replace email processing reactions; update deps
This commit is contained in:
7
vendor/maunium.net/go/mautrix/crypto/cross_sign_store.go
generated
vendored
7
vendor/maunium.net/go/mautrix/crypto/cross_sign_store.go
generated
vendored
@@ -96,5 +96,12 @@ func (mach *OlmMachine) storeCrossSigningKeys(ctx context.Context, crossSigningK
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Clear internal cache so that it refreshes from crypto store
|
||||
if userID == mach.Client.UserID && mach.crossSigningPubkeys != nil {
|
||||
log.Debug().Msg("Resetting internal cross-signing key cache")
|
||||
mach.crossSigningPubkeys = nil
|
||||
mach.crossSigningPubkeysFetched = false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
2
vendor/maunium.net/go/mautrix/crypto/cross_sign_validation.go
generated
vendored
2
vendor/maunium.net/go/mautrix/crypto/cross_sign_validation.go
generated
vendored
@@ -32,7 +32,7 @@ func (mach *OlmMachine) ResolveTrustContext(ctx context.Context, device *id.Devi
|
||||
}
|
||||
theirMSK, ok := theirKeys[id.XSUsageMaster]
|
||||
if !ok {
|
||||
mach.machOrContextLog(ctx).Error().
|
||||
mach.machOrContextLog(ctx).Debug().
|
||||
Str("user_id", device.UserID.String()).
|
||||
Msg("Master key of user not found")
|
||||
return id.TrustStateUnset, nil
|
||||
|
||||
6
vendor/maunium.net/go/mautrix/crypto/keybackup.go
generated
vendored
6
vendor/maunium.net/go/mautrix/crypto/keybackup.go
generated
vendored
@@ -66,8 +66,10 @@ func (mach *OlmMachine) GetAndVerifyLatestKeyBackupVersion(ctx context.Context)
|
||||
var key id.Ed25519
|
||||
if keyName == crossSigningPubkeys.MasterKey.String() {
|
||||
key = crossSigningPubkeys.MasterKey
|
||||
} else if device, err := mach.GetOrFetchDevice(ctx, mach.Client.UserID, id.DeviceID(keyName)); err != nil {
|
||||
log.Warn().Err(err).Msg("Failed to fetch device")
|
||||
} else if device, err := mach.CryptoStore.GetDevice(ctx, mach.Client.UserID, id.DeviceID(keyName)); err != nil {
|
||||
return nil, fmt.Errorf("failed to get device %s/%s from store: %w", mach.Client.UserID, keyName, err)
|
||||
} else if device == nil {
|
||||
log.Warn().Err(err).Msg("Device does not exist, ignoring signature")
|
||||
continue
|
||||
} else if !mach.IsDeviceTrusted(device) {
|
||||
log.Warn().Err(err).Msg("Device is not trusted")
|
||||
|
||||
5
vendor/maunium.net/go/mautrix/crypto/keysharing.go
generated
vendored
5
vendor/maunium.net/go/mautrix/crypto/keysharing.go
generated
vendored
@@ -184,6 +184,11 @@ func (mach *OlmMachine) importForwardedRoomKey(ctx context.Context, evt *Decrypt
|
||||
MaxMessages: maxMessages,
|
||||
IsScheduled: content.IsScheduled,
|
||||
}
|
||||
existingIGS, _ := mach.CryptoStore.GetGroupSession(ctx, igs.RoomID, igs.SenderKey, igs.ID())
|
||||
if existingIGS != nil && existingIGS.Internal.FirstKnownIndex() <= igs.Internal.FirstKnownIndex() {
|
||||
// We already have an equivalent or better session in the store, so don't override it.
|
||||
return false
|
||||
}
|
||||
err = mach.CryptoStore.PutGroupSession(ctx, content.RoomID, content.SenderKey, content.SessionID, igs)
|
||||
if err != nil {
|
||||
log.Error().Err(err).Msg("Failed to store new inbound group session")
|
||||
|
||||
Reference in New Issue
Block a user