@unwanted/matrix-sdk-mini 34.12.0 → 34.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (698) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/event.d.ts +0 -19
  3. package/lib/@types/event.d.ts.map +1 -1
  4. package/lib/@types/event.js.map +1 -1
  5. package/lib/@types/global.d.js +0 -2
  6. package/lib/@types/global.d.js.map +1 -1
  7. package/lib/autodiscovery.d.ts +1 -1
  8. package/lib/autodiscovery.d.ts.map +1 -1
  9. package/lib/autodiscovery.js.map +1 -1
  10. package/lib/base64.d.ts +3 -6
  11. package/lib/base64.d.ts.map +1 -1
  12. package/lib/base64.js +43 -36
  13. package/lib/base64.js.map +1 -1
  14. package/lib/browser-index.d.ts.map +1 -1
  15. package/lib/browser-index.js +0 -11
  16. package/lib/browser-index.js.map +1 -1
  17. package/lib/client.d.ts +2 -1298
  18. package/lib/client.d.ts.map +1 -1
  19. package/lib/client.js +348 -2967
  20. package/lib/client.js.map +1 -1
  21. package/lib/digest.d.ts +2 -2
  22. package/lib/digest.d.ts.map +1 -1
  23. package/lib/digest.js +2 -2
  24. package/lib/digest.js.map +1 -1
  25. package/lib/embedded.d.ts +0 -22
  26. package/lib/embedded.d.ts.map +1 -1
  27. package/lib/embedded.js +58 -168
  28. package/lib/embedded.js.map +1 -1
  29. package/lib/event-mapper.d.ts.map +1 -1
  30. package/lib/event-mapper.js +0 -4
  31. package/lib/event-mapper.js.map +1 -1
  32. package/lib/matrix.d.ts +0 -25
  33. package/lib/matrix.d.ts.map +1 -1
  34. package/lib/matrix.js +1 -30
  35. package/lib/matrix.js.map +1 -1
  36. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  37. package/lib/models/MSC3089Branch.js +0 -3
  38. package/lib/models/MSC3089Branch.js.map +1 -1
  39. package/lib/models/event-timeline-set.d.ts +6 -10
  40. package/lib/models/event-timeline-set.d.ts.map +1 -1
  41. package/lib/models/event-timeline-set.js +28 -36
  42. package/lib/models/event-timeline-set.js.map +1 -1
  43. package/lib/models/event-timeline.d.ts +7 -2
  44. package/lib/models/event-timeline.d.ts.map +1 -1
  45. package/lib/models/event-timeline.js +8 -9
  46. package/lib/models/event-timeline.js.map +1 -1
  47. package/lib/models/event.d.ts +1 -95
  48. package/lib/models/event.d.ts.map +1 -1
  49. package/lib/models/event.js +11 -281
  50. package/lib/models/event.js.map +1 -1
  51. package/lib/models/poll.d.ts.map +1 -1
  52. package/lib/models/poll.js +1 -5
  53. package/lib/models/poll.js.map +1 -1
  54. package/lib/models/relations-container.d.ts.map +1 -1
  55. package/lib/models/relations-container.js +1 -7
  56. package/lib/models/relations-container.js.map +1 -1
  57. package/lib/models/relations.d.ts +0 -1
  58. package/lib/models/relations.d.ts.map +1 -1
  59. package/lib/models/relations.js +0 -8
  60. package/lib/models/relations.js.map +1 -1
  61. package/lib/models/room-state.d.ts +2 -13
  62. package/lib/models/room-state.d.ts.map +1 -1
  63. package/lib/models/room-state.js +12 -56
  64. package/lib/models/room-state.js.map +1 -1
  65. package/lib/models/room.d.ts +2 -20
  66. package/lib/models/room.d.ts.map +1 -1
  67. package/lib/models/room.js +121 -162
  68. package/lib/models/room.js.map +1 -1
  69. package/lib/models/thread.d.ts.map +1 -1
  70. package/lib/models/thread.js +5 -4
  71. package/lib/models/thread.js.map +1 -1
  72. package/lib/sliding-sync-sdk.d.ts +3 -4
  73. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  74. package/lib/sliding-sync-sdk.js +55 -102
  75. package/lib/sliding-sync-sdk.js.map +1 -1
  76. package/lib/sliding-sync.js +9 -6
  77. package/lib/sliding-sync.js.map +1 -1
  78. package/lib/store/indexeddb.d.ts +1 -1
  79. package/lib/store/indexeddb.d.ts.map +1 -1
  80. package/lib/store/indexeddb.js.map +1 -1
  81. package/lib/sync-accumulator.d.ts +6 -4
  82. package/lib/sync-accumulator.d.ts.map +1 -1
  83. package/lib/sync-accumulator.js +23 -12
  84. package/lib/sync-accumulator.js.map +1 -1
  85. package/lib/sync.d.ts +10 -13
  86. package/lib/sync.d.ts.map +1 -1
  87. package/lib/sync.js +94 -115
  88. package/lib/sync.js.map +1 -1
  89. package/lib/testing.d.ts +0 -48
  90. package/lib/testing.d.ts.map +1 -1
  91. package/lib/testing.js +0 -105
  92. package/lib/testing.js.map +1 -1
  93. package/lib/types.d.ts +0 -1
  94. package/lib/types.d.ts.map +1 -1
  95. package/lib/types.js.map +1 -1
  96. package/package.json +10 -11
  97. package/src/@types/event.ts +2 -36
  98. package/src/@types/global.d.ts +21 -4
  99. package/src/autodiscovery.ts +1 -1
  100. package/src/base64.ts +38 -40
  101. package/src/browser-index.ts +0 -11
  102. package/src/client.ts +68 -3087
  103. package/src/digest.ts +3 -3
  104. package/src/embedded.ts +38 -134
  105. package/src/event-mapper.ts +0 -4
  106. package/src/matrix.ts +0 -41
  107. package/src/models/MSC3089Branch.ts +0 -3
  108. package/src/models/event-timeline-set.ts +17 -38
  109. package/src/models/event-timeline.ts +10 -5
  110. package/src/models/event.ts +8 -295
  111. package/src/models/poll.ts +0 -6
  112. package/src/models/relations-container.ts +1 -8
  113. package/src/models/relations.ts +0 -8
  114. package/src/models/room-state.ts +4 -37
  115. package/src/models/room.ts +18 -68
  116. package/src/models/thread.ts +4 -3
  117. package/src/sliding-sync-sdk.ts +10 -83
  118. package/src/sliding-sync.ts +6 -6
  119. package/src/store/indexeddb.ts +1 -1
  120. package/src/sync-accumulator.ts +33 -16
  121. package/src/sync.ts +112 -143
  122. package/src/testing.ts +0 -108
  123. package/src/types.ts +0 -1
  124. package/CHANGELOG.md +0 -5910
  125. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  126. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  127. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  128. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  129. package/lib/@types/crypto.d.ts +0 -47
  130. package/lib/@types/crypto.d.ts.map +0 -1
  131. package/lib/@types/crypto.js +0 -1
  132. package/lib/@types/crypto.js.map +0 -1
  133. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  134. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  135. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  136. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  137. package/lib/common-crypto/CryptoBackend.js +0 -73
  138. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  139. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  140. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  141. package/lib/common-crypto/key-passphrase.js +0 -33
  142. package/lib/common-crypto/key-passphrase.js.map +0 -1
  143. package/lib/crypto/CrossSigning.d.ts +0 -184
  144. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  145. package/lib/crypto/CrossSigning.js +0 -718
  146. package/lib/crypto/CrossSigning.js.map +0 -1
  147. package/lib/crypto/DeviceList.d.ts +0 -216
  148. package/lib/crypto/DeviceList.d.ts.map +0 -1
  149. package/lib/crypto/DeviceList.js +0 -892
  150. package/lib/crypto/DeviceList.js.map +0 -1
  151. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  152. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  153. package/lib/crypto/EncryptionSetup.js +0 -356
  154. package/lib/crypto/EncryptionSetup.js.map +0 -1
  155. package/lib/crypto/OlmDevice.d.ts +0 -457
  156. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  157. package/lib/crypto/OlmDevice.js +0 -1241
  158. package/lib/crypto/OlmDevice.js.map +0 -1
  159. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  160. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  161. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  162. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  163. package/lib/crypto/RoomList.d.ts +0 -26
  164. package/lib/crypto/RoomList.d.ts.map +0 -1
  165. package/lib/crypto/RoomList.js +0 -71
  166. package/lib/crypto/RoomList.js.map +0 -1
  167. package/lib/crypto/SecretSharing.d.ts +0 -24
  168. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  169. package/lib/crypto/SecretSharing.js +0 -194
  170. package/lib/crypto/SecretSharing.js.map +0 -1
  171. package/lib/crypto/SecretStorage.d.ts +0 -55
  172. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  173. package/lib/crypto/SecretStorage.js +0 -118
  174. package/lib/crypto/SecretStorage.js.map +0 -1
  175. package/lib/crypto/aes.d.ts +0 -6
  176. package/lib/crypto/aes.d.ts.map +0 -1
  177. package/lib/crypto/aes.js +0 -24
  178. package/lib/crypto/aes.js.map +0 -1
  179. package/lib/crypto/algorithms/base.d.ts +0 -156
  180. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  181. package/lib/crypto/algorithms/base.js +0 -187
  182. package/lib/crypto/algorithms/base.js.map +0 -1
  183. package/lib/crypto/algorithms/index.d.ts +0 -4
  184. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  185. package/lib/crypto/algorithms/index.js +0 -20
  186. package/lib/crypto/algorithms/index.js.map +0 -1
  187. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  188. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  189. package/lib/crypto/algorithms/megolm.js +0 -1822
  190. package/lib/crypto/algorithms/megolm.js.map +0 -1
  191. package/lib/crypto/algorithms/olm.d.ts +0 -5
  192. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  193. package/lib/crypto/algorithms/olm.js +0 -299
  194. package/lib/crypto/algorithms/olm.js.map +0 -1
  195. package/lib/crypto/api.d.ts +0 -32
  196. package/lib/crypto/api.d.ts.map +0 -1
  197. package/lib/crypto/api.js +0 -22
  198. package/lib/crypto/api.js.map +0 -1
  199. package/lib/crypto/backup.d.ts +0 -227
  200. package/lib/crypto/backup.d.ts.map +0 -1
  201. package/lib/crypto/backup.js +0 -824
  202. package/lib/crypto/backup.js.map +0 -1
  203. package/lib/crypto/crypto.d.ts +0 -3
  204. package/lib/crypto/crypto.d.ts.map +0 -1
  205. package/lib/crypto/crypto.js +0 -19
  206. package/lib/crypto/crypto.js.map +0 -1
  207. package/lib/crypto/dehydration.d.ts +0 -34
  208. package/lib/crypto/dehydration.d.ts.map +0 -1
  209. package/lib/crypto/dehydration.js +0 -252
  210. package/lib/crypto/dehydration.js.map +0 -1
  211. package/lib/crypto/device-converter.d.ts +0 -9
  212. package/lib/crypto/device-converter.d.ts.map +0 -1
  213. package/lib/crypto/device-converter.js +0 -42
  214. package/lib/crypto/device-converter.js.map +0 -1
  215. package/lib/crypto/deviceinfo.d.ts +0 -99
  216. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  217. package/lib/crypto/deviceinfo.js +0 -148
  218. package/lib/crypto/deviceinfo.js.map +0 -1
  219. package/lib/crypto/index.d.ts +0 -1210
  220. package/lib/crypto/index.d.ts.map +0 -1
  221. package/lib/crypto/index.js +0 -4101
  222. package/lib/crypto/index.js.map +0 -1
  223. package/lib/crypto/key_passphrase.d.ts +0 -14
  224. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  225. package/lib/crypto/key_passphrase.js +0 -44
  226. package/lib/crypto/key_passphrase.js.map +0 -1
  227. package/lib/crypto/keybackup.d.ts +0 -18
  228. package/lib/crypto/keybackup.d.ts.map +0 -1
  229. package/lib/crypto/keybackup.js +0 -1
  230. package/lib/crypto/keybackup.js.map +0 -1
  231. package/lib/crypto/olmlib.d.ts +0 -129
  232. package/lib/crypto/olmlib.d.ts.map +0 -1
  233. package/lib/crypto/olmlib.js +0 -492
  234. package/lib/crypto/olmlib.js.map +0 -1
  235. package/lib/crypto/recoverykey.d.ts +0 -2
  236. package/lib/crypto/recoverykey.d.ts.map +0 -1
  237. package/lib/crypto/recoverykey.js +0 -19
  238. package/lib/crypto/recoverykey.js.map +0 -1
  239. package/lib/crypto/store/base.d.ts +0 -252
  240. package/lib/crypto/store/base.d.ts.map +0 -1
  241. package/lib/crypto/store/base.js +0 -64
  242. package/lib/crypto/store/base.js.map +0 -1
  243. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  244. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  245. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  246. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  247. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  248. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  249. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  250. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  251. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  252. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  253. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  254. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  255. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  256. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  257. package/lib/crypto/store/memory-crypto-store.js +0 -622
  258. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  259. package/lib/crypto/verification/Base.d.ts +0 -105
  260. package/lib/crypto/verification/Base.d.ts.map +0 -1
  261. package/lib/crypto/verification/Base.js +0 -372
  262. package/lib/crypto/verification/Base.js.map +0 -1
  263. package/lib/crypto/verification/Error.d.ts +0 -35
  264. package/lib/crypto/verification/Error.d.ts.map +0 -1
  265. package/lib/crypto/verification/Error.js +0 -86
  266. package/lib/crypto/verification/Error.js.map +0 -1
  267. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  268. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  269. package/lib/crypto/verification/IllegalMethod.js +0 -43
  270. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  271. package/lib/crypto/verification/QRCode.d.ts +0 -51
  272. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  273. package/lib/crypto/verification/QRCode.js +0 -277
  274. package/lib/crypto/verification/QRCode.js.map +0 -1
  275. package/lib/crypto/verification/SAS.d.ts +0 -27
  276. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  277. package/lib/crypto/verification/SAS.js +0 -485
  278. package/lib/crypto/verification/SAS.js.map +0 -1
  279. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  280. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  281. package/lib/crypto/verification/SASDecimal.js +0 -34
  282. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  283. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  284. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  285. package/lib/crypto/verification/request/Channel.js +0 -1
  286. package/lib/crypto/verification/request/Channel.js.map +0 -1
  287. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  288. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  289. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  290. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  291. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  292. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  293. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  294. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  295. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  296. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  297. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  298. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  299. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  300. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  301. package/lib/crypto-api/CryptoEvent.js +0 -33
  302. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  303. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  304. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  305. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  306. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  307. package/lib/crypto-api/index.d.ts +0 -978
  308. package/lib/crypto-api/index.d.ts.map +0 -1
  309. package/lib/crypto-api/index.js +0 -304
  310. package/lib/crypto-api/index.js.map +0 -1
  311. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  312. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  313. package/lib/crypto-api/key-passphrase.js +0 -51
  314. package/lib/crypto-api/key-passphrase.js.map +0 -1
  315. package/lib/crypto-api/keybackup.d.ts +0 -88
  316. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  317. package/lib/crypto-api/keybackup.js +0 -1
  318. package/lib/crypto-api/keybackup.js.map +0 -1
  319. package/lib/crypto-api/recovery-key.d.ts +0 -11
  320. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  321. package/lib/crypto-api/recovery-key.js +0 -65
  322. package/lib/crypto-api/recovery-key.js.map +0 -1
  323. package/lib/crypto-api/verification.d.ts +0 -344
  324. package/lib/crypto-api/verification.d.ts.map +0 -1
  325. package/lib/crypto-api/verification.js +0 -91
  326. package/lib/crypto-api/verification.js.map +0 -1
  327. package/lib/matrixrtc/CallMembership.d.ts +0 -66
  328. package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
  329. package/lib/matrixrtc/CallMembership.js +0 -197
  330. package/lib/matrixrtc/CallMembership.js.map +0 -1
  331. package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
  332. package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
  333. package/lib/matrixrtc/LivekitFocus.js +0 -20
  334. package/lib/matrixrtc/LivekitFocus.js.map +0 -1
  335. package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
  336. package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
  337. package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
  338. package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
  339. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
  340. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
  341. package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
  342. package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
  343. package/lib/matrixrtc/focus.d.ts +0 -10
  344. package/lib/matrixrtc/focus.d.ts.map +0 -1
  345. package/lib/matrixrtc/focus.js +0 -1
  346. package/lib/matrixrtc/focus.js.map +0 -1
  347. package/lib/matrixrtc/index.d.ts +0 -7
  348. package/lib/matrixrtc/index.d.ts.map +0 -1
  349. package/lib/matrixrtc/index.js +0 -21
  350. package/lib/matrixrtc/index.js.map +0 -1
  351. package/lib/matrixrtc/types.d.ts +0 -19
  352. package/lib/matrixrtc/types.d.ts.map +0 -1
  353. package/lib/matrixrtc/types.js +0 -1
  354. package/lib/matrixrtc/types.js.map +0 -1
  355. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  356. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  357. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  358. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  359. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  360. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  361. package/lib/rendezvous/RendezvousChannel.js +0 -1
  362. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  363. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  364. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  365. package/lib/rendezvous/RendezvousCode.js +0 -1
  366. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  367. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  368. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  369. package/lib/rendezvous/RendezvousError.js +0 -23
  370. package/lib/rendezvous/RendezvousError.js.map +0 -1
  371. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  372. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  373. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  374. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  375. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  376. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  377. package/lib/rendezvous/RendezvousIntent.js +0 -22
  378. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  379. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  380. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  381. package/lib/rendezvous/RendezvousTransport.js +0 -1
  382. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  383. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  384. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  385. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  386. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  387. package/lib/rendezvous/channels/index.d.ts +0 -2
  388. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  389. package/lib/rendezvous/channels/index.js +0 -18
  390. package/lib/rendezvous/channels/index.js.map +0 -1
  391. package/lib/rendezvous/index.d.ts +0 -10
  392. package/lib/rendezvous/index.d.ts.map +0 -1
  393. package/lib/rendezvous/index.js +0 -23
  394. package/lib/rendezvous/index.js.map +0 -1
  395. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  396. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  397. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  398. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  399. package/lib/rendezvous/transports/index.d.ts +0 -2
  400. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  401. package/lib/rendezvous/transports/index.js +0 -18
  402. package/lib/rendezvous/transports/index.js.map +0 -1
  403. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  404. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  405. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  406. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  407. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  408. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  409. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  410. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  411. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  412. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  413. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  414. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  415. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  416. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  417. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  418. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  419. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  420. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  421. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  422. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  423. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  424. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  425. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  426. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  427. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  428. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  429. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  430. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  431. package/lib/rust-crypto/backup.d.ts +0 -254
  432. package/lib/rust-crypto/backup.d.ts.map +0 -1
  433. package/lib/rust-crypto/backup.js +0 -837
  434. package/lib/rust-crypto/backup.js.map +0 -1
  435. package/lib/rust-crypto/constants.d.ts +0 -3
  436. package/lib/rust-crypto/constants.d.ts.map +0 -1
  437. package/lib/rust-crypto/constants.js +0 -19
  438. package/lib/rust-crypto/constants.js.map +0 -1
  439. package/lib/rust-crypto/device-converter.d.ts +0 -28
  440. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  441. package/lib/rust-crypto/device-converter.js +0 -123
  442. package/lib/rust-crypto/device-converter.js.map +0 -1
  443. package/lib/rust-crypto/index.d.ts +0 -61
  444. package/lib/rust-crypto/index.d.ts.map +0 -1
  445. package/lib/rust-crypto/index.js +0 -152
  446. package/lib/rust-crypto/index.js.map +0 -1
  447. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  448. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  449. package/lib/rust-crypto/libolm_migration.js +0 -459
  450. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  451. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  452. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  453. package/lib/rust-crypto/rust-crypto.js +0 -2016
  454. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  455. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  456. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  457. package/lib/rust-crypto/secret-storage.js +0 -63
  458. package/lib/rust-crypto/secret-storage.js.map +0 -1
  459. package/lib/rust-crypto/verification.d.ts +0 -319
  460. package/lib/rust-crypto/verification.d.ts.map +0 -1
  461. package/lib/rust-crypto/verification.js +0 -816
  462. package/lib/rust-crypto/verification.js.map +0 -1
  463. package/lib/secret-storage.d.ts +0 -370
  464. package/lib/secret-storage.d.ts.map +0 -1
  465. package/lib/secret-storage.js +0 -466
  466. package/lib/secret-storage.js.map +0 -1
  467. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  468. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  469. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  470. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  471. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  472. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  473. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  474. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  475. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  476. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  477. package/lib/utils/internal/deriveKeys.js +0 -60
  478. package/lib/utils/internal/deriveKeys.js.map +0 -1
  479. package/lib/webrtc/audioContext.d.ts +0 -15
  480. package/lib/webrtc/audioContext.d.ts.map +0 -1
  481. package/lib/webrtc/audioContext.js +0 -46
  482. package/lib/webrtc/audioContext.js.map +0 -1
  483. package/lib/webrtc/call.d.ts +0 -560
  484. package/lib/webrtc/call.d.ts.map +0 -1
  485. package/lib/webrtc/call.js +0 -2541
  486. package/lib/webrtc/call.js.map +0 -1
  487. package/lib/webrtc/callEventHandler.d.ts +0 -37
  488. package/lib/webrtc/callEventHandler.d.ts.map +0 -1
  489. package/lib/webrtc/callEventHandler.js +0 -344
  490. package/lib/webrtc/callEventHandler.js.map +0 -1
  491. package/lib/webrtc/callEventTypes.d.ts +0 -73
  492. package/lib/webrtc/callEventTypes.d.ts.map +0 -1
  493. package/lib/webrtc/callEventTypes.js +0 -13
  494. package/lib/webrtc/callEventTypes.js.map +0 -1
  495. package/lib/webrtc/callFeed.d.ts +0 -128
  496. package/lib/webrtc/callFeed.d.ts.map +0 -1
  497. package/lib/webrtc/callFeed.js +0 -289
  498. package/lib/webrtc/callFeed.js.map +0 -1
  499. package/lib/webrtc/groupCall.d.ts +0 -323
  500. package/lib/webrtc/groupCall.d.ts.map +0 -1
  501. package/lib/webrtc/groupCall.js +0 -1337
  502. package/lib/webrtc/groupCall.js.map +0 -1
  503. package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
  504. package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
  505. package/lib/webrtc/groupCallEventHandler.js +0 -178
  506. package/lib/webrtc/groupCallEventHandler.js.map +0 -1
  507. package/lib/webrtc/mediaHandler.d.ts +0 -89
  508. package/lib/webrtc/mediaHandler.d.ts.map +0 -1
  509. package/lib/webrtc/mediaHandler.js +0 -437
  510. package/lib/webrtc/mediaHandler.js.map +0 -1
  511. package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
  512. package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
  513. package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
  514. package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
  515. package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
  516. package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
  517. package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
  518. package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
  519. package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
  520. package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
  521. package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
  522. package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
  523. package/lib/webrtc/stats/connectionStats.d.ts +0 -28
  524. package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
  525. package/lib/webrtc/stats/connectionStats.js +0 -26
  526. package/lib/webrtc/stats/connectionStats.js.map +0 -1
  527. package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
  528. package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
  529. package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
  530. package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
  531. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
  532. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
  533. package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
  534. package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
  535. package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
  536. package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
  537. package/lib/webrtc/stats/groupCallStats.js +0 -78
  538. package/lib/webrtc/stats/groupCallStats.js.map +0 -1
  539. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
  540. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
  541. package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
  542. package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
  543. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
  544. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
  545. package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
  546. package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
  547. package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
  548. package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
  549. package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
  550. package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
  551. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
  552. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
  553. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
  554. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
  555. package/lib/webrtc/stats/statsReport.d.ts +0 -99
  556. package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
  557. package/lib/webrtc/stats/statsReport.js +0 -32
  558. package/lib/webrtc/stats/statsReport.js.map +0 -1
  559. package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
  560. package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
  561. package/lib/webrtc/stats/statsReportEmitter.js +0 -33
  562. package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
  563. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
  564. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
  565. package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
  566. package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
  567. package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
  568. package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
  569. package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
  570. package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
  571. package/lib/webrtc/stats/transportStats.d.ts +0 -11
  572. package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
  573. package/lib/webrtc/stats/transportStats.js +0 -1
  574. package/lib/webrtc/stats/transportStats.js.map +0 -1
  575. package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
  576. package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
  577. package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
  578. package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
  579. package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
  580. package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
  581. package/lib/webrtc/stats/valueFormatter.js +0 -25
  582. package/lib/webrtc/stats/valueFormatter.js.map +0 -1
  583. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  584. package/src/@types/crypto.ts +0 -73
  585. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  586. package/src/common-crypto/CryptoBackend.ts +0 -302
  587. package/src/common-crypto/README.md +0 -4
  588. package/src/common-crypto/key-passphrase.ts +0 -43
  589. package/src/crypto/CrossSigning.ts +0 -773
  590. package/src/crypto/DeviceList.ts +0 -989
  591. package/src/crypto/EncryptionSetup.ts +0 -351
  592. package/src/crypto/OlmDevice.ts +0 -1500
  593. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  594. package/src/crypto/RoomList.ts +0 -70
  595. package/src/crypto/SecretSharing.ts +0 -240
  596. package/src/crypto/SecretStorage.ts +0 -136
  597. package/src/crypto/aes.ts +0 -23
  598. package/src/crypto/algorithms/base.ts +0 -236
  599. package/src/crypto/algorithms/index.ts +0 -20
  600. package/src/crypto/algorithms/megolm.ts +0 -2216
  601. package/src/crypto/algorithms/olm.ts +0 -381
  602. package/src/crypto/api.ts +0 -70
  603. package/src/crypto/backup.ts +0 -922
  604. package/src/crypto/crypto.ts +0 -18
  605. package/src/crypto/dehydration.ts +0 -272
  606. package/src/crypto/device-converter.ts +0 -45
  607. package/src/crypto/deviceinfo.ts +0 -158
  608. package/src/crypto/index.ts +0 -4418
  609. package/src/crypto/key_passphrase.ts +0 -42
  610. package/src/crypto/keybackup.ts +0 -47
  611. package/src/crypto/olmlib.ts +0 -539
  612. package/src/crypto/recoverykey.ts +0 -18
  613. package/src/crypto/store/base.ts +0 -348
  614. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  615. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  616. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  617. package/src/crypto/store/memory-crypto-store.ts +0 -680
  618. package/src/crypto/verification/Base.ts +0 -409
  619. package/src/crypto/verification/Error.ts +0 -76
  620. package/src/crypto/verification/IllegalMethod.ts +0 -50
  621. package/src/crypto/verification/QRCode.ts +0 -310
  622. package/src/crypto/verification/SAS.ts +0 -494
  623. package/src/crypto/verification/SASDecimal.ts +0 -37
  624. package/src/crypto/verification/request/Channel.ts +0 -34
  625. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  626. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  627. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  628. package/src/crypto-api/CryptoEvent.ts +0 -93
  629. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  630. package/src/crypto-api/index.ts +0 -1175
  631. package/src/crypto-api/key-passphrase.ts +0 -58
  632. package/src/crypto-api/keybackup.ts +0 -115
  633. package/src/crypto-api/recovery-key.ts +0 -69
  634. package/src/crypto-api/verification.ts +0 -408
  635. package/src/matrixrtc/CallMembership.ts +0 -247
  636. package/src/matrixrtc/LivekitFocus.ts +0 -39
  637. package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
  638. package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
  639. package/src/matrixrtc/focus.ts +0 -25
  640. package/src/matrixrtc/index.ts +0 -22
  641. package/src/matrixrtc/types.ts +0 -36
  642. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  643. package/src/rendezvous/RendezvousChannel.ts +0 -48
  644. package/src/rendezvous/RendezvousCode.ts +0 -25
  645. package/src/rendezvous/RendezvousError.ts +0 -26
  646. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  647. package/src/rendezvous/RendezvousIntent.ts +0 -20
  648. package/src/rendezvous/RendezvousTransport.ts +0 -58
  649. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  650. package/src/rendezvous/channels/index.ts +0 -17
  651. package/src/rendezvous/index.ts +0 -25
  652. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  653. package/src/rendezvous/transports/index.ts +0 -17
  654. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  655. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  656. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  657. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  658. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  659. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  660. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  661. package/src/rust-crypto/backup.ts +0 -881
  662. package/src/rust-crypto/constants.ts +0 -18
  663. package/src/rust-crypto/device-converter.ts +0 -128
  664. package/src/rust-crypto/index.ts +0 -237
  665. package/src/rust-crypto/libolm_migration.ts +0 -530
  666. package/src/rust-crypto/rust-crypto.ts +0 -2205
  667. package/src/rust-crypto/secret-storage.ts +0 -60
  668. package/src/rust-crypto/verification.ts +0 -830
  669. package/src/secret-storage.ts +0 -693
  670. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  671. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  672. package/src/utils/internal/deriveKeys.ts +0 -63
  673. package/src/webrtc/audioContext.ts +0 -44
  674. package/src/webrtc/call.ts +0 -3074
  675. package/src/webrtc/callEventHandler.ts +0 -425
  676. package/src/webrtc/callEventTypes.ts +0 -93
  677. package/src/webrtc/callFeed.ts +0 -364
  678. package/src/webrtc/groupCall.ts +0 -1735
  679. package/src/webrtc/groupCallEventHandler.ts +0 -234
  680. package/src/webrtc/mediaHandler.ts +0 -484
  681. package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
  682. package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
  683. package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
  684. package/src/webrtc/stats/connectionStats.ts +0 -47
  685. package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
  686. package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
  687. package/src/webrtc/stats/groupCallStats.ts +0 -93
  688. package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
  689. package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
  690. package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
  691. package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
  692. package/src/webrtc/stats/statsReport.ts +0 -133
  693. package/src/webrtc/stats/statsReportEmitter.ts +0 -49
  694. package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
  695. package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
  696. package/src/webrtc/stats/transportStats.ts +0 -26
  697. package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
  698. package/src/webrtc/stats/valueFormatter.ts +0 -27
package/lib/client.js CHANGED
@@ -27,40 +27,29 @@ limitations under the License.
27
27
  import { SyncApi, SyncState } from "./sync.js";
28
28
  import { EventStatus, MatrixEvent, MatrixEventEvent } from "./models/event.js";
29
29
  import { StubStore } from "./store/stub.js";
30
- import { createNewMatrixCall, supportsMatrixCall } from "./webrtc/call.js";
31
30
  import { Filter } from "./filter.js";
32
- import { CallEventHandler } from "./webrtc/callEventHandler.js";
33
- import { GroupCallEventHandler } from "./webrtc/groupCallEventHandler.js";
34
31
  import * as utils from "./utils.js";
35
- import { noUnsafeEventProps, replaceParam, safeSet, sleep } from "./utils.js";
32
+ import { noUnsafeEventProps, replaceParam, sleep } from "./utils.js";
36
33
  import { Direction, EventTimeline } from "./models/event-timeline.js";
37
34
  import { PushProcessor } from "./pushprocessor.js";
38
35
  import { AutoDiscovery } from "./autodiscovery.js";
39
- import * as olmlib from "./crypto/olmlib.js";
40
- import { decodeBase64, encodeBase64, encodeUnpaddedBase64Url } from "./base64.js";
36
+ import { encodeUnpaddedBase64Url } from "./base64.js";
41
37
  import { TypedReEmitter } from "./ReEmitter.js";
42
38
  import { logger } from "./logger.js";
43
39
  import { SERVICE_TYPES } from "./service-types.js";
44
40
  import { ClientPrefix, IdentityPrefix, MatrixError, MatrixHttpApi, MediaPrefix, Method, retryNetworkOperation } from "./http-api/index.js";
45
- import { Crypto, CryptoEvent as LegacyCryptoEvent, fixBackupKey, isCryptoAvailable } from "./crypto/index.js";
46
41
  import { User, UserEvent } from "./models/user.js";
47
42
  import { getHttpUriForMxc } from "./content-repo.js";
48
43
  import { SearchResult } from "./models/search-result.js";
49
- import { DEHYDRATION_ALGORITHM } from "./crypto/dehydration.js";
50
- import { CrossSigningKey } from "./crypto/api.js";
51
44
  import * as ContentHelpers from "./content-helpers.js";
52
45
  import { NotificationCountType } from "./models/room.js";
53
- import { RoomMemberEvent } from "./models/room-member.js";
54
46
  import { EventType, LOCAL_NOTIFICATION_SETTINGS_PREFIX, MSC3912_RELATION_BASED_REDACTIONS_PROP, MsgType, PUSHER_ENABLED, RelationType, RoomCreateTypeField, RoomType, UNSTABLE_MSC3088_ENABLED, UNSTABLE_MSC3088_PURPOSE, UNSTABLE_MSC3089_TREE_SUBTYPE } from "./@types/event.js";
55
47
  import { GuestAccess, HistoryVisibility, Preset } from "./@types/partials.js";
56
48
  import { eventMapperFor } from "./event-mapper.js";
57
49
  import { randomString } from "./randomstring.js";
58
- import { BackupManager } from "./crypto/backup.js";
59
50
  import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace.js";
60
51
  import { SearchOrderBy } from "./@types/search.js";
61
52
  import { PushRuleActionName, PushRuleKind } from "./@types/PushRules.js";
62
- import { GroupCall } from "./webrtc/groupCall.js";
63
- import { MediaHandler } from "./webrtc/mediaHandler.js";
64
53
  import { TypedEventEmitter } from "./models/typed-event-emitter.js";
65
54
  import { MAIN_ROOM_TIMELINE, ReceiptType } from "./@types/read_receipts.js";
66
55
  import { SlidingSyncSdk } from "./sliding-sync-sdk.js";
@@ -70,19 +59,11 @@ import { NamespacedValue, UnstableValue } from "./NamespacedValue.js";
70
59
  import { ToDeviceMessageQueue } from "./ToDeviceMessageQueue.js";
71
60
  import { IgnoredInvites } from "./models/invites-ignorer.js";
72
61
  import { buildFeatureSupportMap, Feature, ServerSupport } from "./feature.js";
73
- import { RUST_SDK_STORE_PREFIX } from "./rust-crypto/constants.js";
74
- import { decodeRecoveryKey, CryptoEvent } from "./crypto-api/index.js";
75
- import { ServerSideSecretStorageImpl } from "./secret-storage.js";
76
- import { MatrixRTCSessionManager } from "./matrixrtc/MatrixRTCSessionManager.js";
77
62
  import { getRelationsThreadFilter } from "./thread-utils.js";
78
63
  import { KnownMembership } from "./@types/membership.js";
79
64
  import { ServerCapabilities } from "./serverCapabilities.js";
80
65
  import { sha256 } from "./digest.js";
81
- import { keyFromAuthData } from "./common-crypto/key-passphrase.js";
82
66
  var SCROLLBACK_DELAY_MS = 3000;
83
- export var CRYPTO_ENABLED = isCryptoAvailable();
84
- var TURN_CHECK_INTERVAL = 10 * 60 * 1000; // poll for turn credentials every 10 minutes
85
-
86
67
  export var UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue("last_seen_user_agent", "org.matrix.msc3852.last_seen_user_agent");
87
68
  export var PendingEventOrdering = /*#__PURE__*/function (PendingEventOrdering) {
88
69
  PendingEventOrdering["Chronological"] = "chronological";
@@ -95,16 +76,14 @@ export var UNSTABLE_MSC2666_MUTUAL_ROOMS = "uk.half-shot.msc2666.mutual_rooms";
95
76
  export var UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS = "uk.half-shot.msc2666.query_mutual_rooms";
96
77
  export var UNSTABLE_MSC4140_DELAYED_EVENTS = "org.matrix.msc4140";
97
78
  export var UNSTABLE_MSC4133_EXTENDED_PROFILES = "uk.tcpip.msc4133";
98
- var CrossSigningKeyType = /*#__PURE__*/function (CrossSigningKeyType) {
99
- CrossSigningKeyType["MasterKey"] = "master_key";
100
- CrossSigningKeyType["SelfSigningKey"] = "self_signing_key";
101
- CrossSigningKeyType["UserSigningKey"] = "user_signing_key";
102
- return CrossSigningKeyType;
103
- }(CrossSigningKeyType || {}); // Re-export for backwards compatibility
79
+
80
+ // Re-export for backwards compatibility
81
+
104
82
  /**
105
83
  * The summary of a room as defined by an initial version of MSC3266 and implemented in Synapse
106
84
  * Proposed at https://github.com/matrix-org/matrix-doc/pull/3266
107
85
  */
86
+
108
87
  /* eslint-enable camelcase */
109
88
 
110
89
  // We're using this constant for methods overloading and inspect whether a variable
@@ -136,7 +115,7 @@ var SSO_ACTION_PARAM = new UnstableValue("action", "org.matrix.msc3824.action");
136
115
  */
137
116
  export class MatrixClient extends TypedEventEmitter {
138
117
  constructor(opts) {
139
- var _opts$logger, _opts$usingExternalCr, _this, _opts$cryptoCallbacks;
118
+ var _opts$logger, _opts$usingExternalCr, _this;
140
119
  // If a custom logger is provided, use it. Otherwise, default to the global
141
120
  // one in logger.ts.
142
121
  super();
@@ -149,16 +128,6 @@ export class MatrixClient extends TypedEventEmitter {
149
128
  _defineProperty(this, "_store", void 0);
150
129
  _defineProperty(this, "deviceId", void 0);
151
130
  _defineProperty(this, "credentials", void 0);
152
- /**
153
- * Encryption key used for encrypting sensitive data (such as e2ee keys) in storage.
154
- *
155
- * As supplied in the constructor via {@link IMatrixClientCreateOpts#pickleKey}.
156
- *
157
- * If unset, either a hardcoded key or no encryption at all is used, depending on the Crypto implementation.
158
- *
159
- * @deprecated this should be a private property.
160
- */
161
- _defineProperty(this, "pickleKey", void 0);
162
131
  _defineProperty(this, "scheduler", void 0);
163
132
  _defineProperty(this, "clientRunning", false);
164
133
  _defineProperty(this, "timelineSupport", false);
@@ -166,25 +135,6 @@ export class MatrixClient extends TypedEventEmitter {
166
135
  _defineProperty(this, "identityServer", void 0);
167
136
  _defineProperty(this, "http", void 0);
168
137
  // XXX: Intended private, used in code.
169
- /**
170
- * The libolm crypto implementation, if it is in use.
171
- *
172
- * @deprecated This should not be used. Instead, use the methods exposed directly on this class or
173
- * (where they are available) via {@link getCrypto}.
174
- */
175
- _defineProperty(this, "crypto", void 0);
176
- // XXX: Intended private, used in code. Being replaced by cryptoBackend
177
- _defineProperty(this, "cryptoBackend", void 0);
178
- // one of crypto or rustCrypto
179
- _defineProperty(this, "cryptoCallbacks", void 0);
180
- // XXX: Intended private, used in code.
181
- _defineProperty(this, "callEventHandler", void 0);
182
- // XXX: Intended private, used in code.
183
- _defineProperty(this, "groupCallEventHandler", void 0);
184
- _defineProperty(this, "supportsCallTransfer", false);
185
- // XXX: Intended private, used in code.
186
- _defineProperty(this, "forceTURN", false);
187
- // XXX: Intended private, used in code.
188
138
  _defineProperty(this, "iceCandidatePoolSize", 0);
189
139
  // XXX: Intended private, used in code.
190
140
  _defineProperty(this, "idBaseUrl", void 0);
@@ -193,13 +143,11 @@ export class MatrixClient extends TypedEventEmitter {
193
143
  _defineProperty(this, "useLivekitForGroupCalls", void 0);
194
144
  // Note: these are all `protected` to let downstream consumers make mistakes if they want to.
195
145
  // We don't technically support this usage, but have reasons to do this.
196
- _defineProperty(this, "canSupportVoip", false);
197
146
  _defineProperty(this, "peekSync", null);
198
147
  _defineProperty(this, "isGuestAccount", false);
199
148
  _defineProperty(this, "ongoingScrollbacks", {});
200
149
  _defineProperty(this, "notifTimelineSet", null);
201
150
  /* @deprecated */
202
- _defineProperty(this, "cryptoStore", void 0);
203
151
  _defineProperty(this, "verificationMethods", void 0);
204
152
  _defineProperty(this, "fallbackICEServerAllowed", false);
205
153
  _defineProperty(this, "syncApi", void 0);
@@ -218,12 +166,7 @@ export class MatrixClient extends TypedEventEmitter {
218
166
  _defineProperty(this, "serverVersionsPromise", void 0);
219
167
  _defineProperty(this, "clientWellKnown", void 0);
220
168
  _defineProperty(this, "clientWellKnownPromise", void 0);
221
- _defineProperty(this, "turnServers", []);
222
- _defineProperty(this, "turnServersExpiry", 0);
223
- _defineProperty(this, "checkTurnServersIntervalID", void 0);
224
- _defineProperty(this, "exportedOlmDeviceToImport", void 0);
225
169
  _defineProperty(this, "txnCtr", 0);
226
- _defineProperty(this, "mediaHandler", new MediaHandler(this));
227
170
  _defineProperty(this, "sessionId", void 0);
228
171
  /** IDs of events which are currently being encrypted.
229
172
  *
@@ -231,29 +174,11 @@ export class MatrixClient extends TypedEventEmitter {
231
174
  * that tells us that it has been cancelled, and we should not send it.
232
175
  */
233
176
  _defineProperty(this, "eventsBeingEncrypted", new Set());
234
- _defineProperty(this, "useE2eForGroupCall", true);
235
177
  _defineProperty(this, "toDeviceMessageQueue", void 0);
236
178
  _defineProperty(this, "livekitServiceURL", void 0);
237
- _defineProperty(this, "_secretStorage", void 0);
238
179
  // A manager for determining which invites should be ignored.
239
180
  _defineProperty(this, "ignoredInvites", void 0);
240
- _defineProperty(this, "matrixRTC", void 0);
241
181
  _defineProperty(this, "serverCapabilitiesService", void 0);
242
- _defineProperty(this, "startCallEventHandler", () => {
243
- if (this.isInitialSyncComplete()) {
244
- if (supportsMatrixCall()) {
245
- this.callEventHandler.start();
246
- this.groupCallEventHandler.start();
247
- }
248
- this.off(ClientEvent.Sync, this.startCallEventHandler);
249
- }
250
- });
251
- _defineProperty(this, "startMatrixRTC", () => {
252
- if (this.isInitialSyncComplete()) {
253
- this.matrixRTC.start();
254
- this.off(ClientEvent.Sync, this.startMatrixRTC);
255
- }
256
- });
257
182
  /**
258
183
  * Once the client has been initialised, we want to clear notifications we
259
184
  * know for a fact should be here.
@@ -315,11 +240,7 @@ export class MatrixClient extends TypedEventEmitter {
315
240
  } else {
316
241
  this.deviceId = opts.deviceToImport.deviceId;
317
242
  this.credentials.userId = opts.deviceToImport.userId;
318
- // will be used during async initialization of the crypto
319
- this.exportedOlmDeviceToImport = opts.deviceToImport.olmDevice;
320
243
  }
321
- } else if (opts.pickleKey) {
322
- this.pickleKey = opts.pickleKey;
323
244
  }
324
245
  this.useLivekitForGroupCalls = Boolean(opts.useLivekitForGroupCalls);
325
246
  this.scheduler = opts.scheduler;
@@ -343,44 +264,17 @@ export class MatrixClient extends TypedEventEmitter {
343
264
  };
344
265
  }());
345
266
  }
346
- if (supportsMatrixCall()) {
347
- this.callEventHandler = new CallEventHandler(this);
348
- this.groupCallEventHandler = new GroupCallEventHandler(this);
349
- this.canSupportVoip = true;
350
- // Start listening for calls after the initial sync is done
351
- // We do not need to backfill the call event buffer
352
- // with encrypted events that might never get decrypted
353
- this.on(ClientEvent.Sync, this.startCallEventHandler);
354
- }
355
-
356
- // NB. We initialise MatrixRTC whether we have call support or not: this is just
357
- // the underlying session management and doesn't use any actual media capabilities
358
- this.matrixRTC = new MatrixRTCSessionManager(this);
359
267
  this.serverCapabilitiesService = new ServerCapabilities(this.http);
360
268
  this.on(ClientEvent.Sync, this.fixupRoomNotifications);
361
269
  this.timelineSupport = Boolean(opts.timelineSupport);
362
- this.cryptoStore = opts.cryptoStore;
363
270
  this.verificationMethods = opts.verificationMethods;
364
- this.cryptoCallbacks = opts.cryptoCallbacks || {};
365
- this.forceTURN = opts.forceTURN || false;
366
271
  this.iceCandidatePoolSize = opts.iceCandidatePoolSize === undefined ? 0 : opts.iceCandidatePoolSize;
367
- this.supportsCallTransfer = opts.supportsCallTransfer || false;
368
272
  this.fallbackICEServerAllowed = opts.fallbackICEServerAllowed || false;
369
273
  this.isVoipWithNoMediaAllowed = opts.isVoipWithNoMediaAllowed || false;
370
- if (opts.useE2eForGroupCall !== undefined) this.useE2eForGroupCall = opts.useE2eForGroupCall;
371
274
  this.livekitServiceURL = opts.livekitServiceURL;
372
275
  this.roomNameGenerator = opts.roomNameGenerator;
373
276
  this.toDeviceMessageQueue = new ToDeviceMessageQueue(this);
374
-
375
- // The SDK doesn't really provide a clean way for events to recalculate the push
376
- // actions for themselves, so we have to kinda help them out when they are encrypted.
377
- // We do this so that push rules are correctly executed on events in their decrypted
378
- // state, such as highlights when the user's name is mentioned.
379
- this.on(MatrixEventEvent.Decrypted, event => {
380
- fixNotificationCountOnDecryption(this, event);
381
- });
382
277
  this.ignoredInvites = new IgnoredInvites(this);
383
- this._secretStorage = new ServerSideSecretStorageImpl(this, (_opts$cryptoCallbacks = opts.cryptoCallbacks) !== null && _opts$cryptoCallbacks !== void 0 ? _opts$cryptoCallbacks : {});
384
278
 
385
279
  // having lots of event listeners is not unusual. 0 means "unlimited".
386
280
  this.setMaxListeners(0);
@@ -408,7 +302,6 @@ export class MatrixClient extends TypedEventEmitter {
408
302
  return;
409
303
  }
410
304
  _this2.clientRunning = true;
411
- _this2.on(ClientEvent.Sync, _this2.startMatrixRTC);
412
305
 
413
306
  // Create our own user object artificially (instead of waiting for sync)
414
307
  // so it's always available, even if the user is not in any rooms etc.
@@ -416,15 +309,6 @@ export class MatrixClient extends TypedEventEmitter {
416
309
  if (userId) {
417
310
  _this2.store.storeUser(new User(userId));
418
311
  }
419
-
420
- // periodically poll for turn servers if we support voip
421
- if (_this2.canSupportVoip) {
422
- _this2.checkTurnServersIntervalID = setInterval(() => {
423
- _this2.checkTurnServers();
424
- }, TURN_CHECK_INTERVAL);
425
- // noinspection ES6MissingAwait
426
- _this2.checkTurnServers();
427
- }
428
312
  if (_this2.syncApi) {
429
313
  // This shouldn't happen since we thought the client was not running
430
314
  _this2.logger.error("Still have sync object whilst not running: stopping old one");
@@ -448,7 +332,7 @@ export class MatrixClient extends TypedEventEmitter {
448
332
  }
449
333
  _this2.clientOpts = opts !== null && opts !== void 0 ? opts : {};
450
334
  if (_this2.clientOpts.slidingSync) {
451
- _this2.syncApi = new SlidingSyncSdk(_this2.clientOpts.slidingSync, _this2, _this2.clientOpts, _this2.buildSyncApiOptions());
335
+ _this2.syncApi = new SlidingSyncSdk(_this2.clientOpts.slidingSync, _this2, _this2.clientOpts);
452
336
  } else {
453
337
  _this2.syncApi = new SyncApi(_this2, _this2.clientOpts, _this2.buildSyncApiOptions());
454
338
  }
@@ -469,8 +353,6 @@ export class MatrixClient extends TypedEventEmitter {
469
353
  */
470
354
  buildSyncApiOptions() {
471
355
  return {
472
- crypto: this.crypto,
473
- cryptoCallbacks: this.cryptoBackend,
474
356
  canResetEntireTimeline: roomId => {
475
357
  if (!this.canResetTimelineCallback) {
476
358
  return false;
@@ -485,10 +367,7 @@ export class MatrixClient extends TypedEventEmitter {
485
367
  * clean shutdown.
486
368
  */
487
369
  stopClient() {
488
- var _this$cryptoBackend, _this$syncApi, _this$peekSync, _this$callEventHandle, _this$groupCallEventH;
489
- (_this$cryptoBackend = this.cryptoBackend) === null || _this$cryptoBackend === void 0 || _this$cryptoBackend.stop(); // crypto might have been initialised even if the client wasn't fully started
490
-
491
- this.off(ClientEvent.Sync, this.startMatrixRTC);
370
+ var _this$syncApi, _this$peekSync;
492
371
  if (!this.clientRunning) return; // already stopped
493
372
 
494
373
  this.logger.debug("stopping MatrixClient");
@@ -496,233 +375,24 @@ export class MatrixClient extends TypedEventEmitter {
496
375
  (_this$syncApi = this.syncApi) === null || _this$syncApi === void 0 || _this$syncApi.stop();
497
376
  this.syncApi = undefined;
498
377
  (_this$peekSync = this.peekSync) === null || _this$peekSync === void 0 || _this$peekSync.stopPeeking();
499
- (_this$callEventHandle = this.callEventHandler) === null || _this$callEventHandle === void 0 || _this$callEventHandle.stop();
500
- (_this$groupCallEventH = this.groupCallEventHandler) === null || _this$groupCallEventH === void 0 || _this$groupCallEventH.stop();
501
- this.callEventHandler = undefined;
502
- this.groupCallEventHandler = undefined;
503
- globalThis.clearInterval(this.checkTurnServersIntervalID);
504
- this.checkTurnServersIntervalID = undefined;
505
378
  if (this.clientWellKnownIntervalID !== undefined) {
506
379
  globalThis.clearInterval(this.clientWellKnownIntervalID);
507
380
  }
508
381
  this.toDeviceMessageQueue.stop();
509
- this.matrixRTC.stop();
510
382
  this.serverCapabilitiesService.stop();
511
383
  }
512
384
 
513
- /**
514
- * Try to rehydrate a device if available. The client must have been
515
- * initialized with a `cryptoCallback.getDehydrationKey` option, and this
516
- * function must be called before initCrypto and startClient are called.
517
- *
518
- * @returns Promise which resolves to undefined if a device could not be dehydrated, or
519
- * to the new device ID if the dehydration was successful.
520
- * @returns Rejects: with an error response.
521
- *
522
- * @deprecated MSC2697 device dehydration is not supported for rust cryptography.
523
- */
524
- rehydrateDevice() {
525
- var _this3 = this;
526
- return _asyncToGenerator(function* () {
527
- if (_this3.crypto) {
528
- throw new Error("Cannot rehydrate device after crypto is initialized");
529
- }
530
- if (!_this3.cryptoCallbacks.getDehydrationKey) {
531
- return;
532
- }
533
- var getDeviceResult = yield _this3.getDehydratedDevice();
534
- if (!getDeviceResult) {
535
- return;
536
- }
537
- if (!getDeviceResult.device_data || !getDeviceResult.device_id) {
538
- _this3.logger.info("no dehydrated device found");
539
- return;
540
- }
541
- var account = new globalThis.Olm.Account();
542
- try {
543
- var deviceData = getDeviceResult.device_data;
544
- if (deviceData.algorithm !== DEHYDRATION_ALGORITHM) {
545
- _this3.logger.warn("Wrong algorithm for dehydrated device");
546
- return;
547
- }
548
- _this3.logger.debug("unpickling dehydrated device");
549
- var _key = yield _this3.cryptoCallbacks.getDehydrationKey(deviceData, k => {
550
- // copy the key so that it doesn't get clobbered
551
- account.unpickle(new Uint8Array(k), deviceData.account);
552
- });
553
- account.unpickle(_key, deviceData.account);
554
- _this3.logger.debug("unpickled device");
555
- var rehydrateResult = yield _this3.http.authedRequest(Method.Post, "/dehydrated_device/claim", undefined, {
556
- device_id: getDeviceResult.device_id
557
- }, {
558
- prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2"
559
- });
560
- if (rehydrateResult.success) {
561
- _this3.deviceId = getDeviceResult.device_id;
562
- _this3.logger.info("using dehydrated device");
563
- var pickleKey = _this3.pickleKey || "DEFAULT_KEY";
564
- _this3.exportedOlmDeviceToImport = {
565
- pickledAccount: account.pickle(pickleKey),
566
- sessions: [],
567
- pickleKey: pickleKey
568
- };
569
- account.free();
570
- return _this3.deviceId;
571
- } else {
572
- account.free();
573
- _this3.logger.info("not using dehydrated device");
574
- return;
575
- }
576
- } catch (e) {
577
- account.free();
578
- _this3.logger.warn("could not unpickle", e);
579
- }
580
- })();
581
- }
582
-
583
- /**
584
- * Get the current dehydrated device, if any
585
- * @returns A promise of an object containing the dehydrated device
586
- *
587
- * @deprecated MSC2697 device dehydration is not supported for rust cryptography.
588
- */
589
- getDehydratedDevice() {
590
- var _this4 = this;
591
- return _asyncToGenerator(function* () {
592
- try {
593
- return yield _this4.http.authedRequest(Method.Get, "/dehydrated_device", undefined, undefined, {
594
- prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2"
595
- });
596
- } catch (e) {
597
- _this4.logger.info("could not get dehydrated device", e);
598
- return;
599
- }
600
- })();
601
- }
602
-
603
- /**
604
- * Set the dehydration key. This will also periodically dehydrate devices to
605
- * the server.
606
- *
607
- * @param key - the dehydration key
608
- * @param keyInfo - Information about the key. Primarily for
609
- * information about how to generate the key from a passphrase.
610
- * @param deviceDisplayName - The device display name for the
611
- * dehydrated device.
612
- * @returns A promise that resolves when the dehydrated device is stored.
613
- *
614
- * @deprecated Not supported for Rust Cryptography.
615
- */
616
- setDehydrationKey(key, keyInfo, deviceDisplayName) {
617
- var _this5 = this;
618
- return _asyncToGenerator(function* () {
619
- if (!_this5.crypto) {
620
- _this5.logger.warn("not dehydrating device if crypto is not enabled");
621
- return;
622
- }
623
- return _this5.crypto.dehydrationManager.setKeyAndQueueDehydration(key, keyInfo, deviceDisplayName);
624
- })();
625
- }
626
-
627
- /**
628
- * Creates a new MSC2967 dehydrated device (without queuing periodic dehydration)
629
- * @param key - the dehydration key
630
- * @param keyInfo - Information about the key. Primarily for
631
- * information about how to generate the key from a passphrase.
632
- * @param deviceDisplayName - The device display name for the
633
- * dehydrated device.
634
- * @returns the device id of the newly created dehydrated device
635
- *
636
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.startDehydration}.
637
- */
638
- createDehydratedDevice(key, keyInfo, deviceDisplayName) {
639
- var _this6 = this;
640
- return _asyncToGenerator(function* () {
641
- if (!_this6.crypto) {
642
- _this6.logger.warn("not dehydrating device if crypto is not enabled");
643
- return;
644
- }
645
- yield _this6.crypto.dehydrationManager.setKey(key, keyInfo, deviceDisplayName);
646
- return _this6.crypto.dehydrationManager.dehydrateDevice();
647
- })();
648
- }
649
-
650
- /** @deprecated Not supported for Rust Cryptography. */
651
- exportDevice() {
652
- var _this7 = this;
653
- return _asyncToGenerator(function* () {
654
- if (!_this7.crypto) {
655
- _this7.logger.warn("not exporting device if crypto is not enabled");
656
- return;
657
- }
658
- return {
659
- userId: _this7.credentials.userId,
660
- deviceId: _this7.deviceId,
661
- // XXX: Private member access.
662
- olmDevice: yield _this7.crypto.olmDevice.export()
663
- };
664
- })();
665
- }
666
-
667
385
  /**
668
386
  * Clear any data out of the persistent stores used by the client.
669
387
  *
670
388
  * @returns Promise which resolves when the stores have been cleared.
671
389
  */
672
390
  clearStores() {
673
- var _this8 = this;
674
391
  if (this.clientRunning) {
675
392
  throw new Error("Cannot clear stores while client is running");
676
393
  }
677
394
  var promises = [];
678
395
  promises.push(this.store.deleteAllData());
679
- if (this.cryptoStore) {
680
- promises.push(this.cryptoStore.deleteAllData());
681
- }
682
-
683
- // delete the stores used by the rust matrix-sdk-crypto, in case they were used
684
- var deleteRustSdkStore = /*#__PURE__*/function () {
685
- var _ref2 = _asyncToGenerator(function* () {
686
- var indexedDB;
687
- try {
688
- indexedDB = globalThis.indexedDB;
689
- if (!indexedDB) return; // No indexedDB support
690
- } catch (_unused) {
691
- // No indexedDB support
692
- return;
693
- }
694
- var _loop = function* _loop(dbname) {
695
- var prom = new Promise((resolve, reject) => {
696
- _this8.logger.info("Removing IndexedDB instance ".concat(dbname));
697
- var req = indexedDB.deleteDatabase(dbname);
698
- req.onsuccess = _ => {
699
- _this8.logger.info("Removed IndexedDB instance ".concat(dbname));
700
- resolve(0);
701
- };
702
- req.onerror = e => {
703
- // In private browsing, Firefox has a globalThis.indexedDB, but attempts to delete an indexeddb
704
- // (even a non-existent one) fail with "DOMException: A mutation operation was attempted on a
705
- // database that did not allow mutations."
706
- //
707
- // it seems like the only thing we can really do is ignore the error.
708
- _this8.logger.warn("Failed to remove IndexedDB instance ".concat(dbname, ":"), e);
709
- resolve(0);
710
- };
711
- req.onblocked = e => {
712
- _this8.logger.info("cannot yet remove IndexedDB instance ".concat(dbname));
713
- };
714
- });
715
- yield prom;
716
- };
717
- for (var dbname of ["".concat(RUST_SDK_STORE_PREFIX, "::matrix-sdk-crypto"), "".concat(RUST_SDK_STORE_PREFIX, "::matrix-sdk-crypto-meta")]) {
718
- yield* _loop(dbname);
719
- }
720
- });
721
- return function deleteRustSdkStore() {
722
- return _ref2.apply(this, arguments);
723
- };
724
- }();
725
- promises.push(deleteRustSdkStore());
726
396
  return Promise.all(promises).then(); // .then to fix types
727
397
  }
728
398
 
@@ -732,10 +402,8 @@ export class MatrixClient extends TypedEventEmitter {
732
402
  * @returns MXID for the logged-in user, or null if not logged in
733
403
  */
734
404
  getUserId() {
735
- if (this.credentials && this.credentials.userId) {
736
- return this.credentials.userId;
737
- }
738
- return null;
405
+ var _this$credentials$use, _this$credentials;
406
+ return (_this$credentials$use = (_this$credentials = this.credentials) === null || _this$credentials === void 0 ? void 0 : _this$credentials.userId) !== null && _this$credentials$use !== void 0 ? _this$credentials$use : null;
739
407
  }
740
408
 
741
409
  /**
@@ -757,7 +425,8 @@ export class MatrixClient extends TypedEventEmitter {
757
425
  * @returns Domain of this MXID
758
426
  */
759
427
  getDomain() {
760
- if (this.credentials && this.credentials.userId) {
428
+ var _this$credentials2;
429
+ if ((_this$credentials2 = this.credentials) !== null && _this$credentials2 !== void 0 && _this$credentials2.userId) {
761
430
  return this.credentials.userId.replace(/^.*?:/, "");
762
431
  }
763
432
  return null;
@@ -768,10 +437,8 @@ export class MatrixClient extends TypedEventEmitter {
768
437
  * @returns The user ID localpart or null.
769
438
  */
770
439
  getUserIdLocalpart() {
771
- if (this.credentials && this.credentials.userId) {
772
- return this.credentials.userId.split(":")[0].substring(1);
773
- }
774
- return null;
440
+ var _this$credentials$use2, _this$credentials3;
441
+ return (_this$credentials$use2 = (_this$credentials3 = this.credentials) === null || _this$credentials3 === void 0 || (_this$credentials3 = _this$credentials3.userId) === null || _this$credentials3 === void 0 ? void 0 : _this$credentials3.split(":")[0].substring(1)) !== null && _this$credentials$use2 !== void 0 ? _this$credentials$use2 : null;
775
442
  }
776
443
 
777
444
  /**
@@ -789,82 +456,6 @@ export class MatrixClient extends TypedEventEmitter {
789
456
  getSessionId() {
790
457
  return this.sessionId;
791
458
  }
792
-
793
- /**
794
- * Check if the runtime environment supports VoIP calling.
795
- * @returns True if VoIP is supported.
796
- */
797
- supportsVoip() {
798
- return this.canSupportVoip;
799
- }
800
-
801
- /**
802
- * @returns
803
- */
804
- getMediaHandler() {
805
- return this.mediaHandler;
806
- }
807
-
808
- /**
809
- * Set whether VoIP calls are forced to use only TURN
810
- * candidates. This is the same as the forceTURN option
811
- * when creating the client.
812
- * @param force - True to force use of TURN servers
813
- */
814
- setForceTURN(force) {
815
- this.forceTURN = force;
816
- }
817
-
818
- /**
819
- * Set whether to advertise transfer support to other parties on Matrix calls.
820
- * @param support - True to advertise the 'm.call.transferee' capability
821
- */
822
- setSupportsCallTransfer(support) {
823
- this.supportsCallTransfer = support;
824
- }
825
-
826
- /**
827
- * Returns true if to-device signalling for group calls will be encrypted with Olm.
828
- * If false, it will be sent unencrypted.
829
- * @returns boolean Whether group call signalling will be encrypted
830
- */
831
- getUseE2eForGroupCall() {
832
- return this.useE2eForGroupCall;
833
- }
834
-
835
- /**
836
- * Creates a new call.
837
- * The place*Call methods on the returned call can be used to actually place a call
838
- *
839
- * @param roomId - The room the call is to be placed in.
840
- * @returns the call or null if the browser doesn't support calling.
841
- */
842
- createCall(roomId) {
843
- return createNewMatrixCall(this, roomId);
844
- }
845
-
846
- /**
847
- * Creates a new group call and sends the associated state event
848
- * to alert other members that the room now has a group call.
849
- *
850
- * @param roomId - The room the call is to be placed in.
851
- */
852
- createGroupCall(roomId, type, isPtt, intent, dataChannelsEnabled, dataChannelOptions) {
853
- var _this9 = this;
854
- return _asyncToGenerator(function* () {
855
- if (_this9.getGroupCallForRoom(roomId)) {
856
- throw new Error("".concat(roomId, " already has an existing group call"));
857
- }
858
- var room = _this9.getRoom(roomId);
859
- if (!room) {
860
- throw new Error("Cannot find room ".concat(roomId));
861
- }
862
-
863
- // Because without Media section a WebRTC connection is not possible, so need a RTCDataChannel to set up a
864
- // no media WebRTC connection anyway.
865
- return new GroupCall(_this9, room, type, isPtt, intent, undefined, dataChannelsEnabled || _this9.isVoipWithNoMediaAllowed, dataChannelOptions, _this9.isVoipWithNoMediaAllowed, _this9.useLivekitForGroupCalls, _this9.livekitServiceURL).create();
866
- })();
867
- }
868
459
  getLivekitServiceURL() {
869
460
  return this.livekitServiceURL;
870
461
  }
@@ -875,29 +466,6 @@ export class MatrixClient extends TypedEventEmitter {
875
466
  this.livekitServiceURL = newURL;
876
467
  }
877
468
 
878
- /**
879
- * Wait until an initial state for the given room has been processed by the
880
- * client and the client is aware of any ongoing group calls. Awaiting on
881
- * the promise returned by this method before calling getGroupCallForRoom()
882
- * avoids races where getGroupCallForRoom is called before the state for that
883
- * room has been processed. It does not, however, fix other races, eg. two
884
- * clients both creating a group call at the same time.
885
- * @param roomId - The room ID to wait for
886
- * @returns A promise that resolves once existing group calls in the room
887
- * have been processed.
888
- */
889
- waitUntilRoomReadyForGroupCalls(roomId) {
890
- return this.groupCallEventHandler.waitUntilRoomReadyForGroupCalls(roomId);
891
- }
892
-
893
- /**
894
- * Get an existing group call for the provided room.
895
- * @returns The group call or null if it doesn't already exist.
896
- */
897
- getGroupCallForRoom(roomId) {
898
- return this.groupCallEventHandler.groupCalls.get(roomId) || null;
899
- }
900
-
901
469
  /**
902
470
  * Get the current sync state.
903
471
  * @returns the sync state, which may be null.
@@ -994,1881 +562,47 @@ export class MatrixClient extends TypedEventEmitter {
994
562
  }
995
563
 
