2020-09-03 15:36:17 +02:00
|
|
|
/*
|
|
|
|
Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2020-09-04 15:28:22 +02:00
|
|
|
import {MEGOLM_ALGORITHM} from "./common.js";
|
2020-09-03 15:36:17 +02:00
|
|
|
import {groupBy} from "../../utils/groupBy.js";
|
|
|
|
import {makeTxnId} from "../common.js";
|
|
|
|
|
2020-09-03 17:50:28 +02:00
|
|
|
const ENCRYPTED_TYPE = "m.room.encrypted";
|
2020-09-03 15:36:17 +02:00
|
|
|
|
|
|
|
export class RoomEncryption {
|
2020-09-04 16:27:14 +02:00
|
|
|
constructor({room, deviceTracker, olmEncryption, megolmEncryption, megolmDecryption, encryptionParams}) {
|
2020-09-03 15:36:17 +02:00
|
|
|
this._room = room;
|
|
|
|
this._deviceTracker = deviceTracker;
|
|
|
|
this._olmEncryption = olmEncryption;
|
2020-09-03 17:50:28 +02:00
|
|
|
this._megolmEncryption = megolmEncryption;
|
2020-09-04 16:27:14 +02:00
|
|
|
this._megolmDecryption = megolmDecryption;
|
2020-09-03 15:36:17 +02:00
|
|
|
// content of the m.room.encryption event
|
2020-09-03 17:50:28 +02:00
|
|
|
this._encryptionParams = encryptionParams;
|
2020-09-04 12:09:19 +02:00
|
|
|
|
|
|
|
this._megolmBackfillCache = this._megolmDecryption.createSessionCache();
|
|
|
|
this._megolmSyncCache = this._megolmDecryption.createSessionCache();
|
2020-09-04 12:10:12 +02:00
|
|
|
// not `event_id`, but an internal event id passed in to the decrypt methods
|
|
|
|
this._eventIdsByMissingSession = new Map();
|
2020-09-08 10:50:39 +02:00
|
|
|
this._senderDeviceCache = new Map();
|
2020-09-04 12:09:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
notifyTimelineClosed() {
|
|
|
|
// empty the backfill cache when closing the timeline
|
|
|
|
this._megolmBackfillCache.dispose();
|
|
|
|
this._megolmBackfillCache = this._megolmDecryption.createSessionCache();
|
2020-09-08 10:50:39 +02:00
|
|
|
this._senderDeviceCache = new Map(); // purge the sender device cache
|
2020-09-03 15:36:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async writeMemberChanges(memberChanges, txn) {
|
|
|
|
return await this._deviceTracker.writeMemberChanges(this._room, memberChanges, txn);
|
|
|
|
}
|
|
|
|
|
2020-09-08 10:48:11 +02:00
|
|
|
async decrypt(event, isSync, isTimelineOpen, retryData, txn) {
|
2020-09-04 15:28:22 +02:00
|
|
|
if (event.content?.algorithm !== MEGOLM_ALGORITHM) {
|
|
|
|
throw new Error("Unsupported algorithm: " + event.content?.algorithm);
|
2020-09-04 12:10:12 +02:00
|
|
|
}
|
2020-09-04 15:28:22 +02:00
|
|
|
let sessionCache = isSync ? this._megolmSyncCache : this._megolmBackfillCache;
|
2020-09-08 10:48:11 +02:00
|
|
|
const result = await this._megolmDecryption.decrypt(
|
2020-09-04 15:28:22 +02:00
|
|
|
this._room.id, event, sessionCache, txn);
|
2020-09-08 10:48:11 +02:00
|
|
|
if (!result) {
|
2020-09-04 15:28:22 +02:00
|
|
|
this._addMissingSessionEvent(event, isSync, retryData);
|
2020-09-04 12:10:12 +02:00
|
|
|
}
|
2020-09-08 10:50:39 +02:00
|
|
|
if (result && isTimelineOpen) {
|
|
|
|
await this._verifyDecryptionResult(result, txn);
|
|
|
|
}
|
2020-09-08 10:48:11 +02:00
|
|
|
return result;
|
2020-09-04 12:09:19 +02:00
|
|
|
}
|
|
|
|
|
2020-09-08 10:50:39 +02:00
|
|
|
async _verifyDecryptionResult(result, txn) {
|
|
|
|
let device = this._senderDeviceCache.get(result.senderCurve25519Key);
|
|
|
|
if (!device) {
|
|
|
|
device = await this._deviceTracker.getDeviceByCurve25519Key(result.senderCurve25519Key, txn);
|
|
|
|
this._senderDeviceCache.set(result.senderCurve25519Key, device);
|
|
|
|
}
|
|
|
|
if (device) {
|
|
|
|
result.setDevice(device);
|
|
|
|
} else if (!this._room.isTrackingMembers) {
|
|
|
|
result.setRoomNotTrackedYet();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-04 15:28:22 +02:00
|
|
|
_addMissingSessionEvent(event, isSync, data) {
|
2020-09-04 12:10:12 +02:00
|
|
|
const senderKey = event.content?.["sender_key"];
|
|
|
|
const sessionId = event.content?.["session_id"];
|
|
|
|
const key = `${senderKey}|${sessionId}`;
|
|
|
|
let eventIds = this._eventIdsByMissingSession.get(key);
|
|
|
|
if (!eventIds) {
|
2020-09-04 15:28:22 +02:00
|
|
|
eventIds = new Map();
|
2020-09-04 12:10:12 +02:00
|
|
|
this._eventIdsByMissingSession.set(key, eventIds);
|
|
|
|
}
|
2020-09-04 15:28:22 +02:00
|
|
|
eventIds.set(event.event_id, {data, isSync});
|
2020-09-04 12:10:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
applyRoomKeys(roomKeys) {
|
|
|
|
// retry decryption with the new sessions
|
2020-09-04 15:28:22 +02:00
|
|
|
const retryEntries = [];
|
2020-09-04 12:10:12 +02:00
|
|
|
for (const roomKey of roomKeys) {
|
|
|
|
const key = `${roomKey.senderKey}|${roomKey.sessionId}`;
|
2020-09-04 15:28:22 +02:00
|
|
|
const entriesForSession = this._eventIdsByMissingSession.get(key);
|
|
|
|
if (entriesForSession) {
|
2020-09-04 12:10:12 +02:00
|
|
|
this._eventIdsByMissingSession.delete(key);
|
2020-09-04 15:28:22 +02:00
|
|
|
retryEntries.push(...entriesForSession.values());
|
2020-09-04 12:10:12 +02:00
|
|
|
}
|
|
|
|
}
|
2020-09-04 15:28:22 +02:00
|
|
|
return retryEntries;
|
2020-09-04 12:10:12 +02:00
|
|
|
}
|
|
|
|
|
2020-09-03 15:36:17 +02:00
|
|
|
async encrypt(type, content, hsApi) {
|
2020-09-03 17:50:28 +02:00
|
|
|
const megolmResult = await this._megolmEncryption.encrypt(this._room.id, type, content, this._encryptionParams);
|
|
|
|
// share the new megolm session if needed
|
|
|
|
if (megolmResult.roomKeyMessage) {
|
|
|
|
await this._deviceTracker.trackRoom(this._room);
|
|
|
|
const devices = await this._deviceTracker.deviceIdentitiesForTrackedRoom(this._room.id, hsApi);
|
|
|
|
const messages = await this._olmEncryption.encrypt(
|
|
|
|
"m.room_key", megolmResult.roomKeyMessage, devices, hsApi);
|
|
|
|
await this._sendMessagesToDevices(ENCRYPTED_TYPE, messages, hsApi);
|
|
|
|
}
|
|
|
|
return {
|
|
|
|
type: ENCRYPTED_TYPE,
|
|
|
|
content: megolmResult.content
|
|
|
|
};
|
2020-09-03 15:36:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async _sendMessagesToDevices(type, messages, hsApi) {
|
|
|
|
const messagesByUser = groupBy(messages, message => message.device.userId);
|
|
|
|
const payload = {
|
|
|
|
messages: Array.from(messagesByUser.entries()).reduce((userMap, [userId, messages]) => {
|
|
|
|
userMap[userId] = messages.reduce((deviceMap, message) => {
|
|
|
|
deviceMap[message.device.deviceId] = message.content;
|
|
|
|
return deviceMap;
|
|
|
|
}, {});
|
|
|
|
return userMap;
|
|
|
|
}, {})
|
|
|
|
};
|
|
|
|
const txnId = makeTxnId();
|
|
|
|
await hsApi.sendToDevice(type, payload, txnId).response();
|
|
|
|
}
|
|
|
|
}
|