1use std::{
42 collections::{BTreeMap, BTreeSet, HashMap, HashSet},
43 fmt::Debug,
44 ops::Deref,
45 pin::pin,
46 sync::{atomic::Ordering, Arc},
47 time::Duration,
48};
49
50use as_variant::as_variant;
51use futures_core::Stream;
52use futures_util::StreamExt;
53use itertools::{Either, Itertools};
54use ruma::{
55 encryption::KeyUsage, events::secret::request::SecretName, DeviceId, OwnedDeviceId,
56 OwnedUserId, RoomId, UserId,
57};
58use serde::{de::DeserializeOwned, Serialize};
59use thiserror::Error;
60use tokio::sync::{Mutex, Notify, OwnedRwLockWriteGuard, RwLock};
61use tokio_stream::wrappers::errors::BroadcastStreamRecvError;
62use tracing::{info, instrument, trace, warn};
63use types::{RoomKeyBundleInfo, StoredRoomKeyBundleData};
64use vodozemac::{megolm::SessionOrdering, Curve25519PublicKey};
65
66use self::types::{
67 Changes, CrossSigningKeyExport, DeviceChanges, DeviceUpdates, IdentityChanges, IdentityUpdates,
68 PendingChanges, RoomKeyInfo, RoomKeyWithheldInfo, UserKeyQueryResult,
69};
70#[cfg(doc)]
71use crate::{backups::BackupMachine, identities::OwnUserIdentity};
72use crate::{
73 gossiping::GossippedSecret,
74 identities::{user::UserIdentity, Device, DeviceData, UserDevices, UserIdentityData},
75 olm::{
76 Account, ExportedRoomKey, InboundGroupSession, PrivateCrossSigningIdentity, SenderData,
77 Session, StaticAccountData,
78 },
79 store::types::RoomKeyWithheldEntry,
80 types::{
81 BackupSecrets, CrossSigningSecrets, MegolmBackupV1Curve25519AesSha2Secrets, RoomKeyExport,
82 SecretsBundle,
83 },
84 verification::VerificationMachine,
85 CrossSigningStatus, OwnUserIdentityData, RoomKeyImportResult,
86};
87
88pub mod caches;
89mod crypto_store_wrapper;
90mod error;
91mod memorystore;
92mod traits;
93pub mod types;
94
95#[cfg(any(test, feature = "testing"))]
96#[macro_use]
97#[allow(missing_docs)]
98pub mod integration_tests;
99
100pub(crate) use crypto_store_wrapper::CryptoStoreWrapper;
101pub use error::{CryptoStoreError, Result};
102use matrix_sdk_common::{
103 cross_process_lock::{CrossProcessLock, CrossProcessLockGeneration},
104 deserialized_responses::WithheldCode,
105 timeout::timeout,
106};
107pub use memorystore::MemoryStore;
108pub use traits::{CryptoStore, DynCryptoStore, IntoCryptoStore};
109
110use self::caches::{SequenceNumber, StoreCache, StoreCacheGuard, UsersForKeyQuery};
111use crate::types::{
112 events::room_key_withheld::RoomKeyWithheldContent, room_history::RoomKeyBundle,
113};
114pub use crate::{
115 dehydrated_devices::DehydrationError,
116 gossiping::{GossipRequest, SecretInfo},
117};
118
119#[derive(Debug, Clone)]
126pub struct Store {
127 inner: Arc<StoreInner>,
128}
129
130#[derive(Debug, Default)]
131pub(crate) struct KeyQueryManager {
132 users_for_key_query: Mutex<UsersForKeyQuery>,
134
135 users_for_key_query_notify: Notify,
137}
138
139impl KeyQueryManager {
140 pub async fn synced<'a>(&'a self, cache: &'a StoreCache) -> Result<SyncedKeyQueryManager<'a>> {
141 self.ensure_sync_tracked_users(cache).await?;
142 Ok(SyncedKeyQueryManager { cache, manager: self })
143 }
144
145 async fn ensure_sync_tracked_users(&self, cache: &StoreCache) -> Result<()> {
152 let loaded = cache.loaded_tracked_users.read().await;
154 if *loaded {
155 return Ok(());
156 }
157
158 drop(loaded);
160 let mut loaded = cache.loaded_tracked_users.write().await;
161
162 if *loaded {
166 return Ok(());
167 }
168
169 let tracked_users = cache.store.load_tracked_users().await?;
170
171 let mut query_users_lock = self.users_for_key_query.lock().await;
172 let mut tracked_users_cache = cache.tracked_users.write();
173 for user in tracked_users {
174 tracked_users_cache.insert(user.user_id.to_owned());
175
176 if user.dirty {
177 query_users_lock.insert_user(&user.user_id);
178 }
179 }
180
181 *loaded = true;
182
183 Ok(())
184 }
185
186 pub async fn wait_if_user_key_query_pending(
196 &self,
197 cache: StoreCacheGuard,
198 timeout_duration: Duration,
199 user: &UserId,
200 ) -> Result<UserKeyQueryResult> {
201 {
202 self.ensure_sync_tracked_users(&cache).await?;
205 drop(cache);
206 }
207
208 let mut users_for_key_query = self.users_for_key_query.lock().await;
209 let Some(waiter) = users_for_key_query.maybe_register_waiting_task(user) else {
210 return Ok(UserKeyQueryResult::WasNotPending);
211 };
212
213 let wait_for_completion = async {
214 while !waiter.completed.load(Ordering::Relaxed) {
215 let mut notified = pin!(self.users_for_key_query_notify.notified());
219 notified.as_mut().enable();
220 drop(users_for_key_query);
221
222 notified.await;
224
225 users_for_key_query = self.users_for_key_query.lock().await;
229 }
230 };
231
232 match timeout(Box::pin(wait_for_completion), timeout_duration).await {
233 Err(_) => {
234 warn!(
235 user_id = ?user,
236 "The user has a pending `/keys/query` request which did \
237 not finish yet, some devices might be missing."
238 );
239
240 Ok(UserKeyQueryResult::TimeoutExpired)
241 }
242 _ => Ok(UserKeyQueryResult::WasPending),
243 }
244 }
245}
246
247pub(crate) struct SyncedKeyQueryManager<'a> {
248 cache: &'a StoreCache,
249 manager: &'a KeyQueryManager,
250}
251
252impl SyncedKeyQueryManager<'_> {
253 pub async fn update_tracked_users(&self, users: impl Iterator<Item = &UserId>) -> Result<()> {
258 let mut store_updates = Vec::new();
259 let mut key_query_lock = self.manager.users_for_key_query.lock().await;
260
261 {
262 let mut tracked_users = self.cache.tracked_users.write();
263 for user_id in users {
264 if tracked_users.insert(user_id.to_owned()) {
265 key_query_lock.insert_user(user_id);
266 store_updates.push((user_id, true))
267 }
268 }
269 }
270
271 self.cache.store.save_tracked_users(&store_updates).await
272 }
273
274 pub async fn mark_tracked_users_as_changed(
281 &self,
282 users: impl Iterator<Item = &UserId>,
283 ) -> Result<()> {
284 let mut store_updates: Vec<(&UserId, bool)> = Vec::new();
285 let mut key_query_lock = self.manager.users_for_key_query.lock().await;
286
287 {
288 let tracked_users = &self.cache.tracked_users.read();
289 for user_id in users {
290 if tracked_users.contains(user_id) {
291 key_query_lock.insert_user(user_id);
292 store_updates.push((user_id, true));
293 }
294 }
295 }
296
297 self.cache.store.save_tracked_users(&store_updates).await
298 }
299
300 pub async fn mark_tracked_users_as_up_to_date(
306 &self,
307 users: impl Iterator<Item = &UserId>,
308 sequence_number: SequenceNumber,
309 ) -> Result<()> {
310 let mut store_updates: Vec<(&UserId, bool)> = Vec::new();
311 let mut key_query_lock = self.manager.users_for_key_query.lock().await;
312
313 {
314 let tracked_users = self.cache.tracked_users.read();
315 for user_id in users {
316 if tracked_users.contains(user_id) {
317 let clean = key_query_lock.maybe_remove_user(user_id, sequence_number);
318 store_updates.push((user_id, !clean));
319 }
320 }
321 }
322
323 self.cache.store.save_tracked_users(&store_updates).await?;
324 self.manager.users_for_key_query_notify.notify_waiters();
326
327 Ok(())
328 }
329
330 pub async fn users_for_key_query(&self) -> (HashSet<OwnedUserId>, SequenceNumber) {
342 self.manager.users_for_key_query.lock().await.users_for_key_query()
343 }
344
345 pub fn tracked_users(&self) -> HashSet<OwnedUserId> {
347 self.cache.tracked_users.read().iter().cloned().collect()
348 }
349
350 pub async fn mark_user_as_changed(&self, user: &UserId) -> Result<()> {
356 self.manager.users_for_key_query.lock().await.insert_user(user);
357 self.cache.tracked_users.write().insert(user.to_owned());
358
359 self.cache.store.save_tracked_users(&[(user, true)]).await
360 }
361}
362
363fn collect_device_updates(
369 verification_machine: VerificationMachine,
370 own_identity: Option<OwnUserIdentityData>,
371 identities: IdentityChanges,
372 devices: DeviceChanges,
373) -> DeviceUpdates {
374 let mut new: BTreeMap<_, BTreeMap<_, _>> = BTreeMap::new();
375 let mut changed: BTreeMap<_, BTreeMap<_, _>> = BTreeMap::new();
376
377 let (new_identities, changed_identities, unchanged_identities) = identities.into_maps();
378
379 let map_device = |device: DeviceData| {
380 let device_owner_identity = new_identities
381 .get(device.user_id())
382 .or_else(|| changed_identities.get(device.user_id()))
383 .or_else(|| unchanged_identities.get(device.user_id()))
384 .cloned();
385
386 Device {
387 inner: device,
388 verification_machine: verification_machine.to_owned(),
389 own_identity: own_identity.to_owned(),
390 device_owner_identity,
391 }
392 };
393
394 for device in devices.new {
395 let device = map_device(device);
396
397 new.entry(device.user_id().to_owned())
398 .or_default()
399 .insert(device.device_id().to_owned(), device);
400 }
401
402 for device in devices.changed {
403 let device = map_device(device);
404
405 changed
406 .entry(device.user_id().to_owned())
407 .or_default()
408 .insert(device.device_id().to_owned(), device.to_owned());
409 }
410
411 DeviceUpdates { new, changed }
412}
413
414#[allow(missing_debug_implementations)]
416pub struct StoreTransaction {
417 store: Store,
418 changes: PendingChanges,
419 cache: OwnedRwLockWriteGuard<StoreCache>,
421}
422
423impl StoreTransaction {
424 async fn new(store: Store) -> Self {
426 let cache = store.inner.cache.clone();
427
428 Self { store, changes: PendingChanges::default(), cache: cache.clone().write_owned().await }
429 }
430
431 pub(crate) fn cache(&self) -> &StoreCache {
432 &self.cache
433 }
434
435 pub fn store(&self) -> &Store {
437 &self.store
438 }
439
440 pub async fn account(&mut self) -> Result<&mut Account> {
447 if self.changes.account.is_none() {
448 let _ = self.cache.account().await?;
450 self.changes.account = self.cache.account.lock().await.take();
451 }
452 Ok(self.changes.account.as_mut().unwrap())
453 }
454
455 pub async fn commit(self) -> Result<()> {
458 if self.changes.is_empty() {
459 return Ok(());
460 }
461
462 let account = self.changes.account.as_ref().map(|acc| acc.deep_clone());
464
465 self.store.save_pending_changes(self.changes).await?;
466
467 if let Some(account) = account {
469 *self.cache.account.lock().await = Some(account);
470 }
471
472 Ok(())
473 }
474}
475
476#[derive(Debug)]
477struct StoreInner {
478 identity: Arc<Mutex<PrivateCrossSigningIdentity>>,
479 store: Arc<CryptoStoreWrapper>,
480
481 cache: Arc<RwLock<StoreCache>>,
485
486 verification_machine: VerificationMachine,
487
488 static_account: StaticAccountData,
491}
492
493#[derive(Debug, Error)]
496pub enum SecretImportError {
497 #[error("Error while importing {name}: {error}")]
499 Key {
500 name: SecretName,
502 error: vodozemac::KeyError,
504 },
505 #[error(
508 "Error while importing {name}: The public key of the imported private \
509 key doesn't match the public key that was uploaded to the server"
510 )]
511 MismatchedPublicKeys {
512 name: SecretName,
514 },
515 #[error(transparent)]
517 Store(#[from] CryptoStoreError),
518}
519
520#[derive(Debug, Error)]
525pub enum SecretsBundleExportError {
526 #[error(transparent)]
528 Store(#[from] CryptoStoreError),
529 #[error("The store is missing one or multiple cross-signing keys")]
531 MissingCrossSigningKey(KeyUsage),
532 #[error("The store doesn't contain any cross-signing keys")]
534 MissingCrossSigningKeys,
535 #[error("The store contains a backup key, but no backup version")]
538 MissingBackupVersion,
539}
540
541impl Store {
542 pub(crate) fn new(
544 account: StaticAccountData,
545 identity: Arc<Mutex<PrivateCrossSigningIdentity>>,
546 store: Arc<CryptoStoreWrapper>,
547 verification_machine: VerificationMachine,
548 ) -> Self {
549 Self {
550 inner: Arc::new(StoreInner {
551 static_account: account,
552 identity,
553 store: store.clone(),
554 verification_machine,
555 cache: Arc::new(RwLock::new(StoreCache {
556 store,
557 tracked_users: Default::default(),
558 loaded_tracked_users: Default::default(),
559 account: Default::default(),
560 })),
561 }),
562 }
563 }
564
565 pub(crate) fn user_id(&self) -> &UserId {
567 &self.inner.static_account.user_id
568 }
569
570 pub(crate) fn device_id(&self) -> &DeviceId {
572 self.inner.verification_machine.own_device_id()
573 }
574
575 pub(crate) fn static_account(&self) -> &StaticAccountData {
577 &self.inner.static_account
578 }
579
580 pub(crate) async fn cache(&self) -> Result<StoreCacheGuard> {
581 Ok(StoreCacheGuard { cache: self.inner.cache.clone().read_owned().await })
586 }
587
588 pub(crate) async fn transaction(&self) -> StoreTransaction {
589 StoreTransaction::new(self.clone()).await
590 }
591
592 pub(crate) async fn with_transaction<
595 T,
596 Fut: futures_core::Future<Output = Result<(StoreTransaction, T), crate::OlmError>>,
597 F: FnOnce(StoreTransaction) -> Fut,
598 >(
599 &self,
600 func: F,
601 ) -> Result<T, crate::OlmError> {
602 let tr = self.transaction().await;
603 let (tr, res) = func(tr).await?;
604 tr.commit().await?;
605 Ok(res)
606 }
607
608 #[cfg(test)]
609 pub(crate) async fn reset_cross_signing_identity(&self) {
611 self.inner.identity.lock().await.reset();
612 }
613
614 pub(crate) fn private_identity(&self) -> Arc<Mutex<PrivateCrossSigningIdentity>> {
616 self.inner.identity.clone()
617 }
618
619 pub(crate) async fn save_sessions(&self, sessions: &[Session]) -> Result<()> {
621 let changes = Changes { sessions: sessions.to_vec(), ..Default::default() };
622
623 self.save_changes(changes).await
624 }
625
626 pub(crate) async fn get_sessions(
627 &self,
628 sender_key: &str,
629 ) -> Result<Option<Arc<Mutex<Vec<Session>>>>> {
630 self.inner.store.get_sessions(sender_key).await
631 }
632
633 pub(crate) async fn save_changes(&self, changes: Changes) -> Result<()> {
634 self.inner.store.save_changes(changes).await
635 }
636
637 pub(crate) async fn merge_received_group_session(
645 &self,
646 session: InboundGroupSession,
647 ) -> Result<Option<InboundGroupSession>> {
648 let old_session = self
649 .inner
650 .store
651 .get_inbound_group_session(session.room_id(), session.session_id())
652 .await?;
653
654 let Some(old_session) = old_session else {
656 info!("Received a new megolm room key");
657 return Ok(Some(session));
658 };
659
660 let index_comparison = session.compare_ratchet(&old_session).await;
661 let trust_level_comparison =
662 session.sender_data.compare_trust_level(&old_session.sender_data);
663
664 let result = match (index_comparison, trust_level_comparison) {
665 (SessionOrdering::Unconnected, _) => {
666 warn!("Received a group session with an ratchet that does not connect to the one in the store, discarding");
670 None
671 }
672
673 (SessionOrdering::Better, std::cmp::Ordering::Greater)
674 | (SessionOrdering::Better, std::cmp::Ordering::Equal)
675 | (SessionOrdering::Equal, std::cmp::Ordering::Greater) => {
676 info!(
678 ?index_comparison,
679 ?trust_level_comparison,
680 "Received a megolm room key that we have a worse version of, merging"
681 );
682 Some(session)
683 }
684
685 (SessionOrdering::Worse, std::cmp::Ordering::Less)
686 | (SessionOrdering::Worse, std::cmp::Ordering::Equal)
687 | (SessionOrdering::Equal, std::cmp::Ordering::Less) => {
688 warn!(
690 ?index_comparison,
691 ?trust_level_comparison,
692 "Received a megolm room key that we already have a better version \
693 of, discarding"
694 );
695 None
696 }
697
698 (SessionOrdering::Equal, std::cmp::Ordering::Equal) => {
699 info!("Received a megolm room key that we already have, discarding");
701 None
702 }
703
704 (SessionOrdering::Better, std::cmp::Ordering::Less) => {
705 info!("Upgrading a previously-received megolm session with new ratchet");
708 let result = old_session.with_ratchet(&session);
709 result.reset_backup_state();
711 Some(result)
712 }
713
714 (SessionOrdering::Worse, std::cmp::Ordering::Greater) => {
715 info!("Upgrading a previously-received megolm session with new sender data");
718 Some(session.with_ratchet(&old_session))
719 }
720 };
721
722 Ok(result)
723 }
724
725 #[cfg(test)]
726 pub(crate) async fn save_device_data(&self, devices: &[DeviceData]) -> Result<()> {
728 use types::DeviceChanges;
729
730 let changes = Changes {
731 devices: DeviceChanges { changed: devices.to_vec(), ..Default::default() },
732 ..Default::default()
733 };
734
735 self.save_changes(changes).await
736 }
737
738 pub(crate) async fn save_inbound_group_sessions(
740 &self,
741 sessions: &[InboundGroupSession],
742 ) -> Result<()> {
743 let changes = Changes { inbound_group_sessions: sessions.to_vec(), ..Default::default() };
744
745 self.save_changes(changes).await
746 }
747
748 pub(crate) async fn device_display_name(&self) -> Result<Option<String>, CryptoStoreError> {
750 Ok(self
751 .inner
752 .store
753 .get_device(self.user_id(), self.device_id())
754 .await?
755 .and_then(|d| d.display_name().map(|d| d.to_owned())))
756 }
757
758 pub(crate) async fn get_device_data(
763 &self,
764 user_id: &UserId,
765 device_id: &DeviceId,
766 ) -> Result<Option<DeviceData>> {
767 self.inner.store.get_device(user_id, device_id).await
768 }
769
770 pub(crate) async fn get_device_data_for_user_filtered(
778 &self,
779 user_id: &UserId,
780 ) -> Result<HashMap<OwnedDeviceId, DeviceData>> {
781 self.inner.store.get_user_devices(user_id).await.map(|mut d| {
782 if user_id == self.user_id() {
783 d.remove(self.device_id());
784 }
785 d
786 })
787 }
788
789 pub(crate) async fn get_device_data_for_user(
798 &self,
799 user_id: &UserId,
800 ) -> Result<HashMap<OwnedDeviceId, DeviceData>> {
801 self.inner.store.get_user_devices(user_id).await
802 }
803
804 pub(crate) async fn get_device_from_curve_key(
810 &self,
811 user_id: &UserId,
812 curve_key: Curve25519PublicKey,
813 ) -> Result<Option<Device>> {
814 self.get_user_devices(user_id)
815 .await
816 .map(|d| d.devices().find(|d| d.curve25519_key() == Some(curve_key)))
817 }
818
819 pub(crate) async fn get_user_devices(&self, user_id: &UserId) -> Result<UserDevices> {
829 let devices = self.get_device_data_for_user(user_id).await?;
830
831 let own_identity = self
832 .inner
833 .store
834 .get_user_identity(self.user_id())
835 .await?
836 .and_then(|i| i.own().cloned());
837 let device_owner_identity = self.inner.store.get_user_identity(user_id).await?;
838
839 Ok(UserDevices {
840 inner: devices,
841 verification_machine: self.inner.verification_machine.clone(),
842 own_identity,
843 device_owner_identity,
844 })
845 }
846
847 pub(crate) async fn get_device(
857 &self,
858 user_id: &UserId,
859 device_id: &DeviceId,
860 ) -> Result<Option<Device>> {
861 if let Some(device_data) = self.inner.store.get_device(user_id, device_id).await? {
862 Ok(Some(self.wrap_device_data(device_data).await?))
863 } else {
864 Ok(None)
865 }
866 }
867
868 pub(crate) async fn wrap_device_data(&self, device_data: DeviceData) -> Result<Device> {
873 let own_identity = self
874 .inner
875 .store
876 .get_user_identity(self.user_id())
877 .await?
878 .and_then(|i| i.own().cloned());
879
880 let device_owner_identity =
881 self.inner.store.get_user_identity(device_data.user_id()).await?;
882
883 Ok(Device {
884 inner: device_data,
885 verification_machine: self.inner.verification_machine.clone(),
886 own_identity,
887 device_owner_identity,
888 })
889 }
890
891 pub(crate) async fn get_identity(&self, user_id: &UserId) -> Result<Option<UserIdentity>> {
893 let own_identity = self
894 .inner
895 .store
896 .get_user_identity(self.user_id())
897 .await?
898 .and_then(as_variant!(UserIdentityData::Own));
899
900 Ok(self.inner.store.get_user_identity(user_id).await?.map(|i| {
901 UserIdentity::new(
902 self.clone(),
903 i,
904 self.inner.verification_machine.to_owned(),
905 own_identity,
906 )
907 }))
908 }
909
910 pub async fn export_secret(
919 &self,
920 secret_name: &SecretName,
921 ) -> Result<Option<String>, CryptoStoreError> {
922 Ok(match secret_name {
923 SecretName::CrossSigningMasterKey
924 | SecretName::CrossSigningUserSigningKey
925 | SecretName::CrossSigningSelfSigningKey => {
926 self.inner.identity.lock().await.export_secret(secret_name).await
927 }
928 SecretName::RecoveryKey => {
929 if let Some(key) = self.load_backup_keys().await?.decryption_key {
930 let exported = key.to_base64();
931 Some(exported)
932 } else {
933 None
934 }
935 }
936 name => {
937 warn!(secret = ?name, "Unknown secret was requested");
938 None
939 }
940 })
941 }
942
943 pub async fn export_cross_signing_keys(
951 &self,
952 ) -> Result<Option<CrossSigningKeyExport>, CryptoStoreError> {
953 let master_key = self.export_secret(&SecretName::CrossSigningMasterKey).await?;
954 let self_signing_key = self.export_secret(&SecretName::CrossSigningSelfSigningKey).await?;
955 let user_signing_key = self.export_secret(&SecretName::CrossSigningUserSigningKey).await?;
956
957 Ok(if master_key.is_none() && self_signing_key.is_none() && user_signing_key.is_none() {
958 None
959 } else {
960 Some(CrossSigningKeyExport { master_key, self_signing_key, user_signing_key })
961 })
962 }
963
964 pub async fn import_cross_signing_keys(
969 &self,
970 export: CrossSigningKeyExport,
971 ) -> Result<CrossSigningStatus, SecretImportError> {
972 if let Some(public_identity) =
973 self.get_identity(self.user_id()).await?.and_then(|i| i.own())
974 {
975 let identity = self.inner.identity.lock().await;
976
977 identity
978 .import_secrets(
979 public_identity.to_owned(),
980 export.master_key.as_deref(),
981 export.self_signing_key.as_deref(),
982 export.user_signing_key.as_deref(),
983 )
984 .await?;
985
986 let status = identity.status().await;
987
988 let diff = identity.get_public_identity_diff(&public_identity.inner).await;
989
990 let mut changes =
991 Changes { private_identity: Some(identity.clone()), ..Default::default() };
992
993 if diff.none_differ() {
994 public_identity.mark_as_verified();
995 changes.identities.changed.push(UserIdentityData::Own(public_identity.inner));
996 }
997
998 info!(?status, "Successfully imported the private cross-signing keys");
999
1000 self.save_changes(changes).await?;
1001 } else {
1002 warn!(
1003 "No public identity found while importing cross-signing keys, \
1004 a /keys/query needs to be done"
1005 );
1006 }
1007
1008 Ok(self.inner.identity.lock().await.status().await)
1009 }
1010
1011 pub async fn export_secrets_bundle(&self) -> Result<SecretsBundle, SecretsBundleExportError> {
1023 let Some(cross_signing) = self.export_cross_signing_keys().await? else {
1024 return Err(SecretsBundleExportError::MissingCrossSigningKeys);
1025 };
1026
1027 let Some(master_key) = cross_signing.master_key.clone() else {
1028 return Err(SecretsBundleExportError::MissingCrossSigningKey(KeyUsage::Master));
1029 };
1030
1031 let Some(user_signing_key) = cross_signing.user_signing_key.clone() else {
1032 return Err(SecretsBundleExportError::MissingCrossSigningKey(KeyUsage::UserSigning));
1033 };
1034
1035 let Some(self_signing_key) = cross_signing.self_signing_key.clone() else {
1036 return Err(SecretsBundleExportError::MissingCrossSigningKey(KeyUsage::SelfSigning));
1037 };
1038
1039 let backup_keys = self.load_backup_keys().await?;
1040
1041 let backup = if let Some(key) = backup_keys.decryption_key {
1042 if let Some(backup_version) = backup_keys.backup_version {
1043 Some(BackupSecrets::MegolmBackupV1Curve25519AesSha2(
1044 MegolmBackupV1Curve25519AesSha2Secrets { key, backup_version },
1045 ))
1046 } else {
1047 return Err(SecretsBundleExportError::MissingBackupVersion);
1048 }
1049 } else {
1050 None
1051 };
1052
1053 Ok(SecretsBundle {
1054 cross_signing: CrossSigningSecrets { master_key, user_signing_key, self_signing_key },
1055 backup,
1056 })
1057 }
1058
1059 pub async fn import_secrets_bundle(
1072 &self,
1073 bundle: &SecretsBundle,
1074 ) -> Result<(), SecretImportError> {
1075 let mut changes = Changes::default();
1076
1077 if let Some(backup_bundle) = &bundle.backup {
1078 match backup_bundle {
1079 BackupSecrets::MegolmBackupV1Curve25519AesSha2(bundle) => {
1080 changes.backup_decryption_key = Some(bundle.key.clone());
1081 changes.backup_version = Some(bundle.backup_version.clone());
1082 }
1083 }
1084 }
1085
1086 let identity = self.inner.identity.lock().await;
1087
1088 identity
1089 .import_secrets_unchecked(
1090 Some(&bundle.cross_signing.master_key),
1091 Some(&bundle.cross_signing.self_signing_key),
1092 Some(&bundle.cross_signing.user_signing_key),
1093 )
1094 .await?;
1095
1096 let public_identity = identity.to_public_identity().await.expect(
1097 "We should be able to create a new public identity since we just imported \
1098 all the private cross-signing keys",
1099 );
1100
1101 changes.private_identity = Some(identity.clone());
1102 changes.identities.new.push(UserIdentityData::Own(public_identity));
1103
1104 Ok(self.save_changes(changes).await?)
1105 }
1106
1107 pub async fn import_secret(&self, secret: &GossippedSecret) -> Result<(), SecretImportError> {
1109 match &secret.secret_name {
1110 SecretName::CrossSigningMasterKey
1111 | SecretName::CrossSigningUserSigningKey
1112 | SecretName::CrossSigningSelfSigningKey => {
1113 if let Some(public_identity) =
1114 self.get_identity(self.user_id()).await?.and_then(|i| i.own())
1115 {
1116 let identity = self.inner.identity.lock().await;
1117
1118 identity
1119 .import_secret(
1120 public_identity,
1121 &secret.secret_name,
1122 &secret.event.content.secret,
1123 )
1124 .await?;
1125 info!(
1126 secret_name = ?secret.secret_name,
1127 "Successfully imported a private cross signing key"
1128 );
1129
1130 let changes =
1131 Changes { private_identity: Some(identity.clone()), ..Default::default() };
1132
1133 self.save_changes(changes).await?;
1134 }
1135 }
1136 SecretName::RecoveryKey => {
1137 }
1143 name => {
1144 warn!(secret = ?name, "Tried to import an unknown secret");
1145 }
1146 }
1147
1148 Ok(())
1149 }
1150
1151 pub async fn get_only_allow_trusted_devices(&self) -> Result<bool> {
1154 let value = self.get_value("only_allow_trusted_devices").await?.unwrap_or_default();
1155 Ok(value)
1156 }
1157
1158 pub async fn set_only_allow_trusted_devices(
1161 &self,
1162 block_untrusted_devices: bool,
1163 ) -> Result<()> {
1164 self.set_value("only_allow_trusted_devices", &block_untrusted_devices).await
1165 }
1166
1167 pub async fn get_value<T: DeserializeOwned>(&self, key: &str) -> Result<Option<T>> {
1169 let Some(value) = self.get_custom_value(key).await? else {
1170 return Ok(None);
1171 };
1172 let deserialized = self.deserialize_value(&value)?;
1173 Ok(Some(deserialized))
1174 }
1175
1176 pub async fn set_value(&self, key: &str, value: &impl Serialize) -> Result<()> {
1178 let serialized = self.serialize_value(value)?;
1179 self.set_custom_value(key, serialized).await?;
1180 Ok(())
1181 }
1182
1183 fn serialize_value(&self, value: &impl Serialize) -> Result<Vec<u8>> {
1184 let serialized =
1185 rmp_serde::to_vec_named(value).map_err(|x| CryptoStoreError::Backend(x.into()))?;
1186 Ok(serialized)
1187 }
1188
1189 fn deserialize_value<T: DeserializeOwned>(&self, value: &[u8]) -> Result<T> {
1190 let deserialized =
1191 rmp_serde::from_slice(value).map_err(|e| CryptoStoreError::Backend(e.into()))?;
1192 Ok(deserialized)
1193 }
1194
1195 pub fn room_keys_received_stream(
1207 &self,
1208 ) -> impl Stream<Item = Result<Vec<RoomKeyInfo>, BroadcastStreamRecvError>> + use<> {
1209 self.inner.store.room_keys_received_stream()
1210 }
1211
1212 pub fn room_keys_withheld_received_stream(
1221 &self,
1222 ) -> impl Stream<Item = Vec<RoomKeyWithheldInfo>> + use<> {
1223 self.inner.store.room_keys_withheld_received_stream()
1224 }
1225
1226 pub fn user_identities_stream(&self) -> impl Stream<Item = IdentityUpdates> + use<> {
1257 let verification_machine = self.inner.verification_machine.to_owned();
1258
1259 let this = self.clone();
1260 self.inner.store.identities_stream().map(move |(own_identity, identities, _)| {
1261 let (new_identities, changed_identities, unchanged_identities) = identities.into_maps();
1262
1263 let map_identity = |(user_id, identity)| {
1264 (
1265 user_id,
1266 UserIdentity::new(
1267 this.clone(),
1268 identity,
1269 verification_machine.to_owned(),
1270 own_identity.to_owned(),
1271 ),
1272 )
1273 };
1274
1275 let new = new_identities.into_iter().map(map_identity).collect();
1276 let changed = changed_identities.into_iter().map(map_identity).collect();
1277 let unchanged = unchanged_identities.into_iter().map(map_identity).collect();
1278
1279 IdentityUpdates { new, changed, unchanged }
1280 })
1281 }
1282
1283 pub fn devices_stream(&self) -> impl Stream<Item = DeviceUpdates> + use<> {
1315 let verification_machine = self.inner.verification_machine.to_owned();
1316
1317 self.inner.store.identities_stream().map(move |(own_identity, identities, devices)| {
1318 collect_device_updates(
1319 verification_machine.to_owned(),
1320 own_identity,
1321 identities,
1322 devices,
1323 )
1324 })
1325 }
1326
1327 pub fn identities_stream_raw(
1337 &self,
1338 ) -> impl Stream<Item = (IdentityChanges, DeviceChanges)> + use<> {
1339 self.inner.store.identities_stream().map(|(_, identities, devices)| (identities, devices))
1340 }
1341
1342 pub fn create_store_lock(
1345 &self,
1346 lock_key: String,
1347 lock_value: String,
1348 ) -> CrossProcessLock<LockableCryptoStore> {
1349 self.inner.store.create_store_lock(lock_key, lock_value)
1350 }
1351
1352 pub fn secrets_stream(&self) -> impl Stream<Item = GossippedSecret> + use<> {
1392 self.inner.store.secrets_stream()
1393 }
1394
1395 pub fn historic_room_key_stream(&self) -> impl Stream<Item = RoomKeyBundleInfo> + use<> {
1435 self.inner.store.historic_room_key_stream()
1436 }
1437
1438 pub async fn import_room_keys(
1451 &self,
1452 exported_keys: Vec<ExportedRoomKey>,
1453 from_backup_version: Option<&str>,
1454 progress_listener: impl Fn(usize, usize),
1455 ) -> Result<RoomKeyImportResult> {
1456 let exported_keys: Vec<&ExportedRoomKey> = exported_keys.iter().collect();
1457 self.import_sessions_impl(exported_keys, from_backup_version, progress_listener).await
1458 }
1459
1460 pub async fn import_exported_room_keys(
1487 &self,
1488 exported_keys: Vec<ExportedRoomKey>,
1489 progress_listener: impl Fn(usize, usize),
1490 ) -> Result<RoomKeyImportResult> {
1491 self.import_room_keys(exported_keys, None, progress_listener).await
1492 }
1493
1494 async fn import_sessions_impl<T>(
1495 &self,
1496 room_keys: Vec<T>,
1497 from_backup_version: Option<&str>,
1498 progress_listener: impl Fn(usize, usize),
1499 ) -> Result<RoomKeyImportResult>
1500 where
1501 T: TryInto<InboundGroupSession> + RoomKeyExport + Copy,
1502 T::Error: Debug,
1503 {
1504 let mut sessions = Vec::new();
1505
1506 let total_count = room_keys.len();
1507 let mut keys = BTreeMap::new();
1508
1509 for (i, key) in room_keys.into_iter().enumerate() {
1510 match key.try_into() {
1511 Ok(session) => {
1512 if let Some(merged) = self.merge_received_group_session(session).await? {
1515 if from_backup_version.is_some() {
1516 merged.mark_as_backed_up();
1517 }
1518
1519 keys.entry(merged.room_id().to_owned())
1520 .or_insert_with(BTreeMap::new)
1521 .entry(merged.sender_key().to_base64())
1522 .or_insert_with(BTreeSet::new)
1523 .insert(merged.session_id().to_owned());
1524
1525 sessions.push(merged);
1526 }
1527 }
1528 Err(e) => {
1529 warn!(
1530 sender_key = key.sender_key().to_base64(),
1531 room_id = ?key.room_id(),
1532 session_id = key.session_id(),
1533 error = ?e,
1534 "Couldn't import a room key from a file export."
