@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (492) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/global.d.js +0 -2
  3. package/lib/@types/global.d.js.map +1 -1
  4. package/lib/browser-index.d.ts.map +1 -1
  5. package/lib/browser-index.js +0 -11
  6. package/lib/browser-index.js.map +1 -1
  7. package/lib/client.d.ts +2 -1221
  8. package/lib/client.d.ts.map +1 -1
  9. package/lib/client.js +331 -2821
  10. package/lib/client.js.map +1 -1
  11. package/lib/embedded.d.ts +0 -22
  12. package/lib/embedded.d.ts.map +1 -1
  13. package/lib/embedded.js +24 -166
  14. package/lib/embedded.js.map +1 -1
  15. package/lib/event-mapper.d.ts.map +1 -1
  16. package/lib/event-mapper.js +0 -4
  17. package/lib/event-mapper.js.map +1 -1
  18. package/lib/matrix.d.ts +0 -19
  19. package/lib/matrix.d.ts.map +1 -1
  20. package/lib/matrix.js +1 -26
  21. package/lib/matrix.js.map +1 -1
  22. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  23. package/lib/models/MSC3089Branch.js +0 -3
  24. package/lib/models/MSC3089Branch.js.map +1 -1
  25. package/lib/models/event.d.ts +0 -94
  26. package/lib/models/event.d.ts.map +1 -1
  27. package/lib/models/event.js +0 -274
  28. package/lib/models/event.js.map +1 -1
  29. package/lib/models/poll.d.ts.map +1 -1
  30. package/lib/models/poll.js +1 -5
  31. package/lib/models/poll.js.map +1 -1
  32. package/lib/models/relations-container.d.ts.map +1 -1
  33. package/lib/models/relations-container.js +1 -7
  34. package/lib/models/relations-container.js.map +1 -1
  35. package/lib/models/relations.d.ts +0 -1
  36. package/lib/models/relations.d.ts.map +1 -1
  37. package/lib/models/relations.js +0 -8
  38. package/lib/models/relations.js.map +1 -1
  39. package/lib/models/room-state.d.ts.map +1 -1
  40. package/lib/models/room-state.js +10 -26
  41. package/lib/models/room-state.js.map +1 -1
  42. package/lib/models/room.d.ts +0 -18
  43. package/lib/models/room.d.ts.map +1 -1
  44. package/lib/models/room.js +94 -148
  45. package/lib/models/room.js.map +1 -1
  46. package/lib/models/thread.d.ts.map +1 -1
  47. package/lib/models/thread.js +0 -1
  48. package/lib/models/thread.js.map +1 -1
  49. package/lib/sliding-sync-sdk.d.ts +2 -3
  50. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  51. package/lib/sliding-sync-sdk.js +41 -90
  52. package/lib/sliding-sync-sdk.js.map +1 -1
  53. package/lib/sync.d.ts +0 -12
  54. package/lib/sync.d.ts.map +1 -1
  55. package/lib/sync.js +1 -73
  56. package/lib/sync.js.map +1 -1
  57. package/lib/testing.d.ts +0 -48
  58. package/lib/testing.d.ts.map +1 -1
  59. package/lib/testing.js +0 -105
  60. package/lib/testing.js.map +1 -1
  61. package/lib/types.d.ts +0 -1
  62. package/lib/types.d.ts.map +1 -1
  63. package/lib/types.js.map +1 -1
  64. package/package.json +1 -3
  65. package/src/@types/global.d.ts +0 -3
  66. package/src/browser-index.ts +0 -11
  67. package/src/client.ts +60 -2882
  68. package/src/embedded.ts +3 -130
  69. package/src/event-mapper.ts +0 -4
  70. package/src/matrix.ts +0 -28
  71. package/src/models/MSC3089Branch.ts +0 -3
  72. package/src/models/event.ts +0 -289
  73. package/src/models/poll.ts +0 -6
  74. package/src/models/relations-container.ts +1 -8
  75. package/src/models/relations.ts +0 -8
  76. package/src/models/room-state.ts +2 -8
  77. package/src/models/room.ts +0 -62
  78. package/src/models/thread.ts +0 -1
  79. package/src/sliding-sync-sdk.ts +2 -72
  80. package/src/sync.ts +1 -98
  81. package/src/testing.ts +0 -108
  82. package/src/types.ts +0 -1
  83. package/CHANGELOG.md +0 -5910
  84. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  85. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  86. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  87. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  88. package/lib/@types/crypto.d.ts +0 -47
  89. package/lib/@types/crypto.d.ts.map +0 -1
  90. package/lib/@types/crypto.js +0 -1
  91. package/lib/@types/crypto.js.map +0 -1
  92. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  93. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  94. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  95. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  96. package/lib/common-crypto/CryptoBackend.js +0 -73
  97. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  98. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  99. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  100. package/lib/common-crypto/key-passphrase.js +0 -33
  101. package/lib/common-crypto/key-passphrase.js.map +0 -1
  102. package/lib/crypto/CrossSigning.d.ts +0 -184
  103. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  104. package/lib/crypto/CrossSigning.js +0 -718
  105. package/lib/crypto/CrossSigning.js.map +0 -1
  106. package/lib/crypto/DeviceList.d.ts +0 -216
  107. package/lib/crypto/DeviceList.d.ts.map +0 -1
  108. package/lib/crypto/DeviceList.js +0 -892
  109. package/lib/crypto/DeviceList.js.map +0 -1
  110. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  111. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  112. package/lib/crypto/EncryptionSetup.js +0 -356
  113. package/lib/crypto/EncryptionSetup.js.map +0 -1
  114. package/lib/crypto/OlmDevice.d.ts +0 -457
  115. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  116. package/lib/crypto/OlmDevice.js +0 -1241
  117. package/lib/crypto/OlmDevice.js.map +0 -1
  118. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  119. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  120. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  121. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  122. package/lib/crypto/RoomList.d.ts +0 -26
  123. package/lib/crypto/RoomList.d.ts.map +0 -1
  124. package/lib/crypto/RoomList.js +0 -71
  125. package/lib/crypto/RoomList.js.map +0 -1
  126. package/lib/crypto/SecretSharing.d.ts +0 -24
  127. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  128. package/lib/crypto/SecretSharing.js +0 -194
  129. package/lib/crypto/SecretSharing.js.map +0 -1
  130. package/lib/crypto/SecretStorage.d.ts +0 -55
  131. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  132. package/lib/crypto/SecretStorage.js +0 -118
  133. package/lib/crypto/SecretStorage.js.map +0 -1
  134. package/lib/crypto/aes.d.ts +0 -6
  135. package/lib/crypto/aes.d.ts.map +0 -1
  136. package/lib/crypto/aes.js +0 -24
  137. package/lib/crypto/aes.js.map +0 -1
  138. package/lib/crypto/algorithms/base.d.ts +0 -156
  139. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  140. package/lib/crypto/algorithms/base.js +0 -187
  141. package/lib/crypto/algorithms/base.js.map +0 -1
  142. package/lib/crypto/algorithms/index.d.ts +0 -4
  143. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  144. package/lib/crypto/algorithms/index.js +0 -20
  145. package/lib/crypto/algorithms/index.js.map +0 -1
  146. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  147. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  148. package/lib/crypto/algorithms/megolm.js +0 -1822
  149. package/lib/crypto/algorithms/megolm.js.map +0 -1
  150. package/lib/crypto/algorithms/olm.d.ts +0 -5
  151. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  152. package/lib/crypto/algorithms/olm.js +0 -299
  153. package/lib/crypto/algorithms/olm.js.map +0 -1
  154. package/lib/crypto/api.d.ts +0 -32
  155. package/lib/crypto/api.d.ts.map +0 -1
  156. package/lib/crypto/api.js +0 -22
  157. package/lib/crypto/api.js.map +0 -1
  158. package/lib/crypto/backup.d.ts +0 -227
  159. package/lib/crypto/backup.d.ts.map +0 -1
  160. package/lib/crypto/backup.js +0 -824
  161. package/lib/crypto/backup.js.map +0 -1
  162. package/lib/crypto/crypto.d.ts +0 -3
  163. package/lib/crypto/crypto.d.ts.map +0 -1
  164. package/lib/crypto/crypto.js +0 -19
  165. package/lib/crypto/crypto.js.map +0 -1
  166. package/lib/crypto/dehydration.d.ts +0 -34
  167. package/lib/crypto/dehydration.d.ts.map +0 -1
  168. package/lib/crypto/dehydration.js +0 -252
  169. package/lib/crypto/dehydration.js.map +0 -1
  170. package/lib/crypto/device-converter.d.ts +0 -9
  171. package/lib/crypto/device-converter.d.ts.map +0 -1
  172. package/lib/crypto/device-converter.js +0 -42
  173. package/lib/crypto/device-converter.js.map +0 -1
  174. package/lib/crypto/deviceinfo.d.ts +0 -99
  175. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  176. package/lib/crypto/deviceinfo.js +0 -148
  177. package/lib/crypto/deviceinfo.js.map +0 -1
  178. package/lib/crypto/index.d.ts +0 -1209
  179. package/lib/crypto/index.d.ts.map +0 -1
  180. package/lib/crypto/index.js +0 -4097
  181. package/lib/crypto/index.js.map +0 -1
  182. package/lib/crypto/key_passphrase.d.ts +0 -14
  183. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  184. package/lib/crypto/key_passphrase.js +0 -44
  185. package/lib/crypto/key_passphrase.js.map +0 -1
  186. package/lib/crypto/keybackup.d.ts +0 -18
  187. package/lib/crypto/keybackup.d.ts.map +0 -1
  188. package/lib/crypto/keybackup.js +0 -1
  189. package/lib/crypto/keybackup.js.map +0 -1
  190. package/lib/crypto/olmlib.d.ts +0 -129
  191. package/lib/crypto/olmlib.d.ts.map +0 -1
  192. package/lib/crypto/olmlib.js +0 -492
  193. package/lib/crypto/olmlib.js.map +0 -1
  194. package/lib/crypto/recoverykey.d.ts +0 -2
  195. package/lib/crypto/recoverykey.d.ts.map +0 -1
  196. package/lib/crypto/recoverykey.js +0 -19
  197. package/lib/crypto/recoverykey.js.map +0 -1
  198. package/lib/crypto/store/base.d.ts +0 -252
  199. package/lib/crypto/store/base.d.ts.map +0 -1
  200. package/lib/crypto/store/base.js +0 -64
  201. package/lib/crypto/store/base.js.map +0 -1
  202. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  203. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  204. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  205. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  206. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  207. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  208. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  209. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  210. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  211. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  212. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  213. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  214. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  215. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  216. package/lib/crypto/store/memory-crypto-store.js +0 -622
  217. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  218. package/lib/crypto/verification/Base.d.ts +0 -105
  219. package/lib/crypto/verification/Base.d.ts.map +0 -1
  220. package/lib/crypto/verification/Base.js +0 -372
  221. package/lib/crypto/verification/Base.js.map +0 -1
  222. package/lib/crypto/verification/Error.d.ts +0 -35
  223. package/lib/crypto/verification/Error.d.ts.map +0 -1
  224. package/lib/crypto/verification/Error.js +0 -86
  225. package/lib/crypto/verification/Error.js.map +0 -1
  226. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  227. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  228. package/lib/crypto/verification/IllegalMethod.js +0 -43
  229. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  230. package/lib/crypto/verification/QRCode.d.ts +0 -51
  231. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  232. package/lib/crypto/verification/QRCode.js +0 -277
  233. package/lib/crypto/verification/QRCode.js.map +0 -1
  234. package/lib/crypto/verification/SAS.d.ts +0 -27
  235. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  236. package/lib/crypto/verification/SAS.js +0 -485
  237. package/lib/crypto/verification/SAS.js.map +0 -1
  238. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  239. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  240. package/lib/crypto/verification/SASDecimal.js +0 -34
  241. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  242. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  243. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  244. package/lib/crypto/verification/request/Channel.js +0 -1
  245. package/lib/crypto/verification/request/Channel.js.map +0 -1
  246. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  247. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  248. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  249. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  250. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  251. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  252. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  253. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  254. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  255. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  256. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  257. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  258. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  259. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  260. package/lib/crypto-api/CryptoEvent.js +0 -33
  261. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  262. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  263. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  264. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  265. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  266. package/lib/crypto-api/index.d.ts +0 -978
  267. package/lib/crypto-api/index.d.ts.map +0 -1
  268. package/lib/crypto-api/index.js +0 -304
  269. package/lib/crypto-api/index.js.map +0 -1
  270. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  271. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  272. package/lib/crypto-api/key-passphrase.js +0 -51
  273. package/lib/crypto-api/key-passphrase.js.map +0 -1
  274. package/lib/crypto-api/keybackup.d.ts +0 -88
  275. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  276. package/lib/crypto-api/keybackup.js +0 -1
  277. package/lib/crypto-api/keybackup.js.map +0 -1
  278. package/lib/crypto-api/recovery-key.d.ts +0 -11
  279. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  280. package/lib/crypto-api/recovery-key.js +0 -65
  281. package/lib/crypto-api/recovery-key.js.map +0 -1
  282. package/lib/crypto-api/verification.d.ts +0 -344
  283. package/lib/crypto-api/verification.d.ts.map +0 -1
  284. package/lib/crypto-api/verification.js +0 -91
  285. package/lib/crypto-api/verification.js.map +0 -1
  286. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  287. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  288. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  289. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  290. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  291. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  292. package/lib/rendezvous/RendezvousChannel.js +0 -1
  293. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  294. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  295. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  296. package/lib/rendezvous/RendezvousCode.js +0 -1
  297. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  298. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  299. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  300. package/lib/rendezvous/RendezvousError.js +0 -23
  301. package/lib/rendezvous/RendezvousError.js.map +0 -1
  302. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  303. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  304. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  305. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  306. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  307. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  308. package/lib/rendezvous/RendezvousIntent.js +0 -22
  309. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  310. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  311. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  312. package/lib/rendezvous/RendezvousTransport.js +0 -1
  313. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  314. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  315. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  316. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  317. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  318. package/lib/rendezvous/channels/index.d.ts +0 -2
  319. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  320. package/lib/rendezvous/channels/index.js +0 -18
  321. package/lib/rendezvous/channels/index.js.map +0 -1
  322. package/lib/rendezvous/index.d.ts +0 -10
  323. package/lib/rendezvous/index.d.ts.map +0 -1
  324. package/lib/rendezvous/index.js +0 -23
  325. package/lib/rendezvous/index.js.map +0 -1
  326. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  327. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  328. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  329. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  330. package/lib/rendezvous/transports/index.d.ts +0 -2
  331. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  332. package/lib/rendezvous/transports/index.js +0 -18
  333. package/lib/rendezvous/transports/index.js.map +0 -1
  334. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  335. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  336. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  337. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  338. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  339. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  340. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  341. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  342. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  343. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  344. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  345. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  346. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  347. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  348. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  349. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  350. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  351. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  352. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  353. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  354. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  355. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  356. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  357. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  358. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  359. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  360. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  361. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  362. package/lib/rust-crypto/backup.d.ts +0 -254
  363. package/lib/rust-crypto/backup.d.ts.map +0 -1
  364. package/lib/rust-crypto/backup.js +0 -837
  365. package/lib/rust-crypto/backup.js.map +0 -1
  366. package/lib/rust-crypto/constants.d.ts +0 -3
  367. package/lib/rust-crypto/constants.d.ts.map +0 -1
  368. package/lib/rust-crypto/constants.js +0 -19
  369. package/lib/rust-crypto/constants.js.map +0 -1
  370. package/lib/rust-crypto/device-converter.d.ts +0 -28
  371. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  372. package/lib/rust-crypto/device-converter.js +0 -123
  373. package/lib/rust-crypto/device-converter.js.map +0 -1
  374. package/lib/rust-crypto/index.d.ts +0 -61
  375. package/lib/rust-crypto/index.d.ts.map +0 -1
  376. package/lib/rust-crypto/index.js +0 -152
  377. package/lib/rust-crypto/index.js.map +0 -1
  378. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  379. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  380. package/lib/rust-crypto/libolm_migration.js +0 -459
  381. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  382. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  383. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  384. package/lib/rust-crypto/rust-crypto.js +0 -2016
  385. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  386. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  387. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  388. package/lib/rust-crypto/secret-storage.js +0 -63
  389. package/lib/rust-crypto/secret-storage.js.map +0 -1
  390. package/lib/rust-crypto/verification.d.ts +0 -319
  391. package/lib/rust-crypto/verification.d.ts.map +0 -1
  392. package/lib/rust-crypto/verification.js +0 -816
  393. package/lib/rust-crypto/verification.js.map +0 -1
  394. package/lib/secret-storage.d.ts +0 -370
  395. package/lib/secret-storage.d.ts.map +0 -1
  396. package/lib/secret-storage.js +0 -466
  397. package/lib/secret-storage.js.map +0 -1
  398. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  399. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  400. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  401. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  402. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  403. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  404. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  405. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  406. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  407. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  408. package/lib/utils/internal/deriveKeys.js +0 -60
  409. package/lib/utils/internal/deriveKeys.js.map +0 -1
  410. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  411. package/src/@types/crypto.ts +0 -73
  412. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  413. package/src/common-crypto/CryptoBackend.ts +0 -302
  414. package/src/common-crypto/README.md +0 -4
  415. package/src/common-crypto/key-passphrase.ts +0 -43
  416. package/src/crypto/CrossSigning.ts +0 -773
  417. package/src/crypto/DeviceList.ts +0 -989
  418. package/src/crypto/EncryptionSetup.ts +0 -351
  419. package/src/crypto/OlmDevice.ts +0 -1500
  420. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  421. package/src/crypto/RoomList.ts +0 -70
  422. package/src/crypto/SecretSharing.ts +0 -240
  423. package/src/crypto/SecretStorage.ts +0 -136
  424. package/src/crypto/aes.ts +0 -23
  425. package/src/crypto/algorithms/base.ts +0 -236
  426. package/src/crypto/algorithms/index.ts +0 -20
  427. package/src/crypto/algorithms/megolm.ts +0 -2216
  428. package/src/crypto/algorithms/olm.ts +0 -381
  429. package/src/crypto/api.ts +0 -70
  430. package/src/crypto/backup.ts +0 -922
  431. package/src/crypto/crypto.ts +0 -18
  432. package/src/crypto/dehydration.ts +0 -272
  433. package/src/crypto/device-converter.ts +0 -45
  434. package/src/crypto/deviceinfo.ts +0 -158
  435. package/src/crypto/index.ts +0 -4414
  436. package/src/crypto/key_passphrase.ts +0 -42
  437. package/src/crypto/keybackup.ts +0 -47
  438. package/src/crypto/olmlib.ts +0 -539
  439. package/src/crypto/recoverykey.ts +0 -18
  440. package/src/crypto/store/base.ts +0 -348
  441. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  442. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  443. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  444. package/src/crypto/store/memory-crypto-store.ts +0 -680
  445. package/src/crypto/verification/Base.ts +0 -409
  446. package/src/crypto/verification/Error.ts +0 -76
  447. package/src/crypto/verification/IllegalMethod.ts +0 -50
  448. package/src/crypto/verification/QRCode.ts +0 -310
  449. package/src/crypto/verification/SAS.ts +0 -494
  450. package/src/crypto/verification/SASDecimal.ts +0 -37
  451. package/src/crypto/verification/request/Channel.ts +0 -34
  452. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  453. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  454. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  455. package/src/crypto-api/CryptoEvent.ts +0 -93
  456. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  457. package/src/crypto-api/index.ts +0 -1175
  458. package/src/crypto-api/key-passphrase.ts +0 -58
  459. package/src/crypto-api/keybackup.ts +0 -115
  460. package/src/crypto-api/recovery-key.ts +0 -69
  461. package/src/crypto-api/verification.ts +0 -408
  462. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  463. package/src/rendezvous/RendezvousChannel.ts +0 -48
  464. package/src/rendezvous/RendezvousCode.ts +0 -25
  465. package/src/rendezvous/RendezvousError.ts +0 -26
  466. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  467. package/src/rendezvous/RendezvousIntent.ts +0 -20
  468. package/src/rendezvous/RendezvousTransport.ts +0 -58
  469. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  470. package/src/rendezvous/channels/index.ts +0 -17
  471. package/src/rendezvous/index.ts +0 -25
  472. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  473. package/src/rendezvous/transports/index.ts +0 -17
  474. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  475. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  476. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  477. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  478. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  479. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  480. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  481. package/src/rust-crypto/backup.ts +0 -881
  482. package/src/rust-crypto/constants.ts +0 -18
  483. package/src/rust-crypto/device-converter.ts +0 -128
  484. package/src/rust-crypto/index.ts +0 -237
  485. package/src/rust-crypto/libolm_migration.ts +0 -530
  486. package/src/rust-crypto/rust-crypto.ts +0 -2205
  487. package/src/rust-crypto/secret-storage.ts +0 -60
  488. package/src/rust-crypto/verification.ts +0 -830
  489. package/src/secret-storage.ts +0 -693
  490. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  491. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  492. package/src/utils/internal/deriveKeys.ts +0 -63
@@ -1,530 +0,0 @@
1
- /*
2
- Copyright 2023-2024 The Matrix.org Foundation C.I.C.
3
-
4
- Licensed under the Apache License, Version 2.0 (the "License");
5
- you may not use this file except in compliance with the License.
6
- You may obtain a copy of the License at
7
-
8
- http://www.apache.org/licenses/LICENSE-2.0
9
-
10
- Unless required by applicable law or agreed to in writing, software
11
- distributed under the License is distributed on an "AS IS" BASIS,
12
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- See the License for the specific language governing permissions and
14
- limitations under the License.
15
- */
16
-
17
- import * as RustSdkCryptoJs from "@matrix-org/matrix-sdk-crypto-wasm";
18
-
19
- import { Logger } from "../logger.ts";
20
- import { CryptoStore, MigrationState, SecretStorePrivateKeys } from "../crypto/store/base.ts";
21
- import { IndexedDBCryptoStore } from "../crypto/store/indexeddb-crypto-store.ts";
22
- import { IHttpOpts, MatrixHttpApi } from "../http-api/index.ts";
23
- import { requestKeyBackupVersion } from "./backup.ts";
24
- import { IRoomEncryption } from "../crypto/RoomList.ts";
25
- import { CrossSigningKeyInfo, Curve25519AuthData } from "../crypto-api/index.ts";
26
- import { RustCrypto } from "./rust-crypto.ts";
27
- import { KeyBackupInfo } from "../crypto-api/keybackup.ts";
28
- import { sleep } from "../utils.ts";
29
- import { encodeBase64 } from "../base64.ts";
30
- import decryptAESSecretStorageItem from "../utils/decryptAESSecretStorageItem.ts";
31
- import { AESEncryptedSecretStoragePayload } from "../@types/AESEncryptedSecretStoragePayload.ts";
32
-
33
- /**
34
- * Determine if any data needs migrating from the legacy store, and do so.
35
- *
36
- * This migrates the base account data, and olm and megolm sessions. It does *not* migrate the room list, which should
37
- * happen after an `OlmMachine` is created, via {@link migrateRoomSettingsFromLegacyCrypto}.
38
- *
39
- * @param args - Arguments object.
40
- */
41
- export async function migrateFromLegacyCrypto(args: {
42
- /** A `Logger` instance that will be used for debug output. */
43
- logger: Logger;
44
-
45
- /**
46
- * Low-level HTTP interface: used to make outgoing requests required by the rust SDK.
47
- * We expect it to set the access token, etc.
48
- */
49
- http: MatrixHttpApi<IHttpOpts & { onlyData: true }>;
50
-
51
- /** Store to migrate data from. */
52
- legacyStore: CryptoStore;
53
-
54
- /** Pickle key for `legacyStore`. */
55
- legacyPickleKey?: string;
56
-
57
- /** Local user's User ID. */
58
- userId: string;
59
-
60
- /** Local user's Device ID. */
61
- deviceId: string;
62
-
63
- /** Rust crypto store to migrate data into. */
64
- storeHandle: RustSdkCryptoJs.StoreHandle;
65
-
66
- /**
67
- * A callback which will receive progress updates on migration from `legacyStore`.
68
- *
69
- * Called with (-1, -1) to mark the end of migration.
70
- */
71
- legacyMigrationProgressListener?: (progress: number, total: number) => void;
72
- }): Promise<void> {
73
- const { logger, legacyStore } = args;
74
-
75
- // initialise the rust matrix-sdk-crypto-wasm, if it hasn't already been done
76
- await RustSdkCryptoJs.initAsync();
77
-
78
- // enable tracing in the rust-sdk
79
- new RustSdkCryptoJs.Tracing(RustSdkCryptoJs.LoggerLevel.Debug).turnOn();
80
-
81
- if (!(await legacyStore.containsData())) {
82
- // This store was never used. Nothing to migrate.
83
- return;
84
- }
85
-
86
- await legacyStore.startup();
87
-
88
- let accountPickle: string | null = null;
89
- await legacyStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
90
- legacyStore.getAccount(txn, (acctPickle) => {
91
- accountPickle = acctPickle;
92
- });
93
- });
94
- if (!accountPickle) {
95
- // This store is not properly set up. Nothing to migrate.
96
- logger.debug("Legacy crypto store is not set up (no account found). Not migrating.");
97
- return;
98
- }
99
-
100
- let migrationState = await legacyStore.getMigrationState();
101
-
102
- if (migrationState >= MigrationState.MEGOLM_SESSIONS_MIGRATED) {
103
- // All migration is done for now. The room list comes later, once we have an OlmMachine.
104
- return;
105
- }
106
-
107
- const nOlmSessions = await countOlmSessions(logger, legacyStore);
108
- const nMegolmSessions = await countMegolmSessions(logger, legacyStore);
109
- const totalSteps = 1 + nOlmSessions + nMegolmSessions;
110
- logger.info(
111
- `Migrating data from legacy crypto store. ${nOlmSessions} olm sessions and ${nMegolmSessions} megolm sessions to migrate.`,
112
- );
113
-
114
- let stepsDone = 0;
115
- function onProgress(steps: number): void {
116
- stepsDone += steps;
117
- args.legacyMigrationProgressListener?.(stepsDone, totalSteps);
118
- }
119
- onProgress(0);
120
-
121
- const pickleKey = new TextEncoder().encode(args.legacyPickleKey);
122
-
123
- if (migrationState === MigrationState.NOT_STARTED) {
124
- logger.info("Migrating data from legacy crypto store. Step 1: base data");
125
- await migrateBaseData(args.http, args.userId, args.deviceId, legacyStore, pickleKey, args.storeHandle, logger);
126
-
127
- migrationState = MigrationState.INITIAL_DATA_MIGRATED;
128
- await legacyStore.setMigrationState(migrationState);
129
- }
130
- onProgress(1);
131
-
132
- if (migrationState === MigrationState.INITIAL_DATA_MIGRATED) {
133
- logger.info(
134
- `Migrating data from legacy crypto store. Step 2: olm sessions (${nOlmSessions} sessions to migrate).`,
135
- );
136
- await migrateOlmSessions(logger, legacyStore, pickleKey, args.storeHandle, onProgress);
137
-
138
- migrationState = MigrationState.OLM_SESSIONS_MIGRATED;
139
- await legacyStore.setMigrationState(migrationState);
140
- }
141
-
142
- if (migrationState === MigrationState.OLM_SESSIONS_MIGRATED) {
143
- logger.info(
144
- `Migrating data from legacy crypto store. Step 3: megolm sessions (${nMegolmSessions} sessions to migrate).`,
145
- );
146
- await migrateMegolmSessions(logger, legacyStore, pickleKey, args.storeHandle, onProgress);
147
-
148
- migrationState = MigrationState.MEGOLM_SESSIONS_MIGRATED;
149
- await legacyStore.setMigrationState(migrationState);
150
- }
151
-
152
- // Migration is done.
153
- args.legacyMigrationProgressListener?.(-1, -1);
154
- logger.info("Migration from legacy crypto store complete");
155
- }
156
-
157
- async function migrateBaseData(
158
- http: MatrixHttpApi<IHttpOpts & { onlyData: true }>,
159
- userId: string,
160
- deviceId: string,
161
- legacyStore: CryptoStore,
162
- pickleKey: Uint8Array,
163
- storeHandle: RustSdkCryptoJs.StoreHandle,
164
- logger: Logger,
165
- ): Promise<void> {
166
- const migrationData = new RustSdkCryptoJs.BaseMigrationData();
167
- migrationData.userId = new RustSdkCryptoJs.UserId(userId);
168
- migrationData.deviceId = new RustSdkCryptoJs.DeviceId(deviceId);
169
-
170
- await legacyStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) =>
171
- legacyStore.getAccount(txn, (a) => {
172
- migrationData.pickledAccount = a ?? "";
173
- }),
174
- );
175
-
176
- const recoveryKey = await getAndDecryptCachedSecretKey(legacyStore, pickleKey, "m.megolm_backup.v1");
177
-
178
- // If we have a backup recovery key, we need to try to figure out which backup version it is for.
179
- // All we can really do is ask the server for the most recent version and check if the cached key we have matches.
180
- // It is possible that the backup has changed since last time his session was opened.
181
- if (recoveryKey) {
182
- let backupCallDone = false;
183
- let backupInfo: KeyBackupInfo | null = null;
184
- while (!backupCallDone) {
185
- try {
186
- backupInfo = await requestKeyBackupVersion(http);
187
- backupCallDone = true;
188
- } catch (e) {
189
- logger.info("Failed to get backup version during migration, retrying in 2 seconds", e);
190
- // Retry until successful, use simple constant delay
191
- await sleep(2000);
192
- }
193
- }
194
- if (backupInfo && backupInfo.algorithm == "m.megolm_backup.v1.curve25519-aes-sha2") {
195
- // check if the recovery key matches, as the active backup version may have changed since the key was cached
196
- // and the migration started.
197
- try {
198
- const decryptionKey = RustSdkCryptoJs.BackupDecryptionKey.fromBase64(recoveryKey);
199
- const publicKey = (backupInfo.auth_data as Curve25519AuthData)?.public_key;
200
- const isValid = decryptionKey.megolmV1PublicKey.publicKeyBase64 == publicKey;
201
- if (isValid) {
202
- migrationData.backupVersion = backupInfo.version;
203
- migrationData.backupRecoveryKey = recoveryKey;
204
- } else {
205
- logger.debug(
206
- "The backup key to migrate does not match the active backup version",
207
- `Cached pub key: ${decryptionKey.megolmV1PublicKey.publicKeyBase64}`,
208
- `Active pub key: ${publicKey}`,
209
- );
210
- }
211
- } catch (e) {
212
- logger.warn("Failed to check if the backup key to migrate matches the active backup version", e);
213
- }
214
- }
215
- }
216
-
217
- migrationData.privateCrossSigningMasterKey = await getAndDecryptCachedSecretKey(legacyStore, pickleKey, "master");
218
- migrationData.privateCrossSigningSelfSigningKey = await getAndDecryptCachedSecretKey(
219
- legacyStore,
220
- pickleKey,
221
- "self_signing",
222
- );
223
- migrationData.privateCrossSigningUserSigningKey = await getAndDecryptCachedSecretKey(
224
- legacyStore,
225
- pickleKey,
226
- "user_signing",
227
- );
228
- await RustSdkCryptoJs.Migration.migrateBaseData(migrationData, pickleKey, storeHandle);
229
- }
230
-
231
- async function countOlmSessions(logger: Logger, legacyStore: CryptoStore): Promise<number> {
232
- logger.debug("Counting olm sessions to be migrated");
233
- let nSessions: number;
234
- await legacyStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], (txn) =>
235
- legacyStore.countEndToEndSessions(txn, (n) => (nSessions = n)),
236
- );
237
- return nSessions!;
238
- }
239
-
240
- async function countMegolmSessions(logger: Logger, legacyStore: CryptoStore): Promise<number> {
241
- logger.debug("Counting megolm sessions to be migrated");
242
- return await legacyStore.countEndToEndInboundGroupSessions();
243
- }
244
-
245
- async function migrateOlmSessions(
246
- logger: Logger,
247
- legacyStore: CryptoStore,
248
- pickleKey: Uint8Array,
249
- storeHandle: RustSdkCryptoJs.StoreHandle,
250
- onBatchDone: (batchSize: number) => void,
251
- ): Promise<void> {
252
- // eslint-disable-next-line no-constant-condition
253
- while (true) {
254
- const batch = await legacyStore.getEndToEndSessionsBatch();
255
- if (batch === null) return;
256
-
257
- logger.debug(`Migrating batch of ${batch.length} olm sessions`);
258
- const migrationData: RustSdkCryptoJs.PickledSession[] = [];
259
- for (const session of batch) {
260
- const pickledSession = new RustSdkCryptoJs.PickledSession();
261
- pickledSession.senderKey = session.deviceKey!;
262
- pickledSession.pickle = session.session!;
263
- pickledSession.lastUseTime = pickledSession.creationTime = new Date(session.lastReceivedMessageTs!);
264
- migrationData.push(pickledSession);
265
- }
266
-
267
- await RustSdkCryptoJs.Migration.migrateOlmSessions(migrationData, pickleKey, storeHandle);
268
- await legacyStore.deleteEndToEndSessionsBatch(batch);
269
- onBatchDone(batch.length);
270
- }
271
- }
272
-
273
- async function migrateMegolmSessions(
274
- logger: Logger,
275
- legacyStore: CryptoStore,
276
- pickleKey: Uint8Array,
277
- storeHandle: RustSdkCryptoJs.StoreHandle,
278
- onBatchDone: (batchSize: number) => void,
279
- ): Promise<void> {
280
- // eslint-disable-next-line no-constant-condition
281
- while (true) {
282
- const batch = await legacyStore.getEndToEndInboundGroupSessionsBatch();
283
- if (batch === null) return;
284
-
285
- logger.debug(`Migrating batch of ${batch.length} megolm sessions`);
286
- const migrationData: RustSdkCryptoJs.PickledInboundGroupSession[] = [];
287
- for (const session of batch) {
288
- const sessionData = session.sessionData!;
289
-
290
- const pickledSession = new RustSdkCryptoJs.PickledInboundGroupSession();
291
- pickledSession.pickle = sessionData.session;
292
- pickledSession.roomId = new RustSdkCryptoJs.RoomId(sessionData.room_id);
293
- pickledSession.senderKey = session.senderKey;
294
- pickledSession.senderSigningKey = sessionData.keysClaimed?.["ed25519"];
295
- pickledSession.backedUp = !session.needsBackup;
296
-
297
- // The Rust SDK `imported` flag is used to indicate the authenticity status of a Megolm
298
- // session, which tells us whether we can reliably tell which Olm device is the owner
299
- // (creator) of the session.
