@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (467) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/global.d.js +0 -2
  3. package/lib/@types/global.d.js.map +1 -1
  4. package/lib/browser-index.d.ts.map +1 -1
  5. package/lib/browser-index.js +0 -11
  6. package/lib/browser-index.js.map +1 -1
  7. package/lib/client.d.ts +2 -1176
  8. package/lib/client.d.ts.map +1 -1
  9. package/lib/client.js +346 -2717
  10. package/lib/client.js.map +1 -1
  11. package/lib/embedded.d.ts +0 -22
  12. package/lib/embedded.d.ts.map +1 -1
  13. package/lib/embedded.js +24 -166
  14. package/lib/embedded.js.map +1 -1
  15. package/lib/event-mapper.d.ts.map +1 -1
  16. package/lib/event-mapper.js +0 -4
  17. package/lib/event-mapper.js.map +1 -1
  18. package/lib/matrix.d.ts +0 -19
  19. package/lib/matrix.d.ts.map +1 -1
  20. package/lib/matrix.js +1 -26
  21. package/lib/matrix.js.map +1 -1
  22. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  23. package/lib/models/MSC3089Branch.js +0 -3
  24. package/lib/models/MSC3089Branch.js.map +1 -1
  25. package/lib/models/event.d.ts +0 -94
  26. package/lib/models/event.d.ts.map +1 -1
  27. package/lib/models/event.js +0 -274
  28. package/lib/models/event.js.map +1 -1
  29. package/lib/models/poll.d.ts.map +1 -1
  30. package/lib/models/poll.js +1 -5
  31. package/lib/models/poll.js.map +1 -1
  32. package/lib/models/relations-container.d.ts.map +1 -1
  33. package/lib/models/relations-container.js +1 -7
  34. package/lib/models/relations-container.js.map +1 -1
  35. package/lib/models/relations.d.ts +0 -1
  36. package/lib/models/relations.d.ts.map +1 -1
  37. package/lib/models/relations.js +0 -8
  38. package/lib/models/relations.js.map +1 -1
  39. package/lib/models/room-state.d.ts.map +1 -1
  40. package/lib/models/room-state.js +10 -26
  41. package/lib/models/room-state.js.map +1 -1
  42. package/lib/models/room.d.ts +0 -18
  43. package/lib/models/room.d.ts.map +1 -1
  44. package/lib/models/room.js +94 -148
  45. package/lib/models/room.js.map +1 -1
  46. package/lib/models/thread.d.ts.map +1 -1
  47. package/lib/models/thread.js +0 -1
  48. package/lib/models/thread.js.map +1 -1
  49. package/lib/sliding-sync-sdk.d.ts +2 -3
  50. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  51. package/lib/sliding-sync-sdk.js +41 -90
  52. package/lib/sliding-sync-sdk.js.map +1 -1
  53. package/lib/sync.d.ts +0 -12
  54. package/lib/sync.d.ts.map +1 -1
  55. package/lib/sync.js +1 -73
  56. package/lib/sync.js.map +1 -1
  57. package/lib/testing.d.ts +0 -48
  58. package/lib/testing.d.ts.map +1 -1
  59. package/lib/testing.js +0 -105
  60. package/lib/testing.js.map +1 -1
  61. package/package.json +1 -3
  62. package/src/@types/global.d.ts +0 -3
  63. package/src/browser-index.ts +0 -11
  64. package/src/client.ts +57 -2732
  65. package/src/embedded.ts +3 -130
  66. package/src/event-mapper.ts +0 -4
  67. package/src/matrix.ts +0 -28
  68. package/src/models/MSC3089Branch.ts +0 -3
  69. package/src/models/event.ts +0 -289
  70. package/src/models/poll.ts +0 -6
  71. package/src/models/relations-container.ts +1 -8
  72. package/src/models/relations.ts +0 -8
  73. package/src/models/room-state.ts +2 -8
  74. package/src/models/room.ts +0 -62
  75. package/src/models/thread.ts +0 -1
  76. package/src/sliding-sync-sdk.ts +2 -72
  77. package/src/sync.ts +1 -98
  78. package/src/testing.ts +0 -108
  79. package/lib/@types/crypto.d.ts +0 -47
  80. package/lib/@types/crypto.d.ts.map +0 -1
  81. package/lib/@types/crypto.js +0 -1
  82. package/lib/@types/crypto.js.map +0 -1
  83. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  84. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  85. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  86. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  87. package/lib/common-crypto/CryptoBackend.js +0 -73
  88. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  89. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  90. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  91. package/lib/common-crypto/key-passphrase.js +0 -33
  92. package/lib/common-crypto/key-passphrase.js.map +0 -1
  93. package/lib/crypto/CrossSigning.d.ts +0 -184
  94. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  95. package/lib/crypto/CrossSigning.js +0 -718
  96. package/lib/crypto/CrossSigning.js.map +0 -1
  97. package/lib/crypto/DeviceList.d.ts +0 -216
  98. package/lib/crypto/DeviceList.d.ts.map +0 -1
  99. package/lib/crypto/DeviceList.js +0 -892
  100. package/lib/crypto/DeviceList.js.map +0 -1
  101. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  102. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  103. package/lib/crypto/EncryptionSetup.js +0 -356
  104. package/lib/crypto/EncryptionSetup.js.map +0 -1
  105. package/lib/crypto/OlmDevice.d.ts +0 -457
  106. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  107. package/lib/crypto/OlmDevice.js +0 -1241
  108. package/lib/crypto/OlmDevice.js.map +0 -1
  109. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  110. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  111. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  112. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  113. package/lib/crypto/RoomList.d.ts +0 -26
  114. package/lib/crypto/RoomList.d.ts.map +0 -1
  115. package/lib/crypto/RoomList.js +0 -71
  116. package/lib/crypto/RoomList.js.map +0 -1
  117. package/lib/crypto/SecretSharing.d.ts +0 -24
  118. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  119. package/lib/crypto/SecretSharing.js +0 -194
  120. package/lib/crypto/SecretSharing.js.map +0 -1
  121. package/lib/crypto/SecretStorage.d.ts +0 -55
  122. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  123. package/lib/crypto/SecretStorage.js +0 -118
  124. package/lib/crypto/SecretStorage.js.map +0 -1
  125. package/lib/crypto/aes.d.ts +0 -6
  126. package/lib/crypto/aes.d.ts.map +0 -1
  127. package/lib/crypto/aes.js +0 -24
  128. package/lib/crypto/aes.js.map +0 -1
  129. package/lib/crypto/algorithms/base.d.ts +0 -156
  130. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  131. package/lib/crypto/algorithms/base.js +0 -187
  132. package/lib/crypto/algorithms/base.js.map +0 -1
  133. package/lib/crypto/algorithms/index.d.ts +0 -4
  134. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  135. package/lib/crypto/algorithms/index.js +0 -20
  136. package/lib/crypto/algorithms/index.js.map +0 -1
  137. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  138. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  139. package/lib/crypto/algorithms/megolm.js +0 -1822
  140. package/lib/crypto/algorithms/megolm.js.map +0 -1
  141. package/lib/crypto/algorithms/olm.d.ts +0 -5
  142. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  143. package/lib/crypto/algorithms/olm.js +0 -299
  144. package/lib/crypto/algorithms/olm.js.map +0 -1
  145. package/lib/crypto/api.d.ts +0 -32
  146. package/lib/crypto/api.d.ts.map +0 -1
  147. package/lib/crypto/api.js +0 -22
  148. package/lib/crypto/api.js.map +0 -1
  149. package/lib/crypto/backup.d.ts +0 -227
  150. package/lib/crypto/backup.d.ts.map +0 -1
  151. package/lib/crypto/backup.js +0 -824
  152. package/lib/crypto/backup.js.map +0 -1
  153. package/lib/crypto/crypto.d.ts +0 -3
  154. package/lib/crypto/crypto.d.ts.map +0 -1
  155. package/lib/crypto/crypto.js +0 -19
  156. package/lib/crypto/crypto.js.map +0 -1
  157. package/lib/crypto/dehydration.d.ts +0 -34
  158. package/lib/crypto/dehydration.d.ts.map +0 -1
  159. package/lib/crypto/dehydration.js +0 -252
  160. package/lib/crypto/dehydration.js.map +0 -1
  161. package/lib/crypto/device-converter.d.ts +0 -9
  162. package/lib/crypto/device-converter.d.ts.map +0 -1
  163. package/lib/crypto/device-converter.js +0 -42
  164. package/lib/crypto/device-converter.js.map +0 -1
  165. package/lib/crypto/deviceinfo.d.ts +0 -99
  166. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  167. package/lib/crypto/deviceinfo.js +0 -148
  168. package/lib/crypto/deviceinfo.js.map +0 -1
  169. package/lib/crypto/index.d.ts +0 -1209
  170. package/lib/crypto/index.d.ts.map +0 -1
  171. package/lib/crypto/index.js +0 -4097
  172. package/lib/crypto/index.js.map +0 -1
  173. package/lib/crypto/key_passphrase.d.ts +0 -14
  174. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  175. package/lib/crypto/key_passphrase.js +0 -44
  176. package/lib/crypto/key_passphrase.js.map +0 -1
  177. package/lib/crypto/keybackup.d.ts +0 -18
  178. package/lib/crypto/keybackup.d.ts.map +0 -1
  179. package/lib/crypto/keybackup.js +0 -1
  180. package/lib/crypto/keybackup.js.map +0 -1
  181. package/lib/crypto/olmlib.d.ts +0 -129
  182. package/lib/crypto/olmlib.d.ts.map +0 -1
  183. package/lib/crypto/olmlib.js +0 -492
  184. package/lib/crypto/olmlib.js.map +0 -1
  185. package/lib/crypto/recoverykey.d.ts +0 -2
  186. package/lib/crypto/recoverykey.d.ts.map +0 -1
  187. package/lib/crypto/recoverykey.js +0 -19
  188. package/lib/crypto/recoverykey.js.map +0 -1
  189. package/lib/crypto/store/base.d.ts +0 -252
  190. package/lib/crypto/store/base.d.ts.map +0 -1
  191. package/lib/crypto/store/base.js +0 -64
  192. package/lib/crypto/store/base.js.map +0 -1
  193. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  194. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  195. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  196. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  197. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  198. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  199. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  200. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  201. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  202. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  203. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  204. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  205. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  206. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  207. package/lib/crypto/store/memory-crypto-store.js +0 -622
  208. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  209. package/lib/crypto/verification/Base.d.ts +0 -105
  210. package/lib/crypto/verification/Base.d.ts.map +0 -1
  211. package/lib/crypto/verification/Base.js +0 -372
  212. package/lib/crypto/verification/Base.js.map +0 -1
  213. package/lib/crypto/verification/Error.d.ts +0 -35
  214. package/lib/crypto/verification/Error.d.ts.map +0 -1
  215. package/lib/crypto/verification/Error.js +0 -86
  216. package/lib/crypto/verification/Error.js.map +0 -1
  217. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  218. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  219. package/lib/crypto/verification/IllegalMethod.js +0 -43
  220. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  221. package/lib/crypto/verification/QRCode.d.ts +0 -51
  222. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  223. package/lib/crypto/verification/QRCode.js +0 -277
  224. package/lib/crypto/verification/QRCode.js.map +0 -1
  225. package/lib/crypto/verification/SAS.d.ts +0 -27
  226. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  227. package/lib/crypto/verification/SAS.js +0 -485
  228. package/lib/crypto/verification/SAS.js.map +0 -1
  229. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  230. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  231. package/lib/crypto/verification/SASDecimal.js +0 -34
  232. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  233. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  234. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  235. package/lib/crypto/verification/request/Channel.js +0 -1
  236. package/lib/crypto/verification/request/Channel.js.map +0 -1
  237. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  238. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  239. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  240. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  241. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  242. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  243. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  244. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  245. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  246. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  247. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  248. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  249. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  250. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  251. package/lib/crypto-api/CryptoEvent.js +0 -33
  252. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  253. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  254. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  255. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  256. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  257. package/lib/crypto-api/index.d.ts +0 -978
  258. package/lib/crypto-api/index.d.ts.map +0 -1
  259. package/lib/crypto-api/index.js +0 -304
  260. package/lib/crypto-api/index.js.map +0 -1
  261. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  262. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  263. package/lib/crypto-api/key-passphrase.js +0 -51
  264. package/lib/crypto-api/key-passphrase.js.map +0 -1
  265. package/lib/crypto-api/keybackup.d.ts +0 -88
  266. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  267. package/lib/crypto-api/keybackup.js +0 -1
  268. package/lib/crypto-api/keybackup.js.map +0 -1
  269. package/lib/crypto-api/recovery-key.d.ts +0 -11
  270. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  271. package/lib/crypto-api/recovery-key.js +0 -65
  272. package/lib/crypto-api/recovery-key.js.map +0 -1
  273. package/lib/crypto-api/verification.d.ts +0 -344
  274. package/lib/crypto-api/verification.d.ts.map +0 -1
  275. package/lib/crypto-api/verification.js +0 -91
  276. package/lib/crypto-api/verification.js.map +0 -1
  277. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  278. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  279. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  280. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  281. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  282. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  283. package/lib/rendezvous/RendezvousChannel.js +0 -1
  284. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  285. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  286. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  287. package/lib/rendezvous/RendezvousCode.js +0 -1
  288. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  289. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  290. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  291. package/lib/rendezvous/RendezvousError.js +0 -23
  292. package/lib/rendezvous/RendezvousError.js.map +0 -1
  293. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  294. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  295. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  296. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  297. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  298. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  299. package/lib/rendezvous/RendezvousIntent.js +0 -22
  300. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  301. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  302. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  303. package/lib/rendezvous/RendezvousTransport.js +0 -1
  304. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  305. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  306. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  307. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  308. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  309. package/lib/rendezvous/channels/index.d.ts +0 -2
  310. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  311. package/lib/rendezvous/channels/index.js +0 -18
  312. package/lib/rendezvous/channels/index.js.map +0 -1
  313. package/lib/rendezvous/index.d.ts +0 -10
  314. package/lib/rendezvous/index.d.ts.map +0 -1
  315. package/lib/rendezvous/index.js +0 -23
  316. package/lib/rendezvous/index.js.map +0 -1
  317. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  318. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  319. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  320. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  321. package/lib/rendezvous/transports/index.d.ts +0 -2
  322. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  323. package/lib/rendezvous/transports/index.js +0 -18
  324. package/lib/rendezvous/transports/index.js.map +0 -1
  325. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  326. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  327. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  328. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  329. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  330. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  331. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  332. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  333. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  334. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  335. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  336. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  337. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  338. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  339. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  340. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  341. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  342. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  343. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  344. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  345. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  346. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  347. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  348. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  349. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  350. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  351. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  352. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  353. package/lib/rust-crypto/backup.d.ts +0 -254
  354. package/lib/rust-crypto/backup.d.ts.map +0 -1
  355. package/lib/rust-crypto/backup.js +0 -837
  356. package/lib/rust-crypto/backup.js.map +0 -1
  357. package/lib/rust-crypto/constants.d.ts +0 -3
  358. package/lib/rust-crypto/constants.d.ts.map +0 -1
  359. package/lib/rust-crypto/constants.js +0 -19
  360. package/lib/rust-crypto/constants.js.map +0 -1
  361. package/lib/rust-crypto/device-converter.d.ts +0 -28
  362. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  363. package/lib/rust-crypto/device-converter.js +0 -123
  364. package/lib/rust-crypto/device-converter.js.map +0 -1
  365. package/lib/rust-crypto/index.d.ts +0 -61
  366. package/lib/rust-crypto/index.d.ts.map +0 -1
  367. package/lib/rust-crypto/index.js +0 -152
  368. package/lib/rust-crypto/index.js.map +0 -1
  369. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  370. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  371. package/lib/rust-crypto/libolm_migration.js +0 -459
  372. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  373. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  374. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  375. package/lib/rust-crypto/rust-crypto.js +0 -2016
  376. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  377. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  378. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  379. package/lib/rust-crypto/secret-storage.js +0 -63
  380. package/lib/rust-crypto/secret-storage.js.map +0 -1
  381. package/lib/rust-crypto/verification.d.ts +0 -319
  382. package/lib/rust-crypto/verification.d.ts.map +0 -1
  383. package/lib/rust-crypto/verification.js +0 -816
  384. package/lib/rust-crypto/verification.js.map +0 -1
  385. package/lib/secret-storage.d.ts +0 -370
  386. package/lib/secret-storage.d.ts.map +0 -1
  387. package/lib/secret-storage.js +0 -466
  388. package/lib/secret-storage.js.map +0 -1
  389. package/src/@types/crypto.ts +0 -73
  390. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  391. package/src/common-crypto/CryptoBackend.ts +0 -302
  392. package/src/common-crypto/README.md +0 -4
  393. package/src/common-crypto/key-passphrase.ts +0 -43
  394. package/src/crypto/CrossSigning.ts +0 -773
  395. package/src/crypto/DeviceList.ts +0 -989
  396. package/src/crypto/EncryptionSetup.ts +0 -351
  397. package/src/crypto/OlmDevice.ts +0 -1500
  398. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  399. package/src/crypto/RoomList.ts +0 -70
  400. package/src/crypto/SecretSharing.ts +0 -240
  401. package/src/crypto/SecretStorage.ts +0 -136
  402. package/src/crypto/aes.ts +0 -23
  403. package/src/crypto/algorithms/base.ts +0 -236
  404. package/src/crypto/algorithms/index.ts +0 -20
  405. package/src/crypto/algorithms/megolm.ts +0 -2216
  406. package/src/crypto/algorithms/olm.ts +0 -381
  407. package/src/crypto/api.ts +0 -70
  408. package/src/crypto/backup.ts +0 -922
  409. package/src/crypto/crypto.ts +0 -18
  410. package/src/crypto/dehydration.ts +0 -272
  411. package/src/crypto/device-converter.ts +0 -45
  412. package/src/crypto/deviceinfo.ts +0 -158
  413. package/src/crypto/index.ts +0 -4414
  414. package/src/crypto/key_passphrase.ts +0 -42
  415. package/src/crypto/keybackup.ts +0 -47
  416. package/src/crypto/olmlib.ts +0 -539
  417. package/src/crypto/recoverykey.ts +0 -18
  418. package/src/crypto/store/base.ts +0 -348
  419. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  420. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  421. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  422. package/src/crypto/store/memory-crypto-store.ts +0 -680
  423. package/src/crypto/verification/Base.ts +0 -409
  424. package/src/crypto/verification/Error.ts +0 -76
  425. package/src/crypto/verification/IllegalMethod.ts +0 -50
  426. package/src/crypto/verification/QRCode.ts +0 -310
  427. package/src/crypto/verification/SAS.ts +0 -494
  428. package/src/crypto/verification/SASDecimal.ts +0 -37
  429. package/src/crypto/verification/request/Channel.ts +0 -34
  430. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  431. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  432. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  433. package/src/crypto-api/CryptoEvent.ts +0 -93
  434. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  435. package/src/crypto-api/index.ts +0 -1175
  436. package/src/crypto-api/key-passphrase.ts +0 -58
  437. package/src/crypto-api/keybackup.ts +0 -115
  438. package/src/crypto-api/recovery-key.ts +0 -69
  439. package/src/crypto-api/verification.ts +0 -408
  440. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  441. package/src/rendezvous/RendezvousChannel.ts +0 -48
  442. package/src/rendezvous/RendezvousCode.ts +0 -25
  443. package/src/rendezvous/RendezvousError.ts +0 -26
  444. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  445. package/src/rendezvous/RendezvousIntent.ts +0 -20
  446. package/src/rendezvous/RendezvousTransport.ts +0 -58
  447. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  448. package/src/rendezvous/channels/index.ts +0 -17
  449. package/src/rendezvous/index.ts +0 -25
  450. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  451. package/src/rendezvous/transports/index.ts +0 -17
  452. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  453. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  454. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  455. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  456. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  457. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  458. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  459. package/src/rust-crypto/backup.ts +0 -881
  460. package/src/rust-crypto/constants.ts +0 -18
  461. package/src/rust-crypto/device-converter.ts +0 -128
  462. package/src/rust-crypto/index.ts +0 -237
  463. package/src/rust-crypto/libolm_migration.ts +0 -530
  464. package/src/rust-crypto/rust-crypto.ts +0 -2205
  465. package/src/rust-crypto/secret-storage.ts +0 -60
  466. package/src/rust-crypto/verification.ts +0 -830
  467. package/src/secret-storage.ts +0 -693
@@ -1,830 +0,0 @@
1
- /*
2
- Copyright 2023 The Matrix.org Foundation C.I.C.
3
-
4
- Licensed under the Apache License, Version 2.0 (the "License");
5
- you may not use this file except in compliance with the License.
6
- You may obtain a copy of the License at
7
-
8
- http://www.apache.org/licenses/LICENSE-2.0
9
-
10
- Unless required by applicable law or agreed to in writing, software
11
- distributed under the License is distributed on an "AS IS" BASIS,
12
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- See the License for the specific language governing permissions and
14
- limitations under the License.
15
- */
16
-
17
- import * as RustSdkCryptoJs from "@matrix-org/matrix-sdk-crypto-wasm";
18
- import { QrState } from "@matrix-org/matrix-sdk-crypto-wasm";
19
-
20
- import {
21
- GeneratedSas,
22
- ShowQrCodeCallbacks,
23
- ShowSasCallbacks,
24
- VerificationPhase,
25
- VerificationRequest,
26
- VerificationRequestEvent,
27
- VerificationRequestEventHandlerMap,
28
- Verifier,
29
- VerifierEvent,
30
- VerifierEventHandlerMap,
31
- } from "../crypto-api/verification.ts";
32
- import { TypedEventEmitter } from "../models/typed-event-emitter.ts";
33
- import { OutgoingRequest, OutgoingRequestProcessor } from "./OutgoingRequestProcessor.ts";
34
- import { TypedReEmitter } from "../ReEmitter.ts";
35
- import { MatrixEvent } from "../models/event.ts";
36
- import { EventType, MsgType } from "../@types/event.ts";
37
- import { defer, IDeferred } from "../utils.ts";
38
- import { VerificationMethod } from "../types.ts";
39
-
40
- /**
41
- * An incoming, or outgoing, request to verify a user or a device via cross-signing.
42
- *
43
- * @internal
44
- */
45
- export class RustVerificationRequest
46
- extends TypedEventEmitter<VerificationRequestEvent, VerificationRequestEventHandlerMap>
47
- implements VerificationRequest
48
- {
49
- /** a reëmitter which relays VerificationRequestEvent.Changed events emitted by the verifier */
50
- private readonly reEmitter: TypedReEmitter<VerificationRequestEvent, VerificationRequestEventHandlerMap>;
51
-
52
- /** Are we in the process of sending an `m.key.verification.ready` event? */
53
- private _accepting = false;
54
-
55
- /** Are we in the process of sending an `m.key.verification.cancellation` event? */
56
- private _cancelling = false;
57
-
58
- private _verifier: undefined | RustSASVerifier | RustQrCodeVerifier;
59
-
60
- /**
61
- * Construct a new RustVerificationRequest to wrap the rust-level `VerificationRequest`.
62
- *
63
- * @param olmMachine - The `OlmMachine` from the underlying rust crypto sdk.
64
- * @param inner - VerificationRequest from the Rust SDK.
65
- * @param outgoingRequestProcessor - `OutgoingRequestProcessor` to use for making outgoing HTTP requests.
66
- * @param supportedVerificationMethods - Verification methods to use when `accept()` is called.
67
- */
68
- public constructor(
69
- private readonly olmMachine: RustSdkCryptoJs.OlmMachine,
70
- private readonly inner: RustSdkCryptoJs.VerificationRequest,
71
- private readonly outgoingRequestProcessor: OutgoingRequestProcessor,
72
- private readonly supportedVerificationMethods: string[],
73
- ) {
74
- super();
75
- this.reEmitter = new TypedReEmitter(this);
76
-
77
- // Obviously, the Rust object maintains a reference to the callback function. If the callback function maintains
78
- // a reference to the Rust object, then we have a reference cycle which means that `RustVerificationRequest`
79
- // will never be garbage-collected, and hence the underlying rust object will never be freed.
80
- //
81
- // To avoid this reference cycle, use a weak reference in the callback function. If the `RustVerificationRequest`
82
- // gets garbage-collected, then there is nothing to update!
83
- const weakThis = new WeakRef(this);
84
- inner.registerChangesCallback(async () => weakThis.deref()?.onChange());
85
- }
86
-
87
- /**
88
- * Hook which is called when the underlying rust class notifies us that there has been a change.
89
- */
90
- private onChange(): void {
91
- const verification: RustSdkCryptoJs.Qr | RustSdkCryptoJs.Sas | undefined = this.inner.getVerification();
92
-
93
- // Set the _verifier object (wrapping the rust `Verification` as a js-sdk Verifier) if:
94
- // - we now have a `Verification` where we lacked one before
95
- // - we have transitioned from QR to SAS
96
- // - we are verifying with SAS, but we need to replace our verifier with a new one because both parties
97
- // tried to start verification at the same time, and we lost the tie breaking
98
- if (verification instanceof RustSdkCryptoJs.Sas) {
99
- if (this._verifier === undefined || this._verifier instanceof RustQrCodeVerifier) {
100
- this.setVerifier(new RustSASVerifier(verification, this, this.outgoingRequestProcessor));
101
- } else if (this._verifier instanceof RustSASVerifier) {
102
- this._verifier.replaceInner(verification);
103
- }
104
- } else if (verification instanceof RustSdkCryptoJs.Qr && this._verifier === undefined) {
105
- this.setVerifier(new RustQrCodeVerifier(verification, this.outgoingRequestProcessor));
106
- }
107
-
108
- this.emit(VerificationRequestEvent.Change);
109
- }
110
-
111
- private setVerifier(verifier: RustSASVerifier | RustQrCodeVerifier): void {
112
- // if we already have a verifier, unsubscribe from its events
113
- if (this._verifier) {
114
- this.reEmitter.stopReEmitting(this._verifier, [VerificationRequestEvent.Change]);
115
- }
116
- this._verifier = verifier;
117
- this.reEmitter.reEmit(this._verifier, [VerificationRequestEvent.Change]);
118
- }
119
-
120
- /**
121
- * Unique ID for this verification request.
122
- *
123
- * An ID isn't assigned until the first message is sent, so this may be `undefined` in the early phases.
124
- */
125
- public get transactionId(): string | undefined {
126
- return this.inner.flowId;
127
- }
128
-
129
- /**
130
- * For an in-room verification, the ID of the room.
131
- *
132
- * For to-device verifications, `undefined`.
133
- */
134
- public get roomId(): string | undefined {
135
- return this.inner.roomId?.toString();
136
- }
137
-
138
- /**
139
- * True if this request was initiated by the local client.
140
- *
141
- * For in-room verifications, the initiator is who sent the `m.key.verification.request` event.
142
- * For to-device verifications, the initiator is who sent the `m.key.verification.start` event.
143
- */
144
- public get initiatedByMe(): boolean {
145
- return this.inner.weStarted();
146
- }
147
-
148
- /** The user id of the other party in this request */
149
- public get otherUserId(): string {
150
- return this.inner.otherUserId.toString();
151
- }
152
-
153
- /** For verifications via to-device messages: the ID of the other device. Otherwise, undefined. */
154
- public get otherDeviceId(): string | undefined {
155
- return this.inner.otherDeviceId?.toString();
156
- }
157
-
158
- /** Get the other device involved in the verification, if it is known */
159
- private async getOtherDevice(): Promise<undefined | RustSdkCryptoJs.Device> {
160
- const otherDeviceId = this.inner.otherDeviceId;
161
- if (!otherDeviceId) {
162
- return undefined;
163
- }
164
- return await this.olmMachine.getDevice(this.inner.otherUserId, otherDeviceId, 5);
165
- }
166
-
167
- /** True if the other party in this request is one of this user's own devices. */
168
- public get isSelfVerification(): boolean {
169
- return this.inner.isSelfVerification();
170
- }
171
-
172
- /** current phase of the request. */
173
- public get phase(): VerificationPhase {
174
- const phase = this.inner.phase();
175
-
176
- switch (phase) {
177
- case RustSdkCryptoJs.VerificationRequestPhase.Created:
178
- case RustSdkCryptoJs.VerificationRequestPhase.Requested:
179
- return VerificationPhase.Requested;
180
- case RustSdkCryptoJs.VerificationRequestPhase.Ready:
181
- // if we're still sending the `m.key.verification.ready`, that counts as "Requested" in the js-sdk's
182
- // parlance.
183
- return this._accepting ? VerificationPhase.Requested : VerificationPhase.Ready;
184
- case RustSdkCryptoJs.VerificationRequestPhase.Transitioned:
185
- if (!this._verifier) {
186
- // this shouldn't happen, because the onChange handler should have created a _verifier.
187
- throw new Error("VerificationRequest: inner phase == Transitioned but no verifier!");
188
- }
189
- return this._verifier.verificationPhase;
190
- case RustSdkCryptoJs.VerificationRequestPhase.Done:
191
- return VerificationPhase.Done;
192
- case RustSdkCryptoJs.VerificationRequestPhase.Cancelled:
193
- return VerificationPhase.Cancelled;
194
- }
195
-
196
- throw new Error(`Unknown verification phase ${phase}`);
197
- }
198
-
199
- /** True if the request has sent its initial event and needs more events to complete
200
- * (ie it is in phase `Requested`, `Ready` or `Started`).
201
- */
202
- public get pending(): boolean {
203
- if (this.inner.isPassive()) return false;
204
- const phase = this.phase;
205
- return phase !== VerificationPhase.Done && phase !== VerificationPhase.Cancelled;
206
- }
207
-
208
- /**
209
- * True if we have started the process of sending an `m.key.verification.ready` (but have not necessarily received
210
- * the remote echo which causes a transition to {@link VerificationPhase.Ready}.
211
- */
212
- public get accepting(): boolean {
213
- return this._accepting;
214
- }
215
-
216
- /**
217
- * True if we have started the process of sending an `m.key.verification.cancel` (but have not necessarily received
218
- * the remote echo which causes a transition to {@link VerificationPhase.Cancelled}).
219
- */
220
- public get declining(): boolean {
221
- return this._cancelling;
222
- }
223
-
224
- /**
225
- * The remaining number of ms before the request will be automatically cancelled.
226
- *
227
- * `null` indicates that there is no timeout
228
- */
229
- public get timeout(): number | null {
230
- return this.inner.timeRemainingMillis();
231
- }
232
-
233
- /** once the phase is Started (and !initiatedByMe) or Ready: common methods supported by both sides */
234
- public get methods(): string[] {
235
- throw new Error("not implemented");
236
- }
237
-
238
- /** the method picked in the .start event */
239
- public get chosenMethod(): string | null {
240
- if (this.phase !== VerificationPhase.Started) return null;
241
-
242
- const verification: RustSdkCryptoJs.Qr | RustSdkCryptoJs.Sas | undefined = this.inner.getVerification();
243
- if (verification instanceof RustSdkCryptoJs.Sas) {
244
- return VerificationMethod.Sas;
245
- } else if (verification instanceof RustSdkCryptoJs.Qr) {
246
- return VerificationMethod.Reciprocate;
247
- } else {
248
- return null;
249
- }
250
- }
251
-
252
- /**
253
- * Checks whether the other party supports a given verification method.
254
- * This is useful when setting up the QR code UI, as it is somewhat asymmetrical:
255
- * if the other party supports SCAN_QR, we should show a QR code in the UI, and vice versa.
256
- * For methods that need to be supported by both ends, use the `methods` property.
257
- *
258
- * @param method - the method to check
259
- * @returns true if the other party said they supported the method
260
- */
261
- public otherPartySupportsMethod(method: string): boolean {
262
- const theirMethods: RustSdkCryptoJs.VerificationMethod[] | undefined = this.inner.theirSupportedMethods;
263
- if (theirMethods === undefined) {
264
- // no message from the other side yet
265
- return false;
266
- }
267
-
268
- const requiredMethod = verificationMethodsByIdentifier[method];
269
- return theirMethods.some((m) => m === requiredMethod);
270
- }
271
-
272
- /**
273
- * Accepts the request, sending a .ready event to the other party
274
- *
275
- * @returns Promise which resolves when the event has been sent.
276
- */
277
- public async accept(): Promise<void> {
278
- if (this.inner.phase() !== RustSdkCryptoJs.VerificationRequestPhase.Requested || this._accepting) {
279
- throw new Error(`Cannot accept a verification request in phase ${this.phase}`);
280
- }
281
-
282
- this._accepting = true;
283
- try {
284
- const req: undefined | OutgoingRequest = this.inner.acceptWithMethods(
285
- this.supportedVerificationMethods.map(verificationMethodIdentifierToMethod),
286
- );
287
- if (req) {
288
- await this.outgoingRequestProcessor.makeOutgoingRequest(req);
289
- }
290
- } finally {
291
- this._accepting = false;
292
- }
293
-
294
- // phase may have changed, so emit a 'change' event
295
- this.emit(VerificationRequestEvent.Change);
296
- }
297
-
298
- /**
299
- * Cancels the request, sending a cancellation to the other party
300
- *
301
- * @param params - Details for the cancellation, including `reason` (defaults to "User declined"), and `code`
302
- * (defaults to `m.user`).
303
- *
304
- * @returns Promise which resolves when the event has been sent.
305
- */
306
- public async cancel(params?: { reason?: string; code?: string }): Promise<void> {
307
- if (this._cancelling) {
308
- // already cancelling; do nothing
309
- return;
310
- }
311
-
312
- this._cancelling = true;
313
- try {
314
- const req: undefined | OutgoingRequest = this.inner.cancel();
315
- if (req) {
316
- await this.outgoingRequestProcessor.makeOutgoingRequest(req);
317
- }
318
- } finally {
319
- this._cancelling = false;
320
- }
321
- }
322
-
323
- /**
324
- * Create a {@link Verifier} to do this verification via a particular method.