1535 );
1536 }
1537 }
1538
1539 progress_listener(i, total_count);
1540 }
1541
1542 let imported_count = sessions.len();
1543
1544 self.inner.store.save_inbound_group_sessions(sessions, from_backup_version).await?;
1545
1546 info!(total_count, imported_count, room_keys = ?keys, "Successfully imported room keys");
1547
1548 Ok(RoomKeyImportResult::new(imported_count, total_count, keys))
1549 }
1550
1551 pub(crate) fn crypto_store(&self) -> Arc<CryptoStoreWrapper> {
1552 self.inner.store.clone()
1553 }
1554
1555 pub async fn export_room_keys(
1578 &self,
1579 predicate: impl FnMut(&InboundGroupSession) -> bool,
1580 ) -> Result<Vec<ExportedRoomKey>> {
1581 let mut exported = Vec::new();
1582
1583 let mut sessions = self.get_inbound_group_sessions().await?;
1584 sessions.retain(predicate);
1585
1586 for session in sessions {
1587 let export = session.export().await;
1588 exported.push(export);
1589 }
1590
1591 Ok(exported)
1592 }
1593
1594 pub async fn export_room_keys_stream(
1627 &self,
1628 predicate: impl FnMut(&InboundGroupSession) -> bool,
1629 ) -> Result<impl Stream<Item = ExportedRoomKey>> {
1630 let sessions = self.get_inbound_group_sessions().await?;
1632 Ok(futures_util::stream::iter(sessions.into_iter().filter(predicate))
1633 .then(|session| async move { session.export().await }))
1634 }
1635
1636 pub async fn build_room_key_bundle(
1641 &self,
1642 room_id: &RoomId,
1643 ) -> std::result::Result<RoomKeyBundle, CryptoStoreError> {
1644 let sessions = self.get_inbound_group_sessions_by_room_id(room_id).await?;
1645
1646 let mut bundle = RoomKeyBundle::default();
1647 for session in sessions {
1648 if session.shared_history() {
1649 bundle.room_keys.push(session.export().await.into());
1650 } else {
1651 bundle.withheld.push(RoomKeyWithheldContent::new(
1652 session.algorithm().to_owned(),
1653 WithheldCode::HistoryNotShared,
1654 session.room_id().to_owned(),
1655 session.session_id().to_owned(),
1656 session.sender_key().to_owned(),
1657 self.device_id().to_owned(),
1658 ));
1659 }
1660 }
1661
1662 let withhelds = self.get_withheld_sessions_by_room_id(room_id).await?;
1665 for withheld in withhelds {
1666 if withheld.content.withheld_code() == WithheldCode::HistoryNotShared {
1667 bundle.withheld.push(withheld.content);
1668 }
1669 }
1670
1671 Ok(bundle)
1672 }
1673
1674 #[instrument(skip(self, bundle, progress_listener), fields(bundle_size = bundle.room_keys.len(), sender_data))]
1684 pub async fn receive_room_key_bundle(
1685 &self,
1686 bundle_info: &StoredRoomKeyBundleData,
1687 bundle: RoomKeyBundle,
1688 progress_listener: impl Fn(usize, usize),
1689 ) -> Result<(), CryptoStoreError> {
1690 let sender_data = if bundle_info.sender_data.should_recalculate() {
1691 let device = self
1692 .get_device_from_curve_key(&bundle_info.sender_user, bundle_info.sender_key)
1693 .await?;
1694
1695 device
1696 .as_ref()
1697 .map(SenderData::from_device)
1698 .unwrap_or_else(|| bundle_info.sender_data.clone())
1699 } else {
1700 bundle_info.sender_data.clone()
1701 };
1702
1703 tracing::Span::current().record("sender_data", tracing::field::debug(&sender_data));
1704
1705 if matches!(
1706 &sender_data,
1707 SenderData::UnknownDevice { .. }
1708 | SenderData::VerificationViolation(_)
1709 | SenderData::DeviceInfo { .. }
1710 ) {
1711 warn!(
1712 "Not accepting a historic room key bundle due to insufficient trust in the sender"
1713 );
1714 return Ok(());
1715 }
1716
1717 self.import_room_key_bundle_sessions(bundle_info, &bundle, progress_listener).await?;
1718 self.import_room_key_bundle_withheld_info(bundle_info, &bundle).await?;
1719
1720 Ok(())
1721 }
1722
1723 async fn import_room_key_bundle_sessions(
1724 &self,
1725 bundle_info: &StoredRoomKeyBundleData,
1726 bundle: &RoomKeyBundle,
1727 progress_listener: impl Fn(usize, usize),
1728 ) -> Result<(), CryptoStoreError> {
1729 let (good, bad): (Vec<_>, Vec<_>) = bundle.room_keys.iter().partition_map(|key| {
1730 if key.room_id != bundle_info.bundle_data.room_id {
1731 trace!("Ignoring key for incorrect room {} in bundle", key.room_id);
1732 Either::Right(key)
1733 } else {
1734 Either::Left(key)
1735 }
1736 });
1737
1738 match (bad.is_empty(), good.is_empty()) {
1739 (true, true) => {
1741 warn!("Received a completely empty room key bundle");
1742 }
1743
1744 (false, true) => {
1746 let bad_keys: Vec<_> =
1747 bad.iter().map(|&key| (&key.room_id, &key.session_id)).collect();
1748
1749 warn!(
1750 ?bad_keys,
1751 "Received a room key bundle for the wrong room, ignoring all room keys from the bundle"
1752 );
1753 }
1754
1755 (_, false) => {
1757 if !bad.is_empty() {
1760 warn!(
1761 bad_key_count = bad.len(),
1762 "The room key bundle contained some room keys \
1763 that were meant for a different room"
1764 );
1765 }
1766
1767 self.import_sessions_impl(good, None, progress_listener).await?;
1768 }
1769 }
1770
1771 Ok(())
1772 }
1773
1774 async fn import_room_key_bundle_withheld_info(
1775 &self,
1776 bundle_info: &StoredRoomKeyBundleData,
1777 bundle: &RoomKeyBundle,
1778 ) -> Result<(), CryptoStoreError> {
1779 let mut session_id_to_withheld_code_map = BTreeMap::new();
1780
1781 let mut changes = Changes::default();
1782 for withheld in &bundle.withheld {
1783 let (room_id, session_id) = match withheld {
1784 RoomKeyWithheldContent::MegolmV1AesSha2(c) => match (c.room_id(), c.session_id()) {
1785 (Some(room_id), Some(session_id)) => (room_id, session_id),
1786 _ => continue,
1787 },
1788 #[cfg(feature = "experimental-algorithms")]
1789 RoomKeyWithheldContent::MegolmV2AesSha2(c) => match (c.room_id(), c.session_id()) {
1790 (Some(room_id), Some(session_id)) => (room_id, session_id),
1791 _ => continue,
1792 },
1793 RoomKeyWithheldContent::Unknown(_) => continue,
1794 };
1795
1796 if room_id != bundle_info.bundle_data.room_id {
1797 trace!("Ignoring withheld info for incorrect room {} in bundle", room_id);
1798 continue;
1799 }
1800
1801 changes.withheld_session_info.entry(room_id.to_owned()).or_default().insert(
1802 session_id.to_owned(),
1803 RoomKeyWithheldEntry {
1804 sender: bundle_info.sender_user.clone(),
1805 content: withheld.to_owned(),
1806 },
1807 );
1808 session_id_to_withheld_code_map.insert(session_id, withheld.withheld_code());
1809 }
1810
1811 self.save_changes(changes).await?;
1812
1813 info!(
1814 room_id = ?bundle_info.bundle_data.room_id,
1815 ?session_id_to_withheld_code_map,
1816 "Successfully imported withheld info from room key bundle",
1817 );
1818
1819 Ok(())
1820 }
1821}
1822
1823impl Deref for Store {
1824 type Target = DynCryptoStore;
1825
1826 fn deref(&self) -> &Self::Target {
1827 self.inner.store.deref().deref()
1828 }
1829}
1830
1831#[derive(Clone, Debug)]
1833pub struct LockableCryptoStore(Arc<dyn CryptoStore<Error = CryptoStoreError>>);
1834
1835impl matrix_sdk_common::cross_process_lock::TryLock for LockableCryptoStore {
1836 type LockError = CryptoStoreError;
1837
1838 async fn try_lock(
1839 &self,
1840 lease_duration_ms: u32,
1841 key: &str,
1842 holder: &str,
