key_ids
:
if
key_id
in
verify_keys
:
de
fer
.
returnValue
(
verify_keys
[
key_id
])
return
r
=
yield
create_observer
(
download
)
defer
.
returnValue
(
r
)
raise
ValueError
(
"
No verification key found for given key ids
"
)
\ No newline at end of file
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment