mirror of
https://github.com/element-hq/synapse.git
synced 2024-11-26 19:47:05 +03:00
5e024a0645
Before this change: * `PerspectivesKeyFetcher` and `ServerKeyFetcher` write to `server_keys_json`. * `PerspectivesKeyFetcher` also writes to `server_signature_keys`. * `StoreKeyFetcher` reads from `server_signature_keys`. After this change: * `PerspectivesKeyFetcher` and `ServerKeyFetcher` write to `server_keys_json`. * `PerspectivesKeyFetcher` also writes to `server_signature_keys`. * `StoreKeyFetcher` reads from `server_keys_json`. This results in `StoreKeyFetcher` now using the results from `ServerKeyFetcher` in addition to those from `PerspectivesKeyFetcher`, i.e. keys which are directly fetched from a server will now be pulled from the database instead of refetched. An additional minor change is included to avoid creating a `PerspectivesKeyFetcher` (and checking it) if no `trusted_key_servers` are configured. The overall impact of this should be better usage of cached results: * If a server has no trusted key servers configured then it should reduce how often keys are fetched. * if a server's trusted key server does not have a requested server's keys cached then it should reduce how often keys are directly fetched.
137 lines
4.5 KiB
Python
137 lines
4.5 KiB
Python
# Copyright 2017 Vector Creations Ltd
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import signedjson.key
|
|
import signedjson.types
|
|
import unpaddedbase64
|
|
|
|
from synapse.storage.keys import FetchKeyResult
|
|
|
|
import tests.unittest
|
|
|
|
|
|
def decode_verify_key_base64(
|
|
key_id: str, key_base64: str
|
|
) -> signedjson.types.VerifyKey:
|
|
key_bytes = unpaddedbase64.decode_base64(key_base64)
|
|
return signedjson.key.decode_verify_key_bytes(key_id, key_bytes)
|
|
|
|
|
|
KEY_1 = decode_verify_key_base64(
|
|
"ed25519:key1", "fP5l4JzpZPq/zdbBg5xx6lQGAAOM9/3w94cqiJ5jPrw"
|
|
)
|
|
KEY_2 = decode_verify_key_base64(
|
|
"ed25519:key2", "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
|
|
)
|
|
|
|
|
|
class KeyStoreTestCase(tests.unittest.HomeserverTestCase):
|
|
def test_get_server_signature_keys(self) -> None:
|
|
store = self.hs.get_datastores().main
|
|
|
|
key_id_1 = "ed25519:key1"
|
|
key_id_2 = "ed25519:KEY_ID_2"
|
|
self.get_success(
|
|
store.store_server_signature_keys(
|
|
"from_server",
|
|
10,
|
|
{
|
|
("server1", key_id_1): FetchKeyResult(KEY_1, 100),
|
|
("server1", key_id_2): FetchKeyResult(KEY_2, 200),
|
|
},
|
|
)
|
|
)
|
|
|
|
res = self.get_success(
|
|
store.get_server_signature_keys(
|
|
[
|
|
("server1", key_id_1),
|
|
("server1", key_id_2),
|
|
("server1", "ed25519:key3"),
|
|
]
|
|
)
|
|
)
|
|
|
|
self.assertEqual(len(res.keys()), 3)
|
|
res1 = res[("server1", key_id_1)]
|
|
self.assertEqual(res1.verify_key, KEY_1)
|
|
self.assertEqual(res1.verify_key.version, "key1")
|
|
self.assertEqual(res1.valid_until_ts, 100)
|
|
|
|
res2 = res[("server1", key_id_2)]
|
|
self.assertEqual(res2.verify_key, KEY_2)
|
|
# version comes from the ID it was stored with
|
|
self.assertEqual(res2.verify_key.version, "KEY_ID_2")
|
|
self.assertEqual(res2.valid_until_ts, 200)
|
|
|
|
# non-existent result gives None
|
|
self.assertIsNone(res[("server1", "ed25519:key3")])
|
|
|
|
def test_cache(self) -> None:
|
|
"""Check that updates correctly invalidate the cache."""
|
|
|
|
store = self.hs.get_datastores().main
|
|
|
|
key_id_1 = "ed25519:key1"
|
|
key_id_2 = "ed25519:key2"
|
|
|
|
self.get_success(
|
|
store.store_server_signature_keys(
|
|
"from_server",
|
|
0,
|
|
{
|
|
("srv1", key_id_1): FetchKeyResult(KEY_1, 100),
|
|
("srv1", key_id_2): FetchKeyResult(KEY_2, 200),
|
|
},
|
|
)
|
|
)
|
|
|
|
res = self.get_success(
|
|
store.get_server_signature_keys([("srv1", key_id_1), ("srv1", key_id_2)])
|
|
)
|
|
self.assertEqual(len(res.keys()), 2)
|
|
|
|
res1 = res[("srv1", key_id_1)]
|
|
self.assertEqual(res1.verify_key, KEY_1)
|
|
self.assertEqual(res1.valid_until_ts, 100)
|
|
|
|
res2 = res[("srv1", key_id_2)]
|
|
self.assertEqual(res2.verify_key, KEY_2)
|
|
self.assertEqual(res2.valid_until_ts, 200)
|
|
|
|
# we should be able to look up the same thing again without a db hit
|
|
res = self.get_success(store.get_server_signature_keys([("srv1", key_id_1)]))
|
|
self.assertEqual(len(res.keys()), 1)
|
|
self.assertEqual(res[("srv1", key_id_1)].verify_key, KEY_1)
|
|
|
|
new_key_2 = signedjson.key.get_verify_key(
|
|
signedjson.key.generate_signing_key("key2")
|
|
)
|
|
d = store.store_server_signature_keys(
|
|
"from_server", 10, {("srv1", key_id_2): FetchKeyResult(new_key_2, 300)}
|
|
)
|
|
self.get_success(d)
|
|
|
|
res = self.get_success(
|
|
store.get_server_signature_keys([("srv1", key_id_1), ("srv1", key_id_2)])
|
|
)
|
|
self.assertEqual(len(res.keys()), 2)
|
|
|
|
res1 = res[("srv1", key_id_1)]
|
|
self.assertEqual(res1.verify_key, KEY_1)
|
|
self.assertEqual(res1.valid_until_ts, 100)
|
|
|
|
res2 = res[("srv1", key_id_2)]
|
|
self.assertEqual(res2.verify_key, new_key_2)
|
|
self.assertEqual(res2.valid_until_ts, 300)
|