1843 ) -> std::result::Result<Option<CrossProcessLockGeneration>, Self::LockError> {
1844 self.0.try_take_leased_lock(lease_duration_ms, key, holder).await
1845 }
1846}
1847
1848#[cfg(test)]
1849mod tests {
1850 use std::{collections::BTreeMap, pin::pin};
1851
1852 use assert_matches2::{assert_let, assert_matches};
1853 use futures_util::StreamExt;
1854 use insta::{_macro_support::Content, assert_json_snapshot, internals::ContentPath};
1855 use matrix_sdk_test::async_test;
1856 use ruma::{
1857 device_id,
1858 events::room::{EncryptedFileInit, JsonWebKeyInit},
1859 owned_device_id, owned_mxc_uri, room_id,
1860 serde::Base64,
1861 user_id, RoomId,
1862 };
1863 use serde_json::json;
1864 use vodozemac::{megolm::SessionKey, Ed25519Keypair};
1865
1866 use crate::{
1867 machine::test_helpers::get_machine_pair,
1868 olm::{InboundGroupSession, SenderData},
1869 store::types::{DehydratedDeviceKey, RoomKeyWithheldEntry, StoredRoomKeyBundleData},
1870 types::{
1871 events::{
1872 room_key_bundle::RoomKeyBundleContent,
1873 room_key_withheld::{MegolmV1AesSha2WithheldContent, RoomKeyWithheldContent},
1874 },
1875 EventEncryptionAlgorithm,
1876 },
1877 Account, OlmMachine,
1878 };
1879
1880 #[async_test]
1881 async fn test_merge_received_group_session() {
1882 let alice_account = Account::with_device_id(user_id!("@a:s.co"), device_id!("ABC"));
1883 let bob = OlmMachine::new(user_id!("@b:s.co"), device_id!("DEF")).await;
1884
1885 let room_id = room_id!("!test:localhost");
1886
1887 let megolm_signing_key = Ed25519Keypair::new();
1888 let inbound = make_inbound_group_session(&alice_account, &megolm_signing_key, room_id);
1889
1890 let mut inbound_at_index_5 =
1892 InboundGroupSession::from_export(&inbound.export_at_index(5).await).unwrap();
1893 inbound_at_index_5.sender_data = inbound.sender_data.clone();
1894 bob.store().save_inbound_group_sessions(&[inbound_at_index_5.clone()]).await.unwrap();
1895
1896 let disconnected = make_inbound_group_session(&alice_account, &megolm_signing_key, room_id);
1898 assert_eq!(bob.store().merge_received_group_session(disconnected).await.unwrap(), None);
1899
1900 let mut worse =
1902 InboundGroupSession::from_export(&inbound.export_at_index(10).await).unwrap();
1903 worse.sender_data = inbound.sender_data.clone();
1904 assert_eq!(bob.store().merge_received_group_session(worse).await.unwrap(), None);
1905
1906 let mut copy = InboundGroupSession::from_pickle(inbound_at_index_5.pickle().await).unwrap();
1908 copy.sender_data = inbound.sender_data.clone();
1909 assert_eq!(bob.store().merge_received_group_session(copy).await.unwrap(), None);
1910
1911 let mut better =
1913 InboundGroupSession::from_export(&inbound.export_at_index(0).await).unwrap();
1914 better.sender_data = inbound.sender_data.clone();
1915 assert_let!(Some(update) = bob.store().merge_received_group_session(better).await.unwrap());
1916 assert_eq!(update.first_known_index(), 0);
1917
1918 {
1920 let mut worse_ratchet_better_trust =
1921 InboundGroupSession::from_export(&inbound.export_at_index(10).await).unwrap();
1922 let updated_sender_data = SenderData::sender_verified(
1923 alice_account.user_id(),
1924 alice_account.device_id(),
1925 Ed25519Keypair::new().public_key(),
1926 );
1927 worse_ratchet_better_trust.sender_data = updated_sender_data.clone();
1928 assert_let!(
1929 Some(update) = bob
1930 .store()
1931 .merge_received_group_session(worse_ratchet_better_trust)
1932 .await
1933 .unwrap()
1934 );
1935 assert_eq!(update.sender_data, updated_sender_data);
1936 assert_eq!(update.first_known_index(), 5);
1937 assert_eq!(
1938 update.export_at_index(0).await.session_key.to_bytes(),
1939 inbound.export_at_index(5).await.session_key.to_bytes()
1940 );
1941 }
1942
1943 {
1945 let mut better_ratchet_worse_trust =
1946 InboundGroupSession::from_export(&inbound.export_at_index(0).await).unwrap();
1947 let updated_sender_data = SenderData::unknown();
1948 better_ratchet_worse_trust.sender_data = updated_sender_data.clone();
1949 assert_let!(
1950 Some(update) = bob
1951 .store()
1952 .merge_received_group_session(better_ratchet_worse_trust)
1953 .await
1954 .unwrap()
1955 );
1956 assert_eq!(update.sender_data, inbound.sender_data);
1957 assert_eq!(update.first_known_index(), 0);
1958 assert_eq!(
1959 update.export_at_index(0).await.session_key.to_bytes(),
1960 inbound.export_at_index(0).await.session_key.to_bytes()
1961 );
1962 }
1963 }
1964
1965 fn make_inbound_group_session(
1968 sender_account: &Account,
1969 signing_key: &Ed25519Keypair,
1970 room_id: &RoomId,
1971 ) -> InboundGroupSession {
1972 InboundGroupSession::new(
1973 sender_account.identity_keys.curve25519,
1974 sender_account.identity_keys.ed25519,
1975 room_id,
1976 &make_session_key(signing_key),
1977 SenderData::device_info(crate::types::DeviceKeys::new(
1978 sender_account.user_id().to_owned(),
1979 sender_account.device_id().to_owned(),
1980 vec![],
1981 BTreeMap::new(),
1982 crate::types::Signatures::new(),
1983 )),
1984 EventEncryptionAlgorithm::MegolmV1AesSha2,
1985 Some(ruma::events::room::history_visibility::HistoryVisibility::Shared),
1986 true,
1987 )
1988 .unwrap()
1989 }
1990
1991 fn make_session_key(signing_key: &Ed25519Keypair) -> SessionKey {
1994 use rand::Rng;
1995
1996 let mut session_key_bytes = vec![0u8; 229];
2001 session_key_bytes[0] = 2;
2003 rand::thread_rng().fill(&mut session_key_bytes[5..133]);
2006 session_key_bytes[133..165].copy_from_slice(signing_key.public_key().as_bytes());
2008 let sig = signing_key.sign(&session_key_bytes[0..165]);
2010 session_key_bytes[165..229].copy_from_slice(&sig.to_bytes());
2011
2012 SessionKey::from_bytes(&session_key_bytes).unwrap()
2013 }
2014
2015 #[async_test]
2016 async fn test_import_room_keys_notifies_stream() {
2017 use futures_util::FutureExt;
2018
2019 let (alice, bob, _) =
2020 get_machine_pair(user_id!("@a:s.co"), user_id!("@b:s.co"), false).await;
2021
2022 let room1_id = room_id!("!room1:localhost");
2023 alice.create_outbound_group_session_with_defaults_test_helper(room1_id).await.unwrap();
2024 let exported_sessions = alice.store().export_room_keys(|_| true).await.unwrap();
2025
2026 let mut room_keys_received_stream = Box::pin(bob.store().room_keys_received_stream());
2027 bob.store().import_room_keys(exported_sessions, None, |_, _| {}).await.unwrap();
2028
2029 let room_keys = room_keys_received_stream
2030 .next()
2031 .now_or_never()
2032 .flatten()
2033 .expect("We should have received an update of room key infos")
2034 .unwrap();
2035 assert_eq!(room_keys.len(), 1);
2036 assert_eq!(room_keys[0].room_id, "!room1:localhost");
2037 }
2038
2039 #[async_test]
2040 async fn test_export_room_keys_provides_selected_keys() {
2041 let (alice, _, _) = get_machine_pair(user_id!("@a:s.co"), user_id!("@b:s.co"), false).await;
2043 let room1_id = room_id!("!room1:localhost");
2044 let room2_id = room_id!("!room2:localhost");
2045 let room3_id = room_id!("!room3:localhost");
2046 alice.create_outbound_group_session_with_defaults_test_helper(room1_id).await.unwrap();
