422 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			422 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Python
		
	
	
# -*- coding: utf-8 -*-
 | 
						|
# Copyright 2017, 2018 New Vector Ltd
 | 
						|
#
 | 
						|
# Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
# you may not use this file except in compliance with the License.
 | 
						|
# You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
# See the License for the specific language governing permissions and
 | 
						|
# limitations under the License.
 | 
						|
 | 
						|
import logging
 | 
						|
 | 
						|
from twisted.internet import defer
 | 
						|
 | 
						|
from synapse.api.errors import Codes, NotFoundError, SynapseError
 | 
						|
from synapse.http.servlet import (
 | 
						|
    RestServlet,
 | 
						|
    parse_json_object_from_request,
 | 
						|
    parse_string,
 | 
						|
)
 | 
						|
 | 
						|
from ._base import client_v2_patterns
 | 
						|
 | 
						|
logger = logging.getLogger(__name__)
 | 
						|
 | 
						|
 | 
						|
class RoomKeysServlet(RestServlet):
 | 
						|
    PATTERNS = client_v2_patterns(
 | 
						|
        "/room_keys/keys(/(?P<room_id>[^/]+))?(/(?P<session_id>[^/]+))?$"
 | 
						|
    )
 | 
						|
 | 
						|
    def __init__(self, hs):
 | 
						|
        """
 | 
						|
        Args:
 | 
						|
            hs (synapse.server.HomeServer): server
 | 
						|
        """
 | 
						|
        super(RoomKeysServlet, self).__init__()
 | 
						|
        self.auth = hs.get_auth()
 | 
						|
        self.e2e_room_keys_handler = hs.get_e2e_room_keys_handler()
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_PUT(self, request, room_id, session_id):
 | 
						|
        """
 | 
						|
        Uploads one or more encrypted E2E room keys for backup purposes.
 | 
						|
        room_id: the ID of the room the keys are for (optional)
 | 
						|
        session_id: the ID for the E2E room keys for the room (optional)
 | 
						|
        version: the version of the user's backup which this data is for.
 | 
						|
        the version must already have been created via the /room_keys/version API.
 | 
						|
 | 
						|
        Each session has:
 | 
						|
         * first_message_index: a numeric index indicating the oldest message
 | 
						|
           encrypted by this session.
 | 
						|
         * forwarded_count: how many times the uploading client claims this key
 | 
						|
           has been shared (forwarded)
 | 
						|
         * is_verified: whether the client that uploaded the keys claims they
 | 
						|
           were sent by a device which they've verified
 | 
						|
         * session_data: base64-encrypted data describing the session.
 | 
						|
 | 
						|
        Returns 200 OK on success with body {}
 | 
						|
        Returns 403 Forbidden if the version in question is not the most recently
 | 
						|
        created version (i.e. if this is an old client trying to write to a stale backup)
 | 
						|
        Returns 404 Not Found if the version in question doesn't exist
 | 
						|
 | 
						|
        The API is designed to be otherwise agnostic to the room_key encryption
 | 
						|
        algorithm being used.  Sessions are merged with existing ones in the
 | 
						|
        backup using the heuristics:
 | 
						|
         * is_verified sessions always win over unverified sessions
 | 
						|
         * older first_message_index always win over newer sessions
 | 
						|
         * lower forwarded_count always wins over higher forwarded_count
 | 
						|
 | 
						|
        We trust the clients not to lie and corrupt their own backups.
 | 
						|
        It also means that if your access_token is stolen, the attacker could
 | 
						|
        delete your backup.
 | 
						|
 | 
						|
        POST /room_keys/keys/!abc:matrix.org/c0ff33?version=1 HTTP/1.1
 | 
						|
        Content-Type: application/json
 | 
						|
 | 
						|
        {
 | 
						|
            "first_message_index": 1,
 | 
						|
            "forwarded_count": 1,
 | 
						|
            "is_verified": false,
 | 
						|
            "session_data": "SSBBTSBBIEZJU0gK"
 | 
						|
        }
 | 
						|
 | 
						|
        Or...
 | 
						|
 | 
						|
        POST /room_keys/keys/!abc:matrix.org?version=1 HTTP/1.1
 | 
						|
        Content-Type: application/json
 | 
						|
 | 
						|
        {
 | 
						|
            "sessions": {
 | 
						|
                "c0ff33": {
 | 
						|
                    "first_message_index": 1,
 | 
						|
                    "forwarded_count": 1,
 | 
						|
                    "is_verified": false,
 | 
						|
                    "session_data": "SSBBTSBBIEZJU0gK"
 | 
						|
                }
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        Or...
 | 
						|
 | 
						|
        POST /room_keys/keys?version=1 HTTP/1.1
 | 
						|
        Content-Type: application/json
 | 
						|
 | 
						|
        {
 | 
						|
            "rooms": {
 | 
						|
                "!abc:matrix.org": {
 | 
						|
                    "sessions": {
 | 
						|
                        "c0ff33": {
 | 
						|
                            "first_message_index": 1,
 | 
						|
                            "forwarded_count": 1,
 | 
						|
                            "is_verified": false,
 | 
						|
                            "session_data": "SSBBTSBBIEZJU0gK"
 | 
						|
                        }
 | 
						|
                    }
 | 
						|
                }
 | 
						|
            }
 | 
						|
        }
 | 
						|
        """
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
        body = parse_json_object_from_request(request)
 | 
						|
        version = parse_string(request, "version")
 | 
						|
 | 
						|
        if session_id:
 | 
						|
            body = {
 | 
						|
                "sessions": {
 | 
						|
                    session_id: body
 | 
						|
                }
 | 
						|
            }
 | 
						|
 | 
						|
        if room_id:
 | 
						|
            body = {
 | 
						|
                "rooms": {
 | 
						|
                    room_id: body
 | 
						|
                }
 | 
						|
            }
 | 
						|
 | 
						|
        yield self.e2e_room_keys_handler.upload_room_keys(
 | 
						|
            user_id, version, body
 | 
						|
        )
 | 
						|
        defer.returnValue((200, {}))
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_GET(self, request, room_id, session_id):
 | 
						|
        """
 | 
						|
        Retrieves one or more encrypted E2E room keys for backup purposes.
 | 
						|
        Symmetric with the PUT version of the API.
 | 
						|
 | 
						|
        room_id: the ID of the room to retrieve the keys for (optional)
 | 
						|
        session_id: the ID for the E2E room keys to retrieve the keys for (optional)
 | 
						|
        version: the version of the user's backup which this data is for.
 | 
						|
        the version must already have been created via the /change_secret API.
 | 
						|
 | 
						|
        Returns as follows:
 | 
						|
 | 
						|
        GET /room_keys/keys/!abc:matrix.org/c0ff33?version=1 HTTP/1.1
 | 
						|
        {
 | 
						|
            "first_message_index": 1,
 | 
						|
            "forwarded_count": 1,
 | 
						|
            "is_verified": false,
 | 
						|
            "session_data": "SSBBTSBBIEZJU0gK"
 | 
						|
        }
 | 
						|
 | 
						|
        Or...
 | 
						|
 | 
						|
        GET /room_keys/keys/!abc:matrix.org?version=1 HTTP/1.1
 | 
						|
        {
 | 
						|
            "sessions": {
 | 
						|
                "c0ff33": {
 | 
						|
                    "first_message_index": 1,
 | 
						|
                    "forwarded_count": 1,
 | 
						|
                    "is_verified": false,
 | 
						|
                    "session_data": "SSBBTSBBIEZJU0gK"
 | 
						|
                }
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        Or...
 | 
						|
 | 
						|
        GET /room_keys/keys?version=1 HTTP/1.1
 | 
						|
        {
 | 
						|
            "rooms": {
 | 
						|
                "!abc:matrix.org": {
 | 
						|
                    "sessions": {
 | 
						|
                        "c0ff33": {
 | 
						|
                            "first_message_index": 1,
 | 
						|
                            "forwarded_count": 1,
 | 
						|
                            "is_verified": false,
 | 
						|
                            "session_data": "SSBBTSBBIEZJU0gK"
 | 
						|
                        }
 | 
						|
                    }
 | 
						|
                }
 | 
						|
            }
 | 
						|
        }
 | 
						|
        """
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
        version = parse_string(request, "version")
 | 
						|
 | 
						|
        room_keys = yield self.e2e_room_keys_handler.get_room_keys(
 | 
						|
            user_id, version, room_id, session_id
 | 
						|
        )
 | 
						|
 | 
						|
        # Convert room_keys to the right format to return.
 | 
						|
        if session_id:
