mirror of
https://git.anonymousland.org/anonymousland/synapse.git
synced 2024-12-25 21:19:23 -05:00
Fix perspectives requests for multiple keys for the same server (#11440)
If we tried to request multiple keys for the same server, we would end up dropping some of those requests.
This commit is contained in:
parent
7b4e228e41
commit
9cd13c5f63
1
changelog.d/11440.bugfix
Normal file
1
changelog.d/11440.bugfix
Normal file
@ -0,0 +1 @@
|
|||||||
|
Fix a bug introduced in Synapse 1.36 which could cause problems fetching event-signing keys from trusted key servers.
|
@ -667,21 +667,25 @@ class PerspectivesKeyFetcher(BaseV2KeyFetcher):
|
|||||||
perspective_name,
|
perspective_name,
|
||||||
)
|
)
|
||||||
|
|
||||||
try:
|
request: JsonDict = {}
|
||||||
query_response = await self.client.post_json(
|
for queue_value in keys_to_fetch:
|
||||||
destination=perspective_name,
|
# there may be multiple requests for each server, so we have to merge
|
||||||
path="/_matrix/key/v2/query",
|
# them intelligently.
|
||||||
data={
|
request_for_server = {
|
||||||
"server_keys": {
|
|
||||||
queue_value.server_name: {
|
|
||||||
key_id: {
|
key_id: {
|
||||||
"minimum_valid_until_ts": queue_value.minimum_valid_until_ts,
|
"minimum_valid_until_ts": queue_value.minimum_valid_until_ts,
|
||||||
}
|
}
|
||||||
for key_id in queue_value.key_ids
|
for key_id in queue_value.key_ids
|
||||||
}
|
}
|
||||||
for queue_value in keys_to_fetch
|
request.setdefault(queue_value.server_name, {}).update(request_for_server)
|
||||||
}
|
|
||||||
},
|
logger.debug("Request to notary server %s: %s", perspective_name, request)
|
||||||
|
|
||||||
|
try:
|
||||||
|
query_response = await self.client.post_json(
|
||||||
|
destination=perspective_name,
|
||||||
|
path="/_matrix/key/v2/query",
|
||||||
|
data={"server_keys": request},
|
||||||
)
|
)
|
||||||
except (NotRetryingDestination, RequestSendFailed) as e:
|
except (NotRetryingDestination, RequestSendFailed) as e:
|
||||||
# these both have str() representations which we can't really improve upon
|
# these both have str() representations which we can't really improve upon
|
||||||
@ -689,6 +693,10 @@ class PerspectivesKeyFetcher(BaseV2KeyFetcher):
|
|||||||
except HttpResponseException as e:
|
except HttpResponseException as e:
|
||||||
raise KeyLookupError("Remote server returned an error: %s" % (e,))
|
raise KeyLookupError("Remote server returned an error: %s" % (e,))
|
||||||
|
|
||||||
|
logger.debug(
|
||||||
|
"Response from notary server %s: %s", perspective_name, query_response
|
||||||
|
)
|
||||||
|
|
||||||
keys: Dict[str, Dict[str, FetchKeyResult]] = {}
|
keys: Dict[str, Dict[str, FetchKeyResult]] = {}
|
||||||
added_keys: List[Tuple[str, str, FetchKeyResult]] = []
|
added_keys: List[Tuple[str, str, FetchKeyResult]] = []
|
||||||
|
|
||||||
|
@ -22,6 +22,7 @@ import signedjson.sign
|
|||||||
from nacl.signing import SigningKey
|
from nacl.signing import SigningKey
|
||||||
from signedjson.key import encode_verify_key_base64, get_verify_key
|
from signedjson.key import encode_verify_key_base64, get_verify_key
|
||||||
|
|
||||||
|
from twisted.internet import defer
|
||||||
from twisted.internet.defer import Deferred, ensureDeferred
|
from twisted.internet.defer import Deferred, ensureDeferred
|
||||||
|
|
||||||
from synapse.api.errors import SynapseError
|
from synapse.api.errors import SynapseError
|
||||||
