@textrp/briij-js-sdk 41.0.1 → 43.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (380) hide show
  1. package/CHANGELOG.md +14 -1
  2. package/LICENSE +177 -177
  3. package/README.md +85 -3
  4. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +1 -1
  5. package/lib/@types/IIdentityServerProvider.js.map +1 -1
  6. package/lib/@types/PushRules.js +14 -14
  7. package/lib/@types/PushRules.js.map +1 -1
  8. package/lib/@types/another-json.d.js.map +1 -1
  9. package/lib/@types/auth.d.ts +72 -1
  10. package/lib/@types/auth.d.ts.map +1 -1
  11. package/lib/@types/auth.js +57 -54
  12. package/lib/@types/auth.js.map +1 -1
  13. package/lib/@types/beacon.js +100 -100
  14. package/lib/@types/beacon.js.map +1 -1
  15. package/lib/@types/common.js.map +1 -1
  16. package/lib/@types/crypto.js.map +1 -1
  17. package/lib/@types/event.d.ts +59 -0
  18. package/lib/@types/event.d.ts.map +1 -1
  19. package/lib/@types/event.js +105 -102
  20. package/lib/@types/event.js.map +1 -1
  21. package/lib/@types/events.js.map +1 -1
  22. package/lib/@types/extensible_events.js +53 -53
  23. package/lib/@types/extensible_events.js.map +1 -1
  24. package/lib/@types/local_notifications.js.map +1 -1
  25. package/lib/@types/location.js +41 -41
  26. package/lib/@types/location.js.map +1 -1
  27. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +1 -1
  28. package/lib/@types/media.js.map +1 -1
  29. package/lib/@types/membership.js +39 -39
  30. package/lib/@types/membership.js.map +1 -1
  31. package/lib/@types/partials.js +25 -25
  32. package/lib/@types/partials.js.map +1 -1
  33. package/lib/@types/polls.js +46 -46
  34. package/lib/@types/polls.js.map +1 -1
  35. package/lib/@types/read_receipts.js +14 -14
  36. package/lib/@types/read_receipts.js.map +1 -1
  37. package/lib/@types/registration.js.map +1 -1
  38. package/lib/@types/search.js +14 -14
  39. package/lib/@types/search.js.map +1 -1
  40. package/lib/@types/signed.js.map +1 -1
  41. package/lib/@types/spaces.js.map +1 -1
  42. package/lib/@types/state_events.js.map +1 -1
  43. package/lib/@types/synapse.js.map +1 -1
  44. package/lib/@types/sync.js +18 -18
  45. package/lib/@types/sync.js.map +1 -1
  46. package/lib/@types/threepids.js +14 -14
  47. package/lib/@types/threepids.js.map +1 -1
  48. package/lib/@types/topic.js +47 -47
  49. package/lib/@types/topic.js.map +1 -1
  50. package/lib/@types/uia.js.map +1 -1
  51. package/lib/NamespacedValue.js +20 -20
  52. package/lib/NamespacedValue.js.map +1 -1
  53. package/lib/ReEmitter.js +16 -16
  54. package/lib/ReEmitter.js.map +1 -1
  55. package/lib/base64.js +32 -32
  56. package/lib/base64.js.map +1 -1
  57. package/lib/briij.d.ts +4 -0
  58. package/lib/briij.d.ts.map +1 -1
  59. package/lib/briij.js +4 -0
  60. package/lib/briij.js.map +1 -1
  61. package/lib/client.d.ts +48 -1
  62. package/lib/client.d.ts.map +1 -1
  63. package/lib/client.js +262 -108
  64. package/lib/client.js.map +1 -1
  65. package/lib/common-crypto/key-passphrase.js +19 -19
  66. package/lib/common-crypto/key-passphrase.js.map +1 -1
  67. package/lib/content-helpers.js +57 -57
  68. package/lib/content-helpers.js.map +1 -1
  69. package/lib/content-repo.js +36 -36
  70. package/lib/content-repo.js.map +1 -1
  71. package/lib/crypto/store/base.js +69 -69
  72. package/lib/crypto/store/base.js.map +1 -1
  73. package/lib/crypto/store/indexeddb-crypto-store-backend.js +58 -58
  74. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +1 -1
  75. package/lib/crypto/store/indexeddb-crypto-store.js +193 -193
  76. package/lib/crypto/store/indexeddb-crypto-store.js.map +1 -1
  77. package/lib/crypto/store/localStorage-crypto-store.js +72 -72
  78. package/lib/crypto/store/localStorage-crypto-store.js.map +1 -1
  79. package/lib/crypto/store/memory-crypto-store.js +74 -74
  80. package/lib/crypto/store/memory-crypto-store.js.map +1 -1
  81. package/lib/crypto-api/CryptoEventHandlerMap.js.map +1 -1
  82. package/lib/crypto-api/key-passphrase.js +22 -22
  83. package/lib/crypto-api/key-passphrase.js.map +1 -1
  84. package/lib/crypto-api/keybackup.js.map +1 -1
  85. package/lib/crypto-api/recovery-key.js +20 -20
  86. package/lib/crypto-api/recovery-key.js.map +1 -1
  87. package/lib/digest.js +21 -21
  88. package/lib/digest.js.map +1 -1
  89. package/lib/extensible_events_v1/ExtensibleEvent.js +39 -39
  90. package/lib/extensible_events_v1/ExtensibleEvent.js.map +1 -1
  91. package/lib/extensible_events_v1/InvalidEventError.js +16 -16
  92. package/lib/extensible_events_v1/InvalidEventError.js.map +1 -1
  93. package/lib/extensible_events_v1/MessageEvent.js +39 -39
  94. package/lib/extensible_events_v1/MessageEvent.js.map +1 -1
  95. package/lib/extensible_events_v1/PollEndEvent.js +29 -29
  96. package/lib/extensible_events_v1/PollEndEvent.js.map +1 -1
  97. package/lib/extensible_events_v1/PollResponseEvent.js +39 -39
  98. package/lib/extensible_events_v1/PollResponseEvent.js.map +1 -1
  99. package/lib/extensible_events_v1/PollStartEvent.js +52 -52
  100. package/lib/extensible_events_v1/PollStartEvent.js.map +1 -1
  101. package/lib/extensible_events_v1/utilities.js +22 -22
  102. package/lib/extensible_events_v1/utilities.js.map +1 -1
  103. package/lib/feature.js +16 -16
  104. package/lib/feature.js.map +1 -1
  105. package/lib/http-api/method.js +14 -14
  106. package/lib/http-api/method.js.map +1 -1
  107. package/lib/http-api/prefix.js +26 -26
  108. package/lib/http-api/prefix.js.map +1 -1
  109. package/lib/indexeddb-helpers.js +21 -21
  110. package/lib/indexeddb-helpers.js.map +1 -1
  111. package/lib/indexeddb-worker.js +18 -18
  112. package/lib/indexeddb-worker.js.map +1 -1
  113. package/lib/matrixrtc/IKeyTransport.js +17 -17
  114. package/lib/matrixrtc/IKeyTransport.js.map +1 -1
  115. package/lib/matrixrtc/IMembershipManager.js +27 -27
  116. package/lib/matrixrtc/IMembershipManager.js.map +1 -1
  117. package/lib/matrixrtc/LivekitTransport.js +19 -19
  118. package/lib/matrixrtc/LivekitTransport.js.map +1 -1
  119. package/lib/matrixrtc/index.js +14 -14
  120. package/lib/matrixrtc/index.js.map +1 -1
  121. package/lib/matrixrtc/utils.js +27 -27
  122. package/lib/matrixrtc/utils.js.map +1 -1
  123. package/lib/models/ToDeviceMessage.js.map +1 -1
  124. package/lib/models/device.js +24 -24
  125. package/lib/models/device.js.map +1 -1
  126. package/lib/models/event-status.js +17 -17
  127. package/lib/models/event-status.js.map +1 -1
  128. package/lib/models/invites-ignorer-types.js +25 -25
  129. package/lib/models/invites-ignorer-types.js.map +1 -1
  130. package/lib/models/profile-keys.js +26 -26
  131. package/lib/models/profile-keys.js.map +1 -1
  132. package/lib/models/room-summary.js +26 -26
  133. package/lib/models/room-summary.js.map +1 -1
  134. package/lib/models/search-result.js +22 -22
  135. package/lib/models/search-result.js.map +1 -1
  136. package/lib/models/typed-event-emitter.js +122 -122
  137. package/lib/models/typed-event-emitter.js.map +1 -1
  138. package/lib/oidc/authorize.js +76 -76
  139. package/lib/oidc/authorize.js.map +1 -1
  140. package/lib/oidc/error.js +17 -17
  141. package/lib/oidc/error.js.map +1 -1
  142. package/lib/oidc/index.js +17 -17
  143. package/lib/oidc/index.js.map +1 -1
  144. package/lib/oidc/register.js +41 -41
  145. package/lib/oidc/register.js.map +1 -1
  146. package/lib/oidc/tokenRefresher.js +51 -51
  147. package/lib/oidc/tokenRefresher.js.map +1 -1
  148. package/lib/oidc/validate.js +59 -59
  149. package/lib/oidc/validate.js.map +1 -1
  150. package/lib/randomstring.js +35 -35
  151. package/lib/randomstring.js.map +1 -1
  152. package/lib/realtime-callbacks.js +39 -39
  153. package/lib/realtime-callbacks.js.map +1 -1
  154. package/lib/receipt-accumulator.js +44 -44
  155. package/lib/receipt-accumulator.js.map +1 -1
  156. package/lib/rendezvous/RendezvousChannel.js.map +1 -1
  157. package/lib/rendezvous/RendezvousCode.js.map +1 -1
  158. package/lib/rendezvous/RendezvousError.js +14 -14
  159. package/lib/rendezvous/RendezvousError.js.map +1 -1
  160. package/lib/rendezvous/RendezvousFailureReason.js +14 -14
  161. package/lib/rendezvous/RendezvousFailureReason.js.map +1 -1
  162. package/lib/rendezvous/RendezvousIntent.js +14 -14
  163. package/lib/rendezvous/RendezvousIntent.js.map +1 -1
  164. package/lib/rendezvous/RendezvousTransport.js.map +1 -1
  165. package/lib/rendezvous/channels/MSC4108SecureChannel.js +63 -63
  166. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +1 -1
  167. package/lib/rendezvous/channels/index.js +14 -14
  168. package/lib/rendezvous/channels/index.js.map +1 -1
  169. package/lib/rendezvous/index.js +14 -14
  170. package/lib/rendezvous/index.js.map +1 -1
  171. package/lib/rendezvous/transports/index.js +14 -14
  172. package/lib/rendezvous/transports/index.js.map +1 -1
  173. package/lib/rust-crypto/CrossSigningIdentity.js +29 -29
  174. package/lib/rust-crypto/CrossSigningIdentity.js.map +1 -1
  175. package/lib/rust-crypto/OutgoingRequestsManager.js +37 -37
  176. package/lib/rust-crypto/OutgoingRequestsManager.js.map +1 -1
  177. package/lib/rust-crypto/device-converter.js +30 -30
  178. package/lib/rust-crypto/device-converter.js.map +1 -1
  179. package/lib/rust-crypto/secret-storage.js +30 -30
  180. package/lib/rust-crypto/secret-storage.js.map +1 -1
  181. package/lib/service-types.js +14 -14
  182. package/lib/service-types.js.map +1 -1
  183. package/lib/store/local-storage-events-emitter.js +21 -21
  184. package/lib/store/local-storage-events-emitter.js.map +1 -1
  185. package/lib/sync-accumulator.js +50 -50
  186. package/lib/sync-accumulator.js.map +1 -1
  187. package/lib/thread-utils.js +20 -20
  188. package/lib/thread-utils.js.map +1 -1
  189. package/lib/types.js +34 -34
  190. package/lib/types.js.map +1 -1
  191. package/lib/utils/decryptAESSecretStorageItem.js +22 -22
  192. package/lib/utils/decryptAESSecretStorageItem.js.map +1 -1
  193. package/lib/utils/encryptAESSecretStorageItem.js +26 -26
  194. package/lib/utils/encryptAESSecretStorageItem.js.map +1 -1
  195. package/lib/utils/internal/deriveKeys.js +21 -21
  196. package/lib/utils/internal/deriveKeys.js.map +1 -1
  197. package/lib/utils/roomVersion.js +26 -26
  198. package/lib/utils/roomVersion.js.map +1 -1
  199. package/lib/version-support.js +26 -26
  200. package/lib/version-support.js.map +1 -1
  201. package/lib/wallet-recovery.d.ts +24 -0
  202. package/lib/wallet-recovery.d.ts.map +1 -0
  203. package/lib/wallet-recovery.js +232 -0
  204. package/lib/wallet-recovery.js.map +1 -0
  205. package/lib/webrtc/audioContext.js +24 -24
  206. package/lib/webrtc/audioContext.js.map +1 -1
  207. package/lib/webrtc/callEventTypes.js.map +1 -1
  208. package/lib/webrtc/stats/callFeedStatsReporter.js +14 -14
  209. package/lib/webrtc/stats/callFeedStatsReporter.js.map +1 -1
  210. package/lib/webrtc/stats/callStatsReportGatherer.js +14 -14
  211. package/lib/webrtc/stats/callStatsReportGatherer.js.map +1 -1
  212. package/lib/webrtc/stats/callStatsReportSummary.js.map +1 -1
  213. package/lib/webrtc/stats/connectionStats.js +14 -14
  214. package/lib/webrtc/stats/connectionStats.js.map +1 -1
  215. package/lib/webrtc/stats/connectionStatsBuilder.js +14 -14
  216. package/lib/webrtc/stats/connectionStatsBuilder.js.map +1 -1
  217. package/lib/webrtc/stats/connectionStatsReportBuilder.js +14 -14
  218. package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +1 -1
  219. package/lib/webrtc/stats/groupCallStats.js +14 -14
  220. package/lib/webrtc/stats/groupCallStats.js.map +1 -1
  221. package/lib/webrtc/stats/media/mediaSsrcHandler.js +14 -14
  222. package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +1 -1
  223. package/lib/webrtc/stats/media/mediaTrackHandler.js +14 -14
  224. package/lib/webrtc/stats/media/mediaTrackHandler.js.map +1 -1
  225. package/lib/webrtc/stats/media/mediaTrackStats.js +27 -27
  226. package/lib/webrtc/stats/media/mediaTrackStats.js.map +1 -1
  227. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +20 -20
  228. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +1 -1
  229. package/lib/webrtc/stats/statsReport.js +14 -14
  230. package/lib/webrtc/stats/statsReport.js.map +1 -1
  231. package/lib/webrtc/stats/statsReportEmitter.js +14 -14
  232. package/lib/webrtc/stats/statsReportEmitter.js.map +1 -1
  233. package/lib/webrtc/stats/trackStatsBuilder.js +4 -4
  234. package/lib/webrtc/stats/trackStatsBuilder.js.map +1 -1
  235. package/lib/webrtc/stats/transportStats.js.map +1 -1
  236. package/lib/webrtc/stats/transportStatsBuilder.js.map +1 -1
  237. package/lib/webrtc/stats/valueFormatter.js +11 -11
  238. package/lib/webrtc/stats/valueFormatter.js.map +1 -1
  239. package/lib/xrpl/identity.d.ts +28 -0
  240. package/lib/xrpl/identity.d.ts.map +1 -0
  241. package/lib/xrpl/identity.js +213 -0
  242. package/lib/xrpl/identity.js.map +1 -0
  243. package/lib/xrpl/trust.d.ts +8 -0
  244. package/lib/xrpl/trust.d.ts.map +1 -0
  245. package/lib/xrpl/trust.js +61 -0
  246. package/lib/xrpl/trust.js.map +1 -0
  247. package/lib/xrpl/verification.d.ts +26 -0
  248. package/lib/xrpl/verification.d.ts.map +1 -0
  249. package/lib/xrpl/verification.js +295 -0
  250. package/lib/xrpl/verification.js.map +1 -0
  251. package/package.json +130 -129
  252. package/src/@types/AESEncryptedSecretStoragePayload.ts +29 -29
  253. package/src/@types/IIdentityServerProvider.ts +24 -24
  254. package/src/@types/PushRules.ts +208 -208
  255. package/src/@types/another-json.d.ts +19 -19
  256. package/src/@types/auth.ts +340 -258
  257. package/src/@types/beacon.ts +140 -140
  258. package/src/@types/common.ts +24 -24
  259. package/src/@types/crypto.ts +71 -71
  260. package/src/@types/event.ts +508 -449
  261. package/src/@types/events.ts +119 -119
  262. package/src/@types/extensible_events.ts +147 -147
  263. package/src/@types/local_notifications.ts +19 -19
  264. package/src/@types/location.ts +92 -92
  265. package/src/@types/matrix-sdk-crypto-wasm.d.ts +39 -39
  266. package/src/@types/media.ts +245 -245
  267. package/src/@types/membership.ts +57 -57
  268. package/src/@types/partials.ts +103 -103
  269. package/src/@types/polls.ts +120 -120
  270. package/src/@types/read_receipts.ts +61 -61
  271. package/src/@types/registration.ts +102 -102
  272. package/src/@types/search.ts +119 -119
  273. package/src/@types/signed.ts +25 -25
  274. package/src/@types/spaces.ts +37 -37
  275. package/src/@types/state_events.ts +153 -153
  276. package/src/@types/synapse.ts +40 -40
  277. package/src/@types/sync.ts +27 -27
  278. package/src/@types/threepids.ts +29 -29
  279. package/src/@types/topic.ts +69 -69
  280. package/src/@types/uia.ts +24 -24
  281. package/src/NamespacedValue.ts +121 -121
  282. package/src/ReEmitter.ts +93 -93
  283. package/src/base64.ts +86 -86
  284. package/src/briij.ts +4 -0
  285. package/src/client.ts +183 -10
  286. package/src/common-crypto/README.md +4 -4
  287. package/src/common-crypto/key-passphrase.ts +43 -43
  288. package/src/content-helpers.ts +298 -298
  289. package/src/content-repo.ts +122 -122
  290. package/src/crypto/store/base.ts +388 -388
  291. package/src/crypto/store/indexeddb-crypto-store-backend.ts +655 -655
  292. package/src/crypto/store/indexeddb-crypto-store.ts +555 -555
  293. package/src/crypto/store/localStorage-crypto-store.ts +409 -409
  294. package/src/crypto/store/memory-crypto-store.ts +326 -326
  295. package/src/crypto-api/CryptoEventHandlerMap.ts +42 -42
  296. package/src/crypto-api/key-passphrase.ts +58 -58
  297. package/src/crypto-api/keybackup.ts +114 -114
  298. package/src/crypto-api/recovery-key.ts +69 -69
  299. package/src/digest.ts +34 -34
  300. package/src/extensible_events_v1/ExtensibleEvent.ts +58 -58
  301. package/src/extensible_events_v1/InvalidEventError.ts +24 -24
  302. package/src/extensible_events_v1/MessageEvent.ts +143 -143
  303. package/src/extensible_events_v1/PollEndEvent.ts +97 -97
  304. package/src/extensible_events_v1/PollResponseEvent.ts +148 -148
  305. package/src/extensible_events_v1/PollStartEvent.ts +207 -207
  306. package/src/extensible_events_v1/utilities.ts +35 -35
  307. package/src/feature.ts +88 -88
  308. package/src/http-api/method.ts +25 -25
  309. package/src/http-api/prefix.ts +48 -48
  310. package/src/indexeddb-helpers.ts +50 -50
  311. package/src/indexeddb-worker.ts +24 -24
  312. package/src/matrixrtc/IKeyTransport.ts +63 -63
  313. package/src/matrixrtc/IMembershipManager.ts +120 -120
  314. package/src/matrixrtc/LivekitTransport.ts +46 -46
  315. package/src/matrixrtc/index.ts +24 -24
  316. package/src/matrixrtc/utils.ts +71 -71
  317. package/src/models/ToDeviceMessage.ts +38 -38
  318. package/src/models/device.ts +85 -85
  319. package/src/models/event-status.ts +39 -39
  320. package/src/models/invites-ignorer-types.ts +58 -58
  321. package/src/models/profile-keys.ts +33 -33
  322. package/src/models/room-summary.ts +78 -78
  323. package/src/models/search-result.ts +57 -57
  324. package/src/models/typed-event-emitter.ts +246 -246
  325. package/src/oidc/authorize.ts +279 -279
  326. package/src/oidc/error.ts +33 -33
  327. package/src/oidc/index.ts +33 -33
  328. package/src/oidc/register.ts +163 -163
  329. package/src/oidc/tokenRefresher.ts +184 -184
  330. package/src/oidc/validate.ts +265 -265
  331. package/src/randomstring.ts +103 -103
  332. package/src/realtime-callbacks.ts +191 -191
  333. package/src/receipt-accumulator.ts +189 -189
  334. package/src/rendezvous/RendezvousChannel.ts +48 -48
  335. package/src/rendezvous/RendezvousCode.ts +25 -25
  336. package/src/rendezvous/RendezvousError.ts +26 -26
  337. package/src/rendezvous/RendezvousFailureReason.ts +49 -49
  338. package/src/rendezvous/RendezvousIntent.ts +20 -20
  339. package/src/rendezvous/RendezvousTransport.ts +58 -58
  340. package/src/rendezvous/channels/MSC4108SecureChannel.ts +270 -270
  341. package/src/rendezvous/channels/index.ts +17 -17
  342. package/src/rendezvous/index.ts +25 -25
  343. package/src/rendezvous/transports/index.ts +17 -17
  344. package/src/rust-crypto/CrossSigningIdentity.ts +195 -195
  345. package/src/rust-crypto/OutgoingRequestsManager.ts +170 -170
  346. package/src/rust-crypto/device-converter.ts +128 -128
  347. package/src/rust-crypto/secret-storage.ts +60 -60
  348. package/src/service-types.ts +20 -20
  349. package/src/store/local-storage-events-emitter.ts +46 -46
  350. package/src/sync-accumulator.ts +779 -779
  351. package/src/thread-utils.ts +31 -31
  352. package/src/types.ts +59 -59
  353. package/src/utils/decryptAESSecretStorageItem.ts +54 -54
  354. package/src/utils/encryptAESSecretStorageItem.ts +73 -73
  355. package/src/utils/internal/deriveKeys.ts +63 -63
  356. package/src/utils/roomVersion.ts +35 -35
  357. package/src/version-support.ts +50 -50
  358. package/src/wallet-recovery.ts +252 -0
  359. package/src/webrtc/audioContext.ts +44 -44
  360. package/src/webrtc/callEventTypes.ts +101 -101
  361. package/src/webrtc/stats/callFeedStatsReporter.ts +91 -91
  362. package/src/webrtc/stats/callStatsReportGatherer.ts +219 -219
  363. package/src/webrtc/stats/callStatsReportSummary.ts +30 -30
  364. package/src/webrtc/stats/connectionStats.ts +47 -47
  365. package/src/webrtc/stats/connectionStatsBuilder.ts +28 -28
  366. package/src/webrtc/stats/connectionStatsReportBuilder.ts +140 -140
  367. package/src/webrtc/stats/groupCallStats.ts +93 -93
  368. package/src/webrtc/stats/media/mediaSsrcHandler.ts +57 -57
  369. package/src/webrtc/stats/media/mediaTrackHandler.ts +70 -70
  370. package/src/webrtc/stats/media/mediaTrackStats.ts +176 -176
  371. package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +90 -90
  372. package/src/webrtc/stats/statsReport.ts +133 -133
  373. package/src/webrtc/stats/statsReportEmitter.ts +49 -49
  374. package/src/webrtc/stats/trackStatsBuilder.ts +207 -207
  375. package/src/webrtc/stats/transportStats.ts +26 -26
  376. package/src/webrtc/stats/transportStatsBuilder.ts +48 -48
  377. package/src/webrtc/stats/valueFormatter.ts +27 -27
  378. package/src/xrpl/identity.ts +245 -0
  379. package/src/xrpl/trust.ts +64 -0
  380. package/src/xrpl/verification.ts +284 -0
@@ -1 +1 @@
1
- {"version":3,"file":"indexeddb-crypto-store.js","names":["logger","LocalStorageCryptoStore","MemoryCryptoStore","IndexedDBCryptoStoreBackend","InvalidCryptoStoreError","InvalidCryptoStoreState","IndexedDBHelpers","MigrationState","ACCOUNT_OBJECT_KEY_MIGRATION_STATE","IndexedDBCryptoStore","exists","indexedDB","dbName","existsAndIsNotMigrated","indexedDb","Promise","resolve","reject","openDBRequest","open","onupgradeneeded","onblocked","error","onsuccess","db","result","close","deleteDatabase","tx","transaction","STORE_ACCOUNT","objectStore","getReq","get","_getReq$result","migrationState","NOT_STARTED","onerror","constructor","_defineProperty","containsData","_this","_asyncToGenerator","startup","backendPromise","Error","log","concat","req","VERSION","ev","oldVersion","upgradeDatabase","Backend","then","backend","doTxn","STORE_INBOUND_GROUP_SESSIONS","STORE_INBOUND_GROUP_SESSIONS_WITHHELD","txn","getEndToEndInboundGroupSession","catch","e","name","warn","TooNew","globalThis","localStorage","Storage","deleteAllData","getMigrationState","setMigrationState","getAccount","func","storeAccount","accountPickle","getCrossSigningKeys","getSecretStorePrivateKey","type","storeSecretStorePrivateKey","key","countEndToEndSessions","getEndToEndSession","deviceKey","sessionId","getEndToEndSessions","storeEndToEndSession","sessionInfo","countEndToEndInboundGroupSessions","getEndToEndSessionsBatch","deleteEndToEndSessionsBatch","sessions","senderCurve25519Key","storeEndToEndInboundGroupSession","sessionData","getEndToEndInboundGroupSessionsBatch","deleteEndToEndInboundGroupSessionsBatch","getEndToEndRooms","markSessionsNeedingBackup","mode","stores"],"sources":["../../../src/crypto/store/indexeddb-crypto-store.ts"],"sourcesContent":["/*\r\nCopyright 2017 - 2021 The Matrix.org Foundation C.I.C.\r\n\r\nLicensed under the Apache License, Version 2.0 (the \"License\");\r\nyou may not use this file except in compliance with the License.\r\nYou may obtain a copy of the License at\r\n\r\n http://www.apache.org/licenses/LICENSE-2.0\r\n\r\nUnless required by applicable law or agreed to in writing, software\r\ndistributed under the License is distributed on an \"AS IS\" BASIS,\r\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\nSee the License for the specific language governing permissions and\r\nlimitations under the License.\r\n*/\r\n\r\nimport { logger, type Logger } from \"../../logger.ts\";\r\nimport { LocalStorageCryptoStore } from \"./localStorage-crypto-store.ts\";\r\nimport { MemoryCryptoStore } from \"./memory-crypto-store.ts\";\r\nimport * as IndexedDBCryptoStoreBackend from \"./indexeddb-crypto-store-backend.ts\";\r\nimport { InvalidCryptoStoreError, InvalidCryptoStoreState } from \"../../errors.ts\";\r\nimport * as IndexedDBHelpers from \"../../indexeddb-helpers.ts\";\r\nimport {\r\n type CryptoStore,\r\n type ISession,\r\n type SessionExtended,\r\n type ISessionInfo,\r\n type IWithheld,\r\n MigrationState,\r\n type Mode,\r\n type SecretStorePrivateKeys,\r\n ACCOUNT_OBJECT_KEY_MIGRATION_STATE,\r\n type InboundGroupSessionData,\r\n type IRoomEncryption,\r\n} from \"./base.ts\";\r\nimport { type CrossSigningKeyInfo } from \"../../crypto-api/index.ts\";\r\n\r\n/*\r\n * Internal module. indexeddb storage for e2e.\r\n */\r\n\r\n/**\r\n * An implementation of CryptoStore, which is normally backed by an indexeddb,\r\n * but with fallback to MemoryCryptoStore.\r\n */\r\nexport class IndexedDBCryptoStore implements CryptoStore {\r\n public static STORE_ACCOUNT = \"account\";\r\n public static STORE_SESSIONS = \"sessions\";\r\n public static STORE_INBOUND_GROUP_SESSIONS = \"inbound_group_sessions\";\r\n public static STORE_INBOUND_GROUP_SESSIONS_WITHHELD = \"inbound_group_sessions_withheld\";\r\n public static STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS = \"shared_history_inbound_group_sessions\";\r\n public static STORE_PARKED_SHARED_HISTORY = \"parked_shared_history\";\r\n public static STORE_DEVICE_DATA = \"device_data\";\r\n public static STORE_ROOMS = \"rooms\";\r\n public static STORE_BACKUP = \"sessions_needing_backup\";\r\n\r\n public static exists(indexedDB: IDBFactory, dbName: string): Promise<boolean> {\r\n return IndexedDBHelpers.exists(indexedDB, dbName);\r\n }\r\n\r\n /**\r\n * Utility to check if a legacy crypto store exists and has not been migrated.\r\n * Returns true if the store exists and has not been migrated, false otherwise.\r\n */\r\n public static existsAndIsNotMigrated(indexedDb: IDBFactory, dbName: string): Promise<boolean> {\r\n return new Promise<boolean>((resolve, reject) => {\r\n let exists = true;\r\n const openDBRequest = indexedDb.open(dbName);\r\n openDBRequest.onupgradeneeded = (): void => {\r\n // Since we did not provide an explicit version when opening, this event\r\n // should only fire if the DB did not exist before at any version.\r\n exists = false;\r\n };\r\n openDBRequest.onblocked = (): void => reject(openDBRequest.error);\r\n openDBRequest.onsuccess = (): void => {\r\n const db = openDBRequest.result;\r\n if (!exists) {\r\n db.close();\r\n // The DB did not exist before, but has been created as part of this\r\n // existence check. Delete it now to restore previous state. Delete can\r\n // actually take a while to complete in some browsers, so don't wait for\r\n // it. This won't block future open calls that a store might issue next to\r\n // properly set up the DB.\r\n indexedDb.deleteDatabase(dbName);\r\n resolve(false);\r\n } else {\r\n const tx = db.transaction([IndexedDBCryptoStore.STORE_ACCOUNT], \"readonly\");\r\n const objectStore = tx.objectStore(IndexedDBCryptoStore.STORE_ACCOUNT);\r\n const getReq = objectStore.get(ACCOUNT_OBJECT_KEY_MIGRATION_STATE);\r\n\r\n getReq.onsuccess = (): void => {\r\n const migrationState = getReq.result ?? MigrationState.NOT_STARTED;\r\n resolve(migrationState === MigrationState.NOT_STARTED);\r\n };\r\n\r\n getReq.onerror = (): void => {\r\n reject(getReq.error);\r\n };\r\n\r\n db.close();\r\n }\r\n };\r\n openDBRequest.onerror = (): void => reject(openDBRequest.error);\r\n });\r\n }\r\n\r\n private backendPromise?: Promise<CryptoStore>;\r\n private backend?: CryptoStore;\r\n\r\n /**\r\n * Create a new IndexedDBCryptoStore\r\n *\r\n * @param indexedDB - global indexedDB instance\r\n * @param dbName - name of db to connect to\r\n */\r\n public constructor(\r\n private readonly indexedDB: IDBFactory,\r\n private readonly dbName: string,\r\n ) {}\r\n\r\n /**\r\n * Returns true if this CryptoStore has ever been initialised (ie, it might contain data).\r\n *\r\n * Implementation of {@link CryptoStore.containsData}.\r\n *\r\n * @internal\r\n */\r\n public async containsData(): Promise<boolean> {\r\n return IndexedDBCryptoStore.exists(this.indexedDB, this.dbName);\r\n }\r\n\r\n /**\r\n * Ensure the database exists and is up-to-date, or fall back to\r\n * a local storage or in-memory store.\r\n *\r\n * This must be called before the store can be used.\r\n *\r\n * @returns resolves to either an IndexedDBCryptoStoreBackend.Backend,\r\n * or a MemoryCryptoStore\r\n */\r\n public startup(): Promise<CryptoStore> {\r\n if (this.backendPromise) {\r\n return this.backendPromise;\r\n }\r\n\r\n this.backendPromise = new Promise<CryptoStore>((resolve, reject) => {\r\n if (!this.indexedDB) {\r\n reject(new Error(\"no indexeddb support available\"));\r\n return;\r\n }\r\n\r\n logger.log(`connecting to indexeddb ${this.dbName}`);\r\n\r\n const req = this.indexedDB.open(this.dbName, IndexedDBCryptoStoreBackend.VERSION);\r\n\r\n req.onupgradeneeded = (ev): void => {\r\n const db = req.result;\r\n const oldVersion = ev.oldVersion;\r\n IndexedDBCryptoStoreBackend.upgradeDatabase(db, oldVersion);\r\n };\r\n\r\n req.onblocked = (): void => {\r\n logger.log(`can't yet open IndexedDBCryptoStore because it is open elsewhere`);\r\n };\r\n\r\n req.onerror = (ev): void => {\r\n logger.log(\"Error connecting to indexeddb\", ev);\r\n reject(req.error);\r\n };\r\n\r\n req.onsuccess = (): void => {\r\n const db = req.result;\r\n\r\n logger.log(`connected to indexeddb ${this.dbName}`);\r\n resolve(new IndexedDBCryptoStoreBackend.Backend(db));\r\n };\r\n })\r\n .then((backend) => {\r\n // Edge has IndexedDB but doesn't support compund keys which we use fairly extensively.\r\n // Try a dummy query which will fail if the browser doesn't support compund keys, so\r\n // we can fall back to a different backend.\r\n return backend\r\n .doTxn(\r\n \"readonly\",\r\n [\r\n IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,\r\n IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,\r\n ],\r\n (txn) => {\r\n backend.getEndToEndInboundGroupSession(\"\", \"\", txn, () => {});\r\n },\r\n )\r\n .then(() => backend);\r\n })\r\n .catch((e) => {\r\n if (e.name === \"VersionError\") {\r\n logger.warn(\"Crypto DB is too new for us to use!\", e);\r\n // don't fall back to a different store: the user has crypto data\r\n // in this db so we should use it or nothing at all.\r\n throw new InvalidCryptoStoreError(InvalidCryptoStoreState.TooNew);\r\n }\r\n logger.warn(\r\n `unable to connect to indexeddb ${this.dbName}` + `: falling back to localStorage store: ${e}`,\r\n );\r\n\r\n try {\r\n if (!(globalThis.localStorage instanceof Storage)) {\r\n throw new Error(\"localStorage is not available\");\r\n }\r\n return new LocalStorageCryptoStore(globalThis.localStorage);\r\n } catch (e) {\r\n logger.warn(`Unable to open localStorage: falling back to in-memory store: ${e}`);\r\n return new MemoryCryptoStore();\r\n }\r\n })\r\n .then((backend) => {\r\n this.backend = backend;\r\n return backend;\r\n });\r\n\r\n return this.backendPromise;\r\n }\r\n\r\n /**\r\n * Delete all data from this store.\r\n *\r\n * @returns resolves when the store has been cleared.\r\n */\r\n public deleteAllData(): Promise<void> {\r\n return new Promise<void>((resolve, reject) => {\r\n if (!this.indexedDB) {\r\n reject(new Error(\"no indexeddb support available\"));\r\n return;\r\n }\r\n\r\n logger.log(`Removing indexeddb instance: ${this.dbName}`);\r\n const req = this.indexedDB.deleteDatabase(this.dbName);\r\n\r\n req.onblocked = (): void => {\r\n logger.log(`can't yet delete IndexedDBCryptoStore because it is open elsewhere`);\r\n };\r\n\r\n req.onerror = (ev): void => {\r\n logger.log(\"Error deleting data from indexeddb\", ev);\r\n reject(req.error);\r\n };\r\n\r\n req.onsuccess = (): void => {\r\n logger.log(`Removed indexeddb instance: ${this.dbName}`);\r\n resolve();\r\n };\r\n }).catch((e) => {\r\n // in firefox, with indexedDB disabled, this fails with a\r\n // DOMError. We treat this as non-fatal, so that people can\r\n // still use the app.\r\n logger.warn(`unable to delete IndexedDBCryptoStore: ${e}`);\r\n });\r\n }\r\n\r\n /**\r\n * Get data on how much of the libolm to Rust Crypto migration has been done.\r\n *\r\n * Implementation of {@link CryptoStore.getMigrationState}.\r\n *\r\n * @internal\r\n */\r\n public getMigrationState(): Promise<MigrationState> {\r\n return this.backend!.getMigrationState();\r\n }\r\n\r\n /**\r\n * Set data on how much of the libolm to Rust Crypto migration has been done.\r\n *\r\n * Implementation of {@link CryptoStore.setMigrationState}.\r\n *\r\n * @internal\r\n */\r\n public setMigrationState(migrationState: MigrationState): Promise<void> {\r\n return this.backend!.setMigrationState(migrationState);\r\n }\r\n\r\n // Olm Account\r\n\r\n /*\r\n * Get the account pickle from the store.\r\n * This requires an active transaction. See doTxn().\r\n *\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with the account pickle\r\n */\r\n public getAccount(txn: IDBTransaction, func: (accountPickle: string | null) => void): void {\r\n this.backend!.getAccount(txn, func);\r\n }\r\n\r\n /**\r\n * Write the account pickle to the store.\r\n * This requires an active transaction. See doTxn().\r\n *\r\n * @param txn - An active transaction. See doTxn().\r\n * @param accountPickle - The new account pickle to store.\r\n */\r\n public storeAccount(txn: IDBTransaction, accountPickle: string): void {\r\n this.backend!.storeAccount(txn, accountPickle);\r\n }\r\n\r\n /**\r\n * Get the public part of the cross-signing keys (eg. self-signing key,\r\n * user signing key).\r\n *\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with the account keys object:\r\n * `{ key_type: base64 encoded seed }` where key type = user_signing_key_seed or self_signing_key_seed\r\n */\r\n public getCrossSigningKeys(\r\n txn: IDBTransaction,\r\n func: (keys: Record<string, CrossSigningKeyInfo> | null) => void,\r\n ): void {\r\n this.backend!.getCrossSigningKeys(txn, func);\r\n }\r\n\r\n /**\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with the private key\r\n * @param type - A key type\r\n */\r\n public getSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\r\n txn: IDBTransaction,\r\n func: (key: SecretStorePrivateKeys[K] | null) => void,\r\n type: K,\r\n ): void {\r\n this.backend!.getSecretStorePrivateKey(txn, func, type);\r\n }\r\n\r\n /**\r\n * Write the cross-signing private keys back to the store\r\n *\r\n * @param txn - An active transaction. See doTxn().\r\n * @param type - The type of cross-signing private key to store\r\n * @param key - keys object as getCrossSigningKeys()\r\n */\r\n public storeSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\r\n txn: IDBTransaction,\r\n type: K,\r\n key: SecretStorePrivateKeys[K],\r\n ): void {\r\n this.backend!.storeSecretStorePrivateKey(txn, type, key);\r\n }\r\n\r\n // Olm sessions\r\n\r\n /**\r\n * Returns the number of end-to-end sessions in the store\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with the count of sessions\r\n */\r\n public countEndToEndSessions(txn: IDBTransaction, func: (count: number) => void): void {\r\n this.backend!.countEndToEndSessions(txn, func);\r\n }\r\n\r\n /**\r\n * Retrieve a specific end-to-end session between the logged-in user\r\n * and another device.\r\n * @param deviceKey - The public key of the other device.\r\n * @param sessionId - The ID of the session to retrieve\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with A map from sessionId\r\n * to session information object with 'session' key being the\r\n * Base64 end-to-end session and lastReceivedMessageTs being the\r\n * timestamp in milliseconds at which the session last received\r\n * a message.\r\n */\r\n public getEndToEndSession(\r\n deviceKey: string,\r\n sessionId: string,\r\n txn: IDBTransaction,\r\n func: (session: ISessionInfo | null) => void,\r\n ): void {\r\n this.backend!.getEndToEndSession(deviceKey, sessionId, txn, func);\r\n }\r\n\r\n /**\r\n * Retrieve the end-to-end sessions between the logged-in user and another\r\n * device.\r\n * @param deviceKey - The public key of the other device.\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with A map from sessionId\r\n * to session information object with 'session' key being the\r\n * Base64 end-to-end session and lastReceivedMessageTs being the\r\n * timestamp in milliseconds at which the session last received\r\n * a message.\r\n */\r\n public getEndToEndSessions(\r\n deviceKey: string,\r\n txn: IDBTransaction,\r\n func: (sessions: { [sessionId: string]: ISessionInfo }) => void,\r\n ): void {\r\n this.backend!.getEndToEndSessions(deviceKey, txn, func);\r\n }\r\n\r\n /**\r\n * Store a session between the logged-in user and another device\r\n * @param deviceKey - The public key of the other device.\r\n * @param sessionId - The ID for this end-to-end session.\r\n * @param sessionInfo - Session information object\r\n * @param txn - An active transaction. See doTxn().\r\n */\r\n public storeEndToEndSession(\r\n deviceKey: string,\r\n sessionId: string,\r\n sessionInfo: ISessionInfo,\r\n txn: IDBTransaction,\r\n ): void {\r\n this.backend!.storeEndToEndSession(deviceKey, sessionId, sessionInfo, txn);\r\n }\r\n\r\n /**\r\n * Count the number of Megolm sessions in the database.\r\n *\r\n * Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.\r\n *\r\n * @internal\r\n */\r\n public countEndToEndInboundGroupSessions(): Promise<number> {\r\n return this.backend!.countEndToEndInboundGroupSessions();\r\n }\r\n\r\n /**\r\n * Fetch a batch of Olm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public getEndToEndSessionsBatch(): Promise<null | ISessionInfo[]> {\r\n return this.backend!.getEndToEndSessionsBatch();\r\n }\r\n\r\n /**\r\n * Delete a batch of Olm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public deleteEndToEndSessionsBatch(sessions: { deviceKey: string; sessionId: string }[]): Promise<void> {\r\n return this.backend!.deleteEndToEndSessionsBatch(sessions);\r\n }\r\n\r\n // Inbound group sessions\r\n\r\n /**\r\n * Retrieve the end-to-end inbound group session for a given\r\n * server key and session ID\r\n * @param senderCurve25519Key - The sender's curve 25519 key\r\n * @param sessionId - The ID of the session\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Called with A map from sessionId\r\n * to Base64 end-to-end session.\r\n */\r\n public getEndToEndInboundGroupSession(\r\n senderCurve25519Key: string,\r\n sessionId: string,\r\n txn: IDBTransaction,\r\n func: (groupSession: InboundGroupSessionData | null, groupSessionWithheld: IWithheld | null) => void,\r\n ): void {\r\n this.backend!.getEndToEndInboundGroupSession(senderCurve25519Key, sessionId, txn, func);\r\n }\r\n\r\n /**\r\n * Writes an end-to-end inbound group session to the store.\r\n * If there already exists an inbound group session with the same\r\n * senderCurve25519Key and sessionID, it will be overwritten.\r\n * @param senderCurve25519Key - The sender's curve 25519 key\r\n * @param sessionId - The ID of the session\r\n * @param sessionData - The session data structure\r\n * @param txn - An active transaction. See doTxn().\r\n */\r\n public storeEndToEndInboundGroupSession(\r\n senderCurve25519Key: string,\r\n sessionId: string,\r\n sessionData: InboundGroupSessionData,\r\n txn: IDBTransaction,\r\n ): void {\r\n this.backend!.storeEndToEndInboundGroupSession(senderCurve25519Key, sessionId, sessionData, txn);\r\n }\r\n\r\n /**\r\n * Fetch a batch of Megolm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public getEndToEndInboundGroupSessionsBatch(): Promise<SessionExtended[] | null> {\r\n return this.backend!.getEndToEndInboundGroupSessionsBatch();\r\n }\r\n\r\n /**\r\n * Delete a batch of Megolm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public deleteEndToEndInboundGroupSessionsBatch(\r\n sessions: { senderKey: string; sessionId: string }[],\r\n ): Promise<void> {\r\n return this.backend!.deleteEndToEndInboundGroupSessionsBatch(sessions);\r\n }\r\n\r\n /**\r\n * Get an object of `roomId->roomInfo` for all e2e rooms in the store\r\n * @param txn - An active transaction. See doTxn().\r\n * @param func - Function called with the end-to-end encrypted rooms\r\n */\r\n public getEndToEndRooms(txn: IDBTransaction, func: (rooms: Record<string, IRoomEncryption>) => void): void {\r\n this.backend!.getEndToEndRooms(txn, func);\r\n }\r\n\r\n /**\r\n * Mark sessions as needing to be backed up.\r\n * @param sessions - The sessions that need to be backed up.\r\n * @param txn - An active transaction. See doTxn(). (optional)\r\n * @returns resolves when the sessions are marked\r\n */\r\n public markSessionsNeedingBackup(sessions: ISession[], txn?: IDBTransaction): Promise<void> {\r\n return this.backend!.markSessionsNeedingBackup(sessions, txn);\r\n }\r\n\r\n /**\r\n * Perform a transaction on the crypto store. Any store methods\r\n * that require a transaction (txn) object to be passed in may\r\n * only be called within a callback of either this function or\r\n * one of the store functions operating on the same transaction.\r\n *\r\n * @param mode - 'readwrite' if you need to call setter\r\n * functions with this transaction. Otherwise, 'readonly'.\r\n * @param stores - List IndexedDBCryptoStore.STORE_*\r\n * options representing all types of object that will be\r\n * accessed or written to with this transaction.\r\n * @param func - Function called with the\r\n * transaction object: an opaque object that should be passed\r\n * to store functions.\r\n * @param log - A possibly customised log\r\n * @returns Promise that resolves with the result of the `func`\r\n * when the transaction is complete. If the backend is\r\n * async (ie. the indexeddb backend) any of the callback\r\n * functions throwing an exception will cause this promise to\r\n * reject with that exception. On synchronous backends, the\r\n * exception will propagate to the caller of the getFoo method.\r\n */\r\n public doTxn<T>(mode: Mode, stores: Iterable<string>, func: (txn: IDBTransaction) => T, log?: Logger): Promise<T> {\r\n return this.backend!.doTxn<T>(mode, stores, func as (txn: unknown) => T, log);\r\n }\r\n}\r\n"],"mappings":";;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASA,MAAM,QAAqB,iBAAiB;AACrD,SAASC,uBAAuB,QAAQ,gCAAgC;AACxE,SAASC,iBAAiB,QAAQ,0BAA0B;AAC5D,OAAO,KAAKC,2BAA2B,MAAM,qCAAqC;AAClF,SAASC,uBAAuB,EAAEC,uBAAuB,QAAQ,iBAAiB;AAClF,OAAO,KAAKC,gBAAgB,MAAM,4BAA4B;AAC9D,SAMIC,cAAc,EAGdC,kCAAkC,QAG/B,WAAW;AAGlB;AACA;AACA;;AAEA;AACA;AACA;AACA;AACA,OAAO,MAAMC,oBAAoB,CAAwB;EAWrD,OAAcC,MAAMA,CAACC,SAAqB,EAAEC,MAAc,EAAoB;IAC1E,OAAON,gBAAgB,CAACI,MAAM,CAACC,SAAS,EAAEC,MAAM,CAAC;EACrD;;EAEA;AACJ;AACA;AACA;EACI,OAAcC,sBAAsBA,CAACC,SAAqB,EAAEF,MAAc,EAAoB;IAC1F,OAAO,IAAIG,OAAO,CAAU,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC7C,IAAIP,MAAM,GAAG,IAAI;MACjB,IAAMQ,aAAa,GAAGJ,SAAS,CAACK,IAAI,CAACP,MAAM,CAAC;MAC5CM,aAAa,CAACE,eAAe,GAAG,MAAY;QACxC;QACA;QACAV,MAAM,GAAG,KAAK;MAClB,CAAC;MACDQ,aAAa,CAACG,SAAS,GAAG,MAAYJ,MAAM,CAACC,aAAa,CAACI,KAAK,CAAC;MACjEJ,aAAa,CAACK,SAAS,GAAG,MAAY;QAClC,IAAMC,EAAE,GAAGN,aAAa,CAACO,MAAM;QAC/B,IAAI,CAACf,MAAM,EAAE;UACTc,EAAE,CAACE,KAAK,CAAC,CAAC;UACV;UACA;UACA;UACA;UACA;UACAZ,SAAS,CAACa,cAAc,CAACf,MAAM,CAAC;UAChCI,OAAO,CAAC,KAAK,CAAC;QAClB,CAAC,MAAM;UACH,IAAMY,EAAE,GAAGJ,EAAE,CAACK,WAAW,CAAC,CAACpB,oBAAoB,CAACqB,aAAa,CAAC,EAAE,UAAU,CAAC;UAC3E,IAAMC,WAAW,GAAGH,EAAE,CAACG,WAAW,CAACtB,oBAAoB,CAACqB,aAAa,CAAC;UACtE,IAAME,MAAM,GAAGD,WAAW,CAACE,GAAG,CAACzB,kCAAkC,CAAC;UAElEwB,MAAM,CAACT,SAAS,GAAG,MAAY;YAAA,IAAAW,cAAA;YAC3B,IAAMC,cAAc,IAAAD,cAAA,GAAGF,MAAM,CAACP,MAAM,cAAAS,cAAA,cAAAA,cAAA,GAAI3B,cAAc,CAAC6B,WAAW;YAClEpB,OAAO,CAACmB,cAAc,KAAK5B,cAAc,CAAC6B,WAAW,CAAC;UAC1D,CAAC;UAEDJ,MAAM,CAACK,OAAO,GAAG,MAAY;YACzBpB,MAAM,CAACe,MAAM,CAACV,KAAK,CAAC;UACxB,CAAC;UAEDE,EAAE,CAACE,KAAK,CAAC,CAAC;QACd;MACJ,CAAC;MACDR,aAAa,CAACmB,OAAO,GAAG,MAAYpB,MAAM,CAACC,aAAa,CAACI,KAAK,CAAC;IACnE,CAAC,CAAC;EACN;EAKA;AACJ;AACA;AACA;AACA;AACA;EACWgB,WAAWA,CACG3B,SAAqB,EACrBC,MAAc,EACjC;IAAA,KAFmBD,SAAqB,GAArBA,SAAqB;IAAA,KACrBC,MAAc,GAAdA,MAAc;IAAA2B,eAAA;IAAAA,eAAA;EAChC;;EAEH;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBC,YAAYA,CAAA,EAAqB;IAAA,IAAAC,KAAA;IAAA,OAAAC,iBAAA;MAC1C,OAAOjC,oBAAoB,CAACC,MAAM,CAAC+B,KAAI,CAAC9B,SAAS,EAAE8B,KAAI,CAAC7B,MAAM,CAAC;IAAC;EACpE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACW+B,OAAOA,CAAA,EAAyB;IACnC,IAAI,IAAI,CAACC,cAAc,EAAE;MACrB,OAAO,IAAI,CAACA,cAAc;IAC9B;IAEA,IAAI,CAACA,cAAc,GAAG,IAAI7B,OAAO,CAAc,CAACC,OAAO,EAAEC,MAAM,KAAK;MAChE,IAAI,CAAC,IAAI,CAACN,SAAS,EAAE;QACjBM,MAAM,CAAC,IAAI4B,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACnD;MACJ;MAEA7C,MAAM,CAAC8C,GAAG,4BAAAC,MAAA,CAA4B,IAAI,CAACnC,MAAM,CAAE,CAAC;MAEpD,IAAMoC,GAAG,GAAG,IAAI,CAACrC,SAAS,CAACQ,IAAI,CAAC,IAAI,CAACP,MAAM,EAAET,2BAA2B,CAAC8C,OAAO,CAAC;MAEjFD,GAAG,CAAC5B,eAAe,GAAI8B,EAAE,IAAW;QAChC,IAAM1B,EAAE,GAAGwB,GAAG,CAACvB,MAAM;QACrB,IAAM0B,UAAU,GAAGD,EAAE,CAACC,UAAU;QAChChD,2BAA2B,CAACiD,eAAe,CAAC5B,EAAE,EAAE2B,UAAU,CAAC;MAC/D,CAAC;MAEDH,GAAG,CAAC3B,SAAS,GAAG,MAAY;QACxBrB,MAAM,CAAC8C,GAAG,mEAAmE,CAAC;MAClF,CAAC;MAEDE,GAAG,CAACX,OAAO,GAAIa,EAAE,IAAW;QACxBlD,MAAM,CAAC8C,GAAG,CAAC,+BAA+B,EAAEI,EAAE,CAAC;QAC/CjC,MAAM,CAAC+B,GAAG,CAAC1B,KAAK,CAAC;MACrB,CAAC;MAED0B,GAAG,CAACzB,SAAS,GAAG,MAAY;QACxB,IAAMC,EAAE,GAAGwB,GAAG,CAACvB,MAAM;QAErBzB,MAAM,CAAC8C,GAAG,2BAAAC,MAAA,CAA2B,IAAI,CAACnC,MAAM,CAAE,CAAC;QACnDI,OAAO,CAAC,IAAIb,2BAA2B,CAACkD,OAAO,CAAC7B,EAAE,CAAC,CAAC;MACxD,CAAC;IACL,CAAC,CAAC,CACG8B,IAAI,CAAEC,OAAO,IAAK;MACf;MACA;MACA;MACA,OAAOA,OAAO,CACTC,KAAK,CACF,UAAU,EACV,CACI/C,oBAAoB,CAACgD,4BAA4B,EACjDhD,oBAAoB,CAACiD,qCAAqC,CAC7D,EACAC,GAAG,IAAK;QACLJ,OAAO,CAACK,8BAA8B,CAAC,EAAE,EAAE,EAAE,EAAED,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC;MACjE,CACJ,CAAC,CACAL,IAAI,CAAC,MAAMC,OAAO,CAAC;IAC5B,CAAC,CAAC,CACDM,KAAK,CAAEC,CAAC,IAAK;MACV,IAAIA,CAAC,CAACC,IAAI,KAAK,cAAc,EAAE;QAC3B/D,MAAM,CAACgE,IAAI,CAAC,qCAAqC,EAAEF,CAAC,CAAC;QACrD;QACA;QACA,MAAM,IAAI1D,uBAAuB,CAACC,uBAAuB,CAAC4D,MAAM,CAAC;MACrE;MACAjE,MAAM,CAACgE,IAAI,CACP,kCAAAjB,MAAA,CAAkC,IAAI,CAACnC,MAAM,6CAAAmC,MAAA,CAA8Ce,CAAC,CAChG,CAAC;MAED,IAAI;QACA,IAAI,EAAEI,UAAU,CAACC,YAAY,YAAYC,OAAO,CAAC,EAAE;UAC/C,MAAM,IAAIvB,KAAK,CAAC,+BAA+B,CAAC;QACpD;QACA,OAAO,IAAI5C,uBAAuB,CAACiE,UAAU,CAACC,YAAY,CAAC;MAC/D,CAAC,CAAC,OAAOL,CAAC,EAAE;QACR9D,MAAM,CAACgE,IAAI,kEAAAjB,MAAA,CAAkEe,CAAC,CAAE,CAAC;QACjF,OAAO,IAAI5D,iBAAiB,CAAC,CAAC;MAClC;IACJ,CAAC,CAAC,CACDoD,IAAI,CAAEC,OAAO,IAAK;MACf,IAAI,CAACA,OAAO,GAAGA,OAAO;MACtB,OAAOA,OAAO;IAClB,CAAC,CAAC;IAEN,OAAO,IAAI,CAACX,cAAc;EAC9B;;EAEA;AACJ;AACA;AACA;AACA;EACWyB,aAAaA,CAAA,EAAkB;IAClC,OAAO,IAAItD,OAAO,CAAO,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC1C,IAAI,CAAC,IAAI,CAACN,SAAS,EAAE;QACjBM,MAAM,CAAC,IAAI4B,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACnD;MACJ;MAEA7C,MAAM,CAAC8C,GAAG,iCAAAC,MAAA,CAAiC,IAAI,CAACnC,MAAM,CAAE,CAAC;MACzD,IAAMoC,GAAG,GAAG,IAAI,CAACrC,SAAS,CAACgB,cAAc,CAAC,IAAI,CAACf,MAAM,CAAC;MAEtDoC,GAAG,CAAC3B,SAAS,GAAG,MAAY;QACxBrB,MAAM,CAAC8C,GAAG,qEAAqE,CAAC;MACpF,CAAC;MAEDE,GAAG,CAACX,OAAO,GAAIa,EAAE,IAAW;QACxBlD,MAAM,CAAC8C,GAAG,CAAC,oCAAoC,EAAEI,EAAE,CAAC;QACpDjC,MAAM,CAAC+B,GAAG,CAAC1B,KAAK,CAAC;MACrB,CAAC;MAED0B,GAAG,CAACzB,SAAS,GAAG,MAAY;QACxBvB,MAAM,CAAC8C,GAAG,gCAAAC,MAAA,CAAgC,IAAI,CAACnC,MAAM,CAAE,CAAC;QACxDI,OAAO,CAAC,CAAC;MACb,CAAC;IACL,CAAC,CAAC,CAAC6C,KAAK,CAAEC,CAAC,IAAK;MACZ;MACA;MACA;MACA9D,MAAM,CAACgE,IAAI,2CAAAjB,MAAA,CAA2Ce,CAAC,CAAE,CAAC;IAC9D,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWQ,iBAAiBA,CAAA,EAA4B;IAChD,OAAO,IAAI,CAACf,OAAO,CAAEe,iBAAiB,CAAC,CAAC;EAC5C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,iBAAiBA,CAACpC,cAA8B,EAAiB;IACpE,OAAO,IAAI,CAACoB,OAAO,CAAEgB,iBAAiB,CAACpC,cAAc,CAAC;EAC1D;;EAEA;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWqC,UAAUA,CAACb,GAAmB,EAAEc,IAA4C,EAAQ;IACvF,IAAI,CAAClB,OAAO,CAAEiB,UAAU,CAACb,GAAG,EAAEc,IAAI,CAAC;EACvC;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,YAAYA,CAACf,GAAmB,EAAEgB,aAAqB,EAAQ;IAClE,IAAI,CAACpB,OAAO,CAAEmB,YAAY,CAACf,GAAG,EAAEgB,aAAa,CAAC;EAClD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,mBAAmBA,CACtBjB,GAAmB,EACnBc,IAAgE,EAC5D;IACJ,IAAI,CAAClB,OAAO,CAAEqB,mBAAmB,CAACjB,GAAG,EAAEc,IAAI,CAAC;EAChD;;EAEA;AACJ;AACA;AACA;AACA;EACWI,wBAAwBA,CAC3BlB,GAAmB,EACnBc,IAAqD,EACrDK,IAAO,EACH;IACJ,IAAI,CAACvB,OAAO,CAAEsB,wBAAwB,CAAClB,GAAG,EAAEc,IAAI,EAAEK,IAAI,CAAC;EAC3D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,0BAA0BA,CAC7BpB,GAAmB,EACnBmB,IAAO,EACPE,GAA8B,EAC1B;IACJ,IAAI,CAACzB,OAAO,CAAEwB,0BAA0B,CAACpB,GAAG,EAAEmB,IAAI,EAAEE,GAAG,CAAC;EAC5D;;EAEA;;EAEA;AACJ;AACA;AACA;AACA;EACWC,qBAAqBA,CAACtB,GAAmB,EAAEc,IAA6B,EAAQ;IACnF,IAAI,CAAClB,OAAO,CAAE0B,qBAAqB,CAACtB,GAAG,EAAEc,IAAI,CAAC;EAClD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWS,kBAAkBA,CACrBC,SAAiB,EACjBC,SAAiB,EACjBzB,GAAmB,EACnBc,IAA4C,EACxC;IACJ,IAAI,CAAClB,OAAO,CAAE2B,kBAAkB,CAACC,SAAS,EAAEC,SAAS,EAAEzB,GAAG,EAAEc,IAAI,CAAC;EACrE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWY,mBAAmBA,CACtBF,SAAiB,EACjBxB,GAAmB,EACnBc,IAA+D,EAC3D;IACJ,IAAI,CAAClB,OAAO,CAAE8B,mBAAmB,CAACF,SAAS,EAAExB,GAAG,EAAEc,IAAI,CAAC;EAC3D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWa,oBAAoBA,CACvBH,SAAiB,EACjBC,SAAiB,EACjBG,WAAyB,EACzB5B,GAAmB,EACf;IACJ,IAAI,CAACJ,OAAO,CAAE+B,oBAAoB,CAACH,SAAS,EAAEC,SAAS,EAAEG,WAAW,EAAE5B,GAAG,CAAC;EAC9E;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACW6B,iCAAiCA,CAAA,EAAoB;IACxD,OAAO,IAAI,CAACjC,OAAO,CAAEiC,iCAAiC,CAAC,CAAC;EAC5D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,wBAAwBA,CAAA,EAAmC;IAC9D,OAAO,IAAI,CAAClC,OAAO,CAAEkC,wBAAwB,CAAC,CAAC;EACnD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,2BAA2BA,CAACC,QAAoD,EAAiB;IACpG,OAAO,IAAI,CAACpC,OAAO,CAAEmC,2BAA2B,CAACC,QAAQ,CAAC;EAC9D;;EAEA;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACW/B,8BAA8BA,CACjCgC,mBAA2B,EAC3BR,SAAiB,EACjBzB,GAAmB,EACnBc,IAAoG,EAChG;IACJ,IAAI,CAAClB,OAAO,CAAEK,8BAA8B,CAACgC,mBAAmB,EAAER,SAAS,EAAEzB,GAAG,EAAEc,IAAI,CAAC;EAC3F;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWoB,gCAAgCA,CACnCD,mBAA2B,EAC3BR,SAAiB,EACjBU,WAAoC,EACpCnC,GAAmB,EACf;IACJ,IAAI,CAACJ,OAAO,CAAEsC,gCAAgC,CAACD,mBAAmB,EAAER,SAAS,EAAEU,WAAW,EAAEnC,GAAG,CAAC;EACpG;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWoC,oCAAoCA,CAAA,EAAsC;IAC7E,OAAO,IAAI,CAACxC,OAAO,CAAEwC,oCAAoC,CAAC,CAAC;EAC/D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,uCAAuCA,CAC1CL,QAAoD,EACvC;IACb,OAAO,IAAI,CAACpC,OAAO,CAAEyC,uCAAuC,CAACL,QAAQ,CAAC;EAC1E;;EAEA;AACJ;AACA;AACA;AACA;EACWM,gBAAgBA,CAACtC,GAAmB,EAAEc,IAAsD,EAAQ;IACvG,IAAI,CAAClB,OAAO,CAAE0C,gBAAgB,CAACtC,GAAG,EAAEc,IAAI,CAAC;EAC7C;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWyB,yBAAyBA,CAACP,QAAoB,EAAEhC,GAAoB,EAAiB;IACxF,OAAO,IAAI,CAACJ,OAAO,CAAE2C,yBAAyB,CAACP,QAAQ,EAAEhC,GAAG,CAAC;EACjE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWH,KAAKA,CAAI2C,IAAU,EAAEC,MAAwB,EAAE3B,IAAgC,EAAE3B,GAAY,EAAc;IAC9G,OAAO,IAAI,CAACS,OAAO,CAAEC,KAAK,CAAI2C,IAAI,EAAEC,MAAM,EAAE3B,IAAI,EAAyB3B,GAAG,CAAC;EACjF;AACJ;AAACP,eAAA,CA7fY9B,oBAAoB,mBACC,SAAS;AAAA8B,eAAA,CAD9B9B,oBAAoB,oBAEE,UAAU;AAAA8B,eAAA,CAFhC9B,oBAAoB,kCAGgB,wBAAwB;AAAA8B,eAAA,CAH5D9B,oBAAoB,2CAIyB,iCAAiC;AAAA8B,eAAA,CAJ9E9B,oBAAoB,iDAK+B,uCAAuC;AAAA8B,eAAA,CAL1F9B,oBAAoB,iCAMe,uBAAuB;AAAA8B,eAAA,CAN1D9B,oBAAoB,uBAOK,aAAa;AAAA8B,eAAA,CAPtC9B,oBAAoB,iBAQD,OAAO;AAAA8B,eAAA,CAR1B9B,oBAAoB,kBASA,yBAAyB","ignoreList":[]}
1
