@archipelagolab/lobi 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +164 -0
- package/ENDOFFILE +0 -0
- package/EOF +0 -0
- package/LICENSE +21 -0
- package/SPEC-SUPPORT.md +116 -0
- package/YAMLEND +0 -0
- package/api.ts +18 -0
- package/archipelagolab-lobi-1.0.0.tgz +0 -0
- package/auth-presence.ts +56 -0
- package/channel-plugin-api.ts +3 -0
- package/cli-metadata.ts +11 -0
- package/contract-api.ts +17 -0
- package/docs/CHECKLIST.md +83 -0
- package/docs/FORK_SDK_GUIDE.md +279 -0
- package/helper-api.ts +3 -0
- package/index.test.ts +61 -0
- package/index.ts +65 -0
- package/openclaw.plugin.json +23 -0
- package/package.json +52 -0
- package/plugin-entry.handlers.runtime.ts +1 -0
- package/runtime-api.ts +54 -0
- package/runtime-heavy-api.ts +1 -0
- package/scripts/migrate-to-lobi.sh +72 -0
- package/secret-contract-api.ts +5 -0
- package/setup-entry.ts +13 -0
- package/src/account-selection.test.ts +124 -0
- package/src/account-selection.ts +226 -0
- package/src/actions.account-propagation.test.ts +251 -0
- package/src/actions.test.ts +251 -0
- package/src/actions.ts +336 -0
- package/src/approval-auth.test.ts +23 -0
- package/src/approval-auth.ts +25 -0
- package/src/approval-handler.runtime.test.ts +46 -0
- package/src/approval-handler.runtime.ts +400 -0
- package/src/approval-ids.ts +6 -0
- package/src/approval-native.test.ts +329 -0
- package/src/approval-native.ts +336 -0
- package/src/approval-reactions.test.ts +107 -0
- package/src/approval-reactions.ts +158 -0
- package/src/auth-precedence.ts +61 -0
- package/src/channel-account-paths.ts +92 -0
- package/src/channel.account-paths.test.ts +102 -0
- package/src/channel.directory.test.ts +601 -0
- package/src/channel.resolve.test.ts +38 -0
- package/src/channel.runtime.ts +16 -0
- package/src/channel.setup.test.ts +269 -0
- package/src/channel.ts +570 -0
- package/src/cli-metadata.ts +19 -0
- package/src/cli.test.ts +1015 -0
- package/src/cli.ts +1198 -0
- package/src/config-adapter.ts +41 -0
- package/src/config-schema.test.ts +90 -0
- package/src/config-schema.ts +114 -0
- package/src/directory-live.test.ts +200 -0
- package/src/directory-live.ts +238 -0
- package/src/doctor-contract.ts +287 -0
- package/src/doctor.test.ts +440 -0
- package/src/doctor.ts +262 -0
- package/src/env-vars.ts +92 -0
- package/src/exec-approval-resolver.test.ts +68 -0
- package/src/exec-approval-resolver.ts +23 -0
- package/src/exec-approvals.test.ts +483 -0
- package/src/exec-approvals.ts +290 -0
- package/src/group-mentions.ts +41 -0
- package/src/legacy-crypto-inspector-availability.test.ts +81 -0
- package/src/legacy-crypto-inspector-availability.ts +60 -0
- package/src/legacy-crypto.test.ts +234 -0
- package/src/legacy-crypto.ts +549 -0
- package/src/legacy-state.test.ts +86 -0
- package/src/legacy-state.ts +156 -0
- package/src/matrix/account-config.ts +150 -0
- package/src/matrix/accounts.readiness.test.ts +27 -0
- package/src/matrix/accounts.test.ts +757 -0
- package/src/matrix/accounts.ts +194 -0
- package/src/matrix/actions/client.test.ts +215 -0
- package/src/matrix/actions/client.ts +31 -0
- package/src/matrix/actions/devices.test.ts +114 -0
- package/src/matrix/actions/devices.ts +34 -0
- package/src/matrix/actions/limits.test.ts +15 -0
- package/src/matrix/actions/limits.ts +6 -0
- package/src/matrix/actions/messages.test.ts +289 -0
- package/src/matrix/actions/messages.ts +123 -0
- package/src/matrix/actions/pins.test.ts +74 -0
- package/src/matrix/actions/pins.ts +64 -0
- package/src/matrix/actions/polls.test.ts +71 -0
- package/src/matrix/actions/polls.ts +109 -0
- package/src/matrix/actions/profile.test.ts +109 -0
- package/src/matrix/actions/profile.ts +37 -0
- package/src/matrix/actions/reactions.test.ts +135 -0
- package/src/matrix/actions/reactions.ts +59 -0
- package/src/matrix/actions/room.test.ts +79 -0
- package/src/matrix/actions/room.ts +71 -0
- package/src/matrix/actions/summary.test.ts +87 -0
- package/src/matrix/actions/summary.ts +88 -0
- package/src/matrix/actions/types.ts +82 -0
- package/src/matrix/actions/verification.test.ts +105 -0
- package/src/matrix/actions/verification.ts +237 -0
- package/src/matrix/actions.ts +37 -0
- package/src/matrix/active-client.ts +26 -0
- package/src/matrix/async-lock.ts +18 -0
- package/src/matrix/backup-health.ts +115 -0
- package/src/matrix/client/config-runtime-api.ts +14 -0
- package/src/matrix/client/config-secret-input.runtime.ts +1 -0
- package/src/matrix/client/config.ts +982 -0
- package/src/matrix/client/create-client.test.ts +115 -0
- package/src/matrix/client/create-client.ts +101 -0
- package/src/matrix/client/env-auth.ts +6 -0
- package/src/matrix/client/file-sync-store.test.ts +265 -0
- package/src/matrix/client/file-sync-store.ts +289 -0
- package/src/matrix/client/logging.ts +123 -0
- package/src/matrix/client/migration-snapshot.runtime.ts +1 -0
- package/src/matrix/client/private-network-host.ts +56 -0
- package/src/matrix/client/runtime.ts +4 -0
- package/src/matrix/client/shared.test.ts +344 -0
- package/src/matrix/client/shared.ts +306 -0
- package/src/matrix/client/storage.test.ts +634 -0
- package/src/matrix/client/storage.ts +544 -0
- package/src/matrix/client/types.ts +50 -0
- package/src/matrix/client-bootstrap.test.ts +84 -0
- package/src/matrix/client-bootstrap.ts +164 -0
- package/src/matrix/client-resolver.test-helpers.ts +147 -0
- package/src/matrix/client.test.ts +1521 -0
- package/src/matrix/client.ts +23 -0
- package/src/matrix/config-paths.ts +31 -0
- package/src/matrix/config-update.test.ts +237 -0
- package/src/matrix/config-update.ts +291 -0
- package/src/matrix/credentials-read.ts +206 -0
- package/src/matrix/credentials-write.runtime.ts +26 -0
- package/src/matrix/credentials.test.ts +501 -0
- package/src/matrix/credentials.ts +95 -0
- package/src/matrix/deps.test.ts +74 -0
- package/src/matrix/deps.ts +225 -0
- package/src/matrix/device-health.test.ts +45 -0
- package/src/matrix/device-health.ts +31 -0
- package/src/matrix/direct-management.test.ts +350 -0
- package/src/matrix/direct-management.ts +347 -0
- package/src/matrix/direct-room.test.ts +61 -0
- package/src/matrix/direct-room.ts +128 -0
- package/src/matrix/draft-stream.test.ts +406 -0
- package/src/matrix/draft-stream.ts +216 -0
- package/src/matrix/encryption-guidance.ts +27 -0
- package/src/matrix/errors.ts +21 -0
- package/src/matrix/format.test.ts +340 -0
- package/src/matrix/format.ts +428 -0
- package/src/matrix/legacy-crypto-inspector.ts +95 -0
- package/src/matrix/media-errors.ts +20 -0
- package/src/matrix/media-text.ts +169 -0
- package/src/matrix/monitor/access-state.test.ts +45 -0
- package/src/matrix/monitor/access-state.ts +77 -0
- package/src/matrix/monitor/ack-config.test.ts +57 -0
- package/src/matrix/monitor/ack-config.ts +26 -0
- package/src/matrix/monitor/allowlist.test.ts +45 -0
- package/src/matrix/monitor/allowlist.ts +94 -0
- package/src/matrix/monitor/auto-join.test.ts +203 -0
- package/src/matrix/monitor/auto-join.ts +86 -0
- package/src/matrix/monitor/config.test.ts +197 -0
- package/src/matrix/monitor/config.ts +303 -0
- package/src/matrix/monitor/context-summary.ts +43 -0
- package/src/matrix/monitor/direct.test.ts +529 -0
- package/src/matrix/monitor/direct.ts +270 -0
- package/src/matrix/monitor/events.test.ts +1524 -0
- package/src/matrix/monitor/events.ts +213 -0
- package/src/matrix/monitor/handler.body-for-agent.test.ts +396 -0
- package/src/matrix/monitor/handler.group-history.test.ts +648 -0
- package/src/matrix/monitor/handler.media-failure.test.ts +267 -0
- package/src/matrix/monitor/handler.test-helpers.ts +308 -0
- package/src/matrix/monitor/handler.test.ts +2952 -0
- package/src/matrix/monitor/handler.thread-root-media.test.ts +82 -0
- package/src/matrix/monitor/handler.ts +1679 -0
- package/src/matrix/monitor/inbound-dedupe.test.ts +146 -0
- package/src/matrix/monitor/inbound-dedupe.ts +267 -0
- package/src/matrix/monitor/index.test.ts +920 -0
- package/src/matrix/monitor/index.ts +434 -0
- package/src/matrix/monitor/legacy-crypto-restore.test.ts +206 -0
- package/src/matrix/monitor/legacy-crypto-restore.ts +139 -0
- package/src/matrix/monitor/location.ts +100 -0
- package/src/matrix/monitor/media.test.ts +159 -0
- package/src/matrix/monitor/media.ts +119 -0
- package/src/matrix/monitor/mentions.test.ts +289 -0
- package/src/matrix/monitor/mentions.ts +177 -0
- package/src/matrix/monitor/reaction-events.test.ts +326 -0
- package/src/matrix/monitor/reaction-events.ts +187 -0
- package/src/matrix/monitor/recent-invite.test.ts +92 -0
- package/src/matrix/monitor/recent-invite.ts +30 -0
- package/src/matrix/monitor/replies.test.ts +265 -0
- package/src/matrix/monitor/replies.ts +136 -0
- package/src/matrix/monitor/reply-context.test.ts +276 -0
- package/src/matrix/monitor/reply-context.ts +92 -0
- package/src/matrix/monitor/room-history.test.ts +258 -0
- package/src/matrix/monitor/room-history.ts +301 -0
- package/src/matrix/monitor/room-info.test.ts +201 -0
- package/src/matrix/monitor/room-info.ts +126 -0
- package/src/matrix/monitor/rooms.test.ts +121 -0
- package/src/matrix/monitor/rooms.ts +52 -0
- package/src/matrix/monitor/route.test.ts +255 -0
- package/src/matrix/monitor/route.ts +178 -0
- package/src/matrix/monitor/runtime-api.ts +31 -0
- package/src/matrix/monitor/startup-verification.test.ts +294 -0
- package/src/matrix/monitor/startup-verification.ts +237 -0
- package/src/matrix/monitor/startup.test.ts +257 -0
- package/src/matrix/monitor/startup.ts +218 -0
- package/src/matrix/monitor/status.ts +111 -0
- package/src/matrix/monitor/sync-lifecycle.test.ts +224 -0
- package/src/matrix/monitor/sync-lifecycle.ts +91 -0
- package/src/matrix/monitor/task-runner.ts +38 -0
- package/src/matrix/monitor/thread-context.test.ts +149 -0
- package/src/matrix/monitor/thread-context.ts +108 -0
- package/src/matrix/monitor/threads.test.ts +68 -0
- package/src/matrix/monitor/threads.ts +85 -0
- package/src/matrix/monitor/types.ts +30 -0
- package/src/matrix/monitor/verification-events.ts +627 -0
- package/src/matrix/monitor/verification-utils.test.ts +47 -0
- package/src/matrix/monitor/verification-utils.ts +46 -0
- package/src/matrix/outbound-media-runtime.ts +1 -0
- package/src/matrix/poll-summary.ts +110 -0
- package/src/matrix/poll-types.test.ts +205 -0
- package/src/matrix/poll-types.ts +433 -0
- package/src/matrix/probe.runtime.ts +4 -0
- package/src/matrix/probe.test.ts +154 -0
- package/src/matrix/probe.ts +96 -0
- package/src/matrix/profile.test.ts +154 -0
- package/src/matrix/profile.ts +184 -0
- package/src/matrix/reaction-common.test.ts +96 -0
- package/src/matrix/reaction-common.ts +147 -0
- package/src/matrix/sdk/crypto-bootstrap.test.ts +505 -0
- package/src/matrix/sdk/crypto-bootstrap.ts +341 -0
- package/src/matrix/sdk/crypto-facade.test.ts +197 -0
- package/src/matrix/sdk/crypto-facade.ts +207 -0
- package/src/matrix/sdk/crypto-node.runtime.test.ts +27 -0
- package/src/matrix/sdk/crypto-node.runtime.ts +9 -0
- package/src/matrix/sdk/crypto-runtime.ts +11 -0
- package/src/matrix/sdk/decrypt-bridge.ts +356 -0
- package/src/matrix/sdk/event-helpers.test.ts +60 -0
- package/src/matrix/sdk/event-helpers.ts +71 -0
- package/src/matrix/sdk/http-client.test.ts +134 -0
- package/src/matrix/sdk/http-client.ts +87 -0
- package/src/matrix/sdk/idb-persistence-lock.ts +51 -0
- package/src/matrix/sdk/idb-persistence.lock-order.test.ts +108 -0
- package/src/matrix/sdk/idb-persistence.test-helpers.ts +88 -0
- package/src/matrix/sdk/idb-persistence.test.ts +149 -0
- package/src/matrix/sdk/idb-persistence.ts +283 -0
- package/src/matrix/sdk/logger.test.ts +25 -0
- package/src/matrix/sdk/logger.ts +108 -0
- package/src/matrix/sdk/read-response-with-limit.ts +19 -0
- package/src/matrix/sdk/recovery-key-store.test.ts +385 -0
- package/src/matrix/sdk/recovery-key-store.ts +430 -0
- package/src/matrix/sdk/transport.test.ts +161 -0
- package/src/matrix/sdk/transport.ts +344 -0
- package/src/matrix/sdk/types.ts +236 -0
- package/src/matrix/sdk/verification-manager.test.ts +509 -0
- package/src/matrix/sdk/verification-manager.ts +694 -0
- package/src/matrix/sdk/verification-status.ts +23 -0
- package/src/matrix/sdk.test.ts +2568 -0
- package/src/matrix/sdk.ts +1789 -0
- package/src/matrix/send/client.test.ts +174 -0
- package/src/matrix/send/client.ts +90 -0
- package/src/matrix/send/formatting.ts +189 -0
- package/src/matrix/send/media.ts +244 -0
- package/src/matrix/send/targets.test.ts +254 -0
- package/src/matrix/send/targets.ts +104 -0
- package/src/matrix/send/types.ts +134 -0
- package/src/matrix/send.test.ts +958 -0
- package/src/matrix/send.ts +609 -0
- package/src/matrix/session-store-metadata.ts +108 -0
- package/src/matrix/startup-abort.ts +44 -0
- package/src/matrix/sync-state.ts +27 -0
- package/src/matrix/target-ids.ts +102 -0
- package/src/matrix/thread-bindings-shared.ts +201 -0
- package/src/matrix/thread-bindings.test.ts +673 -0
- package/src/matrix/thread-bindings.ts +577 -0
- package/src/matrix-migration.runtime.ts +9 -0
- package/src/migration-config.test.ts +228 -0
- package/src/migration-config.ts +243 -0
- package/src/migration-snapshot-backup.ts +117 -0
- package/src/migration-snapshot.test.ts +184 -0
- package/src/migration-snapshot.ts +55 -0
- package/src/onboarding.resolve.test.ts +55 -0
- package/src/onboarding.test-harness.ts +158 -0
- package/src/onboarding.test.ts +665 -0
- package/src/onboarding.ts +773 -0
- package/src/outbound.test.ts +173 -0
- package/src/outbound.ts +78 -0
- package/src/plugin-entry.runtime.js +159 -0
- package/src/plugin-entry.runtime.test.ts +108 -0
- package/src/plugin-entry.runtime.ts +68 -0
- package/src/profile-update.ts +68 -0
- package/src/record-shared.ts +3 -0
- package/src/resolve-targets.test.ts +178 -0
- package/src/resolve-targets.ts +175 -0
- package/src/resolver.ts +21 -0
- package/src/runtime-api.ts +144 -0
- package/src/runtime.ts +7 -0
- package/src/secret-contract.ts +174 -0
- package/src/session-route.test.ts +315 -0
- package/src/session-route.ts +113 -0
- package/src/setup-bootstrap.ts +94 -0
- package/src/setup-config.ts +222 -0
- package/src/setup-contract.ts +89 -0
- package/src/setup-core.test.ts +326 -0
- package/src/setup-core.ts +50 -0
- package/src/setup-surface.ts +4 -0
- package/src/startup-maintenance.test.ts +227 -0
- package/src/startup-maintenance.ts +114 -0
- package/src/storage-paths.ts +92 -0
- package/src/test-helpers.ts +42 -0
- package/src/test-mocks.ts +55 -0
- package/src/test-runtime.ts +72 -0
- package/src/test-support/monitor-route-test-support.ts +8 -0
- package/src/tool-actions.runtime.ts +1 -0
- package/src/tool-actions.test.ts +422 -0
- package/src/tool-actions.ts +498 -0
- package/src/types.ts +230 -0
- package/test-api.ts +2 -0
- package/thread-bindings-runtime.ts +4 -0
- package/tsconfig.json +16 -0
|
@@ -0,0 +1,341 @@
|
|
|
1
|
+
import { CryptoEvent } from "@archipelagolab/lobi-js-sdk/lib/crypto-api/CryptoEvent.js";
|
|
2
|
+
import type { MatrixDecryptBridge } from "./decrypt-bridge.js";
|
|
3
|
+
import { LogService } from "./logger.js";
|
|
4
|
+
import type { MatrixRecoveryKeyStore } from "./recovery-key-store.js";
|
|
5
|
+
import { isRepairableSecretStorageAccessError } from "./recovery-key-store.js";
|
|
6
|
+
import type {
|
|
7
|
+
MatrixAuthDict,
|
|
8
|
+
MatrixCryptoBootstrapApi,
|
|
9
|
+
MatrixRawEvent,
|
|
10
|
+
MatrixUiAuthCallback,
|
|
11
|
+
} from "./types.js";
|
|
12
|
+
import type {
|
|
13
|
+
MatrixVerificationManager,
|
|
14
|
+
MatrixVerificationRequestLike,
|
|
15
|
+
} from "./verification-manager.js";
|
|
16
|
+
import { isMatrixDeviceOwnerVerified } from "./verification-status.js";
|
|
17
|
+
|
|
18
|
+
export type MatrixCryptoBootstrapperDeps<TRawEvent extends MatrixRawEvent> = {
|
|
19
|
+
getUserId: () => Promise<string>;
|
|
20
|
+
getPassword?: () => string | undefined;
|
|
21
|
+
getDeviceId: () => string | null | undefined;
|
|
22
|
+
verificationManager: MatrixVerificationManager;
|
|
23
|
+
recoveryKeyStore: MatrixRecoveryKeyStore;
|
|
24
|
+
decryptBridge: Pick<MatrixDecryptBridge<TRawEvent>, "bindCryptoRetrySignals">;
|
|
25
|
+
};
|
|
26
|
+
|
|
27
|
+
export type MatrixCryptoBootstrapOptions = {
|
|
28
|
+
forceResetCrossSigning?: boolean;
|
|
29
|
+
allowAutomaticCrossSigningReset?: boolean;
|
|
30
|
+
allowSecretStorageRecreateWithoutRecoveryKey?: boolean;
|
|
31
|
+
strict?: boolean;
|
|
32
|
+
};
|
|
33
|
+
|
|
34
|
+
export type MatrixCryptoBootstrapResult = {
|
|
35
|
+
crossSigningReady: boolean;
|
|
36
|
+
crossSigningPublished: boolean;
|
|
37
|
+
ownDeviceVerified: boolean | null;
|
|
38
|
+
};
|
|
39
|
+
|
|
40
|
+
export class MatrixCryptoBootstrapper<TRawEvent extends MatrixRawEvent> {
|
|
41
|
+
private verificationHandlerRegistered = false;
|
|
42
|
+
|
|
43
|
+
constructor(private readonly deps: MatrixCryptoBootstrapperDeps<TRawEvent>) {}
|
|
44
|
+
|
|
45
|
+
async bootstrap(
|
|
46
|
+
crypto: MatrixCryptoBootstrapApi,
|
|
47
|
+
options: MatrixCryptoBootstrapOptions = {},
|
|
48
|
+
): Promise<MatrixCryptoBootstrapResult> {
|
|
49
|
+
const strict = options.strict === true;
|
|
50
|
+
// Register verification listeners before expensive bootstrap work so incoming requests
|
|
51
|
+
// are not missed during startup.
|
|
52
|
+
this.registerVerificationRequestHandler(crypto);
|
|
53
|
+
await this.bootstrapSecretStorage(crypto, {
|
|
54
|
+
strict,
|
|
55
|
+
allowSecretStorageRecreateWithoutRecoveryKey:
|
|
56
|
+
options.allowSecretStorageRecreateWithoutRecoveryKey === true,
|
|
57
|
+
});
|
|
58
|
+
const crossSigning = await this.bootstrapCrossSigning(crypto, {
|
|
59
|
+
forceResetCrossSigning: options.forceResetCrossSigning === true,
|
|
60
|
+
allowAutomaticCrossSigningReset: options.allowAutomaticCrossSigningReset !== false,
|
|
61
|
+
allowSecretStorageRecreateWithoutRecoveryKey:
|
|
62
|
+
options.allowSecretStorageRecreateWithoutRecoveryKey === true,
|
|
63
|
+
strict,
|
|
64
|
+
});
|
|
65
|
+
await this.bootstrapSecretStorage(crypto, {
|
|
66
|
+
strict,
|
|
67
|
+
allowSecretStorageRecreateWithoutRecoveryKey:
|
|
68
|
+
options.allowSecretStorageRecreateWithoutRecoveryKey === true,
|
|
69
|
+
});
|
|
70
|
+
const ownDeviceVerified = await this.ensureOwnDeviceTrust(crypto, strict);
|
|
71
|
+
return {
|
|
72
|
+
crossSigningReady: crossSigning.ready,
|
|
73
|
+
crossSigningPublished: crossSigning.published,
|
|
74
|
+
ownDeviceVerified,
|
|
75
|
+
};
|
|
76
|
+
}
|
|
77
|
+
|
|
78
|
+
private createSigningKeysUiAuthCallback(params: {
|
|
79
|
+
userId: string;
|
|
80
|
+
password?: string;
|
|
81
|
+
}): MatrixUiAuthCallback {
|
|
82
|
+
return async <T>(makeRequest: (authData: MatrixAuthDict | null) => Promise<T>): Promise<T> => {
|
|
83
|
+
try {
|
|
84
|
+
return await makeRequest(null);
|
|
85
|
+
} catch {
|
|
86
|
+
// Some homeservers require an explicit dummy UIA stage even when no user interaction is needed.
|
|
87
|
+
try {
|
|
88
|
+
return await makeRequest({ type: "m.login.dummy" });
|
|
89
|
+
} catch {
|
|
90
|
+
if (!params.password?.trim()) {
|
|
91
|
+
throw new Error(
|
|
92
|
+
"Matrix cross-signing key upload requires UIA; provide matrix.password for m.login.password fallback",
|
|
93
|
+
);
|
|
94
|
+
}
|
|
95
|
+
return await makeRequest({
|
|
96
|
+
type: "m.login.password",
|
|
97
|
+
identifier: { type: "m.id.user", user: params.userId },
|
|
98
|
+
password: params.password,
|
|
99
|
+
});
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
};
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
private async bootstrapCrossSigning(
|
|
106
|
+
crypto: MatrixCryptoBootstrapApi,
|
|
107
|
+
options: {
|
|
108
|
+
forceResetCrossSigning: boolean;
|
|
109
|
+
allowAutomaticCrossSigningReset: boolean;
|
|
110
|
+
allowSecretStorageRecreateWithoutRecoveryKey: boolean;
|
|
111
|
+
strict: boolean;
|
|
112
|
+
},
|
|
113
|
+
): Promise<{ ready: boolean; published: boolean }> {
|
|
114
|
+
const userId = await this.deps.getUserId();
|
|
115
|
+
const authUploadDeviceSigningKeys = this.createSigningKeysUiAuthCallback({
|
|
116
|
+
userId,
|
|
117
|
+
password: this.deps.getPassword?.(),
|
|
118
|
+
});
|
|
119
|
+
const hasPublishedCrossSigningKeys = async (): Promise<boolean> => {
|
|
120
|
+
if (typeof crypto.userHasCrossSigningKeys !== "function") {
|
|
121
|
+
return true;
|
|
122
|
+
}
|
|
123
|
+
try {
|
|
124
|
+
return await crypto.userHasCrossSigningKeys(userId, true);
|
|
125
|
+
} catch {
|
|
126
|
+
return false;
|
|
127
|
+
}
|
|
128
|
+
};
|
|
129
|
+
const isCrossSigningReady = async (): Promise<boolean> => {
|
|
130
|
+
if (typeof crypto.isCrossSigningReady !== "function") {
|
|
131
|
+
return true;
|
|
132
|
+
}
|
|
133
|
+
try {
|
|
134
|
+
return await crypto.isCrossSigningReady();
|
|
135
|
+
} catch {
|
|
136
|
+
return false;
|
|
137
|
+
}
|
|
138
|
+
};
|
|
139
|
+
|
|
140
|
+
const finalize = async (): Promise<{ ready: boolean; published: boolean }> => {
|
|
141
|
+
const ready = await isCrossSigningReady();
|
|
142
|
+
const published = await hasPublishedCrossSigningKeys();
|
|
143
|
+
if (ready && published) {
|
|
144
|
+
LogService.info("MatrixClientLite", "Cross-signing bootstrap complete");
|
|
145
|
+
return { ready, published };
|
|
146
|
+
}
|
|
147
|
+
const message = "Cross-signing bootstrap finished but server keys are still not published";
|
|
148
|
+
LogService.warn("MatrixClientLite", message);
|
|
149
|
+
if (options.strict) {
|
|
150
|
+
throw new Error(message);
|
|
151
|
+
}
|
|
152
|
+
return { ready, published };
|
|
153
|
+
};
|
|
154
|
+
|
|
155
|
+
if (options.forceResetCrossSigning) {
|
|
156
|
+
try {
|
|
157
|
+
await crypto.bootstrapCrossSigning({
|
|
158
|
+
setupNewCrossSigning: true,
|
|
159
|
+
authUploadDeviceSigningKeys,
|
|
160
|
+
});
|
|
161
|
+
} catch (err) {
|
|
162
|
+
LogService.warn("MatrixClientLite", "Forced cross-signing reset failed:", err);
|
|
163
|
+
if (options.strict) {
|
|
164
|
+
throw err instanceof Error ? err : new Error(String(err));
|
|
165
|
+
}
|
|
166
|
+
return { ready: false, published: false };
|
|
167
|
+
}
|
|
168
|
+
return await finalize();
|
|
169
|
+
}
|
|
170
|
+
|
|
171
|
+
// First pass: preserve existing cross-signing identity and ensure public keys are uploaded.
|
|
172
|
+
try {
|
|
173
|
+
await crypto.bootstrapCrossSigning({
|
|
174
|
+
authUploadDeviceSigningKeys,
|
|
175
|
+
});
|
|
176
|
+
} catch (err) {
|
|
177
|
+
const shouldRepairSecretStorage =
|
|
178
|
+
options.allowSecretStorageRecreateWithoutRecoveryKey &&
|
|
179
|
+
isRepairableSecretStorageAccessError(err);
|
|
180
|
+
if (shouldRepairSecretStorage) {
|
|
181
|
+
LogService.warn(
|
|
182
|
+
"MatrixClientLite",
|
|
183
|
+
"Cross-signing bootstrap could not unlock secret storage; recreating secret storage during explicit bootstrap and retrying.",
|
|
184
|
+
);
|
|
185
|
+
await this.deps.recoveryKeyStore.bootstrapSecretStorageWithRecoveryKey(crypto, {
|
|
186
|
+
allowSecretStorageRecreateWithoutRecoveryKey: true,
|
|
187
|
+
forceNewSecretStorage: true,
|
|
188
|
+
});
|
|
189
|
+
await crypto.bootstrapCrossSigning({
|
|
190
|
+
authUploadDeviceSigningKeys,
|
|
191
|
+
});
|
|
192
|
+
} else if (!options.allowAutomaticCrossSigningReset) {
|
|
193
|
+
LogService.warn(
|
|
194
|
+
"MatrixClientLite",
|
|
195
|
+
"Initial cross-signing bootstrap failed and automatic reset is disabled:",
|
|
196
|
+
err,
|
|
197
|
+
);
|
|
198
|
+
return { ready: false, published: false };
|
|
199
|
+
} else {
|
|
200
|
+
LogService.warn(
|
|
201
|
+
"MatrixClientLite",
|
|
202
|
+
"Initial cross-signing bootstrap failed, trying reset:",
|
|
203
|
+
err,
|
|
204
|
+
);
|
|
205
|
+
try {
|
|
206
|
+
await crypto.bootstrapCrossSigning({
|
|
207
|
+
setupNewCrossSigning: true,
|
|
208
|
+
authUploadDeviceSigningKeys,
|
|
209
|
+
});
|
|
210
|
+
} catch (resetErr) {
|
|
211
|
+
LogService.warn("MatrixClientLite", "Failed to bootstrap cross-signing:", resetErr);
|
|
212
|
+
if (options.strict) {
|
|
213
|
+
throw resetErr instanceof Error ? resetErr : new Error(String(resetErr));
|
|
214
|
+
}
|
|
215
|
+
return { ready: false, published: false };
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
}
|
|
219
|
+
|
|
220
|
+
const firstPassReady = await isCrossSigningReady();
|
|
221
|
+
const firstPassPublished = await hasPublishedCrossSigningKeys();
|
|
222
|
+
if (firstPassReady && firstPassPublished) {
|
|
223
|
+
LogService.info("MatrixClientLite", "Cross-signing bootstrap complete");
|
|
224
|
+
return { ready: true, published: true };
|
|
225
|
+
}
|
|
226
|
+
|
|
227
|
+
if (!options.allowAutomaticCrossSigningReset) {
|
|
228
|
+
return { ready: firstPassReady, published: firstPassPublished };
|
|
229
|
+
}
|
|
230
|
+
|
|
231
|
+
// Fallback: recover from broken local/server state by creating a fresh identity.
|
|
232
|
+
try {
|
|
233
|
+
await crypto.bootstrapCrossSigning({
|
|
234
|
+
setupNewCrossSigning: true,
|
|
235
|
+
authUploadDeviceSigningKeys,
|
|
236
|
+
});
|
|
237
|
+
} catch (err) {
|
|
238
|
+
LogService.warn("MatrixClientLite", "Fallback cross-signing bootstrap failed:", err);
|
|
239
|
+
if (options.strict) {
|
|
240
|
+
throw err instanceof Error ? err : new Error(String(err));
|
|
241
|
+
}
|
|
242
|
+
return { ready: false, published: false };
|
|
243
|
+
}
|
|
244
|
+
|
|
245
|
+
return await finalize();
|
|
246
|
+
}
|
|
247
|
+
|
|
248
|
+
private async bootstrapSecretStorage(
|
|
249
|
+
crypto: MatrixCryptoBootstrapApi,
|
|
250
|
+
options: {
|
|
251
|
+
strict: boolean;
|
|
252
|
+
allowSecretStorageRecreateWithoutRecoveryKey: boolean;
|
|
253
|
+
},
|
|
254
|
+
): Promise<void> {
|
|
255
|
+
try {
|
|
256
|
+
await this.deps.recoveryKeyStore.bootstrapSecretStorageWithRecoveryKey(crypto, {
|
|
257
|
+
allowSecretStorageRecreateWithoutRecoveryKey:
|
|
258
|
+
options.allowSecretStorageRecreateWithoutRecoveryKey,
|
|
259
|
+
});
|
|
260
|
+
LogService.info("MatrixClientLite", "Secret storage bootstrap complete");
|
|
261
|
+
} catch (err) {
|
|
262
|
+
LogService.warn("MatrixClientLite", "Failed to bootstrap secret storage:", err);
|
|
263
|
+
if (options.strict) {
|
|
264
|
+
throw err instanceof Error ? err : new Error(String(err));
|
|
265
|
+
}
|
|
266
|
+
}
|
|
267
|
+
}
|
|
268
|
+
|
|
269
|
+
private registerVerificationRequestHandler(crypto: MatrixCryptoBootstrapApi): void {
|
|
270
|
+
if (this.verificationHandlerRegistered) {
|
|
271
|
+
return;
|
|
272
|
+
}
|
|
273
|
+
this.verificationHandlerRegistered = true;
|
|
274
|
+
|
|
275
|
+
// Track incoming requests; verification lifecycle decisions live in the
|
|
276
|
+
// verification manager so acceptance/start/dedupe share one code path.
|
|
277
|
+
// Remote-user verifications are only auto-accepted. The human-operated
|
|
278
|
+
// client must explicitly choose "Verify by emoji" so we do not race a
|
|
279
|
+
// second SAS start from the bot side and end up with mismatched keys.
|
|
280
|
+
crypto.on(CryptoEvent.VerificationRequestReceived, async (request) => {
|
|
281
|
+
const verificationRequest = request as MatrixVerificationRequestLike;
|
|
282
|
+
try {
|
|
283
|
+
this.deps.verificationManager.trackVerificationRequest(verificationRequest);
|
|
284
|
+
} catch (err) {
|
|
285
|
+
LogService.warn(
|
|
286
|
+
"MatrixClientLite",
|
|
287
|
+
`Failed to track verification request from ${verificationRequest.otherUserId}:`,
|
|
288
|
+
err,
|
|
289
|
+
);
|
|
290
|
+
}
|
|
291
|
+
});
|
|
292
|
+
|
|
293
|
+
this.deps.decryptBridge.bindCryptoRetrySignals(crypto);
|
|
294
|
+
LogService.info("MatrixClientLite", "Verification request handler registered");
|
|
295
|
+
}
|
|
296
|
+
|
|
297
|
+
private async ensureOwnDeviceTrust(
|
|
298
|
+
crypto: MatrixCryptoBootstrapApi,
|
|
299
|
+
strict = false,
|
|
300
|
+
): Promise<boolean | null> {
|
|
301
|
+
const deviceId = this.deps.getDeviceId()?.trim();
|
|
302
|
+
if (!deviceId) {
|
|
303
|
+
return null;
|
|
304
|
+
}
|
|
305
|
+
const userId = await this.deps.getUserId();
|
|
306
|
+
|
|
307
|
+
const deviceStatus =
|
|
308
|
+
typeof crypto.getDeviceVerificationStatus === "function"
|
|
309
|
+
? await crypto.getDeviceVerificationStatus(userId, deviceId).catch(() => null)
|
|
310
|
+
: null;
|
|
311
|
+
const alreadyVerified = isMatrixDeviceOwnerVerified(deviceStatus);
|
|
312
|
+
|
|
313
|
+
if (alreadyVerified) {
|
|
314
|
+
return true;
|
|
315
|
+
}
|
|
316
|
+
|
|
317
|
+
if (typeof crypto.setDeviceVerified === "function") {
|
|
318
|
+
await crypto.setDeviceVerified(userId, deviceId, true);
|
|
319
|
+
}
|
|
320
|
+
|
|
321
|
+
if (typeof crypto.crossSignDevice === "function") {
|
|
322
|
+
const crossSigningReady =
|
|
323
|
+
typeof crypto.isCrossSigningReady === "function"
|
|
324
|
+
? await crypto.isCrossSigningReady()
|
|
325
|
+
: true;
|
|
326
|
+
if (crossSigningReady) {
|
|
327
|
+
await crypto.crossSignDevice(deviceId);
|
|
328
|
+
}
|
|
329
|
+
}
|
|
330
|
+
|
|
331
|
+
const refreshedStatus =
|
|
332
|
+
typeof crypto.getDeviceVerificationStatus === "function"
|
|
333
|
+