300
- //
301
- // If `imported` is true, then we have no cryptographic proof that the session is owned
302
- // by the device with the identity key `senderKey`.
303
- //
304
- // Only Megolm sessions received directly from the owning device via an encrypted
305
- // `m.room_key` to-device message should have `imported` flag set to false. Megolm
306
- // sessions received by any other currently available means (i.e. from a
307
- // `m.forwarded_room_key`, from v1 asymmetric server-side key backup, imported from a
308
- // file, etc) should have the `imported` flag set to true.
309
- //
310
- // Messages encrypted with such Megolm sessions will have a grey shield in the UI
311
- // ("Authenticity of this message cannot be guaranteed").
312
- //
313
- // However, we don't want to bluntly mark all sessions as `imported` during migration
314
- // because users will suddenly start seeing all their historic messages decorated with a
315
- // grey shield, which would be seen as a non-actionable regression.
316
- //
317
- // In the legacy crypto stack, the flag encoding similar information was called
318
- // `InboundGroupSessionData.untrusted`. The value of this flag was set as follows:
319
- //
320
- // - For outbound Megolm sessions created by our own device, `untrusted` is `undefined`.
321
- // - For Megolm sessions received via a `m.room_key` to-device message, `untrusted` is
322
- // `undefined`.
323
- // - For Megolm sessions received via a `m.forwarded_room_key` to-device message,
324
- // `untrusted` is `true`.
325
- // - For Megolm sessions imported from a (v1 asymmetric / "legacy") server-side key
326
- // backup, `untrusted` is `true`.
327
- // - For Megolm sessions imported from a file, untrusted is `undefined`.
328
- //
329
- // The main difference between the legacy crypto stack and the Rust crypto stack is that
330
- // the Rust stack considers sessions imported from a file as `imported` (not
331
- // authenticated). This is because the Megolm session export file format does not
332
- // encode this authenticity information.
333
- //
334
- // Given this migration is only a one-time thing, we make a concession to accept the
335
- // loss of information in this case, to avoid degrading UX in a non-actionable way.
336
- pickledSession.imported = sessionData.untrusted === true;
337
-
338
- migrationData.push(pickledSession);
339
- }
340
-
341
- await RustSdkCryptoJs.Migration.migrateMegolmSessions(migrationData, pickleKey, storeHandle);
342
- await legacyStore.deleteEndToEndInboundGroupSessionsBatch(batch);
343
- onBatchDone(batch.length);
344
- }
345
- }
346
-
347
- /**
348
- * Determine if any room settings need migrating from the legacy store, and do so.
349
- *
350
- * @param args - Arguments object.
351
- */
352
- export async function migrateRoomSettingsFromLegacyCrypto({
353
- logger,
354
- legacyStore,
355
- olmMachine,
356
- }: {
357
- /** A `Logger` instance that will be used for debug output. */
358
- logger: Logger;
359
-
360
- /** Store to migrate data from. */
361
- legacyStore: CryptoStore;
362
-
363
- /** OlmMachine to store the new data on. */
364
- olmMachine: RustSdkCryptoJs.OlmMachine;
365
- }): Promise<void> {
366
- if (!(await legacyStore.containsData())) {
367
- // This store was never used. Nothing to migrate.
368
- return;
369
- }
370
-
371
- const migrationState = await legacyStore.getMigrationState();
372
-
373
- if (migrationState >= MigrationState.ROOM_SETTINGS_MIGRATED) {
374
- // We've already migrated the room settings.
375
- return;
376
- }
377
-
378
- let rooms: Record<string, IRoomEncryption> = {};
379
-
380
- await legacyStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ROOMS], (txn) => {
381
- legacyStore.getEndToEndRooms(txn, (result) => {
382
- rooms = result;
383
- });
384
- });
385
-
386
- logger.debug(`Migrating ${Object.keys(rooms).length} sets of room settings`);
387
- for (const [roomId, legacySettings] of Object.entries(rooms)) {
388
- try {
389
- const rustSettings = new RustSdkCryptoJs.RoomSettings();
390
-
391
- if (legacySettings.algorithm !== "m.megolm.v1.aes-sha2") {
392
- logger.warn(`Room ${roomId}: ignoring room with invalid algorithm ${legacySettings.algorithm}`);
393
- continue;
394
- }
395
- rustSettings.algorithm = RustSdkCryptoJs.EncryptionAlgorithm.MegolmV1AesSha2;
396
- rustSettings.sessionRotationPeriodMs = legacySettings.rotation_period_ms;
397
- rustSettings.sessionRotationPeriodMessages = legacySettings.rotation_period_msgs;
398
- await olmMachine.setRoomSettings(new RustSdkCryptoJs.RoomId(roomId), rustSettings);
399
-
400
- // We don't attempt to clear out the settings from the old store, or record where we've gotten up to,
401
- // which means that if the app gets restarted while we're in the middle of this migration, we'll start
402
- // again from scratch. So be it. Given that legacy crypto loads the whole room list into memory on startup
403
- // anyway, we know it can't be that big.
