Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto: use memberlist to derive recipient list #143

Merged
merged 1 commit into from
Jun 22, 2016

Conversation

richvdh
Copy link
Member

@richvdh richvdh commented Jun 21, 2016

When we send an encrypted message with Olm, we need to know who to send it
to. Currently that is based on a user list passed to setRoomEncryption. We want
to be able to change the list as people join and leave the room; I also want to
not have to keep the member list in local storage.

So, use the member list at the point of enabling encryption to set up sessions,
and at the point of sending a message to encrypt the message.

Further work here includes:

  • updating the react-sdk not to bother setting the member list
  • monitoring for new users/devices in the room, and setting up new sessions
    with them

When we send an encrypted message with Olm, we need to know who to send it
to. Currently that is based on a user list passed to setRoomEncryption. We want
to be able to change the list as people join and leave the room; I also want to
not have to keep the member list in local storage.

So, use the member list at the point of enabling encryption to set up sessions,
and at the point of sending a message to encrypt the message.

Further work here includes:

 * updating the react-sdk not to bother setting the member list
 * monitoring for new users/devices in the room, and setting up new sessions
   with them
var self = this;
return this._http.authedRequestWithPrefix(
undefined, "POST", path, undefined, content,
httpApi.PREFIX_UNSTABLE
Copy link
Member

@dbkr dbkr Jun 22, 2016

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/keys/claim is still unstable?

Edit: turns out it is. We should probably comment that we're using an unstable API here.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can always grep for PREFIX_UNSTABLE, so we think this would be a bit redundant.

@dbkr dbkr assigned richvdh and unassigned dbkr Jun 22, 2016
@richvdh richvdh merged commit 32f7ca5 into develop Jun 22, 2016
@richvdh richvdh deleted the rav/room_encryption_state branch August 3, 2016 13:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants