Skip to content

Commit

Permalink
release: v1.0.0-rc.22
Browse files Browse the repository at this point in the history
  • Loading branch information
beltram committed Dec 13, 2023
1 parent 9f1a6dc commit 64e483e
Show file tree
Hide file tree
Showing 11 changed files with 67 additions and 19 deletions.
35 changes: 35 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,41 @@ Platform support legends:
* Note: the papercuts will majorly be with the build process. Things might be very rough to integrate as no polish at all has been given yet.
* ❌ = tier 3 support. It doesn't work just yet, but we plan to make it work.


## [1.0.0-rc.22] - 2023-12-13

<details>
<summary>git-conventional changelog</summary>

### Bug Fixes

- README mentions a task which doesn't exist ([#445](https://github.com/wireapp/core-crypto/issues/445))
- Remove unnecessary boxing of values before persisting them in IndexedDb

### Features

- [**breaking**] Remove 'clientId' from activation & rotate enrollment now that we expect a specific ClientId format
- [**breaking**] Add `get_credential_in_use()` to check the e2ei state from a GroupInfo
- [**breaking**] Rename `E2eiConversationState::Degraded` in to `E2eiConversationState::NotVerified`
- [**breaking**] Managed OIDC refreshToken (wpb-5012)

### Miscellaneous Tasks

- Remove unused 'MlsSignatureKeyPairExt' trait and 'get_indexed' method
- Streamline "collection" in wasm storage
- WasmEncryptedStorage::get_many was not used

### Testing

- Verify that clients can create conversation with x509 credentials

</details>

* feat(e2ei)!: manage OIDC refreshToken in CoreCrypto's encrypted-at-rest store. As a consequence, some methods went async (all the enrollment ones in WASM). The refreshToken has to be supplied in `newOidcChallengeRequest()` and is persisted in `newOidcChallengeResponse()`. Clients should fetch it back from an `Enrollment` created by `newRotateEnrollment()` with the new `getRefreshToken()` method.
* feat(e2ei)!: remove 'clientId' from `newActivationEnrollment()` & `newRotateEnrollment()`. We can do this now that we expect a specific ClientId format.
* feat(e2ei): add `getCredentialInUse(GroupInfo)` to check the e2ei state from a GroupInfo. This allows verifying the state of a conversation before joining it (and potentially degrading the e2ei state).
* feat(e2ei)!: rename `E2eiConversationState::Degraded` in to `E2eiConversationState::NotVerified`

## [1.0.0-rc.21] - 2023-12-05

<details>
Expand Down
15 changes: 14 additions & 1 deletion CHANGELOG.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,24 @@ Platform support legends:
* Note: the papercuts will majorly be with the build process. Things might be very rough to integrate as no polish at all has been given yet.
* ❌ = tier 3 support. It doesn't work just yet, but we plan to make it work.


## [1.0.0-rc.22] - 2023-12-13

<details>
<summary>git-conventional changelog</summary>
{{git-cliff tag="v1.0.0-rc.22" unreleased=true}}
</details>

* feat(e2ei)!: manage OIDC refreshToken in CoreCrypto's encrypted-at-rest store. As a consequence, some methods went async (all the enrollment ones in WASM). The refreshToken has to be supplied in `newOidcChallengeRequest()` and is persisted in `newOidcChallengeResponse()`. Clients should fetch it back from an `Enrollment` created by `newRotateEnrollment()` with the new `getRefreshToken()` method.
* feat(e2ei)!: remove 'clientId' from `newActivationEnrollment()` & `newRotateEnrollment()`. We can do this now that we expect a specific ClientId format.
* feat(e2ei): add `getCredentialInUse(GroupInfo)` to check the e2ei state from a GroupInfo. This allows verifying the state of a conversation before joining it (and potentially degrading the e2ei state).
* feat(e2ei)!: rename `E2eiConversationState::Degraded` in to `E2eiConversationState::NotVerified`

## [1.0.0-rc.21] - 2023-12-05

<details>
<summary>git-conventional changelog</summary>
{{git-cliff tag="v1.0.0-rc.21" unreleased=true}}
{{git-cliff tag="v1.0.0-rc.21"}}
</details>

* feat!: canonicalize ClientId keeping only the regular version where the UserId portion is the hyphenated string representation of the UUID. Also apply this to `getUserIdentities()`
Expand Down
2 changes: 1 addition & 1 deletion crypto-attributes/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
name = "core-crypto-attributes"
description = "Macros for core-crypto"
repository = "https://github.com/wireapp/core-crypto"
version = "1.0.0-rc.21"
version = "1.0.0-rc.22"
edition = "2021"
license = "GPL-3.0-only"

Expand Down
6 changes: 3 additions & 3 deletions crypto-ffi/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
name = "core-crypto-ffi"
description = "Platform-specific bindings (Android, iOS, WASM) for CoreCrypto"
repository = "https://github.com/wireapp/core-crypto"
version = "1.0.0-rc.21"
version = "1.0.0-rc.22"
edition = "2021"
license = "GPL-3.0-only"
publish = false
Expand Down Expand Up @@ -35,7 +35,7 @@ sha2 = { version = "0.10", features = ["force-soft"] }
[target.'cfg(not(target_family = "wasm"))'.dependencies]
# UniFFI - Android + iOS bindings - Runtime support
uniffi = { workspace = true }
core-crypto = { version = "^1.0.0-rc.21", path = "../crypto", features = ["uniffi"] }
core-crypto = { version = "^1.0.0-rc.22", path = "../crypto", features = ["uniffi"] }

[target.wasm32-unknown-unknown.dependencies]
wasm-bindgen = "0.2"
Expand All @@ -46,7 +46,7 @@ serde = { version = "1.0", features = ["derive"] }
js-sys = "0.3"
web-sys = "0.3"
strum = "0.25"
core-crypto = { version = "^1.0.0-rc.21", path = "../crypto" }
core-crypto = { version = "^1.0.0-rc.22", path = "../crypto" }


# UniFFI - Android + iOS bindings - Build support
Expand Down
2 changes: 1 addition & 1 deletion crypto-ffi/bindings/gradle.properties
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ kotlin.code.style=official

# gradle-maven-publish configuration
GROUP=com.wire
VERSION_NAME=1.0.0-rc.21
VERSION_NAME=1.0.0-rc.22
SONATYPE_HOST=DEFAULT
SONATYPE_AUTOMATIC_RELEASE=true
RELEASE_SIGNING_ENABLED=true
Expand Down
12 changes: 6 additions & 6 deletions crypto/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
name = "core-crypto"
description = "Abstraction over OpenMLS with persistent keystore"
repository = "https://github.com/wireapp/core-crypto"
version = "1.0.0-rc.21"
version = "1.0.0-rc.22"
edition = "2021"
license = "GPL-3.0-only"
publish = false
Expand Down Expand Up @@ -77,13 +77,13 @@ rexie = { version = "0.4", optional = true }
base64 = { version = "0.21", optional = true }

[target.'cfg(not(target_os = "ios"))'.dependencies]
core-crypto-keystore = { version = "^1.0.0-rc.20", path = "../keystore" }
core-crypto-keystore = { version = "^1.0.0-rc.21", path = "../keystore" }

[target.'cfg(target_os = "ios")'.dependencies]
core-crypto-keystore = { version = "^1.0.0-rc.21", path = "../keystore", features = ["ios-wal-compat"] }
core-crypto-keystore = { version = "^1.0.0-rc.22", path = "../keystore", features = ["ios-wal-compat"] }

[dependencies.mls-crypto-provider]
version = "^1.0.0-rc.21"
version = "^1.0.0-rc.22"
path = "../mls-provider"

[dev-dependencies]
Expand Down Expand Up @@ -111,7 +111,7 @@ tag = "v1.2.2-pre.core-crypto-0.7.0"
version = "=0.9.2"

[dev-dependencies.core-crypto-keystore]
version = "^1.0.0-rc.21"
version = "^1.0.0-rc.22"
path = "../keystore"
features = ["dummy-entity"]

Expand All @@ -124,7 +124,7 @@ version = "0.5"
features = ["async_std", "html_reports"]

[dev-dependencies.core-crypto-attributes]
version = "^1.0.0-rc.21"
version = "^1.0.0-rc.22"
path = "../crypto-attributes"

[package.metadata.wasm-pack.profile.release]
Expand Down
2 changes: 1 addition & 1 deletion interop/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "interop"
version = "1.0.0-rc.20"
version = "1.0.0-rc.21"
edition = "2021"
license = "GPL-3.0-only"

Expand Down
2 changes: 1 addition & 1 deletion keystore-dump/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[package]
name = "keystore-dump"
description = "Dumps a keystore to JSON on stdout"
version = "0.0.0-rc.16"
version = "0.0.0-rc.17"
edition = "2021"

# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
Expand Down
2 changes: 1 addition & 1 deletion keystore/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
name = "core-crypto-keystore"
description = "Encrypted keystore with support for OpenMLS and Proteus"
repository = "https://github.com/wireapp/core-crypto"
version = "1.0.0-rc.21"
version = "1.0.0-rc.22"
edition = "2021"
license = "GPL-3.0-only"
publish = false
Expand Down
6 changes: 3 additions & 3 deletions mls-provider/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
name = "mls-crypto-provider"
description = "MLS Crypto Provider wrapping core-crypto-keystore"
repository = "https://github.com/wireapp/core-crypto"
version = "1.0.0-rc.21"
version = "1.0.0-rc.22"
edition = "2021"
license = "GPL-3.0-only"
publish = false
Expand Down Expand Up @@ -42,10 +42,10 @@ version = "0.10"
features = ["x25519", "p256", "p384", "xyber768d00", "serde_impls"]

[target.'cfg(not(target_os = "ios"))'.dependencies]
core-crypto-keystore = { version = "^1.0.0-rc.21", path = "../keystore" }
core-crypto-keystore = { version = "^1.0.0-rc.22", path = "../keystore" }

[target.'cfg(target_os = "ios")'.dependencies]
core-crypto-keystore = { version = "^1.0.0-rc.21", path = "../keystore", features = ["ios-wal-compat"] }
core-crypto-keystore = { version = "^1.0.0-rc.22", path = "../keystore", features = ["ios-wal-compat"] }

[dev-dependencies]
wasm-bindgen-test = "0.3"
Expand Down
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@wireapp/core-crypto",
"version": "1.0.0-rc.21",
"version": "1.0.0-rc.22",
"description": "CoreCrypto bindings for the Web",
"type": "module",
"module": "platforms/web/corecrypto.js",
Expand Down

0 comments on commit 64e483e

Please sign in to comment.