402 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			402 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Python
		
	
	
| # Copyright 2017, 2018 New Vector Ltd
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #     http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| 
 | |
| import logging
 | |
| from typing import TYPE_CHECKING, Optional, Tuple, cast
 | |
| 
 | |
| from synapse.api.errors import Codes, NotFoundError, SynapseError
 | |
| from synapse.http.server import HttpServer
 | |
| from synapse.http.servlet import (
 | |
|     RestServlet,
 | |
|     parse_json_object_from_request,
 | |
|     parse_string,
 | |
| )
 | |
| from synapse.http.site import SynapseRequest
 | |
| from synapse.types import JsonDict
 | |
| 
 | |
| from ._base import client_patterns
 | |
| 
 | |
| if TYPE_CHECKING:
 | |
|     from synapse.server import HomeServer
 | |
| 
 | |
| logger = logging.getLogger(__name__)
 | |
| 
 | |
| 
 | |
| class RoomKeysServlet(RestServlet):
 | |
|     PATTERNS = client_patterns(
 | |
|         "/room_keys/keys(/(?P<room_id>[^/]+))?(/(?P<session_id>[^/]+))?$"
 | |
|     )
 | |
| 
 | |
|     def __init__(self, hs: "HomeServer"):
 | |
|         super().__init__()
 | |
|         self.auth = hs.get_auth()
 | |
|         self.e2e_room_keys_handler = hs.get_e2e_room_keys_handler()
 | |
| 
 | |
|     async def on_PUT(
 | |
|         self, request: SynapseRequest, room_id: Optional[str], session_id: Optional[str]
 | |
|     ) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Uploads one or more encrypted E2E room keys for backup purposes.
 | |
|         room_id: the ID of the room the keys are for (optional)
 | |
|         session_id: the ID for the E2E room keys for the room (optional)
 | |
|         version: the version of the user's backup which this data is for.
 | |
|         the version must already have been created via the /room_keys/version API.
 | |
| 
 | |
|         Each session has:
 | |
|          * first_message_index: a numeric index indicating the oldest message
 | |
|            encrypted by this session.
 | |
|          * forwarded_count: how many times the uploading client claims this key
 | |
|            has been shared (forwarded)
 | |
|          * is_verified: whether the client that uploaded the keys claims they
 | |
|            were sent by a device which they've verified
 | |
|          * session_data: base64-encrypted data describing the session.
 | |
| 
 | |
|         Returns 200 OK on success with body {}
 | |
|         Returns 403 Forbidden if the version in question is not the most recently
 | |
|         created version (i.e. if this is an old client trying to write to a stale backup)
 | |
|         Returns 404 Not Found if the version in question doesn't exist
 | |
| 
 | |
|         The API is designed to be otherwise agnostic to the room_key encryption
 | |
|         algorithm being used.  Sessions are merged with existing ones in the
 | |
|         backup using the heuristics:
 | |
|          * is_verified sessions always win over unverified sessions
 | |
|          * older first_message_index always win over newer sessions
 | |
|          * lower forwarded_count always wins over higher forwarded_count
 | |
| 
 | |
|         We trust the clients not to lie and corrupt their own backups.
 | |
|         It also means that if your access_token is stolen, the attacker could
 | |
|         delete your backup.
 | |
| 
 | |
|         POST /room_keys/keys/!abc:matrix.org/c0ff33?version=1 HTTP/1.1
 | |
|         Content-Type: application/json
 | |
| 
 | |
|         {
 | |
|             "first_message_index": 1,
 | |
|             "forwarded_count": 1,
 | |
|             "is_verified": false,
 | |
|             "session_data": "SSBBTSBBIEZJU0gK"
 | |
|         }
 | |
| 
 | |
|         Or...
 | |
| 
 | |
|         POST /room_keys/keys/!abc:matrix.org?version=1 HTTP/1.1
 | |
|         Content-Type: application/json
 | |
| 
 | |
|         {
 | |
|             "sessions": {
 | |
|                 "c0ff33": {
 | |
|                     "first_message_index": 1,
 | |
|                     "forwarded_count": 1,
 | |
|                     "is_verified": false,
 | |
|                     "session_data": "SSBBTSBBIEZJU0gK"
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         Or...
 | |
| 
 | |
|         POST /room_keys/keys?version=1 HTTP/1.1
 | |
|         Content-Type: application/json
 | |
| 
 | |
|         {
 | |
|             "rooms": {
 | |
|                 "!abc:matrix.org": {
 | |
|                     "sessions": {
 | |
|                         "c0ff33": {
 | |
|                             "first_message_index": 1,
 | |
|                             "forwarded_count": 1,
 | |
|                             "is_verified": false,
 | |
|                             "session_data": "SSBBTSBBIEZJU0gK"
 | |
|                         }
 | |
|                     }
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         """
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
|         body = parse_json_object_from_request(request)
 | |
|         version = parse_string(request, "version", required=True)
 | |
| 
 | |
|         if session_id:
 | |
|             body = {"sessions": {session_id: body}}
 | |
| 
 | |
|         if room_id:
 | |
|             body = {"rooms": {room_id: body}}
 | |
| 
 | |
|         ret = await self.e2e_room_keys_handler.upload_room_keys(user_id, version, body)
 | |
|         return 200, ret
 | |
| 
 | |
|     async def on_GET(
 | |
|         self, request: SynapseRequest, room_id: Optional[str], session_id: Optional[str]
 | |
|     ) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Retrieves one or more encrypted E2E room keys for backup purposes.
 | |
|         Symmetric with the PUT version of the API.
 | |
| 
 | |
|         room_id: the ID of the room to retrieve the keys for (optional)
 | |
|         session_id: the ID for the E2E room keys to retrieve the keys for (optional)
 | |
|         version: the version of the user's backup which this data is for.
 | |
|         the version must already have been created via the /change_secret API.
 | |
| 
 | |
|         Returns as follows:
 | |
| 
 | |
|         GET /room_keys/keys/!abc:matrix.org/c0ff33?version=1 HTTP/1.1
 | |
|         {
 | |
|             "first_message_index": 1,
 | |
|             "forwarded_count": 1,
 | |
|             "is_verified": false,
 | |
|             "session_data": "SSBBTSBBIEZJU0gK"
 | |
|         }
 | |
| 
 | |
|         Or...
 | |
| 
 | |
|         GET /room_keys/keys/!abc:matrix.org?version=1 HTTP/1.1
 | |
|         {
 | |
|             "sessions": {
 | |
|                 "c0ff33": {
 | |
|                     "first_message_index": 1,
 | |
|                     "forwarded_count": 1,
 | |
|                     "is_verified": false,
 | |
|                     "session_data": "SSBBTSBBIEZJU0gK"
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         Or...
 | |
| 
 | |
|         GET /room_keys/keys?version=1 HTTP/1.1
 | |
|         {
 | |
|             "rooms": {
 | |
|                 "!abc:matrix.org": {
 | |
|                     "sessions": {
 | |
|                         "c0ff33": {
 | |
|                             "first_message_index": 1,
 | |
|                             "forwarded_count": 1,
 | |
|                             "is_verified": false,
 | |
|                             "session_data": "SSBBTSBBIEZJU0gK"
 | |
|                         }
 | |
|                     }
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         """
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
|         version = parse_string(request, "version", required=True)
 | |
| 
 | |
|         room_keys = cast(
 | |
|             JsonDict,
 | |
|             await self.e2e_room_keys_handler.get_room_keys(
 | |
|                 user_id, version, room_id, session_id
 | |
|             ),
 | |
|         )
 | |
| 
 | |
|         # Convert room_keys to the right format to return.
 | |
|         if session_id:
 | |
|             # If the client requests a specific session, but that session was
 | |
|             # not backed up, then return an M_NOT_FOUND.
 | |
|             if room_keys["rooms"] == {}:
 | |
|                 raise NotFoundError("No room_keys found")
 | |
|             else:
 | |
|                 room_keys = room_keys["rooms"][room_id]["sessions"][session_id]
 | |
|         elif room_id:
 | |
|             # If the client requests all sessions from a room, but no sessions
 | |
|             # are found, then return an empty result rather than an error, so
 | |
|             # that clients don't have to handle an error condition, and an
 | |
|             # empty result is valid.  (Similarly if the client requests all
 | |
|             # sessions from the backup, but in that case, room_keys is already
 | |
|             # in the right format, so we don't need to do anything about it.)
 | |
|             if room_keys["rooms"] == {}:
 | |
|                 room_keys = {"sessions": {}}
 | |
|             else:
 | |
|                 room_keys = room_keys["rooms"][room_id]
 | |
| 
 | |
|         return 200, room_keys
 | |
| 
 | |
|     async def on_DELETE(
 | |
|         self, request: SynapseRequest, room_id: Optional[str], session_id: Optional[str]
 | |
|     ) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Deletes one or more encrypted E2E room keys for a user for backup purposes.
 | |
| 
 | |
|         DELETE /room_keys/keys/!abc:matrix.org/c0ff33?version=1
 | |
|         HTTP/1.1 200 OK
 | |
|         {}
 | |
| 
 | |
|         room_id: the ID of the room whose keys to delete (optional)
 | |
|         session_id: the ID for the E2E session to delete (optional)
 | |
|         version: the version of the user's backup which this data is for.
 | |
|         the version must already have been created via the /change_secret API.
 | |
|         """
 | |
| 
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
|         version = parse_string(request, "version", required=True)
 | |
| 
 | |
|         ret = await self.e2e_room_keys_handler.delete_room_keys(
 | |
|             user_id, version, room_id, session_id
 | |
|         )
 | |
|         return 200, ret
 | |
| 
 | |
| 
 | |
| class RoomKeysNewVersionServlet(RestServlet):
 | |
|     PATTERNS = client_patterns("/room_keys/version$")
 | |
| 
 | |
|     def __init__(self, hs: "HomeServer"):
 | |
|         super().__init__()
 | |
|         self.auth = hs.get_auth()
 | |
|         self.e2e_room_keys_handler = hs.get_e2e_room_keys_handler()
 | |
| 
 | |
|     async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Create a new backup version for this user's room_keys with the given
 | |
|         info.  The version is allocated by the server and returned to the user
 | |
|         in the response.  This API is intended to be used whenever the user
 | |
|         changes the encryption key for their backups, ensuring that backups
 | |
|         encrypted with different keys don't collide.
 | |
| 
 | |
|         It takes out an exclusive lock on this user's room_key backups, to ensure
 | |
|         clients only upload to the current backup.
 | |
| 
 | |
|         The algorithm passed in the version info is a reverse-DNS namespaced
 | |
|         identifier to describe the format of the encrypted backupped keys.
 | |
| 
 | |
|         The auth_data is { user_id: "user_id", nonce: <random string> }
 | |
|         encrypted using the algorithm and current encryption key described above.
 | |
| 
 | |
|         POST /room_keys/version
 | |
|         Content-Type: application/json
 | |
|         {
 | |
|             "algorithm": "m.megolm_backup.v1",
 | |
|             "auth_data": "dGhpcyBzaG91bGQgYWN0dWFsbHkgYmUgZW5jcnlwdGVkIGpzb24K"
 | |
|         }
 | |
| 
 | |
|         HTTP/1.1 200 OK
 | |
|         Content-Type: application/json
 | |
|         {
 | |
|             "version": 12345
 | |
|         }
 | |
|         """
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
|         info = parse_json_object_from_request(request)
 | |
| 
 | |
|         new_version = await self.e2e_room_keys_handler.create_version(user_id, info)
 | |
|         return 200, {"version": new_version}
 | |
| 
 | |
|     # we deliberately don't have a PUT /version, as these things really should
 | |
|     # be immutable to avoid people footgunning
 | |
| 
 | |
| 
 | |
| class RoomKeysVersionServlet(RestServlet):
 | |
|     PATTERNS = client_patterns("/room_keys/version(/(?P<version>[^/]+))?$")
 | |
| 
 | |
|     def __init__(self, hs: "HomeServer"):
 | |
|         super().__init__()
 | |
|         self.auth = hs.get_auth()
 | |
|         self.e2e_room_keys_handler = hs.get_e2e_room_keys_handler()
 | |
| 
 | |
|     async def on_GET(
 | |
|         self, request: SynapseRequest, version: Optional[str]
 | |
|     ) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Retrieve the version information about a given version of the user's
 | |
|         room_keys backup.  If the version part is missing, returns info about the
 | |
|         most current backup version (if any)
 | |
| 
 | |
|         It takes out an exclusive lock on this user's room_key backups, to ensure
 | |
|         clients only upload to the current backup.
