Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
synapse
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Monitor
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Maunium
synapse
Commits
28f71ecf
Commit
28f71ecf
authored
10 years ago
by
Erik Johnston
Browse files
Options
Downloads
Patches
Plain Diff
Change upgrade script to not check hashes or signatures
parent
f06161a3
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
scripts/upgrade_db_to_v0.6.0.py
+53
-46
53 additions, 46 deletions
scripts/upgrade_db_to_v0.6.0.py
with
53 additions
and
46 deletions
scripts/upgrade_db_to_v0.6.0.py
+
53
−
46
View file @
28f71ecf
...
...
@@ -21,7 +21,7 @@ from syutil.crypto.signing_key import decode_verify_key_bytes
from
syutil.jsonutil
import
encode_canonical_json
import
argparse
import
dns.resolver
#
import dns.resolver
import
hashlib
import
httplib
import
json
...
...
@@ -147,44 +147,44 @@ class Store(object):
store
=
Store
()
def
get_key
(
server_name
):
print
"
Getting keys for: %s
"
%
(
server_name
,)
targets
=
[]
if
"
:
"
in
server_name
:
target
,
port
=
server_name
.
split
(
"
:
"
)
targets
.
append
((
target
,
int
(
port
)))
try
:
answers
=
dns
.
resolver
.
query
(
"
_matrix._tcp.
"
+
server_name
,
"
SRV
"
)
for
srv
in
answers
:
targets
.
append
((
srv
.
target
,
srv
.
port
))
except
dns
.
resolver
.
NXDOMAIN
:
targets
.
append
((
server_name
,
8448
))
except
:
print
"
Failed to lookup keys for %s
"
%
(
server_name
,)
return
{}
for
target
,
port
in
targets
:
url
=
"
https://%s:%i/_matrix/key/v1
"
%
(
target
,
port
)
try
:
keys
=
json
.
load
(
urllib2
.
urlopen
(
url
,
timeout
=
2
))
verify_keys
=
{}
for
key_id
,
key_base64
in
keys
[
"
verify_keys
"
].
items
():
verify_key
=
decode_verify_key_bytes
(
key_id
,
decode_base64
(
key_base64
)
)
verify_signed_json
(
keys
,
server_name
,
verify_key
)
verify_keys
[
key_id
]
=
verify_key
print
"
Got keys for: %s
"
%
(
server_name
,)
return
verify_keys
except
urllib2
.
URLError
:
pass
except
urllib2
.
HTTPError
:
pass
except
httplib
.
HTTPException
:
pass
print
"
Failed to get keys for %s
"
%
(
server_name
,)
return
{}
#
def get_key(server_name):
#
print "Getting keys for: %s" % (server_name,)
#
targets = []
#
if ":" in server_name:
#
target, port = server_name.split(":")
#
targets.append((target, int(port)))
#
try:
#
answers = dns.resolver.query("_matrix._tcp." + server_name, "SRV")
#
for srv in answers:
#
targets.append((srv.target, srv.port))
#
except dns.resolver.NXDOMAIN:
#
targets.append((server_name, 8448))
#
except:
#
print "Failed to lookup keys for %s" % (server_name,)
#
return {}
#
#
for target, port in targets:
#
url = "https://%s:%i/_matrix/key/v1" % (target, port)
#
try:
#
keys = json.load(urllib2.urlopen(url, timeout=2))
#
verify_keys = {}
#
for key_id, key_base64 in keys["verify_keys"].items():
#
verify_key = decode_verify_key_bytes(
#
key_id, decode_base64(key_base64)
#
)
#
verify_signed_json(keys, server_name, verify_key)
#
verify_keys[key_id] = verify_key
#
print "Got keys for: %s" % (server_name,)
#
return verify_keys
#
except urllib2.URLError:
#
pass
#
except urllib2.HTTPError:
#
pass
#
except httplib.HTTPException:
#
pass
#
#
print "Failed to get keys for %s" % (server_name,)
#
return {}
def
reinsert_events
(
cursor
,
server_name
,
signing_key
):
...
...
@@ -219,13 +219,20 @@ def reinsert_events(cursor, server_name, signing_key):
}
}
i
=
0
N
=
len
(
events
)
for
event
in
events
:
for
alg_name
in
event
.
hashes
:
if
check_event_content_hash
(
event
,
algorithms
[
alg_name
]):
pass
else
:
pass
print
"
FAIL content hash %s %s
"
%
(
alg_name
,
event
.
event_id
,
)
if
i
%
100
==
0
:
print
"
Processed: %d/%d events
"
%
(
i
,
N
,)
i
+=
1
# for alg_name in event.hashes:
# if check_event_content_hash(event, algorithms[alg_name]):
# pass
# else:
# pass
# print "FAIL content hash %s %s" % (alg_name, event.event_id, )
have_own_correctly_signed
=
False
for
host
,
sigs
in
event
.
signatures
.
items
():
...
...
@@ -233,7 +240,7 @@ def reinsert_events(cursor, server_name, signing_key):
for
key_id
in
sigs
:
if
host
not
in
server_keys
:
server_keys
[
host
]
=
get_key
(
host
)
server_keys
[
host
]
=
{}
#
get_key(host)
if
key_id
in
server_keys
[
host
]:
try
:
verify_signed_json
(
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment