@unwanted/matrix-sdk-mini 34.12.0 → 34.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (698) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/event.d.ts +0 -19
  3. package/lib/@types/event.d.ts.map +1 -1
  4. package/lib/@types/event.js.map +1 -1
  5. package/lib/@types/global.d.js +0 -2
  6. package/lib/@types/global.d.js.map +1 -1
  7. package/lib/autodiscovery.d.ts +1 -1
  8. package/lib/autodiscovery.d.ts.map +1 -1
  9. package/lib/autodiscovery.js.map +1 -1
  10. package/lib/base64.d.ts +3 -6
  11. package/lib/base64.d.ts.map +1 -1
  12. package/lib/base64.js +43 -36
  13. package/lib/base64.js.map +1 -1
  14. package/lib/browser-index.d.ts.map +1 -1
  15. package/lib/browser-index.js +0 -11
  16. package/lib/browser-index.js.map +1 -1
  17. package/lib/client.d.ts +2 -1298
  18. package/lib/client.d.ts.map +1 -1
  19. package/lib/client.js +348 -2967
  20. package/lib/client.js.map +1 -1
  21. package/lib/digest.d.ts +2 -2
  22. package/lib/digest.d.ts.map +1 -1
  23. package/lib/digest.js +2 -2
  24. package/lib/digest.js.map +1 -1
  25. package/lib/embedded.d.ts +0 -22
  26. package/lib/embedded.d.ts.map +1 -1
  27. package/lib/embedded.js +58 -168
  28. package/lib/embedded.js.map +1 -1
  29. package/lib/event-mapper.d.ts.map +1 -1
  30. package/lib/event-mapper.js +0 -4
  31. package/lib/event-mapper.js.map +1 -1
  32. package/lib/matrix.d.ts +0 -25
  33. package/lib/matrix.d.ts.map +1 -1
  34. package/lib/matrix.js +1 -30
  35. package/lib/matrix.js.map +1 -1
  36. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  37. package/lib/models/MSC3089Branch.js +0 -3
  38. package/lib/models/MSC3089Branch.js.map +1 -1
  39. package/lib/models/event-timeline-set.d.ts +6 -10
  40. package/lib/models/event-timeline-set.d.ts.map +1 -1
  41. package/lib/models/event-timeline-set.js +28 -36
  42. package/lib/models/event-timeline-set.js.map +1 -1
  43. package/lib/models/event-timeline.d.ts +7 -2
  44. package/lib/models/event-timeline.d.ts.map +1 -1
  45. package/lib/models/event-timeline.js +8 -9
  46. package/lib/models/event-timeline.js.map +1 -1
  47. package/lib/models/event.d.ts +1 -95
  48. package/lib/models/event.d.ts.map +1 -1
  49. package/lib/models/event.js +11 -281
  50. package/lib/models/event.js.map +1 -1
  51. package/lib/models/poll.d.ts.map +1 -1
  52. package/lib/models/poll.js +1 -5
  53. package/lib/models/poll.js.map +1 -1
  54. package/lib/models/relations-container.d.ts.map +1 -1
  55. package/lib/models/relations-container.js +1 -7
  56. package/lib/models/relations-container.js.map +1 -1
  57. package/lib/models/relations.d.ts +0 -1
  58. package/lib/models/relations.d.ts.map +1 -1
  59. package/lib/models/relations.js +0 -8
  60. package/lib/models/relations.js.map +1 -1
  61. package/lib/models/room-state.d.ts +2 -13
  62. package/lib/models/room-state.d.ts.map +1 -1
  63. package/lib/models/room-state.js +12 -56
  64. package/lib/models/room-state.js.map +1 -1
  65. package/lib/models/room.d.ts +2 -20
  66. package/lib/models/room.d.ts.map +1 -1
  67. package/lib/models/room.js +121 -162
  68. package/lib/models/room.js.map +1 -1
  69. package/lib/models/thread.d.ts.map +1 -1
  70. package/lib/models/thread.js +5 -4
  71. package/lib/models/thread.js.map +1 -1
  72. package/lib/sliding-sync-sdk.d.ts +3 -4
  73. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  74. package/lib/sliding-sync-sdk.js +55 -102
  75. package/lib/sliding-sync-sdk.js.map +1 -1
  76. package/lib/sliding-sync.js +9 -6
  77. package/lib/sliding-sync.js.map +1 -1
  78. package/lib/store/indexeddb.d.ts +1 -1
  79. package/lib/store/indexeddb.d.ts.map +1 -1
  80. package/lib/store/indexeddb.js.map +1 -1
  81. package/lib/sync-accumulator.d.ts +6 -4
  82. package/lib/sync-accumulator.d.ts.map +1 -1
  83. package/lib/sync-accumulator.js +23 -12
  84. package/lib/sync-accumulator.js.map +1 -1
  85. package/lib/sync.d.ts +10 -13
  86. package/lib/sync.d.ts.map +1 -1
  87. package/lib/sync.js +94 -115
  88. package/lib/sync.js.map +1 -1
  89. package/lib/testing.d.ts +0 -48
  90. package/lib/testing.d.ts.map +1 -1
  91. package/lib/testing.js +0 -105
  92. package/lib/testing.js.map +1 -1
  93. package/lib/types.d.ts +0 -1
  94. package/lib/types.d.ts.map +1 -1
  95. package/lib/types.js.map +1 -1
  96. package/package.json +10 -11
  97. package/src/@types/event.ts +2 -36
  98. package/src/@types/global.d.ts +21 -4
  99. package/src/autodiscovery.ts +1 -1
  100. package/src/base64.ts +38 -40
  101. package/src/browser-index.ts +0 -11
  102. package/src/client.ts +68 -3087
  103. package/src/digest.ts +3 -3
  104. package/src/embedded.ts +38 -134
  105. package/src/event-mapper.ts +0 -4
  106. package/src/matrix.ts +0 -41
  107. package/src/models/MSC3089Branch.ts +0 -3
  108. package/src/models/event-timeline-set.ts +17 -38
  109. package/src/models/event-timeline.ts +10 -5
  110. package/src/models/event.ts +8 -295
  111. package/src/models/poll.ts +0 -6
  112. package/src/models/relations-container.ts +1 -8
  113. package/src/models/relations.ts +0 -8
  114. package/src/models/room-state.ts +4 -37
  115. package/src/models/room.ts +18 -68
  116. package/src/models/thread.ts +4 -3
  117. package/src/sliding-sync-sdk.ts +10 -83
  118. package/src/sliding-sync.ts +6 -6
  119. package/src/store/indexeddb.ts +1 -1
  120. package/src/sync-accumulator.ts +33 -16
  121. package/src/sync.ts +112 -143
  122. package/src/testing.ts +0 -108
  123. package/src/types.ts +0 -1
  124. package/CHANGELOG.md +0 -5910
  125. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  126. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  127. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  128. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  129. package/lib/@types/crypto.d.ts +0 -47
  130. package/lib/@types/crypto.d.ts.map +0 -1
  131. package/lib/@types/crypto.js +0 -1
  132. package/lib/@types/crypto.js.map +0 -1
  133. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  134. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  135. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  136. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  137. package/lib/common-crypto/CryptoBackend.js +0 -73
  138. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  139. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  140. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  141. package/lib/common-crypto/key-passphrase.js +0 -33
  142. package/lib/common-crypto/key-passphrase.js.map +0 -1
  143. package/lib/crypto/CrossSigning.d.ts +0 -184
  144. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  145. package/lib/crypto/CrossSigning.js +0 -718
  146. package/lib/crypto/CrossSigning.js.map +0 -1
  147. package/lib/crypto/DeviceList.d.ts +0 -216
  148. package/lib/crypto/DeviceList.d.ts.map +0 -1
  149. package/lib/crypto/DeviceList.js +0 -892
  150. package/lib/crypto/DeviceList.js.map +0 -1
  151. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  152. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  153. package/lib/crypto/EncryptionSetup.js +0 -356
  154. package/lib/crypto/EncryptionSetup.js.map +0 -1
  155. package/lib/crypto/OlmDevice.d.ts +0 -457
  156. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  157. package/lib/crypto/OlmDevice.js +0 -1241
  158. package/lib/crypto/OlmDevice.js.map +0 -1
  159. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  160. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  161. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  162. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  163. package/lib/crypto/RoomList.d.ts +0 -26
  164. package/lib/crypto/RoomList.d.ts.map +0 -1
  165. package/lib/crypto/RoomList.js +0 -71
  166. package/lib/crypto/RoomList.js.map +0 -1
  167. package/lib/crypto/SecretSharing.d.ts +0 -24
  168. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  169. package/lib/crypto/SecretSharing.js +0 -194
  170. package/lib/crypto/SecretSharing.js.map +0 -1
  171. package/lib/crypto/SecretStorage.d.ts +0 -55
  172. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  173. package/lib/crypto/SecretStorage.js +0 -118
  174. package/lib/crypto/SecretStorage.js.map +0 -1
  175. package/lib/crypto/aes.d.ts +0 -6
  176. package/lib/crypto/aes.d.ts.map +0 -1
  177. package/lib/crypto/aes.js +0 -24
  178. package/lib/crypto/aes.js.map +0 -1
  179. package/lib/crypto/algorithms/base.d.ts +0 -156
  180. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  181. package/lib/crypto/algorithms/base.js +0 -187
  182. package/lib/crypto/algorithms/base.js.map +0 -1
  183. package/lib/crypto/algorithms/index.d.ts +0 -4
  184. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  185. package/lib/crypto/algorithms/index.js +0 -20
  186. package/lib/crypto/algorithms/index.js.map +0 -1
  187. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  188. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  189. package/lib/crypto/algorithms/megolm.js +0 -1822
  190. package/lib/crypto/algorithms/megolm.js.map +0 -1
  191. package/lib/crypto/algorithms/olm.d.ts +0 -5
  192. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  193. package/lib/crypto/algorithms/olm.js +0 -299
  194. package/lib/crypto/algorithms/olm.js.map +0 -1
  195. package/lib/crypto/api.d.ts +0 -32
  196. package/lib/crypto/api.d.ts.map +0 -1
  197. package/lib/crypto/api.js +0 -22
  198. package/lib/crypto/api.js.map +0 -1
  199. package/lib/crypto/backup.d.ts +0 -227
  200. package/lib/crypto/backup.d.ts.map +0 -1
  201. package/lib/crypto/backup.js +0 -824
  202. package/lib/crypto/backup.js.map +0 -1
  203. package/lib/crypto/crypto.d.ts +0 -3
  204. package/lib/crypto/crypto.d.ts.map +0 -1
  205. package/lib/crypto/crypto.js +0 -19
  206. package/lib/crypto/crypto.js.map +0 -1
  207. package/lib/crypto/dehydration.d.ts +0 -34
  208. package/lib/crypto/dehydration.d.ts.map +0 -1
  209. package/lib/crypto/dehydration.js +0 -252
  210. package/lib/crypto/dehydration.js.map +0 -1
  211. package/lib/crypto/device-converter.d.ts +0 -9
  212. package/lib/crypto/device-converter.d.ts.map +0 -1
  213. package/lib/crypto/device-converter.js +0 -42
  214. package/lib/crypto/device-converter.js.map +0 -1
  215. package/lib/crypto/deviceinfo.d.ts +0 -99
  216. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  217. package/lib/crypto/deviceinfo.js +0 -148
  218. package/lib/crypto/deviceinfo.js.map +0 -1
  219. package/lib/crypto/index.d.ts +0 -1210
  220. package/lib/crypto/index.d.ts.map +0 -1
  221. package/lib/crypto/index.js +0 -4101
  222. package/lib/crypto/index.js.map +0 -1
  223. package/lib/crypto/key_passphrase.d.ts +0 -14
  224. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  225. package/lib/crypto/key_passphrase.js +0 -44
  226. package/lib/crypto/key_passphrase.js.map +0 -1
  227. package/lib/crypto/keybackup.d.ts +0 -18
  228. package/lib/crypto/keybackup.d.ts.map +0 -1
  229. package/lib/crypto/keybackup.js +0 -1
  230. package/lib/crypto/keybackup.js.map +0 -1
  231. package/lib/crypto/olmlib.d.ts +0 -129
  232. package/lib/crypto/olmlib.d.ts.map +0 -1
  233. package/lib/crypto/olmlib.js +0 -492
  234. package/lib/crypto/olmlib.js.map +0 -1
  235. package/lib/crypto/recoverykey.d.ts +0 -2
  236. package/lib/crypto/recoverykey.d.ts.map +0 -1
  237. package/lib/crypto/recoverykey.js +0 -19
  238. package/lib/crypto/recoverykey.js.map +0 -1
  239. package/lib/crypto/store/base.d.ts +0 -252
  240. package/lib/crypto/store/base.d.ts.map +0 -1
  241. package/lib/crypto/store/base.js +0 -64
  242. package/lib/crypto/store/base.js.map +0 -1
  243. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  244. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  245. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  246. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  247. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  248. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  249. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  250. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  251. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  252. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  253. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  254. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  255. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  256. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  257. package/lib/crypto/store/memory-crypto-store.js +0 -622
  258. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  259. package/lib/crypto/verification/Base.d.ts +0 -105
  260. package/lib/crypto/verification/Base.d.ts.map +0 -1
  261. package/lib/crypto/verification/Base.js +0 -372
  262. package/lib/crypto/verification/Base.js.map +0 -1
  263. package/lib/crypto/verification/Error.d.ts +0 -35
  264. package/lib/crypto/verification/Error.d.ts.map +0 -1
  265. package/lib/crypto/verification/Error.js +0 -86
  266. package/lib/crypto/verification/Error.js.map +0 -1
  267. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  268. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  269. package/lib/crypto/verification/IllegalMethod.js +0 -43
  270. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  271. package/lib/crypto/verification/QRCode.d.ts +0 -51
  272. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  273. package/lib/crypto/verification/QRCode.js +0 -277
  274. package/lib/crypto/verification/QRCode.js.map +0 -1
  275. package/lib/crypto/verification/SAS.d.ts +0 -27
  276. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  277. package/lib/crypto/verification/SAS.js +0 -485
  278. package/lib/crypto/verification/SAS.js.map +0 -1
  279. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  280. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  281. package/lib/crypto/verification/SASDecimal.js +0 -34
  282. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  283. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  284. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  285. package/lib/crypto/verification/request/Channel.js +0 -1
  286. package/lib/crypto/verification/request/Channel.js.map +0 -1
  287. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  288. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  289. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  290. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  291. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  292. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  293. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  294. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  295. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  296. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  297. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  298. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  299. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  300. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  301. package/lib/crypto-api/CryptoEvent.js +0 -33
  302. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  303. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  304. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  305. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  306. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  307. package/lib/crypto-api/index.d.ts +0 -978
  308. package/lib/crypto-api/index.d.ts.map +0 -1
  309. package/lib/crypto-api/index.js +0 -304
  310. package/lib/crypto-api/index.js.map +0 -1
  311. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  312. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  313. package/lib/crypto-api/key-passphrase.js +0 -51
  314. package/lib/crypto-api/key-passphrase.js.map +0 -1
  315. package/lib/crypto-api/keybackup.d.ts +0 -88
  316. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  317. package/lib/crypto-api/keybackup.js +0 -1
  318. package/lib/crypto-api/keybackup.js.map +0 -1
  319. package/lib/crypto-api/recovery-key.d.ts +0 -11
  320. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  321. package/lib/crypto-api/recovery-key.js +0 -65
  322. package/lib/crypto-api/recovery-key.js.map +0 -1
  323. package/lib/crypto-api/verification.d.ts +0 -344
  324. package/lib/crypto-api/verification.d.ts.map +0 -1
  325. package/lib/crypto-api/verification.js +0 -91
  326. package/lib/crypto-api/verification.js.map +0 -1
  327. package/lib/matrixrtc/CallMembership.d.ts +0 -66
  328. package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
  329. package/lib/matrixrtc/CallMembership.js +0 -197
  330. package/lib/matrixrtc/CallMembership.js.map +0 -1
  331. package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
  332. package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
  333. package/lib/matrixrtc/LivekitFocus.js +0 -20
  334. package/lib/matrixrtc/LivekitFocus.js.map +0 -1
  335. package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
  336. package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
  337. package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
  338. package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
  339. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
  340. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
  341. package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
  342. package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
  343. package/lib/matrixrtc/focus.d.ts +0 -10
  344. package/lib/matrixrtc/focus.d.ts.map +0 -1
  345. package/lib/matrixrtc/focus.js +0 -1
  346. package/lib/matrixrtc/focus.js.map +0 -1
  347. package/lib/matrixrtc/index.d.ts +0 -7
  348. package/lib/matrixrtc/index.d.ts.map +0 -1
  349. package/lib/matrixrtc/index.js +0 -21
  350. package/lib/matrixrtc/index.js.map +0 -1
  351. package/lib/matrixrtc/types.d.ts +0 -19
  352. package/lib/matrixrtc/types.d.ts.map +0 -1
  353. package/lib/matrixrtc/types.js +0 -1
  354. package/lib/matrixrtc/types.js.map +0 -1
  355. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  356. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  357. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  358. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  359. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  360. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  361. package/lib/rendezvous/RendezvousChannel.js +0 -1
  362. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  363. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  364. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  365. package/lib/rendezvous/RendezvousCode.js +0 -1
  366. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  367. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  368. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  369. package/lib/rendezvous/RendezvousError.js +0 -23
  370. package/lib/rendezvous/RendezvousError.js.map +0 -1
  371. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  372. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  373. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  374. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  375. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  376. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  377. package/lib/rendezvous/RendezvousIntent.js +0 -22
  378. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  379. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  380. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  381. package/lib/rendezvous/RendezvousTransport.js +0 -1
  382. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  383. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  384. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  385. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  386. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  387. package/lib/rendezvous/channels/index.d.ts +0 -2
  388. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  389. package/lib/rendezvous/channels/index.js +0 -18
  390. package/lib/rendezvous/channels/index.js.map +0 -1
  391. package/lib/rendezvous/index.d.ts +0 -10
  392. package/lib/rendezvous/index.d.ts.map +0 -1
  393. package/lib/rendezvous/index.js +0 -23
  394. package/lib/rendezvous/index.js.map +0 -1
  395. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  396. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  397. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  398. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  399. package/lib/rendezvous/transports/index.d.ts +0 -2
  400. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  401. package/lib/rendezvous/transports/index.js +0 -18
  402. package/lib/rendezvous/transports/index.js.map +0 -1
  403. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  404. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  405. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  406. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  407. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  408. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  409. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  410. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  411. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  412. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  413. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  414. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  415. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  416. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  417. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  418. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  419. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  420. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  421. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  422. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  423. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  424. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  425. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  426. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  427. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  428. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  429. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  430. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  431. package/lib/rust-crypto/backup.d.ts +0 -254
  432. package/lib/rust-crypto/backup.d.ts.map +0 -1
  433. package/lib/rust-crypto/backup.js +0 -837
  434. package/lib/rust-crypto/backup.js.map +0 -1
  435. package/lib/rust-crypto/constants.d.ts +0 -3
  436. package/lib/rust-crypto/constants.d.ts.map +0 -1
  437. package/lib/rust-crypto/constants.js +0 -19
  438. package/lib/rust-crypto/constants.js.map +0 -1
  439. package/lib/rust-crypto/device-converter.d.ts +0 -28
  440. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  441. package/lib/rust-crypto/device-converter.js +0 -123
  442. package/lib/rust-crypto/device-converter.js.map +0 -1
  443. package/lib/rust-crypto/index.d.ts +0 -61
  444. package/lib/rust-crypto/index.d.ts.map +0 -1
  445. package/lib/rust-crypto/index.js +0 -152
  446. package/lib/rust-crypto/index.js.map +0 -1
  447. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  448. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  449. package/lib/rust-crypto/libolm_migration.js +0 -459
  450. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  451. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  452. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  453. package/lib/rust-crypto/rust-crypto.js +0 -2016
  454. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  455. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  456. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  457. package/lib/rust-crypto/secret-storage.js +0 -63
  458. package/lib/rust-crypto/secret-storage.js.map +0 -1
  459. package/lib/rust-crypto/verification.d.ts +0 -319
  460. package/lib/rust-crypto/verification.d.ts.map +0 -1
  461. package/lib/rust-crypto/verification.js +0 -816
  462. package/lib/rust-crypto/verification.js.map +0 -1
  463. package/lib/secret-storage.d.ts +0 -370
  464. package/lib/secret-storage.d.ts.map +0 -1
  465. package/lib/secret-storage.js +0 -466
  466. package/lib/secret-storage.js.map +0 -1
  467. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  468. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  469. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  470. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  471. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  472. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  473. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  474. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  475. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  476. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  477. package/lib/utils/internal/deriveKeys.js +0 -60
  478. package/lib/utils/internal/deriveKeys.js.map +0 -1
  479. package/lib/webrtc/audioContext.d.ts +0 -15
  480. package/lib/webrtc/audioContext.d.ts.map +0 -1
  481. package/lib/webrtc/audioContext.js +0 -46
  482. package/lib/webrtc/audioContext.js.map +0 -1
  483. package/lib/webrtc/call.d.ts +0 -560
  484. package/lib/webrtc/call.d.ts.map +0 -1
  485. package/lib/webrtc/call.js +0 -2541
  486. package/lib/webrtc/call.js.map +0 -1
  487. package/lib/webrtc/callEventHandler.d.ts +0 -37
  488. package/lib/webrtc/callEventHandler.d.ts.map +0 -1
  489. package/lib/webrtc/callEventHandler.js +0 -344
  490. package/lib/webrtc/callEventHandler.js.map +0 -1
  491. package/lib/webrtc/callEventTypes.d.ts +0 -73
  492. package/lib/webrtc/callEventTypes.d.ts.map +0 -1
  493. package/lib/webrtc/callEventTypes.js +0 -13
  494. package/lib/webrtc/callEventTypes.js.map +0 -1
  495. package/lib/webrtc/callFeed.d.ts +0 -128
  496. package/lib/webrtc/callFeed.d.ts.map +0 -1
  497. package/lib/webrtc/callFeed.js +0 -289
  498. package/lib/webrtc/callFeed.js.map +0 -1
  499. package/lib/webrtc/groupCall.d.ts +0 -323
  500. package/lib/webrtc/groupCall.d.ts.map +0 -1
  501. package/lib/webrtc/groupCall.js +0 -1337
  502. package/lib/webrtc/groupCall.js.map +0 -1
  503. package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
  504. package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
  505. package/lib/webrtc/groupCallEventHandler.js +0 -178
  506. package/lib/webrtc/groupCallEventHandler.js.map +0 -1
  507. package/lib/webrtc/mediaHandler.d.ts +0 -89
  508. package/lib/webrtc/mediaHandler.d.ts.map +0 -1
  509. package/lib/webrtc/mediaHandler.js +0 -437
  510. package/lib/webrtc/mediaHandler.js.map +0 -1
  511. package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
  512. package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
  513. package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
  514. package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
  515. package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
  516. package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
  517. package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
  518. package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
  519. package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
  520. package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
  521. package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
  522. package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
  523. package/lib/webrtc/stats/connectionStats.d.ts +0 -28
  524. package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
  525. package/lib/webrtc/stats/connectionStats.js +0 -26
  526. package/lib/webrtc/stats/connectionStats.js.map +0 -1
  527. package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
  528. package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
  529. package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
  530. package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
  531. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
  532. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
  533. package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
  534. package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
  535. package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
  536. package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
  537. package/lib/webrtc/stats/groupCallStats.js +0 -78
  538. package/lib/webrtc/stats/groupCallStats.js.map +0 -1
  539. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
  540. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
  541. package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
  542. package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
  543. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
  544. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
  545. package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
  546. package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
  547. package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
  548. package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
  549. package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
  550. package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
  551. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
  552. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
  553. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
  554. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
  555. package/lib/webrtc/stats/statsReport.d.ts +0 -99
  556. package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
  557. package/lib/webrtc/stats/statsReport.js +0 -32
  558. package/lib/webrtc/stats/statsReport.js.map +0 -1
  559. package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
  560. package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
  561. package/lib/webrtc/stats/statsReportEmitter.js +0 -33
  562. package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
  563. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
  564. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
  565. package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
  566. package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
  567. package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
  568. package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
  569. package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
  570. package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
  571. package/lib/webrtc/stats/transportStats.d.ts +0 -11
  572. package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
  573. package/lib/webrtc/stats/transportStats.js +0 -1
  574. package/lib/webrtc/stats/transportStats.js.map +0 -1
  575. package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
  576. package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
  577. package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
  578. package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
  579. package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
  580. package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
  581. package/lib/webrtc/stats/valueFormatter.js +0 -25
  582. package/lib/webrtc/stats/valueFormatter.js.map +0 -1
  583. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  584. package/src/@types/crypto.ts +0 -73
  585. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  586. package/src/common-crypto/CryptoBackend.ts +0 -302
  587. package/src/common-crypto/README.md +0 -4
  588. package/src/common-crypto/key-passphrase.ts +0 -43
  589. package/src/crypto/CrossSigning.ts +0 -773
  590. package/src/crypto/DeviceList.ts +0 -989
  591. package/src/crypto/EncryptionSetup.ts +0 -351
  592. package/src/crypto/OlmDevice.ts +0 -1500
  593. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  594. package/src/crypto/RoomList.ts +0 -70
  595. package/src/crypto/SecretSharing.ts +0 -240
  596. package/src/crypto/SecretStorage.ts +0 -136
  597. package/src/crypto/aes.ts +0 -23
  598. package/src/crypto/algorithms/base.ts +0 -236
  599. package/src/crypto/algorithms/index.ts +0 -20
  600. package/src/crypto/algorithms/megolm.ts +0 -2216
  601. package/src/crypto/algorithms/olm.ts +0 -381
  602. package/src/crypto/api.ts +0 -70
  603. package/src/crypto/backup.ts +0 -922
  604. package/src/crypto/crypto.ts +0 -18
  605. package/src/crypto/dehydration.ts +0 -272
  606. package/src/crypto/device-converter.ts +0 -45
  607. package/src/crypto/deviceinfo.ts +0 -158
  608. package/src/crypto/index.ts +0 -4418
  609. package/src/crypto/key_passphrase.ts +0 -42
  610. package/src/crypto/keybackup.ts +0 -47
  611. package/src/crypto/olmlib.ts +0 -539
  612. package/src/crypto/recoverykey.ts +0 -18
  613. package/src/crypto/store/base.ts +0 -348
  614. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  615. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  616. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  617. package/src/crypto/store/memory-crypto-store.ts +0 -680
  618. package/src/crypto/verification/Base.ts +0 -409
  619. package/src/crypto/verification/Error.ts +0 -76
  620. package/src/crypto/verification/IllegalMethod.ts +0 -50
  621. package/src/crypto/verification/QRCode.ts +0 -310
  622. package/src/crypto/verification/SAS.ts +0 -494
  623. package/src/crypto/verification/SASDecimal.ts +0 -37
  624. package/src/crypto/verification/request/Channel.ts +0 -34
  625. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  626. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  627. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  628. package/src/crypto-api/CryptoEvent.ts +0 -93
  629. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  630. package/src/crypto-api/index.ts +0 -1175
  631. package/src/crypto-api/key-passphrase.ts +0 -58
  632. package/src/crypto-api/keybackup.ts +0 -115
  633. package/src/crypto-api/recovery-key.ts +0 -69
  634. package/src/crypto-api/verification.ts +0 -408
  635. package/src/matrixrtc/CallMembership.ts +0 -247
  636. package/src/matrixrtc/LivekitFocus.ts +0 -39
  637. package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
  638. package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
  639. package/src/matrixrtc/focus.ts +0 -25
  640. package/src/matrixrtc/index.ts +0 -22
  641. package/src/matrixrtc/types.ts +0 -36
  642. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  643. package/src/rendezvous/RendezvousChannel.ts +0 -48
  644. package/src/rendezvous/RendezvousCode.ts +0 -25
  645. package/src/rendezvous/RendezvousError.ts +0 -26
  646. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  647. package/src/rendezvous/RendezvousIntent.ts +0 -20
  648. package/src/rendezvous/RendezvousTransport.ts +0 -58
  649. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  650. package/src/rendezvous/channels/index.ts +0 -17
  651. package/src/rendezvous/index.ts +0 -25
  652. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  653. package/src/rendezvous/transports/index.ts +0 -17
  654. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  655. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  656. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  657. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  658. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  659. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  660. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  661. package/src/rust-crypto/backup.ts +0 -881
  662. package/src/rust-crypto/constants.ts +0 -18
  663. package/src/rust-crypto/device-converter.ts +0 -128
  664. package/src/rust-crypto/index.ts +0 -237
  665. package/src/rust-crypto/libolm_migration.ts +0 -530
  666. package/src/rust-crypto/rust-crypto.ts +0 -2205
  667. package/src/rust-crypto/secret-storage.ts +0 -60
  668. package/src/rust-crypto/verification.ts +0 -830
  669. package/src/secret-storage.ts +0 -693
  670. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  671. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  672. package/src/utils/internal/deriveKeys.ts +0 -63
  673. package/src/webrtc/audioContext.ts +0 -44
  674. package/src/webrtc/call.ts +0 -3074
  675. package/src/webrtc/callEventHandler.ts +0 -425
  676. package/src/webrtc/callEventTypes.ts +0 -93
  677. package/src/webrtc/callFeed.ts +0 -364
  678. package/src/webrtc/groupCall.ts +0 -1735
  679. package/src/webrtc/groupCallEventHandler.ts +0 -234
  680. package/src/webrtc/mediaHandler.ts +0 -484
  681. package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
  682. package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
  683. package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
  684. package/src/webrtc/stats/connectionStats.ts +0 -47
  685. package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
  686. package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
  687. package/src/webrtc/stats/groupCallStats.ts +0 -93
  688. package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
  689. package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
  690. package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
  691. package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
  692. package/src/webrtc/stats/statsReport.ts +0 -133
  693. package/src/webrtc/stats/statsReportEmitter.ts +0 -49
  694. package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
  695. package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
  696. package/src/webrtc/stats/transportStats.ts +0 -26
  697. package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
  698. package/src/webrtc/stats/valueFormatter.ts +0 -27
package/src/client.ts CHANGED
@@ -20,7 +20,6 @@ limitations under the License.
20
20
 