325
- *
326
- * If a verifier has already been created for this request, returns that verifier.
327
- *
328
- * This does *not* send the `m.key.verification.start` event - to do so, call {@link Verifier#verifier} on the
329
- * returned verifier.
330
- *
331
- * If no previous events have been sent, pass in `targetDevice` to set who to direct this request to.
332
- *
333
- * @param method - the name of the verification method to use.
334
- * @param targetDevice - details of where to send the request to.
335
- *
336
- * @returns The verifier which will do the actual verification.
337
- */
338
- public beginKeyVerification(method: string, targetDevice?: { userId?: string; deviceId?: string }): Verifier {
339
- throw new Error("not implemented");
340
- }
341
-
342
- /**
343
- * Send an `m.key.verification.start` event to start verification via a particular method.
344
- *
345
- * Implementation of {@link Crypto.VerificationRequest#startVerification}.
346
- *
347
- * @param method - the name of the verification method to use.
348
- */
349
- public async startVerification(method: string): Promise<Verifier> {
350
- if (method !== VerificationMethod.Sas) {
351
- throw new Error(`Unsupported verification method ${method}`);
352
- }
353
-
354
- // make sure that we have a list of the other user's devices (workaround https://github.com/matrix-org/matrix-rust-sdk/issues/2896)
355
- if (!(await this.getOtherDevice())) {
356
- throw new Error("startVerification(): other device is unknown");
357
- }
358
-
359
- const res:
360
- | [RustSdkCryptoJs.Sas, RustSdkCryptoJs.RoomMessageRequest | RustSdkCryptoJs.ToDeviceRequest]
361
- | undefined = await this.inner.startSas();
362
-
363
- if (res) {
364
- const [, req] = res;
365
- await this.outgoingRequestProcessor.makeOutgoingRequest(req);
366
- }
367
-
368
- // this should have triggered the onChange callback, and we should now have a verifier
369
- if (!this._verifier) {
370
- throw new Error("Still no verifier after startSas() call");
371
- }
372
-
373
- return this._verifier;
374
- }
375
-
376
- /**
377
- * Start a QR code verification by providing a scanned QR code for this verification flow.
378
- *
379
- * Implementation of {@link Crypto.VerificationRequest#scanQRCode}.
380
- *
381
- * @param qrCodeData - the decoded QR code.
382
- * @returns A verifier; call `.verify()` on it to wait for the other side to complete the verification flow.
383
- */
384
- public async scanQRCode(uint8Array: Uint8Array): Promise<Verifier> {
385
- const scan = RustSdkCryptoJs.QrCodeScan.fromBytes(new Uint8ClampedArray(uint8Array));
386
- const verifier: RustSdkCryptoJs.Qr = await this.inner.scanQrCode(scan);
387
-
388
- // this should have triggered the onChange callback, and we should now have a verifier
389
- if (!this._verifier) {
390
- throw new Error("Still no verifier after scanQrCode() call");
391
- }
392
-
393
- // we can immediately trigger the reciprocate request
394
- const req: undefined | OutgoingRequest = verifier.reciprocate();
395
- if (req) {
396
- await this.outgoingRequestProcessor.makeOutgoingRequest(req);
397
- }
398
-
399
- return this._verifier;
400
- }
401
-
402
- /**
403
- * The verifier which is doing the actual verification, once the method has been established.
404
- * Only defined when the `phase` is Started.
405
- */
406
- public get verifier(): Verifier | undefined {
407
- // It's possible for us to have a Verifier before a method has been chosen (in particular,
408
- // if we are showing a QR code which the other device has not yet scanned. At that point, we could
409
- // still switch to SAS).
410
- //
411
- // In that case, we should not return it to the application yet, since the application will not expect the
412
- // Verifier to be replaced during the lifetime of the VerificationRequest.
413
- return this.phase === VerificationPhase.Started ? this._verifier : undefined;
414
- }
415
-
416
- /**
417
- * Stub implementation of {@link Crypto.VerificationRequest#getQRCodeBytes}.
418
- */
419
- public getQRCodeBytes(): Buffer | undefined {
420
- throw new Error("getQRCodeBytes() unsupported in Rust Crypto; use generateQRCode() instead.");
421
- }
422
-
423
- /**
424
- * Generate the data for a QR code allowing the other device to verify this one, if it supports it.
425
- *
426
- * Implementation of {@link Crypto.VerificationRequest#generateQRCode}.
427
- */
428
- public async generateQRCode(): Promise<Buffer | undefined> {
429
- // make sure that we have a list of the other user's devices (workaround https://github.com/matrix-org/matrix-rust-sdk/issues/2896)
430
- if (!(await this.getOtherDevice())) {
431
- throw new Error("generateQRCode(): other device is unknown");
432
- }
433
-
434
- const innerVerifier: RustSdkCryptoJs.Qr | undefined = await this.inner.generateQrCode();
435
- // If we are unable to generate a QRCode, we return undefined
436
- if (!innerVerifier) return;
437
-
438
- return Buffer.from(innerVerifier.toBytes());
439
- }
440
-
441
- /**
442
- * If this request has been cancelled, the cancellation code (e.g `m.user`) which is responsible for cancelling
443
- * this verification.
444
- */
445
- public get cancellationCode(): string | null {
446
- return this.inner.cancelInfo?.cancelCode() ?? null;
447
- }
448
-
449
- /**
450
- * The id of the user that cancelled the request.
451
- *
452
- * Only defined when phase is Cancelled
453
- */
454
- public get cancellingUserId(): string | undefined {
455
- const cancelInfo = this.inner.cancelInfo;
456
- if (!cancelInfo) {
457
- return undefined;
458
- } else if (cancelInfo.cancelledbyUs()) {
459
- return this.olmMachine.userId.toString();
460
- } else {
461
- return this.inner.otherUserId.toString();
462
- }
463
- }
464
- }
465
-
466
- /** Common base class for `Verifier` implementations which wrap rust classes.
467
- *
468
- * The generic parameter `InnerType` is the type of the rust Verification class which we wrap.
469
- *
470
- * @internal
471
- */
472
- abstract class BaseRustVerifer<InnerType extends RustSdkCryptoJs.Qr | RustSdkCryptoJs.Sas> extends TypedEventEmitter<
473
- VerifierEvent | VerificationRequestEvent,
474
- VerifierEventHandlerMap & VerificationRequestEventHandlerMap
475
- > {
476
- /** A deferred which completes when the verification completes (or rejects when it is cancelled/fails) */
477
- protected readonly completionDeferred: IDeferred<void>;
478
-
479
- public constructor(
480
- protected inner: InnerType,
481
- protected readonly outgoingRequestProcessor: OutgoingRequestProcessor,
482
- ) {
483
- super();
484
-
485
- this.completionDeferred = defer();
486
-
487
- // As with RustVerificationRequest, we need to avoid a reference cycle.
488
- // See the comments in RustVerificationRequest.
489
- const weakThis = new WeakRef(this);
490
- inner.registerChangesCallback(async () => weakThis.deref()?.onChange());
491
-
492
- // stop the runtime complaining if nobody catches a failure
493
- this.completionDeferred.promise.catch(() => null);
494
- }
495
-
496
- /**
497
- * Hook which is called when the underlying rust class notifies us that there has been a change.
498
- *
499
- * Can be overridden by subclasses to see if we can notify the application about an update. The overriding method
500
- * must call `super.onChange()`.
501
- */
502
- protected onChange(): void {
503
- if (this.inner.isDone()) {
504
- this.completionDeferred.resolve(undefined);
505
- } else if (this.inner.isCancelled()) {
506
- const cancelInfo = this.inner.cancelInfo()!;
507
- this.completionDeferred.reject(
508
- new Error(
509
- `Verification cancelled by ${
510
- cancelInfo.cancelledbyUs() ? "us" : "them"
511
- } with code ${cancelInfo.cancelCode()}: ${cancelInfo.reason()}`,
512
- ),
513
- );
514
- }
515
-
516
- this.emit(VerificationRequestEvent.Change);
517
- }
518
-
519
- /**
520
- * Returns true if the verification has been cancelled, either by us or the other side.
521
- */
522
- public get hasBeenCancelled(): boolean {
523
- return this.inner.isCancelled();
524
- }
525
-
526
- /**
527
- * The ID of the other user in the verification process.
528
- */
529
- public get userId(): string {
530
- return this.inner.otherUserId.toString();
531
- }
532
-
533
- /**
534
- * Cancel a verification.
535
- *
536
- * We will send an `m.key.verification.cancel` if the verification is still in flight. The verification promise
537
- * will reject, and a {@link Crypto.VerifierEvent#Cancel} will be emitted.
538
- *
539
- * @param e - the reason for the cancellation.
540
- */
541
- public cancel(e?: Error): void {
542
- // TODO: something with `e`
543
- const req: undefined | OutgoingRequest = this.inner.cancel();
544
- if (req) {
545
- this.outgoingRequestProcessor.makeOutgoingRequest(req);
546
- }
547
- }
548
-
549
- /**
550
- * Get the details for an SAS verification, if one is in progress
551
- *
552
- * Returns `null`, unless this verifier is for a SAS-based verification and we are waiting for the user to confirm
553
- * the SAS matches.
554
- */
555
- public getShowSasCallbacks(): ShowSasCallbacks | null {
556
- return null;
557
- }
558
-
559
- /**
560
- * Get the details for reciprocating QR code verification, if one is in progress
561
- *
562
- * Returns `null`, unless this verifier is for reciprocating a QR-code-based verification (ie, the other user has
563
- * already scanned our QR code), and we are waiting for the user to confirm.
564
- */
565
- public getReciprocateQrCodeCallbacks(): ShowQrCodeCallbacks | null {
566
- return null;
567
- }
568
- }
569
-
570
- /** A Verifier instance which is used to show and/or scan a QR code. */
571
- export class RustQrCodeVerifier extends BaseRustVerifer<RustSdkCryptoJs.Qr> implements Verifier {
572
- private callbacks: ShowQrCodeCallbacks | null = null;
573
-
574
- public constructor(inner: RustSdkCryptoJs.Qr, outgoingRequestProcessor: OutgoingRequestProcessor) {
575
- super(inner, outgoingRequestProcessor);
576
- }
577
-
578
- protected onChange(): void {
579
- // if the other side has scanned our QR code and sent us a "reciprocate" message, it is now time for the
580
- // application to prompt the user to confirm their side.
581
- if (this.callbacks === null && this.inner.hasBeenScanned()) {
582
- this.callbacks = {
583
- confirm: (): void => {
584
- this.confirmScanning();
585
- },
586
- cancel: (): void => this.cancel(),
587
- };
588
- }
589
-
590
- super.onChange();
591
- }
592
-
593
- /**
594
- * Start the key verification, if it has not already been started.
595
- *
596
- * @returns Promise which resolves when the verification has completed, or rejects if the verification is cancelled
597
- * or times out.
598
- */
599
- public async verify(): Promise<void> {
600
- // Some applications (hello, matrix-react-sdk) may not check if there is a `ShowQrCodeCallbacks` and instead
601
- // register a `ShowReciprocateQr` listener which they expect to be called once `.verify` is called.
602
- if (this.callbacks !== null) {
603
- this.emit(VerifierEvent.ShowReciprocateQr, this.callbacks);
604
- }
605
- // Nothing to do here but wait.
606
- await this.completionDeferred.promise;
607
- }
608
-
609
- /**
610
- * Calculate an appropriate VerificationPhase for a VerificationRequest where this is the verifier.
611
- *
612
- * This is abnormally complicated because a rust-side QR Code verifier can span several verification phases.
613
- */
614
- public get verificationPhase(): VerificationPhase {
615
- switch (this.inner.state()) {
616
- case QrState.Created:
617
- // we have created a QR for display; neither side has yet sent an `m.key.verification.start`.
618
- return VerificationPhase.Ready;
619
- case QrState.Scanned:
620
- // other side has scanned our QR and sent an `m.key.verification.start` with `m.reciprocate.v1`
621
- return VerificationPhase.Started;
622
- case QrState.Confirmed:
623
- // we have confirmed the other side's scan and sent an `m.key.verification.done`.
624
- //
625
- // However, the verification is not yet "Done", because we have to wait until we have received the
626
- // `m.key.verification.done` from the other side (in particular, we don't mark the device/identity as
627
- // verified until that happens). If we return "Done" too soon, we risk the user cancelling the flow.
628
- return VerificationPhase.Started;
629
- case QrState.Reciprocated:
630
- // although the rust SDK doesn't immediately send the `m.key.verification.start` on transition into this
631
- // state, `RustVerificationRequest.scanQrCode` immediately calls `reciprocate()` and does so, so in practice
632
- // we can treat the two the same.
633
- return VerificationPhase.Started;
634
- case QrState.Done:
635
- return VerificationPhase.Done;
636
- case QrState.Cancelled:
637
- return VerificationPhase.Cancelled;
638
- default:
639
- throw new Error(`Unknown qr code state ${this.inner.state()}`);
640
- }
641
- }
642
-
643
- /**
644
- * Get the details for reciprocating QR code verification, if one is in progress
645
- *
646
- * Returns `null`, unless this verifier is for reciprocating a QR-code-based verification (ie, the other user has
647
- * already scanned our QR code), and we are waiting for the user to confirm.
