1#![warn(missing_docs)]
7#![allow(unused_qualifications)]
8
9mod backup_recovery_key;
10mod dehydrated_devices;
11mod device;
12mod error;
13mod logger;
14mod machine;
15mod responses;
16mod users;
17mod verification;
18
19use std::{
20 collections::{BTreeMap, HashMap},
21 sync::Arc,
22 time::Duration,
23};
24
25use anyhow::Context as _;
26pub use backup_recovery_key::{
27 BackupRecoveryKey, DecodeError, MegolmV1BackupKey, PassphraseInfo, PkDecryptionError,
28};
29pub use device::Device;
30pub use error::{
31 CryptoStoreError, DecryptionError, KeyImportError, SecretImportError, SignatureError,
32};
33use js_int::UInt;
34pub use logger::{set_logger, Logger};
35pub use machine::{KeyRequestPair, OlmMachine, SignatureVerification};
36use matrix_sdk_common::deserialized_responses::{ShieldState as RustShieldState, ShieldStateCode};
37use matrix_sdk_crypto::{
38 olm::{IdentityKeys, InboundGroupSession, SenderData, Session},
39 store::{
40 types::{
41 Changes, DehydratedDeviceKey as InnerDehydratedDeviceKey, PendingChanges,
42 RoomSettings as RustRoomSettings,
43 },
44 CryptoStore,
45 },
46 types::{
47 DeviceKey, DeviceKeys, EventEncryptionAlgorithm as RustEventEncryptionAlgorithm, SigningKey,
48 },
49 CollectStrategy, EncryptionSettings as RustEncryptionSettings,
50};
51use matrix_sdk_sqlite::SqliteCryptoStore;
52pub use responses::{
53 BootstrapCrossSigningResult, DeviceLists, KeysImportResult, OutgoingVerificationRequest,
54 Request, RequestType, SignatureUploadRequest, UploadSigningKeysRequest,
55};
56use ruma::{
57 events::room::history_visibility::HistoryVisibility as RustHistoryVisibility,
58 DeviceKeyAlgorithm, DeviceKeyId, MilliSecondsSinceUnixEpoch, OwnedDeviceId, OwnedUserId,
59 RoomId, SecondsSinceUnixEpoch, UserId,
60};
61use serde::{Deserialize, Serialize};
62use tokio::runtime::Runtime;
63pub use users::UserIdentity;
64pub use verification::{
65 CancelInfo, ConfirmVerificationResult, QrCode, QrCodeListener, QrCodeState,
66 RequestVerificationResult, Sas, SasListener, SasState, ScanResult, StartSasResult,
67 Verification, VerificationRequest, VerificationRequestListener, VerificationRequestState,
68};
69use vodozemac::{Curve25519PublicKey, Ed25519PublicKey};
70
71use crate::dehydrated_devices::DehydrationError;
72
73#[derive(Deserialize, Serialize, uniffi::Record)]
75pub struct MigrationData {
76 account: PickledAccount,
78 sessions: Vec<PickledSession>,
80 inbound_group_sessions: Vec<PickledInboundGroupSession>,
82 pickle_key: Vec<u8>,
84 backup_version: Option<String>,
86 backup_recovery_key: Option<String>,
88 cross_signing: CrossSigningKeyExport,
90 tracked_users: Vec<String>,
92 room_settings: HashMap<String, RoomSettings>,
94}
95
96#[derive(uniffi::Record)]
98pub struct SessionMigrationData {
99 user_id: String,
101 device_id: String,
103 curve25519_key: String,
105 ed25519_key: String,
107 sessions: Vec<PickledSession>,
109 inbound_group_sessions: Vec<PickledInboundGroupSession>,
111 pickle_key: Vec<u8>,
113}
114
115#[derive(Debug, Deserialize, Serialize, uniffi::Record)]
120pub struct PickledAccount {
121 pub user_id: String,
123 pub device_id: String,
125 pub pickle: String,
127 pub shared: bool,
129 pub uploaded_signed_key_count: i64,
131}
132
133#[derive(Debug, Deserialize, Serialize, uniffi::Record)]
138pub struct PickledSession {
139 pub pickle: String,
141 pub sender_key: String,
143 pub created_using_fallback_key: bool,
145 pub creation_time: u64,
147 pub last_use_time: u64,
149}
150
151#[derive(Debug, Deserialize, Serialize, uniffi::Record)]
156pub struct PickledInboundGroupSession {
157 pub pickle: String,
159 pub sender_key: String,
161 pub signing_key: HashMap<String, String>,
163 pub room_id: String,
165 pub forwarding_chains: Vec<String>,
168 pub imported: bool,
171 pub backed_up: bool,
173}
174
175#[derive(Debug, thiserror::Error, uniffi::Error)]
177pub enum MigrationError {
178 #[error("error migrating database: {error_message}")]
180 Generic {
181 error_message: String,
183 },
184}
185
186impl From<anyhow::Error> for MigrationError {
187 fn from(e: anyhow::Error) -> MigrationError {
188 MigrationError::Generic { error_message: e.to_string() }
189 }
190}
191
192#[matrix_sdk_ffi_macros::export]
208pub fn migrate(
209 data: MigrationData,
210 path: String,
211 passphrase: Option<String>,
212 progress_listener: Box<dyn ProgressListener>,
213) -> Result<(), MigrationError> {
214 let runtime = Runtime::new().context("initializing tokio runtime")?;
215 runtime.block_on(async move {
216 migrate_data(data, &path, passphrase, progress_listener).await?;
217 Ok(())
218 })
219}
220
221async fn migrate_data(
222 mut data: MigrationData,
223 path: &str,
224 passphrase: Option<String>,
225 progress_listener: Box<dyn ProgressListener>,
226) -> anyhow::Result<()> {
227 use matrix_sdk_crypto::{olm::PrivateCrossSigningIdentity, store::types::BackupDecryptionKey};
228 use vodozemac::olm::Account;
229 use zeroize::Zeroize;
230
231 let total_steps = 5 + data.sessions.len() + data.inbound_group_sessions.len();
240 let mut processed_steps = 0;
241 let listener = |progress: usize, total: usize| {
242 progress_listener.on_progress(progress as i32, total as i32)
243 };
244
245 let store = SqliteCryptoStore::open(path, passphrase.as_deref()).await?;
246
247 processed_steps += 1;
248 listener(processed_steps, total_steps);
249
250 let user_id = parse_user_id(&data.account.user_id)?;
251 let device_id: OwnedDeviceId = data.account.device_id.into();
252
253 let account = Account::from_libolm_pickle(&data.account.pickle, &data.pickle_key)?;
254 let pickle = account.pickle();
255 let identity_keys = Arc::new(account.identity_keys());
256 let pickled_account = matrix_sdk_crypto::olm::PickledAccount {
257 user_id: parse_user_id(&data.account.user_id)?,
258 device_id: device_id.clone(),
259 pickle,
260 dehydrated: false, shared: data.account.shared,
262 uploaded_signed_key_count: data.account.uploaded_signed_key_count as u64,
263 creation_local_time: MilliSecondsSinceUnixEpoch::now(),
264 fallback_key_creation_timestamp: Some(MilliSecondsSinceUnixEpoch::now()),
265 };
266 let account = matrix_sdk_crypto::olm::Account::from_pickle(pickled_account)?;
267
268 processed_steps += 1;
269 listener(processed_steps, total_steps);
270
271 let (sessions, inbound_group_sessions) = collect_sessions(
272 processed_steps,
273 total_steps,
274 &listener,
275 &data.pickle_key,
276 user_id.clone(),
277 device_id,
278 identity_keys,
279 data.sessions,
280 data.inbound_group_sessions,
281 )?;
282
283 let backup_decryption_key = data
284 .backup_recovery_key
285 .map(|k| BackupDecryptionKey::from_base58(k.as_str()))
286 .transpose()?;
287
288 let cross_signing = PrivateCrossSigningIdentity::empty((*user_id).into());
289 cross_signing
290 .import_secrets_unchecked(
291 data.cross_signing.master_key.as_deref(),
292 data.cross_signing.self_signing_key.as_deref(),
293 data.cross_signing.user_signing_key.as_deref(),
294 )
295 .await?;
296
297 data.cross_signing.master_key.zeroize();
298 data.cross_signing.self_signing_key.zeroize();
299 data.cross_signing.user_signing_key.zeroize();
300
301 processed_steps += 1;
302 listener(processed_steps, total_steps);
303
304 let tracked_users: Vec<_> = data
305 .tracked_users
306 .into_iter()
307 .filter_map(|s| parse_user_id(&s).ok().map(|u| (u, true)))
308 .collect();
309
310 let tracked_users: Vec<_> = tracked_users.iter().map(|(u, d)| (&**u, *d)).collect();
311 store.save_tracked_users(tracked_users.as_slice()).await?;
312
313 processed_steps += 1;
314 listener(processed_steps, total_steps);
315
316 let mut room_settings = HashMap::new();
317 for (room_id, settings) in data.room_settings {
318 let room_id = RoomId::parse(room_id)?;
319 room_settings.insert(room_id, settings.into());
320 }
321
322 store.save_pending_changes(PendingChanges { account: Some(account) }).await?;
323
324 let changes = Changes {
325 private_identity: Some(cross_signing),
326 sessions,
327 inbound_group_sessions,
328 backup_decryption_key,
329 backup_version: data.backup_version,
330 room_settings,
331 ..Default::default()
332 };
333
334 save_changes(processed_steps, total_steps, &listener, changes, &store).await
335}
336
337async fn save_changes(
338 mut processed_steps: usize,
339 total_steps: usize,
340 listener: &dyn Fn(usize, usize),
341 changes: Changes,
342 store: &SqliteCryptoStore,
343) -> anyhow::Result<()> {
344 store.save_changes(changes).await?;
345
346 processed_steps += 1;
347 listener(processed_steps, total_steps);
348
349 Ok(())
350}
351
352#[matrix_sdk_ffi_macros::export]
371pub fn migrate_sessions(
372 data: SessionMigrationData,
373 path: String,
374 passphrase: Option<String>,
375 progress_listener: Box<dyn ProgressListener>,
376) -> Result<(), MigrationError> {
377 let runtime = Runtime::new().context("initializing tokio runtime")?;
378 runtime.block_on(migrate_session_data(data, &path, passphrase, progress_listener))?;
379 Ok(())
380}
381
382async fn migrate_session_data(
383 data: SessionMigrationData,
384 path: &str,
385 passphrase: Option<String>,
386 progress_listener: Box<dyn ProgressListener>,
387) -> anyhow::Result<()> {
388 let store = SqliteCryptoStore::open(path, passphrase.as_deref()).await?;
389
390 let listener = |progress: usize, total: usize| {
391 progress_listener.on_progress(progress as i32, total as i32)
392 };
393
394 let total_steps = 1 + data.sessions.len() + data.inbound_group_sessions.len();
395 let processed_steps = 0;
396
397 let user_id = UserId::parse(data.user_id)?;
398 let device_id: OwnedDeviceId = data.device_id.into();
399
400 let identity_keys = IdentityKeys {
401 ed25519: Ed25519PublicKey::from_base64(&data.ed25519_key)?,
402 curve25519: Curve25519PublicKey::from_base64(&data.curve25519_key)?,
403 }
404 .into();
405
406 let (sessions, inbound_group_sessions) = collect_sessions(
407 processed_steps,
408 total_steps,
409 &listener,
410 &data.pickle_key,
411 user_id,
412 device_id,
413 identity_keys,
414 data.sessions,
415 data.inbound_group_sessions,
416 )?;
417
418 let changes = Changes { sessions, inbound_group_sessions, ..Default::default() };
419 save_changes(processed_steps, total_steps, &listener, changes, &store).await
420}
421
422#[allow(clippy::too_many_arguments)]
423fn collect_sessions(
424 mut processed_steps: usize,
425 total_steps: usize,
426 listener: &dyn Fn(usize, usize),
427 pickle_key: &[u8],
428 user_id: OwnedUserId,
429 device_id: OwnedDeviceId,
430 identity_keys: Arc<IdentityKeys>,
431 session_pickles: Vec<PickledSession>,
432 group_session_pickles: Vec<PickledInboundGroupSession>,
433) -> anyhow::Result<(Vec<Session>, Vec<InboundGroupSession>)> {
434 let mut sessions = Vec::new();
435
436 let device_keys = DeviceKeys::new(
441 user_id,
442 device_id.clone(),
443 Default::default(),
444 BTreeMap::from([
445 (
446 DeviceKeyId::from_parts(DeviceKeyAlgorithm::Ed25519, &device_id),
447 DeviceKey::Ed25519(identity_keys.ed25519),
448 ),
449 (
450 DeviceKeyId::from_parts(DeviceKeyAlgorithm::Curve25519, &device_id),
451 DeviceKey::Curve25519(identity_keys.curve25519),
452 ),
453 ]),
454 Default::default(),
455 );
456
457 for session_pickle in session_pickles {
458 let pickle =
459 vodozemac::olm::Session::from_libolm_pickle(&session_pickle.pickle, pickle_key)?
460 .pickle();
461
462 let creation_time = SecondsSinceUnixEpoch(
463 UInt::new(session_pickle.creation_time).context("invalid creation timestamp")?,
464 );
465 let last_use_time = SecondsSinceUnixEpoch(
466 UInt::new(session_pickle.last_use_time).context("invalid last use timestamp")?,
467 );
468
469 let pickle = matrix_sdk_crypto::olm::PickledSession {
470 pickle,
471 sender_key: Curve25519PublicKey::from_base64(&session_pickle.sender_key)?,
472 created_using_fallback_key: session_pickle.created_using_fallback_key,
473 creation_time,
474 last_use_time,
475 };
476
477 let session = Session::from_pickle(device_keys.clone(), pickle)?;
478
479 sessions.push(session);
480 processed_steps += 1;
481 listener(processed_steps, total_steps);
482 }
483
484 let mut inbound_group_sessions = Vec::new();
485
486 for session in group_session_pickles {
487 let pickle = vodozemac::megolm::InboundGroupSession::from_libolm_pickle(
488 &session.pickle,
489 pickle_key,
490 )?
491 .pickle();
492
493 let sender_key = Curve25519PublicKey::from_base64(&session.sender_key)?;
494
495 let pickle = matrix_sdk_crypto::olm::PickledInboundGroupSession {
496 pickle,
497 sender_key,
498 signing_key: session
499 .signing_key
500 .into_iter()
501 .map(|(k, v)| {
502 let algorithm = DeviceKeyAlgorithm::from(k);
503 let key = SigningKey::from_parts(&algorithm, v)?;
504
505 Ok((algorithm, key))
506 })
507 .collect::<anyhow::Result<_>>()?,
508 sender_data: SenderData::legacy(),
509 forwarder_data: None,
510 room_id: RoomId::parse(session.room_id)?,
511 imported: session.imported,
512 backed_up: session.backed_up,
513 history_visibility: None,
514 shared_history: false,
515 algorithm: RustEventEncryptionAlgorithm::MegolmV1AesSha2,
516 };
517
518 let session = matrix_sdk_crypto::olm::InboundGroupSession::from_pickle(pickle)?;
519
520 inbound_group_sessions.push(session);
521 processed_steps += 1;
522 listener(processed_steps, total_steps);
523 }
524
525 Ok((sessions, inbound_group_sessions))
526}
527
528#[matrix_sdk_ffi_macros::export]
546pub fn migrate_room_settings(
547 room_settings: HashMap<String, RoomSettings>,
548 path: String,
549 passphrase: Option<String>,
550) -> Result<(), MigrationError> {
551 let runtime = Runtime::new().context("initializing tokio runtime")?;
552 runtime.block_on(async move {
553 let store = SqliteCryptoStore::open(path, passphrase.as_deref())
554 .await
555 .context("opening sqlite crypto store")?;
556
557 let mut rust_settings = HashMap::new();
558 for (room_id, settings) in room_settings {
559 let room_id = RoomId::parse(room_id).context("parsing room ID")?;
560 rust_settings.insert(room_id, settings.into());
561 }
562
563 let changes = Changes { room_settings: rust_settings, ..Default::default() };
564 store.save_changes(changes).await.context("saving changes")?;
565
566 Ok(())
567 })
568}
569
570#[matrix_sdk_ffi_macros::export(callback_interface)]
572pub trait ProgressListener {
573 fn on_progress(&self, progress: i32, total: i32);
581}
582
583impl<T: Fn(i32, i32)> ProgressListener for T {
584 fn on_progress(&self, progress: i32, total: i32) {
585 self(progress, total)
586 }
587}
588
589#[derive(Debug, Deserialize, Serialize, PartialEq, uniffi::Enum)]
591pub enum EventEncryptionAlgorithm {
592 OlmV1Curve25519AesSha2,
594 MegolmV1AesSha2,
596}
597
598impl From<EventEncryptionAlgorithm> for RustEventEncryptionAlgorithm {
599 fn from(a: EventEncryptionAlgorithm) -> Self {
600 match a {
601 EventEncryptionAlgorithm::OlmV1Curve25519AesSha2 => Self::OlmV1Curve25519AesSha2,
602 EventEncryptionAlgorithm::MegolmV1AesSha2 => Self::MegolmV1AesSha2,
603 }
604 }
605}
606
607impl TryFrom<RustEventEncryptionAlgorithm> for EventEncryptionAlgorithm {
608 type Error = serde_json::Error;
609
610 fn try_from(value: RustEventEncryptionAlgorithm) -> Result<Self, Self::Error> {
611 match value {
612 RustEventEncryptionAlgorithm::OlmV1Curve25519AesSha2 => {
613 Ok(Self::OlmV1Curve25519AesSha2)
614 }
615 RustEventEncryptionAlgorithm::MegolmV1AesSha2 => Ok(Self::MegolmV1AesSha2),
616 _ => Err(serde::de::Error::custom(format!("Unsupported algorithm {value}"))),
617 }
618 }
619}
620
621#[derive(uniffi::Enum)]
623pub enum HistoryVisibility {
624 Invited,
630
631 Joined,
636
637 Shared,
642
643 WorldReadable,
647}
648
649impl From<HistoryVisibility> for RustHistoryVisibility {
650 fn from(h: HistoryVisibility) -> Self {
651 match h {
652 HistoryVisibility::Invited => Self::Invited,
653 HistoryVisibility::Joined => Self::Joined,
654 HistoryVisibility::Shared => Self::Shared,
655 HistoryVisibility::WorldReadable => Self::Shared,
656 }
657 }
658}
659
660#[derive(uniffi::Record)]
666pub struct EncryptionSettings {
667 pub algorithm: EventEncryptionAlgorithm,
669 #[cfg(feature = "experimental-encrypted-state-events")]
671 pub encrypt_state_events: bool,
672 pub rotation_period: u64,
675 pub rotation_period_msgs: u64,
677 pub history_visibility: HistoryVisibility,