+ {"version":3,"file":"indexeddb-crypto-store.js","names":["logger","LocalStorageCryptoStore","MemoryCryptoStore","IndexedDBCryptoStoreBackend","InvalidCryptoStoreError","InvalidCryptoStoreState","IndexedDBHelpers","MigrationState","ACCOUNT_OBJECT_KEY_MIGRATION_STATE","IndexedDBCryptoStore","exists","indexedDB","dbName","existsAndIsNotMigrated","indexedDb","Promise","resolve","reject","openDBRequest","open","onupgradeneeded","onblocked","error","onsuccess","db","result","close","deleteDatabase","tx","transaction","STORE_ACCOUNT","objectStore","getReq","get","_getReq$result","migrationState","NOT_STARTED","onerror","constructor","_defineProperty","containsData","_this","_asyncToGenerator","startup","backendPromise","Error","log","concat","req","VERSION","ev","oldVersion","upgradeDatabase","Backend","then","backend","doTxn","STORE_INBOUND_GROUP_SESSIONS","STORE_INBOUND_GROUP_SESSIONS_WITHHELD","txn","getEndToEndInboundGroupSession","catch","e","name","warn","TooNew","globalThis","localStorage","Storage","deleteAllData","getMigrationState","setMigrationState","getAccount","func","storeAccount","accountPickle","getCrossSigningKeys","getSecretStorePrivateKey","type","storeSecretStorePrivateKey","key","countEndToEndSessions","getEndToEndSession","deviceKey","sessionId","getEndToEndSessions","storeEndToEndSession","sessionInfo","countEndToEndInboundGroupSessions","getEndToEndSessionsBatch","deleteEndToEndSessionsBatch","sessions","senderCurve25519Key","storeEndToEndInboundGroupSession","sessionData","getEndToEndInboundGroupSessionsBatch","deleteEndToEndInboundGroupSessionsBatch","getEndToEndRooms","markSessionsNeedingBackup","mode","stores"],"sources":["../../../src/crypto/store/indexeddb-crypto-store.ts"],"sourcesContent":["/*\nCopyright 2017 - 2021 The Matrix.org Foundation C.I.C.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\nimport { logger, type Logger } from \"../../logger.ts\";\nimport { LocalStorageCryptoStore } from \"./localStorage-crypto-store.ts\";\nimport { MemoryCryptoStore } from \"./memory-crypto-store.ts\";\nimport * as IndexedDBCryptoStoreBackend from \"./indexeddb-crypto-store-backend.ts\";\nimport { InvalidCryptoStoreError, InvalidCryptoStoreState } from \"../../errors.ts\";\nimport * as IndexedDBHelpers from \"../../indexeddb-helpers.ts\";\nimport {\n type CryptoStore,\n type ISession,\n type SessionExtended,\n type ISessionInfo,\n type IWithheld,\n MigrationState,\n type Mode,\n type SecretStorePrivateKeys,\n ACCOUNT_OBJECT_KEY_MIGRATION_STATE,\n type InboundGroupSessionData,\n type IRoomEncryption,\n} from \"./base.ts\";\nimport { type CrossSigningKeyInfo } from \"../../crypto-api/index.ts\";\n\n/*\n * Internal module. indexeddb storage for e2e.\n */\n\n/**\n * An implementation of CryptoStore, which is normally backed by an indexeddb,\n * but with fallback to MemoryCryptoStore.\n */\nexport class IndexedDBCryptoStore implements CryptoStore {\n public static STORE_ACCOUNT = \"account\";\n public static STORE_SESSIONS = \"sessions\";\n public static STORE_INBOUND_GROUP_SESSIONS = \"inbound_group_sessions\";\n public static STORE_INBOUND_GROUP_SESSIONS_WITHHELD = \"inbound_group_sessions_withheld\";\n public static STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS = \"shared_history_inbound_group_sessions\";\n public static STORE_PARKED_SHARED_HISTORY = \"parked_shared_history\";\n public static STORE_DEVICE_DATA = \"device_data\";\n public static STORE_ROOMS = \"rooms\";\n public static STORE_BACKUP = \"sessions_needing_backup\";\n\n public static exists(indexedDB: IDBFactory, dbName: string): Promise<boolean> {\n return IndexedDBHelpers.exists(indexedDB, dbName);\n }\n\n /**\n * Utility to check if a legacy crypto store exists and has not been migrated.\n * Returns true if the store exists and has not been migrated, false otherwise.\n */\n public static existsAndIsNotMigrated(indexedDb: IDBFactory, dbName: string): Promise<boolean> {\n return new Promise<boolean>((resolve, reject) => {\n let exists = true;\n const openDBRequest = indexedDb.open(dbName);\n openDBRequest.onupgradeneeded = (): void => {\n // Since we did not provide an explicit version when opening, this event\n // should only fire if the DB did not exist before at any version.\n exists = false;\n };\n openDBRequest.onblocked = (): void => reject(openDBRequest.error);\n openDBRequest.onsuccess = (): void => {\n const db = openDBRequest.result;\n if (!exists) {\n db.close();\n // The DB did not exist before, but has been created as part of this\n // existence check. Delete it now to restore previous state. Delete can\n // actually take a while to complete in some browsers, so don't wait for\n // it. This won't block future open calls that a store might issue next to\n // properly set up the DB.\n indexedDb.deleteDatabase(dbName);\n resolve(false);\n } else {\n const tx = db.transaction([IndexedDBCryptoStore.STORE_ACCOUNT], \"readonly\");\n const objectStore = tx.objectStore(IndexedDBCryptoStore.STORE_ACCOUNT);\n const getReq = objectStore.get(ACCOUNT_OBJECT_KEY_MIGRATION_STATE);\n\n getReq.onsuccess = (): void => {\n const migrationState = getReq.result ?? MigrationState.NOT_STARTED;\n resolve(migrationState === MigrationState.NOT_STARTED);\n };\n\n getReq.onerror = (): void => {\n reject(getReq.error);\n };\n\n db.close();\n }\n };\n openDBRequest.onerror = (): void => reject(openDBRequest.error);\n });\n }\n\n private backendPromise?: Promise<CryptoStore>;\n private backend?: CryptoStore;\n\n /**\n * Create a new IndexedDBCryptoStore\n *\n * @param indexedDB - global indexedDB instance\n * @param dbName - name of db to connect to\n */\n public constructor(\n private readonly indexedDB: IDBFactory,\n private readonly dbName: string,\n ) {}\n\n /**\n * Returns true if this CryptoStore has ever been initialised (ie, it might contain data).\n *\n * Implementation of {@link CryptoStore.containsData}.\n *\n * @internal\n */\n public async containsData(): Promise<boolean> {\n return IndexedDBCryptoStore.exists(this.indexedDB, this.dbName);\n }\n\n /**\n * Ensure the database exists and is up-to-date, or fall back to\n * a local storage or in-memory store.\n *\n * This must be called before the store can be used.\n *\n * @returns resolves to either an IndexedDBCryptoStoreBackend.Backend,\n * or a MemoryCryptoStore\n */\n public startup(): Promise<CryptoStore> {\n if (this.backendPromise) {\n return this.backendPromise;\n }\n\n this.backendPromise = new Promise<CryptoStore>((resolve, reject) => {\n if (!this.indexedDB) {\n reject(new Error(\"no indexeddb support available\"));\n return;\n }\n\n logger.log(`connecting to indexeddb ${this.dbName}`);\n\n const req = this.indexedDB.open(this.dbName, IndexedDBCryptoStoreBackend.VERSION);\n\n req.onupgradeneeded = (ev): void => {\n const db = req.result;\n const oldVersion = ev.oldVersion;\n IndexedDBCryptoStoreBackend.upgradeDatabase(db, oldVersion);\n };\n\n req.onblocked = (): void => {\n logger.log(`can't yet open IndexedDBCryptoStore because it is open elsewhere`);\n };\n\n req.onerror = (ev): void => {\n logger.log(\"Error connecting to indexeddb\", ev);\n reject(req.error);\n };\n\n req.onsuccess = (): void => {\n const db = req.result;\n\n logger.log(`connected to indexeddb ${this.dbName}`);\n resolve(new IndexedDBCryptoStoreBackend.Backend(db));\n };\n })\n .then((backend) => {\n // Edge has IndexedDB but doesn't support compund keys which we use fairly extensively.\n // Try a dummy query which will fail if the browser doesn't support compund keys, so\n // we can fall back to a different backend.\n return backend\n .doTxn(\n \"readonly\",\n [\n IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,\n IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,\n ],\n (txn) => {\n backend.getEndToEndInboundGroupSession(\"\", \"\", txn, () => {});\n },\n )\n .then(() => backend);\n })\n .catch((e) => {\n if (e.name === \"VersionError\") {\n logger.warn(\"Crypto DB is too new for us to use!\", e);\n // don't fall back to a different store: the user has crypto data\n // in this db so we should use it or nothing at all.\n throw new InvalidCryptoStoreError(InvalidCryptoStoreState.TooNew);\n }\n logger.warn(\n `unable to connect to indexeddb ${this.dbName}` + `: falling back to localStorage store: ${e}`,\n );\n\n try {\n if (!(globalThis.localStorage instanceof Storage)) {\n throw new Error(\"localStorage is not available\");\n }\n return new LocalStorageCryptoStore(globalThis.localStorage);\n } catch (e) {\n logger.warn(`Unable to open localStorage: falling back to in-memory store: ${e}`);\n return new MemoryCryptoStore();\n }\n })\n .then((backend) => {\n this.backend = backend;\n return backend;\n });\n\n return this.backendPromise;\n }\n\n /**\n * Delete all data from this store.\n *\n * @returns resolves when the store has been cleared.\n */\n public deleteAllData(): Promise<void> {\n return new Promise<void>((resolve, reject) => {\n if (!this.indexedDB) {\n reject(new Error(\"no indexeddb support available\"));\n return;\n }\n\n logger.log(`Removing indexeddb instance: ${this.dbName}`);\n const req = this.indexedDB.deleteDatabase(this.dbName);\n\n req.onblocked = (): void => {\n logger.log(`can't yet delete IndexedDBCryptoStore because it is open elsewhere`);\n };\n\n req.onerror = (ev): void => {\n logger.log(\"Error deleting data from indexeddb\", ev);\n reject(req.error);\n };\n\n req.onsuccess = (): void => {\n logger.log(`Removed indexeddb instance: ${this.dbName}`);\n resolve();\n };\n }).catch((e) => {\n // in firefox, with indexedDB disabled, this fails with a\n // DOMError. We treat this as non-fatal, so that people can\n // still use the app.\n logger.warn(`unable to delete IndexedDBCryptoStore: ${e}`);\n });\n }\n\n /**\n * Get data on how much of the libolm to Rust Crypto migration has been done.\n *\n * Implementation of {@link CryptoStore.getMigrationState}.\n *\n * @internal\n */\n public getMigrationState(): Promise<MigrationState> {\n return this.backend!.getMigrationState();\n }\n\n /**\n * Set data on how much of the libolm to Rust Crypto migration has been done.\n *\n * Implementation of {@link CryptoStore.setMigrationState}.\n *\n * @internal\n */\n public setMigrationState(migrationState: MigrationState): Promise<void> {\n return this.backend!.setMigrationState(migrationState);\n }\n\n // Olm Account\n\n /*\n * Get the account pickle from the store.\n * This requires an active transaction. See doTxn().\n *\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with the account pickle\n */\n public getAccount(txn: IDBTransaction, func: (accountPickle: string | null) => void): void {\n this.backend!.getAccount(txn, func);\n }\n\n /**\n * Write the account pickle to the store.\n * This requires an active transaction. See doTxn().\n *\n * @param txn - An active transaction. See doTxn().\n * @param accountPickle - The new account pickle to store.\n */\n public storeAccount(txn: IDBTransaction, accountPickle: string): void {\n this.backend!.storeAccount(txn, accountPickle);\n }\n\n /**\n * Get the public part of the cross-signing keys (eg. self-signing key,\n * user signing key).\n *\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with the account keys object:\n * `{ key_type: base64 encoded seed }` where key type = user_signing_key_seed or self_signing_key_seed\n */\n public getCrossSigningKeys(\n txn: IDBTransaction,\n func: (keys: Record<string, CrossSigningKeyInfo> | null) => void,\n ): void {\n this.backend!.getCrossSigningKeys(txn, func);\n }\n\n /**\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with the private key\n * @param type - A key type\n */\n public getSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\n txn: IDBTransaction,\n func: (key: SecretStorePrivateKeys[K] | null) => void,\n type: K,\n ): void {\n this.backend!.getSecretStorePrivateKey(txn, func, type);\n }\n\n /**\n * Write the cross-signing private keys back to the store\n *\n * @param txn - An active transaction. See doTxn().\n * @param type - The type of cross-signing private key to store\n * @param key - keys object as getCrossSigningKeys()\n */\n public storeSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\n txn: IDBTransaction,\n type: K,\n key: SecretStorePrivateKeys[K],\n ): void {\n this.backend!.storeSecretStorePrivateKey(txn, type, key);\n }\n\n // Olm sessions\n\n /**\n * Returns the number of end-to-end sessions in the store\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with the count of sessions\n */\n public countEndToEndSessions(txn: IDBTransaction, func: (count: number) => void): void {\n this.backend!.countEndToEndSessions(txn, func);\n }\n\n /**\n * Retrieve a specific end-to-end session between the logged-in user\n * and another device.\n * @param deviceKey - The public key of the other device.\n * @param sessionId - The ID of the session to retrieve\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with A map from sessionId\n * to session information object with 'session' key being the\n * Base64 end-to-end session and lastReceivedMessageTs being the\n * timestamp in milliseconds at which the session last received\n * a message.\n */\n public getEndToEndSession(\n deviceKey: string,\n sessionId: string,\n txn: IDBTransaction,\n func: (session: ISessionInfo | null) => void,\n ): void {\n this.backend!.getEndToEndSession(deviceKey, sessionId, txn, func);\n }\n\n /**\n * Retrieve the end-to-end sessions between the logged-in user and another\n * device.\n * @param deviceKey - The public key of the other device.\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with A map from sessionId\n * to session information object with 'session' key being the\n * Base64 end-to-end session and lastReceivedMessageTs being the\n * timestamp in milliseconds at which the session last received\n * a message.\n */\n public getEndToEndSessions(\n deviceKey: string,\n txn: IDBTransaction,\n func: (sessions: { [sessionId: string]: ISessionInfo }) => void,\n ): void {\n this.backend!.getEndToEndSessions(deviceKey, txn, func);\n }\n\n /**\n * Store a session between the logged-in user and another device\n * @param deviceKey - The public key of the other device.\n * @param sessionId - The ID for this end-to-end session.\n * @param sessionInfo - Session information object\n * @param txn - An active transaction. See doTxn().\n */\n public storeEndToEndSession(\n deviceKey: string,\n sessionId: string,\n sessionInfo: ISessionInfo,\n txn: IDBTransaction,\n ): void {\n this.backend!.storeEndToEndSession(deviceKey, sessionId, sessionInfo, txn);\n }\n\n /**\n * Count the number of Megolm sessions in the database.\n *\n * Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.\n *\n * @internal\n */\n public countEndToEndInboundGroupSessions(): Promise<number> {\n return this.backend!.countEndToEndInboundGroupSessions();\n }\n\n /**\n * Fetch a batch of Olm sessions from the database.\n *\n * Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.\n *\n * @internal\n */\n public getEndToEndSessionsBatch(): Promise<null | ISessionInfo[]> {\n return this.backend!.getEndToEndSessionsBatch();\n }\n\n /**\n * Delete a batch of Olm sessions from the database.\n *\n * Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.\n *\n * @internal\n */\n public deleteEndToEndSessionsBatch(sessions: { deviceKey: string; sessionId: string }[]): Promise<void> {\n return this.backend!.deleteEndToEndSessionsBatch(sessions);\n }\n\n // Inbound group sessions\n\n /**\n * Retrieve the end-to-end inbound group session for a given\n * server key and session ID\n * @param senderCurve25519Key - The sender's curve 25519 key\n * @param sessionId - The ID of the session\n * @param txn - An active transaction. See doTxn().\n * @param func - Called with A map from sessionId\n * to Base64 end-to-end session.\n */\n public getEndToEndInboundGroupSession(\n senderCurve25519Key: string,\n sessionId: string,\n txn: IDBTransaction,\n func: (groupSession: InboundGroupSessionData | null, groupSessionWithheld: IWithheld | null) => void,\n ): void {\n this.backend!.getEndToEndInboundGroupSession(senderCurve25519Key, sessionId, txn, func);\n }\n\n /**\n * Writes an end-to-end inbound group session to the store.\n * If there already exists an inbound group session with the same\n * senderCurve25519Key and sessionID, it will be overwritten.\n * @param senderCurve25519Key - The sender's curve 25519 key\n * @param sessionId - The ID of the session\n * @param sessionData - The session data structure\n * @param txn - An active transaction. See doTxn().\n */\n public storeEndToEndInboundGroupSession(\n senderCurve25519Key: string,\n sessionId: string,\n sessionData: InboundGroupSessionData,\n txn: IDBTransaction,\n ): void {\n this.backend!.storeEndToEndInboundGroupSession(senderCurve25519Key, sessionId, sessionData, txn);\n }\n\n /**\n * Fetch a batch of Megolm sessions from the database.\n *\n * Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.\n *\n * @internal\n */\n public getEndToEndInboundGroupSessionsBatch(): Promise<SessionExtended[] | null> {\n return this.backend!.getEndToEndInboundGroupSessionsBatch();\n }\n\n /**\n * Delete a batch of Megolm sessions from the database.\n *\n * Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.\n *\n * @internal\n */\n public deleteEndToEndInboundGroupSessionsBatch(\n sessions: { senderKey: string; sessionId: string }[],\n ): Promise<void> {\n return this.backend!.deleteEndToEndInboundGroupSessionsBatch(sessions);\n }\n\n /**\n * Get an object of `roomId->roomInfo` for all e2e rooms in the store\n * @param txn - An active transaction. See doTxn().\n * @param func - Function called with the end-to-end encrypted rooms\n */\n public getEndToEndRooms(txn: IDBTransaction, func: (rooms: Record<string, IRoomEncryption>) => void): void {\n this.backend!.getEndToEndRooms(txn, func);\n }\n\n /**\n * Mark sessions as needing to be backed up.\n * @param sessions - The sessions that need to be backed up.\n * @param txn - An active transaction. See doTxn(). (optional)\n * @returns resolves when the sessions are marked\n */\n public markSessionsNeedingBackup(sessions: ISession[], txn?: IDBTransaction): Promise<void> {\n return this.backend!.markSessionsNeedingBackup(sessions, txn);\n }\n\n /**\n * Perform a transaction on the crypto store. Any store methods\n * that require a transaction (txn) object to be passed in may\n * only be called within a callback of either this function or\n * one of the store functions operating on the same transaction.\n *\n * @param mode - 'readwrite' if you need to call setter\n * functions with this transaction. Otherwise, 'readonly'.\n * @param stores - List IndexedDBCryptoStore.STORE_*\n * options representing all types of object that will be\n * accessed or written to with this transaction.\n * @param func - Function called with the\n * transaction object: an opaque object that should be passed\n * to store functions.\n * @param log - A possibly customised log\n * @returns Promise that resolves with the result of the `func`\n * when the transaction is complete. If the backend is\n * async (ie. the indexeddb backend) any of the callback\n * functions throwing an exception will cause this promise to\n * reject with that exception. On synchronous backends, the\n * exception will propagate to the caller of the getFoo method.\n */\n public doTxn<T>(mode: Mode, stores: Iterable<string>, func: (txn: IDBTransaction) => T, log?: Logger): Promise<T> {\n return this.backend!.doTxn<T>(mode, stores, func as (txn: unknown) => T, log);\n }\n}\n"],"mappings":";;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASA,MAAM,QAAqB,iBAAiB;AACrD,SAASC,uBAAuB,QAAQ,gCAAgC;AACxE,SAASC,iBAAiB,QAAQ,0BAA0B;AAC5D,OAAO,KAAKC,2BAA2B,MAAM,qCAAqC;AAClF,SAASC,uBAAuB,EAAEC,uBAAuB,QAAQ,iBAAiB;AAClF,OAAO,KAAKC,gBAAgB,MAAM,4BAA4B;AAC9D,SAMIC,cAAc,EAGdC,kCAAkC,QAG/B,WAAW;AAGlB;AACA;AACA;;AAEA;AACA;AACA;AACA;AACA,OAAO,MAAMC,oBAAoB,CAAwB;EAWrD,OAAcC,MAAMA,CAACC,SAAqB,EAAEC,MAAc,EAAoB;IAC1E,OAAON,gBAAgB,CAACI,MAAM,CAACC,SAAS,EAAEC,MAAM,CAAC;EACrD;;EAEA;AACJ;AACA;AACA;EACI,OAAcC,sBAAsBA,CAACC,SAAqB,EAAEF,MAAc,EAAoB;IAC1F,OAAO,IAAIG,OAAO,CAAU,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC7C,IAAIP,MAAM,GAAG,IAAI;MACjB,IAAMQ,aAAa,GAAGJ,SAAS,CAACK,IAAI,CAACP,MAAM,CAAC;MAC5CM,aAAa,CAACE,eAAe,GAAG,MAAY;QACxC;QACA;QACAV,MAAM,GAAG,KAAK;MAClB,CAAC;MACDQ,aAAa,CAACG,SAAS,GAAG,MAAYJ,MAAM,CAACC,aAAa,CAACI,KAAK,CAAC;MACjEJ,aAAa,CAACK,SAAS,GAAG,MAAY;QAClC,IAAMC,EAAE,GAAGN,aAAa,CAACO,MAAM;QAC/B,IAAI,CAACf,MAAM,EAAE;UACTc,EAAE,CAACE,KAAK,CAAC,CAAC;UACV;UACA;UACA;UACA;UACA;UACAZ,SAAS,CAACa,cAAc,CAACf,MAAM,CAAC;UAChCI,OAAO,CAAC,KAAK,CAAC;QAClB,CAAC,MAAM;UACH,IAAMY,EAAE,GAAGJ,EAAE,CAACK,WAAW,CAAC,CAACpB,oBAAoB,CAACqB,aAAa,CAAC,EAAE,UAAU,CAAC;UAC3E,IAAMC,WAAW,GAAGH,EAAE,CAACG,WAAW,CAACtB,oBAAoB,CAACqB,aAAa,CAAC;UACtE,IAAME,MAAM,GAAGD,WAAW,CAACE,GAAG,CAACzB,kCAAkC,CAAC;UAElEwB,MAAM,CAACT,SAAS,GAAG,MAAY;YAAA,IAAAW,cAAA;YAC3B,IAAMC,cAAc,IAAAD,cAAA,GAAGF,MAAM,CAACP,MAAM,cAAAS,cAAA,cAAAA,cAAA,GAAI3B,cAAc,CAAC6B,WAAW;YAClEpB,OAAO,CAACmB,cAAc,KAAK5B,cAAc,CAAC6B,WAAW,CAAC;UAC1D,CAAC;UAEDJ,MAAM,CAACK,OAAO,GAAG,MAAY;YACzBpB,MAAM,CAACe,MAAM,CAACV,KAAK,CAAC;UACxB,CAAC;UAEDE,EAAE,CAACE,KAAK,CAAC,CAAC;QACd;MACJ,CAAC;MACDR,aAAa,CAACmB,OAAO,GAAG,MAAYpB,MAAM,CAACC,aAAa,CAACI,KAAK,CAAC;IACnE,CAAC,CAAC;EACN;EAKA;AACJ;AACA;AACA;AACA;AACA;EACWgB,WAAWA,CACG3B,SAAqB,EACrBC,MAAc,EACjC;IAAA,KAFmBD,SAAqB,GAArBA,SAAqB;IAAA,KACrBC,MAAc,GAAdA,MAAc;IAAA2B,eAAA;IAAAA,eAAA;EAChC;;EAEH;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBC,YAAYA,CAAA,EAAqB;IAAA,IAAAC,KAAA;IAAA,OAAAC,iBAAA;MAC1C,OAAOjC,oBAAoB,CAACC,MAAM,CAAC+B,KAAI,CAAC9B,SAAS,EAAE8B,KAAI,CAAC7B,MAAM,CAAC;IAAC;EACpE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACW+B,OAAOA,CAAA,EAAyB;IACnC,IAAI,IAAI,CAACC,cAAc,EAAE;MACrB,OAAO,IAAI,CAACA,cAAc;IAC9B;IAEA,IAAI,CAACA,cAAc,GAAG,IAAI7B,OAAO,CAAc,CAACC,OAAO,EAAEC,MAAM,KAAK;MAChE,IAAI,CAAC,IAAI,CAACN,SAAS,EAAE;QACjBM,MAAM,CAAC,IAAI4B,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACnD;MACJ;MAEA7C,MAAM,CAAC8C,GAAG,4BAAAC,MAAA,CAA4B,IAAI,CAACnC,MAAM,CAAE,CAAC;MAEpD,IAAMoC,GAAG,GAAG,IAAI,CAACrC,SAAS,CAACQ,IAAI,CAAC,IAAI,CAACP,MAAM,EAAET,2BAA2B,CAAC8C,OAAO,CAAC;MAEjFD,GAAG,CAAC5B,eAAe,GAAI8B,EAAE,IAAW;QAChC,IAAM1B,EAAE,GAAGwB,GAAG,CAACvB,MAAM;QACrB,IAAM0B,UAAU,GAAGD,EAAE,CAACC,UAAU;QAChChD,2BAA2B,CAACiD,eAAe,CAAC5B,EAAE,EAAE2B,UAAU,CAAC;MAC/D,CAAC;MAEDH,GAAG,CAAC3B,SAAS,GAAG,MAAY;QACxBrB,MAAM,CAAC8C,GAAG,mEAAmE,CAAC;MAClF,CAAC;MAEDE,GAAG,CAACX,OAAO,GAAIa,EAAE,IAAW;QACxBlD,MAAM,CAAC8C,GAAG,CAAC,+BAA+B,EAAEI,EAAE,CAAC;QAC/CjC,MAAM,CAAC+B,GAAG,CAAC1B,KAAK,CAAC;MACrB,CAAC;MAED0B,GAAG,CAACzB,SAAS,GAAG,MAAY;QACxB,IAAMC,EAAE,GAAGwB,GAAG,CAACvB,MAAM;QAErBzB,MAAM,CAAC8C,GAAG,2BAAAC,MAAA,CAA2B,IAAI,CAACnC,MAAM,CAAE,CAAC;QACnDI,OAAO,CAAC,IAAIb,2BAA2B,CAACkD,OAAO,CAAC7B,EAAE,CAAC,CAAC;MACxD,CAAC;IACL,CAAC,CAAC,CACG8B,IAAI,CAAEC,OAAO,IAAK;MACf;MACA;MACA;MACA,OAAOA,OAAO,CACTC,KAAK,CACF,UAAU,EACV,CACI/C,oBAAoB,CAACgD,4BAA4B,EACjDhD,oBAAoB,CAACiD,qCAAqC,CAC7D,EACAC,GAAG,IAAK;QACLJ,OAAO,CAACK,8BAA8B,CAAC,EAAE,EAAE,EAAE,EAAED,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC;MACjE,CACJ,CAAC,CACAL,IAAI,CAAC,MAAMC,OAAO,CAAC;IAC5B,CAAC,CAAC,CACDM,KAAK,CAAEC,CAAC,IAAK;MACV,IAAIA,CAAC,CAACC,IAAI,KAAK,cAAc,EAAE;QAC3B/D,MAAM,CAACgE,IAAI,CAAC,qCAAqC,EAAEF,CAAC,CAAC;QACrD;QACA;QACA,MAAM,IAAI1D,uBAAuB,CAACC,uBAAuB,CAAC4D,MAAM,CAAC;MACrE;MACAjE,MAAM,CAACgE,IAAI,CACP,kCAAAjB,MAAA,CAAkC,IAAI,CAACnC,MAAM,6CAAAmC,MAAA,CAA8Ce,CAAC,CAChG,CAAC;MAED,IAAI;QACA,IAAI,EAAEI,UAAU,CAACC,YAAY,YAAYC,OAAO,CAAC,EAAE;UAC/C,MAAM,IAAIvB,KAAK,CAAC,+BAA+B,CAAC;QACpD;QACA,OAAO,IAAI5C,uBAAuB,CAACiE,UAAU,CAACC,YAAY,CAAC;MAC/D,CAAC,CAAC,OAAOL,CAAC,EAAE;QACR9D,MAAM,CAACgE,IAAI,kEAAAjB,MAAA,CAAkEe,CAAC,CAAE,CAAC;QACjF,OAAO,IAAI5D,iBAAiB,CAAC,CAAC;MAClC;IACJ,CAAC,CAAC,CACDoD,IAAI,CAAEC,OAAO,IAAK;MACf,IAAI,CAACA,OAAO,GAAGA,OAAO;MACtB,OAAOA,OAAO;IAClB,CAAC,CAAC;IAEN,OAAO,IAAI,CAACX,cAAc;EAC9B;;EAEA;AACJ;AACA;AACA;AACA;EACWyB,aAAaA,CAAA,EAAkB;IAClC,OAAO,IAAItD,OAAO,CAAO,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC1C,IAAI,CAAC,IAAI,CAACN,SAAS,EAAE;QACjBM,MAAM,CAAC,IAAI4B,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACnD;MACJ;MAEA7C,MAAM,CAAC8C,GAAG,iCAAAC,MAAA,CAAiC,IAAI,CAACnC,MAAM,CAAE,CAAC;MACzD,IAAMoC,GAAG,GAAG,IAAI,CAACrC,SAAS,CAACgB,cAAc,CAAC,IAAI,CAACf,MAAM,CAAC;MAEtDoC,GAAG,CAAC3B,SAAS,GAAG,MAAY;QACxBrB,MAAM,CAAC8C,GAAG,qEAAqE,CAAC;MACpF,CAAC;MAEDE,GAAG,CAACX,OAAO,GAAIa,EAAE,IAAW;QACxBlD,MAAM,CAAC8C,GAAG,CAAC,oCAAoC,EAAEI,EAAE,CAAC;QACpDjC,MAAM,CAAC+B,GAAG,CAAC1B,KAAK,CAAC;MACrB,CAAC;MAED0B,GAAG,CAACzB,SAAS,GAAG,MAAY;QACxBvB,MAAM,CAAC8C,GAAG,gCAAAC,MAAA,CAAgC,IAAI,CAACnC,MAAM,CAAE,CAAC;QACxDI,OAAO,CAAC,CAAC;MACb,CAAC;IACL,CAAC,CAAC,CAAC6C,KAAK,CAAEC,CAAC,IAAK;MACZ;MACA;MACA;MACA9D,MAAM,CAACgE,IAAI,2CAAAjB,MAAA,CAA2Ce,CAAC,CAAE,CAAC;IAC9D,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWQ,iBAAiBA,CAAA,EAA4B;IAChD,OAAO,IAAI,CAACf,OAAO,CAAEe,iBAAiB,CAAC,CAAC;EAC5C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,iBAAiBA,CAACpC,cAA8B,EAAiB;IACpE,OAAO,IAAI,CAACoB,OAAO,CAAEgB,iBAAiB,CAACpC,cAAc,CAAC;EAC1D;;EAEA;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWqC,UAAUA,CAACb,GAAmB,EAAEc,IAA4C,EAAQ;IACvF,IAAI,CAAClB,OAAO,CAAEiB,UAAU,CAACb,GAAG,EAAEc,IAAI,CAAC;EACvC;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,YAAYA,CAACf,GAAmB,EAAEgB,aAAqB,EAAQ;IAClE,IAAI,CAACpB,OAAO,CAAEmB,YAAY,CAACf,GAAG,EAAEgB,aAAa,CAAC;EAClD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,mBAAmBA,CACtBjB,GAAmB,EACnBc,IAAgE,EAC5D;IACJ,IAAI,CAAClB,OAAO,CAAEqB,mBAAmB,CAACjB,GAAG,EAAEc,IAAI,CAAC;EAChD;;EAEA;AACJ;AACA;AACA;AACA;EACWI,wBAAwBA,CAC3BlB,GAAmB,EACnBc,IAAqD,EACrDK,IAAO,EACH;IACJ,IAAI,CAACvB,OAAO,CAAEsB,wBAAwB,CAAClB,GAAG,EAAEc,IAAI,EAAEK,IAAI,CAAC;EAC3D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,0BAA0BA,CAC7BpB,GAAmB,EACnBmB,IAAO,EACPE,GAA8B,EAC1B;IACJ,IAAI,CAACzB,OAAO,CAAEwB,0BAA0B,CAACpB,GAAG,EAAEmB,IAAI,EAAEE,GAAG,CAAC;EAC5D;;EAEA;;EAEA;AACJ;AACA;AACA;AACA;EACWC,qBAAqBA,CAACtB,GAAmB,EAAEc,IAA6B,EAAQ;IACnF,IAAI,CAAClB,OAAO,CAAE0B,qBAAqB,CAACtB,GAAG,EAAEc,IAAI,CAAC;EAClD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWS,kBAAkBA,CACrBC,SAAiB,EACjBC,SAAiB,EACjBzB,GAAmB,EACnBc,IAA4C,EACxC;IACJ,IAAI,CAAClB,OAAO,CAAE2B,kBAAkB,CAACC,SAAS,EAAEC,SAAS,EAAEzB,GAAG,EAAEc,IAAI,CAAC;EACrE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWY,mBAAmBA,CACtBF,SAAiB,EACjBxB,GAAmB,EACnBc,IAA+D,EAC3D;IACJ,IAAI,CAAClB,OAAO,CAAE8B,mBAAmB,CAACF,SAAS,EAAExB,GAAG,EAAEc,IAAI,CAAC;EAC3D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWa,oBAAoBA,CACvBH,SAAiB,EACjBC,SAAiB,EACjBG,WAAyB,EACzB5B,GAAmB,EACf;IACJ,IAAI,CAACJ,OAAO,CAAE+B,oBAAoB,CAACH,SAAS,EAAEC,SAAS,EAAEG,WAAW,EAAE5B,GAAG,CAAC;EAC9E;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACW6B,iCAAiCA,CAAA,EAAoB;IACxD,OAAO,IAAI,CAACjC,OAAO,CAAEiC,iCAAiC,CAAC,CAAC;EAC5D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,wBAAwBA,CAAA,EAAmC;IAC9D,OAAO,IAAI,CAAClC,OAAO,CAAEkC,wBAAwB,CAAC,CAAC;EACnD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,2BAA2BA,CAACC,QAAoD,EAAiB;IACpG,OAAO,IAAI,CAACpC,OAAO,CAAEmC,2BAA2B,CAACC,QAAQ,CAAC;EAC9D;;EAEA;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACW/B,8BAA8BA,CACjCgC,mBAA2B,EAC3BR,SAAiB,EACjBzB,GAAmB,EACnBc,IAAoG,EAChG;IACJ,IAAI,CAAClB,OAAO,CAAEK,8BAA8B,CAACgC,mBAAmB,EAAER,SAAS,EAAEzB,GAAG,EAAEc,IAAI,CAAC;EAC3F;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWoB,gCAAgCA,CACnCD,mBAA2B,EAC3BR,SAAiB,EACjBU,WAAoC,EACpCnC,GAAmB,EACf;IACJ,IAAI,CAACJ,OAAO,CAAEsC,gCAAgC,CAACD,mBAAmB,EAAER,SAAS,EAAEU,WAAW,EAAEnC,GAAG,CAAC;EACpG;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWoC,oCAAoCA,CAAA,EAAsC;IAC7E,OAAO,IAAI,CAACxC,OAAO,CAAEwC,oCAAoC,CAAC,CAAC;EAC/D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,uCAAuCA,CAC1CL,QAAoD,EACvC;IACb,OAAO,IAAI,CAACpC,OAAO,CAAEyC,uCAAuC,CAACL,QAAQ,CAAC;EAC1E;;EAEA;AACJ;AACA;AACA;AACA;EACWM,gBAAgBA,CAACtC,GAAmB,EAAEc,IAAsD,EAAQ;IACvG,IAAI,CAAClB,OAAO,CAAE0C,gBAAgB,CAACtC,GAAG,EAAEc,IAAI,CAAC;EAC7C;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWyB,yBAAyBA,CAACP,QAAoB,EAAEhC,GAAoB,EAAiB;IACxF,OAAO,IAAI,CAACJ,OAAO,CAAE2C,yBAAyB,CAACP,QAAQ,EAAEhC,GAAG,CAAC;EACjE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWH,KAAKA,CAAI2C,IAAU,EAAEC,MAAwB,EAAE3B,IAAgC,EAAE3B,GAAY,EAAc;IAC9G,OAAO,IAAI,CAACS,OAAO,CAAEC,KAAK,CAAI2C,IAAI,EAAEC,MAAM,EAAE3B,IAAI,EAAyB3B,GAAG,CAAC;EACjF;AACJ;AAACP,eAAA,CA7fY9B,oBAAoB,mBACC,SAAS;AAAA8B,eAAA,CAD9B9B,oBAAoB,oBAEE,UAAU;AAAA8B,eAAA,CAFhC9B,oBAAoB,kCAGgB,wBAAwB;AAAA8B,eAAA,CAH5D9B,oBAAoB,2CAIyB,iCAAiC;AAAA8B,eAAA,CAJ9E9B,oBAAoB,iDAK+B,uCAAuC;AAAA8B,eAAA,CAL1F9B,oBAAoB,iCAMe,uBAAuB;AAAA8B,eAAA,CAN1D9B,oBAAoB,uBAOK,aAAa;AAAA8B,eAAA,CAPtC9B,oBAAoB,iBAQD,OAAO;AAAA8B,eAAA,CAR1B9B,oBAAoB,kBASA,yBAAyB","ignoreList":[]}
@@ -1,29 +1,29 @@
1
1
  import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
2
- /*
3
- Copyright 2017 - 2021 The Matrix.org Foundation C.I.C.
4
-
5
- Licensed under the Apache License, Version 2.0 (the "License");
6
- you may not use this file except in compliance with the License.
7
- You may obtain a copy of the License at
8
-
9
- http://www.apache.org/licenses/LICENSE-2.0
10
-
11
- Unless required by applicable law or agreed to in writing, software
12
- distributed under the License is distributed on an "AS IS" BASIS,
13
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
- See the License for the specific language governing permissions and
15
- limitations under the License.
2
+ /*
3
+ Copyright 2017 - 2021 The Matrix.org Foundation C.I.C.
4
+
5
+ Licensed under the Apache License, Version 2.0 (the "License");
6
+ you may not use this file except in compliance with the License.
7
+ You may obtain a copy of the License at
8
+
9
+ http://www.apache.org/licenses/LICENSE-2.0
10
+
11
+ Unless required by applicable law or agreed to in writing, software
12
+ distributed under the License is distributed on an "AS IS" BASIS,
13
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ See the License for the specific language governing permissions and
15
+ limitations under the License.
16
16
  */
17
17
 
18
18
  import { logger } from "../../logger.js";
19
19
  import { MemoryCryptoStore } from "./memory-crypto-store.js";
20
20
  import { MigrationState, SESSION_BATCH_SIZE } from "./base.js";
21
- /**
22
- * Internal module. Partial localStorage backed storage for e2e.
23
- * This is not a full crypto store, just the in-memory store with
24
- * some things backed by localStorage. It exists because indexedDB
25
- * is broken in Firefox private mode or set to, "will not remember
26
- * history".
21
+ /**
22
+ * Internal module. Partial localStorage backed storage for e2e.
23
+ * This is not a full crypto store, just the in-memory store with
24
+ * some things backed by localStorage. It exists because indexedDB
25
+ * is broken in Firefox private mode or set to, "will not remember
26
+ * history".
27
27
  */
28
28
 
29
29
  var E2E_PREFIX = "crypto.";
@@ -62,12 +62,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
62
62
  this.store = store;
63
63
  }
64
64
 
65
- /**
66
- * Returns true if this CryptoStore has ever been initialised (ie, it might contain data).
67
- *
68
- * Implementation of {@link CryptoStore.containsData}.
69
- *
70
- * @internal
65
+ /**
66
+ * Returns true if this CryptoStore has ever been initialised (ie, it might contain data).
67
+ *
68
+ * Implementation of {@link CryptoStore.containsData}.
69
+ *
70
+ * @internal
71
71
  */
72
72
  containsData() {
73
73
  var _this = this;
@@ -76,12 +76,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
76
76
  })();
77
77
  }
78
78
 
79
- /**
80
- * Get data on how much of the libolm to Rust Crypto migration has been done.
81
- *
82
- * Implementation of {@link CryptoStore.getMigrationState}.
83
- *
84
- * @internal
79
+ /**
80
+ * Get data on how much of the libolm to Rust Crypto migration has been done.
81
+ *
82
+ * Implementation of {@link CryptoStore.getMigrationState}.
83
+ *
84
+ * @internal
85
85
  */
86
86
  getMigrationState() {
87
87
  var _this2 = this;
@@ -91,12 +91,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
91
91
  })();
92
92
  }
93
93
 
94
- /**
95
- * Set data on how much of the libolm to Rust Crypto migration has been done.
96
- *
97
- * Implementation of {@link CryptoStore.setMigrationState}.
98
- *
99
- * @internal
94
+ /**
95
+ * Set data on how much of the libolm to Rust Crypto migration has been done.
96
+ *
97
+ * Implementation of {@link CryptoStore.setMigrationState}.
98
+ *
99
+ * @internal
100
100
  */
101
101
  setMigrationState(migrationState) {
102
102
  var _this3 = this;
@@ -151,12 +151,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
151
151
  setJsonItem(this.store, keyEndToEndSessions(deviceKey), sessions);
152
152
  }
153
153
 
154
- /**
155
- * Fetch a batch of Olm sessions from the database.
156
- *
157
- * Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.
158
- *
159
- * @internal
154
+ /**
155
+ * Fetch a batch of Olm sessions from the database.
156
+ *
157
+ * Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.
158
+ *
159
+ * @internal
160
160
  */
161
161
  getEndToEndSessionsBatch() {
162
162
  var _this4 = this;
@@ -184,12 +184,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
184
184
  })();
185
185
  }
186
186
 
187
- /**
188
- * Delete a batch of Olm sessions from the database.
189
- *
190
- * Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.
191
- *
192
- * @internal
187
+ /**
188
+ * Delete a batch of Olm sessions from the database.
189
+ *
190
+ * Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.
191
+ *
192
+ * @internal
193
193
  */
194
194
  deleteEndToEndSessionsBatch(sessions) {
195
195
  var _this5 = this;
@@ -219,12 +219,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
219
219
  setJsonItem(this.store, keyEndToEndInboundGroupSession(senderCurve25519Key, sessionId), sessionData);
220
220
  }
221
221
 
222
- /**
223
- * Count the number of Megolm sessions in the database.
224
- *
225
- * Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.
226
- *
227
- * @internal
222
+ /**
223
+ * Count the number of Megolm sessions in the database.
224
+ *
225
+ * Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.
226
+ *
227
+ * @internal
228
228
  */
229
229
  countEndToEndInboundGroupSessions() {
230
230
  var _this6 = this;
@@ -240,12 +240,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
240
240
  })();
241
241
  }
242
242
 
243
- /**
244
- * Fetch a batch of Megolm sessions from the database.
245
- *
246
- * Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.
247
- *
248
- * @internal
243
+ /**
244
+ * Fetch a batch of Megolm sessions from the database.
245
+ *
246
+ * Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.
247
+ *
248
+ * @internal
249
249
  */
250
250
  getEndToEndInboundGroupSessionsBatch() {
251
251
  var _this7 = this;
@@ -283,12 +283,12 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
283
283
  })();
284
284
  }
285
285
 
286
- /**
287
- * Delete a batch of Megolm sessions from the database.
288
- *
289
- * Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.
290
- *
291
- * @internal
286
+ /**
287
+ * Delete a batch of Megolm sessions from the database.
288
+ *
289
+ * Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.
290
+ *
291
+ * @internal
292
292
  */
293
293
  deleteEndToEndInboundGroupSessionsBatch(sessions) {
294
294
  var _this8 = this;
@@ -323,10 +323,10 @@ export class LocalStorageCryptoStore extends MemoryCryptoStore {
323
323
  return Promise.resolve();
324
324
  }
325
325
 
326
- /**
327
- * Delete all data from this store.
328
- *
329
- * @returns Promise which resolves when the store has been cleared.
326
+ /**
327
+ * Delete all data from this store.
328
+ *
329
+ * @returns Promise which resolves when the store has been cleared.
