Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Resend MatrixRTC encryption keys if a membership has changed #4343

Merged
merged 6 commits into from
Aug 14, 2024

Conversation

hughns
Copy link
Member

@hughns hughns commented Aug 9, 2024

This fixes element-hq/element-call#2415 by having call participants proactively sending a new io.element.call.encryption_keys room event with the same key if they detect that another participants has updated the membershipID or created_ts part of their call membership.

Checklist

  • Tests written for new code (and old code if feasible).
  • New or updated public/exported symbols have accurate TSDoc documentation.
  • Linter and other CI checks pass.
  • Sign-off given on the changes (see CONTRIBUTING.md).

Copy link

@fkwp fkwp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@hughns hughns requested a review from AndrewFerr August 9, 2024 11:22
src/matrixrtc/MatrixRTCSession.ts Outdated Show resolved Hide resolved
src/matrixrtc/MatrixRTCSession.ts Outdated Show resolved Hide resolved
src/matrixrtc/MatrixRTCSession.ts Show resolved Hide resolved
Should reduce unnecessary retransmits
src/matrixrtc/MatrixRTCSession.ts Outdated Show resolved Hide resolved
@hughns hughns added this pull request to the merge queue Aug 14, 2024
Merged via the queue into develop with commit c65ef03 Aug 14, 2024
26 checks passed
@hughns hughns deleted the hughns/rtc-resend-keys-on-membership-updates branch August 14, 2024 14:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Sender key distribution unreliable when running in embedded mode
3 participants