648
- */
649
- public getReciprocateQrCodeCallbacks(): ShowQrCodeCallbacks | null {
650
- return this.callbacks;
651
- }
652
-
653
- private async confirmScanning(): Promise<void> {
654
- const req: undefined | OutgoingRequest = this.inner.confirmScanning();
655
- if (req) {
656
- await this.outgoingRequestProcessor.makeOutgoingRequest(req);
657
- }
658
- }
659
- }
660
-
661
- /** A Verifier instance which is used if we are exchanging emojis */
662
- export class RustSASVerifier extends BaseRustVerifer<RustSdkCryptoJs.Sas> implements Verifier {
663
- private callbacks: ShowSasCallbacks | null = null;
664
-
665
- public constructor(
666
- inner: RustSdkCryptoJs.Sas,
667
- _verificationRequest: RustVerificationRequest,
668
- outgoingRequestProcessor: OutgoingRequestProcessor,
669
- ) {
670
- super(inner, outgoingRequestProcessor);
671
- }
672
-
673
- /**
674
- * Start the key verification, if it has not already been started.
675
- *
676
- * This means sending a `m.key.verification.start` if we are the first responder, or a `m.key.verification.accept`
677
- * if the other side has already sent a start event.
678
- *
679
- * @returns Promise which resolves when the verification has completed, or rejects if the verification is cancelled
680
- * or times out.
681
- */
682
- public async verify(): Promise<void> {
683
- await this.sendAccept();
684
- await this.completionDeferred.promise;
685
- }
686
-
687
- /**
688
- * Send the accept or start event, if it hasn't already been sent
689
- */
690
- private async sendAccept(): Promise<void> {
691
- const req: undefined | OutgoingRequest = this.inner.accept();
692
- if (req) {
693
- await this.outgoingRequestProcessor.makeOutgoingRequest(req);
694
- }
695
- }
696
-
697
- /** if we can now show the callbacks, do so */
698
- protected onChange(): void {
699
- super.onChange();
700
-
701
- if (this.callbacks === null) {
702
- const emoji = this.inner.emoji();
703
- const decimal = this.inner.decimals();
704
-
705
- if (emoji === undefined && decimal === undefined) {
706
- return;
707
- }
708
-
709
- const sas: GeneratedSas = {};
710
- if (emoji) {
711
- sas.emoji = emoji.map((e) => [e.symbol, e.description]);
712
- }
713
- if (decimal) {
714
- sas.decimal = [decimal[0], decimal[1], decimal[2]];
715
- }
716
-
717
- this.callbacks = {
718
- sas,
719
- confirm: async (): Promise<void> => {
720
- const requests: Array<OutgoingRequest> = await this.inner.confirm();
721
- for (const m of requests) {
722
- await this.outgoingRequestProcessor.makeOutgoingRequest(m);
723
- }
724
- },
725
- mismatch: (): void => {
726
- const request = this.inner.cancelWithCode("m.mismatched_sas");
727
- if (request) {
728
- this.outgoingRequestProcessor.makeOutgoingRequest(request);
729
- }
730
- },
731
- cancel: (): void => {
732
- const request = this.inner.cancelWithCode("m.user");
733
- if (request) {
734
- this.outgoingRequestProcessor.makeOutgoingRequest(request);
735
- }
736
- },
737
- };
738
- this.emit(VerifierEvent.ShowSas, this.callbacks);
739
- }
740
- }
741
-
742
- /**
743
- * Calculate an appropriate VerificationPhase for a VerificationRequest where this is the verifier.
744
- */
745
- public get verificationPhase(): VerificationPhase {
746
- return VerificationPhase.Started;
747
- }
748
-
749
- /**
750
- * Get the details for an SAS verification, if one is in progress
751
- *
752
- * Returns `null`, unless this verifier is for a SAS-based verification and we are waiting for the user to confirm
753
- * the SAS matches.
754
- */
755
- public getShowSasCallbacks(): ShowSasCallbacks | null {
756
- return this.callbacks;
757
- }
758
-
759
- /**
760
- * Replace the inner Rust verifier with a different one.
761
- *
762
- * @param inner - the new Rust verifier
763
- * @internal
764
- */
765
- public replaceInner(inner: RustSdkCryptoJs.Sas): void {
766
- if (this.inner != inner) {
767
- this.inner = inner;
768
-
769
- // As with RustVerificationRequest, we need to avoid a reference cycle.
770
- // See the comments in RustVerificationRequest.
771
- const weakThis = new WeakRef(this);
772
- inner.registerChangesCallback(async () => weakThis.deref()?.onChange());
773
-
774
- // replaceInner will only get called if we started the verification at the same time as the other side, and we lost
775
- // the tie breaker. So we need to re-accept their verification.
776
- this.sendAccept();
777
- this.onChange();
778
- }
779
- }
780
- }
781
-
782
- /** For each specced verification method, the rust-side `VerificationMethod` corresponding to it */
783
- const verificationMethodsByIdentifier: Record<string, RustSdkCryptoJs.VerificationMethod> = {
784
- [VerificationMethod.Sas]: RustSdkCryptoJs.VerificationMethod.SasV1,
785
- [VerificationMethod.ScanQrCode]: RustSdkCryptoJs.VerificationMethod.QrCodeScanV1,
786
- [VerificationMethod.ShowQrCode]: RustSdkCryptoJs.VerificationMethod.QrCodeShowV1,
787
- [VerificationMethod.Reciprocate]: RustSdkCryptoJs.VerificationMethod.ReciprocateV1,
788
- };
789
-
790
- /**
791
- * Convert a specced verification method identifier into a rust-side `VerificationMethod`.
792
- *
793
- * @param method - specced method identifier, for example `m.sas.v1`.
794
- * @returns Rust-side `VerificationMethod` corresponding to `method`.
795
- * @throws An error if the method is unknown.
796
- *
797
- * @internal
798
- */
799
- export function verificationMethodIdentifierToMethod(method: string): RustSdkCryptoJs.VerificationMethod {
800
- const meth = verificationMethodsByIdentifier[method];
801
- if (meth === undefined) {
802
- throw new Error(`Unknown verification method ${method}`);
803
- }
804
- return meth;
805
- }
806
-
807
- /**
808
- * Return true if the event's type matches that of an in-room verification event
809
- *
810
- * @param event - MatrixEvent
811
- * @returns
812
- *
813
- * @internal
814
- */
815
- export function isVerificationEvent(event: MatrixEvent): boolean {
816
- switch (event.getType()) {
817
- case EventType.KeyVerificationCancel:
818
- case EventType.KeyVerificationDone:
819
- case EventType.KeyVerificationMac:
820
- case EventType.KeyVerificationStart:
821
- case EventType.KeyVerificationKey:
822
- case EventType.KeyVerificationReady:
823
- case EventType.KeyVerificationAccept:
824
- return true;
825
- case EventType.RoomMessage:
826
- return event.getContent().msgtype === MsgType.KeyVerificationRequest;
827
- default:
828
- return false;
829
- }
830
- }