330
330
  */
331
331
  deleteAllData() {
332
332
  this.store.removeItem(KEY_END_TO_END_ACCOUNT);
@@ -1 +1 @@
1
- {"version":3,"file":"localStorage-crypto-store.js","names":["logger","MemoryCryptoStore","MigrationState","SESSION_BATCH_SIZE","E2E_PREFIX","KEY_END_TO_END_MIGRATION_STATE","KEY_END_TO_END_ACCOUNT","KEY_CROSS_SIGNING_KEYS","KEY_INBOUND_SESSION_PREFIX","KEY_INBOUND_SESSION_WITHHELD_PREFIX","KEY_ROOMS_PREFIX","KEY_SESSIONS_NEEDING_BACKUP","keyEndToEndSessions","deviceKey","keyEndToEndInboundGroupSession","senderKey","sessionId","keyEndToEndInboundGroupSessionWithheld","keyEndToEndRoomsPrefix","roomId","LocalStorageCryptoStore","exists","store","length","i","_store$key","key","startsWith","constructor","containsData","_this","_asyncToGenerator","getMigrationState","_this2","_getJsonItem","getJsonItem","NOT_STARTED","setMigrationState","migrationState","_this3","setJsonItem","countEndToEndSessions","txn","func","count","sessions","Object","keys","_getEndToEndSessions","fixedSessions","sid","val","entries","session","getEndToEndSession","_sessions$sessionId","getEndToEndSessions","_this$_getEndToEndSes","storeEndToEndSession","sessionInfo","getEndToEndSessionsBatch","_this4","result","_this4$store$key","split","values","push","deleteEndToEndSessionsBatch","_this5","deviceSessions","removeItem","getEndToEndInboundGroupSession","senderCurve25519Key","storeEndToEndInboundGroupSession","sessionData","countEndToEndInboundGroupSessions","_this6","getEndToEndInboundGroupSessionsBatch","_this7","sessionsNeedingBackup","key2","slice","needsBackup","deleteEndToEndInboundGroupSessionsBatch","_this8","k","getEndToEndRooms","prefix","markSessionsNeedingBackup","Promise","resolve","deleteAllData","getAccount","accountPickle","storeAccount","getCrossSigningKeys","getSecretStorePrivateKey","type","concat","storeSecretStorePrivateKey","doTxn","mode","stores","JSON","parse","getItem","e","log","message","stack","setItem","stringify"],"sources":["../../../src/crypto/store/localStorage-crypto-store.ts"],"sourcesContent":["/*\r\nCopyright 2017 - 2021 The Matrix.org Foundation C.I.C.\r\n\r\nLicensed under the Apache License, Version 2.0 (the \"License\");\r\nyou may not use this file except in compliance with the License.\r\nYou may obtain a copy of the License at\r\n\r\n http://www.apache.org/licenses/LICENSE-2.0\r\n\r\nUnless required by applicable law or agreed to in writing, software\r\ndistributed under the License is distributed on an \"AS IS\" BASIS,\r\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\nSee the License for the specific language governing permissions and\r\nlimitations under the License.\r\n*/\r\n\r\nimport { logger } from \"../../logger.ts\";\r\nimport { MemoryCryptoStore } from \"./memory-crypto-store.ts\";\r\nimport {\r\n type CryptoStore,\r\n type ISession,\r\n type SessionExtended,\r\n type ISessionInfo,\r\n type IWithheld,\r\n MigrationState,\r\n type Mode,\r\n type SecretStorePrivateKeys,\r\n SESSION_BATCH_SIZE,\r\n type InboundGroupSessionData,\r\n type IRoomEncryption,\r\n} from \"./base.ts\";\r\nimport { type CrossSigningKeyInfo } from \"../../crypto-api/index.ts\";\r\n\r\n/**\r\n * Internal module. Partial localStorage backed storage for e2e.\r\n * This is not a full crypto store, just the in-memory store with\r\n * some things backed by localStorage. It exists because indexedDB\r\n * is broken in Firefox private mode or set to, \"will not remember\r\n * history\".\r\n */\r\n\r\nconst E2E_PREFIX = \"crypto.\";\r\nconst KEY_END_TO_END_MIGRATION_STATE = E2E_PREFIX + \"migration\";\r\nconst KEY_END_TO_END_ACCOUNT = E2E_PREFIX + \"account\";\r\nconst KEY_CROSS_SIGNING_KEYS = E2E_PREFIX + \"cross_signing_keys\";\r\nconst KEY_INBOUND_SESSION_PREFIX = E2E_PREFIX + \"inboundgroupsessions/\";\r\nconst KEY_INBOUND_SESSION_WITHHELD_PREFIX = E2E_PREFIX + \"inboundgroupsessions.withheld/\";\r\nconst KEY_ROOMS_PREFIX = E2E_PREFIX + \"rooms/\";\r\nconst KEY_SESSIONS_NEEDING_BACKUP = E2E_PREFIX + \"sessionsneedingbackup\";\r\n\r\nfunction keyEndToEndSessions(deviceKey: string): string {\r\n return E2E_PREFIX + \"sessions/\" + deviceKey;\r\n}\r\n\r\nfunction keyEndToEndInboundGroupSession(senderKey: string, sessionId: string): string {\r\n return KEY_INBOUND_SESSION_PREFIX + senderKey + \"/\" + sessionId;\r\n}\r\n\r\nfunction keyEndToEndInboundGroupSessionWithheld(senderKey: string, sessionId: string): string {\r\n return KEY_INBOUND_SESSION_WITHHELD_PREFIX + senderKey + \"/\" + sessionId;\r\n}\r\n\r\nfunction keyEndToEndRoomsPrefix(roomId: string): string {\r\n return KEY_ROOMS_PREFIX + roomId;\r\n}\r\n\r\nexport class LocalStorageCryptoStore extends MemoryCryptoStore implements CryptoStore {\r\n public static exists(store: Storage): boolean {\r\n const length = store.length;\r\n for (let i = 0; i < length; i++) {\r\n if (store.key(i)?.startsWith(E2E_PREFIX)) {\r\n return true;\r\n }\r\n }\r\n return false;\r\n }\r\n\r\n public constructor(private readonly store: Storage) {\r\n super();\r\n }\r\n\r\n /**\r\n * Returns true if this CryptoStore has ever been initialised (ie, it might contain data).\r\n *\r\n * Implementation of {@link CryptoStore.containsData}.\r\n *\r\n * @internal\r\n */\r\n public async containsData(): Promise<boolean> {\r\n return LocalStorageCryptoStore.exists(this.store);\r\n }\r\n\r\n /**\r\n * Get data on how much of the libolm to Rust Crypto migration has been done.\r\n *\r\n * Implementation of {@link CryptoStore.getMigrationState}.\r\n *\r\n * @internal\r\n */\r\n public async getMigrationState(): Promise<MigrationState> {\r\n return getJsonItem(this.store, KEY_END_TO_END_MIGRATION_STATE) ?? MigrationState.NOT_STARTED;\r\n }\r\n\r\n /**\r\n * Set data on how much of the libolm to Rust Crypto migration has been done.\r\n *\r\n * Implementation of {@link CryptoStore.setMigrationState}.\r\n *\r\n * @internal\r\n */\r\n public async setMigrationState(migrationState: MigrationState): Promise<void> {\r\n setJsonItem(this.store, KEY_END_TO_END_MIGRATION_STATE, migrationState);\r\n }\r\n\r\n // Olm Sessions\r\n\r\n public countEndToEndSessions(txn: unknown, func: (count: number) => void): void {\r\n let count = 0;\r\n for (let i = 0; i < this.store.length; ++i) {\r\n const key = this.store.key(i);\r\n if (key?.startsWith(keyEndToEndSessions(\"\"))) {\r\n const sessions = getJsonItem(this.store, key);\r\n count += Object.keys(sessions ?? {}).length;\r\n }\r\n }\r\n func(count);\r\n }\r\n\r\n // eslint-disable-next-line @typescript-eslint/naming-convention\r\n private _getEndToEndSessions(deviceKey: string): Record<string, ISessionInfo> {\r\n const sessions = getJsonItem(this.store, keyEndToEndSessions(deviceKey));\r\n const fixedSessions: Record<string, ISessionInfo> = {};\r\n\r\n // fix up any old sessions to be objects rather than just the base64 pickle\r\n for (const [sid, val] of Object.entries(sessions || {})) {\r\n if (typeof val === \"string\") {\r\n fixedSessions[sid] = {\r\n session: val,\r\n };\r\n } else {\r\n fixedSessions[sid] = val;\r\n }\r\n }\r\n\r\n return fixedSessions;\r\n }\r\n\r\n public getEndToEndSession(\r\n deviceKey: string,\r\n sessionId: string,\r\n txn: unknown,\r\n func: (session: ISessionInfo) => void,\r\n ): void {\r\n const sessions = this._getEndToEndSessions(deviceKey);\r\n func(sessions[sessionId] ?? {});\r\n }\r\n\r\n public getEndToEndSessions(\r\n deviceKey: string,\r\n txn: unknown,\r\n func: (sessions: { [sessionId: string]: ISessionInfo }) => void,\r\n ): void {\r\n func(this._getEndToEndSessions(deviceKey) ?? {});\r\n }\r\n\r\n public storeEndToEndSession(deviceKey: string, sessionId: string, sessionInfo: ISessionInfo, txn: unknown): void {\r\n const sessions = this._getEndToEndSessions(deviceKey) || {};\r\n sessions[sessionId] = sessionInfo;\r\n setJsonItem(this.store, keyEndToEndSessions(deviceKey), sessions);\r\n }\r\n\r\n /**\r\n * Fetch a batch of Olm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public async getEndToEndSessionsBatch(): Promise<null | ISessionInfo[]> {\r\n const result: ISessionInfo[] = [];\r\n for (let i = 0; i < this.store.length; ++i) {\r\n if (this.store.key(i)?.startsWith(keyEndToEndSessions(\"\"))) {\r\n const deviceKey = this.store.key(i)!.split(\"/\")[1];\r\n for (const session of Object.values(this._getEndToEndSessions(deviceKey))) {\r\n result.push(session);\r\n if (result.length >= SESSION_BATCH_SIZE) {\r\n return result;\r\n }\r\n }\r\n }\r\n }\r\n\r\n if (result.length === 0) {\r\n // No sessions left.\r\n return null;\r\n }\r\n\r\n // There are fewer sessions than the batch size; return the final batch of sessions.\r\n return result;\r\n }\r\n\r\n /**\r\n * Delete a batch of Olm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public async deleteEndToEndSessionsBatch(sessions: { deviceKey: string; sessionId: string }[]): Promise<void> {\r\n for (const { deviceKey, sessionId } of sessions) {\r\n const deviceSessions = this._getEndToEndSessions(deviceKey) || {};\r\n delete deviceSessions[sessionId];\r\n if (Object.keys(deviceSessions).length === 0) {\r\n // No more sessions for this device.\r\n this.store.removeItem(keyEndToEndSessions(deviceKey));\r\n } else {\r\n setJsonItem(this.store, keyEndToEndSessions(deviceKey), deviceSessions);\r\n }\r\n }\r\n }\r\n\r\n // Inbound Group Sessions\r\n\r\n public getEndToEndInboundGroupSession(\r\n senderCurve25519Key: string,\r\n sessionId: string,\r\n txn: unknown,\r\n func: (groupSession: InboundGroupSessionData | null, groupSessionWithheld: IWithheld | null) => void,\r\n ): void {\r\n func(\r\n getJsonItem(this.store, keyEndToEndInboundGroupSession(senderCurve25519Key, sessionId)),\r\n getJsonItem(this.store, keyEndToEndInboundGroupSessionWithheld(senderCurve25519Key, sessionId)),\r\n );\r\n }\r\n\r\n public storeEndToEndInboundGroupSession(\r\n senderCurve25519Key: string,\r\n sessionId: string,\r\n sessionData: InboundGroupSessionData,\r\n txn: unknown,\r\n ): void {\r\n setJsonItem(this.store, keyEndToEndInboundGroupSession(senderCurve25519Key, sessionId), sessionData);\r\n }\r\n\r\n /**\r\n * Count the number of Megolm sessions in the database.\r\n *\r\n * Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.\r\n *\r\n * @internal\r\n */\r\n public async countEndToEndInboundGroupSessions(): Promise<number> {\r\n let count = 0;\r\n for (let i = 0; i < this.store.length; ++i) {\r\n const key = this.store.key(i);\r\n if (key?.startsWith(KEY_INBOUND_SESSION_PREFIX)) {\r\n count += 1;\r\n }\r\n }\r\n return count;\r\n }\r\n\r\n /**\r\n * Fetch a batch of Megolm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public async getEndToEndInboundGroupSessionsBatch(): Promise<SessionExtended[] | null> {\r\n const sessionsNeedingBackup = getJsonItem<string[]>(this.store, KEY_SESSIONS_NEEDING_BACKUP) || {};\r\n const result: SessionExtended[] = [];\r\n for (let i = 0; i < this.store.length; ++i) {\r\n const key = this.store.key(i);\r\n if (key?.startsWith(KEY_INBOUND_SESSION_PREFIX)) {\r\n const key2 = key.slice(KEY_INBOUND_SESSION_PREFIX.length);\r\n\r\n // we can't use split, as the components we are trying to split out\r\n // might themselves contain '/' characters. We rely on the\r\n // senderKey being a (32-byte) curve25519 key, base64-encoded\r\n // (hence 43 characters long).\r\n\r\n result.push({\r\n senderKey: key2.slice(0, 43),\r\n sessionId: key2.slice(44),\r\n sessionData: getJsonItem(this.store, key)!,\r\n needsBackup: key2 in sessionsNeedingBackup,\r\n });\r\n\r\n if (result.length >= SESSION_BATCH_SIZE) {\r\n return result;\r\n }\r\n }\r\n }\r\n\r\n if (result.length === 0) {\r\n // No sessions left.\r\n return null;\r\n }\r\n\r\n // There are fewer sessions than the batch size; return the final batch of sessions.\r\n return result;\r\n }\r\n\r\n /**\r\n * Delete a batch of Megolm sessions from the database.\r\n *\r\n * Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.\r\n *\r\n * @internal\r\n */\r\n public async deleteEndToEndInboundGroupSessionsBatch(\r\n sessions: { senderKey: string; sessionId: string }[],\r\n ): Promise<void> {\r\n for (const { senderKey, sessionId } of sessions) {\r\n const k = keyEndToEndInboundGroupSession(senderKey, sessionId);\r\n this.store.removeItem(k);\r\n }\r\n }\r\n\r\n public getEndToEndRooms(txn: unknown, func: (rooms: Record<string, IRoomEncryption>) => void): void {\r\n const result: Record<string, IRoomEncryption> = {};\r\n const prefix = keyEndToEndRoomsPrefix(\"\");\r\n\r\n for (let i = 0; i < this.store.length; ++i) {\r\n const key = this.store.key(i);\r\n if (key?.startsWith(prefix)) {\r\n const roomId = key.slice(prefix.length);\r\n result[roomId] = getJsonItem(this.store, key)!;\r\n }\r\n }\r\n func(result);\r\n }\r\n\r\n public markSessionsNeedingBackup(sessions: ISession[]): Promise<void> {\r\n const sessionsNeedingBackup =\r\n getJsonItem<{\r\n [senderKeySessionId: string]: boolean;\r\n }>(this.store, KEY_SESSIONS_NEEDING_BACKUP) || {};\r\n for (const session of sessions) {\r\n sessionsNeedingBackup[session.senderKey + \"/\" + session.sessionId] = true;\r\n }\r\n setJsonItem(this.store, KEY_SESSIONS_NEEDING_BACKUP, sessionsNeedingBackup);\r\n return Promise.resolve();\r\n }\r\n\r\n /**\r\n * Delete all data from this store.\r\n *\r\n * @returns Promise which resolves when the store has been cleared.\r\n */\r\n public deleteAllData(): Promise<void> {\r\n this.store.removeItem(KEY_END_TO_END_ACCOUNT);\r\n return Promise.resolve();\r\n }\r\n\r\n // Olm account\r\n\r\n public getAccount(txn: unknown, func: (accountPickle: string | null) => void): void {\r\n const accountPickle = getJsonItem<string>(this.store, KEY_END_TO_END_ACCOUNT);\r\n func(accountPickle);\r\n }\r\n\r\n public storeAccount(txn: unknown, accountPickle: string): void {\r\n setJsonItem(this.store, KEY_END_TO_END_ACCOUNT, accountPickle);\r\n }\r\n\r\n public getCrossSigningKeys(txn: unknown, func: (keys: Record<string, CrossSigningKeyInfo> | null) => void): void {\r\n const keys = getJsonItem<Record<string, CrossSigningKeyInfo>>(this.store, KEY_CROSS_SIGNING_KEYS);\r\n func(keys);\r\n }\r\n\r\n public getSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\r\n txn: unknown,\r\n func: (key: SecretStorePrivateKeys[K] | null) => void,\r\n type: K,\r\n ): void {\r\n const key = getJsonItem<SecretStorePrivateKeys[K]>(this.store, E2E_PREFIX + `ssss_cache.${type}`);\r\n func(key);\r\n }\r\n\r\n public storeSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\r\n txn: unknown,\r\n type: K,\r\n key: SecretStorePrivateKeys[K],\r\n ): void {\r\n setJsonItem(this.store, E2E_PREFIX + `ssss_cache.${type}`, key);\r\n }\r\n\r\n public doTxn<T>(mode: Mode, stores: Iterable<string>, func: (txn: unknown) => T): Promise<T> {\r\n return Promise.resolve(func(null));\r\n }\r\n}\r\n\r\nfunction getJsonItem<T>(store: Storage, key: string): T | null {\r\n try {\r\n // if the key is absent, store.getItem() returns null, and\r\n // JSON.parse(null) === null, so this returns null.