2019-03-20 12:02:25 -04:00
|
|
|
# Copyright 2019 New Vector Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2023-02-06 11:05:06 -05:00
|
|
|
from typing import Callable, FrozenSet, List, Optional, Set
|
2023-08-24 19:38:46 -04:00
|
|
|
from unittest.mock import AsyncMock, Mock
|
2019-03-20 12:02:25 -04:00
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
from signedjson import key, sign
|
|
|
|
from signedjson.types import BaseKey, SigningKey
|
|
|
|
|
2019-03-20 12:02:25 -04:00
|
|
|
from twisted.internet import defer
|
2023-02-06 11:05:06 -05:00
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
2019-03-20 12:02:25 -04:00
|
|
|
|
2022-05-27 07:14:36 -04:00
|
|
|
from synapse.api.constants import EduTypes, RoomEncryptionAlgorithms
|
2023-02-06 11:05:06 -05:00
|
|
|
from synapse.federation.units import Transaction
|
2023-02-14 14:03:35 -05:00
|
|
|
from synapse.handlers.device import DeviceHandler
|
2020-03-27 07:39:43 -04:00
|
|
|
from synapse.rest import admin
|
2021-08-17 07:57:58 -04:00
|
|
|
from synapse.rest.client import login
|
2023-02-06 11:05:06 -05:00
|
|
|
from synapse.server import HomeServer
|
2020-03-27 07:39:43 -04:00
|
|
|
from synapse.types import JsonDict, ReadReceipt
|
2023-02-06 11:05:06 -05:00
|
|
|
from synapse.util import Clock
|
2019-03-20 12:02:25 -04:00
|
|
|
|
2022-12-01 07:38:27 -05:00
|
|
|
from tests.unittest import HomeserverTestCase
|
2019-03-20 12:02:25 -04:00
|
|
|
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
class FederationSenderReceiptsTestCases(HomeserverTestCase):
|
2022-12-01 07:38:27 -05:00
|
|
|
"""
|
|
|
|
Test federation sending to update receipts.
|
|
|
|
|
|
|
|
By default for test cases federation sending is disabled. This Test class has it
|
|
|
|
re-enabled for the main process.
|
|
|
|
"""
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
2023-02-14 14:03:35 -05:00
|
|
|
self.federation_transport_client = Mock(spec=["send_transaction"])
|
2023-08-24 19:38:46 -04:00
|
|
|
self.federation_transport_client.send_transaction = AsyncMock()
|
2022-06-06 11:46:11 -04:00
|
|
|
hs = self.setup_test_homeserver(
|
2023-02-14 14:03:35 -05:00
|
|
|
federation_transport_client=self.federation_transport_client,
|
2019-03-20 12:02:25 -04:00
|
|
|
)
|
|
|
|
|
2023-08-29 10:38:56 -04:00
|
|
|
hs.get_storage_controllers().state.get_current_hosts_in_room = AsyncMock( # type: ignore[method-assign]
|
2023-08-24 19:38:46 -04:00
|
|
|
return_value={"test", "host2"}
|
2022-06-06 11:46:11 -04:00
|
|
|
)
|
|
|
|
|
2023-08-29 10:38:56 -04:00
|
|
|
hs.get_storage_controllers().state.get_current_hosts_in_room_or_partial_state_approximation = ( # type: ignore[method-assign]
|
2022-11-30 07:39:47 -05:00
|
|
|
hs.get_storage_controllers().state.get_current_hosts_in_room
|
|
|
|
)
|
|
|
|
|
2022-06-06 11:46:11 -04:00
|
|
|
return hs
|
|
|
|
|
2022-12-01 07:38:27 -05:00
|
|
|
def default_config(self) -> JsonDict:
|
|
|
|
config = super().default_config()
|
|
|
|
config["federation_sender_instances"] = None
|
|
|
|
return config
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_send_receipts(self) -> None:
|
2023-02-14 14:03:35 -05:00
|
|
|
mock_send_transaction = self.federation_transport_client.send_transaction
|
2023-08-24 19:38:46 -04:00
|
|
|
mock_send_transaction.return_value = {}
|
2019-03-20 12:02:25 -04:00
|
|
|
|
|
|
|
sender = self.hs.get_federation_sender()
|
2019-05-10 01:12:11 -04:00
|
|
|
receipt = ReadReceipt(
|
2022-09-23 10:33:28 -04:00
|
|
|
"room_id",
|
|
|
|
"m.read",
|
|
|
|
"user_id",
|
|
|
|
["event_id"],
|
|
|
|
thread_id=None,
|
|
|
|
data={"ts": 1234},
|
2019-05-10 01:12:11 -04:00
|
|
|
)
|
2023-09-04 12:14:09 -04:00
|
|
|
self.get_success(sender.send_read_receipt(receipt))
|
2019-03-20 12:02:25 -04:00
|
|
|
|
|
|
|
self.pump()
|
|
|
|
|
|
|
|
# expect a call to send_transaction
|
|
|
|
mock_send_transaction.assert_called_once()
|
|
|
|
json_cb = mock_send_transaction.call_args[0][1]
|
|
|
|
data = json_cb()
|
2019-05-10 01:12:11 -04:00
|
|
|
self.assertEqual(
|
2019-06-20 05:32:02 -04:00
|
|
|
data["edus"],
|
2019-05-10 01:12:11 -04:00
|
|
|
[
|
|
|
|
{
|
2022-05-27 07:14:36 -04:00
|
|
|
"edu_type": EduTypes.RECEIPT,
|
2019-06-20 05:32:02 -04:00
|
|
|
"content": {
|
|
|
|
"room_id": {
|
|
|
|
"m.read": {
|
|
|
|
"user_id": {
|
|
|
|
"event_ids": ["event_id"],
|
|
|
|
"data": {"ts": 1234},
|
2019-05-10 01:12:11 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-03-20 12:02:25 -04:00
|
|
|
},
|
2019-05-10 01:12:11 -04:00
|
|
|
}
|
|
|
|
],
|
|
|
|
)
|
2019-03-20 12:02:25 -04:00
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_send_receipts_thread(self) -> None:
|
2023-02-14 14:03:35 -05:00
|
|
|
mock_send_transaction = self.federation_transport_client.send_transaction
|
2023-08-24 19:38:46 -04:00
|
|
|
mock_send_transaction.return_value = {}
|
2022-11-28 09:40:17 -05:00
|
|
|
|
|
|
|
# Create receipts for:
|
|
|
|
#
|
|
|
|
# * The same room / user on multiple threads.
|
|
|
|
# * A different user in the same room.
|
|
|
|
sender = self.hs.get_federation_sender()
|
2023-09-04 12:14:09 -04:00
|
|
|
# Hack so that we have a txn in-flight so we batch up read receipts
|
|
|
|
# below
|
|
|
|
sender.wake_destination("host2")
|
2022-11-28 09:40:17 -05:00
|
|
|
for user, thread in (
|
|
|
|
("alice", None),
|
|
|
|
("alice", "thread"),
|
|
|
|
("bob", None),
|
|
|
|
("bob", "diff-thread"),
|
|
|
|
):
|
|
|
|
receipt = ReadReceipt(
|
|
|
|
"room_id",
|
|
|
|
"m.read",
|
|
|
|
user,
|
|
|
|
["event_id"],
|
|
|
|
thread_id=thread,
|
|
|
|
data={"ts": 1234},
|
|
|
|
)
|
2023-09-04 12:14:09 -04:00
|
|
|
defer.ensureDeferred(sender.send_read_receipt(receipt))
|
2022-11-28 09:40:17 -05:00
|
|
|
|
|
|
|
self.pump()
|
|
|
|
|
|
|
|
# expect a call to send_transaction with two EDUs to separate threads.
|
|
|
|
mock_send_transaction.assert_called_once()
|
|
|
|
json_cb = mock_send_transaction.call_args[0][1]
|
|
|
|
data = json_cb()
|
|
|
|
# Note that the ordering of the EDUs doesn't matter.
|
|
|
|
self.assertCountEqual(
|
|
|
|
data["edus"],
|
|
|
|
[
|
|
|
|
{
|
|
|
|
"edu_type": EduTypes.RECEIPT,
|
|
|
|
"content": {
|
|
|
|
"room_id": {
|
|
|
|
"m.read": {
|
|
|
|
"alice": {
|
|
|
|
"event_ids": ["event_id"],
|
|
|
|
"data": {"ts": 1234, "thread_id": "thread"},
|
|
|
|
},
|
|
|
|
"bob": {
|
|
|
|
"event_ids": ["event_id"],
|
|
|
|
"data": {"ts": 1234, "thread_id": "diff-thread"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"edu_type": EduTypes.RECEIPT,
|
|
|
|
"content": {
|
|
|
|
"room_id": {
|
|
|
|
"m.read": {
|
|
|
|
"alice": {
|
|
|
|
"event_ids": ["event_id"],
|
|
|
|
"data": {"ts": 1234},
|
|
|
|
},
|
|
|
|
"bob": {
|
|
|
|
"event_ids": ["event_id"],
|
|
|
|
"data": {"ts": 1234},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
],
|
|
|
|
)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_send_receipts_with_backoff(self) -> None:
|
2019-03-20 12:02:25 -04:00
|
|
|
"""Send two receipts in quick succession; the second should be flushed, but
|
|
|
|
only after 20ms"""
|
2023-02-14 14:03:35 -05:00
|
|
|
mock_send_transaction = self.federation_transport_client.send_transaction
|
2023-08-24 19:38:46 -04:00
|
|
|
mock_send_transaction.return_value = {}
|
2019-03-20 12:02:25 -04:00
|
|
|
|
|
|
|
sender = self.hs.get_federation_sender()
|
2019-05-10 01:12:11 -04:00
|
|
|
receipt = ReadReceipt(
|
2022-09-23 10:33:28 -04:00
|
|
|
"room_id",
|
|
|
|
"m.read",
|
|
|
|
"user_id",
|
|
|
|
["event_id"],
|
|
|
|
thread_id=None,
|
|
|
|
data={"ts": 1234},
|
2019-05-10 01:12:11 -04:00
|
|
|
)
|
2023-09-04 12:14:09 -04:00
|
|
|
self.get_success(sender.send_read_receipt(receipt))
|
2019-03-20 12:02:25 -04:00
|
|
|
|
|
|
|
self.pump()
|
|
|
|
|
|
|
|
# expect a call to send_transaction
|
|
|
|
mock_send_transaction.assert_called_once()
|
|
|
|
json_cb = mock_send_transaction.call_args[0][1]
|
|
|
|
data = json_cb()
|
2019-05-10 01:12:11 -04:00
|
|
|
self.assertEqual(
|
2019-06-20 05:32:02 -04:00
|
|
|
data["edus"],
|
2019-05-10 01:12:11 -04:00
|
|
|
[
|
|
|
|
{
|
2022-05-27 07:14:36 -04:00
|
|
|
"edu_type": EduTypes.RECEIPT,
|
2019-06-20 05:32:02 -04:00
|
|
|
"content": {
|
|
|
|
"room_id": {
|
|
|
|
"m.read": {
|
|
|
|
"user_id": {
|
|
|
|
"event_ids": ["event_id"],
|
|
|
|
"data": {"ts": 1234},
|
2019-05-10 01:12:11 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-03-20 12:02:25 -04:00
|
|
|
},
|
2019-05-10 01:12:11 -04:00
|
|
|
}
|
|
|
|
],
|
|
|
|
)
|
2019-03-20 12:02:25 -04:00
|
|
|
mock_send_transaction.reset_mock()
|
|
|
|
|
|
|
|
# send the second RR
|
2019-05-10 01:12:11 -04:00
|
|
|
receipt = ReadReceipt(
|
2022-09-23 10:33:28 -04:00
|
|
|
"room_id",
|
|
|
|
"m.read",
|
|
|
|
"user_id",
|
|
|
|
["other_id"],
|
|
|
|
thread_id=None,
|
|
|
|
data={"ts": 1234},
|
2019-05-10 01:12:11 -04:00
|
|
|
)
|
2020-07-30 08:01:33 -04:00
|
|
|
self.successResultOf(defer.ensureDeferred(sender.send_read_receipt(receipt)))
|
2019-03-20 12:02:25 -04:00
|
|
|
self.pump()
|
|
|
|
mock_send_transaction.assert_not_called()
|
|
|
|
|
|
|
|
self.reactor.advance(19)
|
|
|
|
mock_send_transaction.assert_not_called()
|
|
|
|
|
|
|
|
self.reactor.advance(10)
|
|
|
|
mock_send_transaction.assert_called_once()
|
|
|
|
json_cb = mock_send_transaction.call_args[0][1]
|
|
|
|
data = json_cb()
|
2019-05-10 01:12:11 -04:00
|
|
|
self.assertEqual(
|
2019-06-20 05:32:02 -04:00
|
|
|
data["edus"],
|
2019-05-10 01:12:11 -04:00
|
|
|
[
|
|
|
|
{
|
2022-05-27 07:14:36 -04:00
|
|
|
"edu_type": EduTypes.RECEIPT,
|
2019-06-20 05:32:02 -04:00
|
|
|
"content": {
|
|
|
|
"room_id": {
|
|
|
|
"m.read": {
|
|
|
|
"user_id": {
|
|
|
|
"event_ids": ["other_id"],
|
|
|
|
"data": {"ts": 1234},
|
2019-05-10 01:12:11 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-03-20 12:02:25 -04:00
|
|
|
},
|
2019-05-10 01:12:11 -04:00
|
|
|
}
|
|
|
|
],
|
|
|
|
)
|
2020-03-27 07:39:43 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationSenderDevicesTestCases(HomeserverTestCase):
|
2022-12-01 07:38:27 -05:00
|
|
|
"""
|
|
|
|
Test federation sending to update devices.
|
|
|
|
|
|
|
|
By default for test cases federation sending is disabled. This Test class has it
|
|
|
|
re-enabled for the main process.
|
|
|
|
"""
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
servlets = [
|
|
|
|
admin.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
]
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
2023-02-14 14:03:35 -05:00
|
|
|
self.federation_transport_client = Mock(
|
|
|
|
spec=["send_transaction", "query_user_devices"]
|
|
|
|
)
|
2023-08-24 19:38:46 -04:00
|
|
|
self.federation_transport_client.send_transaction = AsyncMock()
|
|
|
|
self.federation_transport_client.query_user_devices = AsyncMock()
|
2020-03-27 07:39:43 -04:00
|
|
|
return self.setup_test_homeserver(
|
2023-02-14 14:03:35 -05:00
|
|
|
federation_transport_client=self.federation_transport_client,
|
2020-03-27 07:39:43 -04:00
|
|
|
)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def default_config(self) -> JsonDict:
|
2020-03-27 07:39:43 -04:00
|
|
|
c = super().default_config()
|
2022-12-01 07:38:27 -05:00
|
|
|
# Enable federation sending on the main process.
|
|
|
|
c["federation_sender_instances"] = None
|
2020-03-27 07:39:43 -04:00
|
|
|
return c
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2022-08-24 15:15:37 -04:00
|
|
|
test_room_id = "!room:host1"
|
|
|
|
|
|
|
|
# stub out `get_rooms_for_user` and `get_current_hosts_in_room` so that the
|
2022-04-04 10:25:20 -04:00
|
|
|
# server thinks the user shares a room with `@user2:host2`
|
2023-02-06 11:05:06 -05:00
|
|
|
def get_rooms_for_user(user_id: str) -> "defer.Deferred[FrozenSet[str]]":
|
|
|
|
return defer.succeed(frozenset({test_room_id}))
|
2022-04-04 10:25:20 -04:00
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
hs.get_datastores().main.get_rooms_for_user = get_rooms_for_user # type: ignore[assignment]
|
2022-04-04 10:25:20 -04:00
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
async def get_current_hosts_in_room(room_id: str) -> Set[str]:
|
2022-08-24 15:15:37 -04:00
|
|
|
if room_id == test_room_id:
|
2023-02-06 11:05:06 -05:00
|
|
|
return {"host2"}
|
|
|
|
else:
|
|
|
|
# TODO: We should fail the test when we encounter an unxpected room ID.
|
|
|
|
# We can't just use `self.fail(...)` here because the app code is greedy
|
|
|
|
# with `Exception` and will catch it before the test can see it.
|
|
|
|
return set()
|
2020-03-27 07:39:43 -04:00
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
hs.get_datastores().main.get_current_hosts_in_room = get_current_hosts_in_room # type: ignore[assignment]
|
2020-03-27 07:39:43 -04:00
|
|
|
|
2023-02-14 14:03:35 -05:00
|
|
|
device_handler = hs.get_device_handler()
|
|
|
|
assert isinstance(device_handler, DeviceHandler)
|
|
|
|
self.device_handler = device_handler
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# whenever send_transaction is called, record the edu data
|
2023-02-06 11:05:06 -05:00
|
|
|
self.edus: List[JsonDict] = []
|
2023-02-14 14:03:35 -05:00
|
|
|
self.federation_transport_client.send_transaction.side_effect = (
|
2020-03-27 07:39:43 -04:00
|
|
|
self.record_transaction
|
|
|
|
)
|
|
|
|
|
2023-08-24 19:38:46 -04:00
|
|
|
async def record_transaction(
|
2023-02-06 11:05:06 -05:00
|
|
|
self, txn: Transaction, json_cb: Optional[Callable[[], JsonDict]] = None
|
2023-08-24 19:38:46 -04:00
|
|
|
) -> JsonDict:
|
2023-02-06 11:05:06 -05:00
|
|
|
assert json_cb is not None
|
2020-03-27 07:39:43 -04:00
|
|
|
data = json_cb()
|
|
|
|
self.edus.extend(data["edus"])
|
2023-08-24 19:38:46 -04:00
|
|
|
return {}
|
2020-03-27 07:39:43 -04:00
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_send_device_updates(self) -> None:
|
2020-03-27 07:39:43 -04:00
|
|
|
"""Basic case: each device update should result in an EDU"""
|
|
|
|
# create a device
|
|
|
|
u1 = self.register_user("user", "pass")
|
|
|
|
self.login(u1, "pass", device_id="D1")
|
|
|
|
|
|
|
|
# expect one edu
|
|
|
|
self.assertEqual(len(self.edus), 1)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", None)
|
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# a second call should produce no new device EDUs
|
2023-09-04 12:14:09 -04:00
|
|
|
self.get_success(
|
|
|
|
self.hs.get_federation_sender().send_device_messages(["host2"])
|
|
|
|
)
|
2020-03-27 07:39:43 -04:00
|
|
|
self.assertEqual(self.edus, [])
|
|
|
|
|
|
|
|
# a second device
|
|
|
|
self.login("user", "pass", device_id="D2")
|
|
|
|
|
|
|
|
self.assertEqual(len(self.edus), 1)
|
|
|
|
self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_dont_send_device_updates_for_remote_users(self) -> None:
|
2022-04-14 08:05:31 -04:00
|
|
|
"""Check that we don't send device updates for remote users"""
|
|
|
|
|
|
|
|
# Send the server a device list EDU for the other user, this will cause
|
|
|
|
# it to try and resync the device lists.
|
2023-08-24 19:38:46 -04:00
|
|
|
self.federation_transport_client.query_user_devices.return_value = {
|
|
|
|
"stream_id": "1",
|
|
|
|
"user_id": "@user2:host2",
|
|
|
|
"devices": [{"device_id": "D1"}],
|
|
|
|
}
|
2022-04-14 08:05:31 -04:00
|
|
|
|
|
|
|
self.get_success(
|
2023-02-14 14:03:35 -05:00
|
|
|
self.device_handler.device_list_updater.incoming_device_list_update(
|
2022-04-14 08:05:31 -04:00
|
|
|
"host2",
|
|
|
|
{
|
|
|
|
"user_id": "@user2:host2",
|
|
|
|
"device_id": "D1",
|
|
|
|
"stream_id": "1",
|
|
|
|
"prev_ids": [],
|
|
|
|
},
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
|
|
|
# We shouldn't see an EDU for that update
|
|
|
|
self.assertEqual(self.edus, [])
|
|
|
|
|
|
|
|
# Check that we did successfully process the inbound EDU (otherwise this
|
|
|
|
# test would pass if we failed to process the EDU)
|
|
|
|
devices = self.get_success(
|
|
|
|
self.hs.get_datastores().main.get_cached_devices_for_user("@user2:host2")
|
|
|
|
)
|
|
|
|
self.assertIn("D1", devices)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_upload_signatures(self) -> None:
|
2020-03-27 07:39:43 -04:00
|
|
|
"""Uploading signatures on some devices should produce updates for that user"""
|
|
|
|
|
|
|
|
e2e_handler = self.hs.get_e2e_keys_handler()
|
|
|
|
|
|
|
|
# register two devices
|
|
|
|
u1 = self.register_user("user", "pass")
|
|
|
|
self.login(u1, "pass", device_id="D1")
|
|
|
|
self.login(u1, "pass", device_id="D2")
|
|
|
|
|
|
|
|
# expect two edus
|
|
|
|
self.assertEqual(len(self.edus), 2)
|
2023-02-06 11:05:06 -05:00
|
|
|
stream_id: Optional[int] = None
|
2020-03-27 07:39:43 -04:00
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", stream_id)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
|
|
|
|
|
|
|
# upload signing keys for each device
|
|
|
|
device1_signing_key = self.generate_and_upload_device_signing_key(u1, "D1")
|
|
|
|
device2_signing_key = self.generate_and_upload_device_signing_key(u1, "D2")
|
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# expect two more edus
|
|
|
|
self.assertEqual(len(self.edus), 2)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", stream_id)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
|
|
|
|
|
|
|
# upload master key and self-signing key
|
|
|
|
master_signing_key = generate_self_id_key()
|
|
|
|
master_key = {
|
|
|
|
"user_id": u1,
|
|
|
|
"usage": ["master"],
|
|
|
|
"keys": {key_id(master_signing_key): encode_pubkey(master_signing_key)},
|
|
|
|
}
|
|
|
|
|
|
|
|
# private key: HvQBbU+hc2Zr+JP1sE0XwBe1pfZZEYtJNPJLZJtS+F8
|
|
|
|
selfsigning_signing_key = generate_self_id_key()
|
|
|
|
selfsigning_key = {
|
|
|
|
"user_id": u1,
|
|
|
|
"usage": ["self_signing"],
|
|
|
|
"keys": {
|
|
|
|
key_id(selfsigning_signing_key): encode_pubkey(selfsigning_signing_key)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
sign.sign_json(selfsigning_key, u1, master_signing_key)
|
|
|
|
|
|
|
|
cross_signing_keys = {
|
|
|
|
"master_key": master_key,
|
|
|
|
"self_signing_key": selfsigning_key,
|
|
|
|
}
|
|
|
|
|
|
|
|
self.get_success(
|
|
|
|
e2e_handler.upload_signing_keys_for_user(u1, cross_signing_keys)
|
|
|
|
)
|
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# expect signing key update edu
|
2021-12-08 05:01:38 -05:00
|
|
|
self.assertEqual(len(self.edus), 2)
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(self.edus.pop(0)["edu_type"], EduTypes.SIGNING_KEY_UPDATE)
|
|
|
|
self.assertEqual(
|
|
|
|
self.edus.pop(0)["edu_type"], EduTypes.UNSTABLE_SIGNING_KEY_UPDATE
|
|
|
|
)
|
2020-03-27 07:39:43 -04:00
|
|
|
|
|
|
|
# sign the devices
|
|
|
|
d1_json = build_device_dict(u1, "D1", device1_signing_key)
|
|
|
|
sign.sign_json(d1_json, u1, selfsigning_signing_key)
|
|
|
|
d2_json = build_device_dict(u1, "D2", device2_signing_key)
|
|
|
|
sign.sign_json(d2_json, u1, selfsigning_signing_key)
|
|
|
|
|
|
|
|
ret = self.get_success(
|
|
|
|
e2e_handler.upload_signatures_for_device_keys(
|
2021-02-16 17:32:34 -05:00
|
|
|
u1,
|
|
|
|
{u1: {"D1": d1_json, "D2": d2_json}},
|
2020-03-27 07:39:43 -04:00
|
|
|
)
|
|
|
|
)
|
|
|
|
self.assertEqual(ret["failures"], {})
|
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# expect two edus, in one or two transactions. We don't know what order the
|
|
|
|
# devices will be updated.
|
|
|
|
self.assertEqual(len(self.edus), 2)
|
|
|
|
stream_id = None # FIXME: there is a discontinuity in the stream IDs: see #7142
|
|
|
|
for edu in self.edus:
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(edu["edu_type"], EduTypes.DEVICE_LIST_UPDATE)
|
2020-03-27 07:39:43 -04:00
|
|
|
c = edu["content"]
|
|
|
|
if stream_id is not None:
|
2023-02-06 11:05:06 -05:00
|
|
|
self.assertEqual(c["prev_id"], [stream_id]) # type: ignore[unreachable]
|
Fix device list update stream ids going backward (#7158)
Occasionally we could get a federation device list update transaction which
looked like:
```
[
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D2', 'prev_id': [], 'stream_id': 12, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D1', 'prev_id': [12], 'stream_id': 11, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D3', 'prev_id': [11], 'stream_id': 13, 'deleted': True}}
]
```
Having `stream_ids` which are lower than `prev_ids` looks odd. It might work
(I'm not actually sure), but in any case it doesn't seem like a reasonable
thing to expect other implementations to support.
2020-04-03 05:40:22 -04:00
|
|
|
self.assertGreaterEqual(c["stream_id"], stream_id)
|
2020-03-27 07:39:43 -04:00
|
|
|
stream_id = c["stream_id"]
|
|
|
|
devices = {edu["content"]["device_id"] for edu in self.edus}
|
|
|
|
self.assertEqual({"D1", "D2"}, devices)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_delete_devices(self) -> None:
|
2020-03-27 07:39:43 -04:00
|
|
|
"""If devices are deleted, that should result in EDUs too"""
|
|
|
|
|
|
|
|
# create devices
|
|
|
|
u1 = self.register_user("user", "pass")
|
|
|
|
self.login("user", "pass", device_id="D1")
|
|
|
|
self.login("user", "pass", device_id="D2")
|
|
|
|
self.login("user", "pass", device_id="D3")
|
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# expect three edus
|
|
|
|
self.assertEqual(len(self.edus), 3)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", None)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
|
|
|
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D3", stream_id)
|
|
|
|
|
|
|
|
# delete them again
|
2023-02-14 14:03:35 -05:00
|
|
|
self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
|
2020-03-27 07:39:43 -04:00
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
# expect three edus, in an unknown order
|
|
|
|
self.assertEqual(len(self.edus), 3)
|
|
|
|
for edu in self.edus:
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(edu["edu_type"], EduTypes.DEVICE_LIST_UPDATE)
|
2020-03-27 07:39:43 -04:00
|
|
|
c = edu["content"]
|
|
|
|
self.assertGreaterEqual(
|
|
|
|
c.items(),
|
|
|
|
{"user_id": u1, "prev_id": [stream_id], "deleted": True}.items(),
|
|
|
|
)
|
Fix device list update stream ids going backward (#7158)
Occasionally we could get a federation device list update transaction which
looked like:
```
[
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D2', 'prev_id': [], 'stream_id': 12, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D1', 'prev_id': [12], 'stream_id': 11, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D3', 'prev_id': [11], 'stream_id': 13, 'deleted': True}}
]
```
Having `stream_ids` which are lower than `prev_ids` looks odd. It might work
(I'm not actually sure), but in any case it doesn't seem like a reasonable
thing to expect other implementations to support.
2020-04-03 05:40:22 -04:00
|
|
|
self.assertGreaterEqual(c["stream_id"], stream_id)
|
2020-03-27 07:39:43 -04:00
|
|
|
stream_id = c["stream_id"]
|
|
|
|
devices = {edu["content"]["device_id"] for edu in self.edus}
|
|
|
|
self.assertEqual({"D1", "D2", "D3"}, devices)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_unreachable_server(self) -> None:
|
2020-03-27 07:39:43 -04:00
|
|
|
"""If the destination server is unreachable, all the updates should get sent on
|
|
|
|
recovery
|
|
|
|
"""
|
2023-02-14 14:03:35 -05:00
|
|
|
mock_send_txn = self.federation_transport_client.send_transaction
|
2023-08-24 19:38:46 -04:00
|
|
|
mock_send_txn.side_effect = AssertionError("fail")
|
2020-03-27 07:39:43 -04:00
|
|
|
|
|
|
|
# create devices
|
|
|
|
u1 = self.register_user("user", "pass")
|
|
|
|
self.login("user", "pass", device_id="D1")
|
|
|
|
self.login("user", "pass", device_id="D2")
|
|
|
|
self.login("user", "pass", device_id="D3")
|
|
|
|
|
|
|
|
# delete them again
|
2023-02-14 14:03:35 -05:00
|
|
|
self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
|
2020-03-27 07:39:43 -04:00
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
self.assertGreaterEqual(mock_send_txn.call_count, 4)
|
|
|
|
|
|
|
|
# recover the server
|
|
|
|
mock_send_txn.side_effect = self.record_transaction
|
2023-09-04 12:14:09 -04:00
|
|
|
self.get_success(
|
|
|
|
self.hs.get_federation_sender().send_device_messages(["host2"])
|
|
|
|
)
|
2022-03-04 06:48:15 -05:00
|
|
|
|
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
2020-03-27 07:39:43 -04:00
|
|
|
|
|
|
|
# for each device, there should be a single update
|
|
|
|
self.assertEqual(len(self.edus), 3)
|
2023-02-06 11:05:06 -05:00
|
|
|
stream_id: Optional[int] = None
|
2020-03-27 07:39:43 -04:00
|
|
|
for edu in self.edus:
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(edu["edu_type"], EduTypes.DEVICE_LIST_UPDATE)
|
2020-03-27 07:39:43 -04:00
|
|
|
c = edu["content"]
|
|
|
|
self.assertEqual(c["prev_id"], [stream_id] if stream_id is not None else [])
|
Fix device list update stream ids going backward (#7158)
Occasionally we could get a federation device list update transaction which
looked like:
```
[
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D2', 'prev_id': [], 'stream_id': 12, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D1', 'prev_id': [12], 'stream_id': 11, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D3', 'prev_id': [11], 'stream_id': 13, 'deleted': True}}
]
```
Having `stream_ids` which are lower than `prev_ids` looks odd. It might work
(I'm not actually sure), but in any case it doesn't seem like a reasonable
thing to expect other implementations to support.
2020-04-03 05:40:22 -04:00
|
|
|
if stream_id is not None:
|
|
|
|
self.assertGreaterEqual(c["stream_id"], stream_id)
|
2020-03-27 07:39:43 -04:00
|
|
|
stream_id = c["stream_id"]
|
|
|
|
devices = {edu["content"]["device_id"] for edu in self.edus}
|
|
|
|
self.assertEqual({"D1", "D2", "D3"}, devices)
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_prune_outbound_device_pokes1(self) -> None:
|
2020-03-30 14:06:52 -04:00
|
|
|
"""If a destination is unreachable, and the updates are pruned, we should get
|
|
|
|
a single update.
|
|
|
|
|
|
|
|
This case tests the behaviour when the server has never been reachable.
|
|
|
|
"""
|
2023-02-14 14:03:35 -05:00
|
|
|
mock_send_txn = self.federation_transport_client.send_transaction
|
2023-08-24 19:38:46 -04:00
|
|
|
mock_send_txn.side_effect = AssertionError("fail")
|
2020-03-30 14:06:52 -04:00
|
|
|
|
|
|
|
# create devices
|
|
|
|
u1 = self.register_user("user", "pass")
|
|
|
|
self.login("user", "pass", device_id="D1")
|
|
|
|
self.login("user", "pass", device_id="D2")
|
|
|
|
self.login("user", "pass", device_id="D3")
|
|
|
|
|
|
|
|
# delete them again
|
2023-02-14 14:03:35 -05:00
|
|
|
self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
|
2020-03-30 14:06:52 -04:00
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-30 14:06:52 -04:00
|
|
|
self.assertGreaterEqual(mock_send_txn.call_count, 4)
|
|
|
|
|
|
|
|
# run the prune job
|
|
|
|
self.reactor.advance(10)
|
|
|
|
self.get_success(
|
2022-02-23 06:04:02 -05:00
|
|
|
self.hs.get_datastores().main._prune_old_outbound_device_pokes(prune_age=1)
|
2020-03-30 14:06:52 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
# recover the server
|
|
|
|
mock_send_txn.side_effect = self.record_transaction
|
2023-09-04 12:14:09 -04:00
|
|
|
self.get_success(
|
|
|
|
self.hs.get_federation_sender().send_device_messages(["host2"])
|
|
|
|
)
|
2022-03-04 06:48:15 -05:00
|
|
|
|
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
2020-03-30 14:06:52 -04:00
|
|
|
|
|
|
|
# there should be a single update for this user.
|
|
|
|
self.assertEqual(len(self.edus), 1)
|
|
|
|
edu = self.edus.pop(0)
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(edu["edu_type"], EduTypes.DEVICE_LIST_UPDATE)
|
2020-03-30 14:06:52 -04:00
|
|
|
c = edu["content"]
|
|
|
|
|
|
|
|
# synapse uses an empty prev_id list to indicate "needs a full resync".
|
|
|
|
self.assertEqual(c["prev_id"], [])
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def test_prune_outbound_device_pokes2(self) -> None:
|
2020-03-30 14:06:52 -04:00
|
|
|
"""If a destination is unreachable, and the updates are pruned, we should get
|
|
|
|
a single update.
|
|
|
|
|
|
|
|
This case tests the behaviour when the server was reachable, but then goes
|
|
|
|
offline.
|
|
|
|
"""
|
|
|
|
|
|
|
|
# create first device
|
|
|
|
u1 = self.register_user("user", "pass")
|
|
|
|
self.login("user", "pass", device_id="D1")
|
|
|
|
|
|
|
|
# expect the update EDU
|
|
|
|
self.assertEqual(len(self.edus), 1)
|
|
|
|
self.check_device_update_edu(self.edus.pop(0), u1, "D1", None)
|
|
|
|
|
|
|
|
# now the server goes offline
|
2023-02-14 14:03:35 -05:00
|
|
|
mock_send_txn = self.federation_transport_client.send_transaction
|
2023-08-24 19:38:46 -04:00
|
|
|
mock_send_txn.side_effect = AssertionError("fail")
|
2020-03-30 14:06:52 -04:00
|
|
|
|
|
|
|
self.login("user", "pass", device_id="D2")
|
|
|
|
self.login("user", "pass", device_id="D3")
|
|
|
|
|
2022-03-04 06:48:15 -05:00
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
|
|
|
|
2020-03-30 14:06:52 -04:00
|
|
|
# delete them again
|
2023-02-14 14:03:35 -05:00
|
|
|
self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
|
2020-03-30 14:06:52 -04:00
|
|
|
|
|
|
|
self.assertGreaterEqual(mock_send_txn.call_count, 3)
|
|
|
|
|
|
|
|
# run the prune job
|
|
|
|
self.reactor.advance(10)
|
|
|
|
self.get_success(
|
2022-02-23 06:04:02 -05:00
|
|
|
self.hs.get_datastores().main._prune_old_outbound_device_pokes(prune_age=1)
|
2020-03-30 14:06:52 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
# recover the server
|
|
|
|
mock_send_txn.side_effect = self.record_transaction
|
2023-09-04 12:14:09 -04:00
|
|
|
self.get_success(
|
|
|
|
self.hs.get_federation_sender().send_device_messages(["host2"])
|
|
|
|
)
|
2022-03-04 06:48:15 -05:00
|
|
|
|
|
|
|
# We queue up device list updates to be sent over federation, so we
|
|
|
|
# advance to clear the queue.
|
|
|
|
self.reactor.advance(1)
|
2020-03-30 14:06:52 -04:00
|
|
|
|
|
|
|
# ... and we should get a single update for this user.
|
|
|
|
self.assertEqual(len(self.edus), 1)
|
|
|
|
edu = self.edus.pop(0)
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(edu["edu_type"], EduTypes.DEVICE_LIST_UPDATE)
|
2020-03-30 14:06:52 -04:00
|
|
|
c = edu["content"]
|
|
|
|
|
|
|
|
# synapse uses an empty prev_id list to indicate "needs a full resync".
|
|
|
|
self.assertEqual(c["prev_id"], [])
|
|
|
|
|
2020-03-27 07:39:43 -04:00
|
|
|
def check_device_update_edu(
|
|
|
|
self,
|
|
|
|
edu: JsonDict,
|
|
|
|
user_id: str,
|
|
|
|
device_id: str,
|
|
|
|
prev_stream_id: Optional[int],
|
|
|
|
) -> int:
|
|
|
|
"""Check that the given EDU is an update for the given device
|
|
|
|
Returns the stream_id.
