fix: check that keys uploaded by clients are valid
clients uploading invalid keys can cause errors later when trying to add signatures
This commit is contained in:
@@ -36,6 +36,10 @@ pub async fn upload_keys_route(
|
|||||||
let sender_device = body.sender_device.as_ref().expect("user is authenticated");
|
let sender_device = body.sender_device.as_ref().expect("user is authenticated");
|
||||||
|
|
||||||
for (key_key, key_value) in &body.one_time_keys {
|
for (key_key, key_value) in &body.one_time_keys {
|
||||||
|
key_value.deserialize().map_err(|_| {
|
||||||
|
Error::BadRequest(ErrorKind::BadJson, "Body contained invalid one-time key")
|
||||||
|
})?;
|
||||||
|
|
||||||
services()
|
services()
|
||||||
.users
|
.users
|
||||||
.add_one_time_key(sender_user, sender_device, key_key, key_value)?;
|
.add_one_time_key(sender_user, sender_device, key_key, key_value)?;
|
||||||
@@ -49,6 +53,10 @@ pub async fn upload_keys_route(
|
|||||||
.get_device_keys(sender_user, sender_device)?
|
.get_device_keys(sender_user, sender_device)?
|
||||||
.is_none()
|
.is_none()
|
||||||
{
|
{
|
||||||
|
device_keys.deserialize().map_err(|_| {
|
||||||
|
Error::BadRequest(ErrorKind::BadJson, "Body contained invalid device keys")
|
||||||
|
})?;
|
||||||
|
|
||||||
services()
|
services()
|
||||||
.users
|
.users
|
||||||
.add_device_keys(sender_user, sender_device, device_keys)?;
|
.add_device_keys(sender_user, sender_device, device_keys)?;
|
||||||
|
|||||||
Reference in New Issue
Block a user