? await crypto.getDeviceVerificationStatus(userId, deviceId).catch(() => null)
|
|
334
|
+
: null;
|
|
335
|
+
const verified = isMatrixDeviceOwnerVerified(refreshedStatus);
|
|
336
|
+
if (!verified && strict) {
|
|
337
|
+
throw new Error(`Matrix own device ${deviceId} is not verified by its owner after bootstrap`);
|
|
338
|
+
}
|
|
339
|
+
return verified;
|
|
340
|
+
}
|
|
341
|
+
}
|
|
@@ -0,0 +1,197 @@
|
|
|
1
|
+
import { describe, expect, it, vi } from "vitest";
|
|
2
|
+
import { createMatrixCryptoFacade } from "./crypto-facade.js";
|
|
3
|
+
import type { MatrixRecoveryKeyStore } from "./recovery-key-store.js";
|
|
4
|
+
import type { MatrixVerificationManager } from "./verification-manager.js";
|
|
5
|
+
|
|
6
|
+
type MatrixCryptoFacadeDeps = Parameters<typeof createMatrixCryptoFacade>[0];
|
|
7
|
+
|
|
8
|
+
function createVerificationManagerMock(
|
|
9
|
+
overrides: Partial<MatrixVerificationManager> = {},
|
|
10
|
+
): MatrixVerificationManager {
|
|
11
|
+
return {
|
|
12
|
+
requestOwnUserVerification: vi.fn(async () => null),
|
|
13
|
+
listVerifications: vi.fn(async () => []),
|
|
14
|
+
ensureVerificationDmTracked: vi.fn(async () => null),
|
|
15
|
+
requestVerification: vi.fn(),
|
|
16
|
+
acceptVerification: vi.fn(),
|
|
17
|
+
cancelVerification: vi.fn(),
|
|
18
|
+
startVerification: vi.fn(),
|
|
19
|
+
generateVerificationQr: vi.fn(),
|
|
20
|
+
scanVerificationQr: vi.fn(),
|
|
21
|
+
confirmVerificationSas: vi.fn(),
|
|
22
|
+
mismatchVerificationSas: vi.fn(),
|
|
23
|
+
confirmVerificationReciprocateQr: vi.fn(),
|
|
24
|
+
getVerificationSas: vi.fn(),
|
|
25
|
+
...overrides,
|
|
26
|
+
} as unknown as MatrixVerificationManager;
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
function createRecoveryKeyStoreMock(
|
|
30
|
+
summary: ReturnType<MatrixRecoveryKeyStore["getRecoveryKeySummary"]> = null,
|
|
31
|
+
): MatrixRecoveryKeyStore {
|
|
32
|
+
return {
|
|
33
|
+
getRecoveryKeySummary: vi.fn(() => summary),
|
|
34
|
+
} as unknown as MatrixRecoveryKeyStore;
|
|
35
|
+
}
|
|
36
|
+
|
|
37
|
+
function createFacadeHarness(params?: {
|
|
38
|
+
client?: Partial<MatrixCryptoFacadeDeps["client"]>;
|
|
39
|
+
verificationManager?: Partial<MatrixVerificationManager>;
|
|
40
|
+
recoveryKeySummary?: ReturnType<MatrixRecoveryKeyStore["getRecoveryKeySummary"]>;
|
|
41
|
+
getRoomStateEvent?: MatrixCryptoFacadeDeps["getRoomStateEvent"];
|
|
42
|
+
downloadContent?: MatrixCryptoFacadeDeps["downloadContent"];
|
|
43
|
+
}) {
|
|
44
|
+
const getRoomStateEvent: MatrixCryptoFacadeDeps["getRoomStateEvent"] =
|
|
45
|
+
params?.getRoomStateEvent ?? (async () => ({}));
|
|
46
|
+
const downloadContent: MatrixCryptoFacadeDeps["downloadContent"] =
|
|
47
|
+
params?.downloadContent ?? (async () => Buffer.alloc(0));
|
|
48
|
+
const facade = createMatrixCryptoFacade({
|
|
49
|
+
client: {
|
|
50
|
+
getRoom: params?.client?.getRoom ?? (() => null),
|
|
51
|
+
getCrypto: params?.client?.getCrypto ?? (() => undefined),
|
|
52
|
+
},
|
|
53
|
+
verificationManager: createVerificationManagerMock(params?.verificationManager),
|
|
54
|
+
recoveryKeyStore: createRecoveryKeyStoreMock(params?.recoveryKeySummary ?? null),
|
|
55
|
+
getRoomStateEvent,
|
|
56
|
+
downloadContent,
|
|
57
|
+
});
|
|
58
|
+
return { facade, getRoomStateEvent, downloadContent };
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
describe("createMatrixCryptoFacade", () => {
|
|
62
|
+
it("detects encrypted rooms from cached room state", async () => {
|
|
63
|
+
const { facade } = createFacadeHarness({
|
|
64
|
+
client: {
|
|
65
|
+
getRoom: () => ({
|
|
66
|
+
hasEncryptionStateEvent: () => true,
|
|
67
|
+
}),
|
|
68
|
+
},
|
|
69
|
+
});
|
|
70
|
+
|
|
71
|
+
await expect(facade.isRoomEncrypted("!room:example.org")).resolves.toBe(true);
|
|
72
|
+
});
|
|
73
|
+
|
|
74
|
+
it("falls back to server room state when room cache has no encryption event", async () => {
|
|
75
|
+
const getRoomStateEvent = vi.fn(async () => ({
|
|
76
|
+
algorithm: "m.megolm.v1.aes-sha2",
|
|
77
|
+
}));
|
|
78
|
+
const { facade } = createFacadeHarness({
|
|
79
|
+
client: {
|
|
80
|
+
getRoom: () => ({
|
|
81
|
+
hasEncryptionStateEvent: () => false,
|
|
82
|
+
}),
|
|
83
|
+
},
|
|
84
|
+
getRoomStateEvent,
|
|
85
|
+
});
|
|
86
|
+
|
|
87
|
+
await expect(facade.isRoomEncrypted("!room:example.org")).resolves.toBe(true);
|
|
88
|
+
expect(getRoomStateEvent).toHaveBeenCalledWith("!room:example.org", "m.room.encryption", "");
|
|
89
|
+
});
|
|
90
|
+
|
|
91
|
+
it("forwards verification requests and uses client crypto API", async () => {
|
|
92
|
+
const crypto = { requestOwnUserVerification: vi.fn(async () => null) };
|
|
93
|
+
const requestVerification = vi.fn(async () => ({
|
|
94
|
+
id: "verification-1",
|
|
95
|
+
otherUserId: "@alice:example.org",
|
|
96
|
+
isSelfVerification: false,
|
|
97
|
+
initiatedByMe: true,
|
|
98
|
+
phase: 2,
|
|
99
|
+
phaseName: "ready",
|
|
100
|
+
pending: true,
|
|
101
|
+
methods: ["m.sas.v1"],
|
|
102
|
+
canAccept: false,
|
|
103
|
+
hasSas: false,
|
|
104
|
+
hasReciprocateQr: false,
|
|
105
|
+
completed: false,
|
|
106
|
+
createdAt: new Date().toISOString(),
|
|
107
|
+
updatedAt: new Date().toISOString(),
|
|
108
|
+
}));
|
|
109
|
+
const { facade } = createFacadeHarness({
|
|
110
|
+
client: {
|
|
111
|
+
getRoom: () => null,
|
|
112
|
+
getCrypto: () => crypto,
|
|
113
|
+
},
|
|
114
|
+
verificationManager: {
|
|
115
|
+
requestVerification,
|
|
116
|
+
},
|
|
117
|
+
recoveryKeySummary: { keyId: "KEY" },
|
|
118
|
+
});
|
|
119
|
+
|
|
120
|
+
const result = await facade.requestVerification({
|
|
121
|
+
userId: "@alice:example.org",
|
|
122
|
+
deviceId: "DEVICE",
|
|
123
|
+
});
|
|
124
|
+
|
|
125
|
+
expect(requestVerification).toHaveBeenCalledWith(crypto, {
|
|
126
|
+
userId: "@alice:example.org",
|
|
127
|
+
deviceId: "DEVICE",
|
|
128
|
+
});
|
|
129
|
+
expect(result.id).toBe("verification-1");
|
|
130
|
+
await expect(facade.getRecoveryKey()).resolves.toMatchObject({ keyId: "KEY" });
|
|
131
|
+
});
|
|
132
|
+
|
|
133
|
+
it("rehydrates in-progress DM verification requests from the raw crypto layer", async () => {
|
|
134
|
+
const request = {
|
|
135
|
+
transactionId: "txn-dm-in-progress",
|
|
136
|
+
roomId: "!dm:example.org",
|
|
137
|
+
otherUserId: "@alice:example.org",
|
|
138
|
+
initiatedByMe: false,
|
|
139
|
+
isSelfVerification: false,
|
|
140
|
+
phase: 3,
|
|
141
|
+
pending: true,
|
|
142
|
+
accepting: false,
|
|
143
|
+
declining: false,
|
|
144
|
+
methods: ["m.sas.v1"],
|
|
145
|
+
accept: vi.fn(async () => {}),
|
|
146
|
+
cancel: vi.fn(async () => {}),
|
|
147
|
+
startVerification: vi.fn(),
|
|
148
|
+
scanQRCode: vi.fn(),
|
|
149
|
+
generateQRCode: vi.fn(),
|
|
150
|
+
on: vi.fn(),
|
|
151
|
+
verifier: undefined,
|
|
152
|
+
};
|
|
153
|
+
const trackVerificationRequest = vi.fn(() => ({
|
|
154
|
+
id: "verification-1",
|
|
155
|
+
transactionId: "txn-dm-in-progress",
|
|
156
|
+
roomId: "!dm:example.org",
|
|
157
|
+
otherUserId: "@alice:example.org",
|
|
158
|
+
isSelfVerification: false,
|
|
159
|
+
initiatedByMe: false,
|
|
160
|
+
phase: 3,
|
|
161
|
+
phaseName: "started",
|
|
162
|
+
pending: true,
|
|
163
|
+
methods: ["m.sas.v1"],
|
|
164
|
+
canAccept: false,
|
|
165
|
+
hasSas: false,
|
|
166
|
+
hasReciprocateQr: false,
|
|
167
|
+
completed: false,
|
|
168
|
+
createdAt: new Date().toISOString(),
|
|
169
|
+
updatedAt: new Date().toISOString(),
|
|
170
|
+
}));
|
|
171
|
+
const crypto = {
|
|
172
|
+
requestOwnUserVerification: vi.fn(async () => null),
|
|
173
|
+
findVerificationRequestDMInProgress: vi.fn(() => request),
|
|
174
|
+
};
|
|
175
|
+
const { facade } = createFacadeHarness({
|
|
176
|
+
client: {
|
|
177
|
+
getRoom: () => null,
|
|
178
|
+
getCrypto: () => crypto,
|
|
179
|
+
},
|
|
180
|
+
verificationManager: {
|
|
181
|
+
trackVerificationRequest,
|
|
182
|
+
},
|
|
183
|
+
});
|
|
184
|
+
|
|
185
|
+
const summary = await facade.ensureVerificationDmTracked({
|
|
186
|
+
roomId: "!dm:example.org",
|
|
187
|
+
userId: "@alice:example.org",
|
|
188
|
+
});
|
|
189
|
+
|
|
190
|
+
expect(crypto.findVerificationRequestDMInProgress).toHaveBeenCalledWith(
|
|
191
|
+
"!dm:example.org",
|
|
192
|
+
"@alice:example.org",
|
|
193
|
+
);
|
|
194
|
+
expect(trackVerificationRequest).toHaveBeenCalledWith(request);
|
|
195
|
+
expect(summary?.transactionId).toBe("txn-dm-in-progress");
|
|
196
|
+
});
|
|
197
|
+
});
|