404
- } catch (e) {
405
- logger.warn(`Room ${roomId}: ignoring settings ${JSON.stringify(legacySettings)} which caused error ${e}`);
406
- }
407
- }
408
-
409
- logger.debug(`Completed room settings migration`);
410
- await legacyStore.setMigrationState(MigrationState.ROOM_SETTINGS_MIGRATED);
411
- }
412
-
413
- async function getAndDecryptCachedSecretKey(
414
- legacyStore: CryptoStore,
415
- legacyPickleKey: Uint8Array,
416
- name: string,
417
- ): Promise<string | undefined> {
418
- const key = await new Promise<any>((resolve) => {
419
- legacyStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
420
- legacyStore.getSecretStorePrivateKey(txn, resolve, name as keyof SecretStorePrivateKeys);
421
- });
422
- });
423
-
424
- if (key && key.ciphertext && key.iv && key.mac) {
425
- return await decryptAESSecretStorageItem(key as AESEncryptedSecretStoragePayload, legacyPickleKey, name);
426
- } else if (key instanceof Uint8Array) {
427
- // This is a legacy backward compatibility case where the key was stored in clear.
428
- return encodeBase64(key);
429
- } else {
430
- return undefined;
431
- }
432
- }
433
-
434
- /**
435
- * Check if the user's published identity (ie, public cross-signing keys) was trusted by the legacy session,
436
- * and if so mark it as trusted in the Rust session if needed.
437
- *
438
- * By default, if the legacy session didn't have the private MSK, the migrated session will revert to unverified,
439
- * even if the user has verified the session in the past.
440
- *
441
- * This only occurs if the private MSK was not cached in the crypto store (USK and SSK private keys won't help
442
- * to establish trust: the trust is rooted in the MSK).
443
- *
444
- * Rust crypto will only consider the current session as trusted if we import the private MSK itself.
445
- *
446
- * We could prompt the user to verify the session again, but it's probably better to just mark the user identity
447
- * as locally verified if it was before.
448
- *
449
- * See https://github.com/element-hq/element-web/issues/27079
450
- *
451
- * @param args - Argument object.
452
- */
453
- export async function migrateLegacyLocalTrustIfNeeded(args: {
454
- /** The legacy crypto store that is migrated. */
455
- legacyCryptoStore: CryptoStore;
456
- /** The migrated rust crypto stack. */
457
- rustCrypto: RustCrypto;
458
- /** The logger to use */
459
- logger: Logger;
460
- }): Promise<void> {
461
- const { legacyCryptoStore, rustCrypto, logger } = args;
462
- // Get the public cross-signing identity from rust.
463
- const rustOwnIdentity = await rustCrypto.getOwnIdentity();
464
- if (!rustOwnIdentity) {
465
- // There are no cross-signing keys published server side, so nothing to do here.
466
- return;
467
- }
468
- if (rustOwnIdentity.isVerified()) {
469
- // The rust session already trusts the keys, so again, nothing to do.
470
- return;
471
- }
472
-
473
- const legacyLocallyTrustedMSK = await getLegacyTrustedPublicMasterKeyBase64(legacyCryptoStore);
474
- if (!legacyLocallyTrustedMSK) {
475
- // The user never verified their identity in the legacy session, so nothing to do.
476
- return;
477
- }
478
-
479
- const mskInfo: CrossSigningKeyInfo = JSON.parse(rustOwnIdentity.masterKey);
480
- if (!mskInfo.keys || Object.keys(mskInfo.keys).length === 0) {
481
- // This should not happen, but let's be safe
482
- logger.error("Post Migration | Unexpected error: no master key in the rust session.");
483
- return;
484
- }
485
- const rustSeenMSK = Object.values(mskInfo.keys)[0];
486
-
487
- if (rustSeenMSK && rustSeenMSK == legacyLocallyTrustedMSK) {
488
- logger.info(`Post Migration: Migrating legacy trusted MSK: ${legacyLocallyTrustedMSK} to locally verified.`);
489
- // Let's mark the user identity as locally verified as part of the migration.
490
- await rustOwnIdentity!.verify();
491
- // As well as marking the MSK as trusted, `OlmMachine.verify` returns a
492
- // `SignatureUploadRequest` which will publish a signature of the MSK using
493
- // this device. In this case, we ignore the request: since the user hasn't
494
- // actually re-verified the MSK, we don't publish a new signature. (`.verify`
495
- // doesn't store the signature, and if we drop the request here it won't be
496
- // retried.)
497
- //
498
- // Not publishing the signature is consistent with the behaviour of
499
- // matrix-crypto-sdk when the private key is imported via
500
- // `importCrossSigningKeys`, and when the identity is verified via interactive
501
- // verification.
502
- //
503
- // [Aside: device signatures on the MSK are not considered by the rust-sdk to
504
- // establish the trust of the user identity so in any case, what we actually do
505
- // here is somewhat moot.]
506
- }
507
- }
508
-
509
- /**
510
- * Checks if the legacy store has a trusted public master key, and returns it if so.
511
- *
512
- * @param legacyStore - The legacy store to check.
513
- *
514
- * @returns `null` if there were no cross signing keys or if they were not trusted. The trusted public master key if it was.
515
- */
516
- async function getLegacyTrustedPublicMasterKeyBase64(legacyStore: CryptoStore): Promise<string | null> {
517
- let maybeTrustedKeys: string | null = null;
518
- await legacyStore.doTxn("readonly", "account", (txn) => {
519
- legacyStore.getCrossSigningKeys(txn, (keys) => {
520
- // can be an empty object after resetting cross-signing keys, see storeTrustedSelfKeys
521
- const msk = keys?.master;
522
- if (msk && Object.keys(msk.keys).length != 0) {
523
- // `msk.keys` is an object with { [`ed25519:${pubKey}`]: pubKey }
524
- maybeTrustedKeys = Object.values(msk.keys)[0];
525
- }
526
- });
527
- });
528
-
529
- return maybeTrustedKeys;
530
- }