@unwanted/matrix-sdk-mini 34.12.0 → 34.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/git-revision.txt +1 -1
- package/lib/@types/event.d.ts +0 -19
- package/lib/@types/event.d.ts.map +1 -1
- package/lib/@types/event.js.map +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/autodiscovery.d.ts +1 -1
- package/lib/autodiscovery.d.ts.map +1 -1
- package/lib/autodiscovery.js.map +1 -1
- package/lib/base64.d.ts +3 -6
- package/lib/base64.d.ts.map +1 -1
- package/lib/base64.js +43 -36
- package/lib/base64.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +2 -1298
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +348 -2967
- package/lib/client.js.map +1 -1
- package/lib/digest.d.ts +2 -2
- package/lib/digest.d.ts.map +1 -1
- package/lib/digest.js +2 -2
- package/lib/digest.js.map +1 -1
- package/lib/embedded.d.ts +0 -22
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +58 -168
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/matrix.d.ts +0 -25
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -30
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event-timeline-set.d.ts +6 -10
- package/lib/models/event-timeline-set.d.ts.map +1 -1
- package/lib/models/event-timeline-set.js +28 -36
- package/lib/models/event-timeline-set.js.map +1 -1
- package/lib/models/event-timeline.d.ts +7 -2
- package/lib/models/event-timeline.d.ts.map +1 -1
- package/lib/models/event-timeline.js +8 -9
- package/lib/models/event-timeline.js.map +1 -1
- package/lib/models/event.d.ts +1 -95
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +11 -281
- package/lib/models/event.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-state.d.ts +2 -13
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +12 -56
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +2 -20
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +121 -162
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +5 -4
- package/lib/models/thread.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +3 -4
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +55 -102
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sliding-sync.js +9 -6
- package/lib/sliding-sync.js.map +1 -1
- package/lib/store/indexeddb.d.ts +1 -1
- package/lib/store/indexeddb.d.ts.map +1 -1
- package/lib/store/indexeddb.js.map +1 -1
- package/lib/sync-accumulator.d.ts +6 -4
- package/lib/sync-accumulator.d.ts.map +1 -1
- package/lib/sync-accumulator.js +23 -12
- package/lib/sync-accumulator.js.map +1 -1
- package/lib/sync.d.ts +10 -13
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +94 -115
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +0 -48
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +0 -105
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +10 -11
- package/src/@types/event.ts +2 -36
- package/src/@types/global.d.ts +21 -4
- package/src/autodiscovery.ts +1 -1
- package/src/base64.ts +38 -40
- package/src/browser-index.ts +0 -11
- package/src/client.ts +68 -3087
- package/src/digest.ts +3 -3
- package/src/embedded.ts +38 -134
- package/src/event-mapper.ts +0 -4
- package/src/matrix.ts +0 -41
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event-timeline-set.ts +17 -38
- package/src/models/event-timeline.ts +10 -5
- package/src/models/event.ts +8 -295
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-state.ts +4 -37
- package/src/models/room.ts +18 -68
- package/src/models/thread.ts +4 -3
- package/src/sliding-sync-sdk.ts +10 -83
- package/src/sliding-sync.ts +6 -6
- package/src/store/indexeddb.ts +1 -1
- package/src/sync-accumulator.ts +33 -16
- package/src/sync.ts +112 -143
- package/src/testing.ts +0 -108
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1210
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4101
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/matrixrtc/CallMembership.d.ts +0 -66
- package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
- package/lib/matrixrtc/CallMembership.js +0 -197
- package/lib/matrixrtc/CallMembership.js.map +0 -1
- package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
- package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
- package/lib/matrixrtc/LivekitFocus.js +0 -20
- package/lib/matrixrtc/LivekitFocus.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
- package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
- package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
- package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
- package/lib/matrixrtc/focus.d.ts +0 -10
- package/lib/matrixrtc/focus.d.ts.map +0 -1
- package/lib/matrixrtc/focus.js +0 -1
- package/lib/matrixrtc/focus.js.map +0 -1
- package/lib/matrixrtc/index.d.ts +0 -7
- package/lib/matrixrtc/index.d.ts.map +0 -1
- package/lib/matrixrtc/index.js +0 -21
- package/lib/matrixrtc/index.js.map +0 -1
- package/lib/matrixrtc/types.d.ts +0 -19
- package/lib/matrixrtc/types.d.ts.map +0 -1
- package/lib/matrixrtc/types.js +0 -1
- package/lib/matrixrtc/types.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/lib/webrtc/audioContext.d.ts +0 -15
- package/lib/webrtc/audioContext.d.ts.map +0 -1
- package/lib/webrtc/audioContext.js +0 -46
- package/lib/webrtc/audioContext.js.map +0 -1
- package/lib/webrtc/call.d.ts +0 -560
- package/lib/webrtc/call.d.ts.map +0 -1
- package/lib/webrtc/call.js +0 -2541
- package/lib/webrtc/call.js.map +0 -1
- package/lib/webrtc/callEventHandler.d.ts +0 -37
- package/lib/webrtc/callEventHandler.d.ts.map +0 -1
- package/lib/webrtc/callEventHandler.js +0 -344
- package/lib/webrtc/callEventHandler.js.map +0 -1
- package/lib/webrtc/callEventTypes.d.ts +0 -73
- package/lib/webrtc/callEventTypes.d.ts.map +0 -1
- package/lib/webrtc/callEventTypes.js +0 -13
- package/lib/webrtc/callEventTypes.js.map +0 -1
- package/lib/webrtc/callFeed.d.ts +0 -128
- package/lib/webrtc/callFeed.d.ts.map +0 -1
- package/lib/webrtc/callFeed.js +0 -289
- package/lib/webrtc/callFeed.js.map +0 -1
- package/lib/webrtc/groupCall.d.ts +0 -323
- package/lib/webrtc/groupCall.d.ts.map +0 -1
- package/lib/webrtc/groupCall.js +0 -1337
- package/lib/webrtc/groupCall.js.map +0 -1
- package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
- package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
- package/lib/webrtc/groupCallEventHandler.js +0 -178
- package/lib/webrtc/groupCallEventHandler.js.map +0 -1
- package/lib/webrtc/mediaHandler.d.ts +0 -89
- package/lib/webrtc/mediaHandler.d.ts.map +0 -1
- package/lib/webrtc/mediaHandler.js +0 -437
- package/lib/webrtc/mediaHandler.js.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
- package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
- package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
- package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
- package/lib/webrtc/stats/connectionStats.d.ts +0 -28
- package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStats.js +0 -26
- package/lib/webrtc/stats/connectionStats.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
- package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
- package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
- package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
- package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
- package/lib/webrtc/stats/groupCallStats.js +0 -78
- package/lib/webrtc/stats/groupCallStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
- package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
- package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
- package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
- package/lib/webrtc/stats/statsReport.d.ts +0 -99
- package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReport.js +0 -32
- package/lib/webrtc/stats/statsReport.js.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
- package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.js +0 -33
- package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
- package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
- package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
- package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/transportStats.d.ts +0 -11
- package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStats.js +0 -1
- package/lib/webrtc/stats/transportStats.js.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
- package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
- package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
- package/lib/webrtc/stats/valueFormatter.js +0 -25
- package/lib/webrtc/stats/valueFormatter.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4418
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/matrixrtc/CallMembership.ts +0 -247
- package/src/matrixrtc/LivekitFocus.ts +0 -39
- package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
- package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
- package/src/matrixrtc/focus.ts +0 -25
- package/src/matrixrtc/index.ts +0 -22
- package/src/matrixrtc/types.ts +0 -36
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
- package/src/webrtc/audioContext.ts +0 -44
- package/src/webrtc/call.ts +0 -3074
- package/src/webrtc/callEventHandler.ts +0 -425
- package/src/webrtc/callEventTypes.ts +0 -93
- package/src/webrtc/callFeed.ts +0 -364
- package/src/webrtc/groupCall.ts +0 -1735
- package/src/webrtc/groupCallEventHandler.ts +0 -234
- package/src/webrtc/mediaHandler.ts +0 -484
- package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
- package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
- package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
- package/src/webrtc/stats/connectionStats.ts +0 -47
- package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
- package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
- package/src/webrtc/stats/groupCallStats.ts +0 -93
- package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
- package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
- package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
- package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
- package/src/webrtc/stats/statsReport.ts +0 -133
- package/src/webrtc/stats/statsReportEmitter.ts +0 -49
- package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
- package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
- package/src/webrtc/stats/transportStats.ts +0 -26
- package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
- package/src/webrtc/stats/valueFormatter.ts +0 -27
package/lib/client.d.ts
CHANGED
@@ -2,39 +2,24 @@
|
|
2
2
|
* This is an internal module. See {@link MatrixClient} for the public class.
|
3
3
|
*/
|
4
4
|
import { Optional } from "matrix-events-sdk";
|
5
|
-
import type { IDeviceKeys, IMegolmSessionData, IOneTimeKey } from "./@types/crypto.ts";
|
6
5
|
import { ISyncStateData, SetPresence, SyncApi, SyncApiOptions, SyncState } from "./sync.ts";
|
7
6
|
import { EventStatus, IContent, IDecryptOptions, IEvent, MatrixEvent, MatrixEventEvent, MatrixEventHandlerMap, PushDetails } from "./models/event.ts";
|
8
|
-
import { CallEvent, CallEventHandlerMap, MatrixCall } from "./webrtc/call.ts";
|
9
7
|
import { Filter, IFilterDefinition } from "./filter.ts";
|
10
|
-
import { CallEventHandler, CallEventHandlerEvent, CallEventHandlerEventHandlerMap } from "./webrtc/callEventHandler.ts";
|
11
|
-
import { GroupCallEventHandler, GroupCallEventHandlerEvent, GroupCallEventHandlerEventHandlerMap } from "./webrtc/groupCallEventHandler.ts";
|
12
8
|
import { QueryDict } from "./utils.ts";
|
13
9
|
import { Direction, EventTimeline } from "./models/event-timeline.ts";
|
14
10
|
import { IActionsObject, PushProcessor } from "./pushprocessor.ts";
|
15
11
|
import { AutoDiscoveryAction } from "./autodiscovery.ts";
|
16
|
-
import { IExportedDevice as IExportedOlmDevice } from "./crypto/OlmDevice.ts";
|
17
|
-
import { IOlmDevice } from "./crypto/algorithms/megolm.ts";
|
18
12
|
import { TypedReEmitter } from "./ReEmitter.ts";
|
19
|
-
import { IRoomEncryption } from "./crypto/RoomList.ts";
|
20
13
|
import { Logger } from "./logger.ts";
|
21
14
|
import { SERVICE_TYPES } from "./service-types.ts";
|
22
15
|
import { FileType, HttpApiEvent, HttpApiEventHandlerMap, IHttpOpts, IRequestOpts, MatrixError, MatrixHttpApi, TokenRefreshFunction, Upload, UploadOpts, UploadResponse } from "./http-api/index.ts";
|
23
|
-
import { Crypto, CryptoEvent as LegacyCryptoEvent, CryptoEventHandlerMap as LegacyCryptoEventHandlerMap, ICheckOwnCrossSigningTrustOpts } from "./crypto/index.ts";
|
24
|
-
import { DeviceInfo } from "./crypto/deviceinfo.ts";
|
25
16
|
import { User, UserEvent, UserEventHandlerMap } from "./models/user.ts";
|
26
|
-
import { IDehydratedDevice, IDehydratedDeviceKeyInfo } from "./crypto/dehydration.ts";
|
27
|
-
import { IKeyBackupInfo, IKeyBackupPrepareOpts, IKeyBackupRestoreOpts, IKeyBackupRestoreResult } from "./crypto/keybackup.ts";
|
28
17
|
import { IIdentityServerProvider } from "./@types/IIdentityServerProvider.ts";
|
29
18
|
import { MatrixScheduler } from "./scheduler.ts";
|
30
19
|
import { BeaconEvent, BeaconEventHandlerMap } from "./models/beacon.ts";
|
31
20
|
import { AuthDict } from "./interactive-auth.ts";
|
32
21
|
import { IMinimalEvent, IRoomEvent, IStateEvent } from "./sync-accumulator.ts";
|
33
|
-
import { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from "./crypto/api.ts";
|
34
22
|
import { EventTimelineSet } from "./models/event-timeline-set.ts";
|
35
|
-
import { VerificationRequest } from "./crypto/verification/request/VerificationRequest.ts";
|
36
|
-
import { VerificationBase as Verification } from "./crypto/verification/Base.ts";
|
37
|
-
import { CrossSigningInfo, DeviceTrustLevel, ICacheCallbacks, UserTrustLevel } from "./crypto/CrossSigning.ts";
|
38
23
|
import { Room, RoomEvent, RoomEventHandlerMap, RoomNameState } from "./models/room.ts";
|
39
24
|
import { RoomMemberEvent, RoomMemberEventHandlerMap } from "./models/room-member.ts";
|
40
25
|
import { RoomStateEvent, RoomStateEventHandlerMap } from "./models/room-state.ts";
|
@@ -42,19 +27,14 @@ import { DelayedEventInfo, IAddThreePidOnlyBody, IBindThreePidBody, ICreateRoomO
|
|
42
27
|
import { EventType, RelationType, RoomType, StateEvents, TimelineEvents } from "./@types/event.ts";
|
43
28
|
import { IdServerUnbindResult, JoinRule, Preset, Visibility } from "./@types/partials.ts";
|
44
29
|
import { EventMapper, MapperOpts } from "./event-mapper.ts";
|
45
|
-
import { IKeyBackup, IKeyBackupCheck, IPreparedKeyBackupVersion, TrustInfo } from "./crypto/backup.ts";
|
46
30
|
import { MSC3089TreeSpace } from "./models/MSC3089TreeSpace.ts";
|
47
31
|
import { ISignatures } from "./@types/signed.ts";
|
48
32
|
import { IStore } from "./store/index.ts";
|
49
|
-
import { ISecretRequest } from "./crypto/SecretStorage.ts";
|
50
33
|
import { IEventWithRoomId, ISearchRequestBody, ISearchResponse, ISearchResults, IStateEventWithRoomId } from "./@types/search.ts";
|
51
34
|
import { ISynapseAdminDeactivateResponse, ISynapseAdminWhoisResponse } from "./@types/synapse.ts";
|
52
35
|
import { IHierarchyRoom } from "./@types/spaces.ts";
|
53
36
|
import { IPusher, IPusherRequest, IPushRule, IPushRules, PushRuleAction, PushRuleKind, RuleId } from "./@types/PushRules.ts";
|
54
37
|
import { IThreepid } from "./@types/threepids.ts";
|
55
|
-
import { CryptoStore, OutgoingRoomKeyRequest } from "./crypto/store/base.ts";
|
56
|
-
import { GroupCall, GroupCallIntent, GroupCallType, IGroupCallDataChannelOptions } from "./webrtc/groupCall.ts";
|
57
|
-
import { MediaHandler } from "./webrtc/mediaHandler.ts";
|
58
38
|
import { ILoginFlowsResponse, IRefreshTokenResponse, LoginRequest, LoginResponse, LoginTokenPostResponse, SSOAction } from "./@types/auth.ts";
|
59
39
|
import { TypedEventEmitter } from "./models/typed-event-emitter.ts";
|
60
40
|
import { ReceiptType } from "./@types/read_receipts.ts";
|
@@ -68,29 +48,18 @@ import { IgnoredInvites } from "./models/invites-ignorer.ts";
|
|
68
48
|
import { UIAResponse } from "./@types/uia.ts";
|
69
49
|
import { LocalNotificationSettings } from "./@types/local_notifications.ts";
|
70
50
|
import { Feature, ServerSupport } from "./feature.ts";
|
71
|
-
import { BootstrapCrossSigningOpts, CrossSigningKeyInfo, CryptoApi, ImportRoomKeysOpts, CryptoEvent, CryptoEventHandlerMap, CryptoCallbacks } from "./crypto-api/index.ts";
|
72
|
-
import { DeviceInfoMap } from "./crypto/DeviceList.ts";
|
73
|
-
import { AddSecretStorageKeyOpts, SecretStorageKeyDescription, ServerSideSecretStorage } from "./secret-storage.ts";
|
74
51
|
import { RegisterRequest, RegisterResponse } from "./@types/registration.ts";
|
75
|
-
import { MatrixRTCSessionManager } from "./matrixrtc/MatrixRTCSessionManager.ts";
|
76
52
|
import { Membership } from "./@types/membership.ts";
|
77
53
|
import { RoomMessageEventContent } from "./@types/events.ts";
|
78
54
|
import { ImageInfo } from "./@types/media.ts";
|
79
55
|
import { Capabilities } from "./serverCapabilities.ts";
|
80
56
|
export type Store = IStore;
|
81
57
|
export type ResetTimelineCallback = (roomId: string) => boolean;
|
82
|
-
export declare const CRYPTO_ENABLED: boolean;
|
83
58
|
export declare const UNSTABLE_MSC3852_LAST_SEEN_UA: UnstableValue<"last_seen_user_agent", "org.matrix.msc3852.last_seen_user_agent">;
|
84
59
|
interface IExportedDevice {
|
85
|
-
olmDevice: IExportedOlmDevice;
|
86
60
|
userId: string;
|
87
61
|
deviceId: string;
|
88
62
|
}
|
89
|
-
export interface IKeysUploadResponse {
|
90
|
-
one_time_key_counts: {
|
91
|
-
[algorithm: string]: number;
|
92
|
-
};
|
93
|
-
}
|
94
63
|
export interface ICreateClientOpts {
|
95
64
|
baseUrl: string;
|
96
65
|
idBaseUrl?: string;
|
@@ -100,19 +69,6 @@ export interface ICreateClientOpts {
|
|
100
69
|
* will create a default store if needed.
|
101
70
|
*/
|
102
71
|
store?: Store;
|
103
|
-
/**
|
104
|
-
* A store to be used for end-to-end crypto session data.
|
105
|
-
* The `createClient` helper will create a default store if needed. Calls the factory supplied to
|
106
|
-
* {@link setCryptoStoreFactory} if unspecified; or if no factory has been
|
107
|
-
* specified, uses a default implementation (indexeddb in the browser,
|
108
|
-
* in-memory otherwise).
|
109
|
-
*
|
110
|
-
* This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
|
111
|
-
* but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
|
112
|
-
* previously used legacy crypto (so must be migrated), then this must still be provided, so that the
|
113
|
-
* data can be migrated from the legacy store.
|
114
|
-
*/
|
115
|
-
cryptoStore?: CryptoStore;
|
116
72
|
/**
|
117
73
|
* The scheduler to use. If not
|
118
74
|
* specified, this client will not retry requests on failure. This client
|
@@ -184,17 +140,6 @@ export interface ICreateClientOpts {
|
|
184
140
|
* level (they are present in the exported data).
|
185
141
|
*/
|
186
142
|
deviceToImport?: IExportedDevice;
|
187
|
-
/**
|
188
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in {@link ICreateClientOpts#cryptoStore}.
|
189
|
-
*
|
190
|
-
* This must be set to the same value every time the client is initialised for the same device.
|
191
|
-
*
|
192
|
-
* This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
|
193
|
-
* but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
|
194
|
-
* previously used legacy crypto (so must be migrated), then this must still be provided, so that the
|
195
|
-
* data can be migrated from the legacy store.
|
196
|
-
*/
|
197
|
-
pickleKey?: string;
|
198
143
|
/**
|
199
144
|
* Verification methods we should offer to the other side when performing an interactive verification.
|
200
145
|
* If unset, we will offer all known methods. Currently these are: showing a QR code, scanning a QR code, and SAS
|
@@ -203,35 +148,18 @@ export interface ICreateClientOpts {
|
|
203
148
|
* See {@link types.VerificationMethod} for a set of useful constants for this parameter.
|
204
149
|
*/
|
205
150
|
verificationMethods?: Array<string>;
|
206
|
-
/**
|
207
|
-
* Whether relaying calls through a TURN server should be forced. Default false.
|
208
|
-
*/
|
209
|
-
forceTURN?: boolean;
|
210
151
|
/**
|
211
152
|
* Up to this many ICE candidates will be gathered when an incoming call arrives.
|
212
153
|
* Gathering does not send data to the caller, but will communicate with the configured TURN
|
213
154
|
* server. Default 0.
|
214
155
|
*/
|
215
156
|
iceCandidatePoolSize?: number;
|
216
|
-
/**
|
217
|
-
* True to advertise support for call transfers to other parties on Matrix calls. Default false.
|
218
|
-
*/
|
219
|
-
supportsCallTransfer?: boolean;
|
220
157
|
/**
|
221
158
|
* Whether to allow a fallback ICE server should be used for negotiating a
|
222
159
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to false.
|
223
160
|
*/
|
224
161
|
fallbackICEServerAllowed?: boolean;
|
225
|
-
/**
|
226
|
-
* If true, to-device signalling for group calls will be encrypted
|
227
|
-
* with Olm. Default: true.
|
228
|
-
*/
|
229
|
-
useE2eForGroupCall?: boolean;
|
230
162
|
livekitServiceURL?: string;
|
231
|
-
/**
|
232
|
-
* Crypto callbacks provided by the application
|
233
|
-
*/
|
234
|
-
cryptoCallbacks?: CryptoCallbacks;
|
235
163
|
/**
|
236
164
|
* Method to generate room names for empty rooms and rooms names based on membership.
|
237
165
|
* Defaults to a built-in English handler with basic pluralisation.