996
564
  /**
997
- * Gets the cached capabilities of the homeserver, returning cached ones if available.
998
- * If there are no cached capabilities and none can be fetched, throw an exception.
999
- *
1000
- * @returns Promise resolving with The capabilities of the homeserver
1001
- */
1002
- getCapabilities() {
1003
- var _this10 = this;
1004
- return _asyncToGenerator(function* () {
1005
- var caps = _this10.serverCapabilitiesService.getCachedCapabilities();
1006
- if (caps) return caps;
1007
- return _this10.serverCapabilitiesService.fetchCapabilities();
1008
- })();
1009
- }
1010
-
1011
- /**
1012
- * Gets the cached capabilities of the homeserver. If none have been fetched yet,
1013
- * return undefined.
1014
- *
1015
- * @returns The capabilities of the homeserver
1016
- */
1017
- getCachedCapabilities() {
1018
- return this.serverCapabilitiesService.getCachedCapabilities();
1019
- }
1020
-
1021
- /**
1022
- * Fetches the latest capabilities from the homeserver, ignoring any cached
1023
- * versions. The newly returned version is cached.
1024
- *
1025
- * @returns A promise which resolves to the capabilities of the homeserver
1026
- */
1027
- fetchCapabilities() {
1028
- return this.serverCapabilitiesService.fetchCapabilities();
1029
- }
1030
-
1031
- /**
1032
- * Initialise support for end-to-end encryption in this client, using libolm.
1033
- *
1034
- * You should call this method after creating the matrixclient, but *before*
1035
- * calling `startClient`, if you want to support end-to-end encryption.
1036
- *
1037
- * It will return a Promise which will resolve when the crypto layer has been
1038
- * successfully initialised.
1039
- *
1040
- * @deprecated libolm is deprecated. Prefer {@link initRustCrypto}.
1041
- */
1042
- initCrypto() {
1043
- var _this11 = this;
1044
- return _asyncToGenerator(function* () {
1045
- if (!isCryptoAvailable()) {
1046
- throw new Error("End-to-end encryption not supported in this js-sdk build: did " + "you remember to load the olm library?");
1047
- }
1048
- if (_this11.cryptoBackend) {
1049
- _this11.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
1050
- return;
1051
- }
1052
- if (!_this11.cryptoStore) {
1053
- // the cryptostore is provided by sdk.createClient, so this shouldn't happen
1054
- throw new Error("Cannot enable encryption: no cryptoStore provided");
1055
- }
1056
- _this11.logger.debug("Crypto: Starting up crypto store...");
1057
- yield _this11.cryptoStore.startup();
1058
- var userId = _this11.getUserId();
1059
- if (userId === null) {
1060
- throw new Error("Cannot enable encryption on MatrixClient with unknown userId: " + "ensure userId is passed in createClient().");
1061
- }
1062
- if (_this11.deviceId === null) {
1063
- throw new Error("Cannot enable encryption on MatrixClient with unknown deviceId: " + "ensure deviceId is passed in createClient().");
1064
- }
1065
- var crypto = new Crypto(_this11, userId, _this11.deviceId, _this11.store, _this11.cryptoStore, _this11.verificationMethods);
1066
- _this11.reEmitter.reEmit(crypto, [LegacyCryptoEvent.KeyBackupFailed, LegacyCryptoEvent.KeyBackupSessionsRemaining, LegacyCryptoEvent.RoomKeyRequest, LegacyCryptoEvent.RoomKeyRequestCancellation, LegacyCryptoEvent.Warning, LegacyCryptoEvent.DevicesUpdated, LegacyCryptoEvent.WillUpdateDevices, LegacyCryptoEvent.DeviceVerificationChanged, LegacyCryptoEvent.UserTrustStatusChanged, LegacyCryptoEvent.KeysChanged]);
1067
- _this11.logger.debug("Crypto: initialising crypto object...");
1068
- yield crypto.init({
1069
- exportedOlmDevice: _this11.exportedOlmDeviceToImport,
1070
- pickleKey: _this11.pickleKey
1071
- });
1072
- delete _this11.exportedOlmDeviceToImport;
1073
- _this11.olmVersion = Crypto.getOlmVersion();
1074
-
1075
- // if crypto initialisation was successful, tell it to attach its event handlers.
1076
- crypto.registerEventHandlers(_this11);
1077
- _this11.cryptoBackend = _this11.crypto = crypto;
1078
-
1079
- // upload our keys in the background
1080
- _this11.crypto.uploadDeviceKeys().catch(e => {
1081
- // TODO: throwing away this error is a really bad idea.
1082
- _this11.logger.error("Error uploading device keys", e);
1083
- });
1084
- })();
1085
- }
1086
-
1087
- /**
1088
- * Initialise support for end-to-end encryption in this client, using the rust matrix-sdk-crypto.
1089
- *
1090
- * An alternative to {@link initCrypto}.
1091
- *
1092
- * @param args.useIndexedDB - True to use an indexeddb store, false to use an in-memory store. Defaults to 'true'.
1093
- * @param args.storageKey - A key with which to encrypt the indexeddb store. If provided, it must be exactly
1094
- * 32 bytes of data, and must be the same each time the client is initialised for a given device.
1095
- * If both this and `storagePassword` are unspecified, the store will be unencrypted.
1096
- * @param args.storagePassword - An alternative to `storageKey`. A password which will be used to derive a key to
1097
- * encrypt the store with. Deriving a key from a password is (deliberately) a slow operation, so prefer
1098
- * to pass a `storageKey` directly where possible.
1099
- *
1100
- * @returns a Promise which will resolve when the crypto layer has been
1101
- * successfully initialised.
1102
- */
1103
- initRustCrypto() {
1104
- var _arguments = arguments,
1105
- _this12 = this;
1106
- return _asyncToGenerator(function* () {
1107
- var _this12$pickleKey;
1108
- var args = _arguments.length > 0 && _arguments[0] !== undefined ? _arguments[0] : {};
1109
- if (_this12.cryptoBackend) {
1110
- _this12.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
1111
- return;
1112
- }
1113
- var userId = _this12.getUserId();
1114
- if (userId === null) {
1115
- throw new Error("Cannot enable encryption on MatrixClient with unknown userId: " + "ensure userId is passed in createClient().");
1116
- }
1117
- var deviceId = _this12.getDeviceId();
1118
- if (deviceId === null) {
1119
- throw new Error("Cannot enable encryption on MatrixClient with unknown deviceId: " + "ensure deviceId is passed in createClient().");
1120
- }
1121
-
1122
- // importing rust-crypto will download the webassembly, so we delay it until we know it will be
1123
- // needed.
1124
- _this12.logger.debug("Downloading Rust crypto library");
1125
- var RustCrypto = yield import("./rust-crypto/index.js");
1126
- var rustCrypto = yield RustCrypto.initRustCrypto({
1127
- logger: _this12.logger,
1128
- http: _this12.http,
1129
- userId: userId,
1130
- deviceId: deviceId,
1131
- secretStorage: _this12.secretStorage,
1132
- cryptoCallbacks: _this12.cryptoCallbacks,
1133
- storePrefix: args.useIndexedDB === false ? null : RUST_SDK_STORE_PREFIX,
1134
- storeKey: args.storageKey,
1135
- storePassphrase: args.storagePassword,
1136
- legacyCryptoStore: _this12.cryptoStore,
1137
- legacyPickleKey: (_this12$pickleKey = _this12.pickleKey) !== null && _this12$pickleKey !== void 0 ? _this12$pickleKey : "DEFAULT_KEY",
1138
- legacyMigrationProgressListener: (progress, total) => {
1139
- _this12.emit(CryptoEvent.LegacyCryptoStoreMigrationProgress, progress, total);
1140
- }
1141
- });
1142
- rustCrypto.setSupportedVerificationMethods(_this12.verificationMethods);
1143
- _this12.cryptoBackend = rustCrypto;
1144
-
1145
- // attach the event listeners needed by RustCrypto
1146
- _this12.on(RoomMemberEvent.Membership, rustCrypto.onRoomMembership.bind(rustCrypto));
1147
- _this12.on(ClientEvent.Event, event => {
1148
- rustCrypto.onLiveEventFromSync(event);
1149
- });
1150
-
1151
- // re-emit the events emitted by the crypto impl
1152
- _this12.reEmitter.reEmit(rustCrypto, [CryptoEvent.VerificationRequestReceived, CryptoEvent.UserTrustStatusChanged, CryptoEvent.KeyBackupStatus, CryptoEvent.KeyBackupSessionsRemaining, CryptoEvent.KeyBackupFailed, CryptoEvent.KeyBackupDecryptionKeyCached, CryptoEvent.KeysChanged, CryptoEvent.DevicesUpdated, CryptoEvent.WillUpdateDevices]);
1153
- })();
1154
- }
1155
-
1156
- /**
1157
- * Access the server-side secret storage API for this client.
1158
- */
1159
- get secretStorage() {
1160
- return this._secretStorage;
1161
- }
1162
-
1163
- /**
1164
- * Access the crypto API for this client.
1165
- *
1166
- * If end-to-end encryption has been enabled for this client (via {@link initCrypto} or {@link initRustCrypto}),
1167
- * returns an object giving access to the crypto API. Otherwise, returns `undefined`.
1168
- */
1169
- getCrypto() {
1170
- return this.cryptoBackend;
1171
- }
1172
-
1173
- /**
1174
- * Is end-to-end crypto enabled for this client.
1175
- * @returns True if end-to-end is enabled.
1176
- * @deprecated prefer {@link getCrypto}
1177
- */
1178
- isCryptoEnabled() {
1179
- return !!this.cryptoBackend;
1180
- }
1181
-
1182
- /**
1183
- * Get the Ed25519 key for this device
1184
- *
1185
- * @returns base64-encoded ed25519 key. Null if crypto is
1186
- * disabled.
1187
- *
1188
- * @deprecated Not supported for Rust Cryptography.Prefer {@link CryptoApi.getOwnDeviceKeys}
1189
- */
1190
- getDeviceEd25519Key() {
1191
- var _this$crypto$getDevic, _this$crypto;
1192
- return (_this$crypto$getDevic = (_this$crypto = this.crypto) === null || _this$crypto === void 0 ? void 0 : _this$crypto.getDeviceEd25519Key()) !== null && _this$crypto$getDevic !== void 0 ? _this$crypto$getDevic : null;
1193
- }
1194
-
1195
- /**
1196
- * Get the Curve25519 key for this device
1197
- *
1198
- * @returns base64-encoded curve25519 key. Null if crypto is
1199
- * disabled.
1200
- *
1201
- * @deprecated Not supported for Rust Cryptography. Use {@link CryptoApi.getOwnDeviceKeys}
1202
- */
1203
- getDeviceCurve25519Key() {
1204
- var _this$crypto$getDevic2, _this$crypto2;
1205
- return (_this$crypto$getDevic2 = (_this$crypto2 = this.crypto) === null || _this$crypto2 === void 0 ? void 0 : _this$crypto2.getDeviceCurve25519Key()) !== null && _this$crypto$getDevic2 !== void 0 ? _this$crypto$getDevic2 : null;
1206
- }
1207
-
1208
- /**
1209
- * @deprecated Does nothing.
1210
- */
1211
- uploadKeys() {
1212
- var _this13 = this;
1213
- return _asyncToGenerator(function* () {
1214
- _this13.logger.warn("MatrixClient.uploadKeys is deprecated");
1215
- })();
1216
- }
1217
-
1218
- /**
1219
- * Download the keys for a list of users and stores the keys in the session
1220
- * store.
1221
- * @param userIds - The users to fetch.
1222
- * @param forceDownload - Always download the keys even if cached.
1223
- *
1224
- * @returns A promise which resolves to a map userId-\>deviceId-\>`DeviceInfo`
1225
- *
1226
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
1227
- */
1228
- downloadKeys(userIds, forceDownload) {
1229
- if (!this.crypto) {
1230
- return Promise.reject(new Error("End-to-end encryption disabled"));
1231
- }
1232
- return this.crypto.downloadKeys(userIds, forceDownload);
1233
- }
1234
-
1235
- /**
1236
- * Get the stored device keys for a user id
1237
- *
1238
- * @param userId - the user to list keys for.
1239
- *
1240
- * @returns list of devices
1241
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
1242
- */
1243
- getStoredDevicesForUser(userId) {
1244
- if (!this.crypto) {
1245
- throw new Error("End-to-end encryption disabled");
1246
- }
1247
- return this.crypto.getStoredDevicesForUser(userId) || [];
1248
- }
1249
-
1250
- /**
1251
- * Get the stored device key for a user id and device id
1252
- *
1253
- * @param userId - the user to list keys for.
1254
- * @param deviceId - unique identifier for the device
1255
- *
1256
- * @returns device or null
1257
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
1258
- */
1259
- getStoredDevice(userId, deviceId) {
1260
- if (!this.crypto) {
1261
- throw new Error("End-to-end encryption disabled");
1262
- }
1263
- return this.crypto.getStoredDevice(userId, deviceId) || null;
1264
- }
1265
-
1266
- /**
1267
- * Mark the given device as verified
1268
- *
1269
- * @param userId - owner of the device
1270
- * @param deviceId - unique identifier for the device or user's
1271
- * cross-signing public key ID.
1272
- *
1273
- * @param verified - whether to mark the device as verified. defaults
1274
- * to 'true'.
1275
- *
1276
- * @returns
1277
- *
1278
- * @remarks
1279
- * Fires {@link CryptoEvent#DeviceVerificationChanged}
1280
- */
1281
- setDeviceVerified(userId, deviceId) {
1282
- var verified = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : true;
1283
- var prom = this.setDeviceVerification(userId, deviceId, verified, null, null);
1284
-
1285
- // if one of the user's own devices is being marked as verified / unverified,
1286
- // check the key backup status, since whether or not we use this depends on
1287
- // whether it has a signature from a verified device
1288
- if (userId == this.credentials.userId) {
1289
- this.checkKeyBackup();
1290
- }
1291
- return prom;
1292
- }
1293
-
1294
- /**
1295
- * Mark the given device as blocked/unblocked
1296
- *
1297
- * @param userId - owner of the device
1298
- * @param deviceId - unique identifier for the device or user's
1299
- * cross-signing public key ID.
1300
- *
1301
- * @param blocked - whether to mark the device as blocked. defaults
1302
- * to 'true'.
1303
- *
1304
- * @returns
1305
- *
1306
- * @remarks
1307
- * Fires {@link LegacyCryptoEvent.DeviceVerificationChanged}
1308
- *
1309
- * @deprecated Not supported for Rust Cryptography.
1310
- */
1311
- setDeviceBlocked(userId, deviceId) {
1312
- var blocked = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : true;
1313
- return this.setDeviceVerification(userId, deviceId, null, blocked, null);
1314
- }
1315
-
1316
- /**
1317
- * Mark the given device as known/unknown
1318
- *
1319
- * @param userId - owner of the device
1320
- * @param deviceId - unique identifier for the device or user's
1321
- * cross-signing public key ID.
1322
- *
1323
- * @param known - whether to mark the device as known. defaults
1324
- * to 'true'.
1325
- *
1326
- * @returns
1327
- *
1328
- * @remarks
1329
- * Fires {@link CryptoEvent#DeviceVerificationChanged}
1330
- *
1331
- * @deprecated Not supported for Rust Cryptography.
1332
- */
1333
- setDeviceKnown(userId, deviceId) {
1334
- var known = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : true;
1335
- return this.setDeviceVerification(userId, deviceId, null, null, known);
1336
- }
1337
- setDeviceVerification(userId, deviceId, verified, blocked, known) {
1338
- var _this14 = this;
1339
- return _asyncToGenerator(function* () {
1340
- if (!_this14.crypto) {
1341
- throw new Error("End-to-end encryption disabled");
1342
- }
1343
- yield _this14.crypto.setDeviceVerification(userId, deviceId, verified, blocked, known);
1344
- })();
1345
- }
1346
-
1347
- /**
1348
- * Request a key verification from another user, using a DM.
1349
- *
1350
- * @param userId - the user to request verification with
1351
- * @param roomId - the room to use for verification
1352
- *
1353
- * @returns resolves to a VerificationRequest
1354
- * when the request has been sent to the other party.
1355
- *
1356
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.requestVerificationDM}.
1357
- */
1358
- requestVerificationDM(userId, roomId) {
1359
- if (!this.crypto) {
1360
- throw new Error("End-to-end encryption disabled");
1361
- }
1362
- return this.crypto.requestVerificationDM(userId, roomId);
1363
- }
1364
-
1365
- /**
1366
- * Finds a DM verification request that is already in progress for the given room id
1367
- *
1368
- * @param roomId - the room to use for verification
1369
- *
1370
- * @returns the VerificationRequest that is in progress, if any
1371
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.findVerificationRequestDMInProgress}.
1372
- */
1373
- findVerificationRequestDMInProgress(roomId) {
1374
- if (!this.cryptoBackend) {
1375
- throw new Error("End-to-end encryption disabled");
1376
- } else if (!this.crypto) {
1377
- // Hack for element-R to avoid breaking the cypress tests. We can get rid of this once the react-sdk is
1378
- // updated to use CryptoApi.findVerificationRequestDMInProgress.
1379
- return undefined;
1380
- }
1381
- return this.crypto.findVerificationRequestDMInProgress(roomId);
1382
- }
1383
-
1384
- /**
1385
- * Returns all to-device verification requests that are already in progress for the given user id
1386
- *
1387
- * @param userId - the ID of the user to query
1388
- *
1389
- * @returns the VerificationRequests that are in progress
1390
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getVerificationRequestsToDeviceInProgress}.
1391
- */
1392
- getVerificationRequestsToDeviceInProgress(userId) {
1393
- if (!this.crypto) {
1394
- throw new Error("End-to-end encryption disabled");
1395
- }
1396
- return this.crypto.getVerificationRequestsToDeviceInProgress(userId);
1397
- }
1398
-
1399
- /**
1400
- * Request a key verification from another user.
1401
- *
1402
- * @param userId - the user to request verification with
1403
- * @param devices - array of device IDs to send requests to. Defaults to
1404
- * all devices owned by the user
1405
- *
1406
- * @returns resolves to a VerificationRequest
1407
- * when the request has been sent to the other party.
1408
- *
1409
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
1410
- */
1411
- requestVerification(userId, devices) {
1412
- if (!this.crypto) {
1413
- throw new Error("End-to-end encryption disabled");
1414
- }
1415
- return this.crypto.requestVerification(userId, devices);
1416
- }
1417
-
1418
- /**
1419
- * Begin a key verification.
1420
- *
1421
- * @param method - the verification method to use
1422
- * @param userId - the user to verify keys with
1423
- * @param deviceId - the device to verify
1424
- *
1425
- * @returns a verification object
1426
- * @deprecated Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
1427
- */
1428
- beginKeyVerification(method, userId, deviceId) {
1429
- if (!this.crypto) {
1430
- throw new Error("End-to-end encryption disabled");
1431
- }
1432
- return this.crypto.beginKeyVerification(method, userId, deviceId);
1433
- }
1434
-
1435
- /**
1436
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
1437
- */
1438
- checkSecretStorageKey(key, info) {
1439
- return this.secretStorage.checkKey(key, info);
1440
- }
1441
-
1442
- /**
1443
- * Set the global override for whether the client should ever send encrypted
1444
- * messages to unverified devices. This provides the default for rooms which
1445
- * do not specify a value.
1446
- *
1447
- * @param value - whether to blacklist all unverified devices by default
1448
- *
1449
- * @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
1450
- *
1451
- * ```javascript
1452
- * client.getCrypto().globalBlacklistUnverifiedDevices = value;
1453
- * ```
1454
- */
1455
- setGlobalBlacklistUnverifiedDevices(value) {
1456
- if (!this.cryptoBackend) {
1457
- throw new Error("End-to-end encryption disabled");
1458
- }
1459
- this.cryptoBackend.globalBlacklistUnverifiedDevices = value;
1460
- return value;
1461
- }
1462
-
1463
- /**
1464
- * @returns whether to blacklist all unverified devices by default
1465
- *
1466
- * @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
1467
- *
1468
- * ```javascript
1469
- * value = client.getCrypto().globalBlacklistUnverifiedDevices;
1470
- * ```
1471
- */
1472
- getGlobalBlacklistUnverifiedDevices() {
1473
- if (!this.cryptoBackend) {
1474
- throw new Error("End-to-end encryption disabled");
1475
- }
1476
- return this.cryptoBackend.globalBlacklistUnverifiedDevices;
1477
- }
1478
-
1479
- /**
1480
- * Set whether sendMessage in a room with unknown and unverified devices
1481
- * should throw an error and not send them message. This has 'Global' for
1482
- * symmetry with setGlobalBlacklistUnverifiedDevices but there is currently
1483
- * no room-level equivalent for this setting.
1484
- *
1485
- * This API is currently UNSTABLE and may change or be removed without notice.
1486
- *
1487
- * It has no effect with the Rust crypto implementation.
1488
- *
1489
- * @param value - whether error on unknown devices
1490
- *
1491
- * ```ts
1492
- * client.getCrypto().globalErrorOnUnknownDevices = value;
1493
- * ```
1494
- */
1495
- setGlobalErrorOnUnknownDevices(value) {
1496
- if (!this.cryptoBackend) {
1497
- throw new Error("End-to-end encryption disabled");
1498
- }
1499
- this.cryptoBackend.globalErrorOnUnknownDevices = value;
1500
- }
1501
-
1502
- /**
1503
- * @returns whether to error on unknown devices
1504
- *
1505
- * This API is currently UNSTABLE and may change or be removed without notice.
1506
- */
1507
- getGlobalErrorOnUnknownDevices() {
1508
- if (!this.cryptoBackend) {
1509
- throw new Error("End-to-end encryption disabled");
1510
- }
1511
- return this.cryptoBackend.globalErrorOnUnknownDevices;
1512
- }
1513
-
1514
- /**
1515
- * Get the ID of one of the user's cross-signing keys
1516
- *
1517
- * @param type - The type of key to get the ID of. One of
1518
- * "master", "self_signing", or "user_signing". Defaults to "master".
1519
- *
1520
- * @returns the key ID
1521
- * @deprecated Not supported for Rust Cryptography. prefer {@link Crypto.CryptoApi#getCrossSigningKeyId}
1522
- */
1523
- getCrossSigningId() {
1524
- var type = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : CrossSigningKey.Master;
1525
- if (!this.crypto) {
1526
- throw new Error("End-to-end encryption disabled");
1527
- }
1528
- return this.crypto.getCrossSigningId(type);
1529
- }
1530
-
1531
- /**
1532
- * Get the cross signing information for a given user.
1533
- *
1534
- * The cross-signing API is currently UNSTABLE and may change without notice.
1535
- *
1536
- * @param userId - the user ID to get the cross-signing info for.
1537
- *
1538
- * @returns the cross signing information for the user.
1539
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#userHasCrossSigningKeys}
1540
- */
1541
- getStoredCrossSigningForUser(userId) {
1542
- if (!this.cryptoBackend) {
1543
- throw new Error("End-to-end encryption disabled");
1544
- }
1545
- return this.cryptoBackend.getStoredCrossSigningForUser(userId);
1546
- }
1547
-
1548
- /**
1549
- * Check whether a given user is trusted.
1550
- *
1551
- * The cross-signing API is currently UNSTABLE and may change without notice.
1552
- *
1553
- * @param userId - The ID of the user to check.
1554
- *
1555
- * @deprecated Use {@link Crypto.CryptoApi.getUserVerificationStatus | `CryptoApi.getUserVerificationStatus`}
1556
- */
1557
- checkUserTrust(userId) {
1558
- if (!this.cryptoBackend) {
1559
- throw new Error("End-to-end encryption disabled");
1560
- }
1561
- return this.cryptoBackend.checkUserTrust(userId);
1562
- }
1563
-
1564
- /**
1565
- * Check whether a given device is trusted.
1566
- *
1567
- * The cross-signing API is currently UNSTABLE and may change without notice.
1568
- *
1569
- * @param userId - The ID of the user whose devices is to be checked.
1570
- * @param deviceId - The ID of the device to check
1571
- *
1572
- * @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus | `CryptoApi.getDeviceVerificationStatus`}
1573
- */
1574
- checkDeviceTrust(userId, deviceId) {
1575
- if (!this.crypto) {
1576
- throw new Error("End-to-end encryption disabled");
1577
- }
1578
- return this.crypto.checkDeviceTrust(userId, deviceId);
1579
- }
1580
-
1581
- /**
1582
- * Check whether one of our own devices is cross-signed by our
1583
- * user's stored keys, regardless of whether we trust those keys yet.
1584
- *
1585
- * @param deviceId - The ID of the device to check
1586
- *
1587
- * @returns true if the device is cross-signed
1588
- *
1589
- * @deprecated Not supported for Rust Cryptography.
1590
- */
1591
- checkIfOwnDeviceCrossSigned(deviceId) {
1592
- if (!this.crypto) {
1593
- throw new Error("End-to-end encryption disabled");
1594
- }
1595
- return this.crypto.checkIfOwnDeviceCrossSigned(deviceId);
1596
- }
1597
-
1598
- /**
1599
- * Check the copy of our cross-signing key that we have in the device list and
1600
- * see if we can get the private key. If so, mark it as trusted.
1601
- * @param opts - ICheckOwnCrossSigningTrustOpts object
1602
- *
1603
- * @deprecated Unneeded for the new crypto
1604
- */
1605
- checkOwnCrossSigningTrust(opts) {
1606
- if (!this.cryptoBackend) {
1607
- throw new Error("End-to-end encryption disabled");
1608
- }
1609
- return this.cryptoBackend.checkOwnCrossSigningTrust(opts);
1610
- }
1611
-
1612
- /**
1613
- * Checks that a given cross-signing private key matches a given public key.
1614
- * This can be used by the getCrossSigningKey callback to verify that the
1615
- * private key it is about to supply is the one that was requested.
1616
- * @param privateKey - The private key
1617
- * @param expectedPublicKey - The public key
1618
- * @returns true if the key matches, otherwise false
1619
- *
1620
- * @deprecated Not supported for Rust Cryptography.
1621
- */
1622
- checkCrossSigningPrivateKey(privateKey, expectedPublicKey) {
1623
- if (!this.crypto) {
1624
- throw new Error("End-to-end encryption disabled");
1625
- }
1626
- return this.crypto.checkCrossSigningPrivateKey(privateKey, expectedPublicKey);
1627
- }
1628
-
1629
- /**
1630
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestDeviceVerification}.
1631
- */
1632
- legacyDeviceVerification(userId, deviceId, method) {
1633
- if (!this.crypto) {
1634
- throw new Error("End-to-end encryption disabled");
1635
- }
1636
- return this.crypto.legacyDeviceVerification(userId, deviceId, method);
1637
- }
1638
-
1639
- /**
1640
- * Perform any background tasks that can be done before a message is ready to
1641
- * send, in order to speed up sending of the message.
1642
- * @param room - the room the event is in
1643
- *
1644
- * @deprecated Prefer {@link CryptoApi.prepareToEncrypt | `CryptoApi.prepareToEncrypt`}:
1645
- *
1646
- * ```javascript
1647
- * client.getCrypto().prepareToEncrypt(room);
1648
- * ```
1649
- */
1650
- prepareToEncrypt(room) {
1651
- if (!this.cryptoBackend) {
1652
- throw new Error("End-to-end encryption disabled");
1653
- }
1654
- this.cryptoBackend.prepareToEncrypt(room);
1655
- }
1656
-
1657
- /**
1658
- * Checks if the user has previously published cross-signing keys
1659
- *
1660
- * This means downloading the devicelist for the user and checking if the list includes
1661
- * the cross-signing pseudo-device.
1662
- *
1663
- * @deprecated Prefer {@link CryptoApi.userHasCrossSigningKeys | `CryptoApi.userHasCrossSigningKeys`}:
1664
- *
1665
- * ```javascript
1666
- * result = client.getCrypto().userHasCrossSigningKeys();
1667
- * ```
1668
- */
1669
- userHasCrossSigningKeys() {
1670
- if (!this.cryptoBackend) {
1671
- throw new Error("End-to-end encryption disabled");
1672
- }
1673
- return this.cryptoBackend.userHasCrossSigningKeys();
1674
- }
1675
-
1676
- /**
1677
- * Checks whether cross signing:
1678
- * - is enabled on this account and trusted by this device
1679
- * - has private keys either cached locally or stored in secret storage
1680
- *
1681
- * If this function returns false, bootstrapCrossSigning() can be used
1682
- * to fix things such that it returns true. That is to say, after
1683
- * bootstrapCrossSigning() completes successfully, this function should
1684
- * return true.
1685
- * @returns True if cross-signing is ready to be used on this device
1686
- * @deprecated Prefer {@link CryptoApi.isCrossSigningReady | `CryptoApi.isCrossSigningReady`}:
1687
- */
1688
- isCrossSigningReady() {
1689
- if (!this.cryptoBackend) {
1690
- throw new Error("End-to-end encryption disabled");
1691
- }
1692
- return this.cryptoBackend.isCrossSigningReady();
1693
- }
1694
-
1695
- /**
1696
- * Bootstrap cross-signing by creating keys if needed. If everything is already
1697
- * set up, then no changes are made, so this is safe to run to ensure
1698
- * cross-signing is ready for use.
1699
- *
1700
- * This function:
1701
- * - creates new cross-signing keys if they are not found locally cached nor in
1702
- * secret storage (if it has been set up)
1703
- *
1704
- * @deprecated Prefer {@link CryptoApi.bootstrapCrossSigning | `CryptoApi.bootstrapCrossSigning`}.
1705
- */
1706
- bootstrapCrossSigning(opts) {
1707
- if (!this.cryptoBackend) {
1708
- throw new Error("End-to-end encryption disabled");
1709
- }
1710
- return this.cryptoBackend.bootstrapCrossSigning(opts);
1711
- }
1712
-
1713
- /**
1714
- * Whether to trust a others users signatures of their devices.
1715
- * If false, devices will only be considered 'verified' if we have
1716
- * verified that device individually (effectively disabling cross-signing).
1717
- *
1718
- * Default: true
1719
- *
1720
- * @returns True if trusting cross-signed devices
1721
- *
1722
- * @deprecated Prefer {@link CryptoApi.getTrustCrossSignedDevices | `CryptoApi.getTrustCrossSignedDevices`}.
1723
- */
1724
- getCryptoTrustCrossSignedDevices() {
1725
- if (!this.cryptoBackend) {
1726
- throw new Error("End-to-end encryption disabled");
1727
- }
1728
- return this.cryptoBackend.getTrustCrossSignedDevices();
1729
- }
1730
-
1731
- /**
1732
- * See getCryptoTrustCrossSignedDevices
1733
- *
1734
- * @param val - True to trust cross-signed devices
1735
- *
1736
- * @deprecated Prefer {@link CryptoApi.setTrustCrossSignedDevices | `CryptoApi.setTrustCrossSignedDevices`}.
1737
- */
1738
- setCryptoTrustCrossSignedDevices(val) {
1739
- if (!this.cryptoBackend) {
1740
- throw new Error("End-to-end encryption disabled");
1741
- }
1742
- this.cryptoBackend.setTrustCrossSignedDevices(val);
1743
- }
1744
-
1745
- /**
1746
- * Counts the number of end to end session keys that are waiting to be backed up
1747
- * @returns Promise which resolves to the number of sessions requiring backup
1748
- *
1749
- * @deprecated Not supported for Rust Cryptography.
1750
- */
1751
- countSessionsNeedingBackup() {
1752
- if (!this.crypto) {
1753
- throw new Error("End-to-end encryption disabled");
1754
- }
1755
- return this.crypto.countSessionsNeedingBackup();
1756
- }
1757
-
1758
- /**
1759
- * Get information about the encryption of an event
1760
- *
1761
- * @param event - event to be checked
1762
- * @returns The event information.
1763
- * @deprecated Prefer {@link Crypto.CryptoApi.getEncryptionInfoForEvent | `CryptoApi.getEncryptionInfoForEvent`}.
1764
- */
1765
- getEventEncryptionInfo(event) {
1766
- if (!this.cryptoBackend) {
1767
- throw new Error("End-to-end encryption disabled");
1768
- }
1769
- return this.cryptoBackend.getEventEncryptionInfo(event);
1770
- }
1771
-
1772
- /**
1773
- * Create a recovery key from a user-supplied passphrase.
1774
- *
1775
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1776
- *
1777
- * @param password - Passphrase string that can be entered by the user
1778
- * when restoring the backup as an alternative to entering the recovery key.
1779
- * Optional.
1780
- * @returns Object with public key metadata, encoded private
1781
- * recovery key which should be disposed of after displaying to the user,
1782
- * and raw private key to avoid round tripping if needed.
1783
- *
1784
- * @deprecated Prefer {@link CryptoApi.createRecoveryKeyFromPassphrase | `CryptoApi.createRecoveryKeyFromPassphrase`}.
1785
- */
1786
- createRecoveryKeyFromPassphrase(password) {
1787
- if (!this.cryptoBackend) {
1788
- throw new Error("End-to-end encryption disabled");
1789
- }
1790
- return this.cryptoBackend.createRecoveryKeyFromPassphrase(password);
1791
- }
1792
-
1793
- /**
1794
- * Checks whether secret storage:
1795
- * - is enabled on this account
1796
- * - is storing cross-signing private keys
1797
- * - is storing session backup key (if enabled)
1798
- *
1799
- * If this function returns false, bootstrapSecretStorage() can be used
1800
- * to fix things such that it returns true. That is to say, after
1801
- * bootstrapSecretStorage() completes successfully, this function should
1802
- * return true.
1803
- *
1804
- * @returns True if secret storage is ready to be used on this device
1805
- * @deprecated Prefer {@link CryptoApi.isSecretStorageReady | `CryptoApi.isSecretStorageReady`}.
1806
- */
1807
- isSecretStorageReady() {
1808
- if (!this.cryptoBackend) {
1809
- throw new Error("End-to-end encryption disabled");
1810
- }
1811
- return this.cryptoBackend.isSecretStorageReady();
1812
- }
1813
-
1814
- /**
1815
- * Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
1816
- * already set up, then no changes are made, so this is safe to run to ensure secret
1817
- * storage is ready for use.
1818
- *
1819
- * This function
1820
- * - creates a new Secure Secret Storage key if no default key exists
1821
- * - if a key backup exists, it is migrated to store the key in the Secret
1822
- * Storage
1823
- * - creates a backup if none exists, and one is requested
1824
- * - migrates Secure Secret Storage to use the latest algorithm, if an outdated
1825
- * algorithm is found
1826
- *
1827
- * @deprecated Use {@link CryptoApi.bootstrapSecretStorage | `CryptoApi.bootstrapSecretStorage`}.
1828
- */
1829
- bootstrapSecretStorage(opts) {
1830
- if (!this.cryptoBackend) {
1831
- throw new Error("End-to-end encryption disabled");
1832
- }
1833
- return this.cryptoBackend.bootstrapSecretStorage(opts);
1834
- }
1835
-
1836
- /**
1837
- * Add a key for encrypting secrets.
1838
- *
1839
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1840
- *
1841
- * @param algorithm - the algorithm used by the key
1842
- * @param opts - the options for the algorithm. The properties used
1843
- * depend on the algorithm given.
1844
- * @param keyName - the name of the key. If not given, a random name will be generated.
1845
- *
1846
- * @returns An object with:
1847
- * keyId: the ID of the key
1848
- * keyInfo: details about the key (iv, mac, passphrase)
1849
- *
1850
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
1851
- */
1852
- addSecretStorageKey(algorithm, opts, keyName) {
1853
- return this.secretStorage.addKey(algorithm, opts, keyName);
1854
- }
1855
-
1856
- /**
1857
- * Check whether we have a key with a given ID.
1858
- *
1859
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1860
- *
1861
- * @param keyId - The ID of the key to check
1862
- * for. Defaults to the default key ID if not provided.
1863
- * @returns Whether we have the key.
1864
- *
1865
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
1866
- */
1867
- hasSecretStorageKey(keyId) {
1868
- return this.secretStorage.hasKey(keyId);
1869
- }
1870
-
1871
- /**
1872
- * Store an encrypted secret on the server.
1873
- *
1874
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1875
- *
1876
- * @param name - The name of the secret
1877
- * @param secret - The secret contents.
1878
- * @param keys - The IDs of the keys to use to encrypt the secret or null/undefined
1879
- * to use the default (will throw if no default key is set).
1880
- *
1881
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
1882
- */
1883
- storeSecret(name, secret, keys) {
1884
- return this.secretStorage.store(name, secret, keys);
1885
- }
1886
-
1887
- /**
1888
- * Get a secret from storage.
1889
- *
1890
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1891
- *
1892
- * @param name - the name of the secret
1893
- *
1894
- * @returns the contents of the secret
1895
- *
1896
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
1897
- */
1898
- getSecret(name) {
1899
- return this.secretStorage.get(name);
1900
- }
1901
-
1902
- /**
1903
- * Check if a secret is stored on the server.
1904
- *
1905
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1906
- *
1907
- * @param name - the name of the secret
1908
- * @returns map of key name to key info the secret is encrypted
1909
- * with, or null if it is not present or not encrypted with a trusted
1910
- * key
1911
- *
1912
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
1913
- */
1914
- isSecretStored(name) {
1915
- return this.secretStorage.isStored(name);
1916
- }
1917
-
1918
- /**
1919
- * Request a secret from another device.
1920
- *
1921
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1922
- *
1923
- * @param name - the name of the secret to request
1924
- * @param devices - the devices to request the secret from
1925
- *
1926
- * @returns the secret request object
1927
- * @deprecated Not supported for Rust Cryptography.
1928
- */
1929
- requestSecret(name, devices) {
1930
- if (!this.crypto) {
1931
- throw new Error("End-to-end encryption disabled");
1932
- }
1933
- return this.crypto.requestSecret(name, devices);
1934
- }
1935
-
1936
- /**
1937
- * Get the current default key ID for encrypting secrets.
1938
- *
1939
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1940
- *
1941
- * @returns The default key ID or null if no default key ID is set
1942
- *
1943
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
1944
- */
1945
- getDefaultSecretStorageKeyId() {
1946
- return this.secretStorage.getDefaultKeyId();
1947
- }
1948
-
1949
- /**
1950
- * Set the current default key ID for encrypting secrets.
1951
- *
1952
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1953
- *
1954
- * @param keyId - The new default key ID
1955
- *
1956
- * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
1957
- */
1958
- setDefaultSecretStorageKeyId(keyId) {
1959
- return this.secretStorage.setDefaultKeyId(keyId);
1960
- }
1961
-
1962
- /**
1963
- * Checks that a given secret storage private key matches a given public key.
1964
- * This can be used by the getSecretStorageKey callback to verify that the
1965
- * private key it is about to supply is the one that was requested.
1966
- *
1967
- * The Secure Secret Storage API is currently UNSTABLE and may change without notice.
1968
- *
1969
- * @param privateKey - The private key
1970
- * @param expectedPublicKey - The public key
1971
- * @returns true if the key matches, otherwise false
1972
- *
1973
- * @deprecated The use of asymmetric keys for SSSS is deprecated.
1974
- * Use {@link SecretStorage.ServerSideSecretStorage#checkKey} for symmetric keys.
1975
- */
1976
- checkSecretStoragePrivateKey(privateKey, expectedPublicKey) {
1977
- if (!this.crypto) {
1978
- throw new Error("End-to-end encryption disabled");
1979
- }
1980
- return this.crypto.checkSecretStoragePrivateKey(privateKey, expectedPublicKey);
1981
- }
1982
-
1983
- /**
1984
- * Get e2e information on the device that sent an event
1985
- *
1986
- * @param event - event to be checked
1987
- * @deprecated Not supported for Rust Cryptography.
1988
- */
1989
- getEventSenderDeviceInfo(event) {
1990
- var _this15 = this;
1991
- return _asyncToGenerator(function* () {
1992
- if (!_this15.crypto) {
1993
- return null;
1994
- }
1995
- return _this15.crypto.getEventSenderDeviceInfo(event);
1996
- })();
1997
- }
1998
-
1999
- /**
2000
- * Check if the sender of an event is verified
2001
- *
2002
- * @param event - event to be checked
2003
- *
2004
- * @returns true if the sender of this event has been verified using
2005
- * {@link MatrixClient#setDeviceVerified}.
2006
- *
2007
- * @deprecated Not supported for Rust Cryptography.
2008
- */
2009
- isEventSenderVerified(event) {
2010
- var _this16 = this;
2011
- return _asyncToGenerator(function* () {
2012
- var device = yield _this16.getEventSenderDeviceInfo(event);
2013
- if (!device) {
2014
- return false;
2015
- }
2016
- return device.isVerified();
2017
- })();
2018
- }
2019
-
2020
- /**
2021
- * Get outgoing room key request for this event if there is one.
2022
- * @param event - The event to check for
2023
- *
2024
- * @returns A room key request, or null if there is none
2025
- *
2026
- * @deprecated Not supported for Rust Cryptography.
2027
- */
2028
- getOutgoingRoomKeyRequest(event) {
2029
- if (!this.crypto) {
2030
- throw new Error("End-to-End encryption disabled");
2031
- }
2032
- var wireContent = event.getWireContent();
2033
- var requestBody = {
2034
- session_id: wireContent.session_id,
2035
- sender_key: wireContent.sender_key,
2036
- algorithm: wireContent.algorithm,
2037
- room_id: event.getRoomId()
2038
- };
2039
- if (!requestBody.session_id || !requestBody.sender_key || !requestBody.algorithm || !requestBody.room_id) {
2040
- return Promise.resolve(null);
2041
- }
2042
- return this.crypto.cryptoStore.getOutgoingRoomKeyRequest(requestBody);
2043
- }
2044
-
2045
- /**
2046
- * Cancel a room key request for this event if one is ongoing and resend the
2047
- * request.
2048
- * @param event - event of which to cancel and resend the room
2049
- * key request.
2050
- * @returns A promise that will resolve when the key request is queued
2051
- *
2052
- * @deprecated Not supported for Rust Cryptography.
2053
- */
2054
- cancelAndResendEventRoomKeyRequest(event) {
2055
- if (!this.crypto) {
2056
- throw new Error("End-to-End encryption disabled");
2057
- }
2058
- return event.cancelAndResendKeyRequest(this.crypto, this.getUserId());
2059
- }
2060
-
2061
- /**
2062
- * Enable end-to-end encryption for a room. This does not modify room state.
2063
- * Any messages sent before the returned promise resolves will be sent unencrypted.
2064
- * @param roomId - The room ID to enable encryption in.
2065
- * @param config - The encryption config for the room.
2066
- * @returns A promise that will resolve when encryption is set up.
2067
- *
2068
- * @deprecated Not supported for Rust Cryptography. To enable encryption in a room, send an `m.room.encryption`
2069
- * state event.
2070
- */
2071
- setRoomEncryption(roomId, config) {
2072
- if (!this.crypto) {
2073
- throw new Error("End-to-End encryption disabled");
2074
- }
2075
- return this.crypto.setRoomEncryption(roomId, config);
2076
- }
2077
-
2078
- /**
2079
- * Whether encryption is enabled for a room.
2080
- * @param roomId - the room id to query.
2081
- * @returns whether encryption is enabled.
2082
- *
2083
- * @deprecated Not correctly supported for Rust Cryptography. Use {@link CryptoApi.isEncryptionEnabledInRoom} and/or
2084
- * {@link Room.hasEncryptionStateEvent}.
2085
- */
2086
- isRoomEncrypted(roomId) {
2087
- var _this$crypto$isRoomEn, _this$crypto3;
2088
- var room = this.getRoom(roomId);
2089
- if (!room) {
2090
- // we don't know about this room, so can't determine if it should be
2091
- // encrypted. Let's assume not.
2092
- return false;
2093
- }
2094
-
2095
- // if there is an 'm.room.encryption' event in this room, it should be
2096
- // encrypted (independently of whether we actually support encryption)
2097
- if (room.hasEncryptionStateEvent()) {
2098
- return true;
2099
- }
2100
-
2101
- // we don't have an m.room.encrypted event, but that might be because
2102
- // the server is hiding it from us. Check the store to see if it was
2103
- // previously encrypted.
2104
- return (_this$crypto$isRoomEn = (_this$crypto3 = this.crypto) === null || _this$crypto3 === void 0 ? void 0 : _this$crypto3.isRoomEncrypted(roomId)) !== null && _this$crypto$isRoomEn !== void 0 ? _this$crypto$isRoomEn : false;
2105
- }
2106
-
2107
- /**
2108
- * Encrypts and sends a given object via Olm to-device messages to a given
2109
- * set of devices.
2110
- *
2111
- * @param userDeviceInfoArr - list of deviceInfo objects representing the devices to send to
2112
- *
2113
- * @param payload - fields to include in the encrypted payload
2114
- *
2115
- * @returns Promise which
2116
- * resolves once the message has been encrypted and sent to the given
2117
- * userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
2118
- * of the successfully sent messages.
2119
- *
2120
- * @deprecated Instead use {@link CryptoApi.encryptToDeviceMessages} followed by {@link queueToDevice}.
2121
- */
2122
- encryptAndSendToDevices(userDeviceInfoArr, payload) {
2123
- if (!this.crypto) {
2124
- throw new Error("End-to-End encryption disabled");
2125
- }
2126
- return this.crypto.encryptAndSendToDevices(userDeviceInfoArr, payload);
2127
- }
2128
-
2129
- /**
2130
- * Forces the current outbound group session to be discarded such
2131
- * that another one will be created next time an event is sent.
2132
- *
2133
- * @param roomId - The ID of the room to discard the session for
2134
- *
2135
- * @deprecated Prefer {@link CryptoApi.forceDiscardSession | `CryptoApi.forceDiscardSession`}:
2136
- */
2137
- forceDiscardSession(roomId) {
2138
- if (!this.cryptoBackend) {
2139
- throw new Error("End-to-End encryption disabled");
2140
- }
2141
- this.cryptoBackend.forceDiscardSession(roomId);
2142
- }
2143
-
2144
- /**
2145
- * Get a list containing all of the room keys
2146
- *
2147
- * This should be encrypted before returning it to the user.
2148
- *
2149
- * @returns a promise which resolves to a list of session export objects
2150
- *
2151
- * @deprecated Prefer {@link CryptoApi.exportRoomKeys | `CryptoApi.exportRoomKeys`}:
2152
- *
2153
- * ```javascript
2154
- * sessionData = await client.getCrypto().exportRoomKeys();
2155
- * ```
2156
- */
2157
- exportRoomKeys() {
2158
- if (!this.cryptoBackend) {
2159
- return Promise.reject(new Error("End-to-end encryption disabled"));
2160
- }
2161
- return this.cryptoBackend.exportRoomKeys();
2162
- }
2163
-
2164
- /**
2165
- * Import a list of room keys previously exported by exportRoomKeys
2166
- *
2167
- * @param keys - a list of session export objects
2168
- * @param opts - options object
2169
- *
2170
- * @returns a promise which resolves when the keys have been imported
2171
- *
2172
- * @deprecated Prefer {@link CryptoApi.importRoomKeys | `CryptoApi.importRoomKeys`}:
2173
- * ```javascript
2174
- * await client.getCrypto()?.importRoomKeys([..]);
2175
- * ```
2176
- */
2177
- importRoomKeys(keys, opts) {
2178
- if (!this.cryptoBackend) {
2179
- throw new Error("End-to-end encryption disabled");
2180
- }
2181
- return this.cryptoBackend.importRoomKeys(keys, opts);
2182
- }
2183
-
2184
- /**
2185
- * Force a re-check of the local key backup status against
2186
- * what's on the server.
2187
- *
2188
- * @returns Object with backup info (as returned by
2189
- * getKeyBackupVersion) in backupInfo and
2190
- * trust information (as returned by isKeyBackupTrusted)
2191
- * in trustInfo.
2192
- *
2193
- * @deprecated Prefer {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
2194
- */
2195
- checkKeyBackup() {
2196
- if (!this.crypto) {
2197
- throw new Error("End-to-end encryption disabled");
2198
- }
2199
- return this.crypto.backupManager.checkKeyBackup();
2200
- }
2201
-
2202
- /**
2203
- * Get information about the current key backup from the server.
2204
- *
2205
- * Performs some basic validity checks on the shape of the result, and raises an error if it is not as expected.
2206
- *
2207
- * **Note**: there is no (supported) way to distinguish between "failure to talk to the server" and "another client
2208
- * uploaded a key backup version using an algorithm I don't understand.
2209
- *
2210
- * @returns Information object from API, or null if no backup is present on the server.
2211
- *
2212
- * @deprecated Prefer {@link CryptoApi.getKeyBackupInfo}.
2213
- */
2214
- getKeyBackupVersion() {
2215
- var _this17 = this;
2216
- return _asyncToGenerator(function* () {
2217
- var res;
2218
- try {
2219
- res = yield _this17.http.authedRequest(Method.Get, "/room_keys/version", undefined, undefined, {
2220
- prefix: ClientPrefix.V3
2221
- });
2222
- } catch (e) {
2223
- if (e.errcode === "M_NOT_FOUND") {
2224
- return null;
2225
- } else {
2226
- throw e;
2227
- }
2228
- }
2229
- BackupManager.checkBackupVersion(res);
2230
- return res;
2231
- })();
2232
- }
2233
-
2234
- /**
2235
- * @param info - key backup info dict from getKeyBackupVersion()
2236
- *
2237
- * @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.isKeyBackupTrusted | `CryptoApi.isKeyBackupTrusted`}.
2238
- */
2239
- isKeyBackupTrusted(info) {
2240
- if (!this.crypto) {
2241
- throw new Error("End-to-end encryption disabled");
2242
- }
2243
- return this.crypto.backupManager.isKeyBackupTrusted(info);
2244
- }
2245
-
2246
- /**
2247
- * @returns true if the client is configured to back up keys to
2248
- * the server, otherwise false. If we haven't completed a successful check
2249
- * of key backup status yet, returns null.
2250
- *
2251
- * @deprecated Not supported for Rust Cryptography. Prefer direct access to {@link Crypto.CryptoApi.getActiveSessionBackupVersion}:
2252
- *
2253
- * ```javascript
2254
- * let enabled = (await client.getCrypto().getActiveSessionBackupVersion()) !== null;
2255
- * ```
2256
- */
2257
- getKeyBackupEnabled() {
2258
- if (!this.crypto) {
2259
- throw new Error("End-to-end encryption disabled");
2260
- }
2261
- return this.crypto.backupManager.getKeyBackupEnabled();
2262
- }
2263
-
2264
- /**
2265
- * Enable backing up of keys, using data previously returned from
2266
- * getKeyBackupVersion.
2267
- *
2268
- * @param info - Backup information object as returned by getKeyBackupVersion
2269
- * @returns Promise which resolves when complete.
2270
- *
2271
- * @deprecated Do not call this directly. Instead call {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
2272
- */
2273
- enableKeyBackup(info) {
2274
- if (!this.crypto) {
2275
- throw new Error("End-to-end encryption disabled");
2276
- }
2277
- return this.crypto.backupManager.enableKeyBackup(info);
2278
- }
2279
-
2280
- /**
2281
- * Disable backing up of keys.
2282
- *
2283
- * @deprecated Not supported for Rust Cryptography. It should be unnecessary to disable key backup.
2284
- */
2285
- disableKeyBackup() {
2286
- if (!this.crypto) {
2287
- throw new Error("End-to-end encryption disabled");
2288
- }
2289
- this.crypto.backupManager.disableKeyBackup();
2290
- }
2291
-
2292
- /**
2293
- * Set up the data required to create a new backup version. The backup version
2294
- * will not be created and enabled until createKeyBackupVersion is called.
2295
- *
2296
- * @param password - Passphrase string that can be entered by the user
2297
- * when restoring the backup as an alternative to entering the recovery key.
2298
- * Optional.
2299
- *
2300
- * @returns Object that can be passed to createKeyBackupVersion and
2301
- * additionally has a 'recovery_key' member with the user-facing recovery key string.
2302
- *
2303
- * @deprecated Not supported for Rust cryptography. Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
2304
- */
2305
- prepareKeyBackupVersion(password) {
2306
- var _arguments2 = arguments,
2307
- _this18 = this;
2308
- return _asyncToGenerator(function* () {
2309
- var opts = _arguments2.length > 1 && _arguments2[1] !== undefined ? _arguments2[1] : {
2310
- secureSecretStorage: false
2311
- };
2312
- if (!_this18.crypto) {
2313
- throw new Error("End-to-end encryption disabled");
2314
- }
2315
-
2316
- // eslint-disable-next-line camelcase
2317
- var {
2318
- algorithm,
2319
- auth_data,
2320
- recovery_key,
2321
- privateKey
2322
- } = yield _this18.crypto.backupManager.prepareKeyBackupVersion(password);
2323
- if (opts.secureSecretStorage) {
2324
- yield _this18.secretStorage.store("m.megolm_backup.v1", encodeBase64(privateKey));
2325
- _this18.logger.info("Key backup private key stored in secret storage");
2326
- }
2327
- return {
2328
- algorithm,
2329
- /* eslint-disable camelcase */
2330
- auth_data,
2331
- recovery_key
2332
- /* eslint-enable camelcase */
2333
- };
2334
- })();
2335
- }
2336
-
2337
- /**
2338
- * Check whether the key backup private key is stored in secret storage.
2339
- * @returns map of key name to key info the secret is
2340
- * encrypted with, or null if it is not present or not encrypted with a
2341
- * trusted key
2342
- */
2343
- isKeyBackupKeyStored() {
2344
- return Promise.resolve(this.secretStorage.isStored("m.megolm_backup.v1"));
2345
- }
2346
-
2347
- /**
2348
- * Create a new key backup version and enable it, using the information return
2349
- * from prepareKeyBackupVersion.
2350
- *
2351
- * @param info - Info object from prepareKeyBackupVersion
2352
- * @returns Object with 'version' param indicating the version created
2353
- *
2354
- * @deprecated Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
2355
- */
2356
- createKeyBackupVersion(info) {
2357
- var _this19 = this;
2358
- return _asyncToGenerator(function* () {
2359
- if (!_this19.crypto) {
2360
- throw new Error("End-to-end encryption disabled");
2361
- }
2362
- yield _this19.crypto.backupManager.createKeyBackupVersion(info);
2363
- var data = {
2364
- algorithm: info.algorithm,
2365
- auth_data: info.auth_data
2366
- };
2367
-
2368
- // Sign the backup auth data with the device key for backwards compat with
2369
- // older devices with cross-signing. This can probably go away very soon in
2370
- // favour of just signing with the cross-singing master key.
2371
- // XXX: Private member access
2372
- yield _this19.crypto.signObject(data.auth_data);
2373
- if (_this19.cryptoCallbacks.getCrossSigningKey &&
2374
- // XXX: Private member access
2375
- _this19.crypto.crossSigningInfo.getId()) {
2376
- // now also sign the auth data with the cross-signing master key
2377
- // we check for the callback explicitly here because we still want to be able
2378
- // to create an un-cross-signed key backup if there is a cross-signing key but
2379
- // no callback supplied.
2380
- // XXX: Private member access
2381
- yield _this19.crypto.crossSigningInfo.signObject(data.auth_data, "master");
2382
- }
2383
- var res = yield _this19.http.authedRequest(Method.Post, "/room_keys/version", undefined, data);
2384
-
2385
- // We could assume everything's okay and enable directly, but this ensures
2386
- // we run the same signature verification that will be used for future
2387
- // sessions.
2388
- yield _this19.checkKeyBackup();
2389
- if (!_this19.getKeyBackupEnabled()) {
2390
- _this19.logger.error("Key backup not usable even though we just created it");
2391
- }
2392
- return res;
2393
- })();
2394
- }
2395
-
2396
- /**
2397
- * @deprecated Use {@link Crypto.CryptoApi.deleteKeyBackupVersion | `CryptoApi.deleteKeyBackupVersion`}.
2398
- */
2399
- deleteKeyBackupVersion(version) {
2400
- var _this20 = this;
2401
- return _asyncToGenerator(function* () {
2402
- if (!_this20.cryptoBackend) {
2403
- throw new Error("End-to-end encryption disabled");
2404
- }
2405
- yield _this20.cryptoBackend.deleteKeyBackupVersion(version);
2406
- })();
2407
- }
2408
- makeKeyBackupPath(roomId, sessionId, version) {
2409
- var path;
2410
- if (sessionId !== undefined) {
2411
- path = utils.encodeUri("/room_keys/keys/$roomId/$sessionId", {
2412
- $roomId: roomId,
2413
- $sessionId: sessionId
2414
- });
2415
- } else if (roomId !== undefined) {
2416
- path = utils.encodeUri("/room_keys/keys/$roomId", {
2417
- $roomId: roomId
2418
- });
2419
- } else {
2420
- path = "/room_keys/keys";
2421
- }
2422
- var queryData = version === undefined ? undefined : {
2423
- version
2424
- };
2425
- return {
2426
- path,
2427
- queryData
2428
- };
2429
- }
2430
-
2431
- /**
2432
- * Back up session keys to the homeserver.
2433
- * @param roomId - ID of the room that the keys are for Optional.
2434
- * @param sessionId - ID of the session that the keys are for Optional.
2435
- * @param version - backup version Optional.
2436
- * @param data - Object keys to send
2437
- * @returns a promise that will resolve when the keys
2438
- * are uploaded
2439
- *
2440
- * @deprecated Not supported for Rust Cryptography.
2441
- */
2442
-
2443
- sendKeyBackup(roomId, sessionId, version, data) {
2444
- var _this21 = this;
2445
- return _asyncToGenerator(function* () {
2446
- if (!_this21.crypto) {
2447
- throw new Error("End-to-end encryption disabled");
2448
- }
2449
- var path = _this21.makeKeyBackupPath(roomId, sessionId, version);
2450
- yield _this21.http.authedRequest(Method.Put, path.path, path.queryData, data, {
2451
- prefix: ClientPrefix.V3
2452
- });
2453
- })();
2454
- }
2455
-
2456
- /**
2457
- * Marks all group sessions as needing to be backed up and schedules them to
2458
- * upload in the background as soon as possible.
2459
- *
2460
- * @deprecated Not supported for Rust Cryptography. This is done automatically as part of
2461
- * {@link CryptoApi.resetKeyBackup}, so there is probably no need to call this manually.
2462
- */
2463
- scheduleAllGroupSessionsForBackup() {
2464
- var _this22 = this;
2465
- return _asyncToGenerator(function* () {
2466
- if (!_this22.crypto) {
2467
- throw new Error("End-to-end encryption disabled");
2468
- }
2469
- yield _this22.crypto.backupManager.scheduleAllGroupSessionsForBackup();
2470
- })();
2471
- }
2472
-
2473
- /**
2474
- * Marks all group sessions as needing to be backed up without scheduling
2475
- * them to upload in the background.
2476
- *
2477
- * (This is done automatically as part of {@link CryptoApi.resetKeyBackup},
2478
- * so there is probably no need to call this manually.)
2479
- *
2480
- * @returns Promise which resolves to the number of sessions requiring a backup.
2481
- * @deprecated Not supported for Rust Cryptography.
2482
- */
2483
- flagAllGroupSessionsForBackup() {
2484
- if (!this.crypto) {
2485
- throw new Error("End-to-end encryption disabled");
2486
- }
2487
- return this.crypto.backupManager.flagAllGroupSessionsForBackup();
2488
- }
2489
-
2490
- /**
2491
- * Return true if recovery key is valid.
2492
- * Try to decode the recovery key and check if it's successful.
2493
- * @param recoveryKey
2494
- * @deprecated Use {@link decodeRecoveryKey} directly
2495
- */
2496
- isValidRecoveryKey(recoveryKey) {
2497
- try {
2498
- decodeRecoveryKey(recoveryKey);
2499
- return true;
2500
- } catch (_unused2) {
2501
- return false;
2502
- }
2503
- }
2504
-
2505
- /**
2506
- * Get the raw key for a key backup from the password
2507
- * Used when migrating key backups into SSSS
2508
- *
2509
- * The cross-signing API is currently UNSTABLE and may change without notice.
2510
- *
2511
- * @param password - Passphrase
2512
- * @param backupInfo - Backup metadata from `checkKeyBackup`
2513
- * @returns key backup key
2514
- * @deprecated Deriving a backup key from a passphrase is not part of the matrix spec. Instead, a random key is generated and stored/shared via 4S.
2515
- */
2516
- keyBackupKeyFromPassword(password, backupInfo) {
2517
- return keyFromAuthData(backupInfo.auth_data, password);
2518
- }
2519
-
2520
- /**
2521
- * Get the raw key for a key backup from the recovery key
2522
- * Used when migrating key backups into SSSS
2523
- *
2524
- * The cross-signing API is currently UNSTABLE and may change without notice.
2525
- *
2526
- * @param recoveryKey - The recovery key
2527
- * @returns key backup key
2528
- * @deprecated Use {@link decodeRecoveryKey} directly
2529
- */
2530
- keyBackupKeyFromRecoveryKey(recoveryKey) {
2531
- return decodeRecoveryKey(recoveryKey);
2532
- }
2533
-
2534
- /**
2535
- * Restore from an existing key backup via a passphrase.
2536
- *
2537
- * @param password - Passphrase
2538
- * @param targetRoomId - Room ID to target a specific room.
2539
- * Restores all rooms if omitted.
2540
- * @param targetSessionId - Session ID to target a specific session.
2541
- * Restores all sessions if omitted.
2542
- * @param backupInfo - Backup metadata from `getKeyBackupVersion` or `checkKeyBackup`.`backupInfo`
2543
- * @param opts - Optional params such as callbacks
2544
- * @returns Status of restoration with `total` and `imported`
2545
- * key counts.
2546
- *
2547
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
2548
- */
2549
-
2550
- /**
2551
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
2552
- */
2553
-
2554
- /**
2555
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
2556
- */
2557
-
2558
- /**
2559
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
2560
- */
2561
- restoreKeyBackupWithPassword(password, targetRoomId, targetSessionId, backupInfo, opts) {
2562
- var _this23 = this;
2563
- return _asyncToGenerator(function* () {
2564
- var privKey = yield keyFromAuthData(backupInfo.auth_data, password);
2565
- return _this23.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
2566
- })();
2567
- }
2568
-
2569
- /**
2570
- * Restore from an existing key backup via a private key stored in secret
2571
- * storage.
2572
- *
2573
- * @param backupInfo - Backup metadata from `checkKeyBackup`
2574
- * @param targetRoomId - Room ID to target a specific room.
2575
- * Restores all rooms if omitted.
2576
- * @param targetSessionId - Session ID to target a specific session.
2577
- * Restores all sessions if omitted.
2578
- * @param opts - Optional params such as callbacks
2579
- * @returns Status of restoration with `total` and `imported`
2580
- * key counts.
2581
- *
2582
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2583
- */
2584
- restoreKeyBackupWithSecretStorage(backupInfo, targetRoomId, targetSessionId, opts) {
2585
- var _this24 = this;
2586
- return _asyncToGenerator(function* () {
2587
- if (!_this24.cryptoBackend) {
2588
- throw new Error("End-to-end encryption disabled");
2589
- }
2590
- var storedKey = yield _this24.secretStorage.get("m.megolm_backup.v1");
2591
-
2592
- // ensure that the key is in the right format. If not, fix the key and
2593
- // store the fixed version
2594
- var fixedKey = fixBackupKey(storedKey);
2595
- if (fixedKey) {
2596
- var keys = yield _this24.secretStorage.getKey();
2597
- yield _this24.secretStorage.store("m.megolm_backup.v1", fixedKey, [keys[0]]);
2598
- }
2599
- var privKey = decodeBase64(fixedKey || storedKey);
2600
- return _this24.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
2601
- })();
2602
- }
2603
-
2604
- /**
2605
- * Restore from an existing key backup via an encoded recovery key.
2606
- *
2607
- * @param recoveryKey - Encoded recovery key
2608
- * @param targetRoomId - Room ID to target a specific room.
2609
- * Restores all rooms if omitted.
2610
- * @param targetSessionId - Session ID to target a specific session.
2611
- * Restores all sessions if omitted.
2612
- * @param backupInfo - Backup metadata from `checkKeyBackup`
2613
- * @param opts - Optional params such as callbacks
2614
- * @returns Status of restoration with `total` and `imported`
2615
- * key counts.
2616
- *
2617
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2618
- */
2619
-
2620
- /**
2621
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2622
- */
2623
-
2624
- /**
2625
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2626
- */
2627
-
2628
- /**
2629
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2630
- */
2631
- restoreKeyBackupWithRecoveryKey(recoveryKey, targetRoomId, targetSessionId, backupInfo, opts) {
2632
- var privKey = decodeRecoveryKey(recoveryKey);
2633
- return this.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
2634
- }
2635
-
2636
- /**
2637
- * Restore from an existing key backup via a private key stored locally
2638
- * @param targetRoomId
2639
- * @param targetSessionId
2640
- * @param backupInfo
2641
- * @param opts
2642
- *
2643
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2644
- */
2645
-
2646
- /**
2647
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2648
- */
2649
-
2650
- /**
2651
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2652
- */
2653
-
2654
- /**
2655
- * @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
2656
- */
2657
- restoreKeyBackupWithCache(targetRoomId, targetSessionId, backupInfo, opts) {
2658
- var _this25 = this;
2659
- return _asyncToGenerator(function* () {
2660
- if (!_this25.cryptoBackend) {
2661
- throw new Error("End-to-end encryption disabled");
2662
- }
2663
- var privKey = yield _this25.cryptoBackend.getSessionBackupPrivateKey();
2664
- if (!privKey) {
2665
- throw new Error("Couldn't get key");
2666
- }
2667
- return _this25.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
2668
- })();
2669
- }
2670
- restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts) {
2671
- var _this26 = this;
2672
- return _asyncToGenerator(function* () {
2673
- var cacheCompleteCallback = opts === null || opts === void 0 ? void 0 : opts.cacheCompleteCallback;
2674
- var progressCallback = opts === null || opts === void 0 ? void 0 : opts.progressCallback;
2675
- if (!_this26.cryptoBackend) {
2676
- throw new Error("End-to-end encryption disabled");
2677
- }
2678
- if (!backupInfo.version) {
2679
- throw new Error("Backup version must be defined");
2680
- }
2681
- var backupVersion = backupInfo.version;
2682
- var totalKeyCount = 0;
2683
- var totalFailures = 0;
2684
- var totalImported = 0;
2685
- var path = _this26.makeKeyBackupPath(targetRoomId, targetSessionId, backupVersion);
2686
- var backupDecryptor = yield _this26.cryptoBackend.getBackupDecryptor(backupInfo, privKey);
2687
- var untrusted = !backupDecryptor.sourceTrusted;
2688
- try {
2689
- if (!(privKey instanceof Uint8Array)) {
2690
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
2691
- throw new Error("restoreKeyBackup expects Uint8Array, got ".concat(privKey));
2692
- }
2693
- // Cache the key, if possible.
2694
- // This is async.
2695
- _this26.cryptoBackend.storeSessionBackupPrivateKey(privKey, backupVersion).catch(e => {
2696
- _this26.logger.warn("Error caching session backup key:", e);
2697
- }).then(cacheCompleteCallback);
2698
- if (progressCallback) {
2699
- progressCallback({
2700
- stage: "fetch"
2701
- });
2702
- }
2703
- var res = yield _this26.http.authedRequest(Method.Get, path.path, path.queryData, undefined, {
2704
- prefix: ClientPrefix.V3
2705
- });
2706
-
2707
- // We have finished fetching the backup, go to next step
2708
- if (progressCallback) {
2709
- progressCallback({
2710
- stage: "load_keys"
2711
- });
2712
- }
2713
- if (res.rooms) {
2714
- // We have a full backup here, it can get quite big, so we need to decrypt and import it in chunks.
2715
-
2716
- // Get the total count as a first pass
2717
- totalKeyCount = _this26.getTotalKeyCount(res);
2718
- // Now decrypt and import the keys in chunks
2719
- yield _this26.handleDecryptionOfAFullBackup(res, backupDecryptor, 200, /*#__PURE__*/function () {
2720
- var _ref3 = _asyncToGenerator(function* (chunk) {
2721
- // We have a chunk of decrypted keys: import them
2722
- try {
2723
- var _backupVersion = backupInfo.version;
2724
- yield _this26.cryptoBackend.importBackedUpRoomKeys(chunk, _backupVersion, {
2725
- untrusted
2726
- });
2727
- totalImported += chunk.length;
2728
- } catch (e) {
2729
- totalFailures += chunk.length;
2730
- // We failed to import some keys, but we should still try to import the rest?
2731
- // Log the error and continue
2732
- logger.error("Error importing keys from backup", e);
2733
- }
2734
- if (progressCallback) {
2735
- progressCallback({
2736
- total: totalKeyCount,
2737
- successes: totalImported,
2738
- stage: "load_keys",
2739
- failures: totalFailures
2740
- });
2741
- }
2742
- });
2743
- return function (_x2) {
2744
- return _ref3.apply(this, arguments);
2745
- };
2746
- }());
2747
- } else if (res.sessions) {
2748
- // For now we don't chunk for a single room backup, but we could in the future.
2749
- // Currently it is not used by the application.
2750
- var sessions = res.sessions;
2751
- totalKeyCount = Object.keys(sessions).length;
2752
- var keys = yield backupDecryptor.decryptSessions(sessions);
2753
- for (var _k of keys) {
2754
- _k.room_id = targetRoomId;
2755
- }
2756
- yield _this26.cryptoBackend.importBackedUpRoomKeys(keys, backupVersion, {
2757
- progressCallback,
2758
- untrusted
2759
- });
2760
- totalImported = keys.length;
2761
- } else {
2762
- totalKeyCount = 1;
2763
- try {
2764
- var [_key2] = yield backupDecryptor.decryptSessions({
2765
- [targetSessionId]: res
2766
- });
2767
- _key2.room_id = targetRoomId;
2768
- _key2.session_id = targetSessionId;
2769
- yield _this26.cryptoBackend.importBackedUpRoomKeys([_key2], backupVersion, {
2770
- progressCallback,
2771
- untrusted
2772
- });
2773
- totalImported = 1;
2774
- } catch (e) {
2775
- _this26.logger.debug("Failed to decrypt megolm session from backup", e);
2776
- }
2777
- }
2778
- } finally {
2779
- backupDecryptor.free();
2780
- }
2781
-
2782
- /// in case entering the passphrase would add a new signature?
2783
- yield _this26.cryptoBackend.checkKeyBackupAndEnable();
2784
- return {
2785
- total: totalKeyCount,
2786
- imported: totalImported
2787
- };
565
+ * Gets the cached capabilities of the homeserver, returning cached ones if available.
566
+ * If there are no cached capabilities and none can be fetched, throw an exception.
567
+ *
568
+ * @returns Promise resolving with The capabilities of the homeserver
569
+ */
570
+ getCapabilities() {
571
+ var _this3 = this;
572
+ return _asyncToGenerator(function* () {
573
+ var caps = _this3.serverCapabilitiesService.getCachedCapabilities();
574
+ if (caps) return caps;
575
+ return _this3.serverCapabilitiesService.fetchCapabilities();
2788
576
  })();
2789
577
  }
2790
578
 
2791
579
  /**
2792
- * This method calculates the total number of keys present in the response of a `/room_keys/keys` call.
2793
- *
2794
- * @param res - The response from the server containing the keys to be counted.
580
+ * Gets the cached capabilities of the homeserver. If none have been fetched yet,
581
+ * return undefined.
2795
582
  *
2796
- * @returns The total number of keys in the backup.
2797
- */
2798
- getTotalKeyCount(res) {
2799
- var rooms = res.rooms;
2800
- var totalKeyCount = 0;
2801
- for (var roomData of Object.values(rooms)) {
2802
- if (!roomData.sessions) continue;
2803
- totalKeyCount += Object.keys(roomData.sessions).length;
2804
- }
2805
- return totalKeyCount;
583
+ * @returns The capabilities of the homeserver
584
+ */
585
+ getCachedCapabilities() {
586
+ return this.serverCapabilitiesService.getCachedCapabilities();
2806
587
  }
2807
588
 
2808
589
  /**
2809
- * This method handles the decryption of a full backup, i.e a call to `/room_keys/keys`.
2810
- * It will decrypt the keys in chunks and call the `block` callback for each chunk.
2811
- *
2812
- * @param res - The response from the server containing the keys to be decrypted.
2813
- * @param backupDecryptor - An instance of the BackupDecryptor class used to decrypt the keys.
2814
- * @param chunkSize - The size of the chunks to be processed at a time.
2815
- * @param block - A callback function that is called for each chunk of keys.
590
+ * Fetches the latest capabilities from the homeserver, ignoring any cached
591
+ * versions. The newly returned version is cached.
2816
592
  *
2817
- * @returns A promise that resolves when the decryption is complete.
593
+ * @returns A promise which resolves to the capabilities of the homeserver
2818
594
  */
2819
- handleDecryptionOfAFullBackup(res, backupDecryptor, chunkSize, block) {
2820
- return _asyncToGenerator(function* () {
2821
- var rooms = res.rooms;
2822
- var groupChunkCount = 0;
2823
- var chunkGroupByRoom = new Map();
2824
- var handleChunkCallback = /*#__PURE__*/function () {
2825
- var _ref4 = _asyncToGenerator(function* (roomChunks) {
2826
- var currentChunk = [];
2827
- for (var _roomId of roomChunks.keys()) {
2828
- var decryptedSessions = yield backupDecryptor.decryptSessions(roomChunks.get(_roomId));
2829
- for (var _sessionId in decryptedSessions) {
2830
- var _k2 = decryptedSessions[_sessionId];
2831
- _k2.room_id = _roomId;
2832
- currentChunk.push(_k2);
2833
- }
2834
- }
2835
- yield block(currentChunk);
2836
- });
2837
- return function handleChunkCallback(_x3) {
2838
- return _ref4.apply(this, arguments);
2839
- };
2840
- }();
2841
- for (var [_roomId2, roomData] of Object.entries(rooms)) {
2842
- if (!roomData.sessions) continue;
2843
- chunkGroupByRoom.set(_roomId2, {});
2844
- for (var [_sessionId2, session] of Object.entries(roomData.sessions)) {
2845
- var sessionsForRoom = chunkGroupByRoom.get(_roomId2);
2846
- sessionsForRoom[_sessionId2] = session;
2847
- groupChunkCount += 1;
2848
- if (groupChunkCount >= chunkSize) {
2849
- // We have enough chunks to decrypt
2850
- yield handleChunkCallback(chunkGroupByRoom);
2851
- chunkGroupByRoom = new Map();
2852
- // There might be remaining keys for that room, so add back an entry for the current room.
2853
- chunkGroupByRoom.set(_roomId2, {});
2854
- groupChunkCount = 0;
2855
- }
2856
- }
2857
- }
2858
-
2859
- // Handle remaining chunk if needed
2860
- if (groupChunkCount > 0) {
2861
- yield handleChunkCallback(chunkGroupByRoom);
2862
- }
2863
- })();
595
+ fetchCapabilities() {
596
+ return this.serverCapabilitiesService.fetchCapabilities();
2864
597
  }
2865
- deleteKeysFromBackup(roomId, sessionId, version) {
2866
- var _this27 = this;
598
+
599
+ /**
600
+ * @deprecated Does nothing.
601
+ */
602
+ uploadKeys() {
603
+ var _this4 = this;
2867
604
  return _asyncToGenerator(function* () {
2868
- var path = _this27.makeKeyBackupPath(roomId, sessionId, version);
2869
- yield _this27.http.authedRequest(Method.Delete, path.path, path.queryData, undefined, {
2870
- prefix: ClientPrefix.V3
2871
- });
605
+ _this4.logger.warn("MatrixClient.uploadKeys is deprecated");
2872
606
  })();
2873
607
  }
2874
608
 
@@ -2990,10 +724,10 @@ export class MatrixClient extends TypedEventEmitter {
2990
724
  * @returns Rejects: with an error response.
2991
725
  */
2992
726
  getAccountDataFromServer(eventType) {
2993
- var _this28 = this;
727
+ var _this5 = this;
2994
728
  return _asyncToGenerator(function* () {
2995
- if (_this28.isInitialSyncComplete()) {
2996
- var _event = _this28.store.getAccountData(eventType);
729
+ if (_this5.isInitialSyncComplete()) {
730
+ var _event = _this5.store.getAccountData(eventType);
2997
731
  if (!_event) {
2998
732
  return null;
2999
733
  }
@@ -3002,11 +736,11 @@ export class MatrixClient extends TypedEventEmitter {
3002
736
  return _event.getContent();
3003
737
  }
3004
738
  var path = utils.encodeUri("/user/$userId/account_data/$type", {
3005
- $userId: _this28.credentials.userId,
739
+ $userId: _this5.credentials.userId,
3006
740
  $type: eventType
3007
741
  });
3008
742
  try {
3009
- return yield _this28.http.authedRequest(Method.Get, path);
743
+ return yield _this5.http.authedRequest(Method.Get, path);
3010
744
  } catch (e) {
3011
745
  var _data;
3012
746
  if (((_data = e.data) === null || _data === void 0 ? void 0 : _data.errcode) === "M_NOT_FOUND") {
@@ -3017,22 +751,22 @@ export class MatrixClient extends TypedEventEmitter {
3017
751
  })();
3018
752
  }
3019
753
  deleteAccountData(eventType) {
3020
- var _this29 = this;
754
+ var _this6 = this;
3021
755
  return _asyncToGenerator(function* () {
3022
- var msc3391DeleteAccountDataServerSupport = _this29.canSupport.get(Feature.AccountDataDeletion);
756
+ var msc3391DeleteAccountDataServerSupport = _this6.canSupport.get(Feature.AccountDataDeletion);
3023
757
  // if deletion is not supported overwrite with empty content
3024
758
  if (msc3391DeleteAccountDataServerSupport === ServerSupport.Unsupported) {
3025
- yield _this29.setAccountData(eventType, {});
759
+ yield _this6.setAccountData(eventType, {});
3026
760
  return;
3027
761
  }
3028
762
  var path = utils.encodeUri("/user/$userId/account_data/$type", {
3029
- $userId: _this29.getSafeUserId(),
763
+ $userId: _this6.getSafeUserId(),
3030
764
  $type: eventType
3031
765
  });
3032
766
  var options = msc3391DeleteAccountDataServerSupport === ServerSupport.Unstable ? {
3033
767
  prefix: "/_matrix/client/unstable/org.matrix.msc3391"
3034
768
  } : undefined;
3035
- return yield _this29.http.authedRequest(Method.Delete, path, undefined, undefined, options);
769
+ return yield _this6.http.authedRequest(Method.Delete, path, undefined, undefined, options);
3036
770
  })();
3037
771
  }
3038
772
 
@@ -3042,7 +776,7 @@ export class MatrixClient extends TypedEventEmitter {
3042
776
  */
3043
777
  getIgnoredUsers() {
3044
778
  var event = this.getAccountData("m.ignored_user_list");
3045
- if (!event || !event.getContent() || !event.getContent()["ignored_users"]) return [];
779
+ if (!(event !== null && event !== void 0 && event.getContent()["ignored_users"])) return [];
3046
780
  return Object.keys(event.getContent()["ignored_users"]);
3047
781
  }
3048
782
 
@@ -3079,20 +813,20 @@ export class MatrixClient extends TypedEventEmitter {
3079
813
  * @returns Rejects: with an error response.
3080
814
  */
3081
815
  joinRoom(roomIdOrAlias) {
3082
- var _arguments3 = arguments,
3083
- _this30 = this;
816
+ var _arguments = arguments,
817
+ _this7 = this;
3084
818
  return _asyncToGenerator(function* () {
3085
- var opts = _arguments3.length > 1 && _arguments3[1] !== undefined ? _arguments3[1] : {};
819
+ var opts = _arguments.length > 1 && _arguments[1] !== undefined ? _arguments[1] : {};
3086
820
  if (opts.syncRoom === undefined) {
3087
821
  opts.syncRoom = true;
3088
822
  }
3089
- var room = _this30.getRoom(roomIdOrAlias);
3090
- if (room !== null && room !== void 0 && room.hasMembershipState(_this30.credentials.userId, KnownMembership.Join)) return room;
823
+ var room = _this7.getRoom(roomIdOrAlias);
824
+ if (room !== null && room !== void 0 && room.hasMembershipState(_this7.credentials.userId, KnownMembership.Join)) return room;
3091
825
  var signPromise = Promise.resolve();
3092
826
  if (opts.inviteSignUrl) {
3093
827
  var _url = new URL(opts.inviteSignUrl);
3094
- _url.searchParams.set("mxid", _this30.credentials.userId);
3095
- signPromise = _this30.http.requestOtherUrl(Method.Post, _url);
828
+ _url.searchParams.set("mxid", _this7.credentials.userId);
829
+ signPromise = _this7.http.requestOtherUrl(Method.Post, _url);
3096
830
  }
3097
831
  var queryParams = {};
3098
832
  if (opts.viaServers) {
@@ -3108,14 +842,14 @@ export class MatrixClient extends TypedEventEmitter {
3108
842
  var path = utils.encodeUri("/join/$roomid", {
3109
843
  $roomid: roomIdOrAlias
3110
844
  });
3111
- var res = yield _this30.http.authedRequest(Method.Post, path, queryParams, data);
845
+ var res = yield _this7.http.authedRequest(Method.Post, path, queryParams, data);
3112
846
  var roomId = res.room_id;
3113
847
  // In case we were originally given an alias, check the room cache again
3114
848
  // with the resolved ID - this method is supposed to no-op if we already
3115
849
  // were in the room, after all.
3116
- var resolvedRoom = _this30.getRoom(roomId);
3117
- if (resolvedRoom !== null && resolvedRoom !== void 0 && resolvedRoom.hasMembershipState(_this30.credentials.userId, KnownMembership.Join)) return resolvedRoom;
3118
- var syncApi = new SyncApi(_this30, _this30.clientOpts, _this30.buildSyncApiOptions());
850
+ var resolvedRoom = _this7.getRoom(roomId);
851
+ if (resolvedRoom !== null && resolvedRoom !== void 0 && resolvedRoom.hasMembershipState(_this7.credentials.userId, KnownMembership.Join)) return resolvedRoom;
852
+ var syncApi = new SyncApi(_this7, _this7.clientOpts, _this7.buildSyncApiOptions());
3119
853
  var syncRoom = syncApi.createRoom(roomId);
3120
854
  if (opts.syncRoom) {
3121
855
  // v2 will do this for us
@@ -3285,17 +1019,17 @@ export class MatrixClient extends TypedEventEmitter {
3285
1019
  * @returns Rejects: with an error response.
3286
1020
  */
3287
1021
  setPowerLevel(roomId, userId, powerLevel) {
3288
- var _this31 = this;
1022
+ var _this8 = this;
3289
1023
  return _asyncToGenerator(function* () {
3290
1024
  var _content;
3291
1025
  var content;
3292
- if (_this31.clientRunning && _this31.isInitialSyncComplete()) {
3293
- var _this31$getRoom;
3294
- content = (_this31$getRoom = _this31.getRoom(roomId)) === null || _this31$getRoom === void 0 || (_this31$getRoom = _this31$getRoom.currentState) === null || _this31$getRoom === void 0 || (_this31$getRoom = _this31$getRoom.getStateEvents(EventType.RoomPowerLevels, "")) === null || _this31$getRoom === void 0 ? void 0 : _this31$getRoom.getContent();
1026
+ if (_this8.clientRunning && _this8.isInitialSyncComplete()) {
1027
+ var _this8$getRoom;
1028
+ content = (_this8$getRoom = _this8.getRoom(roomId)) === null || _this8$getRoom === void 0 || (_this8$getRoom = _this8$getRoom.currentState) === null || _this8$getRoom === void 0 || (_this8$getRoom = _this8$getRoom.getStateEvents(EventType.RoomPowerLevels, "")) === null || _this8$getRoom === void 0 ? void 0 : _this8$getRoom.getContent();
3295
1029
  }
3296
1030
  if (!content) {
3297
1031
  try {
3298
- content = yield _this31.getStateEvent(roomId, EventType.RoomPowerLevels, "");
1032
+ content = yield _this8.getStateEvent(roomId, EventType.RoomPowerLevels, "");
3299
1033
  } catch (e) {
3300
1034
  // It is possible for a Matrix room to not have a power levels event
3301
1035
  if (e instanceof MatrixError && e.errcode === "M_NOT_FOUND") {
@@ -3320,7 +1054,7 @@ export class MatrixClient extends TypedEventEmitter {
3320
1054
  content.users[user] = powerLevel;
3321
1055
  }
3322
1056
  }
3323
- return _this31.sendStateEvent(roomId, EventType.RoomPowerLevels, content, "");
1057
+ return _this8.sendStateEvent(roomId, EventType.RoomPowerLevels, content, "");
3324
1058
  })();
3325
1059
  }
3326
1060
 
@@ -3330,9 +1064,9 @@ export class MatrixClient extends TypedEventEmitter {
3330
1064
  */
3331
1065
  // eslint-disable-next-line @typescript-eslint/naming-convention
3332
1066
  unstable_createLiveBeacon(roomId, beaconInfoContent) {
3333
- var _this32 = this;
1067
+ var _this9 = this;
3334
1068
  return _asyncToGenerator(function* () {
3335
- return _this32.unstable_setLiveBeacon(roomId, beaconInfoContent);
1069
+ return _this9.unstable_setLiveBeacon(roomId, beaconInfoContent);
3336
1070
  })();
3337
1071
  }
3338
1072
 
@@ -3344,9 +1078,9 @@ export class MatrixClient extends TypedEventEmitter {
3344
1078
  */
3345
1079
  // eslint-disable-next-line @typescript-eslint/naming-convention
3346
1080
  unstable_setLiveBeacon(roomId, beaconInfoContent) {
3347
- var _this33 = this;
1081
+ var _this10 = this;
3348
1082
  return _asyncToGenerator(function* () {
3349
- return _this33.sendStateEvent(roomId, M_BEACON_INFO.name, beaconInfoContent, _this33.getUserId());
1083
+ return _this10.sendStateEvent(roomId, M_BEACON_INFO.name, beaconInfoContent, _this10.getUserId());
3350
1084
  })();
3351
1085
  }
3352
1086
  sendEvent(roomId, threadIdOrEventType, eventTypeOrContent, contentOrTxnId, txnIdOrVoid) {
@@ -3494,44 +1228,34 @@ export class MatrixClient extends TypedEventEmitter {
3494
1228
  */
3495
1229
 
3496
1230
  encryptAndSendEvent(room, event, delayOpts) {
3497
- var _this34 = this;
1231
+ var _this11 = this;
3498
1232
  return _asyncToGenerator(function* () {
3499
1233
  if (delayOpts) {
3500
- return _this34.sendEventHttpRequest(event, delayOpts);
1234
+ return _this11.sendEventHttpRequest(event, delayOpts);
3501
1235
  }
3502
1236
  try {
3503
- var cancelled;
3504
- _this34.eventsBeingEncrypted.add(event.getId());
3505
- try {
3506
- yield _this34.encryptEventIfNeeded(event, room !== null && room !== void 0 ? room : undefined);
3507
- } finally {
3508
- cancelled = !_this34.eventsBeingEncrypted.delete(event.getId());
3509
- }
3510
- if (cancelled) {
3511
- // cancelled via MatrixClient::cancelPendingEvent
3512
- return {};
3513
- }
1237
+ _this11.eventsBeingEncrypted.add(event.getId());
3514
1238
 
3515
1239
  // encryptEventIfNeeded may have updated the status from SENDING to ENCRYPTING. If so, we need
3516
1240
  // to put it back.
3517
1241
  if (event.status === EventStatus.ENCRYPTING) {
3518
- _this34.updatePendingEventStatus(room, event, EventStatus.SENDING);
1242
+ _this11.updatePendingEventStatus(room, event, EventStatus.SENDING);
3519
1243
  }
3520
1244
  var promise = null;
3521
- if (_this34.scheduler) {
1245
+ if (_this11.scheduler) {
3522
1246
  // if this returns a promise then the scheduler has control now and will
3523
1247
  // resolve/reject when it is done. Internally, the scheduler will invoke
3524
1248
  // processFn which is set to this._sendEventHttpRequest so the same code
3525
1249
  // path is executed regardless.
3526
- promise = _this34.scheduler.queueEvent(event);
3527
- if (promise && _this34.scheduler.getQueueForEvent(event).length > 1) {
1250
+ promise = _this11.scheduler.queueEvent(event);
1251
+ if (promise && _this11.scheduler.getQueueForEvent(event).length > 1) {
3528
1252
  // event is processed FIFO so if the length is 2 or more we know
3529
1253
  // this event is stuck behind an earlier event.
3530
- _this34.updatePendingEventStatus(room, event, EventStatus.QUEUED);
1254
+ _this11.updatePendingEventStatus(room, event, EventStatus.QUEUED);
3531
1255
  }
3532
1256
  }
3533
1257
  if (!promise) {
3534
- promise = _this34.sendEventHttpRequest(event);
1258
+ promise = _this11.sendEventHttpRequest(event);
3535
1259
  if (room) {
3536
1260
  promise = promise.then(res => {
3537
1261
  room.updatePendingEvent(event, EventStatus.SENT, res["event_id"]);
@@ -3541,15 +1265,15 @@ export class MatrixClient extends TypedEventEmitter {
3541
1265
  }
3542
1266
  return yield promise;
3543
1267
  } catch (err) {
3544
- _this34.logger.error("Error sending event", err);
1268
+ _this11.logger.error("Error sending event", err);
3545
1269
  try {
3546
1270
  // set the error on the event before we update the status:
3547
1271
  // updating the status emits the event, so the state should be
3548
1272
  // consistent at that point.
3549
1273
  event.error = err;
3550
- _this34.updatePendingEventStatus(room, event, EventStatus.NOT_SENT);
1274
+ _this11.updatePendingEventStatus(room, event, EventStatus.NOT_SENT);
3551
1275
  } catch (e) {
3552
- _this34.logger.error("Exception in error handler!", e);
1276
+ _this11.logger.error("Exception in error handler!", e);
3553
1277
  }
3554
1278
  if (err instanceof MatrixError) {
3555
1279
  err.event = event;
@@ -3558,70 +1282,6 @@ export class MatrixClient extends TypedEventEmitter {
3558
1282
  }
3559
1283
  })();
3560
1284
  }
3561
- encryptEventIfNeeded(event, room) {
3562
- var _this35 = this;
3563
- return _asyncToGenerator(function* () {
3564
- // If the room is unknown, we cannot encrypt for it
3565
- if (!room) return;
3566
- if (!(yield _this35.shouldEncryptEventForRoom(event, room))) return;
3567
- if (!_this35.cryptoBackend && _this35.usingExternalCrypto) {
3568
- // The client has opted to allow sending messages to encrypted
3569
- // rooms even if the room is encrypted, and we haven't set up
3570
- // crypto. This is useful for users of matrix-org/pantalaimon
3571
- return;
3572
- }
3573
- if (!_this35.cryptoBackend) {
3574
- throw new Error("This room is configured to use encryption, but your client does not support encryption.");
3575
- }
3576
- _this35.updatePendingEventStatus(room, event, EventStatus.ENCRYPTING);
3577
- yield _this35.cryptoBackend.encryptEvent(event, room);
3578
- })();
3579
- }
3580
-
3581
- /**
3582
- * Determine whether a given event should be encrypted when we send it to the given room.
3583
- *
3584
- * This takes into account event type and room configuration.
3585
- */
3586
- shouldEncryptEventForRoom(event, room) {
3587
- var _this36 = this;
3588
- return _asyncToGenerator(function* () {
3589
- var _this36$cryptoBackend;
3590
- if (event.isEncrypted()) {
3591
- // this event has already been encrypted; this happens if the
3592
- // encryption step succeeded, but the send step failed on the first
3593
- // attempt.
3594
- return false;
3595
- }
3596
- if (event.getType() === EventType.Reaction) {
3597
- // For reactions, there is a very little gained by encrypting the entire
3598
- // event, as relation data is already kept in the clear. Event
3599
- // encryption for a reaction effectively only obscures the event type,
3600
- // but the purpose is still obvious from the relation data, so nothing
3601
- // is really gained. It also causes quite a few problems, such as:
3602
- // * triggers notifications via default push rules
3603
- // * prevents server-side bundling for reactions
3604
- // The reaction key / content / emoji value does warrant encrypting, but
3605
- // this will be handled separately by encrypting just this value.
3606
- // See https://github.com/matrix-org/matrix-doc/pull/1849#pullrequestreview-248763642
3607
- return false;
3608
- }
3609
- if (event.isRedaction()) {
3610
- // Redactions do not support encryption in the spec at this time.
3611
- // Whilst it mostly worked in some clients, it wasn't compliant.
3612
- return false;
3613
- }
3614
-
3615
- // If the room has an m.room.encryption event, we should encrypt.
3616
- if (room.hasEncryptionStateEvent()) return true;
3617
-
3618
- // If we have a crypto impl, and *it* thinks we should encrypt, then we should.
3619
- if (yield (_this36$cryptoBackend = _this36.cryptoBackend) === null || _this36$cryptoBackend === void 0 ? void 0 : _this36$cryptoBackend.isEncryptionEnabledInRoom(room.roomId)) return true;
3620
-
3621
- // Otherwise, no need to encrypt.
3622
- return false;
3623
- })();
3624
- }
3625
1285
 
3626
1286
  /**
3627
1287
  * Returns the eventType that should be used taking encryption into account
@@ -3884,13 +1544,13 @@ export class MatrixClient extends TypedEventEmitter {
3884
1544
  */
3885
1545
  // eslint-disable-next-line
3886
1546
  _unstable_sendDelayedEvent(roomId, delayOpts, threadId, eventType, content, txnId) {
3887
- var _this37 = this;
1547
+ var _this12 = this;
3888
1548
  return _asyncToGenerator(function* () {
3889
- if (!(yield _this37.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
1549
+ if (!(yield _this12.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
3890
1550
  throw Error("Server does not support the delayed events API");
3891
1551
  }
3892
- _this37.addThreadRelationIfNeeded(content, threadId, roomId);
3893
- return _this37.sendCompleteEvent(roomId, threadId, {
1552
+ _this12.addThreadRelationIfNeeded(content, threadId, roomId);
1553
+ return _this12.sendCompleteEvent(roomId, threadId, {
3894
1554
  type: eventType,
3895
1555
  content
3896
1556
  }, delayOpts, txnId);
@@ -3905,12 +1565,12 @@ export class MatrixClient extends TypedEventEmitter {
3905
1565
  */
3906
1566
  // eslint-disable-next-line
3907
1567
  _unstable_sendDelayedStateEvent(roomId, delayOpts, eventType, content) {
3908
- var _arguments4 = arguments,
3909
- _this38 = this;
1568
+ var _arguments2 = arguments,
1569
+ _this13 = this;
3910
1570
  return _asyncToGenerator(function* () {
3911
- var stateKey = _arguments4.length > 4 && _arguments4[4] !== undefined ? _arguments4[4] : "";
3912
- var opts = _arguments4.length > 5 && _arguments4[5] !== undefined ? _arguments4[5] : {};
3913
- if (!(yield _this38.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
1571
+ var stateKey = _arguments2.length > 4 && _arguments2[4] !== undefined ? _arguments2[4] : "";
1572
+ var opts = _arguments2.length > 5 && _arguments2[5] !== undefined ? _arguments2[5] : {};
1573
+ if (!(yield _this13.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
3914
1574
  throw Error("Server does not support the delayed events API");
3915
1575
  }
3916
1576
  var pathParams = {
@@ -3922,7 +1582,7 @@ export class MatrixClient extends TypedEventEmitter {
3922
1582
  if (stateKey !== undefined) {
3923
1583
  path = utils.encodeUri(path + "/$stateKey", pathParams);
3924
1584
  }
3925
- return _this38.http.authedRequest(Method.Put, path, getUnstableDelayQueryOpts(delayOpts), content, opts);
1585
+ return _this13.http.authedRequest(Method.Put, path, getUnstableDelayQueryOpts(delayOpts), content, opts);
3926
1586
  })();
3927
1587
  }
3928
1588
 
@@ -3934,15 +1594,15 @@ export class MatrixClient extends TypedEventEmitter {
3934
1594
  */
3935
1595
  // eslint-disable-next-line
3936
1596
  _unstable_getDelayedEvents(fromToken) {
3937
- var _this39 = this;
1597
+ var _this14 = this;
3938
1598
  return _asyncToGenerator(function* () {
3939
- if (!(yield _this39.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
1599
+ if (!(yield _this14.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
3940
1600
  throw Error("Server does not support the delayed events API");
3941
1601
  }
3942
1602
  var queryDict = fromToken ? {
3943
1603
  from: fromToken
3944
1604
  } : undefined;
3945
- return yield _this39.http.authedRequest(Method.Get, "/delayed_events", queryDict, undefined, {
1605
+ return yield _this14.http.authedRequest(Method.Get, "/delayed_events", queryDict, undefined, {
3946
1606
  prefix: "".concat(ClientPrefix.Unstable, "/").concat(UNSTABLE_MSC4140_DELAYED_EVENTS)
3947
1607
  });
3948
1608
  })();
@@ -3956,9 +1616,9 @@ export class MatrixClient extends TypedEventEmitter {
3956
1616
  */
3957
1617
  // eslint-disable-next-line
3958
1618
  _unstable_updateDelayedEvent(delayId, action) {
3959
- var _this40 = this;
1619
+ var _this15 = this;
3960
1620
  return _asyncToGenerator(function* () {
3961
- if (!(yield _this40.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
1621
+ if (!(yield _this15.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
3962
1622
  throw Error("Server does not support the delayed events API");
3963
1623
  }
3964
1624
  var path = utils.encodeUri("/delayed_events/$delayId", {
@@ -3967,7 +1627,7 @@ export class MatrixClient extends TypedEventEmitter {
3967
1627
  var data = {
3968
1628
  action
3969
1629
  };
3970
- return yield _this40.http.authedRequest(Method.Post, path, undefined, data, {
1630
+ return yield _this15.http.authedRequest(Method.Post, path, undefined, data, {
3971
1631
  prefix: "".concat(ClientPrefix.Unstable, "/").concat(UNSTABLE_MSC4140_DELAYED_EVENTS)
3972
1632
  });
3973
1633
  })();
@@ -3984,11 +1644,11 @@ export class MatrixClient extends TypedEventEmitter {
3984
1644
  * @returns Rejects: with an error response.
3985
1645
  */
3986
1646
  sendReceipt(event, receiptType, body) {
3987
- var _arguments5 = arguments,
3988
- _this41 = this;
1647
+ var _arguments3 = arguments,
1648
+ _this16 = this;
3989
1649
  return _asyncToGenerator(function* () {
3990
- var unthreaded = _arguments5.length > 3 && _arguments5[3] !== undefined ? _arguments5[3] : false;
3991
- if (_this41.isGuest()) {
1650
+ var unthreaded = _arguments3.length > 3 && _arguments3[3] !== undefined ? _arguments3[3] : false;
1651
+ if (_this16.isGuest()) {
3992
1652
  return Promise.resolve({}); // guests cannot send receipts so don't bother.
3993
1653
  }
3994
1654
  var path = utils.encodeUri("/rooms/$roomId/receipt/$receiptType/$eventId", {
@@ -3999,14 +1659,14 @@ export class MatrixClient extends TypedEventEmitter {
3999
1659
 
4000
1660
  // Unless we're explicitly making an unthreaded receipt or we don't
4001
1661
  // support threads, include the `thread_id` property in the body.
4002
- var shouldAddThreadId = !unthreaded && _this41.supportsThreads();
1662
+ var shouldAddThreadId = !unthreaded && _this16.supportsThreads();
4003
1663
  var fullBody = shouldAddThreadId ? _objectSpread(_objectSpread({}, body), {}, {
4004
1664
  thread_id: threadIdForReceipt(event)
4005
1665
  }) : body;
4006
- var promise = _this41.http.authedRequest(Method.Post, path, undefined, fullBody || {});
4007
- var room = _this41.getRoom(event.getRoomId());
4008
- if (room && _this41.credentials.userId) {
4009
- room.addLocalEchoReceipt(_this41.credentials.userId, event, receiptType, unthreaded);
1666
+ var promise = _this16.http.authedRequest(Method.Post, path, undefined, fullBody || {});
1667
+ var room = _this16.getRoom(event.getRoomId());
1668
+ if (room && _this16.credentials.userId) {
1669
+ room.addLocalEchoReceipt(_this16.credentials.userId, event, receiptType, unthreaded);
4010
1670
  }
4011
1671
  return promise;
4012
1672
  })();
@@ -4020,18 +1680,18 @@ export class MatrixClient extends TypedEventEmitter {
4020
1680
  * @returns Rejects: with an error response.
4021
1681
  */
4022
1682
  sendReadReceipt(event) {
4023
- var _arguments6 = arguments,
4024
- _this42 = this;
1683
+ var _arguments4 = arguments,
1684
+ _this17 = this;
4025
1685
  return _asyncToGenerator(function* () {
4026
- var receiptType = _arguments6.length > 1 && _arguments6[1] !== undefined ? _arguments6[1] : ReceiptType.Read;
4027
- var unthreaded = _arguments6.length > 2 && _arguments6[2] !== undefined ? _arguments6[2] : false;
1686
+ var receiptType = _arguments4.length > 1 && _arguments4[1] !== undefined ? _arguments4[1] : ReceiptType.Read;
1687
+ var unthreaded = _arguments4.length > 2 && _arguments4[2] !== undefined ? _arguments4[2] : false;
4028
1688
  if (!event) return;
4029
1689
  var eventId = event.getId();
4030
- var room = _this42.getRoom(event.getRoomId());
1690
+ var room = _this17.getRoom(event.getRoomId());
4031
1691
  if (room !== null && room !== void 0 && room.hasPendingEvent(eventId)) {
4032
1692
  throw new Error("Cannot set read receipt to a pending event (".concat(eventId, ")"));
4033
1693
  }
4034
- return _this42.sendReceipt(event, receiptType, {}, unthreaded);
1694
+ return _this17.sendReceipt(event, receiptType, {}, unthreaded);
4035
1695
  })();
4036
1696
  }
4037
1697
 
@@ -4050,9 +1710,9 @@ export class MatrixClient extends TypedEventEmitter {
4050
1710
  * @returns Promise which resolves: the empty object, `{}`.
4051
1711
  */
4052
1712
  setRoomReadMarkers(roomId, rmEventId, rrEvent, rpEvent) {
4053
- var _this43 = this;
1713
+ var _this18 = this;
4054
1714
  return _asyncToGenerator(function* () {
4055
- var room = _this43.getRoom(roomId);
1715
+ var room = _this18.getRoom(roomId);
4056
1716
  if (room !== null && room !== void 0 && room.hasPendingEvent(rmEventId)) {
4057
1717
  throw new Error("Cannot set read marker to a pending event (".concat(rmEventId, ")"));
4058
1718
  }
@@ -4064,7 +1724,7 @@ export class MatrixClient extends TypedEventEmitter {
4064
1724
  if (room !== null && room !== void 0 && room.hasPendingEvent(rrEventId)) {
4065
1725
  throw new Error("Cannot set read receipt to a pending event (".concat(rrEventId, ")"));
4066
1726
  }
4067
- room === null || room === void 0 || room.addLocalEchoReceipt(_this43.credentials.userId, rrEvent, ReceiptType.Read);
1727
+ room === null || room === void 0 || room.addLocalEchoReceipt(_this18.credentials.userId, rrEvent, ReceiptType.Read);
4068
1728
  }
4069
1729
 
4070
1730
  // Add the optional private RR update, do local echo like `sendReceipt`
@@ -4074,9 +1734,9 @@ export class MatrixClient extends TypedEventEmitter {
4074
1734
  if (room !== null && room !== void 0 && room.hasPendingEvent(rpEventId)) {
4075
1735
  throw new Error("Cannot set read receipt to a pending event (".concat(rpEventId, ")"));
4076
1736
  }
4077
- room === null || room === void 0 || room.addLocalEchoReceipt(_this43.credentials.userId, rpEvent, ReceiptType.ReadPrivate);
1737
+ room === null || room === void 0 || room.addLocalEchoReceipt(_this18.credentials.userId, rpEvent, ReceiptType.ReadPrivate);
4078
1738
  }
4079
- return yield _this43.setRoomReadMarkersHttpRequest(roomId, rmEventId, rrEventId, rpEventId);
1739
+ return yield _this18.setRoomReadMarkersHttpRequest(roomId, rmEventId, rrEventId, rpEventId);
4080
1740
  })();
4081
1741
  }
4082
1742
 
@@ -4260,13 +1920,13 @@ export class MatrixClient extends TypedEventEmitter {
4260
1920
  * @returns Rejects: with an error response.
4261
1921
  */
4262
1922
  inviteByThreePid(roomId, medium, address) {
4263
- var _this44 = this;
1923
+ var _this19 = this;
4264
1924
  return _asyncToGenerator(function* () {
4265
- var _this44$identityServe;
1925
+ var _this19$identityServe;
4266
1926
  var path = utils.encodeUri("/rooms/$roomId/invite", {
4267
1927
  $roomId: roomId
4268
1928
  });
4269
- var identityServerUrl = _this44.getIdentityServerUrl(true);
1929
+ var identityServerUrl = _this19.getIdentityServerUrl(true);
4270
1930
  if (!identityServerUrl) {
4271
1931
  return Promise.reject(new MatrixError({
4272
1932
  error: "No supplied identity server URL",
@@ -4278,13 +1938,13 @@ export class MatrixClient extends TypedEventEmitter {
4278
1938
  medium: medium,
4279
1939
  address: address
4280
1940
  };
4281
- if ((_this44$identityServe = _this44.identityServer) !== null && _this44$identityServe !== void 0 && _this44$identityServe.getAccessToken) {
4282
- var identityAccessToken = yield _this44.identityServer.getAccessToken();
1941
+ if ((_this19$identityServe = _this19.identityServer) !== null && _this19$identityServe !== void 0 && _this19$identityServe.getAccessToken) {
1942
+ var identityAccessToken = yield _this19.identityServer.getAccessToken();
4283
1943
  if (identityAccessToken) {
4284
1944
  params["id_access_token"] = identityAccessToken;
4285
1945
  }
4286
1946
  }
4287
- return _this44.http.authedRequest(Method.Post, path, undefined, params);
1947
+ return _this19.http.authedRequest(Method.Post, path, undefined, params);
4288
1948
  })();
4289
1949
  }
4290
1950
 
@@ -4352,18 +2012,18 @@ export class MatrixClient extends TypedEventEmitter {
4352
2012
  * @returns Rejects: with an error response.
4353
2013
  */
4354
2014
  forget(roomId) {
4355
- var _arguments7 = arguments,
4356
- _this45 = this;
2015
+ var _arguments5 = arguments,
2016
+ _this20 = this;
4357
2017
  return _asyncToGenerator(function* () {
4358
- var deleteRoom = _arguments7.length > 1 && _arguments7[1] !== undefined ? _arguments7[1] : true;
2018
+ var deleteRoom = _arguments5.length > 1 && _arguments5[1] !== undefined ? _arguments5[1] : true;
4359
2019
  // API returns an empty object
4360
2020
  var path = utils.encodeUri("/rooms/$room_id/forget", {
4361
2021
  $room_id: roomId
4362
2022
  });
4363
- var response = yield _this45.http.authedRequest(Method.Post, path);
2023
+ var response = yield _this20.http.authedRequest(Method.Post, path);
4364
2024
  if (deleteRoom) {
4365
- _this45.store.removeRoom(roomId);
4366
- _this45.emit(ClientEvent.DeleteRoom, roomId);
2025
+ _this20.store.removeRoom(roomId);
2026
+ _this20.emit(ClientEvent.DeleteRoom, roomId);
4367
2027
  }
4368
2028
  return response;
4369
2029
  })();
@@ -4477,13 +2137,13 @@ export class MatrixClient extends TypedEventEmitter {
4477
2137
  * @returns Rejects: with an error response.
4478
2138
  */
4479
2139
  setDisplayName(name) {
4480
- var _this46 = this;
2140
+ var _this21 = this;
4481
2141
  return _asyncToGenerator(function* () {
4482
- var prom = yield _this46.setProfileInfo("displayname", {
2142
+ var prom = yield _this21.setProfileInfo("displayname", {
4483
2143
  displayname: name
4484
2144
  });
4485
2145
  // XXX: synthesise a profile update for ourselves because Synapse is broken and won't
4486
- var user = _this46.getUser(_this46.getUserId());
2146
+ var user = _this21.getUser(_this21.getUserId());
4487
2147
  if (user) {
4488
2148
  user.displayName = name;
4489
2149
  user.emit(UserEvent.DisplayName, user.events.presence, user);
@@ -4497,13 +2157,13 @@ export class MatrixClient extends TypedEventEmitter {
4497
2157
  * @returns Rejects: with an error response.
4498
2158
  */
4499
2159
  setAvatarUrl(url) {
4500
- var _this47 = this;
2160
+ var _this22 = this;
4501
2161
  return _asyncToGenerator(function* () {
4502
- var prom = yield _this47.setProfileInfo("avatar_url", {
2162
+ var prom = yield _this22.setProfileInfo("avatar_url", {
4503
2163
  avatar_url: url
4504
2164
  });
4505
2165
  // XXX: synthesise a profile update for ourselves because Synapse is broken and won't
4506
- var user = _this47.getUser(_this47.getUserId());
2166
+ var user = _this22.getUser(_this22.getUserId());
4507
2167
  if (user) {
4508
2168
  user.avatarUrl = url;
4509
2169
  user.emit(UserEvent.AvatarUrl, user.events.presence, user);
@@ -4544,10 +2204,10 @@ export class MatrixClient extends TypedEventEmitter {
4544
2204
  * @param presence - the presence to specify to set_presence of sync calls
4545
2205
  */
4546
2206
  setSyncPresence(presence) {
4547
- var _this48 = this;
2207
+ var _this23 = this;
4548
2208
  return _asyncToGenerator(function* () {
4549
- var _this48$syncApi;
4550
- (_this48$syncApi = _this48.syncApi) === null || _this48$syncApi === void 0 || _this48$syncApi.setPresence(presence);
2209
+ var _this23$syncApi;
2210
+ (_this23$syncApi = _this23.syncApi) === null || _this23$syncApi === void 0 || _this23$syncApi.setPresence(presence);
4551
2211
  })();
4552
2212
  }
4553
2213
 
@@ -4558,16 +2218,16 @@ export class MatrixClient extends TypedEventEmitter {
4558
2218
  * @throws If 'presence' isn't a valid presence enum value.
4559
2219
  */
4560
2220
  setPresence(opts) {
4561
- var _this49 = this;
2221
+ var _this24 = this;
4562
2222
  return _asyncToGenerator(function* () {
4563
2223
  var path = utils.encodeUri("/presence/$userId/status", {
4564
- $userId: _this49.credentials.userId
2224
+ $userId: _this24.credentials.userId
4565
2225
  });
4566
2226
  var validStates = ["offline", "online", "unavailable"];
4567
2227
  if (validStates.indexOf(opts.presence) === -1) {
4568
2228
  throw new Error("Bad presence value: " + opts.presence);
4569
2229
  }
4570
- yield _this49.http.authedRequest(Method.Put, path, undefined, opts);
2230
+ yield _this24.http.authedRequest(Method.Put, path, undefined, opts);
4571
2231
  })();
4572
2232
  }
4573
2233
 
@@ -4634,7 +2294,7 @@ export class MatrixClient extends TypedEventEmitter {
4634
2294
  }
4635
2295
  var [timelineEvents, threadedEvents, unknownRelations] = room.partitionThreadedEvents(matrixEvents);
4636
2296
  this.processAggregatedTimelineEvents(room, timelineEvents);
4637
- room.addEventsToTimeline(timelineEvents, true, room.getLiveTimeline());
2297
+ room.addEventsToTimeline(timelineEvents, true, true, room.getLiveTimeline());
4638
2298
  this.processThreadEvents(room, threadedEvents, true);
4639
2299
  unknownRelations.forEach(event => room.relations.aggregateChildEvent(event));
4640
2300
  room.oldState.paginationToken = (_res$end = res.end) !== null && _res$end !== void 0 ? _res$end : null;
@@ -4676,11 +2336,11 @@ export class MatrixClient extends TypedEventEmitter {
4676
2336
  * {@link EventTimeline} including the given event
4677
2337
  */
4678
2338
  getEventTimeline(timelineSet, eventId) {
4679
- var _this50 = this;
2339
+ var _this25 = this;
4680
2340
  return _asyncToGenerator(function* () {
4681
- var _this50$clientOpts, _ref5, _timelineSet$getTimel, _timelineSet$room$fin;
2341
+ var _this25$clientOpts, _ref2, _timelineSet$getTimel, _timelineSet$room$fin;
4682
2342
  // don't allow any timeline support unless it's been enabled.
4683
- if (!_this50.timelineSupport) {
2343
+ if (!_this25.timelineSupport) {
4684
2344
  throw new Error("timeline support is disabled. Set the 'timelineSupport'" + " parameter to true when creating MatrixClient to enable it.");
4685
2345
  }
4686
2346
  if (!(timelineSet !== null && timelineSet !== void 0 && timelineSet.room)) {
@@ -4689,22 +2349,22 @@ export class MatrixClient extends TypedEventEmitter {
4689
2349
  if (timelineSet.getTimelineForEvent(eventId)) {
4690
2350
  return timelineSet.getTimelineForEvent(eventId);
4691
2351
  }
4692
- if (timelineSet.thread && _this50.supportsThreads()) {
4693
- return _this50.getThreadTimeline(timelineSet, eventId);
2352
+ if (timelineSet.thread && _this25.supportsThreads()) {
2353
+ return _this25.getThreadTimeline(timelineSet, eventId);
4694
2354
  }
4695
2355
  var path = utils.encodeUri("/rooms/$roomId/context/$eventId", {
4696
2356
  $roomId: timelineSet.room.roomId,
4697
2357
  $eventId: eventId
4698
2358
  });
4699
2359
  var params = undefined;
4700
- if ((_this50$clientOpts = _this50.clientOpts) !== null && _this50$clientOpts !== void 0 && _this50$clientOpts.lazyLoadMembers) {
2360
+ if ((_this25$clientOpts = _this25.clientOpts) !== null && _this25$clientOpts !== void 0 && _this25$clientOpts.lazyLoadMembers) {
4701
2361
  params = {
4702
2362
  filter: JSON.stringify(Filter.LAZY_LOADING_MESSAGES_FILTER)
4703
2363
  };
4704
2364
  }
4705
2365
 
4706
2366
  // TODO: we should implement a backoff (as per scrollback()) to deal more nicely with HTTP errors.
4707
- var res = yield _this50.http.authedRequest(Method.Get, path, params);
2367
+ var res = yield _this25.http.authedRequest(Method.Get, path, params);
4708
2368
  if (!res.event) {
4709
2369
  throw new Error("'event' not in '/context' result - homeserver too old?");
4710
2370
  }
@@ -4713,10 +2373,10 @@ export class MatrixClient extends TypedEventEmitter {
4713
2373
  if (timelineSet.getTimelineForEvent(eventId)) {
4714
2374
  return timelineSet.getTimelineForEvent(eventId);
4715
2375
  }
4716
- var mapper = _this50.getEventMapper();
2376
+ var mapper = _this25.getEventMapper();
4717
2377
  var event = mapper(res.event);
4718
2378
  if (event.isRelation(THREAD_RELATION_TYPE.name)) {
4719
- _this50.logger.warn("Tried loading a regular timeline at the position of a thread event");
2379
+ _this25.logger.warn("Tried loading a regular timeline at the position of a thread event");
4720
2380
  return undefined;
4721
2381
  }
4722
2382
  var events = [
@@ -4735,25 +2395,25 @@ export class MatrixClient extends TypedEventEmitter {
4735
2395
  timeline.getState(EventTimeline.FORWARDS).paginationToken = res.end;
4736
2396
  }
4737
2397
  var [timelineEvents, threadedEvents, unknownRelations] = timelineSet.room.partitionThreadedEvents(events);
4738
- timelineSet.addEventsToTimeline(timelineEvents, true, timeline, res.start);
2398
+ timelineSet.addEventsToTimeline(timelineEvents, true, false, timeline, res.start);
4739
2399
  // The target event is not in a thread but process the contextual events, so we can show any threads around it.
4740
- _this50.processThreadEvents(timelineSet.room, threadedEvents, true);
4741
- _this50.processAggregatedTimelineEvents(timelineSet.room, timelineEvents);
2400
+ _this25.processThreadEvents(timelineSet.room, threadedEvents, true);
2401
+ _this25.processAggregatedTimelineEvents(timelineSet.room, timelineEvents);
4742
2402
  unknownRelations.forEach(event => timelineSet.relations.aggregateChildEvent(event));
4743
2403
 
4744
2404
  // There is no guarantee that the event ended up in "timeline" (we might have switched to a neighbouring
4745
2405
  // timeline) - so check the room's index again. On the other hand, there's no guarantee the event ended up
4746
2406
  // anywhere, if it was later redacted, so we just return the timeline we first thought of.
4747
- return (_ref5 = (_timelineSet$getTimel = timelineSet.getTimelineForEvent(eventId)) !== null && _timelineSet$getTimel !== void 0 ? _timelineSet$getTimel : (_timelineSet$room$fin = timelineSet.room.findThreadForEvent(event)) === null || _timelineSet$room$fin === void 0 ? void 0 : _timelineSet$room$fin.liveTimeline) !== null && _ref5 !== void 0 ? _ref5 :
2407
+ return (_ref2 = (_timelineSet$getTimel = timelineSet.getTimelineForEvent(eventId)) !== null && _timelineSet$getTimel !== void 0 ? _timelineSet$getTimel : (_timelineSet$room$fin = timelineSet.room.findThreadForEvent(event)) === null || _timelineSet$room$fin === void 0 ? void 0 : _timelineSet$room$fin.liveTimeline) !== null && _ref2 !== void 0 ? _ref2 :
4748
2408
  // for Threads degraded support
4749
2409
  timeline;
4750
2410
  })();
4751
2411
  }
4752
2412
  getThreadTimeline(timelineSet, eventId) {
4753
- var _this51 = this;
2413
+ var _this26 = this;
4754
2414
  return _asyncToGenerator(function* () {
4755
- var _this51$clientOpts;
4756
- if (!_this51.supportsThreads()) {
2415
+ var _this26$clientOpts;
2416
+ if (!_this26.supportsThreads()) {
4757
2417
  throw new Error("could not get thread timeline: no client support");
4758
2418
  }
4759
2419
  if (!timelineSet.room) {
@@ -4769,18 +2429,18 @@ export class MatrixClient extends TypedEventEmitter {
4769
2429
  var params = {
4770
2430
  limit: "0"
4771
2431
  };
4772
- if ((_this51$clientOpts = _this51.clientOpts) !== null && _this51$clientOpts !== void 0 && _this51$clientOpts.lazyLoadMembers) {
2432
+ if ((_this26$clientOpts = _this26.clientOpts) !== null && _this26$clientOpts !== void 0 && _this26$clientOpts.lazyLoadMembers) {
4773
2433
  params.filter = JSON.stringify(Filter.LAZY_LOADING_MESSAGES_FILTER);
4774
2434
  }
4775
2435
 
4776
2436
  // TODO: we should implement a backoff (as per scrollback()) to deal more nicely with HTTP errors.
4777
- var res = yield _this51.http.authedRequest(Method.Get, path, params);
4778
- var mapper = _this51.getEventMapper();
2437
+ var res = yield _this26.http.authedRequest(Method.Get, path, params);
2438
+ var mapper = _this26.getEventMapper();
4779
2439
  var event = mapper(res.event);
4780
2440
  if (!timelineSet.canContain(event)) {
4781
2441
  return undefined;
4782
2442
  }
4783
- var recurse = _this51.canSupport.get(Feature.RelationsRecursion) !== ServerSupport.Unsupported;
2443
+ var recurse = _this26.canSupport.get(Feature.RelationsRecursion) !== ServerSupport.Unsupported;
4784
2444
  if (Thread.hasServerSideSupport) {
4785
2445
  if (Thread.hasServerSideFwdPaginationSupport) {
4786
2446
  var _resOlder$next_batch, _resNewer$next_batch, _timelineSet$getTimel2;
@@ -4788,12 +2448,12 @@ export class MatrixClient extends TypedEventEmitter {
4788
2448
  throw new Error("could not get thread timeline: not a thread timeline");
4789
2449
  }
4790
2450
  var thread = timelineSet.thread;
4791
- var resOlder = yield _this51.fetchRelations(timelineSet.room.roomId, thread.id, null, null, {
2451
+ var resOlder = yield _this26.fetchRelations(timelineSet.room.roomId, thread.id, null, null, {
4792
2452
  dir: Direction.Backward,
4793
2453
  from: res.start,
4794
2454
  recurse: recurse || undefined
4795
2455
  });
4796
- var resNewer = yield _this51.fetchRelations(timelineSet.room.roomId, thread.id, null, null, {
2456
+ var resNewer = yield _this26.fetchRelations(timelineSet.room.roomId, thread.id, null, null, {
4797
2457
  dir: Direction.Forward,
4798
2458
  from: res.end,
4799
2459
  recurse: recurse || undefined
@@ -4816,14 +2476,14 @@ export class MatrixClient extends TypedEventEmitter {
4816
2476
  timeline = timelineSet.addTimeline();
4817
2477
  timeline.initialiseState(res.state.map(mapper));
4818
2478
  }
4819
- timelineSet.addEventsToTimeline(events, true, timeline, resNewer.next_batch);
2479
+ timelineSet.addEventsToTimeline(events, true, false, timeline, resNewer.next_batch);
4820
2480
  if (!resOlder.next_batch) {
4821
- var originalEvent = yield _this51.fetchRoomEvent(timelineSet.room.roomId, thread.id);
4822
- timelineSet.addEventsToTimeline([mapper(originalEvent)], true, timeline, null);
2481
+ var originalEvent = yield _this26.fetchRoomEvent(timelineSet.room.roomId, thread.id);
2482
+ timelineSet.addEventsToTimeline([mapper(originalEvent)], true, false, timeline, null);
4823
2483
  }
4824
2484
  timeline.setPaginationToken((_resOlder$next_batch = resOlder.next_batch) !== null && _resOlder$next_batch !== void 0 ? _resOlder$next_batch : null, Direction.Backward);
4825
2485
  timeline.setPaginationToken((_resNewer$next_batch = resNewer.next_batch) !== null && _resNewer$next_batch !== void 0 ? _resNewer$next_batch : null, Direction.Forward);
4826
- _this51.processAggregatedTimelineEvents(timelineSet.room, events);
2486
+ _this26.processAggregatedTimelineEvents(timelineSet.room, events);
4827
2487
 
4828
2488
  // There is no guarantee that the event ended up in "timeline" (we might have switched to a neighbouring
4829
2489
  // timeline) - so check the room's index again. On the other hand, there's no guarantee the event ended up
@@ -4836,7 +2496,7 @@ export class MatrixClient extends TypedEventEmitter {
4836
2496
  // XXX: workaround for https://github.com/vector-im/element-meta/issues/150
4837
2497
 
4838
2498
  var _thread = timelineSet.thread;
4839
- var _resOlder = yield _this51.fetchRelations(timelineSet.room.roomId, _thread.id, THREAD_RELATION_TYPE.name, null, {
2499
+ var _resOlder = yield _this26.fetchRelations(timelineSet.room.roomId, _thread.id, THREAD_RELATION_TYPE.name, null, {
4840
2500
  dir: Direction.Backward,
4841
2501
  from: res.start,
4842
2502
  recurse: recurse || undefined
@@ -4845,7 +2505,7 @@ export class MatrixClient extends TypedEventEmitter {
4845
2505
  var nextBatch = res.end;
4846
2506
  while (nextBatch) {
4847
2507
  var _resNewer$next_batch2;
4848
- var _resNewer = yield _this51.fetchRelations(timelineSet.room.roomId, _thread.id, THREAD_RELATION_TYPE.name, null, {
2508
+ var _resNewer = yield _this26.fetchRelations(timelineSet.room.roomId, _thread.id, THREAD_RELATION_TYPE.name, null, {
4849
2509
  dir: Direction.Forward,
4850
2510
  from: nextBatch,
4851
2511
  recurse: recurse || undefined
@@ -4867,14 +2527,14 @@ export class MatrixClient extends TypedEventEmitter {
4867
2527
  // summaries.
4868
2528
  var _timeline = timelineSet.getLiveTimeline();
4869
2529
  _timeline.getState(EventTimeline.BACKWARDS).setUnknownStateEvents(res.state.map(mapper));
4870
- timelineSet.addEventsToTimeline(_events, true, _timeline, null);
2530
+ timelineSet.addEventsToTimeline(_events, true, false, _timeline, null);
4871
2531
  if (!_resOlder.next_batch) {
4872
- var _originalEvent = yield _this51.fetchRoomEvent(timelineSet.room.roomId, _thread.id);
4873
- timelineSet.addEventsToTimeline([mapper(_originalEvent)], true, _timeline, null);
2532
+ var _originalEvent = yield _this26.fetchRoomEvent(timelineSet.room.roomId, _thread.id);
2533
+ timelineSet.addEventsToTimeline([mapper(_originalEvent)], true, false, _timeline, null);
4874
2534
  }
4875
2535
  _timeline.setPaginationToken((_resOlder$next_batch2 = _resOlder.next_batch) !== null && _resOlder$next_batch2 !== void 0 ? _resOlder$next_batch2 : null, Direction.Backward);
4876
2536
  _timeline.setPaginationToken(null, Direction.Forward);
4877
- _this51.processAggregatedTimelineEvents(timelineSet.room, _events);
2537
+ _this26.processAggregatedTimelineEvents(timelineSet.room, _events);
4878
2538
  return _timeline;
4879
2539
  }
4880
2540
  }
@@ -4892,10 +2552,10 @@ export class MatrixClient extends TypedEventEmitter {
4892
2552
  * {@link EventTimeline} timeline with the latest events in the room
4893
2553
  */
4894
2554
  getLatestTimeline(timelineSet) {
4895
- var _this52 = this;
2555
+ var _this27 = this;
4896
2556
  return _asyncToGenerator(function* () {
4897
2557
  // don't allow any timeline support unless it's been enabled.
4898
- if (!_this52.timelineSupport) {
2558
+ if (!_this27.timelineSupport) {
4899
2559
  throw new Error("timeline support is disabled. Set the 'timelineSupport'" + " parameter to true when creating MatrixClient to enable it.");
4900
2560
  }
4901
2561
  if (!timelineSet.room) {
@@ -4904,35 +2564,35 @@ export class MatrixClient extends TypedEventEmitter {
4904
2564
  var event;
4905
2565
  if (timelineSet.threadListType !== null) {
4906
2566
  var _res$chunk;
4907
- var res = yield _this52.createThreadListMessagesRequest(timelineSet.room.roomId, null, 1, Direction.Backward, timelineSet.threadListType, timelineSet.getFilter());
2567
+ var res = yield _this27.createThreadListMessagesRequest(timelineSet.room.roomId, null, 1, Direction.Backward, timelineSet.threadListType, timelineSet.getFilter());
4908
2568
  event = (_res$chunk = res.chunk) === null || _res$chunk === void 0 ? void 0 : _res$chunk[0];
4909
2569
  } else if (timelineSet.thread && Thread.hasServerSideSupport) {
4910
2570
  var _res$chunk2;
4911
- var recurse = _this52.canSupport.get(Feature.RelationsRecursion) !== ServerSupport.Unsupported;
4912
- var _res = yield _this52.fetchRelations(timelineSet.room.roomId, timelineSet.thread.id, THREAD_RELATION_TYPE.name, null, {
2571
+ var recurse = _this27.canSupport.get(Feature.RelationsRecursion) !== ServerSupport.Unsupported;
2572
+ var _res = yield _this27.fetchRelations(timelineSet.room.roomId, timelineSet.thread.id, THREAD_RELATION_TYPE.name, null, {
4913
2573
  dir: Direction.Backward,
4914
2574
  limit: 1,
4915
2575
  recurse: recurse || undefined
4916
2576
  });
4917
2577
  event = (_res$chunk2 = _res.chunk) === null || _res$chunk2 === void 0 ? void 0 : _res$chunk2[0];
4918
2578
  } else {
4919
- var _this52$clientOpts, _res2$chunk;
2579
+ var _this27$clientOpts, _res2$chunk;
4920
2580
  var messagesPath = utils.encodeUri("/rooms/$roomId/messages", {
4921
2581
  $roomId: timelineSet.room.roomId
4922
2582
  });
4923
2583
  var params = {
4924
2584
  dir: "b"
4925
2585
  };
4926
- if ((_this52$clientOpts = _this52.clientOpts) !== null && _this52$clientOpts !== void 0 && _this52$clientOpts.lazyLoadMembers) {
2586
+ if ((_this27$clientOpts = _this27.clientOpts) !== null && _this27$clientOpts !== void 0 && _this27$clientOpts.lazyLoadMembers) {
4927
2587
  params.filter = JSON.stringify(Filter.LAZY_LOADING_MESSAGES_FILTER);
4928
2588
  }
4929
- var _res2 = yield _this52.http.authedRequest(Method.Get, messagesPath, params);
2589
+ var _res2 = yield _this27.http.authedRequest(Method.Get, messagesPath, params);
4930
2590
  event = (_res2$chunk = _res2.chunk) === null || _res2$chunk === void 0 ? void 0 : _res2$chunk[0];
4931
2591
  }
4932
2592
  if (!event) {
4933
2593
  throw new Error("No message returned when trying to construct getLatestTimeline");
4934
2594
  }
4935
- return _this52.getEventTimeline(timelineSet, event.event_id);
2595
+ return _this27.getEventTimeline(timelineSet, event.event_id);
4936
2596
  })();
4937
2597
  }
4938
2598
 
