mirror of
https://github.com/matrix-org/dendrite.git
synced 2025-12-29 01:33:10 -06:00
Some changes from review comments
This commit is contained in:
parent
798549c10a
commit
e36418328a
|
|
@ -15,10 +15,11 @@
|
||||||
package routing
|
package routing
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"github.com/matrix-org/dendrite/clientapi/auth"
|
"github.com/matrix-org/dendrite/clientapi/auth"
|
||||||
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
|
||||||
"github.com/matrix-org/dendrite/clientapi/httputil"
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
||||||
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
||||||
"github.com/matrix-org/dendrite/keyserver/api"
|
"github.com/matrix-org/dendrite/keyserver/api"
|
||||||
|
|
@ -28,51 +29,37 @@ import (
|
||||||
"github.com/matrix-org/util"
|
"github.com/matrix-org/util"
|
||||||
)
|
)
|
||||||
|
|
||||||
type crossSigningRequest struct {
|
|
||||||
api.PerformUploadDeviceKeysRequest
|
|
||||||
Auth newPasswordAuth `json:"auth"`
|
|
||||||
}
|
|
||||||
|
|
||||||
func UploadCrossSigningDeviceKeys(
|
func UploadCrossSigningDeviceKeys(
|
||||||
req *http.Request, keyserverAPI api.KeyInternalAPI, device *userapi.Device,
|
req *http.Request, userInteractiveAuth *auth.UserInteractive,
|
||||||
|
keyserverAPI api.KeyInternalAPI, device *userapi.Device,
|
||||||
accountDB accounts.Database, cfg *config.ClientAPI,
|
accountDB accounts.Database, cfg *config.ClientAPI,
|
||||||
) util.JSONResponse {
|
) util.JSONResponse {
|
||||||
uploadReq := &crossSigningRequest{}
|
uploadReq := &api.PerformUploadDeviceKeysRequest{}
|
||||||
uploadRes := &api.PerformUploadDeviceKeysResponse{}
|
uploadRes := &api.PerformUploadDeviceKeysResponse{}
|
||||||
|
|
||||||
resErr := httputil.UnmarshalJSONRequest(req, &uploadReq)
|
ctx := req.Context()
|
||||||
if resErr != nil {
|
defer req.Body.Close() // nolint:errcheck
|
||||||
return *resErr
|
bodyBytes, err := ioutil.ReadAll(req.Body)
|
||||||
}
|
if err != nil {
|
||||||
sessionID := uploadReq.Auth.Session
|
|
||||||
if sessionID == "" {
|
|
||||||
sessionID = util.RandomString(sessionIDLength)
|
|
||||||
}
|
|
||||||
if uploadReq.Auth.Type != authtypes.LoginTypePassword {
|
|
||||||
return util.JSONResponse{
|
return util.JSONResponse{
|
||||||
Code: http.StatusUnauthorized,
|
Code: http.StatusBadRequest,
|
||||||
JSON: newUserInteractiveResponse(
|
JSON: jsonerror.BadJSON("The request body could not be read: " + err.Error()),
|
||||||
sessionID,
|
|
||||||
[]authtypes.Flow{
|
|
||||||
{
|
|
||||||
Stages: []authtypes.LoginType{authtypes.LoginTypePassword},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
nil,
|
|
||||||
),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
typePassword := auth.LoginTypePassword{
|
|
||||||
GetAccountByPassword: accountDB.GetAccountByPassword,
|
if _, err := userInteractiveAuth.Verify(ctx, bodyBytes, device); err != nil {
|
||||||
Config: cfg,
|
return *err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = json.Unmarshal(bodyBytes, &uploadReq); err != nil {
|
||||||
|
return util.JSONResponse{
|
||||||
|
Code: http.StatusBadRequest,
|
||||||
|
JSON: jsonerror.BadJSON("The request body could not be unmarshalled: " + err.Error()),
|
||||||
}
|
}
|
||||||
if _, authErr := typePassword.Login(req.Context(), &uploadReq.Auth.PasswordRequest); authErr != nil {
|
|
||||||
return *authErr
|
|
||||||
}
|
}
|
||||||
AddCompletedSessionStage(sessionID, authtypes.LoginTypePassword)
|
|
||||||
|
|
||||||
uploadReq.UserID = device.UserID
|
uploadReq.UserID = device.UserID
|
||||||
keyserverAPI.PerformUploadDeviceKeys(req.Context(), &uploadReq.PerformUploadDeviceKeysRequest, uploadRes)
|
keyserverAPI.PerformUploadDeviceKeys(req.Context(), uploadReq, uploadRes)
|
||||||
|
|
||||||
if err := uploadRes.Error; err != nil {
|
if err := uploadRes.Error; err != nil {
|
||||||
switch {
|
switch {
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,17 @@
|
||||||
|
// Copyright 2021 The Matrix.org Foundation C.I.C.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
package internal
|
package internal
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
|
@ -40,6 +54,7 @@ func sanityCheckKey(key gomatrixserverlib.CrossSigningKey, userID string, purpos
|
||||||
for _, usage := range key.Usage {
|
for _, usage := range key.Usage {
|
||||||
if usage == purpose {
|
if usage == purpose {
|
||||||
useful = true
|
useful = true
|
||||||
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if !useful {
|
if !useful {
|
||||||
|
|
@ -50,6 +65,7 @@ func sanityCheckKey(key gomatrixserverlib.CrossSigningKey, userID string, purpos
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *KeyInternalAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.PerformUploadDeviceKeysRequest, res *api.PerformUploadDeviceKeysResponse) {
|
func (a *KeyInternalAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.PerformUploadDeviceKeysRequest, res *api.PerformUploadDeviceKeysResponse) {
|
||||||
|
var masterKey gomatrixserverlib.Base64Bytes
|
||||||
hasMasterKey := false
|
hasMasterKey := false
|
||||||
|
|
||||||
if len(req.MasterKey.Keys) > 0 {
|
if len(req.MasterKey.Keys) > 0 {
|
||||||
|
|
@ -60,6 +76,9 @@ func (a *KeyInternalAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.P
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
hasMasterKey = true
|
hasMasterKey = true
|
||||||
|
for _, keyData := range req.MasterKey.Keys { // iterates once, because sanityCheckKey requires one key
|
||||||
|
masterKey = keyData
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(req.SelfSigningKey.Keys) > 0 {
|
if len(req.SelfSigningKey.Keys) > 0 {
|
||||||
|
|
@ -82,17 +101,20 @@ func (a *KeyInternalAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.P
|
||||||
|
|
||||||
// If the user hasn't given a new master key, then let's go and get their
|
// If the user hasn't given a new master key, then let's go and get their
|
||||||
// existing keys from the database.
|
// existing keys from the database.
|
||||||
var masterKey gomatrixserverlib.Base64Bytes
|
|
||||||
if !hasMasterKey {
|
if !hasMasterKey {
|
||||||
existingKeys, err := a.DB.CrossSigningKeysForUser(ctx, req.UserID)
|
existingKeys, err := a.DB.CrossSigningKeysForUser(ctx, req.UserID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
res.Error = &api.KeyError{
|
res.Error = &api.KeyError{
|
||||||
Err: "User-signing key sanity check failed: " + err.Error(),
|
Err: "Retrieving cross-signing keys from database failed: " + err.Error(),
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
masterKey, hasMasterKey = existingKeys[gomatrixserverlib.CrossSigningKeyPurposeMaster]
|
masterKey, hasMasterKey = existingKeys[gomatrixserverlib.CrossSigningKeyPurposeMaster]
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we still don't have a master key at this point then there's nothing else
|
||||||
|
// we can do - we've checked both the request and the database.
|
||||||
if !hasMasterKey {
|
if !hasMasterKey {
|
||||||
res.Error = &api.KeyError{
|
res.Error = &api.KeyError{
|
||||||
Err: "No master key was found, either in the database or in the request!",
|
Err: "No master key was found, either in the database or in the request!",
|
||||||
|
|
@ -100,11 +122,8 @@ func (a *KeyInternalAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.P
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
for _, keyData := range req.MasterKey.Keys { // iterates once, see sanityCheckKey
|
// The key ID is basically the key itself.
|
||||||
masterKey = keyData
|
|
||||||
}
|
|
||||||
}
|
|
||||||
masterKeyID := gomatrixserverlib.KeyID(fmt.Sprintf("ed25519:%s", masterKey.Encode()))
|
masterKeyID := gomatrixserverlib.KeyID(fmt.Sprintf("ed25519:%s", masterKey.Encode()))
|
||||||
|
|
||||||
// Work out which things we need to verify the signatures for.
|
// Work out which things we need to verify the signatures for.
|
||||||
|
|
@ -116,7 +135,7 @@ func (a *KeyInternalAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.P
|
||||||
if len(req.SelfSigningKey.Keys) > 0 {
|
if len(req.SelfSigningKey.Keys) > 0 {
|
||||||
toVerify[gomatrixserverlib.CrossSigningKeyPurposeSelfSigning] = req.SelfSigningKey
|
toVerify[gomatrixserverlib.CrossSigningKeyPurposeSelfSigning] = req.SelfSigningKey
|
||||||
}
|
}
|
||||||
if len(req.SelfSigningKey.Keys) > 0 {
|
if len(req.UserSigningKey.Keys) > 0 {
|
||||||
toVerify[gomatrixserverlib.CrossSigningKeyPurposeUserSigning] = req.UserSigningKey
|
toVerify[gomatrixserverlib.CrossSigningKeyPurposeUserSigning] = req.UserSigningKey
|
||||||
}
|
}
|
||||||
for purpose, key := range toVerify {
|
for purpose, key := range toVerify {
|
||||||
|
|
@ -173,7 +192,7 @@ func (a *KeyInternalAPI) PerformUploadDeviceSignatures(ctx context.Context, req
|
||||||
}
|
}
|
||||||
selfSignatures[userID][keyID] = keyOrDevice
|
selfSignatures[userID][keyID] = keyOrDevice
|
||||||
} else {
|
} else {
|
||||||
if _, ok := selfSignatures[userID]; !ok {
|
if _, ok := otherSignatures[userID]; !ok {
|
||||||
otherSignatures[userID] = map[gomatrixserverlib.KeyID]gomatrixserverlib.CrossSigningForKeyOrDevice{}
|
otherSignatures[userID] = map[gomatrixserverlib.KeyID]gomatrixserverlib.CrossSigningForKeyOrDevice{}
|
||||||
}
|
}
|
||||||
otherSignatures[userID][keyID] = keyOrDevice
|
otherSignatures[userID][keyID] = keyOrDevice
|
||||||
|
|
@ -186,7 +205,7 @@ func (a *KeyInternalAPI) PerformUploadDeviceSignatures(ctx context.Context, req
|
||||||
}
|
}
|
||||||
selfSignatures[userID][keyID] = keyOrDevice
|
selfSignatures[userID][keyID] = keyOrDevice
|
||||||
} else {
|
} else {
|
||||||
if _, ok := selfSignatures[userID]; !ok {
|
if _, ok := otherSignatures[userID]; !ok {
|
||||||
otherSignatures[userID] = map[gomatrixserverlib.KeyID]gomatrixserverlib.CrossSigningForKeyOrDevice{}
|
otherSignatures[userID] = map[gomatrixserverlib.KeyID]gomatrixserverlib.CrossSigningForKeyOrDevice{}
|
||||||
}
|
}
|
||||||
otherSignatures[userID][keyID] = keyOrDevice
|
otherSignatures[userID][keyID] = keyOrDevice
|
||||||
|
|
|
||||||
|
|
@ -444,6 +444,9 @@ func (a *KeyInternalAPI) queryRemoteKeysOnServer(
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if len(devKeys) == 0 {
|
||||||
|
return
|
||||||
|
}
|
||||||
queryKeysResp, err := a.FedClient.QueryKeys(fedCtx, gomatrixserverlib.ServerName(serverName), devKeys)
|
queryKeysResp, err := a.FedClient.QueryKeys(fedCtx, gomatrixserverlib.ServerName(serverName), devKeys)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
resultCh <- &queryKeysResp
|
resultCh <- &queryKeysResp
|
||||||
|
|
|
||||||
|
|
@ -39,7 +39,7 @@ const selectCrossSigningKeysForUserSQL = "" +
|
||||||
"SELECT key_type, key_data FROM keyserver_cross_signing_keys" +
|
"SELECT key_type, key_data FROM keyserver_cross_signing_keys" +
|
||||||
" WHERE user_id = $1"
|
" WHERE user_id = $1"
|
||||||
|
|
||||||
const insertCrossSigningKeysForUserSQL = "" +
|
const upsertCrossSigningKeysForUserSQL = "" +
|
||||||
"INSERT INTO keyserver_cross_signing_keys (user_id, key_type, key_data)" +
|
"INSERT INTO keyserver_cross_signing_keys (user_id, key_type, key_data)" +
|
||||||
" VALUES($1, $2, $3)" +
|
" VALUES($1, $2, $3)" +
|
||||||
" ON CONFLICT (user_id, key_type) DO UPDATE SET key_data = $3"
|
" ON CONFLICT (user_id, key_type) DO UPDATE SET key_data = $3"
|
||||||
|
|
@ -47,7 +47,7 @@ const insertCrossSigningKeysForUserSQL = "" +
|
||||||
type crossSigningKeysStatements struct {
|
type crossSigningKeysStatements struct {
|
||||||
db *sql.DB
|
db *sql.DB
|
||||||
selectCrossSigningKeysForUserStmt *sql.Stmt
|
selectCrossSigningKeysForUserStmt *sql.Stmt
|
||||||
insertCrossSigningKeysForUserStmt *sql.Stmt
|
upsertCrossSigningKeysForUserStmt *sql.Stmt
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewPostgresCrossSigningKeysTable(db *sql.DB) (tables.CrossSigningKeys, error) {
|
func NewPostgresCrossSigningKeysTable(db *sql.DB) (tables.CrossSigningKeys, error) {
|
||||||
|
|
@ -58,13 +58,10 @@ func NewPostgresCrossSigningKeysTable(db *sql.DB) (tables.CrossSigningKeys, erro
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if s.selectCrossSigningKeysForUserStmt, err = db.Prepare(selectCrossSigningKeysForUserSQL); err != nil {
|
return s, sqlutil.StatementList{
|
||||||
return nil, err
|
{&s.selectCrossSigningKeysForUserStmt, selectCrossSigningKeysForUserSQL},
|
||||||
}
|
{&s.upsertCrossSigningKeysForUserStmt, upsertCrossSigningKeysForUserSQL},
|
||||||
if s.insertCrossSigningKeysForUserStmt, err = db.Prepare(insertCrossSigningKeysForUserSQL); err != nil {
|
}.Prepare(db)
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return s, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningKeysStatements) SelectCrossSigningKeysForUser(
|
func (s *crossSigningKeysStatements) SelectCrossSigningKeysForUser(
|
||||||
|
|
@ -87,11 +84,11 @@ func (s *crossSigningKeysStatements) SelectCrossSigningKeysForUser(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningKeysStatements) InsertCrossSigningKeysForUser(
|
func (s *crossSigningKeysStatements) UpsertCrossSigningKeysForUser(
|
||||||
ctx context.Context, txn *sql.Tx, userID string, keyType gomatrixserverlib.CrossSigningKeyPurpose, keyData gomatrixserverlib.Base64Bytes,
|
ctx context.Context, txn *sql.Tx, userID string, keyType gomatrixserverlib.CrossSigningKeyPurpose, keyData gomatrixserverlib.Base64Bytes,
|
||||||
) error {
|
) error {
|
||||||
if _, err := sqlutil.TxStmt(txn, s.insertCrossSigningKeysForUserStmt).ExecContext(ctx, userID, keyType, keyData); err != nil {
|
if _, err := sqlutil.TxStmt(txn, s.upsertCrossSigningKeysForUserStmt).ExecContext(ctx, userID, keyType, keyData); err != nil {
|
||||||
return fmt.Errorf("s.insertCrossSigningKeysForUserStmt: %w", err)
|
return fmt.Errorf("s.upsertCrossSigningKeysForUserStmt: %w", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -41,7 +41,7 @@ const selectCrossSigningSigsForTargetSQL = "" +
|
||||||
"SELECT origin_user_id, origin_key_id, signature FROM keyserver_cross_signing_sigs" +
|
"SELECT origin_user_id, origin_key_id, signature FROM keyserver_cross_signing_sigs" +
|
||||||
" WHERE target_user_id = $1 AND target_key_id = $2"
|
" WHERE target_user_id = $1 AND target_key_id = $2"
|
||||||
|
|
||||||
const insertCrossSigningSigsForTargetSQL = "" +
|
const upsertCrossSigningSigsForTargetSQL = "" +
|
||||||
"INSERT INTO keyserver_cross_signing_sigs (origin_user_id, origin_key_id, target_user_id, target_key_id, signature)" +
|
"INSERT INTO keyserver_cross_signing_sigs (origin_user_id, origin_key_id, target_user_id, target_key_id, signature)" +
|
||||||
" VALUES($1, $2, $3, $4, $5)" +
|
" VALUES($1, $2, $3, $4, $5)" +
|
||||||
" ON CONFLICT (origin_user_id, target_user_id, target_key_id) DO UPDATE SET (origin_key_id, signature) = ($2, $5)"
|
" ON CONFLICT (origin_user_id, target_user_id, target_key_id) DO UPDATE SET (origin_key_id, signature) = ($2, $5)"
|
||||||
|
|
@ -49,7 +49,7 @@ const insertCrossSigningSigsForTargetSQL = "" +
|
||||||
type crossSigningSigsStatements struct {
|
type crossSigningSigsStatements struct {
|
||||||
db *sql.DB
|
db *sql.DB
|
||||||
selectCrossSigningSigsForTargetStmt *sql.Stmt
|
selectCrossSigningSigsForTargetStmt *sql.Stmt
|
||||||
insertCrossSigningSigsForTargetStmt *sql.Stmt
|
upsertCrossSigningSigsForTargetStmt *sql.Stmt
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewPostgresCrossSigningSigsTable(db *sql.DB) (tables.CrossSigningSigs, error) {
|
func NewPostgresCrossSigningSigsTable(db *sql.DB) (tables.CrossSigningSigs, error) {
|
||||||
|
|
@ -60,13 +60,10 @@ func NewPostgresCrossSigningSigsTable(db *sql.DB) (tables.CrossSigningSigs, erro
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if s.selectCrossSigningSigsForTargetStmt, err = db.Prepare(selectCrossSigningSigsForTargetSQL); err != nil {
|
return s, sqlutil.StatementList{
|
||||||
return nil, err
|
{&s.selectCrossSigningSigsForTargetStmt, selectCrossSigningSigsForTargetSQL},
|
||||||
}
|
{&s.upsertCrossSigningSigsForTargetStmt, upsertCrossSigningSigsForTargetSQL},
|
||||||
if s.insertCrossSigningSigsForTargetStmt, err = db.Prepare(insertCrossSigningSigsForTargetSQL); err != nil {
|
}.Prepare(db)
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return s, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningSigsStatements) SelectCrossSigningSigsForTarget(
|
func (s *crossSigningSigsStatements) SelectCrossSigningSigsForTarget(
|
||||||
|
|
@ -93,14 +90,14 @@ func (s *crossSigningSigsStatements) SelectCrossSigningSigsForTarget(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningSigsStatements) InsertCrossSigningSigsForTarget(
|
func (s *crossSigningSigsStatements) UpsertCrossSigningSigsForTarget(
|
||||||
ctx context.Context, txn *sql.Tx,
|
ctx context.Context, txn *sql.Tx,
|
||||||
originUserID string, originKeyID gomatrixserverlib.KeyID,
|
originUserID string, originKeyID gomatrixserverlib.KeyID,
|
||||||
targetUserID string, targetKeyID gomatrixserverlib.KeyID,
|
targetUserID string, targetKeyID gomatrixserverlib.KeyID,
|
||||||
signature gomatrixserverlib.Base64Bytes,
|
signature gomatrixserverlib.Base64Bytes,
|
||||||
) error {
|
) error {
|
||||||
if _, err := sqlutil.TxStmt(txn, s.insertCrossSigningSigsForTargetStmt).ExecContext(ctx, originUserID, originKeyID, targetUserID, targetKeyID, signature); err != nil {
|
if _, err := sqlutil.TxStmt(txn, s.upsertCrossSigningSigsForTargetStmt).ExecContext(ctx, originUserID, originKeyID, targetUserID, targetKeyID, signature); err != nil {
|
||||||
return fmt.Errorf("s.insertCrossSigningSigsForTargetStmt: %w", err)
|
return fmt.Errorf("s.upsertCrossSigningSigsForTargetStmt: %w", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -171,7 +171,7 @@ func (d *Database) CrossSigningSigsForTarget(ctx context.Context, targetUserID s
|
||||||
func (d *Database) StoreCrossSigningKeysForUser(ctx context.Context, userID string, keyMap api.CrossSigningKeyMap) error {
|
func (d *Database) StoreCrossSigningKeysForUser(ctx context.Context, userID string, keyMap api.CrossSigningKeyMap) error {
|
||||||
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
||||||
for keyType, keyData := range keyMap {
|
for keyType, keyData := range keyMap {
|
||||||
if err := d.CrossSigningKeysTable.InsertCrossSigningKeysForUser(ctx, txn, userID, keyType, keyData); err != nil {
|
if err := d.CrossSigningKeysTable.UpsertCrossSigningKeysForUser(ctx, txn, userID, keyType, keyData); err != nil {
|
||||||
return fmt.Errorf("d.CrossSigningKeysTable.InsertCrossSigningKeysForUser: %w", err)
|
return fmt.Errorf("d.CrossSigningKeysTable.InsertCrossSigningKeysForUser: %w", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -187,7 +187,7 @@ func (d *Database) StoreCrossSigningSigsForTarget(
|
||||||
signature gomatrixserverlib.Base64Bytes,
|
signature gomatrixserverlib.Base64Bytes,
|
||||||
) error {
|
) error {
|
||||||
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
||||||
if err := d.CrossSigningSigsTable.InsertCrossSigningSigsForTarget(ctx, nil, originUserID, originKeyID, targetUserID, targetKeyID, signature); err != nil {
|
if err := d.CrossSigningSigsTable.UpsertCrossSigningSigsForTarget(ctx, nil, originUserID, originKeyID, targetUserID, targetKeyID, signature); err != nil {
|
||||||
return fmt.Errorf("d.CrossSigningSigsTable.InsertCrossSigningSigsForTarget: %w", err)
|
return fmt.Errorf("d.CrossSigningSigsTable.InsertCrossSigningSigsForTarget: %w", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
|
|
||||||
|
|
@ -39,14 +39,14 @@ const selectCrossSigningKeysForUserSQL = "" +
|
||||||
"SELECT key_type, key_data FROM keyserver_cross_signing_keys" +
|
"SELECT key_type, key_data FROM keyserver_cross_signing_keys" +
|
||||||
" WHERE user_id = $1"
|
" WHERE user_id = $1"
|
||||||
|
|
||||||
const insertCrossSigningKeysForUserSQL = "" +
|
const upsertCrossSigningKeysForUserSQL = "" +
|
||||||
"INSERT OR REPLACE INTO keyserver_cross_signing_keys (user_id, key_type, key_data)" +
|
"INSERT OR REPLACE INTO keyserver_cross_signing_keys (user_id, key_type, key_data)" +
|
||||||
" VALUES($1, $2, $3)"
|
" VALUES($1, $2, $3)"
|
||||||
|
|
||||||
type crossSigningKeysStatements struct {
|
type crossSigningKeysStatements struct {
|
||||||
db *sql.DB
|
db *sql.DB
|
||||||
selectCrossSigningKeysForUserStmt *sql.Stmt
|
selectCrossSigningKeysForUserStmt *sql.Stmt
|
||||||
insertCrossSigningKeysForUserStmt *sql.Stmt
|
upsertCrossSigningKeysForUserStmt *sql.Stmt
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewSqliteCrossSigningKeysTable(db *sql.DB) (tables.CrossSigningKeys, error) {
|
func NewSqliteCrossSigningKeysTable(db *sql.DB) (tables.CrossSigningKeys, error) {
|
||||||
|
|
@ -57,13 +57,10 @@ func NewSqliteCrossSigningKeysTable(db *sql.DB) (tables.CrossSigningKeys, error)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if s.selectCrossSigningKeysForUserStmt, err = db.Prepare(selectCrossSigningKeysForUserSQL); err != nil {
|
return s, sqlutil.StatementList{
|
||||||
return nil, err
|
{&s.selectCrossSigningKeysForUserStmt, selectCrossSigningKeysForUserSQL},
|
||||||
}
|
{&s.upsertCrossSigningKeysForUserStmt, upsertCrossSigningKeysForUserSQL},
|
||||||
if s.insertCrossSigningKeysForUserStmt, err = db.Prepare(insertCrossSigningKeysForUserSQL); err != nil {
|
}.Prepare(db)
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return s, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningKeysStatements) SelectCrossSigningKeysForUser(
|
func (s *crossSigningKeysStatements) SelectCrossSigningKeysForUser(
|
||||||
|
|
@ -86,11 +83,11 @@ func (s *crossSigningKeysStatements) SelectCrossSigningKeysForUser(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningKeysStatements) InsertCrossSigningKeysForUser(
|
func (s *crossSigningKeysStatements) UpsertCrossSigningKeysForUser(
|
||||||
ctx context.Context, txn *sql.Tx, userID string, keyType gomatrixserverlib.CrossSigningKeyPurpose, keyData gomatrixserverlib.Base64Bytes,
|
ctx context.Context, txn *sql.Tx, userID string, keyType gomatrixserverlib.CrossSigningKeyPurpose, keyData gomatrixserverlib.Base64Bytes,
|
||||||
) error {
|
) error {
|
||||||
if _, err := sqlutil.TxStmt(txn, s.insertCrossSigningKeysForUserStmt).ExecContext(ctx, userID, keyType, keyData); err != nil {
|
if _, err := sqlutil.TxStmt(txn, s.upsertCrossSigningKeysForUserStmt).ExecContext(ctx, userID, keyType, keyData); err != nil {
|
||||||
return fmt.Errorf("s.insertCrossSigningKeysForUserStmt: %w", err)
|
return fmt.Errorf("s.upsertCrossSigningKeysForUserStmt: %w", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -41,14 +41,14 @@ const selectCrossSigningSigsForTargetSQL = "" +
|
||||||
"SELECT origin_user_id, origin_key_id, signature FROM keyserver_cross_signing_sigs" +
|
"SELECT origin_user_id, origin_key_id, signature FROM keyserver_cross_signing_sigs" +
|
||||||
" WHERE target_user_id = $1 AND target_key_id = $2"
|
" WHERE target_user_id = $1 AND target_key_id = $2"
|
||||||
|
|
||||||
const insertCrossSigningSigsForTargetSQL = "" +
|
const upsertCrossSigningSigsForTargetSQL = "" +
|
||||||
"INSERT OR REPLACE INTO keyserver_cross_signing_sigs (origin_user_id, origin_key_id, target_user_id, target_key_id, signature)" +
|
"INSERT OR REPLACE INTO keyserver_cross_signing_sigs (origin_user_id, origin_key_id, target_user_id, target_key_id, signature)" +
|
||||||
" VALUES($1, $2, $3, $4, $5)"
|
" VALUES($1, $2, $3, $4, $5)"
|
||||||
|
|
||||||
type crossSigningSigsStatements struct {
|
type crossSigningSigsStatements struct {
|
||||||
db *sql.DB
|
db *sql.DB
|
||||||
selectCrossSigningSigsForTargetStmt *sql.Stmt
|
selectCrossSigningSigsForTargetStmt *sql.Stmt
|
||||||
insertCrossSigningSigsForTargetStmt *sql.Stmt
|
upsertCrossSigningSigsForTargetStmt *sql.Stmt
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewSqliteCrossSigningSigsTable(db *sql.DB) (tables.CrossSigningSigs, error) {
|
func NewSqliteCrossSigningSigsTable(db *sql.DB) (tables.CrossSigningSigs, error) {
|
||||||
|
|
@ -59,13 +59,10 @@ func NewSqliteCrossSigningSigsTable(db *sql.DB) (tables.CrossSigningSigs, error)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if s.selectCrossSigningSigsForTargetStmt, err = db.Prepare(selectCrossSigningSigsForTargetSQL); err != nil {
|
return s, sqlutil.StatementList{
|
||||||
return nil, err
|
{&s.selectCrossSigningSigsForTargetStmt, selectCrossSigningSigsForTargetSQL},
|
||||||
}
|
{&s.upsertCrossSigningSigsForTargetStmt, upsertCrossSigningSigsForTargetSQL},
|
||||||
