Skip to content

Commit

Permalink
crypto: Include event timestamp in decryption failure logs
Browse files Browse the repository at this point in the history
Co-authored-by: Benjamin Bouvier <[email protected]>
Signed-off-by: Richard van der Hoff <[email protected]>
  • Loading branch information
richvdh and bnjbvr authored Mar 11, 2024
1 parent 899e4db commit 1ea1632
Show file tree
Hide file tree
Showing 5 changed files with 74 additions and 1 deletion.
1 change: 1 addition & 0 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions crates/matrix-sdk-crypto/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,9 @@ Additions:
- Add new API `store::Store::export_room_keys_stream` that provides room
keys on demand.

- Include event timestamps on logs from event decryption.
([#3194](https://github.com/matrix-org/matrix-rust-sdk/pull/3194))

# 0.7.0

- Add method to mark a list of inbound group sessions as backed up:
Expand Down
1 change: 1 addition & 0 deletions crates/matrix-sdk-crypto/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ serde = { workspace = true, features = ["derive", "rc"] }
serde_json = { workspace = true }
sha2 = { workspace = true }
subtle = "2.5.0"
time = { version = "0.3.34", features = ["formatting"] }
tokio-stream = { workspace = true, features = ["sync"] }
tokio = { workspace = true }
thiserror = { workspace = true }
Expand Down
8 changes: 7 additions & 1 deletion crates/matrix-sdk-crypto/src/machine.rs
Original file line number Diff line number Diff line change
Expand Up @@ -88,6 +88,7 @@ use crate::{
},
EventEncryptionAlgorithm, Signatures,
},
utilities::timestamp_to_iso8601,
verification::{Verification, VerificationMachine, VerificationRequest},
CrossSigningKeyExport, CryptoStoreError, KeysQueryRequest, LocalTrust, ReadOnlyDevice,
RoomKeyImportResult, SignatureError, ToDeviceRequest,
Expand Down Expand Up @@ -1534,7 +1535,7 @@ impl OlmMachine {
/// * `event` - The event that should be decrypted.
///
/// * `room_id` - The ID of the room where the event was sent to.
#[instrument(skip_all, fields(?room_id, event_id, sender, algorithm, session_id, sender_key))]
#[instrument(skip_all, fields(?room_id, event_id, origin_server_ts, sender, algorithm, session_id, sender_key))]
pub async fn decrypt_room_event(
&self,
event: &Raw<EncryptedEvent>,
Expand All @@ -1545,6 +1546,11 @@ impl OlmMachine {
tracing::Span::current()
.record("sender", debug(&event.sender))
.record("event_id", debug(&event.event_id))
.record(
"origin_server_ts",
timestamp_to_iso8601(event.origin_server_ts)
.unwrap_or_else(|| "<out of range>".to_owned()),
)
.record("algorithm", debug(event.content.algorithm()));

let content: SupportedEventEncryptionSchemes<'_> = match &event.content.scheme {
Expand Down
62 changes: 62 additions & 0 deletions crates/matrix-sdk-crypto/src/utilities.rs
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,14 @@
// See the License for the specific language governing permissions and
// limitations under the License.

use std::num::NonZeroU8;

use ruma::MilliSecondsSinceUnixEpoch;
use time::{
format_description::well_known::{iso8601, Iso8601},
OffsetDateTime,
};

#[cfg(test)]
pub(crate) fn json_convert<T, U>(value: &T) -> serde_json::Result<U>
where
Expand All @@ -21,3 +29,57 @@ where
let json = serde_json::to_string(value)?;
serde_json::from_str(&json)
}

const ISO8601_WITH_MILLIS: iso8601::EncodedConfig = iso8601::Config::DEFAULT
.set_time_precision(iso8601::TimePrecision::Second { decimal_digits: NonZeroU8::new(3) })
.encode();

/// Format the given timestamp into a human-readable timestamp.
///
/// # Returns
///
/// Provided the timestamp fits within an `OffsetDateTime` (ie, it is on or
/// before year 9999), a string that looks like `1970-01-01T00:00:00.000Z`.
/// Otherwise, `None`.
pub fn timestamp_to_iso8601(ts: MilliSecondsSinceUnixEpoch) -> Option<String> {
let nanos_since_epoch = i128::from(ts.get()) * 1_000_000;

// OffsetDateTime has a max year of 9999, whereas MilliSecondsSinceUnixEpoch has
// a max year of 285427, so `from_unix_timestamp_nanos` can overflow for very
// large timestamps. (The Y10K problem!)
let dt = OffsetDateTime::from_unix_timestamp_nanos(nanos_since_epoch).ok()?;

// SAFETY: `format` can fail if:
// * The input lacks information on a component we have asked it to format
// (eg, it is given a `Time` and we ask it for a date), or
// * The input contains an invalid component (eg 30th February), or
// * An `io::Error` is raised internally.
//
// The first two cannot occur because we know we are giving it a valid
// OffsetDateTime that has all the components we are asking it to print.
//
// The third should not occur because we are formatting a short string to an
// in-memory buffer.

Some(dt.format(&Iso8601::<ISO8601_WITH_MILLIS>).unwrap())
}

#[cfg(test)]
pub(crate) mod tests {
use ruma::{MilliSecondsSinceUnixEpoch, UInt};

use super::timestamp_to_iso8601;

#[test]
fn test_timestamp_to_iso8601() {
assert_eq!(
timestamp_to_iso8601(MilliSecondsSinceUnixEpoch(UInt::new_saturating(0))),
Some("1970-01-01T00:00:00.000Z".to_owned())
);
assert_eq!(
timestamp_to_iso8601(MilliSecondsSinceUnixEpoch(UInt::new_saturating(1709657033012))),
Some("2024-03-05T16:43:53.012Z".to_owned())
);
assert_eq!(timestamp_to_iso8601(MilliSecondsSinceUnixEpoch(UInt::MAX)), None);
}
}

0 comments on commit 1ea1632

Please sign in to comment.