@@ -5044,7 +2704,7 @@ export class MatrixClient extends TypedEventEmitter {
5044
2704
  * events and we reached either end of the timeline; else true.
5045
2705
  */
5046
2706
  paginateEventTimeline(eventTimeline, opts) {
5047
- var _this53 = this;
2707
+ var _this28 = this;
5048
2708
  var isNotifTimeline = eventTimeline.getTimelineSet() === this.notifTimelineSet;
5049
2709
  var room = this.getRoom(eventTimeline.getRoomId());
5050
2710
  var threadListType = eventTimeline.getTimelineSet().threadListType;
@@ -5080,17 +2740,17 @@ export class MatrixClient extends TypedEventEmitter {
5080
2740
  params.from = token;
5081
2741
  }
5082
2742
  promise = this.http.authedRequest(Method.Get, path, params).then(/*#__PURE__*/function () {
5083
- var _ref6 = _asyncToGenerator(function* (res) {
2743
+ var _ref3 = _asyncToGenerator(function* (res) {
5084
2744
  var token = res.next_token;
5085
2745
  var matrixEvents = [];
5086
2746
  res.notifications = res.notifications.filter(noUnsafeEventProps);
5087
2747
  for (var i = 0; i < res.notifications.length; i++) {
5088
2748
  var notification = res.notifications[i];
5089
- var _event4 = _this53.getEventMapper()(notification.event);
2749
+ var _event4 = _this28.getEventMapper()(notification.event);
5090
2750
 
5091
2751
  // @TODO(kerrya) reprocessing every notification is ugly
5092
2752
  // remove if we get server MSC3994 support
5093
- _this53.getPushDetailsForEvent(_event4, true);
2753
+ _this28.getPushDetailsForEvent(_event4, true);
5094
2754
  _event4.event.room_id = notification.room_id; // XXX: gutwrenching
5095
2755
  matrixEvents[i] = _event4;
5096
2756
  }
@@ -5098,8 +2758,8 @@ export class MatrixClient extends TypedEventEmitter {
5098
2758
  // No need to partition events for threads here, everything lives
5099
2759
  // in the notification timeline set
5100
2760
  var timelineSet = eventTimeline.getTimelineSet();
5101
- timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
5102
- _this53.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
2761
+ timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
2762
+ _this28.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
5103
2763
 
5104
2764
  // if we've hit the end of the timeline, we need to stop trying to
5105
2765
  // paginate. We need to keep the 'forwards' token though, to make sure
@@ -5109,8 +2769,8 @@ export class MatrixClient extends TypedEventEmitter {
5109
2769
  }
5110
2770
  return Boolean(res.next_token);
5111
2771
  });
5112
- return function (_x4) {
5113
- return _ref6.apply(this, arguments);
2772
+ return function (_x2) {
2773
+ return _ref3.apply(this, arguments);
5114
2774
  };
5115
2775
  }()).finally(() => {
5116
2776
  eventTimeline.paginationRequests[dir] = null;
@@ -5132,7 +2792,7 @@ export class MatrixClient extends TypedEventEmitter {
5132
2792
  var token = res.end;
5133
2793
  var matrixEvents = res.chunk.filter(noUnsafeEventProps).map(this.getEventMapper());
5134
2794
  var timelineSet = eventTimeline.getTimelineSet();
5135
- timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
2795
+ timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
5136
2796
  this.processAggregatedTimelineEvents(room, matrixEvents);
5137
2797
  this.processThreadRoots(room, matrixEvents, backwards);
5138
2798
 
@@ -5160,8 +2820,8 @@ export class MatrixClient extends TypedEventEmitter {
5160
2820
  from: token !== null && token !== void 0 ? token : undefined,
5161
2821
  recurse: recurse || undefined
5162
2822
  }).then(/*#__PURE__*/function () {
5163
- var _ref7 = _asyncToGenerator(function* (res) {
5164
- var mapper = _this53.getEventMapper();
2823
+ var _ref4 = _asyncToGenerator(function* (res) {
2824
+ var mapper = _this28.getEventMapper();
5165
2825
  var matrixEvents = res.chunk.filter(noUnsafeEventProps).filter(getRelationsThreadFilter(thread.id)).map(mapper);
5166
2826
 
5167
2827
  // Process latest events first
@@ -5174,13 +2834,13 @@ export class MatrixClient extends TypedEventEmitter {
5174
2834
  }
5175
2835
  var newToken = res.next_batch;
5176
2836
  var timelineSet = eventTimeline.getTimelineSet();
5177
- timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, newToken !== null && newToken !== void 0 ? newToken : null);
2837
+ timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, newToken !== null && newToken !== void 0 ? newToken : null);
5178
2838
  if (!newToken && backwards) {
5179
2839
  var _thread$rootEvent, _eventTimeline$getRoo3;
5180
- var originalEvent = (_thread$rootEvent = thread.rootEvent) !== null && _thread$rootEvent !== void 0 ? _thread$rootEvent : mapper(yield _this53.fetchRoomEvent((_eventTimeline$getRoo3 = eventTimeline.getRoomId()) !== null && _eventTimeline$getRoo3 !== void 0 ? _eventTimeline$getRoo3 : "", thread.id));
5181
- timelineSet.addEventsToTimeline([originalEvent], true, eventTimeline, null);
2840
+ var originalEvent = (_thread$rootEvent = thread.rootEvent) !== null && _thread$rootEvent !== void 0 ? _thread$rootEvent : mapper(yield _this28.fetchRoomEvent((_eventTimeline$getRoo3 = eventTimeline.getRoomId()) !== null && _eventTimeline$getRoo3 !== void 0 ? _eventTimeline$getRoo3 : "", thread.id));
2841
+ timelineSet.addEventsToTimeline([originalEvent], true, false, eventTimeline, null);
5182
2842
  }
5183
- _this53.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
2843
+ _this28.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
5184
2844
 
5185
2845
  // if we've hit the end of the timeline, we need to stop trying to
5186
2846
  // paginate. We need to keep the 'forwards' token though, to make sure
@@ -5190,8 +2850,8 @@ export class MatrixClient extends TypedEventEmitter {
5190
2850
  }
5191
2851
  return Boolean(newToken);
5192
2852
  });
5193
- return function (_x5) {
5194
- return _ref7.apply(this, arguments);
2853
+ return function (_x3) {
2854
+ return _ref4.apply(this, arguments);
5195
2855
  };
5196
2856
  }()).finally(() => {
5197
2857
  eventTimeline.paginationRequests[dir] = null;
@@ -5211,7 +2871,7 @@ export class MatrixClient extends TypedEventEmitter {
5211
2871
  var matrixEvents = res.chunk.filter(noUnsafeEventProps).map(this.getEventMapper());
5212
2872
  var timelineSet = eventTimeline.getTimelineSet();
5213
2873
  var [timelineEvents,, unknownRelations] = room.partitionThreadedEvents(matrixEvents);
5214
- timelineSet.addEventsToTimeline(timelineEvents, backwards, eventTimeline, token);
2874
+ timelineSet.addEventsToTimeline(timelineEvents, backwards, false, eventTimeline, token);
5215
2875
  this.processAggregatedTimelineEvents(room, timelineEvents);
5216
2876
  this.processThreadRoots(room, timelineEvents.filter(it => it.getServerAggregatedRelation(THREAD_RELATION_TYPE.name)), false);
5217
2877
  unknownRelations.forEach(event => room.relations.aggregateChildEvent(event));
@@ -5466,10 +3126,10 @@ export class MatrixClient extends TypedEventEmitter {
5466
3126
  * @returns Promise which resolves: As requestEmailToken
5467
3127
  */
5468
3128
  requestTokenFromEndpoint(endpoint, params) {
5469
- var _this54 = this;
3129
+ var _this29 = this;
5470
3130
  return _asyncToGenerator(function* () {
5471
3131
  var postParams = Object.assign({}, params);
5472
- return _this54.http.request(Method.Post, endpoint, undefined, postParams);
3132
+ return _this29.http.request(Method.Post, endpoint, undefined, postParams);
5473
3133
  })();
5474
3134
  }
5475
3135
 
@@ -5764,14 +3424,14 @@ export class MatrixClient extends TypedEventEmitter {
5764
3424
  * @returns Filter ID
5765
3425
  */
5766
3426
  getOrCreateFilter(filterName, filter) {
5767
- var _this55 = this;
3427
+ var _this30 = this;
5768
3428
  return _asyncToGenerator(function* () {
5769
- var filterId = _this55.store.getFilterIdByName(filterName);
3429
+ var filterId = _this30.store.getFilterIdByName(filterName);
5770
3430
  var existingId;
5771
3431
  if (filterId) {
5772
3432
  // check that the existing filter matches our expectations
5773
3433
  try {
5774
- var existingFilter = yield _this55.getFilter(_this55.credentials.userId, filterId, true);
3434
+ var existingFilter = yield _this30.getFilter(_this30.credentials.userId, filterId, true);
5775
3435
  if (existingFilter) {
5776
3436
  var oldDef = existingFilter.getDefinition();
5777
3437
  var newDef = filter.getDefinition();
@@ -5795,7 +3455,7 @@ export class MatrixClient extends TypedEventEmitter {
5795
3455
  }
5796
3456
  // if the filter doesn't exist anymore on the server, remove from store
5797
3457
  if (!existingId) {
5798
- _this55.store.setFilterIdByName(filterName, undefined);
3458
+ _this30.store.setFilterIdByName(filterName, undefined);
5799
3459
  }
5800
3460
  }
5801
3461
  if (existingId) {
@@ -5803,8 +3463,8 @@ export class MatrixClient extends TypedEventEmitter {
5803
3463
  }
5804
3464
 
5805
3465
  // create a new filter
5806
- var createdFilter = yield _this55.createFilter(filter.getDefinition());
5807
- _this55.store.setFilterIdByName(filterName, createdFilter.filterId);
3466
+ var createdFilter = yield _this30.createFilter(filter.getDefinition());
3467
+ _this30.store.setFilterIdByName(filterName, createdFilter.filterId);
5808
3468
  return createdFilter.filterId;
5809
3469
  })();
5810
3470
  }
@@ -5822,84 +3482,6 @@ export class MatrixClient extends TypedEventEmitter {
5822
3482
  });
5823
3483
  return this.http.authedRequest(Method.Post, path, undefined, {});
5824
3484
  }
5825
- /**
5826
- * @returns Promise which resolves: ITurnServerResponse object
5827
- * @returns Rejects: with an error response.
5828
- */
5829
- turnServer() {
5830
- return this.http.authedRequest(Method.Get, "/voip/turnServer");
5831
- }
5832
-
5833
- /**
5834
- * Get the TURN servers for this homeserver.
5835
- * @returns The servers or an empty list.
5836
- */
5837
- getTurnServers() {
5838
- return this.turnServers || [];
5839
- }
5840
-
5841
- /**
5842
- * Get the unix timestamp (in milliseconds) at which the current
5843
- * TURN credentials (from getTurnServers) expire
5844
- * @returns The expiry timestamp in milliseconds
5845
- */
5846
- getTurnServersExpiry() {
5847
- return this.turnServersExpiry;
5848
- }
5849
- get pollingTurnServers() {
5850
- return this.checkTurnServersIntervalID !== undefined;
5851
- }
5852
-
5853
- // XXX: Intended private, used in code.
5854
- checkTurnServers() {
5855
- var _this56 = this;
5856
- return _asyncToGenerator(function* () {
5857
- if (!_this56.canSupportVoip) {
5858
- return;
5859
- }
5860
- var credentialsGood = false;
5861
- var remainingTime = _this56.turnServersExpiry - Date.now();
5862
- if (remainingTime > TURN_CHECK_INTERVAL) {
5863
- _this56.logger.debug("TURN creds are valid for another " + remainingTime + " ms: not fetching new ones.");
5864
- credentialsGood = true;
5865
- } else {
5866
- _this56.logger.debug("Fetching new TURN credentials");
5867
- try {
5868
- var res = yield _this56.turnServer();
5869
- if (res.uris) {
5870
- _this56.logger.debug("Got TURN URIs: " + res.uris + " refresh in " + res.ttl + " secs");
5871
- // map the response to a format that can be fed to RTCPeerConnection
5872
- var servers = {
5873
- urls: res.uris,
5874
- username: res.username,
5875
- credential: res.password
5876
- };
5877
- _this56.turnServers = [servers];
5878
- // The TTL is in seconds but we work in ms
5879
- _this56.turnServersExpiry = Date.now() + res.ttl * 1000;
5880
- credentialsGood = true;
5881
- _this56.emit(ClientEvent.TurnServers, _this56.turnServers);
5882
- }
5883
- } catch (err) {
5884
- _this56.logger.error("Failed to get TURN URIs", err);
5885
- if (err.httpStatus === 403) {
5886
- // We got a 403, so there's no point in looping forever.
5887
- _this56.logger.info("TURN access unavailable for this account: stopping credentials checks");
5888
- if (_this56.checkTurnServersIntervalID !== null) {
5889
- globalThis.clearInterval(_this56.checkTurnServersIntervalID);
5890
- }
5891
- _this56.checkTurnServersIntervalID = undefined;
5892
- _this56.emit(ClientEvent.TurnServersError, err, true); // fatal
5893
- } else {
5894
- // otherwise, if we failed for whatever reason, try again the next time we're called.
5895
- _this56.emit(ClientEvent.TurnServersError, err, false); // non-fatal
5896
- }
5897
- }
5898
- }
5899
- return credentialsGood;
5900
- })();
5901
- }
5902
-
5903
3485
  /**
5904
3486
  * Set whether to allow a fallback ICE server should be used for negotiating a
5905
3487
  * WebRTC connection if the homeserver doesn't provide any servers. Defaults to
@@ -5968,14 +3550,14 @@ export class MatrixClient extends TypedEventEmitter {
5968
3550
  });
5969
3551
  }
5970
3552
  fetchClientWellKnown() {
5971
- var _this57 = this;
3553
+ var _this31 = this;
5972
3554
  return _asyncToGenerator(function* () {
5973
- var _this57$getDomain;
3555
+ var _this31$getDomain;
5974
3556
  // `getRawClientConfig` does not throw or reject on network errors, instead
5975
3557
  // it absorbs errors and returns `{}`.
5976
- _this57.clientWellKnownPromise = AutoDiscovery.getRawClientConfig((_this57$getDomain = _this57.getDomain()) !== null && _this57$getDomain !== void 0 ? _this57$getDomain : undefined);
5977
- _this57.clientWellKnown = yield _this57.clientWellKnownPromise;
5978
- _this57.emit(ClientEvent.ClientWellKnown, _this57.clientWellKnown);
3558
+ _this31.clientWellKnownPromise = AutoDiscovery.getRawClientConfig((_this31$getDomain = _this31.getDomain()) !== null && _this31$getDomain !== void 0 ? _this31$getDomain : undefined);
3559
+ _this31.clientWellKnown = yield _this31.clientWellKnownPromise;
3560
+ _this31.emit(ClientEvent.ClientWellKnown, _this31.clientWellKnown);
5979
3561
  })();
5980
3562
  }
5981
3563
  getClientWellKnown() {
@@ -5997,11 +3579,11 @@ export class MatrixClient extends TypedEventEmitter {
5997
3579
  storeClientOptions() {
5998
3580
  // XXX: Intended private, used in code
5999
3581
  var primTypes = ["boolean", "string", "number"];
6000
- var serializableOpts = Object.entries(this.clientOpts).filter(_ref8 => {
6001
- var [key, value] = _ref8;
3582
+ var serializableOpts = Object.entries(this.clientOpts).filter(_ref5 => {
3583
+ var [key, value] = _ref5;
6002
3584
  return primTypes.includes(typeof value);
6003
- }).reduce((obj, _ref9) => {
6004
- var [key, value] = _ref9;
3585
+ }).reduce((obj, _ref6) => {
3586
+ var [key, value] = _ref6;
6005
3587
  obj[key] = value;
6006
3588
  return obj;
6007
3589
  }, {});
@@ -6021,16 +3603,16 @@ export class MatrixClient extends TypedEventEmitter {
6021
3603
  // TODO: on spec release, rename this to getMutualRooms
6022
3604
  // eslint-disable-next-line
6023
3605
  _unstable_getSharedRooms(userId) {
6024
- var _this58 = this;
3606
+ var _this32 = this;
6025
3607
  return _asyncToGenerator(function* () {
6026
3608
  // Initial variant of the MSC
6027
- var sharedRoomsSupport = yield _this58.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_SHARED_ROOMS);
3609
+ var sharedRoomsSupport = yield _this32.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_SHARED_ROOMS);
6028
3610
 
6029
3611
  // Newer variant that renamed shared rooms to mutual rooms
6030
- var mutualRoomsSupport = yield _this58.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_MUTUAL_ROOMS);
3612
+ var mutualRoomsSupport = yield _this32.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_MUTUAL_ROOMS);
6031
3613
 
6032
3614
  // Latest variant that changed from path elements to query elements
6033
- var queryMutualRoomsSupport = yield _this58.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS);
3615
+ var queryMutualRoomsSupport = yield _this32.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS);
6034
3616
  if (!sharedRoomsSupport && !mutualRoomsSupport && !queryMutualRoomsSupport) {
6035
3617
  throw Error("Server does not support the Mutual Rooms API");
6036
3618
  }
@@ -6058,7 +3640,7 @@ export class MatrixClient extends TypedEventEmitter {
6058
3640
  if (token != null && queryMutualRoomsSupport) {
6059
3641
  tokenQuery["batch_token"] = token;
6060
3642
  }
6061
- var res = yield _this58.http.authedRequest(Method.Get, path, _objectSpread(_objectSpread({}, query), tokenQuery), undefined, {
3643
+ var res = yield _this32.http.authedRequest(Method.Get, path, _objectSpread(_objectSpread({}, query), tokenQuery), undefined, {
6062
3644
  prefix: ClientPrefix.Unstable
6063
3645
  });
6064
3646
  rooms.push(...res.joined);
@@ -6078,24 +3660,24 @@ export class MatrixClient extends TypedEventEmitter {
6078
3660
  * @returns The server /versions response
6079
3661
  */
6080
3662
  getVersions() {
6081
- var _this59 = this;
3663
+ var _this33 = this;
6082
3664
  return _asyncToGenerator(function* () {
6083
- if (_this59.serverVersionsPromise) {
6084
- return _this59.serverVersionsPromise;
3665
+ if (_this33.serverVersionsPromise) {
3666
+ return _this33.serverVersionsPromise;
6085
3667
  }
6086
3668
 
6087
3669
  // We send an authenticated request as of MSC4026
6088
- _this59.serverVersionsPromise = _this59.http.authedRequest(Method.Get, "/_matrix/client/versions", undefined, undefined, {
3670
+ _this33.serverVersionsPromise = _this33.http.authedRequest(Method.Get, "/_matrix/client/versions", undefined, undefined, {
6089
3671
  prefix: ""
6090
3672
  }).catch(e => {
6091
3673
  // Need to unset this if it fails, otherwise we'll never retry
6092
- _this59.serverVersionsPromise = undefined;
3674
+ _this33.serverVersionsPromise = undefined;
6093
3675
  // but rethrow the exception to anything that was waiting
6094
3676
  throw e;
6095
3677
  });
6096
- var serverVersions = yield _this59.serverVersionsPromise;
6097
- _this59.canSupport = yield buildFeatureSupportMap(serverVersions);
6098
- return _this59.serverVersionsPromise;
3678
+ var serverVersions = yield _this33.serverVersionsPromise;
3679
+ _this33.canSupport = yield buildFeatureSupportMap(serverVersions);
3680
+ return _this33.serverVersionsPromise;
6099
3681
  })();
6100
3682
  }
6101
3683
 
@@ -6105,11 +3687,11 @@ export class MatrixClient extends TypedEventEmitter {
6105
3687
  * @returns Whether it is supported
6106
3688
  */
6107
3689
  isVersionSupported(version) {
6108
- var _this60 = this;
3690
+ var _this34 = this;
6109
3691
  return _asyncToGenerator(function* () {
6110
3692
  var {
6111
3693
  versions
6112
- } = yield _this60.getVersions();
3694
+ } = yield _this34.getVersions();
6113
3695
  return versions && versions.includes(version);
6114
3696
  })();
6115
3697
  }
@@ -6121,9 +3703,9 @@ export class MatrixClient extends TypedEventEmitter {
6121
3703
  * @returns true if the feature is supported
6122
3704
  */
6123
3705
  doesServerSupportUnstableFeature(feature) {
6124
- var _this61 = this;
3706
+ var _this35 = this;
6125
3707
  return _asyncToGenerator(function* () {
6126
- var response = yield _this61.getVersions();
3708
+ var response = yield _this35.getVersions();
6127
3709
  if (!response) return false;
6128
3710
  var unstableFeatures = response["unstable_features"];
6129
3711
  return unstableFeatures && !!unstableFeatures[feature];
@@ -6138,9 +3720,9 @@ export class MatrixClient extends TypedEventEmitter {
6138
3720
  * for the preset.
6139
3721
  */
6140
3722
  doesServerForceEncryptionForPreset(presetName) {
6141
- var _this62 = this;
3723
+ var _this36 = this;
6142
3724
  return _asyncToGenerator(function* () {
6143
- var response = yield _this62.getVersions();
3725
+ var response = yield _this36.getVersions();
6144
3726
  if (!response) return false;
6145
3727
  var unstableFeatures = response["unstable_features"];
6146
3728
 
@@ -6150,9 +3732,9 @@ export class MatrixClient extends TypedEventEmitter {
6150
3732
  })();
6151
3733
  }
6152
3734
  doesServerSupportThread() {
6153
- var _this63 = this;
3735
+ var _this37 = this;
6154
3736
  return _asyncToGenerator(function* () {
6155
- if (yield _this63.isVersionSupported("v1.4")) {
3737
+ if (yield _this37.isVersionSupported("v1.4")) {
6156
3738
  return {
6157
3739
  threads: FeatureSupport.Stable,
6158
3740
  list: FeatureSupport.Stable,
@@ -6160,13 +3742,13 @@ export class MatrixClient extends TypedEventEmitter {
6160
3742
  };
6161
3743
  }
6162
3744
  try {
6163
- var [threadUnstable, threadStable, listUnstable, listStable, fwdPaginationUnstable, fwdPaginationStable] = yield Promise.all([_this63.doesServerSupportUnstableFeature("org.matrix.msc3440"), _this63.doesServerSupportUnstableFeature("org.matrix.msc3440.stable"), _this63.doesServerSupportUnstableFeature("org.matrix.msc3856"), _this63.doesServerSupportUnstableFeature("org.matrix.msc3856.stable"), _this63.doesServerSupportUnstableFeature("org.matrix.msc3715"), _this63.doesServerSupportUnstableFeature("org.matrix.msc3715.stable")]);
3745
+ var [threadUnstable, threadStable, listUnstable, listStable, fwdPaginationUnstable, fwdPaginationStable] = yield Promise.all([_this37.doesServerSupportUnstableFeature("org.matrix.msc3440"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3440.stable"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3856"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3856.stable"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3715"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3715.stable")]);
6164
3746
  return {
6165
3747
  threads: determineFeatureSupport(threadStable, threadUnstable),
6166
3748
  list: determineFeatureSupport(listStable, listUnstable),
6167
3749
  fwdPagination: determineFeatureSupport(fwdPaginationStable, fwdPaginationUnstable)
6168
3750
  };
6169
- } catch (_unused3) {
3751
+ } catch (_unused) {
6170
3752
  return {
6171
3753
  threads: FeatureSupport.None,
6172
3754
  list: FeatureSupport.None,
@@ -6218,21 +3800,19 @@ export class MatrixClient extends TypedEventEmitter {
6218
3800
  * @returns an object with `events` as `MatrixEvent[]` and optionally `nextBatch` if more relations are available.
6219
3801
  */
6220
3802
  relations(roomId, eventId, relationType, eventType) {
6221
- var _arguments8 = arguments,
6222
- _this64 = this;
3803
+ var _arguments6 = arguments,
3804
+ _this38 = this;
6223
3805
  return _asyncToGenerator(function* () {
6224
3806
  var _result$next_batch, _result$prev_batch;
6225
- var opts = _arguments8.length > 4 && _arguments8[4] !== undefined ? _arguments8[4] : {
3807
+ var opts = _arguments6.length > 4 && _arguments6[4] !== undefined ? _arguments6[4] : {
6226
3808
  dir: Direction.Backward
6227
3809
  };
6228
- var fetchedEventType = eventType ? _this64.getEncryptedIfNeededEventType(roomId, eventType) : null;
6229
- var [eventResult, result] = yield Promise.all([_this64.fetchRoomEvent(roomId, eventId), _this64.fetchRelations(roomId, eventId, relationType, fetchedEventType, opts)]);
6230
- var mapper = _this64.getEventMapper();
3810
+ var fetchedEventType = eventType ? _this38.getEncryptedIfNeededEventType(roomId, eventType) : null;
3811
+ var [eventResult, result] = yield Promise.all([_this38.fetchRoomEvent(roomId, eventId), _this38.fetchRelations(roomId, eventId, relationType, fetchedEventType, opts)]);
3812
+ var mapper = _this38.getEventMapper();
6231
3813
  var originalEvent = eventResult ? mapper(eventResult) : undefined;
6232
3814
  var events = result.chunk.map(mapper);
6233
3815
  if (fetchedEventType === EventType.RoomMessageEncrypted) {
6234
- var allEvents = originalEvent ? events.concat(originalEvent) : events;
6235
- yield Promise.all(allEvents.map(e => _this64.decryptEventIfNeeded(e)));
6236
3816
  if (eventType !== null) {
6237
3817
  events = events.filter(e => e.getType() === eventType);
6238
3818
  }
@@ -6249,18 +3829,6 @@ export class MatrixClient extends TypedEventEmitter {
6249
3829
  })();
6250
3830
  }
6251
3831
 
6252
- /**
6253
- * The app may wish to see if we have a key cached without
6254
- * triggering a user interaction.
6255
- *
6256
- * @deprecated Not supported for Rust Cryptography.
6257
- */
6258
- getCrossSigningCacheCallbacks() {
6259
- var _this$crypto4;
6260
- // XXX: Private member access
6261
- return (_this$crypto4 = this.crypto) === null || _this$crypto4 === void 0 ? void 0 : _this$crypto4.crossSigningInfo.getCacheCallbacks();
6262
- }
6263
-
6264
3832
  /**
6265
3833
  * Generates a random string suitable for use as a client secret. <strong>This
6266
3834
  * method is experimental and may change.</strong>
@@ -6276,14 +3844,7 @@ export class MatrixClient extends TypedEventEmitter {
6276
3844
  * @returns A decryption promise
6277
3845
  */
6278
3846
  decryptEventIfNeeded(event, options) {
6279
- if (event.shouldAttemptDecryption() && this.isCryptoEnabled()) {
6280
- event.attemptDecryption(this.cryptoBackend, options);
6281
- }
6282
- if (event.isBeingDecrypted()) {
6283
- return event.getDecryptionPromise();
6284
- } else {
6285
- return Promise.resolve();
6286
- }
3847
+ return Promise.resolve();
6287
3848
  }
6288
3849
  termsUrlForService(serviceType, baseUrl) {
6289
3850
  switch (serviceType) {
@@ -6582,23 +4143,15 @@ export class MatrixClient extends TypedEventEmitter {
6582
4143
  * @returns Promise which resolves: On success, the empty object `{}`
6583
4144
  */
6584
4145
  logout() {
6585
- var _arguments9 = arguments,
6586
- _this65 = this;
4146
+ var _arguments7 = arguments,
4147
+ _this39 = this;
6587
4148
  return _asyncToGenerator(function* () {
6588
- var _this65$crypto;
6589
- var stopClient = _arguments9.length > 0 && _arguments9[0] !== undefined ? _arguments9[0] : false;
6590
- if ((_this65$crypto = _this65.crypto) !== null && _this65$crypto !== void 0 && (_this65$crypto = _this65$crypto.backupManager) !== null && _this65$crypto !== void 0 && _this65$crypto.getKeyBackupEnabled()) {
6591
- try {
6592
- while ((yield _this65.crypto.backupManager.backupPendingKeys(200)) > 0);
6593
- } catch (err) {
6594
- _this65.logger.error("Key backup request failed when logging out. Some keys may be missing from backup", err);
6595
- }
6596
- }
4149
+ var stopClient = _arguments7.length > 0 && _arguments7[0] !== undefined ? _arguments7[0] : false;
6597
4150
  if (stopClient) {
6598
- _this65.stopClient();
6599
- _this65.http.abort();
4151
+ _this39.stopClient();
4152
+ _this39.http.abort();
6600
4153
  }
6601
- return _this65.http.authedRequest(Method.Post, "/logout");
4154
+ return _this39.http.authedRequest(Method.Post, "/logout");
6602
4155
  })();
6603
4156
  }
6604
4157
 
@@ -6636,12 +4189,12 @@ export class MatrixClient extends TypedEventEmitter {
6636
4189
  * or UIA auth data.
6637
4190
  */
6638
4191
  requestLoginToken(auth) {
6639
- var _this66 = this;
4192
+ var _this40 = this;
6640
4193
  return _asyncToGenerator(function* () {
6641
4194
  var body = {
6642
4195
  auth
6643
4196
  };
6644
- return _this66.http.authedRequest(Method.Post, "/login/get_token", undefined,
4197
+ return _this40.http.authedRequest(Method.Post, "/login/get_token", undefined,
6645
4198
  // no query params
6646
4199
  body, {
6647
4200
  prefix: ClientPrefix.V1
@@ -6673,23 +4226,23 @@ export class MatrixClient extends TypedEventEmitter {
6673
4226
  * @returns Rejects: with an error response.
6674
4227
  */
6675
4228
  createRoom(options) {
6676
- var _this67 = this;
4229
+ var _this41 = this;
6677
4230
  return _asyncToGenerator(function* () {
6678
- var _this67$identityServe;
4231
+ var _this41$identityServe;
6679
4232
  // eslint-disable-line camelcase
6680
4233
  // some valid options include: room_alias_name, visibility, invite
6681
4234
 
6682
4235
  // inject the id_access_token if inviting 3rd party addresses
6683
4236
  var invitesNeedingToken = (options.invite_3pid || []).filter(i => !i.id_access_token);
6684
- if (invitesNeedingToken.length > 0 && (_this67$identityServe = _this67.identityServer) !== null && _this67$identityServe !== void 0 && _this67$identityServe.getAccessToken) {
6685
- var identityAccessToken = yield _this67.identityServer.getAccessToken();
4237
+ if (invitesNeedingToken.length > 0 && (_this41$identityServe = _this41.identityServer) !== null && _this41$identityServe !== void 0 && _this41$identityServe.getAccessToken) {
4238
+ var identityAccessToken = yield _this41.identityServer.getAccessToken();
6686
4239
  if (identityAccessToken) {
6687
4240
  for (var invite of invitesNeedingToken) {
6688
4241
  invite.id_access_token = identityAccessToken;
6689
4242
  }
6690
4243
  }
6691
4244
  }
6692
- return _this67.http.authedRequest(Method.Post, "/createRoom", undefined, options);
4245
+ return _this41.http.authedRequest(Method.Post, "/createRoom", undefined, options);
6693
4246
  })();
6694
4247
  }
6695
4248
 
@@ -6873,7 +4426,7 @@ export class MatrixClient extends TypedEventEmitter {
6873
4426
  * @returns Promise which resolves: the empty object, `{}`.
6874
4427
  */
6875
4428
  setRoomReadMarkersHttpRequest(roomId, rmEventId, rrEventId, rpEventId) {
6876
- var _this68 = this;
4429
+ var _this42 = this;
6877
4430
  return _asyncToGenerator(function* () {
6878
4431
  var path = utils.encodeUri("/rooms/$roomId/read_markers", {
6879
4432
  $roomId: roomId
@@ -6882,10 +4435,10 @@ export class MatrixClient extends TypedEventEmitter {
6882
4435
  [ReceiptType.FullyRead]: rmEventId,
6883
4436
  [ReceiptType.Read]: rrEventId
6884
4437
  };
6885
- if ((yield _this68.doesServerSupportUnstableFeature("org.matrix.msc2285.stable")) || (yield _this68.isVersionSupported("v1.4"))) {
4438
+ if ((yield _this42.doesServerSupportUnstableFeature("org.matrix.msc2285.stable")) || (yield _this42.isVersionSupported("v1.4"))) {
6886
4439
  content[ReceiptType.ReadPrivate] = rpEventId;
6887
4440
  }
6888
- return _this68.http.authedRequest(Method.Post, path, undefined, content);
4441
+ return _this42.http.authedRequest(Method.Post, path, undefined, content);
6889
4442
  })();
6890
4443
  }
6891
4444
 
@@ -6918,13 +4471,13 @@ export class MatrixClient extends TypedEventEmitter {
6918
4471
  * @returns Rejects: with an error response.
6919
4472
  */
6920
4473
  publicRooms() {
6921
- var _ref10 = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
4474
+ var _ref7 = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
6922
4475
  var {
6923
4476
  server,
6924
4477
  limit,
6925
4478
  since
6926
- } = _ref10,
6927
- options = _objectWithoutProperties(_ref10, _excluded);
4479
+ } = _ref7,
4480
+ options = _objectWithoutProperties(_ref7, _excluded);
6928
4481
  if (Object.keys(options).length === 0) {
6929
4482
  var queryParams = {
6930
4483
  server,
@@ -7042,11 +4595,11 @@ export class MatrixClient extends TypedEventEmitter {
7042
4595
  * @param options.limit - the maximum number of results to return. The server will apply a limit if unspecified.
7043
4596
  * @returns Promise which resolves: an array of results.
7044
4597
  */
7045
- searchUserDirectory(_ref11) {
4598
+ searchUserDirectory(_ref8) {
7046
4599
  var {
7047
4600
  term,
7048
4601
  limit
7049
- } = _ref11;
4602
+ } = _ref8;
7050
4603
  var body = {
7051
4604
  search_term: term
7052
4605
  };
@@ -7118,9 +4671,9 @@ export class MatrixClient extends TypedEventEmitter {
7118
4671
  * @returns `true` if supported, otherwise `false`
7119
4672
  */
7120
4673
  doesServerSupportExtendedProfiles() {
7121
- var _this69 = this;
4674
+ var _this43 = this;
7122
4675
  return _asyncToGenerator(function* () {
7123
- return _this69.doesServerSupportUnstableFeature(UNSTABLE_MSC4133_EXTENDED_PROFILES);
4676
+ return _this43.doesServerSupportUnstableFeature(UNSTABLE_MSC4133_EXTENDED_PROFILES);
7124
4677
  })();
7125
4678
  }
7126
4679
 
@@ -7130,9 +4683,9 @@ export class MatrixClient extends TypedEventEmitter {
7130
4683
  * @returns The prefix for use with `authedRequest`
7131
4684
  */
7132
4685
  getExtendedProfileRequestPrefix() {
7133
- var _this70 = this;
4686
+ var _this44 = this;
7134
4687
  return _asyncToGenerator(function* () {
7135
- if (yield _this70.doesServerSupportUnstableFeature("uk.tcpip.msc4133.stable")) {
4688
+ if (yield _this44.doesServerSupportUnstableFeature("uk.tcpip.msc4133.stable")) {
7136
4689
  return ClientPrefix.V3;
7137
4690
  }
7138
4691
  return "/_matrix/client/unstable/uk.tcpip.msc4133";
@@ -7150,15 +4703,15 @@ export class MatrixClient extends TypedEventEmitter {
7150
4703
  * @throws A M_NOT_FOUND error if the profile could not be found.
7151
4704
  */
7152
4705
  getExtendedProfile(userId) {
7153
- var _this71 = this;
4706
+ var _this45 = this;
7154
4707
  return _asyncToGenerator(function* () {
7155
- if (!(yield _this71.doesServerSupportExtendedProfiles())) {
4708
+ if (!(yield _this45.doesServerSupportExtendedProfiles())) {
7156
4709
  throw new Error("Server does not support extended profiles");
7157
4710
  }
7158
- return _this71.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId", {
4711
+ return _this45.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId", {
7159
4712
  $userId: userId
7160
4713
  }), undefined, undefined, {
7161
- prefix: yield _this71.getExtendedProfileRequestPrefix()
4714
+ prefix: yield _this45.getExtendedProfileRequestPrefix()
7162
4715
  });
7163
4716
  })();
7164
4717
  }
@@ -7175,16 +4728,16 @@ export class MatrixClient extends TypedEventEmitter {
7175
4728
  * @throws A M_NOT_FOUND error if the key was not set OR the profile could not be found.
7176
4729
  */
7177
4730
  getExtendedProfileProperty(userId, key) {
7178
- var _this72 = this;
4731
+ var _this46 = this;
7179
4732
  return _asyncToGenerator(function* () {
7180
- if (!(yield _this72.doesServerSupportExtendedProfiles())) {
4733
+ if (!(yield _this46.doesServerSupportExtendedProfiles())) {
7181
4734
  throw new Error("Server does not support extended profiles");
7182
4735
  }
7183
- var profile = yield _this72.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId/$key", {
4736
+ var profile = yield _this46.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId/$key", {
7184
4737
  $userId: userId,
7185
4738
  $key: key
7186
4739
  }), undefined, undefined, {
7187
- prefix: yield _this72.getExtendedProfileRequestPrefix()
4740
+ prefix: yield _this46.getExtendedProfileRequestPrefix()
7188
4741
  });
7189
4742
  return profile[key];
7190
4743
  })();
@@ -7200,19 +4753,19 @@ export class MatrixClient extends TypedEventEmitter {
7200
4753
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
7201
4754
  */
7202
4755
  setExtendedProfileProperty(key, value) {
7203
- var _this73 = this;
4756
+ var _this47 = this;
7204
4757
  return _asyncToGenerator(function* () {
7205
- if (!(yield _this73.doesServerSupportExtendedProfiles())) {
4758
+ if (!(yield _this47.doesServerSupportExtendedProfiles())) {
7206
4759
  throw new Error("Server does not support extended profiles");
7207
4760
  }
7208
- var userId = _this73.getUserId();
7209
- yield _this73.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId/$key", {
4761
+ var userId = _this47.getUserId();
4762
+ yield _this47.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId/$key", {
7210
4763
  $userId: userId,
7211
4764
  $key: key
7212
4765
  }), undefined, {
7213
4766
  [key]: value
7214
4767
  }, {
7215
- prefix: yield _this73.getExtendedProfileRequestPrefix()
4768
+ prefix: yield _this47.getExtendedProfileRequestPrefix()
7216
4769
  });
7217
4770
  })();
7218
4771
  }
@@ -7226,17 +4779,17 @@ export class MatrixClient extends TypedEventEmitter {
7226
4779
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
7227
4780
  */
7228
4781
  deleteExtendedProfileProperty(key) {
7229
- var _this74 = this;
4782
+ var _this48 = this;
7230
4783
  return _asyncToGenerator(function* () {
7231
- if (!(yield _this74.doesServerSupportExtendedProfiles())) {
4784
+ if (!(yield _this48.doesServerSupportExtendedProfiles())) {
7232
4785
  throw new Error("Server does not support extended profiles");
7233
4786
  }
7234
- var userId = _this74.getUserId();
7235
- yield _this74.http.authedRequest(Method.Delete, utils.encodeUri("/profile/$userId/$key", {
4787
+ var userId = _this48.getUserId();
4788
+ yield _this48.http.authedRequest(Method.Delete, utils.encodeUri("/profile/$userId/$key", {
7236
4789
  $userId: userId,
7237
4790
  $key: key
7238
4791
  }), undefined, undefined, {
7239
- prefix: yield _this74.getExtendedProfileRequestPrefix()
4792
+ prefix: yield _this48.getExtendedProfileRequestPrefix()
7240
4793
  });
7241
4794
  })();
7242
4795
  }
@@ -7252,16 +4805,16 @@ export class MatrixClient extends TypedEventEmitter {
7252
4805
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
7253
4806
  */
7254
4807
  patchExtendedProfile(profile) {
7255
- var _this75 = this;
4808
+ var _this49 = this;
7256
4809
  return _asyncToGenerator(function* () {
7257
- if (!(yield _this75.doesServerSupportExtendedProfiles())) {
4810
+ if (!(yield _this49.doesServerSupportExtendedProfiles())) {
7258
4811
  throw new Error("Server does not support extended profiles");
7259
4812
  }
7260
- var userId = _this75.getUserId();
7261
- return _this75.http.authedRequest(Method.Patch, utils.encodeUri("/profile/$userId", {
4813
+ var userId = _this49.getUserId();
4814
+ return _this49.http.authedRequest(Method.Patch, utils.encodeUri("/profile/$userId", {
7262
4815
  $userId: userId
7263
4816
  }), {}, profile, {
7264
- prefix: yield _this75.getExtendedProfileRequestPrefix()
4817
+ prefix: yield _this49.getExtendedProfileRequestPrefix()
7265
4818
  });
7266
4819
  })();
7267
4820
  }
@@ -7276,16 +4829,16 @@ export class MatrixClient extends TypedEventEmitter {
7276
4829
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
7277
4830
  */
7278
4831
  setExtendedProfile(profile) {
7279
- var _this76 = this;
4832
+ var _this50 = this;
7280
4833
  return _asyncToGenerator(function* () {
7281
- if (!(yield _this76.doesServerSupportExtendedProfiles())) {
4834
+ if (!(yield _this50.doesServerSupportExtendedProfiles())) {
7282
4835
  throw new Error("Server does not support extended profiles");
7283
4836
  }
7284
- var userId = _this76.getUserId();
7285
- yield _this76.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId", {
4837
+ var userId = _this50.getUserId();
4838
+ yield _this50.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId", {
7286
4839
  $userId: userId
7287
4840
  }), {}, profile, {
7288
- prefix: yield _this76.getExtendedProfileRequestPrefix()
4841
+ prefix: yield _this50.getExtendedProfileRequestPrefix()
7289
4842
  });
7290
4843
  })();
7291
4844
  }
@@ -7308,10 +4861,10 @@ export class MatrixClient extends TypedEventEmitter {
7308
4861
  * @returns Rejects: with an error response.
7309
4862
  */
7310
4863
  addThreePidOnly(data) {
7311
- var _this77 = this;
4864
+ var _this51 = this;
7312
4865
  return _asyncToGenerator(function* () {
7313
4866
  var path = "/account/3pid/add";
7314
- return _this77.http.authedRequest(Method.Post, path, undefined, data);
4867
+ return _this51.http.authedRequest(Method.Post, path, undefined, data);
7315
4868
  })();
7316
4869
  }
7317
4870
 
@@ -7327,10 +4880,10 @@ export class MatrixClient extends TypedEventEmitter {
7327
4880
  * @returns Rejects: with an error response.
7328
4881
  */
7329
4882
  bindThreePid(data) {
7330
- var _this78 = this;
4883
+ var _this52 = this;
7331
4884
  return _asyncToGenerator(function* () {
7332
4885
  var path = "/account/3pid/bind";
7333
- return _this78.http.authedRequest(Method.Post, path, undefined, data);
4886
+ return _this52.http.authedRequest(Method.Post, path, undefined, data);
7334
4887
  })();
7335
4888
  }
7336
4889
 
@@ -7348,15 +4901,15 @@ export class MatrixClient extends TypedEventEmitter {
7348
4901
  unbindThreePid(medium, address
7349
4902
  // eslint-disable-next-line camelcase
7350
4903
  ) {
7351
- var _this79 = this;
4904
+ var _this53 = this;
7352
4905
  return _asyncToGenerator(function* () {
7353
4906
  var path = "/account/3pid/unbind";
7354
4907
  var data = {
7355
4908
  medium,
7356
4909
  address,
7357
- id_server: _this79.getIdentityServerUrl(true)
4910
+ id_server: _this53.getIdentityServerUrl(true)
7358
4911
  };
7359
- return _this79.http.authedRequest(Method.Post, path, undefined, data);
4912
+ return _this53.http.authedRequest(Method.Post, path, undefined, data);
7360
4913
  })();
7361
4914
  }
7362
4915
 
@@ -7478,13 +5031,13 @@ export class MatrixClient extends TypedEventEmitter {
7478
5031
  * @returns Rejects: with an error response.
7479
5032
  */
7480
5033
  getPushers() {
7481
- var _this80 = this;
5034
+ var _this54 = this;
7482
5035
  return _asyncToGenerator(function* () {
7483
- var response = yield _this80.http.authedRequest(Method.Get, "/pushers");
5036
+ var response = yield _this54.http.authedRequest(Method.Get, "/pushers");
7484
5037
 
7485
5038
  // Migration path for clients that connect to a homeserver that does not support
7486
5039
  // MSC3881 yet, see https://github.com/matrix-org/matrix-spec-proposals/blob/kerry/remote-push-toggle/proposals/3881-remote-push-notification-toggling.md#migration
7487
- if (!(yield _this80.doesServerSupportUnstableFeature("org.matrix.msc3881"))) {
5040
+ if (!(yield _this54.doesServerSupportUnstableFeature("org.matrix.msc3881"))) {
7488
5041
  response.pushers = response.pushers.map(pusher => {
7489
5042
  if (!pusher.hasOwnProperty(PUSHER_ENABLED.name)) {
7490
5043
  pusher[PUSHER_ENABLED.name] = true;
@@ -7623,11 +5176,11 @@ export class MatrixClient extends TypedEventEmitter {
7623
5176
  * @returns Promise which resolves to the search response object.
7624
5177
  * @returns Rejects: with an error response.
7625
5178
  */
7626
- search(_ref12, abortSignal) {
5179
+ search(_ref9, abortSignal) {
7627
5180
  var {
7628
5181
  body,
7629
5182
  next_batch: nextBatch
7630
- } = _ref12;
5183
+ } = _ref9;
7631
5184
  var queryParams = {};
7632
5185
  if (nextBatch) {
7633
5186
  queryParams.next_batch = nextBatch;
@@ -7637,86 +5190,6 @@ export class MatrixClient extends TypedEventEmitter {
7637
5190
  });
7638
5191
  }
7639
5192
 
7640
- /**
7641
- * Upload keys
7642
- *
7643
- * @param content - body of upload request
7644
- *
7645
- * @param opts - this method no longer takes any opts,
7646
- * used to take opts.device_id but this was not removed from the spec as a redundant parameter
7647
- *
7648
- * @returns Promise which resolves: result object. Rejects: with
7649
- * an error response ({@link MatrixError}).
7650
- */
7651
- uploadKeysRequest(content, opts) {
7652
- return this.http.authedRequest(Method.Post, "/keys/upload", undefined, content);
7653
- }
7654
- uploadKeySignatures(content) {
7655
- return this.http.authedRequest(Method.Post, "/keys/signatures/upload", undefined, content);
7656
- }
7657
-
7658
- /**
7659
- * Download device keys
7660
- *
7661
- * @param userIds - list of users to get keys for
7662
- *
7663
- * @param token - sync token to pass in the query request, to help
7664
- * the HS give the most recent results
7665
- *
7666
- * @returns Promise which resolves: result object. Rejects: with
7667
- * an error response ({@link MatrixError}).
7668
- */
7669
- downloadKeysForUsers(userIds) {
7670
- var {
7671
- token
7672
- } = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
7673
- var content = {
7674
- device_keys: {}
7675
- };
7676
- if (token !== undefined) {
7677
- content.token = token;
7678
- }
7679
- userIds.forEach(u => {
7680
- content.device_keys[u] = [];
7681
- });
7682
- return this.http.authedRequest(Method.Post, "/keys/query", undefined, content);
7683
- }
7684
-
7685
- /**
7686
- * Claim one-time keys
7687
- *
7688
- * @param devices - a list of [userId, deviceId] pairs
7689
- *
7690
- * @param keyAlgorithm - desired key type
7691
- *
7692
- * @param timeout - the time (in milliseconds) to wait for keys from remote
7693
- * servers
7694
- *
7695
- * @returns Promise which resolves: result object. Rejects: with
7696
- * an error response ({@link MatrixError}).
7697
- */
7698
- claimOneTimeKeys(devices) {
7699
- var keyAlgorithm = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "signed_curve25519";
7700
- var timeout = arguments.length > 2 ? arguments[2] : undefined;
7701
- var queries = {};
7702
- if (keyAlgorithm === undefined) {
7703
- keyAlgorithm = "signed_curve25519";
7704
- }
7705
- for (var [userId, _deviceId] of devices) {
7706
- var query = queries[userId] || {};
7707
- safeSet(queries, userId, query);
7708
- safeSet(query, _deviceId, keyAlgorithm);
7709
- }
7710
- var content = {
7711
- one_time_keys: queries
7712
- };
7713
- if (timeout) {
7714
- content.timeout = timeout;
7715
- }
7716
- var path = "/keys/claim";
7717
- return this.http.authedRequest(Method.Post, path, undefined, content);
7718
- }
7719
-
7720
5193
  /**
7721
5194
  * Ask the server for a list of users who have changed their device lists
7722
5195
  * between a pair of sync tokens
@@ -7732,16 +5205,6 @@ export class MatrixClient extends TypedEventEmitter {
7732
5205
  };
7733
5206
  return this.http.authedRequest(Method.Get, "/keys/changes", qps);
7734
5207
  }
7735
- uploadDeviceSigningKeys(auth, keys) {
7736
- // API returns empty object
7737
- var data = Object.assign({}, keys);
7738
- if (auth) Object.assign(data, {
7739
- auth
7740
- });
7741
- return this.http.authedRequest(Method.Post, "/keys/device_signing/upload", undefined, data, {
7742
- prefix: ClientPrefix.Unstable
7743
- });
7744
- }
7745
5208
 
7746
5209
  /**
7747
5210
  * Register with an identity server using the OpenID token from the user's
@@ -7914,7 +5377,7 @@ export class MatrixClient extends TypedEventEmitter {
7914
5377
  * found MXIDs. Results where no user could be found will not be listed.
7915
5378
  */
7916
5379
  identityHashedLookup(addressPairs, identityAccessToken) {
7917
- var _this81 = this;
5380
+ var _this55 = this;
7918
5381
  return _asyncToGenerator(function* () {
7919
5382
  var params = {
7920
5383
  // addresses: ["email@example.org", "10005550000"],
@@ -7923,7 +5386,7 @@ export class MatrixClient extends TypedEventEmitter {
7923
5386
  };
7924
5387
 
7925
5388
  // Get hash information first before trying to do a lookup
7926
- var hashes = yield _this81.getIdentityHashDetails(identityAccessToken);
5389
+ var hashes = yield _this55.getIdentityHashDetails(identityAccessToken);
7927
5390
  if (!hashes || !hashes["lookup_pepper"] || !hashes["algorithms"]) {
7928
5391
  throw new Error("Unsupported identity server: bad response");
7929
5392
  }
@@ -7936,7 +5399,7 @@ export class MatrixClient extends TypedEventEmitter {
7936
5399
  // When picking an algorithm, we pick the hashed over no hashes
7937
5400
  if (hashes["algorithms"].includes("sha256")) {
7938
5401
  params["addresses"] = yield Promise.all(addressPairs.map(/*#__PURE__*/function () {
7939
- var _ref13 = _asyncToGenerator(function* (p) {
5402
+ var _ref10 = _asyncToGenerator(function* (p) {
7940
5403
  var addr = p[0].toLowerCase(); // lowercase to get consistent hashes
7941
5404
  var med = p[1].toLowerCase();
7942
5405
  var hashBuffer = yield sha256("".concat(addr, " ").concat(med, " ").concat(params["pepper"]));
@@ -7947,8 +5410,8 @@ export class MatrixClient extends TypedEventEmitter {
7947
5410
  localMapping[hashed] = p[0];
7948
5411
  return hashed;
7949
5412
  });
7950
- return function (_x6) {
7951
- return _ref13.apply(this, arguments);
5413
+ return function (_x4) {
5414
+ return _ref10.apply(this, arguments);
7952
5415
  };
7953
5416
  }()));
7954
5417
  params["algorithm"] = "sha256";
@@ -7966,7 +5429,7 @@ export class MatrixClient extends TypedEventEmitter {
7966
5429
  } else {
7967
5430
  throw new Error("Unsupported identity server: unknown hash algorithm");
7968
5431
  }
7969
- var response = yield _this81.http.idServerRequest(Method.Post, "/lookup", params, IdentityPrefix.V2, identityAccessToken);
5432
+ var response = yield _this55.http.idServerRequest(Method.Post, "/lookup", params, IdentityPrefix.V2, identityAccessToken);
7970
5433
  if (!(response !== null && response !== void 0 && response["mappings"])) return []; // no results
7971
5434
 
7972
5435
  var foundAddresses = [];
@@ -8000,12 +5463,12 @@ export class MatrixClient extends TypedEventEmitter {
8000
5463
  * @returns Rejects: with an error response.
8001
5464
  */
8002
5465
  lookupThreePid(medium, address, identityAccessToken) {
8003
- var _this82 = this;
5466
+ var _this56 = this;
8004
5467
  return _asyncToGenerator(function* () {
8005
5468
  // Note: we're using the V2 API by calling this function, but our
8006
5469
  // function contract requires a V1 response. We therefore have to
8007
5470
  // convert it manually.
8008
- var response = yield _this82.identityHashedLookup([[address, medium]], identityAccessToken);
5471
+ var response = yield _this56.identityHashedLookup([[address, medium]], identityAccessToken);
8009
5472
  var result = response.find(p => p.address === address);
8010
5473
  if (!result) {
8011
5474
  return {};
@@ -8037,16 +5500,16 @@ export class MatrixClient extends TypedEventEmitter {
8037
5500
  * @returns Rejects: with an error response.
8038
5501
  */
8039
5502
  bulkLookupThreePids(query, identityAccessToken) {
8040
- var _this83 = this;
5503
+ var _this57 = this;
8041
5504
  return _asyncToGenerator(function* () {
8042
5505
  // Note: we're using the V2 API by calling this function, but our
8043
5506
  // function contract requires a V1 response. We therefore have to
8044
5507
  // convert it manually.
8045
- var response = yield _this83.identityHashedLookup(
5508
+ var response = yield _this57.identityHashedLookup(
8046
5509
  // We have to reverse the query order to get [address, medium] pairs
8047
5510
  query.map(p => [p[1], p[0]]), identityAccessToken);
8048
5511
  var v1results = [];
8049
- var _loop2 = function* _loop2(mapping) {
5512
+ var _loop = function* _loop(mapping) {
8050
5513
  var originalQuery = query.find(p => p[1] === mapping.address);
8051
5514
  if (!originalQuery) {
8052
5515
  throw new Error("Identity sever returned unexpected results");
@@ -8056,7 +5519,7 @@ export class MatrixClient extends TypedEventEmitter {
8056
5519
  mapping.address, mapping.mxid]);
8057
5520
  };
8058
5521
  for (var mapping of response) {
8059
- yield* _loop2(mapping);
5522
+ yield* _loop(mapping);
8060
5523
  }
8061
5524
  return {
8062
5525
  threepids: v1results
@@ -8243,16 +5706,16 @@ export class MatrixClient extends TypedEventEmitter {
8243
5706
  * @returns Promise which resolves to the created space.
8244
5707
  */
8245
5708
  unstableCreateFileTree(name) {
8246
- var _this84 = this;
5709
+ var _this58 = this;
8247
5710
  return _asyncToGenerator(function* () {
8248
5711
  var {
8249
5712
  room_id: roomId
8250
- } = yield _this84.createRoom({
5713
+ } = yield _this58.createRoom({
8251
5714
  name: name,
8252
5715
  preset: Preset.PrivateChat,
8253
5716
  power_level_content_override: _objectSpread(_objectSpread({}, DEFAULT_TREE_POWER_LEVELS_TEMPLATE), {}, {
8254
5717
  users: {
8255
- [_this84.getUserId()]: 100
5718
+ [_this58.getUserId()]: 100
8256
5719
  }
8257
5720
  }),
8258
5721
  creation_content: {
@@ -8264,15 +5727,9 @@ export class MatrixClient extends TypedEventEmitter {
8264
5727
  content: {
8265
5728
  [UNSTABLE_MSC3088_ENABLED.name]: true
8266
5729
  }
8267
- }, {
8268
- type: EventType.RoomEncryption,
8269
- state_key: "",
8270
- content: {
8271
- algorithm: olmlib.MEGOLM_ALGORITHM
8272
- }
8273
5730
  }]
8274
5731
  });
8275
- return new MSC3089TreeSpace(_this84, roomId);
5732
+ return new MSC3089TreeSpace(_this58, roomId);
8276
5733
  })();
8277
5734
  }
8278
5735
 
@@ -8349,7 +5806,7 @@ export class MatrixClient extends TypedEventEmitter {
8349
5806
  * @param via - The list of servers which know about the room if only an ID was provided.
8350
5807
  */
8351
5808
  getRoomSummary(roomIdOrAlias, via) {
8352
- var _this85 = this;
5809
+ var _this59 = this;
8353
5810
  return _asyncToGenerator(function* () {
8354
5811
  var paramOpts = {
8355
5812
  prefix: "/_matrix/client/unstable/im.nheko.summary"
@@ -8358,7 +5815,7 @@ export class MatrixClient extends TypedEventEmitter {
8358
5815
  var path = utils.encodeUri("/summary/$roomid", {
8359
5816
  $roomid: roomIdOrAlias
8360
5817
  });
8361
- return yield _this85.http.authedRequest(Method.Get, path, {
5818
+ return yield _this59.http.authedRequest(Method.Get, path, {
8362
5819
  via
8363
5820
  }, undefined, paramOpts);
8364
5821
  } catch (e) {
@@ -8366,7 +5823,7 @@ export class MatrixClient extends TypedEventEmitter {
8366
5823
  var _path = utils.encodeUri("/rooms/$roomid/summary", {
8367
5824
  $roomid: roomIdOrAlias
8368
5825
  });
8369
- return yield _this85.http.authedRequest(Method.Get, _path, {
5826
+ return yield _this59.http.authedRequest(Method.Get, _path, {
8370
5827
  via
8371
5828
  }, undefined, paramOpts);
8372
5829
  } else {
@@ -8418,9 +5875,9 @@ export class MatrixClient extends TypedEventEmitter {
8418
5875
  * Fetches information about the user for the configured access token.
8419
5876
  */
8420
5877
  whoami() {
8421
- var _this86 = this;
5878
+ var _this60 = this;
8422
5879
  return _asyncToGenerator(function* () {
8423
- return _this86.http.authedRequest(Method.Get, "/account/whoami");
5880
+ return _this60.http.authedRequest(Method.Get, "/account/whoami");
8424
5881
  })();
8425
5882
  }
8426
5883
 
@@ -8431,7 +5888,7 @@ export class MatrixClient extends TypedEventEmitter {
8431
5888
  * @returns Rejects: when the request fails (module:http-api.MatrixError)
8432
5889
  */
8433
5890
  timestampToEvent(roomId, timestamp, dir) {
8434
- var _this87 = this;
5891
+ var _this61 = this;
8435
5892
  return _asyncToGenerator(function* () {
8436
5893
  var path = utils.encodeUri("/rooms/$roomId/timestamp_to_event", {
8437
5894
  $roomId: roomId
@@ -8441,7 +5898,7 @@ export class MatrixClient extends TypedEventEmitter {
8441
5898
  dir: dir
8442
5899
  };
8443
5900
  try {
8444
- return yield _this87.http.authedRequest(Method.Get, path, queryParams, undefined, {
5901
+ return yield _this61.http.authedRequest(Method.Get, path, queryParams, undefined, {
8445
5902
  prefix: ClientPrefix.V1
8446
5903
  });
8447
5904
  } catch (err) {
@@ -8457,7 +5914,7 @@ export class MatrixClient extends TypedEventEmitter {
8457
5914
  // both indicate that this endpoint+verb combination is
8458
5915
  // not supported.
8459
5916
  err.httpStatus === 404 || err.httpStatus === 405)) {
8460
- return yield _this87.http.authedRequest(Method.Get, path, queryParams, undefined, {
5917
+ return yield _this61.http.authedRequest(Method.Get, path, queryParams, undefined, {
8461
5918
  prefix: "/_matrix/client/unstable/org.matrix.msc3030"
8462
5919
  });
8463
5920
  }
@@ -8473,9 +5930,9 @@ export class MatrixClient extends TypedEventEmitter {
8473
5930
  * @experimental - part of MSC2965
8474
5931
  */
8475
5932
  getAuthIssuer() {
8476
- var _this88 = this;
5933
+ var _this62 = this;
8477
5934
  return _asyncToGenerator(function* () {
8478
- return _this88.http.request(Method.Get, "/auth_issuer", undefined, undefined, {
5935
+ return _this62.http.request(Method.Get, "/auth_issuer", undefined, undefined, {
8479
5936
  prefix: ClientPrefix.Unstable + "/org.matrix.msc2965"
8480
5937
  });
8481
5938
  })();
@@ -8483,88 +5940,12 @@ export class MatrixClient extends TypedEventEmitter {
8483
5940
  }
8484
5941
  _defineProperty(MatrixClient, "RESTORE_BACKUP_ERROR_BAD_KEY", "RESTORE_BACKUP_ERROR_BAD_KEY");
8485
5942
  function getUnstableDelayQueryOpts(delayOpts) {
8486
- return Object.fromEntries(Object.entries(delayOpts).map(_ref14 => {
8487
- var [k, v] = _ref14;
5943
+ return Object.fromEntries(Object.entries(delayOpts).map(_ref11 => {
5944
+ var [k, v] = _ref11;
8488
5945
  return ["".concat(UNSTABLE_MSC4140_DELAYED_EVENTS, ".").concat(k), v];
8489
5946
  }));
8490
5947
  }
8491
5948
 
8492
- /**
8493
- * recalculates an accurate notifications count on event decryption.
8494
- * Servers do not have enough knowledge about encrypted events to calculate an
8495
- * accurate notification_count
8496
- */
8497
- export function fixNotificationCountOnDecryption(cli, event) {
8498
- var _actions$tweaks;
8499
- var ourUserId = cli.getUserId();
8500
- var eventId = event.getId();
8501
- var room = cli.getRoom(event.getRoomId());
8502
- if (!room || !ourUserId || !eventId) return;
8503
-
8504
- // Due to threads, we can get relation events (eg. edits & reactions) that never get
8505
- // added to a timeline and so cannot be found in their own room (their edit / reaction
8506
- // still applies to the event it needs to, so it doesn't matter too much). However, if
8507
- // we try to process notification about this event, we'll get very confused because we
8508
- // won't be able to find the event in the room, so will assume it must be unread, even
8509
- // if it's actually read. We therefore skip anything that isn't in the room. This isn't
8510
- // *great*, so if we can fix the homeless events (eg. with MSC4023) then we should probably
8511
- // remove this workaround.
8512
- if (!room.findEventById(eventId)) {
8513
- logger.info("Decrypted event ".concat(event.getId(), " is not in room ").concat(room.roomId, ": ignoring"));
8514
- return;
8515
- }
8516
- var isThreadEvent = !!event.threadRootId && !event.isThreadRoot;
8517
- var hasReadEvent;
8518
- if (isThreadEvent) {
8519
- var thread = room.getThread(event.threadRootId);
8520
- hasReadEvent = thread ? thread.hasUserReadEvent(ourUserId, eventId) :
8521
- // If the thread object does not exist in the room yet, we don't
8522
- // want to calculate notification for this event yet. We have not
8523
- // restored the read receipts yet and can't accurately calculate
8524
- // notifications at this stage.
8525
- //
8526
- // This issue can likely go away when MSC3874 is implemented
8527
- true;
8528
- } else {
8529
- hasReadEvent = room.hasUserReadEvent(ourUserId, eventId);
8530
- }
8531
- if (hasReadEvent) {
8532
- // If the event has been read, ignore it.
8533
- return;
8534
- }
8535
- var actions = cli.getPushActionsForEvent(event, true);
8536
-
8537
- // Ensure the unread counts are kept up to date if the event is encrypted
8538
- // We also want to make sure that the notification count goes up if we already
8539
- // have encrypted events to avoid other code from resetting 'highlight' to zero.
8540
- var newHighlight = !!(actions !== null && actions !== void 0 && (_actions$tweaks = actions.tweaks) !== null && _actions$tweaks !== void 0 && _actions$tweaks.highlight);
8541
- if (newHighlight) {
8542
- // TODO: Handle mentions received while the client is offline
8543
- // See also https://github.com/vector-im/element-web/issues/9069
8544
- var newCount = room.getUnreadCountForEventContext(NotificationCountType.Highlight, event) + 1;
8545
- if (isThreadEvent) {
8546
- room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Highlight, newCount);
8547
- } else {
8548
- room.setUnreadNotificationCount(NotificationCountType.Highlight, newCount);
8549
- }
8550
- }
8551
-
8552
- // `notify` is used in practice for incrementing the total count
8553
- var newNotify = !!(actions !== null && actions !== void 0 && actions.notify);
8554
-
8555
- // The room total count is NEVER incremented by the server for encrypted rooms. We basically ignore
8556
- // the server here as it's always going to tell us to increment for encrypted events.
8557
- if (newNotify) {
8558
- // Total count is used to typically increment a room notification counter, but not loudly highlight it.
8559
- var _newCount = room.getUnreadCountForEventContext(NotificationCountType.Total, event) + 1;
8560
- if (isThreadEvent) {
8561
- room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Total, _newCount);
8562
- } else {
8563
- room.setUnreadNotificationCount(NotificationCountType.Total, _newCount);
8564
- }
8565
- }
8566
- }
8567
-
8568
5949
  /**
8569
5950
  * Given an event, figure out the thread ID we should use for it in a receipt.
8570
5951
  *