21
21
  import { Optional } from "matrix-events-sdk";
22
22
 
23
- import type { IDeviceKeys, IMegolmSessionData, IOneTimeKey } from "./@types/crypto.ts";
24
23
  import { ISyncStateData, SetPresence, SyncApi, SyncApiOptions, SyncState } from "./sync.ts";
25
24
  import {
26
25
  EventStatus,
@@ -33,25 +32,14 @@ import {
33
32
  PushDetails,
34
33
  } from "./models/event.ts";
35
34
  import { StubStore } from "./store/stub.ts";
36
- import { CallEvent, CallEventHandlerMap, createNewMatrixCall, MatrixCall, supportsMatrixCall } from "./webrtc/call.ts";
37
35
  import { Filter, IFilterDefinition, IRoomEventFilter } from "./filter.ts";
38
- import { CallEventHandler, CallEventHandlerEvent, CallEventHandlerEventHandlerMap } from "./webrtc/callEventHandler.ts";
39
- import {
40
- GroupCallEventHandler,
41
- GroupCallEventHandlerEvent,
42
- GroupCallEventHandlerEventHandlerMap,
43
- } from "./webrtc/groupCallEventHandler.ts";
44
36
  import * as utils from "./utils.ts";
45
- import { noUnsafeEventProps, QueryDict, replaceParam, safeSet, sleep } from "./utils.ts";
37
+ import { noUnsafeEventProps, QueryDict, replaceParam, sleep } from "./utils.ts";
46
38
  import { Direction, EventTimeline } from "./models/event-timeline.ts";
47
39
  import { IActionsObject, PushProcessor } from "./pushprocessor.ts";
48
40
  import { AutoDiscovery, AutoDiscoveryAction } from "./autodiscovery.ts";
49
- import * as olmlib from "./crypto/olmlib.ts";
50
- import { decodeBase64, encodeBase64, encodeUnpaddedBase64Url } from "./base64.ts";
51
- import { IExportedDevice as IExportedOlmDevice } from "./crypto/OlmDevice.ts";
52
- import { IOlmDevice } from "./crypto/algorithms/megolm.ts";
41
+ import { encodeUnpaddedBase64Url } from "./base64.ts";
53
42
  import { TypedReEmitter } from "./ReEmitter.ts";
54
- import { IRoomEncryption } from "./crypto/RoomList.ts";
55
43
  import { logger, Logger } from "./logger.ts";
56
44
  import { SERVICE_TYPES } from "./service-types.ts";
57
45
  import {
@@ -60,7 +48,6 @@ import {
60
48
  FileType,
61
49
  HttpApiEvent,
62
50
  HttpApiEventHandlerMap,
63
- HTTPError,
64
51
  IdentityPrefix,
65
52
  IHttpOpts,
66
53
  IRequestOpts,
@@ -74,39 +61,16 @@ import {
74
61
  UploadOpts,
75
62
  UploadResponse,
76
63
  } from "./http-api/index.ts";
77
- import {
78
- Crypto,
79
- CryptoEvent as LegacyCryptoEvent,
80
- CryptoEventHandlerMap as LegacyCryptoEventHandlerMap,
81
- fixBackupKey,
82
- ICheckOwnCrossSigningTrustOpts,
83
- IRoomKeyRequestBody,
84
- isCryptoAvailable,
85
- } from "./crypto/index.ts";
86
- import { DeviceInfo } from "./crypto/deviceinfo.ts";
87
64
  import { User, UserEvent, UserEventHandlerMap } from "./models/user.ts";
88
65
  import { getHttpUriForMxc } from "./content-repo.ts";
89
66
  import { SearchResult } from "./models/search-result.ts";
90
- import { DEHYDRATION_ALGORITHM, IDehydratedDevice, IDehydratedDeviceKeyInfo } from "./crypto/dehydration.ts";
91
- import {
92
- IKeyBackupInfo,
93
- IKeyBackupPrepareOpts,
94
- IKeyBackupRestoreOpts,
95
- IKeyBackupRestoreResult,
96
- IKeyBackupRoomSessions,
97
- IKeyBackupSession,
98
- } from "./crypto/keybackup.ts";
99
67
  import { IIdentityServerProvider } from "./@types/IIdentityServerProvider.ts";
100
68
  import { MatrixScheduler } from "./scheduler.ts";
101
69
  import { BeaconEvent, BeaconEventHandlerMap } from "./models/beacon.ts";
102
70
  import { AuthDict } from "./interactive-auth.ts";
103
71
  import { IMinimalEvent, IRoomEvent, IStateEvent } from "./sync-accumulator.ts";
104
- import { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from "./crypto/api.ts";
105
72
  import { EventTimelineSet } from "./models/event-timeline-set.ts";
106
- import { VerificationRequest } from "./crypto/verification/request/VerificationRequest.ts";
107
- import { VerificationBase as Verification } from "./crypto/verification/Base.ts";
108
73
  import * as ContentHelpers from "./content-helpers.ts";
109
- import { CrossSigningInfo, DeviceTrustLevel, ICacheCallbacks, UserTrustLevel } from "./crypto/CrossSigning.ts";
110
74
  import { NotificationCountType, Room, RoomEvent, RoomEventHandlerMap, RoomNameState } from "./models/room.ts";
111
75
  import { RoomMemberEvent, RoomMemberEventHandlerMap } from "./models/room-member.ts";
112
76
  import { IPowerLevelsContent, RoomStateEvent, RoomStateEventHandlerMap } from "./models/room-state.ts";
@@ -161,11 +125,9 @@ import {
161
125
  } from "./@types/partials.ts";
162
126
  import { EventMapper, eventMapperFor, MapperOpts } from "./event-mapper.ts";
163
127
  import { randomString } from "./randomstring.ts";
164
- import { BackupManager, IKeyBackup, IKeyBackupCheck, IPreparedKeyBackupVersion, TrustInfo } from "./crypto/backup.ts";
165
128
  import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace.ts";
166
129
  import { ISignatures } from "./@types/signed.ts";
167
130
  import { IStore } from "./store/index.ts";
168
- import { ISecretRequest } from "./crypto/SecretStorage.ts";
169
131
  import {
170
132
  IEventWithRoomId,
171
133
  ISearchRequestBody,
@@ -187,9 +149,6 @@ import {
187
149
  RuleId,
188
150
  } from "./@types/PushRules.ts";
189
151
  import { IThreepid } from "./@types/threepids.ts";
190
- import { CryptoStore, OutgoingRoomKeyRequest } from "./crypto/store/base.ts";
191
- import { GroupCall, GroupCallIntent, GroupCallType, IGroupCallDataChannelOptions } from "./webrtc/groupCall.ts";
192
- import { MediaHandler } from "./webrtc/mediaHandler.ts";
193
152
  import {
194
153
  ILoginFlowsResponse,
195
154
  IRefreshTokenResponse,
@@ -218,42 +177,19 @@ import { IgnoredInvites } from "./models/invites-ignorer.ts";
218
177
  import { UIARequest, UIAResponse } from "./@types/uia.ts";
219
178
  import { LocalNotificationSettings } from "./@types/local_notifications.ts";
220
179
  import { buildFeatureSupportMap, Feature, ServerSupport } from "./feature.ts";
221
- import { BackupDecryptor, CryptoBackend } from "./common-crypto/CryptoBackend.ts";
222
- import { RUST_SDK_STORE_PREFIX } from "./rust-crypto/constants.ts";
223
- import {
224
- BootstrapCrossSigningOpts,
225
- CrossSigningKeyInfo,
226
- CryptoApi,
227
- decodeRecoveryKey,
228
- ImportRoomKeysOpts,
229
- CryptoEvent,
230
- CryptoEventHandlerMap,
231
- CryptoCallbacks,
232
- } from "./crypto-api/index.ts";
233
- import { DeviceInfoMap } from "./crypto/DeviceList.ts";
234
- import {
235
- AddSecretStorageKeyOpts,
236
- SecretStorageKeyDescription,
237
- ServerSideSecretStorage,
238
- ServerSideSecretStorageImpl,
239
- } from "./secret-storage.ts";
240
180
  import { RegisterRequest, RegisterResponse } from "./@types/registration.ts";
241
- import { MatrixRTCSessionManager } from "./matrixrtc/MatrixRTCSessionManager.ts";
242
181
  import { getRelationsThreadFilter } from "./thread-utils.ts";
243
182
  import { KnownMembership, Membership } from "./@types/membership.ts";
244
183
  import { RoomMessageEventContent, StickerEventContent } from "./@types/events.ts";
245
184
  import { ImageInfo } from "./@types/media.ts";
246
185
  import { Capabilities, ServerCapabilities } from "./serverCapabilities.ts";
247
186
  import { sha256 } from "./digest.ts";
248
- import { keyFromAuthData } from "./common-crypto/key-passphrase.ts";
249
187
 
250
188
  export type Store = IStore;
251
189
 
252
190
  export type ResetTimelineCallback = (roomId: string) => boolean;
253
191
 
254
192
  const SCROLLBACK_DELAY_MS = 3000;
255
- export const CRYPTO_ENABLED: boolean = isCryptoAvailable();
256
- const TURN_CHECK_INTERVAL = 10 * 60 * 1000; // poll for turn credentials every 10 minutes
257
193
 
258
194
  export const UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue(
259
195
  "last_seen_user_agent",
@@ -261,18 +197,10 @@ export const UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue(
261
197
  );
262
198
 
263
199
  interface IExportedDevice {
264
- olmDevice: IExportedOlmDevice;
265
200
  userId: string;
266
201
  deviceId: string;
267
202
  }
268
203
 
269
- export interface IKeysUploadResponse {
270
- one_time_key_counts: {
271
- // eslint-disable-line camelcase
272
- [algorithm: string]: number;
273
- };
274
- }
275
-
276
204
  export interface ICreateClientOpts {
277
205
  baseUrl: string;
278
206
 
@@ -285,20 +213,6 @@ export interface ICreateClientOpts {
285
213
  */
286
214
  store?: Store;
287
215
 
288
- /**
289
- * A store to be used for end-to-end crypto session data.
290
- * The `createClient` helper will create a default store if needed. Calls the factory supplied to
291
- * {@link setCryptoStoreFactory} if unspecified; or if no factory has been
292
- * specified, uses a default implementation (indexeddb in the browser,
293
- * in-memory otherwise).
294
- *
295
- * This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
296
- * but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
297
- * previously used legacy crypto (so must be migrated), then this must still be provided, so that the
298
- * data can be migrated from the legacy store.
299
- */
300
- cryptoStore?: CryptoStore;
301
-
302
216
  /**
303
217
  * The scheduler to use. If not
304
218
  * specified, this client will not retry requests on failure. This client
@@ -382,18 +296,6 @@ export interface ICreateClientOpts {
382
296
  */
383
297
  deviceToImport?: IExportedDevice;
384
298
 
385
- /**
386
- * Encryption key used for encrypting sensitive data (such as e2ee keys) in {@link ICreateClientOpts#cryptoStore}.
387
- *
388
- * This must be set to the same value every time the client is initialised for the same device.
389
- *
390
- * This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
391
- * but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
392
- * previously used legacy crypto (so must be migrated), then this must still be provided, so that the
393
- * data can be migrated from the legacy store.
394
- */
395
- pickleKey?: string;
396
-
397
299
  /**
398
300
  * Verification methods we should offer to the other side when performing an interactive verification.
399
301
  * If unset, we will offer all known methods. Currently these are: showing a QR code, scanning a QR code, and SAS
@@ -403,11 +305,6 @@ export interface ICreateClientOpts {
403
305
  */
404
306
  verificationMethods?: Array<string>;
405
307
 
406
- /**
407
- * Whether relaying calls through a TURN server should be forced. Default false.
408
- */
409
- forceTURN?: boolean;
410
-
411
308
  /**
412
309
  * Up to this many ICE candidates will be gathered when an incoming call arrives.
413
310
  * Gathering does not send data to the caller, but will communicate with the configured TURN
@@ -415,30 +312,14 @@ export interface ICreateClientOpts {
415
312
  */
416
313
  iceCandidatePoolSize?: number;
417
314
 
418
- /**
419
- * True to advertise support for call transfers to other parties on Matrix calls. Default false.
420
- */
421
- supportsCallTransfer?: boolean;
422
-
423
315
  /**
424
316
  * Whether to allow a fallback ICE server should be used for negotiating a
425
317
  * WebRTC connection if the homeserver doesn't provide any servers. Defaults to false.
426
318
  */
427
319
  fallbackICEServerAllowed?: boolean;
428
320
 
429
- /**
430
- * If true, to-device signalling for group calls will be encrypted
431
- * with Olm. Default: true.
432
- */
433
- useE2eForGroupCall?: boolean;
434
-
435
321
  livekitServiceURL?: string;
436
322
 
437
- /**
438
- * Crypto callbacks provided by the application
439
- */
440
- cryptoCallbacks?: CryptoCallbacks;
441
-
442
323
  /**
443
324
  * Method to generate room names for empty rooms and rooms names based on membership.
444
325
  * Defaults to a built-in English handler with basic pluralisation.
@@ -542,7 +423,7 @@ export interface IStartClientOpts {
542
423
  slidingSync?: SlidingSync;
543
424
  }
544
425
 
545
- export interface IStoredClientOpts extends IStartClientOpts {}
426
+ export interface IStoredClientOpts extends IStartClientOpts { }
546
427
 
547
428
  export const GET_LOGIN_TOKEN_CAPABILITY = new NamespacedValue(
548
429
  "m.get_login_token",
@@ -557,25 +438,8 @@ export const UNSTABLE_MSC4140_DELAYED_EVENTS = "org.matrix.msc4140";
557
438
 
558
439
  export const UNSTABLE_MSC4133_EXTENDED_PROFILES = "uk.tcpip.msc4133";
559
440
 
560
- enum CrossSigningKeyType {
561
- MasterKey = "master_key",
562
- SelfSigningKey = "self_signing_key",
563
- UserSigningKey = "user_signing_key",
564
- }
565
-
566
- export type CrossSigningKeys = Record<CrossSigningKeyType, CrossSigningKeyInfo>;
567
-
568
441
  export type SendToDeviceContentMap = Map<string, Map<string, Record<string, any>>>;
569
442
 
570
- export interface ISignedKey {
571
- keys: Record<string, string>;
572
- signatures: ISignatures;
573
- user_id: string;
574
- algorithms: string[];
575
- device_id: string;
576
- }
577
-
578
- export type KeySignatures = Record<string, Record<string, CrossSigningKeyInfo | ISignedKey>>;
579
443
  export interface IUploadKeySignaturesResponse {
580
444
  failures: Record<
581
445
  string,
@@ -637,13 +501,6 @@ export interface IWellKnownConfig<T = IClientWellKnown> {
637
501
  server_name?: string;
638
502
  }
639
503
 
640
- interface IKeyBackupPath {
641
- path: string;
642
- queryData?: {
643
- version: string;
644
- };
645
- }
646
-
647
504
  interface IMediaConfig {
648
505
  [key: string]: any; // extensible
649
506
  "m.upload.size"?: number;
@@ -690,12 +547,6 @@ export interface IRequestMsisdnTokenResponse extends IRequestTokenResponse {
690
547
  intl_fmt: string;
691
548
  }
692
549
 
693
- export interface IUploadKeysRequest {
694
- "device_keys"?: Required<IDeviceKeys>;
695
- "one_time_keys"?: Record<string, IOneTimeKey>;
696
- "org.matrix.msc2732.fallback_keys"?: Record<string, IOneTimeKey>;
697
- }
698
-
699
550
  export interface IQueryKeysRequest {
700
551
  device_keys: { [userId: string]: string[] };
701
552
  timeout?: number;
@@ -790,27 +641,6 @@ export interface Keys {
790
641
  user_id: string;
791
642
  }
792
643
 
793
- export interface SigningKeys extends Keys {
794
- signatures: ISignatures;
795
- }
796
-
797
- export interface DeviceKeys {
798
- [deviceId: string]: IDeviceKeys & {
799
- unsigned?: {
800
- device_display_name: string;
801
- };
802
- };
803
- }
804
-
805
- export interface IDownloadKeyResult {
806
- failures: { [serverName: string]: object };
807
- device_keys: { [userId: string]: DeviceKeys };
808
- // the following three fields were added in 1.1
809
- master_keys?: { [userId: string]: Keys };
810
- self_signing_keys?: { [userId: string]: SigningKeys };
811
- user_signing_keys?: { [userId: string]: SigningKeys };
812
- }
813
-
814
644
  export interface IClaimOTKsResult {
815
645
  failures: { [serverName: string]: object };
816
646
  one_time_keys: {
@@ -879,14 +709,6 @@ export interface RoomSummary extends Omit<IPublicRoomsChunkRoom, "canonical_alia
879
709
  "im.nheko.summary.encryption"?: string;
880
710
  }
881
711
 
882
- interface IRoomKeysResponse {
883
- sessions: IKeyBackupRoomSessions;
884
- }
885
-
886
- interface IRoomsKeysResponse {
887
- rooms: Record<string, IRoomKeysResponse>;
888
- }
889
-
890
712
  interface IRoomHierarchy {
891
713
  rooms: IHierarchyRoom[];
892
714
  next_batch?: string;
@@ -945,26 +767,6 @@ type RoomStateEvents =
945
767
  | RoomStateEvent.Update
946
768
  | RoomStateEvent.Marker;
947
769
 
