2020-09-02 17:03:27 +05:30
|
|
|
/*
|
|
|
|
Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import {OLM_ALGORITHM, MEGOLM_ALGORITHM} from "./e2ee/common.js";
|
|
|
|
|
|
|
|
// key to store in session store
|
|
|
|
const PENDING_ENCRYPTED_EVENTS = "pendingEncryptedDeviceEvents";
|
|
|
|
|
|
|
|
export class DeviceMessageHandler {
|
2020-09-02 17:54:38 +05:30
|
|
|
constructor({storage}) {
|
2020-09-02 17:03:27 +05:30
|
|
|
this._storage = storage;
|
2020-09-02 17:54:38 +05:30
|
|
|
this._olmDecryption = null;
|
|
|
|
this._megolmDecryption = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
enableEncryption({olmDecryption, megolmDecryption}) {
|
2020-09-02 17:03:27 +05:30
|
|
|
this._olmDecryption = olmDecryption;
|
2020-09-02 17:54:38 +05:30
|
|
|
this._megolmDecryption = megolmDecryption;
|
2020-09-02 17:03:27 +05:30
|
|
|
}
|
|
|
|
|
2020-09-24 14:22:56 +05:30
|
|
|
/**
|
|
|
|
* @return {bool} whether messages are waiting to be decrypted and `decryptPending` should be called.
|
|
|
|
*/
|
2020-09-02 17:03:27 +05:30
|
|
|
async writeSync(toDeviceEvents, txn) {
|
|
|
|
const encryptedEvents = toDeviceEvents.filter(e => e.type === "m.room.encrypted");
|
2020-09-24 14:22:56 +05:30
|
|
|
if (!encryptedEvents.length) {
|
|
|
|
return false;
|
|
|
|
}
|
2020-09-02 17:03:27 +05:30
|
|
|
// store encryptedEvents
|
2020-09-02 18:22:02 +05:30
|
|
|
let pendingEvents = await this._getPendingEvents(txn);
|
2020-09-02 17:03:27 +05:30
|
|
|
pendingEvents = pendingEvents.concat(encryptedEvents);
|
|
|
|
txn.session.set(PENDING_ENCRYPTED_EVENTS, pendingEvents);
|
|
|
|
// we don't handle anything other for now
|
2020-09-24 14:22:56 +05:30
|
|
|
return true;
|
2020-09-02 17:03:27 +05:30
|
|
|
}
|
|
|
|
|
2020-09-08 14:18:11 +05:30
|
|
|
/**
|
|
|
|
* [_writeDecryptedEvents description]
|
|
|
|
* @param {Array<DecryptionResult>} olmResults
|
|
|
|
* @param {[type]} txn [description]
|
|
|
|
* @return {[type]} [description]
|
|
|
|
*/
|
|
|
|
async _writeDecryptedEvents(olmResults, txn) {
|
|
|
|
const megOlmRoomKeysResults = olmResults.filter(r => {
|
|
|
|
return r.event?.type === "m.room_key" && r.event.content?.algorithm === MEGOLM_ALGORITHM;
|
2020-09-02 17:03:27 +05:30
|
|
|
});
|
2020-09-04 15:39:19 +05:30
|
|
|
let roomKeys;
|
2020-09-08 14:18:11 +05:30
|
|
|
if (megOlmRoomKeysResults.length) {
|
2020-09-08 14:25:38 +05:30
|
|
|
console.log("new room keys", megOlmRoomKeysResults);
|
2020-09-08 14:18:11 +05:30
|
|
|
roomKeys = await this._megolmDecryption.addRoomKeys(megOlmRoomKeysResults, txn);
|
2020-09-02 17:03:27 +05:30
|
|
|
}
|
2020-09-04 15:39:19 +05:30
|
|
|
return {roomKeys};
|
2020-09-02 17:03:27 +05:30
|
|
|
}
|
|
|
|
|
2020-09-23 21:04:25 +05:30
|
|
|
async _applyDecryptChanges(rooms, {roomKeys}) {
|
|
|
|
if (Array.isArray(roomKeys)) {
|
|
|
|
for (const roomKey of roomKeys) {
|
|
|
|
const room = rooms.get(roomKey.roomId);
|
|
|
|
// TODO: this is less parallized than it could be (like sync)
|
|
|
|
await room?.notifyRoomKey(roomKey);
|
2020-09-08 21:57:12 +05:30
|
|
|
}
|
2020-09-02 17:03:27 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// not safe to call multiple times without awaiting first call
|
2020-09-04 15:39:19 +05:30
|
|
|
async decryptPending(rooms) {
|
2020-09-02 17:54:38 +05:30
|
|
|
if (!this._olmDecryption) {
|
|
|
|
return;
|
|
|
|
}
|
2020-09-25 20:12:41 +05:30
|
|
|
const readTxn = this._storage.readTxn([this._storage.storeNames.session]);
|
2020-09-02 18:22:02 +05:30
|
|
|
const pendingEvents = await this._getPendingEvents(readTxn);
|
2020-09-03 19:00:54 +05:30
|
|
|
if (pendingEvents.length === 0) {
|
|
|
|
return;
|
|
|
|
}
|
2020-09-02 17:03:27 +05:30
|
|
|
// only know olm for now
|
|
|
|
const olmEvents = pendingEvents.filter(e => e.content?.algorithm === OLM_ALGORITHM);
|
|
|
|
const decryptChanges = await this._olmDecryption.decryptAll(olmEvents);
|
|
|
|
for (const err of decryptChanges.errors) {
|
|
|
|
console.warn("decryption failed for event", err, err.event);
|
|
|
|
}
|
2020-09-25 20:12:41 +05:30
|
|
|
const txn = this._storage.readWriteTxn([
|
2020-09-02 17:03:27 +05:30
|
|
|
// both to remove the pending events and to modify the olm account
|
|
|
|
this._storage.storeNames.session,
|
|
|
|
this._storage.storeNames.olmSessions,
|
2020-09-02 17:54:38 +05:30
|
|
|
this._storage.storeNames.inboundGroupSessions,
|
2020-09-02 17:03:27 +05:30
|
|
|
]);
|
|
|
|
let changes;
|
|
|
|
try {
|
2020-09-08 14:18:11 +05:30
|
|
|
changes = await this._writeDecryptedEvents(decryptChanges.results, txn);
|
2020-09-02 17:03:27 +05:30
|
|
|
decryptChanges.write(txn);
|
|
|
|
txn.session.remove(PENDING_ENCRYPTED_EVENTS);
|
|
|
|
} catch (err) {
|
|
|
|
txn.abort();
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
await txn.complete();
|
2020-09-23 21:04:25 +05:30
|
|
|
await this._applyDecryptChanges(rooms, changes);
|
2020-09-02 17:03:27 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
async _getPendingEvents(txn) {
|
|
|
|
return (await txn.session.get(PENDING_ENCRYPTED_EVENTS)) || [];
|
|
|
|
}
|
|
|
|
}
|