 | |
| 
 | |
|         Returns 404 if the given version does not exist.
 | |
| 
 | |
|         GET /room_keys/version/12345 HTTP/1.1
 | |
|         {
 | |
|             "version": "12345",
 | |
|             "algorithm": "m.megolm_backup.v1",
 | |
|             "auth_data": "dGhpcyBzaG91bGQgYWN0dWFsbHkgYmUgZW5jcnlwdGVkIGpzb24K"
 | |
|         }
 | |
|         """
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
| 
 | |
|         try:
 | |
|             info = await self.e2e_room_keys_handler.get_version_info(user_id, version)
 | |
|         except SynapseError as e:
 | |
|             if e.code == 404:
 | |
|                 raise SynapseError(404, "No backup found", Codes.NOT_FOUND)
 | |
|         return 200, info
 | |
| 
 | |
|     async def on_DELETE(
 | |
|         self, request: SynapseRequest, version: Optional[str]
 | |
|     ) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Delete the information about a given version of the user's
 | |
|         room_keys backup.  If the version part is missing, deletes the most
 | |
|         current backup version (if any). Doesn't delete the actual room data.
 | |
| 
 | |
|         DELETE /room_keys/version/12345 HTTP/1.1
 | |
|         HTTP/1.1 200 OK
 | |
|         {}
 | |
|         """
 | |
|         if version is None:
 | |
|             raise SynapseError(400, "No version specified to delete", Codes.NOT_FOUND)
 | |
| 
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
| 
 | |
|         await self.e2e_room_keys_handler.delete_version(user_id, version)
 | |
|         return 200, {}
 | |
| 
 | |
|     async def on_PUT(
 | |
|         self, request: SynapseRequest, version: Optional[str]
 | |
|     ) -> Tuple[int, JsonDict]:
 | |
|         """
 | |
|         Update the information about a given version of the user's room_keys backup.
 | |
| 
 | |
|         POST /room_keys/version/12345 HTTP/1.1
 | |
|         Content-Type: application/json
 | |
|         {
 | |
|             "algorithm": "m.megolm_backup.v1",
 | |
|             "auth_data": {
 | |
|                 "public_key": "abcdefg",
 | |
|                 "signatures": {
 | |
|                     "ed25519:something": "hijklmnop"
 | |
|                 }
 | |
|             },
 | |
|             "version": "12345"
 | |
|         }
 | |
| 
 | |
|         HTTP/1.1 200 OK
 | |
|         Content-Type: application/json
 | |
|         {}
 | |
|         """
 | |
|         requester = await self.auth.get_user_by_req(request, allow_guest=False)
 | |
|         user_id = requester.user.to_string()
 | |
|         info = parse_json_object_from_request(request)
 | |
| 
 | |
|         if version is None:
 | |
|             raise SynapseError(
 | |
|                 400, "No version specified to update", Codes.MISSING_PARAM
 | |
|             )
 | |
| 
 | |
|         await self.e2e_room_keys_handler.update_version(user_id, version, info)
 | |
|         return 200, {}
 | |
| 
 | |
| 
 | |
| def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
 | |
|     RoomKeysServlet(hs).register(http_server)
 | |
|     RoomKeysVersionServlet(hs).register(http_server)
 | |
|     RoomKeysNewVersionServlet(hs).register(http_server)
 |