2015-04-24 03:22:22 -06:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2015-04-24 03:22:22 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
from ._base import Config, ConfigError
|
2015-08-24 09:17:38 -06:00
|
|
|
|
2015-04-30 08:13:14 -06:00
|
|
|
from synapse.util.stringutils import random_string
|
2015-08-24 09:17:38 -06:00
|
|
|
from signedjson.key import (
|
|
|
|
generate_signing_key, is_signing_algorithm_supported,
|
|
|
|
decode_signing_key_base64, decode_verify_key_bytes,
|
|
|
|
read_signing_keys, write_signing_keys, NACL_ED25519
|
|
|
|
)
|
2015-08-25 03:42:59 -06:00
|
|
|
from unpaddedbase64 import decode_base64
|
2016-02-08 09:35:44 -07:00
|
|
|
from synapse.util.stringutils import random_string_with_symbols
|
2015-08-24 09:17:38 -06:00
|
|
|
|
|
|
|
import os
|
2016-02-08 09:35:44 -07:00
|
|
|
import hashlib
|
|
|
|
import logging
|
|
|
|
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
2015-04-24 03:22:22 -06:00
|
|
|
|
|
|
|
|
|
|
|
class KeyConfig(Config):
|
|
|
|
|
2015-04-29 21:24:44 -06:00
|
|
|
def read_config(self, config):
|
|
|
|
self.signing_key = self.read_signing_key(config["signing_key_path"])
|
2015-04-24 03:22:22 -06:00
|
|
|
self.old_signing_keys = self.read_old_signing_keys(
|
2015-04-29 21:24:44 -06:00
|
|
|
config["old_signing_keys"]
|
|
|
|
)
|
|
|
|
self.key_refresh_interval = self.parse_duration(
|
|
|
|
config["key_refresh_interval"]
|
2015-04-24 03:22:22 -06:00
|
|
|
)
|
2015-04-24 04:26:19 -06:00
|
|
|
self.perspectives = self.read_perspectives(
|
2015-04-29 21:24:44 -06:00
|
|
|
config["perspectives"]
|
2015-04-24 04:26:19 -06:00
|
|
|
)
|
2015-04-24 03:22:22 -06:00
|
|
|
|
2016-02-08 09:35:44 -07:00
|
|
|
self.macaroon_secret_key = config.get(
|
|
|
|
"macaroon_secret_key", self.registration_shared_secret
|
|
|
|
)
|
|
|
|
|
|
|
|
if not self.macaroon_secret_key:
|
|
|
|
# Unfortunately, there are people out there that don't have this
|
|
|
|
# set. Lets just be "nice" and derive one from their secret key.
|
|
|
|
logger.warn("Config is missing missing macaroon_secret_key")
|
|
|
|
seed = self.signing_key[0].seed
|
|
|
|
self.macaroon_secret_key = hashlib.sha256(seed)
|
|
|
|
|
2016-04-20 08:21:40 -06:00
|
|
|
self.expire_access_token = config.get("expire_access_token", False)
|
|
|
|
|
2016-02-08 09:35:44 -07:00
|
|
|
def default_config(self, config_dir_path, server_name, is_generating_file=False,
|
|
|
|
**kwargs):
|
2015-04-29 21:24:44 -06:00
|
|
|
base_key_name = os.path.join(config_dir_path, server_name)
|
2016-02-08 09:35:44 -07:00
|
|
|
|
|
|
|
if is_generating_file:
|
|
|
|
macaroon_secret_key = random_string_with_symbols(50)
|
|
|
|
else:
|
|
|
|
macaroon_secret_key = None
|
|
|
|
|
2015-04-29 21:24:44 -06:00
|
|
|
return """\
|
2016-02-08 09:35:44 -07:00
|
|
|
macaroon_secret_key: "%(macaroon_secret_key)s"
|
|
|
|
|
2016-04-20 08:21:40 -06:00
|
|
|
# Used to enable access token expiration.
|
|
|
|
expire_access_token: False
|
|
|
|
|
2015-04-29 21:24:44 -06:00
|
|
|
## Signing Keys ##
|
|
|
|
|
|
|
|
# Path to the signing key to sign messages with
|
|
|
|
signing_key_path: "%(base_key_name)s.signing.key"
|
|
|
|
|
|
|
|
# The keys that the server used to sign messages with but won't use
|
|
|
|
# to sign new messages. E.g. it has lost its private key
|
|
|
|
old_signing_keys: {}
|
|
|
|
# "ed25519:auto":
|
|
|
|
# # Base64 encoded public key
|
|
|
|
# key: "The public part of your old signing key."
|
|
|
|
# # Millisecond POSIX timestamp when the key expired.
|
|
|
|
# expired_ts: 123456789123
|
|
|
|
|
|
|
|
# How long key response published by this server is valid for.
|
|
|
|
# Used to set the valid_until_ts in /key/v2 APIs.
|
|
|
|
# Determines how quickly servers will query to check which keys
|
|
|
|
# are still valid.
|
|
|
|
key_refresh_interval: "1d" # 1 Day.
|
|
|
|
|
|
|
|
# The trusted servers to download signing keys from.
|
|
|
|
perspectives:
|
|
|
|
servers:
|
|
|
|
"matrix.org":
|
|
|
|
verify_keys:
|
|
|
|
"ed25519:auto":
|
|
|
|
key: "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
|
|
|
|
""" % locals()
|
|
|
|
|
|
|
|
def read_perspectives(self, perspectives_config):
|
2015-04-24 10:01:34 -06:00
|
|
|
servers = {}
|
2015-04-29 21:24:44 -06:00
|
|
|
for server_name, server_config in perspectives_config["servers"].items():
|
2015-04-24 10:01:34 -06:00
|
|
|
for key_id, key_data in server_config["verify_keys"].items():
|
|
|
|
if is_signing_algorithm_supported(key_id):
|
|
|
|
key_base64 = key_data["key"]
|
|
|
|
key_bytes = decode_base64(key_base64)
|
|
|
|
verify_key = decode_verify_key_bytes(key_id, key_bytes)
|
|
|
|
servers.setdefault(server_name, {})[key_id] = verify_key
|
2015-04-24 04:26:19 -06:00
|
|
|
return servers
|
2015-04-24 03:22:22 -06:00
|
|
|
|
|
|
|
def read_signing_key(self, signing_key_path):
|
|
|
|
signing_keys = self.read_file(signing_key_path, "signing_key")
|
|
|
|
try:
|
2015-08-24 09:17:38 -06:00
|
|
|
return read_signing_keys(signing_keys.splitlines(True))
|
2015-04-24 03:22:22 -06:00
|
|
|
except Exception:
|
|
|
|
raise ConfigError(
|
|
|
|
"Error reading signing_key."
|
|
|
|
" Try running again with --generate-config"
|
|
|
|
)
|
|
|
|
|
2015-04-29 21:24:44 -06:00
|
|
|
def read_old_signing_keys(self, old_signing_keys):
|
|
|
|
keys = {}
|
|
|
|
for key_id, key_data in old_signing_keys.items():
|
|
|
|
if is_signing_algorithm_supported(key_id):
|
|
|
|
key_base64 = key_data["key"]
|
|
|
|
key_bytes = decode_base64(key_base64)
|
|
|
|
verify_key = decode_verify_key_bytes(key_id, key_bytes)
|
|
|
|
verify_key.expired_ts = key_data["expired_ts"]
|
|
|
|
keys[key_id] = verify_key
|
|
|
|
else:
|
|
|
|
raise ConfigError(
|
|
|
|
"Unsupported signing algorithm for old key: %r" % (key_id,)
|
|
|
|
)
|
|
|
|
return keys
|
2015-04-24 03:22:22 -06:00
|
|
|
|
2015-04-30 09:52:57 -06:00
|
|
|
def generate_files(self, config):
|
2015-04-29 21:24:44 -06:00
|
|
|
signing_key_path = config["signing_key_path"]
|
|
|
|
if not os.path.exists(signing_key_path):
|
|
|
|
with open(signing_key_path, "w") as signing_key_file:
|
2015-04-30 08:13:14 -06:00
|
|
|
key_id = "a_" + random_string(4)
|
2015-08-24 09:17:38 -06:00
|
|
|
write_signing_keys(
|
|
|
|
signing_key_file, (generate_signing_key(key_id),),
|
2015-04-24 03:22:22 -06:00
|
|
|
)
|
|
|
|
else:
|
2015-04-29 21:24:44 -06:00
|
|
|
signing_keys = self.read_file(signing_key_path, "signing_key")
|
2015-04-24 03:22:22 -06:00
|
|
|
if len(signing_keys.split("\n")[0].split()) == 1:
|
|
|
|
# handle keys in the old format.
|
2015-04-30 10:54:01 -06:00
|
|
|
key_id = "a_" + random_string(4)
|
2015-08-24 09:17:38 -06:00
|
|
|
key = decode_signing_key_base64(
|
|
|
|
NACL_ED25519, key_id, signing_keys.split("\n")[0]
|
2015-04-24 03:22:22 -06:00
|
|
|
)
|
2015-04-29 21:24:44 -06:00
|
|
|
with open(signing_key_path, "w") as signing_key_file:
|
2015-08-24 09:17:38 -06:00
|
|
|
write_signing_keys(
|
|
|
|
signing_key_file, (key,),
|
2015-04-24 03:22:22 -06:00
|
|
|
)
|