2047 alice.create_outbound_group_session_with_defaults_test_helper(room2_id).await.unwrap();
2048 alice.create_outbound_group_session_with_defaults_test_helper(room3_id).await.unwrap();
2049
2050 let keys = alice
2052 .store()
2053 .export_room_keys(|s| s.room_id() == room2_id || s.room_id() == room3_id)
2054 .await
2055 .unwrap();
2056
2057 assert_eq!(keys.len(), 2);
2059 assert_eq!(keys[0].algorithm, EventEncryptionAlgorithm::MegolmV1AesSha2);
2060 assert_eq!(keys[1].algorithm, EventEncryptionAlgorithm::MegolmV1AesSha2);
2061 assert_eq!(keys[0].room_id, "!room2:localhost");
2062 assert_eq!(keys[1].room_id, "!room3:localhost");
2063 assert_eq!(keys[0].session_key.to_base64().len(), 220);
2064 assert_eq!(keys[1].session_key.to_base64().len(), 220);
2065 }
2066
2067 #[async_test]
2068 async fn test_export_room_keys_stream_can_provide_all_keys() {
2069 let (alice, _, _) = get_machine_pair(user_id!("@a:s.co"), user_id!("@b:s.co"), false).await;
2071 let room1_id = room_id!("!room1:localhost");
2072 let room2_id = room_id!("!room2:localhost");
2073 alice.create_outbound_group_session_with_defaults_test_helper(room1_id).await.unwrap();
2074 alice.create_outbound_group_session_with_defaults_test_helper(room2_id).await.unwrap();
2075
2076 let mut keys = pin!(alice.store().export_room_keys_stream(|_| true).await.unwrap());
2078
2079 let mut collected = vec![];
2081 while let Some(key) = keys.next().await {
2082 collected.push(key);
2083 }
2084
2085 assert_eq!(collected.len(), 2);
2087 assert_eq!(collected[0].algorithm, EventEncryptionAlgorithm::MegolmV1AesSha2);
2088 assert_eq!(collected[1].algorithm, EventEncryptionAlgorithm::MegolmV1AesSha2);
2089 assert_eq!(collected[0].room_id, "!room1:localhost");
2090 assert_eq!(collected[1].room_id, "!room2:localhost");
2091 assert_eq!(collected[0].session_key.to_base64().len(), 220);
2092 assert_eq!(collected[1].session_key.to_base64().len(), 220);
2093 }
2094
2095 #[async_test]
2096 async fn test_export_room_keys_stream_can_provide_a_subset_of_keys() {
2097 let (alice, _, _) = get_machine_pair(user_id!("@a:s.co"), user_id!("@b:s.co"), false).await;
2099 let room1_id = room_id!("!room1:localhost");
2100 let room2_id = room_id!("!room2:localhost");
2101 alice.create_outbound_group_session_with_defaults_test_helper(room1_id).await.unwrap();
2102 alice.create_outbound_group_session_with_defaults_test_helper(room2_id).await.unwrap();
2103
2104 let mut keys =
2106 pin!(alice.store().export_room_keys_stream(|s| s.room_id() == room1_id).await.unwrap());
2107
2108 let mut collected = vec![];
2110 while let Some(key) = keys.next().await {
2111 collected.push(key);
2112 }
2113
2114 assert_eq!(collected.len(), 1);
2116 assert_eq!(collected[0].algorithm, EventEncryptionAlgorithm::MegolmV1AesSha2);
2117 assert_eq!(collected[0].room_id, "!room1:localhost");
2118 assert_eq!(collected[0].session_key.to_base64().len(), 220);
2119 }
2120
2121 #[async_test]
2122 async fn test_export_secrets_bundle() {
2123 let user_id = user_id!("@alice:example.com");
2124 let (first, second, _) = get_machine_pair(user_id, user_id, false).await;
2125
2126 let _ = first
2127 .bootstrap_cross_signing(false)
2128 .await
2129 .expect("We should be able to bootstrap cross-signing");
2130
2131 let bundle = first.store().export_secrets_bundle().await.expect(
2132 "We should be able to export the secrets bundle, now that we \
2133 have the cross-signing keys",
2134 );
2135
2136 assert!(bundle.backup.is_none(), "The bundle should not contain a backup key");
2137
2138 second
2139 .store()
2140 .import_secrets_bundle(&bundle)
2141 .await
2142 .expect("We should be able to import the secrets bundle");
2143
2144 let status = second.cross_signing_status().await;
2145 let identity = second.get_identity(user_id, None).await.unwrap().unwrap().own().unwrap();
2146
2147 assert!(identity.is_verified(), "The public identity should be marked as verified.");
2148
2149 assert!(status.is_complete(), "We should have imported all the cross-signing keys");
2150 }
2151
2152 #[async_test]
2153 async fn test_create_dehydrated_device_key() {
2154 let pickle_key = DehydratedDeviceKey::new()
2155 .expect("Should be able to create a random dehydrated device key");
2156
2157 let to_vec = pickle_key.inner.to_vec();
2158 let pickle_key_from_slice = DehydratedDeviceKey::from_slice(to_vec.as_slice())
2159 .expect("Should be able to create a dehydrated device key from slice");
2160
2161 assert_eq!(pickle_key_from_slice.to_base64(), pickle_key.to_base64());
2162 }
2163
2164 #[async_test]
2165 async fn test_create_dehydrated_errors() {
2166 let too_small = [0u8; 22];
2167 let pickle_key = DehydratedDeviceKey::from_slice(&too_small);
2168
2169 assert!(pickle_key.is_err());
2170
2171 let too_big = [0u8; 40];
2172 let pickle_key = DehydratedDeviceKey::from_slice(&too_big);
2173
2174 assert!(pickle_key.is_err());
2175 }
2176
2177 #[async_test]
2178 async fn test_build_room_key_bundle() {
2179 let alice = OlmMachine::new(user_id!("@a:s.co"), device_id!("ALICE")).await;
2182 let bob = OlmMachine::new(user_id!("@b:s.co"), device_id!("BOB")).await;
2183
2184 let room1_id = room_id!("!room1:localhost");
2185 let room2_id = room_id!("!room2:localhost");
2186
2187 let session_key1 = "AgAAAAC2XHVzsMBKs4QCRElJ92CJKyGtknCSC8HY7cQ7UYwndMKLQAejXLh5UA0l6s736mgctcUMNvELScUWrObdflrHo+vth/gWreXOaCnaSxmyjjKErQwyIYTkUfqbHy40RJfEesLwnN23on9XAkch/iy8R2+Jz7B8zfG01f2Ow2SxPQFnAndcO1ZSD2GmXgedy6n4B20MWI1jGP2wiexOWbFSya8DO/VxC9m5+/mF+WwYqdpKn9g4Y05Yw4uz7cdjTc3rXm7xK+8E7hI//5QD1nHPvuKYbjjM9u2JSL+Bzp61Cw";
2192 let session_key2 = "AgAAAAC1BXreFTUQQSBGekTEuYxhdytRKyv4JgDGcG+VOBYdPNGgs807SdibCGJky4lJ3I+7ZDGHoUzZPZP/4ogGu4kxni0PWdtWuN7+5zsuamgoFF/BkaGeUUGv6kgIkx8pyPpM5SASTUEP9bN2loDSpUPYwfiIqz74DgC4WQ4435sTBctYvKz8n+TDJwdLXpyT6zKljuqADAioud+s/iqx9LYn9HpbBfezZcvbg67GtE113pLrvde3IcPI5s6dNHK2onGO2B2eoaobcen18bbEDnlUGPeIivArLya7Da6us14jBQ";
2193 let session_key3 = "AgAAAAAM9KFsliaUUhGSXgwOzM5UemjkNH4n8NHgvC/y8hhw13zTF+ooGD4uIYEXYX630oNvQm/EvgZo+dkoc0re+vsqsx4sQeNODdSjcBsWOa0oDF+irQn9oYoLUDPI1IBtY1rX+FV99Zm/xnG7uFOX7aTVlko2GSdejy1w9mfobmfxu5aUc04A9zaKJP1pOthZvRAlhpymGYHgsDtWPrrjyc/yypMflE4kIUEEEtu1kT6mrAmcl615XYRAHYK9G2+fZsGvokwzbkl4nulGwcZMpQEoM0nD2o3GWgX81HW3nGfKBg";
2194 let session_key4 = "AgAAAAA4Kkesxq2h4v9PLD6Sm3Smxspz1PXTqytQPCMQMkkrHNmzV2bHlJ+6/Al9cu8vh1Oj69AK0WUAeJOJuaiskEeg/PI3P03+UYLeC379RzgqwSHdBgdQ41G2vD6zpgmE/8vYToe+qpCZACtPOswZxyqxHH+T/Iq0nv13JmlFGIeA6fEPfr5Y28B49viG74Fs9rxV9EH5PfjbuPM/p+Sz5obShuaBPKQBX1jT913nEXPoIJ06exNZGr0285nw/LgVvNlmWmbqNnbzO2cNZjQWA+xZYz5FSfyCxwqEBbEdUCuRCQ";
2195
2196 let sessions = [
2197 create_inbound_group_session_with_visibility(
2198 &alice,
2199 room1_id,
2200 &SessionKey::from_base64(session_key1).unwrap(),
2201 true,
2202 ),
2203 create_inbound_group_session_with_visibility(
2204 &alice,
2205 room1_id,
2206 &SessionKey::from_base64(session_key2).unwrap(),
2207 true,
2208 ),
2209 create_inbound_group_session_with_visibility(
2210 &alice,
2211 room1_id,