if s.insertCrossSigningSigsForTargetStmt, err = db.Prepare(insertCrossSigningSigsForTargetSQL); err != nil {
|
}.Prepare(db)
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return s, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningSigsStatements) SelectCrossSigningSigsForTarget(
|
func (s *crossSigningSigsStatements) SelectCrossSigningSigsForTarget(
|
||||||
|
|
@ -92,14 +89,14 @@ func (s *crossSigningSigsStatements) SelectCrossSigningSigsForTarget(
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *crossSigningSigsStatements) InsertCrossSigningSigsForTarget(
|
func (s *crossSigningSigsStatements) UpsertCrossSigningSigsForTarget(
|
||||||
ctx context.Context, txn *sql.Tx,
|
ctx context.Context, txn *sql.Tx,
|
||||||
originUserID string, originKeyID gomatrixserverlib.KeyID,
|
originUserID string, originKeyID gomatrixserverlib.KeyID,
|
||||||
targetUserID string, targetKeyID gomatrixserverlib.KeyID,
|
targetUserID string, targetKeyID gomatrixserverlib.KeyID,
|
||||||
signature gomatrixserverlib.Base64Bytes,
|
signature gomatrixserverlib.Base64Bytes,
|
||||||
) error {
|
) error {
|
||||||
if _, err := sqlutil.TxStmt(txn, s.insertCrossSigningSigsForTargetStmt).ExecContext(ctx, originUserID, originKeyID, targetUserID, targetKeyID, signature); err != nil {
|
if _, err := sqlutil.TxStmt(txn, s.upsertCrossSigningSigsForTargetStmt).ExecContext(ctx, originUserID, originKeyID, targetUserID, targetKeyID, signature); err != nil {
|
||||||
return fmt.Errorf("s.insertCrossSigningSigsForTargetStmt: %w", err)
|
return fmt.Errorf("s.upsertCrossSigningSigsForTargetStmt: %w", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -55,12 +55,10 @@ type StaleDeviceLists interface {
|
||||||
|
|
||||||
type CrossSigningKeys interface {
|
type CrossSigningKeys interface {
|
||||||
SelectCrossSigningKeysForUser(ctx context.Context, txn *sql.Tx, userID string) (r api.CrossSigningKeyMap, err error)
|
SelectCrossSigningKeysForUser(ctx context.Context, txn *sql.Tx, userID string) (r api.CrossSigningKeyMap, err error)
|
||||||
InsertCrossSigningKeysForUser(ctx context.Context, txn *sql.Tx, userID string, keyType gomatrixserverlib.CrossSigningKeyPurpose, keyData gomatrixserverlib.Base64Bytes) error
|
UpsertCrossSigningKeysForUser(ctx context.Context, txn *sql.Tx, userID string, keyType gomatrixserverlib.CrossSigningKeyPurpose, keyData gomatrixserverlib.Base64Bytes) error
|
||||||
}
|
}
|
||||||
|
|
||||||
type CrossSigningSigs interface {
|
type CrossSigningSigs interface {
|
||||||
SelectCrossSigningSigsForTarget(ctx context.Context, txn *sql.Tx, targetUserID string, targetKeyID gomatrixserverlib.KeyID) (r api.CrossSigningSigMap, err error)
|
SelectCrossSigningSigsForTarget(ctx context.Context, txn *sql.Tx, targetUserID string, targetKeyID gomatrixserverlib.KeyID) (r api.CrossSigningSigMap, err error)
|
||||||
InsertCrossSigningSigsForTarget(ctx context.Context, txn *sql.Tx, originUserID string, originKeyID gomatrixserverlib.KeyID, targetUserID string, targetKeyID gomatrixserverlib.KeyID, signature gomatrixserverlib.Base64Bytes) error
|
UpsertCrossSigningSigsForTarget(ctx context.Context, txn *sql.Tx, originUserID string, originKeyID gomatrixserverlib.KeyID, targetUserID string, targetKeyID gomatrixserverlib.KeyID, signature gomatrixserverlib.Base64Bytes) error
|
||||||
}
|
}
|
||||||
|
|
||||||
type CrossSigningStreams interface{}
|
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue