Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit 66a532f

Browse files
committed
Remove request name
1 parent 83d5280 commit 66a532f

File tree

4 files changed

+45
-31
lines changed

4 files changed

+45
-31
lines changed

synapse/crypto/keyring.py

Lines changed: 3 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -74,23 +74,19 @@ class VerifyJsonRequest:
7474
minimum_valid_until_ts: time at which we require the signing key to
7575
be valid. (0 implies we don't care)
7676
77-
request_name: The name of the request.
78-
7977
key_ids: The set of key_ids to that could be used to verify the JSON object
8078
"""
8179

8280
server_name = attr.ib(type=str)
8381
get_json_object = attr.ib(type=Callable[[], JsonDict])
8482
minimum_valid_until_ts = attr.ib(type=int)
85-
request_name = attr.ib(type=str)
8683
key_ids = attr.ib(type=List[str])
8784

8885
@staticmethod
8986
def from_json_object(
9087
server_name: str,
9188
json_object: JsonDict,
9289
minimum_valid_until_ms: int,
93-
request_name: str,
9490
):
9591
"""Create a VerifyJsonRequest to verify all signatures on a signed JSON
9692
object for the given server.
@@ -100,7 +96,6 @@ def from_json_object(
10096
server_name,
10197
lambda: json_object,
10298
minimum_valid_until_ms,
103-
request_name=request_name,
10499
key_ids=key_ids,
105100
)
106101

@@ -120,7 +115,6 @@ def from_event(
120115
# memory than the Event object itself.
121116
lambda: prune_event_dict(event.room_version, event.get_pdu_json()),
122117
minimum_valid_until_ms,
123-
request_name=event.event_id,
124118
key_ids=key_ids,
125119
)
126120

@@ -177,7 +171,6 @@ def verify_json_for_server(
177171
server_name: str,
178172
json_object: JsonDict,
179173
validity_time: int,
180-
request_name: str,
181174
) -> defer.Deferred:
182175
"""Verify that a JSON object has been signed by a given server
183176
@@ -189,9 +182,6 @@ def verify_json_for_server(
189182
validity_time: timestamp at which we require the signing key to
190183
be valid. (0 implies we don't care)
191184
192-
request_name: an identifier for this json object (eg, an event id)
193-
for logging.
194-
195185
Returns:
196186
Deferred[None]: completes if the the object was correctly signed, otherwise
197187
errbacks with an error
@@ -200,27 +190,23 @@ def verify_json_for_server(
200190
server_name,
201191
json_object,
202192
validity_time,
203-
request_name,
204193
)
205194
return defer.ensureDeferred(self.process_request(request))
206195

207196
def verify_json_objects_for_server(
208-
self, server_and_json: Iterable[Tuple[str, dict, int, str]]
197+
self, server_and_json: Iterable[Tuple[str, dict, int]]
209198
) -> List[defer.Deferred]:
210199
"""Bulk verifies signatures of json objects, bulk fetching keys as
211200
necessary.
212201
213202
Args:
214203
server_and_json:
215-
Iterable of (server_name, json_object, validity_time, request_name)
204+
Iterable of (server_name, json_object, validity_time)
216205
tuples.
217206
218207
validity_time is a timestamp at which the signing key must be
219208
valid.
220209
221-
request_name is an identifier for this json object (eg, an event id)
222-
for logging.
223-
224210
Returns:
225211
List<Deferred[None]>: for each input triplet, a deferred indicating success
226212
or failure to verify each json object's signature for the given
@@ -235,11 +221,10 @@ def verify_json_objects_for_server(
235221
server_name,
236222
json_object,
237223
validity_time,
238-
request_name,
239224
),
240225
)
241226
)
242-
for server_name, json_object, validity_time, request_name in server_and_json
227+
for server_name, json_object, validity_time in server_and_json
243228
]
244229

245230
def verify_events_for_server(

synapse/federation/transport/server.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,9 @@ async def authenticate_request(self, request, content):
151151
)
152152

153153
await self.keyring.verify_json_for_server(
154-
origin, json_request, now, "Incoming request"
154+
origin,
155+
json_request,
156+
now,
155157
)
156158

157159
logger.debug("Request from %s", origin)

synapse/groups/attestations.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,9 @@ async def verify_attestation(
108108

109109
assert server_name is not None
110110
await self.keyring.verify_json_for_server(
111-
server_name, attestation, now, "Group attestation"
111+
server_name,
112+
attestation,
113+
now,
112114
)
113115

114116
def create_attestation(self, group_id: str, user_id: str) -> JsonDict:

tests/crypto/test_keyring.py

Lines changed: 36 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ async def first_lookup_fetch(
109109
async def first_lookup():
110110
with LoggingContext("context_11", request=FakeRequest("context_11")):
111111
res_deferreds = kr.verify_json_objects_for_server(
112-
[("server10", json1, 0, "test10"), ("server11", {}, 0, "test11")]
112+
[("server10", json1, 0), ("server11", {}, 0)]
113113
)
114114

115115
# the unsigned json should be rejected pretty quickly
@@ -147,7 +147,13 @@ async def second_lookup_fetch(
147147
async def second_lookup():
148148
with LoggingContext("context_12", request=FakeRequest("context_12")):
149149
res_deferreds_2 = kr.verify_json_objects_for_server(
150-
[("server10", json1, 0, "test")]
150+
[
151+
(
152+
"server10",
153+
json1,
154+
0,
155+
)
156+
]
151157
)
152158
res_deferreds_2[0].addBoth(self.check_context, None)
153159
second_lookup_state[0] = 1
@@ -184,11 +190,11 @@ def test_verify_json_for_server(self):
184190
signedjson.sign.sign_json(json1, "server9", key1)
185191

186192
# should fail immediately on an unsigned object
187-
d = _verify_json_for_server(kr, "server9", {}, 0, "test unsigned")
193+
d = _verify_json_for_server(kr, "server9", {}, 0)
188194
self.get_failure(d, SynapseError)
189195

190196
# should succeed on a signed object
191-
d = _verify_json_for_server(kr, "server9", json1, 500, "test signed")
197+
d = _verify_json_for_server(kr, "server9", json1, 500)
192198
# self.assertFalse(d.called)
193199
self.get_success(d)
194200

@@ -215,14 +221,12 @@ def test_verify_json_for_server_with_null_valid_until_ms(self):
215221
signedjson.sign.sign_json(json1, "server9", key1)
216222

217223
# should fail immediately on an unsigned object
218-
d = _verify_json_for_server(kr, "server9", {}, 0, "test unsigned")
224+
d = _verify_json_for_server(kr, "server9", {}, 0)
219225
self.get_failure(d, SynapseError)
220226

221227
# should fail on a signed object with a non-zero minimum_valid_until_ms,
222228
# as it tries to refetch the keys and fails.
223-
d = _verify_json_for_server(
224-
kr, "server9", json1, 500, "test signed non-zero min"
225-
)
229+
d = _verify_json_for_server(kr, "server9", json1, 500)
226230
self.get_failure(d, SynapseError)
227231

228232
# We expect the keyring tried to refetch the key once.
@@ -232,7 +236,10 @@ def test_verify_json_for_server_with_null_valid_until_ms(self):
232236

233237
# should succeed on a signed object with a 0 minimum_valid_until_ms
234238
d = _verify_json_for_server(
235-
kr, "server9", json1, 0, "test signed with zero min"
239+
kr,
240+
"server9",
241+
json1,
242+
0,
236243
)
237244
self.get_success(d)
238245

@@ -260,7 +267,14 @@ async def get_keys(
260267
# the first request should succeed; the second should fail because the key
261268
# has expired
262269
results = kr.verify_json_objects_for_server(
263-
[("server1", json1, 500, "test1"), ("server1", json1, 1500, "test2")]
270+
[
271+
(
272+
"server1",
273+
json1,
274+
500,
275+
),
276+
("server1", json1, 1500),
277+
]
264278
)
265279
self.assertEqual(len(results), 2)
266280
self.get_success(results[0])
@@ -301,7 +315,18 @@ async def get_keys2(
301315
signedjson.sign.sign_json(json1, "server1", key1)
302316

303317
results = kr.verify_json_objects_for_server(
304-
[("server1", json1, 1200, "test1"), ("server1", json1, 1500, "test2")]
318+
[
319+
(
320+
"server1",
321+
json1,
322+
1200,
323+
),
324+
(
325+
"server1",
326+
json1,
327+
1500,
328+
),
329+
]
305330
)
306331
self.assertEqual(len(results), 2)
307332
self.get_success(results[0])

0 commit comments

Comments
 (0)