@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-4
Sign up to get free protection for your applications and to get access to all the features.
- package/git-revision.txt +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +2 -1221
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +331 -2821
- package/lib/client.js.map +1 -1
- package/lib/embedded.d.ts +0 -22
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +24 -166
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/matrix.d.ts +0 -19
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -26
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event.d.ts +0 -94
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +0 -274
- package/lib/models/event.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +10 -26
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +0 -18
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +94 -148
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +0 -1
- package/lib/models/thread.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +2 -3
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +41 -90
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sync.d.ts +0 -12
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +1 -73
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +0 -48
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +0 -105
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +1 -3
- package/src/@types/global.d.ts +0 -3
- package/src/browser-index.ts +0 -11
- package/src/client.ts +60 -2882
- package/src/embedded.ts +3 -130
- package/src/event-mapper.ts +0 -4
- package/src/matrix.ts +0 -28
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event.ts +0 -289
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-state.ts +2 -8
- package/src/models/room.ts +0 -62
- package/src/models/thread.ts +0 -1
- package/src/sliding-sync-sdk.ts +2 -72
- package/src/sync.ts +1 -98
- package/src/testing.ts +0 -108
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1209
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4097
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4414
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
@@ -1,1250 +0,0 @@
|
|
1
|
-
/*
|
2
|
-
Copyright 2017 - 2021 The Matrix.org Foundation C.I.C.
|
3
|
-
|
4
|
-
Licensed under the Apache License, Version 2.0 (the "License");
|
5
|
-
you may not use this file except in compliance with the License.
|
6
|
-
You may obtain a copy of the License at
|
7
|
-
|
8
|
-
http://www.apache.org/licenses/LICENSE-2.0
|
9
|
-
|
10
|
-
Unless required by applicable law or agreed to in writing, software
|
11
|
-
distributed under the License is distributed on an "AS IS" BASIS,
|
12
|
-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
13
|
-
See the License for the specific language governing permissions and
|
14
|
-
limitations under the License.
|
15
|
-
*/
|
16
|
-
|
17
|
-
import { Logger, logger } from "../../logger.ts";
|
18
|
-
import { deepCompare } from "../../utils.ts";
|
19
|
-
import {
|
20
|
-
CryptoStore,
|
21
|
-
IDeviceData,
|
22
|
-
IProblem,
|
23
|
-
ISession,
|
24
|
-
SessionExtended,
|
25
|
-
ISessionInfo,
|
26
|
-
IWithheld,
|
27
|
-
MigrationState,
|
28
|
-
Mode,
|
29
|
-
OutgoingRoomKeyRequest,
|
30
|
-
ParkedSharedHistory,
|
31
|
-
SecretStorePrivateKeys,
|
32
|
-
SESSION_BATCH_SIZE,
|
33
|
-
ACCOUNT_OBJECT_KEY_MIGRATION_STATE,
|
34
|
-
} from "./base.ts";
|
35
|
-
import { IRoomKeyRequestBody, IRoomKeyRequestRecipient } from "../index.ts";
|
36
|
-
import { IOlmDevice } from "../algorithms/megolm.ts";
|
37
|
-
import { IRoomEncryption } from "../RoomList.ts";
|
38
|
-
import { InboundGroupSessionData } from "../OlmDevice.ts";
|
39
|
-
import { IndexedDBCryptoStore } from "./indexeddb-crypto-store.ts";
|
40
|
-
import { CrossSigningKeyInfo } from "../../crypto-api/index.ts";
|
41
|
-
|
42
|
-
const PROFILE_TRANSACTIONS = false;
|
43
|
-
|
44
|
-
/**
|
45
|
-
* Implementation of a CryptoStore which is backed by an existing
|
46
|
-
* IndexedDB connection. Generally you want IndexedDBCryptoStore
|
47
|
-
* which connects to the database and defers to one of these.
|
48
|
-
*
|
49
|
-
* @internal
|
50
|
-
*/
|
51
|
-
export class Backend implements CryptoStore {
|
52
|
-
private nextTxnId = 0;
|
53
|
-
|
54
|
-
/**
|
55
|
-
*/
|
56
|
-
public constructor(private db: IDBDatabase) {
|
57
|
-
// make sure we close the db on `onversionchange` - otherwise
|
58
|
-
// attempts to delete the database will block (and subsequent
|
59
|
-
// attempts to re-create it will also block).
|
60
|
-
db.onversionchange = (): void => {
|
61
|
-
logger.log(`versionchange for indexeddb ${this.db.name}: closing`);
|
62
|
-
db.close();
|
63
|
-
};
|
64
|
-
}
|
65
|
-
|
66
|
-
public async containsData(): Promise<boolean> {
|
67
|
-
throw Error("Not implemented for Backend");
|
68
|
-
}
|
69
|
-
|
70
|
-
public async startup(): Promise<CryptoStore> {
|
71
|
-
// No work to do, as the startup is done by the caller (e.g IndexedDBCryptoStore)
|
72
|
-
// by passing us a ready IDBDatabase instance
|
73
|
-
return this;
|
74
|
-
}
|
75
|
-
|
76
|
-
public async deleteAllData(): Promise<void> {
|
77
|
-
throw Error("This is not implemented, call IDBFactory::deleteDatabase(dbName) instead.");
|
78
|
-
}
|
79
|
-
|
80
|
-
/**
|
81
|
-
* Get data on how much of the libolm to Rust Crypto migration has been done.
|
82
|
-
*
|
83
|
-
* Implementation of {@link CryptoStore.getMigrationState}.
|
84
|
-
*/
|
85
|
-
public async getMigrationState(): Promise<MigrationState> {
|
86
|
-
let migrationState = MigrationState.NOT_STARTED;
|
87
|
-
await this.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
|
88
|
-
const objectStore = txn.objectStore(IndexedDBCryptoStore.STORE_ACCOUNT);
|
89
|
-
const getReq = objectStore.get(ACCOUNT_OBJECT_KEY_MIGRATION_STATE);
|
90
|
-
getReq.onsuccess = (): void => {
|
91
|
-
migrationState = getReq.result ?? MigrationState.NOT_STARTED;
|
92
|
-
};
|
93
|
-
});
|
94
|
-
return migrationState;
|
95
|
-
}
|
96
|
-
|
97
|
-
/**
|
98
|
-
* Set data on how much of the libolm to Rust Crypto migration has been done.
|
99
|
-
*
|
100
|
-
* Implementation of {@link CryptoStore.setMigrationState}.
|
101
|
-
*/
|
102
|
-
public async setMigrationState(migrationState: MigrationState): Promise<void> {
|
103
|
-
await this.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
|
104
|
-
const objectStore = txn.objectStore(IndexedDBCryptoStore.STORE_ACCOUNT);
|
105
|
-
objectStore.put(migrationState, ACCOUNT_OBJECT_KEY_MIGRATION_STATE);
|
106
|
-
});
|
107
|
-
}
|
108
|
-
|
109
|
-
/**
|
110
|
-
* Look for an existing outgoing room key request, and if none is found,
|
111
|
-
* add a new one
|
112
|
-
*
|
113
|
-
*
|
114
|
-
* @returns resolves to
|
115
|
-
* {@link OutgoingRoomKeyRequest}: either the
|
116
|
-
* same instance as passed in, or the existing one.
|
117
|
-
*/
|
118
|
-
public getOrAddOutgoingRoomKeyRequest(request: OutgoingRoomKeyRequest): Promise<OutgoingRoomKeyRequest> {
|
119
|
-
const requestBody = request.requestBody;
|
120
|
-
|
121
|
-
return new Promise((resolve, reject) => {
|
122
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readwrite");
|
123
|
-
txn.onerror = reject;
|
124
|
-
|
125
|
-
// first see if we already have an entry for this request.
|
126
|
-
this._getOutgoingRoomKeyRequest(txn, requestBody, (existing) => {
|
127
|
-
if (existing) {
|
128
|
-
// this entry matches the request - return it.
|
129
|
-
logger.log(
|
130
|
-
`already have key request outstanding for ` +
|
131
|
-
`${requestBody.room_id} / ${requestBody.session_id}: ` +
|
132
|
-
`not sending another`,
|
133
|
-
);
|
134
|
-
resolve(existing);
|
135
|
-
return;
|
136
|
-
}
|
137
|
-
|
138
|
-
// we got to the end of the list without finding a match
|
139
|
-
// - add the new request.
|
140
|
-
logger.log(`enqueueing key request for ${requestBody.room_id} / ` + requestBody.session_id);
|
141
|
-
txn.oncomplete = (): void => {
|
142
|
-
resolve(request);
|
143
|
-
};
|
144
|
-
const store = txn.objectStore("outgoingRoomKeyRequests");
|
145
|
-
store.add(request);
|
146
|
-
});
|
147
|
-
});
|
148
|
-
}
|
149
|
-
|
150
|
-
/**
|
151
|
-
* Look for an existing room key request
|
152
|
-
*
|
153
|
-
* @param requestBody - existing request to look for
|
154
|
-
*
|
155
|
-
* @returns resolves to the matching
|
156
|
-
* {@link OutgoingRoomKeyRequest}, or null if
|
157
|
-
* not found
|
158
|
-
*/
|
159
|
-
public getOutgoingRoomKeyRequest(requestBody: IRoomKeyRequestBody): Promise<OutgoingRoomKeyRequest | null> {
|
160
|
-
return new Promise((resolve, reject) => {
|
161
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readonly");
|
162
|
-
txn.onerror = reject;
|
163
|
-
|
164
|
-
this._getOutgoingRoomKeyRequest(txn, requestBody, (existing) => {
|
165
|
-
resolve(existing);
|
166
|
-
});
|
167
|
-
});
|
168
|
-
}
|
169
|
-
|
170
|
-
/**
|
171
|
-
* look for an existing room key request in the db
|
172
|
-
*
|
173
|
-
* @internal
|
174
|
-
* @param txn - database transaction
|
175
|
-
* @param requestBody - existing request to look for
|
176
|
-
* @param callback - function to call with the results of the
|
177
|
-
* search. Either passed a matching
|
178
|
-
* {@link OutgoingRoomKeyRequest}, or null if
|
179
|
-
* not found.
|
180
|
-
*/
|
181
|
-
// eslint-disable-next-line @typescript-eslint/naming-convention
|
182
|
-
private _getOutgoingRoomKeyRequest(
|
183
|
-
txn: IDBTransaction,
|
184
|
-
requestBody: IRoomKeyRequestBody,
|
185
|
-
callback: (req: OutgoingRoomKeyRequest | null) => void,
|
186
|
-
): void {
|
187
|
-
const store = txn.objectStore("outgoingRoomKeyRequests");
|
188
|
-
|
189
|
-
const idx = store.index("session");
|
190
|
-
const cursorReq = idx.openCursor([requestBody.room_id, requestBody.session_id]);
|
191
|
-
|
192
|
-
cursorReq.onsuccess = (): void => {
|
193
|
-
const cursor = cursorReq.result;
|
194
|
-
if (!cursor) {
|
195
|
-
// no match found
|
196
|
-
callback(null);
|
197
|
-
return;
|
198
|
-
}
|
199
|
-
|
200
|
-
const existing = cursor.value;
|
201
|
-
|
202
|
-
if (deepCompare(existing.requestBody, requestBody)) {
|
203
|
-
// got a match
|
204
|
-
callback(existing);
|
205
|
-
return;
|
206
|
-
}
|
207
|
-
|
208
|
-
// look at the next entry in the index
|
209
|
-
cursor.continue();
|
210
|
-
};
|
211
|
-
}
|
212
|
-
|
213
|
-
/**
|
214
|
-
* Look for room key requests by state
|
215
|
-
*
|
216
|
-
* @param wantedStates - list of acceptable states
|
217
|
-
*
|
218
|
-
* @returns resolves to the a
|
219
|
-
* {@link OutgoingRoomKeyRequest}, or null if
|
220
|
-
* there are no pending requests in those states. If there are multiple
|
221
|
-
* requests in those states, an arbitrary one is chosen.
|
222
|
-
*/
|
223
|
-
public getOutgoingRoomKeyRequestByState(wantedStates: number[]): Promise<OutgoingRoomKeyRequest | null> {
|
224
|
-
if (wantedStates.length === 0) {
|
225
|
-
return Promise.resolve(null);
|
226
|
-
}
|
227
|
-
|
228
|
-
// this is a bit tortuous because we need to make sure we do the lookup
|
229
|
-
// in a single transaction, to avoid having a race with the insertion
|
230
|
-
// code.
|
231
|
-
|
232
|
-
// index into the wantedStates array
|
233
|
-
let stateIndex = 0;
|
234
|
-
let result: OutgoingRoomKeyRequest;
|
235
|
-
|
236
|
-
function onsuccess(this: IDBRequest<IDBCursorWithValue | null>): void {
|
237
|
-
const cursor = this.result;
|
238
|
-
if (cursor) {
|
239
|
-
// got a match
|
240
|
-
result = cursor.value;
|
241
|
-
return;
|
242
|
-
}
|
243
|
-
|
244
|
-
// try the next state in the list
|
245
|
-
stateIndex++;
|
246
|
-
if (stateIndex >= wantedStates.length) {
|
247
|
-
// no matches
|
248
|
-
return;
|
249
|
-
}
|
250
|
-
|
251
|
-
const wantedState = wantedStates[stateIndex];
|
252
|
-
const cursorReq = (this.source as IDBIndex).openCursor(wantedState);
|
253
|
-
cursorReq.onsuccess = onsuccess;
|
254
|
-
}
|
255
|
-
|
256
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readonly");
|
257
|
-
const store = txn.objectStore("outgoingRoomKeyRequests");
|
258
|
-
|
259
|
-
const wantedState = wantedStates[stateIndex];
|
260
|
-
const cursorReq = store.index("state").openCursor(wantedState);
|
261
|
-
cursorReq.onsuccess = onsuccess;
|
262
|
-
|
263
|
-
return promiseifyTxn(txn).then(() => result);
|
264
|
-
}
|
265
|
-
|
266
|
-
/**
|
267
|
-
*
|
268
|
-
* @returns All elements in a given state
|
269
|
-
*/
|
270
|
-
public getAllOutgoingRoomKeyRequestsByState(wantedState: number): Promise<OutgoingRoomKeyRequest[]> {
|
271
|
-
return new Promise((resolve, reject) => {
|
272
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readonly");
|
273
|
-
const store = txn.objectStore("outgoingRoomKeyRequests");
|
274
|
-
const index = store.index("state");
|
275
|
-
const request = index.getAll(wantedState);
|
276
|
-
|
277
|
-
request.onsuccess = (): void => resolve(request.result);
|
278
|
-
request.onerror = (): void => reject(request.error);
|
279
|
-
});
|
280
|
-
}
|
281
|
-
|
282
|
-
public getOutgoingRoomKeyRequestsByTarget(
|
283
|
-
userId: string,
|
284
|
-
deviceId: string,
|
285
|
-
wantedStates: number[],
|
286
|
-
): Promise<OutgoingRoomKeyRequest[]> {
|
287
|
-
let stateIndex = 0;
|
288
|
-
const results: OutgoingRoomKeyRequest[] = [];
|
289
|
-
|
290
|
-
function onsuccess(this: IDBRequest<IDBCursorWithValue | null>): void {
|
291
|
-
const cursor = this.result;
|
292
|
-
if (cursor) {
|
293
|
-
const keyReq = cursor.value;
|
294
|
-
if (
|
295
|
-
keyReq.recipients.some(
|
296
|
-
(recipient: IRoomKeyRequestRecipient) =>
|
297
|
-
recipient.userId === userId && recipient.deviceId === deviceId,
|
298
|
-
)
|
299
|
-
) {
|
300
|
-
results.push(keyReq);
|
301
|
-
}
|
302
|
-
cursor.continue();
|
303
|
-
} else {
|
304
|
-
// try the next state in the list
|
305
|
-
stateIndex++;
|
306
|
-
if (stateIndex >= wantedStates.length) {
|
307
|
-
// no matches
|
308
|
-
return;
|
309
|
-
}
|
310
|
-
|
311
|
-
const wantedState = wantedStates[stateIndex];
|
312
|
-
const cursorReq = (this.source as IDBIndex).openCursor(wantedState);
|
313
|
-
cursorReq.onsuccess = onsuccess;
|
314
|
-
}
|
315
|
-
}
|
316
|
-
|
317
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readonly");
|
318
|
-
const store = txn.objectStore("outgoingRoomKeyRequests");
|
319
|
-
|
320
|
-
const wantedState = wantedStates[stateIndex];
|
321
|
-
const cursorReq = store.index("state").openCursor(wantedState);
|
322
|
-
cursorReq.onsuccess = onsuccess;
|
323
|
-
|
324
|
-
return promiseifyTxn(txn).then(() => results);
|
325
|
-
}
|
326
|
-
|
327
|
-
/**
|
328
|
-
* Look for an existing room key request by id and state, and update it if
|
329
|
-
* found
|
330
|
-
*
|
331
|
-
* @param requestId - ID of request to update
|
332
|
-
* @param expectedState - state we expect to find the request in
|
333
|
-
* @param updates - name/value map of updates to apply
|
334
|
-
*
|
335
|
-
* @returns resolves to
|
336
|
-
* {@link OutgoingRoomKeyRequest}
|
337
|
-
* updated request, or null if no matching row was found
|
338
|
-
*/
|
339
|
-
public updateOutgoingRoomKeyRequest(
|
340
|
-
requestId: string,
|
341
|
-
expectedState: number,
|
342
|
-
updates: Partial<OutgoingRoomKeyRequest>,
|
343
|
-
): Promise<OutgoingRoomKeyRequest | null> {
|
344
|
-
let result: OutgoingRoomKeyRequest | null = null;
|
345
|
-
|
346
|
-
function onsuccess(this: IDBRequest<IDBCursorWithValue | null>): void {
|
347
|
-
const cursor = this.result;
|
348
|
-
if (!cursor) {
|
349
|
-
return;
|
350
|
-
}
|
351
|
-
const data = cursor.value;
|
352
|
-
if (data.state != expectedState) {
|
353
|
-
logger.warn(
|
354
|
-
`Cannot update room key request from ${expectedState} ` +
|
355
|
-
`as it was already updated to ${data.state}`,
|
356
|
-
);
|
357
|
-
return;
|
358
|
-
}
|
359
|
-
Object.assign(data, updates);
|
360
|
-
cursor.update(data);
|
361
|
-
result = data;
|
362
|
-
}
|
363
|
-
|
364
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readwrite");
|
365
|
-
const cursorReq = txn.objectStore("outgoingRoomKeyRequests").openCursor(requestId);
|
366
|
-
cursorReq.onsuccess = onsuccess;
|
367
|
-
return promiseifyTxn(txn).then(() => result);
|
368
|
-
}
|
369
|
-
|
370
|
-
/**
|
371
|
-
* Look for an existing room key request by id and state, and delete it if
|
372
|
-
* found
|
373
|
-
*
|
374
|
-
* @param requestId - ID of request to update
|
375
|
-
* @param expectedState - state we expect to find the request in
|
376
|
-
*
|
377
|
-
* @returns resolves once the operation is completed
|
378
|
-
*/
|
379
|
-
public deleteOutgoingRoomKeyRequest(
|
380
|
-
requestId: string,
|
381
|
-
expectedState: number,
|
382
|
-
): Promise<OutgoingRoomKeyRequest | null> {
|
383
|
-
const txn = this.db.transaction("outgoingRoomKeyRequests", "readwrite");
|
384
|
-
const cursorReq = txn.objectStore("outgoingRoomKeyRequests").openCursor(requestId);
|
385
|
-
cursorReq.onsuccess = (): void => {
|
386
|
-
const cursor = cursorReq.result;
|
387
|
-
if (!cursor) {
|
388
|
-
return;
|
389
|
-
}
|
390
|
-
const data = cursor.value;
|
391
|
-
if (data.state != expectedState) {
|
392
|
-
logger.warn(`Cannot delete room key request in state ${data.state} ` + `(expected ${expectedState})`);
|
393
|
-
return;
|
394
|
-
}
|
395
|
-
cursor.delete();
|
396
|
-
};
|
397
|
-
return promiseifyTxn<OutgoingRoomKeyRequest | null>(txn);
|
398
|
-
}
|
399
|
-
|
400
|
-
// Olm Account
|
401
|
-
|
402
|
-
public getAccount(txn: IDBTransaction, func: (accountPickle: string | null) => void): void {
|
403
|
-
const objectStore = txn.objectStore("account");
|
404
|
-
const getReq = objectStore.get("-");
|
405
|
-
getReq.onsuccess = function (): void {
|
406
|
-
try {
|
407
|
-
func(getReq.result || null);
|
408
|
-
} catch (e) {
|
409
|
-
abortWithException(txn, <Error>e);
|
410
|
-
}
|
411
|
-
};
|
412
|
-
}
|
413
|
-
|
414
|
-
public storeAccount(txn: IDBTransaction, accountPickle: string): void {
|
415
|
-
const objectStore = txn.objectStore("account");
|
416
|
-
objectStore.put(accountPickle, "-");
|
417
|
-
}
|
418
|
-
|
419
|
-
public getCrossSigningKeys(
|
420
|
-
txn: IDBTransaction,
|
421
|
-
func: (keys: Record<string, CrossSigningKeyInfo> | null) => void,
|
422
|
-
): void {
|
423
|
-
const objectStore = txn.objectStore("account");
|
424
|
-
const getReq = objectStore.get("crossSigningKeys");
|
425
|
-
getReq.onsuccess = function (): void {
|
426
|
-
try {
|
427
|
-
func(getReq.result || null);
|
428
|
-
} catch (e) {
|
429
|
-
abortWithException(txn, <Error>e);
|
430
|
-
}
|
431
|
-
};
|
432
|
-
}
|
433
|
-
|
434
|
-
public getSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(
|
435
|
-
txn: IDBTransaction,
|
436
|
-
func: (key: SecretStorePrivateKeys[K] | null) => void,
|
437
|
-
type: K,
|
438
|
-
): void {
|
439
|
-
const objectStore = txn.objectStore("account");
|
440
|
-
const getReq = objectStore.get(`ssss_cache:${type}`);
|
441
|
-
getReq.onsuccess = function (): void {
|
442
|
-
try {
|
443
|
-
func(getReq.result || null);
|
444
|
-
} catch (e) {
|
445
|
-
abortWithException(txn, <Error>e);
|
446
|
-
}
|
447
|
-
};
|
448
|
-
}
|
449
|
-
|
450
|
-
public storeCrossSigningKeys(txn: IDBTransaction, keys: Record<string, CrossSigningKeyInfo>): void {
|
451
|
-
const objectStore = txn.objectStore("account");
|
452
|
-
objectStore.put(keys, "crossSigningKeys");
|
453
|
-
}
|
454
|
-
|
455
|
-
public storeSecretStorePrivateKey<K extends keyof SecretStorePrivateKeys>(
|
456
|
-
txn: IDBTransaction,
|
457
|
-
type: K,
|
458
|
-
key: SecretStorePrivateKeys[K],
|
459
|
-
): void {
|
460
|
-
const objectStore = txn.objectStore("account");
|
461
|
-
objectStore.put(key, `ssss_cache:${type}`);
|
462
|
-
}
|
463
|
-
|
464
|
-
// Olm Sessions
|
465
|
-
|
466
|
-
public countEndToEndSessions(txn: IDBTransaction, func: (count: number) => void): void {
|
467
|
-
const objectStore = txn.objectStore("sessions");
|
468
|
-
const countReq = objectStore.count();
|
469
|
-
countReq.onsuccess = function (): void {
|
470
|
-
try {
|
471
|
-
func(countReq.result);
|
472
|
-
} catch (e) {
|
473
|
-
abortWithException(txn, <Error>e);
|
474
|
-
}
|
475
|
-
};
|
476
|
-
}
|
477
|
-
|
478
|
-
public getEndToEndSessions(
|
479
|
-
deviceKey: string,
|
480
|
-
txn: IDBTransaction,
|
481
|
-
func: (sessions: { [sessionId: string]: ISessionInfo }) => void,
|
482
|
-
): void {
|
483
|
-
const objectStore = txn.objectStore("sessions");
|
484
|
-
const idx = objectStore.index("deviceKey");
|
485
|
-
const getReq = idx.openCursor(deviceKey);
|
486
|
-
const results: Parameters<Parameters<Backend["getEndToEndSessions"]>[2]>[0] = {};
|
487
|
-
getReq.onsuccess = function (): void {
|
488
|
-
const cursor = getReq.result;
|
489
|
-
if (cursor) {
|
490
|
-
results[cursor.value.sessionId] = {
|
491
|
-
session: cursor.value.session,
|
492
|
-
lastReceivedMessageTs: cursor.value.lastReceivedMessageTs,
|
493
|
-
};
|
494
|
-
cursor.continue();
|
495
|
-
} else {
|
496
|
-
try {
|
497
|
-
func(results);
|
498
|
-
} catch (e) {
|
499
|
-
abortWithException(txn, <Error>e);
|
500
|
-
}
|
501
|
-
}
|
502
|
-
};
|
503
|
-
}
|
504
|
-
|
505
|
-
public getEndToEndSession(
|
506
|
-
deviceKey: string,
|
507
|
-
sessionId: string,
|
508
|
-
txn: IDBTransaction,
|
509
|
-
func: (session: ISessionInfo | null) => void,
|
510
|
-
): void {
|
511
|
-
const objectStore = txn.objectStore("sessions");
|
512
|
-
const getReq = objectStore.get([deviceKey, sessionId]);
|
513
|
-
getReq.onsuccess = function (): void {
|
514
|
-
try {
|
515
|
-
if (getReq.result) {
|
516
|
-
func({
|
517
|
-
session: getReq.result.session,
|
518
|
-
lastReceivedMessageTs: getReq.result.lastReceivedMessageTs,
|
519
|
-
});
|
520
|
-
} else {
|
521
|
-
func(null);
|
522
|
-
}
|
523
|
-
} catch (e) {
|
524
|
-
abortWithException(txn, <Error>e);
|
525
|
-
}
|
526
|
-
};
|
527
|
-
}
|
528
|
-
|
529
|
-
public getAllEndToEndSessions(txn: IDBTransaction, func: (session: ISessionInfo | null) => void): void {
|
530
|
-
const objectStore = txn.objectStore("sessions");
|
531
|
-
const getReq = objectStore.openCursor();
|
532
|
-
getReq.onsuccess = function (): void {
|
533
|
-
try {
|
534
|
-
const cursor = getReq.result;
|
535
|
-
if (cursor) {
|
536
|
-
func(cursor.value);
|
537
|
-
cursor.continue();
|
538
|
-
} else {
|
539
|
-
func(null);
|
540
|
-
}
|
541
|
-
} catch (e) {
|
542
|
-
abortWithException(txn, <Error>e);
|
543
|
-
}
|
544
|
-
};
|
545
|
-
}
|
546
|
-
|
547
|
-
public storeEndToEndSession(
|
548
|
-
deviceKey: string,
|
549
|
-
sessionId: string,
|
550
|
-
sessionInfo: ISessionInfo,
|
551
|
-
txn: IDBTransaction,
|
552
|
-
): void {
|
553
|
-
const objectStore = txn.objectStore("sessions");
|
554
|
-
objectStore.put({
|
555
|
-
deviceKey,
|
556
|
-
sessionId,
|
557
|
-
session: sessionInfo.session,
|
558
|
-
lastReceivedMessageTs: sessionInfo.lastReceivedMessageTs,
|
559
|
-
});
|
560
|
-
}
|
561
|
-
|
562
|
-
public async storeEndToEndSessionProblem(deviceKey: string, type: string, fixed: boolean): Promise<void> {
|
563
|
-
const txn = this.db.transaction("session_problems", "readwrite");
|
564
|
-
const objectStore = txn.objectStore("session_problems");
|
565
|
-
objectStore.put({
|
566
|
-
deviceKey,
|
567
|
-
type,
|
568
|
-
fixed,
|
569
|
-
time: Date.now(),
|
570
|
-
});
|
571
|
-
await promiseifyTxn(txn);
|
572
|
-
}
|
573
|
-
|
574
|
-
public async getEndToEndSessionProblem(deviceKey: string, timestamp: number): Promise<IProblem | null> {
|
575
|
-
let result: IProblem | null = null;
|
576
|
-
const txn = this.db.transaction("session_problems", "readwrite");
|
577
|
-
const objectStore = txn.objectStore("session_problems");
|
578
|
-
const index = objectStore.index("deviceKey");
|
579
|
-
const req = index.getAll(deviceKey);
|
580
|
-
req.onsuccess = (): void => {
|
581
|
-
const problems = req.result;
|
582
|
-
if (!problems.length) {
|
583
|
-
result = null;
|
584
|
-
return;
|
585
|
-
}
|
586
|
-
problems.sort((a, b) => {
|
587
|
-
return a.time - b.time;
|
588
|
-
});
|
589
|
-
const lastProblem = problems[problems.length - 1];
|
590
|
-
for (const problem of problems) {
|
591
|
-
if (problem.time > timestamp) {
|
592
|
-
result = Object.assign({}, problem, { fixed: lastProblem.fixed });
|
593
|
-
return;
|
594
|
-
}
|
595
|
-
}
|
596
|
-
if (lastProblem.fixed) {
|
597
|
-
result = null;
|
598
|
-
} else {
|
599
|
-
result = lastProblem;
|
600
|
-
}
|
601
|
-
};
|
602
|
-
await promiseifyTxn(txn);
|
603
|
-
return result;
|
604
|
-
}
|
605
|
-
|
606
|
-
// FIXME: we should probably prune this when devices get deleted
|
607
|
-
public async filterOutNotifiedErrorDevices(devices: IOlmDevice[]): Promise<IOlmDevice[]> {
|
608
|
-
const txn = this.db.transaction("notified_error_devices", "readwrite");
|
609
|
-
const objectStore = txn.objectStore("notified_error_devices");
|
610
|
-
|
611
|
-
const ret: IOlmDevice[] = [];
|
612
|
-
|
613
|
-
await Promise.all(
|
614
|
-
devices.map((device) => {
|
615
|
-
return new Promise<void>((resolve) => {
|
616
|
-
const { userId, deviceInfo } = device;
|
617
|
-
const getReq = objectStore.get([userId, deviceInfo.deviceId]);
|
618
|
-
getReq.onsuccess = function (): void {
|
619
|
-
if (!getReq.result) {
|
620
|
-
objectStore.put({ userId, deviceId: deviceInfo.deviceId });
|
621
|
-
ret.push(device);
|
622
|
-
}
|
623
|
-
resolve();
|
624
|
-
};
|
625
|
-
});
|
626
|
-
}),
|
627
|
-
);
|
628
|
-
|
629
|
-
return ret;
|
630
|
-
}
|
631
|
-
|
632
|
-
/**
|
633
|
-
* Fetch a batch of Olm sessions from the database.