681 pub only_allow_trusted_devices: bool,
684 pub error_on_verified_user_problem: bool,
687}
688
689impl From<EncryptionSettings> for RustEncryptionSettings {
690 fn from(v: EncryptionSettings) -> Self {
691 let sharing_strategy = if v.only_allow_trusted_devices {
692 CollectStrategy::OnlyTrustedDevices
693 } else if v.error_on_verified_user_problem {
694 CollectStrategy::ErrorOnVerifiedUserProblem
695 } else {
696 CollectStrategy::AllDevices
697 };
698
699 RustEncryptionSettings {
700 algorithm: v.algorithm.into(),
701 #[cfg(feature = "experimental-encrypted-state-events")]
702 encrypt_state_events: false,
703 rotation_period: Duration::from_secs(v.rotation_period),
704 rotation_period_msgs: v.rotation_period_msgs,
705 history_visibility: v.history_visibility.into(),
706 sharing_strategy,
707 }
708 }
709}
710
711#[derive(uniffi::Record)]
713pub struct DecryptedEvent {
714 pub clear_event: String,
716 pub sender_curve25519_key: String,
718 pub claimed_ed25519_key: Option<String>,
720 pub forwarding_curve25519_chain: Vec<String>,
724 pub shield_state: ShieldState,
733}
734
735#[allow(missing_docs)]
738#[derive(uniffi::Enum)]
739pub enum ShieldColor {
740 Red,
741 Grey,
742 None,
743}
744
745#[derive(uniffi::Record)]
748#[allow(missing_docs)]
749pub struct ShieldState {
750 color: ShieldColor,
751 code: Option<ShieldStateCode>,
752 message: Option<String>,
753}
754
755impl From<RustShieldState> for ShieldState {
756 fn from(value: RustShieldState) -> Self {
757 match value {
758 RustShieldState::Red { code, message } => Self {
759 color: ShieldColor::Red,
760 code: Some(code),
761 message: Some(message.to_owned()),
762 },
763 RustShieldState::Grey { code, message } => Self {
764 color: ShieldColor::Grey,
765 code: Some(code),
766 message: Some(message.to_owned()),
767 },
768 RustShieldState::None => Self { color: ShieldColor::None, code: None, message: None },
769 }
770 }
771}
772
773#[derive(Debug, Clone, uniffi::Record)]
776pub struct CrossSigningStatus {
777 pub has_master: bool,
779 pub has_self_signing: bool,
782 pub has_user_signing: bool,
785}
786
787#[derive(Deserialize, Serialize, uniffi::Record)]
790pub struct CrossSigningKeyExport {
791 pub master_key: Option<String>,
793 pub self_signing_key: Option<String>,
795 pub user_signing_key: Option<String>,
797}
798
799#[derive(uniffi::Record)]
801pub struct RoomKeyCounts {
802 pub total: i64,
804 pub backed_up: i64,
806}
807
808#[derive(uniffi::Object)]
810pub struct BackupKeys {
811 recovery_key: Arc<BackupRecoveryKey>,
813 backup_version: String,
815}
816
817#[matrix_sdk_ffi_macros::export]
818impl BackupKeys {
819 pub fn recovery_key(&self) -> Arc<BackupRecoveryKey> {
821 self.recovery_key.clone()
822 }
823
824 pub fn backup_version(&self) -> String {
826 self.backup_version.to_owned()
827 }
828}
829
830impl TryFrom<matrix_sdk_crypto::store::types::BackupKeys> for BackupKeys {
831 type Error = ();
832
833 fn try_from(keys: matrix_sdk_crypto::store::types::BackupKeys) -> Result<Self, Self::Error> {
834 Ok(Self {
835 recovery_key: BackupRecoveryKey {
836 inner: keys.decryption_key.ok_or(())?,
837 passphrase_info: None,
838 }
839 .into(),
840 backup_version: keys.backup_version.ok_or(())?,
841 })
842 }
843}
844
845#[derive(uniffi::Record, Clone)]
847pub struct DehydratedDeviceKey {
848 pub(crate) inner: Vec<u8>,
849}
850
851impl DehydratedDeviceKey {
852 pub fn new() -> Result<Self, DehydrationError> {
854 let inner = InnerDehydratedDeviceKey::new()?;
855 Ok(inner.into())
856 }
857
858 pub fn from_slice(slice: &[u8]) -> Result<Self, DehydrationError> {
862 let inner = InnerDehydratedDeviceKey::from_slice(slice)?;
863 Ok(inner.into())
864 }
865
866 pub fn to_base64(&self) -> String {
868 let inner = InnerDehydratedDeviceKey::from_slice(&self.inner).unwrap();
869 inner.to_base64()
870 }
871}
872impl From<InnerDehydratedDeviceKey> for DehydratedDeviceKey {
873 fn from(pickle_key: InnerDehydratedDeviceKey) -> Self {
874 DehydratedDeviceKey { inner: pickle_key.into() }
875 }
876}
877
878impl From<matrix_sdk_crypto::store::types::RoomKeyCounts> for RoomKeyCounts {
879 fn from(count: matrix_sdk_crypto::store::types::RoomKeyCounts) -> Self {
880 Self { total: count.total as i64, backed_up: count.backed_up as i64 }
881 }
882}
883
884impl From<matrix_sdk_crypto::CrossSigningKeyExport> for CrossSigningKeyExport {
885 fn from(e: matrix_sdk_crypto::CrossSigningKeyExport) -> Self {
886 Self {
887 master_key: e.master_key.clone(),
888 self_signing_key: e.self_signing_key.clone(),
889 user_signing_key: e.user_signing_key.clone(),
890 }
891 }
892}
893
894impl From<CrossSigningKeyExport> for matrix_sdk_crypto::CrossSigningKeyExport {
895 fn from(e: CrossSigningKeyExport) -> Self {
896 matrix_sdk_crypto::CrossSigningKeyExport {
897 master_key: e.master_key,
898 self_signing_key: e.self_signing_key,
899 user_signing_key: e.user_signing_key,
900 }
901 }
902}
903
904impl From<matrix_sdk_crypto::CrossSigningStatus> for CrossSigningStatus {
905 fn from(s: matrix_sdk_crypto::CrossSigningStatus) -> Self {
906 Self {
907 has_master: s.has_master,
908 has_self_signing: s.has_self_signing,
909 has_user_signing: s.has_user_signing,
910 }
911 }
912}
913
914#[derive(Debug, PartialEq, Deserialize, Serialize, uniffi::Record)]
916pub struct RoomSettings {
917 pub algorithm: EventEncryptionAlgorithm,
919 #[cfg(feature = "experimental-encrypted-state-events")]
921 #[serde(default)]
922 pub encrypt_state_events: bool,
923 pub only_allow_trusted_devices: bool,
926}
927
928impl TryFrom<RustRoomSettings> for RoomSettings {
929 type Error = serde_json::Error;
930
931 fn try_from(value: RustRoomSettings) -> Result<Self, Self::Error> {
932 let algorithm = value.algorithm.try_into()?;
933 Ok(Self {
934 algorithm,
935 #[cfg(feature = "experimental-encrypted-state-events")]
936 encrypt_state_events: value.encrypt_state_events,
937 only_allow_trusted_devices: value.only_allow_trusted_devices,
938 })
939 }
940}
941
942impl From<RoomSettings> for RustRoomSettings {
943 fn from(value: RoomSettings) -> Self {
944 Self {
945 algorithm: value.algorithm.into(),
946 only_allow_trusted_devices: value.only_allow_trusted_devices,
947 ..RustRoomSettings::default()
948 }
949 }
950}
951
952fn parse_user_id(user_id: &str) -> Result<OwnedUserId, CryptoStoreError> {
953 ruma::UserId::parse(user_id).map_err(|e| CryptoStoreError::InvalidUserId(user_id.to_owned(), e))
954}
955
956#[matrix_sdk_ffi_macros::export]
957fn version_info() -> VersionInfo {
958 VersionInfo {
959 version: matrix_sdk_crypto::VERSION.to_owned(),
960 vodozemac_version: matrix_sdk_crypto::vodozemac::VERSION.to_owned(),
961 git_description: env!("VERGEN_GIT_DESCRIBE").to_owned(),
962 git_sha: env!("VERGEN_GIT_SHA").to_owned(),
963 }
964}
965
966#[derive(uniffi::Record)]
968pub struct VersionInfo {
969 pub version: String,
971 pub vodozemac_version: String,
973 pub git_sha: String,
975 pub git_description: String,
978}
979
980#[matrix_sdk_ffi_macros::export]
981fn version() -> String {
982 matrix_sdk_crypto::VERSION.to_owned()
983}
984
985#[matrix_sdk_ffi_macros::export]
986fn vodozemac_version() -> String {
987 vodozemac::VERSION.to_owned()
988}
989
990#[derive(uniffi::Object)]
996pub struct PkEncryption {
997 inner: matrix_sdk_crypto::vodozemac::pk_encryption::PkEncryption,
998}
999
1000#[matrix_sdk_ffi_macros::export]
1001impl PkEncryption {
1002 #[uniffi::constructor]
1009 pub fn from_base64(key: &str) -> Result<Arc<Self>, DecodeError> {
1010 let key = vodozemac::Curve25519PublicKey::from_base64(key)
1011 .map_err(matrix_sdk_crypto::backups::DecodeError::PublicKey)?;
1012 let inner = vodozemac::pk_encryption::PkEncryption::from_key(key);
1013
1014 Ok(Self { inner }.into())
1015 }
1016
1017 pub fn encrypt(&self, plaintext: &str) -> PkMessage {
1019 use vodozemac::base64_encode;
1020
1021 let message = self.inner.encrypt(plaintext.as_ref());
1022
1023 let vodozemac::pk_encryption::Message { ciphertext, mac, ephemeral_key } = message;
