2017-08-17 09:54:27 -06:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
|
|
|
# Copyright 2017 New Vector Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
from __future__ import print_function
|
|
|
|
|
|
|
|
import argparse
|
2015-05-06 04:46:02 -06:00
|
|
|
import nacl.signing
|
|
|
|
import json
|
|
|
|
import base64
|
|
|
|
import requests
|
|
|
|
import sys
|
|
|
|
import srvlookup
|
2017-08-17 09:54:27 -06:00
|
|
|
import yaml
|
2015-05-06 04:46:02 -06:00
|
|
|
|
|
|
|
def encode_base64(input_bytes):
|
|
|
|
"""Encode bytes as a base64 string without any padding."""
|
|
|
|
|
|
|
|
input_len = len(input_bytes)
|
|
|
|
output_len = 4 * ((input_len + 2) // 3) + (input_len + 2) % 3 - 2
|
|
|
|
output_bytes = base64.b64encode(input_bytes)
|
|
|
|
output_string = output_bytes[:output_len].decode("ascii")
|
|
|
|
return output_string
|
|
|
|
|
|
|
|
|
|
|
|
def decode_base64(input_string):
|
|
|
|
"""Decode a base64 string to bytes inferring padding from the length of the
|
|
|
|
string."""
|
|
|
|
|
|
|
|
input_bytes = input_string.encode("ascii")
|
|
|
|
input_len = len(input_bytes)
|
|
|
|
padding = b"=" * (3 - ((input_len + 3) % 4))
|
|
|
|
output_len = 3 * ((input_len + 2) // 4) + (input_len + 2) % 4 - 2
|
|
|
|
output_bytes = base64.b64decode(input_bytes + padding)
|
|
|
|
return output_bytes[:output_len]
|
|
|
|
|
|
|
|
|
|
|
|
def encode_canonical_json(value):
|
|
|
|
return json.dumps(
|
|
|
|
value,
|
|
|
|
# Encode code-points outside of ASCII as UTF-8 rather than \u escapes
|
|
|
|
ensure_ascii=False,
|
|
|
|
# Remove unecessary white space.
|
|
|
|
separators=(',',':'),
|
|
|
|
# Sort the keys of dictionaries.
|
|
|
|
sort_keys=True,
|
|
|
|
# Encode the resulting unicode as UTF-8 bytes.
|
|
|
|
).encode("UTF-8")
|
|
|
|
|
|
|
|
|
|
|
|
def sign_json(json_object, signing_key, signing_name):
|
|
|
|
signatures = json_object.pop("signatures", {})
|
|
|
|
unsigned = json_object.pop("unsigned", None)
|
|
|
|
|
|
|
|
signed = signing_key.sign(encode_canonical_json(json_object))
|
|
|
|
signature_base64 = encode_base64(signed.signature)
|
|
|
|
|
|
|
|
key_id = "%s:%s" % (signing_key.alg, signing_key.version)
|
|
|
|
signatures.setdefault(signing_name, {})[key_id] = signature_base64
|
|
|
|
|
|
|
|
json_object["signatures"] = signatures
|
|
|
|
if unsigned is not None:
|
|
|
|
json_object["unsigned"] = unsigned
|
|
|
|
|
|
|
|
return json_object
|
|
|
|
|
|
|
|
|
|
|
|
NACL_ED25519 = "ed25519"
|
|
|
|
|
|
|
|
def decode_signing_key_base64(algorithm, version, key_base64):
|
|
|
|
"""Decode a base64 encoded signing key
|
|
|
|
Args:
|
|
|
|
algorithm (str): The algorithm the key is for (currently "ed25519").
|
|
|
|
version (str): Identifies this key out of the keys for this entity.
|
|
|
|
key_base64 (str): Base64 encoded bytes of the key.
|
|
|
|
Returns:
|
|
|
|
A SigningKey object.
|
|
|
|
"""
|
|
|
|
if algorithm == NACL_ED25519:
|
|
|
|
key_bytes = decode_base64(key_base64)
|
|
|
|
key = nacl.signing.SigningKey(key_bytes)
|
|
|
|
key.version = version
|
|
|
|
key.alg = NACL_ED25519
|
|
|
|
return key
|
|
|
|
else:
|
|
|
|
raise ValueError("Unsupported algorithm %s" % (algorithm,))
|
|
|
|
|
|
|
|
|
|
|
|
def read_signing_keys(stream):
|
|
|
|
"""Reads a list of keys from a stream
|
|
|
|
Args:
|
|
|
|
stream : A stream to iterate for keys.
|
|
|
|
Returns:
|
|
|
|
list of SigningKey objects.
|
|
|
|
"""
|
|
|
|
keys = []
|
|
|
|
for line in stream:
|
|
|
|
algorithm, version, key_base64 = line.split()
|
|
|
|
keys.append(decode_signing_key_base64(algorithm, version, key_base64))
|
|
|
|
return keys
|
|
|
|
|
|
|
|
|
|
|
|
def lookup(destination, path):
|
|
|
|
if ":" in destination:
|
|
|
|
return "https://%s%s" % (destination, path)
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
srv = srvlookup.lookup("matrix", "tcp", destination)[0]
|
|
|
|
return "https://%s:%d%s" % (srv.host, srv.port, path)
|
|
|
|
except:
|
|
|
|
return "https://%s:%d%s" % (destination, 8448, path)
|
|
|
|
|
2017-11-27 03:06:59 -07:00
|
|
|
|
|
|
|
def request_json(method, origin_name, origin_key, destination, path, content):
|
|
|
|
if method is None:
|
|
|
|
if content is None:
|
|
|
|
method = "GET"
|
|
|
|
else:
|
|
|
|
method = "POST"
|
|
|
|
|
|
|
|
json_to_sign = {
|
|
|
|
"method": method,
|
2015-05-06 04:46:02 -06:00
|
|
|
"uri": path,
|
|
|
|
"origin": origin_name,
|
|
|
|
"destination": destination,
|
|
|
|
}
|
|
|
|
|
2017-11-27 03:06:59 -07:00
|
|
|
if content is not None:
|
|
|
|
json_to_sign["content"] = json.loads(content)
|
|
|
|
|
|
|
|
signed_json = sign_json(json_to_sign, origin_key, origin_name)
|
2015-05-06 04:46:02 -06:00
|
|
|
|
|
|
|
authorization_headers = []
|
|
|
|
|
|
|
|
for key, sig in signed_json["signatures"][origin_name].items():
|
2016-08-02 08:06:08 -06:00
|
|
|
header = "X-Matrix origin=%s,key=\"%s\",sig=\"%s\"" % (
|
|
|
|
origin_name, key, sig,
|
|
|
|
)
|
|
|
|
authorization_headers.append(bytes(header))
|
2017-08-17 09:54:27 -06:00
|
|
|
print ("Authorization: %s" % header, file=sys.stderr)
|
|
|
|
|
|
|
|
dest = lookup(destination, path)
|
|
|
|
print ("Requesting %s" % dest, file=sys.stderr)
|
2015-05-06 04:46:02 -06:00
|
|
|
|
2017-11-27 03:06:59 -07:00
|
|
|
result = requests.request(
|
|
|
|
method=method,
|
|
|
|
url=dest,
|
2015-05-06 04:46:02 -06:00
|
|
|
headers={"Authorization": authorization_headers[0]},
|
|
|
|
verify=False,
|
2017-11-27 03:06:59 -07:00
|
|
|
data=content,
|
2015-05-06 04:46:02 -06:00
|
|
|
)
|
2016-08-03 06:46:47 -06:00
|
|
|
sys.stderr.write("Status Code: %d\n" % (result.status_code,))
|
2015-05-06 04:46:02 -06:00
|
|
|
return result.json()
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
2017-08-17 09:54:27 -06:00
|
|
|
parser = argparse.ArgumentParser(
|
|
|
|
description=
|
|
|
|
"Signs and sends a federation request to a matrix homeserver",
|
|
|
|
)
|
|
|
|
|
2017-08-22 04:19:30 -06:00
|
|
|
parser.add_argument(
|
|
|
|
"-N", "--server-name",
|
|
|
|
help="Name to give as the local homeserver. If unspecified, will be "
|
|
|
|
"read from the config file.",
|
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
"-k", "--signing-key-path",
|
|
|
|
help="Path to the file containing the private ed25519 key to sign the "
|
|
|
|
"request with.",
|
|
|
|
)
|
|
|
|
|
2017-08-17 09:54:27 -06:00
|
|
|
parser.add_argument(
|
|
|
|
"-c", "--config",
|
|
|
|
default="homeserver.yaml",
|
2017-08-22 04:19:30 -06:00
|
|
|
help="Path to server config file. Ignored if --server-name and "
|
|
|
|
"--signing-key-path are both given.",
|
2017-08-17 09:54:27 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
"-d", "--destination",
|
|
|
|
default="matrix.org",
|
|
|
|
help="name of the remote homeserver. We will do SRV lookups and "
|
|
|
|
"connect appropriately.",
|
|
|
|
)
|
|
|
|
|
2017-11-27 03:06:59 -07:00
|
|
|
parser.add_argument(
|
|
|
|
"-X", "--method",
|
|
|
|
help="HTTP method to use for the request. Defaults to GET if --data is"
|
|
|
|
"unspecified, POST if it is."
|
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
"--body",
|
|
|
|
help="Data to send as the body of the HTTP request"
|
|
|
|
)
|
|
|
|
|
2017-08-17 09:54:27 -06:00
|
|
|
parser.add_argument(
|
|
|
|
"path",
|
|
|
|
help="request path. We will add '/_matrix/federation/v1/' to this."
|
|
|
|
)
|
|
|
|
|
|
|
|
args = parser.parse_args()
|
|
|
|
|
2017-08-22 04:19:30 -06:00
|
|
|
if not args.server_name or not args.signing_key_path:
|
|
|
|
read_args_from_config(args)
|
2015-05-06 04:46:02 -06:00
|
|
|
|
2017-08-22 04:19:30 -06:00
|
|
|
with open(args.signing_key_path) as f:
|
2015-05-06 04:46:02 -06:00
|
|
|
key = read_signing_keys(f)[0]
|
|
|
|
|
2017-11-27 03:06:59 -07:00
|
|
|
result = request_json(
|
|
|
|
args.method,
|
|
|
|
args.server_name, key, args.destination,
|
|
|
|
"/_matrix/federation/v1/" + args.path,
|
|
|
|
content=args.body,
|
2015-05-06 04:46:02 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
json.dump(result, sys.stdout)
|
2017-08-17 09:54:27 -06:00
|
|
|
print ("")
|
2015-05-06 04:46:02 -06:00
|
|
|
|
2017-08-22 04:19:30 -06:00
|
|
|
|
|
|
|
def read_args_from_config(args):
|
|
|
|
with open(args.config, 'r') as fh:
|
|
|
|
config = yaml.safe_load(fh)
|
|
|
|
if not args.server_name:
|
|
|
|
args.server_name = config['server_name']
|
|
|
|
if not args.signing_key_path:
|
|
|
|
args.signing_key_path = config['signing_key_path']
|
|
|
|
|
|
|
|
|
2015-05-06 04:46:02 -06:00
|
|
|
if __name__ == "__main__":
|
|
|
|
main()
|