948
- type LegacyCryptoEvents =
949
- | LegacyCryptoEvent.KeySignatureUploadFailure
950
- | LegacyCryptoEvent.KeyBackupStatus
951
- | LegacyCryptoEvent.KeyBackupFailed
952
- | LegacyCryptoEvent.KeyBackupSessionsRemaining
953
- | LegacyCryptoEvent.KeyBackupDecryptionKeyCached
954
- | LegacyCryptoEvent.RoomKeyRequest
955
- | LegacyCryptoEvent.RoomKeyRequestCancellation
956
- | LegacyCryptoEvent.VerificationRequest
957
- | LegacyCryptoEvent.VerificationRequestReceived
958
- | LegacyCryptoEvent.DeviceVerificationChanged
959
- | LegacyCryptoEvent.UserTrustStatusChanged
960
- | LegacyCryptoEvent.KeysChanged
961
- | LegacyCryptoEvent.Warning
962
- | LegacyCryptoEvent.DevicesUpdated
963
- | LegacyCryptoEvent.WillUpdateDevices
964
- | LegacyCryptoEvent.LegacyCryptoStoreMigrationProgress;
965
-
966
- type CryptoEvents = (typeof CryptoEvent)[keyof typeof CryptoEvent];
967
-
968
770
  type MatrixEventEvents = MatrixEventEvent.Decrypted | MatrixEventEvent.Replaced | MatrixEventEvent.VisibilityChange;
969
771
 
970
772
  type RoomMemberEvents =
@@ -984,17 +786,9 @@ export type EmittedEvents =
984
786
  | ClientEvent
985
787
  | RoomEvents
986
788
  | RoomStateEvents
987
- | LegacyCryptoEvents
988
- | CryptoEvents
989
789
  | MatrixEventEvents
990
790
  | RoomMemberEvents
991
791
  | UserEvents
992
- | CallEvent // re-emitted by call.ts using Object.values
993
- | CallEventHandlerEvent.Incoming
994
- | GroupCallEventHandlerEvent.Incoming
995
- | GroupCallEventHandlerEvent.Outgoing
996
- | GroupCallEventHandlerEvent.Ended
997
- | GroupCallEventHandlerEvent.Participants
998
792
  | HttpApiEvent.SessionLoggedOut
999
793
  | HttpApiEvent.NoConsent
1000
794
  | BeaconEvent;
@@ -1196,14 +990,9 @@ export type ClientEventHandlerMap = {
1196
990
  [ClientEvent.TurnServersError]: (error: Error, fatal: boolean) => void;
1197
991
  } & RoomEventHandlerMap &
1198
992
  RoomStateEventHandlerMap &
1199
- LegacyCryptoEventHandlerMap &
1200
- CryptoEventHandlerMap &
1201
993
  MatrixEventHandlerMap &
1202
994
  RoomMemberEventHandlerMap &
1203
995
  UserEventHandlerMap &
1204
- CallEventHandlerEventHandlerMap &
1205
- GroupCallEventHandlerEventHandlerMap &
1206
- CallEventHandlerMap &
1207
996
  HttpApiEventHandlerMap &
1208
997
  BeaconEventHandlerMap;
1209
998
 
@@ -1226,17 +1015,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1226
1015
  public deviceId: string | null;
1227
1016
  public credentials: { userId: string | null };
1228
1017
 
1229
- /**
1230
- * Encryption key used for encrypting sensitive data (such as e2ee keys) in storage.
1231
- *
1232
- * As supplied in the constructor via {@link IMatrixClientCreateOpts#pickleKey}.
1233
- *
1234
- * If unset, either a hardcoded key or no encryption at all is used, depending on the Crypto implementation.
1235
- *
1236
- * @deprecated this should be a private property.
1237
- */
1238
- public pickleKey?: string;
1239
-
1240
1018
  public scheduler?: MatrixScheduler;
1241
1019
  public clientRunning = false;
1242
1020
  public timelineSupport = false;
@@ -1244,20 +1022,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1244
1022
  public identityServer?: IIdentityServerProvider;
1245
1023
  public http: MatrixHttpApi<IHttpOpts & { onlyData: true }>; // XXX: Intended private, used in code.
1246
1024
 
1247
- /**
1248
- * The libolm crypto implementation, if it is in use.
1249
- *
1250
- * @deprecated This should not be used. Instead, use the methods exposed directly on this class or
1251
- * (where they are available) via {@link getCrypto}.
1252
- */
1253
- public crypto?: Crypto; // XXX: Intended private, used in code. Being replaced by cryptoBackend
1254
-
1255
- private cryptoBackend?: CryptoBackend; // one of crypto or rustCrypto
1256
- public cryptoCallbacks: CryptoCallbacks; // XXX: Intended private, used in code.
1257
- public callEventHandler?: CallEventHandler; // XXX: Intended private, used in code.
1258
- public groupCallEventHandler?: GroupCallEventHandler;
1259
- public supportsCallTransfer = false; // XXX: Intended private, used in code.
1260
- public forceTURN = false; // XXX: Intended private, used in code.
1261
1025
  public iceCandidatePoolSize = 0; // XXX: Intended private, used in code.
1262
1026
  public idBaseUrl?: string;
1263
1027
  public baseUrl: string;
@@ -1268,13 +1032,11 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1268
1032
  // Note: these are all `protected` to let downstream consumers make mistakes if they want to.
1269
1033
  // We don't technically support this usage, but have reasons to do this.
1270
1034
 
1271
- protected canSupportVoip = false;
1272
1035
  protected peekSync: SyncApi | null = null;
1273
1036
  protected isGuestAccount = false;
1274
1037
  protected ongoingScrollbacks: { [roomId: string]: { promise?: Promise<Room>; errorTs?: number } } = {};
1275
1038
  protected notifTimelineSet: EventTimelineSet | null = null;
1276
1039
  /* @deprecated */
1277
- protected cryptoStore?: CryptoStore;
1278
1040
  protected verificationMethods?: string[];
1279
1041
  protected fallbackICEServerAllowed = false;
1280
1042
  protected syncApi?: SlidingSyncSdk | SyncApi;
@@ -1297,12 +1059,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1297
1059
 
1298
1060
  protected clientWellKnown?: IClientWellKnown;
1299
1061
  protected clientWellKnownPromise?: Promise<IClientWellKnown>;
1300
- protected turnServers: ITurnServer[] = [];
1301
- protected turnServersExpiry = 0;
1302
- protected checkTurnServersIntervalID?: ReturnType<typeof setInterval>;
1303
- protected exportedOlmDeviceToImport?: IExportedOlmDevice;
1304
1062
  protected txnCtr = 0;
1305
- protected mediaHandler = new MediaHandler(this);
1306
1063
  protected sessionId: string;
1307
1064
 
1308
1065
  /** IDs of events which are currently being encrypted.
@@ -1312,17 +1069,12 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1312
1069
  */
1313
1070
  private eventsBeingEncrypted = new Set<string>();
1314
1071
 
1315
- private useE2eForGroupCall = true;
1316
1072
  private toDeviceMessageQueue: ToDeviceMessageQueue;
1317
1073
  public livekitServiceURL?: string;
1318
1074
 
1319
- private _secretStorage: ServerSideSecretStorageImpl;
1320
-
1321
1075
  // A manager for determining which invites should be ignored.
1322
1076
  public readonly ignoredInvites: IgnoredInvites;
1323
1077
 
1324
- public readonly matrixRTC: MatrixRTCSessionManager;
1325
-
1326
1078
  private serverCapabilitiesService: ServerCapabilities;
1327
1079
 
1328
1080
  public constructor(opts: IMatrixClientCreateOpts) {
@@ -1366,23 +1118,19 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1366
1118
  if (this.deviceId) {
1367
1119
  this.logger.warn(
1368
1120
  "not importing device because device ID is provided to " +
1369
- "constructor independently of exported data",
1121
+ "constructor independently of exported data",
1370
1122
  );
1371
1123
  } else if (this.credentials.userId) {
1372
1124
  this.logger.warn(
1373
1125
  "not importing device because user ID is provided to " +
1374
- "constructor independently of exported data",
1126
+ "constructor independently of exported data",
1375
1127
  );
1376
1128
  } else if (!opts.deviceToImport.deviceId) {
1377
1129
  this.logger.warn("not importing device because no device ID in exported data");
1378
1130
  } else {
1379
1131
  this.deviceId = opts.deviceToImport.deviceId;
1380
1132
  this.credentials.userId = opts.deviceToImport.userId;
1381
- // will be used during async initialization of the crypto
1382
- this.exportedOlmDeviceToImport = opts.deviceToImport.olmDevice;
1383
1133
  }
1384
- } else if (opts.pickleKey) {
1385
- this.pickleKey = opts.pickleKey;
1386
1134
  }
1387
1135
 
1388
1136
  this.useLivekitForGroupCalls = Boolean(opts.useLivekitForGroupCalls);
@@ -1404,54 +1152,25 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1404
1152
  });
1405
1153
  }
1406
1154
 
1407
- if (supportsMatrixCall()) {
1408
- this.callEventHandler = new CallEventHandler(this);
1409
- this.groupCallEventHandler = new GroupCallEventHandler(this);
1410
- this.canSupportVoip = true;
1411
- // Start listening for calls after the initial sync is done
1412
- // We do not need to backfill the call event buffer
1413
- // with encrypted events that might never get decrypted
1414
- this.on(ClientEvent.Sync, this.startCallEventHandler);
1415
- }
1416
-
1417
- // NB. We initialise MatrixRTC whether we have call support or not: this is just
1418
- // the underlying session management and doesn't use any actual media capabilities
1419
- this.matrixRTC = new MatrixRTCSessionManager(this);
1420
-
1421
1155
  this.serverCapabilitiesService = new ServerCapabilities(this.http);
1422
1156
 
1423
1157
  this.on(ClientEvent.Sync, this.fixupRoomNotifications);
1424
1158
 
1425
1159
  this.timelineSupport = Boolean(opts.timelineSupport);
1426
1160
 
1427
- this.cryptoStore = opts.cryptoStore;
1428
1161
  this.verificationMethods = opts.verificationMethods;
1429
- this.cryptoCallbacks = opts.cryptoCallbacks || {};
1430
1162
 
1431
- this.forceTURN = opts.forceTURN || false;
1432
1163
  this.iceCandidatePoolSize = opts.iceCandidatePoolSize === undefined ? 0 : opts.iceCandidatePoolSize;
1433
- this.supportsCallTransfer = opts.supportsCallTransfer || false;
1434
1164
  this.fallbackICEServerAllowed = opts.fallbackICEServerAllowed || false;
1435
1165
  this.isVoipWithNoMediaAllowed = opts.isVoipWithNoMediaAllowed || false;
1436
1166
 
1437
- if (opts.useE2eForGroupCall !== undefined) this.useE2eForGroupCall = opts.useE2eForGroupCall;
1438
-
1439
1167
  this.livekitServiceURL = opts.livekitServiceURL;
1440
1168
 
1441
1169
  this.roomNameGenerator = opts.roomNameGenerator;
1442
1170
 
1443
1171
  this.toDeviceMessageQueue = new ToDeviceMessageQueue(this);
1444
1172
 
1445
- // The SDK doesn't really provide a clean way for events to recalculate the push
1446
- // actions for themselves, so we have to kinda help them out when they are encrypted.
1447
- // We do this so that push rules are correctly executed on events in their decrypted
1448
- // state, such as highlights when the user's name is mentioned.
1449
- this.on(MatrixEventEvent.Decrypted, (event) => {
1450
- fixNotificationCountOnDecryption(this, event);
1451
- });
1452
-
1453
1173
  this.ignoredInvites = new IgnoredInvites(this);
1454
- this._secretStorage = new ServerSideSecretStorageImpl(this, opts.cryptoCallbacks ?? {});
1455
1174
 
1456
1175
  // having lots of event listeners is not unusual. 0 means "unlimited".
1457
1176
  this.setMaxListeners(0);
@@ -1480,8 +1199,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1480
1199
  }
1481
1200
  this.clientRunning = true;
1482
1201
 
1483
- this.on(ClientEvent.Sync, this.startMatrixRTC);
1484
-
1485
1202
  // Create our own user object artificially (instead of waiting for sync)
1486
1203
  // so it's always available, even if the user is not in any rooms etc.
1487
1204
  const userId = this.getUserId();
@@ -1489,15 +1206,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1489
1206
  this.store.storeUser(new User(userId));
1490
1207
  }
1491
1208
 
1492
- // periodically poll for turn servers if we support voip
1493
- if (this.canSupportVoip) {
1494
- this.checkTurnServersIntervalID = setInterval(() => {
1495
- this.checkTurnServers();
1496
- }, TURN_CHECK_INTERVAL);
1497
- // noinspection ES6MissingAwait
1498
- this.checkTurnServers();
1499
- }
1500
-
1501
1209
  if (this.syncApi) {
1502
1210
  // This shouldn't happen since we thought the client was not running
1503
1211
  this.logger.error("Still have sync object whilst not running: stopping old one");
@@ -1526,7 +1234,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1526
1234
  this.clientOpts.slidingSync,
1527
1235
  this,
1528
1236
  this.clientOpts,
1529
- this.buildSyncApiOptions(),
1530
1237
  );
1531
1238
  } else {
1532
1239
  this.syncApi = new SyncApi(this, this.clientOpts, this.buildSyncApiOptions());
@@ -1550,8 +1257,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1550
1257
  */
1551
1258
  protected buildSyncApiOptions(): SyncApiOptions {
1552
1259
  return {
1553
- crypto: this.crypto,
1554
- cryptoCallbacks: this.cryptoBackend,
1555
1260
  canResetEntireTimeline: (roomId: string): boolean => {
1556
1261
  if (!this.canResetTimelineCallback) {
1557
1262
  return false;
@@ -1566,10 +1271,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1566
1271
  * clean shutdown.
1567
1272
  */
1568
1273
  public stopClient(): void {
1569
- this.cryptoBackend?.stop(); // crypto might have been initialised even if the client wasn't fully started
1570
-
1571
- this.off(ClientEvent.Sync, this.startMatrixRTC);
1572
-
1573
1274
  if (!this.clientRunning) return; // already stopped
1574
1275
 
1575
1276
  this.logger.debug("stopping MatrixClient");
@@ -1581,190 +1282,15 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1581
1282
 
1582
1283
  this.peekSync?.stopPeeking();
1583
1284
 
1584
- this.callEventHandler?.stop();
1585
- this.groupCallEventHandler?.stop();
1586
- this.callEventHandler = undefined;
1587
- this.groupCallEventHandler = undefined;
1588
-
1589
- globalThis.clearInterval(this.checkTurnServersIntervalID);
1590
- this.checkTurnServersIntervalID = undefined;
1591
-
1592
1285
  if (this.clientWellKnownIntervalID !== undefined) {
1593
1286
  globalThis.clearInterval(this.clientWellKnownIntervalID);
1594
1287
  }
1595
1288
 
1596
1289
  this.toDeviceMessageQueue.stop();
1597
1290
 
1598
- this.matrixRTC.stop();
1599
-
1600
1291
  this.serverCapabilitiesService.stop();
1601
1292
  }
1602
1293
 
1603
- /**
1604
- * Try to rehydrate a device if available. The client must have been
1605
- * initialized with a `cryptoCallback.getDehydrationKey` option, and this
1606
- * function must be called before initCrypto and startClient are called.
1607
- *
1608
- * @returns Promise which resolves to undefined if a device could not be dehydrated, or
1609
- * to the new device ID if the dehydration was successful.
1610
- * @returns Rejects: with an error response.
1611
- *
1612
- * @deprecated MSC2697 device dehydration is not supported for rust cryptography.
1613
- */
1614
- public async rehydrateDevice(): Promise<string | undefined> {
1615
- if (this.crypto) {
1616
- throw new Error("Cannot rehydrate device after crypto is initialized");
1617
- }
1618
-
1619
- if (!this.cryptoCallbacks.getDehydrationKey) {
1620
- return;
1621
- }
1622
-
1623
- const getDeviceResult = await this.getDehydratedDevice();
1624
- if (!getDeviceResult) {
1625
- return;
1626
- }
1627
-
1628
- if (!getDeviceResult.device_data || !getDeviceResult.device_id) {
1629
- this.logger.info("no dehydrated device found");
1630
- return;
1631
- }
1632
-
1633
- const account = new globalThis.Olm.Account();
1634
- try {
1635
- const deviceData = getDeviceResult.device_data;
1636
- if (deviceData.algorithm !== DEHYDRATION_ALGORITHM) {
1637
- this.logger.warn("Wrong algorithm for dehydrated device");
1638
- return;
1639
- }
1640
- this.logger.debug("unpickling dehydrated device");
1641
- const key = await this.cryptoCallbacks.getDehydrationKey(deviceData, (k) => {
1642
- // copy the key so that it doesn't get clobbered
1643
- account.unpickle(new Uint8Array(k), deviceData.account);
1644
- });
1645
- account.unpickle(key, deviceData.account);
1646
- this.logger.debug("unpickled device");
1647
-
1648
- const rehydrateResult = await this.http.authedRequest<{ success: boolean }>(
1649
- Method.Post,
1650
- "/dehydrated_device/claim",
1651
- undefined,
1652
- {
1653
- device_id: getDeviceResult.device_id,
1654
- },
1655
- {
1656
- prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2",
1657
- },
1658
- );
1659
-
1660
- if (rehydrateResult.success) {
1661
- this.deviceId = getDeviceResult.device_id;
1662
- this.logger.info("using dehydrated device");
1663
- const pickleKey = this.pickleKey || "DEFAULT_KEY";
1664
- this.exportedOlmDeviceToImport = {
1665
- pickledAccount: account.pickle(pickleKey),
1666
- sessions: [],
1667
- pickleKey: pickleKey,
1668
- };
1669
- account.free();
1670
- return this.deviceId;
1671
- } else {
1672
- account.free();
1673
- this.logger.info("not using dehydrated device");
1674
- return;
1675
- }
1676
- } catch (e) {
1677
- account.free();
1678
- this.logger.warn("could not unpickle", e);
1679
- }
1680
- }
1681
-
1682
- /**
1683
- * Get the current dehydrated device, if any
1684
- * @returns A promise of an object containing the dehydrated device
1685
- *
1686
- * @deprecated MSC2697 device dehydration is not supported for rust cryptography.
1687
- */
1688
- public async getDehydratedDevice(): Promise<IDehydratedDevice | undefined> {
1689
- try {
1690
- return await this.http.authedRequest<IDehydratedDevice>(
1691
- Method.Get,
1692
- "/dehydrated_device",
1693
- undefined,
1694
- undefined,
1695
- {
1696
- prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2",
1697
- },
1698
- );
1699
- } catch (e) {
1700
- this.logger.info("could not get dehydrated device", e);
1701
- return;
1702
- }
1703
- }
1704
-
1705
- /**
1706
- * Set the dehydration key. This will also periodically dehydrate devices to
1707
- * the server.
1708
- *
1709
- * @param key - the dehydration key
1710
- * @param keyInfo - Information about the key. Primarily for
1711
- * information about how to generate the key from a passphrase.
1712
- * @param deviceDisplayName - The device display name for the
1713
- * dehydrated device.
1714
- * @returns A promise that resolves when the dehydrated device is stored.
1715
- *
1716
- * @deprecated Not supported for Rust Cryptography.
1717
- */
1718
- public async setDehydrationKey(
1719
- key: Uint8Array,
1720
- keyInfo: IDehydratedDeviceKeyInfo,
1721
- deviceDisplayName?: string,
1722
- ): Promise<void> {
1723
- if (!this.crypto) {
1724
- this.logger.warn("not dehydrating device if crypto is not enabled");
1725
- return;
1726
- }
1727
- return this.crypto.dehydrationManager.setKeyAndQueueDehydration(key, keyInfo, deviceDisplayName);
1728
- }
1729
-
1730
- /**
1731
- * Creates a new MSC2967 dehydrated device (without queuing periodic dehydration)
1732
- * @param key - the dehydration key
1733
- * @param keyInfo - Information about the key. Primarily for
1734
- * information about how to generate the key from a passphrase.
1735
- * @param deviceDisplayName - The device display name for the
1736
- * dehydrated device.
1737
- * @returns the device id of the newly created dehydrated device
1738
- *
1739
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.startDehydration}.
1740
- */
1741
- public async createDehydratedDevice(
1742
- key: Uint8Array,
1743
- keyInfo: IDehydratedDeviceKeyInfo,
1744
- deviceDisplayName?: string,
1745
- ): Promise<string | undefined> {
1746
- if (!this.crypto) {
1747
- this.logger.warn("not dehydrating device if crypto is not enabled");
1748
- return;
1749
- }
1750
- await this.crypto.dehydrationManager.setKey(key, keyInfo, deviceDisplayName);
1751
- return this.crypto.dehydrationManager.dehydrateDevice();
1752
- }
1753
-
1754
- /** @deprecated Not supported for Rust Cryptography. */
1755
- public async exportDevice(): Promise<IExportedDevice | undefined> {
1756
- if (!this.crypto) {
1757
- this.logger.warn("not exporting device if crypto is not enabled");
1758
- return;
1759
- }
1760
- return {
1761
- userId: this.credentials.userId!,
1762
- deviceId: this.deviceId!,
1763
- // XXX: Private member access.
1764
- olmDevice: await this.crypto.olmDevice.export(),
1765
- };
1766
- }
1767
-
1768
1294
  /**
1769
1295
  * Clear any data out of the persistent stores used by the client.
1770
1296
  *
@@ -1778,48 +1304,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1778
1304
  const promises: Promise<void>[] = [];
1779
1305
 
1780
1306
  promises.push(this.store.deleteAllData());
1781
- if (this.cryptoStore) {
1782
- promises.push(this.cryptoStore.deleteAllData());
1783
- }
1784
-
1785
- // delete the stores used by the rust matrix-sdk-crypto, in case they were used
1786
- const deleteRustSdkStore = async (): Promise<void> => {
1787
- let indexedDB: IDBFactory;
1788
- try {
1789
- indexedDB = globalThis.indexedDB;
1790
- if (!indexedDB) return; // No indexedDB support
1791
- } catch {
1792
- // No indexedDB support
1793
- return;
1794
- }
1795
- for (const dbname of [
1796
- `${RUST_SDK_STORE_PREFIX}::matrix-sdk-crypto`,
1797
- `${RUST_SDK_STORE_PREFIX}::matrix-sdk-crypto-meta`,
1798
- ]) {
1799
- const prom = new Promise((resolve, reject) => {
1800
- this.logger.info(`Removing IndexedDB instance ${dbname}`);
1801
- const req = indexedDB.deleteDatabase(dbname);
1802
- req.onsuccess = (_): void => {
1803
- this.logger.info(`Removed IndexedDB instance ${dbname}`);
1804
- resolve(0);
1805
- };
1806
- req.onerror = (e): void => {
1807
- // In private browsing, Firefox has a globalThis.indexedDB, but attempts to delete an indexeddb
1808
- // (even a non-existent one) fail with "DOMException: A mutation operation was attempted on a
1809
- // database that did not allow mutations."
1810
- //
1811
- // it seems like the only thing we can really do is ignore the error.
1812
- this.logger.warn(`Failed to remove IndexedDB instance ${dbname}:`, e);
1813
- resolve(0);
1814
- };
1815
- req.onblocked = (e): void => {
1816
- this.logger.info(`cannot yet remove IndexedDB instance ${dbname}`);
1817
- };
1818
- });
1819
- await prom;
1820
- }
1821
- };
1822
- promises.push(deleteRustSdkStore());
1823
1307
 
1824
1308
  return Promise.all(promises).then(); // .then to fix types
1825
1309
  }
@@ -1830,10 +1314,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1830
1314
  * @returns MXID for the logged-in user, or null if not logged in
1831
1315
  */
1832
1316
  public getUserId(): string | null {
1833
- if (this.credentials && this.credentials.userId) {
1834
- return this.credentials.userId;
1835
- }
1836
- return null;
1317
+ return this.credentials?.userId ?? null;
1837
1318
  }
1838
1319
 
1839
1320
  /**
@@ -1855,7 +1336,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1855
1336
  * @returns Domain of this MXID
1856
1337
  */
1857
1338
  public getDomain(): string | null {
1858
- if (this.credentials && this.credentials.userId) {
1339
+ if (this.credentials?.userId) {
1859
1340
  return this.credentials.userId.replace(/^.*?:/, "");
1860
1341
  }
1861
1342
  return null;
@@ -1866,10 +1347,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1866
1347
  * @returns The user ID localpart or null.
1867
1348
  */
1868
1349
  public getUserIdLocalpart(): string | null {
1869
- if (this.credentials && this.credentials.userId) {
1870
- return this.credentials.userId.split(":")[0].substring(1);
1871
- }
1872
- return null;
1350
+ return this.credentials?.userId?.split(":")[0].substring(1) ?? null;
1873
1351
  }
1874
1352
 
1875
1353
  /**
@@ -1888,100 +1366,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1888
1366
  return this.sessionId;
1889
1367
  }
1890
1368
 
1891
- /**
1892
- * Check if the runtime environment supports VoIP calling.
1893
- * @returns True if VoIP is supported.
1894
- */
1895
- public supportsVoip(): boolean {
1896
- return this.canSupportVoip;
1897
- }
1898
-
1899
- /**
1900
- * @returns
1901
- */
1902
- public getMediaHandler(): MediaHandler {
1903
- return this.mediaHandler;
1904
- }
1905
-
1906
- /**
1907
- * Set whether VoIP calls are forced to use only TURN
1908
- * candidates. This is the same as the forceTURN option
1909
- * when creating the client.
1910
- * @param force - True to force use of TURN servers
1911
- */
1912
- public setForceTURN(force: boolean): void {
1913
- this.forceTURN = force;
1914
- }
1915
-
1916
- /**
1917
- * Set whether to advertise transfer support to other parties on Matrix calls.
1918
- * @param support - True to advertise the 'm.call.transferee' capability
1919
- */
1920
- public setSupportsCallTransfer(support: boolean): void {
1921
- this.supportsCallTransfer = support;
1922
- }
1923
-
1924
- /**
1925
- * Returns true if to-device signalling for group calls will be encrypted with Olm.
1926
- * If false, it will be sent unencrypted.
1927
- * @returns boolean Whether group call signalling will be encrypted
1928
- */
1929
- public getUseE2eForGroupCall(): boolean {
1930
- return this.useE2eForGroupCall;
1931
- }
1932
-
1933
- /**
1934
- * Creates a new call.
1935
- * The place*Call methods on the returned call can be used to actually place a call
1936
- *
1937
- * @param roomId - The room the call is to be placed in.
1938
- * @returns the call or null if the browser doesn't support calling.
1939
- */
1940
- public createCall(roomId: string): MatrixCall | null {
1941
- return createNewMatrixCall(this, roomId);
1942
- }
1943
-
1944
- /**
1945
- * Creates a new group call and sends the associated state event
1946
- * to alert other members that the room now has a group call.
1947
- *
1948
- * @param roomId - The room the call is to be placed in.
1949
- */
1950
- public async createGroupCall(
1951
- roomId: string,
1952
- type: GroupCallType,
1953
- isPtt: boolean,
1954
- intent: GroupCallIntent,
1955
- dataChannelsEnabled?: boolean,
1956
- dataChannelOptions?: IGroupCallDataChannelOptions,
1957
- ): Promise<GroupCall> {
1958
- if (this.getGroupCallForRoom(roomId)) {
1959
- throw new Error(`${roomId} already has an existing group call`);
1960
- }
1961
-
1962
- const room = this.getRoom(roomId);
1963
-
1964
- if (!room) {
1965
- throw new Error(`Cannot find room ${roomId}`);
1966
- }
1967
-
1968
- // Because without Media section a WebRTC connection is not possible, so need a RTCDataChannel to set up a
1969
- // no media WebRTC connection anyway.
1970
- return new GroupCall(
1971
- this,
1972
- room,
1973
- type,
1974
- isPtt,
1975
- intent,
1976
- undefined,
1977
- dataChannelsEnabled || this.isVoipWithNoMediaAllowed,
1978
- dataChannelOptions,
1979
- this.isVoipWithNoMediaAllowed,
1980
- this.useLivekitForGroupCalls,
1981
- this.livekitServiceURL,
1982
- ).create();
1983
- }
1984
-
1985
1369
  public getLivekitServiceURL(): string | undefined {
1986
1370
  return this.livekitServiceURL;
1987
1371
  }
@@ -1992,29 +1376,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
1992
1376
  this.livekitServiceURL = newURL;
1993
1377
  }
1994
1378
 
1995
- /**
1996
- * Wait until an initial state for the given room has been processed by the
1997
- * client and the client is aware of any ongoing group calls. Awaiting on
1998
- * the promise returned by this method before calling getGroupCallForRoom()
1999
- * avoids races where getGroupCallForRoom is called before the state for that
2000
- * room has been processed. It does not, however, fix other races, eg. two
2001
- * clients both creating a group call at the same time.
2002
- * @param roomId - The room ID to wait for
2003
- * @returns A promise that resolves once existing group calls in the room
2004
- * have been processed.
2005
- */
2006
- public waitUntilRoomReadyForGroupCalls(roomId: string): Promise<void> {
2007
- return this.groupCallEventHandler!.waitUntilRoomReadyForGroupCalls(roomId);
2008
- }
2009
-
2010
- /**
2011
- * Get an existing group call for the provided room.
2012
- * @returns The group call or null if it doesn't already exist.
2013
- */
2014
- public getGroupCallForRoom(roomId: string): GroupCall | null {
2015
- return this.groupCallEventHandler!.groupCalls.get(roomId) || null;
2016
- }
2017
-
2018
1379
  /**
2019
1380
  * Get the current sync state.
2020
1381
  * @returns the sync state, which may be null.
@@ -2074,2074 +1435,77 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
2074
1435
  * Return the provided scheduler, if any.
2075
1436
  * @returns The scheduler or undefined
2076
1437
  */
2077
- public getScheduler(): MatrixScheduler | undefined {
2078
- return this.scheduler;
2079
- }
2080
-
2081
- /**
2082
- * Retry a backed off syncing request immediately. This should only be used when
2083
- * the user <b>explicitly</b> attempts to retry their lost connection.
2084
- * Will also retry any outbound to-device messages currently in the queue to be sent
2085
- * (retries of regular outgoing events are handled separately, per-event).
2086
- * @returns True if this resulted in a request being retried.
2087
- */
2088
- public retryImmediately(): boolean {
2089
- // don't await for this promise: we just want to kick it off
2090
- this.toDeviceMessageQueue.sendQueue();
2091
- return this.syncApi?.retryImmediately() ?? false;
2092
- }
2093
-
2094
- /**
2095
- * Return the global notification EventTimelineSet, if any
2096
- *
2097
- * @returns the globl notification EventTimelineSet
2098
- */
2099
- public getNotifTimelineSet(): EventTimelineSet | null {
2100
- return this.notifTimelineSet;
2101
- }
2102
-
2103
- /**
2104
- * Set the global notification EventTimelineSet
2105
- *
2106
- */
2107
- public setNotifTimelineSet(set: EventTimelineSet): void {
2108
- this.notifTimelineSet = set;
2109
- }
2110
-
2111
- /**
2112
- * Gets the cached capabilities of the homeserver, returning cached ones if available.
2113
- * If there are no cached capabilities and none can be fetched, throw an exception.
2114
- *
2115
- * @returns Promise resolving with The capabilities of the homeserver
2116
- */
2117
- public async getCapabilities(): Promise<Capabilities> {
2118
- const caps = this.serverCapabilitiesService.getCachedCapabilities();
2119
- if (caps) return caps;
2120
- return this.serverCapabilitiesService.fetchCapabilities();
2121
- }
2122
-
2123
- /**
2124
- * Gets the cached capabilities of the homeserver. If none have been fetched yet,
2125
- * return undefined.
2126
- *
2127
- * @returns The capabilities of the homeserver
2128
- */
2129
- public getCachedCapabilities(): Capabilities | undefined {
2130
- return this.serverCapabilitiesService.getCachedCapabilities();
2131
- }
2132
-
2133
- /**
2134
- * Fetches the latest capabilities from the homeserver, ignoring any cached
2135
- * versions. The newly returned version is cached.
2136
- *
2137
- * @returns A promise which resolves to the capabilities of the homeserver
2138
- */
2139
- public fetchCapabilities(): Promise<Capabilities> {
2140
- return this.serverCapabilitiesService.fetchCapabilities();
2141
- }
2142
-
2143
- /**
2144
- * Initialise support for end-to-end encryption in this client, using libolm.
2145
- *
2146
- * You should call this method after creating the matrixclient, but *before*
2147
- * calling `startClient`, if you want to support end-to-end encryption.
2148
- *
2149
- * It will return a Promise which will resolve when the crypto layer has been
2150
- * successfully initialised.
2151
- *
2152
- * @deprecated libolm is deprecated. Prefer {@link initRustCrypto}.
2153
- */
2154
- public async initCrypto(): Promise<void> {
2155
- if (!isCryptoAvailable()) {
2156
- throw new Error(
2157
- `End-to-end encryption not supported in this js-sdk build: did ` +
2158
- `you remember to load the olm library?`,
2159
- );
2160
- }
2161
-
2162
- if (this.cryptoBackend) {
2163
- this.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
2164
- return;
2165
- }
2166
-
2167
- if (!this.cryptoStore) {
2168
- // the cryptostore is provided by sdk.createClient, so this shouldn't happen
2169
- throw new Error(`Cannot enable encryption: no cryptoStore provided`);
2170
- }
2171
-
2172
- this.logger.debug("Crypto: Starting up crypto store...");
2173
- await this.cryptoStore.startup();
2174
-
2175
- const userId = this.getUserId();
2176
- if (userId === null) {
2177
- throw new Error(
2178
- `Cannot enable encryption on MatrixClient with unknown userId: ` +
2179
- `ensure userId is passed in createClient().`,
2180
- );
2181
- }
2182
- if (this.deviceId === null) {
2183
- throw new Error(
2184
- `Cannot enable encryption on MatrixClient with unknown deviceId: ` +
2185
- `ensure deviceId is passed in createClient().`,
2186
- );
2187
- }
2188
-
2189
- const crypto = new Crypto(this, userId, this.deviceId, this.store, this.cryptoStore, this.verificationMethods!);
2190
-
2191
- this.reEmitter.reEmit(crypto, [
2192
- LegacyCryptoEvent.KeyBackupFailed,
2193
- LegacyCryptoEvent.KeyBackupSessionsRemaining,
2194
- LegacyCryptoEvent.RoomKeyRequest,
2195
- LegacyCryptoEvent.RoomKeyRequestCancellation,
2196
- LegacyCryptoEvent.Warning,
2197
- LegacyCryptoEvent.DevicesUpdated,
2198
- LegacyCryptoEvent.WillUpdateDevices,
2199
- LegacyCryptoEvent.DeviceVerificationChanged,
2200
- LegacyCryptoEvent.UserTrustStatusChanged,
2201
- LegacyCryptoEvent.KeysChanged,
2202
- ]);
2203
-
2204
- this.logger.debug("Crypto: initialising crypto object...");
2205
- await crypto.init({
2206
- exportedOlmDevice: this.exportedOlmDeviceToImport,
2207
- pickleKey: this.pickleKey,
2208
- });
2209
- delete this.exportedOlmDeviceToImport;
2210
-
2211
- this.olmVersion = Crypto.getOlmVersion();
2212
-
2213
- // if crypto initialisation was successful, tell it to attach its event handlers.
2214
- crypto.registerEventHandlers(this as Parameters<Crypto["registerEventHandlers"]>[0]);
2215
- this.cryptoBackend = this.crypto = crypto;
2216
-
2217
- // upload our keys in the background
2218
- this.crypto.uploadDeviceKeys().catch((e) => {
2219
- // TODO: throwing away this error is a really bad idea.
2220
- this.logger.error("Error uploading device keys", e);
2221
- });
2222
- }
2223
-
2224
- /**
2225
- * Initialise support for end-to-end encryption in this client, using the rust matrix-sdk-crypto.
2226
- *
2227
- * An alternative to {@link initCrypto}.
2228
- *
2229
- * @param args.useIndexedDB - True to use an indexeddb store, false to use an in-memory store. Defaults to 'true'.
2230
- * @param args.storageKey - A key with which to encrypt the indexeddb store. If provided, it must be exactly
2231
- * 32 bytes of data, and must be the same each time the client is initialised for a given device.
2232
- * If both this and `storagePassword` are unspecified, the store will be unencrypted.
2233
- * @param args.storagePassword - An alternative to `storageKey`. A password which will be used to derive a key to
2234
- * encrypt the store with. Deriving a key from a password is (deliberately) a slow operation, so prefer
2235
- * to pass a `storageKey` directly where possible.
2236
- *
2237
- * @returns a Promise which will resolve when the crypto layer has been
2238
- * successfully initialised.
2239
- */
2240
- public async initRustCrypto(
2241
- args: {
2242
- useIndexedDB?: boolean;
2243
- storageKey?: Uint8Array;
2244
- storagePassword?: string;
2245
- } = {},
2246
- ): Promise<void> {
2247
- if (this.cryptoBackend) {
2248
- this.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
2249
- return;
2250
- }
2251
-
2252
- const userId = this.getUserId();
2253
- if (userId === null) {
2254
- throw new Error(
2255
- `Cannot enable encryption on MatrixClient with unknown userId: ` +
2256
- `ensure userId is passed in createClient().`,
2257
- );
2258
- }
2259
- const deviceId = this.getDeviceId();
2260
- if (deviceId === null) {
2261
- throw new Error(
2262
- `Cannot enable encryption on MatrixClient with unknown deviceId: ` +
2263
- `ensure deviceId is passed in createClient().`,
2264
- );
2265
- }
2266
-
2267
- // importing rust-crypto will download the webassembly, so we delay it until we know it will be
2268
- // needed.
2269
- this.logger.debug("Downloading Rust crypto library");
2270
- const RustCrypto = await import("./rust-crypto/index.ts");
2271
-
2272
- const rustCrypto = await RustCrypto.initRustCrypto({
2273
- logger: this.logger,
2274
- http: this.http,
2275
- userId: userId,
2276
- deviceId: deviceId,
2277
- secretStorage: this.secretStorage,
2278
- cryptoCallbacks: this.cryptoCallbacks,
2279
- storePrefix: args.useIndexedDB === false ? null : RUST_SDK_STORE_PREFIX,
2280
- storeKey: args.storageKey,
2281
- storePassphrase: args.storagePassword,
2282
-
2283
- legacyCryptoStore: this.cryptoStore,
2284
- legacyPickleKey: this.pickleKey ?? "DEFAULT_KEY",
2285
- legacyMigrationProgressListener: (progress: number, total: number): void => {
2286
- this.emit(CryptoEvent.LegacyCryptoStoreMigrationProgress, progress, total);
2287
- },
2288
- });
2289
-
2290
- rustCrypto.setSupportedVerificationMethods(this.verificationMethods);
2291
-
2292
- this.cryptoBackend = rustCrypto;
2293
-
2294
- // attach the event listeners needed by RustCrypto
2295
- this.on(RoomMemberEvent.Membership, rustCrypto.onRoomMembership.bind(rustCrypto));
2296
- this.on(ClientEvent.Event, (event) => {
2297
- rustCrypto.onLiveEventFromSync(event);
2298
- });
2299
-
2300
- // re-emit the events emitted by the crypto impl
2301
- this.reEmitter.reEmit(rustCrypto, [
2302
- CryptoEvent.VerificationRequestReceived,
2303
- CryptoEvent.UserTrustStatusChanged,
2304
- CryptoEvent.KeyBackupStatus,
2305
- CryptoEvent.KeyBackupSessionsRemaining,
2306
- CryptoEvent.KeyBackupFailed,
2307
- CryptoEvent.KeyBackupDecryptionKeyCached,
2308
- CryptoEvent.KeysChanged,
2309
- CryptoEvent.DevicesUpdated,
2310
- CryptoEvent.WillUpdateDevices,
2311
- ]);
2312
- }
2313
-
2314
- /**
2315
- * Access the server-side secret storage API for this client.
2316
- */
2317
- public get secretStorage(): ServerSideSecretStorage {
2318
- return this._secretStorage;
2319
- }
2320
-
2321
- /**
2322
- * Access the crypto API for this client.
2323
- *
2324
- * If end-to-end encryption has been enabled for this client (via {@link initCrypto} or {@link initRustCrypto}),
2325
- * returns an object giving access to the crypto API. Otherwise, returns `undefined`.
2326
- */
2327
- public getCrypto(): CryptoApi | undefined {
2328
- return this.cryptoBackend;
2329
- }
2330
-
2331
- /**
2332
- * Is end-to-end crypto enabled for this client.
2333
- * @returns True if end-to-end is enabled.
2334
- * @deprecated prefer {@link getCrypto}
2335
- */
2336
- public isCryptoEnabled(): boolean {
2337
- return !!this.cryptoBackend;
2338
- }
2339
-
2340
- /**
2341
- * Get the Ed25519 key for this device
2342
- *
2343
- * @returns base64-encoded ed25519 key. Null if crypto is
2344
- * disabled.
2345
- *
2346
- * @deprecated Not supported for Rust Cryptography.Prefer {@link CryptoApi.getOwnDeviceKeys}
2347
- */
2348
- public getDeviceEd25519Key(): string | null {
2349
- return this.crypto?.getDeviceEd25519Key() ?? null;
2350
- }
2351
-
2352
- /**
2353
- * Get the Curve25519 key for this device
2354
- *
2355
- * @returns base64-encoded curve25519 key. Null if crypto is
2356
- * disabled.
2357
- *
2358
- * @deprecated Not supported for Rust Cryptography. Use {@link CryptoApi.getOwnDeviceKeys}
2359
- */
2360
- public getDeviceCurve25519Key(): string | null {
2361
- return this.crypto?.getDeviceCurve25519Key() ?? null;
2362
- }
2363
-
2364
- /**
2365
- * @deprecated Does nothing.
2366
- */
2367
- public async uploadKeys(): Promise<void> {
2368
- this.logger.warn("MatrixClient.uploadKeys is deprecated");
2369
- }
2370
-
2371
- /**
2372
- * Download the keys for a list of users and stores the keys in the session
2373
- * store.
2374
- * @param userIds - The users to fetch.
2375
- * @param forceDownload - Always download the keys even if cached.
2376
- *
2377
- * @returns A promise which resolves to a map userId-\>deviceId-\>`DeviceInfo`
2378
- *
2379
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
2380
- */
2381
- public downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap> {
2382
- if (!this.crypto) {
2383
- return Promise.reject(new Error("End-to-end encryption disabled"));
2384
- }
2385
- return this.crypto.downloadKeys(userIds, forceDownload);
2386
- }
2387
-
2388
- /**
2389
- * Get the stored device keys for a user id
2390
- *
2391
- * @param userId - the user to list keys for.
2392
- *
2393
- * @returns list of devices
2394
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
2395
- */
2396
- public getStoredDevicesForUser(userId: string): DeviceInfo[] {
2397
- if (!this.crypto) {
2398
- throw new Error("End-to-end encryption disabled");
2399
- }
2400
- return this.crypto.getStoredDevicesForUser(userId) || [];
2401
- }
2402
-
2403
- /**
2404
- * Get the stored device key for a user id and device id
2405
- *
2406
- * @param userId - the user to list keys for.
2407
- * @param deviceId - unique identifier for the device
2408
- *
2409
- * @returns device or null
2410
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
2411
- */
2412
- public getStoredDevice(userId: string, deviceId: string): DeviceInfo | null {
2413
- if (!this.crypto) {
2414
- throw new Error("End-to-end encryption disabled");
2415
- }
2416
- return this.crypto.getStoredDevice(userId, deviceId) || null;
2417
- }
2418
-
2419
- /**
2420
- * Mark the given device as verified
2421
- *
2422
- * @param userId - owner of the device
2423
- * @param deviceId - unique identifier for the device or user's
2424
- * cross-signing public key ID.
2425
- *
2426
- * @param verified - whether to mark the device as verified. defaults
2427
- * to 'true'.
2428
- *
2429
- * @returns
2430
- *
2431
- * @remarks
2432
- * Fires {@link CryptoEvent#DeviceVerificationChanged}
2433
- */
2434
- public setDeviceVerified(userId: string, deviceId: string, verified = true): Promise<void> {
2435
- const prom = this.setDeviceVerification(userId, deviceId, verified, null, null);
2436
-
2437
- // if one of the user's own devices is being marked as verified / unverified,
2438
- // check the key backup status, since whether or not we use this depends on
2439
- // whether it has a signature from a verified device
2440
- if (userId == this.credentials.userId) {
2441
- this.checkKeyBackup();
2442
- }
2443
- return prom;
2444
- }
2445
-
2446
- /**
2447
- * Mark the given device as blocked/unblocked
2448
- *
2449
- * @param userId - owner of the device
2450
- * @param deviceId - unique identifier for the device or user's
2451
- * cross-signing public key ID.
2452
- *
2453
- * @param blocked - whether to mark the device as blocked. defaults
2454
- * to 'true'.
2455
- *
2456
- * @returns
2457
- *
2458
- * @remarks
2459
- * Fires {@link LegacyCryptoEvent.DeviceVerificationChanged}
2460
- *
2461
- * @deprecated Not supported for Rust Cryptography.
2462
- */
2463
- public setDeviceBlocked(userId: string, deviceId: string, blocked = true): Promise<void> {
2464
- return this.setDeviceVerification(userId, deviceId, null, blocked, null);
2465
- }
2466
-
2467
- /**
2468
- * Mark the given device as known/unknown
2469
- *
2470
- * @param userId - owner of the device
2471
- * @param deviceId - unique identifier for the device or user's
2472
- * cross-signing public key ID.
2473
- *
2474
- * @param known - whether to mark the device as known. defaults
2475
- * to 'true'.
2476
- *
2477
- * @returns
2478
- *
2479
- * @remarks
2480
- * Fires {@link CryptoEvent#DeviceVerificationChanged}
2481
- *
2482
- * @deprecated Not supported for Rust Cryptography.
2483
- */
2484
- public setDeviceKnown(userId: string, deviceId: string, known = true): Promise<void> {
2485
- return this.setDeviceVerification(userId, deviceId, null, null, known);
2486
- }
2487
-
2488
- private async setDeviceVerification(
2489
- userId: string,
2490
- deviceId: string,
2491
- verified?: boolean | null,
2492
- blocked?: boolean | null,
2493
- known?: boolean | null,
2494
- ): Promise<void> {
2495
- if (!this.crypto) {
2496
- throw new Error("End-to-end encryption disabled");
2497
- }
2498
- await this.crypto.setDeviceVerification(userId, deviceId, verified, blocked, known);
2499
- }
2500
-
2501
- /**
2502
- * Request a key verification from another user, using a DM.
2503
- *
2504
- * @param userId - the user to request verification with
2505
- * @param roomId - the room to use for verification
2506
- *
2507
- * @returns resolves to a VerificationRequest
2508
- * when the request has been sent to the other party.
2509
- *
2510
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.requestVerificationDM}.
2511
- */
2512
- public requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest> {
2513
- if (!this.crypto) {
2514
- throw new Error("End-to-end encryption disabled");
2515
- }
2516
- return this.crypto.requestVerificationDM(userId, roomId);
2517
- }
2518
-
2519
- /**
2520
- * Finds a DM verification request that is already in progress for the given room id
2521
- *
2522
- * @param roomId - the room to use for verification
2523
- *
2524
- * @returns the VerificationRequest that is in progress, if any
2525
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.findVerificationRequestDMInProgress}.
2526
- */
2527
- public findVerificationRequestDMInProgress(roomId: string): VerificationRequest | undefined {
2528
- if (!this.cryptoBackend) {
2529
- throw new Error("End-to-end encryption disabled");
2530
- } else if (!this.crypto) {
2531
- // Hack for element-R to avoid breaking the cypress tests. We can get rid of this once the react-sdk is
2532
- // updated to use CryptoApi.findVerificationRequestDMInProgress.
2533
- return undefined;
2534
- }
2535
- return this.crypto.findVerificationRequestDMInProgress(roomId);
2536
- }
2537
-
2538
- /**
2539
- * Returns all to-device verification requests that are already in progress for the given user id
2540
- *
2541
- * @param userId - the ID of the user to query
2542
- *
2543
- * @returns the VerificationRequests that are in progress
2544
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getVerificationRequestsToDeviceInProgress}.
2545
- */
2546
- public getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[] {
2547
- if (!this.crypto) {
2548
- throw new Error("End-to-end encryption disabled");
2549
- }
2550
- return this.crypto.getVerificationRequestsToDeviceInProgress(userId);
2551
- }
2552
-
2553
- /**
2554
- * Request a key verification from another user.
2555
- *
2556
- * @param userId - the user to request verification with
2557
- * @param devices - array of device IDs to send requests to. Defaults to
2558
- * all devices owned by the user
2559
- *
2560
- * @returns resolves to a VerificationRequest
2561
- * when the request has been sent to the other party.
2562
- *
2563
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
2564
- */
2565
- public requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest> {
2566
- if (!this.crypto) {
2567
- throw new Error("End-to-end encryption disabled");
2568
- }
2569
- return this.crypto.requestVerification(userId, devices);
2570
- }
2571
-
2572
- /**
2573
- * Begin a key verification.
2574
- *
2575
- * @param method - the verification method to use
2576
- * @param userId - the user to verify keys with
2577
- * @param deviceId - the device to verify
2578
- *
2579
- * @returns a verification object
2580
- * @deprecated Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
2581
- */
2582
- public beginKeyVerification(method: string, userId: string, deviceId: string): Verification<any, any> {
2583
- if (!this.crypto) {
2584
- throw new Error("End-to-end encryption disabled");
2585
- }
2586
- return this.crypto.beginKeyVerification(method, userId, deviceId);
2587
- }
2588
-
2589
- /**
2590
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
2591
- */
2592
- public checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean> {
2593
- return this.secretStorage.checkKey(key, info);
2594
- }
2595
-
2596
- /**
2597
- * Set the global override for whether the client should ever send encrypted
2598
- * messages to unverified devices. This provides the default for rooms which
2599
- * do not specify a value.
2600
- *
2601
- * @param value - whether to blacklist all unverified devices by default
2602
- *
2603
- * @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
2604
- *
2605
- * ```javascript
2606
- * client.getCrypto().globalBlacklistUnverifiedDevices = value;
2607
- * ```
2608
- */
2609
- public setGlobalBlacklistUnverifiedDevices(value: boolean): boolean {
2610
- if (!this.cryptoBackend) {
2611
- throw new Error("End-to-end encryption disabled");
2612
- }
2613
- this.cryptoBackend.globalBlacklistUnverifiedDevices = value;
2614
- return value;
2615
- }
2616
-
2617
- /**
2618
- * @returns whether to blacklist all unverified devices by default
2619
- *
2620
- * @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
2621
- *
2622
- * ```javascript
2623
- * value = client.getCrypto().globalBlacklistUnverifiedDevices;
2624
- * ```
2625
- */
2626
- public getGlobalBlacklistUnverifiedDevices(): boolean {
2627
- if (!this.cryptoBackend) {
2628
- throw new Error("End-to-end encryption disabled");
2629
- }
2630
- return this.cryptoBackend.globalBlacklistUnverifiedDevices;
2631
- }
2632
-
2633
- /**
2634
- * Set whether sendMessage in a room with unknown and unverified devices
2635
- * should throw an error and not send them message. This has 'Global' for
2636
- * symmetry with setGlobalBlacklistUnverifiedDevices but there is currently
2637
- * no room-level equivalent for this setting.
2638
- *
2639
- * This API is currently UNSTABLE and may change or be removed without notice.
2640
- *
2641
- * It has no effect with the Rust crypto implementation.
2642
- *
2643
- * @param value - whether error on unknown devices
2644
- *
2645
- * ```ts
2646
- * client.getCrypto().globalErrorOnUnknownDevices = value;
2647
- * ```
2648
- */
2649
- public setGlobalErrorOnUnknownDevices(value: boolean): void {
2650
- if (!this.cryptoBackend) {
2651
- throw new Error("End-to-end encryption disabled");
2652
- }
2653
- this.cryptoBackend.globalErrorOnUnknownDevices = value;
2654
- }
2655
-
2656
- /**
2657
- * @returns whether to error on unknown devices
2658
- *
2659
- * This API is currently UNSTABLE and may change or be removed without notice.
2660
- */
2661
- public getGlobalErrorOnUnknownDevices(): boolean {
2662
- if (!this.cryptoBackend) {
2663
- throw new Error("End-to-end encryption disabled");
2664
- }
2665
- return this.cryptoBackend.globalErrorOnUnknownDevices;
2666
- }
2667
-
2668
- /**
2669
- * Get the ID of one of the user's cross-signing keys
2670
- *
2671
- * @param type - The type of key to get the ID of. One of
2672
- * "master", "self_signing", or "user_signing". Defaults to "master".
2673
- *
2674
- * @returns the key ID
2675
- * @deprecated Not supported for Rust Cryptography. prefer {@link Crypto.CryptoApi#getCrossSigningKeyId}
2676
- */
2677
- public getCrossSigningId(type: CrossSigningKey | string = CrossSigningKey.Master): string | null {
2678
- if (!this.crypto) {
2679
- throw new Error("End-to-end encryption disabled");
2680
- }
2681
- return this.crypto.getCrossSigningId(type);
2682
- }
2683
-
2684
- /**
2685
- * Get the cross signing information for a given user.
2686
- *
2687
- * The cross-signing API is currently UNSTABLE and may change without notice.
2688
- *
2689
- * @param userId - the user ID to get the cross-signing info for.
2690
- *
2691
- * @returns the cross signing information for the user.
2692
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#userHasCrossSigningKeys}
2693
- */
2694
- public getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null {
2695
- if (!this.cryptoBackend) {
2696
- throw new Error("End-to-end encryption disabled");
2697
- }
2698
- return this.cryptoBackend.getStoredCrossSigningForUser(userId);
2699
- }
2700
-
2701
- /**
2702
- * Check whether a given user is trusted.
2703
- *
2704
- * The cross-signing API is currently UNSTABLE and may change without notice.
2705
- *
2706
- * @param userId - The ID of the user to check.
2707
- *
2708
- * @deprecated Use {@link Crypto.CryptoApi.getUserVerificationStatus | `CryptoApi.getUserVerificationStatus`}
2709
- */
2710
- public checkUserTrust(userId: string): UserTrustLevel {
2711
- if (!this.cryptoBackend) {
2712
- throw new Error("End-to-end encryption disabled");
2713
- }
2714
- return this.cryptoBackend.checkUserTrust(userId);
2715
- }
2716
-
2717
- /**
2718
- * Check whether a given device is trusted.
2719
- *
2720
- * The cross-signing API is currently UNSTABLE and may change without notice.
2721
- *
2722
- * @param userId - The ID of the user whose devices is to be checked.
2723
- * @param deviceId - The ID of the device to check
2724
- *
2725
- * @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus | `CryptoApi.getDeviceVerificationStatus`}
2726
- */
2727
- public checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel {
2728
- if (!this.crypto) {
2729
- throw new Error("End-to-end encryption disabled");
2730
- }
2731
- return this.crypto.checkDeviceTrust(userId, deviceId);
2732
- }
2733
-
2734
- /**
2735
- * Check whether one of our own devices is cross-signed by our
2736
- * user's stored keys, regardless of whether we trust those keys yet.
2737
- *
2738
- * @param deviceId - The ID of the device to check
2739
- *
2740
- * @returns true if the device is cross-signed
2741
- *
2742
- * @deprecated Not supported for Rust Cryptography.
2743
- */
2744
- public checkIfOwnDeviceCrossSigned(deviceId: string): boolean {
2745
- if (!this.crypto) {
2746
- throw new Error("End-to-end encryption disabled");
2747
- }
2748
- return this.crypto.checkIfOwnDeviceCrossSigned(deviceId);
2749
- }
2750
-
2751
- /**
2752
- * Check the copy of our cross-signing key that we have in the device list and
2753
- * see if we can get the private key. If so, mark it as trusted.
2754
- * @param opts - ICheckOwnCrossSigningTrustOpts object
2755
- *
2756
- * @deprecated Unneeded for the new crypto
2757
- */
2758
- public checkOwnCrossSigningTrust(opts?: ICheckOwnCrossSigningTrustOpts): Promise<void> {
2759
- if (!this.cryptoBackend) {
2760
- throw new Error("End-to-end encryption disabled");
2761
- }
2762
- return this.cryptoBackend.checkOwnCrossSigningTrust(opts);
2763
- }
2764
-
2765
- /**
2766
- * Checks that a given cross-signing private key matches a given public key.
2767
- * This can be used by the getCrossSigningKey callback to verify that the
2768
- * private key it is about to supply is the one that was requested.
2769
- * @param privateKey - The private key
2770
- * @param expectedPublicKey - The public key
2771
- * @returns true if the key matches, otherwise false
2772
- *
2773
- * @deprecated Not supported for Rust Cryptography.
2774
- */
2775
- public checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {
2776
- if (!this.crypto) {
2777
- throw new Error("End-to-end encryption disabled");
2778
- }
2779
- return this.crypto.checkCrossSigningPrivateKey(privateKey, expectedPublicKey);
2780
- }
2781
-
2782
- /**
2783
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestDeviceVerification}.
2784
- */
2785
- public legacyDeviceVerification(userId: string, deviceId: string, method: string): Promise<VerificationRequest> {
2786
- if (!this.crypto) {
2787
- throw new Error("End-to-end encryption disabled");
2788
- }
2789
- return this.crypto.legacyDeviceVerification(userId, deviceId, method);
2790
- }
2791
-
2792
- /**
2793
- * Perform any background tasks that can be done before a message is ready to
2794
- * send, in order to speed up sending of the message.
2795
- * @param room - the room the event is in
2796
- *
2797
- * @deprecated Prefer {@link CryptoApi.prepareToEncrypt | `CryptoApi.prepareToEncrypt`}:
2798
- *
2799
- * ```javascript
2800
- * client.getCrypto().prepareToEncrypt(room);
2801
- * ```
2802
- */
2803
- public prepareToEncrypt(room: Room): void {
2804
- if (!this.cryptoBackend) {
2805
- throw new Error("End-to-end encryption disabled");
2806
- }
2807
- this.cryptoBackend.prepareToEncrypt(room);
2808
- }
2809
-
2810
- /**
2811
- * Checks if the user has previously published cross-signing keys
2812
- *
2813
- * This means downloading the devicelist for the user and checking if the list includes
2814
- * the cross-signing pseudo-device.
2815
- *
2816
- * @deprecated Prefer {@link CryptoApi.userHasCrossSigningKeys | `CryptoApi.userHasCrossSigningKeys`}:
2817
- *
2818
- * ```javascript
2819
- * result = client.getCrypto().userHasCrossSigningKeys();
2820
- * ```
2821
- */
2822
- public userHasCrossSigningKeys(): Promise<boolean> {
2823
- if (!this.cryptoBackend) {
2824
- throw new Error("End-to-end encryption disabled");
2825
- }
2826
- return this.cryptoBackend.userHasCrossSigningKeys();
2827
- }
2828
-
2829
- /**
2830
- * Checks whether cross signing:
2831
- * - is enabled on this account and trusted by this device
2832
- * - has private keys either cached locally or stored in secret storage
2833
- *
2834
- * If this function returns false, bootstrapCrossSigning() can be used
2835
- * to fix things such that it returns true. That is to say, after
2836
- * bootstrapCrossSigning() completes successfully, this function should
2837
- * return true.
2838
- * @returns True if cross-signing is ready to be used on this device
2839
- * @deprecated Prefer {@link CryptoApi.isCrossSigningReady | `CryptoApi.isCrossSigningReady`}:
2840
- */
2841
- public isCrossSigningReady(): Promise<boolean> {
2842
- if (!this.cryptoBackend) {
2843
- throw new Error("End-to-end encryption disabled");
2844
- }
2845
- return this.cryptoBackend.isCrossSigningReady();
2846
- }
2847
-
2848
- /**
2849
- * Bootstrap cross-signing by creating keys if needed. If everything is already
2850
- * set up, then no changes are made, so this is safe to run to ensure
2851
- * cross-signing is ready for use.
2852
- *
2853
- * This function:
2854
- * - creates new cross-signing keys if they are not found locally cached nor in
2855
- * secret storage (if it has been set up)
2856
- *
2857
- * @deprecated Prefer {@link CryptoApi.bootstrapCrossSigning | `CryptoApi.bootstrapCrossSigning`}.
2858
- */
2859
- public bootstrapCrossSigning(opts: BootstrapCrossSigningOpts): Promise<void> {
2860
- if (!this.cryptoBackend) {
2861
- throw new Error("End-to-end encryption disabled");
2862
- }
2863
- return this.cryptoBackend.bootstrapCrossSigning(opts);
2864
- }
2865
-
2866
- /**
2867
- * Whether to trust a others users signatures of their devices.
2868
- * If false, devices will only be considered 'verified' if we have
2869
- * verified that device individually (effectively disabling cross-signing).
2870
- *
2871
- * Default: true
2872
- *
2873
- * @returns True if trusting cross-signed devices
2874
- *
2875
- * @deprecated Prefer {@link CryptoApi.getTrustCrossSignedDevices | `CryptoApi.getTrustCrossSignedDevices`}.
2876
- */
2877
- public getCryptoTrustCrossSignedDevices(): boolean {
2878
- if (!this.cryptoBackend) {
2879
- throw new Error("End-to-end encryption disabled");
2880
- }
2881
- return this.cryptoBackend.getTrustCrossSignedDevices();
2882
- }
2883
-
2884
- /**
2885
- * See getCryptoTrustCrossSignedDevices
2886
- *
2887
- * @param val - True to trust cross-signed devices
2888
- *
2889
- * @deprecated Prefer {@link CryptoApi.setTrustCrossSignedDevices | `CryptoApi.setTrustCrossSignedDevices`}.
2890
- */
2891
- public setCryptoTrustCrossSignedDevices(val: boolean): void {
2892
- if (!this.cryptoBackend) {
2893
- throw new Error("End-to-end encryption disabled");
2894
- }
2895
- this.cryptoBackend.setTrustCrossSignedDevices(val);
2896
- }
2897
-
2898
- /**
2899
- * Counts the number of end to end session keys that are waiting to be backed up
2900
- * @returns Promise which resolves to the number of sessions requiring backup
2901
- *
2902
- * @deprecated Not supported for Rust Cryptography.
2903
- */
2904
- public countSessionsNeedingBackup(): Promise<number> {
2905
- if (!this.crypto) {
2906
- throw new Error("End-to-end encryption disabled");
2907
- }
2908
- return this.crypto.countSessionsNeedingBackup();
2909
- }
2910
-
2911
- /**
2912
- * Get information about the encryption of an event
2913
- *
2914
- * @param event - event to be checked
2915
- * @returns The event information.
2916
- * @deprecated Prefer {@link Crypto.CryptoApi.getEncryptionInfoForEvent | `CryptoApi.getEncryptionInfoForEvent`}.
2917
- */
2918
- public getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo {
2919
- if (!this.cryptoBackend) {
2920
- throw new Error("End-to-end encryption disabled");
2921
- }
2922
- return this.cryptoBackend.getEventEncryptionInfo(event);
2923
- }
2924
-
2925
- /**
2926
- * Create a recovery key from a user-supplied passphrase.
2927
- *
2928
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
2929
- *
2930
- * @param password - Passphrase string that can be entered by the user
2931
- * when restoring the backup as an alternative to entering the recovery key.
2932
- * Optional.
2933
- * @returns Object with public key metadata, encoded private
2934
- * recovery key which should be disposed of after displaying to the user,
2935
- * and raw private key to avoid round tripping if needed.
2936
- *
2937
- * @deprecated Prefer {@link CryptoApi.createRecoveryKeyFromPassphrase | `CryptoApi.createRecoveryKeyFromPassphrase`}.
2938
- */
2939
- public createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey> {
2940
- if (!this.cryptoBackend) {
2941
- throw new Error("End-to-end encryption disabled");
2942
- }
2943
- return this.cryptoBackend.createRecoveryKeyFromPassphrase(password);
2944
- }
2945
-
2946
- /**
2947
- * Checks whether secret storage:
2948
- * - is enabled on this account
2949
- * - is storing cross-signing private keys
2950
- * - is storing session backup key (if enabled)
2951
- *
2952
- * If this function returns false, bootstrapSecretStorage() can be used
2953
- * to fix things such that it returns true. That is to say, after
2954
- * bootstrapSecretStorage() completes successfully, this function should
2955
- * return true.
2956
- *
2957
- * @returns True if secret storage is ready to be used on this device
2958
- * @deprecated Prefer {@link CryptoApi.isSecretStorageReady | `CryptoApi.isSecretStorageReady`}.
2959
- */
2960
- public isSecretStorageReady(): Promise<boolean> {
2961
- if (!this.cryptoBackend) {
2962
- throw new Error("End-to-end encryption disabled");
2963
- }
2964
- return this.cryptoBackend.isSecretStorageReady();
2965
- }
2966
-
2967
- /**
2968
- * Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
2969
- * already set up, then no changes are made, so this is safe to run to ensure secret
2970
- * storage is ready for use.
2971
- *
2972
- * This function
2973
- * - creates a new Secure Secret Storage key if no default key exists
2974
- * - if a key backup exists, it is migrated to store the key in the Secret
2975
- * Storage
2976
- * - creates a backup if none exists, and one is requested
2977
- * - migrates Secure Secret Storage to use the latest algorithm, if an outdated
2978
- * algorithm is found
2979
- *
2980
- * @deprecated Use {@link CryptoApi.bootstrapSecretStorage | `CryptoApi.bootstrapSecretStorage`}.
2981
- */
2982
- public bootstrapSecretStorage(opts: ICreateSecretStorageOpts): Promise<void> {
2983
- if (!this.cryptoBackend) {
2984
- throw new Error("End-to-end encryption disabled");
2985
- }
2986
- return this.cryptoBackend.bootstrapSecretStorage(opts);
2987
- }
2988
-
2989
- /**
2990
- * Add a key for encrypting secrets.
2991
- *
2992
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
2993
- *
2994
- * @param algorithm - the algorithm used by the key
2995
- * @param opts - the options for the algorithm. The properties used
2996
- * depend on the algorithm given.
2997
- * @param keyName - the name of the key. If not given, a random name will be generated.
2998
- *
2999
- * @returns An object with:
3000
- * keyId: the ID of the key
3001
- * keyInfo: details about the key (iv, mac, passphrase)
3002
- *
3003
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
3004
- */
3005
- public addSecretStorageKey(
3006
- algorithm: string,
3007
- opts: AddSecretStorageKeyOpts,
3008
- keyName?: string,
3009
- ): Promise<{ keyId: string; keyInfo: SecretStorageKeyDescription }> {
3010
- return this.secretStorage.addKey(algorithm, opts, keyName);
3011
- }
3012
-
3013
- /**
3014
- * Check whether we have a key with a given ID.
3015
- *
3016
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3017
- *
3018
- * @param keyId - The ID of the key to check
3019
- * for. Defaults to the default key ID if not provided.
3020
- * @returns Whether we have the key.
3021
- *
3022
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
3023
- */
3024
- public hasSecretStorageKey(keyId?: string): Promise<boolean> {
3025
- return this.secretStorage.hasKey(keyId);
3026
- }
3027
-
3028
- /**
3029
- * Store an encrypted secret on the server.
3030
- *
3031
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3032
- *
3033
- * @param name - The name of the secret
3034
- * @param secret - The secret contents.
3035
- * @param keys - The IDs of the keys to use to encrypt the secret or null/undefined
3036
- * to use the default (will throw if no default key is set).
3037
- *
3038
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
3039
- */
3040
- public storeSecret(name: string, secret: string, keys?: string[]): Promise<void> {
3041
- return this.secretStorage.store(name, secret, keys);
3042
- }
3043
-
3044
- /**
3045
- * Get a secret from storage.
3046
- *
3047
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3048
- *
3049
- * @param name - the name of the secret
3050
- *
3051
- * @returns the contents of the secret
3052
- *
3053
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
3054
- */
3055
- public getSecret(name: string): Promise<string | undefined> {
3056
- return this.secretStorage.get(name);
3057
- }
3058
-
3059
- /**
3060
- * Check if a secret is stored on the server.
3061
- *
3062
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3063
- *
3064
- * @param name - the name of the secret
3065
- * @returns map of key name to key info the secret is encrypted
3066
- * with, or null if it is not present or not encrypted with a trusted
3067
- * key
3068
- *
3069
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
3070
- */
3071
- public isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null> {
3072
- return this.secretStorage.isStored(name);
3073
- }
3074
-
3075
- /**
3076
- * Request a secret from another device.
3077
- *
3078
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3079
- *
3080
- * @param name - the name of the secret to request
3081
- * @param devices - the devices to request the secret from
3082
- *
3083
- * @returns the secret request object
3084
- * @deprecated Not supported for Rust Cryptography.
3085
- */
3086
- public requestSecret(name: string, devices: string[]): ISecretRequest {
3087
- if (!this.crypto) {
3088
- throw new Error("End-to-end encryption disabled");
3089
- }
3090
- return this.crypto.requestSecret(name, devices);
3091
- }
3092
-
3093
- /**
3094
- * Get the current default key ID for encrypting secrets.
3095
- *
3096
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3097
- *
3098
- * @returns The default key ID or null if no default key ID is set
3099
- *
3100
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
3101
- */
3102
- public getDefaultSecretStorageKeyId(): Promise<string | null> {
3103
- return this.secretStorage.getDefaultKeyId();
3104
- }
3105
-
3106
- /**
3107
- * Set the current default key ID for encrypting secrets.
3108
- *
3109
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3110
- *
3111
- * @param keyId - The new default key ID
3112
- *
3113
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
3114
- */
3115
- public setDefaultSecretStorageKeyId(keyId: string): Promise<void> {
3116
- return this.secretStorage.setDefaultKeyId(keyId);
3117
- }
3118
-
3119
- /**
3120
- * Checks that a given secret storage private key matches a given public key.
3121
- * This can be used by the getSecretStorageKey callback to verify that the
3122
- * private key it is about to supply is the one that was requested.
3123
- *
3124
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
3125
- *
3126
- * @param privateKey - The private key
3127
- * @param expectedPublicKey - The public key
3128
- * @returns true if the key matches, otherwise false
3129
- *
3130
- * @deprecated The use of asymmetric keys for SSSS is deprecated.
3131
- * Use {@link SecretStorage.ServerSideSecretStorage#checkKey} for symmetric keys.
3132
- */
3133
- public checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {
3134
- if (!this.crypto) {
3135
- throw new Error("End-to-end encryption disabled");
3136
- }
3137
- return this.crypto.checkSecretStoragePrivateKey(privateKey, expectedPublicKey);
3138
- }
3139
-
3140
- /**
3141
- * Get e2e information on the device that sent an event
3142
- *
3143
- * @param event - event to be checked
3144
- * @deprecated Not supported for Rust Cryptography.
3145
- */
3146
- public async getEventSenderDeviceInfo(event: MatrixEvent): Promise<DeviceInfo | null> {
3147
- if (!this.crypto) {
3148
- return null;
3149
- }
3150
- return this.crypto.getEventSenderDeviceInfo(event);
3151
- }
3152
-
3153
- /**
3154
- * Check if the sender of an event is verified
3155
- *
3156
- * @param event - event to be checked
3157
- *
3158
- * @returns true if the sender of this event has been verified using
3159
- * {@link MatrixClient#setDeviceVerified}.
3160
- *
3161
- * @deprecated Not supported for Rust Cryptography.
3162
- */
3163
- public async isEventSenderVerified(event: MatrixEvent): Promise<boolean> {
3164
- const device = await this.getEventSenderDeviceInfo(event);
3165
- if (!device) {
3166
- return false;
3167
- }
3168
- return device.isVerified();
3169
- }
3170
-
3171
- /**
3172
- * Get outgoing room key request for this event if there is one.
3173
- * @param event - The event to check for
3174
- *
3175
- * @returns A room key request, or null if there is none
3176
- *
3177
- * @deprecated Not supported for Rust Cryptography.
3178
- */
3179
- public getOutgoingRoomKeyRequest(event: MatrixEvent): Promise<OutgoingRoomKeyRequest | null> {
3180
- if (!this.crypto) {
3181
- throw new Error("End-to-End encryption disabled");
3182
- }
3183
- const wireContent = event.getWireContent();
3184
- const requestBody: IRoomKeyRequestBody = {
3185
- session_id: wireContent.session_id,
3186
- sender_key: wireContent.sender_key,
3187
- algorithm: wireContent.algorithm,
3188
- room_id: event.getRoomId()!,
3189
- };
3190
- if (!requestBody.session_id || !requestBody.sender_key || !requestBody.algorithm || !requestBody.room_id) {
3191
- return Promise.resolve(null);
3192
- }
3193
- return this.crypto.cryptoStore.getOutgoingRoomKeyRequest(requestBody);
3194
- }
3195
-
3196
- /**
3197
- * Cancel a room key request for this event if one is ongoing and resend the
3198
- * request.
3199
- * @param event - event of which to cancel and resend the room
3200
- * key request.
3201
- * @returns A promise that will resolve when the key request is queued
3202
- *
3203
- * @deprecated Not supported for Rust Cryptography.
3204
- */
3205
- public cancelAndResendEventRoomKeyRequest(event: MatrixEvent): Promise<void> {
3206
- if (!this.crypto) {
3207
- throw new Error("End-to-End encryption disabled");
3208
- }
3209
- return event.cancelAndResendKeyRequest(this.crypto, this.getUserId()!);
3210
- }
3211
-
3212
- /**
3213
- * Enable end-to-end encryption for a room. This does not modify room state.
3214
- * Any messages sent before the returned promise resolves will be sent unencrypted.
3215
- * @param roomId - The room ID to enable encryption in.
3216
- * @param config - The encryption config for the room.
3217
- * @returns A promise that will resolve when encryption is set up.
3218
- *
3219
- * @deprecated Not supported for Rust Cryptography. To enable encryption in a room, send an `m.room.encryption`
3220
- * state event.
3221
- */
3222
- public setRoomEncryption(roomId: string, config: IRoomEncryption): Promise<void> {
3223
- if (!this.crypto) {
3224
- throw new Error("End-to-End encryption disabled");
3225
- }
3226
- return this.crypto.setRoomEncryption(roomId, config);
3227
- }
3228
-
3229
- /**
3230
- * Whether encryption is enabled for a room.
3231
- * @param roomId - the room id to query.
3232
- * @returns whether encryption is enabled.
3233
- *
3234
- * @deprecated Not correctly supported for Rust Cryptography. Use {@link CryptoApi.isEncryptionEnabledInRoom} and/or
3235
- * {@link Room.hasEncryptionStateEvent}.
3236
- */
3237
- public isRoomEncrypted(roomId: string): boolean {
3238
- const room = this.getRoom(roomId);
3239
- if (!room) {
3240
- // we don't know about this room, so can't determine if it should be
3241
- // encrypted. Let's assume not.
3242
- return false;
3243
- }
3244
-
3245
- // if there is an 'm.room.encryption' event in this room, it should be
3246
- // encrypted (independently of whether we actually support encryption)
3247
- if (room.hasEncryptionStateEvent()) {
3248
- return true;
3249
- }
3250
-
3251
- // we don't have an m.room.encrypted event, but that might be because
3252
- // the server is hiding it from us. Check the store to see if it was
3253
- // previously encrypted.
3254
- return this.crypto?.isRoomEncrypted(roomId) ?? false;
3255
- }
3256
-
3257
- /**
3258
- * Encrypts and sends a given object via Olm to-device messages to a given
3259
- * set of devices.
3260
- *
3261
- * @param userDeviceInfoArr - list of deviceInfo objects representing the devices to send to
3262
- *
3263
- * @param payload - fields to include in the encrypted payload
3264
- *
3265
- * @returns Promise which
3266
- * resolves once the message has been encrypted and sent to the given
3267
- * userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
3268
- * of the successfully sent messages.
3269
- *
3270
- * @deprecated Instead use {@link CryptoApi.encryptToDeviceMessages} followed by {@link queueToDevice}.
3271
- */
3272
- public encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void> {
3273
- if (!this.crypto) {
3274
- throw new Error("End-to-End encryption disabled");
3275
- }
3276
- return this.crypto.encryptAndSendToDevices(userDeviceInfoArr, payload);
3277
- }
3278
-
3279
- /**
3280
- * Forces the current outbound group session to be discarded such
3281
- * that another one will be created next time an event is sent.
3282
- *
3283
- * @param roomId - The ID of the room to discard the session for
3284
- *
3285
- * @deprecated Prefer {@link CryptoApi.forceDiscardSession | `CryptoApi.forceDiscardSession`}:
3286
- */
3287
- public forceDiscardSession(roomId: string): void {
3288
- if (!this.cryptoBackend) {
3289
- throw new Error("End-to-End encryption disabled");
3290
- }
3291
- this.cryptoBackend.forceDiscardSession(roomId);
3292
- }
3293
-
3294
- /**
3295
- * Get a list containing all of the room keys
3296
- *
3297
- * This should be encrypted before returning it to the user.
3298
- *
3299
- * @returns a promise which resolves to a list of session export objects
3300
- *
3301
- * @deprecated Prefer {@link CryptoApi.exportRoomKeys | `CryptoApi.exportRoomKeys`}:
3302
- *
3303
- * ```javascript
3304
- * sessionData = await client.getCrypto().exportRoomKeys();
3305
- * ```
3306
- */
3307
- public exportRoomKeys(): Promise<IMegolmSessionData[]> {
3308
- if (!this.cryptoBackend) {
3309
- return Promise.reject(new Error("End-to-end encryption disabled"));
3310
- }
3311
- return this.cryptoBackend.exportRoomKeys();
3312
- }
3313
-
3314
- /**
3315
- * Import a list of room keys previously exported by exportRoomKeys
3316
- *
3317
- * @param keys - a list of session export objects
3318
- * @param opts - options object
3319
- *
3320
- * @returns a promise which resolves when the keys have been imported
3321
- *
3322
- * @deprecated Prefer {@link CryptoApi.importRoomKeys | `CryptoApi.importRoomKeys`}:
3323
- * ```javascript
3324
- * await client.getCrypto()?.importRoomKeys([..]);
3325
- * ```
3326
- */
3327
- public importRoomKeys(keys: IMegolmSessionData[], opts?: ImportRoomKeysOpts): Promise<void> {
3328
- if (!this.cryptoBackend) {
3329
- throw new Error("End-to-end encryption disabled");
3330
- }
3331
- return this.cryptoBackend.importRoomKeys(keys, opts);
3332
- }
3333
-
3334
- /**
3335
- * Force a re-check of the local key backup status against
3336
- * what's on the server.
3337
- *
3338
- * @returns Object with backup info (as returned by
3339
- * getKeyBackupVersion) in backupInfo and
3340
- * trust information (as returned by isKeyBackupTrusted)
3341
- * in trustInfo.
3342
- *
3343
- * @deprecated Prefer {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
3344
- */
3345
- public checkKeyBackup(): Promise<IKeyBackupCheck | null> {
3346
- if (!this.crypto) {
3347
- throw new Error("End-to-end encryption disabled");
3348
- }
3349
- return this.crypto.backupManager.checkKeyBackup();
3350
- }
3351
-
3352
- /**
3353
- * Get information about the current key backup from the server.
3354
- *
3355
- * Performs some basic validity checks on the shape of the result, and raises an error if it is not as expected.
3356
- *
3357
- * **Note**: there is no (supported) way to distinguish between "failure to talk to the server" and "another client
3358
- * uploaded a key backup version using an algorithm I don't understand.
3359
- *
3360
- * @returns Information object from API, or null if no backup is present on the server.
3361
- *
3362
- * @deprecated Prefer {@link CryptoApi.getKeyBackupInfo}.
3363
- */
3364
- public async getKeyBackupVersion(): Promise<IKeyBackupInfo | null> {
3365
- let res: IKeyBackupInfo;
3366
- try {
3367
- res = await this.http.authedRequest<IKeyBackupInfo>(
3368
- Method.Get,
3369
- "/room_keys/version",
3370
- undefined,
3371
- undefined,
3372
- { prefix: ClientPrefix.V3 },
3373
- );
3374
- } catch (e) {
3375
- if ((<MatrixError>e).errcode === "M_NOT_FOUND") {
3376
- return null;
3377
- } else {
3378
- throw e;
3379
- }
3380
- }
3381
- BackupManager.checkBackupVersion(res);
3382
- return res;
3383
- }
3384
-
3385
- /**
3386
- * @param info - key backup info dict from getKeyBackupVersion()
3387
- *
3388
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.isKeyBackupTrusted | `CryptoApi.isKeyBackupTrusted`}.
3389
- */
3390
- public isKeyBackupTrusted(info: IKeyBackupInfo): Promise<TrustInfo> {
3391
- if (!this.crypto) {
3392
- throw new Error("End-to-end encryption disabled");
3393
- }
3394
- return this.crypto.backupManager.isKeyBackupTrusted(info);
3395
- }
3396
-
3397
- /**
3398
- * @returns true if the client is configured to back up keys to
3399
- * the server, otherwise false. If we haven't completed a successful check
3400
- * of key backup status yet, returns null.
3401
- *
3402
- * @deprecated Not supported for Rust Cryptography. Prefer direct access to {@link Crypto.CryptoApi.getActiveSessionBackupVersion}:
3403
- *
3404
- * ```javascript
3405
- * let enabled = (await client.getCrypto().getActiveSessionBackupVersion()) !== null;
3406
- * ```
3407
- */
3408
- public getKeyBackupEnabled(): boolean | null {
3409
- if (!this.crypto) {
3410
- throw new Error("End-to-end encryption disabled");
3411
- }
3412
- return this.crypto.backupManager.getKeyBackupEnabled();
3413
- }
3414
-
3415
- /**
3416
- * Enable backing up of keys, using data previously returned from
3417
- * getKeyBackupVersion.
3418
- *
3419
- * @param info - Backup information object as returned by getKeyBackupVersion
3420
- * @returns Promise which resolves when complete.
3421
- *
3422
- * @deprecated Do not call this directly. Instead call {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
3423
- */
3424
- public enableKeyBackup(info: IKeyBackupInfo): Promise<void> {
3425
- if (!this.crypto) {
3426
- throw new Error("End-to-end encryption disabled");
3427
- }
3428
-
3429
- return this.crypto.backupManager.enableKeyBackup(info);
3430
- }
3431
-
3432
- /**
3433
- * Disable backing up of keys.
3434
- *
3435
- * @deprecated Not supported for Rust Cryptography. It should be unnecessary to disable key backup.
3436
- */
3437
- public disableKeyBackup(): void {
3438
- if (!this.crypto) {
3439
- throw new Error("End-to-end encryption disabled");
3440
- }
3441
-
3442
- this.crypto.backupManager.disableKeyBackup();
3443
- }
3444
-
3445
- /**
3446
- * Set up the data required to create a new backup version. The backup version
3447
- * will not be created and enabled until createKeyBackupVersion is called.
3448
- *
3449
- * @param password - Passphrase string that can be entered by the user
3450
- * when restoring the backup as an alternative to entering the recovery key.
3451
- * Optional.
3452
- *
3453
- * @returns Object that can be passed to createKeyBackupVersion and
3454
- * additionally has a 'recovery_key' member with the user-facing recovery key string.
3455
- *
3456
- * @deprecated Not supported for Rust cryptography. Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
3457
- */
3458
- public async prepareKeyBackupVersion(
3459
- password?: string | Uint8Array | null,
3460
- opts: IKeyBackupPrepareOpts = { secureSecretStorage: false },
3461
- ): Promise<Pick<IPreparedKeyBackupVersion, "algorithm" | "auth_data" | "recovery_key">> {
3462
- if (!this.crypto) {
3463
- throw new Error("End-to-end encryption disabled");
3464
- }
3465
-
3466
- // eslint-disable-next-line camelcase
3467
- const { algorithm, auth_data, recovery_key, privateKey } =
3468
- await this.crypto.backupManager.prepareKeyBackupVersion(password);
3469
-
3470
- if (opts.secureSecretStorage) {
3471
- await this.secretStorage.store("m.megolm_backup.v1", encodeBase64(privateKey));
3472
- this.logger.info("Key backup private key stored in secret storage");
3473
- }
3474
-
3475
- return {
3476
- algorithm,
3477
- /* eslint-disable camelcase */
3478
- auth_data,
3479
- recovery_key,
3480
- /* eslint-enable camelcase */
3481
- };
3482
- }
3483
-
3484
- /**
3485
- * Check whether the key backup private key is stored in secret storage.
3486
- * @returns map of key name to key info the secret is
3487
- * encrypted with, or null if it is not present or not encrypted with a
3488
- * trusted key
3489
- */
3490
- public isKeyBackupKeyStored(): Promise<Record<string, SecretStorageKeyDescription> | null> {
3491
- return Promise.resolve(this.secretStorage.isStored("m.megolm_backup.v1"));
3492
- }
3493
-
3494
- /**
3495
- * Create a new key backup version and enable it, using the information return
3496
- * from prepareKeyBackupVersion.
3497
- *
3498
- * @param info - Info object from prepareKeyBackupVersion
3499
- * @returns Object with 'version' param indicating the version created
3500
- *
3501
- * @deprecated Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
3502
- */
3503
- public async createKeyBackupVersion(info: IKeyBackupInfo): Promise<IKeyBackupInfo> {
3504
- if (!this.crypto) {
3505
- throw new Error("End-to-end encryption disabled");
3506
- }
3507
-
3508
- await this.crypto.backupManager.createKeyBackupVersion(info);
3509
-
3510
- const data = {
3511
- algorithm: info.algorithm,
3512
- auth_data: info.auth_data,
3513
- };
3514
-
3515
- // Sign the backup auth data with the device key for backwards compat with
3516
- // older devices with cross-signing. This can probably go away very soon in
3517
- // favour of just signing with the cross-singing master key.
3518
- // XXX: Private member access
3519
- await this.crypto.signObject(data.auth_data);
3520
-
3521
- if (
3522
- this.cryptoCallbacks.getCrossSigningKey &&
3523
- // XXX: Private member access
3524
- this.crypto.crossSigningInfo.getId()
3525
- ) {
3526
- // now also sign the auth data with the cross-signing master key
3527
- // we check for the callback explicitly here because we still want to be able
3528
- // to create an un-cross-signed key backup if there is a cross-signing key but
3529
- // no callback supplied.
3530
- // XXX: Private member access
3531
- await this.crypto.crossSigningInfo.signObject(data.auth_data, "master");
3532
- }
3533
-
3534
- const res = await this.http.authedRequest<IKeyBackupInfo>(Method.Post, "/room_keys/version", undefined, data);
3535
-
3536
- // We could assume everything's okay and enable directly, but this ensures
3537
- // we run the same signature verification that will be used for future
3538
- // sessions.
3539
- await this.checkKeyBackup();
3540
- if (!this.getKeyBackupEnabled()) {
3541
- this.logger.error("Key backup not usable even though we just created it");
3542
- }
3543
-
3544
- return res;
3545
- }
3546
-
3547
- /**
3548
- * @deprecated Use {@link Crypto.CryptoApi.deleteKeyBackupVersion | `CryptoApi.deleteKeyBackupVersion`}.
3549
- */
3550
- public async deleteKeyBackupVersion(version: string): Promise<void> {
3551
- if (!this.cryptoBackend) {
3552
- throw new Error("End-to-end encryption disabled");
3553
- }
3554
-
3555
- await this.cryptoBackend.deleteKeyBackupVersion(version);
3556
- }
3557
-
3558
- private makeKeyBackupPath(roomId?: string, sessionId?: string, version?: string): IKeyBackupPath {
3559
- let path: string;
3560
- if (sessionId !== undefined) {
3561
- path = utils.encodeUri("/room_keys/keys/$roomId/$sessionId", {
3562
- $roomId: roomId!,
3563
- $sessionId: sessionId,
3564
- });
3565
- } else if (roomId !== undefined) {
3566
- path = utils.encodeUri("/room_keys/keys/$roomId", {
3567
- $roomId: roomId,
3568
- });
3569
- } else {
3570
- path = "/room_keys/keys";
3571
- }
3572
- const queryData = version === undefined ? undefined : { version };
3573
- return { path, queryData };
3574
- }
3575
-
3576
- /**
3577
- * Back up session keys to the homeserver.
3578
- * @param roomId - ID of the room that the keys are for Optional.
3579
- * @param sessionId - ID of the session that the keys are for Optional.
3580
- * @param version - backup version Optional.
3581
- * @param data - Object keys to send
3582
- * @returns a promise that will resolve when the keys
3583
- * are uploaded
3584
- *
3585
- * @deprecated Not supported for Rust Cryptography.
3586
- */
3587
- public sendKeyBackup(
3588
- roomId: undefined,
3589
- sessionId: undefined,
3590
- version: string | undefined,
3591
- data: IKeyBackup,
3592
- ): Promise<void>;
3593
- public sendKeyBackup(
3594
- roomId: string,
3595
- sessionId: undefined,
3596
- version: string | undefined,
3597
- data: IKeyBackup,
3598
- ): Promise<void>;
3599
- public sendKeyBackup(
3600
- roomId: string,
3601
- sessionId: string,
3602
- version: string | undefined,
3603
- data: IKeyBackup,
3604
- ): Promise<void>;
3605
- public async sendKeyBackup(
3606
- roomId: string | undefined,
3607
- sessionId: string | undefined,
3608
- version: string | undefined,
3609
- data: IKeyBackup,
3610
- ): Promise<void> {
3611
- if (!this.crypto) {
3612
- throw new Error("End-to-end encryption disabled");
3613
- }
3614
-
3615
- const path = this.makeKeyBackupPath(roomId!, sessionId!, version);
3616
- await this.http.authedRequest(Method.Put, path.path, path.queryData, data, { prefix: ClientPrefix.V3 });
3617
- }
3618
-
3619
- /**
3620
- * Marks all group sessions as needing to be backed up and schedules them to
3621
- * upload in the background as soon as possible.
3622
- *
3623
- * @deprecated Not supported for Rust Cryptography. This is done automatically as part of
3624
- * {@link CryptoApi.resetKeyBackup}, so there is probably no need to call this manually.
3625
- */
3626
- public async scheduleAllGroupSessionsForBackup(): Promise<void> {
3627
- if (!this.crypto) {
3628
- throw new Error("End-to-end encryption disabled");
3629
- }
3630
-
3631
- await this.crypto.backupManager.scheduleAllGroupSessionsForBackup();
3632
- }
3633
-
3634
- /**
3635
- * Marks all group sessions as needing to be backed up without scheduling
3636
- * them to upload in the background.
3637
- *
3638
- * (This is done automatically as part of {@link CryptoApi.resetKeyBackup},
3639
- * so there is probably no need to call this manually.)
3640
- *
3641
- * @returns Promise which resolves to the number of sessions requiring a backup.
3642
- * @deprecated Not supported for Rust Cryptography.
3643
- */
3644
- public flagAllGroupSessionsForBackup(): Promise<number> {
3645
- if (!this.crypto) {
3646
- throw new Error("End-to-end encryption disabled");
3647
- }
3648
-
3649
- return this.crypto.backupManager.flagAllGroupSessionsForBackup();
1438
+ public getScheduler(): MatrixScheduler | undefined {
1439
+ return this.scheduler;
3650
1440
  }
3651
1441
 
3652
1442
  /**
3653
- * Return true if recovery key is valid.
3654
- * Try to decode the recovery key and check if it's successful.
3655
- * @param recoveryKey
3656
- * @deprecated Use {@link decodeRecoveryKey} directly
1443
+ * Retry a backed off syncing request immediately. This should only be used when
1444
+ * the user <b>explicitly</b> attempts to retry their lost connection.
1445
+ * Will also retry any outbound to-device messages currently in the queue to be sent
1446
+ * (retries of regular outgoing events are handled separately, per-event).
1447
+ * @returns True if this resulted in a request being retried.
3657
1448
  */
3658
- public isValidRecoveryKey(recoveryKey: string): boolean {
3659
- try {
3660
- decodeRecoveryKey(recoveryKey);
3661
- return true;
3662
- } catch {
3663
- return false;
3664
- }
1449
+ public retryImmediately(): boolean {
1450
+ // don't await for this promise: we just want to kick it off
1451
+ this.toDeviceMessageQueue.sendQueue();
1452
+ return this.syncApi?.retryImmediately() ?? false;
3665
1453
  }
3666
1454
 
3667
1455
  /**
3668
- * Get the raw key for a key backup from the password
3669
- * Used when migrating key backups into SSSS
3670
- *
3671
- * The cross-signing API is currently UNSTABLE and may change without notice.
1456
+ * Return the global notification EventTimelineSet, if any
3672
1457
  *
3673
- * @param password - Passphrase
3674
- * @param backupInfo - Backup metadata from `checkKeyBackup`
3675
- * @returns key backup key
3676
- * @deprecated Deriving a backup key from a passphrase is not part of the matrix spec. Instead, a random key is generated and stored/shared via 4S.
1458
+ * @returns the globl notification EventTimelineSet
3677
1459
  */
3678
- public keyBackupKeyFromPassword(password: string, backupInfo: IKeyBackupInfo): Promise<Uint8Array> {
3679
- return keyFromAuthData(backupInfo.auth_data, password);
1460
+ public getNotifTimelineSet(): EventTimelineSet | null {
1461
+ return this.notifTimelineSet;
3680
1462
  }
3681
1463
 
3682
1464
  /**
3683
- * Get the raw key for a key backup from the recovery key
3684
- * Used when migrating key backups into SSSS
3685
- *
3686
- * The cross-signing API is currently UNSTABLE and may change without notice.
1465
+ * Set the global notification EventTimelineSet
3687
1466
  *
3688
- * @param recoveryKey - The recovery key
3689
- * @returns key backup key
3690
- * @deprecated Use {@link decodeRecoveryKey} directly
3691
1467
  */
3692
- public keyBackupKeyFromRecoveryKey(recoveryKey: string): Uint8Array {
3693
- return decodeRecoveryKey(recoveryKey);
1468
+ public setNotifTimelineSet(set: EventTimelineSet): void {
1469
+ this.notifTimelineSet = set;
3694
1470
  }
3695
1471
 
3696
1472
  /**
3697
- * Restore from an existing key backup via a passphrase.
3698
- *
3699
- * @param password - Passphrase
3700
- * @param targetRoomId - Room ID to target a specific room.
3701
- * Restores all rooms if omitted.
3702
- * @param targetSessionId - Session ID to target a specific session.
3703
- * Restores all sessions if omitted.
3704
- * @param backupInfo - Backup metadata from `getKeyBackupVersion` or `checkKeyBackup`.`backupInfo`
3705
- * @param opts - Optional params such as callbacks
3706
- * @returns Status of restoration with `total` and `imported`
3707
- * key counts.
1473
+ * Gets the cached capabilities of the homeserver, returning cached ones if available.
1474
+ * If there are no cached capabilities and none can be fetched, throw an exception.
3708
1475
  *
3709
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
3710
- */
3711
- public async restoreKeyBackupWithPassword(
3712
- password: string,
3713
- targetRoomId: undefined,
3714
- targetSessionId: undefined,
3715
- backupInfo: IKeyBackupInfo,
3716
- opts: IKeyBackupRestoreOpts,
3717
- ): Promise<IKeyBackupRestoreResult>;
3718
- /**
3719
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
3720
- */
3721
- public async restoreKeyBackupWithPassword(
3722
- password: string,
3723
- targetRoomId: string,
3724
- targetSessionId: undefined,
3725
- backupInfo: IKeyBackupInfo,
3726
- opts: IKeyBackupRestoreOpts,
3727
- ): Promise<IKeyBackupRestoreResult>;
3728
- /**
3729
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
3730
- */
3731
- public async restoreKeyBackupWithPassword(
3732
- password: string,
3733
- targetRoomId: string,
3734
- targetSessionId: string,
3735
- backupInfo: IKeyBackupInfo,
3736
- opts: IKeyBackupRestoreOpts,
3737
- ): Promise<IKeyBackupRestoreResult>;
3738
- /**
3739
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
1476
+ * @returns Promise resolving with The capabilities of the homeserver
3740
1477
  */
3741
- public async restoreKeyBackupWithPassword(
3742
- password: string,
3743
- targetRoomId: string | undefined,
3744
- targetSessionId: string | undefined,
3745
- backupInfo: IKeyBackupInfo,
3746
- opts: IKeyBackupRestoreOpts,
3747
- ): Promise<IKeyBackupRestoreResult> {
3748
- const privKey = await keyFromAuthData(backupInfo.auth_data, password);
3749
- return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
3750
- }
3751
-
3752
- /**
3753
- * Restore from an existing key backup via a private key stored in secret
3754
- * storage.
3755
- *
3756
- * @param backupInfo - Backup metadata from `checkKeyBackup`
3757
- * @param targetRoomId - Room ID to target a specific room.
3758
- * Restores all rooms if omitted.
3759
- * @param targetSessionId - Session ID to target a specific session.
3760
- * Restores all sessions if omitted.
3761
- * @param opts - Optional params such as callbacks
3762
- * @returns Status of restoration with `total` and `imported`
3763
- * key counts.
3764
- *
3765
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3766
- */
3767
- public async restoreKeyBackupWithSecretStorage(
3768
- backupInfo: IKeyBackupInfo,
3769
- targetRoomId?: string,
3770
- targetSessionId?: string,
3771
- opts?: IKeyBackupRestoreOpts,
3772
- ): Promise<IKeyBackupRestoreResult> {
3773
- if (!this.cryptoBackend) {
3774
- throw new Error("End-to-end encryption disabled");
3775
- }
3776
- const storedKey = await this.secretStorage.get("m.megolm_backup.v1");
3777
-
3778
- // ensure that the key is in the right format. If not, fix the key and
3779
- // store the fixed version
3780
- const fixedKey = fixBackupKey(storedKey);
3781
- if (fixedKey) {
3782
- const keys = await this.secretStorage.getKey();
3783
- await this.secretStorage.store("m.megolm_backup.v1", fixedKey, [keys![0]]);
3784
- }
3785
-
3786
- const privKey = decodeBase64(fixedKey || storedKey!);
3787
- return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
3788
- }
3789
-
3790
- /**
3791
- * Restore from an existing key backup via an encoded recovery key.
3792
- *
3793
- * @param recoveryKey - Encoded recovery key
3794
- * @param targetRoomId - Room ID to target a specific room.
3795
- * Restores all rooms if omitted.
3796
- * @param targetSessionId - Session ID to target a specific session.
3797
- * Restores all sessions if omitted.
3798
- * @param backupInfo - Backup metadata from `checkKeyBackup`
3799
- * @param opts - Optional params such as callbacks
3800
-
3801
- * @returns Status of restoration with `total` and `imported`
3802
- * key counts.
3803
- *
3804
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3805
- */
3806
- public restoreKeyBackupWithRecoveryKey(
3807
- recoveryKey: string,
3808
- targetRoomId: undefined,
3809
- targetSessionId: undefined,
3810
- backupInfo: IKeyBackupInfo,
3811
- opts?: IKeyBackupRestoreOpts,
3812
- ): Promise<IKeyBackupRestoreResult>;
3813
- /**
3814
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3815
- */
3816
- public restoreKeyBackupWithRecoveryKey(
3817
- recoveryKey: string,
3818
- targetRoomId: string,
3819
- targetSessionId: undefined,
3820
- backupInfo: IKeyBackupInfo,
3821
- opts?: IKeyBackupRestoreOpts,
3822
- ): Promise<IKeyBackupRestoreResult>;
3823
- /**
3824
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3825
- */
3826
- public restoreKeyBackupWithRecoveryKey(
3827
- recoveryKey: string,
3828
- targetRoomId: string,
3829
- targetSessionId: string,
3830
- backupInfo: IKeyBackupInfo,
3831
- opts?: IKeyBackupRestoreOpts,
3832
- ): Promise<IKeyBackupRestoreResult>;
3833
- /**
3834
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3835
- */
3836
- public restoreKeyBackupWithRecoveryKey(
3837
- recoveryKey: string,
3838
- targetRoomId: string | undefined,
3839
- targetSessionId: string | undefined,
3840
- backupInfo: IKeyBackupInfo,
3841
- opts?: IKeyBackupRestoreOpts,
3842
- ): Promise<IKeyBackupRestoreResult> {
3843
- const privKey = decodeRecoveryKey(recoveryKey);
3844
- return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
3845
- }
3846
-
3847
- /**
3848
- * Restore from an existing key backup via a private key stored locally
3849
- * @param targetRoomId
3850
- * @param targetSessionId
3851
- * @param backupInfo
3852
- * @param opts
3853
- *
3854
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3855
- */
3856
- public async restoreKeyBackupWithCache(
3857
- targetRoomId: undefined,
3858
- targetSessionId: undefined,
3859
- backupInfo: IKeyBackupInfo,
3860
- opts?: IKeyBackupRestoreOpts,
3861
- ): Promise<IKeyBackupRestoreResult>;
3862
- /**
3863
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3864
- */
3865
- public async restoreKeyBackupWithCache(
3866
- targetRoomId: string,
3867
- targetSessionId: undefined,
3868
- backupInfo: IKeyBackupInfo,
3869
- opts?: IKeyBackupRestoreOpts,
3870
- ): Promise<IKeyBackupRestoreResult>;
3871
- /**
3872
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3873
- */
3874
- public async restoreKeyBackupWithCache(
3875
- targetRoomId: string,
3876
- targetSessionId: string,
3877
- backupInfo: IKeyBackupInfo,
3878
- opts?: IKeyBackupRestoreOpts,
3879
- ): Promise<IKeyBackupRestoreResult>;
3880
- /**
3881
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
3882
- */
3883
- public async restoreKeyBackupWithCache(
3884
- targetRoomId: string | undefined,
3885
- targetSessionId: string | undefined,
3886
- backupInfo: IKeyBackupInfo,
3887
- opts?: IKeyBackupRestoreOpts,
3888
- ): Promise<IKeyBackupRestoreResult> {
3889
- if (!this.cryptoBackend) {
3890
- throw new Error("End-to-end encryption disabled");
3891
- }
3892
- const privKey = await this.cryptoBackend.getSessionBackupPrivateKey();
3893
- if (!privKey) {
3894
- throw new Error("Couldn't get key");
3895
- }
3896
- return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
3897
- }
3898
-
3899
- private async restoreKeyBackup(
3900
- privKey: ArrayLike<number>,
3901
- targetRoomId: undefined,
3902
- targetSessionId: undefined,
3903
- backupInfo: IKeyBackupInfo,
3904
- opts?: IKeyBackupRestoreOpts,
3905
- ): Promise<IKeyBackupRestoreResult>;
3906
- private async restoreKeyBackup(
3907
- privKey: ArrayLike<number>,
3908
- targetRoomId: string,
3909
- targetSessionId: undefined,
3910
- backupInfo: IKeyBackupInfo,
3911
- opts?: IKeyBackupRestoreOpts,
3912
- ): Promise<IKeyBackupRestoreResult>;
3913
- private async restoreKeyBackup(
3914
- privKey: ArrayLike<number>,
3915
- targetRoomId: string,
3916
- targetSessionId: string,
3917
- backupInfo: IKeyBackupInfo,
3918
- opts?: IKeyBackupRestoreOpts,
3919
- ): Promise<IKeyBackupRestoreResult>;
3920
- private async restoreKeyBackup(
3921
- privKey: ArrayLike<number>,
3922
- targetRoomId: string | undefined,
3923
- targetSessionId: string | undefined,
3924
- backupInfo: IKeyBackupInfo,
3925
- opts?: IKeyBackupRestoreOpts,
3926
- ): Promise<IKeyBackupRestoreResult> {
3927
- const cacheCompleteCallback = opts?.cacheCompleteCallback;
3928
- const progressCallback = opts?.progressCallback;
3929
-
3930
- if (!this.cryptoBackend) {
3931
- throw new Error("End-to-end encryption disabled");
3932
- }
3933
-
3934
- if (!backupInfo.version) {
3935
- throw new Error("Backup version must be defined");
3936
- }
3937
- const backupVersion = backupInfo.version!;
3938
-
3939
- let totalKeyCount = 0;
3940
- let totalFailures = 0;
3941
- let totalImported = 0;
3942
-
3943
- const path = this.makeKeyBackupPath(targetRoomId, targetSessionId, backupVersion);
3944
-
3945
- const backupDecryptor = await this.cryptoBackend.getBackupDecryptor(backupInfo, privKey);
3946
-
3947
- const untrusted = !backupDecryptor.sourceTrusted;
3948
-
3949
- try {
3950
- if (!(privKey instanceof Uint8Array)) {
3951
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
3952
- throw new Error(`restoreKeyBackup expects Uint8Array, got ${privKey}`);
3953
- }
3954
- // Cache the key, if possible.
3955
- // This is async.
3956
- this.cryptoBackend
3957
- .storeSessionBackupPrivateKey(privKey, backupVersion)
3958
- .catch((e) => {
3959
- this.logger.warn("Error caching session backup key:", e);
3960
- })
3961
- .then(cacheCompleteCallback);
3962
-
3963
- if (progressCallback) {
3964
- progressCallback({
3965
- stage: "fetch",
3966
- });
3967
- }
3968
-
3969
- const res = await this.http.authedRequest<IRoomsKeysResponse | IRoomKeysResponse | IKeyBackupSession>(
3970
- Method.Get,
3971
- path.path,
3972
- path.queryData,
3973
- undefined,
3974
- { prefix: ClientPrefix.V3 },
3975
- );
3976
-
3977
- // We have finished fetching the backup, go to next step
3978
- if (progressCallback) {
3979
- progressCallback({
3980
- stage: "load_keys",
3981
- });
3982
- }
3983
-
3984
- if ((res as IRoomsKeysResponse).rooms) {
3985
- // We have a full backup here, it can get quite big, so we need to decrypt and import it in chunks.
3986
-
3987
- // Get the total count as a first pass
3988
- totalKeyCount = this.getTotalKeyCount(res as IRoomsKeysResponse);
3989
- // Now decrypt and import the keys in chunks
3990
- await this.handleDecryptionOfAFullBackup(
3991
- res as IRoomsKeysResponse,
3992
- backupDecryptor,
3993
- 200,
3994
- async (chunk) => {
3995
- // We have a chunk of decrypted keys: import them
3996
- try {
3997
- const backupVersion = backupInfo.version!;
3998
- await this.cryptoBackend!.importBackedUpRoomKeys(chunk, backupVersion, {
3999
- untrusted,
4000
- });
4001
- totalImported += chunk.length;
4002
- } catch (e) {
4003
- totalFailures += chunk.length;
4004
- // We failed to import some keys, but we should still try to import the rest?
4005
- // Log the error and continue
4006
- logger.error("Error importing keys from backup", e);
4007
- }
4008
-
4009
- if (progressCallback) {
4010
- progressCallback({
4011
- total: totalKeyCount,
4012
- successes: totalImported,
4013
- stage: "load_keys",
4014
- failures: totalFailures,
4015
- });
4016
- }
4017
- },
4018
- );
4019
- } else if ((res as IRoomKeysResponse).sessions) {
4020
- // For now we don't chunk for a single room backup, but we could in the future.
4021
- // Currently it is not used by the application.
4022
- const sessions = (res as IRoomKeysResponse).sessions;
4023
- totalKeyCount = Object.keys(sessions).length;
4024
- const keys = await backupDecryptor.decryptSessions(sessions);
4025
- for (const k of keys) {
4026
- k.room_id = targetRoomId!;
4027
- }
4028
- await this.cryptoBackend.importBackedUpRoomKeys(keys, backupVersion, {
4029
- progressCallback,
4030
- untrusted,
4031
- });
4032
- totalImported = keys.length;
4033
- } else {
4034
- totalKeyCount = 1;
4035
- try {
4036
- const [key] = await backupDecryptor.decryptSessions({
4037
- [targetSessionId!]: res as IKeyBackupSession,
4038
- });
4039
- key.room_id = targetRoomId!;
4040
- key.session_id = targetSessionId!;
4041
-
4042
- await this.cryptoBackend.importBackedUpRoomKeys([key], backupVersion, {
4043
- progressCallback,
4044
- untrusted,
4045
- });
4046
- totalImported = 1;
4047
- } catch (e) {
4048
- this.logger.debug("Failed to decrypt megolm session from backup", e);
4049
- }
4050
- }
4051
- } finally {
4052
- backupDecryptor.free();
4053
- }
4054
-
4055
- /// in case entering the passphrase would add a new signature?
4056
- await this.cryptoBackend.checkKeyBackupAndEnable();
4057
-
4058
- return { total: totalKeyCount, imported: totalImported };
1478
+ public async getCapabilities(): Promise<Capabilities> {
1479
+ const caps = this.serverCapabilitiesService.getCachedCapabilities();
1480
+ if (caps) return caps;
1481
+ return this.serverCapabilitiesService.fetchCapabilities();
4059
1482
  }
4060
1483
 
4061
1484
  /**
4062
- * This method calculates the total number of keys present in the response of a `/room_keys/keys` call.
4063
- *
4064
- * @param res - The response from the server containing the keys to be counted.
1485
+ * Gets the cached capabilities of the homeserver. If none have been fetched yet,
1486
+ * return undefined.
4065
1487
  *
4066
- * @returns The total number of keys in the backup.
1488
+ * @returns The capabilities of the homeserver
4067
1489
  */
4068
- private getTotalKeyCount(res: IRoomsKeysResponse): number {
4069
- const rooms = res.rooms;
4070
- let totalKeyCount = 0;
4071
- for (const roomData of Object.values(rooms)) {
4072
- if (!roomData.sessions) continue;
4073
- totalKeyCount += Object.keys(roomData.sessions).length;
4074
- }
4075
- return totalKeyCount;
1490
+ public getCachedCapabilities(): Capabilities | undefined {
1491
+ return this.serverCapabilitiesService.getCachedCapabilities();
4076
1492
  }
4077
1493
 
4078
1494
  /**
4079
- * This method handles the decryption of a full backup, i.e a call to `/room_keys/keys`.
4080
- * It will decrypt the keys in chunks and call the `block` callback for each chunk.
4081
- *
4082
- * @param res - The response from the server containing the keys to be decrypted.
4083
- * @param backupDecryptor - An instance of the BackupDecryptor class used to decrypt the keys.
4084
- * @param chunkSize - The size of the chunks to be processed at a time.
4085
- * @param block - A callback function that is called for each chunk of keys.
1495
+ * Fetches the latest capabilities from the homeserver, ignoring any cached
1496
+ * versions. The newly returned version is cached.
4086
1497
  *
4087
- * @returns A promise that resolves when the decryption is complete.
1498
+ * @returns A promise which resolves to the capabilities of the homeserver
4088
1499
  */
4089
- private async handleDecryptionOfAFullBackup(
4090
- res: IRoomsKeysResponse,
4091
- backupDecryptor: BackupDecryptor,
4092
- chunkSize: number,
4093
- block: (chunk: IMegolmSessionData[]) => Promise<void>,
4094
- ): Promise<void> {
4095
- const rooms = (res as IRoomsKeysResponse).rooms;
4096
-
4097
- let groupChunkCount = 0;
4098
- let chunkGroupByRoom: Map<string, IKeyBackupRoomSessions> = new Map();
4099
-
4100
- const handleChunkCallback = async (roomChunks: Map<string, IKeyBackupRoomSessions>): Promise<void> => {
4101
- const currentChunk: IMegolmSessionData[] = [];
4102
- for (const roomId of roomChunks.keys()) {
4103
- const decryptedSessions = await backupDecryptor.decryptSessions(roomChunks.get(roomId)!);
4104
- for (const sessionId in decryptedSessions) {
4105
- const k = decryptedSessions[sessionId];
4106
- k.room_id = roomId;
4107
- currentChunk.push(k);
4108
- }
4109
- }
4110
- await block(currentChunk);
4111
- };
4112
-
4113
- for (const [roomId, roomData] of Object.entries(rooms)) {
4114
- if (!roomData.sessions) continue;
4115
-
4116
- chunkGroupByRoom.set(roomId, {});
4117
-
4118
- for (const [sessionId, session] of Object.entries(roomData.sessions)) {
4119
- const sessionsForRoom = chunkGroupByRoom.get(roomId)!;
4120
- sessionsForRoom[sessionId] = session;
4121
- groupChunkCount += 1;
4122
- if (groupChunkCount >= chunkSize) {
4123
- // We have enough chunks to decrypt
4124
- await handleChunkCallback(chunkGroupByRoom);
4125
- chunkGroupByRoom = new Map();
4126
- // There might be remaining keys for that room, so add back an entry for the current room.
4127
- chunkGroupByRoom.set(roomId, {});
4128
- groupChunkCount = 0;
4129
- }
4130
- }
4131
- }
4132
-
4133
- // Handle remaining chunk if needed
4134
- if (groupChunkCount > 0) {
4135
- await handleChunkCallback(chunkGroupByRoom);
4136
- }
1500
+ public fetchCapabilities(): Promise<Capabilities> {
1501
+ return this.serverCapabilitiesService.fetchCapabilities();
4137
1502
  }
4138
1503
 
4139
- public deleteKeysFromBackup(roomId: undefined, sessionId: undefined, version?: string): Promise<void>;
4140
- public deleteKeysFromBackup(roomId: string, sessionId: undefined, version?: string): Promise<void>;
4141
- public deleteKeysFromBackup(roomId: string, sessionId: string, version?: string): Promise<void>;
4142
- public async deleteKeysFromBackup(roomId?: string, sessionId?: string, version?: string): Promise<void> {
4143
- const path = this.makeKeyBackupPath(roomId!, sessionId!, version);
4144
- await this.http.authedRequest(Method.Delete, path.path, path.queryData, undefined, { prefix: ClientPrefix.V3 });
1504
+ /**
1505
+ * @deprecated Does nothing.
1506
+ */
1507
+ public async uploadKeys(): Promise<void> {
1508
+ this.logger.warn("MatrixClient.uploadKeys is deprecated");
4145
1509
  }
4146
1510
 
4147
1511
  /**
@@ -4309,7 +1673,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
4309
1673
  */
4310
1674
  public getIgnoredUsers(): string[] {
4311
1675
  const event = this.getAccountData("m.ignored_user_list");
4312
- if (!event || !event.getContent() || !event.getContent()["ignored_users"]) return [];
1676
+ if (!event?.getContent()["ignored_users"]) return [];
4313
1677
  return Object.keys(event.getContent()["ignored_users"]);
4314
1678
  }
4315
1679
 
@@ -4817,18 +2181,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
4817
2181
  }
4818
2182
 
4819
2183
  try {
4820
- let cancelled: boolean;
4821
2184
  this.eventsBeingEncrypted.add(event.getId()!);
4822
- try {
4823
- await this.encryptEventIfNeeded(event, room ?? undefined);
4824
- } finally {
4825
- cancelled = !this.eventsBeingEncrypted.delete(event.getId()!);
4826
- }
4827
-
4828
- if (cancelled) {
4829
- // cancelled via MatrixClient::cancelPendingEvent
4830
- return {} as ISendEventResponse;
4831
- }
4832
2185
 
4833
2186
  // encryptEventIfNeeded may have updated the status from SENDING to ENCRYPTING. If so, we need
4834
2187
  // to put it back.
@@ -4879,70 +2232,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
4879
2232
  }
4880
2233
  }
4881
2234
 
4882
- private async encryptEventIfNeeded(event: MatrixEvent, room?: Room): Promise<void> {
4883
- // If the room is unknown, we cannot encrypt for it
4884
- if (!room) return;
4885
-
4886
- if (!(await this.shouldEncryptEventForRoom(event, room))) return;
4887
-
4888
- if (!this.cryptoBackend && this.usingExternalCrypto) {
4889
- // The client has opted to allow sending messages to encrypted
4890
- // rooms even if the room is encrypted, and we haven't set up
4891
- // crypto. This is useful for users of matrix-org/pantalaimon
4892
- return;
4893
- }
4894
-
4895
- if (!this.cryptoBackend) {
4896
- throw new Error("This room is configured to use encryption, but your client does not support encryption.");
4897
- }
4898
-
4899
- this.updatePendingEventStatus(room, event, EventStatus.ENCRYPTING);
4900
- await this.cryptoBackend.encryptEvent(event, room);
4901
- }
4902
-
4903
- /**
4904
- * Determine whether a given event should be encrypted when we send it to the given room.
4905
- *
4906
- * This takes into account event type and room configuration.
4907
- */
4908
- private async shouldEncryptEventForRoom(event: MatrixEvent, room: Room): Promise<boolean> {
4909
- if (event.isEncrypted()) {
4910
- // this event has already been encrypted; this happens if the
4911
- // encryption step succeeded, but the send step failed on the first
4912
- // attempt.
4913
- return false;
4914
- }
4915
-
4916
- if (event.getType() === EventType.Reaction) {
4917
- // For reactions, there is a very little gained by encrypting the entire
4918
- // event, as relation data is already kept in the clear. Event
4919
- // encryption for a reaction effectively only obscures the event type,
4920
- // but the purpose is still obvious from the relation data, so nothing
4921
- // is really gained. It also causes quite a few problems, such as:
4922
- // * triggers notifications via default push rules
4923
- // * prevents server-side bundling for reactions
4924
- // The reaction key / content / emoji value does warrant encrypting, but
4925
- // this will be handled separately by encrypting just this value.
4926
- // See https://github.com/matrix-org/matrix-doc/pull/1849#pullrequestreview-248763642
4927
- return false;
4928
- }
4929
-
4930
- if (event.isRedaction()) {
4931
- // Redactions do not support encryption in the spec at this time.
4932
- // Whilst it mostly worked in some clients, it wasn't compliant.
4933
- return false;
4934
- }
4935
-
4936
- // If the room has an m.room.encryption event, we should encrypt.
4937
- if (room.hasEncryptionStateEvent()) return true;
4938
-
4939
- // If we have a crypto impl, and *it* thinks we should encrypt, then we should.
4940
- if (await this.cryptoBackend?.isEncryptionEnabledInRoom(room.roomId)) return true;
4941
-
4942
- // Otherwise, no need to encrypt.
4943
- return false;
4944
- }
4945
-
4946
2235
  /**
4947
2236
  * Returns the eventType that should be used taking encryption into account
4948
2237
  * for a given eventType.
@@ -5063,7 +2352,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
5063
2352
  if (this.canSupport.get(Feature.RelationBasedRedactions) === ServerSupport.Unsupported) {
5064
2353
  throw new Error(
5065
2354
  "Server does not support relation based redactions " +
5066
- `roomId ${roomId} eventId ${eventId} txnId: ${txnId} threadId ${threadId}`,
2355
+ `roomId ${roomId} eventId ${eventId} txnId: ${txnId} threadId ${threadId}`,
5067
2356
  );
5068
2357
  }
5069
2358
 
@@ -6136,7 +3425,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6136
3425
  room.partitionThreadedEvents(matrixEvents);
6137
3426
 
6138
3427
  this.processAggregatedTimelineEvents(room, timelineEvents);
6139
- room.addEventsToTimeline(timelineEvents, true, room.getLiveTimeline());
3428
+ room.addEventsToTimeline(timelineEvents, true, true, room.getLiveTimeline());
6140
3429
  this.processThreadEvents(room, threadedEvents, true);
6141
3430
  unknownRelations.forEach((event) => room.relations.aggregateChildEvent(event));
6142
3431
 
@@ -6185,7 +3474,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6185
3474
  if (!this.timelineSupport) {
6186
3475
  throw new Error(
6187
3476
  "timeline support is disabled. Set the 'timelineSupport'" +
6188
- " parameter to true when creating MatrixClient to enable it.",
3477
+ " parameter to true when creating MatrixClient to enable it.",
6189
3478
  );
6190
3479
  }
6191
3480
 
@@ -6248,7 +3537,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6248
3537
  }
6249
3538
 
6250
3539
  const [timelineEvents, threadedEvents, unknownRelations] = timelineSet.room.partitionThreadedEvents(events);
6251
- timelineSet.addEventsToTimeline(timelineEvents, true, timeline, res.start);
3540
+ timelineSet.addEventsToTimeline(timelineEvents, true, false, timeline, res.start);
6252
3541
  // The target event is not in a thread but process the contextual events, so we can show any threads around it.
6253
3542
  this.processThreadEvents(timelineSet.room, threadedEvents, true);
6254
3543
  this.processAggregatedTimelineEvents(timelineSet.room, timelineEvents);
@@ -6342,10 +3631,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6342
3631
  timeline.initialiseState(res.state.map(mapper));
6343
3632
  }
6344
3633
 
6345
- timelineSet.addEventsToTimeline(events, true, timeline, resNewer.next_batch);
3634
+ timelineSet.addEventsToTimeline(events, true, false, timeline, resNewer.next_batch);
6346
3635
  if (!resOlder.next_batch) {
6347
3636
  const originalEvent = await this.fetchRoomEvent(timelineSet.room.roomId, thread.id);
6348
- timelineSet.addEventsToTimeline([mapper(originalEvent)], true, timeline, null);
3637
+ timelineSet.addEventsToTimeline([mapper(originalEvent)], true, false, timeline, null);
6349
3638
  }
6350
3639
  timeline.setPaginationToken(resOlder.next_batch ?? null, Direction.Backward);
6351
3640
  timeline.setPaginationToken(resNewer.next_batch ?? null, Direction.Forward);
@@ -6399,10 +3688,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6399
3688
  const timeline = timelineSet.getLiveTimeline();
6400
3689
  timeline.getState(EventTimeline.BACKWARDS)!.setUnknownStateEvents(res.state.map(mapper));
6401
3690
 
6402
- timelineSet.addEventsToTimeline(events, true, timeline, null);
3691
+ timelineSet.addEventsToTimeline(events, true, false, timeline, null);
6403
3692
  if (!resOlder.next_batch) {
6404
3693
  const originalEvent = await this.fetchRoomEvent(timelineSet.room.roomId, thread.id);
6405
- timelineSet.addEventsToTimeline([mapper(originalEvent)], true, timeline, null);
3694
+ timelineSet.addEventsToTimeline([mapper(originalEvent)], true, false, timeline, null);
6406
3695
  }
6407
3696
  timeline.setPaginationToken(resOlder.next_batch ?? null, Direction.Backward);
6408
3697
  timeline.setPaginationToken(null, Direction.Forward);
@@ -6428,7 +3717,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6428
3717
  if (!this.timelineSupport) {
6429
3718
  throw new Error(
6430
3719
  "timeline support is disabled. Set the 'timelineSupport'" +
6431
- " parameter to true when creating MatrixClient to enable it.",
3720
+ " parameter to true when creating MatrixClient to enable it.",
6432
3721
  );
6433
3722
  }
6434
3723
 
@@ -6665,7 +3954,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6665
3954
  // No need to partition events for threads here, everything lives
6666
3955
  // in the notification timeline set
6667
3956
  const timelineSet = eventTimeline.getTimelineSet();
6668
- timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
3957
+ timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
6669
3958
  this.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
6670
3959
 
6671
3960
  // if we've hit the end of the timeline, we need to stop trying to
@@ -6708,7 +3997,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6708
3997
  const matrixEvents = res.chunk.filter(noUnsafeEventProps).map(this.getEventMapper());
6709
3998
 
6710
3999
  const timelineSet = eventTimeline.getTimelineSet();
6711
- timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
4000
+ timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
6712
4001
  this.processAggregatedTimelineEvents(room, matrixEvents);
6713
4002
  this.processThreadRoots(room, matrixEvents, backwards);
6714
4003
 
@@ -6756,12 +4045,12 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6756
4045
  const newToken = res.next_batch;
6757
4046
 
6758
4047
  const timelineSet = eventTimeline.getTimelineSet();
6759
- timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, newToken ?? null);
4048
+ timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, newToken ?? null);
6760
4049
  if (!newToken && backwards) {
6761
4050
  const originalEvent =
6762
4051
  thread.rootEvent ??
6763
4052
  mapper(await this.fetchRoomEvent(eventTimeline.getRoomId() ?? "", thread.id));
6764
- timelineSet.addEventsToTimeline([originalEvent], true, eventTimeline, null);
4053
+ timelineSet.addEventsToTimeline([originalEvent], true, false, eventTimeline, null);
6765
4054
  }
6766
4055
  this.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
6767
4056
 
@@ -6800,7 +4089,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
6800
4089
 
6801
4090
  const timelineSet = eventTimeline.getTimelineSet();
6802
4091
  const [timelineEvents, , unknownRelations] = room.partitionThreadedEvents(matrixEvents);
6803
- timelineSet.addEventsToTimeline(timelineEvents, backwards, eventTimeline, token);
4092
+ timelineSet.addEventsToTimeline(timelineEvents, backwards, false, eventTimeline, token);
6804
4093
  this.processAggregatedTimelineEvents(room, timelineEvents);
6805
4094
  this.processThreadRoots(
6806
4095
  room,
@@ -7493,25 +4782,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
7493
4782
  return this.http.authedRequest(Method.Post, path, undefined, {});
7494
4783
  }
7495
4784
 
7496
- private startCallEventHandler = (): void => {
7497
- if (this.isInitialSyncComplete()) {
7498
- if (supportsMatrixCall()) {
7499
- this.callEventHandler!.start();
7500
- this.groupCallEventHandler!.start();
7501
- }
7502
-
7503
- this.off(ClientEvent.Sync, this.startCallEventHandler);
7504
- }
7505
- };
7506
-
7507
- private startMatrixRTC = (): void => {
7508
- if (this.isInitialSyncComplete()) {
7509
- this.matrixRTC.start();
7510
-
7511
- this.off(ClientEvent.Sync, this.startMatrixRTC);
7512
- }
7513
- };
7514
-
7515
4785
  /**
7516
4786
  * Once the client has been initialised, we want to clear notifications we
7517
4787
  * know for a fact should be here.
@@ -7537,84 +4807,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
7537
4807
  }
7538
4808
  };
7539
4809
 
7540
- /**
7541
- * @returns Promise which resolves: ITurnServerResponse object
7542
- * @returns Rejects: with an error response.
7543
- */
7544
- public turnServer(): Promise<ITurnServerResponse> {
7545
- return this.http.authedRequest(Method.Get, "/voip/turnServer");
7546
- }
7547
-
7548
- /**
7549
- * Get the TURN servers for this homeserver.
7550
- * @returns The servers or an empty list.
7551
- */
7552
- public getTurnServers(): ITurnServer[] {
7553
- return this.turnServers || [];
7554
- }
7555
-
7556
- /**
7557
- * Get the unix timestamp (in milliseconds) at which the current
7558
- * TURN credentials (from getTurnServers) expire
7559
- * @returns The expiry timestamp in milliseconds
7560
- */
7561
- public getTurnServersExpiry(): number {
7562
- return this.turnServersExpiry;
7563
- }
7564
-
7565
- public get pollingTurnServers(): boolean {
7566
- return this.checkTurnServersIntervalID !== undefined;
7567
- }
7568
-
7569
- // XXX: Intended private, used in code.
7570
- public async checkTurnServers(): Promise<boolean | undefined> {
7571
- if (!this.canSupportVoip) {
7572
- return;
7573
- }
7574
-
7575
- let credentialsGood = false;
7576
- const remainingTime = this.turnServersExpiry - Date.now();
7577
- if (remainingTime > TURN_CHECK_INTERVAL) {
7578
- this.logger.debug("TURN creds are valid for another " + remainingTime + " ms: not fetching new ones.");
7579
- credentialsGood = true;
7580
- } else {
7581
- this.logger.debug("Fetching new TURN credentials");
7582
- try {
7583
- const res = await this.turnServer();
7584
- if (res.uris) {
7585
- this.logger.debug("Got TURN URIs: " + res.uris + " refresh in " + res.ttl + " secs");
7586
- // map the response to a format that can be fed to RTCPeerConnection
7587
- const servers: ITurnServer = {
7588
- urls: res.uris,
7589
- username: res.username,
7590
- credential: res.password,
7591
- };
7592
- this.turnServers = [servers];
7593
- // The TTL is in seconds but we work in ms
7594
- this.turnServersExpiry = Date.now() + res.ttl * 1000;
7595
- credentialsGood = true;
7596
- this.emit(ClientEvent.TurnServers, this.turnServers);
7597
- }
7598
- } catch (err) {
7599
- this.logger.error("Failed to get TURN URIs", err);
7600
- if ((<HTTPError>err).httpStatus === 403) {
7601
- // We got a 403, so there's no point in looping forever.
7602
- this.logger.info("TURN access unavailable for this account: stopping credentials checks");
7603
- if (this.checkTurnServersIntervalID !== null) {
7604
- globalThis.clearInterval(this.checkTurnServersIntervalID);
7605
- }
7606
- this.checkTurnServersIntervalID = undefined;
7607
- this.emit(ClientEvent.TurnServersError, <HTTPError>err, true); // fatal
7608
- } else {
7609
- // otherwise, if we failed for whatever reason, try again the next time we're called.
7610
- this.emit(ClientEvent.TurnServersError, <Error>err, false); // non-fatal
7611
- }
7612
- }
7613
- }
7614
-
7615
- return credentialsGood;
7616
- }
7617
-
7618
4810
  /**
7619
4811
  * Set whether to allow a fallback ICE server should be used for negotiating a
7620
4812
  * WebRTC connection if the homeserver doesn't provide any servers. Defaults to
@@ -7956,8 +5148,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
7956
5148
  let events = result.chunk.map(mapper);
7957
5149
 
7958
5150
  if (fetchedEventType === EventType.RoomMessageEncrypted) {
7959
- const allEvents = originalEvent ? events.concat(originalEvent) : events;
7960
- await Promise.all(allEvents.map((e) => this.decryptEventIfNeeded(e)));
7961
5151
  if (eventType !== null) {
7962
5152
  events = events.filter((e) => e.getType() === eventType);
7963
5153
  }
@@ -7974,17 +5164,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
7974
5164
  };
7975
5165
  }
7976
5166
 
7977
- /**
7978
- * The app may wish to see if we have a key cached without
7979
- * triggering a user interaction.
7980
- *
7981
- * @deprecated Not supported for Rust Cryptography.
7982
- */
7983
- public getCrossSigningCacheCallbacks(): ICacheCallbacks | undefined {
7984
- // XXX: Private member access
7985
- return this.crypto?.crossSigningInfo.getCacheCallbacks();
7986
- }
7987
-
7988
5167
  /**
7989
5168
  * Generates a random string suitable for use as a client secret. <strong>This
7990
5169
  * method is experimental and may change.</strong>
@@ -8000,15 +5179,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
8000
5179
  * @returns A decryption promise
8001
5180
  */
8002
5181
  public decryptEventIfNeeded(event: MatrixEvent, options?: IDecryptOptions): Promise<void> {
8003
- if (event.shouldAttemptDecryption() && this.isCryptoEnabled()) {
8004
- event.attemptDecryption(this.cryptoBackend!, options);
8005
- }
8006
-
8007
- if (event.isBeingDecrypted()) {
8008
- return event.getDecryptionPromise()!;
8009
- } else {
8010
- return Promise.resolve();
8011
- }
5182
+ return Promise.resolve();
8012
5183
  }
8013
5184
 
8014
5185
  private termsUrlForService(serviceType: SERVICE_TYPES, baseUrl: string): URL {
@@ -8321,17 +5492,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
8321
5492
  * @returns Promise which resolves: On success, the empty object `{}`
8322
5493
  */
8323
5494
  public async logout(stopClient = false): Promise<{}> {
8324
- if (this.crypto?.backupManager?.getKeyBackupEnabled()) {
8325
- try {
8326
- while ((await this.crypto.backupManager.backupPendingKeys(200)) > 0);
8327
- } catch (err) {
8328
- this.logger.error(
8329
- "Key backup request failed when logging out. Some keys may be missing from backup",
8330
- err,
8331
- );
8332
- }
8333
- }
8334
-
8335
5495
  if (stopClient) {
8336
5496
  this.stopClient();
8337
5497
  this.http.abort();
@@ -9376,87 +6536,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
9376
6536
  return this.http.authedRequest(Method.Post, "/search", queryParams, body, { abortSignal });
9377
6537
  }
9378
6538
 
9379
- /**
9380
- * Upload keys
9381
- *
9382
- * @param content - body of upload request
9383
- *
9384
- * @param opts - this method no longer takes any opts,
9385
- * used to take opts.device_id but this was not removed from the spec as a redundant parameter
9386
- *
9387
- * @returns Promise which resolves: result object. Rejects: with
9388
- * an error response ({@link MatrixError}).
9389
- */
9390
- public uploadKeysRequest(content: IUploadKeysRequest, opts?: void): Promise<IKeysUploadResponse> {
9391
- return this.http.authedRequest(Method.Post, "/keys/upload", undefined, content);
9392
- }
9393
-
9394
- public uploadKeySignatures(content: KeySignatures): Promise<IUploadKeySignaturesResponse> {
9395
- return this.http.authedRequest(Method.Post, "/keys/signatures/upload", undefined, content);
9396
- }
9397
-
9398
- /**
9399
- * Download device keys
9400
- *
9401
- * @param userIds - list of users to get keys for
9402
- *
9403
- * @param token - sync token to pass in the query request, to help
9404
- * the HS give the most recent results
9405
- *
9406
- * @returns Promise which resolves: result object. Rejects: with
9407
- * an error response ({@link MatrixError}).
9408
- */
9409
- public downloadKeysForUsers(userIds: string[], { token }: { token?: string } = {}): Promise<IDownloadKeyResult> {
9410
- const content: IQueryKeysRequest = {
9411
- device_keys: {},
9412
- };
9413
- if (token !== undefined) {
9414
- content.token = token;
9415
- }
9416
- userIds.forEach((u) => {
9417
- content.device_keys[u] = [];
9418
- });
9419
-
9420
- return this.http.authedRequest(Method.Post, "/keys/query", undefined, content);
9421
- }
9422
-
9423
- /**
9424
- * Claim one-time keys
9425
- *
9426
- * @param devices - a list of [userId, deviceId] pairs
9427
- *
9428
- * @param keyAlgorithm - desired key type
9429
- *
9430
- * @param timeout - the time (in milliseconds) to wait for keys from remote
9431
- * servers
9432
- *
9433
- * @returns Promise which resolves: result object. Rejects: with
9434
- * an error response ({@link MatrixError}).
9435
- */
9436
- public claimOneTimeKeys(
9437
- devices: [string, string][],
9438
- keyAlgorithm = "signed_curve25519",
9439
- timeout?: number,
9440
- ): Promise<IClaimOTKsResult> {
9441
- const queries: Record<string, Record<string, string>> = {};
9442
-
9443
- if (keyAlgorithm === undefined) {
9444
- keyAlgorithm = "signed_curve25519";
9445
- }
9446
-
9447
- for (const [userId, deviceId] of devices) {
9448
- const query = queries[userId] || {};
9449
- safeSet(queries, userId, query);
9450
- safeSet(query, deviceId, keyAlgorithm);
9451
- }
9452
- const content: IClaimKeysRequest = { one_time_keys: queries };
9453
- if (timeout) {
9454
- content.timeout = timeout;
9455
- }
9456
- const path = "/keys/claim";
9457
- return this.http.authedRequest(Method.Post, path, undefined, content);
9458
- }
9459
-
9460
6539
  /**
9461
6540
  * Ask the server for a list of users who have changed their device lists
9462
6541
  * between a pair of sync tokens
@@ -9474,15 +6553,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
9474
6553
  return this.http.authedRequest(Method.Get, "/keys/changes", qps);
9475
6554
  }
9476
6555
 
9477
- public uploadDeviceSigningKeys(auth?: AuthDict, keys?: CrossSigningKeys): Promise<{}> {
9478
- // API returns empty object
9479
- const data = Object.assign({}, keys);
9480
- if (auth) Object.assign(data, { auth });
9481
- return this.http.authedRequest(Method.Post, "/keys/device_signing/upload", undefined, data, {
9482
- prefix: ClientPrefix.Unstable,
9483
- });
9484
- }
9485
-
9486
6556
  /**
9487
6557
  * Register with an identity server using the OpenID token from the user's
9488
6558
  * Homeserver, which can be retrieved via
@@ -9810,10 +6880,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
9810
6880
  identityAccessToken: string,
9811
6881
  ): Promise<
9812
6882
  | {
9813
- address: string;
9814
- medium: string;
9815
- mxid: string;
9816
- }
6883
+ address: string;
6884
+ medium: string;
6885
+ mxid: string;
6886
+ }
9817
6887
  | {}
9818
6888
  > {
9819
6889
  // Note: we're using the V2 API by calling this function, but our
@@ -10111,13 +7181,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
10111
7181
  [UNSTABLE_MSC3088_ENABLED.name]: true,
10112
7182
  },
10113
7183
  },
10114
- {
10115
- type: EventType.RoomEncryption,
10116
- state_key: "",
10117
- content: {
10118
- algorithm: olmlib.MEGOLM_ALGORITHM,
10119
- },
10120
- },
10121
7184
  ],
10122
7185
  });
10123
7186
  return new MSC3089TreeSpace(this, roomId);
@@ -10337,88 +7400,6 @@ function getUnstableDelayQueryOpts(delayOpts: SendDelayedEventRequestOpts): Quer
10337
7400
  );
10338
7401
  }
10339
7402
 
10340
- /**
10341
- * recalculates an accurate notifications count on event decryption.
10342
- * Servers do not have enough knowledge about encrypted events to calculate an
10343
- * accurate notification_count
10344
- */
10345
- export function fixNotificationCountOnDecryption(cli: MatrixClient, event: MatrixEvent): void {
10346
- const ourUserId = cli.getUserId();
10347
- const eventId = event.getId();
10348
-
10349
- const room = cli.getRoom(event.getRoomId());
10350
- if (!room || !ourUserId || !eventId) return;
10351
-
10352
- // Due to threads, we can get relation events (eg. edits & reactions) that never get
10353
- // added to a timeline and so cannot be found in their own room (their edit / reaction
10354
- // still applies to the event it needs to, so it doesn't matter too much). However, if
10355
- // we try to process notification about this event, we'll get very confused because we
10356
- // won't be able to find the event in the room, so will assume it must be unread, even
10357
- // if it's actually read. We therefore skip anything that isn't in the room. This isn't
10358
- // *great*, so if we can fix the homeless events (eg. with MSC4023) then we should probably
10359
- // remove this workaround.
10360
- if (!room.findEventById(eventId)) {
10361
- logger.info(`Decrypted event ${event.getId()} is not in room ${room.roomId}: ignoring`);
10362
- return;
10363
- }
10364
-
10365
- const isThreadEvent = !!event.threadRootId && !event.isThreadRoot;
10366
-
10367
- let hasReadEvent;
10368
- if (isThreadEvent) {
10369
- const thread = room.getThread(event.threadRootId);
10370
- hasReadEvent = thread
10371
- ? thread.hasUserReadEvent(ourUserId, eventId)
10372
- : // If the thread object does not exist in the room yet, we don't
10373
- // want to calculate notification for this event yet. We have not
10374
- // restored the read receipts yet and can't accurately calculate
10375
- // notifications at this stage.
10376
- //
10377
- // This issue can likely go away when MSC3874 is implemented
10378
- true;
10379
- } else {
10380
- hasReadEvent = room.hasUserReadEvent(ourUserId, eventId);
10381
- }
10382
-
10383
- if (hasReadEvent) {
10384
- // If the event has been read, ignore it.
10385
- return;
10386
- }
10387
-
10388
- const actions = cli.getPushActionsForEvent(event, true);
10389
-
10390
- // Ensure the unread counts are kept up to date if the event is encrypted
10391
- // We also want to make sure that the notification count goes up if we already
10392
- // have encrypted events to avoid other code from resetting 'highlight' to zero.
10393
- const newHighlight = !!actions?.tweaks?.highlight;
10394
-
10395
- if (newHighlight) {
10396
- // TODO: Handle mentions received while the client is offline
10397
- // See also https://github.com/vector-im/element-web/issues/9069
10398
- const newCount = room.getUnreadCountForEventContext(NotificationCountType.Highlight, event) + 1;
10399
- if (isThreadEvent) {
10400
- room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Highlight, newCount);
10401
- } else {
10402
- room.setUnreadNotificationCount(NotificationCountType.Highlight, newCount);
10403
- }
10404
- }
10405
-
10406
- // `notify` is used in practice for incrementing the total count
10407
- const newNotify = !!actions?.notify;
10408
-
10409
- // The room total count is NEVER incremented by the server for encrypted rooms. We basically ignore
10410
- // the server here as it's always going to tell us to increment for encrypted events.
10411
- if (newNotify) {
10412
- // Total count is used to typically increment a room notification counter, but not loudly highlight it.
10413
- const newCount = room.getUnreadCountForEventContext(NotificationCountType.Total, event) + 1;
10414
- if (isThreadEvent) {
10415
- room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Total, newCount);
10416
- } else {
10417
- room.setUnreadNotificationCount(NotificationCountType.Total, newCount);
10418
- }
10419
- }
10420
- }
10421
-
10422
7403
  /**
10423
7404
  * Given an event, figure out the thread ID we should use for it in a receipt.
10424
7405
  *