@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (492) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/global.d.js +0 -2
  3. package/lib/@types/global.d.js.map +1 -1
  4. package/lib/browser-index.d.ts.map +1 -1
  5. package/lib/browser-index.js +0 -11
  6. package/lib/browser-index.js.map +1 -1
  7. package/lib/client.d.ts +2 -1221
  8. package/lib/client.d.ts.map +1 -1
  9. package/lib/client.js +331 -2821
  10. package/lib/client.js.map +1 -1
  11. package/lib/embedded.d.ts +0 -22
  12. package/lib/embedded.d.ts.map +1 -1
  13. package/lib/embedded.js +24 -166
  14. package/lib/embedded.js.map +1 -1
  15. package/lib/event-mapper.d.ts.map +1 -1
  16. package/lib/event-mapper.js +0 -4
  17. package/lib/event-mapper.js.map +1 -1
  18. package/lib/matrix.d.ts +0 -19
  19. package/lib/matrix.d.ts.map +1 -1
  20. package/lib/matrix.js +1 -26
  21. package/lib/matrix.js.map +1 -1
  22. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  23. package/lib/models/MSC3089Branch.js +0 -3
  24. package/lib/models/MSC3089Branch.js.map +1 -1
  25. package/lib/models/event.d.ts +0 -94
  26. package/lib/models/event.d.ts.map +1 -1
  27. package/lib/models/event.js +0 -274
  28. package/lib/models/event.js.map +1 -1
  29. package/lib/models/poll.d.ts.map +1 -1
  30. package/lib/models/poll.js +1 -5
  31. package/lib/models/poll.js.map +1 -1
  32. package/lib/models/relations-container.d.ts.map +1 -1
  33. package/lib/models/relations-container.js +1 -7
  34. package/lib/models/relations-container.js.map +1 -1
  35. package/lib/models/relations.d.ts +0 -1
  36. package/lib/models/relations.d.ts.map +1 -1
  37. package/lib/models/relations.js +0 -8
  38. package/lib/models/relations.js.map +1 -1
  39. package/lib/models/room-state.d.ts.map +1 -1
  40. package/lib/models/room-state.js +10 -26
  41. package/lib/models/room-state.js.map +1 -1
  42. package/lib/models/room.d.ts +0 -18
  43. package/lib/models/room.d.ts.map +1 -1
  44. package/lib/models/room.js +94 -148
  45. package/lib/models/room.js.map +1 -1
  46. package/lib/models/thread.d.ts.map +1 -1
  47. package/lib/models/thread.js +0 -1
  48. package/lib/models/thread.js.map +1 -1
  49. package/lib/sliding-sync-sdk.d.ts +2 -3
  50. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  51. package/lib/sliding-sync-sdk.js +41 -90
  52. package/lib/sliding-sync-sdk.js.map +1 -1
  53. package/lib/sync.d.ts +0 -12
  54. package/lib/sync.d.ts.map +1 -1
  55. package/lib/sync.js +1 -73
  56. package/lib/sync.js.map +1 -1
  57. package/lib/testing.d.ts +0 -48
  58. package/lib/testing.d.ts.map +1 -1
  59. package/lib/testing.js +0 -105
  60. package/lib/testing.js.map +1 -1
  61. package/lib/types.d.ts +0 -1
  62. package/lib/types.d.ts.map +1 -1
  63. package/lib/types.js.map +1 -1
  64. package/package.json +1 -3
  65. package/src/@types/global.d.ts +0 -3
  66. package/src/browser-index.ts +0 -11
  67. package/src/client.ts +60 -2882
  68. package/src/embedded.ts +3 -130
  69. package/src/event-mapper.ts +0 -4
  70. package/src/matrix.ts +0 -28
  71. package/src/models/MSC3089Branch.ts +0 -3
  72. package/src/models/event.ts +0 -289
  73. package/src/models/poll.ts +0 -6
  74. package/src/models/relations-container.ts +1 -8
  75. package/src/models/relations.ts +0 -8
  76. package/src/models/room-state.ts +2 -8
  77. package/src/models/room.ts +0 -62
  78. package/src/models/thread.ts +0 -1
  79. package/src/sliding-sync-sdk.ts +2 -72
  80. package/src/sync.ts +1 -98
  81. package/src/testing.ts +0 -108
  82. package/src/types.ts +0 -1
  83. package/CHANGELOG.md +0 -5910
  84. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  85. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  86. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  87. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  88. package/lib/@types/crypto.d.ts +0 -47
  89. package/lib/@types/crypto.d.ts.map +0 -1
  90. package/lib/@types/crypto.js +0 -1
  91. package/lib/@types/crypto.js.map +0 -1
  92. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  93. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  94. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  95. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  96. package/lib/common-crypto/CryptoBackend.js +0 -73
  97. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  98. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  99. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  100. package/lib/common-crypto/key-passphrase.js +0 -33
  101. package/lib/common-crypto/key-passphrase.js.map +0 -1
  102. package/lib/crypto/CrossSigning.d.ts +0 -184
  103. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  104. package/lib/crypto/CrossSigning.js +0 -718
  105. package/lib/crypto/CrossSigning.js.map +0 -1
  106. package/lib/crypto/DeviceList.d.ts +0 -216
  107. package/lib/crypto/DeviceList.d.ts.map +0 -1
  108. package/lib/crypto/DeviceList.js +0 -892
  109. package/lib/crypto/DeviceList.js.map +0 -1
  110. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  111. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  112. package/lib/crypto/EncryptionSetup.js +0 -356
  113. package/lib/crypto/EncryptionSetup.js.map +0 -1
  114. package/lib/crypto/OlmDevice.d.ts +0 -457
  115. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  116. package/lib/crypto/OlmDevice.js +0 -1241
  117. package/lib/crypto/OlmDevice.js.map +0 -1
  118. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  119. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  120. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  121. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  122. package/lib/crypto/RoomList.d.ts +0 -26
  123. package/lib/crypto/RoomList.d.ts.map +0 -1
  124. package/lib/crypto/RoomList.js +0 -71
  125. package/lib/crypto/RoomList.js.map +0 -1
  126. package/lib/crypto/SecretSharing.d.ts +0 -24
  127. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  128. package/lib/crypto/SecretSharing.js +0 -194
  129. package/lib/crypto/SecretSharing.js.map +0 -1
  130. package/lib/crypto/SecretStorage.d.ts +0 -55
  131. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  132. package/lib/crypto/SecretStorage.js +0 -118
  133. package/lib/crypto/SecretStorage.js.map +0 -1
  134. package/lib/crypto/aes.d.ts +0 -6
  135. package/lib/crypto/aes.d.ts.map +0 -1
  136. package/lib/crypto/aes.js +0 -24
  137. package/lib/crypto/aes.js.map +0 -1
  138. package/lib/crypto/algorithms/base.d.ts +0 -156
  139. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  140. package/lib/crypto/algorithms/base.js +0 -187
  141. package/lib/crypto/algorithms/base.js.map +0 -1
  142. package/lib/crypto/algorithms/index.d.ts +0 -4
  143. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  144. package/lib/crypto/algorithms/index.js +0 -20
  145. package/lib/crypto/algorithms/index.js.map +0 -1
  146. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  147. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  148. package/lib/crypto/algorithms/megolm.js +0 -1822
  149. package/lib/crypto/algorithms/megolm.js.map +0 -1
  150. package/lib/crypto/algorithms/olm.d.ts +0 -5
  151. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  152. package/lib/crypto/algorithms/olm.js +0 -299
  153. package/lib/crypto/algorithms/olm.js.map +0 -1
  154. package/lib/crypto/api.d.ts +0 -32
  155. package/lib/crypto/api.d.ts.map +0 -1
  156. package/lib/crypto/api.js +0 -22
  157. package/lib/crypto/api.js.map +0 -1
  158. package/lib/crypto/backup.d.ts +0 -227
  159. package/lib/crypto/backup.d.ts.map +0 -1
  160. package/lib/crypto/backup.js +0 -824
  161. package/lib/crypto/backup.js.map +0 -1
  162. package/lib/crypto/crypto.d.ts +0 -3
  163. package/lib/crypto/crypto.d.ts.map +0 -1
  164. package/lib/crypto/crypto.js +0 -19
  165. package/lib/crypto/crypto.js.map +0 -1
  166. package/lib/crypto/dehydration.d.ts +0 -34
  167. package/lib/crypto/dehydration.d.ts.map +0 -1
  168. package/lib/crypto/dehydration.js +0 -252
  169. package/lib/crypto/dehydration.js.map +0 -1
  170. package/lib/crypto/device-converter.d.ts +0 -9
  171. package/lib/crypto/device-converter.d.ts.map +0 -1
  172. package/lib/crypto/device-converter.js +0 -42
  173. package/lib/crypto/device-converter.js.map +0 -1
  174. package/lib/crypto/deviceinfo.d.ts +0 -99
  175. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  176. package/lib/crypto/deviceinfo.js +0 -148
  177. package/lib/crypto/deviceinfo.js.map +0 -1
  178. package/lib/crypto/index.d.ts +0 -1209
  179. package/lib/crypto/index.d.ts.map +0 -1
  180. package/lib/crypto/index.js +0 -4097
  181. package/lib/crypto/index.js.map +0 -1
  182. package/lib/crypto/key_passphrase.d.ts +0 -14
  183. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  184. package/lib/crypto/key_passphrase.js +0 -44
  185. package/lib/crypto/key_passphrase.js.map +0 -1
  186. package/lib/crypto/keybackup.d.ts +0 -18
  187. package/lib/crypto/keybackup.d.ts.map +0 -1
  188. package/lib/crypto/keybackup.js +0 -1
  189. package/lib/crypto/keybackup.js.map +0 -1
  190. package/lib/crypto/olmlib.d.ts +0 -129
  191. package/lib/crypto/olmlib.d.ts.map +0 -1
  192. package/lib/crypto/olmlib.js +0 -492
  193. package/lib/crypto/olmlib.js.map +0 -1
  194. package/lib/crypto/recoverykey.d.ts +0 -2
  195. package/lib/crypto/recoverykey.d.ts.map +0 -1
  196. package/lib/crypto/recoverykey.js +0 -19
  197. package/lib/crypto/recoverykey.js.map +0 -1
  198. package/lib/crypto/store/base.d.ts +0 -252
  199. package/lib/crypto/store/base.d.ts.map +0 -1
  200. package/lib/crypto/store/base.js +0 -64
  201. package/lib/crypto/store/base.js.map +0 -1
  202. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  203. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  204. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  205. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  206. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  207. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  208. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  209. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  210. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  211. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  212. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  213. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  214. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  215. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  216. package/lib/crypto/store/memory-crypto-store.js +0 -622
  217. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  218. package/lib/crypto/verification/Base.d.ts +0 -105
  219. package/lib/crypto/verification/Base.d.ts.map +0 -1
  220. package/lib/crypto/verification/Base.js +0 -372
  221. package/lib/crypto/verification/Base.js.map +0 -1
  222. package/lib/crypto/verification/Error.d.ts +0 -35
  223. package/lib/crypto/verification/Error.d.ts.map +0 -1
  224. package/lib/crypto/verification/Error.js +0 -86
  225. package/lib/crypto/verification/Error.js.map +0 -1
  226. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  227. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  228. package/lib/crypto/verification/IllegalMethod.js +0 -43
  229. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  230. package/lib/crypto/verification/QRCode.d.ts +0 -51
  231. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  232. package/lib/crypto/verification/QRCode.js +0 -277
  233. package/lib/crypto/verification/QRCode.js.map +0 -1
  234. package/lib/crypto/verification/SAS.d.ts +0 -27
  235. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  236. package/lib/crypto/verification/SAS.js +0 -485
  237. package/lib/crypto/verification/SAS.js.map +0 -1
  238. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  239. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  240. package/lib/crypto/verification/SASDecimal.js +0 -34
  241. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  242. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  243. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  244. package/lib/crypto/verification/request/Channel.js +0 -1
  245. package/lib/crypto/verification/request/Channel.js.map +0 -1
  246. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  247. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  248. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  249. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  250. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  251. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  252. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  253. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  254. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  255. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  256. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  257. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  258. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  259. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  260. package/lib/crypto-api/CryptoEvent.js +0 -33
  261. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  262. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  263. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  264. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  265. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  266. package/lib/crypto-api/index.d.ts +0 -978
  267. package/lib/crypto-api/index.d.ts.map +0 -1
  268. package/lib/crypto-api/index.js +0 -304
  269. package/lib/crypto-api/index.js.map +0 -1
  270. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  271. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  272. package/lib/crypto-api/key-passphrase.js +0 -51
  273. package/lib/crypto-api/key-passphrase.js.map +0 -1
  274. package/lib/crypto-api/keybackup.d.ts +0 -88
  275. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  276. package/lib/crypto-api/keybackup.js +0 -1
  277. package/lib/crypto-api/keybackup.js.map +0 -1
  278. package/lib/crypto-api/recovery-key.d.ts +0 -11
  279. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  280. package/lib/crypto-api/recovery-key.js +0 -65
  281. package/lib/crypto-api/recovery-key.js.map +0 -1
  282. package/lib/crypto-api/verification.d.ts +0 -344
  283. package/lib/crypto-api/verification.d.ts.map +0 -1
  284. package/lib/crypto-api/verification.js +0 -91
  285. package/lib/crypto-api/verification.js.map +0 -1
  286. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  287. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  288. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  289. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  290. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  291. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  292. package/lib/rendezvous/RendezvousChannel.js +0 -1
  293. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  294. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  295. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  296. package/lib/rendezvous/RendezvousCode.js +0 -1
  297. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  298. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  299. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  300. package/lib/rendezvous/RendezvousError.js +0 -23
  301. package/lib/rendezvous/RendezvousError.js.map +0 -1
  302. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  303. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  304. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  305. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  306. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  307. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  308. package/lib/rendezvous/RendezvousIntent.js +0 -22
  309. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  310. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  311. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  312. package/lib/rendezvous/RendezvousTransport.js +0 -1
  313. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  314. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  315. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  316. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  317. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  318. package/lib/rendezvous/channels/index.d.ts +0 -2
  319. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  320. package/lib/rendezvous/channels/index.js +0 -18
  321. package/lib/rendezvous/channels/index.js.map +0 -1
  322. package/lib/rendezvous/index.d.ts +0 -10
  323. package/lib/rendezvous/index.d.ts.map +0 -1
  324. package/lib/rendezvous/index.js +0 -23
  325. package/lib/rendezvous/index.js.map +0 -1
  326. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  327. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  328. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  329. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  330. package/lib/rendezvous/transports/index.d.ts +0 -2
  331. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  332. package/lib/rendezvous/transports/index.js +0 -18
  333. package/lib/rendezvous/transports/index.js.map +0 -1
  334. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  335. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  336. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  337. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  338. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  339. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  340. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  341. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  342. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  343. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  344. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  345. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  346. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  347. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  348. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  349. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  350. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  351. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  352. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  353. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  354. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  355. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  356. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  357. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  358. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  359. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  360. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  361. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  362. package/lib/rust-crypto/backup.d.ts +0 -254
  363. package/lib/rust-crypto/backup.d.ts.map +0 -1
  364. package/lib/rust-crypto/backup.js +0 -837
  365. package/lib/rust-crypto/backup.js.map +0 -1
  366. package/lib/rust-crypto/constants.d.ts +0 -3
  367. package/lib/rust-crypto/constants.d.ts.map +0 -1
  368. package/lib/rust-crypto/constants.js +0 -19
  369. package/lib/rust-crypto/constants.js.map +0 -1
  370. package/lib/rust-crypto/device-converter.d.ts +0 -28
  371. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  372. package/lib/rust-crypto/device-converter.js +0 -123
  373. package/lib/rust-crypto/device-converter.js.map +0 -1
  374. package/lib/rust-crypto/index.d.ts +0 -61
  375. package/lib/rust-crypto/index.d.ts.map +0 -1
  376. package/lib/rust-crypto/index.js +0 -152
  377. package/lib/rust-crypto/index.js.map +0 -1
  378. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  379. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  380. package/lib/rust-crypto/libolm_migration.js +0 -459
  381. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  382. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  383. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  384. package/lib/rust-crypto/rust-crypto.js +0 -2016
  385. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  386. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  387. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  388. package/lib/rust-crypto/secret-storage.js +0 -63
  389. package/lib/rust-crypto/secret-storage.js.map +0 -1
  390. package/lib/rust-crypto/verification.d.ts +0 -319
  391. package/lib/rust-crypto/verification.d.ts.map +0 -1
  392. package/lib/rust-crypto/verification.js +0 -816
  393. package/lib/rust-crypto/verification.js.map +0 -1
  394. package/lib/secret-storage.d.ts +0 -370
  395. package/lib/secret-storage.d.ts.map +0 -1
  396. package/lib/secret-storage.js +0 -466
  397. package/lib/secret-storage.js.map +0 -1
  398. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  399. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  400. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  401. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  402. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  403. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  404. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  405. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  406. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  407. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  408. package/lib/utils/internal/deriveKeys.js +0 -60
  409. package/lib/utils/internal/deriveKeys.js.map +0 -1
  410. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  411. package/src/@types/crypto.ts +0 -73
  412. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  413. package/src/common-crypto/CryptoBackend.ts +0 -302
  414. package/src/common-crypto/README.md +0 -4
  415. package/src/common-crypto/key-passphrase.ts +0 -43
  416. package/src/crypto/CrossSigning.ts +0 -773
  417. package/src/crypto/DeviceList.ts +0 -989
  418. package/src/crypto/EncryptionSetup.ts +0 -351
  419. package/src/crypto/OlmDevice.ts +0 -1500
  420. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  421. package/src/crypto/RoomList.ts +0 -70
  422. package/src/crypto/SecretSharing.ts +0 -240
  423. package/src/crypto/SecretStorage.ts +0 -136
  424. package/src/crypto/aes.ts +0 -23
  425. package/src/crypto/algorithms/base.ts +0 -236
  426. package/src/crypto/algorithms/index.ts +0 -20
  427. package/src/crypto/algorithms/megolm.ts +0 -2216
  428. package/src/crypto/algorithms/olm.ts +0 -381
  429. package/src/crypto/api.ts +0 -70
  430. package/src/crypto/backup.ts +0 -922
  431. package/src/crypto/crypto.ts +0 -18
  432. package/src/crypto/dehydration.ts +0 -272
  433. package/src/crypto/device-converter.ts +0 -45
  434. package/src/crypto/deviceinfo.ts +0 -158
  435. package/src/crypto/index.ts +0 -4414
  436. package/src/crypto/key_passphrase.ts +0 -42
  437. package/src/crypto/keybackup.ts +0 -47
  438. package/src/crypto/olmlib.ts +0 -539
  439. package/src/crypto/recoverykey.ts +0 -18
  440. package/src/crypto/store/base.ts +0 -348
  441. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  442. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  443. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  444. package/src/crypto/store/memory-crypto-store.ts +0 -680
  445. package/src/crypto/verification/Base.ts +0 -409
  446. package/src/crypto/verification/Error.ts +0 -76
  447. package/src/crypto/verification/IllegalMethod.ts +0 -50
  448. package/src/crypto/verification/QRCode.ts +0 -310
  449. package/src/crypto/verification/SAS.ts +0 -494
  450. package/src/crypto/verification/SASDecimal.ts +0 -37
  451. package/src/crypto/verification/request/Channel.ts +0 -34
  452. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  453. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  454. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  455. package/src/crypto-api/CryptoEvent.ts +0 -93
  456. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  457. package/src/crypto-api/index.ts +0 -1175
  458. package/src/crypto-api/key-passphrase.ts +0 -58
  459. package/src/crypto-api/keybackup.ts +0 -115
  460. package/src/crypto-api/recovery-key.ts +0 -69
  461. package/src/crypto-api/verification.ts +0 -408
  462. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  463. package/src/rendezvous/RendezvousChannel.ts +0 -48
  464. package/src/rendezvous/RendezvousCode.ts +0 -25
  465. package/src/rendezvous/RendezvousError.ts +0 -26
  466. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  467. package/src/rendezvous/RendezvousIntent.ts +0 -20
  468. package/src/rendezvous/RendezvousTransport.ts +0 -58
  469. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  470. package/src/rendezvous/channels/index.ts +0 -17
  471. package/src/rendezvous/index.ts +0 -25
  472. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  473. package/src/rendezvous/transports/index.ts +0 -17
  474. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  475. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  476. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  477. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  478. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  479. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  480. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  481. package/src/rust-crypto/backup.ts +0 -881
  482. package/src/rust-crypto/constants.ts +0 -18
  483. package/src/rust-crypto/device-converter.ts +0 -128
  484. package/src/rust-crypto/index.ts +0 -237
  485. package/src/rust-crypto/libolm_migration.ts +0 -530
  486. package/src/rust-crypto/rust-crypto.ts +0 -2205
  487. package/src/rust-crypto/secret-storage.ts +0 -60
  488. package/src/rust-crypto/verification.ts +0 -830
  489. package/src/secret-storage.ts +0 -693
  490. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  491. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  492. package/src/utils/internal/deriveKeys.ts +0 -63
@@ -1,356 +0,0 @@
1
- import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
2
- import _defineProperty from "@babel/runtime/helpers/defineProperty";
3
- /*
4
- Copyright 2021 The Matrix.org Foundation C.I.C.
5
-
6
- Licensed under the Apache License, Version 2.0 (the "License");
7
- you may not use this file except in compliance with the License.
8
- You may obtain a copy of the License at
9
-
10
- http://www.apache.org/licenses/LICENSE-2.0
11
-
12
- Unless required by applicable law or agreed to in writing, software
13
- distributed under the License is distributed on an "AS IS" BASIS,
14
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
- See the License for the specific language governing permissions and
16
- limitations under the License.
17
- */
18
-
19
- import { logger } from "../logger.js";
20
- import { MatrixEvent } from "../models/event.js";
21
- import { createCryptoStoreCacheCallbacks } from "./CrossSigning.js";
22
- import { IndexedDBCryptoStore } from "./store/indexeddb-crypto-store.js";
23
- import { Method, ClientPrefix } from "../http-api/index.js";
24
- import { ClientEvent } from "../client.js";
25
- import { TypedEventEmitter } from "../models/typed-event-emitter.js";
26
- /**
27
- * Builds an EncryptionSetupOperation by calling any of the add.. methods.
28
- * Once done, `buildOperation()` can be called which allows to apply to operation.
29
- *
30
- * This is used as a helper by Crypto to keep track of all the network requests
31
- * and other side-effects of bootstrapping, so it can be applied in one go (and retried in the future)
32
- * Also keeps track of all the private keys created during bootstrapping, so we don't need to prompt for them
33
- * more than once.
34
- */
35
- export class EncryptionSetupBuilder {
36
- /**
37
- * @param accountData - pre-existing account data, will only be read, not written.
38
- * @param delegateCryptoCallbacks - crypto callbacks to delegate to if the key isn't in cache yet
39
- */
40
- constructor(accountData, delegateCryptoCallbacks) {
41
- _defineProperty(this, "accountDataClientAdapter", void 0);
42
- _defineProperty(this, "crossSigningCallbacks", void 0);
43
- _defineProperty(this, "ssssCryptoCallbacks", void 0);
44
- _defineProperty(this, "crossSigningKeys", void 0);
45
- _defineProperty(this, "keySignatures", void 0);
46
- _defineProperty(this, "keyBackupInfo", void 0);
47
- _defineProperty(this, "sessionBackupPrivateKey", void 0);
48
- this.accountDataClientAdapter = new AccountDataClientAdapter(accountData);
49
- this.crossSigningCallbacks = new CrossSigningCallbacks();
50
- this.ssssCryptoCallbacks = new SSSSCryptoCallbacks(delegateCryptoCallbacks);
51
- }
52
-
53
- /**
54
- * Adds new cross-signing public keys
55
- *
56
- * @param authUpload - Function called to await an interactive auth
57
- * flow when uploading device signing keys.
58
- * Args:
59
- * A function that makes the request requiring auth. Receives
60
- * the auth data as an object. Can be called multiple times, first with
61
- * an empty authDict, to obtain the flows.
62
- * @param keys - the new keys
63
- */
64
- addCrossSigningKeys(authUpload, keys) {
65
- this.crossSigningKeys = {
66
- authUpload,
67
- keys
68
- };
69
- }
70
-
71
- /**
72
- * Adds the key backup info to be updated on the server
73
- *
74
- * Used either to create a new key backup, or add signatures
75
- * from the new MSK.
76
- *
77
- * @param keyBackupInfo - as received from/sent to the server
78
- */
79
- addSessionBackup(keyBackupInfo) {
80
- this.keyBackupInfo = keyBackupInfo;
81
- }
82
-
83
- /**
84
- * Adds the session backup private key to be updated in the local cache
85
- *
86
- * Used after fixing the format of the key
87
- *
88
- */
89
- addSessionBackupPrivateKeyToCache(privateKey) {
90
- this.sessionBackupPrivateKey = privateKey;
91
- }
92
-
93
- /**
94
- * Add signatures from a given user and device/x-sign key
95
- * Used to sign the new cross-signing key with the device key
96
- *
97
- */
98
- addKeySignature(userId, deviceId, signature) {
99
- if (!this.keySignatures) {
100
- this.keySignatures = {};
101
- }
102
- var userSignatures = this.keySignatures[userId] || {};
103
- this.keySignatures[userId] = userSignatures;
104
- userSignatures[deviceId] = signature;
105
- }
106
- setAccountData(type, content) {
107
- var _this = this;
108
- return _asyncToGenerator(function* () {
109
- yield _this.accountDataClientAdapter.setAccountData(type, content);
110
- })();
111
- }
112
-
113
- /**
114
- * builds the operation containing all the parts that have been added to the builder
115
- */
116
- buildOperation() {
117
- var accountData = this.accountDataClientAdapter.values;
118
- return new EncryptionSetupOperation(accountData, this.crossSigningKeys, this.keyBackupInfo, this.keySignatures);
119
- }
120
-
121
- /**
122
- * Stores the created keys locally.
123
- *
124
- * This does not yet store the operation in a way that it can be restored,
125
- * but that is the idea in the future.
126
- */
127
- persist(crypto) {
128
- var _this2 = this;
129
- return _asyncToGenerator(function* () {
130
- // store private keys in cache
131
- if (_this2.crossSigningKeys) {
132
- var cacheCallbacks = createCryptoStoreCacheCallbacks(crypto.cryptoStore, crypto.olmDevice);
133
- for (var type of ["master", "self_signing", "user_signing"]) {
134
- var _cacheCallbacks$store;
135
- logger.log("Cache ".concat(type, " cross-signing private key locally"));
136
- var privateKey = _this2.crossSigningCallbacks.privateKeys.get(type);
137
- yield (_cacheCallbacks$store = cacheCallbacks.storeCrossSigningKeyCache) === null || _cacheCallbacks$store === void 0 ? void 0 : _cacheCallbacks$store.call(cacheCallbacks, type, privateKey);
138
- }
139
- // store own cross-sign pubkeys as trusted
140
- yield crypto.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
141
- crypto.cryptoStore.storeCrossSigningKeys(txn, _this2.crossSigningKeys.keys);
142
- });
143
- }
144
- // store session backup key in cache
145
- if (_this2.sessionBackupPrivateKey) {
146
- yield crypto.storeSessionBackupPrivateKey(_this2.sessionBackupPrivateKey);
147
- }
148
- })();
149
- }
150
- }
151
-
152
- /**
153
- * Can be created from EncryptionSetupBuilder, or
154
- * (in a follow-up PR, not implemented yet) restored from storage, to retry.
155
- *
156
- * It does not have knowledge of any private keys, unlike the builder.
157
- */
158
- export class EncryptionSetupOperation {
159
- /**
160
- */
161
- constructor(accountData, crossSigningKeys, keyBackupInfo, keySignatures) {
162
- this.accountData = accountData;
163
- this.crossSigningKeys = crossSigningKeys;
164
- this.keyBackupInfo = keyBackupInfo;
165
- this.keySignatures = keySignatures;
166
- }
167
-
168
- /**
169
- * Runs the (remaining part of, in the future) operation by sending requests to the server.
170
- */
171
- apply(crypto) {
172
- var _this3 = this;
173
- return _asyncToGenerator(function* () {
174
- var baseApis = crypto.baseApis;
175
- // upload cross-signing keys
176
- if (_this3.crossSigningKeys) {
177
- var _this3$crossSigningKe, _this3$crossSigningKe2;
178
- var keys = {};
179
- for (var [name, key] of Object.entries(_this3.crossSigningKeys.keys)) {
180
- keys[name + "_key"] = key;
181
- }
182
-
183
- // We must only call `uploadDeviceSigningKeys` from inside this auth
184
- // helper to ensure we properly handle auth errors.
185
- yield (_this3$crossSigningKe = (_this3$crossSigningKe2 = _this3.crossSigningKeys).authUpload) === null || _this3$crossSigningKe === void 0 ? void 0 : _this3$crossSigningKe.call(_this3$crossSigningKe2, authDict => {
186
- return baseApis.uploadDeviceSigningKeys(authDict !== null && authDict !== void 0 ? authDict : undefined, keys);
187
- });
188
-
189
- // pass the new keys to the main instance of our own CrossSigningInfo.
190
- crypto.crossSigningInfo.setKeys(_this3.crossSigningKeys.keys);
191
- }
192
- // set account data
193
- if (_this3.accountData) {
194
- for (var [type, content] of _this3.accountData) {
195
- yield baseApis.setAccountData(type, content);
196
- }
197
- }
198
- // upload first cross-signing signatures with the new key
199
- // (e.g. signing our own device)
200
- if (_this3.keySignatures) {
201
- yield baseApis.uploadKeySignatures(_this3.keySignatures);
202
- }
203
- // need to create/update key backup info
204
- if (_this3.keyBackupInfo) {
205
- if (_this3.keyBackupInfo.version) {
206
- // session backup signature
207
- // The backup is trusted because the user provided the private key.
208
- // Sign the backup with the cross signing key so the key backup can
209
- // be trusted via cross-signing.
210
- yield baseApis.http.authedRequest(Method.Put, "/room_keys/version/" + _this3.keyBackupInfo.version, undefined, {
211
- algorithm: _this3.keyBackupInfo.algorithm,
212
- auth_data: _this3.keyBackupInfo.auth_data
213
- }, {
214
- prefix: ClientPrefix.V3
215
- });
216
- } else {
217
- // add new key backup
218
- yield baseApis.http.authedRequest(Method.Post, "/room_keys/version", undefined, _this3.keyBackupInfo, {
219
- prefix: ClientPrefix.V3
220
- });
221
- }
222
- // tell the backup manager to re-check the keys now that they have been (maybe) updated
223
- yield crypto.backupManager.checkKeyBackup();
224
- }
225
- })();
226
- }
227
- }
228
-
229
- /**
230
- * Catches account data set by SecretStorage during bootstrapping by
231
- * implementing the methods related to account data in MatrixClient
232
- */
233
- class AccountDataClientAdapter extends TypedEventEmitter {
234
- /**
235
- * @param existingValues - existing account data
236
- */
237
- constructor(existingValues) {
238
- super();
239
- this.existingValues = existingValues;
240
- //
241
- _defineProperty(this, "values", new Map());
242
- }
243
-
244
- /**
245
- * @returns the content of the account data
246
- */
247
- getAccountDataFromServer(type) {
248
- return Promise.resolve(this.getAccountData(type));
249
- }
250
-
251
- /**
252
- * @returns the content of the account data
253
- */
254
- getAccountData(type) {
255
- var modifiedValue = this.values.get(type);
256
- if (modifiedValue) {
257
- return modifiedValue;
258
- }
259
- var existingValue = this.existingValues.get(type);
260
- if (existingValue) {
261
- return existingValue.getContent();
262
- }
263
- return null;
264
- }
265
- setAccountData(type, content) {
266
- var lastEvent = this.values.get(type);
267
- this.values.set(type, content);
268
- // ensure accountData is emitted on the next tick,
269
- // as SecretStorage listens for it while calling this method
270
- // and it seems to rely on this.
271
- return Promise.resolve().then(() => {
272
- var event = new MatrixEvent({
273
- type,
274
- content
275
- });
276
- this.emit(ClientEvent.AccountData, event, lastEvent);
277
- return {};
278
- });
279
- }
280
- }
281
-
282
- /**
283
- * Catches the private cross-signing keys set during bootstrapping
284
- * by both cache callbacks (see createCryptoStoreCacheCallbacks) as non-cache callbacks.
285
- * See CrossSigningInfo constructor
286
- */
287
- class CrossSigningCallbacks {
288
- constructor() {
289
- _defineProperty(this, "privateKeys", new Map());
290
- }
291
- // cache callbacks
292
- getCrossSigningKeyCache(type, expectedPublicKey) {
293
- return this.getCrossSigningKey(type, expectedPublicKey);
294
- }
295
- storeCrossSigningKeyCache(type, key) {
296
- this.privateKeys.set(type, key);
297
- return Promise.resolve();
298
- }
299
-
300
- // non-cache callbacks
301
- getCrossSigningKey(type, expectedPubkey) {
302
- var _this$privateKeys$get;
303
- return Promise.resolve((_this$privateKeys$get = this.privateKeys.get(type)) !== null && _this$privateKeys$get !== void 0 ? _this$privateKeys$get : null);
304
- }
305
- saveCrossSigningKeys(privateKeys) {
306
- for (var [type, privateKey] of Object.entries(privateKeys)) {
307
- this.privateKeys.set(type, privateKey);
308
- }
309
- }
310
- }
311
-
312
- /**
313
- * Catches the 4S private key set during bootstrapping by implementing
314
- * the SecretStorage crypto callbacks
315
- */
316
- class SSSSCryptoCallbacks {
317
- constructor(delegateCryptoCallbacks) {
318
- this.delegateCryptoCallbacks = delegateCryptoCallbacks;
319
- _defineProperty(this, "privateKeys", new Map());
320
- }
321
- getSecretStorageKey(_ref, name) {
322
- var _this4 = this;
323
- return _asyncToGenerator(function* () {
324
- var _this4$delegateCrypto;
325
- var {
326
- keys
327
- } = _ref;
328
- for (var keyId of Object.keys(keys)) {
329
- var privateKey = _this4.privateKeys.get(keyId);
330
- if (privateKey) {
331
- return [keyId, privateKey];
332
- }
333
- }
334
- // if we don't have the key cached yet, ask
335
- // for it to the general crypto callbacks and cache it
336
- if (_this4 !== null && _this4 !== void 0 && (_this4$delegateCrypto = _this4.delegateCryptoCallbacks) !== null && _this4$delegateCrypto !== void 0 && _this4$delegateCrypto.getSecretStorageKey) {
337
- var result = yield _this4.delegateCryptoCallbacks.getSecretStorageKey({
338
- keys
339
- }, name);
340
- if (result) {
341
- var [_keyId, _privateKey] = result;
342
- _this4.privateKeys.set(_keyId, _privateKey);
343
- }
344
- return result;
345
- }
346
- return null;
347
- })();
348
- }
349
- addPrivateKey(keyId, keyInfo, privKey) {
350
- var _this$delegateCryptoC, _this$delegateCryptoC2;
351
- this.privateKeys.set(keyId, privKey);
352
- // Also pass along to application to cache if it wishes
353
- (_this$delegateCryptoC = this.delegateCryptoCallbacks) === null || _this$delegateCryptoC === void 0 || (_this$delegateCryptoC2 = _this$delegateCryptoC.cacheSecretStorageKey) === null || _this$delegateCryptoC2 === void 0 || _this$delegateCryptoC2.call(_this$delegateCryptoC, keyId, keyInfo, privKey);
354
- }
355
- }
356
- //# sourceMappingURL=EncryptionSetup.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"EncryptionSetup.js","names":["logger","MatrixEvent","createCryptoStoreCacheCallbacks","IndexedDBCryptoStore","Method","ClientPrefix","ClientEvent","TypedEventEmitter","EncryptionSetupBuilder","constructor","accountData","delegateCryptoCallbacks","_defineProperty","accountDataClientAdapter","AccountDataClientAdapter","crossSigningCallbacks","CrossSigningCallbacks","ssssCryptoCallbacks","SSSSCryptoCallbacks","addCrossSigningKeys","authUpload","keys","crossSigningKeys","addSessionBackup","keyBackupInfo","addSessionBackupPrivateKeyToCache","privateKey","sessionBackupPrivateKey","addKeySignature","userId","deviceId","signature","keySignatures","userSignatures","setAccountData","type","content","_this","_asyncToGenerator","buildOperation","values","EncryptionSetupOperation","persist","crypto","_this2","cacheCallbacks","cryptoStore","olmDevice","_cacheCallbacks$store","log","concat","privateKeys","get","storeCrossSigningKeyCache","call","doTxn","STORE_ACCOUNT","txn","storeCrossSigningKeys","storeSessionBackupPrivateKey","apply","_this3","baseApis","_this3$crossSigningKe","_this3$crossSigningKe2","name","key","Object","entries","authDict","uploadDeviceSigningKeys","undefined","crossSigningInfo","setKeys","uploadKeySignatures","version","http","authedRequest","Put","algorithm","auth_data","prefix","V3","Post","backupManager","checkKeyBackup","existingValues","Map","getAccountDataFromServer","Promise","resolve","getAccountData","modifiedValue","existingValue","getContent","lastEvent","set","then","event","emit","AccountData","getCrossSigningKeyCache","expectedPublicKey","getCrossSigningKey","expectedPubkey","_this$privateKeys$get","saveCrossSigningKeys","getSecretStorageKey","_ref","_this4","_this4$delegateCrypto","keyId","result","addPrivateKey","keyInfo","privKey","_this$delegateCryptoC","_this$delegateCryptoC2","cacheSecretStorageKey"],"sources":["../../src/crypto/EncryptionSetup.ts"],"sourcesContent":["/*\nCopyright 2021 The Matrix.org Foundation C.I.C.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\nimport { logger } from \"../logger.ts\";\nimport { MatrixEvent } from \"../models/event.ts\";\nimport { createCryptoStoreCacheCallbacks, ICacheCallbacks } from \"./CrossSigning.ts\";\nimport { IndexedDBCryptoStore } from \"./store/indexeddb-crypto-store.ts\";\nimport { Method, ClientPrefix } from \"../http-api/index.ts\";\nimport { Crypto, ICryptoCallbacks } from \"./index.ts\";\nimport { ClientEvent, ClientEventHandlerMap, CrossSigningKeys, ISignedKey, KeySignatures } from \"../client.ts\";\nimport { IKeyBackupInfo } from \"./keybackup.ts\";\nimport { TypedEventEmitter } from \"../models/typed-event-emitter.ts\";\nimport { AccountDataClient, SecretStorageKeyDescription } from \"../secret-storage.ts\";\nimport { BootstrapCrossSigningOpts, CrossSigningKeyInfo } from \"../crypto-api/index.ts\";\n\ninterface ICrossSigningKeys {\n authUpload: BootstrapCrossSigningOpts[\"authUploadDeviceSigningKeys\"];\n keys: Record<\"master\" | \"self_signing\" | \"user_signing\", CrossSigningKeyInfo>;\n}\n\n/**\n * Builds an EncryptionSetupOperation by calling any of the add.. methods.\n * Once done, `buildOperation()` can be called which allows to apply to operation.\n *\n * This is used as a helper by Crypto to keep track of all the network requests\n * and other side-effects of bootstrapping, so it can be applied in one go (and retried in the future)\n * Also keeps track of all the private keys created during bootstrapping, so we don't need to prompt for them\n * more than once.\n */\nexport class EncryptionSetupBuilder {\n public readonly accountDataClientAdapter: AccountDataClientAdapter;\n public readonly crossSigningCallbacks: CrossSigningCallbacks;\n public readonly ssssCryptoCallbacks: SSSSCryptoCallbacks;\n\n private crossSigningKeys?: ICrossSigningKeys;\n private keySignatures?: KeySignatures;\n private keyBackupInfo?: IKeyBackupInfo;\n private sessionBackupPrivateKey?: Uint8Array;\n\n /**\n * @param accountData - pre-existing account data, will only be read, not written.\n * @param delegateCryptoCallbacks - crypto callbacks to delegate to if the key isn't in cache yet\n */\n public constructor(accountData: Map<string, MatrixEvent>, delegateCryptoCallbacks?: ICryptoCallbacks) {\n this.accountDataClientAdapter = new AccountDataClientAdapter(accountData);\n this.crossSigningCallbacks = new CrossSigningCallbacks();\n this.ssssCryptoCallbacks = new SSSSCryptoCallbacks(delegateCryptoCallbacks);\n }\n\n /**\n * Adds new cross-signing public keys\n *\n * @param authUpload - Function called to await an interactive auth\n * flow when uploading device signing keys.\n * Args:\n * A function that makes the request requiring auth. Receives\n * the auth data as an object. Can be called multiple times, first with\n * an empty authDict, to obtain the flows.\n * @param keys - the new keys\n */\n public addCrossSigningKeys(authUpload: ICrossSigningKeys[\"authUpload\"], keys: ICrossSigningKeys[\"keys\"]): void {\n this.crossSigningKeys = { authUpload, keys };\n }\n\n /**\n * Adds the key backup info to be updated on the server\n *\n * Used either to create a new key backup, or add signatures\n * from the new MSK.\n *\n * @param keyBackupInfo - as received from/sent to the server\n */\n public addSessionBackup(keyBackupInfo: IKeyBackupInfo): void {\n this.keyBackupInfo = keyBackupInfo;\n }\n\n /**\n * Adds the session backup private key to be updated in the local cache\n *\n * Used after fixing the format of the key\n *\n */\n public addSessionBackupPrivateKeyToCache(privateKey: Uint8Array): void {\n this.sessionBackupPrivateKey = privateKey;\n }\n\n /**\n * Add signatures from a given user and device/x-sign key\n * Used to sign the new cross-signing key with the device key\n *\n */\n public addKeySignature(userId: string, deviceId: string, signature: ISignedKey): void {\n if (!this.keySignatures) {\n this.keySignatures = {};\n }\n const userSignatures = this.keySignatures[userId] || {};\n this.keySignatures[userId] = userSignatures;\n userSignatures[deviceId] = signature;\n }\n\n public async setAccountData(type: string, content: object): Promise<void> {\n await this.accountDataClientAdapter.setAccountData(type, content);\n }\n\n /**\n * builds the operation containing all the parts that have been added to the builder\n */\n public buildOperation(): EncryptionSetupOperation {\n const accountData = this.accountDataClientAdapter.values;\n return new EncryptionSetupOperation(accountData, this.crossSigningKeys, this.keyBackupInfo, this.keySignatures);\n }\n\n /**\n * Stores the created keys locally.\n *\n * This does not yet store the operation in a way that it can be restored,\n * but that is the idea in the future.\n */\n public async persist(crypto: Crypto): Promise<void> {\n // store private keys in cache\n if (this.crossSigningKeys) {\n const cacheCallbacks = createCryptoStoreCacheCallbacks(crypto.cryptoStore, crypto.olmDevice);\n for (const type of [\"master\", \"self_signing\", \"user_signing\"]) {\n logger.log(`Cache ${type} cross-signing private key locally`);\n const privateKey = this.crossSigningCallbacks.privateKeys.get(type);\n await cacheCallbacks.storeCrossSigningKeyCache?.(type, privateKey);\n }\n // store own cross-sign pubkeys as trusted\n await crypto.cryptoStore.doTxn(\"readwrite\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n crypto.cryptoStore.storeCrossSigningKeys(txn, this.crossSigningKeys!.keys);\n });\n }\n // store session backup key in cache\n if (this.sessionBackupPrivateKey) {\n await crypto.storeSessionBackupPrivateKey(this.sessionBackupPrivateKey);\n }\n }\n}\n\n/**\n * Can be created from EncryptionSetupBuilder, or\n * (in a follow-up PR, not implemented yet) restored from storage, to retry.\n *\n * It does not have knowledge of any private keys, unlike the builder.\n */\nexport class EncryptionSetupOperation {\n /**\n */\n public constructor(\n private readonly accountData: Map<string, object>,\n private readonly crossSigningKeys?: ICrossSigningKeys,\n private readonly keyBackupInfo?: IKeyBackupInfo,\n private readonly keySignatures?: KeySignatures,\n ) {}\n\n /**\n * Runs the (remaining part of, in the future) operation by sending requests to the server.\n */\n public async apply(crypto: Crypto): Promise<void> {\n const baseApis = crypto.baseApis;\n // upload cross-signing keys\n if (this.crossSigningKeys) {\n const keys: Partial<CrossSigningKeys> = {};\n for (const [name, key] of Object.entries(this.crossSigningKeys.keys)) {\n keys[((name as keyof ICrossSigningKeys[\"keys\"]) + \"_key\") as keyof CrossSigningKeys] = key;\n }\n\n // We must only call `uploadDeviceSigningKeys` from inside this auth\n // helper to ensure we properly handle auth errors.\n await this.crossSigningKeys.authUpload?.((authDict) => {\n return baseApis.uploadDeviceSigningKeys(authDict ?? undefined, keys as CrossSigningKeys);\n });\n\n // pass the new keys to the main instance of our own CrossSigningInfo.\n crypto.crossSigningInfo.setKeys(this.crossSigningKeys.keys);\n }\n // set account data\n if (this.accountData) {\n for (const [type, content] of this.accountData) {\n await baseApis.setAccountData(type, content);\n }\n }\n // upload first cross-signing signatures with the new key\n // (e.g. signing our own device)\n if (this.keySignatures) {\n await baseApis.uploadKeySignatures(this.keySignatures);\n }\n // need to create/update key backup info\n if (this.keyBackupInfo) {\n if (this.keyBackupInfo.version) {\n // session backup signature\n // The backup is trusted because the user provided the private key.\n // Sign the backup with the cross signing key so the key backup can\n // be trusted via cross-signing.\n await baseApis.http.authedRequest(\n Method.Put,\n \"/room_keys/version/\" + this.keyBackupInfo.version,\n undefined,\n {\n algorithm: this.keyBackupInfo.algorithm,\n auth_data: this.keyBackupInfo.auth_data,\n },\n { prefix: ClientPrefix.V3 },\n );\n } else {\n // add new key backup\n await baseApis.http.authedRequest(Method.Post, \"/room_keys/version\", undefined, this.keyBackupInfo, {\n prefix: ClientPrefix.V3,\n });\n }\n // tell the backup manager to re-check the keys now that they have been (maybe) updated\n await crypto.backupManager.checkKeyBackup();\n }\n }\n}\n\n/**\n * Catches account data set by SecretStorage during bootstrapping by\n * implementing the methods related to account data in MatrixClient\n */\nclass AccountDataClientAdapter\n extends TypedEventEmitter<ClientEvent.AccountData, ClientEventHandlerMap>\n implements AccountDataClient\n{\n //\n public readonly values = new Map<string, MatrixEvent>();\n\n /**\n * @param existingValues - existing account data\n */\n public constructor(private readonly existingValues: Map<string, MatrixEvent>) {\n super();\n }\n\n /**\n * @returns the content of the account data\n */\n public getAccountDataFromServer<T extends { [k: string]: any }>(type: string): Promise<T | null> {\n return Promise.resolve(this.getAccountData(type));\n }\n\n /**\n * @returns the content of the account data\n */\n public getAccountData<T extends { [k: string]: any }>(type: string): T | null {\n const modifiedValue = this.values.get(type);\n if (modifiedValue) {\n return modifiedValue as unknown as T;\n }\n const existingValue = this.existingValues.get(type);\n if (existingValue) {\n return existingValue.getContent<T>();\n }\n return null;\n }\n\n public setAccountData(type: string, content: any): Promise<{}> {\n const lastEvent = this.values.get(type);\n this.values.set(type, content);\n // ensure accountData is emitted on the next tick,\n // as SecretStorage listens for it while calling this method\n // and it seems to rely on this.\n return Promise.resolve().then(() => {\n const event = new MatrixEvent({ type, content });\n this.emit(ClientEvent.AccountData, event, lastEvent);\n return {};\n });\n }\n}\n\n/**\n * Catches the private cross-signing keys set during bootstrapping\n * by both cache callbacks (see createCryptoStoreCacheCallbacks) as non-cache callbacks.\n * See CrossSigningInfo constructor\n */\nclass CrossSigningCallbacks implements ICryptoCallbacks, ICacheCallbacks {\n public readonly privateKeys = new Map<string, Uint8Array>();\n\n // cache callbacks\n public getCrossSigningKeyCache(type: string, expectedPublicKey: string): Promise<Uint8Array | null> {\n return this.getCrossSigningKey(type, expectedPublicKey);\n }\n\n public storeCrossSigningKeyCache(type: string, key: Uint8Array): Promise<void> {\n this.privateKeys.set(type, key);\n return Promise.resolve();\n }\n\n // non-cache callbacks\n public getCrossSigningKey(type: string, expectedPubkey: string): Promise<Uint8Array | null> {\n return Promise.resolve(this.privateKeys.get(type) ?? null);\n }\n\n public saveCrossSigningKeys(privateKeys: Record<string, Uint8Array>): void {\n for (const [type, privateKey] of Object.entries(privateKeys)) {\n this.privateKeys.set(type, privateKey);\n }\n }\n}\n\n/**\n * Catches the 4S private key set during bootstrapping by implementing\n * the SecretStorage crypto callbacks\n */\nclass SSSSCryptoCallbacks {\n private readonly privateKeys = new Map<string, Uint8Array>();\n\n public constructor(private readonly delegateCryptoCallbacks?: ICryptoCallbacks) {}\n\n public async getSecretStorageKey(\n { keys }: { keys: Record<string, SecretStorageKeyDescription> },\n name: string,\n ): Promise<[string, Uint8Array] | null> {\n for (const keyId of Object.keys(keys)) {\n const privateKey = this.privateKeys.get(keyId);\n if (privateKey) {\n return [keyId, privateKey];\n }\n }\n // if we don't have the key cached yet, ask\n // for it to the general crypto callbacks and cache it\n if (this?.delegateCryptoCallbacks?.getSecretStorageKey) {\n const result = await this.delegateCryptoCallbacks.getSecretStorageKey({ keys }, name);\n if (result) {\n const [keyId, privateKey] = result;\n this.privateKeys.set(keyId, privateKey);\n }\n return result;\n }\n return null;\n }\n\n public addPrivateKey(keyId: string, keyInfo: SecretStorageKeyDescription, privKey: Uint8Array): void {\n this.privateKeys.set(keyId, privKey);\n // Also pass along to application to cache if it wishes\n this.delegateCryptoCallbacks?.cacheSecretStorageKey?.(keyId, keyInfo, privKey);\n }\n}\n"],"mappings":";;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASA,MAAM,QAAQ,cAAc;AACrC,SAASC,WAAW,QAAQ,oBAAoB;AAChD,SAASC,+BAA+B,QAAyB,mBAAmB;AACpF,SAASC,oBAAoB,QAAQ,mCAAmC;AACxE,SAASC,MAAM,EAAEC,YAAY,QAAQ,sBAAsB;AAE3D,SAASC,WAAW,QAA4E,cAAc;AAE9G,SAASC,iBAAiB,QAAQ,kCAAkC;AASpE;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,MAAMC,sBAAsB,CAAC;EAUhC;AACJ;AACA;AACA;EACWC,WAAWA,CAACC,WAAqC,EAAEC,uBAA0C,EAAE;IAAAC,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAClG,IAAI,CAACC,wBAAwB,GAAG,IAAIC,wBAAwB,CAACJ,WAAW,CAAC;IACzE,IAAI,CAACK,qBAAqB,GAAG,IAAIC,qBAAqB,CAAC,CAAC;IACxD,IAAI,CAACC,mBAAmB,GAAG,IAAIC,mBAAmB,CAACP,uBAAuB,CAAC;EAC/E;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWQ,mBAAmBA,CAACC,UAA2C,EAAEC,IAA+B,EAAQ;IAC3G,IAAI,CAACC,gBAAgB,GAAG;MAAEF,UAAU;MAAEC;IAAK,CAAC;EAChD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWE,gBAAgBA,CAACC,aAA6B,EAAQ;IACzD,IAAI,CAACA,aAAa,GAAGA,aAAa;EACtC;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWC,iCAAiCA,CAACC,UAAsB,EAAQ;IACnE,IAAI,CAACC,uBAAuB,GAAGD,UAAU;EAC7C;;EAEA;AACJ;AACA;AACA;AACA;EACWE,eAAeA,CAACC,MAAc,EAAEC,QAAgB,EAAEC,SAAqB,EAAQ;IAClF,IAAI,CAAC,IAAI,CAACC,aAAa,EAAE;MACrB,IAAI,CAACA,aAAa,GAAG,CAAC,CAAC;IAC3B;IACA,IAAMC,cAAc,GAAG,IAAI,CAACD,aAAa,CAACH,MAAM,CAAC,IAAI,CAAC,CAAC;IACvD,IAAI,CAACG,aAAa,CAACH,MAAM,CAAC,GAAGI,cAAc;IAC3CA,cAAc,CAACH,QAAQ,CAAC,GAAGC,SAAS;EACxC;EAEaG,cAAcA,CAACC,IAAY,EAAEC,OAAe,EAAiB;IAAA,IAAAC,KAAA;IAAA,OAAAC,iBAAA;MACtE,MAAMD,KAAI,CAACxB,wBAAwB,CAACqB,cAAc,CAACC,IAAI,EAAEC,OAAO,CAAC;IAAC;EACtE;;EAEA;AACJ;AACA;EACWG,cAAcA,CAAA,EAA6B;IAC9C,IAAM7B,WAAW,GAAG,IAAI,CAACG,wBAAwB,CAAC2B,MAAM;IACxD,OAAO,IAAIC,wBAAwB,CAAC/B,WAAW,EAAE,IAAI,CAACY,gBAAgB,EAAE,IAAI,CAACE,aAAa,EAAE,IAAI,CAACQ,aAAa,CAAC;EACnH;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBU,OAAOA,CAACC,MAAc,EAAiB;IAAA,IAAAC,MAAA;IAAA,OAAAN,iBAAA;MAChD;MACA,IAAIM,MAAI,CAACtB,gBAAgB,EAAE;QACvB,IAAMuB,cAAc,GAAG3C,+BAA+B,CAACyC,MAAM,CAACG,WAAW,EAAEH,MAAM,CAACI,SAAS,CAAC;QAC5F,KAAK,IAAMZ,IAAI,IAAI,CAAC,QAAQ,EAAE,cAAc,EAAE,cAAc,CAAC,EAAE;UAAA,IAAAa,qBAAA;UAC3DhD,MAAM,CAACiD,GAAG,UAAAC,MAAA,CAAUf,IAAI,uCAAoC,CAAC;UAC7D,IAAMT,UAAU,GAAGkB,MAAI,CAAC7B,qBAAqB,CAACoC,WAAW,CAACC,GAAG,CAACjB,IAAI,CAAC;UACnE,OAAAa,qBAAA,GAAMH,cAAc,CAACQ,yBAAyB,cAAAL,qBAAA,uBAAxCA,qBAAA,CAAAM,IAAA,CAAAT,cAAc,EAA6BV,IAAI,EAAET,UAAU,CAAC;QACtE;QACA;QACA,MAAMiB,MAAM,CAACG,WAAW,CAACS,KAAK,CAAC,WAAW,EAAE,CAACpD,oBAAoB,CAACqD,aAAa,CAAC,EAAGC,GAAG,IAAK;UACvFd,MAAM,CAACG,WAAW,CAACY,qBAAqB,CAACD,GAAG,EAAEb,MAAI,CAACtB,gBAAgB,CAAED,IAAI,CAAC;QAC9E,CAAC,CAAC;MACN;MACA;MACA,IAAIuB,MAAI,CAACjB,uBAAuB,EAAE;QAC9B,MAAMgB,MAAM,CAACgB,4BAA4B,CAACf,MAAI,CAACjB,uBAAuB,CAAC;MAC3E;IAAC;EACL;AACJ;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,MAAMc,wBAAwB,CAAC;EAClC;AACJ;EACWhC,WAAWA,CACGC,WAAgC,EAChCY,gBAAoC,EACpCE,aAA8B,EAC9BQ,aAA6B,EAChD;IAAA,KAJmBtB,WAAgC,GAAhCA,WAAgC;IAAA,KAChCY,gBAAoC,GAApCA,gBAAoC;IAAA,KACpCE,aAA8B,GAA9BA,aAA8B;IAAA,KAC9BQ,aAA6B,GAA7BA,aAA6B;EAC/C;;EAEH;AACJ;AACA;EACiB4B,KAAKA,CAACjB,MAAc,EAAiB;IAAA,IAAAkB,MAAA;IAAA,OAAAvB,iBAAA;MAC9C,IAAMwB,QAAQ,GAAGnB,MAAM,CAACmB,QAAQ;MAChC;MACA,IAAID,MAAI,CAACvC,gBAAgB,EAAE;QAAA,IAAAyC,qBAAA,EAAAC,sBAAA;QACvB,IAAM3C,IAA+B,GAAG,CAAC,CAAC;QAC1C,KAAK,IAAM,CAAC4C,IAAI,EAAEC,GAAG,CAAC,IAAIC,MAAM,CAACC,OAAO,CAACP,MAAI,CAACvC,gBAAgB,CAACD,IAAI,CAAC,EAAE;UAClEA,IAAI,CAAG4C,IAAI,GAAuC,MAAM,CAA4B,GAAGC,GAAG;QAC9F;;QAEA;QACA;QACA,OAAAH,qBAAA,GAAM,CAAAC,sBAAA,GAAAH,MAAI,CAACvC,gBAAgB,EAACF,UAAU,cAAA2C,qBAAA,uBAAhCA,qBAAA,CAAAT,IAAA,CAAAU,sBAAA,EAAoCK,QAAQ,IAAK;UACnD,OAAOP,QAAQ,CAACQ,uBAAuB,CAACD,QAAQ,aAARA,QAAQ,cAARA,QAAQ,GAAIE,SAAS,EAAElD,IAAwB,CAAC;QAC5F,CAAC,CAAC;;QAEF;QACAsB,MAAM,CAAC6B,gBAAgB,CAACC,OAAO,CAACZ,MAAI,CAACvC,gBAAgB,CAACD,IAAI,CAAC;MAC/D;MACA;MACA,IAAIwC,MAAI,CAACnD,WAAW,EAAE;QAClB,KAAK,IAAM,CAACyB,IAAI,EAAEC,OAAO,CAAC,IAAIyB,MAAI,CAACnD,WAAW,EAAE;UAC5C,MAAMoD,QAAQ,CAAC5B,cAAc,CAACC,IAAI,EAAEC,OAAO,CAAC;QAChD;MACJ;MACA;MACA;MACA,IAAIyB,MAAI,CAAC7B,aAAa,EAAE;QACpB,MAAM8B,QAAQ,CAACY,mBAAmB,CAACb,MAAI,CAAC7B,aAAa,CAAC;MAC1D;MACA;MACA,IAAI6B,MAAI,CAACrC,aAAa,EAAE;QACpB,IAAIqC,MAAI,CAACrC,aAAa,CAACmD,OAAO,EAAE;UAC5B;UACA;UACA;UACA;UACA,MAAMb,QAAQ,CAACc,IAAI,CAACC,aAAa,CAC7BzE,MAAM,CAAC0E,GAAG,EACV,qBAAqB,GAAGjB,MAAI,CAACrC,aAAa,CAACmD,OAAO,EAClDJ,SAAS,EACT;YACIQ,SAAS,EAAElB,MAAI,CAACrC,aAAa,CAACuD,SAAS;YACvCC,SAAS,EAAEnB,MAAI,CAACrC,aAAa,CAACwD;UAClC,CAAC,EACD;YAAEC,MAAM,EAAE5E,YAAY,CAAC6E;UAAG,CAC9B,CAAC;QACL,CAAC,MAAM;UACH;UACA,MAAMpB,QAAQ,CAACc,IAAI,CAACC,aAAa,CAACzE,MAAM,CAAC+E,IAAI,EAAE,oBAAoB,EAAEZ,SAAS,EAAEV,MAAI,CAACrC,aAAa,EAAE;YAChGyD,MAAM,EAAE5E,YAAY,CAAC6E;UACzB,CAAC,CAAC;QACN;QACA;QACA,MAAMvC,MAAM,CAACyC,aAAa,CAACC,cAAc,CAAC,CAAC;MAC/C;IAAC;EACL;AACJ;;AAEA;AACA;AACA;AACA;AACA,MAAMvE,wBAAwB,SAClBP,iBAAiB,CAE7B;EAII;AACJ;AACA;EACWE,WAAWA,CAAkB6E,cAAwC,EAAE;IAC1E,KAAK,CAAC,CAAC;IAAC,KADwBA,cAAwC,GAAxCA,cAAwC;IAN5E;IAAA1E,eAAA,iBACyB,IAAI2E,GAAG,CAAsB,CAAC;EAOvD;;EAEA;AACJ;AACA;EACWC,wBAAwBA,CAAiCrD,IAAY,EAAqB;IAC7F,OAAOsD,OAAO,CAACC,OAAO,CAAC,IAAI,CAACC,cAAc,CAACxD,IAAI,CAAC,CAAC;EACrD;;EAEA;AACJ;AACA;EACWwD,cAAcA,CAAiCxD,IAAY,EAAY;IAC1E,IAAMyD,aAAa,GAAG,IAAI,CAACpD,MAAM,CAACY,GAAG,CAACjB,IAAI,CAAC;IAC3C,IAAIyD,aAAa,EAAE;MACf,OAAOA,aAAa;IACxB;IACA,IAAMC,aAAa,GAAG,IAAI,CAACP,cAAc,CAAClC,GAAG,CAACjB,IAAI,CAAC;IACnD,IAAI0D,aAAa,EAAE;MACf,OAAOA,aAAa,CAACC,UAAU,CAAI,CAAC;IACxC;IACA,OAAO,IAAI;EACf;EAEO5D,cAAcA,CAACC,IAAY,EAAEC,OAAY,EAAe;IAC3D,IAAM2D,SAAS,GAAG,IAAI,CAACvD,MAAM,CAACY,GAAG,CAACjB,IAAI,CAAC;IACvC,IAAI,CAACK,MAAM,CAACwD,GAAG,CAAC7D,IAAI,EAAEC,OAAO,CAAC;IAC9B;IACA;IACA;IACA,OAAOqD,OAAO,CAACC,OAAO,CAAC,CAAC,CAACO,IAAI,CAAC,MAAM;MAChC,IAAMC,KAAK,GAAG,IAAIjG,WAAW,CAAC;QAAEkC,IAAI;QAAEC;MAAQ,CAAC,CAAC;MAChD,IAAI,CAAC+D,IAAI,CAAC7F,WAAW,CAAC8F,WAAW,EAAEF,KAAK,EAAEH,SAAS,CAAC;MACpD,OAAO,CAAC,CAAC;IACb,CAAC,CAAC;EACN;AACJ;;AAEA;AACA;AACA;AACA;AACA;AACA,MAAM/E,qBAAqB,CAA8C;EAAAP,YAAA;IAAAG,eAAA,sBACvC,IAAI2E,GAAG,CAAqB,CAAC;EAAA;EAE3D;EACOc,uBAAuBA,CAAClE,IAAY,EAAEmE,iBAAyB,EAA8B;IAChG,OAAO,IAAI,CAACC,kBAAkB,CAACpE,IAAI,EAAEmE,iBAAiB,CAAC;EAC3D;EAEOjD,yBAAyBA,CAAClB,IAAY,EAAE+B,GAAe,EAAiB;IAC3E,IAAI,CAACf,WAAW,CAAC6C,GAAG,CAAC7D,IAAI,EAAE+B,GAAG,CAAC;IAC/B,OAAOuB,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;EACOa,kBAAkBA,CAACpE,IAAY,EAAEqE,cAAsB,EAA8B;IAAA,IAAAC,qBAAA;IACxF,OAAOhB,OAAO,CAACC,OAAO,EAAAe,qBAAA,GAAC,IAAI,CAACtD,WAAW,CAACC,GAAG,CAACjB,IAAI,CAAC,cAAAsE,qBAAA,cAAAA,qBAAA,GAAI,IAAI,CAAC;EAC9D;EAEOC,oBAAoBA,CAACvD,WAAuC,EAAQ;IACvE,KAAK,IAAM,CAAChB,IAAI,EAAET,UAAU,CAAC,IAAIyC,MAAM,CAACC,OAAO,CAACjB,WAAW,CAAC,EAAE;MAC1D,IAAI,CAACA,WAAW,CAAC6C,GAAG,CAAC7D,IAAI,EAAET,UAAU,CAAC;IAC1C;EACJ;AACJ;;AAEA;AACA;AACA;AACA;AACA,MAAMR,mBAAmB,CAAC;EAGfT,WAAWA,CAAkBE,uBAA0C,EAAE;IAAA,KAA5CA,uBAA0C,GAA1CA,uBAA0C;IAAAC,eAAA,sBAF/C,IAAI2E,GAAG,CAAqB,CAAC;EAEqB;EAEpEoB,mBAAmBA,CAAAC,IAAA,EAE5B3C,IAAY,EACwB;IAAA,IAAA4C,MAAA;IAAA,OAAAvE,iBAAA;MAAA,IAAAwE,qBAAA;MAAA,IAFpC;QAAEzF;MAA4D,CAAC,GAAAuF,IAAA;MAG/D,KAAK,IAAMG,KAAK,IAAI5C,MAAM,CAAC9C,IAAI,CAACA,IAAI,CAAC,EAAE;QACnC,IAAMK,UAAU,GAAGmF,MAAI,CAAC1D,WAAW,CAACC,GAAG,CAAC2D,KAAK,CAAC;QAC9C,IAAIrF,UAAU,EAAE;UACZ,OAAO,CAACqF,KAAK,EAAErF,UAAU,CAAC;QAC9B;MACJ;MACA;MACA;MACA,IAAImF,MAAI,aAAJA,MAAI,gBAAAC,qBAAA,GAAJD,MAAI,CAAElG,uBAAuB,cAAAmG,qBAAA,eAA7BA,qBAAA,CAA+BH,mBAAmB,EAAE;QACpD,IAAMK,MAAM,SAASH,MAAI,CAAClG,uBAAuB,CAACgG,mBAAmB,CAAC;UAAEtF;QAAK,CAAC,EAAE4C,IAAI,CAAC;QACrF,IAAI+C,MAAM,EAAE;UACR,IAAM,CAACD,MAAK,EAAErF,WAAU,CAAC,GAAGsF,MAAM;UAClCH,MAAI,CAAC1D,WAAW,CAAC6C,GAAG,CAACe,MAAK,EAAErF,WAAU,CAAC;QAC3C;QACA,OAAOsF,MAAM;MACjB;MACA,OAAO,IAAI;IAAC;EAChB;EAEOC,aAAaA,CAACF,KAAa,EAAEG,OAAoC,EAAEC,OAAmB,EAAQ;IAAA,IAAAC,qBAAA,EAAAC,sBAAA;IACjG,IAAI,CAAClE,WAAW,CAAC6C,GAAG,CAACe,KAAK,EAAEI,OAAO,CAAC;IACpC;IACA,CAAAC,qBAAA,OAAI,CAACzG,uBAAuB,cAAAyG,qBAAA,gBAAAC,sBAAA,GAA5BD,qBAAA,CAA8BE,qBAAqB,cAAAD,sBAAA,eAAnDA,sBAAA,CAAA/D,IAAA,CAAA8D,qBAAA,EAAsDL,KAAK,EAAEG,OAAO,EAAEC,OAAO,CAAC;EAClF;AACJ","ignoreList":[]}