2212 &SessionKey::from_base64(session_key3).unwrap(),
2213 false,
2214 ),
2215 create_inbound_group_session_with_visibility(
2216 &alice,
2217 room2_id,
2218 &SessionKey::from_base64(session_key4).unwrap(),
2219 true,
2220 ),
2221 ];
2222 bob.store().save_inbound_group_sessions(&sessions).await.unwrap();
2223
2224 let mut bundle = bob.store().build_room_key_bundle(room1_id).await.unwrap();
2226
2227 bundle.room_keys.sort_by_key(|session| session.session_id.clone());
2231
2232 let algorithm = if cfg!(feature = "experimental-algorithms") {
2234 "m.megolm.v2.aes-sha2"
2235 } else {
2236 "m.megolm.v1.aes-sha2"
2237 };
2238 let map_algorithm = move |value: Content, _path: ContentPath<'_>| {
2239 assert_eq!(value.as_str().unwrap(), algorithm);
2240 "[algorithm]"
2241 };
2242
2243 let alice_curve_key = alice.identity_keys().curve25519.to_base64();
2245 let map_alice_curve_key = move |value: Content, _path: ContentPath<'_>| {
2246 assert_eq!(value.as_str().unwrap(), alice_curve_key);
2247 "[alice curve key]"
2248 };
2249 let alice_ed25519_key = alice.identity_keys().ed25519.to_base64();
2250 let map_alice_ed25519_key = move |value: Content, _path: ContentPath<'_>| {
2251 assert_eq!(value.as_str().unwrap(), alice_ed25519_key);
2252 "[alice ed25519 key]"
2253 };
2254
2255 insta::with_settings!({ sort_maps => true }, {
2256 assert_json_snapshot!(bundle, {
2257 ".withheld[].algorithm" => insta::dynamic_redaction(map_algorithm),
2258 ".room_keys[].algorithm" => insta::dynamic_redaction(map_algorithm),
2259 ".room_keys[].sender_key" => insta::dynamic_redaction(map_alice_curve_key.clone()),
2260 ".withheld[].sender_key" => insta::dynamic_redaction(map_alice_curve_key),
2261 ".room_keys[].sender_claimed_keys.ed25519" => insta::dynamic_redaction(map_alice_ed25519_key),
2262 });
2263 });
2264 }
2265
2266 #[async_test]
2267 async fn test_receive_room_key_bundle() {
2268 let alice = OlmMachine::new(user_id!("@a:s.co"), device_id!("ALICE")).await;
2269 let alice_key = alice.identity_keys().curve25519;
2270 let bob = OlmMachine::new(user_id!("@b:s.co"), device_id!("BOB")).await;
2271
2272 let room_id = room_id!("!room1:localhost");
2273
2274 let session_key1 = "AgAAAAC2XHVzsMBKs4QCRElJ92CJKyGtknCSC8HY7cQ7UYwndMKLQAejXLh5UA0l6s736mgctcUMNvELScUWrObdflrHo+vth/gWreXOaCnaSxmyjjKErQwyIYTkUfqbHy40RJfEesLwnN23on9XAkch/iy8R2+Jz7B8zfG01f2Ow2SxPQFnAndcO1ZSD2GmXgedy6n4B20MWI1jGP2wiexOWbFSya8DO/VxC9m5+/mF+WwYqdpKn9g4Y05Yw4uz7cdjTc3rXm7xK+8E7hI//5QD1nHPvuKYbjjM9u2JSL+Bzp61Cw";
2275 let session_key2 = "AgAAAAC1BXreFTUQQSBGekTEuYxhdytRKyv4JgDGcG+VOBYdPNGgs807SdibCGJky4lJ3I+7ZDGHoUzZPZP/4ogGu4kxni0PWdtWuN7+5zsuamgoFF/BkaGeUUGv6kgIkx8pyPpM5SASTUEP9bN2loDSpUPYwfiIqz74DgC4WQ4435sTBctYvKz8n+TDJwdLXpyT6zKljuqADAioud+s/iqx9LYn9HpbBfezZcvbg67GtE113pLrvde3IcPI5s6dNHK2onGO2B2eoaobcen18bbEDnlUGPeIivArLya7Da6us14jBQ";
2276
2277 let sessions = [
2278 create_inbound_group_session_with_visibility(
2279 &alice,
2280 room_id,
2281 &SessionKey::from_base64(session_key1).unwrap(),
2282 true,
2283 ),
2284 create_inbound_group_session_with_visibility(
2285 &alice,
2286 room_id,
2287 &SessionKey::from_base64(session_key2).unwrap(),
2288 false,
2289 ),
2290 ];
2291
2292 alice.store().save_inbound_group_sessions(&sessions).await.unwrap();
2293 let bundle = alice.store().build_room_key_bundle(room_id).await.unwrap();
2294
2295 bob.store()
2296 .receive_room_key_bundle(
2297 &StoredRoomKeyBundleData {
2298 sender_user: alice.user_id().to_owned(),
2299 sender_key: alice_key,
2300 sender_data: SenderData::sender_verified(
2301 alice.user_id(),
2302 device_id!("ALICE"),
2303 alice.identity_keys().ed25519,
2304 ),
2305
2306 bundle_data: RoomKeyBundleContent {
2307 room_id: room_id.to_owned(),
2308 file: EncryptedFileInit {
2311 url: owned_mxc_uri!("mxc://example.com/0"),
2312 key: JsonWebKeyInit {
2313 kty: "oct".to_owned(),
2314 key_ops: vec!["encrypt".to_owned(), "decrypt".to_owned()],
2315 alg: "A256CTR.".to_owned(),
2316 k: Base64::new(vec![0u8; 128]),
2317 ext: true,
2318 }
2319 .into(),
2320 iv: Base64::new(vec![0u8; 128]),
2321 hashes: vec![("sha256".to_owned(), Base64::new(vec![0u8; 128]))]
2322 .into_iter()
2323 .collect(),
2324 v: "v2".to_owned(),
2325 }
2326 .into(),
2327 },
2328 },
2329 bundle,
2330 |_, _| {},
2331 )
2332 .await
2333 .unwrap();
2334
2335 let imported_sessions =
2337 bob.store().get_inbound_group_sessions_by_room_id(room_id).await.unwrap();
2338
2339 assert_eq!(imported_sessions.len(), 1);
2340 assert_eq!(imported_sessions[0].room_id(), room_id);
2341
2342 assert_matches!(
2343 bob.store()
2344 .get_withheld_info(room_id, sessions[1].session_id())
2345 .await
2346 .unwrap()
2347 .expect("Withheld info should be present in the store."),
2348 RoomKeyWithheldEntry {
2349 #[cfg(not(feature = "experimental-algorithms"))]
2350 content: RoomKeyWithheldContent::MegolmV1AesSha2(
2351 MegolmV1AesSha2WithheldContent::HistoryNotShared(_)
2352 ),
2353 #[cfg(feature = "experimental-algorithms")]
2354 content: RoomKeyWithheldContent::MegolmV2AesSha2(
2355 MegolmV1AesSha2WithheldContent::HistoryNotShared(_)
2356 ),
2357 ..
2358 }
2359 );
2360 }
2361
2362 #[async_test]
2368 async fn test_deserialize_room_key_withheld_entry_from_to_device_event() {
2369 let entry: RoomKeyWithheldEntry = serde_json::from_value(json!(
2370 {
2371 "content": {
2372 "algorithm": "m.megolm.v1.aes-sha2",
2373 "code": "m.unauthorised",
2374 "from_device": "ALICE",
2375 "reason": "You are not authorised to read the message.",
2376 "room_id": "!roomid:s.co",
2377 "sender_key": "7hIcOrEroXYdzjtCBvBjUiqvT0Me7g+ymeXqoc65RS0",
2378 "session_id": "session123"
2379 },
2380 "sender": "@alice:s.co",
2381 "type": "m.room_key.withheld"
2382 }
2383 ))
2384 .unwrap();
2385
2386 assert_matches!(
2387 entry,
2388 RoomKeyWithheldEntry {
2389 sender,
2390 content: RoomKeyWithheldContent::MegolmV1AesSha2(
2391 MegolmV1AesSha2WithheldContent::Unauthorised(withheld_content,)
2392 ),
2393 }
2394 );
2395
2396 assert_eq!(sender, "@alice:s.co");
2397 assert_eq!(withheld_content.room_id, "!roomid:s.co");
2398 assert_eq!(withheld_content.session_id, "session123");
2399 assert_eq!(
2400 withheld_content.sender_key.to_base64(),
2401 "7hIcOrEroXYdzjtCBvBjUiqvT0Me7g+ymeXqoc65RS0"
2402 );
2403 assert_eq!(withheld_content.from_device, Some(owned_device_id!("ALICE")));
2404 }
2405
2406 fn create_inbound_group_session_with_visibility(
2417 olm_machine: &OlmMachine,
2418 room_id: &RoomId,
2419 session_key: &SessionKey,
2420 shared_history: bool,
2421 ) -> InboundGroupSession {
2422 let identity_keys = &olm_machine.store().static_account().identity_keys;
2423 InboundGroupSession::new(
2424 identity_keys.curve25519,
2425 identity_keys.ed25519,
2426 room_id,
2427 session_key,
2428 SenderData::unknown(),
2429 #[cfg(not(feature = "experimental-algorithms"))]
2430 EventEncryptionAlgorithm::MegolmV1AesSha2,
2431 #[cfg(feature = "experimental-algorithms")]
2432 EventEncryptionAlgorithm::MegolmV2AesSha2,
2433 None,
2434 shared_history,
2435 )
2436 .unwrap()
2437 }
2438}