1024
1025 PkMessage {
1026 ciphertext: base64_encode(ciphertext),
1027 mac: base64_encode(mac),
1028 ephemeral_key: ephemeral_key.to_base64(),
1029 }
1030 }
1031}
1032
1033#[derive(uniffi::Record)]
1035pub struct PkMessage {
1036 pub ciphertext: String,
1038 pub mac: String,
1042 pub ephemeral_key: String,
1045}
1046
1047uniffi::setup_scaffolding!();
1048
1049#[cfg(test)]
1050mod tests {
1051 use anyhow::Result;
1052 use serde_json::{json, Value};
1053 use tempfile::tempdir;
1054
1055 use super::MigrationData;
1056 use crate::{migrate, EventEncryptionAlgorithm, OlmMachine, RoomSettings};
1057
1058 #[test]
1059 fn android_migration() -> Result<()> {
1060 let data: Value = json!({
1061 "account":{
1062 "user_id":"@ganfra146:matrix.org",
1063 "device_id":"DEWRCMENGS",
1064 "pickle":"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",
1065 "shared":true,
1066 "uploaded_signed_key_count":50
1067 },
1068 "sessions":[
1069 {
1070 "pickle":"cryZlFaQv0hwWe6tTgv75RExFKGnC8tMHBXJYMHOw4s+SdrKUYAMUdGcYD7QukrPklEOy7fJho9YGK/jV04QdA8JABiOfD+ngJTR4V8eZdmDuG08+Q5EL79V81hQwU2fKndP0y/9nAXPUIADYq0Zrg4EsOnXz7aE+hAeBAm0IBog1s8RYUvynZ15uwjbd/OTLP+gpqpX33DwVg2leiBkQetiUSpOpZCuQ8CcZwIA0MoGCqvaT7h76VHX9JxJx+2fCMhsJMx1nhd99WJH1W9ge5CtdbC4KUP92OSxIrPOnMrNcOPJPp/paZP+HFNQ3PDL+z8pGKXmCnrXGSbd7iPHurPYESrVkBzr",
1071 "sender_key":"WJ6Ce7U67a6jqkHYHd8o0+5H4bqdi9hInZdk0+swuXs",
1072 "created_using_fallback_key":false,
1073 "creation_time": 1649425011424u64,
1074 "last_use_time": 1649425011424u64
1075 },
1076 {
1077 "pickle":"cryZlFaQv0hwWe6tTgv75RExFKGnC8tMHBXJYMHOw4t2W/lowyrV6SXVZp+uG59im0AAfNSKjhjZuiOpQlX7MS+AOJkCNvyujJ2g3KSjLZ94IkoHxkBDHLWSjwaLPu40rfOzJPDpm0XZsR6bQrsxKOmXLGEw2qw5jOTouzMVL2gvuuTix97nSYSU8j3XvTMRUoh0AF/tUpRLcvEFZeGrdUYmTMlyTv4na+FVUalUZ+jrk8t1/sM99JNq3SY1IBSjrBq/0rCOHieiippz0sw2fe2b87id4rqj1g3R9w2MWTWEdOz3ugjMGYF1YDBQZA1tJZ/hmgppk2AU2xKQXE2X3DgSC6fC66D4",
1078 "sender_key":"RzRROfmHNlBfzxnNCUYBfn/5oZNQ11XYjDg59hS+mV0",
1079 "created_using_fallback_key":false,
1080 "creation_time": 1649425011503u64,
1081 "last_use_time": 1649425011503u64
1082 },
1083 {
1084 "pickle":"cryZlFaQv0hwWe6tTgv75RExFKGnC8tMHBXJYMHOw4titbL3SS12PYHpcBPJc6hXnOnZXqrjtjYOD545fck+3utEo8cqqwWubc9tsvxGW3tOWPttLBdAW30Vn8V1M8ebqVCNVWEAb1GKjV4ni8xG7G9SlEcCjLjnF4lJpddSZkqVMFoN0ITr9aSz/eJwXpc3HLreUFXwc8LuQp7krQ4Vt1e5EE/klduqsdurZf5V14RHsmWz2lKjt7nVgtIz/dhtF5F/sGJdg8kCGaHIMSbGAPuPPpa4/Laicb/5otrYt4pg4W4KdFpSGJIcvUQNjXaOZMx3cu/RPJIOyNhx7whG1QiYAUBqAJvr",
1085 "sender_key":"IXSZugAHig1v8MowE1jxi2wDDDfuZBeJynHlegJVwUc",
1086 "created_using_fallback_key":false,
1087 "creation_time": 1649425011566u64,
1088 "last_use_time": 1649425011566u64
1089 },
1090 {
1091 "pickle":"SmkDiFZjNukiarQ7XHQo25FILHsuhNOnxy56cMSQU/Y71jaGbJes4YrvN4Dfy4RSONfejEDXDkbW2JudlHHRP/rWEmnfJiGbK6ArbrG2puqIZgOecPnOUgPfCisr49p1Gmf36dPaO5lm/ZSrngfSoxahoeJJE/CcJN98sYM15XytRk2LBwc+CyYDqr4V1qxfsBt6tzJ4+tsAZeRdD0UtipQgysgH56o8N7nKTCkaZz5lfpYCl3FEgwXpLJ0MGQvtQmbORFvOLqR1jZ/EbmNGKiqDDIYsqG0sf78ii1jqfpLDBXLuYDccsg",
1092 "sender_key":"EB9SC4jVAydKhM6/GcwMc9biKwVNywqW3TerNTrtb1M",
1093 "created_using_fallback_key":false,
1094 "creation_time": 1649542063182u64,
1095 "last_use_time": 1649542063182u64
1096 }
1097 ],
1098 "inbound_group_sessions":[
1099 {
1100 "pickle":"KoA0sxDNQ7lz0vylU9zlmar0VCVQRMCfRrIfTh1bdMhlAgy8/D2ToT+oKRaKy1HiW6H862bzdpgxprlseSjmip9OfLbIuyd2YZcEinwc2666oEI/hpk4oTlE61uE1M+ThfdFf41yGCmaAP7mhjwF234ZrZ6i/F/qx42TLQ8Unc30wDJaJgyheO5eW85SD/0g0cdg2WnEKrx2/wl7Vg/YijT3JMDZ+OsdfJfSZtxBNjlG+PQ/9D31qb1eHfaovc8vFZh5QLfAFg/5rBrF1PhRsC7xOAZbUNdrTbvypNfMM4mznf84C2SzZRSMeAfg5v/YticM3Keg4eHuEj1WO9DrmRXYl6b/pITdf1xuk5euVT0pyxJpXmq41AoAZKAo1l94HGy1LG1RpruD1uQPhiponh5PGHSOf43Q",
1101 "sender_key":"vJfH7wiYmGos3C8U1XcJ//YWSmkueAYqrmUA6/ukfAM",
1102 "signing_key":{
1103 "ed25519":"JGgPQRuYj3ScMdPS+A0P+k/1qS9Hr3qeKXLscI+hS78"
1104 },
1105 "room_id":"!AZkqtjvtwPAuyNOXEt:matrix.org",
1106 "forwarding_chains":[
1107 ],
1108 "imported":true,
1109 "backed_up":true
1110 },
