|
|
|
@ -204,7 +204,8 @@ TimelineModel::TimelineModel(TimelineViewManager *manager, QString room_id, QObj |
|
|
|
|
, room_id_(room_id) |
|
|
|
|
, manager_(manager) |
|
|
|
|
{ |
|
|
|
|
connect(this, |
|
|
|
|
connect( |
|
|
|
|
this, |
|
|
|
|
&TimelineModel::redactionFailed, |
|
|
|
|
this, |
|
|
|
|
[](const QString &msg) { emit ChatPage::instance()->showNotification(msg); }, |
|
|
|
@ -217,13 +218,13 @@ TimelineModel::TimelineModel(TimelineViewManager *manager, QString room_id, QObj |
|
|
|
|
Qt::QueuedConnection); |
|
|
|
|
connect(this, &TimelineModel::addPendingMessageToStore, &events, &EventStore::addPending); |
|
|
|
|
|
|
|
|
|
connect(&events, |
|
|
|
|
connect( |
|
|
|
|
&events, |
|
|
|
|
&EventStore::dataChanged, |
|
|
|
|
this, |
|
|
|
|
[this](int from, int to) { |
|
|
|
|
nhlog::ui()->debug("data changed {} to {}", |
|
|
|
|
events.size() - to - 1, |
|
|
|
|
events.size() - from - 1); |
|
|
|
|
nhlog::ui()->debug( |
|
|
|
|
"data changed {} to {}", events.size() - to - 1, events.size() - from - 1); |
|
|
|
|
emit dataChanged(index(events.size() - to - 1, 0), |
|
|
|
|
index(events.size() - from - 1, 0)); |
|
|
|
|
}, |
|
|
|
@ -916,10 +917,20 @@ TimelineModel::sendEncryptedMessage(mtx::events::RoomEvent<T> msg, mtx::events:: |
|
|
|
|
OutboundGroupSessionData session_data; |
|
|
|
|
session_data.session_id = session_id; |
|
|
|
|
session_data.session_key = session_key; |
|
|
|
|
session_data.message_index = 0; // TODO Update me
|
|
|
|
|
session_data.message_index = 0; |
|
|
|
|
cache::saveOutboundMegolmSession( |
|
|
|
|
room_id, session_data, std::move(outbound_session)); |
|
|
|
|
|
|
|
|
|
{ |
|
|
|
|
MegolmSessionIndex index; |
|
|
|
|
index.room_id = room_id; |
|
|
|
|
index.session_id = session_id; |
|
|
|
|
index.sender_key = olm::client()->identity_keys().curve25519; |
|
|
|
|
auto megolm_session = |
|
|
|
|
olm::client()->init_inbound_group_session(session_key); |
|
|
|
|
cache::saveInboundMegolmSession(index, std::move(megolm_session)); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
const auto members = cache::roomMembers(room_id); |
|
|
|
|
nhlog::ui()->info("retrieved {} members for {}", members.size(), room_id); |
|
|
|
|
|
|
|
|
@ -961,19 +972,23 @@ TimelineModel::sendEncryptedMessage(mtx::events::RoomEvent<T> msg, mtx::events:: |
|
|
|
|
return; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
for (const auto &user : res.device_keys) { |
|
|
|
|
// Mapping from a device_id with valid identity keys to the
|
|
|
|
|
// generated room_key event used for sharing the megolm session.
|
|
|
|
|
std::map<std::string, std::string> room_key_msgs; |
|
|
|
|
std::map<std::string, DevicePublicKeys> deviceKeys; |
|
|
|
|
mtx::requests::ClaimKeys claim_keys; |
|
|
|
|
|
|
|
|
|
room_key_msgs.clear(); |
|
|
|
|
deviceKeys.clear(); |
|
|
|
|
// Mapping from user id to a device_id with valid identity keys to the
|
|
|
|
|
// generated room_key event used for sharing the megolm session.
|
|
|
|
|
std::map<std::string, std::map<std::string, std::string>> room_key_msgs; |
|
|
|
|
std::map<std::string, std::map<std::string, DevicePublicKeys>> deviceKeys; |
|
|
|
|
|
|
|
|
|
for (const auto &user : res.device_keys) { |
|
|
|
|
for (const auto &dev : user.second) { |
|
|
|
|
const auto user_id = ::UserId(dev.second.user_id); |
|
|
|
|
const auto device_id = DeviceId(dev.second.device_id); |
|
|
|
|
|
|
|
|
|
if (user_id.get() == |
|
|
|
|
http::client()->user_id().to_string() && |
|
|
|
|
device_id.get() == http::client()->device_id()) |
|
|
|
|
continue; |
|
|
|
|
|
|
|
|
|
const auto device_keys = dev.second.keys; |
|
|
|
|
const auto curveKey = "curve25519:" + device_id.get(); |
|
|
|
|
const auto edKey = "ed25519:" + device_id.get(); |
|
|
|
@ -1015,42 +1030,25 @@ TimelineModel::sendEncryptedMessage(mtx::events::RoomEvent<T> msg, mtx::events:: |
|
|
|
|
user_id, pks.ed25519, megolm_payload) |
|
|
|
|
.dump(); |
|
|
|
|
|
|
|
|
|
room_key_msgs.emplace(device_id, room_key); |
|
|
|
|
deviceKeys.emplace(device_id, pks); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
std::vector<std::string> valid_devices; |
|
|
|
|
valid_devices.reserve(room_key_msgs.size()); |
|
|
|
|
for (auto const &d : room_key_msgs) { |
|
|
|
|
valid_devices.push_back(d.first); |
|
|
|
|
room_key_msgs[user_id].emplace(device_id, room_key); |
|
|
|
|
deviceKeys[user_id].emplace(device_id, pks); |
|
|
|
|
claim_keys.one_time_keys[user.first][device_id] = |
|
|
|
|
mtx::crypto::SIGNED_CURVE25519; |
|
|
|
|
|
|
|
|
|
nhlog::net()->info("{}", d.first); |
|
|
|
|
nhlog::net()->info(" curve25519 {}", |
|
|
|
|
deviceKeys.at(d.first).curve25519); |
|
|
|
|
nhlog::net()->info(" ed25519 {}", |
|
|
|
|
deviceKeys.at(d.first).ed25519); |
|
|
|
|
nhlog::net()->info("{}", device_id.get()); |
|
|
|
|
nhlog::net()->info(" curve25519 {}", pks.curve25519); |
|
|
|
|
nhlog::net()->info(" ed25519 {}", pks.ed25519); |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
nhlog::net()->info( |
|
|
|
|
"sending claim request for user {} with {} devices", |
|
|
|
|
user.first, |
|
|
|
|
valid_devices.size()); |
|
|
|
|
|
|
|
|
|
http::client()->claim_keys( |
|
|
|
|
user.first, |
|
|
|
|
valid_devices, |
|
|
|
|
http::client()->claim_keys(claim_keys, |
|
|
|
|
std::bind(&TimelineModel::handleClaimedKeys, |
|
|
|
|
this, |
|
|
|
|
keeper, |
|
|
|
|
room_key_msgs, |
|
|
|
|
deviceKeys, |
|
|
|
|
user.first, |
|
|
|
|
std::placeholders::_1, |
|
|
|
|
std::placeholders::_2)); |
|
|
|
|
|
|
|
|
|
// TODO: Wait before sending the next batch of requests.
|
|
|
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
|
|
|
|
} |
|
|
|
|
}); |
|
|
|
|
|
|
|
|
|
// TODO: Let the user know about the errors.
|
|
|
|
@ -1068,10 +1066,10 @@ TimelineModel::sendEncryptedMessage(mtx::events::RoomEvent<T> msg, mtx::events:: |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
void |
|
|
|
|
TimelineModel::handleClaimedKeys(std::shared_ptr<StateKeeper> keeper, |
|
|
|
|
const std::map<std::string, std::string> &room_keys, |
|
|
|
|
const std::map<std::string, DevicePublicKeys> &pks, |
|
|
|
|
const std::string &user_id, |
|
|
|
|
TimelineModel::handleClaimedKeys( |
|
|
|
|
std::shared_ptr<StateKeeper> keeper, |
|
|
|
|
const std::map<std::string, std::map<std::string, std::string>> &room_keys, |
|
|
|
|
const std::map<std::string, std::map<std::string, DevicePublicKeys>> &pks, |
|
|
|
|
const mtx::responses::ClaimKeys &res, |
|
|
|
|
mtx::http::RequestErr err) |
|
|
|
|
{ |
|
|
|
@ -1083,65 +1081,53 @@ TimelineModel::handleClaimedKeys(std::shared_ptr<StateKeeper> keeper, |
|
|
|
|
return; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
nhlog::net()->debug("claimed keys for {}", user_id); |
|
|
|
|
|
|
|
|
|
if (res.one_time_keys.size() == 0) { |
|
|
|
|
nhlog::net()->debug("no one-time keys found for user_id: {}", user_id); |
|
|
|
|
return; |
|
|
|
|
} |
|
|
|
|
// Payload with all the to_device message to be sent.
|
|
|
|
|
nlohmann::json body; |
|
|
|
|
|
|
|
|
|
if (res.one_time_keys.find(user_id) == res.one_time_keys.end()) { |
|
|
|
|
for (const auto &[user_id, retrieved_devices] : res.one_time_keys) { |
|
|
|
|
nhlog::net()->debug("claimed keys for {}", user_id); |
|
|
|
|
if (retrieved_devices.size() == 0) { |
|
|
|
|
nhlog::net()->debug("no one-time keys found for user_id: {}", user_id); |
|
|
|
|
return; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
auto retrieved_devices = res.one_time_keys.at(user_id); |
|
|
|
|
|
|
|
|
|
// Payload with all the to_device message to be sent.
|
|
|
|
|
json body; |
|
|
|
|
body["messages"][user_id] = json::object(); |
|
|
|
|
|
|
|
|
|
for (const auto &rd : retrieved_devices) { |
|
|
|
|
const auto device_id = rd.first; |
|
|
|
|
|
|
|
|
|
nhlog::net()->debug("{} : \n {}", device_id, rd.second.dump(2)); |
|
|
|
|
|
|
|
|
|
// TODO: Verify signatures
|
|
|
|
|
auto otk = rd.second.begin()->at("key"); |
|
|
|
|
|
|
|
|
|
if (pks.find(device_id) == pks.end()) { |
|
|
|
|
nhlog::net()->critical("couldn't find public key for device: {}", |
|
|
|
|
device_id); |
|
|
|
|
continue; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
auto id_key = pks.at(device_id).curve25519; |
|
|
|
|
auto id_key = pks.at(user_id).at(device_id).curve25519; |
|
|
|
|
auto s = olm::client()->create_outbound_session(id_key, otk); |
|
|
|
|
|
|
|
|
|
if (room_keys.find(device_id) == room_keys.end()) { |
|
|
|
|
nhlog::net()->critical("couldn't find m.room_key for device: {}", |
|
|
|
|
device_id); |
|
|
|
|
continue; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
auto device_msg = olm::client()->create_olm_encrypted_content( |
|
|
|
|
s.get(), room_keys.at(device_id), pks.at(device_id).curve25519); |
|
|
|
|
s.get(), |
|
|
|
|
room_keys.at(user_id).at(device_id), |
|
|
|
|
pks.at(user_id).at(device_id).curve25519); |
|
|
|
|
|
|
|
|
|
try { |
|
|
|
|
cache::saveOlmSession(id_key, std::move(s)); |
|
|
|
|
} catch (const lmdb::error &e) { |
|
|
|
|
nhlog::db()->critical("failed to save outbound olm session: {}", e.what()); |
|
|
|
|
} catch (const mtx::crypto::olm_exception &e) { |
|
|
|
|
nhlog::crypto()->critical("failed to pickle outbound olm session: {}", |
|
|
|
|
nhlog::db()->critical("failed to save outbound olm session: {}", |
|
|
|
|
e.what()); |
|
|
|
|
} catch (const mtx::crypto::olm_exception &e) { |
|
|
|
|
nhlog::crypto()->critical( |
|
|
|
|
"failed to pickle outbound olm session: {}", e.what()); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
body["messages"][user_id][device_id] = device_msg; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
nhlog::net()->info("send_to_device: {}", user_id); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
http::client()->send_to_device( |
|
|
|
|
"m.room.encrypted", body, [keeper](mtx::http::RequestErr err) { |
|
|
|
|
mtx::events::to_string(mtx::events::EventType::RoomEncrypted), |
|
|
|
|
http::client()->generate_txn_id(), |
|
|
|
|
body, |
|
|
|
|
[keeper](mtx::http::RequestErr err) { |
|
|
|
|
if (err) { |
|
|
|
|
nhlog::net()->warn("failed to send " |
|
|
|
|
"send_to_device " |
|
|
|
|