\r\n return JSON.parse(store.getItem(key)!);\r\n } catch (e) {\r\n logger.log(\"Error: Failed to get key %s: %s\", key, (<Error>e).message);\r\n logger.log((<Error>e).stack);\r\n }\r\n return null;\r\n}\r\n\r\nfunction setJsonItem<T>(store: Storage, key: string, val: T): void {\r\n store.setItem(key, JSON.stringify(val));\r\n}\r\n"],"mappings":";AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASA,MAAM,QAAQ,iBAAiB;AACxC,SAASC,iBAAiB,QAAQ,0BAA0B;AAC5D,SAMIC,cAAc,EAGdC,kBAAkB,QAGf,WAAW;AAGlB;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,IAAMC,UAAU,GAAG,SAAS;AAC5B,IAAMC,8BAA8B,GAAGD,UAAU,GAAG,WAAW;AAC/D,IAAME,sBAAsB,GAAGF,UAAU,GAAG,SAAS;AACrD,IAAMG,sBAAsB,GAAGH,UAAU,GAAG,oBAAoB;AAChE,IAAMI,0BAA0B,GAAGJ,UAAU,GAAG,uBAAuB;AACvE,IAAMK,mCAAmC,GAAGL,UAAU,GAAG,gCAAgC;AACzF,IAAMM,gBAAgB,GAAGN,UAAU,GAAG,QAAQ;AAC9C,IAAMO,2BAA2B,GAAGP,UAAU,GAAG,uBAAuB;AAExE,SAASQ,mBAAmBA,CAACC,SAAiB,EAAU;EACpD,OAAOT,UAAU,GAAG,WAAW,GAAGS,SAAS;AAC/C;AAEA,SAASC,8BAA8BA,CAACC,SAAiB,EAAEC,SAAiB,EAAU;EAClF,OAAOR,0BAA0B,GAAGO,SAAS,GAAG,GAAG,GAAGC,SAAS;AACnE;AAEA,SAASC,sCAAsCA,CAACF,SAAiB,EAAEC,SAAiB,EAAU;EAC1F,OAAOP,mCAAmC,GAAGM,SAAS,GAAG,GAAG,GAAGC,SAAS;AAC5E;AAEA,SAASE,sBAAsBA,CAACC,MAAc,EAAU;EACpD,OAAOT,gBAAgB,GAAGS,MAAM;AACpC;AAEA,OAAO,MAAMC,uBAAuB,SAASnB,iBAAiB,CAAwB;EAClF,OAAcoB,MAAMA,CAACC,KAAc,EAAW;IAC1C,IAAMC,MAAM,GAAGD,KAAK,CAACC,MAAM;IAC3B,KAAK,IAAIC,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGD,MAAM,EAAEC,CAAC,EAAE,EAAE;MAAA,IAAAC,UAAA;MAC7B,KAAAA,UAAA,GAAIH,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC,cAAAC,UAAA,eAAZA,UAAA,CAAcE,UAAU,CAACvB,UAAU,CAAC,EAAE;QACtC,OAAO,IAAI;MACf;IACJ;IACA,OAAO,KAAK;EAChB;EAEOwB,WAAWA,CAAkBN,KAAc,EAAE;IAChD,KAAK,CAAC,CAAC;IAAC,KADwBA,KAAc,GAAdA,KAAc;EAElD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBO,YAAYA,CAAA,EAAqB;IAAA,IAAAC,KAAA;IAAA,OAAAC,iBAAA;MAC1C,OAAOX,uBAAuB,CAACC,MAAM,CAACS,KAAI,CAACR,KAAK,CAAC;IAAC;EACtD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBU,iBAAiBA,CAAA,EAA4B;IAAA,IAAAC,MAAA;IAAA,OAAAF,iBAAA;MAAA,IAAAG,YAAA;MACtD,QAAAA,YAAA,GAAOC,WAAW,CAACF,MAAI,CAACX,KAAK,EAAEjB,8BAA8B,CAAC,cAAA6B,YAAA,cAAAA,YAAA,GAAIhC,cAAc,CAACkC,WAAW;IAAC;EACjG;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBC,iBAAiBA,CAACC,cAA8B,EAAiB;IAAA,IAAAC,MAAA;IAAA,OAAAR,iBAAA;MAC1ES,WAAW,CAACD,MAAI,CAACjB,KAAK,EAAEjB,8BAA8B,EAAEiC,cAAc,CAAC;IAAC;EAC5E;;EAEA;;EAEOG,qBAAqBA,CAACC,GAAY,EAAEC,IAA6B,EAAQ;IAC5E,IAAIC,KAAK,GAAG,CAAC;IACb,KAAK,IAAIpB,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAG,IAAI,CAACF,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;MACxC,IAAME,GAAG,GAAG,IAAI,CAACJ,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;MAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAACf,mBAAmB,CAAC,EAAE,CAAC,CAAC,EAAE;QAC1C,IAAMiC,QAAQ,GAAGV,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEI,GAAG,CAAC;QAC7CkB,KAAK,IAAIE,MAAM,CAACC,IAAI,CAACF,QAAQ,aAARA,QAAQ,cAARA,QAAQ,GAAI,CAAC,CAAC,CAAC,CAACtB,MAAM;MAC/C;IACJ;IACAoB,IAAI,CAACC,KAAK,CAAC;EACf;;EAEA;EACQI,oBAAoBA,CAACnC,SAAiB,EAAgC;IAC1E,IAAMgC,QAAQ,GAAGV,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEV,mBAAmB,CAACC,SAAS,CAAC,CAAC;IACxE,IAAMoC,aAA2C,GAAG,CAAC,CAAC;;IAEtD;IACA,KAAK,IAAM,CAACC,GAAG,EAAEC,GAAG,CAAC,IAAIL,MAAM,CAACM,OAAO,CAACP,QAAQ,IAAI,CAAC,CAAC,CAAC,EAAE;MACrD,IAAI,OAAOM,GAAG,KAAK,QAAQ,EAAE;QACzBF,aAAa,CAACC,GAAG,CAAC,GAAG;UACjBG,OAAO,EAAEF;QACb,CAAC;MACL,CAAC,MAAM;QACHF,aAAa,CAACC,GAAG,CAAC,GAAGC,GAAG;MAC5B;IACJ;IAEA,OAAOF,aAAa;EACxB;EAEOK,kBAAkBA,CACrBzC,SAAiB,EACjBG,SAAiB,EACjB0B,GAAY,EACZC,IAAqC,EACjC;IAAA,IAAAY,mBAAA;IACJ,IAAMV,QAAQ,GAAG,IAAI,CAACG,oBAAoB,CAACnC,SAAS,CAAC;IACrD8B,IAAI,EAAAY,mBAAA,GAACV,QAAQ,CAAC7B,SAAS,CAAC,cAAAuC,mBAAA,cAAAA,mBAAA,GAAI,CAAC,CAAC,CAAC;EACnC;EAEOC,mBAAmBA,CACtB3C,SAAiB,EACjB6B,GAAY,EACZC,IAA+D,EAC3D;IAAA,IAAAc,qBAAA;IACJd,IAAI,EAAAc,qBAAA,GAAC,IAAI,CAACT,oBAAoB,CAACnC,SAAS,CAAC,cAAA4C,qBAAA,cAAAA,qBAAA,GAAI,CAAC,CAAC,CAAC;EACpD;EAEOC,oBAAoBA,CAAC7C,SAAiB,EAAEG,SAAiB,EAAE2C,WAAyB,EAAEjB,GAAY,EAAQ;IAC7G,IAAMG,QAAQ,GAAG,IAAI,CAACG,oBAAoB,CAACnC,SAAS,CAAC,IAAI,CAAC,CAAC;IAC3DgC,QAAQ,CAAC7B,SAAS,CAAC,GAAG2C,WAAW;IACjCnB,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAEV,mBAAmB,CAACC,SAAS,CAAC,EAAEgC,QAAQ,CAAC;EACrE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBe,wBAAwBA,CAAA,EAAmC;IAAA,IAAAC,MAAA;IAAA,OAAA9B,iBAAA;MACpE,IAAM+B,MAAsB,GAAG,EAAE;MACjC,KAAK,IAAItC,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGqC,MAAI,CAACvC,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;QAAA,IAAAuC,gBAAA;QACxC,KAAAA,gBAAA,GAAIF,MAAI,CAACvC,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC,cAAAuC,gBAAA,eAAjBA,gBAAA,CAAmBpC,UAAU,CAACf,mBAAmB,CAAC,EAAE,CAAC,CAAC,EAAE;UACxD,IAAMC,SAAS,GAAGgD,MAAI,CAACvC,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC,CAAEwC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;UAClD,KAAK,IAAMX,OAAO,IAAIP,MAAM,CAACmB,MAAM,CAACJ,MAAI,CAACb,oBAAoB,CAACnC,SAAS,CAAC,CAAC,EAAE;YACvEiD,MAAM,CAACI,IAAI,CAACb,OAAO,CAAC;YACpB,IAAIS,MAAM,CAACvC,MAAM,IAAIpB,kBAAkB,EAAE;cACrC,OAAO2D,MAAM;YACjB;UACJ;QACJ;MACJ;MAEA,IAAIA,MAAM,CAACvC,MAAM,KAAK,CAAC,EAAE;QACrB;QACA,OAAO,IAAI;MACf;;MAEA;MACA,OAAOuC,MAAM;IAAC;EAClB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBK,2BAA2BA,CAACtB,QAAoD,EAAiB;IAAA,IAAAuB,MAAA;IAAA,OAAArC,iBAAA;MAC1G,KAAK,IAAM;QAAElB,SAAS;QAAEG;MAAU,CAAC,IAAI6B,QAAQ,EAAE;QAC7C,IAAMwB,cAAc,GAAGD,MAAI,CAACpB,oBAAoB,CAACnC,SAAS,CAAC,IAAI,CAAC,CAAC;QACjE,OAAOwD,cAAc,CAACrD,SAAS,CAAC;QAChC,IAAI8B,MAAM,CAACC,IAAI,CAACsB,cAAc,CAAC,CAAC9C,MAAM,KAAK,CAAC,EAAE;UAC1C;UACA6C,MAAI,CAAC9C,KAAK,CAACgD,UAAU,CAAC1D,mBAAmB,CAACC,SAAS,CAAC,CAAC;QACzD,CAAC,MAAM;UACH2B,WAAW,CAAC4B,MAAI,CAAC9C,KAAK,EAAEV,mBAAmB,CAACC,SAAS,CAAC,EAAEwD,cAAc,CAAC;QAC3E;MACJ;IAAC;EACL;;EAEA;;EAEOE,8BAA8BA,CACjCC,mBAA2B,EAC3BxD,SAAiB,EACjB0B,GAAY,EACZC,IAAoG,EAChG;IACJA,IAAI,CACAR,WAAW,CAAC,IAAI,CAACb,KAAK,EAAER,8BAA8B,CAAC0D,mBAAmB,EAAExD,SAAS,CAAC,CAAC,EACvFmB,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEL,sCAAsC,CAACuD,mBAAmB,EAAExD,SAAS,CAAC,CAClG,CAAC;EACL;EAEOyD,gCAAgCA,CACnCD,mBAA2B,EAC3BxD,SAAiB,EACjB0D,WAAoC,EACpChC,GAAY,EACR;IACJF,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAER,8BAA8B,CAAC0D,mBAAmB,EAAExD,SAAS,CAAC,EAAE0D,WAAW,CAAC;EACxG;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBC,iCAAiCA,CAAA,EAAoB;IAAA,IAAAC,MAAA;IAAA,OAAA7C,iBAAA;MAC9D,IAAIa,KAAK,GAAG,CAAC;MACb,KAAK,IAAIpB,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGoD,MAAI,CAACtD,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;QACxC,IAAME,GAAG,GAAGkD,MAAI,CAACtD,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;QAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAACnB,0BAA0B,CAAC,EAAE;UAC7CoC,KAAK,IAAI,CAAC;QACd;MACJ;MACA,OAAOA,KAAK;IAAC;EACjB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBiC,oCAAoCA,CAAA,EAAsC;IAAA,IAAAC,MAAA;IAAA,OAAA/C,iBAAA;MACnF,IAAMgD,qBAAqB,GAAG5C,WAAW,CAAW2C,MAAI,CAACxD,KAAK,EAAEX,2BAA2B,CAAC,IAAI,CAAC,CAAC;MAClG,IAAMmD,MAAyB,GAAG,EAAE;MACpC,KAAK,IAAItC,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGsD,MAAI,CAACxD,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;QACxC,IAAME,GAAG,GAAGoD,MAAI,CAACxD,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;QAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAACnB,0BAA0B,CAAC,EAAE;UAC7C,IAAMwE,IAAI,GAAGtD,GAAG,CAACuD,KAAK,CAACzE,0BAA0B,CAACe,MAAM,CAAC;;UAEzD;UACA;UACA;UACA;;UAEAuC,MAAM,CAACI,IAAI,CAAC;YACRnD,SAAS,EAAEiE,IAAI,CAACC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC;YAC5BjE,SAAS,EAAEgE,IAAI,CAACC,KAAK,CAAC,EAAE,CAAC;YACzBP,WAAW,EAAEvC,WAAW,CAAC2C,MAAI,CAACxD,KAAK,EAAEI,GAAG,CAAE;YAC1CwD,WAAW,EAAEF,IAAI,IAAID;UACzB,CAAC,CAAC;UAEF,IAAIjB,MAAM,CAACvC,MAAM,IAAIpB,kBAAkB,EAAE;YACrC,OAAO2D,MAAM;UACjB;QACJ;MACJ;MAEA,IAAIA,MAAM,CAACvC,MAAM,KAAK,CAAC,EAAE;QACrB;QACA,OAAO,IAAI;MACf;;MAEA;MACA,OAAOuC,MAAM;IAAC;EAClB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBqB,uCAAuCA,CAChDtC,QAAoD,EACvC;IAAA,IAAAuC,MAAA;IAAA,OAAArD,iBAAA;MACb,KAAK,IAAM;QAAEhB,SAAS;QAAEC;MAAU,CAAC,IAAI6B,QAAQ,EAAE;QAC7C,IAAMwC,CAAC,GAAGvE,8BAA8B,CAACC,SAAS,EAAEC,SAAS,CAAC;QAC9DoE,MAAI,CAAC9D,KAAK,CAACgD,UAAU,CAACe,CAAC,CAAC;MAC5B;IAAC;EACL;EAEOC,gBAAgBA,CAAC5C,GAAY,EAAEC,IAAsD,EAAQ;IAChG,IAAMmB,MAAuC,GAAG,CAAC,CAAC;IAClD,IAAMyB,MAAM,GAAGrE,sBAAsB,CAAC,EAAE,CAAC;IAEzC,KAAK,IAAIM,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAG,IAAI,CAACF,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;MACxC,IAAME,GAAG,GAAG,IAAI,CAACJ,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;MAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAAC4D,MAAM,CAAC,EAAE;QACzB,IAAMpE,MAAM,GAAGO,GAAG,CAACuD,KAAK,CAACM,MAAM,CAAChE,MAAM,CAAC;QACvCuC,MAAM,CAAC3C,MAAM,CAAC,GAAGgB,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEI,GAAG,CAAE;MAClD;IACJ;IACAiB,IAAI,CAACmB,MAAM,CAAC;EAChB;EAEO0B,yBAAyBA,CAAC3C,QAAoB,EAAiB;IAClE,IAAMkC,qBAAqB,GACvB5C,WAAW,CAER,IAAI,CAACb,KAAK,EAAEX,2BAA2B,CAAC,IAAI,CAAC,CAAC;IACrD,KAAK,IAAM0C,OAAO,IAAIR,QAAQ,EAAE;MAC5BkC,qBAAqB,CAAC1B,OAAO,CAACtC,SAAS,GAAG,GAAG,GAAGsC,OAAO,CAACrC,SAAS,CAAC,GAAG,IAAI;IAC7E;IACAwB,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAEX,2BAA2B,EAAEoE,qBAAqB,CAAC;IAC3E,OAAOU,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;AACJ;AACA;AACA;AACA;EACWC,aAAaA,CAAA,EAAkB;IAClC,IAAI,CAACrE,KAAK,CAACgD,UAAU,CAAChE,sBAAsB,CAAC;IAC7C,OAAOmF,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;;EAEOE,UAAUA,CAAClD,GAAY,EAAEC,IAA4C,EAAQ;IAChF,IAAMkD,aAAa,GAAG1D,WAAW,CAAS,IAAI,CAACb,KAAK,EAAEhB,sBAAsB,CAAC;IAC7EqC,IAAI,CAACkD,aAAa,CAAC;EACvB;EAEOC,YAAYA,CAACpD,GAAY,EAAEmD,aAAqB,EAAQ;IAC3DrD,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAEhB,sBAAsB,EAAEuF,aAAa,CAAC;EAClE;EAEOE,mBAAmBA,CAACrD,GAAY,EAAEC,IAAgE,EAAQ;IAC7G,IAAMI,IAAI,GAAGZ,WAAW,CAAsC,IAAI,CAACb,KAAK,EAAEf,sBAAsB,CAAC;IACjGoC,IAAI,CAACI,IAAI,CAAC;EACd;EAEOiD,wBAAwBA,CAC3BtD,GAAY,EACZC,IAAqD,EACrDsD,IAAO,EACH;IACJ,IAAMvE,GAAG,GAAGS,WAAW,CAA4B,IAAI,CAACb,KAAK,EAAElB,UAAU,iBAAA8F,MAAA,CAAiBD,IAAI,CAAE,CAAC;IACjGtD,IAAI,CAACjB,GAAG,CAAC;EACb;EAEOyE,0BAA0BA,CAC7BzD,GAAY,EACZuD,IAAO,EACPvE,GAA8B,EAC1B;IACJc,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAElB,UAAU,iBAAA8F,MAAA,CAAiBD,IAAI,CAAE,EAAEvE,GAAG,CAAC;EACnE;EAEO0E,KAAKA,CAAIC,IAAU,EAAEC,MAAwB,EAAE3D,IAAyB,EAAc;IACzF,OAAO8C,OAAO,CAACC,OAAO,CAAC/C,IAAI,CAAC,IAAI,CAAC,CAAC;EACtC;AACJ;AAEA,SAASR,WAAWA,CAAIb,KAAc,EAAEI,GAAW,EAAY;EAC3D,IAAI;IACA;IACA;IACA,OAAO6E,IAAI,CAACC,KAAK,CAAClF,KAAK,CAACmF,OAAO,CAAC/E,GAAG,CAAE,CAAC;EAC1C,CAAC,CAAC,OAAOgF,CAAC,EAAE;IACR1G,MAAM,CAAC2G,GAAG,CAAC,iCAAiC,EAAEjF,GAAG,EAAUgF,CAAC,CAAEE,OAAO,CAAC;IACtE5G,MAAM,CAAC2G,GAAG,CAASD,CAAC,CAAEG,KAAK,CAAC;EAChC;EACA,OAAO,IAAI;AACf;AAEA,SAASrE,WAAWA,CAAIlB,KAAc,EAAEI,GAAW,EAAEyB,GAAM,EAAQ;EAC/D7B,KAAK,CAACwF,OAAO,CAACpF,GAAG,EAAE6E,IAAI,CAACQ,SAAS,CAAC5D,GAAG,CAAC,CAAC;AAC3C","ignoreList":[]}
1
+ {"version":3,"file":"localStorage-crypto-store.js","names":["logger","MemoryCryptoStore","MigrationState","SESSION_BATCH_SIZE","E2E_PREFIX","KEY_END_TO_END_MIGRATION_STATE","KEY_END_TO_END_ACCOUNT","KEY_CROSS_SIGNING_KEYS","KEY_INBOUND_SESSION_PREFIX","KEY_INBOUND_SESSION_WITHHELD_PREFIX","KEY_ROOMS_PREFIX","KEY_SESSIONS_NEEDING_BACKUP","keyEndToEndSessions","deviceKey","keyEndToEndInboundGroupSession","senderKey","sessionId","keyEndToEndInboundGroupSessionWithheld","keyEndToEndRoomsPrefix","roomId","LocalStorageCryptoStore","exists","store","length","i","_store$key","key","startsWith","constructor","containsData","_this","_asyncToGenerator","getMigrationState","_this2","_getJsonItem","getJsonItem","NOT_STARTED","setMigrationState","migrationState","_this3","setJsonItem","countEndToEndSessions","txn","func","count","sessions","Object","keys","_getEndToEndSessions","fixedSessions","sid","val","entries","session","getEndToEndSession","_sessions$sessionId","getEndToEndSessions","_this$_getEndToEndSes","storeEndToEndSession","sessionInfo","getEndToEndSessionsBatch","_this4","result","_this4$store$key","split","values","push","deleteEndToEndSessionsBatch","_this5","deviceSessions","removeItem","getEndToEndInboundGroupSession","senderCurve25519Key","storeEndToEndInboundGroupSession","sessionData","countEndToEndInboundGroupSessions","_this6","getEndToEndInboundGroupSessionsBatch","_this7","sessionsNeedingBackup","key2","slice","needsBackup","deleteEndToEndInboundGroupSessionsBatch","_this8","k","getEndToEndRooms","prefix","markSessionsNeedingBackup","Promise","resolve","deleteAllData","getAccount","accountPickle","storeAccount","getCrossSigningKeys","getSecretStorePrivateKey","type","concat","storeSecretStorePrivateKey","doTxn","mode","stores","JSON","parse","getItem","e","log","message","stack","setItem","stringify"],"sources":["../../../src/crypto/store/localStorage-crypto-store.ts"],"sourcesContent":["/*\nCopyright 2017 - 2021 The Matrix.org Foundation C.I.C.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\nimport { logger } from \"../../logger.ts\";\nimport { MemoryCryptoStore } from \"./memory-crypto-store.ts\";\nimport {\n type CryptoStore,\n type ISession,\n type SessionExtended,\n type ISessionInfo,\n type IWithheld,\n MigrationState,\n type Mode,\n type SecretStorePrivateKeys,\n SESSION_BATCH_SIZE,\n type InboundGroupSessionData,\n type IRoomEncryption,\n} from \"./base.ts\";\nimport { type CrossSigningKeyInfo } from \"../../crypto-api/index.ts\";\n\n/**\n * Internal module. Partial localStorage backed storage for e2e.\n * This is not a full crypto store, just the in-memory store with\n * some things backed by localStorage. It exists because indexedDB\n * is broken in Firefox private mode or set to, \"will not remember\n * history\".\n */\n\nconst E2E_PREFIX = \"crypto.\";\nconst KEY_END_TO_END_MIGRATION_STATE = E2E_PREFIX + \"migration\";\nconst KEY_END_TO_END_ACCOUNT = E2E_PREFIX + \"account\";\nconst KEY_CROSS_SIGNING_KEYS = E2E_PREFIX + \"cross_signing_keys\";\nconst KEY_INBOUND_SESSION_PREFIX = E2E_PREFIX + \"inboundgroupsessions/\";\nconst KEY_INBOUND_SESSION_WITHHELD_PREFIX = E2E_PREFIX + \"inboundgroupsessions.withheld/\";\nconst KEY_ROOMS_PREFIX = E2E_PREFIX + \"rooms/\";\nconst KEY_SESSIONS_NEEDING_BACKUP = E2E_PREFIX + \"sessionsneedingbackup\";\n\nfunction keyEndToEndSessions(deviceKey: string): string {\n return E2E_PREFIX + \"sessions/\" + deviceKey;\n}\n\nfunction keyEndToEndInboundGroupSession(senderKey: string, sessionId: string): string {\n return KEY_INBOUND_SESSION_PREFIX + senderKey + \"/\" + sessionId;\n}\n\nfunction keyEndToEndInboundGroupSessionWithheld(senderKey: string, sessionId: string): string {\n return KEY_INBOUND_SESSION_WITHHELD_PREFIX + senderKey + \"/\" + sessionId;\n}\n\nfunction keyEndToEndRoomsPrefix(roomId: string): string {\n return KEY_ROOMS_PREFIX + roomId;\n}\n\nexport class LocalStorageCryptoStore extends MemoryCryptoStore implements CryptoStore {\n public static exists(store: Storage): boolean {\n const length = store.length;\n for (let i = 0; i < length; i++) {\n if (store.key(i)?.startsWith(E2E_PREFIX)) {\n return true;\n }\n }\n return false;\n }\n\n public constructor(private readonly store: Storage) {\n super();\n }\n\n /**\n * Returns true if this CryptoStore has ever been initialised (ie, it might contain data).\n *\n * Implementation of {@link CryptoStore.containsData}.\n *\n * @internal\n */\n public async containsData(): Promise<boolean> {\n return LocalStorageCryptoStore.exists(this.store);\n }\n\n /**\n * Get data on how much of the libolm to Rust Crypto migration has been done.\n *\n * Implementation of {@link CryptoStore.getMigrationState}.\n *\n * @internal\n */\n public async getMigrationState(): Promise<MigrationState> {\n return getJsonItem(this.store, KEY_END_TO_END_MIGRATION_STATE) ?? MigrationState.NOT_STARTED;\n }\n\n /**\n * Set data on how much of the libolm to Rust Crypto migration has been done.\n *\n * Implementation of {@link CryptoStore.setMigrationState}.\n *\n * @internal\n */\n public async setMigrationState(migrationState: MigrationState): Promise<void> {\n setJsonItem(this.store, KEY_END_TO_END_MIGRATION_STATE, migrationState);\n }\n\n // Olm Sessions\n\n public countEndToEndSessions(txn: unknown, func: (count: number) => void): void {\n let count = 0;\n for (let i = 0; i < this.store.length; ++i) {\n const key = this.store.key(i);\n if (key?.startsWith(keyEndToEndSessions(\"\"))) {\n const sessions = getJsonItem(this.store, key);\n count += Object.keys(sessions ?? {}).length;\n }\n }\n func(count);\n }\n\n // eslint-disable-next-line @typescript-eslint/naming-convention\n private _getEndToEndSessions(deviceKey: string): Record<string, ISessionInfo> {\n const sessions = getJsonItem(this.store, keyEndToEndSessions(deviceKey));\n const fixedSessions: Record<string, ISessionInfo> = {};\n\n // fix up any old sessions to be objects rather than just the base64 pickle\n for (const [sid, val] of Object.entries(sessions || {})) {\n if (typeof val === \"string\") {\n fixedSessions[sid] = {\n session: val,\n };\n } else {\n fixedSessions[sid] = val;\n }\n }\n\n return fixedSessions;\n }\n\n public getEndToEndSession(\n deviceKey: string,\n sessionId: string,\n txn: unknown,\n func: (session: ISessionInfo) => void,\n ): void {\n const sessions = this._getEndToEndSessions(deviceKey);\n func(sessions[sessionId] ?? {});\n }\n\n public getEndToEndSessions(\n deviceKey: string,\n txn: unknown,\n func: (sessions: { [sessionId: string]: ISessionInfo }) => void,\n ): void {\n func(this._getEndToEndSessions(deviceKey) ?? {});\n }\n\n public storeEndToEndSession(deviceKey: string, sessionId: string, sessionInfo: ISessionInfo, txn: unknown): void {\n const sessions = this._getEndToEndSessions(deviceKey) || {};\n sessions[sessionId] = sessionInfo;\n setJsonItem(this.store, keyEndToEndSessions(deviceKey), sessions);\n }\n\n /**\n * Fetch a batch of Olm sessions from the database.\n *\n * Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.\n *\n * @internal\n */\n public async getEndToEndSessionsBatch(): Promise<null | ISessionInfo[]> {\n const result: ISessionInfo[] = [];\n for (let i = 0; i < this.store.length; ++i) {\n if (this.store.key(i)?.startsWith(keyEndToEndSessions(\"\"))) {\n const deviceKey = this.store.key(i)!.split(\"/\")[1];\n for (const session of Object.values(this._getEndToEndSessions(deviceKey))) {\n result.push(session);\n if (result.length >= SESSION_BATCH_SIZE) {\n return result;\n }\n }\n }\n }\n\n if (result.length === 0) {\n // No sessions left.\n return null;\n }\n\n // There are fewer sessions than the batch size; return the final batch of sessions.