|
@@ -326,21 +254,7 @@ export declare const UNSTABLE_MSC2666_MUTUAL_ROOMS = "uk.half-shot.msc2666.mutua
|
|
326
254
|
export declare const UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS = "uk.half-shot.msc2666.query_mutual_rooms";
|
327
255
|
export declare const UNSTABLE_MSC4140_DELAYED_EVENTS = "org.matrix.msc4140";
|
328
256
|
export declare const UNSTABLE_MSC4133_EXTENDED_PROFILES = "uk.tcpip.msc4133";
|
329
|
-
declare enum CrossSigningKeyType {
|
330
|
-
MasterKey = "master_key",
|
331
|
-
SelfSigningKey = "self_signing_key",
|
332
|
-
UserSigningKey = "user_signing_key"
|
333
|
-
}
|
334
|
-
export type CrossSigningKeys = Record<CrossSigningKeyType, CrossSigningKeyInfo>;
|
335
257
|
export type SendToDeviceContentMap = Map<string, Map<string, Record<string, any>>>;
|
336
|
-
export interface ISignedKey {
|
337
|
-
keys: Record<string, string>;
|
338
|
-
signatures: ISignatures;
|
339
|
-
user_id: string;
|
340
|
-
algorithms: string[];
|
341
|
-
device_id: string;
|
342
|
-
}
|
343
|
-
export type KeySignatures = Record<string, Record<string, CrossSigningKeyInfo | ISignedKey>>;
|
344
258
|
export interface IUploadKeySignaturesResponse {
|
345
259
|
failures: Record<string, Record<string, {
|
346
260
|
errcode: string;
|
@@ -410,11 +324,6 @@ export interface IRequestMsisdnTokenResponse extends IRequestTokenResponse {
|
|
410
324
|
success: boolean;
|
411
325
|
intl_fmt: string;
|
412
326
|
}
|
413
|
-
export interface IUploadKeysRequest {
|
414
|
-
"device_keys"?: Required<IDeviceKeys>;
|
415
|
-
"one_time_keys"?: Record<string, IOneTimeKey>;
|
416
|
-
"org.matrix.msc2732.fallback_keys"?: Record<string, IOneTimeKey>;
|
417
|
-
}
|
418
327
|
export interface IQueryKeysRequest {
|
419
328
|
device_keys: {
|
420
329
|
[userId: string]: string[];
|
@@ -503,33 +412,6 @@ export interface Keys {
|
|
503
412
|
usage: string[];
|
504
413
|
user_id: string;
|
505
414
|
}
|
506
|
-
export interface SigningKeys extends Keys {
|
507
|
-
signatures: ISignatures;
|
508
|
-
}
|
509
|
-
export interface DeviceKeys {
|
510
|
-
[deviceId: string]: IDeviceKeys & {
|
511
|
-
unsigned?: {
|
512
|
-
device_display_name: string;
|
513
|
-
};
|
514
|
-
};
|
515
|
-
}
|
516
|
-
export interface IDownloadKeyResult {
|
517
|
-
failures: {
|
518
|
-
[serverName: string]: object;
|
519
|
-
};
|
520
|
-
device_keys: {
|
521
|
-
[userId: string]: DeviceKeys;
|
522
|
-
};
|
523
|
-
master_keys?: {
|
524
|
-
[userId: string]: Keys;
|
525
|
-
};
|
526
|
-
self_signing_keys?: {
|
527
|
-
[userId: string]: SigningKeys;
|
528
|
-
};
|
529
|
-
user_signing_keys?: {
|
530
|
-
[userId: string]: SigningKeys;
|
531
|
-
};
|
532
|
-
}
|
533
415
|
export interface IClaimOTKsResult {
|
534
416
|
failures: {
|
535
417
|
[serverName: string]: object;
|
@@ -621,12 +503,10 @@ export declare enum ClientEvent {
|
|
621
503
|
}
|
622
504
|
type RoomEvents = RoomEvent.Name | RoomEvent.Redaction | RoomEvent.RedactionCancelled | RoomEvent.Receipt | RoomEvent.Tags | RoomEvent.LocalEchoUpdated | RoomEvent.HistoryImportedWithinTimeline | RoomEvent.AccountData | RoomEvent.MyMembership | RoomEvent.Timeline | RoomEvent.TimelineReset;
|
623
505
|
type RoomStateEvents = RoomStateEvent.Events | RoomStateEvent.Members | RoomStateEvent.NewMember | RoomStateEvent.Update | RoomStateEvent.Marker;
|
624
|
-
type LegacyCryptoEvents = LegacyCryptoEvent.KeySignatureUploadFailure | LegacyCryptoEvent.KeyBackupStatus | LegacyCryptoEvent.KeyBackupFailed | LegacyCryptoEvent.KeyBackupSessionsRemaining | LegacyCryptoEvent.KeyBackupDecryptionKeyCached | LegacyCryptoEvent.RoomKeyRequest | LegacyCryptoEvent.RoomKeyRequestCancellation | LegacyCryptoEvent.VerificationRequest | LegacyCryptoEvent.VerificationRequestReceived | LegacyCryptoEvent.DeviceVerificationChanged | LegacyCryptoEvent.UserTrustStatusChanged | LegacyCryptoEvent.KeysChanged | LegacyCryptoEvent.Warning | LegacyCryptoEvent.DevicesUpdated | LegacyCryptoEvent.WillUpdateDevices | LegacyCryptoEvent.LegacyCryptoStoreMigrationProgress;
|
625
|
-
type CryptoEvents = (typeof CryptoEvent)[keyof typeof CryptoEvent];
|
626
506
|
type MatrixEventEvents = MatrixEventEvent.Decrypted | MatrixEventEvent.Replaced | MatrixEventEvent.VisibilityChange;
|
627
507
|
type RoomMemberEvents = RoomMemberEvent.Name | RoomMemberEvent.Typing | RoomMemberEvent.PowerLevel | RoomMemberEvent.Membership;
|
628
508
|
type UserEvents = UserEvent.AvatarUrl | UserEvent.DisplayName | UserEvent.Presence | UserEvent.CurrentlyActive | UserEvent.LastPresenceTs;
|
629
|
-
export type EmittedEvents = ClientEvent | RoomEvents | RoomStateEvents |
|
509
|
+
export type EmittedEvents = ClientEvent | RoomEvents | RoomStateEvents | MatrixEventEvents | RoomMemberEvents | UserEvents | HttpApiEvent.SessionLoggedOut | HttpApiEvent.NoConsent | BeaconEvent;
|
630
510
|
export type ClientEventHandlerMap = {
|
631
511
|
/**
|
632
512
|
* Fires whenever the SDK's syncing state is updated. The state can be one of:
|
@@ -822,7 +702,7 @@ export type ClientEventHandlerMap = {
|
|
822
702
|
[ClientEvent.ReceivedVoipEvent]: (event: MatrixEvent) => void;
|
823
703
|
[ClientEvent.TurnServers]: (servers: ITurnServer[]) => void;
|
824
704
|
[ClientEvent.TurnServersError]: (error: Error, fatal: boolean) => void;
|
825
|
-
} & RoomEventHandlerMap & RoomStateEventHandlerMap &
|
705
|
+
} & RoomEventHandlerMap & RoomStateEventHandlerMap & MatrixEventHandlerMap & RoomMemberEventHandlerMap & UserEventHandlerMap & HttpApiEventHandlerMap & BeaconEventHandlerMap;
|
826
706
|
/**
|
827
707
|
* Represents a Matrix Client. Only directly construct this if you want to use
|
828
708
|
* custom modules. Normally, {@link createClient} should be used
|
@@ -839,16 +719,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
839
719
|
credentials: {
|
840
720
|
userId: string | null;
|
841
721
|
};
|
842
|
-
/**
|
843
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in storage.
|
844
|
-
*
|
845
|
-
* As supplied in the constructor via {@link IMatrixClientCreateOpts#pickleKey}.
|
846
|
-
*
|
847
|
-
* If unset, either a hardcoded key or no encryption at all is used, depending on the Crypto implementation.
|
848
|
-
*
|
849
|
-
* @deprecated this should be a private property.
|
850
|
-
*/
|
851
|
-
pickleKey?: string;
|
852
722
|
scheduler?: MatrixScheduler;
|
853
723
|
clientRunning: boolean;
|
854
724
|
timelineSupport: boolean;
|
@@ -859,25 +729,11 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
859
729
|
http: MatrixHttpApi<IHttpOpts & {
|
860
730
|
onlyData: true;
|
861
731
|
}>;
|
862
|
-
/**
|
863
|
-
* The libolm crypto implementation, if it is in use.
|
864
|
-
*
|
865
|
-
* @deprecated This should not be used. Instead, use the methods exposed directly on this class or
|
866
|
-
* (where they are available) via {@link getCrypto}.
|
867
|
-
*/
|
868
|
-
crypto?: Crypto;
|
869
|
-
private cryptoBackend?;
|
870
|
-
cryptoCallbacks: CryptoCallbacks;
|
871
|
-
callEventHandler?: CallEventHandler;
|
872
|
-
groupCallEventHandler?: GroupCallEventHandler;
|
873
|
-
supportsCallTransfer: boolean;
|
874
|
-
forceTURN: boolean;
|
875
732
|
iceCandidatePoolSize: number;
|
876
733
|
idBaseUrl?: string;
|
877
734
|
baseUrl: string;
|
878
735
|
readonly isVoipWithNoMediaAllowed: boolean;
|
879
736
|
useLivekitForGroupCalls: boolean;
|
880
|
-
protected canSupportVoip: boolean;
|
881
737
|
protected peekSync: SyncApi | null;
|
882
738
|
protected isGuestAccount: boolean;
|
883
739
|
protected ongoingScrollbacks: {
|
@@ -887,7 +743,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
887
743
|
};
|
888
744
|
};
|
889
745
|
protected notifTimelineSet: EventTimelineSet | null;
|
890
|
-
protected cryptoStore?: CryptoStore;
|
891
746
|
protected verificationMethods?: string[];
|
892
747
|
protected fallbackICEServerAllowed: boolean;
|
893
748
|
protected syncApi?: SlidingSyncSdk | SyncApi;
|
@@ -903,12 +758,7 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
903
758
|
protected serverVersionsPromise?: Promise<IServerVersions>;
|
904
759
|
protected clientWellKnown?: IClientWellKnown;
|
905
760
|
protected clientWellKnownPromise?: Promise<IClientWellKnown>;
|
906
|
-
protected turnServers: ITurnServer[];
|
907
|
-
protected turnServersExpiry: number;
|
908
|
-
protected checkTurnServersIntervalID?: ReturnType<typeof setInterval>;
|
909
|
-
protected exportedOlmDeviceToImport?: IExportedOlmDevice;
|
910
761
|
protected txnCtr: number;
|
911
|
-
protected mediaHandler: MediaHandler;
|
912
762
|
protected sessionId: string;
|
913
763
|
/** IDs of events which are currently being encrypted.
|
914
764
|
*
|
@@ -916,12 +766,9 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
916
766
|
* that tells us that it has been cancelled, and we should not send it.
|
917
767
|
*/
|
918
768
|
private eventsBeingEncrypted;
|
919
|
-
private useE2eForGroupCall;
|
920
769
|
private toDeviceMessageQueue;
|
921
770
|
livekitServiceURL?: string;
|
922
|
-
private _secretStorage;
|
923
771
|
readonly ignoredInvites: IgnoredInvites;
|
924
|
-
readonly matrixRTC: MatrixRTCSessionManager;
|
925
772
|
private serverCapabilitiesService;
|
926
773
|
constructor(opts: IMatrixClientCreateOpts);
|
927
774
|
set store(newStore: Store);
|
@@ -943,53 +790,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
943
790
|
* clean shutdown.
|
944
791
|
*/
|
945
792
|
stopClient(): void;
|
946
|
-
/**
|
947
|
-
* Try to rehydrate a device if available. The client must have been
|
948
|
-
* initialized with a `cryptoCallback.getDehydrationKey` option, and this
|
949
|
-
* function must be called before initCrypto and startClient are called.
|
950
|
-
*
|
951
|
-
* @returns Promise which resolves to undefined if a device could not be dehydrated, or
|
952
|
-
* to the new device ID if the dehydration was successful.
|
953
|
-
* @returns Rejects: with an error response.
|
954
|
-
*
|
955
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
956
|
-
*/
|
957
|
-
rehydrateDevice(): Promise<string | undefined>;
|
958
|
-
/**
|
959
|
-
* Get the current dehydrated device, if any
|
960
|
-
* @returns A promise of an object containing the dehydrated device
|
961
|
-
*
|
962
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
963
|
-
*/
|
964
|
-
getDehydratedDevice(): Promise<IDehydratedDevice | undefined>;
|
965
|
-
/**
|
966
|
-
* Set the dehydration key. This will also periodically dehydrate devices to
|
967
|
-
* the server.
|
968
|
-
*
|
969
|
-
* @param key - the dehydration key
|
970
|
-
* @param keyInfo - Information about the key. Primarily for
|
971
|
-
* information about how to generate the key from a passphrase.
|
972
|
-
* @param deviceDisplayName - The device display name for the
|
973
|
-
* dehydrated device.
|
974
|
-
* @returns A promise that resolves when the dehydrated device is stored.
|
975
|
-
*
|
976
|
-
* @deprecated Not supported for Rust Cryptography.
|
977
|
-
*/
|
978
|
-
setDehydrationKey(key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string): Promise<void>;
|
979
|
-
/**
|
980
|
-
* Creates a new MSC2967 dehydrated device (without queuing periodic dehydration)
|
981
|
-
* @param key - the dehydration key
|
982
|
-
* @param keyInfo - Information about the key. Primarily for
|
983
|
-
* information about how to generate the key from a passphrase.
|
984
|
-
* @param deviceDisplayName - The device display name for the
|
985
|
-
* dehydrated device.
|
986
|
-
* @returns the device id of the newly created dehydrated device
|
987
|
-
*
|
988
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.startDehydration}.
|
989
|
-
*/
|
990
|
-
createDehydratedDevice(key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string): Promise<string | undefined>;
|
991
|
-
/** @deprecated Not supported for Rust Cryptography. */
|
992
|
-
exportDevice(): Promise<IExportedDevice | undefined>;
|
993
793
|
/**
|
994
794
|
* Clear any data out of the persistent stores used by the client.
|
995
795
|
*
|
@@ -1029,67 +829,8 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
1029
829
|
* @returns session ID
|
1030
830
|
*/
|
1031
831
|
getSessionId(): string;
|
1032
|
-
/**
|
1033
|
-
* Check if the runtime environment supports VoIP calling.
|
1034
|
-
* @returns True if VoIP is supported.
|
1035
|
-
*/
|
1036
|
-
supportsVoip(): boolean;
|
1037
|
-
/**
|
1038
|
-
* @returns
|
1039
|
-
*/
|
1040
|
-
getMediaHandler(): MediaHandler;
|
1041
|
-
/**
|
1042
|
-
* Set whether VoIP calls are forced to use only TURN
|
1043
|
-
* candidates. This is the same as the forceTURN option
|
1044
|
-
* when creating the client.
|
1045
|
-
* @param force - True to force use of TURN servers
|
1046
|
-
*/
|
1047
|
-
setForceTURN(force: boolean): void;
|
1048
|
-
/**
|
1049
|
-
* Set whether to advertise transfer support to other parties on Matrix calls.
|
1050
|
-
* @param support - True to advertise the 'm.call.transferee' capability
|
1051
|
-
*/
|
1052
|
-
setSupportsCallTransfer(support: boolean): void;
|
1053
|
-
/**
|
1054
|
-
* Returns true if to-device signalling for group calls will be encrypted with Olm.
|
1055
|
-
* If false, it will be sent unencrypted.
|
1056
|
-
* @returns boolean Whether group call signalling will be encrypted
|
1057
|
-
*/
|
1058
|
-
getUseE2eForGroupCall(): boolean;
|
1059
|
-
/**
|
1060
|
-
* Creates a new call.
|
1061
|
-
* The place*Call methods on the returned call can be used to actually place a call
|
1062
|
-
*
|
1063
|
-
* @param roomId - The room the call is to be placed in.
|
1064
|
-
* @returns the call or null if the browser doesn't support calling.
|
1065
|
-
*/
|
1066
|
-
createCall(roomId: string): MatrixCall | null;
|
1067
|
-
/**
|
1068
|
-
* Creates a new group call and sends the associated state event
|
1069
|
-
* to alert other members that the room now has a group call.
|
1070
|
-
*
|
1071
|
-
* @param roomId - The room the call is to be placed in.
|
1072
|
-
*/
|
1073
|
-
createGroupCall(roomId: string, type: GroupCallType, isPtt: boolean, intent: GroupCallIntent, dataChannelsEnabled?: boolean, dataChannelOptions?: IGroupCallDataChannelOptions): Promise<GroupCall>;
|
1074
832
|
getLivekitServiceURL(): string | undefined;
|
1075
833
|
setLivekitServiceURL(newURL: string): void;
|
1076
|
-
/**
|
1077
|
-
* Wait until an initial state for the given room has been processed by the
|
1078
|
-
* client and the client is aware of any ongoing group calls. Awaiting on
|
1079
|
-
* the promise returned by this method before calling getGroupCallForRoom()
|
1080
|
-
* avoids races where getGroupCallForRoom is called before the state for that
|
1081
|
-
* room has been processed. It does not, however, fix other races, eg. two
|
1082
|
-
* clients both creating a group call at the same time.
|
1083
|
-
* @param roomId - The room ID to wait for
|
1084
|
-
* @returns A promise that resolves once existing group calls in the room
|
1085
|
-
* have been processed.
|
1086
|
-
*/
|
1087
|
-
waitUntilRoomReadyForGroupCalls(roomId: string): Promise<void>;
|
1088
|
-
/**
|
1089
|
-
* Get an existing group call for the provided room.
|
1090
|
-
* @returns The group call or null if it doesn't already exist.
|
1091
|
-
*/
|
1092
|
-
getGroupCallForRoom(roomId: string): GroupCall | null;
|
1093
834
|
/**
|
1094
835
|
* Get the current sync state.
|
1095
836
|
* @returns the sync state, which may be null.
|
@@ -1168,965 +909,10 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
1168
909
|
* @returns A promise which resolves to the capabilities of the homeserver
|
1169
910
|
*/
|
1170
911
|
fetchCapabilities(): Promise<Capabilities>;
|
1171
|
-
/**
|
1172
|
-
* Initialise support for end-to-end encryption in this client, using libolm.
|
1173
|
-
*
|
1174
|
-
* You should call this method after creating the matrixclient, but *before*
|
1175
|
-
* calling `startClient`, if you want to support end-to-end encryption.
|
1176
|
-
*
|
1177
|
-
* It will return a Promise which will resolve when the crypto layer has been
|
1178
|
-
* successfully initialised.
|
1179
|
-
*
|
1180
|
-
* @deprecated libolm is deprecated. Prefer {@link initRustCrypto}.
|
1181
|
-
*/
|
1182
|
-
initCrypto(): Promise<void>;
|
1183
|
-
/**
|
1184
|
-
* Initialise support for end-to-end encryption in this client, using the rust matrix-sdk-crypto.
|
1185
|
-
*
|
1186
|
-
* An alternative to {@link initCrypto}.
|
1187
|
-
*
|
1188
|
-
* @param args.useIndexedDB - True to use an indexeddb store, false to use an in-memory store. Defaults to 'true'.
|
1189
|
-
* @param args.storageKey - A key with which to encrypt the indexeddb store. If provided, it must be exactly
|
1190
|
-
* 32 bytes of data, and must be the same each time the client is initialised for a given device.
|
1191
|
-
* If both this and `storagePassword` are unspecified, the store will be unencrypted.
|
1192
|
-
* @param args.storagePassword - An alternative to `storageKey`. A password which will be used to derive a key to
|
1193
|
-
* encrypt the store with. Deriving a key from a password is (deliberately) a slow operation, so prefer
|
1194
|
-
* to pass a `storageKey` directly where possible.
|
1195
|
-
*
|
1196
|
-
* @returns a Promise which will resolve when the crypto layer has been
|
1197
|
-
* successfully initialised.
|
1198
|
-
*/
|
1199
|
-
initRustCrypto(args?: {
|
1200
|
-
useIndexedDB?: boolean;
|
1201
|
-
storageKey?: Uint8Array;
|
1202
|
-
storagePassword?: string;
|
1203
|
-
}): Promise<void>;
|
1204
|
-
/**
|
1205
|
-
* Access the server-side secret storage API for this client.
|
1206
|
-
*/
|
1207
|
-
get secretStorage(): ServerSideSecretStorage;
|
1208
|
-
/**
|
1209
|
-
* Access the crypto API for this client.
|
1210
|
-
*
|
1211
|
-
* If end-to-end encryption has been enabled for this client (via {@link initCrypto} or {@link initRustCrypto}),
|
1212
|
-
* returns an object giving access to the crypto API. Otherwise, returns `undefined`.
|
1213
|
-
*/
|
1214
|
-
getCrypto(): CryptoApi | undefined;
|
1215
|
-
/**
|
1216
|
-
* Is end-to-end crypto enabled for this client.
|
1217
|
-
* @returns True if end-to-end is enabled.
|
1218
|
-
* @deprecated prefer {@link getCrypto}
|
1219
|
-
*/
|
1220
|
-
isCryptoEnabled(): boolean;
|
1221
|
-
/**
|
1222
|
-
* Get the Ed25519 key for this device
|
1223
|
-
*
|
1224
|
-
* @returns base64-encoded ed25519 key. Null if crypto is
|
1225
|
-
* disabled.
|
1226
|
-
*
|
1227
|
-
* @deprecated Not supported for Rust Cryptography.Prefer {@link CryptoApi.getOwnDeviceKeys}
|
1228
|
-
*/
|
1229
|
-
getDeviceEd25519Key(): string | null;
|
1230
|
-
/**
|
1231
|
-
* Get the Curve25519 key for this device
|
1232
|
-
*
|
1233
|
-
* @returns base64-encoded curve25519 key. Null if crypto is
|
1234
|
-
* disabled.
|
1235
|
-
*
|
1236
|
-
* @deprecated Not supported for Rust Cryptography. Use {@link CryptoApi.getOwnDeviceKeys}
|
1237
|
-
*/
|
1238
|
-
getDeviceCurve25519Key(): string | null;
|
1239
912
|
/**
|
1240
913
|
* @deprecated Does nothing.
|
1241
914
|
*/
|
1242
915
|
uploadKeys(): Promise<void>;
|
1243
|
-
/**
|
1244
|
-
* Download the keys for a list of users and stores the keys in the session
|
1245
|
-
* store.
|
1246
|
-
* @param userIds - The users to fetch.
|
1247
|
-
* @param forceDownload - Always download the keys even if cached.
|
1248
|
-
*
|
1249
|
-
* @returns A promise which resolves to a map userId-\>deviceId-\>`DeviceInfo`
|
1250
|
-
*
|
1251
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1252
|
-
*/
|
1253
|
-
downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap>;
|
1254
|
-
/**
|
1255
|
-
* Get the stored device keys for a user id
|
1256
|
-
*
|
1257
|
-
* @param userId - the user to list keys for.
|
1258
|
-
*
|
1259
|
-
* @returns list of devices
|
1260
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1261
|
-
*/
|
1262
|
-
getStoredDevicesForUser(userId: string): DeviceInfo[];
|
1263
|
-
/**
|
1264
|
-
* Get the stored device key for a user id and device id
|
1265
|
-
*
|
1266
|
-
* @param userId - the user to list keys for.
|
1267
|
-
* @param deviceId - unique identifier for the device
|
1268
|
-
*
|
1269
|
-
* @returns device or null
|
1270
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1271
|
-
*/
|
1272
|
-
getStoredDevice(userId: string, deviceId: string): DeviceInfo | null;
|
1273
|
-
/**
|
1274
|
-
* Mark the given device as verified
|
1275
|
-
*
|
1276
|
-
* @param userId - owner of the device
|
1277
|
-
* @param deviceId - unique identifier for the device or user's
|
1278
|
-
* cross-signing public key ID.
|
1279
|
-
*
|
1280
|
-
* @param verified - whether to mark the device as verified. defaults
|
1281
|
-
* to 'true'.
|
1282
|
-
*
|
1283
|
-
* @returns
|
1284
|
-
*
|
1285
|
-
* @remarks
|
1286
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
1287
|
-
*/
|
1288
|
-
setDeviceVerified(userId: string, deviceId: string, verified?: boolean): Promise<void>;
|
1289
|
-
/**
|
1290
|
-
* Mark the given device as blocked/unblocked
|
1291
|
-
*
|
1292
|
-
* @param userId - owner of the device
|
1293
|
-
* @param deviceId - unique identifier for the device or user's
|
1294
|
-
* cross-signing public key ID.
|
1295
|
-
*
|
1296
|
-
* @param blocked - whether to mark the device as blocked. defaults
|
1297
|
-
* to 'true'.
|
1298
|
-
*
|
1299
|
-
* @returns
|
1300
|
-
*
|
1301
|
-
* @remarks
|
1302
|
-
* Fires {@link LegacyCryptoEvent.DeviceVerificationChanged}
|
1303
|
-
*
|
1304
|
-
* @deprecated Not supported for Rust Cryptography.
|
1305
|
-
*/
|
1306
|
-
setDeviceBlocked(userId: string, deviceId: string, blocked?: boolean): Promise<void>;
|
1307
|
-
/**
|
1308
|
-
* Mark the given device as known/unknown
|
1309
|
-
*
|
1310
|
-
* @param userId - owner of the device
|
1311
|
-
* @param deviceId - unique identifier for the device or user's
|
1312
|
-
* cross-signing public key ID.
|
1313
|
-
*
|
1314
|
-
* @param known - whether to mark the device as known. defaults
|
1315
|
-
* to 'true'.
|
1316
|
-
*
|
1317
|
-
* @returns
|
1318
|
-
*
|
1319
|
-
* @remarks
|
1320
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
1321
|
-
*
|
1322
|
-
* @deprecated Not supported for Rust Cryptography.
|
1323
|
-
*/
|
1324
|
-
setDeviceKnown(userId: string, deviceId: string, known?: boolean): Promise<void>;
|
1325
|
-
private setDeviceVerification;
|
1326
|
-
/**
|
1327
|
-
* Request a key verification from another user, using a DM.
|
1328
|
-
*
|
1329
|
-
* @param userId - the user to request verification with
|
1330
|
-
* @param roomId - the room to use for verification
|
1331
|
-
*
|
1332
|
-
* @returns resolves to a VerificationRequest
|
1333
|
-
* when the request has been sent to the other party.
|
1334
|
-
*
|
1335
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.requestVerificationDM}.
|
1336
|
-
*/
|
1337
|
-
requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest>;
|
1338
|
-
/**
|
1339
|
-
* Finds a DM verification request that is already in progress for the given room id
|
1340
|
-
*
|
1341
|
-
* @param roomId - the room to use for verification
|
1342
|
-
*
|
1343
|
-
* @returns the VerificationRequest that is in progress, if any
|
1344
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.findVerificationRequestDMInProgress}.
|
1345
|
-
*/
|
1346
|
-
findVerificationRequestDMInProgress(roomId: string): VerificationRequest | undefined;
|
1347
|
-
/**
|
1348
|
-
* Returns all to-device verification requests that are already in progress for the given user id
|
1349
|
-
*
|
1350
|
-
* @param userId - the ID of the user to query
|
1351
|
-
*
|
1352
|
-
* @returns the VerificationRequests that are in progress
|
1353
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getVerificationRequestsToDeviceInProgress}.
|
1354
|
-
*/
|
1355
|
-
getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[];
|
1356
|
-
/**
|
1357
|
-
* Request a key verification from another user.
|
1358
|
-
*
|
1359
|
-
* @param userId - the user to request verification with
|
1360
|
-
* @param devices - array of device IDs to send requests to. Defaults to
|
1361
|
-
* all devices owned by the user
|
1362
|
-
*
|
1363
|
-
* @returns resolves to a VerificationRequest
|
1364
|
-
* when the request has been sent to the other party.
|
1365
|
-
*
|
1366
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
1367
|
-
*/
|
1368
|
-
requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest>;
|
1369
|
-
/**
|
1370
|
-
* Begin a key verification.
|
1371
|
-
*
|
1372
|
-
* @param method - the verification method to use
|
1373
|
-
* @param userId - the user to verify keys with
|
1374
|
-
* @param deviceId - the device to verify
|
1375
|
-
*
|
1376
|
-
* @returns a verification object
|
1377
|
-
* @deprecated Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
1378
|
-
*/
|
1379
|
-
beginKeyVerification(method: string, userId: string, deviceId: string): Verification<any, any>;
|
1380
|
-
/**
|
1381
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
|
1382
|
-
*/
|
1383
|
-
checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean>;
|
1384
|
-
/**
|
1385
|
-
* Set the global override for whether the client should ever send encrypted
|
1386
|
-
* messages to unverified devices. This provides the default for rooms which
|
1387
|
-
* do not specify a value.
|
1388
|
-
*
|
1389
|
-
* @param value - whether to blacklist all unverified devices by default
|
1390
|
-
*
|
1391
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
1392
|
-
*
|
1393
|
-
* ```javascript
|
1394
|
-
* client.getCrypto().globalBlacklistUnverifiedDevices = value;
|
1395
|
-
* ```
|
1396
|
-
*/
|
1397
|
-
setGlobalBlacklistUnverifiedDevices(value: boolean): boolean;
|
1398
|
-
/**
|
1399
|
-
* @returns whether to blacklist all unverified devices by default
|
1400
|
-
*
|
1401
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
1402
|
-
*
|
1403
|
-
* ```javascript
|
1404
|
-
* value = client.getCrypto().globalBlacklistUnverifiedDevices;
|
1405
|
-
* ```
|
1406
|
-
*/
|
1407
|
-
getGlobalBlacklistUnverifiedDevices(): boolean;
|
1408
|
-
/**
|
1409
|
-
* Set whether sendMessage in a room with unknown and unverified devices
|
1410
|
-
* should throw an error and not send them message. This has 'Global' for
|
1411
|
-
* symmetry with setGlobalBlacklistUnverifiedDevices but there is currently
|
1412
|
-
* no room-level equivalent for this setting.
|
1413
|
-
*
|
1414
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
1415
|
-
*
|
1416
|
-
* It has no effect with the Rust crypto implementation.
|
1417
|
-
*
|
1418
|
-
* @param value - whether error on unknown devices
|
1419
|
-
*
|
1420
|
-
* ```ts
|
1421
|
-
* client.getCrypto().globalErrorOnUnknownDevices = value;
|
1422
|
-
* ```
|
1423
|
-
*/
|
1424
|
-
setGlobalErrorOnUnknownDevices(value: boolean): void;
|
1425
|
-
/**
|
1426
|
-
* @returns whether to error on unknown devices
|
1427
|
-
*
|
1428
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
1429
|
-
*/
|
1430
|
-
getGlobalErrorOnUnknownDevices(): boolean;
|
1431
|
-
/**
|
1432
|
-
* Get the ID of one of the user's cross-signing keys
|
1433
|
-
*
|
1434
|
-
* @param type - The type of key to get the ID of. One of
|
1435
|
-
* "master", "self_signing", or "user_signing". Defaults to "master".
|
1436
|
-
*
|
1437
|
-
* @returns the key ID
|
1438
|
-
* @deprecated Not supported for Rust Cryptography. prefer {@link Crypto.CryptoApi#getCrossSigningKeyId}
|
1439
|
-
*/
|
1440
|
-
getCrossSigningId(type?: CrossSigningKey | string): string | null;
|
1441
|
-
/**
|
1442
|
-
* Get the cross signing information for a given user.
|
1443
|
-
*
|
1444
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1445
|
-
*
|
1446
|
-
* @param userId - the user ID to get the cross-signing info for.
|
1447
|
-
*
|
1448
|
-
* @returns the cross signing information for the user.
|
1449
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#userHasCrossSigningKeys}
|
1450
|
-
*/
|
1451
|
-
getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null;
|
1452
|
-
/**
|
1453
|
-
* Check whether a given user is trusted.
|
1454
|
-
*
|
1455
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1456
|
-
*
|
1457
|
-
* @param userId - The ID of the user to check.
|
1458
|
-
*
|
1459
|
-
* @deprecated Use {@link Crypto.CryptoApi.getUserVerificationStatus | `CryptoApi.getUserVerificationStatus`}
|
1460
|
-
*/
|
1461
|
-
checkUserTrust(userId: string): UserTrustLevel;
|
1462
|
-
/**
|
1463
|
-
* Check whether a given device is trusted.
|
1464
|
-
*
|
1465
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1466
|
-
*
|
1467
|
-
* @param userId - The ID of the user whose devices is to be checked.
|
1468
|
-
* @param deviceId - The ID of the device to check
|
1469
|
-
*
|
1470
|
-
* @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus | `CryptoApi.getDeviceVerificationStatus`}
|
1471
|
-
*/
|
1472
|
-
checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel;
|
1473
|
-
/**
|
1474
|
-
* Check whether one of our own devices is cross-signed by our
|
1475
|
-
* user's stored keys, regardless of whether we trust those keys yet.
|
1476
|
-
*
|
1477
|
-
* @param deviceId - The ID of the device to check
|
1478
|
-
*
|
1479
|
-
* @returns true if the device is cross-signed
|
1480
|
-
*
|
1481
|
-
* @deprecated Not supported for Rust Cryptography.
|
1482
|
-
*/
|
1483
|
-
checkIfOwnDeviceCrossSigned(deviceId: string): boolean;
|
1484
|
-
/**
|
1485
|
-
* Check the copy of our cross-signing key that we have in the device list and
|
1486
|
-
* see if we can get the private key. If so, mark it as trusted.
|
1487
|
-
* @param opts - ICheckOwnCrossSigningTrustOpts object
|
1488
|
-
*
|
1489
|
-
* @deprecated Unneeded for the new crypto
|
1490
|
-
*/
|
1491
|
-
checkOwnCrossSigningTrust(opts?: ICheckOwnCrossSigningTrustOpts): Promise<void>;
|
1492
|
-
/**
|
1493
|
-
* Checks that a given cross-signing private key matches a given public key.
|
1494
|
-
* This can be used by the getCrossSigningKey callback to verify that the
|
1495
|
-
* private key it is about to supply is the one that was requested.
|
1496
|
-
* @param privateKey - The private key
|
1497
|
-
* @param expectedPublicKey - The public key
|
1498
|
-
* @returns true if the key matches, otherwise false
|
1499
|
-
*
|
1500
|
-
* @deprecated Not supported for Rust Cryptography.
|
1501
|
-
*/
|
1502
|
-
checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean;
|
1503
|
-
/**
|
1504
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestDeviceVerification}.
|
1505
|
-
*/
|
1506
|
-
legacyDeviceVerification(userId: string, deviceId: string, method: string): Promise<VerificationRequest>;
|
1507
|
-
/**
|
1508
|
-
* Perform any background tasks that can be done before a message is ready to
|
1509
|
-
* send, in order to speed up sending of the message.
|
1510
|
-
* @param room - the room the event is in
|
1511
|
-
*
|
1512
|
-
* @deprecated Prefer {@link CryptoApi.prepareToEncrypt | `CryptoApi.prepareToEncrypt`}:
|
1513
|
-
*
|
1514
|
-
* ```javascript
|
1515
|
-
* client.getCrypto().prepareToEncrypt(room);
|
1516
|
-
* ```
|
1517
|
-
*/
|
1518
|
-
prepareToEncrypt(room: Room): void;
|
1519
|
-
/**
|
1520
|
-
* Checks if the user has previously published cross-signing keys
|
1521
|
-
*
|
1522
|
-
* This means downloading the devicelist for the user and checking if the list includes
|
1523
|
-
* the cross-signing pseudo-device.
|
1524
|
-
*
|
1525
|
-
* @deprecated Prefer {@link CryptoApi.userHasCrossSigningKeys | `CryptoApi.userHasCrossSigningKeys`}:
|
1526
|
-
*
|
1527
|
-
* ```javascript
|
1528
|
-
* result = client.getCrypto().userHasCrossSigningKeys();
|
1529
|
-
* ```
|
1530
|
-
*/
|
1531
|
-
userHasCrossSigningKeys(): Promise<boolean>;
|
1532
|
-
/**
|
1533
|
-
* Checks whether cross signing:
|
1534
|
-
* - is enabled on this account and trusted by this device
|
1535
|
-
* - has private keys either cached locally or stored in secret storage
|
1536
|
-
*
|
1537
|
-
* If this function returns false, bootstrapCrossSigning() can be used
|
1538
|
-
* to fix things such that it returns true. That is to say, after
|
1539
|
-
* bootstrapCrossSigning() completes successfully, this function should
|
1540
|
-
* return true.
|
1541
|
-
* @returns True if cross-signing is ready to be used on this device
|
1542
|
-
* @deprecated Prefer {@link CryptoApi.isCrossSigningReady | `CryptoApi.isCrossSigningReady`}:
|
1543
|
-
*/
|
1544
|
-
isCrossSigningReady(): Promise<boolean>;
|
1545
|
-
/**
|
1546
|
-
* Bootstrap cross-signing by creating keys if needed. If everything is already
|
1547
|
-
* set up, then no changes are made, so this is safe to run to ensure
|
1548
|
-
* cross-signing is ready for use.
|
1549
|
-
*
|
1550
|
-
* This function:
|
1551
|
-
* - creates new cross-signing keys if they are not found locally cached nor in
|
1552
|
-
* secret storage (if it has been set up)
|
1553
|
-
*
|
1554
|
-
* @deprecated Prefer {@link CryptoApi.bootstrapCrossSigning | `CryptoApi.bootstrapCrossSigning`}.
|
1555
|
-
*/
|
1556
|
-
bootstrapCrossSigning(opts: BootstrapCrossSigningOpts): Promise<void>;
|
1557
|
-
/**
|
1558
|
-
* Whether to trust a others users signatures of their devices.
|
1559
|
-
* If false, devices will only be considered 'verified' if we have
|
1560
|
-
* verified that device individually (effectively disabling cross-signing).
|
1561
|
-
*
|
1562
|
-
* Default: true
|
1563
|
-
*
|
1564
|
-
* @returns True if trusting cross-signed devices
|
1565
|
-
*
|
1566
|
-
* @deprecated Prefer {@link CryptoApi.getTrustCrossSignedDevices | `CryptoApi.getTrustCrossSignedDevices`}.
|
1567
|
-
*/
|
1568
|
-
getCryptoTrustCrossSignedDevices(): boolean;
|
1569
|
-
/**
|
1570
|
-
* See getCryptoTrustCrossSignedDevices
|
1571
|
-
*
|
1572
|
-
* @param val - True to trust cross-signed devices
|
1573
|
-
*
|
1574
|
-
* @deprecated Prefer {@link CryptoApi.setTrustCrossSignedDevices | `CryptoApi.setTrustCrossSignedDevices`}.
|
1575
|
-
*/
|
1576
|
-
setCryptoTrustCrossSignedDevices(val: boolean): void;
|
1577
|
-
/**
|
1578
|
-
* Counts the number of end to end session keys that are waiting to be backed up
|
1579
|
-
* @returns Promise which resolves to the number of sessions requiring backup
|
1580
|
-
*
|
1581
|
-
* @deprecated Not supported for Rust Cryptography.
|
1582
|
-
*/
|
1583
|
-
countSessionsNeedingBackup(): Promise<number>;
|
1584
|
-
/**
|
1585
|
-
* Get information about the encryption of an event
|
1586
|
-
*
|
1587
|
-
* @param event - event to be checked
|
1588
|
-
* @returns The event information.
|
1589
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.getEncryptionInfoForEvent | `CryptoApi.getEncryptionInfoForEvent`}.
|
1590
|
-
*/
|
1591
|
-
getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo;
|
1592
|
-
/**
|
1593
|
-
* Create a recovery key from a user-supplied passphrase.
|
1594
|
-
*
|
1595
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1596
|
-
*
|
1597
|
-
* @param password - Passphrase string that can be entered by the user
|
1598
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
1599
|
-
* Optional.
|
1600
|
-
* @returns Object with public key metadata, encoded private
|
1601
|
-
* recovery key which should be disposed of after displaying to the user,
|
1602
|
-
* and raw private key to avoid round tripping if needed.
|
1603
|
-
*
|
1604
|
-
* @deprecated Prefer {@link CryptoApi.createRecoveryKeyFromPassphrase | `CryptoApi.createRecoveryKeyFromPassphrase`}.
|
1605
|
-
*/
|
1606
|
-
createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey>;
|
1607
|
-
/**
|
1608
|
-
* Checks whether secret storage:
|
1609
|
-
* - is enabled on this account
|
1610
|
-
* - is storing cross-signing private keys
|
1611
|
-
* - is storing session backup key (if enabled)
|
1612
|
-
*
|
1613
|
-
* If this function returns false, bootstrapSecretStorage() can be used
|
1614
|
-
* to fix things such that it returns true. That is to say, after
|
1615
|
-
* bootstrapSecretStorage() completes successfully, this function should
|
1616
|
-
* return true.
|
1617
|
-
*
|
1618
|
-
* @returns True if secret storage is ready to be used on this device
|
1619
|
-
* @deprecated Prefer {@link CryptoApi.isSecretStorageReady | `CryptoApi.isSecretStorageReady`}.
|
1620
|
-
*/
|
1621
|
-
isSecretStorageReady(): Promise<boolean>;
|
1622
|
-
/**
|
1623
|
-
* Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
|
1624
|
-
* already set up, then no changes are made, so this is safe to run to ensure secret
|
1625
|
-
* storage is ready for use.
|
1626
|
-
*
|
1627
|
-
* This function
|
1628
|
-
* - creates a new Secure Secret Storage key if no default key exists
|
1629
|
-
* - if a key backup exists, it is migrated to store the key in the Secret
|
1630
|
-
* Storage
|
1631
|
-
* - creates a backup if none exists, and one is requested
|
1632
|
-
* - migrates Secure Secret Storage to use the latest algorithm, if an outdated
|
1633
|
-
* algorithm is found
|
1634
|
-
*
|
1635
|
-
* @deprecated Use {@link CryptoApi.bootstrapSecretStorage | `CryptoApi.bootstrapSecretStorage`}.
|
1636
|
-
*/
|
1637
|
-
bootstrapSecretStorage(opts: ICreateSecretStorageOpts): Promise<void>;
|
1638
|
-
/**
|
1639
|
-
* Add a key for encrypting secrets.
|
1640
|
-
*
|
1641
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1642
|
-
*
|
1643
|
-
* @param algorithm - the algorithm used by the key
|
1644
|
-
* @param opts - the options for the algorithm. The properties used
|
1645
|
-
* depend on the algorithm given.
|
1646
|
-
* @param keyName - the name of the key. If not given, a random name will be generated.
|
1647
|
-
*
|
1648
|
-
* @returns An object with:
|
1649
|
-
* keyId: the ID of the key
|
1650
|
-
* keyInfo: details about the key (iv, mac, passphrase)
|
1651
|
-
*
|
1652
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
|
1653
|
-
*/
|
1654
|
-
addSecretStorageKey(algorithm: string, opts: AddSecretStorageKeyOpts, keyName?: string): Promise<{
|
1655
|
-
keyId: string;
|
1656
|
-
keyInfo: SecretStorageKeyDescription;
|
1657
|
-
}>;
|
1658
|
-
/**
|
1659
|
-
* Check whether we have a key with a given ID.
|
1660
|
-
*
|
1661
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1662
|
-
*
|
1663
|
-
* @param keyId - The ID of the key to check
|
1664
|
-
* for. Defaults to the default key ID if not provided.
|
1665
|
-
* @returns Whether we have the key.
|
1666
|
-
*
|
1667
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
|
1668
|
-
*/
|
1669
|
-
hasSecretStorageKey(keyId?: string): Promise<boolean>;
|
1670
|
-
/**
|
1671
|
-
* Store an encrypted secret on the server.
|
1672
|
-
*
|
1673
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1674
|
-
*
|
1675
|
-
* @param name - The name of the secret
|
1676
|
-
* @param secret - The secret contents.
|
1677
|
-
* @param keys - The IDs of the keys to use to encrypt the secret or null/undefined
|
1678
|
-
* to use the default (will throw if no default key is set).
|
1679
|
-
*
|
1680
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
|
1681
|
-
*/
|
1682
|
-
storeSecret(name: string, secret: string, keys?: string[]): Promise<void>;
|
1683
|
-
/**
|
1684
|
-
* Get a secret from storage.
|
1685
|
-
*
|
1686
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1687
|
-
*
|
1688
|
-
* @param name - the name of the secret
|
1689
|
-
*
|
1690
|
-
* @returns the contents of the secret
|
1691
|
-
*
|
1692
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
|
1693
|
-
*/
|
1694
|
-
getSecret(name: string): Promise<string | undefined>;
|
1695
|
-
/**
|
1696
|
-
* Check if a secret is stored on the server.
|
1697
|
-
*
|
1698
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1699
|
-
*
|
1700
|
-
* @param name - the name of the secret
|
1701
|
-
* @returns map of key name to key info the secret is encrypted
|
1702
|
-
* with, or null if it is not present or not encrypted with a trusted
|
1703
|
-
* key
|
1704
|
-
*
|
1705
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
|
1706
|
-
*/
|
1707
|
-
isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null>;
|
1708
|
-
/**
|
1709
|
-
* Request a secret from another device.
|
1710
|
-
*
|
1711
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1712
|
-
*
|
1713
|
-
* @param name - the name of the secret to request
|
1714
|
-
* @param devices - the devices to request the secret from
|
1715
|
-
*
|
1716
|
-
* @returns the secret request object
|
1717
|
-
* @deprecated Not supported for Rust Cryptography.
|
1718
|
-
*/
|
1719
|
-
requestSecret(name: string, devices: string[]): ISecretRequest;
|
1720
|
-
/**
|
1721
|
-
* Get the current default key ID for encrypting secrets.
|
1722
|
-
*
|
1723
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1724
|
-
*
|
1725
|
-
* @returns The default key ID or null if no default key ID is set
|
1726
|
-
*
|
1727
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
|
1728
|
-
*/
|
1729
|
-
getDefaultSecretStorageKeyId(): Promise<string | null>;
|
1730
|
-
/**
|
1731
|
-
* Set the current default key ID for encrypting secrets.
|
1732
|
-
*
|
1733
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1734
|
-
*
|
1735
|
-
* @param keyId - The new default key ID
|
1736
|
-
*
|
1737
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
|
1738
|
-
*/
|
1739
|
-
setDefaultSecretStorageKeyId(keyId: string): Promise<void>;
|
1740
|
-
/**
|
1741
|
-
* Checks that a given secret storage private key matches a given public key.
|
1742
|
-
* This can be used by the getSecretStorageKey callback to verify that the
|
1743
|
-
* private key it is about to supply is the one that was requested.
|
1744
|
-
*
|
1745
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1746
|
-
*
|
1747
|
-
* @param privateKey - The private key
|
1748
|
-
* @param expectedPublicKey - The public key
|
1749
|
-
* @returns true if the key matches, otherwise false
|
1750
|
-
*
|
1751
|
-
* @deprecated The use of asymmetric keys for SSSS is deprecated.
|
1752
|
-
* Use {@link SecretStorage.ServerSideSecretStorage#checkKey} for symmetric keys.
|
1753
|
-
*/
|
1754
|
-
checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean;
|
1755
|
-
/**
|
1756
|
-
* Get e2e information on the device that sent an event
|
1757
|
-
*
|
1758
|
-
* @param event - event to be checked
|
1759
|
-
* @deprecated Not supported for Rust Cryptography.
|
1760
|
-
*/
|
1761
|
-
getEventSenderDeviceInfo(event: MatrixEvent): Promise<DeviceInfo | null>;
|
1762
|
-
/**
|
1763
|
-
* Check if the sender of an event is verified
|
1764
|
-
*
|
1765
|
-
* @param event - event to be checked
|
1766
|
-
*
|
1767
|
-
* @returns true if the sender of this event has been verified using
|
1768
|
-
* {@link MatrixClient#setDeviceVerified}.
|
1769
|
-
*
|
1770
|
-
* @deprecated Not supported for Rust Cryptography.
|
1771
|
-
*/
|
1772
|
-
isEventSenderVerified(event: MatrixEvent): Promise<boolean>;
|
1773
|
-
/**
|
1774
|
-
* Get outgoing room key request for this event if there is one.
|
1775
|
-
* @param event - The event to check for
|
1776
|
-
*
|
1777
|
-
* @returns A room key request, or null if there is none
|
1778
|
-
*
|
1779
|
-
* @deprecated Not supported for Rust Cryptography.
|
1780
|
-
*/
|
1781
|
-
getOutgoingRoomKeyRequest(event: MatrixEvent): Promise<OutgoingRoomKeyRequest | null>;
|
1782
|
-
/**
|
1783
|
-
* Cancel a room key request for this event if one is ongoing and resend the
|
1784
|
-
* request.
|
1785
|
-
* @param event - event of which to cancel and resend the room
|
1786
|
-
* key request.
|
1787
|
-
* @returns A promise that will resolve when the key request is queued
|
1788
|
-
*
|
1789
|
-
* @deprecated Not supported for Rust Cryptography.
|
1790
|
-
*/
|
1791
|
-
cancelAndResendEventRoomKeyRequest(event: MatrixEvent): Promise<void>;
|
1792
|
-
/**
|
1793
|
-
* Enable end-to-end encryption for a room. This does not modify room state.
|
1794
|
-
* Any messages sent before the returned promise resolves will be sent unencrypted.
|
1795
|
-
* @param roomId - The room ID to enable encryption in.
|
1796
|
-
* @param config - The encryption config for the room.
|
1797
|
-
* @returns A promise that will resolve when encryption is set up.
|
1798
|
-
*
|
1799
|
-
* @deprecated Not supported for Rust Cryptography. To enable encryption in a room, send an `m.room.encryption`
|
1800
|
-
* state event.
|
1801
|
-
*/
|
1802
|
-
setRoomEncryption(roomId: string, config: IRoomEncryption): Promise<void>;
|
1803
|
-
/**
|
1804
|
-
* Whether encryption is enabled for a room.
|
1805
|
-
* @param roomId - the room id to query.
|
1806
|
-
* @returns whether encryption is enabled.
|
1807
|
-
*
|
1808
|
-
* @deprecated Not correctly supported for Rust Cryptography. Use {@link CryptoApi.isEncryptionEnabledInRoom} and/or
|
1809
|
-
* {@link Room.hasEncryptionStateEvent}.
|
1810
|
-
*/
|
1811
|
-
isRoomEncrypted(roomId: string): boolean;
|
1812
|
-
/**
|
1813
|
-
* Encrypts and sends a given object via Olm to-device messages to a given
|
1814
|
-
* set of devices.
|
1815
|
-
*
|
1816
|
-
* @param userDeviceInfoArr - list of deviceInfo objects representing the devices to send to
|
1817
|
-
*
|
1818
|
-
* @param payload - fields to include in the encrypted payload
|
1819
|
-
*
|
1820
|
-
* @returns Promise which
|
1821
|
-
* resolves once the message has been encrypted and sent to the given
|
1822
|
-
* userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
|
1823
|
-
* of the successfully sent messages.
|
1824
|
-
*
|
1825
|
-
* @deprecated Instead use {@link CryptoApi.encryptToDeviceMessages} followed by {@link queueToDevice}.
|
1826
|
-
*/
|
1827
|
-
encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void>;
|
1828
|
-
/**
|
1829
|
-
* Forces the current outbound group session to be discarded such
|
1830
|
-
* that another one will be created next time an event is sent.
|
1831
|
-
*
|
1832
|
-
* @param roomId - The ID of the room to discard the session for
|
1833
|
-
*
|
1834
|
-
* @deprecated Prefer {@link CryptoApi.forceDiscardSession | `CryptoApi.forceDiscardSession`}:
|
1835
|
-
*/
|
1836
|
-
forceDiscardSession(roomId: string): void;
|
1837
|
-
/**
|
1838
|
-
* Get a list containing all of the room keys
|
1839
|
-
*
|
1840
|
-
* This should be encrypted before returning it to the user.
|
1841
|
-
*
|
1842
|
-
* @returns a promise which resolves to a list of session export objects
|
1843
|
-
*
|
1844
|
-
* @deprecated Prefer {@link CryptoApi.exportRoomKeys | `CryptoApi.exportRoomKeys`}:
|
1845
|
-
*
|
1846
|
-
* ```javascript
|
1847
|
-
* sessionData = await client.getCrypto().exportRoomKeys();
|
1848
|
-
* ```
|
1849
|
-
*/
|
1850
|
-
exportRoomKeys(): Promise<IMegolmSessionData[]>;
|
1851
|
-
/**
|
1852
|
-
* Import a list of room keys previously exported by exportRoomKeys
|
1853
|
-
*
|
1854
|
-
* @param keys - a list of session export objects
|
1855
|
-
* @param opts - options object
|
1856
|
-
*
|
1857
|
-
* @returns a promise which resolves when the keys have been imported
|
1858
|
-
*
|
1859
|
-
* @deprecated Prefer {@link CryptoApi.importRoomKeys | `CryptoApi.importRoomKeys`}:
|
1860
|
-
* ```javascript
|
1861
|
-
* await client.getCrypto()?.importRoomKeys([..]);
|
1862
|
-
* ```
|
1863
|
-
*/
|
1864
|
-
importRoomKeys(keys: IMegolmSessionData[], opts?: ImportRoomKeysOpts): Promise<void>;
|
1865
|
-
/**
|
1866
|
-
* Force a re-check of the local key backup status against
|
1867
|
-
* what's on the server.
|
1868
|
-
*
|
1869
|
-
* @returns Object with backup info (as returned by
|
1870
|
-
* getKeyBackupVersion) in backupInfo and
|
1871
|
-
* trust information (as returned by isKeyBackupTrusted)
|
1872
|
-
* in trustInfo.
|
1873
|
-
*
|
1874
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
1875
|
-
*/
|
1876
|
-
checkKeyBackup(): Promise<IKeyBackupCheck | null>;
|
1877
|
-
/**
|
1878
|
-
* Get information about the current key backup from the server.
|
1879
|
-
*
|
1880
|
-
* Performs some basic validity checks on the shape of the result, and raises an error if it is not as expected.
|
1881
|
-
*
|
1882
|
-
* **Note**: there is no (supported) way to distinguish between "failure to talk to the server" and "another client
|
1883
|
-
* uploaded a key backup version using an algorithm I don't understand.
|
1884
|
-
*
|
1885
|
-
* @returns Information object from API, or null if no backup is present on the server.
|
1886
|
-
*
|
1887
|
-
* @deprecated Prefer {@link CryptoApi.getKeyBackupInfo}.
|
1888
|
-
*/
|
1889
|
-
getKeyBackupVersion(): Promise<IKeyBackupInfo | null>;
|
1890
|
-
/**
|
1891
|
-
* @param info - key backup info dict from getKeyBackupVersion()
|
1892
|
-
*
|
1893
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.isKeyBackupTrusted | `CryptoApi.isKeyBackupTrusted`}.
|
1894
|
-
*/
|
1895
|
-
isKeyBackupTrusted(info: IKeyBackupInfo): Promise<TrustInfo>;
|
1896
|
-
/**
|
1897
|
-
* @returns true if the client is configured to back up keys to
|
1898
|
-
* the server, otherwise false. If we haven't completed a successful check
|
1899
|
-
* of key backup status yet, returns null.
|
1900
|
-
*
|
1901
|
-
* @deprecated Not supported for Rust Cryptography. Prefer direct access to {@link Crypto.CryptoApi.getActiveSessionBackupVersion}:
|
1902
|
-
*
|
1903
|
-
* ```javascript
|
1904
|
-
* let enabled = (await client.getCrypto().getActiveSessionBackupVersion()) !== null;
|
1905
|
-
* ```
|
1906
|
-
*/
|
1907
|
-
getKeyBackupEnabled(): boolean | null;
|
1908
|
-
/**
|
1909
|
-
* Enable backing up of keys, using data previously returned from
|
1910
|
-
* getKeyBackupVersion.
|
1911
|
-
*
|
1912
|
-
* @param info - Backup information object as returned by getKeyBackupVersion
|
1913
|
-
* @returns Promise which resolves when complete.
|
1914
|
-
*
|
1915
|
-
* @deprecated Do not call this directly. Instead call {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
1916
|
-
*/
|
1917
|
-
enableKeyBackup(info: IKeyBackupInfo): Promise<void>;
|
1918
|
-
/**
|
1919
|
-
* Disable backing up of keys.
|
1920
|
-
*
|
1921
|
-
* @deprecated Not supported for Rust Cryptography. It should be unnecessary to disable key backup.
|
1922
|
-
*/
|
1923
|
-
disableKeyBackup(): void;
|
1924
|
-
/**
|
1925
|
-
* Set up the data required to create a new backup version. The backup version
|
1926
|
-
* will not be created and enabled until createKeyBackupVersion is called.
|
1927
|
-
*
|
1928
|
-
* @param password - Passphrase string that can be entered by the user
|
1929
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
1930
|
-
* Optional.
|
1931
|
-
*
|
1932
|
-
* @returns Object that can be passed to createKeyBackupVersion and
|
1933
|
-
* additionally has a 'recovery_key' member with the user-facing recovery key string.
|
1934
|
-
*
|
1935
|
-
* @deprecated Not supported for Rust cryptography. Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
1936
|
-
*/
|
1937
|
-
prepareKeyBackupVersion(password?: string | Uint8Array | null, opts?: IKeyBackupPrepareOpts): Promise<Pick<IPreparedKeyBackupVersion, "algorithm" | "auth_data" | "recovery_key">>;
|
1938
|
-
/**
|
1939
|
-
* Check whether the key backup private key is stored in secret storage.
|
1940
|
-
* @returns map of key name to key info the secret is
|
1941
|
-
* encrypted with, or null if it is not present or not encrypted with a
|
1942
|
-
* trusted key
|
1943
|
-
*/
|
1944
|
-
isKeyBackupKeyStored(): Promise<Record<string, SecretStorageKeyDescription> | null>;
|
1945
|
-
/**
|
1946
|
-
* Create a new key backup version and enable it, using the information return
|
1947
|
-
* from prepareKeyBackupVersion.
|
1948
|
-
*
|
1949
|
-
* @param info - Info object from prepareKeyBackupVersion
|
1950
|
-
* @returns Object with 'version' param indicating the version created
|
1951
|
-
*
|
1952
|
-
* @deprecated Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
1953
|
-
*/
|
1954
|
-
createKeyBackupVersion(info: IKeyBackupInfo): Promise<IKeyBackupInfo>;
|
1955
|
-
/**
|
1956
|
-
* @deprecated Use {@link Crypto.CryptoApi.deleteKeyBackupVersion | `CryptoApi.deleteKeyBackupVersion`}.
|
1957
|
-
*/
|
1958
|
-
deleteKeyBackupVersion(version: string): Promise<void>;
|
1959
|
-
private makeKeyBackupPath;
|
1960
|
-
/**
|
1961
|
-
* Back up session keys to the homeserver.
|
1962
|
-
* @param roomId - ID of the room that the keys are for Optional.
|
1963
|
-
* @param sessionId - ID of the session that the keys are for Optional.
|
1964
|
-
* @param version - backup version Optional.
|
1965
|
-
* @param data - Object keys to send
|
1966
|
-
* @returns a promise that will resolve when the keys
|
1967
|
-
* are uploaded
|
1968
|
-
*
|
1969
|
-
* @deprecated Not supported for Rust Cryptography.
|
1970
|
-
*/
|
1971
|
-
sendKeyBackup(roomId: undefined, sessionId: undefined, version: string | undefined, data: IKeyBackup): Promise<void>;
|
1972
|
-
sendKeyBackup(roomId: string, sessionId: undefined, version: string | undefined, data: IKeyBackup): Promise<void>;
|
1973
|
-
sendKeyBackup(roomId: string, sessionId: string, version: string | undefined, data: IKeyBackup): Promise<void>;
|
1974
|
-
/**
|
1975
|
-
* Marks all group sessions as needing to be backed up and schedules them to
|
1976
|
-
* upload in the background as soon as possible.
|
1977
|
-
*
|
1978
|
-
* @deprecated Not supported for Rust Cryptography. This is done automatically as part of
|
1979
|
-
* {@link CryptoApi.resetKeyBackup}, so there is probably no need to call this manually.
|
1980
|
-
*/
|
1981
|
-
scheduleAllGroupSessionsForBackup(): Promise<void>;
|
1982
|
-
/**
|
1983
|
-
* Marks all group sessions as needing to be backed up without scheduling
|
1984
|
-
* them to upload in the background.
|
1985
|
-
*
|
1986
|
-
* (This is done automatically as part of {@link CryptoApi.resetKeyBackup},
|
1987
|
-
* so there is probably no need to call this manually.)
|
1988
|
-
*
|
1989
|
-
* @returns Promise which resolves to the number of sessions requiring a backup.
|
1990
|
-
* @deprecated Not supported for Rust Cryptography.
|
1991
|
-
*/
|
1992
|
-
flagAllGroupSessionsForBackup(): Promise<number>;
|
1993
|
-
/**
|
1994
|
-
* Return true if recovery key is valid.
|
1995
|
-
* Try to decode the recovery key and check if it's successful.
|
1996
|
-
* @param recoveryKey
|
1997
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
1998
|
-
*/
|
1999
|
-
isValidRecoveryKey(recoveryKey: string): boolean;
|
2000
|
-
/**
|
2001
|
-
* Get the raw key for a key backup from the password
|
2002
|
-
* Used when migrating key backups into SSSS
|
2003
|
-
*
|
2004
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2005
|
-
*
|
2006
|
-
* @param password - Passphrase
|
2007
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2008
|
-
* @returns key backup key
|
2009
|
-
* @deprecated Deriving a backup key from a passphrase is not part of the matrix spec. Instead, a random key is generated and stored/shared via 4S.
|
2010
|
-
*/
|
2011
|
-
keyBackupKeyFromPassword(password: string, backupInfo: IKeyBackupInfo): Promise<Uint8Array>;
|
2012
|
-
/**
|
2013
|
-
* Get the raw key for a key backup from the recovery key
|
2014
|
-
* Used when migrating key backups into SSSS
|
2015
|
-
*
|
2016
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2017
|
-
*
|
2018
|
-
* @param recoveryKey - The recovery key
|
2019
|
-
* @returns key backup key
|
2020
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
2021
|
-
*/
|
2022
|
-
keyBackupKeyFromRecoveryKey(recoveryKey: string): Uint8Array;
|
2023
|
-
/**
|
2024
|
-
* Restore from an existing key backup via a passphrase.
|
2025
|
-
*
|
2026
|
-
* @param password - Passphrase
|
2027
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2028
|
-
* Restores all rooms if omitted.
|
2029
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2030
|
-
* Restores all sessions if omitted.
|
2031
|
-
* @param backupInfo - Backup metadata from `getKeyBackupVersion` or `checkKeyBackup`.`backupInfo`
|
2032
|
-
* @param opts - Optional params such as callbacks
|
2033
|
-
* @returns Status of restoration with `total` and `imported`
|
2034
|
-
* key counts.
|
2035
|
-
*
|
2036
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2037
|
-
*/
|
2038
|
-
restoreKeyBackupWithPassword(password: string, targetRoomId: undefined, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2039
|
-
/**
|
2040
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2041
|
-
*/
|
2042
|
-
restoreKeyBackupWithPassword(password: string, targetRoomId: string, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2043
|
-
/**
|
2044
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2045
|
-
*/
|
2046
|
-
restoreKeyBackupWithPassword(password: string, targetRoomId: string, targetSessionId: string, backupInfo: IKeyBackupInfo, opts: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2047
|
-
/**
|
2048
|
-
* Restore from an existing key backup via a private key stored in secret
|
2049
|
-
* storage.
|
2050
|
-
*
|
2051
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2052
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2053
|
-
* Restores all rooms if omitted.
|
2054
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2055
|
-
* Restores all sessions if omitted.
|
2056
|
-
* @param opts - Optional params such as callbacks
|
2057
|
-
* @returns Status of restoration with `total` and `imported`
|
2058
|
-
* key counts.
|
2059
|
-
*
|
2060
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2061
|
-
*/
|
2062
|
-
restoreKeyBackupWithSecretStorage(backupInfo: IKeyBackupInfo, targetRoomId?: string, targetSessionId?: string, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2063
|
-
/**
|
2064
|
-
* Restore from an existing key backup via an encoded recovery key.
|
2065
|
-
*
|
2066
|
-
* @param recoveryKey - Encoded recovery key
|
2067
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2068
|
-
* Restores all rooms if omitted.
|
2069
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2070
|
-
* Restores all sessions if omitted.
|
2071
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2072
|
-
* @param opts - Optional params such as callbacks
|
2073
|
-
|
2074
|
-
* @returns Status of restoration with `total` and `imported`
|
2075
|
-
* key counts.
|
2076
|
-
*
|
2077
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2078
|
-
*/
|
2079
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey: string, targetRoomId: undefined, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2080
|
-
/**
|
2081
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2082
|
-
*/
|
2083
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey: string, targetRoomId: string, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2084
|
-
/**
|
2085
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2086
|
-
*/
|
2087
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey: string, targetRoomId: string, targetSessionId: string, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2088
|
-
/**
|
2089
|
-
* Restore from an existing key backup via a private key stored locally
|
2090
|
-
* @param targetRoomId
|
2091
|
-
* @param targetSessionId
|
2092
|
-
* @param backupInfo
|
2093
|
-
* @param opts
|
2094
|
-
*
|
2095
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2096
|
-
*/
|
2097
|
-
restoreKeyBackupWithCache(targetRoomId: undefined, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2098
|
-
/**
|
2099
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2100
|
-
*/
|
2101
|
-
restoreKeyBackupWithCache(targetRoomId: string, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2102
|
-
/**
|
2103
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2104
|
-
*/
|
2105
|
-
restoreKeyBackupWithCache(targetRoomId: string, targetSessionId: string, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2106
|
-
private restoreKeyBackup;
|
2107
|
-
/**
|
2108
|
-
* This method calculates the total number of keys present in the response of a `/room_keys/keys` call.
|
2109
|
-
*
|
2110
|
-
* @param res - The response from the server containing the keys to be counted.
|
2111
|
-
*
|
2112
|
-
* @returns The total number of keys in the backup.
|
2113
|
-
*/
|
2114
|
-
private getTotalKeyCount;
|
2115
|
-
/**
|
2116
|
-
* This method handles the decryption of a full backup, i.e a call to `/room_keys/keys`.
|
2117
|
-
* It will decrypt the keys in chunks and call the `block` callback for each chunk.
|
2118
|
-
*
|
2119
|
-
* @param res - The response from the server containing the keys to be decrypted.
|
2120
|
-
* @param backupDecryptor - An instance of the BackupDecryptor class used to decrypt the keys.
|
2121
|
-
* @param chunkSize - The size of the chunks to be processed at a time.
|
2122
|
-
* @param block - A callback function that is called for each chunk of keys.
|
2123
|
-
*
|
2124
|
-
* @returns A promise that resolves when the decryption is complete.
|
2125
|
-
*/
|
2126
|
-
private handleDecryptionOfAFullBackup;
|
2127
|
-
deleteKeysFromBackup(roomId: undefined, sessionId: undefined, version?: string): Promise<void>;
|
2128
|
-
deleteKeysFromBackup(roomId: string, sessionId: undefined, version?: string): Promise<void>;
|
2129
|
-
deleteKeysFromBackup(roomId: string, sessionId: string, version?: string): Promise<void>;
|
2130
916
|
/**
|
2131
917
|
* Get the config for the media repository.
|
2132
918
|
* @returns Promise which resolves with an object containing the config.
|
@@ -2334,13 +1120,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2334
1120
|
* @returns returns a promise which resolves with the result of the delayed send request
|
2335
1121
|
*/
|
2336
1122
|
protected encryptAndSendEvent(room: Room | null, event: MatrixEvent, delayOpts: SendDelayedEventRequestOpts): Promise<SendDelayedEventResponse>;
|
2337
|
-
private encryptEventIfNeeded;
|
2338
|
-
/**
|
2339
|
-
* Determine whether a given event should be encrypted when we send it to the given room.
|
2340
|
-
*
|
2341
|
-
* This takes into account event type and room configuration.
|
2342
|
-
*/
|
2343
|
-
private shouldEncryptEventForRoom;
|
2344
1123
|
/**
|
2345
1124
|
* Returns the eventType that should be used taking encryption into account
|
2346
1125
|
* for a given eventType.
|
@@ -2961,8 +1740,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2961
1740
|
* @returns Rejects: with an error response.
|
2962
1741
|
*/
|
2963
1742
|
getOpenIdToken(): Promise<IOpenIDToken>;
|
2964
|
-
private startCallEventHandler;
|
2965
|
-
private startMatrixRTC;
|
2966
1743
|
/**
|
2967
1744
|
* Once the client has been initialised, we want to clear notifications we
|
2968
1745
|
* know for a fact should be here.
|
@@ -2974,24 +1751,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2974
1751
|
* we have on record matches.
|
2975
1752
|
*/
|
2976
1753
|
private fixupRoomNotifications;
|
2977
|
-
/**
|
2978
|
-
* @returns Promise which resolves: ITurnServerResponse object
|
2979
|
-
* @returns Rejects: with an error response.
|
2980
|
-
*/
|
2981
|
-
turnServer(): Promise<ITurnServerResponse>;
|
2982
|
-
/**
|
2983
|
-
* Get the TURN servers for this homeserver.
|
2984
|
-
* @returns The servers or an empty list.
|
2985
|
-
*/
|
2986
|
-
getTurnServers(): ITurnServer[];
|
2987
|
-
/**
|
2988
|
-
* Get the unix timestamp (in milliseconds) at which the current
|
2989
|
-
* TURN credentials (from getTurnServers) expire
|
2990
|
-
* @returns The expiry timestamp in milliseconds
|
2991
|
-
*/
|
2992
|
-
getTurnServersExpiry(): number;
|
2993
|
-
get pollingTurnServers(): boolean;
|
2994
|
-
checkTurnServers(): Promise<boolean | undefined>;
|
2995
1754
|
/**
|
2996
1755
|
* Set whether to allow a fallback ICE server should be used for negotiating a
|
2997
1756
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to
|
@@ -3120,13 +1879,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3120
1879
|
nextBatch?: string | null;
|
3121
1880
|
prevBatch?: string | null;
|
3122
1881
|
}>;
|
3123
|
-
/**
|
3124
|
-
* The app may wish to see if we have a key cached without
|
3125
|
-
* triggering a user interaction.
|
3126
|
-
*
|
3127
|
-
* @deprecated Not supported for Rust Cryptography.
|
3128
|
-
*/
|
3129
|
-
getCrossSigningCacheCallbacks(): ICacheCallbacks | undefined;
|
3130
1882
|
/**
|
3131
1883
|
* Generates a random string suitable for use as a client secret. <strong>This
|
3132
1884
|
* method is experimental and may change.</strong>
|
@@ -3794,47 +2546,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3794
2546
|
body: ISearchRequestBody;
|
3795
2547
|
next_batch?: string;
|
3796
2548
|
}, abortSignal?: AbortSignal): Promise<ISearchResponse>;
|
3797
|
-
/**
|
3798
|
-
* Upload keys
|
3799
|
-
*
|
3800
|
-
* @param content - body of upload request
|
3801
|
-
*
|
3802
|
-
* @param opts - this method no longer takes any opts,
|
3803
|
-
* used to take opts.device_id but this was not removed from the spec as a redundant parameter
|
3804
|
-
*
|
3805
|
-
* @returns Promise which resolves: result object. Rejects: with
|
3806
|
-
* an error response ({@link MatrixError}).
|
3807
|
-
*/
|
3808
|
-
uploadKeysRequest(content: IUploadKeysRequest, opts?: void): Promise<IKeysUploadResponse>;
|
3809
|
-
uploadKeySignatures(content: KeySignatures): Promise<IUploadKeySignaturesResponse>;
|
3810
|
-
/**
|
3811
|
-
* Download device keys
|
3812
|
-
*
|
3813
|
-
* @param userIds - list of users to get keys for
|
3814
|
-
*
|
3815
|
-
* @param token - sync token to pass in the query request, to help
|
3816
|
-
* the HS give the most recent results
|
3817
|
-
*
|
3818
|
-
* @returns Promise which resolves: result object. Rejects: with
|
3819
|
-
* an error response ({@link MatrixError}).
|
3820
|
-
*/
|
3821
|
-
downloadKeysForUsers(userIds: string[], { token }?: {
|
3822
|
-
token?: string;
|
3823
|
-
}): Promise<IDownloadKeyResult>;
|
3824
|
-
/**
|
3825
|
-
* Claim one-time keys
|
3826
|
-
*
|
3827
|
-
* @param devices - a list of [userId, deviceId] pairs
|
3828
|
-
*
|
3829
|
-
* @param keyAlgorithm - desired key type
|
3830
|
-
*
|
3831
|
-
* @param timeout - the time (in milliseconds) to wait for keys from remote
|
3832
|
-
* servers
|
3833
|
-
*
|
3834
|
-
* @returns Promise which resolves: result object. Rejects: with
|
3835
|
-
* an error response ({@link MatrixError}).
|
3836
|
-
*/
|
3837
|
-
claimOneTimeKeys(devices: [string, string][], keyAlgorithm?: string, timeout?: number): Promise<IClaimOTKsResult>;
|
3838
2549
|
/**
|
3839
2550
|
* Ask the server for a list of users who have changed their device lists
|
3840
2551
|
* between a pair of sync tokens
|
@@ -3847,7 +2558,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3847
2558
|
changed: string[];
|
3848
2559
|
left: string[];
|
3849
2560
|
}>;
|
3850
|
-
uploadDeviceSigningKeys(auth?: AuthDict, keys?: CrossSigningKeys): Promise<{}>;
|
3851
2561
|
/**
|
3852
2562
|
* Register with an identity server using the OpenID token from the user's
|
3853
2563
|
* Homeserver, which can be retrieved via
|
@@ -4198,12 +2908,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
4198
2908
|
issuer: string;
|
4199
2909
|
}>;
|
4200
2910
|
}
|
4201
|
-
/**
|
4202
|
-
* recalculates an accurate notifications count on event decryption.
|
4203
|
-
* Servers do not have enough knowledge about encrypted events to calculate an
|
4204
|
-
* accurate notification_count
|
4205
|
-
*/
|
4206
|
-
export declare function fixNotificationCountOnDecryption(cli: MatrixClient, event: MatrixEvent): void;
|
4207
2911
|
/**
|
4208
2912
|
* Given an event, figure out the thread ID we should use for it in a receipt.
|
4209
2913
|
*
|