From b19817bb73afe480d12d5e1223e70cc0ddf7f065 Mon Sep 17 00:00:00 2001 From: Richard van der Hoff <1389908+richvdh@users.noreply.github.com> Date: Fri, 24 May 2024 12:10:52 +0100 Subject: [PATCH] Bump matrix-sdk-crypto-wasm to 5.0.0 (#4216) Slightly more involved than normal because it requires us to pass a backup version into OlmMachine.importBackedUpRoomKeys. On the other hand we can now re-enable the test that was disabled in #4214 due to matrix-org/matrix-rust-sdk#3447 Fixes: element-hq/element-web#27165 --- package.json | 2 +- spec/unit/rust-crypto/rust-crypto.spec.ts | 13 +++++++------ src/client.ts | 12 +++++++----- src/common-crypto/CryptoBackend.ts | 3 ++- src/crypto/index.ts | 6 +++++- src/rust-crypto/PerSessionKeyBackupDownloader.ts | 12 ++++++++---- src/rust-crypto/backup.ts | 7 ++++++- src/rust-crypto/rust-crypto.ts | 8 ++++++-- yarn.lock | 8 ++++---- 9 files changed, 46 insertions(+), 25 deletions(-) diff --git a/package.json b/package.json index a55e2ee3ea5..9bec27646fb 100644 --- a/package.json +++ b/package.json @@ -53,7 +53,7 @@ ], "dependencies": { "@babel/runtime": "^7.12.5", - "@matrix-org/matrix-sdk-crypto-wasm": "^4.9.0", + "@matrix-org/matrix-sdk-crypto-wasm": "^5.0.0", "another-json": "^0.2.0", "bs58": "^5.0.0", "content-type": "^1.0.4", diff --git a/spec/unit/rust-crypto/rust-crypto.spec.ts b/spec/unit/rust-crypto/rust-crypto.spec.ts index 90cd079912e..57c1066d593 100644 --- a/spec/unit/rust-crypto/rust-crypto.spec.ts +++ b/spec/unit/rust-crypto/rust-crypto.spec.ts @@ -1415,19 +1415,19 @@ describe("RustCrypto", () => { expect(await keyBackupStatusPromise).toBe(true); }); - // XXX: disabled until https://github.com/matrix-org/matrix-rust-sdk/issues/3447 is fixed - it.skip("does not back up keys that came from backup", async () => { + it("does not back up keys that came from backup", async () => { const rustCrypto = await makeTestRustCrypto(); const olmMachine: OlmMachine = rustCrypto["olmMachine"]; + const backupVersion = testData.SIGNED_BACKUP_DATA.version!; await olmMachine.enableBackupV1( (testData.SIGNED_BACKUP_DATA.auth_data as Curve25519AuthData).public_key, - testData.SIGNED_BACKUP_DATA.version!, + backupVersion, ); // we import two keys: one "from backup", and one "from export" const [backedUpRoomKey, exportedRoomKey] = testData.MEGOLM_SESSION_DATA_ARRAY; - await rustCrypto.importBackedUpRoomKeys([backedUpRoomKey]); + await rustCrypto.importBackedUpRoomKeys([backedUpRoomKey], backupVersion); await rustCrypto.importRoomKeys([exportedRoomKey]); // we ask for the keys that should be backed up @@ -1462,16 +1462,17 @@ describe("RustCrypto", () => { const rustCrypto = await makeTestRustCrypto(); const olmMachine: OlmMachine = rustCrypto["olmMachine"]; + const backupVersion = testData.SIGNED_BACKUP_DATA.version!; await olmMachine.enableBackupV1( (testData.SIGNED_BACKUP_DATA.auth_data as Curve25519AuthData).public_key, - testData.SIGNED_BACKUP_DATA.version!, + backupVersion, ); const backup = Array.from(testData.MEGOLM_SESSION_DATA_ARRAY); // in addition to correct keys, we restore an invalid key backup.push({ room_id: "!roomid", session_id: "sessionid" } as IMegolmSessionData); const progressCallback = jest.fn(); - await rustCrypto.importBackedUpRoomKeys(backup, { progressCallback }); + await rustCrypto.importBackedUpRoomKeys(backup, backupVersion, { progressCallback }); expect(progressCallback).toHaveBeenCalledWith({ total: 3, successes: 0, diff --git a/src/client.ts b/src/client.ts index 2e349213123..4200a6154d9 100644 --- a/src/client.ts +++ b/src/client.ts @@ -3863,12 +3863,13 @@ export class MatrixClient extends TypedEventEmitter { this.logger.warn("Error caching session backup key:", e); }) @@ -3922,7 +3923,8 @@ export class MatrixClient extends TypedEventEmitter { // We have a chunk of decrypted keys: import them try { - await this.cryptoBackend!.importBackedUpRoomKeys(chunk, { + const backupVersion = backupInfo.version!; + await this.cryptoBackend!.importBackedUpRoomKeys(chunk, backupVersion, { untrusted, }); totalImported += chunk.length; @@ -3952,7 +3954,7 @@ export class MatrixClient extends TypedEventEmitter; + importBackedUpRoomKeys(keys: IMegolmSessionData[], backupVersion: string, opts?: ImportRoomKeysOpts): Promise; } /** The methods which crypto implementations should expose to the Sync api diff --git a/src/crypto/index.ts b/src/crypto/index.ts index ff62c429c9f..bf8af76e380 100644 --- a/src/crypto/index.ts +++ b/src/crypto/index.ts @@ -1888,7 +1888,11 @@ export class Crypto extends TypedEventEmitter { + public importBackedUpRoomKeys( + keys: IMegolmSessionData[], + backupVersion: string, + opts: ImportRoomKeysOpts = {}, + ): Promise { opts.source = "backup"; return this.importRoomKeys(keys, opts); } diff --git a/src/rust-crypto/PerSessionKeyBackupDownloader.ts b/src/rust-crypto/PerSessionKeyBackupDownloader.ts index 7642d52f9d9..ad5a649c51f 100644 --- a/src/rust-crypto/PerSessionKeyBackupDownloader.ts +++ b/src/rust-crypto/PerSessionKeyBackupDownloader.ts @@ -57,10 +57,14 @@ class KeyDownloadRateLimitError extends Error { /** Details of a megolm session whose key we are trying to fetch. */ type SessionInfo = { roomId: string; megolmSessionId: string }; -/** Holds the current backup decryptor and version that should be used. */ +/** Holds the current backup decryptor and version that should be used. + * + * This is intended to be used as an immutable object (a new instance should be created if the configuration changes), + * and some of the logic relies on that, so the properties are marked as `readonly`. + */ type Configuration = { - backupVersion: string; - decryptor: BackupDecryptor; + readonly backupVersion: string; + readonly decryptor: BackupDecryptor; }; /** @@ -392,7 +396,7 @@ export class PerSessionKeyBackupDownloader { for (const k of keys) { k.room_id = sessionInfo.roomId; } - await this.backupManager.importBackedUpRoomKeys(keys); + await this.backupManager.importBackedUpRoomKeys(keys, configuration.backupVersion); } /** diff --git a/src/rust-crypto/backup.ts b/src/rust-crypto/backup.ts index 5c9c5772e2b..8eb84887448 100644 --- a/src/rust-crypto/backup.ts +++ b/src/rust-crypto/backup.ts @@ -239,7 +239,11 @@ export class RustBackupManager extends TypedEventEmitter { + public async importBackedUpRoomKeys( + keys: IMegolmSessionData[], + backupVersion: string, + opts?: ImportRoomKeysOpts, + ): Promise { const keysByRoom: Map> = new Map(); for (const key of keys) { const roomId = new RustSdkCryptoJs.RoomId(key.room_id); @@ -259,6 +263,7 @@ export class RustBackupManager extends TypedEventEmitter { - return await this.backupManager.importBackedUpRoomKeys(keys, opts); + public async importBackedUpRoomKeys( + keys: IMegolmSessionData[], + backupVersion: string, + opts?: ImportRoomKeysOpts, + ): Promise { + return await this.backupManager.importBackedUpRoomKeys(keys, backupVersion, opts); } /** diff --git a/yarn.lock b/yarn.lock index 5cb282f1b02..cf6d64c5b80 100644 --- a/yarn.lock +++ b/yarn.lock @@ -1772,10 +1772,10 @@ "@jridgewell/resolve-uri" "^3.1.0" "@jridgewell/sourcemap-codec" "^1.4.14" -"@matrix-org/matrix-sdk-crypto-wasm@^4.9.0": - version "4.10.0" - resolved "https://registry.yarnpkg.com/@matrix-org/matrix-sdk-crypto-wasm/-/matrix-sdk-crypto-wasm-4.10.0.tgz#324211b9bad3d2aa640800f62ba9478ce2845097" - integrity sha512-zOqKVAYPfzs6Hav/Km9F5xWwoQ0bxDuoUU0/121m03Fg2VnfcHk43TjKImZolFc7IlgXwVGoda9Pp9Z/eTVKJA== +"@matrix-org/matrix-sdk-crypto-wasm@^5.0.0": + version "5.0.0" + resolved "https://registry.yarnpkg.com/@matrix-org/matrix-sdk-crypto-wasm/-/matrix-sdk-crypto-wasm-5.0.0.tgz#f45a7bccaad218c05bcf9e7c8ca783c9d9a07af4" + integrity sha512-37ASjCKSTU5ycGfkP+LUXG4Ok6OAf6vE+1qU6uwWhe6FwadCS3vVWzJYd/3d9BQFwsx4GhFTIAXrW4iLG85rmQ== "@matrix-org/olm@3.2.15": version "3.2.15"