 | 
						|
            # If the client requests a specific session, but that session was
 | 
						|
            # not backed up, then return an M_NOT_FOUND.
 | 
						|
            if room_keys['rooms'] == {}:
 | 
						|
                raise NotFoundError("No room_keys found")
 | 
						|
            else:
 | 
						|
                room_keys = room_keys['rooms'][room_id]['sessions'][session_id]
 | 
						|
        elif room_id:
 | 
						|
            # If the client requests all sessions from a room, but no sessions
 | 
						|
            # are found, then return an empty result rather than an error, so
 | 
						|
            # that clients don't have to handle an error condition, and an
 | 
						|
            # empty result is valid.  (Similarly if the client requests all
 | 
						|
            # sessions from the backup, but in that case, room_keys is already
 | 
						|
            # in the right format, so we don't need to do anything about it.)
 | 
						|
            if room_keys['rooms'] == {}:
 | 
						|
                room_keys = {'sessions': {}}
 | 
						|
            else:
 | 
						|
                room_keys = room_keys['rooms'][room_id]
 | 
						|
 | 
						|
        defer.returnValue((200, room_keys))
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_DELETE(self, request, room_id, session_id):
 | 
						|
        """
 | 
						|
        Deletes one or more encrypted E2E room keys for a user for backup purposes.
 | 
						|
 | 
						|
        DELETE /room_keys/keys/!abc:matrix.org/c0ff33?version=1
 | 
						|
        HTTP/1.1 200 OK
 | 
						|
        {}
 | 
						|
 | 
						|
        room_id: the ID of the room whose keys to delete (optional)
 | 
						|
        session_id: the ID for the E2E session to delete (optional)
 | 
						|
        version: the version of the user's backup which this data is for.
 | 
						|
        the version must already have been created via the /change_secret API.
 | 
						|
        """
 | 
						|
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
        version = parse_string(request, "version")
 | 
						|
 | 
						|
        yield self.e2e_room_keys_handler.delete_room_keys(
 | 
						|
            user_id, version, room_id, session_id
 | 
						|
        )
 | 
						|
        defer.returnValue((200, {}))
 | 
						|
 | 
						|
 | 
						|
class RoomKeysNewVersionServlet(RestServlet):
 | 
						|
    PATTERNS = client_v2_patterns(
 | 
						|
        "/room_keys/version$"
 | 
						|
    )
 | 
						|
 | 
						|
    def __init__(self, hs):
 | 
						|
        """
 | 
						|
        Args:
 | 
						|
            hs (synapse.server.HomeServer): server
 | 
						|
        """
 | 
						|
        super(RoomKeysNewVersionServlet, self).__init__()
 | 
						|
        self.auth = hs.get_auth()
 | 
						|
        self.e2e_room_keys_handler = hs.get_e2e_room_keys_handler()
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_POST(self, request):
 | 
						|
        """
 | 
						|
        Create a new backup version for this user's room_keys with the given
 | 
						|
        info.  The version is allocated by the server and returned to the user
 | 
						|
        in the response.  This API is intended to be used whenever the user
 | 
						|
        changes the encryption key for their backups, ensuring that backups
 | 
						|
        encrypted with different keys don't collide.
 | 
						|
 | 
						|
        It takes out an exclusive lock on this user's room_key backups, to ensure
 | 
						|
        clients only upload to the current backup.
 | 
						|
 | 
						|
        The algorithm passed in the version info is a reverse-DNS namespaced
 | 
						|
        identifier to describe the format of the encrypted backupped keys.
 | 
						|
 | 
						|
        The auth_data is { user_id: "user_id", nonce: <random string> }
 | 
						|
        encrypted using the algorithm and current encryption key described above.
 | 
						|
 | 
						|
        POST /room_keys/version
 | 
						|
        Content-Type: application/json
 | 
						|
        {
 | 
						|
            "algorithm": "m.megolm_backup.v1",
 | 
						|
            "auth_data": "dGhpcyBzaG91bGQgYWN0dWFsbHkgYmUgZW5jcnlwdGVkIGpzb24K"
 | 
						|
        }
 | 
						|
 | 
						|
        HTTP/1.1 200 OK
 | 
						|
        Content-Type: application/json
 | 
						|
        {
 | 
						|
            "version": 12345
 | 
						|
        }
 | 
						|
        """
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
        info = parse_json_object_from_request(request)
 | 
						|
 | 
						|
        new_version = yield self.e2e_room_keys_handler.create_version(
 | 
						|
            user_id, info
 | 
						|
        )
 | 
						|
        defer.returnValue((200, {"version": new_version}))
 | 
						|
 | 
						|
    # we deliberately don't have a PUT /version, as these things really should
 | 
						|
    # be immutable to avoid people footgunning
 | 
						|
 | 
						|
 | 
						|
class RoomKeysVersionServlet(RestServlet):
 | 
						|
    PATTERNS = client_v2_patterns(
 | 
						|
        "/room_keys/version(/(?P<version>[^/]+))?$"
 | 
						|
    )
 | 
						|
 | 
						|
    def __init__(self, hs):
 | 
						|
        """
 | 
						|
        Args:
 | 
						|
            hs (synapse.server.HomeServer): server
 | 
						|
        """
 | 
						|
        super(RoomKeysVersionServlet, self).__init__()
 | 
						|
        self.auth = hs.get_auth()
 | 
						|
        self.e2e_room_keys_handler = hs.get_e2e_room_keys_handler()
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_GET(self, request, version):
 | 
						|
        """
 | 
						|
        Retrieve the version information about a given version of the user's
 | 
						|
        room_keys backup.  If the version part is missing, returns info about the
 | 
						|
        most current backup version (if any)
 | 
						|
 | 
						|
        It takes out an exclusive lock on this user's room_key backups, to ensure
 | 
						|
        clients only upload to the current backup.
 | 
						|
 | 
						|
        Returns 404 if the given version does not exist.
 | 
						|
 | 
						|
        GET /room_keys/version/12345 HTTP/1.1
 | 
						|
        {
 | 
						|
            "version": "12345",
 | 
						|
            "algorithm": "m.megolm_backup.v1",
 | 
						|
            "auth_data": "dGhpcyBzaG91bGQgYWN0dWFsbHkgYmUgZW5jcnlwdGVkIGpzb24K"
 | 
						|
        }
 | 
						|
        """
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
 | 
						|
        try:
 | 
						|
            info = yield self.e2e_room_keys_handler.get_version_info(
 | 
						|
                user_id, version
 | 
						|
            )
 | 
						|
        except SynapseError as e:
 | 
						|
            if e.code == 404:
 | 
						|
                raise SynapseError(404, "No backup found", Codes.NOT_FOUND)
 | 
						|
        defer.returnValue((200, info))
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_DELETE(self, request, version):
 | 
						|
        """
 | 
						|
        Delete the information about a given version of the user's
 | 
						|
        room_keys backup.  If the version part is missing, deletes the most
 | 
						|
        current backup version (if any). Doesn't delete the actual room data.
 | 
						|
 | 
						|
        DELETE /room_keys/version/12345 HTTP/1.1
 | 
						|
        HTTP/1.1 200 OK
 | 
						|
        {}
 | 
						|
        """
 | 
						|
        if version is None:
 | 
						|
            raise SynapseError(400, "No version specified to delete", Codes.NOT_FOUND)
 | 
						|
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
 | 
						|
        yield self.e2e_room_keys_handler.delete_version(
 | 
						|
            user_id, version
 | 
						|
        )
 | 
						|
        defer.returnValue((200, {}))
 | 
						|
 | 
						|
    @defer.inlineCallbacks
 | 
						|
    def on_PUT(self, request, version):
 | 
						|
        """
 | 
						|
        Update the information about a given version of the user's room_keys backup.
 | 
						|
 | 
						|
        POST /room_keys/version/12345 HTTP/1.1
 | 
						|
        Content-Type: application/json
 | 
						|
        {
 | 
						|
            "algorithm": "m.megolm_backup.v1",
 | 
						|
            "auth_data": {
 | 
						|
                "public_key": "abcdefg",
 | 
						|
                "signatures": {
 | 
						|
                    "ed25519:something": "hijklmnop"
 | 
						|
                }
 | 
						|
            },
 | 
						|
            "version": "42"
 | 
						|
        }
 | 
						|
 | 
						|
        HTTP/1.1 200 OK
 | 
						|
        Content-Type: application/json
 | 
						|
        {}
 | 
						|
        """
 | 
						|
        requester = yield self.auth.get_user_by_req(request, allow_guest=False)
 | 
						|
        user_id = requester.user.to_string()
 | 
						|
        info = parse_json_object_from_request(request)
 | 
						|
 | 
						|
        if version is None:
 | 
						|
            raise SynapseError(400, "No version specified to update", Codes.MISSING_PARAM)
 | 
						|
 | 
						|
        yield self.e2e_room_keys_handler.update_version(
 | 
						|
            user_id, version, info
 | 
						|
        )
 | 
						|
        defer.returnValue((200, {}))
 | 
						|
 | 
						|
 | 
						|
def register_servlets(hs, http_server):
 | 
						|
    RoomKeysServlet(hs).register(http_server)
 | 
						|
    RoomKeysVersionServlet(hs).register(http_server)
 | 
						|
    RoomKeysNewVersionServlet(hs).register(http_server)
 |