core_crypto/mls/conversation/
proposal.rsuse openmls::{binary_tree::LeafNodeIndex, framing::MlsMessageOut, key_packages::KeyPackageIn, prelude::LeafNode};
use mls_crypto_provider::MlsCryptoProvider;
use crate::{
e2e_identity::init_certificates::NewCrlDistributionPoint, mls::credential::crl::get_new_crl_distribution_points,
};
use crate::{
mls::credential::crl::extract_crl_uris_from_credentials,
prelude::{Client, MlsConversation, MlsProposalRef},
CryptoError, CryptoResult, MlsError,
};
impl MlsConversation {
#[cfg_attr(test, crate::durable)]
pub async fn propose_add_member(
&mut self,
client: &Client,
backend: &MlsCryptoProvider,
key_package: KeyPackageIn,
) -> CryptoResult<MlsProposalBundle> {
let signer = &self
.find_current_credential_bundle(client)
.await
.map_err(|_| CryptoError::IdentityInitializationError)?
.signature_key;
let crl_new_distribution_points = get_new_crl_distribution_points(
backend,
extract_crl_uris_from_credentials(std::iter::once(key_package.credential().mls_credential()))?,
)
.await?;
let (proposal, proposal_ref) = self
.group
.propose_add_member(backend, signer, key_package)
.await
.map_err(MlsError::from)?;
let proposal = MlsProposalBundle {
proposal,
proposal_ref: proposal_ref.into(),
crl_new_distribution_points,
};
self.persist_group_when_changed(&backend.keystore(), false).await?;
Ok(proposal)
}
#[cfg_attr(test, crate::durable)]
pub async fn propose_remove_member(
&mut self,
client: &Client,
backend: &MlsCryptoProvider,
member: LeafNodeIndex,
) -> CryptoResult<MlsProposalBundle> {
let signer = &self
.find_current_credential_bundle(client)
.await
.map_err(|_| CryptoError::IdentityInitializationError)?
.signature_key;
let proposal = self
.group
.propose_remove_member(backend, signer, member)
.map_err(MlsError::from)
.map_err(CryptoError::from)
.map(MlsProposalBundle::from)?;
self.persist_group_when_changed(&backend.keystore(), false).await?;
Ok(proposal)
}
#[cfg_attr(test, crate::durable)]
pub async fn propose_self_update(
&mut self,
client: &Client,
backend: &MlsCryptoProvider,
) -> CryptoResult<MlsProposalBundle> {
self.propose_explicit_self_update(client, backend, None).await
}
#[cfg_attr(test, crate::durable)]
pub async fn propose_explicit_self_update(
&mut self,
client: &Client,
backend: &MlsCryptoProvider,
leaf_node: Option<LeafNode>,
) -> CryptoResult<MlsProposalBundle> {
let msg_signer = &self
.find_current_credential_bundle(client)
.await
.map_err(|_| CryptoError::IdentityInitializationError)?
.signature_key;
let proposal = if let Some(leaf_node) = leaf_node {
let leaf_node_signer = &self.find_most_recent_credential_bundle(client).await?.signature_key;
self.group
.propose_explicit_self_update(backend, msg_signer, leaf_node, leaf_node_signer)
.await
} else {
self.group.propose_self_update(backend, msg_signer).await
}
.map_err(MlsError::from)
.map(MlsProposalBundle::from)?;
self.persist_group_when_changed(&backend.keystore(), false).await?;
Ok(proposal)
}
}
#[derive(Debug)]
pub struct MlsProposalBundle {
pub proposal: MlsMessageOut,
pub proposal_ref: MlsProposalRef,
pub crl_new_distribution_points: NewCrlDistributionPoint,
}
impl From<(MlsMessageOut, openmls::prelude::hash_ref::ProposalRef)> for MlsProposalBundle {
fn from((proposal, proposal_ref): (MlsMessageOut, openmls::prelude::hash_ref::ProposalRef)) -> Self {
Self {
proposal,
proposal_ref: proposal_ref.into(),
crl_new_distribution_points: None.into(),
}
}
}
impl MlsProposalBundle {
#[allow(clippy::type_complexity)]
pub fn to_bytes(self) -> CryptoResult<(Vec<u8>, Vec<u8>, NewCrlDistributionPoint)> {
use openmls::prelude::TlsSerializeTrait as _;
let proposal = self.proposal.tls_serialize_detached().map_err(MlsError::from)?;
let proposal_ref = self.proposal_ref.to_bytes();
Ok((proposal, proposal_ref, self.crl_new_distribution_points))
}
}
#[cfg(test)]
mod tests {
use itertools::Itertools;
use openmls::prelude::SignaturePublicKey;
use wasm_bindgen_test::*;
use crate::{prelude::MlsCommitBundle, test_utils::*};
use super::*;
wasm_bindgen_test_configure!(run_in_browser);
mod propose_add_members {
use super::*;
#[apply(all_cred_cipher)]
#[wasm_bindgen_test]
async fn can_propose_adding_members_to_conversation(case: TestCase) {
run_test_with_client_ids(
case.clone(),
["alice", "bob", "charlie"],
move |[mut alice_central, bob_central, mut charlie_central]| {
Box::pin(async move {
let id = conversation_id();
alice_central
.context
.new_conversation(&id, case.credential_type, case.cfg.clone())
.await
.unwrap();
alice_central.invite_all(&case, &id, [&bob_central]).await.unwrap();
let charlie_kp = charlie_central.get_one_key_package(&case).await;
assert!(alice_central.pending_proposals(&id).await.is_empty());
let proposal = alice_central
.context
.new_add_proposal(&id, charlie_kp)
.await
.unwrap()
.proposal;
assert_eq!(alice_central.pending_proposals(&id).await.len(), 1);
bob_central
.context
.decrypt_message(&id, proposal.to_bytes().unwrap())
.await
.unwrap();
let MlsCommitBundle { commit, welcome, .. } = bob_central
.context
.commit_pending_proposals(&id)
.await
.unwrap()
.unwrap();
bob_central.context.commit_accepted(&id).await.unwrap();
assert_eq!(bob_central.get_conversation_unchecked(&id).await.members().len(), 3);
alice_central
.context
.decrypt_message(&id, commit.to_bytes().unwrap())
.await
.unwrap();
assert_eq!(alice_central.get_conversation_unchecked(&id).await.members().len(), 3);
charlie_central
.try_join_from_welcome(
&id,
welcome.unwrap().into(),
case.custom_cfg(),
vec![&alice_central, &bob_central],
)
.await
.unwrap();
assert_eq!(charlie_central.get_conversation_unchecked(&id).await.members().len(), 3);
})
},
)
.await
}
}
mod propose_remove_members {
use super::*;
#[apply(all_cred_cipher)]
#[wasm_bindgen_test]
async fn can_propose_removing_members_from_conversation(case: TestCase) {
run_test_with_client_ids(
case.clone(),
["alice", "bob", "charlie"],
move |[mut alice_central, bob_central, charlie_central]| {
Box::pin(async move {
let id = conversation_id();
alice_central
.context
.new_conversation(&id, case.credential_type, case.cfg.clone())
.await
.unwrap();
alice_central
.invite_all(&case, &id, [&bob_central, &charlie_central])
.await
.unwrap();
assert!(alice_central.pending_proposals(&id).await.is_empty());
let proposal = alice_central
.context
.new_remove_proposal(&id, charlie_central.get_client_id().await)
.await
.unwrap()
.proposal;
assert_eq!(alice_central.pending_proposals(&id).await.len(), 1);
bob_central
.context
.decrypt_message(&id, proposal.to_bytes().unwrap())
.await
.unwrap();
let commit = bob_central
.context
.commit_pending_proposals(&id)
.await
.unwrap()
.unwrap()
.commit;
bob_central.context.commit_accepted(&id).await.unwrap();
assert_eq!(bob_central.get_conversation_unchecked(&id).await.members().len(), 2);
alice_central
.context
.decrypt_message(&id, commit.to_bytes().unwrap())
.await
.unwrap();
assert_eq!(alice_central.get_conversation_unchecked(&id).await.members().len(), 2);
})
},
)
.await
}
}
mod propose_self_update {
use super::*;
#[apply(all_cred_cipher)]
#[wasm_bindgen_test]
async fn can_propose_updating(case: TestCase) {
run_test_with_client_ids(case.clone(), ["alice", "bob"], move |[alice_central, bob_central]| {
Box::pin(async move {
let id = conversation_id();
alice_central
.context
.new_conversation(&id, case.credential_type, case.cfg.clone())
.await
.unwrap();
alice_central.invite_all(&case, &id, [&bob_central]).await.unwrap();
let bob_keys = bob_central
.get_conversation_unchecked(&id)
.await
.signature_keys()
.collect::<Vec<SignaturePublicKey>>();
let alice_keys = alice_central
.get_conversation_unchecked(&id)
.await
.signature_keys()
.collect::<Vec<SignaturePublicKey>>();
assert!(alice_keys.iter().all(|a_key| bob_keys.contains(a_key)));
let alice_key = alice_central
.encryption_key_of(&id, alice_central.get_client_id().await)
.await;
let proposal = alice_central.context.new_update_proposal(&id).await.unwrap().proposal;
bob_central
.context
.decrypt_message(&id, proposal.to_bytes().unwrap())
.await
.unwrap();
let commit = bob_central
.context
.commit_pending_proposals(&id)
.await
.unwrap()
.unwrap()
.commit;
assert!(bob_central
.get_conversation_unchecked(&id)
.await
.encryption_keys()
.contains(&alice_key));
bob_central.context.commit_accepted(&id).await.unwrap();
assert!(!bob_central
.get_conversation_unchecked(&id)
.await
.encryption_keys()
.contains(&alice_key));
assert!(alice_central
.get_conversation_unchecked(&id)
.await
.encryption_keys()
.contains(&alice_key));
alice_central
.context
.decrypt_message(&id, commit.to_bytes().unwrap())
.await
.unwrap();
assert!(!alice_central
.get_conversation_unchecked(&id)
.await
.encryption_keys()
.contains(&alice_key));
assert!(alice_central.try_talk_to(&id, &bob_central).await.is_ok());
})
})
.await;
}
}
mod delivery_semantics {
use super::*;
#[apply(all_cred_cipher)]
#[wasm_bindgen_test]
async fn should_prevent_out_of_order_proposals(case: TestCase) {
run_test_with_client_ids(case.clone(), ["alice", "bob"], move |[alice_central, bob_central]| {
Box::pin(async move {
let id = conversation_id();
alice_central
.context
.new_conversation(&id, case.credential_type, case.cfg.clone())
.await
.unwrap();
alice_central.invite_all(&case, &id, [&bob_central]).await.unwrap();
let proposal = alice_central.context.new_update_proposal(&id).await.unwrap().proposal;
bob_central
.context
.decrypt_message(&id, &proposal.to_bytes().unwrap())
.await
.unwrap();
bob_central.context.commit_pending_proposals(&id).await.unwrap();
bob_central.context.commit_accepted(&id).await.unwrap();
let past_proposal = bob_central
.context
.decrypt_message(&id, &proposal.to_bytes().unwrap())
.await;
assert!(matches!(past_proposal.unwrap_err(), CryptoError::StaleProposal));
})
})
.await;
}
}
}