|
634
|
-
*
|
635
|
-
* Implementation of {@link CryptoStore.getEndToEndSessionsBatch}.
|
636
|
-
*/
|
637
|
-
public async getEndToEndSessionsBatch(): Promise<null | ISessionInfo[]> {
|
638
|
-
const result: ISessionInfo[] = [];
|
639
|
-
await this.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], (txn) => {
|
640
|
-
const objectStore = txn.objectStore(IndexedDBCryptoStore.STORE_SESSIONS);
|
641
|
-
const getReq = objectStore.openCursor();
|
642
|
-
getReq.onsuccess = function (): void {
|
643
|
-
try {
|
644
|
-
const cursor = getReq.result;
|
645
|
-
if (cursor) {
|
646
|
-
result.push(cursor.value);
|
647
|
-
if (result.length < SESSION_BATCH_SIZE) {
|
648
|
-
cursor.continue();
|
649
|
-
}
|
650
|
-
}
|
651
|
-
} catch (e) {
|
652
|
-
abortWithException(txn, <Error>e);
|
653
|
-
}
|
654
|
-
};
|
655
|
-
});
|
656
|
-
|
657
|
-
if (result.length === 0) {
|
658
|
-
// No sessions left.
|
659
|
-
return null;
|
660
|
-
}
|
661
|
-
|
662
|
-
return result;
|
663
|
-
}
|
664
|
-
|
665
|
-
/**
|
666
|
-
* Delete a batch of Olm sessions from the database.
|
667
|
-
*
|
668
|
-
* Implementation of {@link CryptoStore.deleteEndToEndSessionsBatch}.
|
669
|
-
*
|
670
|
-
* @internal
|
671
|
-
*/
|
672
|
-
public async deleteEndToEndSessionsBatch(sessions: { deviceKey: string; sessionId: string }[]): Promise<void> {
|
673
|
-
await this.doTxn("readwrite", [IndexedDBCryptoStore.STORE_SESSIONS], async (txn) => {
|
674
|
-
try {
|
675
|
-
const objectStore = txn.objectStore(IndexedDBCryptoStore.STORE_SESSIONS);
|
676
|
-
for (const { deviceKey, sessionId } of sessions) {
|
677
|
-
const req = objectStore.delete([deviceKey, sessionId]);
|
678
|
-
await new Promise((resolve) => {
|
679
|
-
req.onsuccess = resolve;
|
680
|
-
});
|
681
|
-
}
|
682
|
-
} catch (e) {
|
683
|
-
abortWithException(txn, <Error>e);
|
684
|
-
}
|
685
|
-
});
|
686
|
-
}
|
687
|
-
|
688
|
-
// Inbound group sessions
|
689
|
-
|
690
|
-
public getEndToEndInboundGroupSession(
|
691
|
-
senderCurve25519Key: string,
|
692
|
-
sessionId: string,
|
693
|
-
txn: IDBTransaction,
|
694
|
-
func: (groupSession: InboundGroupSessionData | null, groupSessionWithheld: IWithheld | null) => void,
|
695
|
-
): void {
|
696
|
-
let session: InboundGroupSessionData | null | boolean = false;
|
697
|
-
let withheld: IWithheld | null | boolean = false;
|
698
|
-
const objectStore = txn.objectStore("inbound_group_sessions");
|
699
|
-
const getReq = objectStore.get([senderCurve25519Key, sessionId]);
|
700
|
-
getReq.onsuccess = function (): void {
|
701
|
-
try {
|
702
|
-
if (getReq.result) {
|
703
|
-
session = getReq.result.session;
|
704
|
-
} else {
|
705
|
-
session = null;
|
706
|
-
}
|
707
|
-
if (withheld !== false) {
|
708
|
-
func(session as InboundGroupSessionData, withheld as IWithheld);
|
709
|
-
}
|
710
|
-
} catch (e) {
|
711
|
-
abortWithException(txn, <Error>e);
|
712
|
-
}
|
713
|
-
};
|
714
|
-
|
715
|
-
const withheldObjectStore = txn.objectStore("inbound_group_sessions_withheld");
|
716
|
-
const withheldGetReq = withheldObjectStore.get([senderCurve25519Key, sessionId]);
|
717
|
-
withheldGetReq.onsuccess = function (): void {
|
718
|
-
try {
|
719
|
-
if (withheldGetReq.result) {
|
720
|
-
withheld = withheldGetReq.result.session;
|
721
|
-
} else {
|
722
|
-
withheld = null;
|
723
|
-
}
|
724
|
-
if (session !== false) {
|
725
|
-
func(session as InboundGroupSessionData, withheld as IWithheld);
|
726
|
-
}
|
727
|
-
} catch (e) {
|
728
|
-
abortWithException(txn, <Error>e);
|
729
|
-
}
|
730
|
-
};
|
731
|
-
}
|
732
|
-
|
733
|
-
public getAllEndToEndInboundGroupSessions(txn: IDBTransaction, func: (session: ISession | null) => void): void {
|
734
|
-
const objectStore = txn.objectStore("inbound_group_sessions");
|
735
|
-
const getReq = objectStore.openCursor();
|
736
|
-
getReq.onsuccess = function (): void {
|
737
|
-
const cursor = getReq.result;
|
738
|
-
if (cursor) {
|
739
|
-
try {
|
740
|
-
func({
|
741
|
-
senderKey: cursor.value.senderCurve25519Key,
|
742
|
-
sessionId: cursor.value.sessionId,
|
743
|
-
sessionData: cursor.value.session,
|
744
|
-
});
|
745
|
-
} catch (e) {
|
746
|
-
abortWithException(txn, <Error>e);
|
747
|
-
}
|
748
|
-
cursor.continue();
|
749
|
-
} else {
|
750
|
-
try {
|
751
|
-
func(null);
|
752
|
-
} catch (e) {
|
753
|
-
abortWithException(txn, <Error>e);
|
754
|
-
}
|
755
|
-
}
|
756
|
-
};
|
757
|
-
}
|
758
|
-
|
759
|
-
public addEndToEndInboundGroupSession(
|
760
|
-
senderCurve25519Key: string,
|
761
|
-
sessionId: string,
|
762
|
-
sessionData: InboundGroupSessionData,
|
763
|
-
txn: IDBTransaction,
|
764
|
-
): void {
|
765
|
-
const objectStore = txn.objectStore("inbound_group_sessions");
|
766
|
-
const addReq = objectStore.add({
|
767
|
-
senderCurve25519Key,
|
768
|
-
sessionId,
|
769
|
-
session: sessionData,
|
770
|
-
});
|
771
|
-
addReq.onerror = (ev): void => {
|
772
|
-
if (addReq.error?.name === "ConstraintError") {
|
773
|
-
// This stops the error from triggering the txn's onerror
|
774
|
-
ev.stopPropagation();
|
775
|
-
// ...and this stops it from aborting the transaction
|
776
|
-
ev.preventDefault();
|
777
|
-
logger.log("Ignoring duplicate inbound group session: " + senderCurve25519Key + " / " + sessionId);
|
778
|
-
} else {
|
779
|
-
abortWithException(txn, new Error("Failed to add inbound group session: " + addReq.error));
|
780
|
-
}
|
781
|
-
};
|
782
|
-
}
|
783
|
-
|
784
|
-
public storeEndToEndInboundGroupSession(
|
785
|
-
senderCurve25519Key: string,
|
786
|
-
sessionId: string,
|
787
|
-
sessionData: InboundGroupSessionData,
|
788
|
-
txn: IDBTransaction,
|
789
|
-
): void {
|
790
|
-
const objectStore = txn.objectStore("inbound_group_sessions");
|
791
|
-
objectStore.put({
|
792
|
-
senderCurve25519Key,
|
793
|
-
sessionId,
|
794
|
-
session: sessionData,
|
795
|
-
});
|
796
|
-
}
|
797
|
-
|
798
|
-
public storeEndToEndInboundGroupSessionWithheld(
|
799
|
-
senderCurve25519Key: string,
|
800
|
-
sessionId: string,
|
801
|
-
sessionData: IWithheld,
|
802
|
-
txn: IDBTransaction,
|
803
|
-
): void {
|
804
|
-
const objectStore = txn.objectStore("inbound_group_sessions_withheld");
|
805
|
-
objectStore.put({
|
806
|
-
senderCurve25519Key,
|
807
|
-
sessionId,
|
808
|
-
session: sessionData,
|
809
|
-
});
|
810
|
-
}
|
811
|
-
|
812
|
-
/**
|
813
|
-
* Count the number of Megolm sessions in the database.
|
814
|
-
*
|
815
|
-
* Implementation of {@link CryptoStore.countEndToEndInboundGroupSessions}.
|
816
|
-
*
|
817
|
-
* @internal
|
818
|
-
*/
|
819
|
-
public async countEndToEndInboundGroupSessions(): Promise<number> {
|
820
|
-
let result = 0;
|
821
|
-
await this.doTxn("readonly", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS], (txn) => {
|
822
|
-
const sessionStore = txn.objectStore(IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS);
|
823
|
-
const countReq = sessionStore.count();
|
824
|
-
countReq.onsuccess = (): void => {
|
825
|
-
result = countReq.result;
|
826
|
-
};
|
827
|
-
});
|
828
|
-
return result;
|
829
|
-
}
|
830
|
-
|
831
|
-
/**
|
832
|
-
* Fetch a batch of Megolm sessions from the database.
|
833
|
-
*
|
834
|
-
* Implementation of {@link CryptoStore.getEndToEndInboundGroupSessionsBatch}.
|
835
|
-
*/
|
836
|
-
public async getEndToEndInboundGroupSessionsBatch(): Promise<null | SessionExtended[]> {
|
837
|
-
const result: SessionExtended[] = [];
|
838
|
-
await this.doTxn(
|
839
|
-
"readonly",
|
840
|
-
[IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_BACKUP],
|
841
|
-
(txn) => {
|
842
|
-
const sessionStore = txn.objectStore(IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS);
|
843
|
-
const backupStore = txn.objectStore(IndexedDBCryptoStore.STORE_BACKUP);
|
844
|
-
|
845
|
-
const getReq = sessionStore.openCursor();
|
846
|
-
getReq.onsuccess = function (): void {
|
847
|
-
try {
|
848
|
-
const cursor = getReq.result;
|
849
|
-
if (cursor) {
|
850
|
-
const backupGetReq = backupStore.get(cursor.key);
|
851
|
-
backupGetReq.onsuccess = (): void => {
|
852
|
-
result.push({
|
853
|
-
senderKey: cursor.value.senderCurve25519Key,
|
854
|
-
sessionId: cursor.value.sessionId,
|
855
|
-
sessionData: cursor.value.session,
|
856
|
-
needsBackup: backupGetReq.result !== undefined,
|
857
|
-
});
|
858
|
-
if (result.length < SESSION_BATCH_SIZE) {
|
859
|
-
cursor.continue();
|
860
|
-
}
|
861
|
-
};
|
862
|
-
}
|
863
|
-
} catch (e) {
|
864
|
-
abortWithException(txn, <Error>e);
|
865
|
-
}
|
866
|
-
};
|
867
|
-
},
|
868
|
-
);
|
869
|
-
|
870
|
-
if (result.length === 0) {
|
871
|
-
// No sessions left.
|
872
|
-
return null;
|
873
|
-
}
|
874
|
-
|
875
|
-
return result;
|
876
|
-
}
|
877
|
-
|
878
|
-
/**
|
879
|
-
* Delete a batch of Megolm sessions from the database.
|
880
|
-
*
|
881
|
-
* Implementation of {@link CryptoStore.deleteEndToEndInboundGroupSessionsBatch}.
|
882
|
-
*
|
883
|
-
* @internal
|
884
|
-
*/
|
885
|
-
public async deleteEndToEndInboundGroupSessionsBatch(
|
886
|
-
sessions: { senderKey: string; sessionId: string }[],
|
887
|
-
): Promise<void> {
|
888
|
-
await this.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS], async (txn) => {
|
889
|
-
try {
|
890
|
-
const objectStore = txn.objectStore(IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS);
|
891
|
-
for (const { senderKey, sessionId } of sessions) {
|
892
|
-
const req = objectStore.delete([senderKey, sessionId]);
|
893
|
-
await new Promise((resolve) => {
|
894
|
-
req.onsuccess = resolve;
|
895
|
-
});
|
896
|
-
}
|
897
|
-
} catch (e) {
|
898
|
-
abortWithException(txn, <Error>e);
|
899
|
-
}
|
900
|
-
});
|
901
|
-
}
|
902
|
-
|
903
|
-
public getEndToEndDeviceData(txn: IDBTransaction, func: (deviceData: IDeviceData | null) => void): void {
|
904
|
-
const objectStore = txn.objectStore("device_data");
|
905
|
-
const getReq = objectStore.get("-");
|
906
|
-
getReq.onsuccess = function (): void {
|
907
|
-
try {
|
908
|
-
func(getReq.result || null);
|
909
|
-
} catch (e) {
|
910
|
-
abortWithException(txn, <Error>e);
|
911
|
-
}
|
912
|
-
};
|
913
|
-
}
|
914
|
-
|
915
|
-
public storeEndToEndDeviceData(deviceData: IDeviceData, txn: IDBTransaction): void {
|
916
|
-
const objectStore = txn.objectStore("device_data");
|
917
|
-
objectStore.put(deviceData, "-");
|
918
|
-
}
|
919
|
-
|
920
|
-
public storeEndToEndRoom(roomId: string, roomInfo: IRoomEncryption, txn: IDBTransaction): void {
|
921
|
-
const objectStore = txn.objectStore("rooms");
|
922
|
-
objectStore.put(roomInfo, roomId);
|
923
|
-
}
|
924
|
-
|
925
|
-
public getEndToEndRooms(txn: IDBTransaction, func: (rooms: Record<string, IRoomEncryption>) => void): void {
|
926
|
-
const rooms: Parameters<Parameters<Backend["getEndToEndRooms"]>[1]>[0] = {};
|
927
|
-
const objectStore = txn.objectStore("rooms");
|
928
|
-
const getReq = objectStore.openCursor();
|
929
|
-
getReq.onsuccess = function (): void {
|
930
|
-
const cursor = getReq.result;
|
931
|
-
if (cursor) {
|
932
|
-
rooms[cursor.key as string] = cursor.value;
|
933
|
-
cursor.continue();
|
934
|
-
} else {
|
935
|
-
try {
|
936
|
-
func(rooms);
|
937
|
-
} catch (e) {
|
938
|
-
abortWithException(txn, <Error>e);
|
939
|
-
}
|
940
|
-
}
|
941
|
-
};
|
942
|
-
}
|
943
|
-
|
944
|
-
// session backups
|
945
|
-
|
946
|
-
public getSessionsNeedingBackup(limit: number): Promise<ISession[]> {
|
947
|
-
return new Promise((resolve, reject) => {
|
948
|
-
const sessions: ISession[] = [];
|
949
|
-
|
950
|
-
const txn = this.db.transaction(["sessions_needing_backup", "inbound_group_sessions"], "readonly");
|
951
|
-
txn.onerror = reject;
|
952
|
-
txn.oncomplete = function (): void {
|
953
|
-
resolve(sessions);
|
954
|
-
};
|
955
|
-
const objectStore = txn.objectStore("sessions_needing_backup");
|
956
|
-
const sessionStore = txn.objectStore("inbound_group_sessions");
|
957
|
-
const getReq = objectStore.openCursor();
|
958
|
-
getReq.onsuccess = function (): void {
|
959
|
-
const cursor = getReq.result;
|
960
|
-
if (cursor) {
|
961
|
-
const sessionGetReq = sessionStore.get(cursor.key);
|
962
|
-
sessionGetReq.onsuccess = function (): void {
|
963
|
-
sessions.push({
|
964
|
-
senderKey: sessionGetReq.result.senderCurve25519Key,
|
965
|
-
sessionId: sessionGetReq.result.sessionId,
|
966
|
-
sessionData: sessionGetReq.result.session,
|
967
|
-
});
|
968
|
-
};
|
969
|
-
if (!limit || sessions.length < limit) {
|
970
|
-
cursor.continue();
|
971
|
-
}
|
972
|
-
}
|
973
|
-
};
|
974
|
-
});
|
975
|
-
}
|
976
|
-
|
977
|
-
public countSessionsNeedingBackup(txn?: IDBTransaction): Promise<number> {
|
978
|
-
if (!txn) {
|
979
|
-
txn = this.db.transaction("sessions_needing_backup", "readonly");
|
980
|
-
}
|
981
|
-
const objectStore = txn.objectStore("sessions_needing_backup");
|
982
|
-
return new Promise((resolve, reject) => {
|
983
|
-
const req = objectStore.count();
|
984
|
-
req.onerror = reject;
|
985
|
-
req.onsuccess = (): void => resolve(req.result);
|
986
|
-
});
|
987
|
-
}
|
988
|
-
|
989
|
-
public async unmarkSessionsNeedingBackup(sessions: ISession[], txn?: IDBTransaction): Promise<void> {
|
990
|
-
if (!txn) {
|
991
|
-
txn = this.db.transaction("sessions_needing_backup", "readwrite");
|
992
|
-
}
|
993
|
-
const objectStore = txn.objectStore("sessions_needing_backup");
|
994
|
-
await Promise.all(
|
995
|
-
sessions.map((session) => {
|
996
|
-
return new Promise((resolve, reject) => {
|
997
|
-
const req = objectStore.delete([session.senderKey, session.sessionId]);
|
998
|
-
req.onsuccess = resolve;
|
999
|
-
req.onerror = reject;
|
1000
|
-
});
|
1001
|
-
}),
|
1002
|
-
);
|
1003
|
-
}
|
1004
|
-
|
1005
|
-
public async markSessionsNeedingBackup(sessions: ISession[], txn?: IDBTransaction): Promise<void> {
|
1006
|
-
if (!txn) {
|
1007
|
-
txn = this.db.transaction("sessions_needing_backup", "readwrite");
|
1008
|
-
}
|
1009
|
-
const objectStore = txn.objectStore("sessions_needing_backup");
|
1010
|
-
await Promise.all(
|
1011
|
-
sessions.map((session) => {
|
1012
|
-
return new Promise((resolve, reject) => {
|
1013
|
-
const req = objectStore.put({
|
1014
|
-
senderCurve25519Key: session.senderKey,
|
1015
|
-
sessionId: session.sessionId,
|
1016
|
-
});
|
1017
|
-
req.onsuccess = resolve;
|
1018
|
-
req.onerror = reject;
|
1019
|
-
});
|
1020
|
-
}),
|
1021
|
-
);
|
1022
|
-
}
|
1023
|
-
|
1024
|
-
public addSharedHistoryInboundGroupSession(
|
1025
|
-
roomId: string,
|
1026
|
-
senderKey: string,
|
1027
|
-
sessionId: string,
|
1028
|
-
txn?: IDBTransaction,
|
1029
|
-
): void {
|
1030
|
-
if (!txn) {
|
1031
|
-
txn = this.db.transaction("shared_history_inbound_group_sessions", "readwrite");
|
1032
|
-
}
|
1033
|
-
const objectStore = txn.objectStore("shared_history_inbound_group_sessions");
|
1034
|
-
const req = objectStore.get([roomId]);
|
1035
|
-
req.onsuccess = (): void => {
|
1036
|
-
const { sessions } = req.result || { sessions: [] };
|
1037
|
-
sessions.push([senderKey, sessionId]);
|
1038
|
-
objectStore.put({ roomId, sessions });
|
1039
|
-
};
|
1040
|
-
}
|
1041
|
-
|
1042
|
-
public getSharedHistoryInboundGroupSessions(
|
1043
|
-
roomId: string,
|
1044
|
-
txn?: IDBTransaction,
|
1045
|
-
): Promise<[senderKey: string, sessionId: string][]> {
|
1046
|
-
if (!txn) {
|
1047
|
-
txn = this.db.transaction("shared_history_inbound_group_sessions", "readonly");
|
1048
|
-
}
|
1049
|
-
const objectStore = txn.objectStore("shared_history_inbound_group_sessions");
|
1050
|
-
const req = objectStore.get([roomId]);
|
1051
|
-
return new Promise((resolve, reject) => {
|
1052
|
-
req.onsuccess = (): void => {
|
1053
|
-
const { sessions } = req.result || { sessions: [] };
|
1054
|
-
resolve(sessions);
|
1055
|
-
};
|
1056
|
-
req.onerror = reject;
|
1057
|
-
});
|
1058
|
-
}
|
1059
|
-
|
1060
|
-
public addParkedSharedHistory(roomId: string, parkedData: ParkedSharedHistory, txn?: IDBTransaction): void {
|
1061
|
-
if (!txn) {
|
1062
|
-
txn = this.db.transaction("parked_shared_history", "readwrite");
|
1063
|
-
}
|
1064
|
-
const objectStore = txn.objectStore("parked_shared_history");
|
1065
|
-
const req = objectStore.get([roomId]);
|
1066
|
-
req.onsuccess = (): void => {
|
1067
|
-
const { parked } = req.result || { parked: [] };
|
1068
|
-
parked.push(parkedData);
|
1069
|
-
objectStore.put({ roomId, parked });
|
1070
|
-
};
|
1071
|
-
}
|
1072
|
-
|
1073
|
-
public takeParkedSharedHistory(roomId: string, txn?: IDBTransaction): Promise<ParkedSharedHistory[]> {
|
1074
|
-
if (!txn) {
|
1075
|
-
txn = this.db.transaction("parked_shared_history", "readwrite");
|
1076
|
-
}
|
1077
|
-
const cursorReq = txn.objectStore("parked_shared_history").openCursor(roomId);
|
1078
|
-
return new Promise((resolve, reject) => {
|
1079
|
-
cursorReq.onsuccess = (): void => {
|
1080
|
-
const cursor = cursorReq.result;
|
1081
|
-
if (!cursor) {
|
1082
|
-
resolve([]);
|
1083
|
-
return;
|
1084
|
-
}
|
1085
|
-
const data = cursor.value;
|
1086
|
-
cursor.delete();
|
1087
|
-
resolve(data);
|
1088
|
-
};
|
1089
|
-
cursorReq.onerror = reject;
|
1090
|
-
});
|
1091
|
-
}
|
1092
|
-
|
1093
|
-
public doTxn<T>(
|
1094
|
-
mode: Mode,
|
1095
|
-
stores: string | string[],
|
1096
|
-
func: (txn: IDBTransaction) => T,
|
1097
|
-
log: Logger = logger,
|
1098
|
-
): Promise<T> {
|
1099
|
-
let startTime: number;
|
1100
|
-
let description: string;
|
1101
|
-
if (PROFILE_TRANSACTIONS) {
|
1102
|
-
const txnId = this.nextTxnId++;
|
1103
|
-
startTime = Date.now();
|
1104
|
-
description = `${mode} crypto store transaction ${txnId} in ${stores}`;
|
1105
|
-
log.debug(`Starting ${description}`);
|
1106
|
-
}
|
1107
|
-
const txn = this.db.transaction(stores, mode);
|
1108
|
-
const promise = promiseifyTxn(txn);
|
1109
|
-
const result = func(txn);
|
1110
|
-
if (PROFILE_TRANSACTIONS) {
|
1111
|
-
promise.then(
|
1112
|
-
() => {
|
1113
|
-
const elapsedTime = Date.now() - startTime;
|
1114
|
-
log.debug(`Finished ${description}, took ${elapsedTime} ms`);
|
1115
|
-
},
|
1116
|
-
() => {
|
1117
|
-
const elapsedTime = Date.now() - startTime;
|
1118
|
-
log.error(`Failed ${description}, took ${elapsedTime} ms`);
|
1119
|
-
},
|
1120
|
-
);
|
1121
|
-
}
|
1122
|
-
return promise.then(() => {
|
1123
|
-
return result;
|
1124
|
-
});
|
1125
|
-
}
|
1126
|
-
}
|
1127
|
-
|
1128
|
-
type DbMigration = (db: IDBDatabase) => void;
|
1129
|
-
const DB_MIGRATIONS: DbMigration[] = [
|
1130
|
-
(db): void => {
|
1131
|
-
createDatabase(db);
|
1132
|
-
},
|
1133
|
-
(db): void => {
|
1134
|
-
db.createObjectStore("account");
|
1135
|
-
},
|
1136
|
-
(db): void => {
|
1137
|
-
const sessionsStore = db.createObjectStore("sessions", {
|
1138
|
-
keyPath: ["deviceKey", "sessionId"],
|
1139
|
-
});
|
1140
|
-
sessionsStore.createIndex("deviceKey", "deviceKey");
|
1141
|
-
},
|
1142
|
-
(db): void => {
|
1143
|
-
db.createObjectStore("inbound_group_sessions", {
|
1144
|
-
keyPath: ["senderCurve25519Key", "sessionId"],
|
1145
|
-
});
|
1146
|
-
},
|
1147
|
-
(db): void => {
|
1148
|
-
db.createObjectStore("device_data");
|
1149
|
-
},
|
1150
|
-
(db): void => {
|
1151
|
-
db.createObjectStore("rooms");
|
1152
|
-
},
|
1153
|
-
(db): void => {
|
1154
|
-
db.createObjectStore("sessions_needing_backup", {
|
1155
|
-
keyPath: ["senderCurve25519Key", "sessionId"],
|
1156
|
-
});
|
1157
|
-
},
|
1158
|
-
(db): void => {
|
1159
|
-
db.createObjectStore("inbound_group_sessions_withheld", {
|
1160
|
-
keyPath: ["senderCurve25519Key", "sessionId"],
|
1161
|
-
});
|
1162
|
-
},
|
1163
|
-
(db): void => {
|
1164
|
-
const problemsStore = db.createObjectStore("session_problems", {
|
1165
|
-
keyPath: ["deviceKey", "time"],
|
1166
|
-
});
|
1167
|
-
problemsStore.createIndex("deviceKey", "deviceKey");
|
1168
|
-
|
1169
|
-
db.createObjectStore("notified_error_devices", {
|
1170
|
-
keyPath: ["userId", "deviceId"],
|
1171
|
-
});
|
1172
|
-
},
|
1173
|
-
(db): void => {
|
1174
|
-
db.createObjectStore("shared_history_inbound_group_sessions", {
|
1175
|
-
keyPath: ["roomId"],
|
1176
|
-
});
|
1177
|
-
},
|
1178
|
-
(db): void => {
|
1179
|
-
db.createObjectStore("parked_shared_history", {
|
1180
|
-
keyPath: ["roomId"],
|
1181
|
-
});
|
1182
|
-
},
|
1183
|
-
// Expand as needed.
|
1184
|
-
];
|
1185
|
-
export const VERSION = DB_MIGRATIONS.length;
|
1186
|
-
|
1187
|
-
export function upgradeDatabase(db: IDBDatabase, oldVersion: number): void {
|
1188
|
-
logger.log(`Upgrading IndexedDBCryptoStore from version ${oldVersion}` + ` to ${VERSION}`);
|
1189
|
-
DB_MIGRATIONS.forEach((migration, index) => {
|
1190
|
-
if (oldVersion <= index) migration(db);
|
1191
|
-
});
|
1192
|
-
}
|
1193
|
-
|
1194
|
-
function createDatabase(db: IDBDatabase): void {
|
1195
|
-
const outgoingRoomKeyRequestsStore = db.createObjectStore("outgoingRoomKeyRequests", { keyPath: "requestId" });
|
1196
|
-
|
1197
|
-
// we assume that the RoomKeyRequestBody will have room_id and session_id
|
1198
|
-
// properties, to make the index efficient.
|
1199
|
-
outgoingRoomKeyRequestsStore.createIndex("session", ["requestBody.room_id", "requestBody.session_id"]);
|
1200
|
-
|
1201
|
-
outgoingRoomKeyRequestsStore.createIndex("state", "state");
|
1202
|
-
}
|
1203
|
-
|
1204
|
-
interface IWrappedIDBTransaction extends IDBTransaction {
|
1205
|
-
_mx_abortexception: Error; // eslint-disable-line camelcase
|
1206
|
-
}
|
1207
|
-
|
1208
|
-
/*
|
1209
|
-
* Aborts a transaction with a given exception
|
1210
|
-
* The transaction promise will be rejected with this exception.
|
1211
|
-
*/
|
1212
|
-
function abortWithException(txn: IDBTransaction, e: Error): void {
|
1213
|
-
// We cheekily stick our exception onto the transaction object here
|
1214
|
-
// We could alternatively make the thing we pass back to the app
|
1215
|
-
// an object containing the transaction and exception.
|
1216
|
-
(txn as IWrappedIDBTransaction)._mx_abortexception = e;
|
1217
|
-
try {
|
1218
|
-
txn.abort();
|
1219
|
-
} catch {
|
1220
|
-
// sometimes we won't be able to abort the transaction
|
1221
|
-
// (ie. if it's aborted or completed)
|
1222
|
-
}
|
1223
|
-
}
|
1224
|
-
|
1225
|
-
function promiseifyTxn<T>(txn: IDBTransaction): Promise<T | null> {
|
1226
|
-
return new Promise((resolve, reject) => {
|
1227
|
-
txn.oncomplete = (): void => {
|
1228
|
-
if ((txn as IWrappedIDBTransaction)._mx_abortexception !== undefined) {
|
1229
|
-
reject((txn as IWrappedIDBTransaction)._mx_abortexception);
|
1230
|
-
}
|
1231
|
-
resolve(null);
|
1232
|
-
};
|
1233
|
-
txn.onerror = (event): void => {
|
1234
|
-
if ((txn as IWrappedIDBTransaction)._mx_abortexception !== undefined) {
|
1235
|
-
reject((txn as IWrappedIDBTransaction)._mx_abortexception);
|
1236
|
-
} else {
|
1237
|
-
logger.log("Error performing indexeddb txn", event);
|
1238
|
-
reject(txn.error);
|
1239
|
-
}
|
1240
|
-
};
|
1241
|
-
txn.onabort = (event): void => {
|
1242
|
-
if ((txn as IWrappedIDBTransaction)._mx_abortexception !== undefined) {
|
1243
|
-
reject((txn as IWrappedIDBTransaction)._mx_abortexception);
|
1244
|
-
} else {
|
1245
|
-
logger.log("Error performing indexeddb txn", event);
|
1246
|
-
reject(txn.error);
|
1247
|
-
}
|
1248
|
-
};
|
1249
|
-
});
|
1250
|
-
}
|