@ -577,6 +578,76 @@ class PerspectivesKeyFetcherTestCase(unittest.HomeserverTestCase):
|
|||||||
bytes(res["key_json"]), canonicaljson.encode_canonical_json(response)
|
bytes(res["key_json"]), canonicaljson.encode_canonical_json(response)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
def test_get_multiple_keys_from_perspectives(self):
|
||||||
|
"""Check that we can correctly request multiple keys for the same server"""
|
||||||
|
|
||||||
|
fetcher = PerspectivesKeyFetcher(self.hs)
|
||||||
|
|
||||||
|
SERVER_NAME = "server2"
|
||||||
|
|
||||||
|
testkey1 = signedjson.key.generate_signing_key("ver1")
|
||||||
|
testverifykey1 = signedjson.key.get_verify_key(testkey1)
|
||||||
|
testverifykey1_id = "ed25519:ver1"
|
||||||
|
|
||||||
|
testkey2 = signedjson.key.generate_signing_key("ver2")
|
||||||
|
testverifykey2 = signedjson.key.get_verify_key(testkey2)
|
||||||
|
testverifykey2_id = "ed25519:ver2"
|
||||||
|
|
||||||
|
VALID_UNTIL_TS = 200 * 1000
|
||||||
|
|
||||||
|
response1 = self.build_perspectives_response(
|
||||||
|
SERVER_NAME,
|
||||||
|
testkey1,
|
||||||
|
VALID_UNTIL_TS,
|
||||||
|
)
|
||||||
|
response2 = self.build_perspectives_response(
|
||||||
|
SERVER_NAME,
|
||||||
|
testkey2,
|
||||||
|
VALID_UNTIL_TS,
|
||||||
|
)
|
||||||
|
|
||||||
|
async def post_json(destination, path, data, **kwargs):
|
||||||
|
self.assertEqual(destination, self.mock_perspective_server.server_name)
|
||||||
|
self.assertEqual(path, "/_matrix/key/v2/query")
|
||||||
|
|
||||||
|
# check that the request is for the expected keys
|
||||||
|
q = data["server_keys"]
|
||||||
|
|
||||||
|
self.assertEqual(
|
||||||
|
list(q[SERVER_NAME].keys()), [testverifykey1_id, testverifykey2_id]
|
||||||
|
)
|
||||||
|
return {"server_keys": [response1, response2]}
|
||||||
|
|
||||||
|
self.http_client.post_json.side_effect = post_json
|
||||||
|
|
||||||
|
# fire off two separate requests; they should get merged together into a
|
||||||
|
# single HTTP hit.
|
||||||
|
request1_d = defer.ensureDeferred(
|
||||||
|
fetcher.get_keys(SERVER_NAME, [testverifykey1_id], 0)
|
||||||
|
)
|
||||||
|
request2_d = defer.ensureDeferred(
|
||||||
|
fetcher.get_keys(SERVER_NAME, [testverifykey2_id], 0)
|
||||||
|
)
|
||||||
|
|
||||||
|
keys1 = self.get_success(request1_d)
|
||||||
|
self.assertIn(testverifykey1_id, keys1)
|
||||||
|
k = keys1[testverifykey1_id]
|
||||||
|
self.assertEqual(k.valid_until_ts, VALID_UNTIL_TS)
|
||||||
|
self.assertEqual(k.verify_key, testverifykey1)
|
||||||
|
self.assertEqual(k.verify_key.alg, "ed25519")
|
||||||
|
self.assertEqual(k.verify_key.version, "ver1")
|
||||||
|
|
||||||
|
keys2 = self.get_success(request2_d)
|
||||||
|
self.assertIn(testverifykey2_id, keys2)
|
||||||
|
k = keys2[testverifykey2_id]
|
||||||
|
self.assertEqual(k.valid_until_ts, VALID_UNTIL_TS)
|
||||||
|
self.assertEqual(k.verify_key, testverifykey2)
|
||||||
|
self.assertEqual(k.verify_key.alg, "ed25519")
|
||||||
|
self.assertEqual(k.verify_key.version, "ver2")
|
||||||
|
|
||||||
|
# finally, ensure that only one request was sent
|
||||||
|
self.assertEqual(self.http_client.post_json.call_count, 1)
|
||||||
|
|
||||||
def test_get_perspectives_own_key(self):
|
def test_get_perspectives_own_key(self):
|
||||||
"""Check that we can get the perspectives server's own keys
|
"""Check that we can get the perspectives server's own keys
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user