2020-05-14 13:05:14 +00:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
2020-07-15 11:02:34 +00:00
|
|
|
"encoding/json"
|
2020-05-14 13:05:14 +00:00
|
|
|
"net/http"
|
2020-07-15 17:40:41 +00:00
|
|
|
"time"
|
2020-05-14 13:05:14 +00:00
|
|
|
|
2022-10-06 10:30:24 +00:00
|
|
|
"github.com/matrix-org/util"
|
|
|
|
|
2020-07-15 11:02:34 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
2023-02-20 13:58:03 +00:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2023-05-09 22:46:49 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2020-05-14 13:05:14 +00:00
|
|
|
)
|
|
|
|
|
2020-07-15 11:02:34 +00:00
|
|
|
type uploadKeysRequest struct {
|
|
|
|
DeviceKeys json.RawMessage `json:"device_keys"`
|
|
|
|
OneTimeKeys map[string]json.RawMessage `json:"one_time_keys"`
|
|
|
|
}
|
|
|
|
|
2023-02-20 13:58:03 +00:00
|
|
|
func UploadKeys(req *http.Request, keyAPI api.ClientKeyAPI, device *api.Device) util.JSONResponse {
|
2020-07-15 11:02:34 +00:00
|
|
|
var r uploadKeysRequest
|
|
|
|
resErr := httputil.UnmarshalJSONRequest(req, &r)
|
|
|
|
if resErr != nil {
|
|
|
|
return *resErr
|
|
|
|
}
|
|
|
|
|
2021-03-02 11:40:20 +00:00
|
|
|
uploadReq := &api.PerformUploadKeysRequest{
|
|
|
|
DeviceID: device.ID,
|
|
|
|
UserID: device.UserID,
|
|
|
|
}
|
2020-07-15 11:02:34 +00:00
|
|
|
if r.DeviceKeys != nil {
|
|
|
|
uploadReq.DeviceKeys = []api.DeviceKeys{
|
|
|
|
{
|
|
|
|
DeviceID: device.ID,
|
|
|
|
UserID: device.UserID,
|
|
|
|
KeyJSON: r.DeviceKeys,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if r.OneTimeKeys != nil {
|
|
|
|
uploadReq.OneTimeKeys = []api.OneTimeKeys{
|
|
|
|
{
|
|
|
|
DeviceID: device.ID,
|
|
|
|
UserID: device.UserID,
|
|
|
|
KeyJSON: r.OneTimeKeys,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var uploadRes api.PerformUploadKeysResponse
|
2022-08-11 14:29:33 +00:00
|
|
|
if err := keyAPI.PerformUploadKeys(req.Context(), uploadReq, &uploadRes); err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-07-15 11:02:34 +00:00
|
|
|
if uploadRes.Error != nil {
|
|
|
|
util.GetLogger(req.Context()).WithError(uploadRes.Error).Error("Failed to PerformUploadKeys")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2020-07-15 11:02:34 +00:00
|
|
|
}
|
|
|
|
if len(uploadRes.KeyErrors) > 0 {
|
|
|
|
util.GetLogger(req.Context()).WithField("key_errors", uploadRes.KeyErrors).Error("Failed to upload one or more keys")
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: 400,
|
|
|
|
JSON: uploadRes.KeyErrors,
|
|
|
|
}
|
|
|
|
}
|
2020-07-15 14:26:04 +00:00
|
|
|
keyCount := make(map[string]int)
|
|
|
|
if len(uploadRes.OneTimeKeyCounts) > 0 {
|
|
|
|
keyCount = uploadRes.OneTimeKeyCounts[0].KeyCount
|
|
|
|
}
|
2020-07-13 15:02:35 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: 200,
|
2020-07-15 11:02:34 +00:00
|
|
|
JSON: struct {
|
|
|
|
OTKCounts interface{} `json:"one_time_key_counts"`
|
2020-07-15 14:26:04 +00:00
|
|
|
}{keyCount},
|
2020-07-13 15:02:35 +00:00
|
|
|
}
|
|
|
|
}
|
2020-07-15 17:40:41 +00:00
|
|
|
|
|
|
|
type queryKeysRequest struct {
|
|
|
|
Timeout int `json:"timeout"`
|
|
|
|
Token string `json:"token"`
|
|
|
|
DeviceKeys map[string][]string `json:"device_keys"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *queryKeysRequest) GetTimeout() time.Duration {
|
|
|
|
if r.Timeout == 0 {
|
|
|
|
return 10 * time.Second
|
|
|
|
}
|
2022-10-24 09:07:50 +00:00
|
|
|
timeout := time.Duration(r.Timeout) * time.Millisecond
|
|
|
|
if timeout > time.Second*20 {
|
|
|
|
timeout = time.Second * 20
|
|
|
|
}
|
|
|
|
return timeout
|
2020-07-15 17:40:41 +00:00
|
|
|
}
|
|
|
|
|
2023-02-20 13:58:03 +00:00
|
|
|
func QueryKeys(req *http.Request, keyAPI api.ClientKeyAPI, device *api.Device) util.JSONResponse {
|
2020-07-15 17:40:41 +00:00
|
|
|
var r queryKeysRequest
|
|
|
|
resErr := httputil.UnmarshalJSONRequest(req, &r)
|
|
|
|
if resErr != nil {
|
|
|
|
return *resErr
|
|
|
|
}
|
|
|
|
queryRes := api.QueryKeysResponse{}
|
2023-05-09 22:46:49 +00:00
|
|
|
keyAPI.QueryKeys(req.Context(), &api.QueryKeysRequest{
|
2021-08-04 16:56:29 +00:00
|
|
|
UserID: device.UserID,
|
2020-07-15 17:40:41 +00:00
|
|
|
UserToDevices: r.DeviceKeys,
|
|
|
|
Timeout: r.GetTimeout(),
|
|
|
|
// TODO: Token?
|
2023-05-09 22:46:49 +00:00
|
|
|
}, &queryRes)
|
2020-07-15 17:40:41 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: 200,
|
|
|
|
JSON: map[string]interface{}{
|
2021-08-04 16:56:29 +00:00
|
|
|
"device_keys": queryRes.DeviceKeys,
|
|
|
|
"master_keys": queryRes.MasterKeys,
|
|
|
|
"self_signing_keys": queryRes.SelfSigningKeys,
|
|
|
|
"user_signing_keys": queryRes.UserSigningKeys,
|
|
|
|
"failures": queryRes.Failures,
|
2020-07-15 17:40:41 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
2020-07-21 13:47:53 +00:00
|
|
|
|
|
|
|
type claimKeysRequest struct {
|
|
|
|
TimeoutMS int `json:"timeout"`
|
|
|
|
// The keys to be claimed. A map from user ID, to a map from device ID to algorithm name.
|
|
|
|
OneTimeKeys map[string]map[string]string `json:"one_time_keys"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *claimKeysRequest) GetTimeout() time.Duration {
|
|
|
|
if r.TimeoutMS == 0 {
|
|
|
|
return 10 * time.Second
|
|
|
|
}
|
|
|
|
return time.Duration(r.TimeoutMS) * time.Millisecond
|
|
|
|
}
|
|
|
|
|
2022-05-05 12:17:38 +00:00
|
|
|
func ClaimKeys(req *http.Request, keyAPI api.ClientKeyAPI) util.JSONResponse {
|
2020-07-21 13:47:53 +00:00
|
|
|
var r claimKeysRequest
|
|
|
|
resErr := httputil.UnmarshalJSONRequest(req, &r)
|
|
|
|
if resErr != nil {
|
|
|
|
return *resErr
|
|
|
|
}
|
|
|
|
claimRes := api.PerformClaimKeysResponse{}
|
2023-05-09 22:46:49 +00:00
|
|
|
keyAPI.PerformClaimKeys(req.Context(), &api.PerformClaimKeysRequest{
|
2020-07-21 13:47:53 +00:00
|
|
|
OneTimeKeys: r.OneTimeKeys,
|
|
|
|
Timeout: r.GetTimeout(),
|
2023-05-09 22:46:49 +00:00
|
|
|
}, &claimRes)
|
2020-07-21 13:47:53 +00:00
|
|
|
if claimRes.Error != nil {
|
|
|
|
util.GetLogger(req.Context()).WithError(claimRes.Error).Error("failed to PerformClaimKeys")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2020-07-21 13:47:53 +00:00
|
|
|
}
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: 200,
|
|
|
|
JSON: map[string]interface{}{
|
|
|
|
"one_time_keys": claimRes.OneTimeKeys,
|
|
|
|
"failures": claimRes.Failures,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|