1111 {
1112 "pickle":"9RF6GBu9CvjZZx2hxIlw2gMdKs36LFhXhLTHAPrLSjT2OTbeE/jK263+iiFdSpF7Cblp/lXzljPKJN6sL8JGzoT7ssYh56nI0kKsp7/y88z+tTOH/5NYYTmZzHYw6yy4Cmaxh0pdHDs+RQpSSIe9jhF/EJJna5jcKYXxDY52m8H4LECQzVuDlYfblCr9zoYWhQrVhiRDGy7eLhk4X6Rp0Yoek4YUKcCQArDfZ/Vf43qfHUpOJgRpm5Oyj42HA/j4xZBb5U0Fmo6YHRPt0/KuWrDfpgJSGiN0zza7641IfADg8f3WdhlPAWMyri7k4vOZMBjlwFNcMpc0wM2TaTmbi2zqXEKZy9Oh/eJqBapFx0oNWaQ1VQ++iXxGUbZhwy7x2vd6UkqUTwYeym+aP23ee3TCtnNWN0aC",
1113 "sender_key":"EB9SC4jVAydKhM6/GcwMc9biKwVNywqW3TerNTrtb1M",
1114 "signing_key":{
1115 "ed25519":"1NXa5GyJ+p2ruAClEque+TL1VktrBzMW4dZFNfNGrvc"
1116 },
1117 "room_id":"!CWLUCoEWXSFyTCOtfL:matrix.org",
1118 "forwarding_chains":[],
1119 "imported":true,
1120 "backed_up":true
1121 }
1122 ],
1123 "pickle_key": [17, 36, 120, 74, 95, 78, 56, 36, 62, 123, 5, 105, 74,
1124 111, 70, 48, 51, 101, 66, 86, 116, 14, 114, 85, 85,
1125 92, 44, 71, 89, 99, 55, 74],
1126 "backup_version":"3",
1127 "backup_recovery_key":"EsTHScmRV5oT1WBhe2mj2Gn3odeYantZ4NEk7L51p6L8hrmB",
1128 "cross_signing":{
1129 "master_key":"trnK/dBv/M2x2zZt8lnORHQqmFHWvjYE6rdlAONRUPY",
1130 "self_signing_key":"SJhsj9jXC4hxhqS/1B3RZ65zWMHuF+1fUjWHrzVRh6w",
1131 "user_signing_key":"LPYrV11T9Prm4ZIUxrq2a8Y/F64R1+NaGNyo6GlXjGg"
1132 },
1133 "tracked_users":[
1134 "@ganfra146:matrix.org",
1135 "@this-is-me:matrix.org",
1136 "@Amandine:matrix.org",
1137 "@ganfra:matrix.org",
1138 "NotAUser%ID"
1139 ],
1140 "room_settings": {
1141 "!AZkqtjvtwPAuyNOXEt:matrix.org": {
1142 "algorithm": "OlmV1Curve25519AesSha2",
1143 "only_allow_trusted_devices": true
1144 },
1145 "!CWLUCoEWXSFyTCOtfL:matrix.org": {
1146 "algorithm": "MegolmV1AesSha2",
1147 "only_allow_trusted_devices": false
1148 },
1149 }
1150 });
1151
1152 let migration_data: MigrationData = serde_json::from_value(data)?;
1153
1154 let dir = tempdir()?;
1155 let path = dir
1156 .path()
1157 .to_str()
1158 .expect("Creating a string from the tempdir path should not fail")
1159 .to_owned();
1160
1161 migrate(migration_data, path.clone(), None, Box::new(|_, _| {}))?;
1162
1163 let machine = OlmMachine::new(
1164 "@ganfra146:matrix.org".to_owned(),
1165 "DEWRCMENGS".to_owned(),
1166 path,
1167 None,
1168 )?;
1169
1170 assert_eq!(
1171 machine.identity_keys()["ed25519"],
1172 "JGgPQRuYj3ScMdPS+A0P+k/1qS9Hr3qeKXLscI+hS78"
1173 );
1174
1175 let room_keys =
1176 machine.runtime.block_on(machine.inner.store().export_room_keys(|_| true))?;
1177 assert_eq!(room_keys.len(), 2);
1178
1179 let cross_signing_status = machine.cross_signing_status();
1180 assert!(cross_signing_status.has_master);
1181 assert!(cross_signing_status.has_user_signing);
1182 assert!(cross_signing_status.has_self_signing);
1183
1184 let backup_keys = machine.get_backup_keys()?;
1185 assert!(backup_keys.is_some());
1186
1187 let settings1 = machine.get_room_settings("!AZkqtjvtwPAuyNOXEt:matrix.org".into())?;
1188 assert_eq!(
1189 Some(RoomSettings {
1190 algorithm: EventEncryptionAlgorithm::OlmV1Curve25519AesSha2,
1191 #[cfg(feature = "experimental-encrypted-state-events")]
1192 encrypt_state_events: false,
1193 only_allow_trusted_devices: true
1194 }),
1195 settings1
1196 );
1197
1198 let settings2 = machine.get_room_settings("!CWLUCoEWXSFyTCOtfL:matrix.org".into())?;
1199 assert_eq!(
1200 Some(RoomSettings {
1201 algorithm: EventEncryptionAlgorithm::MegolmV1AesSha2,
1202 #[cfg(feature = "experimental-encrypted-state-events")]
1203 encrypt_state_events: false,
1204 only_allow_trusted_devices: false
1205 }),
1206 settings2
1207 );
1208
1209 let settings3 = machine.get_room_settings("!XYZ:matrix.org".into())?;
1210 assert!(settings3.is_none());
1211
1212 assert!(machine.is_user_tracked("@ganfra146:matrix.org".into()).unwrap());
1213 assert!(machine.is_user_tracked("@Amandine:matrix.org".into()).unwrap());
1214 assert!(machine.is_user_tracked("@this-is-me:matrix.org".into()).unwrap());
1215 assert!(machine.is_user_tracked("@ganfra:matrix.org".into()).unwrap());
1216
1217 Ok(())
1218 }
1219}