\n return result;\n }\n\n /**\n * Delete a batch of Olm sessions from the database.\n *\n * Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.\n *\n * @internal\n */\n public async deleteEndToEndSessionsBatch(sessions: { deviceKey: string; sessionId: string }[]): Promise<void> {\n for (const { deviceKey, sessionId } of sessions) {\n const deviceSessions = this._getEndToEndSessions(deviceKey) || {};\n delete deviceSessions[sessionId];\n if (Object.keys(deviceSessions).length === 0) {\n // No more sessions for this device.\n this.store.removeItem(keyEndToEndSessions(deviceKey));\n } else {\n setJsonItem(this.store, keyEndToEndSessions(deviceKey), deviceSessions);\n }\n }\n }\n\n // Inbound Group Sessions\n\n public getEndToEndInboundGroupSession(\n senderCurve25519Key: string,\n sessionId: string,\n txn: unknown,\n func: (groupSession: InboundGroupSessionData | null, groupSessionWithheld: IWithheld | null) => void,\n ): void {\n func(\n getJsonItem(this.store, keyEndToEndInboundGroupSession(senderCurve25519Key, sessionId)),\n getJsonItem(this.store, keyEndToEndInboundGroupSessionWithheld(senderCurve25519Key, sessionId)),\n );\n }\n\n public storeEndToEndInboundGroupSession(\n senderCurve25519Key: string,\n sessionId: string,\n sessionData: InboundGroupSessionData,\n txn: unknown,\n ): void {\n setJsonItem(this.store, keyEndToEndInboundGroupSession(senderCurve25519Key, sessionId), sessionData);\n }\n\n /**\n * Count the number of Megolm sessions in the database.\n *\n * Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.\n *\n * @internal\n */\n public async countEndToEndInboundGroupSessions(): Promise<number> {\n let count = 0;\n for (let i = 0; i < this.store.length; ++i) {\n const key = this.store.key(i);\n if (key?.startsWith(KEY_INBOUND_SESSION_PREFIX)) {\n count += 1;\n }\n }\n return count;\n }\n\n /**\n * Fetch a batch of Megolm sessions from the database.\n *\n * Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.\n *\n * @internal\n */\n public async getEndToEndInboundGroupSessionsBatch(): Promise<SessionExtended[] | null> {\n const sessionsNeedingBackup = getJsonItem<string[]>(this.store, KEY_SESSIONS_NEEDING_BACKUP) || {};\n const result: SessionExtended[] = [];\n for (let i = 0; i < this.store.length; ++i) {\n const key = this.store.key(i);\n if (key?.startsWith(KEY_INBOUND_SESSION_PREFIX)) {\n const key2 = key.slice(KEY_INBOUND_SESSION_PREFIX.length);\n\n // we can't use split, as the components we are trying to split out\n // might themselves contain '/' characters. We rely on the\n // senderKey being a (32-byte) curve25519 key, base64-encoded\n // (hence 43 characters long).\n\n result.push({\n senderKey: key2.slice(0, 43),\n sessionId: key2.slice(44),\n sessionData: getJsonItem(this.store, key)!,\n needsBackup: key2 in sessionsNeedingBackup,\n });\n\n if (result.length >= SESSION_BATCH_SIZE) {\n return result;\n }\n }\n }\n\n if (result.length === 0) {\n // No sessions left.\n return null;\n }\n\n // There are fewer sessions than the batch size; return the final batch of sessions.\n return result;\n }\n\n /**\n * Delete a batch of Megolm sessions from the database.\n *\n * Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.\n *\n * @internal\n */\n public async deleteEndToEndInboundGroupSessionsBatch(\n sessions: { senderKey: string; sessionId: string }[],\n ): Promise<void> {\n for (const { senderKey, sessionId } of sessions) {\n const k = keyEndToEndInboundGroupSession(senderKey, sessionId);\n this.store.removeItem(k);\n }\n }\n\n public getEndToEndRooms(txn: unknown, func: (rooms: Record<string, IRoomEncryption>) => void): void {\n const result: Record<string, IRoomEncryption> = {};\n const prefix = keyEndToEndRoomsPrefix(\"\");\n\n for (let i = 0; i < this.store.length; ++i) {\n const key = this.store.key(i);\n if (key?.startsWith(prefix)) {\n const roomId = key.slice(prefix.length);\n result[roomId] = getJsonItem(this.store, key)!;\n }\n }\n func(result);\n }\n\n public markSessionsNeedingBackup(sessions: ISession[]): Promise<void> {\n const sessionsNeedingBackup =\n getJsonItem<{\n [senderKeySessionId: string]: boolean;\n }>(this.store, KEY_SESSIONS_NEEDING_BACKUP) || {};\n for (const session of sessions) {\n sessionsNeedingBackup[session.senderKey + \"/\" + session.sessionId] = true;\n }\n setJsonItem(this.store, KEY_SESSIONS_NEEDING_BACKUP, sessionsNeedingBackup);\n return Promise.resolve();\n }\n\n /**\n * Delete all data from this store.\n *\n * @returns Promise which resolves when the store has been cleared.\n */\n public deleteAllData(): Promise<void> {\n this.store.removeItem(KEY_END_TO_END_ACCOUNT);\n return Promise.resolve();\n }\n\n // Olm account\n\n public getAccount(txn: unknown, func: (accountPickle: string | null) => void): void {\n const accountPickle = getJsonItem<string>(this.store, KEY_END_TO_END_ACCOUNT);\n func(accountPickle);\n }\n\n public storeAccount(txn: unknown, accountPickle: string): void {\n setJsonItem(this.store, KEY_END_TO_END_ACCOUNT, accountPickle);\n }\n\n public getCrossSigningKeys(txn: unknown, func: (keys: Record<string, CrossSigningKeyInfo> | null) => void): void {\n const keys = getJsonItem<Record<string, CrossSigningKeyInfo>>(this.store, KEY_CROSS_SIGNING_KEYS);\n func(keys);\n }\n\n public getSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\n txn: unknown,\n func: (key: SecretStorePrivateKeys[K] | null) => void,\n type: K,\n ): void {\n const key = getJsonItem<SecretStorePrivateKeys[K]>(this.store, E2E_PREFIX + `ssss_cache.${type}`);\n func(key);\n }\n\n public storeSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(\n txn: unknown,\n type: K,\n key: SecretStorePrivateKeys[K],\n ): void {\n setJsonItem(this.store, E2E_PREFIX + `ssss_cache.${type}`, key);\n }\n\n public doTxn<T>(mode: Mode, stores: Iterable<string>, func: (txn: unknown) => T): Promise<T> {\n return Promise.resolve(func(null));\n }\n}\n\nfunction getJsonItem<T>(store: Storage, key: string): T | null {\n try {\n // if the key is absent, store.getItem() returns null, and\n // JSON.parse(null) === null, so this returns null.\n return JSON.parse(store.getItem(key)!);\n } catch (e) {\n logger.log(\"Error: Failed to get key %s: %s\", key, (<Error>e).message);\n logger.log((<Error>e).stack);\n }\n return null;\n}\n\nfunction setJsonItem<T>(store: Storage, key: string, val: T): void {\n store.setItem(key, JSON.stringify(val));\n}\n"],"mappings":";AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASA,MAAM,QAAQ,iBAAiB;AACxC,SAASC,iBAAiB,QAAQ,0BAA0B;AAC5D,SAMIC,cAAc,EAGdC,kBAAkB,QAGf,WAAW;AAGlB;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,IAAMC,UAAU,GAAG,SAAS;AAC5B,IAAMC,8BAA8B,GAAGD,UAAU,GAAG,WAAW;AAC/D,IAAME,sBAAsB,GAAGF,UAAU,GAAG,SAAS;AACrD,IAAMG,sBAAsB,GAAGH,UAAU,GAAG,oBAAoB;AAChE,IAAMI,0BAA0B,GAAGJ,UAAU,GAAG,uBAAuB;AACvE,IAAMK,mCAAmC,GAAGL,UAAU,GAAG,gCAAgC;AACzF,IAAMM,gBAAgB,GAAGN,UAAU,GAAG,QAAQ;AAC9C,IAAMO,2BAA2B,GAAGP,UAAU,GAAG,uBAAuB;AAExE,SAASQ,mBAAmBA,CAACC,SAAiB,EAAU;EACpD,OAAOT,UAAU,GAAG,WAAW,GAAGS,SAAS;AAC/C;AAEA,SAASC,8BAA8BA,CAACC,SAAiB,EAAEC,SAAiB,EAAU;EAClF,OAAOR,0BAA0B,GAAGO,SAAS,GAAG,GAAG,GAAGC,SAAS;AACnE;AAEA,SAASC,sCAAsCA,CAACF,SAAiB,EAAEC,SAAiB,EAAU;EAC1F,OAAOP,mCAAmC,GAAGM,SAAS,GAAG,GAAG,GAAGC,SAAS;AAC5E;AAEA,SAASE,sBAAsBA,CAACC,MAAc,EAAU;EACpD,OAAOT,gBAAgB,GAAGS,MAAM;AACpC;AAEA,OAAO,MAAMC,uBAAuB,SAASnB,iBAAiB,CAAwB;EAClF,OAAcoB,MAAMA,CAACC,KAAc,EAAW;IAC1C,IAAMC,MAAM,GAAGD,KAAK,CAACC,MAAM;IAC3B,KAAK,IAAIC,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGD,MAAM,EAAEC,CAAC,EAAE,EAAE;MAAA,IAAAC,UAAA;MAC7B,KAAAA,UAAA,GAAIH,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC,cAAAC,UAAA,eAAZA,UAAA,CAAcE,UAAU,CAACvB,UAAU,CAAC,EAAE;QACtC,OAAO,IAAI;MACf;IACJ;IACA,OAAO,KAAK;EAChB;EAEOwB,WAAWA,CAAkBN,KAAc,EAAE;IAChD,KAAK,CAAC,CAAC;IAAC,KADwBA,KAAc,GAAdA,KAAc;EAElD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBO,YAAYA,CAAA,EAAqB;IAAA,IAAAC,KAAA;IAAA,OAAAC,iBAAA;MAC1C,OAAOX,uBAAuB,CAACC,MAAM,CAACS,KAAI,CAACR,KAAK,CAAC;IAAC;EACtD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBU,iBAAiBA,CAAA,EAA4B;IAAA,IAAAC,MAAA;IAAA,OAAAF,iBAAA;MAAA,IAAAG,YAAA;MACtD,QAAAA,YAAA,GAAOC,WAAW,CAACF,MAAI,CAACX,KAAK,EAAEjB,8BAA8B,CAAC,cAAA6B,YAAA,cAAAA,YAAA,GAAIhC,cAAc,CAACkC,WAAW;IAAC;EACjG;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBC,iBAAiBA,CAACC,cAA8B,EAAiB;IAAA,IAAAC,MAAA;IAAA,OAAAR,iBAAA;MAC1ES,WAAW,CAACD,MAAI,CAACjB,KAAK,EAAEjB,8BAA8B,EAAEiC,cAAc,CAAC;IAAC;EAC5E;;EAEA;;EAEOG,qBAAqBA,CAACC,GAAY,EAAEC,IAA6B,EAAQ;IAC5E,IAAIC,KAAK,GAAG,CAAC;IACb,KAAK,IAAIpB,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAG,IAAI,CAACF,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;MACxC,IAAME,GAAG,GAAG,IAAI,CAACJ,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;MAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAACf,mBAAmB,CAAC,EAAE,CAAC,CAAC,EAAE;QAC1C,IAAMiC,QAAQ,GAAGV,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEI,GAAG,CAAC;QAC7CkB,KAAK,IAAIE,MAAM,CAACC,IAAI,CAACF,QAAQ,aAARA,QAAQ,cAARA,QAAQ,GAAI,CAAC,CAAC,CAAC,CAACtB,MAAM;MAC/C;IACJ;IACAoB,IAAI,CAACC,KAAK,CAAC;EACf;;EAEA;EACQI,oBAAoBA,CAACnC,SAAiB,EAAgC;IAC1E,IAAMgC,QAAQ,GAAGV,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEV,mBAAmB,CAACC,SAAS,CAAC,CAAC;IACxE,IAAMoC,aAA2C,GAAG,CAAC,CAAC;;IAEtD;IACA,KAAK,IAAM,CAACC,GAAG,EAAEC,GAAG,CAAC,IAAIL,MAAM,CAACM,OAAO,CAACP,QAAQ,IAAI,CAAC,CAAC,CAAC,EAAE;MACrD,IAAI,OAAOM,GAAG,KAAK,QAAQ,EAAE;QACzBF,aAAa,CAACC,GAAG,CAAC,GAAG;UACjBG,OAAO,EAAEF;QACb,CAAC;MACL,CAAC,MAAM;QACHF,aAAa,CAACC,GAAG,CAAC,GAAGC,GAAG;MAC5B;IACJ;IAEA,OAAOF,aAAa;EACxB;EAEOK,kBAAkBA,CACrBzC,SAAiB,EACjBG,SAAiB,EACjB0B,GAAY,EACZC,IAAqC,EACjC;IAAA,IAAAY,mBAAA;IACJ,IAAMV,QAAQ,GAAG,IAAI,CAACG,oBAAoB,CAACnC,SAAS,CAAC;IACrD8B,IAAI,EAAAY,mBAAA,GAACV,QAAQ,CAAC7B,SAAS,CAAC,cAAAuC,mBAAA,cAAAA,mBAAA,GAAI,CAAC,CAAC,CAAC;EACnC;EAEOC,mBAAmBA,CACtB3C,SAAiB,EACjB6B,GAAY,EACZC,IAA+D,EAC3D;IAAA,IAAAc,qBAAA;IACJd,IAAI,EAAAc,qBAAA,GAAC,IAAI,CAACT,oBAAoB,CAACnC,SAAS,CAAC,cAAA4C,qBAAA,cAAAA,qBAAA,GAAI,CAAC,CAAC,CAAC;EACpD;EAEOC,oBAAoBA,CAAC7C,SAAiB,EAAEG,SAAiB,EAAE2C,WAAyB,EAAEjB,GAAY,EAAQ;IAC7G,IAAMG,QAAQ,GAAG,IAAI,CAACG,oBAAoB,CAACnC,SAAS,CAAC,IAAI,CAAC,CAAC;IAC3DgC,QAAQ,CAAC7B,SAAS,CAAC,GAAG2C,WAAW;IACjCnB,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAEV,mBAAmB,CAACC,SAAS,CAAC,EAAEgC,QAAQ,CAAC;EACrE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBe,wBAAwBA,CAAA,EAAmC;IAAA,IAAAC,MAAA;IAAA,OAAA9B,iBAAA;MACpE,IAAM+B,MAAsB,GAAG,EAAE;MACjC,KAAK,IAAItC,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGqC,MAAI,CAACvC,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;QAAA,IAAAuC,gBAAA;QACxC,KAAAA,gBAAA,GAAIF,MAAI,CAACvC,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC,cAAAuC,gBAAA,eAAjBA,gBAAA,CAAmBpC,UAAU,CAACf,mBAAmB,CAAC,EAAE,CAAC,CAAC,EAAE;UACxD,IAAMC,SAAS,GAAGgD,MAAI,CAACvC,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC,CAAEwC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;UAClD,KAAK,IAAMX,OAAO,IAAIP,MAAM,CAACmB,MAAM,CAACJ,MAAI,CAACb,oBAAoB,CAACnC,SAAS,CAAC,CAAC,EAAE;YACvEiD,MAAM,CAACI,IAAI,CAACb,OAAO,CAAC;YACpB,IAAIS,MAAM,CAACvC,MAAM,IAAIpB,kBAAkB,EAAE;cACrC,OAAO2D,MAAM;YACjB;UACJ;QACJ;MACJ;MAEA,IAAIA,MAAM,CAACvC,MAAM,KAAK,CAAC,EAAE;QACrB;QACA,OAAO,IAAI;MACf;;MAEA;MACA,OAAOuC,MAAM;IAAC;EAClB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBK,2BAA2BA,CAACtB,QAAoD,EAAiB;IAAA,IAAAuB,MAAA;IAAA,OAAArC,iBAAA;MAC1G,KAAK,IAAM;QAAElB,SAAS;QAAEG;MAAU,CAAC,IAAI6B,QAAQ,EAAE;QAC7C,IAAMwB,cAAc,GAAGD,MAAI,CAACpB,oBAAoB,CAACnC,SAAS,CAAC,IAAI,CAAC,CAAC;QACjE,OAAOwD,cAAc,CAACrD,SAAS,CAAC;QAChC,IAAI8B,MAAM,CAACC,IAAI,CAACsB,cAAc,CAAC,CAAC9C,MAAM,KAAK,CAAC,EAAE;UAC1C;UACA6C,MAAI,CAAC9C,KAAK,CAACgD,UAAU,CAAC1D,mBAAmB,CAACC,SAAS,CAAC,CAAC;QACzD,CAAC,MAAM;UACH2B,WAAW,CAAC4B,MAAI,CAAC9C,KAAK,EAAEV,mBAAmB,CAACC,SAAS,CAAC,EAAEwD,cAAc,CAAC;QAC3E;MACJ;IAAC;EACL;;EAEA;;EAEOE,8BAA8BA,CACjCC,mBAA2B,EAC3BxD,SAAiB,EACjB0B,GAAY,EACZC,IAAoG,EAChG;IACJA,IAAI,CACAR,WAAW,CAAC,IAAI,CAACb,KAAK,EAAER,8BAA8B,CAAC0D,mBAAmB,EAAExD,SAAS,CAAC,CAAC,EACvFmB,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEL,sCAAsC,CAACuD,mBAAmB,EAAExD,SAAS,CAAC,CAClG,CAAC;EACL;EAEOyD,gCAAgCA,CACnCD,mBAA2B,EAC3BxD,SAAiB,EACjB0D,WAAoC,EACpChC,GAAY,EACR;IACJF,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAER,8BAA8B,CAAC0D,mBAAmB,EAAExD,SAAS,CAAC,EAAE0D,WAAW,CAAC;EACxG;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBC,iCAAiCA,CAAA,EAAoB;IAAA,IAAAC,MAAA;IAAA,OAAA7C,iBAAA;MAC9D,IAAIa,KAAK,GAAG,CAAC;MACb,KAAK,IAAIpB,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGoD,MAAI,CAACtD,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;QACxC,IAAME,GAAG,GAAGkD,MAAI,CAACtD,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;QAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAACnB,0BAA0B,CAAC,EAAE;UAC7CoC,KAAK,IAAI,CAAC;QACd;MACJ;MACA,OAAOA,KAAK;IAAC;EACjB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBiC,oCAAoCA,CAAA,EAAsC;IAAA,IAAAC,MAAA;IAAA,OAAA/C,iBAAA;MACnF,IAAMgD,qBAAqB,GAAG5C,WAAW,CAAW2C,MAAI,CAACxD,KAAK,EAAEX,2BAA2B,CAAC,IAAI,CAAC,CAAC;MAClG,IAAMmD,MAAyB,GAAG,EAAE;MACpC,KAAK,IAAItC,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAGsD,MAAI,CAACxD,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;QACxC,IAAME,GAAG,GAAGoD,MAAI,CAACxD,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;QAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAACnB,0BAA0B,CAAC,EAAE;UAC7C,IAAMwE,IAAI,GAAGtD,GAAG,CAACuD,KAAK,CAACzE,0BAA0B,CAACe,MAAM,CAAC;;UAEzD;UACA;UACA;UACA;;UAEAuC,MAAM,CAACI,IAAI,CAAC;YACRnD,SAAS,EAAEiE,IAAI,CAACC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC;YAC5BjE,SAAS,EAAEgE,IAAI,CAACC,KAAK,CAAC,EAAE,CAAC;YACzBP,WAAW,EAAEvC,WAAW,CAAC2C,MAAI,CAACxD,KAAK,EAAEI,GAAG,CAAE;YAC1CwD,WAAW,EAAEF,IAAI,IAAID;UACzB,CAAC,CAAC;UAEF,IAAIjB,MAAM,CAACvC,MAAM,IAAIpB,kBAAkB,EAAE;YACrC,OAAO2D,MAAM;UACjB;QACJ;MACJ;MAEA,IAAIA,MAAM,CAACvC,MAAM,KAAK,CAAC,EAAE;QACrB;QACA,OAAO,IAAI;MACf;;MAEA;MACA,OAAOuC,MAAM;IAAC;EAClB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACiBqB,uCAAuCA,CAChDtC,QAAoD,EACvC;IAAA,IAAAuC,MAAA;IAAA,OAAArD,iBAAA;MACb,KAAK,IAAM;QAAEhB,SAAS;QAAEC;MAAU,CAAC,IAAI6B,QAAQ,EAAE;QAC7C,IAAMwC,CAAC,GAAGvE,8BAA8B,CAACC,SAAS,EAAEC,SAAS,CAAC;QAC9DoE,MAAI,CAAC9D,KAAK,CAACgD,UAAU,CAACe,CAAC,CAAC;MAC5B;IAAC;EACL;EAEOC,gBAAgBA,CAAC5C,GAAY,EAAEC,IAAsD,EAAQ;IAChG,IAAMmB,MAAuC,GAAG,CAAC,CAAC;IAClD,IAAMyB,MAAM,GAAGrE,sBAAsB,CAAC,EAAE,CAAC;IAEzC,KAAK,IAAIM,CAAC,GAAG,CAAC,EAAEA,CAAC,GAAG,IAAI,CAACF,KAAK,CAACC,MAAM,EAAE,EAAEC,CAAC,EAAE;MACxC,IAAME,GAAG,GAAG,IAAI,CAACJ,KAAK,CAACI,GAAG,CAACF,CAAC,CAAC;MAC7B,IAAIE,GAAG,aAAHA,GAAG,eAAHA,GAAG,CAAEC,UAAU,CAAC4D,MAAM,CAAC,EAAE;QACzB,IAAMpE,MAAM,GAAGO,GAAG,CAACuD,KAAK,CAACM,MAAM,CAAChE,MAAM,CAAC;QACvCuC,MAAM,CAAC3C,MAAM,CAAC,GAAGgB,WAAW,CAAC,IAAI,CAACb,KAAK,EAAEI,GAAG,CAAE;MAClD;IACJ;IACAiB,IAAI,CAACmB,MAAM,CAAC;EAChB;EAEO0B,yBAAyBA,CAAC3C,QAAoB,EAAiB;IAClE,IAAMkC,qBAAqB,GACvB5C,WAAW,CAER,IAAI,CAACb,KAAK,EAAEX,2BAA2B,CAAC,IAAI,CAAC,CAAC;IACrD,KAAK,IAAM0C,OAAO,IAAIR,QAAQ,EAAE;MAC5BkC,qBAAqB,CAAC1B,OAAO,CAACtC,SAAS,GAAG,GAAG,GAAGsC,OAAO,CAACrC,SAAS,CAAC,GAAG,IAAI;IAC7E;IACAwB,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAEX,2BAA2B,EAAEoE,qBAAqB,CAAC;IAC3E,OAAOU,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;AACJ;AACA;AACA;AACA;EACWC,aAAaA,CAAA,EAAkB;IAClC,IAAI,CAACrE,KAAK,CAACgD,UAAU,CAAChE,sBAAsB,CAAC;IAC7C,OAAOmF,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;;EAEOE,UAAUA,CAAClD,GAAY,EAAEC,IAA4C,EAAQ;IAChF,IAAMkD,aAAa,GAAG1D,WAAW,CAAS,IAAI,CAACb,KAAK,EAAEhB,sBAAsB,CAAC;IAC7EqC,IAAI,CAACkD,aAAa,CAAC;EACvB;EAEOC,YAAYA,CAACpD,GAAY,EAAEmD,aAAqB,EAAQ;IAC3DrD,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAEhB,sBAAsB,EAAEuF,aAAa,CAAC;EAClE;EAEOE,mBAAmBA,CAACrD,GAAY,EAAEC,IAAgE,EAAQ;IAC7G,IAAMI,IAAI,GAAGZ,WAAW,CAAsC,IAAI,CAACb,KAAK,EAAEf,sBAAsB,CAAC;IACjGoC,IAAI,CAACI,IAAI,CAAC;EACd;EAEOiD,wBAAwBA,CAC3BtD,GAAY,EACZC,IAAqD,EACrDsD,IAAO,EACH;IACJ,IAAMvE,GAAG,GAAGS,WAAW,CAA4B,IAAI,CAACb,KAAK,EAAElB,UAAU,iBAAA8F,MAAA,CAAiBD,IAAI,CAAE,CAAC;IACjGtD,IAAI,CAACjB,GAAG,CAAC;EACb;EAEOyE,0BAA0BA,CAC7BzD,GAAY,EACZuD,IAAO,EACPvE,GAA8B,EAC1B;IACJc,WAAW,CAAC,IAAI,CAAClB,KAAK,EAAElB,UAAU,iBAAA8F,MAAA,CAAiBD,IAAI,CAAE,EAAEvE,GAAG,CAAC;EACnE;EAEO0E,KAAKA,CAAIC,IAAU,EAAEC,MAAwB,EAAE3D,IAAyB,EAAc;IACzF,OAAO8C,OAAO,CAACC,OAAO,CAAC/C,IAAI,CAAC,IAAI,CAAC,CAAC;EACtC;AACJ;AAEA,SAASR,WAAWA,CAAIb,KAAc,EAAEI,GAAW,EAAY;EAC3D,IAAI;IACA;IACA;IACA,OAAO6E,IAAI,CAACC,KAAK,CAAClF,KAAK,CAACmF,OAAO,CAAC/E,GAAG,CAAE,CAAC;EAC1C,CAAC,CAAC,OAAOgF,CAAC,EAAE;IACR1G,MAAM,CAAC2G,GAAG,CAAC,iCAAiC,EAAEjF,GAAG,EAAUgF,CAAC,CAAEE,OAAO,CAAC;IACtE5G,MAAM,CAAC2G,GAAG,CAASD,CAAC,CAAEG,KAAK,CAAC;EAChC;EACA,OAAO,IAAI;AACf;AAEA,SAASrE,WAAWA,CAAIlB,KAAc,EAAEI,GAAW,EAAEyB,GAAM,EAAQ;EAC/D7B,KAAK,CAACwF,OAAO,CAACpF,GAAG,EAAE6E,IAAI,CAACQ,SAAS,CAAC5D,GAAG,CAAC,CAAC;AAC3C","ignoreList":[]}