mirror of
https://github.com/1f349/dendrite.git
synced 2024-11-29 23:21:36 +00:00
c45d0936b5
* Generic-based internal HTTP API (tested out on a few endpoints in the federation API) * Add `PerformInvite` * More tweaks * Fix metric name * Fix LookupStateIDs * Lots of changes to clients * Some serverside stuff * Some error handling * Use paths as metric names * Revert "Use paths as metric names" This reverts commit a9323a6a343f5ce6461a2e5bd570fe06465f1b15. * Namespace metric names * Remove duplicate entry * Remove another duplicate entry * Tweak error handling * Some more tweaks * Update error behaviour * Some more error tweaking * Fix API path for `PerformDeleteKeys` * Fix another path * Tweak federation client proxying * Fix another path * Don't return typed nils * Some more tweaks, not that it makes any difference * Tweak federation client proxying * Maybe fix the key backup test
112 lines
3.4 KiB
Go
112 lines
3.4 KiB
Go
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package routing
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
|
keyapi "github.com/matrix-org/dendrite/keyserver/api"
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/matrix-org/util"
|
|
"github.com/tidwall/gjson"
|
|
)
|
|
|
|
// GetUserDevices for the given user id
|
|
func GetUserDevices(
|
|
req *http.Request,
|
|
keyAPI keyapi.FederationKeyAPI,
|
|
userID string,
|
|
) util.JSONResponse {
|
|
var res keyapi.QueryDeviceMessagesResponse
|
|
if err := keyAPI.QueryDeviceMessages(req.Context(), &keyapi.QueryDeviceMessagesRequest{
|
|
UserID: userID,
|
|
}, &res); err != nil {
|
|
return util.ErrorResponse(err)
|
|
}
|
|
if res.Error != nil {
|
|
util.GetLogger(req.Context()).WithError(res.Error).Error("keyAPI.QueryDeviceMessages failed")
|
|
return jsonerror.InternalServerError()
|
|
}
|
|
|
|
sigReq := &keyapi.QuerySignaturesRequest{
|
|
TargetIDs: map[string][]gomatrixserverlib.KeyID{
|
|
userID: {},
|
|
},
|
|
}
|
|
sigRes := &keyapi.QuerySignaturesResponse{}
|
|
for _, dev := range res.Devices {
|
|
sigReq.TargetIDs[userID] = append(sigReq.TargetIDs[userID], gomatrixserverlib.KeyID(dev.DeviceID))
|
|
}
|
|
if err := keyAPI.QuerySignatures(req.Context(), sigReq, sigRes); err != nil {
|
|
return jsonerror.InternalAPIError(req.Context(), err)
|
|
}
|
|
|
|
response := gomatrixserverlib.RespUserDevices{
|
|
UserID: userID,
|
|
StreamID: res.StreamID,
|
|
Devices: []gomatrixserverlib.RespUserDevice{},
|
|
}
|
|
|
|
if masterKey, ok := sigRes.MasterKeys[userID]; ok {
|
|
response.MasterKey = &masterKey
|
|
}
|
|
if selfSigningKey, ok := sigRes.SelfSigningKeys[userID]; ok {
|
|
response.SelfSigningKey = &selfSigningKey
|
|
}
|
|
|
|
for _, dev := range res.Devices {
|
|
var key gomatrixserverlib.RespUserDeviceKeys
|
|
err := json.Unmarshal(dev.DeviceKeys.KeyJSON, &key)
|
|
if err != nil {
|
|
util.GetLogger(req.Context()).WithError(err).Warnf("malformed device key: %s", string(dev.DeviceKeys.KeyJSON))
|
|
continue
|
|
}
|
|
|
|
displayName := dev.DisplayName
|
|
if displayName == "" {
|
|
displayName = gjson.GetBytes(dev.DeviceKeys.KeyJSON, "unsigned.device_display_name").Str
|
|
}
|
|
|
|
device := gomatrixserverlib.RespUserDevice{
|
|
DeviceID: dev.DeviceID,
|
|
DisplayName: displayName,
|
|
Keys: key,
|
|
}
|
|
|
|
if targetUser, ok := sigRes.Signatures[userID]; ok {
|
|
if targetKey, ok := targetUser[gomatrixserverlib.KeyID(dev.DeviceID)]; ok {
|
|
for sourceUserID, forSourceUser := range targetKey {
|
|
for sourceKeyID, sourceKey := range forSourceUser {
|
|
if device.Keys.Signatures == nil {
|
|
device.Keys.Signatures = map[string]map[gomatrixserverlib.KeyID]gomatrixserverlib.Base64Bytes{}
|
|
}
|
|
if _, ok := device.Keys.Signatures[sourceUserID]; !ok {
|
|
device.Keys.Signatures[sourceUserID] = map[gomatrixserverlib.KeyID]gomatrixserverlib.Base64Bytes{}
|
|
}
|
|
device.Keys.Signatures[sourceUserID][sourceKeyID] = sourceKey
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
response.Devices = append(response.Devices, device)
|
|
}
|
|
|
|
return util.JSONResponse{
|
|
Code: 200,
|
|
JSON: response,
|
|
}
|
|
}
|