2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2015-10-19 15:40:15 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
|
2018-07-09 08:09:20 +02:00
|
|
|
import nacl.signing
|
2022-01-10 14:40:46 +01:00
|
|
|
import signedjson.types
|
2015-10-19 15:40:15 +02:00
|
|
|
from unpaddedbase64 import decode_base64
|
|
|
|
|
2020-01-29 18:40:33 +01:00
|
|
|
from synapse.api.room_versions import RoomVersions
|
2018-07-09 08:09:20 +02:00
|
|
|
from synapse.crypto.event_signing import add_hashes_and_signatures
|
2020-02-07 16:30:04 +01:00
|
|
|
from synapse.events import make_event_from_dict
|
2015-10-19 15:40:15 +02:00
|
|
|
|
2018-07-09 08:09:20 +02:00
|
|
|
from tests import unittest
|
2015-10-19 15:40:15 +02:00
|
|
|
|
|
|
|
# Perform these tests using given secret key so we get entirely deterministic
|
|
|
|
# signatures output that we can test against.
|
2018-08-10 15:54:09 +02:00
|
|
|
SIGNING_KEY_SEED = decode_base64("YJDBA9Xnr2sVqXD9Vj7XVUnmFZcZrlw8Md7kMW+3XA1")
|
2015-10-19 15:40:15 +02:00
|
|
|
|
|
|
|
KEY_ALG = "ed25519"
|
|
|
|
KEY_VER = 1
|
|
|
|
KEY_NAME = "%s:%d" % (KEY_ALG, KEY_VER)
|
|
|
|
|
|
|
|
HOSTNAME = "domain"
|
|
|
|
|
|
|
|
|
|
|
|
class EventSigningTestCase(unittest.TestCase):
|
|
|
|
def setUp(self):
|
2022-01-10 14:40:46 +01:00
|
|
|
# NB: `signedjson` expects `nacl.signing.SigningKey` instances which have been
|
|
|
|
# monkeypatched to include new `alg` and `version` attributes. This is captured
|
|
|
|
# by the `signedjson.types.SigningKey` protocol.
|
|
|
|
self.signing_key: signedjson.types.SigningKey = nacl.signing.SigningKey(
|
|
|
|
SIGNING_KEY_SEED
|
|
|
|
)
|
2015-10-19 15:40:15 +02:00
|
|
|
self.signing_key.alg = KEY_ALG
|
|
|
|
self.signing_key.version = KEY_VER
|
|
|
|
|
2015-10-19 16:00:52 +02:00
|
|
|
def test_sign_minimal(self):
|
2019-01-25 18:17:38 +01:00
|
|
|
event_dict = {
|
2019-06-20 11:32:02 +02:00
|
|
|
"event_id": "$0:domain",
|
|
|
|
"origin": "domain",
|
|
|
|
"origin_server_ts": 1000000,
|
|
|
|
"signatures": {},
|
|
|
|
"type": "X",
|
|
|
|
"unsigned": {"age_ts": 1000000},
|
2019-01-25 18:17:38 +01:00
|
|
|
}
|
2015-10-19 15:40:15 +02:00
|
|
|
|
2020-01-29 18:40:33 +01:00
|
|
|
add_hashes_and_signatures(
|
|
|
|
RoomVersions.V1, event_dict, HOSTNAME, self.signing_key
|
|
|
|
)
|
2015-10-19 15:40:15 +02:00
|
|
|
|
2020-02-07 16:30:04 +01:00
|
|
|
event = make_event_from_dict(event_dict)
|
2015-10-19 15:40:15 +02:00
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
self.assertTrue(hasattr(event, "hashes"))
|
|
|
|
self.assertIn("sha256", event.hashes)
|
2015-10-19 15:40:15 +02:00
|
|
|
self.assertEquals(
|
2019-06-20 11:32:02 +02:00
|
|
|
event.hashes["sha256"], "6tJjLpXtggfke8UxFhAKg82QVkJzvKOVOOSjUDK4ZSI"
|
2015-10-19 15:40:15 +02:00
|
|
|
)
|
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
self.assertTrue(hasattr(event, "signatures"))
|
2015-10-19 16:24:49 +02:00
|
|
|
self.assertIn(HOSTNAME, event.signatures)
|
|
|
|
self.assertIn(KEY_NAME, event.signatures["domain"])
|
2015-10-19 15:40:15 +02:00
|
|
|
self.assertEquals(
|
|
|
|
event.signatures[HOSTNAME][KEY_NAME],
|
|
|
|
"2Wptgo4CwmLo/Y8B8qinxApKaCkBG2fjTWB7AbP5Uy+"
|
|
|
|
"aIbygsSdLOFzvdDjww8zUVKCmI02eP9xtyJxc/cLiBA",
|
|
|
|
)
|
2015-10-19 16:00:52 +02:00
|
|
|
|
|
|
|
def test_sign_message(self):
|
2019-01-25 18:17:38 +01:00
|
|
|
event_dict = {
|
2019-06-20 11:32:02 +02:00
|
|
|
"content": {"body": "Here is the message content"},
|
|
|
|
"event_id": "$0:domain",
|
|
|
|
"origin": "domain",
|
|
|
|
"origin_server_ts": 1000000,
|
|
|
|
"type": "m.room.message",
|
|
|
|
"room_id": "!r:domain",
|
|
|
|
"sender": "@u:domain",
|
|
|
|
"signatures": {},
|
|
|
|
"unsigned": {"age_ts": 1000000},
|
2019-01-25 18:17:38 +01:00
|
|
|
}
|
|
|
|
|
2020-01-29 18:40:33 +01:00
|
|
|
add_hashes_and_signatures(
|
|
|
|
RoomVersions.V1, event_dict, HOSTNAME, self.signing_key
|
|
|
|
)
|
2019-01-25 18:17:38 +01:00
|
|
|
|
2020-02-07 16:30:04 +01:00
|
|
|
event = make_event_from_dict(event_dict)
|
2015-10-19 16:00:52 +02:00
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
self.assertTrue(hasattr(event, "hashes"))
|
|
|
|
self.assertIn("sha256", event.hashes)
|
2015-10-19 16:00:52 +02:00
|
|
|
self.assertEquals(
|
2019-06-20 11:32:02 +02:00
|
|
|
event.hashes["sha256"], "onLKD1bGljeBWQhWZ1kaP9SorVmRQNdN5aM2JYU2n/g"
|
2015-10-19 16:00:52 +02:00
|
|
|
)
|
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
self.assertTrue(hasattr(event, "signatures"))
|
2015-10-19 16:24:49 +02:00
|
|
|
self.assertIn(HOSTNAME, event.signatures)
|
|
|
|
self.assertIn(KEY_NAME, event.signatures["domain"])
|
2015-10-19 16:00:52 +02:00
|
|
|
self.assertEquals(
|
|
|
|
event.signatures[HOSTNAME][KEY_NAME],
|
|
|
|
"Wm+VzmOUOz08Ds+0NTWb1d4CZrVsJSikkeRxh6aCcUw"
|
2018-08-10 15:54:09 +02:00
|
|
|
"u6pNC78FunoD7KNWzqFn241eYHYMGCA5McEiVPdhzBA",
|
2015-10-19 16:00:52 +02:00
|
|
|
)
|