State-reset and security mitigations.

Upgrade Ruma to present.

The following are intentionally benign for activation in a later commit:

- Hydra backports not default.
- Room version 12 not default.
- Room version 12 not listed as stable.

Do not enable them manually or you can brick your database.

Signed-off-by: Jason Volk <jason@zemos.net>
This commit is contained in:
Jason Volk
2025-06-29 03:33:29 +00:00
parent 2c6dd78502
commit 628597c318
134 changed files with 14961 additions and 4935 deletions

View File

@@ -1,8 +1,8 @@
use std::borrow::Borrow;
use ruma::{
CanonicalJsonObject, RoomVersionId, ServerName, ServerSigningKeyId,
api::federation::discovery::VerifyKey,
CanonicalJsonObject, ServerName, ServerSigningKeyId, api::federation::discovery::VerifyKey,
room_version_rules::RoomVersionRules,
};
use tuwunel_core::{Err, Result, implement};
@@ -12,11 +12,11 @@ use super::{PubKeyMap, PubKeys, extract_key};
pub async fn get_event_keys(
&self,
object: &CanonicalJsonObject,
version: &RoomVersionId,
version: &RoomVersionRules,
) -> Result<PubKeyMap> {
use ruma::signatures::required_keys;
let required = match required_keys(object, version) {
let required = match required_keys(object, &version.signatures) {
| Ok(required) => required,
| Err(e) => {
return Err!(BadServerResponse("Failed to determine keys required to verify: {e}"));