|
|
|
|
"""
|
2022-05-27 07:14:36 -04:00
|
|
|
self.assertEqual(edu["edu_type"], EduTypes.DEVICE_LIST_UPDATE)
|
2020-03-27 07:39:43 -04:00
|
|
|
content = edu["content"]
|
|
|
|
|
|
|
|
expected = {
|
|
|
|
"user_id": user_id,
|
|
|
|
"device_id": device_id,
|
|
|
|
"prev_id": [prev_stream_id] if prev_stream_id is not None else [],
|
|
|
|
}
|
|
|
|
|
|
|
|
self.assertLessEqual(expected.items(), content.items())
|
Fix device list update stream ids going backward (#7158)
Occasionally we could get a federation device list update transaction which
looked like:
```
[
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D2', 'prev_id': [], 'stream_id': 12, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D1', 'prev_id': [12], 'stream_id': 11, 'deleted': True}},
{'edu_type': 'm.device_list_update', 'content': {'user_id': '@user:test', 'device_id': 'D3', 'prev_id': [11], 'stream_id': 13, 'deleted': True}}
]
```
Having `stream_ids` which are lower than `prev_ids` looks odd. It might work
(I'm not actually sure), but in any case it doesn't seem like a reasonable
thing to expect other implementations to support.
2020-04-03 05:40:22 -04:00
|
|
|
if prev_stream_id is not None:
|
|
|
|
self.assertGreaterEqual(content["stream_id"], prev_stream_id)
|
2020-03-27 07:39:43 -04:00
|
|
|
return content["stream_id"]
|
|
|
|
|
2021-02-16 17:32:34 -05:00
|
|
|
def check_signing_key_update_txn(
|
|
|
|
self,
|
|
|
|
txn: JsonDict,
|
|
|
|
) -> None:
|
|
|
|
"""Check that the txn has an EDU with a signing key update."""
|
2020-03-27 07:39:43 -04:00
|
|
|
edus = txn["edus"]
|
2021-12-08 05:01:38 -05:00
|
|
|
self.assertEqual(len(edus), 2)
|
2020-03-27 07:39:43 -04:00
|
|
|
|
|
|
|
def generate_and_upload_device_signing_key(
|
|
|
|
self, user_id: str, device_id: str
|
|
|
|
) -> SigningKey:
|
|
|
|
"""Generate a signing keypair for the given device, and upload it"""
|
|
|
|
sk = key.generate_signing_key(device_id)
|
|
|
|
|
|
|
|
device_dict = build_device_dict(user_id, device_id, sk)
|
|
|
|
|
|
|
|
self.get_success(
|
|
|
|
self.hs.get_e2e_keys_handler().upload_keys_for_user(
|
2021-02-16 17:32:34 -05:00
|
|
|
user_id,
|
|
|
|
device_id,
|
|
|
|
{"device_keys": device_dict},
|
2020-03-27 07:39:43 -04:00
|
|
|
)
|
|
|
|
)
|
|
|
|
return sk
|
|
|
|
|
|
|
|
|
|
|
|
def generate_self_id_key() -> SigningKey:
|
|
|
|
"""generate a signing key whose version is its public key
|
|
|
|
|
|
|
|
... as used by the cross-signing-keys.
|
|
|
|
"""
|
|
|
|
k = key.generate_signing_key("x")
|
|
|
|
k.version = encode_pubkey(k)
|
|
|
|
return k
|
|
|
|
|
|
|
|
|
|
|
|
def key_id(k: BaseKey) -> str:
|
|
|
|
return "%s:%s" % (k.alg, k.version)
|
|
|
|
|
|
|
|
|
|
|
|
def encode_pubkey(sk: SigningKey) -> str:
|
|
|
|
"""Encode the public key corresponding to the given signing key as base64"""
|
|
|
|
return key.encode_verify_key_base64(key.get_verify_key(sk))
|
|
|
|
|
|
|
|
|
2023-02-06 11:05:06 -05:00
|
|
|
def build_device_dict(user_id: str, device_id: str, sk: SigningKey) -> JsonDict:
|
2020-03-27 07:39:43 -04:00
|
|
|
"""Build a dict representing the given device"""
|
|
|
|
return {
|
|
|
|
"user_id": user_id,
|
|
|
|
"device_id": device_id,
|
2020-06-10 12:44:34 -04:00
|
|
|
"algorithms": [
|
|
|
|
"m.olm.curve25519-aes-sha2",
|
|
|
|
RoomEncryptionAlgorithms.MEGOLM_V1_AES_SHA2,
|
|
|
|
],
|
2020-03-27 07:39:43 -04:00
|
|
|
"keys": {
|
|
|
|
"curve25519:" + device_id: "curve25519+key",
|
|
|
|
key_id(sk): encode_pubkey(sk),
|
|
|
|
},
|
|
|
|
}
|